WorldWideScience

Sample records for flying saucer attack

  1. [SD-OCT As screening test for hydroxychloroquine retinopathy: The «flying saucer» sign].

    Science.gov (United States)

    Asensio-Sánchez, V M

    2015-07-01

    Two asymptomatic women treated with hydroxychloroquine 200mg every day for 8 and 16 years developed retinal toxicity. Patient 1 was found to have a normal fundus and autofluorescence examination. Patient 2 was found to have a completely normal fundus examination. Fluorescein angiography shows parafoveal hyperfluorescence, and autofluorescence shows a minimal decrease in signal in the same region. In both patients the SD-OCT shows disruption of the ellipsoid zone in parafoveal region («flying saucer» sign). SD-OCT findings in the retina can identify hydroxychloroquine retinopathy in asymptomatic patients. Copyright © 2013 Sociedad Española de Oftalmología. Published by Elsevier España, S.L.U. All rights reserved.

  2. Spectral domain optical coherence tomography as an effective screening test for hydroxychloroquine retinopathy (the "flying saucer" sign).

    Science.gov (United States)

    Chen, Eric; Brown, David M; Benz, Matthew S; Fish, Richard H; Wong, Tien P; Kim, Rosa Y; Major, James C

    2010-10-21

    While the long-term incidence of hydroxychloroquine (HCQ) retinopathy is low, there remains no definitive clinical screening test to recognize HCQ toxicity before ophthalmoscopic fundus changes or visual symptoms. Patients receiving HCQ were evaluated with spectral domain optical coherence tomography (SD OCT) to assess the feasibility of identifying HCQ retinopathy at an early stage. Twenty-five patients referred for the evaluation of hydroxychloroquine toxicity underwent a comprehensive ocular examination, Humphrey visual field (HVF) perimetry, time domain OCT, and SD OCT. Some patients with screening abnormalities also underwent further diagnostic testing at the discretion of the treating providers. Five patients were found to have SD OCT findings corresponding to HCQ toxicity and retinal damage as seen by clinical exam and/or HVF perimetry. Two patients with advanced toxicity were found to have significant outer retina disruption in the macula on SD OCT. Three patients with early HCQ toxicity and HVF 10-2 perifoveal defects were found to have loss of the perifoveal photoreceptor inner segment/outer segment (IS/OS) junction with intact outer retina directly under the fovea, creating the "flying saucer" sign. While two of these three patients had early ophthalmoscopic fundus changes, one had none. Outer retinal abnormalities including perifoveal photoreceptor IS/OS junction disruption can be identified by SD OCT in early HCQ toxicity, sometimes even before ophthalmoscopic fundus changes are apparent. SD OCT may have a potential complementary role in screening for HCQ retinopathy due to its quick acquisition and because it is more objective than automated perimetry.

  3. Mechanisms Of Saucer-Shaped Sill Emplacement: Insight From Experimental Modeling

    Science.gov (United States)

    Galland, O.; Planke, S.; Malthe-Sørenssen, A.; Polteau, S.; Svensen, H.; Podladchikov, Y. Y.

    2006-12-01

    It has been recently demonstrated that magma intrusions in sedimentary basins had a strong impact on petroleum systems. Most of these intrusions are sills, and especially saucer-shaped sills. These features can be observed in many sedimentary basins (i.e. the Karoo basin, South Africa; the Norwegian and North Sea; the Tunguska basin, Siberia; the Neuquén basin in Argentina). The occurrence of such features in so various settings suggests that their emplacement results from fundamental processes. However, the mechanisms that govern their formation remain poorly constrained. Experiments were conducted to simulate the emplacement of saucer-shaped magma intrusions in sedimentary basins. The model rock and magma were fine-grained silica flour and molten vegetable oil, respectively. This modeling technique allows simultaneous simulation of magma emplacement and brittle deformation at a basin scale. For our purpose, we performed our experiments without external deformation. During the experiments, the oil was injected horizontally at constant flow rate within the silica flour. Then the oil initially emplaced in a sill, whereas the surface of the model inflated into a smooth dome. Subsequently, the oil propagated upwards along inclined sheets, finally reaching the surface at the edge of the dome. The resulting geometries of the intrusions were saucer-shaped sills. Then the oil solidified, and the model was cut in serial cross-sections through which the structures of the intrusive body and of the overburden can be observed. In order to constraint the processes governing the emplacement of such features, we performed a parametric study based on a set of experiments in which we systematically varied parameters such as the depth of emplacement and the injection flow rate of the oil. Our results showed that saucer diameters are larger at deeper level of emplacement. Opposite trend was obtained with varying injection flow rates. Based on our results, we conducted a detailed

  4. Dome Structures Above Sills and Saucer-Shaped Sills: Insights From Experimental Modeling

    Science.gov (United States)

    Planke, S.; Galland, O.; Malthe-Sørenssen, A.

    2007-12-01

    Saucer-shaped magma and sand intrusions are common features in sedimentary basins. They result from fundamental processes for the emplacement of fluids in shallow sedimentary basins. Seismic data show that the overburden above saucer-shaped intrusions is usually deformed and exhibits a dome-like structure. The formation of such structures, and the associated deformation, are of primary importance in the evolution of petroleum systems. In this presentation, we report on experimental investigation of the deformation processes associated with the intrusion of saucer-shaped intrusions into sedimentary basins. The experimental setup consists of molten low-viscosity oil injected into fine-grained silica flour (see Galland et al., this session). It properly simulates the emplacement of saucer-shaped intrusions and the deformation of the country rock. During experiments, the surface of the model is digitalized through a structured light technique based on moiré projection principle. Such a tool provides topographic maps of the model and allows a periodic (every 1.5 s) monitoring of the model surface. When the model magma starts intruding, a symetrical dome rises above the inlet. As injection proceeds, the dome inflates and widens. Subsequently, the dome evolves to a plateau-like feature, with nearly flat surface and steep edges. The plateau keeps lifting up, but nearly stoppes widening. At the end of the experiments, the intruding liquid erupts at the edge of the plateau. The intrusion formed in the experiment is a typical saucer-shaped sill. The evolution of the deforming surface reflects the evolution of the intrusion. We infer that the first doming phase corresponds to the emplacement of a horizontal basal sill by open fracturing. The dome-to-plateau transition corresponds to a transition of the liquid emplacement mechanism from basal sill to inclined sheet. We suggest that the emplacement of the inclined sheets results from shear fracturing at the dome edge.

  5. Degradation of self-compacting concrete (SCC) due to sulfuric acid attack: Experiment investigation on the effect of high volume fly ash content

    Science.gov (United States)

    Kristiawan, S. A.; Sunarmasto; Tyas, G. P.

    2016-02-01

    Concrete is susceptible to a variety of chemical attacks. In the sulfuric acid environment, concrete is subjected to a combination of sulfuric and acid attack. This research is aimed to investigate the degradation of self-compacting concrete (SCC) due to sulfuric acid attack based on measurement of compressive strength loss and diameter change. Since the proportion of SCC contains higher cement than that of normal concrete, the vulnerability of this concrete to sulfuric acid attack could be reduced by partial replacement of cement with fly ash at high volume level. The effect of high volume fly ash at 50-70% cement replacement levels on the extent of degradation owing to sulfuric acid will be assessed in this study. It can be shown that an increase in the utilization of fly ash to partially replace cement tends to reduce the degradation as confirmed by less compressive strength loss and diameter change. The effect of fly ash to reduce the degradation of SCC is more pronounced at a later age.

  6. Vertical linear feeder to elliptical igneous saucer-shaped sills: evidences from structural observations, geochemistry and experimental modeling

    Science.gov (United States)

    Galerne, C. Y.; Galland, O.; Neumann, E. R.; Planke, S.

    2009-12-01

    The structural relationships between sills and their feeders are poorly documented because they are rarely observed in the field and difficult to image on seismic data. For instance, it is unclear whether sills are fed by pipes, dikes or other sills. Nevertheless, the geometrical relationships between sills and their feeders provide first-order constraints on magma emplacement mechanisms. Here, we investigate the structural and geochemical relationships between sills and potential feeder dikes in a remarkably well-preserved and exposed sill complex, the Golden Valley Sill Complex (GVSC), Karoo Basin, South Africa. The GVSC consists of five major saucer-shaped sills and six dikes. The Golden Valley sill itself is an elliptical saucer, with a N-S trend. A one meter thick dike (D4) crops out underneath the southern tip of the Golden Valley sill. The strike of this dike is parallel to the long axis of the Golden Valley sill. Detailed sampling and geochemical analyses of the GVSC show that each sill and dike exhibits a specific geochemical signature. The Golden Valley sill and its underlying dike D4 have identical signatures. Although there is no clear structural evidence, the consistent geometrical and geochemical relationships between the Golden Valley sill and the D4 dike suggest that this vertical linear structure is the feeder of the overlying saucer-shaped sill. In order to investigate the relationships between sills and feeders, we resorted to scaled laboratory experiments. The experiments consisted of a low-viscosity vegetable oil representing magma and a cohesive fine-grained silica flour representing brittle rocks. We placed a horizontal weak layer into the silica flour, just above the top of the inlet, to simulate strata. Such a weak layer controlled the formation of horizontal sill that subsequently turned into a transgressive sheet leading to the formation of a saucer geometry. We ran experiments with varying inlet shapes: 1) a point inlet representing a

  7. Experimental Modeling of the Formation of Saucer-Shaped sills

    Science.gov (United States)

    Galland, O.; Planke, S.; Malthe-Sorenssen, A.

    2007-12-01

    Many magma intrusions in sedimentary basins are sills, and especially saucer-shaped sills. These features are observed in many places (i.e. South Africa; the Norwegian and North Sea; Siberia; Argentina). Sand injectites exhibit similar geometries. The occurrence of such features in so various settings suggests that their emplacement results from fundamental processes in sedimentary basins. To understand such processes, we performed experimental modeling of saucer-shaped sill emplacement. The experiments consist of injecting a molten low viscosity vegetable oil (model magma) at a constant flow rate into a fine-grained Coulomb silica flour (model rock). When the oil starts intruding, the initially flat surface of the model inflates and forms a smooth dome. At the end of the experiment, the oil erupts at the edge of the dome. After the experiment, the oil cools and solidifies, the resulting solid intrusion is unburied and exposed, and its upper surface digitalized. For our purpose, we did our experiments without external deformation. We performed two series of experiments with varying depth of injection. The first series consisted of injection into a homogeneous medium. The resulting intrusions were cone-sheets and dykes. The second series consisted of heterogeneous models where the heterogeneity was a weak layer made of a flexible net. The resulting intrusions were made of (1) a horizontal basal sill emplaced along the weakness, and (2) inclined sheets nucleating at the edges of the basal sill and propagating upward and outward. The inclined sheets exhibited a convex shape, i.e. a decreasing slope outward. In addition, the deeper the sills emplaced, the larger they were. Our experimental results are consistent with saucer-shaped features in nature. We infer from our results that the transition between the basal sills and the inclined sheets results from a transition of emplacement processes. We suggest that the basal sill emplace by open (mode I) fracturing, whereas

  8. Understanding the mechanical coupling between magma emplacement and the resulting deformation: the example of saucer-shaped sills

    Science.gov (United States)

    Galland, O.; Neumann, E. R.; Planke, S.

    2009-12-01

    The mechanical coupling between magma intrusions and the surrounding rocks plays a major role in the emplacement of volcanic plumbing systems. The deformation associated with magma emplacement has been widely studied, such as caldera inflation/deflation, volcano deformation during dike intrusion, and doming above laccoliths. However, the feedback processes, i.e. the effect of deformation resulting from intruding magma on the propagation of the intrusion itself, have rarely been studied. Saucer-shaped sills are adequate geological objects to understand such processes. Indeed, observation show that saucer-shaped sills are often associated with dome-like structures affecting the overlying sediments. In addition, there is a clear geometrical relation between the sills and the domes: the dome diameters are almost identical to those of saucers, and the tips of the inclined sheets of saucers are superimposed on the edges of the domes. In this presentation, we report on experimental investigations of the emplacement mechanisms of saucer-shaped sills and associated deformation. The model materials were (1) cohesive fine-grained silica flour, representing brittle crust, and (2) molten low-viscosity oil, representing magma. A weak layer located at the top of the injection inlet simulates strata. The main variable parameter is injection depth. During experiments, the surface of the model is digitalized through a structured light technique based on the moiré projection principle. Such a tool provides topographic maps of the surface of the model and allows a periodic (every 1.5 s) monitoring of the model topography. When the model magma starts intruding, a symmetrical dome rises above the inlet. Subsequently, the dome inflates and widens, and then evolves to a plateau-like feature, with nearly flat upper surface and steep sides. At the end of the experiments, the intruding liquid erupts at the edge of the plateau. The intrusions formed in the experiments are saucer-shaped sills

  9. Durability properties of high volume fly ash self compacting concretes

    Energy Technology Data Exchange (ETDEWEB)

    P. Dinakar; K.G. Babu; Manu Santhanam [Indian Institute of Technology, Chennai (India). Building Technology Division

    2008-11-15

    This paper presents an experimental study on the durability properties of self compacting concretes (SCCs) with high volume replacements of fly ash. Eight fly ash self compacting concretes of various strength grades were designed at desired fly ash percentages of 0, 10, 30, 50, 70 and 85%, in comparison with five different mixtures of normal vibrated concretes (NCs) at equivalent strength grades. The durability properties were studied through the measurement of permeable voids, water absorption, acid attack and chloride permeation. The results indicated that the SCCs showed higher permeable voids and water absorption than the vibrated normal concretes of the same strength grades. However, in acid attack and chloride diffusion studies the high volume fly ash SCCs had significantly lower weight losses and chloride ion diffusion.

  10. Effects of decomposition on carcass attendance in a guild of carrion-breeding flies.

    Science.gov (United States)

    Archer, M S; Elgar, M A

    2003-09-01

    Many forensically important calliphorids, sarcophagids and muscids (Diptera) oviposit or larviposit on corpses only during the early stages of decomposition, yet individuals may attend bodies throughout decay. A field study was conducted to investigate how patterns of carcass use and attendance by some fly species are affected by decomposition. Five fly traps were placed in the forest and baited with whole, fresh piglet carcasses. Piglets decomposed in traps throughout the experiment, and all were skeletonized within 6 days. Flies were trapped at both early and late decomposition stages, and the species and population structures of trap catches were compared. More flies attended carcasses early rather than late in decay. For all species, flies attending early were mainly gravid females, but few gravid females attended late in decay. No females ovi- or larviposited late in decay, whereas females of all fly species deposited offspring early in decay. The number of males trapped of each species correlated positively with the number of females with eggs at early development stages. Observations were made of fly predation by European wasps Vespula germanica Fabricius (Hymenoptera, Vespidae) and jumper ants Myrmecia pilosula Smith (Hymenoptera, Formicidae) throughout the experiment. There was a higher risk for smaller fly species of being killed following predator attack. Ants and wasps attacked smaller fly species, whereas only wasps attacked larger fly species.

  11. Aerodynamic characteristics of flying fish in gliding flight.

    Science.gov (United States)

    Park, Hyungmin; Choi, Haecheon

    2010-10-01

    The flying fish (family Exocoetidae) is an exceptional marine flying vertebrate, utilizing the advantages of moving in two different media, i.e. swimming in water and flying in air. Despite some physical limitations by moving in both water and air, the flying fish has evolved to have good aerodynamic designs (such as the hypertrophied fins and cylindrical body with a ventrally flattened surface) for proficient gliding flight. Hence, the morphological and behavioral adaptations of flying fish to aerial locomotion have attracted great interest from various fields including biology and aerodynamics. Several aspects of the flight of flying fish have been determined or conjectured from previous field observations and measurements of morphometric parameters. However, the detailed measurement of wing performance associated with its morphometry for identifying the characteristics of flight in flying fish has not been performed yet. Therefore, in the present study, we directly measure the aerodynamic forces and moment on darkedged-wing flying fish (Cypselurus hiraii) models and correlated them with morphological characteristics of wing (fin). The model configurations considered are: (1) both the pectoral and pelvic fins spread out, (2) only the pectoral fins spread with the pelvic fins folded, and (3) both fins folded. The role of the pelvic fins was found to increase the lift force and lift-to-drag ratio, which is confirmed by the jet-like flow structure existing between the pectoral and pelvic fins. With both the pectoral and pelvic fins spread, the longitudinal static stability is also more enhanced than that with the pelvic fins folded. For cases 1 and 2, the lift-to-drag ratio was maximum at attack angles of around 0 deg, where the attack angle is the angle between the longitudinal body axis and the flying direction. The lift coefficient is largest at attack angles around 30∼35 deg, at which the flying fish is observed to emerge from the sea surface. From glide polar

  12. PROTECTION WORKS AGAINST WAVE ATTACKS IN THE HAOR AREAS OF BANGLADESH: ANALYSIS OF SUSTAINABILITY

    Directory of Open Access Journals (Sweden)

    M.K. Alam

    2010-12-01

    Full Text Available Haor is the local name of the saucer-shaped, naturally depressed areas of Bangladesh. There are 414 haors in the northeast region that comprise approximately 17% of the country. These areas are submerged under deep water from July to November due to the overflow of rivers and heavy rainfall, causing them to appear like seas with erosive waves. Recently, the wave attack has drastically increased because of de-plantation and changing cropping patterns to allow for more agricultural production. The local people, government and Non-Government Organisations (NGOs have tried many techniques to protect life and property against wave attacks. A cost comparison shows that Cement Concrete (CC blocks over geotextile on the slope embankment is a cost-effective, environment friendly and socially acceptable method to prevent loss of life and property. However, the design rules employed by the engineers are faulty because there is knowledge gap in the application of wave hydraulics among these professionals. As a result, damage frequently occurs and maintenance costs are increasing. This study explores the sustainability of the CC blocks used in the Haor areas by evaluating two case studies with the verification of available design rules.

  13. Evaluation of the suitability for concrete using fly ash in N.P.P. structures

    International Nuclear Information System (INIS)

    Cho, M. S.; Song, Y. C.; Kim, S. W.; Ko, K. T.

    2002-01-01

    The nuclear power plant structures constructed in Korea has been generally used type V cement(sulfate-resisting Portland cement), but according to the study results reported recently, it shows that type V cement is superior the resistance of sulfate attack, but the resistance of salt damage is weaker than type I cement. It is increased the demands on the use of mineral admixtures such as fly ash, ground granulated blast-furnace slag instead of type V cement in order to improve the durability of concrete structures. But the study on concrete mixed with fly ash in Korea has been mainly performed on rheology and strength properties of the concrete. Therefore, this study is to improve the durability of concrete structures of N.P.P. as using fly ash cement instead of type V cement. As a results, the concrete containing fly ash is improved the resistance to salt attack, sulfate attack and freezing-thawing and is deteriorated the carbonation. But if it is used the concrete with high strength or low water-powder ratio, the concrete have not problem on the durability

  14. Effect of mutual interference on the ability of Spalangia cameroni (Hymenoptera: Pteromalidae) to attack and parasitize pupae of Stomoxys calcitrans (Diptera: Muscidae)

    DEFF Research Database (Denmark)

    Skovgård, Henrik; Nachman, Gösta

    2015-01-01

    We investigated the effect of mutual interference on the attack efficiency and the rate of successful parasitism on the parasitoid Spalangia cameroni (Perkins) attacking pupae of the stable fly Stomoxys calcitrans (L.). Female parasitoids (2, 4, 8, 16, or 32) were exposed to 100 fly pupae during ...

  15. Development of botanical-based biopesticides and repellents against biting flies on livestock animals

    Science.gov (United States)

    Biting flies are important insect pests causing millions of dollars in losses to the livestock industry. The attack by biting flies causes significant losses in animal production and potential food contamination and disease transmission. This presentation reports our recent findings on the developme...

  16. Flying Posture of Tandem Warhead Influences its Penetrating and Following Performance

    Directory of Open Access Journals (Sweden)

    Jin-tao Wang

    2014-02-01

    Full Text Available In this study, we investigated a novel monolithic tandem penetrating-blast warhead, which can destroy targets with adjustable parameters including attack velocity, angles, as well as yaw angles. Different flying postures determine different performance of the precursory EFP in penetration process and its following projectile in secondary process. In order to characterize the influence of flying posture, we established a finite elements analysis model. This model has been verified by a static experiment. Our results indicated that the attack velocity of the warhead has tiny influence of the penetration process. However, larger attack angle of the warhead will lead to bad performance of the warhead. Meanwhile, yaw angle range should be controlled in small values due to its randomness. The comprehensive properties of the tandem warhead meet the design requirement, and it is able to damage the target effectively.

  17. Images of the Mind and Images for the Eye. An Iconographical Approach to UFO-Mythology

    Directory of Open Access Journals (Sweden)

    Mikael Rothstein

    1996-01-01

    Full Text Available In the study of contemporary new religions and popular religious or metaphysical notions, the iconographical sources are often sadly overlooked. In this article it is the intention to present an iconographical approach to one single, although significantly versatile, aspect of modern, non-traditional mythology, namely the notion of "flying saucers" or UFOs (i.e. Unidentified Flying Objects. The actual UFO-religions may be insignificant in terms of adherence, but the very concept of UFOs holds a strong position in contemporary metaphysics and spirituality, as we find it in the so called New Age movement and elsewhere. Starting with the very notion of strange circular phenomena in the sky, a vast and very differentiated mythology of "flying saucers" or UFOs has developed. As far as the iconographical presentations reflect the narrative structure(s of the UFO myth, these pictures are integrated elements of the UFO story, and sometimes even agents of a further ufological development.

  18. Explicit Nonlinear Model Predictive Control for a Saucer-Shaped Unmanned Aerial Vehicle

    Directory of Open Access Journals (Sweden)

    Zhihui Xing

    2013-01-01

    Full Text Available A lifting body unmanned aerial vehicle (UAV generates lift by its body and shows many significant advantages due to the particular shape, such as huge loading space, small wetted area, high-strength fuselage structure, and large lifting area. However, designing the control law for a lifting body UAV is quite challenging because it has strong nonlinearity and coupling, and usually lacks it rudders. In this paper, an explicit nonlinear model predictive control (ENMPC strategy is employed to design a control law for a saucer-shaped UAV which can be adequately modeled with a rigid 6-degrees-of-freedom (DOF representation. In the ENMPC, control signal is calculated by approximation of the tracking error in the receding horizon by its Taylor-series expansion to any specified order. It enhances the advantages of the nonlinear model predictive control and eliminates the time-consuming online optimization. The simulation results show that ENMPC is a propriety strategy for controlling lifting body UAVs and can compensate the insufficient control surface area.

  19. Geology of the saucer-shaped sill near Mahad, western Deccan Traps, India, and its significance to the Flood Basalt Model

    Science.gov (United States)

    Duraiswami, Raymond A.; Shaikh, Tahira N.

    2013-07-01

    An ˜22-m-thick saucer-shaped sill occurs near Mahad and is exposed as a curvilinear, miniature ridge within the Deccan Traps. The sill has variable dips (42-55°). It has a 7.1-km long axis and 5.3 km short axis (aspect ratio of 1.4) and is larger than the MV sill of the Golden Valley sill complex, South Africa and the Panton sill, Australia. The sill has distinct glassy upper and lower chilled margins with a coarse-grained highly jointed core. The samples from the margin are invariably fractured and iron stained because of deuteric alteration. The rock from the sill is plagioclase-phyric basalt. At least three thick sill-like apophyses emanate from the base of the main sill. The apophyses change direction because of bending and thinning from a horizontal concordant sheet at the top to a discordant inclined form that bends again to pass into a lower horizontal concordant sheet. We interpret such features as `nascent saucer-shaped sills' that did not inflate to form nested sills. Geochemically, the sill consists of poorly differentiated tholeiitic basalt that has a restricted geochemical range. Critical trace element ratios and primitive mantle normalised trace and REE patterns indicate that the sills have geochemical affinities to the Poladpur chemical type and that the pahoehoe flow they intrude belongs to the Bushe Formation. Calculated magmatic overpressures during sill emplacement range from 8.4 to 11.3 MPa (for Young's modulus E = 5 GPa) and 16.7 to 22.5 MPa (for E=10 GPa) and depth to magma chamber ranges from 8.5 to 11.5 km ( E = 5 GPa) and 17.1 to 22.9 km ( E = 10 GPa), consistent with petrological and gravity modelling. The volume of the Mahad sill is approximately 276 km3 and is constant irrespective of the variations in the values of host-rock Young's modulus. In 1980, Cox (J Petrol 21:629-650, 1980) proposed a conceptual model of the crust-mantle section beneath the Karoo CFB which is considered as the fundamental model for flood basalt volcanism. Our

  20. Investigation of gliding flight by flying fish

    Science.gov (United States)

    Park, Hyungmin; Jeon, Woo-Pyung; Choi, Haecheon

    2006-11-01

    The most successful flight capability of fish is observed in the flying fish. Furthermore, despite the difference between two medium (air and water), the flying fish is well evolved to have an excellent gliding performance as well as fast swimming capability. In this study, flying fish's morphological adaptation to gliding flight is experimentally investigated using dry-mounted darkedged-wing flying fish, Cypselurus Hiraii. Specifically, we examine the effects of the pectoral and pelvic fins on the aerodynamic performance considering (i) both pectoral and pelvic fins, (ii) pectoral fins only, and (iii) body only with both fins folded. Varying the attack angle, we measure the lift, drag and pitching moment at the free-stream velocity of 12m/s for each case. Case (i) has higher lift-to-drag ratio (i.e. longer gliding distance) and more enhanced longitudinal static stability than case (ii). However, the lift coefficient is smaller for case (i) than for case (ii), indicating that the pelvic fins are not so beneficial for wing loading. The gliding performance of flying fish is compared with those of other fliers and is found to be similar to those of insects such as the butterfly and fruitfly.

  1. Extended analysis of the Trojan-horse attack in quantum key distribution

    Science.gov (United States)

    Vinay, Scott E.; Kok, Pieter

    2018-04-01

    The discrete-variable quantum key distribution protocols based on the 1984 protocol of Bennett and Brassard (BB84) are known to be secure against an eavesdropper, Eve, intercepting the flying qubits and performing any quantum operation on them. However, these protocols may still be vulnerable to side-channel attacks. We investigate the Trojan-horse side-channel attack where Eve sends her own state into Alice's apparatus and measures the reflected state to estimate the key. We prove that the separable coherent state is optimal for Eve among the class of multimode Gaussian attack states, even in the presence of thermal noise. We then provide a bound on the secret key rate in the case where Eve may use any separable state.

  2. Euxesta spp. NEW PEST IN Zea mays L. VAR. rugosa: ASSOCIATION WITH Heliothis zea ATTACKS IN SPRING AND SUMMER SEEDS

    Directory of Open Access Journals (Sweden)

    María Cecilia Curis

    2015-12-01

    Full Text Available The "corn silk fly" of maize (Euxesta spp. Loew, 1868 appeared in 2005 in Santa Fe (Argentina, causing damage to the ears. The attacks are related to temperature, crop growth stage and previous attack of other pests. For this new pest, we determined the species present, the damage on Bt sweet corn plantings in two seasons (August and February, the association of attacks with Heliothis zea (Boddie, 1850 and the presence of parasitoids. Larvae counts of H. zea and Euxesta spp. began in the phenological stage of R2 and ended in R5 and consisted of removing at random from each batch (three for each planting season four ears. In laboratory we determined the percentage of damage on the ears and number of larvae of Euxesta spp. and H. zea, discriminated by size. Fly was identified as E. eluta, damage was greatest in the early spring planting corn. Attacks were correlated with H. zea.

  3. How the Elderly Can Use Scientific Knowledge to Solve Problems While Designing Toys: A Retrospective Analysis of the Design of a Working UFO

    Science.gov (United States)

    Chen, Mei-Yung; Hong, Jon-Chao; Hwang, Ming-Yueh; Wong, Wan-Tzu

    2013-01-01

    The venerable aphorism "an old dog cannot learn new tricks" implies that the elderly rarely learn anything new--in particular, scientific knowledge. On the basis of "learning by doing," the present study emphasized knowledge application (KA) as elderly subjects collaborated on the design of a toy flying saucer (UFO). Three…

  4. Transient heat stress compromises the resistance of wheat (Poales: Poaceae) seedlings to Hessian fly (Diptera: Cecidomyiidae) infestation.

    Science.gov (United States)

    Currie, Yaleaka; Moch, John; Underwood, Joshua; Kharabsheh, Hamzah; Quesenberry, Amy; Miyagi, Risa; Thomas, Carolyn; Boney, Melanie; Woods, Samantha; Chen, Ming-Shun; Zhu, Lieceng

    2014-02-01

    Heat stress exerts a profound impact on the resistance of plants to parasites. In this research, we investigated the impact of an acute transient heat stress on the resistance of the wheat line 'Molly,' which contains the R gene H13, to an avirulent Hessian fly (Mayetiola destructor (Say)) population. We found that a significant portion of Molly seedlings stressed at 40 degrees C for 6 h during or after the initial Hessian fly larval attack became susceptible to otherwise avirulent insects, whereas unstressed control plants remained 100% resistant. Specifically, 77.8, 73.3, 83.3, and 46.7% of plants heat stressed at 0, 6,12, and 24 h, respectively, after the initial larval attack became susceptible. Biochemical analysis revealed that heat stress caused a transient decrease in 12-oxo-phytodienoic acid, but an increase in salicylic acid accumulation in Molly plants. The change in phytohormones after heat stress and Hessian fly infestation was not observed in 'Newton,' a near-isogenic but Hessian fly susceptible wheat line. Instead, heat stress caused a relatively prolonged reduction in palmitoleic acid. The role of phytohormones in heat-induced loss of wheat resistance was discussed.

  5. An area wide control of fruit flies in Mauritius

    International Nuclear Information System (INIS)

    Sookar, P.; Permalloo, S.; Gungah, B.; Alleck, M.; Seewooruthun, S.I.; Soonnoo, A.R.

    2006-01-01

    An area-wide National Fruit Fly Control Programme (NFFCP) was initiated in 1994, funded by the European Union until 1999 and now fully financed by the Government of Mauritius. The NFFCP targets some 75,000 backyard fruit trees owners mainly. The bait application and male annihilation techniques (BAT e MAT) are currently being applied against the fruit flies attacking fleshy fruits and are targeting selected major fruit growing areas in the north, north-east, central and western parts of the island. Successful control has been achieved using these two techniques as demonstrated by trap catches and fruit samplings. The level of fruit fly damage to fruits has been reduced. Presently, the bait-insecticide mixture is being supplied free of charge to the public. The current status of the area-wide suppression programme is such that continuous use of BAT/MAT is a never ending process and as such is not viable. In this context, a TC project on Feasibility studies for integrated use of sterile insect technique for area wide tephritid fruit fly control.Studies are also being carried out on mass rearing of the peach fruit fly for small scale trials on SIT so as to eventually integrate this control method in our area-wide control programme. (author)

  6. An area wide control of fruit flies in Mauritius

    Energy Technology Data Exchange (ETDEWEB)

    Sookar, P.; Permalloo, S.; Gungah, B.; Alleck, M.; Seewooruthun, S.I.; Soonnoo, A.R., E-mail: ento@intnet.m, E-mail: moa-entomology@mail.gov.m [Ministry of Agro Industry and Fisheries Reduit, Republic of Mauritius (Mauritius)

    2006-07-01

    An area-wide National Fruit Fly Control Programme (NFFCP) was initiated in 1994, funded by the European Union until 1999 and now fully financed by the Government of Mauritius. The NFFCP targets some 75,000 backyard fruit trees owners mainly. The bait application and male annihilation techniques (BAT e MAT) are currently being applied against the fruit flies attacking fleshy fruits and are targeting selected major fruit growing areas in the north, north-east, central and western parts of the island. Successful control has been achieved using these two techniques as demonstrated by trap catches and fruit samplings. The level of fruit fly damage to fruits has been reduced. Presently, the bait-insecticide mixture is being supplied free of charge to the public. The current status of the area-wide suppression programme is such that continuous use of BAT/MAT is a never ending process and as such is not viable. In this context, a TC project on Feasibility studies for integrated use of sterile insect technique for area wide tephritid fruit fly control.Studies are also being carried out on mass rearing of the peach fruit fly for small scale trials on SIT so as to eventually integrate this control method in our area-wide control programme. (author)

  7. Mites and spiders act as biological control agent to sand flies

    Directory of Open Access Journals (Sweden)

    Diwakar Singh Dinesh

    2014-02-01

    Full Text Available Objective: To find out natural biological control agents of sand flies vector of kala azar in Bihar, India. Methods: Sand flies collected from the field using CDC light trap installing overnight to the collection site scrutitinized for Phlebotomus argentipes, the established vector of visceral leishmaniasis. Blood fed adult females were confined in the insectary for its development of life cycle. During developmental stages 2nd to 4th instars larvae were examined closely by using compound microscope for mite infestation. Adult spider residing along with sand flies collected in trap were kept in cage along with sand flies and their activities were watched closely and recorded by video and picture. Results: Mites were found predating 2nd to 4th instars larvae only under the laboratory conditions and lowering down the population of sand flies up to basal level within 15 d after infestation. One specific spider was found eating blood fed female sand flies kept inside the cage (n=50 attacking on lower part of thoracic region to kill the sand fly and ate desired soft part. Conclusions: Both predators, mites and spiders are acting as biological control agents to larvae and adults of sand flies respectively resulting variable density of vectors due to variable association with these predators and also cause lowering the transmission of the disease as hidden natural controlling agent of sand flies. The extensive study will be of immense help in controlling sand flies without use of environmental pollutant i.e. chemical insecticide.

  8. Effectiveness of a sprayable male annihilation treatment with a biopesticide against fruit flies (Diptera:Tephritidae) attacking tropical fruits

    Science.gov (United States)

    SPLAT-MAT Spinosad ME(aka STATIC Spinosad ME),an "attract and kill" sprayable biopesticide, was evaluated as an area wide suppression treatment against Bactrocera carambolae(Drew & Hancock),carambola fruit fly, in Brazil and Bactrocera dorsalis(Hendel),oriental fruit fly, in Hawaii. In Brazil, a sin...

  9. Flight test of the X-29A at high angle of attack: Flight dynamics and controls

    Science.gov (United States)

    Bauer, Jeffrey E.; Clarke, Robert; Burken, John J.

    1995-01-01

    The NASA Dryden Flight Research Center has flight tested two X-29A aircraft at low and high angles of attack. The high-angle-of-attack tests evaluate the feasibility of integrated X-29A technologies. More specific objectives focus on evaluating the high-angle-of-attack flying qualities, defining multiaxis controllability limits, and determining the maximum pitch-pointing capability. A pilot-selectable gain system allows examination of tradeoffs in airplane stability and maneuverability. Basic fighter maneuvers provide qualitative evaluation. Bank angle captures permit qualitative data analysis. This paper discusses the design goals and approach for high-angle-of-attack control laws and provides results from the envelope expansion and handling qualities testing at intermediate angles of attack. Comparisons of the flight test results to the predictions are made where appropriate. The pitch rate command structure of the longitudinal control system is shown to be a valid design for high-angle-of-attack control laws. Flight test results show that wing rock amplitude was overpredicted and aileron and rudder effectiveness were underpredicted. Flight tests show the X-29A airplane to be a good aircraft up to 40 deg angle of attack.

  10. USE OF METHYL EUGENOL SOLUTION AND RED GUAVA EXTRACT FOR FRUIT FLY CONTROL

    Directory of Open Access Journals (Sweden)

    Sulistiya

    2016-01-01

    Full Text Available One of the constraints increase fruit production in Indonesia is the fruit fly pests. The introduction of fruit fly pest attack prevention using attractant methyl eugenol is considered expensive and troublesome. Therefore, researchers are interested in doing this experiment. Objective: (1 determine the volume of a solution of methyl eugenol most appropriate in the fruit fly trap to get optimum results. (2 determine the most appropriate time of application. Conducted experiments using attractant methyl eugenol is mixed into the guava fruit extract. Research conducted in the guava orchard belonging to farmers in the village Sumberagung, Jetis, Bantul begins July through September 2015. The research used randomized block design factorial design with two treatment factors. The first factor is the concentration of the solution Petrogenol which consists of three levels, repeated five times. Data were analyzed by F test, if they depict real effect, continued treatment mean comparison test using HSD test at five percent level. Conclusions (1 The solution Methyl eugenol is a fruit fly attractant potential in the control of fruit flies in the crop guava. (2 The concentration of Methyl eugenol 0.60 ml per 100 ml guava fruit extract with the application time of 10 days is more effective to trap fruit flies in guava crop

  11. Augmentative biological control in the Mexican national fruit fly campaign

    Energy Technology Data Exchange (ETDEWEB)

    Montoya, P [Campana Nacional Moscas de la Fruta, DGSV-SAGARPA (Mexico); Cancino, J; Gutierrez, J M; Santiago, G [Campana Nacional Moscas de la Fruta, DGSV-SAGARPA (Mexico)

    2005-07-01

    Full text: Tephritid fruit flies are some of the most economically important species of insects worldwide. In Mexico, the native Anastrepha ludens, A. obliqua, A. serpentina and A. striata, are among the most important problems because of the great number of commercial fruits they attack. In an attempt to solve the Anastrepha fruit flies problems, the Mexican Government created the National Campaign against Fruit Flies in 1992. Using an area-wide approach and an integrated pest management framework, that included the use of environment-friendly strategies to suppress/eradicate fruit flies, the Mexican Campaign has integrated different technologies such as the application of specific toxic bait, the use of the Sterile Insect Technique (SIT), and the release of the endoparasitoid Diachasmimorpha longicaudata (Ashmead) (Hymenoptera: Braconidae), which attacks preferably third instar larvae of fruit flies. Since 1995, the Moscafrut mass-rearing facility has the capacity to produce an average of 50 millions of parasitised pupae per week, with 65-70% of parasitoid emergence using irradiated A. ludens larvae as host. The mass-rearing procedures of D. longicaudata have been fully described by Cancino. Parasitised pupae are sent via commercial flights to several states of the country (i.e. Michoacan, Sinaloa, Nayarit, Tamaulipas), according to a yearly national plan. This plan derives from industry requirements and/or availability of biological material. In the target zones, parasitoids are released in specific periods and specific areas where the environmental, biological and social conditions are considered as adequate. Packing and release procedures of parasitoids follow those that Montoya et al used. The releases are focused on Anastrepha spp. host trees located in marginal areas (i.e backyard orchards), with the objective to prevent the migration of fruit fly populations into commercial orchards. The impact of parasitoids on fruit fly populations is evaluated through

  12. Current Understanding and Future Prospects of Host Selection, Acceptance, Discrimination, and Regulation of Phorid Fly Parasitoids That Attack Ants

    Directory of Open Access Journals (Sweden)

    Kaitlyn A. Mathis

    2012-01-01

    Full Text Available Phorid fly parasitoids (Diptera: Phoridae have evolved a diverse array of cues used to successfully parasitize their ant hosts. Successful parasitism often involves (a host habitat location, (b host location, (c host acceptance, (d host discrimination, and (e host regulation. In this paper we discuss our current understanding of how phorid flies use each of these steps to successfully parasitize ant hosts. We examine the wide variety of strategies and cues used by a multiple species of phorid flies within three separate genera that most commonly parasitize ants (Apocephalus, Pseudacteon, and Neodohrniphora and discuss future directions within this field of study.

  13. Establishment of the west indian fruit fly (Diptera: Tephritidae) parasitoid Doryctobracon areolatus (Hymenoptera: Braconidae)in the Dominican Republic

    Science.gov (United States)

    The West Indian fruit fly, Anastrepha obliqua (Macquart), infests numerous fruit species, particularly Anacardiaceae and most importantly mango (Mangifera indica L.). Widespread in the Neotropics, it was first reported in Hispaniola nearly 70 years ago. Continental populations are attacked by the op...

  14. Properties of cement-fly ash grout admixed with bentonite, silica fume, or organic fiber

    International Nuclear Information System (INIS)

    Huang, W.H.

    1997-01-01

    A detailed laboratory study was conducted to investigate the properties of cement-fly ash grout mixtures as barriers for isolation of hazardous and low-level radioactive wastes. In the grout studied, fly ash was used to replace 30 percent by mass of cement. Three additives including bentonite, silica fume, and polypropylene fiber were used individually in the grout mixes to improve the properties of the grouts in different aspects. The flowability, bleeding, and setting time of freshly mixed grouts were determined; and the unconfined compressive strength, pore size distribution, and water permeability were determined for hardened grouts at various curing durations up to 120 days. Finally, the durability of cement-fly ash grouts was carefully examined in terms of the changes in their physical properties after different levels of exposure to sulfate attack and wet-dry cycles

  15. Effects of the botanical compound p-anisaldehyde on horn fly, Haematobia irritans irritans (L.) (Diptera: Muscidae) repellency, mortality, and reproduction

    Science.gov (United States)

    The horn fly, Haematobia irritans irritans (L.), is an economically important obligate blood-feeding ectoparasite that mainly attacks cattle worldwide. As resistance to conventional insecticides increases, alternative control tactics are being investigated. p-Anisaldehyde occurs in many plants and i...

  16. Corrosion Measurements in Reinforced Fly Ash Concrete Containing Steel Fibres Using Strain Gauge Technique

    Directory of Open Access Journals (Sweden)

    V. M. Sounthararajan

    2013-01-01

    Full Text Available Corrosion of steel bars in concrete is a serious problem leading to phenomenal volume expansion and thereby leading to cover concrete spalling. It is well known that the reinforced concrete structures subjected to chloride attack during its service life cause these detrimental effects. The early detection of this damage potential can extend the service life of concrete. This study reports the comprehensive experimental studies conducted on the identification of corrosion mechanism in different types of reinforced concrete containing class-F fly ash and hooked steel fibres. Fly ash replaced concrete mixes were prepared with 25% and 50% fly ash containing steel fibres at 0.5%, 1.0%, and 1.5% by volume fraction. Corrosion process was investigated in an embedded steel bar (8 mm diameter reinforced in concrete by passing an impressed current in sodium chloride solution. Strain gauge attached to the rebars was monitored for electrical measurements using strain conditioner. Strain gauge readings observed during the corrosion process exhibited the volume changes of the reinforcement embedded inside the concrete. The corrosion potential of different steel fibre reinforced concrete mixes with fly ash addition showed higher resistance towards the corrosion initiation.

  17. Robust, nonlinear, high angle-of-attack control design for a supermaneuverable vehicle

    Science.gov (United States)

    Adams, Richard J.

    1993-01-01

    High angle-of-attack flight control laws are developed for a supermaneuverable fighter aircraft. The methods of dynamic inversion and structured singular value synthesis are combined into an approach which addresses both the nonlinearity and robustness problems of flight at extreme operating conditions. The primary purpose of the dynamic inversion control elements is to linearize the vehicle response across the flight envelope. Structured singular value synthesis is used to design a dynamic controller which provides robust tracking to pilot commands. The resulting control system achieves desired flying qualities and guarantees a large margin of robustness to uncertainties for high angle-of-attack flight conditions. The results of linear simulation and structured singular value stability analysis are presented to demonstrate satisfaction of the design criteria. High fidelity nonlinear simulation results show that the combined dynamics inversion/structured singular value synthesis control law achieves a high level of performance in a realistic environment.

  18. Degradation of fly ash concrete under the coupled effect of carbonation and chloride aerosol ingress

    International Nuclear Information System (INIS)

    Liu, Jun; Qiu, Qiwen; Chen, Xiaochi; Wang, Xiaodong; Xing, Feng; Han, Ningxu; He, Yijian

    2016-01-01

    Highlights: • Carbonation affects the chloride profile in concrete under chloride aerosol attack. • The chloride binding capacity can be reduced by the presence of carbonation. • Carbonation increases the rate of chloride diffusion for chloride aerosol ingress. • Chloride aerosol ingress reduces the carbonation depth and increases the pH value. • The use of fly ash in concrete enhances the resistance of chloride aerosol ingress. - Abstract: This paper presents an experimental investigation regarding the coupled effect of carbonation and chloride aerosol ingress on the durability performance of fly ash concrete. Test results demonstrate that carbonation significantly affects the chloride ingress profile, reduces the chloride binding capacity, and accelerates the rate of chloride ion diffusion. On the other hand, the carbonation rate of fly ash concrete is reduced by the presence of chlorides aerosol. The interaction nature between concrete carbonation and chloride aerosol ingress is also demonstrated by the microscopic analysis results obtained from scanning electron microscope and mercury intrusion porosimetry.

  19. Determinants of abundance and effects of blood-sucking flying insects in the nest of a hole-nesting bird.

    Science.gov (United States)

    Tomás, Gustavo; Merino, Santiago; Martínez-de la Puente, Josué; Moreno, Juan; Morales, Judith; Lobato, Elisa

    2008-05-01

    Compared to non-flying nest-dwelling ectoparasites, the biology of most species of flying ectoparasites and its potential impact on avian hosts is poorly known and rarely, if ever, reported. In this study we explore for the first time the factors that may affect biting midge (Diptera: Ceratopogonidae) and black fly (Diptera: Simuliidae) abundances in the nest cavity of a bird, the hole-nesting blue tit Cyanistes caeruleus, and report their effects on adults and nestlings during reproduction. The abundance of biting midges was positively associated with nest mass, parental provisioning effort and abundance of blowflies and black flies, while negatively associated with nestling condition. Furthermore, a medication treatment to reduce blood parasitaemias in adult birds revealed that biting midges were more abundant in nests of females whose blood parasitaemias were experimentally reduced. This finding would be in accordance with these insect vectors attacking preferentially uninfected or less infected hosts to increase their own survival. The abundance of black flies in the population was lower than that of biting midges and increased in nests with later hatching dates. No significant effect of black fly abundance on adult or nestling condition was detected. Blood-sucking flying insects may impose specific, particular selection pressures on their hosts and more research is needed to better understand these host-parasite associations.

  20. Sulfate resistance of fly ash-based geopolymer mortar

    Science.gov (United States)

    Saloma, Iqbal, Maulid Muhammad; Aqil, Ibnu

    2017-09-01

    This paper presents sulfuric acid attack of fly ash-based geopolymer mortar. Precursor used in this study was fly ash, and activator used was NaOH and Na2SiO3. The ratio of activator/precursor, ratio of Na2SiO3/NaOH, and ratio of fine aggregate/precursor is 0.42, 2.00, and 2.00, respectively. The molar concentration of NaOH which was used were 8, 10, 12, 14, and 16 M. This study used cube specimen with 5 cm x 5 cm x 5 cm. The results showed that the higher the molar concentration of NaOH, the lower the weight loss. Maximum percentage of weight loss is 3.54% occured for the specimen with molar concentration of NaOH 8 M. The compressive strength for all specimens decreased due to the longer duration of immersion in sulfuric acid solution. However, this percentage of decreasing for compressive strength will be as lower as increasing the molar concentration of NaOH used. The maximum percentage of decreasing is 35.49% for specimen with NaOH 8 M with 90 days of immersion.

  1. Ocorrência precoce da mosca das frutas em ameixas Incidence of the southamerican fruit fly on plums

    Directory of Open Access Journals (Sweden)

    Luiz Antonio Salles

    1999-06-01

    Full Text Available O objetivo deste estudo foi verificar qual o estágio fenológico mais precoce da fruta de ameixeira em que ocorreria o ataque de mosca das frutas Anastrepha fraterculus. Os estudos foram conduzidos em plantas adultas de ameixeira, expondo-se fêmeas grávidas da mosca das frutas, confinadas em gaiolas com frutos protegidos do ataque natural. Cinco cultivares de ameixeira foram estudados (Amarelinha, Pluma 7, Reubennel, Santa Rosa e Wade. Essa praga ataca frutos de qualquer um dos cultivares logo nos primeiros estádios do desenvolvimento, quando os mesmos têm somente cerca de 2 a 3cm de diâmetro.The incidence of the southamerican fruit fly, Anastrepha fraterculus, on plum cultivars is reported. The objective of this study was to know the earliest fruit phase that fly attack could occur. Fertilized females were confined with fruits in plum trees in an orchard. Five plums cultivars were studied: Amarelinha; Pluma 7; Reubennel; Santa Rosa and Wade. This pest attack fruits during first stages of their development, mainly they have only from 2 to 3 centimeters of diameter.

  2. Grapefruit as a host for the West Indian fruit fly (Diptera: Tephritidae).

    Science.gov (United States)

    Mangan, Robert L; Thomas, Donald B; Moreno, Aleena Tarshis; Robacker, David

    2011-02-01

    The most common hosts for the West Indian fruit fly, Anastrepha obliqua (Macquart) (Diptera: Tephritidae) are fruit in the family Anacardiaceae (mango [Mangifera L.] and mombin [Spondias L.] species). However, similar to many of the tropical fruit flies of major economic importance, this species attacks several other families of crop fruit, including Annonaceae (cherimoya, Annona cherimola Mill.), Myrtaceae (guava, Psidium L.), Oxalidaceae (carambola, Averrhoa carambola L.), Passifloraceae (granadilla, Passiflora quadrangularis Mill.), and Sapotaceae [mamey sapote, Pouteria sapota (Jacq.) H. E. Moore & Steam]. In the family Rutaceae the economically important genus Citrus has been reported and until recently considered a host for this fruit fly. In this study, we reviewed the taxonomy of A. obliqua, tested specific chemicals that may inhibit oviposition, compared egg-to-adult survival of A. obliqua on preferred hosts and on grapefruit (Citrus X paradisi Macfad.), and measured fruit tissue-specific developmental rates of A. obliqua and the known citrus breeding Mexican fruit fly, Anastrepha ludens (Loew) (Diptera: Tephritidae), from egg to pupae. Our literature review shows much confusion concerning the taxonomy of this and related Anastrepha species, including synonymies and confusion with other species. The deterrent effect of the highest concentration of flavonoids for oviposition, although significant, was not absolute. Experiments carried out under laboratory conditions showed 15-40 times greater survival of A. ludens (whose preferred hosts include Rutaceae) on grapefruit compared with A. obliqua for both tree attached and harvested fruit. Experiments of survival of developing stages over time showed that the two species oviposit into different tissues in the fruit, and mortality is much higher for the West Indian fruit fly in the flavedo and albedo of the fruit compared with the Mexican fruit fly.

  3. Hymenopterous parasitoids attacking Acanthiophilus helianthi Rossi (Diptera: Tephritidae pupae in Kohgiluyeh Safflower farms of Iran

    Directory of Open Access Journals (Sweden)

    K. Saeidi

    2016-12-01

    Full Text Available The Safflower capsule fly (SCF, Acanthiophilus helianthi Rossi (Diptera: Tephritidae is the most destructive insect pest attacking the Safflower Carthamus tinctorius L. plant which are cultivated as an oil crop. It is mainly controlled through application of broad-spectrum insecticides, which can adversely affect safflower farms ecosystem and consequently human health. Since a first step in setting up an integrated pest management program is to assess the biological control agents within the ecosystem. Therefore, in this research work the pupal parasitoids of Safflower capsule fly a main insect pest attacking Safflower plants were identified. The impact of these parasitoids against this pest was evaluated on the varying pest generations and within different locations in Kohgiluyeh province during 2008-2009 seasons. Pupal parasitoid adults of SCF were recorded from fieldreared pupae, which had been collected from heavily infested small flower heads of the first generation as well from large flower heads of the second and third generations. Rate of parasitism on A. helianthi pupae was estimated as the number of parasitoids over the total count of parasitoids and flies. Ten hymenopterous species belonging to different families parasitizing insect pupae were screened as follows: Bracon hebetor (Spinola, 1808 and Bracon luteator (Spinola, 1808 (Braconidae; Isocolus tinctorious (Melika and Gharaei, 2006 (Cynipidae; Pronotalia carlinarum (Szelenyi and Erdos, 1951 (Eulophidae; Eurytoma acroptilae (Zerova, 1986 (Eurytomidae; Ormyrus orientalis (Walker, 1871 (Ormyridae; Colotrechnus viridis (Masi, 1921 and Pteromalus sp. (Walker, 1976 (Pteromalidae; and Antistrophoplex conthurnatus (Zerova, 2000 and Microdontomenus annulatus (Masi, 1899 (Torymidae. The average parasitization rate was 23±1 as revealed through the present study. The highest parasitization rate occurred during the first generation in all localities tested, as well as in years. Statistical

  4. La vie dans l'Univers

    CERN Multimedia

    CERN Press Office. Geneva

    2001-01-01

    The Universe is indescribably huge. Can it be possible that humanity is the only form of intelligent life that exists in all this immensity? Are we really alone ? Throughout history there have been reported sightings of creatures from elsewhere. Science fiction novels and films with flying saucers and bizarre looking aliens are part of our general culture. Perhaps the Earth is really only an experiment designed by mice and soon we will all be destroyed to make way for a new interstellar highway!

  5. Campaign launched to eliminate tsetse fly, which has turned much of Africa into a green desert

    International Nuclear Information System (INIS)

    2002-01-01

    A new campaign to control the deadly tsetse fly in Africa, parasitic carrier of sleeping sickness, has been launched by the Organization of African Unity (OAU). African sleeping sickness affects as many as 500,000 people, 80 percent of whom eventually die, and the bite of the fly causes more than $4 billion in economic losses annually. The tsetse fly has turned much of the fertile African landscape into an uninhabited 'green desert', spreading sleeping sickness -- and killing 3 million livestock animals every year. The fly is the carrier of the single cell parasite, trypanosome, which attacks the blood and nervous system of its victims, causing sleeping sickness in humans and nagana in livestock. The biting tsetse fly transmits it when its seeks a blood meal. Despite various drastic efforts over the past 100 years to eradicate the tsetse fly, most of the time it has recovered. The tsetse, about the size of a house fly, infests 37 sub-Saharan African countries - 32 of them among the 42 most Heavily Indebted Poor Countries (HIPCs) in the world. Much of Africa's best land - particularly in river valleys and moist areas, where the potential for mixed farming is good - lies uncultivated, while tsetse free areas face collapse from overuse by humans. The range of the fly is expanding and in some parts of Africa renewed outbreaks of sleeping sickness are killing more people than any other disease. In 1997 the Tanzanian island of Zanzibar was declared free of the tsetse after conventional methods reduced its numbers and the release of hundreds of thousands of infertile male flies into the wild - sterilized using a nuclear technology - clinched its success. In Burkina Faso in 2001, the Organization of African Unity, inaugurated the Pan African Tsetse and Trypanosomosis Eradication Campaign (PATTEC), based on the successful Zanzibar program

  6. Aerodynamic Characteristics of a Flying-Boat Hull Having a Length-Beam Ratio of 15, TED No. NACA 2206

    Science.gov (United States)

    Riebe, John M.; Naeseth, Rodger L.

