WorldWideScience

Sample records for hypothetical anthrax attack

  1. Anthrax

    Science.gov (United States)

    2017-06-30

    capsule and toxins. Hemorrhagic edema and necrosis of mediastinal lymph nodes ensue. Alveoli show a hemorrhagic exudate and only rarely bacilli...follow cutaneous anthrax and, almost invariably, accompanies inhalational and gastrointestinal anthrax. Vascular injury may result from the proliferation

  2. Anthrax

    Science.gov (United States)

    ... it's most commonly seen in grazing animals like sheep, pigs, cattle, horses, and goats, anthrax also can ... at first, but it rapidly turns into severe pneumonia and requires hospitalization. It usually takes fewer than ...

  3. Anthrax

    Science.gov (United States)

    ... site may get infected. Exams and Tests The health care provider will perform a physical examination. The tests to diagnose anthrax depend on the type of disease that is suspected. A culture of the skin, and sometimes a biopsy , are ...

  4. About a hypothetical terrorist attack on a nuclear power plant

    International Nuclear Information System (INIS)

    2001-10-01

    After the terrorism attack on the World Trade Center, a record number ( two thirds) of US citizens favour the use of nuclear energy and consider nuclear plants to be safe. At the same time 59% definitely support building more nuclear plants, less than in March during the Californian crisis, but more than earlier., Most american citizens ( 84%) continue to support licence renewal for nuclear plants and 72 % agree with keeping the option open to build new nuclear plants in the future. The strongest supporters are those who have visited a nuclear plant or information centre. (N.C.)

  5. Anthrax Remembered

    Centers for Disease Control (CDC) Podcasts

    2015-08-03

    Dr. John Jernigan and Dr. D. Peter Drotman recall the 2001 anthrax attacks and rapid publication of the landmark paper reporting the initial cases of inhalational anthrax.  Created: 8/3/2015 by National Center for Emerging and Zoonotic Infectious Diseases (NCEZID).   Date Released: 8/3/2015.

  6. Facilitation of risk communication during the anthrax attacks of 2001: the organizational backstory.

    Science.gov (United States)

    Chess, Caron; Clarke, Lee

    2007-09-01

    The anthrax attacks of 2001 created risk communication problems that cannot be fully understood without appreciating the dynamics among organizations. Case studies of communication in New Jersey, consisting of interviews with a range of participants, found that existing organizational and professional networks facilitated trust among decisionmakers. This interpersonal trust improved communication among agencies and thereby risk communication with the public. For example, "white powder scares" were a problem even in places without contamination. Professionals' trust in each other was vital for responding productively. Conversely, organizational challenges, including conflict among agencies, hindered communication with key audiences. Although centralization and increased control are often seen as the remedy for communicative confusion, they also can quash the improvisational responses needed during crises.

  7. Planning guidance for emergency response to a hypothetical nuclear attack on Riyadh, Saudi Arabia

    Science.gov (United States)

    Shubayr, Nasser Ali M.

    The threat of nuclear attack will remain imminent in an ever-advancing society. Saudi Arabia is not immune to this threat. This dissertation establishes planning guidance for response to a nuclear attack on Riyadh, the capital of Saudi Arabia, based on a hypothetical scenario of a nuclear detonation. A case scenario of a one-megaton thermonuclear bomb detonated at ground level over Riyadh is used to support the thesis. Previous nuclear tests and the Hiroshima and Nagasaki bombings have been used to present possible effects on Riyadh. US planning guidance and lessons learned from the Chernobyl and Fukushima nuclear plants accidents have been used to develop the emergency response guidance. The planning guidance outlines a rapid response to the nuclear detonation. Four damage zones have been identified; severe damage zone, moderate damage zone, light damage zone and dangerous fallout zone. Actions that are recommended, and those that should be avoided, have been determined for each zone. Shelter/ evacuation evaluation for blast-affected and fallout-affected areas is the basis for the recommendation that shelter in place is the best decision for the first hours to days after the attack. Guidelines for medical care response and population monitoring and decontamination are included to reduce the early and long-term effects of the attack. Recommendations to the Saudi Arabian authorities have been made to facilitate suitable preparedness and response for such an event.

  8. Anthrax in America: A Chronology and Analysis of the Fall 2001 Attacks

    Science.gov (United States)

    2002-11-01

    Glenville, CT, 55 miles west of Oxford. • Officials confirm that the anthrax spores in a letter received by Santiago, Chile pediatrician Antonio Barfi were...process of opening the Leahy letter after two weeks of planning and rehearsals. In charge is John Ezzell , a man described by the Weekend Australian as

  9. Addressing the Federal-State-Local Interface Issues During a Catastrophic Event Such as an Anthrax Attack

    Energy Technology Data Exchange (ETDEWEB)

    Stein, Steven L.; Lesperance, Ann M.; Upton, Jaki F.

    2010-02-01

    On October 9, 2008, federal, state and local policy makers, emergency managers, and medical and public health officials convened in Seattle, Washington, for a workshop on Addressing the Federal-State-Local Interface Issues During a Catastrophic Event Such as an Anthrax Attack. The day-long symposium was aimed at generating a dialogue about recovery and restoration through a discussion of the associated challenges that impact entire communities, including people, infrastructure, and critical systems. The Principal Federal Official (PFO) provided an overview of the role of the PFO in a catastrophic event. A high-level summary of an anthrax scenario was presented. The remainder of the day was focused on interactive discussions among federal, state and local emergency management experts in the areas of: • Decision-making, prioritization, and command and control • Public health/medical services • Community resiliency and continuity of government. Key topics and issues that resulted from discussions included: • Local representation in the Joint Field Office (JFO) • JFO transition to the Long-Term Recovery Office • Process for prioritization of needs • Process for regional coordination • Prioritization - process and federal/military intervention • Allocation of limited resources • Re-entry decision and consistency • Importance of maintaining a healthy hospital system • Need for a process to establish a consensus on when it is safe to re-enter. This needs to be across all jurisdictions including the military. • Insurance coverage for both private businesses and individuals • Interaction between the government and industry. The symposium was sponsored by the Interagency Biological Restoration Demonstration, a collaborative regional program jointly funded by the U.S. Department of Homeland Security and the U.S. Department of Defense. To aid the program’s efforts and inform the development of blueprint for recovery from a biological incident

  10. Anthrax: Diagnosis

    Science.gov (United States)

    ... Diagnosis Language: English (US) Español (Spanish) Recommend on Facebook Tweet Share Compartir Doctors in the United States rarely see a patient with anthrax. CDC Guidance and case definitions are available to help doctors diagnose anthrax, take ...

  11. Screen-printed fluorescent sensors for rapid and sensitive anthrax biomarker detection

    International Nuclear Information System (INIS)

    Lee, Inkyu; Oh, Wan-Kyu; Jang, Jyongsik

    2013-01-01

    Highlights: •We fabricated flexible anthrax sensors with a simple screen-printing method. •The sensors selectively detected B. anthracis biomarker. •The sensors provide the visible alarm against anthrax attack. -- Abstract: Since the 2001 anthrax attacks, efforts have focused on the development of an anthrax detector with rapid response and high selectivity and sensitivity. Here, we demonstrate a fluorescence sensor for detecting anthrax biomarker with high sensitivity and selectivity using a screen-printing method. A lanthanide–ethylenediamine tetraacetic acid complex was printed on a flexible polyethersulfone film. Screen-printing deposition of fluorescent detecting moieties produced fluorescent patterns that acted as a visual alarm against anthrax

  12. Anthrax blood test

    Science.gov (United States)

    Anthrax serology test; Antibody test for anthrax; Serologic test for B. anthracis ... This test may be performed when the health care provider suspects you have anthrax infection. The bacteria that cause ...

  13. Vaccines and bioterrorism: smallpox and anthrax.

    Science.gov (United States)

    Kimmel, Sanford R; Mahoney, Martin C; Zimmerman, Richard K

    2003-01-01

    Because of the success of vaccination and the ring strategy in eradicating smallpox from the world, smallpox vaccine has not been recommended for the United States civilian populations for decades. Given the low but possible threat of bioterrorism, smallpox vaccination is now recommended for those teams investigating potential smallpox cases and for selected personnel of acute-care hospitals who would be needed to care for victims in the event of a terrorist attack. Treatment and post-exposure prophylaxis for anthrax are ciprofloxacin or doxycycline. Anthrax vaccine alone is not effective for post-exposure prevention of anthrax; vaccination is accompanied by 60 days of antibiotic therapy. In addition to military use, anthrax vaccine is recommended for pre-exposure use in those persons whose work involves repeated exposure to Bacillus anthracis spores.

  14. Defining Moments in MMWR History: CDC's Response to Intentional Release of Anthrax - 2001

    Centers for Disease Control (CDC) Podcasts

    On October 4, 2001, shortly after the September 11 attacks in New York City and Washington, DC, the Palm Beach County Health Department, the Florida State Department of Health, and CDC reported a case of anthrax in a 63-year-old man from Florida. This case was first reported in MMWR and marked the beginning of a series of anthrax cases that resulted from intentional delivery of Bacillus anthracis spores sent through the mail. In this podcast, Dr. Sherif Zaki recalls CDC's investigation and response to the anthrax attacks.

  15. Anthrax of the eyelids.

    Science.gov (United States)

    Amraoui, A.; Tabbara, K. F.; Zaghloul, K.

    1992-01-01

    Anthrax is a disease caused by Bacillus anthracis. The disease affects primarily herbivores including sheep, cattle, horses, and other domestic animals. Humans may rarely be affected. We examined one male and two female patients with a localised itchy erythematous papule of the eyelid. A necrotising ulcer formed in each of the three cases resulting in a black lesion. Scraping in each case showed Gram positive rods and culture grew Bacillus anthracis. All three patients responded to the intravenous administration of penicillin G, and the lesion resolved leaving scars in two cases. Anthrax is a rare disease but should be considered in the differential diagnosis of ulcers or pustules of the eyelids. Images PMID:1486081

  16. Defining Moments in MMWR History: CDC’s Response to Intentional Release of Anthrax - 2001

    Centers for Disease Control (CDC) Podcasts

    2017-10-12

    On October 4, 2001, shortly after the September 11 attacks in New York City and Washington, DC, the Palm Beach County Health Department, the Florida State Department of Health, and CDC reported a case of anthrax in a 63-year-old man from Florida. This case was first reported in MMWR and marked the beginning of a series of anthrax cases that resulted from intentional delivery of Bacillus anthracis spores sent through the mail. In this podcast, Dr. Sherif Zaki recalls CDC’s investigation and response to the anthrax attacks.  Created: 10/12/2017 by MMWR.   Date Released: 10/12/2017.

  17. [Anthrax due to deliberate infection

    NARCIS (Netherlands)

    Dissel, J.T. van; Kullberg, B.J.; Berg, P.C. van den; Steenbergen, J.E. van

    2001-01-01

    Anthrax is a zoonosis which is particularly prevalent in cattle, goats and sheep and is caused by Bacillus anthracis, a Gram-positive spore forming aerobic microorganism. The endospores can survive outside of the body for many decades. The natural form of anthrax has a cutaneous, pulmonary and

  18. Non-Replicating Adenovirus-Vectored Anthrax Vaccine

    International Nuclear Information System (INIS)

    Van Kampen, K. R.; Zhang, J.; Jex, E.; Tang, D. C.

    2007-01-01

    As bioterrorism is emerging as a national threat, it is urgent to develop a new generation of anthrax vaccines that can be rapidly produced and mass administered in an emergency setting. We have demonstrated that protective immunity against anthrax spores could be elicited in mice by intranasal administration of a non-replicating human adenovirus serotype 5 (Ad5)-derived vector encoding Bacillus anthracis protective antigen (PA) in a single-dose regimen. The potency of an Ad5 vector encoding PA was remarkably enhanced by codon optimization of the PA gene to match the tRNA pool found in human cells. This nasal vaccine can be mass-administered by non-medical personnel during a bioterrorist attack. In addition, replication-competent adenovirus (RCA)-free Ad5-vectored anthrax vaccines can be mass produced in PER.C6 cells in serum-free wave bioreactors and purified by column chromatography to meet a surge in demand. The non-replicating nature of this new generation of anthrax vaccine ensures an excellent safety profile for vaccines and the environment.(author)

  19. Anthrax, People and Dead Hippos

    Centers for Disease Control (CDC) Podcasts

    2017-11-07

    Epidemiologist, Dr. Melissa Marx, discuses anthrax deaths in people who ate dead hippos.  Created: 11/7/2017 by National Center for Emerging and Zoonotic Infectious Diseases (NCEZID).   Date Released: 11/7/2017.

  20. Patient and family physician preferences for care and communication in the eventuality of anthrax terrorism.

    Science.gov (United States)

    Kahan, Ernesto; Fogelman, Yacov; Kitai, Eliezer; Vinker, Shlomo

    2003-08-01

    The threat of bioterrorism consequent to the September 11, 2001 attack in the USA generated suggestions for improved medical response mainly through hospital preparedness. The aim of the present study was to investigate the impact of this period of tension on patients' first choice for care and for receiving relevant information, and on primary care doctors' feelings of responsibility in the eventuality of an anthrax attack. During October 11-31, 2001, 500 patients from 30 clinics throughout Israel were asked to complete a questionnaire on their awareness of the anthrax threat, measures taken to prepare for it, and preferred sources of care and information. Their 30 physicians, and an additional 20, completed a questionnaire on knowledge about anthrax and anthrax-related patient behaviours and clinic visits. The outstanding finding was the low rate (30%) of patients who chose the hospital emergency department as their first choice for care or information if they were worried about an anthrax attack or the media communicated that an attack was in progress. The other two-thirds preferred their family doctor or the health authorities. Most of the physicians (89%) felt it was their responsibility to treat anthrax-infected patients and that they should therefore be supplied with appropriate guidelines. This study suggests that in Israel, a country with a high degree of awareness of civil defence aspects, both patients and primary care doctors believe that family physicians should have a major role in the case of bioterrorist attacks. This must be seriously considered during formulation of relevant health services programmes.

  1. Historical evolution of human anthrax from occupational disease to potentially global threat as bioweapon.

    Science.gov (United States)

    D'Amelio, Enrico; Gentile, Bernardina; Lista, Florigio; D'Amelio, Raffaele

    2015-12-01

    Anthrax is caused by Bacillus anthracis, which can naturally infect livestock, wildlife and occupationally exposed humans. However, for its resistance due to spore formation, ease of dissemination, persistence in the environment and high virulence, B. anthracis has been considered the most serious bioterrorism agent for a long time. During the last century anthrax evolved from limited natural disease to potentially global threat if used as bioweapon. Several factors may mitigate the consequences of an anthrax attack, including 1. the capability to promptly recognize and manage the illness and its public health consequences; 2. the limitation of secondary contamination risk through an appropriate decontamination; and 3. the evolution of genotyping methods (for microbes characterization at high resolution level) that can influence the course and/or focus of investigations, impacting the response of the government to an attack. A PubMed search has been done using the key words “bioterrorism anthrax”. Over one thousand papers have been screened and the most significant examined to present a comprehensive literature review in order to discuss the current knowledge and strategies in preparedness for a possible deliberate release of B. anthracis spores and to indicate the most current and complete documents in which to deepen. The comprehensive analysis of the two most relevant unnatural anthrax release events, Sverdlovsk in the former Soviet Union (1979) and the contaminated letters in the USA (2001), shows that inhalational anthrax may easily and cheaply be spread resulting in serious consequences. The damage caused by an anthrax attack can be limited if public health organization, first responders, researchers and investigators will be able to promptly manage anthrax cases and use new technologies for decontamination methods and in forensic microbiology.

  2. Radiologic findings of the anthrax: focus on alimentary anthrax

    International Nuclear Information System (INIS)

    Kim, Sung Woo; Kim, Won Ho; Yang, Geun Seok; Kim, Tae Hun; Kang, Duk Sik

    1995-01-01

    To evaluate the radiologic findings of alimentary anthrax. 19 patients with alimentary anthrax, which was caused by ingestion of contaminated beef, were included in this study. The diagnosis was made by demonstration of Bacillus anthracis in smear and culture of the contaminated meat. We evaluated the clinical manifestations and the findings of thoracic, abdominal radiographs, cervical, abdominal ultrasonograms and abdominal CT scans. Out of the 19 patients with the alimentary infection, 9 had oropharyngeal form, 18 had abdominal form and 8 had combination of oropharyngeal and abdominal form. The patients had general symptoms and signs such as fever, chill, myalgia. Clinical symptoms and signs were sore throat, throat injection, throat ulcer and patch in oropharyngeal form, and nausea, vomiting abdominal pain, diarrhea, and gross GI bleeding in abdominal form. Radiologic findings included enlarged cervical lymph nodes (36%) in oropharyngeal form, and paralytic ileus (26%), ascites (26%), hepatomegaly (21%), enlarged mesenteric lymph nodes (26%), small bowel wall thickening (5%) in abdominal form. In two patients, late complications occurred as intestinal obstruction due to ileal stricture with perforation, and inflammatory changes of pelvic cavity due to ileovesical fistula. Radiologic findings of alimentary anthrax are difficult in differentiation from those of other inflammatory bowel disease, but those radiologic findings with clinical manifestations may be helpful in diagnosis and evaluation of disease process in patients with alimentary anthrax

  3. Orbito-Maxillofacial Cutaneous Anthrax

    African Journals Online (AJOL)

    and development of a black eschar were reviewed. Occupational history, falls and/or contact with animal meat was ... and oral ciprofloxacin (500mg BD for 21 days). The culture results isolated Bacillus anthracis highly ... The clinical evolution of cutaneous anthrax is typical with the initial development of minute red macules.

  4. Recombinant protective antigen 102 (rPA102): profile of a second-generation anthrax vaccine.

    Science.gov (United States)

    Keitel, Wendy A

    2006-08-01

    Recent terrorist attacks involving the use of Bacillus anthracis spores have stimulated interest in the development of new vaccines for anthrax prevention. Studies of the pathogenesis of anthrax and of the immune responses following infection and immunization underscore the pivotal role that antibodies to the protective antigen play in protection. The most promising vaccine candidates contain purified recombinant protective antigen. Clinical trials of one of these, recombinant protective antigen (rPA)102, are underway. Initial results suggest that rPA102 is well tolerated and immunogenic. Additional trials are necessary to identify optimal formulations and immunization regimens for pre- and postexposure prophylaxis. Future licensure of these and other candidate vaccines will depend on their safety and immunogenicity profiles in humans, and their ability to confer protection in animal models of inhalational anthrax.

  5. The anthrax vaccine and research: reactions from postal workers and public health professionals.

    Science.gov (United States)

    Quinn, Sandra Crouse; Thomas, Tammy; Kumar, Supriya

    2008-12-01

    During the 2001 anthrax attacks, public health agencies faced operational and communication decisions about the use of antibiotic prophylaxis and the anthrax vaccine with affected groups, including postal workers. This communication occurred within an evolving situation with incomplete and uncertain data. Guidelines for prophylactic antibiotics changed several times, contributing to confusion and mistrust. At the end of 60 days of taking antibiotics, people were offered an additional 40 days' supply of antibiotics, with or without the anthrax vaccine, the former constituting an investigational new drug protocol. Using data from interviews and focus groups with 65 postal workers in 3 sites and structured interviews with 16 public health professionals, this article examines the challenges for public health professionals who were responsible for communication with postal workers about the vaccine. Multiple factors affected the response, including a lack of trust, risk perception, disagreement about the recommendation, and the controversy over the military's use of the vaccine. Some postal workers reacted with suspicion to the vaccine offer, believing that they were the subjects of research, and some African American workers specifically drew an analogy to the Tuskegee syphilis study. The consent forms required for the protocol heightened mistrust. Postal workers also had complex and ambivalent responses to additional research on their health. The anthrax attacks present us with an opportunity to understand the challenges of communication in the context of uncertain science and suggest key strategies that may improve communications about vaccines and other drugs authorized for experimental use in future public health emergencies.

  6. The anthrax letters: a medical detective story

    National Research Council Canada - National Science Library

    Cole, Leonard A

    2003-01-01

    .... Library of Congress Cataloging-in-Publication Data Cole, Leonard A., 1933The anthrax letters : a medical detective story / Leonard A. Cole. p. cm. Includes bibliographical references and index. ISBN 0-309-08881-X - ISBN 0-309-52584-5 (PDF) 1. Bioterrorism- United States. 2. Anthrax- United States. 3. Postal service- United States. 4. Victims of...

  7. Treatment of Anthrax Disease Frequently Asked Questions

    Energy Technology Data Exchange (ETDEWEB)

    Judd, Kathleen S.; Young, Joan E.; Lesperance, Ann M.; Malone, John D.

    2010-05-14

    This document provides a summary of Frequently Asked Questions (FAQs) on the treatment of anthrax disease caused by a wide-area release of Bacillus anthracis spores as an act bioterrorism. These FAQs are intended to provide the public health and medical community, as well as others, with guidance and communications to support the response and long-term recovery from an anthrax event.

  8. Anthrax Meningitis - Report Of An Autopsied Case

    Directory of Open Access Journals (Sweden)

    Mahadevan A

    1999-01-01

    Full Text Available Anthrax is a rare cause of hemorrhagic meningitis in man. This report illustrates the characteristic hemorrhagic manifestations in the brain of a patient dying of anthrax meningitis secondary to overwhelming bacteremia. Gross examination of the brain revealed a thick dense subarachnoid hemorrhage with numerous petechial hemorrhages in the cortex. Histologically, meningoencephalitis with vascular necrosis, edema, perivascular cortical hemorrhages and clumps of Gram positive bacilli in the vascular lumen and invading vessel wall were the salient features. The anthrax bacillus was isolated from CSF and brain tissue and further its pathogenecity was confirmed by animal inoculation.

  9. Patients' request for and emergency physicians' prescription of antimicrobial prophylaxis for anthrax during the 2001 bioterrorism-related outbreak

    Directory of Open Access Journals (Sweden)

    Aber Robert C

    2005-01-01

    Full Text Available Abstract Background Inappropriate use of antibiotics by individuals worried about biological agent exposures during bioterrorism events is an important public health concern. However, little is documented about the extent to which individuals with self-identified risk of anthrax exposure approached physicians for antimicrobial prophylaxis during the 2001 bioterrorism attacks in the United States. Methods We conducted a telephone survey of randomly selected members of the Pennsylvania Chapter of the American College of Emergency Physicians to assess patients' request for and emergency physicians' prescription of antimicrobial agents during the 2001 anthrax attacks. Results Ninety-seven physicians completed the survey. Sixty-four (66% respondents had received requests from patients for anthrax prophylaxis; 16 (25% of these physicians prescribed antibiotics to a total of 23 patients. Ten physicians prescribed ciprofloxacin while 8 physicians prescribed doxycycline. Conclusion During the 2001 bioterrorist attacks, the majority of the emergency physicians we surveyed encountered patients who requested anthrax prophylaxis. Public fears may lead to a high demand for antibiotic prophylaxis during bioterrorism events. Elucidation of the relationship between public health response to outbreaks and outcomes would yield insights to ease burden on frontline clinicians and guide strategies to control inappropriate antibiotic allocation during bioterrorist events.

  10. Detailed Safety Review of Anthrax Vaccine Adsorbed

    National Research Council Canada - National Science Library

    2001-01-01

    To date, 18 human studies have assessed the safety of anthrax vaccination. These studies, some stretching back almost 50 years, reported adverse events after vaccination in varying degrees of detail...

  11. Human and animal anthrax in Ethiopia: A retrospective record ...

    African Journals Online (AJOL)

    26,737 animal anthrax cases (human to animal ratio 1:5) were reported from 2009 to 2013 ... respectively) This data analysis revealed that less number of human anthrax cases ..... quality to reach to strong conclusions and recommendations.

  12. Anthrax in Vintage Animal-hair Shaving Brushes

    Centers for Disease Control (CDC) Podcasts

    2017-08-08

    Dr. Kate Hendricks, a CDC anthrax expert, discusses anthrax in vintage shaving brushes.  Created: 8/8/2017 by National Center for Emerging and Zoonotic Infectious Diseases (NCEZID).   Date Released: 8/8/2017.

  13. Anthrax

    Science.gov (United States)

    2009-01-01

    chest radiograph will almost always exhibit a widened mediastinal contour that includes unilat- eral or bilateral hilar enlargement , as. well as...express B-Iactamase variants, peni - cillinases and cephalosporinases, which would undermine a lone-penicillin therapy (Lightfoot et ai., 1990

  14. False alarms, real challenges--one university's communication response to the 2001 anthrax crisis.

    Science.gov (United States)

    Clarke, Christopher E; Chess, Caron

    2006-01-01

    Considerable research exists on how government agencies at the federal, state, and local levels communicated during the fall 2001 anthrax attacks. However, there is little research on how other institutions handled this crisis, in terms of their response to potential anthrax contamination (aka "white powder scares") and their approach to disseminating important health and safety information. In this article, we investigate a major university's communication response to the anthrax crisis. First, we describe its communication experiences relating to a large white powder scare that occurred in October 2001. Second, we describe the university's broader communication efforts in terms of several important elements of risk communication research, including influence of source attributes, key messages, preferred channels, responses to information requests, and organizational influences. This study underlines that an institution does not have to be directly affected by a crisis to find itself on the communication "front lines." Moreover, other institutions may find it useful to learn from the experiences of this university, so that they may communicate more effectively during future crises.

  15. Military Hospitalizations among Deployed US Service Members Following Anthrax Vaccination, 1998-2001

    National Research Council Canada - National Science Library

    Wells, Timothy S; Sato, Paul A; Smith, Tyler C; Wang, Linda Z; Reed, Robert J; Kappel Ryan, Margaret A

    2006-01-01

    .... To determine if anthrax vaccination was associated with an increased risk of hospitalization, a historical cohort study utilizing pre- and post-anthrax-vaccination hospitalizations was undertaken...

  16. Meningoencephalitis due to anthrax: CT and MR findings

    Energy Technology Data Exchange (ETDEWEB)

    Yildirim, Hanefi; Koc, Mustafa; Murat, Ayse [Firat University, Department of Radiology, Elazig (Turkey); Kabakus, Nimet; Incekoey Girgin, Feyza [Firat University, Department of Paediatric Neurology, Elazig (Turkey)

    2006-11-15

    Anthrax is primarily a disease of herbivores, but it also causes cutaneous, respiratory and gastrointestinal infections in humans. Bacillus anthracis is an uncommon cause of meningitis and generally produces a haemorrhagic meningoencephalitis. We present the CT and MR findings of anthrax meningoencephalitis due to the cutaneous form of anthrax in a 12-year-old boy. They showed focal intracerebral haemorrhage with leptomeningeal enhancement. (orig.)

  17. Human anthrax as a re-emerging disease.

    Science.gov (United States)

    Doganay, Mehmet; Demiraslan, Hayati

    2015-01-01

    Anthrax is primarily a disease of herbivores and the etiological agent is B. anthracis which is a gram-positive, aerobic, spore-forming, and rod shaped bacterium. Bacillus anthracis spores are highly resistant to heat, pressure, ultraviolet and ionizing radiation, chemical agents and disinfectants. For these reasons, B. anthracis spores are an attractive choice as biological agents for the use of bioweapon and/or bioterrorism. Soil is the main reservoir for the infectious agent. The disease most commonly affects wild and domestic mammals. Human are secondarily infected by contact with infected animals and contaminated animal products or directly expose to B. anthracis spores. Anthrax occurs worldwide. This infection is still endemic or hyperendemic in both animals and humans in some part of areas of the world; particularly in Middle East, West Africa, Central Asia, some part of India, South America. However, some countries are claiming free of anthrax, and anthrax has become a re-emerging disease in western countries with the intentional outbreak. Currently, anthrax is classified according to its setting as (1) naturally occurring anthrax, (2) bioterrorism-related anthrax. Vast majority of human anthrax are occurring as naturally occurring anthrax in the world. It is also a threaten disease for western countries. The aim of this paper is to review the relevant patents, short historical perspective, microbiological and epidemiological features, clinical presentations and treatment.

  18. Assessing Hypothetical Gravity Control Propulsion

    OpenAIRE

    Millis, Marc G.

    2006-01-01

    Gauging the benefits of hypothetical gravity control propulsion is difficult, but addressable. The major challenge is that such breakthroughs are still only notional concepts rather than being specific methods from which performance can be rigorously quantified. A recent assessment by Tajmar and Bertolami used the rocket equation to correct naive misconceptions, but a more fundamental analysis requires the use of energy as the basis for comparison. The energy of a rocket is compared to an ide...

  19. Small molecule inhibitors of anthrax edema factor.

    Science.gov (United States)

    Jiao, Guan-Sheng; Kim, Seongjin; Moayeri, Mahtab; Thai, April; Cregar-Hernandez, Lynne; McKasson, Linda; O'Malley, Sean; Leppla, Stephen H; Johnson, Alan T

    2018-01-15

    Anthrax is a highly lethal disease caused by the Gram-(+) bacteria Bacillus anthracis. Edema toxin (ET) is a major contributor to the pathogenesis of disease in humans exposed to B. anthracis. ET is a bipartite toxin composed of two proteins secreted by the vegetative bacteria, edema factor (EF) and protective antigen (PA). Our work towards identifying a small molecule inhibitor of anthrax edema factor is the subject of this letter. First we demonstrate that the small molecule probe 5'-Fluorosulfonylbenzoyl 5'-adenosine (FSBA) reacts irreversibly with EF and blocks enzymatic activity. We then show that the adenosine portion of FSBA can be replaced to provide more drug-like molecules which are up to 1000-fold more potent against EF relative to FSBA, display low cross reactivity when tested against a panel of kinases, and are nanomolar inhibitors of EF in a cell-based assay of cAMP production. Copyright © 2017 Elsevier Ltd. All rights reserved.

  20. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants....

  1. Two anthrax cases with soft tissue infection, severe oedema and sepsis in Danish heroin users

    DEFF Research Database (Denmark)

    Russell, Lene; Pedersen, Michael; Jensen, Andreas V

    2013-01-01

    Anthrax had become extremely rare in Europe, but in 2010 an outbreak of anthrax among heroin users in Scotland increased awareness of contaminated heroin as a source of anthrax. We present the first two Danish cases of injectional anthrax and discuss the clinical presentations, which included both...

  2. CARNSORE: Hypothetical reactor accident study

    International Nuclear Information System (INIS)

    Walmod-Larsen, O.; Jensen, N.O.; Kristensen, L.; Meide, A.; Nedergaard, K.L.; Nielsen, F.; Lundtang Petersen, E.; Petersen, T.; Thykier-Nielsen, S.

    1984-06-01

    Two types of design-basis accident and a series of hypothetical core-melt accidents to a 600 MWe reactor are described and their consequences assessed. The PLUCON 2 model was used to calculate the consequences which are presented in terms of individual and collective doses, as well as early and late health consequences. The site proposed for the nucelar power station is Carnsore Point, County Wexford, south-east Ireland. The release fractions for the accidents described are those given in WASH-1400. The analyses are based on the resident population as given in the 1979 census and on 20 years of data from the meteorological stations at Rosslare Harbour, 8.5 km north of the site. The consequences of one of the hypothetical core-melt accidents are described in detail in a meteorological parametric study. Likewise the consequences of the worst conceivable combination of situations are described. Finally, the release fraction in one accident is varied and the consequences of a proposed, more probable ''Class 9 accident'' are presented. (author)

  3. Heart Attack

    Science.gov (United States)

    ... properly causes your body's blood sugar levels to rise, increasing your risk of heart attack. Metabolic syndrome. This occurs when you have obesity, high blood pressure and high blood sugar. Having metabolic ...

  4. Heart Attack

    Science.gov (United States)

    ... family history of heart attack race – African Americans, Mexican Americans, Native Americans, and native Hawaiians are at ... Your doctor will prescribe the medicines that are right for you. If you have had a heart ...

  5. Restricted Predicates for Hypothetical Datalog

    Directory of Open Access Journals (Sweden)

    Fernando Sáenz-Pérez

    2015-12-01

    Full Text Available Hypothetical Datalog is based on an intuitionistic semantics rather than on a classical logic semantics, and embedded implications are allowed in rule bodies. While the usual implication (i.e., the neck of a Horn clause stands for inferring facts, an embedded implication plays the role of assuming its premise for deriving its consequence. A former work introduced both a formal framework and a goal-oriented tabled implementation, allowing negation in rule bodies. While in that work positive assumptions for both facts and rules can occur in the premise, negative assumptions are not allowed. In this work, we cover this subject by introducing a new concept: a restricted predicate, which allows negative assumptions by pruning the usual semantics of a predicate. This new setting has been implemented in the deductive system DES.

  6. Estimating the location and spatial extent of a covert anthrax release.

    Directory of Open Access Journals (Sweden)

    Judith Legrand

    2009-01-01

    Full Text Available Rapidly identifying the features of a covert release of an agent such as anthrax could help to inform the planning of public health mitigation strategies. Previous studies have sought to estimate the time and size of a bioterror attack based on the symptomatic onset dates of early cases. We extend the scope of these methods by proposing a method for characterizing the time, strength, and also the location of an aerosolized pathogen release. A back-calculation method is developed allowing the characterization of the release based on the data on the first few observed cases of the subsequent outbreak, meteorological data, population densities, and data on population travel patterns. We evaluate this method on small simulated anthrax outbreaks (about 25-35 cases and show that it could date and localize a release after a few cases have been observed, although misspecifications of the spore dispersion model, or the within-host dynamics model, on which the method relies can bias the estimates. Our method could also provide an estimate of the outbreak's geographical extent and, as a consequence, could help to identify populations at risk and, therefore, requiring prophylactic treatment. Our analysis demonstrates that while estimates based on the first ten or 15 observed cases were more accurate and less sensitive to model misspecifications than those based on five cases, overall mortality is minimized by targeting prophylactic treatment early on the basis of estimates made using data on the first five cases. The method we propose could provide early estimates of the time, strength, and location of an aerosolized anthrax release and the geographical extent of the subsequent outbreak. In addition, estimates of release features could be used to parameterize more detailed models allowing the simulation of control strategies and intervention logistics.

  7. The anthrax vaccine: is it safe? does it work?

    National Research Council Canada - National Science Library

    Committee to Assess the Safety and Efficacy of the Anthrax Vaccine, Medical Follow-Up Agency

    2002-01-01

    ...), was licensed in 1970. It was initially used to protect people who might be exposed to anthrax where they worked, such as veterinarians and textile plant workers who process animal hair. When the U...

  8. Dendritic Cells Endocytose Bacillus Anthracis Spores: Implications for Anthrax Pathogenesis

    National Research Council Canada - National Science Library

    Brittingham, Katherine C; Ruthel, Gordon; Panchal, Rekha G; Fuller, Claudette L; Ribot, Wilson J

    2005-01-01

    Phagocytosis of inhaled Bacillus anthracis spores and subsequent trafficking to lymph nodes are decisive events in the progression of inhaled anthrax because they initiate germination and dissemination of spores...

  9. [Anthrax meningoencephalitis: a case report and review of Turkish literature].

    Science.gov (United States)

    Metan, Gökhan; Uysal, Burcu; Coşkun, Ramazan; Perçin, Duygu; Doğanay, Mehmet

    2009-10-01

    The incidence of anthrax is decreasing in Turkey, however, it is still endemic in some regions of the country. Although central nervous system involvement is rare in cases with anthrax, high mortality rates are significant. Here, we report a 46-years old woman who was anthrax meningoencephalitis. The patient was from Yozgat located in Central Anatolia, Turkey. Her history revealed that following peeling the skin of sheeps and consuming their meat a week ago, a lesion developed in her left forearm and she had been treated with penicilin G with the diagnosis of cutaneous anthrax in a local health center. The patient was admitted to the emergency room of our hospital due to increased headache and loss of conciousness and diagnosed as anthrax meningitis. Crytallized penicilin G (24 MU/day IV) and vancomycin (2 g/day IV) were initiated. The macroscopy of cerebrospinal fluid (CSF) sample was haemorrhagic, white blood cell count was 40/mm3 (80% of neutrophil) and Gram staining of CSF yielded abundant gram-positive bacilli. The diagnosis was confirmed by the isolation of Bacillus anthracis from CSF culture. Although the isolate was susceptible to penicillin and dexamethasone was added to the treatment, the patient died. Review of the Turkish literature revealed seven cases of anthrax with central nervous system involvement between 1980-2008. One of the patients was an 11-years old boy and the others were adults aged between 19 and 64 years. The source of the infection was skin in four patients and inhalation in one patient. The most common findings in all of the patients were inhabitance in rural area, haemorrhagic CSF and loss of all patients despite appropriate antibiotic therapy. In conclusion, anthrax meningitis and meningoencephalitis should be considered in the differential diagnosis of haemorrhagic meningitis in areas where anthrax is endemic and high rate of mortality despite appropriate therapy should always be kept in mind.

  10. Effective antiprotease-antibiotic treatment of experimental anthrax

    OpenAIRE

    Popov, Serguei G; Popova, Taissia G; Hopkins, Svetlana; Weinstein, Raymond S; MacAfee, Rebecca; Fryxell, Karl J; Chandhoke, Vikas; Bailey, Charles; Alibek, Ken

    2005-01-01

    Abstract Background Inhalation anthrax is characterized by a systemic spread of the challenge agent, Bacillus anthracis. It causes severe damage, including multiple hemorrhagic lesions, to host tissues and organs. It is widely believed that anthrax lethal toxin secreted by proliferating bacteria is a major cause of death, however, the pathology of intoxication in experimental animals is drastically different from that found during the infectious process. In order to close a gap between our un...

  11. Tumor Targeting and Drug Delivery by Anthrax Toxin

    Directory of Open Access Journals (Sweden)

    Christopher Bachran

    2016-07-01

    Full Text Available Anthrax toxin is a potent tripartite protein toxin from Bacillus anthracis. It is one of the two virulence factors and causes the disease anthrax. The receptor-binding component of the toxin, protective antigen, needs to be cleaved by furin-like proteases to be activated and to deliver the enzymatic moieties lethal factor and edema factor to the cytosol of cells. Alteration of the protease cleavage site allows the activation of the toxin selectively in response to the presence of tumor-associated proteases. This initial idea of re-targeting anthrax toxin to tumor cells was further elaborated in recent years and resulted in the design of many modifications of anthrax toxin, which resulted in successful tumor therapy in animal models. These modifications include the combination of different toxin variants that require activation by two different tumor-associated proteases for increased specificity of toxin activation. The anthrax toxin system has proved to be a versatile system for drug delivery of several enzymatic moieties into cells. This highly efficient delivery system has recently been further modified by introducing ubiquitin as a cytosolic cleavage site into lethal factor fusion proteins. This review article describes the latest developments in this field of tumor targeting and drug delivery.

  12. Tumor Targeting and Drug Delivery by Anthrax Toxin.

    Science.gov (United States)

    Bachran, Christopher; Leppla, Stephen H

    2016-07-01

    Anthrax toxin is a potent tripartite protein toxin from Bacillus anthracis. It is one of the two virulence factors and causes the disease anthrax. The receptor-binding component of the toxin, protective antigen, needs to be cleaved by furin-like proteases to be activated and to deliver the enzymatic moieties lethal factor and edema factor to the cytosol of cells. Alteration of the protease cleavage site allows the activation of the toxin selectively in response to the presence of tumor-associated proteases. This initial idea of re-targeting anthrax toxin to tumor cells was further elaborated in recent years and resulted in the design of many modifications of anthrax toxin, which resulted in successful tumor therapy in animal models. These modifications include the combination of different toxin variants that require activation by two different tumor-associated proteases for increased specificity of toxin activation. The anthrax toxin system has proved to be a versatile system for drug delivery of several enzymatic moieties into cells. This highly efficient delivery system has recently been further modified by introducing ubiquitin as a cytosolic cleavage site into lethal factor fusion proteins. This review article describes the latest developments in this field of tumor targeting and drug delivery.

  13. 2014 Anthrax epidemic in Koubia prefecture, Guinea-Conakry.

    Science.gov (United States)

    Sow, M S; Boushab, M B; Balde, H; Camara, A; Sako, F B; Traoré, F A; Diallo, M O S; Diallo, M D; Keita, M; Sylla, A O; Tounkara, T M; Cissé, M

    2016-11-01

    Anthrax disease is an anthropozoonosis caused by a Gram-positive bacterium, Bacillus anthracis. Our objective was to describe the epidemiological, clinical and therapeutic features of the 2014 epidemic in Koubia prefecture. This retrospective study examined all of the anthrax cases reported in Fafaya, Koubia Prefecture. In March and April 2014, there were 39 cases of human anthrax reported, for an incidence of 1.135%. The mean age was 20.9 (± 18.3) with a sex ratio of 2.54 (28/11) in favor of men. Seventy-six percent (23/39) were single. More than one half were students (53.8%). The main clinical signs were fever in 71, 8% (n = 28 /), papules 59% (n = 23), vesicles of 59% (n = 23) Digestive and cutaneous signs represented 35.9 % and 64.1% respectively; 35% had ingested contaminated meat and 17.95% were in direct contact with a sick animal. We didn't find any correlation between the mode of infection and onset of signs. The fatality rate was 28.21%. The 2014 epidemic of anthrax disease in the Koubia prefecture was marked by a high incidence and lethality. Clinical manifestations were cutaneaous and digestive. These results may serve further interventions to fight against anthrax disease. They should mainly focus on an awareness of peasants, surveillance and vaccination of cattle. Other studies seem to be necessary.

  14. Trial of risk assessment of a hypothetical nuclear facility

    International Nuclear Information System (INIS)

    Terao, Norichika; Suzuki, Mitsutoshi

    2013-01-01

    An equation for risk assessment in physical protection is shown by a probability of an adversary attack during a period time, P A , a probability of system effectiveness, P E , and consequence value, C. In addition, P E is shown as the multiplication of a probability of interruption of the facility, P I , by a probability of neutralization by response force, P N . In this study, it is assumed that an adversary assaults a hypothetical nuclear facility. The new quantification method about P A and P I in risk evaluation formula is devised, and risk assessment is attempted. In case of P A , the possibility of assaults against a nuclear facility is discussed by using terrorism data written in the open source database of terrorism, Global Terrorism Database (GTD), summarized by University of Maryland. In addition, it is discussed about P I by using the way of thinking of a risk assessment tool, EASI, developed by the Sandia National Laboratories (SNL). In the hypothetical nuclear facility, the performance of response force, sensors, and communication is expressed quantitatively by probability distribution based on some assumptions. (author)

  15. Sverdlovsk Anthrax Outbreak: An Educational Case Study

    Science.gov (United States)

    Steele, S. J.; van der Vink, G.

    2002-05-01

    In April and May of 1979 an Anthrax epidemic broke out in the city of Sverdlovsk (now Ekaterinburg) in the former Soviet Union. Sixty-four people were reported to have died from the outbreak, although there is still debate concerning the actual number of victims. While Soviet officials initially attributed this outbreak to contaminated meat, the US Government maintained that the outbreak was due to a leakage from a biological weapons facility. We have created and implemented an undergraduate educational exercise based on the forensic analysis of this event. Students were provided case data of the victims, area satellite images and meteorological data. One goal of the exercise was for students to reconstruct the most probable scenario of events through valid inference based on the limited information and uncertainties associated with the data set. Another goal was to make students sensitive to issues of biological weapons and bioterrorism. The exercise was highly rated by students even before the events of September 11. There is a clear need to educate students, particularly in the sciences, to be aware of the signatures of terrorist activities. Evidence of terrorist activities is more likely to appear from unintended discoveries than from active intelligence gathering. We believe our national security can be enhanced by sensitizing those that monitor the natural environment to the signatures of terrorist activities through the types of educational exercises that we have developed.

  16. Factors associated with repeated outbreak of anthrax in Bangladesh: qualitative and quantitative study

    Directory of Open Access Journals (Sweden)

    Jayedul Hassan

    2015-06-01

    Full Text Available Anthrax, caused by Bacillus anthracis is an acute, febrile disease of warm blooded animals including humans. Social norms and poverty in addition to climatic factors such as soil conditions, seasons of year, ambient temperature and rainfall influence the persistence of the B. anthracis and anthrax outbreaks. The present study was designed to reveal the factors influencing the repeated outbreak of anthrax in Bangladesh. Considering the previous outbreaks of anthrax, Sirajganj, Bogra, Kushtia, Tangail and Mymensingh districts of Bangladesh were selected for this study. To elucidate the factors, qualitative data relating to the animal management, knowledge and behavior of the people; and quantitative data relating to soil conditions, ambient temperature and rainfall were acquired, and analyzed critically. Based on the outbreak histories, a year was divided into two seasons, anthrax prone season (May-November and anthrax dry season (December-April. Anthrax spores could be isolated from 11.67% (n=14/120 of the soil samples collected from the study areas. The present study revealed that poor knowledge, lack of awareness, improper carcass disposal, inadequate vaccination, high Ca content and moisture in the soil along with high ambient temperature and rainfall during the anthrax prone season were the possible influencing factors of repeated outbreaks of anthrax in the study areas. Intensive propaganda to create public awareness of anthrax together with proper vaccination may reduce anthrax outbreaks in Bangladesh.

  17. Serology and anthrax in humans, livestock and Etosha National Park wildlife.

    Science.gov (United States)

    Turnbull, P C; Doganay, M; Lindeque, P M; Aygen, B; McLaughlin, J

    1992-04-01

    Results are presented from a number of epidemiological studies using enzyme immunoassays (EIA) based on the purified anthrax toxin antigens, protective antigen, lethal factor and oedema factor. Studies on sera from a group of 62 human anthrax patients in Turkey and from cattle in Britain following two unrelated outbreaks of anthrax show that EIA using protective antigen can be a useful diagnostic aid and will detect subclinical infections in appropriate circumstances. A serological survey on wildlife in the Etosha National Park, Namibia, where anthrax is endemic, showed that naturally acquired anthrax-specific antibodies are rare in herbivores but common in carnivores; in carnivores, titres appear to reflect the prevalence of anthrax in their ranges. Problems, as yet unresolved, were encountered in studies on sera from pigs following an outbreak of anthrax on a farm in Wales. Clinical details, including treatment, of the human and one of the bovine outbreaks are summarized and discussed in relation to the serological findings.

  18. Tumor Targeting and Drug Delivery by Anthrax Toxin

    OpenAIRE

    Bachran, Christopher; Leppla, Stephen H.

    2016-01-01

    Anthrax toxin is a potent tripartite protein toxin from Bacillus anthracis. It is one of the two virulence factors and causes the disease anthrax. The receptor-binding component of the toxin, protective antigen, needs to be cleaved by furin-like proteases to be activated and to deliver the enzymatic moieties lethal factor and edema factor to the cytosol of cells. Alteration of the protease cleavage site allows the activation of the toxin selectively in response to the presence of tumor-associ...

  19. Micromotors to capture and destroy anthrax simulant spores.

    Science.gov (United States)

    Orozco, Jahir; Pan, Guoqing; Sattayasamitsathit, Sirilak; Galarnyk, Michael; Wang, Joseph

    2015-03-07

    Towards addressing the need for detecting and eliminating biothreats, we describe a micromotor-based approach for screening, capturing, isolating and destroying anthrax simulant spores in a simple and rapid manner with minimal sample processing. The B. globilli antibody-functionalized micromotors can recognize, capture and transport B. globigii spores in environmental matrices, while showing non-interactions with excess of non-target bacteria. Efficient destruction of the anthrax simulant spores is demonstrated via the micromotor-induced mixing of a mild oxidizing solution. The new micromotor-based approach paves a way to dynamic multifunctional systems that rapidly recognize, isolate, capture and destroy biological threats.

  20. Initiating informatics and GIS support for a field investigation of Bioterrorism: The New Jersey anthrax experience

    Directory of Open Access Journals (Sweden)

    Skinner Ric

    2003-11-01

    Full Text Available Abstract Background The investigation of potential exposure to anthrax spores in a Trenton, New Jersey, mail-processing facility required rapid assessment of informatics needs and adaptation of existing informatics tools to new physical and information-processing environments. Because the affected building and its computers were closed down, data to list potentially exposed persons and map building floor plans were unavailable from the primary source. Results Controlling the effects of anthrax contamination required identification and follow-up of potentially exposed persons. Risk of exposure had to be estimated from the geographic relationship between work history and environmental sample sites within the contaminated facility. To assist in establishing geographic relationships, floor plan maps of the postal facility were constructed in ArcView Geographic Information System (GIS software and linked to a database of personnel and visitors using Epi Info and Epi Map 2000. A repository for maintaining the latest versions of various documents was set up using Web page hyperlinks. Conclusions During public health emergencies, such as bioterrorist attacks and disease epidemics, computerized information systems for data management, analysis, and communication may be needed within hours of beginning the investigation. Available sources of data and output requirements of the system may be changed frequently during the course of the investigation. Integrating data from a variety of sources may require entering or importing data from a variety of digital and paper formats. Spatial representation of data is particularly valuable for assessing environmental exposure. Written documents, guidelines, and memos important to the epidemic were frequently revised. In this investigation, a database was operational on the second day and the GIS component during the second week of the investigation.

  1. Reducing hypothetical bias in choice experiments

    DEFF Research Database (Denmark)

    Ladenburg, Jacob; Olsen, Søren Bøye; Nielsen, Rasmus Christian Fejer

    eliminate some of the hypothetical bias. The present paper tests an addition to Cheap Talk, an Opt-Out Reminder. The Opt-Out Reminder is an objective short script presented prior to the choice sets, prompting the respondent to choose the opt-out alternative, if he/she finds the proposed policy generated...... alternatives in a choice set too expensive. The results suggest that adding an Opt-Out Reminder to Cheap Talk can in fact reduce hypothetical bias even further and reduces some of the ineffectiveness of CT in relation to the survey bid range and experienced respondents....

  2. Heart Attack Recovery FAQs

    Science.gov (United States)

    ... recommendations to make a full recovery. View an animation of a heart attack . Heart Attack Recovery Questions ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  3. Growth medium for the rapid isolation and identification of anthrax

    Science.gov (United States)

    Kiel, Johnathan L.; Parker, Jill E.; Grubbs, Teri R.; Alls, John L.

    2000-07-01

    Anthrax has been recognized as a highly likely biological warfare or terrorist agent. The purpose of this work was to design a culture technique to rapidly isolate and identify `live' anthrax. In liquid or solid media form, 3AT medium (3-amino-L-tyrosine, the main ingredient) accelerated germination and growth of anthrax spores in 5 to 6 hours to a point expected at 18 to 24 hours with ordinary medium. During accelerated growth, standard definitive diagnostic tests such as sensitivity to lysis by penicillin or bacteriophage can be run. During this time, the bacteria synthesized a fluorescent and thermochemiluminescent polymer. Bacteria captured by specific antibody are, therefore, already labeled. Because living bacteria are required to generate the polymer, the test converts immunoassays for anthrax into viability assays. Furthermore, the polymer formation leads to the death of the vegetative form and non-viability of the spores produced in the medium. By altering the formulation of the medium, other microbes and even animal and human cells can be grown in it and labeled (including viruses grown in the animal or human cells).

  4. Reactions to Hypothetical, Jealousy Producing Events.

    Science.gov (United States)

    Hansen, Gary L.

