WorldWideScience

Sample records for membrane attack complex

  1. The membrane attack complex of the complement system is essential for rapid wallerian degeneration

    NARCIS (Netherlands)

    Ramaglia, Valeria; King, Rosalind Helen Mary; Nourallah, Michelle; Wolterman, Ruud; de Jonge, Rosalein; Ramkema, Marja; Vigar, Miriam Ann; van der Wetering, Sandra; Morgan, Brian Paul; Troost, Dirk; Baas, Frank

    2007-01-01

    The complement (C) system plays an important role in myelin breakdown during Wallerian degeneration (WD). The pathway and mechanism involved are, however, not clear. In a crush injury model of the sciatic nerve, we show that C6, necessary for the assembly of the membrane attack complex (MAC), is

  2. The membrane attack complex as an indicator of complement hyperactivation in type 2 diabetes mellitus

    OpenAIRE

    Elina Aleksandrovna Arakelova; Meri Robertovna Ovsepyan; Anna Surenovna Boyadzhyan; Arsen Artashesovich Arakelyan; Astkhik Artavazdovna Gevorkyan; Ashot Andreevich Mamikonyan

    2011-01-01

    Aim. Comparative analysis of the levels of the membrane attack complex (MAC) - an end product of complement activation, and of hemolytic activities of C1 and C3 complement components in sera of patients with diabetes mellitus 2 (DM2) and healthy subjects. Materials and methods. 37 DM2 patients (7 men, 26 women, mean age 58±9 years (M±б) and 37 healthy subjects without a family history of hereditary diabetes (17 men, 20 women, mean age 52±12 years). Serum MAC levels were measured by E...

  3. Structure of a membrane-attack complex/perforin (MACPF) family protein from the human gut symbiont Bacteroides thetaiotaomicron

    International Nuclear Information System (INIS)

    Xu, Qingping; Abdubek, Polat; Astakhova, Tamara; Axelrod, Herbert L.; Bakolitsa, Constantina; Cai, Xiaohui; Carlton, Dennis; Chen, Connie; Chiu, Hsiu-Ju; Clayton, Thomas; Das, Debanu; Deller, Marc C.; Duan, Lian; Ellrott, Kyle; Farr, Carol L.; Feuerhelm, Julie; Grant, Joanna C.; Grzechnik, Anna; Han, Gye Won; Jaroszewski, Lukasz; Jin, Kevin K.; Klock, Heath E.; Knuth, Mark W.; Kozbial, Piotr; Krishna, S. Sri; Kumar, Abhinav; Lam, Winnie W.; Marciano, David; Miller, Mitchell D.; Morse, Andrew T.; Nigoghossian, Edward; Nopakun, Amanda; Okach, Linda; Puckett, Christina; Reyes, Ron; Tien, Henry J.; Trame, Christine B.; Bedem, Henry van den; Weekes, Dana; Wooten, Tiffany; Yeh, Andrew; Zhou, Jiadong; Hodgson, Keith O.; Wooley, John; Elsliger, Marc-André; Deacon, Ashley M.; Godzik, Adam; Lesley, Scott A.; Wilson, Ian A.

    2010-01-01

    The crystal structure of a novel MACPF protein, which may play a role in the adaptation of commensal bacteria to host environments in the human gut, was determined and analyzed. Membrane-attack complex/perforin (MACPF) proteins are transmembrane pore-forming proteins that are important in both human immunity and the virulence of pathogens. Bacterial MACPFs are found in diverse bacterial species, including most human gut-associated Bacteroides species. The crystal structure of a bacterial MACPF-domain-containing protein BT-3439 (Bth-MACPF) from B. thetaiotaomicron, a predominant member of the mammalian intestinal microbiota, has been determined. Bth-MACPF contains a membrane-attack complex/perforin (MACPF) domain and two novel C-terminal domains that resemble ribonuclease H and interleukin 8, respectively. The entire protein adopts a flat crescent shape, characteristic of other MACPF proteins, that may be important for oligomerization. This Bth-MACPF structure provides new features and insights not observed in two previous MACPF structures. Genomic context analysis infers that Bth-MACPF may be involved in a novel protein-transport or nutrient-uptake system, suggesting an important role for these MACPF proteins, which were likely to have been inherited from eukaryotes via horizontal gene transfer, in the adaptation of commensal bacteria to the host environment

  4. Complement activation and formation of the membrane attack complex on serogroup B Neisseria meningitidis in the presence or absence of serum bactericidal activity

    NARCIS (Netherlands)

    Drogari-Apiranthitou, M.; Kuijper, E. J.; Dekker, N. [=Nick; Dankert, J.

    2002-01-01

    Encapsulated meningococci are complement sensitive only in the presence of bactericidal antibodies by yet-unexplored mechanisms. The objective of this study was to investigate the involvement of major bacterial surface constituents on complement activation and membrane attack complex (MAC) formation

  5. Soluble form of membrane attack complex independently predicts mortality and cardiovascular events in patients with ST-elevation myocardial infarction treated with primary percutaneous coronary intervention

    DEFF Research Database (Denmark)

    Lindberg, Søren; Pedersen, Sune H; Mogelvang, Rasmus

    2012-01-01

    The complement system is an important mediator of inflammation, which plays a pivotal role in atherosclerosis and acute myocardial infarction (AMI). Animal studies suggest that activation of the complement cascade resulting in the formation of soluble membrane attack complex (sMAC), contributes...

  6. Membrane attack complex inhibitor CD59a protects against focal cerebral ischemia in mice

    Directory of Open Access Journals (Sweden)

    Nietfeld Wilfried

    2010-03-01

    Full Text Available Abstract Background The complement system is a crucial mediator of inflammation and cell lysis after cerebral ischemia. However, there is little information about the exact contribution of the membrane attack complex (MAC and its inhibitor-protein CD59. Methods Transient focal cerebral ischemia was induced by middle cerebral artery occlusion (MCAO in young male and female CD59a knockout and wild-type mice. Two models of MCAO were applied: 60 min MCAO and 48 h reperfusion, as well as 30 min MCAO and 72 h reperfusion. CD59a knockout animals were compared to wild-type animals in terms of infarct size, edema, neurological deficit, and cell death. Results and Discussion CD59a-deficiency in male mice caused significantly increased infarct volumes and brain swelling when compared to wild-type mice at 72 h after 30 min-occlusion time, whereas no significant difference was observed after 1 h-MCAO. Moreover, CD59a-deficient mice had impaired neurological function when compared to wild-type mice after 30 min MCAO. Conclusion We conclude that CD59a protects against ischemic brain damage, but depending on the gender and the stroke model used.

  7. CR2-mediated activation of the complement alternative pathway results in formation of membrane attack complexes on human B lymphocytes

    DEFF Research Database (Denmark)

    Nielsen, C H; Marquart, H V; Prodinger, W M

    2001-01-01

    of the CR1 binding site with the monoclonal antibody 3D9 also resulted in a minor reduction in MAC deposition, while FE8 and 3D9, in combination, markedly reduced deposition of both C3 fragments (91 +/- 5%) and C9 (95 +/- 3%). The kinetics of C3-fragment and MAC deposition, as well as the dependence of both......Normal human B lymphocytes activate the alternative pathway of complement via complement receptor type 2 (CR2, CD21), that binds hydrolysed C3 (iC3) and thereby promotes the formation of a membrane-bound C3 convertase. We have investigated whether this might lead to the generation of a C5...... convertase and consequent formation of membrane attack complexes (MAC). Deposition of C3 fragments and MAC was assessed on human peripheral B lymphocytes in the presence of 30% autologous serum containing 4.4 mM MgCl2/20 mM EGTA, which abrogates the classical pathway of complement without affecting...

  8. Combined Heuristic Attack Strategy on Complex Networks

    Directory of Open Access Journals (Sweden)

    Marek Šimon

    2017-01-01

    Full Text Available Usually, the existence of a complex network is considered an advantage feature and efforts are made to increase its robustness against an attack. However, there exist also harmful and/or malicious networks, from social ones like spreading hoax, corruption, phishing, extremist ideology, and terrorist support up to computer networks spreading computer viruses or DDoS attack software or even biological networks of carriers or transport centers spreading disease among the population. New attack strategy can be therefore used against malicious networks, as well as in a worst-case scenario test for robustness of a useful network. A common measure of robustness of networks is their disintegration level after removal of a fraction of nodes. This robustness can be calculated as a ratio of the number of nodes of the greatest remaining network component against the number of nodes in the original network. Our paper presents a combination of heuristics optimized for an attack on a complex network to achieve its greatest disintegration. Nodes are deleted sequentially based on a heuristic criterion. Efficiency of classical attack approaches is compared to the proposed approach on Barabási-Albert, scale-free with tunable power-law exponent, and Erdős-Rényi models of complex networks and on real-world networks. Our attack strategy results in a faster disintegration, which is counterbalanced by its slightly increased computational demands.

  9. Defense and attack of complex and dependent systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2010-01-01

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  10. Defense and attack of complex and dependent systems

    Energy Technology Data Exchange (ETDEWEB)

    Hausken, Kjell, E-mail: kjell.hausken@uis.n [Faculty of Social Sciences, University of Stavanger, N-4036 Stavanger (Norway)

    2010-01-15

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  11. Vulnerability of complex networks under intentional attack with incomplete information

    International Nuclear Information System (INIS)

    Wu, J; Deng, H Z; Tan, Y J; Zhu, D Z

    2007-01-01

    We study the vulnerability of complex networks under intentional attack with incomplete information, which means that one can only preferentially attack the most important nodes among a local region of a network. The known random failure and the intentional attack are two extreme cases of our study. Using the generating function method, we derive the exact value of the critical removal fraction f c of nodes for the disintegration of networks and the size of the giant component. To validate our model and method, we perform simulations of intentional attack with incomplete information in scale-free networks. We show that the attack information has an important effect on the vulnerability of scale-free networks. We also demonstrate that hiding a fraction of the nodes information is a cost-efficient strategy for enhancing the robustness of complex networks

  12. Membrane attack complex of complement is not essential for immune mediated demyelination in experimental autoimmune neuritis.

    Science.gov (United States)

    Tran, Giang T; Hodgkinson, Suzanne J; Carter, Nicole M; Killingsworth, Murray; Nomura, Masaru; Verma, Nirupama D; Plain, Karren M; Boyd, Rochelle; Hall, Bruce M

    2010-12-15

    Antibody deposition and complement activation, especially membrane attack complex (MAC) formation are considered central for immune mediated demyelination. To examine the role of MAC in immune mediated demyelination, we studied experimental allergic neuritis (EAN) in Lewis rats deficient in complement component 6 (C6) that cannot form MAC. A C6 deficient Lewis (Lewis/C6-) strain of rats was bred by backcrossing the defective C6 gene, from PVG/C6- rats, onto the Lewis background. Lewis/C6- rats had the same C6 gene deletion as PVG/C6- rats and their sera did not support immune mediated haemolysis unless C6 was added. Active EAN was induced in Lewis and Lewis/C6- rats by immunization with bovine peripheral nerve myelin in complete Freund's adjuvant (CFA), and Lewis/C6- rats had delayed clinical EAN compared to the Lewis rats. Peripheral nerve demyelination in Lewis/C6- was also delayed but was similar in extent at the peak of disease. Compared to Lewis, Lewis/C6- nerves had no MAC deposition, reduced macrophage infiltrate and IL-17A, but similar T cell infiltrate and Th1 cytokine mRNA expression. ICAM-1 and P-selectin mRNA expression and immunostaining on vascular endothelium were delayed in Lewis C6- compared to Lewis rats' nerves. This study found that MAC was not required for immune mediated demyelination; but that MAC enhanced early symptoms and early demyelination in EAN, either by direct lysis or by sub-lytic induction of vascular endothelial expression of ICAM-1 and P-selectin. Copyright © 2010 Elsevier B.V. All rights reserved.

  13. Why cryptography should not rely on physical attack complexity

    CERN Document Server

    Krämer, Juliane

    2015-01-01

    This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successfully implemented in practice, they have generally not been considered a serious threat. In short, their physical attack complexity has been overestimated and the implied security threat has been underestimated. First, the book introduces the photonic side channel, which offers not only temporal resolution, but also the highest possible spatial resolution. Due to the high cost of its initial implementation, it has not been taken seriously. The work shows both simple and differential photonic side channel analyses. Then, it presents a fault attack against pairing-based cryptography. Due to the need for at least two indepe...

  14. Rising Trend: Complex and sophisticated attack methods

    Indian Academy of Sciences (India)

    Stux, DuQu, Nitro, Luckycat, Exploit Kits, FLAME. ADSL/SoHo Router Compromise. Botnets of compromised ADSL/SoHo Routers; User Redirection via malicious DNS entry. Web Application attacks. SQL Injection, RFI etc. More and more Webshells. More utility to hackers; Increasing complexity and evading mechanisms.

