WorldWideScience

Sample records for making security manifest

  1. APPROACHES TO GLOBAL SECURITY. ACTORS, MANIFESTATIONS AND TENDENCIES

    Gheorghe MINCULETE

    2013-01-01

    Full Text Available Nowadays, the world seems to be in a transition from the current system founded on the liberal social, economic and political model to a more diverse and heterogeneous model in which the determinant role is played by a number of state and non-state actors. The step from the Western system of cultural, political and predominant economic values to a more diverse and heterogeneous system makes the actors involved defend not only their visions, but also promote their own interests. The differences between visions gain relevance and clarity because the countries supporting them obtain increased power, and that is more than obvious. All this leads to a symmetric allocation of different means, which generates uncertainties and diminishes unilateral actions This transition process impacts global security especially through the asymmetric, unconventional and hybrid risks and threats manifesting worldwide.

  2. My Other Half Manifested in Mask-Making

    Abel, Xanthippi

    2010-01-01

    Every fall season, each grade level of Rowland Hall St. Mark's Lower School in Salt Lake City, Utah, completes a mask-making project to be featured in a schoolwide parade. This sparked an opportunity to incorporate the fourth-grade unit of realistic and observational drawing with mask making. In this article, the author describes how her students…

  3. Making Technology Work for Campus Security

    Floreno, Jeff; Keil, Brad

    2010-01-01

    The challenges associated with securing schools from both on- and off-campus threats create constant pressure for law enforcement, campus security professionals, and administrators. And while security technology choices are plentiful, many colleges and universities are operating with limited dollars and information needed to select and integrate…

  4. New government to make social security cutbacks

    Grünell, M.

    2003-01-01

    In May 2003, a new coalition government of the Christian Democrats and two liberal parties, VVD and D66, took office in the Netherlands. The parties' coalition agreement provides for major cutbacks in public spending, largely targeted on social security expenditure. The trade unions are fiercely

  5. Ethical Decision-Making for Homeland Security

    2013-09-01

    PhD Thesis Co-Advisor Anders Strindberg, PhD Thesis Co-Advisor Mohammed Hafez, PhD Chair, Department of National Security Affairs...expectations may be deleterious in the long-term, emotionally, psychologically , spiritually , and socially (what we label as moral injury)” (Litz 2009). They...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release; distribution is unlimited ETHICAL DECISION

  6. Threat Prioritization Process for the Czech Security Strategy Making

    Milos Balaban

    2012-06-01

    Full Text Available This article offers systematic view of a process of identification of security threats and, subsequently, their use in the making of strategic documents, notably the Security Strategy of the Czech Republic. It is not the aim of the authors to name or define such threats, but to present the process itself. It is paramount to any credible security strategy that it deals with the threat identification in the most precise fashion. The authors take reservations against the “catalogue” approach and claim the processes of prioritization and categorization to be essential for any policies derived from the security strategy, especially in times of economic need. It is also the 2011 final paper of the project “Trends, Risks, and Scenarios of the Security Developments in the World, Europe, and the Czech Republic – Impacts on the Policy and Security System of the Czech Republic” (TRS / VG20102013009.

  7. On the Road to Holistic Decision Making in Adaptive Security

    Mahsa Emami-Taba

    2013-08-01

    Full Text Available Security is a critical concern in today's software systems. Besides the interconnectivity and dynamic nature of network systems, the increasing complexity in modern software systems amplifies the complexity of IT security. This fact leaves attackers one step ahead in exploiting vulnerabilities and introducing new cyberattacks. The demand for new methodologies in addressing cybersecurity is emphasized by both private and national corporations. A practical solution to dynamically manage the high complexity of IT security is adaptive security, which facilitates analysis of the system's behaviour and hence the prevention of malicious attacks in complex systems. Systems that feature adaptive security detect and mitigate security threats at runtime with little or no administrator involvement. In these systems, decisions at runtime are balanced according to quality and performance goals. This article describes the necessity of holistic decision making in such systems and paves the road to future research.

  8. School Security and Crisis Preparedness: Make It Your Business.

    Trump, Kenneth S.

    1999-01-01

    The top five security risks in today's schools include aggressive behavior, weapons possession or use, drug trafficking, gangs, and "stranger danger." Home-made bomb threats are common. This article also discusses security system costs, risk-reduction frameworks, security assessments, crisis-preparedness guidelines, and security-related…

  9. National Security Crisis Decision-Making: The Role of Regional Combatant Commander

    Williams, Sean C

    2007-01-01

    The successful management of the Cuban Missile Crisis of 1962 set an unfortunate precedent for crisis management and national security crisis decision-making that persists into the contemporary security environment...

  10. Research on food security makes a difference for African women ...

    17 avr. 2014 ... There is ample evidence that addressing gender inequalities and empowering women are vital to meeting the challenges of improving food and nutrition security, and enabling poor rural people to overcome poverty. A central objective of the Canadian International Food Security Research Fund (CIFSRF) is ...

  11. Research on food security makes a difference for African women ...

    2016-05-05

    May 5, 2016 ... There is ample evidence that addressing gender inequalities and empowering women are vital to meeting the challenges of improving food and nutrition security, and enabling poor rural people to overcome poverty. A central objective of the Canadian International Food Security Research Fund (CIFSRF) is ...

  12. Collaborative Policy Making: Vertical Integration in The Homeland Security Enterprise

    2011-12-01

    national security and the interagency process ( Marcella , 2010). All these documents reviewed focused mainly on national security and overseas...administration, they were considered “the heart and soul of the process” ( Marcella , 2010). While subtle differences exist across administrations, the IPC...and build consensus across the government for action ( Marcella , 2010). During the second term of the Bush administration and during the first years

  13. Conceptualising energy security and making explicit its polysemic nature

    Chester, Lynne [The John Curtin Institute of Public Policy, Curtin University, GPO Box U1987, Perth WA 6845 (Australia)

    2010-02-15

    Twenty-first century access to energy sources depends on a complex system of global markets, vast cross-border infrastructure networks, a small group of primary energy suppliers, and interdependencies with financial markets and technology. This is the context in which energy security has risen high on the policy agenda of governments around the world and the term 'energy security' has quietly slipped into the energy lexicon. The limited discourse about the nature of the term or its underlying assumptions has been totally eclipsed by an almost overwhelming focus on securing supplies of primary energy sources and geopolitics. An examination of explicit and inferred definitions finds that the concept of energy security is inherently slippery because it is polysemic in nature, capable of holding multiple dimensions and taking on different specificities depending on the country (or continent), timeframe or energy source to which it is applied. This 'slipperiness' poses analytical, prediction and policy difficulties but if explicitly recognised through definitional clarity, new levels of understanding will enrich the policy debate to deal with obstacles impacting on the constantly evolving nature of energy security. (author)

  14. Conceptualising energy security and making explicit its polysemic nature

    Chester, Lynne

    2010-01-01

    Twenty-first century access to energy sources depends on a complex system of global markets, vast cross-border infrastructure networks, a small group of primary energy suppliers, and interdependencies with financial markets and technology. This is the context in which energy security has risen high on the policy agenda of governments around the world and the term 'energy security' has quietly slipped into the energy lexicon. The limited discourse about the nature of the term or its underlying assumptions has been totally eclipsed by an almost overwhelming focus on securing supplies of primary energy sources and geopolitics. An examination of explicit and inferred definitions finds that the concept of energy security is inherently slippery because it is polysemic in nature, capable of holding multiple dimensions and taking on different specificities depending on the country (or continent), timeframe or energy source to which it is applied. This 'slipperiness' poses analytical, prediction and policy difficulties but if explicitly recognised through definitional clarity, new levels of understanding will enrich the policy debate to deal with obstacles impacting on the constantly evolving nature of energy security.

  15. UN Security Council decision-making: testing the bribery hypothesis

    Eugenio Pacelli Lazzarotti Diniz Costa

    2014-12-01

    Full Text Available Liberal-Institutionalism and Structural Realism expectations about international organizations are confronted by looking at if and how US-controlled international aid is granted, and particularly if it is related or not to political affinity and to United Nations Security Council (UNSC non-permanent membership. A preliminary assessment suggests that these relations only hold for the period of the Cold War, and, even then, only when UNSC non-permanent membership is in years in which the Security Council was deemed very important.

  16. People, Process, and Policy: Case Studies in National Security Advising, the National Security Council, and Presidential Decision Making

    2017-06-01

    confirmation of Lake’s concerns with the administration’s public relations failures, David Gergen, the president’s communications advisor, increased... Public Affairs: 389-395. 75 these positions, he did not openly object too them during the campaign. Additionally, as this case study shows, he...PEOPLE, PROCESS, AND POLICY: CASE STUDIES IN NATIONAL SECURITY ADVISING, THE NATIONAL SECURITY COUNCIL, AND PRESIDENTIAL DECISION MAKING

  17. Experiments in Globalisation, Food Security and Land Use Decision Making

    Brown, Calum; Murray-Rust, Dave; van Vliet, Jasper; Alam, Shah Jamal; Verburg, Peter H.; Rounsevell, Mark D.

    2014-01-01

    The globalisation of trade affects land use, food production and environments around the world. In principle, globalisation can maximise productivity and efficiency if competition prompts specialisation on the basis of productive capacity. In reality, however, such specialisation is often constrained by practical or political barriers, including those intended to ensure national or regional food security. These are likely to produce globally sub-optimal distributions of land uses. Both outcomes are subject to the responses of individual land managers to economic and environmental stimuli, and these responses are known to be variable and often (economically) irrational. We investigate the consequences of stylised food security policies and globalisation of agricultural markets on land use patterns under a variety of modelled forms of land manager behaviour, including variation in production levels, tenacity, land use intensity and multi-functionality. We find that a system entirely dedicated to regional food security is inferior to an entirely globalised system in terms of overall production levels, but that several forms of behaviour limit the difference between the two, and that variations in land use intensity and functionality can substantially increase the provision of food and other ecosystem services in both cases. We also find emergent behaviour that results in the abandonment of productive land, the slowing of rates of land use change and the fragmentation or, conversely, concentration of land uses following changes in demand levels. PMID:25437010

  18. Experiments in globalisation, food security and land use decision making.

    Brown, Calum; Murray-Rust, Dave; van Vliet, Jasper; Alam, Shah Jamal; Verburg, Peter H; Rounsevell, Mark D

    2014-01-01

    The globalisation of trade affects land use, food production and environments around the world. In principle, globalisation can maximise productivity and efficiency if competition prompts specialisation on the basis of productive capacity. In reality, however, such specialisation is often constrained by practical or political barriers, including those intended to ensure national or regional food security. These are likely to produce globally sub-optimal distributions of land uses. Both outcomes are subject to the responses of individual land managers to economic and environmental stimuli, and these responses are known to be variable and often (economically) irrational. We investigate the consequences of stylised food security policies and globalisation of agricultural markets on land use patterns under a variety of modelled forms of land manager behaviour, including variation in production levels, tenacity, land use intensity and multi-functionality. We find that a system entirely dedicated to regional food security is inferior to an entirely globalised system in terms of overall production levels, but that several forms of behaviour limit the difference between the two, and that variations in land use intensity and functionality can substantially increase the provision of food and other ecosystem services in both cases. We also find emergent behaviour that results in the abandonment of productive land, the slowing of rates of land use change and the fragmentation or, conversely, concentration of land uses following changes in demand levels.

  19. Experiments in globalisation, food security and land use decision making.

    Calum Brown

    Full Text Available The globalisation of trade affects land use, food production and environments around the world. In principle, globalisation can maximise productivity and efficiency if competition prompts specialisation on the basis of productive capacity. In reality, however, such specialisation is often constrained by practical or political barriers, including those intended to ensure national or regional food security. These are likely to produce globally sub-optimal distributions of land uses. Both outcomes are subject to the responses of individual land managers to economic and environmental stimuli, and these responses are known to be variable and often (economically irrational. We investigate the consequences of stylised food security policies and globalisation of agricultural markets on land use patterns under a variety of modelled forms of land manager behaviour, including variation in production levels, tenacity, land use intensity and multi-functionality. We find that a system entirely dedicated to regional food security is inferior to an entirely globalised system in terms of overall production levels, but that several forms of behaviour limit the difference between the two, and that variations in land use intensity and functionality can substantially increase the provision of food and other ecosystem services in both cases. We also find emergent behaviour that results in the abandonment of productive land, the slowing of rates of land use change and the fragmentation or, conversely, concentration of land uses following changes in demand levels.

  20. Preaching What We Practice: Teaching Ethical Decision-Making to Computer Security Professionals

    Fleischmann, Kenneth R.

    The biggest challenge facing computer security researchers and professionals is not learning how to make ethical decisions; rather it is learning how to recognize ethical decisions. All too often, technology development suffers from what Langdon Winner terms technological somnambulism - we sleepwalk through our technology design, following past precedents without a second thought, and fail to consider the perspectives of other stakeholders [1]. Computer security research and practice involves a number of opportunities for ethical decisions. For example, decisions about whether or not to automatically provide security updates involve tradeoffs related to caring versus user autonomy. Decisions about online voting include tradeoffs between convenience and security. Finally, decisions about routinely screening e-mails for spam involve tradeoffs of efficiency and privacy. It is critical that these and other decisions facing computer security researchers and professionals are confronted head on as value-laden design decisions, and that computer security researchers and professionals consider the perspectives of various stakeholders in making these decisions.

  1. Efficient Aviation Security: Strengthening the Analytic Foundation for Making Air Transportation Security Decisions

    2012-01-01

    tenfold to account for uninsured and other costs unaccounted for, the result would be in the low billions of dollars rather than tens of billions...Aviation Security GAO—See U.S. Government Accountability Office or, prior to 2004, U.S. General Accounting Office. Ghylin, K. M., C. G . Drury , and A...outweigh their costs . This document seeks to contribute to the national debate on avia- tion security by examining a set of issues that are either

  2. Can We Make Operating Systems Reliable and Secure?

    Tanenbaum, A.S.; Herder, J.N.; Bos, H.J.

    2006-01-01

    Microkernels--long discarded as unacceptable because of their lower performance compared with monolithic kernels--might be making a comeback in operating systems due to their potentially higher reliability, which many researchers now regard as more important than performance.

  3. Making U.S. Security and Privacy Rights Compatible

    2013-09-01

    is not only slow and eats up resources, but it is unreasonable for 21st century methods of fighting terrorism because the standard for probable...what they are saying is true is healthy . The authority to classify documents is done to protect information from getting into the wrong hands that...some of the myths about government surveillance activities.349 This makes one wonder about the classification process if reports can be top-secret

  4. Factors Influencing the Adoption of Biometric Security Technologies by Decision Making Information Technology and Security Managers

    Lease, David R.

    2005-01-01

    The research conducted under this study offers an understanding of the reasons why information technology (IT) and/or information assurance (IA) managers choose to recommend or not to recommend particular technologies, specifically biometric security, to their organizations. A review of the relevant literature provided the foundation to develop a set of research questions and factors for this research effort. The research questions became the basis of the study’s stated hypotheses for examini...

  5. A Biological Security Motivation System for Potential Threats: Are There Implications for Policy-Making?

    Erik Z Woody

    2013-09-01

    Full Text Available Research indicates that there is a specially adapted, hard-wired brain circuit, the security motivation system, which evolved to manage potential threats, such as the possibility of contamination or predation. The existence of this system may have important implications for policy-making related to security. The system is sensitive to partial, uncertain cues of potential danger, detection of which activates a persistent, potent motivational state of wariness or anxiety. This state motivates behaviours to probe the potential danger, such as checking, and to correct for it, such as washing. Engagement in these behaviours serves as the terminating feedback for the activation of the system. Because security motivation theory makes predictions about what kinds of stimuli activate security motivation and what conditions terminate it, the theory may have applications both in understanding how policy-makers can best influence others, such as the public, and also in understanding the behavior of policy-makers themselves.

  6. Early Manifestations of Children's Theory of Mind: The Roles of Maternal Mind-Mindedness and Infant Security of Attachment

    Laranjo, Jessica; Bernier, Annie; Meins, Elizabeth; Carlson, Stephanie M.

    2010-01-01

    This study investigated two aspects of mother-child relationships--mothers' mind-mindedness and infant attachment security--in relation to two early aspects of children's theory of mind development (ToM). Sixty-one mother-child dyads (36 girls) participated in testing phases at 12 (T1), 15 (T2), and 26 months of age (T3), allowing for assessment…

  7. Using Real Option Thinking to Improve Decision Making in Security Investment

    Nunes Leal Franqueira, V.; Houmb, S.H.; Daneva, Maia

    2010-01-01

    Making well-founded security investment decisions is hard: several alternatives may need to be considered, the alternatives' space is often diffuse, and many decision parameters that are traded-off are uncertain or incomplete. We cope with these challenges by proposing a method that supports

  8. The Effect of Knowledge of Online Security Risks on Consumer Decision Making in B2C e-Commerce

    Wang, Ping An

    2010-01-01

    This dissertation research studied how different degrees of knowledge of online security risks affect B2C (business-to-consumer) e-commerce consumer decision making. Online information security risks, such as identity theft, have increasingly become a major factor inhibiting the potential growth of e-commerce. On the other hand, e-commerce…

  9. Unionism, the Decision-Making Process and Social Security Reform in Brazil

    Sidney Jard da Silva

    2016-08-01

    Full Text Available Despite the vast literature on social security reform there are relatively few studies that analyze the participation of representatives coming from the union movement in the decision-making process. This article aims to fill part of that gap in Brazilian academic production on unionism and public policy. In situations in which unionist representatives support the ruling party, does the union bloc tend to defend the specific interests of their base of social representation or to follow the guidance of the party coalition of which they are part? The study addresses this research problemby analyzing the participation of the union bloc in the decision-making process of a social security reform, Proposal of Amendment to the Constitution, Article 40 (PEC 40, during the first term of Luiz Inácio Lula da Silva's government. The main findings of the study confirm the thesis of party predominance. In an institutional political scenario in which party discipline prevails, unionist representatives and senators tend to follow the guidance of the party coalition even under contrary pressures from their electoral base. The research sheds light on the relations involved between the Executive and Legislative branches, in the process of changing public policy, in which a government considered to be allied imposes losses for specific sectors of the union base, notably the active and inactive public servants of the federal government, states and municipalities.

  10. Securing a better future for all: making a difference with nuclear technology

    Mohamad, Daud; )

    2014-01-01

    The IAEA is an inter-governmental organization and the world's centre of cooperation in the nuclear field. As per its mandate, the IAEA shall seek to accelerate and enlarge the contribution of atomic energy to peace, health and prosperity throughout the world. The IAEA executes its mandate on the basis of three pillars: nuclear verification and security, safety and technology transfer. Nuclear technologies and techniques can offer vital assistance in fighting disease, improving food security and safety, and studying and sustainably managing water resources and the environment. The IAEA's Department of Nuclear Sciences and Applications works to address these critical developmental needs by helping Member States to apply nuclear science and technology more effectively where they have a comparative advantage and can have substantial socio-economic impact. The scale of these needs is growing each day as the world's population and life expectancies increase, as global industry and migration multiply the populations of the world's cities and their demands for resources, and as these trends impact human disease, the availability of safe and sufficient supplies of food and water, the health of our terrestrial and marine ecosystems, and the variability of our climate. These are highly complex challenges, and nuclear science and technology, can make impactful contributions in helping Member States to respond to these challenges

  11. Making Wireless Networks Secure for NASA Mission Critical Applications Using Virtual Private Network (VPN) Technology

    Nichols, Kelvin F.; Best, Susan; Schneider, Larry

    2004-01-01

    acceptance. The user computer running the VPN client and the target site that is running the VPN firewall exchange this encryption key and therefore are the only ones that are able to decipher the data. The level of encryption offered by the VPN is making it possible for wireless networks to pass the strict security policies that have kept them from being used in the past. Now people will be able to benefit from the many advantages that wireless networking has to offer in the area of mission critical applications.

  12. Pulmonary manifestations of leptospirosis

    Sameer Gulati

    2012-01-01

    Full Text Available Leptospirosis has a spectrum of presentation which ranges from mild disease to a severe form comprising of jaundice and renal failure. Involvement of the lung can vary from subtle clinical features to deadly pulmonary hemorrhage and acute respiratory distress syndrome. Of late, it has been identified that leptospirosis can present atypically with predominant pulmonary manifestations. This can delay diagnosis making and hence optimum treatment. The purpose of this review is to bring together all the reported pulmonary manifestations of leptospirosis and the recent trends in the management.

  13. An ethical duty: Let astronautical development unfold - to make the people more secure

    Bernasconi, Marco C.

    2014-11-01

    In examining alternative space-development models, one observes that Heinlein postulated the first Moon flight as the outcome of the focused action of an individual - building upon an ample commercial aerospace transportation infrastructure. The same technological basis and entrepreneurial drive would then sustain a fast human and economic expansion on three new planets. Instead, historically, humans reached the Moon thanks to a "Faustian bargain" between astronautical developers and governments. This approach brought the early Apollo triumphs, but it also created the presumption of this method as the sole one for enabling space development. Eventually, the application of this paradigm caused the decline of the astronautical endeavor. Thus, just as conventional methods became unable to sustain the astronautical endeavor, space development appeared as vital, e.g., to satisfy the people's basic needs (metabolic resources, energy, materials, and space), as shown elsewhere. Such an endeavor must grow from actions generating new wealth through commercial activities to become self-supporting. Acquisition and distribution of multiform space resources call, however, for a sound ethical environment, as predatory governments can easily forfeit those resources. The paper begins the search for means apt to maintain a societal environment suited for this purpose. Among numerous initiatives needed, dissemination of factual information and moral-right education support take a central position: In fact, the vital condition for true Astronautics - a vast increase in actual respect of moral rights - can also become its best consequence, as the prosperity from the space arena empowers the people, making them materially safer and more secure in their fundamental moral rights.

  14. Collaborative Decision Making Process for Complex Defense, Security and Stability Challenges

    Bemmel, I.E. van; Eikelboom, A.R.

    2014-01-01

    How to intervene in crises and conflicts? How to cope with complex challenges in the field of defense, security and stability? Questions like these are difficult to answer due to amongst others the involvement of multiple stakeholders that contribute to these complex challenges and need to cooperate

  15. Security Evolution.

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  16. The Department of Homeland Security’s Pursuit of Data-Driven Decision Making

    2015-12-01

    security missions at a critical time. The absence of a recognized, authoritative information source from which leaders could assess the impacted property...Furthermore, as all the DHS Components except TSA were legacy agencies from other parent departments, they each brought with them their unique...and leadership styles influence the Management Directorate’s ability to engage with the Components and drive change. It explores how the lack of

  17. Making the world more secure, one research reactor at a time

    Mutluer, Adem; Rickwood, Peter

    2015-01-01

    During the night of 29 September 2014, a heavy transport plane took off from an air base in Kazakhstan after an operation to remove fuel and increase the security of a research reactor. In its cargo bay sat four massive containers, provided by the IAEA, that had been filled with a total of 10.2 kilograms of highly enriched uranium (HEU), on its way to be diluted to a safe substance or securely stored at the flight’s destination in Russia. The operation represented the latest achievement in a global programme involving the IAEA, the Russian Federation and the United States to assist several countries, including Kazakhstan, in eliminating the risks associated with HEU, while still maintaining the important scientific research conducted at the reactor. HEU is a security risk, as it is an ingredient that can be used to create a nuclear device intended for malicious use. It is not encouraged to use HEU in a research reactor as safer low enriched uranium (LEU) can be used instead (see box). In the 1960s and 1970s, when many of the world’s research reactors were built, technology using LEU was not yet available, so in order to perform experiments HEU fuel was required. As of next year, less proliferation sensitive LEU will be used to fuel the light water research reactor in Alatau near Almaty, the largest city in Kazakhstan.

  18. Making the world more secure, one research reactor at a time

    Mutluer, Adem; Rickwood, Peter

    2015-01-01

    During the night of 29 September 2014, a heavy transport plane took off from an air base in Kazakhstan after an operation to remove fuel and increase the security of a research reactor. In its cargo bay sat four massive containers, provided by the IAEA, that had been filled with a total of 10.2 kilograms of highly enriched uranium (HEU), on its way to be diluted to a safe substance or securely stored at the flight’s destination in Russia. The operation represented the latest achievement in a global programme involving the IAEA, the Russian Federation and the United States to assist several countries, including Kazakhstan, in eliminating the risks associated with HEU, while still maintaining the important scientific research conducted at the reactor. HEU is a security risk, as it is an ingredient that can be used to create a nuclear device intended for malicious use. It is not encouraged to use HEU in a research reactor as safer low enriched uranium (LEU) can be used instead (see box). In the 1960s and 1970s, when many of the world’s research reactors were built, technology using LEU was not yet available, so in order to perform experiments HEU fuel was required. As of next year, less proliferation sensitive LEU will be used to fuel the light water research reactor in Alatau near Almaty, the largest city in Kazakhstan. .

  19. UN Secretary-General Normative Capability to Influence The Security Council Decision-Making Process

    Dmitry Guennadievich Novik

    2016-01-01

    Full Text Available The present article studies the issue of the interrelation between the senior UN official - the Secretary-General and the main UN body - the Security Council. The nature of the Secretary-General role is ambiguous since the very creation of the UN. On one hand, the Secretary-General leads the Secretariat - the body that carries out technical and subsidiary functions in relation to other UN Main Bodies. This is the way the Secretary-General position was initially viewed by the UN authors. On the other hand, the UN Charter contains certain provisions that, with a certain representation, give the Secretary-General vigorous powers, including political ones. Since the very beginning of the UN operation the Secretary-Generals have tried to define the nature of these auxiliary powers, formalize the practice of their use. Special place among these powers have the provisions given in the Charter article 99. This article give to the Secretary-General the right to directly appeal to the Security Council and draw its attention to the situation that, in his (Secretary-General's opinion may threaten the international peace and security. This right was used by some Secretary-Generals during different crises occurred after the creation of the UN. This article covers consecutively the crisis in Congo, Iran hostage crisis and the situation in Lebanon. These are three situations that forced Secretary-Generals Hammarskjold, Waldheim and de Cuellar to explicitly use their right to appeal to the Security Council. Other cases in UN history involving the Secretary-General appealing to the Security Council while mentioning article 99 cannot be considered as the use of the nature of this article in full sense of its spirit. Such cases were preceded by other appeals to the Council on the same situations by other subjects (notably, the UN member states or other actions that made Secretary-General to merely perform its technical function. The main research problem here is

  20. Waste Management Decision-Making Process During a Homeland Security Incident Response

    A step-by-step guide on how to make waste management-related decisions including how waste can be minimized, collected and treated, as well as where waste can be sent for staging, storage and final disposal.

  1. Value of standard personality assessments in informing clinical decision - making in a medium secure unit.

    Duggan, Conor; Mason, Lauren; Banerjee, Penny; Milton, John

    2007-05-01

    Assessing those with personality disorder for treatment in secure settings is known to be unsatisfactory. To examine the utility of a standardised assessment of offenders with personality disorder referred for treatment in secure care in a naturalistic study. A consecutive series of 89 men were assessed with a battery of four recommended instruments measuring personality and risk. Decisions on whether or not to admit were based on a multidisciplinary discussion informed by these assessments. Of the 89 comprehensively assessed referrals, 60 (67%) were offered admission. High scores on the Psychopathy Checklist-Revised (especially on Factor 1) was the only measure that was associated with rejection. Of 44 patients discharged, 29 (66%) failed to complete treatment; none of the pre-admission assessments distinguished ;completers' from ;non-completers'. Although skills were acquired on the unit, follow-up of 24 men in the community showed that this had only a marginal effect on re-offending rate (58%). Current recommended assessment methods appear unsatisfactory in identifying those who either (a) complete treatment or (b) benefit from treatment. Our results throw doubt on their value.

  2. Food Security, Decision Making and the Use of Remote Sensing in Famine Early Warning Systems

    Brown, Molly E.

    2008-01-01

    Famine early warning systems use remote sensing in combination with socio-economic and household food economy analysis to provide timely and rigorous information on emerging food security crises. The Famine Early Warning Systems Network (FEWS NET) is the US Agency for International Development's decision support system in 20 African countries, as well as in Guatemala, Haiti and Afghanistan. FEWS NET provides early and actionable policy guidance for the US Government and its humanitarian aid partners. As we move into an era of climate change where weather hazards will become more frequent and severe, understanding how to provide quantitative and actionable scientific information for policy makers using biophysical data is critical for an appropriate and effective response.

  3. Making US Soil Taxonomy more scientifically applicable to environmental and food security issues.

    Monger, Curtis; Lindbo, David L.; Wysocki, Doug; Schoeneberger, Phil; Libohova, Zamir

    2017-04-01

    US Department of Agriculture began mapping soils in the 1890s on a county-by-county basis until most of the conterminous United States was mapped by the late 1930s. This first-generation mapping was followed by a second-generation that re-mapped the US beginning in the 1940s. Soil classification during these periods evolved into the current system of Soil Taxonomy which is based on (1) soil features as natural phenomena and on (2) soil properties important for agriculture and other land uses. While this system has enabled communication among soil surveyors, the scientific applicability of Soil Taxonomy to address environmental and food security issues has been under-utilized. In particular, little effort has been exerted to understand how soil taxa interact and function together as larger units—as soil systems. Thus, much soil-geomorphic understanding that could be applied to process-based modeling remains unexploited. The challenge for soil taxonomists in the United States and elsewhere is to expand their expertise and work with modelers to explore how soil taxa are linked to each other, how they influence water, nutrient, and pollutant flow through the landscape, how they interact with ecology, and how they change with human land use.

  4. Use of GIS-Based Sampling to Inform Food Security Assessments and Decision Making in Kenya

    Wahome, A.; Ndubi, A. O.; Ndungu, L. W.; Mugo, R. M.; Flores Cordova, A. I.

    2017-12-01

    Kenya relies on agricultural production for supporting local consumption and other processing value chains. With changing climate in a rain-fed dependent agricultural production system, cropping zones are shifting and proper decision making will require updated data. Where up-to-date data is not available it is important that it is generated and passed over to relevant stakeholders to inform their decision making. The process of generating this data should be cost effective and less time consuming. The Kenyan State Department of Agriculture (SDA) runs an insurance programme for maize farmers in a number of counties in Kenya. Previously, SDA was using a list of farmers to identify the crop fields for this insurance programme. However, the process of listing of all farmers in each Unit Area of Insurance (UAI) proved to be tedious and very costly, hence need for an alternative approach, but acceptable sampling methodology. Building on the existing cropland maps, SERVIR, a joint NASA-USAID initiative that brings Earth observations (EO) for improved environmental decision making in developing countries, specifically its hub in Eastern and Soutehrn Africa developed a High Resolution Map based on 10m Sentinel satellite images from which a GIS based sampling frame for identifying maize fields was developed. Sampling points were randomly generated in each UAI and navigated to using hand-held GPS units for identification of maize farmers. In the GIS-based identification of farmers SDA uses 1 day to cover an area covered in 1 week by list identification of farmers. Similarly, SDA spends approximately 3,000 USD per sub-county to locate maize fields using GIS-based sampling as compared 10,000 USD they used to spend before. This has resulted in 70% cost reduction.

  5. High stakes. HITECH's privacy provisions will make costly security breaches even more painful to bear.

    Gamble, Kate Huvane

    2009-07-01

    * The HITECH section of ARRA includes provisions relating to protected health information that could significantly alter the C-suite leader's strategy. * Patients will be entitled to request an accounting of disclosure for up to three years after the date of request. The onus will be on hospital leaders to put in place a process that makes accounting available without disrupting operations or patient care. * Because of the increased risks hospitals now face, it is critical that executives are aware of the new requirements, and are either involved in or have a solid understanding of the organization's breach notification policies.

  6. Bridging suture makes consistent and secure fixation in double-row rotator cuff repair.

    Fukuhara, Tetsutaro; Mihata, Teruhisa; Jun, Bong Jae; Neo, Masashi

    2017-09-01

    Inconsistent tension distribution may decrease the biomechanical properties of the rotator cuff tendon after double-row repair, resulting in repair failure. The purpose of this study was to compare the tension distribution along the repaired rotator cuff tendon among three double-row repair techniques. In each of 42 fresh-frozen porcine shoulders, a simulated infraspinatus tendon tear was repaired by using 1 of 3 double-row techniques: (1) conventional double-row repair (no bridging suture); (2) transosseous-equivalent repair (bridging suture alone); and (3) compression double-row repair (which combined conventional double-row and bridging sutures). Each specimen underwent cyclic testing at a simulated shoulder abduction angle of 0° or 40° on a material-testing machine. Gap formation and tendon strain were measured during the 1st and 30th cycles. To evaluate tension distribution after cuff repair, difference in gap and tendon strain between the superior and inferior fixations was compared among three double-row techniques. At an abduction angle of 0°, gap formation after either transosseous-equivalent or compression double-row repair was significantly less than that after conventional double-row repair (p row repair (p = 0.01) at 0° abduction had significantly less difference in gap formation between the superior and inferior fixations than did conventional double-row repair. After the 30th cycle, the difference in longitudinal strain between the superior and inferior fixations at 0° abduction was significantly less with compression double-row repair (2.7% ± 2.4%) than with conventional double-row repair (8.6% ± 5.5%, p = 0.03). Bridging sutures facilitate consistent and secure fixation in double-row rotator cuff repairs, suggesting that bridging sutures may be beneficial for distributing tension equally among all sutures during double-row repair of rotator cuff tears. Copyright © 2017 The Japanese Orthopaedic Association. Published by Elsevier B

  7. Impacts of Agricultural Decision Making and Adaptive Management on Food Security in Africa

    Caylor, K. K.; Evans, T. P.; Estes, L. D.; Sheffield, J.; Plale, B. A.; Attari, S.

    2014-12-01

    Despite massive investments in food aid, agricultural extension, and seed/fertilizer subsidies, nearly 1 billion people in the developing world are food insecure and vulnerable to climate variability. Sub-Saharan Africa is most vulnerable, as approximately 25% of its people are undernourished (FAO/FAOSTAT 2013) and 96% of its cropland is rainfed (FAO 2002). The ability of subsistence farmers to respond to changes in water availability involves both inter-and intra-seasonal adaptation. Adaptive capacity diminishes over the season as decisions are made, resources are used, and the set of possible futures becomes restricted. Assessing the intra-seasonal adaptive capacity of smallholders requires integrating physical models of hydrological and agricultural dynamics with farmer decision-making at fine temporal (e.g. weekly) and spatial (e.g. crop field) scales. However, there is an intrinsic challenge to modeling the dynamics of these sociohydrologic systems, because important and uncharacterized spatial and temporal scale mismatches exist between the level at which the water resource is best understood and the level at which human dynamics are more predictable. For example, the skill of current process-based land surface models is primarily confined to short-term (daily to weekly), national- to regional-scale assessments, and reliable agricultural yield estimates and forecasts for small-scale farming systems remain elusive. In contrast, process-based social science modeling has focused on agent-based approaches that generate fine-scale (individual to community) dynamics over rather coarse time scales (yearly to decadal). A major obstacle to addressing this mismatch is the fundamental fact that the highest skill domain of one framework is essentially unpredictable in the other. We present a coupled sociohydrological observation framework designed to addressing this gap, and demonstrate its utility to understand relationships between climate variability, decision making

  8. Admitting offenders with antisocial personality disorder to a medium secure unit: a qualitative examination of multidisciplinary team decision-making.

    McRae, Leon

    2013-04-01

    This paper reports on the results of a qualitative study funded by the Economic and Social Research Council (ESRC) looking at multidisciplinary team decisions to admit sentenced offenders with antisocial personality disorder to a medium secure unit. The aim of the study was to examine admission decision-making from a multidisciplinary perspective, and to explore the interprofessional dynamics and contextual pressures informing those decisions. The primary method of data collection was 12 semi-structured interviews with a convenience sample of various multidisciplinary staff involved in pre-admission assessment and post-assessment decision-making. Data was then coded according to the dialectic of competitive and cooperative goal seeking within groups. The findings suggest that, whilst both forms of goal seeking inform admission decisions, the presence of significant resource pressures will lead to decisional solidarity among the multidisciplinary team. When minor professional disagreements arise, they are resolved by the group leader, the Responsible Clinician, in order to maximise group productivity. It is argued that the discursive-limiting effect of resource pressures on group decision-making may weaken the morale of certain front line staff, if not undermine institutional purpose.

  9. Make

    Frauenfelder, Mark

    2012-01-01

    The first magazine devoted entirely to do-it-yourself technology projects presents its 29th quarterly edition for people who like to tweak, disassemble, recreate, and invent cool new uses for technology. MAKE Volume 29 takes bio-hacking to a new level. Get introduced to DIY tracking devices before they hit the consumer electronics marketplace. Learn how to build an EKG machine to study your heartbeat, and put together a DIY bio lab to study athletic motion using consumer grade hardware.

  10. Security Expertise

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  11. The EU’s Cybercrime and Cyber-Security Rule-Making: Mapping the Internal and External Dimensions of EU Security

    Fahey, E.

    2014-01-01

    EU Security impacts significantly upon individuals and generates many questions of the rule of law, legal certainty and fundamental rights. These are not always central concerns for EU risk regulation, especially given that EU risk regulation has sought to draw close correlations between EU risk and

  12. e-Manifest

    This is the primary hub for those seeking information about the e-Manifest system, its advisory board, and its development. Once the system is complete this area will serve as the portal into the e-Manifest system from EPA webpages.

  13. Surgical manifestations of filariasis

    Subrahmanyam M

    1978-01-01

    Full Text Available Surgical manifestations of filariasis as seen in 150 cases over a period of three years in the department of Surgery, Mahatma Gandhi Institute of Medical Sciences, Sevagram, Wardha are reviewed. The genital manifestations are more common than the elephantiasis in this endemic zone.

  14. Intrathoracic manifestations of Rosai-Dorfman disease.

    Cartin-Ceba, Rodrigo; Golbin, Jason M; Yi, Eunhee S; Prakash, Udaya B S; Vassallo, Robert

    2010-09-01

    Rosai-Dorfman Disease (RDD), also known as Sinus Histiocytosis with Massive Lymphadenopathy (SHML), is a rare monocyte/macrophage proliferative disorder of varied biological behavior. Although cutaneous and lymph node involvement are relatively well-described, intrathoracic manifestations of RDD have only occasionally been reported. We conducted a retrospective computer-assisted search of the Mayo Clinic record from 1976 to 2005 for patients with histopathologic evidence of RDD on organ biopsy. Clinical characteristics were abstracted from charts and thoracic manifestations recorded. Survival was estimated using the national social security database. A total of 21 patients were diagnosed with RDD over a period of 30 years; 9 had intrathoracic manifestations (43%). Main pulmonary symptoms included dyspnea and cough. Age at the time of diagnosis, gender, race, smoking history, mortality and time of survival after diagnosis were no different between RDD patients with and without intrathoracic manifestations. The most common radiographic thoracic manifestation was mediastinal lymphadenopathy (6 patients). Cystic change, interstitial lung disease, and airway disease were radiographically evident in 4 patients. Seven patients were treated at some point in the course of their disease, most commonly with oral corticosteroids. At the time of last follow-up 87% were alive, with a median (IQR) time interval since diagnosis of 8 years (4-9.7). Intrathoracic manifestations of RDD are relatively common and include mediastinal lymphadenopathy, airway disease, pleural effusion, cystic and interstitial lung disease. Although limited in size, this series suggests the prognosis of patients with RDD and intrathoracic manifestations is relatively good.

  15. The FBI is Leading the Way by Making the Private Sector an Integral Part of the Counterterrorism Homeland Security Enterprise

    2012-09-01

    This thesis discusses the building of a sustainable business process wherein the private sector is integrated into the homeland security apparatus...As the threat our nation and her allies face continues to evolve, so must our responses. Integrating the private sector into the homeland security...attack. The private sector brings with it a plethora of talents and resources. Because it has not traditionally been seen as a partner the private sector has

  16. Hierarchical energy and frequency security pricing in a smart microgrid: An equilibrium-inspired epsilon constraint based multi-objective decision making approach

    Rezaei, Navid; Kalantar, Mohsen

    2015-01-01

    Highlights: • Proposing a multi-objective security pricing mechanism for islanded microgrids. • Generating Pareto points using epsilon constraint methodology. • Best compromise solution using a novel decision making approach. • An equilibrium-inspired technique is used as an efficient decision making method. • Stochastic management of hierarchical reserves in a droop controlled microgrid. - Abstract: The present paper formulates a frequency security constrained energy management system for an islanded microgrid. Static and dynamic securities of the microgrids have been modeled in depth based on droop control paradigm. The derived frequency dependent modeling is incorporated into a multi-objective energy management system. Microgrid central controller is in charge to determine optimal prices of energy and frequency security such that technical, economic and environmental targets are satisfied simultaneously. The associated prices are extracted based on calculating related Lagrange multipliers corresponding to providing the microgrid hourly energy and reserve requirements. Besides, to generate optimal Pareto solutions of the proposed multi-objective framework augmented epsilon constraint method is applied. Moreover, a novel methodology on the basis of Nash equilibrium strategy is devised and employed to select the best compromise solution from the generated Pareto front. Comprehensive analysis tool is implemented in a typical test microgrid and executed over a 24 h scheduling time horizon. The energy, primary and secondary frequency control reserves have been scheduled appropriately in three different case-studies which are defined based on the microgrid various operational policies. The optimization results verify that the operational policies adopted by means of the microgrid central controller have direct impacts on determined energy and security prices. The illustrative implementations can give the microgrid central controller an insight view to provide

  17. Quantum manifestations of chaos

    Borondo, F.; Benito, R.M.

    1998-01-01

    The correspondence between classical and quantum mechanics is considered both in the regular and chaotic regimes, and the main results regarding the quantum manifestations of chaos are reviewed. (Author) 16 refs

  18. Extrahepatic manifestations of cholestasis

    Glasova, Helena; Beuers, Ulrich

    2002-01-01

    Pruritus, fatigue and metabolic bone disease represent three major extrahepatic manifestations of chronic cholestatic liver disease that considerably affect the patient's quality of life. The present article reviews pathogenetic aspects of and current therapeutic approaches to extrahepatic

  19. Radiographic manifestations of hypochondroplasia

    Heselson, N G; Cremin, B J [Groote Schuur Hospital, Cape Town (South Africa); Beighton, P

    1979-01-01

    Hypochrondroplasia is an inherited skeletal dysplasia that resembles achondroplasia in mild degree. Radiographic manifestations encountered in 12 affected individuals in South Africa include slight shortening of all segments of the tubular bones, moderate caudal diminution of the lumbar interpedicular distances, increased lumbar lordosis with cacral tilt and distal prolongation of the fibular. Hypochondroplasia can be distinguished from other osteochondrodystrophies such as achondroplasia, pseudo-achondroplasia and metaphyseal chondroplasia by the recognition of it clinical and radiographic manifestations.

  20. Haematological manifestations of lupus

    Fayyaz, Anum; Igoe, Ann; Kurien, Biji T; Danda, Debashish; James, Judith A; Stafford, Haraldine A; Scofield, R Hal

    2015-01-01

    Our purpose was to compile information on the haematological manifestations of systemic lupus erythematosus (SLE), namely leucopenia, lymphopenia, thrombocytopenia, autoimmune haemolytic anaemia (AIHA), thrombotic thrombocytopenic purpura (TTP) and myelofibrosis. During our search of the English-language MEDLINE sources, we did not place a date-of-publication constraint. Hence, we have reviewed previous as well as most recent studies with the subject heading SLE in combination with each manifestation. Neutropenia can lead to morbidity and mortality from increased susceptibility to infection. Severe neutropenia can be successfully treated with granulocyte colony-stimulating factor. While related to disease activity, there is no specific therapy for lymphopenia. Severe lymphopenia may require the use of prophylactic therapy to prevent select opportunistic infections. Isolated idiopathic thrombocytopenic purpura maybe the first manifestation of SLE by months or even years. Some manifestations of lupus occur more frequently in association with low platelet count in these patients, for example, neuropsychiatric manifestation, haemolytic anaemia, the antiphospholipid syndrome and renal disease. Thrombocytopenia can be regarded as an important prognostic indicator of survival in patients with SLE. Medical, surgical and biological treatment modalities are reviewed for this manifestation. First-line therapy remains glucocorticoids. Through our review, we conclude glucocorticoids do produce a response in majority of patients initially, but sustained response to therapy is unlikely. Glucocorticoids are used as first-line therapy in patients with SLE with AIHA, but there is no conclusive evidence to guide second-line therapy. Rituximab is promising in refractory and non-responding AIHA. TTP is not recognised as a criteria for classification of SLE, but there is a considerable overlap between the presenting features of TTP and SLE, and a few patients with SLE have concurrent

  1. Extrathoracic manifestations of tuberculosis

    Kienzl-Palma, D.; Prosch, H.

    2016-01-01

    Besides the lungs, tuberculosis (TB) can affect any organ system. In most cases, extrathoracic TB occurs in immunosuppressed patients as part of a severe illness via hematogenous spread. Extrathoracic involvement most commonly involves abdominal organs, especially the urogenital tract and less commonly the central nervous system (CNS) and the musculoskeletal system. Most frequently, computed tomography (CT) is used for detecting extrathoracic TB manifestations, except for CNS and musculoskeletal manifestations, where contrast-enhanced magnetic resonance imaging (MRI) is the gold standard. Extrathoracic manifestations of TB may be indistinguishable from inflammatory or malignant causes. Due to unspecific symptoms the diagnosis is often delayed. This article summarizes and discusses the various radiological manifestations of extrathoracic manifestation of TB. Radiological modalities for screening extrathoracic TB are CT and MRI. Conventional X-radiographs do not play a role in the diagnosis of extrathoracic TB. The possibility of extrathoracic TB should be considered particularly in immunosuppressed patients, such as the homeless, alcoholics or drug addicts or in patients with an immigrant background from the endemic areas of TB. The most likely site of extrathoracic TB is the abdomen; however, infections of the CNS or musculoskeletal systems and multisystem infections can also occur. In patients with suspected extrathoracic TB, radiological modalities for screening are CT, especially for abdominal infections and lymphadenopathy and MRI with contrast media for the musculoskeletal system and the CNS. (orig.) [de

  2. In Pursuit of the American Degree: Internationalization, National Security, and the Making of South Asian Foreign Students

    Thomas, Susan

    2013-01-01

    My dissertation examines how global neoliberal forces intersect with racialized state security practices to shape the transnational subjectivities of South Asian overseas students studying in the U.S. in the post-9/11 moment. These students' movement across national borders to pursue higher education in the United States positions them as ideal…

  3. Sclerodermatomyositis, ocular manifestations.

    Pedroza-Seres, M; Serna-Ojeda, J C; Flores-Suárez, L F

    2017-07-01

    Sclerodermatomyositis is an overlap syndrome of myositis and scleroderma, with dermatological, muscular and joint involvement, but may also present with ocular manifestations. A 57 year-old woman presented with ophthalmological manifestations, including scleral thinning 360°, and the presence of cells in the anterior and posterior chamber. Oriented physical examination and laboratory studies led to the diagnosis, with the need for systemic treatment. Sclerodermatomyositis is a rare disease. Its diagnosis needs thorough clinical and laboratory studies, and its management should be multidisciplinary when inflammatory ocular manifestations may be present. Copyright © 2016 Sociedad Española de Oftalmología. Publicado por Elsevier España, S.L.U. All rights reserved.