    1982-01-01

    Asked subjects (N=220) how they would feel about their mates' behavior in eight hypothetical situations designed to measure jealousy. Responses indicated that jealousy is likely to be a major issue. Sex role orientation is most consistently related to jealousy with sex role traditional subjects being the most jealous. (Author)

  5. First Autochthonous Coinfected Anthrax in an Immunocompetent Patient

    Directory of Open Access Journals (Sweden)

    Parvaneh Afshar

    2015-01-01

    Full Text Available Cutaneous anthrax has a mortality rate of 20% if no antibacterial treatment is applied. The clinical manifestations of cutaneous anthrax are obviously striking, but coinfection may produce atypical lesions and mask the clinical manifestations and proper laboratory diagnosis. Anthrax is known to be more common in the Middle East and Iran is one of the countries in which the zoonotic form of anthrax may still be encountered. We report a case of a 19-years-old male who used to apply Venetian ceruse on his skin. Venetian ceruse (also known as Spirits of Saturn is an old cosmetic product used for skin whitening traditionally made from sheep’s spinal cord. The patient referred to the Referral Laboratory, Mazandaran University of Medical Sciences, Sari, Iran, with atypical dermatosis, pronounced pain, and oedema of the affected tissue. It was confirmed by both conventional and molecular analysis that culture was a mixture of Bacillus anthracis and Trichophyton interdigitale. The patient was initially treated with ceftriaxone (1000 mg/day for two weeks, gentamicin (1.5–2 mg/kg/day, terbinafine (200 mg/week for one month, and 1% clotrimazole cream (5 weeks two times per day which resulted in gradual improvement. No relapse could be detected after one-year follow-up. Anthrax infection might present a broader spectrum of symptoms than expected by clinicians. These unfamiliar characteristics may lead to delayed diagnosis, inadequate treatment, and higher mortality rate. Clinicians need to be aware of this issue in order to have successful management over this infection.

  6. Bioterrorism and its aftermath: dealing individually and organizationally with the emotional reactions to an anthrax attack.

    Science.gov (United States)

    Sugden, Brian W; Katchmar, Rosemary

    2005-01-01

    From September 2001 through April 2004, the United States Postal Service (USPS) dealt, for the first time, with bioterrorism resulting in employee deaths and the closure of a large mail processing plant in Washington, D.C. The Employee Assistance Program (EAP) partnered with the USPS throughout this tumultuous time to meet the multiple and evolving behavioral health needs of the employees and facilitate the employees' emotional preparedness for their return to work at the closed facility. This paper discusses the reactions manifested by the employees during this extended period, as well as the EAP activities in the recovery process.

  7. Evaluation of the house fly Musca domestica as a mechanical vector for an anthrax.

    Directory of Open Access Journals (Sweden)

    Antonio Fasanella

    Full Text Available Anthrax is a disease of human beings and animals caused by the encapsulated, spore-forming, Bacillus anthracis. The potential role of insects in the spread of B. anthracis to humans and domestic animals during an anthrax outbreak has been confirmed by many studies. Among insect vectors, the house fly Musca domestica is considered a potential agent for disease transmission. In this study, laboratory-bred specimens of Musca domestica were infected by feeding on anthrax-infected rabbit carcass or anthrax contaminated blood, and the presence of anthrax spores in their spots (faeces and vomitus was microbiologically monitored. It was also evaluated if the anthrax spores were able to germinate and replicate in the gut content of insects. These results confirmed the role of insects in spreading anthrax infection. This role, although not major, given the huge size of fly populations often associated with anthrax epidemics in domestic animals, cannot be neglected from an epidemiological point of view and suggest that fly control should be considered as part of anthrax control programs.

  8. Ecological suitability modeling for anthrax in the Kruger National Park, South Africa.

    Directory of Open Access Journals (Sweden)

    Pieter Johan Steenkamp

    Full Text Available The spores of the soil-borne bacterium, Bacillus anthracis, which causes anthrax are highly resistant to adverse environmental conditions. Under ideal conditions, anthrax spores can survive for many years in the soil. Anthrax is known to be endemic in the northern part of Kruger National Park (KNP in South Africa (SA, with occasional epidemics spreading southward. The aim of this study was to identify and map areas that are ecologically suitable for the harboring of B. anthracis spores within the KNP. Anthrax surveillance data and selected environmental variables were used as inputs to the maximum entropy (Maxent species distribution modeling method. Anthrax positive carcasses from 1988-2011 in KNP (n = 597 and a total of 40 environmental variables were used to predict and evaluate their relative contribution to suitability for anthrax occurrence in KNP. The environmental variables that contributed the most to the occurrence of anthrax were soil type, normalized difference vegetation index (NDVI and precipitation. Apart from the endemic Pafuri region, several other areas within KNP were classified as ecologically suitable. The outputs of this study could guide future surveillance efforts to focus on predicted suitable areas for anthrax, since the KNP currently uses passive surveillance to detect anthrax outbreaks.

  9. Integrated MOSFET-Embedded-Cantilever-Based Biosensor Characteristic for Detection of Anthrax Simulant

    Energy Technology Data Exchange (ETDEWEB)

    Mostafa, Salwa [University of Tennessee, Knoxville (UTK); Lee, Ida [ORNL; Islam, Syed K [University of Tennessee, Knoxville (UTK); Eliza, Sazia A. [University of Tennessee, Knoxville (UTK); Shekhawat, Gajendra [Northwestern University, Evanston; Dravid, Vinayak [Northwestern University, Evanston; Tulip, Fahmida S [ORNL

    2011-01-01

    In this work, MOSFET-embedded cantilevers are configured as microbial sensors for detection of anthrax simulants, Bacillus thuringiensis. Anthrax simulants attached to the chemically treated gold-coated cantilever cause changes in the MOSFET drain current due to the bending of the cantilever which indicates the detection of anthrax simulant. Electrical properties of the anthrax simulant are also responsible for the change in the drain current. The test results suggest a detection range of 10 L of stimulant test solution (a suspension population of 1.3 107 colony-forming units/mL diluted in 40% ethanol and 60% deionized water) with a linear response of 31 A/ L.

  10. [Anthrax in the canton of Zurich between 1878 and 2005].

    Science.gov (United States)

    Brandes Ammann, A; Brandl, H

    2007-07-01

    Historical records reporting cases of animal anthrax in the canton of Zurich between 1878 and 2005 were analysed on the level of political communities regarding occurrence and number of cases, animals affected, and number of communities affected. Data were correlated with industrial activities (tanning, wool and horse hair processing) in a community and to the prevailing meteorological conditions. A total of 830 cases of animal anthrax has been recorded in 140 of 171 communities. Occurrence correlated with industrial activities in a community such as companies handling potentially contaminated materials (hides, fur, wool, hair, meat, or bone meal). The influence of wool processing companies (P = 0. 004) and tanneries (P = 0. 032) was significant whereas horse hair processing had no effect. However, a statistical relationship between the number of cases reported and meteorological data (rainfall, mean temperature) was not found.

  11. [Anthrax meningoencephalitis: a case following a cutaneous lesion in Morocco].

    Science.gov (United States)

    Ziadi, A; Hachimi, A; Soraa, N; Tassi, N; Nejmi, H; Elkhayari, M; Samkaoui, M A

    2014-05-01

    Anthrax meningoencephalitis is very rare especially following skin location. We report a case of meningoencephalitis secondary to skin lesion. The diagnosis is based on clinical presentation and confirmed by microbiological tests. Its evolution remains fatal despite aggressive resuscitation. Copyright © 2014 Société française d’anesthésie et de réanimation (Sfar). Published by Elsevier SAS. All rights reserved.

  12. Effective antiprotease-antibiotic treatment of experimental anthrax

    Directory of Open Access Journals (Sweden)

    MacAfee Rebecca

    2005-04-01

    Full Text Available Abstract Background Inhalation anthrax is characterized by a systemic spread of the challenge agent, Bacillus anthracis. It causes severe damage, including multiple hemorrhagic lesions, to host tissues and organs. It is widely believed that anthrax lethal toxin secreted by proliferating bacteria is a major cause of death, however, the pathology of intoxication in experimental animals is drastically different from that found during the infectious process. In order to close a gap between our understanding of anthrax molecular pathology and the most prominent clinical features of the infectious process we undertook bioinformatic and experimental analyses of potential proteolytic virulence factors of B. anthracis distinct from lethal toxin. Methods Secreted proteins (other than lethal and edema toxins produced by B. anthracis were tested for tissue-damaging activity and toxicity in mice. Chemical protease inhibitors and rabbit immune sera raised against B. anthracis proteases were used to treat mice challenged with B. anthracis (Sterne spores. Results B. anthracis strain delta Ames (pXO1-, pXO2- producing no lethal and edema toxins secrets a number of metalloprotease virulence factors upon cultivation under aerobic conditions, including those with hemorrhagic, caseinolytic and collagenolytic activities, belonging to M4 and M9 thermolysin and bacterial collagenase families, respectively. These factors are directly toxic to DBA/2 mice upon intratracheal administration at 0.5 mg/kg and higher doses. Chemical protease inhibitors (phosphoramidon and 1, 10-phenanthroline, as well as immune sera against M4 and M9 proteases of B. anthracis, were used to treat mice challenged with B. anthracis (Sterne spores. These substances demonstrate a substantial protective efficacy in combination with ciprofloxacin therapy initiated as late as 48 h post spore challenge, compared to the antibiotic alone. Conclusion Secreted proteolytic enzymes are important pathogenic

  13. America’s Food: Does Anthrax Pose A Threat?

    Science.gov (United States)

    2002-04-01

    a 1996 JAMA article, “Unexplained Severe Illness Possibly Associated with Consumption of Kombucha Tea - Iowa 1995.”13 For clarification, the... Kombucha “mush- room” is a “ symbiotic colony of several species of yeast and bacteria that are bound to- gether by a surrounding membrane.”14 Dr. Sadjadi...described an outbreak in Iran of cuta- 9 neous anthrax related to the Kombucha mushroom. In 1996 in a village on the outskirts of Tehran, 20 people

  14. Pharmacophore Selection and Redesign of Non-nucleotide Inhibitors of Anthrax Edema Factor

    Directory of Open Access Journals (Sweden)

    Maria Estrella Jimenez

    2012-11-01

    Full Text Available Antibiotic treatment may fail to protect individuals, if not started early enough, after infection with Bacillus anthracis, due to the continuing activity of toxins that the bacterium produces. Stable and easily stored inhibitors of the edema factor toxin (EF, an adenylyl cyclase, could save lives in the event of an outbreak, due to natural causes or a bioweapon attack. The toxin’s basic activity is to convert ATP to cAMP, and it is thus in principle a simple phosphatase, which means that many mammalian enzymes, including intracellular adenylcyclases, may have a similar activity. While nucleotide based inhibitors, similar to its natural substrate, ATP, were identified early, these compounds had low activity and specificity for EF. We used a combined structural and computational approach to choose small organic molecules in large, web-based compound libraries that would, based on docking scores, bind to residues within the substrate binding pocket of EF. A family of fluorenone-based inhibitors was identified that inhibited the release of cAMP from cells treated with EF. The lead inhibitor was also shown to inhibit the diarrhea caused by enterotoxigenic E. coli (ETEC in a murine model, perhaps by serving as a quorum sensor. These inhibitors are now being tested for their ability to inhibit Anthrax infection in animal models and may have use against other pathogens that produce toxins similar to EF, such as Bordetella pertussis or Vibrio cholera.

  15. Pharmacophore selection and redesign of non-nucleotide inhibitors of anthrax edema factor.

    Science.gov (United States)

    Schein, Catherine H; Chen, Deliang; Ma, Lili; Kanalas, John J; Gao, Jian; Jimenez, Maria Estrella; Sower, Laurie E; Walter, Mary A; Gilbertson, Scott R; Peterson, Johnny W

    2012-11-08

    Antibiotic treatment may fail to protect individuals, if not started early enough, after infection with Bacillus anthracis, due to the continuing activity of toxins that the bacterium produces. Stable and easily stored inhibitors of the edema factor toxin (EF), an adenylyl cyclase, could save lives in the event of an outbreak, due to natural causes or a bioweapon attack. The toxin's basic activity is to convert ATP to cAMP, and it is thus in principle a simple phosphatase, which means that many mammalian enzymes, including intracellular adenylcyclases, may have a similar activity. While nucleotide based inhibitors, similar to its natural substrate, ATP, were identified early, these compounds had low activity and specificity for EF. We used a combined structural and computational approach to choose small organic molecules in large, web-based compound libraries that would, based on docking scores, bind to residues within the substrate binding pocket of EF. A family of fluorenone-based inhibitors was identified that inhibited the release of cAMP from cells treated with EF. The lead inhibitor was also shown to inhibit the diarrhea caused by enterotoxigenic E. coli (ETEC) in a murine model, perhaps by serving as a quorum sensor. These inhibitors are now being tested for their ability to inhibit Anthrax infection in animal models and may have use against other pathogens that produce toxins similar to EF, such as Bordetella pertussis or Vibrio cholera.

  16. Terrorists and Suicide Attacks

    National Research Council Canada - National Science Library

    Cronin, Audrey K

    2003-01-01

    Suicide attacks by terrorist organizations have become more prevalent globally, and assessing the threat of suicide attacks against the United States and its interests at home and abroad has therefore...

  17. Solidarity under Attack

    DEFF Research Database (Denmark)

    Meret, Susi; Goffredo, Sergio

    2017-01-01

    https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack......https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack...

  18. Pericarditis - after heart attack

    Science.gov (United States)

    ... include: A previous heart attack Open heart surgery Chest trauma A heart attack that has affected the thickness of your heart muscle Symptoms Symptoms include: Anxiety Chest pain from the swollen pericardium rubbing on the ...

  19. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  20. Willingness to pay for three hypothetical malaria vaccines in Nigeria.

    Science.gov (United States)

    Udezi, Waka Anthony; Usifoh, Cyril Odianose; Ihimekpen, Omoyeme Oluwatosin

    2010-08-01

    individuals aged > or =18 years of 500 who were approached agreed to participate in the study, giving a response rate of 71.8%. Most of the participants (216/359; 60.2%) were women, and 48 of them were pregnant. Most respondents (299/359; 83.3%) had at least one malaria attack within the last year, and 27.3% (98/359) were hospitalized for malaria. The mean WTP for vaccine A was $6.77 and that for vaccine B was $6.70. Vaccine C was the least well accepted with a mean WTP of $5.06. Respondents were willing to pay significantly more for vaccine A (95% CI, $5.96-$7.57); thus, the WTP was significantly different for the 3 hypothetical malaria vaccines (P pay significantly more for vaccines A and B, but less for C (P pay more for a vaccine that was well tolerated, even if its effectiveness and duration of protection against malaria were lower than those of a product that caused severe adverse effects. Interpretation of this study should be guided by the knowledge that differences exist between the study sample and the general population. 2010 Excerpta Medica Inc. All rights reserved.

  1. Modeling the Ecological Niche of Bacillus anthracis to Map Anthrax Risk in Kyrgyzstan.

    Science.gov (United States)

    Blackburn, Jason K; Matakarimov, Saitbek; Kozhokeeva, Sabira; Tagaeva, Zhyldyz; Bell, Lindsay K; Kracalik, Ian T; Zhunushov, Asankadyr

    2017-03-01

    AbstractAnthrax, caused by the environmental bacterium Bacillus anthracis , is an important zoonosis nearly worldwide. In Central Asia, anthrax represents a major veterinary and public health concern. In the Republic of Kyrgyzstan, ongoing anthrax outbreaks have been reported in humans associated with handling infected livestock and contaminated animal by-products such as meat or hides. The current anthrax situation has prompted calls for improved insights into the epidemiology, ecology, and spatial distribution of the disease in Kyrgyzstan to better inform control and surveillance. Disease control for both humans and livestock relies on annual livestock vaccination ahead of outbreaks. Toward this, we used a historic database of livestock anthrax reported from 1932 to 2006 mapped at high resolution to develop an ecological niche model-based prediction of B. anthracis across Kyrgyzstan and identified spatial clusters of livestock anthrax using a cluster morphology statistic. We also defined the seasonality of outbreaks in livestock. Cattle were the most frequently reported across the time period, with the greatest number of cases in late summer months. Our niche models defined four areas as suitable to support pathogen persistence, the plateaus near Talas and Bishkek, the valleys of western Kyrgyzstan along the Fergana Valley, and the low-lying areas along the shore of Lake Isyk-Kul. These areas should be considered "at risk" for livestock anthrax and subsequent human cases. Areas defined by the niche models can be used to prioritize anthrax surveillance and inform efforts to target livestock vaccination campaigns.

  2. A 2011 Risk/Benefit Analysis of the Anthrax Vaccine Immunization Program

    Science.gov (United States)

    2011-06-10

    filled with botulinum toxin, 10 with anthrax, and 2 with aflatoxin.‖18 In 1992, Ken Alibek, a senior Russian bioweapons program manager defected...William K. Honner, Rosha A. Loach , Cynthia A. Moore, and J. David Erickson. ―Birth Defects Among Infants Born to Women Who Received Anthrax Vaccine In

  3. The pattern of anthrax cases on livestock in West Nusa Tenggara Province

    Directory of Open Access Journals (Sweden)

    Enymartindah

    1998-03-01

    Full Text Available A retrospective study on anthrax in endemic area was carried out from 1984 to 1994 in West Nusa Tenggara Province (NTB to uncover the occurrence of anthrax and the pattern of the disease in livestock. Data of anthrax incidence had been compiled for the 11 years from Animal Health Section and Type B Laboratory of the Livestock Service Office, NTB Province in Mataram. This was done to get the information about locations and times when the cases occurred, and the vaccination status of livestock in the anthrax area. The pattern of anthrax in livestock was analyzed by using time series analysis, and the long term trend was then illustrated by linier regression . During the years, anthrax cases in livestock were reported high in Sumbawa island, while the cases in Lombok island were relatively low. There were no anthrax cases reported from East Lombok District . The long term trend of anthrax occurrence in livestock from 1984 to 1994 tended to decrease (Y= 6,04 - 0,0162 X.

  4. Survivability of the Hardened Mobile Launcher When Attacked by a Hypothetical Rapidly Retargetable ICBM System.

    Science.gov (United States)

    1986-03-01

    Aimpoints 22 Overviev 22 Random Movement of the RML 23 Computing Burst Locations and the HMIL’s Final Location 23 Selecting the HIMLs Speed. 29...described threat. The actual model used in this study is an MEASIC computer program . written and run on an Apple Macintosh computer . It is described in...mechanics of the computer program that models the warheads’ flight time sequence, it will be helpful to explain some of the elements of the sequence

  5. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  6. Testing QCD with Hypothetical Tau Leptons

    Energy Technology Data Exchange (ETDEWEB)

    Brodsky, Stanley J.

    1998-10-21

    We construct new tests of perturbative QCD by considering a hypothetical {tau} lepton of arbitrary mass, which decays hadronically through the electromagnetic current. We can explicitly compute its hadronic width ratio directly as an integral over the e{sup +}e{sup -} annihilation cross section ratio, R{sub e{sup +}e{sup -}}. Furthermore, we can design a set of commensurate scale relations and perturbative QCD tests by varying the weight function away from the form associated with the V-A decay of the physical {tau}. This method allows the wide range of the R{sub e{sup +}e{sup -}} data to be used as a probe of perturbative QCD.

  7. Hypothetical conflict situations with friends and peers

    Directory of Open Access Journals (Sweden)

    Petrović Danijela S.

    2012-01-01

    Full Text Available This paper deals with age and sex differences in preferred strategies of conflict resolution in friendship and peer relationships. The study was conducted on the sample of 286 adolescents. Conflict resolution strategies have been investigated by the method of hypothetical conflict situations. For the purposes of this research, we have created an instrument consisting of 20 hypothetical situations, with the following subjects of conflict: breaking the agreement, non-compliance with opinion differences, provocations, dishonesty and stubbornness. Conflict resolution strategies we examined were giving in, withdrawal, competition and problem solving. The results have shown that problem solving is the dominant strategy of adolescents in conflict with friends, while in peer conflicts they more often opt for competition. Age differences are reflected in the fact that older adolescents are more likely to choose problem solving than younger, whereas younger adolescents are more likely to choose a retreat (withdrawal strategy than older. Girls are more prone to choosing problem solving than boys, who, on the other hand, tend to withdraw more than girls. Also, gender of the other person in the conflict is proved to be important - in conflict with male peers, adolescents choose competition to a greater extent and withdraw to a minor extent, compared to when they are in conflict with female peers. The results have practical implications as well. In programs for teaching constructive conflict resolution that are designed for younger adolescents there should be more emphasis on empowerment and training for assertive behaviour. In addition, when teaching about constructive conflict resolution strategies, it is important to consider the gender of adolescents as well as the gender of the person with whom they are in conflict.

  8. Web server attack analyzer

    OpenAIRE

    Mižišin, Michal

    2013-01-01

    Web server attack analyzer - Abstract The goal of this work was to create prototype of analyzer of injection flaws attacks on web server. Proposed solution combines capabilities of web application firewall and web server log analyzer. Analysis is based on configurable signatures defined by regular expressions. This paper begins with summary of web attacks, followed by detection techniques analysis on web servers, description and justification of selected implementation. In the end are charact...

  9. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  10. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. ...

  11. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  12. DUST-BATHING BEHAVIORS OF AFRICAN HERBIVORES AND THE POTENTIAL RISK OF INHALATIONAL ANTHRAX.

    Science.gov (United States)

    Barandongo, Zoe R; Mfune, John K E; Turner, Wendy C

    2018-01-01

    :  Anthrax in herbivorous wildlife and livestock is generally assumed to be transmitted via ingestion or inhalation of Bacillus anthracis spores. Although recent studies have highlighted the importance of the ingestion route for anthrax transmission, little is known about the inhalational route in natural systems. Dust bathing could aerosolize soilborne pathogens such as B. anthracis, exposing dust-bathing individuals to inhalational infections. We investigated the potential role of dust bathing in the transmission of inhalational anthrax to herbivorous wildlife in Etosha National Park, Namibia, an area with endemic seasonal anthrax outbreaks. We 1) cultured soils from dust-bathing sites for the presence and concentration of B. anthracis spores, 2) monitored anthrax carcass sites, the locations with the highest B. anthracis concentrations, for evidence of dust bathing, including a site where a zebra died of anthrax on a large dust bath, and 3) characterized the ecology and seasonality of dust bathing in plains zebra ( Equus quagga), blue wildebeest ( Connochaetes taurinus), and African savanna elephant ( Loxodonta africana) using a combination of motion-sensing camera traps and direct observations. Only two out of 83 dust-bath soils were positive for B. anthracis, both with low spore concentrations (≤20 colony-forming units per gram). We also detected no evidence of dust baths occurring at anthrax carcass sites, perhaps due to carcass-induced changes in soil composition that may deter dust bathing. Finally, despite observing some seasonal variation in dust bathing, preliminary evidence suggests that the seasonality of dust bathing and anthrax mortalities are not correlated. Thus, although dust bathing creates a dramatic cloud of aerosolized soil around an individual, our microbiologic, ecologic, and behavioral results in concert demonstrate that dust bathing is highly unlikely to transmit inhalational anthrax infections.

  13. Mapping the Distribution of Anthrax in Mainland China, 2005-2013.

    Directory of Open Access Journals (Sweden)

    Wan-Jun Chen

    2016-04-01

    Full Text Available Anthrax, a global re-emerging zoonotic disease in recent years is enzootic in mainland China. Despite its significance to the public health, spatiotemporal distributions of the disease in human and livestock and its potential driving factors remain poorly understood.Using the national surveillance data of human and livestock anthrax from 2005 to 2013, we conducted a retrospective epidemiological study and risk assessment of anthrax in mainland China. The potential determinants for the temporal and spatial distributions of human anthrax were also explored. We found that the majority of human anthrax cases were located in six provinces in western and northeastern China, and five clustering areas with higher incidences were identified. The disease mostly peaked in July or August, and males aged 30-49 years had higher incidence than other subgroups. Monthly incidence of human anthrax was positively correlated with monthly average temperature, relative humidity and monthly accumulative rainfall with lags of 0-2 months. A boosted regression trees (BRT model at the county level reveals that densities of cattle, sheep and human, coverage of meadow, coverage of typical grassland, elevation, coverage of topsoil with pH > 6.1, concentration of organic carbon in topsoil, and the meteorological factors have contributed substantially to the spatial distribution of the disease. The model-predicted probability of occurrence of human cases in mainland China was mapped at the county level.Anthrax in China was characterized by significant seasonality and spatial clustering. The spatial distribution of human anthrax was largely driven by livestock husbandry, human density, land cover, elevation, topsoil features and climate. Enhanced surveillance and intervention for livestock and human anthrax in the high-risk regions, particularly on the Qinghai-Tibetan Plateau, is the key to the prevention of human infections.

  14. Rabies virus glycoprotein as a carrier for anthrax protective antigen

    International Nuclear Information System (INIS)

    Smith, Mary Ellen; Koser, Martin; Xiao Sa; Siler, Catherine; McGettigan, James P.; Calkins, Catherine; Pomerantz, Roger J.; Dietzschold, Bernhard; Schnell, Matthias J.

    2006-01-01

    Live viral vectors expressing foreign antigens have shown great promise as vaccines against viral diseases. However, safety concerns remain a major problem regarding the use of even highly attenuated viral vectors. Using the rabies virus (RV) envelope protein as a carrier molecule, we show here that inactivated RV particles can be utilized to present Bacillus anthracis protective antigen (PA) domain-4 in the viral membrane. In addition to the RV glycoprotein (G) transmembrane and cytoplasmic domains, a portion of the RV G ectodomain was required to express the chimeric RV G anthrax PA on the cell surface. The novel antigen was also efficiently incorporated into RV virions. Mice immunized with the inactivated recombinant RV virions exhibited seroconversion against both RV G and anthrax PA, and a second inoculation greatly increased these responses. These data demonstrate that a viral envelope protein can carry a bacterial protein and that a viral carrier can display whole polypeptides compared to the limited epitope presentation of previous viral systems

  15. Plants under dual attack

    NARCIS (Netherlands)

    Ponzio, C.A.M.

    2016-01-01

    Though immobile, plants are members of complex environments, and are under constant threat from a wide range of attackers, which includes organisms such as insect herbivores or plant pathogens. Plants have developed sophisticated defenses against these attackers, and include chemical responses

  16. Heart attack - discharge

    Science.gov (United States)

    ... and lifestyle Cholesterol - drug treatment Controlling your high blood pressure Deep vein thrombosis - discharge Dietary fats explained Fast food tips Heart attack - discharge Heart attack - what to ask your doctor Heart bypass ... pacemaker - discharge High blood pressure - what to ask your doctor How to read ...

  17. Whole Genome Analysis of Injectional Anthrax Identifies Two Disease Clusters Spanning More Than 13 Years

    Directory of Open Access Journals (Sweden)

    Paul Keim

    2015-11-01

    Lay Person Interpretation: Injectional anthrax has been plaguing heroin drug users across Europe for more than 10 years. In order to better understand this outbreak, we assessed genomic relationships of all available injectional anthrax strains from four countries spanning a >12 year period. Very few differences were identified using genome-based analysis, but these differentiated the isolates into two distinct clusters. This strongly supports a hypothesis of at least two separate anthrax spore contamination events perhaps during the drug production processes. Identification of two events would not have been possible from standard epidemiological analysis. These comprehensive data will be invaluable for classifying future injectional anthrax isolates and for future geographic attribution.

  18. Persistent anthrax as a major driver of wildlife mortality in a tropical rainforest.

    Science.gov (United States)

    Hoffmann, Constanze; Zimmermann, Fee; Biek, Roman; Kuehl, Hjalmar; Nowak, Kathrin; Mundry, Roger; Agbor, Anthony; Angedakin, Samuel; Arandjelovic, Mimi; Blankenburg, Anja; Brazolla, Gregory; Corogenes, Katherine; Couacy-Hymann, Emmanuel; Deschner, Tobias; Dieguez, Paula; Dierks, Karsten; Düx, Ariane; Dupke, Susann; Eshuis, Henk; Formenty, Pierre; Yuh, Yisa Ginath; Goedmakers, Annemarie; Gogarten, Jan F; Granjon, Anne-Céline; McGraw, Scott; Grunow, Roland; Hart, John; Jones, Sorrel; Junker, Jessica; Kiang, John; Langergraber, Kevin; Lapuente, Juan; Lee, Kevin; Leendertz, Siv Aina; Léguillon, Floraine; Leinert, Vera; Löhrich, Therese; Marrocoli, Sergio; Mätz-Rensing, Kerstin; Meier, Amelia; Merkel, Kevin; Metzger, Sonja; Murai, Mizuki; Niedorf, Svenja; De Nys, Hélène; Sachse, Andreas; van Schijndel, Joost; Thiesen, Ulla; Ton, Els; Wu, Doris; Wieler, Lothar H; Boesch, Christophe; Klee, Silke R; Wittig, Roman M; Calvignac-Spencer, Sébastien; Leendertz, Fabian H

    2017-08-02

    Anthrax is a globally important animal disease and zoonosis. Despite this, our current knowledge of anthrax ecology is largely limited to arid ecosystems, where outbreaks are most commonly reported. Here we show that the dynamics of an anthrax-causing agent, Bacillus cereus biovar anthracis, in a tropical rainforest have severe consequences for local wildlife communities. Using data and samples collected over three decades, we show that rainforest anthrax is a persistent and widespread cause of death for a broad range of mammalian hosts. We predict that this pathogen will accelerate the decline and possibly result in the extirpation of local chimpanzee (Pan troglodytes verus) populations. We present the epidemiology of a cryptic pathogen and show that its presence has important implications for conservation.

  19. Enhancement of an Analytical Method for the Determination of Squalene in Anthrax Vaccine Absorbed Formulations

    National Research Council Canada - National Science Library

    Spanggord, Ronald J; Sun, Meg; Lim, Peter; Ellis, William Y

    2006-01-01

    Specific lots of anthrax vaccine adsorbed administered to members of the U.S. Armed Forces have been alleged to contain squalene, a chemical purported to be associated with illnesses of Gulf War veterans...

  20. Efficacy of Oritavancin in a Murine Model of Bacillus anthracis Spore Inhalation Anthrax

    National Research Council Canada - National Science Library

    Heine, H. S; Bassett, J; Miller, L; Bassett, A; Ivins, B. E; Lehous, D; Arhin, F. F; Parr, Jr., T. R; Moeck, G

    2008-01-01

    The inhaled form of Bacillus anthracis infection may be fatal to humans. The current standard of care for inhalational anthrax postexposure prophylaxis is ciprofloxacin therapy twice daily for 60 days...

  1. Persistent anthrax as a major driver of wildlife mortality in a tropical rainforest

    Science.gov (United States)

    Hoffmann, Constanze; Zimmermann, Fee; Biek, Roman; Kuehl, Hjalmar; Nowak, Kathrin; Mundry, Roger; Agbor, Anthony; Angedakin, Samuel; Arandjelovic, Mimi; Blankenburg, Anja; Brazolla, Gregory; Corogenes, Katherine; Couacy-Hymann, Emmanuel; Deschner, Tobias; Dieguez, Paula; Dierks, Karsten; Düx, Ariane; Dupke, Susann; Eshuis, Henk; Formenty, Pierre; Yuh, Yisa Ginath; Goedmakers, Annemarie; Gogarten, Jan F.; Granjon, Anne-Céline; McGraw, Scott; Grunow, Roland; Hart, John; Jones, Sorrel; Junker, Jessica; Kiang, John; Langergraber, Kevin; Lapuente, Juan; Lee, Kevin; Leendertz, Siv Aina; Léguillon, Floraine; Leinert, Vera; Löhrich, Therese; Marrocoli, Sergio; Mätz-Rensing, Kerstin; Meier, Amelia; Merkel, Kevin; Metzger, Sonja; Murai, Mizuki; Niedorf, Svenja; de Nys, Hélène; Sachse, Andreas; van Schijndel, Joost; Thiesen, Ulla; Ton, Els; Wu, Doris; Wieler, Lothar H.; Boesch, Christophe; Klee, Silke R.; Wittig, Roman M.; Calvignac-Spencer, Sébastien; Leendertz, Fabian H.

    2017-08-01

    Anthrax is a globally important animal disease and zoonosis. Despite this, our current knowledge of anthrax ecology is largely limited to arid ecosystems, where outbreaks are most commonly reported. Here we show that the dynamics of an anthrax-causing agent, Bacillus cereus biovar anthracis, in a tropical rainforest have severe consequences for local wildlife communities. Using data and samples collected over three decades, we show that rainforest anthrax is a persistent and widespread cause of death for a broad range of mammalian hosts. We predict that this pathogen will accelerate the decline and possibly result in the extirpation of local chimpanzee (Pan troglodytes verus) populations. We present the epidemiology of a cryptic pathogen and show that its presence has important implications for conservation.

  2. Antibodies to Anthrax Toxin in Humans and Guinea Pigs and Their Relevance to Protective Immunity

    National Research Council Canada - National Science Library

    Turnbull, P

    1988-01-01

    ... stimulation of more than just production of antibody to PA. Titers to the three components in sera of individuals with histories of clinically diagnosed anthrax as well as from human vaccinees are included in the report.

  3. The Importance of Health Risk Communication in the Creation of the Anthrax Vaccine Immunization Program

    National Research Council Canada - National Science Library

    Freeman, Bradley

    2001-01-01

    ... press. This paper suggests that a more proactive educational program with a greater utilization of health risk communication techniques would have reduced much of the negative reaction to the anthrax vaccine...

  4. Soil geochemical parameters influencing the spatial distribution of anthrax in Northwest Minnesota, USA

    International Nuclear Information System (INIS)

    Nath, Samuel; Dere, Ashlee

    2016-01-01

    Bacillus anthracis is the pathogenic bacterium that causes anthrax, which dwells in soils as highly resilient endospores. B. anthracis spore viability in soil is dependent upon environmental conditions, but the soil properties necessary for spore survival are unclear. In this study we used a range of soil geochemical and physical parameters to predict the spatial distribution of B. anthracis in northwest Minnesota, where 64 cases of anthrax in livestock were reported from 2000 to 2013. Two modeling approaches at different spatial scales were used to identify the soil conditions most correlated to known anthrax cases using both statewide and locally collected soil data. Ecological niche models were constructed using the Maximum Entropy (Maxent) approach and included 11 soil parameters as environmental inputs and recorded anthrax cases as known presences. One ecological niche model used soil data and anthrax presences for the entire state while a second model used locally sampled soil data (n = 125) and a subset of anthrax presences, providing a test of spatial scale. In addition, simple logistic regression models using the localized soil data served as an independent measure of variable importance. Maxent model results indicate that at a statewide level, soil calcium and magnesium concentrations, soil pH, and sand content are the most important properties for predicting soil suitability for B. anthracis while at the local level, clay and sand content along with phosphorous and strontium concentrations are most important. These results also show that the spatial scale of analysis is important when considering soil parameters most important for B. anthracis spores. For example, at a broad scale, B. anthracis spores may require Ca-rich soils and an alkaline pH, but may also concentrate in microenvironments with high Sr concentrations. The study is also one of the first ecological niche models that demonstrates the major importance of soil texture for defining

  5. In Silico screening for functional candidates amongst hypothetical proteins

    DEFF Research Database (Denmark)

    Desler, Claus; Suravajhala, Prashanth; Sanderhoff, May

    2009-01-01

    eukaryotes. With the general belief that the majority of hypothetical proteins are the product of pseudogenes, it is essential to have a tool with the ability of pinpointing the minority of hypothetical proteins with a high probability of being expressed. RESULTS: Here, we present an in silico selection...

  6. [Properties of live antibiotics-resistant anthrax vaccine STI-PR after long-term storage].

    Science.gov (United States)

    Aksenova, L Iu; Buravtseva, N P; Kogotkova, O I; Eremenko, E I; Tsygankova, O I

    2007-01-01

    Study showed that cultural, morphologic, genetic, immunologic characteristics, and resistance to antibiotics of STI-PR anthrax vaccine did not change after storage during 20 years in lyophilized condition. It has been shown that medium for lyophilization plays important role in preservation of vitality of anthrax spores. Optimal preservative properties have been observed for thioureal and sucrose-gelatinous media for lyophilization. Obtained results give reasons for prolongation of shelf live of STI-PR vaccine from 2 - 3 to 5 - 8 years.

  7. Cutaneous anthrax in the northeast of Iran: A case report and review of the literature

    Directory of Open Access Journals (Sweden)

    Mohsen Karbalaei Zadeh Babaki

    2018-02-01

    Full Text Available Bacillus anthracis is an aerobic, gram-positive, and spore-forming Bacillus species. The most common form of anthrax infection is the cutaneous form. The infection usually develops several days after exposure to products of infected animals and manifest as black sore with severe swelling on the skin.A 52-year-old female with a black and swollen lesion on her index finger presented to Ghaem Hospital, Mashhad, Iran, in October 2015. Biopsy and swab culture were performed immediately. Cutaneous anthrax was characterized by microscopic examination of B. anthracis spore using Gram staining. The patient was then treated with antibiotics after diagnosis.According to the reports of Provincial Health Center of Khorasan Razavi, northeast of Iran, no cases of anthrax have been reported in humans since 2013. There were neither occupational risk factors, nor any routine predisposing factors for acquiring anthrax in this woman. Although this patient is the first case reported with cutaneous anthrax since the past three years, two cases of sheep anthrax have been reported in Khorasan Razavi Province during 2013-2015. This patient had a history of contact with the skull of a slaughtered sheep. The patient was treated after making correct and rapid diagnosis and sufficient antibiotic therapy.

  8. Cardiac-specific catalase overexpression rescues anthrax lethal toxin-induced cardiac contractile dysfunction: role of oxidative stress and autophagy

    OpenAIRE

    Kandadi, Machender R; Yu, Xuejun; Frankel, Arthur E; Ren, Jun

    2012-01-01

    Abstract Background Lethal and edema toxins secreted by Bacillus anthracis during anthrax infection were found to incite serious cardiovascular complications. However, the underlying mechanisms in anthrax lethal toxin-induced cardiac anomalies remain unknown. This study was designed to evaluate the impact of antioxidant enzyme catalase in anthrax lethal toxin-induced cardiomyocyte contractile dysfunction. Methods Wild type (WT) and cardiac-specific catalase overexpression mice were challenged...

  9. The Effects of Anthrax Lethal Toxin on Host Barrier Function

    Directory of Open Access Journals (Sweden)

    David M. Frucht

    2011-06-01

    Full Text Available The pathological actions of anthrax toxin require the activities of its edema factor (EF and lethal factor (LF enzyme components, which gain intracellular access via its receptor-binding component, protective antigen (PA. LF is a metalloproteinase with specificity for selected mitogen-activated protein kinase kinases (MKKs, but its activity is not directly lethal to many types of primary and transformed cells in vitro. Nevertheless, in vivo treatment of several animal species with the combination of LF and PA (termed lethal toxin or LT leads to morbidity and mortality, suggesting that LT-dependent toxicity is mediated by cellular interactions between host cells. Decades of research have revealed that a central hallmark of this toxicity is the disruption of key cellular barriers required to maintain homeostasis. This review will focus on the current understanding of the effects of LT on barrier function, highlighting recent progress in establishing the molecular mechanisms underlying these effects.

  10. Anthrax Cases Associated with Animal-Hair Shaving Brushes.

    Science.gov (United States)

    Szablewski, Christine M; Hendricks, Kate; Bower, William A; Shadomy, Sean V; Hupert, Nathaniel

    2017-05-01

    During the First World War, anthrax cases in the United States and England increased greatly and seemed to be associated with use of new shaving brushes. Further investigation revealed that the source material and origin of shaving brushes had changed during the war. Cheap brushes of imported horsehair were being made to look like the preferred badger-hair brushes. Unfortunately, some of these brushes were not effectively disinfected and brought with them a nasty stowaway: Bacillus anthracis. A review of outbreak summaries, surveillance data, and case reports indicated that these cases originated from the use of ineffectively disinfected animal-hair shaving brushes. This historical information is relevant to current public health practice because renewed interest in vintage and animal-hair shaving brushes has been seen in popular culture. This information should help healthcare providers and public health officials answer questions on this topic.

  11. Heart Attack Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for heart...

  12. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  13. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  14. Temporal dynamics in microbial soil communities at anthrax carcass sites.

    Science.gov (United States)

    Valseth, Karoline; Nesbø, Camilla L; Easterday, W Ryan; Turner, Wendy C; Olsen, Jaran S; Stenseth, Nils Chr; Haverkamp, Thomas H A

    2017-09-26

    Anthrax is a globally distributed disease affecting primarily herbivorous mammals. It is caused by the soil-dwelling and spore-forming bacterium Bacillus anthracis. The dormant B. anthracis spores become vegetative after ingestion by grazing mammals. After killing the host, B. anthracis cells return to the soil where they sporulate, completing the lifecycle of the bacterium. Here we present the first study describing temporal microbial soil community changes in Etosha National Park, Namibia, after decomposition of two plains zebra (Equus quagga) anthrax carcasses. To circumvent state-associated-challenges (i.e. vegetative cells/spores) we monitored B. anthracis throughout the period using cultivation, qPCR and shotgun metagenomic sequencing. The combined results suggest that abundance estimation of spore-forming bacteria in their natural habitat by DNA-based approaches alone is insufficient due to poor recovery of DNA from spores. However, our combined approached allowed us to follow B. anthracis population dynamics (vegetative cells and spores) in the soil, along with closely related organisms from the B. cereus group, despite their high sequence similarity. Vegetative B. anthracis abundance peaked early in the time-series and then dropped when cells either sporulated or died. The time-series revealed that after carcass deposition, the typical semi-arid soil community (e.g. Frankiales and Rhizobiales species) becomes temporarily dominated by the orders Bacillales and Pseudomonadales, known to contain plant growth-promoting species. Our work indicates that complementing DNA based approaches with cultivation may give a more complete picture of the ecology of spore forming pathogens. Furthermore, the results suggests that the increased vegetation biomass production found at carcass sites is due to both added nutrients and the proliferation of microbial taxa that can be beneficial for plant growth. Thus, future B. anthracis transmission events at carcass sites may be

  15. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  16. In Silico screening for functional candidates amongst hypothetical proteins

    Directory of Open Access Journals (Sweden)

    Sanderhoff May

    2009-09-01

    Full Text Available Abstract Background The definition of a hypothetical protein is a protein that is predicted to be expressed from an open reading frame, but for which there is no experimental evidence of translation. Hypothetical proteins constitute a substantial fraction of proteomes of human as well as of other eukaryotes. With the general belief that the majority of hypothetical proteins are the product of pseudogenes, it is essential to have a tool with the ability of pinpointing the minority of hypothetical proteins with a high probability of being expressed. Results Here, we present an in silico selection strategy where eukaryotic hypothetical proteins are sorted according to two criteria that can be reliably identified in silico: the presence of subcellular targeting signals and presence of characterized protein domains. To validate the selection strategy we applied it on a database of human hypothetical proteins dating to 2006 and compared the proteins predicted to be expressed by our selecting strategy, with their status in 2008. For the comparison we focused on mitochondrial proteins, since considerable amounts of research have focused on this field in between 2006 and 2008. Therefore, many proteins, defined as hypothetical in 2006, have later been characterized as mitochondrial. Conclusion Among the total amount of human proteins hypothetical in 2006, 21% have later been experimentally characterized and 6% of those have been shown to have a role in a mitochondrial context. In contrast, among the selected hypothetical proteins from the 2006 dataset, predicted by our strategy to have a mitochondrial role, 53-62% have later been experimentally characterized, and 85% of these have actually been assigned a role in mitochondria by 2008. Therefore our in silico selection strategy can be used to select the most promising candidates for subsequent in vitro and in vivo analyses.

  17. The evaluation of clinical and laboratory findings of 63 inpatient with cutaneous anthrax: Characteristics of cutaneous anthrax in Turkey

    Directory of Open Access Journals (Sweden)

    Hatice Uce Özkol

    2014-12-01

    Full Text Available Background and Design: Despite a very uncommon disease in developed countries, cutaneous anthrax (CA is currently endemic in our countries. In this study, we aimed to bring out characteristic of anthrax of Turkey by comparing our results and the other CA reports in Turkey. Materials and Methods: Sixty three inpatients with CA between October 2009 and December 2012 were investigated retrospectively. All patients were diagnosed CA by clinical finding and/or microbiological examination. The demographic characteristics patient, routine tests, wound culture and gram staining results were recorded. Results were recorded on statistical program of SPSS 13.0 and were written using percent (%. Results: There were 63 inpatients (41 female (65.1%, 22 male (34.9%, mean age 35.9 years range10-83. Forty nine patients (77.8% had a history of contact with animals or animal product. Thirty-eight (60.3% and twenty-one (33.3% patients were found in the summer and fall season, respectively. Gram staining and culture were performed in 51 patients. Gram-positive bacilli were detected in 17 patients (33.3% by gram smear. Bacillus anthracis bacilli were produced in 11 patients (21.5% in cultures test. The lesions were mostly seen on the left hand (30.2%. Penicillin was most frequently preferred in treatment of CA (87.3%. Conclusion: CA is still endemic in Eastern Anatolia and continues to increase in recent years. Women living in the villages in which income is obtained from buying and selling of animals constitute the most important risk group. Preventive actions such as training of the risky society, vaccination of animals, and obstructing of illegal animal entries across the border, will reduce the incidence of CA.

  18. Assessment of listing and categorisation of animal diseases within the framework of the Animal Health Law (Regulation (EU) No 2016/429): anthrax

    DEFF Research Database (Denmark)

    EFSA Panel on Animal Health and Welfare; More, Simon J.; Bøtner, Anette

    2017-01-01

    Anthrax has been assessed according to the criteria of the Animal Health Law (AHL), in particular criteria of Article 7 on disease profile and impacts, Article 5 on the eligibility of anthrax to be listed, Article 9 for the categorisation of anthrax according to disease prevention and control rul...... species to be listed for anthrax according to Article 8(3) are several species of mammals, birds and reptiles, and susceptible herbivores and pigs as reservoir....

  19. Monte Carlo N-particle simulation of neutron-based sterilisation of anthrax contamination.

    Science.gov (United States)

    Liu, B; Xu, J; Liu, T; Ouyang, X

    2012-10-01

    To simulate the neutron-based sterilisation of anthrax contamination by Monte Carlo N-particle (MCNP) 4C code. Neutrons are elementary particles that have no charge. They are 20 times more effective than electrons or γ-rays in killing anthrax spores on surfaces and inside closed containers. Neutrons emitted from a (252)Cf neutron source are in the 100 keV to 2 MeV energy range. A 2.5 MeV D-D neutron generator can create neutrons at up to 10(13) n s(-1) with current technology. All these enable an effective and low-cost method of killing anthrax spores. There is no effect on neutron energy deposition on the anthrax sample when using a reflector that is thicker than its saturation thickness. Among all three reflecting materials tested in the MCNP simulation, paraffin is the best because it has the thinnest saturation thickness and is easy to machine. The MCNP radiation dose and fluence simulation calculation also showed that the MCNP-simulated neutron fluence that is needed to kill the anthrax spores agrees with previous analytical estimations very well. The MCNP simulation indicates that a 10 min neutron irradiation from a 0.5 g (252)Cf neutron source or a 1 min neutron irradiation from a 2.5 MeV D-D neutron generator may kill all anthrax spores in a sample. This is a promising result because a 2.5 MeV D-D neutron generator output >10(13) n s(-1) should be attainable in the near future. This indicates that we could use a D-D neutron generator to sterilise anthrax contamination within several seconds.

  20. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  1. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  2. The political attack ad

    Directory of Open Access Journals (Sweden)

    Palma Peña-Jiménez, Ph.D.

    2011-01-01

    Full Text Available During election campaigns the political spot has a clear objective: to win votes. This message is communicated to the electorate through television and Internet, and usually presents a negative approach, which includes a direct critical message against the opponent, rather than an exposition of proposals. This article is focused on the analysis of the campaign attack video ad purposely created to encourage the disapproval of the political opponent among voters. These ads focus on discrediting the opponent, many times, through the transmission of ad hominem messages, instead of disseminating the potential of the political party and the virtues and manifesto of its candidate. The article reviews the development of the attack ad since its first appearance, which in Spain dates back to 1996, when the famous Doberman ad was broadcast, and examines the most memorable campaign attack ads.

  3. A fatal elephant attack.

    Science.gov (United States)

    Hejna, Petr; Zátopková, Lenka; Safr, Miroslav

    2012-01-01

    A rare case of an elephant attack is presented. A 44-year-old man working as an elephant keeper was attacked by a cow elephant when he tripped over a foot chain while the animal was being medically treated. The man fell down and was consequently repeatedly attacked with elephant tusks. The man sustained multiple stab injuries to both groin regions, a penetrating injury to the abdominal wall with traumatic prolapse of the loops of the small bowel, multiple defects of the mesentery, and incomplete laceration of the abdominal aorta with massive bleeding into the abdominal cavity. In addition to the penetrating injuries, the man sustained multiple rib fractures with contusion of both lungs and laceration of the right lobe of the liver, and comminuted fractures of the pelvic arch and left femoral body. The man died shortly after he had been received at the hospital. The cause of death was attributed to traumatic shock. © 2011 American Academy of Forensic Sciences.

  4. MCCI study for Pressurized Heavy Water Reactor under hypothetical accident condition

    International Nuclear Information System (INIS)

    Verma, Vishnu; Mukhopadhyay, Deb; Chatterjee, B.; Singh, R.K.; Vaze, K.K.

    2011-01-01

    In case of severe core damage accident in Pressurized Heavy Water Reactor (PHWR), large amount of molten corium is expected to come out into the calandria vault due to failure of calandria vessel. Molten corium at high temperature is sufficient to decompose and ablate concrete. Such attack could fail CV by basement penetration. Since containment is ultimate barrier for activity release. The Molten Core Concrete Interaction (MCCI) of the resulting pool of debris with the concrete has been identified as an important part of the accident sequence. MCCI Analysis has been carried out for PHWR for a hypothetical accident condition where total core material is considered to be relocated in calandria vault. Concrete ablation rate in vertical and radial direction is evaluated for rectangular geometry using MEDICIS module of ASTEC Code. Amount of gases released during MCCI is also evaluated. (author)

  5. Comparative toxicity and efficacy of engineered anthrax lethal toxin variants with broad anti-tumor activities

    International Nuclear Information System (INIS)

    Peters, Diane E.; Hoover, Benjamin; Cloud, Loretta Grey; Liu, Shihui; Molinolo, Alfredo A.; Leppla, Stephen H.; Bugge, Thomas H.