    1951-01-01

    An investigation was made in the Langley 300 MPH 7- by 10-foot tunnel to determine the aerodynamic characteristics of a flying-boat hull of a length-beam ratio of 15 in the presence of a wing. The investigation was an extension of previous tests made on hulls of length-beam ratios of 6, 9, and 12; these hulls were designed to have approximately the same hydrodynamic performance with respect to spray and resistance characteristics. Comparison with the previous investigation at lower length-beam ratios indicated a reduction in minimum drag coefficients of 0.0006 (10 peroent)with fixed transition when the length-beam ratio was extended from 12 to 15. As with the hulls of lower length-beam ratio, the drag reduction with a length-beam ratio of 15 occurred throughout the range of angle of attack tested and the angle of attack for minimum drag was in the range from 2deg to 3deg. Increasing the length-beam ratio from 12 to 15 reduced the hull longitudinal instability by an mount corresponding to an aerodynamic-center shift of about 1/2 percent of the mean aerodynamic chord of the hypothetical flying boat. At an angle of attack of 2deg, the value of the variation of yawing-moment coefficient with angle of yaw for a length-beam ratio of 15 was 0.00144, which was 0.00007 larger than the value for a length-beam ratio of 12.

  7. Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers

    NARCIS (Netherlands)

    Pieters, Wolter; Davarynejad, Mohsen

    2015-01-01

    Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of multiple steps and alternative paths. It is possible to derive properties of the overall attacks from properties of individual steps, such as cost for the attacker and probability of success. However, in

  8. FliO Regulation of FliP in the Formation of the Salmonella enterica Flagellum

    Science.gov (United States)

    Barker, Clive S.; Meshcheryakova, Irina V.; Kostyukova, Alla S.; Samatey, Fadel A.

    2010-01-01

    The type III secretion system of the Salmonella flagellum consists of 6 integral membrane proteins: FlhA, FlhB, FliO, FliP, FliQ, and FliR. However, in some other type III secretion systems, a homologue of FliO is apparently absent, suggesting it has a specialized role. Deleting the fliO gene from the chromosome of a motile strain of Salmonella resulted in a drastic decrease of motility. Incubation of the ΔfliO mutant strain in motility agar, gave rise to pseudorevertants containing extragenic bypass mutations in FliP at positions R143H or F190L. Using membrane topology prediction programs, and alkaline phosphatase or GFPuv chimeric protein fusions into the FliO protein, we demonstrated that FliO is bitopic with its N-terminus in the periplasm and C-terminus in the cytoplasm. Truncation analysis of FliO demonstrated that overexpression of FliO43–125 or FliO1–95 was able to rescue motility of the ΔfliO mutant. Further, residue leucine 91 in the cytoplasmic domain was identified to be important for function. Based on secondary structure prediction, the cytoplasmic domain, FliO43–125, should contain beta-structure and alpha-helices. FliO43–125-Ala was purified and studied using circular dichroism spectroscopy; however, this domain was disordered, and its structure was a mixture of beta-sheet and random coil. Coexpression of full-length FliO with FliP increased expression levels of FliP, but coexpression with the cytoplasmic domain of FliO did not enhance FliP expression levels. Overexpression of the cytoplasmic domain of FliO further rescued motility of strains deleted for the fliO gene expressing bypass mutations in FliP. These results suggest FliO maintains FliP stability through transmembrane domain interaction. The results also demonstrate that the cytoplasmic domain of FliO has functionality, and it presumably becomes structured while interacting with its binding partners. PMID:20941389

  9. FliO regulation of FliP in the formation of the Salmonella enterica flagellum.

    Directory of Open Access Journals (Sweden)

    Clive S Barker

    2010-09-01

    Full Text Available The type III secretion system of the Salmonella flagellum consists of 6 integral membrane proteins: FlhA, FlhB, FliO, FliP, FliQ, and FliR. However, in some other type III secretion systems, a homologue of FliO is apparently absent, suggesting it has a specialized role. Deleting the fliO gene from the chromosome of a motile strain of Salmonella resulted in a drastic decrease of motility. Incubation of the ΔfliO mutant strain in motility agar, gave rise to pseudorevertants containing extragenic bypass mutations in FliP at positions R143H or F190L. Using membrane topology prediction programs, and alkaline phosphatase or GFPuv chimeric protein fusions into the FliO protein, we demonstrated that FliO is bitopic with its N-terminus in the periplasm and C-terminus in the cytoplasm. Truncation analysis of FliO demonstrated that overexpression of FliO₄₃-₁₂₅ or FliO₁-₉₅ was able to rescue motility of the ΔfliO mutant. Further, residue leucine 91 in the cytoplasmic domain was identified to be important for function. Based on secondary structure prediction, the cytoplasmic domain, FliO₄₃-₁₂₅, should contain beta-structure and alpha-helices. FliO₄₃-₁₂₅-Ala was purified and studied using circular dichroism spectroscopy; however, this domain was disordered, and its structure was a mixture of beta-sheet and random coil. Coexpression of full-length FliO with FliP increased expression levels of FliP, but coexpression with the cytoplasmic domain of FliO did not enhance FliP expression levels. Overexpression of the cytoplasmic domain of FliO further rescued motility of strains deleted for the fliO gene expressing bypass mutations in FliP. These results suggest FliO maintains FliP stability through transmembrane domain interaction. The results also demonstrate that the cytoplasmic domain of FliO has functionality, and it presumably becomes structured while interacting with its binding partners.

  10. An overview of tropical pest species of bactrocera fruit flies (Diptera:Tephritidae) and the integration of biopesticides with other biological approaches for their management

    Science.gov (United States)

    Fruit flies (Diptera:Tephritidae) are among the most economically important pest species in the world, attacking a wide range of fruits and fleshy vegetables throughout tropical and sub-tropical areas of the world. These species are such devastating crop pests that major control and eradication prog...

  11. Wing and body kinematics of forward flight in drone-flies.

    Science.gov (United States)

    Meng, Xue Guang; Sun, Mao

    2016-08-15

    Here, we present a detailed analysis of the wing and body kinematics in drone-flies in free flight over a range of speeds from hovering to about 8.5 m s(-1). The kinematics was measured by high-speed video techniques. As the speed increased, the body angle decreased and the stroke plane angle increased; the wingbeat frequency changed little; the stroke amplitude first decreased and then increased; the ratio of the downstroke duration to the upstroke duration increased; the mean positional angle increased at lower speeds but changed little at speeds above 3 m s(-1). At a speed above about 1.5 m s(-1), wing rotation at supination was delayed and that at pronation was advanced, and consequently the wing rotations were mostly performed in the upstroke. In the downstroke, the relative velocity of the wing increased and the effective angle of attack decreased with speed; in the upstroke, they both decreased with speed at lower speeds, and at higher speeds, the relative velocity became larger but the effective angle of attack became very small. As speed increased, the increasing inclination of the stroke plane ensured that the effective angle of attack in the upstroke would not become negative, and that the wing was in suitable orientations for vertical-force and thrust production.

  12. LUNA: low-flying UAV-based forest monitoring system

    Science.gov (United States)

    Keizer, Jan Jacob; Pereira, Luísa; Pinto, Glória; Alves, Artur; Barros, Antonio; Boogert, Frans-Joost; Cambra, Sílvia; de Jesus, Cláudia; Frankenbach, Silja; Mesquita, Raquel; Serôdio, João; Martins, José; Almendra, Ricardo

    2015-04-01

    The LUNA project is aiming to develop an information system for precision forestry and, in particular, the monitoring of eucalypt plantations that is first and foremost based on multi-spectral imagery acquired using low-flying uav's. The presentation will focus on the first phase of image acquisition, processing and analysis for a series of pot experiments addressing main threats for early-stage eucalypt plantations in Portugal, i.e. acute , chronic and cyclic hydric stress, nutrient stress, fungal infections and insect plague attacks. The imaging results will be compared with spectroscopic measurements as well as with eco-physiological and plant morphological measurements. Furthermore, the presentation will show initial results of the project's second phase, comprising field tests in existing eucalypt plantations in north-central Portugal.

  13. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  14. Corrosion-induced microstructural developments in 316 stainless steel during exposure to molten Li{sub 2}BeF{sub 4}(FLiBe) salt

    Energy Technology Data Exchange (ETDEWEB)

    Zheng, Guiqiu, E-mail: guiqiuzheng@gmail.com [Nuclear Reactor Laboratory, Massachusetts Institute of Technology, Cambridge, MA (United States); He, Lingfeng [Idaho National Laboratory, Idaho Fall, ID (United States); Carpenter, David [Nuclear Reactor Laboratory, Massachusetts Institute of Technology, Cambridge, MA (United States); Sridharan, Kumar [Department of Engineering Physics, University of Wisconsin-Madison, Madison, WI (United States)

    2016-12-15

    The microstructural developments in the near-surface regions of AISI 316 stainless steel during exposure to molten Li{sub 2}BeF{sub 4} (FLiBe) salt have been investigated with the goal of using this material for the construction of the fluoride salt-cooled high-temperature reactor (FHR), a leading nuclear reactor concept for the next generation nuclear plants (NGNP). Tests were conducted in molten FLiBe salt (melting point: 459 °C) at 700 °C in graphite crucibles and 316 stainless steel crucibles for exposure duration of up to 3000 h. Corrosion-induced microstructural changes in the near-surface regions of the samples were characterized using scanning electron microscopy (SEM) in conjunction with energy dispersive x-ray spectroscopy (EDS) and electron backscatter diffraction (EBSD), and scanning transmission electron microscopy (STEM) with EDS capabilities. Intergranular corrosion attack in the near-surface regions was observed with associated Cr depletion along the grain boundaries. High-angle grain boundaries (15–180°) were particularly prone to intergranular attack and Cr depletion. The depth of attack extended to the depths of 22 μm after 3000-h exposure for the samples tested in graphite crucible, while similar exposure in 316 stainless steel crucible led to the attack depths of only about 11 μm. Testing in graphite crucibles led to the formation of nanometer-scale Mo{sub 2}C, Cr{sub 7}C{sub 3} and Al{sub 4}C{sub 3} particle phases in the near-surface regions of the material. The copious depletion of Cr in the near-surface regions induced a γ-martensite to α-ferrite phase (FeNi{sub x}) transformation. Based on the microstructural analysis, a thermal diffusion controlled corrosion model was developed and experimentally validated for predicting long-term corrosion attack depth.

  15. Advanced fighter technology integration (AFTI)/F-16 Automated Maneuvering Attack System final flight test results

    Science.gov (United States)

    Dowden, Donald J.; Bessette, Denis E.

    1987-01-01

    The AFTI F-16 Automated Maneuvering Attack System has undergone developmental and demonstration flight testing over a total of 347.3 flying hours in 237 sorties. The emphasis of this phase of the flight test program was on the development of automated guidance and control systems for air-to-air and air-to-ground weapons delivery, using a digital flight control system, dual avionics multiplex buses, an advanced FLIR sensor with laser ranger, integrated flight/fire-control software, advanced cockpit display and controls, and modified core Multinational Stage Improvement Program avionics.

  16. Cementing Efficiency of Low Calcium Fly Ash in Fly Ash Concretes

    OpenAIRE

    T. D. Gunneswara Rao; Mudimby Andal

    2014-01-01

    Research on the utilization of fly ash will no longer refer the fly ash as a waste material of thermal power plants. Use of fly ash in concrete making, makes the concrete economical as well as durable. The fly ash is being added to the concrete in three ways namely, as partial replacement to cement, as partial replacement to fine aggregates and as admixture. Addition of fly ash to the concrete in any one of the form mentioned above, makes the concrete more workable and durable than the conven...

  17. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    Science.gov (United States)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  18. Susceptibility of 15 mango (Sapindales: Anacardiaceae) cultivars to the attack by Anastrepha ludens and Anastrepha obliqua (Diptera:Tephritidae) and the role of underdeveloped fruit as pest reservoirs: management implications

    Science.gov (United States)

    We evaluated the susceptibility of 15 mango cultivars to the attack of Anastrepha ludens and A. obliqua, the main Tephritid pests of this crop in Mexico. In a field experiment, bagged, fruit-bearing branches were exposed to gravid females of both fly species. Infestation rates, developmental time,...

  19. Area-wide pest management of fruit flies in Hawaiian fruits and vegetables

    International Nuclear Information System (INIS)

    Vargas, Roger I.; Jang, Eric B.; Klungness, L. Michael

    2003-01-01

    Four economically important fruit flies have been accidentally introduced into Hawaii: melon fly, Mediterranean fruit fly, oriental fruit fly, and the so-called Malaysian (solanaceous) fruit fly. Over 400 different host fruits are attacked. These fruit flies inhibit development of a diversified tropical fruit and vegetable industry, require that commercial fruits undergo quarantine treatment prior to export, and in Hawaii provide a breeding reservoir for their introduction into the continental United States. These exotic pests a serious threat of establishment into new areas with movement of people and commodities throughout the U.S. and the world. For example, if the Mediterranean fruit fly became established in California, projected losses would exceed $1 billion per year due to trade embargoes, loss of jobs, increased pesticide use, and direct crop loss. Present fruit fly control measures in Hawaii relay heavily on the application of organophosphate and carbamate insecticides to crops. Overuse of these insecticides has been implicated with secondary pest outbreaks, negative effects on beneficial insects, environmental contamination and adverse effects on human health. In 1999 a 5 year Area-wide Pest Management (AWPM) program was funded (for FY2000) for management of fruit flies in Hawaii. The goal of the Fruit Fly AWPM program is to develop and integrate biologically based pest management approaches that will result in area-wide suppression and control of fruit flies throughout selected agricultural areas of Hawaii. The IPM program will integrate two or more technologies into a comprehensive package that is economically viable, environmentally acceptable and sustainable. The program will result in a reduction in the use of organophosphate insecticides, and further growth and development of diversified agriculture in Hawaii. The technologies include: 1) field sanitation, 2) protein bait sprays and/or traps, 3) male annihilation with male lures and attractants, 4

  20. Monitoring guidelines improve control of walnut husk fly in California

    International Nuclear Information System (INIS)

    Opp, Susan B.; Reynolds, Katherine M.; Pickel, Carolyn; Olson, William

    2000-01-01

    The walnut husk fly (WHF), Rhagoletis completa Cresson, is a key pest of walnuts (Juglans spp.) in California, where over 95% of the US and approximately two-thirds of the world's commercial walnuts are produced. The primary hosts of this monophagous fruit fly are J. regia L. (commercially grown English walnut), J. californica S. Wats. var. hindsii (northern California black walnut), J. californica var. californica (southern California black walnut) and J. nigra Thunb. (eastern black walnut). Some cultivars of the English walnut are more susceptible than others; the most heavily infested varieties of English walnut include Eureka, Franquette, Hartley, Mayette and Payne. Neither English walnuts nor the walnut husk fly are native to California. So-called 'English' walnuts are sometimes more appropriately called 'Persian' walnuts, in reference to Persia, the origin of J. regia. English walnuts were first planted in southern California in the 1860s. In contrast, the native range of WHF is the mid- and south-central United States where it attacks J. nigra (Boyce 1934). The fly was likely to have been introduced into southern California in the mid-1920s by tourists travelling from Kansas, New Mexico, Texas or Oklahoma. WHF was first documented in California in 1926 in the San Bernardino County when maggots were found in the husks of English walnuts (Boyce 1929). The fly gradually spread throughout walnut growing regions of California. In 1928, only three or four orchards in the San Bernardino County were known to be infested. By 1932, the fly was also found in the Los Angeles and Orange Counties (Boyce 1933), and by 1954, it was found in Ventura, Riverside, and the San Diego Counties, in addition to the northern California county of Sonoma (Anonymous 1966). The spread of the fly in northern California was rapid. By 1958, WHF was found in San Joaquin County; in 1963, the fly was in Amador, Lake, Solano, Tulare and Yolo Counties; in 1964, it was found in Fresno, Mendocino

  1. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  2. Crony Attack: Strategic Attack’s Silver Bullet

    Science.gov (United States)

    2006-11-01

    physical assets or financial assets. The form of crony attack that most closely resembles classic strategic attack is to deny, degrade, or destroy a money...February 1951. Reprinted in Airpower Studies Coursebook , Air Command and Staff College, Maxwell AFB, AL, 2002, 152–58. Hirsch, Michael. “NATO’s Game of

  3. Can E. coli fly?

    DEFF Research Database (Denmark)

    Lindeberg, Yrja Lisa; Egedal, Karen; Hossain, Zenat Zebin

    2018-01-01

    , and the numbers of flies landing on the exposed rice were counted. Following exposure, the surface of the rice was microbiologically and molecularly analysed for the presence of E. coli and genes of diarrheagenic E. coli and Shigella strains. RESULTS: Rice was at greater risk (p ... with E. coli if flies landed on the rice than if no flies landed on the rice (odds ratio 5·4 (p ...-landings, the average CFU per fly-landing was > 0·6 x 103 CFU. Genes of diarrheagenic E. coli and Shigella species were detected in 39 of 60 (65%) of exposed rice samples. Two fly species were identified; the common housefly (Musca domestica) and the oriental latrine fly (Chrysomya megacephala). CONCLUSION: Flies may...

  4. Fly ash carbon passivation

    Science.gov (United States)

    La Count, Robert B; Baltrus, John P; Kern, Douglas G

    2013-05-14

    A thermal method to passivate the carbon and/or other components in fly ash significantly decreases adsorption. The passivated carbon remains in the fly ash. Heating the fly ash to about 500 and 800 degrees C. under inert gas conditions sharply decreases the amount of surfactant adsorbed by the fly ash recovered after thermal treatment despite the fact that the carbon content remains in the fly ash. Using oxygen and inert gas mixtures, the present invention shows that a thermal treatment to about 500 degrees C. also sharply decreases the surfactant adsorption of the recovered fly ash even though most of the carbon remains intact. Also, thermal treatment to about 800 degrees C. under these same oxidative conditions shows a sharp decrease in surfactant adsorption of the recovered fly ash due to the fact that the carbon has been removed. This experiment simulates the various "carbon burnout" methods and is not a claim in this method. The present invention provides a thermal method of deactivating high carbon fly ash toward adsorption of AEAs while retaining the fly ash carbon. The fly ash can be used, for example, as a partial Portland cement replacement in air-entrained concrete, in conductive and other concretes, and for other applications.

  5. FliO Regulation of FliP in the Formation of the Salmonella enterica Flagellum

    OpenAIRE

    Barker, Clive S.; Meshcheryakova, Irina V.; Kostyukova, Alla S.; Samatey, Fadel A.

    2010-01-01

    The type III secretion system of the Salmonella flagellum consists of 6 integral membrane proteins: FlhA, FlhB, FliO, FliP, FliQ, and FliR. However, in some other type III secretion systems, a homologue of FliO is apparently absent, suggesting it has a specialized role. Deleting the fliO gene from the chromosome of a motile strain of Salmonella resulted in a drastic decrease of motility. Incubation of the ΔfliO mutant strain in motility agar, gave rise to pseudorevertants containing extrageni...

  6. Mercury release from fly ashes and hydrated fly ash cement pastes

    Science.gov (United States)

    Du, Wen; Zhang, Chao-yang; Kong, Xiang-ming; Zhuo, Yu-qun; Zhu, Zhen-wu

    2018-04-01

    The large-scale usage of fly ash in cement and concrete introduces mercury (Hg) into concrete structures and a risk of secondary emission of Hg from the structures during long-term service was evaluated. Three fly ashes were collected from coal-fired power plants and three blend cements were prepared by mixing Ordinary Portland cement (OPC) with the same amount of fly ash. The releasing behaviors of Hg0 from the fly ash and the powdered hydrated cement pastes (HCP) were measured by a self-developed Hg measurement system, where an air-blowing part and Hg collection part were involved. The Hg release of fly ashes at room temperature varied from 25.84 to 39.69 ng/g fly ash during 90-days period of air-blowing experiment. In contrast, the Hg release of the HCPs were in a range of 8.51-18.48 ng/g HCP. It is found that the Hg release ratios of HCPs were almost the same as those of the pure fly ashes, suggesting that the hydration products of the HCP have little immobilization effect on Hg0. Increasing temperature and moisture content markedly promote the Hg release.

  7. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  8. Fly ash aggregates. Vliegaskunstgrind

    Energy Technology Data Exchange (ETDEWEB)

    1983-03-01

    A study has been carried out into artificial aggregates made from fly ash, 'fly ash aggregates'. Attention has been drawn to the production of fly ash aggregates in the Netherlands as a way to obviate the need of disposal of fly ash. Typical process steps for the manufacturing of fly ash aggregates are the agglomeration and the bonding of fly ash particles. Agglomeration techniques are subdivided into agitation and compaction, bonding methods into sintering, hydrothermal and 'cold' bonding. In sintering no bonding agent is used. The fly ash particles are more or less welded together. Sintering in general is performed at a temperature higher than 900 deg C. In hydrothermal processes lime reacts with fly ash to a crystalline hydrate at temperatures between 100 and 250 deg C at saturated steam pressure. As a lime source not only lime as such, but also portland cement can be used. Cold bonding processes rely on reaction of fly ash with lime or cement at temperatures between 0 and 100 deg C. The pozzolanic properties of fly ash are used. Where cement is applied, this bonding agent itself contributes also to the strength development of the artificial aggregate. Besides the use of lime and cement, several processes are known which make use of lime containing wastes such as spray dry absorption desulfurization residues or fluid bed coal combustion residues. (In Dutch)

  9. Hydration of fly ash cement and microstructure of fly ash cement pastes

    Energy Technology Data Exchange (ETDEWEB)

    Shiyuan, H.

    1981-01-01

    The strength development and hydration of fly ash cement and the influence of addition of gypsum on those were studied at normal and elevated temperatures. It was found that an addition of a proper amount of gypsum to fly ash cement could accelerate the pozzolanic reaction between CH and fly ash, and as a result, increase the strength of fly ash cement pastes after 28 days.

  10. Exogenous Salicylic Acid Enhances the Resistance of Wheat Seedlings to Hessian Fly (Diptera: Cecidomyiidae) Infestation Under Heat Stress.

    Science.gov (United States)

    Underwood, Joshua; Moch, John; Chen, Ming-Shun; Zhu, Lieceng

    2014-10-01

    Heat stress exerts significant impact on plant-parasite interactions. Phytohormones, such as salicylic acid (SA), play important roles in plant defense against parasite attacks. Here, we studied the impact of a combination of heat stress and exogenous SA on the resistance of wheat (Triticum aestivum L.) plants to the Hessian fly [Mayetiola destructor (Say)]. We found that the wheat cultivar 'Molly', which contains the resistance gene H13, lost resistance to Hessian fly under heat stress (40°C for 3 and 6 h), and that exogenous application of SA on Molly seedlings right before heat stress can partially prevent the loss of resistance of Molly plants under heat conditions. Our findings have significant implications for understanding the dynamics of plant-insect interactions in the context of heat stress. © 2014 Entomological Society of America.

  11. Heart Attack Recovery FAQs

    Science.gov (United States)

    ... recommendations to make a full recovery. View an animation of a heart attack . Heart Attack Recovery Questions ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  12. Host range and reproductive output of Diachasmimorpha kraussii (Hymenoptera: Braconidae), a parasitoid of tephritid fruit flies newly imported to Hawaii

    International Nuclear Information System (INIS)

    Messing, R.H.; Ramadan, M.M.

    2000-01-01

    Four exotic tephritid fruit fly pests have colonised the Hawaiian islands over the past 100 years, where they have become major pests infesting hundreds of horticultural crops. The Mediterranean fruit fly, Ceratitis capitata (Wiedemann), Oriental fruit fly, Bactrocera dorsalis (Hendel), melon fly, B. cucurbitae (Coquillett), and Solanaceous fruit fly, B. latifrons (Hendel) are considered among the major obstacles to the development of a more robust agricultural economy in the state of Hawaii. Furthermore, the flies pose a continuous threat to agriculture in California and other areas in the southern United States, where it has been estimated that the establishment of the Medfly alone would result in losses of over one billion dollars annually (Andrew et al. 1978). Entomologists in Hawaii have conducted a number of classical biological control programmes against these tephritid pests over the years, resulting in the establishment of several parasitoid species and partial control of the flies in some crops (see reviews in Clausen et al. 1965, Wharton 1989). However, these programmes were conducted before the invasion of the state by the Solanaceous fruit fly; thus, there have been no biocontrol programmes targeted against this pest. Also, several entomologists have pointed out the potential of improved control over the other tephritid species in Hawaii by introducing new natural enemies (Gilstrap and Hart 1987, Messing 1995, Steck et al. 1986, Wharton 1989, Wong and Ramadan 1992). We have therefore renewed efforts to import parasitoids from tropical and sub-tropical areas around the world to attack tephritid fruit flies in Hawaii. As part of this effort, we imported Diachasmimorpha kraussii Fullaway from Queensland, Australia, where it is an endemic parasitoid of Bactrocera tryoni (Froggatt) and several other endemic Australian tephritids. This paper reports the results of initial host range tests and studies on the reproductive output of D. kraussii in quarantine

  13. Ommatidia of blow fly, house fly, and flesh fly: implication of their vision efficiency.

    Science.gov (United States)

    Sukontason, Kabkaew L; Chaiwong, Tarinee; Piangjai, Somsak; Upakut, Sorawit; Moophayak, Kittikhun; Sukontason, Kom

    2008-06-01

    This work aims to elucidate the number of ommatidia or facets (the outwardly visible units of each ommatidium) for compound eyes in blow flies [Chrysomya megacephala (F.), Chrysomya rufifacies (Macquart), Chrysomya nigripes (Aubertin), Lucilia cuprina (Wiedemann)], house flies (Musca domestica L.), and flesh flies (Liosarcophaga dux Thomson) by manual counts of the corneal spreads. The head of the fly in each species was soaked in 20% potassium hydroxide solution at room temperature for 7 days, and the clear compound eye was dissected into six small parts, each of which was placed onto a slide and flattened using a coverslip. Images of each part were obtained using a microscope connected to a computer. The printed images of each part were magnified, and the total number of ommatidia per eye was manually counted. For males, the mean number of ommatidia was statistically different among all flies examined: L. dux (6,032) > C. rufifacies (5,356) > C. nigripes (4,798) > C. megacephala (4,376) > L. cuprina (3,665) > M. domestica (3,484). Likewise, the mean number of facets in females was statistically different: L. dux (6,086) > C. megacephala (5,641) > C. rufifacies (5,208) > C. nigripes (4,774) > L. cuprina (3,608) > M. domestica (3433). Scanning electron microscopy analysis of adult flies revealed the sexual dimorphism in the compound eye. Male C. megacephala had large ommatidia in the upper two thirds part and small ommatidia in the lower one third part, whereas only small ommatidia were detected in females. Dense postulate appearance was detected in the external surface of the corneal lens of the ommatidia of C. megacephala, C. rufifacies, and C. nigripes, while a mix of dense postulate appearance and variable groove array length was detected in L. cuprina and M. domestica. The probable functions of ommatidia are discussed with reference to other literature.

  14. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  15. The Fly Printer - Extended

    DEFF Research Database (Denmark)

    Beloff, Laura; Klaus, Malena

    2016-01-01

    Artist talk / Work-in-progress What is the purpose of a machine or an artifact, like the Fly Printer, that is dislocated, that produces images that have no meaning, no instrumentality, that depict nothing in the world? The biological and the cultural are reunited in this apparatus as a possibility...... to break through a common way of depicting the world, trying to find different surfaces and using strange apparatus to insist in the interstice of visibility. The Fly Printer is a printing apparatus in a form of a closed environment that contains a flock of fruit flies. The flies eat special food...... that is prepared for them that is mixed with laser jet printer inks. The flies digest the food and gradually print different color dots onto the paper that is placed under the fly habitat. In the Fly Printer biological organisms are used for replacing a standard part of our common printer technology. The work...

  16. Blocking of Brute Force Attack

    OpenAIRE

    M.Venkata Krishna Reddy

    2012-01-01

    A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your Web site requires user authentication, you are a good target for a brute-force attack. An attacker can always discover a password through a brute-force attack, but the downside is that it co...

  17. Solidarity under Attack

    DEFF Research Database (Denmark)

    Meret, Susi; Goffredo, Sergio

    2017-01-01

    https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack......https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack...

  18. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants....

  19. A preliminary account of the fruit fly fauna of Timor-Leste (Diptera: Tephritidae: Dacinae).

    Science.gov (United States)

    Bellis, Glenn A; Brito, Americo A; Jesus, Hipolito DE; Quintao, Valente; Sarmento, Joaquim C; Bere, Apolinario; Rodrigues, João; Hancock, David L

    2017-12-05

    Opportunistic monitoring using baited fruit fly traps throughout Timor-Leste revealed the presence of 16 species of Bactrocera and one species of Dacus, all of which are previously reported from the region. Sampling of a range of commercial fruit species detected an additional species, B. latifrons, and revealed that nine species are attacking commercial fruits and vegetables. A key for separating these species is provided. New host records were found for B. minuscula, B. floresiae and B. bellisi. Variation in the morphology of B. minuscula, B. floresiae and an undescribed species and within B. albistrigata confounded attempts at accurate identification of some specimens.

  20. The onion fly

    International Nuclear Information System (INIS)

    Loosjes, M.

    1990-01-01

    This paper describes the origin, practical application, problems in application and prospects of control of the onion fly, Delia antiqua (Diptera: Anthomyiidae), in the Netherlands by the Sterile Insect Technique (SIT). The larva of the onion fly is a severe pest in onions in temperate regions. Development of resistance of the onion fly against insecticides caused research on the SIT to be started by the Dutch Government in 1965. This research was on mass-rearing, long-term storage of pupae, sterilization, and release and ratio assessment techniques. By 1979 sufficient information had been turned over to any interested private company. In the case of the onion fly the SIT can be applied like a control treatment instead of chemical control to individual onion fields. This is due to the limited dispersal activity of the flies and the scattered distribution of onion fields in the Netherlands, with 5-10% of the onion growing areas planted with onions

  1. Soluble components of the flagellar export apparatus, FliI, FliJ, and FliH, do not deliver flagellin, the major filament protein, from the cytosol to the export gate.

    Science.gov (United States)

    Sajó, Ráchel; Liliom, Károly; Muskotál, Adél; Klein, Agnes; Závodszky, Péter; Vonderviszt, Ferenc; Dobó, József

    2014-11-01

    Flagella, the locomotion organelles of bacteria, extend from the cytoplasm to the cell exterior. External flagellar proteins are synthesized in the cytoplasm and exported by the flagellar type III secretion system. Soluble components of the flagellar export apparatus, FliI, FliH, and FliJ, have been implicated to carry late export substrates in complex with their cognate chaperones from the cytoplasm to the export gate. The importance of the soluble components in the delivery of the three minor late substrates FlgK, FlgL (hook-filament junction) and FliD (filament-cap) has been convincingly demonstrated, but their role in the transport of the major filament component flagellin (FliC) is still unclear. We have used continuous ATPase activity measurements and quartz crystal microbalance (QCM) studies to characterize interactions between the soluble export components and flagellin or the FliC:FliS substrate-chaperone complex. As controls, interactions between soluble export component pairs were characterized providing Kd values. FliC or FliC:FliS did not influence the ATPase activity of FliI alone or in complex with FliH and/or FliJ suggesting lack of interaction in solution. Immobilized FliI, FliH, or FliJ did not interact with FliC or FliC:FliS detected by QCM. The lack of interaction in the fluid phase between FliC or FliC:FliS and the soluble export components, in particular with the ATPase FliI, suggests that cells use different mechanisms for the export of late minor substrates, and the major substrate, FliC. It seems that the abundantly produced flagellin does not require the assistance of the soluble export components to efficiently reach the export gate. Copyright © 2014 Elsevier B.V. All rights reserved.

  2. 9/11, Act II : A Fine-Grained Analysis of Regional Variations in Traffic Fatalities in the Aftermath of the Terrorist Attacks

    OpenAIRE

    Gaissmaier, Wolfgang; Gigerenzer, Gerd

    2012-01-01

    Terrorists can strike twice - first, by directly killing people, and second, through dangerous behaviors induced by fear in people's minds. Previous research identified a substantial increase in U.S. traffic fatalities subsequent to the September 11 terrorist attacks, which were accounted for as due to a substitution of driving for flying, induced by fear of dread risks. Here, we show that this increase in fatalities varied widely by region, a fact that was best explained by regional variatio...

  3. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  4. Temperature Effects on Olive Fruit Fly Infestation in the FlySim Cellular Automata Model

    Science.gov (United States)

    Bruno, Vincenzo; Baldacchini, Valerio; di Gregorio, Salvatore

    FlySim is a Cellular Automata model developed for simulating infestation of olive fruit flies (Bactrocera Oleae) on olive (Olea europaea) groves. The flies move into the groves looking for mature olives where eggs are spawn. This serious agricultural problem is mainly tackled by using chemical agents at the first signs of the infestation, but organic productions with no or few chemicals are strongly requested by the market. Oil made with infested olives is poor in quality, nor olives are suitable for selling in stores. The FlySim model simulates the diffusion of flies looking for mature olives and the growing of flies due to atmospheric conditions. Foreseeing an infestation is the best way to prevent it and to reduce the need of chemicals in agriculture. In this work we investigated the effects of temperature on olive fruit flies and resulting infestation during late spring and summer.

  5. Whispering through DDoS attack

    OpenAIRE

    Miralem Mehic; Jiri Slachta; Miroslav Voznak

    2016-01-01

    Denial of service (DoS) attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS) attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes o...

  6. Flying insects and Campylobacter

    DEFF Research Database (Denmark)

    Hald, Birthe; Sommer, Helle Mølgaard; Skovgård, Henrik

    Campylobacter in flies Flies of the Muscidae family forage on all kind of faeces – various fly species have different preferences. M domestica prefer pigs, horses and cattle faeces, animals which are all known to frequently excrete Campylobacter. As a result, the insects pick up pathogenic micro...

  7. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks. In prac......In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks....... In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...

  8. Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks

    Directory of Open Access Journals (Sweden)

    Apostolos P. Fournaris

    2017-07-01

    Full Text Available Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT and Operational Technology (OT systems that are meant to operate harmonically under a security critical framework. As security IT countermeasures are gradually been installed in many embedded system nodes, thus securing them from many well-know cyber attacks there is a lurking danger that is still overlooked. Apart from the software vulnerabilities that typical malicious programs use, there are some very interesting hardware vulnerabilities that can be exploited in order to mount devastating software or hardware attacks (typically undetected by software countermeasures capable of fully compromising any embedded system device. Real-time microarchitecture attacks such as the cache side-channel attacks are such case but also the newly discovered Rowhammer fault injection attack that can be mounted even remotely to gain full access to a device DRAM (Dynamic Random Access Memory. Under the light of the above dangers that are focused on the device hardware structure, in this paper, an overview of this attack field is provided including attacks, threat directives and countermeasures. The goal of this paper is not to exhaustively overview attacks and countermeasures but rather to survey the various, possible, existing attack directions and highlight the security risks that they can pose to security critical embedded systems as well as indicate their strength on compromising the Quality of Service (QoS such systems are designed to provide.

  9. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  10. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  11. Invisible Trojan-horse attack.

    Science.gov (United States)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin; Makarov, Vadim

    2017-08-21

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Ac´ın-Ribordy-Gisin (SARG04) QKD protocol at 1924 nm versus that at 1536 nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N. Jain et al., New J. Phys. 16, 123030 (2014). However at 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.

  12. Effects of eucalyptol on house fly (Diptera: Muscidae and blow fly (Diptera: Calliphoridae

    Directory of Open Access Journals (Sweden)

    Sukontason Kabkaew L.

    2004-01-01

    Full Text Available The effects of eucalyptol were evaluated against the house fly, Musca domestica L., and blow fly, Chrysomya megacephala (F.. The bioassay of adults, using topical application, indicated that M. domestica males were more susceptible than females, with the LD50 being 118 and 177 mg/fly, respectively. A higher LD50 of C. megacephala was obtained; 197 mg/fly for males and 221 mg/fly for females. Living flies of both species yielded a shorter life span after being treated with eucalyptol. The bioassay of larvae, using the dipping method on the third instar, showed that M. domestica was more susceptible than C. megacephala, with their LC50 being 101 and 642 mg/ml, respectively. The emergence of adults, which had been treated with eucalyptol in larvae, decreased only in M. domestica. Having the volatile property, fumigation or impregnated paper test of eucalyptol or the efficacy of repellence or attractiveness merits further investigations to enhance bio-insecticidal efficacy.

  13. WAYS OF ACQUIRING FLYING PHOBIA.

    Science.gov (United States)

    Schindler, Bettina; Vriends, Noortje; Margraf, Jürgen; Stieglitz, Rolf-Dieter

    2016-02-01

    The few studies that have explored how flying phobia is acquired have produced contradictory results. We hypothesized that classical conditioning plays a role in acquiring flying phobia and investigated if vicarious (model) learning, informational learning through media, and experiencing stressful life events at the time of onset of phobia also play a role. Thirty patients with flying phobia and thirty healthy controls matched on age, sex, and education were interviewed with the Mini-DIPS, the short German version of the Anxiety Disorders Interview Schedule (DSM-IV diagnostic criteria) and the Fear-of-Flying History Interview. Fifty Percent of patients with flying phobia and 53% of healthy controls reported frightening events in the air. There was no significant difference between the two samples. Thus there were not more classical conditioning events for patients with flying phobia. There also was no significant difference between the two samples for vicarious (model) learning: 37% of flying phobia patients and 23% of healthy controls felt influenced by model learning. The influence of informational learning through media was significantly higher for the clinical sample (70%) than for the control group (37%). Patients with flying phobia experienced significantly more stressful life events in the period of their frightening flight experience (60%) than healthy controls (19%). Frightening experiences while flying are quite common, but not everybody develops a flying phobia. Stressful life events and other factors might enhance conditionability. Informational learning through negative media reports probably reinforces the development of flying phobia. Clinical implications are discussed. © 2015 Wiley Periodicals, Inc.

  14. Effect of Limestone Powder on Acid Attack Characteristics of Cement Pastes

    Directory of Open Access Journals (Sweden)

    Shuhua LIU

    2014-12-01

    Full Text Available The acid resistance of cement pastes containing limestone powder with two different water-binder (w/b ratios exposed to acetic (pH = 4 and sulfuric acid (pH = 2 solutions respectively were investigated in this paper. Limestone powder, fly ash and silica fume were also added to the cement paste mixture at different proportions. Static and flowing aqueous environments were set in this experiment. Strength and microstructure of the pastes after acid attack were investigated by using strength test, X-ray diffractometer (XRD and scanning electron microscopy (SEM. The experimental results show that the erosion degree depends not only on pH value of the solution and w/b ratio of the pastes, but also on the content of limestone powder. Acetic acid reacts with calcium hydroxide and carbonate thus dissolving the pastes, while sulfuric acid consumed calcium hydroxide, and generated gypsum and ettringite. The consumption of calcium hydroxide in the flowing solution group is higher than that in the static solution because the flowing sulfuric acid solution has negative effect upon the gypsum crystallization. Fly ash and silica fume are beneficial to limestone cement paste because of the less calcium hydroxide formation, which is among the hydrates vulnerable to acid erosion. DOI: http://dx.doi.org/10.5755/j01.ms.20.4.6231

  15. Whispering through DDoS attack

    Directory of Open Access Journals (Sweden)

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  16. Formation of D- and I-shaped geochemical profiles in saucer-shaped sills due to post- emplacement magma flow induced by thermal stresses

    Science.gov (United States)

    Aarnes, I.; Podladchikov, Y. Y.; Neumann, E.

    2007-12-01

    There are still unresolved problems in the processes of emplacement and crystallization of saucer shaped sill intrusions. We use geochemistry and numerical modelling in order to constrain identify processes in mafic sill intrusions. Profiles sampled through through a saucer-shaped sill complex in the Karoo igneous province, South Africa show a variety of geochemical variations. Some variations are observed repeatedly, i.e. the D- and I-shaped profiles. D-shaped profiles are recognized by having the least evolved composition in the center (high Mg#) with more evolved composition at the upper and lower margins (low Mg#), resulting in a D-shaped Mg# profile. I- shaped profiles are recognized by having no variation in the Mg# through the profile. The formation mechanism of D-shaped profiles is enigmatic, as classical fractional crystallization theory predicts C-shapes to occur. The least evolved composition will be at the margins where crystallization initiates, and with continued cooling and crystallization the center will be progressively more evolved. Hence, we need another formation mechanism. The most common explanation for D-shaped profiles is a movement of early formed phenocrysts towards the center due to flow segregation. However, petrographical evidences from a D-shaped profile in this study show no phenocryst assemblage in the center, and the modal composition is homogeneous through the profile. We propose that differentiation is caused by a melt flow from the central parts of the sill towards the margins driven by underpressure anomalies at the margins. The underpressures develop because of strong cooling gradients at the margins, assuming no volume change due to a rigid crystal network. The less compatible elements associated with the melt phase will be transported into the margins by advection, resulting in a more evolved total system composition from a higher total melt percentage. The central parts will progressively be depleted in the less compatible

  17. Heart attack - discharge

    Science.gov (United States)

    ... and lifestyle Cholesterol - drug treatment Controlling your high blood pressure Deep vein thrombosis - discharge Dietary fats explained Fast food tips Heart attack - discharge Heart attack - what to ask your doctor Heart bypass ... pacemaker - discharge High blood pressure - what to ask your doctor How to read ...

  18. Importance of Campylobacter jejuni FliS and FliW in Flagella Biogenesis and Flagellin Secretion

    Directory of Open Access Journals (Sweden)

    Katarzyna A. Radomska

    2017-06-01

    Full Text Available Flagella-driven motility enables bacteria to reach their favorable niche within the host. The human foodborne pathogen Campylobacter jejuni produces two heavily glycosylated structural flagellins (FlaA and FlaB that form the flagellar filament. It also encodes the non-structural FlaC flagellin which is secreted through the flagellum and has been implicated in host cell invasion. The mechanisms that regulate C. jejuni flagellin biogenesis and guide the proteins to the export apparatus are different from those in most other enteropathogens and are not fully understood. This work demonstrates the importance of the putative flagellar protein FliS in C. jejuni flagella assembly. A constructed fliS knockout strain was non-motile, displayed reduced levels of FlaA/B and FlaC flagellin, and carried severely truncated flagella. Pull-down and Far Western blot assays showed direct interaction of FliS with all three C. jejuni flagellins (FlaA, FlaB, and FlaC. This is in contrast to, the sensor and regulator of intracellular flagellin levels, FliW, which bound to FlaA and FlaB but not to FlaC. The FliS protein but not FliW preferred binding to glycosylated C. jejuni flagellins rather than to their non-glycosylated recombinant counterparts. Mapping of the binding region of FliS and FliW using a set of flagellin fragments showed that the C-terminal subdomain of the flagellin was required for FliS binding, whereas the N-terminal subdomain was essential for FliW binding. The separate binding subdomains required for FliS and FliW, the different substrate specificity, and the differential preference for binding of glycosylated flagellins ensure optimal processing and assembly of the C. jejuni flagellins.

  19. Mass rearing methods for fruit fly

    International Nuclear Information System (INIS)

    Dominguez Gordillo, J.C.

    1999-01-01

    The most common rearing methods used for mass rearing of fruit flies, with emphasis on those of economic importance in Mexico such as Anastrepha ludens (the Mexican fruit fly). Anastrepha obliqua (the mango and plum fruit fly) and the exotic fruit fly Ceratitis capitata (the Mediterranean fruit fly) are described here. (author)

  20. Tratamento para o combate do forídeo Pseudohypocera kerteszi em Melipona quadrifasciata Lep Treatment against the forid fly Pseudohypocera kerteszi in Melipona quadrifasciata Regional Lep

    Directory of Open Access Journals (Sweden)

    Geraldo Moretto

    2000-05-01

    Full Text Available O forideo P. kerteszi é uma praga que ataca principalmente as crias de abelhas sociais. As conseqüências do ataque vão desde o enfraquecimento até o extermínio total da colônia de abelhas. O objetivo deste trabalho foi a criação de uma metodologia que permita a erradicação deste parasita quando estiver atacando colônias de abelhas melipona. Três colônias de M. quadrifasciata parasitadas com o forídeo foram tratadas com solução de mel de meliponídeos ou vinagre associada ao veneno de mosca oktrine. Um frasco contendo essa solução foi colocado entre o ninho e a lixeira em colmeias do modelo Uberlândia. Uma tela de malha que não permitisse a passagem das abelhas foi colocada entre o ninho e a lixeira. Por um período de três a sete dias foram encontrados forídeos mortos dentro ou próximo à solução.The forid fly P. kerteszi is a pest that mainly attacks the brood of social bees. The consequences of this attack range from weakening to total extermination of bee colonies. The objective of the present study was to develop a methodology that would eradicate this pest when P. kerteszi is parasitizing colonies of Melipona bees. Three M. quadrifasciata colonies parasitized with the forid fly were treated with a solution of meliponid honey or vinegar in combination with the oktrine fly poison. A flask containing this solution was placed between the nest and a garbage tray separated by a mesh net that would permit the passage of forid flies but not of bees. Dead forid flies inside or close to the solution were found daily for a period of three to seven days.

  1. Susceptibility of low-chill blueberry cultivars to oriental fruit fly, mediterranean fruit fly, and melon fly (Diptera: Tephritidae)

    Science.gov (United States)

    Forced infestation studies were conducted to determine if fruits of southern highbush blueberries (Vaccinium corymbosum L. hybrids) are hosts for three invasive tephritid fruit flies. Fruits of 17 blueberry cultivars were exposed to gravid female flies of Bactrocera dorsalis (Hendel) (oriental frui...

  2. Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0

    NARCIS (Netherlands)

    Gadyatskaya, Olga; Jhawar, Ravi; Kordy, P.T.; Lounis, Karim; Mauw, Sjouke; Trujillo-Rasua, Rolando

    2016-01-01

    In this tool demonstration paper we present the ADTool2.0: an open-source software tool for design, manipulation and analysis of attack trees. The tool supports ranking of attack scenarios based on quantitative attributes entered by the user; it is scriptable; and it incorporates attack trees with

  3. Corrosion Behavior of Steel Reinforcement in Concrete with Recycled Aggregates, Fly Ash and Spent Cracking Catalyst.

    Science.gov (United States)

    Gurdián, Hebé; García-Alcocel, Eva; Baeza-Brotons, Francisco; Garcés, Pedro; Zornoza, Emilio

    2014-04-21

    The main strategy to reduce the environmental impact of the concrete industry is to reuse the waste materials. This research has considered the combination of cement replacement by industrial by-products, and natural coarse aggregate substitution by recycled aggregate. The aim is to evaluate the behavior of concretes with a reduced impact on the environment by replacing a 50% of cement by industrial by-products (15% of spent fluid catalytic cracking catalyst and 35% of fly ash) and a 100% of natural coarse aggregate by recycled aggregate. The concretes prepared according to these considerations have been tested in terms of mechanical strengths and the protection offered against steel reinforcement corrosion under carbonation attack and chloride-contaminated environments. The proposed concrete combinations reduced the mechanical performance of concretes in terms of elastic modulus, compressive strength, and flexural strength. In addition, an increase in open porosity due to the presence of recycled aggregate was observed, which is coherent with the changes observed in mechanical tests. Regarding corrosion tests, no significant differences were observed in the case of the resistance of these types of concretes under a natural chloride attack. In the case of carbonation attack, although all concretes did not stand the highly aggressive conditions, those concretes with cement replacement behaved worse than Portland cement concretes.

  4. The effect of fly ashes in the corrosion and durability in concretes; Efecto de las Cenizas Volantes en la Durabilidad y en la Corrosion en Armaduras del Hormigon

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-12-31

    From the beginning of this century, fly ashes have been the object of a variety of studies and research-looking for different ways of application. The construction industry reuses the highest volume of the fly ash actually produced. Researches carried out on the behaviour of hydraulic blended materials mixed with fly ash have supported the progressive use of these by-products, and simultaneously have opened new ways of application. Spanish fly ash producers together with research centers, as IETcc, have been involved in investigations since 70`s. The last important research carried out has been the one dealing with the durability of concrete made with fly ash and its interaction with the corrosion of reinforcements. In this work five fly ashes of silicon-aluminous type were mixed with portland cement containing low alkali and aluminates in order to enhance the effect of those components from the fly ash. The main goal was to study the degradation mechanisms of concretes made with fly ashes, substituting partially the cement (15 and 35%) in several aggressive media: containing sulfates, chlorides or sea water. The effect to these aggressive media on the durability has also been considered regarding reinforcements. Different type of tests were carried out in laboratory and under natural exposure. In the case of laboratory studies the objectives were: 1) to stablish the mechanisms of hardening. The effect of fly ashes in pozolanic reaction and in the microstructure of the material. 2) Resistance of the addition of fly ashes against chloride and sulfates. Definition of the deterioration mechanisms. 3) Effect of fly ashes on the corrosion of reinforcements. Influence on the passivation process. Resistance against carbonation and chloride attack. (Author)

  5. The work-averse cyber attacker model : theory and evidence from two million attack signatures

    NARCIS (Netherlands)

    Allodi, L.; Massacci, F.; Williams, J.

    The typical cyber attacker is assumed to be all powerful and to exploit all possible vulnerabilities. In this paper we present, and empirically validate, a novel and more realistic attacker model. The intuition of our model is that an attacker will optimally choose whether to act and weaponize a new

  6. Ionizing radiation quarantine treatments against tephritid fruit flies: a review

    Energy Technology Data Exchange (ETDEWEB)

    Hallman, G. J. [USDA-ARS, Weslaco, TX (United States)

    1999-06-15

    Fruit flies of the family Tephritidae are considered the most important insect pest risk carried by exported fruits worldwide. Fruits suspected of harboring fruit fly eggs and larvae must be treated to control virtually 100% of any tephritids present. Irradiation is unique among quarantine treatments in that it is the only treatment used which does not cause acute mortality; instead, insects are prevented from maturing or are sterilized. Tephritids have been the most studied group of quarantined pests as far as irradiation; minimum absorbed doses confirmed with large-scale testing to provide control to the probit 9 level (99.9968%) have ranged from 50 to 250 Gy. Considerable work has been done with the Mediterranean fruit fly, Ceratitis capitata (Wiedemann), one of the most important quarantined pests worldwide, and doses suggested to provide quarantine security have varied widely. The fact that insects are still alive for some time after irradiation has been one of the major obstacles to its use. Irradiation may be the most widely applicable quarantine treatment from the standpoint of fruit quality. However, some important fruits shipped across quarantine barriers (mangoes, Mangifera indica L., and citrus) may suffer from doses as low as 150 Gy when applied on a commercial scale where much of the fruit load may receive 300 Gy. Fortunately, some of the important tephritids attacking these fruits, such as Anastrepha spp., can be controlled with lower doses. Mainland USA has begun to use irradiation as a quarantine treatment for some fruits imported from Hawaii since April 1995 and remains the only country using irradiation as a quarantine treatment, although on a very limited basis. Irradiation offers some additional risk abatement advantages over other quarantine treatments. © 1999 Published by Elsevier Science B.V. All rights reserved. (author)

  7. Ionizing radiation quarantine treatments against tephritid fruit flies: a review

    International Nuclear Information System (INIS)

    Hallman, G.J.

    1999-01-01

    Fruit flies of the family Tephritidae are considered the most important insect pest risk carried by exported fruits worldwide. Fruits suspected of harboring fruit fly eggs and larvae must be treated to control virtually 100% of any tephritids present. Irradiation is unique among quarantine treatments in that it is the only treatment used which does not cause acute mortality; instead, insects are prevented from maturing or are sterilized. Tephritids have been the most studied group of quarantined pests as far as irradiation; minimum absorbed doses confirmed with large-scale testing to provide control to the probit 9 level (99.9968%) have ranged from 50 to 250 Gy. Considerable work has been done with the Mediterranean fruit fly, Ceratitis capitata (Wiedemann), one of the most important quarantined pests worldwide, and doses suggested to provide quarantine security have varied widely. The fact that insects are still alive for some time after irradiation has been one of the major obstacles to its use. Irradiation may be the most widely applicable quarantine treatment from the standpoint of fruit quality. However, some important fruits shipped across quarantine barriers (mangoes, Mangifera indica L., and citrus) may suffer from doses as low as 150 Gy when applied on a commercial scale where much of the fruit load may receive 300 Gy. Fortunately, some of the important tephritids attacking these fruits, such as Anastrepha spp., can be controlled with lower doses. Mainland USA has begun to use irradiation as a quarantine treatment for some fruits imported from Hawaii since April 1995 and remains the only country using irradiation as a quarantine treatment, although on a very limited basis. Irradiation offers some additional risk abatement advantages over other quarantine treatments. © 1999 Published by Elsevier Science B.V. All rights reserved. (author)

  8. Web server attack analyzer

    OpenAIRE

    Mižišin, Michal

    2013-01-01

    Web server attack analyzer - Abstract The goal of this work was to create prototype of analyzer of injection flaws attacks on web server. Proposed solution combines capabilities of web application firewall and web server log analyzer. Analysis is based on configurable signatures defined by regular expressions. This paper begins with summary of web attacks, followed by detection techniques analysis on web servers, description and justification of selected implementation. In the end are charact...