  15. Otolithic membrane damage in patients with endolymphatic hydrops and drop attacks.

    Science.gov (United States)

    Calzada, Audrey P; Lopez, Ivan A; Ishiyama, Gail; Ishiyama, Akira

    2012-12-01

    1. Evaluate the otolithic membrane in patients with endolymphatic hydrops (EH) and vestibular drop attacks (VDA) undergoing ablative labyrinthectomy. 2. Correlate intraoperative findings to archival temporal bone specimens of patients with EH. Retrospective case review. Tertiary referral center. SPECIMEN SOURCE: 1. Patients undergoing labyrinthectomy for incapacitating Ménière's disease (MD), delayed EH, VDA, or acoustic neuroma (AN) between 2004 and 2011. 2. Archival temporal bone specimens of patients with MD. Ablative labyrinthectomy. Examination of the utricular otolithic membrane. The otolithic membrane of the utricle was evaluated intraoperatively in 28 patients undergoing labyrinthectomy. Seven (25%) had a history of VDA, 6 (21%) had delayed EH, 9 (32%) had MD, and 6 (21%) had AN. All patients with VDA showed evidence of a disrupted utricular otolithic membrane, whereas only 50% and 56% of patients with delayed EH and MD, respectively, demonstrated otolithic membrane disruption (p = 0.051). None of the patients with AN showed otolithic membrane disruption (p = 0.004). The mean thickness of the otolithic membrane in 5 archival temporal bone MD specimens was 11.45 micrometers versus 38 micrometers in normal specimens (p = 0.001). The otolithic membrane is consistently damaged in patients with VDA. In addition, there is a significantly higher incidence of otolithic membrane injury in patients with MD and delayed EH compared with patients without hydrops, suggesting that the underlying pathophysiology in VDA results from injury to the otolithic membrane of the saccule and utricle, resulting in free-floating otoliths and atrophy.

  16. Cascade-based attacks on complex networks

    Science.gov (United States)

    Motter, Adilson E.; Lai, Ying-Cheng

    2002-12-01

    We live in a modern world supported by large, complex networks. Examples range from financial markets to communication and transportation systems. In many realistic situations the flow of physical quantities in the network, as characterized by the loads on nodes, is important. We show that for such networks where loads can redistribute among the nodes, intentional attacks can lead to a cascade of overload failures, which can in turn cause the entire or a substantial part of the network to collapse. This is relevant for real-world networks that possess a highly heterogeneous distribution of loads, such as the Internet and power grids. We demonstrate that the heterogeneity of these networks makes them particularly vulnerable to attacks in that a large-scale cascade may be triggered by disabling a single key node. This brings obvious concerns on the security of such systems.

  17. Assembly and Regulation of the Membrane Attack Complex Based on Structures of C5b6 and sC5b9

    Directory of Open Access Journals (Sweden)

    Michael A. Hadders

    2012-03-01

    Full Text Available Activation of the complement system results in formation of membrane attack complexes (MACs, pores that disrupt lipid bilayers and lyse bacteria and other pathogens. Here, we present the crystal structure of the first assembly intermediate, C5b6, together with a cryo-electron microscopy reconstruction of a soluble, regulated form of the pore, sC5b9. Cleavage of C5 to C5b results in marked conformational changes, distinct from those observed in the homologous C3-to-C3b transition. C6 captures this conformation, which is preserved in the larger sC5b9 assembly. Together with antibody labeling, these structures reveal that complement components associate through sideways alignment of the central MAC-perforin (MACPF domains, resulting in a C5b6-C7-C8β-C8α-C9 arc. Soluble regulatory proteins below the arc indicate a potential dual mechanism in protection from pore formation. These results provide a structural framework for understanding MAC pore formation and regulation, processes important for fighting infections and preventing complement-mediated tissue damage.

  18. Complex Dynamic Development of Poliovirus Membranous Replication Complexes

    Science.gov (United States)

    Nair, Vinod; Hansen, Bryan T.; Hoyt, Forrest H.; Fischer, Elizabeth R.; Ehrenfeld, Ellie

    2012-01-01

    Replication of all positive-strand RNA viruses is intimately associated with membranes. Here we utilize electron tomography and other methods to investigate the remodeling of membranes in poliovirus-infected cells. We found that the viral replication structures previously described as “vesicles” are in fact convoluted, branching chambers with complex and dynamic morphology. They are likely to originate from cis-Golgi membranes and are represented during the early stages of infection by single-walled connecting and branching tubular compartments. These early viral organelles gradually transform into double-membrane structures by extension of membranous walls and/or collapsing of the luminal cavity of the single-membrane structures. As the double-membrane regions develop, they enclose cytoplasmic material. At this stage, a continuous membranous structure may have double- and single-walled membrane morphology at adjacent cross-sections. In the late stages of the replication cycle, the structures are represented mostly by double-membrane vesicles. Viral replication proteins, double-stranded RNA species, and actively replicating RNA are associated with both double- and single-membrane structures. However, the exponential phase of viral RNA synthesis occurs when single-membrane formations are predominant in the cell. It has been shown previously that replication complexes of some other positive-strand RNA viruses form on membrane invaginations, which result from negative membrane curvature. Our data show that the remodeling of cellular membranes in poliovirus-infected cells produces structures with positive curvature of membranes. Thus, it is likely that there is a fundamental divergence in the requirements for the supporting cellular membrane-shaping machinery among different groups of positive-strand RNA viruses. PMID:22072780

  19. Membrane tethering complexes in the endosomal system

    Directory of Open Access Journals (Sweden)

    Anne eSpang

    2016-05-01

    Full Text Available Vesicles that are generated by endocytic events at the plasma membrane are destined to early endosomes. A prerequisite for proper fusion is the tethering of two membrane entities. Tethering of vesicles to early endosomes is mediated by the CORVET complex, while fusion of late endosomes with lysosomes depends on the HOPS complex. Recycling through the TGN and to the plasma membrane is facilitated by the GARP and EARP complexes, respectively. However, there are other tethering functions in the endosomal system as there are multiple pathways through which proteins can be delivered from endosomes to either the TGN or the plasma membrane. Furthermore, complexes that may be part of novel tethering complexes have been recently identified. Thus it is likely that more tethering factors exist. In this review, I will provide an overview of different tethering complexes of the endosomal system and discuss how they may provide specificity in membrane traffic.

  20. 3D pressure field in lipid membranes and membrane-protein complexes

    DEFF Research Database (Denmark)

    Ollila, O H Samuli; Risselada, H Jelger; Louhivuori, Martti

    2009-01-01

    We calculate full 3D pressure fields for inhomogeneous nanoscale systems using molecular dynamics simulation data. The fields represent systems with increasing level of complexity, ranging from semivesicles and vesicles to membranes characterized by coexistence of two phases, including also...... a protein-membrane complex. We show that the 3D pressure field is distinctly different for curved and planar bilayers, the pressure field depends strongly on the phase of the membrane, and that an integral protein modulates the tension and elastic properties of the membrane....

  1. Dynamic complexity: plant receptor complexes at the plasma membrane.

    Science.gov (United States)

    Burkart, Rebecca C; Stahl, Yvonne

    2017-12-01

    Plant receptor complexes at the cell surface perceive many different external and internal signalling molecules and relay these signals into the cell to regulate development, growth and immunity. Recent progress in the analyses of receptor complexes using different live cell imaging approaches have shown that receptor complex formation and composition are dynamic and take place at specific microdomains at the plasma membrane. In this review we focus on three prominent examples of Arabidopsis thaliana receptor complexes and how their dynamic spatio-temporal distribution at the PM has been studied recently. We will elaborate on the newly emerging concept of plasma membrane microdomains as potential hubs for specific receptor complex assembly and signalling outputs. Copyright © 2017 Elsevier Ltd. All rights reserved.

  2. Characterising antimicrobial protein-membrane complexes

    International Nuclear Information System (INIS)

    Xun, Gloria; Dingley, Andrew; Tremouilhac, Pierre

    2009-01-01

    Full text: Antimicrobial proteins (AMPs) are host defence molecules that protect organisms from microbial infection. A number of hypotheses for AMP activity have been proposed which involve protein membrane interactions. However, there is a paucity of information describing AMP-membrane complexes in detail. The aim of this project is to characterise the interactions of amoebapore-A (APA-1) with membrane models using primarily solution-state NMR spectroscopy. APA-1 is an AMP which is regulated by a pH-dependent dimerisation event. Based on the atomic resolution solution structure of monomeric APA-1, it is proposed that this dimerisation is a prerequisite for ring-like hexameric pore formation. Due to the cytotoxicity of APA-1, we have developed a cell-free system to produce this protein. To facilitate our studies, we have adapted the cell-free system to isotope label APA-1. 13 C /15 N -enriched APA-1 sample was achieved and we have begun characterising APA-1 dimerisation and membrane interactions using NMR spectroscopy and other biochemical/biophysical methods. Neutron reflectometry is a surface-sensitive technique and therefore represents an ideal technique to probe how APA-1 interacts with membranes at the molecular level under different physiological conditions. Using Platypus, the pH-induced APA-1-membrane interactions should be detectable as an increase of the amount of protein adsorbed at the membrane surface and changes in the membrane properties. Specifically, detailed information of the structure and dimensions of the protein-membrane complex, the position and amount of the protein in the membrane, and the perturbation of the membrane phospholipids on protein incorporation can be extracted from the neutron reflectometry measurement. Such information will enable critical assessment of current proposed mechanisms of AMP activity in bacterial membranes and complement our NMR studies

  3. Mitofilin complexes: conserved organizers of mitochondrial membrane architecture.

    Science.gov (United States)

    Zerbes, Ralf M; van der Klei, Ida J; Veenhuis, Marten; Pfanner, Nikolaus; van der Laan, Martin; Bohnert, Maria

    2012-11-01

    Mitofilin proteins are crucial organizers of mitochondrial architecture. They are located in the inner mitochondrial membrane and interact with several protein complexes of the outer membrane, thereby generating contact sites between the two membrane systems of mitochondria. Within the inner membrane, mitofilins are part of hetero-oligomeric protein complexes that have been termed the mitochondrial inner membrane organizing system (MINOS). MINOS integrity is required for the maintenance of the characteristic morphology of the inner mitochondrial membrane, with an inner boundary region closely apposed to the outer membrane and cristae membranes, which form large tubular invaginations that protrude into the mitochondrial matrix and harbor the enzyme complexes of the oxidative phosphorylation machinery. MINOS deficiency comes along with a loss of crista junction structures and the detachment of cristae from the inner boundary membrane. MINOS has been conserved in evolution from unicellular eukaryotes to humans, where alterations of MINOS subunits are associated with multiple pathological conditions.

  4. Prospective Vigilance: Assessing Complex Coordinated Attack Preparedness Programs

    Science.gov (United States)

    2017-12-01

    INTENTIONALLY LEFT BLANK xiii LIST OF ACRONYMS AND ABBREVIATIONS CCA complex coordinate attack EMS emergency medical services FBI Federal Bureau...the Bombings in London on 7th July 2005, vol. HC 1087 (London: The Stationery Office, 2006), https://www.gov.uk/government/uploads/system/uploads...School Center for Homeland Defense and Security Mobile Education Team, DHS Office of Bombing Prevention, and DHS Active Shooter training. 55 NCTC, DHS

  5. The membrane attack complex of complement contributes to plasmin-induced synthesis of platelet-activating factor by endothelial cells and neutrophils.

    Science.gov (United States)

    Lupia, Enrico; Del Sorbo, Lorenzo; Bergerone, Serena; Emanuelli, Giorgio; Camussi, Giovanni; Montrucchio, Giuseppe

    2003-08-01

    Thrombolytic agents, used to restore blood flow to ischaemic tissues, activate several enzymatic systems with pro-inflammatory effects, thus potentially contributing to the pathogenesis of ischaemia-reperfusion injury. Platelet-activating factor (PAF), a phospholipid mediator of inflammation, has been implicated in the pathogenesis of this process. We previously showed that the infusion of streptokinase (SK) induces the intravascular release of PAF in patients with acute myocardial infarction (AMI), and that cultured human endothelial cells (EC) synthesized PAF in response to SK and plasmin (PLN). In the present study, we investigated the role of the membrane attack complex (MAC) of complement in the PLN-induced synthesis of PAF. In vivo, we showed a correlation between the levels of soluble terminal complement components (sC5b-9) and the concentrations of PAF detected in blood of patients with AMI infused with SK. In vitro both EC and polymorphonuclear neutrophils (PMN), incubated in the presence of PLN and normal human serum, showed an intense staining for the MAC neoepitope, while no staining was detected when they were incubated with PLN in the presence of heat-inactivated normal human serum. Moreover, the insertion of MAC on EC and PMN plasmamembrane elicited the synthesis of PAF. In conclusion, our results elucidate the mechanisms involved in PAF production during the activation of the fibrinolytic system, showing a role for complement products in this setting. The release of PAF may increase the inflammatory response, thus limiting the beneficial effects of thrombolytic therapy. Moreover, it may have a pathogenic role in other pathological conditions, such as transplant rejection, tumoral angiogenesis, and septic shock, where fibrinolysis is activated.

  6. Membrane Tethering Complexes in the Endosomal System

    OpenAIRE

    Spang, Anne

    2016-01-01

    Vesicles that are generated by endocytic events at the plasma membrane are destined to early endosomes. A prerequisite for proper fusion is the tethering of two membrane entities. Tethering of vesicles to early endosomes is mediated by the class C core vacuole/endosome tethering (CORVET) complex, while fusion of late endosomes with lysosomes depends on the homotypic fusion and vacuole protein sorting (HOPS) complex. Recycling through the trans-Golgi network (TGN) and to the plasma membrane is...

  7. Detection of complex cyber attacks

    Science.gov (United States)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  8. Low Complexity Signed Response Based Sybil Attack Detection Mechanism in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    M. Saud Khan

    2016-01-01

    Full Text Available Security is always a major concern in wireless sensor networks (WSNs. Identity based attacks such as spoofing and sybil not only compromise the network but also slow down its performance. This paper proposes a low complexity sybil attack detection scheme, that is, based on signed response (SRES authentication mechanism developed for Global System for Mobile (GSM communications. A probabilistic model is presented which analyzes the proposed authentication mechanism for its probability of sybil attack. The paper also presents a simulation based comparative analysis of the existing sybil attack schemes with respect to the proposed scheme. It is observed that the proposed sybil detection scheme exhibits lesser computational cost and power consumption as compared to the existing schemes for the same sybil detection performance.

