WorldWideScience

Sample records for higher attack rate

  1. Mitigating Higher Ed Cyber Attacks

    Science.gov (United States)

    Rogers, Gary; Ashford, Tina

    2015-01-01

    In this presentation we will discuss the many and varied cyber attacks that have recently occurred in the higher ed community. We will discuss the perpetrators, the victims, the impact and how these institutions have evolved to meet this threat. Mitigation techniques and defense strategies will be covered as will a discussion of effective security…

  2. Higher Order Differential Attack on 6-Round MISTY1

    Science.gov (United States)

    Tsunoo, Yukiyasu; Saito, Teruo; Nakashima, Hiroki; Shigeri, Maki

    MISTY1 is a 64-bit block cipher that has provable security against differential and linear cryptanalysis. MISTY1 is one of the algorithms selected in the European NESSIE project, and it has been recommended for Japanese e-Government ciphers by the CRYPTREC project. This paper reports a previously unknown higher order differential characteristic of 4-round MISTY1 with the FL functions. It also shows that a higher order differential attack that utilizes this newly discovered characteristic is successful against 6-round MISTY1 with the FL functions. This attack can recover a partial subkey with a data complexity of 253.7 and a computational complexity of 264.4, which is better than any previous cryptanalysis of MISTY1.

  3. Novel Method For Low-Rate Ddos Attack Detection

    Science.gov (United States)

    Chistokhodova, A. A.; Sidorov, I. D.

    2018-05-01

    The relevance of the work is associated with an increasing number of advanced types of DDoS attacks, in particular, low-rate HTTP-flood. Last year, the power and complexity of such attacks increased significantly. The article is devoted to the analysis of DDoS attacks detecting methods and their modifications with the purpose of increasing the accuracy of DDoS attack detection. The article details low-rate attacks features in comparison with conventional DDoS attacks. During the analysis, significant shortcomings of the available method for detecting low-rate DDoS attacks were found. Thus, the result of the study is an informal description of a new method for detecting low-rate denial-of-service attacks. The architecture of the stand for approbation of the method is developed. At the current stage of the study, it is possible to improve the efficiency of an already existing method by using a classifier with memory, as well as additional information.

  4. Higher P-Wave Dispersion in Migraine Patients with Higher Number of Attacks

    Directory of Open Access Journals (Sweden)

    A. Koçer

    2012-01-01

    Full Text Available Objective and Aim. An imbalance of the sympathetic system may explain many of the clinical manifestations of the migraine. We aimed to evaluate P-waves as a reveal of sympathetic system function in migraine patients and healthy controls. Materials and Methods. Thirty-five episodic type of migraine patients (complained of migraine during 5 years or more, BMI < 30 kg/m2 and 30 controls were included in our study. We measured P-wave durations (minimum, maximum, and dispersion from 12-lead ECG recording during pain-free periods. ECGs were transferred to a personal computer via a scanner and then used for magnification of x400 by Adobe Photoshop software. Results. P-wave durations were found to be similar between migraine patients and controls. Although P WD (P-wave dispersion was similar, the mean value was higher in migraine subjects. P WD was positively correlated with P max (P<0.01. Attacks number per month and male gender were the factors related to the P WD (P<0.01. Conclusions. Many previous studies suggested that increased sympathetic activity may cause an increase in P WD. We found that P WD of migraine patients was higher than controls, and P WD was related to attacks number per month and male gender. Further studies are needed to explain the chronic effects of migraine.

  5. Higher coronary heart disease and heart attack morbidity in Appalachian coal mining regions.

    Science.gov (United States)

    Hendryx, Michael; Zullig, Keith J

    2009-11-01

    This study analyzes the U.S. 2006 Behavioral Risk Factor Surveillance System survey data (N=235,783) to test whether self-reported cardiovascular disease rates are higher in Appalachian coal mining counties compared to other counties after control for other risks. Dependent variables include self-reported measures of ever (1) being diagnosed with cardiovascular disease (CVD) or with a specific form of CVD including (2) stroke, (3) heart attack, or (4) angina or coronary heart disease (CHD). Independent variables included coal mining, smoking, BMI, drinking, physician supply, diabetes co-morbidity, age, race/ethnicity, education, income, and others. SUDAAN Multilog models were estimated, and odds ratios tested for coal mining effects. After control for covariates, people in Appalachian coal mining areas reported significantly higher risk of CVD (OR=1.22, 95% CI=1.14-1.30), angina or CHD (OR=1.29, 95% CI=1.19-1.39) and heart attack (OR=1.19, 95% CI=1.10-1.30). Effects were present for both men and women. Cardiovascular diseases have been linked to both air and water contamination in ways consistent with toxicants found in coal and coal processing. Future research is indicated to assess air and water quality in coal mining communities in Appalachia, with corresponding environmental programs and standards established as indicated.

  6. Higher coronary heart disease and heart attack morbidity in Appalachian coal mining regions

    Energy Technology Data Exchange (ETDEWEB)

    Hendryx, M.; Zullig, K.J. [West Virginia University, Morgantown, WV (United States). Dept. of Community Medicine

    2009-11-15

    This study analyzes the U.S. 2006 Behavioral Risk Factor Surveillance System survey data (N = 235,783) to test whether self-reported cardiovascular disease rates are higher in Appalachian coal mining counties compared to other counties after control for other risks. Dependent variables include self-reported measures of ever (1) being diagnosed with cardiovascular disease (CVD) or with a specific form of CVD including (2) stroke, (3) heart attack, or (4) angina or coronary heart disease (CHD). Independent variables included coal mining, smoking, BMI, drinking, physician supply, diabetes co-morbidity, age, race/ethnicity, education, income, and others. SUDAAN Multilog models were estimated, and odds ratios tested for coal mining effects. After control for covariates, people in Appalachian coal mining areas reported significantly higher risk of CVD (OR = 1.22, 95% CI = 1.14-1.30), angina or CHO (OR = 1.29, 95% C1 = 1.19-1.39) and heart attack (OR = 1.19, 95% C1 = 1.10-1.30). Effects were present for both men and women. Cardiovascular diseases have been linked to both air and water contamination in ways consistent with toxicants found in coal and coal processing. Future research is indicated to assess air and water quality in coal mining communities in Appalachia, with corresponding environmental programs and standards established as indicated.

  7. Security Analysis of 7-Round MISTY1 against Higher Order Differential Attacks

    Science.gov (United States)

    Tsunoo, Yukiyasu; Saito, Teruo; Shigeri, Maki; Kawabata, Takeshi

    MISTY1 is a 64-bit block cipher that has provable security against differential and linear cryptanalysis. MISTY1 is one of the algorithms selected in the European NESSIE project, and it has been recommended for Japanese e-Government ciphers by the CRYPTREC project. This paper shows that higher order differential attacks can be successful against 7-round versions of MISTY1 with FL functions. The attack on 7-round MISTY1 can recover a partial subkey with a data complexity of 254.1 and a computational complexity of 2120.8, which signifies the first successful attack on 7-round MISTY1 with no limitation such as a weak key. This paper also evaluates the complexity of this higher order differential attack on MISTY1 in which the key schedule is replaced by a pseudorandom function. It is shown that resistance to the higher order differential attack is not substantially improved even in 7-round MISTY1 in which the key schedule is replaced by a pseudorandom function.

  8. Low-Rate DDoS Attack Detection Using Expectation of Packet Size

    Directory of Open Access Journals (Sweden)

    Lu Zhou

    2017-01-01

    Full Text Available Low-rate Distributed Denial-of-Service (low-rate DDoS attacks are a new challenge to cyberspace, as the attackers send a large amount of attack packets similar to normal traffic, to throttle legitimate flows. In this paper, we propose a measurement—expectation of packet size—that is based on the distribution difference of the packet size to distinguish two typical low-rate DDoS attacks, the constant attack and the pulsing attack, from legitimate traffic. The experimental results, obtained using a series of real datasets with different times and different tolerance factors, are presented to demonstrate the effectiveness of the proposed measurement. In addition, extensive experiments are performed to show that the proposed measurement can detect the low-rate DDoS attacks not only in the short and long terms but also for low packet rates and high packet rates. Furthermore, the false-negative rates and the adjudication distance can be adjusted based on the detection sensitivity requirements.

  9. Shilling attack detection for recommender systems based on credibility of group users and rating time series.

    Science.gov (United States)

    Zhou, Wei; Wen, Junhao; Qu, Qiang; Zeng, Jun; Cheng, Tian

    2018-01-01

    Recommender systems are vulnerable to shilling attacks. Forged user-generated content data, such as user ratings and reviews, are used by attackers to manipulate recommendation rankings. Shilling attack detection in recommender systems is of great significance to maintain the fairness and sustainability of recommender systems. The current studies have problems in terms of the poor universality of algorithms, difficulty in selection of user profile attributes, and lack of an optimization mechanism. In this paper, a shilling behaviour detection structure based on abnormal group user findings and rating time series analysis is proposed. This paper adds to the current understanding in the field by studying the credibility evaluation model in-depth based on the rating prediction model to derive proximity-based predictions. A method for detecting suspicious ratings based on suspicious time windows and target item analysis is proposed. Suspicious rating time segments are determined by constructing a time series, and data streams of the rating items are examined and suspicious rating segments are checked. To analyse features of shilling attacks by a group user's credibility, an abnormal group user discovery method based on time series and time window is proposed. Standard testing datasets are used to verify the effect of the proposed method.

  10. Ventilatory control of heart rate during inhalation of 5% CO2 and types of panic attacks.

    Science.gov (United States)

    Ley, R

    1991-09-01

    Differences in the magnitude of increases in heart rate during prolonged inhalation of 5% CO2 range from a mean of 25 b/min for a group of eight panic-disorder patients who panicked (Woods, Charney, Goodman, & Heninger, 1988. Archives of General Psychiatry, 45, 43-52) to zero b/min for 16 patients, eight of whom panicked (Craske & Barlow, 1990. Journal of Abnormal Psychology, 99, 302-307). What accounts for this disparity? The present paper describes how heart rate can be increased by means of voluntary overbreathing during prolonged inhalation of 5% CO2 in air. This suggests that differences in the degree of overbreathing may explain differences in the magnitude of increases in heart rate during inhalation of 5% CO2. An explanation is also offered for the curious finding that some patients experience "panic attacks" with zero increase in heart rate. Evidence suggests that this is likely to happen in cognitively based panic attacks, in contrast to hyperventilatory attacks or anticipatory attacks.

  11. Verification of Sulfate Attack Penetration Rates for Saltstone Disposal Unit Modeling

    Energy Technology Data Exchange (ETDEWEB)

    Flach, G. P. [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL)

    2015-05-12

    Recent Special Analysis modeling of Saltstone Disposal Units consider sulfate attack on concrete and utilize degradation rates estimated from Cementitious Barriers Partnership software simulations. This study provides an independent verification of those simulation results using an alternative analysis method and an independent characterization data source. The sulfate penetration depths estimated herein are similar to the best-estimate values in SRNL-STI-2013-00118 Rev. 2 and well below the nominal values subsequently used to define Saltstone Special Analysis base cases.

  12. Inferring predator behavior from attack rates on prey-replicas that differ in conspicuousness.

    Directory of Open Access Journals (Sweden)

    Yoel E Stuart

    Full Text Available Behavioral ecologists and evolutionary biologists have long studied how predators respond to prey items novel in color and pattern. Because a predatory response is influenced by both the predator's ability to detect the prey and a post-detection behavioral response, variation among prey types in conspicuousness may confound inference about post-prey-detection predator behavior. That is, a relatively high attack rate on a given prey type may result primarily from enhanced conspicuousness and not predators' direct preference for that prey. Few studies, however, account for such variation in conspicuousness. In a field experiment, we measured predation rates on clay replicas of two aposematic forms of the poison dart frog Dendrobates pumilio, one novel and one familiar, and two cryptic controls. To ask whether predators prefer or avoid a novel aposematic prey form independently of conspicuousness differences among replicas, we first modeled the visual system of a typical avian predator. Then, we used this model to estimate replica contrast against a leaf litter background to test whether variation in contrast alone could explain variation in predator attack rate. We found that absolute predation rates did not differ among color forms. Predation rates relative to conspicuousness did, however, deviate significantly from expectation, suggesting that predators do make post-detection decisions to avoid or attack a given prey type. The direction of this deviation from expectation, though, depended on assumptions we made about how avian predators discriminate objects from the visual background. Our results show that it is important to account for prey conspicuousness when investigating predator behavior and also that existing models of predator visual systems need to be refined.

  13. Attack rates assessment of the 2009 pandemic H1N1 influenza A in children and their contacts: a systematic review and meta-analysis.

    Directory of Open Access Journals (Sweden)

    Aharona Glatman-Freedman

    Full Text Available BACKGROUND: The recent H1N1 influenza A pandemic was marked by multiple reports of illness and hospitalization in children, suggesting that children may have played a major role in the propagation of the virus. A comprehensive detailed analysis of the attack rates among children as compared with their contacts in various settings is of great importance for understanding their unique role in influenza pandemics. METHODOLOGY/PRINCIPAL FINDINGS: We searched MEDLINE (PubMed and Embase for published studies reporting outbreak investigations with direct measurements of attack rates of the 2009 pandemic H1N1 influenza A among children, and quantified how these compare with those of their contacts. We identified 50 articles suitable for review, which reported school, household, travel and social events. The selected reports and our meta-analysis indicated that children had significantly higher attack rates as compared to adults, and that this phenomenon was observed for both virologically confirmed and clinical cases, in various settings and locations around the world. The review also provided insight into some characteristics of transmission between children and their contacts in the various settings. CONCLUSION/SIGNIFICANCE: The consistently higher attack rates of the 2009 pandemic H1N1 influenza A among children, as compared to adults, as well as the magnitude of the difference is important for understanding the contribution of children to disease burden, for implementation of mitigation strategies directed towards children, as well as more precise mathematical modeling and simulation of future influenza pandemics.

  14. Increased incidence rate of trauma- and stressor-related disorders in Denmark following the Breivik attacks in Norway

    DEFF Research Database (Denmark)

    Hansen, Bertel Teilfeldt; Dinesen, Peter T; Østergaard, Søren D

    2017-01-01

    BACKGROUND: On 22 July 2011, Anders Breivik killed 77 adults and children in Norway. Having recently documented increases in the incidence of trauma- and stressor-related disorders in Denmark after the 9/11 attacks, we hypothesized that the Breivik attacks-due to their geographic proximity......-would be followed by even larger increases in Denmark. METHODS: Using population-based data from the Danish Psychiatric Central Research Register (1995-2012), we conducted an intervention analysis of the change in the incidence of trauma- and stressor-related disorders after the Breivik attacks. RESULTS......: The incidence rate increased by 16% over the following 1½ years after the Breivik attacks, corresponding to 2736 additional cases. In comparison, 9/11 was followed by a 4% increase. We also present evidence of a subsequent surge in incidence stimulated by media attention. CONCLUSION: This study bolsters...

  15. Increased Incidence Rate of Trauma- and Stressor-related Disorders in Denmark After the Breivik Attacks in Norway.

    Science.gov (United States)

    Hansen, Bertel T; Dinesen, Peter T; Østergaard, Søren D

    2017-11-01

    On 22 July 2011, Anders Breivik killed 77 adults and children in Norway. Having recently documented increases in the incidence of trauma- and stressor-related disorders in Denmark after the 9/11 attacks, we hypothesized that the Breivik attacks-due to their geographic proximity-would be followed by even larger increases in Denmark. Using population-based data from the Danish Psychiatric Central Research Register (1995-2012), we conducted an intervention analysis of the change in the incidence of trauma- and stressor-related disorders after the Breivik attacks. The incidence rate increased by 16% over the following 1½ years after the Breivik attacks, corresponding to 2736 additional cases. In comparison, 9/11 was followed by a 4% increase. We also present evidence of a subsequent surge in incidence stimulated by media attention. This study bolsters previous findings on extra-national consequences of terrorism and indicates that geographic proximity and media coverage may exacerbate effects.

  16. A New Mechanism to Improve the Detection Rate of Shilling Attacks in the Recommender Systems

    Directory of Open Access Journals (Sweden)

    javad nehriri

    2017-12-01

    Full Text Available Recommender systems are widely used, in social networks and online stores, to overcome the problems caused by the large amount of information. Most of these systems use a collaborative filtering method to generate recommendations to the users. But, as in this method users’ feedback is considered for recommendations, it can be significantly erroneous by the malicious people. In other words, there may be some users who open fake profiles and vote one-sided or biased in the system that may cause disturbance in providing proper recommendations to other users. This kind of damage is said to be shiling attacks. If the attackers succeed, the user's trust in the recommender systems will reduce. In recent years, efficient attack detection algorithms have been proposed, but each has its own limitations. In this paper, we use profile-based and item-based algorithms to provide a new mechanism to significantly reduce the detection error for shilling attacks.

  17. Tracks FAQs: How Do Heart Attack Hospitalization Rates In My Community Compare With Other Counties Or States?

    Centers for Disease Control (CDC) Podcasts

    In this podcast, CDC Tracking experts discuss how to compare heart attack hospitalization rates in your community with other counties or states. Do you have a question for our Tracking experts? Please e-mail questions to trackingsupport@cdc.gov.

  18. Rich or poor: Who should pay higher tax rates?

    Science.gov (United States)

    Murilo Castro de Oliveira, Paulo

    2017-08-01

    A dynamic agent model is introduced with an annual random wealth multiplicative process followed by taxes paid according to a linear wealth-dependent tax rate. If poor agents pay higher tax rates than rich agents, eventually all wealth becomes concentrated in the hands of a single agent. By contrast, if poor agents are subject to lower tax rates, the economic collective process continues forever.

  19. Tracks FAQs: How Do Heart Attack Hospitalization Rates In My Community Compare With Other Counties Or States?

    Centers for Disease Control (CDC) Podcasts

    2011-09-01

    In this podcast, CDC Tracking experts discuss how to compare heart attack hospitalization rates in your community with other counties or states. Do you have a question for our Tracking experts? Please e-mail questions to trackingsupport@cdc.gov.  Created: 9/1/2011 by National Center for Environmental Health, Division of Environmental Hazards and Health Effects, Environmental Health Tracking Branch.   Date Released: 9/1/2011.

  20. Assessment of High and Low Rate Protocol-based Attacks on Ethernet Networks

    OpenAIRE

    Mina Malekzadeh; M.A. Beiruti; M.H. Shahrokh Abadi

    2015-01-01

    The Internet and Web have significantly transformed the world’s communication system. The capability of the Internet to instantly access information at anytime from anywhere has brought benefit for a wide variety of areas including business, government, education, institutions, medical, and entertainment services. However, the Internet has also opened up the possibilities for hackers to exploit flaws and limitations in the target networks to attack and break in without gaining physical access...

  1. Estimating diversification rates for higher taxa: BAMM can give problematic estimates of rates and rate shifts.

    Science.gov (United States)

    Meyer, Andreas L S; Wiens, John J

    2018-01-01

    Estimates of diversification rates are invaluable for many macroevolutionary studies. Recently, an approach called BAMM (Bayesian Analysis of Macro-evolutionary Mixtures) has become widely used for estimating diversification rates and rate shifts. At the same time, several articles have concluded that estimates of net diversification rates from the method-of-moments (MS) estimators are inaccurate. Yet, no studies have compared the ability of these two methods to accurately estimate clade diversification rates. Here, we use simulations to compare their performance. We found that BAMM yielded relatively weak relationships between true and estimated diversification rates. This occurred because BAMM underestimated the number of rates shifts across each tree, and assigned high rates to small clades with low rates. Errors in both speciation and extinction rates contributed to these errors, showing that using BAMM to estimate only speciation rates is also problematic. In contrast, the MS estimators (particularly using stem group ages), yielded stronger relationships between true and estimated diversification rates, by roughly twofold. Furthermore, the MS approach remained relatively accurate when diversification rates were heterogeneous within clades, despite the widespread assumption that it requires constant rates within clades. Overall, we caution that BAMM may be problematic for estimating diversification rates and rate shifts. © 2017 The Author(s). Evolution © 2017 The Society for the Study of Evolution.

  2. Do obese adults have a higher risk of asthma attack when exposed to indoor mold? A study based on the 2005 Behavioral Risk Factor Surveillance System.

    Science.gov (United States)

    Wen, Xiao-Jun; Balluz, Lina; Mokdad, Ali

    2009-01-01

    Some studies show an association between asthma and obesity, but it is unknown whether exposure to mold will increase the risk of asthma attacks among obese people. This study examined whether obese adults have a higher risk of asthma attacks than non-obese adults when exposed to indoor mold. We used data from the 2005 Behavioral Risk Factor Surveillance System to conduct a cross-sectional analysis among 9,668 respondents who reported exposure to indoor mold. With exposure to indoor mold, weighted prevalence of asthma attacks among obese respondents was 11.4% (95% confidence interval [CI] 6.0, 20.6], which was 2.3 times as high as among the exposed non-obese respondents (5.0%, 95% CI 2.8, 8.8). This ratio was almost the same as the ratio of 2.0:1 between the obese respondents (5.7%, 95% CI 4.6, 7.2) and the non-obese respondents (2.8%, 95% CI 2.3, 3.9) when neither group had exposure to mold. The odds ratio of asthma attack among obese people was 3.10 (95% CI 1.10, 8.67) for those with exposure to mold and 2.21 (95% CI 1.54, 3.17) for those without exposure to mold after adjusting for age, sex, race/ethnicity, and smoking status. Our study suggests that obese adults who have been exposed to indoor mold may not necessarily have a higher risk of asthma attack than obese adults who have not been exposed, even though obesity and exposure to indoor mold are both major risk factors for asthma attack. Medical professionals should not only incorporate weight-control or weight-reduction measures as the components of asthma treatment plans, but also advise asthma patients to avoid exposure to indoor mold.

  3. Predator attack rate evolution in space: the role of ecology mediated by complex emergent spatial structure and self-shading.

    Science.gov (United States)

    Messinger, Susanna M; Ostling, Annette

    2013-11-01

    Predation interactions are an important element of ecological communities. Population spatial structure has been shown to influence predator evolution, resulting in the evolution of a reduced predator attack rate; however, the evolutionary role of traits governing predator and prey ecology is unknown. The evolutionary effect of spatial structure on a predator's attack rate has primarily been explored assuming a fixed metapopulation spatial structure, and understood in terms of group selection. But endogenously generated, emergent spatial structure is common in nature. Furthermore, the evolutionary influence of ecological traits may be mediated through the spatial self-structuring process. Drawing from theory on pathogens, the evolutionary effect of emergent spatial structure can be understood in terms of self-shading, where a voracious predator limits its long-term invasion potential by reducing local prey availability. Here we formalize the effects of self-shading for predators using spatial moment equations. Then, through simulations, we show that in a spatial context self-shading leads to relationships between predator-prey ecology and the predator's attack rate that are not expected in a non-spatial context. Some relationships are analogous to relationships already shown for host-pathogen interactions, but others represent new trait dimensions. Finally, since understanding the effects of ecology using existing self-shading theory requires simplifications of the emergent spatial structure that do not apply well here, we also develop metrics describing the complex spatial structure of the predator and prey populations to help us explain the evolutionary effect of predator and prey ecology in the context of self-shading. The identification of these metrics may provide a step towards expansion of the predictive domain of self-shading theory to more complex spatial dynamics. Copyright © 2013 Elsevier Inc. All rights reserved.

  4. Higher rates of sex evolve in spatially heterogeneous environments.

    Science.gov (United States)

    Becks, Lutz; Agrawal, Aneil F

    2010-11-04

    The evolution and maintenance of sexual reproduction has puzzled biologists for decades. Although this field is rich in hypotheses, experimental evidence is scarce. Some important experiments have demonstrated differences in evolutionary rates between sexual and asexual populations; other experiments have documented evolutionary changes in phenomena related to genetic mixing, such as recombination and selfing. However, direct experiments of the evolution of sex within populations are extremely rare (but see ref. 12). Here we use the rotifer, Brachionus calyciflorus, which is capable of both sexual and asexual reproduction, to test recent theory predicting that there is more opportunity for sex to evolve in spatially heterogeneous environments. Replicated experimental populations of rotifers were maintained in homogeneous environments, composed of either high- or low-quality food habitats, or in heterogeneous environments that consisted of a mix of the two habitats. For populations maintained in either type of homogeneous environment, the rate of sex evolves rapidly towards zero. In contrast, higher rates of sex evolve in populations experiencing spatially heterogeneous environments. The data indicate that the higher level of sex observed under heterogeneity is not due to sex being less costly or selection against sex being less efficient; rather sex is sufficiently advantageous in heterogeneous environments to overwhelm its inherent costs. Counter to some alternative theories for the evolution of sex, there is no evidence that genetic drift plays any part in the evolution of sex in these populations.

  5. Enabling Higher Data Rates for Planetary Science Missions

    Science.gov (United States)

    Deutsch, L. J.; Townes, S. A.; Lazio, J.; Bell, D. J.; Chahat, N. E.; Kovalik, J. M.; Kuperman, I.; Sauder, J.; Liebrecht, P. E.

    2017-12-01

    The data rate from deep space spacecraft has increased by more than 10 orders of magnitude since the first lunar missions in the 1960s. The demand for increased data rates has stemmed from the increasing sophistication of the science questions being addressed and the concomitant increase in the complexity of the missions themselves (from fly-by to orbit to land and rove). Projections for the next few decades suggest the demand for data rates for deep space missions will continue to increase by approximately one order of magnitude every decade, driven by these same factors. Achieving higher data rates requires a partnership between the spacecraft and the ground system. We describe a series of technology developments for flight telecommunications systems, both at radio frequency (RF) and optical, to enable spacecraft to transmit and receive larger data volumes. These technology developments include deployable high gain antennas for small spacecraft, re-programmable software-defined radios, and optical communication packages designed for CubeSat form factors. The intent is that these developments would provide enhancements in capability for both spacecraft-Earth and spacecraft-spacecraft telecommunications. We also describe the future planning for NASA's Deep Space Network (DSN), which remains the prime conduit for data from all planetary science missions. Through a combination of new antennas and backends being installed over the next five years and incorporation of optical communications, the DSN aims to ensure that the historical improvements in data rates and volumes will continue for many decades. Part of this research was carried out at the Jet Propulsion Laboratory, California Institute of Technology, under a contract with the National Aeronautics and Space Administration.

  6. Reduction Rates for Higher Americium Oxidation States in Nitric Acid

    Energy Technology Data Exchange (ETDEWEB)

    Grimes, Travis Shane [Idaho National Lab. (INL), Idaho Falls, ID (United States); Mincher, Bruce Jay [Idaho National Lab. (INL), Idaho Falls, ID (United States); Schmitt, Nicholas C [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2015-09-30

    The stability of hexavalent americium was measured using multiple americium concentrations and nitric acid concentrations after contact with the strong oxidant sodium bismuthate. Contrary to our hypotheses Am(VI) was not reduced faster at higher americium concentrations, and the reduction was only zero-order at short time scales. Attempts to model the reduction kinetics using zero order kinetic models showed Am(VI) reduction in nitric acid is more complex than the autoreduction processes reported by others in perchloric acid. The classical zero-order reduction of Am(VI) was found here only for short times on the order of a few hours. We did show that the rate of Am(V) production was less than the rate of Am(VI) reduction, indicating that some Am(VI) undergoes two electron-reduction to Am(IV). We also monitored the Am(VI) reduction in contact with the organic diluent dodecane. A direct comparison of these results with those in the absence of the organic diluent showed the reduction rates for Am(VI) were not statistically different for both systems. Additional americium oxidations conducted in the presence of Ce(IV)/Ce(III) ions showed that Am(VI) is reduced without the typical growth of Am(V) observed in the systems sans Ce ion. This was an interesting result which suggests a potential new reduction/oxidation pathway for Am in the presence of Ce; however, these results were very preliminary, and will require additional experiments to understand the mechanism by which this occurs. Overall, these studies have shown that hexavalent americium is fundamentally stable enough in nitric acid to run a separations process. However, the complicated nature of the reduction pathways based on the system components is far from being rigorously understood.

  7. Social motivation in prospective memory: higher importance ratings and reported performance rates for social tasks.

    Science.gov (United States)

    Penningroth, Suzanna L; Scott, Walter D; Freuen, Margaret

    2011-03-01

    Few studies have addressed social motivation in prospective memory (PM). In a pilot study and two main studies, we examined whether social PM tasks possess a motivational advantage over nonsocial PM tasks. In the pilot study and Study 1, participants listed their real-life important and less important PM tasks. Independent raters categorized the PM tasks as social or nonsocial. Results from both studies showed a higher proportion of tasks rated as social when important tasks were requested than when less important tasks were requested. In Study 1, participants also reported whether they had remembered to perform each PM task. Reported performance rates were higher for tasks rated as social than for those rated as nonsocial. Finally, in Study 2, participants rated the importance of two hypothetical PM tasks, one social and one nonsocial. The social PM task was rated higher in importance. Overall, these findings suggest that social PM tasks are viewed as more important than nonsocial PM tasks and they are more likely to be performed. We propose that consideration of the social relevance of PM will lead to a more complete and ecologically valid theoretical description of PM performance. (PsycINFO Database Record (c) 2011 APA, all rights reserved).

  8. Navigating through torpedo attacks and enemy raiders: Merchant shipping and freight rates during World War I

    OpenAIRE

    Klovland, Jan Tore

    2017-01-01

    During World War I ocean freight rates rose to extraordinary levels. Using a new monthly dataset it is shown that freight rates can be well explained by economic activity, commodity prices, war risk and world tonnage in the period 1912 to 1916. In the first two years of the war part of the British merchant eet was directly controlled by the Government but neutral shipping was basically free to operate as normal. In this period neutral shipping accounted for about one third of British impo...

  9. Analysis of turbulent separated flows for the NREL airfoil using anisotropic two-equation models at higher angles of attack

    Energy Technology Data Exchange (ETDEWEB)

    Zhang Shijie [Tsinghua University, Beijing (China). School of Architecture; Yuan Xin; Ye Dajun [Tsinghua University, Beijing (China). Dept. of Thermal Engineering

    2001-07-01

    Numerical simulations of the turbulent flow fields at stall conditions are presented for the NREL (National Renewable Energy Laboratory) S809 airfoil. The flow is modelled as compressible, viscous, steady/unsteady and turbulent. Four two-equation turbulence models (isotropic {kappa}-{epsilon} and q-{omega} models, anisotropic {kappa}-{epsilon} and -{omega} models), are applied to close the Reynolds-averaged Navier-Stokes equations, respectively. The governing equations are integrated in time by a new LU-type implicit scheme. To accurately model the convection terms in the mean-flow and turbulence model equations, a modified fourth-order high resolution MUSCL TVD scheme is incorporated. The large-scale separated flow fields and their losses at the stall and post-stall conditions are analyzed for the NREL S809 airfoil at various angles of attack ({alpha}) from 0 to 70 degrees. The numerical results show excellent to fairly good agreement with the experimental data. The feasibility of the present numerical method and the influence of the four turbulence models are also investigated. (author)

  10. Graduation Rates and the Higher Education Demographic Evolution

    Science.gov (United States)

    Hunsaker, B. Tom; Thomas, Douglas E.

    2013-01-01

    In his 1918 orienting work, The Higher Learning in America, Veblen highlights two primary aims of the higher education institution: (a) scientific and scholarly inquiry, and (b) the instruction of students (Veblen, 1918). As of 2006, this overarching mission remained intact. In contemporary literature, a common measure of the efficacy of the…

  11. ESTIMATING RETURN RATE OF HIGHER EDUCATION FUND IN RUSSIA

    Directory of Open Access Journals (Sweden)

    Semenikhina V. A.

    2014-06-01

    Full Text Available Currently, the Russian government pays great attention to the field of higher and postgraduate education. But in the Russian scientific literature there are gaps related to the effectiveness of the overall evaluation of the higher education sector. The article dwells upon the problem of interregional income spread of the Russian population. Empirical estimator of difference influence accounting for human capital accumulated in Russian regions on wage levels and maximum increase of total wage levels and population income for 2001-2011 is carried out. Higher education, exceeding the influence of accumulated volume of the main funds, has a great influence on income spread in Russian regions. Besides, increase of higher education fund in Russian regions contributes to the population’s wage increase and growth in income, but at the same time it decreases legal wages. Results of the study extend knowledge of the economics of education of the Russian Federation.

  12. Effects of non-invasive vagus nerve stimulation on attack frequency over time and expanded response rates in patients with chronic cluster headache: a post hoc analysis of the randomised, controlled PREVA study.

    Science.gov (United States)

    Gaul, Charly; Magis, Delphine; Liebler, Eric; Straube, Andreas

    2017-12-01

    In the PREVention and Acute treatment of chronic cluster headache (PREVA) study, attack frequency reductions from baseline were significantly more pronounced with non-invasive vagus nerve stimulation plus standard of care (nVNS + SoC) than with SoC alone. Given the intensely painful and frequent nature of chronic cluster headache attacks, additional patient-centric outcomes, including the time to and level of therapeutic response, were evaluated in a post hoc analysis of the PREVA study. After a 2-week baseline phase, 97 patients with chronic cluster headache entered a 4-week randomised phase to receive nVNS + SoC (n = 48) or SoC alone (n = 49). All 92 patients who continued into a 4-week extension phase received nVNS + SoC. Compared with SoC alone, nVNS + SoC led to a significantly lower mean weekly attack frequency by week 2 of the randomised phase; the attack frequency remained significantly lower in the nVNS + SoC group through week 3 of the extension phase (P cluster headache attack frequency within 2 weeks after its addition to SoC and was associated with significantly higher ≥25%, ≥50%, and ≥75% response rates than SoC alone. The rapid decrease in weekly attack frequency justifies a 4-week trial period to identify responders to nVNS, with a high degree of confidence, among patients with chronic cluster headache.

  13. Emotional Competence and Drop-Out Rates in Higher Education

    Science.gov (United States)

    Kingston, Emma

    2008-01-01

    Purpose: The purpose of this paper is to compare the emotional competence of first year undergraduates enrolled on a high or low drop-out rate (HDR and LDR, respectively) course, at a newly established university within the UK. Design/methodology/approach: A mixed methods approach using both quantitative and qualitative data collection methods was…

  14. Student Ratings of Instruction in Turkish Higher Education

    Directory of Open Access Journals (Sweden)

    Nehir Sert

    2013-05-01

    Full Text Available The end-of-term student evaluations have a twofold purpose: to provide information for administrators to make personnel decisions, and to help instructors to improve the quality of their teaching. The aim of this study is to investigate the ‘utility’ of the Student Ratings of Instruction (SRI. To that end, the concerns of the administrators, instructors and students regarding the use of the SRI in formative and summative evaluations are questioned. This study also investigates possible variables associated with the SRI: 1 what are the differences in ratings among the below-average, average and the above-average students? and 2 what is the correlation between the students’ grades and ratings? The participants of the study consisted of 5 administrators, 17 instructors and 292 students from the faculty of education of a foundation university in Ankara. A triangulation of quantitative and qualitative methods was adopted. In the first phase, causal comparative and correlation research methods were implemented. In the second phase, qualitative data were collected through semi-structured interviews. The results revealed that there was no significant difference in the SRI among the below-average, average and above-average students. The correlation between the student grades and the SRI was significant at a low level. The SRI were reportedly utilised to make teaching more effective and to make decisions when employing part-time personnel only. The permanent personnel were not affected by the SRI. Suggestions have been put forward to verify the usefulness of SRI.

  15. Low and declining attack rates of imported typhoid fever in the Netherlands 1997-2014, in spite of a restricted vaccination policy

    NARCIS (Netherlands)

    Suryapranata, F. S. T.; Prins, M. [= Maria; Sonder, G. J. B.

    2016-01-01

    Typhoid fever mainly occurs in (sub) tropical regions where sanitary conditions remain poor. In other regions it occurs mainly among returning travelers or their direct contacts. The aim of this study was to evaluate the current Dutch guidelines for typhoid vaccination. Crude annual attack rates

  16. Expensive Brains: “Brainy” Rodents have Higher Metabolic Rate

    Science.gov (United States)

    Sobrero, Raúl; May-Collado, Laura J.; Agnarsson, Ingi; Hernández, Cristián E.

    2011-01-01

    Brains are the centers of the nervous system of animals, controlling the organ systems of the body and coordinating responses to changes in the ecological and social environment. The evolution of traits that correlate with cognitive ability, such as relative brain size is thus of broad interest. Brain mass relative to body mass (BM) varies among mammals, and diverse factors have been proposed to explain this variation. A recent study provided evidence that energetics play an important role in brain evolution (Isler and van Schaik, 2006). Using composite phylogenies and data drawn from multiple sources, these authors showed that basal metabolic rate (BMR) correlates with brain mass across mammals. However, no such relationship was found within rodents. Here we re-examined the relationship between BMR and brain mass within Rodentia using a novel species-level phylogeny. Our results are sensitive to parameter evaluation; in particular how species mass is estimated. We detect no pattern when applying an approach used by previous studies, where each species BM is represented by two different numbers, one being the individual that happened to be used for BMR estimates of that species. However, this approach may compromise the analysis. When using a single value of BM for each species, whether representing a single individual, or available species mean, our findings provide evidence that brain mass (independent of BM) and BMR are correlated. These findings are thus consistent with the hypothesis that large brains evolve when the payoff for increased brain mass is greater than the energetic cost they incur. PMID:21811456

  17. Investigating Effect of Olfactory Stimulation by Vanilla on the Rate of Apnea Attacks in Neonates with Apnea of Prematurity: A Randomized Clinical Trial

    Directory of Open Access Journals (Sweden)

    Sakineh Yaghoubi

    2017-12-01

    Full Text Available Background Apnea of prematurity (AOP is a developmental disorder that affects the premature newborns frequently. One of the new non-drug methods for controlling apnea attacks is olfactory stimulation. The aim of this study was to determine the effect of olfactory stimulation by vanilla on the rate of apnea attacks in neonates with AOP. Materials and Methods: This study is a single-blind randomized clinical trial study. The study samples included a total of 40 premature neonates with AOP who were admitted to the neonatal Intensive care unit (NICU of Shahid Sadoughi hospital in Yazd, Iran, in 2016 and were assigned randomly in experimental (n=20, and control (n=20 groups. The experimental group was exposed to cotton impregnated with 2ml of vanillin extractfor 24 hours. The number of apnea attacks, heart rate, and arterial oxygen saturation (SaO2 level were measured before, during and after intervention for three consecutive days. Data analysis was performed using statistical analysis in SPSS version 22.0 software. Results: The results showed that there was no significant difference between the two groups in terms of mean number of apnea attacks (p>0.05. However, there was a significant difference between in the experimental group on the first day (2.84 ± 1.25, and second day (1.63 ± 1.01 in terms of the mean number of attacks. Also, there was a significant difference between the mean heart rate and SaO2 level in both the experimental and control groups (p

  18. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants....

  19. Heart Attack

    Science.gov (United States)

    ... properly causes your body's blood sugar levels to rise, increasing your risk of heart attack. Metabolic syndrome. This occurs when you have obesity, high blood pressure and high blood sugar. Having metabolic ...

  20. Heart Attack

    Science.gov (United States)

    ... family history of heart attack race – African Americans, Mexican Americans, Native Americans, and native Hawaiians are at ... Your doctor will prescribe the medicines that are right for you. If you have had a heart ...

  1. In Vitro Fertilization Using Luteinizing Hormone-Releasing Hormone Injections Resulted in Healthy Triplets without Increased Attack Rates in a Hereditary Angioedema Case

    Directory of Open Access Journals (Sweden)

    Ceyda Tunakan Dalgıç

    2018-01-01

    Full Text Available Hereditary angioedema due to C1-inhibitor deficiency (C1-INH-HAE is a rare, autosomal dominant disorder. The management of pregnant patients with C1-INH-HAE is a challenge for the physician. Intravenous plasma-derived nanofiltered C1-INH (pdC1INH is the only recommended option throughout pregnancy, postpartum, and breastfeeding period. In order to increase pregnancy rates, physicians use fertilization therapies increasing endogen levels of estrogens. Therefore, these techniques can provoke an increase in the number and severity of edema attacks in C1-INH-HAE. Our patient is a 32-year-old female, diagnosed with C1-INH-HAE type 1 since 2004. She had been taking danazol 50–200 mg/day for 9 years. Due to her pregnancy plans in 2013, danazol was discontinued. PdC1INH was prescribed regularly for prophylactic purpose. Triplet pregnancy occurred by in vitro fertilization using luteinizing hormone-releasing hormone (LHRH injections. In our patient, LHRH injections were done four times without causing any severe attack during in vitro fertilization. Angioedema did not worsen during pregnancy and delivery due to the prophylactic use of intravenous pdC1INH in our patient. According to the attack frequency and severity, there was no difference between the three pregnancy trimesters. To our knowledge, this is the first published case of C1-INH-HAE receiving in vitro fertilization therapies without any angioedema attacks during pregnancy and delivery and eventually having healthy triplets with the prophylactic use of intravenous pdC1INH.

  2. Accurately Identifying New QoS Violation Driven by High-Distributed Low-Rate Denial of Service Attacks Based on Multiple Observed Features

    Directory of Open Access Journals (Sweden)

    Jian Kang

    2015-01-01

    Full Text Available We propose using multiple observed features of network traffic to identify new high-distributed low-rate quality of services (QoS violation so that detection accuracy may be further improved. For the multiple observed features, we choose F feature in TCP packet header as a microscopic feature and, P feature and D feature of network traffic as macroscopic features. Based on these features, we establish multistream fused hidden Markov model (MF-HMM to detect stealthy low-rate denial of service (LDoS attacks hidden in legitimate network background traffic. In addition, the threshold value is dynamically adjusted by using Kaufman algorithm. Our experiments show that the additive effect of combining multiple features effectively reduces the false-positive rate. The average detection rate of MF-HMM results in a significant 23.39% and 44.64% improvement over typical power spectrum density (PSD algorithm and nonparametric cumulative sum (CUSUM algorithm.

  3. Implementation of Telephone-Based Secondary Preventive Intervention after Stroke and Transient Ischemic Attack - Participation Rate, Reasons for Nonparticipation and One-Year Mortality

    Directory of Open Access Journals (Sweden)

    Anna-Lotta Irewall

    2014-02-01

    Full Text Available Background and Purpose: Patients who experience a stroke or transient ischemic attack (TIA are known to be at high risk of subsequent vascular events, underscoring the need for secondary preventive intervention. However, previous studies have indicated insufficiency in the implementation of secondary prevention, emphasizing the need to develop effective methods of follow-up. In the present study, we examined the potential of implementing a telephone-based, nurse-led, secondary preventive follow-up in stroke and TIA patients on a population level by analyzing the participation rate, reasons for nonparticipation, and one-year mortality. Methods: Between January 1, 2010 and December 31, 2011, all patients admitted to Östersund hospital, Sweden, and diagnosed with either stroke or TIA were considered for inclusion into the secondary preventive follow-up. Baseline data were collected at the hospital, and reasons for nonparticipation were documented. Multivariate logistic regression was performed to identify predictors of the patient decision not to participate and to explore independent associations between baseline characteristics and exclusion. A one-year follow-up of mortality was also performed; the survival functions of the three groups (included, excluded, declining participation was calculated using the Kaplan-Meier estimator. Results: From a total of 810 identified patients, 430 (53.1% were included in the secondary preventive follow-up, 289 (35.7% were excluded mainly due to physical or cognitive disability, and 91 (11.2% declined participation. Age ≥85 years, ischemic and hemorrhagic stroke, modified Rankin scale score >3, body mass index ≥25, congestive heart failure, and lower education level were independently associated with exclusion, whereas lower education level was the only factor independently associated with the patient decision not to participate. Exclusion was associated with a more than 12 times higher risk of mortality

  4. First-Ever Stroke and Transient Ischemic Attack Incidence and 30-Day Case-Fatality Rates in a Population-Based Study in Argentina

    DEFF Research Database (Denmark)

    Bahit, M Cecilia; Coppola, Mariano L; Riccio, Patricia M

    2016-01-01

    BACKGROUND AND PURPOSE: Epidemiological data about stroke are scarce in low- and middle-income Latin-American countries. We investigated annual incidence of first-ever stroke and transient ischemic attack (TIA) and 30-day case-fatality rates in a population-based setting in Tandil, Argentina....... METHODS: We prospectively identified all first-ever stroke and TIA cases from overlapping sources between January 5, 2013, and April 30, 2015, in Tandil, Argentina. We calculated crude and standardized incidence rates. We estimated 30-day case-fatality rates. RESULTS: We identified 334 first-ever strokes.......1% (95% CI, 14.2-36.6) for intracerebral hemorrhage, and 1.9% (95% CI, 0.4-5.8) for TIA. CONCLUSIONS: This study provides the first prospective population-based stroke and TIA incidence and case-fatality estimate in Argentina. First-ever stroke incidence was lower than that reported in previous Latin...

  5. Enhancing Brain Lesions during Acute Optic Neuritis and/or Longitudinally Extensive Transverse Myelitis May Portend a Higher Relapse Rate in Neuromyelitis Optica Spectrum Disorders.

    Science.gov (United States)

    Orman, G; Wang, K Y; Pekcevik, Y; Thompson, C B; Mealy, M; Levy, M; Izbudak, I

    2017-05-01

    Neuromyelitis optica spectrum disorders are inflammatory demyelinating disorders with optic neuritis and/or longitudinally extensive transverse myelitis episodes. We now know that neuromyelitis optica spectrum disorders are associated with antibodies to aquaporin-4, which are highly concentrated on astrocytic end-feet at the blood-brain barrier. Immune-mediated disruption of the blood-brain barrier may manifest as contrast enhancement on brain MR imaging. We aimed to delineate the extent and frequency of contrast enhancement on brain MR imaging within 1 month of optic neuritis and/or longitudinally extensive transverse myelitis attacks and to correlate contrast enhancement with outcome measures. Brain MRIs of patients with neuromyelitis optica spectrum disorders were evaluated for patterns of contrast enhancement (periependymal, cloudlike, leptomeningeal, and so forth). The Fisher exact test was used to evaluate differences between the proportion of contrast enhancement in patients who were seropositive and seronegative for aquaporin-4 antibodies. The Mann-Whitney test was used to compare the annualized relapse rate and disease duration between patients with and without contrast enhancement and with and without seropositivity. Brain MRIs of 77 patients were evaluated; 59 patients (10 males, 49 females) were scanned within 1 month of optic neuritis and/or longitudinally extensive transverse myelitis attacks and were included in the analysis. Forty-eight patients were seropositive, 9 were seronegative, and 2 were not tested for aquaporin-4 antibodies. Having brain contrast enhancement of any type during an acute attack was significantly associated with higher annualized relapse rates ( P = .03) and marginally associated with shorter disease duration ( P = .05). Having periependymal contrast enhancement was significantly associated with higher annualized relapse rates ( P = .03). Brain MRIs of patients with neuromyelitis optica spectrum disorders with contrast

  6. Estimating infection attack rates and severity in real time during an influenza pandemic: analysis of serial cross-sectional serologic surveillance data.

    Directory of Open Access Journals (Sweden)

    Joseph T Wu

    2011-10-01

    Full Text Available In an emerging influenza pandemic, estimating severity (the probability of a severe outcome, such as hospitalization, if infected is a public health priority. As many influenza infections are subclinical, sero-surveillance is needed to allow reliable real-time estimates of infection attack rate (IAR and severity.We tested 14,766 sera collected during the first wave of the 2009 pandemic in Hong Kong using viral microneutralization. We estimated IAR and infection-hospitalization probability (IHP from the serial cross-sectional serologic data and hospitalization data. Had our serologic data been available weekly in real time, we would have obtained reliable IHP estimates 1 wk after, 1-2 wk before, and 3 wk after epidemic peak for individuals aged 5-14 y, 15-29 y, and 30-59 y. The ratio of IAR to pre-existing seroprevalence, which decreased with age, was a major determinant for the timeliness of reliable estimates. If we began sero-surveillance 3 wk after community transmission was confirmed, with 150, 350, and 500 specimens per week for individuals aged 5-14 y, 15-19 y, and 20-29 y, respectively, we would have obtained reliable IHP estimates for these age groups 4 wk before the peak. For 30-59 y olds, even 800 specimens per week would not have generated reliable estimates until the peak because the ratio of IAR to pre-existing seroprevalence for this age group was low. The performance of serial cross-sectional sero-surveillance substantially deteriorates if test specificity is not near 100% or pre-existing seroprevalence is not near zero. These potential limitations could be mitigated by choosing a higher titer cutoff for seropositivity. If the epidemic doubling time is longer than 6 d, then serial cross-sectional sero-surveillance with 300 specimens per week would yield reliable estimates when IAR reaches around 6%-10%.Serial cross-sectional serologic data together with clinical surveillance data can allow reliable real-time estimates of IAR and

  7. United States private schools have higher rates of exemptions to school immunization requirements than public schools.

    Science.gov (United States)

    Shaw, Jana; Tserenpuntsag, Boldtsetseg; McNutt, Louise-Anne; Halsey, Neal

    2014-07-01

    To compare medical, religious, and personal belief immunization exemption rates between private and public schools in US. Exemption rates were calculated using the Centers for Disease Control and Prevention School Immunization Assessment Surveys for the 2009-2010 school year excluding states with incomplete survey data. Standardized exemption rates weighted on enrollments in public and private schools were calculated. Differences in exemption rates between public and private schools were tested using Wilcoxon signed rank test. The overall state exemption rate was higher in US private than public schools, 4.25% (SD 4.27) vs 1.91% (1.67), P = .0001 and private schools had higher exemption rates for all types of exemptions; medical 0.58% (0.71) vs 0.34% (0.34) respectively (P = .0004), religious 2.09% (3.14) vs 0.83% (1.05) respectively (P = .0001), and personal belief 6.10% (4.12) vs 2.79% (1.57), respectively (P = .006). Overall exemption rates were significantly higher in states that allowed personal belief exemptions. Exemption rates were significantly higher in US private than in public schools. Children attending private schools may be at higher risk of vaccine-preventable diseases than public school children. Copyright © 2014 Elsevier Inc. All rights reserved.

  8. Fusion of Heterogeneous Intrusion Detection Systems for Network Attack Detection

    Directory of Open Access Journals (Sweden)

    Jayakumar Kaliappan

    2015-01-01

    Full Text Available An intrusion detection system (IDS helps to identify different types of attacks in general, and the detection rate will be higher for some specific category of attacks. This paper is designed on the idea that each IDS is efficient in detecting a specific type of attack. In proposed Multiple IDS Unit (MIU, there are five IDS units, and each IDS follows a unique algorithm to detect attacks. The feature selection is done with the help of genetic algorithm. The selected features of the input traffic are passed on to the MIU for processing. The decision from each IDS is termed as local decision. The fusion unit inside the MIU processes all the local decisions with the help of majority voting rule and makes the final decision. The proposed system shows a very good improvement in detection rate and reduces the false alarm rate.

  9. Bound Maxima as a Traffic Feature under DDOS Flood Attacks

    Directory of Open Access Journals (Sweden)

    Jie Xue

    2012-01-01

    Full Text Available This paper gives a novel traffic feature for identifying abnormal variation of traffic under DDOS flood attacks. It is the histogram of the maxima of the bounded traffic rate on an interval-by-interval basis. We use it to experiment on the traffic data provided by MIT Lincoln Laboratory under Defense Advanced Research Projects Agency (DARPA in 1999. The experimental results profitably enhance the evidences that traffic rate under DDOS attacks is statistically higher than that of normal traffic considerably. They show that the pattern of the histogram of the maxima of bounded rate of attack-contained traffic greatly differs from that of attack-free traffic. Besides, the present traffic feature is simple in mathematics and easy to use in practice.

  10. A higher chest compression rate may be necessary for metronome-guided cardiopulmonary resuscitation.

    Science.gov (United States)

    Chung, Tae Nyoung; Kim, Sun Wook; You, Je Sung; Cho, Young Soon; Chung, Sung Phil; Park, Incheol

    2012-01-01

    Metronome guidance is a simple and economical feedback system for guiding cardiopulmonary resuscitation (CPR). However, a recent study showed that metronome guidance reduced the depth of chest compression. The results of previous studies suggest that a higher chest compression rate is associated with a better CPR outcome as compared with a lower chest compression rate, irrespective of metronome use. Based on this finding, we hypothesized that a lower chest compression rate promotes a reduction in chest compression depth in the recent study rather than metronome use itself. One minute of chest compression-only CPR was performed following the metronome sound played at 1 of 4 different rates: 80, 100, 120, and 140 ticks/min. Average compression depths (ACDs) and duty cycles were compared using repeated measures analysis of variance, and the values in the absence and presence of metronome guidance were compared. Both the ACD and duty cycle increased when the metronome rate increased (P = .017, metronome rates of 80 and 100 ticks/min were significantly lower than those for the procedures without metronome guidance. The ACD and duty cyle for chest compression increase as the metronome rate increases during metronome-guided CPR. A higher rate of chest compression is necessary for metronome-guided CPR to prevent suboptimal quality of chest compression. Copyright © 2012 Elsevier Inc. All rights reserved.

  11. Vastus Lateralis Motor Unit Firing Rate Is Higher in Women With Patellofemoral Pain.

    Science.gov (United States)

    Gallina, Alessio; Hunt, Michael A; Hodges, Paul W; Garland, S Jayne

    2018-05-01

    To compare neural drive, determined from motor unit firing rate, in the vastus medialis and lateralis in women with and without patellofemoral pain. Cross-sectional study. University research laboratory. Women (N=56) 19 to 35 years of age, including 36 with patellofemoral pain and 20 controls. Not applicable. Participants sustained an isometric knee extension contraction at 10% of their maximal voluntary effort for 70 seconds. Motor units (N=414) were identified using high-density surface electromyography. Average firing rate was calculated between 5 and 35 seconds after recruitment for each motor unit. Initial firing rate was the inverse of the first 3 motor unit interspike intervals. In control participants, vastus medialis motor units discharged at higher rates than vastus lateralis motor units (P=.001). This was not observed in women with patellofemoral pain (P=.78) because of a higher discharge rate of vastus lateralis compared with control participants (P=.002). No between-group differences were observed for vastus medialis (P=.93). Similar results were obtained for the initial motor unit firing rate. These findings suggest that women with patellofemoral pain have a higher neural drive to vastus lateralis but not vastus medialis, which may be a contributor of the altered patellar kinematics observed in some studies. The different neural drive may be an adaptation to patellofemoral pain, possibly to compensate for decreased quadriceps force production, or a precursor of patellofemoral pain. Copyright © 2018 American Congress of Rehabilitation Medicine. Published by Elsevier Inc. All rights reserved.

  12. Does the Economic Crisis Have an Influence on the Higher Education Dropout Rate?

    Science.gov (United States)

    Leão Fernandes, Graça; Chagas Lopes, Margarida

    2016-01-01

    This research aims to identify the effects of the economic crisis on higher education (HE) dropout rates at Lisbon School of Economics and Management (ISEG)--Universidade de Lisboa, after having controlled for individual characteristics, family background, High School and HE trajectories. Our main hypothesis is that the economic crisis induces…

  13. Will ageing lead to a higher real exchange rate for the Netherlands?

    NARCIS (Netherlands)

    van Ewijk, C.; Volkerink, M.

    2012-01-01

    Long term projections for the Netherlands indicate that demand for nontradables—e.g. health care services—will increase relative to supply due to population ageing. If this leads to higher future real exchanges rates this will erode the return of the savings currently made to prepare for ageing.

  14. Will ageing lead to a higher real exchange rate for the Netherlands?

    NARCIS (Netherlands)

    van Ewijk, C.; Volkerink, M.

    2011-01-01

    Long-term projections for the Netherlands indicate that demand for nontradables - e.g. health care services - will increase relative to supply due to population ageing. If this leads to higher future real exchanges rates this will erode the return of the savings currently made to prepare for ageing.

  15. Why do younger women have higher breast cancer recurrence rates after breast-conserving surgery?

    International Nuclear Information System (INIS)

    Nishimura, Reiki; Matsuda, Masakazu; Miyayama, Haruhiko; Okazaki, Shinji; Kai, Chiharu; Ozaki, N.

    2003-01-01

    Preventing breast cancer recurrence after breast-conserving surgery is an important issue. The main factors contributing to such recurrence are positive margins, absence of radiotherapy and young age. To investigate the clinical significance of age in breast-conserving surgery, we examined the relationship between clinicopathological findings or outcome and age, especially young age. The cases were divided into three groups by age; 35 years old or less, 36-50y.o. and 51y.o. or higher. Between April 1989 and March 2003, 743 patients were treated with breast-conserving surgery. There were 49 patients aged 35 years old or less (6.6%). Younger age significantly correlated with positive surgical margin, lymph node metastases, higher proliferative activity, negative estrogen receptor (ER) or progesterone receptor (PgR), larger tumor size, and shorter nipple-tumor distances. Although younger patients had a higher recurrence rate irrespective of radiotherapy, margin status had an impact on recurrence rate. Thus, the reason young age was a significant factor for breast recurrence after breast-conserving surgery was that young patients frequently had numerous risk factors such as positive margin, higher proliferative activity, positive nodes, negative ER/PgR and larger tumor. However, negative surgical margins could reduce recurrence rates even in young women. These results suggest that more suitable criteria and strategies may be needed for young patients with breast cancer. (author)

  16. Fatores que influenciam o ataque de mosca-branca em jiloeiro Factors affecting attack rate of the whitefly on Solanum gilo

    Directory of Open Access Journals (Sweden)

    Germano Leão Demolin Leite

    2002-07-01

    Full Text Available Este trabalho objetivou determinar os efeitos de pluviosidade e temperatura, predadores e parasitóides, dossel e idade das plantas, tipos e densidades de tricomas foliares, compostos químicos foliares, níveis de N e de K foliares, sobre a intensidade de ataque de mosca-branca Bemisia tabaci (Hemiptera: Aleyrodidae em jiloeiro Solanum gilo var. 'Gigante Portuguesa'. As densidades de ninfas e de adultos de B. tabaci foram maiores nas folhas baixeiras do que nas apicais das plantas de jiloeiro. Com o aumento da temperatura do ar, observou-se incremento na densidade de adultos de B. tabaci nas folhas de jiloeiro.The objective of this study was to determine the effect of rainfall and temperature, predators and parasitoids, height within the canopy and plant age, chemical composition of leaves, levels of nitrogen and potassium in leaves and density of trichomes in leaves, on attack intensity of the whitefly Bemisia tabaci (Hemiptera: Aleyrodidae on Solanum gilo var. 'Portuguese giant'. Densities of nymphs and of adults of B. tabaci were higher on leaves of the lower part than on those of the apical parts of plants of S. gilo. The number of adults of B. tabaci on leaves of S. gilo increased with temperature.