  9. The sterile insect technique: Cost-effective control of the Mediterranean fruit fly

    International Nuclear Information System (INIS)

    Gomez Riera, Pablo

    2001-01-01

    occur and must be dealt with in Florida and California, Mexico and Chile. Fruit flies, like any other pest, have been attacked with biocides at the farm level. Citrus is an instructive example. Citrus flowers and fruits twice a year, and various species and varieties provide year-round harvests. Biocides are typically applied to citrus every 10-15 days. Even so, the effectiveness is usually only 70-80%, due to uncontrolled neighboring farms, untreated hosts, problems with the spraying equipment, dose miscalculations, etc. Aerial applications of bait sprays to wider areas are more expensive, require a regional plan, and can represent a major impact to the environment. All means of application can leave pesticide residues in the fruit. Trade in fresh fruits and vegetables is being liberalized on a world-wide basis as part of globalization. At the same time, local consumption of fresh products is increasing in the search for a healthier life. Pesticides are increasingly less acceptable in both the export trade and local markets. Newly adopted food safety and phytosanitary standards require the establishment of either low prevalence or entirely fruit fly-free areas. Environmental considerations reinforce the already favorable cost-benefit picture for the Sterile Insect Technique (SIT) as an alternative to controls that use chemicals alone. The SIT has been in use since the 1950s. The aim of the technique is to disrupt the life cycle of the fly, mating the wild population with sterile flies reared at a 'fly factory'. Sterilization is accomplished by exposing insects to a specific dose of gamma radiation emitted by radioisotopes (cobalt-60 or cesium-137). Irradiation is a central and indispensable part of the total SIT process: every insect among millions produced each week must to be sterilized. No other method is available to achieve sterilization; chemosterilants, linear accelerators and the like have proven less cost-effective

  10. The sterile insect technique: Cost-effective control of the Mediterranean fruit fly

    Energy Technology Data Exchange (ETDEWEB)

    Gomez Riera, Pablo [INTA La Consulta, Mendoza (Argentina)

    2001-07-01

    occur and must be dealt with in Florida and California, Mexico and Chile. Fruit flies, like any other pest, have been attacked with biocides at the farm level. Citrus is an instructive example. Citrus flowers and fruits twice a year, and various species and varieties provide year-round harvests. Biocides are typically applied to citrus every 10-15 days. Even so, the effectiveness is usually only 70-80%, due to uncontrolled neighboring farms, untreated hosts, problems with the spraying equipment, dose miscalculations, etc. Aerial applications of bait sprays to wider areas are more expensive, require a regional plan, and can represent a major impact to the environment. All means of application can leave pesticide residues in the fruit. Trade in fresh fruits and vegetables is being liberalized on a world-wide basis as part of globalization. At the same time, local consumption of fresh products is increasing in the search for a healthier life. Pesticides are increasingly less acceptable in both the export trade and local markets. Newly adopted food safety and phytosanitary standards require the establishment of either low prevalence or entirely fruit fly-free areas. Environmental considerations reinforce the already favorable cost-benefit picture for the Sterile Insect Technique (SIT) as an alternative to controls that use chemicals alone. The SIT has been in use since the 1950s. The aim of the technique is to disrupt the life cycle of the fly, mating the wild population with sterile flies reared at a 'fly factory'. Sterilization is accomplished by exposing insects to a specific dose of gamma radiation emitted by radioisotopes (cobalt-60 or cesium-137). Irradiation is a central and indispensable part of the total SIT process: every insect among millions produced each week must to be sterilized. No other method is available to achieve sterilization; chemosterilants, linear accelerators and the like have proven less cost-effective.

  11. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  12. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based......Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identified...... on invalidating policies in the system model by identifying possible sequences of actions that lead to an attack. The generated attacks are precise enough to illustrate the threat, and they are general enough to hide the details of individual steps....

  13. Terrorists and Suicide Attacks

    National Research Council Canada - National Science Library

    Cronin, Audrey K

    2003-01-01

    Suicide attacks by terrorist organizations have become more prevalent globally, and assessing the threat of suicide attacks against the United States and its interests at home and abroad has therefore...

  14. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  15. Attack Trees with Sequential Conjunction

    NARCIS (Netherlands)

    Jhawar, Ravi; Kordy, Barbara; Mauw, Sjouke; Radomirović, Sasa; Trujillo-Rasua, Rolando

    2015-01-01

    We provide the first formal foundation of SAND attack trees which are a popular extension of the well-known attack trees. The SAND at- tack tree formalism increases the expressivity of attack trees by intro- ducing the sequential conjunctive operator SAND. This operator enables the modeling of

  16. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  17. Investigating the Possibility to Individualize Asthma Attack Therapy Based on Attack Severity and Patient Characteristics

    Directory of Open Access Journals (Sweden)

    Sárkány Zoltán

    2016-03-01

    Full Text Available Introduction: The objective of this study was to investigate with the help of a computerized simulation model whether the treatment of an acute asthma attack can be individualized based on the severity of the attack and the characteristics of the patient. Material and Method: A stochastic lung model was used to simulate the deposition of 1 nm - 10 μm particles during a mild and a moderate asthma attack. Breathing parameters were varied to maximize deposition, and simulation results were compared with those obtained in the case of a severe asthma attack. In order to investigate the effect of height on the deposition of inhaled particles, another series of simulations was carried out with identical breathing parameters, comparing patient heights of 155 cm, 175 cm and 195 cm. Results: The optimization process yielded an increase in the maximum deposition values of around 6-7% for each type of investigated asthma attack, and the difference between attacks of different degree of severity was around 5% for both the initial and the optimized values, a higher degree of obstruction increasing the amount of deposited particles. Conclusions: Our results suggest that the individualization of asthma attack treatment cannot be based on particles of different size, as the highest deposited fraction in all three types of attacks can be obtained using 0.01 μm particles. The use of a specific set of breathing parameters yields a difference between a mild and a moderate, as well as a moderate and a severe asthma attack of around 5%.

  18. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  19. Fly ash quality and utilization

    Energy Technology Data Exchange (ETDEWEB)

    Barta, L.E.; Lachner, L.; Wenzel, G.B. [Inst. for Energy, Budapest (Hungary); Beer, M.J. [Massachusetts Inst. of Technology, Cambridge, MA (United States)

    1995-12-01

    The quality of fly ash is of considerable importance to fly ash utilizers. The fly ash puzzolanic activity is one of the most important properties that determines the role of fly ash as a binding agent in the cementing process. The puzzolanic activity, however is a function of fly ash particle size and chemical composition. These parameters are closely related to the process of fly ash formation in pulverized coal fired furnaces. In turn, it is essential to understand the transformation of mineral matter during coal combustion. Due to the particle-to-particle variation of coal properties and the random coalescence of mineral particles, the properties of fly ash particles e.g. size, SiO{sub 2} content, viscosity can change considerably from particle to particle. These variations can be described by the use of the probability theory. Since the mean values of these randomly changing parameters are not sufficient to describe the behavior of individual fly ash particles during the formation of concrete, therefore it is necessary to investigate the distribution of these variables. Examples of these variations were examined by the Computer Controlled Scanning Electron Microscopy (CCSEM) for particle size and chemical composition for Texas lignite and Eagel Butte mineral matter and fly ash. The effect of combustion on the variations of these properties for both the fly ash and mineral matter were studied by using a laminar flow reactor. It is shown in our paper, that there are significant variations (about 40-50% around the mean values) of the above-listed properties for both coal samples. By comparing the particle size and chemical composition distributions of the mineral matter and fly ash, it was possible to conclude that for the Texas lignite mineral matter, the combustion did not effect significantly the distribution of these properties, however, for the Eagel Butte coal the combustion had a major impact on these mineral matter parameters.

  20. Anger attacks in obsessive compulsive disorder

    Directory of Open Access Journals (Sweden)

    Nitesh Prakash Painuly

    2011-01-01

    Full Text Available Background: Research on anger attacks has been mostly limited to depression, and only a few studies have focused on anger attacks in obsessive compulsive disorder. Materials and Methods: In a cross-sectional study all new obsessive compulsive disorder patients aged 20-60 years attending an outpatient clinic were assessed using the anger attack questionnaire, irritability, depression and anxiety scale (for the direction of the aggressive behavior and quality of life (QOL. Results: The sample consisted of 42 consecutive subjects with obsessive compulsive disorder, out of which 21 (50% had anger attacks. The obsessive compulsive disorder subjects with and without anger attacks did not show significant differences in terms of sociodemographic variables, duration of illness, treatment, and family history. However, subjects with anger attacks had significantly higher prevalence of panic attacks and comorbid depression. Significantly more subjects with anger attacks exhibited aggressive acts toward spouse, parents, children, and other relatives in the form of yelling and threatening to hurt, trying to hurt, and threatening to leave. However, the two groups did not differ significantly in terms of QOL, except for the psychological domain being worse in the subjects with anger attacks. Conclusion: Anger attacks are present in half of the patients with obsessive compulsive disorder, and they correlate with the presence of comorbid depression.

  1. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  2. Pericarditis - after heart attack

    Science.gov (United States)

    ... include: A previous heart attack Open heart surgery Chest trauma A heart attack that has affected the thickness of your heart muscle Symptoms Symptoms include: Anxiety Chest pain from the swollen pericardium rubbing on the ...

  3. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  4. Cache timing attacks on recent microarchitectures

    DEFF Research Database (Denmark)

    Andreou, Alexandres; Bogdanov, Andrey; Tischhauser, Elmar Wolfgang

    2017-01-01

    Cache timing attacks have been known for a long time, however since the rise of cloud computing and shared hardware resources, such attacks found new potentially devastating applications. One prominent example is S$A (presented by Irazoqui et al at S&P 2015) which is a cache timing attack against...... AES or similar algorithms in virtualized environments. This paper applies variants of this cache timing attack to Intel's latest generation of microprocessors. It enables a spy-process to recover cryptographic keys, interacting with the victim processes only over TCP. The threat model is a logically...... separated but CPU co-located attacker with root privileges. We report successful and practically verified applications of this attack against a wide range of microarchitectures, from a two-core Nehalem processor (i5-650) to two-core Haswell (i7-4600M) and four-core Skylake processors (i7-6700). The attack...

  5. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  6. Forensics Investigation of Web Application Security Attacks

    OpenAIRE

    Amor Lazzez; Thabet Slimani

    2015-01-01

    Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the sec...

  7. Possibilities of utilizing power plant fly ashes

    Directory of Open Access Journals (Sweden)

    Mezencevová Andrea

    2003-09-01

    Full Text Available The burning of fossil fuels in industrial power stations plays a significant role in the production of thermal and electrical energy. Modern thermal power plants are producing large amounts of solid waste, mainly fly ashes. The disposal of power plant waste is a large environmental problem at the present time. In this paper, possibilities of utilization of power plant fly ashes in industry, especially in civil engineering, are presented. The fly ash is a heterogeneous material with various physical, chemical and mineralogical properties, depending on the mineralogical composition of burned coal and on the used combustion technology. The utilization of fly ashes is determined of their properties. The fineness, specific surface area, particle shape, density, hardness, freeze-thaw resistance, etc. are decisive. The building trade is a branch of industry, which employs fly ash in large quantities for several decades.The best utilization of fluid fly ashes is mainly in the production of cement and concrete, due to the excellent pozzolanic and cementitious properties of this waste. In the concrete processing, the fly ash is utilized as a replacement of the fine aggregate (fine filler or a partial replacement for cement (active admixture. In addition to economic and ecological benefits, the use of fly ash in concrete improves its workability and durability, increases compressive and flexural strength, reduces segregation, bleeding, shrinkage, heat evolution and permeability and enhances sulfate resistance of concrete.The aim of current research is to search for new technologies for the fly ash utilization. The very interesting are biotechnological methods to recovery useful components of fly ashes and unconventional methods of modification of fly ash properties such as hydrothermal zeolitization and mechanochemical modification of its properties. Mechanochemistry deals with physico - chemical transformations and chemical reactions of solids induced by

  8. Analysis list: FLI1 [Chip-atlas[Archive

    Lifescience Database Archive (English)

    Full Text Available FLI1 Blood,Bone,Muscle + hg19 http://dbarchive.biosciencedbc.jp/kyushu-u/hg19/targe...t/FLI1.1.tsv http://dbarchive.biosciencedbc.jp/kyushu-u/hg19/target/FLI1.5.tsv http://dbarchive.biosciencedb...c.jp/kyushu-u/hg19/target/FLI1.10.tsv http://dbarchive.biosciencedbc.jp/kyushu-u/hg19/colo/FLI1.Blood.tsv,http://dbarchive.bioscience...dbc.jp/kyushu-u/hg19/colo/FLI1.Bone.tsv,http://dbarchive.bioscience...dbc.jp/kyushu-u/hg19/colo/FLI1.Muscle.tsv http://dbarchive.biosciencedbc.jp/kyushu-u/hg19/colo/Bl

  9. Identifying glass compositions in fly ash

    Directory of Open Access Journals (Sweden)

    Katherine eAughenbaugh

    2016-01-01

    Full Text Available In this study, four Class F fly ashes were studied with a scanning electron microscope; the glassy phases were identified and their compositions quantified using point compositional analysis with k-means clustering and multispectral image analysis. The results showed that while the bulk oxide contents of the fly ashes were different, the four fly ashes had somewhat similar glassy phase compositions. Aluminosilicate glasses (AS, calcium aluminosilicate glasses (CAS, a mixed glass, and, in one case, a high iron glass were identified in the fly ashes. Quartz and iron crystalline phases were identified in each fly ash as well. The compositions of the three main glasses identified, AS, CAS, and mixed glass, were relatively similar in each ash. The amounts of each glass were varied by fly ash, with the highest calcium fly ash containing the most of calcium-containing glass. Some of the glasses were identified as intermixed in individual particles, particularly the calcium-containing glasses. Finally, the smallest particles in the fly ashes, with the most surface area available to react in alkaline solution, such as when mixed with portland cement or in alkali-activated fly ash, were not different in composition than the large particles, with each of the glasses represented. The method used in the study may be applied to a fly ash of interest for use as a cementing material in order to understand its potential for reactivity.

  10. Adaptive cyber-attack modeling system

    Science.gov (United States)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  11. Predicting Factors of Zone 4 Attack in Volleyball.

    Science.gov (United States)

    Costa, Gustavo C; Castro, Henrique O; Evangelista, Breno F; Malheiros, Laura M; Greco, Pablo J; Ugrinowitsch, Herbert

    2017-06-01

    This study examined 142 volleyball games of the Men's Super League 2014/2015 seasons in Brazil from which we analyzed 24-26 games of each participating team, identifying 5,267 Zone 4 attacks for further analysis. Within these Zone 4 attacks, we analyzed the association between the effect of the attack carried out and the separate effects of serve reception, tempo and type of attack. We found that the reception, tempo of attack, second tempo of attack, and power of diagonal attack were predictors of the attack effect in Zone 4. Moreover, placed attacks showed a tendency to not yield a score. In conclusion, winning points in high-level men's volleyball requires excellent receptions, a fast attack tempo and powerfully executed of attacks.

  12. Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?

    Directory of Open Access Journals (Sweden)

    Ines Goicoechea-Telleria

    2018-01-01

    Full Text Available The use of biometrics keeps growing. Every day, we use biometric recognition to unlock our phones or to have access to places such as the gym or the office, so we rely on the security manufacturers offer when protecting our privileges and private life. It is well known that it is possible to hack into a fingerprint sensor using fake fingers made of Play-Doh and other easy-to-obtain materials but to what extent? Is this true for all users or only for specialists with a deep knowledge on biometrics? Are smartphone fingerprint sensors as reliable as desktop sensors? To answer these questions, we performed 3 separate evaluations. First, we evaluated 4 desktop fingerprint sensors of different technologies by attacking them with 7 different fake finger materials. All of them were successfully attacked by an experienced attacker. Secondly, we carried out a similar test on 5 smartphones with embedded sensors using the most successful materials, which also hacked the 5 sensors. Lastly, we gathered 15 simulated attackers with no background in biometrics to create fake fingers of several materials, and they had one week to attack the fingerprint sensors of the same 5 smartphones, with the starting point of a short video with the techniques to create them. All 5 smartphones were successfully attacked by an inexperienced attacker. This paper will provide the results achieved, as well as an analysis on the attack potential of every case. All results are given following the metrics of the standard ISO/IEC 30107-3.

  13. Engineering properties of fly ash concrete

    International Nuclear Information System (INIS)

    Hilmi Mahmud

    1999-01-01

    This paper presents some of the engineering properties of Malaysian fly ash concrete. Workability, compressive, flexural, tensile splitting, drying shrinkage, elastic modulus and non destructive tests were performed on fly ash and control OPC concrete specimens. Data show that concrete containing 25% fly ash replacement of cement exhibit superior or similar engineering properties to that normal concrete without fly ash. These encouraging results demonstrated the technical merits of incorporating fly ash in concrete and should pave the way for wide scale use of this versatile material in the Malaysian construction industry. (author)

  14. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia.

    Science.gov (United States)

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (2003). Problems faced, lessons learnt, and costs incurred are discussed. A burns disaster plan drawing on lessons learnt from these attacks is presented. Thirty-one patients were treated at the SGH Burns Centre in three attacks (2002 Bali attack [n = 15], 2003 Jakarta attack [n = 14], and 2005 Bali attack [n = 2]). For the 2002 Bali attack, median age was 29 years (range 20 to 50 years), median percentage of total burn surface area (TBSA) was 29% (range 5% to 55%), and median abbreviated burn severity index (ABSI) was 6 (range 3 to 10). Eight of 15 patients were admitted to the intensive care unit. For the 2003 Jakarta attack, median age was 35 years (range 24 to 56 years), median percentage of TBSA was 10% (range 2% to 46%), and median ABSI was 4 (range 3 to 9). A large number of patients had other injuries. Problems faced included manpower issues, lack of bed space, shortage of blood products, and lack of cadaver skin. The changing nature of terror attacks mandates continued vigilance and disaster preparedness. The multidimensional burns patient, complicated by other injuries, is likely to become increasingly common. A burns disaster plan with emphasis on effective command, control, and communication as well as organisation of health care personnel following a 'team concept' will do much to ensure that the sudden onset of a crisis situation at an unexpected time does not overwhelm hospital manpower and resources.

  15. Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks

    Directory of Open Access Journals (Sweden)

    Željko Gavrić

    2018-01-01

    Full Text Available Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the security issue is very important. DOS (denial of service attacks are a fundamental threat to the functioning of wireless sensor networks. This paper describes some of the most common DOS attacks and potential methods of protection against them. The case study shows one of the most frequent attacks on wireless sensor networks – the interference attack. In the introduction of this paper authors assume that the attack interference can cause significant obstruction of wireless sensor networks. This assumption has been proved in the case study through simulation scenario and simulation results.

  16. Securing internet by eliminating DDOS attacks

    Science.gov (United States)

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  17. Plants under dual attack

    NARCIS (Netherlands)

    Ponzio, C.A.M.

    2016-01-01

    Though immobile, plants are members of complex environments, and are under constant threat from a wide range of attackers, which includes organisms such as insect herbivores or plant pathogens. Plants have developed sophisticated defenses against these attackers, and include chemical responses

  18. Differential pressure measurement using a free-flying insect-like ornithopter with an MEMS sensor

    International Nuclear Information System (INIS)

    Takahashi, Hidetoshi; Aoyama, Yuichiro; Ohsawa, Kazuharu; Iwase, Eiji; Matsumoto, Kiyoshi; Shimoyama, Isao; Tanaka, Hiroto

    2010-01-01

    This paper presents direct measurements of the aerodynamic forces on the wing of a free-flying, insect-like ornithopter that was modeled on a hawk moth (Manduca sexta). A micro differential pressure sensor was fabricated with micro electro mechanical systems (MEMS) technology and attached to the wing of the ornithopter. The sensor chip was less than 0.1% of the wing area. The mass of the sensor chip was 2.0 mg, which was less than 1% of the wing mass. Thus, the sensor was both small and light in comparison with the wing, resulting in a measurement system that had a minimal impact on the aerodynamics of the wing. With this sensor, the 'pressure coefficient' of the ornithopter wing was measured during both steady airflow and actual free flight. The maximum pressure coefficient observed for steady airflow conditions was 1.4 at an angle of attack of 30 0 . In flapping flight, the coefficient was around 2.0 for angles of attack that ranged from 25 0 to 40 0 . Therefore, a larger aerodynamic force was generated during the downstroke in free flight compared to steady airflow conditions.

  19. Treatment of fly ash for use in concrete

    Science.gov (United States)

    Boxley, Chett; Akash, Akash; Zhao, Qiang

    2013-01-08

    A process for treating fly ash to render it highly usable as a concrete additive. A quantity of fly ash is obtained that contains carbon and which is considered unusable fly ash for concrete based upon foam index testing. The fly ash is mixed with an activator solution sufficient to initiate a geopolymerization reaction and for a geopolymerized fly ash. The geopolymerized fly ash is granulated. The geopolymerized fly ash is considered usable fly ash for concrete according to foam index testing. The geopolymerized fly ash may have a foam index less than 35% of the foam index of the untreated fly ash, and in some cases less than 10% of the foam index of the untreated fly ash. The activator solution may contain an alkali metal hydroxide, carbonate, silicate, aluminate, or mixtures thereof.

  20. New attacks on Wi-Fi Protected Setup

    OpenAIRE

    Hamed Mohtadi; Alireza Rahimi

    2015-01-01

    Wi-Fi Protected Setup (WPS) is a network security standard that is used to secure networks in home and office, introduced in 2006 by the Wi-Fi Alliance. It provides easier configuration setup and is used in almost all recent Wi-Fi devices. In this paper we propose two attacks on this standard. The first attack is an offline brute force attack that uses imbalance on registration protocol. This attack needs user action, but it is more efficient than previous attacks. The second attack uses weak...

  1. Corrosion Behavior of Steel Reinforcement in Concrete with Recycled Aggregates, Fly Ash and Spent Cracking Catalyst

    Directory of Open Access Journals (Sweden)

    Hebé Gurdián

    2014-04-01

    Full Text Available The main strategy to reduce the environmental impact of the concrete industry is to reuse the waste materials. This research has considered the combination of cement replacement by industrial by-products, and natural coarse aggregate substitution by recycled aggregate. The aim is to evaluate the behavior of concretes with a reduced impact on the environment by replacing a 50% of cement by industrial by-products (15% of spent fluid catalytic cracking catalyst and 35% of fly ash and a 100% of natural coarse aggregate by recycled aggregate. The concretes prepared according to these considerations have been tested in terms of mechanical strengths and the protection offered against steel reinforcement corrosion under carbonation attack and chloride-contaminated environments. The proposed concrete combinations reduced the mechanical performance of concretes in terms of elastic modulus, compressive strength, and flexural strength. In addition, an increase in open porosity due to the presence of recycled aggregate was observed, which is coherent with the changes observed in mechanical tests. Regarding corrosion tests, no significant differences were observed in the case of the resistance of these types of concretes under a natural chloride attack. In the case of carbonation attack, although all concretes did not stand the highly aggressive conditions, those concretes with cement replacement behaved worse than Portland cement concretes.

  2. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  3. Carbonation of ternary cementitious concrete systems containing fly ash and silica fume

    Directory of Open Access Journals (Sweden)

    Eehab Ahmed Badreldin Khalil

    2015-04-01

    Full Text Available Carbonation is quite a complex physical negative effect phenomenon on concrete especially in the ones containing ternary blends of Portland Cement, fly ash, and silica fume. Nine selected concrete mixtures were prepared with various water to cementitious materials’ ratios and various cementitious contents. The concrete mixtures were adapted in such a way to have the same workability and air content. The fresh concrete properties were kept near identical in slump, air content, and unit weight. The variation was in the hardened concrete mechanical properties of compression and tension strength. The carbonation phenomenon was studied for these mixes showing at which mixes of ternary cementitious content heavy carbonation attacks maybe produced. The main components of such mixes that do affect the carbonation process with time were presented.

  4. Invisible Trojan-horse attack

    DEFF Research Database (Denmark)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin

    2017-01-01

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance...

  5. Radiological attacks and accidents. Medical consequences

    International Nuclear Information System (INIS)

    Sakuta, Hidenari

    2007-01-01

    Probability of the occurrence of radiological attacks appears to be elevated after the terrorist attacks against the United States on September 11 in 2001. There are a lot of scenarios of radiological attack: simple radiological device, radiological disperse device (RDD or dirty bomb), attacks against nuclear reactor, improvised nuclear device, and nuclear weapons. Of these, RDD attack is the most probable scenario, because it can be easily made and can generate enormous psychological and economic damages. Radiological incidents are occurring to and fro in the world, including several cases of theft to nuclear facilities and unsuccessful terrorist attacks against them. Recently, a former Russian spy has allegedly been killed using polonium-210. In addition, serious radiological accidents have occurred in Chernobyl, Goiania, and Tokai-mura. Planning, preparation, education, and training exercise appear to be essential factors to cope with radiological attacks and accidents effectively without feeling much anxiety. Triage and psychological first aid are prerequisite to manage and provide effective medial care for mass casualties without inducing panic. (author)

  6. Script-viruses Attacks on UNIX OS

    Directory of Open Access Journals (Sweden)

    D. M. Mikhaylov

    2010-06-01

    Full Text Available In this article attacks on UNIX OS are considered. Currently antivirus developers are concentrated on protecting systems from viruses that are most common and attack popular operating systems. If the system or its components are not often attacked then the antivirus products are not protecting these components as it is not profitable. The same situation is with script-viruses for UNIX OS as most experts consider that it is impossible for such viruses to get enough rights to attack. Nevertheless the main conclusion of this article is the fact that such viruses can be very powerful and can attack systems and get enough rights.

  7. 9/11, Act II: a fine-grained analysis of regional variations in traffic fatalities in the aftermath of the terrorist attacks.

    Science.gov (United States)

    Gaissmaier, Wolfgang; Gigerenzer, Gerd

    2012-12-01

    Terrorists can strike twice--first, by directly killing people, and second, through dangerous behaviors induced by fear in people's minds. Previous research identified a substantial increase in U.S. traffic fatalities subsequent to the September 11 terrorist attacks, which were accounted for as due to a substitution of driving for flying, induced by fear of dread risks. Here, we show that this increase in fatalities varied widely by region, a fact that was best explained by regional variations in increased driving. Two factors, in turn, explained these variations in increased driving. The weaker factor was proximity to New York City, where stress reactions to the attacks were previously shown to be greatest. The stronger factor was driving opportunity, which was operationalized both as number of highway miles and as number of car registrations per inhabitant. Thus, terrorists' second strike exploited both fear of dread risks and, paradoxically, an environmental structure conducive to generating increased driving, which ultimately increased fatalities.

  8. Pestiferous nature, resting sites, aggregation, and host-seeking behavior of the eye fly Siphunculina funicola (Diptera: Chloropidae) in Thailand.

    Science.gov (United States)

    Mulla, Mir S; Chansang, Uruyakorn

    2007-12-01

    Species of eye flies and eye gnats (Diptera: Chloropidae) are severe and persistent pests of man, domestic and wild animals, and potential vectors of pathogens. The species prevailing in the Oriental region belong to the genus Siphunculina, while those in the Neotropic and Nearctic regions belong to Liohippelates and Hippelates. These are small insects of 1-2 mm that feed on wounds, lacerations, scratches, and mucous membranes of man and higher animals. One species, Siphunculina funicola, commonly known as the Oriental eye fly, is considered the most anthropophilic in the genus, with potential involvement in the spread and mechanical transmission of infectious agents to humans and animals. Very little is known about the biology, prevalence, host-seeking, and aggregation behavior of this species in South and Southeast Asia. We initiated studies on biological aspects of this potential vector and human pest in central Thailand. The most significant findings of our study were the aggregation behaviors of S. funicola, that both sexes attack hosts, and that males outnumbered females attacking humans, dogs, and other domestic animals. They feed on wounds, scabs, lacerations, eyes, and mucous membranes. They hover around and feed on hosts during the daylight hours when host-seeking activities are more pronounced at temperatures above 25-27 degrees C under calm conditions. We noted that large masses of males and females aggregated on a variety of hanging objects such as strings, trailings, electrical lines, decorations, ropes, twines, abandoned cob webs, clothes hangers, and other hanging substrates in open shade of structures and dwellings. This behavior of eye flies brings them closer to human and animal hosts. In these aggregations, both males and females were present, with mating pairs frequently noted. In the aggregations, about 37% of the females had fully developed eggs in the rainy season, but only <1-3.6% were gravid in the hot and dry season. The average number of

  9. Electrodialytic removal of heavy metals from fly ashes

    DEFF Research Database (Denmark)

    Pedersen, Anne Juul

    2002-01-01

    The aim of the Ph.D. work was to develop the electrodialytic remediation method for removal of heavy metals from fly ashes. The work was focused on two types of fly ashes: fly ashes from wood combustion and fly ashes from municipal solid waste incineration.......The aim of the Ph.D. work was to develop the electrodialytic remediation method for removal of heavy metals from fly ashes. The work was focused on two types of fly ashes: fly ashes from wood combustion and fly ashes from municipal solid waste incineration....

  10. Treatment of fly ash for use in concrete

    Science.gov (United States)

    Boxley, Chett [Park City, UT

    2012-05-15

    A process for treating fly ash to render it highly usable as a concrete additive. A quantity of fly ash is obtained that contains carbon and which is considered unusable fly ash for concrete based upon foam index testing. The fly ash is mixed with a quantity of spray dryer ash (SDA) and water to initiate a geopolymerization reaction and form a geopolymerized fly ash. The geopolymerized fly ash is granulated. The geopolymerized fly ash is considered usable fly ash for concrete according to foam index testing. The geopolymerized fly ash may have a foam index less than 40%, and in some cases less than 20%, of the foam index of the untreated fly ash. An optional alkaline activator may be mixed with the fly ash and SDA to facilitate the geopolymerization reaction. The alkaline activator may contain an alkali metal hydroxide, carbonate, silicate, aluminate, or mixtures thereof.

  11. Flying Cities

    DEFF Research Database (Denmark)

    Ciger, Jan

    2006-01-01

    The Flying Cities artistic installation brings to life imaginary cities made from the speech input of visitors. In this article we describe the original interactive process generating real time 3D graphics from spectators' vocal inputs. This example of cross-modal interaction has the nice property....... As the feedback we have received when presenting Flying Cities was very positive, our objective now is to cross the bridge between art and the potential applications to the rehabilitation of people with reduced mobility or for the treatment of language impairments....

  12. Flying Cities

    DEFF Research Database (Denmark)

    Herbelin, Bruno; Lasserre, Sebastien; Ciger, Jan

    2008-01-01

    Flying Cities is an artistic installation which generates imaginary cities from the speech of its visitors. Thanks to an original interactive process analyzing people's vocal input to create 3D graphics, a tangible correspondence between speech and visuals opens new possibilities of interaction....... This cross-modal interaction not only supports our artistic messages, but also aims at providing anyone with a pleasant and stimulating feedback from her/his speech activity. As the feedback we have received when presenting Flying Cities was very positive, our objective is now to cross the bridge between art...

  13. Studies on mating competition of irradiated melon flies

    International Nuclear Information System (INIS)

    Limohpasmanee, W.

    1994-01-01

    Mating competition is the key factor for fruit flies control by using sterile insect technique project. Mass rearing and irradiation can reduce the mating competition of fruit flies. This experiment has purpose to evaluate the mating competition of the irradiated melon fly. The results show that mating competition values of irradiated melon flies were 0.36 and 0.24 when they mated with normal and irradiated females. Both normal male and female can mate more frequency than irradiated flies. (Z=1.322, P<0.05; Z=1.851, P<0.05). The results show that quality of mass rearing and irradiated melon fly was lower than the normal flies. So that quality of irradiated fly must be improved and the number of released flies as less must be higher than natural flies 6 time

  14. Fly ash dynamics in soil-water systems

    International Nuclear Information System (INIS)

    Sharma, S.; Fulekar, M.H.; Jayalakshmi, C.P.

    1989-01-01

    Studies regarding the effluents and coal ashes (or fly ash) resulting from coal burning are numerous, but their disposal and interactions with the soil and water systems and their detailed environmental impact assessment with concrete status reports on a global scale are scanty. Fly ash dynamics in soil and water systems are reviewed. After detailing the physical composition of fly ash, physicochemical changes in soil properties due to fly ash amendment are summarized. Areas covered include texture and bulk density, moisture retention, change in chemical equilibria, and effects of fly ash on soil microorganisms. Plant growth in amended soils is discussed, as well as plant uptake and accumulation of trace elements. In order to analyze the effect of fly ash on the physicochemical properties of water, several factors must be considered, including surface morphology of fly ash, pH of the ash sluice water, pH adjustments, leachability and solubility, and suspended ash and settling. The dynamics of fly ash in water systems is important due to pollution of groundwater resources from toxic components such as trace metals. Other factors summarized are bioaccumulation and biomagnification, human health effects of contaminants, and the impact of radionuclides in fly ash. Future research needs should focus on reduction of the environmental impact of fly ash and increasing utilization of fly ash as a soil amendment. 110 refs., 2 figs., 10 tabs

  15. Hybrid attacks on model-based social recommender systems

    Science.gov (United States)

    Yu, Junliang; Gao, Min; Rong, Wenge; Li, Wentao; Xiong, Qingyu; Wen, Junhao

    2017-10-01

    With the growing popularity of the online social platform, the social network based approaches to recommendation emerged. However, because of the open nature of rating systems and social networks, the social recommender systems are susceptible to malicious attacks. In this paper, we present a certain novel attack, which inherits characteristics of the rating attack and the relation attack, and term it hybrid attack. Furtherly, we explore the impact of the hybrid attack on model-based social recommender systems in multiple aspects. The experimental results show that, the hybrid attack is more destructive than the rating attack in most cases. In addition, users and items with fewer ratings will be influenced more when attacked. Last but not the least, the findings suggest that spammers do not depend on the feedback links from normal users to become more powerful, the unilateral links can make the hybrid attack effective enough. Since unilateral links are much cheaper, the hybrid attack will be a great threat to model-based social recommender systems.

  16. Natural enemies of corn silk flies: Euxesta Stigmatias (Loew, Chaetopsis Massyla (Walker and Eumecosommyia Nubila (Wiedemann in Guasave Sinaloa, México

    Directory of Open Access Journals (Sweden)

    Jesús Ricardo Camacho Báez

    2012-09-01

    Full Text Available The flies species complex of corn, known as “stigma flies”, including the corn-silk fly, Euxesta stigmatias (Loew,Chaetopsis massyla (Walker and Eumecosommyia nubila (Wiedemann, they have became an important pest problem in the state of Sinaloa. The damage is associated with decaying symptoms has severely affected the quality and yield of the crop. The objectives of this research project are to report sampling results on the presence of natural sources of biological control agents (parasitoids, predators, and entomopathogenic nematodes with biological control potential capacity to manage the populations of this flies species complex. This research was conducted during the spring-summer growingseason of 2011. Samples where collected for eight continuous weeks during the corn cob development and maturation. The sampled corn variety was the hybrid Asgrow Garañon. We collected predominat two wasp species belonging to the order Hymenoptera, families Pteromalidae and Eurytomidae, which are parasites to the pupa stage of corn silk fly. In addition, a wasp from the genus Spalangia spp. The latter has shown a stronger natural parasitic effect of 47% on Euxesta stigmatias (Loew. We also observed a population of the pirate bug Orius insidiosus (Say during the months of March-July, attacking several developmental stages of the fly. Soil samples where also processed to isolate and to identify populations of possible entomopathogenic nematodes (EPN. Larvae of Galleria melonella L. where utilized as nematode traps. Populations of nematodes from three different sites where isolated from CIIDIR-IPN Unidad Sinaloa, Guasave and Maximiliano R. Lopez, all located in the Guasave. The isolated populations are included in the Rhabditidae family, genus and specie identification is still in progress. The natural enemies found have shown potential capacity to asseses them asbiological control agents on the corn flies complex.

  17. Gamma irradiation as a quarantine treatment against eggs of Citrus black fly (Aleurocanthus woglumi Ashby)

    International Nuclear Information System (INIS)

    Villavicencio, Anna Lucia C.H.; Araujo, Michel M.; Fanaro, Gustavo B.; Costa, Helbert H.S.F.; Silva, Priscila P.V.; Arthur, Valter

    2009-01-01

    The citrus black fruit fly (Aleurocanthus woglumi Ashby) is an important pest of citrus originated in Southeast Asia and its first record in the new world was in Jamaica in 1913. In Brazil, it was detected in 2001 in the state of Para and more recently it was detected in Sao Paulo in 2008. This pest that attacks over 300 species of plants, but its main host are citrus. It is an A2 quarantine pest, because it is not spread throughout the country. The objective of this study was to test doses of 0 (control), 25, 50, 75, 100, 125, 150, 175 and 200 Gy of gamma irradiation for disinfection of eggs of the citrus black fruit fly in leaves of citrus plants. Treatment consisted of 5 replicates with 60 eggs each. Evaluations were performed in the following periods: 1, 3, 5, 7 and 10 days after irradiation. Under the conditions assayed, it could be concluded that a dose of 200 Gy caused 100% mortality of Aleurocanthus woglumi Ashby eggs and could be recommended as a successful quarantine processing against infested plants. (author)

  18. Formation and utilization of fly ash

    Energy Technology Data Exchange (ETDEWEB)

    Vargyai, J

    1974-01-01

    General problems of slag and fly ash formation and utilization are discussed. The ever-increasing energy demand, and the comeback of coal as an energy carrier in power plants call for efficient solutions to the problem of slag and fly ash. Slag and fly ash are used for concrete in which they partly replace cement. Other possible uses are the amelioration of acid soils, fireclay manufacture, road construction, and tiles. It is possible to recover metals, such as vanadium, iron, aluminum, and radioactive materials from certain types of fly ash and slag. The utilization of fly ash is essential also with respect to the abatement of entrainment from dumps.

  19. Analysis list: Fli1 [Chip-atlas[Archive

    Lifescience Database Archive (English)

    Full Text Available Fli1 Blood,Embryo + mm9 http://dbarchive.biosciencedbc.jp/kyushu-u/mm9/target/Fli1....1.tsv http://dbarchive.biosciencedbc.jp/kyushu-u/mm9/target/Fli1.5.tsv http://dbarchive.biosciencedbc.jp/kyu...shu-u/mm9/target/Fli1.10.tsv http://dbarchive.biosciencedbc.jp/kyushu-u/mm9/colo/Fli1.Blood.tsv,http://dbarchive.bioscience...dbc.jp/kyushu-u/mm9/colo/Fli1.Embryo.tsv http://dbarchive.bioscience...dbc.jp/kyushu-u/mm9/colo/Blood.gml,http://dbarchive.biosciencedbc.jp/kyushu-u/mm9/colo/Embryo.gml ...

  20. An Analysis of Attacks on Blockchain Consensus

    OpenAIRE

    Bissias, George; Levine, Brian Neil; Ozisik, A. Pinar; Andresen, Gavin

    2016-01-01

    We present and validate a novel mathematical model of the blockchain mining process and use it to conduct an economic evaluation of the double-spend attack, which is fundamental to all blockchain systems. Our analysis focuses on the value of transactions that can be secured under a conventional double-spend attack, both with and without a concurrent eclipse attack. Our model quantifies the importance of several factors that determine the attack's success, including confirmation depth, attacke...

  1. Aerodynamic performance enhancement of a flying wing using nanosecond pulsed DBD plasma actuator

    Directory of Open Access Journals (Sweden)

    Han Menghu

    2015-04-01

    Full Text Available Experimental investigation of aerodynamic control on a 35° swept flying wing by means of nanosecond dielectric barrier discharge (NS-DBD plasma was carried out at subsonic flow speed of 20–40 m/s, corresponding to Reynolds number of 3.1 × 105–6.2 × 105. In control condition, the plasma actuator was installed symmetrically on the leading edge of the wing. Lift coefficient, drag coefficient, lift-to-drag ratio and pitching moment coefficient were tested with and without control for a range of angles of attack. The tested results indicate that an increase of 14.5% in maximum lift coefficient, a decrease of 34.2% in drag coefficient, an increase of 22.4% in maximum lift-to-drag ratio and an increase of 2° at stall angle of attack could be achieved compared with the baseline case. The effects of pulsed frequency, amplitude and chord Reynolds number were also investigated. And the results revealed that control efficiency demonstrated strong dependence on pulsed frequency. Moreover, the results of pitching moment coefficient indicated that the breakdown of leading edge vortices could be delayed by plasma actuator at low pulsed frequencies.

  2. Automated classification of computer network attacks

    CSIR Research Space (South Africa)

    Van Heerden, R

    2013-11-01

    Full Text Available according to the relevant types of attack scenarios depicted in the ontology. The two network attack instances are the Distributed Denial of Service attack on SpamHaus in 2013 and the theft of 42 million Rand ($6.7 million) from South African Postbank...

  3. Cyber Attacks and Combat Behavior

    Directory of Open Access Journals (Sweden)

    Carataș Maria Alina

    2017-01-01

    Full Text Available Cyber terrorism is an intangible danger, a real over the corner threat in the life of individuals,organizations, and governments and is getting harder to deal with its damages. The motivations forthe cyber-attacks are different, depending on the terrorist group, from cybercrime to hacktivism,attacks over the authorities’ servers. Organizations constantly need to find new ways ofstrengthening protection against cyber-attacks, assess their cyber readiness, expand the resiliencecapacity and adopts international security regulations.

  4. Attacks on public telephone networks: technologies and challenges

    Science.gov (United States)

    Kosloff, T.; Moore, Tyler; Keller, J.; Manes, Gavin W.; Shenoi, Sujeet

    2003-09-01

    Signaling System 7 (SS7) is vital to signaling and control in America's public telephone networks. This paper describes a class of attacks on SS7 networks involving the insertion of malicious signaling messages via compromised SS7 network components. Three attacks are discussed in detail: IAM flood attacks, redirection attacks and point code spoofing attacks. Depending on their scale of execution, these attacks can produce effects ranging from network congestion to service disruption. Methods for detecting these denial-of-service attacks and mitigating their effects are also presented.

  5. Defense and attack of complex and dependent systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2010-01-01

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  6. Defense and attack of complex and dependent systems

    Energy Technology Data Exchange (ETDEWEB)

    Hausken, Kjell, E-mail: kjell.hausken@uis.n [Faculty of Social Sciences, University of Stavanger, N-4036 Stavanger (Norway)

    2010-01-15

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  7. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica......Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error......-prone and impracticable for large systems. Nonetheless, the automated generation of attack trees has only been explored in connection to computer networks and levering rich models, whose analysis typically leads to an exponential blow-up of the state space. We propose a static analysis approach where attack trees...... are automatically inferred from a process algebraic specification in a syntax-directed fashion, encompassing a great many application domains and avoiding incurring systematically an exponential explosion. Moreover, we show how the standard propositional denotation of an attack tree can be used to phrase...

  8. Pareto Efficient Solutions of Attack-Defence Trees

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2015-01-01

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as proba......Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes......, such as probability or cost of attacks and defences. In case of multiple parameters most analytical methods optimise one parameter at a time, e.g., minimise cost or maximise probability of an attack. Such methods may lead to sub-optimal solutions when optimising conflicting parameters, e.g., minimising cost while...... maximising probability. In order to tackle this challenge, we devise automated techniques that optimise all parameters at once. Moreover, in the case of conflicting parameters our techniques compute the set of all optimal solutions, defined in terms of Pareto efficiency. The developments are carried out...

  9. Extract of the seeds of the plant Vitex agnus castus proven to be highly efficacious as a repellent against ticks, fleas, mosquitoes and biting flies.

    Science.gov (United States)

    Mehlhorn, Heinz; Schmahl, Günter; Schmidt, Jürgen

    2005-03-01

    About 70 plant extracts were tested for their ability to repel the attacks of blood-sucking arthropods. It was found that a CO2 extract of the seeds of the Mediterranean plant Vitex agnus castus (monk's pepper) can be used as a spray to keep away especially Ixodes ricinus and Rhipicephalus sanguineus ticks from animals and humans for at least 6 h. In addition mosquitoes, biting flies and fleas are also repelled for about 6 h.

  10. Cross-site scripting attacks procedure and Prevention Strategies

    Directory of Open Access Journals (Sweden)

    Wang Xijun

    2016-01-01

    Full Text Available Cross-site scripting attacks and defense has been the site of attack and defense is an important issue, this paper, the definition of cross-site scripting attacks, according to the current understanding of the chaos on the cross-site scripting, analyzes the causes and harm cross-site scripting attacks formation of attacks XXS complete process XSS attacks made a comprehensive analysis, and then for the web program includes Mobility there are cross-site scripting filter laxity given from ordinary users browse the web and web application developers two the defense cross-site scripting attacks effective strategy.

  11. Heart Attack Symptoms in Women

    Science.gov (United States)

    ... fat, cholesterol and other substances (plaque). Watch an animation of a heart attack . Many women think the ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  12. Aerodynamics of a thin airfoil flying over and in proximity to a wavy-wall surface. ; Lifting surface theory

    Energy Technology Data Exchange (ETDEWEB)

    Ando, S [Nagoya University, Nagoya (Japan); Ichikawa, M [Government Industrial Research Institute, Nagoya, Nagoya (Japan)

    1991-05-04

    Aerodynamic characteristics of a thin airfoil flying over and in proximity to a wavy-wall surface such as uneven ground or water surface were analyzed two-dimensionally by lifting surface theory in the simplest fundamental case only. The theoretical equation was simplified assuming that flow is inviscid and incompressible, all disturbances are sufficiently small, the wall surface is sinusoidal and rigid, and the wall moves in the same direction as free stream but with a constant velocity different from that of the stream. The equation was verified in the case where an airfoil with a constant angle-of-attack flies over a flat ground surface, and calculations were made with a set of important parameters such as mean airfoil height from the wall, wave length of the wall surface and the wall velocity. The whole effect of wavy wall proximity was divided into the first and second-order ground effects. The first one was just Kemp{prime}s upwash problem, and the second one was revealed through the present study which becomes significant for lower airfoil heights. 18 refs., 5 figs.

  13. On the anatomy of social engineering attacks : A literature-based dissection of successful attacks

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    The aim of this studywas to explore the extent towhich persuasion principles are used in successful social engineering attacks. Seventy-four scenarioswere extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenariowas split into attack steps, containing

  14. DDOS ATTACK DETECTION SIMULATION AND HANDLING MECHANISM

    Directory of Open Access Journals (Sweden)

    Ahmad Sanmorino

    2013-11-01

    Full Text Available In this study we discuss how to handle DDoS attack that coming from the attacker by using detection method and handling mechanism. Detection perform by comparing number of packets and number of flow. Whereas handling mechanism perform by limiting or drop the packets that detected as a DDoS attack. The study begins with simulation on real network, which aims to get the real traffic data. Then, dump traffic data obtained from the simulation used for detection method on our prototype system called DASHM (DDoS Attack Simulation and Handling Mechanism. From the result of experiment that has been conducted, the proposed method successfully detect DDoS attack and handle the incoming packet sent by attacker.

  15. Model checking exact cost for attack scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2017-01-01

    Attack trees constitute a powerful tool for modelling security threats. Many security analyses of attack trees can be seamlessly expressed as model checking of Markov Decision Processes obtained from the attack trees, thus reaping the benefits of a coherent framework and a mature tool support....... However, current model checking does not encompass the exact cost analysis of an attack, which is standard for attack trees. Our first contribution is the logic erPCTL with cost-related operators. The extended logic allows to analyse the probability of an event satisfying given cost bounds and to compute...... the exact cost of an event. Our second contribution is the model checking algorithm for erPCTL. Finally, we apply our framework to the analysis of attack trees....

  16. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  17. Disinfestation of apples attacked by the fruit fly Anastrepha fraterculus (Wied.) (Diptera: Tephritidae) using gamma radiation of cobalt-60

    International Nuclear Information System (INIS)

    Arthur, Valter; Wiendl, Frederico M.

    1996-01-01

    Apples, cv. Gala, artificially infested during 72 hours with adults of the fruit fly Anastrepha fraterculus (Wied.) were irradiated with the following gamma radiation doses: 0 (control), 25, 50, 75 and 100 Gy, at the dose rate of 1048 Gy per hour. After irradiation fruits were put in plastic bags with 80 ml of sugar cane bagasse. The bags were maintained in a rearing room at temperature 21 - 24 deg C, 65 - 75% R H, and photo period of 12 hours. Pupae obtained were sieved out and kept in small glass tubes. All doses tested did not allow emergence of adults. (author)

  18. Flying car design and testing

    OpenAIRE

    Klein, S.; Smrcek, L.

    2009-01-01

    This paper is primarily concerned with the inverted design process and manufacture of a flying car prototype which can overcome the problem of traffic management in the world today. A possible solution to the problem of overcrowded roads would be to design a flying or hovering car. Given technological advances in aircraft construction, navigation and operation, flying cars or personal aircraft are now a feasible proposition. The viability of such a concept was investigated in terms of produci...

  19. Strategies for the stabilization of longitudinal forward flapping flight revealed using a dynamically-scaled robotic fly

    International Nuclear Information System (INIS)

    Elzinga, Michael J; Van Breugel, Floris; Dickinson, Michael H

    2014-01-01

    The ability to regulate forward speed is an essential requirement for flying animals. Here, we use a dynamically-scaled robot to study how flapping insects adjust their wing kinematics to regulate and stabilize forward flight. The results suggest that the steady-state lift and thrust requirements at different speeds may be accomplished with quite subtle changes in hovering kinematics, and that these adjustments act primarily by altering the pitch moment. This finding is consistent with prior hypotheses regarding the relationship between body pitch and flight speed in fruit flies. Adjusting the mean stroke position of the wings is a likely mechanism for trimming the pitch moment at all speeds, whereas changes in the mean angle of attack may be required at higher speeds. To ensure stability, the flapping system requires additional pitch damping that increases in magnitude with flight speed. A compensatory reflex driven by fast feedback of pitch rate from the halteres could provide such damping, and would automatically exhibit gain scheduling with flight speed if pitch torque was regulated via changes in stroke deviation. Such a control scheme would provide an elegant solution for stabilization across a wide range of forward flight speeds. (paper)

  20. Understanding How Components of Organisations Contribute to Attacks

    DEFF Research Database (Denmark)

    Gu, Min; Aslanyan, Zaruhi; Probst, Christian W.

    2016-01-01

    Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors is diffi......Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors...... is difficult. Recently, system models have been used for automatically identifying possible attacks on the modelled organisation. The generated attacks consider all three layers, making the contribution of building infrastructure, computer infrastructure, and humans (insiders and outsiders) explicit. However......, this contribution is only visible in the attack trees as part of the performed steps; it cannot be mapped back to the model directly since the actions usually involve several elements (attacker and targeted actor or asset). Especially for large attack trees, understanding the relations between several model...

  1. Attack Graph Construction for Security Events Analysis

    Directory of Open Access Journals (Sweden)

    Andrey Alexeevich Chechulin

    2014-09-01

    Full Text Available The paper is devoted to investigation of the attack graphs construction and analysis task for a network security evaluation and real-time security event processing. Main object of this research is the attack modeling process. The paper contains the description of attack graphs building, modifying and analysis technique as well as overview of implemented prototype for network security analysis based on attack graph approach.

  2. Automated Discovery of Mimicry Attacks

    National Research Council Canada - National Science Library

    Giffin, Jonathon T; Jha, Somesh; Miller, Barton P

    2006-01-01

    .... These systems are useful only if they detect actual attacks. Previous research developed manually-constructed mimicry and evasion attacks that avoided detection by hiding a malicious series of system calls within a valid sequence allowed by the model...

  3. Are flying-foxes coming to town? Urbanisation of the spectacled flying-fox (Pteropus conspicillatus in Australia.

    Directory of Open Access Journals (Sweden)

    Jessica Tait

    Full Text Available Urbanisation of wildlife populations is a process with significant conservation and management implications. While urban areas can provide habitat for wildlife, some urbanised species eventually come into conflict with humans. Understanding the process and drivers of wildlife urbanisation is fundamental to developing effective management responses to this phenomenon. In Australia, flying-foxes (Pteropodidae are a common feature of urban environments, sometimes roosting in groups of tens of thousands of individuals. Flying-foxes appear to be becoming increasingly urbanised and are coming into increased contact and conflict with humans. Flying-fox management is now a highly contentious issue. In this study we used monitoring data collected over a 15 year period (1998-2012 to examine the spatial and temporal patterns of association of spectacled flying-fox (Pteropus conspicillatus roost sites (camps with urban areas. We asked whether spectacled flying-foxes are becoming more urbanised and test the hypothesis that such changes are associated with anthropogenic changes to landscape structure. Our results indicate that spectacled flying-foxes were more likely to roost near humans than might be expected by chance, that over the period of the study the proportion of the flying-foxes in urban-associated camps increased, as did the number of urban camps. Increased urbanisation of spectacled flying-foxes was not related to changes in landscape structure or to the encroachment of urban areas on camps. Overall, camps tended to be found in areas that were more fragmented, closer to human habitation and with more urban land cover than the surrounding landscape. This suggests that urbanisation is a behavioural response rather than driven by habitat loss.

  4. High-Speed Surface Reconstruction of Flying Birds Using Structured Light

    Science.gov (United States)

    Deetjen, Marc; Lentink, David

    2017-11-01

    Birds fly effectively through complex environments, and in order to understand the strategies that enable them to do so, we need to determine the shape and movement of their wings. Previous studies show that even small perturbations in wing shape have dramatic aerodynamic effects, but these shape changes have not been quantified automatically at high temporal and spatial resolutions. Hence, we developed a custom 3D surface mapping method which uses a high-speed camera to view a grid of stripes projected onto a flying bird. Because the light is binary rather than grayscale, and each frame is separately analyzed, this method can function at any frame rate with sufficient light. The method is automated, non-invasive, and able to measure a volume by simultaneously reconstructing from multiple views. We use this technique to reconstruct the 3D shape of the surface of a parrotlet during flapping flight at 3200 fps. We then analyze key dynamic parameters such as wing twist and angle of attack, and compute aerodynamic parameters such as lift and drag. While this novel system is designed to quantify bird wing shape and motion, it is adaptable for tracking other objects such as quickly deforming fish, especially those which are difficult to reconstruct using other 3D tracking methods. The presenter needs to leave by 3 pm on the final day of the conference (11/21) in order to make his flight. Please account for this in the scheduling if possible by scheduling the presentation earlier in the day or a different day.

  5. Transforming Graphical System Models to Graphical Attack Models

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2016-01-01

    Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations...... approach to transforming graphical system models to graphical attack models in the form of attack trees. Based on an asset in the model, our transformations result in an attack tree that represents attacks by all possible actors in the model, after which the actor in question has obtained the asset....

  6. When Sinuses Attack! (For Kids)

    Science.gov (United States)

    ... First Aid & Safety Doctors & Hospitals Videos Recipes for Kids Kids site Sitio para niños How the Body Works ... Search English Español When Sinuses Attack! KidsHealth / For Kids / When Sinuses Attack! What's in this article? What ...