    2014-01-01

    We have previously designed and characterized versions of anthrax lethal toxin that are selectively cytotoxic in the tumor microenvironment and which display broad and potent anti-tumor activities in vivo. Here, we have performed the first direct comparison of the safety and efficacy of three engineered anthrax lethal toxin variants requiring activation by either matrix-metalloproteinases (MMPs), urokinase plasminogen activator (uPA) or co-localized MMP/uPA activities. C57BL/6J mice were challenged with six doses of engineered toxins via intraperitoneal (I.P.) or intravenous (I.V.) dose routes to determine the maximum tolerated dose for six administrations (MTD6) and dose-limiting toxicities. Efficacy was evaluated using the B16-BL6 syngraft model of melanoma; mice bearing established tumors were treated with six I.P. doses of toxin and tumor measurements and immunohistochemistry, paired with terminal blood work, were used to elaborate upon the anti-tumor mechanism and relative efficacy of each variant. We found that MMP-, uPA- and dual MMP/uPA-activated anthrax lethal toxins exhibited the same dose-limiting toxicity; dose-dependent GI toxicity. In terms of efficacy, all three toxins significantly reduced primary B16-BL6 tumor burden, ranging from 32% to 87% reduction, and they also delayed disease progression as evidenced by dose-dependent normalization of blood work values. While target organ toxicity and effective doses were similar amongst the variants, the dual MMP/uPA-activated anthrax lethal toxin exhibited the highest I.P. MTD6 and was 1.5–3-fold better tolerated than the single MMP- and uPA-activated toxins. Overall, we demonstrate that this dual MMP/uPA-activated anthrax lethal toxin can be administered safely and is highly effective in a preclinical model of melanoma. This modified bacterial cytotoxin is thus a promising candidate for further clinical development and evaluation for use in treating human cancers. - Highlights: • Toxicity and anti

  6. Comparative toxicity and efficacy of engineered anthrax lethal toxin variants with broad anti-tumor activities

    Energy Technology Data Exchange (ETDEWEB)

    Peters, Diane E. [Proteases and Tissue Remodeling Section, Oral and Pharyngeal Cancer Branch, National Institute of Dental and Craniofacial Research, National Institutes of Health, Bethesda, MD (United States); Program of Pharmacology and Experimental Therapeutics, Tufts University School of Medicine, Boston, MA (United States); Hoover, Benjamin [Laboratory of Parasitic Diseases, National Institute of Allergy and Infectious Diseases, National Institutes of Health, Bethesda, MD (United States); Cloud, Loretta Grey [Proteases and Tissue Remodeling Section, Oral and Pharyngeal Cancer Branch, National Institute of Dental and Craniofacial Research, National Institutes of Health, Bethesda, MD (United States); Liu, Shihui [Laboratory of Parasitic Diseases, National Institute of Allergy and Infectious Diseases, National Institutes of Health, Bethesda, MD (United States); Molinolo, Alfredo A. [Oral and Pharyngeal Cancer Branch, National Institute of Dental and Craniofacial Research, National Institutes of Health, Bethesda, MD (United States); Leppla, Stephen H. [Laboratory of Parasitic Diseases, National Institute of Allergy and Infectious Diseases, National Institutes of Health, Bethesda, MD (United States); Bugge, Thomas H., E-mail: thomas.bugge@nih.go [Proteases and Tissue Remodeling Section, Oral and Pharyngeal Cancer Branch, National Institute of Dental and Craniofacial Research, National Institutes of Health, Bethesda, MD (United States)

    2014-09-01

    We have previously designed and characterized versions of anthrax lethal toxin that are selectively cytotoxic in the tumor microenvironment and which display broad and potent anti-tumor activities in vivo. Here, we have performed the first direct comparison of the safety and efficacy of three engineered anthrax lethal toxin variants requiring activation by either matrix-metalloproteinases (MMPs), urokinase plasminogen activator (uPA) or co-localized MMP/uPA activities. C57BL/6J mice were challenged with six doses of engineered toxins via intraperitoneal (I.P.) or intravenous (I.V.) dose routes to determine the maximum tolerated dose for six administrations (MTD6) and dose-limiting toxicities. Efficacy was evaluated using the B16-BL6 syngraft model of melanoma; mice bearing established tumors were treated with six I.P. doses of toxin and tumor measurements and immunohistochemistry, paired with terminal blood work, were used to elaborate upon the anti-tumor mechanism and relative efficacy of each variant. We found that MMP-, uPA- and dual MMP/uPA-activated anthrax lethal toxins exhibited the same dose-limiting toxicity; dose-dependent GI toxicity. In terms of efficacy, all three toxins significantly reduced primary B16-BL6 tumor burden, ranging from 32% to 87% reduction, and they also delayed disease progression as evidenced by dose-dependent normalization of blood work values. While target organ toxicity and effective doses were similar amongst the variants, the dual MMP/uPA-activated anthrax lethal toxin exhibited the highest I.P. MTD6 and was 1.5–3-fold better tolerated than the single MMP- and uPA-activated toxins. Overall, we demonstrate that this dual MMP/uPA-activated anthrax lethal toxin can be administered safely and is highly effective in a preclinical model of melanoma. This modified bacterial cytotoxin is thus a promising candidate for further clinical development and evaluation for use in treating human cancers. - Highlights: • Toxicity and anti

  7. Tumor endothelium marker-8 based decoys exhibit superiority over capillary morphogenesis protein-2 based decoys as anthrax toxin inhibitors.

    Directory of Open Access Journals (Sweden)

    Chenguang Cai

    Full Text Available Anthrax toxin is the major virulence factor produced by Bacillus anthracis. The toxin consists of three protein subunits: protective antigen (PA, lethal factor, and edema factor. Inhibition of PA binding to its receptors, tumor endothelium marker-8 (TEM8 and capillary morphogenesis protein-2 (CMG2 can effectively block anthrax intoxication, which is particularly valuable when the toxin has already been overproduced at the late stage of anthrax infection, thus rendering antibiotics ineffectual. Receptor-like agonists, such as the mammalian cell-expressed von Willebrand factor type A (vWA domain of CMG2 (sCMG2, have demonstrated potency against the anthrax toxin. However, the soluble vWA domain of TEM8 (sTEM8 was ruled out as an anthrax toxin inhibitor candidate due to its inferior affinity to PA. In the present study, we report that L56A, a PA-binding-affinity-elevated mutant of sTEM8, could inhibit anthrax intoxication as effectively as sCMG2 in Fisher 344 rats. Additionally, pharmacokinetics showed that L56A and sTEM8 exhibit advantages over sCMG2 with better lung-targeting and longer plasma retention time, which may contribute to their enhanced protective ability in vivo. Our results suggest that receptor decoys based on TEM8 are promising anthrax toxin inhibitors and, together with the pharmacokinetic studies in this report, may contribute to the development of novel anthrax drugs.

  8. The Disulfide Bond Cys255-Cys279 in the Immunoglobulin-Like Domain of Anthrax Toxin Receptor 2 Is Required for Membrane Insertion of Anthrax Protective Antigen Pore.

    Directory of Open Access Journals (Sweden)

    Pedro Jacquez

    Full Text Available Anthrax toxin receptors act as molecular clamps or switches that control anthrax toxin entry, pH-dependent pore formation, and translocation of enzymatic moieties across the endosomal membranes. We previously reported that reduction of the disulfide bonds in the immunoglobulin-like (Ig domain of the anthrax toxin receptor 2 (ANTXR2 inhibited the function of the protective antigen (PA pore. In the present study, the disulfide linkage in the Ig domain was identified as Cys255-Cys279 and Cys230-Cys315. Specific disulfide bond deletion mutants were achieved by replacing Cys residues with Ala residues. Deletion of the disulfide bond C255-C279, but not C230-C315, inhibited the PA pore-induced release of the fluorescence dyes from the liposomes, suggesting that C255-C279 is essential for PA pore function. Furthermore, we found that deletion of C255-C279 did not affect PA prepore-to-pore conversion, but inhibited PA pore membrane insertion by trapping the PA membrane-inserting loops in proteinaceous hydrophobic pockets. Fluorescence spectra of Trp59, a residue adjacent to the PA-binding motif in von Willebrand factor A (VWA domain of ANTXR2, showed that deletion of C255-C279 resulted in a significant conformational change on the receptor ectodomain. The disulfide deletion-induced conformational change on the VWA domain was further confirmed by single-particle 3D reconstruction of the negatively stained PA-receptor heptameric complexes. Together, the biochemical and structural data obtained in this study provides a mechanistic insight into the role of the receptor disulfide bond C255-C279 in anthrax toxin action. Manipulation of the redox states of the receptor, specifically targeting to C255-C279, may become a novel strategy to treat anthrax.

  9. Potent antitumor activity of a urokinase-activated engineered anthrax toxin

    Science.gov (United States)

    Liu, Shihui; Aaronson, Hannah; Mitola, David J.; Leppla, Stephen H.; Bugge, Thomas H.

    2003-01-01

    The acquisition of cell-surface urokinase plasminogen activator activity is a hallmark of malignancy. We generated an engineered anthrax toxin that is activated by cell-surface urokinase in vivo and displays limited toxicity to normal tissue but broad and potent tumoricidal activity. Native anthrax toxin protective antigen, when administered with a chimeric anthrax toxin lethal factor, Pseudomonas exotoxin fusion protein, was extremely toxic to mice, causing rapid and fatal organ damage. Replacing the furin activation sequence in anthrax toxin protective antigen with an artificial peptide sequence efficiently activated by urokinase greatly attenuated toxicity to mice. In addition, the mutation conferred cell-surface urokinase-dependent toxin activation in vivo, as determined by using a panel of plasminogen, plasminogen activator, plasminogen activator receptor, and plasminogen activator inhibitor-deficient mice. Surprisingly, toxin activation critically depended on both urokinase plasminogen activator receptor and plasminogen in vivo, showing that both proteins are essential cofactors for the generation of cell-surface urokinase. The engineered toxin displayed potent tumor cell cytotoxicity to a spectrum of transplanted tumors of diverse origin and could eradicate established solid tumors. This tumoricidal activity depended strictly on tumor cell-surface plasminogen activation. The data show that a simple change of protease activation specificity converts anthrax toxin from a highly lethal to a potent tumoricidal agent.

  10. Progress and novel strategies in vaccine development and treatment of anthrax.

    Science.gov (United States)

    Chitlaru, Theodor; Altboum, Zeev; Reuveny, Shaul; Shafferman, Avigdor

    2011-01-01

    The lethal anthrax disease is caused by spores of the gram-positive Bacillus anthracis, a member of the cereus group of bacilli. Although the disease is very rare in the Western world, development of anthrax countermeasures gains increasing attention due to the potential use of B. anthracis spores as a bio-terror weapon. Protective antigen (PA), the non-toxic subunit of the bacterial secreted exotoxin, fulfills the role of recognizing a specific receptor and mediating the entry of the toxin into the host target cells. PA elicits a protective immune response and represents the basis for all current anthrax vaccines. Anti-PA neutralizing antibodies are useful correlates for protection and for vaccine efficacy evaluation. Post exposure anti-toxemic and anti-bacteremic prophylactic treatment of anthrax requires prolonged antibiotic administration. Shorter efficient postexposure treatments may require active or passive immunization, in addition to antibiotics. Although anthrax is acknowledged as a toxinogenic disease, additional factors, other than the bacterial toxin, may be involved in the virulence of B. anthracis and may be needed for the long-lasting protection conferred by PA immunization. The search for such novel factors is the focus of several high throughput genomic and proteomic studies that are already leading to identification of novel targets for therapeutics, for vaccine candidates, as well as biomarkers for detection and diagnosis. © 2010 John Wiley & Sons A/S.

  11. Evaluation of cutaneous anthrax cases during an outbreak in the east region of Turkey.

    Science.gov (United States)

    Kural Ünüvar, Esra; Akgün Karapınar, Deniz Bahar; Dizen Namdar, Nazlı

    2016-11-17

    Anthrax is a zoonotic infection caused by Bacillus anthracis. We aimed to retrospectively evaluate cutaneous anthrax cases that occurred during an outbreak in eastern Turkey (Hakkari-Yüksekova), where people mostly earn their living from animal husbandry. Forty-six cutaneous anthrax patients that were admitted to the hospital during a very short duration of 3 months (June-August 2011) were evaluated. Out of 46 patients, 27 (52%) were women and 19 (48%) were men. The mean age was 37 ± 13 years. The distribution of occupations was 1 butcher, 1 cook, 5 farmers, 27 housewives, 11 shepherds, and 1 teacher. Multiple lesions were seen in 7 patients (15%) and the rest of the patients had only 1 lesion. We observed significant clinical differences among the cases and noted which particular symptoms were associated with the various skin lesions. We treated our patients with intramuscular procaine penicillin or oral ciprofloxacin/doxycycline. Anthrax is an important health problem that can cause lethal outbreaks. Therefore, one should think about anthrax when faced with a patient with history of animal contact that has a painless ulcer with edema and/or vesicles, especially in endemic countries like Turkey.

  12. Survival of the relocated population of the U. S. after a nuclear attack. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Haaland, C.M.; Chester, C.V.; Wigner, E.P.

    1976-06-01

    The feasibility of continued survival after a hypothetical nuclear attack is evaluated for people relocated from high-risk areas during the crisis period before the attack. The attack consists of 6559 MT, of which 5951 MT are ground bursts on military, industrial, and urban targets. Relocated people are assumed to be adequately protected from fallout radiation by shelters of various kinds. The major problems in the postattack situation will be the control of exposure to fallout radiation, and prevention of severe food shortages to several tens of millions of people.

  13. Anthrax does not forgive mistakes: the information assessment following the yamal peninsula outbreak in the summer of 2016

    Directory of Open Access Journals (Sweden)

    I. V. Shestakova

    2017-01-01

    Full Text Available For the first time in a long time period the sources of actual information about anthrax in Russia and in the world are systematized. The essence of the problem, features of epidemiology and clinical manifestations of the current forms of anthrax disease are analyzed. The upgraded classification of anthrax is presented, the clinical manifestations of oro-oropharyngeal varieties of intestinal form and injectable form of anthrax are described, according to extensive literature data and international guidelines and recommendations. The recommendations for clinical management of patients and diagnosis of disease are given. The need for strict compliance to the vaccination requirements of anthrax among animals and persons from risk groups is proven.

  14. Attacker Model Lab

    OpenAIRE

    2006-01-01

    tut quiz present Tutorial Quiz Presentation Interactive Media Element This interactive tutorial the two sub-classes of computer attackers: amateurs and professionals. It provides valuable insight into the nature of necessary protection measure for information assets. CS3600 Information Assurance: Introduction to Computer Security Course

  15. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... major stroke. It's important to call 9-1-1 immediately for any stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. The content in this ...

  16. Temporal Cyber Attack Detection.

    Energy Technology Data Exchange (ETDEWEB)

    Ingram, Joey Burton [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Draelos, Timothy J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Galiardi, Meghan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Doak, Justin E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Rigorous characterization of the performance and generalization ability of cyber defense systems is extremely difficult, making it hard to gauge uncertainty, and thus, confidence. This difficulty largely stems from a lack of labeled attack data that fully explores the potential adversarial space. Currently, performance of cyber defense systems is typically evaluated in a qualitative manner by manually inspecting the results of the system on live data and adjusting as needed. Additionally, machine learning has shown promise in deriving models that automatically learn indicators of compromise that are more robust than analyst-derived detectors. However, to generate these models, most algorithms require large amounts of labeled data (i.e., examples of attacks). Algorithms that do not require annotated data to derive models are similarly at a disadvantage, because labeled data is still necessary when evaluating performance. In this work, we explore the use of temporal generative models to learn cyber attack graph representations and automatically generate data for experimentation and evaluation. Training and evaluating cyber systems and machine learning models requires significant, annotated data, which is typically collected and labeled by hand for one-off experiments. Automatically generating such data helps derive/evaluate detection models and ensures reproducibility of results. Experimentally, we demonstrate the efficacy of generative sequence analysis techniques on learning the structure of attack graphs, based on a realistic example. These derived models can then be used to generate more data. Additionally, we provide a roadmap for future research efforts in this area.

  17. Modeling the environmental suitability of anthrax in Ghana and estimating populations at risk: Implications for vaccination and control.

    Science.gov (United States)

    Kracalik, Ian T; Kenu, Ernest; Ayamdooh, Evans Nsoh; Allegye-Cudjoe, Emmanuel; Polkuu, Paul Nokuma; Frimpong, Joseph Asamoah; Nyarko, Kofi Mensah; Bower, William A; Traxler, Rita; Blackburn, Jason K

    2017-10-01

    Anthrax is hyper-endemic in West Africa. Despite the effectiveness of livestock vaccines in controlling anthrax, underreporting, logistics, and limited resources makes implementing vaccination campaigns difficult. To better understand the geographic limits of anthrax, elucidate environmental factors related to its occurrence, and identify human and livestock populations at risk, we developed predictive models of the environmental suitability of anthrax in Ghana. We obtained data on the location and date of livestock anthrax from veterinary and outbreak response records in Ghana during 2005-2016, as well as livestock vaccination registers and population estimates of characteristically high-risk groups. To predict the environmental suitability of anthrax, we used an ensemble of random forest (RF) models built using a combination of climatic and environmental factors. From 2005 through the first six months of 2016, there were 67 anthrax outbreaks (851 cases) in livestock; outbreaks showed a seasonal peak during February through April and primarily involved cattle. There was a median of 19,709 vaccine doses [range: 0-175 thousand] administered annually. Results from the RF model suggest a marked ecological divide separating the broad areas of environmental suitability in northern Ghana from the southern part of the country. Increasing alkaline soil pH was associated with a higher probability of anthrax occurrence. We estimated 2.2 (95% CI: 2.0, 2.5) million livestock and 805 (95% CI: 519, 890) thousand low income rural livestock keepers were located in anthrax risk areas. Based on our estimates, the current anthrax vaccination efforts in Ghana cover a fraction of the livestock potentially at risk, thus control efforts should be focused on improving vaccine coverage among high risk groups.

  18. Modeling the environmental suitability of anthrax in Ghana and estimating populations at risk: Implications for vaccination and control.

    Directory of Open Access Journals (Sweden)

    Ian T Kracalik

    2017-10-01

    Full Text Available Anthrax is hyper-endemic in West Africa. Despite the effectiveness of livestock vaccines in controlling anthrax, underreporting, logistics, and limited resources makes implementing vaccination campaigns difficult. To better understand the geographic limits of anthrax, elucidate environmental factors related to its occurrence, and identify human and livestock populations at risk, we developed predictive models of the environmental suitability of anthrax in Ghana. We obtained data on the location and date of livestock anthrax from veterinary and outbreak response records in Ghana during 2005-2016, as well as livestock vaccination registers and population estimates of characteristically high-risk groups. To predict the environmental suitability of anthrax, we used an ensemble of random forest (RF models built using a combination of climatic and environmental factors. From 2005 through the first six months of 2016, there were 67 anthrax outbreaks (851 cases in livestock; outbreaks showed a seasonal peak during February through April and primarily involved cattle. There was a median of 19,709 vaccine doses [range: 0-175 thousand] administered annually. Results from the RF model suggest a marked ecological divide separating the broad areas of environmental suitability in northern Ghana from the southern part of the country. Increasing alkaline soil pH was associated with a higher probability of anthrax occurrence. We estimated 2.2 (95% CI: 2.0, 2.5 million livestock and 805 (95% CI: 519, 890 thousand low income rural livestock keepers were located in anthrax risk areas. Based on our estimates, the current anthrax vaccination efforts in Ghana cover a fraction of the livestock potentially at risk, thus control efforts should be focused on improving vaccine coverage among high risk groups.

  19. The medicinal chemistry of botulinum, ricin and anthrax toxins.

    Science.gov (United States)

    Hicks, Rickey P; Hartell, Mark G; Nichols, Daniel A; Bhattacharjee, Apurba K; van Hamont, John E; Skillman, Donald R

    2005-01-01

    The potential use of weapons of mass destruction (nuclear, biological or chemical) by terrorist organizations represents a major threat to world peace and safety. Only a limited number of vaccines are available to protect the general population from the medical consequences of these weapons. In addition there are major health concerns associated with a pre-exposure mass vaccination of the general population. To reduce or eliminate the impact of these terrible threats, new drugs must be developed to safely treat individuals exposed to these agents. A review of all therapeutic agents under development for the treatment of the illnesses and injuries that result from exposure to nuclear, biological or chemical warfare agents is beyond the scope of any single article. The intent here is to provide a focused review for medicinal and organic chemists of three widely discussed and easily deployed biological warfare agents, botulinum neurotoxin and ricin toxins and the bacteria Bacillus anthracis. Anthrax will be addressed because of its similarity in both structure and mechanism of catalytic activity with botulinum toxin. The common feature of these three agents is that they exhibit their biological activity via toxin enzymatic hydrolysis of a specific bond in their respective substrate molecules. A brief introduction to the history of each of the biological warfare agents is presented followed by a discussion on the mechanisms of action of each at the molecular level, and a review of current potential inhibitors under investigation.

  20. Anthrax Sampling and Decontamination: Technology Trade-Offs

    Energy Technology Data Exchange (ETDEWEB)

    Price, Phillip N.; Hamachi, Kristina; McWilliams, Jennifer; Sohn, Michael D.

    2008-09-12

    The goal of this project was to answer the following questions concerning response to a future anthrax release (or suspected release) in a building: 1. Based on past experience, what rules of thumb can be determined concerning: (a) the amount of sampling that may be needed to determine the extent of contamination within a given building; (b) what portions of a building should be sampled; (c) the cost per square foot to decontaminate a given type of building using a given method; (d) the time required to prepare for, and perform, decontamination; (e) the effectiveness of a given decontamination method in a given type of building? 2. Based on past experience, what resources will be spent on evaluating the extent of contamination, performing decontamination, and assessing the effectiveness of the decontamination in abuilding of a given type and size? 3. What are the trade-offs between cost, time, and effectiveness for the various sampling plans, sampling methods, and decontamination methods that have been used in the past?

  1. Naturally acquired anthrax antibodies in a cheetah (Acinonyx jubatus) in Botswana.

    Science.gov (United States)

    Good, Kyle M; Houser, Annmarie; Arntzen, Lorraine; Turnbull, Peter C B

    2008-07-01

    An outbreak of anthrax in the Jwana Game Reserve in Jwaneng, Botswana, was first observed when three cheetahs (Acinonyx jubatus) died of the disease in November 2004. In the aftermath of this event, banked serum samples collected from 23 wild-caught cheetahs were examined, by the inhibition enzyme-linked immunoassay (ELISA), for antibodies to the protective antigen (PA) of Bacillus anthracis. Of the 23 cheetahs, 16 regularly accessed the reserve. Antibodies to PA were detected in one cheetah collected in May 2004, indicating the disease was occurring well before it was first noticed. This appears to be the first demonstration of naturally acquired anthrax antibodies in cheetahs. The finding of one antibody-positive animal amongst at least 16 potentially exposed individuals is consistent with existing reports that it is uncommon for cheetahs to develop natural immunity to anthrax.

  2. Blocking of Brute Force Attack

    OpenAIRE

    M.Venkata Krishna Reddy

    2012-01-01

    A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your Web site requires user authentication, you are a good target for a brute-force attack. An attacker can always discover a password through a brute-force attack, but the downside is that it co...

  3. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  4. Comparing hypothetical versus non-hypothetical methods for measuring willingness to pay in a food context

    Energy Technology Data Exchange (ETDEWEB)

    Martínez-Carrasco, L.; Brugarolas, M.; Martínez-Poveda, A.; Ruiz-Martínez, J.J.

    2015-07-01

    Choosing a valid procedure to measure willingness to pay (WTP) is crucial for designating optimum price policies or for evaluating the demand for new products. This study compares two methods for obtaining WTP in a food context: a random nth price auction and an open-ended contingent valuation (CV) question. Participants were regular salad tomato buyers of Alicante and they were randomly assigned to one of the two treatments. The products about which they would show their WTP were traditional tomato varieties. Both treatments were divided into three stages: in the first stage the only available information was a reference price for the tomatoes. In stages 2 and 3 we revealed the local origin and the organic grown of the tomatoes respectively. Our results show that in the auction the percentage of participants willing to pay the same or more than the reference price was between 20 and 30%. In the CV method this percentage was between 40 and 65%. The mean WTP in the auction, considering the whole of the individuals, was situated between 1.90 and 2.13 €/kg. These same results obtained through the CV were situated between 2.54 and 3.21 €/kg. The results confirmed the findings of previous papers in which the hypothetical bias of CV was clarified because it yields higher values for WTP than the auction, especially when referring to the number of individuals willing to pay more. Additionally, hedonic price models were estimated for the prices obtained by both methods with the result that in all the models, WTP was directly related to the price paid for the latest purchase of tomatoes. (Author)

  5. Comparing hypothetical versus non-hypothetical methods for measuring willingness to pay in a food context

    Directory of Open Access Journals (Sweden)

    Laura Martínez-Carrasco

    2015-12-01

    Full Text Available Choosing a valid procedure to measure willingness to pay (WTP is crucial for designating optimum price policies or for evaluating the demand for new products. This study compares two methods for obtaining WTP in a food context: a random nth price auction and an open-ended contingent valuation (CV question. Participants were regular salad tomato buyers of Alicante and they were randomly assigned to one of the two treatments. The products about which they would show their WTP were traditional tomato varieties. Both treatments were divided into three stages: in the first stage the only available information was a reference price for the tomatoes. In stages 2 and 3 we revealed the local origin and the organic grown of the tomatoes respectively. Our results show that in the auction the percentage of participants willing to pay the same or more than the reference price was between 20 and 30%. In the CV method this percentage was between 40 and 65%. The mean WTP in the auction, considering the whole of the individuals, was situated between 1.90 and 2.13 €/kg. These same results obtained through the CV were situated between 2.54 and 3.21 €/kg. The results confirmed the findings of previous papers in which the hypothetical bias of CV was clarified because it yields higher values for WTP than the auction, especially when referring to the number of individuals willing to pay more. Additionally, hedonic price models were estimated for the prices obtained by both methods with the result that in all the models, WTP was directly related to the price paid for the latest purchase of tomatoes.

  6. Automated Discovery of Mimicry Attacks

    National Research Council Canada - National Science Library

    Giffin, Jonathon T; Jha, Somesh; Miller, Barton P

    2006-01-01

    .... These systems are useful only if they detect actual attacks. Previous research developed manually-constructed mimicry and evasion attacks that avoided detection by hiding a malicious series of system calls within a valid sequence allowed by the model...

  7. Heart Attack Symptoms in Women

    Science.gov (United States)

    ... fat, cholesterol and other substances (plaque). Watch an animation of a heart attack . Many women think the ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  8. Attack Trees with Sequential Conjunction

    NARCIS (Netherlands)

    Jhawar, Ravi; Kordy, Barbara; Mauw, Sjouke; Radomirović, Sasa; Trujillo-Rasua, Rolando

    2015-01-01

    We provide the first formal foundation of SAND attack trees which are a popular extension of the well-known attack trees. The SAND at- tack tree formalism increases the expressivity of attack trees by intro- ducing the sequential conjunctive operator SAND. This operator enables the modeling of

  9. The Evaluation of Post-Exposure Prophylaxis Models for Use in the Event of an Aerosolized Anthrax Attack

    Science.gov (United States)

    2014-09-01

    OF ABSTRACT Unclassified 20. LIMITATION OF ABSTRACT UU NSN 7540–01-280-5500 Standard Form 298 (Rev. 2–89) Prescribed by ANSI Std. 239–18 i...Roadmapping—Risk-Based Methodological Options (Livermore, CA: Sandia National Laboratories , 2008). 7 Committee on Methodological Improvements to the...through the Shelf-Life Extension Program,” Biosecurity and Bioterrorism 7, no. 1 (2009): 101–107. 13 Victor W. Sidel, Hillel W. Cohen, and Robert M

  10. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  11. On resilience studies of system detection and recovery techniques against stealthy insider attacks

    Science.gov (United States)

    Wei, Sixiao; Zhang, Hanlin; Chen, Genshe; Shen, Dan; Yu, Wei; Pham, Khanh D.; Blasch, Erik P.; Cruz, Jose B.

    2016-05-01

    With the explosive growth of network technologies, insider attacks have become a major concern to business operations that largely rely on computer networks. To better detect insider attacks that marginally manipulate network traffic over time, and to recover the system from attacks, in this paper we implement a temporal-based detection scheme using the sequential hypothesis testing technique. Two hypothetical states are considered: the null hypothesis that the collected information is from benign historical traffic and the alternative hypothesis that the network is under attack. The objective of such a detection scheme is to recognize the change within the shortest time by comparing the two defined hypotheses. In addition, once the attack is detected, a server migration-based system recovery scheme can be triggered to recover the system to the state prior to the attack. To understand mitigation of insider attacks, a multi-functional web display of the detection analysis was developed for real-time analytic. Experiments using real-world traffic traces evaluate the effectiveness of Detection System and Recovery (DeSyAR) scheme. The evaluation data validates the detection scheme based on sequential hypothesis testing and the server migration-based system recovery scheme can perform well in effectively detecting insider attacks and recovering the system under attack.

  12. Evaluation of clinical and serological findings for diagnosis of cutaneous anthrax infection after an outbreak.

    Science.gov (United States)

    Gulseren, Duygu; Süzük-Yıldız, Serap; Çelebi, Bekir; Kılıç, Selçuk

    2017-09-01

    Anthrax, caused by the bacterium Bacillus anthracis, is one of the oldest documented infectious diseases in both livestock and humans. We aimed to evaluate clinical findings and risk factors of patients with cutaneous anthrax infection and report anti-lethal factor (LF) IgG and anti-protective antigen (PA) IgG titers in the serologic diagnosis of disease. In this study, serum samples of 18 cutaneous anthrax patients were collected and anti-LF IgG and anti-PA IgG titers were measured by enzyme-linked immunosorbent assay (ELISA). Twelve (67%) males and 6 (33%) females, with a mean age of 36.06 ± 16.58 years were included in the study. Risk factors identified in the patient population studied were slaughtering (28%), flaying (56%), chopping meat (67%), burying diseased animal corpses (17%) and milking (6%) livestock. Black eschar formation (94%), pruritus (78%) and painful lymphadenopathy (61%) were first three common clinical signs and symptoms, respectively. Fourteen (78%) patients produced a positive IgG response against PA, 11 (61%) patients produced against LF. Three (17%) patients had no response to either antigen. A detailed history of contact with sick animals or animal products along with clinical findings should be taken at the first step for the diagnosis of cutaneous anthrax infection. Serologic detection of anti-LF IgG and anti-PA IgG with ELISA may be useful auxillary method for establishing the diagnosis.

  13. Analysis of anthrax and plague biowarfare vaccine interactions with human monocyte-derived dendritic cells

    NARCIS (Netherlands)

    Skowera, Anna; de Jong, Esther C.; Schuitemaker, Joost H. N.; Allen, Jennifer S.; Wessely, Simon C.; Griffiths, Gareth; Kapsenberg, Martien; Peakman, Mark

    2005-01-01

    The anti-biowarfare anthrax and plague vaccines require repeated dosing to achieve adequate protection. To test the hypothesis that this limited immunogenicity results from the nature of vaccine interactions with the host innate immune system, we investigated molecular and cellular interactions

  14. Anthrax Toxin Receptor 2–Dependent Lethal Toxin Killing In Vivo

    Science.gov (United States)

    Scobie, Heather M; Wigelsworth, Darran J; Marlett, John M; Thomas, Diane; Rainey, G. Jonah A; Lacy, D. Borden; Manchester, Marianne; Collier, R. John; Young, John A. T

    2006-01-01

    Anthrax toxin receptors 1 and 2 (ANTXR1 and ANTXR2) have a related integrin-like inserted (I) domain which interacts with a metal cation that is coordinated by residue D683 of the protective antigen (PA) subunit of anthrax toxin. The receptor-bound metal ion and PA residue D683 are critical for ANTXR1-PA binding. Since PA can bind to ANTXR2 with reduced affinity in the absence of metal ions, we reasoned that D683 mutant forms of PA might specifically interact with ANTXR2. We show here that this is the case. The differential ability of ANTXR1 and ANTXR2 to bind D683 mutant PA proteins was mapped to nonconserved receptor residues at the binding interface with PA domain 2. Moreover, a D683K mutant form of PA that bound specifically to human and rat ANTXR2 mediated killing of rats by anthrax lethal toxin, providing strong evidence for the physiological importance of ANTXR2 in anthrax disease pathogenesis. PMID:17054395

  15. Evaluation of hypothetical (153)Gd source for use in brachytherapy.

    Science.gov (United States)

    Ghorbani, Mahdi; Behmadi, Marziyeh

    2016-01-01

    The purpose of this work is to evaluate the dosimetric parameters of a hypothetical (153)Gd source for use in brachytherapy and comparison of the dosimetric parameters with those of (192)Ir and (125)I sources. Dose rate constant, the radial dose function and the two dimensional (2D) anisotropy function data for the hypothetical (153)Gd source were obtained by simulation of the source using MCNPX code and then were compared with the corresponding data reported by Enger et al. A comprehensive comparison between this hypothetical source and a (192)Ir source with similar geometry and a (125)I source was performed as well. Excellent agreement was shown between the results of the two studies. Dose rate constant values for the hypothetical (153)Gd, (192)Ir, (125)I sources are 1.173 cGyh(-1) U(-1), 1.044 cGyh(-1) U(-1), 0.925 cGyh(-1) U(-1), respectively. Radial dose function for the hypothetical (153)Gd source has an increasing trend, while (192)Ir has more uniform and (125)I has more rapidly falling off radial dose functions. 2D anisotropy functions for these three sources indicate that, except at 0.5 cm distance, (192)Ir and (125)I have more isotropic trends as compared to the (153)Gd source. A more uniform radial dose function, and 2D anisotropy functions with more isotropy, a much higher specific activity are advantages of (192)Ir source over (153)Gd. However, a longer half-life of (153)Gd source compared to the other two sources, and lower energy of the source with respect to (192)Ir are advantages of using (153)Gd in brachytherapy versus (192)Ir source.

  16. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    The need to assess security and take protection decisions is at least as old as our civilisation. However, the complexity and development speed of our interconnected technical systems have surpassed our capacity to imagine and evaluate risk scenarios. This holds in particular for risks...... that are caused by the strategic behaviour of adversaries. Therefore, technology-supported methods are needed to help us identify and manage these risks. In this paper, we describe the attack navigator: a graph-based approach to security risk assessment inspired by navigation systems. Based on maps of a socio...

  17. Attacks on computer systems

    Directory of Open Access Journals (Sweden)

    Dejan V. Vuletić

    2012-01-01

    Full Text Available Computer systems are a critical component of the human society in the 21st century. Economic sector, defense, security, energy, telecommunications, industrial production, finance and other vital infrastructure depend on computer systems that operate at local, national or global scales. A particular problem is that, due to the rapid development of ICT and the unstoppable growth of its application in all spheres of the human society, their vulnerability and exposure to very serious potential dangers increase. This paper analyzes some typical attacks on computer systems.

  18. Recent "phishing" attacks

    CERN Multimedia

    IT Department

    2009-01-01

    Over the last few weeks there has been a marked increase in the number of attacks on CERN made by cybercriminals. Typical attacks arrive in the form of e-mail messages purporting to come from the CERN Help Desk, Mail Service, or some similarly official-sounding entity and suggest that there is a problem with your account, such as it being over-quota. They then ask you to click on a link or to reply and give your password. Please don’t! Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. NEVER provide your password or other details if these are requested. These messages try to trick you into clicking on Web links which will help them to install malicious software on your computer, and anti-virus software cannot be relied on to detect all cases. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN Comput...

  19. Awareness and attitudes towards anthrax and meat consumption practices among affected communities in Zambia: A mixed methods approach.

    Directory of Open Access Journals (Sweden)

    Doreen Chilolo Sitali

    2017-05-01

    Full Text Available In Zambia, human anthrax cases often occur following cases of animal anthrax. Human behaviour has been implicated in this transmission. The objective of the study was to explore human behavioural patterns that may contribute to outbreaks of anthrax among affected communities.A mixed methods study was conducted in four districts of Zambia from November 2015 to February 2016. A cross sectional survey involving 1,127 respondents, six focus group discussions and seven key informant interviews with professional staff were conducted. Descriptive statistics on socio-demographic characteristics, awareness of anthrax, attitudes towards cattle vaccination and risk factors for anthrax and vaccination practices were run using STATA 12 for analysis.Overall, 88% of respondents heard about anthrax, 85.1% were aware that anthrax is transmitted by eating infected meat and 64.2% knew that animals and humans can be infected with anthrax. However, qualitative data suggested that awareness of anthrax varied across communities. Qualitative findings also indicated that, in Western and Muchinga provinces, human anthrax was transmitted by eating infected beef and hippo (Hippopotamus amphibious meat, respectively. Although survey data indicated that 62.2% of respondents vaccinated their animals, qualitative interviews and annual vaccination reports indicated low vaccination rates, which were attributed to inadequate veterinary service provision and logistical challenges. While 82% of respondents indicated that they reported animal deaths to veterinary officers, only 13.5% of respondents buried infected carcasses. Majority (78.1% of respondents either ate, sold or shared meat from dead animals with other community members. Poverty, lack of access to meat protein and economic reasons were cited as drivers for consuming infected meat.Health education campaigns must be intensified to reduce the risk of human exposure. Veterinary extension services should be strengthened and

  20. Hypothetical Scenario Generator for Fault-Tolerant Diagnosis

    Science.gov (United States)

    James, Mark

    2007-01-01

    The Hypothetical Scenario Generator for Fault-tolerant Diagnostics (HSG) is an algorithm being developed in conjunction with other components of artificial- intelligence systems for automated diagnosis and prognosis of faults in spacecraft, aircraft, and other complex engineering systems. By incorporating prognostic capabilities along with advanced diagnostic capabilities, these developments hold promise to increase the safety and affordability of the affected engineering systems by making it possible to obtain timely and accurate information on the statuses of the systems and predicting impending failures well in advance. The HSG is a specific instance of a hypothetical- scenario generator that implements an innovative approach for performing diagnostic reasoning when data are missing. The special purpose served by the HSG is to (1) look for all possible ways in which the present state of the engineering system can be mapped with respect to a given model and (2) generate a prioritized set of future possible states and the scenarios of which they are parts.

  1. Rapid generation of an anthrax immunotherapeutic from goats using a novel non-toxic muramyl dipeptide adjuvant

    OpenAIRE

    Kelly, Cassandra D; O'Loughlin, Chris; Gelder, Frank B; Peterson, Johnny W; Sower, Laurie E; Cirino, Nick M

    2007-01-01

    Background There is a clear need for vaccines and therapeutics for potential biological weapons of mass destruction and emerging diseases. Anthrax, caused by the bacterium Bacillus anthracis, has been used as both a biological warfare agent and bioterrorist weapon previously. Although antibiotic therapy is effective in the early stages of anthrax infection, it does not have any effect once exposed individuals become symptomatic due to B. anthracis exotoxin accumulation. The bipartite exotoxin...

  2. Cyber Attacks and Combat Behavior

    Directory of Open Access Journals (Sweden)

    Carataș Maria Alina

    2017-01-01

    Full Text Available Cyber terrorism is an intangible danger, a real over the corner threat in the life of individuals,organizations, and governments and is getting harder to deal with its damages. The motivations forthe cyber-attacks are different, depending on the terrorist group, from cybercrime to hacktivism,attacks over the authorities’ servers. Organizations constantly need to find new ways ofstrengthening protection against cyber-attacks, assess their cyber readiness, expand the resiliencecapacity and adopts international security regulations.

  3. Analyses of hypothetical FCI's in a fast reactor

    International Nuclear Information System (INIS)

    Padilla, A. Jr.; Martin, F.J.; Niccoli, L.G.

    1981-01-01

    Parametric analyses using the SIMMER code were performed to evaluate the potential for a severe recriticality from a pressure-driven recompaction caused by an energetic FCI during the transition phase of a hypothetical accident in a fast reactor. For realistic and reasonable estimates for the assumed accident conditions, a severe recriticality was not predicted. The conditions under which a severe recriticality would be obtained or averted were identified. 10 figures, 2 tables

  4. Genome-wide screens for expressed hypothetical proteins

    DEFF Research Database (Denmark)

    Madsen, Claus Desler; Durhuus, Jon Ambæk; Rasmussen, Lene Juel

    2012-01-01

    A hypothetical protein (HP) is defined as a protein that is predicted to be expressed from an open reading frame, but for which there is no experimental evidence of translation. HPs constitute a substantial fraction of proteomes of human as well as of other organisms. With the general belief that...... that the majority of HPs are the product of pseudogenes, it is essential to have a tool with the ability of pinpointing the minority of HPs with a high probability of being expressed....

  5. Computer codes developed in FRG to analyse hypothetical meltdown accidents

    International Nuclear Information System (INIS)

    Hassmann, K.; Hosemann, J.P.; Koerber, H.; Reineke, H.

    1978-01-01

    It is the purpose of this paper to give the status of all significant computer codes developed in the core melt-down project which is incorporated in the light water reactor safety research program of the Federal Ministry of Research and Technology. For standard pressurized water reactors, results of some computer codes will be presented, describing the course and the duration of the hypothetical core meltdown accident. (author)

  6. Structural and Functional Annotation of Hypothetical Proteins of O139

    Directory of Open Access Journals (Sweden)

    Md. Saiful Islam

    2015-06-01

    Full Text Available In developing countries threat of cholera is a significant health concern whenever water purification and sewage disposal systems are inadequate. Vibrio cholerae is one of the responsible bacteria involved in cholera disease. The complete genome sequence of V. cholerae deciphers the presence of various genes and hypothetical proteins whose function are not yet understood. Hence analyzing and annotating the structure and function of hypothetical proteins is important for understanding the V. cholerae. V. cholerae O139 is the most common and pathogenic bacterial strain among various V. cholerae strains. In this study sequence of six hypothetical proteins of V. cholerae O139 has been annotated from NCBI. Various computational tools and databases have been used to determine domain family, protein-protein interaction, solubility of protein, ligand binding sites etc. The three dimensional structure of two proteins were modeled and their ligand binding sites were identified. We have found domains and families of only one protein. The analysis revealed that these proteins might have antibiotic resistance activity, DNA breaking-rejoining activity, integrase enzyme activity, restriction endonuclease, etc. Structural prediction of these proteins and detection of binding sites from this study would indicate a potential target aiding docking studies for therapeutic designing against cholera.

  7. Processing counterfactual and hypothetical conditionals: an fMRI investigation.

    Science.gov (United States)

    Kulakova, Eugenia; Aichhorn, Markus; Schurz, Matthias; Kronbichler, Martin; Perner, Josef

    2013-05-15

    Counterfactual thinking is ubiquitous in everyday life and an important aspect of cognition and emotion. Although counterfactual thought has been argued to differ from processing factual or hypothetical information, imaging data which elucidate these differences on a neural level are still scarce. We investigated the neural correlates of processing counterfactual sentences under visual and aural presentation. We compared conditionals in subjunctive mood which explicitly contradicted previously presented facts (i.e. counterfactuals) to conditionals framed in indicative mood which did not contradict factual world knowledge and thus conveyed a hypothetical supposition. Our results show activation in right occipital cortex (cuneus) and right basal ganglia (caudate nucleus) during counterfactual sentence processing. Importantly the occipital activation is not only present under visual presentation but also with purely auditory stimulus presentation, precluding a visual processing artifact. Thus our results can be interpreted as reflecting the fact that counterfactual conditionals pragmatically imply the relevance of keeping in mind both factual and supposed information whereas the hypothetical conditionals imply that real world information is irrelevant for processing the conditional and can be omitted. The need to sustain representations of factual and suppositional events during counterfactual sentence processing requires increased mental imagery and integration efforts. Our findings are compatible with predictions based on mental model theory. Copyright © 2013 Elsevier Inc. All rights reserved.

  8. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  9. Risk-based decision making for staggered bioterrorist attacks : resource allocation and risk reduction in "reload" scenarios.

    Energy Technology Data Exchange (ETDEWEB)

    Lemaster, Michelle Nicole; Gay, David M. (Sandia National Laboratories, Albuquerque, NM); Ehlen, Mark Andrew (Sandia National Laboratories, Albuquerque, NM); Boggs, Paul T.; Ray, Jaideep

    2009-10-01

    Staggered bioterrorist attacks with aerosolized pathogens on population centers present a formidable challenge to resource allocation and response planning. The response and planning will commence immediately after the detection of the first attack and with no or little information of the second attack. In this report, we outline a method by which resource allocation may be performed. It involves probabilistic reconstruction of the bioterrorist attack from partial observations of the outbreak, followed by an optimization-under-uncertainty approach to perform resource allocations. We consider both single-site and time-staggered multi-site attacks (i.e., a reload scenario) under conditions when resources (personnel and equipment which are difficult to gather and transport) are insufficient. Both communicable (plague) and non-communicable diseases (anthrax) are addressed, and we also consider cases when the data, the time-series of people reporting with symptoms, are confounded with a reporting delay. We demonstrate how our approach develops allocations profiles that have the potential to reduce the probability of an extremely adverse outcome in exchange for a more certain, but less adverse outcome. We explore the effect of placing limits on daily allocations. Further, since our method is data-driven, the resource allocation progressively improves as more data becomes available.

  10. Changing patterns of human anthrax in Azerbaijan during the post-Soviet and preemptive livestock vaccination eras.

    Directory of Open Access Journals (Sweden)

    Ian Kracalik

    2014-07-01

    Full Text Available We assessed spatial and temporal changes in the occurrence of human anthrax in Azerbaijan during 1984 through 2010. Data on livestock outbreaks, vaccination efforts, and human anthrax incidence during Soviet governance, post-Soviet governance, preemptive livestock vaccination were analyzed. To evaluate changes in the spatio-temporal distribution of anthrax, we used a combination of spatial analysis, cluster detection, and weighted least squares segmented regression. Results indicated an annual percent change in incidence of (+11.95% from 1984 to 1995 followed by declining rate of -35.24% after the initiation of livestock vaccination in 1996. Our findings also revealed geographic variation in the spatial distribution of reporting; cases were primarily concentrated in the west early in the study period and shifted eastward as time progressed. Over twenty years after the dissolution of the Soviet Union, the distribution of human anthrax in Azerbaijan has undergone marked changes. Despite decreases in the incidence of human anthrax, continued control measures in livestock are needed to mitigate its occurrence. The shifting patterns of human anthrax highlight the need for an integrated "One Health" approach that takes into account the changing geographic distribution of the disease.

  11. Crony Attack: Strategic Attack’s Silver Bullet

    Science.gov (United States)

    2006-11-01

    physical assets or financial assets. The form of crony attack that most closely resembles classic strategic attack is to deny, degrade, or destroy a money...February 1951. Reprinted in Airpower Studies Coursebook , Air Command and Staff College, Maxwell AFB, AL, 2002, 152–58. Hirsch, Michael. “NATO’s Game of

  12. An Alternative Approach to Combination Vaccines: Intradermal Administration of Isolated Components for Control of Anthrax, Botulism, Plague and Staphylococcal Toxic Shock

    National Research Council Canada - National Science Library

    Morefield, Garry L; Tammariello, Ralph F; Purcell, Bret K; Worsham, Patricia L; Chapman, Jennifer; Smith, Leonard A; Alarcon, Jason B; Mikszta, John A; Ulrich, Robert G

    2008-01-01

    ... incompatible vaccine mixtures. Intradermally administered arrays of vaccines for protection from anthrax, botulism, plague, and staphylococcal toxic shock were biocompatible in vivo, retained potent antibody responses...

  13. Invisible Trojan-horse attack

    DEFF Research Database (Denmark)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin

    2017-01-01

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance...

  14. When Sinuses Attack! (For Kids)

    Science.gov (United States)

    ... First Aid & Safety Doctors & Hospitals Videos Recipes for Kids Kids site Sitio para niños How the Body Works ... Search English Español When Sinuses Attack! KidsHealth / For Kids / When Sinuses Attack! What's in this article? What ...

  15. Invisible Trojan-horse attack.

    Science.gov (United States)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin; Makarov, Vadim

    2017-08-21

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Ac´ın-Ribordy-Gisin (SARG04) QKD protocol at 1924 nm versus that at 1536 nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N. Jain et al., New J. Phys. 16, 123030 (2014). However at 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.

  16. Frequent and seasonally variable sublethal anthrax infections are accompanied by short-lived immunity in an endemic system.

    Science.gov (United States)

    Cizauskas, Carrie A; Bellan, Steven E; Turner, Wendy C; Vance, Russell E; Getz, Wayne M

    2014-09-01

    Few studies have examined host-pathogen interactions in wildlife from an immunological perspective, particularly in the context of seasonal and longitudinal dynamics. In addition, though most ecological immunology studies employ serological antibody assays, endpoint titre determination is usually based on subjective criteria and needs to be made more objective. Despite the fact that anthrax is an ancient and emerging zoonotic infectious disease found world-wide, its natural ecology is not well understood. In particular, little is known about the adaptive immune responses of wild herbivore hosts against Bacillus anthracis. Working in the natural anthrax system of Etosha National Park, Namibia, we collected 154 serum samples from plains zebra (Equus quagga), 21 from springbok (Antidorcas marsupialis) and 45 from African elephants (Loxodonta africana) over 2-3 years, resampling individuals when possible for seasonal and longitudinal comparisons. We used enzyme-linked immunosorbent assays to measure anti-anthrax antibody titres and developed three increasingly conservative models to determine endpoint titres with more rigourous, objective mensuration. Between 52 and 87% of zebra, 0-15% of springbok and 3-52% of elephants had measurable anti-anthrax antibody titres, depending on the model used. While the ability of elephants and springbok to mount anti-anthrax adaptive immune responses is still equivocal, our results indicate that zebra in ENP often survive sublethal anthrax infections, encounter most B. anthracis in the wet season and can partially booster their immunity to B. anthracis. Thus, rather than being solely a lethal disease, anthrax often occurs as a sublethal infection in some susceptible hosts. Though we found that adaptive immunity to anthrax wanes rapidly, subsequent and frequent sublethal B. anthracis infections cause maturation of anti-anthrax immunity. By triggering host immune responses, these common sublethal infections may act as

  17. [PERSPECTIVES OF DEVELOPMENT OF LIVE RECOMBINANT ANTHRAX VACCINES BASED ON OPPORTUNISTIC AND APATHOGENIC MICROORGANISMS].

    Science.gov (United States)

    Popova, P Yu; Mikshis, N I

    2016-01-01

    Live genetic engineering anthrax vaccines on the platform of avirulent and probiotic micro-organisms are a safe and adequate alternative to preparations based on attenuated Bacillus anthracis strains. Mucosal application results in a direct contact of the vaccine preparations with mucous membranes in those organs arid tissues of the macro-organisms, that are exposed to the pathogen in the first place, resulting in a development of local and systemic immune response. Live recombinant anthrax vaccines could be used both separately as well as in a prime-boost immunization scheme. The review focuses on immunogenic and protective properties of experimental live genetic engineering prearations, created based on members of geni of Salmonella, Lactobacillus and adenoviruses.

  18. Demand curves for hypothetical cocaine in cocaine-dependent individuals.

    Science.gov (United States)

    Bruner, Natalie R; Johnson, Matthew W

    2014-03-01

    Drug purchasing tasks have been successfully used to examine demand for hypothetical consumption of abused drugs including heroin, nicotine, and alcohol. In these tasks, drug users make hypothetical choices whether to buy drugs, and if so, at what quantity, at various potential prices. These tasks allow for behavioral economic assessment of that drug's intensity of demand (preferred level of consumption at extremely low prices) and demand elasticity (sensitivity of consumption to price), among other metrics. However, a purchasing task for cocaine in cocaine-dependent individuals has not been investigated. This study examined a novel Cocaine Purchasing Task and the relation between resulting demand metrics and self-reported cocaine use data. Participants completed a questionnaire assessing hypothetical purchases of cocaine units at prices ranging from $0.01 to $1,000. Demand curves were generated from responses on the Cocaine Purchasing Task. Correlations compared metrics from the demand curve to measures of real-world cocaine use. Group and individual data were well modeled by a demand curve function. The validity of the Cocaine Purchasing Task was supported by a significant correlation between the demand curve metrics of demand intensity and O max (determined from Cocaine Purchasing Task data) and self-reported measures of cocaine use. Partial correlations revealed that after controlling for demand intensity, demand elasticity and the related measure, P max, were significantly correlated with real-world cocaine use. Results indicate that the Cocaine Purchasing Task produces orderly demand curve data, and that these data relate to real-world measures of cocaine use.