  17. Heart Attack Recovery FAQs

    Science.gov (United States)

    ... recommendations to make a full recovery. View an animation of a heart attack . Heart Attack Recovery Questions ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  18. Calm Merino ewes have a higher ovulation rate and more multiple pregnancies than nervous ewes.

    Science.gov (United States)

    van Lier, E; Hart, K W; Viñoles, C; Paganoni, B; Blache, D

    2017-07-01

    In 1990, two selection lines of Merino sheep were established for low and high behavioural reactivity (calm and nervous temperament) at the University of Western Australia. Breeding records consistently showed that calm ewes weaned 10% to 19% more lambs than the nervous ewes. We hypothesise that calm ewes could have a higher ovulation rate than nervous ewes and/or calm ewes could have a lower rate of embryo mortality than nervous ewes. We tested these hypotheses by comparing the ovulation rate and the rate of embryo mortality between the calm and nervous lines before and after synchronisation and artificial insemination. Merino ewes from the temperament selection lines (calm, n=100; nervous, n=100) were synchronised (early breeding season) for artificial insemination (day 0) (intravaginal sponges containing fluogestone acetate and eCG immediately after sponge withdrawal). On day-17 and 11 ovarian cyclicity and corpora lutea, and on days 30 and 74 pregnancies and embryos/foetuses were determined by ultrasound. Progesterone, insulin and leptin concentrations were determined in blood plasma samples from days 5, 12 and 17. Ovarian cyclicity before and after oestrus synchronisation did not differ between the lines, but ovulation rate did (day-17: calm 1.63; nervous 1.26; Pewes was higher than on day-17. Loss of embryos by day 30 was high (calm: 71/150; nervous: 68/130); but nervous ewes had a lower proportion (15/47) of multiple pregnancies compared with calm ewes (30/46; Pewes had higher insulin (32.0 pmol/l±1.17 SEM; P=0.013) and lower leptin (1.18 μg/l±0.04 SEM; P=0.002) concentrations than calm ewes (insulin: 27.8 pmol/l±1.17 SEM; leptin: 1.35 μg/l±0.04 SEM). The differences in reproductive outcomes between the calm and nervous ewes were mainly due to a higher ovulation rate in calm ewes. We suggest that reproduction in nervous ewes is compromised by factors leading up to ovulation and conception, or the uterine environment during early pregnancy, that reflect

  19. Splenectomy is associated with higher infection and pneumonia rates among trauma laparotomy patients.

    Science.gov (United States)

    Fair, Kelly A; Connelly, Christopher R; Hart, Kyle D; Schreiber, Martin A; Watters, Jennifer M

    2017-05-01

    Splenectomy increases lifetime risk of thromboembolism (VTE) and is associated with long-term infectious complications, primarily, overwhelming post-splenectomy infection (OPSI). Our objective was to evaluate risk of VTE and infection at index hospitalization post-splenectomy. Retrospective review of all patients who received a laparotomy in the NTDB. Propensity score matching for splenectomy was performed, based on ISS, abdominal abbreviated injury score >3, GCS, sex and mechanism. Major complications, VTE, and infection rates were compared. Multiple logistic regression models were utilized to evaluate splenectomy-associated complications. 93,221 laparotomies were performed and 17% underwent splenectomy. Multiple logistic regression models did not demonstrate an association between splenectomy and major complications (OR 0.96, 95% CI 0.91-1.03, p = 0.25) or VTE (OR 1.05, 95% CI 0.96-1.14, p = 0.33). Splenectomy was independently associated with infection (OR 1.07, 95% CI 1.00-1.14, p = 0.045). Subgroup analysis of patients with infection demonstrated that splenectomy was most strongly associated with pneumonia (OR 1.41, 95% CI 1.26-1.57, p Splenectomy is not associated with higher overall complication or VTE rates during index hospitalization. However, splenectomy is associated with a higher rate of pneumonia. Copyright © 2017 Elsevier Inc. All rights reserved.

  20. With age a lower individual breathing reserve is associated with a higher maximal heart rate.

    Science.gov (United States)

    Burtscher, Martin; Gatterer, Hannes; Faulhaber, Martin; Burtscher, Johannes

    2018-01-01

    Maximal heart rate (HRmax) is linearly declining with increasing age. Regular exercise training is supposed to partly prevent this decline, whereas sex and habitual physical activity do not. High exercise capacity is associated with a high cardiac output (HR x stroke volume) and high ventilatory requirements. Due to the close cardiorespiratory coupling, we hypothesized that the individual ventilatory response to maximal exercise might be associated with the age-related HRmax. Retrospective analyses have been conducted on the results of 129 consecutively performed routine cardiopulmonary exercise tests. The study sample comprised healthy subjects of both sexes of a broad range of age (20-86 years). Maximal values of power output, minute ventilation, oxygen uptake and heart rate were assessed by the use of incremental cycle spiroergometry. Linear multivariate regression analysis revealed that in addition to age the individual breathing reserve at maximal exercise was independently predictive for HRmax. A lower breathing reserve due to a high ventilatory demand and/or a low ventilatory capacity, which is more pronounced at a higher age, was associated with higher HRmax. Age explained the observed variance in HRmax by 72% and was improved to 83% when the variable "breathing reserve" was entered. The presented findings indicate an independent association between the breathing reserve at maximal exercise and maximal heart rate, i.e. a low individual breathing reserve is associated with a higher age-related HRmax. A deeper understanding of this association has to be investigated in a more physiological scenario. Copyright © 2017 Elsevier B.V. All rights reserved.

  1. New system for higher recovery rate of water borne Cryptosporidium oocysts and Giardia cysts

    DEFF Research Database (Denmark)

    Al-Sabi, Mohammad Nafi Solaiman; Gad, Jens; Klinting, Mette

    2012-01-01

    Background: The two most common water borne pathogenic protozoa, Cryptosporidium and Giardia, cause diarrhea worldwide. Detecting these parasites in water samples depends on effective parasite recovery from the water matrix. The reported low recovery rates of the currently used filter methods...... motivate the development of systems with higher recovery rates. Materials and methods: Five replicates of IMS purified Cryptosporidium oocysts and Giardia cysts (N=2x103) were injected into a specially coated filter unit with a carefully chosen pore size. Following filtration, sonication was performed...... were 85% were recorded when the filter was sonicated. Sonication usually affects parasite viability but could be tuned into a useful tool for enhanced backwash collection of parasites using a specially constructed filter unit and a sonication protocol. The filtration...

  2. Why the EU-15 Maintains Higher CIT Rates than the New Member States?

    Directory of Open Access Journals (Sweden)

    Karpowicz Andrzej

    2014-11-01

    Full Text Available The European Union is not a homogenous area. This lack of homogeneity extends to taxes, which vary across jurisdictions. On average, Western Europe imposes significantly higher taxes on capital than New Member States, which joined the Community in 2004 and 2007. Often this fact is simply taken for granted. However, there are several arguments that can explain this variance. Although several of these arguments are well known and have been researched, they have not been assessed in combination, or used in a comparative analysis of corporate income tax (CIT rates between EU member states. Because of interest in harmonizing CIT throughout the EU, the roots of divergent CIT is of particular and timely value. Therefore, this article we attempts to demonstrate the differences in CIT rates in the EU-15 and New Member States. In so doing the general characteristics of these country grouping is identified, and then discussed in the context of the taxation theory.

  3. Higher order constraints on the Higgs production rate from fixed-target DIS data

    International Nuclear Information System (INIS)

    Alekhin, S.; Bluemlein, J.; Moch, S.

    2011-01-01

    The constraints of fixed-target DIS data in fits of parton distributions including QCD corrections to next-to-next-to leading order are studied. We point out a potential problem in the analysis of the NMC data which can lead to inconsistencies in the extracted value for α s (M Z ) and the gluon distribution at higher orders in QCD. The implications for predictions of rates for Standard Model Higgs boson production at hadron colliders are investigated. We conclude that the current range of excluded Higgs boson masses at the Tevatron appears to be much too large. (orig.)

  4. Strain rate effects in nuclear steels at room and higher temperatures

    Energy Technology Data Exchange (ETDEWEB)

    Solomos, G. E-mail: george.solomos@jrc.it; Albertini, C.; Labibes, K.; Pizzinato, V.; Viaccoz, B

    2004-04-01

    An investigation of strain rate, temperature and size effects in three nuclear steels has been conducted. The materials are: ferritic steel 20MnMoNi55 (vessel head), austenitic steel X6CrNiNb1810 (upper internal structure), and ferritic steel 26NiCrMo146 (bolting). Smooth cylindrical tensile specimens of three sizes have been tested at strain rates from 0.001 to 300 s{sup -1}, at room and elevated temperatures (400-600 deg. C). Full stress-strain diagrams have been obtained, and additional parameters have been calculated based on them. The results demonstrate a clear influence of temperature, which amounts into reducing substantially mechanical strengths with respect to RT conditions. The effect of strain rate is also shown. It is observed that at RT the strain rate effect causes up shifting of the flow stress curves, whereas at the higher temperatures a mild downshifting of the flow curves is manifested. Size effect tendencies have also been observed. Some implications when assessing the pressure vessel structural integrity under severe accident conditions are considered.

  5. Low and declining attack rates of imported typhoid fever in the Netherlands 1997-2014, in spite of a restricted vaccination policy.

    Science.gov (United States)

    Suryapranata, F S T; Prins, M; Sonder, G J B

    2016-12-01

    Typhoid fever mainly occurs in (sub) tropical regions where sanitary conditions remain poor. In other regions it occurs mainly among returning travelers or their direct contacts. The aim of this study was to evaluate the current Dutch guidelines for typhoid vaccination. Crude annual attack rates (AR) per 100,000 Dutch travelers were calculated during the period 1997 to 2014 by dividing the number of typhoid fever cases by the estimated total number of travelers to a specific country or region. Regions of exposure and possible risk factors were evaluated. During the study period 607 cases of typhoid fever were reported. Most cases were imported from Asia (60%). Almost half of the cases were ethnically related to typhoid risk regions and 37% were cases visiting friends and relatives. The overall ARs for travelers to all regions declined significantly. Countries with the highest ARs were India (29 per 100,000), Indonesia (8 per 100,000), and Morocco (10 per 100,000). There was a significant decline in ARs among travelers to popular travel destinations such as Morocco, Turkey, and Indonesia. ARs among travelers to intermediate-risk areas according to the Dutch guidelines such as Latin America or Sub-Saharan Africa remained very low, despite the restricted vaccination policy for these areas compared to many other guidelines. The overall AR of typhoid fever among travelers returning to the Netherlands is very low and has declined in the past 20 years. The Dutch vaccination policy not to vaccinate short-term travelers to Latin-America, Sub-Saharan Africa, Thailand and Malaysia seems to be justified, because the ARs for these destinations remain very low. These results suggest that further restriction of the Dutch vaccination policy is justified.

  6. Higher Growth Rate of Branch Duct Intraductal Papillary Mucinous Neoplasms Associates With Worrisome Features.

    Science.gov (United States)

    Kolb, Jennifer M; Argiriadi, Pamela; Lee, Karen; Liu, Xiaoyu; Bagiella, Emilia; Lucas, Aimee L; Kim, Michelle Kang; Kumta, Nikhil A; Nagula, Satish; Sarpel, Umut; DiMaio, Christopher J

    2018-03-11

    or invasive cancers. BD-IPMNs that developed worrisome features were associated with a significantly higher rate of growth than lesions with low-risk features. Low risk BD-IPMNs that grow more than 2.5 mm/year might require surveillance. Copyright © 2018 AGA Institute. Published by Elsevier Inc. All rights reserved.

  7. The effects of stress, anxiety, and outdoor temperature on the frequency and severity of Raynaud's attacks: the Raynaud's Treatment Study.

    Science.gov (United States)

    Brown, K M; Middaugh, S J; Haythornthwaite, J A; Bielory, L

    2001-04-01

    It was expected that stress and anxiety would be related to Raynaud's phenomenon (RP) attack characteristics when mild outdoor temperatures produced partial or no digital vasoconstriction. Hypotheses were that in warmer temperature categories, compared to those below 40 degrees F, higher stress or anxiety would be associated with more frequent, severe, and painful attacks. The Raynaud's Treatment Study recruited 313 participants with primary RP. Outcomes were attack rate, severity, and pain. Predictors were average daily outdoor temperature, stress, anxiety, age, gender, and a stress-by-temperature or an anxiety-by-temperature interaction. Outcomes were tested separately in multiple linear regression models. Stress and anxiety were tested in separate models. Stress was not a significant predictor of RP attack characteristics. Higher anxiety was related to more frequent attacks above 60 degrees F. It was also related to greater attack severity at all temperatures, and to greater pain above 60 degrees F and between 40 degrees and 49.9 degrees F.

  8. Rabies Vaccination: Higher Failure Rates in Imported Dogs than in those Vaccinated in Italy.

    Science.gov (United States)

    Rota Nodari, E; Alonso, S; Mancin, M; De Nardi, M; Hudson-Cooke, S; Veggiato, C; Cattoli, G; De Benedictis, P

    2017-03-01

    The current European Union (EU) legislation decrees that pets entering the EU from a rabies-infected third country have to obtain a satisfactory virus-neutralizing antibody level, while those moving within the EU require only rabies vaccination as the risk of moving a rabid pet within the EU is considered negligible. A number of factors driving individual variations in dog vaccine response have been previously reported, including a high rate of vaccine failure in puppies, especially those subject to commercial transport. A total of 21 001 observations collected from dogs (2006-2012) vaccinated in compliance with the current EU regulations were statistically analysed to assess the effect of different risk factors related to rabies vaccine efficacy. Within this framework, we were able to compare the vaccination failure rate in a group of dogs entering the Italian border from EU and non-EU countries to those vaccinated in Italy prior to international travel. Our analysis identified that cross-breeds and two breed categories showed high vaccine success rates, while Beagles and Boxers were the least likely to show a successful response to vaccination (88.82% and 90.32%, respectively). Our analysis revealed diverse performances among the commercially available vaccines, in terms of serological peak windows, and marked differences according to geographical area. Of note, we found a higher vaccine failure rate in imported dogs (13.15%) than in those vaccinated in Italy (5.89%). Our findings suggest that the choice of vaccine may influence the likelihood of an animal achieving a protective serological level and that time from vaccination to sampling should be considered when interpreting serological results. A higher vaccine failure in imported compared to Italian dogs highlights the key role that border controls still have in assessing the full compliance of pet movements with EU legislation to minimize the risk of rabies being reintroduced into a disease-free area.

  9. Does higher income inequality adversely influence infant mortality rates? Reconciling descriptive patterns and recent research findings.

    Science.gov (United States)

    Siddiqi, Arjumand; Jones, Marcella K; Erwin, Paul Campbell

    2015-04-01

    As the struggle continues to explain the relatively high rates of infant mortality (IMR) exhibited in the United States, a renewed emphasis is being placed on the role of possible 'contextual' determinants. Cross-sectional and short time-series studies have found that higher income inequality is associated with higher IMR at the state level. Yet, descriptively, the longer-term trends in income inequality and in IMR seem to call such results into question. To assess whether, over the period 1990-2007, state-level income inequality is associated with state-level IMR; to examine whether the overall effect of income inequality on IMR over this period varies by state; to test whether the association between income inequality and IMR varies across this time period. IMR data--number of deaths per 1000 live births in a given state and year--were obtained from the U.S. Centers for Disease Control Wonder database. Income inequality was measured using the Gini coefficient, which varies from zero (complete equality) to 100 (complete inequality). Covariates included state-level poverty rate, median income, and proportion of high school graduates. Fixed and random effects regressions were conducted to test hypotheses. Fixed effects models suggested that, overall, during the period 1990-2007, income inequality was inversely associated with IMR (β = -0.07, SE (0.01)). Random effects models suggested that when the relationship was allowed to vary at the state-level, it remained inverse (β = -0.05, SE (0.01)). However, an interaction between income inequality and time suggested that, as time increased, the effect of income inequality had an increasingly positive association with total IMR (β = 0.009, SE (0.002)). The influence of state income inequality on IMR is dependent on time, which may proxy for time-dependent aspects of societal context. Copyright © 2015 Elsevier Ltd. All rights reserved.

  10. Increased Incidence Rate of Trauma- and Stressor-Related Disorders in Denmark After the September 11, 2001, Terrorist Attacks in the United States

    DEFF Research Database (Denmark)

    Hansen, Bertel T; Østergaard, Søren D; Sønderskov, Kim M

    2016-01-01

    The terrorist attacks that occurred on September 11, 2001 (hereafter referred to as 9/11) in the United States had a profound impact on the physical and mental health of Americans, but the effects beyond the United States are largely unknown. To understand the wider aftermath, we examined...

  11. Gas attack

    Energy Technology Data Exchange (ETDEWEB)

    North, D.

    1977-08-01

    Consumersfirst Ltd. is reacting to deregulation with a massive advertising campaign. The gas utility is owned by Consumers Gas Energy Inc., and is struggling to hold onto its 35 per cent share of Ontario`s two million residential natural gas buyers. An industry analyst pointed out that deregulation could mean that Consumers` Gas has much to lose: customers, market share, control of the assets and control of the process. The Ontario Energy Board (OEB) however, had specified that Consumersfirst is not to proceed with paperwork to sign up new customers until the OEB issues a draft code-of-conduct that would prevent cross-subsidizing between regulated franchise holders. This has now been done, and several heavyweights such as Calgary-based Suncor Energy Inc., Union Gas of Chatham, Ontario, and the US-based Enron Corp. of Houston, have started campaigns to sign up potential consumers. It is predicted that brand loyalty will be a factor, but in the end, like long distance telephone rates, it will all come down to pricing, and a winning formula is not easy to find.

  12. Higher resting heart rate variability predicts skill in expressing some emotions.

    Science.gov (United States)

    Tuck, Natalie L; Grant, Rosemary C I; Sollers, John J; Booth, Roger J; Consedine, Nathan S

    2016-12-01

    Vagally mediated heart rate variability (vmHRV) is a measure of cardiac vagal tone, and is widely viewed as a physiological index of the capacity to regulate emotions. However, studies have not directly tested whether vmHRV is associated with the ability to facially express emotions. In extending prior work, the current report tested links between resting vmHRV and the objectively assessed ability to facially express emotions, hypothesizing that higher vmHRV would predict greater expressive skill. Eighty healthy women completed self-reported measures, before attending a laboratory session in which vmHRV and the ability to express six emotions in the face were assessed. A repeated measures analysis of variance revealed a marginal main effect for vmHRV on skill overall; individuals with higher resting vmHRV were only better able to deliberately facially express anger and interest. Findings suggest that differences in resting vmHRV are associated with the objectively assessed ability to facially express some, but not all, emotions, with potential implications for health and well-being. © 2016 Society for Psychophysiological Research.

  13. Invasive acacias experience higher ant seed removal rates at the invasion edges

    Directory of Open Access Journals (Sweden)

    D. Montesinos

    2012-06-01

    Full Text Available Seed dispersal is a key process for the invasion of new areas by exotic species. Introduced plants often take advantage of native generalist dispersers. Australian acacias are primarily dispersed by ants in their native range and produce seeds bearing a protein and lipid rich reward for ant mutualists (elaiosome. Nevertheless, the role of myrmecochory in the expansion of Australian acacias in European invaded areas is still not clear. We selected one European population of Acacia dealbata and another of A. longifolia and offered elaiosome-bearing and elaiosome-removed seeds to local ant communities. For each species, seeds were offered both in high-density acacia stands and in low-density invasion edges. For both acacia species, seed removal was significantly higher at the low-density edges. For A. longifolia, manual elimination of elaiosomes reduced the chance of seed removal by 80% in the low-density edges, whereas it made no difference on the high-density stands. For A. dealbata, the absence of elaiosome reduced seed removal rate by 52%, independently of the acacia density. Our data suggests that invasive acacias have found effective ant seed dispersers in Europe and that the importance of such dispersers is higher at the invasion edges.

  14. Optimizing rate of nitrogen application for higher growth and yield of wheat (triticum aestivum l.) cultivars

    International Nuclear Information System (INIS)

    Maqsood, M.; Shehzad, M.A.; Asim, A.; Ahmad, W.

    2012-01-01

    In order to optimize the nitrogen rates in three wheat (Triticum aestivum L.) cultivars for obtaining higher grain yield, a split plot experiment based on Randomized Complete Block Design with three replicates was conducted in the research field of University of Agriculture, Faisalabad during Rabi season 2006-07. Among treatments nitrogen levels (N0= 0, N/sub 1/= 50, N2= 100, N3= 150 kg ha/sup -1/) in main while wheat cultivars (V1= Punjnad-I, V/sub 2/= Fareed-2006, V3=Uqab-2000) were allocated in sub plots during the course of growing season. Traits as plant height, fertile tillers, spike length, spikelets spike-1, grains spike-1, 1000-grain weight, straw yield, grain yield and harvest index (HI) were significantly (P=0.05) affected by treatment combinations. Maximum grain yield was obtained by V3 (Uqab-2000) cultivar when treated with N3 (150 kg ha/sup -1/) fertilizer level. Also, results showed that with increasing nitrogen rates, wheat yield increases significantly up to a level of significance (P=0.05). Increasing nitrogen levels led to significantly increase in plant height (101.81 cm), spike bearing tillers (495.77), grains spike/sup -1/ (61.45), straw yield (8.60 t ha/sup -1/) and harvest index (36.17%) of V3 (Uqab-2000). In all traits except germination count, V3 (Uqab-2000) was found to be superior. (author)

  15. Effect of additives for higher removal rate in lithium niobate chemical mechanical planarization

    International Nuclear Information System (INIS)

    Jeong, Sukhoon; Lee, Hyunseop; Cho, Hanchul; Lee, Sangjik; Kim, Hyoungjae; Kim, Sungryul; Park, Jaehong; Jeong, Haedo

    2010-01-01

    High roughness and a greater number of defects were created by lithium niobate (LN; LiNbO 3 ) processes such as traditional grinding and mechanical polishing (MP), should be decreased for manufacturing LN device. Therefore, an alternative process for gaining defect-free and smooth surface is needed. Chemical mechanical planarization (CMP) is suitable method in the LN process because it uses a combination approach consisting of chemical and mechanical effects. First of all, we investigated the LN CMP process using commercial slurry by changing various process conditions such as down pressure and relative velocity. However, the LN CMP process time using commercial slurry was long to gain a smooth surface because of lower material removal rate (MRR). So, to improve the material removal rate (MRR), the effects of additives such as oxidizer (hydrogen peroxide; H 2 O 2 ) and complexing agent (citric acid; C 6 H 8 O 7 ) in a potassium hydroxide (KOH) based slurry, were investigated. The manufactured slurry consisting of H 2 O 2 -citric acid in the KOH based slurry shows that the MRR of the H 2 O 2 at 2 wt% and the citric acid at 0.06 M was higher than the MRR for other conditions.

  16. Higher Rates of DZ Twinning in a Twenty-First Century Birth Cohort.

    Science.gov (United States)

    Rhea, Sally Ann; Corley, Robin P; Heath, Andrew C; Iacono, William G; Neale, Michael C; Hewitt, John K

    2017-09-01

    The Colorado Twin Registry is a population based registry initiated in 1984 with the involvement of the Colorado Department of Health, Division of Vital Statistics. Recruitment includes birth cohorts several years prior to 1984 and all subsequent years. As part of a recent evaluation of Colorado birth records for the years 2006 through 2008 we became aware of a shifting trend in the proportion of MZ and DZ twins in the Colorado population. Historically (Bulmer 1970 The biology of twinning in man, Clarendon, Oxford) we have expected a 1/3, 1/3, 1/3 ratio of MZ, same-sex DZ and opposite sex DZ twins in Caucasian populations. An excess of MZ pairs in most studies was assumed to be due to selection bias. Somewhat more recently, Hur et al.(1995 Behav Genet 25, 337-340) provided evidence that the DZ twinning rate was falling and that therefore selection bias was not the reason for higher MZ enrollment in most twin studies. They suggested that twin researchers might consider strategies to over-enroll DZ pairs to maximize statistical power. In contrast, we now find that of the 3217 twin births in Colorado from 2006 to 2008 with identified sex information the MZ rate is estimated at only 22%, and we have corroborating reports from other states of similar estimates. These were calculated applying Weinberg's rule which assumes an equal birth rate for same sex and opposite sex DZ pairs so that the proportion of MZ in a sample is the proportion of same sex (MM + FF) minus the proportion of opposite-sex (MF, FM). We explore factors, such as an increase in the proportion of non-Caucasian parents and an increase in average maternal age, which may contribute to this shift.

  17. Higher Education Support Services and Graduation Rates of Structured Education Program Students

    Science.gov (United States)

    Hepner, Seth

    2017-01-01

    The 1st-year retention rate of the Structured Education Program (SEP) is 90%, yet the 6-year graduation rate of SEP students is 29%. The gap between SEP 1st-year retention and graduation rates is the problem that this study addressed. The low graduation rate of SEP students is an important issue because graduation rates are used to measure the…

  18. Increased Total Anesthetic Time Leads to Higher Rates of Surgical Site Infections in Spinal Fusions.

    Science.gov (United States)

    Puffer, Ross C; Murphy, Meghan; Maloney, Patrick; Kor, Daryl; Nassr, Ahmad; Freedman, Brett; Fogelson, Jeremy; Bydon, Mohamad

    2017-06-01

    A retrospective review of a consecutive series of spinal fusions comparing patient and procedural characteristics of patients who developed surgical site infections (SSIs) after spinal fusion. It is known that increased surgical time (incision to closure) is associated with a higher rate of postoperative SSIs. We sought to determine whether increased total anesthetic time (intubation to extubation) is a factor in the development of SSIs as well. In spine surgery for deformity and degenerative disease, SSI has been associated with operative time, revealing a nearly 10-fold increase in SSI rates in prolonged surgery. Surgical time is associated with infections in other surgical disciplines as well. No studies have reported whether total anesthetic time (intubation to extubation) has an association with SSIs. Surgical records were searched in a retrospective fashion to identify all spine fusion procedures performed between January 2010 and July 2012. All SSIs during that timeframe were recorded and compared with the list of cases performed between 2010 and 2012 in a case-control design. There were 20 (1.7%) SSIs in this fusion cohort. On univariate analyses of operative factors, there was a significant association between total anesthetic time (Infection 7.6 ± 0.5 hrs vs. no infection -6.0 ± 0.1 hrs, P operative time (infection 5.5 ± 0.4 hrs vs. no infection - 4.4 ± 0.06 hrs, P infections, whereas level of pathology and emergent surgery were not significant. On multivariate logistic analysis, BMI and total anesthetic time remained independent predictors of SSI whereas ASA status and operative time did not. Increasing BMI and total anesthetic time were independent predictors of SSIs in this cohort of over 1000 consecutive spinal fusions. 3.

  19. Terrorists and Suicide Attacks

    National Research Council Canada - National Science Library

    Cronin, Audrey K

    2003-01-01

    Suicide attacks by terrorist organizations have become more prevalent globally, and assessing the threat of suicide attacks against the United States and its interests at home and abroad has therefore...

  20. Solidarity under Attack

    DEFF Research Database (Denmark)

    Meret, Susi; Goffredo, Sergio

    2017-01-01

    https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack......https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack...

  1. Pericarditis - after heart attack

    Science.gov (United States)

    ... include: A previous heart attack Open heart surgery Chest trauma A heart attack that has affected the thickness of your heart muscle Symptoms Symptoms include: Anxiety Chest pain from the swollen pericardium rubbing on the ...

  2. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  3. Evaluations of Insecticides and Fungicides for Reducing Attack Rates of a new invasive ambrosia beetle (Euwallacea Sp., Coleoptera: Curculionidae: Scolytinae) in Infested Landscape Trees in California.

    Science.gov (United States)

    Eatough Jones, Michele; Kabashima, John; Eskalen, Akif; Dimson, Monica; Mayorquin, Joey S; Carrillo, Joseph D; Hanlon, Christopher C; Paine, Timothy D

    2017-08-01

    A recently discovered ambrosia beetle with the proposed common name of polyphagous shot hole borer (Euwallacea sp., Coleoptera: Curculionidae: Scolytinae), is reported to attack >200 host tree species in southern California, including many important native and urban landscape trees. This invasive beetle, along with its associated fungi, causes branch dieback and tree mortality in a large variety of tree species including sycamore (Platanus racemosa Nutt.). Due to the severity of the impact of this Euwallacea sp., short-term management tools must include chemical control options for the arboriculture industry and private landowners to protect trees. We examined the effectiveness of insecticides, fungicides, and insecticide-fungicide combinations for controlling continued Euwallacea sp. attacks on previously infested sycamore trees which were monitored for 6 mo after treatment. Pesticide combinations were generally more effective than single pesticide treatments. The combination of a systemic insecticide (emamectin benzoate), a contact insecticide (bifenthrin), and a fungicide (metconazole) provided some level of control when applied on moderate and heavily infested trees. The biological fungicide Bacillus subtilis provided short-term control. There was no difference in the performance of the three triazole fungicides (propiconazole, tebuconazole, and metconazole) included in this study. Although no pesticide combination provided substantial control over time, pesticide treatments may be more effective when trees are treated during early stages of attack by this ambrosia beetle. © The Authors 2017. Published by Oxford University Press on behalf of Entomological Society of America. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  4. Removal of boron(III) by N-methylglucamine-type cellulose derivatives with higher adsorption rate

    International Nuclear Information System (INIS)

    Inukai, Yoshinari; Tanaka, Yoshiharu; Matsuda, Toshio; Mihara, Nobutake; Yamada, Kouji; Nambu, Nobuyoshi; Itoh, Osamu; Doi, Takao; Kaida, Yasuhiko; Yasuda, Seiji

    2004-01-01

    To obtain adsorbents for boron(III) derived from a natural polymer, two forms (powder and fiber) of N-methylglucamine-type cellulose derivatives were newly synthesized. After the graft polymerization of two forms of cellulose with vinyl monomer having epoxy groups, the N-methylglucamine-type cellulose derivatives were obtained by the reaction of the grafted cellulose with N-methylglucamine. The adsorption capacities of the cellulose derivatives for boron(III) were the same levels as that of a commercially available N-methylglucamine-type polystyrene resin. However, the cellulose derivatives adsorbed boron(III) more quickly than the polystyrene resin. The adsorption and desorption of boron(III) with a column method using the cellulose fiber were achieved at a higher flow rate than that using the polystyrene resin. In addition, the boron(III), adsorbed on the cellulose fiber column, was quantitatively recovered with dilute hydrochloric acid in 20- and 200-fold increased concentrations. Consequently, it was found that the cellulose derivatives were superior to the polystyrene resin as adsorbents for boron(III) for treatment of a large quantity of wastewater

  5. Continuous fermentation and in-situ reed separation of butyric acid for higher sugar consumption rate and productivity

    DEFF Research Database (Denmark)

    Baroi, George Nabin; Skiadas, Ioannis; Westermann, Peter

    that disconnection of the REED system resulted to much lower (48 and 83% for glucose and xylose, respectively) sugars consumption rates and consequently lower butyric acid production rates. It was also noticeable that continuous operation, even without the REED system, resulted to higher glucose consumption rates...

  6. Anger attacks in obsessive compulsive disorder

    Directory of Open Access Journals (Sweden)

    Nitesh Prakash Painuly

    2011-01-01

    Full Text Available Background: Research on anger attacks has been mostly limited to depression, and only a few studies have focused on anger attacks in obsessive compulsive disorder. Materials and Methods: In a cross-sectional study all new obsessive compulsive disorder patients aged 20-60 years attending an outpatient clinic were assessed using the anger attack questionnaire, irritability, depression and anxiety scale (for the direction of the aggressive behavior and quality of life (QOL. Results: The sample consisted of 42 consecutive subjects with obsessive compulsive disorder, out of which 21 (50% had anger attacks. The obsessive compulsive disorder subjects with and without anger attacks did not show significant differences in terms of sociodemographic variables, duration of illness, treatment, and family history. However, subjects with anger attacks had significantly higher prevalence of panic attacks and comorbid depression. Significantly more subjects with anger attacks exhibited aggressive acts toward spouse, parents, children, and other relatives in the form of yelling and threatening to hurt, trying to hurt, and threatening to leave. However, the two groups did not differ significantly in terms of QOL, except for the psychological domain being worse in the subjects with anger attacks. Conclusion: Anger attacks are present in half of the patients with obsessive compulsive disorder, and they correlate with the presence of comorbid depression.

  7. Does adding metformin to clomifene citrate lead to higher pregnancy rates in a subset of women with polycystic ovary syndrome?

    OpenAIRE

    Moll, E.; Korevaar, J.C.; Bossuyt, P.M.M.; van der Veen, F.

    2008-01-01

    BACKGROUND An RCT among newly diagnosed, therapy naive women with polycystic ovary syndrome (PCOS) showed no significant differences in ovulation rate, ongoing pregnancy rate or spontaneous abortion rate in favour of clomifene citrate plus metformin compared with clomifene citrate. We wanted to assess whether there are specific subgroups of women with PCOS in whom clomifene citrate plus metformin leads to higher pregnancy rates. METHODS Subgroup analysis based on clinical and biochemical para...

  8. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  9. Higher USA State Resident Neuroticism Is Associated With Lower State Volunteering Rates.

    Science.gov (United States)

    McCann, Stewart J H

    2017-12-01

    Highly neurotic persons have dispositional characteristics that tend to precipitate social anxiety that discourages formal volunteering. With the 50 American states as analytical units, Study 1 found that state resident neuroticism correlated highly ( r = -.55) with state volunteering rates and accounted for another 26.8% of the volunteering rate variance with selected state demographics controlled. Study 2 replicated Study 1 during another period and extended the association to college student, senior, secular, and religious volunteering rates. Study 3 showed state resident percentages engaged in other social behaviors involving more familiarity and fewer demands than formal volunteering related to state volunteering rates but not to neuroticism. In Study 4, state resident neuroticism largely accounted statistically for relations between state volunteering rates and state population density, collectivism, social capital, Republican preference, and well-being. This research is the first to show that state resident neuroticism is a potent predictor of state volunteering rates.

  10. Predicting higher education graduation rates from institutional characteristics and resource allocation

    Directory of Open Access Journals (Sweden)

    Florence A. Hamrick

    2004-05-01

    Full Text Available This study incorporated institutional characteristics (e.g., Carnegie type, selectivity and resource allocations (e.g., instructional expenditures, student affairs expenditures into a statistical model to predict undergraduate graduation rates. Instructional expenditures, library expenditures, and a number of institutional classification variables were significant predictors of graduation rates. Based on these results, recommendations as well as warranted cautions are included about allocating academic financial resources to optimize graduation rates

  11. Do Astronauts have a Higher Rate of Orthopedic Shoulder Conditions than a Cohort of Working Professionals?

    Science.gov (United States)

    Laughlin, Mitzi S.; Murray, Jocelyn D.; Young, Millenia; Wear, Mary L.; Tarver, W. J.; Van Baalen, Mary

    2016-01-01

    Occupational surveillance of astronaut shoulder injuries began with operational concerns at the Neutral Buoyancy Laboratory (NBL) during Extra Vehicular Activity (EVA) training. NASA has implemented several occupational health initiatives during the past 20 years to decrease the number and severity of injuries, but the individual success rate is unknown. Orthopedic shoulder injury and surgery rates were calculated, but classifying the rates as normal, high or low was highly dependent on the comparison group. The purpose of this study was to identify a population of working professionals and compare orthopedic shoulder consultation and surgery rates.

  12. Practical security and privacy attacks against biometric hashing using sparse recovery

    Science.gov (United States)

    Topcu, Berkay; Karabat, Cagatay; Azadmanesh, Matin; Erdogan, Hakan

    2016-12-01

    Biometric hashing is a cancelable biometric verification method that has received research interest recently. This method can be considered as a two-factor authentication method which combines a personal password (or secret key) with a biometric to obtain a secure binary template which is used for authentication. We present novel practical security and privacy attacks against biometric hashing when the attacker is assumed to know the user's password in order to quantify the additional protection due to biometrics when the password is compromised. We present four methods that can reconstruct a biometric feature and/or the image from a hash and one method which can find the closest biometric data (i.e., face image) from a database. Two of the reconstruction methods are based on 1-bit compressed sensing signal reconstruction for which the data acquisition scenario is very similar to biometric hashing. Previous literature introduced simple attack methods, but we show that we can achieve higher level of security threats using compressed sensing recovery techniques. In addition, we present privacy attacks which reconstruct a biometric image which resembles the original image. We quantify the performance of the attacks using detection error tradeoff curves and equal error rates under advanced attack scenarios. We show that conventional biometric hashing methods suffer from high security and privacy leaks under practical attacks, and we believe more advanced hash generation methods are necessary to avoid these attacks.

  13. Predicting higher education graduation rates from institutional characteristics and resource allocation

    OpenAIRE

    Florence A. Hamrick; John H. Schuh; Mack C. Shelley

    2004-01-01

    This study incorporated institutional characteristics (e.g., Carnegie type, selectivity) and resource allocations (e.g., instructional expenditures, student affairs expenditures) into a statistical model to predict undergraduate graduation rates. Instructional expenditures, library expenditures, and a number of institutional classification variables were significant predictors of graduation rates. Based on these results, recommendations as well as warranted cautions are included about allocat...

  14. Results of a pilot scale melter test to attain higher production rates

    International Nuclear Information System (INIS)

    Elliott, M.L.; Perez, J.M. Jr.; Chapman, C.C.

    1991-01-01

    A pilot-scale melter test was completed as part of the effort to enhance glass production rates. The experiment was designed to evaluate the effects of bulk glass temperature and feed oxide loading. The maximum glass production rate obtained, 86 kg/hr-m 2 , was over 200% better than the previous record for the melter used

  15. Heroin addicts have higher discount rates for delayed rewards than non-drug-using controls.

    Science.gov (United States)

    Kirby, K N; Petry, N M; Bickel, W K

    1999-03-01

    Fifty-six heroin addicts and 60 age-matched controls were offered choices between monetary rewards ($11-$80) available immediately and larger rewards ($25-$85) available after delays ranging from 1 week to 6 months. Participants had a 1-in-6 chance of winning a reward that they chose on one randomly selected trial. Delay-discounting rates were estimated from the pattern of participants' choices. The discounting model of impulsiveness (Ainslie, 1975) implies that delay-discounting rates are positively correlated with impulsiveness. On average, heroin addicts' discount rates were twice those of controls (p = .004), and discount rates were positively correlated with impulsivity as measured by self-report questionnaires (p discounting rate as a measure of impulsiveness, a characteristic associated with substance abuse.

  16. Web server attack analyzer

    OpenAIRE

    Mižišin, Michal

    2013-01-01

    Web server attack analyzer - Abstract The goal of this work was to create prototype of analyzer of injection flaws attacks on web server. Proposed solution combines capabilities of web application firewall and web server log analyzer. Analysis is based on configurable signatures defined by regular expressions. This paper begins with summary of web attacks, followed by detection techniques analysis on web servers, description and justification of selected implementation. In the end are charact...

  17. An efficient algorithm for the detection of exposed and hidden wormhole attack

    International Nuclear Information System (INIS)

    Khan, Z.A.; Rehman, S.U.; Islam, M.H.

    2016-01-01

    MANETs (Mobile Ad Hoc Networks) are slowly integrating into our everyday lives, their most prominent uses are visible in the disaster and war struck areas where physical infrastructure is almost impossible or very hard to build. MANETs like other networks are facing the threat of malicious users and their activities. A number of attacks have been identified but the most severe of them is the wormhole attack which has the ability to succeed even in case of encrypted traffic and secure networks. Once wormhole is launched successfully, the severity increases by the fact that attackers can launch other attacks too. This paper presents a comprehensive algorithm for the detection of exposed as well as hidden wormhole attack while keeping the detection rate to maximum and at the same reducing false alarms. The algorithm does not require any extra hardware, time synchronization or any special type of nodes. The architecture consists of the combination of Routing Table, RTT (Round Trip Time) and RSSI (Received Signal Strength Indicator) for comprehensive detection of wormhole attack. The proposed technique is robust, light weight, has low resource requirements and provides real-time detection against the wormhole attack. Simulation results show that the algorithm is able to provide a higher detection rate, packet delivery ratio, negligible false alarms and is also better in terms of Ease of Implementation, Detection Accuracy/ Speed and processing overhead. (author)

  18. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  19. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. ...

  20. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  1. Are Interpersonal Violence Rates Higher Among Young Women in College Compared With Those Never Attending College?

    Science.gov (United States)

    Coker, Ann L; Follingstad, Diane R; Bush, Heather M; Fisher, Bonnie S

    2016-05-01

    Estimates of sexual violence and partner violence rates among young women are generated primarily from college samples. Few studies have data to compare rates among similar-aged women attending college with those who never attended college. This study aims to estimate rates of partner violence by type (sexual, physical, and psychological) and severity (mild, moderate, severe), sexual harassment, and knowing or suspecting that someone put a drug in a drink (drugged drink) among a national sample of 959 young women aged 18 to 24 in an intimate relationship in the past 12 months who were either currently in college (college;n= 272) or never attended college (non-college;n= 687). After adjusting for demographic differences between these two groups, no significant differences were found in rates of sexual partner violence (28.4% non-college, 23.5% college), physical partner violence (27.9% non-college, 26.3% college), psychological partner violence (Mscore: 6.10 non-college, 5.59 college), sexual harassment (15.5% non-college, 14.1% college), or drugged drink (8.5% non-college, 7.8% college). Finding high rates of interpersonal violence among young women who are and are not currently attending college indicates the need to target all young adults with violence prevention interventions in educational, workplace, and other community-based settings. © The Author(s) 2015.

  2. Higher speciation and lower extinction rates influence mammal diversity gradients in Asia.

    Science.gov (United States)

    Tamma, Krishnapriya; Ramakrishnan, Uma

    2015-02-04

    Little is known about the patterns and correlates of mammal diversity gradients in Asia. In this study, we examine patterns of species distributions and phylogenetic diversity in Asia and investigate if the observed diversity patterns are associated with differences in diversification rates between the tropical and non-tropical regions. We used species distribution maps and phylogenetic trees to generate species and phylogenetic diversity measures for 1° × 1° cells across mainland Asia. We constructed lineage-through-time plots and estimated diversification shift-times to examine the temporal patterns of diversifications across orders. Finally, we tested if the observed gradients in Asia could be associated with geographical differences in diversification rates across the tropical and non-tropical biomes. We estimated speciation, extinction and dispersal rates across these two regions for mammals, both globally and for Asian mammals. Our results demonstrate strong latitudinal and longitudinal gradients of species and phylogenetic diversity with Southeast Asia and the Himalayas showing highest diversity. Importantly, our results demonstrate that differences in diversification (speciation, extinction and dispersal) rates between the tropical and the non-tropical biomes influence the observed diversity gradients globally and in Asia. For the first time, we demonstrate that Asian tropics act as both cradles and museums of mammalian diversity. Temporal and spatial variation in diversification rates across different lineages of mammals is an important correlate of species diversity gradients observed in Asia.

  3. Vigorous physical activity predicts higher heart rate variability among younger adults.

    Science.gov (United States)

    May, Richard; McBerty, Victoria; Zaky, Adam; Gianotti, Melino

    2017-06-14

    Baseline heart rate variability (HRV) is linked to prospective cardiovascular health. We tested intensity and duration of weekly physical activity as predictors of heart rate variability in young adults. Time and frequency domain indices of HRV were calculated based on 5-min resting electrocardiograms collected from 82 undergraduate students. Hours per week of both moderate and vigorous activity were estimated using the International Physical Activity Questionnaire. In regression analyses, hours of vigorous physical activity, but not moderate activity, significantly predicted greater time domain and frequency domain indices of heart rate variability. Adjusted for weekly frequency, greater daily duration of vigorous activity failed to predict HRV indices. Future studies should test direct measurements of vigorous activity patterns as predictors of autonomic function in young adulthood.

  4. Reducing Error Rates for Iris Image using higher Contrast in Normalization process

    Science.gov (United States)

    Aminu Ghali, Abdulrahman; Jamel, Sapiee; Abubakar Pindar, Zahraddeen; Hasssan Disina, Abdulkadir; Mat Daris, Mustafa

    2017-08-01

    Iris recognition system is the most secured, and faster means of identification and authentication. However, iris recognition system suffers a setback from blurring, low contrast and illumination due to low quality image which compromises the accuracy of the system. The acceptance or rejection rates of verified user depend solely on the quality of the image. In many cases, iris recognition system with low image contrast could falsely accept or reject user. Therefore this paper adopts Histogram Equalization Technique to address the problem of False Rejection Rate (FRR) and False Acceptance Rate (FAR) by enhancing the contrast of the iris image. A histogram equalization technique enhances the image quality and neutralizes the low contrast of the image at normalization stage. The experimental result shows that Histogram Equalization Technique has reduced FRR and FAR compared to the existing techniques.

  5. Diabetes - preventing heart attack and stroke

    Science.gov (United States)

    Diabetes complications - heart; Coronary artery disease - diabetes; CAD - diabetes; Cerebrovascular disease - diabetes ... People with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure and high ...

  6. Higher contamination rate than usual. Treatment and disinfection of water in hot whirlpool systems

    Energy Technology Data Exchange (ETDEWEB)

    Herschman, W

    1985-10-01

    Hot whirlpools must meet the hygienic standards set in the Federal Law Concerning Prevention of Epidemics of 18 Dec 1979. The low water volume of whirlpool systems and the extraordinary contamination rate in uninterrupted operation require a specific water treatment and disinfestation technology to make up for the poor buffer capacity of the low water volume. (orig./BWI).

  7. Mechanisms promoting higher growth rate in arctic than in temperate shorebirds

    NARCIS (Netherlands)

    Schekkerman, H.; Tulp, I.Y.M.; Piersma, T.; Visser, G.H.

    2003-01-01

    We compared prefledging growth, energy expenditure, and time budgets in the arctic-breeding red knot (Calidris canutus) to those in temperate shorebirds, to investigate how arctic chicks achieve a high growth rate despite energetic difficulties associated with precocial development in a cold

  8. Mechanisms promoting higher growth rate in arctic than in temperate shorebirds

    NARCIS (Netherlands)

    Schekkerman, H; Tulp, Ingrid; Piersma, T.; Visser, G.H.

    We compared prefledging growth, energy expenditure, and time budgets in the arctic-breeding red knot (Calidris canutus) to those in temperate shorebirds, to investigate how arctic chicks achieve a high growth rate despite energetic difficulties associated with precocial development in a cold

  9. Honest signaling in trust interactions: smiles rated as genuine induce trust and signal higher earning opportunities

    OpenAIRE

    Centorrino, S.; Djemai, E.; Hopfensitz, A.; Milinski, M.; Seabright, P.

    2015-01-01

    We test the hypothesis that smiles perceived as honest serve as a signal that has evolved to induce cooperation in situations requiring mutual trust. Potential trustees (84 participants from Toulouse, France) made two video clips averaging around 15 seconds for viewing by potential senders before the latter decided whether to ‘send’ or ‘keep’ a lower stake (4 euros) or higher stake (8 euros). Senders (198 participants from Lyon, France) made trust decisions with respect to the recorded clips....

  10. Surgical site infection and transfusion rates are higher in underweight total knee arthroplasty patients

    Directory of Open Access Journals (Sweden)

    Jorge Manrique, MD

    2017-03-01

    Conclusions: Our study demonstrates that UW TKA patients have a higher likelihood of developing SSI and requiring blood transfusions. The specific reasons are unclear, but we conjecture that it may be related to decreased wound healing capabilities and low preoperative hemoglobin. Investigation of local tissue coverage and hematologic status may be beneficial in this patient population to prevent SSI. Based on the results of this study, a prospective evaluation of these factors should be undertaken.

  11. Plants under dual attack

    NARCIS (Netherlands)

    Ponzio, C.A.M.

    2016-01-01

    Though immobile, plants are members of complex environments, and are under constant threat from a wide range of attackers, which includes organisms such as insect herbivores or plant pathogens. Plants have developed sophisticated defenses against these attackers, and include chemical responses

  12. Heart attack - discharge

    Science.gov (United States)

    ... and lifestyle Cholesterol - drug treatment Controlling your high blood pressure Deep vein thrombosis - discharge Dietary fats explained Fast food tips Heart attack - discharge Heart attack - what to ask your doctor Heart bypass ... pacemaker - discharge High blood pressure - what to ask your doctor How to read ...

  13. Accuracy of rate coding: When shorter time window and higher spontaneous activity help

    Czech Academy of Sciences Publication Activity Database

    Leváková, Marie; Tamborrino, M.; Košťál, Lubomír; Lánský, Petr

    2017-01-01

    Roč. 95, č. 2 (2017), č. článku 022310. ISSN 2470-0045 R&D Projects: GA ČR(CZ) GA15-08066S; GA MŠk(CZ) 7AMB17AT048 Institutional support: RVO:67985823 Keywords : rate coding * observation window * spontaneous activity * Fisher information * perfect integrate- and -fire model * Wiener process Subject RIV: BB - Applied Statistics, Operational Research OBOR OECD: Biology (theoretical, mathematical, thermal, cryobiology, biological rhythm), Evolutionary biology Impact factor: 2.366, year: 2016

  14. Comparison of higher order spectra in heart rate signals during two techniques of meditation: Chi and Kundalini meditation.

    Science.gov (United States)

    Goshvarpour, Ateke; Goshvarpour, Atefeh

    2013-02-01

    The human heartbeat is one of the important examples of complex physiologic fluctuations. For the first time in this study higher order spectra of heart rate signals during meditation have explored. Specifically, the aim of this study was to analysis and compares the contribution of quadratic phase coupling of human heart rate variability during two forms of meditation: (1) Chinese Chi (or Qigong) meditation and (2) Kundalini Yoga meditation. For this purpose, Bispectrum was estimated by using biased, parametric and the direct (FFT) method. The results show that the mean Bispectrum magnitude of heart rate signals increased during Kundalini Yoga meditation, but it decreased significantly during Chi meditation. However, in both meditation techniques phase-coupled harmonics are shifted to the higher frequencies during meditation. In addition, it has shown that not only there are significant differences between rest and meditation states, but also heart rate patterns appear to be influenced by different types of meditation.

  15. Religious affiliation and psychiatric morbidity in Brazil: higher rates among evangelicals and spiritists.

    Science.gov (United States)

    Dalgalarrondo, Paulo; Marín-León, Leticia; Botega, Neury José; Berti De Azevedo Barros, Marilisa; Bosco De Oliveira, Helenice

    2008-11-01

    To verify the association between the prevalence of mental symptoms and excessive alcohol intake with religious affiliation, church attendance and personal religiosity. A household survey of 515 adults randomly sampled included the WHO SUPRE-MISS questionnaire, SRQ-20 and AUDIT. Weighted prevalences were estimated and logistic analyses were performed. Minor psychiatric morbidity was greater among Spiritists and Protestants/ Evangelicals than in Catholics and in the ;no-religion' group. The latter had a greater frequency of abusive alcohol drinking pattern and Protestants/Evangelicals showed lower drinking patterns. Although belonging to Protestant/Evangelical churches in Brazil may inhibit alcohol involvement it seems to be associated to a higher frequency of depressive symptoms. Processes of seeking relief in new religious affiliations among sub-groups with previous minor psychiatric symptoms may probably occur in the Brazilian society.

  16. Higher rate of compensation after surgical treatment versus conservative treatment for acute Achilles tendon rupture

    DEFF Research Database (Denmark)

    Sveen, Thor-Magnus; Troelsen, Anders; Barfod, Kristoffer Weisskirchner

    2015-01-01

    in the period from 1992 to 2010 in the DPIA database were identified and patient records were reviewed manually. RESULTS: The compensation awarded for the 18-year period totalled 18,147,202 DKK with 41% of patient claims being recognised. Out of 180 surgically treated patients, 79 received a total compensation...... of 14,051,377 DKK, median 47,637 (range: 5,000-3,577,043). Of 114 non-surgically treated patients, 40 received 3,715,224 DKK in compensation, with a median amount of 35,788 DKK (range: 5,000-830,073). CONCLUSION: Compensation after surgical treatment was 3.8 times higher than compensation after non......-surgical treatment. It is noteworthy that 34.5% of patients had an overlooked diagnosis which underlines the importance of a correct primary diagnosis. FUNDING: not relevant. TRIAL REGISTRATION: not relevant....

  17. Weaker gun state laws are associated with higher rates of suicide secondary to firearms.

    Science.gov (United States)

    Alban, Rodrigo F; Nuño, Miriam; Ko, Ara; Barmparas, Galinos; Lewis, Azaria V; Margulies, Daniel R

    2018-01-01

    Firearm-related suicides comprise over two-thirds of gun-related violence in the United States, and gun laws and policies remain under scrutiny, with many advocating for revision of the regulatory map for lawful gun ownership, aiming at restricting access and distribution of these weapons. However, the quantitative relationship between how strict gun laws are and the incidence of firearm violence with their associated mortality is largely unknown. We therefore, sought to explore the impact of firearm law patterns among states on the incidence and outcomes of firearm-related suicide attempts, utilizing established objective criteria. The National Inpatient Sample for the years 1998-2011 was queried for all firearm-related suicides. Discharge facilities were stratified into five categories (A, B, C, D, and F, with A representing states with the most strict and F representing states with the least strict laws) based on the Brady Campaign to prevent Gun Violence that assigns scorecards for every state. The primary outcomes were suicide attempts and in-hospital mortality per 100,000 populations by Brady state grade. During the 14-year study period, 34,994 subjects met inclusion criteria. The mean age was 42.0 years and 80.1% were male. A handgun was utilized by 51.8% of patients. The overall mortality was 33.3%. Overall, 22.0% had reported psychoses and 19.3% reported depression. After adjusting for confounding factors and using group A as reference, there were higher adjusted odds for suicide attempts for patients admitted in group C, D, and F category states (1.73, 2.09, and 1.65, respectively, all P gun laws, and these injuries tend to be associated with a higher mortality. Efforts aimed at nationwide standardization of firearm state laws are warranted, particularly for young adults and suicide-prone populations. III. Trauma Outcomes study. Copyright © 2017 Elsevier Inc. All rights reserved.

  18. Lead Burden as a Factor for Higher Complication Rate in Patients With Implantable Cardiac Devices

    Directory of Open Access Journals (Sweden)

    Christopher Kolibash

    2015-01-01

    Full Text Available Purpose: Lead revisions have increased over the last decade. Patients who do not undergo lead extraction face an increased lead burden. Consequences of increased lead burden have not been fully defined. We sought to characterize the complication rate and outcomes in patients with sterile redundant leads. Methods: We retrospectively reviewed 242 consecutive patients [mean age 74 ± 12 years; 66.9% male] who underwent lead revision that resulted in an abandoned lead from January 2005 to June 2010. Patients were placed in a cohort based on number of leads after last recorded procedure (Group A: ≤2 [n=58]; Group B: 3-4 [n=168]; Group C: ≥5 [n=16]. Prespecified inhospital and long-term follow-up events were compared. Mortality rates were obtained from Social Security Death Index. Median follow-up was 2 years. Results: Baseline age, gender and race demographics were similar among the three groups. Increasing lead burden was associated with more adverse periprocedural events (A: 3.4%, B: 10.1%, C: 25.0%; P=0.031 and long-term device-related events (A: 1.7%, B: 13.0%, C: 18.8%; P=0.031. Device-related readmissions increased in frequency as lead burden increased (A: 3.5%, B: 18.5%, C: 37.5%; P=0.002. Combined periprocedural and late events also increased with more redundant leads (A: 5.2%, B: 23.2%, C: 44.0%; P=0.001. Total major events were infrequent (3.3%. There was no procedure-related mortality. Long-term all-cause mortality was not significantly different (A: 17.2%, B: 23.8%, C: 25.0%; P=0.567. Conclusions: Greater lead burden was associated with increased number of periprocedural and long-term minor events. It did not significantly impact major events or mortality.

  19. An integrated approach for a higher success rate in mergers and acquisitions

    Directory of Open Access Journals (Sweden)

    Andrej Bertoncelj

    2007-05-01

    Full Text Available The paper outlines the importance of balanced management of hard and soft key success factors, combining the economic logic of corporate performance and human capital through an integrated approach to mergers and acquisitions. The study, based on a questionnaire and interviews, suggests that the achievement level ofmergers and acquisitions’ objectives of acquiring companies in Slovenia should be comparable to findings of similar studies; namely, the objectives that drove the deal were met only half the time. The results indicate that five hard success factors – a professional target search and due diligence, a realistic assessment of synergies, theright mix of financial sources, a detailed post-acquisition integration plan already prepared in the pre-deal phase and its speedy implementation – and five soft success factors – a new “combined” organizational culture, a competent management team, innovative employees, efficient and consistent communication and a creative business environment – are becoming increasingly relevant. Even though they differ in their importance for individual companies in the sample, they are all considered essential to increasing the success rate of corporate combinations

  20. Sex-role reversal of a monogamous pipefish without higher potential reproductive rate in females.

    Science.gov (United States)

    Sogabe, Atsushi; Yanagisawa, Yasunobu

    2007-12-07

    In monogamous animals, males are usually the predominant competitors for mates. However, a strictly monogamous pipefish Corythoichthys haematopterus exceptionally exhibits a reversed sex role. To understand why its sex role is reversed, we measured the adult sex ratio and the potential reproductive rate (PRR), two principal factors influencing the operational sex ratio (OSR), in a natural population of southern Japan. The adult sex ratio was biased towards females throughout the breeding season, but the PRR, which increased with water temperature, did not show sexual difference. We found that an alternative index of the OSR (Sf/Sm: sex ratio of 'time in') calculated from the monthly data was consistently biased towards females. The female-biased OSR associated with sex-role reversal has been reported in some polyandrous or promiscuous pipefish, but factors biasing the OSR differed between these pipefish and C. haematopterus. We concluded that the similar PRR between the sexes in C. haematopterus does not confer reproductive benefit of polygamous mating on either sex, resulting in strict monogamous mating, and its female-biased adult sex ratio promotes female-female competition for a mate, resulting in sex-role reversal.