  7. The importance of being top-heavy: Intrinsic stability of flapping flight

    Science.gov (United States)

    Ristroph, Leif; Liu, Bin; Zhang, Jun

    2011-11-01

    We explore the stability of flapping flight in a model system that consists of a pyramid-shaped object that freely hovers in a vertically oscillating airflow. Such a ``bug'' not only generates sufficient aerodynamic force to keep aloft but also robustly maintains balance during free-flight. Flow visualization reveals that both weight support and intrinsic stability result from the periodic shedding of dipolar vortices. Counter-intuitively, the observed pattern of vortex shedding suggests that stability requires a high center-of-mass, which we verify by comparing the performance of top- and bottom-heavy bugs. Finally, we visit a zoo of other flapping flyers, including Mary Poppins' umbrella, a flying saucer or UFO, and Da Vinci's helicopter.

  8. Heart Attack

    Science.gov (United States)

    ... properly causes your body's blood sugar levels to rise, increasing your risk of heart attack. Metabolic syndrome. This occurs when you have obesity, high blood pressure and high blood sugar. Having metabolic ...

  9. Composites Based on Fly Ash and Clay

    International Nuclear Information System (INIS)

    Fidancevska, E.; Jovanov, V.; Angusheva, B.; Srebrenkoska, V.

    2014-01-01

    Fly ash is a waste generated from the coal combustion during the production of electricity in the thermal power plants. It presents industrial by-product containing Technologically Enhanced Natural Occurring Radioactive Materials (TENORM) with the great potential for valorisation. Fly ash is successfully utilized in cement and concrete industry, also in ceramics industry as component for manufacturing bricks and tiles, and recently there are many investigations for production of glass-ceramics from fly ash. Although the utilization of fly ash in construction and civil engineering is dominant, the development of new alternative application for its further exploitation into new products is needed. This work presents the possibility for fly ash utilization for fabricating dense composites based on clay and fly ash with the potential to be used in construction industry

  10. Software-based Microarchitectural Attacks

    OpenAIRE

    Gruss, Daniel

    2017-01-01

    Modern processors are highly optimized systems where every single cycle of computation time matters. Many optimizations depend on the data that is being processed. Software-based microarchitectural attacks exploit effects of these optimizations. Microarchitectural side-channel attacks leak secrets from cryptographic computations, from general purpose computations, or from the kernel. This leakage even persists across all common isolation boundaries, such as processes, containers, and virtual ...

  11. Integrating cyber attacks within fault trees

    International Nuclear Information System (INIS)

    Nai Fovino, Igor; Masera, Marcelo; De Cian, Alessio

    2009-01-01

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  12. Integrating cyber attacks within fault trees

    Energy Technology Data Exchange (ETDEWEB)

    Nai Fovino, Igor [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy)], E-mail: igor.nai@jrc.it; Masera, Marcelo [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy); De Cian, Alessio [Department of Electrical Engineering, University di Genova, Genoa (Italy)

    2009-09-15

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  13. Attack and Vulnerability Penetration Testing: FreeBSD

    Directory of Open Access Journals (Sweden)

    Abdul Hanan Abdullah

    2013-07-01

    Full Text Available Computer system security has become a major concern over the past few years. Attacks, threasts or intrusions, against computer system and network have become commonplace events. However, there are some system devices and other tools that are available to overcome the threat of these attacks. Currently, cyber attack is a major research and inevitable. This paper presents some steps of penetration in FreeBSD operating system, some tools and new steps to attack used in this experiment, probes for reconnaissance, guessing password via brute force, gaining privilege access and flooding victim machine to decrease availability. All these attacks were executed and infiltrate within the environment of Intrusion Threat Detection Universiti Teknologi Malaysia (ITD UTM data set. This work is expected to be a reference for practitioners to prepare their systems from Internet attacks.

  14. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  15. OpenFlyData: an exemplar data web integrating gene expression data on the fruit fly Drosophila melanogaster.

    Science.gov (United States)

    Miles, Alistair; Zhao, Jun; Klyne, Graham; White-Cooper, Helen; Shotton, David

    2010-10-01

    Integrating heterogeneous data across distributed sources is a major requirement for in silico bioinformatics supporting translational research. For example, genome-scale data on patterns of gene expression in the fruit fly Drosophila melanogaster are widely used in functional genomic studies in many organisms to inform candidate gene selection and validate experimental results. However, current data integration solutions tend to be heavy weight, and require significant initial and ongoing investment of effort. Development of a common Web-based data integration infrastructure (a.k.a. data web), using Semantic Web standards, promises to alleviate these difficulties, but little is known about the feasibility, costs, risks or practical means of migrating to such an infrastructure. We describe the development of OpenFlyData, a proof-of-concept system integrating gene expression data on D. melanogaster, combining Semantic Web standards with light-weight approaches to Web programming based on Web 2.0 design patterns. To support researchers designing and validating functional genomic studies, OpenFlyData includes user-facing search applications providing intuitive access to and comparison of gene expression data from FlyAtlas, the BDGP in situ database, and FlyTED, using data from FlyBase to expand and disambiguate gene names. OpenFlyData's services are also openly accessible, and are available for reuse by other bioinformaticians and application developers. Semi-automated methods and tools were developed to support labour- and knowledge-intensive tasks involved in deploying SPARQL services. These include methods for generating ontologies and relational-to-RDF mappings for relational databases, which we illustrate using the FlyBase Chado database schema; and methods for mapping gene identifiers between databases. The advantages of using Semantic Web standards for biomedical data integration are discussed, as are open issues. In particular, although the performance of open

  16. Recurrent spontaneous attacks of dizziness.

    Science.gov (United States)

    Lempert, Thomas

    2012-10-01

    This article describes the common causes of recurrent vertigo and dizziness that can be diagnosed largely on the basis of history. Ninety percent of spontaneous recurrent vertigo and dizziness can be explained by six disorders: (1) Ménière disease is characterized by vertigo attacks, lasting 20 minutes to several hours, with concomitant hearing loss, tinnitus, and aural fullness. Aural symptoms become permanent during the course of the disease. (2) Attacks of vestibular migraine may last anywhere from minutes to days. Most patients have a previous history of migraine headaches, and many experience migraine symptoms during the attack. (3) Vertebrobasilar TIAs affect older adults with vascular risk factors. Most attacks last less than 1 hour and are accompanied by other symptoms from the posterior circulation territory. (4) Vestibular paroxysmia is caused by vascular compression of the eighth cranial nerve. It manifests itself with brief attacks of vertigo that recur many times per day, sometimes with concomitant cochlear symptoms. (5) Orthostatic hypotension causes brief episodes of dizziness lasting seconds to a few minutes after standing up and is relieved by sitting or lying down. In older adults, it may be accompanied by supine hypertension. (6) Panic attacks usually last minutes, occur in specific situations, and are accompanied by choking, palpitations, tremor, heat, and anxiety. Less common causes of spontaneous recurrent vertigo and dizziness include perilymph fistula, superior canal dehiscence, autoimmune inner ear disease, otosclerosis, cardiac arrhythmia, and medication side effects. Neurologists need to venture into otolaryngology, internal medicine, and psychiatry to master the differential diagnosis of recurrent dizziness.

  17. Flies without centrioles.

    Science.gov (United States)

    Basto, Renata; Lau, Joyce; Vinogradova, Tatiana; Gardiol, Alejandra; Woods, C Geoffrey; Khodjakov, Alexey; Raff, Jordan W

    2006-06-30

    Centrioles and centrosomes have an important role in animal cell organization, but it is uncertain to what extent they are essential for animal development. The Drosophila protein DSas-4 is related to the human microcephaly protein CenpJ and the C. elegans centriolar protein Sas-4. We show that DSas-4 is essential for centriole replication in flies. DSas-4 mutants start to lose centrioles during embryonic development, and, by third-instar larval stages, no centrioles or centrosomes are detectable. Mitotic spindle assembly is slow in mutant cells, and approximately 30% of the asymmetric divisions of larval neuroblasts are abnormal. Nevertheless, mutant flies develop with near normal timing into morphologically normal adults. These flies, however, have no cilia or flagella and die shortly after birth because their sensory neurons lack cilia. Thus, centrioles are essential for the formation of centrosomes, cilia, and flagella, but, remarkably, they are not essential for most aspects of Drosophila development.

  18. Endophagy of biting midges attacking cavity-nesting birds.

    Science.gov (United States)

    Votýpka, J; Synek, P; Svobodová, M

    2009-09-01

    Feeding behaviour, host preferences and the spectrum of available hosts determine the role of vectors in pathogen transmission. Feeding preferences of blood-feeding Diptera depend on, among others factors, the willingness of flies to attack their hosts either in the open (exophagy) or in enclosed places (endophagy). As far as ornithophilic blood-feeding Diptera are concerned, the biting midges (Diptera: Ceratopogonidae) and blackflies (Diptera: Simuliidae) are generally considered to be strictly exophagous. We determined which blood-sucking Diptera enter nest cavities and feed on birds by placing sticky foil traps inside artificial nest boxes. A total of 667 females of eight species of biting midges of the genus Culicoides (Latreille, 1809) were captured on traps during 2006-2007, with Culicoides truncorum (Edwards, 1939) being the dominant species. DNA blood analyses of blood-engorged females proved that midges actually fed on birds nesting in the boxes. Three species were identified as endophagous: Culicoides truncorum, Culicoides pictipennis (Staeger, 1839), and Culicoides minutissimus (Zetterstedt, 1855). Our study represents the first evidence that ornithophilic biting midges are endophagous. The fact that we caught no blackflies in the bird boxes supports the exophagy of blackflies. We believe that our findings are important for surveillance programmes focusing on Diptera that transmit various bird pathogens.

  19. Shark Attack Project - Marine Attack at Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Adrianus J

    2005-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  20. Novel Method For Low-Rate Ddos Attack Detection

    Science.gov (United States)

    Chistokhodova, A. A.; Sidorov, I. D.

    2018-05-01

    The relevance of the work is associated with an increasing number of advanced types of DDoS attacks, in particular, low-rate HTTP-flood. Last year, the power and complexity of such attacks increased significantly. The article is devoted to the analysis of DDoS attacks detecting methods and their modifications with the purpose of increasing the accuracy of DDoS attack detection. The article details low-rate attacks features in comparison with conventional DDoS attacks. During the analysis, significant shortcomings of the available method for detecting low-rate DDoS attacks were found. Thus, the result of the study is an informal description of a new method for detecting low-rate denial-of-service attacks. The architecture of the stand for approbation of the method is developed. At the current stage of the study, it is possible to improve the efficiency of an already existing method by using a classifier with memory, as well as additional information.

  1. Interspecific Mating between Wild and Sterile Fruit Flies of Oriental Fruit Fly, Bactrocera dorsalis (Hendel) with Guava Fruit Fly, Bactrocera correcta (Bezzi) in Cages

    International Nuclear Information System (INIS)

    Pransopon, Prapon; Sutantawong, Manon

    2003-06-01

    Copulation and sperm transfer were observed between wild flies and sterile flies of Bactrocera dorsalis (Hendel) and Bactrocera correcta (Bezzi) in cages. 8-day old pupae of B. dorsalis and B. correcta were irradiated with gamma rays at 90 and 80 gray respectively. Wild flies from infested fruits and sterile flies from artificial diet in the labolatory were used for testing. The experiments were conducted 3 treatments and 3 replications. The ratio of sterile male : wild male: wild female were 3:1:1 by using sterile male of B. dorsalis: wild male of B. correcta : wild female of B. correcta and sterile male of B. correcta: wild male of B. dorsalis: wild female of B. dorsalis as 60:20:20 flies respectively. The experiment found 69 pairs of copulation consisting of 3 mating pairs(4.3%) of wild male with wild female of B. dorsalis, 22 mating pairs (31.9%) of wild male with wild female of B. correcta, 2 mating pairs(2.9%) of sterile male of B dorsalis with wild female of B. correcta, 42 mating pairs(60.9%) of sterile male of B. correcta with wild female of B. dorsalis. The cages which ratio 1:1 consisted of wild B. dorsalis and wild B. correcta (male and female = 50:50 flies) were observed and found that 43 pairs of copulation such as 2 mating pairs (4.6%) of wild male with wild female of B. dorsalis, 26 mating pairs (60.5%) of wild male with wild female of B. correcta, 2 mating pairs(2.9%) of sterile male of B. dorsalis with wild female of B. correcta and 15 mating pairs(34.9%) of wild male of B. correcta with wild female of B. dorsalis. Mated female flies were separated from male flies. Egg hatch and sperm were checked. The hatchability of normal copulation of B. dorsalis and B. correcta were 81 and 90%. The average sperm level in spermathecae of normal copulation of B. dorsalis and B. correcta were 2.2 and 2.3 respectively but had no sperm in their spemathecae of females of interspecific copulations Mating behavior of both species began in the evening before sunset at

  2. Corrosion of 316 stainless steel in high temperature molten Li{sub 2}BeF{sub 4} (FLiBe) salt

    Energy Technology Data Exchange (ETDEWEB)

    Zheng, Guiqiu, E-mail: guiqiuzheng@gmail.com; Kelleher, Brian; Cao, Guoping; Anderson, Mark; Allen, Todd; Sridharan, Kumar

    2015-06-15

    In support of structural material development for the fluoride-salt-cooled high-temperature reactor (FHR), corrosion tests of 316 stainless steel were performed in the potential primary coolant, molten Li{sub 2}BeF{sub 4} (FLiBe) at 700 °C for an exposure duration up to 3000 h. Tests were performed in both 316 stainless steel and graphite capsules. Corrosion in both capsule materials occurred by the dissolution of chromium from the stainless steel into the salt which led to the depletion of chromium predominantly along the grain boundaries of the test samples. The samples tested in graphite capsules showed a factor of two greater depth of corrosion attack as measured in terms of chromium depletion, compared to those tested in 316 stainless steel capsules. The samples tested in graphite capsules showed the formation of Cr{sub 7}C{sub 3} particulate phases throughout the depth of the corrosion layer. Samples tested in both types of capsule materials showed the formation of MoSi{sub 2} phase due to increased activity of Mo and Si as a result of Cr depletion, and furthermore corrosion promoted the formation of a α-ferrite phase in the near-surface regions of the 316 stainless steel. Based on the corrosion tests, the corrosion attack depth in FLiBe salt was predicted as 17.1 μm/year and 31.2 μm/year for 316 stainless steel tested in 316 stainless steel and in graphite capsules respectively. It is in an acceptable range compared to the Hastelloy-N corrosion in the Molten Salt Reactor Experiment (MSRE) fuel salt.

  3. Leaching of saltstones containing fly ash

    International Nuclear Information System (INIS)

    Barnes, M.W.; Roy, D.M.; Langton, C.A.

    1985-01-01

    Two types of fly ash were incorporated in saltstones designed for potential encapsulation of Savannah River Plant low level defense waste. These fly ashes have some cementitious properties while at the same time their presence in substitution for cement slows early hydration. Class C fly ash has a high calcium content and is considered cementitious; Class F fly ash has a low calcium content and is not classified as cementitious. Leach tests were performed and physical properties were measured for saltstones containing each class, to see the differences in the effect of the fly ashes. The four waste ions nitrate, nitrite, sodium and sulfate were shown to leach by diffusion. Effective diffusivities were determined for these ions. Data for nitrate, the most important species from the environmental point of view, are shown in Table A. Saltstones made with Class C fly ash have substantially lower leach rates than those made with Class F fly ash. The leach rates, and therefore the square roots of the effective diffusivities, have been found to be proportional to the pore surface area per unit volume (or the ratio of pore volume to pore radius), to the fraction of waste containing solution, and to the inverse of the fraction of calcium in the saltstone. Rates and diffusivities are not proportional to the water to cement ratio, because this number depends on whether the fly ash is counted as cementitious, as in Class C cement, or not cementitious, as in Class F cement. In fact the relatively small amount of calcium in Class F cement contributes to the cementitious properties overall, though not so much as Class C cement. 4 refs., 2 figs., 6 tabs

  4. Heart Attack

    Science.gov (United States)

    ... family history of heart attack race – African Americans, Mexican Americans, Native Americans, and native Hawaiians are at ... Your doctor will prescribe the medicines that are right for you. If you have had a heart ...

  5. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  6. Further attacks on Yeung-Mintzer fragile watermarking scheme

    Science.gov (United States)

    Fridrich, Jessica; Goljan, Miroslav; Memon, Nasir D.

    2000-05-01

    In this paper, we describe new and improved attacks on the authentication scheme previously proposed by Yeung and Mintzer. Previous attacks assumed that the binary watermark logo inserted in an image for the purposes of authentication was known. Here we remove that assumption and show how the scheme is still vulnerable, even if the binary logo is not known but the attacker has access to multiple images that have been watermarked with the same secret key and contain the same (but unknown) logo. We present two attacks. The first attack infers the secret watermark insertion function and the binary logo, given multiple images authenticated with the same key and containing the same logo. We show that a very good approximation to the logo and watermark insertion function can be constructed using as few as two images. With color images, one needs many more images, nevertheless the attack is still feasible. The second attack we present, which we call the 'collage-attack' is a variation of the Holliman-Memon counterfeiting attack. The proposed variation does not require knowledge of the watermark logo and produces counterfeits of superior quality by means of a suitable dithering process that we develop.

  7. Pareto Efficient Solution of Attack-Defence Trees

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as

  8. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  9. Genetic attack on neural cryptography

    International Nuclear Information System (INIS)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-01-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size

  10. Genetic attack on neural cryptography

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  11. Attacks on the AJPS Mersenne-based cryptosystem

    NARCIS (Netherlands)

    K. de Boer (Koen); L. Ducas (Léo); S. Jeffery (Stacey); R. M. de Wolf (Ronald)

    2018-01-01

    textabstractAggarwal, Joux, Prakash and Santha recently introduced a new potentially quantum-safe public-key cryptosystem, and suggested that a brute-force attack is essentially optimal against it. They consider but then dismiss both Meet-in-the-Middle attacks and LLL-based attacks. Very soon after

  12. The political attack ad

    Directory of Open Access Journals (Sweden)

    Palma Peña-Jiménez, Ph.D.

    2011-01-01

    Full Text Available During election campaigns the political spot has a clear objective: to win votes. This message is communicated to the electorate through television and Internet, and usually presents a negative approach, which includes a direct critical message against the opponent, rather than an exposition of proposals. This article is focused on the analysis of the campaign attack video ad purposely created to encourage the disapproval of the political opponent among voters. These ads focus on discrediting the opponent, many times, through the transmission of ad hominem messages, instead of disseminating the potential of the political party and the virtues and manifesto of its candidate. The article reviews the development of the attack ad since its first appearance, which in Spain dates back to 1996, when the famous Doberman ad was broadcast, and examines the most memorable campaign attack ads.

  13. Robust Detection of Stepping-Stone Attacks

    National Research Council Canada - National Science Library

    He, Ting; Tong, Lang

    2006-01-01

    The detection of encrypted stepping-stone attack is considered. Besides encryption and padding, the attacker is capable of inserting chaff packets and perturbing packet timing and transmission order...

  14. Properties of Fly Ash Blocks Made from Adobe Mould

    Science.gov (United States)

    Chokhani, Alankrit; Divakar, B. S.; Jawalgi, Archana S.; Renukadevi, M. V.; Jagadish, K. S.

    2018-06-01

    Fly ash being one of the industrial waste products poses a serious disposal problem. This paper presents an experimental study of utilization of fly ash to produce blocks with varying proportions and mix combinations. Composition of fly ash blocks mainly consist of fly ash and sand, with cementitious product as either cement, lime or both, such as fly ash-sand-cement, fly ash-sand-lime and fly ash-sand-cement-lime are used. Four different proportions for each of the mix combinations are experimented. Compressive strength, water absorption, Initial rate of absorption, and dry density of fly ash blocks are studied. The influence of partial and complete replacement of cement by lime is examined.

  15. Properties of Fly Ash Blocks Made from Adobe Mould

    Science.gov (United States)

    Chokhani, Alankrit; Divakar, B. S.; Jawalgi, Archana S.; Renukadevi, M. V.; Jagadish, K. S.

    2018-02-01

    Fly ash being one of the industrial waste products poses a serious disposal problem. This paper presents an experimental study of utilization of fly ash to produce blocks with varying proportions and mix combinations. Composition of fly ash blocks mainly consist of fly ash and sand, with cementitious product as either cement, lime or both, such as fly ash-sand-cement, fly ash-sand-lime and fly ash-sand-cement-lime are used. Four different proportions for each of the mix combinations are experimented. Compressive strength, water absorption, Initial rate of absorption, and dry density of fly ash blocks are studied. The influence of partial and complete replacement of cement by lime is examined.

  16. A Framework for Attack-Resilient Industrial Control Systems : Attack Detection and Controller Reconfiguration

    OpenAIRE

    Paridari, Kaveh; O'Mahony, Niamh; Mady, Alie El-Din; Chabukswar, Rohan; Boubekeur, Menouer; Sandberg, Henrik

    2017-01-01

    Most existing industrial control systems (ICSs), such as building energy management systems (EMSs), were installed when potential security threats were only physical. With advances in connectivity, ICSs are now, typically, connected to communications networks and, as a result, can be accessed remotely. This extends the attack surface to include the potential for sophisticated cyber attacks, which can adversely impact ICS operation, resulting in service interruption, equipment damage, safety c...

  17. An Adaptive Approach for Defending against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Muhai Li

    2010-01-01

    Full Text Available In various network attacks, the Distributed Denial-of-Service (DDoS attack is a severe threat. In order to deal with this kind of attack in time, it is necessary to establish a special type of defense system to change strategy dynamically against attacks. In this paper, we introduce an adaptive approach, which is used for defending against DDoS attacks, based on normal traffic analysis. The approach can check DDoS attacks and adaptively adjust its configurations according to the network condition and attack severity. In order to insure the common users to visit the victim server that is being attacked, we provide a nonlinear traffic control formula for the system. Our simulation test indicates that the nonlinear control approach can prevent the malicious attack packets effectively while making legitimate traffic flows arrive at the victim.

  18. Countermeasures for unintentional and intentional video watermarking attacks

    Science.gov (United States)

    Deguillaume, Frederic; Csurka, Gabriela; Pun, Thierry

    2000-05-01

    These last years, the rapidly growing digital multimedia market has revealed an urgent need for effective copyright protection mechanisms. Therefore, digital audio, image and video watermarking has recently become a very active area of research, as a solution to this problem. Many important issues have been pointed out, one of them being the robustness to non-intentional and intentional attacks. This paper studies some attacks and proposes countermeasures applied to videos. General attacks are lossy copying/transcoding such as MPEG compression and digital/analog (D/A) conversion, changes of frame-rate, changes of display format, and geometrical distortions. More specific attacks are sequence edition, and statistical attacks such as averaging or collusion. Averaging attack consists of averaging locally consecutive frames to cancel the watermark. This attack works well for schemes which embed random independent marks into frames. In the collusion attack the watermark is estimated from single frames (based on image denoising), and averaged over different scenes for better accuracy. The estimated watermark is then subtracted from each frame. Collusion requires that the same mark is embedded into all frames. The proposed countermeasures first ensures robustness to general attacks by spread spectrum encoding in the frequency domain and by the use of an additional template. Secondly, a Bayesian criterion, evaluating the probability of a correctly decoded watermark, is used for rejection of outliers, and to implement an algorithm against statistical attacks. The idea is to embed randomly chosen marks among a finite set of marks, into subsequences of videos which are long enough to resist averaging attacks, but short enough to avoid collusion attacks. The Bayesian criterion is needed to select the correct mark at the decoding step. Finally, the paper presents experimental results showing the robustness of the proposed method.

  19. Link-layer Jamming Attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    2004-01-01

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  20. Link-layer jamming attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  1. A computer network attack taxonomy and ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-01-01

    Full Text Available of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example, after the launch of a DDOS (Distributed Denial of Service) attack, zombie computers may still connect to the target...-scrap- value-of-a-hacked-pc-revisited/ . Lancor, L., & Workman, R. (2007). Using Google Hacking to Enhance Defense Strategies. ACM SIGCSE Bulletin, 39 (1), 491-495. Lau, F., Rubin, S. H., Smith, M. H., & Trajkovic, L. (2000). Distributed Denial of Service...

  2. Unified communications forensics anatomy of common UC attacks

    CERN Document Server

    Grant, Nicholas Mr

    2013-01-01

    Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: analysis of forensic artifacts in common UC attacks an in-depth look at established UC technologies and attack exploits hands-on understanding of UC attack vectors and associated countermeasures

  3. Plant growth on 'fly ash'

    Energy Technology Data Exchange (ETDEWEB)

    Holliday, R; Hodgson, D R; Townsend, W N; Wood, J W

    1958-04-12

    Plants were grown in plot and pot experiments to assess the toxicity of the fly ash. It was found that plants grouped into three classes: tolerant, moderately tolerant, and sensitive. Boron was found to be a major compoent of the toxic principle of fly ash.

  4. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  5. Future fly ash marketing; Flugaschevermarktung in der Zukunft

    Energy Technology Data Exchange (ETDEWEB)

    Mauder, R.; Hugot, A. [Evonik Power Minerals GmbH, Dinslaken (Germany)

    2008-07-01

    It can be assumed that the fly ash production volumes will undergo a marked increase over the next few years. The conditions of fly ash production will improve as a result of modern and refurbished power plants, yielding a positive effect on the quality of fly ashes. Other vital parameters of future fly ash marketing are fly ash logistics and the infrastructure of power plants. Basically, economic utilisation of the increased production volumes is possible; however, new and long-term strategies are necessary. (orig.)

  6. Characteristics of hot spots of melon fly, Bactrocera (Dacus) cucurbitae Coquillett (Diptera: Tephritidae) in sterile fly release areas on Okinawa island [Japan

    International Nuclear Information System (INIS)

    Nakamori, H.; Shiga, M.; Kinjo, K.

    1993-01-01

    The spatio-temporal dynamics of populations of the melon fly, Bactrocera (Dacus) cucurbitae COQUILLETT, in the southern part of Okinawa Island where an eradication program using sterile flies has been conducted, were analyzed in relation to the seasonal succession and abundance of wild and cultivated host fruits. The study areas were classified into four major zones according to the seasonal abundance of flies caught by cue-lure traps and the availability of host fruits including Diplocyclos palmatus, Melothria liukiuensis and Momordica charantia var. pevel. Zone-I is characterized by the continuous presence of host fruits and a relatively-high population density of the melon fly indicated by the cue-lure trap catch of more than 1, 000 flies per 1, 000 traps per day throughout the year. Zone-II has a characteristic decline in both number of host fruits and fly density during the fall-winter period with an annual average of less than 1, 000 flies per 1, 000 traps per day. Zone-III includes areas where host fruits and flies (about 1 fly/trap/day) were relatively abundant only during the winter-spring period. Zone-IV is characterized by constantly low availability of host fruits and low fly density throughout the year. Hot spots, which are defined as areas where the ratio of sterile to wild flies hardly increases despite frequent and intensive release of sterile flies, were found in the Zone-I areas. Therefore, the continuous presence and abundance of host fruits appears to hot spots. For effective control of this species, it is essential to locate such areas and release sterile flies

  7. Classifying network attack scenarios using an ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-03-01

    Full Text Available ) or to the target?s reputation. The Residue sub-phase refers to damage or artefacts of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example after the launch of a DDOS..., A. (1995). Hacking theft of $10 million from citibank revealed. Retrieved 10/10, 2011, from http://articles.latimes.com/1995-08-19/business/fi-36656_1_citibank-system Hurley, E. (2004). SCO site succumbs to DDoS attack. Retrieved 10/10, 2011, from...

  8. Modelling Social-Technical Attacks with Timed Automata

    DEFF Research Database (Denmark)

    David, Nicolas; David, Alexandre; Hansen, Rene Rydhof

    2015-01-01

    . In this paper we develop an approach towards modelling socio-technical systems in general and socio-technical attacks in particular, using timed automata and illustrate its application by a complex case study. Thanks to automated model checking and automata theory, we can automatically generate possible attacks...... in our model and perform analysis and simulation of both model and attack, revealing details about the specific interaction between attacker and victim. Using timed automata also allows for intuitive modelling of systems, in which quantities like time and cost can be easily added and analysed....

  9. Quantitative Verification and Synthesis of Attack-Defence Scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    2016-01-01

    analysis of quantitative properties of complex attack-defence scenarios, using an extension of attack-defence trees which models temporal ordering of actions and allows explicit dependencies in the strategies adopted by attackers and defenders. We adopt a game-theoretic approach, translating attack...... which guarantee or optimise some quantitative property, such as the probability of a successful attack, the expected cost incurred, or some multi-objective trade-off between the two. We implement our approach, building upon the PRISM-games model checker, and apply it to a case study of an RFID goods...

  10. Situational awareness of a coordinated cyber attack

    Science.gov (United States)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  11. Quality characteristics of Greek fly ashes and potential uses

    Energy Technology Data Exchange (ETDEWEB)

    Skodras, G.; Grammelis, P.; Kakaras, E. [Institute for Solid Fuels Technology and Applications, Ptolemais (Greece); Karangelos, D.; Anagnostakis, M.; Hinis, E. [Nuclear Engineering Section, Mechanical Engineering Department, National Technical University of Athens, Athens (Greece)

    2007-01-15

    The main characteristics of fly ash from Greek coal-fired boilers are presented in this paper in relation to its exploitation potential. Both fuel and fly ash samples were collected and analyzed according to the ASTM Standards. Apart from the typical analyses (proximate, ultimate, ash analysis and calorific value), an ICP-AES spectrometer was used for the analysis of heavy metals in the ash. Experimental measurements in order to determine the radioactivity content of raw fuel and the fly ash were carried out as well. A representative fly ash sample from Ptolemais power plant was evaluated and tested as filler in Self-Compacting Concrete (SCC). Ashes from the Greek brown coal are classified in type C, most of the fly ash being produced in Ptolemais of Northern Greece, while the rest in Megalopolis. Ptolemais fly ash is rich in calcium compounds, while Megalopolis fly ash contains more pyrite. Increased heavy metal concentrations are observed in the fly ash samples of Greek coal. Greek fly ash appears to have not only pozzolanic but also hydraulic behaviour. Furthermore, Greek fly ash, depending on its origin, may have relatively high natural radioactivity content, reaching in the case of Megalopolis fly ash 1 kBq kg{sup -1} of {sup 226}Ra. The laboratory results showed that fly ashes can be a competitive substitute to conventional limestone filler material in SCC. Fly ash is mostly used in Greece in cement industry replacing cement clinker and aiming to the production of special types of Portland cements. However, a more aggressive utilisation strategy should be developed, since low quantities of the total produced fly ash are currently further utilised. (author)

  12. Anti-discrimination Analysis Using Privacy Attack Strategies

    KAUST Repository

    Ruggieri, Salvatore

    2014-09-15

    Social discrimination discovery from data is an important task to identify illegal and unethical discriminatory patterns towards protected-by-law groups, e.g., ethnic minorities. We deploy privacy attack strategies as tools for discrimination discovery under hard assumptions which have rarely tackled in the literature: indirect discrimination discovery, privacy-aware discrimination discovery, and discrimination data recovery. The intuition comes from the intriguing parallel between the role of the anti-discrimination authority in the three scenarios above and the role of an attacker in private data publishing. We design strategies and algorithms inspired/based on Frèchet bounds attacks, attribute inference attacks, and minimality attacks to the purpose of unveiling hidden discriminatory practices. Experimental results show that they can be effective tools in the hands of anti-discrimination authorities.

  13. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  14. Simulation of Attacks for Security in Wireless Sensor Network.

    Science.gov (United States)

    Diaz, Alvaro; Sanchez, Pablo

    2016-11-18

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node's software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work.

  15. Simulation of Attacks for Security in Wireless Sensor Network

    Science.gov (United States)

    Diaz, Alvaro; Sanchez, Pablo

    2016-01-01

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node’s software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work. PMID:27869710

  16. Can Escherichia coli fly? The role of flies as transmitters of E. coli to food in an urban slum in Bangladesh.

    Science.gov (United States)

    Lindeberg, Yrja Lisa; Egedal, Karen; Hossain, Zenat Zebin; Phelps, Matthew; Tulsiani, Suhella; Farhana, Israt; Begum, Anowara; Jensen, Peter Kjaer Mackie

    2018-01-01

    To investigate the transmission of faecal bacteria by flies to food under natural settings. Over a period of 2 months, paired (exposed and non-exposed) containers with cooked rice were placed on the ground in kitchen areas in an urban slum area in Dhaka, Bangladesh, and the numbers of flies landing on the exposed rice were counted. Following exposure, the surface of the rice was microbiologically and molecularly analysed for the presence of Escherichia coli and genes of diarrhoeagenic E. coli and Shigella strains. Rice was at greater risk (P E. coli if flies landed on the rice than if no flies landed on the rice (odds ratio 5·4 (P 0·6 × 103 CFU. Genes of diarrhoeagenic E. coli and Shigella species were detected in 39 of 60 (65%) of exposed rice samples. Two fly species were identified: the common housefly (Musca domestica) and the oriental latrine fly (Chrysomya megacephala). Flies may transmit large quantities of E. coli to food under field settings. The findings highlight the importance of implementing control measures to minimise exposure of food to flies to ensure food safety. Fly control measures should be considered for the prevention of diarrhoeal diseases caused by E. coli. © 2017 John Wiley & Sons Ltd.

  17. Using agility to combat cyber attacks.

    Science.gov (United States)

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  18. Effect of using FLiBe and FLiNaBe molten salts bearing plutonium fluorides on the neutronic performance of PACER

    International Nuclear Information System (INIS)

    Acir, Adem

    2012-01-01

    In this paper, the effects of using FLiBe and FLiNaBe Molten Salts Bearing Plutonium Fluorides on the neutronic performance of the PACER are investigated. The optimum radial thickness for tritium self-sufficiency of the blankets addition of plutonium fluorides to FLiNaBe (LiF-/NaF BeF 2 ) and FLiBe (LiF-/BeF 2 ) of a dual purpose modified PACER concept are determined. The calculations are carried out with the one dimensional transport code XSDRNPM/SCALE5. The tritium breeding capacities of FLiNaBe and FLiBe with addition of plutonium fluorides in molten salt zone are investigated and compared. The optimum molten salt zone thickness is computed as 155 cm for tritium self-sufficiency of the blankets using FLiBe +1% PuF 4 whereas, the optimum thickness with FLiNaBe +1% PuF 4 is calculated as 170 cm. In addition, neutron transport calculations have been performed to evaluate the energy multiplication factor, total fission rate, displacement per atom and helium gas generation for optimal radial thickness in the blanket. Also, the tritium production and the radiation damage limits should be evaluated together in a fusion blanket for determining the optimum thickness of molten salt layer. (orig.)

  19. Women's Heart Disease: Heart Attack Symptoms

    Science.gov (United States)

    ... of this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter ... most common heart attack symptom in men and women is chest pain or discomfort. However, women also ...

  20. A novel proposed network security management approach for cyber attacks

    International Nuclear Information System (INIS)

    Ahmed, Z.; Nazir, B.; Zafar, M.F.; Anwar, M.M.; Azam, K.; Asar, A.U.

    2007-01-01

    Network security is a discipline that focuses on securing networks from unauthorized access. Given the Escalating threats of malicious cyber attacks, modern enterprises employ multiple lines of defense. A comprehensive defense strategy against such attacks should include (I) an attack detection component that deter- mines the fact that a program is compromised, (2) an attack identification and prevention component that identifies attack packets so that one can block such packets in the future and prevents the attack from further propagation. Over the last decade, a significant amount of research has been vested in the systems that can detect cyber attacks either statically at compile time or dynamically at run time, However, not much effort is spent on automated attack packet identification or attack prevention. In this paper we present a unified solution to the problems mentioned above. We implemented this solution after the forward engineering of Open Source Security Information Management (OSSIM) system called Preventive Information Security management (PrISM) system that correlates input from different sensors so that the resulting product can automatically detect any cyber attack against it and prevents by identifying the actual attack packet(s). The PrISM was always able to detect the attacks, identify the attack packets and most often prevent by blocking the attacker's IP address to continue normal execution. There is no additional run-time performance overhead for attack prevention. (author)

  1. Surface treated fly ash filled modified epoxy composites

    Directory of Open Access Journals (Sweden)

    Uma Dharmalingam

    2015-01-01

    Full Text Available Abstract Fly ash, an inorganic alumino silicate has been used as filler in epoxy matrix, but it reduces the mechanical properties due to its poor dispersion and interfacial bonding with the epoxy matrix. To improve its interfacial bonding with epoxy matrix, surface treatment of fly ash was done using surfactant sodium lauryl sulfate and silane coupling agent glycidoxy propyl trimethoxy silane. An attempt is also made to reduce the particle size of fly ash using high pressure pulverizer. To improve fly ash dispersion in epoxy matrix, the epoxy was modified by mixing with amine containing liquid silicone rubber (ACS. The effect of surface treated fly ash with varying filler loadings from 10 to 40% weight on the mechanical, morphological and thermal properties of modified epoxy composites was investigated. The surface treated fly ash was characterized by particle size analyzer and FTIR spectra. Morphological studies of surface treated fly ash filled modified epoxy composites indicate good dispersion of fillers in the modified epoxy matrix and improves its mechanical properties. Impact strength of the surface treated fly ash filled modified epoxy composites show more improvement than unmodified composites.

  2. Adaptive optimisation-offline cyber attack on remote state estimator

    Science.gov (United States)

    Huang, Xin; Dong, Jiuxiang

    2017-10-01

    Security issues of cyber-physical systems have received increasing attentions in recent years. In this paper, deception attacks on the remote state estimator equipped with the chi-squared failure detector are considered, and it is assumed that the attacker can monitor and modify all the sensor data. A novel adaptive optimisation-offline cyber attack strategy is proposed, where using the current and previous sensor data, the attack can yield the largest estimation error covariance while ensuring to be undetected by the chi-squared monitor. From the attacker's perspective, the attack is better than the existing linear deception attacks to degrade the system performance. Finally, some numerical examples are provided to demonstrate theoretical results.

  3. Cyber-physical attacks a growing invisible threat

    CERN Document Server

    Loukas, George

    2015-01-01

    Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building's lights, make a car veer off the road,  or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism. The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means. Perpetrators can now cause damage without the same risk, and without the political, social, or moral

  4. Flying the Needles: Flight Deck Automation Erodes Fine-Motor Flying Skills Among Airline Pilots.

    Science.gov (United States)

    Haslbeck, Andreas; Hoermann, Hans-Juergen

    2016-06-01

    The aim of this study was to evaluate the influence of practice and training on fine-motor flying skills during a manual instrument landing system (ILS) approach. There is an ongoing debate that manual flying skills of long-haul crews suffer from a lack of flight practice due to conducting only a few flights per month and the intensive use of automation. However, objective evidence is rare. One hundred twenty-six randomly selected airline pilots had to perform a manual flight scenario with a raw data precision approach. Pilots were assigned to four equal groups according to their level of practice and training by fleet (short-haul, long-haul) and rank (first officer, captain). Average ILS deviation scores differed significantly in relation to the group assignments. The strongest predictor variable was fleet, indicating degraded performance among long-haul pilots. Manual flying skills are subject to erosion due to a lack of practice on long-haul fleets: All results support the conclusion that recent flight practice is a significantly stronger predictor for fine-motor flying performance than the time period since flight school or even the total or type-specific flight experience. Long-haul crews have to be supported in a timely manner by adequate training tailored to address manual skills or by operational provisions like mixed-fleet flying or more frequent transitions between short-haul and long-haul operation. © 2016, Human Factors and Ergonomics Society.

  5. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  6. Flying Training Capacity Model: Initial Results

    National Research Council Canada - National Science Library

    Lynch, Susan

    2005-01-01

    OBJECTIVE: (1) Determine the flying training capacity for 6 bases: * Sheppard AFB * Randolph AFB * Moody AFB * Columbus AFB * Laughlin AFB * Vance AFB * (2) Develop versatile flying training capacity simulation model for AETC...

  7. Louse flies on birds of Baja California

    OpenAIRE

    Tella, José Luis; Rodríguez-Estrella, Ricardo; Blanco, Guillermo

    2000-01-01

    Louse flies were collected from 401 birds of 32 species captured in autumn of 1996 in Baja California Sur (México). Only one louse fly species (Microlynchia pusilla) was found. It occurred in four of the 164 common ground doves (Columbina passerina) collected. This is a new a host species for this louse fly.

  8. A fatal elephant attack.

    Science.gov (United States)

    Hejna, Petr; Zátopková, Lenka; Safr, Miroslav

    2012-01-01

    A rare case of an elephant attack is presented. A 44-year-old man working as an elephant keeper was attacked by a cow elephant when he tripped over a foot chain while the animal was being medically treated. The man fell down and was consequently repeatedly attacked with elephant tusks. The man sustained multiple stab injuries to both groin regions, a penetrating injury to the abdominal wall with traumatic prolapse of the loops of the small bowel, multiple defects of the mesentery, and incomplete laceration of the abdominal aorta with massive bleeding into the abdominal cavity. In addition to the penetrating injuries, the man sustained multiple rib fractures with contusion of both lungs and laceration of the right lobe of the liver, and comminuted fractures of the pelvic arch and left femoral body. The man died shortly after he had been received at the hospital. The cause of death was attributed to traumatic shock. © 2011 American Academy of Forensic Sciences.

  9. Eradicating tsetse flies: Senegal nears first victory

    International Nuclear Information System (INIS)

    Dixit, Aabha

    2015-01-01

    After a four-year eradication programme including nuclear techniques, the Niayes region of Senegal is now almost free of the tsetse fly, which used to decimate livestock. “I have not seen a single tsetse fly for a year now,” said cattle farmer Oumar Sow. “This is in contrast to earlier, when they increased in numbers, especially during the cold season. The flies were really a nuisance to our animals and we had to carefully select the time for milking. Now, there is no problem with that.” The tsetse fly is a bloodsucking insect that kills more than three million livestock in sub-Saharan Africa every year, costing the agriculture industry more than US $4 billion annually. The tsetse fly transmits parasites that cause a wasting disease called nagana in cattle. In some parts of Africa the fly also causes over 75 000 cases of human ‘sleeping sickness’, which affects the central nervous system, and causes disorientation, personality changes, slurred speech, seizures, difficulty walking and talking, and ultimately death.

  10. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  11. False Positive and False Negative Effects on Network Attacks

    Science.gov (United States)

    Shang, Yilun

    2018-01-01

    Robustness against attacks serves as evidence for complex network structures and failure mechanisms that lie behind them. Most often, due to detection capability limitation or good disguises, attacks on networks are subject to false positives and false negatives, meaning that functional nodes may be falsely regarded as compromised by the attacker and vice versa. In this work, we initiate a study of false positive/negative effects on network robustness against three fundamental types of attack strategies, namely, random attacks (RA), localized attacks (LA), and targeted attack (TA). By developing a general mathematical framework based upon the percolation model, we investigate analytically and by numerical simulations of attack robustness with false positive/negative rate (FPR/FNR) on three benchmark models including Erdős-Rényi (ER) networks, random regular (RR) networks, and scale-free (SF) networks. We show that ER networks are equivalently robust against RA and LA only when FPR equals zero or the initial network is intact. We find several interesting crossovers in RR and SF networks when FPR is taken into consideration. By defining the cost of attack, we observe diminishing marginal attack efficiency for RA, LA, and TA. Our finding highlights the potential risk of underestimating or ignoring FPR in understanding attack robustness. The results may provide insights into ways of enhancing robustness of network architecture and improve the level of protection of critical infrastructures.

  12. The Mexican Fruit Fly Eradication Programme

    Energy Technology Data Exchange (ETDEWEB)

    Reyes F, Jesus; Santiago M, Guillermo; Hernandez M, Porfirio [Comision Nacional de Sanidad Agropecuaria (Mexico)

    2000-07-01

    The goal of the Mexican Fruit Fly Eradication Programme is to control, suppress or eradicate from Mexico four species of fruit flies of economic and quarantine importance (Anastrepha ludens Loew, A. obliqua Macquart, A. serpentina Wied. and A. striata Schiner). These pests cause damage amounting to US$710 million per year. In addition to this cost, there are other expenses from pest control actions and the loss of international markets, because fruit importing countries have established stringent quarantine measures to restrict the entry of these pests. For purposes of the programme's implementation, Mexico was divided into three working zones, defined by agro-ecological characteristics, the number of fruit fly species present and the size of fruit growing regions. In addition, a cost:benefit analysis was carried out which indicated that the rate of return, in a 12-year time frame, might be as much as 33:1 in Northern Mexico, and 17:1 in the rest of the country, for an area over 100,000 hectares. Eradication technology involves: 1) surveys of pest populations by trapping and host fruit harvesting to monitor the presence and density of fruit flies, 2) reduction of pest populations applying cultural practices and using selective bait sprays, 3) mass release of sterile flies and augmentative release of parasitoids to eliminate populations and, 4) enforcement of quarantine measures to protect fruit fly free areas.

  13. The Mexican Fruit Fly Eradication Programme

    International Nuclear Information System (INIS)

    Reyes F, Jesus; Santiago M, Guillermo; Hernandez M, Porfirio

    2000-01-01

    The goal of the Mexican Fruit Fly Eradication Programme is to control, suppress or eradicate from Mexico four species of fruit flies of economic and quarantine importance (Anastrepha ludens Loew, A. obliqua Macquart, A. serpentina Wied. and A. striata Schiner). These pests cause damage amounting to US$710 million per year. In addition to this cost, there are other expenses from pest control actions and the loss of international markets, because fruit importing countries have established stringent quarantine measures to restrict the entry of these pests. For purposes of the programme's implementation, Mexico was divided into three working zones, defined by agro-ecological characteristics, the number of fruit fly species present and the size of fruit growing regions. In addition, a cost:benefit analysis was carried out which indicated that the rate of return, in a 12-year time frame, might be as much as 33:1 in Northern Mexico, and 17:1 in the rest of the country, for an area over 100,000 hectares. Eradication technology involves: 1) surveys of pest populations by trapping and host fruit harvesting to monitor the presence and density of fruit flies, 2) reduction of pest populations applying cultural practices and using selective bait sprays, 3) mass release of sterile flies and augmentative release of parasitoids to eliminate populations and, 4) enforcement of quarantine measures to protect fruit fly free areas

  14. Machine Learning Methods for Attack Detection in the Smart Grid.

    Science.gov (United States)

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.

  15. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. ...

  16. Application distribution model and related security attacks in VANET

    Science.gov (United States)

    Nikaein, Navid; Kanti Datta, Soumya; Marecar, Irshad; Bonnet, Christian

    2013-03-01

    In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker`s model as an extension to the work done in [6]. Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e.g. malware, spamming and phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.

  17. Nonepileptic attack disorder among married women.

    Science.gov (United States)

    Dhanaraj, M; Rangaraj, R; Arulmozhi, T; Vengatesan, A

    2005-06-01

    To study the clinical features, precipitating stressful life events and prognosis of nonepileptic attack disorder (NEAD) among married women. Prospective cohort study with 1-year follow-up. A tertiary care teaching hospital. Of the 1020 patients with epilepsy referred to the epilepsy clinic during 2002-2003, 30 were married women with NEAD. The diagnostic criteria for NEAD included normal EEG during ictal and post-ictal phase of the generalized 'attack.' The data collected included clinical characteristics, semiology of the attacks, precipitating stressful events, and co-morbid psychiatric disorders. The control group included 30 age-matched married women with generalized tonic-clonic seizures. The long-term outcome and factors influencing the outcomes were analyzed. The mean duration of illness was 18 months, and the pattern of the attack was 'fall and lying still' in 53% and 'fall with generalized motor movements' in 47%. The frequency was one or more per week in 57% and occasionally in 43%. The important stressful events were matrimonial discord following illegal relationship of the husband with another woman (chi2 = 9.02, P = 0.003) and constant quarrel with other family members (chi2 = 5.19, P = 0.02). The prevalence of sexual abuse was low (7%). Co-morbid psychiatric disorder was observed in 70%. At the end of 1 year, 39% were free from the attack. Resolution of the stressful life events (chi2 = 4.52, P = 0.03) and lower frequency of attack at the time of reporting (chi2 = 3.88, P = 0.05) correlated with good outcomes. Among patients with NEAD in India, the major precipitating factors were matrimonial discord following illegal relationship of the husband with another woman and constant quarrel with other family members and not sexual abuse. Women with low frequency of attack at the time of reporting and the remission of the stressful events had better outcomes.

  18. Effect of four commercial fungal formulations on mortality and sporulation of house flies (Musca domestica) and stable flies (Stomoxys calcitrans)

    Science.gov (United States)

    House flies (Musca domestica L.) and stable flies (Stomoxys calcitrans (L.)) (Diptera: Muscidae) are major pests of livestock. Biological control is an important tool in an integrated control framework. Increased mortality in filth flies has been documented with entomopathogenic fungi, and several s...

  19. Subclinical endophthalmitis following a rooster attack.

    Science.gov (United States)

    Lekse Kovach, Jaclyn; Maguluri, Srilakshmi; Recchia, Franco M

    2006-12-01

    Ocular injury resulting from rooster attacks is rarely reported in the literature. Sadly, the target of these attacks is most often children younger than 3 years old, whose naiveté of the aggressive, territorial behavior of birds can place them at risk. Acute sequelae of these attacks can result in a lifetime of visual impairment. The possibility of a subacute or occult infection is an unusual occurrence that must always be considered. In an effort to prevent future attacks and ocular casualties, we present a case of a 12-month-old boy who suffered an open globe following a rooster attack. The open globe was emergently repaired. One week later, a white cataract was noticed on examination in the absence of systemic or ocular signs of inflammation. Traumatic endophthalmitis and lenticular abscess were suspected during examination under anesthesia. Vitrectomy, lensectomy, and injection of intravitreal antibiotics were performed. Culture of lenticular and vitreous aspirates grew alpha-streptococcus. Alpha-streptococcal endophthalmitis can result from ocular injuries caused by rooster pecking. The infection may present insidiously and without typical ocular or systemic symptoms or signs. Management is challenging and may require surgery.

  20. Flies and Campylobacter infection of broiler flocks

    DEFF Research Database (Denmark)

    Hald, Birthe; Skovgård, Henrik; Bang, Dang Duong

    2004-01-01

    A total of 8.2% of flies caught outside a broiler house in Denmark had the potential to transmit Campylobacter jejuni to chickens, and hundreds of flies per day passed through the ventilation system into the broiler house. Our study suggests that flies may be an important source of Campylobacter ...... infection of broiler flocks in summer....

  1. Experimental investigation of lift enhancement for flying wing aircraft using nanosecond DBD plasma actuators

    Science.gov (United States)

    Yao, Junkai; Zhou, Danjie; He, Haibo; He, Chengjun; Shi, Zhiwei; Du, Hai

    2017-04-01

    The effects of the arrangement position and control parameters of nanosecond dielectric barrier discharge (NS-DBD) plasma actuators on lift enhancement for flying wing aircraft were investigated through wind tunnel experiments at a flow speed of 25 m s-1. The aerodynamic forces and moments were obtained by a six-component balance at angles of attack ranging from -4° to 28°. The lift, drag and pitching moment coefficients were compared for the cases with and without plasma control. The results revealed that the maximum control effect was achieved by placing the actuator at the leading edge of the inner and middle wing, for which the maximum lift coefficient increased by 37.8% and the stall angle of attack was postponed by 8° compared with the plasma-off case. The effects of modulation frequency and discharge voltage were also investigated. The results revealed that the lift enhancement effect of the NS-DBD plasma actuators was strongly influenced by the modulation frequency. Significant control effects were obtained at f = 70 Hz, corresponding to F + ≈ 1. The result for the pitching moment coefficient demonstrated that the plasma actuator can induce the reattachment of the separation flows when it is actuated. However, the results indicated that the discharge voltage had a negligible influence on the lift enhancement effect.

  2. Robustness analysis of interdependent networks under multiple-attacking strategies

    Science.gov (United States)

    Gao, Yan-Li; Chen, Shi-Ming; Nie, Sen; Ma, Fei; Guan, Jun-Jie

    2018-04-01

    The robustness of complex networks under attacks largely depends on the structure of a network and the nature of the attacks. Previous research on interdependent networks has focused on two types of initial attack: random attack and degree-based targeted attack. In this paper, a deliberate attack function is proposed, where six kinds of deliberate attacking strategies can be derived by adjusting the tunable parameters. Moreover, the robustness of four types of interdependent networks (BA-BA, ER-ER, BA-ER and ER-BA) with different coupling modes (random, positive and negative correlation) is evaluated under different attacking strategies. Interesting conclusions could be obtained. It can be found that the positive coupling mode can make the vulnerability of the interdependent network to be absolutely dependent on the most vulnerable sub-network under deliberate attacks, whereas random and negative coupling modes make the vulnerability of interdependent network to be mainly dependent on the being attacked sub-network. The robustness of interdependent network will be enhanced with the degree-degree correlation coefficient varying from positive to negative. Therefore, The negative coupling mode is relatively more optimal than others, which can substantially improve the robustness of the ER-ER network and ER-BA network. In terms of the attacking strategies on interdependent networks, the degree information of node is more valuable than the betweenness. In addition, we found a more efficient attacking strategy for each coupled interdependent network and proposed the corresponding protection strategy for suppressing cascading failure. Our results can be very useful for safety design and protection of interdependent networks.

  3. Optimizing power system investments and resilience against attacks

    International Nuclear Information System (INIS)

    Fang, Yiping; Sansavini, Giovanni

    2017-01-01

    This paper studies the combination of capacity expansion and switch installation in electric systems that ensures optimum performance under nominal operations and attacks. The planner–attacker–defender model is adopted to develop decisions that minimize investment and operating costs, and functionality loss after attacks. The model bridges long-term system planning for transmission expansion and short-term switching operations in reaction to attacks. The mixed-integer optimization is solved by decomposition via two-layer cutting plane algorithm. Numerical results on an IEEE system shows that small investments in transmission line switching enhance resilience by responding to disruptions via system reconfiguration. Sensitivity analyses show that transmission planning under the assumption of small-scale attacks provides the most robust strategy, i.e. the minimum-regret planning, if many constraints and limited investment budget affect the planning. On the other hand, the assumption of large-scale attacks provides the most robust strategy if the planning process involves large flexibility and budget. - Highlights: • Investment optimization in power systems under attacks is presented. • Capacity expansion and switch installation for system reconfiguration are combined. • The problem is solved by decomposition via two-layer cutting plane algorithm. • Small investments in switch installation enhance resilience by response to attacks. • Sensitivity analyses identify robust planning against different attack scenarios.