  9. Membrane Contact Sites: Complex Zones for Membrane Association and Lipid Exchange

    Science.gov (United States)

    Quon, Evan; Beh, Christopher T.

    2015-01-01

    Lipid transport between membranes within cells involves vesicle and protein carriers, but as agents of nonvesicular lipid transfer, the role of membrane contact sites has received increasing attention. As zones for lipid metabolism and exchange, various membrane contact sites mediate direct associations between different organelles. In particular, membrane contact sites linking the plasma membrane (PM) and the endoplasmic reticulum (ER) represent important regulators of lipid and ion transfer. In yeast, cortical ER is stapled to the PM through membrane-tethering proteins, which establish a direct connection between the membranes. In this review, we consider passive and facilitated models for lipid transfer at PM–ER contact sites. Besides the tethering proteins, we examine the roles of an additional repertoire of lipid and protein regulators that prime and propagate PM–ER membrane association. We conclude that instead of being simple mediators of membrane association, regulatory components of membrane contact sites have complex and multilayered functions. PMID:26949334

  10. Mitofilin complexes : conserved organizers of mitochondrial membrane architecture

    NARCIS (Netherlands)

    Zerbes, Ralf M.; van der Klei, Ida J.; Veenhuis, Marten; Pfanner, Nikolaus; van der Laan, Martin; Bohnert, Maria

    2012-01-01

    Mitofilin proteins are crucial organizers of mitochondrial architecture. They are located in the inner mitochondrial membrane and interact with several protein complexes of the outer membrane, thereby generating contact sites between the two membrane systems of mitochondria. Within the inner

  11. Bush animal attacks: management of complex injuries in a resource-limited setting

    Directory of Open Access Journals (Sweden)

    Mitchell Katrina B

    2011-12-01

    Full Text Available Abstract Introduction Though animal-related injuries and fatalities have been documented throughout the world, the variety of attacks by wild animals native to rural East Africa are less commonly described. Given the proximity of our northwestern Tanzania hospital to Lake Victoria, Lake Tanganyika, and the Serengeti National Park, and presentation of several patients attacked by bush animals and suffering a variety of complex injuries, we sought to report the pattern of attacks and surgical management in a resource-limited setting. Materials and methods Four patients who were admitted to the northwestern Tanzania tertiary referral hospital, Bugando Medical Centre (BMC, in 2010-2011 suffered attacks by different bush animals: hyena, elephant, crocodile, and vervet monkey. These patients were triaged as trauma patients in the Casualty Ward, then admitted for inpatient monitoring and treatment. Their outcomes were followed to discharge. Results The age and gender of the patients attacked was variable, though all but the pediatric patient were participating in food gathering or guarding activities in rural locations at the time of the attacks. All patients required surgical management of their injuries, which included debridement and closure of wounds, chest tube insertion, amputation, and external fixation of an extremity fracture. All patients survived and were discharged home. Discussion Though human injuries secondary to encounters with undomesticated animals such as cows, moose, and camel are reported, they often are indirect traumas resulting from road traffic collisions. Snake attacks are well documented and common. However, this series of unique bush animal attacks describes the initial and surgical management of human injuries in the resource-limited setting of the developing world. Conclusion Animal attacks are common throughout the world, but their pattern may vary in Africa throughout jungle and bush environmental settings. It is

  12. Identifying Vulnerable Nodes of Complex Networks in Cascading Failures Induced by Node-Based Attacks

    Directory of Open Access Journals (Sweden)

    Shudong Li

    2013-01-01

    Full Text Available In the research on network security, distinguishing the vulnerable components of networks is very important for protecting infrastructures systems. Here, we probe how to identify the vulnerable nodes of complex networks in cascading failures, which was ignored before. Concerned with random attack (RA and highest load attack (HL on nodes, we model cascading dynamics of complex networks. Then, we introduce four kinds of weighting methods to characterize the nodes of networks including Barabási-Albert scale-free networks (SF, Watts-Strogatz small-world networks (WS, Erdos-Renyi random networks (ER, and two real-world networks. The simulations show that, for SF networks under HL attack, the nodes with small value of the fourth kind of weight are the most vulnerable and the ones with small value of the third weight are also vulnerable. Also, the real-world autonomous system with power-law distribution verifies these findings. Moreover, for WS and ER networks under both RA and HL attack, when the nodes have low tolerant ability, the ones with small value of the fourth kind of weight are more vulnerable and also the ones with high degree are easier to break down. The results give us important theoretical basis for digging the potential safety loophole and making protection strategy.

  13. Free radical attack on membrane lipid and antioxidant vitamins in the course of pre-eclamptic pregnancy.

    Science.gov (United States)

    Atiba, Adeniran S; Abbiyesuku, Fayeofori M; 'Niran-atiba, Temitope A; Oparinde, Dolapo P; Ajose, Olabamiji A; Akindele, Rasaq A

    2014-01-01

    Despite the volume of knowledge and daily reports on pre-eclampsia, its pathogenesis is still yet to be ascertained. Oxidative stress (oxidant (free radical) in excess of antioxidant) injury is one of the recently suggested pathogenetic mechanisms. This study, however, was designed to determine second and third trimesters of plasma malondialdehyde (product of free radical attack on membrane lipid) and vitamins C and E in pre-eclamptic Nigerian women. A Total of 100 subjects, each for pre-eclamptic, apparently normal and non-pregnant women qualified for the study. Venous blood samples were taken in the second and third trimesters of pregnancy and at the point of contact for non-pregnant women. Variables were analyzed using SPSS version 16, taking level of significance to be 0.05. Plasma malondialdehyde in the third trimester of normal pregnancy (2.03±0.71µmol/l) was found to be significantly higher than the one in the second trimester (1.65±0.62µmol/l) (pvitamin C values for subjects with normal pregnancy were similar in the second and third trimesters (38.25±19.66 vs. 38.66±19.40; p=0.882). For subjects with pre-eclampsia, the mean Vit C values were also similar in the 2(nd) and 3(rd) trimesters (35.05±18.37 vs. 37.20±24.44µmol/l; p=0.175). Mean vitamin E values in the second and third trimesters were also similar for subjects with normal pregnancy (28.62±13.85 vs. 28.50±13.35µmol/l; p=0.950). A similar finding was observed in pre-eclamptic subjects (25.09±12.79 vs. 28.00±14.83µmol/l; p=0.067). There was an increased product of membrane lipid attack (malondialdehyde) with no change in plasma levels of vitamins C and E as pregnancy advances into the third trimester of both normal and pre-eclamptic pregnancies. Antioxidant vitamins may not be useful in stopping the progression of free radical attack on membrane lipid to control pre-eclampsia.

  14. Effect of UV-irradiation on DNA-membrane complex of Bacillus subtilis

    International Nuclear Information System (INIS)

    Chefranova, O.A.; Gaziev, A.I.

    1979-01-01

    The UV radiation effect on DNA membrane complex of Bacillus subtilis has been studied. Increase of DNA content in the DNA membrane complex in two strains of 168 and recA - and its decrease in the polA - strain are shown. The above effect in the first two stamms is suppressed with caffeine and correlates with the change in protein content in the DNA membrane complex, determined by a radioactive label, but not lipids in other words, fixation of DNA and membrane goes through proteins. Capability of DNA content increase in the DNA membrane complex after UV irradiation and subsequent bacteria incubation in a total medium correlates with the relative sensitivity of stamm UV sensitivity. It is suggested, that the reparation synthesis goes in cells on the membrane and that binding of DNA and the membrane is necessary for the normal DNA reparation process

  15. The organization of LH2 complexes in membranes from Rhodobacter sphaeroides.

    Science.gov (United States)

    Olsen, John D; Tucker, Jaimey D; Timney, John A; Qian, Pu; Vassilev, Cvetelin; Hunter, C Neil

    2008-11-07

    The mapping of the photosynthetic membrane of Rhodobacter sphaeroides by atomic force microscopy (AFM) revealed a unique organization of arrays of dimeric reaction center-light harvesting I-PufX (RC-LH1-PufX) core complexes surrounded and interconnected by light-harvesting LH2 complexes (Bahatyrova, S., Frese, R. N., Siebert, C. A., Olsen, J. D., van der Werf, K. O., van Grondelle, R., Niederman, R. A., Bullough, P. A., Otto, C., and Hunter, C. N. (2004) Nature 430, 1058-1062). However, membrane regions consisting solely of LH2 complexes were under-represented in these images because these small, highly curved areas of membrane rendered them difficult to image even using gentle tapping mode AFM and impossible with contact mode AFM. We report AFM imaging of membranes prepared from a mutant of R. sphaeroides, DPF2G, that synthesizes only the LH2 complexes, which assembles spherical intracytoplasmic membrane vesicles of approximately 53 nm diameter in vivo. By opening these vesicles and adsorbing them onto mica to form small, LH2-only membranes for the first time. The transition from highly curved vesicle to the planar sheet is accompanied by a change in the packing of the LH2 complexes such that approximately half of the complexes are raised off the mica surface by approximately 1 nm relative to the rest. This vertical displacement produces a very regular corrugated appearance of the planar membrane sheets. Analysis of the topographs was used to measure the distances and angles between the complexes. These data are used to model the organization of LH2 complexes in the original, curved membrane. The implications of this architecture for the light harvesting function and diffusion of quinones in native membranes of R. sphaeroides are discussed.

  16. The role of complement receptors type 1 (CR1, CD35) and 2 (CR2, CD21) in promoting C3 fragment deposition and membrane attack complex formation on normal peripheral human B cells

    DEFF Research Database (Denmark)

    Nielsen, Claus Henrik; Pedersen, Morten Løbner; Marquart, Hanne Vibeke Hansen

    2002-01-01

    Normal human B lymphocytes are known to activate the alternative pathway (AP) of complement, leading to C3-fragment deposition and membrane attack complex (MAC) formation. The process is mediated via complement receptor type 2 (CR2, CD21), with complement receptor type 1 (CR1, CD35) playing...... a subsidiary role. In this study, we examine the relative contributions of CR1 and CR2 to the deposition of C3 fragments and MAC on B lymphocytes under circumstances where all complement pathways are operational. C3-fragment deposition and MAC formation were assessed on human peripheral B lymphocytes...... in the presence of 30% autologous serum. Blocking the CR2 ligand-binding site with monoclonal antibody (mAb) FE8 resulted in significant reduction (37.9+/-11.9%) in C3-fragment deposition, whereas MAC formation was only marginally affected (12.1+/-22.2% reduction). Blocking the CR1 binding-site resulted...

  17. Managing Complex Battlespace Environments Using Attack the Network Methodologies

    DEFF Research Database (Denmark)

    Mitchell, Dr. William L.

    This paper examines the last 8 years of development and application of Attack the Network (AtN) intelligence methodologies for creating shared situational understanding of complex battlespace environment and the development of deliberate targeting frameworks. It will present a short history...... of their development, how they are integrated into operational planning through strategies of deliberate targeting for modern operations. The paper will draw experience and case studies from Iraq, Syria, and Afghanistan and will offer some lessons learned as well as insight into the future of these methodologies....... Including their possible application on a national security level for managing longer strategic endeavors....

  18. Chemical degradation mechanisms of membranes for alkaline membrane fuel cells

    Energy Technology Data Exchange (ETDEWEB)

    Choe, Yoong-Kee [National Institute of Advanced Industrial Science and Technology, Umezono 1-1-1, Tsukuba (Japan); Henson, Neil J.; Kim, Yu Seung [Los Alamos National Laboratory, Los Alamos, NM (United States)

    2015-12-31

    Chemical degradation mechanisms of membranes for alkaline membrane fuel cells have been investigated using density functional theory (DFT). We have elucidated that the aryl-ether moiety of membranes is one of the weakest site against attack of hydroxide ions. The results of DFT calculations for hydroxide initiated aryl-ether cleavage indicated that the aryl-ether cleavage occurred prior to degradation of cationic functional group. Such a weak nature of the aryl-ether group arises from the electron deficiency of the aryl group as well as the low bond dissociation energy. The DFT results suggests that removal of the aryl-ether group in the membrane should enhance the stability of membranes under alkaline conditions. In fact, an ether fee poly(phenylene) membrane exhibits excellent stability against the attack from hydroxide ions.

  19. Dissociation and purification of the endogenous membrane-bound Vo complex from Pichia pastoris.

    Science.gov (United States)

    Li, Sumei; Hong, Tao; Wang, Kun; Lu, Yinghong; Zhou, Min

    2017-10-01

    Most proteins occur and function in complexes rather than as isolated entities in membranes. In most cases macromolecules with multiple subunits are purified from endogenous sources. In this study, an endogenous membrane-protein complex was obtained from Pichia pastoris, which can be grown at high densities to significantly improve the membrane protein yield. We successfully isolated the membrane-bound Vo complex of V-ATPase from P. pastoris using a fusion FLAG tag attached to the C-terminus of subunit a to generate the vph-tag strain, which was used for dissociation and purification. After FLAG affinity and size exclusion chromatography purification, the production quantity and purity of the membrane-bound Vo complex was 20 μg l -1 and >98%, respectively. The subunits of the endogenous membrane-bound Vo complex observed in P. pastoris were similar to those obtained from S. cerevisiae, as demonstrated by liquid chromatography-tandem mass spectrometry (LC-MS-MS). Therefore, successful dissociation and purification of the membrane-bound Vo complex at a high purity and sufficient quantity was achieved via a rapid and simple procedure that can be used to obtain the endogenous membrane-protein complexes from P. pastoris. Copyright © 2017 Elsevier Inc. All rights reserved.