  1. Lower serotonin level and higher rate of fibromyalgia syndrome with advancing pregnancy.

    Science.gov (United States)

    Atasever, Melahat; Namlı Kalem, Muberra; Sönmez, Çiğdem; Seval, Mehmet Murat; Yüce, Tuncay; Sahin Aker, Seda; Koç, Acar; Genc, Hakan

    2017-09-01

    The aim of the study is to investigate the relationship between changes in serotonin levels during pregnancy and fibromyalgia syndrome (FS) and the relationships between FS and the physical/psychological state, biochemical and hormonal parameters, which may be related to the musculoskeletal system. This study is a prospective case-control study conducted with 277 pregnant women at the obstetric unit of Ankara University Faculty of Medicine, in the period between January and June 2015. FS was determined based on the presence or absence of the 2010 ACR diagnostic criteria and all the volunteers were asked to answer the questionnaires as Fibromyalgia Impact Criteria (FIQ), Widespread Pain Index (WPI), Symptom Severity Scale (SS), Beck Depression Inventory and Visual Analog Scale (VAS). Biochemical and hormonal markers (glucose, TSH, T4, Ca (calcium), P (phosphate), PTH (parathyroid hormone) and serotonin levels) relating to muscle and bone metabolism were measured. In the presence of fibromyalgia, the physical and psychological parameters are negatively affected (p serotonin levels may contribute to the development of fibromyalgia but this was not statistically significant. The Beck Depression Inventory scale statistically showed that increasing scores also increase the risk of fibromyalgia (p serotonin levels in women with FS are lower than the control group and that serotonin levels reduce as pregnancy progresses. Anxiety and depression in pregnant women with FS are higher than the control group. The presence of depression increases the likelihood of developing FS at a statistically significant level. Serotonin impairment also increases the chance of developing FS, but this correlation has not been shown to be statistically significant.

  2. Biodegradation testing of chemicals with high Henry’s constants – separating mass and effective concentration reveals higher rate constants

    DEFF Research Database (Denmark)

    Birch, Heidi; Andersen, Henrik Rasmus; Comber, Mike

    Microextraction (HS-SPME) was applied directly on the test systems to measure substrate depletion by biodegradation relative to abiotic controls. HS-SPME was also applied to determine air to water partitioning ratios. Water phase biodegradation rate constants, kwater, were up to 72 times higher than test system...

  3. Higher dosage nicotine patches increase one-year smoking cessation rates : results from the European CEASE trial

    NARCIS (Netherlands)

    Tonnesen, P; Paoletti, P; Gustavsson, G; Russell, MA; Saracci, R; Gulsvik, A; Rijcken, B

    The Collaborative European Anti-Smoking Evaluation (CEASE) was a European multicentre, randomized, double-blind placebo controlled smoking cessation study, The objectives were to determine whether higher dosage and longer duration of nicotine patch therapy would increase the success rate. Thirty-six

  4. Understanding the Effect of Response Rate and Class Size Interaction on Students Evaluation of Teaching in a Higher Education

    Science.gov (United States)

    Al Kuwaiti, Ahmed; AlQuraan, Mahmoud; Subbarayalu, Arun Vijay

    2016-01-01

    Objective: This study aims to investigate the interaction between response rate and class size and its effects on students' evaluation of instructors and the courses offered at a higher education Institution in Saudi Arabia. Study Design: A retrospective study design was chosen. Methods: One thousand four hundred and forty four different courses…

  5. Children Receiving Free or Reduced-Price School Lunch Have Higher Food Insufficiency Rates in Summer.

    Science.gov (United States)

    Huang, Jin; Barnidge, Ellen; Kim, Youngmi

    2015-09-01

    In 2012, 20% of households in the United States with children lacked consistent access to adequate food. Food insufficiency has significant implications for children, including poor physical and mental health outcomes, behavior problems, and low educational achievements. The National School Lunch Program (NSLP) is one policy solution to reduce food insufficiency among children from low-income families. The objective of this project was to evaluate the association between NSLP participation and household food insufficiency by examining trajectories of food insufficiency over 10 calendar months. The calendar months included both nonsummer months when school is in session and summer months when school is out of session. The study used the data from the Survey of Income and Program Participation and conducted linear growth curve analyses in the multilevel modeling context. Comparisons were made between the trajectories of food insufficiencies among recipients of free or reduced-price lunch and their counterparts who are eligible but choose not to participate in the program. Heads of households that included children receiving free or reduced-price lunch (n = 6867) were more likely to be female, black, unmarried, and unemployed, and have a lower educational attainment than those whose children were eligible but did not receive free or reduced-price lunch (n = 11,396). For households participating in the NSLP, the food insufficiency rate was consistent from January to May at ∼4%, and then increased in June and July to >5%. Meanwhile, food insufficiency among eligible nonrecipients was constant throughout the year at nearly 2%. The NSLP protects households from food insufficiency. Policies should be instituted to make enrollment easier for households. © 2015 American Society for Nutrition.

  6. Informatics technology mimics ecology: dense, mutualistic collaboration networks are associated with higher publication rates.

    Directory of Open Access Journals (Sweden)

    Marco D Sorani

    Full Text Available Information technology (IT adoption enables biomedical research. Publications are an accepted measure of research output, and network models can describe the collaborative nature of publication. In particular, ecological networks can serve as analogies for publication and technology adoption. We constructed network models of adoption of bioinformatics programming languages and health IT (HIT from the literature.We selected seven programming languages and four types of HIT. We performed PubMed searches to identify publications since 2001. We calculated summary statistics and analyzed spatiotemporal relationships. Then, we assessed ecological models of specialization, cooperativity, competition, evolution, biodiversity, and stability associated with publications.Adoption of HIT has been variable, while scripting languages have experienced rapid adoption. Hospital systems had the largest HIT research corpus, while Perl had the largest language corpus. Scripting languages represented the largest connected network components. The relationship between edges and nodes was linear, though Bioconductor had more edges than expected and Perl had fewer. Spatiotemporal relationships were weak. Most languages shared a bioinformatics specialization and appeared mutualistic or competitive. HIT specializations varied. Specialization was highest for Bioconductor and radiology systems. Specialization and cooperativity were positively correlated among languages but negatively correlated among HIT. Rates of language evolution were similar. Biodiversity among languages grew in the first half of the decade and stabilized, while diversity among HIT was variable but flat. Compared with publications in 2001, correlation with publications one year later was positive while correlation after ten years was weak and negative.Adoption of new technologies can be unpredictable. Spatiotemporal relationships facilitate adoption but are not sufficient. As with ecosystems, dense

  7. Informatics technology mimics ecology: dense, mutualistic collaboration networks are associated with higher publication rates.

    Science.gov (United States)

    Sorani, Marco D

    2012-01-01

    Information technology (IT) adoption enables biomedical research. Publications are an accepted measure of research output, and network models can describe the collaborative nature of publication. In particular, ecological networks can serve as analogies for publication and technology adoption. We constructed network models of adoption of bioinformatics programming languages and health IT (HIT) from the literature.We selected seven programming languages and four types of HIT. We performed PubMed searches to identify publications since 2001. We calculated summary statistics and analyzed spatiotemporal relationships. Then, we assessed ecological models of specialization, cooperativity, competition, evolution, biodiversity, and stability associated with publications.Adoption of HIT has been variable, while scripting languages have experienced rapid adoption. Hospital systems had the largest HIT research corpus, while Perl had the largest language corpus. Scripting languages represented the largest connected network components. The relationship between edges and nodes was linear, though Bioconductor had more edges than expected and Perl had fewer. Spatiotemporal relationships were weak. Most languages shared a bioinformatics specialization and appeared mutualistic or competitive. HIT specializations varied. Specialization was highest for Bioconductor and radiology systems. Specialization and cooperativity were positively correlated among languages but negatively correlated among HIT. Rates of language evolution were similar. Biodiversity among languages grew in the first half of the decade and stabilized, while diversity among HIT was variable but flat. Compared with publications in 2001, correlation with publications one year later was positive while correlation after ten years was weak and negative.Adoption of new technologies can be unpredictable. Spatiotemporal relationships facilitate adoption but are not sufficient. As with ecosystems, dense, mutualistic

  8. Mortality from heart attack in Belgrade population during the period 1990-2004

    Directory of Open Access Journals (Sweden)

    Ratkov Isidora

    2008-01-01

    Full Text Available INTRODUCTION In most countries, cardiovascular diseases are the leading disorders, with ischemic heart diseases being the leading cause of death. According to WHO data, every year about 17 million people die of cardiovascular diseases, which is 30% of all deaths. Ischemic heart diseases contribute from one-third to one-half of all deaths due to cardiovascular diseases. Three point eight million men and 3.4 million women in the world die every year from ischemic heart diseases, and in Europe about 2 million. The highest mortality rate from ischemic heart diseases occurs in India, China and Russia. OBJECTIVE The aim of this descriptive epidemiological study was to determine heart attack mortality in Belgrade population during the period 1990-2004. METHOD In the study, we conducted investigation of Belgrade population during the period 1990-2004. Mortality data were obtained from the city institution for statistics. The mortality rates were calculated based on the total Belgrade population obtained from the mean values for the last two register years (1991 and 2002. The mortality rates were standardized using the direct method of standardization according to the world (Segi standard population. RESULTS In the Belgrade population during the period 1990-2004, the participation of mortality rate due to heart attack among deaths from cardiovascular diseases was 17% in males and 10% in females. In Belgrade male population, mean standardized mortality rates (per 100,000 habitants were 50.5 for heart attack, 8.3 for chronic ischemic heart diseases and 4.6 for angina pectoris, while in females the rates were 30.8, 6.7 and 4.2, respectively. Mortality from ischemic heart diseases and from heart attack was higher in males than in females. During the studied 15-year period, on average 755 males and 483 females died due to heart attack every year. Mean standardized mortality rates per 100,000 habitants were 50.0 in male and 31.1 in female population. Males

  9. Heroin and cocaine abusers have higher discount rates for delayed rewards than alcoholics or non-drug-using controls.

    Science.gov (United States)

    Kirby, Kris N; Petry, Nancy M

    2004-04-01

    To test a prediction of the discounting model of impulsiveness that discount rates would be positively associated with addiction. The delay-discount rate refers to the rate of reduction in the present value of a future reward as the delay to that reward increases. We estimated participants' discount rates on the basis of their pattern of choices between smaller immediate rewards ($11-80) and larger, delayed rewards ($25-85; at delays from 1 week to 6 months) in a questionnaire format. Participants had a one-in-six chance of winning a reward that they chose on one randomly selected trial. Heroin (n = 27), cocaine (n = 41) and alcohol (n = 33) abusers and non-drug-using controls (n = 44) were recruited from advertisements. They were tested in a drug abuse research clinic at a medical school. On average, the cocaine and heroin groups had higher rates than controls (both P rates for heroin abusers (P = 0.03), but not for cocaine or alcohol abusers (both P > 0.50). These data suggest that discount rates vary with the preferred drug of abuse, and that high discount rates should be considered in the development of substance abuse prevention and treatment efforts.

  10. Hybrid attacks on model-based social recommender systems

    Science.gov (United States)

    Yu, Junliang; Gao, Min; Rong, Wenge; Li, Wentao; Xiong, Qingyu; Wen, Junhao

    2017-10-01

    With the growing popularity of the online social platform, the social network based approaches to recommendation emerged. However, because of the open nature of rating systems and social networks, the social recommender systems are susceptible to malicious attacks. In this paper, we present a certain novel attack, which inherits characteristics of the rating attack and the relation attack, and term it hybrid attack. Furtherly, we explore the impact of the hybrid attack on model-based social recommender systems in multiple aspects. The experimental results show that, the hybrid attack is more destructive than the rating attack in most cases. In addition, users and items with fewer ratings will be influenced more when attacked. Last but not the least, the findings suggest that spammers do not depend on the feedback links from normal users to become more powerful, the unilateral links can make the hybrid attack effective enough. Since unilateral links are much cheaper, the hybrid attack will be a great threat to model-based social recommender systems.

  11. Heart Attack Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for heart...

  12. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  13. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  14. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  15. Prevalence of eating disorders and eating attacks in narcolepsy

    Directory of Open Access Journals (Sweden)

    Norbert Dahmen

    2008-03-01

    Full Text Available Norbert Dahmen, Julia Becht, Alice Engel, Monika Thommes, Peter TonnPsychiatry Department, University of Mainz, GermanyAbstract: Narcoleptic patients suffer frequently from obesity and type II diabetes. Most patients show a deficit in the energy balance regulating orexinergic system. Nevertheless, it is not known, why narcoleptic patients tend to be obese. We examined 116 narcoleptic patients and 80 controls with the structured interview for anorectic and bulimic eating disorders (SIAB to test the hypothesis that typical or atypical eating attacks or eating disorders may be more frequent in narcoleptic patients. No difference in the current prevalence of eating disorders bulimia nervosa, binge eating disorder, or anorexia nervosa was found, nor was the frequency of eating attacks higher in the narcolepsy group. We conclude that present eating disorders and eating attacks as defined in DSM IV are not the reason for the observed differences in body composition. Additional factors, such as basal metabolic rates and lifestyle factors need to be considered.Keywords: narcolepsy, eating disorder, SIAB, bulimia, anorexia, eating attack

  16. Concerns and perceptions immediately following Superstorm Sandy: ratings for property damage were higher than for health issues.

    Science.gov (United States)

    Burger, Joanna; Gochfeld, Michael

    Governmental officials, health and safety professionals, early responders, and the public are interested in the perceptions and concerns of people faced with a crisis, especially during and immediately after a disaster strikes. Reliable information can lead to increased individual and community preparedness for upcoming crises. The objective of this research was to evaluate concerns of coastal and central New Jersey residents within the first 100 days of Superstorm Sandy's landfall. Respondents living in central New Jersey and Jersey shore communities were differentially impacted by the storm, with shore residents having higher evacuation rates (47% vs. 13%), more flood waters in their homes, longer power outages (average 23 vs. 6 days), and longer periods without Internet (29 vs. 6 days). Ratings of concerns varied both among and within categories as a function of location (central vs. coastal New Jersey), stressor level (ranging from 1 to 3 for combinations of power outages, high winds, and flooding), and demographics. Respondents were most concerned about property damage, health, inconveniences, ecological services, and nuclear power plants in that order. Respondents from the shore gave higher ratings to the concerns within each major category, compared to those from central Jersey. Four findings have implications for understanding future risk, recovery, and resiliency: (1) respondents with the highest stressor level (level 3) were more concerned about water damage than others, (2) respondents with flood damage were more concerned about water drainage and mold than others, (3) respondents with the highest stressor levels rated all ecological services higher than others, and (4) shore respondents rated all ecological services higher than central Jersey residents. These data provide information to design future preparedness plans, improve resiliency for future severe weather events, and reduce public health risk.

  17. Higher Magnitude Cash Payments Improve Research Follow-up Rates Without Increasing Drug Use or Perceived Coercion

    Science.gov (United States)

    Festinger, David S.; Marlowe, Douglas B.; Dugosh, Karen L.; Croft, Jason R.; Arabia, Patricia L.

    2008-01-01

    In a prior study (Festinger et al., 2005) we found that neither the mode (cash vs. gift card) nor magnitude ($10, $40, or $70) of research follow-up payments increased rates of new drug use or perceptions of coercion. However, higher payments and payments in cash were associated with better follow-up attendance, reduced tracking efforts, and improved participant satisfaction with the study. The present study extended those findings to higher payment magnitudes. Participants from an urban outpatient substance abuse treatment program were randomly assigned to receive $70, $100, $130, or $160 in either cash or a gift card for completing a follow-up assessment at 6 months post-admission (n ≅ 50 per cell). Apart from the payment incentives, all participants received a standardized, minimal platform of follow-up efforts. Findings revealed that neither the magnitude nor mode of payment had a significant effect on new drug use or perceived coercion. Consistent with our previous findings, higher payments and cash payments resulted in significantly higher follow-up rates and fewer tracking calls. In addition participants receiving cash vs. gift cards were more likely to use their payments for essential, non-luxury purchases. Follow-up rates for participants receiving cash payments of $100, $130, and $160 approached or exceeded the FDA required minimum of 70% for studies to be considered in evaluations of new medications. This suggests that the use of higher magnitude payments and cash payments may be effective strategies for obtaining more representative follow-up samples without increasing new drug use or perceptions of coercion. PMID:18395365

  18. Higher dose rate Gamma Knife radiosurgery may provide earlier and longer-lasting pain relief for patients with trigeminal neuralgia.

    Science.gov (United States)

    Lee, John Y K; Sandhu, Sukhmeet; Miller, Denise; Solberg, Timothy; Dorsey, Jay F; Alonso-Basanta, Michelle

    2015-10-01

    Gamma Knife radiosurgery (GKRS) utilizes cobalt-60 as its radiation source, and thus dose rate varies as the fixed source decays over its half-life of approximately 5.26 years. This natural decay results in increasing treatment times when delivering the same cumulative dose. It is also possible, however, that the biological effective dose may change based on this dose rate even if the total dose is kept constant. Because patients are generally treated in a uniform manner, radiosurgery for trigeminal neuralgia (TN) represents a clinical model whereby biological efficacy can be tested. The authors hypothesized that higher dose rates would result in earlier and more complete pain relief but only if measured with a sensitive pain assessment tool. One hundred thirty-three patients were treated with the Gamma Knife Model 4C unit at a single center by a single neurosurgeon during a single cobalt life cycle from January 2006 to May 2012. All patients were treated with 80 Gy with a single 4-mm isocenter without blocking. Using an output factor of 0.87, dose rates ranged from 1.28 to 2.95 Gy/min. The Brief Pain Inventory (BPI)-Facial was administered before the procedure and at the first follow-up office visit 1 month from the procedure (mean 1.3 months). Phone calls were made to evaluate patients after their procedures as part of a retrospective study. Univariate and multivariate linear regression was performed on several independent variables, including sex, age in deciles, diagnosis, follow-up duration, prior surgery, and dose rate. In the short-term analysis (mean 1.3 months), patients' self-reported pain intensity at its worst was significantly correlated with dose rate on multivariate analysis (p = 0.028). Similarly, patients' self-reported interference with activities of daily living was closely correlated with dose rate on multivariate analysis (p = 0.067). A 1 Gy/min decrease in dose rate resulted in a 17% decrease in pain intensity at its worst and a 22% decrease

  19. Theoretical and computational study of the energy dependence of the muon transfer rate from hydrogen to higher-Z gases

    Energy Technology Data Exchange (ETDEWEB)

    Bakalov, Dimitar, E-mail: dbakalov@inrne.bas.bg [Institute for Nuclear Research and Nuclear Energy, Bulgarian Academy of Sciences, Tsarigradsko chaussée 72, Sofia 1784 (Bulgaria); Adamczak, Andrzej [Institute of Nuclear Physics, Polish Academy of Sciences, ul. Radzikowskiego 152, 31-342 Krakow (Poland); Stoilov, Mihail [Institute for Nuclear Research and Nuclear Energy, Bulgarian Academy of Sciences, Tsarigradsko chaussée 72, Sofia 1784 (Bulgaria); Vacchi, Andrea [Istituto Nazionale di Fisica Nucleare, Sezione di Trieste, Via A. Valerio 2, 34127 Trieste (Italy)

    2015-01-23

    The recent PSI Lamb shift experiment and the controversy about proton size revived the interest in measuring the hyperfine splitting in muonic hydrogen as an alternative possibility for comparing ordinary and muonic hydrogen spectroscopy data on proton electromagnetic structure. This measurement critically depends on the energy dependence of the muon transfer rate to heavier gases in the epithermal range. The available data provide only qualitative information, and the theoretical predictions have not been verified. We propose a new method by measurements of the transfer rate in thermalized target at different temperatures, estimate its accuracy and investigate the optimal experimental conditions. - Highlights: • Method for measuring the energy dependence of muon transfer rate to higher-Z gases. • Thermalization and depolarization of muonic hydrogen studied by Monte Carlo method. • Optimal experimental conditions determined by Monte Carlo simulations. • Mathematical model and for estimating the uncertainty of the experimental results.

  20. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  1. [Effect of high magnesium ion concentration on the electron transport rate and proton exchange in thylakoid membranes in higher plants].

    Science.gov (United States)

    Ignat'ev, A R; Khorobrykh, S A; Ivanov, B N

    2001-01-01

    The effects of magnesium ion concentration on the rate of electron transport in isolated pea thylakoids were investigated in the pH range from 4.0 up to 8.0. In the absence of magnesium ions in the medium and in the presence of 5 mM MgCl2 in the experiments not only without added artificial acceptors but also with ferricyanide or methylviologen as an acceptor, this rate had a well-expressed maximum at pH 5.0. It was shown that, after depression to minimal values at pH 5.5-6.5, it gradually rose with increasing pH. An increase in magnesium ion concentration up to 20 mM essentially affected the electron transfer rate: it decreased somewhat at pH 4.0-5.0 but increased at higher pH values. At this magnesium ion concentration, the maximum rate was at pH 6.0-6.5 and the minimum, at pH 7.0. Subsequent rise upon increasing pH to 8.0 was expressed more sharply. The influence of high magnesium ion concentration on the rate of electron transport was not observed in the presence of gramicidin D. It was found that without uncoupler, the changes in the electron transfer rate under the influence of magnesium ions correlated to the changes in the first-order rate constant of the proton efflux from thylakoids. It is supposed that the change in the ability of thylakoids to keep protons by the action of magnesium ions is the result of electrostatic interactions of these ions with the charges on the external surface of membranes. A possible role of regulation of the electron transport rate by magnesium ions in vivo is discussed.

  2. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  3. Evaluation of a Multi-Agent System for Simulation and Analysis of Distributed Denial-of-Service Attacks

    National Research Council Canada - National Science Library

    Huu, Tee

    2003-01-01

    DDoS attack is evolving at a rapid and alarming rate; an effective solution must be formulated using an adaptive approach Most of the simulations are performed at the attack phase of the DDoS attack...

  4. Does adding metformin to clomifene citrate lead to higher pregnancy rates in a subset of women with polycystic ovary syndrome?

    Science.gov (United States)

    Moll, E; Korevaar, J C; Bossuyt, P M M; van der Veen, F

    2008-08-01

    An RCT among newly diagnosed, therapy naive women with polycystic ovary syndrome (PCOS) showed no significant differences in ovulation rate, ongoing pregnancy rate or spontaneous abortion rate in favour of clomifene citrate plus metformin compared with clomifene citrate. We wanted to assess whether there are specific subgroups of women with PCOS in whom clomifene citrate plus metformin leads to higher pregnancy rates. Subgroup analysis based on clinical and biochemical parameters of 111 women randomized to clomifene citrate plus metformin compared with 114 women randomized to clomifene citrate plus placebo. The data for age, BMI, waist-hip ratio (WHR) and plasma testosterone were available in all women, 2 h glucose in 80% of women and homeostatic model assessment for assessing insulin sensitivity (HOMA) in 50% of women. Of the women who were allocated to the metformin group, 44 women (40%) reached an ongoing pregnancy. In the placebo group, 52 women (46%) reached an ongoing pregnancy. There was a significantly different chance of an ongoing pregnancy for metformin versus placebo between subgroups based on age and WHR (P = 0.014). There was a positive effect of metformin versus placebo on pregnancy rate in older women (>or=28 years) with a high WHR, a negative effect of metformin versus placebo in young women (Metformin may be an effective addition to clomifene citrate in infertile women with PCOS, especially in older and viscerally obese patients.

  5. The political attack ad

    Directory of Open Access Journals (Sweden)

    Palma Peña-Jiménez, Ph.D.

    2011-01-01

    Full Text Available During election campaigns the political spot has a clear objective: to win votes. This message is communicated to the electorate through television and Internet, and usually presents a negative approach, which includes a direct critical message against the opponent, rather than an exposition of proposals. This article is focused on the analysis of the campaign attack video ad purposely created to encourage the disapproval of the political opponent among voters. These ads focus on discrediting the opponent, many times, through the transmission of ad hominem messages, instead of disseminating the potential of the political party and the virtues and manifesto of its candidate. The article reviews the development of the attack ad since its first appearance, which in Spain dates back to 1996, when the famous Doberman ad was broadcast, and examines the most memorable campaign attack ads.

  6. A fatal elephant attack.

    Science.gov (United States)

    Hejna, Petr; Zátopková, Lenka; Safr, Miroslav

    2012-01-01

    A rare case of an elephant attack is presented. A 44-year-old man working as an elephant keeper was attacked by a cow elephant when he tripped over a foot chain while the animal was being medically treated. The man fell down and was consequently repeatedly attacked with elephant tusks. The man sustained multiple stab injuries to both groin regions, a penetrating injury to the abdominal wall with traumatic prolapse of the loops of the small bowel, multiple defects of the mesentery, and incomplete laceration of the abdominal aorta with massive bleeding into the abdominal cavity. In addition to the penetrating injuries, the man sustained multiple rib fractures with contusion of both lungs and laceration of the right lobe of the liver, and comminuted fractures of the pelvic arch and left femoral body. The man died shortly after he had been received at the hospital. The cause of death was attributed to traumatic shock. © 2011 American Academy of Forensic Sciences.

  7. Optimal counterterrorism and the recruitment effect of large terrorist attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2011-01-01

    We analyze a simple dynamic model of the interaction between terrorists and authorities. Our primary aim is to study optimal counterterrorism and its consequences when large terrorist attacks lead to a temporary increase in terrorist recruitment. First, we show that an increase in counterterrorism...... makes it more likely that terrorist cells plan small rather than large attacks and therefore may increase the probability of a successful attack. Analyzing optimal counterterrorism we see that the recruitment effect makes authorities increase the level of counterterrorism after large attacks. Therefore......, in periods following large attacks a new attack is more likely to be small compared to other periods. Finally, we analyze the long-run consequences of the recruitment effect. We show that it leads to more counterterrorism, more small attacks, and a higher sum of terrorism damage and counterterrorism costs...

  8. Anti-spoofing for display and print attacks on palmprint verification systems

    Science.gov (United States)

    Kanhangad, Vivek; Bhilare, Shruti; Garg, Pragalbh; Singh, Pranjalya; Chaudhari, Narendra

    2015-05-01

    A number of approaches for personal authentication using palmprint features have been proposed in the literature, majority of which focus on improving the matching performance. However, of late, preventing potential attacks on biometric systems has become a major concern as more and more biometric systems get deployed for wide range of applications. Among various types of attacks, sensor level attack, commonly known as spoof attack, has emerged as the most common attack due to simplicity in its execution. In this paper, we present an approach for detection of display and print based spoof attacks on palmprint verifcation systems. The approach is based on the analysis of acquired hand images for estimating surface re ectance. First and higher order statistical features computed from the distributions of pixel intensities and sub-band wavelet coeefficients form the feature set. A trained binary classifier utilizes the discriminating information to determine if the acquired image is of real hand or a fake one. Experiments are performed on a publicly available hand image dataset, containing 1300 images corresponding to 230 subjects. Experimental results show that the real hand biometrics samples can be substituted by the fake digital or print copies with an alarming spoof acceptance rate as high as 79.8%. Experimental results also show that the proposed spoof detection approach is very effective for discriminating between real and fake palmprint images. The proposed approach consistently achieves over 99% average 10-fold cross validation classification accuracy in our experiments.

  9. Does Prison Crowding Predict Higher Rates of Substance Use Related Parole Violations? A Recurrent Events Multi-Level Survival Analysis.

    Directory of Open Access Journals (Sweden)

    Michael A Ruderman

    Full Text Available This administrative data-linkage cohort study examines the association between prison crowding and the rate of post-release parole violations in a random sample of prisoners released with parole conditions in California, for an observation period of two years (January 2003 through December 2004.Crowding overextends prison resources needed to adequately protect inmates and provide drug rehabilitation services. Violence and lack of access to treatment are known risk factors for drug use and substance use disorders. These and other psychosocial effects of crowding may lead to higher rates of recidivism in California parolees.Rates of parole violation for parolees exposed to high and medium levels of prison crowding were compared to parolees with low prison crowding exposure. Hazard ratios (HRs with 95% confidence intervals (CIs were estimated using a Cox model for recurrent events. Our dataset included 13070 parolees in California, combining individual level parolee data with aggregate level crowding data for multilevel analysis.Comparing parolees exposed to high crowding with those exposed to low crowding, the effect sizes from greatest to least were absconding violations (HR 3.56 95% CI: 3.05-4.17, drug violations (HR 2.44 95% CI: 2.00-2.98, non-violent violations (HR 2.14 95% CI: 1.73-2.64, violent and serious violations (HR 1.88 95% CI: 1.45-2.43, and technical violations (HR 1.86 95% CI: 1.37-2.53.Prison crowding predicted higher rates of parole violations after release from prison. The effect was magnitude-dependent and particularly strong for drug charges. Further research into whether adverse prison experiences, such as crowding, are associated with recidivism and drug use in particular may be warranted.

  10. Does Prison Crowding Predict Higher Rates of Substance Use Related Parole Violations? A Recurrent Events Multi-Level Survival Analysis.

    Science.gov (United States)

    Ruderman, Michael A; Wilson, Deirdra F; Reid, Savanna

    2015-01-01

    This administrative data-linkage cohort study examines the association between prison crowding and the rate of post-release parole violations in a random sample of prisoners released with parole conditions in California, for an observation period of two years (January 2003 through December 2004). Crowding overextends prison resources needed to adequately protect inmates and provide drug rehabilitation services. Violence and lack of access to treatment are known risk factors for drug use and substance use disorders. These and other psychosocial effects of crowding may lead to higher rates of recidivism in California parolees. Rates of parole violation for parolees exposed to high and medium levels of prison crowding were compared to parolees with low prison crowding exposure. Hazard ratios (HRs) with 95% confidence intervals (CIs) were estimated using a Cox model for recurrent events. Our dataset included 13070 parolees in California, combining individual level parolee data with aggregate level crowding data for multilevel analysis. Comparing parolees exposed to high crowding with those exposed to low crowding, the effect sizes from greatest to least were absconding violations (HR 3.56 95% CI: 3.05-4.17), drug violations (HR 2.44 95% CI: 2.00-2.98), non-violent violations (HR 2.14 95% CI: 1.73-2.64), violent and serious violations (HR 1.88 95% CI: 1.45-2.43), and technical violations (HR 1.86 95% CI: 1.37-2.53). Prison crowding predicted higher rates of parole violations after release from prison. The effect was magnitude-dependent and particularly strong for drug charges. Further research into whether adverse prison experiences, such as crowding, are associated with recidivism and drug use in particular may be warranted.

  11. Does Prison Crowding Predict Higher Rates of Substance Use Related Parole Violations? A Recurrent Events Multi-Level Survival Analysis

    Science.gov (United States)

    Ruderman, Michael A.; Wilson, Deirdra F.; Reid, Savanna

    2015-01-01

    Objective This administrative data-linkage cohort study examines the association between prison crowding and the rate of post-release parole violations in a random sample of prisoners released with parole conditions in California, for an observation period of two years (January 2003 through December 2004). Background Crowding overextends prison resources needed to adequately protect inmates and provide drug rehabilitation services. Violence and lack of access to treatment are known risk factors for drug use and substance use disorders. These and other psychosocial effects of crowding may lead to higher rates of recidivism in California parolees. Methods Rates of parole violation for parolees exposed to high and medium levels of prison crowding were compared to parolees with low prison crowding exposure. Hazard ratios (HRs) with 95% confidence intervals (CIs) were estimated using a Cox model for recurrent events. Our dataset included 13070 parolees in California, combining individual level parolee data with aggregate level crowding data for multilevel analysis. Results Comparing parolees exposed to high crowding with those exposed to low crowding, the effect sizes from greatest to least were absconding violations (HR 3.56 95% CI: 3.05–4.17), drug violations (HR 2.44 95% CI: 2.00–2.98), non-violent violations (HR 2.14 95% CI: 1.73–2.64), violent and serious violations (HR 1.88 95% CI: 1.45–2.43), and technical violations (HR 1.86 95% CI: 1.37–2.53). Conclusions Prison crowding predicted higher rates of parole violations after release from prison. The effect was magnitude-dependent and particularly strong for drug charges. Further research into whether adverse prison experiences, such as crowding, are associated with recidivism and drug use in particular may be warranted. PMID:26492490

  12. Higher Rate of Tuberculosis in Second Generation Migrants Compared to Native Residents in a Metropolitan Setting in Western Europe

    Science.gov (United States)

    Marx, Florian M.; Fiebig, Lena; Hauer, Barbara; Brodhun, Bonita; Glaser-Paschke, Gisela; Haas, Walter

    2015-01-01

    Background In Western Europe, migrants constitute an important risk group for tuberculosis, but little is known about successive generations of migrants. We aimed to characterize migration among tuberculosis cases in Berlin and to estimate annual rates of tuberculosis in two subsequent migrant generations. We hypothesized that second generation migrants born in Germany are at higher risk of tuberculosis compared to native (non-migrant) residents. Methods A prospective cross-sectional study was conducted. All tuberculosis cases reported to health authorities in Berlin between 11/2010 and 10/2011 were eligible. Interviews were conducted using a structured questionnaire including demographic data, migration history of patients and their parents, and language use. Tuberculosis rates were estimated using 2011 census data. Results Of 314 tuberculosis cases reported, 154 (49.0%) participated. Of these, 81 (52.6%) were first-, 14 (9.1%) were second generation migrants, and 59 (38.3%) were native residents. The tuberculosis rate per 100,000 individuals was 28.3 (95CI: 24.0–32.6) in first-, 10.2 (95%CI: 6.1–16.6) in second generation migrants, and 4.6 (95%CI: 3.7–5.6) in native residents. When combining information from the standard notification variables country of birth and citizenship, the sensitivity to detect second generation migration was 28.6%. Conclusions There is a higher rate of tuberculosis among second generation migrants compared to native residents in Berlin. This may be explained by presumably frequent contact and transmission within migrant populations. Second generation migration is insufficiently captured by the surveillance variables country of birth and citizenship. Surveillance systems in Western Europe should allow for quantifying the tuberculosis burden in this important risk group. PMID:26061733

  13. Modified Mitchell osteotomy alone does not have higher rate of residual metatarsalgia than combined first and lesser metatarsal osteotomy

    Directory of Open Access Journals (Sweden)

    Shu-Jung Chen

    2015-04-01

    Full Text Available Transfer metatarsalgia (TM is a common forefoot disorder secondary to hallux valgus (HV. Some authors suggest that a combined lesser metatarsal osteotomy while undergoing HV surgery improves metatarsalgia, whereas others concluded that isolated HV corrective osteotomy can improve symptomatic metatarsalgia. The main purpose of this retrospective study was to compare clinical outcomes in patients with and without combined lesser metatarsal osteotomy while receiving HV correction surgery. We retrospectively reviewed the patients who underwent osteotomy for HV correction between January 2000 and December 2010. All patients underwent HV correction with modified Mitchell osteotomy. Clinical evaluations including the American Orthopaedic Foot and Ankle Society score and residual metatarsalgia were assessed, and radiographic measurements were carried out. Sixty-five patients (83 feet meeting the selection criteria were enrolled. Thirty feet receiving a combined lesser metatarsal osteotomy were classified as the combined surgery (CS group, and the others were classified as the control (CN group (53 feet. The overall rate of persistent symptomatic metatarsalgia was 19.28% after operative treatment. There were six feet with residual metatarsalgia in the CS group, and 10 feet in the CN group. There was no significant difference in the rate of persistent symptoms between the two groups (p = 0.9. According to this result, modified Mitchell osteotomy alone did not have a higher rate of residual metatarsalgia than CS. We also found that the average recovery rate of TM was about 80.7% and those patients whose preoperative HV angle was > 30° had the higher risk of residual metatarsalgia after surgery.

  14. Attacker Model Lab

    OpenAIRE

    2006-01-01

    tut quiz present Tutorial Quiz Presentation Interactive Media Element This interactive tutorial the two sub-classes of computer attackers: amateurs and professionals. It provides valuable insight into the nature of necessary protection measure for information assets. CS3600 Information Assurance: Introduction to Computer Security Course

  15. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... major stroke. It's important to call 9-1-1 immediately for any stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. The content in this ...

  16. Temporal Cyber Attack Detection.

    Energy Technology Data Exchange (ETDEWEB)

    Ingram, Joey Burton [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Draelos, Timothy J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Galiardi, Meghan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Doak, Justin E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Rigorous characterization of the performance and generalization ability of cyber defense systems is extremely difficult, making it hard to gauge uncertainty, and thus, confidence. This difficulty largely stems from a lack of labeled attack data that fully explores the potential adversarial space. Currently, performance of cyber defense systems is typically evaluated in a qualitative manner by manually inspecting the results of the system on live data and adjusting as needed. Additionally, machine learning has shown promise in deriving models that automatically learn indicators of compromise that are more robust than analyst-derived detectors. However, to generate these models, most algorithms require large amounts of labeled data (i.e., examples of attacks). Algorithms that do not require annotated data to derive models are similarly at a disadvantage, because labeled data is still necessary when evaluating performance. In this work, we explore the use of temporal generative models to learn cyber attack graph representations and automatically generate data for experimentation and evaluation. Training and evaluating cyber systems and machine learning models requires significant, annotated data, which is typically collected and labeled by hand for one-off experiments. Automatically generating such data helps derive/evaluate detection models and ensures reproducibility of results. Experimentally, we demonstrate the efficacy of generative sequence analysis techniques on learning the structure of attack graphs, based on a realistic example. These derived models can then be used to generate more data. Additionally, we provide a roadmap for future research efforts in this area.

  17. Machine Learning Methods for Attack Detection in the Smart Grid.

    Science.gov (United States)

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.

  18. False Positive and False Negative Effects on Network Attacks

    Science.gov (United States)

    Shang, Yilun

    2018-01-01

    Robustness against attacks serves as evidence for complex network structures and failure mechanisms that lie behind them. Most often, due to detection capability limitation or good disguises, attacks on networks are subject to false positives and false negatives, meaning that functional nodes may be falsely regarded as compromised by the attacker and vice versa. In this work, we initiate a study of false positive/negative effects on network robustness against three fundamental types of attack strategies, namely, random attacks (RA), localized attacks (LA), and targeted attack (TA). By developing a general mathematical framework based upon the percolation model, we investigate analytically and by numerical simulations of attack robustness with false positive/negative rate (FPR/FNR) on three benchmark models including Erdős-Rényi (ER) networks, random regular (RR) networks, and scale-free (SF) networks. We show that ER networks are equivalently robust against RA and LA only when FPR equals zero or the initial network is intact. We find several interesting crossovers in RR and SF networks when FPR is taken into consideration. By defining the cost of attack, we observe diminishing marginal attack efficiency for RA, LA, and TA. Our finding highlights the potential risk of underestimating or ignoring FPR in understanding attack robustness. The results may provide insights into ways of enhancing robustness of network architecture and improve the level of protection of critical infrastructures.

  19. Blocking of Brute Force Attack

    OpenAIRE

    M.Venkata Krishna Reddy

    2012-01-01

    A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your Web site requires user authentication, you are a good target for a brute-force attack. An attacker can always discover a password through a brute-force attack, but the downside is that it co...

  20. Obese Japanese adults with type 2 diabetes have higher basal metabolic rates than non-diabetic adults.

    Science.gov (United States)

    Miyake, Rieko; Ohkawara, Kazunori; Ishikawa-Takata, Kazuko; Morita, Akemi; Watanabe, Shaw; Tanaka, Shigeho

    2011-01-01

    Several cross-sectional studies in Pima Indians and Caucasians have indicated that obese individuals with type 2 diabetes have a higher basal metabolic rate (BMR) than healthy, obese individuals. However, no study has investigated this comparison in Japanese subjects, who are known to be susceptible to type 2 diabetes due to genetic characteristics. Thirty obese Japanese adults with pre-type 2 diabetes (n=7) or type 2 diabetes (n=13) or without diabetes (n=10) participated in this study. BMR was measured using indirect calorimetry. The relationships between residual BMR (calculated as measured BMR minus BMR adjusted for fat-free mass, fat mass, age, and sex) and biomarkers including fasting glucose, glycosylated hemoglobin (HbA(1c)), fasting insulin, homeostasis model assessment of insulin resistance (HOMA-R), triglycerides, and free fatty acids were examined using Pearson's correlation. BMR in diabetic subjects adjusted for fat-free mass, fat mass, age, and sex was 7.1% higher than in non-diabetic subjects. BMR in diabetic subjects was also significantly (pBMR and fasting glucose (r=0.391, p=0.032). These results indicate that in the Japanese population, obese subjects with type 2 diabetes have higher BMR compared with obese non-diabetic subjects. The fasting glucose level may contribute to these differences.

  1. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  2. Automated Discovery of Mimicry Attacks

    National Research Council Canada - National Science Library

    Giffin, Jonathon T; Jha, Somesh; Miller, Barton P

    2006-01-01

    .... These systems are useful only if they detect actual attacks. Previous research developed manually-constructed mimicry and evasion attacks that avoided detection by hiding a malicious series of system calls within a valid sequence allowed by the model...

  3. Heart Attack Symptoms in Women

    Science.gov (United States)

    ... fat, cholesterol and other substances (plaque). Watch an animation of a heart attack . Many women think the ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  4. Attack Trees with Sequential Conjunction

    NARCIS (Netherlands)

    Jhawar, Ravi; Kordy, Barbara; Mauw, Sjouke; Radomirović, Sasa; Trujillo-Rasua, Rolando

    2015-01-01

    We provide the first formal foundation of SAND attack trees which are a popular extension of the well-known attack trees. The SAND at- tack tree formalism increases the expressivity of attack trees by intro- ducing the sequential conjunctive operator SAND. This operator enables the modeling of

  5. Is the higher rate of parental child homicide in stepfamilies an effect of non-genetic relatedness?

    Institute of Scientific and Technical Information of China (English)

    Hans TEMRIN; Johanna NORDLUND; Mikael RYING; Birgitta S. TULLBERG

    2011-01-01

    In an evolutionary perspective individuals are expected to vary the degree of parental love and care in relation to the fitness value that a child represents. Hence, stepparents are expected to show less solicitude than genetically related parents, and this lack of genetic relatedness has been used to explain the higher frequencies of child abuse and homicide found in stepfamilies.However, other factors than non-genetic relatedness may cause this over-representation in stepfamilies. Here we use a 45-year data set of parental child homicides in Sweden to test two hypotheses related to the higher incidence in stepfamilies: 1) adults in different types of family differ in their general disposition to use violence, and 2) parents are more likely to kill stepchildren than genetically related children. Of the 152 perpetrators in biparental families there was an overrepresentation of perpetrators in stepfamilies (n=27) compared with the general population. We found support for the first hypothesis in that both general and violent crime rates were higher in stepfamilies, both in the general population and among perpetrators of child homicide. However, we found no support for the second hypothesis because of the 27 perpetrators in stepfamilies the perpetrator killed a genetically related child in 13 cases, a stepchild in 13 cases and both types of children in one case. Moreover, out of the 12 families where the perpetrator lived with both stepchildren and genetic children, there was no bias towards killing stepchildren. Thus, we found no evidence for an effect of non-genetic relatedness per se [Current Zoology 57 (3): 253-59, 2011].

  6. Training in Using Earplugs or Using Earplugs with a Higher than Necessary Noise Reduction Rating? A Randomized Clinical Trial

    Directory of Open Access Journals (Sweden)

    M Salmani Nodoushan

    2014-09-01

    Full Text Available Background: Noise-induced hearing loss (NIHL is one of the most common occupational diseases and the second most common cause of workers' claims for occupational injuries. Objective: Due to high prevalence of NIHL and several reports of improper use of hearing protective devices (HPDs, we conducted this study to compare the effect of face-to-face training in effective use of earplugs with appropriate NRR to overprotection of workers by using earplugs with higher than necessary noise reduction rating (NRR. Methods: In a randomized clinical trial, 150 workers referred to occupational medicine clinic were randomly allocated to three arms—a group wearing earplugs with an NRR of 25 with no training in appropriate use of the device; a group wearing earplugs with an NRR of 25 with training; another group wearing earplugs with an NRR of 30, with no training. Hearing threshold was measured in the study groups by real ear attenuation at threshold (REAT method. This trial is registered with Australian New Zealand clinical trials Registry, number ACTRN00363175. Results: The mean±SD age of the participants was 28±5 (range: 19–39 years. 42% of participants were female. The mean noise attenuation in the group with training was 13.88 dB, significantly higher than those observed in other groups. The highest attenuation was observed in high frequencies (4, 6, and 8 kHz in the group with training. Conclusion: Training in appropriate use of earplugs significantly affects the efficacy of earplugs—even more than using an earplug with higher NRR.

  7. Is the higher rate of parental child homicide in stepfamilies an effect of non-genetic relatedness?

    Directory of Open Access Journals (Sweden)

    Hans TEMRIN, Johanna NORDLUND, Mikael RYING, Birgitta S. TULLBERG

    2011-06-01

    Full Text Available In an evolutionary perspective individuals are expected to vary the degree of parental love and care in relation to the fitness value that a child represents. Hence, stepparents are expected to show less solicitude than genetically related parents, and this lack of genetic relatedness has been used to explain the higher frequencies of child abuse and homicide found in stepfamilies. However, other factors than non-genetic relatedness may cause this over-representation in stepfamilies. Here we use a 45-year data set of parental child homicides in Sweden to test two hypotheses related to the higher incidence in stepfamilies: 1 adults in different types of family differ in their general disposition to use violence, and 2 parents are more likely to kill stepchildren than genetically related children. Of the 152 perpetrators in biparental families there was an overrepresentation of perpetrators in stepfamilies (n=27 compared with the general population. We found support for the first hypothesis in that both general and violent crime rates were higher in stepfamilies, both in the general population and among perpetrators of child homicide. However, we found no support for the second hypothesis because of the 27 perpetrators in stepfamilies the perpetrator killed a genetically related child in 13 cases, a stepchild in 13 cases and both types of children in one case. Moreover, out of the 12 families where the perpetrator lived with both stepchildren and genetic children, there was no bias towards killing stepchildren. Thus, we found no evidence for an effect of non-genetic relatedness per se [Current Zoology 57 (3: 253–259, 2011].

  8. The Offer of Advanced Imaging Techniques Leads to Higher Acceptance Rates for Screening Colonoscopy - a Prospective Study.

    Science.gov (United States)

    Albrecht, Heinz; Gallitz, Julia; Hable, Robert; Vieth, Michael; Tontini, Gian Eugenio; Neurath, Markus Friedrich; Riemann, Jurgen Ferdinand; Neumann, Helmut

    2016-01-01

    Colonoscopy plays a fundamental role in early diagnosis and management of colorectal cancer and requires public and professional acceptance to ensure the ongoing success of screening programs. The aim of the study was to prospectively assess whether patient acceptance rates to undergo screening colonoscopy could be improved by the offer of advanced imaging techniques. Overall, 372 randomly selected patients were prospectively included. A standardized questionnaire was developed that inquired of the patients their knowledge regarding advanced imaging techniques. Second, several media campaigns and information events were organized reporting about advanced imaging techniques, followed by repeated evaluation. After one year the evaluation ended. At baseline, 64% of the patients declared that they had no knowledge about new endoscopic methods. After twelve months the overall grade of information increased significantly from 14% at baseline to 34%. The percentage of patients who decided to undergo colonoscopy because of the offer of new imaging methods also increased significantly from 12% at baseline to 42% after 12 months. Patients were highly interested in the offer of advanced imaging techniques. Knowledge about these techniques could relatively easy be provided using local media campaigns. The offer of advanced imaging techniques leads to higher acceptance rates for screening colonoscopies.

  9. Non-English speakers attend gastroenterology clinic appointments at higher rates than English speakers in a vulnerable patient population

    Science.gov (United States)

    Sewell, Justin L.; Kushel, Margot B.; Inadomi, John M.; Yee, Hal F.

    2009-01-01

    Goals We sought to identify factors associated with gastroenterology clinic attendance in an urban safety net healthcare system. Background Missed clinic appointments reduce the efficiency and availability of healthcare, but subspecialty clinic attendance among patients with established healthcare access has not been studied. Study We performed an observational study using secondary data from administrative sources to study patients referred to, and scheduled for an appointment in, the adult gastroenterology clinic serving the safety net healthcare system of San Francisco, California. Our dependent variable was whether subjects attended or missed a scheduled appointment. Analysis included multivariable logistic regression and classification tree analysis. 1,833 patients were referred and scheduled for an appointment between 05/2005 and 08/2006. Prisoners were excluded. All patients had a primary care provider. Results 683 patients (37.3%) missed their appointment; 1,150 (62.7%) attended. Language was highly associated with attendance in the logistic regression; non-English speakers were less likely than English speakers to miss an appointment (adjusted odds ratio 0.42 [0.28,0.63] for Spanish, 0.56 [0.38,0.82] for Asian language, p gastroenterology clinic appointment, not speaking English was most strongly associated with higher attendance rates. Patient related factors associated with not speaking English likely influence subspecialty clinic attendance rates, and these factors may differ from those affecting general healthcare access. PMID:19169147

  10. 3D versus 2D Systematic Transrectal Ultrasound-Guided Prostate Biopsy: Higher Cancer Detection Rate in Clinical Practice

    Directory of Open Access Journals (Sweden)

    Alexandre Peltier

    2013-01-01

    Full Text Available Objectives. To compare prostate cancer detection rates of extended 2D versus 3D biopsies and to further assess the clinical impact of this method in day-to-day practice. Methods. We analyzed the data of a cohort of 220 consecutive patients with no prior history of prostate cancer who underwent an initial prostate biopsy in daily practice due to an abnormal PSA and/or DRE using, respectively, the classical 2D and the new 3D systems. All the biopsies were done by a single experienced operator using the same standardized protocol. Results. There was no significant difference in terms of age, total PSA, or prostate volume between the two groups. However, cancer detection rate was significantly higher using the 3D versus the 2D system, 50% versus 34% (P<0.05. There was no statistically significant difference while comparing the 2 groups in term of nonsignificant cancer detection. Conclusion. There is reasonable evidence demonstrating the superiority of the 3D-guided biopsies in detecting prostate cancers that would have been missed using the 2D extended protocol.

  11. Classifier fusion for VoIP attacks classification

    Science.gov (United States)

    Safarik, Jakub; Rezac, Filip

    2017-05-01

    SIP is one of the most successful protocols in the field of IP telephony communication. It establishes and manages VoIP calls. As the number of SIP implementation rises, we can expect a higher number of attacks on the communication system in the near future. This work aims at malicious SIP traffic classification. A number of various machine learning algorithms have been developed for attack classification. The paper presents a comparison of current research and the use of classifier fusion method leading to a potential decrease in classification error rate. Use of classifier combination makes a more robust solution without difficulties that may affect single algorithms. Different voting schemes, combination rules, and classifiers are discussed to improve the overall performance. All classifiers have been trained on real malicious traffic. The concept of traffic monitoring depends on the network of honeypot nodes. These honeypots run in several networks spread in different locations. Separation of honeypots allows us to gain an independent and trustworthy attack information.

  12. Investigating the Possibility to Individualize Asthma Attack Therapy Based on Attack Severity and Patient Characteristics

    Directory of Open Access Journals (Sweden)

    Sárkány Zoltán

    2016-03-01

    Full Text Available Introduction: The objective of this study was to investigate with the help of a computerized simulation model whether the treatment of an acute asthma attack can be individualized based on the severity of the attack and the characteristics of the patient. Material and Method: A stochastic lung model was used to simulate the deposition of 1 nm - 10 μm particles during a mild and a moderate asthma attack. Breathing parameters were varied to maximize deposition, and simulation results were compared with those obtained in the case of a severe asthma attack. In order to investigate the effect of height on the deposition of inhaled particles, another series of simulations was carried out with identical breathing parameters, comparing patient heights of 155 cm, 175 cm and 195 cm. Results: The optimization process yielded an increase in the maximum deposition values of around 6-7% for each type of investigated asthma attack, and the difference between attacks of different degree of severity was around 5% for both the initial and the optimized values, a higher degree of obstruction increasing the amount of deposited particles. Conclusions: Our results suggest that the individualization of asthma attack treatment cannot be based on particles of different size, as the highest deposited fraction in all three types of attacks can be obtained using 0.01 μm particles. The use of a specific set of breathing parameters yields a difference between a mild and a moderate, as well as a moderate and a severe asthma attack of around 5%.

  13. Obfuscated RSUs Vector Based Signature Scheme for Detecting Conspiracy Sybil Attack in VANETs

    Directory of Open Access Journals (Sweden)

    Xia Feng

    2017-01-01

    Full Text Available Given the popularity of vehicular Ad hoc networks (VANETs in traffic management, a new challenging issue comes into traffic safety, that is, security of the networks, especially when the adversary breaks defence. Sybil attack, for example, is a potential security threat through forging several identities to carry out attacks in VANETs. At this point, the paper proposed a solution named DMON that is a Sybil attack detection method with obfuscated neighbor relationship of Road Side Units (RSUs. DMON presents a ring signature based identification scheme and replaces vehicles’ identities with their trajectory for the purpose of anonymity. Furthermore, the neighbor relationship of RSUs is obfuscated to achieve privacy preserving of locations. The proposed scheme has been formally proved in the views of security and performance. Simulation has also been implemented to validate the scheme, in which the findings reveal the lower computational overhead and higher detection rate comparing with other related solutions.

  14. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  15. [Clinical pathway for management of patients with acute asthma attack].

    Science.gov (United States)

    Azuma, Naoto; Katada, Yoshinori; Kobayashi, Masaaki; Kojima, Makiko; Nakajima, Yumi; Shibano, Miyo; Tomita, Hitomi; Yamanaka, Takao; Harada, Yoshinori; Ishii, Taeko; Saeki, Yukihiko

    2008-11-01

    There have been few reports of clinical pathway (CP) for treatment of asthma attack, because patients with asthma always admit emergently and the severity varies. We introduced CP so that standard asthma treatment can be widely used, and investigated its clinical usefulness. We designed a new CP for treating asthma attack according to the guideline (Japanese guideline (JGL) and Global Initiative for Asthma (GINA)). 136 patients who admitted to our hospital due to asthma attack from January 1999 to November 2006, were enrolled our study. Excluding cases complicated with pneumonia, COPD or cardiac failure, we evaluated 46 cases treated with the CP comparing with 19 cases treated without the CP. The clinical evaluations include systemic and inhaled steroid use, FEV1.0%, history of asthma, and the duration of asthma attack. Furthermore, we investigated difference between cases with and without prolonged admission. While the rates of systemic and inhaled steroid use in cases without the CP were 57.9% and 52.6% respectively, those in cases with the CP were approximately 100%. Employing the CP, FEV 1.0% at discharge time was elevated from 71.7% to 76.3% and the duration of hospitalization was shortened from 14.2 days to 11.5 days. Mean age of the cases with prolonged admission was higher than the rest. The asthma CP is an effective way for the standard treatment according to the guideline to be used widely even by doctors who are not familiar with asthma treatment. It improves the efficacy of in-hospital treatment.

  16. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    The need to assess security and take protection decisions is at least as old as our civilisation. However, the complexity and development speed of our interconnected technical systems have surpassed our capacity to imagine and evaluate risk scenarios. This holds in particular for risks...... that are caused by the strategic behaviour of adversaries. Therefore, technology-supported methods are needed to help us identify and manage these risks. In this paper, we describe the attack navigator: a graph-based approach to security risk assessment inspired by navigation systems. Based on maps of a socio...

  17. Attacks on computer systems

    Directory of Open Access Journals (Sweden)

    Dejan V. Vuletić

    2012-01-01

    Full Text Available Computer systems are a critical component of the human society in the 21st century. Economic sector, defense, security, energy, telecommunications, industrial production, finance and other vital infrastructure depend on computer systems that operate at local, national or global scales. A particular problem is that, due to the rapid development of ICT and the unstoppable growth of its application in all spheres of the human society, their vulnerability and exposure to very serious potential dangers increase. This paper analyzes some typical attacks on computer systems.

  18. HIV positivity but not HPV/p16 status is associated with higher recurrence rate in anal cancer.

    Science.gov (United States)

    Meyer, Joshua E; Panico, Vinicius J A; Marconato, Heloisa M F; Sherr, David L; Christos, Paul; Pirog, Edyta C

    2013-12-01

    .06). The regional and distant failure rate was not related to HPV/p16 positivity or histologic differentiation of ACA; however, HIV positivity appeared to be associated with a higher recurrence rate and worse recurrence-free survival.

  19. Satellite telemetry reveals higher fishing mortality rates than previously estimated, suggesting overfishing of an apex marine predator.

    Science.gov (United States)

    Byrne, Michael E; Cortés, Enric; Vaudo, Jeremy J; Harvey, Guy C McN; Sampson, Mark; Wetherbee, Bradley M; Shivji, Mahmood

    2017-08-16

    Overfishing is a primary cause of population declines for many shark species of conservation concern. However, means of obtaining information on fishery interactions and mortality, necessary for the development of successful conservation strategies, are often fisheries-dependent and of questionable quality for many species of commercially exploited pelagic sharks. We used satellite telemetry as a fisheries-independent tool to document fisheries interactions, and quantify fishing mortality of the highly migratory shortfin mako shark ( Isurus oxyrinchus ) in the western North Atlantic Ocean. Forty satellite-tagged shortfin mako sharks tracked over 3 years entered the Exclusive Economic Zones of 19 countries and were harvested in fisheries of five countries, with 30% of tagged sharks harvested. Our tagging-derived estimates of instantaneous fishing mortality rates ( F = 0.19-0.56) were 10-fold higher than previous estimates from fisheries-dependent data (approx. 0.015-0.024), suggesting data used in stock assessments may considerably underestimate fishing mortality. Additionally, our estimates of F were greater than those associated with maximum sustainable yield, suggesting a state of overfishing. This information has direct application to evaluations of stock status and for effective management of populations, and thus satellite tagging studies have potential to provide more accurate estimates of fishing mortality and survival than traditional fisheries-dependent methodology. © 2017 The Author(s).

  20. Water Exchange Produces Significantly Higher Adenoma Detection Rate Than Water Immersion: Pooled Data From 2 Multisite Randomized Controlled Trials.