  4. Attacker Modelling in Ubiquitous Computing Systems

    DEFF Research Database (Denmark)

    Papini, Davide

    in with our everyday life. This future is visible to everyone nowadays: terms like smartphone, cloud, sensor, network etc. are widely known and used in our everyday life. But what about the security of such systems. Ubiquitous computing devices can be limited in terms of energy, computing power and memory...... attacker remain somehow undened and still under extensive investigation. This Thesis explores the nature of the ubiquitous attacker with a focus on how she interacts with the physical world and it denes a model that captures the abilities of the attacker. Furthermore a quantitative implementation...

  5. Peacetime Use of Computer Network Attack

    National Research Council Canada - National Science Library

    Busby, Daniel

    2000-01-01

    .... PDD-63 alerts the nation to prepare for impending cyber attacks. This paper examines the nature, scale, and likelihood of cyber attacks posited in PDD-63 and finds that the country does not face an imminent "electronic Pearl Harbor...

  6. Schlieren photography on freely flying hawkmoth.

    Science.gov (United States)

    Liu, Yun; Roll, Jesse; Van Kooten, Stephen; Deng, Xinyan

    2018-05-01

    The aerodynamic force on flying insects results from the vortical flow structures that vary both spatially and temporally throughout flight. Due to these complexities and the inherent difficulties in studying flying insects in a natural setting, a complete picture of the vortical flow has been difficult to obtain experimentally. In this paper, Schlieren , a widely used technique for highspeed flow visualization, was adapted to capture the vortex structures around freely flying hawkmoth ( Manduca ). Flow features such as leading-edge vortex, trailing-edge vortex, as well as the full vortex system in the wake were visualized directly. Quantification of the flow from the Schlieren images was then obtained by applying a physics-based optical flow method, extending the potential applications of the method to further studies of flying insects. © 2018 The Author(s).

  7. House Fly (Musca domestica L. Attraction to Insect Honeydew.

    Directory of Open Access Journals (Sweden)

    Kim Y Hung

    Full Text Available House flies are of major concern as vectors of food-borne pathogens to food crops. House flies are common pests on cattle feedlots and dairies, where they develop in and feed on animal waste. By contacting animal waste, house flies can acquire human pathogenic bacteria such as Escherichia coli and Salmonella spp., in addition to other bacteria, viruses, or parasites that may infect humans and animals. The subsequent dispersal of house flies from animal facilities to nearby agricultural fields containing food crops may lead to pre-harvest food contamination with these pathogens. We hypothesized that odors from honeydew, the sugary excreta produced by sucking insects feeding on crops, or molds and fungi growing on honeydew, may attract house flies, thereby increasing the risk of food crop contamination. House fly attraction to honeydew-contaminated plant material was evaluated using a laboratory bioassay. House flies were attracted to the following plant-pest-honeydew combinations: citrus mealybug on squash fruit, pea aphid on faba bean plants, whitefly on navel orange and grapefruit leaves, and combined citrus mealybug and cottony cushion scale on mandarin orange leaves. House flies were not attracted to field-collected samples of lerp psyllids on eucalyptus plants or aphids on crepe myrtle leaves. Fungi associated with field-collected honeydews were isolated and identified for further study as possible emitters of volatiles attractive to house flies. Two fungal species, Aureobasidium pullulans and Cladosporium cladosporioides, were repeatedly isolated from field-collected honeydew samples. Both fungal species were grown in potato dextrose enrichment broth and house fly attraction to volatiles from these fungal cultures was evaluated. House flies were attracted to odors from A. pullulans cultures but not to those of C. cladosporioides. Identification of specific honeydew odors that are attractive to house flies could be valuable for the

  8. House Fly (Musca domestica L.) Attraction to Insect Honeydew.

    Science.gov (United States)

    Hung, Kim Y; Michailides, Themis J; Millar, Jocelyn G; Wayadande, Astri; Gerry, Alec C

    2015-01-01

    House flies are of major concern as vectors of food-borne pathogens to food crops. House flies are common pests on cattle feedlots and dairies, where they develop in and feed on animal waste. By contacting animal waste, house flies can acquire human pathogenic bacteria such as Escherichia coli and Salmonella spp., in addition to other bacteria, viruses, or parasites that may infect humans and animals. The subsequent dispersal of house flies from animal facilities to nearby agricultural fields containing food crops may lead to pre-harvest food contamination with these pathogens. We hypothesized that odors from honeydew, the sugary excreta produced by sucking insects feeding on crops, or molds and fungi growing on honeydew, may attract house flies, thereby increasing the risk of food crop contamination. House fly attraction to honeydew-contaminated plant material was evaluated using a laboratory bioassay. House flies were attracted to the following plant-pest-honeydew combinations: citrus mealybug on squash fruit, pea aphid on faba bean plants, whitefly on navel orange and grapefruit leaves, and combined citrus mealybug and cottony cushion scale on mandarin orange leaves. House flies were not attracted to field-collected samples of lerp psyllids on eucalyptus plants or aphids on crepe myrtle leaves. Fungi associated with field-collected honeydews were isolated and identified for further study as possible emitters of volatiles attractive to house flies. Two fungal species, Aureobasidium pullulans and Cladosporium cladosporioides, were repeatedly isolated from field-collected honeydew samples. Both fungal species were grown in potato dextrose enrichment broth and house fly attraction to volatiles from these fungal cultures was evaluated. House flies were attracted to odors from A. pullulans cultures but not to those of C. cladosporioides. Identification of specific honeydew odors that are attractive to house flies could be valuable for the development of improved house

  9. House Fly (Musca domestica L.) Attraction to Insect Honeydew

    Science.gov (United States)

    Hung, Kim Y.; Michailides, Themis J.; Millar, Jocelyn G.; Wayadande, Astri; Gerry, Alec C.

    2015-01-01

    House flies are of major concern as vectors of food-borne pathogens to food crops. House flies are common pests on cattle feedlots and dairies, where they develop in and feed on animal waste. By contacting animal waste, house flies can acquire human pathogenic bacteria such as Escherichia coli and Salmonella spp., in addition to other bacteria, viruses, or parasites that may infect humans and animals. The subsequent dispersal of house flies from animal facilities to nearby agricultural fields containing food crops may lead to pre-harvest food contamination with these pathogens. We hypothesized that odors from honeydew, the sugary excreta produced by sucking insects feeding on crops, or molds and fungi growing on honeydew, may attract house flies, thereby increasing the risk of food crop contamination. House fly attraction to honeydew-contaminated plant material was evaluated using a laboratory bioassay. House flies were attracted to the following plant-pest-honeydew combinations: citrus mealybug on squash fruit, pea aphid on faba bean plants, whitefly on navel orange and grapefruit leaves, and combined citrus mealybug and cottony cushion scale on mandarin orange leaves. House flies were not attracted to field-collected samples of lerp psyllids on eucalyptus plants or aphids on crepe myrtle leaves. Fungi associated with field-collected honeydews were isolated and identified for further study as possible emitters of volatiles attractive to house flies. Two fungal species, Aureobasidium pullulans and Cladosporium cladosporioides, were repeatedly isolated from field-collected honeydew samples. Both fungal species were grown in potato dextrose enrichment broth and house fly attraction to volatiles from these fungal cultures was evaluated. House flies were attracted to odors from A. pullulans cultures but not to those of C. cladosporioides. Identification of specific honeydew odors that are attractive to house flies could be valuable for the development of improved house

  10. Tsetse flies and their control.

    Science.gov (United States)

    Rogers, D J; Hendrickx, G; Slingenbergh, J H

    1994-12-01

    The authors use a quantitative modelling framework to describe and explore the features of the biology of tsetse flies (Glossina spp.) which are important in determining the rate of transmission of the African trypanosomiases between hosts. Examples are presented of the contribution of previous research on tsetse to quantified epidemiological and epizootiological understanding, and areas of current ignorance are identified for future study. Spatial and temporal variations in risk are important (but rarely-studied) determinants of the impact of trypanosomiasis on humans, domestic animals and agricultural activities. Recent grid-based sampling surveys to Togo provide valuable data sets on tsetse, cattle and trypanosomiasis throughout the country. A combination of ground-based meterological and remotely-sensed satellite data, within linear discriminant analytical models, enables description of the observed distributions of the five species of tsetse occurring in Togo, with accuracies of between 72% (Glossina palpalis and G. tachinoides) and 98% (G. fusca). Abundance classes of the two most widespread species, G. palpalis and G. tachinoides, are described with accuracies of between 47% and 83%. This is especially remarkable given the relatively small differences between the average values of the predictor variables in areas of differing fly abundance. Similar analyses could be used to predict the occurrence and abundance of flies in other areas, which have not been surveyed to date, in order to plan tsetse control campaigns or explore development options. Finally, some recent tsetse control campaigns are briefly reviewed. The shift of emphasis from fly eradication to fly control is associated with a devolution of responsibility for control activities from central government to local areas, communities or even individuals. The future role of central governments will remain crucial, however, in determining the areas in which different control options are practised, in

  11. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    Directory of Open Access Journals (Sweden)

    Khaled Elleithy

    2005-02-01

    Full Text Available A denial of service attack (DOS is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack will be simulated against a Microsoft Windows 95 computer. The TCP SYN Flood attack will be simulated against a Microsoft Windows 2000 IIS FTP Server. Distributed DOS will be demonstrated by simulating a distribution zombie program that will carry the Ping of Death attack. This paper will demonstrate the potential damage from DOS attacks and analyze the ramifications of the damage.

  12. Attacks on IEEE 802.11 wireless networks

    Directory of Open Access Journals (Sweden)

    Dejan Milan Tepšić

    2013-06-01

    Full Text Available Security of wireless computer networks was initially secured with the WEP security protocol, which relies on the RC4 encryption algorithm and the CRC algorithm to check the integrity. The basic problems of the WEP are a short initialization vector, unsafe data integrity checking, using a common key, the lack of mechanisms for management and exchange of keys, the lack of protection from the endless insertion of the same package into the network, the lack of authentication of access points and the like. The consequences of these failures are easy attacks against the WEP network, namely their complete insecurity. Therefore, the work began on the IEEE 802.11i protocol, which should radically improve the security of wireless networks. Since the development of a protocol lasted, the WPA standard was released to offset the security gap caused by the WEP. The WPA also relies on RC4 and CRC algorithms, but brings temporary keys and the MIC algorithm for data integrity. The 802.1X authentication was introduced and common keys are no longer needed, since it is possible to use an authentication server. The length of the initialization vector was increased and the vector is obtained based on the packet serial number, in order to prevent the insertion of the same packet into the network. The weakness of the WPA security mechanism is the use of a common key. WPA2 (802.11i later appeared. Unlike the WPA mechanism that worked on old devices with the replacement of software, WPA2 requires new network devices that can perform AES encryption. AES replaces the RC4 algorithm and delivers much greater security. Data integrity is protected by encryption. Despite progress, there are still weaknesses in wireless networks. Attacks for denial of service are possible as well as spoofing package headers attacks. For now, it is not advisable to use wireless networks in environments where unreliability and unavailability are not tolerated. Introduction In the entire history of

  13. Temporal Cyber Attack Detection.

    Energy Technology Data Exchange (ETDEWEB)

    Ingram, Joey Burton [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Draelos, Timothy J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Galiardi, Meghan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Doak, Justin E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Rigorous characterization of the performance and generalization ability of cyber defense systems is extremely difficult, making it hard to gauge uncertainty, and thus, confidence. This difficulty largely stems from a lack of labeled attack data that fully explores the potential adversarial space. Currently, performance of cyber defense systems is typically evaluated in a qualitative manner by manually inspecting the results of the system on live data and adjusting as needed. Additionally, machine learning has shown promise in deriving models that automatically learn indicators of compromise that are more robust than analyst-derived detectors. However, to generate these models, most algorithms require large amounts of labeled data (i.e., examples of attacks). Algorithms that do not require annotated data to derive models are similarly at a disadvantage, because labeled data is still necessary when evaluating performance. In this work, we explore the use of temporal generative models to learn cyber attack graph representations and automatically generate data for experimentation and evaluation. Training and evaluating cyber systems and machine learning models requires significant, annotated data, which is typically collected and labeled by hand for one-off experiments. Automatically generating such data helps derive/evaluate detection models and ensures reproducibility of results. Experimentally, we demonstrate the efficacy of generative sequence analysis techniques on learning the structure of attack graphs, based on a realistic example. These derived models can then be used to generate more data. Additionally, we provide a roadmap for future research efforts in this area.

  14. Africa and the tsetse fly

    International Nuclear Information System (INIS)

    1985-01-01

    Trypanosomiasis, an infection transmitted by the tsetse fly and causing sleeping sickness in man and Nagana disease in animals, is widespread in Africa. It affects 37 countries (an area as large as the United States) and leads to great losses in the national economy. It can be fought effectively by programmes to eradicate the tsetse fly with the sterile insect technique. The film shows the tsetse habitats and biology and demonstrates how its reproduction circle can be interrupted by sterilization of male flies with gamma rays. This method has proven an effective alternative to the use of pesticides because its efficiency increases with each generation and it causes no environmental pollution problems

  15. Africa and the tsetse fly

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1986-12-31

    Trypanosomiasis, an infection transmitted by the tsetse fly and causing sleeping sickness in man and Nagana disease in animals, is widespread in Africa. It affects 37 countries (an area as large as the United States) and leads to great losses in the national economy. It can be fought effectively by programmes to eradicate the tsetse fly with the sterile insect technique. The film shows the tsetse habitats and biology and demonstrates how its reproduction circle can be interrupted by sterilization of male flies with gamma rays. This method has proven an effective alternative to the use of pesticides because its efficiency increases with each generation and it causes no environmental pollution problems

  16. 12 CFR 263.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  17. 12 CFR 509.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding....17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  18. Detection of complex cyber attacks

    Science.gov (United States)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  19. Vulnerability Assessment by Learning Attack Specifications in Graphs

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; Lopes, Raul H.C.

    This paper presents an evolutionary approach for learning attack specifications that describe attack scenarios. The objective is to find vulnerabilities in computer networks which minimise the cost of an attack with maximum impact. Although we focus on Insider Threat, the proposed approach applies

  20. Attack Tree Generation by Policy Invalidation

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Naeem Akram, R.; Jajodia, S.

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identi﬿cation. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identi﬿ed

  1. Neural network classifier of attacks in IP telephony

    Science.gov (United States)

    Safarik, Jakub; Voznak, Miroslav; Mehic, Miralem; Partila, Pavol; Mikulec, Martin

    2014-05-01

    Various types of monitoring mechanism allow us to detect and monitor behavior of attackers in VoIP networks. Analysis of detected malicious traffic is crucial for further investigation and hardening the network. This analysis is typically based on statistical methods and the article brings a solution based on neural network. The proposed algorithm is used as a classifier of attacks in a distributed monitoring network of independent honeypot probes. Information about attacks on these honeypots is collected on a centralized server and then classified. This classification is based on different mechanisms. One of them is based on the multilayer perceptron neural network. The article describes inner structure of used neural network and also information about implementation of this network. The learning set for this neural network is based on real attack data collected from IP telephony honeypot called Dionaea. We prepare the learning set from real attack data after collecting, cleaning and aggregation of this information. After proper learning is the neural network capable to classify 6 types of most commonly used VoIP attacks. Using neural network classifier brings more accurate attack classification in a distributed system of honeypots. With this approach is possible to detect malicious behavior in a different part of networks, which are logically or geographically divided and use the information from one network to harden security in other networks. Centralized server for distributed set of nodes serves not only as a collector and classifier of attack data, but also as a mechanism for generating a precaution steps against attacks.

  2. The influence of sex and fly species on the development of trypanosomes in tsetse flies.

    Directory of Open Access Journals (Sweden)

    Lori Peacock

    Full Text Available Unlike other dipteran disease vectors, tsetse flies of both sexes feed on blood and transmit pathogenic African trypanosomes. During transmission, Trypanosoma brucei undergoes a complex cycle of proliferation and development inside the tsetse vector, culminating in production of infective forms in the saliva. The insect manifests robust immune defences throughout the alimentary tract, which eliminate many trypanosome infections. Previous work has shown that fly sex influences susceptibility to trypanosome infection as males show higher rates of salivary gland (SG infection with T. brucei than females. To investigate sex-linked differences in the progression of infection, we compared midgut (MG, proventriculus, foregut and SG infections in male and female Glossina morsitans morsitans. Initially, infections developed in the same way in both sexes: no difference was observed in numbers of MG or proventriculus infections, or in the number and type of developmental forms produced. Female flies tended to produce foregut migratory forms later than males, but this had no detectable impact on the number of SG infections. The sex difference was not apparent until the final stage of SG invasion and colonisation, showing that the SG environment differs between male and female flies. Comparison of G. m. morsitans with G. pallidipes showed a similar, though less pronounced, sex difference in susceptibility, but additionally revealed very different levels of trypanosome resistance in the MG and SG. While G. pallidipes was more refractory to MG infection, a very high proportion of MG infections led to SG infection in both sexes. It appears that the two fly species use different strategies to block trypanosome infection: G. pallidipes heavily defends against initial establishment in the MG, while G. m. morsitans has additional measures to prevent trypanosomes colonising the SG, particularly in female flies. We conclude that the tsetse-trypanosome interface works

  3. Ge extraction from gasification fly ash

    Energy Technology Data Exchange (ETDEWEB)

    Oriol Font; Xavier Querol; Angel Lopez-Soler; Jose M. Chimenos; Ana I. Fernandez; Silvia Burgos; Francisco Garcia Pena [Institute of Earth Sciences ' Jaume Almera' , Barcelona (Spain)

    2005-08-01

    Water-soluble germanium species (GeS{sub 2}, GeS and hexagonal-GeO{sub 2}) are generated during coal gasification and retained in fly ash. This fact together with the high market value of this element and the relatively high contents in the fly ashes of the Puertollano Integrated Gasification in Combined Cycle (IGCC) plant directed our research towards the development of an extraction process for this element. Major objectives of this research was to find a low cost and environmentally suitable process. Several water based extraction tests were carried out using different Puertollano IGCC fly ash samples, under different temperatures, water/fly ash ratios, and extraction times. High Ge extraction yields (up to 84%) were obtained at room temperature (25{sup o}C) but also high proportions of other trace elements (impurities) were simultaneously extracted. Increasing the extraction temperature to 50, 90 and 150{sup o}C, Ge extraction yields were kept at similar levels, while reducing the content of impurities, the water/fly ash ratio and extraction time. The experimental data point out the influence of chloride, calcium and sulphide dissolutions on the Ge extraction. 16 refs., 9 figs., 6 tabs.

  4. SCADA system vulnerabilities to cyber attack

    Energy Technology Data Exchange (ETDEWEB)

    Shaw, W. T. [Cyber Security Consulting (Canada)

    2004-10-01

    The susceptibility to terrorist attacks of computer-based supervisory control (SCADA) systems that are used to monitor and control water distribution systems, oil and gas pipelines and the electrical grid, is discussed. The discussion includes ways in which SCADA systems may be attacked and remedial actions that may be taken to reduce or eliminate the possibility of such attacks. Attacks may take the form of causing the system to generate false data to divert attention from impending system disasters, or commandeer the system to seriously disable it, or cause damage to the process or equipment being controlled by sending improper control commands. SCADA systems are also vulnerable to internal threats, either from an accidental action that results in damage, or an intentional action, as for example by a disgruntled employee, or ex-employee, usually by way of reprogramming an RTU or PLC by accessing the polling/communications circuit. Recent SCADA systems are much more susceptible to concerted cyber attacks because of the adoption of IT technologies and standards into the design of such systems. (Older systems are more likely to be unique designs, hence less susceptible to attack). As far as protection of SCADA systems is concerned, there are no technologies that would prevent a technologically sophisticated terrorist or disgruntled employee from doing major damage to the system, however, the IT world has developed a range of technologies for the protection of IT assets, and many of these same technologies can also be used to safeguard modern SCADA systems.

  5. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  6. Acidolysis of coal fly ash by Aspergillus niger

    Energy Technology Data Exchange (ETDEWEB)

    Torma, A.E.; Singh, A.K. (EG and G Idaho Inc., Idaho Falls, ID (United States). Center for Biological Processing Technology)

    1993-12-01

    The kinetics of aluminium extraction were investigated, using as-received and calcined fly ash samples and a pure culture of [ital Aspergillus niger]. This fungus metabolized sucrose to citric and oxalic acids, which were involved in the acidolysis of fly ash. Aluminium extraction from as-received fly ash was only 5-8%, whereas from calcined fly ash it was up to 93.5%. The order of reaction and the overall reaction rate constant were determined by the van't Hoff technique with respect to the concentration of calcined fly ash. A linearized form of a modified Monod expression was applied to the experimental data to assess the kinetic constants for the acidolysis process. Statistically designed experiments were carried out with calcined fly ash and synthetic solutions containing citric and oxalic acids to determine the optimum leaching conditions. The acidolysis reaction mechanism is discussed. 28 refs., 6 figs., 3 tabs.

  7. Attack Methodology Analysis: Emerging Trends in Computer-Based Attack Methodologies and Their Applicability to Control System Networks

    Energy Technology Data Exchange (ETDEWEB)

    Bri Rolston

    2005-06-01

    Threat characterization is a key component in evaluating the threat faced by control systems. Without a thorough understanding of the threat faced by critical infrastructure networks, adequate resources cannot be allocated or directed effectively to the defense of these systems. Traditional methods of threat analysis focus on identifying the capabilities and motivations of a specific attacker, assessing the value the adversary would place on targeted systems, and deploying defenses according to the threat posed by the potential adversary. Too many effective exploits and tools exist and are easily accessible to anyone with access to an Internet connection, minimal technical skills, and a significantly reduced motivational threshold to be able to narrow the field of potential adversaries effectively. Understanding how hackers evaluate new IT security research and incorporate significant new ideas into their own tools provides a means of anticipating how IT systems are most likely to be attacked in the future. This research, Attack Methodology Analysis (AMA), could supply pertinent information on how to detect and stop new types of attacks. Since the exploit methodologies and attack vectors developed in the general Information Technology (IT) arena can be converted for use against control system environments, assessing areas in which cutting edge exploit development and remediation techniques are occurring can provide significance intelligence for control system network exploitation, defense, and a means of assessing threat without identifying specific capabilities of individual opponents. Attack Methodology Analysis begins with the study of what exploit technology and attack methodologies are being developed in the Information Technology (IT) security research community within the black and white hat community. Once a solid understanding of the cutting edge security research is established, emerging trends in attack methodology can be identified and the gap between

  8. Fruit fly eradication: Argentina

    International Nuclear Information System (INIS)

    2003-01-01

    Fruit exports account for 9% of Argentina's total agricultural exports and generate annually close to $450 million. This could be increased but for fruit flies that cause damage equivalent to 15% to 20% of present production value of fruit and also deny export access to countries imposing quarantine barriers. The Department of Technical Co-operation is sponsoring a programme, with technical support from the Joint FAO/IAEA Division, to eradicate the Mediterranean fruit fly using the Sterile Insect Technique (SIT). (IAEA)

  9. Trace Attack against Biometric Mobile Applications

    Directory of Open Access Journals (Sweden)

    Sanaa Ghouzali

    2016-01-01

    Full Text Available With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen. Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy.

  10. Limit Asthma Attacks Caused by Colds or Flu

    Science.gov (United States)

    Asthma: Limit asthma attacks caused by colds or flu A cold or the flu can trigger an asthma attack. Here's why — and how to keep your sneeze ... plan. If you notice warning signs of an asthma attack — such as coughing, wheezing, chest tightness or shortness ...

  11. Quantitative Attack Tree Analysis via Priced Timed Automata

    NARCIS (Netherlands)

    Kumar, Rajesh; Ruijters, Enno Jozef Johannes; Stoelinga, Mariëlle Ida Antoinette; Sankaranarayanan, Sriram; Vicario, Enrico

    The success of a security attack crucially depends on the resources available to an attacker: time, budget, skill level, and risk appetite. Insight in these dependencies and the most vulnerable system parts is key to providing effective counter measures. This paper considers attack trees, one of the

  12. Finite Energy and Bounded Actuator Attacks on Cyber-Physical Systems

    Energy Technology Data Exchange (ETDEWEB)

    Djouadi, Seddik M [ORNL; Melin, Alexander M [ORNL; Ferragut, Erik M [ORNL; Laska, Jason A [ORNL; Dong, Jin [ORNL; Drira, Anis [ORNL

    2015-01-01

    As control system networks are being connected to enterprise level networks for remote monitoring, operation, and system-wide performance optimization, these same connections are providing vulnerabilities that can be exploited by malicious actors for attack, financial gain, and theft of intellectual property. Much effort in cyber-physical system (CPS) protection has focused on protecting the borders of the system through traditional information security techniques. Less effort has been applied to the protection of cyber-physical systems from intelligent attacks launched after an attacker has defeated the information security protections to gain access to the control system. In this paper, attacks on actuator signals are analyzed from a system theoretic context. The threat surface is classified into finite energy and bounded attacks. These two broad classes encompass a large range of potential attacks. The effect of theses attacks on a linear quadratic (LQ) control are analyzed, and the optimal actuator attacks for both finite and infinite horizon LQ control are derived, therefore the worst case attack signals are obtained. The closed-loop system under the optimal attack signals is given and a numerical example illustrating the effect of an optimal bounded attack is provided.

  13. Modeling attacker-defender interactions in information networks.

    Energy Technology Data Exchange (ETDEWEB)

    Collins, Michael Joseph

    2010-09-01

    The simplest conceptual model of cybersecurity implicitly views attackers and defenders as acting in isolation from one another: an attacker seeks to penetrate or disrupt a system that has been protected to a given level, while a defender attempts to thwart particular attacks. Such a model also views all non-malicious parties as having the same goal of preventing all attacks. But in fact, attackers and defenders are interacting parts of the same system, and different defenders have their own individual interests: defenders may be willing to accept some risk of successful attack if the cost of defense is too high. We have used game theory to develop models of how non-cooperative but non-malicious players in a network interact when there is a substantial cost associated with effective defensive measures. Although game theory has been applied in this area before, we have introduced some novel aspects of player behavior in our work, including: (1) A model of how players attempt to avoid the costs of defense and force others to assume these costs; (2) A model of how players interact when the cost of defending one node can be shared by other nodes; and (3) A model of the incentives for a defender to choose less expensive, but less effective, defensive actions.

  14. Guidance for packing, shipping, holding and release of sterile flies in area-wide fruit fly control programmes

    International Nuclear Information System (INIS)

    Enkerlin, W.

    2007-01-01

    This guidance represents the recommendations, reached by consensus of an international group of experts, on the standard procedures for the packing, shipping, holding and release of mass reared and sterilized tephritid flies that are to be used in area-wide programmes that include the Sterile Insect Technique (SIT). The majority of the procedures were initially designed specifically for the Mediterranean fruit fly Ceratitis capitata (Wiedemann) (or Medfly), but they are applicable, with minor modifications, for other tephritid species such as those in the genera Anastrepha, Bactrocera and Dacus. The guidance is designed to be a working document that can be subject to periodic updates due to technological developments and research contributions. Future editions will endeavour to include more specific recommendations for other species of fruit flies as the relevant data become available. The procedures described in this guidance will help ensure that released sterile fruit flies will be of optimal quality and that the resulting field density of these flies will be as closely aligned to the individual programme needs. It is hoped that this guidance will help to quickly identify and correct problems in programme effectiveness, resulting from less than optimal emergence and release conditions

  15. The blow fly, Chrysomya megacephala, and the house fly, Musca domestica, as mechanical vectors of pathogenic bacteria in Northeast Thailand.

    Science.gov (United States)

    Chaiwong, T; Srivoramas, T; Sueabsamran, P; Sukontason, K; Sanford, M R; Sukontason, K L

    2014-06-01

    The Oriental latrine fly, Chrysomya megacephala (Fabricius) (Diptera: Calliphoridae) and the house fly, Musca domestica L., (Diptera: Muscidae) are synanthropic flies which are adapted to live in close association with human habitations, thereby making them likely mechanical vectors of several pathogens to humans. There were two main aims of this study. The first aim was to determine the prevalence of these two fly species from five types of human habitations including: fresh-food markets, garbage piles, restaurants, school cafeterias and paddy fields, in the Muang Ubon Ratchathani and Warinchamrap districts of Ubon Ratchathani province of Northeast Thailand. Flies collection were conducted monthly from September 2010-October 2011 using a reconstructable funnel trap, containing 1 day-tainted beef offal as bait. A total of 7 750 flies (6 401 C. megacephala and 1 349 M.domestica) were collected. The second aim was to examine the potential of these flies to carry pathogenic bacteria. Bacteria were isolated from 994 individual flies collected using a sweep net (555 C. megacephala and 439 M. domestica). A total of 15 bacterial genera were isolated from the external surfaces, comprising ten genera of gram-negative bacteria and five gram-positive bacteria. The most common bacteria isolated from both species were coagulase-negative staphylococci, followed by Streptococcus group D non-enterococci. Human pathogenic enteric bacteria isolated were Salmonella sp., Shigella sp., Escherichia coli O157:H7, Salmonella typhi, Bacillus sp., and Enterococcus sp., of which S. typhi is the first report of isolation from these fly species. Other human pathogens included Staphylococcus aureus and Pseudomonas aeruginosa. Not only were the number of C. megacephala positive for bacteria significantly higher than for M. domestica, but they were also carrying ~11-12 times greater bacterial load than M. domestica. These data suggest that both fly species should be considered potential

  16. Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, MAC layer attacks are considered...... the most harmful as they directly affect the available resources and thus the nodes’ energy consumption. The first endeavour of this paper is to model the activities of MAC layer security attacks to understand the flow of activities taking place when mounting the attack and when actually executing it....... The second aim of the paper is to simulate these attacks on hybrid MAC mechanisms, which shows the performance degradation of aWSN under the considered attacks. The modelling and implementation of the security attacks give an actual view of the network which can be useful in further investigating secure...

  17. Reduction of metal leaching in brown coal fly ash using geopolymers

    International Nuclear Information System (INIS)

    Bankowski, P.; Zou, L.; Hodges, R.

    2004-01-01

    Current regulations classify fly ash as a prescribed waste and prohibit its disposal in regular landfill. Treatment of the fly ash can reduce the leach rate of metals, and allow it to be disposed in less prescribed landfill. A geopolymer matrix was investigated as a potential stabilisation method for brown coal fly ash. Precipitator fly ash was obtained from electrostatic precipitators and leached fly ash was collected from ash disposal ponds, and leaching tests were conducted on both types of geopolymer stabilised fly ashes. The ratio of fly ash to geopolymer was varied to determine the effects of different compositions on leaching rates. Fourteen metals and heavy metals were targeted during the leaching tests and the results indicate that a geopolymer is effective at reducing the leach rates of many metals from the fly ash, such as calcium, arsenic, selenium, strontium and barium. The major element leachate concentrations obtained from leached fly ash were in general lower than that of precipitator fly ash. Conversely, heavy metal leachate concentrations were lower in precipitator fly ash than leached pond fly ash. The maximum addition of fly ash to this geopolymer was found to be 60 wt% for fly ash obtained from the electrostatic precipitators and 70 wt% for fly ash obtained from ash disposal ponds. The formation of geopolymer in the presence of fly ash was studied using 29Si MAS-NMR and showed that a geopolymer matrix was formed. X-ray diffraction (XRD) analysis and scanning electron microscopy (SEM) imaging showed the interaction of the fly ash with the geopolymer, which was related to the leachate data and also the maximum percentage fly ash addition

  18. Algebraic Side-Channel Attack on Twofish

    Directory of Open Access Journals (Sweden)

    Chujiao Ma

    2017-05-01

    Full Text Available While algebraic side-channel attack (ASCA has been successful in breaking simple cryptographic algorithms, it has never been done on larger or more complex algorithms such as Twofish. Compared to other algorithms that ASCA has been used on, Twofish is more difficult to attack due to the key-dependent S-boxes as well as the complex key scheduling. In this paper, we propose the first algebraic side-channel attack on Twofish, and examine the importance of side-channel information in getting past the key-dependent S-boxes and the complex key scheduling. The cryptographic algorithm and side-channel information are both expressed as boolean equations and a SAT solver is used to recover the key. While algebraic attack by itself is not sufficient to break the algorithm, with the help of side-channel information such as Hamming weights, we are able to correctly solve for 96 bits of the 128 bits key in under 2 hours with known plaintext/ciphertext.

  19. On localization attacks against cloud infrastructure

    Science.gov (United States)

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  20. Network attacks and defenses a hands-on approach

    CERN Document Server

    Trabelsi, Zouheir; Al Braiki, Arwa; Mathew, Sujith Samuel

    2012-01-01

    The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirement to counter the threat. Network security education generally lacks appropriate textbooks with detailed, hands-on exercises that include both offensive and defensive techniques. Using step-by-step processes to build and generate attacks using offensive techniques, Network Attacks and Defenses: A Hands-on Approach enables students to implement appropriate network security solutions within a laborat

  1. SDN-Based Double Hopping Communication against Sniffer Attack

    Directory of Open Access Journals (Sweden)

    Zheng Zhao

    2016-01-01

    Full Text Available Sniffer attack has been a severe threat to network communication security. Traditional network usually uses static network configuration, which provides convenience to sniffer attack. In this paper, an SDN-based double hopping communication (DHC approach is proposed to solve this problem. In DHC, ends in communication packets as well as the routing paths are changed dynamically. Therefore, the traffic will be distributed to multiple flows and transmitted along different paths. Moreover, the data from multiple users will be mixed, bringing difficulty for attackers in obtaining and recovering the communication data, so that sniffer attack will be prevented effectively. It is concluded that DHC is able to increase the overhead of sniffer attack, as well as the difficulty of communication data recovery.

  2. Attacks on Bluetooth Security Architecture and Its Countermeasures

    Science.gov (United States)

    Iqbal, Mian Muhammad Waseem; Kausar, Firdous; Wahla, Muhammad Arif

    WPANs compliment the traditional IEEE 802.11 wireless networks by facilitating the clients with flexibility in network topologies, higher mobility and relaxed configuration/hardware requirements. Bluetooth, a WPAN technology, is an open standard for short-range radio frequency (RF) communication. However, it is also susceptible to typical security threats found in wireless LANs. This paper discuses some of the attack scenarios against the bluetooth network such as hostile intrusion, active Man-in-the-Middle (MITM) attack using unit key and various forms of denial of service (DoS) attacks. These threats and attacks compromise the confidentiality and availability of bluetooth data and services. This paper proposes an improved security architecture for bluetooth device which provides protection against the above mentioned attacks.

  3. Genetic quality control in mass-reared melon flies

    International Nuclear Information System (INIS)

    Miyatake, T.

    2002-01-01

    Quality control in mass-reared melon flies, Bactrocera cucurbitae, after eradication is discussed, based on the results of artificial selection experiments. First, a brief history of quality control in mass-rearing of insects is described. In practical mass- rearing of melon fly, many traits have already been differentiated between mass-reared and wild flies. These differing traits are reviewed and the factors which caused these differences are considered. It was considered that the differences between wild and mass-reared melon flies depended on the selection pressures from the mass-rearing method. Next, the results of several artificial selection experiments using the melon fly are reviewed. Finally, consideration is given to some correlated responses to artificial selection in mass-rearing. Longevity that is correlated to early fecundity was successfully controlled by artificial selection for reproduction in the mass-rearing system. On the basis of these results, an improved method for quality control in mass-reared melon fly with considerations for quantitative genetics is discussed

  4. Increased Transmissibility of Leishmania donovani From the Mammalian Host to Vector Sand Flies After Multiple Exposures to Sand Fly Bites.

    Science.gov (United States)

    Valverde, Joanna G; Paun, Andrea; Inbar, Ehud; Romano, Audrey; Lewis, Michael; Ghosh, Kashinath; Sacks, David

    2017-04-15

    Patients with active visceral leishmaniasis are important reservoirs in the anthroponotic transmission cycle of Leishmania donovani. The role of the blood or skin as a source of infection to sand flies remains unclear, and the possible effect of multiple exposures to fly bites on transmissibility has not been addressed. L. donovani-infected hamsters underwent xenodiagnoses with Lutzomyia longipalpis on the same or different sites on the abdomen on 2 consecutive days or by artificial feeding on the skin or blood. The transmission of L. donovani from sick hamsters to flies was surprisingly low (mean, 24% of fed flies). New flies fed on the same site acquired significantly more infections (mean, 61%; P Leishmania donovani. Using the hamster model of visceral disease, we demonstrate that prior exposure to bites of uninfected sand flies potentiates their ability to transmit infection to the vector. Published by Oxford University Press for the Infectious Diseases Society of America 2017. This work is written by (a) US Government employee(s) and is in the public domain in the US.

  5. Possibilities of municipal solid waste incinerator fly ash utilisation.

    Science.gov (United States)

    Hartmann, Silvie; Koval, Lukáš; Škrobánková, Hana; Matýsek, Dalibor; Winter, Franz; Purgar, Amon

    2015-08-01

    Properties of the waste treatment residual fly ash generated from municipal solid waste incinerator fly ash were investigated in this study. Six different mortar blends with the addition of the municipal solid waste incinerator fly ash were evaluated. The Portland cement replacement levels of the municipal solid waste incinerator fly ash used were 25%, 30% and 50%. Both, raw and washed municipal solid waste incinerator fly ash samples were examined. According to the mineralogical composition measurements, a 22.6% increase in the pozzolanic/hydraulic properties was observed for the washed municipal solid waste incinerator fly ash sample. The maximum replacement level of 25% for the washed municipal solid waste incinerator fly ash in mortar blends was established in order to preserve the compressive strength properties. Moreover, the leaching characteristics of the crushed mortar blend was analysed in order to examine the immobilisation of its hazardous contents. © The Author(s) 2015.

  6. An SDN-Based Fingerprint Hopping Method to Prevent Fingerprinting Attacks

    Directory of Open Access Journals (Sweden)

    Zheng Zhao

    2017-01-01

    Full Text Available Fingerprinting attacks are one of the most severe threats to the security of networks. Fingerprinting attack aims to obtain the operating system information of target hosts to make preparations for future attacks. In this paper, a fingerprint hopping method (FPH is proposed based on software-defined networks to defend against fingerprinting attacks. FPH introduces the idea of moving target defense to show a hopping fingerprint toward the fingerprinting attackers. The interaction of the fingerprinting attack and its defense is modeled as a signal game, and the equilibriums of the game are analyzed to develop an optimal defense strategy. Experiments show that FPH can resist fingerprinting attacks effectively.

  7. Irradiation of Eggs and Larvae of Bactrocera Carambolae (Drew and Hancock) Fruit Fly to Produce Irradiation Host for Its Parasitoids

    International Nuclear Information System (INIS)

    Achmad Nasroh Kuswadi; Murni lndarwatmi; Nasution, Indah Arastuti

    2004-01-01

    Bactrocera carambolae (Drew and Hancock) fruit fly, a major pests of commercial fruits in Indonesia, is attacked by several species of parasitoids in the field, such as by Biosteres sp. that attacks on early instar larvae and Opius sp. on late instar larvae. In order to produce irradiated host in mass rearing of both species, several dosage of gamma were tested on both eggs and larvae. Egg masses of 0.5 ml were irradiated with 0, 10, 20, 30, 40 and 50 Gy and then inoculated into artificial diet. Viability of the eggs, the larval period and the number of pupae produced were observed. About 200 third instar larvae irradiated with 0, 10, 30, 50,70 dan 90 Gy and the number and quality of the pupae developed were then observed. The results showed that the eggs irradiated with tested dosage did not reduce its viability however it reduced the survival of larvae emerged. Number of pupae produced from 0.5 ml irradiated eggs were reduced from 2740 pupae to 407, 167, 113, 53 and 44 pupae, besides the pupation delayed up to three days. Irradiation on third instars larvae did not reduce its pupation, since pupae were developed from > 85 % of irradiated larvae. However, irradiation did reduced the fly emergence from the pupae. Irradiated hosts for Biosteres sp and Opius sp can be produced by irradiating eggs however it should be evaluated since the survival rate of the larvae reduced. Irradiation of third instar larvae may produce irradiated host for Opius sp So, the use of irradiated eggs or irradiated larvae as host in the colonization of the parasitoids will insure no hosts emerged as adult. However it remain to be proved whether irradiated hosts are prefered and able to support the life of parasitoid. (author)

  8. Entomopathogenic Fungi in Flies Associated with Pastured Cattle in Denmark

    DEFF Research Database (Denmark)

    Steenberg, Tove; Jespersen, Jørgen B.; Jensen, Karl-Martin Vagn

    2001-01-01

    Cattle flies, including Musca autumnalis, Haematobia irritans, and Hydrotaea irritans, are pests of pastured cattle. A 2-year study of the natural occurrence of entomopathogenic fungi in adult cattle flies and other flies associated with pastures showed that the four species included in the Entom......Cattle flies, including Musca autumnalis, Haematobia irritans, and Hydrotaea irritans, are pests of pastured cattle. A 2-year study of the natural occurrence of entomopathogenic fungi in adult cattle flies and other flies associated with pastures showed that the four species included...

  9. Physical, chemical and mineralogical properties of fly ash

    International Nuclear Information System (INIS)

    Khairul Nizar Ismail; Kamaruddin Hussin; Mohd Sobri Idris

    2007-01-01

    Fly ash is the finely divided mineral residue resulting from the combustion of coal in electric generating plants. Fly ash consists of inorganic, incombustible matter present in the coal that has been fused during combustion into a glassy, amorphous structure. Fly ash particles are generally spherical in shape and range in size from 2 μm to 10 μm. They consist mostly of silicon dioxide (SiO 2 ), aluminium oxide (Al 2 O 3 ) and iron oxide (Fe 2 O 3 ). Fly ash like soil contains trace concentrations of the following heavy metals: nickel, vanadium, cadmium, barium, chromium, copper, molybdenum, zinc and lead. The chemical compositions of the sample have been examined and the fly ash are of ASTM C618 Class F. (Author)

  10. Data-plane Defenses against Routing Attacks on Tor

    Directory of Open Access Journals (Sweden)

    Tan Henry

    2016-10-01

    Full Text Available Tor is susceptible to traffic correlation attacks in which an adversary who observes flows entering and leaving the anonymity network can apply statistical techniques to correlate flows and de-anonymize their endpoints. While an adversary may not be naturally positioned to conduct such attacks, a recent study shows that the Internet’s control-plane can be manipulated to increase an adversary’s view of the network, and consequently, improve its ability to perform traffic correlation. This paper explores, in-depth, the effects of control-plane attacks on the security of the Tor network. Using accurate models of the live Tor network, we quantify Tor’s susceptibility to these attacks by measuring the fraction of the Tor network that is vulnerable and the advantage to the adversary of performing the attacks. We further propose defense mechanisms that protect Tor users from manipulations at the control-plane. Perhaps surprisingly, we show that by leveraging existing trust anchors in Tor, defenses deployed only in the data-plane are sufficient to detect most control-plane attacks. Our defenses do not assume the active participation of Internet Service Providers, and require only very small changes to Tor. We show that our defenses result in a more than tenfold decrease in the effectiveness of certain control-plane attacks.

  11. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...

  12. Step to improve neural cryptography against flipping attacks.

    Science.gov (United States)

    Zhou, Jiantao; Xu, Qinzhen; Pei, Wenjiang; He, Zhenya; Szu, Harold

    2004-12-01

    Synchronization of neural networks by mutual learning has been demonstrated to be possible for constructing key exchange protocol over public channel. However, the neural cryptography schemes presented so far are not the securest under regular flipping attack (RFA) and are completely insecure under majority flipping attack (MFA). We propose a scheme by splitting the mutual information and the training process to improve the security of neural cryptosystem against flipping attacks. Both analytical and simulation results show that the success probability of RFA on the proposed scheme can be decreased to the level of brute force attack (BFA) and the success probability of MFA still decays exponentially with the weights' level L. The synchronization time of the parties also remains polynomial with L. Moreover, we analyze the security under an advanced flipping attack.

  13. Improved Impossible Differential Attacks on Large-Block Rijndael

    DEFF Research Database (Denmark)

    Wang, Qingju; Gu, Dawu; Rijmen, Vincent

    2012-01-01

    . The improvement can lead to 10-round attack on Rijndael-256 as well. With 2198.1 chosen plaintexts, an attack is demonstrated on 9-round Rijndael-224 with 2 195.2 encryptions and 2140.4 bytes memory. Increasing the data complexity to 2216 plaintexts, the time complexity can be reduced to 2130 encryptions...... and the memory requirements to 2 93.6 bytes. For 9-round Rijndael-256, we provide an attack requiring 2229.3 chosen plaintexts, 2194 encryptions, and 2 139.6 bytes memory. Alternatively, with 2245.3 plaintexts, an attack with a reduced time of 2127.1 encryptions and a memory complexity of 290.9 bytes can...... be mounted. With 2244.2 chosen plaintexts, we can attack 10-round Rijndael-256 with 2253.9 encryptions and 2186.8 bytes of memory....

  14. RAPTOR: Ransomware Attack PredicTOR

    OpenAIRE

    Quinkert, Florian; Holz, Thorsten; Hossain, KSM Tozammel; Ferrara, Emilio; Lerman, Kristina

    2018-01-01

    Ransomware, a type of malicious software that encrypts a victim's files and only releases the cryptographic key once a ransom is paid, has emerged as a potentially devastating class of cybercrimes in the past few years. In this paper, we present RAPTOR, a promising line of defense against ransomware attacks. RAPTOR fingerprints attackers' operations to forecast ransomware activity. More specifically, our method learns features of malicious domains by looking at examples of domains involved in...

  15. Shark attack-related injuries: Epidemiology and implications for plastic surgeons.

    Science.gov (United States)

    Ricci, Joseph A; Vargas, Christina R; Singhal, Dhruv; Lee, Bernard T

    2016-01-01

    The increased media attention to shark attacks has led to a heightened fear and public awareness. Although few sharks are considered dangerous, attacks on humans can result in large soft tissue defects necessitating the intervention of reconstructive surgeons. This study aims to evaluate and describe the characteristics of shark-related injuries in order to improve treatment. The Global Shark Accident File, maintained by the Shark Research Institute (Princeton, NJ, USA), is a compilation of all known worldwide shark attacks. Database records since the 1900s were reviewed to identify differences between fatal and nonfatal attacks, including: geography, injury pattern, shark species, and victim activity. Since the 1900s, there have been 5034 reported shark attacks, of which 1205 (22.7%) were fatal. Although the incidence of attacks per decade has increased, the percentage of fatalities has decreased. Characteristics of fatal attacks included swimming (p = 0.001), boating (p = 0.001), three or more bite sites (p = 0.03), limb loss (p = 0.001), or tiger shark attack (p = 0.002). The most common attacks were bites to the legs (41.8%) or arms (18.4%), with limb loss occurring in 7% of attacks. Geographically, the majority of attacks occurred in North America (36.7%) and Australia (26.5%). Most attacks in the USA occurred in Florida (49.1%) and California (13.6%). Although rare, shark attacks result in devastating injuries to patients. As these injuries often involve multiple sites and limb loss, this creates a significant challenge for reconstructive surgeons. Proper identification of the characteristics of the attack can aid in providing optimal care for those affected. Copyright © 2015 British Association of Plastic, Reconstructive and Aesthetic Surgeons. Published by Elsevier Ltd. All rights reserved.

  16. Removal of chloride from MSWI fly ash.

    Science.gov (United States)

    Chen, Wei-Sheng; Chang, Fang-Chih; Shen, Yun-Hwei; Tsai, Min-Shing; Ko, Chun-Han

    2012-10-30

    The high levels of alkali chloride and soluble metal salts present in MSWI fly ash is worth noting for their impact on the environment. In addition, the recycling or reuse of fly ash has become an issue because of limited landfill space. The chloride content in fly ash limits its application as basis for construction materials. Water-soluble chlorides such as potassium chloride (KCl), sodium chloride (NaCl), and calcium chloride hydrate (CaCl(2) · 2H(2)O) in fly ash are easily washed away. However, calcium chloride hydroxide (Ca(OH)Cl) might not be easy to leach away at room temperature. The roasting and washing-flushing processes were applied to remove chloride content in this study. Additionally, air and CO(2) were introduced into the washing process to neutralize the hazardous nature of chlorides. In comparison with the water flushing process, the roasting process is more efficient in reducing the process of solid-liquid separation and drying for the reuse of Cl-removed fly ash particles. In several roasting experiments, the removal of chloride content from fly ash at 1050°C for 3h showed the best results (83% chloride removal efficiency). At a solid to liquid ratio of 1:10 the water-flushing process can almost totally remove water-soluble chloride (97% chloride removal efficiency). Analyses of mineralogical change also prove the efficiency of the fly ash roasting and washing mechanisms for chloride removal. Copyright © 2012 Elsevier B.V. All rights reserved.

  17. Privacy Leaks through Data Hijacking Attack on Mobile Systems

    Directory of Open Access Journals (Sweden)

    Zhang Daojuan

    2017-01-01

    Full Text Available To persistently eavesdrop on the mobile devices, attackers may obtain the elevated privilege and inject malicious modules into the user devices. Unfortunately, the attackers may not be able to obtain the privilege for a long period of time since the exploitable vulnerabilities may be fixed or the malware may be removed. In this paper, we propose a new data hijacking attack for the mobile apps. By employing the proposed method, the attackers are only required to obtain the root privilege of the user devices once, and they can persistently eavesdrop without any change to the original device. Specifically, we design a new approach to construct a shadow system by hijacking user data files. In the shadow system, attackers possess the identical abilities to the victims. For instance, if a victim has logged into the email app, the attacker can also access the email server in the shadow system without authentication in a long period of time. Without reauthentication of the app, it is difficult for victims to notice the intrusion since the whole eavesdropping is performed on other devices (rather than the user devices. In our experiments, we evaluate the effectiveness of the proposed attack and the result demonstrates that even the Android apps released by the top developers cannot resist this attack. Finally, we discuss some approaches to defend the proposed attack.

  18. What Can We Learn?--The Algonquin Bear Attack.

    Science.gov (United States)

    Strickland, Dan

    1992-01-01

    Describes a bear attack in Algonquin Park in Lake Opeongo (Canada) in which a man and woman were killed. Hypothesizes that the bear deliberately preyed on its victims and concludes that the bear was physically normal. Despite this isolated attack, the chance of being attacked by a black bear when camping is virtually nonexistent. (KS)

  19. 76 FR 43804 - Movement of Hass Avocados From Areas Where Mediterranean Fruit Fly or South American Fruit Fly Exist

    Science.gov (United States)

    2011-07-22

    ... dorsalis), peach fruit fly (Anastrepha zonata), and sapote fruit fly (Anastrepha serpentina) in the... obliqua, Anastrepha serpentina, and Anastrepha striata (Diptera: Tephritidae) in Mexico. J. Econ. Entomol...

  20. Combined Heuristic Attack Strategy on Complex Networks

    Directory of Open Access Journals (Sweden)

    Marek Šimon

    2017-01-01

    Full Text Available Usually, the existence of a complex network is considered an advantage feature and efforts are made to increase its robustness against an attack. However, there exist also harmful and/or malicious networks, from social ones like spreading hoax, corruption, phishing, extremist ideology, and terrorist support up to computer networks spreading computer viruses or DDoS attack software or even biological networks of carriers or transport centers spreading disease among the population. New attack strategy can be therefore used against malicious networks, as well as in a worst-case scenario test for robustness of a useful network. A common measure of robustness of networks is their disintegration level after removal of a fraction of nodes. This robustness can be calculated as a ratio of the number of nodes of the greatest remaining network component against the number of nodes in the original network. Our paper presents a combination of heuristics optimized for an attack on a complex network to achieve its greatest disintegration. Nodes are deleted sequentially based on a heuristic criterion. Efficiency of classical attack approaches is compared to the proposed approach on Barabási-Albert, scale-free with tunable power-law exponent, and Erdős-Rényi models of complex networks and on real-world networks. Our attack strategy results in a faster disintegration, which is counterbalanced by its slightly increased computational demands.

  1. Fruit Flies Help Human Sleep Research

    Science.gov (United States)

    ... like us, without enough sleep, flies feel the effects of sleep deprivation. Cirelli has shown that they are a good model for researching human sleep. She has found fruit fly genes that seem to have a powerful effect on sleep. In time, her research could lead ...

  2. Studies on sulfate attack: Mechanisms, test methods, and modeling

    Science.gov (United States)

    Santhanam, Manu

    The objective of this research study was to investigate various issues pertaining to the mechanism, testing methods, and modeling of sulfate attack in concrete. The study was divided into the following segments: (1) effect of gypsum formation on the expansion of mortars, (2) attack by the magnesium ion, (3) sulfate attack in the presence of chloride ions---differentiating seawater and groundwater attack, (4) use of admixtures to mitigate sulfate attack---entrained air, sodium citrate, silica fume, and metakaolin, (5) effects of temperature and concentration of the attack solution, (6) development of new test methods using concrete specimens, and (7) modeling of the sulfate attack phenomenon. Mortar specimens using portland cement (PC) and tricalcium silicate (C 3S), with or without mineral admixtures, were prepared and immersed in different sulfate solutions. In addition to this, portland cement concrete specimens were also prepared and subjected to complete and partial immersion in sulfate solutions. Physical measurements, chemical analyses and microstructural studies were performed periodically on the specimens. Gypsum formation was seen to cause expansion of the C3S mortar specimens. Statistical analyses of the data also indicated that the quantity of gypsum was the most significant factor controlling the expansion of mortar bars. The attack by magnesium ion was found to drive the reaction towards the formation of brucite. Decalcification of the C-S-H and its subsequent conversion to the non-cementitious M-S-H was identified as the mechanism of destruction in magnesium sulfate attack. Mineral admixtures were beneficial in combating sodium sulfate attack, while reducing the resistance to magnesium sulfate attack. Air entrainment did not change the measured physical properties, but reduced the visible distress of the mortars. Sodium citrate caused a substantial reduction in the rate of damage of the mortars due to its retarding effect. Temperature and

  3. Pilot oriental fruit fly management program in Guimaras island

    International Nuclear Information System (INIS)

    Manoto, E.C.; Obra, G.B.; Resilva, S.S.; Reyes, M.R.; Golez, H.G.; Covacha, S.A.; Bignayan, H.G.; Gaitan, E.G.; Zamora, N.F.; Maranon, R.P.