  19. Highly predictive support vector machine (SVM) models for anthrax toxin lethal factor (LF) inhibitors.

    Science.gov (United States)

    Zhang, Xia; Amin, Elizabeth Ambrose

    2016-01-01

    Anthrax is a highly lethal, acute infectious disease caused by the rod-shaped, Gram-positive bacterium Bacillus anthracis. The anthrax toxin lethal factor (LF), a zinc metalloprotease secreted by the bacilli, plays a key role in anthrax pathogenesis and is chiefly responsible for anthrax-related toxemia and host death, partly via inactivation of mitogen-activated protein kinase kinase (MAPKK) enzymes and consequent disruption of key cellular signaling pathways. Antibiotics such as fluoroquinolones are capable of clearing the bacilli but have no effect on LF-mediated toxemia; LF itself therefore remains the preferred target for toxin inactivation. However, currently no LF inhibitor is available on the market as a therapeutic, partly due to the insufficiency of existing LF inhibitor scaffolds in terms of efficacy, selectivity, and toxicity. In the current work, we present novel support vector machine (SVM) models with high prediction accuracy that are designed to rapidly identify potential novel, structurally diverse LF inhibitor chemical matter from compound libraries. These SVM models were trained and validated using 508 compounds with published LF biological activity data and 847 inactive compounds deposited in the Pub Chem BioAssay database. One model, M1, demonstrated particularly favorable selectivity toward highly active compounds by correctly predicting 39 (95.12%) out of 41 nanomolar-level LF inhibitors, 46 (93.88%) out of 49 inactives, and 844 (99.65%) out of 847 Pub Chem inactives in external, unbiased test sets. These models are expected to facilitate the prediction of LF inhibitory activity for existing molecules, as well as identification of novel potential LF inhibitors from large datasets. Copyright © 2015 Elsevier Inc. All rights reserved.

  20. Catastrophic Incident Recovery: Long-Term Recovery from an Anthrax Event Symposium

    Energy Technology Data Exchange (ETDEWEB)

    Lesperance, Ann M.

    2008-06-30

    On March 19, 2008, policy makers, emergency managers, and medical and Public Health officials convened in Seattle, Washington, for a workshop on Catastrophic Incident Recovery: Long-Term Recovery from an Anthrax Event. The day-long symposium was aimed at generating a dialogue about restoration and recovery through a discussion of the associated challenges that impact entire communities, including people, infrastructure, and critical systems.

  1. Indirect Detection Of Bacillus Anthracis (Anthrax) Using Amplified Gamma Phage-Based Assays

    Science.gov (United States)

    2007-11-01

    enter 26 Figure 3.0 Model of anthrax toxin entry into eukaryotic cells 27 the lungs and into the mucus membrane...extract from porcine and mixture meat and milk peptones, 2.0 g D(+) glucose, 5.0 g NaCl and 2.5 g disodium phosphate) and TSB (g/L: 17.0 pancreatic...are present in blood serum, lymph fluid, gastric secretions, milk , and saliva. Serum antibody concentrations are commonly determined using the

  2. Anthrax outbreak in a Swedish beef cattle herd - 1st case in 27 years: Case report

    Directory of Open Access Journals (Sweden)

    Granberg Malin

    2010-02-01

    Full Text Available Abstract After 27 years with no detected cases, an outbreak of anthrax occurred in a beef cattle herd in the south of Sweden. The outbreak was unusual as it occurred in winter, in animals not exposed to meat-and-bone meal, in a non-endemic country. The affected herd consisted of 90 animals, including calves and young stock. The animals were kept in a barn on deep straw bedding and fed only roughage. Seven animals died during 10 days, with no typical previous clinical signs except fever. The carcasses were reportedly normal in appearance, particularly as regards rigor mortis, bleeding and coagulation of the blood. Subsequently, three more animals died and anthrax was suspected at necropsy and confirmed by culture and PCR on blood samples. The isolated strain was susceptible to tetracycline, ciprofloxacin and ampicillin. Subtyping by MLVA showed the strain to cluster with isolates in the A lineage of Bacillus anthracis. Environmental samples from the holding were all negative except for two soil samples taken from a spot where infected carcasses had been kept until they were picked up for transport. The most likely source of the infection was concluded to be contaminated roughage, although this could not be substantiated by laboratory analysis. The suspected feed was mixed with soil and dust and originated from fields where flooding occurred the previous year, followed by a dry summer with a very low water level in the river allowing for the harvesting on soil usually not exposed. In the early 1900s, animal carcasses are said to have been dumped in this river during anthrax outbreaks and it is most likely that some anthrax spores could remain in the area. The case indicates that untypical cases in non-endemic areas may be missed to a larger extent than previously thought. Field tests allowing a preliminary risk assessment of animal carcasses would be helpful for increased sensitivity of detection and prevention of further exposure to the causative

  3. Consequences of a hypothetical incident for different sectors

    CERN Document Server

    Bertinelli, F; Garion, C; Jimenez, J M; Parma, V; Perin, A; Schmidt, R; Tavian, L; Tock, J P; van Weelderen, R

    2011-01-01

    During the 2009 long shutdown, the LHC machine has been partially consolidated by adding safety relief devices in order to better protect the cryostats against large helium release and consequently to mitigate the risks of collateral damages. After recalling the present relief valve implementation and other mitigations related to the collateral damages, this paper describes the damage process of a hypothetical incident, presents its consequences for the different sectors and for beam energies up to 5 TeV with emphasis on the induced downtime.

  4. Effects of hypothetical improvised nuclear detonation on the electrical infrastructure

    International Nuclear Information System (INIS)

    Barrett, Christopher L.; Eubank, Stephen; Evrenosoglu, C. Yaman; Marathe, Achla; Marathe, Madhav V.; Phadke, Arun; Thorp, James; Vullikanti, Anil

    2013-01-01

    We study the impacts of a hypothetical improvised nuclear detonation (IND) on the electrical infrastructure and its cascading effects on other urban inter-dependent infrastructures of a major metropolitan area in the US. We synthesize open source information, expert knowledge, commercial software and Google Earth data to derive a realistic electrical transmission and distribution network spanning the region. A dynamic analysis of the geo-located grid is carried out to determine the cause of malfunction of components, and their short-term and long-term effect on the stability of the grid. Finally a detailed estimate of the cost of damage to the major components of the infrastructure is provided.

  5. Nuclear Reactor RA Safety Report, Vol. 16, Maximum hypothetical accident

    International Nuclear Information System (INIS)

    1986-11-01

    Fault tree analysis of the maximum hypothetical accident covers the basic elements: accident initiation, phase development phases - scheme of possible accident flow. Cause of the accident initiation is the break of primary cooling pipe, heavy water system. Loss of primary coolant causes loss of pressure in the primary circuit at the coolant input in the reactor vessel. This initiates safety protection system which should automatically shutdown the reactor. Separate chapters are devoted to: after-heat removal, coolant and moderator loss; accident effects on the reactor core, effects in the reactor building, and release of radioactive wastes [sr

  6. Effects of hypothetical improvised nuclear detonation on the electrical infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Barrett, Christopher L.; Eubank, Stephen; Evrenosoglu, C. Yaman; Marathe, Achla; Marathe, Madhav V.; Phadke, Arun; Thorp, James; Vullikanti, Anil [Virginia Tech, Blacksburg, VA (United States). Network Dynamics and Simulation Science Lab.

    2013-07-01

    We study the impacts of a hypothetical improvised nuclear detonation (IND) on the electrical infrastructure and its cascading effects on other urban inter-dependent infrastructures of a major metropolitan area in the US. We synthesize open source information, expert knowledge, commercial software and Google Earth data to derive a realistic electrical transmission and distribution network spanning the region. A dynamic analysis of the geo-located grid is carried out to determine the cause of malfunction of components, and their short-term and long-term effect on the stability of the grid. Finally a detailed estimate of the cost of damage to the major components of the infrastructure is provided.

  7. Confirmation of acute nitrate poisoning differentiating from anthrax in three Indian indigenous cattle

    Directory of Open Access Journals (Sweden)

    Kumaresan Nagarajan

    2015-03-01

    Full Text Available This article reports cases of nitrate poisoning in Indian indigenous cattle breeds comprising two Gir cows aging 4 years each, and one Barugur cow at 1.5 years of age. The cattle with case history of sudden death and oozing of partially clotted blood from the anal opening were brought to the Central University Laboratory (CUL, Center for Animal Health Studies (CAHS, Tamil Nadu Veterinary and Animal Sciences University (TANUVAS for diagnostic investigation with a suspicion of anthrax. According to anamnesis, all the animals were clinically normal and did not reveal any abnormality on the previous day. The animals were fed with recently harvested sorghum leaves and stalks. Smears examined for anthrax were found negative. Biological test (mice inoculation for anthrax was also negative. Gross lesions on necropsy examination of the carcases were suggestive of nitrate intoxication. Finally, nitrate intoxication of these cattle was confirmed by chemical and toxicological analysis of fodder, rumen content, aqueous humor, liver, kidney and urine.

  8. Anthrax and the Geochemistry of Soils in the Contiguous United States

    Directory of Open Access Journals (Sweden)

    Dale W. Griffin

    2014-08-01

    Full Text Available Soil geochemical data from sample sites in counties that reported occurrences of anthrax in wildlife and livestock since 2000 were evaluated against counties within the same states (MN, MT, ND, NV, OR, SD and TX that did not report occurrences. These data identified the elements, calcium (Ca, manganese (Mn, phosphorus (P and strontium (Sr, as having statistically significant differences in concentrations between county type (anthrax occurrence versus no occurrence. Tentative threshold values of the lowest concentrations of each of these elements (Ca = 0.43 wt %, Mn = 142 mg/kg, P = 180 mg/kg and Sr = 51 mg/kg and average concentrations (Ca = 1.3 wt %, Mn = 463 mg/kg, P = 580 mg/kg and Sr = 170 mg/kg were identified from anthrax-positive counties as prospective investigative tools in determining whether an outbreak had “potential” or was “likely” at any given geographic location in the contiguous United States.

  9. Delayed Toxicity Associated with Soluble Anthrax Toxin Receptor Decoy-Ig Fusion Protein Treatment

    Science.gov (United States)

    Cote, Christopher; Welkos, Susan; Manchester, Marianne; Young, John A. T.

    2012-01-01

    Soluble receptor decoy inhibitors, including receptor-immunogloubulin (Ig) fusion proteins, have shown promise as candidate anthrax toxin therapeutics. These agents act by binding to the receptor-interaction site on the protective antigen (PA) toxin subunit, thereby blocking toxin binding to cell surface receptors. Here we have made the surprising observation that co-administration of receptor decoy-Ig fusion proteins significantly delayed, but did not protect, rats challenged with anthrax lethal toxin. The delayed toxicity was associated with the in vivo assembly of a long-lived complex comprised of anthrax lethal toxin and the receptor decoy-Ig inhibitor. Intoxication in this system presumably results from the slow dissociation of the toxin complex from the inhibitor following their prolonged circulation. We conclude that while receptor decoy-Ig proteins represent promising candidates for the early treatment of B. anthracis infection, they may not be suitable for therapeutic use at later stages when fatal levels of toxin have already accumulated in the bloodstream. PMID:22511955

  10. A Viral Nanoparticle with Dual Function as an Anthrax Antitoxin and Vaccine

    Science.gov (United States)

    Manayani, Darly J; Thomas, Diane; Dryden, Kelly A; Reddy, Vijay; Siladi, Marc E; Marlett, John M; Rainey, G. Jonah A; Pique, Michael E; Scobie, Heather M; Yeager, Mark; Young, John A. T; Manchester, Marianne; Schneemann, Anette

    2007-01-01

    The recent use of Bacillus anthracis as a bioweapon has stimulated the search for novel antitoxins and vaccines that act rapidly and with minimal adverse effects. B. anthracis produces an AB-type toxin composed of the receptor-binding moiety protective antigen (PA) and the enzymatic moieties edema factor and lethal factor. PA is a key target for both antitoxin and vaccine development. We used the icosahedral insect virus Flock House virus as a platform to display 180 copies of the high affinity, PA-binding von Willebrand A domain of the ANTXR2 cellular receptor. The chimeric virus-like particles (VLPs) correctly displayed the receptor von Willebrand A domain on their surface and inhibited lethal toxin action in in vitro and in vivo models of anthrax intoxication. Moreover, VLPs complexed with PA elicited a potent toxin-neutralizing antibody response that protected rats from anthrax lethal toxin challenge after a single immunization without adjuvant. This recombinant VLP platform represents a novel and highly effective, dually-acting reagent for treatment and protection against anthrax. PMID:17922572

  11. A Biologically-Based Computational Approach to Drug Repurposing for Anthrax Infection

    Directory of Open Access Journals (Sweden)

    Jane P. F. Bai

    2017-03-01

    Full Text Available Developing drugs to treat the toxic effects of lethal toxin (LT and edema toxin (ET produced by B. anthracis is of global interest. We utilized a computational approach to score 474 drugs/compounds for their ability to reverse the toxic effects of anthrax toxins. For each toxin or drug/compound, we constructed an activity network by using its differentially expressed genes, molecular targets, and protein interactions. Gene expression profiles of drugs were obtained from the Connectivity Map and those of anthrax toxins in human alveolar macrophages were obtained from the Gene Expression Omnibus. Drug rankings were based on the ability of a drug/compound’s mode of action in the form of a signaling network to reverse the effects of anthrax toxins; literature reports were used to verify the top 10 and bottom 10 drugs/compounds identified. Simvastatin and bepridil with reported in vitro potency for protecting cells from LT and ET toxicities were computationally ranked fourth and eighth. The other top 10 drugs were fenofibrate, dihydroergotamine, cotinine, amantadine, mephenytoin, sotalol, ifosfamide, and mefloquine; literature mining revealed their potential protective effects from LT and ET toxicities. These drugs are worthy of investigation for their therapeutic benefits and might be used in combination with antibiotics for treating B. anthracis infection.

  12. 33 CFR Appendix B to Part 277 - Hypothetical Example of Cost Apportionment

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 3 2010-07-01 2010-07-01 false Hypothetical Example of Cost... APPORTIONMENT OF BRIDGE ALTERATIONS Pt. 277, App. B Appendix B to Part 277—Hypothetical Example of Cost... bridge was completed in 1908 and the superstructure completed in 1909. For this hypothetical example it...

  13. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  14. Shark Attack Project - Marine Attack at Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Adrianus J

    2005-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  15. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  16. Evaluation of Nuclide Release Scenarios for a Hypothetical LILW Repository

    International Nuclear Information System (INIS)

    Lee, Youn Myoung; Jeong, Jong Tae

    2010-11-01

    A program for the safety assessment and performance evaluation of a low- and intermediate-level radioactive waste (LILW) repository system has been developed. Utilizing GoldSim (GoldSim, 2006), the program evaluates nuclide release and transport into the geosphere and biosphere under various disruptive natural and manmade events and scenarios that can occur after a waste package failure. We envisaged and illustrated these events and scenarios as occurring after the closure of a hypothetical LILW repository, and they included the degradation of various manmade barriers, pumping well drilling, and natural disruptions such as the sudden formation of a preferential flow pathway in the far-field area of the repository. Possible enhancement of nuclide transport facilitated by colloids or chelating agents is also dealt with. We used the newly-developed GoldSim template program, which is capable of various nuclide release scenarios and is greatly suited for simulating a potential repository given the geological circumstances in Korea, to create the detailed source term and near-field release scheme, various nuclide transport modes in the far-field geosphere area, and the biosphere transfer. Even though all parameter values applied to the hypothetical repository were assumed, the illustrative results, particularly the probabilistic calculations and sensitivity studies, may be informative under various scenarios

  17. Making Communication Strategy Choices in a Fast Evolving Crisis Situation—Results from a Table-Top Discussion on an Anthrax Scenario

    Directory of Open Access Journals (Sweden)

    Aino Ruggiero

    2016-05-01

    Full Text Available This paper aims at clarifying a timely topic of how communication strategy choices are made in evolving, complex crises, such as those caused by terrorism involving chemical, biological, radiological, or nuclear (CBRN agents. This is done by examining data gathered from a table-top discussion among crisis communication experts, focusing on a scenario of an anthrax attack and analysed qualitatively. The communication experts followed the evolving crisis situation by gathering inputs from various actors in the crisis management network, thereby creating situational understanding, and interpreted these inputs for decision-making on communication strategies. The underlying process of coping with complexity in evolving CBRN terrorism crises can be described as a continuous, dynamic process that can best be explained with a combination of traditional and more modern crisis communication approaches. Strategy-making in crisis situations by communication experts is still largely a black box. In this study, a novel approach of decomposing strategy-making by observing a table-top discussion is chosen to clarify the process. By identifying the core elements involved, a more detailed picture of communication strategy-making is created, thus promoting preparedness and professional resilience in the field.

  18. Gastrointestinal helminths may affect host susceptibility to anthrax through seasonal immune trade-offs.

    Science.gov (United States)

    Cizauskas, Carrie A; Turner, Wendy C; Wagner, Bettina; Küsters, Martina; Vance, Russell E; Getz, Wayne M

    2014-11-12

    Most vertebrates experience coinfections, and many pathogen-pathogen interactions occur indirectly through the host immune system. These interactions are particularly strong in mixed micro-macroparasite infections because of immunomodulatory effects of helminth parasites. While these trade-offs have been examined extensively in laboratory animals, few studies have examined them in natural systems. Additionally, many wildlife pathogens fluctuate seasonally, at least partly due to seasonal host immune changes. We therefore examined seasonality of immune resource allocation, pathogen abundance and exposure, and interactions between infections and immunity in plains zebra (Equus quagga) in Etosha National Park (ENP), Namibia, a system with strongly seasonal patterns of gastrointestinal (GI) helminth infection intensity and concurrent anthrax outbreaks. Both pathogens are environmentally transmitted, and helminth seasonality is driven by environmental pressures on free living life stages. The reasons behind anthrax seasonality are currently not understood, though anthrax is less likely directly driven by environmental factors. We measured a complex, interacting set of variables and found evidence that GI helminth infection intensities, eosinophil counts, IgE and IgGb antibody titers, and possibly IL-4 cytokine signaling were increased in wetter seasons, and that ectoparasite infestations and possibly IFN-γ cytokine signaling were increased in drier seasons. Monocyte counts and anti-anthrax antibody titers were negatively associated with wet season eosinophilia, and monocytes were negatively correlated with IgGb and IgE titers. Taken together, this supports the hypothesis that ENP wet seasons are characterized by immune resource allocation toward Th-2 type responses, while Th1-type immunity may prevail in drier seasons, and that hosts may experience Th1-Th2 trade-offs. We found evidence that this Th2-type resource allocation is likely driven by GI parasite infections

  19. Comparative toxicity and efficacy of engineered anthrax lethal toxin variants with broad anti-tumor activities.

    Science.gov (United States)

    Peters, Diane E; Hoover, Benjamin; Cloud, Loretta Grey; Liu, Shihui; Molinolo, Alfredo A; Leppla, Stephen H; Bugge, Thomas H

    2014-09-01

    We have previously designed and characterized versions of anthrax lethal toxin that are selectively cytotoxic in the tumor microenvironment and which display broad and potent anti-tumor activities in vivo. Here, we have performed the first direct comparison of the safety and efficacy of three engineered anthrax lethal toxin variants requiring activation by either matrix-metalloproteinases (MMPs), urokinase plasminogen activator (uPA) or co-localized MMP/uPA activities. C57BL/6J mice were challenged with six doses of engineered toxins via intraperitoneal (I.P.) or intravenous (I.V.) dose routes to determine the maximum tolerated dose for six administrations (MTD6) and dose-limiting toxicities. Efficacy was evaluated using the B16-BL6 syngraft model of melanoma; mice bearing established tumors were treated with six I.P. doses of toxin and tumor measurements and immunohistochemistry, paired with terminal blood work, were used to elaborate upon the anti-tumor mechanism and relative efficacy of each variant. We found that MMP-, uPA- and dual MMP/uPA-activated anthrax lethal toxins exhibited the same dose-limiting toxicity; dose-dependent GI toxicity. In terms of efficacy, all three toxins significantly reduced primary B16-BL6 tumor burden, ranging from 32% to 87% reduction, and they also delayed disease progression as evidenced by dose-dependent normalization of blood work values. While target organ toxicity and effective doses were similar amongst the variants, the dual MMP/uPA-activated anthrax lethal toxin exhibited the highest I.P. MTD6 and was 1.5-3-fold better tolerated than the single MMP- and uPA-activated toxins. Overall, we demonstrate that this dual MMP/uPA-activated anthrax lethal toxin can be administered safely and is highly effective in a preclinical model of melanoma. This modified bacterial cytotoxin is thus a promising candidate for further clinical development and evaluation for use in treating human cancers. Published by Elsevier Inc.

  20. Forensics Investigation of Web Application Security Attacks

    OpenAIRE

    Amor Lazzez; Thabet Slimani

    2015-01-01

    Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the sec...

  1. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  2. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  3. Panic Attacks and Panic Disorder

    Science.gov (United States)

    ... Major changes in your life, such as a divorce or the addition of a baby Smoking or ... quality of life. Complications that panic attacks may cause or be linked to include: Development of specific ...

  4. Genetic attack on neural cryptography

    International Nuclear Information System (INIS)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-01-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size

  5. Genetic attack on neural cryptography

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  6. What Is a Heart Attack?

    Science.gov (United States)

    ... medical center. Support from family and friends also can help relieve stress and anxiety. Let your loved ones know how you feel and what they can do to help you. Risk of a Repeat Heart Attack Once ...

  7. Crystallization and preliminary X-ray analysis of the vWA domain of human anthrax toxin receptor 1

    International Nuclear Information System (INIS)

    Cai, Chenguang; Zhao, Ying; Tong, Xiaohang; Fu, Sheng; Li, Yuanyuan; Wu, Yang; Li, Xumei; Lou, Zhiyong

    2010-01-01

    The vWA domain of human anthrax toxin receptor 1 was overexpressed in E. coli, purified and crystallized. Diffraction data were collected to 1.8 Å resolution. The Gram-positive spore-forming bacterium Bacillus anthracis causes anthrax by secreting anthrax toxin, which consists of protective antigen (PA), lethal factor and oedema factor. Binding of PA to receptors triggers the multi-step process of anthrax toxin entry into target cells. Two distinct cellular receptors, ANTXR1 (also known as tumour endothelial marker 8; TEM8) and ANTXR2 (also known as capillary morphogenesis protein 2; CMG2), for anthrax toxin have been identified. Although the crystal structure of the extracellular von Willebrand factor A (vWA) domain of CMG2 has been reported, the difference between the vWA domains of TEM8 and CMG2 remains unclear because there are no structural data for the TEM8 vWA domain. In this report, the TEM8 vWA domain was expressed, purified and crystallized. X-ray diffraction data were collected to 1.8 Å resolution from a single crystal, which belonged to space group P1 with unit-cell parameters a = 65.9, b = 66.1, c = 74.4 Å, α = 63.7, β = 88.2, γ = 59.9°

  8. Software-based Microarchitectural Attacks

    OpenAIRE

    Gruss, Daniel

    2017-01-01

    Modern processors are highly optimized systems where every single cycle of computation time matters. Many optimizations depend on the data that is being processed. Software-based microarchitectural attacks exploit effects of these optimizations. Microarchitectural side-channel attacks leak secrets from cryptographic computations, from general purpose computations, or from the kernel. This leakage even persists across all common isolation boundaries, such as processes, containers, and virtual ...

  9. OPERATION COBRA. Deliberate Attack, Exploitation

    Science.gov (United States)

    1984-05-25

    to attack Sens, then continue to Troyes , on the Seine River. CCA was in the north, crossing the Loing River at Souppes against light resistance and...advanced from Troyes and prepared positions close to Sens. Under strong artillery support, a task force from CCA (TF Oden) attacked the enemy frontally...movement towards the Seine River on 24 August with an advance toward Troyes . Facing the combat command were what remained of the 51st SS Brigade, light

  10. RELAP 5 Simulations of a hypothetical LOCA in Ringhals 2

    International Nuclear Information System (INIS)

    Caraher, D.

    1987-01-01

    RELAP5 simulations of a hypothetical LOCA in Ringhals 2 were conducted in order to determine the sensitivity of the calculated peak cladding temperature (PCT) to Appendix K requirements. The PCT was most sensitive to the assumed model decay heat: Changing from the 1979 ANS Standard to 1.2 times the 1973 Standard increased the PCT by 70 to 100K. After decay heat, the two parameters which affected the PCT the most were steam generator heat transfer and heat transfer lockout. The PCT was not sensitive to the assumed pump rotor condition (locked vs coasting); nor was it sensitive to a modest amount (5 to 10%) of steam generator tube plugging. (author)

  11. Hanford groundwater transport estimates for hypothetical radioactive waste incidents

    International Nuclear Information System (INIS)

    Arnett, R.C.; Brown, D.J.; Baca, R.G.

    1977-06-01

    This report presents an analysis of the impact of subsurface contamination resulting from a series of hypothetical leaks or accidents involving Hanford high-level radioactive defense waste. Estimates of the amounts and concentrations of radionuclides reaching the Columbia River through the Hanford unconfined aquifer flow path were obtained by means of predictive models. The results of the study showed that the spatially averaged concentrations of 99 Tc, 3 H, and 106 Ru in the ground water as it discharges into the Columbia River are at all times far below the respective ERDA Manual Chapter 0524 Concentration Guides for uncontrolled areas. Upon entering the Columbia River, additional large dilutions of the water containing trace quantities of contaminants will occur

  12. Calculated magnetocrystalline anisotropy of existing and hypothetical MCo5 compounds

    International Nuclear Information System (INIS)

    Opahle, Ingo; Richter, Manuel; Kuz'min, Michael D.; Nitzsche, Ulrike; Koepernik, Klaus; Schramm, Lutz

    2005-01-01

    The magnetic properties, lattice parameters and formation enthalpies of existing and hypothetical MCo 5 compounds (M=Y, La, Th, Mg, Ca and Sr) are calculated within the framework of density functional theory. In these compounds the magnetocrystalline anisotropy energy is dominated by itinerant Co 3d contributions. Band energy calculations suggest that-within in a rigid band picture-anisotropy energies of comparable size to those of hard magnetic materials containing rare earths could be obtained by hole doping of YCo 5 , e.g. by the substitution of Ca or Mg for Y. This idea is confirmed by the presented total energy calculations. However, the calculated enthalpies of formation suggest that CaCo 5 and MgCo 5 could only be prepared by non-equilibrium methods

  13. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  14. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica......Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error......-prone and impracticable for large systems. Nonetheless, the automated generation of attack trees has only been explored in connection to computer networks and levering rich models, whose analysis typically leads to an exponential blow-up of the state space. We propose a static analysis approach where attack trees...... are automatically inferred from a process algebraic specification in a syntax-directed fashion, encompassing a great many application domains and avoiding incurring systematically an exponential explosion. Moreover, we show how the standard propositional denotation of an attack tree can be used to phrase...

  15. Approval of raxibacumab for the treatment of inhalation anthrax under the US Food and Drug Administration Animal rule

    Directory of Open Access Journals (Sweden)

    Chia-Wei eTsai

    2015-12-01

    Full Text Available On December 14, 2012, the FDA approved raxibacumab, the first product developed under Project BioShield to achieve this milestone, and the first biologic product to be approved through the FDA animal efficacy rule (or Animal Rule. Raxibacumab is approved for the treatment of adult and pediatric patients with inhalational anthrax due to Bacillus anthracis in combination with appropriate antibiotic drugs and for prophylaxis of inhalational anthrax when alternative therapies are not available or are not appropriate. The approval of Raxibacumab illustrates many of the challenges that product developers may encounter when pursuing approval under the Animal Rule and highlights a number of important regulatory and policy issues.

  16. An Analysis of Attacks on Blockchain Consensus

    OpenAIRE

    Bissias, George; Levine, Brian Neil; Ozisik, A. Pinar; Andresen, Gavin

    2016-01-01

    We present and validate a novel mathematical model of the blockchain mining process and use it to conduct an economic evaluation of the double-spend attack, which is fundamental to all blockchain systems. Our analysis focuses on the value of transactions that can be secured under a conventional double-spend attack, both with and without a concurrent eclipse attack. Our model quantifies the importance of several factors that determine the attack's success, including confirmation depth, attacke...

  17. Recurrent spontaneous attacks of dizziness.

    Science.gov (United States)

    Lempert, Thomas

    2012-10-01

    This article describes the common causes of recurrent vertigo and dizziness that can be diagnosed largely on the basis of history. Ninety percent of spontaneous recurrent vertigo and dizziness can be explained by six disorders: (1) Ménière disease is characterized by vertigo attacks, lasting 20 minutes to several hours, with concomitant hearing loss, tinnitus, and aural fullness. Aural symptoms become permanent during the course of the disease. (2) Attacks of vestibular migraine may last anywhere from minutes to days. Most patients have a previous history of migraine headaches, and many experience migraine symptoms during the attack. (3) Vertebrobasilar TIAs affect older adults with vascular risk factors. Most attacks last less than 1 hour and are accompanied by other symptoms from the posterior circulation territory. (4) Vestibular paroxysmia is caused by vascular compression of the eighth cranial nerve. It manifests itself with brief attacks of vertigo that recur many times per day, sometimes with concomitant cochlear symptoms. (5) Orthostatic hypotension causes brief episodes of dizziness lasting seconds to a few minutes after standing up and is relieved by sitting or lying down. In older adults, it may be accompanied by supine hypertension. (6) Panic attacks usually last minutes, occur in specific situations, and are accompanied by choking, palpitations, tremor, heat, and anxiety. Less common causes of spontaneous recurrent vertigo and dizziness include perilymph fistula, superior canal dehiscence, autoimmune inner ear disease, otosclerosis, cardiac arrhythmia, and medication side effects. Neurologists need to venture into otolaryngology, internal medicine, and psychiatry to master the differential diagnosis of recurrent dizziness.

  18. Ligand-induced expansion of the S1' site in the anthrax toxin lethal factor

    Energy Technology Data Exchange (ETDEWEB)

    Maize, Kimberly M.; Kurbanov, Elbek K.; Johnson, Rodney L.; Amin, Elizabeth Ambrose; Finzel, Barry C. (UMM)

    2016-07-05

    The Bacillus anthracis lethal factor (LF) is one component of a tripartite exotoxin partly responsible for persistent anthrax cytotoxicity after initial bacterial infection. Inhibitors of the zinc metalloproteinase have been investigated as potential therapeutic agents, but LF is a challenging target because inhibitors lack sufficient selectivity or possess poor pharmaceutical properties. These structural studies reveal an alternate conformation of the enzyme, induced upon binding of specific inhibitors, that opens a previously unobserved deep pocket termed S1'* which might afford new opportunities to design selective inhibitors that target this subsite.

  19. Anthrax toxin: the long and winding road that leads to the kill.

    Science.gov (United States)

    Abrami, Laurence; Reig, Nuria; van der Goot, F Gisou

    2005-02-01

    The past five years have led to a tremendous increase in our molecular understanding of the mode of action of the anthrax toxin, one of the two main virulence factors produced by Bacillus anthracis. The structures of each of the three components of the toxin--lethal factor (LF), edema factor (EF) and protective antigen (PA)--have been solved not only in their monomeric forms but, depending on the subunit, in a heptameric form, bound to their substrate, co-factor or receptor. The endocytic route followed by the toxin has also been unraveled and the enzymatic mechanisms of EF and LF elucidated.

  20. [Genodiagnosis and molecular typing of the pathogens for plague, cholera, and anthrax].

    Science.gov (United States)

    Kutyrev, V V; Smirnova, N I

    2003-01-01

    The paper contains a survey of published data about the use of DNA-diagnostics in indicating and identifying the causative agents of highly dangerous infections like plague, cholera and anthrax. A discussion of data about the genetic relationship between strains of the mentioned causative agents isolated from different sources by using the molecular-typing methods as well as about the evolution ties between strains of different origins is in the focus of attention. Results of comparative studies of nucleotide sequences of genomes or of individual genomes in different Yersinia pestis, Vibrio cholerae and Bacillus anthracis strains, which are indicative of the evolution of their pathogenicity, are also under discussion.

  1. Radiological Consequence Analyses Following a Hypothetical Severe Accident in Japan

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Juyub; Kim, Juyoul [FNC Technology Co., Yongin (Korea, Republic of)

    2016-10-15

    In order to reflect the lessons learned from the Fukushima Daiichi nuclear power plant accident, a simulator which is named NANAS (Northeast Asia Nuclear Accident Simulator) for overseas nuclear accident has been developed. It is composed of three modules: source-term estimation, atmospheric dispersion prediction and dose assessment. For the source-term estimation module, the representative reactor types were selected as CPR1000, BWR5 and BWR6 for China, Japan and Taiwan, respectively. Considering the design characteristics of each reactor type, the source-term estimation module simulates the transient of design basis accident and severe accident. The atmospheric dispersion prediction module analyzes the transport and dispersion of radioactive materials and prints out the air and ground concentration. Using the concentration result, the dose assessment module calculates effective dose and thyroid dose in the Korean Peninsula region. In this study, a hypothetical severe accident in Japan was simulated to demonstrate the function of NANAS. As a result, the radiological consequence to Korea was estimated from the accident. PC-based nuclear accident simulator, NANAS, has been developed. NANAS contains three modules: source-term estimation, atmospheric dispersion prediction and dose assessment. The source-term estimation module simulates a nuclear accident for the representative reactor types in China, Japan and Taiwan. Since the maximum calculation speed is 16 times than real time, it is possible to estimate the source-term release swiftly in case of the emergency. The atmospheric dispersion prediction module analyzes the transport and dispersion of radioactive materials in wide range including the Northeast Asia. Final results of the dose assessment module are a map projection and time chart of effective dose and thyroid dose. A hypothetical accident in Japan was simulated by NANAS. The radioactive materials were released during the first 24 hours and the source

  2. Modeling a Hypothetical 170Tm Source for Brachytherapy Applications

    International Nuclear Information System (INIS)

    Enger, Shirin A.; D'Amours, Michel; Beaulieu, Luc

    2011-01-01

    Purpose: To perform absorbed dose calculations based on Monte Carlo simulations for a hypothetical 170 Tm source and to investigate the influence of encapsulating material on the energy spectrum of the emitted electrons and photons. Methods: GEANT4 Monte Carlo code version 9.2 patch 2 was used to simulate the decay process of 170 Tm and to calculate the absorbed dose distribution using the GEANT4 Penelope physics models. A hypothetical 170 Tm source based on the Flexisource brachytherapy design with the active core set as a pure thulium cylinder (length 3.5 mm and diameter 0.6 mm) and different cylindrical source encapsulations (length 5 mm and thickness 0.125 mm) constructed of titanium, stainless-steel, gold, or platinum were simulated. The radial dose function for the line source approximation was calculated following the TG-43U1 formalism for the stainless-steel encapsulation. Results: For the titanium and stainless-steel encapsulation, 94% of the total bremsstrahlung is produced inside the core, 4.8 and 5.5% in titanium and stainless-steel capsules, respectively, and less than 1% in water. For the gold capsule, 85% is produced inside the core, 14.2% inside the gold capsule, and a negligible amount ( 170 Tm source is primarily a bremsstrahlung source, with the majority of bremsstrahlung photons being generated in the source core and experiencing little attenuation in the source encapsulation. Electrons are efficiently absorbed by the gold and platinum encapsulations. However, for the stainless-steel capsule (or other lower Z encapsulations) electrons will escape. The dose from these electrons is dominant over the photon dose in the first few millimeter but is not taken into account by current standard treatment planning systems. The total energy spectrum of photons emerging from the source depends on the encapsulation composition and results in mean photon energies well above 100 keV. This is higher than the main gamma-ray energy peak at 84 keV. Based on our

  3. Computational structural and functional analysis of hypothetical proteins of Staphylococcus aureus

    OpenAIRE

    Mohan, Ramadevi; Venugopal, Subhashree

    2012-01-01

    Genome sequencing projects has led to an explosion of large amount of gene products in which many are of hypothetical proteins with unknown function. Analyzing and annotating the functions of hypothetical proteins is important in Staphylococcus aureus which is a pathogenic bacterium that cause multiple types of diseases by infecting various sites in humans and animals. In this study, ten hypothetical proteins of Staphylococcus aureus were retrieved from NCBI and analyzed for their structural ...

  4. A hypothetical severe reactor accident in Sosnovyj Bor, Russia

    International Nuclear Information System (INIS)

    Lahtinen, J.; Toivonen, H.; Poellaenen, R.; Nordlund, G.

    1993-12-01

    Individual doses and short-term radiological consequences from a hypothetical severe accident at the Russian nuclear power plant in Sosnovyj Bor were estimated for two sites in Finland. The sites are Kotka, located 140 km from the plant, and Helsinki, 220 km from the plant. The release was assumed to start immediately after the shutdown of the reactor (a 1000 MW RBMK unit) which had been operating at nominal power level for a long time. An effective release height of 500 m was assumed. The prevailing meteorological conditions during the release were taken to present the situation typical of the area (effective wind speed 9 m/s, neutral dispersion conditions). The release fractions applied in the study were of the same order as in the Chernobyl accident, i.e. 100% for noble gases, 60% for iodines, 40% for cesium and 1-10% for other radiologically important nuclides. The release was assumed to last 24 hours. However, half of the nuclides were released during the first hour. No attention was paid to the actual sequence of events that could lead to such release characteristics and time behaviour. The concentration and dose calculations were performed with a modified version of the computer code OIVA developed in Finnish Centre for Radiation and Nuclear Safety. Inhalation dose and external doses from the release plume and from the deposited activity were calculated for adults only, and no sheltering was considered. (11 refs., 4 figs., 6 tabs.)

  5. Consequence evaluation of hypothetical reactor pressure vessel support failure

    International Nuclear Information System (INIS)

    Lu, S.C.; Holman, G.S.; Lambert, H.E.

    1991-01-01

    This paper describes a consequence evaluation to address safety concerns raised by the radiation embrittlement of the reactor pressure vessel (RPV) supports for the Trojan nuclear power plant. The study comprises a structural evaluation and an effects evaluation and assumes that all four reactor vessel supports have completely lost the load carrying capability. The structural evaluation concludes that the Trojan reactor coolant loop (RCL) piping is capable of transferring loads to the steam generator (SG) supports and the reactor coolant pump (RCP) supports and that the SG supports and the RCP supports have sufficient design margins to accommodate additional loads transferred to them through the RCL piping. The effects evaluation, employing a systems analysis approach, investigates initiating events and the reliability of the engineered safeguard systems as the RPV is subject to movements caused by the RPV support failure. The evaluation identifies a number of areas for further investigation and concludes that a hypothetical failure of the Trojan RPV supports due to radiation embrittlement will not result in consequences of significant safety concerns. (author)

  6. Intersubassembly incoherencies and grouping techniques in LMFBR hypothetical overpower accident

    International Nuclear Information System (INIS)

    Wilburn, N.P.

    1977-10-01

    A detailed analysis was made of the FTR core using the 100-channel MELT-IIIA code. Results were studied for the transient overpower accident (where 0.5$/sec and 1$/sec ramps) and in which the Damage Parameter and the Failure Potential criteria were used. Using the information obtained from these series of runs, a new method of grouping the subassemblies into channels has been developed. Also, it was demonstrated that a 7-channel representation of the FTR core using this method does an adequate job of representing the behavior during a hypothetical disruptive transient overpower core accident. It has been shown that this new 7-channel grouping method does a better job than an earlier 20-channel grouping. It has also been demonstrated that the incoherency effects between subassemblies as shown during the 76-channel representation of the reactor can be adequately modeled by 7-channels, provided the 7-channels are selected according to the criteria stated in the report. The overall results of power and net reactivity were shown to be only slightly different in the two cases of the 7-channel and the 76-channel runs. Therefore, it can be concluded that any intersubassembly incoherencies can be modeled adequately by a small number of channels, provided the subassemblies making up these channels are selected according to the criteria stated

  7. Shock loading of reactor vessel following hypothetical core disruptive accident

    International Nuclear Information System (INIS)

    Srinivas, G.; Doshi, J.B.

    1990-01-01

    Hypothetical Core Disruptive Accident (HCDA) has been historically considered as the maximum credible accident in Fast Breeder Reactor systems. Environmental consequences of such an accident depends to a great extent on the ability of the reactor vessel to maintain integrity during the shock loading following an HCDA. In the present paper, a computational model of the reactor core and the surrounding coolant with a free surface is numerical technique. The equations for conservation of mass, momentum and energy along with an equation of state are considered in two dimensional cylindrical geometry. The reactor core at the end of HCDA is taken as a bubble of hot, vaporized fuel at high temperature and pressure, formed at the center of the reactor vessel and expanding against the surrounding liquid sodium coolant. The free surface of sodium at the top of the vessel and the movement of the core bubble-liquid coolant interface are tracked by Marker and Cell (MAC) procedure. The results are obtained for the transient pressure at the vessel wall and also for the loading on the roof plug by the impact of the slug of liquid sodium. The computer code developed is validated against a benchmark experiment chosen to be ISPRA experiment reported in literature. The computer code is next applied to predict the loading on the Indian Prototype Fast Breeder Reactor (PFBR) being developed at Kalpakkam

  8. Mitigating Higher Ed Cyber Attacks

    Science.gov (United States)

    Rogers, Gary; Ashford, Tina

    2015-01-01

    In this presentation we will discuss the many and varied cyber attacks that have recently occurred in the higher ed community. We will discuss the perpetrators, the victims, the impact and how these institutions have evolved to meet this threat. Mitigation techniques and defense strategies will be covered as will a discussion of effective security…

  9. Detection of complex cyber attacks

    Science.gov (United States)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  10. Role of visible light-activated photocatalyst on the reduction of anthrax spore-induced mortality in mice.

    Directory of Open Access Journals (Sweden)

    Jyh-Hwa Kau

    Full Text Available BACKGROUND: Photocatalysis of titanium dioxide (TiO(2 substrates is primarily induced by ultraviolet light irradiation. Anion-doped TiO(2 substrates were shown to exhibit photocatalytic activities under visible-light illumination, relative environmentally-friendly materials. Their anti-spore activity against Bacillus anthracis, however, remains to be investigated. We evaluated these visible-light activated photocatalysts on the reduction of anthrax spore-induced pathogenesis. METHODOLOGY/PRINCIPAL FINDINGS: Standard plating method was used to determine the inactivation of anthrax spore by visible light-induced photocatalysis. Mouse models were further employed to investigate the suppressive effects of the photocatalysis on anthrax toxin- and spore-mediated mortality. We found that anti-spore activities of visible light illuminated nitrogen- or carbon-doped titania thin films significantly reduced viability of anthrax spores. Even though the spore-killing efficiency is only approximately 25%, our data indicate that spores from photocatalyzed groups but not untreated groups have a less survival rate after macrophage clearance. In addition, the photocatalysis could directly inactivate lethal toxin, the major virulence factor of B. anthracis. In agreement with these results, we found that the photocatalyzed spores have tenfold less potency to induce mortality in mice. These data suggest that the photocatalysis might injury the spores through inactivating spore components. CONCLUSION/SIGNIFICANCE: Photocatalysis induced injuries of the spores might be more important than direct killing of spores to reduce pathogenicity in the host.

  11. 9 CFR 310.9 - Anthrax; carcasses not to be eviscerated; disposition of affected carcasses; hides, hoofs, horns...

    Science.gov (United States)

    2010-01-01

    ... have handled anthrax material is thorough cleansing of the hands and arms with liquid soap and running... Animal Products FOOD SAFETY AND INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE AGENCY ORGANIZATION AND... request to the Scientific Services, Meat and Poultry Inspection, Food Safety and Inspection Service, U.S...

  12. 9 CFR 309.7 - Livestock affected with anthrax; cleaning and disinfection of infected livestock pens and driveways.

    Science.gov (United States)

    2010-01-01

    ...; cleaning and disinfection of infected livestock pens and driveways. 309.7 Section 309.7 Animals and Animal... INSPECTION § 309.7 Livestock affected with anthrax; cleaning and disinfection of infected livestock pens and... followed immediately by a thorough disinfection of the exposed premises by soaking the ground, fences...

  13. Anthrax lethal toxin disrupts intestinal barrier function and causes systemic infections with enteric bacteria.

    Directory of Open Access Journals (Sweden)

    Chen Sun

    Full Text Available A variety of intestinal pathogens have virulence factors that target mitogen activated protein kinase (MAPK signaling pathways, including Bacillus anthracis. Anthrax lethal toxin (LT has specific proteolytic activity against the upstream regulators of MAPKs, the MAPK kinases (MKKs. Using a murine model of intoxication, we show that LT causes the dose-dependent disruption of intestinal epithelial integrity, characterized by mucosal erosion, ulceration, and bleeding. This pathology correlates with an LT-dependent blockade of intestinal crypt cell proliferation, accompanied by marked apoptosis in the villus tips. C57BL/6J mice treated with intravenous LT nearly uniformly develop systemic infections with commensal enteric organisms within 72 hours of administration. LT-dependent intestinal pathology depends upon its proteolytic activity and is partially attenuated by co-administration of broad spectrum antibiotics, indicating that it is both a cause and an effect of infection. These findings indicate that targeting of MAPK signaling pathways by anthrax LT compromises the structural integrity of the mucosal layer, serving to undermine the effectiveness of the intestinal barrier. Combined with the well-described immunosuppressive effects of LT, this disruption of the intestinal barrier provides a potential mechanism for host invasion via the enteric route, a common portal of entry during the natural infection cycle of Bacillus anthracis.

  14. Detection of anthrax lef with DNA-based photonic crystal sensors

    Science.gov (United States)

    Zhang, Bailin; Dallo, Shatha; Peterson, Ralph; Hussain, Syed; Weitao, Tao; Ye, Jing Yong

    2011-12-01

    Bacillus anthracis has posed a threat of becoming biological weapons of mass destruction due to its virulence factors encoded by the plasmid-borne genes, such as lef for lethal factor. We report the development of a fast and sensitive anthrax DNA biosensor based on a photonic crystal structure used in a total-internal-reflection configuration. For the detection of the lef gene, a single-stranded DNA lef probe was biotinylated and immobilized onto the sensor via biotin-streptavidin interactions. A positive control, lef-com, was the complementary strand of the probe, while a negative control was an unrelated single-stranded DNA fragment from the 16S rRNA gene of Acinetobacter baumannii. After addition of the biotinylated lef probe onto the sensor, significant changes in the resonance wavelength of the sensor were observed, resulting from binding of the probe to streptavidin on the sensor. The addition of lef-com led to another significant increase as a result of hybridization between the two DNA strands. The detection sensitivity for the target DNA reached as low as 0.1 nM. In contrast, adding the unrelated DNAs did not cause an obvious shift in the resonant wavelength. These results demonstrate that detection of the anthrax lef by the photonic crystal structure in a total-internal-reflection sensor is highly specific and sensitive.

  15. A Supramolecular Sensing Platform for Phosphate Anions and an Anthrax Biomarker in a Microfluidic Device

    Directory of Open Access Journals (Sweden)

    Jurriaan Huskens

    2011-10-01

    Full Text Available A supramolecular platform based on self-assembled monolayers (SAMs has been implemented in a microfluidic device. The system has been applied for the sensing of two different analyte types: biologically relevant phosphate anions and aromatic carboxylic acids, which are important for anthrax detection. A Eu(III-EDTA complex was bound to β-cyclodextrin monolayers via orthogonal supramolecular host-guest interactions. The self-assembly of the Eu(III-EDTA conjugate and naphthalene β-diketone as an antenna resulted in the formation of a highly luminescent lanthanide complex on the microchannel surface. Detection of different phosphate anions and aromatic carboxylic acids was demonstrated by monitoring the decrease in red emission following displacement of the antenna by the analyte. Among these analytes, adenosine triphosphate (ATP and pyrophosphate, as well as dipicolinic acid (DPA which is a biomarker for anthrax, showed a strong response. Parallel fabrication of five sensing SAMs in a single multichannel chip was performed, as a first demonstration of phosphate and carboxylic acid screening in a multiplexed format that allows a general detection platform for both analyte systems in a single test run with µM and nM detection sensitivity for ATP and DPA, respectively.

  16. Immunization of Mice with Anthrax Protective Antigen Limits Cardiotoxicity but Not Hepatotoxicity Following Lethal Toxin Challenge

    Directory of Open Access Journals (Sweden)

    T. Scott Devera

    2015-06-01

    Full Text Available Protective immunity against anthrax is inferred from measurement of vaccine antigen-specific neutralizing antibody titers in serum samples. In animal models, in vivo challenges with toxin and/or spores can also be performed. However, neither of these approaches considers toxin-induced damage to specific organ systems. It is therefore important to determine to what extent anthrax vaccines and existing or candidate adjuvants can provide organ-specific protection against intoxication. We therefore compared the ability of Alum, CpG DNA and the CD1d ligand α-galactosylceramide (αGC to enhance protective antigen-specific antibody titers, to protect mice against challenge with lethal toxin, and to block cardiotoxicity and hepatotoxicity. By measurement of serum cardiac Troponin I (cTnI, and hepatic alanine aminotransferase (ALT, and aspartate aminotransferase (AST, it was apparent that neither vaccine modality prevented hepatic intoxication, despite high Ab titers and ultimate survival of the subject. In contrast, cardiotoxicity was greatly diminished by prior immunization. This shows that a vaccine that confers survival following toxin exposure may still have an associated morbidity. We propose that organ-specific intoxication should be monitored routinely during research into new vaccine modalities.

  17. Functions of phenylalanine residues within the beta-barrel stem of the anthrax toxin pore.

    Directory of Open Access Journals (Sweden)

    Jie Wang

    2009-07-01

    Full Text Available A key step of anthrax toxin action involves the formation of a protein-translocating pore within the endosomal membrane by the Protective Antigen (PA moiety. Formation of this transmembrane pore by PA involves interaction of the seven 2beta2-2beta3 loops of the heptameric precursor to generate a 14-strand transmembrane beta barrel.We examined the effects on pore formation, protein translocation, and cytotoxicity, of mutating two phenylalanines, F313 and F314, that lie at the tip the beta barrel, and a third one, F324, that lies part way up the barrel.Our results show that the function of these phenylalanine residues is to mediate membrane insertion and formation of stable transmembrane channels. Unlike F427, a key luminal residue in the cap of the pore, F313, F314, and F324 do not directly affect protein translocation through the pore. Our findings add to our knowledge of structure-function relationships of a key virulence factor of the anthrax bacillus.

  18. Simulation of Groundwater Mounding Beneath Hypothetical Stormwater Infiltration Basins

    Science.gov (United States)

    Carleton, Glen B.