    Science.gov (United States)

    Leung, Felix W; Koo, Malcolm; Cadoni, Sergio; Falt, Premysl; Hsieh, Yu-Hsi; Amato, Arnaldo; Erriu, Matteo; Fojtik, Petr; Gallittu, Paolo; Hu, Chi-Tan; Leung, Joseph W; Liggi, Mauro; Paggi, Silvia; Radaelli, Franco; Rondonotti, Emanuele; Smajstrla, Vit; Tseng, Chih-Wei; Urban, Ondrej

    2018-03-02

    To test the hypothesis that water exchange (WE) significantly increases adenoma detection rates (ADR) compared with water immersion (WI). Low ADR was linked to increased risk for interval colorectal cancers and related deaths. Two recent randomized controlled trials of head-to-head comparison of WE, WI, and traditional air insufflation (AI) each showed that WE achieved significantly higher ADR than AI, but not WI. The data were pooled from these 2 studies to test the above hypothesis. Two trials (5 sites, 14 colonoscopists) that randomized 1875 patients 1:1:1 to AI, WI, or WE were pooled and analyzed with ADR as the primary outcome. The ADR of AI (39.5%) and WI (42.4%) were comparable, significantly lower than that of WE (49.6%) (vs. AI P=0.001; vs. WI P=0.033). WE insertion time was 3 minutes longer than that of AI (Prate (vs. AI) of the >10 mm advanced adenomas. Right colon combined advanced and sessile serrated ADR of AI (3.4%) and WI (5%) were comparable and were significantly lower than that of WE (8.5%) (vs. AI P<0.001; vs. WI P=0.039). Compared with AI and WI, the superior ADR of WE offsets the drawback of a significantly longer insertion time. For quality improvement focused on increasing adenoma detection, WE is preferred over WI. The hypothesis that WE could lower the risk of interval colorectal cancers and related deaths should be tested.

  1. Recent "phishing" attacks

    CERN Multimedia

    IT Department

    2009-01-01

    Over the last few weeks there has been a marked increase in the number of attacks on CERN made by cybercriminals. Typical attacks arrive in the form of e-mail messages purporting to come from the CERN Help Desk, Mail Service, or some similarly official-sounding entity and suggest that there is a problem with your account, such as it being over-quota. They then ask you to click on a link or to reply and give your password. Please don’t! Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. NEVER provide your password or other details if these are requested. These messages try to trick you into clicking on Web links which will help them to install malicious software on your computer, and anti-virus software cannot be relied on to detect all cases. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN Comput...

  2. International comparisons of preterm birth: higher rates of late preterm birth are associated with lower rates of stillbirth and neonatal death.

    Science.gov (United States)

    Lisonkova, S; Sabr, Y; Butler, B; Joseph, K S

    2012-12-01

    To examine international rates of preterm birth and potential associations with stillbirths and neonatal deaths at late preterm and term gestation. Ecological study. Canada, USA and 26 countries in Europe. All deliveries in 2004. Information on preterm birth (Statistics Canada, the EURO-PERISTAT project and the National Center for Health Statistics. Pearson correlation coefficients and random-intercept Poisson regression were used to examine the association between preterm birth rates and gestational age-specific stillbirth and neonatal death rates. Rate ratios with 95% confidence intervals were estimated after adjustment for maternal age, parity and multiple births. Stillbirths and neonatal deaths ≥ 32 and ≥ 37 weeks of gestation. International rates of preterm birth (births. Preterm birth rates at 32-36 weeks were inversely associated with stillbirths at ≥ 32 weeks (adjusted rate ratio 0.94, 95% CI 0.92-0.96) and ≥ 37 weeks (adjusted rate ratio 0.88, 95% CI 0.85-0.91) of gestation and inversely associated with neonatal deaths at ≥ 32 weeks (adjusted rate ratio 0.88, 95% CI 0.85-0.91) and ≥ 37 weeks (adjusted rate ratio 0.82, 95% CI 0.78-0.86) of gestation. Countries with high rates of preterm birth at 32-36 weeks of gestation have lower stillbirth and neonatal death rates at and beyond 32 weeks of gestation. Contemporary rates of preterm birth are indicators of both perinatal health and obstetric care services. © 2012 The Authors BJOG An International Journal of Obstetrics and Gynaecology © 2012 RCOG.

  3. Countermeasures for unintentional and intentional video watermarking attacks

    Science.gov (United States)

    Deguillaume, Frederic; Csurka, Gabriela; Pun, Thierry

    2000-05-01

    These last years, the rapidly growing digital multimedia market has revealed an urgent need for effective copyright protection mechanisms. Therefore, digital audio, image and video watermarking has recently become a very active area of research, as a solution to this problem. Many important issues have been pointed out, one of them being the robustness to non-intentional and intentional attacks. This paper studies some attacks and proposes countermeasures applied to videos. General attacks are lossy copying/transcoding such as MPEG compression and digital/analog (D/A) conversion, changes of frame-rate, changes of display format, and geometrical distortions. More specific attacks are sequence edition, and statistical attacks such as averaging or collusion. Averaging attack consists of averaging locally consecutive frames to cancel the watermark. This attack works well for schemes which embed random independent marks into frames. In the collusion attack the watermark is estimated from single frames (based on image denoising), and averaged over different scenes for better accuracy. The estimated watermark is then subtracted from each frame. Collusion requires that the same mark is embedded into all frames. The proposed countermeasures first ensures robustness to general attacks by spread spectrum encoding in the frequency domain and by the use of an additional template. Secondly, a Bayesian criterion, evaluating the probability of a correctly decoded watermark, is used for rejection of outliers, and to implement an algorithm against statistical attacks. The idea is to embed randomly chosen marks among a finite set of marks, into subsequences of videos which are long enough to resist averaging attacks, but short enough to avoid collusion attacks. The Bayesian criterion is needed to select the correct mark at the decoding step. Finally, the paper presents experimental results showing the robustness of the proposed method.

  4. Does adding metformin to clomifene citrate lead to higher pregnancy rates in a subset of women with polycystic ovary syndrome?

    NARCIS (Netherlands)

    Moll, E.; Korevaar, J. C.; Bossuyt, P. M. M.; van der Veen, F.

    2008-01-01

    BACKGROUND: An RCT among newly diagnosed, therapy naive women with polycystic ovary syndrome (PCOS) showed no significant differences in ovulation rate, ongoing pregnancy rate or spontaneous abortion rate in favour of clomifene citrate plus metformin compared with clomifene citrate. We wanted to

  5. Cyber Attacks and Combat Behavior

    Directory of Open Access Journals (Sweden)

    Carataș Maria Alina

    2017-01-01

    Full Text Available Cyber terrorism is an intangible danger, a real over the corner threat in the life of individuals,organizations, and governments and is getting harder to deal with its damages. The motivations forthe cyber-attacks are different, depending on the terrorist group, from cybercrime to hacktivism,attacks over the authorities’ servers. Organizations constantly need to find new ways ofstrengthening protection against cyber-attacks, assess their cyber readiness, expand the resiliencecapacity and adopts international security regulations.

  6. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  7. Crony Attack: Strategic Attack’s Silver Bullet

    Science.gov (United States)

    2006-11-01

    physical assets or financial assets. The form of crony attack that most closely resembles classic strategic attack is to deny, degrade, or destroy a money...February 1951. Reprinted in Airpower Studies Coursebook , Air Command and Staff College, Maxwell AFB, AL, 2002, 152–58. Hirsch, Michael. “NATO’s Game of

  8. Effectiveness of the Call in Beach Volleyball Attacking Play

    Directory of Open Access Journals (Sweden)

    Künzell Stefan

    2014-12-01

    Full Text Available In beach volleyball the setter has the opportunity to give her or his hitter a “call”. The call intends that the setter suggests to her or his partner where to place the attack in the opponent’s court. The effectiveness of a call is still unknown. We investigated the women’s and men’s Swiss National Beach Volleyball Championships in 2011 and analyzed 2185 attacks. We found large differences between female and male players. While men called in only 38.4% of attacks, women used calls in 85.5% of attacks. If the male players followed a given call, 63% of the attacks were successful. The success rate of attacks without any call was 55.8% and 47.6% when the call was ignored. These differences were not significant (χ2(2 = 4.55, p = 0.103. In women’s beach volleyball, the rate of successful attacks was 61.5% when a call was followed, 35% for attacks without a call, and 42.6% when a call was ignored. The differences were highly significant (χ2(2 = 23.42, p < 0.0005. Taking into account the findings of the present study, we suggested that the call was effective in women’s beach volleyball, while its effect in men’s game was unclear. Considering the quality of calls we indicate that there is a significant potential to increase the effectiveness of a call.

  9. Higher dropout rate in non-native patients than in native patients in rehabilitation in The Netherlands

    NARCIS (Netherlands)

    Sloots, Maurits; Scheppers, Emmanuel F.; van de Weg, Frans B.; Bartels, Edien A.; Geertzen, Jan H.; Dekker, Joost; Dekker, Jaap

    Dropout from a rehabilitation programme often occurs in patients with chronic nonspecific low back pain of non-native origin. However, the exact dropout rate is not known. The objective of this study was to determine the difference in dropout rate between native and non-native patients with chronic

  10. Accounting for Risk of Non-Completion in Private and Social Rates of Return to Higher Education

    Science.gov (United States)

    Toutkoushian, Robert K.; Shafiq, M. Najeeb; Trivette, Michael J.

    2013-01-01

    Conventional studies of the private and social rates of return to a Bachelor's degree focus on the earnings difference between Bachelor degree holders and high school graduates, and find that there are large rates of return for degree recipients. The estimates in these studies, however, do not take into account the risk of not completing a degree.…

  11. Trauma centers with higher rates of angiography have a lesser incidence of splenectomy in the management of blunt splenic injury.

    Science.gov (United States)

    Capecci, Louis M; Jeremitsky, Elan; Smith, R Stephen; Philp, Frances

    2015-10-01

    Nonoperative management (NOM) for blunt splenic injury (BSI) is well-established. Angiography (ANGIO) has been shown to improve success rates with NOM. Protocols for NOM are not standardized and vary widely between centers. We hypothesized that trauma centers that performed ANGIO at a greater rate would demonstrate decreased rates of splenectomy compared with trauma centers that used ANGIO less frequently. A large, multicenter, statewide database (Pennsylvania Trauma Systems Foundation) from 2007 to 2011 was used to generate the study cohort of patients with BSI (age ≥ 13). The cohort was divided into 2 populations based on admission to centers with high (≥13%) or low (Splenectomy rates were then compared between the 2 groups, and multivariable logistic regression for predictors of splenectomy (failed NOM) were also performed. The overall rate of splenectomy in the entire cohort was 21.0% (1,120 of 5,333 BSI patients). The high ANGIO group had a lesser rate of splenectoy compared with the low ANGIO group (19% vs 24%; P splenectomy compared with low ANGIO centers (odds ratio, 0.68; 95% CI 0.58-0.80; P splenectomy rates compared with centers with lesser rate of ANGIO. Inclusion of angiographic protocols for NOM of BSI should be considered strongly. Copyright © 2015 Elsevier Inc. All rights reserved.

  12. Invisible Trojan-horse attack

    DEFF Research Database (Denmark)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin

    2017-01-01

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance...

  13. When Sinuses Attack! (For Kids)

    Science.gov (United States)

    ... First Aid & Safety Doctors & Hospitals Videos Recipes for Kids Kids site Sitio para niños How the Body Works ... Search English Español When Sinuses Attack! KidsHealth / For Kids / When Sinuses Attack! What's in this article? What ...

  14. Attacks on Bluetooth Security Architecture and Its Countermeasures

    Science.gov (United States)

    Iqbal, Mian Muhammad Waseem; Kausar, Firdous; Wahla, Muhammad Arif

    WPANs compliment the traditional IEEE 802.11 wireless networks by facilitating the clients with flexibility in network topologies, higher mobility and relaxed configuration/hardware requirements. Bluetooth, a WPAN technology, is an open standard for short-range radio frequency (RF) communication. However, it is also susceptible to typical security threats found in wireless LANs. This paper discuses some of the attack scenarios against the bluetooth network such as hostile intrusion, active Man-in-the-Middle (MITM) attack using unit key and various forms of denial of service (DoS) attacks. These threats and attacks compromise the confidentiality and availability of bluetooth data and services. This paper proposes an improved security architecture for bluetooth device which provides protection against the above mentioned attacks.

  15. Invisible Trojan-horse attack.

    Science.gov (United States)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin; Makarov, Vadim

    2017-08-21

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Ac´ın-Ribordy-Gisin (SARG04) QKD protocol at 1924 nm versus that at 1536 nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N. Jain et al., New J. Phys. 16, 123030 (2014). However at 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.

  16. Blind Data Attack on BGP Routers

    Science.gov (United States)

    2017-03-01

    Second Reader Dr. Cynthia Irvine Chair, Cyber Academic Group iii THIS PAGE INTENTIONALLY LEFT BLANK iv ABSTRACT Transport Communication Protocol (TCP...Postgraduate School. The experience of higher learning at this institution was incredible, and I would whole-heartedly recommend it to any of my peers and...data attack packets to the victim device. Scapy is a Python library that is used to craft and send packets [28]. BGP is supported in Python through

  17. Higher Precision of Heart Rate Compared with VO2 to Predict Exercise Intensity in Endurance-Trained Runners.

    Science.gov (United States)

    Reis, Victor M; den Tillaar, Roland Van; Marques, Mario C

    2011-01-01

    The aim of the present study was to assess the precision of oxygen uptake with heart rate regression during track running in highly-trained runners. Twelve national and international level male long-distance road runners (age 30.7 ± 5.5 yrs, height 1.71 ± 0.04 m and mass 61.2 ± 5.8 kg) with a personal best on the half marathon of 62 min 37 s ± 1 min 22 s participated in the study. Each participant performed, in an all-weather synthetic track five, six min bouts at constant velocity with each bout at an increased running velocity. The starting velocity was 3.33 m·s(-1) with a 0.56 m·s(-1) increase on each subsequent bout. VO2 and heart rate were measured during the runs and blood lactate was assessed immediately after each run. Mean peak VO2 and mean peak heart rate were, respectively, 76.2 ± 9.7 mL·kg(-1)·min(-1) and 181 ± 13 beats·min(-1). The linearity of the regressions between heart rate, running velocity and VO2 were all very high (r > 0.99) with small standard errors of regression (i.e. Sy.x at the velocity associated with the 2 and 4 mmol·L(-1) lactate thresholds). The strong relationships between heart rate, running velocity and VO2 found in this study show that, in highly trained runners, it is possible to have heart rate as an accurate indicator of energy demand and of the running speed. Therefore, in this subject cohort it may be unnecessary to use VO2 to track changes in the subjects' running economy during training periods. Key pointsHeart rate is used in the control of exercise intensity in endurance sports.However, few studies have quantified the precision of its relationship with oxygen uptake in highly trained runners.We evaluated twelve elite half-marathon runners during track running at various intensities and established three regressions: oxygen uptake / heart rate; heart rate / running velocity and oxygen uptake / running velocity.The three regressions presented, respectively, imprecision of 4,2%, 2,75% and 4,5% at the velocity

  18. Studies on sulfate attack: Mechanisms, test methods, and modeling

    Science.gov (United States)

    Santhanam, Manu

    The objective of this research study was to investigate various issues pertaining to the mechanism, testing methods, and modeling of sulfate attack in concrete. The study was divided into the following segments: (1) effect of gypsum formation on the expansion of mortars, (2) attack by the magnesium ion, (3) sulfate attack in the presence of chloride ions---differentiating seawater and groundwater attack, (4) use of admixtures to mitigate sulfate attack---entrained air, sodium citrate, silica fume, and metakaolin, (5) effects of temperature and concentration of the attack solution, (6) development of new test methods using concrete specimens, and (7) modeling of the sulfate attack phenomenon. Mortar specimens using portland cement (PC) and tricalcium silicate (C 3S), with or without mineral admixtures, were prepared and immersed in different sulfate solutions. In addition to this, portland cement concrete specimens were also prepared and subjected to complete and partial immersion in sulfate solutions. Physical measurements, chemical analyses and microstructural studies were performed periodically on the specimens. Gypsum formation was seen to cause expansion of the C3S mortar specimens. Statistical analyses of the data also indicated that the quantity of gypsum was the most significant factor controlling the expansion of mortar bars. The attack by magnesium ion was found to drive the reaction towards the formation of brucite. Decalcification of the C-S-H and its subsequent conversion to the non-cementitious M-S-H was identified as the mechanism of destruction in magnesium sulfate attack. Mineral admixtures were beneficial in combating sodium sulfate attack, while reducing the resistance to magnesium sulfate attack. Air entrainment did not change the measured physical properties, but reduced the visible distress of the mortars. Sodium citrate caused a substantial reduction in the rate of damage of the mortars due to its retarding effect. Temperature and

  19. Are Cancer incidence Rates Among Present And Past Workers Of The research Centers Of The Atomic Energy Commission higher Than The Rates Among The General Population?

    International Nuclear Information System (INIS)

    Litai, D.

    1999-01-01

    Cancer incidence rates among the workers of the AEC and its retirees have increased several fold in the last decade compared to the rates experienced in previous ones. This has brought about a wave of claims for compensation with negative repercussions in the media about the state of radiation safety in the nuclear research centers in the country. The Nuclear Research Center - Negev, being, generally closed to public and media visits, has taken the brunt of this criticism. Consequently, the question spelled out in the title has caused much concern and deserves to be discussed and explained. The purpose of this paper is to review what we know in this context and to show that the observed morbidity rates, worrying as they may be, are entirely natural, and, by and large, unrelated to the occupational exposures of the workers. It is well known that cancer incidence rates in the population rise steeply with age, especially over 50. As both research centers are approaching the age of 40, it is clear that a very large fraction of the workers and all retirees have passed this age and many are already in their sixties and even seventies. It is a well established fact that close to 40% of the population in this country (and many others as well) develop some type of cancer during their lifetime and close to a half of these succumb to it. As most of those cancers occur after the age of 50, this explains the increased rates alluded to above. Notably, numerous research centers around the globe have reached similar ages in the last decade and experience similar increases in morbidity, that have caused understandable concern and the initiation of epidemiological studies intended to identify the health effects of extended exposures to low doses, if any. Such studies have been carried out in several countries and followed, altogether, about 100,000 workers through 40 years. The studies showed no excess of cancer mortality among workers compared to the general population (adjusted

  20. Faster eating rates are associated with higher energy intakes during an ad libitum meal, higher BMI and greater adiposity among 4·5-year-old children: results from the Growing Up in Singapore Towards Healthy Outcomes (GUSTO) cohort.

    Science.gov (United States)

    Fogel, Anna; Goh, Ai Ting; Fries, Lisa R; Sadananthan, Suresh A; Velan, S Sendhil; Michael, Navin; Tint, Mya-Thway; Fortier, Marielle V; Chan, Mei Jun; Toh, Jia Ying; Chong, Yap-Seng; Tan, Kok Hian; Yap, Fabian; Shek, Lynette P; Meaney, Michael J; Broekman, Birit F P; Lee, Yung Seng; Godfrey, Keith M; Chong, Mary F F; Forde, Ciarán G

    2017-04-01

    Faster eating rates are associated with increased energy intake, but little is known about the relationship between children's eating rate, food intake and adiposity. We examined whether children who eat faster consume more energy and whether this is associated with higher weight status and adiposity. We hypothesised that eating rate mediates the relationship between child weight and ad libitum energy intake. Children (n 386) from the Growing Up in Singapore Towards Healthy Outcomes cohort participated in a video-recorded ad libitum lunch at 4·5 years to measure acute energy intake. Videos were coded for three eating-behaviours (bites, chews and swallows) to derive a measure of eating rate (g/min). BMI and anthropometric indices of adiposity were measured. A subset of children underwent MRI scanning (n 153) to measure abdominal subcutaneous and visceral adiposity. Children above/below the median eating rate were categorised as slower and faster eaters, and compared across body composition measures. There was a strong positive relationship between eating rate and energy intake (r 0·61, P<0·001) and a positive linear relationship between eating rate and children's BMI status. Faster eaters consumed 75 % more energy content than slower eating children (Δ548 kJ (Δ131 kcal); 95 % CI 107·6, 154·4, P<0·001), and had higher whole-body (P<0·05) and subcutaneous abdominal adiposity (Δ118·3 cc; 95 % CI 24·0, 212·7, P=0·014). Mediation analysis showed that eating rate mediates the link between child weight and energy intake during a meal (b 13·59; 95 % CI 7·48, 21·83). Children who ate faster had higher energy intake, and this was associated with increased BMI z-score and adiposity.

  1. HIGHER PRECISION OF HEART RATE COMPARED WITH VO2 TO PREDICT EXERCISE INTENSITY IN ENDURANCE-TRAINED RUNNERS

    Directory of Open Access Journals (Sweden)

    Victor M. Reis

    2011-03-01

    Full Text Available The aim of the present study was to assess the precision of oxygen uptake with heart rate regression during track running in highly-trained runners. Twelve national and international level male long-distance road runners (age 30.7 ± 5.5 yrs, height 1.71 ± 0.04 m and mass 61.2 ± 5.8 kg with a personal best on the half marathon of 62 min 37 s ± 1 min 22 s participated in the study. Each participant performed, in an all-weather synthetic track five, six min bouts at constant velocity with each bout at an increased running velocity. The starting velocity was 3.33 m·s-1 with a 0.56 m·s-1 increase on each subsequent bout. VO2 and heart rate were measured during the runs and blood lactate was assessed immediately after each run. Mean peak VO2 and mean peak heart rate were, respectively, 76.2 ± 9.7 mL·kg-1·min-1 and 181 ± 13 beats·min-1. The linearity of the regressions between heart rate, running velocity and VO2 were all very high (r > 0.99 with small standard errors of regression (i.e. Sy.x < 5% at the velocity associated with the 2 and 4 mmol·L-1 lactate thresholds. The strong relationships between heart rate, running velocity and VO2 found in this study show that, in highly trained runners, it is possible to have heart rate as an accurate indicator of energy demand and of the running speed. Therefore, in this subject cohort it may be unnecessary to use VO2 to track changes in the subjects' running economy during training periods.

  2. A Novel Real-Time DDoS Attack Detection Mechanism Based on MDRA Algorithm in Big Data

    Directory of Open Access Journals (Sweden)

    Bin Jia

    2016-01-01

    Full Text Available In the wake of the rapid development and wide application of information technology and Internet, our society has come into the information explosion era. Meanwhile, it brings in new and severe challenges to the field of network attack behavior detection due to the explosive growth and high complexity of network traffic. Therefore, an effective and efficient detection mechanism that can detect attack behavior from large scale of network traffic plays an important role. In this paper, we focus on how to distinguish the attack traffic from normal data flows in Big Data and propose a novel real-time DDoS attack detection mechanism based on Multivariate Dimensionality Reduction Analysis (MDRA. In this mechanism, we first reduce the dimensionality of multiple characteristic variables in a network traffic record by Principal Component Analysis (PCA. Then, we analyze the correlation of the lower dimensional variables. Finally, the attack traffic can be differentiated from the normal traffic by MDRA and Mahalanobis distance (MD. Compared with previous research methods, our experimental results show that higher precision rate is achieved and it approximates to 100% in True Negative Rate (TNR for detection; CPU computing time is one-eightieth and memory resource consumption is one-third of the previous detection method based on Multivariate Correlation Analysis (MCA; computing complexity is constant.

  3. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  4. Shark Attack Project - Marine Attack at Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Adrianus J

    2005-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  5. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  6. Score of Inattention Subscale of ADHD Rating Scale-IV is Significantly Higher for AD/HD than PDD.

    OpenAIRE

    Fujibayashi, Hiromi; Kitayama, Shinji; Matsuo, Masafumi

    2010-01-01

    Attention-deficit/hyperactivity disorder (AD/HD) and pervasive developmental disorder (PDD) must be differentiated because the respective treatments are different. However, they are difficult to distinguish because they often show similar symptoms. At our hospital, we have the rearer of a patient answer both the ADHD Rating Scale-IV (ADHD-RS) and the Autism Spectrum Screening Questionnaire (ASSQ), and use the results as an aid for the diagnosis of AD/HD or PDD. These results were compared wit...

  7. Hydraulic conductance as well as nitrogen accumulation plays a role in the higher rate of leaf photosynthesis of the most productive variety of rice in Japan.

    Science.gov (United States)

    Taylaran, Renante D; Adachi, Shunsuke; Ookawa, Taiichiro; Usuda, Hideaki; Hirasawa, Tadashi

    2011-07-01

    An indica variety Takanari is known as one of the most productive rice varieties in Japan and consistently produces 20-30% heavier dry matter during ripening than Japanese commercial varieties in the field. The higher rate of photosynthesis of individual leaves during ripening has been recognized in Takanari. By using pot-grown plants under conditions of minimal mutual shading, it was confirmed that the higher rate of leaf photosynthesis is responsible for the higher dry matter production after heading in Takanari as compared with a japonica variety, Koshihikari. The rate of leaf photosynthesis and shoot dry weight became larger in Takanari after the panicle formation and heading stages, respectively, than in Koshihikari. Roots grew rapidly in the panicle formation stage until heading in Takanari compared with Koshihikari. The higher rate of leaf photosynthesis in Takanari resulted not only from the higher content of leaf nitrogen, which was caused by its elevated capacity for nitrogen accumulation, but also from higher stomatal conductance. When measured under light-saturated conditions, stomatal conductance was already decreased due to the reduction in leaf water potential in Koshihikari even under conditions of a relatively small difference in leaf-air vapour pressure difference. In contrast, the higher stomatal conductance was supported by the maintenance of higher leaf water potential through the higher hydraulic conductance in Takanari with the larger area of root surface. However, no increase in root hydraulic conductivity was expected in Takanari. The larger root surface area of Takanari might be a target trait in future rice breeding for increasing dry matter production.

  8. Association between higher levels of sexual function, activity, and satisfaction and self-rated successful aging in older postmenopausal women

    Science.gov (United States)

    Thompson, Wesley K.; Charo, Lindsey; Vahia, Ipsit V.; Depp, Colin; Allison, Matthew; Jeste, Dilip V.

    2014-01-01

    Objectives To determine if measures of successful-aging are associated with sexual activity, satisfaction, and function in older post-menopausal women. Design Cross-sectional study using self-report surveys; analyses include chi-square and t-tests and multiple linear regression analyses. Setting Community-dwelling older post-menopausal women in the greater San Diego Region. Participants 1,235 community-dwelling women aged 60-89 years participating at the San Diego site of the Women's Health Initiative. Measurements Demographics and self-report measures of sexual activity, function, and satisfaction and successful aging. Results Sexual activity and functioning (desire, arousal, vaginal tightness, use of lubricants, and ability to climax) were negatively associated with age, as were physical and mental health. In contrast, sexual satisfaction and self-rated successful aging and quality of life remained unchanged across age groups. Successful aging measures were positively associated with sexual measures, especially self-rated quality of life and sexual satisfaction. Conclusions Self-rated successful aging, quality of life, and sexual satisfaction appear to be stable in the face of declines in physical health, some cognitive abilities, and sexual activity and function and are positively associated with each other across ages 60-89 years. PMID:21797827

  9. Forensics Investigation of Web Application Security Attacks

    OpenAIRE

    Amor Lazzez; Thabet Slimani

    2015-01-01

    Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the sec...

  10. RISK DISCLOSURE AGAINST ATTACK ON CRITICAL INFRASTRUCTURES

    Science.gov (United States)

    Yoshida, Mamoru; Kobayashi, Kiyoshi

    This paper analyzes the government's defensive and disclosure strategies to reduce the damage caused by terrorists that attack critical infrastructures using subjective game theory. The government recognizes a terrorist as a hidden opponent and the government's decision making about the policies against terror attacks depends on the belief about the existence of terrorist. In addition, it is not necessarily true that the government and the terrorist play the common game and make their decisions. Considering these points, the paper formulates the model in which the government and the terrorist formulate the subjective games respectively, and they induce the strategies using the equilibriums of their subjective games. The paper concluded that the government's disclosure about the implementation of the countermeasure, rather than the disclosure of warning level related with the belief about the existence of terrorist, brings about the higher increment of the subjective payoffs of the government.

  11. Do More Hospital Beds Lead to Higher Hospitalization Rates? A Spatial Examination of Roemer’s Law

    Science.gov (United States)

    Delamater, Paul L.; Messina, Joseph P.; Grady, Sue C.; WinklerPrins, Vince; Shortridge, Ashton M.

    2013-01-01

    Background Roemer’s Law, a widely cited principle in health care policy, states that hospital beds that are built tend to be used. This simple but powerful expression has been invoked to justify Certificate of Need regulation of hospital beds in an effort to contain health care costs. Despite its influence, a surprisingly small body of empirical evidence supports its content. Furthermore, known geographic factors influencing health services use and the spatial structure of the relationship between hospital bed availability and hospitalization rates have not been sufficiently explored in past examinations of Roemer’s Law. We pose the question, “Accounting for space in health care access and use, is there an observable association between the availability of hospital beds and hospital utilization?” Methods We employ an ecological research design based upon the Anderson behavioral model of health care utilization. This conceptual model is implemented in an explicitly spatial context. The effect of hospital bed availability on the utilization of hospital services is evaluated, accounting for spatial structure and controlling for other known determinants of hospital utilization. The stability of this relationship is explored by testing across numerous geographic scales of analysis. The case study comprises an entire state system of hospitals and population, evaluating over one million inpatient admissions. Results We find compelling evidence that a positive, statistically significant relationship exists between hospital bed availability and inpatient hospitalization rates. Additionally, the observed relationship is invariant with changes in the geographic scale of analysis. Conclusions This study provides evidence for the effects of Roemer’s Law, thus suggesting that variations in hospitalization rates have origins in the availability of hospital beds. This relationship is found to be robust across geographic scales of analysis. These findings suggest

  12. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  13. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  14. Panic Attacks and Panic Disorder

    Science.gov (United States)

    ... Major changes in your life, such as a divorce or the addition of a baby Smoking or ... quality of life. Complications that panic attacks may cause or be linked to include: Development of specific ...

  15. Genetic attack on neural cryptography

    International Nuclear Information System (INIS)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-01-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size

  16. Genetic attack on neural cryptography

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  17. What Is a Heart Attack?

    Science.gov (United States)

    ... medical center. Support from family and friends also can help relieve stress and anxiety. Let your loved ones know how you feel and what they can do to help you. Risk of a Repeat Heart Attack Once ...

  18. After-gate attack on a quantum cryptosystem

    International Nuclear Information System (INIS)

    Wiechers, C; Wittmann, C; Elser, D; Marquardt, Ch; Leuchs, G; Lydersen, L; Skaar, J; Makarov, V

    2011-01-01

    We present a method to control the detection events in quantum key distribution systems that use gated single-photon detectors. We employ bright pulses as faked states, timed to arrive at the avalanche photodiodes outside the activation time. The attack can remain unnoticed, since the faked states do not increase the error rate per se. This allows for an intercept-resend attack, where an eavesdropper transfers her detection events to the legitimate receiver without causing any errors. As a side effect, afterpulses, originating from accumulated charge carriers in the detectors, increase the error rate. We have experimentally tested detectors of the system id3110 (Clavis2) from ID Quantique. We identify the parameter regime in which the attack is feasible despite the side effect. Furthermore, we outline how simple modifications in the implementation can make the device immune to this attack.

  19. Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets

    Science.gov (United States)

    DeTrano, Alexander; Karimi, Naghmeh; Karri, Ramesh; Guo, Xiaofei; Carlet, Claude; Guilley, Sylvain

    2015-01-01

    Masking countermeasures, used to thwart side-channel attacks, have been shown to be vulnerable to mask-extraction attacks. State-of-the-art mask-extraction attacks on the Advanced Encryption Standard (AES) algorithm target S-Box recomputation schemes but have not been applied to scenarios where S-Boxes are precomputed offline. We propose an attack targeting precomputed S-Boxes stored in nonvolatile memory. Our attack targets AES implemented in software protected by a low entropy masking scheme and recovers the masks with 91% success rate. Recovering the secret key requires fewer power traces (in fact, by at least two orders of magnitude) compared to a classical second-order attack. Moreover, we show that this attack remains viable in a noisy environment or with a reduced number of leakage points. Eventually, we specify a method to enhance the countermeasure by selecting a suitable coset of the masks set. PMID:26491717

  20. Marine microalgae attack and feed on metazoans

    DEFF Research Database (Denmark)

    Berge, Terje; Poulsen, Louise K.; Moldrup, Morten

    2012-01-01

    Free-living microalgae from the dinoflagellate genus Karlodinium are known to formmassive blooms in eutrophic coastal waters worldwide and are often associated with fish kills. Natural bloom populations, recently shown to consist of the two mixotrophic and toxic species Karlodinium armiger...... and Karlodinium veneficum have caused fast paralysis and mortality of finfish and copepods in the laboratory, and have been associated with reduced metazooplankton biomass in-situ. Here we show that a strain of K. armiger (K-0688) immobilises the common marine copepod Acartia tonsa in a densitydependent manner...... and collectively ingests the grazer to promote its own growth rate. In contrast, four strains of K. veneficum did not attack or affect the motility and survival of the copepods. Copepod immobilisation by the K. armiger strain was fast (within 15min) and caused by attacks of swarming cells, likely through...

  1. A DDoS Attack Detection Method Based on Hybrid Heterogeneous Multiclassifier Ensemble Learning

    Directory of Open Access Journals (Sweden)

    Bin Jia

    2017-01-01

    Full Text Available The explosive growth of network traffic and its multitype on Internet have brought new and severe challenges to DDoS attack detection. To get the higher True Negative Rate (TNR, accuracy, and precision and to guarantee the robustness, stability, and universality of detection system, in this paper, we propose a DDoS attack detection method based on hybrid heterogeneous multiclassifier ensemble learning and design a heuristic detection algorithm based on Singular Value Decomposition (SVD to construct our detection system. Experimental results show that our detection method is excellent in TNR, accuracy, and precision. Therefore, our algorithm has good detective performance for DDoS attack. Through the comparisons with Random Forest, k-Nearest Neighbor (k-NN, and Bagging comprising the component classifiers when the three algorithms are used alone by SVD and by un-SVD, it is shown that our model is superior to the state-of-the-art attack detection techniques in system generalization ability, detection stability, and overall detection performance.

  2. Software-based Microarchitectural Attacks

    OpenAIRE

    Gruss, Daniel

    2017-01-01

    Modern processors are highly optimized systems where every single cycle of computation time matters. Many optimizations depend on the data that is being processed. Software-based microarchitectural attacks exploit effects of these optimizations. Microarchitectural side-channel attacks leak secrets from cryptographic computations, from general purpose computations, or from the kernel. This leakage even persists across all common isolation boundaries, such as processes, containers, and virtual ...

  3. OPERATION COBRA. Deliberate Attack, Exploitation

    Science.gov (United States)

    1984-05-25

    to attack Sens, then continue to Troyes , on the Seine River. CCA was in the north, crossing the Loing River at Souppes against light resistance and...advanced from Troyes and prepared positions close to Sens. Under strong artillery support, a task force from CCA (TF Oden) attacked the enemy frontally...movement towards the Seine River on 24 August with an advance toward Troyes . Facing the combat command were what remained of the 51st SS Brigade, light

  4. Fish community reassembly after a coral mass mortality: higher trophic groups are subject to increased rates of extinction.

    Science.gov (United States)

    Alonso, David; Pinyol-Gallemí, Aleix; Alcoverro, Teresa; Arthur, Rohan

    2015-05-01

    Since Gleason and Clements, our understanding of community dynamics has been influenced by theories emphasising either dispersal or niche assembly as central to community structuring. Determining the relative importance of these processes in structuring real-world communities remains a challenge. We tracked reef fish community reassembly after a catastrophic coral mortality in a relatively unfished archipelago. We revisited the stochastic model underlying MacArthur and Wilson's Island Biogeography Theory, with a simple extension to account for trophic identity. Colonisation and extinction rates calculated from decadal presence-absence data based on (1) species neutrality, (2) trophic identity and (3) site-specificity were used to model post-disturbance reassembly, and compared with empirical observations. Results indicate that species neutrality holds within trophic guilds, and trophic identity significantly increases overall model performance. Strikingly, extinction rates increased clearly with trophic position, indicating that fish communities may be inherently susceptible to trophic downgrading even without targeted fishing of top predators. © 2015 John Wiley & Sons Ltd/CNRS.

  5. The Active Management of Risk in Multiparous Pregnancy at Term: association between a higher preventive labor induction rate and improved birth outcomes

    Science.gov (United States)

    Nicholson, James M.; Caughey, Aaron; Stenson, Ms. Morghan H.; Cronholm, Peter; Kellar, Lisa; Bennett, Ian; Margo, Katie; Stratton, Joseph

    2009-01-01

    Objective To determine if exposure of multiparous women to a high rate of preventive labor induction was associated with a significantly lower cesarean delivery rate. Study Design Retrospective cohort study involving 123 multiparas, who were exposed to the frequent use of preventive labor induction, and 304 multiparas, who received standard management. Rates of cesarean delivery and other adverse birth outcomes were compared in the two groups. Logistic regression controlled for confounding covariates. Results The exposed group had a lower cesarean delivery rate (aOR 0.09, 0.8% vs. 9.9%, p = 0.02) and a higher uncomplicated vaginal delivery rate (OR 0.53, 78.9% vs. 66.4%, p=0.01). Exposure was not associated with higher rates of other adverse birth outcomes. Conclusion Exposure of multiparas to a high rate of preventive labor induction was significantly associated with improved birth outcomes including a very low cesarean delivery rate. A prospective randomized trial is needed to determine causality. PMID:19254584

  6. Factors affecting ambulance utilization for asthma attack treatment: understanding where to target interventions.

    Science.gov (United States)

    Raun, L H; Ensor, K B; Campos, L A; Persse, D

    2015-05-01

    Asthma is a serious, sometimes fatal condition, in which attacks vary in severity, potentially requiring emergency medical services (EMS) ambulance treatment. A portion of asthma attacks requiring EMS ambulance treatment may be prevented with improved education and access to care. The aim of this study was to identify areas of the city with high rates of utilization of EMS ambulance for treatment, and the demographics, socio-economic status, and time of day associated with these rates, to better target future interventions to prevent emergencies and reduce cost. A cross-sectional study was conducted on individuals in Houston, TX (USA) requiring ambulance treatment for asthma attacks from 2004 to 2011. 12,155 EMS ambulance-treated asthma attack cases were linked to census tracts. High rate treatment areas were identified with geospatial mapping. Census tract demographic characteristics of these high rate areas were compared with the remainder of the city using logistic regression. The association between case level demographics and the time of day of asthma attack within the high rate area was also assessed with logistic regression. EMS ambulance-treated high rate areas were identified and found to have a utilization incidence rate over six times higher per 100,000 people than the remainder of the city. There is an increased risk of location in this high rate area with a census tract level increase of percent of population: earning less than $10,000 yearly income (RR 1.21, 1.16-1.26), which is black (RR 1.08, 1.07-1.10), which is female (RR 1.34, 1.20-1.49) and have obtained less than a high school degree (RR 1.02, 1.01-1.03). Within the high rate area, case level data indicates an increased risk of requiring an ambulance after normal doctor office hours for men compared with women (RR 1.13, 1.03-1.22), for black compared with Hispanic ethnicity (RR 1.31, 1.08-1.59), or for adults (less than 41 and greater than 60) compared with children. Interventions to prevent

  7. Potential impact on HIV incidence of higher HIV testing rates and earlier antiretroviral therapy initiation in MSM

    DEFF Research Database (Denmark)

    Phillips, Andrew N; Cambiano, Valentina; Miners, Alec

    2015-01-01

    count 350/μl. We investigated what would be required to reduce HIV incidence in MSM to below 1 per 1000 person-years (i.e. cost-effective. METHODS: A dynamic, individual-based simulation model was calibrated to multiple data sources...... with viral suppression to 80%, and it would be 90%, if ART is initiated at diagnosis. The scenarios required for such a policy to be cost-effective are presented. CONCLUSION: This analysis provides targets for the proportion of all HIV-positive MSM with viral suppression required to achieve substantial......BACKGROUND: Increased rates of testing, with early antiretroviral therapy (ART) initiation, represent a key potential HIV-prevention approach. Currently, in MSM in the United Kingdom, it is estimated that 36% are diagnosed by 1 year from infection, and the ART initiation threshold is at CD4 cell...

  8. PCR reveals significantly higher rates of Trypanosoma cruzi infection than microscopy in the Chagas vector, Triatoma infestans: High rates found in Chuquisaca, Bolivia

    Directory of Open Access Journals (Sweden)

    Lucero David E

    2007-06-01

    Full Text Available Abstract Background The Andean valleys of Bolivia are the only reported location of sylvatic Triatoma infestans, the main vector of Chagas disease in this country, and the high human prevalence of Trypanosoma cruzi infection in this region is hypothesized to result from the ability of vectors to persist in domestic, peri-domestic, and sylvatic environments. Determination of the rate of Trypanosoma infection in its triatomine vectors is an important element in programs directed at reducing human infections. Traditionally, T. cruzi has been detected in insect vectors by direct microscopic examination of extruded feces, or dissection and analysis of the entire bug. Although this technique has proven to be useful, several drawbacks related to its sensitivity especially in the case of small instars and applicability to large numbers of insects and dead specimens have motivated researchers to look for a molecular assay based on the polymerase chain reaction (PCR as an alternative for parasitic detection of T. cruzi infection in vectors. In the work presented here, we have compared a PCR assay and direct microscopic observation for diagnosis of T. cruzi infection in T. infestans collected in the field from five localities and four habitats in Chuquisaca, Bolivia. The efficacy of the methods was compared across nymphal stages, localities and habitats. Methods We examined 152 nymph and adult T. infestans collected from rural areas in the department of Chuquisaca, Bolivia. For microscopic observation, a few drops of rectal content obtained by abdominal extrusion were diluted with saline solution and compressed between a slide and a cover slip. The presence of motile parasites in 50 microscopic fields was registered using 400× magnification. For the molecular analysis, dissection of the posterior part of the abdomen of each insect followed by DNA extraction and PCR amplification was performed using the TCZ1 (5' – CGA GCT CTT GCC CAC ACG GGT GCT – 3

  9. Effect of temperature during ion sputtering on the surface segregation rate of antimony in an iron-antimony alloy at higher temperatures

    International Nuclear Information System (INIS)

    Oku, M.; Hirokawa, K.; Kimura, H.; Suzuki, S.

    1986-01-01

    The surface segregation of antimony in an iron-0.23 at% antimony alloy was studied by XPS. The segregation rate in the temperature range between 800 and 900 K depends on the temperature during sputtering with argon ion of kinetic energy of 1 keV. The sputtering at room temperature or 473 K gives higher values of the segregation rate than those at 673 K. Both cases give the activation energy of 170 kJmol -1 for the surface segregation rate. The segregation of antimony is not observed after the sample is heated at 1000 K. (author)

  10. Loose regulation of medical marijuana programs associated with higher rates of adult marijuana use but not cannabis use disorder.

    Science.gov (United States)

    Williams, Arthur Robin; Santaella-Tenorio, Julian; Mauro, Christine M; Levin, Frances R; Martins, Silvia S

    2017-11-01

    Most US states have passed medical marijuana laws (MMLs), with great variation in program regulation impacting enrollment rates. We aimed to compare changes in rates of marijuana use, heavy use and cannabis use disorder across age groups while accounting for whether states enacted medicalized (highly regulated) or non-medical mml programs. Difference-in-differences estimates with time-varying state-level MML coded by program type (medicalized versus non-medical). Multi-level linear regression models adjusted for state-level random effects and covariates as well as historical trends in use. Nation-wide cross-sectional survey data from the US National Survey of Drug Use and Health (NSDUH) restricted use data portal aggregated at the state level. Participants comprised 2004-13 NSDUH respondents (n ~ 67 500/year); age groups 12-17, 18-25 and 26+ years. States had implemented eight medicalized and 15 non-medical MML programs. Primary outcome measures included (1) active (past-month) marijuana use; (2) heavy use (> 300 days/year); and (3) cannabis use disorder diagnosis, based on DSM-IV criteria. Covariates included program type, age group and state-level characteristics throughout the study period. Adults 26+ years of age living in states with non-medical MML programs increased past-month marijuana use 1.46% (from 4.13 to 6.59%, P = 0.01), skewing towards greater heavy marijuana by 2.36% (from 14.94 to 17.30, P = 0.09) after MMLs were enacted. However, no associated increase in the prevalence of cannabis use disorder was found during the study period. Our findings do not show increases in prevalence of marijuana use among adults in states with medicalized MML programs. Additionally, there were no increases in adolescent or young adult marijuana outcomes following MML passage, irrespective of program type. Non-medical marijuana laws enacted in US states are associated with increased marijuana use, but only among adults aged 26+ years. Researchers and

  11. Open to Attack?

    Science.gov (United States)

    Poremba, Sue Marquette

    2012-01-01

    Who hasn't received mail from a company notifying them that their personal information may have been compromised? No organization--not Amazon, not the CIA--is immune to cyberattacks, and higher education is no exception. Indeed, colleges and universities may be even more susceptible to security breaches than their corporate brethren, and the…

  12. The accountability problem of flooding attacks in service-oriented architectures

    DEFF Research Database (Denmark)

    Jensen, Meiko; Schwenk, Jörg

    2009-01-01

    The threat of Denial of Service attacks poses a serious problem to the security of network-based services in general. For flooding attacks against service-oriented applications, this threat is dramatically amplified with potentially much higher impact and very little effort on the attacker's side....... Additionally, due to the high distribution of a SOA application's components, fending such attacks becomes a far more complex task. In this paper, we present the problem of accountability, referring to the issue of resolving the attacker in a highly distributed service-oriented application. Using a general...

  13. Being born under adverse economic conditions leads to a higher cardiovascular mortality rate later in life: evidence based on individuals born at different stages of the business cycle

    DEFF Research Database (Denmark)

    van den Berg, Gerard J; Doblhammer-Reiter, Gabriele; Christensen, Kaare

    2011-01-01

    since the 1870s and including the cause of death. To capture exogenous variation of conditions early in life, we use the state of the business cycle around birth. We find significant negative effects of economic conditions around birth on the individual CV mortality rate at higher ages...

  14. Boarding is associated with higher rates of medication delays and adverse events but fewer laboratory-related delays.

    Science.gov (United States)

    Sri-On, Jiraporn; Chang, Yuchiao; Curley, David P; Camargo, Carlos A; Weissman, Joel S; Singer, Sara J; Liu, Shan W

    2014-09-01

    Hospital crowding and emergency department (ED) boarding are large and growing problems. To date, there has been a paucity of information regarding the quality of care received by patients boarding in the ED compared with the care received by patients on an inpatient unit. We compared the rate of delays and adverse events at the event level that occur while boarding in the ED vs while on an inpatient unit. This study was a secondary analysis of data from medical record review and administrative databases at 2 urban academic teaching hospitals from August 1, 2004, through January 31, 2005. We measured delayed repeat cardiac enzymes, delayed partial thromboplastin time level checks, delayed antibiotic administration, delayed administration of home medications, and adverse events. We compared the incidence of events during ED boarding vs while on an inpatient unit. Among 1431 patient medical records, we identified 1016 events. Emergency department boarding was associated with an increased risk of home medication delays (risk ratio [RR], 1.54; 95% confidence interval [CI], 1.26-1.88), delayed antibiotic administration (RR, 2.49; 95% CI, 1.72-3.52), and adverse events (RR, 2.36; 95% CI, 1.15-4.72). On the contrary, ED boarding was associated with fewer delays in repeat cardiac enzymes (RR, 0.17; 95% CI, 0.09-0.27) and delayed partial thromboplastin time checks (RR, 0.54; 95% CI, 0.27-0.96). Compared with inpatient units, ED boarding was associated with more medication-related delays and adverse events but fewer laboratory-related delays. Until we can eliminate ED boarding, it is critical to identify areas for improvement. Copyright © 2014 Elsevier Inc. All rights reserved.

  15. Low-birthweight rates higher among Bangladeshi neonates measured during active birth surveillance compared to national survey data.

    Science.gov (United States)

    Klemm, Rolf D W; Merrill, Rebecca D; Wu, Lee; Shamim, Abu Ahmed; Ali, Hasmot; Labrique, Alain; Christian, Parul; West, Keith P

    2015-10-01

    Birth size is an important gauge of fetal and neonatal health. Birth size measurements were collected within 72 h of life for 16 290 live born, singleton infants in rural Bangladesh from 2004 to 2007. Gestational age was calculated based on the date of last menstrual period. Newborns were classified as small-for-gestational age (SGA) based on a birthweight below the 10th percentile for gestational age, using three sets of US reference data. Birth size distributions were explored based on raw values as well as after z-score standardisation in reference to World Health Organization (WHO) 2006 growth standards. Mean (SD) birthweight (g), length (cm) and head circumference (cm) measurements, completed within [median (25th, 75th percentile)] 15 (8, 23) h of life, were 2433 (425), 46.4 (2.4) and 32.4 (1.6), respectively. Twenty-two per cent were born preterm. Over one-half (55.3%) of infants were born low birthweight; 46.6%, 37.0% and 33.6% had a weight, length and head circumference below -2 z-scores of the WHO growth standard at birth; and 70.9%, 72.2% and 59.8% were SGA for weight based on Alexander et al., Oken et al. and Olsen et al. references, respectively. Infants in this typical rural Bangladesh setting were commonly born small, reflecting a high burden of fetal growth restriction and preterm birth. Our findings, produced by active birth surveillance, suggest that low birthweight is far more common than suggested by cross-sectional survey estimates. Interventions that improve fetal growth during pregnancy may have the largest impact on reducing SGA rates. © 2013 John Wiley & Sons Ltd.

  16. Numerical and experimental investigation of the bell-mouth inlet design of a centrifugal fan for higher internal flow rate

    International Nuclear Information System (INIS)

    Kim, Sang Hyeon; Heo, Seung; Cheong, Cheolung; Kim, Tae Hoon

    2013-01-01

    The energy efficiency of a household refrigerator is one of the most critical characteristics considered by manufacturers and consumers. Numerous studies in various fields have been conducted to increase energy efficiency. One of the most efficient methods to reduce the energy consumption of a refrigerator is by improving the performance of fans inside the refrigerator. A number of studies reported various ways to enhance fan performance. However, the majority of these studies focused solely on the fan and did not consider the working environment of the fan, such as the inlet and outlet flow characteristics. The expected performance of fans developed without consideration of these characteristics cannot be determined because complex inlet and outlet flow passage could adversely affect performance. This study investigates the effects of the design of the bell-mouth inlet on the performance of a centrifugal fan in a household refrigerator. In preliminary numerical studies, significant flow loss is identified through the bell-mouth inlet in the target fan system. Several design factors such as tip clearance, inner fence, motor-box struts, and guide vane are proposed to resolve these flow losses. The effects of these factors on fan performance are investigated using computational fluid dynamics techniques to solve incompressible Reynolds-averaged Navier-Stokes equations for predicting the circulating flow of the fan. Experiments are then performed to validate the numerical predictions. Results indicate that four design factors positively affect fan performance in terms of flow rate. The guide vane is the most effective design factor to consider for improving fan performance. Further studies are conducted to investigate the detailed effects of the guide vane by varying its install angle, install location, height, and length. These studies determine the optimum design of the guide vane to achieve the highest performance of the fan and the related flow characteristics

  17. Numerical and experimental investigation of the bell-mouth inlet design of a centrifugal fan for higher internal flow rate

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Sang Hyeon; Heo, Seung; Cheong, Cheolung [Pusan National University, Busan (Korea, Republic of); Kim, Tae Hoon [Refrigeration Division, Changwon (Korea, Republic of)

    2013-08-15

    The energy efficiency of a household refrigerator is one of the most critical characteristics considered by manufacturers and consumers. Numerous studies in various fields have been conducted to increase energy efficiency. One of the most efficient methods to reduce the energy consumption of a refrigerator is by improving the performance of fans inside the refrigerator. A number of studies reported various ways to enhance fan performance. However, the majority of these studies focused solely on the fan and did not consider the working environment of the fan, such as the inlet and outlet flow characteristics. The expected performance of fans developed without consideration of these characteristics cannot be determined because complex inlet and outlet flow passage could adversely affect performance. This study investigates the effects of the design of the bell-mouth inlet on the performance of a centrifugal fan in a household refrigerator. In preliminary numerical studies, significant flow loss is identified through the bell-mouth inlet in the target fan system. Several design factors such as tip clearance, inner fence, motor-box struts, and guide vane are proposed to resolve these flow losses. The effects of these factors on fan performance are investigated using computational fluid dynamics techniques to solve incompressible Reynolds-averaged Navier-Stokes equations for predicting the circulating flow of the fan. Experiments are then performed to validate the numerical predictions. Results indicate that four design factors positively affect fan performance in terms of flow rate. The guide vane is the most effective design factor to consider for improving fan performance. Further studies are conducted to investigate the detailed effects of the guide vane by varying its install angle, install location, height, and length. These studies determine the optimum design of the guide vane to achieve the highest performance of the fan and the related flow characteristics

  18. Defending against speculative attacks

    NARCIS (Netherlands)

    Daniëls, T.; Jager, H.; Klaassen, F.

    2009-01-01

    While virtually all currency crisismodels recognise that the fate of a currency peg depends on how tenaciously policy makers defend it, they seldom model how this is done. We incorporate themechanics of speculation and the interest rate defence against it in the model of Morris and Shin (American

  19. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  20. VTAC: virtual terrain assisted impact assessment for cyber attacks

    Science.gov (United States)

    Argauer, Brian J.; Yang, Shanchieh J.

    2008-03-01

    Overwhelming intrusion alerts have made timely response to network security breaches a difficult task. Correlating alerts to produce a higher level view of intrusion state of a network, thus, becomes an essential element in network defense. This work proposes to analyze correlated or grouped alerts and determine their 'impact' to services and users of the network. A network is modeled as 'virtual terrain' where cyber attacks maneuver. Overlaying correlated attack tracks on virtual terrain exhibits the vulnerabilities exploited by each track and the relationships between them and different network entities. The proposed impact assessment algorithm utilizes the graph-based virtual terrain model and combines assessments of damages caused by the attacks. The combined impact scores allow to identify severely damaged network services and affected users. Several scenarios are examined to demonstrate the uses of the proposed Virtual Terrain Assisted Impact Assessment for Cyber Attacks (VTAC).

  1. A retrospective analysis of practice patterns in the management of acute asthma attack across Turkey.

    Science.gov (United States)

    Türktaş, Haluk; Bavbek, Sevim; Misirligil, Zeynep; Gemicioğlu, Bilun; Mungan, Dilşad

    2010-12-01

    To evaluate patient characteristics and practice patterns in the management of acute asthma attack at tertiary care centers across Turkey. A total of 294 patients (mean age: 50.4 ± 15.1 years; females: 80.3%) diagnosed with persistent asthma were included in this retrospective study upon their admission to the hospital with an acute asthma attack. Patient demographics, asthma control level, asthma attack severity and the management of the attack were evaluated. There was no influence of gender on asthma control and attack severity. In 57.5% of the patients, asthma attack was moderate. Most patients (78.9%) were hospitalized with longer duration evident in the severe attack. Spirometry and chest X-Ray were the most frequent tests (85.4%), while steroids (72.0% parenteral; 29.0% oral) and short-acting beta-agonists (SABA) + anticholinergics (45.5%) were the main drugs of choice in the attack management. Attack severity and pre-attack asthma control level was significantly correlated (p attack asthma was uncontrolled in 42.6% of the patients with severe attack. Most of the patients were on combination of more than one (two in 38.7% and 3-4 in 31.2%) controller drugs before the attack. Providing country specific data on practice patterns in the management of acute asthma attack in a representative cohort in Turkey, prescription of steroids and SABA + anticholinergics as the main drugs of choice was in line with guidelines while the significant relation of pre-attack asthma control to risk/severity of asthma attack and rate/duration of hospitalization seem to be the leading results of the present study. Copyright © 2010 Elsevier Ltd. All rights reserved.

  2. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica......Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error......-prone and impracticable for large systems. Nonetheless, the automated generation of attack trees has only been explored in connection to computer networks and levering rich models, whose analysis typically leads to an exponential blow-up of the state space. We propose a static analysis approach where attack trees...... are automatically inferred from a process algebraic specification in a syntax-directed fashion, encompassing a great many application domains and avoiding incurring systematically an exponential explosion. Moreover, we show how the standard propositional denotation of an attack tree can be used to phrase...

  3. Messaging Attacks on Android: Vulnerabilities and Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Khodor Hamandi

    2015-01-01

    Full Text Available Currently, Android is the leading mobile operating system in number of users worldwide. On the security side, Android has had significant challenges despite the efforts of the Android designers to provide a secure environment for apps. In this paper, we present numerous attacks targeting the messaging framework of the Android system. Our focus is on SMS, USSD, and the evolution of their associated security in Android and accordingly the development of related attacks. Also, we shed light on the Android elements that are responsible for these attacks. Furthermore, we present the architecture of an intrusion detection system (IDS that promises to thwart SMS messaging attacks. Our IDS shows a detection rate of 87.50% with zero false positives.

  4. Distributed Secure Coordinated Control for Multiagent Systems Under Strategic Attacks.

    Science.gov (United States)

    Feng, Zhi; Wen, Guanghui; Hu, Guoqiang

    2017-05-01

    This paper studies a distributed secure consensus tracking control problem for multiagent systems subject to strategic cyber attacks modeled by a random Markov process. A hybrid stochastic secure control framework is established for designing a distributed secure control law such that mean-square exponential consensus tracking is achieved. A connectivity restoration mechanism is considered and the properties on attack frequency and attack length rate are investigated, respectively. Based on the solutions of an algebraic Riccati equation and an algebraic Riccati inequality, a procedure to select the control gains is provided and stability analysis is studied by using Lyapunov's method.. The effect of strategic attacks on discrete-time systems is also investigated. Finally, numerical examples are provided to illustrate the effectiveness of theoretical analysis.

  5. Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis.