  4. Thermodynamics in 'Manifest Reality'

    Hankey, Alex

    2010-01-01

    D'Espagnat's proof that the universe is not a 'strongly objective reality' demands that all physical processes are reconsidered in that light. D'Espagnat suggests a 'Veiled Reality' as a suitable alternative. The most economical way to achieve that is to demand that 'information production' at a quantum level creates the basis for self-consistent perception of a world of macroscopic, 'manifest' entities, as opposed to self-existent objects. Such a 'manifest reality' fulfils both Wheeler's attempt at an 'IT-from-BIT' programme, and Zeilinger's suggestion that 'information is primary'.

  5. Pulmonary manifestations of malaria

    Rauber, K.; Enkerlin, H.L.; Riemann, H.; Schoeppe, W.; Frankfurt Univ.

    1987-01-01

    We report on the two different types of pulmonary manifestations in acute plasmodium falciparum malaria. The more severe variant shows long standing interstitial pulmonary infiltrates, whereas in the more benign courses only short-term pulmonary edemas are visible. (orig.) [de

  6. Hazardous Waste Manifest System

    EPA’s hazardous waste manifest system is designed to track hazardous waste from the time it leaves the generator facility where it was produced, until it reaches the off-site waste management facility that will store, treat, or dispose of the waste.

  7. Neurocysticercosis, unusual manifestations

    David López-Valencia

    2016-07-01

    The case of a patient with an atypical location of the parasite at the medulla oblongata, between parenchymal and spinal areas, is presented. The initial symptoms were common but its subsequent manifestations were similar to those of Bruns syndrome. Furthermore, the epidemiological profile of neurocysticercosis in Colombia, its control measures and prevention strategies were reviewed in this study.

  8. Reconciling privacy and security

    Lieshout, M.J. van; Friedewald, M.; Wright, D.; Gutwirth, S.

    2013-01-01

    This paper considers the relationship between privacy and security and, in particular, the traditional "trade-off" paradigm. The issue is this: how, in a democracy, can one reconcile the trend towards increasing security (for example, as manifested by increasing surveillance) with the fundamental

  9. Immunologic manifestations of autophagy

    Deretic, Vojo; Kimura, Tomonori; Timmins, Graham

    2015-01-01

    The broad immunologic roles of autophagy span innate and adaptive immunity and are often manifested in inflammatory diseases. The immune effects of autophagy partially overlap with its roles in metabolism and cytoplasmic quality control but typically expand further afield to encompass unique...... immunologic adaptations. One of the best-appreciated manifestations of autophagy is protection against microbial invasion, but this is by no means limited to direct elimination of intracellular pathogens and includes a stratified array of nearly all principal immunologic processes. This Review summarizes...... the broad immunologic roles of autophagy. Furthermore, it uses the autophagic control of Mycobacterium tuberculosis as a paradigm to illustrate the breadth and complexity of the immune effects of autophagy....

  10. Ocular manifestations of leptospirosis

    Rathinam S

    2005-01-01

    Full Text Available Leptospiral uveitis is a common entity in tropical countries. Ocular manifestations are noted in the second phase of illness, but these remain under-diagnosed mainly because of the prolonged symptom-free period that separates the systemic manifestations from detection of ocular manifestations.Varying ophthalmic presentations and the intrinsic nature of different types of uveitis to mimic one another also challenge the accuracy of the diagnosis. Of the individual ocular signs, the combination of acute, non-granulomatous, panuveitis, hypopyon, vasculitis, optic disc edema, membranous vitreous opacities and absence of choroiditis or retinitis have high predictive value for the clinical diagnosis of leptospiral uveitis. Geographic location of the patient, occupation, socio-economic status, risk factors related to exposure, past history of fever or jaundice also aid in diagnosis.Steroids are the mainstay of treatment for leptospiral uveitis. Depending upon the severity and anatomical location of inflammatory lesion, topical, peri-ocular and/or systemic steroids are given. The prognosis is generally good, even when the inflammation is severe.

  11. Building Economic Security Today: making the health-wealth connection in Contra Costa county's maternal and child health programs.

    Parthasarathy, Padmini; Dailey, Dawn E; Young, Maria-Elena D; Lam, Carrie; Pies, Cheri

    2014-02-01

    In recent years, maternal and child health professionals have been seeking approaches to integrating the Life Course Perspective and social determinants of health into their work. In this article, we describe how community input, staff feedback, and evidence from the field that the connection between wealth and health should be addressed compelled the Contra Costa Family, Maternal and Child Health (FMCH) Programs Life Course Initiative to launch Building Economic Security Today (BEST). BEST utilizes innovative strategies to reduce inequities in health outcomes for low-income Contra Costa families by improving their financial security and stability. FMCH Programs' Women, Infants, and Children Program (WIC) conducted BEST financial education classes, and its Medically Vulnerable Infant Program (MVIP) instituted BEST financial assessments during public health nurse home visits. Educational and referral resources were also developed and distributed to all clients. The classes at WIC increased clients' awareness of financial issues and confidence that they could improve their financial situations. WIC clients and staff also gained knowledge about financial resources in the community. MVIP's financial assessments offered clients a new and needed perspective on their financial situations, as well as support around the financial and psychological stresses of caring for a child with special health care needs. BEST offered FMCH Programs staff opportunities to engage in non-traditional, cross-sector partnerships, and gain new knowledge and skills to address a pressing social determinant of health. We learned the value of flexible timelines, maintaining a long view for creating change, and challenging the traditional paradigm of maternal and child health.

  12. Information Security Maturity Model

    Information Security Maturity Model

    2011-01-01

    To ensure security, it is important to build-in security in both the planning and the design phases andadapt a security architecture which makes sure that regular and security related tasks, are deployedcorrectly. Security requirements must be linked to the business goals. We identified four domains thataffect security at an organization namely, organization governance, organizational culture, thearchitecture of the systems, and service management. In order to identify and explore the strengt...

  13. 77 FR 6135 - Agency Information Collection Activities: Cargo Manifest/Declaration, Stow Plan, Container Status...

    2012-02-07

    ... Activities: Cargo Manifest/ Declaration, Stow Plan, Container Status Messages and Importer Security Filing... the Paperwork Reduction Act: Cargo Manifest/Declaration, Stow Plan, Container Status Messages and.../Declaration, Stow Plan, Container Status Messages and Importer Security Filing. OMB Number: 1651-0001. Form...

  14. Atypical Manifestations of Hyperthyroidism

    Boxall, E. A.; Lauener, R. W.; McIntosh, H. W.

    1964-01-01

    Patients with hyperthyroidism usually present with symptoms of hypermetabolism with or without goitre and/or eye signs. Occasionally, however, the chief complaints are not immediately suggestive of hyperthyroidism. Patients with hyperthyroidism are described who presented with such atypical manifestations as periodic muscular paralysis, myasthenia, myopathy, encephalopathy, psychosis, angina pectoris, atrial fibrillation, heart failure without underlying heart disease, skeletal demineralization, pretibial myxedema, unilateral eye signs, and pitting edema of the ankles. ImagesFig. 2Fig. 3Fig. 5Fig. 7Fig. 8Fig. 9Fig. 10 PMID:14178405

  15. Radiological manifestations of melioidosis

    Lim, K.S.; Chong, V.H.

    2010-01-01

    Melioidosis is a serious infection that is associated with high mortality. It is due to a Gram-negative bacterium, Burkholderia pseudomallei which is an environmental saprophyte found in wet soils. Melioidosis is endemic to northern Australia and the Southeast Asia. However, there is now increasing number of reports of imported cases to regions where this infection has not been previously encountered. Almost any organ can be affected. Like many other conditions, radiological imaging is an integral part of the diagnostic workup of melioidosis. Awareness of the various radiological manifestations can help direct appropriate investigations to achieve early diagnosis and the initiation of appropriate treatment. Generally, there are no known characteristic features on imaging that can specifically differentiate melioidosis from other infections. However, the 'honeycomb' appearance has been described to be characteristic for large melioidosis liver abscesses. Simultaneous involvement of various organs is also characteristics. To date, there are few data available on the radiological manifestations of melioidosis. The present pictorial essay describes melioidosis affecting the various organs.

  16. Incorporating palaeoclimate data into water security planning and decision making - a case study from southeast Queensland, Australia

    Kiem, Anthony; Vance, Tessa; Tozer, Carly; Roberts, Jason

    2017-04-01

    Regional Stochastic Model (SEQRSM) of catchment hydrology to (a) demonstrate the utility of a palaeoclimate proxy approach in producing more robust estimates of hydroclimatic risk under climate variability and change; (b) gain improved insights into the characteristics (e.g. location, duration, frequency, magnitude, spatial extent, sequencing) of hydroclimate extremes for water security planning and (c) deliver optimised solutions for hydroclimatic risk adaptation strategies to water managers (e.g. optimal and sustainable supply of water to meet current and future urban requirements and also to nearby catchments to support irrigation for dairy, vegetable and forage crops).

  17. [Pulmonary Manifestations of Vasculitis].

    von Vietinghoff, S

    2016-11-01

    The variable symptoms and signs of pulmonary vasculitis are a diagnostic and therapeutic challenge. Vasculitis should be considered in rapidly progressing, severe and unusual manifestations of pulmonary disease. Clinical examination of other organ systems typically affected by vasculitis such as skin and kidney and autoantibody measurements are complementary approaches to manage this situation. Pulmonary involvement is common in small vessel vasculitis including anti-GBM disease (Goodpasture syndrome) and the ANCA-associated vasculitides. Life threatening pulmonary hemorrhage and irreversible damage of other organs, frequently the kidney, are important complications necessitating rapid diagnosis of these conditions.Vasculitides are rare diseases of multiple organs and therapies including biologics are evolving rapidly, requiring cooperation of specialities and with specialized centres to achieve best patient care. All involved physicians should be aware of typical complications of immunosuppressive therapy. © Georg Thieme Verlag KG Stuttgart · New York.

  18. Respiratory manifestations of hypothyroidism

    Sorensen, Jesper Roed; Winther, Kristian Hillert; Bonnema, Steen Joop

    2016-01-01

    BACKGROUND: Hypothyroidism has been associated with increased pulmonary morbidity and overall mortality. We conducted a systematic review to identify the prevalence and underlying mechanisms of respiratory problems among patients with thyroid insufficiency. METHODS: PubMed and EMBASE databases were...... searched for relevant literature from January 1950 through January 2015 with study eligibility criteria: English-language publications; Adult subclinical or overt hypothyroid patients; Intervention, observational or retrospective studies; and respiratory manifestations. We followed the PRISMA statement...... and used the Cochrane's risk of bias tool. RESULTS: A total of 1699 papers were screened by two independent authors for relevant titles. Of 109 relevant abstracts, 28 papers underwent full text analyses, of which 22 were included in the review. We identified possible mechanisms explaining respiratory...

  19. Cardiovascular manifestations of Alkaptonuria.

    Pettit, Stephen J; Fisher, Michael; Gallagher, James A; Ranganath, Lakshminarayan R

    2011-12-01

    The cardiovascular manifestations of alkaptonuria relate to deposition of ochronotic pigment within heart valves, endocardium, aortic intima and coronary arteries. We assessed 16 individuals with alkaptonuria for cardiovascular disease, including full electrocardiographic and echocardiographic assessment. The self reported prevalence of valvular heart disease and coronary artery disease was low. There was a significant burden of previously undiagnosed aortic valve disease, reaching a prevalence of over 40% by the fifth decade of life. The aortic valve disease was found to increase in both prevalence and severity with advancing age. In contrast to previous reports, we did not find a significant burden of mitral valve disease or coronary artery disease. These findings are important for the clinical follow-up of patients with alkaptonuria and suggest a role for echocardiographic surveillance of patients above 40 years old.

  20. Water security and adaptive capacity for climate: Learning lessons from drought decision making in U.S. urban contexts

    Dilling, L.

    2017-12-01

    Cities in the U.S. have been adapting to drought for many years, implementing a combination of mechanisms to cope with climate and water variability and increasing population. Cities are also at the frontline for making decisions about adaptation to climate change. Are decisions made to cope with drought helping cities to build the adaptive capacity necessary for adapting to climate change? We examined this question by conducting interviews with practitioners involved in drought management at urban water utilities across the U.S. to understand responses to drought and perceptions of their effectiveness. We then drew on established criteria for evaluating successful adaptation (effectiveness, efficiency, equity and legitimacy) to analyze whether these drought policies would build adaptive capacity for climate change. We find that drought responses overall are seen as successful in helping cities balance the demand and supply of water, and maintain system reliability as well as improve water awareness, but can have unintended consequences and shift vulnerability in unexpected ways. For example, even though cities are successful at reducing water use when needed, some are concerned with the increasing difficulty of finding new water savings during a future drought. Secondly, water conservation can affect revenue, impacting the ability of cities to plan for maintenance and capital costs. Third, the social acceptability of policy options is critical and depends on perceived fairness and other factors. Water managers are also challenged by "no fail" expectations that make it difficult to experiment. Moreover some measures can shift vulnerability from one risk, such as running out of water, to another risk, such as water becoming too expensive, lowering quality, or not meeting other key infrastructure design requirements. These findings demonstrate that adaptation measures that seek to reduce exposure to water scarcity can impact aspects of adaptive capacity, and shift

  1. Securing the Vista Environment

    Gregory, Peter

    2007-01-01

    "Securing the Vista Environment" takes you on a quick tour of the most significant security features in Vista, Microsoft's first revision of Windows in almost six years. You'll get background on threats and vulnerabilities that will make you think differently about security. Security is more than just the technology and configurations--it's about how we use the system that makes it secure or not. Then we'll cover Vista's security features, from user privileges to Windows Defender, User Account Control, and BitLocker, as well as strategies for protecting your information from unwanted disclo

  2. Digital security technology simplified.

    Scaglione, Bernard J

    2007-01-01

    Digital security technology is making great strides in replacing analog and other traditional security systems including CCTV card access, personal identification and alarm monitoring applications. Like any new technology, the author says, it is important to understand its benefits and limitations before purchasing and installing, to ensure its proper operation and effectiveness. This article is a primer for security directors on how digital technology works. It provides an understanding of the key components which make up the foundation for digital security systems, focusing on three key aspects of the digital security world: the security network, IP cameras and IP recorders.

  3. The corporate security professional

    Petersen, Karen Lund

    2013-01-01

    In our age of globalization and complex threat environments, every business is called upon to manage security. This tendency is reflected in the fact that a wide range of businesses increasingly think about security in broad terms and strive to translate national security concerns into corporate...... speech. This article argues that the profession of the security manager has become central for understanding how the relationship between national and corporate security is currently negotiated. The national security background of most private sector security managers makes the corporate security...... professional inside the company a powerful hybrid agent. By zooming in on the profession and the practice of national security inside companies, the article raises questions about where to draw the line between corporate security and national security along with the political consequences of the constitution...

  4. CT manifestation of hepatic toxoplasmosis

    Mao Qing; Yang Yaying; Bao Yanming; He Bo; Wang Kechao; Song Guangyi; Lu Lin; Wang Xiaoli

    2005-01-01

    Objective: To study the CT manifestation of hepatic toxoplasmosis, and to provide image basis for its clinical diagnosis. Methods: Three patients with hepatic toxoplasmosis were examined by abdomen MSCT (pre- and post-contrast), and were confirmed by laboratory exams. The images were analyzed with information of clinical manifestation. Results: The positive appearances included the enlargement of liver, patches of multiple scattered low densities. Post-contrast lesions appearances: (1) No significant enhancement. (2) No significant occupying effection, and normal vessels inserting lesion occasionally. Conclusion: CT manifestation of hepar toxoplasmosis are some characteristic. But the diagnosis was made by a combination both clinical manifestation and laboratory exams. (authors)

  5. Quantum secure communication models comparison

    Georgi Petrov Bebrov

    2017-12-01

    Full Text Available The paper concerns the quantum cryptography, more specifically, the quantum secure communication type of schemes. The main focus here is on making a comparison between the distinct secure quantum communication models – quantum secure direct communication and deterministic secure quantum communication, in terms of three parameters: resource efficiency, eavesdropping check efficiency, and security (degree of preserving the confidentiality.

  6. Endocrine manifestations of celiac disease

    R Philip

    2012-01-01

    Full Text Available Background: Celiac disease can have extra gastrointestinal tract (GIT presentations, most of which are endocrine. The aim of this study was to present patients diagnosed to have celiac disease from an endocrine department and to study the prevalence of endocrinopathies in celiac disease. Materials and Methods: A total of 36 patients from the endocrinology department (LLRM Medical College, Meerut between January 2011 and July 2012 and who were diagnosed to have celiac disease were included in the study. Results: Short stature was the commonest presentation (25%, other presentations included short stature and delayed puberty (20%, delayed puberty (11%, screening for celiac disease in type-1 DM patients (17%, rickets (6%, anemia not responding to oral therapy (6%, type-1 DM with recurrent hypoglycaemia (6%, and osteomalacia (3%. The endocrine manifestations include (after complete evaluation short stature (58%, delayed puberty (31%, elevated alkaline phospahatase (67%, low calcium (22%, X-rays suggestive of osteomalacia or rickets (8%, capopedal spasm (6%, and night blindness (6%. Anti-TPO antibody positivity was found in 53%, hypothyroidism in 28%, subclinical hypothyroidism in 17%, and type-1 DM in 25% of the patients. A total of 14% patients had no GI symptoms. Conclusion: Celiac disease is an endocrine disrupter as well as the great masquerader having varied presentations including short stature, delayed puberty, and rickets. Some patients who have celiac disease may not have any GI symptoms, making the diagnosis all the more difficult. Also, there is significant incidence of celiac disease with hypothyroidism and type-1 DM, making screening for it important in these diseases.

  7. Neuropsychiatric manifestations of scrub typhus

    Sanjay K Mahajan

    2017-01-01

    Full Text Available Scrub typhus is caused by Orientia tsutsugamushi characterized by focal or disseminated vasculitis and perivasculitis which may involve the lungs, heart, liver, spleen and central nervous system. It was thought to have been eradicated from India. Recently it is being reported from many areas of India. The clinical picture and severity of the symptoms varies widely. The neurological manifestations of scrub typhus are not uncommon but are diverse. Meningoencephalitis is classical manifestation of scrub typhus but cerebellitis, cranial nerve palsies, plexopathy, transverse myelitis, neuroleptic malignant syndrome and Guillan-Barré syndrome are other manifestations reported in literature. The availability of literature on the neurological manifestations of scrub typhus is limited to case reports mainly. This article reviews various neurological manifestations of scrub typhus reported in literature.

  8. Gastrointestinal Manifestations of Cystic Fibrosis

    2016-01-01

    Cystic fibrosis has historically been considered a pulmonary disease, but with the increasing life expectancy of these patients, gastrointestinal manifestations are becoming more important. Furthermore, nutritional status is closely linked to pulmonary function and, thus, overall mortality. This article discusses gastrointestinal manifestations (which involve nutritional, pancreatic, hepatobiliary, and, in particular, gastrointestinal tract issues) of cystic fibrosis as well as management of the disease. In addition, the article discusses studies that have been critical to our understanding of gastrointestinal manifestations of cystic fibrosis. PMID:27330503

  9. DIRAC Security

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  10. Skin Manifestations of Endocrine Diseases.

    Demirkesen, Cuyan

    2015-01-01

    Endocrine diseases may result in changes in cutaneous function and morphology, which cause various skin manifestations, including nonspecific or pathognomonic signs. Some of these manifestations are already known dermatologic diseases with only increased frequency in this patient group. As a result the skin may the play role of a screen displaying endocrine disorders, either due to hormone excess or deficiency. Awareness of the skin manifestations may permit prompt and adequate approach to the patients, and therefore facilitate the early diagnosis of the endocrine disease and even be life saving. Some of these manifestations may be recognized clinically, but sometimes they need to be confirmed histopathologically. In this article, many endocrine diseases and their associated skin lesions will be reviewed briefly.

  11. The radiographic manifestations of hypochondroplasia

    Heselson, N.G.; Cremin, B.J.; Beighton, P.

    1979-01-01

    Hypochrondroplasia is an inherited skeletal dysplasia that resembles achondroplasia in mild degree. Radiographic manifestations encountered in 12 affected individuals in South Africa include slight shortening of all segments of the tubular bones, moderate caudal diminution of the lumbar interpedicular distances, increased lumbar lordosis with cacral tilt and distal prolongation of the fibular. Hypochondroplasia can be distinguished from other osteochondrodystrophies such as achondroplasia, pseudo-achondroplasia and metaphyseal chondroplasia by the recognition of it clinical and radiographic manifestations. (author)

  12. Microsoft Windows Server 2003: Security Enhancements and New Features

    Montehermoso, Ronald

    2004-01-01

    .... Windows NT and Windows 2000 were known to have numerous security vulnerabilities; hence Microsoft focused on improving security by making Windows Server 2003 secure by design, secure by default, secure in deployment...

  13. RECIPROCITY PRINCIPLE AS THE FOUNDATION FOR SOCIAL ECONOMY MANIFESTATION

    GRAȚIELA MIHAELA FERARU

    2017-12-01

    Full Text Available Social economy appears as a bilateral impulse that gathers potential customers and professionals who secure the demand and the supply for services. Therefore, needs turn from individual to collective and allow the persons involved to identify new needs and to respond to them by mobilizing public or voluntary resources. A social enterprise interacts both with market and public sector when operating in complex areas where the state is involved. Once established, they tend to form a hybrid economic model in which the commercial activities (self-financed by selling goods or performing services, non-market but monetary (public financing, donations from churches and foundations and non-market ones (voluntary work of its members or others combine. The ability to gather various forms of economic activity in an entrepreneurial framework as well as the ability to engage customers and service performers in a democratic decision making process, based on reciprocity principle, offers a regulatory role to social economy. Reciprocity as an economic principle ensures the main instrument to distinguish what is essential and constant regarding social economy from what is secondary and transitory. Reciprocity enables the manifestation of the practices and economic resources mobilization forms with the scope of satisfying human needs that do not belong to profit seeking organizations nor to the public institutions.

  14. The Manifestation of Corruption in Eastern Europe

    Viacheslav Hladky

    2018-01-01

    Full Text Available The purpose of this article is to identify the main manifestations of corruption in the states of Eastern Europe, and, first of all, in Ukraine, which since 2014 has been actively carrying out multiple anti-corruption transformations, although the state is becoming increasingly corrupt every year. The author defines the main groups of manifestations of corruption and analyzes their constituent elements, in the light of which, delineates such categories as "gratitude", bribe, and corruption "gratitude". Particular attention is paid to the study of corruption intercession, which unites nepotism, cronyism and corruption lobbying. It is noted that to date nepotism is essentially supplanted by the rabble, which is the advantage of "privatization" of the state in the light of the clan capitalism. It is concluded that bribery and deviant intercession (corruption protection, as the main manifestations of corruption, the facts that corruption behavior is life-affirming security and protective actions of people, to which they resort, on the one hand, because of the insolvency of the state and society, but, on the other hand, to optimize the achievement of the good that is provided by the state and society, however, in an improper way. Meanwhile, if the discrepancy measures and methods of granting the benefits of state benefits (i.e., on average, the measure and method is applicable, then ignoring the state provision of certain goods as such (i.e., they can be provided only in the corruption plane - this phenomenon is completely objective. On this basis, it is argued that the policy of counteracting corrupt practices in the state should focus, first of all, on the solution of such problems and objective problems, the refusal to account, which will lead to further criminalization of the society, which is observed, in particular, in modern Ukraine.

  15. Clinical manifestations of scrub typhus.

    Rajapakse, Senaka; Weeratunga, Praveen; Sivayoganathan, Sriharan; Fernando, Sumadhya Deepika

    2017-02-01

    The mite-borne rickettsial zoonosis scrub typhus is widely prevalent in parts of Southeast and Far East Asia, and northern Australia. The disease is an acute febrile illness, associated with rash and often an eschar, which responds dramatically to treatment with antibiotics. In some cases it results in a serious illness leading to multiple organ involvement and death. The disease manifestations are thought to result from a systemic vasculitis, caused by both direct effects of the organisms as well as an exaggerated immune response, although little is understood about its pathogenesis. A wide spectrum of clinical manifestations, affecting nearly every organ system, have been described with scrub typhus. Some of these manifestations are serious and life threatening. In this systematic review, we summarise the typical and atypical manifestations of scrub typhus reported in the literature. Awareness of these unusual manifestations will hopefully guide clinicians towards diagnosing the condition early, and initiating early appropriate antibiotics and other supportive measures. © The Author 2017. Published by Oxford University Press on behalf of Royal Society of Tropical Medicine and Hygiene. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  16. Alternative security

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  17. Homeland Security

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  18. Cutaneous manifestations of primary immunodeficiency

    Safa Abdelhakim

    2017-01-01

    Full Text Available Primary immunodeficiency diseases (PIDs are a group of rare, chronic disorders with deficient or malfunctioning immune system. It commonly affects the hematopoietic system, with skin the second most affected organ. Skin involvement is observed in half of pediatric PID cases and often precedes the final diagnosis. Skin infections and eczemas are the two most common manifestations in PID.[1] Skin manifestations associated with PIDs can be of infectious and noninfectious causes. Common noninfectious causes are eczema, erythroderma, cutaneous granulomas, dysplasia, vasculitis, and telangiectasia. It is important to be aware of skin manifestations in pediatric patients as early detection of PID may aid in the management of serious immunologic conditions and prevent associated morbidity and mortality.

  19. Quantum manifestations of Nekhoroshev stability

    Fontanari, Daniele, E-mail: fontanari@purple.univ-littoral.fr [Département de physique, Université du Littoral – Côte d' Opale, 59140 Dunkerque (France); Fassò, Francesco, E-mail: fasso@math.unipd.it [Università di Padova, Dipartimento di Matematica, Via Trieste 63, Padova 35121 (Italy); Sadovskií, Dmitrií A., E-mail: sadovski@univ-littoral.fr [Département de physique, Université du Littoral – Côte d' Opale, 59140 Dunkerque (France)

    2016-09-16

    We uncover quantum manifestations of classical Nekhoroshev theory of resonant dynamics using a simple quantum system of two coupled angular momenta with conserved equal magnitudes which corresponds to a perturbed classical integrable anisochronous Hamiltonian system. - Highlights: • Basic quantum manifestations of classical Nekhoroshev theory are studied. • A simple anisochronous convex system with two degrees of freedom is proposed. • Zones are uncovered in the joint expectation value spectrum of quantized actions. • The width of the zones is given by the Nekhoroshev resonant normal forms.

  20. Security Dilemma

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  1. Nuclear security

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected

  2. Mucocutaneous manifestations of Cowden's syndrome

    Kundoor Vinay Kumar Reddy

    2016-01-01

    Full Text Available Cowden's syndrome is an autosomal dominant genodermatosis with variable orofacial and systemic manifestations. Here we present one such classical case of Cowden's syndrome in a 45-year-old female patient with features such as multiple cutaneous papillomatosis, oral fibromas, and fibromas involving multiple organs such as gastrointestinal tract (multiple polyps, thyroid disorders, and breast cancer.

  3. OCULAR MANIFESTATIONS OF HEAD INJURIES

    Kanukollu Venkata Madusudana Rao

    2016-12-01

    Full Text Available BACKGROUND This prospective study aimed to evaluate the incidence of ocular manifestations in head injury and their correlation with the intracranial lesions. MATERIALS AND METHODS A total of 108 consecutive cases of closed head injury admitted in the neurosurgical ward of a tertiary teaching hospital underwent a thorough ophthalmic assessment. Clinical examination, radiological imaging and Glasgow Coma Scale (GCS were applied to grade the severity of injury. RESULTS Total number of 108 patients of head injury were examined of which 38 patients had ocular manifestations (35.18%. Of these, 85.18% were males, 84% of injuries were due to road traffic accidents and 16% were due to fall from a height. The ocular manifestations were as follows- Orbital complications were seen in 6 patients (15.8%. Anterior segment manifestations included black eyes seen in 10 patients (26.3%, subconjunctival haemorrhage in 10.5% of patients (4 patients, corneal involvement in 21% of patients (8 patients and pupillary involvement in 50% of patients (19 patients. Posterior segment manifestations were seen in 26.3% of patients (10 patients and were as follows- Purtscher’s retinopathy in 2 patients and optic atrophy in 5 patients. Cranial nerve palsies were seen in 15 patients (39.47% and supranuclear movement disorders were seen in 3 patients (8%. CONCLUSION Even though, neurosurgeons perform comprehensive clinical examination including eye examination, the main purpose is limited to aid topical diagnosis of neurological lesions. This study emphasises the importance of a detailed eye examination by an ophthalmologist to prevent irreversible visual loss in addition to aiding in the neurological diagnosis. Pupillary involvement, papilloedema and ocular motor paresis pointed to a more severe head injury. This observational prospective study helped us to correlate the severity of head injuries in association with ocular findings in patients admitted in neurosurgical ward

  4. TRANSNATIONAL ORGANIZED CRIME. AN (INTERNATIONAL SECURITY PERSPECTIVE

    Ionel Stoica

    2016-10-01

    Full Text Available For the past two decades organized crime has become a transnational phenomenon, and its impact is still far from being fully known and understood by common people. Its forms of manifestation, whether explicit, or subtle, are permanently evolving and adapting. As a result, its interference with the activities from the legal area makes it difficult to identify and counteract. After a long period of time when it was more a peripheral phenomenon, current transnational organized crime tends to become a major danger to the political, social and economic stability of the states. Through its nature and goals, as well as through the complexity of its forms of manifestation, transnational organized crime represents a major challenge for the state and nonstate organizations that deal with national and international security This paper focuses on the phenomenon starting from some of the most influent theories in international relations, presents the current features of transnational organized criminal groups and analyzes the causes and the favoring factors of the phenomenon, as well as the impact of the phenomenon upon national and international security at political, economic-financial and military level. The approach is an interdisciplinary one and also covers the nexus between transnational organized crime and international terrorism.

  5. Information Security

    2005-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is trusted to actually handle an asset. Two concepts complement authorisation. Authentication deter-mines who makes a request to handle an asset. To decide who is authorised, a system needs to au-the...

  6. Securing collaborative environments

    Agarwal, Deborah [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Jackson, Keith [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Thompson, Mary [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2002-05-16

    The diverse set of organizations and software components involved in a typical collaboratory make providing a seamless security solution difficult. In addition, the users need support for a broad range of frequency and locations for access to the collaboratory. A collaboratory security solution needs to be robust enough to ensure that valid participants are not denied access because of its failure. There are many tools that can be applied to the task of securing collaborative environments and these include public key infrastructure, secure sockets layer, Kerberos, virtual and real private networks, grid security infrastructure, and username/password. A combination of these mechanisms can provide effective secure collaboration capabilities. In this paper, we discuss the requirements of typical collaboratories and some proposals for applying various security mechanisms to collaborative environments.

  7. Introduction to Hardware Security

    Yier Jin

    2015-10-01

    Full Text Available Hardware security has become a hot topic recently with more and more researchers from related research domains joining this area. However, the understanding of hardware security is often mixed with cybersecurity and cryptography, especially cryptographic hardware. For the same reason, the research scope of hardware security has never been clearly defined. To help researchers who have recently joined in this area better understand the challenges and tasks within the hardware security domain and to help both academia and industry investigate countermeasures and solutions to solve hardware security problems, we will introduce the key concepts of hardware security as well as its relations to related research topics in this survey paper. Emerging hardware security topics will also be clearly depicted through which the future trend will be elaborated, making this survey paper a good reference for the continuing research efforts in this area.

  8. Breast manifestations of systemic diseases

    Dilaveri CA

    2012-02-01

    Full Text Available Christina A Dilaveri, Maire Brid Mac Bride, Nicole P Sandhu, Lonzetta Neal, Karthik Ghosh, Dietlind L Wahner-RoedlerDivision of General Internal Medicine, Mayo Clinic, Rochester, MN, USAAbstract: Although much emphasis has been placed on the primary presentations of breast cancer, little focus has been placed on how systemic illnesses may affect the breast. In this article, we discuss systemic illnesses that can manifest in the breast. We summarize the clinical features, imaging, histopathology, and treatment recommendations for endocrine, vascular, systemic inflammatory, infectious, and hematologic diseases, as well as for the extramammary malignancies that can present in the breast. Despite the rarity of these manifestations of systemic disease, knowledge of these conditions is critical to the appropriate evaluation and treatment of patients presenting with breast symptoms.Keywords: breast, endocrine, hematologic, infectious, vascular

  9. Unusual clinical manifestations of leptospirosis

    Bal A

    2005-01-01

    Full Text Available Leptospirosis has protean clinical manifestations. The classical presentation of the disease is an acute biphasic febrile illness with or without jaundice. Unusual clinical manifestations may result from involvement of pulmonary, cardiovascular, neural, gastrointestinal, ocular and other systems. Immunological phenomena secondary to antigenic mimicry may also be an important component of many clinical features and may be responsible for reactive arthritis. Leptospirosis in early pregnancy may lead to fetal loss. There are a few reports of leptospirosis in HIV- infected individuals but no generalisation can be made due to paucity of data. It is important to bear in mind that leptospiral illness may be a significant component in cases of dual infections or in simultaneous infections with more than two pathogens.

  10. Otolaryngic manifestations of Cushing disease.

    Kuan, Edward C; Peng, Kevin A; Suh, Jeffrey D; Bergsneider, Marvin; Wang, Marilene B

    2017-08-01

    Cushing disease is a relatively rare cause of Cushing syndrome secondary to a hyperfunctioning pituitary adenoma. In addition to signs and symptoms of hypercortisolism, Cushing disease may present with diverse otolaryngic manifestations, which may guide diagnosis and management. We performed a retrospective chart review of patients who were found to have Cushing disease and who underwent transnasal transsphenoidal surgery for pituitary adenomas between January 1, 2007, and July 1, 2014, at a tertiary academic medical center. There were 37 consecutive patients in this series with Cushing disease caused by a pituitary adenoma. Fifteen (41%) patients complained of visual changes. Five (14%) patients suffered from obstructive sleep apnea. Four (11%) patients had thyroid disease. Other symptoms included hearing loss, vertigo, tinnitus, epistaxis, dysphagia, and salivary gland swelling. Although Cushing disease traditionally presents with classic "Cushingoid" systemic features, it also may present with various otolaryngic manifestations. A thorough workup by otolaryngologists is critical in the comprehensive management of these patients.

  11. Respiratory manifestations in endocrine diseases

    LENCU, CODRU?A; ALEXESCU, TEODORA; PETRULEA, MIRELA; LENCU, MONICA

    2016-01-01

    The control mechanisms of respiration as a vital function are complex: voluntary ? cortical, and involuntary ? metabolic, neural, emotional and endocrine. Hormones and hypothalamic neuropeptides (that act as neurotrasmitters and neuromodulators in the central nervous system) play a role in the regulation of respiration and in bronchopulmonary morphology. This article presents respiratory manifestations in adult endocrine diseases that evolve with hormone deficit or hypersecretion. In hyperthy...

  12. Network Security Is Manageable

    Roberts, Gary

    2006-01-01

    An effective systems librarian must understand security vulnerabilities and be proactive in preventing problems. Specifics of future attacks or security challenges cannot possibly be anticipated, but this paper suggests some simple measures that can be taken to make attacks less likely to occur: program the operating system to get automatic…

  13. Otorhinolaryngology manifestations secondary to oral sex.

    Fernández-López, Claudia; Morales-Angulo, Carmelo

    Over the last few years, oral and pharyngeal signs and symptoms due to oral sex have increased significantly. However, no review articles related to this subject have been found in the medical literature. The objective of our study was to identify otorhinolaryngological manifestations associated with orogenital/oroanal contact, both in adults and children, in the context of consensual sex or sexual abuse. We performed a review of the medical literature on otorhinolaryngological pathology associated with oral sex published in the last 20 years in the PubMed database. Otorhinolaryngological manifestations secondary to oral sex practice in adults can be infectious, tumoral or secondary to trauma. The more common signs and symptoms found in the literature were human papillomavirus infection (above all, condyloma acuminata and papilloma/condyloma), oral or pharyngeal syphilis, gonococcal pharyngitis, herpes simplex virus infection and pharyngitis from Chlamydia trachomatis. The incidence of human papillomavirus -induced oropharyngeal carcinoma has dramatically increased. In children past the neonatal period, the presence of condyloma acuminatus, syphilis, gonorrhoea or palatal ecchymosis (the last one, unless justified by other causes) should make us suspect sexual abuse. Sexual habits have changed in the last decades, resulting in the appearance of otorhinolaryngological pathology that was rarely seen previously. For this reason, it is important for primary care physicians to have knowledge about the subject to perform correct diagnosis and posterior treatment. Some sexual abuse cases in children may also be suspected based on the knowledge of the characteristic oropharyngeal manifestations secondary to them. Copyright © 2016 Elsevier España, S.L.U. and Sociedad Española de Otorrinolaringología y Cirugía de Cabeza y Cuello. All rights reserved.

  14. Thoracic manifestation of tuberculosis; Thorakale Manifestation der Tuberkulose

    Kienzl-Palma, D.; Prosch, H. [Medizinische Universitaet Wien, Abteilung fuer Allgemeine Radiologie und Kinderradiologie, Universitaetsklinik fuer Radiologie und Nuklearmedizin, Wien (Austria)

    2016-10-15

    Tuberculosis (TB) is a granulomatous disease caused by Mycobacterium tuberculosis and transmission is via an airborne route by droplet infection. In the majority of cases patients have thoracic TB, which most frequently presents with hilar lymphadenopathy and pulmonary manifestation. Due to the rise in incidence of TB in central Europe to be expected over the coming years, it is essential to be acquainted with the radiological manifestations of pulmonary TB, particularly to be able to discriminate active from inactive TB. Due to the use of molecular techniques entailing DNA fingerprinting, the traditional classification of TB in primary and postprimary TB is being challenged. These genetic studies have revealed that variations in the clinical and radiographic appearance of TB are mainly affected by the immune status of the patients. Due to the low prevalence of TB in central Europe and the wide variation of radiological presentations, the diagnosis and therapy of TB is often delayed. In this article, the radiographic manifestations of thoracic TB are summarized and discussed. Together with the medical history and bacteriological tests, chest X-ray imaging and computed tomography (CT) play a major role not only in the detection of TB but also in the follow-up during and after therapy. Chest X-radiographs should be the primary diagnostic method in patients with suspected TB in screening as well as for diagnosis and therapy monitoring. The use of CT is more sensitive than chest radiographs and is frequently performed after chest radiographs to obtain detailed information about subtle parenchymal changes or lymph node manifestation. When active TB is suspected CT should be performed. Tree in bud, lobular consolidations, centrilobular nodules, cavities and ground-glass opacification are typical changes in active TB. (orig.) [German] Tuberkulose (Tbc) ist eine durch Troepfchen uebertragene granulomatoese Infektionserkrankung, die durch das Mycobacterium tuberculosis

  15. Social Networks for Surveillance and Security: ‘Using Online Techniques to make something happen in the real or cyber world’

    Harbisher, Ben

    2017-01-01

    This chapter examines the use of Social Networks for Surveillance and Security in relation to the deployment of intelligence resources in the UK. The chapter documents the rise of Military Intelligence agencies during both World Wars (such as GCHQ and MI5), and the subsequent use of these institutions to maintain order during peacetime. In addition to the way in which military organisations have used clandestine techniques such as double agents, spies, and various programmes designed for cond...

  16. Gastrointestinal manifestation's history in the systemic lupus erythematosus

    Iglesias Gamarra, Antonio; Chalem, Philippe; Restrepo Suarez, Jose Felix

    2000-01-01

    In this paper we reviewed the history of the gastrointestinal manifestations in systemic lupus erythematosus since century XIX to our days, making a review of every organ and system involved, with special emphasis in gastropathy, enteritis, ileitis, malabsorption syndrome vasculitis bowel vasculopathy, mesenteric thrombosis, pancreatitis, ascites, peritonitis autoimmune hepatitis and more

  17. Statistical security for Social Security.

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  18. Water security evaluation in Yellow River basin

    Jiang, Guiqin; He, Liyuan; Jing, Juan

    2018-03-01

    Water security is an important basis for making water security protection strategy, which concerns regional economic and social sustainable development. In this paper, watershed water security evaluation index system including 3 levels of 5 criterion layers (water resources security, water ecological security and water environment security, water disasters prevention and control security and social economic security) and 24 indicators were constructed. The entropy weight method was used to determine the weights of the indexes in the system. The water security index of 2000, 2005, 2010 and 2015 in Yellow River basin were calculated by linear weighting method based on the relative data. Results show that the water security conditions continue to improve in Yellow River basin but still in a basic security state. There is still a long way to enhance the water security in Yellow River basin, especially the water prevention and control security, the water ecological security and water environment security need to be promoted vigorously.

  19. Zeolitization at uranium ore manifestation

    Petrosyan, R.V.; Buntikova, A.F.

    1981-01-01

    The process of zeolitization at uranium ore manifestation is studied. A specific type of low-temperature wall endogenous alteration of rocks due to the effect of primary acid solution with low content of carbonic acid is established. Leaching of calcium from enclosing rocks and its deposition in ore-accompanying calcium zeolites is a characteristic feature of wall-metasomatosis. Formation of desmin- calcite-laumontite and quartz-fluoroapatite of vein associations, including ore minerals (uranophane and metaotenite), is genetically connected with calcium metasomatosis. On the basis of the connection of ore minerals with endogeneous process of zeolitization a conclusion can be made on endogenous origin of uranophane and metaotenite [ru

  20. [Corneal manifestations in systemic diseases].

    Zarranz Ventura, J; De Nova, E; Moreno-Montañés, J

    2008-01-01

    Systemic diseases affecting the cornea have a wide range of manifestations. The detailed study of all pathologies that cause corneal alteration is unapproachable, so we have centered our interest in the most prevalent or characteristic of them. In this paper we have divided these pathologies in sections to facilitate their study. Pulmonar and conective tissue (like colagen, rheumatologic and idiopathic inflamatory diseases), dermatologic, cardiovascular, hematologic, digestive and hepatopancreatic diseases with corneal alteration are described. Endocrine and metabolic diseases, malnutrition and carential states are also studied, as well as some otorhinolaryngologic and genetic diseases that affect the cornea. Finally, a brief report of ocular toxicity induced by drugs is referred.

  1. Liver manifestations of cystic fibrosis

    Akata, Deniz; Akhan, Okan

    2007-01-01

    Chronic liver disease is one of the major complications of cystic fibrosis (CF). Significant liver disease is seen in 13-25% of children with CF. Improved life expectancy and prolonged follow-up have favored better characterization of the hepatic manifestations of CF and allowed direct observation of an increasing number of liver-related events. Liver disease typically develops in the first decade of life, with the incidence dropping rapidly after the age of 10 years. The wide spectrum of liver disease ranging from asymptomatic gallbladder abnormalities to biliary cirrhosis will be reviewed in this article

  2. Neurological Manifestations of Dengue Infection

    Guo-Hong Li

    2017-10-01

    Full Text Available Dengue counts among the most commonly encountered arboviral diseases, representing the fastest spreading tropical illness in the world. It is prevalent in 128 countries, and each year >2.5 billion people are at risk of dengue virus infection worldwide. Neurological signs of dengue infection are increasingly reported. In this review, the main neurological complications of dengue virus infection, such as central nervous system (CNS, peripheral nervous system, and ophthalmic complications were discussed according to clinical features, treatment and possible pathogenesis. In addition, neurological complications in children were assessed due to their atypical clinical features. Finally, dengue infection and Japanese encephalitis were compared for pathogenesis and main clinical manifestations.

  3. Neurological manifestation of colonic adenocarcinoma

    Uzair Chaudhary

    2012-04-01

    Full Text Available Paraneoplastic neurologic disorders are extremely rare in cancer patients and are most commonly associated with certain tumors, such as ovarian cancer, small cell lung cancer, and breast cancer. We report here a paraneoplastic neurological syndrome in a 53-year-old man with colonic adenocarcinoma with a solitary liver metastasis. His paraneoplastic syndrome was successfully treated by methylprednisolone and primary oncologic therapies including neoadjuvant chemotherapy and definitive surgery. This is also the first documented case of simultaneous manifestation of a sensory neuropathy and limbic encephalitis with colon cancer.

  4. Power supply - HVDC and facts make it sustainable and secure; Stromversorgung - nachhaltig und sicher mit HGUeund Facts. Grid Access fuer ''gruene Energie''

    Uecker, Karl; Retzmann, Dietmar [Siemens AG, Erlangen (Germany). HVDC/Facts Sales and Marketing; Schultze, Alberto [Siemens AG, Erlangen (Germany). Abt. Grid Access and Industry

    2010-09-06

    Due to the global climate change, the power industry has a lot of changes in store. For reasons of environmental protection, the reduction in CO{sub 2} emissions in power generation and loss minimization in power transmission are of particular importance. This means that the share of wind power in a lot of countries, Germany among them, must be as high as possible, for the other ''green'' energy resources, such as hydro or solar power, play only a subordinate part for reasons of their geographical location. Along with sustainability and efficiency of power supply, grid security must be taken into account as well. (orig.)

  5. Ultrasound manifestation of hepatocellular carcinoma

    Hwang, M S; Yoo, H S; Park, C Y; Choi, H J; Moon, Y M; Lee, S I [Yonsei University College of Medicine, Seoul (Korea, Republic of)

    1982-06-15

    With the advent of gray scale ultrasonographic equipment, the parenchymal disease of liver is more easily evaluated. Ultrasonography is a non-invasive technique, different from angiography, and performed without discomfort to patient. And also ultrasonography can be used in assessing the liver in cases showing equivocal scintigraphy and in differentiation of solid and cystic masses, first detected on scintigrams. Therefore, the complementary use of ultrasonography, Tc-99m-sulfur colloid scan and angiography provides better diagnostic accuracy for the detection of hepatocellular carcinoma, and moreover, sequential ultrasonographic studies in the same patient are valuable of following the course of hepatocellular carcinoma and monitoring the effectiveness of therapy for hepatocellular carcinoma. In thirty patients with histologically proven hepatocellular carcinoma, an analysis of ultrasound manifestation is made and the results are as follows; 1. Ultrasound manifestation of hepatocellular carcinoma by gray scale showed four different sonographic patterns including discrete echo free, discrete echogenic, ill defined echogenic and mixed patterns. 2. The size of hepatocellular carcinoma by ultrasonographic measurement was larger than 5 cm in diameter in 28 cases. 3. In 7 cases performed with angiography, all echogenicities of hepatocellualr carcinoma were correlated with the findings of vascularity of angiography. 4. In cases combined with liver cirrhosis, the sonographic pattern of hepatocellular carcinoma appeared to be discrete or ill defined echogenic patterns.