    2010-01-01

    Groundwater mounding occurs beneath stormwater management structures designed to infiltrate stormwater runoff. Concentrating recharge in a small area can cause groundwater mounding that affects the basements of nearby homes and other structures. Methods for quantitatively predicting the height and extent of groundwater mounding beneath and near stormwater Finite-difference groundwater-flow simulations of infiltration from hypothetical stormwater infiltration structures (which are typically constructed as basins or dry wells) were done for 10-acre and 1-acre developments. Aquifer and stormwater-runoff characteristics in the model were changed to determine which factors are most likely to have the greatest effect on simulating the maximum height and maximum extent of groundwater mounding. Aquifer characteristics that were changed include soil permeability, aquifer thickness, and specific yield. Stormwater-runoff variables that were changed include magnitude of design storm, percentage of impervious area, infiltration-structure depth (maximum depth of standing water), and infiltration-basin shape. Values used for all variables are representative of typical physical conditions and stormwater management designs in New Jersey but do not include all possible values. Results are considered to be a representative, but not all-inclusive, subset of likely results. Maximum heights of simulated groundwater mounds beneath stormwater infiltration structures are the most sensitive to (show the greatest change with changes to) soil permeability. The maximum height of the groundwater mound is higher when values of soil permeability, aquifer thickness, or specific yield are decreased or when basin depth is increased or the basin shape is square (and values of other variables are held constant). Changing soil permeability, aquifer thickness, specific yield, infiltration-structure depth, or infiltration-structure shape does not change the volume of water infiltrated, it changes the

  19. Trimethyl Chitosan Nanoparticles Encapsulated Protective Antigen Protects the Mice Against Anthrax

    Directory of Open Access Journals (Sweden)

    Anshu Malik

    2018-03-01

    Full Text Available Anthrax is an era old deadly disease against which there are only two currently available licensed vaccines named anthrax vaccine adsorbed and precipitated (AVP. Though they can provide a protective immunity, their multiple side-effects owing to their ill-defined composition and presence of toxic proteins (LF and EF of Bacillus anthracis, the causative organism of anthrax, in the vaccine formulation makes their widespread use objectionable. Hence, an anthrax vaccine that contains well-defined and controlled components would be highly desirable. In this context, we have evaluated the potential of various vaccine formulations comprising of protective antigen (PA encapsulated trimethyl-chitosan nanoparticles (TMC-PA in conjunction with either CpG-C ODN 2395 (CpG or Poly I:C. Each formulation was administered via three different routes, viz., subcutaneous (SC, intramuscular (IM, and intraperitoneal in female BALB/c mice. Irrespective of the route of immunization, CpG or Poly I:C adjuvanted TMC-PA nanoparticles induced a significantly higher humoral response (total serum IgG and its isotypes viz., IgG1, IgG2a, and IgG2b, compared to their CpG or Poly I:C PA counterparts. This clearly demonstrates the synergistic behavior of CpG and Poly I:C with TMC nanoparticles. The adjuvant potential of TMC nanoparticles could be observed in all the three routes as the TMC-PA nanoparticles by themselves induced IgG titers (1–1.5 × 105 significantly higher than both CpG PA and Poly I:C PA groups (2–8 × 104. The effect of formulations on T-helper (Th cell development was assessed by quantifying the Th1-dependant (TNF-α, IFN-γ, and IL-2, Th2-dependant (IL-4, IL-6, and IL-10, and Th17-type (IL-17A cytokines. Adjuvanation with CpG and Poly I:C, the TMC-PA nanoparticles triggered a Th1 skewed immune response, as suggested by an increase in the levels of total IgG2a along with IFN-γ cytokine production. Interestingly, the TMC-PA group showed a Th2-biased

  20. The use of anthrax and orthopox therapeutic antibodies from human origin in biodefense

    International Nuclear Information System (INIS)

    Stienstra, S.

    2009-01-01

    It is impossible to protect whole nations from the effects of bioterrorism by preventive vaccination; there are too many possible agents, costs would be exorbitantly high, and the health risks associated with complex mass vaccination programs would be unacceptable. Adequate protection, however, could be provided via a combination of rapid detection and diagnosis and the treatment of those exposed with drugs which would be beneficial in all stages of disease. Monoclonal antibodies, preferably from human origin to prevent severe complications, which neutralize or block the pathological effects of biological agents, are the optimal candidates to be deployed in case of biological warfare or a bioterrorist event. The human body is one of the better and most suitably equipped places for the generation of monoclonal antibodies which are to be used effectively in humans for treatment. Such antibodies will be of optimal physiological specificity, affinity, and pharmacological properties. In addition, the chances on severe adverse effects and cross-reactivity with human tissues will be slim. Therefore the human immune response is used by the Dutch company IQ Therapeutics, a spin-off of the Groningen University, as a basis for selecting the antibodies. People, immunised against or infected with the agent in question, donate blood cells voluntarily, which are used to generate fully human monoclonal antibodies. In this way effective therapeutics against the protective antigen (PA) and lethal factor (LF) toxin components of Bacillus anthracis are developed and currently antibodies against orthopox viruses are generated as well from donors, which have been immunized with vaccinia. Other projects are the development of therapeutic antibodies for MRSA (antibiotics resistant Staphylococcus aureus) and Enterococcus spp. Both human antibodies against the anthrax toxin components are efficacious in vitro and in pre- and post-exposure settings in mice and rabbits. The anti-LF antibody

  1. A hypothetical study of populations under constant mortality and fertility.

    Science.gov (United States)

    Gupta, R B

    1976-03-01

    28 countries with different characteristics have been selected in order to observe the amount of time it takes for these different countries to reach stable age distributions. The individual populations by sex and age were projected for 150 years in 5-year intervals with the present constant mortality and fertility schedules by component method. Observations have been made by considering the following characteristics of population when it has acquired stability: age distribution; the rate of growth, birthrate, and mortality rate; the population change; the intrinsic rate of growth, birthrate and mortality rate; and approximate time taken to stabilize the population. The initial age distribution has a significant part in the amount of time it takes for a population to acquire stability, and its intrinsic rate of growth is mostly dependent upon the existing age distribution of that population. The time taken for a country's population to become stable depends upon the age distribution, fertility and mortality schedules at the beginning. It has been observed that countries having a higher intrinsic rate of growth take comparatively less time in acquiring stability than the countries having a lower intrinsic rate of growth. The mortality and fertility schedules of a country is another important phenomenon. The populations of the different countries at the point of stability were growing according to their rates of growth. No specific trend of population growth could be found among the groups of countries. Time taken for stabilizing the population is completely based upon age distributions, fertility and mortality schedules a particular country was having at the beginning. The range of time taken for different countries to acquire stability generally ranged from 100 to 135 years. Among the different countries the relationship for the time it takes to acquire stability has not been established. This is a hypothetical approach in order to obtain some idea as to how a

  2. Studies of hypothetical and fundamental decay properties of positronium

    International Nuclear Information System (INIS)

    Wahl, W.

    1985-05-01

    For the solution of the CP problem in the standard theory of the strong interaction the existence of a neutral pseudoscalar boson was postulated which couples to quarks and leptons. If the mass of this so-called axion is smaller than two electron masses for orthopositronium 'o-Ps' the decay into one photon and axion is expected in concurrence to the standard decay into three photons. The detection of a monoenergetic photon would be an indication for this decay channel because the axion would only very weakly interact with matter. In the spectrum no lineshape of a monoenergetic photon is observed. From this results in dependence on the mass of a hypothetical particle and with a confidence limit of 90% for the branching ratio of o-Ps an upper limit which is in the range between 320 keV and 950 keV less than 10 -7 . Applied to the axion model an upper limit for the mass of the standard axion of 250 keV results. For the study of the fundamental decay properties of positronium the lifetime of o-Ps and the 3γ energy distribution of the decay quanta were measured. Furthermore the rare 4γ decay of para-positronium 'p-Ps' was searched for. The measured lifetime of o-Ps τ=141.2±1.2ns agrees well with the theoretical value. Calculations on the 3γ energy distribution are confirmed. For the 4γ decay of p-Ps predicted by QED with a branching ratio of ≅ 1.5x10 -6 an upper limit of 2x10 -5 results. (orig./HSI) [de

  3. Vulnerability Analysis of Physical Protection System at Hypothetical Facility

    International Nuclear Information System (INIS)

    Jung, Won Moog; Lee, Ho Jin; Yu, Dong Han; Min, Gyung Sik

    2006-01-01

    Since the 9/11 event in the U.S.A, International terror possibilities has been increasing for nuclear facilities including nuclear power plants(NPPs). It is necessary to evaluate the performance of an existing physical protection system(PPS) at nuclear facilities based on such malevolent acts. A PPS is a complex configuration of detection, delay, and response elements. Detection, delay, and response elements are all important to the analysis and evaluation of a PPS and its effectiveness. Methods are available to analyze a PPS and evaluate its effectiveness. Sandia National Laboratory(SNL) in the U.S.A was developed a System Analysis of Vulnerability to Intrusion (SAVI) computer code for evaluating the effectiveness of PPS against outsider threats. This study presents the vulnerability analysis of the PPS at hypothetical facility using SAVI code that the basic input parameters are from PPS of Hanaro Research Reactor at Korea Atomic Energy Research Institution. It is understand that PPS of research reactor and critical assemblies are deficient that that of NPP and nuclear materials of RRCAS are compact to transport For analysis, first, the site-specific Adversary Sequence Diagrams(ASDs) of the PPS is constructed. It helps to understand the functions of the existing PPS composed of physical areas and Protection Elements(PEs). Then, the most vulnerable path of an ASD as a measure of effectiveness is determined. The results in the analysis can used to suggest the possible PPS upgrades to the most vulnerable paths for the system like research reactor

  4. 47 CFR 69.608 - Carrier Common Line hypothetical net balance.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 3 2010-10-01 2010-10-01 false Carrier Common Line hypothetical net balance. 69.608 Section 69.608 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER... net balance. The hypothetical net balance shall be equal to a Carrier Common Line revenue requirement...

  5. Using respondent uncertainty to mitigate hypothetical bias in a stated choice experiment

    Science.gov (United States)

    Richard C. Ready; Patricia A. Champ; Jennifer L. Lawton

    2010-01-01

    In a choice experiment study, willingness to pay for a public good estimated from hypothetical choices was three times as large as willingness to pay estimated from choices requiring actual payment. This hypothetical bias was related to the stated level of certainty of respondents. We develop protocols to measure respondent certainty in the context of a choice...

  6. Can a Repeated Opt-Out Reminder remove hypothetical bias in discrete choice experiments?

    DEFF Research Database (Denmark)

    Alemu, Mohammed Hussen; Olsen, Søren Bøye

    hypothetical bias in stated DCE. The data originates from a field experiment concerning consumer preferences for a novel food product made from cricket flour. Utilizing a between-subject design with three treatments, we find significantly higher marginal willingness to pay values in hypothetical than...

  7. Adolescents' explicit and implicit evaluations of hypothetical and actual peers with different bullying participant roles.

    Science.gov (United States)

    Pouwels, J Loes; Lansu, Tessa A M; Cillessen, Antonius H N

    2017-07-01

    This study examined how adolescents evaluate bullying at three levels of specificity: (a) the general concept of bullying, (b) hypothetical peers in different bullying participant roles, and (c) actual peers in different bullying participant roles. Participants were 163 predominantly ethnic majority adolescents in The Netherlands (58% girls; M age =16.34years, SD=0.79). For the hypothetical peers, we examined adolescents' explicit evaluations as well as their implicit evaluations. Adolescents evaluated the general concept of bullying negatively. Adolescents' explicit evaluations of hypothetical and actual peers in the bullying roles depended on their own role, but adolescents' implicit evaluations of hypothetical peers did not. Adolescents' explicit evaluations of hypothetical peers and actual peers were different. Hypothetical bullies were evaluated negatively by all classmates, whereas hypothetical victims were evaluated relatively positively compared with the other roles. However, when adolescents evaluated their actual classmates, the differences between bullies and the other roles were smaller, whereas victims were evaluated the most negatively of all roles. Further research should take into account that adolescents' evaluations of hypothetical peers differ from their evaluations of actual peers. Copyright © 2017 Elsevier Inc. All rights reserved.

  8. Explaining the discrepancy between intentions and actions: the case of hypothetical bias in contingent valuation

    Science.gov (United States)

    Icek Ajzen; Thomas C. Brown; Franklin Carvajal

    2004-01-01

    An experiment was designed to account for intention-behavior discrepancies by applying the theory of planned behavior to contingent valuation. College students (N = 160) voted in hypothetical and real payment referenda to contribute $8 to a scholarship fund. Overestimates of willingness to pay in the hypothetical referendum could not be attributed to moderately...

  9. Combining aptamers and in silico interaction studies to decipher the function of hypothetical proteins

    DEFF Research Database (Denmark)

    Suravajhala, Prashanth; Burri, Harsha Vardhan Reddy; Heiskanen, Arto

    2014-01-01

    We present the potential role of aptamers in elucidating the function of hypothetical proteins, as well as the possibilities provided by bioinformatics for establishing a benchmark for aptamer-protein prediction methods. With these future perspectives, the role of hypothetical proteins as target ...... molecules for diagnostics and therapies could prove to be very useful in development of medical technology....

  10. Peacetime Use of Computer Network Attack

    National Research Council Canada - National Science Library

    Busby, Daniel

    2000-01-01

    .... PDD-63 alerts the nation to prepare for impending cyber attacks. This paper examines the nature, scale, and likelihood of cyber attacks posited in PDD-63 and finds that the country does not face an imminent "electronic Pearl Harbor...

  11. Women's Heart Disease: Heart Attack Symptoms

    Science.gov (United States)

    ... of this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter ... most common heart attack symptom in men and women is chest pain or discomfort. However, women also ...

  12. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  13. Robust Detection of Stepping-Stone Attacks

    National Research Council Canada - National Science Library

    He, Ting; Tong, Lang

    2006-01-01

    The detection of encrypted stepping-stone attack is considered. Besides encryption and padding, the attacker is capable of inserting chaff packets and perturbing packet timing and transmission order...

  14. Using an ontology for network attack planning

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-09-01

    Full Text Available The modern complexity of network attacks and their counter-measures (cyber operations) requires detailed planning. This paper presents a Network Attack Planning ontology which is aimed at providing support for planning such network operations within...

  15. Attack Graph Construction for Security Events Analysis

    Directory of Open Access Journals (Sweden)

    Andrey Alexeevich Chechulin

    2014-09-01

    Full Text Available The paper is devoted to investigation of the attack graphs construction and analysis task for a network security evaluation and real-time security event processing. Main object of this research is the attack modeling process. The paper contains the description of attack graphs building, modifying and analysis technique as well as overview of implemented prototype for network security analysis based on attack graph approach.

  16. Role of Food Insecurity in Outbreak of Anthrax Infections among Humans and Hippopotamuses Living in a Game Reserve Area, Rural Zambia.

    Science.gov (United States)

    Lehman, Mark W; Craig, Allen S; Malama, Constantine; Kapina-Kany'anga, Muzala; Malenga, Philip; Munsaka, Fanny; Muwowo, Sergio; Shadomy, Sean; Marx, Melissa A

    2017-09-01

    In September 2011, a total of 511 human cases of anthrax (Bacillus anthracis) infection and 5 deaths were reported in a game management area in the district of Chama, Zambia, near where 85 hippopotamuses (Hippopotamus amphibious) had recently died of suspected anthrax. The human infections generally responded to antibiotics. To clarify transmission, we conducted a cross-sectional, interviewer-administered household survey in villages where human anthrax cases and hippopotamuses deaths were reported. Among 284 respondents, 84% ate hippopotamus meat before the outbreak. Eating, carrying, and preparing meat were associated with anthrax infection. Despite the risk, 23% of respondents reported they would eat meat from hippopotamuses found dead again because of food shortage (73%), lack of meat (12%), hunger (7%), and protein shortage (5%). Chronic food insecurity can lead to consumption of unsafe foods, leaving communities susceptible to zoonotic infection. Interagency cooperation is necessary to prevent outbreaks by addressing the root cause of exposure, such as food insecurity.

  17. Thermal characterization of organic matter along a (hypothetical) coalification gradient

    Science.gov (United States)

    Cavallo, Ornella; Provenzano, Maria Rosaria; Zaccone, Claudio

    2017-04-01

    Geochemical transformations of organic carbon (C) in aquatic and terrestrial ecosystems are important starting points for genesis of peats, brown coals and other coal precursors. The humification process plays a key role in biogeochemical transformations of organic C and, as a result, in the first stages of coal precursors formation. Thermal analysis was used by Schnitzer and other scientists since 1950-1960s, in order to investigate the stability of several organic materials of industrial value including peat and coal. What soil scientists found was the general occurrence of two exothermic peaks (exotherm 1 and 2) due to decomposition and combustion reactions of organic compounds having different thermal stability and, consequently, different degree of humification. Thermogravimetric analysis (TG) was carried out on different samples reproducing a "hypothetical" coalification gradient as follows: peat (IHSS Pahokee peat standard), fulvic acid (FA), a peat humic acid (HA), leonardite (IHSS Gascoyne standard) and charcoal. An aliquot of about 20 mg of each sample was heated in a ceramic crucible from 50 to 850˚ C at 30˚ C min-1, at a gas flow rate of 30 mL min-1 using a PerkinElmer TGA4000 thermobalance. Samples were analysed both under nitrogen and under synthetic air. All analyses were carried out in triplicate and the average coefficient of variation was bio-transformation of organic materials. Finally, the temperature at which half of the exothermic mass loss has occurred (TG-T50) was also calculated. Preliminary results obtained from TG analysis under air showed that WL2/WL1 ratio was lower for the FA sample and higher for leonardite and charcoal, following the order FA

  18. Emergency measures following hypothetical actions against nuclear facilities in Italy

    International Nuclear Information System (INIS)

    Rogani, A.; Tabet, E.

    2003-01-01

    Full text: After the Chernobyl accident a national emergency plan of protective measures for radiological emergencies has been set up in Italy to cope with nuclear risks which require actions at national level. Since most of the Italian nuclear installations are, at present, not operational, the most relevant nuclear risk sources identified in the national emergency plan stem from accidents in nuclear power plants near the Italian borders or aboard nuclearpropelled ships, or events related to the fall of nuclear-powered satellites and transportation of radioactive materials. The plan identifies a reference scenario for nation-wide emergency interventions and the proper structures to be involved in the radiological emergency. However, risks related to nuclear terrorism are not taken into account in the plan, whereas nuclear plants as well as nuclear materials and sources (in use in medical, scientific and industrial applications) are known to represent potential targets for hostile acts, potentially giving rise to harmful radioactive releases into the atmosphere. Along with four nuclear power plants, now undergoing a decommissioning procedure, several other nuclear facilities, such as provisional radioactive waste deposits or research centers, are present in Italy. Unfortunately not all of the radioactive waste inventory is conditioned in such a way to make a spread of radioactive contamination, as a consequence of a hostile action, unlikely; moreover, spent fuel elements are still kept, in some cases, inside the plant spent fuel storage pool. In this paper the hypothetical radiological impact of deliberate actions against some reference nuclear installations will be evaluated, together with its amplications for an appropriate profiling of the emergency countermeasures which could be required. Especially the case of a terrorism act against a spent fuel storage pool is worked out in some detail, as this event appears to be one of those with the most severe

  19. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  20. Automated classification of computer network attacks

    CSIR Research Space (South Africa)

    Van Heerden, R

    2013-11-01

    Full Text Available according to the relevant types of attack scenarios depicted in the ontology. The two network attack instances are the Distributed Denial of Service attack on SpamHaus in 2013 and the theft of 42 million Rand ($6.7 million) from South African Postbank...

  1. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  2. PREDICTION OF AEROSOL HAZARDS ARISING FROM THE OPENING OF AN ANTHRAX-TAINTED LETTER IN AN OPEN OFFICE ENVIRONMENT USING COMPUTATIONAL FLUID DYNAMICS

    OpenAIRE

    FUE-SANG LIEN; HUA JI; EUGENE YEE; BILL KOURNIKAKIS

    2010-01-01

    Early experimental work, conducted at Defence R&D Canada–Suffield, measured and characterized the personal and environmental contamination associated with simulated anthrax-tainted letters under a number of different scenarios in order to obtain a better understanding of the physical and biological processes for detecting, assessing, and formulating potential mitigation strategies for managing the risks associated with opening an anthrax-tainted letter. These experimental investigations have ...

  3. Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers

    NARCIS (Netherlands)

    Pieters, Wolter; Davarynejad, Mohsen

    2015-01-01

    Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of multiple steps and alternative paths. It is possible to derive properties of the overall attacks from properties of individual steps, such as cost for the attacker and probability of success. However, in

  4. Whispering through DDoS attack

    OpenAIRE

    Miralem Mehic; Jiri Slachta; Miroslav Voznak

    2016-01-01

    Denial of service (DoS) attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS) attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes o...

  5. Script-viruses Attacks on UNIX OS

    Directory of Open Access Journals (Sweden)

    D. M. Mikhaylov

    2010-06-01

    Full Text Available In this article attacks on UNIX OS are considered. Currently antivirus developers are concentrated on protecting systems from viruses that are most common and attack popular operating systems. If the system or its components are not often attacked then the antivirus products are not protecting these components as it is not profitable. The same situation is with script-viruses for UNIX OS as most experts consider that it is impossible for such viruses to get enough rights to attack. Nevertheless the main conclusion of this article is the fact that such viruses can be very powerful and can attack systems and get enough rights.

  6. BOLD responses in reward regions to hypothetical and imaginary monetary rewards.

    Science.gov (United States)

    Miyapuram, Krishna P; Tobler, Philippe N; Gregorios-Pippas, Lucy; Schultz, Wolfram

    2012-01-16

    Monetary rewards are uniquely human. Because money is easy to quantify and present visually, it is the reward of choice for most fMRI studies, even though it cannot be handed over to participants inside the scanner. A typical fMRI study requires hundreds of trials and thus small amounts of monetary rewards per trial (e.g. 5p) if all trials are to be treated equally. However, small payoffs can have detrimental effects on performance due to their limited buying power. Hypothetical monetary rewards can overcome the limitations of smaller monetary rewards but it is less well known whether predictors of hypothetical rewards activate reward regions. In two experiments, visual stimuli were associated with hypothetical monetary rewards. In Experiment 1, we used stimuli predicting either visually presented or imagined hypothetical monetary rewards, together with non-rewarding control pictures. Activations to reward predictive stimuli occurred in reward regions, namely the medial orbitofrontal cortex and midbrain. In Experiment 2, we parametrically varied the amount of visually presented hypothetical monetary reward keeping constant the amount of actually received reward. Graded activation in midbrain was observed to stimuli predicting increasing hypothetical rewards. The results demonstrate the efficacy of using hypothetical monetary rewards in fMRI studies. Copyright © 2011 Elsevier Inc. All rights reserved.

  7. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks. In prac......In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks....... In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...

  8. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based......Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identified...... on invalidating policies in the system model by identifying possible sequences of actions that lead to an attack. The generated attacks are precise enough to illustrate the threat, and they are general enough to hide the details of individual steps....

  9. Whispering through DDoS attack

    Directory of Open Access Journals (Sweden)

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  10. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  11. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  12. Cache timing attacks on recent microarchitectures

    DEFF Research Database (Denmark)

    Andreou, Alexandres; Bogdanov, Andrey; Tischhauser, Elmar Wolfgang

    2017-01-01

    Cache timing attacks have been known for a long time, however since the rise of cloud computing and shared hardware resources, such attacks found new potentially devastating applications. One prominent example is S$A (presented by Irazoqui et al at S&P 2015) which is a cache timing attack against...... AES or similar algorithms in virtualized environments. This paper applies variants of this cache timing attack to Intel's latest generation of microprocessors. It enables a spy-process to recover cryptographic keys, interacting with the victim processes only over TCP. The threat model is a logically...... separated but CPU co-located attacker with root privileges. We report successful and practically verified applications of this attack against a wide range of microarchitectures, from a two-core Nehalem processor (i5-650) to two-core Haswell (i7-4600M) and four-core Skylake processors (i7-6700). The attack...

  13. Design of monodisperse and well-defined polypeptide-based polyvalent inhibitors of anthrax toxin.

    Science.gov (United States)

    Patke, Sanket; Boggara, Mohan; Maheshwari, Ronak; Srivastava, Sunit K; Arha, Manish; Douaisi, Marc; Martin, Jacob T; Harvey, Ian B; Brier, Matthew; Rosen, Tania; Mogridge, Jeremy; Kane, Ravi S

    2014-07-28

    The design of polyvalent molecules, presenting multiple copies of a specific ligand, represents a promising strategy to inhibit pathogens and toxins. The ability to control independently the valency and the spacing between ligands would be valuable for elucidating structure-activity relationships and for designing potent polyvalent molecules. To that end, we designed monodisperse polypeptide-based polyvalent inhibitors of anthrax toxin in which multiple copies of an inhibitory toxin-binding peptide were separated by flexible peptide linkers. By tuning the valency and linker length, we designed polyvalent inhibitors that were over four orders of magnitude more potent than the corresponding monovalent ligands. This strategy for the rational design of monodisperse polyvalent molecules may not only be broadly applicable for the inhibition of toxins and pathogens, but also for controlling the nanoscale organization of cellular receptors to regulate signaling and the fate of stem cells. © 2014 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  14. Vaccine-induced protection against anthrax in cheetah (Acinonyx jubatus) and black rhinoceros (Diceros bicornis).

    Science.gov (United States)

    Turnbull, P C B; Tindall, B W; Coetzee, J D; Conradie, C M; Bull, R L; Lindeque, P M; Huebschle, O J B

    2004-09-03

    Institution of a policy of vaccination in endangered species with a vaccine not previously administered to it cannot be undertaken lightly. This applies even more in the case of cheetah (Acinonyx jubatus) with their unusually monomorphic gene pool and the potential restrictions this places on their immune responses. However, the recently observed mortalities from anthrax in these animals in the Etosha National Park, Namibia, made it imperative to evaluate vaccination. Black rhinoceros (Diceros bicornis), another endangered species in the park, have been vaccinated for over three decades but the effectiveness of this has never been evaluated. Passive protection tests in A/J mice using sera from 12 cheetahs together with enzyme immunoassay indicated that cheetah are able to mount seemingly normal primary and secondary humoral immune responses to the Sterne 34F2 live spore livestock vaccine. Overall protection rates in mice injected with the sera rose and fell in concert with rises and declines in antibody titres, although fine analysis showed that the correlation between titre and protection was complex. Once a high level of protection (96% of mice 1 month after a second booster in the cheetahs) had been achieved, the duration of substantial protection appeared good (60% of the mice 5 months after the second booster). Protection conferred on mice by sera from three of four vaccinated rhino was almost complete, but, obscurely, none of the mice receiving serum from the fourth rhino were protected. Sera from three park lions with naturally acquired high antibody titres, included as controls, also conferred high levels of protection. For the purposes of wildlife management, the conclusions were that vaccination of cheetah with the standard animal anthrax vaccine causes no observable ill effect in the animals and does appear to confer protective immunity. At least one well-separated booster does appear to be desirable. Vaccination of rhino also appears to be justified

  15. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  16. Attack-Resistant Trust Metrics

    Science.gov (United States)

    Levien, Raph

    The Internet is an amazingly powerful tool for connecting people together, unmatched in human history. Yet, with that power comes great potential for spam and abuse. Trust metrics are an attempt to compute the set of which people are trustworthy and which are likely attackers. This chapter presents two specific trust metrics developed and deployed on the Advogato Website, which is a community blog for free software developers. This real-world experience demonstrates that the trust metrics fulfilled their goals, but that for good results, it is important to match the assumptions of the abstract trust metric computation to the real-world implementation.

  17. Migraine attacks the Basal Ganglia

    Directory of Open Access Journals (Sweden)

    Bigal Marcelo

    2011-09-01

    Full Text Available Abstract Background With time, episodes of migraine headache afflict patients with increased frequency, longer duration and more intense pain. While episodic migraine may be defined as 1-14 attacks per month, there are no clear-cut phases defined, and those patients with low frequency may progress to high frequency episodic migraine and the latter may progress into chronic daily headache (> 15 attacks per month. The pathophysiology of this progression is completely unknown. Attempting to unravel this phenomenon, we used high field (human brain imaging to compare functional responses, functional connectivity and brain morphology in patients whose migraine episodes did not progress (LF to a matched (gender, age, age of onset and type of medication group of patients whose migraine episodes progressed (HF. Results In comparison to LF patients, responses to pain in HF patients were significantly lower in the caudate, putamen and pallidum. Paradoxically, associated with these lower responses in HF patients, gray matter volume of the right and left caudate nuclei were significantly larger than in the LF patients. Functional connectivity analysis revealed additional differences between the two groups in regard to response to pain. Conclusions Supported by current understanding of basal ganglia role in pain processing, the findings suggest a significant role of the basal ganglia in the pathophysiology of the episodic migraine.

  18. Anger attacks in obsessive compulsive disorder

    Directory of Open Access Journals (Sweden)

    Nitesh Prakash Painuly

    2011-01-01

    Full Text Available Background: Research on anger attacks has been mostly limited to depression, and only a few studies have focused on anger attacks in obsessive compulsive disorder. Materials and Methods: In a cross-sectional study all new obsessive compulsive disorder patients aged 20-60 years attending an outpatient clinic were assessed using the anger attack questionnaire, irritability, depression and anxiety scale (for the direction of the aggressive behavior and quality of life (QOL. Results: The sample consisted of 42 consecutive subjects with obsessive compulsive disorder, out of which 21 (50% had anger attacks. The obsessive compulsive disorder subjects with and without anger attacks did not show significant differences in terms of sociodemographic variables, duration of illness, treatment, and family history. However, subjects with anger attacks had significantly higher prevalence of panic attacks and comorbid depression. Significantly more subjects with anger attacks exhibited aggressive acts toward spouse, parents, children, and other relatives in the form of yelling and threatening to hurt, trying to hurt, and threatening to leave. However, the two groups did not differ significantly in terms of QOL, except for the psychological domain being worse in the subjects with anger attacks. Conclusion: Anger attacks are present in half of the patients with obsessive compulsive disorder, and they correlate with the presence of comorbid depression.

  19. [Science in the crosshairs of enlightenment. Significance of hypothetical thinking].

    Science.gov (United States)

    Wieland, Wolfgang

    2011-01-01

    To further the enlightenment primarily or even only by means of science was the hope of most representatives of the movement of the enlightenment which gave its name to a whole period of European cultural history. Only a few of its representatives, like Montesquieu and Rousseau, doubted for good reasons, whether and how the goals of the enlightenment can be reached at all by the means of science alone. In his Discours préliminaires to the Encyclopédie D'Alembert still wanted to limit science proper to the narrower field of those kinds of research which were strictly based on observations and calculations alone. In this way he remained committed to Descartes' ideal method of receiving authentic knowledge only by deduction from evident axioms or fundamental theorems. Pascal's casual discovery of the calculation of probabilities allowed to apply mathematics on the hidden laws of the apparent casualties of the human life world. Bacon's project of empirical science as a rational and methodological art of conducting experiments could replace the methodological ideal of science more geometrico. Lichtenberg's refined sensibility for the subjunctive linguistic forms of hypothetical thinking indicates a new understanding of inventing and testing hypotheses as the two most important methods of the experimental sciences when compared to the formal sciences of logic and mathematics. Whoever is studying the history of science of modern times in the cross wire of the enlightenment, will realize soon that science has always been in need of being illuminated about its own chances, risks and side effects. The project of enlightenment through science had to be complemented by the project of an enlightenment about science right from its beginning. Because of the implicit risks and side effects the project of enlightenment has to be enlightenment despite of science and because of science. On the one hand, as a special form of human practice the sciences are directed towards

  20. Analysis of hypothetical LMFBR whole-core accidents in the USA

    International Nuclear Information System (INIS)

    Ferguson, D.R.; Deitrich, L.W.; Brown, N.W.; Waltar, A.E.

    1978-01-01

    Methods used for analysis of material behaviour, accident phenomenology and integrated accident calculations are reviewed. Applications of these methods to hypothetical LOF and TOP accidents are discussed. Recent results obtained from applications to FFTF and CRBRP are presented. (author)

  1. Comparison of the Structural Stability and Dynamic Properties of Recombinant Anthrax Protective Antigen and its 2-Fluorohistidine Labeled Analogue

    OpenAIRE

    Hu, Lei; Joshi, Sangeeta B.; Andra, Kiran K.; Thakkar, Santosh V.; Volkin, David B.; Bann, James G.; Middaugh, C. Russell

    2012-01-01

    Protective antigen (PA) is the primary protein antigenic component of both the currently used anthrax vaccine and related recombinant vaccines under development. An analogue of recombinant PA (2-FHis rPA) has been recently shown to block the key steps of pore formation in the process of inducing cytotoxicity in cells, and thus can potentially be used as an antitoxin or a vaccine. This rPA analogue was produced by fermentation to incorporate the unnatural amino acid 2-fluorohistidine (2-FHis)....

  2. Cardiac-specific catalase overexpression rescues anthrax lethal toxin-induced cardiac contractile dysfunction: role of oxidative stress and autophagy.

    Science.gov (United States)

    Kandadi, Machender R; Yu, Xuejun; Frankel, Arthur E; Ren, Jun

    2012-11-07

    Lethal and edema toxins secreted by Bacillus anthracis during anthrax infection were found to incite serious cardiovascular complications. However, the underlying mechanisms in anthrax lethal toxin-induced cardiac anomalies remain unknown. This study was designed to evaluate the impact of antioxidant enzyme catalase in anthrax lethal toxin-induced cardiomyocyte contractile dysfunction. Wild type (WT) and cardiac-specific catalase overexpression mice were challenged with lethal toxin (2 μg/g, intraperotineally (i.p.)). Cardiomyocyte contractile and intracellular Ca(2+) properties were assessed 18 h later using an IonOptix edge-detection system. Proteasome function was assessed using chymotrypsin-like and caspase-like activities. GFP-LC3 puncta and Western blot analysis were used to evaluate autophagy and protein ubiquitination. Lethal toxin exposure suppressed cardiomyocyte contractile function (suppressed peak shortening, maximal velocity of shortening/re-lengthening, prolonged duration of shortening/re-lengthening, and impaired intracellular Ca(2+) handling), the effects of which were alleviated by catalase. In addition, lethal toxin triggered autophagy, mitochondrial and ubiquitin-proteasome defects, the effects of which were mitigated by catalase. Pretreatment of cardiomyocytes from catalase mice with the autophagy inducer rapamycin significantly attenuated or ablated catalase-offered protection against lethal toxin-induced cardiomyocyte dysfunction. On the other hand, the autophagy inhibitor 3-MA ablated or significantly attenuated lethal toxin-induced cardiomyocyte contractile anomalies. Our results suggest that catalase is protective against anthrax lethal toxin-induced cardiomyocyte contractile and intracellular Ca(2+) anomalies, possibly through regulation of autophagy and mitochondrial function.

  3. Cardiac-specific catalase overexpression rescues anthrax lethal toxin-induced cardiac contractile dysfunction: role of oxidative stress and autophagy

    Directory of Open Access Journals (Sweden)

    Kandadi Machender R

    2012-11-01

    Full Text Available Abstract Background Lethal and edema toxins secreted by Bacillus anthracis during anthrax infection were found to incite serious cardiovascular complications. However, the underlying mechanisms in anthrax lethal toxin-induced cardiac anomalies remain unknown. This study was designed to evaluate the impact of antioxidant enzyme catalase in anthrax lethal toxin-induced cardiomyocyte contractile dysfunction. Methods Wild type (WT and cardiac-specific catalase overexpression mice were challenged with lethal toxin (2 μg/g, intraperotineally (i.p.. Cardiomyocyte contractile and intracellular Ca2+ properties were assessed 18 h later using an IonOptix edge-detection system. Proteasome function was assessed using chymotrypsin-like and caspase-like activities. GFP-LC3 puncta and Western blot analysis were used to evaluate autophagy and protein ubiquitination. Results Lethal toxin exposure suppressed cardiomyocyte contractile function (suppressed peak shortening, maximal velocity of shortening/re-lengthening, prolonged duration of shortening/re-lengthening, and impaired intracellular Ca2+ handling, the effects of which were alleviated by catalase. In addition, lethal toxin triggered autophagy, mitochondrial and ubiquitin-proteasome defects, the effects of which were mitigated by catalase. Pretreatment of cardiomyocytes from catalase mice with the autophagy inducer rapamycin significantly attenuated or ablated catalase-offered protection against lethal toxin-induced cardiomyocyte dysfunction. On the other hand, the autophagy inhibitor 3-MA ablated or significantly attenuated lethal toxin-induced cardiomyocyte contractile anomalies. Conclusions Our results suggest that catalase is protective against anthrax lethal toxin-induced cardiomyocyte contractile and intracellular Ca2+ anomalies, possibly through regulation of autophagy and mitochondrial function.

  4. DDOS ATTACK DETECTION SIMULATION AND HANDLING MECHANISM

    Directory of Open Access Journals (Sweden)

    Ahmad Sanmorino

    2013-11-01

    Full Text Available In this study we discuss how to handle DDoS attack that coming from the attacker by using detection method and handling mechanism. Detection perform by comparing number of packets and number of flow. Whereas handling mechanism perform by limiting or drop the packets that detected as a DDoS attack. The study begins with simulation on real network, which aims to get the real traffic data. Then, dump traffic data obtained from the simulation used for detection method on our prototype system called DASHM (DDoS Attack Simulation and Handling Mechanism. From the result of experiment that has been conducted, the proposed method successfully detect DDoS attack and handle the incoming packet sent by attacker.

  5. Model checking exact cost for attack scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2017-01-01

    Attack trees constitute a powerful tool for modelling security threats. Many security analyses of attack trees can be seamlessly expressed as model checking of Markov Decision Processes obtained from the attack trees, thus reaping the benefits of a coherent framework and a mature tool support....... However, current model checking does not encompass the exact cost analysis of an attack, which is standard for attack trees. Our first contribution is the logic erPCTL with cost-related operators. The extended logic allows to analyse the probability of an event satisfying given cost bounds and to compute...... the exact cost of an event. Our second contribution is the model checking algorithm for erPCTL. Finally, we apply our framework to the analysis of attack trees....

  6. Securing internet by eliminating DDOS attacks

    Science.gov (United States)

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  7. Role of the Antigen Capture Pathway in the Induction of a Neutralizing Antibody Response to Anthrax Protective Antigen

    Directory of Open Access Journals (Sweden)

    Anita Verma

    2018-02-01

    Full Text Available Toxin neutralizing antibodies represent the major mode of protective immunity against a number of toxin-mediated bacterial diseases, including anthrax; however, the cellular mechanisms that lead to optimal neutralizing antibody responses remain ill defined. Here we show that the cellular binding pathway of anthrax protective antigen (PA, the binding component of anthrax toxin, determines the toxin neutralizing antibody response to this antigen. PA, which binds cellular receptors and efficiently enters antigen-presenting cells by receptor-mediated endocytosis, was found to elicit robust anti-PA IgG and toxin neutralizing antibody responses. In contrast, a receptor binding-deficient mutant of PA, which does not bind receptors and only inefficiently enters antigen-presenting cells by macropinocytosis, elicited very poor antibody responses. A chimeric protein consisting of the receptor binding-deficient PA mutant tethered to the binding subunit of cholera toxin, which efficiently enters cells using the cholera toxin receptor rather than the PA receptor, elicited an anti-PA IgG antibody response similar to that elicited by wild-type PA; however, the chimeric protein elicited a poor toxin neutralizing antibody response. Taken together, our results demonstrate that the antigen capture pathway can dictate the magnitudes of the total IgG and toxin neutralizing antibody responses to PA as well as the ratio of the two responses.

  8. Immunoassay for Capsular Antigen of Bacillus anthracis Enables Rapid Diagnosis in a Rabbit Model of Inhalational Anthrax.

    Directory of Open Access Journals (Sweden)

    Marcellene A Gates-Hollingsworth

    Full Text Available Inhalational anthrax is a serious biothreat. Effective antibiotic treatment of inhalational anthrax requires early diagnosis; the further the disease has progressed, the less the likelihood for cure. Current means for diagnosis such as blood culture require several days to a result and require advanced laboratory infrastructure. An alternative approach to diagnosis is detection of a Bacillus anthracis antigen that is shed into blood and can be detected by rapid immunoassay. The goal of the study was to evaluate detection of poly-γ-D-glutamic acid (PGA, the capsular antigen of B. anthracis, as a biomarker surrogate for blood culture in a rabbit model of inhalational anthrax. The mean time to a positive blood culture was 26 ± 5.7 h (mean ± standard deviation, whereas the mean time to a positive ELISA was 22 ± 4.2 h; P = 0.005 in comparison with blood culture. A lateral flow immunoassay was constructed for detection of PGA in plasma at concentrations of less than 1 ng PGA/ml. Use of the lateral flow immunoassay for detection of PGA in the rabbit model found that antigen was detected somewhat earlier than the earliest time point at which the blood culture became positive. The low cost, ease of use, and rapid time to result of the lateral flow immunoassay format make an immunoassay for PGA a viable surrogate for blood culture for detection of infection in individuals who have a likelihood of exposure to B. anthracis.

  9. Where can an Insider attack?

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming

    2006-01-01

    By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage...... to the targeted organisation. While the problem is well recognised in the security community as well as in law-enforcement and intelligence communities, the main resort still is to audit log files \\$\\backslash\\$emph{after the fact}. There has been little research into developing models, automated tools......, and techniques for analysing and solving (parts of) the problem. In this paper we first develop a formal model of systems, that can describe real-world scenarios. These high-level models are then mapped to acKlaim, a process algebra with support for access control, that is used to study and analyse properties...

  10. Transient ischemic attack: diagnostic evaluation.

    Science.gov (United States)

    Messé, Steven R; Jauch, Edward C

    2008-08-01

    A transient ischemic attack portends significant risk of a stroke. Consequently, the diagnostic evaluation in the emergency department is focused on identifying high-risk causes so that preventive strategies can be implemented. The evaluation consists of a facilitated evaluation of the patient's metabolic, cardiac, and neurovascular systems. At a minimum, the following tests are recommended: fingerstick glucose level, electrolyte levels, CBC count, urinalysis, and coagulation studies; noncontrast computed tomography (CT) of the head; electrocardiography; and continuous telemetry monitoring. Vascular imaging studies, such as carotid ultrasonography, CT angiography, or magnetic resonance angiography, should be performed on an urgent basis and prioritized according to the patient's risk stratification for disease. Consideration should be given for echocardiography if no large vessel abnormality is identified.

  11. Integrating cyber attacks within fault trees

    International Nuclear Information System (INIS)

    Nai Fovino, Igor; Masera, Marcelo; De Cian, Alessio

    2009-01-01

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  12. Visualizing Risks: Icons for Information Attack Scenarios

    National Research Council Canada - National Science Library

    Hosmer, Hilary

    2000-01-01

    .... Visual attack scenarios help defenders see system ambiguities, imprecision, vulnerabilities and omissions, thus speeding up risk analysis, requirements gathering, safeguard selection, cryptographic...

  13. Classifying network attack scenarios using an ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-03-01

    Full Text Available ) or to the target?s reputation. The Residue sub-phase refers to damage or artefacts of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example after the launch of a DDOS..., A. (1995). Hacking theft of $10 million from citibank revealed. Retrieved 10/10, 2011, from http://articles.latimes.com/1995-08-19/business/fi-36656_1_citibank-system Hurley, E. (2004). SCO site succumbs to DDoS attack. Retrieved 10/10, 2011, from...

  14. A computer network attack taxonomy and ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-01-01

    Full Text Available of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example, after the launch of a DDOS (Distributed Denial of Service) attack, zombie computers may still connect to the target...-scrap- value-of-a-hacked-pc-revisited/ . Lancor, L., & Workman, R. (2007). Using Google Hacking to Enhance Defense Strategies. ACM SIGCSE Bulletin, 39 (1), 491-495. Lau, F., Rubin, S. H., Smith, M. H., & Trajkovic, L. (2000). Distributed Denial of Service...

  15. Integrating cyber attacks within fault trees

    Energy Technology Data Exchange (ETDEWEB)

    Nai Fovino, Igor [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy)], E-mail: igor.nai@jrc.it; Masera, Marcelo [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy); De Cian, Alessio [Department of Electrical Engineering, University di Genova, Genoa (Italy)

    2009-09-15

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  16. Forecasting of interaction between bee propolis and protective antigenic domain in anthrax using the software and bioinformatics web servers

    Directory of Open Access Journals (Sweden)

    Elmira Mohammadi

    2017-01-01

    Full Text Available Background: Protective antigen of anthrax toxin, after touching the cell receptors, plays an important role in the pathogenesis of toxin. The purpose of this study was to investigate the interaction of anthrax toxin protective antigen and four great combination propolis included caffeic acid, benzyl caffeate, cinnamic acid and kaempferol using the softwares and bioinformatics web servers. Methods: Three-dimensional structure of protective antigen (receptor obtains from Protein Data Bank (PDB. Four of the main components from propolis were selected          as ligand and their 3D-structures were obtained from ChemSpider and ZINC     compound database. The interaction of each ligand and receptor was assessed                   by SwissDock server (http://www.swissdock.ch/ and BSP-SLIM server (http://zhanglab.ccmb.med.umich.edu/BSP-SLIM. Docking results appears with Fullfitness numbers (in kcal/mol. Identification of amino acids involved in ligand and receptor interaction, was performed using the Chimera software; UCSF Chimera program (http://www.cgl.ucsf.edu/. Results: The results of interaction between propolis components and protective antigen by BSP-SLIM server showed that the most interaction was related with benzyl caffeate, caffeic acid, kaempferol and cinnamic acid, respectively. Results for the desired ligand Interaction with protective antigen genes using SwissDock server showed that the caffeic acid had ΔG equals -9.10 kcal/mol and FullFitness equal to -993.16 kcal/mol respectively. The analysis of interaction between ligands with amino-acids of protective antigen indicated that the interaction of Caffeic acid whit Glutamic acid 117 had energy -15.5429 kcal/mol. Conclusion: Finding strong and safe inhibitors for anthrax toxin is very useful method for inhibiting its toxicity to cell. In this study the binding ability of four flavonoids to protective antigen was studied. Glutamic acid 117 is very effective

  17. Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0

    NARCIS (Netherlands)

    Gadyatskaya, Olga; Jhawar, Ravi; Kordy, P.T.; Lounis, Karim; Mauw, Sjouke; Trujillo-Rasua, Rolando

    2016-01-01

    In this tool demonstration paper we present the ADTool2.0: an open-source software tool for design, manipulation and analysis of attack trees. The tool supports ranking of attack scenarios based on quantitative attributes entered by the user; it is scriptable; and it incorporates attack trees with

  18. The work-averse cyber attacker model : theory and evidence from two million attack signatures

    NARCIS (Netherlands)

    Allodi, L.; Massacci, F.; Williams, J.

    The typical cyber attacker is assumed to be all powerful and to exploit all possible vulnerabilities. In this paper we present, and empirically validate, a novel and more realistic attacker model. The intuition of our model is that an attacker will optimally choose whether to act and weaponize a new

  19. Attack Tree Generation by Policy Invalidation

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Naeem Akram, R.; Jajodia, S.

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identi﬿cation. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identi﬿ed

  20. Evaluation of Crosstalk Attacks in Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    2016-01-01

    WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks...

  1. Drammer : Deterministic Rowhammer attacks on mobile platforms

    NARCIS (Netherlands)

    Van Der Veen, Victor; Fratantonio, Yanick; Lindorfer, Martina; Gruss, Daniel; Maurice, Clémentine; Vigna, Giovanni; Bos, Herbert; Razavi, Kaveh; Giuffrida, Cristiano

    2016-01-01

    Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and completely subvert a system. However, existing efforts either describe probabilistic (and thus unreliable) attacks or rely on special (and often unavailable) memory management features to place victim objects

  2. Collaborative Attack Mitigation and Response: A survey

    NARCIS (Netherlands)

    Steinberger, Jessica; Sperotto, Anna; Baier, Harald; Pras, Aiko

    2015-01-01

    Over recent years, network-based attacks have become to one of the top causes of network infrastructure and service outages. To counteract a network-based attack, an approach is to move mitigation from the target network to the networks of Internet Service Providers (ISP). However, it remains

  3. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...

  4. Expression profiling of hypothetical genes in Desulfovibrio vulgaris leads to improved functional annotation

    Energy Technology Data Exchange (ETDEWEB)

    Elias, Dwayne A.; Mukhopadhyay, Aindrila; Joachimiak, Marcin P.; Drury, Elliott C.; Redding, Alyssa M.; Yen, Huei-Che B.; Fields, Matthew W.; Hazen, Terry C.; Arkin, Adam P.; Keasling, Jay D.; Wall, Judy D.

    2008-10-27

    Hypothetical and conserved hypothetical genes account for>30percent of sequenced bacterial genomes. For the sulfate-reducing bacterium Desulfovibrio vulgaris Hildenborough, 347 of the 3634 genes were annotated as conserved hypothetical (9.5percent) along with 887 hypothetical genes (24.4percent). Given the large fraction of the genome, it is plausible that some of these genes serve critical cellular roles. The study goals were to determine which genes were expressed and provide a more functionally based annotation. To accomplish this, expression profiles of 1234 hypothetical and conserved genes were used from transcriptomic datasets of 11 environmental stresses, complemented with shotgun LC-MS/MS and AMT tag proteomic data. Genes were divided into putatively polycistronic operons and those predicted to be monocistronic, then classified by basal expression levels and grouped according to changes in expression for one or multiple stresses. 1212 of these genes were transcribed with 786 producing detectable proteins. There was no evidence for expression of 17 predicted genes. Except for the latter, monocistronic gene annotation was expanded using the above criteria along with matching Clusters of Orthologous Groups. Polycistronic genes were annotated in the same manner with inferences from their proximity to more confidently annotated genes. Two targeted deletion mutants were used as test cases to determine the relevance of the inferred functional annotations.

  5. Further evidence of close correspondence for alcohol demand decision making for hypothetical and incentivized rewards.

    Science.gov (United States)

    Amlung, Michael; MacKillop, James

    2015-04-01

    Alcohol purchase tasks (APTs) are increasingly being used to assess behavioral economic demand for alcohol. Prior studies utilizing APTs have typically assessed demand for hypothetical outcomes, making the extent to which these hypothetical measures reflect preferences when actual rewards are at stake an important empirical question. This study examined alcohol demand across hypothetical and incentivized APTs. Nineteen male heavy drinkers completed two APTs - one for hypothetical alcohol and another in which one randomly-selected outcome was provided. Participants were given an opportunity to consume the alcohol associated with their choice on the incentivized APT during a self-administration period in a simulated bar environment. Results indicated generally close correspondence between APT versions, though participants were more sensitive to increases in price and tended to consume more at low prices on the incentivized version. Estimated consumption on the incentivized APT was highly correlated with the amount of alcohol consumed in the laboratory (r=.87, pdecision-making when rewards are hypothetical vs. actually available. Implications for behavioral economic approaches to addictive behavior and directions for future research are discussed. Copyright © 2015 Elsevier B.V. All rights reserved.

  6. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  7. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  8. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  9. Noninvasive imaging technologies reveal edema toxin as a key virulence factor in anthrax.

    Science.gov (United States)

    Dumetz, Fabien; Jouvion, Grégory; Khun, Huot; Glomski, Ian Justin; Corre, Jean-Philippe; Rougeaux, Clémence; Tang, Wei-Jen; Mock, Michèle; Huerre, Michel; Goossens, Pierre Louis

    2011-06-01

    Powerful noninvasive imaging technologies enable real-time tracking of pathogen-host interactions in vivo, giving access to previously elusive events. We visualized the interactions between wild-type Bacillus anthracis and its host during a spore infection through bioluminescence imaging coupled with histology. We show that edema toxin plays a central role in virulence in guinea pigs and during inhalational infection in mice. Edema toxin (ET), but not lethal toxin (LT), markedly modified the patterns of bacterial dissemination leading, to apparent direct dissemination to the spleen and provoking apoptosis of lymphoid cells. Each toxin alone provoked particular histological lesions in the spleen. When ET and LT are produced together during infection, a specific temporal pattern of lesion developed, with early lesions typical of LT, followed at a later stage by lesions typical of ET. Our study provides new insights into the complex spatial and temporal effects of B. anthracis toxins in the infected host, suggesting a greater role than previously suspected for ET in anthrax and suggesting that therapeutic targeting of ET contributes to protection. Copyright © 2011 American Society for Investigative Pathology. Published by Elsevier Inc. All rights reserved.

  10. Development of a Zealand white rabbit deposition model to study inhalation anthrax

    Energy Technology Data Exchange (ETDEWEB)

    Asgharian, Bahman; Price, Owen; Kabilan, Senthil; Jacob, Richard E.; Einstein, Daniel R.; Kuprat, Andrew P.; Corley, Richard A.