  20. Assembly factors for the membrane arm of human complex I.

    Science.gov (United States)

    Andrews, Byron; Carroll, Joe; Ding, Shujing; Fearnley, Ian M; Walker, John E

    2013-11-19

    Mitochondrial respiratory complex I is a product of both the nuclear and mitochondrial genomes. The integration of seven subunits encoded in mitochondrial DNA into the inner membrane, their association with 14 nuclear-encoded membrane subunits, the construction of the extrinsic arm from 23 additional nuclear-encoded proteins, iron-sulfur clusters, and flavin mononucleotide cofactor require the participation of assembly factors. Some are intrinsic to the complex, whereas others participate transiently. The suppression of the expression of the NDUFA11 subunit of complex I disrupted the assembly of the complex, and subcomplexes with masses of 550 and 815 kDa accumulated. Eight of the known extrinsic assembly factors plus a hydrophobic protein, C3orf1, were associated with the subcomplexes. The characteristics of C3orf1, of another assembly factor, TMEM126B, and of NDUFA11 suggest that they all participate in constructing the membrane arm of complex I.

  1. Phosphate barrier on pore-filled cation-exchange membrane for blocking complexing ions in presence of non-complexing ions

    Science.gov (United States)

    Chavan, Vivek; Agarwal, Chhavi; Shinde, Rakesh N.

    2018-06-01

    In present work, an approach has been used to form a phosphate groups bearing surface barrier on a cation-exchange membrane (CEM). Using optimized conditions, the phosphate bearing monomer bis[2-(methacryloyloxy)ethyl] phosphate has been grafted on the surface of the host poly(ethersulfone) membranes using UV light induced polymerization. The detailed characterizations have shown that less than a micron layer of phosphate barrier is formed without disturbing the original microporous structure of the host membrane. The pores of thus formed membrane have been blocked by cationic-gel formed by in situ UV-initiator induced polymerization of 2-acrylamido-2-methyl-1-propane sulphonic acid along with crosslinker ethylene glycol dimethacrylate in the pores of the membrane. UV-initiator is required for pore-filling as UV light would not penetrate the interior matrix of the membrane. The phosphate functionalized barrier membrane has been examined for permselectivity using a mixture of representative complexing Am3+ ions and non-complexing Cs+ ions. This experiment has demonstrated that complex forming Am3+ ions are blocked by phosphate barrier layer while non-complexing Cs+ ions are allowed to pass through the channels formed by the crosslinked cationic gel.

  2. A Framework For Analyzing And Mitigating The Vulnerabilities Of Complex Systems Via Attack And Protection Trees

    National Research Council Canada - National Science Library

    Edge, Kenneth S

    2007-01-01

    .... In addition to developing protection trees, this research improves the existing concept of attack trees and develops rule sets for the manipulation of metrics used in the security of complex systems...

  3. Transforming Graphical System Models to Graphical Attack Models

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2016-01-01

    Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations...... approach to transforming graphical system models to graphical attack models in the form of attack trees. Based on an asset in the model, our transformations result in an attack tree that represents attacks by all possible actors in the model, after which the actor in question has obtained the asset....

  4. Abstraction of methyl from neutral Fischer-type carbene complexes: A new site for nucleophilic attack

    Energy Technology Data Exchange (ETDEWEB)

    Toomey, L.M.; Atwood, J.D. [State Univ. of New York, Buffalo, NY (United States)

    1997-02-04

    Reactions of Fischer-type carbene complexes, M(CO){sub 5}(C(OMe)pH) (M = Cr, W), with metal carbonyl anions (M`{sup -} = CpFe(CO){sub 2}{sup -@}, Re(CO){sub 5}{sup -}, Mn(CO){sub 4}PPh{sub 3}{sup -}, Co(CO){sub 3}PPh{sub 3}{sup -}, Cp{sup *}Cr(CO){sub 3}{sup -}, CpMo(CO){sub 3}{sup -}) result in demethylation of the carbene complexes. The products are M(CO){sub 5}C(O)Ph{sup -} and M`-Me, characterized by infrared and NMR spectroscopy. A slower rate for reaction with W(CO){sub 5}(C(OEt)Ph) in comparison to the methyl analogue is consistent with nucleophilic attack of the metal carbonyl anion on the methyl of the methoxy group of the carbene. This is a new type of nucleophilic attack of a Fischer-type carbene. 22 refs., 1 fig., 1 tab.

  5. Plants under dual attack

    NARCIS (Netherlands)

    Ponzio, C.A.M.

    2016-01-01

    Though immobile, plants are members of complex environments, and are under constant threat from a wide range of attackers, which includes organisms such as insect herbivores or plant pathogens. Plants have developed sophisticated defenses against these attackers, and include chemical responses

  6. Lateral release of proteins from the TOM complex into the outer membrane of mitochondria.

    Science.gov (United States)

    Harner, Max; Neupert, Walter; Deponte, Marcel

    2011-07-15

    The TOM complex of the outer membrane of mitochondria is the entry gate for the vast majority of precursor proteins that are imported into the mitochondria. It is made up by receptors and a protein conducting channel. Although precursor proteins of all subcompartments of mitochondria use the TOM complex, it is not known whether its channel can only mediate passage across the outer membrane or also lateral release into the outer membrane. To study this, we have generated fusion proteins of GFP and Tim23 which are inserted into the inner membrane and, at the same time, are spanning either the TOM complex or are integrated into the outer membrane. Our results demonstrate that the TOM complex, depending on sequence determinants in the precursors, can act both as a protein conducting pore and as an insertase mediating lateral release into the outer membrane.

  7. Robustness of Dengue Complex Network under Targeted versus Random Attack

    Directory of Open Access Journals (Sweden)

    Hafiz Abid Mahmood Malik

    2017-01-01

    Full Text Available Dengue virus infection is one of those epidemic diseases that require much consideration in order to save the humankind from its unsafe impacts. According to the World Health Organization (WHO, 3.6 billion individuals are at risk because of the dengue virus sickness. Researchers are striving to comprehend the dengue threat. This study is a little commitment to those endeavors. To observe the robustness of the dengue network, we uprooted the links between nodes randomly and targeted by utilizing different centrality measures. The outcomes demonstrated that 5% targeted attack is equivalent to the result of 65% random assault, which showed the topology of this complex network validated a scale-free network instead of random network. Four centrality measures (Degree, Closeness, Betweenness, and Eigenvector have been ascertained to look for focal hubs. It has been observed through the results in this study that robustness of a node and links depends on topology of the network. The dengue epidemic network presented robust behaviour under random attack, and this network turned out to be more vulnerable when the hubs of higher degree have higher probability to fail. Moreover, representation of this network has been projected, and hub removal impact has been shown on the real map of Gombak (Malaysia.

  8. High-resolution diffraction from crystals of a membrane-protein complex: bacterial outer membrane protein OmpC complexed with the antibacterial eukaryotic protein lactoferrin

    International Nuclear Information System (INIS)

    Sundara Baalaji, N.; Acharya, K. Ravi; Singh, T. P.; Krishnaswamy, S.

    2005-01-01

    Crystals of the complex formed between the bacterial membrane protein OmpC and the antibacterial protein lactoferrin suitable for high-resolution structure determination have been obtained. The crystals belong to the hexagonal space group P6, with unit-cell parameters a = b = 116.3, c = 152.4 Å. Crystals of the complex formed between the outer membrane protein OmpC from Escherichia coli and the eukaryotic antibacterial protein lactoferrin from Camelus dromedarius (camel) have been obtained using a detergent environment. Initial data processing suggests that the crystals belong to the hexagonal space group P6, with unit-cell parameters a = b = 116.3, c = 152.4 Å, α = β = 90, γ = 120°. This indicated a Matthews coefficient (V M ) of 3.3 Å 3 Da −1 , corresponding to a possible molecular complex involving four molecules of lactoferrin and two porin trimers in the unit cell (4832 amino acids; 533.8 kDa) with 63% solvent content. A complete set of diffraction data was collected to 3 Å resolution at 100 K. Structure determination by molecular replacement is in progress. Structural study of this first surface-exposed membrane-protein complex with an antibacterial protein will provide insights into the mechanism of action of OmpC as well as lactoferrin

  9. Reconstituted TOM core complex and Tim9/Tim10 complex of mitochondria are sufficient for translocation of the ADP/ATP carrier across membranes.

    Science.gov (United States)

    Vasiljev, Andreja; Ahting, Uwe; Nargang, Frank E; Go, Nancy E; Habib, Shukry J; Kozany, Christian; Panneels, Valérie; Sinning, Irmgard; Prokisch, Holger; Neupert, Walter; Nussberger, Stephan; Rapaport, Doron

    2004-03-01

    Precursor proteins of the solute carrier family and of channel forming Tim components are imported into mitochondria in two main steps. First, they are translocated through the TOM complex in the outer membrane, a process assisted by the Tim9/Tim10 complex. They are passed on to the TIM22 complex, which facilitates their insertion into the inner membrane. In the present study, we have analyzed the function of the Tim9/Tim10 complex in the translocation of substrates across the outer membrane of mitochondria. The purified TOM core complex was reconstituted into lipid vesicles in which purified Tim9/Tim10 complex was entrapped. The precursor of the ADP/ATP carrier (AAC) was found to be translocated across the membrane of such lipid vesicles. Thus, these components are sufficient for translocation of AAC precursor across the outer membrane. Peptide libraries covering various substrate proteins were used to identify segments that are bound by Tim9/Tim10 complex upon translocation through the TOM complex. The patterns of binding sites on the substrate proteins suggest a mechanism by which portions of membrane-spanning segments together with flanking hydrophilic segments are recognized and bound by the Tim9/Tim10 complex as they emerge from the TOM complex into the intermembrane space.

  10. Improved Impossible Differential Attacks on Large-Block Rijndael

    DEFF Research Database (Denmark)

    Wang, Qingju; Gu, Dawu; Rijmen, Vincent

    2012-01-01

    . The improvement can lead to 10-round attack on Rijndael-256 as well. With 2198.1 chosen plaintexts, an attack is demonstrated on 9-round Rijndael-224 with 2 195.2 encryptions and 2140.4 bytes memory. Increasing the data complexity to 2216 plaintexts, the time complexity can be reduced to 2130 encryptions...... and the memory requirements to 2 93.6 bytes. For 9-round Rijndael-256, we provide an attack requiring 2229.3 chosen plaintexts, 2194 encryptions, and 2 139.6 bytes memory. Alternatively, with 2245.3 plaintexts, an attack with a reduced time of 2127.1 encryptions and a memory complexity of 290.9 bytes can...... be mounted. With 2244.2 chosen plaintexts, we can attack 10-round Rijndael-256 with 2253.9 encryptions and 2186.8 bytes of memory....

  11. Integrating complex functions: coordination of nuclear pore complex assembly and membrane expansion of the nuclear envelope requires a family of integral membrane proteins.

    Science.gov (United States)

    Schneiter, Roger; Cole, Charles N

    2010-01-01

    The nuclear envelope harbors numerous large proteinaceous channels, the nuclear pore complexes (NPCs), through which macromolecular exchange between the cytosol and the nucleoplasm occurs. This double-membrane nuclear envelope is continuous with the endoplasmic reticulum and thus functionally connected to such diverse processes as vesicular transport, protein maturation and lipid synthesis. Recent results obtained from studies in Saccharomyces cerevisiae indicate that assembly of the nuclear pore complex is functionally dependent upon maintenance of lipid homeostasis of the ER membrane. Previous work from one of our laboratories has revealed that an integral membrane protein Apq12 is important for the assembly of functional nuclear pores. Cells lacking APQ12 are viable but cannot grow at low temperatures, have aberrant NPCs and a defect in mRNA export. Remarkably, these defects in NPC assembly can be overcome by supplementing cells with a membrane fluidizing agent, benzyl alcohol, suggesting that Apq12 impacts the flexibility of the nuclear membrane, possibly by adjusting its lipid composition when cells are shifted to a reduced temperature. Our new study now expands these findings and reveals that an essential membrane protein, Brr6, shares at least partially overlapping functions with Apq12 and is also required for assembly of functional NPCs. A third nuclear envelope membrane protein, Brl1, is related to Brr6, and is also required for NPC assembly. Because maintenance of membrane homeostasis is essential for cellular survival, the fact that these three proteins are conserved in fungi that undergo closed mitoses, but are not found in metazoans or plants, may indicate that their functions are performed by proteins unrelated at the primary sequence level to Brr6, Brl1 and Apq12 in cells that disassemble their nuclear envelopes during mitosis.

  12. Algebraic Side-Channel Attack on Twofish

    Directory of Open Access Journals (Sweden)

    Chujiao Ma

    2017-05-01

    Full Text Available While algebraic side-channel attack (ASCA has been successful in breaking simple cryptographic algorithms, it has never been done on larger or more complex algorithms such as Twofish. Compared to other algorithms that ASCA has been used on, Twofish is more difficult to attack due to the key-dependent S-boxes as well as the complex key scheduling. In this paper, we propose the first algebraic side-channel attack on Twofish, and examine the importance of side-channel information in getting past the key-dependent S-boxes and the complex key scheduling. The cryptographic algorithm and side-channel information are both expressed as boolean equations and a SAT solver is used to recover the key. While algebraic attack by itself is not sufficient to break the algorithm, with the help of side-channel information such as Hamming weights, we are able to correctly solve for 96 bits of the 128 bits key in under 2 hours with known plaintext/ciphertext.