    1999-01-01

    The pilot project on the integrated fruit fly management program based on sterile insect technique (SIT) was conducted in Guimaras island. The first island-wide male annihilation treatment (MAT) was implemented from February to October 1997. A total of 6 applications consisting of 525,534 pieces of lured particle board squares (PBS) were distributed in Guimaras both by aerial and ground applications. There was a significant reduction in fruit fly population indicating fruit fly suppression through MAT. However, MAT only reduces the male fruit fly density so many fruits were still found infested with fruit flies. Hence, biweekly releases of sterile flies were conducted from November 1997 to April 1998. About 91.74 million sterile pupae were sent by the Philippine Nuclear Research Institute (PNRI) to Guimaras. A total of 34,490,888 sterile flies were released by aerial applications and 12,632,163 sterile flies were released by ground applications. An increase in the S/N ratio was observed from 0.37 in December 1997 to 4.19 in April 1998. However, since the eradication phase was discontinued due to budgetary constraints, the required S/N ratio of more than 10 for a successful application of SIT was not achieved. A second series of MAT application were again conducted from May to September 1998. A total of 4 applications consisting of 357,650 pcs. of lured PBS were distributed throughout the island. Interestingly, the results of fruit fly density estimation before (1995) and after application (1998) of MAT and SIT using Lincoln method showed that the number of fruit flies per hectare was significantly reduced in all areas in Guimaras. Continues biweekly releases of 25 million flies therefore have to be undertaken to eradicate the remaining population. (Author)

  4. The use of fly larvae for organic waste treatment.

    Science.gov (United States)

    Čičková, Helena; Newton, G Larry; Lacy, R Curt; Kozánek, Milan

    2015-01-01

    The idea of using fly larvae for processing of organic waste was proposed almost 100 years ago. Since then, numerous laboratory studies have shown that several fly species are well suited for biodegradation of organic waste, with the house fly (Musca domestica L.) and the black soldier fly (Hermetia illucens L.) being the most extensively studied insects for this purpose. House fly larvae develop well in manure of animals fed a mixed diet, while black soldier fly larvae accept a greater variety of decaying organic matter. Blow fly and flesh fly maggots are better suited for biodegradation of meat processing waste. The larvae of these insects have been successfully used to reduce mass of animal manure, fecal sludge, municipal waste, food scrapes, restaurant and market waste, as well as plant residues left after oil extraction. Higher yields of larvae are produced on nutrient-rich wastes (meat processing waste, food waste) than on manure or plant residues. Larvae may be used as animal feed or for production of secondary products (biodiesel, biologically active substances). Waste residue becomes valuable fertilizer. During biodegradation the temperature of the substrate rises, pH changes from neutral to alkaline, ammonia release increases, and moisture decreases. Microbial load of some pathogens can be substantially reduced. Both larvae and digested residue may require further treatment to eliminate pathogens. Facilities utilizing natural fly populations, as well as pilot and full-scale plants with laboratory-reared fly populations have been shown to be effective and economically feasible. The major obstacles associated with the production of fly larvae from organic waste on an industrial scale seem to be technological aspects of scaling-up the production capacity, insufficient knowledge of fly biology necessary to produce large amounts of eggs, and current legislation. Technological innovations could greatly improve performance of the biodegradation facilities and

  5. Impact of Cyber Attacks on High Voltage DC Transmission Damping Control

    Directory of Open Access Journals (Sweden)

    Rui Fan

    2018-04-01

    Full Text Available Hybrid AC/HVDC (AC-HVDC grids have evolved to become huge cyber-physical systems that are vulnerable to cyber attacks because of the wide attack surface and increasing dependence on intelligent electronic devices, computing resources and communication networks. This paper, for the first time, studies the impact of cyber attacks on HVDC transmission oscillation damping control.Three kinds of cyber attack models are considered: timing attack, replay attack and false data injection attack. Followed by a brief introduction of the HVDC model and conventional oscillation damping control method, the design of three attack models is described in the paper. These attacks are tested on a modified IEEE New England 39-Bus AC-HVDC system. Simulation results have shown that all three kinds of attacks are capable of driving the AC-HVDC system into large oscillations or even unstable conditions.

  6. A New Flying Wire System for the Tevatron

    Science.gov (United States)

    Blokland, Willem; Dey, Joseph; Vogel, Greg

    1997-05-01

    A new Flying Wires system replaces the old system to enhance the analysis of the beam emittance, improve the reliability, and handle the upcoming upgrades of the Tevatron. New VME data acquisition modules and timing modules allow for more bunches to be sampled more precisely. The programming language LabVIEW, running on a Macintosh computer, controls the VME modules and the nuLogic motion board that flies the wires. LabVIEW also analyzes and stores the data, and handles local and remote commands. The new system flies three wires and fits profiles of 72 bunches to a gaussian function within two seconds. A new console application operates the flying wires from any control console. This paper discusses the hardware and software setup, the capabilities and measurement results of the new Flying Wires system.

  7. Oblique-Flying-Wing Supersonic Transport Airplane

    Science.gov (United States)

    Van Der Velden, Alexander J. M.

    1992-01-01

    Oblique-flying-wing supersonic airplane proposed as possible alternative to B747B (or equivalent). Tranports passengers and cargo as fast as twice speed of sound at same cost as current subsonic transports. Flies at same holding speeds as present supersonic transports but requires only half takeoff distance.

  8. On the Biology of the Bark Beetle Scolytus nitidus Schedl (Coleoptera: Scolytidae Attacking Apple Orchards

    Directory of Open Access Journals (Sweden)

    LAKATOS, Ferenc

    2007-01-01

    Full Text Available The biological characters of Scolytus nitidus were investigated both in the field and in thelaboratory as well. This common shot-hole borer overwinters in larval stage on apple trees in Kashmir.After emergence the adults fly to suitable trees and undergo maturation feeding for 4-6 days. Thecopulation takes place at the entrance hole. The maternal gallery is one armed longitudinal, in average4.6 cm long. The female lays 52 eggs on an average. The eggs hatch in 5 to 7 days. The larvae have 5instars and complete their development in 38 to 50 days constructing larval galleries 5-8 cm in length.The larvae pupate for 6-18 days and finally the adults emerge to attack new suitable trees. The adultslive for 45-60 days and the total life-span of this species ranges from 97 to 124 days. The seasonaldistribution of various life stages and the number of generations were also recorded.

  9. OPERATION COBRA. Deliberate Attack, Exploitation

    Science.gov (United States)

    1984-05-25

    to attack Sens, then continue to Troyes , on the Seine River. CCA was in the north, crossing the Loing River at Souppes against light resistance and...advanced from Troyes and prepared positions close to Sens. Under strong artillery support, a task force from CCA (TF Oden) attacked the enemy frontally...movement towards the Seine River on 24 August with an advance toward Troyes . Facing the combat command were what remained of the 51st SS Brigade, light

  10. Robustness of non-interdependent and interdependent networks against dependent and adaptive attacks

    Science.gov (United States)

    Tyra, Adam; Li, Jingtao; Shang, Yilun; Jiang, Shuo; Zhao, Yanjun; Xu, Shouhuai

    2017-09-01

    Robustness of complex networks has been extensively studied via the notion of site percolation, which typically models independent and non-adaptive attacks (or disruptions). However, real-life attacks are often dependent and/or adaptive. This motivates us to characterize the robustness of complex networks, including non-interdependent and interdependent ones, against dependent and adaptive attacks. For this purpose, dependent attacks are accommodated by L-hop percolation where the nodes within some L-hop (L ≥ 0) distance of a chosen node are all deleted during one attack (with L = 0 degenerating to site percolation). Whereas, adaptive attacks are launched by attackers who can make node-selection decisions based on the network state in the beginning of each attack. The resulting characterization enriches the body of knowledge with new insights, such as: (i) the Achilles' Heel phenomenon is only valid for independent attacks, but not for dependent attacks; (ii) powerful attack strategies (e.g., targeted attacks and dependent attacks, dependent attacks and adaptive attacks) are not compatible and cannot help the attacker when used collectively. Our results shed some light on the design of robust complex networks.

  11. Command Disaggregation Attack and Mitigation in Industrial Internet of Things

    Directory of Open Access Journals (Sweden)

    Peng Xun

    2017-10-01

    Full Text Available A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1 the command sequence is disordered and (2 disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  12. Command Disaggregation Attack and Mitigation in Industrial Internet of Things.

    Science.gov (United States)

    Xun, Peng; Zhu, Pei-Dong; Hu, Yi-Fan; Cui, Peng-Shuai; Zhang, Yan

    2017-10-21

    A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  13. Counteracting Power Analysis Attacks by Masking

    Science.gov (United States)

    Oswald, Elisabeth; Mangard, Stefan

    The publication of power analysis attacks [12] has triggered a lot of research activities. On the one hand these activities have been dedicated toward the development of secure and efficient countermeasures. On the other hand also new and improved attacks have been developed. In fact, there has been a continuous arms race between designers of countermeasures and attackers. This chapter provides a brief overview of the state-of-the art in the arms race in the context of a countermeasure called masking. Masking is a popular countermeasure that has been extensively discussed in the scientific community. Numerous articles have been published that explain different types of masking and that analyze weaknesses of this countermeasure.

  14. Metrics for Assessment of Smart Grid Data Integrity Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Annarita Giani; Miles McQueen; Russell Bent; Kameshwar Poolla; Mark Hinrichs

    2012-07-01

    There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised data by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.

  15. A taxonomy of distributed denial of service attacks

    DEFF Research Database (Denmark)

    De Donno, Michele; Giaretta, Alberto; Dragoni, Nicola

    2017-01-01

    Distributed Denial of Service (DDoS) attacks which are now even more powerful and easier to achieve than the past. Understanding how these attacks work, in all their different forms, represents a first crucial step to tackle this urgent issue. To this end, in this paper we propose a new up-to-date taxonomy...... and a comprehensive classification of current DDoS attacks....

  16. Acetylation Increases EWS-FLI1 DNA Binding and Transcriptional Activity

    International Nuclear Information System (INIS)

    Schlottmann, Silke; Erkizan, Hayriye V.; Barber-Rotenberg, Julie S.; Knights, Chad; Cheema, Amrita; Üren, Aykut; Avantaggiati, Maria L.; Toretsky, Jeffrey A.

    2012-01-01

    Ewing Sarcoma (ES) is associated with a balanced chromosomal translocation that in most cases leads to the expression of the oncogenic fusion protein and transcription factor EWS-FLI1. EWS-FLI1 has been shown to be crucial for ES cell survival and tumor growth. However, its regulation is still enigmatic. To date, no functionally significant post-translational modifications of EWS-FLI1 have been shown. Since ES are sensitive to histone deacetylase inhibitors (HDI), and these inhibitors are advancing in clinical trials, we sought to identify if EWS-FLI1 is directly acetylated. We convincingly show acetylation of the C-terminal FLI1 (FLI1-CTD) domain, which is the DNA binding domain of EWS-FLI1. In vitro acetylation studies showed that acetylated FLI1-CTD has higher DNA binding activity than the non-acetylated protein. Over-expression of PCAF or treatment with HDI increased the transcriptional activity of EWS-FLI1, when co-expressed in Cos7 cells. However, our data that evaluates the acetylation of full-length EWS-FLI1 in ES cells remains unclear, despite creating acetylation specific antibodies to four potential acetylation sites. We conclude that EWS-FLI1 may either gain access to chromatin as a result of histone acetylation or undergo regulation by direct acetylation. These data should be considered when patients are treated with HDAC inhibitors. Further investigation of this phenomenon will reveal if this potential acetylation has an impact on tumor response.

  17. An Explanation of Nakamoto's Analysis of Double-spend Attacks

    OpenAIRE

    Ozisik, A. Pinar; Levine, Brian Neil

    2017-01-01

    The fundamental attack against blockchain systems is the double-spend attack. In this tutorial, we provide a very detailed explanation of just one section of Satoshi Nakamoto's original paper where the attack's probability of success is stated. We show the derivation of the mathematics relied upon by Nakamoto to create a model of the attack. We also validate the model with a Monte Carlo simulation, and we determine which model component is not perfect.

  18. Stabilization of Fly Ash Deposits through Selected Cereal Crops

    Directory of Open Access Journals (Sweden)

    Florica Morariu

    2012-10-01

    Full Text Available Fly ash, a waste product from burning coal in power plants, occupies important spaces and is a major harm forenvironment: water, air, soil and associated ecosystems. New deposits do not have available nutrients for plantgrowth. The study presents a process of stimulating growth of oats in deposits of fly ash, which eliminates listed.Phytostabilization of new deposit is fast after fertilization with sewage sludge-based compost in the presence/absence of native or modified volcanic tuff with grain species, Avena sativa L., and variety Lovrin 1. Experimentalstudies have shown the species adaptability to climatic conditions and a growth rate until the maturity correlated withtype of treatment of upper layers of fly ash deposit. Fly ash with sewage sludge compost treatment 50 t/hadetermined the growth with 75% of the amount of grains vs. the amount of grains harvested from untreated fly ash.Fly ash with sewage sludge compost mixed with modified indigenous volcanic tuff 2.5 t/ha treatment determined thegrowth with 80% vs. the amount of grains harvested from untreated fly ash. If oat straw harvested from fertilizedvariant without modified indigenous volcanic tuff increases in weight are 30% and for fertilized variant in thepresence of tuff increases in weight are 39.8% vs. quantities harvested from untreated fly ash.

  19. Mating Reverses Actuarial Aging in Female Queensland Fruit Flies.

    Directory of Open Access Journals (Sweden)

    Sarsha Yap

    Full Text Available Animals that have a long pre-reproductive adult stage often employ mechanisms that minimize aging over this period in order to preserve reproductive lifespan. In a remarkable exception, one tephritid fruit fly exhibits substantial pre-reproductive aging but then mitigates this aging during a diet-dependent transition to the reproductive stage, after which life expectancy matches that of newly emerged flies. Here, we ascertain the role of nutrients, sexual maturation and mating in mitigation of previous aging in female Queensland fruit flies. Flies were provided one of three diets: 'sugar', 'essential', or 'yeast-sugar'. Essential diet contained sugar and micronutrients found in yeast but lacked maturation-enabling protein. At days 20 and 30, a subset of flies on the sugar diet were switched to essential or yeast-sugar diet, and some yeast-sugar fed flies were mated 10 days later. Complete mitigation of actuarial aging was only observed in flies that were switched to a yeast-sugar diet and mated, indicating that mating is key. Identifying the physiological processes associated with mating promise novel insights into repair mechanisms for aging.

  20. Development of female fruit fly, Ceratitis species, attractant systems for trapping and sterility assessment in South Africa

    International Nuclear Information System (INIS)

    Eyles, D.K.; Du Plessis, N.; Barnes, B.N.

    1999-01-01

    Fruit in the Western Cape Province of South Africa is attacked by the Mediterranean fruit fly, Ceratitis capitata, and the Natal fruit fly, C. rosa. Control costs and crop losses amount to an estimated US$ 5 million per year. The ARC-Fruit, Vine and Wine Research Institute in Stellenbosch has been taking part in the FAO/IAEA Co-ordinated Research Programme (CRP) to develop a female attractant systems for C. capitata during the 1996/97 and 1997/98 growing seasons. These seasons represented Year 3 and Year 4, respectively, of the female attractant CRP. The performance of these attractant systems in monitoring C. rosa was also evaluated. The Year 3 trial was carried out in a plum orchard with a low fruit fly population, and the Year 4 trial was carried out in the same plum orchard, as well as in a pear orchard with a high fruit fly population. Four female trapping systems were evaluated in Year 3 and five in Year 4. In Year 3, two systems consisted of a locally-manufactured buckettype 'Sensus' trap containing one of two different female attractants (β-caryophyllene, or β-caryophyllene + protein hydrolysate), one was a McPhail trap (IPMT) baited with borax + protein hydrolysate, and the fourth was an open bottom dry trap (OBDT) baited with the three component ammonium acetate, putrescine and trimethylamine system (FA-3). Sensus traps and Jackson traps baited with the male fruit fly attractant Trimedlure (TML) were also included. In Year 4, there was one wet and one dry IPMT system (both baited with FA-3), one IPMT system (borax + protein hydrolysate), and one wet and one dry Tephri trap system (both with FA-3). Jackson traps baited with TML were also included. Results from Year 3 showed that of the systems tested, the best female C. capitata attractant systems under low population conditions were the IPMT system baited with borax + protein hydrolysate, and the OBDT system baited with FA-3. β-caryophyllene in a Sensus trap did not adequately attract female C

  1. Modeling and Analysis of Information Attack in Computer Networks

    National Research Council Canada - National Science Library

    Pepyne, David

    2003-01-01

    ... (as opposed to physical and other forms of attack) . Information based attacks are attacks that can be carried out from anywhere in the world, while sipping cappuccino at an Internet cafe' or while enjoying the comfort of a living room armchair...

  2. Removal mechanism of phosphate from aqueous solution by fly ash.

    Science.gov (United States)

    Lu, S G; Bai, S Q; Zhu, L; Shan, H D

    2009-01-15

    This work studied the effectiveness of fly ash in removing phosphate from aqueous solution and its related removal mechanism. The adsorption and precipitation of phosphate by fly ash were investigated separately in order to evaluate their role in the removal of phosphate. Results showed that the removal of phosphate by fly ash was rapid. The removal percentage of phosphate in the first 5min reached 68-96% of the maximum removal of phosphate by fly ash. The removal processes of phosphate by fly ash included a fast and large removal representing precipitation, then a slower and longer removal due to adsorption. The adsorption of phosphate on fly ash could be described well by Freundlich isotherm equation. The pH and Ca2+ concentration of fly ash suspension were decreased with the addition of phosphate, which suggests that calcium phosphate precipitation is a major mechanism of the phosphate removal. Comparison of the relative contribution of the adsorption and precipitation to the total removal of phosphate by fly ash showed that the adsorption accounted for 30-34% of the total removal of phosphate, depending on the content of CaO in fly ash. XRD patterns of the fly ash before and after phosphate adsorption revealed that phosphate salt (CaHPO4 x 2H2O) was formed in the adsorption process. Therefore, the removal of phosphate by fly ash can be attributed to the formation of phosphate precipitation as a brushite and the adsorption on hydroxylated oxides. The results suggested that the use of fly ash could be a promising solution to the removal of phosphate in the wastewater treatment and pollution control.

  3. Using an ontology for network attack planning

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-09-01

    Full Text Available The modern complexity of network attacks and their counter-measures (cyber operations) requires detailed planning. This paper presents a Network Attack Planning ontology which is aimed at providing support for planning such network operations within...

  4. Protecting infrastructure networks from cost-based attacks

    International Nuclear Information System (INIS)

    Wang Xingang; Guan Shuguang; Lai, Choy Heng

    2009-01-01

    It is well known that heterogeneous networks are vulnerable to the intentional removal of a small fraction of highly connected or loaded nodes, implying that to protect the network effectively, the important nodes should be allocated more defense resource than the others. However, if too much resource is allocated to the few important nodes, the numerous less-important nodes will be less protected, which if attacked together can still lead to devastating damage. A natural question is therefore how to efficiently distribute the limited defense resource among the network nodes such that the network damage is minimized against any attack strategy. In this paper, taking into account the factor of attack cost, the problem of network security is reconsidered in terms of efficient network defense against cost-based attacks. The results show that, for a general complex network, there exists an optimal distribution of the defense resource with which the network is best protected from cost-based attacks. Furthermore, it is found that the configuration of the optimal defense is dependent on the network parameters. Specifically, networks of larger size, sparser connection and more heterogeneous structure will more likely benefit from the defense optimization.

  5. Constructing APT Attack Scenarios Based on Intrusion Kill Chain and Fuzzy Clustering

    Directory of Open Access Journals (Sweden)

    Ru Zhang

    2017-01-01

    Full Text Available The APT attack on the Internet is becoming more serious, and most of intrusion detection systems can only generate alarms to some steps of APT attack and cannot identify the pattern of the APT attack. To detect APT attack, many researchers established attack models and then correlated IDS logs with the attack models. However, the accuracy of detection deeply relied on the integrity of models. In this paper, we propose a new method to construct APT attack scenarios by mining IDS security logs. These APT attack scenarios can be further used for the APT detection. First, we classify all the attack events by purpose of phase of the intrusion kill chain. Then we add the attack event dimension to fuzzy clustering, correlate IDS alarm logs with fuzzy clustering, and generate the attack sequence set. Next, we delete the bug attack sequences to clean the set. Finally, we use the nonaftereffect property of probability transfer matrix to construct attack scenarios by mining the attack sequence set. Experiments show that the proposed method can construct the APT attack scenarios by mining IDS alarm logs, and the constructed scenarios match the actual situation so that they can be used for APT attack detection.

  6. On node replication attack in wireless sensor networks

    International Nuclear Information System (INIS)

    Qabulio, M.; Malkani, Y.A.

    2015-01-01

    WSNs (Wireless Sensor Networks) comprise a large number of small, inexpensive, low power and memory constrained sensing devices (called sensor nodes) that are densely deployed to measure a given physical phenomenon. Since WSNs are commonly deployed in a hostile and unattended environment, it is easy for an adversary to physically capture one or more legitimate sensor nodes, re-program and redeploy them in the network. As a result, the adversary becomes able to deploy several identical copies of physically captured nodes in the network in order to perform illegitimate activities. This type of attack is referred to as Node Replication Attack or Clone Node Attack. By launching node replication attack, an adversary can easily get control on the network which consequently is the biggest threat to confidentiality, integrity and availability of data and services. Thus, detection and prevention of node replication attack in WSNs has become an active area of research and to date more than two dozen schemes have been proposed, which address this issue. In this paper, we present a comprehensive review, classification and comparative analysis of twenty five of these schemes which help to detect and/or prevent node replication attack in WSNs. (author)

  7. On Node Replication Attack in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Mumtaz Qabulio

    2016-04-01

    Full Text Available WSNs (Wireless Sensor Networks comprise a large number of small, inexpensive, low power and memory constrained sensing devices (called sensor nodes that are densely deployed to measure a given physical phenomenon. Since WSNs are commonly deployed in a hostile and unattended environment, it is easy for an adversary to physically capture one or more legitimate sensor nodes, re-program and redeploy them in the network. As a result, the adversary becomes able to deploy several identical copies of physically captured nodes in the network in order to perform illegitimate activities. This type of attack is referred to as Node Replication Attack or Clone Node Attack. By launching node replication attack, an adversary can easily get control on the network which consequently is the biggest threat to confidentiality, integrity and availability of data and services. Thus, detection and prevention of node replication attack in WSNs has become an active area of research and to date more than two dozen schemes have been proposed, which address this issue. In this paper, we present a comprehensive review, classification and comparative analysis of twenty five of these schemes which help to detect and/or prevent node replication attack in WSNs

  8. Attacker-defender game from a network science perspective

    Science.gov (United States)

    Li, Ya-Peng; Tan, Suo-Yi; Deng, Ye; Wu, Jun

    2018-05-01

    Dealing with the protection of critical infrastructures, many game-theoretic methods have been developed to study the strategic interactions between defenders and attackers. However, most game models ignore the interrelationship between different components within a certain system. In this paper, we propose a simultaneous-move attacker-defender game model, which is a two-player zero-sum static game with complete information. The strategies and payoffs of this game are defined on the basis of the topology structure of the infrastructure system, which is represented by a complex network. Due to the complexity of strategies, the attack and defense strategies are confined by two typical strategies, namely, targeted strategy and random strategy. The simulation results indicate that in a scale-free network, the attacker virtually always attacks randomly in the Nash equilibrium. With a small cost-sensitive parameter, representing the degree to which costs increase with the importance of a target, the defender protects the hub targets with large degrees preferentially. When the cost-sensitive parameter exceeds a threshold, the defender switches to protecting nodes randomly. Our work provides a new theoretical framework to analyze the confrontations between the attacker and the defender on critical infrastructures and deserves further study.

  9. Are the rules for the right to self-defense outdated to address current conflicts like attacks from non-state actors and cyber-attacks?

    Directory of Open Access Journals (Sweden)

    Gonzalo J. Arias

    2017-06-01

    Full Text Available The latest US-led coalition’s attacks against ISIS in Syria raised the question whether states can use defensive force against non-state actors. Two critical incidents had previously triggered the discussion on the importance and consequences of cyber-attacks as a new form armed attacks. The first one occurred in Estonia in 2007, when the country experienced extensive computer hacking attacks that lasted several weeks. The second incident happened in 2008, during the Georgia–Russia conflict over South Ossetia, when Georgia experienced cyber-attacks similar to those suffered by Estonia in the previous year. Furthermore, on June 21, 2016, the central banks of Indonesia and South Korea were hit by cyber-attacks on their public websites since activist hacking group Anonymous pledged last month to target banks across the world. The previous incidents have created, once again, public questioning if the rules on the use of force and the right of self-defense established in the United Nations Charter are sufficient and efficient to address these new forms of attacks.

  10. After-gate attack on a quantum cryptosystem

    International Nuclear Information System (INIS)

    Wiechers, C; Wittmann, C; Elser, D; Marquardt, Ch; Leuchs, G; Lydersen, L; Skaar, J; Makarov, V

    2011-01-01

    We present a method to control the detection events in quantum key distribution systems that use gated single-photon detectors. We employ bright pulses as faked states, timed to arrive at the avalanche photodiodes outside the activation time. The attack can remain unnoticed, since the faked states do not increase the error rate per se. This allows for an intercept-resend attack, where an eavesdropper transfers her detection events to the legitimate receiver without causing any errors. As a side effect, afterpulses, originating from accumulated charge carriers in the detectors, increase the error rate. We have experimentally tested detectors of the system id3110 (Clavis2) from ID Quantique. We identify the parameter regime in which the attack is feasible despite the side effect. Furthermore, we outline how simple modifications in the implementation can make the device immune to this attack.

  11. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  12. An Analysis of Cyber-Attack on NPP Considering Physical Impact

    Energy Technology Data Exchange (ETDEWEB)

    Lee, In Hyo; Kang, Hyun Gook [KAIST, Daejeon (Korea, Republic of); Son, Han Seong [Joonbu University, Geumsan (Korea, Republic of)

    2016-05-15

    Some research teams performed related works on cyber-physical system which is a system that cyber-attack can lead to serious consequences including product loss, damage, injury and death when it is attacked. They investigated the physical impact on cyber-physical system due to the cyber-attack. But it is hard to find the research about NPP cyber security considering the physical impact or safety. In this paper, to investigate the relationship between physical impact and cyber-attack, level 1 PSA results are utilized in chapter 2 and cyber-attack analysis is performed in chapter 3. The cyber security issue on NPP is inevitable issue. Unlike general cyber security, cyber-physical system like NPP can induce serious consequences such as core damage by cyber-attack. So in this paper, to find how hacker can attack the NPP, (1) PSA results were utilized to find the relationship between physical system and cyber-attack and (2) vulnerabilities on digital control systems were investigated to find how hacker can implement the possible attack. It is expected that these steps are utilized when establishing penetration test plans or cyber security drill plans.

  13. An Analysis of Cyber-Attack on NPP Considering Physical Impact

    International Nuclear Information System (INIS)

    Lee, In Hyo; Kang, Hyun Gook; Son, Han Seong

    2016-01-01

    Some research teams performed related works on cyber-physical system which is a system that cyber-attack can lead to serious consequences including product loss, damage, injury and death when it is attacked. They investigated the physical impact on cyber-physical system due to the cyber-attack. But it is hard to find the research about NPP cyber security considering the physical impact or safety. In this paper, to investigate the relationship between physical impact and cyber-attack, level 1 PSA results are utilized in chapter 2 and cyber-attack analysis is performed in chapter 3. The cyber security issue on NPP is inevitable issue. Unlike general cyber security, cyber-physical system like NPP can induce serious consequences such as core damage by cyber-attack. So in this paper, to find how hacker can attack the NPP, (1) PSA results were utilized to find the relationship between physical system and cyber-attack and (2) vulnerabilities on digital control systems were investigated to find how hacker can implement the possible attack. It is expected that these steps are utilized when establishing penetration test plans or cyber security drill plans

  14. Classification of cyber attacks in South Africa

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-05-01

    Full Text Available various ATM's throughout South Africa. Two criminals, Motsoane and Masoleng, were arrested in February 2012 and both sentenced to 15 years in jail [36, 37]. 3.10 2013: IOL DDoS Anonymous Africa claimed responsibility for launching a Distributed Denial... of Service (DDoS) attack on the Independent Newspaper web site iol.co.za. The attack was in response to claims that the IOL group supports Zimbabwean president Robert Mugabe. The following taunt was sent to boast about the attack: “IOL bad boys bad boys...

  15. A Review Of Recent Cyber-Attacks In Fiji

    Directory of Open Access Journals (Sweden)

    Neeraj A. Sharma

    2015-08-01

    Full Text Available Computing technology has evolved in such dramatic ways that a child can use such technology and their features. Internet is one such technology which allows peripheral devices to be connected to each other creating a network to share information. In the same way information can be attacked. In this paper we will be discussing the different types of cyber-attack that recently took place in Fiji. Common attacks discussed in this review paper are phishing email scams website defacement and skimming. Apart from common preventative methods some novel recommendations have been made. We believe the Fiji experiences and recommendations will assist technology users prepare better against such attacks.

  16. Research on high power intra-channel crosstalk attack in optical networks

    Science.gov (United States)

    Ren, Shuai; Zhang, Yinfa; Wang, Jingyu; Zhang, Jumei; Rao, Xuejun; Fang, Yuanyuan

    2017-02-01

    The mechanism of high power intra-channel crosstalk attack is analyzed theoretically and the conclusion that power of attack signal and crosstalk coefficient of optical switch are the main factors for which high power intra-channel have destructive effect on quality of legitimate signals is drawn. Effects of high power intra-channel crosstalk attack on quality of legitimate signals and its capability of attack propagation are investigated quantitatively by building the simulation system in VPI software. The results show that legitimate signals through the first and the second stage optical switch are affected by attack and legitimate signal through the third stage optical switch is almost unaffected by attack when power of original attack signal (OAS) is above 20dB more than that of legitimate signals and crosstalk coefficient of optical switch is -20dB at optical cross connect 1 (OXC1). High power intra-channel crosstalk attack has a certain capability of attack propagation. Attack capability of OAS can be propagated to OXC3 when power of OAS is 27dB more than that of legitimate signals and crosstalk coefficient of optical switch is -20dB. We also find that the secondary attack signal (SAS) does not have capability of attack propagation.

  17. Evaluation of Crosstalk Attacks in Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    2016-01-01

    WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks...

  18. Optimal counterterrorism and the recruitment effect of large terrorist attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2011-01-01

    We analyze a simple dynamic model of the interaction between terrorists and authorities. Our primary aim is to study optimal counterterrorism and its consequences when large terrorist attacks lead to a temporary increase in terrorist recruitment. First, we show that an increase in counterterrorism...... makes it more likely that terrorist cells plan small rather than large attacks and therefore may increase the probability of a successful attack. Analyzing optimal counterterrorism we see that the recruitment effect makes authorities increase the level of counterterrorism after large attacks. Therefore......, in periods following large attacks a new attack is more likely to be small compared to other periods. Finally, we analyze the long-run consequences of the recruitment effect. We show that it leads to more counterterrorism, more small attacks, and a higher sum of terrorism damage and counterterrorism costs...

  19. Quantitative Verification and Synthesis of Attack-Defence Scenarios Conference

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    Attack-defence trees are a powerful technique for formally evaluating attack-defence scenarios. They represent in an intuitive, graphical way the interaction between an attacker and a defender who compete in order to achieve conflicting objectives. We propose a novel framework for the formal

  20. Design, aerodynamics and autonomy of the DelFly

    International Nuclear Information System (INIS)

    De Croon, G C H E; Groen, M A; De Wagter, C; Remes, B; Ruijsink, R; Van Oudheusden, B W

    2012-01-01

    One of the major challenges in robotics is to develop a fly-like robot that can autonomously fly around in unknown environments. In this paper, we discuss the current state of the DelFly project, in which we follow a top-down approach to ever smaller and more autonomous ornithopters. The presented findings concerning the design, aerodynamics and autonomy of the DelFly illustrate some of the properties of the top-down approach, which allows the identification and resolution of issues that also play a role at smaller scales. A parametric variation of the wing stiffener layout produced a 5% more power-efficient wing. An experimental aerodynamic investigation revealed that this could be associated with an improved stiffness of the wing, while further providing evidence of the vortex development during the flap cycle. The presented experiments resulted in an improvement in the generated lift, allowing the inclusion of a yaw rate gyro, pressure sensor and microcontroller onboard the DelFly. The autonomy of the DelFly is expanded by achieving (1) an improved turning logic to obtain better vision-based obstacle avoidance performance in environments with varying texture and (2) successful onboard height control based on the pressure sensor.

  1. Feasibility of eradicating Ceratitis spp. fruit flies from the Western Cape of South Africa by the sterile insect technique

    International Nuclear Information System (INIS)

    Barnes, Brian N.; Eyles, David K.

    2000-01-01

    Fruit production (deciduous fruit, table and wine grapes, and citrus) is a major export-based industry in the Western Cape, with more than 200,000 ha under cultivation. The gross value of these fruits (excluding wine) exceeds US$400 million per annum. Deciduous fruit and table grapes make up the major portion of the industry, with approximately 110,000 ha under production. The Western Cape is host to two species of fruit flies, the Mediterranean fruit fly, Ceratitis capitata (Wiedemann), and the Natal fruit fly, C. rosa Karsch. One or both of these species attack at least 19 species of fruits in this area. Both species have very similar life cycles and habits, and can cause enormous crop losses especially to fruits, but also to some vegetables. Both commercial and resource-limited farmers are affected by fruit flies. Control of fruit flies is currently based on ground applications of insecticides, either as full-cover foliar sprays or low-volume bait sprays. Control costs and crop losses for deciduous fruit and table grapes alone are estimated at US$4 million annually. South Africa is the only southern hemisphere deciduous fruit-exporting country that is not fruit fly-free or is not currently engaged in a project to eradicate fruit flies. Unless similar steps are taken, this situation is likely to threaten the competitiveness of the Western Cape's industry. The Joint FAO/IAEA Division of Nuclear Techniques in Food and Agriculture of the United Nations recently approved funding for the INFRUITEC Centre of the ARC-Fruit, Vine and Wine Research Institute in Stellenbosch to undertake a study to determine the feasibility of eradicating fruit flies from the Western Cape by the sterile insect technique (SIT). Most fruits in the Western Cape are produced in valley systems, and many valleys are isolated from one another to a greater or lesser extent. The Western Cape is itself well isolated from other areas with fruit fly hosts: by the ocean on the eastern, southern and

  2. Leaching of assimilable silicon species from fly ash

    International Nuclear Information System (INIS)

    Piekos, R.; Paslawska, S.

    1998-01-01

    The objective of this study was to investigate the leaching of assimilable silicon species from coal fly ash with distilled water, sea waterand synthetic sea water at various fly ash/water ratios, pHs and temperatures. At the 1 g/100 ml fly ash/water ratio, less than 1 mg Si was found in 11 of aqueous slurries over the pH range 4-8 after 2 h at ambient temperature. The leaching was most effective at pH 10.5. At the fly ash/waterratio indicated, the pH of the suspensions decreased from 10.4 to 8.4 after 5days. The pH of fly ash slurries in sea water varied only slightly over time as compared with that in distilled water. Generally, the leaching of assimilable silicon species with distilled water was more intense than that with the sea water. 27 refs., 6 figs., 3 tabs

  3. 'Cryptogenic Drop Attacks' revisited: evidence of overlap with functional neurological disorder.

    Science.gov (United States)

    Hoeritzauer, Ingrid; Carson, Alan J; Stone, Jon

    2018-02-07

    In their 1973 BMJ paper 'Cryptogenic Drop Attacks', Stevens and Matthews described 40, mostly middle-aged, female patients with drop attacks of unknown cause. Although clinically common, there has been little on this topic since. We aimed to determine clinical features, comorbidity and outcome of patients with drop attacks. We carried out a retrospective review of patients with cryptogenic drop attacks seen consecutively by one clinician (JS) between 2006 and 2016. Demographics, phenomenology, duration and frequency of attacks, attack description and comorbid diagnoses were recorded. Patients were followed up with a notes review. 83 patients with cryptogenic drop attacks were predominantly female (89%, n=79), mean age 44  years. The majority (93%, n=77) could not remember the fall itself and almost half (43%, n=36) experienced prodromal dissociative symptoms. Mechanical trips or syncope preceded drop attacks, historically, in 24% (n=20) of cases. Persistent fatigue (73%, n=61), chronic pain (40%, n=33), functional limb weakness (31%,n=26) and dissociative (non-epileptic) attacks 28% (n=23) were common, with the latter usually preceding or emerging from drop attacks. At follow-up (88%, mean 38 months), 28% (n=23) had resolution of their drop attacks. Predisposing (but non-causative) disease comorbidity was found at baseline (n=12) and follow-up (n=5). Cryptogenic drop attacks are associated with high frequency of comorbid functional somatic and functional neurological disorders. Patients commonly have prodromal dissociative symptoms and in some there was a clear relationship with prior or subsequent dissociative (non-epileptic) attacks. Some cryptogenic drop attacks may be best understood as phenomena on the spectrum of dissociative attacks. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  4. Pore Structure Characterization in Concrete Prepared with Carbonated Fly Ash

    Science.gov (United States)

    Sahoo, Sanjukta

    2018-03-01

    Carbon dioxide capture and storage (CCS) is a technique to address the global concern of continuously rising CO2 level in the atmosphere. Fly ash is considered as a suitable medium for CCS due to presence of metal oxides. The fly ash which has already sequestered carbon dioxide is referred to as carbonated fly ash. Recent research reveals better durability of concretes using carbonated fly ash as part replacement of cement. In the present research pore structure characterization of the carbonated fly ash concrete has been carried out. Mercury Intrusion porosimetry test has been conducted on control concrete and concrete specimens using fly ash and carbonated fly ash at replacement levels of 25% and 40%. The specimens have been water cured for 28 days and 90 days. It is observed that porosity reduction rate is more pronounced in carbonated fly ash concrete compared to control concrete at higher water curing age. Correlation analysis is also carried out which indicates moderately linear relationship between porosity % and pore distribution with particle size and water curing.

  5. Optimal Patrol to Detect Attacks at Dispersed Heterogeneous Locations

    Science.gov (United States)

    2013-12-01

    solution RALP Random-attacker linear program SALP Strategic-attacker linear program SMDP Semi-Markov decision process SP Shortest path SPR1 Shortest...average cost per attack among all vertices, which we refer to as the strategic-attacker linear program ( SALP ): min x zOPT (3.1a) subject to ∑ (k,l)∈A c...the SALP is indicated by zOPT. The lower bound that is obtained from using the LBLP is indicated by zLB. Solutions obtained from using a heuristic

  6. An overview of quarantine for fruit flies

    International Nuclear Information System (INIS)

    Frampton, E.R.

    2000-01-01

    What is meant by 'quarantine for fruit flies'? The Collins dictionary describes 'quarantine' as a period of isolation or detention, especially of persons or animals arriving from abroad, to prevent the spread of disease. In providing an overview of quarantine for fruit flies, a broader definition needs to be applied, that is, the combination of activities required to maintain the fruit fly status of a particular geographical area - perhaps better referred to as a 'quarantine system'. Familiarity with New Zealand's quarantine system for fruit flies (Diptera: Tephritidae) provides a useful basis for subsequent comparison with other countries' systems where some fruit fly species may be present. But, why have 'quarantine for fruit flies'? The multivoltine life history of many species. combined with a relatively long-lived adult stage and highly fecund females, results in a high potential for rapid population increase (Bateman 1979, Fletcher 1987). These factors and the close association of fruit flies with harvested fruit or vegetables explain the high quarantine profile of these insects. However, there is no international requirement for a country to have a quarantine system and unless there are natural quarantine barriers (e.g., mountain range, oceans, deserts) that can be utilised, effective quarantine by an individual country may be an impossible task. The implementation of a successful quarantine system is very expensive and therefore, it would be expected that any benefits attained outweigh the costs (Ivess 1998). Ivess (1998) listed the following benefits from the implementation of an effective quarantine system: minimising production costs (including post harvest treatments), maintaining competitive advantages for market access due to the ongoing freedom from particular pests of quarantine significance, an environment free from many pests harmful to plant health, the maintenance of ecosystems

  7. Detecting Distributed SQL Injection Attacks in a Eucalyptus Cloud Environment

    Science.gov (United States)

    Kebert, Alan; Barnejee, Bikramjit; Solano, Juan; Solano, Wanda

    2013-01-01

    The cloud computing environment offers malicious users the ability to spawn multiple instances of cloud nodes that are similar to virtual machines, except that they can have separate external IP addresses. In this paper we demonstrate how this ability can be exploited by an attacker to distribute his/her attack, in particular SQL injection attacks, in such a way that an intrusion detection system (IDS) could fail to identify this attack. To demonstrate this, we set up a small private cloud, established a vulnerable website in one instance, and placed an IDS within the cloud to monitor the network traffic. We found that an attacker could quite easily defeat the IDS by periodically altering its IP address. To detect such an attacker, we propose to use multi-agent plan recognition, where the multiple source IPs are considered as different agents who are mounting a collaborative attack. We show that such a formulation of this problem yields a more sophisticated approach to detecting SQL injection attacks within a cloud computing environment.

  8. Can a Copycat Effect be Observed in Terrorist Suicide Attacks?

    Directory of Open Access Journals (Sweden)

    Nicholas Farnham

    2017-03-01

    Full Text Available The purpose of this paper is to explore how a copycat effect – established within the field of suicide studies – may manifest itself in terrorist suicide attacks, and takes an exploratory approach in evaluating the prospect of incorporating open-data resources in future counter-terrorism research. This paper explores a possible ‘copycat effect’ in cases of suicide terrorism, which entails a perpetrator being inspired by a preceding attack to carry out a similar attack not long after the original. In the wake of mounting risks of lone wolf terrorist attacks today and due to the general difficulties faced in preventing such attacks, in this paper we explore a potential area of future prevention in media reporting, security and anti-terrorism policies today. Using the START Global Terrorism Database (GTD, this paper investigates terrorist suicide-attack clusters and analyses the relationship between attacks found within the same cluster. Using a mixed-method approach, our analyses did not uncover clear evidence supporting a copycat effect among the studied attacks. These and other findings have numerous policy and future research implications.

  9. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... major stroke. It's important to call 9-1-1 immediately for any stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. The content in this ...

  10. THE REPRISAL ATTACKS BY AL-SHABAAB AGAINST KENYA

    Directory of Open Access Journals (Sweden)

    E.O.S.ODHIAMBO

    2013-10-01

    Full Text Available The incursion of Kenya Defence Forces (KDF into Somalia was met by a series of threats from the Al-Shabaab that it would increase the attacks against Kenya if the troops were not withdrawn. The capture of Kismayu by KDF has weakened the nerve of Al-Shabaab but has not eliminated the imminent danger of a substantive terror attack. Since the incursion by KDF, Kenya has succumbed to a sequence of grenade and Improvised Explosive Devices attacks, roadside bombs, landmines and raids by fighters using small arms and light weapons and Rocket Propelled Grenades against Kenyans mostly in North Eastern, Coastal and Nairobi counties, marking the resurgence of terrorism in the country. We argue that Kenya is more vulnerable to Al-Shabaab terrorists attack than before the KDF incursion by citing the frequencies of reprisal attacks from October 2011 to January 2013. Hence, our troops should be withdrawn and deployed within our boundary.

  11. Thwarting Nonintrusive Occupancy Detection Attacks from Smart Meters

    Directory of Open Access Journals (Sweden)

    Dapeng Man

    2017-01-01

    Full Text Available Occupancy information is one of the most important privacy issues of a home. Unfortunately, an attacker is able to detect occupancy from smart meter data. The current battery-based load hiding (BLH methods cannot solve this problem. To thwart occupancy detection attacks, we propose a framework of battery-based schemes to prevent occupancy detection (BPOD. BPOD monitors the power consumption of a home and detects the occupancy in real time. According to the detection result, BPOD modifies those statistical metrics of power consumption, which highly correlate with the occupancy by charging or discharging a battery, creating a delusion that the home is always occupied. We evaluate BPOD in a simulation using several real-world smart meter datasets. Our experiment results show that BPOD effectively prevents the threshold-based and classifier-based occupancy detection attacks. Furthermore, BPOD is also able to prevent nonintrusive appliance load monitoring attacks (NILM as a side-effect of thwarting detection attacks.

  12. Detecting peripheral-based attacks on the host memory

    CERN Document Server

    Stewin, Patrick

    2015-01-01

    This work addresses stealthy peripheral-based attacks on host computers and presents a new approach to detecting them. Peripherals can be regarded as separate systems that have a dedicated processor and dedicated runtime memory to handle their tasks. The book addresses the problem that peripherals generally communicate with the host via the host’s main memory, storing cryptographic keys, passwords, opened files and other sensitive data in the process – an aspect attackers are quick to exploit.  Here, stealthy malicious software based on isolated micro-controllers is implemented to conduct an attack analysis, the results of which provide the basis for developing a novel runtime detector. The detector reveals stealthy peripheral-based attacks on the host’s main memory by exploiting certain hardware properties, while a permanent and resource-efficient measurement strategy ensures that the detector is also capable of detecting transient attacks, which can otherwise succeed when the applied strategy only me...

  13. Area-Wide Suppression of the Mediterranean Fruit Fly, Ceratitis capitata, and the Oriental Fruit Fly, Bactrocera dorsalis, in Kamuela, Hawaii

    OpenAIRE

    Vargas, Roger I.; Pi?ero, Jaime C.; Mau, Ronald F. L.; Jang, Eric B.; Klungness, Lester M.; McInnis, Donald O.; Harris, Ernest B.; McQuate, Grant T.; Bautista, Renato C.; Wong, Lyle

    2010-01-01

    The United States Department of Agriculture's Agricultural Research Service initiated an area-wide fruit fly management program in Hawaii in 2000. The first demonstration site was established in Kamuela, Hawaii, USA. This paper documents suppression of the Mediterranean fruit fly, Ceratitis capitata (Wiedemann), and the oriental fruit fly, Bactrocera dorsalis (Hendel) (Diptera: Tephritidae), in a 40 km2 area containing urban, rural and agricultural zones during a 6 year period. The suppressio...

  14. Why cryptography should not rely on physical attack complexity

    CERN Document Server

    Krämer, Juliane

    2015-01-01

    This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successfully implemented in practice, they have generally not been considered a serious threat. In short, their physical attack complexity has been overestimated and the implied security threat has been underestimated. First, the book introduces the photonic side channel, which offers not only temporal resolution, but also the highest possible spatial resolution. Due to the high cost of its initial implementation, it has not been taken seriously. The work shows both simple and differential photonic side channel analyses. Then, it presents a fault attack against pairing-based cryptography. Due to the need for at least two indepe...

  15. Multi-Layer Approach for the Detection of Selective Forwarding Attacks.

    Science.gov (United States)

    Alajmi, Naser; Elleithy, Khaled

    2015-11-19

    Security breaches are a major threat in wireless sensor networks (WSNs). WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD). The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable.

  16. Multi-Layer Approach for the Detection of Selective Forwarding Attacks

    Directory of Open Access Journals (Sweden)

    Naser Alajmi

    2015-11-01

    Full Text Available Security breaches are a major threat in wireless sensor networks (WSNs. WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD. The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable.

  17. Adversarial Feature Selection Against Evasion Attacks.

    Science.gov (United States)

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection.

  18. Trojan-horse attacks on quantum-key-distribution systems

    International Nuclear Information System (INIS)

    Gisin, N.; Fasel, S.; Kraus, B.; Zbinden, H.; Ribordy, G.

    2006-01-01

    General Trojan-horse attacks on quantum-key-distribution systems, i.e., attacks on Alice or Bob's system via the quantum channel, are analyzed. We illustrate the power of such attacks with today's technology and conclude that all systems must implement active counter measures. In particular, all systems must include an auxiliary detector that monitors any incoming light. We show that such counter measures can be efficient, provided that enough additional privacy amplification is applied to the data. We present a practical way to reduce the maximal information gain that an adversary can gain using Trojan-horse attacks. This does reduce the security analysis of the two-way plug-and-play implementation to those of the standard one-way systems

  19. 12 CFR 308.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... PRACTICE RULES OF PRACTICE AND PROCEDURE Uniform Rules of Practice and Procedure § 308.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any...

  20. 12 CFR 19.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... OF PRACTICE AND PROCEDURE Uniform Rules of Practice and Procedure § 19.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any court concerning all...

  1. Distinction of Fly Artifacts from Human Blood using Immunodetection.

    Science.gov (United States)

    Rivers, David B; Acca, Gillian; Fink, Marc; Brogan, Rebecca; Chen, Dorothy; Schoeffield, Andrew

    2018-02-21

    Insect stains produced by necrophagous flies are indistinguishable morphologically from human bloodstains. At present, no diagnostic tests exist to overcome this deficiency. As the first step toward developing a chemical test to recognize fly artifacts, polyclonal antisera were generated in rats against three distinct antigenic sequences of fly cathepsin D-like proteinase, an enzyme that is structurally distinct in cyclorrhaphous Diptera from other animals. The resulting rat antisera bound to artifacts produced by Protophormia terraenovae and synthetic peptides used to generate the polyclonal antisera, but not with any type of mammalian blood tested in immunoassays. Among the three antisera, anti-md3 serum displayed the highest reactivity for fly stains, demonstrated cross-reactivity for all synthetic peptides representing antigenic sequences of the mature fly enzyme, and bound artifacts originating from the fly digestive tract. Further work is needed to determine whether the antisera are suitable for non-laboratory conditions. © 2018 American Academy of Forensic Sciences.

  2. Drammer : Deterministic Rowhammer attacks on mobile platforms

    NARCIS (Netherlands)

    Van Der Veen, Victor; Fratantonio, Yanick; Lindorfer, Martina; Gruss, Daniel; Maurice, Clémentine; Vigna, Giovanni; Bos, Herbert; Razavi, Kaveh; Giuffrida, Cristiano

    2016-01-01

    Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and completely subvert a system. However, existing efforts either describe probabilistic (and thus unreliable) attacks or rely on special (and often unavailable) memory management features to place victim objects

  3. A Comprehensive Taxonomy and Analysis of IEEE 802.15.4 Attacks

    Directory of Open Access Journals (Sweden)

    Yasmin M. Amin

    2016-01-01

    Full Text Available The IEEE 802.15.4 standard has been established as the dominant enabling technology for Wireless Sensor Networks (WSNs. With the proliferation of security-sensitive applications involving WSNs, WSN security has become a topic of great significance. In comparison with traditional wired and wireless networks, WSNs possess additional vulnerabilities which present opportunities for attackers to launch novel and more complicated attacks against such networks. For this reason, a thorough investigation of attacks against WSNs is required. This paper provides a single unified survey that dissects all IEEE 802.15.4 PHY and MAC layer attacks known to date. While the majority of existing references investigate the motive and behavior of each attack separately, this survey classifies the attacks according to clear metrics within the paper and addresses the interrelationships and differences between the attacks following their classification. The authors’ opinions and comments regarding the placement of the attacks within the defined classifications are also provided. A comparative analysis between the classified attacks is then performed with respect to a set of defined evaluation criteria. The first half of this paper addresses attacks on the IEEE 802.15.4 PHY layer, whereas the second half of the paper addresses IEEE 802.15.4 MAC layer attacks.

  4. The accountability problem of flooding attacks in service-oriented architectures

    DEFF Research Database (Denmark)

    Jensen, Meiko; Schwenk, Jörg

    2009-01-01

    The threat of Denial of Service attacks poses a serious problem to the security of network-based services in general. For flooding attacks against service-oriented applications, this threat is dramatically amplified with potentially much higher impact and very little effort on the attacker's side....... Additionally, due to the high distribution of a SOA application's components, fending such attacks becomes a far more complex task. In this paper, we present the problem of accountability, referring to the issue of resolving the attacker in a highly distributed service-oriented application. Using a general...

  5. Attack Helicopter Operations: Art or Science

    Science.gov (United States)

    1991-05-13

    ATTACK HELICOPTER OPERATIONS: ART OR SCIENCE ? BY LIEUTENANT COLONEL JAN CALLEN United States Army DISTRIBUTION STATEMENT A: Approved for public release...TASK IWORK UNIT ELEMENT NO. NO. NO. ACCESSION NC 11. TITLE (Include Socurity Classification) Attack Helicopter Operations: Art or Science ? 12. PERSONAL...OPERATIONS: ART OR SCIENCE ? AN INDIVIDUAL STUDY PROJECT by Lieutenant Colonel Jan Callen United States Army Colonel Greg Snelgrove Project Adviser U.S

  6. Attacker Model Lab

    OpenAIRE

    2006-01-01

    tut quiz present Tutorial Quiz Presentation Interactive Media Element This interactive tutorial the two sub-classes of computer attackers: amateurs and professionals. It provides valuable insight into the nature of necessary protection measure for information assets. CS3600 Information Assurance: Introduction to Computer Security Course

  7. KINETICS OF FLY ASH BENEFICIATION BY CARBON BURNOUT

    Energy Technology Data Exchange (ETDEWEB)

    Dr. Joseph N.D. Dodoo; Dr. Joseph M. Okoh

    2000-11-01

    Surface area analyses performed on fly ash samples reveal that the surface area is controlled by carbon content. The higher surface areas found in large particles are due to the presence of highly porous carbonaceous particles. Adsorption-desorption isotherms and t-plots of fly ash samples indicate that fly ash is porous. BJH Adsorption/Desorption pore size analysis reveal that pore diameters are independent of sieve size. They appear to be dependent only on the nature of the material which confers porosity. Based on the results of Brown and Dykstra (41) it is reasonable to assume that calculations of reaction rates at temperatures above 550 C were confounded by weight losses from processes other than carbon oxidation and, therefore, are not useful in determination of the temperature dependence of carbon oxidation in fly ash. The results of the present study indicate that temperatures below 550 C should be used for future studies in order to satisfactorily assess the temperature dependence of carbon oxidation in fly ash. Furthermore, it is also advisable that percent carbon determinations be performed on fly ash samples after the oxidation reactions to determine whether all carbon present in fly ash is oxidized. This will ensure that reaction rates are representative of the complete oxidation of carbon. An inverse relationship was determined between reaction rates and oxygen concentration for this study. As discussed, this may be due to volatilization of volatiles from fly ash and ease of transport of products away from the reaction sites by the action of the vacuum applied to the samples. A more accurate determination of oxygen dependence of carbon oxidation can be accomplished by the use of specialty gases containing different concentrations of oxygen which could eliminate the need to apply vacuum to the samples.