    2016-01-28

    Despite using rabbits in several inhalation exposure experiments to study diseases such as anthrax, there is a lack of understanding regarding deposition characteristics and fate of inhaled particles (bio-aerosols and viruses) in the respiratory tracts of rabbits. Such information allows dosimetric extrapolation to humans to inform human outcomes. The lung geometry of the New Zealand white rabbit (referred to simply as rabbits throughout the article) was constructed using recently acquired scanned images of the conducting airways of rabbits and available information on its acinar region. In addition, functional relationships were developed for the lung and breathing parameters of rabbits as a function of body weight. The lung geometry and breathing parameters were used to extend the existing deposition model for humans and several other species to rabbits. Evaluation of the deposition model for rabbits was made by comparing predictions with available measurements in the literature. Deposition predictions in the lungs of rabbits indicated smaller deposition fractions compared to those found in humans across various particle diameter ranges. The application of the deposition model for rabbits was demonstrated by extrapolating deposition predictions in rabbits to find equivalent human exposure concentrations assuming the same dose-response relationship between the two species. Human equivalent exposure concentration levels were found to be much smaller than those for rabbits.

  11. Differential dependence on N-glycosylation of anthrax toxin receptors CMG2 and TEM8.

    Directory of Open Access Journals (Sweden)

    Sarah Friebe

    Full Text Available ANTXR 1 and 2, also known as TEM8 and CMG2, are two type I membrane proteins, which have been extensively studied for their role as anthrax toxin receptors, but with a still elusive physiological function. Here we have analyzed the importance of N-glycosylation on folding, trafficking and ligand binding of these closely related proteins. We find that TEM8 has a stringent dependence on N-glycosylation. The presence of at least one glycan on each of its two extracellular domains, the vWA and Ig-like domains, is indeed necessary for efficient trafficking to the cell surface. In the absence of any N-linked glycans, TEM8 fails to fold correctly and is recognized by the ER quality control machinery. Expression of N-glycosylation mutants reveals that CMG2 is less vulnerable to sugar loss. The absence of N-linked glycans in one of the extracellular domains indeed has little impact on folding, trafficking or receptor function of the wild type protein expressed in tissue culture cells. N-glycans do, however, seem required in primary fibroblasts from human patients. Here, the presence of N-linked sugars increases the tolerance to mutations in cmg2 causing the rare genetic disease Hyaline Fibromatosis Syndrome. It thus appears that CMG2 glycosylation provides a buffer towards genetic variation by promoting folding of the protein in the ER lumen.

  12. The secret life of the anthrax agent Bacillus anthracis: bacteriophage-mediated ecological adaptations.

    Directory of Open Access Journals (Sweden)

    Raymond Schuch

    2009-08-01

    Full Text Available Ecological and genetic factors that govern the occurrence and persistence of anthrax reservoirs in the environment are obscure. A central tenet, based on limited and often conflicting studies, has long held that growing or vegetative forms of Bacillus anthracis survive poorly outside the mammalian host and must sporulate to survive in the environment. Here, we present evidence of a more dynamic lifecycle, whereby interactions with bacterial viruses, or bacteriophages, elicit phenotypic alterations in B. anthracis and the emergence of infected derivatives, or lysogens, with dramatically altered survival capabilities. Using both laboratory and environmental B. anthracis strains, we show that lysogeny can block or promote sporulation depending on the phage, induce exopolysaccharide expression and biofilm formation, and enable the long-term colonization of both an artificial soil environment and the intestinal tract of the invertebrate redworm, Eisenia fetida. All of the B. anthracis lysogens existed in a pseudolysogenic-like state in both the soil and worm gut, shedding phages that could in turn infect non-lysogenic B. anthracis recipients and confer survival phenotypes in those environments. Finally, the mechanism behind several phenotypic changes was found to require phage-encoded bacterial sigma factors and the expression of at least one host-encoded protein predicted to be involved in the colonization of invertebrate intestines. The results here demonstrate that during its environmental phase, bacteriophages provide B. anthracis with alternatives to sporulation that involve the activation of soil-survival and endosymbiotic capabilities.

  13. Development of a Zealand White Rabbit Deposition Model to Study Inhalation Anthrax

    Science.gov (United States)

    Asgharian, Bahman; Price, Owen; Kabilan, Senthil; Jacob, Richard E.; Einstein, Daniel R.; Kuprat, A.P.; Corley, Richard A.

    2016-01-01

    Despite using rabbits in several inhalation exposure experiments to study diseases such as anthrax, there is a lack of understanding regarding deposition characteristics and fate of inhaled particles (bio-aerosols and viruses) in the respiratory tracts of rabbits. Such information allows dosimetric extrapolation to humans to inform human outcomes. The lung geometry of the New Zealand white rabbit (referred to simply as rabbits throughout the article) was constructed using recently acquired scanned images of the conducting airways of rabbits and available information on its acinar region. In addition, functional relationships were developed for the lung and breathing parameters of rabbits as a function of body weight. The lung geometry and breathing parameters were used to extend the existing deposition model for humans and several other species to rabbits. Evaluation of the deposition model for rabbits was made by comparing predictions with available measurements in the literature. Deposition predictions in the lungs of rabbits indicated smaller deposition fractions compared to those found in humans across various particle diameter ranges. The application of the deposition model for rabbits was demonstrated by extrapolating deposition predictions in rabbits to find equivalent human exposure concentrations assuming the same dose-response relationship between the two species. Human equivalent exposure concentration levels were found to be much smaller than those for rabbits. PMID:26895308

  14. Fatal attraction: vegetation responses to nutrient inputs attract herbivores to infectious anthrax carcass sites.

    Science.gov (United States)

    Turner, Wendy C; Kausrud, Kyrre L; Krishnappa, Yathin S; Cromsigt, Joris P G M; Ganz, Holly H; Mapaure, Isaac; Cloete, Claudine C; Havarua, Zepee; Küsters, Martina; Getz, Wayne M; Stenseth, Nils Chr

    2014-11-22

    Parasites can shape the foraging behaviour of their hosts through cues indicating risk of infection. When cues for risk co-occur with desired traits such as forage quality, individuals face a trade-off between nutrient acquisition and parasite exposure. We evaluated how this trade-off may influence disease transmission in a 3-year experimental study of anthrax in a guild of mammalian herbivores in Etosha National Park, Namibia. At plains zebra (Equus quagga) carcass sites we assessed (i) carcass nutrient effects on soils and grasses, (ii) concentrations of Bacillus anthracis (BA) on grasses and in soils, and (iii) herbivore grazing behaviour, compared with control sites, using motion-sensing camera traps. We found that carcass-mediated nutrient pulses improved soil and vegetation, and that BA is found on grasses up to 2 years after death. Host foraging responses to carcass sites shifted from avoidance to attraction, and ultimately to no preference, with the strength and duration of these behavioural responses varying among herbivore species. Our results demonstrate that animal carcasses alter the environment and attract grazing hosts to parasite aggregations. This attraction may enhance transmission rates, suggesting that hosts are limited in their ability to trade off nutrient intake with parasite avoidance when relying on indirect cues. © 2014 The Author(s) Published by the Royal Society. All rights reserved.

  15. Peptide Probes Reveal a Hydrophobic Steric Ratchet in the Anthrax Toxin Protective Antigen Translocase.

    Science.gov (United States)

    Colby, Jennifer M; Krantz, Bryan A

    2015-11-06

    Anthrax toxin is a tripartite virulence factor produced by Bacillus anthracis during infection. Under acidic endosomal pH conditions, the toxin's protective antigen (PA) component forms a transmembrane channel in host cells. The PA channel then translocates its two enzyme components, lethal factor and edema factor, into the host cytosol under the proton motive force. Protein translocation under a proton motive force is catalyzed by a series of nonspecific polypeptide binding sites, called clamps. A 10-residue guest/host peptide model system, KKKKKXXSXX, was used to functionally probe polypeptide-clamp interactions within wild-type PA channels. The guest residues were Thr, Ala, Leu, Phe, Tyr, and Trp. In steady-state translocation experiments, the channel blocked most tightly with peptides that had increasing amounts of nonpolar surface area. Cooperative peptide binding was observed in the Trp-containing peptide sequence but not the other tested sequences. Trp substitutions into a flexible, uncharged linker between the lethal factor amino-terminal domain and diphtheria toxin A chain expedited translocation. Therefore, peptide-clamp sites in translocase channels can sense large steric features (like tryptophan) in peptides, and while these steric interactions may make a peptide translocate poorly, in the context of folded domains, they can make the protein translocate more rapidly presumably via a hydrophobic steric ratchet mechanism. Copyright © 2015 The Authors. Published by Elsevier Ltd.. All rights reserved.

  16. What we say and what we do: the relationship between real and hypothetical moral choices.

    Science.gov (United States)

    FeldmanHall, Oriel; Mobbs, Dean; Evans, Davy; Hiscox, Lucy; Navrady, Lauren; Dalgleish, Tim

    2012-06-01

    Moral ideals are strongly ingrained within society and individuals alike, but actual moral choices are profoundly influenced by tangible rewards and consequences. Across two studies we show that real moral decisions can dramatically contradict moral choices made in hypothetical scenarios (Study 1). However, by systematically enhancing the contextual information available to subjects when addressing a hypothetical moral problem-thereby reducing the opportunity for mental simulation-we were able to incrementally bring subjects' responses in line with their moral behaviour in real situations (Study 2). These results imply that previous work relying mainly on decontextualized hypothetical scenarios may not accurately reflect moral decisions in everyday life. The findings also shed light on contextual factors that can alter how moral decisions are made, such as the salience of a personal gain. Copyright © 2012 Elsevier B.V. All rights reserved.

  17. Differences in Behavior and Brain Activity during Hypothetical and Real Choices.

    Science.gov (United States)

    Camerer, Colin; Mobbs, Dean

    2017-01-01

    Real behaviors are binding consequential commitments to a course of action, such as harming another person, buying an Apple watch, or fleeing from danger. Cognitive scientists are generally interested in the psychological and neural processes that cause such real behavior. However, for practical reasons, many scientific studies measure behavior using only hypothetical or imagined stimuli. Generalizing from such studies to real behavior implicitly assumes that the processes underlying the two types of behavior are similar. We review evidence of similarity and differences in hypothetical and real mental processes. In many cases, hypothetical choice tasks give an incomplete picture of brain circuitry that is active during real choice. Copyright © 2016. Published by Elsevier Ltd.

  18. Identification of the conserved hypothetical protein BPSL0317 in Burkholderia pseudomallei K96243

    Science.gov (United States)

    Yusoff, Nur Syamimi; Damiri, Nadzirah; Firdaus-Raih, Mohd

    2014-09-01

    Burkholderia pseudomallei K96243 is the causative agent of melioidosis, a disease which is endemic in Northern Australia and Southeastern Asia. The genome encodes several essential proteins including those currently annotated as hypothetical proteins. We studied the conservation and the essentiality of expressed hypothetical proteins in normal and different stress conditions. Based on the comparative genomics, we identified a hypothetical protein, BPSL0317, a potential essential gene that is being expressed in all normal and stress conditions. BPSL0317 is also phylogenetically conserved in the Burkholderiales order suggesting that this protein is crucial for survival among the order's members. BPSL0317 therefore has a potential to be a candidate antimicrobial drug target for this group of bacteria.

  19. Adaptive cyber-attack modeling system

    Science.gov (United States)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  20. Situational awareness of a coordinated cyber attack

    Science.gov (United States)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  1. Radiological attacks and accidents. Medical consequences

    International Nuclear Information System (INIS)

    Sakuta, Hidenari

    2007-01-01

    Probability of the occurrence of radiological attacks appears to be elevated after the terrorist attacks against the United States on September 11 in 2001. There are a lot of scenarios of radiological attack: simple radiological device, radiological disperse device (RDD or dirty bomb), attacks against nuclear reactor, improvised nuclear device, and nuclear weapons. Of these, RDD attack is the most probable scenario, because it can be easily made and can generate enormous psychological and economic damages. Radiological incidents are occurring to and fro in the world, including several cases of theft to nuclear facilities and unsuccessful terrorist attacks against them. Recently, a former Russian spy has allegedly been killed using polonium-210. In addition, serious radiological accidents have occurred in Chernobyl, Goiania, and Tokai-mura. Planning, preparation, education, and training exercise appear to be essential factors to cope with radiological attacks and accidents effectively without feeling much anxiety. Triage and psychological first aid are prerequisite to manage and provide effective medial care for mass casualties without inducing panic. (author)

  2. Classification of cyber attacks in South Africa

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-05-01

    Full Text Available various ATM's throughout South Africa. Two criminals, Motsoane and Masoleng, were arrested in February 2012 and both sentenced to 15 years in jail [36, 37]. 3.10 2013: IOL DDoS Anonymous Africa claimed responsibility for launching a Distributed Denial... of Service (DDoS) attack on the Independent Newspaper web site iol.co.za. The attack was in response to claims that the IOL group supports Zimbabwean president Robert Mugabe. The following taunt was sent to boast about the attack: “IOL bad boys bad boys...

  3. Attacker Modelling in Ubiquitous Computing Systems

    DEFF Research Database (Denmark)

    Papini, Davide

    in with our everyday life. This future is visible to everyone nowadays: terms like smartphone, cloud, sensor, network etc. are widely known and used in our everyday life. But what about the security of such systems. Ubiquitous computing devices can be limited in terms of energy, computing power and memory...... attacker remain somehow undened and still under extensive investigation. This Thesis explores the nature of the ubiquitous attacker with a focus on how she interacts with the physical world and it denes a model that captures the abilities of the attacker. Furthermore a quantitative implementation...

  4. Tumor therapy with a urokinase plasminogen activator-activated anthrax lethal toxin alone and in combination with paclitaxel

    OpenAIRE

    Wein, Alexander N.; Liu, Shihui; Zhang, Yi; McKenzie, Andrew T.; Leppla, Stephen H.

    2012-01-01

    PA-U2, an engineered anthrax protective antigen that is activated by urokinase was combined with wild-type lethal factor in the treatment of Colo205 colon adenocarcinoma in vitro and B16-BL6 mouse melanoma in vitro and in vivo. This therapy was also tested in combination with the small molecule paclitaxel, based on prior reports suggesting synergy between ERK1/2 inhibition and chemotherapeutics. Colo205 was sensitive to PA-U2/LF while B16-BL6 was not. For the combination treatment of B16-BL6,...

  5. YET ANOTHER ATTACK ON WAGES AND CONDITIONS.

    Science.gov (United States)

    McCarthy, Andrew

    2016-10-01

    An unobjectionable-sounding title obscures the real intent of the latest in a series of Bills which the federal Coalition government is attempting to legislate in its ongoing attempts to undermine employee wages and conditions and attack unions.

  6. A Unique Fatal Moose Attack Mimicking Homicide.

    Science.gov (United States)

    Gudmannsson, Petur; Berge, Johan; Druid, Henrik; Ericsson, Göran; Eriksson, Anders

    2018-03-01

    Fatalities caused by animal attacks are rare, but have the potential to mimic homicide. We present a case in which a moose attacked and killed a woman who was walking her dog in a forest. Autopsy showed widespread blunt trauma with a large laceration on one leg in which blades of grass were embedded. Flail chest was the cause of death. The case was initially conceived as homicide by means of a riding lawn mower. A review of the case by moose experts and analyses of biological trace material that proved to originate from moose, established the true source of injury. The dog probably provoked a moose, which, in response, stomped and gored the victim to death. The injuries resembled those previously reported from attacks by cattle and water buffalo. Fatal moose attacks constitute an extremely rare threat in boreal areas, but can be considered in traumatic deaths of unknown cause. © 2017 American Academy of Forensic Sciences.

  7. Diabetes - preventing heart attack and stroke

    Science.gov (United States)

    Diabetes complications - heart; Coronary artery disease - diabetes; CAD - diabetes; Cerebrovascular disease - diabetes ... People with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure and high ...

  8. Marine Attack on Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Ad

    2002-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  9. Heuristic attacks against graphical password generators

    CSIR Research Space (South Africa)

    Peach, S

    2010-05-01

    Full Text Available In this paper the authors explore heuristic attacks against graphical password generators. A new trend is emerging to use user clickable pictures to generate passwords. This technique of authentication can be successfully used for - for example...

  10. On localization attacks against cloud infrastructure

    Science.gov (United States)

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  11. Using agility to combat cyber attacks.

    Science.gov (United States)

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  12. Social engineering attack examples, templates and scenarios

    CSIR Research Space (South Africa)

    Mouton, Francois

    2016-06-01

    Full Text Available that are representative of real-world examples, whilst still being general enough to encompass several different real-world examples. The proposed social engineering attack templates cover all three types of communication, namely bidirectional communication...

  13. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  14. The role of sleep in migraine attacks

    Directory of Open Access Journals (Sweden)

    Elaine Inamorato

    1993-11-01

    Full Text Available Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. In view of this variable relationship we studied the records of 159 consecutive outpatients of our Headache Unit. In 121 records there was reference to sleep involvement, in 55% by a single form and in 45% by more than one form. When only one form was related, relief was most common (70%. 30% of that group of patients had the migraine attack precipitated by sleep, 24% by deprivation and 6% by sleep excess. When the effects of sleep were multiple, these effects were as expected logically in 65%: «in accordance» group (e.g attack precipitated by sleep deprivation and relieved by sleep onset. In a second group, («conflicting» where the involvement was not logical, there were three different combinations of sleep involvement, possibly due to more than one pathophysiological mechanism.

  15. Physicians' willingness to grant requests for assistance in dying for children: a study of hypothetical cases

    NARCIS (Netherlands)

    Vrakking, A.M.; Heide, van der A.; Looman, C.W.; Delden, van J.J.M.; Philipsen, B.D.; Maas, van der P.J.; Wal, van der G.

    2005-01-01

    OBJECTIVE: To study the willingness of Dutch physicians to use potentially life-shortening or lethal drugs for severely ill children. STUDY DESIGN: We asked 63 pediatricians about their approach to 10 hypothetical cases of children with cancer. The age of the child (15, 11, or 6 years), the child's

  16. Bioinformatics and structural characterization of a hypothetical protein from Streptococcus mutans

    DEFF Research Database (Denmark)

    Nan, Jie; Brostromer, Erik; Liu, Xiang-Yu

    2009-01-01

    . From the interlinking structural and bioinformatics studies, we have concluded that SMU.440 could be involved in polyketide-like antibiotic resistance, providing a better understanding of this hypothetical protein. Besides, the combination of multiple methods in this study can be used as a general...

  17. An Assessment of the Hypothetical Impact of Drug Abuse on Combat Capability. Volume I.

    Science.gov (United States)

    1979-12-01

    25 I .4 Jill 1.6 MICROCOPY RESOLUTION TEST CHART NATIONAt BIURIA OF gMANI£ IWOI) A LEVEL AD SAI-80-113-WA AN ASSESSMENT OF THE HYPOTHETICAL IMPACTo OF...potential loss of unit effectiveness in each of these units. The resulting measure of unit effectiveness provides a powerful analy- tic tool for comparing

  18. Consequences in Norway after a hypothetical accident at Sellafield - Predicted impacts on the environment.

    Energy Technology Data Exchange (ETDEWEB)

    Thoerring, H.; Liland, A.

    2010-12-15

    This report deals with the environmental consequences in Norway after a hypothetical accident at Sellafield. The investigation is limited to the terrestrial environment, and focus on animals grazing natural pastures, plus wild berries and fungi. Only 137Cs is considered. The predicted consequences are severe, in particular for mutton and goat milk production. (Author)

  19. Can a Repeated Opt-Out Reminder mitigate hypothetical bias in discrete choice experiments?

    DEFF Research Database (Denmark)

    Alemu, Mohammed Hussen; Olsen, Søren Bøye

    2018-01-01

    In this paper, we test whether a Repeated Opt-Out Reminder (ROOR) can mitigate hypothetical bias in stated discrete choice experiments (DCE). The data originate from a field experiment concerning consumer preferences for a novel food product made from cricket flour. Utilising a between...

  20. Comparison of SAS3A and MELT-III predictions for a transient overpower hypothetical accident

    International Nuclear Information System (INIS)

    Wilburn, N.P.

    1976-01-01

    A comparison is made of the predictions of the two major codes SAS3A and MELT-III for the hypothetical unprotected transient overpower accident in the FFTF. The predictions of temperatures, fuel restructuring, fuel melting, reactivity feedbacks, and core power are compared

  1. The impact of arbitrarily applicable relational responding on evaluative learning about hypothetical money and shock outcomes.

    Science.gov (United States)

    Dymond, Simon; Molet, Mikael; Davies, Lynette

    2017-08-01

    Evaluative learning comprises changes in preferences after co-occurrences between conditioned stimuli (CSs) and an unconditioned stimulus (US) of affective value. Co-occurrences may involve relational responding. Two experiments examined the impact of arbitrary relational responding on evaluative preferences for hypothetical money and shock outcomes. In Experiment 1, participants were trained to make arbitrary relational responses by placing CSs of the same size but different colours into boxes and were then instructed that these CSs represented different intensities of hypothetical USs (money or shock). Liking ratings of the CSs were altered in accordance with the underlying bigger/smaller than relations. A reversal of preference was also observed: the CS associated with the smallest hypothetical shock was rated more positively than the CS associated with the smallest amount of hypothetical money. In Experiment 2, procedures from Relational Frame Theory (RFT) established a relational network of more than/less than relations consisting of five CSs (A-B-C-D-E). Overall, evaluative preferences were altered, but not reversed, depending on (a) how stimuli had been related to one another during the learning phase and (b) whether those stimuli referred to money or shocks. The contribution of RFT to evaluative learning research is discussed.

  2. study and analysis of asa river hypothetical dam break using hec-ras

    African Journals Online (AJOL)

    Impounded reservoirs provide beneficial functions such as flood control, recreation, hydropower and water supply but they also carry potential risks. Spontaneous dam break phenomenon can occur and the resultant flooding may cause substantial loss of life and property damage downstream of the dam. A hypothetical dam ...

  3. Consequences in Norway after a hypothetical accident at Sellafield - Predicted impacts on the environment

    International Nuclear Information System (INIS)

    Thoerring, H.; Liland, A.

    2010-12-01

    This report deals with the environmental consequences in Norway after a hypothetical accident at Sellafield. The investigation is limited to the terrestrial environment, and focus on animals grazing natural pastures, plus wild berries and fungi. Only 137Cs is considered. The predicted consequences are severe - in particular for mutton and goat milk production. (Author)

  4. ATTACK WARNING: Costs to Modernize NORAD's Computer System Significantly Understated

    National Research Council Canada - National Science Library

    Cross, F

    1991-01-01

    ...) Integrated Tactical Warning and Attack Assessment (ITW/AA) system. These subsystems provide critical strategic surveillance and attack warning and assessment information to United States and Canadian leaders...

  5. RAPTOR: Ransomware Attack PredicTOR

    OpenAIRE

    Quinkert, Florian; Holz, Thorsten; Hossain, KSM Tozammel; Ferrara, Emilio; Lerman, Kristina

    2018-01-01

    Ransomware, a type of malicious software that encrypts a victim's files and only releases the cryptographic key once a ransom is paid, has emerged as a potentially devastating class of cybercrimes in the past few years. In this paper, we present RAPTOR, a promising line of defense against ransomware attacks. RAPTOR fingerprints attackers' operations to forecast ransomware activity. More specifically, our method learns features of malicious domains by looking at examples of domains involved in...

  6. Attack Helicopter Operations: Art or Science

    Science.gov (United States)

    1991-05-13

    ATTACK HELICOPTER OPERATIONS: ART OR SCIENCE ? BY LIEUTENANT COLONEL JAN CALLEN United States Army DISTRIBUTION STATEMENT A: Approved for public release...TASK IWORK UNIT ELEMENT NO. NO. NO. ACCESSION NC 11. TITLE (Include Socurity Classification) Attack Helicopter Operations: Art or Science ? 12. PERSONAL...OPERATIONS: ART OR SCIENCE ? AN INDIVIDUAL STUDY PROJECT by Lieutenant Colonel Jan Callen United States Army Colonel Greg Snelgrove Project Adviser U.S

  7. Protecting mobile agents from external replay attacks

    OpenAIRE

    Garrigues Olivella, Carles; Migas, Nikos; Buchanan, William; Robles, Sergi; Borrell Viader, Joan

    2014-01-01

    Peer-reviewed This paper presents a protocol for the protection of mobile agents against external replay attacks. This kind of attacks are performed by malicious platforms when dispatching an agent multiple times to a remote host, thus making it reexecute part of its itinerary. Current proposals aiming to address this problem are based on storing agent identifiers, or trip markers, inside agent platforms, so that future reexecutions can be detected and prevented. The problem of these solut...

  8. Semantic Identification Attacks on Web Browsing

    OpenAIRE

    Guha, Neel

    2016-01-01

    We introduce a Semantic Identification Attack, in which an adversary uses semantic signals about the pages visited in one browsing session to identify other browsing sessions launched by the same user. This attack allows an adver- sary to determine if two browsing sessions originate from the same user regardless of any measures taken by the user to disguise their browser or network. We use the MSNBC Anonymous Browsing data set, which contains a large set of user visits (labeled by category) t...

  9. Consciousness in Non-Epileptic Attack Disorder

    OpenAIRE

    Reuber, M.; Kurthen, M.

    2011-01-01

    Non-epileptic attack disorder (NEAD) is one of the most important differential diagnoses of epilepsy. Impairment of\\ud consciousness is the key feature of non-epileptic attacks (NEAs). The first half of this review summarises the clinical research\\ud literature featuring observations relating to consciousness in NEAD. The second half places this evidence in the wider context\\ud of the recent discourse on consciousness in neuroscience and the philosophy of mind. We argue that studies of consci...

  10. Cyber Security Audit and Attack Detection Toolkit

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  11. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    Science.gov (United States)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  12. Combined Heuristic Attack Strategy on Complex Networks

    Directory of Open Access Journals (Sweden)

    Marek Šimon

    2017-01-01

    Full Text Available Usually, the existence of a complex network is considered an advantage feature and efforts are made to increase its robustness against an attack. However, there exist also harmful and/or malicious networks, from social ones like spreading hoax, corruption, phishing, extremist ideology, and terrorist support up to computer networks spreading computer viruses or DDoS attack software or even biological networks of carriers or transport centers spreading disease among the population. New attack strategy can be therefore used against malicious networks, as well as in a worst-case scenario test for robustness of a useful network. A common measure of robustness of networks is their disintegration level after removal of a fraction of nodes. This robustness can be calculated as a ratio of the number of nodes of the greatest remaining network component against the number of nodes in the original network. Our paper presents a combination of heuristics optimized for an attack on a complex network to achieve its greatest disintegration. Nodes are deleted sequentially based on a heuristic criterion. Efficiency of classical attack approaches is compared to the proposed approach on Barabási-Albert, scale-free with tunable power-law exponent, and Erdős-Rényi models of complex networks and on real-world networks. Our attack strategy results in a faster disintegration, which is counterbalanced by its slightly increased computational demands.

  13. SCADA system vulnerabilities to cyber attack

    Energy Technology Data Exchange (ETDEWEB)

    Shaw, W. T. [Cyber Security Consulting (Canada)

    2004-10-01

    The susceptibility to terrorist attacks of computer-based supervisory control (SCADA) systems that are used to monitor and control water distribution systems, oil and gas pipelines and the electrical grid, is discussed. The discussion includes ways in which SCADA systems may be attacked and remedial actions that may be taken to reduce or eliminate the possibility of such attacks. Attacks may take the form of causing the system to generate false data to divert attention from impending system disasters, or commandeer the system to seriously disable it, or cause damage to the process or equipment being controlled by sending improper control commands. SCADA systems are also vulnerable to internal threats, either from an accidental action that results in damage, or an intentional action, as for example by a disgruntled employee, or ex-employee, usually by way of reprogramming an RTU or PLC by accessing the polling/communications circuit. Recent SCADA systems are much more susceptible to concerted cyber attacks because of the adoption of IT technologies and standards into the design of such systems. (Older systems are more likely to be unique designs, hence less susceptible to attack). As far as protection of SCADA systems is concerned, there are no technologies that would prevent a technologically sophisticated terrorist or disgruntled employee from doing major damage to the system, however, the IT world has developed a range of technologies for the protection of IT assets, and many of these same technologies can also be used to safeguard modern SCADA systems.

  14. Regulatory mechanisms of anthrax toxin receptor 1-dependent vascular and connective tissue homeostasis.

    Science.gov (United States)

    Besschetnova, Tatiana Y; Ichimura, Takaharu; Katebi, Negin; St Croix, Brad; Bonventre, Joseph V; Olsen, Bjorn R

    2015-03-01

    It is well known that angiogenesis is linked to fibrotic processes in fibroproliferative diseases, but insights into pathophysiological processes are limited, due to lack of understanding of molecular mechanisms controlling endothelial and fibroblastic homeostasis. We demonstrate here that the matrix receptor anthrax toxin receptor 1 (ANTXR1), also known as tumor endothelial marker 8 (TEM8), is an essential component of these mechanisms. Loss of TEM8 function in mice causes reduced synthesis of endothelial basement membrane components and hyperproliferative and leaky blood vessels in skin. In addition, endothelial cell alterations in mutants are almost identical to those of endothelial cells in infantile hemangioma lesions, including activated VEGF receptor signaling in endothelial cells, increased expression of the downstream targets VEGF and CXCL12, and increased numbers of macrophages and mast cells. In contrast, loss of TEM8 in fibroblasts leads to increased rates of synthesis of fiber-forming collagens, resulting in progressive fibrosis in skin and other organs. Compromised interactions between TEM8-deficient endothelial and fibroblastic cells cause dramatic reduction in the activity of the matrix-degrading enzyme MMP2. In addition to insights into mechanisms of connective tissue homeostasis, our data provide molecular explanations for vascular and connective tissue abnormalities in GAPO syndrome, caused by loss-of-function mutations in ANTXR1. Furthermore, the loss of MMP2 activity suggests that fibrotic skin abnormalities in GAPO syndrome are, in part, the consequence of pathophysiological mechanisms underlying syndromes (NAO, Torg and Winchester) with multicentric skin nodulosis and osteolysis caused by homozygous loss-of-function mutations in MMP2. Copyright © 2014 International Society of Matrix Biology. Published by Elsevier B.V. All rights reserved.

  15. Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks

    Directory of Open Access Journals (Sweden)

    Apostolos P. Fournaris

    2017-07-01

    Full Text Available Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT and Operational Technology (OT systems that are meant to operate harmonically under a security critical framework. As security IT countermeasures are gradually been installed in many embedded system nodes, thus securing them from many well-know cyber attacks there is a lurking danger that is still overlooked. Apart from the software vulnerabilities that typical malicious programs use, there are some very interesting hardware vulnerabilities that can be exploited in order to mount devastating software or hardware attacks (typically undetected by software countermeasures capable of fully compromising any embedded system device. Real-time microarchitecture attacks such as the cache side-channel attacks are such case but also the newly discovered Rowhammer fault injection attack that can be mounted even remotely to gain full access to a device DRAM (Dynamic Random Access Memory. Under the light of the above dangers that are focused on the device hardware structure, in this paper, an overview of this attack field is provided including attacks, threat directives and countermeasures. The goal of this paper is not to exhaustively overview attacks and countermeasures but rather to survey the various, possible, existing attack directions and highlight the security risks that they can pose to security critical embedded systems as well as indicate their strength on compromising the Quality of Service (QoS such systems are designed to provide.

  16. Predicting Factors of Zone 4 Attack in Volleyball.

    Science.gov (United States)

    Costa, Gustavo C; Castro, Henrique O; Evangelista, Breno F; Malheiros, Laura M; Greco, Pablo J; Ugrinowitsch, Herbert

    2017-06-01

    This study examined 142 volleyball games of the Men's Super League 2014/2015 seasons in Brazil from which we analyzed 24-26 games of each participating team, identifying 5,267 Zone 4 attacks for further analysis. Within these Zone 4 attacks, we analyzed the association between the effect of the attack carried out and the separate effects of serve reception, tempo and type of attack. We found that the reception, tempo of attack, second tempo of attack, and power of diagonal attack were predictors of the attack effect in Zone 4. Moreover, placed attacks showed a tendency to not yield a score. In conclusion, winning points in high-level men's volleyball requires excellent receptions, a fast attack tempo and powerfully executed of attacks.

  17. Inhalation Anthrax (Ames aerosol) in Naive and Vaccinated New Zealand Rabbits: Characterizing the Spread of Bacteria from Lung Deposition to Bacteremia

    Science.gov (United States)

    2012-06-28

    Lond.) 51, 372–385. Henderson, D. W., Peacock , S., and Belton, F. C. (1956). Observations on the prophylaxis of experimental pulmonary anthrax in...terms of the Creative Commons Attribution Non Commercial License, which permits non-commercial use, distribution, and reproduction in other forums

  18. Obiltoxaximab Prevents Disseminated Bacillus anthracis Infection and Improves Survival during Pre- and Postexposure Prophylaxis in Animal Models of Inhalational Anthrax

    Science.gov (United States)

    Yamamoto, Brent J.; Shadiack, Annette M.; Carpenter, Sarah; Sanford, Daniel; Henning, Lisa N.; Gonzales, Nestor; O'Connor, Edward; Casey, Leslie S.

    2016-01-01

    The Centers for Disease Control and Prevention recommend adjunctive antitoxins when systemic anthrax is suspected. Obiltoxaximab, a monoclonal antibody against protective antigen (PA), is approved for treatment of inhalational anthrax in combination with antibiotics and for prophylaxis when alternative therapies are not available. The impact of toxin neutralization with obiltoxaximab during pre- and postexposure prophylaxis was explored, and efficacy results that supported the prophylaxis indication are presented here. New Zealand White rabbits and cynomolgus macaques received obiltoxaximab as a single intramuscular or intravenous dose of 2 to 16 mg/kg of body weight at various times relative to Bacillus anthracis aerosol spore challenge. The primary endpoint was survival, and effect of treatment timing was explored. In rabbits, obiltoxaximab administration 9 h postchallenge singly or combined with a 5-day levofloxacin regimen protected 89% to 100% of animals compared to 33% with levofloxacin monotherapy. In cynomolgus macaques, a single intramuscular dose of 16 mg/kg obiltoxaximab led to 100% survival when given 1 to 3 days preexposure and 83% to 100% survival when given 18 to 24 h postexposure and prior to systemic bacteremia onset. Obiltoxaximab administration after bacteremia onset resulted in lower (25% to 50%) survival rates reflective of treatment setting. Prophylactic administration of obiltoxaximab before spore challenge or to spore-challenged animals before systemic bacterial dissemination is efficacious in promoting survival, ameliorating toxemia, and inhibiting bacterial spread to the periphery. PMID:27431219

  19. Bacillus cereus Biovar Anthracis Causing Anthrax in Sub-Saharan Africa-Chromosomal Monophyly and Broad Geographic Distribution.

    Directory of Open Access Journals (Sweden)

    Kym S Antonation

    2016-09-01

    Full Text Available Through full genome analyses of four atypical Bacillus cereus isolates, designated B. cereus biovar anthracis, we describe a distinct clade within the B. cereus group that presents with anthrax-like disease, carrying virulence plasmids similar to those of classic Bacillus anthracis. We have isolated members of this clade from different mammals (wild chimpanzees, gorillas, an elephant and goats in West and Central Africa (Côte d'Ivoire, Cameroon, Central African Republic and Democratic Republic of Congo. The isolates shared several phenotypic features of both B. anthracis and B. cereus, but differed amongst each other in motility and their resistance or sensitivity to penicillin. They all possessed the same mutation in the regulator gene plcR, different from the one found in B. anthracis, and in addition, carry genes which enable them to produce a second capsule composed of hyaluronic acid. Our findings show the existence of a discrete clade of the B. cereus group capable of causing anthrax-like disease, found in areas of high biodiversity, which are possibly also the origin of the worldwide distributed B. anthracis. Establishing the impact of these pathogenic bacteria on threatened wildlife species will require systematic investigation. Furthermore, the consumption of wildlife found dead by the local population and presence in a domestic animal reveal potential sources of exposure to humans.

  20. Tumor therapy with a urokinase plasminogen activator-activated anthrax lethal toxin alone and in combination with paclitaxel.

    Science.gov (United States)

    Wein, Alexander N; Liu, Shihui; Zhang, Yi; McKenzie, Andrew T; Leppla, Stephen H

    2013-02-01

    PA-U2, an engineered anthrax protective antigen that is activated by urokinase was combined with wildtype lethal factor in the treatment of Colo205 colon adenocarcinoma in vitro and B16-BL6 mouse melanoma in vitro and in vivo. This therapy was also tested in combination with the small molecule paclitaxel, based on prior reports suggesting synergy between ERK1/2 inhibition and chemotherapeutics. Colo205 was sensitive to PA-U2/LF while B16-BL6 was not. For the combination treatment of B16-BL6, paclitaxel showed a dose response in vitro, but cells remained resistant to PA-U2/LF even in the presence of paclitaxel. In vivo, each therapy slowed tumor progression, and an additive effect between the two was observed. Since LF targets tumor vasculature while paclitaxel is an antimitotic, it is possible the agents were acting against different cells in the stroma, precluding a synergistic effect. The engineered anthrax toxin PA-U2/LF warrants further development and testing, possibly in combination with an antiangiogenesis therapy such as sunitinib or sorafinib.

  1. Nonepileptic attack disorder among married women.

    Science.gov (United States)

    Dhanaraj, M; Rangaraj, R; Arulmozhi, T; Vengatesan, A

    2005-06-01

    To study the clinical features, precipitating stressful life events and prognosis of nonepileptic attack disorder (NEAD) among married women. Prospective cohort study with 1-year follow-up. A tertiary care teaching hospital. Of the 1020 patients with epilepsy referred to the epilepsy clinic during 2002-2003, 30 were married women with NEAD. The diagnostic criteria for NEAD included normal EEG during ictal and post-ictal phase of the generalized 'attack.' The data collected included clinical characteristics, semiology of the attacks, precipitating stressful events, and co-morbid psychiatric disorders. The control group included 30 age-matched married women with generalized tonic-clonic seizures. The long-term outcome and factors influencing the outcomes were analyzed. The mean duration of illness was 18 months, and the pattern of the attack was 'fall and lying still' in 53% and 'fall with generalized motor movements' in 47%. The frequency was one or more per week in 57% and occasionally in 43%. The important stressful events were matrimonial discord following illegal relationship of the husband with another woman (chi2 = 9.02, P = 0.003) and constant quarrel with other family members (chi2 = 5.19, P = 0.02). The prevalence of sexual abuse was low (7%). Co-morbid psychiatric disorder was observed in 70%. At the end of 1 year, 39% were free from the attack. Resolution of the stressful life events (chi2 = 4.52, P = 0.03) and lower frequency of attack at the time of reporting (chi2 = 3.88, P = 0.05) correlated with good outcomes. Among patients with NEAD in India, the major precipitating factors were matrimonial discord following illegal relationship of the husband with another woman and constant quarrel with other family members and not sexual abuse. Women with low frequency of attack at the time of reporting and the remission of the stressful events had better outcomes.

  2. Recent outbreak of cutaneous anthrax in Bangladesh: clinico-demographic profile and treatment outcome of cases attended at Rajshahi Medical College Hospital

    Directory of Open Access Journals (Sweden)

    Siddiqui Muhammad

    2012-08-01

    Full Text Available Abstract Background Human cutaneous anthrax results from skin exposure to B. anthracis, primarily due to occupational exposure. Bangladesh has experienced a number of outbreaks of cutaneous anthrax in recent years. The last episode occurred from April to August, 2011 and created mass havoc due to its dreadful clinical outcome and socio-cultural consequences. We report here the clinico-demographic profile and treatment outcome of 15 cutaneous anthrax cases attended at the Dermatology Outpatient Department of Rajshahi Medical College Hospital, Bangladesh between April and August, 2011 with an aim to create awareness for early case detection and management. Findings Anthrax was suspected primarily based on cutaneous manifestations of typical non-tender ulcer with black eschar, with or without oedema, and a history of butchering, or dressing/washing of cattle/goat or their meat. Diagnosis was established by demonstration of large gram-positive rods, typically resembling B. anthracis under light microscope where possible and also by ascertaining therapeutic success. The mean age of cases was 21.4 years (ranging from 3 to 46 years, 7 (46.7% being males and 8 (53.3% females. The majority of cases were from lower middle socioeconomic status. Types of exposures included butchering (20%, contact with raw meat (46.7%, and live animals (33.3%. Malignant pustule was present in upper extremity, both extremities, face, and trunk at frequencies of 11 (73.3%, 2 (13.3%, 1 (6.7% and 1 (6.7% respectively. Eight (53.3% patients presented with fever, 7 (46.7% had localized oedema and 5 (33.3% had regional lymphadenopathy. Anthrax was confirmed in 13 (86.7% cases by demonstration of gram-positive rods. All cases were cured with 2 months oral ciprofloxacin combined with flucoxacillin for 2 weeks. Conclusions We present the findings from this series of cases to reinforce the criteria for clinical diagnosis and to urge prompt therapeutic measures to treat

  3. Prevention, detection, and response to anthrax outbreak in Northern Tanzania using one health approach: A case study of Selela ward in Monduli district

    Directory of Open Access Journals (Sweden)

    Elibariki R. Mwakapeje

    2017-11-01

    Full Text Available Background: Anthrax is an infectious fatal zoonotic disease caused by Bacillus anthracis. Anthrax outbreak was confirmed in samples of wild animals following rumors of the outbreak in wild animals, livestock, and humans in Selela ward, Monduli district of Northern Tanzania. Therefore, a multi-sectorial team was deployed for outbreak response in the affected areas. Objectives: The aim of the response was to manage the outbreak in a One Health approach and specifically: (i To determine the magnitude of anthrax outbreak in humans, livestock, and wild animals in Selela ward, (ii to assess the outbreak local response capacity, (iii to establish mechanisms for safe disposal of animal carcasses in the affected areas, and (iv to mount effective control and preventive strategies using One Health approach in the affected areas. Materials and Methods: This was a cross-sectional field survey using: (i Active searching of suspected human cases at health facilities and community level, (ii physical counting and disposal of wild animal carcasses in the affected area, (iii collection of specimens from suspected human cases and animal carcasses for laboratory analysis, and (iv meetings with local animal and human health staff, political, and traditional leaders at local levels. We analyzed data by STATA software, and a map was created using Quantum GIS software. Results: A total of 21 humans were suspected, and most of them (62% being from Selela ward. The outbreak caused deaths of 10 cattle, 26 goats, and three sheep, and 131 wild animal carcasses were discarded the majority of them being wildebeest (83%. Based on laboratory results, three blood smears tested positive for anthrax using Giemsa staining while two wildebeest samples tested positive and five human blood samples tested negative for anthrax using quantitative polymerase chain reaction techniques. Clinical forms of anthrax were also observed in humans and livestock which suggest that wild animals may

  4. Testing the effectiveness of certainty scales, cheap talk, and dissonance-minimization in reducing hypothetical bias in contingent valuation studies

    Science.gov (United States)

    Mark Morrison; Thomas C. Brown

    2009-01-01

    Stated preference methods such as contingent valuation and choice modeling are subject to various biases that may lead to differences between actual and hypothetical willingness to pay. Cheap talk, follow-up certainty scales, and dissonance minimization are three techniques for reducing this hypothetical bias. Cheap talk and certainty scales have received considerable...

  5. 12 CFR 263.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  6. 12 CFR 509.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding....17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  7. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  8. Trace Attack against Biometric Mobile Applications

    Directory of Open Access Journals (Sweden)

    Sanaa Ghouzali

    2016-01-01

    Full Text Available With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen. Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy.

  9. Subclinical endophthalmitis following a rooster attack.

    Science.gov (United States)

    Lekse Kovach, Jaclyn; Maguluri, Srilakshmi; Recchia, Franco M

    2006-12-01

    Ocular injury resulting from rooster attacks is rarely reported in the literature. Sadly, the target of these attacks is most often children younger than 3 years old, whose naiveté of the aggressive, territorial behavior of birds can place them at risk. Acute sequelae of these attacks can result in a lifetime of visual impairment. The possibility of a subacute or occult infection is an unusual occurrence that must always be considered. In an effort to prevent future attacks and ocular casualties, we present a case of a 12-month-old boy who suffered an open globe following a rooster attack. The open globe was emergently repaired. One week later, a white cataract was noticed on examination in the absence of systemic or ocular signs of inflammation. Traumatic endophthalmitis and lenticular abscess were suspected during examination under anesthesia. Vitrectomy, lensectomy, and injection of intravitreal antibiotics were performed. Culture of lenticular and vitreous aspirates grew alpha-streptococcus. Alpha-streptococcal endophthalmitis can result from ocular injuries caused by rooster pecking. The infection may present insidiously and without typical ocular or systemic symptoms or signs. Management is challenging and may require surgery.

  10. Modeling attacking of high skills volleyball players

    Directory of Open Access Journals (Sweden)

    Vladimir Gamaliy

    2014-12-01

    Full Text Available Purpose: to determine the model indicators of technical and tactical actions in the attack highly skilled volleyball players. Material and Methods: the study used statistical data of major international competitions: Olympic Games – 2012 World Championships – 2010, World League – 2010–2014 European Championship – 2010–2014. A total of 130 analyzed games. Methods were used: analysis and generalization of scientific and methodological literature, analysis of competitive activity highly skilled volleyball players, teacher observation, modeling technical and tactical actions in attacking highly skilled volleyball players. Results: it was found that the largest volume application of technical and tactical actions in the attack belongs to the group tactics «supple movement», whose indicator is 21,3%. The smallest amount of application belongs to the group tactics «flight level» model whose indicators is 5,4%, the efficiency of 3,4%, respectively. It is found that the power service in the jump from model parameters used in 51,6% of cases, the planning targets – 21,7% and 4,4% planning to reduce. Attacks performed with the back line, on model parameters used in the amount of 20,8% efficiency –13,7%. Conclusions: we prove that the performance of technical and tactical actions in the attack can be used as model in the control system of training and competitive process highly skilled volleyball players

  11. On the anatomy of social engineering attacks : A literature-based dissection of successful attacks

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    The aim of this studywas to explore the extent towhich persuasion principles are used in successful social engineering attacks. Seventy-four scenarioswere extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenariowas split into attack steps, containing

  12. The genome of a Bacillus isolate causing anthrax in chimpanzees combines chromosomal properties of B. cereus with B. anthracis virulence plasmids.

    Directory of Open Access Journals (Sweden)

    Silke R Klee

    Full Text Available Anthrax is a fatal disease caused by strains of Bacillus anthracis. Members of this monophyletic species are non motile and are all characterized by the presence of four prophages and a nonsense mutation in the plcR regulator gene. Here we report the complete genome sequence of a Bacillus strain isolated from a chimpanzee that had died with clinical symptoms of anthrax. Unlike classic B. anthracis, this strain was motile and lacked the four prohages and the nonsense mutation. Four replicons were identified, a chromosome and three plasmids. Comparative genome analysis revealed that the chromosome resembles those of non-B. anthracis members of the Bacillus cereus group, whereas two plasmids were identical to the anthrax virulence plasmids pXO1 and pXO2. The function of the newly discovered third plasmid with a length of 14 kbp is unknown. A detailed comparison of genomic loci encoding key features confirmed a higher similarity to B. thuringiensis serovar konkukian strain 97-27 and B. cereus E33L than to B. anthracis strains. For the first time we describe the sequence of an anthrax causing bacterium possessing both anthrax plasmids that apparently does not belong to the monophyletic group of all so far known B. anthracis strains and that differs in important diagnostic features. The data suggest that this bacterium has evolved from a B. cereus strain independently from the classic B. anthracis strains and established a B. anthracis lifestyle. Therefore we suggest to designate this isolate as "B. cereus variety (var. anthracis".

  13. Disulfide bonds in the ectodomain of anthrax toxin receptor 2 are required for the receptor-bound protective-antigen pore to function.

    Directory of Open Access Journals (Sweden)

    Jianjun Sun

    Full Text Available BACKGROUND: Cell-surface receptors play essential roles in anthrax toxin action by providing the toxin with a high-affinity anchor and self-assembly site on the plasma membrane, mediating the toxin entry into cells through endocytosis, and shifting the pH threshold for prepore-to-pore conversion of anthrax toxin protective antigen (PA to a more acidic pH, thereby inhibiting premature pore formation. Each of the two known anthrax toxin receptors, ANTXR1 and ANTXR2, has an ectodomain comprised of an N-terminal von Willebrand factor A domain (VWA, which binds PA, and an uncharacterized immunoglobulin-like domain (Ig that connects VWA to the membrane-spanning domain. Potential roles of the receptor Ig domain in anthrax toxin action have not been investigated heretofore. METHODOLOGY/PRINCIPAL FINDINGS: We expressed and purified the ANTXR2 ectodomain (R2-VWA-Ig in E. coli and showed that it contains three disulfide bonds: one in R2-VWA and two in R2-Ig. Reduction of the ectodomain inhibited functioning of the pore, as measured by K(+ release from liposomes or Chinese hamster ovary cells or by PA-mediated translocation of a model substrate across the plasma membrane. However, reduction did not affect binding of the ectodomain to PA or the transition of ectodomain-bound PA prepore to the pore conformation. The inhibitory effect depended specifically on reduction of the disulfides within R2-Ig. CONCLUSIONS/SIGNIFICANCE: We conclude that disulfide integrity within R2-Ig is essential for proper functioning of receptor-bound PA pore. This finding provides a novel venue to investigate the mechanism of anthrax toxin action and suggests new strategies for inhibiting toxin action.

  14. A FRET-based high throughput screening assay to identify inhibitors of anthrax protective antigen binding to capillary morphogenesis gene 2 protein.

    Directory of Open Access Journals (Sweden)

    Michael S Rogers

    Full Text Available Anti-angiogenic therapies are effective for the treatment of cancer, a variety of ocular diseases, and have potential benefits in cardiovascular disease, arthritis, and psoriasis. We have previously shown that anthrax protective antigen (PA, a non-pathogenic component of anthrax toxin, is an inhibitor of angiogenesis, apparently as a result of interaction with the cell surface receptors capillary morphogenesis gene 2 (CMG2 protein and tumor endothelial marker 8 (TEM8. Hence, molecules that bind the anthrax toxin receptors may be effective to slow or halt pathological vascular growth. Here we describe development and testing of an effective homogeneous steady-state fluorescence resonance energy transfer (FRET high throughput screening assay designed to identify molecules that inhibit binding of PA to CMG2. Molecules identified in the screen can serve as potential lead compounds for the development of anti-angiogenic and anti-anthrax therapies. The assay to screen for inhibitors of this protein-protein interaction is sensitive and robust, with observed Z' values as high as 0.92. Preliminary screens conducted with a library of known bioactive compounds identified tannic acid and cisplatin as inhibitors of the PA-CMG2 interaction. We have confirmed that tannic acid both binds CMG2 and has anti-endothelial properties. In contrast, cisplatin appears to inhibit PA-CMG2 interaction by binding both PA and CMG2, and observed cisplatin anti-angiogenic effects are not mediated by interaction with CMG2. This work represents the first reported high throughput screening assay targeting CMG2 to identify possible inhibitors of both angiogenesis and anthrax intoxication.

  15. Attacks on public telephone networks: technologies and challenges

    Science.gov (United States)

    Kosloff, T.; Moore, Tyler; Keller, J.; Manes, Gavin W.; Shenoi, Sujeet

    2003-09-01

    Signaling System 7 (SS7) is vital to signaling and control in America's public telephone networks. This paper describes a class of attacks on SS7 networks involving the insertion of malicious signaling messages via compromised SS7 network components. Three attacks are discussed in detail: IAM flood attacks, redirection attacks and point code spoofing attacks. Depending on their scale of execution, these attacks can produce effects ranging from network congestion to service disruption. Methods for detecting these denial-of-service attacks and mitigating their effects are also presented.