  13. Study on low level radioactive wastewater treatment by inorganic membrane permeation combined with complexation

    International Nuclear Information System (INIS)

    Li Junfeng; Wang Jianlong; Bai Qinzhong

    2007-01-01

    Inorganic membranes exhibit greater mechanical durability in some operations than polymeric membranes. They do not suffer from the performance degradation that was resulted from compaction of the membrane structure under pressure or ageing. Membrane permeation combined with complexation was tested for radioactive wastes processing purpose. Sodium poly-acrylic acid was selected as the complexing agent, the efficiency of inorganic membrane with cut-off 1kD, 3kD, 8kD assisted by sodium poly-acrylic acid of different molecular weight were compared. The removal efficiencies of nuclides such as strontium, cesium and cobalt by were compared. The flux and retention factors of different membrane system were compared. The impacts of complexation agent concentration on permeate flux retention factors were studied. The long term behaviours of the membrane system were also studied. Diatomite filter was selected as the pretreatment method, and the efficiency of diatomite filter for pretreatment was investigated also. (author)

  14. Energy transfer and clustering of photosynthetic light-harvesting complexes in reconstituted lipid membranes

    International Nuclear Information System (INIS)

    Dewa, Takehisa; Sumino, Ayumi; Watanabe, Natsuko; Noji, Tomoyasu; Nango, Mamoru

    2013-01-01

    Highlights: ► Photosynthetic light-harvesting complexes were reconstituted into lipid membranes. ► Energy transfers between light-harvesting complexes were examined. ► Atomic force microscopy indicated cluster formation of light-harvesting complexes. ► Efficient energy transfer was observed for the clustered complexes in the membranes. - Abstract: In purple photosynthetic bacteria, light-harvesting complex 2 (LH2) and light harvesting/reaction centre core complex (LH1-RC) play the key roles of capturing and transferring light energy and subsequent charge separation. These photosynthetic apparatuses form a supramolecular assembly; however, how the assembly influences the efficiency of energy conversion is not yet clear. We addressed this issue by evaluating the energy transfer in reconstituted photosynthetic protein complexes LH2 and LH1-RC and studying the structures and the membrane environment of the LH2/LH1-RC assemblies, which had been embedded into various lipid bilayers. Thus, LH2 and LH1-RC from Rhodopseudomonas palustris 2.1.6 were reconstituted in phosphatidylglycerol (PG), phosphatidylcholine (PC), and phosphatidylethanolamine (PE)/PG/cardiolipin (CL). Efficient energy transfer from LH2 to LH1-RC was observed in the PC and PE/PG/CL membranes. Atomic force microscopy revealed that LH2 and LH1-RC were heterogeneously distributed to form clusters in the PC and PE/PG/CL membranes. The results indicated that the phospholipid species influenced the cluster formation of LH2 and LH1-RC as well as the energy transfer efficiency

  15. Energy transfer and clustering of photosynthetic light-harvesting complexes in reconstituted lipid membranes

    Energy Technology Data Exchange (ETDEWEB)

    Dewa, Takehisa, E-mail: takedewa@nitech.ac.jp [Department of Frontier Materials, Graduate School of Engineering, Nagoya Institute of Technology, Gokiso-cho, Showa-ku, Nagoya 466-8555 (Japan); Japan Science and Technology, PRESTO, 4-1-8 Honcho Kawaguchi, Saitama 332-0012 (Japan); Sumino, Ayumi; Watanabe, Natsuko; Noji, Tomoyasu [Department of Frontier Materials, Graduate School of Engineering, Nagoya Institute of Technology, Gokiso-cho, Showa-ku, Nagoya 466-8555 (Japan); Nango, Mamoru, E-mail: nango@nitech.ac.jp [Department of Frontier Materials, Graduate School of Engineering, Nagoya Institute of Technology, Gokiso-cho, Showa-ku, Nagoya 466-8555 (Japan)

    2013-06-20

    Highlights: ► Photosynthetic light-harvesting complexes were reconstituted into lipid membranes. ► Energy transfers between light-harvesting complexes were examined. ► Atomic force microscopy indicated cluster formation of light-harvesting complexes. ► Efficient energy transfer was observed for the clustered complexes in the membranes. - Abstract: In purple photosynthetic bacteria, light-harvesting complex 2 (LH2) and light harvesting/reaction centre core complex (LH1-RC) play the key roles of capturing and transferring light energy and subsequent charge separation. These photosynthetic apparatuses form a supramolecular assembly; however, how the assembly influences the efficiency of energy conversion is not yet clear. We addressed this issue by evaluating the energy transfer in reconstituted photosynthetic protein complexes LH2 and LH1-RC and studying the structures and the membrane environment of the LH2/LH1-RC assemblies, which had been embedded into various lipid bilayers. Thus, LH2 and LH1-RC from Rhodopseudomonas palustris 2.1.6 were reconstituted in phosphatidylglycerol (PG), phosphatidylcholine (PC), and phosphatidylethanolamine (PE)/PG/cardiolipin (CL). Efficient energy transfer from LH2 to LH1-RC was observed in the PC and PE/PG/CL membranes. Atomic force microscopy revealed that LH2 and LH1-RC were heterogeneously distributed to form clusters in the PC and PE/PG/CL membranes. The results indicated that the phospholipid species influenced the cluster formation of LH2 and LH1-RC as well as the energy transfer efficiency.

  16. GraDeR: Membrane Protein Complex Preparation for Single-Particle Cryo-EM.

    Science.gov (United States)

    Hauer, Florian; Gerle, Christoph; Fischer, Niels; Oshima, Atsunori; Shinzawa-Itoh, Kyoko; Shimada, Satoru; Yokoyama, Ken; Fujiyoshi, Yoshinori; Stark, Holger

    2015-09-01

    We developed a method, named GraDeR, which substantially improves the preparation of membrane protein complexes for structure determination by single-particle cryo-electron microscopy (cryo-EM). In GraDeR, glycerol gradient centrifugation is used for the mild removal of free detergent monomers and micelles from lauryl maltose-neopentyl glycol detergent stabilized membrane complexes, resulting in monodisperse and stable complexes to which standard processes for water-soluble complexes can be applied. We demonstrate the applicability of the method on three different membrane complexes, including the mammalian FoF1 ATP synthase. For this highly dynamic and fragile rotary motor, we show that GraDeR allows visualizing the asymmetry of the F1 domain, which matches the ground state structure of the isolated domain. Therefore, the present cryo-EM structure of FoF1 ATP synthase provides direct structural evidence for Boyer's binding change mechanism in the context of the intact enzyme. Copyright © 2015 Elsevier Ltd. All rights reserved.

  17. A tethering complex drives the terminal stage of SNARE-dependent membrane fusion

    Science.gov (United States)

    D'Agostino, Massimo; Risselada, Herre Jelger; Lürick, Anna; Ungermann, Christian; Mayer, Andreas

    2017-11-01

    Membrane fusion in eukaryotic cells mediates the biogenesis of organelles, vesicular traffic between them, and exo- and endocytosis of important signalling molecules, such as hormones and neurotransmitters. Distinct tasks in intracellular membrane fusion have been assigned to conserved protein systems. Tethering proteins mediate the initial recognition and attachment of membranes, whereas SNARE (soluble N-ethylmaleimide-sensitive factor attachment protein receptor) protein complexes are considered as the core fusion engine. SNARE complexes provide mechanical energy to distort membranes and drive them through a hemifusion intermediate towards the formation of a fusion pore. This last step is highly energy-demanding. Here we combine the in vivo and in vitro fusion of yeast vacuoles with molecular simulations to show that tethering proteins are critical for overcoming the final energy barrier to fusion pore formation. SNAREs alone drive vacuoles only into the hemifused state. Tethering proteins greatly increase the volume of SNARE complexes and deform the site of hemifusion, which lowers the energy barrier for pore opening and provides the driving force. Thereby, tethering proteins assume a crucial mechanical role in the terminal stage of membrane fusion that is likely to be conserved at multiple steps of vesicular traffic. We therefore propose that SNAREs and tethering proteins should be considered as a single, non-dissociable device that drives fusion. The core fusion machinery may then be larger and more complex than previously thought.

  18. Transforming Graphical System Models To Graphical Attack Models

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Mauw, S.; Kordy, B.

    2015-01-01

    Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations that

  19. Surface and permeability properties of membranes from polyelectrolyte complexes and polyelectrolyte surfactant complexes

    Czech Academy of Sciences Publication Activity Database

    Schwarz, H. H.; Lukáš, Jaromír; Richau, K.

    2003-01-01

    Roč. 218, 1-2 (2003), s. 1-9 ISSN 0376-7388 R&D Projects: GA AV ČR KSK4050111 Keywords : polyelectrolyte complex membranes * pervaporation * dehydration of organics Subject RIV: CD - Macromolecular Chemistry Impact factor: 2.081, year: 2003

  20. Robustness of non-interdependent and interdependent networks against dependent and adaptive attacks

    Science.gov (United States)

    Tyra, Adam; Li, Jingtao; Shang, Yilun; Jiang, Shuo; Zhao, Yanjun; Xu, Shouhuai

    2017-09-01

    Robustness of complex networks has been extensively studied via the notion of site percolation, which typically models independent and non-adaptive attacks (or disruptions). However, real-life attacks are often dependent and/or adaptive. This motivates us to characterize the robustness of complex networks, including non-interdependent and interdependent ones, against dependent and adaptive attacks. For this purpose, dependent attacks are accommodated by L-hop percolation where the nodes within some L-hop (L ≥ 0) distance of a chosen node are all deleted during one attack (with L = 0 degenerating to site percolation). Whereas, adaptive attacks are launched by attackers who can make node-selection decisions based on the network state in the beginning of each attack. The resulting characterization enriches the body of knowledge with new insights, such as: (i) the Achilles' Heel phenomenon is only valid for independent attacks, but not for dependent attacks; (ii) powerful attack strategies (e.g., targeted attacks and dependent attacks, dependent attacks and adaptive attacks) are not compatible and cannot help the attacker when used collectively. Our results shed some light on the design of robust complex networks.

  1. Complexity attack resistant flow lookup achemes for IPv6: a measurement based comparison

    OpenAIRE

    Malone, David; Tobin, R. Joshua

    2008-01-01

    In this paper we look at the problem of choosing a good flow state lookup scheme for IPv6 firewalls. We want to choose a scheme which is fast when dealing with typical traffic, but whose performance will not degrade unnecessarily when subject to a complexity attack. We demonstrate the existing problem and, using captured traffic, assess a number of replacement schemes that are hash and tree based. Our aim is to improve FreeBSD’s ipfw firewall, and so finally we implement the most pro...

  2. Practical Attacks on AES-like Cryptographic Hash Functions

    DEFF Research Database (Denmark)

    Kölbl, Stefan; Rechberger, Christian

    2015-01-01

    to drastically reduce the complexity of attacks to very practical values for reduced-round versions. Furthermore, we describe new and practical attacks on Whirlpool and the recently proposed GOST R hash function with one or more of the following properties: more rounds, less time/memory complexity, and more...

  3. Assembly and structural organization of pigment-protein complexes in membranes of Rhodopseudomonas sphaeroides

    International Nuclear Information System (INIS)

    Hunter, C.N.; Pennoyer, J.D.; Niederman, R.A.

    1982-01-01

    The B875 and B800-850 light-harvesting pigment-protein complexes of Rhodopseudomonas sphaeroides are characterized further by lithium dodecyl sulfate/polyacrylamide gel electrophoresis at 4 degrees C. Bacteriochlorophyll a was shown in reconstruction studies to remain complexed with its respective binding proteins during this procedure. From distributions in these gels, a quantitative description for the arrangement of the complexes is proposed. Assembly of the complexes was examined in delta-aminolevulinate-requiring mutant H-5 after a shift from high- to low-light intensity. After 10 h of delta-[ 3 H]aminolevulinate labeling, the specific radioactivity of bacteriochlorophyll in a fraction containing putative membrane invaginations reached the maximal level, while that of the mature photosynthetic membrane was at only one-third this level. This suggests that membrane invaginations are sites of preferential bacteriochlorophyll synthesis in which completed pigment-proteins exist transiently. Analysis of the 3 H distribution after electrophoretic separation further suggests that photosynthetic membranes grow mainly by addition of B800-850 to preformed membrane consisting largely of B875 and photochemical reaction centers. These results corroborate the above model for the structural organization of the light-harvesting system and indicate that the structurally and functionally discrete B800-850 pool is not completely assembled until all B875 sites for B800-850 interactions are occupied

  4. Intermolecular detergent-membrane protein noes for the characterization of the dynamics of membrane protein-detergent complexes.

    Science.gov (United States)

    Eichmann, Cédric; Orts, Julien; Tzitzilonis, Christos; Vögeli, Beat; Smrt, Sean; Lorieau, Justin; Riek, Roland

    2014-12-11

    The interaction between membrane proteins and lipids or lipid mimetics such as detergents is key for the three-dimensional structure and dynamics of membrane proteins. In NMR-based structural studies of membrane proteins, qualitative analysis of intermolecular nuclear Overhauser enhancements (NOEs) or paramagnetic resonance enhancement are used in general to identify the transmembrane segments of a membrane protein. Here, we employed a quantitative characterization of intermolecular NOEs between (1)H of the detergent and (1)H(N) of (2)H-perdeuterated, (15)N-labeled α-helical membrane protein-detergent complexes following the exact NOE (eNOE) approach. Structural considerations suggest that these intermolecular NOEs should show a helical-wheel-type behavior along a transmembrane helix or a membrane-attached helix within a membrane protein as experimentally demonstrated for the complete influenza hemagglutinin fusion domain HAfp23. The partial absence of such a NOE pattern along the amino acid sequence as shown for a truncated variant of HAfp23 and for the Escherichia coli inner membrane protein YidH indicates the presence of large tertiary structure fluctuations such as an opening between helices or the presence of large rotational dynamics of the helices. Detergent-protein NOEs thus appear to be a straightforward probe for a qualitative characterization of structural and dynamical properties of membrane proteins embedded in detergent micelles.