    Science.gov (United States)

    Zhou, Wei; Wen, Junhao; Koh, Yun Sing; Xiong, Qingyu; Gao, Min; Dobbie, Gillian; Alam, Shafiq

    2015-01-01

    Recommender systems are highly vulnerable to shilling attacks, both by individuals and groups. Attackers who introduce biased ratings in order to affect recommendations, have been shown to negatively affect collaborative filtering (CF) algorithms. Previous research focuses only on the differences between genuine profiles and attack profiles, ignoring the group characteristics in attack profiles. In this paper, we study the use of statistical metrics to detect rating patterns of attackers and group characteristics in attack profiles. Another question is that most existing detecting methods are model specific. Two metrics, Rating Deviation from Mean Agreement (RDMA) and Degree of Similarity with Top Neighbors (DegSim), are used for analyzing rating patterns between malicious profiles and genuine profiles in attack models. Building upon this, we also propose and evaluate a detection structure called RD-TIA for detecting shilling attacks in recommender systems using a statistical approach. In order to detect more complicated attack models, we propose a novel metric called DegSim' based on DegSim. The experimental results show that our detection model based on target item analysis is an effective approach for detecting shilling attacks.

  6. Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis

    Science.gov (United States)

    Zhou, Wei; Wen, Junhao; Koh, Yun Sing; Xiong, Qingyu; Gao, Min; Dobbie, Gillian; Alam, Shafiq

    2015-01-01

    Recommender systems are highly vulnerable to shilling attacks, both by individuals and groups. Attackers who introduce biased ratings in order to affect recommendations, have been shown to negatively affect collaborative filtering (CF) algorithms. Previous research focuses only on the differences between genuine profiles and attack profiles, ignoring the group characteristics in attack profiles. In this paper, we study the use of statistical metrics to detect rating patterns of attackers and group characteristics in attack profiles. Another question is that most existing detecting methods are model specific. Two metrics, Rating Deviation from Mean Agreement (RDMA) and Degree of Similarity with Top Neighbors (DegSim), are used for analyzing rating patterns between malicious profiles and genuine profiles in attack models. Building upon this, we also propose and evaluate a detection structure called RD-TIA for detecting shilling attacks in recommender systems using a statistical approach. In order to detect more complicated attack models, we propose a novel metric called DegSim’ based on DegSim. The experimental results show that our detection model based on target item analysis is an effective approach for detecting shilling attacks. PMID:26222882

  7. APPRAISAL OF STUDENT RATING AS A MEASURE TO MANAGE THE QUALITY OF HIGHER EDUCATION IN INDIA: AN INSTITUTIONAL STUDY USING SIX SIGMA MODEL APPROACH

    Directory of Open Access Journals (Sweden)

    Arun Vijay

    2013-12-01

    Full Text Available Students' rating of teaching is one of the most widely accepted methods of measuring the quality in Higher Education worldwide. The overall experience gained by the students during their academic journey in their respective college is a key factor to determine the Institutional Quality. This study was conducted among the Physical Therapy students with an objective to capture the overall experience related to various aspects of their Academic environment including teaching and learning process adopted in their college. To facilitate that, a unique questionnaire called,"Academic Environment Evaluation Questionnaire (AEEQ was developed covering all the important teaching elements of the Higher Education Institutions. The students' opinion was captured and analyzed through six sigma analytical tool using Poisson distribution model. From the non-conformance level captured through the responses from the students about the various categories of teaching and learning elements, the corresponding Sigma rating for each teaching element was measured. Accordingly, a six point Quality rating system was developed customizing to each sigma values. This study brings a new, innovative student driven Quality rating system for the Higher Education Institutions in India.

  8. An Analysis of Attacks on Blockchain Consensus

    OpenAIRE

    Bissias, George; Levine, Brian Neil; Ozisik, A. Pinar; Andresen, Gavin

    2016-01-01

    We present and validate a novel mathematical model of the blockchain mining process and use it to conduct an economic evaluation of the double-spend attack, which is fundamental to all blockchain systems. Our analysis focuses on the value of transactions that can be secured under a conventional double-spend attack, both with and without a concurrent eclipse attack. Our model quantifies the importance of several factors that determine the attack's success, including confirmation depth, attacke...

  9. Recurrent spontaneous attacks of dizziness.

    Science.gov (United States)

    Lempert, Thomas

    2012-10-01

    This article describes the common causes of recurrent vertigo and dizziness that can be diagnosed largely on the basis of history. Ninety percent of spontaneous recurrent vertigo and dizziness can be explained by six disorders: (1) Ménière disease is characterized by vertigo attacks, lasting 20 minutes to several hours, with concomitant hearing loss, tinnitus, and aural fullness. Aural symptoms become permanent during the course of the disease. (2) Attacks of vestibular migraine may last anywhere from minutes to days. Most patients have a previous history of migraine headaches, and many experience migraine symptoms during the attack. (3) Vertebrobasilar TIAs affect older adults with vascular risk factors. Most attacks last less than 1 hour and are accompanied by other symptoms from the posterior circulation territory. (4) Vestibular paroxysmia is caused by vascular compression of the eighth cranial nerve. It manifests itself with brief attacks of vertigo that recur many times per day, sometimes with concomitant cochlear symptoms. (5) Orthostatic hypotension causes brief episodes of dizziness lasting seconds to a few minutes after standing up and is relieved by sitting or lying down. In older adults, it may be accompanied by supine hypertension. (6) Panic attacks usually last minutes, occur in specific situations, and are accompanied by choking, palpitations, tremor, heat, and anxiety. Less common causes of spontaneous recurrent vertigo and dizziness include perilymph fistula, superior canal dehiscence, autoimmune inner ear disease, otosclerosis, cardiac arrhythmia, and medication side effects. Neurologists need to venture into otolaryngology, internal medicine, and psychiatry to master the differential diagnosis of recurrent dizziness.

  10. On Cyber Attacks and Signature Based Intrusion Detection for MODBUS Based Industrial Control Systems

    Directory of Open Access Journals (Sweden)

    Wei Gao

    2014-03-01

    Full Text Available Industrial control system communication networks are vulnerable to reconnaissance, response injection, command injection, and denial of service attacks.  Such attacks can lead to an inability to monitor and control industrial control systems and can ultimately lead to system failure. This can result in financial loss for control system operators and economic and safety issues for the citizens who use these services.  This paper describes a set of 28 cyber attacks against industrial control systems which use the MODBUS application layer network protocol. The paper also describes a set of standalone and state based intrusion detection system rules which can be used to detect cyber attacks and to store evidence of attacks for post incident analysis. All attacks described in this paper were validated in a laboratory environment. The detection rate of the intrusion detection system rules presented by attack class is also presented.

  11. Regional movements of the tiger shark, Galeocerdo cuvier, off Northeastern Brazil: inferences regarding shark attack hazard.

    Science.gov (United States)

    Hazin, Fábio H V; Afonso, André S; De Castilho, Pedro C; Ferreira, Luciana C; Rocha, Bruno C L M

    2013-09-01

    An abnormally high shark attack rate verified off Recife could be related to migratory behavior of tiger sharks. This situation started after the construction of the Suape port to the south of Recife. A previous study suggested that attacking sharks could be following northward currents and that they were being attracted shoreward by approaching vessels. In this scenario, such northward movement pattern could imply a higher probability of sharks accessing the littoral area of Recife after leaving Suape. Pop-up satellite archival tags were deployed on five tiger sharks caught off Recife to assess their movement patterns off northeastern Brazil. All tags transmitted from northward latitudes after 7-74 days of freedom. The shorter, soak distance between deployment and pop-up locations ranged between 33-209 km and implied minimum average speeds of 0.02-0.98 km.h-1. Both pop-up locations and depth data suggest that tiger shark movements were conducted mostly over the continental shelf. The smaller sharks moved to deeper waters within 24 hours after releasing, but they assumed a shallower (shark movements in the South Atlantic, this study also adds new information for the reasoning of the high shark attack rate verified in this region.

  12. Endometrial Scratch Injury Induces Higher Pregnancy Rate for Women With Unexplained Infertility Undergoing IUI With Ovarian Stimulation: A Randomized Controlled Trial.

    Science.gov (United States)

    Maged, Ahmed M; Al-Inany, Hesham; Salama, Khaled M; Souidan, Ibrahim I; Abo Ragab, Hesham M; Elnassery, Noura

    2016-02-01

    To explore the impact of endometrial scratch injury (ESI) on intrauterine insemination (IUI) success. One hundred and fifty four infertile women received 100 mg of oral clomiphene citrate for 5 days starting on day 3 of the menstrual cycle. Patients were randomized to 2 equal groups: Group C received IUI without ESI and group S had ESI. Successful pregnancy was confirmed by ultrasound. 13, 21, and 10 women got pregnant after the first, second, and third IUI trials, respectively, with 28.6% cumulative pregnancy rate (PR). The cumulative PR was significantly higher in group S (39%) compared to group C (18.2%). The PR in group S was significantly higher compared to that in group C at the second and third trials. The PR was significantly higher in group S at the second trial compared to that reported in the same group at the first trial but nonsignificantly higher compared to that reported during the third trial, while in group C, the difference was nonsignificant. Eight pregnant women had first trimester abortion with 18.2% total abortion rate with nonsignificant difference between studied groups. The ESI significantly improves the outcome of IUI in women with unexplained infertility especially when conducted 1 month prior to IUI. © The Author(s) 2015.

  13. Detection of complex cyber attacks

    Science.gov (United States)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  14. Being born under adverse economic conditions leads to a higher cardiovascular mortality rate later in life: evidence based on individuals born at different stages of the business cycle.

    Science.gov (United States)

    van den Berg, Gerard J; Doblhammer-Reiter, Gabriele; Christensen, Kaare

    2011-05-01

    We connect the recent medical and economic literatures on the long-run effects of early-life conditions by analyzing the effects of economic conditions on the individual cardiovascular (CV) mortality rate later in life, using individual data records from the Danish Twin Registry covering births since the 1870s and including the cause of death. To capture exogenous variation of conditions early in life, we use the state of the business cycle around birth. We find significant negative effects of economic conditions around birth on the individual CV mortality rate at higher ages. There is no effect on the cancer-specific mortality rate. From variation within and between monozygotic and dizygotic twin pairs born under different conditions, we conclude that the fate of an individual is more strongly determined by genetic and household-environmental factors if early-life conditions are poor. Individual-specific qualities come more to fruition if the starting position in life is better.

  15. Choosing What to Protect When Attacker Resources and Asset Valuations are Uncertain

    Directory of Open Access Journals (Sweden)

    Kjell Hausken

    2014-01-01

    Full Text Available The situation has been modelled where the attacker's resources are unknown to the defender. Protecting assets presupposes that the defender has some information on the attacker's resource capabilities. An attacker targets one of two assets. The attacker's resources and valuations of these assets are drawn probabilistically. We specify when the isoutility curves are upward sloping (the defender prefers to invest less in defense, thus leading to higher probabilities of success for attacks on both assets or downward sloping (e.g. when one asset has a low value or high unit defense cost. This stands in contrast to earlier research and results from the uncertainty regarding the level of the attacker's resources. We determine which asset the attacker targets depending on his type, unit attack costs, the contest intensity, and investment in defense. A two stage game is considered, where the defender moves first and the attacker moves second. When both assets are equivalent and are treated equivalently by both players, an interior equilibrium exists when the contest intensity is low, and a corner equilibrium with no defense exists when the contest intensity is large and the attacker holds large resources. Defense efforts are inverse U shaped in the attacker's resources. (original abstract

  16. Higher Prevalence and Awareness, but Lower Control Rate of Hypertension in Patients with Diabetes than General Population: The Fifth Korean National Health and Nutrition Examination Survey in 2011

    Directory of Open Access Journals (Sweden)

    Seung-Hyun Ko

    2014-02-01

    Full Text Available BackgroundWe investigated the prevalence, awareness, treatment, and control rate of hypertension in Korean adults with diabetes using nationally representative data.MethodsUsing data of 5,105 adults from the fifth Korea National Health and Nutrition Examination Survey in 2011 (4,389 nondiabetes mellitus [non-DM], 242 newly diagnosed with DM (new-DM, and 474 previously diagnosed with DM (known-DM, we analyzed the prevalence of hypertension (mean systolic blood pressure ≥140 mm Hg, diastolic blood pressure ≥90 mm Hg, or use of antihypertensive medication and control rate of hypertension (blood pressure [BP] <130/80 mm Hg.ResultsThe prevalence of hypertension in diabetic adults was 54.6% (44.4% in new-DM and 62.6% in known-DM, P<0.0001 and P<0.0001, respectively compared with non-DM adults (26.2%. Compared to non-DM, awareness (85.7%, P<0.001 and treatment (97.0%, P=0.020 rates were higher in known-DM, whereas no differences were found between new-DM and non-DM. Control rate among all hypertensive subjects was lower in new-DM (14.9%, compared to non-DM (35.1%, P<0.001 and known-DM (33.3%, P=0.004. Control rate among treated subjects was also lower in new-DM (25.2%, compared to non-DM (68.4%, P<0.0001 and known-DM (39.9%, P<0.0001.ConclusionHigher prevalence and low control rate of hypertension in adults with diabetes suggest that stringent efforts are needed to control BP in patients with diabetes, particularly in newly diagnosed diabetic patients.

  17. Higher success rate with transcranial electrical stimulation of motor-evoked potentials using constant-voltage stimulation compared with constant-current stimulation in patients undergoing spinal surgery.

    Science.gov (United States)

    Shigematsu, Hideki; Kawaguchi, Masahiko; Hayashi, Hironobu; Takatani, Tsunenori; Iwata, Eiichiro; Tanaka, Masato; Okuda, Akinori; Morimoto, Yasuhiko; Masuda, Keisuke; Tanaka, Yuu; Tanaka, Yasuhito

    2017-10-01

    During spine surgery, the spinal cord is electrophysiologically monitored via transcranial electrical stimulation of motor-evoked potentials (TES-MEPs) to prevent injury. Transcranial electrical stimulation of motor-evoked potential involves the use of either constant-current or constant-voltage stimulation; however, there are few comparative data available regarding their ability to adequately elicit compound motor action potentials. We hypothesized that the success rates of TES-MEP recordings would be similar between constant-current and constant-voltage stimulations in patients undergoing spine surgery. The objective of this study was to compare the success rates of TES-MEP recordings between constant-current and constant-voltage stimulation. This is a prospective, within-subject study. Data from 100 patients undergoing spinal surgery at the cervical, thoracic, or lumbar level were analyzed. The success rates of the TES-MEP recordings from each muscle were examined. Transcranial electrical stimulation with constant-current and constant-voltage stimulations at the C3 and C4 electrode positions (international "10-20" system) was applied to each patient. Compound muscle action potentials were bilaterally recorded from the abductor pollicis brevis (APB), deltoid (Del), abductor hallucis (AH), tibialis anterior (TA), gastrocnemius (GC), and quadriceps (Quad) muscles. The success rates of the TES-MEP recordings from the right Del, right APB, bilateral Quad, right TA, right GC, and bilateral AH muscles were significantly higher using constant-voltage stimulation than those using constant-current stimulation. The overall success rates with constant-voltage and constant-current stimulations were 86.3% and 68.8%, respectively (risk ratio 1.25 [95% confidence interval: 1.20-1.31]). The success rates of TES-MEP recordings were higher using constant-voltage stimulation compared with constant-current stimulation in patients undergoing spinal surgery. Copyright © 2017

  18. Using the Domain Name System to Thwart Automated Client-Based Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Taylor, Curtis R [ORNL; Shue, Craig A [ORNL

    2011-09-01

    On the Internet, attackers can compromise systems owned by other people and then use these systems to launch attacks automatically. When attacks such as phishing or SQL injections are successful, they can have negative consequences including server downtime and the loss of sensitive information. Current methods to prevent such attacks are limited in that they are application-specific, or fail to block attackers. Phishing attempts can be stopped with email filters, but if the attacker manages to successfully bypass these filters, then the user must determine if the email is legitimate or not. Unfortunately, they often are unable to do so. Since attackers have a low success rate, they attempt to compensate for it in volume. In order to have this high throughput, attackers take shortcuts and break protocols. We use this knowledge to address these issues by implementing a system that can detect malicious activity and use it to block attacks. If the client fails to follow proper procedure, they can be classified as an attacker. Once an attacker has been discovered, they will be isolated and monitored. This can be accomplished using existing software in Ubuntu Linux applications, along with our custom wrapper application. After running the system and seeing its performance on three popular Web browsers Chromium, Firefox and Internet Explorer as well as two popular email clients, Thunderbird and Evolution, we found that not only is this system conceivable, it is effective and has low overhead.

  19. Mass casualty response in the 2008 Mumbai terrorist attacks.

    Science.gov (United States)

    Roy, Nobhojit; Kapil, Vikas; Subbarao, Italo; Ashkenazi, Isaac

    2011-12-01

    The November 26-29, 2008, terrorist attacks on Mumbai were unique in its international media attention, multiple strategies of attack, and the disproportionate national fear they triggered. Everyone was a target: random members of the general population, iconic targets, and foreigners alike were under attack by the terrorists. A retrospective, descriptive study of the distribution of terror victims to various city hospitals, critical radius, surge capacity, and the nature of specialized medical interventions was gathered through police, legal reports, and interviews with key informants. Among the 172 killed and 304 injured people, about four-fifths were men (average age, 33 years) and 12% were foreign nationals. The case-fatality ratio for this event was 2.75:1, and the mortality rate among those who were critically injured was 12%. A total of 38.5% of patients arriving at the hospitals required major surgical intervention. Emergency surgical operations were mainly orthopedic (external fixation for compound fractures) and general surgical interventions (abdominal explorations for penetrating bullet/shrapnel injuries). The use of heavy-duty automatic weapons, explosives, hostages, and arson in these terrorist attacks alerts us to new challenges to medical counterterrorism response. The need for building central medical control for a coordinated response and for strengthening public hospital capacity are lessons learned for future attacks. These particular terrorist attacks had global consequences, in terms of increased security checks and alerts for and fears of further similar "Mumbai-style" attacks. The resilience of the citizens of Mumbai is a critical measure of the long-term effects of terror attacks.

  20. Improving the ablation efficiency of excimer laser systems with higher repetition rates through enhanced debris removal and optimized spot pattern.

    Science.gov (United States)

    Arba-Mosquera, Samuel; Klinner, Thomas

    2014-03-01

    To evaluate the reasons for the required increased radiant exposure for higher-repetition-rate excimer lasers and determine experimentally possible compensations to achieve equivalent ablation profiles maintaining the same single-pulse energies and radiant exposures for laser repetition rates ranging from 430 to 1000 Hz. Schwind eye-tech-solutions GmbH and Co. KG, Kleinostheim, Germany. Experimental study. Poly(methyl methacrylate) (PMMA) plates were photoablated. The pulse laser energy was maintained during all experiments; the effects of the flow of the debris removal, the shot pattern for the correction, and precooling the PMMA plates were evaluated in terms of achieved ablation versus repetition rate. The mean ablation performance ranged from 88% to 100%; the variability between the profile measurements ranged from 1.4% to 6.2%. Increasing the laser repetition rate from 430 Hz to 1000 Hz reduced the mean ablation performance from 98% to 91% and worsened the variability from 1.9% to 4.3%. Increasing the flow of the debris removal, precooling the PMMA plates to -18°C, and adapting the shot pattern for the thermal response of PMMA to excimer ablation helped stabilize the variability. Only adapting the shot pattern for the thermal response of PMMA to excimer ablation helped stabilize the mean ablation performance. The ablation performance of higher-repetition-rate excimer lasers on PMMA improved with improvements in the debris removal systems and shot pattern. More powerful debris removal systems and smart shot patterns in terms of thermal response improved the performance of these excimer lasers. Copyright © 2014 ASCRS and ESCRS. Published by Elsevier Inc. All rights reserved.

  1. Older Adults With a Combination of Vision and Hearing Impairment Experience Higher Rates of Cognitive Impairment, Functional Dependence, and Worse Outcomes Across a Set of Quality Indicators.

    Science.gov (United States)

    Davidson, Jacob G S; Guthrie, Dawn M

    2017-08-01

    Hearing and vision impairment were examined across several health-related outcomes and across a set of quality indicators (QIs) in home care clients with both vision and hearing loss (or dual sensory impairment [DSI]). Data collected using the Resident Assessment Instrument for Home Care (RAI-HC) were analyzed in a sample of older home care clients. The QIs represent the proportion of clients experiencing negative outcomes (e.g., falls, social isolation). The average age of clients was 82.8 years ( SD = 7.9), 20.5% had DSI and 8.5% had a diagnosis of Alzheimer's disease (AD). Clients with DSI were more likely to have a diagnosis of dementia (not AD), have functional impairments, report loneliness, and have higher rates across 20 of the 22 QIs, including communication difficulty and cognitive decline. Clients with highly impaired hearing, and any visual impairment, had the highest QI rates. Individuals with DSI experience higher rates of adverse events across many health-related outcomes and QIs. Understanding the unique contribution of hearing and vision in this group can promote optimal quality of care.

  2. Peacetime Use of Computer Network Attack

    National Research Council Canada - National Science Library

    Busby, Daniel

    2000-01-01

    .... PDD-63 alerts the nation to prepare for impending cyber attacks. This paper examines the nature, scale, and likelihood of cyber attacks posited in PDD-63 and finds that the country does not face an imminent "electronic Pearl Harbor...

  3. Women's Heart Disease: Heart Attack Symptoms

    Science.gov (United States)

    ... of this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter ... most common heart attack symptom in men and women is chest pain or discomfort. However, women also ...

  4. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  5. Robust Detection of Stepping-Stone Attacks

    National Research Council Canada - National Science Library

    He, Ting; Tong, Lang

    2006-01-01

    The detection of encrypted stepping-stone attack is considered. Besides encryption and padding, the attacker is capable of inserting chaff packets and perturbing packet timing and transmission order...

  6. Using an ontology for network attack planning

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-09-01

    Full Text Available The modern complexity of network attacks and their counter-measures (cyber operations) requires detailed planning. This paper presents a Network Attack Planning ontology which is aimed at providing support for planning such network operations within...

  7. Central nervous system tumours among adolescents and young adults (15-39 years) in Southern and Eastern Europe: Registration improvements reveal higher incidence rates compared to the US.

    Science.gov (United States)

    Georgakis, Marios K; Panagopoulou, Paraskevi; Papathoma, Paraskevi; Tragiannidis, Athanasios; Ryzhov, Anton; Zivkovic-Perisic, Snezana; Eser, Sultan; Taraszkiewicz, Łukasz; Sekerija, Mario; Žagar, Tina; Antunes, Luis; Zborovskaya, Anna; Bastos, Joana; Florea, Margareta; Coza, Daniela; Demetriou, Anna; Agius, Domenic; Strahinja, Rajko M; Sfakianos, Georgios; Nikas, Ioannis; Kosmidis, Sofia; Razis, Evangelia; Pourtsidis, Apostolos; Kantzanou, Maria; Dessypris, Nick; Petridou, Eleni Th

    2017-11-01

    To present incidence of central nervous system (CNS) tumours among adolescents and young adults (AYAs; 15-39 years) derived from registries of Southern and Eastern Europe (SEE) in comparison to the Surveillance, Epidemiology and End Results (SEER), US and explore changes due to etiological parameters or registration improvement via evaluating time trends. Diagnoses of 11,438 incident malignant CNS tumours in AYAs (1990-2014) were retrieved from 14 collaborating SEE cancer registries and 13,573 from the publicly available SEER database (1990-2012). Age-adjusted incidence rates (AIRs) were calculated; Poisson and joinpoint regression analyses were performed for temporal trends. The overall AIR of malignant CNS tumours among AYAs was higher in SEE (28.1/million) compared to SEER (24.7/million). Astrocytomas comprised almost half of the cases in both regions, albeit the higher proportion of unspecified cases in SEE registries (30% versus 2.5% in SEER). Similar were the age and gender distributions across SEE and SEER with a male-to-female ratio of 1.3 and an overall increase of incidence by age. Increasing temporal trends in incidence were documented in four SEE registries (Greater Poland, Portugal North, Turkey-Izmir and Ukraine) versus an annual decrease in Croatia (-2.5%) and a rather stable rate in SEER (-0.3%). This first report on descriptive epidemiology of AYAs malignant CNS tumours in the SEE area shows higher incidence rates as compared to the United States of America and variable temporal trends that may be linked to registration improvements. Hence, it emphasises the need for optimisation of cancer registration processes, as to enable the in-depth evaluation of the observed patterns by disease subtype. Copyright © 2017 Elsevier Ltd. All rights reserved.

  8. Attack Graph Construction for Security Events Analysis

    Directory of Open Access Journals (Sweden)

    Andrey Alexeevich Chechulin

    2014-09-01

    Full Text Available The paper is devoted to investigation of the attack graphs construction and analysis task for a network security evaluation and real-time security event processing. Main object of this research is the attack modeling process. The paper contains the description of attack graphs building, modifying and analysis technique as well as overview of implemented prototype for network security analysis based on attack graph approach.

  9. Higher tacrolimus trough levels on days 2-5 post-renal transplant are associated with reduced rates of acute rejection.

    LENUS (Irish Health Repository)

    O'Seaghdha, C M

    2011-04-06

    We analyzed the association between whole-blood trough tacrolimus (TAC) levels in the first days post-kidney transplant and acute cellular rejection (ACR) rates. Four hundred and sixty-four consecutive, deceased-donor kidney transplant recipients were included. All were treated with a combination of TAC, mycophenolate mofetil and prednisolone. Patients were analyzed in four groups based on quartiles of the mean TAC on days 2 and 5 post-transplant: Group 1: median TAC 11 ng\\/mL (n = 122, range 2-13.5 ng\\/mL), Group 2: median 17 ng\\/mL (n = 123, range 14-20 ng\\/mL), Group 3: median 24 ng\\/mL (n = 108, range 20.5-27 ng\\/mL) and Group 4: median 33.5 ng\\/mL (n = 116, range 27.5-77.5 ng\\/mL). A graded reduction in the rates of ACR was observed for each incremental days 2-5 TAC. The one-yr ACR rate was 24.03% (95% CI 17.26-32.88), 22.20% (95% CI 15.78-30.70), 13.41% (95% CI 8.15-21.63) and 8.69% (95% CI 4.77-15.55) for Groups 1-4, respectively (p = 0.003). This study suggests that higher early TACs are associated with reduced rates of ACR at one yr.

  10. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  11. Automated classification of computer network attacks

    CSIR Research Space (South Africa)

    Van Heerden, R

    2013-11-01

    Full Text Available according to the relevant types of attack scenarios depicted in the ontology. The two network attack instances are the Distributed Denial of Service attack on SpamHaus in 2013 and the theft of 42 million Rand ($6.7 million) from South African Postbank...

  12. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  13. Gender differences in treatment of severe carotid stenosis after transient ischemic attack.

    Science.gov (United States)

    Poisson, Sharon N; Johnston, S Claiborne; Sidney, Stephen; Klingman, Jeffrey G; Nguyen-Huynh, Mai N

    2010-09-01

    Gender differences in carotid endarterectomy (CEA) rates after transient ischemic attack are not well studied, although some reports suggest that eligible men are more likely to have CEA than women after stroke. We retrospectively identified all patients diagnosed with transient ischemic attack and >or=70% carotid stenosis on ultrasound in 2003 to 2004 from 19 emergency departments. Medical records were abstracted for clinical data; 90-day follow-up events, including stroke, cardiovascular events, or death; CEA within 6 months; and postoperative 30-day outcomes. We assessed gender as a predictor of CEA and its complications adjusting for demographic and clinical variables as well as time to CEA between groups. Of 299 patients identified, 47% were women. Women were older with higher presenting systolic blood pressure and less likely to smoke or to have coronary artery disease or diabetes. Fewer women (36.4%) had CEA than men (53.8%; P=0.004). Reasons for withholding surgical treatment were similar in women and men, and there were no differences in follow-up stroke, cardiovascular event, postoperative complications, or death. Time to CEA was also significantly delayed in women. Women with severe carotid stenosis and recent transient ischemic attack are less likely to undergo CEA than men, and surgeries are more delayed.

  14. Consciousness in non-epileptic attack disorder.

    Science.gov (United States)

    Reuber, Markus; Kurthen, M

    2011-01-01

    Non-epileptic attack disorder (NEAD) is one of the most important differential diagnoses of epilepsy. Impairment of consciousness is the key feature of non-epileptic attacks (NEAs). The first half of this review summarises the clinical research literature featuring observations relating to consciousness in NEAD. The second half places this evidence in the wider context of the recent discourse on consciousness in neuroscience and the philosophy of mind. We argue that studies of consciousness should not only distinguish between the 'level' and `content' of consciousness but also between 'phenomenal consciousness' (consciousness of states it somehow "feels to be like") and 'access consciousness' (having certain 'higher' cognitive processes at one's disposal). The existing evidence shows that there is a great intra- and interindividual variability of NEA experience. However, in most NEAs phenomenal experience - and, as a precondition for that experience, vigilance or wakefulness - is reduced to a lesser degree than in those epileptic seizures involving impairment of consciousness. In fact, complete loss of "consciousness" is the exception rather than the rule in NEAs. Patients, as well as external observers, may have a tendency to overestimate impairments of consciousness during the seizures.

  15. Interferon-free treatment for patients with chronic hepatitis C and autoimmune liver disease: higher SVR rates with special precautions for deterioration of autoimmune hepatitis.

    Science.gov (United States)

    Kanda, Tatsuo; Yasui, Shin; Nakamura, Masato; Nakamoto, Shingo; Takahashi, Koji; Wu, Shuang; Sasaki, Reina; Haga, Yuki; Ogasawara, Sadahisa; Saito, Tomoko; Kobayashi, Kazufumi; Kiyono, Soichiro; Ooka, Yoshihiko; Suzuki, Eiichiro; Chiba, Tetsuhiro; Maruyama, Hitoshi; Imazeki, Fumio; Moriyama, Mitsuhiko; Kato, Naoya

    2018-02-20

    Interferon-free treatment can achieve higher sustained virological response (SVR) rates, even in patients in whom hepatitis C virus (HCV) could not be eradicated in the interferon treatment era. Immune restoration in the liver is occasionally associated with HCV infection. We examined the safety and effects of interferon-free regimens on HCV patients with autoimmune liver diseases. All 7 HCV patients with autoimmune hepatitis (AIH) completed treatment and achieved SVR. Three patients took prednisolone (PSL) at baseline, and 3 did not take PSL during interferon-free treatment. In one HCV patient with AIH and cirrhosis, PSL were not administered at baseline, but she needed to take 40 mg/day PSL at week 8 for liver dysfunction. She also complained back pain and was diagnosed with vasospastic angina by coronary angiography at week 11. However, she completed interferon-free treatment. All 5 HCV patients with primary biliary cholangitis (PBC) completed treatment and achieved SVR. Three of these HCV patients with PBC were treated with UDCA during interferon-free treatment. Interferon-free regimens could result in higher SVR rates in HCV patients with autoimmune liver diseases. As interferon-free treatment for HCV may have an effect on hepatic immunity and activity of the autoimmune liver diseases, careful attention should be paid to unexpected adverse events in their treatments. Total 12 patients with HCV and autoimmune liver diseases [7 AIH and PBC], who were treated with interferon-free regimens, were retrospectively analyzed.

  16. Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers

    NARCIS (Netherlands)

    Pieters, Wolter; Davarynejad, Mohsen

    2015-01-01

    Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of multiple steps and alternative paths. It is possible to derive properties of the overall attacks from properties of individual steps, such as cost for the attacker and probability of success. However, in

  17. Leflunomide is associated with a higher flare rate compared to methotrexate in the treatment of chronic uveitis in juvenile idiopathic arthritis.

    Science.gov (United States)

    Bichler, J; Benseler, S M; Krumrey-Langkammerer, M; Haas, J-P; Hügle, B

    2015-01-01

    Chronic anterior uveitis is a serious complication of juvenile idiopathic arthritis (JIA); disease flares are highly associated with loss of vision. Leflunomide (LEF) is used successfully for JIA joint disease but its effectiveness in uveitis has not been determined. The aim of this study was to determine whether LEF improves flare rates of uveitis in JIA patients compared to preceding methotrexate (MTX) therapy. A single-centre retrospective study of consecutive children with JIA and chronic anterior uveitis was performed. All children initially received MTX and were then switched to LEF. Demographic, clinical, and laboratory data, dose and duration of MTX and LEF therapy, concomitant medications and rate of anterior uveitis flares, as determined by an expert ophthalmologist, were obtained. Flare rates were compared using a generalized linear mixed model with a negative binomial distribution. A total of 15 children were included (80% females, all antinuclear antibody positive). The median duration of MTX therapy was 51 (range 26-167) months; LEF was given for a median of 12 (range 4-47) months. Anti-tumour necrosis factor (anti-TNF-α) co-medication was given to four children while on MTX. By contrast, LEF was combined with anti-TNF-α treatment in six children. On MTX, JIA patients showed a uveitis flare rate of 0.0247 flares/month, while LEF treatment was associated with a significantly higher flare rate of 0.0607 flares/month (p = 0.008). Children with JIA had significantly more uveitis flares on LEF compared to MTX despite receiving anti-TNF-α co-medication more frequently. Therefore, LEF may need to be considered less effective in controlling chronic anterior uveitis.

  18. The characteristics of radiological cloud caused by 'dirty bomb' attack

    International Nuclear Information System (INIS)

    Wang Qingbo; Wang Bairong

    2006-01-01

    This paper discusses the characteristics of the radiological cloud after the RDD explosion, including the initial cloud size, material's distribution and the rate of particle or aerosol sedimentation. For there are limited papers in involved this topic publicly, only empirical formulas are given. However, it would be helpful when evaluating the consequences of the RDD terrorism attacks. (authors)

  19. Optimality of Gaussian attacks in continuous-variable quantum cryptography.

    Science.gov (United States)

    Navascués, Miguel; Grosshans, Frédéric; Acín, Antonio

    2006-11-10

    We analyze the asymptotic security of the family of Gaussian modulated quantum key distribution protocols for continuous-variables systems. We prove that the Gaussian unitary attack is optimal for all the considered bounds on the key rate when the first and second momenta of the canonical variables involved are known by the honest parties.

  20. Assessing Sexual Abuse/Attack Histories with Bariatric Surgery Patients

    Science.gov (United States)

    Mahony, David

    2010-01-01

    This study assessed sexual abuse/attack histories in 537 bariatric surgery patients using the PsyBari. The prevalence rates found were lower (15.5%, 19.3% of women, 5.2% of men) than other studies that used bariatric surgery patients but consistent with studies that used nonbariatric obese subjects. Furthermore, bariatric surgery patients who…

  1. Ways to be different: Foraging adaptations that facilitate higher intake rates in a northerly wintering shorebird compared with a low-latitude conspecific

    Science.gov (United States)

    Ruthrauff, Daniel R.; Dekinga, Anne; Gill, Robert E.; van Gils, Jan A.; Piersma, Theunis

    2015-01-01

    At what phenotypic level do closely related subspecies that live in different environments differ with respect to food detection, ingestion and processing? This question motivated an experimental study on rock sandpipers (Calidris ptilocnemis). The species' nonbreeding range spans 20 deg of latitude, the extremes of which are inhabited by two subspecies: C. p. ptilocnemis that winters primarily in upper Cook Inlet, Alaska (61°N) and C. p. tschuktschorum that overlaps slightly with C. p. ptilocnemis but whose range extends much farther south (∼40°N). In view of the strongly contrasting energetic demands of their distinct nonbreeding distributions, we conducted experiments to assess the behavioral, physiological and sensory aspects of foraging and we used the bivalve Macoma balthica for all trials. C. p. ptilocnemis consumed a wider range of prey sizes, had higher maximum rates of energy intake, processed shell waste at higher maximum rates and handled prey more quickly. Notably, however, the two subspecies did not differ in their abilities to find buried prey. The subspecies were similar in size and had equally sized gizzards, but the more northern ptilocnemis individuals were 10–14% heavier than their same-sex tschuktschorum counterparts. The higher body mass in ptilocnemis probably resulted from hypertrophy of digestive organs (e.g. intestine, liver) related to digestion and nutrient assimilation. Given the previously established equality of the metabolic capacities of the two subspecies, we propose that the high-latitude nonbreeding range of ptilocnemis rock sandpipers is primarily facilitated by digestive (i.e. physiological) aspects of their foraging ecology rather than behavioral or sensory aspects.

  2. Core-needle biopsy of breast cancer is associated with a higher rate of distant metastases 5 to 15 years after diagnosis than FNA biopsy.

    Science.gov (United States)

    Sennerstam, Roland B; Franzén, Bo S H; Wiksell, Hans O T; Auer, Gert U

    2017-10-01

    The literature offers discordant results regarding whether diagnostic biopsy is associated with the dissemination of cancer cells, resulting in local and/or distant metastasis. The long-term outcomes of patients with breast cancer were compared between those who were diagnosed using either fine-needle aspiration biopsy (FNAB) or core-needle biopsy (CNB) during 2 decades: the 1970s and 1990s. In the 1970s, the only diagnostic needle biopsy method used for breast cancer in Sweden was FNAB. CNB was introduced 1989 and became established in Stockholm Gotland County in the early 1990s. The authors compared the clinical outcomes of patients diagnosed using FNAB from 1971 to 1976 (n = 354) versus those of patients diagnosed using CNB from 1991 to 1995 (n = 1729). Adjusting for differences in various treatment modalities, mammography screening, tumor size, DNA ploidy, and patient age between the 2 decades, 2 strictly matched samples representing FNAB (n = 181) and CNB (n = 203) were selected for a 15-year follow-up study. In a comparison of the rates of distant metastasis in the strictly matched patient groups from the FNAB and CNB cohorts, significantly higher rates of late-appearing (5-15 years after diagnosis) distant metastasis were observed among the patients who were diagnosed on CNB compared with those who were diagnosed on FNAB. No significant difference in local metastasis was observed between the 2 groups. At 5 to 15 years after diagnosis of the primary tumor, CNB-diagnosed patients had significantly higher rates of distant metastases than FNAB-diagnosed patients. Cancer Cytopathol 2017;125:748-56. © 2017 American Cancer Society. © 2017 American Cancer Society.

  3. Whispering through DDoS attack

    OpenAIRE

    Miralem Mehic; Jiri Slachta; Miroslav Voznak

    2016-01-01

    Denial of service (DoS) attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS) attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes o...

  4. Script-viruses Attacks on UNIX OS

    Directory of Open Access Journals (Sweden)

    D. M. Mikhaylov

    2010-06-01

    Full Text Available In this article attacks on UNIX OS are considered. Currently antivirus developers are concentrated on protecting systems from viruses that are most common and attack popular operating systems. If the system or its components are not often attacked then the antivirus products are not protecting these components as it is not profitable. The same situation is with script-viruses for UNIX OS as most experts consider that it is impossible for such viruses to get enough rights to attack. Nevertheless the main conclusion of this article is the fact that such viruses can be very powerful and can attack systems and get enough rights.

  5. Effect of 60Co γ-irradiation on germination rate of corms and selection of a higher temperature-tolerance mutant 'zf893' of Crocus sativus L

    International Nuclear Information System (INIS)

    Zhang Qiaosheng; Wang Zhiping; Pan Jianyong; Li Xuebing; Xu Bujin; Zou Fenglian; Lu Gang

    2009-01-01

    The effects of 60 Co γ-rays irradiation on germination rate of corms of saffron (Crocus sativus L.) were studied and the results were as follows: (1) The corm germination rate raised with the corm fresh weight M (g) increasing, and the corms of 3 60 Co γ-rays, the typical radiation effect of dose on germination rate were obtained, and the semi-lethal dose (D 50 ) for the corms of 3 60 Co γ-rays and the stigma productivity of ZF893 was 1.3 times as that of the parent, for the field growing period, total weight of daughter corms and flower numbers of ZF893 were 22%, 27% and 30% higher than that of the parent, respectively. (4) The soluble protein SDS-PAGE patterns between ZF893 and it's parent were very similar, but the 54.8kD bands were much stronger in ZF893 and the 20.9 kD bands which were clear in ZF893, but were nearly absent in it's parent. (authors)

  6. Mechanistic dissimilarities between environmentally-influenced fatigue-crack propagation at near-threshold and higher growth rates in lower-strength steels

    Energy Technology Data Exchange (ETDEWEB)

    Suresh, S.; Ritchie, R. O.

    1981-11-01

    The role of hydrogen gas in influencing fatigue crack propagation is examined for several classes of lower strength pressure vessel and piping steels. Based on measurements over a wide range of growth rates from 10/sup -8/ to 10/sup -2/ mm/cycle, crack propagation rates are found to be significantly higher in dehumidified gaseous hydrogen compared to moist air in two distinct regimes of crack growth, namely (i) at the intermediate range of growth typically above approx. 10/sup -5/ mm/cycle, and (ii) at the near-threshold region below approx. 10/sup -6/ mm/cycle approaching lattice dimensions per cycle. Both effects are seen at maximum stress intensities (K/sub max/) far below the sustained-load threshold stress intensity for hydrogen-assisted cracking (K/sub Iscc/). Characteristics of environmentally influenced fatigue crack growth in each regime are shown to be markedly different with regard to fractography and the effect of such variables as load ratio and frequency. It is concluded that the primary mechanisms responsible for the influence of the environment in each regime are distinctly different. Whereas corrosion fatigue behavior at intermediate growth rates can be attributed to hydrogen embrittlement processes, the primary role of moist environments at near-threshold levels is shown to involve a contribution from enhanced crack closure due to the formation of crack surface corrosion deposits at low load ratios.

  7. A study on the mechanism of speculative attack and the defence strategy of the central bank.

    Directory of Open Access Journals (Sweden)

    Chang-Hyun Yun

    1999-09-01

    Full Text Available We first analyze the concrete mechanism of speculative attack on the foreign exchange market which became very prevalent phenomena during the foreign exchange crisis. When the central bank of the domestic country tries to defend the attack by increasing the interest rate, some problems can arise in that the speculative attacks through foreign exchange options market and/or index futures markets can be very successful due to that policy. So the central bank should pay much attention to the microstructure of the financial markets when the defence strategy against speculative attack is determined.

  8. Vesper: Using Echo-Analysis to Detect Man-in-the-Middle Attacks in LANs

    OpenAIRE

    Mirsky, Yisroel; Kalbo, Naor; Elovici, Yuval; Shabtai, Asaf

    2018-01-01

    The Man-in-the-Middle (MitM) attack is a cyber-attack in which an attacker intercepts traffic, thus harming the confidentiality, integrity, and availability of the network. It remains a popular attack vector due to its simplicity. However, existing solutions are either not portable, suffer from a high false positive rate, or are simply not generic. In this paper, we propose Vesper: a novel plug-and-play MitM detector for local area networks. Vesper uses a technique inspired from impulse respo...

  9. SYN Flood Attack Detection in Cloud Computing using Support Vector Machine

    Directory of Open Access Journals (Sweden)

    Zerina Mašetić

    2017-11-01

    Full Text Available Cloud computing is a trending technology, as it reduces the cost of running a business. However, many companies are skeptic moving about towards cloud due to the security concerns. Based on the Cloud Security Alliance report, Denial of Service (DoS attacks are among top 12 attacks in the cloud computing. Therefore, it is important to develop a mechanism for detection and prevention of these attacks. The aim of this paper is to evaluate Support Vector Machine (SVM algorithm in creating the model for classification of DoS attacks and normal network behaviors. The study was performed in several phases: a attack simulation, b data collection, cfeature selection, and d classification. The proposedmodel achieved 100% classification accuracy with true positive rate (TPR of 100%. SVM showed outstanding performance in DoS attack detection and proves that it serves as a valuable asset in the network security area.

  10. Neutralizing SQL Injection Attack Using Server Side Code Modification in Web Applications

    Directory of Open Access Journals (Sweden)

    Asish Kumar Dalai

    2017-01-01

    Full Text Available Reports on web application security risks show that SQL injection is the top most vulnerability. The journey of static to dynamic web pages leads to the use of database in web applications. Due to the lack of secure coding techniques, SQL injection vulnerability prevails in a large set of web applications. A successful SQL injection attack imposes a serious threat to the database, web application, and the entire web server. In this article, the authors have proposed a novel method for prevention of SQL injection attack. The classification of SQL injection attacks has been done based on the methods used to exploit this vulnerability. The proposed method proves to be efficient in the context of its ability to prevent all types of SQL injection attacks. Some popular SQL injection attack tools and web application security datasets have been used to validate the model. The results obtained are promising with a high accuracy rate for detection of SQL injection attack.

  11. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks. In prac......In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks....... In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...

  12. Effect of Angle of Attack on Slope Climbing Performance

    Science.gov (United States)

    Creager, Colin M.; Jones, Lucas; Smith, Lauren M.

    2017-01-01

    Ascending steep slopes is often a very difficult challenge for off-road vehicles, whether on Earth or on extraterrestrial bodies. This challenge is even greater if the surface consists of loose granular soil that does not provide much shear strength. This study investigated how the path at which a vehicle traverses a slope, specifically the angle that it is commanded to drive relative to the base of the hill (the angle of attack), can affect its performance. A vehicle was driven in loose sand at slope angles up to 15 degrees and angles of attack ranging from 10 to 90 degrees. A novel photogrammetry technique was implemented to both track vehicle motion and create a three-dimensional profile of the terrain. This allowed for true wheel sinkage measurements. The study showed that though low angles of attack result in lower wheel slip and sinkage, the efficiency of the vehicles uphill motion increased at higher angles of attack. For slopes up to 15 degrees, a 90 degree angle of attack provided the greatest likelihood of successful ascent.

  13. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based......Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identified...... on invalidating policies in the system model by identifying possible sequences of actions that lead to an attack. The generated attacks are precise enough to illustrate the threat, and they are general enough to hide the details of individual steps....

  14. Whispering through DDoS attack

    Directory of Open Access Journals (Sweden)

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  15. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  16. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  17. Cache timing attacks on recent microarchitectures

    DEFF Research Database (Denmark)

    Andreou, Alexandres; Bogdanov, Andrey; Tischhauser, Elmar Wolfgang

    2017-01-01

    Cache timing attacks have been known for a long time, however since the rise of cloud computing and shared hardware resources, such attacks found new potentially devastating applications. One prominent example is S$A (presented by Irazoqui et al at S&P 2015) which is a cache timing attack against...... AES or similar algorithms in virtualized environments. This paper applies variants of this cache timing attack to Intel's latest generation of microprocessors. It enables a spy-process to recover cryptographic keys, interacting with the victim processes only over TCP. The threat model is a logically...... separated but CPU co-located attacker with root privileges. We report successful and practically verified applications of this attack against a wide range of microarchitectures, from a two-core Nehalem processor (i5-650) to two-core Haswell (i7-4600M) and four-core Skylake processors (i7-6700). The attack...

  18. Geometrical Sparing Factors for the Rectum and Bladder in the Prediction of Grade 2 and Higher Complications After High-Dose-Rate Brachytherapy for Cervical Cancer

    International Nuclear Information System (INIS)

    Chen, S.-W.; Liang, J.-A.; Hung, Y.-C.; Yeh, L.-S.; Chang, W.-C.; Yang, S.-N.; Lin, F.-J.

    2009-01-01

    Purpose: This study aimed to assess the predictive values of geometrical sparing factors for the rectum and bladder in high-dose-rate intracavitary brachytherapy (HDRICB) for Grade 2 and higher late sequelae in patients with cervical cancer. Methods: A total of 392 patients were enrolled in this study. They were treated with external beam radiotherapy to the pelvis, after which HDRICB was performed using Ir-192 remote after-loading at 1-week intervals for three or four sessions. The geometrical sparing factor (GSF) was defined as the average of the ratios between the reference doses and the Point A dose. Results: A total of 46 patients (11.7%) had Grade 2 or higher late rectal complications (36 Grade 2, 9 Grade 3, and 1 Grade 4). In all, 32 patients (8.2%) had Grade 2 or higher late bladder complications (14 Grade 2, 16 Grade 3, and 2 Grade 4). Multivariate analysis demonstrated a high risk of rectal sequelae in patients who developed bladder complications (p = 0.0004, hazard ratio 3.54) and had a rectal GSF greater than 0.7 (p = 0.01, hazard ratio 1.99). The high risk factors for bladder complications were development of rectal complications (p = 0.0004, hazard ratio 3.74), concurrent chemotherapy (p = 0.0001, relative risk 3.94), and a bladder GSF greater than 0.9 (p = 0.01, hazard ratio, 2.53). Conclusion: This study demonstrates the predictive value of GSFs in HDRICB for cervical cancer. Patients with rectal GSFs greater than 0.7 or bladder GSFs greater than 0.9 are at risk for Grade 2 and higher late sequelae.

  19. Geometrical sparing factors for the rectum and bladder in the prediction of grade 2 and higher complications after high-dose-rate brachytherapy for cervical cancer.

    Science.gov (United States)

    Chen, Shang-Wen; Liang, Ji-An; Hung, Yao-Ching; Yeh, Lian-Shung; Chang, Wei-Chun; Yang, Shih-Neng; Lin, Fang-Jen

    2009-12-01

    This study aimed to assess the predictive values of geometrical sparing factors for the rectum and bladder in high-dose-rate intracavitary brachytherapy (HDRICB) for Grade 2 and higher late sequelae in patients with cervical cancer. A total of 392 patients were enrolled in this study. They were treated with external beam radiotherapy to the pelvis, after which HDRICB was performed using Ir-192 remote after-loading at 1-week intervals for three or four sessions. The geometrical sparing factor (GSF) was defined as the average of the ratios between the reference doses and the Point A dose. A total of 46 patients (11.7%) had Grade 2 or higher late rectal complications (36 Grade 2, 9 Grade 3, and 1 Grade 4). In all, 32 patients (8.2%) had Grade 2 or higher late bladder complications (14 Grade 2, 16 Grade 3, and 2 Grade 4). Multivariate analysis demonstrated a high risk of rectal sequelae in patients who developed bladder complications (p = 0.0004, hazard ratio 3.54) and had a rectal GSF greater than 0.7 (p = 0.01, hazard ratio 1.99). The high risk factors for bladder complications were development of rectal complications (p = 0.0004, hazard ratio 3.74), concurrent chemotherapy (p = 0.0001, relative risk 3.94), and a bladder GSF greater than 0.9 (p = 0.01, hazard ratio, 2.53). This study demonstrates the predictive value of GSFs in HDRICB for cervical cancer. Patients with rectal GSFs greater than 0.7 or bladder GSFs greater than 0.9 are at risk for Grade 2 and higher late sequelae.

  20. REAL-TIME INTELLIGENT MULTILAYER ATTACK CLASSIFICATION SYSTEM

    Directory of Open Access Journals (Sweden)

    T. Subbhulakshmi

    2014-01-01

    Full Text Available Intrusion Detection Systems (IDS takes the lion’s share of the current security infrastructure. Detection of intrusions is vital for initiating the defensive procedures. Intrusion detection was done by statistical and distance based methods. A threshold value is used in these methods to indicate the level of normalcy. When the network traffic crosses the level of normalcy then above which it is flagged as anomalous. When there are occurrences of new intrusion events which are increasingly a key part of system security, the statistical techniques cannot detect them. To overcome this issue, learning techniques are used which helps in identifying new intrusion activities in a computer system. The objective of the proposed system designed in this paper is to classify the intrusions using an Intelligent Multi Layered Attack Classification System (IMLACS which helps in detecting and classifying the intrusions with improved classification accuracy. The intelligent multi layered approach contains three intelligent layers. The first layer involves Binary Support Vector Machine classification for detecting the normal and attack. The second layer involves neural network classification to classify the attacks into classes of attacks. The third layer involves fuzzy inference system to classify the attacks into various subclasses. The proposed IMLACS can be able to detect an intrusion behavior of the networks since the system contains a three intelligent layer classification and better set of rules. Feature selection is also used to improve the time of detection. The experimental results show that the IMLACS achieves the Classification Rate of 97.31%.

  1. TAWS: TABLE ASSISTED WALK STRATEGY IN CLONE ATTACK DETECTION

    Directory of Open Access Journals (Sweden)

    J Sybi Cynthia

    2016-12-01

    Full Text Available Wireless Sensor Networks (WSNs deployed in the destructive atmosphere are susceptible to clone attacks. Clone attack in wireless sensor network is a complicated problem because it deployed in hostile environments, and also the nodes could be physically compromised by an adversary. For valuable clone attack detection, the selection criteria play an important role in the proposed work. In this paper, it has been classified the existing detection schemes regarding device type, detection methodologies, deployment strategies and detection ranges and far explore various proposals in deployment based selection criteria category. And also this paper provides a review of detection methodology based on various clone attack detection techniques. It is also widely agreed that clones should be detected quickly as possible with the best optional. Our work is exploratory in that the proposed algorithm concern with table assisted random walk with horizontal and vertical line, frequent level key change and revokes the duplicate node. Our simulation results show that it is more efficient than the detection criteria in terms of security feature, and in detection rate with high resiliency. Specifically, it concentrates on deployment strategy which includes grid based deployment technique. These all come under the selection criteria for better security performance. Our protocol analytically provides effective and clone attack detection capability of robustness.

  2. Reachable Sets of Hidden CPS Sensor Attacks : Analysis and Synthesis Tools

    NARCIS (Netherlands)

    Murguia, Carlos; van de Wouw, N.; Ruths, Justin; Dochain, Denis; Henrion, Didier; Peaucelle, Dimitri

    2017-01-01

    For given system dynamics, control structure, and fault/attack detection procedure, we provide mathematical tools–in terms of Linear Matrix Inequalities (LMIs)–for characterizing and minimizing the set of states that sensor attacks can induce in the system while keeping the alarm rate of the

  3. Characterization of collective Gaussian attacks and security of coherent-state quantum cryptography.

    Science.gov (United States)

    Pirandola, Stefano; Braunstein, Samuel L; Lloyd, Seth

    2008-11-14

    We provide a simple description of the most general collective Gaussian attack in continuous-variable quantum cryptography. In the scenario of such general attacks, we analyze the asymptotic secret-key rates which are achievable with coherent states, joint measurements of the quadratures and one-way classical communication.

  4. Analysis of 162 colon injuries in patients with penetrating abdominal trauma: concomitant stomach injury results in a higher rate of infection.

    Science.gov (United States)

    O'Neill, Patricia A; Kirton, Orlando C; Dresner, Lisa S; Tortella, Bartholomew; Kestner, Mark M

    2004-02-01

    Fecal contamination from colon injury has been thought to be the most significant factor for the development of surgical site infection (SSI) after trauma. However, there are increasing data to suggest that other factors may play a role in the development of postinjury infection in patients after colon injury. The purpose of this study was to determine the impact of gastric wounding on the development of SSI and nonsurgical site infection (NSSI) in patients with colon injury. Post hoc analysis was performed on data prospectively collected for 317 patients presenting with penetrating hollow viscus injury. One hundred sixty-two patients with colon injury were subdivided into one of three groups: patients with isolated colon wounds (C), patients with colon and stomach wounds with or without other organ injury (C+S), and patients with colon and other organ injury but no stomach injury (C-S) and assessed for the development of SSI and NSSI. Infection rates were also determined for patients who sustained isolated gastric injury (S) and gastric injury in combination with other injuries other than colon (S-C). Penetrating Abdominal Trauma Index, operative times, and transfusion were assessed. Discrete variables were analyzed by Cochran-Mantel-Haenszel chi2 test and Fisher's exact test. Risk factor analysis was performed by multivariate logistic regression. C+S patients had a higher rate of SSI infection (31%) than C patients (3.6%) (p=0.008) and C-S patients (13%) (p=0.021). Similarly, the incidence of NSSI was also significantly greater in the C+S group (37%) compared with the C patients (7.5%) (p=0.07) and the C-S patients (17%) (p=0.019). There was no difference in the rate of SSI or NSSI between the C and C-S groups (p=0.3 and p=0.24, respectively). The rate of SSI was significantly greater in the C+S patients when compared with the S-C patients (31% vs. 10%, p=0.008), but there was no statistical difference in the rate of NSSI in the C+S group and the S-C group (37

  5. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  6. Attack-Resistant Trust Metrics

    Science.gov (United States)

    Levien, Raph

    The Internet is an amazingly powerful tool for connecting people together, unmatched in human history. Yet, with that power comes great potential for spam and abuse. Trust metrics are an attempt to compute the set of which people are trustworthy and which are likely attackers. This chapter presents two specific trust metrics developed and deployed on the Advogato Website, which is a community blog for free software developers. This real-world experience demonstrates that the trust metrics fulfilled their goals, but that for good results, it is important to match the assumptions of the abstract trust metric computation to the real-world implementation.

  7. Elevated basal progesterone levels are associated with increased preovulatory progesterone rise but not with higher pregnancy rates in ICSI cycles with GnRH antagonists.

    Science.gov (United States)

    Mutlu, Mehmet Firat; Erdem, Mehmet; Mutlu, Ilknur; Bulut, Berk; Erdem, Ahmet

    2017-09-01

    To ascertain the association between basal progesterone (P) levels and the occurrence of preovulatory progesterone rise (PPR) and clinical pregnancy rates (CPRs) in ICSI cycles with GnRH antagonists. Serum P levels of 464 patients were measured on day 2 and day of hCG of cycles. Cycles with basal P levels>1.6ng/mL were cancelled. All embryos were cryopreserved in cycles with P levels≥2ng/mL on the day of hCG. The primary outcome measures were the incidence of PPR (P>1.5ng/mL) and CPR with regard to basal P. Basal P levels were significantly higher in cycles with PPR than in those without PPR (0.63±0.31 vs. 0.48±0.28ng/mL). Area under the curve for basal P according to ROC analysis to discriminate between elevated and normal P levels on the day of hCG was 0.65 (0.58-0.71 95% CI, pcycles with and without PPR was 0.65ng/mL. Cycles with basal P levels above 0.65ng/mL had a significantly higher incidence of PPR (30.9% vs. 13.5%) but similar clinical and cumulative pregnancy rates (38.8% vs. 31.1% and 41.7% vs. 32.6%, respectively) in comparison to cycles with basal P levels below 0.65ng/mL. In multivariate regression analysis, basal P levels, LH level on the first day of antagonist administration, and estradiol levels on the day of hCG trigger were the variables that predicted PPR. Basal P levels were associated with increased incidence of PPR but not with CPR. Copyright © 2017 Elsevier B.V. All rights reserved.