  16. Cross-site scripting attacks procedure and Prevention Strategies

    Directory of Open Access Journals (Sweden)

    Wang Xijun

    2016-01-01

    Full Text Available Cross-site scripting attacks and defense has been the site of attack and defense is an important issue, this paper, the definition of cross-site scripting attacks, according to the current understanding of the chaos on the cross-site scripting, analyzes the causes and harm cross-site scripting attacks formation of attacks XXS complete process XSS attacks made a comprehensive analysis, and then for the web program includes Mobility there are cross-site scripting filter laxity given from ordinary users browse the web and web application developers two the defense cross-site scripting attacks effective strategy.

  17. Fuel assembly loads during a hypothetical blowdown event in a PWR

    International Nuclear Information System (INIS)

    Stabel, J.; Bosanyi, B.; Kim, J.D.

    1991-01-01

    As a consequence of a hypothetical sudden break of the main coolant pipe of a PWR, RPV-internals and fuel assemblies (FA's) are undergoing horizontal and vertical motions. FA's may impact against each other, against core shroud or against lower core support. The corresponding impact loads must be absorbed by the FA spacer grids and guide thimbles. In this paper FA-loads are calculated with and without consideration of Fluid-Structure-Interaction (FSI) effects for assumed different break sizes of the main coolant pipe. The analysis has been performed for a hypothetical cold leg break of a typical SIEMENS-4 loop plant. For this purpose the codes DAPSY/DAISY (GRS, Germany) were coupled with the structural code KWUSTOSS (SIEMENS). It is shown that the FA loads obtained in calculations with consideration of FSI effects are by a factor of 2-4 lower than those obtained in the corresponding calculations without consideration of FSI. (author)

  18. The Relationship Between Personality and Schadenfreude in Hypothetical Versus Live Situations.

    Science.gov (United States)

    Greenier, Keegan D

    2018-06-01

    This study sought to investigate how individual differences are related to schadenfreude (pleasure derived from another's misfortune) by replicating past findings and extending them to additional personality traits. Because most past research on schadenfreude has relied heavily on the use of reactions to hypothetical scenarios, an attempt was made to demonstrate external validity by also including a reaction to a live event (confederate misfortune). For the scenarios, schadenfreude was positively correlated with the Dark Triad and just world beliefs; negatively correlated with empathy and agreeableness; and uncorrelated with dispositional envy, self-esteem, or the remaining Big Five traits. For the live event, no personality traits were correlated with schadenfreude, suggesting responses to hypothetical situations may not be representative of real-life schadenfreude events.

  19. Methods and calculations for regional, continental, and global dose assessments from a hypothetical fuel reprocessing facility

    International Nuclear Information System (INIS)

    Schubert, J.F.; Kern, C.D.; Cooper, R.E.; Watts, J.R.

    1978-01-01

    The Savannah River Laboratory (SRL) is coordinating an interlaboratory effort to provide, test, and use state-of-the-art methods for calculating the environmental impact to an offsite population from the normal releases of radionuclides during the routine operation of a fuel-reprocessing plant. Results of this effort are the estimated doses to regional, continental, and global populations. Estimates are based upon operation of a hypothetical reprocessing plant at a site in the southeastern United States. The hypothetical plant will reprocess fuel used at a burn rate of 30 megawatts/metric ton and a burnup of 33,000 megawatt days/metric ton. All fuel will have been cooled for at least 365 days. The plant will have a 10 metric ton/day capacity and an assumed 3000 metric ton/year (82 percent online plant operation) output. Lifetime of the plant is assumed to be 40 years

  20. Application of an infiltration evaluation methodology to a hypothetical low-level waste disposal facility

    International Nuclear Information System (INIS)

    Meyer, P.D.

    1993-12-01

    This report provides an analysis of infiltration and percolation at a hypothetical low-level waste (LLW) disposal facility was carried out. The analysis was intended to illustrate general issues of concern in assessing the performance of LLW disposal facilities. Among the processes considered in the analysis were precipitation, runoff, information, evaporation, transpiration, and redistribution. The hypothetical facility was located in a humid environment characterized by frequent and often intense precipitation events. The facility consisted of a series of concrete vaults topped by a multilayer cover. Cover features included a sloping soil surface to promote runoff, plant growth to minimize erosion and promote transportation, a sloping clay layer, and a sloping capillary barrier. The analysis within the root zone was carried out using a one-dimensional, transient simulation of water flow. Below the root zone, the analysis was primarily two-dimensional and steady-state

  1. Structure of the conserved hypothetical protein MAL13P1.257 from Plasmodium falciparum

    International Nuclear Information System (INIS)

    Holmes, Margaret A.; Buckner, Frederick S.; Van Voorhis, Wesley C.; Mehlin, Christopher; Boni, Erica; Earnest, Thomas N.; DeTitta, George; Luft, Joseph; Lauricella, Angela; Anderson, Lori; Kalyuzhniy, Oleksandr; Zucker, Frank; Schoenfeld, Lori W.; Hol, Wim G. J.; Merritt, Ethan A.

    2006-01-01

    The crystal structure of a conserved hypothetical protein, MAL13P1.257 from P. falciparum, has been determined at 2.17 Å resolution. The structure represents a new protein fold and is the first structural representative for Pfam sequence family PF05907. The structure of a conserved hypothetical protein, PlasmoDB sequence MAL13P1.257 from Plasmodium falciparum, Pfam sequence family PF05907, has been determined as part of the structural genomics effort of the Structural Genomics of Pathogenic Protozoa consortium. The structure was determined by multiple-wavelength anomalous dispersion at 2.17 Å resolution. The structure is almost entirely β-sheet; it consists of 15 β-strands and one short 3 10 -helix and represents a new protein fold. The packing of the two monomers in the asymmetric unit indicates that the biological unit may be a dimer.

  2. Radiological consequences of a hypothetical ''roof breakdown'' accident of the Chernobyl sarcophagus

    International Nuclear Information System (INIS)

    Pretzsch, G.

    1997-01-01

    On behalf of the German Federal Ministry for Environment, Nature Conservation and Nuclear Safety GRS performed investigations with the aim to improve the safety of the Chernobyl Unit 4 shelter in close connection with the Ministry for Environment and Nuclear Safety of the Ukraina from 1992 to 1995. One of the tasks of the working programme was concerned with the analysis of hypothetical accidents of the present shelter, which comprises the newly built Sarcophagus and the remaining ruins of Unit 4. In close collaboration with Ukrainian and Russian experts the maximum hypothetical accident was defined to be the breakdown of the roof of the Sarcophagus and subsequent release of the radioactive dust which is mainly located in the destroyed reactor hall and the neighboring rooms

  3. Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks

    Directory of Open Access Journals (Sweden)

    Željko Gavrić

    2018-01-01

    Full Text Available Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the security issue is very important. DOS (denial of service attacks are a fundamental threat to the functioning of wireless sensor networks. This paper describes some of the most common DOS attacks and potential methods of protection against them. The case study shows one of the most frequent attacks on wireless sensor networks – the interference attack. In the introduction of this paper authors assume that the attack interference can cause significant obstruction of wireless sensor networks. This assumption has been proved in the case study through simulation scenario and simulation results.

  4. Analysis of hypothetical incidents in nuclear power plants with PWR and HTR

    International Nuclear Information System (INIS)

    Geiser, H.

    1977-01-01

    Several accident analyses are reviewed with a view to fission product release, and the findings are transferred to German reactor plants with LWR and HTR and compared. First of all, hypothetical accidents are compared for both of these lines; after this, the history of accidents is briefly described, and the fission product release during these accidents is investigated. For both reactor lines, there is a different but sufficiently high potential for safety improvements. (orig.) [de

  5. Risk Management in Smallholder Cattle Farming: A Hypothetical Insurance Approach in Western Kenya

    OpenAIRE

    Otieno, David Jakinda; Oluoch-Kosura, Willis; Karugia, Joseph Thuo; Drucker, Adam G.; Rege, Edward

    2006-01-01

    Smallholder cattle farming is an important livelihood strategy in most developing countries like Kenya. However, tropical diseases in Africa often wipe out these valuable assets. This paper focuses on mitigation of cattle disease risks through a hypothetical insurance scheme. The study is based on data from a survey conducted on a purposive sample of 300 smallholder cattle farmers in Kakamega and Siaya districts of Western Kenya. Descriptive measures and a regression model were used in the an...

  6. Analysis of initial events following hypothetical criticality of a transport flask

    International Nuclear Information System (INIS)

    Barbry, F.; Bonhomme, C.; Brown, M.L.; Hague, P.; Mather, D.J.; Shaw, P.M.

    1984-01-01

    This report deals with the estimation of possible consequences, eg energy release, temperatures reached etc, of such a hypothetical accident in a particular notional transport package design. This particular study examines the situation if criticality occurs during unloading or refilling of a PWR flask. In the first instance, an idealised model has been chosen in order to develop the calculational techniques; it is not initself a realistic accident representation

  7. Interpersonal deviance and consequent social impact in hypothetically schizophrenia-prone men.

    Science.gov (United States)

    Zborowski, M J; Garske, J P

    1993-08-01

    Interpersonal deviance is central to the theory of and research on schizotypal psychopathology. The present study investigated interpersonal deviance and its corresponding impact among hypothetically schizotypic, or schizophrenia-prone, men, defined by high scores on the Perceptual Aberration-Magical Ideation (Per-Mag) Scale. In a videotaped interview, high-scoring Ss relative to control Ss were rated as more odd (p scale and suggest that interpersonal factors may influence the eventual adjustment of high-scoring individuals.

  8. Counteracting Power Analysis Attacks by Masking

    Science.gov (United States)

    Oswald, Elisabeth; Mangard, Stefan

    The publication of power analysis attacks [12] has triggered a lot of research activities. On the one hand these activities have been dedicated toward the development of secure and efficient countermeasures. On the other hand also new and improved attacks have been developed. In fact, there has been a continuous arms race between designers of countermeasures and attackers. This chapter provides a brief overview of the state-of-the art in the arms race in the context of a countermeasure called masking. Masking is a popular countermeasure that has been extensively discussed in the scientific community. Numerous articles have been published that explain different types of masking and that analyze weaknesses of this countermeasure.

  9. The WOMBAT Attack Attribution Method: Some Results

    Science.gov (United States)

    Dacier, Marc; Pham, Van-Hau; Thonnard, Olivier

    In this paper, we present a new attack attribution method that has been developed within the WOMBAT project. We illustrate the method with some real-world results obtained when applying it to almost two years of attack traces collected by low interaction honeypots. This analytical method aims at identifying large scale attack phenomena composed of IP sources that are linked to the same root cause. All malicious sources involved in a same phenomenon constitute what we call a Misbehaving Cloud (MC). The paper offers an overview of the various steps the method goes through to identify these clouds, providing pointers to external references for more detailed information. Four instances of misbehaving clouds are then described in some more depth to demonstrate the meaningfulness of the concept.

  10. Parent and medical professional willingness to enroll children in a hypothetical pediatric optic neuritis treatment trial

    Directory of Open Access Journals (Sweden)

    Amy eWaldman

    2011-11-01

    Full Text Available The Optic Neuritis Treatment Trial and subsequent studies have had a tremendous impact on the treatment and prognosis of optic neuritis and multiple sclerosis in adults. The results of these studies have been extrapolated to children; however, pediatric data are sparse. Using the method of prospective preference assessment, the willingness of parents and medical professionals to enroll children in a hypothetical Pediatric Optic Neuritis Treatment Trial was assessed using a mock consent form and questionnaire. A 3-arm trial was proposed: 1 intravenous corticosteroids, 2 high-dose oral corticosteroids, and 3 an oral placebo. The forms were completed by 198 parents and 49 physicians. After reviewing the hypothetical scenario, trial design, risks and benefits, and alternatives to the study, 21% of parents would enroll their children in the trial whereas 98% of medical professionals would enroll their patients. With medical professional recommendation, 43% of parents would enroll their children. The manner in which this hypothetical trial was presented to parents, specifically with respect to the recommendation of their child’s health care team, influenced a parent’s willingness to participate.

  11. EAC european accident code. A modular system of computer programs to simulate LMFBR hypothetical accidents

    International Nuclear Information System (INIS)

    Wider, H.; Cametti, J.; Clusaz, A.; Devos, J.; VanGoethem, G.; Nguyen, H.; Sola, A.

    1985-01-01

    One aspect of fast reactor safety analysis consists of calculating the strongly coupled system of physical phenomena which contribute to the reactivity balance in hypothetical whole-core accidents: these phenomena are neutronics, fuel behaviour and heat transfer together with coolant thermohydraulics in single- and two-phase flow. Temperature variations in fuel, coolant and neighbouring structures induce, in fact, thermal reactivity feedbacks which are added up and put in the neutronics calculation to predict the neutron flux and the subsequent heat generation in the reactor. At this point a whole-core analysis code is necessary to examine for any hypothetical transient whether the various feedbacks result effectively in a negative balance, which is the basis condition to ensure stability and safety. The European Accident Code (EAC), developed at the Joint Research Centre of the CEC at Ispra (Italy), fulfills this objective. It is a modular informatics structure (quasi 2-D multichannel approach) aimed at collecting stand-alone computer codes of neutronics, fuel pin mechanics and hydrodynamics, developed both in national laboratories and in the JRC itself. EAC makes these modules interact with each other and produces results for these hypothetical accidents in terms of core damage and total energy release. 10 refs

  12. Excessive Gestational Weight Gain and Subsequent Maternal Obesity at Age 40: A Hypothetical Intervention.

    Science.gov (United States)

    Abrams, Barbara; Coyle, Jeremy; Cohen, Alison K; Headen, Irene; Hubbard, Alan; Ritchie, Lorrene; Rehkopf, David H

    2017-09-01

    To model the hypothetical impact of preventing excessive gestational weight gain on midlife obesity and compare the estimated reduction with the US Healthy People 2020 goal of a 10% reduction of obesity prevalence in adults. We analyzed 3917 women with 1 to 3 pregnancies in the prospective US National Longitudinal Survey of Youth, from 1979 to 2012. We compared the estimated obesity prevalence between 2 scenarios: gestational weight gain as reported and under the scenario of a hypothetical intervention that all women with excessive gestational weight gain instead gained as recommended by the Institute of Medicine (2009). A hypothetical intervention was associated with a significantly reduced estimated prevalence of obesity for first (3.3 percentage points; 95% confidence interval [CI] = 1.0, 5.6) and second (3.0 percentage points; 95% CI = 0.7, 5.2) births, and twice as high in Black as in White mothers, but not significant in Hispanics. The population attributable fraction was 10.7% (95% CI = 3.3%, 18.1%) in first and 9.3% (95% CI = 2.2%, 16.5%) in second births. Development of effective weight-management interventions for childbearing women could lead to meaningful reductions in long-term obesity.

  13. Evaluation of personal inhalable aerosol samplers with different filters for use during anthrax responses.

    Science.gov (United States)

    Grinshpun, Sergey A; Weber, Angela M; Yermakov, Michael; Indugula, Reshmi; Elmashae, Yousef; Reponen, Tiina; Rose, Laura

    2017-08-01

    Risk of inhalation exposure to viable Bacillus anthracis (B. anthracis) spores has primarily been assessed using short-term, stationary sampling methods which may not accurately characterize the concentration of inhalable-sized spores reaching a person's breathing zone. While a variety of aerosol sampling methods have been utilized during previous anthrax responses, no consensus has yet been established for personal air sampling. The goal of this study was to determine the best sampler-filter combination(s) for the collection and extraction of B. anthracis spores. The study was designed to (1) evaluate the performance of four filter types (one mixed cellulose ester, MCE (pore size = 3 µm), two polytetrafluoroethylene, PTFE (1 and 3 µm), and one polycarbonate, PC (3 µm)); and (2) evaluate the best performing filters in two commercially available inhalable aerosol samplers (IOM and Button). Bacillus thuringiensis kurstaki [Bt(k)], a simulant for B. anthracis, served as the aerosol challenge. The filters were assessed based on criteria such as ability to maintain low pressure drop over an extended sampling period, filter integrity under various environmental conditions, spore collection and extraction efficiencies, ease of loading and unloading the filters into the samplers, cost, and availability. Three of the four tested collection filters-except MCE-were found suitable for efficient collection and recovery of Bt(k) spores sampled from dry and humid as well as dusty and clean air environments for up to 8 hr. The PC (3 µm) filter was identified as the best performing filter in this study. The PTFE (3 µm) demonstrated a comparable performance, but it is more expensive. Slightly higher concentrations were measured with the IOM inhalable sampler which is the preferred sampler's performance criterion when detecting a highly pathogenic agent with no established "safe" inhalation exposure level. Additional studies are needed to address the effects of

  14. In vitro evaluation, biodistribution and scintigraphic imaging in mice of radiolabeled anthrax toxins

    International Nuclear Information System (INIS)

    Dadachova, Ekaterina; Rivera, Johanna; Revskaya, Ekaterina; Nakouzi, Antonio; Cahill, Sean M.; Blumenstein, Michael; Xiao, Hui; Rykunov, Dmitry; Casadevall, Arturo

    2008-01-01

    Introduction: There is a lot of interest towards creating therapies and vaccines for Bacillus anthracis, a bacterium which causes anthrax in humans and which spores can be made into potent biological weapons. Systemic injection of lethal factor (LF), edema factor (EF) and protective antigen (PA) in mice produces toxicity, and this protocol is commonly used to investigate the efficacy of specific antibodies in passive protection and vaccine studies. Availability of toxins labeled with imageable radioisotopes would allow to demonstrate their tissue distribution after intravenous injection at toxin concentration that are below pharmacologically significant to avoid masking by toxic effects. Methods: LF, EF and PA were radiolabeled with 188 Re and 99m Tc, and their performance in vitro was evaluated by macrophages and Chinese hamster ovary cells toxicity assays and by binding to macrophages. Scintigraphic imaging and biodistribution of intravenously (IV) injected 99m Tc-and 123 I-labeled toxins was performed in BALB/c mice. Results: Radiolabeled toxins preserved their biological activity. Scatchard-type analysis of the binding of radiolabeled PA to the J774.16 macrophage-like cells revealed 6.6x10 4 binding sites per cell with a dissociation constant of 6.7 nM. Comparative scintigraphic imaging of mice injected intravenously with either 99m Tc-or 123 I-labeled PA, EF and LF toxins demonstrated similar biodistribution patterns with early localization of radioactivity in the liver, spleen, intestines and excretion through kidneys. The finding of renal excretion shortly after IV injection strongly suggests that toxins are rapidly degraded which could contribute to the variability of mouse toxigenic assays. Biodistribution studies confirmed that all three toxins concentrated in the liver and the presence of high levels of radioactivity again implied rapid degradation in vivo. Conclusions: The availability of 188 Re and 99m Tc-labeled PA, LF and EF toxins allowed us to

  15. A novel proposed network security management approach for cyber attacks

    International Nuclear Information System (INIS)

    Ahmed, Z.; Nazir, B.; Zafar, M.F.; Anwar, M.M.; Azam, K.; Asar, A.U.

    2007-01-01

    Network security is a discipline that focuses on securing networks from unauthorized access. Given the Escalating threats of malicious cyber attacks, modern enterprises employ multiple lines of defense. A comprehensive defense strategy against such attacks should include (I) an attack detection component that deter- mines the fact that a program is compromised, (2) an attack identification and prevention component that identifies attack packets so that one can block such packets in the future and prevents the attack from further propagation. Over the last decade, a significant amount of research has been vested in the systems that can detect cyber attacks either statically at compile time or dynamically at run time, However, not much effort is spent on automated attack packet identification or attack prevention. In this paper we present a unified solution to the problems mentioned above. We implemented this solution after the forward engineering of Open Source Security Information Management (OSSIM) system called Preventive Information Security management (PrISM) system that correlates input from different sensors so that the resulting product can automatically detect any cyber attack against it and prevents by identifying the actual attack packet(s). The PrISM was always able to detect the attacks, identify the attack packets and most often prevent by blocking the attacker's IP address to continue normal execution. There is no additional run-time performance overhead for attack prevention. (author)

  16. Playing Attack and Defense with Trusted Storage

    DEFF Research Database (Denmark)

    Gonzalez, Javier; Bonnet, Philippe; Bouganim, Luc

    2014-01-01

    It is often convenient to assume in a data management platform that one or several computing devices are trusted, specially when the goal is to provide privacy guarantees over personal data. But what does it take for a computing device to be trusted? More specifically, how can a personal device...... provide trusted storage? This is the question we tackle in this demonstration. We describe how secure devices, equipped with a trusted execution environment, differ from general purpose devices. We illustrate with our demonstration scenario, that it is much more difficult to attack a storage service...... running on a secure device, than to attack the same service running on a general purpose device....

  17. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolić, Ivica; Rechberger, Christian

    2014-01-01

    ciphers, including the new standard SHA-3 (Keccak). The rebound attack is a start-from-the-middle approach for finding differential paths and conforming pairs in byte-oriented designs like Substitution-Permutation networks and AES. We apply our new compositional attack to the reduced version of the hash...... number of rounds. We also use neutral bits and message modification methods from the practice of collision search in MD5 and SHA-1 hash functions. These methods push the rotational property through more rounds than previous analysis suggested, and eventually establish a distinguishing property...

  18. A Distinguish Attack on COSvd Cipher

    OpenAIRE

    Mohammad Ali Orumiehchi ha; R. Mirghadri

    2007-01-01

    The COSvd Ciphers has been proposed by Filiol and others (2004). It is a strengthened version of COS stream cipher family denoted COSvd that has been adopted for at least one commercial standard. We propose a distinguish attack on this version, and prove that, it is distinguishable from a random stream. In the COSvd Cipher used one S-Box (10×8) on the final part of cipher. We focus on S-Box and use weakness this S-Box for distinguish attack. In addition, found a leak on HNLL that the sub s-bo...

  19. Attacks and infections in percolation processes

    International Nuclear Information System (INIS)

    Janssen, Hans-Karl; Stenull, Olaf

    2017-01-01

    We discuss attacks and infections at propagating fronts of percolation processes based on the extended general epidemic process. The scaling behavior of the number of the attacked and infected sites in the long time limit at the ordinary and tricritical percolation transitions is governed by specific composite operators of the field-theoretic representation of this process. We calculate corresponding critical exponents for tricritical percolation in mean-field theory and for ordinary percolation to 1-loop order. Our results agree well with the available numerical data. (paper)

  20. Attack strategies on quantum cryptographic protocols

    International Nuclear Information System (INIS)

    Schauer, S.; Suda, M.

    2006-01-01

    Full text: Quantum key distribution (QKD) and quantum authentication (QA) have been a topic of extensive research in the last 20 years. In course of that many attacks on QKD and QA protocols have been studied. Among these, Zhang, Lee and Guo presented an attack on a QKD protocol using entanglement swapping. Based on that strategy we take a look at other protocols to inspect how much information an adversary may get if he shares entanglement with either one or both parties. We will present some protocols where an adversary can even get full information about the key using entanglement. (author)

  1. Impact of Dendrimer Terminal Group Chemistry on Blockage of the Anthrax Toxin Channel: A Single Molecule Study.

    Science.gov (United States)

    Yamini, Goli; Kalu, Nnanya; Nestorovich, Ekaterina M

    2016-11-15

    Nearly all the cationic molecules tested so far have been shown to reversibly block K⁺ current through the cation-selective PA 63 channels of anthrax toxin in a wide nM-mM range of effective concentrations. A significant increase in channel-blocking activity of the cationic compounds was achieved when multiple copies of positively charged ligands were covalently linked to multivalent scaffolds, such as cyclodextrins and dendrimers. Even though multivalent binding can be strong when the individual bonds are relatively weak, for drug discovery purposes we often strive to design multivalent compounds with high individual functional group affinity toward the respective binding site on a multivalent target. Keeping this requirement in mind, here we perform a single-channel/single-molecule study to investigate kinetic parameters of anthrax toxin PA 63 channel blockage by second-generation (G2) poly(amido amine) (PAMAM) dendrimers functionalized with different surface ligands, including G2-NH₂, G2-OH, G2-succinamate, and G2-COONa. We found that the previously reported difference in IC 50 values of the G2-OH/PA 63 and G2-NH₂/PA 63 binding was determined by both on- and off-rates of the reversible dendrimer/channel binding reaction. In 1 M KCl, we observed a decrease of about three folds in k o n and a decrease of only about ten times in t r e s with G2-OH compared to G2-NH₂. At the same time for both blockers, k o n and t r e s increased dramatically with transmembrane voltage increase. PAMAM dendrimers functionalized with negatively charged succinamate, but not carboxyl surface groups, still had some residual activity in inhibiting the anthrax toxin channels. At 100 mV, the on-rate of the G2-succinamate binding was comparable with that of G2-OH but showed weaker voltage dependence when compared to G2-OH and G2-NH₂. The residence time of G2-succinamate in the channel exhibited opposite voltage dependence compared to G2-OH and G2-NH₂, increasing with the cis

  2. Investigating the Possibility to Individualize Asthma Attack Therapy Based on Attack Severity and Patient Characteristics

    Directory of Open Access Journals (Sweden)

    Sárkány Zoltán

    2016-03-01

    Full Text Available Introduction: The objective of this study was to investigate with the help of a computerized simulation model whether the treatment of an acute asthma attack can be individualized based on the severity of the attack and the characteristics of the patient. Material and Method: A stochastic lung model was used to simulate the deposition of 1 nm - 10 μm particles during a mild and a moderate asthma attack. Breathing parameters were varied to maximize deposition, and simulation results were compared with those obtained in the case of a severe asthma attack. In order to investigate the effect of height on the deposition of inhaled particles, another series of simulations was carried out with identical breathing parameters, comparing patient heights of 155 cm, 175 cm and 195 cm. Results: The optimization process yielded an increase in the maximum deposition values of around 6-7% for each type of investigated asthma attack, and the difference between attacks of different degree of severity was around 5% for both the initial and the optimized values, a higher degree of obstruction increasing the amount of deposited particles. Conclusions: Our results suggest that the individualization of asthma attack treatment cannot be based on particles of different size, as the highest deposited fraction in all three types of attacks can be obtained using 0.01 μm particles. The use of a specific set of breathing parameters yields a difference between a mild and a moderate, as well as a moderate and a severe asthma attack of around 5%.

  3. Sequential and Parallel Attack Tree Modelling

    NARCIS (Netherlands)

    Arnold, Florian; Guck, Dennis; Kumar, Rajesh; Stoelinga, Mariëlle Ida Antoinette; Koornneef, Floor; van Gulijk, Coen

    The intricacy of socio-technical systems requires a careful planning and utilisation of security resources to ensure uninterrupted, secure and reliable services. Even though many studies have been conducted to understand and model the behaviour of a potential attacker, the detection of crucial

  4. Cooperative Electronic Attack using Unmanned Air Vehicles

    National Research Council Canada - National Science Library

    Mears, Mark J

    2006-01-01

    ... that are salient in the context of cooperative control. The utility of electronic attack is described in the context of integrated air defense systems that rely on RADAR sites that act as a network to gather information about potential airborne threats...

  5. Network overload due to massive attacks

    Science.gov (United States)

    Kornbluth, Yosef; Barach, Gilad; Tuchman, Yaakov; Kadish, Benjamin; Cwilich, Gabriel; Buldyrev, Sergey V.

    2018-05-01

    We study the cascading failure of networks due to overload, using the betweenness centrality of a node as the measure of its load following the Motter and Lai model. We study the fraction of survived nodes at the end of the cascade pf as a function of the strength of the initial attack, measured by the fraction of nodes p that survive the initial attack for different values of tolerance α in random regular and Erdös-Renyi graphs. We find the existence of a first-order phase-transition line pt(α ) on a p -α plane, such that if p pt , pf is large and the giant component of the network is still present. Exactly at pt, the function pf(p ) undergoes a first-order discontinuity. We find that the line pt(α ) ends at a critical point (pc,αc) , in which the cascading failures are replaced by a second-order percolation transition. We find analytically the average betweenness of nodes with different degrees before and after the initial attack, we investigate their roles in the cascading failures, and we find a lower bound for pt(α ) . We also study the difference between localized and random attacks.

  6. Attack Classification Schema for Smart City WSNs

    Directory of Open Access Journals (Sweden)

    Victor Garcia-Font

    2017-04-01

    Full Text Available Urban areas around the world are populating their streets with wireless sensor networks (WSNs in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  7. Adversarial Feature Selection Against Evasion Attacks.

    Science.gov (United States)

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection.

  8. Intrusion-Tolerant Replication under Attack

    Science.gov (United States)

    Kirsch, Jonathan

    2010-01-01

    Much of our critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As our dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including those…

  9. Strengthening Crypto-1 Cipher Against Algebraic Attacks

    Directory of Open Access Journals (Sweden)

    Farah Afianti

    2015-08-01

    Full Text Available In the last few years, several studies addressed the problem of data security in Mifare Classic. One of its weaknesses is the low random number quality. This causes SAT solver attacks to have lower complexity. In order to strengthen Crypto-1 against SAT solver attacks, a modification of the feedback function with better cryptographic properties is proposed. It applies a primitive polynomial companion matrix. SAT solvers cannot directly attack the feedback shift register that uses the modified Boolean feedback function, the register has to be split into smaller groups. Experimental testing showed that the amount of memory and CPU time needed were highest when attacking the modified Crypto-1 using the modified feedback function and the original filter function. In addition, another modified Crypto-1, using the modified feedback function and a modified filter function, had the lowest percentage of revealed variables. It can be concluded that the security strength and performance of the modified Crypto-1 using the modified feedback function and the modified filter function are better than those of the original Crypto-1.

  10. Wrap-Attack Pack: Product Packaging Exercise

    Science.gov (United States)

    Lee, Seung Hwan; Hoffman, K. Douglas

    2016-01-01

    Although many marketing courses discuss traditional concepts pertaining to product strategy, concepts specifically relating to packaging are often glossed over. This exercise, "Wrap-Attack Pack," teaches students about the utilitarian and hedonic design elements of packaging. More specifically, the primary objective is to creatively…

  11. Social Engineering Attack Detection Model: SEADMv2

    CSIR Research Space (South Africa)

    Mouton, F

    2015-10-01

    Full Text Available link in the security chain. A social engineering attack targets this weakness by using various manipulation techniques to elicit individuals to perform sensitive requests. The field of social engineering is still in its infancy as far as formal...

  12. Attack Classification Schema for Smart City WSNs.

    Science.gov (United States)

    Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena

    2017-04-05

    Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  13. Algebraic Side-Channel Attack on Twofish

    Directory of Open Access Journals (Sweden)

    Chujiao Ma

    2017-05-01

    Full Text Available While algebraic side-channel attack (ASCA has been successful in breaking simple cryptographic algorithms, it has never been done on larger or more complex algorithms such as Twofish. Compared to other algorithms that ASCA has been used on, Twofish is more difficult to attack due to the key-dependent S-boxes as well as the complex key scheduling. In this paper, we propose the first algebraic side-channel attack on Twofish, and examine the importance of side-channel information in getting past the key-dependent S-boxes and the complex key scheduling. The cryptographic algorithm and side-channel information are both expressed as boolean equations and a SAT solver is used to recover the key. While algebraic attack by itself is not sufficient to break the algorithm, with the help of side-channel information such as Hamming weights, we are able to correctly solve for 96 bits of the 128 bits key in under 2 hours with known plaintext/ciphertext.

  14. Armed Deterrence: Countering Soft Target Attacks

    Science.gov (United States)

    2016-02-06

    offer no security. With over 17,430 such geographically separated military sites across the United States, these fatal shootings by a Kuwaiti- born ...increasing trend and the carnage 4 that IS sympathizers can unleash. This coordinated attack on a concert hall, a soccer stadium, and restaurant

  15. 47 CFR 76.1612 - Personal attack.

    Science.gov (United States)

    2010-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND... issues of public importance, an attack is made upon the honesty, character, integrity, or like personal qualities of an identified person or group, the cable television system operator shall, within a reasonable...

  16. Rising Trend: Complex and sophisticated attack methods

    Indian Academy of Sciences (India)

    Stux, DuQu, Nitro, Luckycat, Exploit Kits, FLAME. ADSL/SoHo Router Compromise. Botnets of compromised ADSL/SoHo Routers; User Redirection via malicious DNS entry. Web Application attacks. SQL Injection, RFI etc. More and more Webshells. More utility to hackers; Increasing complexity and evading mechanisms.

  17. Strategic defense and attack for reliability systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2008-01-01

    This article illustrates a method by which arbitrarily complex series/parallel reliability systems can be analyzed. The method is illustrated with the series-parallel and parallel-series systems. Analytical expressions are determined for the investments and utilities of the defender and the attacker, depend on their unit costs of investment for each component, the contest intensity for each component, and their evaluations of the value of system functionality. For a series-parallel system, infinitely many components in parallel benefit the defender maximally regardless of the finite number of parallel subsystems in series. Conversely, infinitely many components in series benefit the attacker maximally regardless of the finite number of components in parallel in each subsystem. For a parallel-series system, the results are opposite. With equivalent components, equal unit costs for defender and attacker, equal intensity for all components, and equally many components in series and parallel, the defender always prefers the series-parallel system rather than the parallel-series system, and converse holds for the attacker. Hence from the defender's perspective, ceteris paribus, the series-parallel system is more reliable, and has fewer 'cut sets' or failure modes

  18. Validation Method of a Telecommunications Blackout Attack

    National Research Council Canada - National Science Library

    Amado, Joao; Nunes, Paulo

    2005-01-01

    ..., and to obtain the maximum disruptive effect over the services. The proposed method uses a top-down approach, starting on the service level and ending on the different network elements that can be identified in the end as the targets for the attack.

  19. Association between Terror Attacks and Suicide Attempts

    Science.gov (United States)

    Weizman, Tal; Yagil, Yaron; Schreiber, Shaul

    2009-01-01

    Based on Durkheim's "Control theory," we explored the association between frequency of terror attacks in Israel and the frequency of suicide attempts admitted to the Emergency Room of a major general hospital in Tel-Aviv (1999-2004). Analysis of the six-year study period as a whole revealed no significant correlation between the…

  20. Rising Trend: Complex and sophisticated attack methods

    Indian Academy of Sciences (India)

    Increased frequency and intensity of DoS/DDoS. Few Gbps is now normal; Anonymous VPNs being used; Botnets being used as a vehicle for launching DDoS attacks. Large scale booking of domain names. Hundred thousands of domains registered in short duration via few registrars; Single registrant; Most of the domains ...

  1. Understanding How Components of Organisations Contribute to Attacks

    DEFF Research Database (Denmark)

    Gu, Min; Aslanyan, Zaruhi; Probst, Christian W.

    2016-01-01

    Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors is diffi......Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors...... is difficult. Recently, system models have been used for automatically identifying possible attacks on the modelled organisation. The generated attacks consider all three layers, making the contribution of building infrastructure, computer infrastructure, and humans (insiders and outsiders) explicit. However......, this contribution is only visible in the attack trees as part of the performed steps; it cannot be mapped back to the model directly since the actions usually involve several elements (attacker and targeted actor or asset). Especially for large attack trees, understanding the relations between several model...

  2. An Adaptive Approach for Defending against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Muhai Li

    2010-01-01

    Full Text Available In various network attacks, the Distributed Denial-of-Service (DDoS attack is a severe threat. In order to deal with this kind of attack in time, it is necessary to establish a special type of defense system to change strategy dynamically against attacks. In this paper, we introduce an adaptive approach, which is used for defending against DDoS attacks, based on normal traffic analysis. The approach can check DDoS attacks and adaptively adjust its configurations according to the network condition and attack severity. In order to insure the common users to visit the victim server that is being attacked, we provide a nonlinear traffic control formula for the system. Our simulation test indicates that the nonlinear control approach can prevent the malicious attack packets effectively while making legitimate traffic flows arrive at the victim.

  3. Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, MAC layer attacks are considered...... the most harmful as they directly affect the available resources and thus the nodes’ energy consumption. The first endeavour of this paper is to model the activities of MAC layer security attacks to understand the flow of activities taking place when mounting the attack and when actually executing it....... The second aim of the paper is to simulate these attacks on hybrid MAC mechanisms, which shows the performance degradation of aWSN under the considered attacks. The modelling and implementation of the security attacks give an actual view of the network which can be useful in further investigating secure...

  4. Recovery of human remains after shark attack.

    Science.gov (United States)

    Byard, Roger W; James, Ross A; Heath, Karen J

    2006-09-01

    Two cases of fatal shark attack are reported where the only tissues recovered were fragments of lung. Case 1: An 18-year-old male who was in the sea behind a boat was observed by friends to be taken by a great white shark (Carcharodon carcharias). The shark dragged him under the water and then, with a second shark, dismembered the body. Witnesses noted a large amount of blood and unrecognizable body parts coming to the surface. The only tissues recovered despite an intensive beach and sea search were 2 fragments of lung. Case 2: A 19-year-old male was attacked by a great white shark while diving. A witness saw the shark swim away with the victim's body in its mouth. Again, despite intensive beach and sea searches, the only tissue recovered was a single piece of lung, along with pieces of wetsuit and diving equipment. These cases indicate that the only tissue to escape being consumed or lost in fatal shark attacks, where there is a significant attack with dismemberment and disruption of the integrity of the body, may be lung. The buoyancy of aerated pulmonary tissue ensures that it rises quickly to the surface, where it may be recovered by searchers soon after the attack. Aeration of the lung would be in keeping with death from trauma rather than from drowning and may be a useful marker in unwitnessed deaths to separate ante- from postmortem injury, using only relatively small amounts of tissues. Early organ recovery enhances the identification of human tissues as the extent of morphologic alterations by putrefactive processes and sea scavengers will have been minimized. DNA testing is also possible on such recovered fragments, enabling confirmation of the identity of the victim.

  5. One-pot synthesis of strongly fluorescent DNA-CuInS2 quantum dots for label-free and ultrasensitive detection of anthrax lethal factor DNA

    International Nuclear Information System (INIS)

    Liu, Ziping; Su, Xingguang

    2016-01-01

    Herein, high quality DNA-CuInS 2 QDs are facilely synthesized through a one-pot hydrothermal method with fluorescence quantum yield as high as 23.4%, and the strongly fluorescent DNA-CuInS 2 QDs have been utilized as a novel fluorescent biosensor for label-free and ultrasensitive detection of anthrax lethal factor DNA. L-Cysteine (L-Cys) and a specific-sequence DNA are used as co-ligands to stabilize the CuInS 2 QDs. The specific-sequence DNA consists of two domains: phosphorothiolates domain (sulfur-containing variants of the usual phosphodiester backbone) controls the nanocrystal passivation and serves as a ligand, and the functional domain (non-phosphorothioates) controls the biorecognition. The as-prepared DNA-CuInS 2 QDs have high stability, good water-solubility and low toxicity. Under the optimized conditions, a linear correlation was established between the fluorescence intensity ratio I/I 0 (I 0 is the original fluorescence intensity of DNA-CuInS 2 QDs, and I is the fluorescence intensity of DNA-CuInS 2 QDs/GO with the addition of various concentrations of anthrax lethal factor DNA) and the concentration of anthrax lethal factor DNA in the range of 0.029–0.733 nmol L −1 with a detection limit of 0.013 nmol L −1 . The proposed method has been successfully applied to the determination of anthrax lethal factor DNA sequence in human serum samples with satisfactory results. Because of low toxicity and fine biocompatibility, DNA-CuInS 2 QDs also hold potential applications in bioimaging. - Highlights: • Strongly fluorescent DNA-QDs were successfully prepared by a one-pot hydrothermal method with quantum yield up to 23.4%. • A biosensor for label-free detection of anthrax lethal factor DNA was established based on the as-prepared DNA-QDs. • The DNA sensor took advantage of the feature that ssDNA binds to GO with significantly higher affinity than dsDNA. • Good sensitivity and selectivity were obtained. • This method was utilized to detect

  6. One-pot synthesis of strongly fluorescent DNA-CuInS{sub 2} quantum dots for label-free and ultrasensitive detection of anthrax lethal factor DNA

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Ziping; Su, Xingguang, E-mail: suxg@jlu.edu.cn

    2016-10-26

    Herein, high quality DNA-CuInS{sub 2} QDs are facilely synthesized through a one-pot hydrothermal method with fluorescence quantum yield as high as 23.4%, and the strongly fluorescent DNA-CuInS{sub 2} QDs have been utilized as a novel fluorescent biosensor for label-free and ultrasensitive detection of anthrax lethal factor DNA. L-Cysteine (L-Cys) and a specific-sequence DNA are used as co-ligands to stabilize the CuInS{sub 2} QDs. The specific-sequence DNA consists of two domains: phosphorothiolates domain (sulfur-containing variants of the usual phosphodiester backbone) controls the nanocrystal passivation and serves as a ligand, and the functional domain (non-phosphorothioates) controls the biorecognition. The as-prepared DNA-CuInS{sub 2} QDs have high stability, good water-solubility and low toxicity. Under the optimized conditions, a linear correlation was established between the fluorescence intensity ratio I/I{sub 0} (I{sub 0} is the original fluorescence intensity of DNA-CuInS{sub 2} QDs, and I is the fluorescence intensity of DNA-CuInS{sub 2} QDs/GO with the addition of various concentrations of anthrax lethal factor DNA) and the concentration of anthrax lethal factor DNA in the range of 0.029–0.733 nmol L{sup −1} with a detection limit of 0.013 nmol L{sup −1}. The proposed method has been successfully applied to the determination of anthrax lethal factor DNA sequence in human serum samples with satisfactory results. Because of low toxicity and fine biocompatibility, DNA-CuInS{sub 2} QDs also hold potential applications in bioimaging. - Highlights: • Strongly fluorescent DNA-QDs were successfully prepared by a one-pot hydrothermal method with quantum yield up to 23.4%. • A biosensor for label-free detection of anthrax lethal factor DNA was established based on the as-prepared DNA-QDs. • The DNA sensor took advantage of the feature that ssDNA binds to GO with significantly higher affinity than dsDNA. • Good sensitivity and selectivity were

  7. [Efficacy of enterocin S760 in treatment of mice with anthrax infection due to Bacillus anthracis M-71].

    Science.gov (United States)

    Svetoch, E A; Borzilov, A I; Eruslanov, B V; Korobova, O V; Kombarova, T I; Levchuk, V P; Teĭmurazov, M G; Stepanshin, Iu G; Marinin, L I; Diatlov, I A

    2011-01-01

    The therapeutic efficacy of enterocin S760, a broad spectrum antimicrobial peptide produced by Enterococcus faecium LWP760 was tested on mice infected with Bacillus anthracis M-71 to induce anthrax (second Tsenkovsky's vaccine). Intraperitoneal four-, two- or one-fold administration of the peptide in a dose of 25 mg/kg for 10 days for prophylactic (1 hour after the contamination) and therapeutic (24 hours after the contamination) purposes prevented or cured the infection in 90-100% of the mice versus the 100-percent lethality in the control (untreated animals). The antimicrobial activity of enterocin S760 against B. anthracis M-71 in vivo correlated with activity in vitro. Enterocin S760 is considered a novel promising antimicrobial for the treatment of grampositive and gramnegative infections.

  8. Genetically modified anthrax lethal toxin safely delivers whole HIV protein antigens into the cytosol to induce T cell immunity

    Science.gov (United States)

    Lu, Yichen; Friedman, Rachel; Kushner, Nicholas; Doling, Amy; Thomas, Lawrence; Touzjian, Neal; Starnbach, Michael; Lieberman, Judy

    2000-07-01

    Bacillus anthrax lethal toxin can be engineered to deliver foreign proteins to the cytosol for antigen presentation to CD8 T cells. Vaccination with modified toxins carrying 8-9 amino acid peptide epitopes induces protective immunity in mice. To evaluate whether large protein antigens can be used with this system, recombinant constructs encoding several HIV antigens up to 500 amino acids were produced. These candidate HIV vaccines are safe in animals and induce CD8 T cells in mice. Constructs encoding gag p24 and nef stimulate gag-specific CD4 proliferation and a secondary cytotoxic T lymphocyte response in HIV-infected donor peripheral blood mononuclear cells in vitro. These results lay the foundation for future clinical vaccine studies.

  9. Transforming Graphical System Models to Graphical Attack Models

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2016-01-01

    Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations...... approach to transforming graphical system models to graphical attack models in the form of attack trees. Based on an asset in the model, our transformations result in an attack tree that represents attacks by all possible actors in the model, after which the actor in question has obtained the asset....

  10. New attacks on Wi-Fi Protected Setup

    OpenAIRE

    Hamed Mohtadi; Alireza Rahimi

    2015-01-01

    Wi-Fi Protected Setup (WPS) is a network security standard that is used to secure networks in home and office, introduced in 2006 by the Wi-Fi Alliance. It provides easier configuration setup and is used in almost all recent Wi-Fi devices. In this paper we propose two attacks on this standard. The first attack is an offline brute force attack that uses imbalance on registration protocol. This attack needs user action, but it is more efficient than previous attacks. The second attack uses weak...

  11. 1994 Attack Team Workshop: Phase II - Full-Scale Offensive Fog Attack Tests

    National Research Council Canada - National Science Library

    Scheffey, Joseph

    1997-01-01

    .... This report demonstrates the benefits of using a medium angle fog stream to control the overhead fire threat when conducting a direct attack on a growing/steady state fire where the sea of the fire is obstructed...

  12. A Framework for Attack-Resilient Industrial Control Systems : Attack Detection and Controller Reconfiguration

    OpenAIRE

    Paridari, Kaveh; O'Mahony, Niamh; Mady, Alie El-Din; Chabukswar, Rohan; Boubekeur, Menouer; Sandberg, Henrik

    2017-01-01

    Most existing industrial control systems (ICSs), such as building energy management systems (EMSs), were installed when potential security threats were only physical. With advances in connectivity, ICSs are now, typically, connected to communications networks and, as a result, can be accessed remotely. This extends the attack surface to include the potential for sophisticated cyber attacks, which can adversely impact ICS operation, resulting in service interruption, equipment damage, safety c...

  13. Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?

    Directory of Open Access Journals (Sweden)

    Ines Goicoechea-Telleria

    2018-01-01

    Full Text Available The use of biometrics keeps growing. Every day, we use biometric recognition to unlock our phones or to have access to places such as the gym or the office, so we rely on the security manufacturers offer when protecting our privileges and private life. It is well known that it is possible to hack into a fingerprint sensor using fake fingers made of Play-Doh and other easy-to-obtain materials but to what extent? Is this true for all users or only for specialists with a deep knowledge on biometrics? Are smartphone fingerprint sensors as reliable as desktop sensors? To answer these questions, we performed 3 separate evaluations. First, we evaluated 4 desktop fingerprint sensors of different technologies by attacking them with 7 different fake finger materials. All of them were successfully attacked by an experienced attacker. Secondly, we carried out a similar test on 5 smartphones with embedded sensors using the most successful materials, which also hacked the 5 sensors. Lastly, we gathered 15 simulated attackers with no background in biometrics to create fake fingers of several materials, and they had one week to attack the fingerprint sensors of the same 5 smartphones, with the starting point of a short video with the techniques to create them. All 5 smartphones were successfully attacked by an inexperienced attacker. This paper will provide the results achieved, as well as an analysis on the attack potential of every case. All results are given following the metrics of the standard ISO/IEC 30107-3.

  14. Comparison of the hypothetical (57)Co brachytherapy source with the (192)Ir source.

    Science.gov (United States)

    Toossi, Mohammad Taghi Bahreyni; Ghorbani, Mahdi; Rostami, Atefeh; Khosroabadi, Mohsen; Khademi, Sara; Knaup, Courtney

    2016-01-01

    The (57)Co radioisotope has recently been proposed as a hypothetical brachytherapy source due to its high specific activity, appropriate half-life (272 days) and medium energy photons (114.17 keV on average). In this study, Task Group No. 43 dosimetric parameters were calculated and reported for a hypothetical (57)Co source. A hypothetical (57)Co source was simulated in MCNPX, consisting of an active cylinder with 3.5 mm length and 0.6 mm radius encapsulated in a stainless steel capsule. Three photon energies were utilized (136 keV [10.68%], 122 keV [85.60%], 14 keV [9.16%]) for the (57)Co source. Air kerma strength, dose rate constant, radial dose function, anisotropy function, and isodose curves for the source were calculated and compared to the corresponding data for a (192)Ir source. The results are presented as tables and figures. Air kerma strength per 1 mCi activity for the (57)Co source was 0.46 cGyh(-1) cm 2 mCi(-1). The dose rate constant for the (57)Co source was determined to be 1.215 cGyh(-1)U(-1). The radial dose function for the (57)Co source has an increasing trend due to multiple scattering of low energy photons. The anisotropy function for the (57)Co source at various distances from the source is more isotropic than the (192)Ir source. The (57)Co source has advantages over (192)Ir due to its lower energy photons, longer half-life, higher dose rate constant and more isotropic anisotropic function. However, the (192)Ir source has a higher initial air kerma strength and more uniform radial dose function. These properties make (57)Co a suitable source for use in brachytherapy applications.

  15. Sensitivity Analysis of Evacuation Speed in Hypothetical NPP Accident by Earthquake

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Sung-yeop; Lim, Ho-Gon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2016-10-15

    Effective emergency response in emergency situation of nuclear power plant (NPP) can make consequences be different therefore it is regarded important when establishing an emergency response plan and assessing the risk of hypothetical NPP accident. Situation of emergency response can be totally changed when NPP accident caused by earthquake or tsunami is considered due to the failure of roads and buildings by the disaster. In this study evacuation speed has been focused among above various factors and reasonable evacuation speed in earthquake scenario has been investigated. Finally, sensitivity analysis of evacuation speed in hypothetical NPP accident by earthquake has been performed in this study. Evacuation scenario can be entirely different in the situation of seismic hazard and the sensitivity analysis of evacuation speed in hypothetical NPP accident by earthquake has been performed in this study. Various references were investigated and earthquake evacuation model has been developed considering that evacuees may convert their evacuation method from using a vehicle to walking when they face the difficulty of using a vehicle due to intense traffic jam, failure of buildings and roads, and etc. The population dose within 5 km / 30 km have been found to be increased in earthquake situation due to decreased evacuation speed and become 1.5 - 2 times in the severest earthquake evacuation scenario set up in this study. It is not agreed that using same emergency response model which is used for normal evacuation situations when performing level 3 probabilistic safety assessment for earthquake and tsunami event. Investigation of data and sensitivity analysis for constructing differentiated emergency response model in the event of seismic hazard has been carried out in this study.

  16. Ability to Categorize Food Predicts Hypothetical Food Choices in Head Start Preschoolers.

    Science.gov (United States)

    Nicholson, Jody S; Barton, Jennifer M; Simons, Ali L

    2018-03-01

    To investigate whether preschoolers are able to identify and categorize foods, and whether their ability to classify food as healthy predicts their hypothetical food choice. Structured interviews and body measurements with preschoolers, and teacher reports of classroom performance. Six Head Start centers in a large southeastern region. A total of 235 preschoolers (mean age [SD], 4.73 [0.63] years; 45.4% girls). Teachers implemented a nutrition education intervention across the 2014-2015 school year in which children were taught to identify and categorize food as sometimes (ie, unhealthy) and anytime (ie, healthy). Preschooler responses to a hypothetical snack naming, classifying, and selection scenario. Hierarchical regression analyses to examine predictors of child hypothetical food selection. While controlling for child characteristics and cognitive functioning, preschoolers who were better at categorizing food as healthy or unhealthy were more likely to say they would choose the healthy food. Low-contrast food pairs in which food had to be classified based on multiple dimensions were outside the cognitive abilities of the preschoolers. Nutrition interventions may be more effective in helping children make healthy food choices if developmental limitations in preschoolers' abilities to categorize food is addressed in their curriculum. Classification of food into evaluative categories is challenging for this age group. Categorizing on multiple dimensions is difficult, and dichotomous labeling of food as good or bad is not always accurate in directing children toward making food choices. Future research could evaluate further preschoolers' developmental potential for food categorization and nutrition decision making and consider factors that influence healthy food choices at both snack and mealtime. Copyright © 2017 Society for Nutrition Education and Behavior. Published by Elsevier Inc. All rights reserved.