  5. Rising Trend: Complex and sophisticated attack methods

    Indian Academy of Sciences (India)

    Increased frequency and intensity of DoS/DDoS. Few Gbps is now normal; Anonymous VPNs being used; Botnets being used as a vehicle for launching DDoS attacks. Large scale booking of domain names. Hundred thousands of domains registered in short duration via few registrars; Single registrant; Most of the domains ...

  6. Situational awareness of a coordinated cyber attack

    Science.gov (United States)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  7. Using an ontology for network attack planning

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-09-01

    Full Text Available The modern complexity of network attacks and their counter-measures (cyber operations) requires detailed planning. This paper presents a Network Attack Planning ontology which is aimed at providing support for planning such network operations within...

  8. Geographical constraints to range-based attacks on links in complex networks

    International Nuclear Information System (INIS)

    Gong Baihua; Liu Jun; Huang Liang; Yang Kongqing; Yang Lei

    2008-01-01

    In this paper, we studied range-based attacks on links in geographically constrained scale-free networks and found that there is a continuous switching of roles of short- and long-range attacks on links when tuning the geographical constraint strength. Our results demonstrate that the geography has a significant impact on the network efficiency and security; thus one can adjust the geographical structure to optimize the robustness and the efficiency of the networks. We introduce a measurement of the impact of links on the efficiency of the network, and an effective attacking strategy is suggested

  9. Automated builder and database of protein/membrane complexes for molecular dynamics simulations.

    Directory of Open Access Journals (Sweden)

    Sunhwan Jo

    2007-09-01

    Full Text Available Molecular dynamics simulations of membrane proteins have provided deeper insights into their functions and interactions with surrounding environments at the atomic level. However, compared to solvation of globular proteins, building a realistic protein/membrane complex is still challenging and requires considerable experience with simulation software. Membrane Builder in the CHARMM-GUI website (http://www.charmm-gui.org helps users to build such a complex system using a web browser with a graphical user interface. Through a generalized and automated building process including system size determination as well as generation of lipid bilayer, pore water, bulk water, and ions, a realistic membrane system with virtually any kinds and shapes of membrane proteins can be generated in 5 minutes to 2 hours depending on the system size. Default values that were elaborated and tested extensively are given in each step to provide reasonable options and starting points for both non-expert and expert users. The efficacy of Membrane Builder is illustrated by its applications to 12 transmembrane and 3 interfacial membrane proteins, whose fully equilibrated systems with three different types of lipid molecules (DMPC, DPPC, and POPC and two types of system shapes (rectangular and hexagonal are freely available on the CHARMM-GUI website. One of the most significant advantages of using the web environment is that, if a problem is found, users can go back and re-generate the whole system again before quitting the browser. Therefore, Membrane Builder provides the intuitive and easy way to build and simulate the biologically important membrane system.

  10. Integrating cyber attacks within fault trees

    International Nuclear Information System (INIS)

    Nai Fovino, Igor; Masera, Marcelo; De Cian, Alessio

    2009-01-01

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  11. Integrating cyber attacks within fault trees

    Energy Technology Data Exchange (ETDEWEB)

    Nai Fovino, Igor [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy)], E-mail: igor.nai@jrc.it; Masera, Marcelo [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy); De Cian, Alessio [Department of Electrical Engineering, University di Genova, Genoa (Italy)

    2009-09-15

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  12. Resolving the paradox for protein aggregation diseases: NMR structure and dynamics of the membrane-embedded P56S-MSP causing ALS imply a common mechanism for aggregation-prone proteins to attack membranes [v2; ref status: indexed, http://f1000r.es/3zl

    Directory of Open Access Journals (Sweden)

    Haina Qin

    2014-07-01

    Full Text Available Paradoxically, aggregation of specific proteins is characteristic of many human diseases and aging, yet aggregates have increasingly been found to be unnecessary for initiating pathogenesis. Here we determined the NMR topology and dynamics of a helical mutant in a membrane environment transformed from the 125-residue cytosolic all-β MSP domain of vesicle-associated membrane protein-associated protein B (VAPB by the ALS-causing P56S mutation. Despite its low hydrophobicity, the P56S major sperm protein (MSP domain becomes largely embedded in the membrane environment with high backbone rigidity. Furthermore it is composed of five helices with amphiphilicity comparable to those of the partly-soluble membrane toxin mellitin and α-synuclein causing Parkinson's disease. Consequently, the mechanism underlying this chameleon transformation becomes clear: by disrupting the specific tertiary interaction network stabilizing the native all-β MSP fold to release previously-locked amphiphilic segments, the P56S mutation acts to convert the classic MSP fold into a membrane-active protein that is fundamentally indistinguishable from mellitin and α-synuclein which are disordered in aqueous solution but spontaneously partition into membrane interfaces driven by hydrogen-bond energetics gained from forming α-helix in the membrane environments. As segments with high amphiphilicity exist in all proteins, our study successfully resolves the paradox by deciphering that the proteins with a higher tendency to aggregate have a stronger potential to partition into membranes through the same mechanism as α-synuclein to initially attack membranes to trigger pathogenesis without needing aggregates. This might represent the common first step for various kinds of aggregated proteins to trigger familiar, sporadic and aging diseases. Therefore the homeostasis of aggregated proteins in vivo is the central factor responsible for a variety of human diseases including aging

  13. Modelling Social-Technical Attacks with Timed Automata

    DEFF Research Database (Denmark)

    David, Nicolas; David, Alexandre; Hansen, Rene Rydhof

    2015-01-01

    . In this paper we develop an approach towards modelling socio-technical systems in general and socio-technical attacks in particular, using timed automata and illustrate its application by a complex case study. Thanks to automated model checking and automata theory, we can automatically generate possible attacks...... in our model and perform analysis and simulation of both model and attack, revealing details about the specific interaction between attacker and victim. Using timed automata also allows for intuitive modelling of systems, in which quantities like time and cost can be easily added and analysed....

  14. Quantitative Verification and Synthesis of Attack-Defence Scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    2016-01-01

    analysis of quantitative properties of complex attack-defence scenarios, using an extension of attack-defence trees which models temporal ordering of actions and allows explicit dependencies in the strategies adopted by attackers and defenders. We adopt a game-theoretic approach, translating attack...... which guarantee or optimise some quantitative property, such as the probability of a successful attack, the expected cost incurred, or some multi-objective trade-off between the two. We implement our approach, building upon the PRISM-games model checker, and apply it to a case study of an RFID goods...

  15. The TIP30 protein complex, arachidonic acid and coenzyme A are required for vesicle membrane fusion.

    Directory of Open Access Journals (Sweden)

    Chengliang Zhang

    Full Text Available Efficient membrane fusion has been successfully mimicked in vitro using artificial membranes and a number of cellular proteins that are currently known to participate in membrane fusion. However, these proteins are not sufficient to promote efficient fusion between biological membranes, indicating that critical fusogenic factors remain unidentified. We have recently identified a TIP30 protein complex containing TIP30, acyl-CoA synthetase long-chain family member 4 (ACSL4 and Endophilin B1 (Endo B1 that promotes the fusion of endocytic vesicles with Rab5a vesicles, which transport endosomal acidification enzymes vacuolar (H⁺-ATPases (V-ATPases to the early endosomes in vivo. Here, we demonstrate that the TIP30 protein complex facilitates the fusion of endocytic vesicles with Rab5a vesicles in vitro. Fusion of the two vesicles also depends on arachidonic acid, coenzyme A and the synthesis of arachidonyl-CoA by ACSL4. Moreover, the TIP30 complex is able to transfer arachidonyl groups onto phosphatidic acid (PA, producing a new lipid species that is capable of inducing close contact between membranes. Together, our data suggest that the TIP30 complex facilitates biological membrane fusion through modification of PA on membranes.

  16. Binding of Signal Recognition Particle Gives Ribosome/Nascent Chain Complexes a Competitive Advantage in Endoplasmic Reticulum Membrane Interaction

    Science.gov (United States)

    Neuhof, Andrea; Rolls, Melissa M.; Jungnickel, Berit; Kalies, Kai-Uwe; Rapoport, Tom A.

    1998-01-01

    Most secretory and membrane proteins are sorted by signal sequences to the endoplasmic reticulum (ER) membrane early during their synthesis. Targeting of the ribosome-nascent chain complex (RNC) involves the binding of the signal sequence to the signal recognition particle (SRP), followed by an interaction of ribosome-bound SRP with the SRP receptor. However, ribosomes can also independently bind to the ER translocation channel formed by the Sec61p complex. To explain the specificity of membrane targeting, it has therefore been proposed that nascent polypeptide-associated complex functions as a cytosolic inhibitor of signal sequence- and SRP-independent ribosome binding to the ER membrane. We report here that SRP-independent binding of RNCs to the ER membrane can occur in the presence of all cytosolic factors, including nascent polypeptide-associated complex. Nontranslating ribosomes competitively inhibit SRP-independent membrane binding of RNCs but have no effect when SRP is bound to the RNCs. The protective effect of SRP against ribosome competition depends on a functional signal sequence in the nascent chain and is also observed with reconstituted proteoliposomes containing only the Sec61p complex and the SRP receptor. We conclude that cytosolic factors do not prevent the membrane binding of ribosomes. Instead, specific ribosome targeting to the Sec61p complex is provided by the binding of SRP to RNCs, followed by an interaction with the SRP receptor, which gives RNC–SRP complexes a selective advantage in membrane targeting over nontranslating ribosomes. PMID:9436994

  17. Heat-induced reorganization of the structure of photosystem II membranes: role of oxygen evolving complex.

    Science.gov (United States)

    Busheva, Mira; Tzonova, Iren; Stoitchkova, Katerina; Andreeva, Atanaska

    2012-12-05

    The sensitivity of the green plants' photosystem II (PSII) to high temperatures is investigated in PSII enriched membranes and in membranes, from which the oxygen evolving complex is removed. Using steady-state 77 K fluorescence and resonance Raman spectroscopy we analyze the interdependency between the temperature-driven changes in structure and energy distribution in the PSII supercomplex. The results show that the heat treatment induces different reduction of the 77 K fluorescence emission in both types of investigated membranes: (i) an additional considerable decrease of the overall fluorescence emission in Tris-washed membranes as compared to the native membranes; (ii) a transition point at 42°C(,) observed only in native membranes; (iii) a sharp reduction of the PSII core fluorescence in Tris-washed membranes at temperatures higher than 50°C; (iv) a 3 nm red-shift of F700 band's maximum in Tris-washed membranes already at 20°C and its further shift by 1 nm at temperature increase. Both treatments intensified their action by increasing the aggregation and dissociation of the peripheral light harvesting complexes. The oxygen-evolving complex, in addition to its main function to produce O(2), increases the thermal stability of PSII core by strengthening the connection between the core and the peripheral antenna proteins and by keeping their structural integrity. Copyright © 2012 Elsevier B.V. All rights reserved.

  18. Cholesterol depletion of enterocytes. Effect on the Golgi complex and apical membrane trafficking

    DEFF Research Database (Denmark)

    Hansen, Gert Helge; Niels-Christiansen, L L; Thorsen, Evy

    2000-01-01

    Intestinal brush border enzymes, including aminopeptidase N and sucrase-isomaltase, are associated with "rafts" (membrane microdomains rich in cholesterol and sphingoglycolipids). To assess the functional role of rafts in the present work, we studied the effect of cholesterol depletion on apical......, the rates of the Golgi-associated complex glycosylation and association with rafts of newly synthesized aminopeptidase N were reduced, and less of the enzyme had reached the brush border membrane after 2 h of labeling. In contrast, the basolateral Na(+)/K(+)-ATPase was neither missorted nor raft......-associated. Our results implicate the Golgi complex/trans-Golgi network in raft formation and suggest a close relationship between this event and apical membrane trafficking....

  19. Complexation-Induced Phase Separation: Preparation of Metal-Rich Polymeric Membranes

    KAUST Repository

    Villalobos, Luis Francisco

    2017-01-01

    The majority of state-of-the-art polymeric membranes for industrial or medical applications are fabricated by phase inversion. Complexation induced phase separation (CIPS)—a surprising variation of this well-known process—allows direct fabrication

  20. Performance Analysis with Network-Enhanced Complexities: On Fading Measurements, Event-Triggered Mechanisms, and Cyber Attacks

    Directory of Open Access Journals (Sweden)

    Derui Ding

    2014-01-01

    Full Text Available Nowadays, the real-world systems are usually subject to various complexities such as parameter uncertainties, time-delays, and nonlinear disturbances. For networked systems, especially large-scale systems such as multiagent systems and systems over sensor networks, the complexities are inevitably enhanced in terms of their degrees or intensities because of the usage of the communication networks. Therefore, it would be interesting to (1 examine how this kind of network-enhanced complexities affects the control or filtering performance; and (2 develop some suitable approaches for controller/filter design problems. In this paper, we aim to survey some recent advances on the performance analysis and synthesis with three sorts of fashionable network-enhanced complexities, namely, fading measurements, event-triggered mechanisms, and attack behaviors of adversaries. First, these three kinds of complexities are introduced in detail according to their engineering backgrounds, dynamical characteristic, and modelling techniques. Then, the developments of the performance analysis and synthesis issues for various networked systems are systematically reviewed. Furthermore, some challenges are illustrated by using a thorough literature review and some possible future research directions are highlighted.