  6. Ultrasound manifestation of hepatocellular carcinoma

    Hwang, M. S.; Yoo, H. S.; Park, C. Y.; Choi, H. J.; Moon, Y. M.; Lee, S. I.

    1982-01-01

    With the advent of gray scale ultrasonographic equipment, the parenchymal disease of liver is more easily evaluated. Ultrasonography is a non-invasive technique, different from angiography, and performed without discomfort to patient. And also ultrasonography can be used in assessing the liver in cases showing equivocal scintigraphy and in differentiation of solid and cystic masses, first detected on scintigrams. Therefore, the complementary use of ultrasonography, Tc-99m-sulfur colloid scan and angiography provides better diagnostic accuracy for the detection of hepatocellular carcinoma, and moreover, sequential ultrasonographic studies in the same patient are valuable of following the course of hepatocellular carcinoma and monitoring the effectiveness of therapy for hepatocellular carcinoma. In thirty patients with histologically proven hepatocellular carcinoma, an analysis of ultrasound manifestation is made and the results are as follows; 1. Ultrasound manifestation of hepatocellular carcinoma by gray scale showed four different sonographic patterns including discrete echo free, discrete echogenic, ill defined echogenic and mixed patterns. 2. The size of hepatocellular carcinoma by ultrasonographic measurement was larger than 5 cm in diameter in 28 cases. 3. In 7 cases performed with angiography, all echogenicities of hepatocellualr carcinoma were correlated with the findings of vascularity of angiography. 4. In cases combined with liver cirrhosis, the sonographic pattern of hepatocellular carcinoma appeared to be discrete or ill defined echogenic patterns

  7. Atypical Manifestation of Vestibular Schwannoma

    Webster, Guilherme

    2013-09-01

    Full Text Available Introduction: Vestibular schwannoma (also known as acoustic neuroma is a benign tumor whose cells are derived from Schwann sheaths, which commonly occurs from the vestibular portion of the eighth cranial nerve. Furthermore, vestibular schwannomas account for ∼8% of intracranial tumors in adults and 80 to 90% of tumors of the cerebellopontine angle. Its symptoms are varied, but what stands out most is a unilateral sensorineural hearing loss, with a low index of speech recognition. Objective: Describe an atypical manifestation of vestibular schwannoma. Case Report: The 46-year-old woman had vertigo and binaural hearing loss and fullness, with ear, nose, and throat examination suggestive of cochlear injury. After 6 months, the patient developed worsening of symptoms and onset of right unilateral tinnitus. In further exams the signs of cochlear damage remained, except for the vestibular test (hyporeflexia. Magnetic resonance imaging showed an expansive lesion in the right cerebellopontine angle. Discussion: This report warns about the atypical manifestations of vestibular schwannoma, which must always be remembered in investigating and diagnosing hearing loss.

  8. Securing the Cloud Cloud Computer Security Techniques and Tactics

    Winkler, Vic (JR)

    2011-01-01

    As companies turn to cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you know how to handle it. Securing the Cloud discusses making the move to the cloud while securing your peice of it! The cloud offers felxibility, adaptability, scalability, and in the case of security-resilience. This book details the strengths and weaknesses of securing your company's information with different cloud approaches. Attacks can focus on your infrastructure, communications network, data, o

  9. Materialism and food security.

    Allen, M W; Wilson, M

    2005-12-01

    The present studies examined if materialists have an elevated concern about food availability, presumably stemming from a general survival security motivation. Study 1 found that materialists set a greater life goal of food security, and reported more food insecurity during their childhood. Materialists reported less present-day food insecurity. Study 2 revealed that materialists stored/hoarded more food at home, and that obese persons endorsed materialism more than low/normal weight persons. Study 3 found that experimentally decreasing participants' feelings of survival security (via a mortality salience manipulation) led to greater endorsement of materialism, food security as goal, and using food for emotional comfort. The results imply that materialists overcame the food insecurity of their childhood by making food security a top life goal, but that materialists' current concerns about food security may not wholly stem from genuine threats to their food supply.

  10. 19 CFR 122.75a - Electronic manifest requirement for passengers onboard commercial aircraft departing from the...

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Electronic manifest requirement for passengers.... CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Documents Required for Clearance and Permission To Depart; Electronic Manifest Requirements for...

  11. Chronic myeloproliferative disorders: A rarest case with oral manifestations and dental management

    Pritesh B Ruparelia

    2012-01-01

    Full Text Available Chronic myeloproliferative disorders (CMPD are rarest hematological disorders (malignant myeloid neoplasms. The three most common chronic myeloproliferative disorders are polycythemia vera, essential thrombocythemia and chronic idiopathic myelofibrosis. Clinical manifestations (including oral manifestations of these disorders are overlapping with each other and with other hematologic disorders, which makes the diagnosis of CMPD a challenging task. In this article we report a rare to rarest case of CMPD at dental outpatient department, its oral manifestations and its management in dental clinics.

  12. Financial security

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  13. Cyber security

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  14. Musculoskeletal manifestations of diabetes mellitus.

    Merashli, M; Chowdhury, T A; Jawad, A S M

    2015-11-01

    The prevalence of Type 1 and Type 2 diabetes are increasing significantly worldwide. Whilst vascular complications of diabetes are well recognized, and account for principle mortality and morbidity from the condition, musculoskeletal manifestations of diabetes are common and whilst not life threatening, are an important cause of morbidity, pain and disability. Joints affected by diabetes include peripheral joints and the axial skeleton. Charcot neuroarthropathy is an important cause of deformity and amputation associated with peripheral neuropathy. A number of fibrosing conditions of the hands and shoulder are recognized, including carpal tunnel syndrome, adhesive capsulitis, tenosynovitis and limited joint mobility. People with diabetes are more prone to gout and osteoporosis. Management of these conditions requires early recognition and close liaison between diabetes and rheumatology specialists. © The Author 2015. Published by Oxford University Press on behalf of the Association of Physicians. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  15. Radiological manifestations of rheumatoid arthritis

    Kapp, H.J.

    1997-01-01

    Rheumatoid arthritis preferrably becomes manifest at the synovial joints of the limbs, especially at the small joints of the hands and feet, at bursae and synovial sheathes. The pathologic lesions are less frequently found at cartilaginous joints or entheses. The lesions very often are symmetrically distributed and are characterized by the following: 1. A periarticular, spindle-shaped opacity with a density similar to soft-tissue, induced by an inflammatory hypertrophy of the synovia, a serosynovitis, or an edematous impregnation of the periarticular tissue. 2. A juxta-articular osteoporosis, most probably caused by a neighbouring synovialitis accompanied by hyperemia. 3. A diffuse joint cavity narrowing due to a destruction of the articular cartilage by the pannus, a fibrovascular resorptive tissue. 4. Central as well as marginal erosions, caused by destruction of ossous material by the pannus. 5. Subchondral signal cysts, likewise unduced by the pannus. (Orig./AJ) [de

  16. Musculoskeletal manifestations of bacterial endocarditis

    Érika Bevilaqua Rangel

    2000-09-01

    Full Text Available CONTEXT: The incidence of staphylococcal infection has been increasing during the last 20 years. OBJECTIVE: Report a case of staphylococcal endocarditis preceded by musculoskeletal manifestations, which is a rare form of clinical presentation. DESIGN: Case report. CASE REPORT: A 45-year-old-man, without addictions and without known previous cardiopathy, was diagnosed as having definitive acute bacterial endocarditis due to Staphylococcus aureus. Its etiology was community-acquired, arising from a non-apparent primary focus. In addition, the musculoskeletal symptoms preceded the infective endocarditis (IE by about 1 month, which occurred together with other symptoms, e.g. mycotic aneurysms and petechiae. Later, the patient showed perforation of the mitral valve and moderate mitral insufficiency with clinical control.

  17. Pulmonary manifestations from systemic vasculitides

    Reuter, M.; Both, M.; Schnabel, A.

    2007-01-01

    Pulmonary vasculitides predominantly involve the small arterioles, capillaries and venules and include Wegener's granulomatosis, microscopic polyangiitis and the Churg-Strauss syndrome. Takayasu's arteriitis is a large vessel disease and may affect the main pulmonary arteries causing stenoses and occlusions. Knowledge of the natural course of disease and of clinical manifestations of pulmonary disease is helpful for an understanding of imaging findings. For this reason this article gives an overview not only of radiologic findings in chest X-ray and high resolution CT of the lungs but as well of clinical aspects of pulmonary vasculitides. Next to determination of disease extension the determination of disease activity is in the foreground of diagnostic imaging in vasculitides. Within this context principals of immunosuppressive therapy will be recognized. (orig.)

  18. CT manifestations of liver abscess

    Yan Jianfeng; Peng Yongjun

    2006-01-01

    Objective: To study CT findings of hepatic abscess. Methods: CT findings and clinical materials of 38 patients with liver abscess verified by aspiration were retrospectively viewed. All patients were examined by non-enhanced and contrast enhanced CT. Results: In 25 cases, inhomogeneous hypodense lesions with unclear demarcation were found on non-enhanced CT. On contrast enhanced CT scan, target or cluster enhancement was found Additionally, air was found within some lesions. In the rest 13 cases with early stage liver abscess, no typical sign was found on non-enhanced CT, while rosette sign and continued enhancement sign were demonstrated after the contrast agent was given. Conclusion: Various CT findings are found in different stages of liver abscess. The diagnosis and differential diagnosis should be based on CT manifestations and clinical history as well. (authors)

  19. Atypical manifestations of early syphilis

    R V Koranne

    1990-01-01

    Full Text Available A study of 36 untreated patients with early syphilis revealed atypical variations namely; long incubation period of 101 days in I patient, more than 3 chancres in 1, undermined margin of the chancre along with tenderness in 1 and moderate to severe tenderness of the ulcers in 2 cases. In 3 patients there was no indurations of the ulcers. Three patients with primary syphilis had unilateral lymphadenitis, and in I case the lymph nodes were not only tender but showed tendency towardsmatingawell. Insecondarysyphilis, 11 out of 16 patients having condylomata lata had no other muco-cutaneous lesions. Concomitant presence of other venereal disease to account for the atypical manifestations was discounted- by appropriate laboratory tests, response to therapeutic agents and follow up.

  20. Atypical Cutaneous Manifestations in Syphilis.

    Ivars Lleó, M; Clavo Escribano, P; Menéndez Prieto, B

    2016-05-01

    Although the diversity of the clinical manifestations of syphilis is well-known, atypical presentations can also occur. Such atypical presentations are associated with a high risk of transmission as a result of diagnostic confusion and treatment delays owing to the disease's ability to mimic other common skin diseases, deviate from classic clinical presentations, and adopt unique forms. Cases of atypical syphilis have been described most frequently in patients with concomitant human immunodeficiency virus (HIV) infection. Because the incidence of syphilis has been growing over recent years -particularly in patients with HIV co-infection- dermatologists need to be familiar with the less well-known clinical presentations of this venereal disease. Copyright © 2015 AEDV. Published by Elsevier España, S.L.U. All rights reserved.

  1. CT manifestation of peritoneal metastasis

    Cha, Soon Joo; Kang, Eun Young; Suh, Won Hyuck

    1989-01-01

    Peritoneal metastasis is frequent mode of dissemination of intraabdominal malignancies. Radiologic diagnosis of peritoneal metastasis has relied on indirect evidence on a barium UGI series and small bowel examination. With the advent of CT scanning, CT is capable of direct imaging of peritoneum. The sensitivity of CT in detecting peritoneal metastasis and CT manifestation of peritoneal metastatic lesions had reported occasionally, but rarely in Korea. So, authors illustrated the CT manifestation of peritoneal metastatic lesions in 32 cases of macroscopically proven cases in laparoscopy or laparotomy in Korea University Hae Wha Hospital during recent 4 years. The results are as follows. 1. Of total 32 cases, 18 cases were male and 14 cases were female. Age incidence was the most common in 6th decade. 2. The most common type of malignancy that cause peritoneal metastasis was the stomach cancer and next common type of malignancies were pancreas cancer in men and ovarian cancer in women. 3. Of total 32 cases of peritoneal metastasis which was confirmed by laparoscopy or laparotomy macroscopically, 23 cases (72%) were detected peritoneal thickening and/or omental pathology by CT, and the remaining 9 cases (28%) were not detected by CT. 4. Ascites was present in 19 cases (59%). 5. Parietal peritoneal thickening was present in 16 cases (50%) by CT and sheetlike pattern was the most common findings. The patterns of peritoneal thickening was relatively nonspecific and was not correlated with primary tumor type. 6. Tumor involvement of greater omentum by CT was present in 19 cases (59%). There were 7 cases of smudged appearance pattern, 6 cases of nodular pattern, 6 cases of omental cake pattern and no cystic mass pattern. The patterns of omental pathology was relatively nonspecific and was nor correlated with primary tumor type

  2. Security Measures in Data Mining

    Anish Gupta; Vimal Bibhu; Rashid Hussain

    2012-01-01

    Data mining is a technique to dig the data from the large databases for analysis and executive decision making. Security aspect is one of the measure requirement for data mining applications. In this paper we present security requirement measures for the data mining. We summarize the requirements of security for data mining in tabular format. The summarization is performed by the requirements with different aspects of security measure of data mining. The performances and outcomes are determin...

  3. Security negotiation

    Mitrović, Miroslav M.; Ivaniš, Željko

    2013-01-01

    Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

  4. Securing a better future for all: Nuclear techniques for global development and environmental protection. NA factsheet on nuclear sciences and applications partnerships: Making a difference together

    2012-01-01

    The IAEA has a long history of cooperation with other international organizations, regional agencies, non-governmental organizations (NGOs), local and national governments, research and academic institutions. These cooperative efforts make it possible for the IAEA to implement many of its projects undertaken in the area of nuclear applications for peaceful purposes.

  5. Lecture 1: General Security

    CERN. Geneva

    2013-01-01

    The CERN Computer Security Team is mandated to coordinate all aspects of CERN’s computer security --- office computing security, computer centre security, GRID computing security and control system security --- whilst taking into account CERN’s operational needs. This presentation will cover a series of security incidents which happened at CERN over the last five years, and discuss the lessons-learned in order to avoid similar things from happening again (there is enough blunder out there so there is need to make the same mistake twice). In the second part, I will outline how computer security --- prevention, protection, detection and response --- is generated at CERN, what the main objectives of the CERN computer security team are, and which policies, procedures and tools have been put in place. Stefan Lüders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadr...

  6. Extraintestinal manifestations of inflammatory bowel disease: epidemiology, diagnosis, and management

    Larsen, Signe; Bendtzen, Klaus; Nielsen, Ole Haagen

    2010-01-01

    ', 'bronchiectasis', 'bronchitis', 'cutaneous manifestations', 'erythema nodosum', 'extraintestinal manifestations', 'hyperhomocysteinemia', 'infliximab', 'iridocyclitis', 'lung disease', 'ocular manifestations', 'osteomalacia', 'pancreatitis', 'primary sclerosing cholangitis', 'renal stones', 'sulfasalazine...

  7. Radiological manifestations of intestinal tuberculosis

    Im, Jae Hoon

    1974-01-01

    Radiological findings of 87 cases of intestinal tuberculosis are analyzed and presented. The diagnosis was based on histopathology in 29 cases, and on clinical ground and radiological findings in 58 cases. The radio of male and female patients was 4:6, and peak incidence is between 10 and 30. Abdominal pain, diarrhea, weight loss, fever and general weakness are frequent symptoms, and tenderness of abdomen, ascites with abdominal distension, malnutrition and emaciation are frequent signs of the patients. Laboratory investigation reveal anemia, raised ESR, hypoalbuminaemia and positive occult blood reaction in the stool in most of the patients. Chest film show activity pulmonary tuberculosis in only 1/3 patients. There is no pathognomonic radiological findings in intestinal tuberculosis and their manifestations are protean, and differentiation from other inflammatory diseases and malignant tumors in gastrointestinal tract is very difficult on radiological ground alone. However, in patients with complaining vague abdominal symptoms and signs, the radiological diagnosis is most certain means in the decision of existence of organic lesion and suggestion of tuberculosis in the gastrointestinal tract and its extent as yet. Multiplicity of the lesion, involvement of adjacent organ such as peritoneum or mesenteric lymph nodes, typical nodularity or irregularity of mesenteric border and existence of active pulmonary tuberculosis are the suggestive findings of intestinal tuberculosis. In the diagnosis of inflammatory disease or malignant tumor of gastrointestinal tract, the possibility of tuberculosis should be borne in mind, and vice versa

  8. CT manifestations of pancreatic tuberculosis

    Yu Risheng; Zheng Ji'ai; Li Rongfen

    2001-01-01

    Objective: To assess the CT manifestations and diagnostic value in the pancreatic tuberculosis(PTB)with review of the literatures. Methods: All cases of PTB proved by surgery or biopsy were examined with plain and enhanced CT scans. Results: The CT findings in one case with multiple-nodular type of PTB were diffuse enlargement of the pancreas with multiple, nodular, and low-density lesions; The nodular lesions had peripheral enhancement. 7 cases of local type of PTB encroached on pancreatic head. 4 cases showed local soft tissue masses with multiple flecked calcifications in 2 cases and mild enhancement in one case; Cystic masses was found in 2 cases, with mural calcification in 1 case and multi-loculated cystic mass in 1 case, respectively; Massive pancreatic head calcification was demonstrated in one case. In these 8 cases of PTB, the lesion extended out of pancreas in 4 cases, including abdominal tuberculous lymph nodes, tuberculous peritonitis, and hepatosplenic tuberculosis. Conclusion: CT findings of PTB were various but had some characteristics. Pancreatic masses with multiple flecked calcification or mild enhancement could suggest the diagnosis. Abdominal tuberculosis accompanied with the pancreatic lesion, especially tuberculous lymph nodes, was highly suggestive of the diagnosis of PTB

  9. Radiological manifestations of intestinal tuberculosis

    Im, Jae Hoon [Seoul National University College of Medicine, Seoul (Korea, Republic of)

    1974-10-15

    Radiological findings of 87 cases of intestinal tuberculosis are analyzed and presented. The diagnosis was based on histopathology in 29 cases, and on clinical ground and radiological findings in 58 cases. The radio of male and female patients was 4:6, and peak incidence is between 10 and 30. Abdominal pain, diarrhea, weight loss, fever and general weakness are frequent symptoms, and tenderness of abdomen, ascites with abdominal distension, malnutrition and emaciation are frequent signs of the patients. Laboratory investigation reveal anemia, raised ESR, hypoalbuminaemia and positive occult blood reaction in the stool in most of the patients. Chest film show activity pulmonary tuberculosis in only 1/3 patients. There is no pathognomonic radiological findings in intestinal tuberculosis and their manifestations are protean, and differentiation from other inflammatory diseases and malignant tumors in gastrointestinal tract is very difficult on radiological ground alone. However, in patients with complaining vague abdominal symptoms and signs, the radiological diagnosis is most certain means in the decision of existence of organic lesion and suggestion of tuberculosis in the gastrointestinal tract and its extent as yet. Multiplicity of the lesion, involvement of adjacent organ such as peritoneum or mesenteric lymph nodes, typical nodularity or irregularity of mesenteric border and existence of active pulmonary tuberculosis are the suggestive findings of intestinal tuberculosis. In the diagnosis of inflammatory disease or malignant tumor of gastrointestinal tract, the possibility of tuberculosis should be borne in mind, and vice versa.

  10. Cystic thymic diseases: CT manifestations

    Song, Soon Young; Choi, Yo Won; Jeon, Eui Yong; Jeon, Seok Chol; Seo, Heung Suk; Hahm, Chang Kok

    1995-01-01

    To describe CT findings and differential points of cystic thymic lesions. We evaluated retrospectively total 19 masses with well marginated cystic lesions at thymic area on CT scans. They were 10 teratomas, 3 congenital thymic cysts, 2 multilocular thymic cysts(associated with thymoma and myasthenia gravis in each), 2 cysts Assciated with thymic Hodgkin's lymphomas an ectopic parathyroid cyst, and an infected thymic cyst. The radiological abnormalities evaluated were thickness of the wall, presence or abscene of septa, mural nodule, solid component, calcification and fat component. All three cases of congenital thymic cysts and an ectopic parathyroid cyst appeared as thin-walled unilocular cyst with homogeneous internal density and without identifiable solid component. In multilocular thymic cyst, there were thick wall and solid components(n =2), thick internal septa and calcifications(n = 1). The cysts of teratomas manifested thick walls(n = 9), internal septa(n = 4), calcifications(n = 6), fat components(n = 4), and solid components(n = 4). Cysts in Hodgkin's diseases appeared as multilocular or unilocular and had thick wall and septa without calcification. Infected thymic cyst presented with multilocular cystic mass with identifiable wall and septa, calcification, and solid components. The thymic diseases with cystic lesion include teratomas, congenital thymic cysts, multilocular thymic cysts, parathyroid cyst, and Hodgkin's disease. Congenital thymic cyst and ectopic parathyroid cyst are thin-walled unilocular cystic lesions. Cystic lesions associated with teratoma, Hodgkin's disease, and multilocular thymic cyst are thick-walled cystic lesions with or without solid component

  11. Mucocutaneous manifestations of HIV infection

    Shobhana A

    2004-03-01

    Full Text Available BACKGROUND AND AIMS: Human immunodeficiency virus (HIV is associated with various mucocutaneous features, which may be the first pointer towards the existence of HIV infection. This study was done to note the different mucocutaneous lesions present in the HIV population in eastern India. METHODS: Four hundred and ten HIV seropositive patients attending the outpatient and inpatient departments were included in the study. RESULTS: Out of 410 HIV positives, 40% had mucocutaneous involvement at presentation. The mean age of the study population was 29 years and male to female ratio was 2.5:1. The common mucocutaneous morbidities included oral candidiasis (36%, dermatophytosis and gingivitis (13% each, herpes zoster (6%, herpes simplex and scabies (5% each. A striking feature, noted in 36% males, was straightening of hairs. Genital herpes was the commonest genital ulcer disease. Lesions associated with declining immunity included oral candidiasis, oral hairy leukoplakia and herpes zoster with median CD4 counts of 98, 62 and 198/ L respectively. CONCLUSION: Early recognition of mucocutaneous manifestations and associated STDs help in better management of HIV/AIDS.

  12. Esophageal manifestations of celiac disease.

    Lucendo, A J

    2011-09-01

    Celiac disease (CD) may often be associated with various motor disorders affecting the different segments of the digestive tract, including the esophagus. Although it has not been universally reported, some available evidences indicate that pediatric and adult celiac patients could manifest a higher frequency of esophagitis and gastroesophageal reflux disease-related symptoms compared to nonceliac patients. In addition, several published studies have consistently shown the efficacy of a gluten-free diet in rapidly controlling esophageal symptoms and in preventing their recurrence. Since the participation of gluten in the esophageal symptoms of CD seems clear, its intimate mechanisms have yet to be elucidated, and several hypothesis have been proposed, including the specific immune alterations characterizing CD, the reduction in nutrient absorption determining the arrival of intact gluten to distal gastrointestinal segments, and various dysregulations in the function of gastrointestinal hormones and peptides. Recent studies have suggested the existence of a possible relationship between CD and eosinophilic esophagitis, which should be more deeply investigated. © 2011 Copyright the Author. Journal compilation © 2011, Wiley Periodicals, Inc. and the International Society for Diseases of the Esophagus.

  13. Attachment and Aggressive Manifestations in Younger Adulthood - "Preliminary Findings"

    Tatiana Lorincová

    2014-07-01

    Full Text Available The main topic of the contribution was comparison between retrospective attachment (emocional warmth and rejection and aggressive manifestations (physical aggressivness, verbal aggressivness, anger and hostility among younger adulthood. Bowlby's theory of attachment was that once a core attachment style develops in an infant, it will influence and shape the nature of all intimate relations for the individual moving forward throughout the infant's life cycle. Authors Mikulincer and Shaver (2011 explain how these primary attachment experiences would affect future emotional, cognitive and behavioral processes. Secure adolescents, in comparison to insecure ones are perceived as being less aggressive. Research has pointed out that secure parental attachment promotes adaptive psychological functioning. The direct relationship between attachment security and aggressive/delinquent behaviour is in line with prior evidence that secure adolescents rate higher in terms of emotional and social adjustment, enjoy more positive relationships with their family and peers, and are less likely to engage in externalizing problems, such as antisocial and aggressive behaviours. On the other hand, insecure attachment is connected with aggressive and externalizing behaviour. Hypotheses were formulated on the base of theoretical background and our assumption was, that younger adults with emocional warmth attachment will have lower level of aggressive manifestations (physical aggression, verbal aggression, anger and hostility than younger adults with rejectional attachment. We used two standardized questionnaires for data collection, s.E.M.B.U. Questionnaire, which measured retrospective attachment (emocional warmth and rejection and Questionnaire of Aggressivness, which measured aggressive manifestations. We used statistical analysis and we found statistically significant differencies, which are preliminary findings from broader research, between emocional warmth

  14. Securing Chinese nuclear power development: further strengthening nuclear security

    Zhang Hui

    2014-01-01

    Chinese President Xi Jinping addresses China's new concept of nuclear security with four 'equal emphasis' at the third Nuclear Security Summit, and makes four commitments to strengthen nuclear security in the future. To convert President Xi's political commitments into practical, sustainable reality, China should take further steps to install a complete, reliable, and effective security system to ensure that all its nuclear materials and nuclear facilities are effectively protected against the full spectrum of plausible terrorist and criminal threats. This paper suggests the following measures be taken to improve China's existing nuclear security system, including updating and clarifying the requirements for a national level DBT; updating and enforcing existing regulations; further promoting nuclear security culture; balancing the costs of nuclear security, and further strengthening international cooperation on nuclear security. (author)

  15. Cloud Computing Security

    Ngongang, Guy

    2011-01-01

    This project aimed to show how possible it is to use a network intrusion detection system in the cloud. The security in the cloud is a concern nowadays and security professionals are still finding means to make cloud computing more secure. First of all the installation of the ESX4.0, vCenter Server and vCenter lab manager in server hardware was successful in building the platform. This allowed the creation and deployment of many virtual servers. Those servers have operating systems and a...

  16. Ocular Manifestations of Acquired Immunodeficiency Syndrome.

    Kim, Young Shin; Sun, Hae Jung; Kim, Tae Hyong; Kang, Kui Dong; Lee, Sung Jin

    2015-08-01

    To investigate the patterns and risk factors of the ocular manifestations of acquired immunodeficiency syndrome (AIDS) and their correlation with CD4+ count in the era of highly active antiretroviral therapy (HAART). This retrospective study examined 127 AIDS patients who presented to Soonchunhyang University Hospital. Data were collected from patient interviews, clinical examinations, and laboratory investigations. Ophthalmologic examinations included the best-corrected visual acuity, intraocular pressure, anterior segment and adnexal examination, and dilated fundus examination. Of the 127 patients with AIDS, 118 were on HAART and 9 were not. The mean CD4+ count was 266.7 ± 209.1 cells/µL. There were ocular manifestations in 61 patients (48.0%). The incidence of anterior segment manifestations was higher than posterior segment manifestations at 28.3% and 19.7%, respectively. The mean CD4+ count was significantly (p AIDS. In this study, anterior segment and external ocular manifestations occurred more frequently than posterior segment manifestations. Also, the mean CD4+ count was significantly lower in patients with posterior segment ocular manifestations versus anterior segment ocular manifestations. We found that CD4+ count and age >35 years were independent risk factors for developing ocular manifestations.

  17. The Navigation Metaphor in Security Economics

    Pieters, Wolter; Barendse, Jeroen; Ford, Margaret

    2016-01-01

    The navigation metaphor for cybersecurity merges security architecture models and security economics. By identifying the most efficient routes for gaining access to assets from an attacker's viewpoint, an organization can optimize its defenses along these routes. The well-understood concept of na...... of navigation makes it easier to motivate and explain security investment to a wide audience, encouraging strategic security decisions....

  18. Watermarking security

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  19. Electrocardiographic Manifestations of Benzodiazepine Toxicity

    Nahid Kazemzadeh

    2014-11-01

    Full Text Available Background: The aim of this study was to evaluate and compare the clinical and electrocardiographic (ECG manifestations of benzodiazepines (BZs. Methods: In this retrospective study, all BZ-poisoned patients hospitalized at Loghman Hakim Hospital between September 2010 and March 2011 were evaluated. Patients’ information including age, sex, time elapsed between the ingestion and presentation, and type of the BZ used were extracted from the patients' charts and recorded. ECGs on presentation to the emergency department (ED were evaluated and parameters such as PR interval, QRS duration, corrected QT, amplitude of S wave in lead I, height of R wave and R/S ratio in the lead aVR were also measured and recorded. Results: Oxazepam, chlordiazepoxide, lorazepam, alprazolam, diazepam, and clonazepam were ingested by 9 (3%, 13 (4.4%, 29 (9.9%, 105 (35.8%, 65 (22.2%, and 72 (24.6% patients, respectively. Mean PR interval was reported to be 0.16 ± 0.03 sec and PR interval of greater than 200 msec was detected in 12 (4.5% patients. Mean QRS duration was 0.07 ± 0.01sec and QRS≥120 msec was observed in 7 (2.6% cases. Conclusion: Diazepam is the only BZ that does not cause QRS widening and oxazepam is the only one not causing PR prolongation. It can be concluded that if a patient refers with a decreased level of consciousness and accompanying signs of BZ toxicity, QRS widening in ECG rules out diazepam, whereas PR prolongation rules out oxazepam toxicity.

  20. Cystic thymic diseases: CT manifestations

    Song, Soon Young; Choi, Yo Won; Jeon, Eui Yong; Jeon, Seok Chol; Seo, Heung Suk; Hahm, Chang Kok [School of Medicine, Hanyang University, Seoul (Korea, Republic of)

    1995-09-15

    To describe CT findings and differential points of cystic thymic lesions. We evaluated retrospectively total 19 masses with well marginated cystic lesions at thymic area on CT scans. They were 10 teratomas, 3 congenital thymic cysts, 2 multilocular thymic cysts(associated with thymoma and myasthenia gravis in each), 2 cysts Assciated with thymic Hodgkin's lymphomas an ectopic parathyroid cyst, and an infected thymic cyst. The radiological abnormalities evaluated were thickness of the wall, presence or abscene of septa, mural nodule, solid component, calcification and fat component. All three cases of congenital thymic cysts and an ectopic parathyroid cyst appeared as thin-walled unilocular cyst with homogeneous internal density and without identifiable solid component. In multilocular thymic cyst, there were thick wall and solid components(n =2), thick internal septa and calcifications(n = 1). The cysts of teratomas manifested thick walls(n = 9), internal septa(n = 4), calcifications(n = 6), fat components(n = 4), and solid components(n = 4). Cysts in Hodgkin's diseases appeared as multilocular or unilocular and had thick wall and septa without calcification. Infected thymic cyst presented with multilocular cystic mass with identifiable wall and septa, calcification, and solid components. The thymic diseases with cystic lesion include teratomas, congenital thymic cysts, multilocular thymic cysts, parathyroid cyst, and Hodgkin's disease. Congenital thymic cyst and ectopic parathyroid cyst are thin-walled unilocular cystic lesions. Cystic lesions associated with teratoma, Hodgkin's disease, and multilocular thymic cyst are thick-walled cystic lesions with or without solid component.

  1. Security Locks

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  2. Planning Security Services for IT Systems

    Henderson, Marie; Page, Howard Philip

    2014-01-01

    Often the hardest job is to get business representatives to look at security as something that makes managing their risks and achieving their objectives easier, with security compliance as just part of that journey. This paper addresses that by making planning for security services a 'business tool'.

  3. Neurological manifestations of dengue viral infection

    Carod-Artal FJ

    2014-10-01

    Full Text Available Francisco Javier Carod-Artal1,21Neurology Department, Raigmore hospital, Inverness, UK; 2Universitat Internacional de Catalunya (UIC, Barcelona, Spain Abstract: Dengue is the most common mosquito-borne viral infection worldwide. There is increased evidence for dengue virus neurotropism, and neurological manifestations could make part of the clinical picture of dengue virus infection in at least 0.5%–7.4% of symptomatic cases. Neurological complications have been classified into dengue virus encephalopathy, dengue virus encephalitis, immune-mediated syndromes (acute disseminated encephalomyelitis, myelitis, Guillain–Barré syndrome, neuritis brachialis, acute cerebellitis, and others, neuromuscular complications (hypokalemic paralysis, transient benign muscle dysfunction and myositis, and dengue-associated stroke. Common neuro-ophthalmic complications are maculopathy and retinal vasculopathy. Pathogenic mechanisms include systemic complications and metabolic disturbances resulting in encephalopathy, direct effect of the virus provoking encephalitis, and postinfectious immune mechanisms causing immune-mediated syndromes. Dengue viruses should be considered as a cause of neurological disorders in endemic regions. Standardized case definitions for specific neurological complications are still needed. Keywords: encephalitis, encephalopathy, dengue fever, neurological complications

  4. Form of the manifestly covariant Lagrangian

    Johns, Oliver Davis

    1985-10-01

    The preferred form for the manifestly covariant Lagrangian function of a single, charged particle in a given electromagnetic field is the subject of some disagreement in the textbooks. Some authors use a ``homogeneous'' Lagrangian and others use a ``modified'' form in which the covariant Hamiltonian function is made to be nonzero. We argue in favor of the ``homogeneous'' form. We show that the covariant Lagrangian theories can be understood only if one is careful to distinguish quantities evaluated on the varied (in the sense of the calculus of variations) world lines from quantities evaluated on the unvaried world lines. By making this distinction, we are able to derive the Hamilton-Jacobi and Klein-Gordon equations from the ``homogeneous'' Lagrangian, even though the covariant Hamiltonian function is identically zero on all world lines. The derivation of the Klein-Gordon equation in particular gives Lagrangian theoretical support to the derivations found in standard quantum texts, and is also shown to be consistent with the Feynman path-integral method. We conclude that the ``homogeneous'' Lagrangian is a completely adequate basis for covariant Lagrangian theory both in classical and quantum mechanics. The article also explores the analogy with the Fermat theorem of optics, and illustrates a simple invariant notation for the Lagrangian and other four-vector equations.

  5. INNOVATION – CREATIVE MANIFESTATION WITH ECONOMIC IMPLICATIONS

    VALENTINA MUNTEANU

    2013-05-01

    Full Text Available The present paper aims at a correct perception of innovation, regarded as a present phenomenon, for which it is necessary to resorts to a series of notions and definitions, as well as to multiple perspectives. Thus, the definition of this phenomenon - in all that it captures in it - suggests dynamism and ease of communication. The complexity of the phenomenon of innovation is the creative capacity, around which there revolve all other matters concerning innovation. The present paper also illustrates the relationship between technology and economy, meaning that technical progress makes the economic system that created it. This, in turn, provides a more consistent support for changing technology. Economic factors play a major role in the development of technology, because they are interested in reducing costs, increasing productivity, sales volume, as well as goals that can be achieved through innovation. Successful entrepreneurs in an increasingly more competitive environment try to assert through value creation rewardingly new and different outputs, a fact which represents a change from what was known at the beginning of the business. In general, innovation and to the same extent technical and technological innovation has always accompanied the development of human society. Innovation has manifesting itself throughout history with different levels of intensity. Technical-scientific revolution, present in all spheres of human activity through the accelerated mutations that produce them, fundamentally influence the way in which orientation and innovation evolve.

  6. Abdominal manifestations of autoimmune disorders

    Triantopoulou, C.

    2015-01-01

    Full text: Immunoglobulin G4-related disease was recognized as a systemic disease since various extrapancreatic lesions were observed in patients with autoimmune pancreatitis (AIP). The real etiology and pathogenesis of IgG4-RD is still not clearly understood. Moreover the exact role of IgG4 or IgG4-positive plasma cells in this disease has not yet been elucidated. only some inconsistent biological features such as hypergammaglobulinemia or hypocomplementemia support the autoimmune nature of the disease process. various names have been ascribed to this clinicopathological entity including IgG4-related sclerosing disease, IgG4-related systemic sclerosing disease, IgG4-related disease, IgG4-related autoimmune disease, hyper-IgG4 disease and IgG4-related systemic disease. The extrapancreatic lesions of IgG4-RD also exhibit the same characteristic histologic features including dense lymphoplasmacytic infiltrate, massive storiform fibrosis, and obliterative phlebitis as seen in IgG4-related pancreatitis. Abdominal manifestations include the following organs/systems: Bile ducts: Sclerosing cholangitis; Gallbladder and liver: Acalculous sclerosis cholecytitis with diffuse wall thickening; hepatic inflammatory pseudotumorts; Kidneys: round or wedge-shaped renal cortical nodules, peripheral cortical; lesions, mass like lesions or renal pelvic involvement; Prostate, urethra, seminal vesicle, vas deferens, uterine cervix; Autoimmune prostatitis; Retroperitoneum: Retroperitoneal fibrosis. thin or mildly thick homogeneous soft tissue lesion surrounding the abdominal aorta and its branches but also bulky masses causing hydronephroureterosis; Mesentery: Sclerosing mesenteritis usually involving the root of the mesentery; Bowel: Inflammatory bowel diseases mimicking Crohn’s disease or ulcerative colitis. various types of sclerosing nodular lesions of the bowel wall; Stomach: Gastritis, gastric ulcers and focal masses mimicking submucosal tumor; omentum: Infiltration mimicking

  7. 21 CFR 11.50 - Signature manifestations.

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Signature manifestations. 11.50 Section 11.50 Food... RECORDS; ELECTRONIC SIGNATURES Electronic Records § 11.50 Signature manifestations. (a) Signed electronic...: (1) The printed name of the signer; (2) The date and time when the signature was executed; and (3...

  8. Unusual Cutaneous Manifestation of Tuberous Sclerosis

    K C Shah

    1980-01-01

    Full Text Available Cutaneous manifestations are found in 60 to 70% cases of tuberous sclerosis and consist of adenoma sebaceum, periungual fibromatas, cafe au lait spots, shagreen patches and white macules. Our patient showed unusual skin manifestations like spotty pigmentation on the chest, back and abdomen and hyperkeratosis palmaris et plantaris.

  9. Learn about the Hazardous Waste Electronic Manifest System (e-Manifest)

    This webpage provides information on EPA's work toward developing a hazardous waste electronic manifest system. Information on the Hazardous Waste Electronic Manifest Establishment Act, progress on the project and frequent questions are available.

  10. TWO-LAYER SECURE PREVENTION MECHANISM FOR REDUCING E-COMMERCE SECURITY RISKS

    Sen-Tarng Lai

    2015-01-01

    E-commerce is an important information system in the network and digital age. However, the network intrusion, malicious users, virus attack and system security vulnerabilities have continued to threaten the operation of the e-commerce, making e-commerce security encounter serious test. How to improve ecommerce security has become a topic worthy of further exploration. Combining routine security test and security event detection procedures, this paper proposes the Two-Layer Secure ...

  11. Information Security Governance: When Compliance Becomes More Important than Security

    Tan , Terence C. C.; Ruighaver , Anthonie B.; Ahmad , Atif

    2010-01-01

    International audience; Current security governance is often based on a centralized decision making model and still uses an ineffective 20th century risk management approach to security. This approach is relatively simple to manage since it needs almost no security governance below the top enterprise level where most decisions are made. However, while there is a role for more corporate governance, new regulations, and improved codes of best practice to address current weak organizational secu...

  12. Literature Review on Cyber Security Investment Decisions

    ŞENTÜRK, Hakan; ÇİL, Celal Zaim; SAĞIROĞLU, Şeref

    2016-01-01

    Severe financial losses incurred by cyber security attacks with increasing complexity and frequency, as well as booming cyber security sector offering variety of products as investment options have led the focus of the research in the field to the economic dimension of cyber security. The need for determination of methods to be used when making cyber security investment decisions under budget constraints have become prominent. In five sections as the cyber security investment strategies, risk...

  13. Radioactive Waste SECURITY

    Brodowski, R.; Drapalik, M.; Gepp, C.; Gufler, K.; Sholly, S.

    2010-01-01

    The purpose of this work is to investigate the safety requirements for a radioactive waste repository, the fundamental problems involved and the legislative rules and arrangements for doing so. As the title already makes clear, the focus of this work is on aspects that can be assigned to the security sector - ie the security against the influence of third parties - and are to be distinguished from safety measures for the improvement of the technical safety aspects. In this context, mention is made of events such as human intrusion into guarded facilities, whereas e.g. a geological analysis on seismic safety is not discussed. For a variety of reasons, the consideration of security nuclear waste repositories in public discussions is increasingly taking a back seat, as ia. Terrorist threats can be considered as negligible risk or well calculable. Depending on the type of storage, different security aspects still have to be considered. (roessner)

  14. Neurological Manifestations In Inflammatory Bowel Disease

    youssef HNACH

    2015-06-01

    Full Text Available IntroductionThe purpose of this retrospective study was to report neurological manifestations noted in patients who were monitored for inflammatory bowel disease, in order to document the pathophysiological, clinical, progressive, and therapeutic characteristics of this entity.Material and methodsWe conducted a retrospective study on patients monitored -in the gastroenterology service in Ibn Sina Hospital in Rabat, Morocco- for inflammatory bowel disease from 1992 till 2013 and who developed neurological manifestations during its course. Patients with iatrogenic complications were excluded, as well as patients with cerebrovascular risk factors.ResultsThere were 6 patients, 4 of whom have developed peripheral manifestations. Electromyography enabled the diagnosis to be made and the outcome was favorable with disappearance of clinical manifestations and normalization of the electromyography.The other 2 patients, monitored for Crohn’s disease, developed ischemic stroke. Cerebral computed tomography angiography provided positive and topographic diagnosis. Two patients were admitted to specialized facilities.ConclusionNeurological manifestations in inflammatory bowel disease are rarely reported.  Peripheral neuropathies and stroke remain the most common manifestations. The mechanisms of these manifestations are not clearly defined yet. Currently, we hypothesize the interaction of immune mediators.

  15. [Lyme disease--clinical manifestations and treatment].

    Stock, Ingo

    2016-05-01

    Lyme disease (Lyme borreliosis) is a systemic infectious disease that can present in a variety of clinical manifestations. The disease is caused by a group of spirochaetes--Borrelia burgdorferi sensu lato or Lyme borrelia--that are transmitted to humans by the bite of Ixodes ticks. Lyme disease is the most common arthropode-borne infectious disease in many European countries including Germany. Early localized infection is typically manifested by an erythema migrans skin lesion, in rarer cases as a borrelial lymphocytoma. The most common early disseminated manifestation is (early) neuroborreliosis. In adults, neuroborreliosis appears typically as meningoradiculoneuritis. Neuroborreliosis in children, however, is typically manifested by meningitis. In addition, multiple erythema migrans lesions and Lyme carditis occur relatively frequently. The most common manifestation oflate Lyme disease is Lyme arthritis. Early manifestations (and usually also late manifestations) of Lyme disease can be treated successfully by application of suitable antibacterial agents. For the treatment of Lyme disease, doxycycline, certain penicillins such as amoxicillin and some cephalosporins (ceftriaxone, cefotaxime, cefuroxime axetil) are recommended in current guidelines. A major challenge is the treatment of chronic, non-specific disorders, i. e., posttreatment Lyme disease syndrome and "chronic Lyme disease". Prevention of Lyme disease is mainly accomplished by protecting against tick bites. Prophylactic administration of doxycycline after tick bites is generally not recommended in Germany. There is no vaccine available for human beings.

  16. Securing Hadoop

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  17. Grid Security

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  18. Genetic alterations in syndromes with oral manifestations

    Krishnamurthy Anuthama

    2013-01-01

    Full Text Available Ever since Gregor Johan Mendel proposed the law of inheritance, genetics has transcended the field of health and has entered all walks of life in its application. Thus, the gene is the pivoting factor for all happenings revolving around it. Knowledge of gene mapping in various diseases would be a valuable tool in prenatally diagnosing the condition and averting the future disability and stigma for the posterity. This article includes an array of genetically determined conditions in patients seen at our college out-patient department with complete manifestation, partial manifestation and array of manifestations not fitting into a particular syndrome.

  19. Health Security and Risk Aversion.

    Herington, Jonathan

    2016-09-01

    Health security has become a popular way of justifying efforts to control catastrophic threats to public health. Unfortunately, there has been little analysis of the concept of health security, nor the relationship between health security and other potential aims of public health policy. In this paper I develop an account of health security as an aversion to risky policy options. I explore three reasons for thinking risk avoidance is a distinctly worthwhile aim of public health policy: (i) that security is intrinsically valuable, (ii) that it is necessary for social planning and (iii) that it is an appropriate response to decision-making in contexts of very limited information. Striking the right balance between securing and maximizing population health thus requires a substantive, and hitherto unrecognized, value judgment. Finally, I critically evaluate the current health security agenda in light of this new account of the concept and its relationship to the other aims of public health policy. © 2016 John Wiley & Sons Ltd.

  20. Demarcation of Security in Authentication Protocols

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security analysis of communication protocols is a slippery business; many “secure” protocols later turn out to be insecure. Among many, two complains are more frequent: inadequate definition of security and unstated assumptions in the security model. In our experience, one principal cause...... for such state of affairs is an apparent overlap of security and correctness, which may lead to many sloppy security definitions and security models. Although there is no inherent need to separate security and correctness requirements, practically, such separation is significant. It makes security analysis...... easier, and enables us to define security goals with a fine granularity. We present one such separation, by introducing the notion of binding sequence as a security primitive. A binding sequence, roughly speaking, is the only required security property of an authentication protocol. All other...

  1. [Biological security confronting bioterrorism].

    Suárez Fernández, Guillermo

    2002-01-01

    A review is made on Biosecurity at both local and global level in relationship with Bioterrorism as a real threat and its control and prevention. The function of the network of High Security Laboratories around the world able to make immediate diagnosis, research on vaccines, fundamental and urgent epidemiological studies, conform a steady basis to control natural infections and also the possible bioterrorism attacks.