  17. Sensitivity Analysis of Evacuation Speed in Hypothetical NPP Accident by Earthquake

    International Nuclear Information System (INIS)

    Kim, Sung-yeop; Lim, Ho-Gon

    2016-01-01

    Effective emergency response in emergency situation of nuclear power plant (NPP) can make consequences be different therefore it is regarded important when establishing an emergency response plan and assessing the risk of hypothetical NPP accident. Situation of emergency response can be totally changed when NPP accident caused by earthquake or tsunami is considered due to the failure of roads and buildings by the disaster. In this study evacuation speed has been focused among above various factors and reasonable evacuation speed in earthquake scenario has been investigated. Finally, sensitivity analysis of evacuation speed in hypothetical NPP accident by earthquake has been performed in this study. Evacuation scenario can be entirely different in the situation of seismic hazard and the sensitivity analysis of evacuation speed in hypothetical NPP accident by earthquake has been performed in this study. Various references were investigated and earthquake evacuation model has been developed considering that evacuees may convert their evacuation method from using a vehicle to walking when they face the difficulty of using a vehicle due to intense traffic jam, failure of buildings and roads, and etc. The population dose within 5 km / 30 km have been found to be increased in earthquake situation due to decreased evacuation speed and become 1.5 - 2 times in the severest earthquake evacuation scenario set up in this study. It is not agreed that using same emergency response model which is used for normal evacuation situations when performing level 3 probabilistic safety assessment for earthquake and tsunami event. Investigation of data and sensitivity analysis for constructing differentiated emergency response model in the event of seismic hazard has been carried out in this study

  18. Defense and attack of complex and dependent systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2010-01-01

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  19. Defense and attack of complex and dependent systems

    Energy Technology Data Exchange (ETDEWEB)

    Hausken, Kjell, E-mail: kjell.hausken@uis.n [Faculty of Social Sciences, University of Stavanger, N-4036 Stavanger (Norway)

    2010-01-15

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  20. Guide to General Atomic studies of hypothetical nuclear driven accidents for the Fort St. Vrain reactor

    International Nuclear Information System (INIS)

    Wei, T.; Tobias, M.

    1974-03-01

    The work of the General Atomic Company (GAC) in preparing those portions of the Final Safety Analysis Report for the Fort St. Vrain Reactor (FSV) having to do with hypothetical nuclear driven accidents has been reviewed and a guide to this literature has been prepared. The sources for this study are the Final Safety Analysis Report itself, the Quarterly and Monthly Progress Reports, Topical Reports, and Technical Specifications. The problems considered and the methods used are outlined. An appendix gives a systematic analysis which was used as a guide in organizing the references. (U.S.)

  1. BOLD responses in reward regions to hypothetical and imaginary monetary rewards.

    OpenAIRE

    Miyapuram Krishna P; Tobler Philippe N; Gregorios-Pippas Lucy; Schultz Wolfram

    2012-01-01

    Monetary rewards are uniquely human. Because money is easy to quantify and present visually, it is the reward of choice for most fMRI studies, even though it cannot be handed over to participants inside the scanner. A typical fMRI study requires hundreds of trials and thus small amounts of monetary rewards per trial (e.g. 5p) if all trials are to be treated equally. However, small payoffs can have detrimental effects on performance due to their limited buying power. Hypothetical monetary rewa...

  2. KADIS: a program to analyse the disassembly phase of hypothetical accidents in LMFBRs

    International Nuclear Information System (INIS)

    Schmuck, P.; Jacobs, G.; Arnecke, G.

    1977-11-01

    The program KADIS models the disassembly phase during power excursions in LMFBR hypothetical accidents. KADIS is based on point kinetics in the neutronics part and on a 2-dimensional representation of the reactor core in the hydrodynamics part. The core is modeled as an ideal, compressible fluid which is heated up adiabatically during the excursion. KADIS was built up with the help of the VENUS program of Argonne National Laboratory. Several important features were added to the basic VENUS model. Therefore we give first a complete description of the mathematical models used. Secondly we provide the user with the necessary information to handle the input/output of KADIS. (orig.) [de

  3. Consequences in Norway of a hypothetical accident at Sellafield: Potential release - transport and fallout

    International Nuclear Information System (INIS)

    Ytre-Eide, M. A.; Standring, W.J.F.; Amundsen, I.; Sickel, M.; Liland, A.; Saltbones, J.; Bartnicki, J.; Haakenstad, H.; Salbu, B.

    2009-03-01

    This report focuses on transport and fallout from 'worst-case' scenarios based on a hypothetical accident at the B215 facility for storing Highly Active Liquors (HAL) at Sellafield. The scenarios involve an atmospheric release of between 0.1-10 % of the total HAL inventory; only transport and fallout of 137 Cs is considered in this case study. Simulations resulted in between 0.1-50 times the maximum 137 Cs fallout experienced in the most contaminated areas in Norway after the Chernobyl accident. (Author)

  4. Analysis of hypothetical LMFBR whole-core accidents in the USA

    International Nuclear Information System (INIS)

    Ferguson, D.R.; Deitrich, L.W.; Brown, N.W.; Waltar, A.E.

    1978-01-01

    The issue of hypothetical whole-core accidents continues to play a significant role in assessment of the potential risk to the public associated with LMFBR operation in the USA. The paper briefly characterizes the changing nature of this role, with emphasis on the current risk-oriented perspective. It then describes the models and codes used for accident analysis in the USA which have been developed under DOE sponsorship and summarizes some specific applications of the codes to the current generation of fast reactors. An assessment of future trends in this area concludes the paper

  5. Theoretical and hypothetical framework for research on political socialization process in the family

    Directory of Open Access Journals (Sweden)

    Čičkarić Lilijana

    2005-01-01

    Full Text Available The aim of the article is to sum up theoretical and hypothetical framework for empirical research of political socialization process in the family in Serbian society nowadays. The investigation focuses on two theoretical concepts, political socialization and generation as a sociological paradigm. Two methodological approaches are applied. First is interactive model of political socialization, based on analysis of relations between individual who is socialized, agents of political socialization, dominant political system and peripheral social sub-systems. The second one tests interactive relation of generation, lifecycle and effects of epoch. It is suitable for definition of certain historical periods with active role of political.

  6. Designing a Physical Security System for Risk Reduction in a Hypothetical Nuclear Facility

    International Nuclear Information System (INIS)

    Saleh, A.A.; Abd Elaziz, M.

    2017-01-01

    Physical security in a nuclear facility means detection, prevention and response to threat, the ft, sabotage, unauthorized access and illegal transfer involving radioactive and nuclear material. This paper proposes a physical security system designing concepts to reduce the risk associated with variant threats to a nuclear facility. This paper presents a study of the unauthorized removal and sabotage in a hypothetical nuclear facility considering deter, delay and response layers. More over, the study involves performing any required upgrading to the security system by investigating the nuclear facility layout and considering all physical security layers design to enhance the weakness for risk reduction

  7. Hypothetical air ingress scenarios in advanced modular high temperature gas cooled reactors

    International Nuclear Information System (INIS)

    Kroeger, P.G.

    1988-01-01

    Considering an extremely hypothetical scenario of complete cross duct failure and unlimited air supply into the reactor vessel of a modular high temperature gas cooled ractor, it is found that the potential air inflow remains limited due to the high friction pressure drop through the active core. All incoming air will be oxidized to CO and some local external burning would be temporarily possible in such a scenario. The accident would have to continue with unlimited air supply for hundreds of hours before the core structural integrity would be jeopardized

  8. Models and methods for predicting the release of fission products during hypothetical accidents in HTGRs

    International Nuclear Information System (INIS)

    Bailly, H.W.

    1988-01-01

    The paper deals with experiments, computational models and methods used to describe the fission product transport (diffusion and particle failure) in the fuel elements of a pebble-bed high-temperature module reactor (HTGR Module) during hypothetical accidents. The codes which describe the diffusion of fission products in the fuel elements are e.g. GETTER and FRESCO. PANAMA, IA/KWU failure function and the so called GOODIN models describe the particle failure. All these models may be used in the risk analysis. The experimental results obtained at the Nuclear Research Center Julich, Germany are discussed and compared with the model calculations for these experiments

  9. U.S. Adult Interest in Less Harmful and Less Addictive Hypothetical Modified Risk Tobacco Products.

    Science.gov (United States)

    O'Brien, Erin Keely; Persoskie, Alexander; Parascandola, Mark; Hoffman, Allison C

    2017-09-28

    Tobacco companies have a history of making health claims about their new products. Such claims are now regulated by the U.S. Food and Drug Administration. We examined consumer interest in hypothetical modified risk tobacco products (MRTPs) among current, former and never established smokers, and examined whether interest was associated with beliefs about tobacco and cancer. Data were analyzed from the U.S. nationally representative 2015 Health Information National Trends Survey (HINTS-FDA 2015; N = 3,738). Interest in hypothetical MRTPs was assessed by asking participants their likelihood of using tobacco products claiming to be less addictive and less harmful than other products. About half of current smokers and a tenth of both former and never smokers reported they were "somewhat" or "very" likely to try hypothetical MRTPs claiming to be less harmful or less addictive. Female smokers, former smokers with lower smoking harm perceptions, and never smokers who are young adults or without college education expressed more interest in these products. Interest in using these products was positively associated with believing that smoking status is a changeable individual characteristic and that it is possible for tobacco products to be made without some harmful chemicals. We identified several subgroups of current, former, and never smokers who may be particularly affected by the marketing of MRTPs and therefore important to study to inform models of the potential population health impact of authorizing the marketing of MRTPs. Findings about interest in hypothetical MRTPs can inform models of how the marketing of MRTPs could affect population health. Understanding which subgroups are particularly interested in MRTPs can help determine who might be important to study to inform these models. We identified several groups who may warrant specific attention: smokers who are female, former smokers who hold low harm perceptions of smoking, never smokers who are young adults or

  10. Emission control strategies for short-chain chloroparaffins in two semi-hypothetical case cities

    DEFF Research Database (Denmark)

    Eriksson, Eva; Revitt, M.; Lützhøft, Hans-Christian Holten

    2012-01-01

    The short-chain chloroparaffins (SCCP), (C10-13 chloroalkanes) are identified in the European Water Framework Directive, as priority hazardous substances. Within the ScorePP project, the aim is to develop emission control strategies that can be employed to reduce emissions from urban areas...... into receiving waters. Six different scenarios for mitigating SCCP emissions in two different semi-hypothetical case cities representing eastern inland and northern coastal conditions have been evaluated. The analysis, associated with scenario uncertainty, indicates that the EU legislation, Best Available...

  11. Study of an hypothetical reactor meltdown accident for a 50 MW sub(th) fast reactor

    International Nuclear Information System (INIS)

    Azevedo, E.M. de.

    1983-01-01

    A melhodology for determining the energy released in hypothetical reactor meltdown accidents is presented. A numerical code was developed based upon the Nicholson method for a uniform and homogeneous reactor with spherical geometry. A comparative study with other know programs in the literature which use better approximations for small energy released, shows that the methodology used were compatible with those under comparison. Besides the influence of some parameters on the energy released, such as the initial power level and the prompt neutron lifetime was studied under this metodology and its result exhibitted. The Doppler effect was also analyzed and its influence on the energy released has been emphasized. (Author) [pt

  12. Modeling the consequences of hypothetical accidents for the Titan II system

    International Nuclear Information System (INIS)

    Greenly, G.D.; Sullivan, T.J.

    1981-11-01

    Calculations have been made with the Atmospheric Release Advisory Capability (ARAC) suite of three-dimensional transport and diffusion codes MATHEW/ADPIC to assess the consequences of severe, hypothetical accident scenarios. One set of calculations develops the integrated dose and surface deposition patterns for a non-nuclear, high explosive detonation and dispersal of material. A second set of calculations depicts the time integrated dose and instantaneous concentration patterns for a substantial, continuous leak of the missile fuel oxidizer converted to nitrogen dioxide (NO 2 ). The areas affected and some of the implications for emergency response management are discussed

  13. Reducing therapeutic misconception: A randomized intervention trial in hypothetical clinical trials.

    Directory of Open Access Journals (Sweden)

    Paul P Christopher

    Full Text Available Participants in clinical trials frequently fail to appreciate key differences between research and clinical care. This phenomenon, known as therapeutic misconception, undermines informed consent to clinical research, but to date there have been no effective interventions to reduce it and concerns have been expressed that to do so might impede recruitment. We determined whether a scientific reframing intervention reduces therapeutic misconception without significantly reducing willingness to participate in hypothetical clinical trials.This prospective randomized trial was conducted from 2015 to 2016 to test the efficacy of an informed consent intervention based on scientific reframing compared to a traditional informed consent procedure (control in reducing therapeutic misconception among patients considering enrollment in hypothetical clinical trials modeled on real-world studies for one of five disease categories. Patients with diabetes mellitus, hypertension, coronary artery disease, head/neck cancer, breast cancer, and major depression were recruited from medical clinics and a clinical research volunteer database. The primary outcomes were therapeutic misconception, as measured by a validated, ten-item Therapeutic Misconception Scale (range = 10-50, and willingness to participate in the clinical trial.154 participants completed the study (age range, 23-87 years; 92.3% white, 56.5% female; 74 (48.1% had been randomized to receive the experimental intervention. Therapeutic misconception was significantly lower (p = 0.004 in the scientific reframing group (26.4, 95% CI [23.7 to 29.1] compared to the control group (30.9, 95% CI [28.4 to 33.5], and remained so after controlling for education (p = 0.017. Willingness to participate in the hypothetical trial was not significantly different (p = 0.603 between intervention (52.1%, 95% CI [40.2% to 62.4%] and control (56.3%, 95% CI [45.3% to 66.6%] groups.An enhanced educational intervention augmenting

  14. Screening and expression of selected taxonomically conserved and unique hypothetical proteins in Burkholderia pseudomallei K96243

    Science.gov (United States)

    Akhir, Nor Azurah Mat; Nadzirin, Nurul; Mohamed, Rahmah; Firdaus-Raih, Mohd

    2015-09-01

    Hypothetical proteins of bacterial pathogens represent a large numbers of novel biological mechanisms which could belong to essential pathways in the bacteria. They lack functional characterizations mainly due to the inability of sequence homology based methods to detect functional relationships in the absence of detectable sequence similarity. The dataset derived from this study showed 550 candidates conserved in genomes that has pathogenicity information and only present in the Burkholderiales order. The dataset has been narrowed down to taxonomic clusters. Ten proteins were selected for ORF amplification, seven of them were successfully amplified, and only four proteins were successfully expressed. These proteins will be great candidates in determining the true function via structural biology.

  15. A Look into Anthrax as a Biological Weapon, from the Past to Today

    Directory of Open Access Journals (Sweden)

    Babak Shiravand

    2017-02-01

    Full Text Available Introduction: Biological attack a phenomenon which has seriously started in the 20th- century and is expanding every day. Plague agent is one of factors listed as a biological weapon by the disarmament convention. Therefore, the risk of biological or bioterrorism applications is probable and serious. The purpose of this study was to update health professionals' information on plague and bioterrorism aspect of this disease. Methods: This article is a literature review written based on search on articles from library and internet resources (1990- 2016. Results: More than 2,000 species of bacteria have been identified in three main groups of bacillus (rod-shaped, cocci (round and oval, and spiral. But only about 100 of them are known as pathogens and Less than 10 species are used as biological agents for military application and one of them is plague agent. Yersinia pestis is a Gram negative, rod-shaped, anaerobic, member of the enterobacteriaceae family, and if be painted by Colors Wright, Giemsa or Leeson will be seen bipolar under a microscope. Conclusion: Nowadays, in spite of the progresses made in science and technology, human knowledge is relatively incapable to anticipate the time and place of biological attacks. Therefore, being prepared and ready for its unavoidable occurrence is necessary. So, regarding the importance and necessity of readiness, officials and experts have to make an effort and plan against these hazards.

  16. Information Warfare: Defining the Legal Response to An Attack

    National Research Council Canada - National Science Library

    Pottorff, James

    1999-01-01

    This paper discusses the difficulty in determining whether an information warfare attack, such as a computer virus, can be treated as an "armed attack" for purposes of national defense under the United Nations charter. As the U.S...

  17. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    Directory of Open Access Journals (Sweden)

    Khaled Elleithy

    2005-02-01

    Full Text Available A denial of service attack (DOS is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack will be simulated against a Microsoft Windows 95 computer. The TCP SYN Flood attack will be simulated against a Microsoft Windows 2000 IIS FTP Server. Distributed DOS will be demonstrated by simulating a distribution zombie program that will carry the Ping of Death attack. This paper will demonstrate the potential damage from DOS attacks and analyze the ramifications of the damage.

  18. Calcium Supplements: A Risk Factor for Heart Attack?

    Science.gov (United States)

    ... factor for heart attack? I've read that calcium supplements may increase the risk of heart attack. ... D. Some doctors think it's possible that taking calcium supplements may increase your risk of a heart ...

  19. Cyber Attacks During the War on Terrorism: A Predictive Analysis

    National Research Council Canada - National Science Library

    Vatis, Michael

    2001-01-01

    .... Just as the terrorist attacks of September 11, 2001 defied what many thought possible, cyber attacks could escalate in response to United States and allied retaliatory measures against the terrorists...

  20. A Retrospective Study on the Epidemiology of Anthrax, Foot and Mouth Disease, Haemorrhagic Septicaemia, Peste des Petits Ruminants and Rabies in Bangladesh, 2010-2012

    Science.gov (United States)

    Mondal, Shankar P.; Yamage, Mat

    2014-01-01

    Anthrax, foot and mouth disease (FMD), haemorrhagic septicaemia (HS), peste des petits ruminants (PPR) and rabies are considered to be endemic in Bangladesh. This retrospective study was conducted to understand the geographic and seasonal distribution of these major infectious diseases in livestock based on data collected through passive surveillance from 1 January 2010 to 31 December 2012. Data analysis for this period revealed 5,937 cases of anthrax, 300,333 of FMD, 13,436 of HS, 247,783 of PPR and 14,085 cases of dog bite/rabies. While diseases were reported in almost every district of the country, the highest frequency of occurrence corresponded to the susceptible livestock population in the respective districts. There was no significant difference in the disease occurrences between districts bordering India/Myanmar and non-border districts (p>0.05). Significantly higher (pBangladesh. PMID:25101836

  1. Perturbing Tandem Energy Transfer in Luminescent Heterobinuclear Lanthanide Coordination Polymer Nanoparticles Enables Real-Time Monitoring of Release of the Anthrax Biomarker from Bacterial Spores.

    Science.gov (United States)

    Gao, Nan; Zhang, Yunfang; Huang, Pengcheng; Xiang, Zhehao; Wu, Fang-Ying; Mao, Lanqun

    2018-06-05

    Lanthanide-based luminescent sensors have been widely used for the detection of the anthrax biomarker dipicolinic acid (DPA). However, mainly based on DPA sensitization to the lanthanide core, most of them failed to realize robust detection of DPA in bacterial spores. We proposed a new strategy for reliable detection of DPA by perturbing a tandem energy transfer in heterobinuclear lanthanide coordination polymer nanoparticles simply constructed by two kinds of lanthanide ions, Tb 3+ and Eu 3+ , and guanosine 5'-monophosphate. This smart luminescent probe was demonstrated to exhibit highly sensitive and selective visual luminescence color change upon exposure to DPA, enabling accurate detection of DPA in complex biosystems such as bacterial spores. DPA release from bacterial spores on physiological germination was also successfully monitored in real time by confocal imaging. This probe is thus expected to be a powerful tool for efficient detection of bacterial spores in responding to anthrax threats.

  2. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited...

  3. Two fatal tiger attacks in zoos.

    Science.gov (United States)

    Tantius, Britta; Wittschieber, Daniel; Schmidt, Sven; Rothschild, Markus A; Banaschak, Sibylle

    2016-01-01

    Two captive tiger attacks are presented that took place in Cologne and Münster zoos. Both attacks occurred when the handlers, intent on cleaning the enclosures, entered whilst the tigers accidently retained access to the location, and thus defended their territory against the perceived intruders. Both victims suffered fatal neck injuries from the bites. At Münster, colleagues managed to lure the tiger away from its victim to enable treatment, whilst the Cologne zoo tiger had to be shot in order to allow access to be gained. Whilst it was judged that human error led to the deaths of the experienced zookeepers, the investigation in Münster was closed as no third party was found to be at fault, whereas the Cologne zoo director was initially charged with being negligent. These charges were subsequently dismissed as safety regulations were found to be up to date.

  4. RISK DISCLOSURE AGAINST ATTACK ON CRITICAL INFRASTRUCTURES

    Science.gov (United States)

    Yoshida, Mamoru; Kobayashi, Kiyoshi

    This paper analyzes the government's defensive and disclosure strategies to reduce the damage caused by terrorists that attack critical infrastructures using subjective game theory. The government recognizes a terrorist as a hidden opponent and the government's decision making about the policies against terror attacks depends on the belief about the existence of terrorist. In addition, it is not necessarily true that the government and the terrorist play the common game and make their decisions. Considering these points, the paper formulates the model in which the government and the terrorist formulate the subjective games respectively, and they induce the strategies using the equilibriums of their subjective games. The paper concluded that the government's disclosure about the implementation of the countermeasure, rather than the disclosure of warning level related with the belief about the existence of terrorist, brings about the higher increment of the subjective payoffs of the government.

  5. Marine microalgae attack and feed on metazoans

    DEFF Research Database (Denmark)

    Berge, Terje; Poulsen, Louise K.; Moldrup, Morten

    2012-01-01

    Free-living microalgae from the dinoflagellate genus Karlodinium are known to formmassive blooms in eutrophic coastal waters worldwide and are often associated with fish kills. Natural bloom populations, recently shown to consist of the two mixotrophic and toxic species Karlodinium armiger...... and Karlodinium veneficum have caused fast paralysis and mortality of finfish and copepods in the laboratory, and have been associated with reduced metazooplankton biomass in-situ. Here we show that a strain of K. armiger (K-0688) immobilises the common marine copepod Acartia tonsa in a densitydependent manner...... and collectively ingests the grazer to promote its own growth rate. In contrast, four strains of K. veneficum did not attack or affect the motility and survival of the copepods. Copepod immobilisation by the K. armiger strain was fast (within 15min) and caused by attacks of swarming cells, likely through...

  6. Cascade-based attacks on complex networks

    Science.gov (United States)

    Motter, Adilson E.; Lai, Ying-Cheng

    2002-12-01

    We live in a modern world supported by large, complex networks. Examples range from financial markets to communication and transportation systems. In many realistic situations the flow of physical quantities in the network, as characterized by the loads on nodes, is important. We show that for such networks where loads can redistribute among the nodes, intentional attacks can lead to a cascade of overload failures, which can in turn cause the entire or a substantial part of the network to collapse. This is relevant for real-world networks that possess a highly heterogeneous distribution of loads, such as the Internet and power grids. We demonstrate that the heterogeneity of these networks makes them particularly vulnerable to attacks in that a large-scale cascade may be triggered by disabling a single key node. This brings obvious concerns on the security of such systems.

  7. Research About Attacks Over Cloud Environment

    Directory of Open Access Journals (Sweden)

    Li Jie

    2017-01-01

    Full Text Available Cloud computing is expected to continue expanding in the next few years and people will start to see some of the following benefits in their real lives. Security of cloud computing environments is the set of control-based technologies and policies absolute to adhere regulatory compliance rules and protect information data applications and infrastructure related with cloud use. In this paper we suggest a model to estimating the cloud computing security and test the services provided to users. The simulator NG-Cloud Next Generation Secure Cloud Storage is used and modified to administer the proposed model. This implementation achieved security functions potential attacks as defined in the proposed model. Finally we also solve some attacks over cloud computing to provide the security and safety of the cloud.

  8. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...

  9. Blind Data Attack on BGP Routers

    Science.gov (United States)

    2017-03-01

    Second Reader Dr. Cynthia Irvine Chair, Cyber Academic Group iii THIS PAGE INTENTIONALLY LEFT BLANK iv ABSTRACT Transport Communication Protocol (TCP...Postgraduate School. The experience of higher learning at this institution was incredible, and I would whole-heartedly recommend it to any of my peers and...data attack packets to the victim device. Scapy is a Python library that is used to craft and send packets [28]. BGP is supported in Python through

  10. Fighting Through a Logistics Cyber Attack

    Science.gov (United States)

    2015-06-19

    cumulative cost of cyber-attacks was more than the combined global black market cost of cocaine, heroin and marijuana. These alarming figures raised...the country to its knees. The Luftwaffe was uncontested in the Battle of Britain until radar’s ability to detect inbound aircraft provided the...manifest information in IGC and provides inbound passenger manifest data to the aerial port of debarkation (APOD) and other receiving activities for

  11. Are blockchains immune to all malicious attacks?

    OpenAIRE

    Xu, Jennifer J.

    2016-01-01

    Background: In recent years, blockchain technology has attracted considerable attention. It records cryptographic transactions in a public ledger that is difficult to alter and compromise because of the distributed consensus. As a result, blockchain is believed to resist fraud and hacking. Results: This work explores the types of fraud and malicious activities that can be prevented by blockchain technology and identifies attacks to which blockchain remains vulnerable. Conclusions: This study ...

  12. An Explanation of Nakamoto's Analysis of Double-spend Attacks

    OpenAIRE

    Ozisik, A. Pinar; Levine, Brian Neil

    2017-01-01

    The fundamental attack against blockchain systems is the double-spend attack. In this tutorial, we provide a very detailed explanation of just one section of Satoshi Nakamoto's original paper where the attack's probability of success is stated. We show the derivation of the mathematics relied upon by Nakamoto to create a model of the attack. We also validate the model with a Monte Carlo simulation, and we determine which model component is not perfect.

  13. PREDICTION OF AEROSOL HAZARDS ARISING FROM THE OPENING OF AN ANTHRAX-TAINTED LETTER IN AN OPEN OFFICE ENVIRONMENT USING COMPUTATIONAL FLUID DYNAMICS

    Directory of Open Access Journals (Sweden)

    FUE-SANG LIEN

    2010-09-01

    Full Text Available Early experimental work, conducted at Defence R&D Canada–Suffield, measured and characterized the personal and environmental contamination associated with simulated anthrax-tainted letters under a number of different scenarios in order to obtain a better understanding of the physical and biological processes for detecting, assessing, and formulating potential mitigation strategies for managing the risks associated with opening an anthrax-tainted letter. These experimental investigations have been extended in the present study to simulate numerically the contamination from the opening of anthrax-tainted letters in an open office environment using computational fluid dynamics (CFD. A quantity of 0.1 g of Bacillus atropheus (formerly referred to as Bacillus subtilis var globigii (BG spores in dry powder form, which was used here as a surrogate species for Bacillus anthracis (anthrax, was released from an opened letter in the experiment. The accuracy of the model for prediction of the spatial distribution of BG spores in the office from the opened letter is assessed qualitatively (and to the extent possible, quantitatively by detailed comparison with measured BG concentrations obtained under a number of different scenarios, some involving people moving within the office. The observed discrepancy between the numerical predictions and experimental measurements of concentration was probably the result of a number of physical processes which were not accounted for in the numerical simulation. These include air flow leakage from cracks and crevices of the building shell; the dispersion of BG spores in the Heating, Ventilation, and Air Conditioning (HVAC system; and, the effect of deposition and re-suspension of BG spores from various surfaces in the office environment.

  14. Analysing the spatial patterns of livestock anthrax in Kazakhstan in relation to environmental factors: a comparison of local (Gi* and morphology cluster statistics

    Directory of Open Access Journals (Sweden)

    Ian T. Kracalik

    2012-11-01

    Full Text Available We compared a local clustering and a cluster morphology statistic using anthrax outbreaks in large (cattle and small (sheep and goats domestic ruminants across Kazakhstan. The Getis-Ord (Gi* statistic and a multidirectional optimal ecotope algorithm (AMOEBA were compared using 1st, 2nd and 3rd order Rook contiguity matrices. Multivariate statistical tests were used to evaluate the environmental signatures between clusters and non-clusters from the AMOEBA and Gi* tests. A logistic regression was used to define a risk surface for anthrax outbreaks and to compare agreement between clustering methodologies. Tests revealed differences in the spatial distribution of clusters as well as the total number of clusters in large ruminants for AMOEBA (n = 149 and for small ruminants (n = 9. In contrast, Gi* revealed fewer large ruminant clusters (n = 122 and more small ruminant clusters (n = 61. Significant environmental differences were found between groups using the Kruskall-Wallis and Mann- Whitney U tests. Logistic regression was used to model the presence/absence of anthrax outbreaks and define a risk surface for large ruminants to compare with cluster analyses. The model predicted 32.2% of the landscape as high risk. Approximately 75% of AMOEBA clusters corresponded to predicted high risk, compared with ~64% of Gi* clusters. In general, AMOEBA predicted more irregularly shaped clusters of outbreaks in both livestock groups, while Gi* tended to predict larger, circular clusters. Here we provide an evaluation of both tests and a discussion of the use of each to detect environmental conditions associated with anthrax outbreak clusters in domestic livestock. These findings illustrate important differences in spatial statistical methods for defining local clusters and highlight the importance of selecting appropriate levels of data aggregation.

  15. Evaluating the impacts of farmers' behaviors on a hypothetical agricultural water market based on double auction

    Science.gov (United States)

    Du, Erhu; Cai, Ximing; Brozović, Nicholas; Minsker, Barbara

    2017-05-01

    Agricultural water markets are considered effective instruments to mitigate the impacts of water scarcity and to increase crop production. However, previous studies have limited understanding of how farmers' behaviors affect the performance of water markets. This study develops an agent-based model to explicitly incorporate farmers' behaviors, namely irrigation behavior (represented by farmers' sensitivity to soil water deficit λ) and bidding behavior (represented by farmers' rent seeking μ and learning rate β), in a hypothetical water market based on a double auction. The model is applied to the Guadalupe River Basin in Texas to simulate a hypothetical agricultural water market under various hydrological conditions. It is found that the joint impacts of the behavioral parameters on the water market are strong and complex. In particular, among the three behavioral parameters, λ affects the water market potential and its impacts on the performance of the water market are significant under most scenarios. The impacts of μ or β on the performance of the water market depend on the other two parameters. The water market could significantly increase crop production only when the following conditions are satisfied: (1) λ is small and (2) μ is small and/or β is large. The first condition requires efficient irrigation scheduling, and the second requires well-developed water market institutions that provide incentives to bid true valuation of water permits.

  16. The effects of restaurant menu calorie labeling on hypothetical meal choices of females with disordered eating.

    Science.gov (United States)

    Haynos, Ann F; Roberto, Christina A

    2017-03-01

    Concerns have been raised that obesity public policy measures may have harmful effects on individuals with eating disorders. However, little research has investigated this topic. We examined the impact of a popular obesity public policy, menu calorie labeling, on hypothetical food choices of women with disordered eating. Seven hundred sixteen adult females completed an online survey in which they were randomly assigned to receive a restaurant menu with or without calorie information listed. Participants selected foods representative of a meal they would choose to consume and answered questions on restaurant ordering and menu labeling. Participants completed the Eating Disorder Examination Questionnaire (Fairburn & Beglin, ) to assess global eating pathology. Diagnoses of anorexia nervosa (AN), bulimia nervosa (BN), and binge-eating disorder (BED) were also derived from this measure. Generalized linear modeling examined the impact of menu label condition, disordered eating, and the menu label by disordered eating interaction on hypothetical food selection and related variables. When disordered eating was examined continuously, menu labeling did not differentially affect food selections of those with elevated disordered eating (p = .45). However, when examined by eating disorder diagnosis, participants with AN or BN ordered significantly fewer (p < .001) and participants with BED ordered significantly more (p = .001) calories in the menu label versus no label condition. Menu labeling may decrease the calories ordered among individuals with AN or BN and increase calories ordered among individuals with BED. © 2017 Wiley Periodicals, Inc.

  17. The compatibility heuristic in non-categorical hypothetical reasoning: inferences between conditionals and disjunctions.

    Science.gov (United States)

    Espino, Orlando; Byrne, Ruth M J

    2013-11-01

    A new theory explains how people make hypothetical inferences from a premise consistent with several alternatives to a conclusion consistent with several alternatives. The key proposal is that people rely on a heuristic that identifies compatible possibilities. It is tested in 7 experiments that examine inferences between conditionals and disjunctions. Participants accepted inferences between conditionals and inclusive disjunctions when a compatible possibility was immediately available, in their binary judgments that a conclusion followed or not (Experiment 1a) and ternary judgments that included it was not possible to know (Experiment 1b). The compatibility effect was amplified when compatible possibilities were more readily available, e.g., for 'A only if B' conditionals (Experiment 2). It was eliminated when compatible possibilities were not available, e.g., for 'if and only if A B' bi-conditionals and exclusive disjunctions (Experiment 3). The compatibility heuristic occurs even for inferences based on implicit negation e.g., 'A or B, therefore if C D' (Experiment 4), and between universals 'All A's are B's' and disjunctions (Experiment 5a) and universals and conditionals (Experiment 5b). The implications of the results for alternative theories of the cognitive processes underlying hypothetical deductions are discussed. Copyright © 2013. Published by Elsevier Inc.

  18. Potential radiological exposure rates resulting from hypothetical dome failure at Tank W-10

    International Nuclear Information System (INIS)

    1994-07-01

    The main plant area at Oak Ridge National Laboratory (ORNL) contains 12 buried Gunite tanks that were used for the storage and transfer of liquid radioactive waste. Although the tanks are no longer in use, they are known to contain some residual contaminated sludges and liquids. In the event of an accidental tank dome failure, however unlikely, the liquids, sludges, and radioactive contaminants within the tank walls themselves could create radiation fields and result in above-background exposures to workers nearby. This Technical Memorandum documents a series of calculations to estimate potential radiological exposure rates and total exposures to workers in the event of a hypothetical collapse of a Gunite tank dome. Calculations were performed specifically for tank W-10 because it contains the largest radioactivity inventory (approximately half of the total activity) of all the Gunite tanks. These calculations focus only on external, direct gamma exposures for prescribed, hypothetical exposure scenarios and do not address other possible tank failure modes or routes of exposure. The calculations were performed with established, point-kernel gamma ray modeling codes

  19. Hypothetical Case and Scenario Description for International Transportation of Spent Nuclear Fuel.

    Energy Technology Data Exchange (ETDEWEB)

    Williams, Adam David [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Osborn, Douglas [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Jones, Katherine A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Kalinina, Elena Arkadievna [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Cohn, Brian [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Thomas, Maikael A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Parks, Mancel Jordan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Parks, Ethan Rutledge [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Mohagheghi, Amir H. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-12-01

    To support more rigorous analysis on global security issues at Sandia National Laboratories (SNL), there is a need to develop realistic data sets without using "real" data or identifying "real" vulnerabilities, hazards or geopolitically embarrassing shortcomings. In response, an interdisciplinary team led by subject matter experts in SNL's Center for Global Security and Cooperation (CGSC) developed a hypothetical case description. This hypothetical case description assigns various attributes related to international SNF transportation that are representative, illustrative and indicative of "real" characteristics of "real" countries. There is no intent to identify any particular country and any similarity with specific real-world events is purely coincidental. To support the goal of this report to provide a case description (and set of scenarios of concern) for international SNF transportation inclusive of as much "real-world" complexity as possible -- without crossing over into politically sensitive or classified information -- this SAND report provides a subject matter expert-validated (and detailed) description of both technical and political influences on the international transportation of spent nuclear fuel. [PAGE INTENTIONALLY LEFT BLANK

  20. Reinforcing value and hypothetical behavioral economic demand for food and their relation to BMI.

    Science.gov (United States)

    Epstein, Leonard H; Paluch, Rocco A; Carr, Katelyn A; Temple, Jennifer L; Bickel, Warren K; MacKillop, James

    2018-04-01

    Food is a primary reinforcer, and food reinforcement is related to obesity. The reinforcing value of food can be measured by establishing how hard someone will work to get food on progressive-ratio schedules. An alternative way to measure food reinforcement is a hypothetical purchase task which creates behavioral economic demand curves. This paper studies whether reinforcing value and hypothetical behavioral demand approaches are assessing the same or unique aspects of food reinforcement for low (LED) and high (HED) energy density foods using a combination of analytic approaches in females of varying BMI. Results showed absolute reinforcing value for LED and HED foods and relative reinforcing value were related to demand intensity (r's = 0.20-0.30, p's demand elasticity (r's = 0.17-0.22, p's demand task, and the differential role of effort in the two tasks. Examples of how a better understanding of food reinforcement may be useful to prevent or treat obesity are discussed, including engaging in alternative non-food reinforcers as substitutes for food, such as crafts or socializing in a non-food environment, and reducing the value of immediate food reinforcers by episodic future thinking. Copyright © 2018. Published by Elsevier Ltd.

  1. Hypothetical model of factors determining performance and sports achievement in team sports

    Directory of Open Access Journals (Sweden)

    Trninić Marko

    2011-01-01

    Full Text Available The objective of this paper is formation of a comprehensive hypothetical dynamic interactional process model structured by assumed constructs, i.e. processes or mechanisms that obtain real features and influences on athlete's performance and athletic achievement. Thus there are formed and assumed reciprocal relations between high training and competition - based stress as the input variable, cognitive appraisal and interpretation as the mediator, and mood state as the moderator based on the development of the dynamic systems theory. Also, proposed model uses basic assumptions of the Action-Theory approach and it is in accordance with the contemporary socialcognitive view of team functioning in sports. Within the process model, the output variables are measures of efficacy evident through athlete's individual and team performance and athletic achievement. The situation, the team and athlete attributes, the performance and the athletic achievement are joined variables, and the individual and the collective efficacy are the consequence of their reciprocal interaction. Therefore, there are complex and reciprocal interactive processes in real sports and explorative situations amongst the attributes of athlete and team and the behaviour and situation that determine performance and athletic achievement. This is probably the result of an integrated network of reciprocal multi-causal activity of a set of stated assumed constructs from different theories. Thus the hypothetical model is an effort to describe elaborate correlations and/or interdependencies between internal and external determinants which presumably affect athlete's performance and athletic achievement.

  2. Comparative analysis of chemical similarity methods for modular natural products with a hypothetical structure enumeration algorithm.

    Science.gov (United States)

    Skinnider, Michael A; Dejong, Chris A; Franczak, Brian C; McNicholas, Paul D; Magarvey, Nathan A

    2017-08-16

    Natural products represent a prominent source of pharmaceutically and industrially important agents. Calculating the chemical similarity of two molecules is a central task in cheminformatics, with applications at multiple stages of the drug discovery pipeline. Quantifying the similarity of natural products is a particularly important problem, as the biological activities of these molecules have been extensively optimized by natural selection. The large and structurally complex scaffolds of natural products distinguish their physical and chemical properties from those of synthetic compounds. However, no analysis of the performance of existing methods for molecular similarity calculation specific to natural products has been reported to date. Here, we present LEMONS, an algorithm for the enumeration of hypothetical modular natural product structures. We leverage this algorithm to conduct a comparative analysis of molecular similarity methods within the unique chemical space occupied by modular natural products using controlled synthetic data, and comprehensively investigate the impact of diverse biosynthetic parameters on similarity search. We additionally investigate a recently described algorithm for natural product retrobiosynthesis and alignment, and find that when rule-based retrobiosynthesis can be applied, this approach outperforms conventional two-dimensional fingerprints, suggesting it may represent a valuable approach for the targeted exploration of natural product chemical space and microbial genome mining. Our open-source algorithm is an extensible method of enumerating hypothetical natural product structures with diverse potential applications in bioinformatics.

  3. The impact of SOA for achieving healthcare interoperability. An empirical investigation based on a hypothetical adoption.

    Science.gov (United States)

    Daskalakis, S; Mantas, J

    2009-01-01

    The evaluation of a service-oriented prototype implementation for healthcare interoperability. A prototype framework was developed, aiming to exploit the use of service-oriented architecture (SOA) concepts for achieving healthcare interoperability and to move towards a virtual patient record (VPR) paradigm. The prototype implementation was evaluated for its hypothetical adoption. The evaluation strategy was based on the initial proposition of the DeLone and McLean model of information systems (IS) success [1], as modeled by Iivari [2]. A set of SOA and VPR characteristics were empirically encapsulated within the dimensions of IS success model, combined with measures from previous research works. The data gathered was analyzed using partial least squares (PLS). The results highlighted that system quality is a partial predictor of system use but not of user satisfaction. On the contrary, information quality proved to be a significant predictor of user satisfaction and partially a strong significant predictor of system use. Moreover, system use did not prove to be a significant predictor of individual impact whereas the bi-directional relation between use and user satisfaction did not confirm. Additionally, user satisfaction was found to be a strong significant predictor of individual impact. Finally, individual impact proved to be a strong significant predictor of organizational impact. The empirical study attempted to obtain hypothetical, but still useful beliefs and perceptions regarding the SOA prototype implementation. The deduced observations can form the basis for further investigation regarding the adaptability of SOA implementations with VPR characteristics in the healthcare domain.

  4. Changes in adolescents' conflict responses associated with consecutive presentation of hypothetical conflict situations.

    Science.gov (United States)

    Johnson, H D; LaVoie, J C; Eggenburg, E; Mahoney, M A; Pounds, L

    2001-10-01

    The advantages of using hypothetical situations are one reason they have been widely used to examine adolescents' responses to conflict situations. One frequently used research protocol involves presenting several conflict scenarios to participants during a single session. However, in real-life situations multiple conflicts rarely occur within short periods of time, and the nature of this presentation may be associated with changes in adolescents' reports of conflict behaviors. Trend analyses of emotional, conflict goal, and conflict tactic responses from grade 8, 10, 12, and college students to consecutively presented conflict situations showed that responses were associated with presentation of the hypothetical situations. Findings revealed an increase in reports of assertive conflict behaviors and a decrease in reports of constructive conflict behaviors with successive situation presentation. Results from the current study suggest that researchers must consider trends in responses when examining findings from successive situation presentation methodologies because adolescent reports of conflict behavior may change as situation presentation proceeds. Copyright 2001 The Association for Professionals in Services for Adolescents.

  5. OPPORTUNITY COSTS OF REWARD DELAYS AND THE DISCOUNTING OF HYPOTHETICAL MONEY AND CIGARETTES

    Science.gov (United States)

    Johnson, Patrick S.; Herrmann, Evan S.; Johnson, Matthew W.

    2015-01-01

    Humans are reported to discount delayed rewards at lower rates than nonhumans. However, nonhumans are studied in tasks that restrict reinforcement during delays, whereas humans are typically studied in tasks that do not restrict reinforcement during delays. In nonhuman tasks, the opportunity cost of restricted reinforcement during delays may increase delay discounting rates. The present within-subjects study used online crowdsourcing (Amazon Mechanical Turk, or MTurk) to assess the discounting of hypothetical delayed money (and cigarettes in smokers) under four hypothetical framing conditions differing in the availability of reinforcement during delays. At one extreme, participants were free to leave their computer without returning, and engage in any behavior during reward delays (modeling typical human tasks). At the opposite extreme, participants were required to stay at their computer and engage in little other behavior during reward delays (modeling typical nonhuman tasks). Discounting rates increased as an orderly function of opportunity cost. Results also indicated predominantly hyperbolic discounting, the “magnitude effect,” steeper discounting of cigarettes than money, and positive correlations between discounting rates of these commodities. This is the first study to test the effects of opportunity costs on discounting, and suggests that procedural differences may partially account for observed species differences in discounting. PMID:25388973

  6. Conceptualization of a hypothetical high-level nuclear waste repository site in unsaturated, fractured tuff

    International Nuclear Information System (INIS)

    Parsons, A.M.; Olague, N.E.; Gallegos, D.P.

    1991-01-01

    Under the sponsorship of the US Nuclear Regulatory Commission (NRC), Sandia National Laboratories (SNL) is developing a performance assessment methodology for the analysis of long-term disposal and isolation of high-level nuclear wastes (HLW) in alternative geologic media. As part of this exercise, SNL created a conceptualization of ground-water flow and radionuclide transport in the far field of a hypothetical HLW repository site located in unsaturated, fractured tuff formations. This study provides a foundation for the development of conceptual mathematical, and numerical models to be used in this performance assessment methodology. This conceptualization is site specific in terms of geometry, the regional ground-water flow system, stratigraphy, and structure in that these are based on information from Yucca Mountain located on the Nevada Test Site. However, in terms of processes in unsaturated, fractured, porous media, the model is generic. This report also provides a review and evaluation of previously proposed conceptual models of unsaturated and saturated flow and solute transport. This report provides a qualitative description of a hypothetical HLW repository site in fractured tuff. However, evaluation of the current knowledge of flow and transport at Yucca Mountain does not yield a single conceptual model. Instead, multiple conceptual models are possible given the existing information

  7. Potential radiological exposure rates resulting from hypothetical dome failure at Tank W-10

    Energy Technology Data Exchange (ETDEWEB)

    1994-07-01

    The main plant area at Oak Ridge National Laboratory (ORNL) contains 12 buried Gunite tanks that were used for the storage and transfer of liquid radioactive waste. Although the tanks are no longer in use, they are known to contain some residual contaminated sludges and liquids. In the event of an accidental tank dome failure, however unlikely, the liquids, sludges, and radioactive contaminants within the tank walls themselves could create radiation fields and result in above-background exposures to workers nearby. This Technical Memorandum documents a series of calculations to estimate potential radiological exposure rates and total exposures to workers in the event of a hypothetical collapse of a Gunite tank dome. Calculations were performed specifically for tank W-10 because it contains the largest radioactivity inventory (approximately half of the total activity) of all the Gunite tanks. These calculations focus only on external, direct gamma exposures for prescribed, hypothetical exposure scenarios and do not address other possible tank failure modes or routes of exposure. The calculations were performed with established, point-kernel gamma ray modeling codes.

  8. Conceptualization of a hypothetical high-level nuclear waste repository site in unsaturated, fractured tuff

    Energy Technology Data Exchange (ETDEWEB)

    Parsons, A.M.; Olague, N.E.; Gallegos, D.P. [Sandia National Labs., Albuquerque, NM (USA)

    1991-01-01

    Under the sponsorship of the US Nuclear Regulatory Commission (NRC), Sandia National Laboratories (SNL) is developing a performance assessment methodology for the analysis of long-term disposal and isolation of high-level nuclear wastes (HLW) in alternative geologic media. As part of this exercise, SNL created a conceptualization of ground-water flow and radionuclide transport in the far field of a hypothetical HLW repository site located in unsaturated, fractured tuff formations. This study provides a foundation for the development of conceptual mathematical, and numerical models to be used in this performance assessment methodology. This conceptualization is site specific in terms of geometry, the regional ground-water flow system, stratigraphy, and structure in that these are based on information from Yucca Mountain located on the Nevada Test Site. However, in terms of processes in unsaturated, fractured, porous media, the model is generic. This report also provides a review and evaluation of previously proposed conceptual models of unsaturated and saturated flow and solute transport. This report provides a qualitative description of a hypothetical HLW repository site in fractured tuff. However, evaluation of the current knowledge of flow and transport at Yucca Mountain does not yield a single conceptual model. Instead, multiple conceptual models are possible given the existing information.

  9. Fuzzy Expert System for Heart Attack Diagnosis

    Science.gov (United States)

    Hassan, Norlida; Arbaiy, Nureize; Shah, Noor Aziyan Ahmad; Afizah Afif@Afip, Zehan

    2017-08-01

    Heart attack is one of the serious illnesses and reported as the main killer disease. Early prevention is significant to reduce the risk of having the disease. The prevention efforts can be strengthen through awareness and education about risk factor and healthy lifestyle. Therefore the knowledge dissemination is needed to play role in order to distribute and educate public in health care management and disease prevention. Since the knowledge dissemination in medical is important, there is a need to develop a knowledge based system that can emulate human intelligence to assist decision making process. Thereby, this study utilized hybrid artificial intelligence (AI) techniques to develop a Fuzzy Expert System for Diagnosing Heart Attack Disease (HAD). This system integrates fuzzy logic with expert system, which helps the medical practitioner and people to predict the risk and as well as diagnosing heart attack based on given symptom. The development of HAD is expected not only providing expert knowledge but potentially become one of learning resources to help citizens to develop awareness about heart-healthy lifestyle.

  10. Iraqi violence, Saudi attack and further bombings

    Energy Technology Data Exchange (ETDEWEB)

    Anon

    2006-03-15

    Iraq moved closer to all-out civil war following an attack on the Imam Ali al-Hadi mosque in Samarra, one of Shi'i Islam's holiest shrines, on 22nd February. In the days that followed, several hundred Iraqis died in inter-communal violence. Attacks on installations close to the Basrah Oil Terminal were reported. Earlier in the month, the main oil storage facility in Kirkuk was bombed, forcing the Northern Oil Company to shut-in the 0.3 mn bpd field. Oil and electricity supplies in southern Iraq were cut by attacks on installations some 40 miles south of Baghdad. Turkey agreed to resume product exports to Iraq after a deal was agreed on repaying Iraqi debts of $1 bn to Turkish suppliers. An official Australian inquiry into illegal payments made under the UN's oil-for-food programme is to investigate allegations involving two Australian-controlled oil firms. (author)

  11. Quantitative Attack Tree Analysis via Priced Timed Automata

    NARCIS (Netherlands)

    Kumar, Rajesh; Ruijters, Enno Jozef Johannes; Stoelinga, Mariëlle Ida Antoinette; Sankaranarayanan, Sriram; Vicario, Enrico

    The success of a security attack crucially depends on the resources available to an attacker: time, budget, skill level, and risk appetite. Insight in these dependencies and the most vulnerable system parts is key to providing effective counter measures. This paper considers attack trees, one of the

  12. Pareto Efficient Solution of Attack-Defence Trees

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as

  13. Vulnerability Assessment by Learning Attack Specifications in Graphs

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; Lopes, Raul H.C.

    This paper presents an evolutionary approach for learning attack specifications that describe attack scenarios. The objective is to find vulnerabilities in computer networks which minimise the cost of an attack with maximum impact. Although we focus on Insider Threat, the proposed approach applies

  14. Attacks on the AJPS Mersenne-based cryptosystem

    NARCIS (Netherlands)

    K. de Boer (Koen); L. Ducas (Léo); S. Jeffery (Stacey); R. M. de Wolf (Ronald)

    2018-01-01

    textabstractAggarwal, Joux, Prakash and Santha recently introduced a new potentially quantum-safe public-key cryptosystem, and suggested that a brute-force attack is essentially optimal against it. They consider but then dismiss both Meet-in-the-Middle attacks and LLL-based attacks. Very soon after

  15. 12 CFR 747.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... INVESTIGATIONS Uniform Rules of Practice and Procedure § 747.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any court concerning all or any part of an...

  16. 12 CFR 308.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... PRACTICE RULES OF PRACTICE AND PROCEDURE Uniform Rules of Practice and Procedure § 308.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any...

  17. 12 CFR 19.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... OF PRACTICE AND PROCEDURE Uniform Rules of Practice and Procedure § 19.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any court concerning all...

  18. Limit Asthma Attacks Caused by Colds or Flu

    Science.gov (United States)

    Asthma: Limit asthma attacks caused by colds or flu A cold or the flu can trigger an asthma attack. Here's why — and how to keep your sneeze ... plan. If you notice warning signs of an asthma attack — such as coughing, wheezing, chest tightness or shortness ...

  19. Link-layer Jamming Attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    2004-01-01

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  20. Link-layer jamming attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.