  8. Detecting Cyber Attacks On Nuclear Power Plants

    Science.gov (United States)

    Rrushi, Julian; Campbell, Roy

    This paper proposes an unconventional anomaly detection approach that provides digital instrumentation and control (I&C) systems in a nuclear power plant (NPP) with the capability to probabilistically discern between legitimate protocol frames and attack frames. The stochastic activity network (SAN) formalism is used to model the fusion of protocol activity in each digital I&C system and the operation of physical components of an NPP. SAN models are employed to analyze links between protocol frames as streams of bytes, their semantics in terms of NPP operations, control data as stored in the memory of I&C systems, the operations of I&C systems on NPP components, and NPP processes. Reward rates and impulse rewards are defined in the SAN models based on the activity-marking reward structure to estimate NPP operation profiles. These profiles are then used to probabilistically estimate the legitimacy of the semantics and payloads of protocol frames received by I&C systems.

  9. Migraine attacks the Basal Ganglia

    Directory of Open Access Journals (Sweden)

    Bigal Marcelo

    2011-09-01

    Full Text Available Abstract Background With time, episodes of migraine headache afflict patients with increased frequency, longer duration and more intense pain. While episodic migraine may be defined as 1-14 attacks per month, there are no clear-cut phases defined, and those patients with low frequency may progress to high frequency episodic migraine and the latter may progress into chronic daily headache (> 15 attacks per month. The pathophysiology of this progression is completely unknown. Attempting to unravel this phenomenon, we used high field (human brain imaging to compare functional responses, functional connectivity and brain morphology in patients whose migraine episodes did not progress (LF to a matched (gender, age, age of onset and type of medication group of patients whose migraine episodes progressed (HF. Results In comparison to LF patients, responses to pain in HF patients were significantly lower in the caudate, putamen and pallidum. Paradoxically, associated with these lower responses in HF patients, gray matter volume of the right and left caudate nuclei were significantly larger than in the LF patients. Functional connectivity analysis revealed additional differences between the two groups in regard to response to pain. Conclusions Supported by current understanding of basal ganglia role in pain processing, the findings suggest a significant role of the basal ganglia in the pathophysiology of the episodic migraine.

  10. What is the empirical evidence that hospitals with higher-risk adjusted mortality rates provide poorer quality care? A systematic review of the literature

    Directory of Open Access Journals (Sweden)

    Mohammed Mohammed A

    2007-06-01

    Full Text Available Abstract Background Despite increasing interest and publication of risk-adjusted hospital mortality rates, the relationship with underlying quality of care remains unclear. We undertook a systematic review to ascertain the extent to which variations in risk-adjusted mortality rates were associated with differences in quality of care. Methods We identified studies in which risk-adjusted mortality and quality of care had been reported in more than one hospital. We adopted an iterative search strategy using three databases – Medline, HealthSTAR and CINAHL from 1966, 1975 and 1982 respectively. We identified potentially relevant studies on the basis of the title or abstract. We obtained these papers and included those which met our inclusion criteria. Results From an initial yield of 6,456 papers, 36 studies met the inclusion criteria. Several of these studies considered more than one process-versus-risk-adjusted mortality relationship. In total we found 51 such relationships in a widen range of clinical conditions using a variety of methods. A positive correlation between better quality of care and risk-adjusted mortality was found in under half the relationships (26/51 51% but the remainder showed no correlation (16/51 31% or a paradoxical correlation (9/51 18%. Conclusion The general notion that hospitals with higher risk-adjusted mortality have poorer quality of care is neither consistent nor reliable.

  11. Incidence of Stroke and Transient Ischemic Attack in Croatia: A Population Based Study.

    Science.gov (United States)

    Kadojić, Dragutin; Demarin, Vida; Dikanović, Marinko; Lusić, Ivo; Tuskan-Mohar, Lidija; Trkanjec, Zlatko; Mihaljević, Ivan; Kadojić, Mira; Bitunjac, Milan; Vranjes, Zeljko

    2015-09-01

    The aim of this population based neuroepidemiological study was to establish the real incidence rates of acute cerebrovascular disease (CVD): stroke and transient ischemic attack (TIA) in the Republic of Croatia. Multicentric study included 89 501 persons of all ages in four regional centres in Croatia: Zagreb, Osijek + Slavonski Brod, Rijeka and Split. The following incidence rates of stroke, expressed at population of 100 000, have been established: Zagreb 290.52, Osijek + Slavonski Brod 302.14, Rijeka 219.65, Split 195.82. Incidence rate of stroke for the Republic of Croatia is 251.39. The following incidence rates of TIA, expressed at population of 100,000, have been established: Zagreb 87.15, Osijek + Slavonski Brod 156.53, Rijeka 90.11, Split 59.10. Incidence rate of TIA for the Republic of Croatia is 100.55. In the continental part of Croatia (Zagreb, Osijek + Slavonski Brod) incidence rate of stroke is higher by 45%, while incidence rate of TIA is higher by 82% than in the coastal part of Croatia, probably due to different lifestyle and environmental factors. The study has shown relatively high incidence rates of acute CVD (stroke and TIA) in the Republic of Croatia, which proves that CVD are a great public health problem.

  12. Possibility of spoof attack against robustness of multibiometric authentication systems

    Science.gov (United States)

    Hariri, Mahdi; Shokouhi, Shahriar Baradaran

    2011-07-01

    Multibiometric systems have been recently developed in order to overcome some weaknesses of single biometric authentication systems, but security of these systems against spoofing has not received enough attention. In this paper, we propose a novel practical method for simulation of possibilities of spoof attacks against a biometric authentication system. Using this method, we model matching scores from standard to completely spoofed genuine samples. Sum, product, and Bayes fusion rules are applied for score level combination. The security of multimodal authentication systems are examined and compared with the single systems against various spoof possibilities. However, vulnerability of fused systems is considerably increased against spoofing, but their robustness is generally higher than single matcher systems. In this paper we show that robustness of a combined system is not always higher than a single system against spoof attack. We propose empirical methods for upgrading the security of multibiometric systems, which contain how to organize and select biometric traits and matchers against various possibilities of spoof attack. These methods provide considerable robustness and present an appropriate reason for using combined systems against spoof attacks.

  13. DDOS ATTACK DETECTION SIMULATION AND HANDLING MECHANISM

    Directory of Open Access Journals (Sweden)

    Ahmad Sanmorino

    2013-11-01

    Full Text Available In this study we discuss how to handle DDoS attack that coming from the attacker by using detection method and handling mechanism. Detection perform by comparing number of packets and number of flow. Whereas handling mechanism perform by limiting or drop the packets that detected as a DDoS attack. The study begins with simulation on real network, which aims to get the real traffic data. Then, dump traffic data obtained from the simulation used for detection method on our prototype system called DASHM (DDoS Attack Simulation and Handling Mechanism. From the result of experiment that has been conducted, the proposed method successfully detect DDoS attack and handle the incoming packet sent by attacker.

  14. Model checking exact cost for attack scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2017-01-01

    Attack trees constitute a powerful tool for modelling security threats. Many security analyses of attack trees can be seamlessly expressed as model checking of Markov Decision Processes obtained from the attack trees, thus reaping the benefits of a coherent framework and a mature tool support....... However, current model checking does not encompass the exact cost analysis of an attack, which is standard for attack trees. Our first contribution is the logic erPCTL with cost-related operators. The extended logic allows to analyse the probability of an event satisfying given cost bounds and to compute...... the exact cost of an event. Our second contribution is the model checking algorithm for erPCTL. Finally, we apply our framework to the analysis of attack trees....

  15. Securing internet by eliminating DDOS attacks

    Science.gov (United States)

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  16. Psychological distress and prejudice following terror attacks in France.

    Science.gov (United States)

    Goodwin, Robin; Kaniasty, Krzysztof; Sun, Shaojing; Ben-Ezra, Menachem

    2017-08-01

    Terrorist attacks have the capacity to threaten our beliefs about the world, cause distress across populations and promote discrimination towards particular groups. We examined the impact of two different types of attacks in the same city and same year on psychological distress and probable posttraumatic stress symptoms, and the moderating effects of religion or media use on distress/posttraumatic symptoms and inter-group relations. Two panel surveys four weeks after the January 2015 Charlie Hebdo attack (N = 1981) and the November 2015 Bataclan concert hall/restaurant attacks (N = 1878), measured intrinsic religiosity, social and traditional media use, psychological distress (K6), probable posttraumatic stress symptoms (proposed ICD-11), symbolic racism and willingness to interact with Muslims by non-Muslims. Prevalence of serious mental illness (K6 score > 18) was higher after November 2015 attacks (7.0% after the first attack, 10.2% the second, χ2 (1) = 5.67, p < 0.02), as were probable posttraumatic stress symptoms (11.9% vs. 14.1%; χ2 (1) = 4.15, p < 0.04). In structural equation analyses, sex, age, geographic proximity, media use and religiosity were associated with distress, as was the interaction between event and religiosity. Distress was then associated with racism symbolism and willingness to interact with Muslims. Implications are considered for managing psychological trauma across populations, and protecting inter-group harmony. Copyright © 2017 Elsevier Ltd. All rights reserved.

  17. Reference Values for the Marx Activity Rating Scale in a Young Athletic Population: History of Knee Ligament Injury Is Associated With Higher Scores.

    Science.gov (United States)

    Cameron, Kenneth L; Peck, Karen Y; Thompson, Brandon S; Svoboda, Steven J; Owens, Brett D; Marshall, Stephen W

    2015-01-01

    Activity-related patient-reported outcome measures are an important component of assessment after knee ligament injury in young and physically active patients; however, normative data for most activity scales are limited. To present reference values by sex for the Marx Activity Rating Scale (MARS) within a young and physically active population while accounting for knee ligament injury history and sex. Cross-sectional study. Level 2. All incoming freshman entering a US Service Academy in June of 2011 were recruited to participate in this study. MARS was administered to 1169 incoming freshmen (203 women) who consented to participate within the first week of matriculation. All subjects were deemed healthy and medically fit for military service on admission. Subjects also completed a baseline questionnaire that asked for basic demographic information and injury history. We calculated means with standard deviations, medians with interquartile ranges, and percentiles for ordinal and continuous variables, and frequencies and proportions for dichotomous variables. We also compared median scores by sex and history of knee ligament injury using the Kruskal-Wallis test. MARS was the primary outcome of interest. The median MARS score was significantly higher for men when compared with women (χ(2) = 13.22, df = 1, P MARS scores between men and women (χ(2) = 0.47, df = 1, P = 0.493) who reported a history of injury. Overall, median MARS scores were significantly higher among those who reported a history of knee ligament injury when compared with those who did not (χ(2) = 9.06, df = 1, P = 0.003). Assessing activity as a patient-reported outcome after knee ligament injury is important, and reference values for these instruments need to account for the influence of prior injury and sex. © 2015 The Author(s).

  18. Where can an Insider attack?

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming

    2006-01-01

    By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage...... to the targeted organisation. While the problem is well recognised in the security community as well as in law-enforcement and intelligence communities, the main resort still is to audit log files \\$\\backslash\\$emph{after the fact}. There has been little research into developing models, automated tools......, and techniques for analysing and solving (parts of) the problem. In this paper we first develop a formal model of systems, that can describe real-world scenarios. These high-level models are then mapped to acKlaim, a process algebra with support for access control, that is used to study and analyse properties...

  19. Transient ischemic attack: diagnostic evaluation.

    Science.gov (United States)

    Messé, Steven R; Jauch, Edward C

    2008-08-01

    A transient ischemic attack portends significant risk of a stroke. Consequently, the diagnostic evaluation in the emergency department is focused on identifying high-risk causes so that preventive strategies can be implemented. The evaluation consists of a facilitated evaluation of the patient's metabolic, cardiac, and neurovascular systems. At a minimum, the following tests are recommended: fingerstick glucose level, electrolyte levels, CBC count, urinalysis, and coagulation studies; noncontrast computed tomography (CT) of the head; electrocardiography; and continuous telemetry monitoring. Vascular imaging studies, such as carotid ultrasonography, CT angiography, or magnetic resonance angiography, should be performed on an urgent basis and prioritized according to the patient's risk stratification for disease. Consideration should be given for echocardiography if no large vessel abnormality is identified.

  20. Integrating cyber attacks within fault trees

    International Nuclear Information System (INIS)

    Nai Fovino, Igor; Masera, Marcelo; De Cian, Alessio

    2009-01-01

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  1. Visualizing Risks: Icons for Information Attack Scenarios

    National Research Council Canada - National Science Library

    Hosmer, Hilary

    2000-01-01

    .... Visual attack scenarios help defenders see system ambiguities, imprecision, vulnerabilities and omissions, thus speeding up risk analysis, requirements gathering, safeguard selection, cryptographic...

  2. Classifying network attack scenarios using an ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-03-01

    Full Text Available ) or to the target?s reputation. The Residue sub-phase refers to damage or artefacts of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example after the launch of a DDOS..., A. (1995). Hacking theft of $10 million from citibank revealed. Retrieved 10/10, 2011, from http://articles.latimes.com/1995-08-19/business/fi-36656_1_citibank-system Hurley, E. (2004). SCO site succumbs to DDoS attack. Retrieved 10/10, 2011, from...

  3. A computer network attack taxonomy and ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-01-01

    Full Text Available of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example, after the launch of a DDOS (Distributed Denial of Service) attack, zombie computers may still connect to the target...-scrap- value-of-a-hacked-pc-revisited/ . Lancor, L., & Workman, R. (2007). Using Google Hacking to Enhance Defense Strategies. ACM SIGCSE Bulletin, 39 (1), 491-495. Lau, F., Rubin, S. H., Smith, M. H., & Trajkovic, L. (2000). Distributed Denial of Service...

  4. Integrating cyber attacks within fault trees

    Energy Technology Data Exchange (ETDEWEB)

    Nai Fovino, Igor [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy)], E-mail: igor.nai@jrc.it; Masera, Marcelo [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy); De Cian, Alessio [Department of Electrical Engineering, University di Genova, Genoa (Italy)

    2009-09-15

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  5. Long-Term Results of Fixed High-Dose I-131 Treatment for Toxic Nodular Goiter: Higher Euthyroidism Rates in Geriatric Patients

    Directory of Open Access Journals (Sweden)

    Gül Ege Aktaş

    2015-10-01

    Full Text Available Objective: Geriatric patient population has special importance due to particular challenges. In addition to the increase in incidence of toxic nodular goiter (TNG with age, it has a high incidence in the regions of low-medium iodine intake such as in our country. The aim of this study was to evaluate the overall outcome of high fixed dose radioiodine (RAI therapy, and investigate the particular differences in the geriatric patient population. Methods: One hundred and three TNG patients treated with high dose I-131 (370-740 MBq were retrospectively reviewed. The baseline characteristics; age, gender, scintigraphic patterns and thyroid function tests before and after treatment, as well as follow-up, duration of antithyroid drug (ATD medication and achievement of euthyroid or hypothyroid state were evaluated. The patient population was divided into two groups as those=>65 years and those who were younger, in order to assess the effect of age. Results: Treatment success was 90% with single dose RAI therapy. Hyperthyroidism was treated in 7±7, 2 months after RAI administration. At the end of the first year, overall hypothyroidism rate was 30% and euthyroid state was achieved in 70% of patients. Age was found to be the only statistically significant variable effecting outcome. A higher ratio of euthyroidism was achieved in the geriatric patient population. Conclusion: High fixed dose I-131 treatment should be preferred in geriatric TNG patients in order to treat persistent hyperthyroidism rapidly. The result of this study suggests that high fixed dose RAI therapy is a successful modality in treating TNG, and high rates of euthyroidism can be achieved in geriatric patients.

  6. [Investigation of the presence of human metapneumovirus in patients with chronic obstructive pulmonary disease and asthma and its relationship with the attacks].

    Science.gov (United States)

    Ilvan, Ahmet; Aslan, Gönül; Serin, Mehmet Sami; Calıkoğlu, Mukadder; Yılmaz, Fatma Mehtap; Tezcan, Seda; Taş, Dilaver; Ayrık, Cüneyt; Uygungül, Evren; Sezer, Ogün; Emekdaş, Gürol

    2013-10-01

    Human metapneumovirus (hMPV), an enveloped RNA virus classified in Paramyxoviridae family, was first characterized in 2001 from children with acute respiratory tract infection. Recent studies have suggested hMPV to play a role in chronic obstructive pulmonary disease (COPD) and asthma attacks. The aims of this study were to investigate the frequency of hMPV in patients with COPD and asthma, its effects on the severity of the attacks and the relationship between demographical and clinical factors. A total of 123 patients, including 66 with COPD (45 were in attack and 21 were stable) and 57 with asthma (33 were in attack and 24 were under control) diagnosed according to the criteria of Global Initiative for Chronic Obstructive Lung Disease and the Global Strategy for Asthma Management and Prevention, respectively, were included in the study. Nasopharyngeal lavage samples collected from all of the patients have been evaluated for the presence of hMPV-RNA by using a reverse transcriptase-polymerase chain reaction (RT-PCR) targeting F gene region of the virus. hMPV-RNA positivity rates in patients with COPD and asthma were observed as 30.3% (20/66) and 31.6% (18/57), respectively, and the difference between the groups were not statistically significant (p= 1.00). When patients were compared according to their disease status, hMPV was detected in 31.1% (14/45) of patients with COPD attack and 28.6% of stable patients (p> 0.05). These rates were found as 36.4% (12/33) and 25% (6/24) in patients with asthma attack and controlled asthma, respectively (p> 0.05). Although the virus detection rates in patients with COPD and asthma attacks (26/78; 33.3%) were higher than the patients with stable/controlled disease (12/45; 26.7%), the difference was not found as statistically significant (p= 0.57). The detection rate of hMPV-RNA was 26.1% in patients who can be treated at home and hospital without any need of intensive care and mechanical ventilation, while this rate was 36

  7. Phase-remapping attack in practical quantum-key-distribution systems

    International Nuclear Information System (INIS)

    Fung, Chi-Hang Fred; Qi, Bing; Lo, Hoi-Kwong; Tamaki, Kiyoshi

    2007-01-01

    Quantum key distribution (QKD) can be used to generate secret keys between two distant parties. Even though QKD has been proven unconditionally secure against eavesdroppers with unlimited computation power, practical implementations of QKD may contain loopholes that may lead to the generated secret keys being compromised. In this paper, we propose a phase-remapping attack targeting two practical bidirectional QKD systems (the 'plug-and-play' system and the Sagnac system). We showed that if the users of the systems are unaware of our attack, the final key shared between them can be compromised in some situations. Specifically, we showed that, in the case of the Bennett-Brassard 1984 (BB84) protocol with ideal single-photon sources, when the quantum bit error rate (QBER) is between 14.6% and 20%, our attack renders the final key insecure, whereas the same range of QBER values has been proved secure if the two users are unaware of our attack; also, we demonstrated three situations with realistic devices where positive key rates are obtained without the consideration of Trojan horse attacks but in fact no key can be distilled. We remark that our attack is feasible with only current technology. Therefore, it is very important to be aware of our attack in order to ensure absolute security. In finding our attack, we minimize the QBER over individual measurements described by a general POVM, which has some similarity with the standard quantum state discrimination problem

  8. Familial prostate cancer has a more aggressive course than sporadic prostate cancer after treatment for localized disease, mainly due to a higher rate of distant metastases

    International Nuclear Information System (INIS)

    Kupelian, Patrick A.; Klein, Eric A.; Suh, John H; Kupelian, Varant A.

    1997-01-01

    with negative and positive family history were 83% and 72% percent, respectively (p=0.013). The 5-year locRFS rates for patients with negative and positive family history were 91% and 87% percent, respectively (p=0.45). The 5-year dRFS rates for patients with negative and positive family history were 91% and 84%, respectively (p=0.032). Table 1 displays the statistical significance in crude (univariate) and adjusted (multivariate) analysis of all factors analyzed with respect to outcomes of interest. After adjusting for potential confounders, family history of prostate cancer remained strongly associated with biochemical failure. For RP patients, even in the presence of pathologic parameters, family history remained a strong independent predictor of biochemical, clinical, and distant failure (data not shown). Conclusion: Our findings suggest that familial prostate cancer may have a more aggressive course after treatment than non-familial prostate cancer, and that clinical and/or pathological parameters may not adequately predict this course. Familial prostate cancer seems associated with a higher rate of distant metastases. Further studies need to be performed to confirm these findings

  9. After microvascular decompression to treat trigeminal neuralgia, both immediate pain relief and recurrence rates are higher in patients with arterial compression than with venous compression.

    Science.gov (United States)

    Shi, Lei; Gu, Xiaoyan; Sun, Guan; Guo, Jun; Lin, Xin; Zhang, Shuguang; Qian, Chunfa

    2017-07-04

    We explored differences in postoperative pain relief achieved through decompression of the trigeminal nerve compressed by arteries and veins. Clinical characteristics, intraoperative findings, and postoperative curative effects were analyzed in 72 patients with trigeminal neuralgia who were treated by microvascular decompression. The patients were divided into arterial and venous compression groups based on intraoperative findings. Surgical curative effects included immediate relief, delayed relief, obvious reduction, and invalid result. Among the 40 patients in the arterial compression group, 32 had immediate pain relief of pain (80.0%), 5 cases had delayed relief (12.5%), and 3 cases had an obvious reduction (7.5%). In the venous compression group, 12 patients had immediate relief of pain (37.5%), 13 cases had delayed relief (40.6%), and 7 cases had an obvious reduction (21.9%). During 2-year follow-up period, 6 patients in the arterial compression group experienced recurrence of trigeminal neuralgia, but there were no recurrences in the venous compression group. Simple artery compression was followed by early relief of trigeminal neuralgia more often than simple venous compression. However, the trigeminal neuralgia recurrence rate was higher in the artery compression group than in the venous compression group.

  10. Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0

    NARCIS (Netherlands)

    Gadyatskaya, Olga; Jhawar, Ravi; Kordy, P.T.; Lounis, Karim; Mauw, Sjouke; Trujillo-Rasua, Rolando

    2016-01-01

    In this tool demonstration paper we present the ADTool2.0: an open-source software tool for design, manipulation and analysis of attack trees. The tool supports ranking of attack scenarios based on quantitative attributes entered by the user; it is scriptable; and it incorporates attack trees with

  11. The work-averse cyber attacker model : theory and evidence from two million attack signatures

    NARCIS (Netherlands)

    Allodi, L.; Massacci, F.; Williams, J.

    The typical cyber attacker is assumed to be all powerful and to exploit all possible vulnerabilities. In this paper we present, and empirically validate, a novel and more realistic attacker model. The intuition of our model is that an attacker will optimally choose whether to act and weaponize a new

  12. Noninvasive positive pressure ventilation in acute asthmatic attack

    Directory of Open Access Journals (Sweden)

    A. Soroksky

    2010-03-01

    Full Text Available Asthma is characterised by reversible airway obstruction. In most patients, control of disease activity is easily achieved. However, in a small minority, asthma may be fatal. Between the two extremes lie patients with severe asthmatic attacks, refractory to standard treatment. These patients are at an increased risk of recurrent severe attacks, with respiratory failure, and mechanical ventilation. Invasive mechanical ventilation of the asthmatic patient is associated with a higher risk of complications and, therefore, is a measure of last resort. Noninvasive positive pressure ventilation (NPPV is another treatment modality that may be beneficial in patients with severe asthmatic attack who are at an increased risk of developing respiratory failure. These patients have the potential to benefit from early respiratory support in the form of NPPV. However, reports of NPPV in asthmatic patients are scarce, and its usage in asthmatic attacks is, therefore, still controversial. Only a few reports of NPPV in asthma have been published over the last decade. These studies mostly involve small numbers of patients and those who have problematic methodology. In this article we review the available evidence for NPPV in asthma and try to formulate our recommendations for NPPV application in asthma based on the available evidence and reports.

  13. Attack Tree Generation by Policy Invalidation

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Naeem Akram, R.; Jajodia, S.

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identi﬿cation. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identi﬿ed

  14. Evaluation of Crosstalk Attacks in Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    2016-01-01

    WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks...

  15. Drammer : Deterministic Rowhammer attacks on mobile platforms

    NARCIS (Netherlands)

    Van Der Veen, Victor; Fratantonio, Yanick; Lindorfer, Martina; Gruss, Daniel; Maurice, Clémentine; Vigna, Giovanni; Bos, Herbert; Razavi, Kaveh; Giuffrida, Cristiano

    2016-01-01

    Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and completely subvert a system. However, existing efforts either describe probabilistic (and thus unreliable) attacks or rely on special (and often unavailable) memory management features to place victim objects

  16. Collaborative Attack Mitigation and Response: A survey

    NARCIS (Netherlands)

    Steinberger, Jessica; Sperotto, Anna; Baier, Harald; Pras, Aiko

    2015-01-01

    Over recent years, network-based attacks have become to one of the top causes of network infrastructure and service outages. To counteract a network-based attack, an approach is to move mitigation from the target network to the networks of Internet Service Providers (ISP). However, it remains

  17. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...

  18. Indexed effective orifice area is a significant predictor of higher mid- and long-term mortality rates following aortic valve replacement in patients with prosthesis-patient mismatch.

    Science.gov (United States)

    Chen, Jian; Lin, Yiyun; Kang, Bo; Wang, Zhinong

    2014-02-01

    Prosthesis-patient mismatch (PPM) is defined as a too-small effective orifice area (EOA) of an inserted prosthetic relative to body size, resulting in an abnormally high postoperative gradient. It is unclear, however, whether residual stenosis after aortic valve replacement (AVR) has a negative impact on mid- and long-term survivals. We searched electronic databases, including PubMed, Embase, Medline and the Cochrane controlled trials register, through October 2012, to identify published full-text English studies on the association between PPM and mortality rates. A significant PPM was defined as an indexed EOA (iEOA)<0.85 cm2/m2, and severe PPM as an iEOA<0.65 cm2/m2. Two reviewers independently assessed the studies for inclusion and extracted data. Fourteen observational studies, involving 14 874 patients, met our final inclusion criteria. Meta-analysis demonstrated that PPM significantly increased mid-term (odds ratio [OR] 1.42, 95% confidence interval [CI] 1.19-1.69) and long-term (OR 1.52, 95% CI 1.26-1.84) all-cause mortalities. Subgroup analysis showed that PPM was associated with higher mid- and long-term mortality rates only in younger and predominantly female populations. Risk-adjusted sensitivity analysis showed that severe PPM was associated with reduced survival (adjusted hazard ratio [HR] 1.50, 95% CI 1.24-1.80), whereas moderate PPM was not (adjusted HR 0.96, 95% CI 0.86-1.07). Regardless of severity, however, PPM had a negative effect on survival in patients with impaired ejection fraction (adjusted HR 1.26, 95% CI 1.09-1.47). PPM (iEOA<0.85 cm2/m2) after AVR tended to be associated with increased long-term all-cause mortality in younger patients, females and patients with preoperative left ventricular dysfunction. Severe PPM (iEOA<0.65 cm2/m2) was a significant predictor of reduced long-term survival in all populations undergoing AVR.

  19. Azacitidine-lenalidomide (ViLen) combination yields a high response rate in higher risk myelodysplastic syndromes (MDS)-ViLen-01 protocol.

    Science.gov (United States)

    Mittelman, Moshe; Filanovsky, Kalman; Ofran, Yishai; Rosenbaum, Hanna; Raanani, Pia; Braester, Andrei; Goldschmidt, Neta; Kirgner, Ilya; Herishanu, Yair; Perri, Chava; Ellis, Martin; Oster, Howard S

    2016-10-01

    Azacitidine treatment is effective in higher risk MDS (HR-MDS), with less than 50 % response, lasting 2 years. Aza and lenalidomide (Len) have a potential synergistic effect. ViLen-01 phase IIa trial includes 6-month induction (Aza 75 mg/m(2)/day, days 1-5, Len 10 mg/day, days 6-21, every 28 days), 6-month consolidation (Aza 75 mg/m(2)/day, days 1-5, every 28 days), and 12-month maintenance (Len 10 mg/day, days 1-21, every 28 days). Response was evaluated according to IWG criteria. Totally, 25 patients enrolled, with an average of 76.3 years old (60-87), and 88 % with major comorbidities. Thirteen patients completed induction, 7 proceeded for consolidation, and 2 for maintenance. The overall response rate (ORR) was 72 % (18/25), with 6 (24 %) for CR, 3 (12 %) for marrow CR, and 9 (36 %) for hematologic improvement (HI). The 7 non-responding patients were on the study 3 days to 4.1 months. At 6 months, 4 of 6 evaluable patients achieved complete cytogenetic response and 2 with del (5q) at diagnosis. Adverse events (AEs) were as expected in these patients: grades III-IV, mainly hematologic-thrombocytopenia (20 patients) and neutropenia (13 patients). The common non-hematologic AEs were infections (14 patients), nausea (7), vomiting (7), diarrhea (7), and skin reactions (5). The median progression-free survival (PFS) was 12 ± 1.36 months, with median overall survival (OS) of 12 ± 1.7 months. Quality of life (FACT questionnaire) data were available for 12 patients with a tendency towards improved QoL. This trial with elderly HR-MDS patients with an expected poor prognosis demonstrates a high (72 %) response rate and a reasonable expected safety profile but a relatively short PFS and OS.

  20. Fear of Terrorism in New York After the September 11 Terrorist Attacks: Implications for Emergency Mental Health and Preparedness

    Science.gov (United States)

    Boscarino, Joseph A.; Figley, Charles R.; Adams, Richard E.

    2009-01-01

    To examine the public’s response to future terrorist attacks, we surveyed 1,001 New Yorkers in the community one year after the September 11 attacks. Overall, New Yorkers were very concerned about future terrorist attacks and also concerned about attacks involving biological or nuclear weapons. In addition, while most New Yorkers reported that if a biological or nuclear attack occurred they would evaluate available information before evacuating, a significant number reported they would immediately evacuate, regardless of police or public health communications to the contrary. The level of public concern was significantly higher on all measures among New York City and Long Island residents (downstate) compared to the rest of the state. A model predicting higher fear of terrorism indicated that downstate residents, women, those 45 to 64 years old, African Americans and Hispanics, those with less education/income, and those more likely to flee, were more fearful of future attacks. In addition, making disaster preparations and carefully evaluating emergency information also predicted a higher level of fear as well. A second model predicting who would flee suggested that those more likely to evaluate available information were less likely to immediately evacuate, while those with a higher fear of future attacks were more likely to flee the area. Given these findings and the possibility of future attacks, mental health professionals need to be more involved in preparedness efforts, especially related to the psychological impact of attacks involving weapons of mass destruction. PMID:14730761

  1. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  2. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  3. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  4. Dealing with Wormhole Attacks in Wireless Sensor Networks Through Discovering Separate Routes Between Nodes

    Directory of Open Access Journals (Sweden)

    F. Rezaei

    2017-08-01

    Full Text Available One of the most common attacks against Wireless Sensor Networks is the wormhole attack. In this attack, the enemy deploys two malicious nodes in two different areas of the network and establishes a high-speed dedicated channel between these two. This will cause the normal nodes in two different areas wrongly think that they are two-hop neighbors. Therefore, this attack will greatly affect the routing algorithms. In this paper, a new distributed algorithm is provided to deal with the wormhole attack. The main idea of the proposed algorithm is to discover separate routes between pairs of two-hop neighboring nodes. The proposed algorithm was implemented and evaluated in terms of true and false detection rate by performing a series of experiments and the results were compared with the base algorithm. The test results showed that the proposed algorithm has desirable efficacy.

  5. Deep breathing exercises with positive expiratory pressure at a higher rate improve oxygenation in the early period after cardiac surgery--a randomised controlled trial.

    Science.gov (United States)

    Urell, Charlotte; Emtner, Margareta; Hedenström, Hans; Tenling, Arne; Breidenskog, Marie; Westerdahl, Elisabeth

    2011-07-01

    In addition to early mobilisation, a variety of breathing exercises are used to prevent postoperative pulmonary complications after cardiac surgery. The optimal duration of the treatment is not well evaluated. The aim of this study was to determine the effect of 30 versus 10 deep breaths hourly, while awake, with positive expiratory pressure on oxygenation and pulmonary function the first days after cardiac surgery. A total of 181 patients, undergoing cardiac surgery, were randomised into a treatment group, performing 30 deep breaths hourly the first postoperative days, or into a control group performing 10 deep breaths hourly. The main outcome measurement arterial blood gases and the secondary outcome pulmonary function, evaluated with spirometry, were determined on the second postoperative day. Preoperatively, both study groups were similar in terms of age, SpO(2), forced expiratory volume in 1s and New York Heart Association classification. On the second postoperative day, arterial oxygen tension (PaO(2)) was 8.9 ± 1.7 kPa in the treatment group and 8.1 ± 1.4 kPa in the control group (p = 0.004). Arterial oxygen saturation (SaO(2)) was 92.7 ± 3.7% in the treatment group and 91.1 ± 3.8% in the control group (p = 0.016). There were no differences in measured lung function between the groups or in compliance to the breathing exercises. Compliance was 65% of possible breathing sessions. A significantly increased oxygenation was found in patients performing 30 deep breaths the first two postoperative days compared with control patients performing 10 deep breaths hourly. These results support the implementation of a higher rate of deep breathing exercises in the initial phase after cardiac surgery. Copyright © 2010 European Association for Cardio-Thoracic Surgery. Published by Elsevier B.V. All rights reserved.

  6. Chronic thought suppression and posttraumatic symptoms: data from the Madrid March 11, 2004 terrorist attack.

    Science.gov (United States)

    Vázquez, Carmelo; Hervás, Gonzalo; Pérez-Sales, Pau

    2008-12-01

    Although a considerable number of people either witnessed directly or in the mass media the traumatic scenes of the terrorist attack that took place on March 11th, 2004 in Madrid, only a fraction of Madrid citizens developed posttraumatic symptoms. In this study, posttraumatic stress-related symptoms, degree of exposure, coping strategies related to the attack, and chronic attempts to avoid intrusive thoughts (i.e., thought suppression) were assessed in a general population Madrid sample (N=503) 2-3 weeks after the attacks. Our results showed that participants with higher scores in chronic thought suppression exhibited higher levels of PTSD symptoms. Higher scores in chronic thought suppression also correlated positively with the use of avoidant coping strategies after the attacks. We discuss the possible common roots of avoidance of intrusive thoughts and avoidant coping strategies and the implications of this relationship for the emergence of stress-related symptoms as well as for public health policies.

  7. Managing mild casualties in mass-casualty incidents: lessons learned from an aborted terrorist attack.

    Science.gov (United States)

    Bloch, Yuval H; Leiba, Adi; Veaacnin, Nurit; Paizer, Yohanan; Schwartz, Dagan; Kraskas, Ahuva; Weiss, Gali; Goldberg, Avishay; Bar-Dayan, Yaron

    2007-01-01

    appear in two phases. In the first phase, the rate of admission is expected to be higher. Due to the high incidence of anxiety and other stress-related phenomena, many mildly injured patients will require psychiatric evaluation. In the case of a bombing attack, many of the victims must be evaluated by an otolaryngologist.

  8. Efficacy of nebulized fluticasone propionate in adult patients admitted to the emergency department due to bronchial asthma attack.

    Science.gov (United States)

    Starobin, Daniel; Bolotinsky, Ludmila; Or, Jack; Fink, Gershon; Shtoeger, Zev

    2008-01-01

    Locally delivered steroids by inhalers or nebulizers have been shown in small trials to be effective in acute asthma attack, but evidence-based data are insufficient to establish their place as routine management of adult asthma attacks. To determine the efficacy of nebulized compared to systemic steroids in adult asthmatics admitted to the emergency department following an acute attack. Adult asthmatics admitted to the ED were assigned in random consecutive case fashion to one of three protocol groups: group 1--nebulized steroid fluticasone (Flixotide Nebules), group 2--intravenous methylprednisolone, group 3--combined treatment by both routes. Objective and subjective parameters, such as peak expiratory flow, oxygen saturation, heart rate and dyspnea score, were registered before and 2 hours after ED treatment was initiated. Steroids were continued for 1 week following the ED visit according to the protocol arm. Data on hospital admission/discharge rate, ED readmissions in the week after enrollment and other major events related to asthma were registered. Altogether, 73 adult asthmatics were assigned to receive treatment: 24 patients in group 1, 23 in group 2 and 26 in group 3. Mean age was 44.4 +/- 16.8 years (range 17-75 years). Peak expiratory flow and dyspnea score significantly improved in group 1 patients compared with patients in the other groups after 2 hours of ED treatment (P = 0.021 and 0.009, respectively). The discharge rate after ED treatment was significantly higher in groups 1 and 3 than in group 2 (P = 0.05). All 73 patients were alive a week after enrollment. Five patients (20.8%) in the Flixotide treatment arm were hospitalized and required additional systemic steroids. Multivariate analysis of factors affecting hospitalization rate demonstrated that severity of asthma (odds ratio 8.11) and group 2 (OD 4.17) had a negative effect, whereas adherence to chronic anti-asthma therapy (OD 0.49) reduced the hospitalization rate. Our study cohort

  9. Efficacy of "Verbenone Plus" for protecting ponderosa pine trees and stands from Dendroctonus brevicomis (Coleoptera: Curculionidae) attack in British Columbia and California.

    Science.gov (United States)

    Fettig, Christopher J; McKelvey, Stephen R; Dabney, Christopher P; Huber, Dezene P W; Lait, Cameron G; Fowler, Donald L; Borden, John H

    2012-10-01

    The western pine beetle, Dendroctonus brevicomis LeConte (Coleoptera: Curculionidae, Scolytinae), is a major cause of ponderosa pine, Pinus ponderosa Douglas ex Lawson, mortality in much of western North America. We review several years of research that led to the identification of Verbenone Plus, a novel four-component semiochemcial blend [acetophenone, (E)-2-hexen-1-ol + (Z)-2-hexen-1-ol, and (-)-verbenone] that inhibits the response of D. brevicomis to attractant-baited traps, and examine the efficacy of Verbenone Plus for protecting individual trees and forest stands from D. brevicomis infestations in British Columbia and California. In all experiments, semiochemicals were stapled around the bole of treated trees at approximately equal to 2 m in height. (-)-Verbenone alone had no effect on the density of total attacks and successful attacks by D. brevicomis on attractant-baited P. ponderosa, but significantly increased the percentage of pitchouts (unsuccessful D. brevicomis attacks). Verbenone Plus significantly reduced the density of D. brevicomis total attacks and D. brevicomis successful attacks on individual trees. A significantly higher percentage of pitchouts occurred on Verbenone Plus-treated trees. The application of Verbenone Plus to attractant-baited P. ponderosa significantly reduced levels of tree mortality. In stand protection studies, Verbenone Plus significantly reduced the percentage of trees mass attacked by D. brevicomis in one study, but in a second study no significant treatment effect was observed. Future research should concentrate on determining optimal release rates and spacings of release devices in stand protection studies, and expansion of Verbenone Plus into other systems where verbenone alone has not provided adequate levels of tree protection.

  10. Adaptive cyber-attack modeling system

    Science.gov (United States)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  11. Situational awareness of a coordinated cyber attack

    Science.gov (United States)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  12. Radiological attacks and accidents. Medical consequences

    International Nuclear Information System (INIS)

    Sakuta, Hidenari

    2007-01-01

    Probability of the occurrence of radiological attacks appears to be elevated after the terrorist attacks against the United States on September 11 in 2001. There are a lot of scenarios of radiological attack: simple radiological device, radiological disperse device (RDD or dirty bomb), attacks against nuclear reactor, improvised nuclear device, and nuclear weapons. Of these, RDD attack is the most probable scenario, because it can be easily made and can generate enormous psychological and economic damages. Radiological incidents are occurring to and fro in the world, including several cases of theft to nuclear facilities and unsuccessful terrorist attacks against them. Recently, a former Russian spy has allegedly been killed using polonium-210. In addition, serious radiological accidents have occurred in Chernobyl, Goiania, and Tokai-mura. Planning, preparation, education, and training exercise appear to be essential factors to cope with radiological attacks and accidents effectively without feeling much anxiety. Triage and psychological first aid are prerequisite to manage and provide effective medial care for mass casualties without inducing panic. (author)

  13. Higher neonatal growth rate and body condition score at 7 months are predictive factors of obesity in adult female Beagle dogs.

    Science.gov (United States)

    Leclerc, Lucie; Thorin, Chantal; Flanagan, John; Biourge, Vincent; Serisier, Samuel; Nguyen, Patrick

    2017-04-13

    The risks during early growth on becoming overweight in adulthood are widely studied in humans. However, early-life predictive factors for canine adult overweight and obesity have not yet been studied. To identify factors that may help explain the development of overweight and obesity at adulthood in dogs, a longitudinal study of 2 years was conducted in 24 female Beagle dogs of the same age, sexual status, and raised under identical environmental conditions. By means of a hierarchical classification on principal components with the following quantitative values: fat-free mass (FFM), percentage fat mass and pelvic circumference at 2 years of age, three groups of dogs were established and were nominally named: ideal weight (IW, n = 9), slightly overweight (OW1, n = 6) and overweight (OW2, n = 9). With the aim of identifying predictive factors of development of obesity at adulthood parental characteristics, growth pattern, energy balance and plasma factors were analysed by logistic regression analysis. At 24 months, the group compositions were in line with the body condition scores (BCS 1-9) values of the IW (5 or 6/9), the OW1 (6/9) and the OW2 (7 or 8/9) groups. Logistic regression analysis permitted the identification of neonatal growth rate during the first 2 weeks of life (GR 2W ) and BCS at 7 months as predictors for the development of obesity at adulthood. Seventy percent of dogs with either GR 2W >125% or with BCS > 6/9 at 7 months belonged to the OW2 group. Results from energy intake and expenditure, corrected for FFM, showed that there was a greater positive energy imbalance between 7 and 10 months for the OW2, compared to the IW group. This study expands the understanding of previously reported risk factors for being overweight or obese in dogs, establishing that (i) 15 out of 24 of the studied dogs became overweight and (ii) GR 2W and BCS at 7 months of age could be used as predictive factors as overweight adult dogs in the OW2

  14. Classification of cyber attacks in South Africa

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-05-01

    Full Text Available various ATM's throughout South Africa. Two criminals, Motsoane and Masoleng, were arrested in February 2012 and both sentenced to 15 years in jail [36, 37]. 3.10 2013: IOL DDoS Anonymous Africa claimed responsibility for launching a Distributed Denial... of Service (DDoS) attack on the Independent Newspaper web site iol.co.za. The attack was in response to claims that the IOL group supports Zimbabwean president Robert Mugabe. The following taunt was sent to boast about the attack: “IOL bad boys bad boys...

  15. Attacker Modelling in Ubiquitous Computing Systems

    DEFF Research Database (Denmark)

    Papini, Davide

    in with our everyday life. This future is visible to everyone nowadays: terms like smartphone, cloud, sensor, network etc. are widely known and used in our everyday life. But what about the security of such systems. Ubiquitous computing devices can be limited in terms of energy, computing power and memory...... attacker remain somehow undened and still under extensive investigation. This Thesis explores the nature of the ubiquitous attacker with a focus on how she interacts with the physical world and it denes a model that captures the abilities of the attacker. Furthermore a quantitative implementation...

  16. Generalised Category Attack—Improving Histogram-Based Attack on JPEG LSB Embedding

    Science.gov (United States)

    Lee, Kwangsoo; Westfeld, Andreas; Lee, Sangjin

    We present a generalised and improved version of the category attack on LSB steganography in JPEG images with straddled embedding path. It detects more reliably low embedding rates and is also less disturbed by double compressed images. The proposed methods are evaluated on several thousand images. The results are compared to both recent blind and specific attacks for JPEG embedding. The proposed attack permits a more reliable detection, although it is based on first order statistics only. Its simple structure makes it very fast.

  17. Harvesting Smartphone Privacy Through Enhanced Juice Filming Charging Attacks

    DEFF Research Database (Denmark)

    Meng, Weizhi; Fei, Fei; Li, Wenjuan

    2017-01-01

    The increasingly high demand for smartphone charging in people’s daily lives has apparently encouraged much more public charging stations to be deployed in various places (e.g., shopping malls, airports). However, these public charging facilities may open a hole for cyber-criminals to infer private...... information and data from smartphone users. Juice filming charging (JFC) attack is a particular type of charging attacks, which is capable of stealing users’ sensitive information from both Android OS and iOS devices, through automatically monitoring and recording phone screen during the whole charging period...... one in collecting users’ information at large and extracting sensitive data with a higher accuracy. Our work aims to complement existing results and stimulate more efforts in defending smartphones against charging threats....

  18. YET ANOTHER ATTACK ON WAGES AND CONDITIONS.

    Science.gov (United States)

    McCarthy, Andrew

    2016-10-01

    An unobjectionable-sounding title obscures the real intent of the latest in a series of Bills which the federal Coalition government is attempting to legislate in its ongoing attempts to undermine employee wages and conditions and attack unions.

  19. A Unique Fatal Moose Attack Mimicking Homicide.

    Science.gov (United States)

    Gudmannsson, Petur; Berge, Johan; Druid, Henrik; Ericsson, Göran; Eriksson, Anders

    2018-03-01

    Fatalities caused by animal attacks are rare, but have the potential to mimic homicide. We present a case in which a moose attacked and killed a woman who was walking her dog in a forest. Autopsy showed widespread blunt trauma with a large laceration on one leg in which blades of grass were embedded. Flail chest was the cause of death. The case was initially conceived as homicide by means of a riding lawn mower. A review of the case by moose experts and analyses of biological trace material that proved to originate from moose, established the true source of injury. The dog probably provoked a moose, which, in response, stomped and gored the victim to death. The injuries resembled those previously reported from attacks by cattle and water buffalo. Fatal moose attacks constitute an extremely rare threat in boreal areas, but can be considered in traumatic deaths of unknown cause. © 2017 American Academy of Forensic Sciences.

  20. Marine Attack on Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Ad

    2002-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  1. Heuristic attacks against graphical password generators

    CSIR Research Space (South Africa)

    Peach, S

    2010-05-01

    Full Text Available In this paper the authors explore heuristic attacks against graphical password generators. A new trend is emerging to use user clickable pictures to generate passwords. This technique of authentication can be successfully used for - for example...

  2. On localization attacks against cloud infrastructure

    Science.gov (United States)

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  3. Using agility to combat cyber attacks.

    Science.gov (United States)

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  4. Social engineering attack examples, templates and scenarios

    CSIR Research Space (South Africa)

    Mouton, Francois

    2016-06-01

    Full Text Available that are representative of real-world examples, whilst still being general enough to encompass several different real-world examples. The proposed social engineering attack templates cover all three types of communication, namely bidirectional communication...

  5. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  6. The role of sleep in migraine attacks

    Directory of Open Access Journals (Sweden)

    Elaine Inamorato

    1993-11-01

    Full Text Available Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. In view of this variable relationship we studied the records of 159 consecutive outpatients of our Headache Unit. In 121 records there was reference to sleep involvement, in 55% by a single form and in 45% by more than one form. When only one form was related, relief was most common (70%. 30% of that group of patients had the migraine attack precipitated by sleep, 24% by deprivation and 6% by sleep excess. When the effects of sleep were multiple, these effects were as expected logically in 65%: «in accordance» group (e.g attack precipitated by sleep deprivation and relieved by sleep onset. In a second group, («conflicting» where the involvement was not logical, there were three different combinations of sleep involvement, possibly due to more than one pathophysiological mechanism.

  7. ATTACK WARNING: Costs to Modernize NORAD's Computer System Significantly Understated

    National Research Council Canada - National Science Library

    Cross, F

    1991-01-01

    ...) Integrated Tactical Warning and Attack Assessment (ITW/AA) system. These subsystems provide critical strategic surveillance and attack warning and assessment information to United States and Canadian leaders...

  8. Characteristics of acute pain attacks in patients with irritable bowel syndrome meeting Rome III criteria

    DEFF Research Database (Denmark)

    Hellström, P.M.; Saito, Y.A.; Bytzer, P.

    2011-01-01

    the survey were women with a mean age of 41 years and time since IBS diagnosis of 5 years. The median pain attack frequency was 5.4 attacks per month and was significantly higher in the IBS with diarrhea (IBS-D, 6.4 per month) group vs. the IBS with constipation (4.4 per month) and the IBS with mixed pattern...

  9. RAPTOR: Ransomware Attack PredicTOR

    OpenAIRE

    Quinkert, Florian; Holz, Thorsten; Hossain, KSM Tozammel; Ferrara, Emilio; Lerman, Kristina

    2018-01-01

    Ransomware, a type of malicious software that encrypts a victim's files and only releases the cryptographic key once a ransom is paid, has emerged as a potentially devastating class of cybercrimes in the past few years. In this paper, we present RAPTOR, a promising line of defense against ransomware attacks. RAPTOR fingerprints attackers' operations to forecast ransomware activity. More specifically, our method learns features of malicious domains by looking at examples of domains involved in...

  10. Attack Helicopter Operations: Art or Science

    Science.gov (United States)

    1991-05-13

    ATTACK HELICOPTER OPERATIONS: ART OR SCIENCE ? BY LIEUTENANT COLONEL JAN CALLEN United States Army DISTRIBUTION STATEMENT A: Approved for public release...TASK IWORK UNIT ELEMENT NO. NO. NO. ACCESSION NC 11. TITLE (Include Socurity Classification) Attack Helicopter Operations: Art or Science ? 12. PERSONAL...OPERATIONS: ART OR SCIENCE ? AN INDIVIDUAL STUDY PROJECT by Lieutenant Colonel Jan Callen United States Army Colonel Greg Snelgrove Project Adviser U.S

  11. Protecting mobile agents from external replay attacks

    OpenAIRE

    Garrigues Olivella, Carles; Migas, Nikos; Buchanan, William; Robles, Sergi; Borrell Viader, Joan

    2014-01-01

    Peer-reviewed This paper presents a protocol for the protection of mobile agents against external replay attacks. This kind of attacks are performed by malicious platforms when dispatching an agent multiple times to a remote host, thus making it reexecute part of its itinerary. Current proposals aiming to address this problem are based on storing agent identifiers, or trip markers, inside agent platforms, so that future reexecutions can be detected and prevented. The problem of these solut...

  12. Semantic Identification Attacks on Web Browsing

    OpenAIRE

    Guha, Neel

    2016-01-01

    We introduce a Semantic Identification Attack, in which an adversary uses semantic signals about the pages visited in one browsing session to identify other browsing sessions launched by the same user. This attack allows an adver- sary to determine if two browsing sessions originate from the same user regardless of any measures taken by the user to disguise their browser or network. We use the MSNBC Anonymous Browsing data set, which contains a large set of user visits (labeled by category) t...

  13. Consciousness in Non-Epileptic Attack Disorder

    OpenAIRE

    Reuber, M.; Kurthen, M.

    2011-01-01

    Non-epileptic attack disorder (NEAD) is one of the most important differential diagnoses of epilepsy. Impairment of\\ud consciousness is the key feature of non-epileptic attacks (NEAs). The first half of this review summarises the clinical research\\ud literature featuring observations relating to consciousness in NEAD. The second half places this evidence in the wider context\\ud of the recent discourse on consciousness in neuroscience and the philosophy of mind. We argue that studies of consci...

  14. Cyber Security Audit and Attack Detection Toolkit

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  15. Time-lagged relationships between leadership behaviors and psychological distress after a workplace terrorist attack.

    Science.gov (United States)

    Birkeland, Marianne Skogbrott; Nielsen, Morten Birkeland; Knardahl, Stein; Heir, Trond

    2016-05-01

    The impact of leadership practices on employee health may be especially evident after extreme events that have physical, psychological, or material consequences for the members of an organization. In this prospective study, we aimed to examine the association between leadership behavior and psychological distress in employees who had experienced a workplace terror attack. Ten and 22 months after the 2011 Oslo bombing attack targeting their workplace, ministerial employees (n = 2272) responded to a questionnaire assessing fair, empowering, supportive, and laissez-faire leadership, as well as psychological distress. Cross-sectional and time-lagged associations between the constructs were tested using structural equation modeling. Cross-sectionally, higher levels of supportive leadership were associated with lower levels of psychological distress. Longitudinally, negative relationships were found between psychological distress and subsequent ratings of fair and empowering leadership. Supportive leadership was associated with employees' psychological health after trauma, but seems not to have long-term effects on subsequent psychological distress. Rather, psychological distress may lead the employees to perceive their leaders as more negative across time.

  16. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    Science.gov (United States)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  17. Transient ischaemic attacks clinics provide equivalent and more efficient care than early in-hospital assessment.

    Science.gov (United States)

    Martínez-Martínez, M M; Martínez-Sánchez, P; Fuentes, B; Cazorla-García, R; Ruiz-Ares, G; Correas-Callero, E; Lara-Lara, M; Díez-Tejedor, E

    2013-02-01

    Clinics for early management of transient ischaemic attacks (TIAs) have been developed in some stroke centres, resulting in reduced recurrence rates compared to appointment-based outpatient management, thus saving on hospitalization. We analysed the care process, recurrence rates and economic impact of the first year of work in our early-management TIA clinic and compared these with our previous in-hospital study protocols for low- and moderate-risk TIA patients. This was a prospective evaluation of the management of low- to moderate-risk TIA patients, comparing a new TIA clinic model (2010) with a previous hospitalization model (2009). Demographic data, vascular risk factor profiles, diagnostic test performance, secondary prevention measures, final aetiological diagnoses and cerebrovascular recurrences at 7 and 90 days were compared between in-hospital and TIA clinic assessed patients. We also carried out an economic comparison of the costs of each model's process. Two hundred and eleven low- to moderate-risk TIA patients were included, of whom 40.8% were hospitalized. There were no differences between the TIA clinic assessed and in-hospital assessed patients in terms of risk factor diagnosis and secondary prevention measures. The stroke recurrence rate (2.4% vs. 1.2%; P = 0.65) was low and similar for both groups (CI 95%, 0.214-20.436; P = 0.52). Cost per patient was €393.28 for clinic versus €1931.18 for in-hospital management. Outpatient management resulted in a 77.8% reduction in hospitalizations. Transient ischaemic attacks clinics are efficient for the early management of low- to moderate-risk TIA patients compared to in-hospital assessment, with no higher recurrence rates and at almost one-fifth the cost. © 2012 The Author(s) European Journal of Neurology © 2012 EFNS.

  18. The day Norway cried: Proximity and distress in Norwegian citizens following the 22nd July 2011 terrorist attacks in Oslo and on Utøya Island.

    Science.gov (United States)

    Thoresen, Siri; Aakvaag, Helene Flood; Wentzel-Larsen, Tore; Dyb, Grete; Hjemdal, Ole Kristian

    2012-01-01

    Terrorism may create fear and stress reactions not only in the direct victims, but also in the general population. This study investigated emotional responses in the Norwegian population following the 22nd July 2011 terrorist attacks. We hypothesized that Oslo residents would report a higher level of fear responses compared with people living outside Oslo and that proximity would be associated with early distress and later post-traumatic stress reactions. Representative samples were drawn from the Norwegian Population Registry. Telephone interviews were conducted 4-5 months after the attacks. The response rate for the Oslo sample (N=465) was 24% of the total sample, and 43% of those who were actually reached by phone and asked to participate. Corresponding figures for the sample living outside Oslo (N=716) were 19% and 30%. Our results show strong immediate emotional responses, particularly sadness and a feeling of unreality, in both samples. Jumpiness and other fear responses were significantly higher among Oslo residents. Current level of risk perception was low 4-5 months after the attacks; however, a significant minority reported to feel less safe than before. Geographical and psychological proximity were associated with early emotional responses. Psychological proximity was significantly associated with post-traumatic stress reactions, while measures of geographical proximity were not. Immediate emotional responses, first-week reactions, and first-week jumpiness were uniquely and significantly associated with post-traumatic stress reactions. Post-traumatic stress reactions were elevated in ethnic minorities. The terrorist attacks seem to have had a significant effect on the Norwegian population, creating sadness and insecurity, at least in the short term. Proximity to the terrorist attacks was strongly associated with distress in the population, and early distress was strongly related to later post-traumatic stress reactions. Our results indicate that

  19. Combined Heuristic Attack Strategy on Complex Networks

    Directory of Open Access Journals (Sweden)

    Marek Šimon

    2017-01-01

    Full Text Available Usually, the existence of a complex network is considered an advantage feature and efforts are made to increase its robustness against an attack. However, there exist also harmful and/or malicious networks, from social ones like spreading hoax, corruption, phishing, extremist ideology, and terrorist support up to computer networks spreading computer viruses or DDoS attack software or even biological networks of carriers or transport centers spreading disease among the population. New attack strategy can be therefore used against malicious networks, as well as in a worst-case scenario test for robustness of a useful network. A common measure of robustness of networks is their disintegration level after removal of a fraction of nodes. This robustness can be calculated as a ratio of the number of nodes of the greatest remaining network component against the number of nodes in the original network. Our paper presents a combination of heuristics optimized for an attack on a complex network to achieve its greatest disintegration. Nodes are deleted sequentially based on a heuristic criterion. Efficiency of classical attack approaches is compared to the proposed approach on Barabási-Albert, scale-free with tunable power-law exponent, and Erdős-Rényi models of complex networks and on real-world networks. Our attack strategy results in a faster disintegration, which is counterbalanced by its slightly increased computational demands.

  20. SCADA system vulnerabilities to cyber attack

    Energy Technology Data Exchange (ETDEWEB)

    Shaw, W. T. [Cyber Security Consulting (Canada)

    2004-10-01

    The susceptibility to terrorist attacks of computer-based supervisory control (SCADA) systems that are used to monitor and control water distribution systems, oil and gas pipelines and the electrical grid, is discussed. The discussion includes ways in which SCADA systems may be attacked and remedial actions that may be taken to reduce or eliminate the possibility of such attacks. Attacks may take the form of causing the system to generate false data to divert attention from impending system disasters, or commandeer the system to seriously disable it, or cause damage to the process or equipment being controlled by sending improper control commands. SCADA systems are also vulnerable to internal threats, either from an accidental action that results in damage, or an intentional action, as for example by a disgruntled employee, or ex-employee, usually by way of reprogramming an RTU or PLC by accessing the polling/communications circuit. Recent SCADA systems are much more susceptible to concerted cyber attacks because of the adoption of IT technologies and standards into the design of such systems. (Older systems are more likely to be unique designs, hence less susceptible to attack). As far as protection of SCADA systems is concerned, there are no technologies that would prevent a technologically sophisticated terrorist or disgruntled employee from doing major damage to the system, however, the IT world has developed a range of technologies for the protection of IT assets, and many of these same technologies can also be used to safeguard modern SCADA systems.