  2. CT manifestations of peritoneal carcinomatosis.

    Walkey, M M; Friedman, A C; Sohotra, P; Radecki, P D

    1988-05-01

    Seventy-three abdominopelvic contrast-enhanced CT scans obtained in 60 patients with peritoneal tumor spread were reviewed retrospectively to determine the CT signs of peritoneal malignancy. Ascites was present in 54 studies (74%) and was the most common CT finding. Loculation of the fluid occurred in 25 (46%) of these. In nine (17%) of the 54, a new finding, absence of cul-de-sac fluid in the presence of generalized ascites, was noted. Parietal peritoneal thickening with contrast enhancement of the peritoneum, making the peritoneum visible as a thin line along the abdominal wall, was present in 45 (62%) of studies. This is believed to represent confluent peritoneal metastases. Small-bowel involvement was present in half of the cases (wall thickening and irregularity with or without obstruction). Tumor involvement of the omentum was visible as soft-tissue permeation of fat, enhancing nodules, and/or an omental cake. Of the 26 patients without a previously known malignancy, identification of the primary tumor in addition to peritoneal carcinomatosis was possible in 13 (50%). Appreciation of the spectrum of CT findings in peritoneal carcinomatosis is essential for accurate evaluation of scans in patients with abdominopelvic malignancies.

  3. Homomorphic encryption and secure comparison

    Damgard, Ivan; Geisler, M.; Kroigaard, M.

    2008-01-01

    We propose a protocol for secure comparison of integers based on homomorphic encryption.We also propose a homomorphic encryption scheme that can be used in our protocol, makes it more efficient than previous solutions, and can also be used as the basis of efficient and general secure Multiparty

  4. Hydrophysical manifestations of the Indian ocean tsunami

    Sadhuram, Y.; Murthy, T.V.R.; Rao, B.P.

    described in detail by several authors. This chapter summarises the results of our investigations on the hydrophysical manifestations (salinity and temperature, coastal currents, internal waves, etc.) of the tsunami on the coastal environments in India...

  5. Gastrointestinal manifestations in children with primary ...

    Ehab

    with autoimmune manifestations, and increased risk of malignancy in ... cell dysfunction as well as hepatic abscess in phagocytic defect. .... Pulmonary infections are the most common ... colony-stimulating factor may be indicated to treat.

  6. Musculoskeletal manifestations of the antiphospholipid syndrome.

    Noureldine, M H A; Khamashta, M A; Merashli, M; Sabbouh, T; Hughes, G R V; Uthman, I

    2016-04-01

    The scope of clinical and laboratory manifestations of the antiphospholipid syndrome (APS) has increased dramatically since its discovery in 1983, where any organ system can be involved. Musculoskeletal complications are consistently reported in APS patients, not only causing morbidity and mortality, but also affecting their quality of life. We reviewed all English papers on APS involvement in the musculoskeletal system using Google Scholar and Pubmed; all reports are summarized in a table in this review. The spectrum of manifestations includes arthralgia/arthritis, avascular necrosis of bone, bone marrow necrosis, complex regional pain syndrome type-1, muscle infarction, non-traumatic fractures, and osteoporosis. Some of these manifestations were reported in good quality studies, some of which showed an association between aPL-positivity and the occurrence of these manifestations, while others were merely described in case reports. © The Author(s) 2016.

  7. Manifest toob klassika taas kinoekraanile / Andri Maimets

    Maimets, Andri, 1979-

    2007-01-01

    2.-9. veebr. on kinos "Sõprus" ja 11.-15. veebr. Tartu Sadamateatris 5. kultusfilmide festival Manifest, seekord USA filmid ja teemaks sõnavabadus. Esilinastub ka Urmas E. Liivi dokumentaalfilm "Tervitusi Nõukogude Eestist!"

  8. Social Security.

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  9. Neurological manifestations of excessive alcohol consumption.

    Planas-Ballvé, Anna; Grau-López, Laia; Morillas, Rosa María; Planas, Ramón

    2017-12-01

    This article reviews the different acute and chronic neurological manifestations of excessive alcohol consumption that affect the central or peripheral nervous system. Several mechanisms can be implicated depending on the disorder, ranging from nutritional factors, alcohol-related toxicity, metabolic changes and immune-mediated mechanisms. Recognition and early treatment of these manifestations is essential given their association with high morbidity and significantly increased mortality. Copyright © 2017 Elsevier España, S.L.U., AEEH y AEG. All rights reserved.

  10. Clinical Manifestations and Diagnosis of Acromegaly

    Lugo, Gloria; Pena, Lara; Cordido, Fernando

    2012-01-01

    Acromegaly and gigantism are due to excess GH production, usually as a result of a pituitary adenoma. The incidence of acromegaly is 5 cases per million per year and the prevalence is 60 cases per million. Clinical manifestations in each patient depend on the levels of GH and IGF-I, age, tumor size, and the delay in diagnosis. Manifestations of acromegaly are varied and include acral and soft tissue overgrowth, joint pain, diabetes mellitus, hypertension, and heart and respiratory failure. Ac...

  11. Bilingualism delays clinical manifestation of Alzheimer's disease

    Woumans, Evy; Santens, Patrick; Sieben, Anne; Versijpt, Jan; Stevens, Michaël; Duyck, Wouter

    2015-01-01

    The current study investigated the effects of bilingualism on the clinical manifestation of Alzheimer's disease (AD) in a European sample of patients. We assessed all incoming AD patients in two university hospitals within a specified timeframe. Sixty-nine monolinguals and 65 bilinguals diagnosed with probable AD were compared for time of clinical AD manifestation and diagnosis. The influence of other potentially interacting variables was also examined. Results indicated a significant delay f...

  12. Neuropsychiatric Manifestations of Parkinson`s Disease

    Ana Peixinho

    2014-10-01

    Full Text Available Parkinson’s disease affects about 1% of the world population older than 65 years. It’s most frequently considered a movement disorder, but the neuropsychiatric manifestations associated with the disease and/or its treatment may be of equal or greater significance in some patients. We will discuss briefly the epidemiology, physiopathology and diagnosis of Parkinson’s disease, highlighting the neuropsychiatric manifestations: depression, anxiety, psychosis, dementia, sleep disorders, dopamine dysregulation syndrome.

  13. Security management

    Adams, H.W.

    1990-01-01

    Technical progress is moving more and more quickly and the systems thus produced are so complex and have become so unclear to the individual that he can no longer estimate the consequences: Faith in progress has given way to deep mistrust. Companies have adjusted to this change in consciousness. An interesting tendency can be identified: technical security is already available - now the organization of security has become an important objective for companies. The key message of the book is: If outworn technical systems are no longer adequate, the organization must be thoroughly overhauled. Five chapters deal with the following themes: organization as an aspect of society; risk control; aspects of security; is there security in ADP; the broader concept of security. (orig./HP) [de

  14. Metabolic and hormonal signatures in pre-manifest and manifest Huntington’s disease patients

    Rui eWang

    2014-06-01

    Full Text Available Huntington's disease (HD is an inherited neurodegenerative disorder typified by involuntary body movements, and psychiatric and cognitive abnormalities. Many HD patients also exhibit metabolic changes including progressive weight loss and appetite dysfunction. Here we have investigated metabolic function in pre-manifest and manifest HD subjects to establish an HD subject metabolic hormonal plasma signature. Individuals at risk for HD who have had predictive genetic testing showing the cytosine-adenine-guanine (CAG expansion causative of HD, but who do not yet present signs and symptoms sufficient for the diagnosis of manifest HD are said to be pre-manifest. Pre-manifest and manifest HD patients, as well as both familial and non-familial controls, were evaluated for multiple peripheral metabolism signals including circulating levels of hormones, growth factors, lipids and cytokines. Both pre-manifest and manifest HD subjects exhibited significantly reduced levels of circulating growth factors, including growth hormone and prolactin. HD-related changes in the levels of metabolic hormones such as ghrelin, glucagon and amylin were also observed. Total cholesterol, HDL-C and LDL-C were significantly decreased in HD subjects. C-reactive protein was significantly elevated in pre-manifest HD subjects. The observation of metabolic alterations, even in subjects considered to be in the pre-manifest stage of HD, suggests that in addition, and prior, to overt neuronal damage, HD affects metabolic hormone secretion and energy regulation, which may shed light on pathogenesis, and provide opportunities for biomarker development.

  15. Accelerated secure GUI for virtualized mobile handsets

    Danisevskis, Janis

    2017-01-01

    Mobile handsets, especially so-called smartphones, have become an indispensable commodity in day-to-day life. However, their growing versatility came at the cost of ever-increasing complexity, and this raises severe security concerns. This has come to be especially problematic for corporate IT infrastructures, because it is increasingly hard to reconcile personal user expectations with corporate security demands. A particular manifestation of this quandary is the bring-your-own-device (BYOD) ...

  16. Unification of Information Security Policies for Network Security Solutions

    D.S. Chernyavskiy

    2012-03-01

    Full Text Available Diversity of command languages on network security solutions’ (NSS interfaces causes problems in a process of information security policy (ISP deployment. Unified model for security policy representation and implementation in NSS could aid to avoid such problems and consequently enhance efficiency of the process. The proposed solution is Unified language for network security policy (ULNSP. The language is based on formal languages theory, and being coupled with its translator, ULNSP makes it possible to formalize and implement ISP independently of particular NSS.

  17. 49 CFR 659.23 - System security plan: contents.

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false System security plan: contents. 659.23 Section 659... State Oversight Agency § 659.23 System security plan: contents. The system security plan must, at a... system security plan; and (e) Document the rail transit agency's process for making its system security...

  18. EVALUATING EFFECTIVENESS OF MOBILE BROWSER SECURITY WARNINGS

    Ronak Shah

    2016-09-01

    Full Text Available This work precisely evaluates whether browser security warnings are as ineffective as proposed by popular sentiments and past writings. This research used different kinds of Android mobile browsers as well as desktop browsers to evaluate security warnings. Security experts and developers should give emphasis on making a user aware of security warnings and should not neglect aim of communicating this to users. Security experts and system architects should emphasis the goal of communicating security information to end users. In most of the browsers, security warnings are not emphasized, and browsers simply do not show warnings, or there are a number of ways to hide those warnings of malicious sites. This work precisely finds that how inconsistent browsers really are in prompting security warnings. In particular, majority of the modern mobile web browsers are vulnerable to these security threats. We find inconsistency in SSL warnings among web browsers. Based on this work, we make recommendations for warning designers and researchers.

  19. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  20. Information security management handbook

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  1. Strategic information security

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  2. Security Bingo

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  3. Homomorphic encryption and secure comparison

    Damgård, Ivan Bjerre; Geisler, Martin; Krøigaard, Mikkel

    2008-01-01

    Computation (MPC). We show how our comparison protocol can be used to improve security of online auctions, and demonstrate that it is efficient enough to be used in practice. For comparison of 16 bits numbers with security based on 1024 bits RSA (executed by two parties), our implementation takes 0.28 sec......We propose a protocol for secure comparison of integers based on homomorphic encryption.We also propose a homomorphic encryption scheme that can be used in our protocol, makes it more efficient than previous solutions, and can also be used as the basis of efficient and general secure Multiparty...

  4. Computer security

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  5. Secure PVM

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  6. Junos Security

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  7. Unusual Manifestation of Cutaneous Sarcoidosis: A Case Report of Morpheaform Sarcoidosis

    Attiyeh Vasaghi

    2012-09-01

    Full Text Available Sarcoidosis is multi organ disease with cutaneous manifestation in 20%-35% patients. Cutaneous sarcoidosis has variable manifestations that make it difficult to diagnose. So clinical, histopathologic and laboratory evaluation is needed for diagnosis. Most of cutaneous lesions presents as nodul, maculopapule and plaque. Morpheaform lesion is a rare presentation of cutaneous sarcoidosis. This case had multiple indurated scaly plaques resemble morphea with granulomatous pattern in histopathologic examination. The patient responded to prednisolone in addition to hydroxychloroquine.

  8. Unusual Manifestation of Cutaneous Sarcoidosis: A Case Report of Morpheaform Sarcoidosis

    Attiyeh Vasaghi; Amir Kalafi

    2012-01-01

    Sarcoidosis is multi organ disease with cutaneous manifestation in 20%-35% patients. Cutaneous sarcoidosis has variable manifestations that make it difficult to diagnose. So clinical, histopathologic and laboratory evaluation is needed for diagnosis. Most of cutaneous lesions presents as nodul, maculopapule and plaque. Morpheaform lesion is a rare presentation of cutaneous sarcoidosis. This case had multiple indurated scaly plaques resemble morphea with granulomatous pattern in histopathologi...

  9. Roadmap on optical security

    Javidi, Bahram; Carnicer, Artur; Yamaguchi, Masahiro; Nomura, Takanori; Pérez-Cabré, Elisabet; Millán, María S.; Nishchal, Naveen K.; Torroba, Roberto; Fredy Barrera, John; He, Wenqi; Peng, Xiang; Stern, Adrian; Rivenson, Yair; Alfalou, A.; Brosseau, C.; Guo, Changliang; Sheridan, John T.; Situ, Guohai; Naruse, Makoto; Matsumoto, Tsutomu; Juvells, Ignasi; Tajahuerce, Enrique; Lancis, Jesús; Chen, Wen; Chen, Xudong; Pinkse, Pepijn W. H.; Mosk, Allard P.; Markman, Adam

    2016-08-01

    Information security and authentication are important challenges facing society. Recent attacks by hackers on the databases of large commercial and financial companies have demonstrated that more research and development of advanced approaches are necessary to deny unauthorized access to critical data. Free space optical technology has been investigated by many researchers in information security, encryption, and authentication. The main motivation for using optics and photonics for information security is that optical waveforms possess many complex degrees of freedom such as amplitude, phase, polarization, large bandwidth, nonlinear transformations, quantum properties of photons, and multiplexing that can be combined in many ways to make information encryption more secure and more difficult to attack. This roadmap article presents an overview of the potential, recent advances, and challenges of optical security and encryption using free space optics. The roadmap on optical security is comprised of six categories that together include 16 short sections written by authors who have made relevant contributions in this field. The first category of this roadmap describes novel encryption approaches, including secure optical sensing which summarizes double random phase encryption applications and flaws [Yamaguchi], the digital holographic encryption in free space optical technique which describes encryption using multidimensional digital holography [Nomura], simultaneous encryption of multiple signals [Pérez-Cabré], asymmetric methods based on information truncation [Nishchal], and dynamic encryption of video sequences [Torroba]. Asymmetric and one-way cryptosystems are analyzed by Peng. The second category is on compression for encryption. In their respective contributions, Alfalou and Stern propose similar goals involving compressed data and compressive sensing encryption. The very important area of cryptanalysis is the topic of the third category with two sections

  10. Prevalence of cutaneous manifestations of diabetes mellitus

    Ahmed, K.; Muhammad, Z.; Qayum, I.

    2009-01-01

    Diabetes mellitus (DM) is a clinical syndrome characterized by hyperglycaemia due to absolute or relative insulin deficiency. The aim of this study was to evaluate the frequency of skin manifestations in patients with diabetes mellitus of this area. This descriptive study was conducted in medical out patient door of District Headquarter Hospital Battgram from January 2008 to July 2008. A total of 350 diabetic (types 1 and 2) patients over 15 years of age attending the medical OPD of DHQ Hospital were examined in detail for skin manifestations of the disease. Three hundred and fifty diabetic (type-1 and type-2) patients (193 females and 157 males) enrolled in this study. Mean age of the patients was 54+-8.53 years. Duration of diabetes was between 1-12 years; 320 patients had type-2 and 30 patients had type-1 diabetes mellitus. Patients with uncontrolled disease were 327 and 23 patients showed adequate glycaemic control. Seventy-six percent of patients had cutaneous manifestations. The skin manifestations observed were: skin infections 30.9%, foot gangrene and ulcers 12.9%, pruritus 7.1%, vitiligo 5.7%, yellow skin 4.2%, diabetic dermopathy 4.2%, skin tags 3.7%, acanthosis nigricans 2.9%, eruptive xanthomas 2.6%, necrobiosis lipoidica diabeticorum 1.4%, diabetic bullae 0.6%, and pigmented purpuras in 0.3% patients. Cutaneous manifestations were quite Common in the diabetics of this area. (author)

  11. Articular manifestations in patients with Lyme disease.

    Vázquez-López, María Esther; Díez-Morrondo, Carolina; Sánchez-Andrade, Amalia; Pego-Reigosa, Robustiano; Díaz, Pablo; Castro-Gago, Manuel

    To determine the percentage of Lyme patients with articular manifestations in NW Spain and to know their evolution and response to treatment. A retrospective study (2006-2013) was performed using medical histories of confirmed cases of Lyme disease showing articular manifestations. Clinical and laboratory characteristics, together with the treatment and evolution of the patients, were analysed. Seventeen out of 108 LD confirmed patients (15.7%) showed articular manifestations. Regarding those 17 patients, 64.7%, 29.4% and 5.9% presented arthritis, arthralgia and bursitis, respectively. The knee was the most affected joint. Articular manifestations were often associated to neurological, dermatological and cardiac pathologies. Otherwise, most patients were in Stage III. The 11.8% of the cases progressed to a recurrent chronic arthritis despite the administration of an appropriate treatment. Lyme disease patients showing articular manifestations should be included in the diagnosis of articular affections in areas of high risk of hard tick bite, in order to establish a suitable and early treatment and to avoid sequels. Copyright © 2015 Elsevier España, S.L.U. and Sociedad Española de Reumatología y Colegio Mexicano de Reumatología. All rights reserved.

  12. Collective Security

    Galster, Kjeld

    in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed disinclination to accept that the collective security concept and international treaties and accords signed by Denmark should necessitate credible...... and other international treaties provided arguments for adjusting the foreign and security policy ambitions, and since the general flux in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed......Collective Security: National Egotism (Abstract) In Danish pre-World War I defence debate the notion of collective security is missing. During the early years of the 19th century, the political work is influenced by a pervasive feeling of rising tension and danger on the continent of Europe...

  13. Security Transformation

    Metz, Steven

    2003-01-01

    ... adjustment. With American military forces engaged around the world in both combat and stabilization operations, the need for rigorous and critical analysis of security transformation has never been greater...

  14. Automated Detection of Anomalous Shipping Manifests to Identify Illicit Trade

    Sanfilippo, Antonio P.; Chikkagoudar, Satish

    2013-11-12

    We describe an approach to analyzing trade data which uses clustering to detect similarities across shipping manifest records, classification to evaluate clustering results and categorize new unseen shipping data records, and visual analytics to provide to support situation awareness in dynamic decision making to monitor and warn against the movement of radiological threat materials through search, analysis and forecasting capabilities. The evaluation of clustering results through classification and systematic inspection of the clusters show the clusters have strong semantic cohesion and offer novel ways to detect transactions related to nuclear smuggling.

  15. Organising pneumonia as the first manifestation of rheumatoid arthritis

    Hoshino, Chisho; Satoh, Noriyuki; Narita, Masashi; Kikuchi, Akio; Inoue, Minoru

    2011-01-01

    Organising pneumonia (OP) is an inflammatory lung disease with distinctive clinicopathological features. OP can be evident during the course of rheumatoid arthritis (RA) with increased disease activity. The authors report an OP associated with RA case in which pulmonary symptoms preceded the onset of joint symptoms. An OP patient with elevated serum anticyclic citrullinated peptide antibody is likely to manifest RA in the near future, reflecting its high disease activity. Thus, an early rheumatologic consultation should be taken into consideration to make an early decision to initiate disease-modifying antirheumatic drugs therapy. PMID:22699479

  16. European Security

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  17. Data Security

    Lopez, Diego

    2013-01-01

    Training specialists in the field of data security and security administrators for the information systems represents a significant priority demanded by both governmental environments and the central and local administrations, as well as by the private sector - companies, banks. They are responsible for implementing information services and systems, but they are also their beneficiaries, with applicability in fields such as: e government, e-administration, e-banking, e-commerce, e-payment, wh...

  18. Changing principles in European social security

    van Oorschot, W.J.H.; Clasen, J.J.

    2002-01-01

    The provision of social security benefits rests on normative principles of social justice. Most strongly manifest in earnings-related social insurance, the principle of reciprocity has been increasingly questioned on grounds of equity, adequacy and fiscal viability, in the wake of socio-economic

  19. Nuclear security

    1991-12-01

    This paper reports that despite their crucial importance to national security, safeguards at the Department of Energy's (DOE) weapons facilities may be falling short. DOE security inspections have identified many weaknesses, including poor performance by members of DOE's security force, poor accountability for quantities of nuclear materials, and the inability of personnel to locate documents containing classified information. About 13 percent of the 2,100 identified weakness resulted in DOE inspectors giving out unsatisfactory security ratings; another 38 percent led to marginal ratings. In addition, DOE's centralized safeguards and security information tracking system lacks current data on whether DOE field offices have corrected the identified weaknesses. Without reliable information, DOE has no way of knowing whether timely action was taken to correct problems, nor can it determine whether weaknesses are systematic. DOE has tried to minimize the impact of these security weaknesses at its facilities by establishing multiple layers of protection measures and instituting interim and compensatory measures for identified weaknesses. DOE is planning enhancements to the centralized tracking system that should improve its reliability and increase its effectiveness

  20. FOOD SECURITY

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  1. 7 CFR 1738.22 - Loan security.

    2010-01-01

    ... 7 Agriculture 11 2010-01-01 2010-01-01 false Loan security. 1738.22 Section 1738.22 Agriculture... RURAL BROADBAND ACCESS LOANS AND LOAN GUARANTEES Loan Purposes and Basic Policies § 1738.22 Loan security. (a) RUS makes loans only if, in the judgment of the Administrator, the security therefore is...

  2. Cutaneous Manifestations of Systemic Lupus Erythematosus

    Uva, Luís; Miguel, Diana; Pinheiro, Catarina; Freitas, João Pedro; Marques Gomes, Manuel; Filipe, Paulo

    2012-01-01

    Systemic lupus erythematosus (SLE) is a multiorgan autoimmune disease of unknown etiology with many clinical manifestations. The skin is one of the target organs most variably affected by the disease. The American College of Rheumatology (ACR) established 11 criteria as a classificatory instrument to operationalise the definition of SLE in clinical trials. They were not intended to be used to diagnose individuals and do not do well in that capacity. Cutaneous lesions account for four of these 11 revised criteria of SLE. Skin lesions in patients with lupus may be specific or nonspecific. This paper covers the SLE-specific cutaneous changes: malar rash, discoid rash, photosensitivity, and oral mucosal lesions as well as SLE nonspecific skin manifestations, their pathophysiology, and management. A deeper thorough understanding of the cutaneous manifestations of SLE is essential for diagnosis, prognosis, and efficient management. Thus, dermatologists should cooperate with other specialties to provide optimal care of SLE patient. PMID:22888407

  3. Vertigo as a Predominant Manifestation of Neurosarcoidosis

    Tasnim F. Imran

    2015-01-01

    Full Text Available Sarcoidosis is a granulomatous disease of unknown etiology that affects multiple organ systems. Neurological manifestations of sarcoidosis are less common and can include cranial neuropathies and intracranial lesions. We report the case of a 21-year-old man who presented with vertigo and uveitis. Extensive workup including brain imaging revealed enhancing focal lesions. A lacrimal gland biopsy confirmed the diagnosis of sarcoidosis. The patient was initially treated with prednisone, which did not adequately control his symptoms, and then was switched to methotrexate with moderate symptomatic improvement. Our patient had an atypical presentation with vertigo as the predominant manifestation of sarcoidosis. Patients with neurosarcoidosis typically present with systemic involvement of sarcoidosis followed by neurologic involvement. Vertigo is rarely reported as an initial manifestation. This case highlights the importance of consideration of neurosarcoidosis as an entity even in patients that may not have a typical presentation or systemic involvement of disease.

  4. Leukemic Oral Manifestations and their Management.

    Francisconi, Carolina Favaro; Caldas, Rogerio Jardim; Oliveira Martins, Lazara Joyce; Fischer Rubira, Cassia Maria; da Silva Santos, Paulo Sergio

    2016-01-01

    Leukemia is the most common neoplastic disease of the white blood cells which is important as a pediatric malignancy. Oral manifestations occur frequently in leukemic patients and may present as initial evidence of the disease or its relapse. The symptoms include gingival enlargement and bleeding, oral ulceration, petechia, mucosal pallor, noma, trismus and oral infections. Oral lesions arise in both acute and chronic forms of all types of leukemia. These oral manifestations either may be the result of direct infiltration of leukemic cells (primary) or secondary to underlying thrombocytopenia, neutropenia, or impaired granulocyte function. Despite the fact that leukemia has long been known to be associated with oral lesions, the available literature on this topic consists mostly of case reports, without data summarizing the main oral changes for each type of leukemia. Therefore, the present review aimed at describing oral manifestations of all leukemia types and their dental management. This might be useful in early diagnosis, improving patient outcomes.

  5. Security an introduction

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  6. Military veterans and Social Security.

    Olsen, Anya

    There are 9.4 million military veterans receiving Social Security benefits, which means that almost one out of every four adult Social Security beneficiaries has served in the United States military. In addition, veterans and their families make up almost 40 percent of the adult Social Security beneficiary population. Policymakers are particularly interested in military veterans and their families and have provided them with benefits through several government programs, including Social Security credits, home loan guarantees, and compensation and pension payments through the Department of Veterans Affairs. It is therefore important to understand the economic and demographic characteristics of this population. Information in this article is based on data from the March 2004 Current Population Survey, a large, nationally representative survey of U.S. households. Veterans are overwhelmingly male compared with all adult Social Security beneficiaries who are more evenly split between males and females. Military veterans receiving Social Security are more likely to be married and to have finished high school compared with all adult Social Security beneficiaries, and they are less likely to be poor or near poor than the overall beneficiary population. Fourteen percent of veterans receiving Social Security benefits have income below 150 percent of poverty, while 25 percent of all adult Social Security beneficiaries are below this level. The higher economic status among veterans is also reflected in the relatively high Social Security benefits they receive. The number of military veterans receiving Social Security benefits will remain high over the next few decades, while their make-up and characteristics will change. In particular, the number of Vietnam War veterans who receive Social Security will increase in the coming decades, while the number of veterans from World War II and the Korean War will decline.

  7. Otorhinolaryngologic manifestations of cystic fibrosis: literature review

    Carvalho, Carolina Pimenta

    2008-12-01

    Full Text Available Introduction: Cystic Fibrosis is the most common recessive autosomic genetic disease among Caucasians. It's caused by mutations in the gene that decodes regulatory protein for transmembrane conductance, resulting in defective transport of chlorine. Objective: Review the literature about Cystic Fibrosis, with emphasis on otorhinolaryngologic manifestations. Method: The online Pub Med databases were researched and we applied the following search terms Fibrosis Cystic and Sinusitis, and Mucoviscidosis and Sinusitis. Conclusions: Although it is not the main cause of death, the otorhinolaryngologic manifestations of the Cystic Fibrosis bring important morbidity to these patients.

  8. Idiopathic Pulmonary Fibrosis: Diagnosis and Clinical Manifestations

    Nakamura, Yutaro; Suda, Takafumi

    2015-01-01

    Idiopathic pulmonary fibrosis (IPF) is a parenchymal lung disease characterized by progressive interstitial fibrosis. The clinical course of IPF can be unpredictable and may be punctuated by acute exacerbations. Although much progress is being made in unraveling the mechanisms underlying IPF, effective therapy for improving survival remains elusive. Longitudinal disease profiling, especially in terms of clinical manifestations in a large cohort of patients, should lead to proper management of the patients and development of new treatments for IPF. Appropriate multidisciplinary assessment in ongoing registries is required to achieve this. This review summarizes the current status of the diagnosis and clinical manifestations of IPF. PMID:27625576

  9. Skeletal manifestations of granulocytic sarcoma (chloroma)

    Hermann, G.; Abdelwahab, I.F. (Mount Sinai Medical Center, New York, NY (United States). Dept. of Radiology); Feldman, F. (Columbia Presbyterian Medical Center, New York, NY (United States)); Klein, M.J. (Mount Sinai Medical Center, New York, NY (United States). Dept. of Pathology)

    1991-10-01

    Skeletal manifestations of chloroma were reviewed in five patients. In four cases, a chloroma was the initial manifestation of a systemic disease. In the fifth, an elderly patient developed a bone lesion during a blastic crisis while under treatment for chronic myelogeneous leukemia. Two patients presented with lytic lesions of the ribs, two with lytic lesions of the femur, and one with a predominantly sclerotic lesion of the scapula. The laboratory findings in two patients were within normal limits. All lesions were confirmed by bone biopsy. (orig.).

  10. Congenital rubella syndrome and delayed manifestations

    Dammeyer, Jesper Herup

    2010-01-01

    Objective: Several hypotheses of different medical and psychological delayed manifestations among people who have congenital rubella syndrome (CRS) have been discussed. This study tests some of these hypotheses of delayed manifestations. Methods: Gathering information about 35 individuals who hav...... which people with CRS face must primarily be understood in relation to congenital deafblindness and dual sensory and communicative deprivation....... CRS and who are congenitally deafblind. Results: None of the hypotheses could be confirmed when individuals with CRS were compared to a control group of individuals who were congenital deafblind with different aetiology than CRS. Conclusions: This study concludes that those health related problems...

  11. Zen and the art of information security

    Winkler, Ira

    2007-01-01

    While security is generally perceived to be a complicated and expensive process, Zen and the Art of Information Security makes security understandable to the average person in a completely non-technical, concise, and entertaining format. Through the use of analogies and just plain common sense, readers see through the hype and become comfortable taking very simple actions to secure themselves. Even highly technical people have misperceptions about security concerns and will also benefit from Ira Winkler's experiences making security understandable to the business world. Mr. Winkler is one of the most popular and highly rated speakers in the field of security, and lectures to tens of thousands of people a year. Zen and the Art of Information Security is based on one of his most well received international presentations.

  12. Vehicular ad hoc network security and privacy

    Lin, X

    2015-01-01

    Unlike any other book in this area, this book provides innovative solutions to security issues, making this book a must read for anyone working with or studying security measures. Vehicular Ad Hoc Network Security and Privacy mainly focuses on security and privacy issues related to vehicular communication systems. It begins with a comprehensive introduction to vehicular ad hoc network and its unique security threats and privacy concerns and then illustrates how to address those challenges in highly dynamic and large size wireless network environments from multiple perspectives. This book is richly illustrated with detailed designs and results for approaching security and privacy threats.

  13. Conceptualizing energy security

    Winzer, Christian

    2012-01-01

    Energy security is one of the main targets of energy policy. However, the term has not been clearly defined, which makes it hard to measure and difficult to balance against other policy objectives. We review the multitude of definitions of energy security. They can be characterized according to the sources of risk, the scope of the impacts, and the severity filters in the form of the speed, size, sustention, spread, singularity and sureness of impacts. Using a stylized case study for three European countries, we illustrate how the selection of conceptual boundaries along these dimensions determines the outcome. This can be avoided by more clearly separating between security of supply and other policy objectives. This leads us to the definition of energy security as the continuity of energy supplies relative to demand. - Highlights: ► The widest energy security concept includes all risks that are caused by or have an impact on the energy supply chain. ► Authors narrow this down by choosing different risk sources, impact measures and subjective severity filters in their definitions. ► The selection of conceptual boundaries determines outcome of quantitative studies.

  14. Security of M-Commerce transactions

    Ion IVAN; Daniel MILODIN; Alin ZAMFIROIU

    2013-01-01

    In this material electronic market are defined. How they are structured. Security in E-Commerce applications is very important both at the administrative level and from the user perspective. The new trend in the field is the M-commerce that involves making purchases through mobile devices. And for M-commerce transactions the security is a very important thing. Here’s how to analyze the security of M-commerce transactions and ways to increase security for these transactions taki...

  15. Diverse Neurological Manifestations of Lead Encephalopathy ...

    Three patients with lead encephalopathy due to industrial poisoning are presented. They all showed a wide spectrum of neurological manifestations, which mimic other neurological presentations. It is emphasised that lead poisoning still occurs in industry, despite efforts at prevention. S. Afr. Med. J., 48, 1721 (1974) ...

  16. The extrahepatic manifestations of hepatitis B virus.

    Baig, Saeeda; Alamgir, Mohiuddin

    2008-07-01

    Hepatitis B Virus (HBV) leads to a number of hepatic complications, from acute to chronic hepatitis, cirrhosis and hepatocellular carcinoma, is a well-established fact. Upcoming clinical research, over the years, associates numerous extrahepatic manifestations during the acute and chronic episodes of hepatitis B with significant morbidity and mortality. A causal relationship between HBV and serious autoimmune disorders has also been observed among certain susceptible vaccine recipients in a defined temporal period following immunization. The cause of these extrahepatic manifestations is generally believed to be immune mediated. The most commonly described include skin rash, arthritis, arthralgia, glomerulonephritis, polyarteritis nodosa, and papular acrodermatitis etc. The serum-sickness like "arthritis-dermatitis" prodrome has also been observed in approximately one-third of patients acquiring HBV infections. Skin manifestations of HBV infection typically present as palpable purpura reported to be caused by chronic HBV, although this association remains controversial. To consider the relationship between HBV and other clinically significant disorders as well as serious autoimmune disorders among certain vaccine recipients is the topic of this review. Variable factors that influence extrahepatic manifestation are discussed, including possible synergy between hepatitis B virus and the immune system.

  17. Imaging the Abdominal Manifestations of Cystic Fibrosis

    C. D. Gillespie

    2017-01-01

    Full Text Available Cystic fibrosis (CF is a multisystem disease with a range of abdominal manifestations including those involving the liver, pancreas, and kidneys. Recent advances in management of the respiratory complications of the disease has led to a greater life expectancy in patients with CF. Subsequently, there is increasing focus on the impact of abdominal disease on quality of life and survival. Liver cirrhosis is the most important extrapulmonary cause of death in CF, yet significant challenges remain in the diagnosis of CF related liver disease. The capacity to predict those patients at risk of developing cirrhosis remains a significant challenge. We review representative abdominal imaging findings in patients with CF selected from the records of two academic health centres, with a view to increasing familiarity with the abdominal manifestations of the disease. We review their presentation and expected imaging findings, with a focus on the challenges facing diagnosis of the hepatic manifestations of the disease. An increased familiarity with these abdominal manifestations will facilitate timely diagnosis and management, which is paramount to further improving outcomes for patients with cystic fibrosis.

  18. Hepatic angiosarcoma manifested as recurrent hemoperitoneum

    Lee, Seung-Woo; Song, Chun-Young; Gi, Young-Hwa; Kang, Sang-Beom; Kim, Yon-Soo; Nam, Soon-Woo; Lee, Dong-Soo; Kim, Jong-Ok

    2008-01-01

    Angiosarcoma is a rare tumor that account for less than 1% of all sarcomas. Although hepatic angiosarcoma usually presents with unspecific symptoms, it rapidly progresses and has a high mortality. We report a rare case of primary hepatic angiosarcoma manifested as recurrent hemoperitoneum. PMID:18473427

  19. Neurological and neurosurgical manifestations of human ...

    Neurological and neurosurgical manifestations of human immunodeficiency virus (HIV) infection in Mrica. Adelola Adeloye MS FRCS FRCP. Professor. Department of Surgery, College of Medicine. Blantyre, Malawi. Introduction. AIDS was first recognised in the United States of . America in the late 1970s among homosexual ...

  20. Caracterisation des dechets solides des grandes manifestations ...

    This situation aggravates the structural inadequacy of the city managers and leads to unsanitary. The content of a pilgrim's trash behaves like a mirror reflecting his consumption habits, his attitude towards a manifestation of piety in the public space considered as private area as well as a no man's land. Keywords: Dassa ...

  1. Radiological pulmonary manifestations of acquired immunodeficiency syndrome

    Marchiori, Edson; Melo, Alessandro Severo Alves de; Ossa, Alfonso Jaramillo

    1999-01-01

    In this article are reviewed the principal radiologic manifestations of inflammatory and tumoral diseases the compromise the lungs of patients with acquired immunodeficiency syndrome. In the group of inflammatory diseases the radiologic aspects of pneumocystosis, cytomegalovirus disease, cryptococcosis, tuberculosis and bacterial pneumonias are emphasized. In the neoplasic diseases' group the aspects of lymphoma and Kaposi's sarcoma are specially presented. (author)

  2. Propylthiouracil induced leukocytoclastic vasculitis: A rare manifestation

    Semra Ayturk

    2013-01-01

    Full Text Available Propylthiouracil (PTU is a common drug used in patients with hyperthyroidism. It may cause perinuclearantineutrophil cytoplasmic antibodies (p-ANCA in few patients with Graves′ disease. This antibody has been associated with different forms of vasculitis. We report a patient who presented with cutaneous manifestations of leukocytoclasticvasculitis with simultaneous development of p-ANCAs during PTU therapy for Graves′ disease.

  3. CT manifestations of pulmonary Langerhans cell histiocytosis

    Qiang Jun; Yu Wei; Gao Wanqin; Song Haiqiao; Ma Yingjian

    2010-01-01

    Objective: To analyzes the CT manifestations of pulmonary Langerhans cell histiocytosis (PLCH). Methods: CT features of 11 patients with PLCH proved pathologically were analyzed retrospectively. Results: The main findings in 11 PLCHs were cysts and nodules. Two cases only had cysts, and 1 only had nodules, which most had cavitations. The other 8 cases showed cysts and nodules with 4 cases mainly manifested with cysts and nine mainly manifested with nodules. Two cases had pulmonary interstitial changes. One case only had cysts in the left upper lung field and 10 cases had lesions not only in the upper and middle but in the lower lung field, which 2 cases had more lesions in the lower and costo-phrenic angle field and 8 cases had less lesions in the costo-phrenic angle field. Three of these 8 cases had more lesions in the superior lobe and apical segment of lower lobe. Conclusion: CT manifestations of PLCH are helpful for the early diagnosis. (authors)

  4. Effects of Onchocerciasis Manifestations on Academic Performance ...

    ... in order to reduce the parasite reservoir in man, and also breaking the man-fly contact either by use of repellents or through proper covering of the body during outdoor activities. Key Words: Onchocerciasis, manifestation, academic performance, weighted average, visual impairment. Bio-Research Vol.1(2) 2003: 77-85 ...

  5. Mechanisms And Variegated Manifestations Of Inteference In ...

    Nigerian bilinguals' use of English as a second language is fraught with interference from L1 to L2, a phenomenon that is commonplace world-wide as a linguistic enterprise. But the extent of this trend in bilinguals varies from one language to another based on sociolinguistic and cultural variables. In Nigeria, manifestations ...

  6. Privatising Security

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  7. COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS

    Sumant Ku Mohapatra; Biswa Ranjan Swain; Pravanjan Das

    2015-01-01

    This paper presents a brief study of recent advances in wireless network security issues. The paper makes a number of contributions to the wireless networking field. First, it studies the 4G mail threats and risk and their design decisions. Second, the security of 4G architecture with next generation network security and 8- security dimensions of 4G network. Third, security issues and possible threats on 4G are discussed. Finally, we proposed four layer security model which manage...

  8. Information Security

    Hartel, Pieter H.; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W.Ph.

    2012-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is

  9. Food security

    Ridder, M. de

    2011-01-01

    Food security is back on the agenda as a top priority for policy makers. In January 2011, record high food prices resulted in protests in Tunisia, which subsequently led to the spread of the revolutions in other North African and Middle Eastern countries. Although experts have asserted that no

  10. 78 FR 11877 - Announcement of Requirements Gathering Meetings for the Electronic Manifest (e-Manifest) System

    2013-02-20

    ... either electronically through www.regulations.gov or in hard copy at the Resource Conservation and... of proposed rulemaking that, among other things, proposed revisions to the Federal manifest program...

  11. Nephrogenic systemic fibrosis: late skin manifestations

    Bangsgaard, Nannie; Marckmann, Peter; Rossen, Kristian

    2009-01-01

    BACKGROUND: Nephrogenic systemic fibrosis (NSF) is a serious disease that occurs in patients with severe renal disease and is believed to be caused by gadolinium-containing contrast agents. A detailed description of the late skin manifestations of NSF is important to help dermatologists...... and nephrologists recognize the disease. OBSERVATIONS: We studied 17 patients with NSF late in the disease. All patients showed epidermal atrophy and hairlessness of the affected regions, primarily the lower legs. Affected areas were symmetrically distributed and hyperpigmented in most cases. Eleven patients showed......: This descriptive case series of patients with NSF gives a detailed clinical picture of the skin manifestations late in the disease. It demonstrates that the clinical picture in the late stage has a varied presentation and that NSF has a significant effect on the quality of life....

  12. THE INDIVIDUAL SOVEREIGNTY: CONCEPTUALIZATION AND MANIFESTATION

    Nikola Lj. Ilievski

    2015-09-01

    Full Text Available This paper is qualitative and theoretical research of the concept of sovereignty and the libertarian theory, particularly the concept of individual liberty. It represents a concept developing study, with a specific accent laid on the individual liberty, and the theoretically established concept of sovereignty. The research focus could be identified with the conceptualization and manifestation of the individual sovereignty, as a theoretical phenomenon that is not fully conceptualized and strictly defined. In the scope of this paper, content analysis method and comparative method are used. The analysis, comparison and synthesis refer to the theories of sovereignty and the theory of libertarianism, resulting in developing the concept of individual sovereignty and its socio-political manifestation.

  13. Clinical Manifestations of the Opiate Withdrawal Syndrome

    Faniya Shigakova

    2015-09-01

    Full Text Available Currently, substance abuse is one of the most serious problems facing our society. The aim of this study was to investigate the clinical manifestations of the opiate withdrawal syndrome (OWS. The study included 112 patients (57 women and 55 men aged from 18 to 64 years with opium addiction according to the DSM-IV. To study the clinical manifestation of OWS, the special 25-score scale with four sections to assess severity of sleep disorders, pain syndrome, autonomic disorders, and affective symptoms was used. Given the diversity of the OWS symptoms, attention was focused on three clinical variants, affective, algic and mixed. The OWS affective variant was registered more frequently in women, while the mixed type of OWS was more typical of men.

  14. Clinical manifestations and diagnosis of acromegaly.

    Lugo, Gloria; Pena, Lara; Cordido, Fernando

    2012-01-01

    Acromegaly and gigantism are due to excess GH production, usually as a result of a pituitary adenoma. The incidence of acromegaly is 5 cases per million per year and the prevalence is 60 cases per million. Clinical manifestations in each patient depend on the levels of GH and IGF-I, age, tumor size, and the delay in diagnosis. Manifestations of acromegaly are varied and include acral and soft tissue overgrowth, joint pain, diabetes mellitus, hypertension, and heart and respiratory failure. Acromegaly is a disabling disease that is associated with increased morbidity and reduced life expectancy. The diagnosis is based primarily on clinical features and confirmed by measuring GH levels after oral glucose loading and the estimation of IGF-I. It has been suggested that the rate of mortality in patients with acromegaly is correlated with the degree of control of GH. Adequately treated, the relative mortality risk can be markedly reduced towards normal.

  15. Manifestations of Gorlin-Goltz syndrome

    Larsen, Anne Kristine; Mikkelsen, Dorthe; Hertz, Jens Michael

    2014-01-01

    INTRODUCTION: Gorlin-Goltz syndrome is an uncommon hereditary condition caused by mutations in the PTCH1 gene causing a wide range of developmental abnormalities. Multiple basal cell carcinomas, palmoplantar pits and jaw cysts are cardinal features. Many clinicians are unfamiliar with the different...... manifestations and the fact that patients are especially sensitive to ionizing radiation. MATERIAL AND METHODS: This was a retrospective analysis of patients with Gorlin-Goltz syndrome seen at the Department of Dermatology and Allergy Centre or at Department of Plastic Surgery, Odense University Hospital...... families and none of these mutations had previously been described. CONCLUSION: The patient cohort illustrates classic and rare disease manifestations. It is necessary to remind clinicians that radiation therapy in Gorlin-Goltz syndrome is relatively contraindicated. Today, mutation analysis can be used...

  16. Acute dacryocystitis: another clinical manifestation of sporotrichosis.

    Freitas, Dayvison Francis Saraiva; Lima, Iluska Augusta Rocha; Curi, Carolina Lemos; Jordão, Livia; Zancopé-Oliveira, Rosely Maria; Valle, Antonio Carlos Francesconi do; Galhardo, Maria Clara Gutierrez; Curi, Andre Luiz Land

    2014-04-01

    Sporotrichosis associated with exposure to domestic cats is hyperendemic in Rio de Janeiro, Brazil. A review of the clinical records at our institute revealed four patients with clinical signs of dacryocystitis and a positive conjunctival culture for Sporothrix who were diagnosed with Sporothrix dacryocystitis. Three patients were children (sporotrichosis. Dacryocystitis was associated with nodular, ulcerated lesions on the face of one patient and with granulomatous conjunctivitis in two patients; however, this condition manifested as an isolated disease in another patient. All of the patients were cured of the fungal infections, but three patients had chronic dacryocystitis and one patient developed a cutaneous fistula. Sporotrichosis is usually a benign disease, but may cause severe complications when the eye and the adnexa are affected. Physicians, especially ophthalmologists in endemic areas, should be aware of the ophthalmological manifestations and complications of sporotrichosis.

  17. Acute dacryocystitis: another clinical manifestation of sporotrichosis

    Dayvison Francis Saraiva Freitas

    2014-04-01

    Full Text Available Sporotrichosis associated with exposure to domestic cats is hyperendemic in Rio de Janeiro, Brazil. A review of the clinical records at our institute revealed four patients with clinical signs of dacryocystitis and a positive conjunctival culture for Sporothrix who were diagnosed with Sporothrix dacryocystitis. Three patients were children (< 13 years of age and one patient was an adult. Two patients reported contact with a cat that had sporotrichosis. Dacryocystitis was associated with nodular, ulcerated lesions on the face of one patient and with granulomatous conjunctivitis in two patients; however, this condition manifested as an isolated disease in another patient. All of the patients were cured of the fungal infections, but three patients had chronic dacryocystitis and one patient developed a cutaneous fistula. Sporotrichosis is usually a benign disease, but may cause severe complications when the eye and the adnexa are affected. Physicians, especially ophthalmologists in endemic areas, should be aware of the ophthalmological manifestations and complications of sporotrichosis.

  18. Antiphospholipid antibody: laboratory, pathogenesis and clinical manifestations

    T. Ziglioli

    2011-06-01

    Full Text Available Antiphospholipid antibodies (aPL represent a heterogeneous group of antibodies that recognize various antigenic targets including beta2 glycoprotein I (β2GPI, prothrombin (PT, activated protein C, tissue plasminogen activator, plasmin and annexin A2. The most commonly used tests to detect aPL are: lupus anticoagulant (LAC, a functional coagulation assay, anticardiolipin antibody (aCL and anti-β2GPI antibody (anti-β2GPI, which are enzyme-linked immunoassay (ELISA. Clinically aPL are associated with thrombosis and/or with pregnancy morbidity. Apparently aPL alone are unable to induce thrombotic manifestations, but they increase the risk of vascular events that can occur in the presence of another thrombophilic condition; on the other hand obstetrical manifestations were shown to be associated not only to thrombosis but mainly to a direct antibody effect on the trophoblast.