  8. Comparison of Anastrepha ludens (Diptera: Tephritidae) Bisexual and Genetic Sexing (Tapachula-7) Strains: Effect of Hypoxia, Fly Density, Chilling Period, and Food Type on Fly Quality.

    Science.gov (United States)

    Arredondo, José; Ruiz, Lía; Hernández, Emilio; Montoya, Pablo; Díaz-Fleischer, Francisco

    2016-04-01

    The use of genetic sexing strain (GSS) insects in the sterile insect technique (SIT) makes necessary the revision of quality parameters of some stressful steps used during the packing process for aerial release because of possible differences in tolerance between fly strains. Here, we determined the effect of three periods of hypoxia (12, 24, and 36 h at pupal stage), three cage densities (1.0, 1.3, and 1.5 flies/cm2), two different foods (protein/sugar (1/24) and Mubarqui), and three chilling times (20 min [control], 90, and 180 min) on the quality parameters of flies of two Anastrepha ludens (Loew) strains (bisexual and GSS Tapachula-7). In general, the response to stressful conditions of both fly strains was qualitatively equivalent but quantitatively different, as flies of both strains responded equally to the stressful factors; however, flies of Tapachula-7 exhibited lower quality parameters than the control flies. Thus, hypoxia affected the flying ability but not the emergence or longevity of flies. The food type affected the adult weight; protein/sugar produced heavier flies that also survived longer and had a greater mating propensity. Flies under the lowest density were better fliers that those at the other two densities. Increasing chilling time reduced flight ability but not longevity or mating propensity. The implications of these findings for the use of A. ludens GSS in SIT programs are discussed herein.

  9. A Secure Localization Approach against Wormhole Attacks Using Distance Consistency

    Directory of Open Access Journals (Sweden)

    Lou Wei

    2010-01-01

    Full Text Available Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sniffs packets at one point in the network and tunnels them through a wired or wireless link to another point, and the other relays them within its vicinity. In this paper, we investigate the impact of the wormhole attack on the localization and propose a novel distance-consistency-based secure localization scheme against wormhole attacks, which includes three phases of wormhole attack detection, valid locators identification and self-localization. The theoretical model is further formulated to analyze the proposed secure localization scheme. The simulation results validate the theoretical results and also demonstrate the effectiveness of our proposed scheme.

  10. Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication

    Science.gov (United States)

    Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru

    In this paper, we propose password recovery attacks against challenge-response authentication protocols. Our attacks use a message difference for a MD5 collision attack proposed in IEICE 2008. First, we show how to efficiently find a message pair that collides with the above message difference. Second, we show that a password used in authenticated post office protocol (APOP) can be recovered practically. We also show that the password recovery attack can be applied to a session initiation protocol (SIP) and digest authentication. Our attack can recover up to the first 31 password characters in a short time and up to the first 60 characters faster than the naive search method. We have implemented our attack and confirmed that 31 characters can be successfully recovered.

  11. 12 CFR 747.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... INVESTIGATIONS Uniform Rules of Practice and Procedure § 747.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any court concerning all or any part of an...

  12. Phase-remapping attack in practical quantum-key-distribution systems

    International Nuclear Information System (INIS)

    Fung, Chi-Hang Fred; Qi, Bing; Lo, Hoi-Kwong; Tamaki, Kiyoshi

    2007-01-01

    Quantum key distribution (QKD) can be used to generate secret keys between two distant parties. Even though QKD has been proven unconditionally secure against eavesdroppers with unlimited computation power, practical implementations of QKD may contain loopholes that may lead to the generated secret keys being compromised. In this paper, we propose a phase-remapping attack targeting two practical bidirectional QKD systems (the 'plug-and-play' system and the Sagnac system). We showed that if the users of the systems are unaware of our attack, the final key shared between them can be compromised in some situations. Specifically, we showed that, in the case of the Bennett-Brassard 1984 (BB84) protocol with ideal single-photon sources, when the quantum bit error rate (QBER) is between 14.6% and 20%, our attack renders the final key insecure, whereas the same range of QBER values has been proved secure if the two users are unaware of our attack; also, we demonstrated three situations with realistic devices where positive key rates are obtained without the consideration of Trojan horse attacks but in fact no key can be distilled. We remark that our attack is feasible with only current technology. Therefore, it is very important to be aware of our attack in order to ensure absolute security. In finding our attack, we minimize the QBER over individual measurements described by a general POVM, which has some similarity with the standard quantum state discrimination problem

  13. Effectiveness of the Call in Beach Volleyball Attacking Play

    Directory of Open Access Journals (Sweden)

    Künzell Stefan

    2014-12-01

    Full Text Available In beach volleyball the setter has the opportunity to give her or his hitter a “call”. The call intends that the setter suggests to her or his partner where to place the attack in the opponent’s court. The effectiveness of a call is still unknown. We investigated the women’s and men’s Swiss National Beach Volleyball Championships in 2011 and analyzed 2185 attacks. We found large differences between female and male players. While men called in only 38.4% of attacks, women used calls in 85.5% of attacks. If the male players followed a given call, 63% of the attacks were successful. The success rate of attacks without any call was 55.8% and 47.6% when the call was ignored. These differences were not significant (χ2(2 = 4.55, p = 0.103. In women’s beach volleyball, the rate of successful attacks was 61.5% when a call was followed, 35% for attacks without a call, and 42.6% when a call was ignored. The differences were highly significant (χ2(2 = 23.42, p < 0.0005. Taking into account the findings of the present study, we suggested that the call was effective in women’s beach volleyball, while its effect in men’s game was unclear. Considering the quality of calls we indicate that there is a significant potential to increase the effectiveness of a call.

  14. Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis.

    Science.gov (United States)

    Zhou, Wei; Wen, Junhao; Koh, Yun Sing; Xiong, Qingyu; Gao, Min; Dobbie, Gillian; Alam, Shafiq

    2015-01-01

    Recommender systems are highly vulnerable to shilling attacks, both by individuals and groups. Attackers who introduce biased ratings in order to affect recommendations, have been shown to negatively affect collaborative filtering (CF) algorithms. Previous research focuses only on the differences between genuine profiles and attack profiles, ignoring the group characteristics in attack profiles. In this paper, we study the use of statistical metrics to detect rating patterns of attackers and group characteristics in attack profiles. Another question is that most existing detecting methods are model specific. Two metrics, Rating Deviation from Mean Agreement (RDMA) and Degree of Similarity with Top Neighbors (DegSim), are used for analyzing rating patterns between malicious profiles and genuine profiles in attack models. Building upon this, we also propose and evaluate a detection structure called RD-TIA for detecting shilling attacks in recommender systems using a statistical approach. In order to detect more complicated attack models, we propose a novel metric called DegSim' based on DegSim. The experimental results show that our detection model based on target item analysis is an effective approach for detecting shilling attacks.

  15. Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis

    Science.gov (United States)

    Zhou, Wei; Wen, Junhao; Koh, Yun Sing; Xiong, Qingyu; Gao, Min; Dobbie, Gillian; Alam, Shafiq

    2015-01-01

    Recommender systems are highly vulnerable to shilling attacks, both by individuals and groups. Attackers who introduce biased ratings in order to affect recommendations, have been shown to negatively affect collaborative filtering (CF) algorithms. Previous research focuses only on the differences between genuine profiles and attack profiles, ignoring the group characteristics in attack profiles. In this paper, we study the use of statistical metrics to detect rating patterns of attackers and group characteristics in attack profiles. Another question is that most existing detecting methods are model specific. Two metrics, Rating Deviation from Mean Agreement (RDMA) and Degree of Similarity with Top Neighbors (DegSim), are used for analyzing rating patterns between malicious profiles and genuine profiles in attack models. Building upon this, we also propose and evaluate a detection structure called RD-TIA for detecting shilling attacks in recommender systems using a statistical approach. In order to detect more complicated attack models, we propose a novel metric called DegSim’ based on DegSim. The experimental results show that our detection model based on target item analysis is an effective approach for detecting shilling attacks. PMID:26222882

  16. Collaborative Attack Mitigation and Response: A survey

    NARCIS (Netherlands)

    Steinberger, Jessica; Sperotto, Anna; Baier, Harald; Pras, Aiko

    2015-01-01

    Over recent years, network-based attacks have become to one of the top causes of network infrastructure and service outages. To counteract a network-based attack, an approach is to move mitigation from the target network to the networks of Internet Service Providers (ISP). However, it remains

  17. Evaluation of the mechanical properties of class-F fly ash

    Energy Technology Data Exchange (ETDEWEB)

    Kim, B.; Prezzi, M. [Purdue University, West Lafayette, IN (United States)

    2008-07-01

    Coal-burning power plants in the United States (US) generate more than 70 million tons of fly ash as a by-product annually. Recycling large volumes of fly ash in geotechnical applications may offer an attractive alternative to the disposal problem as most of it is currently dumped in ponds or landfills. Class-F fly ash, resulting from burning of bituminous or anthracite coals, is the most common type of fly ash in the US. In the present study, the mechanical characteristics (compaction response, compressibility, and shear strength) of class-F fly ash were investigated by performing various laboratory tests (compaction test, one-dimensional compression test, direct shear test and consolidated-drained triaxial compression test) on fly ash samples collected from three power plants in the state of Indiana (US). Test results have shown that despite some morphological differences, class-F fly ash exhibits mechanical properties that are, in general, comparable to those observed in natural sandy soils.

  18. Fly ash. Quality recycling material

    Energy Technology Data Exchange (ETDEWEB)

    Blomster, D.; Leisio, C.

    1996-11-01

    Imatran Voima`s coal-fired power plants not only generate power and heat but also produce fly ash which is suitable raw material for recycling. This material for recycling is produced in the flue gas cleaning process. It is economical and, thanks to close quality control, is suitable for use as a raw material in the building materials industry, in asphalt production, and in earthworks. Structures made from fly ash are also safe from an environmental point of view. (orig.)

  19. A Unique Fatal Moose Attack Mimicking Homicide.

    Science.gov (United States)

    Gudmannsson, Petur; Berge, Johan; Druid, Henrik; Ericsson, Göran; Eriksson, Anders

    2018-03-01

    Fatalities caused by animal attacks are rare, but have the potential to mimic homicide. We present a case in which a moose attacked and killed a woman who was walking her dog in a forest. Autopsy showed widespread blunt trauma with a large laceration on one leg in which blades of grass were embedded. Flail chest was the cause of death. The case was initially conceived as homicide by means of a riding lawn mower. A review of the case by moose experts and analyses of biological trace material that proved to originate from moose, established the true source of injury. The dog probably provoked a moose, which, in response, stomped and gored the victim to death. The injuries resembled those previously reported from attacks by cattle and water buffalo. Fatal moose attacks constitute an extremely rare threat in boreal areas, but can be considered in traumatic deaths of unknown cause. © 2017 American Academy of Forensic Sciences.

  20. The role of sleep in migraine attacks

    Directory of Open Access Journals (Sweden)

    Elaine Inamorato

    1993-11-01

    Full Text Available Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. In view of this variable relationship we studied the records of 159 consecutive outpatients of our Headache Unit. In 121 records there was reference to sleep involvement, in 55% by a single form and in 45% by more than one form. When only one form was related, relief was most common (70%. 30% of that group of patients had the migraine attack precipitated by sleep, 24% by deprivation and 6% by sleep excess. When the effects of sleep were multiple, these effects were as expected logically in 65%: «in accordance» group (e.g attack precipitated by sleep deprivation and relieved by sleep onset. In a second group, («conflicting» where the involvement was not logical, there were three different combinations of sleep involvement, possibly due to more than one pathophysiological mechanism.

  1. Development and oviposition preference of house flies and stable flies (Diptera: Muscidae) in six substrates from Florida equine facilities

    Science.gov (United States)

    House flies, Musca domestica L., and stable flies, Stomoxys calcitrans (L.), (Diptera: Muscidae), common pests on equine facilities, were studied in the laboratory to determine their oviposition preferences and larval development on six substrates commonly found on equine facilities. The substrates...

  2. Changes in vestibular evoked myogenic potentials after Meniere attacks.

    Science.gov (United States)

    Kuo, Shih-Wei; Yang, Ting-Hua; Young, Yi-Ho

    2005-09-01

    The aim of this study was to apply videonystagmography (VNG) and vestibular evoked myogenic potential (VEMP) tests to patients with Meniere attacks, to explore the mechanics of where saccular disorders may affect the semicircular canals. From January 2001 to December 2003, 12 consecutive patients with unilateral definite Meniere's disease with vertiginous attacks underwent VNG for recording spontaneous nystagmus, as well as VEMP tests. At the very beginning of the Meniere attack, the spontaneous nystagmus beat toward the lesion side in 5 patients (42%) and toward the healthy side in 7 patients (58%). Twenty-four hours later, only 6 patients (50%) showed spontaneous nystagmus beating toward the healthy side. Nevertheless, spontaneous nystagmus subsided in all patients within 48 hours. The VEMP test was performed within 24 hours of a Meniere attack; the VEMPs were normal in 4 patients and abnormal in 8 patients (67%). After 48 hours, 4 patients with initially abnormal VEMPs had resolution and return to normal VEMPs, and the other 4 patients still had absent VEMPs. Most patients (67%) with Meniere attacks revealed abnormal VEMPs, indicating that the saccule participates in a Meniere attack. This is an important idea that stimulates consideration of the mechanism of Meniere attacks.

  3. Tetrameric structure of the flagellar cap protein FliD from Serratia marcescens.

    Science.gov (United States)

    Cho, So Yeon; Song, Wan Seok; Hong, Ho Jeong; Lee, Geun-Shik; Kang, Seung Goo; Ko, Hyun-Jeong; Kim, Pyeung-Hyeun; Yoon, Sung-Il

    2017-07-15

    Bacterial motility is provided by the flagellum. FliD is located at the distal end of the flagellum and plays a key role in the insertion of each flagellin protein at the growing tip of the flagellar filament. Because FliD functions as an oligomer, the determination of the oligomeric state of FliD is critical to understanding the molecular mechanism of FliD-mediated flagellar growth. FliD has been shown to adopt a pentameric or a hexameric structure depending on the bacterial species. Here, we report another distinct oligomeric form of FliD based on structural and biochemical studies. The crystal structures of the D2 and D3 domains of Serratia marcescens FliD (smFliD) were determined in two crystal forms and together revealed that smFliD assembles into a tetrameric architecture that resembles a four-pointed star plate. smFliD tetramerization was also confirmed in solution by cross-linking experiments. Although smFliD oligomerizes in a head-to-tail orientation using a common primary binding interface between the D2 and D3' domains (the prime denotes the second subunit in the oligomer) similarly to other FliD orthologs, the smFliD tetramer diverges to present a unique secondary D2-D2' binding interface. Our structure-based comparative analysis of FliD suggests that bacteria have developed diverse species-specific oligomeric forms of FliD that range from tetramers to hexamers for flagellar growth. Copyright © 2017 Elsevier Inc. All rights reserved.

  4. Messaging Attacks on Android: Vulnerabilities and Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Khodor Hamandi

    2015-01-01

    Full Text Available Currently, Android is the leading mobile operating system in number of users worldwide. On the security side, Android has had significant challenges despite the efforts of the Android designers to provide a secure environment for apps. In this paper, we present numerous attacks targeting the messaging framework of the Android system. Our focus is on SMS, USSD, and the evolution of their associated security in Android and accordingly the development of related attacks. Also, we shed light on the Android elements that are responsible for these attacks. Furthermore, we present the architecture of an intrusion detection system (IDS that promises to thwart SMS messaging attacks. Our IDS shows a detection rate of 87.50% with zero false positives.

  5. Eradication of the melon fly, Bactrocera cucurbitae Coquillett, by mass release of sterile flies in Okinawa prefecture, Japan

    International Nuclear Information System (INIS)

    Kakinohana, H.; Kuba, H.; Kohama, T.; Kinjo, K.; Taniguchi, M.; Nakamori, H.; Tanahara, A.; Sokei, Y.

    1997-01-01

    In 1972, MAFF, Japan and the Okinawa Prefectural Government initiated an experimental eradication project of the melon fly from Kume Island, Okinawa Prefecture, Japan using the sterile insect technique (SIT). Following the successful eradication on Kume Island in 1978, large scale SIT was started to eradicate the melon fly on the 3 groups of islands, Miyako, Okinawa and Yaeyama of Okinawa Prefecture, Japan in 1984, 1986 and 1989, and eradication was achieved in 1987, 1990 and 1993, respectively. For the successful eradication on Miyako, Okinawa and Yaeyama groups of islands, about 6,340, 30,940 and 15,440 million sterile melon flies were released, respectively

  6. Producing zeolites from fly ash

    International Nuclear Information System (INIS)

    Rayalu, S.; Labhestwar, N.K.; Biniwale, R.B.; Udhoji, J.S.; Meshram, S.U.; Khanna, P.

    1998-01-01

    Fly ash has virtually become a menace of thermal power generation, leading to its devastating effects on the environment. Development of alternate methods of its disposal - especially those with recourse to recovery of valuable materials-has thus become imperative. This paper deals with the utilisation of fly ash for the production of high value-added products, viz., commercial grade zeolites. The physico-chemical and morphological characteristics of fly ash based Zeolite-A (FAZ-A) compares well with commercial Zeolite-A. High calcium binding capacity, appropriate particle/pore size and other detergency characteristics of FAZ-A brings forth its potential as a substitute for phosphatic detergent builder. The technology is extremely versatile, and other products like Zeolite-X, Zeolite-Y, sodalite and mordenite are also amenable for cost effective production with modifications in certain reaction parameters. Low temperature operations, ready availability of major raw materials, simplicity of process and recycling of unused reactants and process water are special features of the process. (author)

  7. Episodic radiations in the fly tree of life

    DEFF Research Database (Denmark)

    Wiegmann, Brian M.; Trautwein, Michelle D.; Winkler, Isaac S.

    2011-01-01

    Flies are one of four superradiations of insects (along with beetles, wasps, and moths) that account for the majority of animal life on Earth. Diptera includes species known for their ubiquity (Musca domestica house fly), their role as pests (Anopheles gambiae malaria mosquito), and their value......), and Schizophora (65 Ma)—and a number of life history transitions to hematophagy, phytophagy, and parasitism in the history of fly evolution over 260 million y....

  8. Requirements for satisfactory flying qualities of airplanes

    Science.gov (United States)

    Gilruth, R R

    1943-01-01

    Report discusses the results of an analysis of available data to determine what measured characteristics are significant in defining satisfactory flying qualities, what characteristics are reasonable to require of an airplane, and what influence the various design features have on the observed flying qualities.

  9. Defending networks against denial-of-service attacks

    Science.gov (United States)

    Gelenbe, Erol; Gellman, Michael; Loukas, George

    2004-11-01

    Denial of service attacks, viruses and worms are common tools for malicious adversarial behavior in networks. Experience shows that over the last few years several of these techniques have probably been used by governments to impair the Internet communications of various entities, and we can expect that these and other information warfare tools will be used increasingly as part of hostile behavior either independently, or in conjunction with other forms of attack in conventional or asymmetric warfare, as well as in other forms of malicious behavior. In this paper we concentrate on Distributed Denial of Service Attacks (DDoS) where one or more attackers generate flooding traffic and direct it from multiple sources towards a set of selected nodes or IP addresses in the Internet. We first briefly survey the literature on the subject, and discuss some examples of DDoS incidents. We then present a technique that can be used for DDoS protection based on creating islands of protection around a critical information infrastructure. This technique, that we call the CPN-DoS-DT (Cognitive Packet Networks DoS Defence Technique), creates a self-monitoring sub-network surrounding each critical infrastructure node. CPN-DoS-DT is triggered by a DDoS detection scheme, and generates control traffic from the objects of the DDoS attack to the islands of protection where DDOS packet flows are destroyed before they reach the critical infrastructure. We use mathematical modelling, simulation and experiments on our test-bed to show the positive and negative outcomes that may result from both the attack, and the CPN-DoS-DT protection mechanism, due to imperfect detection and false alarms.

  10. Heavy metals in MSW incineration fly ashes

    DEFF Research Database (Denmark)

    Ferreira, Celia; Ribeiro, Alexandra B.; Ottosen, Lisbeth M.

    2003-01-01

    Incineration is a common solution for dealing with the increasing amount of municipal solid waste (MSW). During the process, the heavy metals initially present in the waste go through several transformations, ending up in combustion products, such as fly ash. This article deals with some issues...... related to the combustion of MSW and the formation of fly ash, especially in what concerns heavy metals. Treatment of the flue gas in air pollution control equipment plays an important role and the basic processes to accomplish this are explained. Fly ash from a semi-dry flue gas treatment system...

  11. Reconstructing the behavior of walking fruit flies

    Science.gov (United States)

    Berman, Gordon; Bialek, William; Shaevitz, Joshua

    2010-03-01

    Over the past century, the fruit fly Drosophila melanogaster has arisen as almost a lingua franca in the study of animal behavior, having been utilized to study questions in fields as diverse as sleep deprivation, aging, and drug abuse, amongst many others. Accordingly, much is known about what can be done to manipulate these organisms genetically, behaviorally, and physiologically. Most of the behavioral work on this system to this point has been experiments where the flies in question have been given a choice between some discrete set of pre-defined behaviors. Our aim, however, is simply to spend some time with a cadre of flies, using techniques from nonlinear dynamics, statistical physics, and machine learning in an attempt to reconstruct and gain understanding into their behavior. More specifically, we use a multi-camera set-up combined with a motion tracking stage in order to obtain long time-series of walking fruit flies moving about a glass plate. This experimental system serves as a test-bed for analytical, statistical, and computational techniques for studying animal behavior. In particular, we attempt to reconstruct the natural modes of behavior for a fruit fly through a data-driven approach in a manner inspired by recent work in C. elegans and cockroaches.

  12. Tolerance of house fly, Musca domestica L. (Diptera: Muscidae) to dichlorvos (76% EC) an insecticide used for fly control in the tsunami-hit coastal villages of southern India.

    Science.gov (United States)

    Srinivasan, R; Jambulingam, P; Gunasekaran, K; Boopathidoss, P S

    2008-02-01

    The Directorate of Public Health (DPH), Tamil Nadu, in southern India employed spraying of dichlorvos (76% EC) for quick elimination of fly concentrations in the tsunami-hit coastal villages at the concentration of 304g (a.i.)/10,000m(2). However, nuisance of house flies remained high particularly in temporary shelters and centralized relief kitchens. Susceptibility of house fly, Musca domestica to dichlorvos was determined in the laboratory to provide information for an effective management of this pest. Various concentrations of dichlorvos (76% EC) viz., 0.1, 0.2, 0.4, 0.6 and 0.8microg (a.i.) per fly, were tested using topical application against F(1) progenies of house flies collected 12 months after insecticide applications from different habitats in the tsunami-hit coastal villages. Fly mortality was recorded at 24h post treatment. Parallel controls were maintained for comparison. Mortality of the house flies varied between 17.5% and 100% and increased with an increase in dosage of the insecticide. Mortality was >80% at 0.6 and 0.8microg (a.i.) per fly. The LD(50) of dichlorvos tested against flies collected from different villages varied from 0.218microg (a.i.) to 0.235microg (a.i.) per fly and the LD(90) varied from 0.574microg (a.i.) to 0.639microg (a.i.) per fly. House flies collected from a rural village, Thirukanur that had never been exposed for insecticide treatment in the past one decade, when tested, the mortality varied between 92.5% and 100% and increased with concentration of dichlorvos. Mortality was >90% from 0.2microg (a.i.) per fly and the LD(50) was 0.0399microg (a.i.)/fly, while the LD(90) was 0.1604microg (a.i.)/fly. The LD(90) values of the flies collected from the tsunami-hit villages were 3.5-3.9 times higher than that of the flies collected from Thirukanur. Fly abundance remained high in tsunami-hit villages with no marked reduction, suggesting that the flies had developed tolerance to dichlorvos. It is suggested that for an effective

  13. Performance Improvement of Power Analysis Attacks on AES with Encryption-Related Signals

    Science.gov (United States)

    Lee, You-Seok; Lee, Young-Jun; Han, Dong-Guk; Kim, Ho-Won; Kim, Hyoung-Nam

    A power analysis attack is a well-known side-channel attack but the efficiency of the attack is frequently degraded by the existence of power components, irrelative to the encryption included in signals used for the attack. To enhance the performance of the power analysis attack, we propose a preprocessing method based on extracting encryption-related parts from the measured power signals. Experimental results show that the attacks with the preprocessed signals detect correct keys with much fewer signals, compared to the conventional power analysis attacks.

  14. Mass casualty response in the 2008 Mumbai terrorist attacks.

    Science.gov (United States)

    Roy, Nobhojit; Kapil, Vikas; Subbarao, Italo; Ashkenazi, Isaac

    2011-12-01

    The November 26-29, 2008, terrorist attacks on Mumbai were unique in its international media attention, multiple strategies of attack, and the disproportionate national fear they triggered. Everyone was a target: random members of the general population, iconic targets, and foreigners alike were under attack by the terrorists. A retrospective, descriptive study of the distribution of terror victims to various city hospitals, critical radius, surge capacity, and the nature of specialized medical interventions was gathered through police, legal reports, and interviews with key informants. Among the 172 killed and 304 injured people, about four-fifths were men (average age, 33 years) and 12% were foreign nationals. The case-fatality ratio for this event was 2.75:1, and the mortality rate among those who were critically injured was 12%. A total of 38.5% of patients arriving at the hospitals required major surgical intervention. Emergency surgical operations were mainly orthopedic (external fixation for compound fractures) and general surgical interventions (abdominal explorations for penetrating bullet/shrapnel injuries). The use of heavy-duty automatic weapons, explosives, hostages, and arson in these terrorist attacks alerts us to new challenges to medical counterterrorism response. The need for building central medical control for a coordinated response and for strengthening public hospital capacity are lessons learned for future attacks. These particular terrorist attacks had global consequences, in terms of increased security checks and alerts for and fears of further similar "Mumbai-style" attacks. The resilience of the citizens of Mumbai is a critical measure of the long-term effects of terror attacks.

  15. 1994 Attack Team Workshop: Phase II - Full-Scale Offensive Fog Attack Tests

    National Research Council Canada - National Science Library

    Scheffey, Joseph

    1997-01-01

    .... This report demonstrates the benefits of using a medium angle fog stream to control the overhead fire threat when conducting a direct attack on a growing/steady state fire where the sea of the fire is obstructed...

  16. Population Dynamics of the Mediterranean Fruit Fly in Montenegro

    Directory of Open Access Journals (Sweden)

    Sanja Radonjić

    2013-01-01

    Full Text Available Population dynamics of the Mediterranean fruit fly was studied along Montenegro seacoast. Tephri traps baited with 3 component female-biased attractants were used in 11 different localities to monitor the fruit fly population in commercial citrus orchards, mixed-fruit orchards, and in backyards. From 2008–2010, the earliest captures were recorded no earlier than July. In 2011, the first adult fly was detected in mid-June. Low captures rates were recorded in July and August (below 0.5 flies per trap per day; FTD and peaked from mid-September to the end of October of each year. Our results indicate fluctuation of fly per trap per day depending on dates of inspection and locality, with significant differences in the adult population density. A maximum population was always reached in the area of Budva-Herceg Novi with an FTD of 66.5, 89.5, 71.63, and 24.64 (from 2008–2011 respectively. Fly activity lasts from mid-June/early-July to end December, with distinct seasonal variation in the population.

  17. Vestibular schwannoma and fitness to fly.

    Science.gov (United States)

    Pons, Yoann; Raynal, Marc; Hunkemöller, Iris; Lepage, Pierre; Kossowski, Michel

    2010-10-01

    When a pilot is referred for vestibular schwannoma (VS), his or her fitness to fly may be questioned. The objective of this retrospective study was to describe a series of VS cases in a pilot population and to discuss their fitness to fly options. Between September 2002 and March 2010, the ENT/Head and Neck Surgery Department of the National Pilot Expertise Center conducted nearly 120,000 expert consultations for 40,000 pilots. We examined the files of 10 pilots who were referred to our 2 national experts for VS. At the time of the expert consultation, hypoacusis was present in nine cases (four with total deafness), tinnitus in one case, and vertigo in nine cases. In our series, only 2 of the 10 pilots experienced a negative impact on their fitness to fly. Decisions on fitness to fly were based on several factors: minimally disturbed audition, i.e., less than a 35-dB hearing loss with a good speech discrimination score; good balance, i.e., no reported difficulties; no spontaneous nystagmus recorded on videonystagmography (VNG); no postural deviation; and a normal head-shaking test. The delay and the VS's evolution between diagnosis and expert consultation are important because the selection of a treatment to control VS is critical in minimizing the possible associated complications. When a pilot is referred for VS, his or her fitness to fly is determined by the size of the tumor, balance, auditory status, and the follow-up results of these findings. The complications that may arise from VS treatments must also be considered.

  18. Network overload due to massive attacks

    Science.gov (United States)

    Kornbluth, Yosef; Barach, Gilad; Tuchman, Yaakov; Kadish, Benjamin; Cwilich, Gabriel; Buldyrev, Sergey V.

    2018-05-01

    We study the cascading failure of networks due to overload, using the betweenness centrality of a node as the measure of its load following the Motter and Lai model. We study the fraction of survived nodes at the end of the cascade pf as a function of the strength of the initial attack, measured by the fraction of nodes p that survive the initial attack for different values of tolerance α in random regular and Erdös-Renyi graphs. We find the existence of a first-order phase-transition line pt(α ) on a p -α plane, such that if p pt , pf is large and the giant component of the network is still present. Exactly at pt, the function pf(p ) undergoes a first-order discontinuity. We find that the line pt(α ) ends at a critical point (pc,αc) , in which the cascading failures are replaced by a second-order percolation transition. We find analytically the average betweenness of nodes with different degrees before and after the initial attack, we investigate their roles in the cascading failures, and we find a lower bound for pt(α ) . We also study the difference between localized and random attacks.

  19. Novel mechanism of network protection against the new generation of cyber attacks

    Science.gov (United States)

    Milovanov, Alexander; Bukshpun, Leonid; Pradhan, Ranjit

    2012-06-01

    A new intelligent mechanism is presented to protect networks against the new generation of cyber attacks. This mechanism integrates TCP/UDP/IP protocol stack protection and attacker/intruder deception to eliminate existing TCP/UDP/IP protocol stack vulnerabilities. It allows to detect currently undetectable, highly distributed, low-frequency attacks such as distributed denial-of-service (DDoS) attacks, coordinated attacks, botnet, and stealth network reconnaissance. The mechanism also allows insulating attacker/intruder from the network and redirecting the attack to a simulated network acting as a decoy. As a result, network security personnel gain sufficient time to defend the network and collect the attack information. The presented approach can be incorporated into wireless or wired networks that require protection against known and the new generation of cyber attacks.

  20. Hierarchical zeolites from class F coal fly ash

    Science.gov (United States)

    Chitta, Pallavi

    Fly ash, a coal combustion byproduct is classified as types class C and class F. Class C fly ash is traditionally recycled for concrete applications and Class F fly ash often disposed in landfills. Class F poses an environmental hazard due to disposal and leaching of heavy metals into ground water and is important to be recycled in order to mitigate the environmental challenges. A major recycling option is to reuse the fly ash as a low-cost raw material for the production of crystalline zeolites, which serve as catalysts, detergents and adsorbents in the chemical industry. Most of the prior literature of fly ash conversion to zeolites does not focus on creating high zeolite surface area zeolites specifically with hierarchical pore structure, which are very important properties in developing a heterogeneous catalyst for catalysis applications. This research work aids in the development of an economical process for the synthesis of high surface area hierarchical zeolites from class F coal fly ash. In this work, synthesis of zeolites from fly ash using classic hydrothermal treatment approach and fusion pretreatment approach were examined. The fusion pretreatment method led to higher extent of dissolution of silica from quartz and mullite phases, which in turn led to higher surface area and pore size of the zeolite. A qualitative kinetic model developed here attributes the difference in silica content to Si/Al ratio of the beginning fraction of fly ash. At near ambient crystallization temperatures and longer crystallization times, the zeolite formed is a hierarchical faujasite with high surface area of at least 360 m2/g. This work enables the large scale recycling of class F coal fly ash to produce zeolites and mitigate environmental concerns. Design of experiments was used to predict surface area and pore sizes of zeolites - thus obviating the need for intense experimentation. The hierarchical zeolite catalyst supports tested for CO2 conversion, yielded hydrocarbons

  1. Low back pain and low level flying

    NARCIS (Netherlands)

    J.C.F.M. Aghina

    1989-01-01

    textabstractLow level flying is a very good tactical possibility to carry out a mission unseen by a hostile radarsystem. Nowadays, Western Europe in general and the Federal Republic of Germany in particular, decreased . the permissions to low level flying in assigned regions. That's why the

  2. Software test attacks to break mobile and embedded devices

    CERN Document Server

    Hagar, Jon Duncan

    2013-01-01

    Address Errors before Users Find Them Using a mix-and-match approach, Software Test Attacks to Break Mobile and Embedded Devices presents an attack basis for testing mobile and embedded systems. Designed for testers working in the ever-expanding world of ""smart"" devices driven by software, the book focuses on attack-based testing that can be used by individuals and teams. The numerous test attacks show you when a software product does not work (i.e., has bugs) and provide you with information about the software product under test. The book guides you step by step starting with the basics. It

  3. Modeling attacking of high skills volleyball players

    Directory of Open Access Journals (Sweden)

    Vladimir Gamaliy

    2014-12-01

    Full Text Available Purpose: to determine the model indicators of technical and tactical actions in the attack highly skilled volleyball players. Material and Methods: the study used statistical data of major international competitions: Olympic Games – 2012 World Championships – 2010, World League – 2010–2014 European Championship – 2010–2014. A total of 130 analyzed games. Methods were used: analysis and generalization of scientific and methodological literature, analysis of competitive activity highly skilled volleyball players, teacher observation, modeling technical and tactical actions in attacking highly skilled volleyball players. Results: it was found that the largest volume application of technical and tactical actions in the attack belongs to the group tactics «supple movement», whose indicator is 21,3%. The smallest amount of application belongs to the group tactics «flight level» model whose indicators is 5,4%, the efficiency of 3,4%, respectively. It is found that the power service in the jump from model parameters used in 51,6% of cases, the planning targets – 21,7% and 4,4% planning to reduce. Attacks performed with the back line, on model parameters used in the amount of 20,8% efficiency –13,7%. Conclusions: we prove that the performance of technical and tactical actions in the attack can be used as model in the control system of training and competitive process highly skilled volleyball players

  4. Sleep Deprivation Attack Detection in Wireless Sensor Network

    OpenAIRE

    Bhattasali, Tapalina; Chaki, Rituparna; Sanyal, Sugata

    2012-01-01

    Deployment of sensor network in hostile environment makes it mainly vulnerable to battery drainage attacks because it is impossible to recharge or replace the battery power of sensor nodes. Among different types of security threats, low power sensor nodes are immensely affected by the attacks which cause random drainage of the energy level of sensors, leading to death of the nodes. The most dangerous type of attack in this category is sleep deprivation, where target of the intruder is to maxi...

  5. The Sterile Insect Technique (SIT) against tsetse flies

    International Nuclear Information System (INIS)

    1984-01-01

    The video gives general information on the reproductive anatomy and the reproductive cycles of tsetse flies, shows in detail the steps to make a membrane for food supply of mass-reared flies, and explains how their feed is prepared and processed. The different stages of mass-rearing of flies, including their irradiation and the effects of irradiation on eggs and spermatozoa, are demonstrated. The video also introduces the insect sterilization programme BICOT carried out in Nigeria

  6. The Sterile Insect Technique (SIT) against tsetse flies

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1985-12-31

    The video gives general information on the reproductive anatomy and the reproductive cycles of tsetse flies, shows in detail the steps to make a membrane for food supply of mass-reared flies, and explains how their feed is prepared and processed. The different stages of mass-rearing of flies, including their irradiation and the effects of irradiation on eggs and spermatozoa, are demonstrated. The video also introduces the insect sterilization programme BICOT carried out in Nigeria

  7. Calcium Supplements: A Risk Factor for Heart Attack?

    Science.gov (United States)

    ... factor for heart attack? I've read that calcium supplements may increase the risk of heart attack. ... D. Some doctors think it's possible that taking calcium supplements may increase your risk of a heart ...

  8. Using the Domain Name System to Thwart Automated Client-Based Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Taylor, Curtis R [ORNL; Shue, Craig A [ORNL

    2011-09-01

    On the Internet, attackers can compromise systems owned by other people and then use these systems to launch attacks automatically. When attacks such as phishing or SQL injections are successful, they can have negative consequences including server downtime and the loss of sensitive information. Current methods to prevent such attacks are limited in that they are application-specific, or fail to block attackers. Phishing attempts can be stopped with email filters, but if the attacker manages to successfully bypass these filters, then the user must determine if the email is legitimate or not. Unfortunately, they often are unable to do so. Since attackers have a low success rate, they attempt to compensate for it in volume. In order to have this high throughput, attackers take shortcuts and break protocols. We use this knowledge to address these issues by implementing a system that can detect malicious activity and use it to block attacks. If the client fails to follow proper procedure, they can be classified as an attacker. Once an attacker has been discovered, they will be isolated and monitored. This can be accomplished using existing software in Ubuntu Linux applications, along with our custom wrapper application. After running the system and seeing its performance on three popular Web browsers Chromium, Firefox and Internet Explorer as well as two popular email clients, Thunderbird and Evolution, we found that not only is this system conceivable, it is effective and has low overhead.

  9. Effect of mechanical activation of fly ash added to Moroccan Portland cement

    Directory of Open Access Journals (Sweden)

    Ez-zaki H.

    2018-01-01

    This study aims to investigate the influence of grinding fly ash on the physico-chemical and mechanical properties of fly ash blended CPJ45 cement. The addition of the fly ash particles to the grinder leads respectively to the breakage of the particles and to reduce the agglomeration effect in the balls of cement grinder. Fly ash milling was found to improve particles fineness, and increase the silica and alumina content in the cement. Furthermore, milled fly ash blended cements show higher compressive strength compared to unmilled fly ash blended cements, due to improved fly ash reactivity through their mechanical activation.

  10. Multilevel Modeling of Distributed Denial of Service Attacks in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Katarzyna Mazur

    2016-01-01

    Full Text Available The growing popularity of wireless sensor networks increases the risk of security attacks. One of the most common and dangerous types of attack that takes place these days in any electronic society is a distributed denial of service attack. Due to the resource constraint nature of mobile sensors, DDoS attacks have become a major threat to its stability. In this paper, we established a model of a structural health monitoring network, being disturbed by one of the most common types of DDoS attacks, the flooding attack. Through a set of simulations, we explore the scope of flood-based DDoS attack problem, assessing the performance and the lifetime of the network under the attack condition. To conduct our research, we utilized the Quality of Protection Modeling Language. With the proposed approach, it was possible to examine numerous network configurations, parameters, attack options, and scenarios. The results of the carefully performed multilevel analysis allowed us to identify a new kind of DDoS attack, the delayed distributed denial of service, by the authors, referred to as DDDoS attack. Multilevel approach to DDoS attack analysis confirmed that, examining endangered environments, it is significant to take into account many characteristics at once, just to not overlook any important aspect.

  11. Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets

    Science.gov (United States)

    DeTrano, Alexander; Karimi, Naghmeh; Karri, Ramesh; Guo, Xiaofei; Carlet, Claude; Guilley, Sylvain

    2015-01-01

    Masking countermeasures, used to thwart side-channel attacks, have been shown to be vulnerable to mask-extraction attacks. State-of-the-art mask-extraction attacks on the Advanced Encryption Standard (AES) algorithm target S-Box recomputation schemes but have not been applied to scenarios where S-Boxes are precomputed offline. We propose an attack targeting precomputed S-Boxes stored in nonvolatile memory. Our attack targets AES implemented in software protected by a low entropy masking scheme and recovers the masks with 91% success rate. Recovering the secret key requires fewer power traces (in fact, by at least two orders of magnitude) compared to a classical second-order attack. Moreover, we show that this attack remains viable in a noisy environment or with a reduced number of leakage points. Eventually, we specify a method to enhance the countermeasure by selecting a suitable coset of the masks set. PMID:26491717

  12. 76 FR 18419 - Movement of Hass Avocados From Areas Where Mediterranean Fruit Fly or South American Fruit Fly Exist

    Science.gov (United States)

    2011-04-04

    ... where the infested avocados were grown will immediately be suspended from the export program until an... Avocados From Areas Where Mediterranean Fruit Fly or South American Fruit Fly Exist AGENCY: Animal and... certain restrictions regarding the movement of fresh Hass variety avocados. Specifically, we are proposing...

  13. Quick Reference: Cyber Attacks Awareness and Prevention Method for Home Users

    OpenAIRE

    Haydar Teymourlouei

    2015-01-01

    It is important to take security measures to protect your computer information, reduce identify theft, and prevent from malicious cyber-attacks. With cyber-attacks on the continuous rise, people need to understand and learn ways to prevent from these attacks. Cyber-attack is an important factor to be considered if one is to be able to protect oneself from malicious attacks. Without proper security measures, most computer technology would hinder home users more than such t...

  14. Public health importance of non-biting cyclorrhaphan flies.

    Science.gov (United States)

    Fetene, Teshome; Worku, Netsanet

    2009-02-01

    This study was carried out to determine the role of non-biting cyclorrhaphan flies as carriers of human intestinal parasites at Woreta, northwestern Ethiopia. In total, 6530 flies were collected from four breeding sites and then examined for human intestinal parasites, mainly using the formol-ether concentration method. Fly species identified were Musca domestica (32.9%), Chrysomya rufifacies (32.6%), Musca sorbens (23%), Lucina cuprina (4.7%), Calliphora vicina (2.8%), Chrysomya bezziana (2.3%) and Wohlfahrtia magnifica (1.7%). Intestinal parasites such as Ascaris lumbricoides (36.9%), Trichuris trichiura (38.8%), hookworm (13.0%), Hymenolepis nana (0.6%), Taenia spp. (8.4%), Strongyloides stercoralis (1.7%), Entamoeba histolytica/dispar (48.1%), Entamoeba coli (24.7%), Cryptosporidium spp. (16.7%) and Giardia lamblia (10.4%) were isolated from both external and gut contents of the flies. Trichuris trichiura and A. lumbricoides among the helminths and E. histolytica/dispar and E. coli among the protozoans were the dominant parasites identified. It was observed that more parasites were isolated from gut contents than the external surfaces of the flies examined (PChrysomya rufifacies were found to carry more helminths than M. sorbens and M. domestica. Musca sorbens were the highest carriers of protozoan parasites followed by M. domestica and C. rufifacies. The significance of filth flies as carriers of human intestinal parasites has been highlighted.

  15. An Overview of Pest Species of Bactrocera Fruit Flies (Diptera: Tephritidae and the Integration of Biopesticides with Other Biological Approaches for Their Management with a Focus on the Pacific Region

    Directory of Open Access Journals (Sweden)

    Roger I. Vargas

    2015-04-01

    Full Text Available Fruit flies (Diptera: Tephritidae are among the most economically important pest species in the world, attacking a wide range of fruits and fleshy vegetables throughout tropical and sub-tropical areas. These species are such devastating crop pests that major control and eradication programs have been developed in various parts of the world to combat them. The array of control methods includes insecticide sprays to foliage and soil, bait-sprays, male annihilation techniques, releases of sterilized flies and parasitoids, and cultural controls. During the twenty first century there has been a trend to move away from control with organophosphate insecticides (e.g., malathion, diazinon, and naled and towards reduced risk insecticide treatments. In this article we present an overview of 73 pest species in the genus Bactrocera, examine recent developments of reduced risk technologies for their control and explore Integrated Pest Management (IPM Programs that integrate multiple components to manage these pests in tropical and sub-tropical areas.

  16. Molecular Diversity between Salivary Proteins from New World and Old World Sand Flies with Emphasis on Bichromomyia olmeca, the Sand Fly Vector of Leishmania mexicana in Mesoamerica.

    Science.gov (United States)

    Abdeladhim, Maha; V Coutinho-Abreu, Iliano; Townsend, Shannon; Pasos-Pinto, Silvia; Sanchez, Laura; Rasouli, Manoochehr; B Guimaraes-Costa, Anderson; Aslan, Hamide; Francischetti, Ivo M B; Oliveira, Fabiano; Becker, Ingeborg; Kamhawi, Shaden; Ribeiro, Jose M C; Jochim, Ryan C; Valenzuela, Jesus G

    2016-07-01

    Sand fly saliva has been shown to have proteins with potent biological activities, salivary proteins that can be used as biomarkers of vector exposure, and salivary proteins that are candidate vaccines against different forms of leishmaniasis. Sand fly salivary gland transcriptomic approach has contributed significantly to the identification and characterization of many of these salivary proteins from important Leishmania vectors; however, sand fly vectors in some regions of the world are still neglected, as Bichromomyia olmeca (formerly known as Lutzomyia olmeca olmeca), a proven vector of Leishmania mexicana in Mexico and Central America. Despite the importance of this vector in transmitting Leishmania parasite in Mesoamerica there is no information on the repertoire of B. olmeca salivary proteins and their relationship to salivary proteins from other sand fly species. A cDNA library of the salivary glands of wild-caught B. olmeca was constructed, sequenced, and analyzed. We identified transcripts encoding for novel salivary proteins from this sand fly species and performed a comparative analysis between B. olmeca salivary proteins and those from other sand fly species. With this new information we present an updated catalog of the salivary proteins specific to New World sand flies and salivary proteins common to all sand fly species. We also report in this work the anti-Factor Xa activity of Lofaxin, a salivary anticoagulant protein present in this sand fly species. This study provides information on the first transcriptome of a sand fly from Mesoamerica and adds information to the limited repertoire of salivary transcriptomes from the Americas. This comparative analysis also shows a fast degree of evolution in salivary proteins from New World sand flies as compared with Old World sand flies.

  17. Assessment of susceptibility of olive cultivars to the Bactrocera oleae (Gmelin, 1790) and Camarosporium dalmaticum (Thüm.) Zachos & Tzav.-Klon. attacks in Calabria (Southern Italy).

    Science.gov (United States)

    Iannotta, Nino; Noce, Maria E; Ripa, Vincenzo; Scalercio, Stefano; Vizzarri, Veronica

    2007-01-01

    Within the framework of research concerning the application of techniques alternative to chemical pesticides for control of parasites, the C.R.A. Experimental Institute for Olive Growing for many years has been performing a large investigation in order to detect sources of genetic resistance in olive germplasm. In the present study we observed the behavior related to the olive fly (Bactrocera oleae) infestation and Camarosporium dalmaticum infection of ten olive cultivars farmed under the same agronomic and climatic conditions in Calabria, Southern Italy. The sampling and the data collecting were carried out in three different ripening times. The drupe amount of oleuropein and cyanidine was detected by laboratory analyses in order to verify a possible correlation between these molecules and the level of infestation/infection of the above-mentioned parasites. The obtained data were submitted to analysis of variance. In relation to the fungal infection the results displayed that cvs Tonda nera dolce showed the lowest susceptibility, while the cv Giarraffa turned out to be the most susceptible. The less susceptible cultivars to the phytophagous were Tonda nera dolce and Bhardi Tirana. Since the less susceptible cultivar to olive fly attacks are the same observed in relation to the susceptibility to olive fruit rot, it is suggested a relation between the olive fly infestation and the fungal infection. It suggests the utility to achieve these results both to transfer directly to the farmers' world and to emphasize ecosystem health and biodiversity conservation.

  18. A Strategic Analysis of Information Sharing Among Cyber Attackers

    Directory of Open Access Journals (Sweden)

    Kjell Hausken

    2015-10-01

    Full Text Available We build a game theory model where the market design is such that one firm invests in security to defend against cyber attacks by two hackers. The firm has an asset, which is allocated between the three market participants dependent on their contest success. Each hacker chooses an optimal attack, and they share information with each other about the firm’s vulnerabilities. Each hacker prefers to receive information, but delivering information gives competitive advantage to the other hacker. We find that each hacker’s attack and information sharing are strategic complements while one hacker’s attack and the other hacker’s information sharing are strategic substitutes. As the firm’s unit defense cost increases, the attack is inverse U-shaped and reaches zero, while the firm’s defense and profit decrease, and the hackers’ information sharing and profit increase. The firm’s profit increases in the hackers’ unit cost of attack, while the hackers’ information sharing and profit decrease. Our analysis also reveals the interesting result that the cumulative attack level of the hackers is not affected by the effectiveness of information sharing between them and moreover, is also unaffected by the intensity of joint information sharing. We also find that as the effectiveness of information sharing between hackers increases relative to the investment in attack, the firm’s investment in cyber security defense and profit are constant, the hackers’ investments in attacks decrease, and information sharing levels and hacker profits increase. In contrast, as the intensity of joint information sharing increases, while the firm’s investment in cyber security defense and profit remain constant, the hackers’ investments in attacks increase, and the hackers’ information sharing levels and profits decrease. Increasing the firm’s asset causes all the variables to increase linearly, except information sharing which is constant. We extend

  19. Strengthening Crypto-1 Cipher Against Algebraic Attacks

    Directory of Open Access Journals (Sweden)

    Farah Afianti

    2015-08-01

    Full Text Available In the last few years, several studies addressed the problem of data security in Mifare Classic. One of its weaknesses is the low random number quality. This causes SAT solver attacks to have lower complexity. In order to strengthen Crypto-1 against SAT solver attacks, a modification of the feedback function with better cryptographic properties is proposed. It applies a primitive polynomial companion matrix. SAT solvers cannot directly attack the feedback shift register that uses the modified Boolean feedback function, the register has to be split into smaller groups. Experimental testing showed that the amount of memory and CPU time needed were highest when attacking the modified Crypto-1 using the modified feedback function and the original filter function. In addition, another modified Crypto-1, using the modified feedback function and a modified filter function, had the lowest percentage of revealed variables. It can be concluded that the security strength and performance of the modified Crypto-1 using the modified feedback function and the modified filter function are better than those of the original Crypto-1.

  20. Suppressing Tsetse Flies to Improve Lives

    International Nuclear Information System (INIS)

    Potterton, Louise; Pavlicek, Petr; Parker, Andrew

    2013-01-01

    In 2009, the government-run Southern Tsetse Eradication Project (STEP) in Ethiopia, with the support of the IAEA, started to carry out intensive activities to suppress the fly population using insecticides. The fly population is now down by 90%. The benefits of tsetse suppression can be seen all over the region. Diary produce is now widely available at markets and healthy animals can be seen everywhere in farming and transport

  1. A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees

    NARCIS (Netherlands)

    Jhawar, Ravi; Lounis, Karim; Mauw, Sjouke

    2016-01-01

    Cyber attacks are becoming increasingly complex, practically sophisticated and organized. Losses due to such attacks are important, varying from the loss of money to business reputation spoilage. Therefore, there is a great need for potential victims of cyber attacks to deploy security solutions

  2. Seasonal fluctuations of phlebotomines sand fly populations ...

    African Journals Online (AJOL)

    An entomological survey of phlebotomine sand flies was conducted in the Moulay Yacoub province, central Morocco. An anthropic niche (Ouled Aid) and a wild niche (Zliligh) were selected. Sand flies were collected twice a month between April 2011 and March 2012, using sticky traps and CDC light traps. 3675 specimens ...

  3. Vulnerability of water supply systems to cyber-physical attacks

    Science.gov (United States)

    Galelli, Stefano; Taormina, Riccardo; Tippenhauer, Nils; Salomons, Elad; Ostfeld, Avi

    2016-04-01

    The adoption of smart meters, distributed sensor networks and industrial control systems has largely improved the level of service provided by modern water supply systems. Yet, the progressive computerization exposes these critical infrastructures to cyber-physical attacks, which are generally aimed at stealing critical information (cyber-espionage) or causing service disruption (denial-of-service). Recent statistics show that water and power utilities are undergoing frequent attacks - such as the December power outage in Ukraine - , attracting the interest of operators and security agencies. Taking the security of Water Distribution Networks (WDNs) as domain of study, our work seeks to characterize the vulnerability of WDNs to cyber-physical attacks, so as to conceive adequate defense mechanisms. We extend the functionality of EPANET, which models hydraulic and water quality processes in pressurized pipe networks, to include a cyber layer vulnerable to repeated attacks. Simulation results on a medium-scale network show that several hydraulic actuators (valves and pumps, for example) can be easily attacked, causing both service disruption - i.e., water spillage and loss of pressure - and structural damages - e.g., pipes burst. Our work highlights the need for adequate countermeasures, such as attacks detection and reactive control systems.

  4. Security Measurement for Unknown Threats Based on Attack Preferences

    Directory of Open Access Journals (Sweden)

    Lihua Yin

    2018-01-01

    Full Text Available Security measurement matters to every stakeholder in network security. It provides security practitioners the exact security awareness. However, most of the works are not applicable to the unknown threat. What is more, existing efforts on security metric mainly focus on the ease of certain attack from a theoretical point of view, ignoring the “likelihood of exploitation.” To help administrator have a better understanding, we analyze the behavior of attackers who exploit the zero-day vulnerabilities and predict their attack timing. Based on the prediction, we propose a method of security measurement. In detail, we compute the optimal attack timing from the perspective of attacker, using a long-term game to estimate the risk of being found and then choose the optimal timing based on the risk and profit. We design a learning strategy to model the information sharing mechanism among multiattackers and use spatial structure to model the long-term process. After calculating the Nash equilibrium for each subgame, we consider the likelihood of being attacked for each node as the security metric result. The experiment results show the efficiency of our approach.