  1. A Weak Value Based QKD Protocol Robust Against Detector Attacks

    Science.gov (United States)

    Troupe, James

    2015-03-01

    We propose a variation of the BB84 quantum key distribution protocol that utilizes the properties of weak values to insure the validity of the quantum bit error rate estimates used to detect an eavesdropper. The protocol is shown theoretically to be secure against recently demonstrated attacks utilizing detector blinding and control and should also be robust against all detector based hacking. Importantly, the new protocol promises to achieve this additional security without negatively impacting the secure key generation rate as compared to that originally promised by the standard BB84 scheme. Implementation of the weak measurements needed by the protocol should be very feasible using standard quantum optical techniques.

  2. Aspects on testing methods for acid attacks on concrete - further experiments

    International Nuclear Information System (INIS)

    Romben, L.

    1980-01-01

    The report presents a number of control experiments which have been performed to verify test procedures of the resistance of concrete and concrete products. A more detailed study of the calcium dissolution and the layer dissolution process has been performed. The mechanisms which control the rate of attack in the long term are discussed. The proposed method is intended for use in studying the resistance to attacks by acid water solutions. (G.B.)

  3. Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks

    Directory of Open Access Journals (Sweden)

    Apostolos P. Fournaris

    2017-07-01

    Full Text Available Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT and Operational Technology (OT systems that are meant to operate harmonically under a security critical framework. As security IT countermeasures are gradually been installed in many embedded system nodes, thus securing them from many well-know cyber attacks there is a lurking danger that is still overlooked. Apart from the software vulnerabilities that typical malicious programs use, there are some very interesting hardware vulnerabilities that can be exploited in order to mount devastating software or hardware attacks (typically undetected by software countermeasures capable of fully compromising any embedded system device. Real-time microarchitecture attacks such as the cache side-channel attacks are such case but also the newly discovered Rowhammer fault injection attack that can be mounted even remotely to gain full access to a device DRAM (Dynamic Random Access Memory. Under the light of the above dangers that are focused on the device hardware structure, in this paper, an overview of this attack field is provided including attacks, threat directives and countermeasures. The goal of this paper is not to exhaustively overview attacks and countermeasures but rather to survey the various, possible, existing attack directions and highlight the security risks that they can pose to security critical embedded systems as well as indicate their strength on compromising the Quality of Service (QoS such systems are designed to provide.

  4. Predicting Factors of Zone 4 Attack in Volleyball.

    Science.gov (United States)

    Costa, Gustavo C; Castro, Henrique O; Evangelista, Breno F; Malheiros, Laura M; Greco, Pablo J; Ugrinowitsch, Herbert

    2017-06-01

    This study examined 142 volleyball games of the Men's Super League 2014/2015 seasons in Brazil from which we analyzed 24-26 games of each participating team, identifying 5,267 Zone 4 attacks for further analysis. Within these Zone 4 attacks, we analyzed the association between the effect of the attack carried out and the separate effects of serve reception, tempo and type of attack. We found that the reception, tempo of attack, second tempo of attack, and power of diagonal attack were predictors of the attack effect in Zone 4. Moreover, placed attacks showed a tendency to not yield a score. In conclusion, winning points in high-level men's volleyball requires excellent receptions, a fast attack tempo and powerfully executed of attacks.

  5. Adaptive EWMA Method Based on Abnormal Network Traffic for LDoS Attacks

    Directory of Open Access Journals (Sweden)

    Dan Tang

    2014-01-01

    Full Text Available The low-rate denial of service (LDoS attacks reduce network services capabilities by periodically sending high intensity pulse data flows. For their concealed performance, it is more difficult for traditional DoS detection methods to detect LDoS attacks; at the same time the accuracy of the current detection methods for LDoS attacks is relatively low. As the fact that LDoS attacks led to abnormal distribution of the ACK traffic, LDoS attacks can be detected by analyzing the distribution characteristics of ACK traffic. Then traditional EWMA algorithm which can smooth the accidental error while being the same as the exceptional mutation may cause some misjudgment; therefore a new LDoS detection method based on adaptive EWMA (AEWMA algorithm is proposed. The AEWMA algorithm which uses an adaptive weighting function instead of the constant weighting of EWMA algorithm can smooth the accidental error and retain the exceptional mutation. So AEWMA method is more beneficial than EWMA method for analyzing and measuring the abnormal distribution of ACK traffic. The NS2 simulations show that AEWMA method can detect LDoS attacks effectively and has a low false negative rate and a false positive rate. Based on DARPA99 datasets, experiment results show that AEWMA method is more efficient than EWMA method.

  6. [A survey of perioperative asthmatic attack among patients with bronchial asthma underwent general anesthesia].

    Science.gov (United States)

    Ie, Kenya; Yoshizawa, Atsuto; Hirano, Satoru; Izumi, Sinyuu; Hojo, Masaaki; Sugiyama, Haruhito; Kobayasi, Nobuyuki; Kudou, Kouichirou; Maehara, Yasuhiro; Kawachi, Masaharu; Miyakoshi, Kouichi

    2010-07-01

    We investigated the risk factor of perioperative asthmatic attack and effectiveness of preventing treatment for asthmatic attack before operation. We performed retrospective chart review of one hundred eleven patients with asthma underwent general anesthesia and surgical intervention from January 2006 to October 2007 in our hospital. The rate of perioperative asthmatic attack were as follows; 10.2% (5 in 49 cases) in no pretreatment group, 7.5% (3 in 40 cases) in any pretreatments except for systemic steroid, and 4.5% (1 in 22 cases) in systemic steroid pretreatment group. Neither preoperative asthma severity nor duration from the last attack had significant relevancy to perioperative attack rate. The otolaryngological surgery, especially those have nasal polyp and oral surgery had high perioperative asthma attack rate, although there was no significant difference. We recommend the systemic steroid pretreatment for asthmatic patients, especially when they have known risk factor such as administration of the systemic steroid within 6 months, or possibly new risk factor such as nasal polyp, otolaryngological and oral surgery.

  7. Effect of Helicobacter Pylori Treatment on the Number and Intensity of Migraine Attacks

    Directory of Open Access Journals (Sweden)

    Alireza Bakhshipour

    2012-06-01

    Full Text Available Background: Migraine is a common headache with an unknown cause. Migraine is about three times more common in women (18.2% than in men (6.2%. The recent studies have posed the possible relationship between the Helicobacter pylori infection and migraine headache. This study tries to analyze the effect of treating H. pylori infection on number and severity of migraine attacks.Materials and Methods: In this clinical pilot study, a number of 60 patients with migraine were examined in terms of infecting with H. pylori. Patients with the infections were treated by H. pylori eradication treatment standard triple regimen and the frequency and severity of their migraine attacks were measured for three months and finally the average of frequency and severity of attacks before and after treatment were compared. Results: The average frequency of the migraine attacks in patients with the H.pylori infection who have been treated was 7.1 before treatment and 2.7 after treatment (p=0.001. Likewise, the severity rate of such attacks in such patients was 9 which decreased to 4.5 after treatment (p=0.002. Conclusion: According to our study, patients with migraine attacks are preferred to be examined tested in terms of infecting with H. pylori. Thus, and eradication of this infection can be effective in decreasing of the migraine attacks.

  8. Detecting and Mitigating Smart Insider Jamming Attacks in MANETs Using Reputation-Based Coalition Game

    Directory of Open Access Journals (Sweden)

    Ashraf Al Sharah

    2016-01-01

    Full Text Available Security in mobile ad hoc networks (MANETs is challenging due to the ability of adversaries to gather necessary intelligence to launch insider jamming attacks. The solutions to prevent external attacks on MANET are not applicable for defense against insider jamming attacks. There is a need for a formal framework to characterize the information required by adversaries to launch insider jamming attacks. In this paper, we propose a novel reputation-based coalition game in MANETs to detect and mitigate insider jamming attacks. Since there is no centralized controller in MANETs, the nodes rely heavily on availability of transmission rates and a reputation for each individual node in the coalition to detect the presence of internal jamming node. The nodes will form a stable grand coalition in order to make a strategic security defense decision, maintain the grand coalition based on node reputation, and exclude any malicious node based on reputation value. Simulation results show that our approach provides a framework to quantify information needed by adversaries to launch insider attacks. The proposed approach will improve MANET’s defense against insider attacks, while also reducing incorrect classification of legitimate nodes as jammers.

  9. RESILIENT SCHEME AGAINST REDUCTION OF QUALITY (ROQ DISTRIBUTED DENIAL OF SERVICE ATTACK IN MANET

    Directory of Open Access Journals (Sweden)

    S.A. Arunmozhi

    2011-09-01

    Full Text Available Defending against denial-of-service attacks (DoS in a mobile ad hoc network (MANET is challenging because of the dynamic network topology. Security primitives must be dynamically adjusted to cope with the network. The Reduction-of-Quality (RoQ Distributed Denial of Service (DDoS attack is one which throttles the tcp throughput heavily and reduces the quality-of-service (QoS to end systems gradually rather than refusing the clients from the services completely. Supporting QoS in MANET is a challenging task, particularly in the presence of malicious users. In this paper, we propose a DoS resilient technique that uses a flow table to detect the attackers. The proposed defense mechanism identifies the attackers based on the congestion bit notification and asks the sending node to reduce the sending rate. Once the attackers are identified, all the packets from those nodes will be blocked. The throughput and delay performance of TCP or UDP flows are very sensitive to such RoQ attacks. Through extensive ns2 network simulations, we demonstrate the achievement of high throughput and low delay for a network under the RoQ attack.

  10. Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems

    International Nuclear Information System (INIS)

    Chen, Yuan; Kar, Soummya; Moura, Jose M. F.

    2017-01-01

    This paper studies an attacker against a cyberphysical system (CPS) whose goal is to move the state of a CPS to a target state while ensuring that his or her probability of being detected does not exceed a given bound. The attacker’s probability of being detected is related to the nonnegative bias induced by his or her attack on the CPS’s detection statistic. We formulate a linear quadratic cost function that captures the attacker’s control goal and establish constraints on the induced bias that reflect the attacker’s detection-avoidance objectives. When the attacker is constrained to be detected at the false-alarm rate of the detector, we show that the optimal attack strategy reduces to a linear feedback of the attacker’s state estimate. In the case that the attacker’s bias is upper bounded by a positive constant, we provide two algorithms – an optimal algorithm and a sub-optimal, less computationally intensive algorithm – to find suitable attack sequences. Lastly, we illustrate our attack strategies in numerical examples based on a remotely-controlled helicopter under attack.

  11. DETECTION AND LOCALIZATION OF MULTIPLE SPOOFING ATTACKERS FOR MOBILE WIRELESS NETWORKS

    Directory of Open Access Journals (Sweden)

    R. Maivizhi

    2015-06-01

    Full Text Available The openness nature of wireless networks allows adversaries to easily launch variety of spoofing attacks and causes havoc in network performance. Recent approaches used Received Signal Strength (RSS traces, which only detect spoofing attacks in mobile wireless networks. However, it is not always desirable to use these methods as RSS values fluctuate significantly over time due to distance, noise and interference. In this paper, we discusses a novel approach, Mobile spOofing attack DEtection and Localization in WIireless Networks (MODELWIN system, which exploits location information about nodes to detect identity-based spoofing attacks in mobile wireless networks. Also, this approach determines the number of attackers who used the same node identity to masquerade as legitimate device. Moreover, multiple adversaries can be localized accurately. By eliminating attackers the proposed system enhances network performance. We have evaluated our technique through simulation using an 802.11 (WiFi network and an 802.15.4 (Zigbee networks. The results prove that MODELWIN can detect spoofing attacks with a very high detection rate and localize adversaries accurately.

  12. Flight test of the X-29A at high angle of attack: Flight dynamics and controls

    Science.gov (United States)

    Bauer, Jeffrey E.; Clarke, Robert; Burken, John J.

    1995-01-01

    The NASA Dryden Flight Research Center has flight tested two X-29A aircraft at low and high angles of attack. The high-angle-of-attack tests evaluate the feasibility of integrated X-29A technologies. More specific objectives focus on evaluating the high-angle-of-attack flying qualities, defining multiaxis controllability limits, and determining the maximum pitch-pointing capability. A pilot-selectable gain system allows examination of tradeoffs in airplane stability and maneuverability. Basic fighter maneuvers provide qualitative evaluation. Bank angle captures permit qualitative data analysis. This paper discusses the design goals and approach for high-angle-of-attack control laws and provides results from the envelope expansion and handling qualities testing at intermediate angles of attack. Comparisons of the flight test results to the predictions are made where appropriate. The pitch rate command structure of the longitudinal control system is shown to be a valid design for high-angle-of-attack control laws. Flight test results show that wing rock amplitude was overpredicted and aileron and rudder effectiveness were underpredicted. Flight tests show the X-29A airplane to be a good aircraft up to 40 deg angle of attack.

  13. Review of attacks on health care facilities in six conflicts of the past three decades.

    Science.gov (United States)

    Briody, Carolyn; Rubenstein, Leonard; Roberts, Les; Penney, Eamon; Keenan, William; Horbar, Jeffrey

    2018-01-01

    In the ongoing conflicts of Syria and Yemen, there have been widespread reports of attacks on health care facilities and personnel. Tabulated evidence does suggest hospital bombings in Syria and Yemen are far higher than reported in other conflicts but it is unclear if this is a reporting artefact. This article examines attacks on health care facilities in conflicts in six middle- to high- income countries that have occurred over the past three decades to try and determine if attacks have become more common, and to assess the different methods used to collect data on attacks. The six conflicts reviewed are Yemen (2015-Present), Syria (2011- Present), Iraq (2003-2011), Chechnya (1999-2000), Kosovo (1998-1999), and Bosnia and Herzegovina (1992-1995). We attempted to get the highest quality source(s) with summary data of the number of facilities attacked for each of the conflicts. The only conflict that did not have summary data was the conflict in Iraq. In this case, we tallied individual reported events of attacks on health care. Physicians for Human Rights (PHR) reported attacks on 315 facilities (4.38 per month) in Syria over a 7-year period, while the Monitoring Violence against Health Care (MVH) tool launched later by the World Health Organization (WHO) Turkey Health Cluster reported attacks on 135 facilities (9.64 per month) over a 14-month period. Yemen had a reported 93 attacks (4.65 per month), Iraq 12 (0.12 per month), Chechnya > 24 (2.4 per month), Kosovo > 100 (6.67 per month), and Bosnia 21 (0.41 per month). Methodologies to collect data, and definitions of both facilities and attacks varied widely across sources. The number of reported facilities attacked is by far the greatest in Syria, suggesting that this phenomenon has increased compared to earlier conflicts. However, data on attacks of facilities was incomplete for all of the conflicts examined, methodologies varied widely, and in some cases, attacks were not defined at all. A global

  14. Does provider-initiated HIV testing and counselling lead to higher HIV testing rate and HIV case finding in Rwandan clinics?

    NARCIS (Netherlands)

    Kayigamba, Felix R.; van Santen, Daniëla; Bakker, Mirjam I.; Lammers, Judith; Mugisha, Veronicah; Bagiruwigize, Emmanuel; de Naeyer, Ludwig; Asiimwe, Anita; Schim van der Loeff, Maarten F.

    2016-01-01

    Provider-initiated HIV testing and counselling (PITC) is promoted as a means to increase HIV case finding. We assessed the effectiveness of PITC to increase HIV testing rate and HIV case finding among outpatients in Rwandan health facilities (HF). PITC was introduced in six HFs in 2009-2010. HIV

  15. Lower estimated glomerular filtration rate and higher albuminuria are associated with mortality and end-stage renal disease. A collaborative meta-analysis of kidney disease population cohorts

    DEFF Research Database (Denmark)

    Astor, Brad C; Matsushita, Kunihiro; Gansevoort, Ron T

    2011-01-01

    We studied here the independent associations of estimated glomerular filtration rate (eGFR) and albuminuria with mortality and end-stage renal disease (ESRD) in individuals with chronic kidney disease (CKD). We performed a collaborative meta-analysis of 13 studies totaling 21,688 patients selected...

  16. Payment for antiretroviral drugs is associated with a higher rate of patients lost to follow-up than those offered free-of-charge therapy in Nairobi, Kenya

    NARCIS (Netherlands)

    Zachariah, R.; van Engelgem, I.; Massaquoi, M.; Kocholla, L.; Manzi, M.; Suleh, A.; Phillips, M.; Borgdorff, M.

    2008-01-01

    This retrospective analysis of routine programme data from Mbagathi District Hospital, Nairobi, Kenya shows the difference in rates of loss to follow-up between a cohort that paid 500 shillings/month (approximately US$7) for antiretroviral drugs (ART) and one that received medication free of charge.

  17. Lower estimated glomerular filtration rate and higher albuminuria are associated with all-cause and cardiovascular mortality. A collaborative meta-analysis of high-risk population cohorts

    NARCIS (Netherlands)

    van der Velde, Marije; Matsushita, Kunihiro; Coresh, Josef; Astor, Brad C.; Woodward, Mark; Levey, Andrew S.; de Jong, Paul E.; Gansevoort, Ron T.

    Screening for chronic kidney disease is recommended in people at high risk, but data on the independent and combined associations of estimated glomerular filtration rate (eGFR) and albuminuria with all-cause and cardiovascular mortality are limited. To clarify this, we performed a collaborative

  18. Nonepileptic attack disorder among married women.

    Science.gov (United States)

    Dhanaraj, M; Rangaraj, R; Arulmozhi, T; Vengatesan, A

    2005-06-01

    To study the clinical features, precipitating stressful life events and prognosis of nonepileptic attack disorder (NEAD) among married women. Prospective cohort study with 1-year follow-up. A tertiary care teaching hospital. Of the 1020 patients with epilepsy referred to the epilepsy clinic during 2002-2003, 30 were married women with NEAD. The diagnostic criteria for NEAD included normal EEG during ictal and post-ictal phase of the generalized 'attack.' The data collected included clinical characteristics, semiology of the attacks, precipitating stressful events, and co-morbid psychiatric disorders. The control group included 30 age-matched married women with generalized tonic-clonic seizures. The long-term outcome and factors influencing the outcomes were analyzed. The mean duration of illness was 18 months, and the pattern of the attack was 'fall and lying still' in 53% and 'fall with generalized motor movements' in 47%. The frequency was one or more per week in 57% and occasionally in 43%. The important stressful events were matrimonial discord following illegal relationship of the husband with another woman (chi2 = 9.02, P = 0.003) and constant quarrel with other family members (chi2 = 5.19, P = 0.02). The prevalence of sexual abuse was low (7%). Co-morbid psychiatric disorder was observed in 70%. At the end of 1 year, 39% were free from the attack. Resolution of the stressful life events (chi2 = 4.52, P = 0.03) and lower frequency of attack at the time of reporting (chi2 = 3.88, P = 0.05) correlated with good outcomes. Among patients with NEAD in India, the major precipitating factors were matrimonial discord following illegal relationship of the husband with another woman and constant quarrel with other family members and not sexual abuse. Women with low frequency of attack at the time of reporting and the remission of the stressful events had better outcomes.

  19. Asynchronous Channel-Hopping Scheme under Jamming Attacks

    Directory of Open Access Journals (Sweden)

    Yongchul Kim

    2018-01-01

    Full Text Available Cognitive radio networks (CRNs are considered an attractive technology to mitigate inefficiency in the usage of licensed spectrum. CRNs allow the secondary users (SUs to access the unused licensed spectrum and use a blind rendezvous process to establish communication links between SUs. In particular, quorum-based channel-hopping (CH schemes have been studied recently to provide guaranteed blind rendezvous in decentralized CRNs without using global time synchronization. However, these schemes remain vulnerable to jamming attacks. In this paper, we first analyze the limitations of quorum-based rendezvous schemes called asynchronous channel hopping (ACH. Then, we introduce a novel sequence sensing jamming attack (SSJA model in which a sophisticated jammer can dramatically reduce the rendezvous success rates of ACH schemes. In addition, we propose a fast and robust asynchronous rendezvous scheme (FRARS that can significantly enhance robustness under jamming attacks. Our numerical results demonstrate that the performance of the proposed scheme vastly outperforms the ACH scheme when there are security concerns about a sequence sensing jammer.

  20. Patent foramen ovale and migraine attacks: a systematic review.

    Science.gov (United States)

    Lip, Philomena Z Y; Lip, Gregory Y H

    2014-05-01

    Migraine headache and the presence of a patent foramen ovale have been associated with each other, although the precise pathophysiological mechanism(s) are uncertain. The purpose of this systematic review was to identify the extent of patent foramen ovale prevalence in migraineurs and to determine whether closure of a patent foramen ovale would improve migraine headache. An electronic literature search was performed to select studies between January 1980 and February 2013 that were relevant to the prevalence of patent foramen ovale and migraine, and the effects of intervention(s) on migraine attacks. Of the initial 368 articles presented by the initial search, 20 satisfied the inclusion criteria assessing patent foramen ovale prevalence in migraineurs and 21 presented data on patent foramen ovale closure. In case series and cohort studies, patent foramen ovale prevalence in migraineurs ranged from 14.6% to 66.5%. Case-control studies reported a prevalence ranging from 16.0% to 25.7% in controls, compared with 26.8% to 96.0% for migraine with aura. The extent of improvement or resolution of migraine headache attack symptoms was variable. In case series, intervention ameliorated migraine headache attack in 13.6% to 92.3% of cases. One single randomized trial did not show any benefit from patent foramen ovale closure. The data overall do not exclude the possibility of a placebo effect for resolving migraine following patent foramen ovale closure. This systematic review demonstrates firstly that migraine headache attack is associated with a higher prevalence of patent foramen ovale than among the general population. Observational data suggest that some improvement of migraine would be observed if the patent foramen ovale were to be closed. A proper assessment of any interventions for patent foramen ovale closure would require further large randomized trials to be conducted given uncertainties from existing trial data. Copyright © 2014 Elsevier Inc. All rights reserved.

  1. Classification of HTTP Attacks: A Study on the ECML/PKDD 2007 Discovery Challenge

    Energy Technology Data Exchange (ETDEWEB)

    Gallagher, Brian [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Eliassi-Rad, Tina [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2009-07-08

    As the world becomes more reliant on Web applications for commercial, financial, and medical transactions, cyber attacks on the World Wide Web are increasing in frequency and severity. Web applications provide an attractive alternative to traditional desktop applications due to their accessibility and ease of deployment. However, the accessibility of Web applications also makes them extremely vulnerable to attack. This inherent vulnerability is intensified by the distributed nature ofWeb applications and the complexity of configuring application servers. These factors have led to a proliferation of Web-based attacks, in which attackers surreptitiously inject code into HTTP requests, allowing them to execute arbitrary commands on remote systems and perform malicious activities such as reading, altering, or destroying sensitive data. One approach for dealing with HTTP-based attacks is to identify malicious code in incoming HTTP requests and eliminate bad requests before they are processed. Using machine learning techniques, we can build a classifier to automatically label requests as “Valid” or “Attack.” For this study, we develop a simple, but effective HTTP attack classifier, based on the vector space model used commonly for Information Retrieval. Our classifier not only separates attacks from valid requests, but can also identify specific attack types (e.g., “SQL Injection” or “Path Traversal”). We demonstrate the effectiveness of our approach through experiments on the ECML/PKDD 2007 Discovery Challenge data set. Specifically, we show that our approach achieves higher precision and recall than previous methods. In addition, our approach has a number of desirable characteristics, including robustness to missing contextual information, interpretability of models, and scalability.

  2. 12 CFR 263.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  3. 12 CFR 509.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding....17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  4. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  5. Trace Attack against Biometric Mobile Applications

    Directory of Open Access Journals (Sweden)

    Sanaa Ghouzali

    2016-01-01

    Full Text Available With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen. Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy.

  6. Subclinical endophthalmitis following a rooster attack.

    Science.gov (United States)

    Lekse Kovach, Jaclyn; Maguluri, Srilakshmi; Recchia, Franco M

    2006-12-01

    Ocular injury resulting from rooster attacks is rarely reported in the literature. Sadly, the target of these attacks is most often children younger than 3 years old, whose naiveté of the aggressive, territorial behavior of birds can place them at risk. Acute sequelae of these attacks can result in a lifetime of visual impairment. The possibility of a subacute or occult infection is an unusual occurrence that must always be considered. In an effort to prevent future attacks and ocular casualties, we present a case of a 12-month-old boy who suffered an open globe following a rooster attack. The open globe was emergently repaired. One week later, a white cataract was noticed on examination in the absence of systemic or ocular signs of inflammation. Traumatic endophthalmitis and lenticular abscess were suspected during examination under anesthesia. Vitrectomy, lensectomy, and injection of intravitreal antibiotics were performed. Culture of lenticular and vitreous aspirates grew alpha-streptococcus. Alpha-streptococcal endophthalmitis can result from ocular injuries caused by rooster pecking. The infection may present insidiously and without typical ocular or systemic symptoms or signs. Management is challenging and may require surgery.

  7. Modeling attacking of high skills volleyball players

    Directory of Open Access Journals (Sweden)

    Vladimir Gamaliy

    2014-12-01

    Full Text Available Purpose: to determine the model indicators of technical and tactical actions in the attack highly skilled volleyball players. Material and Methods: the study used statistical data of major international competitions: Olympic Games – 2012 World Championships – 2010, World League – 2010–2014 European Championship – 2010–2014. A total of 130 analyzed games. Methods were used: analysis and generalization of scientific and methodological literature, analysis of competitive activity highly skilled volleyball players, teacher observation, modeling technical and tactical actions in attacking highly skilled volleyball players. Results: it was found that the largest volume application of technical and tactical actions in the attack belongs to the group tactics «supple movement», whose indicator is 21,3%. The smallest amount of application belongs to the group tactics «flight level» model whose indicators is 5,4%, the efficiency of 3,4%, respectively. It is found that the power service in the jump from model parameters used in 51,6% of cases, the planning targets – 21,7% and 4,4% planning to reduce. Attacks performed with the back line, on model parameters used in the amount of 20,8% efficiency –13,7%. Conclusions: we prove that the performance of technical and tactical actions in the attack can be used as model in the control system of training and competitive process highly skilled volleyball players

  8. On the anatomy of social engineering attacks : A literature-based dissection of successful attacks

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    The aim of this studywas to explore the extent towhich persuasion principles are used in successful social engineering attacks. Seventy-four scenarioswere extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenariowas split into attack steps, containing

  9. Attacks on public telephone networks: technologies and challenges

    Science.gov (United States)

    Kosloff, T.; Moore, Tyler; Keller, J.; Manes, Gavin W.; Shenoi, Sujeet

    2003-09-01

    Signaling System 7 (SS7) is vital to signaling and control in America's public telephone networks. This paper describes a class of attacks on SS7 networks involving the insertion of malicious signaling messages via compromised SS7 network components. Three attacks are discussed in detail: IAM flood attacks, redirection attacks and point code spoofing attacks. Depending on their scale of execution, these attacks can produce effects ranging from network congestion to service disruption. Methods for detecting these denial-of-service attacks and mitigating their effects are also presented.

  10. Cross-site scripting attacks procedure and Prevention Strategies

    Directory of Open Access Journals (Sweden)

    Wang Xijun

    2016-01-01

    Full Text Available Cross-site scripting attacks and defense has been the site of attack and defense is an important issue, this paper, the definition of cross-site scripting attacks, according to the current understanding of the chaos on the cross-site scripting, analyzes the causes and harm cross-site scripting attacks formation of attacks XXS complete process XSS attacks made a comprehensive analysis, and then for the web program includes Mobility there are cross-site scripting filter laxity given from ordinary users browse the web and web application developers two the defense cross-site scripting attacks effective strategy.

  11. Resistance of Particleboards Made from Fast-Growing Wood Species to Subterranean Termite Attack.

    Science.gov (United States)

    Hermawan, Dede; Hadi, Yusuf S; Fajriani, Esi; Massijaya, Muhamad Y; Hadjib, Nurwati

    2012-05-29

    Laboratory-made particleboards were tested for their resistance to subterranean termite, Coptotermes curvignathus Holmgren (Order Isoptera, Family Termitidae) by Indonesian standard SNI 01.7207-2006, during four weeks and at the end of the test their mass loss percentage and feeding rate were determined. Particleboards consisted of: jabon (Anthocephalus cadamba, Family Rubiacea) with a density of 0.41 g/cm³; sungkai (Peronema canescens, Family Verbenaceae) with a density of 0.46 g/cm³; mangium (Acacia mangium, Family Rhamnaceae) with a density of 0.60 g/cm³ separately and the three species mixture at a rate of 1:1:1. Densities of the boards were targetted at 0.60 g/cm³ and 0.80 g/cm³ by using 12% urea formaldehyde as binder with 2% paraffin as additive based on oven dry wood particle weight. The hand-formed mats and hot-pressing at 130 °C and 2.45 MPa for 10 min were applied. The results showed that particleboards density did not affect mass loss and feeding rate, but the particleboards made from higher density wood resulted in higher resistance to subterranean termite attack. The most resistant particleboards were made of magium, followed by sungkai, mixed species, and jabon.

  12. Resistance of Particleboards Made from Fast-Growing Wood Species to Subterranean Termite Attack

    Directory of Open Access Journals (Sweden)

    Nurwati Hadjib

    2012-05-01

    Full Text Available Laboratory-made particleboards were tested for their resistance to subterranean termite, Coptotermes curvignathus Holmgren (Order Isoptera, Family Termitidae by Indonesian standard SNI 01.7207–2006, during four weeks and at the end of the test their mass loss percentage and feeding rate were determined. Particleboards consisted of: jabon (Anthocephalus cadamba, Family Rubiacea with a density of 0.41 g/cm3; sungkai (Peronema canescens, Family Verbenaceae with a density of 0.46 g/cm3; mangium (Acacia mangium, Family Rhamnaceae with a density of 0.60 g/cm3 separately and the three species mixture at a rate of 1:1:1. Densities of the boards were targetted at 0.60 g/cm3 and 0.80 g/cm3 by using 12% urea formaldehyde as binder with 2% paraffin as additive based on oven dry wood particle weight. The hand-formed mats and hot-pressing at 130 °C and 2.45 MPa for 10 min were applied. The results showed that particleboards density did not affect mass loss and feeding rate, but the particleboards made from higher density wood resulted in higher resistance to subterranean termite attack. The most resistant particleboards were made of magium, followed by sungkai, mixed species, and jabon.

  13. Are High-Severity Fires Burning at Much Higher Rates Recently than Historically in Dry-Forest Landscapes of the Western USA?

    Science.gov (United States)

    Baker, William L

    2015-01-01

    Dry forests at low elevations in temperate-zone mountains are commonly hypothesized to be at risk of exceptional rates of severe fire from climatic change and land-use effects. Their setting is fire-prone, they have been altered by land-uses, and fire severity may be increasing. However, where fires were excluded, increased fire could also be hypothesized as restorative of historical fire. These competing hypotheses are not well tested, as reference data prior to widespread land-use expansion were insufficient. Moreover, fire-climate projections were lacking for these forests. Here, I used new reference data and records of high-severity fire from 1984-2012 across all dry forests (25.5 million ha) of the western USA to test these hypotheses. I also approximated projected effects of climatic change on high-severity fire in dry forests by applying existing projections. This analysis showed the rate of recent high-severity fire in dry forests is within the range of historical rates, or is too low, overall across dry forests and individually in 42 of 43 analysis regions. Significant upward trends were lacking overall from 1984-2012 for area burned and fraction burned at high severity. Upward trends in area burned at high severity were found in only 4 of 43 analysis regions. Projections for A.D. 2046-2065 showed high-severity fire would generally be still operating at, or have been restored to historical rates, although high projections suggest high-severity fire rotations that are too short could ensue in 6 of 43 regions. Programs to generally reduce fire severity in dry forests are not supported and have significant adverse ecological impacts, including reducing habitat for native species dependent on early-successional burned patches and decreasing landscape heterogeneity that confers resilience to climatic change. Some adverse ecological effects of high-severity fires are concerns. Managers and communities can improve our ability to live with high-severity fire in

  14. A DDoS Attack Detection Method Based on SVM in Software Defined Network

    Directory of Open Access Journals (Sweden)

    Jin Ye

    2018-01-01

    Full Text Available The detection of DDoS attacks is an important topic in the field of network security. The occurrence of software defined network (SDN (Zhang et al., 2018 brings up some novel methods to this topic in which some deep learning algorithm is adopted to model the attack behavior based on collecting from the SDN controller. However, the existing methods such as neural network algorithm are not practical enough to be applied. In this paper, the SDN environment by mininet and floodlight (Ning et al., 2014 simulation platform is constructed, 6-tuple characteristic values of the switch flow table is extracted, and then DDoS attack model is built by combining the SVM classification algorithms. The experiments show that average accuracy rate of our method is 95.24% with a small amount of flow collecting. Our work is of good value for the detection of DDoS attack in SDN.

  15. Analysis for Ad Hoc Network Attack-Defense Based on Stochastic Game Model

    Directory of Open Access Journals (Sweden)

    Yuanjie LI

    2014-06-01

    Full Text Available The attack actions analysis for Ad Hoc networks can provide a reference for the design security mechanisms. This paper presents an analysis method of security of Ad Hoc networks based on Stochastic Game Nets (SGN. This method can establish a SGN model of Ad Hoc networks and calculate to get the Nash equilibrium strategy. After transforming the SGN model into a continuous-time Markov Chain (CTMC, the security of Ad Hoc networks can be evaluated and analyzed quantitatively by calculating the stationary probability of CTMC. Finally, the Matlab simulation results show that the probability of successful attack is related to the attack intensity and expected payoffs, but not attack rate.

  16. Quantum private query with perfect user privacy against a joint-measurement attack

    Energy Technology Data Exchange (ETDEWEB)

    Yang, Yu-Guang, E-mail: yangyang7357@bjut.edu.cn [College of Computer Science and Technology, Beijing University of Technology, Beijing 100124 (China); State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093 (China); Liu, Zhi-Chao [College of Computer Science and Technology, Beijing University of Technology, Beijing 100124 (China); Li, Jian [School of Computer, Beijing University of Posts and Telecommunications, Beijing 100876 (China); Chen, Xiu-Bo [Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876 (China); Zuo, Hui-Juan [College of Mathematics and Information Science, Hebei Normal University, Shijiazhuang 050024 (China); Zhou, Yi-Hua; Shi, Wei-Min [College of Computer Science and Technology, Beijing University of Technology, Beijing 100124 (China)

    2016-12-16

    The joint-measurement (JM) attack is the most powerful threat to the database security for existing quantum-key-distribution (QKD)-based quantum private query (QPQ) protocols. Wei et al. (2016) [28] proposed a novel QPQ protocol against the JM attack. However, their protocol relies on two-way quantum communication thereby affecting its real implementation and communication efficiency. Moreover, it cannot ensure perfect user privacy. In this paper, we present a new one-way QPQ protocol in which the special way of classical post-processing of oblivious key ensures the security against the JM attack. Furthermore, it realizes perfect user privacy and lower complexity of communication. - Highlights: • A special classical post-processing ensures the security against the JM attack. • It ensures perfect user privacy. • It ensures lower complexity of communication. Alice's conclusive key rate is 1/6.

  17. Countermeasure against probabilistic blinding attack in practical quantum key distribution systems

    International Nuclear Information System (INIS)

    Qian Yong-Jun; Li Hong-Wei; He De-Yong; Yin Zhen-Qiang; Zhang Chun-Mei; Chen Wei; Wang Shuang; Han Zheng-Fu

    2015-01-01

    In a practical quantum key distribution (QKD) system, imperfect equipment, especially the single-photon detector, can be eavesdropped on by a blinding attack. However, the original blinding attack may be discovered by directly detecting the current. In this paper, we propose a probabilistic blinding attack model, where Eve probabilistically applies a blinding attack without being caught by using only an existing intuitive countermeasure. More precisely, our countermeasure solves the problem of how to define the bound in the limitation of precision of current detection, and then we prove security of the practical system by considering the current parameter. Meanwhile, we discuss the bound of the quantum bit error rate (QBER) introduced by Eve, by which Eve can acquire information without the countermeasure. (paper)

  18. Do terrorist attacks affect ethnic discrimination in the labour market? Evidence from two randomized field experiments.

    Science.gov (United States)

    Birkelund, Gunn Elisabeth; Chan, Tak Wing; Ugreninov, Elisabeth; Midtbøen, Arnfinn H; Rogstad, Jon

    2018-01-24

    Terrorist attacks are known to influence public opinion. But do they also change behaviour? We address this question by comparing the results of two identical randomized field experiments on ethnic discrimination in hiring that we conducted in Oslo. The first experiment was conducted before the 2011 terrorist attacks in Norway; the second experiment was conducted after the attacks. In both experiments, applicants with a typical Pakistani name were significantly less likely to get a job interview compared to those with a typical Norwegian name. But the ethnic gap in call-back rates were very similar in the two experiments. Thus, Pakistanis in Norway still experienced the same level of discrimination, despite claims that Norwegians have become more positive about migrants after the far-right, anti-migrant terrorist attacks of 2011. © London School of Economics and Political Science 2018.

  19. Quantum private query with perfect user privacy against a joint-measurement attack

    International Nuclear Information System (INIS)

    Yang, Yu-Guang; Liu, Zhi-Chao; Li, Jian; Chen, Xiu-Bo; Zuo, Hui-Juan; Zhou, Yi-Hua; Shi, Wei-Min

    2016-01-01

    The joint-measurement (JM) attack is the most powerful threat to the database security for existing quantum-key-distribution (QKD)-based quantum private query (QPQ) protocols. Wei et al. (2016) [28] proposed a novel QPQ protocol against the JM attack. However, their protocol relies on two-way quantum communication thereby affecting its real implementation and communication efficiency. Moreover, it cannot ensure perfect user privacy. In this paper, we present a new one-way QPQ protocol in which the special way of classical post-processing of oblivious key ensures the security against the JM attack. Furthermore, it realizes perfect user privacy and lower complexity of communication. - Highlights: • A special classical post-processing ensures the security against the JM attack. • It ensures perfect user privacy. • It ensures lower complexity of communication. Alice's conclusive key rate is 1/6.

  20. Higher caloric intake in hospitalized adolescents with anorexia nervosa is associated with reduced length of stay and no increased rate of refeeding syndrome.

    Science.gov (United States)

    Golden, Neville H; Keane-Miller, Casey; Sainani, Kristin L; Kapphahn, Cynthia J

    2013-11-01

    To determine the effect of higher caloric intake on weight gain, length of stay (LOS), and incidence of hypophosphatemia, hypomagnesemia, and hypokalemia in adolescents hospitalized with anorexia nervosa. Electronic medical records of all subjects 10-21 years of age with anorexia nervosa, first admitted to a tertiary children's hospital from Jan 2007 to Dec 2011, were retrospectively reviewed. Demographic factors, anthropometric measures, incidence of hypophosphatemia (≤3.0 mg/dL), hypomagnesemia (≤1.7 mg/dL), and hypokalemia (≤3.5 mEq/L), and daily change in percent median body mass index (BMI) (%mBMI) from baseline were recorded. Subjects started on higher-calorie diets (≥1,400 kcal/d) were compared with those started on lower-calorie diets (Refeeding hypophosphatemia depends on the degree of malnutrition but not prescribed caloric intake, within the range studied. Copyright © 2013 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  1. Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks

    Directory of Open Access Journals (Sweden)

    Željko Gavrić

    2018-01-01

    Full Text Available Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the security issue is very important. DOS (denial of service attacks are a fundamental threat to the functioning of wireless sensor networks. This paper describes some of the most common DOS attacks and potential methods of protection against them. The case study shows one of the most frequent attacks on wireless sensor networks – the interference attack. In the introduction of this paper authors assume that the attack interference can cause significant obstruction of wireless sensor networks. This assumption has been proved in the case study through simulation scenario and simulation results.

  2. Relation of temperature and humidity to the risk of recurrent gout attacks.

    Science.gov (United States)

    Neogi, Tuhina; Chen, Clara; Niu, Jingbo; Chaisson, Christine; Hunter, David J; Choi, Hyon; Zhang, Yuqing

    2014-08-15

    Gout attack risk may be affected by weather (e.g., because of volume depletion). We therefore examined the association of temperature and humidity with the risk of recurrent gout attacks by conducting an internet-based case-crossover study in the United States (in 2003-2010) among subjects with a diagnosis of gout who had 1 or more attacks during 1 year of follow-up. We examined the association of temperature and humidity over the prior 48 hours with the risk of gout attacks using a time-stratified approach and conditional logistic regression. Among 632 subjects with gout, there was a significant dose-response relationship between mean temperature in the prior 48 hours and the risk of subsequent gout attack (P = 0.01 for linear trend). Higher temperatures were associated with approximately 40% higher risk of gout attack compared with moderate temperatures. There was a reverse J-shaped relationship between mean relative humidity and the risk of gout attacks (P = 0.03 for quadratic trend). The combination of high temperature and low humidity had the greatest association (odds ratio = 2.04, 95% confidence interval: 1.26, 3.30) compared with moderate temperature and relative humidity. Thus, high ambient temperature and possibly extremes of humidity were associated with an increased risk of gout attack, despite the likelihood that individuals are often in climate-controlled indoor environments. © The Author 2014. Published by Oxford University Press on behalf of the Johns Hopkins Bloomberg School of Public Health. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  3. Implementation of the forced answering option within online surveys: Do higher item response rates come at the expense of participation and answer quality?

    Directory of Open Access Journals (Sweden)

    Décieux Jean Philippe

    2015-01-01

    Full Text Available Online surveys have become a popular method for data gathering for many reasons, including low costs and the ability to collect data rapidly. However, online data collection is often conducted without adequate attention to implementation details. One example is the frequent use of the forced answering option, which forces the respondent to answer each question in order to proceed through the questionnaire. The avoidance of missing data is often the idea behind the use of the forced answering option. However, we suggest that the costs of a reactance effect in terms of quality reduction and unit nonresponse may be high because respondents typically have plausible reasons for not answering questions. The objective of the study reported in this paper was to test the influence of forced answering on dropout rates and data quality. The results show that requiring participants answer every question increases dropout rates and decreases quality of answers. Our findings suggest that the desire for a complete data set has to be balanced against the consequences of reduced data quality.

  4. Counteracting Power Analysis Attacks by Masking

    Science.gov (United States)

    Oswald, Elisabeth; Mangard, Stefan

    The publication of power analysis attacks [12] has triggered a lot of research activities. On the one hand these activities have been dedicated toward the development of secure and efficient countermeasures. On the other hand also new and improved attacks have been developed. In fact, there has been a continuous arms race between designers of countermeasures and attackers. This chapter provides a brief overview of the state-of-the art in the arms race in the context of a countermeasure called masking. Masking is a popular countermeasure that has been extensively discussed in the scientific community. Numerous articles have been published that explain different types of masking and that analyze weaknesses of this countermeasure.

  5. The WOMBAT Attack Attribution Method: Some Results

    Science.gov (United States)

    Dacier, Marc; Pham, Van-Hau; Thonnard, Olivier

    In this paper, we present a new attack attribution method that has been developed within the WOMBAT project. We illustrate the method with some real-world results obtained when applying it to almost two years of attack traces collected by low interaction honeypots. This analytical method aims at identifying large scale attack phenomena composed of IP sources that are linked to the same root cause. All malicious sources involved in a same phenomenon constitute what we call a Misbehaving Cloud (MC). The paper offers an overview of the various steps the method goes through to identify these clouds, providing pointers to external references for more detailed information. Four instances of misbehaving clouds are then described in some more depth to demonstrate the meaningfulness of the concept.

  6. Dead or Alive? Factors Affecting the Survival of Victims during Attacks by Saltwater Crocodiles (Crocodylus porosus in Australia.

    Directory of Open Access Journals (Sweden)

    Yusuke Fukuda

    Full Text Available Conflicts between humans and crocodilians are a widespread conservation challenge and the number of crocodile attacks is increasing worldwide. We identified the factors that most effectively decide whether a victim is injured or killed in a crocodile attack by fitting generalized linear models to a 42-year dataset of 87 attacks (27 fatal and 60 non-fatal by saltwater crocodiles (Crocodylus porosus in Australia. The models showed that the most influential factors were the difference in body mass between crocodile and victim, and the position of victim in relation to the water at the time of an attack. In-water position (for diving, swimming, and wading had a higher risk than on-water (boating or on-land (fishing, and hunting near the water's edge positions. In the in-water position a 75 kg person would have a relatively high probability of survival (0.81 if attacked by a 300 cm crocodile, but the probability becomes much lower (0.17 with a 400 cm crocodile. If attacked by a crocodile larger than 450 cm, the survival probability would be extremely low (<0.05 regardless of the victim's size. These results indicate that the main cause of death during a crocodile attack is drowning and larger crocodiles can drag a victim more easily into deeper water. A higher risk associated with a larger crocodile in relation to victim's size is highlighted by children's vulnerability to fatal attacks. Since the first recently recorded fatal attack involving a child in 2006, six out of nine fatal attacks (66.7% involved children, and the average body size of crocodiles responsible for these fatal attacks was considerably smaller (384 cm, 223 kg than that of crocodiles that killed adults (450 cm, 324 kg during the same period (2006-2014. These results suggest that culling programs targeting larger crocodiles may not be an effective management option to improve safety for children.

  7. Higher rates of triple-class virological failure in perinatally HIV-infected teenagers compared with heterosexually infected young adults in Europe.

    Science.gov (United States)

    Judd, A; Lodwick, R; Noguera-Julian, A; Gibb, D M; Butler, K; Costagliola, D; Sabin, C; van Sighem, A; Ledergerber, B; Torti, C; Mocroft, A; Podzamczer, D; Dorrucci, M; De Wit, S; Obel, N; Dabis, F; Cozzi-Lepri, A; García, F; Brockmeyer, N H; Warszawski, J; Gonzalez-Tome, M I; Mussini, C; Touloumi, G; Zangerle, R; Ghosn, J; Castagna, A; Fätkenheuer, G; Stephan, C; Meyer, L; Campbell, M A; Chene, G; Phillips, A

    2017-03-01

    The aim of the study was to determine the time to, and risk factors for, triple-class virological failure (TCVF) across age groups for children and adolescents with perinatally acquired HIV infection and older adolescents and adults with heterosexually acquired HIV infection. We analysed individual patient data from cohorts in the Collaboration of Observational HIV Epidemiological Research Europe (COHERE). A total of 5972 participants starting antiretroviral therapy (ART) from 1998, aged 500 HIV-1 RNA copies/mL despite ≥ 4 months of use. TCVF was defined as cumulative failure of two NRTIs, an NNRTI and a bPI. The median number of weeks between diagnosis and the start of ART was higher in participants with perinatal HIV infection compared with participants with heterosexually acquired HIV infection overall [17 (interquartile range (IQR) 4-111) vs. 8 (IQR 2-38) weeks, respectively], and highest in perinatally infected participants aged 10-14 years [49 (IQR 9-267) weeks]. The cumulative proportion with TCVF 5 years after starting ART was 9.6% [95% confidence interval (CI) 7.0-12.3%] in participants with perinatally acquired infection and 4.7% (95% CI 3.9-5.5%) in participants with heterosexually acquired infection, and highest in perinatally infected participants aged 10-14 years when starting ART (27.7%; 95% CI 13.2-42.1%). Across all participants, significant predictors of TCVF were those with perinatal HIV aged 10-14 years, African origin, pre-ART AIDS, NNRTI-based initial regimens, higher pre-ART viral load and lower pre-ART CD4. The results suggest a beneficial effect of starting ART before adolescence, and starting young people on boosted PIs, to maximize treatment response during this transitional stage of development. © 2016 The Authors. HIV Medicine published by John Wiley & Sons Ltd on behalf of British HIV Association.

  8. Apolipoprotein CIII overexpression exacerbates diet-induced obesity due to adipose tissue higher exogenous lipid uptake and retention and lower lipolysis rates.

    Science.gov (United States)

    Raposo, Helena F; Paiva, Adriene A; Kato, Larissa S; de Oliveira, Helena C F

    2015-01-01

    Hypertriglyceridemia is a common type of dyslipidemia found in obesity. However, it is not established whether primary hyperlipidemia can predispose to obesity. Evidences have suggested that proteins primarily related to plasma lipoprotein transport, such as apolipoprotein (apo) CIII and E, may significantly affect the process of body fat accumulation. We have previously observed an increased adiposity in response to a high fat diet (HFD) in mice overexpressing apoCIII. Here, we examined the potential mechanisms involved in this exacerbated response of apoCIII mice to the HFD. We measured body energy balance, tissue capacity to store exogenous lipids, lipogenesis and lipolysis rates in non-transgenic and apoCIII overexpressing mice fed a HFD during two months. Food intake, fat excretion and whole body CO2 production were similar in both groups. However, the adipose tissue mass (45 %) and leptin plasma levels (2-fold) were significantly greater in apoCIII mice. Lipogenesis rates were similar, while exogenous lipid retention was increased in perigonadal (2-fold) and brown adipose tissues (40 %) of apoCIII mice. In addition, adipocyte basal lipolysis (55 %) and in vivo lipolysis index (30 %) were significantly decreased in apoCIII mice. A fat tolerance test evidenced delayed plasma triglyceride clearance and greater transient availability of non-esterified fatty acids (NEFA) during the post-prandial state in the apoCIII mice plasma. Thus, apoCIII overexpression resulted in increased NEFA availability to adipose uptake and decreased adipocyte lipolysis, favoring lipid enlargement of adipose depots. We propose that plasma apoCIII levels represent a new risk factor for diet-induced obesity.

  9. Treatment Results of Postoperative Radiotherapy on Squamous Cell Carcinoma of the Oral Cavity: Coexistence of Multiple Minor Risk Factors Results in Higher Recurrence Rates

    International Nuclear Information System (INIS)

    Fan, Kang-Hsing; Wang, Hung-Ming; Kang, Chung-Jan

    2010-01-01

    Purpose: The aim of this study was to investigate the treatment results of postoperative radiotherapy (PORT) on squamous cell carcinoma of the oral cavity (OSCC). Materials and Methods: This study included 302 OSCC patients who were treated by radical surgery and PORT. Indications for PORT include Stage III or IV OSCC according to the 2002 criteria of the American Joint Committee on Cancer, the presence of perineural invasion or lymphatic invasion, the depth of tumor invasion, or a close surgical margin. Patients with major risk factors, such as multiple nodal metastases, a positive surgical margin, or extracapsular spreading, were excluded. The prescribed dose of PORT ranged from 59.4 to 66.6Gy (median, 63Gy). Results: The 3-year overall and recurrence-free survival rates were 73% and 70%, respectively. Univariate analysis revealed that differentiation, perineural invasion, lymphatic invasion, bone invasion, location (hard palate and retromolar trigone), invasion depths ≥10mm, and margin distances ≤4mm were significant prognostic factors. The presence of multiple significant factors of univariate analysis correlated with disease recurrence. The 3-year recurrence-free survival rates were 82%, 76%, and 45% for patients with no risk factors, one or two risk factors, and three or more risk factors, respectively. After multivariate analysis, the number of risk factors and lymphatic invasion were significant prognostic factors. Conclusion: PORT may be an adequate adjuvant therapy for OSCC patients with one or two risk factors of recurrence. The presence of multiple risk factors and lymphatic invasion correlated with poor prognosis, and more aggressive treatment may need to be considered.

  10. A novel proposed network security management approach for cyber attacks

    International Nuclear Information System (INIS)

    Ahmed, Z.; Nazir, B.; Zafar, M.F.; Anwar, M.M.; Azam, K.; Asar, A.U.

    2007-01-01

    Network security is a discipline that focuses on securing networks from unauthorized access. Given the Escalating threats of malicious cyber attacks, modern enterprises employ multiple lines of defense. A comprehensive defense strategy against such attacks should include (I) an attack detection component that deter- mines the fact that a program is compromised, (2) an attack identification and prevention component that identifies attack packets so that one can block such packets in the future and prevents the attack from further propagation. Over the last decade, a significant amount of research has been vested in the systems that can detect cyber attacks either statically at compile time or dynamically at run time, However, not much effort is spent on automated attack packet identification or attack prevention. In this paper we present a unified solution to the problems mentioned above. We implemented this solution after the forward engineering of Open Source Security Information Management (OSSIM) system called Preventive Information Security management (PrISM) system that correlates input from different sensors so that the resulting product can automatically detect any cyber attack against it and prevents by identifying the actual attack packet(s). The PrISM was always able to detect the attacks, identify the attack packets and most often prevent by blocking the attacker's IP address to continue normal execution. There is no additional run-time performance overhead for attack prevention. (author)

  11. Playing Attack and Defense with Trusted Storage

    DEFF Research Database (Denmark)

    Gonzalez, Javier; Bonnet, Philippe; Bouganim, Luc

    2014-01-01

    It is often convenient to assume in a data management platform that one or several computing devices are trusted, specially when the goal is to provide privacy guarantees over personal data. But what does it take for a computing device to be trusted? More specifically, how can a personal device...... provide trusted storage? This is the question we tackle in this demonstration. We describe how secure devices, equipped with a trusted execution environment, differ from general purpose devices. We illustrate with our demonstration scenario, that it is much more difficult to attack a storage service...... running on a secure device, than to attack the same service running on a general purpose device....

  12. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolić, Ivica; Rechberger, Christian

    2014-01-01

    ciphers, including the new standard SHA-3 (Keccak). The rebound attack is a start-from-the-middle approach for finding differential paths and conforming pairs in byte-oriented designs like Substitution-Permutation networks and AES. We apply our new compositional attack to the reduced version of the hash...... number of rounds. We also use neutral bits and message modification methods from the practice of collision search in MD5 and SHA-1 hash functions. These methods push the rotational property through more rounds than previous analysis suggested, and eventually establish a distinguishing property...

  13. A Distinguish Attack on COSvd Cipher

    OpenAIRE

    Mohammad Ali Orumiehchi ha; R. Mirghadri

    2007-01-01

    The COSvd Ciphers has been proposed by Filiol and others (2004). It is a strengthened version of COS stream cipher family denoted COSvd that has been adopted for at least one commercial standard. We propose a distinguish attack on this version, and prove that, it is distinguishable from a random stream. In the COSvd Cipher used one S-Box (10×8) on the final part of cipher. We focus on S-Box and use weakness this S-Box for distinguish attack. In addition, found a leak on HNLL that the sub s-bo...

  14. Attacks and infections in percolation processes

    International Nuclear Information System (INIS)

    Janssen, Hans-Karl; Stenull, Olaf

    2017-01-01

    We discuss attacks and infections at propagating fronts of percolation processes based on the extended general epidemic process. The scaling behavior of the number of the attacked and infected sites in the long time limit at the ordinary and tricritical percolation transitions is governed by specific composite operators of the field-theoretic representation of this process. We calculate corresponding critical exponents for tricritical percolation in mean-field theory and for ordinary percolation to 1-loop order. Our results agree well with the available numerical data. (paper)

  15. Attack strategies on quantum cryptographic protocols

    International Nuclear Information System (INIS)

    Schauer, S.; Suda, M.

    2006-01-01

    Full text: Quantum key distribution (QKD) and quantum authentication (QA) have been a topic of extensive research in the last 20 years. In course of that many attacks on QKD and QA protocols have been studied. Among these, Zhang, Lee and Guo presented an attack on a QKD protocol using entanglement swapping. Based on that strategy we take a look at other protocols to inspect how much information an adversary may get if he shares entanglement with either one or both parties. We will present some protocols where an adversary can even get full information about the key using entanglement. (author)

  16. Speculative attacks, openness and crises

    Directory of Open Access Journals (Sweden)

    Aloisio Araujo

    2012-06-01

    Full Text Available We extended the Cole and Kehoe model (1996 by adding trade and debt denominated in national currency. We then evaluated some external debt defaults and steep national currency devaluations occurred during last decades. Although default is unlikely, steep devaluation has been repeatedly triggered during financial distresses. It helps to overcome financial crisis as it improves trade balance and reduces national debt level. On the other hand, expected devaluation hurts welfare through both higher national debt cost and reductions in the investment level. We modeled such trade-offs and showed that trade openness, by and large, improves the expected welfare as it allows for a better devaluation-response technology. We ran model simulations based on past 48 crises occurred in 32 middle-income countries, reasonably fitting devaluation and default responses observed as from 1971.

  17. Asthma-like attacks terminated by slow pathway ablation

    Directory of Open Access Journals (Sweden)

    Selcuk Ozturk

    2017-01-01

    Full Text Available Asthma is a chronic airway disease in which the pathological mechanisms are reversible airway obstruction, bronchial hyper reactivity, and constriction of the lower airways. Supraventricular tachycardia (SVT is a common arrhythmia which originates above the bundle of His and causing heart rates exceeding 150 beats/min. SVT patients present with palpitation, chest pain, chest discomfort, dyspnea, hyperventilation, and lightheadedness, occasionally. Besides, extraordinary presentations of SVT are available in literature. In this report, we describe a case of a patient presenting with treatment-resistant asthma-like attacks lasting for 20 years whom was suspected SVT as an underlying etiology and treated by slow pathway radiofrequency ablation.

  18. Diel activity and preferred landing sites in Culicoides biting midges attacking Fjord horses

    NARCIS (Netherlands)

    Elbers, A.R.W.; Heuvel, van den S.J.; Meiswinkel, R.

    2016-01-01

    In the summer of 2014, in the central part of The Netherlands, Culicoides spp. (Diptera: Ceratopogonidae) attack rates, biting rates, and preferred landing sites were determined for a pair of Fjord horses maintained permanently at pasture in an area devoid of cattle. Eleven body regions of the

  19. Autotrophic and heterotrophic nitrification-anoxic denitrification dominated the anoxic/oxic sewage treatment process during optimization for higher loading rate and energy savings.

    Science.gov (United States)

    Zhang, Xueyu; Zheng, Shaokui; Zhang, Hangyu; Duan, Shoupeng

    2018-04-30

    This study clarified the dominant nitrogen (N)-transformation pathway and the key ammonia-oxidizing microbial species at three loading levels during optimization of the anoxic/oxic (A/O) process for sewage treatment. Comprehensive N-transformation activity analysis showed that ammonia oxidization was performed predominantly by aerobic chemolithotrophic and heterotrophic ammonia oxidization, whereas N 2 production was performed primarily by anoxic denitrification in the anoxic unit. The abundances of ammonia-oxidizing bacteria (AOB), nitrite-oxidizing bacteria, and anaerobic AOB in activated sludge reflected their activities on the basis of high-throughput sequencing data. AOB amoA gene clone libraries revealed that the predominant AOB species in sludge samples shifted from Nitrosomonas europaea (61% at the normal loading level) to Nitrosomonas oligotropha (58% and 81% at the two higher loading levels). Following isolation and sequencing, the predominant culturable heterotrophic AOB in sludge shifted from Agrobacterium tumefaciens (42% at the normal loading level) to Acinetobacter johnsonii (52% at the highest loading level). Copyright © 2018 Elsevier Ltd. All rights reserved.