  19. The chronic gastrointestinal manifestations of Chagas disease

    Nilce Mitiko Matsuda

    2009-01-01

    Full Text Available Chagas disease is an infectious disease caused by the protozoan Trypanosoma cruzi. The disease mainly affects the nervous system, digestive system and heart. The objective of this review is to revise the literature and summarize the main chronic gastrointestinal manifestations of Chagas disease. The chronic gastrointestinal manifestations of Chagas disease are mainly a result of enteric nervous system impairment caused by T. cruzi infection. The anatomical locations most commonly described to be affected by Chagas disease are salivary glands, esophagus, lower esophageal sphincter, stomach, small intestine, colon, gallbladder and biliary tree. Chagas disease has also been studied in association with Helicobacter pylori infection, interstitial cells of Cajal and the incidence of gastrointestinal cancer.

  20. Violent and criminal manifestations in dementia patients.

    Cipriani, Gabriele; Lucetti, Claudio; Danti, Sabrina; Carlesi, Cecilia; Nuti, Angelo

    2016-05-01

    Although the older adults have been studied as victims of violence, geriatric patients can display violent behavior. The purpose of the present review was to explore the phenomenon of criminal violations and violent acts in people with dementia. The authors used PubMed to search the MEDLINE database and other sources for original research and review articles on criminal and violent manifestation in demented patients combining the terms "criminal manifestation," "violence, aggressive behavior," "homicide," "suicide" and "homicide-suicide" together with "dementia". Possible biomarkers of violence are considered. The present review highlights the risk factors for violence in patients suffering from dementia, and reviews the literature about criminal violations and homicidal/suicidal behavior in this patient group. Geriatr Gerontol Int 2016; 16: 541-549. © 2015 Japan Geriatrics Society.

  1. ORAL MANIFESTATIONS AMONG ROMANIAN HIV PATIENTS

    Manuela ARBUNE

    2013-03-01

    Full Text Available The objective of the study is to evaluate the oral health problems on HIV youth patients from Galati. Materials and method. A cross-sectional study assessed 102 patients with mean age 22. The most frequent oral manifestations on HIV infected youth under ART are erythema marginatum, periodontitis, candidosis and hypertrophia gingivalis. Results and discussion. Dental decay-missing-filled index on HIV patients is high. Viral HIV replication, long time pediatric exposure on HIV, male sex, smoking, and oral inflamation are related to dental poor condition. Exodontic therapy is comon among HIV youth. However, persistence of some associated oral infections is related to individual or behavioral risk factors, but also to some newly found mechanisms, such as disfunctional immune reconstruction. Seeing to antiretroviral treatment, the severity and frequency of oral manifestations decreased among HIV patients on antiretroviral treatment. Conclusions. Developing medical, social and educational programs is imperative for improving the oral health of HIV youth of Galati.

  2. Pattern of cutaneous manifestations in diabetes mellitus

    Goyal Abhishek

    2010-01-01

    Full Text Available Background: Diabetes mellitus affects individuals of all ages and socioeconomic status. Skin is affected by the acute metabolic derangements as well as by chronic degenerative complications of diabetes. Aims: To evaluate the prevalence of skin manifestations in patients with diabetes mellitus. To analyze the prevalence and pattern of skin disorders among diabetic patients from this region of Western Himalayas. Materials and Methods: One hundred consecutive patients with the diagnosis of diabetes mellitus and having skin lesions, either attending the diabetic clinic or admitted in medical wards were included in this study. Results: The common skin disorders were: x0 erosis (44%, diabetic dermopathy (36%, skin tags (32%, cutaneous infections (31%, and seborrheic keratosis (30%. Conclusion: Skin is involved in diabetes quite often and the manifestations are numerous. High prevalence of xerosis in our diabetic population is perhaps due to cold and dry climatic conditions in the region for most of the time in the year.

  3. Clinical Manifestations and Diagnosis of Acromegaly

    Gloria Lugo

    2012-01-01

    Full Text Available Acromegaly and gigantism are due to excess GH production, usually as a result of a pituitary adenoma. The incidence of acromegaly is 5 cases per million per year and the prevalence is 60 cases per million. Clinical manifestations in each patient depend on the levels of GH and IGF-I, age, tumor size, and the delay in diagnosis. Manifestations of acromegaly are varied and include acral and soft tissue overgrowth, joint pain, diabetes mellitus, hypertension, and heart and respiratory failure. Acromegaly is a disabling disease that is associated with increased morbidity and reduced life expectancy. The diagnosis is based primarily on clinical features and confirmed by measuring GH levels after oral glucose loading and the estimation of IGF-I. It has been suggested that the rate of mortality in patients with acromegaly is correlated with the degree of control of GH. Adequately treated, the relative mortality risk can be markedly reduced towards normal.

  4. Radiographic manifestations of reperfusion edema after transplantation

    Park, Se Young; Kim, Tae Hoon; Ryu, Young Hoon; Moon, Sung Wook; Kim, Hyung Joong; Ahn, Chul Min; Paik, Hyo Chae; Lee, Doo Yun; Kim, Sang Jin

    2003-01-01

    To elucidate the sequential radiologic manifestations of reperfusion edema after lung transplantation. The study group comprised five consecutive lung transplant recipients (M:F=3:2;mean age; 47.5 years) who between July 1996 and April 2002 underwent lung transplantation procedures (four, unilateral; one, bilateral) at our institution. We retrospectively reviewed the serial postoperative radiographs obtained and characterized the lung infiltrates. Lung infiltrates compatible with reperfusion edema were present in all patients (5/5). Reperfusion edema appeared on day 1 in four, and by day 2 in the other. In all transplanted lungs, infiltrates were found in the perihilar and basilar regions, and were scored as maximal on day 1 in one, day 3 in two, day 4 in one and day 5 in the other. The recognition of sequential radiological manifestations helps identify recognition of reperfusion edema after lung transplantation

  5. Thoracic manifestations of ovarian hyperstimulation syndrome

    Levin, M.F.; Hutton, L.C.; Kaplan, B.R. [University of Western Ontario, London, ON (Canada)

    1995-02-01

    In order to determine the thoracic manifestations of severe ovarian hyperstimulation syndrome, the medical records and available images of 771 patients who had received gonadotropins to induce superovulation, were reviewed. In 22 patients (3%) severe hyperstimulation syndrome was diagnosed clinically and confirmed with ultrasonography (US). Pleural effusion occurred in five of these (23%), one of whom required thoracentesis. Atelectasis and internal jugular vein thrombosis developed in one patient, and ventilation-perfusion mismatch occurred in another. The study concluded that respiratory distress in patients with ovarian hyperstimulation syndrome was most likely due to lung restriction. Pulmonary manifestations formed an important part of this syndrome, and radiologic input were considered necessary for assessment, monitoring and management. 10 refs., 2 figs., 1 tab.

  6. The radiological manifestations of sickle cell disease

    Madani, G.; Papadopoulou, A.M.; Holloway, B.; Robins, A.; Davis, J.; Murray, D.

    2007-01-01

    Sickle cell disease (SCD) is an inherited abnormality of the ss-globin chain, which causes a spectrum of haemolytic anaemias. Clinical manifestations in SCD include anaemia, jaundice, recurrent vaso-occlusive crises, and infections (particularly by encapsulated bacteria) due to functional asplenia and cerebrovascular accidents. Radiological investigations play a critical role both in the diagnosis and in the primary prevention of the complications of SCD

  7. Unusual roentgenologic manifestations of Meckel's diverticulum

    Miller, K.B.; Naimark, A.; O'Connor, J.F.; Bouras, L.

    1981-01-01

    Five cases illustrating rare roentgenographic manifestations of Meckel's diverticulum are presented. Small bowel studies in 2 patients demonstrated a mucosal pattern identifiable as heterotopic gastric rugae, and in 2 other cases peptic ulcers were seen within the diverticulum. In 1 patient the diverticulum located in the right upper quadrant contained calcified enteroliths, and in another patient the diverticulum had fistulous communication with the appendix. (orig.)

  8. Musculoskeletal manifestations in type 2 diabetes mellitus

    Deepti P. Deshmukh; Asmita G. Akarte

    2017-01-01

    Background: Musculoskeletal complications of diabetes have been generally ignored and poorly treated as compared to other complications. Hence we carried out this study to find the prevalence of musculoskeletal manifestations in type II diabetes mellitus and its correlation with age, BMI, duration of diabetes, and control of diabetes. Methods: 100 consecutive patients of type II diabetes were studied. Duration of diabetes, control of diabetes, and any musculoskeletal complaints were noted....

  9. Nasal manifestations in chromium industry workers.

    Aiyer, R G; Kumar, Gaurav

    2003-04-01

    People working in mines, plating factories, cement industries are mainly exposed to chrome substances, IIexavalent chromium has been implicated for its toxic effect on the nasal mucosa. Hereby we present a rare study of 28 patients who attended out patient department of Otorhinolaryngology at SSG Hospital, Baroda from a nearby chromium industry. This study aims to present various nasal manifestations of toxic effects of prolonged chromium exposure.

  10. The radiological manifestations of sickle cell disease

    Madani, G. [Department of Radiology, Royal Free Hospital NHS Trust, London (United Kingdom)]. E-mail: gittamadani@yahoo.com; Papadopoulou, A.M. [Department of Radiology, Royal Free Hospital NHS Trust, London (United Kingdom); Holloway, B. [Department of Radiology, Royal Free Hospital NHS Trust, London (United Kingdom); Robins, A. [Department of Paediatrics, Whittington Hospital NHS Trust, London (United Kingdom); Davis, J. [Department of Radiology, Whittington Hospital NHS Trust, London (United Kingdom); Murray, D. [Department of Radiology, Whittington Hospital NHS Trust, London (United Kingdom)

    2007-06-15

    Sickle cell disease (SCD) is an inherited abnormality of the ss-globin chain, which causes a spectrum of haemolytic anaemias. Clinical manifestations in SCD include anaemia, jaundice, recurrent vaso-occlusive crises, and infections (particularly by encapsulated bacteria) due to functional asplenia and cerebrovascular accidents. Radiological investigations play a critical role both in the diagnosis and in the primary prevention of the complications of SCD.

  11. ORAL MANIFESTATIONS AMONG ROMANIAN HIV PATIENTS

    Manuela ARBUNE; Oana-Mirela POTÂRNICHIE; Silvia MARTU

    2013-01-01

    The objective of the study is to evaluate the oral health problems on HIV youth patients from Galati. Materials and method. A cross-sectional study assessed 102 patients with mean age 22. The most frequent oral manifestations on HIV infected youth under ART are erythema marginatum, periodontitis, candidosis and hypertrophia gingivalis. Results and discussion. Dental decay-missing-filled index on HIV patients is high. Viral HIV replication, long time pediatric exposu...

  12. Les manifestations cardiovasculaires chez les hemodialyses ...

    Le but de l'étude est d'analyser sur une période de 12 mois chez 75 patients en hémodialyse chronique, âgés de 38ans en moyenne, le les aspects cliniques, thérapeutiques et évolutifs des manifestations cardiovasculaires. La prévalence est de 87,20% chez les patients. Les signes fonctionnels les plus fréquents sont la ...

  13. Tardive Dystonia: Clinical Spectrum and Novel Manifestations

    R. Jeffrey Davis

    1988-01-01

    Full Text Available Tardive dystonia was identified in 25 patients: involvement of the face and neck was most common; truncal and limb dystonia were also observed. There were 3 cases of laryngospasm and 2 of spasmodic dysphonia. The latter has not been previously reported as a manifestation of tardive dystonia. In all cases, movements typical of classic tardive dyskinesia could be demonstrated. This group illustrates the variety of dystonic disorders that may occur in conjunction with tardive dyskinesia.

  14. Palmse viinaköögi manifest

    1996-01-01

    Manifest. Tõlkijate seminari puhul 17. mail 1996 Palmse viinaköögis Juta Bedia, Eric Dickens, Gyözö Fehérvári, Guntars Godinsh, Maima Grinberga, Irja Grönholm, Leif Hannibal, Cornelius Hasselblatt, Pirkko Huurto, Ivo Iliste, Nora Javorskaja, Gisbert Jänicke, Kaisu Lahikainen, Enel Melberg, Vera Ruber, Arnold Tamm, Leili Tamm, Jonatan Tomesh, Lilia Velic'kova, Marianne Vogel. Inglise k.: Estonian Literary Magazine, autumn 1996, nr. 3

  15. Cardiac manifestations of Familial Mediterranean fever

    Alsarah, Ahmad; Alsara, Osama; Laird-Fick, Heather S.

    2017-01-01

    Familial Mediterranean fever (FMF) is autoinflammatory disorder characterized by sporadic attacks of fever, peritonitis, pleuritis, and arthritis. It is mainly seen in patients from Mediterranean origins, but it is now reported more frequently in Europe and North America due to immigration. To analyze the data on the cardiovascular manifestations in FMF patients, we searched PubMed using the terms “Familial Mediterranean Fever” or “FMF” in combination with other key words including “cardiovas...

  16. Mandibular and Dental Manifestations of Gaucher Disease

    Saranjam, Hamid R.; Sidransky, Ellen; Levine, William Z.; Zimran, Ari; Elstein, Deborah

    2012-01-01

    Gaucher disease is a systemic lysosomal storage disorder with a high prevalence among Ashkenazi Jews. It is caused by an inherited deficiency of the lysosomal enzyme glucocerebrosidase. Common signs and symptoms include hepatosplenomegaly, anemia, thrombocytopenia, and skeletal involvement. Oral and dental manifestations are less commonly seen. These manifestations are often asymptomatic, although they may be detected by routine dental x-rays. There are several case reports and a few larger series published describing patients with Gaucher disease who have mandibulo-maxillofacial involvement. This review aims to examine the oral manifestations observed in Gaucher disease and to suggest practical guidelines for dealing with these often worrisome signs. Among the critical issues are the benign nature of Gaucher cell infiltration of the mandible and the critical importance of being prepared for post-procedure bleeding and/or infections. Therefore, it is essential that dental practitioners be aware of the possible oral and dental complications of Gaucher disease, as well as the available treatment modalities. PMID:22251146

  17. Chronic polyarthritis as isolated manifestation of toxocariasis.

    Viola, Gabriela R; Giacomin, Maria Fernanda A; França, Camila M P; Sallum, Adriana M E; Jacob, Cristina M A; Silva, Clovis A

    2016-01-01

    Human toxocariasis is a parasitic zoonosis mainly caused by Toxocara canis or Toxocara cati and is acquired by ingestion of the parasite's embryonated eggs. Arthralgia and/or arthritis were reported in up to 17% of the cases, generally with acute duration (less than 6 weeks). However, to our knowledge, chronic polyarthritis, as the isolated presentation of Toxocara infection, was not reported. One of the 5809 patients that was followed up at our service (0.017%) had chronic polyarthritis as the single manifestation of toxocariasis and was described herein. A 3-year-old girl was referred to our service with severe painful chronic polyarthritis for a period longer than 10 weeks and morning stiffness of 30min. Dog contact exposure history in the recreational areas of neighborhood was reported. Her exams showed high levels of eosinophils in peripheral blood (29%), bone marrow aspirate revealed marked eosinophilia (32%) and Toxocara enzyme-linked immunosorbent assay (Elisa) was positive (1:1280). She was treated with paracetamol (40mg/kg/day) and thiabendazole (25mg/kg/day) for 10 days, and all manifestations reduced. After eight months of follow-up, she was on clinical and laboratorial remission. In conclusion, we described a case of chronic polyarthritis, as isolated manifestation of toxocariasis, mimicking juvenile idiopathic arthritis and leukemia. Importantly, this zoonosis should be considered in patients with arthritis and eosinophilia. Copyright © 2014 Elsevier Editora Ltda. All rights reserved.

  18. Manifestations or seven acts and one folly

    Frederico Guilherme Bandeira de Araújo

    2014-08-01

    Full Text Available The theme that inspired the writing of this article was the set of street manifestations that took place in Brazil in July 2013. The manifestations were initially articulated by the problems of urban mobility, but later will acquire immense complexity. The plurality of voices and crossings and the impossibility of a single language to give existence to the complexity of the manifestations is what constitutes the raw material of this text, which causes thinking about generalizations and constraints that are imposed by existing languages to talk space. The text was produced collectively or brokered by members of the Grupo de Pesquisa Modernidade e Cultura of the Instituto de Pesquisa e Planejamento Urbano e Regional, of the Universidade Federal do Rio de Janeiro and was presented as a performance in the panel discussion “In the borders of the major Geography: imagination, strangeness and performance, in the III Colóquio Internacional “A Educação pelas imagens e suas geografias”.

  19. Abdominal manifestations of cystic fibrosis in children

    Chaudry, Gulraiz; Navarro, Oscar M.; Levine, Daniel S.; Oudjhane, Kamaldine

    2006-01-01

    Pulmonary complications remain the main cause of mortality in cystic fibrosis, but the presenting symptoms in children are often related to gastrointestinal or pancreaticobiliary disease. Furthermore, abdominal manifestations are now seen throughout childhood, from infancy to adolescence. The child might present in the neonatal period with meconium ileus or its attendant complications. The older child might present with distal intestinal obstruction syndrome or colonic stricture secondary to high doses of pancreatic enzyme replacement. Less-common gastrointestinal manifestations include intussusception, duodenitis and fecal impaction of the appendix. Most children also show evidence of exocrine pancreatic deficiency. Radiologically, the combination of fat deposition and pancreatic fibrosis leads to varying CT and MR appearances. A higher than normal incidence of pancreatic cysts and calcification is also seen. Decreased transport of water and chloride also increases the viscosity of bile, with subsequent obstruction of the biliary ductules. If extensive, this can progress to obstructive cirrhosis, portal hypertension and esophageal varices. Diffuse fatty infiltration, hypersplenism and gallstones are also commonly seen in these patients. We present a pictorial review of the radiological appearance of these abdominal manifestations. The conditions are dealt with individually, together with typical appearances in various imaging modalities. (orig.)

  20. Chronic polyarthritis as isolated manifestation of toxocariasis

    Gabriela R. Viola

    2016-04-01

    Full Text Available ABSTRACT Human toxocariasis is a parasitic zoonosis mainly caused by Toxocara canis or Toxocara catiand is acquired by ingestion of the parasite’s embryonated eggs. Arthralgia and/or arthri-tis were reported in up to 17% of the cases, generally with acute duration (less than 6weeks. However, to our knowledge, chronic polyarthritis, as the isolated presentation ofToxocara infection, was not reported. One of the 5809 patients that was followed up at ourservice (0.017% had chronic polyarthritis as the single manifestation of toxocariasis and wasdescribed herein. A 3-year-old girl was referred to our service with severe painful chronicpolyarthritis for a period longer than 10 weeks and morning stiffness of 30 min. Dog contactexposure history in the recreational areas of neighborhood was reported. Her exams showedhigh levels of eosinophils in peripheral blood (29%, bone marrow aspirate revealed markedeosinophilia (32% and Toxocara enzyme-linked immunosorbent assay (Elisa was positive(1:1280. She was treated with paracetamol (40 mg/kg/day and thiabendazole (25 mg/kg/dayfor 10 days, and all manifestations reduced. After eight months of follow-up, she was onclinical and laboratorial remission. In conclusion, we described a case of chronic polyarthri-tis, as isolated manifestation of toxocariasis, mimicking juvenile idiopathic arthritis andleukemia. Importantly, this zoonosis should be considered in patients with arthritis andeosinophilia.

  1. Abdominal manifestations of cystic fibrosis in children

    Chaudry, Gulraiz; Navarro, Oscar M.; Levine, Daniel S.; Oudjhane, Kamaldine [University of Toronto, Department of Diagnostic Imaging, Hospital for Sick Children, Toronto, ON (Canada)

    2006-03-15

    Pulmonary complications remain the main cause of mortality in cystic fibrosis, but the presenting symptoms in children are often related to gastrointestinal or pancreaticobiliary disease. Furthermore, abdominal manifestations are now seen throughout childhood, from infancy to adolescence. The child might present in the neonatal period with meconium ileus or its attendant complications. The older child might present with distal intestinal obstruction syndrome or colonic stricture secondary to high doses of pancreatic enzyme replacement. Less-common gastrointestinal manifestations include intussusception, duodenitis and fecal impaction of the appendix. Most children also show evidence of exocrine pancreatic deficiency. Radiologically, the combination of fat deposition and pancreatic fibrosis leads to varying CT and MR appearances. A higher than normal incidence of pancreatic cysts and calcification is also seen. Decreased transport of water and chloride also increases the viscosity of bile, with subsequent obstruction of the biliary ductules. If extensive, this can progress to obstructive cirrhosis, portal hypertension and esophageal varices. Diffuse fatty infiltration, hypersplenism and gallstones are also commonly seen in these patients. We present a pictorial review of the radiological appearance of these abdominal manifestations. The conditions are dealt with individually, together with typical appearances in various imaging modalities. (orig.)

  2. A broadened typology on energy and security

    Johansson, Bengt

    2013-01-01

    A broadened typology describing the interconnection between energy and security is developed in this paper, with the aim of improving understanding of the relationship between energy and security by applying different research and policy perspectives. One approach involves studying energy as an object exposed to security threats, using concepts such as security of supply or security of demand. Another approach involves studying the role of the energy system as the subject in generating or enhancing insecurity. The latter approach includes studying the conflict-generating potential inherent in the economic value of energy, the risk of accidents and antagonistic attacks to energy infrastructure and the security risks related to the negative environmental impact of the energy system. In order to make a comprehensive analysis of the security consequences of proposed energy policies or strategies, all these aspects should be taken into account to varying degrees. The typology proposed here could be a valuable tool for ensuring that all security aspects have been considered. - Highlights: • The paper presents a broadened typology of energy and security, useful for policy analysis. • The energy system can be an object for security threats and as a subject generating or contributing to insecurity. • Energy as an object for security threats includes the concepts of security of supply and security of demand. • The economic value of energy can contribute to insecurity. • Technological and environmental risks of specific energy systems also provide potential threats to human security

  3. Computer Security: the security marathon

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  4. Pelvic hydatid cyst with uncommon sciatalgia manifestation: a case report

    Ghodratolah Maddah

    2013-11-01

    Full Text Available Background: Hydatid disease or echinococcosis is a common parasitic disease of human and bovine, caused by infection with larva of the cestode echinococcus. Liver is the most common organ that is involved in this disease. Pelvic involvement and neurological symptoms, due to mass effect of pelvic involvement, in lower extremities are very uncommon manifestations of the disease.Case presentation: A forty six year old man was referred to clinic of surgery at Ghaem Hospital, Medical University of Mashhad, Iran. The patient complained about weakness and motor impairment in right lower extremity accompanied by numbness and radicular pain over past two months. Physical examination demonstrated muscular atrophy and reduced muscular strength in right lower extremity. Computed tomography and ultrasonographic studies showed a cystic mass in right side of the pelvic cavity with extention to the sciatic notch and another cystic mass in right gluteal region. Surgical operation revealed a cystic mass deep in pelvic cavity with the extention to the right sciatic notch with compression of nerve roots. The cystic mass was contained of daughter cysts which confirmed the diagnosis of hydatid cyst disease. This diagnosis was confirmed by pathologic assessment.Conclusion: Although uncommon, but hydatid disease can involve the pelvic cavity and make a pelvic, usually cystic, mass; that can make compression on nerve roots and so making neurologic symptoms in lower extremities. So in endemic areas for hydatid disease, such as Iran, pelvic hydatid cysts should be considered as a possible differential diagnosis in patients presenting with the sciatic pain and neurological manifestations in whom a pelvic mass has been found too.

  5. Cryptanalyzing a discrete-time chaos synchronization secure communication system

    Alvarez, G.; Montoya, F.; Romera, M.; Pastor, G.

    2004-01-01

    This paper describes the security weakness of a recently proposed secure communication method based on discrete-time chaos synchronization. We show that the security is compromised even without precise knowledge of the chaotic system used. We also make many suggestions to improve its security in future versions

  6. Security Administration Reports Application

    Social Security Administration — Contains SSA Security Reports that allow Information Security Officers (ISOs) to access, review and take appropriate action based on the information contained in the...

  7. Security Investigation Database (SID)

    US Agency for International Development — Security Investigation & Personnel Security Clearance - COTS personnel security application in a USAID virtualized environement that can support USAID's business...

  8. Mobile code security

    Ramalingam, Srikumar

    2001-11-01

    A highly secure mobile agent system is very important for a mobile computing environment. The security issues in mobile agent system comprise protecting mobile hosts from malicious agents, protecting agents from other malicious agents, protecting hosts from other malicious hosts and protecting agents from malicious hosts. Using traditional security mechanisms the first three security problems can be solved. Apart from using trusted hardware, very few approaches exist to protect mobile code from malicious hosts. Some of the approaches to solve this problem are the use of trusted computing, computing with encrypted function, steganography, cryptographic traces, Seal Calculas, etc. This paper focuses on the simulation of some of these existing techniques in the designed mobile language. Some new approaches to solve malicious network problem and agent tampering problem are developed using public key encryption system and steganographic concepts. The approaches are based on encrypting and hiding the partial solutions of the mobile agents. The partial results are stored and the address of the storage is destroyed as the agent moves from one host to another host. This allows only the originator to make use of the partial results. Through these approaches some of the existing problems are solved.

  9. Security seal

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  10. Security system

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  11. Control system security in nuclear power plant

    Li Jianghai; Huang Xiaojin

    2012-01-01

    The digitalization and networking of control systems in nuclear power plants has brought significant improvements in system control, operation and maintenance. However, the highly digitalized control system also introduces additional security vulnerabilities. Moreover, the replacement of conventional proprietary systems with common protocols, software and devices makes these vulnerabilities easy to be exploited. Through the interaction between control systems and the physical world, security issues in control systems impose high risks on health, safety and environment. These security issues may even cause damages of critical infrastructures and threaten national security. The importance of control system security by reviewing several control system security incidents that happened in nuclear power plants was showed in recent years. Several key difficulties in addressing these security issues were described. Finally, existing researches on control system security and propose several promising research directions were reviewed. (authors)

  12. Secure Wireless Sensor Networks: Problems and Solutions

    Fei Hu

    2003-08-01

    Full Text Available As sensor networks edge closer towards wide-spread deployment, security issues become a central concern. So far, the main research focus has been on making sensor networks feasible and useful, and less emphasis was placed on security. This paper analyzes security challenges in wireless sensor networks and summarizes key issues that should be solved for achieving the ad hoc security. It gives an overview of the current state of solutions on such key issues as secure routing, prevention of denial-of-service and key management service. We also present some secure methods to achieve security in wireless sensor networks. Finally we present our integrated approach to securing sensor networks.

  13. Psychopathological manifestations of multiple meningiomas in the right hemisphere

    A. A. Lukshina

    2015-01-01

    Full Text Available The paper gives the data available in the literature on meningiomas and their psychopathological manifestations that occupy a central position in the clinical picture in almost every 5 patients with these tumors. The authors provide a clinical and psychopathological analysis of a female patient with multiple meningiomas in the right hemisphere: a giant meningioma in the posterior third of the falx, a large meningioma in the temporal region, and three small meningiomas in the frontal and parietal regions. The disease started as headache; however, psychopathological symptoms remained missed by physicians, such as emotional lability; personality changes leading to family dissension; lower criticism; spatial orientation problems; hypomnesia; left-sided visual inattention,occurred in parallel. Surgical treatment was performed by stages: the two largest meningiomas were removed at an 11-day interval, which presented a means of observing psychopathological changes after each operation. It is concluded that greater attention should be given to the psychopathological manifestations of the disease, which is important to make a primary diagnosis and to define further treatment policy.

  14. Security studies

    Venot, R.

    2001-01-01

    Full text: Security studies constitute one of the major tools for evaluating the provisions implemented at facilities to protect and control Nuclear Material against unauthorized removal. Operators use security studies to demonstrate that they are complying with objectives set by the Competent Authority to counter internal or external acts aimed at unauthorized removal of NM. The paper presents the context of security studies carried out in France. The philosophy of these studies is based on a postulated unauthorized removal of NM and the study of the behavior of the systems implemented to control and protect NM in a facility. The potential unauthorized removal of NM usually may take place in two stages. The first stage involves the sequence leading to handling of the NM. It occurs inside the physical barriers of a facility and may include action involving the documents corresponding to Material Control and Accounting systems. At this stage it is possible to limit the risk of unauthorized removal of NM by means of detection capabilities of the MC and A systems. The second stage is more specific to theft and involves removing the NM out of the physical barriers of a facility in which they are being held, notably by affecting the Physical Protection System. Operators have to study, from a quantity and time lapse point of view, the ability of the installed systems to detect unauthorized removal, as well as the possibility of tampering with the systems to mask unlawful operations. Operators have also to analyze the sequences during which NM are accessed, removed from their containment and further removed from the facility in which they are stored. At each stage in the process, the probability of detection and the time taken to carry out the above actions have to be estimated. Of course, these two types of studies complement each other. Security studies have begun, in France, for more than fifteen years. Up to now more than fifty security studies are available in the

  15. Cutaneous manifestations of polycystic ovary syndrome: A cross-sectional clinical study

    Mohammad Abid Keen

    2017-01-01

    Full Text Available Background: Polycystic ovary syndrome (PCOS is one of the most common endocrine disorders in women, affecting 5–10% of reproductive-aged women. The dermatologic manifestations of hyperandrogenism, chiefly hirsutism, acne vulgaris, androgenic alopecia, and acanthosis nigricans, are among the cardinal manifestations of PCOS. Aim: To study the incidence and prevalence of various cutaneous manifestations in patients with PCOS and to correlate these skin manifestations with hormonal changes. Settings and Design: This study was conducted at a dermatology centre over a period of 1 year from November 2012 to 2013. Materials and Methods: The present study included 100 women diagnosed to have PCOS. Hormonal analysis as well as radiological assessment was done in all the cases. Cutaneous manifestations were ascertained and inferences were drawn. Statistical Analysis: Statistical analysis was carried out by the Chi-square test and independent samples t-test. Statistical significance was determined at a level of P < 0.05. Results: In our study, the prevalence of hirsutism, acne, female pattern hair loss, acanthosis nigricans, seborrhea, striae and acrochordons was 78%, 48%, 31%, 30%, 29%, 13%, and 9%, respectively. Conclusion: Dermatologic manifestations of PCOS play a significant role in making the diagnosis and constitute a substantial portion of the symptoms experienced by women with this syndrome.

  16. Security and privacy in smart grids

    Xiao, Yang

    2013-01-01

    Presenting the work of prominent researchers working on smart grids and related fields around the world, Security and Privacy in Smart Grids identifies state-of-the-art approaches and novel technologies for smart grid communication and security. It investigates the fundamental aspects and applications of smart grid security and privacy and reports on the latest advances in the range of related areas-making it an ideal reference for students, researchers, and engineers in these fields. The book explains grid security development and deployment and introduces novel approaches for securing today'

  17. 78 FR 27469 - 30-Day Notice of Proposed Information Collection: Evacuee Manifest and Promissory Note

    2013-05-10

    ... respond, including the use of automated collection techniques or other forms of information technology... is to document the evacuation of persons from abroad when their lives are endangered by war, civil... make the use of the DS-5528 legal. Methodology An electronic version of the Evacuee Manifest and...

  18. Clinical Manifestations and Management of Left Ventricular Assist Device–Associated Infections

    Nienaber, Juhsien Jodi C.; Kusne, Shimon; Riaz, Talha; Walker, Randall C.; Baddour, Larry M.; Wright, Alan J.; Park, Soon J.; Vikram, Holenarasipur R.; Keating, Michael R.; Arabia, Francisco A.; Lahr, Brian D.; Sohail, M. Rizwan

    2013-01-01

    We report the clinical manifestations and management of continuous-flow left ventricular assist device (LVAD) infections from a large multicenter cohort. On the basis of these observations, a management algorithm is derived to assist clinical decision making for LVAD infection.

  19. National Cyber Security Policy

    National Cyber Security Policy. Salient Features: Caters to ... Creating a secure cyber ecosystem. Creating an assurance framework. Encouraging Open Standards. Strengthening the Regulatory framework. Creating mechanisms for security threat early warning, vulnerability management and response to security threats.

  20. Threats to economic security of the region

    Y. A. Salikov

    2017-01-01

    Full Text Available Various aspects of economic security are in sight of the researchers for more than two decades. Today in the economic literature widely presents the conceptual aspects of economic safety of the state. Theoretical and methodological foundations of the study of this multifaceted problem lies in the researches of many domestic and foreign scientists, which are the basic levels of economic security. Among the priority levels include, in our view, the regional level (meso-level and actual problems of economic security studied to date lack detail. Economic development regions of the country has its own specifics, which is projected to the achieving of regional and national economic security. The article summarizes the approaches to definition of essence of the category “economic security of the region” and was given its author’s interpretation, considers the reasons of appearance and development of crisis situations causing threats to the economic security of the region. Given that the prevention of threats and reduction of their consequences is the basis of regional economic security, the article identifies the main threats to economic security, as well as the peculiarities of their manifestations (for example, the most significant threats to economic security of the Voronezh region, as well as the proposed activities in support of regional economic security and stated objectives of regional economic policy, the solution of which is aimed at ensuring the economic security of the region. In addition, it is proved that the actual problems of economic security must be constantly in sight of the regional leadership and find its solution in government documents and policy programmes promising socio-economic development of the region.

  1. Embedding security messages in existing processes: a pragmatic and effective approach to information security culture change

    Lopienski, Sebastian

    Companies and organizations world-wide depend more and more on IT infrastructure and operations. Computer systems store vital information and sensitive data; computing services are essential for main business processes. This high dependency comes with a number of security risks, which have to be managed correctly on technological, organizational and human levels. Addressing the human aspects of information security often boils down just to procedures, training and awareness raising. On the other hand, employees and collaborators do not adopt security attitude and habits simply when told to do so – a real change in behaviour requires an established security culture. But how to introduce a security culture? This thesis outlines the need of developing or improving security culture, and discusses how this can be done. The proposed approach is to gradually build security knowledge and awareness, and influence behaviours. The way to achieve this is to make security communication pervasive by embedding security me...

  2. Urological manifestations of Duchenne muscular dystrophy.

    Askeland, Eric J; Arlen, Angela M; Erickson, Bradley A; Mathews, Katherine D; Cooper, Christopher S

    2013-10-01

    Duchenne muscular dystrophy is a dystrophinopathy affecting males that is associated with multiple organ system complications. To our knowledge urological complications of Duchenne muscular dystrophy have been described only anecdotally to date. We reviewed the medical charts of 135 patients with Duchenne or Duchenne-Becker muscular dystrophy for demographics and disease progression, urological diagnoses, intervention and followup. Of 135 patients 67 (50%) had at least 1 documented urological diagnosis and 38 (28%) had multiple manifestations. Lower urinary tract symptoms were the most common urological diagnosis (32% of patients). Survival analysis revealed a median age at onset of lower urinary tract symptoms of 23 years (95% CI 17.7-23.9). Intervention was required in 12 patients (9%), most commonly due to nephrolithiasis. Urological morbidity increased with Duchenne muscular dystrophy progression when stratified by clinical progression. Lower urinary tract symptoms were more common in nonambulatory patients (40.7% vs 19%, p = 0.007), those with a diagnosis of scoliosis (44% vs 19.7%, p = 0.003) and/or scoliosis spine surgery (60% vs 22%, p <0.001), and those on invasive respiratory support (53% vs 29%, p = 0.046). Likewise, nephrolithiasis was more common in nonambulatory patients (10% vs 0%, p = 0.017), those with scoliosis (12% vs 0%, p = 0.004) and/or scoliosis spine surgery (20% vs 1%, p <0.001), and those on invasive respiratory support (29% vs 3%, p <0.001). Only 28% of patients with a urological manifestation were referred to urology. As these patients transition into adolescence and adulthood, the increased prevalence of urological manifestations warrants increased awareness and referral to urologists. Copyright © 2013 American Urological Association Education and Research, Inc. Published by Elsevier Inc. All rights reserved.

  3. Cow&s milk protein allergy with gastrointestinal manifestations

    Sofia Ferreira

    2016-02-01

    Full Text Available Cow’s milk protein allergy (CMPA is the leading cause of food allergy in children under three years of age, although its gastrointestinal manifestations may occur in all age groups. In the suspicion of CMPA based on the anamnesis and physical examination, an elimination diet should be initiated for a variable length of time according to the clinical picture, followed by an oral food challenge (OFC confi rming or excluding the diagnosis. Complementary exams such as skin prick tests and specifi c IgE may be necessary. Treatment is based on an elimination diet and demands nutritional counselling and growth monitoring. Usually an OFC is repeated after three to 12 months of elimination diet. Tolerance is achieved at three years of age in more than 80% of the children. The aim of this work is to make a brief review and update on CMPA in pediatric age, proposing a management approach based on recent international recommendations.

  4. HYPERCORTISOLISM: CLASSIFICATION, PATHOGENESIS, CLINICAL MANIFESTATIONS. DIAGNOSIS OF ENDOGENOUS HYPERCORTISOLISM

    Nikonova L. V.

    2017-02-01

    Full Text Available The relevance of the study of Cushing's syndrome with different etiology as well as the states of hypercorticism, which is not associated with endogenous hypercortisolism, is due to the difficulty of the diagnosis of this disease. Accurate knowledge of the classification criteria for the diagnosis of hypercorticism enables subsequently to establish the correct diagnosis and to administer the appropriate treatment. It was found that the cause of hypercorticism can be endogenous and exogenous factors. There is a particular group of patients requiring screening for hypercorticism using special diagnostic tests. Only a clear understanding of etiopathogenesis of hypercorticism and its clinical manifestations by the specialist, the correct interpretation of diagnostic results make it possible to establish the diagnosis, to administer the appropriate treatment and significantly reduce the morbidity and mortality of patients of this profile and improve their quality of life.

  5. Pulmonary manifestations of systemic lupus erythematosus

    Yang, Kee Hyuk; Choi, Yo Won; Jeon, Seok Chol; Park, Choong Ki; Joo, Kyung Bin; Hahm, Chang Kok; Lee, Seung Ro [College of Medicine, Hanyang Univ., Seoul (Korea, Republic of)

    2004-02-01

    Pulmonary involvement is more common in systemic lupus erythematosus (SLE) than in any other connective tissue disease, and more than half of patients with SLE suffer from respiratory dysfunction during the course of their illness. Although sepsis and renal disease are the most common causes of death in SLE, lung disease is the predominant manifestation and is an indicator of overall prognosis. Respiratory disease may be due to direct involvement of the lung or as a secondary consequence of the effect of the disease on other organ systems.

  6. Sarcoidosis: Oral and extra-oral manifestation

    Sanjay Gupta

    2015-01-01

    Full Text Available Sarcoidosis is a multisystem granulomatous disease, which is usually associated with the formation of noncaseating granulomas in affected tissues and organs. It is mostly present with bilateral hilar lymphadenopathy, pulmonary infiltration, ocular, and cutaneous lesions. Oral manifestations of this disease are relatively rare. The present case report shows a 40-year-old male with lesions in the soft tissue of oral cavity (buccal mucosa, gingiva, and palate and a diagnosis of sarcoidosis was established following hematological, biochemical and pulmonary function tests, chest radiograph, and histopathological investigation.

  7. Research Misconduct—Definitions, Manifestations and Extent

    Lutz Bornmann

    2013-10-01

    Full Text Available In recent years, the international scientific community has been rocked by a number of serious cases of research misconduct. In one of these, Woo Suk Hwang, a Korean stem cell researcher published two articles on research with ground-breaking results in Science in 2004 and 2005. Both articles were later revealed to be fakes. This paper provides an overview of what research misconduct is generally understood to be, its manifestations and the extent to which they are thought to exist.

  8. Cutaneous manifestations in patients with mastocytosis

    Hartmann, Karin; Escribano, Luis; Grattan, Clive

    2016-01-01

    with mastocytosis. To address this unmet need, an international task force involving experts from different organizations (including the European Competence Network on Mastocytosis; the American Academy of Allergy, Asthma & Immunology; and the European Academy of Allergology and Clinical Immunology) met several...... times between 2010 and 2014 to discuss the classification and criteria for diagnosis of cutaneous manifestations in patients with mastocytosis. This article provides the major outcomes of these meetings and a proposal for a revised definition and criteria. In particular, we recommend that the typical...

  9. Pulmonary manifestations of systemic lupus erythematosus

    Yang, Kee Hyuk; Choi, Yo Won; Jeon, Seok Chol; Park, Choong Ki; Joo, Kyung Bin; Hahm, Chang Kok; Lee, Seung Ro

    2004-01-01

    Pulmonary involvement is more common in systemic lupus erythematosus (SLE) than in any other connective tissue disease, and more than half of patients with SLE suffer from respiratory dysfunction during the course of their illness. Although sepsis and renal disease are the most common causes of death in SLE, lung disease is the predominant manifestation and is an indicator of overall prognosis. Respiratory disease may be due to direct involvement of the lung or as a secondary consequence of the effect of the disease on other organ systems

  10. Imaging manifestations of progressive multifocal leukoencephalopathy

    Shah, R.; Bag, A.K.; Chapman, P.R.; Cure, J.K.

    2010-01-01

    Progressive multifocal leukoencephalopathy (PML) is a demyelinating disease caused by reactivation of JC virus in immunosuppressed patients. The diagnosis is usually suggested on imaging and confirmed by cerebrospinal fluid polymerase chain reaction (PCR) for JC virus DNA. In this article, we review the imaging manifestations of PML on computed tomography (CT), magnetic resonance imaging (MRI), diffusion-weighted imaging (DWI), diffusion tensor imaging (DTI), MR spectroscopy, single photon-emission computed tomography (SPECT) and positron-emission tomography (PET), and outline the role of imaging in follow-up and prognostication.

  11. Various musculoskeletal manifestations of chronic renal insufficiency

    Lim, C.Y.; Ong, K.O.

    2013-01-01

    Musculoskeletal manifestations in chronic renal insufficiency are caused by complex bone metabolism alterations, now described under the umbrella term of chronic kidney disease mineral- and bone-related disorder (CKD-MBD), as well as iatrogenic processes related to renal replacement treatment. Radiological imaging remains the mainstay of disease assessment. This review aims to illustrate the radiological features of CKD-MBD, such as secondary hyperparathyroidism, osteomalacia, adynamic bone disease, soft-tissue calcifications; as well as features associated with renal replacement therapy, such as aluminium toxicity, secondary amyloidosis, destructive spondyloarthropathy, haemodialysis-related erosive arthropathy, tendon rupture, osteonecrosis, and infection

  12. Network security

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  13. 76 FR 68243 - Social Security Rulings, SSR 91-1c and SSR 66-18c; Rescission of Social Security Rulings (SSR) 66...

    2011-11-03

    ..., Social Security Online, at http://www.socialsecurity.gov . SUPPLEMENTARY INFORMATION: SSRs make available... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2011-0068] Social Security Rulings, SSR 91-1c and SSR 66-18c; Rescission of Social Security Rulings (SSR) 66-18c and SSR 91-1c AGENCY: Social Security...

  14. Extending the agile development process to develop acceptably secure software

    Ben Othmane, L.; Angin, P.; Weffers, H.T.G.; Bhargava, B.

    2013-01-01

    The agile software development approach makes developing secure software challenging. Existing approaches for extending the agile development process, which enables incremental and iterative software development, fall short of providing a method for efficiently ensuring the security of the software

  15. Privacy and security in teleradiology

    Ruotsalainen, Pekka

    2010-01-01

    Teleradiology is probably the most successful eHealth service available today. Its business model is based on the remote transmission of radiological images (e.g. X-ray and CT-images) over electronic networks, and on the interpretation of the transmitted images for diagnostic purpose. Two basic service models are commonly used teleradiology today. The most common approach is based on the message paradigm (off-line model), but more developed teleradiology systems are based on the interactive use of PACS/RIS systems. Modern teleradiology is also more and more cross-organisational or even cross-border service between service providers having different jurisdictions and security policies. This paper defines the requirements needed to make different teleradiology models trusted. Those requirements include a common security policy that covers all partners and entities, common security and privacy protection principles and requirements, controlled contracts between partners, and the use of security controls and tools that supporting the common security policy. The security and privacy protection of any teleradiology system must be planned in advance, and the necessary security and privacy enhancing tools should be selected (e.g. strong authentication, data encryption, non-repudiation services and audit-logs) based on the risk analysis and requirements set by the legislation. In any case the teleradiology system should fulfil ethical and regulatory requirements. Certification of the whole teleradiology service system including security and privacy is also proposed. In the future, teleradiology services will be an integrated part of pervasive eHealth. Security requirements for this environment including dynamic and context aware security services are also discussed in this paper.

  16. Privacy and security in teleradiology

    Ruotsalainen, Pekka [National Institute for Health and Welfare, Helsinki (Finland)], E-mail: pekka.ruotsalainen@THL.fi

    2010-01-15

    Teleradiology is probably the most successful eHealth service available today. Its business model is based on the remote transmission of radiological images (e.g. X-ray and CT-images) over electronic networks, and on the interpretation of the transmitted images for diagnostic purpose. Two basic service models are commonly used teleradiology today. The most common approach is based on the message paradigm (off-line model), but more developed teleradiology systems are based on the interactive use of PACS/RIS systems. Modern teleradiology is also more and more cross-organisational or even cross-border service between service providers having different jurisdictions and security policies. This paper defines the requirements needed to make different teleradiology models trusted. Those requirements include a common security policy that covers all partners and entities, common security and privacy protection principles and requirements, controlled contracts between partners, and the use of security controls and tools that supporting the common security policy. The security and privacy protection of any teleradiology system must be planned in advance, and the necessary security and privacy enhancing tools should be selected (e.g. strong authentication, data encryption, non-repudiation services and audit-logs) based on the risk analysis and requirements set by the legislation. In any case the teleradiology system should fulfil ethical and regulatory requirements. Certification of the whole teleradiology service system including security and privacy is also proposed. In the future, teleradiology services will be an integrated part of pervasive eHealth. Security requirements for this environment including dynamic and context aware security services are also discussed in this paper.