  1. A Linear Time Complexity of Breadth-First Search Using P System with Membrane Division

    Directory of Open Access Journals (Sweden)

    Einallah Salehi

    2013-01-01

    Full Text Available One of the known methods for solving the problems with exponential time complexity such as NP-complete problems is using the brute force algorithms. Recently, a new parallel computational framework called Membrane Computing is introduced which can be applied in brute force algorithms. The usual way to find a solution for the problems with exponential time complexity with Membrane Computing techniques is by P System with active membrane using division rule. It makes an exponential workspace and solves the problems with exponential complexity in a polynomial (even linear time. On the other hand, searching is currently one of the most used methods for finding solution for problems in real life, that the blind search algorithms are accurate, but their time complexity is exponential such as breadth-first search (BFS algorithm. In this paper, we proposed a new approach for implementation of BFS by using P system with division rule technique for first time. The theorem shows time complexity of BSF in this framework on randomly binary trees reduced from O(2d to O(d.

  2. Attacker-defender game from a network science perspective

    Science.gov (United States)

    Li, Ya-Peng; Tan, Suo-Yi; Deng, Ye; Wu, Jun

    2018-05-01

    Dealing with the protection of critical infrastructures, many game-theoretic methods have been developed to study the strategic interactions between defenders and attackers. However, most game models ignore the interrelationship between different components within a certain system. In this paper, we propose a simultaneous-move attacker-defender game model, which is a two-player zero-sum static game with complete information. The strategies and payoffs of this game are defined on the basis of the topology structure of the infrastructure system, which is represented by a complex network. Due to the complexity of strategies, the attack and defense strategies are confined by two typical strategies, namely, targeted strategy and random strategy. The simulation results indicate that in a scale-free network, the attacker virtually always attacks randomly in the Nash equilibrium. With a small cost-sensitive parameter, representing the degree to which costs increase with the importance of a target, the defender protects the hub targets with large degrees preferentially. When the cost-sensitive parameter exceeds a threshold, the defender switches to protecting nodes randomly. Our work provides a new theoretical framework to analyze the confrontations between the attacker and the defender on critical infrastructures and deserves further study.

  3. Hydrogen Exchange Mass Spectrometry of Functional Membrane-bound Chemotaxis Receptor Complexes

    Science.gov (United States)

    Koshy, Seena S.; Eyles, Stephen J.; Weis, Robert M.; Thompson, Lynmarie K.

    2014-01-01

    The transmembrane signaling mechanism of bacterial chemotaxis receptors is thought to involve changes in receptor conformation and dynamics. The receptors function in ternary complexes with two other proteins, CheA and CheW, that form extended membrane-bound arrays. Previous studies have shown that attractant binding induces a small (~2 Å) piston displacement of one helix of the periplasmic and transmembrane domains towards the cytoplasm, but it is not clear how this signal propagates through the cytoplasmic domain to control the kinase activity of the CheA bound at the membrane-distal tip, nearly 200 Å away. The cytoplasmic domain has been shown to be highly dynamic, which raises the question of how a small piston motion could propagate through a dynamic domain to control CheA kinase activity. To address this, we have developed a method for measuring dynamics of the receptor cytoplasmic fragment (CF) in functional complexes with CheA and CheW. Hydrogen exchange mass spectrometry (HDX-MS) measurements of global exchange of CF demonstrate that CF exhibits significantly slower exchange in functional complexes than in solution. Since the exchange rates in functional complexes are comparable to that of other proteins of similar structure, the CF appears to be a well-structured protein within these complexes, which is compatible with its role in propagating a signal that appears to be a tiny conformational change in the periplasmic and transmembrane domains of the receptor. We also demonstrate the feasibility of this protocol for local exchange measurements, by incorporating a pepsin digest step to produce peptides with 87% sequence coverage and only 20% back exchange. This method extends HDX-MS to membrane-bound functional complexes without detergents that may perturb the stability or structure of the system. PMID:24274333

  4. Resolving the paradox for protein aggregation diseases: a common mechanism for aggregated proteins to initially attack membranes without needing aggregates [v1; ref status: indexed, http://f1000r.es/221

    Directory of Open Access Journals (Sweden)

    Haina Qin

    2013-10-01

    Full Text Available Paradoxically, aggregation of specific proteins is characteristic of many human diseases and aging, yet aggregates have been found to be unnecessary for initiating pathogenesis. Here we determined the NMR topology and dynamics of a helical mutant in a membrane environment transformed from the 125-residue cytosolic all-β MSP by the ALS-causing P56S mutation. Unexpectedly, despite its low hydrophobicity, the P56S major sperm protein (MSP domain becomes largely embedded in the membrane environment with high backbone rigidity. Furthermore it is composed of five helices with amphiphilicity comparable to those of the partly-soluble membrane toxin mellitin and α-synuclein causing Parkinson's disease. Consequently, the mechanism underlying this chameleon transformation becomes clear: by disrupting the specific tertiary interaction network stabilizing the native all-β MSP fold to release previously-locked amphiphilic segments, the P56S mutation acts to convert the classic MSP fold into a membrane-active protein that is fundamentally indistinguishable from mellitin and α-synuclein which are disordered in aqueous solution but spontaneously partition into membrane interfaces driven by hydrogen-bond energetics gained from forming α-helix in the membrane environments. As segments with high amphiphilicity exist in all proteins, our study successfully resolves the paradox by deciphering that the proteins with a higher tendency to aggregate have a stronger potential to partition into membranes through the same mechanism as α-synuclein to initially attack membranes to trigger pathogenesis without needing aggregates. This might represent the common first step for various kinds of aggregated proteins to trigger familiar, sporadic and aging diseases. Therefore the homeostasis of aggregated proteins in vivo is the central factor responsible for a variety of human diseases including aging. The number and degree of the membrane attacks by aggregated proteins may

  5. A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees

    NARCIS (Netherlands)

    Jhawar, Ravi; Lounis, Karim; Mauw, Sjouke

    2016-01-01

    Cyber attacks are becoming increasingly complex, practically sophisticated and organized. Losses due to such attacks are important, varying from the loss of money to business reputation spoilage. Therefore, there is a great need for potential victims of cyber attacks to deploy security solutions

  6. Stepwise visualization of membrane pore formation by suilysin, a bacterial cholesterol-dependent cytolysin.

    Science.gov (United States)

    Leung, Carl; Dudkina, Natalya V; Lukoyanova, Natalya; Hodel, Adrian W; Farabella, Irene; Pandurangan, Arun P; Jahan, Nasrin; Pires Damaso, Mafalda; Osmanović, Dino; Reboul, Cyril F; Dunstone, Michelle A; Andrew, Peter W; Lonnen, Rana; Topf, Maya; Saibil, Helen R; Hoogenboom, Bart W

    2014-12-02

    Membrane attack complex/perforin/cholesterol-dependent cytolysin (MACPF/CDC) proteins constitute a major superfamily of pore-forming proteins that act as bacterial virulence factors and effectors in immune defence. Upon binding to the membrane, they convert from the soluble monomeric form to oligomeric, membrane-inserted pores. Using real-time atomic force microscopy (AFM), electron microscopy (EM), and atomic structure fitting, we have mapped the structure and assembly pathways of a bacterial CDC in unprecedented detail and accuracy, focussing on suilysin from Streptococcus suis. We show that suilysin assembly is a noncooperative process that is terminated before the protein inserts into the membrane. The resulting ring-shaped pores and kinetically trapped arc-shaped assemblies are all seen to perforate the membrane, as also visible by the ejection of its lipids. Membrane insertion requires a concerted conformational change of the monomeric subunits, with a marked expansion in pore diameter due to large changes in subunit structure and packing.

  7. Effect of clustering on attack vulnerability of interdependent scale-free networks

    International Nuclear Information System (INIS)

    Li, Rui-qi; Sun, Shi-wen; Ma, Yi-lin; Wang, Li; Xia, Cheng-yi

    2015-01-01

    In order to deeply understand the complex interdependent systems, it is of great concern to take clustering coefficient, which is an important feature of many real-world systems, into account. Previous study mainly focused on the impact of clustering on interdependent networks under random attacks, while we extend the study to the case of the more realistic attacking strategy, targeted attack. A system composed of two interdependent scale-free networks with tunable clustering is provided. The effects of coupling strength and coupling preference on attack vulnerability are explored. Numerical simulation results demonstrate that interdependent links between two networks make the entire system much more fragile to attacks. Also, it is found that clustering significantly increases the vulnerability of interdependent scale-free networks. Moreover, for fully coupled network, disassortative coupling is found to be most vulnerable to random attacks, while the random and assortative coupling have little difference. Additionally, enhancing coupling strength can greatly enhance the fragility of interdependent networks against targeted attacks. These results can not only improve the deep understanding of structural complexity of complex systems, but also provide insights into the guidance of designing resilient infrastructures.

  8. Electrode-analytical properties of polyvinylchloride membranes based on triple metal-polymeric complexes

    Directory of Open Access Journals (Sweden)

    Katerina V. Matorina

    2015-10-01

    Full Text Available The influence of the nature of the electrode-active substances (EAS, the composition of the external and internal solutions on the formation of the analytical signal of polyvinylchloride (PVC membranes based on associates and triple metal-polymeric complexes (TMPC was established. Dehumidification of synthesized membranes increases with the content of polyvinylpyrrolidone (PVP. The value of the swelling degree is more than two times greater for membranes, which contain as EAS TMPC, relative to membranes based on associates. The value of water absorption of membranes is determined by the nature of EAS. They formed a series of increasing of the swelling degree such as associate < background membrane < TMPC. Swelling of the background membrane is explained by the physical sorption of water molecules on the surface of plasticized membrane. Hydration of PVP macromolecules varies with the introduction of metal ions, macromolecules unit undergoes a conformational transition. PVP macromolecules form tunnels or cavities where complex particles distributed and additional water accumulated through the second coordination layer. Constructed sensors based on TMPC have slope of electrode function equal to 25 mV/pC. Linear dependence of potential on the polymer concentration is observed in the range of 5–7 pC units. Sensors based on associates have slope of the electrode function of 20–25 mV/pC that can be varied depending on the nature of the EAS. Working range is 4–8 pC. Response time of sensor is less than 1 min. The optimal time for conditioning of the synthesized PVC membrane is 24 hours. Potentiometric sensors have been developed for the determination of residual amounts of low molecular PVP which is a food additive E 1201 commonly used for thickening, stabilizing and clarifying of food products. The content of PVP was determined in real objects (apple juice, beer, red wine and cognac with using the polyvinylpyrrolidone sensors (Sr < 0.08. The

  9. Membrane-elasticity model of Coatless vesicle budding induced by ESCRT complexes.

    Directory of Open Access Journals (Sweden)

    Bartosz Różycki

    Full Text Available The formation of vesicles is essential for many biological processes, in particular for the trafficking of membrane proteins within cells. The Endosomal Sorting Complex Required for Transport (ESCRT directs membrane budding away from the cytosol. Unlike other vesicle formation pathways, the ESCRT-mediated budding occurs without a protein coat. Here, we propose a minimal model of ESCRT-induced vesicle budding. Our model is based on recent experimental observations from direct fluorescence microscopy imaging that show ESCRT proteins colocalized only in the neck region of membrane buds. The model, cast in the framework of membrane elasticity theory, reproduces the experimentally observed vesicle morphologies with physically meaningful parameters. In this parameter range, the minimum energy configurations of the membrane are coatless buds with ESCRTs localized in the bud neck, consistent with experiment. The minimum energy configurations agree with those seen in the fluorescence images, with respect to both bud shapes and ESCRT protein localization. On the basis of our model, we identify distinct mechanistic pathways for the ESCRT-mediated budding process. The bud size is determined by membrane material parameters, explaining the narrow yet different bud size distributions in vitro and in vivo. Our membrane elasticity model thus sheds light on the energetics and possible mechanisms of ESCRT-induced membrane budding.

  10. Bioinspired tannic acid-copper complexes as selective coating for nanofiltration membranes

    KAUST Repository

    Chakrabarty, Tina

    2017-04-27

    Bio-polyphenols that are present in tea, date fruits, chockolate and many other plants have been recognized as scaffold material for the manufacture of composite filtration membranes. These phenolic biomolecules possess abundant gallol (1,2,3-trihydroxyphenyl) and catechol (1,2-dihydroxyphenyl) functional groups, which allow the spontaneous formation of a thin polymerized layer at the right pH conditions. Here, we report a facile and cost-effective method to coat porous membranes via the complexation of tannic acid (TA) and cupric acetate (mono hydrate) through co-deposition. The modified membranes were investigated by XPS, ATR/FTIR, water contact angle, SEM and water permeance for a structural and morphological analysis. The obtained results reveal that the modified membranes with TA and cupric acetate (CuII) developed a thin skin layer, which showed excellent hydrophilicity with good water permeance. These membranes were tested with different molecular weight polyethylene glycols (PEG) in aqueous solution; the MWCO was around 600 Daltons.

  11. What's Next in Complex Networks? Capturing the Concept of Attacking Play in Invasive Team Sports.

    Science.gov (United States)

    Ramos, João; Lopes, Rui J; Araújo, Duarte

    2018-01-01

    The evolution of performance analysis within sports sciences is tied to technology development and practitioner demands. However, how individual and collective patterns self-organize and interact in invasive team sports remains elusive. Social network analysis has been recently proposed to resolve some aspects of this problem, and has proven successful in capturing collective features resulting from the interactions between team members as well as a powerful communication tool. Despite these advances, some fundamental team sports concepts such as an attacking play have not been properly captured by the more common applications of social network analysis to team sports performance. In this article, we propose a novel approach to team sports performance centered on sport concepts, namely that of an attacking play. Network theory and tools including temporal and bipartite or multilayered networks were used to capture this concept. We put forward eight questions directly related to team performance to discuss how common pitfalls in the use of network tools for capturing sports concepts can be avoided. Some answers are advanced in an attempt to be more precise in the description of team dynamics and to uncover other metrics directly applied to sport concepts, such as the structure and dynamics of attacking plays. Finally, we propose that, at this stage of knowledge, it may be advantageous to build up from fundamental sport concepts toward complex network theory and tools, and not the other way around.