  5. Performance evaluation of clay fly ash brick masonry

    Energy Technology Data Exchange (ETDEWEB)

    Kute, S.; Deodhar, S.V. [K.K. Wagh College of Engineering, Panchavati (India). Dept. of Civil Engineering

    2003-07-01

    Despite inexorable trends of automation in manufacturing industry throughout the world, the conventional brick manufacturing practices have remained largely unchanged since the dawn of civilization in India. This has imposed restrictions on quality of bricks in general. The paper highlights the results derived from an extensive experimental work on performance evaluation of brick masonry. Four types of bricks, three values of joint thickness and fineness modulus of sand, and two grades of mortar with four different proportions were used as samples. Fly ash was from Nashik Thermal Power Station in Maharashtra, India. The results show that the brick masonry of 40% fly ash bricks and mortar with 20% fly ash as replacement to cement with 1:4 and 1:6 proportion gives optimum strength and advocates use of fly ash for this combination. 8 tabs.

  6. Synthetic attractants for Anastrepha fruit flies in Mexico

    Energy Technology Data Exchange (ETDEWEB)

    Gomez-Simuta, Y; Flores-Breceda, S; Lppez-Munoz, L [Subdireccion de Desarrollo de Metodos, Programa Moscamed, Tapachula, Chiapas (Mexico)

    2007-10-15

    The efficacy of synthetic attractants in the capture of Anastrepha fruit flies (Anastrepha ludens, A. obliqua and A. serpentina) was tested in three commercial orchards of known fruit fly hosts: mango (Mangifera indica L.), mammy (Calocarpum mammosum L.) and Mexican plum (Spondias purpurea L.) in Chiapas, Mexico. Among the synthetic attractants tested, we found that Ammonium Acetate (AA) plus Putrescine (PT) in a liquid trap was often the best combination for attracting flies. Interestingly, the reduction of release rate of AA increases the capture of fruit flies. We also found that Ammonium Bicarbonate (AB) plus PT in a wet trap was effective in a Mexican plum orchard in comparison with the other combinations of synthetic attractants. However, the synthetic attractants in dry traps were not effective and always presented the lowest Captures. (author)

  7. Significance and survival of Enterococci during the house fly development.

    Science.gov (United States)

    Ghosh, Anuradha; Akhtar, Mastura; Holderman, Chris; Zurek, Ludek

    2014-01-01

    House flies are among the most important nonbiting insect pests of medical and veterinary importance. Larvae develop in decaying organic substrates and their survival strictly depends on an active microbial community. House flies have been implicated in the ecology and transmission of enterococci, including multi-antibiotic-resistant and virulent strains of Enterococcus faecalis. In this study, eight American Type Culture Collection type strains of enterococci including Enterococcus avium, Enterococcus casseliflavus, Enterococcus durans, Enterococcus hirae, Enterococcus mundtii, Enterococcus gallinarum, Enterococcusfaecalis, and Enterococcusfaecium were evaluated for their significance in the development of house flies from eggs to adults in bacterial feeding assays. Furthermore, the bacterial colonization of the gut of teneral flies as well as the importance of several virulence traits of E. faecalis in larval mortality was assessed. Overall survival of house flies (egg to adult) was significantly higher when grown with typically nonpathogenic enterococcal species such as E. hirae (76.0% survival), E. durans (64.0%), and E. avium (64.0%) compared with that with clinically important species E. faecalis (24.0%) and E. faecium (36.0%). However, no significant differences in survival of house fly larvae were detected when grown with E. faecalis strains carrying various virulence traits, including isogenic mutants of the human clinical isolate E. faecalis V583 with in-frame deletions of gelatinase, serine protease, and capsular polysaccharide serotype C. Enterococci were commonly detected in fly puparia (range: 75-100%; concentration: 103-105 CFU/puparium);however, the prevalence of enterococci in teneral flies varied greatly: from 25.0 (E. casseliflavus) to 89.5% (E. hirae). In conclusion, depending on the species, enterococci variably support house fly larval development and colonize the gut of teneral adults. The human pathogenic species, E. faecalis and E. faecium

  8. The Need for Situational Awareness in a CBRNE Attack

    Directory of Open Access Journals (Sweden)

    Jordan Nelms

    2011-02-01

    Full Text Available Six years before the terrorist attacks on the World Trade Center and the Pentagon, and eight years before the United States went to war with Saddam Hussein for his alleged concealment of chemical and biological weapons caches, Japan's Tokyo subway was struck by one of the most vicious terror attacks in modern history.  The 1995 Sarin terrorist attack represents an important case study for post-9/11 emergency managers because it highlights the key issues first responders and public health officials face when confronted with a CBRNE ('C'hemical, 'B'iological, 'R'adiological, 'N'uclear, 'E'xplosive mass-casualty attack.

  9. Cyber attack analysis on cyber-physical systems: Detectability, severity, and attenuation strategy

    Science.gov (United States)

    Kwon, Cheolhyeon

    Security of Cyber-Physical Systems (CPS) against malicious cyber attacks is an important yet challenging problem. Since most cyber attacks happen in erratic ways, it is usually intractable to describe and diagnose them systematically. Motivated by such difficulties, this thesis presents a set of theories and algorithms for a cyber-secure architecture of the CPS within the control theoretic perspective. Here, instead of identifying a specific cyber attack model, we are focused on analyzing the system's response during cyber attacks. Firstly, we investigate the detectability of the cyber attacks from the system's behavior under cyber attacks. Specifically, we conduct a study on the vulnerabilities in the CPS's monitoring system against the stealthy cyber attack that is carefully designed to avoid being detected by its detection scheme. After classifying three kinds of cyber attacks according to the attacker's ability to compromise the system, we derive the necessary and sufficient conditions under which such stealthy cyber attacks can be designed to cause the unbounded estimation error while not being detected. Then, the analytical design method of the optimal stealthy cyber attack that maximizes the estimation error is developed. The proposed stealthy cyber attack analysis is demonstrated with illustrative examples on Air Traffic Control (ATC) system and Unmanned Aerial Vehicle (UAV) navigation system applications. Secondly, in an attempt to study the CPSs' vulnerabilities in more detail, we further discuss a methodology to identify potential cyber threats inherent in the given CPSs and quantify the attack severity accordingly. We then develop an analytical algorithm to test the behavior of the CPS under various cyber attack combinations. Compared to a numerical approach, the analytical algorithm enables the prediction of the most effective cyber attack combinations without computing the severity of all possible attack combinations, thereby greatly reducing the

  10. Consciousness in Non-Epileptic Attack Disorder

    OpenAIRE

    Reuber, M.; Kurthen, M.

    2011-01-01

    Non-epileptic attack disorder (NEAD) is one of the most important differential diagnoses of epilepsy. Impairment of\\ud consciousness is the key feature of non-epileptic attacks (NEAs). The first half of this review summarises the clinical research\\ud literature featuring observations relating to consciousness in NEAD. The second half places this evidence in the wider context\\ud of the recent discourse on consciousness in neuroscience and the philosophy of mind. We argue that studies of consci...

  11. Gait biometrics under spoofing attacks: an experimental investigation

    Science.gov (United States)

    Hadid, Abdenour; Ghahramani, Mohammad; Kellokumpu, Vili; Feng, Xiaoyi; Bustard, John; Nixon, Mark

    2015-11-01

    Gait is a relatively biometric modality which has a precious advantage over other modalities, such as iris and voice, in that it can be easily captured from a distance. Although it has recently become a topic of great interest in biometric research, there has been little investigation into gait spoofing attacks where a person tries to imitate the clothing or walking style of someone else. We recently analyzed for the first time the effects of spoofing attacks on silhouette-based gait biometric systems and showed that it was indeed possible to spoof gait biometric systems by clothing impersonation and the deliberate selection of a target that has a similar build to the attacker. To gain deeper insight into the performance of current gait biometric systems under spoofing attacks, we provide a thorough investigation on how clothing can be used to spoof a target and evaluate the performance of two state-of-the-art recognition methods on a gait spoofing database recorded at the University of Southampton. Furthermore, we describe and evaluate an initial solution coping with gait spoofing attacks. The obtained results are very promising and point out interesting findings which can be used for future investigations.

  12. Learning from history: The Glasgow Airport terrorist attack.

    Science.gov (United States)

    Crichton, Gillies

    Glasgow Airport was the target of a terrorist attack on 30th June, 2007. Many people within Scotland had come to believe that Scotland was immune from terrorism. This perception was in large part informed by Scotland's experience during the protracted Troubles in Northern Ireland, during which the Provisional Irish Republican Army's mainland bombing campaign focused on targets in England, sparing both Scotland and Wales. While Glasgow Airport did not expect such an attack to take place, meticulous planning, organising and testing of plans had taken place to mitigate the unlikely event of such an attack. The attack stands up as a shining example of robust business continuity management, where the airport reopened for business as usual in less than 24 hours from the time of the attack. Little is known about how the airport handled the situation in conjunction with other responding agencies as people tend to want to focus on high-profile disasters only. Yet countless such incidents are happening worldwide on a daily basis, in which there are excellent learning opportunities, and, taken in the spirit of converting hindsight into foresight, the likelihood of similar incidents could potentially be reduced in the future.

  13. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  14. Stability Analysis of an Advanced Persistent Distributed Denial-of-Service Attack Dynamical Model

    Directory of Open Access Journals (Sweden)

    Chunming Zhang

    2018-01-01

    Full Text Available The advanced persistent distributed denial-of-service (APDDoS attack is a fairly significant threat to cybersecurity. Formulating a mathematical model for accurate prediction of APDDoS attack is important. However, the dynamical model of APDDoS attack has barely been reported. This paper first proposes a novel dynamical model of APDDoS attack to understand the mechanisms of APDDoS attack. Then, the attacked threshold of this model is calculated. The global stability of attack-free and attacked equilibrium are both proved. The influences of the model’s parameters on attacked equilibrium are discussed. Eventually, the main conclusions of the theoretical analysis are examined through computer simulations.

  15. Using locally available fly ash for modifying concrete properties

    International Nuclear Information System (INIS)

    Rizwan, S.A.; Toor, S.R.; Ahmad, H.

    2005-01-01

    This paper suggests the possible use of fly ash, a bye-product produced in our thermal power plants operating on coal as fuel for improvement of concrete quality. In the present investigation, locally available finely divided fly ash has been used for modification Presently, it is being used extensively in concrete in modem countries and is considered as waste material in general. Behavior of fly ash modified concrete in comparison to normal concrete having same mix proportions, aggregates, net water-cement ratio and similar curing conditions has been studied in short terms up to the age of 56 days during which the specimens were subjected to normal water curing method. Tests were carried out for compressive strength at 3, 7, 14,28 and 56 days, 24 hours % age water absorption at the age of 56 days and durability (resistance of concrete against N/2 solutions of both nitric acid and hydrochloric acid for one month) of concrete were also carried out at the age of 56 days. It was seen that the compressive strength of concrete modified with the available type of fly ash was less than the normal concrete. But so. far as the durability and % age water absorption are concerned, fly ash plays an important role here. 24 hours % age water absorption decreases with increase in fly ash content an admixture and as a cement replacement in concrete. But so far as durability is concerned, 20% replacement of fly ash with cement appears to be more effective than it is with 40%. The purpose of investigation was to introduce the use of fly ash in concretes to the Engineers and Architects in Pakistan. (author)

  16. Clay formation and metal fixation during weathering of coal fly ash

    International Nuclear Information System (INIS)

    Zevenbergen, C.; Bradley, J.P.; Reeuwijk, L.P. Van; Shyam, A.K.; Hjelmar, O.; Comans, R.N.J.

    1999-01-01

    The enormous and worldwide production of coal fly ash cannot be durably isolated from the weathering cycle, and the weathering characteristics of fly ash must be known to understand the long-term environmental impact. The authors studied the weathering of two coal fly ashes and compared them with published data from weathered volcanic ash, it's closest natural analogue. Both types of ash contain abundant aluminosilicate glass, which alters to noncrystalline clay. However, this study reveals that the kinetics of coal fly ash weathering are more rapid than those of volcanic ash because the higher pH of fresh coal fly ash promotes rapid dissolution of the glass. After about 10 years of weathering, the noncrystalline clay content of coal fly ash is higher than that of 250-year-old volcanic ash. The observed rapid clay formation together with heavy metal fixation imply that the long-term environmental impact of coal fly ash disposal may be less severe and the benefits more pronounced than predicted from previous studies on unweathered ash. Their findings suggest that isolating coal fly ash from the weathering cycle may be counterproductive because, in the long-term under conditions of free drainage, fly ash is converted into fertile soil capable of supporting agriculture

  17. Metallothionein response in earthworms Lampito mauritii (Kinberg) exposed to fly ash

    Energy Technology Data Exchange (ETDEWEB)

    Maity, S.; Hattacharya, S.; Chaudhury, S. [Visva Bharati, Santini Ketan (India)

    2009-10-15

    Among pollutants, the coal fly ash occupies a significant position in industrial wastes. The fly ash matrix is a complex mixture of various organic (polyhalogenated compounds) and inorganic (Si, Al, Fe, As, Cd, Bi, Hg, etc.) chemicals. The application of fly ash for agricultural purposes and as landfills may lead to the contamination of the land with some of the toxic chemical compounds present in fly ash. Thus prior to the application of fly ash for developmental activities, it requires bio-monitoring and risk characterization. In order to achieve this objective adult Lampito mauritii were exposed to different proportions of fly ash in soil for 30 d and the concentrations of metallothionein in earthworm were assessed. The results revealed that up to 50% of fly ash amendment does not apparently harm the earthworm in respect of their survival and growth. A significant increase in tissue metallothionein level was recorded in L mauritii exposed to fly ash amended soil without tissue metal accumulation indicating that metallothionein is involved in scavenging of free radicals and reactive oxygen species metabolites. It is concluded that this biochemical response observed in L mauritii exposed to fly ash amended soil could be used in ecotoxicological field monitoring.

  18. Genetics of tsetse fly. Part of a coordinated programme on sterile insect techniques for tsetse fly control or eradication

    International Nuclear Information System (INIS)

    Helle, W.

    1977-08-01

    Genetic variation in the tsetse fly, Glossina m. morsitans was studied using isoenzyme patterns. As the investigators intended to show that the method could be used for field collected material, several factors which may affect isoenzyme analysis such as fly age, reproductive status, nutrition, storage at low temperatures etc. were studied. Fifteen enzyme systems were included. Seven of these showed genetic polymorphism and some differences were related to geographic distribution. Because of interference from various factors, it is recommended that pupae be collected and that flies be analyzed at least 24 hours after the last blood meal. Methods of holding material for analysis are suggested

  19. Synthesis and characterization of fly ash-zinc oxide nanocomposite

    Directory of Open Access Journals (Sweden)

    Kunal Yeole

    2014-04-01

    Full Text Available Fly ash, generated in thermal power plants, is recognized as an environmental pollutant. Thus, measures are required to be undertaken to dispose it in an environmentally friendly method. In this paper an attempt is made to coat zinc oxide nano-particles on the surface of fly ash by a simple and environmentally friendly facile chemical method, at room temperature. Zinc oxide may serve as effective corrosion inhibitor by providing sacrificial protection. Concentration of fly ash was varied as 5, 10 and 15 (w/w % of zinc oxide. It was found that crystallinity increased, whereas particle size, specific gravity and oil absorption value decreased with increased concentration of fly ash in zinc oxide, which is attributed to the uniform distribution of zinc oxide on the surface of fly ash. These nanocomposites can potentially be used in commercial applications as additive for anticorrosion coatings.

  20. 32 CFR 855.13 - Civil fly-ins.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Civil fly-ins. 855.13 Section 855.13 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE AIRCRAFT CIVIL AIRCRAFT USE OF UNITED STATES AIR FORCE AIRFIELDS Civil Aircraft Landing Permits § 855.13 Civil fly-ins. (a) Civil...

  1. Blow flies as urban wildlife sensors.

    Science.gov (United States)

    Hoffmann, Constanze; Merkel, Kevin; Sachse, Andreas; Rodríguez, Pablo; Leendertz, Fabian H; Calvignac-Spencer, Sébastien

    2018-05-01

    Wildlife detection in urban areas is very challenging. Conventional monitoring techniques such as direct observation are faced with the limitation that urban wildlife is extremely elusive. It was recently shown that invertebrate-derived DNA (iDNA) can be used to assess wildlife diversity in tropical rainforests. Flies, which are ubiquitous and very abundant in most cities, may also be used to detect wildlife in urban areas. In urban ecosystems, however, overwhelming quantities of domestic mammal DNA could completely mask the presence of wild mammal DNA. To test whether urban wild mammals can be detected using fly iDNA, we performed DNA metabarcoding of pools of flies captured in Berlin, Germany, using three combinations of blocking primers. Our results show that domestic animal sequences are, as expected, very dominant in urban environments. Nevertheless, wild mammal sequences can often be retrieved, although they usually only represent a minor fraction of the sequence reads. Fly iDNA metabarcoding is therefore a viable approach for quick scans of urban wildlife diversity. Interestingly, our study also shows that blocking primers can interact with each other in ways that affect the outcome of metabarcoding. We conclude that the use of complex combinations of blocking primers, although potentially powerful, should be carefully planned when designing experiments. © 2018 John Wiley & Sons Ltd.

  2. Inflammation and neuropathic attacks in hereditary brachial plexus neuropathy

    Science.gov (United States)

    Klein, C; Dyck, P; Friedenberg, S; Burns, T; Windebank, A; Dyck, P

    2002-01-01

    Objective: To study the role of mechanical, infectious, and inflammatory factors inducing neuropathic attacks in hereditary brachial plexus neuropathy (HBPN), an autosomal dominant disorder characterised by attacks of pain and weakness, atrophy, and sensory alterations of the shoulder girdle and upper limb muscles. Methods: Four patients from separate kindreds with HBPN were evaluated. Upper extremity nerve biopsies were obtained during attacks from a person of each kindred. In situ hybridisation for common viruses in nerve tissue and genetic testing for a hereditary tendency to pressure palsies (HNPP; tomaculous neuropathy) were undertaken. Two patients treated with intravenous methyl prednisolone had serial clinical and electrophysiological examinations. One patient was followed prospectively through pregnancy and during the development of a stereotypic attack after elective caesarean delivery. Results: Upper extremity nerve biopsies in two patients showed prominent perivascular inflammatory infiltrates with vessel wall disruption. Nerve in situ hybridisation for viruses was negative. There were no tomaculous nerve changes. In two patients intravenous methyl prednisolone ameliorated symptoms (largely pain), but with tapering of steroid dose, signs and symptoms worsened. Elective caesarean delivery did not prevent a typical postpartum attack. Conclusions: Inflammation, probably immune, appears pathogenic for some if not all attacks of HBPN. Immune modulation may be useful in preventing or reducing the neuropathic attacks, although controlled trials are needed to establish efficacy, as correction of the mutant gene is still not possible. The genes involved in immune regulation may be candidates for causing HBPN disorders. PMID:12082044

  3. Noninvasive analysis of microbiome dynamics in the fruit fly Drosophila melanogaster.

    Science.gov (United States)

    Fink, Christine; Staubach, Fabian; Kuenzel, Sven; Baines, John F; Roeder, Thomas

    2013-11-01

    The diversity and structure of the intestinal microbial community has a strong influence on life history. To understand how hosts and microbes interact, model organisms with comparatively simple microbial communities, such as the fruit fly (Drosophila melanogaster), offer key advantages. However, studies of the Drosophila microbiome are limited to a single point in time, because flies are typically sacrificed for DNA extraction. In order to test whether noninvasive approaches, such as sampling of fly feces, could be a means to assess fly-associated communities over time on the same cohort of flies, we compared the microbial communities of fly feces, dissected fly intestines, and whole flies across three different Drosophila strains. Bacterial species identified in either whole flies or isolated intestines were reproducibly found in feces samples. Although the bacterial communities of feces and intestinal samples were not identical, they shared similarities and obviously the same origin. In contrast to material from whole flies and intestines, feces samples were not compromised by Wolbachia spp. infections, which are widespread in laboratory and wild strains. In a proof-of-principle experiment, we showed that simple nutritional interventions, such as a high-fat diet or short-term starvation, had drastic and long-lasting effects on the micobiome. Thus, the analysis of feces can supplement the toolbox for microbiome studies in Drosophila, unleashing the full potential of such studies in time course experiments where multiple samples from single populations are obtained during aging, development, or experimental manipulations.

  4. Characterization of North American lignite fly ashes. II. XRD Mineralogy

    International Nuclear Information System (INIS)

    McCarthy, G.J.; Johansen, D.M.; Thedchanamoorthy, A.; Steinwand, S.J.; Swanson, K.D.

    1988-01-01

    X-ray powder diffraction has been used to determine the crystalline phase mineralogy in samples of fly ash from each of the lignite mining areas of North America. The characteristic phases of North Dakota lignite fly ashes were periclase, lime, merwinite and the sulfate phases anhydrite, thenardite and a sodalite-structure phase. Mullite was absent in these low-Al/sub 2/O/sub 3/ ashes. Montana lignite ash mineralogy had characteristics of ND lignite and MT subbituminous coal fly ashes; mullite and C/sub 3/A were present and the alkali sulfates were absent. Texas and Louisiana lignite fly ashes had the characteristic mineralogy of bituminous coal fly ash: quartz, mullite, ferrite-spinel (magnetite) and minor hematite. Even though their analytical CaO contents were 7-14%, all but one lacked crystalline CaO-containing phases. Lignite fly ashes from Saskatchewan were generally the least crystalline of those studied and had a mineralogy consisting of quartz, mullite, ferrite spinel and periclase. Quantitative XRD data were obtained. The position of the diffuse scattering maximum in the x-ray diffractograms was indicative of the glass composition of the lignite fly ash

  5. Heart Attack Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for heart...

  6. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  7. Choosing What to Protect When Attacker Resources and Asset Valuations are Uncertain

    Directory of Open Access Journals (Sweden)

    Kjell Hausken

    2014-01-01

    Full Text Available The situation has been modelled where the attacker's resources are unknown to the defender. Protecting assets presupposes that the defender has some information on the attacker's resource capabilities. An attacker targets one of two assets. The attacker's resources and valuations of these assets are drawn probabilistically. We specify when the isoutility curves are upward sloping (the defender prefers to invest less in defense, thus leading to higher probabilities of success for attacks on both assets or downward sloping (e.g. when one asset has a low value or high unit defense cost. This stands in contrast to earlier research and results from the uncertainty regarding the level of the attacker's resources. We determine which asset the attacker targets depending on his type, unit attack costs, the contest intensity, and investment in defense. A two stage game is considered, where the defender moves first and the attacker moves second. When both assets are equivalent and are treated equivalently by both players, an interior equilibrium exists when the contest intensity is low, and a corner equilibrium with no defense exists when the contest intensity is large and the attacker holds large resources. Defense efforts are inverse U shaped in the attacker's resources. (original abstract

  8. Development of Cyber-attack Risk Assessment Model for Nuclear Power Plants

    International Nuclear Information System (INIS)

    Park, Jong Woo; Lee, Seung Jun

    2017-01-01

    In this work, a risk evaluation method to identify significant cyber-attack scenarios and important components which should be defensed was proposed based on the probabilistic safety assessment (PSA) method which is widely used for evaluating risk of NPPs. NPPs adopting digital systems have been facing the risk of cyber-attacks. To develop efficient and reasonable defense strategy, it is required to identify significant cyber-attack scenarios and important components because there are huge number of critical digital assets in an NPP. By evaluating the risk of cyber-attack, the risk-informed defense strategies against cyber-attack could be suggested. In this work, the method to identify important cyber-attack scenarios and to evaluate the quantitative risk caused by cyber-attacks was proposed. For a future study, more feasible scenarios will be analyzed and additional modifications will be made in the model if necessary.

  9. An overview of NASA's digital fly-by-wire technology development program

    Science.gov (United States)

    Jarvis, C. R.

    1976-01-01

    The feasibility of using digital fly by wire systems to control aircraft was demonstrated by developing and flight testing a single channel system, which used Apollo hardware, in an F-8C test airplane. This is the first airplane to fly with a digital fly by wire system as its primary means of control and with no mechanical reversion capability. The development and flight test of a triplex digital fly by wire system, which will serve as an experimental prototype for future operational digital fly by wire systems, are underway.

  10. Analysis of Network Vulnerability Under Joint Node and Link Attacks

    Science.gov (United States)

    Li, Yongcheng; Liu, Shumei; Yu, Yao; Cao, Ting

    2018-03-01

    The security problem of computer network system is becoming more and more serious. The fundamental reason is that there are security vulnerabilities in the network system. Therefore, it’s very important to identify and reduce or eliminate these vulnerabilities before they are attacked. In this paper, we are interested in joint node and link attacks and propose a vulnerability evaluation method based on the overall connectivity of the network to defense this attack. Especially, we analyze the attack cost problem from the attackers’ perspective. The purpose is to find the set of least costs for joint links and nodes, and their deletion will lead to serious network connection damage. The simulation results show that the vulnerable elements obtained from the proposed method are more suitable for the attacking idea of the malicious persons in joint node and link attack. It is easy to find that the proposed method has more realistic protection significance.

  11. Acetylcholinesterase mutations and organophosphate resistance in sand flies and mosquitoes

    Science.gov (United States)

    Leishmaniasis is an insect-borne disease caused by several protozoan species in the genus Leishmania, which are vectored by sand fly species in the genera Phlebotomus or Lutzomyia, depending on the sand fly species geographic range. Sand fly bites and leishmaniasis significantly impacted U.S. milita...

  12. Mercury capture by selected Bulgarian fly ashes: Influence of coal rank and fly ash carbon pore structure on capture efficiency

    Science.gov (United States)

    Kostova, I.J.; Hower, J.C.; Mastalerz, Maria; Vassilev, S.V.

    2011-01-01

    Mercury capture by fly ash C was investigated at five lignite- and subbituminous-coal-burning Bulgarian power plants (Republika, Bobov Dol, Maritza East 2, Maritza East 3, and Sliven). Although the C content of the ashes is low, never exceeding 1.6%, the Hg capture on a unit C basis demonstrates that the low-rank-coal-derived fly ash carbons are more efficient in capturing Hg than fly ash carbons from bituminous-fired power plants. While some low-C and low-Hg fly ashes do not reveal any trends of Hg versus C, the 2nd and, in particular, the 3rd electrostatic precipitator (ESP) rows at the Republika power plant do have sufficient fly ash C range and experience flue gas sufficiently cool to capture measurable amounts of Hg. The Republika 3rd ESP row exhibits an increase in Hg with increasing C, as observed in other power plants, for example, in Kentucky power plants burning Appalachian-sourced bituminous coals. Mercury/C decreases with an increase in fly ash C, suggesting that some of the C is isolated from the flue gas stream and does not contribute to Hg capture. Mercury capture increases with an increase in Brunauer-Emmett-Teller (BET) surface area and micropore surface area. The differences in Hg capture between the Bulgarian plants burning low-rank coal and high volatile bituminous-fed Kentucky power plants suggests that the variations in C forms resulting from the combustion of the different ranks also influence the efficiency of Hg capture. ?? 2010 Elsevier Ltd.

  13. Mercury capture by selected Bulgarian fly ashes: Influence of coal rank and fly ash carbon pore structure on capture efficiency

    Energy Technology Data Exchange (ETDEWEB)

    Kostova, I.J.; Hower, J.C.; Mastalerz, M.; Vassilev, S.V. [University of Kentucky, Lexington, KY (United States). Center of Applied Energy Research

    2011-01-15

    Mercury capture by fly ash C was investigated at five lignite- and subbituminous-coal-burning Bulgarian power plants (Republika, Bobov Dol, Maritza East 2, Maritza East 3, and Sliven). Although the C content of the ashes is low, never exceeding 1.6%, the Hg capture on a unit C basis demonstrates that the low-rank-coal-derived fly ash carbons are more efficient in capturing Hg than fly ash carbons from bituminous-fired power plants. While some low-C and low-Hg fly ashes do not reveal any trends of Hg versus C, the 2nd and, in particular, the 3rd electrostatic precipitator (ESP) rows at the Republika power plant do have sufficient fly ash C range and experience flue gas sufficiently cool to capture measurable amounts of Hg. The Republika 3rd ESP row exhibits an increase in Hg with increasing C, as observed in other power plants, for example, in Kentucky power plants burning Appalachian-sourced bituminous coals. Mercury/C decreases with an increase in fly ash C, suggesting that some of the C is isolated from the flue gas stream and does not contribute to Hg capture. Mercury capture increases with an increase in Brunauer-Emmett-Teller (BET) surface area and micropore surface area. The differences in Hg capture between the Bulgarian plants burning low-rank coal and high volatile bituminous-fed Kentucky power plants suggests that the variations in C forms resulting from the combustion of the different ranks also influence the efficiency of Hg capture.

  14. Inescapable Stress Changes Walking Behavior in Flies - Learned Helplessness Revisited.

    Science.gov (United States)

    Batsching, Sophie; Wolf, Reinhard; Heisenberg, Martin

    2016-01-01

    Like other animals flies develop a state of learned helplessness in response to unescapable aversive events. To show this, two flies, one 'master', one 'yoked', are each confined to a dark, small chamber and exposed to the same sequence of mild electric shocks. Both receive these shocks when the master fly stops walking for more than a second. Behavior in the two animals is differently affected by the shocks. Yoked flies are transiently impaired in place learning and take longer than master flies to exit from the chamber towards light. After the treatment they walk more slowly and take fewer and shorter walking bouts. The low activity is attributed to the fly's experience that its escape response, an innate behavior to terminate the electric shocks, does not help anymore. Earlier studies using heat pulses instead of electric shocks had shown similar effects. This parallel supports the interpretation that it is the uncontrollability that induces the state.

  15. Inescapable Stress Changes Walking Behavior in Flies - Learned Helplessness Revisited

    Science.gov (United States)

    Batsching, Sophie; Wolf, Reinhard; Heisenberg, Martin

    2016-01-01

    Like other animals flies develop a state of learned helplessness in response to unescapable aversive events. To show this, two flies, one 'master', one 'yoked', are each confined to a dark, small chamber and exposed to the same sequence of mild electric shocks. Both receive these shocks when the master fly stops walking for more than a second. Behavior in the two animals is differently affected by the shocks. Yoked flies are transiently impaired in place learning and take longer than master flies to exit from the chamber towards light. After the treatment they walk more slowly and take fewer and shorter walking bouts. The low activity is attributed to the fly's experience that its escape response, an innate behavior to terminate the electric shocks, does not help anymore. Earlier studies using heat pulses instead of electric shocks had shown similar effects. This parallel supports the interpretation that it is the uncontrollability that induces the state. PMID:27875580

  16. Inescapable Stress Changes Walking Behavior in Flies - Learned Helplessness Revisited.

    Directory of Open Access Journals (Sweden)

    Sophie Batsching

    Full Text Available Like other animals flies develop a state of learned helplessness in response to unescapable aversive events. To show this, two flies, one 'master', one 'yoked', are each confined to a dark, small chamber and exposed to the same sequence of mild electric shocks. Both receive these shocks when the master fly stops walking for more than a second. Behavior in the two animals is differently affected by the shocks. Yoked flies are transiently impaired in place learning and take longer than master flies to exit from the chamber towards light. After the treatment they walk more slowly and take fewer and shorter walking bouts. The low activity is attributed to the fly's experience that its escape response, an innate behavior to terminate the electric shocks, does not help anymore. Earlier studies using heat pulses instead of electric shocks had shown similar effects. This parallel supports the interpretation that it is the uncontrollability that induces the state.

  17. Investigation of Aerodynamic Capabilities of Flying Fish in Gliding Flight

    Science.gov (United States)

    Park, H.; Choi, H.

    In the present study, we experimentally investigate the aerodynamic capabilities of flying fish. We consider four different flying fish models, which are darkedged-wing flying fishes stuffed in actual gliding posture. Some morphological parameters of flying fish such as lateral dihedral angle of pectoral fins, incidence angles of pectoral and pelvic fins are considered to examine their effect on the aerodynamic performance. We directly measure the aerodynamic properties (lift, drag, and pitching moment) for different morphological parameters of flying fish models. For the present flying fish models, the maximum lift coefficient and lift-to-drag ratio are similar to those of medium-sized birds such as the vulture, nighthawk and petrel. The pectoral fins are found to enhance the lift-to-drag ratio and the longitudinal static stability of gliding flight. On the other hand, the lift coefficient and lift-to-drag ratio decrease with increasing lateral dihedral angle of pectoral fins.

  18. Semantic Identification Attacks on Web Browsing

    OpenAIRE

    Guha, Neel

    2016-01-01

    We introduce a Semantic Identification Attack, in which an adversary uses semantic signals about the pages visited in one browsing session to identify other browsing sessions launched by the same user. This attack allows an adver- sary to determine if two browsing sessions originate from the same user regardless of any measures taken by the user to disguise their browser or network. We use the MSNBC Anonymous Browsing data set, which contains a large set of user visits (labeled by category) t...

  19. Hereditary angioedema attacks resolve faster and are shorter after early icatibant treatment.

    Directory of Open Access Journals (Sweden)

    Marcus Maurer

    Full Text Available BACKGROUND: Attacks of hereditary angioedema (HAE are unpredictable and, if affecting the upper airway, can be lethal. Icatibant is used for physician- or patient self-administered symptomatic treatment of HAE attacks in adults. Its mode of action includes disruption of the bradykinin pathway via blockade of the bradykinin B(2 receptor. Early treatment is believed to shorten attack duration and prevent severe outcomes; however, evidence to support these benefits is lacking. OBJECTIVE: To examine the impact of timing of icatibant administration on the duration and resolution of HAE type I and II attacks. METHODS: The Icatibant Outcome Survey is an international, prospective, observational study for patients treated with icatibant. Data on timings and outcomes of icatibant treatment for HAE attacks were collected between July 2009-February 2012. A mixed-model of repeated measures was performed for 426 attacks in 136 HAE type I and II patients. RESULTS: Attack duration was significantly shorter in patients treated <1 hour of attack onset compared with those treated ≥ 1 hour (6.1 hours versus 16.8 hours [p<0.001]. Similar significant effects were observed for <2 hours versus ≥ 2 hours (7.2 hours versus 20.2 hours [p<0.001] and <5 hours versus ≥ 5 hours (8.0 hours versus 23.5 hours [p<0.001]. Treatment within 1 hour of attack onset also significantly reduced time to attack resolution (5.8 hours versus 8.8 hours [p<0.05]. Self-administrators were more likely to treat early and experience shorter attacks than those treated by a healthcare professional. CONCLUSION: Early blockade of the bradykinin B(2 receptor with icatibant, particularly within the first hour of attack onset, significantly reduced attack duration and time to attack resolution.

  20. Assessment of hardened characteristics of raw fly ash blended self-compacting concrete

    Directory of Open Access Journals (Sweden)

    B. Mahalingam

    2016-09-01

    Full Text Available Fly ash is widely used as a supplementary cementitious material in concrete. Due to the implementation of new thermal power plants as a consequence of electricity demand, generation of fly ash is noticeably increased. In addition to pozzolana blended cement production, it is very imperative to use raw fly ash in concrete. Earlier research studies investigated the performance of processed fly ash in blended cement production as well as in concrete. In general, ground fly ash is used in blended cement production. A comprehensive study on the performance evaluation of raw fly ash in self-compacting concrete is not available in the existing literature. Moreover, utilization of raw fly ash in special concrete such as self-compacting concrete is essential to comprehend the performance of raw fly ash blended concrete compared to ordinary Portland concrete. Additionally, it will help to achieve maximum utilization of raw fly ash as a supplementary cementitious material rather than disposal as a waste, which eventually leads to several environmental issues. In the study, raw fly ash was collected and is directly used in development of self-compacting concrete. Two mixes were cast and hardened characteristics of blended concrete were investigated. Results from the study showed comparable performance with control concrete. Furthermore, significant reduction in chloride permeability was observed for raw fly ash blended concrete.

  1. Pre-attack signs and symptoms in cluster headache: Characteristics and time profile.

    Science.gov (United States)

    Snoer, Agneta; Lund, Nunu; Beske, Rasmus; Jensen, Rigmor; Barloese, Mads

    2018-05-01

    Introduction In contrast to the premonitory phase of migraine, little is known about the pre-attack (prodromal) phase of a cluster headache. We aimed to describe the nature, prevalence, and duration of pre-attack symptoms in cluster headache. Methods Eighty patients with episodic cluster headache or chronic cluster headache, according to ICHD-3 beta criteria, were invited to participate. In this observational study, patients underwent a semi-structured interview where they were asked about the presence of 31 symptoms/signs in relation to a typical cluster headache attack. Symptoms included previously reported cluster headache pre-attack symptoms, premonitory migraine symptoms and accompanying symptoms of migraine and cluster headache. Results Pre-attack symptoms were reported by 83.3% of patients, with an average of 4.25 (SD 3.9) per patient. Local and painful symptoms, occurring with a median of 10 minutes before attack, were reported by 70%. Local and painless symptoms and signs, occurring with a median of 10 minutes before attack, were reported by 43.8% and general symptoms, occurring with a median of 20 minutes before attack, were reported by 62.5% of patients. Apart from a dull/aching sensation in the attack area being significantly ( p cluster headache. Since the origin of cluster headache attacks is still unresolved, studies of pre-attack symptoms could contribute to the understanding of cluster headache pathophysiology. Furthermore, identification and recognition of pre-attack symptoms could potentially allow earlier abortive treatment.

  2. Variability of clinical features in attacks of migraine with aura

    DEFF Research Database (Denmark)

    Hansen, Jakob M; Goadsby, Peter J; Charles, Andrew C

    2016-01-01

    . CONCLUSION: These findings are consistent with variable involvement of different brain regions during a migraine attack. The variable occurrence of nausea, and phonophobia in conjunction with photophobia, both defining features of migraine, may be an important consideration in designing clinical studies......BACKGROUND: There is significant variability in the clinical presentation of migraine, both among patients, and between attacks in an individual patient. We examined clinical features of migraine with aura in a large group of patients enrolled in a clinical trial, and compared retrospective...... a detailed retrospective description of the clinical features of their attacks of migraine. During the trial, clinical symptoms in migraine attacks starting with aura were recorded prospectively in 861 attacks. RESULTS: Retrospectively reported visual aura symptoms were variable and often overlapping...

  3. "Dateline NBC"'s Persuasive Attack on Wal-Mart.

    Science.gov (United States)

    Benoit, William L.; Dorries, Bruce

    1996-01-01

    Develops a typology of persuasive attack strategies. Identifies two key components of persuasive attack: responsibility and offensiveness. Describes several strategies for intensifying each of these elements. Applies this analysis to "Dateline NBC"'s allegations that Wal-Mart's "Buy American" campaign was deceptive. Concludes…

  4. Transforming Graphical System Models To Graphical Attack Models

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Mauw, S.; Kordy, B.

    2015-01-01

    Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations that

  5. TCPL: A Defense against wormhole attacks in wireless sensor networks

    International Nuclear Information System (INIS)

    Kumar, K. E. Naresh; Waheed, Mohd. Abdul; Basappa, K. Kari

    2010-01-01

    Do In this paper presents recent advances in technology have made low-cost, low-power wireless sensors with efficient energy consumption. A network of such nodes can coordinate among themselves for distributed sensing and processing of certain data. For which, we propose an architecture to provide a stateless solution in sensor networks for efficient routing in wireless sensor networks. This type of architecture is known as Tree Cast. We propose a unique method of address allocation, building up multiple disjoint trees which are geographically inter-twined and rooted at the data sink. Using these trees, routing messages to and from the sink node without maintaining any routing state in the sensor nodes is possible. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many sensor network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication. We present a new, general mechanism, called packet leashes, for detecting and thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes.

  6. Capillarity theory for the fly-casting mechanism

    Science.gov (United States)

    Trizac, Emmanuel; Levy, Yaakov; Wolynes, Peter G.

    2010-01-01

    Biomolecular folding and function are often coupled. During molecular recognition events, one of the binding partners may transiently or partially unfold, allowing more rapid access to a binding site. We describe a simple model for this fly-casting mechanism based on the capillarity approximation and polymer chain statistics. The model shows that fly casting is most effective when the protein unfolding barrier is small and the part of the chain which extends toward the target is relatively rigid. These features are often seen in known examples of fly casting in protein–DNA binding. Simulations of protein–DNA binding based on well-funneled native-topology models with electrostatic forces confirm the trends of the analytical theory. PMID:20133683

  7. Behavioral Modeling of WSN MAC Layer Security Attacks: A Sequential UML Approach

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    is the vulnerability to security attacks/threats. The performance and behavior of a WSN are vastly affected by such attacks. In order to be able to better address the vulnerabilities of WSNs in terms of security, it is important to understand the behavior of the attacks. This paper addresses the behavioral modeling...... of medium access control (MAC) security attacks in WSNs. The MAC layer is responsible for energy consumption, delay and channel utilization of the network and attacks on this layer can introduce significant degradation of the individual sensor nodes due to energy drain and in performance due to delays....... The behavioral modeling of attacks will be beneficial for designing efficient and secure MAC layer protocols. The security attacks are modeled using a sequential diagram approach of Unified Modeling Language (UML). Further, a new attack definition, specific to hybrid MAC mechanisms, is proposed....

  8. Study of radon exhalation and emanation rates from fly ash samples

    International Nuclear Information System (INIS)

    Raj Kumari; Jain, Ravinder; Kant, Krishan; Gupta, Nitin; Garg, Maneesha; Yadav, Mani Kant

    2013-01-01

    Fly ash, a by-product of burnt coal is technologically important material being used for manufacturing of bricks, sheets, cement, land filling etc. The increased interest in measuring radon exhalation and emanation rates in fly ash samples is due to its health hazards and environmental pollution and the same have been measured to assess the radiological impact of radon emanated from fly ash disposal sites. Samples of fly ash from different thermal power stations in northern India and National Council for Cement and Building Materials (NCB) were collected and analysed for the measurements. For the measurement, alpha sensitive LR-115 type II plastic track detectors were used. Gamma spectrometry and can technique was used for the measurements. The experimental data show that fly ash samples emanate radon in significant amount and this consequently, may result in increased radon levels in dwellings built by using fly ash bricks and excessive radiation exposure to workers residing in the surroundings of fly ash dumping sites. (author)

  9. The WOMBAT Attack Attribution Method: Some Results

    Science.gov (United States)

    Dacier, Marc; Pham, Van-Hau; Thonnard, Olivier

    In this paper, we present a new attack attribution method that has been developed within the WOMBAT project. We illustrate the method with some real-world results obtained when applying it to almost two years of attack traces collected by low interaction honeypots. This analytical method aims at identifying large scale attack phenomena composed of IP sources that are linked to the same root cause. All malicious sources involved in a same phenomenon constitute what we call a Misbehaving Cloud (MC). The paper offers an overview of the various steps the method goes through to identify these clouds, providing pointers to external references for more detailed information. Four instances of misbehaving clouds are then described in some more depth to demonstrate the meaningfulness of the concept.

  10. Strength Characteristics of Fiber Reinforced Quarry Dust Stabilized Fly Ash

    OpenAIRE

    Akshaya Kumar Sabat; Bidula Bose

    2015-01-01

    Effects of quarry dust and polypropylene fiber on compaction properties, shear strength parameters, and California bearing ratio (CBR) of a fly ash have been discussed in this paper. Quarry dust was added to a fly ash from 0 to 60% at an increment of 10%, compaction and soaked CBR tests were conducted on fly ash-quarry dust mixes and the optimum percentage of quarry dust was found out to be 40%. Polypropylene fiber was added to fly ash stabilized with optimum percentage of quarry dust, from 0...

  11. Speeding up detection of SHA-1 collision attacks using unavoidable attack conditions

    NARCIS (Netherlands)

    M.M.J. Stevens (Marc); D. Shumow

    2017-01-01

    textabstractCounter-cryptanalysis, the concept of using cryptanalytic techniques to detect cryptanalytic attacks, was introduced by Stevens at CRYPTO 2013 [22] with a hash collision detection algorithm. That is, an algorithm that detects whether a given single message is part of a colliding message

  12. Low-Rate DDoS Attack Detection Using Expectation of Packet Size

    Directory of Open Access Journals (Sweden)

    Lu Zhou

    2017-01-01

    Full Text Available Low-rate Distributed Denial-of-Service (low-rate DDoS attacks are a new challenge to cyberspace, as the attackers send a large amount of attack packets similar to normal traffic, to throttle legitimate flows. In this paper, we propose a measurement—expectation of packet size—that is based on the distribution difference of the packet size to distinguish two typical low-rate DDoS attacks, the constant attack and the pulsing attack, from legitimate traffic. The experimental results, obtained using a series of real datasets with different times and different tolerance factors, are presented to demonstrate the effectiveness of the proposed measurement. In addition, extensive experiments are performed to show that the proposed measurement can detect the low-rate DDoS attacks not only in the short and long terms but also for low packet rates and high packet rates. Furthermore, the false-negative rates and the adjudication distance can be adjusted based on the detection sensitivity requirements.

  13. Implementation of Positive Operator-Valued Measure in Passive Faraday Mirror Attack

    International Nuclear Information System (INIS)

    Wang Wei-Long; Gao Ming; Ma Zhi

    2015-01-01

    Passive Faraday-mirror (PFM) attack is based on imperfect Faraday mirrors in practical quantum cryptography systems and a set of three-dimensional Positive Operator-Valued Measure (POVM) operators plays an important role in this attack. In this paper, we propose a simple scheme to implement the POVM in PFM attack on an Faraday–Michelson quantum cryptography system. Since the POVM can not be implemented directly with previous methods, in this scheme it needs to expand the states sent by Alice and the POVM operators in the attack into four-dimensional Hilbert space first, without changing the attacking effect by calculation. Based on the methods proposed by Ahnert and Payne, the linear-optical setup for implementing the POVM operators is derived. At last, the complete setup for realizing the PFM attack is presented with all parameters. Furthermore, our scheme can also be applied to realize PFM attack on a plug-and-play system by changing the parameters in the setup. (paper)

  14. Synanthropic flies of Asir Province, southwest of Saudi Arabia

    Directory of Open Access Journals (Sweden)

    M.A. Kenawy

    2014-12-01

    Full Text Available A survey of synanthropic flies was carried out in 11 slaughter houses in 8 localities representing different altitudes in Asir. Flies were sampled twice a month from December 2008 to November 2009 by Final Flight Fly Traps. A total of 11,737 flies consisting of 19 species, belonging to 7 families were collected, of which those of family Muscidae predominated (94.88% followed by Calliphoridae (3.12%, Sarcophagidae (1.22% and Fanniidae (0.55%. The other 5 families (Piophilidae, Oestridae, Phoridae, Ulidiidae and Lonchaeidae totally represented 0.79%. Of the identified species, Musca domestica was predominant (94.26% followed by Lucilia sericata (1.51%, Sarcophaga carnaria (1.01%, Chrysomya albiceps (0.67%, Fannia canicularis (0.55%, Chrysomya marginalis (0.54%, Muscina stabulans (0.52%, Calliphora vicina (0.39%, Wohlfahrtia nuba (0.14%, Megaselia scalaris (0.08%, Lonchaea sp. (0.06, Bercaea cruentata (0.05, Ophyra sp. and Oestrus ovis (0.04% each, Atherigona sp., Piophila casie and Physiphora demandala (0.03% each and Parasarcophaga ruficornis (0.01. Flies altogether were more common (16 spp., 84.21% and abundant (36.45 fly/trap in highlands than in the other altitude levels. The highlands were found with the maximum Simpson (1-D=0.18 and Shannon (H=0.49, P<0.001 diversity indices. Likewise, the highest density of M. domestica was in the highlands (P<0.05. Regression analysis confirmed that house fly density was directly related to the altitude level (P<0.05. In all altitude levels, housefly was active during the whole year with higher activities during months of low and moderate temperatures (spring, autumn and winter seasons. Analysis revealed that fly density had inverse relation with temperature.

  15. Regression Nodes: Extending attack trees with data from social sciences

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    In the field of security, attack trees are often used to assess security vulnerabilities probabilistically in relation to multi-step attacks. The nodes are usually connected via AND-gates, where all children must be executed, or via OR-gates, where only one action is necessary for the attack step to

  16. Depletion-of-Battery Attack: Specificity, Modelling and Analysis.

    Science.gov (United States)

    Shakhov, Vladimir; Koo, Insoo

    2018-06-06

    The emerging Internet of Things (IoT) has great potential; however, the societal costs of the IoT can outweigh its benefits. To unlock IoT potential, there needs to be improvement in the security of IoT applications. There are several standardization initiatives for sensor networks, which eventually converge with the Internet of Things. As sensor-based applications are deployed, security emerges as an essential requirement. One of the critical issues of wireless sensor technology is limited sensor resources, including sensor batteries. This creates a vulnerability to battery-exhausting attacks. Rapid exhaustion of sensor battery power is not only explained by intrusions, but can also be due to random failure of embedded sensor protocols. Thus, most wireless sensor applications, without tools to defend against rash battery exhausting, would be unable to function during prescribed times. In this paper, we consider a special type of threat, in which the harm is malicious depletion of sensor battery power. In contrast to the traditional denial-of-service attack, quality of service under the considered attack is not necessarily degraded. Moreover, the quality of service can increase up to the moment of the sensor set crashes. We argue that this is a distinguishing type of attack. Hence, the application of a traditional defense mechanism against this threat is not always possible. Therefore, effective methods should be developed to counter the threat. We first discuss the feasibility of rash depletion of battery power. Next, we propose a model for evaluation of energy consumption when under attack. Finally, a technique to counter the attack is discussed.

  17. Status of biopesticides for control of house flies

    Science.gov (United States)

    House flies (Musca domestica L.) have resisted human attempts to control them since antiquity, and the global problem of fly resistance to conventional insecticides has resulted in renewed interest in biopesticides as alternative management tools. Entomopathogenic nematodes such as Steinernema and ...

  18. Flightless mutants in the melon fly and oriental fruit fly (Diptera: Tephritidae) and their possible role in the sterile insect release method

    International Nuclear Information System (INIS)

    McCombs, S.D.; Saul, S.H.

    1992-01-01

    Two new mutants that affect adult wing morphology and render the flies incapable of flight.sbd.bubble wing (bw) in the melon fly, Bactrocera cucurbitae (Coquillett), and small wing (sw) in the oriental fruit fly, Bactrocera dorsalis (Hendel).sbd.are described. Both mutants have variable expression and are caused by autosomal, recessive genes. We discuss the possible role of these alleles in constructing genetic sex sorting systems to improve the effectiveness and efficiency of the sterile insect release method

  19. Proceedings from the 2nd International Symposium on Formation Flying Missions and Technologies

    Science.gov (United States)

    2004-01-01

    Topics discussed include: The Stellar Imager (SI) "Vision Mission"; First Formation Flying Demonstration Mission Including on Flight Nulling; Formation Flying X-ray Telescope in L2 Orbit; SPECS: The Kilometer-baseline Far-IR Interferometer in NASA's Space Science Roadmap Presentation; A Tight Formation for Along-track SAR Interferometry; Realization of the Solar Power Satellite using the Formation Flying Solar Reflector; SIMBOL-X : Formation Flying for High-Energy Astrophysics; High Precision Optical Metrology for DARWIN; Close Formation Flight of Micro-Satellites for SAR Interferometry; Station-Keeping Requirements for Astronomical Imaging with Constellations of Free-Flying Collectors; Closed-Loop Control of Formation Flying Satellites; Formation Control for the MAXIM Mission; Precision Formation Keeping at L2 Using the Autonomous Formation Flying Sensor; Robust Control of Multiple Spacecraft Formation Flying; Virtual Rigid Body (VRB) Satellite Formation Control: Stable Mode-Switching and Cross-Coupling; Electromagnetic Formation Flight (EMFF) System Design, Mission Capabilities, and Testbed Development; Navigation Algorithms for Formation Flying Missions; Use of Formation Flying Small Satellites Incorporating OISL's in a Tandem Cluster Mission; Semimajor Axis Estimation Strategies; Relative Attitude Determination of Earth Orbiting Formations Using GPS Receivers; Analysis of Formation Flying in Eccentric Orbits Using Linearized Equations of Relative Motion; Conservative Analytical Collision Probabilities for Orbital Formation Flying; Equations of Motion and Stability of Two Spacecraft in Formation at the Earth/Moon Triangular Libration Points; Formations Near the Libration Points: Design Strategies Using Natural and Non-Natural Ares; An Overview of the Formation and Attitude Control System for the Terrestrial Planet Finder Formation Flying Interferometer; GVE-Based Dynamics and Control for Formation Flying Spacecraft; GNC System Design for a New Concept of X

  20. Energetic cost of bot fly parasitism in free-ranging eastern chipmunks.

    Science.gov (United States)

    Careau, Vincent; Thomas, Donald W; Humphries, Murray M

    2010-02-01

    The energy and nutrient demands of parasites on their hosts are frequently invoked as an explanation for negative impacts of parasitism on host survival and reproductive success. Although cuterebrid bot flies are among the physically largest and most-studied insect parasites of mammals, the only study conducted on metabolic consequences of bot fly parasitism revealed a surprisingly small effect of bot flies on host metabolism. Here we test the prediction that bot fly parasitism increases the resting metabolic rate (RMR) of free-ranging eastern chipmunks (Tamias striatus), particularly in juveniles who have not previously encountered parasites and have to allocate energy to growth. We found no effect of bot fly parasitism on adults. In juveniles, however, we found that RMR strongly increased with the number of bot fly larvae hosted. For a subset of 12 juveniles during a year where parasite prevalence was particularly high, we also compared the RMR before versus during the peak of bot fly prevalence, allowing each individual to act as its own control. Each bot fly larva resulted in a approximately 7.6% increase in the RMR of its host while reducing juvenile growth rates. Finally, bot fly parasitism at the juvenile stage was positively correlated with adult stage RMR, suggesting persistent effects of bot flies on RMR. This study is the first to show an important effect of bot fly parasitism on the metabolism and growth of a wild mammal. Our work highlights the importance of studying cost of parasitism over multiple years in natural settings, as negative effects on hosts are more likely to emerge in periods of high energetic demand (e.g. growing juveniles) and/or in harsh environmental conditions (e.g. low food availability).