  17. Privacy and security in teleradiology.

    Ruotsalainen, Pekka

    2010-01-01

    Teleradiology is probably the most successful eHealth service available today. Its business model is based on the remote transmission of radiological images (e.g. X-ray and CT-images) over electronic networks, and on the interpretation of the transmitted images for diagnostic purpose. Two basic service models are commonly used teleradiology today. The most common approach is based on the message paradigm (off-line model), but more developed teleradiology systems are based on the interactive use of PACS/RIS systems. Modern teleradiology is also more and more cross-organisational or even cross-border service between service providers having different jurisdictions and security policies. This paper defines the requirements needed to make different teleradiology models trusted. Those requirements include a common security policy that covers all partners and entities, common security and privacy protection principles and requirements, controlled contracts between partners, and the use of security controls and tools that supporting the common security policy. The security and privacy protection of any teleradiology system must be planned in advance, and the necessary security and privacy enhancing tools should be selected (e.g. strong authentication, data encryption, non-repudiation services and audit-logs) based on the risk analysis and requirements set by the legislation. In any case the teleradiology system should fulfil ethical and regulatory requirements. Certification of the whole teleradiology service system including security and privacy is also proposed. In the future, teleradiology services will be an integrated part of pervasive eHealth. Security requirements for this environment including dynamic and context aware security services are also discussed in this paper. Copyright (c) 2009 Elsevier Ireland Ltd. All rights reserved.

  18. Neurotic manifestations in adolescents with thalassemia major.

    Moorjani, J D; Issac, Chithira

    2006-07-01

    To study the neurotic manifestations in thalassemic adolescents as a consequence of long-term illness. From July 2003, thirty six thalassemic adolescents and forty normal adolescents were selected with age ranging from 13 to 18 and with same socio economic status and family background. Middlesex Hospital Questionnaire by Crown and Crisp [1966] was administered and Mann Whiteny 'U' test was employed to measure free-floating anxiety, phobia, somatic anxiety, obsession, depression, hysteria and total neuroticism score. An interview was conducted along with the questionnaire to detect the problems in depth. Parents of thalassemic adolescents were interviewed subsequently to realize the behavioral problems existing along with neuroticism. Thirty-six of thalassemic and all forty normal adolescents returned the questionnaires. The responses suggest a marked difference in total neuroticism score and all other variables except that of hysteria. The interview on parents of thalassemic adolescents exposed various behavioral problems in these adolescents. Thalassemic adolescents were having higher scores in neuroticism. Some behavioral problems are also found to exist along with neurotic manifestations. There remains a need to improve the management of thalassemia in terms of psychological aspects in order to improve the mental health of this group.

  19. Manifestations of Gorlin-Goltz syndrome.

    Larsen, Anne Kristine; Mikkelsen, Dorthe Bisgaard; Hertz, Jens Michael; Bygum, Anette

    2014-05-01

    Gorlin-Goltz syndrome is an uncommon hereditary condition caused by mutations in the PTCH1 gene causing a wide range of developmental abnormalities. Multiple basal cell carcinomas, palmoplantar pits and jaw cysts are cardinal features. Many clinicians are unfamiliar with the different manifestations and the fact that patients are especially sensitive to ionizing radiation. This was a retrospective analysis of patients with Gorlin-Goltz syndrome seen at the Department of Dermatology and Allergy Centre or at Department of Plastic Surgery, Odense University Hospital, Denmark, in the period from 1994 to 2013. A total of 17 patients from eight families fulfilled the diagnostic criteria. In all, 14 patients had basal cell carcinomas, 12 patients had jaw cysts and ten patients had calcification of the falx cerebri. Other clinical features were frontal bossing, kyphoscoliosis, rib anomalies, coalitio, cleft lip/palate, eye anomalies, milia and syndactyly. In one family, medulloblastoma and astrocytoma occurred. Traditional treatment principles of basal cell carcinomas were used including radiotherapy performed in six patients. PTCH1 mutations were identified in five families and none of these mutations had previously been described. The patient cohort illustrates classic and rare disease manifestations. It is necessary to remind clinicians that radiation therapy in Gorlin-Goltz syndrome is relatively contraindicated. Today, mutation analysis can be used for confirmation of the diagnosis and for predictive genetic testing. Patients should be offered genetic counselling and life-long surveillance. not relevant. not relevant.

  20. Non-cardiac manifestations of Marfan syndrome

    2017-01-01

    Because of the widespread distribution of fibrillin 1 in the body, Marfan syndrome (MFS) affects virtually every system. The expression of this single dominantly inherited gene is variable within a family, and between families. There is some genotype-phenotype correlation which is helpful in guiding long-term prognosis, and management. In general gene mutations have been reported in clusters, with those having mainly ocular manifestations occurring in exons 1 to 15 of this 65-exon gene; those causing cardiac problems often involving cysteine replacement in a calcium binding EGF-like sequence; the most severe mutations occurring in exons 25–32, causing neonatal MFS diagnosed at birth, and severe enough to cause death frequently before the age of 2. Other correlations will certainly be found in future. This condition is progressive, and the manifestations unfold according to age. For example, if the lens is going to dislocate this usually occurs by age 10; scoliosis usually presents itself between the ages of 8 and 15; height should be monitored carefully between the onset of puberty and cessation of growth approximately age 17 or 18. Holistic care should be offered by one doctor who oversees the patient’s welfare. This should be a paediatrician, paediatric cardiologist, or general practitioner in the case of an affected child. Thereafter, the physician in charge of the most seriously affected system should be aware that other systems need to be managed through a referral network. PMID:29270372

  1. Cutaneous manifestations of non-Hodgkin's lymphoma.

    Kumar, S S; Kuruvilla, M; Pai, G S; Dinesh, M

    2003-01-01

    Thirty-two confirmed cases of non -Hodgkin's lymphoma (NHL) were examined for cutaneous manifestations for a period of 2 years from November 1998 in KMC Hospital Attavar, Mangalore. Cutaneous manifestations in the study group were compared to a control group of 32 patients. Specific infiltrates were present in all (5/5) CTCL patients and one out of twenty-seven patients with low grade NHL. Morphologically they presented as papules, plaques, nodules and erythroderma. Infective conditions seen in the study group were superficial fungal (7/32) and viral infections (2/ 32). Non-infective conditions were acquired ichthyosis (10/32), generalised pruritus (5/32), insect bite reaction (1/32) and drug eruption (1/32). When compared to control patients only acquired ichthyosis and generalised pruritus were found to be statistically significant. The study group also showed changes due to chemotherapy like diffuse alopecia (24/29), bluish pigmentation of proximal part of nail (4/29), localised pigmentation of palms and soles (1 /29), diffuse pigmentation at injection site (1 /29), pigmentation at scar site (1 /29) and stomatitis (4/29).

  2. Neurological manifestations of Batch s disease

    Borhani-Haghighi, Afshin; Ashjazadeh, Nahid; Nikseresht, Alireza; Shariat, Abdolhamid; Yousefipour, Gholamali; Samangooie, Shahdokht; Safari, Anahid

    2006-01-01

    To determine the prevalence, clinical manifestations, and laboratory features of Neuro-Behcets disease. This prospective study was carried out in the Behcets Research Clinic in Shiraz (south-west Iran) and included the patients referred from 1990-1999. The patients' clinical records, images, CSF analyses, and electrodiagnostic studies were reviewed. Eighteen (15 males and 3 females) out of 690 Behcet s patients (2.6%, 95% CI = 1.4-3.8%) were found to have neurological involvement. The mean +/- standard deviation age of these patients was 34.7 +/- 8.6 years. All fulfilled the criteria of the International Study Group of Behcet s Disease. Central nervous system involvement was more common than peripheral nervous system manifestations. Headache, weakness, tingling, and numbness were the most common symptoms. Hyperreflexia, upward plantar reflex, and somatosensory findings were the most frequent signs. Hemispheral and brainstem stroke-like syndromes and cerebral venous thrombosis were the major neurologic presentations. There were also cases of myelitic, pure meningoencephalitic, amyotrophic lateral sclerosis-like, multiple sclerosis-like, and Guillain Barre syndromes. Neuro-Behcets disease must be considered in the differential diagnosis of stroke in young adults, chronic meningitis, intracranial hypertension, multiple sclerosis, myelopathies, and peripheral neuropathies. (author)

  3. [Buccal manifestations in patients submitted to chemotherapy].

    Hespanhol, Fernando Luiz; Tinoco, Eduardo Muniz Barretto; Teixeira, Henrique Guilherme de Castro; Falabella, Márcio Eduardo Vieira; Assis, Neuza Maria de Souza Picorelli

    2010-06-01

    Several changes in the oral cavity due to chemotherapy can be observed and can lead to important systemic complications, increasing the time of the patient in hospital and the costs of the treatment as well as affect the quality of life of the patients. The aim of this study was to assess the oral manifestation in patients treated with chemotherapy according to sex, age and tumor type. Data was collected in an oncology hospital in Juiz de Fora, Minas Gerais State, from patients' records that were submitted to oncologic treatment. It was possible to verify that mucositis, associated or not to other type of lesions, was the most common lesion in both sex of all ages (15.5%). Xerostomia and other lesions, such as Candida infection and aphthous lesions, were also present. It is possible to improve the quality of life of the patient during and after anti-neoplastic therapies through a protocol of odontological assistance that includes changes of the oral environment previous to chemotherapy such as profilaxis, caries removal, treatment of periodontal and periapical lesions, oral hygiene instructions, diet orientation and laser therapy. It is very important the insertion of the dentist in the oncologic medical team for the early diagnosis of the oral manifestation and follow-up during treatment time.

  4. The gentilionic theory for quarks: Manifestly confining for quarks and manifestly non-coalescent for hadrons

    Cattani, M.S.D.

    1987-01-01

    It's shown that the gentilionic theory for quarks is manifestly confining for quarks and manifestly non-coalescent for hadrons, and that these properties are rigorously deduced only from first principles. To prove them no arguments involving the intrinsic nature of gentileons or dynamical hypothesis are necessary to be adopted. It's also shown that, in the context of the quantum field theory, gentileous can be taken approximately as fermions and that the usual quantum chromodynamics can be used to calculate the properties of gentilionic hadrons. (Author) [pt

  5. 77 FR 54818 - Polychlorinated Biphenyls (PCBs): Revisions to Manifesting Regulations

    2012-09-06

    ... Transportation of PCB waste. Waste Management and 562 Facilities that manage Remediation Services. PCB waste... as noted in the manifest discrepancy space. 264.72(a)(2) Definition of rejected wastes as manifest... Conservation and Recovery Act (RCRA) Uniform Hazardous Waste Manifest, under the Toxic Substances Control Act...

  6. 40 CFR 265.71 - Use of manifest system.

    2010-07-01

    ... the manifest; (iv) Within 30 days of delivery, send a copy of the manifest to the generator; and (v... Pennsylvania Avenue, NW., Washington, DC 20460. (b) If a facility receives, from a rail or water (bulk shipment... on the manifest (excluding the EPA identification numbers, generator's certification, and signatures...

  7. Data Security by Preprocessing the Text with Secret Hiding

    Ajit Singh; Upasana Jauhari

    2012-01-01

    With the advent of the Internet, an open forum, the massive increase in the data travel across networkmake an issue for secure transmission. Cryptography is the term that involves many encryption method to make data secure. But the transmission of the secure data is an intricate task. Steganography here comes with effect of transmission without revealing the secure data. The research paper provide the mechanism which enhance the security of data by using a crypto+stegano combination to increa...

  8. Security infrastructures: towards the INDECT system security

    Stoianov, Nikolai; Urueña, Manuel; Niemiec, Marcin; Machník, Petr; Maestro, Gema

    2012-01-01

    This paper provides an overview of the security infrastructures being deployed inside the INDECT project. These security infrastructures can be organized in five main areas: Public Key Infrastructure, Communication security, Cryptography security, Application security and Access control, based on certificates and smartcards. This paper presents the new ideas and deployed testbeds for these five areas. In particular, it explains the hierarchical architecture of the INDECT PKI...

  9. Internet Banking Security Strategy: Securing Customer Trust

    Frimpong Twum; Kwaku Ahenkora

    2012-01-01

    Internet banking strategies should enhance customers¡¯ online experiences which are affected by trust and security issues. This study provides perspectives of users and nonusers on internet banking security with a view to understanding trust and security factors in relation to adoption and continuous usage. Perception of internet banking security influenced usage intentions. Nonusers viewed internet banking to be insecure but users perceived it to be secure with perceived ease of use influenc...

  10. Mac Security Bible

    Kissell, Joe

    2010-01-01

    Your essential, no-holds-barred guide to Mac security threats and solutions. Myth number one: Macs are safer than PCs. Not really, says author Joe Kissell, named one of MacTech's "25 Most Influential People" in the Mac community for 2008. In this timely guide, he not only takes you beyond the myths, he also delves into the nitty-gritty of each potential threat, helping you weigh the pros and cons of the solutions you might choose. Learn to measure risk versus inconvenience, make informed decisions, and protect your Mac computers, your privacy, and your data with this essential guide.

  11. CAR SECURITY ENHANCEMENT IN PARKING AREAS

    NANYONGA BERINDA; AYESIGA LINDSEY PATRA; BYEKWASO FAISAL; NATULINDA LADAN

    2017-01-01

    Over time, car thefts have been reported within Kampala parking areas. This has been majorly due to inefficient security measures of the available parking systems which focus mainly on the car and not the driver, making parking management a challenge. The focus of this survey was to explore the requirements of a new system called Car to Driver Matching Security System to enhance security of cars in Kampala, in particular, from the experience of 15 people. The data collected was then analyzed ...

  12. Review: Security in Wireless Technologies in Business

    Sattarova, F. Y.; Kim, Tai-Hoon

    Wireless technology seems to be everywhere now - but it is still relatively in its infancy. New standards and protocols continue to emerge and problems and bugs are discovered. Nevertheless, wireless networks make many things much more convenient and it appears that wireless networks are here to stay. The differences and similarities of wireless and wired security, the new threats brought by mobility, the security of networks and devices and effects of security, or lack of it are shortly discussed in this review paper.

  13. Security of quantum cryptography with realistic sources

    Lutkenhaus, N.

    1999-01-01

    The interest in practical implementations of quantum key distribution is steadily growing. However, there is still a need to give a precise security statement which adapts to realistic implementation. In this paper I give the effective key rate we can obtain in a practical setting within scenario of security against individual attacks by an eavesdropper. It illustrates previous results that high losses together with detector dark counts can make secure quantum key distribution impossible. (Author)

  14. Security of quantum cryptography with realistic sources

    Lutkenhaus, N [Helsinki Institute of Physics, P.O. Box 9, 00014 Helsingin yliopisto (Finland)

    1999-08-01

    The interest in practical implementations of quantum key distribution is steadily growing. However, there is still a need to give a precise security statement which adapts to realistic implementation. In this paper I give the effective key rate we can obtain in a practical setting within scenario of security against individual attacks by an eavesdropper. It illustrates previous results that high losses together with detector dark counts can make secure quantum key distribution impossible. (Author)

  15. Security Threats on Wireless Sensor Network Protocols

    H. Gorine; M. Ramadan Elmezughi

    2016-01-01

    In this paper, we investigate security issues and challenges facing researchers in wireless sensor networks and countermeasures to resolve them. The broadcast nature of wireless communication makes Wireless Sensor Networks prone to various attacks. Due to resources limitation constraint in terms of limited energy, computation power and memory, security in wireless sensor networks creates different challenges than wired network security. We will discuss several attempts at addressing the issue...

  16. [Streptococcus suis infection--clinical manifestations].

    Dragojlović, Julijana; Milosević, Branko; Sasić, Neda; Pelemis, Mijomir; Sasić, Milan

    2005-01-01

    Streptococcus suis is a bacterium causing a disease in pigs and rarely in humans. This zoonosis is mostly found as a sporadic disease in individuals that were in contact with the affected or infected pigs: farmers, veterinarians and workers engaged in fresh pork processing. It is assumed that the bacterium enters the body through a cut abrasion in the skin. Initially, the condition resembles a flu, followed by signs of bacteriemia and sepsis. The most frequent clinical manifestation of Streptococcus suis infection is meningitis, leading to hearing loss in over 75% of patients, and subsequent arthritis, endophtalmitis, endocarditis and pneumonia. Toxic shock syndrome with hemorhagic manifestations rarely develops. This study included five male patients aged 22 to 63 years treated in the Intensive Care Unit of the Institute of Infectious and Tropical Diseases in Belgrade, due to Streptococcus suis infection. The aim of this study was to point to the existence of this bacteria in our environment, to describe clinical manifestations of the disease and to point out the importance of its prevention. All patients had epidemiological evidence of being in contact with pork meat. There were no data about diseased pigs. The estimated incubation period was 4 to 8 days. All patients had meningeal signs. Clinical symptoms included shivering, fever, vomiting, headache, malaise, vertigo and tinitus. Three patients presented with alerterd level of awarrness. Four patients developed very severe bilateral hearing impairment, whereas one endophtalmtis and one developed endocarditis. The cerebrospinal fluid (CSF) was opalescent in four patients, and only one patient presented with clear CSF. CSF examination showed typical changes characteristic for bacterial meningitis. Streptoccocus suis was isolated in CSF in all patients, and in one patient the bacteria was isolated in blood as well. All patients underwent treatement with II and III generation cephalosporins and one with one

  17. Security Management and Safeguards Office

    Bewley, Nathaniel M.

    2004-01-01

    The Security Management and Safeguards Office at NASA is here to keep the people working in a safe environment. They also are here to protect the buildings and documents from sabotage, espionage, and theft. During the summer of 2004, I worked with Richard Soppet in Physical Security. While I was working here I helped out with updating the map that we currently use at NASA Glenn Research Center, attended meetings for homeland security, worked with the security guards and the locksmith. The meetings that I attended for homeland security talked about how to protect ourselves before something happened, they told us to always be on the guard and look for anything suspicious, and the different ways that terrorist groups operate. When I was with the security guards I was taught how to check someone into the base, showed how to use a radar gun, observed a security guard make a traffic stop for training and was with them while they patrolled NASA Glenn Research Center to make sure things were running smooth and no one was in danger. When I was with the lock smith I was taught how to make keys and locks for the employees here at NASA. The lock smith also showed me that he had inventory cabinets of files that show how many keys were out to people and who currently has access to the rooms that they keys were made for. I also helped out the open house at NASA Glenn Research Center. I helped out by showing the Army Reserves, and Brook Park's SWAT team where all the main events were going to take place a week before the open house was going to begin. Then during the open house I helped out by making sure people had there IDS, checked through there bags, and handed out a map to them that showed where the different activities were going to take place. So the main job here at NASA Glenn Research Center for the Security Management and Safeguards Office is to make sure that nothing is stolen, sabotaged, and espionaged. Also most importantly make sure all the employees here at NASA are

  18. Planning security for supply security

    Spies von Buellesheim.

    1994-01-01

    The situation of the hardcoal mining industry is still difficult, however better than last year. Due to better economic trends in the steel industry, though on a lower level, sales in 1994 have stabilised. Stocks are being significantly reduced. As to the production, we have nearly reached a level which has been politically agreed upon in the long run. Due to the determined action of the coalmining companies, a joint action of management and labour, the strong pressure has been mitigated. On the energy policy sector essential targets have been achieved: First of all the ECSC decision on state aid which will be in force up to the year 2002 and which will contribute to accomplish the results of the 1991 Coal Round. Furthermore, the 1994 Act on ensuring combustion of hardcoal in electricity production up to the year 2005. The hardcoal mining industry is grateful to all political decision makers for the achievements. The industry demands, however, that all questions still left open, including the procurement of financial means after 1996, should be settled soon on the basis of the new act and in accordance with the 1991 Coal Round and the energy concept of the Federal Government. German hardcoal is an indispensable factor within a balanced energy mix which guarantees the security of our energy supply, the security of the price structure and the respect of the environment. (orig.) [de

  19. Information security fundamentals

    Peltier, Thomas R

    2013-01-01

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r

  20. ORACLE DATABASE SECURITY

    Cristina-Maria Titrade

    2011-01-01

    This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource management and password management. Security is a constant concern in the design and database development. Usually, there are no concerns about the existence of security, but rather how large it should be. A typically DBMS has several levels of security, in addition to those offered by the operating system or network. Typically, a DBMS has user a...

  1. High-Tech Security Help.

    Flanigan, Robin L.

    2000-01-01

    Advocates embrace high-tech security measures as necessary to avoid Columbine-style massacres. Critics contend that school systems can go overboard, making students feel less safe and too closely scrutinized. Current electronic, biometric, and computer-mapping devices and school applications are discussed. Vendors are listed. (MLH)

  2. Ocular Manifestations of Mosquito-Transmitted Diseases.

    Karesh, James W; Mazzoli, Robert A; Heintz, Shannon K

    2018-03-01

    Of the 3,548 known mosquito species, about 100 transmit human diseases. Mosquitoes are distributed globally throughout tropical and temperate regions where standing water sources are available for egg laying and the maturation of larva. Female mosquitoes require blood meals for egg production. This is the main pathway for disease transmission. Mosquitoes carry several pathogenic organisms responsible for significant ocular pathology and vision loss including West Nile, Rift Valley, chikungunya, dengue viruses, various encephalitis viruses, malarial parasites, Francisella tularensis, microfilarial parasites, including Dirofilaria, Wuchereria, and Brugia spp., and human botfly larvae. Health care providers may not be familiar with many of these mosquito-transmitted diseases or their associated ocular findings delaying diagnosis, treatment, and recovery of visual function. This article aims to provide an overview of the ocular manifestations associated with mosquito-transmitted diseases.

  3. Quantum manifestations of classical resonance zones

    De Leon, N.; Davis, M.J.; Heller, E.J.

    1984-01-01

    We examine the concept of nodal breakup of wave functions as a criterion for quantum mechanical ergodicity. We find that complex nodal structure of wave functions is not sufficient to determine quantum mechanical ergodicity. The influence of classical resonances [which manifest themselves as classical resonance zones (CRZ)] may also be responsible for the seeming complexity of nodal structure. We quantify this by reexamining one of the two systems studied by Stratt, Handy, and Miller [J. Chem. Phys. 71, 3311 (1974)] from both a quantum mechanical and classical point of view. We conclude that quasiperiodic classical motion can account for highly distorted quantum eigenstates. One should always keep this in mind when addressing questions regarding quantum mechanical ergodicity

  4. Natural curvature for manifest T-duality

    Poláček, Martin; Siegel, Warren

    2014-01-01

    We reformulate the manifestly T-dual description of the massless sector of the closed bosonic string, directly from the geometry associated with the (left and right) affine Lie algebra of the coset space Poincaré/Lorentz. This construction initially doubles not only the (spacetime) coordinates for translations but also those for Lorentz transformations (and their “dual”). As a result, the Lorentz connection couples directly to the string (as does the vielbein), rather than being introduced ad hoc to the covariant derivative as previously. This not only reproduces the old definition of T-dual torsion, but automatically gives a general, covariant definition of T-dual curvature (but still with some undetermined connections)

  5. Skin manifestations of chronic kidney disease.

    Robles-Mendez, J C; Vazquez-Martinez, O; Ocampo-Candiani, J

    2015-10-01

    Skin manifestations associated with chronic kidney disease are very common. Most of these conditions present in the end stages and may affect the patient's quality of life. Knowledge of these entities can contribute to establishing an accurate diagnosis and prognosis. Severe renal pruritus is associated with increased mortality and a poor prognosis. Nail exploration can provide clues about albumin and urea levels. Nephrogenic systemic fibrosis is a preventable disease associated with gadolinium contrast. Comorbidities, such as diabetes mellitus and secondary hyperparathyroidism, can lead to acquired perforating dermatosis and calciphylaxis, respectively. Effective and innovative treatments are available for all of these conditions. Copyright © 2015 Elsevier España, S.L.U. and AEDV. All rights reserved.

  6. Neurological manifestations of Chikungunya and Zika infections

    Talys J. Pinheiro

    Full Text Available ABSTRACT The epidemics of Chikungunya virus (CHIKV and Zika virus (ZIKV infections have been considered the most important epidemiological occurrences in the Americas. The clinical picture of CHIKV infection is characterized by high fever, exanthema, myalgia, headaches, and arthralgia. Besides the typical clinical picture of CHIKV, atypical manifestations of neurological complications have been reported: meningo-encephalitis, meningoencephalo-myeloradiculitis, myeloradiculitis, myelitis, myeloneuropathy, Guillain-Barré syndrome and others. The diagnosis is based on clinical, epidemiological, and laboratory criteria. The most common symptoms of ZIKV infection are skin rash (mostly maculopapular, fever, arthralgia, myalgia, headache, and conjunctivitis. Some epidemics that have recently occurred in French Polynesia and Brazil, reported the most severe conditions, with involvement of the nervous system (Guillain-Barré syndrome, transverse myelitis, microcephaly and meningitis. The treatment for ZIKV and CHIKV infections are symptomatic and the management for neurological complications depends on the type of affliction. Intravenous immunoglobulin, plasmapheresis, and corticosteroid pulse therapy are options.

  7. Variable manifestations of dysplasia epiphysealis hemimelica

    Azouz, E.M.; Slomic, A.M.; Marton, D.; Rigault, P.; Finidori, G.

    1985-01-01

    Dysplasia epiphysealis hemimelica (DEH) is an osteocartilaginous overgrowth involving one or multiple epiphyses or ossification centers, usually in a lower extremity on one side of the body. Characteristically the involvement is hemimelic, i.e., either the medial or lateral part of the ossification center is involved. The authors have studied 24 patients with DEH and are adding 15 new cases to the literature. Because of the variable manifestations of the dysplasia and its different degrees of involvement in the affected children, they have subdivided it into localized, classical and generalized. In the generalized form, there is involvement of a whole lower extremity from the pelvis to the foot, and some of these patients show megaepiphyses with enlargement of a whole epiphyseal center, not only its medial or lateral part. The authors have also described and illustrated other special features of the dysplasia especially the advanced bone age and the metaphyseal and growth plate involvement.

  8. Spiral CT manifestations of spherical pneumonia

    Li Xiaohong; Yang Hongwei; Xu Chunmin; Qin Xiu

    2008-01-01

    Objective: To explore the Spiral CT manifestations and differential diagnosis of spherical pneumonia. Methods: 18 cases of spherical pneumonia and 20 cases of peripheral pulmonary carcinoma were selected, both of them were confirmed by clinic and/or pathology. The SCT findings of both groups were compared retrospectively. Results: Main spiral CT findings of spherical pneumonia were showed as followings: square or triangular lesions adjacent to pleura; with irregular shape, blurry, slightly lobulated margin, sometimes with halo sign. Small inflammatory patches and intensified vascular markings around the lesions were seen. Lesions became smaller or vanished after short-term anti-inflammatory treatment. Conclusion: Spherical pneumonia showed some characteristics on Spiral CT scan, which are helpful in diagnosis and differential diagnosis of this disease. (authors)

  9. Musculoskeletal manifestations in sickle cell anemia

    Reddy Ravikanth

    2017-01-01

    Full Text Available Sickle cell anemia is an inherited hemoglobin disorder characterized by substitution of glutamic acid by valine at the sixth position of the beta globin chain. The sequence of events leads to pain crisis. Ischemia of the tissues resulting from decreased blood flow is believed to occur in pain crisis. Repeated or prolonged sickling causes red cell death in the form of hemolytic anemia. The majority of hospital admissions are due to painful crisis. These patients are at increased risk for both osteomyelitis and infarction of the long bones. Magnetic resonance imaging has been shown to be helpful in the diagnosis of early osteomyelitis and its differentiation from infarction in sickle cell disease patients with acute bone crisis. Others findings include dactylitis, medullary infarcts, diploic space widening, fish mouth vertebrae, and avascular necrosis. We present a case series on the various musculoskeletal manifestations of sickle cell disease.

  10. Renal manifestations in children with Alagille syndrome.

    Di Pinto, Diana; Adragna, Marta

    2018-04-01

    Alagille syndrome (AS) is a cholestatic disease secondary to scarcity of interlobular bile ducts. It is associated with extrahepatic manifestations, and renal involvement is frequent. To describe the prevalence, type and outcome of renal pathology in children with AS. The presence and outcome of renal pathology was retrospectively studied in 21 children who met AS criteria. Renal pathology was observed in 18 patients (85.7%): (1) ultrasound variations in 7 patients (6 cases of bilateral renal dysplasia and 1 case of renal agenesis); (2) distal renal tubular acidosis in 2 patients; (3) a drop in glomerular filtration and/or proteinuria in 16 patients. The frequency of a drop in glomerular filtration was similar between patients with and without pathological kidney ultrasound findings. Our study confirms a high prevalence of renal involvement, which enhances the importance of diagnosis and renal function follow-up in children with AS. Sociedad Argentina de Pediatría.

  11. Oral and periodontal manifestations associated with systemic sclerosis: A case series and review.

    Jagadish, Rekha; Mehta, Dhoom Singh; Jagadish, P

    2012-04-01

    Systemic sclerosis is a rare connective tissue disorder with a wide range of oral manifestations. This case series reports significant oral and periodontal changes and also makes an attempt to correlate oral and systemic findings in these patients which enable the clinician for a better diagnosis and evolve a comprehensive treatment plan. Six patients with a known diagnosis of systemic sclerosis were included. After obtaining the patient's informed consent, relevant medical history, oral manifestations including periodontal findings and oral hygiene index simplified index were recorded. In these patients, oral changes included restricted mouth opening and, resorption of the mandible. The periodontal changes observed were gingival recession, absence or minimal gingival bleeding on probing, and widened periodontal ligament space, radiographically. Patients with systemic sclerosis often show wide range of oral manifestations, which is of major concern for the dentist.

  12. Oral and periodontal manifestations associated with systemic sclerosis: A case series and review

    Rekha Jagadish

    2012-01-01

    Full Text Available Systemic sclerosis is a rare connective tissue disorder with a wide range of oral manifestations. This case series reports significant oral and periodontal changes and also makes an attempt to correlate oral and systemic findings in these patients which enable the clinician for a better diagnosis and evolve a comprehensive treatment plan. Six patients with a known diagnosis of systemic sclerosis were included. After obtaining the patient′s informed consent, relevant medical history, oral manifestations including periodontal findings and oral hygiene index simplified index were recorded. In these patients, oral changes included restricted mouth opening and, resorption of the mandible. The periodontal changes observed were gingival recession, absence or minimal gingival bleeding on probing, and widened periodontal ligament space, radiographically. Patients with systemic sclerosis often show wide range of oral manifestations, which is of major concern for the dentist.

  13. Are the cutaneous manifestations in patients with primary antiphospholipid syndrome a marker for predicting lung manifestations?

    Kontic, Milica; Stojanovich, Ljudmila; Mijailović-Ivković, Milena; Velinović, Mladen; Srnka, Jasminka; Zdravkovic, Marija

    2018-01-01

    The aim of this study was to investigate association between pulmonary and skin manifestations in a large group of patients with primary antiphospholipid syndrome (PAPS) as well as their connection with antiphospholipid antibodies. Our prospective study comprises of 390 patients with primary APS. Antiphospholipid antibody (aPL) analysis included detection of aCL (IgG/IgM), ß2GPI (IgG/IgM) and LA. Distinct pulmonary and skin associations were determined, as well as their associations with aPL. In PAPS patients the presence of LA was more common in PTE (p=0.005) and in pulmonary microthrombosis (p=0.003). We revealed statistical significance considering the presence of aCL IgM and pulmonary microthrombosis (p=0.05). Skin ulcerations correlated with positive titres aCL IgM and ß2 GPI IgM (p=0.03 and 0.04, respectively), while pseudovasculitis correlated with positive titres ß2 GPI IgM (p=0.02). PAPS patients were more more likely to develop pulmonary thromboembolisam if they had livedo reticularis (p=0.005), skin ulcerations (p=0.007), pseudovasculitic lesions (p=0.01), superficial cutaneous necrosis (p=0.005), and digital gangrene (p=0.02). Patients were also more prone to pulmonary microthrombosis if they already had livedo reticularis (p=0.03), skin ulcerations (p=0.007), pseudovasculitic lesions (p=0.05), superficial cutaneous necrosis (p=0.006), and digital gangrene (p=0.02). There is strong link between some pulmonary and skin manifestations in PAPS patients, suggesting complexity and evolutionary nature of APS. The presence of skin manifestations may be a high risk factor for several types of serious pulmonary manifestations in PAPS. Certain aPL types are associated with distinct pulmonary and skin manifestation, suggesting their predictive role.

  14. Computer Security: the security marathon, part 2

    Computer Security Team

    2014-01-01

    Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy?   In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...

  15. A review of IPv6 security concerns

    Van Heerden, RP

    2012-08-01

    Full Text Available This study focuses on the security concerns of IPv6. We make a broad introduction to IPv6 then briefly look at the differences between the IPv6 and IPv4 protocols, their known vulnerabilities and identify some security concerns when implementing IPv...

  16. Curriculum for Security in a Nuclear Age.

    Carlson, Helen L.

    1984-01-01

    A survey of secondary students after they had completed a course entitled "Security in the Nuclear Age" suggests that instruction can make some impact in the area of security information. However, results also showed that students use media rather than school as information sources. Peace curricula are also discussed. (RM)

  17. 7 CFR 1710.113 - Loan security.

    2010-01-01

    ... 7 Agriculture 11 2010-01-01 2010-01-01 false Loan security. 1710.113 Section 1710.113 Agriculture... GENERAL AND PRE-LOAN POLICIES AND PROCEDURES COMMON TO ELECTRIC LOANS AND GUARANTEES Loan Purposes and Basic Policies § 1710.113 Loan security. (a) RUS makes loans only if, in the judgment of the...

  18. 7 CFR 1735.22 - Loan security.

    2010-01-01

    ... 7 Agriculture 11 2010-01-01 2010-01-01 false Loan security. 1735.22 Section 1735.22 Agriculture... GENERAL POLICIES, TYPES OF LOANS, LOAN REQUIREMENTS-TELECOMMUNICATIONS PROGRAM Loan Purposes and Basic Policies § 1735.22 Loan security. (a) RUS makes loans only if, in the judgment of the Administrator, the...

  19. Contribution of Renewables to Energy Security

    NONE

    2007-07-01

    The environmental benefits of renewable energy are well known. But the contribution that they can make to energy security is less widely recognised. This report aims to redress the balance, showing how in electricity generation, heat supply, and transport, renewables can enhance energy security and suggesting policies that can optimise this contribution.

  20. Network and Database Security: Regulatory Compliance, Network, and Database Security - A Unified Process and Goal

    Errol A. Blake

    2007-12-01

    Full Text Available Database security has evolved; data security professionals have developed numerous techniques and approaches to assure data confidentiality, integrity, and availability. This paper will show that the Traditional Database Security, which has focused primarily on creating user accounts and managing user privileges to database objects are not enough to protect data confidentiality, integrity, and availability. This paper is a compilation of different journals, articles and classroom discussions will focus on unifying the process of securing data or information whether it is in use, in storage or being transmitted. Promoting a change in Database Curriculum Development trends may also play a role in helping secure databases. This paper will take the approach that if one make a conscientious effort to unifying the Database Security process, which includes Database Management System (DBMS selection process, following regulatory compliances, analyzing and learning from the mistakes of others, Implementing Networking Security Technologies, and Securing the Database, may prevent database breach.

  1. Biometric Feature Script for Information Security

    N. E. Gunko

    2010-03-01

    Full Text Available Special studies related to the development of rules for making decisions on the psychological characteristics of the offender in his manuscript handwriting with the goal of ensuring information security.

  2. [Manifestation of first branchial anomaly:56 cases reportrhinitis].

    Zhang, B; Chen, L S; Huang, S L; Liang, L; Wu, P N; Zhang, S Y; L, Z M; Liang, L

    2016-09-05

    Objective: To sum up and conclude manifestation of congenital first branchial anomaly(CFBCA). Method: The clinical data of 56 patients from 2005 to 2015 in our hospital were retrospective reviewed. Result: Manifestation:mass without pain(26.8%),repeated sore and discharge(71.4%),otological symptom(external auditory discharge、hearing loss,28.6%).Eleven cases bacterial sample showed positive result,and most of them show pseudomonas aeruginosa and staphylococcus aureus.Auricular endoscopy typically performed stricture of external auditory canal,cholesteatoma samples accumulated in ear canal,fistula at the conjunction of the bone and cartilage and tympanic membranous attachment.Typical performance of CT(MRI)was that there were cystic,lobulated or tubular abnormal shadow related with ear canal in Pochet's triangle area whose cyst wall or pipe wall could been enhanced in enhanced CT(MRI) scans,and part of that could be connected with skin.The statistical difference between type Oslen and Work and clinical characteristics( P <0.01),and the relationship between type Oslen and Work( P <0.01).Most of Work Ⅰ were cyst type,and these two type often had no infected symptom.Most of them were young patients.Most of Work Ⅱ were sinus and fistula type ,and these two type often had infected symptom.Most of them were teenagers.Part of patients of type Work Ⅱ showed tympanic membranous attachment. Conclusion: CFBCA was rare,and it is more common in young patients and often in left part.It always performed as mass without pain、repeated sore and discharge、external auditory discharge.Most of Work Ⅰ were cyst type,and these two type often had no infected symptom and most of them were young patients .Most of Work Ⅱ were sinus and fistula type,and these two type often had infected symptom and most of them were teenagers.Auricular endoscopy,CT,MRI could help make diagnose.Doctors clinical need to differentiate it with related diseases according to different manifestations

  3. The open superstring 6-point amplitude with manifest symmetries

    Barreiro, Luiz Antonio; Medina, Ricardo; Stieberger, Stephan

    2011-01-01

    Full text: The general tree level amplitude for massless bosons states of open superstrings has been known for a long time ago. It is clear how to obtain this general formula using vertex operators in the Ramond-Neveu-Schwarz formalism. From the beginning of the eighties the explicit expression for this formula has been known in the case of 3 and 4-point amplitudes. In that decade an attempt (with partial success) was done, by Kitazawa, to obtain the corresponding 5-point amplitude. Only in 2002 a complete and correct expression for this amplitude was obtained. Its low energy expansion was compared to the corresponding one from the low energy effective Lagrangian of the open superstring, finding a perfect match. A few years later, in 2005, it was realized that the 5-point formula could be written in a very much compact form, as a sum of two terms: each of them consisting of a momentum factor and a kinematic expression. This constituted a generalization of the 4-point amplitude case, which had been known to be cast in only one momentum factor multiplied by one kinematic expression. For this simplification to happen, known symmetries of the (tree level) scattering amplitudes were implemented in a manifest form. These symmetries are (on-shell) gauge symmetry, cyclic symmetry and twisting symmetry (or world sheet parity). In the recent years it has been realized that the N-point amplitude can be written as a sum of (N - 3)! terms (where N > 3). This result not only agrees with the 3, 4 and 5-point results, but also with the 6-point result which had been obtained by 2005, written as a sum of six terms. The expression that up to now has been obtained for the 6-point amplitude is quite complicated and, besides knowing that it consists of six terms, is not very illuminating. In this work we report on the recent result of writing the 6-point amplitude with gauge, cyclic and twisting symmetries manifest. Not only because of the manifest symmetries this result is important

  4. Information Systems Security Audit

    Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu

    2007-01-01

    The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  5. Security for grids

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  6. Intrathoracic Manifestations of IgG4-Related Disease

    Sian Yik Lim

    2016-10-01

    Full Text Available Intrathoracic involvement with IgG4-related disease (IgG4-RD is frequently overlooked in IgG4-related disease patients. In this article we review the intrathoracic findings of IgG4-RD which are variable and protean. IgG4-related disease has been reported to affect the lung parenchyma, pleura, mediastinal/hilar lymph nodes, vasculature, and pericardium within the thorax. Mediastinal and hilar lymphadenopathy is the most common intrathoracic manifestation of IgG4-RD. Four main patterns of pulmonary disease have been described, including the solid nodular type, the bronchovascular type, the alveolar interstitial type, and the round shaped ground glass type. When feasible, a biopsy should be obtained to confirm the diagnosis. Most lesions show characteristic pathologic findings of IgG4-RD: dense lymphoplasmacytic infiltrate, storiform fibrosis, and obliterative phlebitis. While this helps establish the diagnosis, the interpretation of pathology findings in the clinical context is key in making an accurate diagnosis. Mimickers of IgG4-RD should be ruled out, before making a diagnosis. The intrathoracic findings of IgG4-RD can be treated effectively with prednisone, but may require additional immunosuppressive therapies, including rituximab.

  7. A practical approach to ichthyoses with systemic manifestations.

    Saral, S; Vural, A; Wollenberg, A; Ruzicka, T

    2017-06-01

    Inherited ichthyoses are rare disorders in terms of patient numbers, but abundant in terms of clinical-genetic subtypes. These disorders are often associated with severe systemic manifestations, in addition to significant medical, cosmetic and social problems. There are 17 subtypes of syndromic ichthyosis identified so far and most patients with these syndromes are living in countries with high consanguinity rates. Frequently, clinicians cannot make a definitive diagnosis and patients are not managed properly owing to the rarity and complexity of these disorders. These difficulties make this group of ichthyosis and the patients living with them 'orphan'. After skin and skin appendages, nervous system is the most frequently involved system in ichthyosis syndromes. Thus, association of ichthyosis with neurological symptoms provides an important clue for diagnosis. In this article, we aim to increase clinicians' comprehension of ichthyosis syndromes by providing a symptomatology-based approach based on this observation. Additionally, we provide a review of ichthyosis syndromes, with special emphasis on neurological symptoms, hoping to attract interest to this complicated field. © 2016 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  8. Integrated security systems design a complete reference for building enterprise-wide digital security systems

    Norman, Thomas L

    2014-01-01

    Integrated Security Systems Design, 2nd Edition, is recognized as the industry-leading book on the subject of security systems design. It explains how to design a fully integrated security system that ties together numerous subsystems into one complete, highly coordinated, and highly functional system. With a flexible and scalable enterprise-level system, security decision makers can make better informed decisions when incidents occur and improve their operational efficiencies in ways never before possible. The revised edition covers why designing an integrated security system is essential a

  9. National security

    Anon.

    1975-01-01

    An x-ray-fluorescence analysis system is being developed for determining uranium and plutonium concentrations in the solution obtained when the fuel rods from light-water power reactors are dissolved in nitric acid. These concentrations are needed to inventory the uranium and plutonium handled in fuel reprocessing plants. This technique should make it possible to analyze dissolver solution with speed and a 0.5 percent accuracy

  10. Biomedical devices and systems security.

    Arney, David; Venkatasubramanian, Krishna K; Sokolsky, Oleg; Lee, Insup

    2011-01-01

    Medical devices have been changing in revolutionary ways in recent years. One is in their form-factor. Increasing miniaturization of medical devices has made them wearable, light-weight, and ubiquitous; they are available for continuous care and not restricted to clinical settings. Further, devices are increasingly becoming connected to external entities through both wired and wireless channels. These two developments have tremendous potential to make healthcare accessible to everyone and reduce costs. However, they also provide increased opportunity for technology savvy criminals to exploit them for fun and profit. Consequently, it is essential to consider medical device security issues. In this paper, we focused on the challenges involved in securing networked medical devices. We provide an overview of a generic networked medical device system model, a comprehensive attack and adversary model, and describe some of the challenges present in building security solutions to manage the attacks. Finally, we provide an overview of two areas of research that we believe will be crucial for making medical device system security solutions more viable in the long run: forensic data logging, and building security assurance cases.

  11. Breaking the cyber-security dilemma: aligning security needs and removing vulnerabilities.

    Dunn Cavelty, Myriam

    2014-09-01

    Current approaches to cyber-security are not working. Rather than producing more security, we seem to be facing less and less. The reason for this is a multi-dimensional and multi-faceted security dilemma that extends beyond the state and its interaction with other states. It will be shown how the focus on the state and "its" security crowds out consideration for the security of the individual citizen, with detrimental effects on the security of the whole system. The threat arising from cyberspace to (national) security is presented as possible disruption to a specific way of life, one building on information technologies and critical functions of infrastructures, with relatively little consideration for humans directly. This non-focus on people makes it easier for state actors to militarize cyber-security and (re-)assert their power in cyberspace, thereby overriding the different security needs of human beings in that space. Paradoxically, the use of cyberspace as a tool for national security, both in the dimension of war fighting and the dimension of mass-surveillance, has detrimental effects on the level of cyber-security globally. A solution out of this dilemma is a cyber-security policy that is decidedly anti-vulnerability and at the same time based on strong considerations for privacy and data protection. Such a security would have to be informed by an ethics of the infosphere that is based on the dignity of information related to human beings.

  12. Quality of Security Service: Adaptive Security

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    The premise of Quality of Security Service is that system and network management functions can be more effective if variable levels of security services and requirements can be presented to users or network tasks...

  13. Security Investment in Contagious Networks.

    Hasheminasab, Seyed Alireza; Tork Ladani, Behrouz

    2018-01-16

    Security of the systems is normally interdependent in such a way that security risks of one part affect other parts and threats spread through the vulnerable links in the network. So, the risks of the systems can be mitigated through investments in the security of interconnecting links. This article takes an innovative look at the problem of security investment of nodes on their vulnerable links in a given contagious network as a game-theoretic model that can be applied to a variety of applications including information systems. In the proposed game model, each node computes its corresponding risk based on the value of its assets, vulnerabilities, and threats to determine the optimum level of security investments on its external links respecting its limited budget. Furthermore, direct and indirect nonlinear influences of a node's security investment on the risks of other nodes are considered. The existence and uniqueness of the game's Nash equilibrium in the proposed game are also proved. Further analysis of the model in a practical case revealed that taking advantage of the investment effects of other players, perfectly rational players (i.e., those who use the utility function of the proposed game model) make more cost-effective decisions than selfish nonrational or semirational players. © 2018 Society for Risk Analysis.

  14. Perceptions of randomized security schedules.

    Scurich, Nicholas; John, Richard S

    2014-04-01

    Security of infrastructure is a major concern. Traditional security schedules are unable to provide omnipresent coverage; consequently, adversaries can exploit predictable vulnerabilities to their advantage. Randomized security schedules, which randomly deploy security measures, overcome these limitations, but public perceptions of such schedules have not been examined. In this experiment, participants were asked to make a choice between attending a venue that employed a traditional (i.e., search everyone) or a random (i.e., a probability of being searched) security schedule. The absolute probability of detecting contraband was manipulated (i.e., 1/10, 1/4, 1/2) but equivalent between the two schedule types. In general, participants were indifferent to either security schedule, regardless of the probability of detection. The randomized schedule was deemed more convenient, but the traditional schedule was considered fairer and safer. There were no differences between traditional and random schedule in terms of perceived effectiveness or deterrence. Policy implications for the implementation and utilization of randomized schedules are discussed. © 2013 Society for Risk Analysis.

  15. Security of M-Commerce transactions

    Ion IVAN

    2013-07-01

    Full Text Available In this material electronic market are defined. How they are structured. Security in E-Commerce applications is very important both at the administrative level and from the user perspective. The new trend in the field is the M-commerce that involves making purchases through mobile devices. And for M-commerce transactions the security is a very important thing. Here's how to analyze the security of M-commerce transactions and ways to increase security for these transactions taking into account the organization of M-Commerce applications, software used, hardware used and other important issues in the development of these applications.