  20. Infusion-related febrile reaction after haploidentical stem cell transplantation in children is associated with higher rates of engraftment syndrome and acute graft-versus-host disease.

    Science.gov (United States)

    Chen, Yao; Huang, Xiao-Jun; Liu, Kai-Yan; Chen, Huan; Chen, Yu-Hong; Zhang, Xiao-Hui; Wang, Feng-Rong; Han, Wei; Wang, Jing-Zhi; Wang, Yu; Yan, Chen-Hua; Zhang, Yuan-Yuan; Sun, Yu-Qian; Xu, Lan-Ping

    2015-12-01

    The clinical significance and prognostic impact of IRFR in pediatric recipients of haploidentical SCT are not clearly understood. Therefore, we attempted to determine how IRFR affects clinical outcomes in children. Clinical data from 100 consecutive pediatric patients (60 boys and 40 girls; median age, 12 yr [range, 2-18 yr] after haploidentical SCT between January 2010 and December 2012 were collected retrospectively. IRFR was described as unexplained fever (>38 °C) within 24 h after the infusion of haploidentical PBSCs. Thirty-eight (38.0%) cases met the criteria for IRFR. ES was found in 24 (63.2%) of the 38 children with IRFR, with the median time of developing ES of +9 (7-16) days, while only 15 (25.4%) of the 59 children without IRFR were found with ES (p children after haploidentical SCT. Thirty-eight children comprised the IRFR group, and 59 were in the control (non-IRFR) group. High incidence of ES was observed in children with the occurrence of IRFR. Similarly, the incidence of stage I-IV and II-IV aGVHD was significantly higher in the febrile group. Multivariate analysis showed IRFR to be the risk factor for ES and aGVHD. © 2015 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  1. Ablation of arginylation in the mouse N-end rule pathway: loss of fat, higher metabolic rate, damaged spermatogenesis, and neurological perturbations.

    Directory of Open Access Journals (Sweden)

    Christopher S Brower

    2009-11-01

    Full Text Available In the N-end rule pathway of protein degradation, the destabilizing activity of N-terminal Asp, Glu or (oxidized Cys residues requires their conjugation to Arg, which is recognized directly by pathway's ubiquitin ligases. N-terminal arginylation is mediated by the Ate1 arginyltransferase, whose physiological substrates include the Rgs4, Rgs5 and Rgs16 regulators of G proteins. Here, we employed the Cre-lox technique to uncover new physiological functions of N-terminal arginylation in adult mice. We show that postnatal deletion of mouse Ate1 (its unconditional deletion is embryonic lethal causes a rapid decrease of body weight and results in early death of approximately 15% of Ate1-deficient mice. Despite being hyperphagic, the surviving Ate1-deficient mice contain little visceral fat. They also exhibit an increased metabolic rate, ectopic induction of the Ucp1 uncoupling protein in white fat, and are resistant to diet-induced obesity. In addition, Ate1-deficient mice have enlarged brains, an enhanced startle response, are strikingly hyperkinetic, and are prone to seizures and kyphosis. Ate1-deficient males are also infertile, owing to defects in Ate1(-/- spermatocytes. The remarkably broad range of specific biological processes that are shown here to be perturbed by the loss of N-terminal arginylation will make possible the dissection of regulatory circuits that involve Ate1 and either its known substrates, such as Rgs4, Rgs5 and Rgs16, or those currently unknown.

  2. Surgery for diverticular disease results in a higher hernia rate compared to colorectal cancer: a population-based study from Ontario, Canada.

    Science.gov (United States)

    Tang, E S; Robertson, D I; Whitehead, M; Xu, J; Hall, S F

    2017-11-16

    Incisional hernias are a well described complication of abdominal surgery. Previous studies identified malignancy and diverticular disease as risk factors. We compared incisional hernia rates between colon resection for colorectal cancer (CRC) and diverticular disease (DD). We performed a retrospective, population-based, matched cohort study. Provincial databases were linked through the Institute for Clinical Evaluative Sciences. These databases include all patients registered under the universal Ontario Health Insurance Plan. Patients aged 18-105 undergoing open colon resection, without ostomy formation between April 1, 2002 and March 31, 2009, were included. We excluded those with previous surgery, hernia, obstruction, and perforation. The primary outcomes were surgery for hernia repair, or diagnosis of hernia in clinic. We identified 4660 cases of DD. These were matched 2:1 by age and gender to 8933 patients with CRC for a total of 13,593. At 5 years, incisional hernias occurred in 8.3% of patients in the CRC cohort, versus 13.1% of those undergoing surgery for DD. After adjusting for important confounders (comorbidity score, wound infection, age, diabetes, prednisone and chemotherapy), hernias were still more likely in patients with DD [HR 1.58, 95% Confidence Interval (CI) 1.43-1.76, P < 0.001]. The only significant covariate was wound infection (HR 1.63, 95% CI 1.43-1.87, P < 0.001). Our study found that incisional hernias occur more commonly in patients with DD than CRC.

  3. Fast-Rate Capable Electrode Material with Higher Energy Density than LiFePO4: 4.2V LiVPO4F Synthesized by Scalable Single-Step Solid-State Reaction.

    Science.gov (United States)

    Kim, Minkyung; Lee, Seongsu; Kang, Byoungwoo

    2016-03-01

    Use of compounds that contain fluorine (F) as electrode materials in lithium ion batteries has been considered, but synthesizing single-phase samples of these compounds is a difficult task. Here, it is demonstrated that a simple scalable single-step solid-state process with additional fluorine source can obtain highly pure LiVPO 4 F. The resulting material with submicron particles achieves very high rate capability ≈100 mAh g -1 at 60 C-rate (1-min discharge) and even at 200 C-rate (18 s discharge). It retains superior capacity, ≈120 mAh g -1 at 10 C charge/10 C discharge rate (6-min) for 500 cycles with >95% retention efficiency. Furthermore, LiVPO 4 F shows low polarization even at high rates leading to higher operating potential >3.45 V (≈3.6 V at 60 C-rate), so it achieves high energy density. It is demonstrated for the first time that highly pure LiVPO 4 F can achieve high power capability comparable to LiFePO 4 and much higher energy density (≈521 Wh g -1 at 20 C-rate) than LiFePO 4 even without nanostructured particles. LiVPO 4 F can be a real substitute of LiFePO 4.

  4. Analysis of mechanism of PM2.5 and house dust mite antigen Der p1 in attack stage of child asthma.

    Science.gov (United States)

    Cheng, Q; Yang, C-Y; Guo, B-Y; Wei, X; Liu, M

    2017-05-01

    We analyzed the influence of PM2.5 and house dust mite antigen Der p1 on the treatment of child asthma attack. A total of 96 children with asthma attack were included into the study. The patients were randomly divided into the PM2.5 group, the house dust mite antigen group, the synergistic group and the control group (n= 24 in each group). The PM2.5 concentration in the PM2.5 group was twice higher than standard level (≤ the average value of PM2.5 in local air). All cases were given with same treatment, and the treatment effects were compared and analyzed. It was found that the asthma control rate in the control group was significantly higher than that in the PM2.5 group and the house dust mite antigen group, and the synergistic group was the lowest. The control time in the synergistic group was significantly longest, followed by the PM2.5 group and the house dust mite antigen group, and the control group was significantly short (pasthma attack by an inflammatory reaction and oxidative stress.

  5. Concurrent chemoradiotherapy was associated with a higher severe late toxicity rate in nasopharyngeal carcinoma patients compared with radiotherapy alone: a meta-analysis based on randomized controlled trials

    International Nuclear Information System (INIS)

    Du, Cheng-run; Ying, Hong-mei; Kong, Fang-fang; Zhai, Rui-ping; Hu, Chao-su

    2015-01-01

    To investigate the incidence and risk of severe late toxicity with concurrent chemoradiotherapy (CCRT) in nasopharyngeal carcinoma patients. Eligible studies included prospective randomized controlled trials (RCTs) evaluating CCRT versus radiotherapy alone in patients with nasopharyngeal carcinoma and in which data on severe late toxicities were available. Random effects or fixed effect models were applied to obtain the summary incidence, relative risks (RRs) and 95% confidence intervals (CIs). Five RCTs with 1102 patients with NPC were included in this analysis. The summary incidence of overall severe late toxicities in patients receiving CCRT was 30.7% (95% CI, 18–47.2%) and the incidence of radiotherapy alone group was 21.7% (95% CI, 13.3–33.4%). The use of concurrent chemotherapy was associated with an increased risk of severe late toxicities, with a RR of 1.349 (95% CI, 1.108–1.643; P = 0.005). As for specific late toxicity, CCRT significantly increased the risk of ear deafness/otitis (RR = 1.567; 95% CI, 1.192–2.052), but other late toxicities were not significantly different. Patients receiving concurrent chemotherapy regimens with 3-week high-dose cisplatin (HC) have a higher risk of ear deafness/otitis (RR = 1.672; 95% CI, 1.174–2.382; P = 0.026). However, there was no significant increase in the RR of severe ear complication with the addition of non-3-week high-dose cisplatin (nonHC) regimens (RR = 1.433; 95% CI, 0.946–2.171; P = 0.095). With the present evidence, the addition of concurrent chemotherapy seems to increase the risk of severe late toxicities in patients with NPC, especially when using HC regimen for the occurrence of severe ototoxicity

  6. Pregnant women with HIV in rural Nigeria have higher rates of antiretroviral treatment initiation, but similar loss to follow-up as non-pregnant women and men.

    Science.gov (United States)

    Aliyu, Muktar H; Blevins, Meridith; Megazzini, Karen M; Parrish, Deidra D; Audet, Carolyn M; Chan, Naomi; Odoh, Chisom; Gebi, Usman I; Muhammad, Mukhtar Y; Shepherd, Bryan E; Wester, C William; Vermund, Sten H

    2015-11-01

    We examined antiretroviral therapy (ART) initiation and retention by sex and pregnancy status in rural Nigeria. We studied HIV-infected ART-naïve patients aged ≥15 years entering care from June 2009 to September 2013. We calculated the probability of early ART initiation and cumulative incidence of loss to follow-up (LTFU) during the first year of ART, and examined the association between LTFU and sex/pregnancy using Cox regression. The cohort included 3813 ART-naïve HIV-infected adults (2594 women [68.0%], 273 [11.8%] of them pregnant). The proportion of pregnant clients initiating ART within 90 days of enrollment (78.0%, 213/273) was higher than among non-pregnant women (54.3%,1261/2321) or men (53.0%, 650/1219), both pPregnant women initiated ART sooner than non-pregnant women and men (median [IQR] days from enrollment to ART initiation for pregnant women=7 days [0-21] vs 14 days [7-49] for non-pregnant women and 14 days [7-42] for men; pPregnant women with HIV in rural Nigeria were more likely to initiate ART but were no more likely to be retained in care. Our findings underscore the importance of effective retention strategies across all patient groups, regardless of sex and pregnancy status. © The Author 2015. Published by Oxford University Press on behalf of Royal Society of Tropical Medicine and Hygiene. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  7. Are lower levels of physical activity and self-rated fitness associated with higher levels of psychological distress in Croatian young adults? A cross-sectional study

    Directory of Open Access Journals (Sweden)

    Lovro Štefan

    2018-04-01

    Full Text Available Background Although previous evidence has shown that physical activity and physical fitness lower the level of psychological distress, little is known of simultaneous associations between of physical activity and physical fitness and with psychological distress, especially in young adults. Therefore, the main purpose of the present study was to explore both separate and simultaneous association between physical activity and physical fitness with psychological distress. Methods Participants in this cross-sectional study were 2,100 university students (1,041 men and 1,059 women chosen from eight faculties in the city of Zagreb. Physical activity, physical fitness and psychological distress were assessed using structured questionnaires. The associations were examined using logistic regression analysis. Results After adjusting for gender, body-mass index, self-rated health, material status, binge drinking, chronic disease/s and sleep quality, “insufficient” physical activity (OR = 2.60; 95% CI [1.92–3.52] and “lower” levels of physical fitness (tertile 2; OR = 1.94; 95% CI [1.25–3.01] and tertile 1; OR = 2.59; 95% CI [1.65–4.08] remained associated with “high” psychological distress. When physical activity and physical fitness were entered simultaneously into the model, “insufficient” physical activity (OR = 2.35; 95% CI [1.72–3.21] and “lower” levels of physical fitness (tertile 2; OR = 1.77; 95% CI [1.24–2.77] and tertile 1; OR = 2.00; 95% CI [1.26–3.20] remained associated with “high” psychological distress. Conclusion Our study shows that both “insufficient” physical activity and “lower” levels of physical fitness are associated with “high” psychological distress, even after adjusting for numerous covariates. Therefore, special policies aiming to increase the levels of physical activity and fitness are warranted.

  8. Sequential and Parallel Attack Tree Modelling

    NARCIS (Netherlands)

    Arnold, Florian; Guck, Dennis; Kumar, Rajesh; Stoelinga, Mariëlle Ida Antoinette; Koornneef, Floor; van Gulijk, Coen

    The intricacy of socio-technical systems requires a careful planning and utilisation of security resources to ensure uninterrupted, secure and reliable services. Even though many studies have been conducted to understand and model the behaviour of a potential attacker, the detection of crucial

  9. Cooperative Electronic Attack using Unmanned Air Vehicles

    National Research Council Canada - National Science Library

    Mears, Mark J

    2006-01-01

    ... that are salient in the context of cooperative control. The utility of electronic attack is described in the context of integrated air defense systems that rely on RADAR sites that act as a network to gather information about potential airborne threats...

  10. Network overload due to massive attacks

    Science.gov (United States)

    Kornbluth, Yosef; Barach, Gilad; Tuchman, Yaakov; Kadish, Benjamin; Cwilich, Gabriel; Buldyrev, Sergey V.

    2018-05-01

    We study the cascading failure of networks due to overload, using the betweenness centrality of a node as the measure of its load following the Motter and Lai model. We study the fraction of survived nodes at the end of the cascade pf as a function of the strength of the initial attack, measured by the fraction of nodes p that survive the initial attack for different values of tolerance α in random regular and Erdös-Renyi graphs. We find the existence of a first-order phase-transition line pt(α ) on a p -α plane, such that if p pt , pf is large and the giant component of the network is still present. Exactly at pt, the function pf(p ) undergoes a first-order discontinuity. We find that the line pt(α ) ends at a critical point (pc,αc) , in which the cascading failures are replaced by a second-order percolation transition. We find analytically the average betweenness of nodes with different degrees before and after the initial attack, we investigate their roles in the cascading failures, and we find a lower bound for pt(α ) . We also study the difference between localized and random attacks.

  11. Attack Classification Schema for Smart City WSNs

    Directory of Open Access Journals (Sweden)

    Victor Garcia-Font

    2017-04-01

    Full Text Available Urban areas around the world are populating their streets with wireless sensor networks (WSNs in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  12. Adversarial Feature Selection Against Evasion Attacks.

    Science.gov (United States)

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection.

  13. Intrusion-Tolerant Replication under Attack

    Science.gov (United States)

    Kirsch, Jonathan

    2010-01-01

    Much of our critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As our dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including those…

  14. Strengthening Crypto-1 Cipher Against Algebraic Attacks

    Directory of Open Access Journals (Sweden)

    Farah Afianti

    2015-08-01

    Full Text Available In the last few years, several studies addressed the problem of data security in Mifare Classic. One of its weaknesses is the low random number quality. This causes SAT solver attacks to have lower complexity. In order to strengthen Crypto-1 against SAT solver attacks, a modification of the feedback function with better cryptographic properties is proposed. It applies a primitive polynomial companion matrix. SAT solvers cannot directly attack the feedback shift register that uses the modified Boolean feedback function, the register has to be split into smaller groups. Experimental testing showed that the amount of memory and CPU time needed were highest when attacking the modified Crypto-1 using the modified feedback function and the original filter function. In addition, another modified Crypto-1, using the modified feedback function and a modified filter function, had the lowest percentage of revealed variables. It can be concluded that the security strength and performance of the modified Crypto-1 using the modified feedback function and the modified filter function are better than those of the original Crypto-1.

  15. Wrap-Attack Pack: Product Packaging Exercise

    Science.gov (United States)

    Lee, Seung Hwan; Hoffman, K. Douglas

    2016-01-01

    Although many marketing courses discuss traditional concepts pertaining to product strategy, concepts specifically relating to packaging are often glossed over. This exercise, "Wrap-Attack Pack," teaches students about the utilitarian and hedonic design elements of packaging. More specifically, the primary objective is to creatively…

  16. Social Engineering Attack Detection Model: SEADMv2

    CSIR Research Space (South Africa)

    Mouton, F

    2015-10-01

    Full Text Available link in the security chain. A social engineering attack targets this weakness by using various manipulation techniques to elicit individuals to perform sensitive requests. The field of social engineering is still in its infancy as far as formal...

  17. Attack Classification Schema for Smart City WSNs.

    Science.gov (United States)

    Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena

    2017-04-05

    Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  18. Algebraic Side-Channel Attack on Twofish

    Directory of Open Access Journals (Sweden)

    Chujiao Ma

    2017-05-01

    Full Text Available While algebraic side-channel attack (ASCA has been successful in breaking simple cryptographic algorithms, it has never been done on larger or more complex algorithms such as Twofish. Compared to other algorithms that ASCA has been used on, Twofish is more difficult to attack due to the key-dependent S-boxes as well as the complex key scheduling. In this paper, we propose the first algebraic side-channel attack on Twofish, and examine the importance of side-channel information in getting past the key-dependent S-boxes and the complex key scheduling. The cryptographic algorithm and side-channel information are both expressed as boolean equations and a SAT solver is used to recover the key. While algebraic attack by itself is not sufficient to break the algorithm, with the help of side-channel information such as Hamming weights, we are able to correctly solve for 96 bits of the 128 bits key in under 2 hours with known plaintext/ciphertext.

  19. Armed Deterrence: Countering Soft Target Attacks

    Science.gov (United States)

    2016-02-06

    offer no security. With over 17,430 such geographically separated military sites across the United States, these fatal shootings by a Kuwaiti- born ...increasing trend and the carnage 4 that IS sympathizers can unleash. This coordinated attack on a concert hall, a soccer stadium, and restaurant

  20. 47 CFR 76.1612 - Personal attack.

    Science.gov (United States)

    2010-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND... issues of public importance, an attack is made upon the honesty, character, integrity, or like personal qualities of an identified person or group, the cable television system operator shall, within a reasonable...

  1. Rising Trend: Complex and sophisticated attack methods

    Indian Academy of Sciences (India)

    Stux, DuQu, Nitro, Luckycat, Exploit Kits, FLAME. ADSL/SoHo Router Compromise. Botnets of compromised ADSL/SoHo Routers; User Redirection via malicious DNS entry. Web Application attacks. SQL Injection, RFI etc. More and more Webshells. More utility to hackers; Increasing complexity and evading mechanisms.

  2. Strategic defense and attack for reliability systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2008-01-01

    This article illustrates a method by which arbitrarily complex series/parallel reliability systems can be analyzed. The method is illustrated with the series-parallel and parallel-series systems. Analytical expressions are determined for the investments and utilities of the defender and the attacker, depend on their unit costs of investment for each component, the contest intensity for each component, and their evaluations of the value of system functionality. For a series-parallel system, infinitely many components in parallel benefit the defender maximally regardless of the finite number of parallel subsystems in series. Conversely, infinitely many components in series benefit the attacker maximally regardless of the finite number of components in parallel in each subsystem. For a parallel-series system, the results are opposite. With equivalent components, equal unit costs for defender and attacker, equal intensity for all components, and equally many components in series and parallel, the defender always prefers the series-parallel system rather than the parallel-series system, and converse holds for the attacker. Hence from the defender's perspective, ceteris paribus, the series-parallel system is more reliable, and has fewer 'cut sets' or failure modes

  3. Validation Method of a Telecommunications Blackout Attack

    National Research Council Canada - National Science Library

    Amado, Joao; Nunes, Paulo

    2005-01-01

    ..., and to obtain the maximum disruptive effect over the services. The proposed method uses a top-down approach, starting on the service level and ending on the different network elements that can be identified in the end as the targets for the attack.

  4. Association between Terror Attacks and Suicide Attempts

    Science.gov (United States)

    Weizman, Tal; Yagil, Yaron; Schreiber, Shaul

    2009-01-01

    Based on Durkheim's "Control theory," we explored the association between frequency of terror attacks in Israel and the frequency of suicide attempts admitted to the Emergency Room of a major general hospital in Tel-Aviv (1999-2004). Analysis of the six-year study period as a whole revealed no significant correlation between the…

  5. Rising Trend: Complex and sophisticated attack methods

    Indian Academy of Sciences (India)

    Increased frequency and intensity of DoS/DDoS. Few Gbps is now normal; Anonymous VPNs being used; Botnets being used as a vehicle for launching DDoS attacks. Large scale booking of domain names. Hundred thousands of domains registered in short duration via few registrars; Single registrant; Most of the domains ...

  6. Understanding How Components of Organisations Contribute to Attacks

    DEFF Research Database (Denmark)

    Gu, Min; Aslanyan, Zaruhi; Probst, Christian W.

    2016-01-01

    Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors is diffi......Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors...... is difficult. Recently, system models have been used for automatically identifying possible attacks on the modelled organisation. The generated attacks consider all three layers, making the contribution of building infrastructure, computer infrastructure, and humans (insiders and outsiders) explicit. However......, this contribution is only visible in the attack trees as part of the performed steps; it cannot be mapped back to the model directly since the actions usually involve several elements (attacker and targeted actor or asset). Especially for large attack trees, understanding the relations between several model...

  7. An Adaptive Approach for Defending against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Muhai Li

    2010-01-01

    Full Text Available In various network attacks, the Distributed Denial-of-Service (DDoS attack is a severe threat. In order to deal with this kind of attack in time, it is necessary to establish a special type of defense system to change strategy dynamically against attacks. In this paper, we introduce an adaptive approach, which is used for defending against DDoS attacks, based on normal traffic analysis. The approach can check DDoS attacks and adaptively adjust its configurations according to the network condition and attack severity. In order to insure the common users to visit the victim server that is being attacked, we provide a nonlinear traffic control formula for the system. Our simulation test indicates that the nonlinear control approach can prevent the malicious attack packets effectively while making legitimate traffic flows arrive at the victim.

  8. Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, MAC layer attacks are considered...... the most harmful as they directly affect the available resources and thus the nodes’ energy consumption. The first endeavour of this paper is to model the activities of MAC layer security attacks to understand the flow of activities taking place when mounting the attack and when actually executing it....... The second aim of the paper is to simulate these attacks on hybrid MAC mechanisms, which shows the performance degradation of aWSN under the considered attacks. The modelling and implementation of the security attacks give an actual view of the network which can be useful in further investigating secure...

  9. Higher rates of metabolic syndrome among women taking zidovudine as compared to tenofovir in rural Africa: preliminary data from the CART-1 study.

    Science.gov (United States)

    Labhardt, Niklaus Daniel; Cheleboi, Molisana; Faturyiele, Olatunbosun; Motlatsi, Mokete M; Pfeiffer, Karolin; Lejone, Thabo Ismael; Cerutti, Bernard; Muser, Jürgen; Gupta, Ravi Shankar; Lynen, Lutgarde; Hatz, Christoph

    2014-01-01

    Due to its side effects stavudine (D4T) has been replaced by zidovudine (AZT) and tenofovir (TDF) in most low- and middle-income countries (LMICs). In 2014 about 38% of adult first-line regimens contain AZT and 62% TDF [1]. Whereas the unfavourable metabolic outcomes of D4T in comparison to TDF have been described extensively, studies from LMICs comparing metabolic profiles between patients on AZT and TDF are scarce. Given the high number of patients in LMICs still taking AZT, data on their metabolic profile are needed. We present rates of metabolic syndrome (MS) in adult patients taking either AZT- or TDF-containing first-line, non-nucleoside reverse transcriptase (NNRTI)-based regimens. Data derived from a cross-sectional multi-disease screening conducted in ten facilities in two rural districts of Lesotho, Southern Africa [2]. Patients were eligible if aged ≥25 years and on NNRTI-containing first-line ART ≥6 months. The MS definition for Africa of the International Diabetes Federation was applied [3]. Assessed potential predictors for MS were age, time on ART, virologic suppression, body-mass index (BMI), alcohol consumption, wealth quintile, NNRTI (nevirapine (NVP) or Efavirenz (EFV)), history of previous D4T exposure and ART-backbone (AZT or TDF). Statistical analyses - stratified for sex - comprised univariate logistic regression for each predictor variable with subsequent construction of a multivariate model including all predictors with an association to MS at a significance levelwomen. In women, aged ≥35 years, AZT-backbone, NVP-base, BMI ≥25kg/m2 and taking ART for ≥4.5 years were associated with MS in univariate analysis. In the multivariate model only AZT (adjusted odds-ratio: 2.2, 95% CI 1.4-3.6; p=0.001) and BMI ≥25kg/m2 (9.8; 2.8-34.1, pwomen who are on ART for ≥6 months predisposes to the development of metabolic syndrome. Given that, still 38% of first-line regimens in LMIC contain AZT, this finding needs to be verified in other

  10. [Incidence of asthmatic attack during anesthesia in patients with a history of bronchial asthma].

    Science.gov (United States)

    Nonaka, M; Sakanashi, Y; Sugahara, K; Terasaki, H

    1999-07-01

    We investigated retrospectively, the incidence of intraoperative asthmatic attack in patients with bronchial asthma, and compared the past 5-year period (Jan 1, 1979 to Dec 31, 1983) and the recent 5-year period (July 1, 1990 to June 30, 1994). The influence of anesthetic methods, induction agents, and intervals between the most recent attack and anesthesia were evaluated. The incidence of the attack during anesthesia in patients with asthma was similar in both period, 6.7% in the past and 7.8% in the recent period. Patients who had a history of recurrent attacks within 2 years prior to anesthesia tended to have higher incidence of intraoperative attack in both periods. Furthermore, the incidence of asthmatic attack was significantly greater in patients receiving inhalational anesthetics for induction of anesthesia than in those given intravenous anesthetics in the recent period. Although inhalational anesthetics are considered to be used safely for asthmatic patients, care should be taken when volatile anesthetics are administered to asthmatic patients during induction of anesthesia.

  11. Higher Education

    African Journals Online (AJOL)

    Kunle Amuwo: Higher Education Transformation: A Paradigm Shilt in South Africa? ... ty of such skills, especially at the middle management levels within the higher ... istics and virtues of differentiation and diversity. .... may be forced to close shop for lack of capacity to attract ..... necessarily lead to racial and gender equity,.

  12. A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS

    Directory of Open Access Journals (Sweden)

    S.Seetha

    2010-06-01

    Full Text Available Distributed Denial of service is a major threat to the availability of internet services. Due to the distributed, large scale nature of the Internet makes DDoS (Distributed Denial-of-Service attacks stealthy and difficult to counter. Defense against Distributed Denial- of -Service attacks is one of the hardest security problems on the Internet. Recently these network attacks have been increasing. Therefore more effective countermeasures are required to counter the threat. This requirement has motivated us to propose a novel mechanism against DDoS attack. This paper presents the design details of a distributed defense mechanism against DDoS attack. In our approach, the egress routers of the intermediate network coordinate with each other to provide the information necessary to detect and respond to the attack. Thus, a detection system based on single site will have either high positive or high negative rates. Unlike the traditional IDSs (Intrusion Detection System this method has the potential to achieve high true positive ratio. This work has been done by using consensus algorithms for exchanging the information between the detection systems. So the overall detection time would be reduced for global decision making.

  13. A Novel Multiple-Bits Collision Attack Based on Double Detection with Error-Tolerant Mechanism

    Directory of Open Access Journals (Sweden)

    Ye Yuan

    2018-01-01

    Full Text Available Side-channel collision attacks are more powerful than traditional side-channel attack without knowing the leakage model or establishing the model. Most attack strategies proposed previously need quantities of power traces with high computational complexity and are sensitive to mistakes, which restricts the attack efficiency seriously. In this paper, we propose a multiple-bits side-channel collision attack based on double distance voting detection (DDVD and also an improved version, involving the error-tolerant mechanism, which can find all 120 relations among 16 key bytes when applied to AES (Advanced Encryption Standard algorithm. In addition, we compare our collision detection method called DDVD with the Euclidean distance and the correlation-enhanced collision method under different intensity of noise, which indicates that our detection technique performs better in the circumstances of noise. Furthermore, 4-bit model of our collision detection method is proven to be optimal in theory and in practice. Meanwhile the corresponding practical attack experiments are also performed on a hardware implementation of AES-128 on FPGA board successfully. Results show that our strategy needs less computation time but more traces than LDPC method and the online time for our strategy is about 90% less than CECA and 96% less than BCA with 90% success rate.

  14. Knowledge of Signs and Symptoms of Heart Attack and Stroke among Singapore Residents

    Directory of Open Access Journals (Sweden)

    Joy Li Juan Quah

    2014-01-01

    Full Text Available Aim. To determine the level of knowledge of signs and symptoms of heart attack and stroke in Singapore resident population, in comparison to the global community. Methods. A population based, random sample of 7,840 household addresses was selected from a validated national sampling frame. Each participant was asked eight questions on signs and symptoms of heart attack and 10 questions on stroke. Results. The response rate was 65.2% with 4,192 respondents. The level of knowledge for preselected, common signs and symptoms of heart attack and stroke was 57.8% and 57.1%, respectively. The respondents scored a mean of 5.0 (SD 2.4 out of 8 for heart attack, while they scored a mean of 6.8 (SD 2.9 out of 10 for stroke. Respondents who were ≥50 years, with lower educational level, and unemployed/retired had the least knowledge about both conditions. The level of knowledge of signs and symptoms of heart attack and stroke in Singapore is comparable to USA and Canada. Conclusion. We found a comparable knowledge of stroke and heart attack signs and symptoms in the community to countries within the same economic, educational, and healthcare strata. However older persons, those with lower educational level and those who are unemployed/retired, require more public health education efforts.

  15. Recovery of human remains after shark attack.

    Science.gov (United States)

    Byard, Roger W; James, Ross A; Heath, Karen J

    2006-09-01

    Two cases of fatal shark attack are reported where the only tissues recovered were fragments of lung. Case 1: An 18-year-old male who was in the sea behind a boat was observed by friends to be taken by a great white shark (Carcharodon carcharias). The shark dragged him under the water and then, with a second shark, dismembered the body. Witnesses noted a large amount of blood and unrecognizable body parts coming to the surface. The only tissues recovered despite an intensive beach and sea search were 2 fragments of lung. Case 2: A 19-year-old male was attacked by a great white shark while diving. A witness saw the shark swim away with the victim's body in its mouth. Again, despite intensive beach and sea searches, the only tissue recovered was a single piece of lung, along with pieces of wetsuit and diving equipment. These cases indicate that the only tissue to escape being consumed or lost in fatal shark attacks, where there is a significant attack with dismemberment and disruption of the integrity of the body, may be lung. The buoyancy of aerated pulmonary tissue ensures that it rises quickly to the surface, where it may be recovered by searchers soon after the attack. Aeration of the lung would be in keeping with death from trauma rather than from drowning and may be a useful marker in unwitnessed deaths to separate ante- from postmortem injury, using only relatively small amounts of tissues. Early organ recovery enhances the identification of human tissues as the extent of morphologic alterations by putrefactive processes and sea scavengers will have been minimized. DNA testing is also possible on such recovered fragments, enabling confirmation of the identity of the victim.

  16. A Dynamic Programming Model for Internal Attack Detection in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Qiong Shi

    2017-01-01

    Full Text Available Internal attack is a crucial security problem of WSN (wireless sensor network. In this paper, we focus on the internal attack detection which is an important way to locate attacks. We propose a state transition model, based on the continuous time Markov chain (CTMC, to study the behaviors of the sensors in a WSN under internal attack. Then we conduct the internal attack detection model as the epidemiological model. In this model, we explore the detection rate as the rate of a compromised state transition to a response state. By using the Bellman equation, the utility for the state transitions of a sensor can be written in standard forms of dynamic programming. It reveals a natural way to find the optimal detection rate that is by maximizing the total utility of the compromised state of the node (the sum of current utility and future utility. In particular, we encapsulate the current state, survivability, availability, and energy consumption of the WSN into an information set. We conduct extensive experiments and the results show the effectiveness of our solutions.

  17. Development of mental health first aid guidelines for panic attacks: a Delphi study

    Directory of Open Access Journals (Sweden)

    Jorm Anthony F

    2009-08-01

    Full Text Available Abstract Background Panic attacks are common, and while they are not life-threatening events, they can lead to the development of panic disorder and agoraphobia. Appropriate help at the time that a panic attack occurs may decrease the fear associated with the attack and reduce the risk of developing an anxiety disorder. However, few people have the knowledge and skills required to assist. Simple first aid guidelines may help members of the public to offer help to people who experience panic attacks. Methods The Delphi method was used to reach consensus in a panel of experts. Experts included 50 professionals and 6 people who had experience of panic attacks and were active in mental health advocacy. Statements about how to assist someone who is having a panic attack were sourced through a systematic search of both professional and lay literature. These statements were rated for importance as first aid guidelines by the expert and consumer panels and guidelines were written using the items most consistently endorsed. Results Of 144 statements presented to the panels, 27 were accepted. These statements were used to develop the guidelines appended to this paper. Conclusion There are a number of actions which are considered to be useful for members of the public to do if they encounter someone who is having a panic attack. These guidelines will be useful in revision of curricula of mental health first aid programs. They can also be used by members of the public who want immediate information about how to assist someone who is experiencing panic attacks.

  18. Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012

    OpenAIRE

    Roy, Arnab; Venkatesh, Srinivas Vivek

    2013-01-01

    Masking is a well-known technique used to prevent block cipher implementations from side-channel attacks. Higher-order side channel attacks (e.g. higher-order DPA attack) on widely used block cipher like AES have motivated the design of efficient higher-order masking schemes. Indeed, it is known that as the masking order increases, the difficulty of side-channel attack increases exponentially. However, the main problem in higher-order masking is to design an efficient and secure technique for...

  19. Transforming Graphical System Models to Graphical Attack Models

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2016-01-01

    Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations...... approach to transforming graphical system models to graphical attack models in the form of attack trees. Based on an asset in the model, our transformations result in an attack tree that represents attacks by all possible actors in the model, after which the actor in question has obtained the asset....

  20. New attacks on Wi-Fi Protected Setup

    OpenAIRE

    Hamed Mohtadi; Alireza Rahimi

    2015-01-01

    Wi-Fi Protected Setup (WPS) is a network security standard that is used to secure networks in home and office, introduced in 2006 by the Wi-Fi Alliance. It provides easier configuration setup and is used in almost all recent Wi-Fi devices. In this paper we propose two attacks on this standard. The first attack is an offline brute force attack that uses imbalance on registration protocol. This attack needs user action, but it is more efficient than previous attacks. The second attack uses weak...

  1. Robustness of Dengue Complex Network under Targeted versus Random Attack

    Directory of Open Access Journals (Sweden)

    Hafiz Abid Mahmood Malik

    2017-01-01

    Full Text Available Dengue virus infection is one of those epidemic diseases that require much consideration in order to save the humankind from its unsafe impacts. According to the World Health Organization (WHO, 3.6 billion individuals are at risk because of the dengue virus sickness. Researchers are striving to comprehend the dengue threat. This study is a little commitment to those endeavors. To observe the robustness of the dengue network, we uprooted the links between nodes randomly and targeted by utilizing different centrality measures. The outcomes demonstrated that 5% targeted attack is equivalent to the result of 65% random assault, which showed the topology of this complex network validated a scale-free network instead of random network. Four centrality measures (Degree, Closeness, Betweenness, and Eigenvector have been ascertained to look for focal hubs. It has been observed through the results in this study that robustness of a node and links depends on topology of the network. The dengue epidemic network presented robust behaviour under random attack, and this network turned out to be more vulnerable when the hubs of higher degree have higher probability to fail. Moreover, representation of this network has been projected, and hub removal impact has been shown on the real map of Gombak (Malaysia.

  2. 1994 Attack Team Workshop: Phase II - Full-Scale Offensive Fog Attack Tests

    National Research Council Canada - National Science Library

    Scheffey, Joseph

    1997-01-01

    .... This report demonstrates the benefits of using a medium angle fog stream to control the overhead fire threat when conducting a direct attack on a growing/steady state fire where the sea of the fire is obstructed...

  3. Dead or Alive? Factors Affecting the Survival of Victims during Attacks by Saltwater Crocodiles (Crocodylus porosus) in Australia.

    Science.gov (United States)

    Fukuda, Yusuke; Manolis, Charlie; Saalfeld, Keith; Zuur, Alain

    2015-01-01

    Conflicts between humans and crocodilians are a widespread conservation challenge and the number of crocodile attacks is increasing worldwide. We identified the factors that most effectively decide whether a victim is injured or killed in a crocodile attack by fitting generalized linear models to a 42-year dataset of 87 attacks (27 fatal and 60 non-fatal) by saltwater crocodiles (Crocodylus porosus) in Australia. The models showed that the most influential factors were the difference in body mass between crocodile and victim, and the position of victim in relation to the water at the time of an attack. In-water position (for diving, swimming, and wading) had a higher risk than on-water (boating) or on-land (fishing, and hunting near the water's edge) positions. In the in-water position a 75 kg person would have a relatively high probability of survival (0.81) if attacked by a 300 cm crocodile, but the probability becomes much lower (0.17) with a 400 cm crocodile. If attacked by a crocodile larger than 450 cm, the survival probability would be extremely low (drag a victim more easily into deeper water. A higher risk associated with a larger crocodile in relation to victim's size is highlighted by children's vulnerability to fatal attacks. Since the first recently recorded fatal attack involving a child in 2006, six out of nine fatal attacks (66.7%) involved children, and the average body size of crocodiles responsible for these fatal attacks was considerably smaller (384 cm, 223 kg) than that of crocodiles that killed adults (450 cm, 324 kg) during the same period (2006-2014). These results suggest that culling programs targeting larger crocodiles may not be an effective management option to improve safety for children.

  4. Higher Education

    Science.gov (United States)

    & Development (LDRD) National Security Education Center (NSEC) Office of Science Programs Richard P Databases National Security Education Center (NSEC) Center for Nonlinear Studies Engineering Institute Scholarships STEM Education Programs Teachers (K-12) Students (K-12) Higher Education Regional Education

  5. CpG Oligonucleotide and Interleukin 2 stimulation enables higher cytogenetic abnormality detection rates than 12-o-tetradecanolyphorbol-13-acetate in Asian patients with B-cell chronic lymphocytic leukemia (B-CLL).

    Science.gov (United States)

    Liaw, Fiona Pui San; Lau, Lai Ching; Lim, Alvin Soon Tiong; Lim, Tse Hui; Lee, Geok Yee; Tien, Sim Leng

    2014-12-01

    The present study was designed to compare abnormality detection rates using DSP30 + IL2 and 12-O-Tetradecanoylphorbol-13-acetate (TPA) in Asian patients with B-CLL. Hematological specimens from 47 patients (29 newly diagnosed, 18 relapsed) were established as 72 h-DSP30 + IL2 and TPA cultures. Standard methods were employed to identify clonal aberrations by conventional cytogenetics (CC). The B-CLL fluorescence in situ hybridization (FISH) panel comprised ATM, CEP12, D13S25, and TP53 probes. DSP30 + IL2 cultures had a higher chromosomal abnormality detection rate (67 %) compared to TPA (44 %, p 0.05). Thirteen cases with abnormalities were found exclusively in DSP30 + IL2 cultures compared to one found solely in TPA cultures. DSP30 + IL2 cultures were comparable to the FISH panel in detecting 11q-, +12 and 17p- but not 13q-. It also has a predilection for 11q- bearing leukemic cells compared to TPA. FISH had a higher abnormality detection rate (84.1 %) compared to CC (66.0 %) with borderline significance (p = 0.051), albeit limited by its coverage. In conclusion, DSP30 + IL2 showed a higher abnormality detection rate. However, FISH is indispensable to circumvent low mitotic indices and detect subtle abnormalities.

  6. A Framework for Attack-Resilient Industrial Control Systems : Attack Detection and Controller Reconfiguration

    OpenAIRE

    Paridari, Kaveh; O'Mahony, Niamh; Mady, Alie El-Din; Chabukswar, Rohan; Boubekeur, Menouer; Sandberg, Henrik

    2017-01-01

    Most existing industrial control systems (ICSs), such as building energy management systems (EMSs), were installed when potential security threats were only physical. With advances in connectivity, ICSs are now, typically, connected to communications networks and, as a result, can be accessed remotely. This extends the attack surface to include the potential for sophisticated cyber attacks, which can adversely impact ICS operation, resulting in service interruption, equipment damage, safety c...

  7. Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?

    Directory of Open Access Journals (Sweden)

    Ines Goicoechea-Telleria

    2018-01-01

    Full Text Available The use of biometrics keeps growing. Every day, we use biometric recognition to unlock our phones or to have access to places such as the gym or the office, so we rely on the security manufacturers offer when protecting our privileges and private life. It is well known that it is possible to hack into a fingerprint sensor using fake fingers made of Play-Doh and other easy-to-obtain materials but to what extent? Is this true for all users or only for specialists with a deep knowledge on biometrics? Are smartphone fingerprint sensors as reliable as desktop sensors? To answer these questions, we performed 3 separate evaluations. First, we evaluated 4 desktop fingerprint sensors of different technologies by attacking them with 7 different fake finger materials. All of them were successfully attacked by an experienced attacker. Secondly, we carried out a similar test on 5 smartphones with embedded sensors using the most successful materials, which also hacked the 5 sensors. Lastly, we gathered 15 simulated attackers with no background in biometrics to create fake fingers of several materials, and they had one week to attack the fingerprint sensors of the same 5 smartphones, with the starting point of a short video with the techniques to create them. All 5 smartphones were successfully attacked by an inexperienced attacker. This paper will provide the results achieved, as well as an analysis on the attack potential of every case. All results are given following the metrics of the standard ISO/IEC 30107-3.

  8. Treatment of moderate acute malnutrition with ready-to-use supplementary food results in higher overall recovery rates compared with a corn-soya blend in children in southern Ethiopia: an operations research trial.

    Science.gov (United States)

    Karakochuk, Crystal; van den Briel, Tina; Stephens, Derek; Zlotkin, Stanley

    2012-10-01

    Moderate and severe acute malnutrition affects 13% of children malnutrition affects fewer children but is associated with higher rates of mortality and morbidity. Supplementary feeding programs aim to treat moderate acute malnutrition and prevent the deterioration to severe acute malnutrition. The aim was to compare recovery rates of children with moderate acute malnutrition in supplementary feeding programs by using the newly recommended ration of ready-to-use supplementary food (RUSF) and the more conventional ration of corn-soya blend (CSB) in Ethiopia. A total of 1125 children aged 6-60 mo with moderate acute malnutrition received 16 wk of CSB or RUSF. Children were randomly assigned to receive one or the other food. The daily rations were purposely based on the conventional treatment rations distributed at the time of the study in Ethiopia: 300 g CSB and 32 g vegetable oil in the control group (1413 kcal) and 92 g RUSF in the intervention group (500 kcal). The higher ration size of CSB was provided because of expected food sharing. The HR for children in the CSB group was 0.85 (95% CI: 0.73, 0.99), which indicated that they had 15% lower recovery (P = 0.039). Recovery rates of children at the end of the 16-wk treatment period trended higher in the RUSF group (73%) than in the CSB group (67%) (P = 0.056). In comparison with CSB, the treatment of moderate acute malnutrition with RUSF resulted in higher recovery rates in children, despite the large ration size and higher energy content of the conventional CSB ration.

  9. High level of Brazilian men´s volleyball: characterization and difference of predictive factors of back row attack

    Directory of Open Access Journals (Sweden)

    Gustavo de Conti Teixeira Costa Conti

    2018-05-01

    Full Text Available This study aimed to identify the predictive factors of attacks, performed from positions 1 and 6 according to the effect of reception in high level Brazilian male volleyball and to find the predictive factors that differentiate the game practiced from these positions. The sample consisted in the observation of 142 games of the Brazilian Men's Super League, totalling 2969 actions of reception, setting and attack from positions 1 and 6. The significance value adopted was 5% (p ≤ 0.05. The analysis of the predictive factors of the game performed by the attacker of position 1 showed greater chances to score after an excellent (odds ratio adjusted – ORA = 1.48 and moderate effect of reception (ORA = 1.31, the second attack tempo (ORA = 1.32, the powerful attack in parallel (ORA = 1.91 and in diagonal (ORA =3.44. The attacker of position 6 showed higher chances of scoring after a high effect of reception (ORA = 3.39 and powerful attack in the parallel (ORA = 1.53. In conclusion, regardless the effect of reception, the use of the back-row attackers is recommended to increase the uncertainty on the opposing team and the chances to score.

  10. Ataques de nervios: culturally bound and distinct from panic attacks?

    Science.gov (United States)

    Keough, Meghan E; Timpano, Kiara R; Schmidt, Norman B

    2009-01-01

    The Diagnostic and Statistical Manual of Mental Disorders [DSM-IV-TR; American Psychiatric Association [APA], 2000) has emphasized the importance of understanding psychopathology within a cultural framework by including culture-bound syndromes within its appendices. These syndromes are proposed to be bound to certain cultures and distinct from other psychological disorders. Included among the syndromes are ataques de nervios (ADN), which are reported to be bound to the Hispanic culture and closely resemble panic attacks. However, the cultural distinctiveness and phenomenology of ADN has not been adequately investigated. The current study employed an ethnically diverse study sample (N=342) of undergraduates. Participants completed a number of measures that assessed acculturation, syndrome and anxiety risk factors. In contrast to the DSM-IV's conceptualization of ADN, the rate of ADN did not significantly vary across the three main groups (African American, Caucasian, and Hispanic participants) nor did it vary based on acculturation. More consistent with the DSM-IV, the symptom comparisons indicated some differentiation between ADN and panic attacks. The present report provides data indicating that ADNs, as described by the DSM-IV, are not unique to the Hispanic culture and are experienced by non-Hispanic individuals at similar rates to Hispanic-endorsement. The findings are consistent with the DSM-IV assertion that ADNs and PAs are distinct syndromes. (c) 2008 Wiley-Liss, Inc.

  11. Optimal attacks on qubit-based Quantum Key Recycling

    Science.gov (United States)

    Leermakers, Daan; Škorić, Boris

    2018-03-01

    Quantum Key Recycling (QKR) is a quantum cryptographic primitive that allows one to reuse keys in an unconditionally secure way. By removing the need to repeatedly generate new keys, it improves communication efficiency. Škorić and de Vries recently proposed a QKR scheme based on 8-state encoding (four bases). It does not require quantum computers for encryption/decryption but only single-qubit operations. We provide a missing ingredient in the security analysis of this scheme in the case of noisy channels: accurate upper bounds on the required amount of privacy amplification. We determine optimal attacks against the message and against the key, for 8-state encoding as well as 4-state and 6-state conjugate coding. We provide results in terms of min-entropy loss as well as accessible (Shannon) information. We show that the Shannon entropy analysis for 8-state encoding reduces to the analysis of quantum key distribution, whereas 4-state and 6-state suffer from additional leaks that make them less effective. From the optimal attacks we compute the required amount of privacy amplification and hence the achievable communication rate (useful information per qubit) of qubit-based QKR. Overall, 8-state encoding yields the highest communication rates.

  12. Numerical simulation of the optimal two-mode attacks for two-way continuous-variable quantum cryptography in reverse reconciliation

    International Nuclear Information System (INIS)

    Zhang, Yichen; Zhao, Yijia; Yu, Song; Li, Zhengyu; Guo, Hong

    2017-01-01

    We analyze the security of the two-way continuous-variable quantum key distribution protocol in reverse reconciliation against general two-mode attacks, which represent all accessible attacks at fixed channel parameters. Rather than against one specific attack model, the expression of secret key rates of the two-way protocol are derived against all accessible attack models. It is found that there is an optimal two-mode attack to minimize the performance of the protocol in terms of both secret key rates and maximal transmission distances. We identify the optimal two-mode attack, give the specific attack model of the optimal two-mode attack and show the performance of the two-way protocol against the optimal two-mode attack. Even under the optimal two-mode attack, the performances of two-way protocol are still better than the corresponding one-way protocol, which shows the advantage of making double use of the quantum channel and the potential of long-distance secure communication using a two-way protocol. (paper)

  13. Defense and attack of complex and dependent systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2010-01-01

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  14. Defense and attack of complex and dependent systems

    Energy Technology Data Exchange (ETDEWEB)

    Hausken, Kjell, E-mail: kjell.hausken@uis.n [Faculty of Social Sciences, University of Stavanger, N-4036 Stavanger (Norway)

    2010-01-15

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  15. A Novel Protective Framework for Defeating HTTP-Based Denial of Service and Distributed Denial of Service Attacks

    Directory of Open Access Journals (Sweden)

    Mohammed A. Saleh

    2015-01-01

    Full Text Available The growth of web technology has brought convenience to our life, since it has become the most important communication channel. However, now this merit is threatened by complicated network-based attacks, such as denial of service (DoS and distributed denial of service (DDoS attacks. Despite many researchers’ efforts, no optimal solution that addresses all sorts of HTTP DoS/DDoS attacks is on offer. Therefore, this research aims to fix this gap by designing an alternative solution called a flexible, collaborative, multilayer, DDoS prevention framework (FCMDPF. The innovative design of the FCMDPF framework handles all aspects of HTTP-based DoS/DDoS attacks through the following three subsequent framework’s schemes (layers. Firstly, an outer blocking (OB scheme blocks attacking IP source if it is listed on the black list table. Secondly, the service traceback oriented architecture (STBOA scheme is to validate whether the incoming request is launched by a human or by an automated tool. Then, it traces back the true attacking IP source. Thirdly, the flexible advanced entropy based (FAEB scheme is to eliminate high rate DDoS (HR-DDoS and flash crowd (FC attacks. Compared to the previous researches, our framework’s design provides an efficient protection for web applications against all sorts of DoS/DDoS attacks.

  16. A UNIFIED APPROACH FOR DETECTION AND PREVENTION OF DDOS ATTACKS USING ENHANCED SUPPORT VECTOR MACHINES AND FILTERING MECHANISMS

    Directory of Open Access Journals (Sweden)

    T. Subbulakshmi

    2014-10-01

    Full Text Available Distributed Denial of Service (DDoS attacks were considered to be a tremendous threat to the current information security infrastructure. During DDoS attack, multiple malicious hosts that are recruited by the attackers launch a coordinated attack against one host or a network victim, which cause denial of service to legitimate users. The existing techniques suffer from more number of false alarms and more human intervention for attack detection. The objective of this paper is to monitor the network online which automatically initiates detection mechanism if there is any suspicious activity and also defense the hosts from being arrived at the network. Both spoofed and non spoofed IP’s are detected in this approach. Non spoofed IP’s are detected using Enhanced Support Vector Machines (ESVM and spoofed IP’s are detected using Hop Count Filtering (HCF mechanism. The detected IP’s are maintained separately to initiate the defense process. The attack strength is calculated using Lanchester Law which initiates the defense mechanism. Based on the calculated attack strength any of the defense schemes such as Rate based limiting or History based IP filtering is automatically initiated to drop the packets from the suspected IP. The integrated online monitoring approach for detection and defense of DDoS attacks is deployed in an experimental testbed. The online approach is found to be obvious in the field of integrated DDoS detection and defense.

  17. A systematic review of re-identification attacks on health data.

    Science.gov (United States)

    El Emam, Khaled; Jonker, Elizabeth; Arbuckle, Luk; Malin, Bradley

    2011-01-01

    Privacy legislation in most jurisdictions allows the disclosure of health data for secondary purposes without patient consent if it is de-identified. Some recent articles in the medical, legal, and computer science literature have argued that de-identification methods do not provide sufficient protection because they are easy to reverse. Should this be the case, it would have significant and important implications on how health information is disclosed, including: (a) potentially limiting its availability for secondary purposes such as research, and (b) resulting in more identifiable health information being disclosed. Our objectives in this systematic review were to: (a) characterize known re-identification attacks on health data and contrast that to re-identification attacks on other kinds of data, (b) compute the overall proportion of records that have been correctly re-identified in these attacks, and (c) assess whether these demonstrate weaknesses in current de-identification methods. Searches were conducted in IEEE Xplore, ACM Digital Library, and PubMed. After screening, fourteen eligible articles representing distinct attacks were identified. On average, approximately a quarter of the records were re-identified across all studies (0.26 with 95% CI 0.046-0.478) and 0.34 for attacks on health data (95% CI 0-0.744). There was considerable uncertainty around the proportions as evidenced by the wide confidence intervals, and the mean proportion of records re-identified was sensitive to unpublished studies. Two of fourteen attacks were performed with data that was de-identified using existing standards. Only one of these attacks was on health data, which resulted in a success rate of 0.00013. The current evidence shows a high re-identification rate but is dominated by small-scale studies on data that was not de-identified according to existing standards. This evidence is insufficient to draw conclusions about the efficacy of de-identification methods.

  18. A systematic review of re-identification attacks on health data.

    Directory of Open Access Journals (Sweden)

    Khaled El Emam

    Full Text Available Privacy legislation in most jurisdictions allows the disclosure of health data for secondary purposes without patient consent if it is de-identified. Some recent articles in the medical, legal, and computer science literature have argued that de-identification methods do not provide sufficient protection because they are easy to reverse. Should this be the case, it would have significant and important implications on how health information is disclosed, including: (a potentially limiting its availability for secondary purposes such as research, and (b resulting in more identifiable health information being disclosed. Our objectives in this systematic review were to: (a characterize known re-identification attacks on health data and contrast that to re-identification attacks on other kinds of data, (b compute the overall proportion of records that have been correctly re-identified in these attacks, and (c assess whether these demonstrate weaknesses in current de-identification methods.Searches were conducted in IEEE Xplore, ACM Digital Library, and PubMed. After screening, fourteen eligible articles representing distinct attacks were identified. On average, approximately a quarter of the records were re-identified across all studies (0.26 with 95% CI 0.046-0.478 and 0.34 for attacks on health data (95% CI 0-0.744. There was considerable uncertainty around the proportions as evidenced by the wide confidence intervals, and the mean proportion of records re-identified was sensitive to unpublished studies. Two of fourteen attacks were performed with data that was de-identified using existing standards. Only one of these attacks was on health data, which resulted in a success rate of 0.00013.The current evidence shows a high re-identification rate but is dominated by small-scale studies on data that was not de-identified according to existing standards. This evidence is insufficient to draw conclusions about the efficacy of de-identification methods.

  19. Encounter rates and swimming behavior of pause-travel and cruise larval fish predators in calm and turbulent laboratory environments

    DEFF Research Database (Denmark)

    MacKenzie, Brian; Kiørboe, Thomas

    1995-01-01

    measure of prey encounter rate in unsatiated larvae) were significantly higher in turbulent than in calm water at low food abundances for two size groups of cod. The difference in cod attack position rate between calm and turbulent water was much less when prey was more abundant. Attack position rates...... of herring larvae were higher in turbulent water than in calm water, but the difference was not significant. Interspecific differences in swimming and pausing behavior were related to differences in prey search strategy used by the two species (cod: pause-travel; herring: cruise). We used a newly developed...... search model for pause-travel predators in calm and turbulent environments to compare encounter rates for predators using cruise and pause-travel search strategies. Encounter rates for cod and herring larvae, estimated with respective search models, were similar in calm and low turbulence water; at high...

  20. Oral Presentations Have a Significantly Higher Publication Rate, But Not Impact Factors, Than Poster Presentations at the International Society for Study of Lumbar Spine meeting: Review of 1126 Abstracts From 2010 to 2012 Meetings.

    Science.gov (United States)

    Ohtori, Seiji; Orita, Sumihisa; Eguchi, Yawara; Aoki, Yasuchika; Suzuki, Miyako; Kubota, Gou; Inage, Kazuhide; Shiga, Yasuhiro; Abe, Koki; Kinoshita, Hideyuki; Inoue, Masahiro; Kanamoto, Hirohito; Norimoto, Masaki; Umimura, Tomotaka; Furuya, Takeo; Masao, Koda; Maki, Satoshi; Akazawa, Tsutomu; Takahashi, Kazuhisa

    2018-03-05

    A retrospective study. The aim of this study was to determine the publication rate and impact factors (IFs) among all abstracts presented at the 2010 and 2012 meetings of the International Society for the Study of Lumbar Spine (ISSLS). The publication rate of abstracts presented at overseas meetings was reported to be around 50%. However, the publication rate and IFs of oral and poster presentations made at ISSLS meetings were unclear. Moreover, whether the publication rates and IFs differed for papers associated with oral or poster presentations at ISSLS meetings was unknown. We investigated all 1126 abstracts (oral, special posters, general posters) presented at ISSLS meetings held between 2010 and 2012. PubMed was searched to identify publications and IFs were determined using journal citation reports. We also compared the publication rates and IFs between oral and poster presentations. The overall publication rate was 50.1% for three ISSLS meetings (564 publications/1126 abstracts). The overall publication rate for oral presentations, special posters, and general posters given in the 2010 to 2012 meetings was 62.0%, 48.3, and 46.6%, respectively. Overall, papers related to oral presentations had significantly higher publication rates than those of special and general posters (P = 0.0002). The average IFs of publications associated with abstracts presented at three ISSLS meetings was 2.802 for oral presentations, 2.593 for special posters, and 2.589 for general posters. There were no significant differences in average IFs between oral and poster presentations (P > 0.05). The publication rate for abstracts presented at ISSLS meetings was high and similar to publication rates for abstracts presented at other meetings concerning orthopedic and spine research. However, there was no significant difference in IFs between oral and poster presentations, suggesting that abstract evaluations cannot predict IFs of the eventual publication. 4.