  16. Social Security Bulletin

    Social Security Administration — The Social Security Bulletin (ISSN 1937-4666) is published quarterly by the Social Security Administration. The Bulletin is prepared in the Office of Retirement and...

  17. Transportation Security Administration

    ... content Official website of the Department of Homeland Security Transportation Security Administration A - Z Index Blog What Can I ... Search form Search the Site Main menu Travel Security Screening Special Procedures TSA Pre✓® Passenger Support Travel ...

  18. Security, Fraud Detection

    First page Back Continue Last page Overview Graphics. Secure. Secure. Server – Intruder prevention/detection; Network – Encryption, PKI; Client - Secure. Fraud detection based on audit trails. Automatic alerts like credit-card alerts based on suspicious patterns.

  19. Computer security engineering management

    McDonald, G.W.

    1988-01-01

    For best results, computer security should be engineered into a system during its development rather than being appended later on. This paper addresses the implementation of computer security in eight stages through the life cycle of the system; starting with the definition of security policies and ending with continuing support for the security aspects of the system throughout its operational life cycle. Security policy is addressed relative to successive decomposition of security objectives (through policy, standard, and control stages) into system security requirements. This is followed by a discussion of computer security organization and responsibilities. Next the paper directs itself to analysis and management of security-related risks, followed by discussion of design and development of the system itself. Discussion of security test and evaluation preparations, and approval to operate (certification and accreditation), is followed by discussion of computer security training for users is followed by coverage of life cycle support for the security of the system

  20. USCG Security Plan Review

    Department of Homeland Security — The Security Plan Review module is intended for vessel and facility operators to check on the status of their security plans submitted to the US Coast Guard. A MISLE...

  1. FOILFEST :community enabled security.

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr. (.,; .)

    2005-09-01

    The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological

  2. SECURE nuclear district heating plant

    Nilsson; Hannus, M.

    1978-01-01

    The role foreseen for the SECURE (Safe Environmentally Clean Urban REactor) nuclear district heating plant is to provide the baseload heating needs of primarily the larger and medium size urban centers that are outside the range of waste heat supply from conventional nuclear power stations. The rationale of the SECURE concept is that the simplicity in design and the inherent safety advantages due to the use of low temperatures and pressures should make such reactors economically feasible in much smaller unit sizes than nuclear power reactors and should make their urban location possible. It is felt that the present design should be safe enough to make urban underground location possible without restriction according to any criteria based on actual risk evaluation. From the environmental point of view, this is a municipal heat supply plant with negligible pollution. Waste heat is negligible, gaseous radioactivity release is negligible, and there is no liquid radwaste release. Economic comparisons show that the SECURE plant is competitive with current fossil-fueled alternatives. Expected future increase in energy raw material prices will lead to additional energy cost advantages to the SECURE plant

  3. Decision Making

    Pier Luigi Baldi

    2006-06-01

    Full Text Available This article points out some conditions which significantly exert an influence upon decision and compares decision making and problem solving as interconnected processes. Some strategies of decision making are also examined.

  4. Kyrgyzstan's security problems today

    Abduvalieva, Ryskul

    2009-01-01

    Regional stability and security consist of two levels-the external security of each country at the regional level and the internal security of each of them individually. A state's external and internal security are closely interrelated concepts. It stands to reason that ensuring internal security and stability is the primary and most important task. But the external aspect also requires attention. This article takes a look at the most important problems of ensuring Kyrgyzstan's security.

  5. Security By Design

    Tanner, M. James

    2009-01-01

    Securing a computer from unwanted intrusion requires astute planning and effort to effectively minimize the security invasions computers are plagued with today. While all of the efforts to secure a computer are needed, it seems that the underlying issue of what is being secured has been overlooked. The operating system is at the core of the security issue. Many applications and devices have been put into place to add layers of protection to an already weak operating system. Security did not u...

  6. Foundational aspects of security

    Chatzikokolakis, Konstantinos; Mödersheim, Sebastian Alexander; Palamidessi, Catuscia

    2014-01-01

    This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security.......This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security....

  7. Security guide for subcontractors

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  8. Redefining security.

    Mathews, J T

    1989-01-01

    The concept of US national security was redefined in the 1970s to include international economics, and lately environmental degradation has also become a factor, as pollution transcends boundaries. By 2100 another 5-6 billion people may be added to the world's population requiring dramatic production and technology transformation with the resultant expanded energy use, emissions, and waste impacting the ecosystem. Climate change through global warming is in the offing. The exponential growth of the population in the developing world poses a crucial challenge for food production, housing, and employment. At a 1% growth rate population doubles in 72 years, while at 3% it doubles in 24 years. Africa's growth rate is almost 3%, it is close to 2% in Latin America, and it is somewhat less in Asia. Renewable resources such as overfished fishing grounds can become nonrenewable, and vanished species can never be resurrected. Deforestation leads to soil erosion, damage to water resources through floods and silting of irrigation networks, and accelerated loss of species. 20% of species could disappear by 2000 thereby losing genetic resources for chemicals, drugs, and food sources. Overcultivation has caused major erosion and decline of agricultural productivity in Haiti, Guatemala, Turkey, and India. Lopsided land ownership in Latin America requires land reform for sustainable agricultural production in the face of the majority of people cultivating plots for bare subsistence. Human practices that have caused environmental damage include concessions granted to logging companies in the Philippines, mismanagement of natural resources in sub-Saharan Africa, the ozone hole, and the greenhouse effect with potential climate changes. Solutions include family planning, efficient energy use, sustainable agroforestry techniques, and environmental accounting of goods and services.

  9. International security and arms control

    Ekeus, R.

    2000-01-01

    The end of the cold war also ended the focus on the bilateral approach to arms control and disarmament. Key concepts of security needed to be revisited, along with their implications for the disarmament and arms control agenda. Though there is currently a unipolar global security environment, there remain important tasks on the multilateral arms control agenda. The major task is that of reducing and eliminating weapons of mass destruction, especially nuclear weapons. The author contends that maintaining reliance on the nuclear-weapons option makes little sense in a time when the major Powers are strengthening their partnerships in economics, trade, peacemaking and building. (author)

  10. Smart Grid Security. White Paper

    NONE

    2011-09-15

    One of the biggest concerns for smart grid developers is cyber security due to the reliance on IT communication networks. While the current grid is not immune to energy theft, fraud and malicious cyber-attacks, the smart grid poses new security issues. It is more likely now that theft, malicious attack and fraud will be committed by people working remotely from a laptop several miles away, even in a different country, than someone physically manipulating meters. This makes it difficult to predict where attacks will come from.

  11. Gynecomastia as the initial manifestation of hyperthyroidism.

    Gordon, D L; Brown, J L; Emanuele, N V; Hall, L

    1997-01-01

    To present two new cases of gynecomastia as the initial manifestation of hyperthyroidism. We describe detailed case reports of two men with breast enlargement who were found to have hyperthyroidism, and we review the related literature. Two men sought medical assistance because of unilateral tender gynecomastia. In one of these patients, thyroid, gonadal, and prostate examinations showed normal findings at the time of initial assessment, and symptoms of hyperthyroidism developed later. In our other patient with gynecomastia, other symptoms of hyperthyroidism--for example, nervousness, irritability, palpitations, and fatigue--had been present for a prolonged period but had been considered "normal" by the patient. In both patients, the hyperthyroidism was treated with radioiodine. Breast pain disappeared in both patients, and breast enlargement disappeared in one patient and was decreased in the other patient after euthyroidism was achieved. Review of the literature disclosed only two similar cases. Because of the rarity of gynecomastia as the initial symptom of hyperthyroidism, we believe that thyroid function tests are not indicated in the workup of patients whose major complaint is gynecomastia.

  12. Neuro-ophthalmic manifestations of prematurity

    Preeti Patil Chhablani

    2014-01-01

    Full Text Available Increasing rates of preterm births coupled with better survival of these infants have resulted in higher prevalence of systemic and ocular complications associated with prematurity. In addition to retinopathy of prematurity, infants who are born preterm may suffer from severe visual impairment as a result of hypoxic ischemic encephalopathy, hypoglycemia, and other metabolic imbalances. The effect of these processes on the anterior visual pathway may result in optic atrophy, optic nerve hypoplasia or optic disc cupping and affection of the posterior visual pathway leads to cortical visual impairment (CVI. Other ocular associations include strabismus, nystagmus, and ocular motor abnormalities such as tonic down gaze and defective saccades and pursuits. Cortical and subcortical involvement also manifests as defects in functional vision and these have not yet been completely understood. Children with CVI may have visual field defects, photophobia, defective visual processing, and deficient color vision. Since most of these children also suffer from additional systemic disabilities, evaluation, and management remains a challenge. However, early diagnosis and initiation of rehabilitation therapy can prove to be of significant benefit in these children.

  13. Neuropsychiatric Manifestations in a Patient with Panhypopituitarism

    Oluwole Jegede

    2017-01-01

    Full Text Available We present a case of an incidental diagnosis of panhypopituitarism in a 68-year-old African American man admitted to our psychiatric inpatient unit with symptoms suggestive of schizophrenia. The case was unusual as a first-episode psychosis given the patient’s age. In the course of his admission, the patient’s clinical condition deteriorated culminating in a sudden altered mental status which prompted a transfer to the medical floors and further investigations. A head CT scan and a pituitary MRI revealed a near total resection of the pituitary while laboratory investigations revealed hyponatremia and a grossly low hormone profile. The progression of these events casts doubts on our admitting diagnosis as the primary cause of the patient’s symptoms. The patient’s clinical condition improved only when his endocrinopathy was treated with hormone replacement, fluids, and electrolyte correction in addition to antipsychotics. An inability to verify the patient’s psychiatric history and a remote history of pituitary resection several decades earlier, unknown to the treating team, added to the diagnostic conundrum. We revised the diagnosis to neuropsychiatric manifestations secondary to an organic brain syndrome due to a partial pituitary resection. The patient was discharged with no symptoms of psychosis, good insight, judgment, and good reality testing.

  14. Neuropsychiatric Manifestations in a Patient with Panhypopituitarism.

    Jegede, Oluwole; Jeyakumar, Ajouka; Balakumar, Thyarapan; Raghu, Alyssa; Chang, Katherine I; Soewono, Katarina; Gustave, Mario; Jolayemi, Ayodeji

    2017-01-01

    We present a case of an incidental diagnosis of panhypopituitarism in a 68-year-old African American man admitted to our psychiatric inpatient unit with symptoms suggestive of schizophrenia. The case was unusual as a first-episode psychosis given the patient's age. In the course of his admission, the patient's clinical condition deteriorated culminating in a sudden altered mental status which prompted a transfer to the medical floors and further investigations. A head CT scan and a pituitary MRI revealed a near total resection of the pituitary while laboratory investigations revealed hyponatremia and a grossly low hormone profile. The progression of these events casts doubts on our admitting diagnosis as the primary cause of the patient's symptoms. The patient's clinical condition improved only when his endocrinopathy was treated with hormone replacement, fluids, and electrolyte correction in addition to antipsychotics. An inability to verify the patient's psychiatric history and a remote history of pituitary resection several decades earlier, unknown to the treating team, added to the diagnostic conundrum. We revised the diagnosis to neuropsychiatric manifestations secondary to an organic brain syndrome due to a partial pituitary resection. The patient was discharged with no symptoms of psychosis, good insight, judgment, and good reality testing.

  15. Q fever: a new ocular manifestation

    Udaondo P

    2011-09-01

    Full Text Available P Udaondo1,3, S Garcia-Delpech1,2, D Salom1,2, M Garcia-Pous1, M Diaz-Llopis1,21Department of Ophthalmology, Nuevo Hospital Universitario y Politecnico La Fe, Valencia, Spain; 2Faculty of Medicine, Universitat de València, Valencia, Spain; 3Universidad Cardenal Herrera CEU, Valencia, SpainAbstract: Q Fever is a zoonosis caused by Coxiella burnetii. Ocular manifestations are rare in this infection. We describe the case of a man complaining of an intense retro-orbital headache, fever, arthralgia, and bilateral loss of vision, who showed an anterior uveitis accompanied by exudative bilateral inferior retinal detachment and optic disk edema. At the beginning, a Vogt–Koyanagi–Harada (VKH syndrome was suspected, but the patient was diagnosed with Q fever and treatment with doxycycline was initiated, with complete resolution after 2 weeks. We wondered if Q fever could unleash VKH syndrome or simulate a VKH syndrome by a similar immunological process.Keywords: Q fever, Vogt–Koyanagi–Harada syndrome, panuveitis, exudative retinal detachment

  16. Cutaneous Manifestations of Diabetes Mellitus: A Review.

    Lima, Ana Luiza; Illing, Tanja; Schliemann, Sibylle; Elsner, Peter

    2017-08-01

    Diabetes mellitus is a widespread endocrine disease with severe impact on health systems worldwide. Increased serum glucose causes damage to a wide range of cell types, including endothelial cells, neurons, and renal cells, but also keratinocytes and fibroblasts. Skin disorders can be found in about one third of all people with diabetes and frequently occur before the diagnosis, thus playing an important role in the initial recognition of underlying disease. Noninfectious as well as infectious diseases have been described as dermatologic manifestations of diabetes mellitus. Moreover, diabetic neuropathy and angiopathy may also affect the skin. Pruritus, necrobiosis lipoidica, scleredema adultorum of Buschke, and granuloma annulare are examples of frequent noninfectious skin diseases. Bacterial and fungal skin infections are more frequent in people with diabetes. Diabetic neuropathy and angiopathy are responsible for diabetic foot syndrome and diabetic dermopathy. Furthermore, antidiabetic therapies may provoke dermatologic adverse events. Treatment with insulin may evoke local reactions like lipohypertrophy, lipoatrophy and both instant and delayed type allergy. Erythema multiforme, leukocytoclastic vasculitis, drug eruptions, and photosensitivity have been described as adverse reactions to oral antidiabetics. The identification of lesions may be crucial for the first diagnosis and for proper therapy of diabetes.

  17. Hemoglobinopathies: clinical manifestations, diagnosis, and treatment.

    Kohne, Elisabeth

    2011-08-01

    Hemoglobinopathies are among the most common inherited diseases around the world. They have become much more common recently in northern and central Europe, including Germany, due to immigration. Selective review of the literature with consideration of national guidelines. The hemoglobinopathies encompass all genetic diseases of hemoglobin. They fall into two main groups: thalassemia syndromes and structural hemoglobin variants (abnormal hemoglobins). α- and β-thalassemia are the main types of thalassemia; the main structural hemoglobin variants are HbS, HbE and HbC. There are many subtypes and combined types in each group. The highly variable clinical manifestations of the hemoglobinopathies range from mild hypochromic anemia to moderate hematological disease to severe, lifelong, transfusion-dependent anemia with multiorgan involvement. Stem-cell transplantation is the preferred treatment for the severe forms of thalassemia. Supportive, rather than curative, treatment consists of periodic blood transfusions for life, combined with iron chelation. Drugs to treat the symptoms of sickle-cell disease include analgesics, antibiotics, ACE inhibitors and hydroxyurea. Blood transfusions should be given only when strictly indicated. More than 90% of patients currently survive into adulthood. Optimally treated patients have a projected life span of 50 to 60 years. Hemoglobinopathies are a public health issue in today's multiethnic German population. Adequate care of the affected patients requires a wide variety of diagnostic and therapeutic measures.

  18. Clinical manifestations and management of Gaucher disease.

    Linari, Silvia; Castaman, Giancarlo

    2015-01-01

    Gaucher disease is a rare multi-systemic metabolic disorder caused by the inherited deficiency of the lysosomal enzyme β-glucocerebrosidase, which leads to the accumulation of its normal substrate, glucocerebroside, in tissue macrophages with damage to haematological, visceral and bone systems. Anaemia, thrombocytopenia, enlargement of liver and/or spleen, skeletal abnormalities (osteopenia, lytic lesions, pathological fractures, chronic bone pain, bone crisis, bone infarcts, osteonecrosis and skeletal deformities) are typical manifestations of the most prevalent form of the disease, the so-called non-neuronopathic type 1. However, severity and coexistence of different symptoms are highly variable. The determination of deficient β-glucocerebrosidase activity in leukocytes or fibroblasts by enzymatic assay is the gold standard for the diagnosis of Gaucher disease. Comprehensive and reproducible evaluation and monitoring of all clinically relevant aspects are fundamental for the effective management of Gaucher disease patients. Enzyme replacement therapy has been shown to be effective in reducing glucocerebroside storage burden and diminishing the deleterious effects caused by its accumulation. Tailored treatment plan for each patient should be directed to symptom relief, general improvement of quality of life, and prevention of irreversible damage.

  19. The chest radiological manifestation in psittacosis

    Zhang Jun; Fu Jiazhen; Wang Shulan; Zhang Shuxin; Sun Guochang; Tang Guangjian

    2005-01-01

    Objective: To summarize the clinical characteristics and imaging features of psittacosis. Methods: The clinical features and imaging appearances of 3 cases with acute psittacosis were retrospectively analyzed. The related literature was reviewed. Results: The clinical manifestation of psittacosis was high fever in the patients. Physical findings included pulse-temperature dissociation, localized lung crackles, hepatomegaly, and splenomegaly. Laboratory findings showed elevation of ESR in all cases, and liver dysfunction was present in 2 cases. The counts of white blood cells were normal, but the percent of neutrophils might be increased. The chest X-ray and CT scan showed air-space consolidation and ground-glass attenuation in the lung, and miliary, nodular, or consolidated shadows were found in pathological areas. Pleural effusions were also present in 2 cases. Psittacosis was diagnosed from the history of exposure to infected parrots and elevation of the IgG and IgM titer for Chlamydia psittaci. Erythromycin was effective in all 3 patients. Conclusion: Although the appearance of psittacosis on clinical findings and chest X-ray and CT scan is not characteristic, psittacosis can be diagnosed with the combination of the history of exposure to infected parrots and laboratory findings. CT scan can reveal the focus earlier and accurately, and catching the imaging features of psittacosis is helpful in differential diagnosis. (authors)

  20. Biochemical Manifestation of HIV Lipodystrophy Syndrome.

    Ihenetu, Kenneth; Mason, Darius

    2012-01-01

    Highly active anti-retroviral therapy (HAART), including protease inhibitors (PI) have led to dramatic improvements in the quality and quantity of life in patients with acquired immunodeficiency syndrome (AIDS). However, a significant number of AIDS patients on HAART develop characteristic changes in body fat redistribution referred to as lipodystrophy syndrome (LDS). Features of LDS include hypertrophy in the neck fat pad (buffalo hump), increased fat in the abdominal region (protease paunch), gynecomastia and loss of fat in the mid-face and extremities. The aim of this paper is to review the current knowledge regarding this syndrome. This article reviews the published investigations on biochemical manifestation of HIV lipodystrophy syndrome. It is estimated that approximately 64% of patients treated with PI will experience this syndrome. Biochemically, these patients have increased triglycerides (Trig), total cholesterol (TC), low-density lipoprotein-cholesterol (LDL-C) and extremely low high-density lipoprotein-cholesterol (HDL-C). It is hoped that awareness of this syndrome would aid in early diagnosis and better patient management, possibly leading to a lower incidence of cardiovascular complications among these patients.

  1. Oroal manifestations in patients with multiple sclerosis

    Grajales González Hilda María

    2014-07-01

    Full Text Available Multiple sclerosis is a chronic autoimmune inflammatory disease of the central nervous system, characterized by the presence of acute focal inflammatory demyelination, axonal loss and gliosis. It affects predominantly in young adults between 20 and 40 years of age; it is infrequent in the pediatric age. A observational, retrospective and descriptive cohort research was conducted between May 1999 and January 2012 to assess demographic characteristics, and pathological manifestations in the oral cav- ity of children with this condition. Records of 17 patients, under 18 years of age, of either sex were included, who had been evaluated in the Department of Stomatology. Data recorded were age, sex, State of origin, oral and facial pathological features, focal cavity infections and ceod index. There were no patients with trigeminal neuralgia or facial paralysis; a 5.7% ceod index was identified. Most of the patients were under immunopressive treatment. A protocol for stomatological follow-up in patients with multiple sclerosis does not exist. The medical profession must be sensibilized to establish strategies for an integral follow-up in patients with this condition.

  2. CT manifestation of schistosoma haematobium cystitis

    Wang Yujun; Hu Lirong; Cheng Yougen; Mao Guoqun; Yang Guangzhao; Modya Camara; Mohamed Traore

    2014-01-01

    Objective: To analyze CT manifestation of Schistosoma haematobium cystitis. Methods: Retrospective analysis 32 patients, who were tested for Schistosoma haematobium cystitis using the urine filtration method. CT scan was performed for each patient with contrast enhancement. Results: The vast majority of urinary tract schistomiasis lesions were in the urinary bladder. Calcification of the bladder wall was observed in all patients and mild enhancement in non calcified zone was found after intravenous contrast. Except for 5 patients of bladder cancer, the rest were no abnormality in size of bladder when bladder was filling or emptying. Ureteral wall annular calcification could also be identified in 25 patients. Twenty two patients were companied with ureteric hydronephrosis. Seminal vesicle calcification was seen in 4 patients among 11 male patients, while both uterine and ovarian in female and prostate in men had non calcification. Serious illness can be combined with bladder cancer. In 5 patients of patients with bladder cancer, bladder showed irregular soft tissue mass which was enhanced moderately after post-contrast scan, with vesical calcification in mass medially. Conclusion: Bladder calcification is the most prominent CT feature of Schistosoma haematobium cystitis, which is useful in diagnosis the disease. (authors)

  3. Manifestations and management of lymphogranuloma venereum.

    White, John A

    2009-02-01

    This review was prompted by a sustained outbreak of lymphogranuloma venereum that has been observed among men who have sex with men (MSM) worldwide since 2004. Recent developments in the epidemiology, diagnosis and management of the infection are summarized. Between the early 1980s and 2003, lymphogranuloma venereum was rarely seen in the developed world. In 2003, a cluster of cases was seen in the Netherlands occurring mostly in HIV-positive MSM with high levels of sexual risk. With the assistance of novel molecular diagnostic techniques, more than a thousand cases of Chlamydia trachomatis L2 serovar disease have now been reported in MSM worldwide. Almost all have presented with rectal infection, usually manifesting as severe proctitis, with ulcer adenopathy syndrome seldom seen. Oral doxycycline remains the recommended treatment and has proven effective in the recent outbreak. Conflicting data exist regarding the prevalence of asymptomatic infection, and our understanding of the exact modes of transmission remains incomplete. Lymphogranuloma venereum appears to have reestablished endemicity among MSM populations in many industrialized nations. In the relative absence of recent publications from its traditional endemic regions it can be assumed that these populations remain afflicted by the infection as well.

  4. Cutaneous Manifestations of Human and Murine Leishmaniasis

    Breanna M. Scorza

    2017-06-01

    Full Text Available The leishmaniases are diseases caused by pathogenic protozoan parasites of the genus Leishmania. Infections are initiated when a sand fly vector inoculates Leishmania parasites into the skin of a mammalian host. Leishmania causes a spectrum of inflammatory cutaneous disease manifestations. The type of cutaneous pathology is determined in part by the infecting Leishmania species, but also by a combination of inflammatory and anti-inflammatory host immune response factors resulting in different clinical outcomes. This review discusses the distinct cutaneous syndromes described in humans, and current knowledge of the inflammatory responses associated with divergent cutaneous pathologic responses to different Leishmania species. The contribution of key hematopoietic cells in experimental cutaneous leishmaniasis in mouse models are also reviewed and compared with those observed during human infection. We hypothesize that local skin events influence the ensuing adaptive immune response to Leishmania spp. infections, and that the balance between inflammatory and regulatory factors induced by infection are critical for determining cutaneous pathology and outcome of infection.

  5. Periodontal and oral manifestations of marijuana use.

    Rawal, Swati Y; Tatakis, Dimitris N; Tipton, David A

    2012-01-01

    Marijuana, prepared from the plant Cannabis sativa, is the most widely used illicit drug in the United States. Marijuana use has been associated with adverse psychosocial and health effects, including effects on oral tissues. Periodontal literature has limited references to the periodontal effects of cannabis use. In this report, we present two cases of marijuana-associated gingival enlargement and review the literature on oral complications of marijuana use. Two asymptomatic males, aged 23 and 42 years, presented independently for oral prophylaxis. Both had an unremarkable medical history and related a history of significant marijuana use of 2-16 years duration. Common findings following oral and periodontal examination were nicotinic stomatitis-like lesions, uvulitis and gingival enlargement. Marginal and papillary gingiva of the anterior dentition were the areas primarily affected by gingival enlargement, while some of these areas exhibited a nodular or "pebbly" appearance. Marijuana-associated gingival enlargement was diagnosed in the reported cases. A review of the literature revealed two other reports of marijuana-associated gingival enlargement, all in young adult males with chronic (2 or more years) cannabis use. These authors reported a resemblance to phenytoin-induced enlargement. Biochemical similarities between phenytoin and cannabis active compounds suggest possible common pathogenetic mechanisms. Uvulitis and nicotinic stomatitis appear to be the two most common of the several oral manifestations of marijuana use. Chronic marijuana use may result in gingival enlargement with clinical characteristics similar to phenytoin-induced enlargement.

  6. Clinical manifestations and pathophysiology of lissencephaly

    Oi, Shizuo; Sasaki, Koji; Yamada, Hiroshi; Ando, Shoko; Tamura, Yasunori; Fukuda, Kuniaki; Furukawa, Seikyo; Matsumoto, Satoshi.

    1985-01-01

    Four cases of lissencephaly were analyzed in light of clinical manifestations, CT findings and the state of hydrocephalus. Lissencephaly had been diagnosed mainly by autopsy until CT scan was introduced in the early 1970's. Since then, diagnosis of lissencephaly early in life is possible. Presently the major interest in this congenital CNS anomaly, which is caused by a neuronal migration disorder in the relatively late stages of fetal development, is to learn the dynamic pathophysiological state and management. The purpose of this paper is to analyze those points of lissencephaly in diagnosis during life and possible treatment in the hydrocephalic state. The common findings in CT in all four cases are as follows: No. 1. smooth cortical surface (agyria--pachygyria), No. 2. wide sylvian fissure (complete or incomplete lack of opercularization, No. 3. ventricular dilatation (remarkable bilateral enlargement of lateral ventricle and third ventricle--colpocephaly), No. 4. wide subdural or subarachnoid space in supratentorial region, No. 5. periventricular low density, No. 6. midline cavum, No. 7. normal CT findings in posterior fossa structure. Three out of four patients demonstrated full or bulged and tense anterior fontanella. Because of this suggestion of increased intracranial pressure and enlarged ventricles with periventricular lucency in CT findings, one patient underwent CT cisternography for dynamic analysis of the CSF circulation and continuous ICP monitoring for dynamic evaluation of the ICP pattern. The results revealed very much delayed CSF circulation and intermittently increased. ICP, with pressure waves appearing in 35.7 % of all recordings. (J.P.N.)

  7. Oral manifestations of hepatitis C virus infection

    Carrozzo, Marco; Scally, Kara

    2014-01-01

    Extrahepatic manifestations (EHMs) of hepatitis C virus (HCV) infection can affect a variety of organ systems with significant morbidity and mortality. Some of the most frequently reported EHM of HCV infection, involve the oral region predominantly or exclusively. Oral lichen planus (OLP) is a chronic inflammatory condition that is potentially malignant and represents cell-mediated reaction to a variety of extrinsic antigens, altered self-antigens, or super antigens. Robust epidemiological evidence support the link between OLP and HCV. As the virus may replicate in the oral mucosa and attract HCV-specific T lymphocytes, HCV may be implicated in OLP pathogenesis. Sjögren syndrome (SjS) is an autoimmune exocrinopathy, characterized by dryness of the mouth and eyes and a multitude of other systemic signs and symptoms. SjS patients have also an increased risk of non-Hodgkin lymphoma. Patients with chronic hepatitis C do frequently have histological signs of Sjögren-like sialadenitis with mild or even absent clinical symptoms. However, it is still unclear if HCV may cause a disease mimicking SjS or it is directly responsible for the development of SjS in a specific subset of patients. Oral squamous cell carcinoma is the most common oral malignant tumour and at least in some part of the world could be linked to HCV. PMID:24976694

  8. Personnel Security Investigations -

    Department of Transportation — This data set contains the types of background investigations, decisions, level of security clearance, date of security clearance training, and credentials issued to...

  9. A Clinico- Epidemiological Study Of Filarial Related Orthopaedic Manifestations

    Patond K.R

    1992-01-01

    Full Text Available An epidemiological study was undertaken to study the incidence and distribution of orthopaedic manifestations of filariasis in an endemic area. A total of 207 cases were clinically examined and investigated. Patients were divided into three groups , viz., Group A: Orthopaedic manifestations with no history of filariasis . Group B: Orthopaedic manifestations with history of filariasis such as microfilaraemia or filarial fevers etc., Group C: Orthopaedic manifestations with chronic manifestations such as elephantiasis, hydrocele etc. To confirm filarial etiology, all the cases were examined for the presence of filarial antibody by indirect ELISA using wuchereda bancrofti microfilarial excretory- secretary antigen (wd Mf ESAg . A total of 61 of 102 patients of Group A, 14 of 21 patients of group B, and 73 of 84 patients of Group C were positive for filarial antibody. This study showed the prevalence of filarial antibody in about 71.4% of various orthopaedic manifestations.

  10. Review your Computer Security Now and Frequently!

    IT Department

    2009-01-01

    The start-up of LHC is foreseen to take place in the autumn and we will be in the public spotlight again. This increases the necessity to be vigilant with respect to computer security and the defacement of an experiment’s Web page in September last year shows that we should be particularly attentive. Attackers are permanently probing CERN and so we must all do the maximum to reduce future risks. Security is a hierarchical responsibility and requires to balance the allocation of resources between making systems work and making them secure. Thus all of us, whether users, developers, system experts, administrators, or managers are responsible for securing our computing assets. These include computers, software applications, documents, accounts and passwords. There is no "silver bullet" for securing systems, which can only be achieved by a painstaking search for all possible vulnerabilities followed by their mitigation. Additional advice on particular topics can be obtained from the relevant I...

  11. Oral manifestations of lamellar ichthyosis: A rare case report

    Keerthi K Nair

    2016-01-01

    Full Text Available The ichthyoses are a heterogeneous group of disorders with both inherited and acquired forms. Autosomal recessive congenital ichthyosis (ARCI is a heterogeneous group of disorders that present at birth with the generalized involvement of skin without other systemic manifestations. Lamellar itchthyosis (LI is a nonsyndromic itchthyosis, which comes under the umbrella of ARCI. Little is only known about the oral manifestations of this disorder. We report a case of LI with oral manifestations.

  12. A study of the security technology and a new security model for WiFi network

    Huang, Jing

    2013-07-01

    The WiFi network is one of the most rapidly developing wireless communication networks, which makes wireless office and wireless life possible and greatly expands the application form and scope of the internet. At the same time, the WiFi network security has received wide attention, and this is also the key factor of WiFi network development. This paper makes a systematic introduction to the WiFi network and WiFi network security problems, and the WiFi network security technology are reviewed and compared. In order to solve the security problems in WiFi network, this paper presents a new WiFi network security model and the key exchange algorithm. Experiments are performed to test the performance of the model, the results show that the new security model can withstand external network attack and ensure stable and safe operation of WiFi network.

  13. Security 2020 Reduce Security Risks This Decade

    Howard, Doug; Schneier, Bruce

    2010-01-01

    Identify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond.IT security needs are constantly evolving; this guide examine

  14. The Counter Terrorist Classroom: Religion, Education, and Security

    Gearon, Liam

    2013-01-01

    The article identifies international cases--from the United States, Europe, and the United Nations--of an emergent interface of religion, education, and security. This is manifest in the uses of religion in education to counter religious extremism, the notional "counter terrorist classroom." To avoid an over-association of extremism with…

  15. Security guide for subcontractors

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  16. A framework for evaluating food security and nutrition monitoring ...

    Identifying cost and time-efficient approaches to food security and nutrition monitoring programs is fundamental to increasing the utility and sustainability. ... In meeting these challenges, the role of continued evaluation of food security monitoring systems - for their impact on food security decision-making - cannot be ...

  17. 77 FR 9214 - National Security Education Board Members Meeting

    2012-02-16

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board Members Meeting... meeting of the National Security Education Board. The purpose of the meeting is to review and make... p.m. ADDRESSES: Defense Language and National Security Education Office, 1101 Wilson Boulevard...

  18. Clinical manifestations and outcome of tuberculous sclerokeratitis.

    Shoughy, Samir S; Jaroudi, Mahmoud O; Tabbara, Khalid F

    2016-09-01

    To study the clinical manifestations and outcome of patients with tuberculous sclerokeratitis treated with antituberculous therapy without concomitant use of systemic steroids. We reviewed retrospectively the medical records of eight consecutive patients with tuberculous sclerokeratitis. Patients were treated unsuccessfully with topical and/or systemic steroids. They underwent complete ophthalmic examination, systemic evaluation, laboratory investigations and imaging. Tuberculin skin test was done with purified protein derivative (PPD) on all patients. The diagnosis of tuberculous sclerokeratitis was made based on clinical findings of scleritis with adjacent peripheral corneal stromal keratitis, positive PPD test of 15 mm of induration or more, response to antituberculous treatment (ATT) within 4 weeks and exclusion of other causes of sclerokeratitis. Antituberculous drugs were given for a minimum of 6 months without concomitant use of corticosteroids. The outcome measure was resolution of the ocular surface inflammation of the sclera and cornea. Eight consecutive patients with a diagnosis of tuberculous sclerokeratitis were included. There were one male and seven female patients. The mean age was 29 years with an age range of 7-43 years. The involvement of the sclera was nodular in six patients and diffuse in two. The involvement of the cornea consisted of peripheral corneal stromal inflammation adjacent to the area of scleritis. Patients responded to antituberculous medications with complete resolution of the sclerokeratitis without topical or systemic anti-inflammatory agents. Antituberculous medications can lead to complete resolution of the sclerokeratitis without concomitant use of steroids, or other anti-inflammatory agents. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  19. Coprolalia as a manifestation of epileptic seizures.

    Massot-Tarrús, Andreu; Mousavi, Seyed Reza; Dove, Carin; Hayman-Abello S, Susan; Hayman-Abello, Brent; Derry, Paul A; Diosy, David C; McLachlan, Richard S; Burneo, Jorge G; Steven, David A; Mirsattari, Seyed M

    2016-07-01

    The aim of this study was to investigate the lateralizing and localizing value of ictal coprolalia and brain areas involved in its production. A retrospective search for patients manifesting ictal coprolalia was conducted in our EMU database. Continuous video-EEG recordings were reviewed, and EEG activity before and during coprolalia was analyzed using independent component analysis (ICA) technique and was compared to the seizures without coprolalia among the same patients. Nine patients were evaluated (five women), eight with intracranial video-EEG recordings (icVEEG). Four had frontal or temporal lesions, and five had normal MRIs. Six patients showed impairment in the language functions and five in the frontal executive tasks. Two hundred six seizures were reviewed (60.7% from icVEEG). Ictal coprolalia occurred in 46.6% of them, always associated with limbic auras or automatisms. They arose from the nondominant hemisphere in five patients, dominant hemisphere in three, and independently from the right and left hippocampus-parahippocampus in one. Electroencephalographic activity always involved orbitofrontal and/or mesial temporal regions of the nondominant hemisphere when coprolalia occurred. Independent component analysis of 31 seizures in seven patients showed a higher number of independent components in the nondominant hippocampus-parahippocampus before and during coprolalia and in the dominant lateral temporal region in those seizures without coprolalia (p=0.009). Five patients underwent surgery, and all five had an ILAE class 1 outcome. Ictal coprolalia occurs in both males and females with temporal or orbitofrontal epilepsy and has a limited lateralizing value to the nondominant hemisphere but can be triggered by seizures from either hemisphere. It involves activation of the paralimbic temporal-orbitofrontal network. Copyright © 2016 Elsevier Inc. All rights reserved.

  20. Respiratory Manifestations of Hypothyroidism: A Systematic Review.

    Sorensen, Jesper Roed; Winther, Kristian Hillert; Bonnema, Steen Joop; Godballe, Christian; Hegedüs, Laszlo

    2016-11-01

    Hypothyroidism has been associated with increased pulmonary morbidity and overall mortality. A systematic review was conducted to identify the prevalence and underlying mechanisms of respiratory problems among patients with thyroid insufficiency. PubMed and EMBASE databases were searched for relevant literature from January 1950 through January 2015 with the following study eligibility criteria: English-language publications; adult subclinical or overt hypothyroid patients; intervention, observational, or retrospective studies; and respiratory manifestations. The Preferred Reporting Items for Systematic reviews and Meta-Analyses statement was followed, and Cochrane's risk of bias tool was used. A total of 1699 papers were screened by two independent authors for relevant titles. Of 109 relevant abstracts, 28 papers underwent full-text analyses, of which 22 were included in the review. Possible mechanisms explaining respiratory problems at multiple physiological levels were identified, such as the ventilator control system, diaphragmatic muscle function, pulmonary gas exchange, goiter caused upper airway obstruction, decreased capacity for energy transduction, and reduced glycolytic activity. Obstructive sleep apnea syndrome was found among 30% of newly diagnosed patients with overt hypothyroidism, and demonstrated reversibility following treatment. The evidence for or against a direct effect on pulmonary function was ambiguous. However, each of the above-mentioned areas was only dealt with in a limited number of studies. Therefore, it is not possible to draw any strong conclusions on any of these themes. Moreover, most studies were hampered by considerable risk of bias due for example to small numbers of patients, lack of control groups, randomization and blinding, and differences in body mass index, sex, and age between subjects and controls. Mechanistic data linking hypothyroidism and respiratory function are at best limited. This area of research is therefore

  1. Crohn’s Disease Ocular Manifestations

    Koev Kr.

    2014-12-01

    Full Text Available Crohn’s disease is an inflammatory bowel disease which causes inflammation of the digestive tract. Crohn’s disease most frequently affects the ileum and the colon. In the active stage of the disease signs and symptoms may include diarrhea, abdominal pain and cramping, blood in the stools, reduced appetite and weight loss. In patients with severe Crohn’s disease the following signs and symptoms may be observed: fever, fatigue, arthritis, eye inflammation, oral ulcers, skin disorders, inflammation of the liver or bile ducts or delayed growth. Heredity and dysfunctions of the immune system are considered to cause the development of Crohn’s disease. About 10% of people with inflammatory bowel disease have also ocular problems. The most common ocular manifestations of Crohn’s disease are uveitis, iritis, episcleritis, keratopathy, keratoconjunctivitis and retinal vasculitis. Untreated uveitis may cause glaucoma and vision loss. Uveitis and iritis are four times more common in women than in men. In patients in the active stage of the disease, episcleritis also flares. Symptoms of episcleritis include inflammation, bright red spots on the sclera and localized pain. Keratoconjunctivitis in Crohn’s disease is caused by decreased tear production or increased tear film evaporation. Dry eyes can cause itching, burning or infection. Keratopathy usually causes no pain or vision loss, therefore in most cases no treatment is needed. In retinal vasculitis tortuosity of retinal veins, retinal edema at the posterior pole and intraretinal blood near blood vessels are observed. Intravenous fluorescein angiography shows intraretinal neovascularisation and haemorrhage in the posterior pole.

  2. [Cutaneous manifestations of male breast cancer].

    Hali, Fouzia; Khadir, Khadija; Idhammou, Wassima; Bensardi, Fatima-Zahra; Lefriyekh, Mohamed-Rachid; Benider, Abdelatif; Zamiati, Soumia; Benchikhi, Hakima

    2011-11-01

    The appearance of skin symptoms in male breast is the main reason for consultation in our context. The aim of this study is to describe the various cutaneous manifestations of male breast cancer through a series of cases collected in a dermatology department. A retrospective study was conducted in the dermatology department at the CHU Ibn Rochd January 1988 to December 2009. All cases of male breast cancer initially diagnosed in dermatology were included. The various epidemiological, clinical, histological and therapeutic data were collected from medical records. Twenty cases were collected. The mean age was 61.25 years. Skin invasion by tumor was found in all patients, and it was the reason for consultation. It was a cutaneous involvement at the nipple and areola (17 cases) and at the periareolar skin (three cases). The clinical appearance of skin involvement was vegetative type in 12 cases, infiltrating with nipple retraction in five cases and nodule with skin change in three cases. The average period of consultation was 25 months. The axillary lymph nodes were noted in 11 patients and distant metastases in eight patients. The cutaneous metastases outside breast were noted in six patients. The histological types were: infiltrating ductal carcinoma in 15 cases (75%), papillary carcinoma in two cases (10%) and non-specific carcinoma in three cases (15%). The treatment was surgery in 14 patients and consisted of radical mastectomy with complete axillary nodal dissection according to Patey. Complementary therapies, chemotherapy or radiotherapy, were indicated in 14 patients. Our single-center study with dermatological recruitment illustrates the frequency and variety of skin disease in male breast cancer and demonstrates that they are still the main reason for consultation in our context. Better information for public and practitioners would allow earlier diagnosis and a more favourable prognosis. Copyright © 2011 Elsevier Masson SAS. All rights reserved.

  3. Neuromuscular Manifestations of West Nile Virus Infection

    A. Arturo eLeis

    2012-03-01

    Full Text Available The most common neuromuscular manifestation of West Nile virus (WNV infection is a poliomyelitis syndrome with asymmetric paralysis variably involving one (monoparesis to four limbs (quadriparesis, with or without brainstem involvement and respiratory failure. This syndrome of acute flaccid paralysis may occur without overt fever or meningoencephalitis. Although involvement of anterior horn cells in the spinal cord and motor neurons in the brainstem are the major sites of pathology responsible for neuromuscular signs, inflammation also may involve skeletal or cardiac muscle (myositis, myocarditis, motor axons (polyradiculitis, peripheral nerve (Guillain-Barré syndrome, brachial plexopathy. In addition, involvement of spinal sympathetic neurons and ganglia provides a plausible explanation for autonomic instability seen in some patients. Many patients also experience prolonged subjective generalized weakness and disabling fatigue. Despite recent evidence that WNV may persist long term in the central nervous system or periphery in animals, the evidence in humans is controversial. WNV persistence would be of great concern in immunosuppressed patients or in those with prolonged or recurrent symptoms. Support for the contention that WNV can lead to autoimmune disease arises from reports of patients presenting with various neuromuscular diseases that presumably involve autoimmune mechanisms (GBS, other demyelinating neu¬ropathies, myasthenia gravis, brachial plexopathies, stiff-person syndrome, and delayed or recurrent symptoms. Although there is no specific treatment or vaccine currently approved in humans, and the standard remains supportive care, drugs that can alter the cascade of immunobiochemical events leading to neuronal death may be potentially useful (high-dose corticosteroids, interferon preparations, and intravenous immune globulin containing WNV-specific antibodies. Human experience with these agents seems promising based on anecdotal

  4. Cutaneous Manifestations in HIV Infected Libyan Patients

    Aljehawi Nabil A.

    2017-09-01

    Full Text Available Cutaneous manifestations of human immunodeficiency virus (HIV disease may result from HIV infection itself, or from opportunistic disorders secondary to the declined immunocompetence due to the disease. A total of 220 HIV positive patients, treated in the Benghazi Center of Infectious Diseases and Immunology over a period of 14 years (January 2003 to November 2016, were included in a retrospective study. The patients' age ranged from 7 to 46 years. The study was conducted by reviewing the patients' records using the management information system (MIS. Statistical analysis of the data was carried out by the t-test and Chi square test. Among the studied patients, 119 (54.1% were males and 101 (45.9% were females, and most of them (78.6% were 10 – 19 years of age. The predominant mode of transmission was parenteral transmission, in 95% of patients, and positive family history was observed in 12% of patients. Among the total number of visits to dermatologists, 93% of patients had a single disease. Of the total number of skin diseases diagnosed during the visits, parasitic infestations were seen in 92 patients (21.0%, eczematous and related disorders in 78 patients (17.8%, viral infections in 71 patients (16.2%, bacterial infections in 41 patients (9.3%, and fungal infections in 35 patients (7.9%. Dermatophyte infections were the most common fungal infections recorded in 19 patients (4.3%, followed by Candida infection in 11 patients (2.5%. Warts were found in 5.9% of viral infections, followed by herpes zoster (4.1%. HIV positive patients should be examined for skin disorders, because early diagnosis and management of such problems improves the quality of life in these patients.

  5. Will Pre-Funding Provide Security for Social Security? A Review of the Literature

    Robert L. Brown

    2000-01-01

    President Clinton has proposed creating larger social security funds and investing a portion of them in the private sector. Others have suggested more radical reforms such as moving social security from a defined-benefit scheme to a defined contribution plan based on the Chilean model. These proposals are based on the goal of creating higher investment returns, which would make social security benefits easier to finance in the long run. After an extensive review of the literature, this paper ...

  6. The EU's cybercrime and cyber-security rulemaking: mapping the internal and external dimensions of EU security

    Fahey, E.

    2014-01-01

    By taking the EU Cyber Strategy as a case in point, this contribution examines how the distinction between external and internal security in contemporary EU law manifests itself in large-scale risk regulation and in particular, how the EU relies upon external norms to regulate risk. This article

  7. Fundamental quantitative security in quantum key generation

    Yuen, Horace P.

    2010-01-01

    We analyze the fundamental security significance of the quantitative criteria on the final generated key K in quantum key generation including the quantum criterion d, the attacker's mutual information on K, and the statistical distance between her distribution on K and the uniform distribution. For operational significance a criterion has to produce a guarantee on the attacker's probability of correctly estimating some portions of K from her measurement, in particular her maximum probability of identifying the whole K. We distinguish between the raw security of K when the attacker just gets at K before it is used in a cryptographic context and its composition security when the attacker may gain further information during its actual use to help get at K. We compare both of these securities of K to those obtainable from conventional key expansion with a symmetric key cipher. It is pointed out that a common belief in the superior security of a quantum generated K is based on an incorrect interpretation of d which cannot be true, and the security significance of d is uncertain. Generally, the quantum key distribution key K has no composition security guarantee and its raw security guarantee from concrete protocols is worse than that of conventional ciphers. Furthermore, for both raw and composition security there is an exponential catch-up problem that would make it difficult to quantitatively improve the security of K in a realistic protocol. Some possible ways to deal with the situation are suggested.

  8. FINANCIAL STABILITY AS A FACTOR ECONOMIC SECURITY

    A. V. Endovitskaya

    2015-01-01

    Full Text Available Summary. The article examines the linkages between financial stability and the level of its economic security. Considered the content of financial stability, represented by its own definition, we studied the basic conditions to achieve it. The logic diagram showing the location of financial stability and financial security to ensure the economic security of the business entity. A system of internal and external factors affecting the financial stability and endanger financial stability and financial security company. It has been established that it is the internal factors such as the availability of financial resources and financial position, capital structure, the company's ability to generate profits determine the level of economic security and its ability to withstand the negative impact of external and internal threats. The necessity of improving the financial sustainability in order to improve the economic security of the enterprise. On the basis of the research proposed matrix of risks affecting the financial stability and economic security, which allows to determine the probability of their occurrence and impact. It presents the economic, social, human, financial, organizational, economic, innovative and productive tools to increase the stability and financial security of an economic entity. List considered standard measures will make a plan of action to minimize the adverse impacts and enhance financial stability and security. Therefore, a prerequisite for the economic security of the enterprise is the attainment of financial stability.

  9. Technologies to counter aviation security threats

    Karoly, Steve

    2017-11-01

    The Aviation and Transportation Security Act (ATSA) makes TSA responsible for security in all modes of transportation, and requires that TSA assess threats to transportation, enforce security-related regulations and requirements, and ensure the adequacy of security measures at airports and other transportation facilities. Today, TSA faces a significant challenge and must address a wide range of commercial, military grade, and homemade explosives and these can be presented in an infinite number of configurations and from multiple vectors. TSA screens 2 million passengers and crew, and screens almost 5 million carry-on items and 1.2 million checked bags daily. As TSA explores new technologies for improving efficiency and security, those on the forefront of research and development can help identify unique and advanced methods to combat terrorism. Research and Development (R&D) drives the development of future technology investments that can address an evolving adversary and aviation threat. The goal is to rethink the aviation security regime in its entirety, and rather than focusing security at particular points in the enterprise, distribute security from the time a reservation is made to the time a passenger boards the aircraft. The ultimate objective is to reengineer aviation security from top to bottom with a continued focus on increasing security throughout the system.

  10. Specific features of the hemorrhagic syndrome manifestation under chronic, prolonged and acute irradiation

    Arlashchenko, N.I.; Gorlov, V.G.; Maksimova, E.N.

    1978-01-01

    To make the hemorrhagic syndrome manifest itself, two phenomena are necessary to coincide in time, they are: a fall in the elasticity of the vascular wall and reduction in the amount of thrombocytes in blood. Depending upon the radiation dose, the vascular wall and the thrombocytic function may be either simultaneously impaired after acute exposure) or dissociated (following prolonged irradiation). Chronic irradiation at small (subliminal) dose rates fails to induce hemorrhagic disorders and death of rats caused by pathologic hemophilia

  11. Oral and periodontal manifestations associated with systemic sclerosis: A case series and review

    Rekha Jagadish; Dhoom Singh Mehta; P Jagadish

    2012-01-01

    Systemic sclerosis is a rare connective tissue disorder with a wide range of oral manifestations. This case series reports significant oral and periodontal changes and also makes an attempt to correlate oral and systemic findings in these patients which enable the clinician for a better diagnosis and evolve a comprehensive treatment plan. Six patients with a known diagnosis of systemic sclerosis were included. After obtaining the patient's informed consent, relevant medical history, oral mani...

  12. Macro Security Methodology for Conducting Facility Security and Sustainability Assessments

    Herdes, Greg A.; Freier, Keith D.; Wright, Kyle A.

    2007-01-01

    Pacific Northwest National Laboratory (PNNL) has developed a macro security strategy that not only addresses traditional physical protection systems, but also focuses on sustainability as part of the security assessment and management process. This approach is designed to meet the needs of virtually any industry or environment requiring critical asset protection. PNNL has successfully demonstrated the utility of this macro security strategy through its support to the NNSA Office of Global Threat Reduction implementing security upgrades at international facilities possessing high activity radioactive sources that could be used in the assembly of a radiological dispersal device, commonly referred to as a 'dirty bomb'. Traditional vulnerability assessments provide a snap shot in time of the effectiveness of a physical protection system without significant consideration to the sustainability of the component elements that make up the system. This paper describes the approach and tools used to integrate technology, plans and procedures, training, and sustainability into a simple, quick, and easy-to-use security assessment and management tool.

  13. Task Force on Catastrophic Antiphospholipid Syndrome (APS) and Non-criteria APS Manifestations (II): thrombocytopenia and skin manifestations.

    Cervera, R; Tektonidou, M G; Espinosa, G; Cabral, A R; González, E B; Erkan, D; Vadya, S; Adrogué, H E; Solomon, M; Zandman-Goddard, G; Shoenfeld, Y

    2011-02-01

    The objectives of the 'Task Force on Catastrophic Antiphospholipid Syndrome (APS) and Non-criteria APS Manifestations' were to assess the clinical utility of the international consensus statement on classification criteria and treatment guidelines for the catastrophic APS, to identify and grade the studies that analyze the relationship between the antiphospholipid antibodies and the non-criteria APS manifestations, and to present the current evidence regarding the accuracy of these non-criteria APS manifestations for the detection of patients with APS. This article summarizes the studies analyzed on thrombocytopenia and skin manifestations, and presents the recommendations elaborated by the Task Force after this analysis.

  14. Security research roadmap; Security-tutkimuksen roadmap

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  15. Model : making

    Bottle, Neil

    2013-01-01

    The Model : making exhibition was curated by Brian Kennedy in collaboration with Allies & Morrison in September 2013. For the London Design Festival, the Model : making exhibition looked at the increased use of new technologies by both craft-makers and architectural model makers. In both practices traditional ways of making by hand are increasingly being combined with the latest technologies of digital imaging, laser cutting, CNC machining and 3D printing. This exhibition focussed on ...

  16. Unix Security Cookbook

    Rehan, S. C.

    This document has been written to help Site Managers secure their Unix hosts from being compromised by hackers. I have given brief introductions to the security tools along with downloading, configuring and running information. I have also included a section on my recommendations for installing these security tools starting from an absolute minimum security requirement.

  17. Untangle network security

    El-Bawab, Abd El-Monem A

    2014-01-01

    If you are a security engineer or a system administrator and want to secure your server infrastructure with the feature-rich Untangle, this book is for you. For individuals who want to start their career in the network security field, this book would serve as a perfect companion to learn the basics of network security and how to implement it using Untangle NGFW.

  18. Arguing Against Security Communitarianism

    Bilgin, Pinar

    2016-01-01

    Anthony Burke’s ‘security cosmopolitanism’ is a fresh and thought-provoking contribution to critical theorizing about security. In this discussion piece, I would like to join Burke’s call for ‘security cosmopolitanism’ by way of arguing against ‘security communitarianism’. I understand the latter...

  19. Security research roadmap

    Rouhiainen, V. (ed.)

    2007-02-15

    VTT has a broad range of security research ongoing in many areas of technology. The main areas have been concentrating on public safety and security, but VTT is also participating in several research projects related to defence technology. To identify and define expertise and research goals in more detail, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of a critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important security products and technologies needed are, for example, management of total security, detection, identification, localisation and communication, protection of information networks and systems, as well as physical protection. In the EU's Security programme, which aims at ensuring the security of society and its vital functions, it is stated that. Technology alone can not assure security, but security can not be assured without the support of technology. VTT is conducting security research in all its areas of expertise and clusters. The area has a significant research potential. The development of products and systems designed for the improvement of security has just started. There is still room for innovation. This report presents knowledge and development needs in more detail, as well as future development potential seen in the area of security. (orig.)

  20. Ophthalmic manifestations of methylmalonic aciduria accompanied with homocystinuria

    Qiu-Jing Huang

    2015-12-01

    Full Text Available Methylmalonicaciduia(MMAaccompanied with homocystinuria is a rare autosomal-recessive with congenital metabolic disorder of Vitamin B12. There are three subtypes, cblC, cblD, cblF, in which cblC is the most common one. The diagnostic tests are tandem mass spectrometry and gas chromatography-mass spectrometry. Tests for activity of enzyme in fibroblasts from skin, complementary assay and genetic analysis can be used to make the subtype clear. Early-onset patients, defined by onset of symptoms before the age of 1 year, may have severe ocular involvement, including visual loss, nystagmus, strabismus, retinopathy, maculopathy, optic atrophy, abnormal electroretinography. Late-onset patients, defined by onset of symptoms after the age of 4 year, rarely have ocular manifestations. The pathogenesis of the ophthalmic symptoms may be related to the high level of homocystine, oxidative stress and the abnormal development of nervous systems. The treatment for MMA accompanied with homocystinuria is mostly symptomatic based. Ophthalmic treatment is limited. Early supplement of methionine,GSH or other antioxidants may be helpful for retinopathy. There is no standard ophthalmological examination for those patients in China. It is critical to set up inter-departmental cooperation and early stage examination for the treatments and outcomes of the patients.

  1. Body Packing and Its Radiologic Manifestations: A Review Article

    Shahnazi, Makhtoom; Sanei Taheri, Morteza; Pourghorban, Ramin

    2011-01-01

    Body packing is described as using the abdominal or pelvic cavity for concealing illegal drugs. Leakage from the packets may cause catastrophic effects on smugglers and medical history is not reliable in these patients. Moreover, new sophisticated smuggling techniques make it imperative that radiologists and emergency physicians understand and familiarize themselves with the different radiological manifestations of ingested drug packets. Currently, there is no gold standard for imaging patients suspected of body packing; nevertheless, computed tomography (CT) seems to be the best modality for packet detection and unenhanced CT without bowel preparation is a reliable technique for detection of ingested packets. On abdominal radiography, packets may be visualized as oval or round radiopaque foreign bodies surrounded by a gas halo. In the literature, sensitivity of abdominal radiography is reported from 74% to 100%. Visualization of the drug packets may be strikingly hampered by administration of oral or intravenous contrast medium in abdomino-pelvic CT; hence, contrast-enhanced CT does not seem to be a suitable modality for searching the ingested packets in suspicious smugglers

  2. Security needs you

    2010-01-01

    Academic freedom is a valuable thing, but like any kind of freedom, it comes with responsibility. Here at CERN, and in the global particle physics community as a whole, we enjoy an open academic environment, which gives us freedom of choice and freedom of expression. It is a strong tradition at CERN, but it’s not something we can ever take for granted. This is particularly true in the area of IT, where our openness and our global visibility make us an attractive target. Attacks on our IT infrastructure in the past have had a negative impact on our reputation, and have even led to changes in the way we operate computing services. It is the responsibility of all of us, not just the experts in the IT Department, to protect our IT infrastructure while striking the right balance between security, academic freedom and the unfettered operation of our facilities. Everyone using CERN’s IT infrastructure is responsible for the security and protection of the computers they use, the operating...

  3. Extremely secure identification documents

    Tolk, K.M.; Bell, M.

    1997-09-01

    The technology developed in this project uses biometric information printed on the document and public key cryptography to ensure that an adversary cannot issue identification documents to unauthorized individuals or alter existing documents to allow their use by unauthorized individuals. This process can be used to produce many types of identification documents with much higher security than any currently in use. The system is demonstrated using a security badge as an example. This project focused on the technologies requiring development in order to make the approach viable with existing badge printing and laminating technologies. By far the most difficult was the image processing required to verify that the picture on the badge had not been altered. Another area that required considerable work was the high density printed data storage required to get sufficient data on the badge for verification of the picture. The image processing process was successfully tested, and recommendations are included to refine the badge system to ensure high reliability. A two dimensional data array suitable for printing the required data on the badge was proposed, but testing of the readability of the array had to be abandoned due to reallocation of the budgeted funds by the LDRD office

  4. Transition secured? A follow-up study of adolescents who have left secure residential care

    Harder, Annemiek; Knorth, Erik J.; Kalverboer, Margrite E.

    2011-01-01

    Many adolescents who make the transition to adulthood experience problems after their departure from secure residential care. Research suggests that these young people are often in need of support after they have left secure care. Little is known about the experiences and perceptions of adolescents

  5. IAEA nuclear security program

    Ek, D. [International Atomic Energy Agency, Vienna (Austria)

    2006-07-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  6. IAEA nuclear security program

    Ek, D.

    2006-01-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  7. Professional Cocoa Application Security

    Lee, Graham J

    2010-01-01

    The first comprehensive security resource for Mac and iPhone developers. The Mac platform is legendary for security, but consequently, Apple developers have little appropriate security information available to help them assure that their applications are equally secure. This Wrox guide provides the first comprehensive go-to resource for Apple developers on the available frameworks and features that support secure application development.: While Macs are noted for security, developers still need to design applications for the Mac and the iPhone with security in mind; this guide offers the first

  8. Manifest Spatialization: Militarizing Communication in Canada

    Patricia Mazepa

    2015-06-01

    Full Text Available Focusing on the political economy of communication and the process of spatialization whereby control over space and time is extended through the use of information and communication technology (ICT, this paper provides an overview of the intersections that draw the Canadian federal government, its military, and the ICT, defence and security industries into relationships that reinforce and extend their control. By attending to historical and current examples, it highlights several sub-processes of spatialization, including corporate restructuring (through vertical and horizontal integration, as well as state restructuring (principally through internationalization and commercialization, which together underpin and support the militarization of communication. From the state’s concentration on conventional war and the “Cold War”, through to the current “War on Terror” and its protection of an integrated ICT infrastructure, communication is increasingly confined within a narrow militarized and corporatized framework. Within this framework, both capital and the military prioritize the development and administration of the “command and control” capabilities of ICT, such that the policies and practices of communication become more exclusive, restrictive and surveilled, and less open, accessible, and universal. The paper seeks to explain how this tripartite combination of “command, control, and communication” is indicative of the process of spatialization, and supports a militarized capitalism and the formation of a cross-border MICC poised to expand and defend it.

  9. Lecture 2: Software Security

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development, testing and deployment. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and ...

  10. Computer Security Day

    CERN Bulletin

    2010-01-01

      Viruses, phishing, malware and cyber-criminals can all threaten your computer and your data, even at CERN! Experts will share their experience with you and offer solutions to keep your computer secure. Thursday, 10 June 2010, 9.30, Council Chamber Make a note in your diary! Presentations in French and English: How do hackers break into your computer? Quels sont les enjeux et conséquences des attaques informatiques contre le CERN ? How so criminals steal your money on the Internet? Comment utiliser votre ordinateur de manière sécurisée ? and a quiz: test your knowledge and win one of the many prizes that will be on offer! For more information and to follow the day's events via a live webcast go to: http://cern.ch/SecDay.  

  11. Mobile security how to secure, privatize and recover your devices

    Speed, Timothy; Anderson, Joseph; Nampalli, Jaya

    2013-01-01

    Learn how to keep yourself safe online with easy- to- follow examples and real- life scenarios. Written by developers at IBM, this guide should be the only resource you need to keep your personal information private.Mobile security is one of the most talked about areas in I.T. today with data being stolen from smartphones and tablets around the world. Make sure you, and your family, are protected when they go online.

  12. The myth of secure computing.

    Austin, Robert D; Darby, Christopher A

    2003-06-01

    Few senior executives pay a whole lot of attention to computer security. They either hand off responsibility to their technical people or bring in consultants. But given the stakes involved, an arm's-length approach is extremely unwise. According to industry estimates, security breaches affect 90% of all businesses every year and cost some $17 billion. Fortunately, the authors say, senior executives don't need to learn about the more arcane aspects of their company's IT systems in order to take a hands-on approach. Instead, they should focus on the familiar task of managing risk. Their role should be to assess the business value of their information assets, determine the likelihood that those assets will be compromised, and then tailor a set of risk abatement processes to their company's particular vulnerabilities. This approach, which views computer security as an operational rather than a technical challenge, is akin to a classic quality assurance program in that it attempts to avoid problems rather than fix them and involves all employees, not just IT staffers. The goal is not to make computer systems completely secure--that's impossible--but to reduce the business risk to an acceptable level. This article looks at the types of threats a company is apt to face. It also examines the processes a general manager should spearhead to lessen the likelihood of a successful attack. The authors recommend eight processes in all, ranging from deciding how much protection each digital asset deserves to insisting on secure software to rehearsing a response to a security breach. The important thing to realize, they emphasize, is that decisions about digital security are not much different from other cost-benefit decisions. The tools general managers bring to bear on other areas of the business are good models for what they need to do in this technical space.

  13. Methods of Organizational Information Security

    Martins, José; Dos Santos, Henrique

    The principle objective of this article is to present a literature review for the methods used in the security of information at the level of organizations. Some of the principle problems are identified and a first group of relevant dimensions is presented for an efficient management of information security. The study is based on the literature review made, using some of the more relevant certified articles of this theme, in international reports and in the principle norms of management of information security. From the readings that were done, we identified some of the methods oriented for risk management, norms of certification and good practice of security of information. Some of the norms are oriented for the certification of the product or system and others oriented to the processes of the business. There are also studies with the proposal of Frameworks that suggest the integration of different approaches with the foundation of norms focused on technologies, in processes and taking into consideration the organizational and human environment of the organizations. In our perspective, the biggest contribute to the security of information is the development of a method of security of information for an organization in a conflicting environment. This should make available the security of information, against the possible dimensions of attack that the threats could exploit, through the vulnerability of the organizational actives. This method should support the new concepts of "Network centric warfare", "Information superiority" and "Information warfare" especially developed in this last decade, where information is seen simultaneously as a weapon and as a target.

  14. Prevalence and characteristics of articular manifestations in human ...

    Prevalence and characteristics of articular manifestations in human immune virus infection. ... Objectives: To determine the prevalence, types and characteristics of articular manifestations in the anti-retroviral treatment naive HIV infected patients. Design: Cross sectional descriptive study. Setting: Comprehensive care clinic ...

  15. Orofacial manifestations of hematological disorders: Anemia and hemostatic disorders

    Titilope A Adeyemo

    2011-01-01

    Full Text Available The aim of this paper is to review the literature and identify orofacial manifestations of hematological diseases, with particular reference to anemias and disorders of hemostasis. A computerized literature search using MEDLINE was conducted for published articles on orofacial manifestations of hematological diseases, with emphasis on anemia. Mesh phrases used in the search were: oral diseases AND anaemia; orofacial diseases AND anaemia; orofacial lesions AND anaemia; orofacial manifestations AND disorders of haemostasis. The Boolean operator "AND" was used to combine and narrow the searches. Anemic disorders associated with orofacial signs and symptoms include iron deficiency anemia, Plummer-Vinson syndrome, megaloblastic anemia, sickle cell anemia, thalassaemia and aplastic anemia. The manifestations include conjunctiva and facial pallor, atrophic glossitis, angular stomatitis, dysphagia, magenta tongue, midfacial overgrowth, osteoclerosis, osteomyelitis and paraesthesia/anesthesia of the mental nerve. Orofacial petechiae, conjunctivae hemorrhage, nose-bleeding, spontaneous and post-traumatic gingival hemorrhage and prolonged post-extraction bleeding are common orofacial manifestations of inherited hemostatic disorders such as von Willebrand′s disease and hemophilia. A wide array of anemic and hemostatic disorders encountered in internal medicine has manifestations in the oral cavity and the facial region. Most of these manifestations are non-specific, but should alert the hematologist and the dental surgeon to the possibilities of a concurrent disease of hemopoiesis or hemostasis or a latent one that may subsequently manifest itself.

  16. Corneal manifestations of selected systemic diseases: A review

    Wayne D.H. Gillan

    2015-08-01

    Full Text Available The corneal manifestations of several selected systemic diseases are reviewed. Metabolic, immunologic and inflammatory and infectious diseases are included. A brief overview of each disease and how it manifests in the cornea is discussed. The importance of conducting a slit-lamp examination on every patient is emphasised.

  17. Achondroplasia: Craniofacial manifestations and considerations in dental management

    Al-Saleem, Afnan; Al-Jobair, Asma

    2010-01-01

    Achondroplasia is the most common form of skeletal dysplasia dwarfism that manifests with stunted stature and disproportionate limb shortening. Achondroplasia is of dental interest because of its characteristic craniofacial features which include relative macrocephaly, depressed nasal bridge and maxillary hypoplasia. Presence of large head, implanted shunt, airway obstruction and difficulty in head control require special precautions during dental management. Craniofacial manifestations and c...

  18. Respiratory manifestations of eosinophilic granulomatosis with polyangiitis (Churg-Strauss)

    Cottin, Vincent; Bel, Elisabeth; Bottero, Paolo; Dalhoff, Klaus; Humbert, Marc; Lazor, Romain; Sinico, Renato A.; Sivasothy, Pasupathy; Wechsler, Michael E.; Groh, Matthieu; Marchand-Adam, Sylvain; Khouatra, Chahéra; Wallaert, Benoit; Taillé, Camille; Delaval, Philippe; Cadranel, Jacques; Bonniaud, Philippe; Prévot, Grégoire; Hirschi, Sandrine; Gondouin, Anne; Dunogué, Bertrand; Chatté, Gérard; Briault, Amandine; Jayne, David; Guillevin, Loïc; Cordier, Jean-François

    2016-01-01

    The respiratory manifestations of eosinophilic granulomatosis with polyangiitis (EGPA) have not been studied in detail.In this retrospective multicentre study, EGPA was defined by asthma, eosinophilia and at least one new onset extra-bronchopulmonary organ manifestation of disease.The study

  19. 40 CFR 264.71 - Use of manifest system.

    2010-07-01

    ...) Within 30 days of delivery, send a copy of the manifest to the generator; and (v) Retain at the facility..., NW., Washington, DC 20460. (b) If a facility receives, from a rail or water (bulk shipment... on the manifest (excluding the EPA identification numbers, generator's certification, and signatures...

  20. Cardio-pulmonary manifestations of rheumatoid arthritis among ...

    Background: Rheumatoid arthritis is a chronic systemic inflammatory disease, characterized by polyarthritis and extraarticular manifestations. The cardiopulmonary manifestations of rheumatoid arthritis were studied retrospectively in a cohort of rheumatoid arthritis patients. Methods: This was a retrospective study of all ...

  1. 8 CFR 251.1 - Arrival manifests and lists.

    2010-01-01

    ... List, in accordance with the instructions contained thereon. (2) Longshore work notations. The master... master, captain, or agent shall prepare as a part of the manifest, when one is required for presentation... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Arrival manifests and lists. 251.1 Section...

  2. A Review of the Latent and Manifest Benefits (LAMB) Scale

    Muller, Juanita; Waters, Lea

    2012-01-01

    The latent and manifest benefits (LAMB) scale (Muller, Creed, Waters & Machin, 2005) was designed to measure the latent and manifest benefits of employment and provide a single scale to test Jahoda's (1981) and Fryer's (1986) theories of unemployment. Since its publication in 2005 there have been 13 studies that have used the scale with 5692…

  3. Cardiac tamponade as an initial manifestation of systemic lupus erythematosus.

    Carrion, Diego M; Carrion, Andres F

    2012-06-12

    Clinical manifestations of pericardial disease may precede other signs and symptoms associated with systemic lupus erythematosus. Although pericardial effusion is one of the most common cardiac problems in patients with systemic lupus erythematosus, haemodynamically significant effusions manifesting as cardiac tamponade are rare and require prompt diagnosis and treatment.

  4. Pulmonary arterial hypertension as a manifestation of lupus erythematosus

    Stark, P; Sargent, E N; Boylen, T; Jaramillo, D

    1987-08-01

    We present five patients with systemic lupus erythematosus (SLE) who developed pulmonary arterial hypertension and cor pulmonale in the course of their disease. The clinical features, as well as, the radiological manifestations of this rare manifestation of SLE are discussed. A vasculitic process is the most likely cause of this complication. Therapy is ineffective and the prognosis is poor.

  5. Understanding Climate Change and Manifestation of its Driven ...

    This article examines the nature and manifestation of climate change driven impacts on the agrarian districts of Kongwa and Bahi in the semi arid areas of Dodoma region in Tanzania. A Survey of 398 households in the study area was undertaken to elicit information on the nature and manifestation of climate change driven ...

  6. Cutaneous manifestations of HIV/AIDS: Part I | Dlova | Southern ...

    Human immunodeficiency virus (HIV) infection can lead to a variety of clinical cutaneous manifestations. These cutaneous disorders occur universally during the course of HIV infection. Cutaneous manifestations of HIV are very diverse. The course and clinical presentation of HIV in individuals who have access to highly ...

  7. Pulmonary arterial hypertension as a manifestation of lupus erythematosus

    Stark, P.; Jaramillo, D.

    1987-01-01

    We present five patients with systemic lupus erythematosus (SLE) who developed pulmonary arterial hypertension and cor pulmonale in the course of their disease. The clinical features, as well as, the radiological manifestations of this rare manifestation of SLE are discussed. A vasculitic process is the most likely cause of this complication. Therapy is ineffective and the prognosis is poor. (orig.) [de

  8. Effectiveness and Limitations of E-Mail Security Protocols

    M. Tariq Banday

    2011-01-01

    Simple Mail Transport Protocol is the most widely adopted protocol for e-mail delivery. However, it lackssecurity features for privacy, authentication of sending party, integrity of e-mail message, nonrepudiationand consistency of e-mail envelope. To make e-mail communication secure and private,e-mail servers incorporate one or more security features using add-on security protocols. The add-onsecurity protocols provide a reasonable security but have several limitations. This paper discussesli...

  9. Cloud Computing Security in Openstack Architecture: General Overview

    Gleb Igorevich Shakulo

    2015-10-01

    Full Text Available The subject of article is cloud computing security. Article begins with author analyzing cloud computing advantages and disadvantages, factors of growth, both positive and negative. Among latter, security is deemed one of the most prominent. Furthermore, author takes architecture of OpenStack project as an example for study: describes its essential components and their interconnection. As conclusion, author raises series of questions as possible areas of further research to resolve security concerns, thus making cloud computing more secure technology.

  10. Cyber security best practices for the nuclear industry

    Badr, I.

    2012-01-01

    When deploying software based systems, such as, digital instrumentation and controls for the nuclear industry, it is vital to include cyber security assessment as part of architecture and development process. When integrating and delivering software-intensive systems for the nuclear industry, engineering teams should make use of a secure, requirements driven, software development life cycle, ensuring security compliance and optimum return on investment. Reliability protections, data loss prevention, and privacy enforcement provide a strong case for installing strict cyber security policies. (authors)

  11. Cyber security best practices for the nuclear industry

    Badr, I. [Rational IBM Software Group, IBM Corporation, Evanston, IL 60201 (United States)

    2012-07-01

    When deploying software based systems, such as, digital instrumentation and controls for the nuclear industry, it is vital to include cyber security assessment as part of architecture and development process. When integrating and delivering software-intensive systems for the nuclear industry, engineering teams should make use of a secure, requirements driven, software development life cycle, ensuring security compliance and optimum return on investment. Reliability protections, data loss prevention, and privacy enforcement provide a strong case for installing strict cyber security policies. (authors)

  12. Family Food Security and Children’s Environment: A Comprehensive Analysis with Structural Equation Modeling

    Che Wan Jasimah bt Wan Mohamed Radzi; Huang Hui; Nur Anisah Binti Mohamed @ A. Rahman; Hashem Salarzadeh Jenatabadi

    2017-01-01

    Structural Equation Modeling (SEM) has been used extensively in sustainability studies to model relationships among latent and manifest variables. This paper provides a tutorial exposition of the SEM approach in food security studies and introduces a basic framework based on family food security and children’s environment sustainability. This framework includes family food security and three main concepts representing children’s environment, including children’s BMI, health, and school perfor...

  13. Steel making

    Chakrabarti, A K

    2014-01-01

    "Steel Making" is designed to give students a strong grounding in the theory and state-of-the-art practice of production of steels. This book is primarily focused to meet the needs of undergraduate metallurgical students and candidates for associate membership examinations of professional bodies (AMIIM, AMIE). Besides, for all engineering professionals working in steel plants who need to understand the basic principles of steel making, the text provides a sound introduction to the subject.Beginning with a brief introduction to the historical perspective and current status of steel making together with the reasons for obsolescence of Bessemer converter and open hearth processes, the book moves on to: elaborate the physiochemical principles involved in steel making; explain the operational principles and practices of the modern processes of primary steel making (LD converter, Q-BOP process, and electric furnace process); provide a summary of the developments in secondary refining of steels; discuss principles a...

  14. Graves' disease. Manifestations and therapeutic options

    McFarland, K.F.; Saleeby, G.

    1988-01-01

    Graves' disease is the most common cause of hyperthyroidism. Clinical features include thyroid enlargement, eye signs, tachycardia, heat intolerance, emotional lability, weight loss, and hyperkinesis. Three modes of therapy are available. The preferences of the patient and physician are usually prime considerations in devising the therapeutic plan. Radioactive iodine is the most frequently used and safest method of treatment for adults. Antithyroid drugs are preferred for children and pregnant women. Surgery is usually reserved for patients in whom the other forms of treatment are not acceptable. Considerable patient education during the decision-making process enhances the success of the therapeutic plan

  15. Security Design Flaws That Affect Usability in Online Banking

    Gurlen, Stephanie

    2013-01-01

    As the popularity of online banking Websites has increased, the security of these sites has become increasingly critical as attacks against these sites are on the rise. However, the design decisions made during construction of the sites could make usability more difficult, where the user has difficulty making good security decisions. This study…

  16. Security in Internet of Things

    Mohar, Matej

    2017-01-01

    The Internet of Things (IoT) is emerging the Internet and other networks with wireless technologies to make physical objects interact online. The IoT has developed to become a promising technology and receives significant research attention in recent years because of the development of wireless communications and micro-electronics.  Like other immature technological inventions, although IoT will promise their users a better life in the near future, it is a security risk, especially today the ...

  17. Database security in the cloud

    Sakhi, Imal

    2012-01-01

    The aim of the thesis is to get an overview of the database services available in cloud computing environment, investigate the security risks associated with it and propose the possible countermeasures to minimize the risks. The thesis also analyzes two cloud database service providers namely; Amazon RDS and Xeround. The reason behind choosing these two providers is because they are currently amongst the leading cloud database providers and both provide relational cloud databases which makes ...

  18. When Information Improves Information Security

    Grossklags, Jens; Johnson, Benjamin; Christin, Nicolas

    This paper presents a formal, quantitative evaluation of the impact of bounded-rational security decision-making subject to limited information and externalities. We investigate a mixed economy of an individual rational expert and several naïve near-sighted agents. We further model three canonical types of negative externalities (weakest-link, best shot and total effort), and study the impact of two information regimes on the threat level agents are facing.

  19. Simulation and Evaluation of CTP and Secure-CTP Protocols

    P. Pecho

    2010-04-01

    Full Text Available The paper discusses characteristics and qualities of two routing protocols – Collection Tree Protocol and its secure modification. The original protocol, as well as other protocols for wireless sensors, solves only problems of ra- dio communication and limited resources. Our design of the secure protocol tries to solve also the essential security ob- jectives. For the evaluation of properties of our protocol in large networks, a TOSSIM simulator was used. Our effort was to show the influence of the modification of the routing protocol to its behavior and quality of routing trees. We have proved that adding security into protocol design does not necessarily mean higher demands for data transfer, power consumption or worse protocol efficiency. In the paper, we manifest that security in the protocol may be achieved with low cost and may offer similar performance as the original protocol.

  20. Radiotherapy for extramedullary leukaemic manifestation (Chloroma)

    Oertel, Michael; Elsayad, Khaled; Haverkamp, Uwe; Eich, Hans Theodor [University Hospital of Muenster, Department of Radiation Oncology, Muenster (Germany); Stelljes, Matthias [University Hospital of Muenster, Department of Internal Medicine, Muenster (Germany)

    2018-02-15

    Extramedullary leukaemic disease (EMD, synonym chloroma) is a rare solid manifestation of myeloid leukaemia for which the value of radiotherapy (RT) as a treatment strategy remains controversial. The aim of this study is to analyse the effectiveness of various RT doses for EMD in the modern treatment era. Between January 2000 and June 2016, 20 patients with total of 45 lesions underwent RT for EMD at our institution. With a median radiation dose of 26 Gy (range 4-42 Gy), local remission could be achieved in 91% of patients (complete remission rate: 71%). The median duration of local control (DOLC) was 17 months (95% confidence interval [CI] 0.5-33) and the median overall survival (OS) after chloroma onset was 24 months (95% CI 11-38). No noticeable difference between high- and low-dose regimens has been observed (74% versus 68%; P = 0.5). In the multivariate analysis, only Eastern Cooperative Oncology Group (ECOG) score and bone marrow state during RT have proven to be determinant for durable local control and OS. Low-dose RT (≤26 Gy) achieves good local control compared to high-dose regimes. Bone marrow state during RT and ECOG score during RT may play a crucial role, influencing both DOLC and OS. (orig.) [German] Extramedullaere leukaemische Infiltrate (EMD) sind seltene Manifestationen myeloischer Leukaemien, in deren Behandlungskonzepten der Stellenwert der Radiotherapie (RT) unklar ist. Das Ziel der vorgelegten Studie ist es, die Wirksamkeit verschiedener Strahlentherapiedosen fuer EMD in der modernen Behandlungsaera zu untersuchen. Zwischen Januar 2000 und Juni 2016 durchliefen 20 Patienten mit insgesamt 45 Laesionen eine RT fuer EMD in unserer Klinik. Mit einer mittleren RT-Dosis von 26 Gy (Spanne 4-42 Gy) konnte eine lokale Remission bei 91 % der Patienten erzielt werden (komplette Remissionsrate, CRR: 71 %). Die mittlere Dauer der Lokalkontrolle (DOLC) betrug 17 Monate (95 %-KI 0,5-33) und das mediane Gesamtueberleben (OS) nach Chloromadiagnose war 24

  1. Negawatt manifesto - Making energy transition a success; Manifeste Negawatt - Reussir la transition energetique

    Salomon, Thierry; Jedliczka, Marc; Marignac, Yves; Hessel, Stephane; Lovins, Amory

    2012-01-19

    For ten years, the Negawatt association has taken a fresh look at our ways of consuming and producing energy. After the realisation of its 2011 scenario, the association has wished to complete this work with a reflexion full of ideas and operational measures and addressed to all citizens and to decision-makers. This manifesto describes with pedagogy and lucidity a possible and desirable path to get out of our energy and climate crises. Contents: 1 - Energy in crisis; 2 - Energy in its all forms; 3 - From the approach to the scenario: preparing the energy transition; 4 - Buildings and energy transition; 5 - Key-sectors of the transition: transports, industry and agriculture; 6 - Advent of renewable energies; 7 - From the nuclear twilight to the renewable dawn; 8 - Costs and benefits of the energy transition; 9 - The 'true value' of energy; 10 - From the status time to the action one. A series of 26 graphs summarizes the Negawatt approach. (J.S.)

  2. A European Perspective on Security Research

    Liem, Khoen; Hiller, Daniel; Castex, Christoph

    Tackling the complexity and interdependence of today's security environment in the globalized world of the 21st century is an everlasting challenge. Whereas the end of the Cold War presented a caesura of global dimension for the political and economic architecture and a realignment of power distribution and international relations between former adversaries, September 11th of 2001 may be seen as another caesura. Since then, specifically among countries of the Western hemisphere, traditional security paradigms and theories have been critically questioned and the different security cultures and perceptions have resulted in diverse security and defence policies as well as in security research efforts of individual countries. Consensus, it seems, exists on the question of what the threats are that our modern interconnected societies are facing. Whether looking at international terrorism, organized crime, climate change, the illegal trafficking of goods and people or naturally caused catastrophes, these phenomena all have in common that they are in most cases of transnational nature. Formerly existing dividing lines between internal and external security continue to fade, presenting an enormous challenge for those in charge of designing security policy and even more so for the various institutions safeguarding European security. That is why dissent often revolves around the question on how to get hold of these complex problems. Geographic location, cultural background, ethical make-up of society as well as relations with neighbouring countries are all important aspects to be considered when assessing the security culture and policy of individual countries.

  3. Defining Information Security.

    Lundgren, Björn; Möller, Niklas

    2017-11-15

    This article proposes a new definition of information security, the 'Appropriate Access' definition. Apart from providing the basic criteria for a definition-correct demarcation and meaning concerning the state of security-it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called 'soft issues' of information security (those including, e.g., humans, organizations, culture, ethics, policies, and law) and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting attitudes on security in an organization. The need for a new definition is demonstrated by pointing to a number of problems for the standard definition type of information security-the so-called CIA definition. Besides being too broad as well as too narrow, it cannot properly handle the soft issues of information security, nor recognize the contextual and normative nature of security.

  4. Managing Cisco network security

    Knipp, Eric

    2002-01-01

    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...

  5. Make Sense?

    Gyrd-Jones, Richard; Törmälä, Minna

    Purpose: An important part of how we sense a brand is how we make sense of a brand. Sense-making is naturally strongly connected to how we cognize about the brand. But sense-making is concerned with multiple forms of knowledge that arise from our interpretation of the brand-related stimuli......: Declarative, episodic, procedural and sensory. Knowledge is given meaning through mental association (Keller, 1993) and / or symbolic interaction (Blumer, 1969). These meanings are centrally related to individuals’ sense of identity or “identity needs” (Wallpach & Woodside, 2009). The way individuals make...... sense of brands is related to who people think they are in their context and this shapes what they enact and how they interpret the brand (Currie & Brown, 2003; Weick, Sutcliffe, & Obstfeld, 2005; Weick, 1993). Our subject of interest in this paper is how stakeholders interpret and ascribe meaning...

  6. Analyzing rater agreement manifest variable methods

    von Eye, Alexander

    2014-01-01

    Agreement among raters is of great importance in many domains. For example, in medicine, diagnoses are often provided by more than one doctor to make sure the proposed treatment is optimal. In criminal trials, sentencing depends, among other things, on the complete agreement among the jurors. In observational studies, researchers increase reliability by examining discrepant ratings. This book is intended to help researchers statistically examine rater agreement by reviewing four different approaches to the technique.The first approach introduces readers to calculating coefficients that allow one to summarize agreements in a single score. The second approach involves estimating log-linear models that allow one to test specific hypotheses about the structure of a cross-classification of two or more raters'' judgments. The third approach explores cross-classifications or raters'' agreement for indicators of agreement or disagreement, and for indicators of such characteristics as trends. The fourth approach compa...

  7. ICT security management

    SCHREURS, Jeanne; MOREAU, Rachel

    2007-01-01

    Security becomes more and more important and companies are aware that it has become a management problem. It’s critical to know what are the critical resources and processes of the company and their weaknesses. A security audit can be a handy solution. We have developed BEVA, a method to critically analyse the company and to uncover the weak spots in the security system. BEVA results also in a general security score and security scores for each security factor. These will be used in the risk ...

  8. Android apps security

    Gunasekera, Sheran

    2012-01-01

    Android Apps Security provides guiding principles for how to best design and develop Android apps with security in mind. It explores concepts that can be used to secure apps and how developers can use and incorporate these security features into their apps. This book will provide developers with the information they need to design useful, high-performing, and secure apps that expose end-users to as little risk as possible.  Overview of Android OS versions, features, architecture and security.  Detailed examination of areas where attacks on applications can take place and what controls should b

  9. Smart security proven practices

    Quilter, J David

    2014-01-01

    Smart Security: Understanding and Contributing to the Business is a video presentation. Length: 68 minutes. In Smart Security: Understanding and Contributing to the Business, presenter J. David Quilter demonstrates the benefits of how a fully integrated security program increases business profits and delivers smart security practices at the same time. The presentation does away with the misconception that security is only an expense. In fact, a well-integrated security program can protect business interests, thereby enhancing productivity and net income. Quilter covers cost analysis and secu

  10. IAEA Nuclear Security - Achievements 2002-2011

    2012-03-01

    The possibility that nuclear or other radioactive material could be used for malicious purposes is real. This calls for a collective commitment to the control of, and accountancy for, material, as well as to adequate levels of protection in order to prevent criminal or unauthorized access to the material or associated facilities. Sharing of knowledge and experience, coordination among States and collaboration with other international organizations, initiatives and industries supports an effective international nuclear security framework. In 2001, the Board of Governors tasked the IAEA with improving nuclear security worldwide. The report that follows provides an overview of accomplishments over the last decade and reflects the importance that States assign to keeping material in the right hands. The IAEA has established a comprehensive nuclear security programme, described first in the Nuclear Security Plan of 2002-2005 and subsequently in the second plan of 2006- 2009. Activities included developing internationally accepted nuclear security guidance, supporting international legal instruments, protecting material and facilities, securing transport and borders, detecting and interdicting illicit nuclear trafficking, strengthening human resource capacity and preparing response plans should a nuclear security event occur. The IAEA has begun the implementation of its third Nuclear Security Plan, to be completed at the end of 2013. This approach to nuclear security recognizes that an effective national nuclear security regime builds on a number of factors: the implementation of relevant international legal instruments; IAEA guidance and standards; information protection; physical protection; material accounting and control; detection of, and response to, trafficking in such material; national response plans and contingency measures. Implemented in a systematic manner, these building blocks make up a sustainable national nuclear security regime and contribute to global

  11. Nation State as Security Provider in Human Security Issue

    Maya Padmi, Made Fitri

    2015-01-01

    Human Security notion is emphasizing on human as the central of security studies, challenging the position of state as the core of security. Some studies are tried to separate the state security and human security, however there are strong connection between these two notions. State has important role in establishing and maintaining the security of its own citizens. Through social contract and social security protection, state are oblige to set the security of its own people as their security...

  12. Modelling security and trust with Secure Tropos

    Giorgini, P.; Mouratidis, H.; Zannone, N.; Mouratidis, H.; Giorgini, P.

    2006-01-01

    Although the concepts of security and trust play an important issue in the development of information systems, they have been mainly neglected by software engineering methodologies. In this chapter we present an approach that considers security and trust throughout the software development process.

  13. Securing abundance : The politics of energy security

    Kester, Johannes

    2016-01-01

    Energy Security is a concept that is known in the literature for its ‘slippery’ nature and subsequent wide range of definitions. Instead of another attempt at grasping the essence of this concept, Securing Abundance reformulates the problem and moves away from a definitional problem to a theoretical

  14. Embedded Java security security for mobile devices

    Debbabi, Mourad; Talhi, Chamseddine

    2007-01-01

    Java brings more functionality and versatility to the world of mobile devices, but it also introduces new security threats. This book contains a presentation of embedded Java security and presents the main components of embedded Java. It gives an idea of the platform architecture and is useful for researchers and practitioners.

  15. Formal Analysis of Graphical Security Models

    Aslanyan, Zaruhi

    , software components and human actors interacting with each other to form so-called socio-technical systems. The importance of socio-technical systems to modern societies requires verifying their security properties formally, while their inherent complexity makes manual analyses impracticable. Graphical...... models for security offer an unrivalled opportunity to describe socio-technical systems, for they allow to represent different aspects like human behaviour, computation and physical phenomena in an abstract yet uniform manner. Moreover, these models can be assigned a formal semantics, thereby allowing...... formal verification of their properties. Finally, their appealing graphical notations enable to communicate security concerns in an understandable way also to non-experts, often in charge of the decision making. This dissertation argues that automated techniques can be developed on graphical security...

  16. Additional Security Considerations for Grid Management

    Eidson, Thomas M.

    2003-01-01

    The use of Grid computing environments is growing in popularity. A Grid computing environment is primarily a wide area network that encompasses multiple local area networks, where some of the local area networks are managed by different organizations. A Grid computing environment also includes common interfaces for distributed computing software so that the heterogeneous set of machines that make up the Grid can be used more easily. The other key feature of a Grid is that the distributed computing software includes appropriate security technology. The focus of most Grid software is on the security involved with application execution, file transfers, and other remote computing procedures. However, there are other important security issues related to the management of a Grid and the users who use that Grid. This note discusses these additional security issues and makes several suggestions as how they can be managed.

  17. Hypercortisolism and hyperandrogenism as manifestions of adrenal adenoma. Report of a mexican girl and review of the literature

    de Baro Álvarez Paola

    2014-07-01

    Conclusion: Because ACTs are extremely rare in chil- dren, a small percentage is detected based on clinical manifestations of virilization and Cushing’s syndrome as in our case. For this reason, we should be aware of their existence in order to make the diagnosis and treat them as soon as possible.

  18. Austerity, Discipline and Social Security

    Asja Hrvatin

    2013-03-01

    Full Text Available One of the manifestations of the global crisis of financial capitalism and the policies arising from it was the imposition of austerity measures, which not only resulted in privatization of the commons and general expropriation of the people, but also managed to introduce new mechanisms of discipline and punishment. Debt, being the fundament of relations in society, forced itself into the system of social security: new legislation, regulating welfare benefits, has now shifted to a method for the criminalization of poverty, deepening class differences and transforming social workers (and the system of social security as a whole into a moralizing, bureaucratic machine for disciplining the population. The new legislation also shows a lack of reflection on the changes that need to be made to the welfare state in order to create social services that meet the needs and desires of individuals. Instead of improvements that provide decent living conditions and a new system of social rights (to deal with the problems resulting from precarious working conditions, people are faced with depersonalization, humiliation and increased hate speech and other fascist practices. The effect of austerity measures on the social security system does not end with the devastation of service users’ lives and their communities, which are slowly becoming exhausted, individualized and devoid of solidarity. It also means a big step backwards for the core ethics and principles of social work. Social workers are increasingly alienated from their clients and the communities they live in. They function more in the service of the government and its policies rather than as advocates of people’s rights.

  19. Security Protocols: Specification, Verification, Implementation, and Composition

    Almousa, Omar

    An important aspect of Internet security is the security of cryptographic protocols that it deploys. We need to make sure that such protocols achieve their goals, whether in isolation or in composition, i.e., security protocols must not suffer from any aw that enables hostile intruders to break...... results. The most important generalization is the support for all security properties of the geometric fragment proposed by [Gut14]....... their security. Among others, tools like OFMC [MV09b] and Proverif [Bla01] are quite efficient for the automatic formal verification of a large class of protocols. These tools use different approaches such as symbolic model checking or static analysis. Either approach has its own pros and cons, and therefore, we...

  20. A Cluster- Based Secure Active Network Environment

    CHEN Xiao-lin; ZHOU Jing-yang; DAI Han; LU Sang-lu; CHEN Gui-hai

    2005-01-01

    We introduce a cluster-based secure active network environment (CSANE) which separates the processing of IP packets from that of active packets in active routers. In this environment, the active code authorized or trusted by privileged users is executed in the secure execution environment (EE) of the active router, while others are executed in the secure EE of the nodes in the distributed shared memory (DSM) cluster. With the supports of a multi-process Java virtual machine and KeyNote, untrusted active packets are controlled to securely consume resource. The DSM consistency management makes that active packets can be parallelly processed in the DSM cluster as if they were processed one by one in ANTS (Active Network Transport System). We demonstrate that CSANE has good security and scalability, but imposing little changes on traditional routers.