  12. Novel Method For Low-Rate Ddos Attack Detection

    Science.gov (United States)

    Chistokhodova, A. A.; Sidorov, I. D.

    2018-05-01

    The relevance of the work is associated with an increasing number of advanced types of DDoS attacks, in particular, low-rate HTTP-flood. Last year, the power and complexity of such attacks increased significantly. The article is devoted to the analysis of DDoS attacks detecting methods and their modifications with the purpose of increasing the accuracy of DDoS attack detection. The article details low-rate attacks features in comparison with conventional DDoS attacks. During the analysis, significant shortcomings of the available method for detecting low-rate DDoS attacks were found. Thus, the result of the study is an informal description of a new method for detecting low-rate denial-of-service attacks. The architecture of the stand for approbation of the method is developed. At the current stage of the study, it is possible to improve the efficiency of an already existing method by using a classifier with memory, as well as additional information.

  13. "Awake" ECCO2R superseded intubation in a near-fatal asthma attack.

    Science.gov (United States)

    Schneider, Thomas-Michael; Bence, Tibor; Brettner, Franz

    2017-01-01

    Near-fatal asthma attacks are life threatening events that often require mechanical ventilation. Extracorporeal carbon dioxide removal (ECCO 2 R) is, beside extracorporeal membrane oxygenation (ECMO), a well-established rescue option whenever ventilation gets to its limits. But there seems to be very rare experience with those techniques in avoiding mechanical ventilation in severe asthma attacks. A 67-year-old man with a near-fatal asthma attack deteriorated under non-invasive ventilation conditions. Beside pharmacological treatment, the intensivists decided to use an extracorporeal carbon dioxide removal system (ECCO 2 R) to avoid sedation and intubation. Within only a few hours, there was a breakthrough and the patient's status improved continuously. One and a half days later, weaning from ECCO 2 R was already completed. The discussion deals with several advantages of extracorporeal lung support in acute asthma, the potential of avoiding intubation and sedation, as well as the benefits of a conscious and spontaneously breathing patient. Extracorporeal membrane oxygenation (ECMO) in general and ECCO 2 R in particular is a highly effective method for the treatment of an acute near-fatal asthma attack. Pathophysiological aspects favor the "awake" approach, without sedation, intubation, and mechanical ventilation. Therefore, experienced clinicians might consider "awake" ECCO 2 R in similar cases.

  14. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  15. Genetic attack on neural cryptography

    International Nuclear Information System (INIS)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-01-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size

  16. Genetic attack on neural cryptography

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  17. Binding of canonical Wnt ligands to their receptor complexes occurs in ordered plasma membrane environments.

    Science.gov (United States)

    Sezgin, Erdinc; Azbazdar, Yagmur; Ng, Xue W; Teh, Cathleen; Simons, Kai; Weidinger, Gilbert; Wohland, Thorsten; Eggeling, Christian; Ozhan, Gunes

    2017-08-01

    While the cytosolic events of Wnt/β-catenin signaling (canonical Wnt signaling) pathway have been widely studied, only little is known about the molecular mechanisms involved in Wnt binding to its receptors at the plasma membrane. Here, we reveal the influence of the immediate plasma membrane environment on the canonical Wnt-receptor interaction. While the receptors are distributed both in ordered and disordered environments, Wnt binding to its receptors selectively occurs in more ordered membrane environments which appear to cointernalize with the Wnt-receptor complex. Moreover, Wnt/β-catenin signaling is significantly reduced when the membrane order is disturbed by specific inhibitors of certain lipids that prefer to localize at the ordered environments. Similarly, a reduction in Wnt signaling activity is observed in Niemann-Pick Type C disease cells where trafficking of ordered membrane lipid components to the plasma membrane is genetically impaired. We thus conclude that ordered plasma membrane environments are essential for binding of canonical Wnts to their receptor complexes and downstream signaling activity. © 2017 The Authors. The FEBS Journal published by John Wiley & Sons Ltd on behalf of Federation of European Biochemical Societies.

  18. Monomeric RC-LH1 core complexes retard LH2 assembly and intracytoplasmic membrane formation in PufX-minus mutants of Rhodobacter sphaeroides.

    Science.gov (United States)

    Adams, Peter G; Mothersole, David J; Ng, Irene W; Olsen, John D; Hunter, C Neil

    2011-09-01

    In the model photosynthetic bacterium Rhodobacter sphaeroides domains of light-harvesting 2 (LH2) complexes surround and interconnect dimeric reaction centre-light-harvesting 1-PufX (RC-LH1-PufX) 'core' complexes, forming extensive networks for energy transfer and trapping. These complexes are housed in spherical intracytoplasmic membranes (ICMs), which are assembled in a stepwise process where biosynthesis of core complexes tends to dominate the early stages of membrane invagination. The kinetics of LH2 assembly were measured in PufX mutants that assemble monomeric core complexes, as a consequence of either a twelve-residue N-terminal truncation of PufX (PufXΔ12) or the complete removal of PufX (PufX(-)). Lower rates of LH2 assembly and retarded maturation of membrane invagination were observed for the larger and less curved ICM from the PufX(-) mutant, consistent with the proposition that local membrane curvature, initiated by arrays of bent RC-LH1-PufX dimers, creates a favourable environment for stable assembly of LH2 complexes. Transmission electron microscopy and high-resolution atomic force microscopy were used to examine ICM morphology and membrane protein organisation in these mutants. Some partitioning of core and LH2 complexes was observed in PufX(-) membranes, resulting in locally ordered clusters of monomeric RC-LH1 complexes. The distribution of core and LH2 complexes in the three types of membrane examined is consistent with previous models of membrane curvature and domain formation (Frese et al., 2008), which demonstrated that a combination of crowding and asymmetries in sizes and shapes of membrane protein complexes drives membrane organisation. 2011 Elsevier B.V. All rights reserved.

  19. The accountability problem of flooding attacks in service-oriented architectures

    DEFF Research Database (Denmark)

    Jensen, Meiko; Schwenk, Jörg

    2009-01-01

    The threat of Denial of Service attacks poses a serious problem to the security of network-based services in general. For flooding attacks against service-oriented applications, this threat is dramatically amplified with potentially much higher impact and very little effort on the attacker's side....... Additionally, due to the high distribution of a SOA application's components, fending such attacks becomes a far more complex task. In this paper, we present the problem of accountability, referring to the issue of resolving the attacker in a highly distributed service-oriented application. Using a general...

  20. Exocyst and autophagy-related membrane trafficking in plants.

    Science.gov (United States)

    Pecenková, Tamara; Markovic, Vedrana; Sabol, Peter; Kulich, Ivan; Žárský, Viktor

    2017-12-18

    Endomembrane traffic in eukaryotic cells functions partially as a means of communication; delivery of membrane in one direction has to be balanced with a reduction at the other end. This effect is typically the case during the defence against pathogens. To combat pathogens, cellular growth and differentiation are suppressed, while endomembrane traffic is poised towards limiting the pathogen attack. The octameric exocyst vesicle-tethering complex was originally discovered as a factor facilitating vesicle-targeting and vesicle-plasma membrane (PM) fusion during exocytosis prior to and possibly during SNARE complex formation. Interestingly, it was recently implicated both in animals and plants in autophagy membrane traffic. In animal cells, the exocyst is integrated into the mTOR-regulated energy metabolism stress/starvation pathway, participating in the formation and especially initiation of an autophagosome. In plants, the first functional link was to autophagy-related anthocyanin import to the vacuole and to starvation. In this concise review, we summarize the current knowledge of exocyst functions in autophagy and defence in plants that might involve unconventional secretion and compare it with animal conditions. Formation of different exocyst complexes during undisturbed cell growth, as opposed to periods of cellular stress reactions involving autophagy, might contribute to the coordination of endomembrane trafficking pathways. © The Author(s) 2017. Published by Oxford University Press on behalf of the Society for Experimental Biology. All rights reserved. For permissions, please email: journals.permissions@oup.com.

  1. A Model of Biological Attacks on a Realistic Population

    Science.gov (United States)

    Carley, Kathleen M.; Fridsma, Douglas; Casman, Elizabeth; Altman, Neal; Chen, Li-Chiou; Kaminsky, Boris; Nave, Demian; Yahja, Alex

    The capability to assess the impacts of large-scale biological attacks and the efficacy of containment policies is critical and requires knowledge-intensive reasoning about social response and disease transmission within a complex social system. There is a close linkage among social networks, transportation networks, disease spread, and early detection. Spatial dimensions related to public gathering places such as hospitals, nursing homes, and restaurants, can play a major role in epidemics [Klovdahl et. al. 2001]. Like natural epidemics, bioterrorist attacks unfold within spatially defined, complex social systems, and the societal and networked response can have profound effects on their outcome. This paper focuses on bioterrorist attacks, but the model has been applied to emergent and familiar diseases as well.

  2. Membrane Contact Sites: Complex Zones for Membrane Association and Lipid Exchange

    OpenAIRE

    Evan Quon; Christopher T. Beh

    2016-01-01

    Lipid transport between membranes within cells involves vesicle and protein carriers, but as agents of nonvesicular lipid transfer, the role of membrane contact sites has received increasing attention. As zones for lipid metabolism and exchange, various membrane contact sites mediate direct associations between different organelles. In particular, membrane contact sites linking the plasma membrane (PM) and the endoplasmic reticulum (ER) represent important regulators of lipid and ion transfer...

  3. Membrane Processes Based on Complexation Reactions of Pollutants as Sustainable Wastewater Treatments

    Directory of Open Access Journals (Sweden)

    Teresa Poerio

    2009-11-01

    Full Text Available Water is today considered to be a vital and limited resource due to industrial development and population growth. Developing appropriate water treatment techniques, to ensure a sustainable management, represents a key point in the worldwide strategies. By removing both organic and inorganic species using techniques based on coupling membrane processes and appropriate complexing agents to bind pollutants are very important alternatives to classical separation processes in water treatment. Supported Liquid Membrane (SLM and Complexation Ultrafiltration (CP-UF based processes meet the sustainability criteria because they require low amounts of energy compared to pressure driven membrane processes, low amounts of complexing agents and they allow recovery of water and some pollutants (e.g., metals. A more interesting process, on the application point of view, is the Stagnant Sandwich Liquid Membrane (SSwLM, introduced as SLM implementation. It has been studied in the separation of the drug gemfibrozil (GEM and of copper(II as organic and inorganic pollutants in water. Obtained results showed in both cases the higher efficiency of SSwLM with respect to the SLM system configuration. Indeed higher stability (335.5 vs. 23.5 hours for GEM; 182.7 vs. 49.2 for copper(II and higher fluxes (0.662 vs. 0.302 mmol·h-1·m-2 for GEM; 43.3 vs. 31.0 for copper(II were obtained by using the SSwLM. Concerning the CP-UF process, its feasibility was studied in the separation of metals from waters (e.g., from soil washing, giving particular attention to process sustainability such as water and polymer recycle, free metal and water recovery. The selectivity of the CP-UF process was also validated in the separate removal of copper(II and nickel(II both contained in synthetic and real aqueous effluents. Thus, complexation reactions involved in the SSwLM and the CP-UF processes play a key role to meet the sustainability criteria.

  4. Simultaneous membrane interaction of amphipathic peptide monomers, self-aggregates and cargo complexes detected by fluorescence correlation spectroscopy.

    Science.gov (United States)

    Vasconcelos, Luís; Lehto, Tõnis; Madani, Fatemeh; Radoi, Vlad; Hällbrink, Mattias; Vukojević, Vladana; Langel, Ülo

    2018-02-01

    Peptides able to translocate cell membranes while carrying macromolecular cargo, as cell-penetrating peptides (CPPs), can contribute to the field of drug delivery by enabling the transport of otherwise membrane impermeable molecules. Formation of non-covalent complexes between amphipathic peptides and oligonucleotides is driven by electrostatic and hydrophobic interactions. Here we investigate and quantify the coexistence of distinct molecular species in multiple equilibria, namely peptide monomer, peptide self-aggregates and peptide/oligonucleotide complexes. As a model for the complexes, we used a stearylated peptide from the PepFect family, PF14 and siRNA. PF14 has a cationic part and a lipid part, resembling some characteristics of cationic lipids. Fluorescence correlation spectroscopy (FCS) and fluorescence cross-correlation spectroscopy (FCCS) were used to detect distinct molecular entities in solution and at the plasma membrane of live cells. For that, we labeled the peptide with carboxyrhodamine 6G and the siRNA with Cyanine 5. We were able to detect fluorescent entities with diffusional properties characteristic of the peptide monomer as well as of peptide aggregates and peptide/oligonucleotide complexes. Strategies to avoid peptide adsorption to solid surfaces and self-aggregation were developed and allowed successful FCS measurements in solution and at the plasma membrane. The ratio between the detected molecular species was found to vary with pH, peptide concentration and the proximity to the plasma membrane. The present results suggest that the diverse cellular uptake mechanisms, often reported for amphipathic CPPs, might result from the synergistic effect of peptide monomers, self-aggregates and cargo complexes, distributed unevenly at the plasma membrane. Copyright © 2017 Elsevier B.V. All rights reserved.

  5. Spontaneous complement activation on human B cells results in localized membrane depolarization and the clustering of complement receptor type 2 and C3 fragments

    DEFF Research Database (Denmark)

    Løbner, Morten; Leslie, Robert G Q; Prodinger, Wolfgang M

    2009-01-01

    While our previous studies have demonstrated that complement activation induced by complement receptors type 2 (CR2/CD21) and 1 (CR1/CD35) results in C3-fragment deposition and membrane attack complex (MAC) formation in human B cells, the consequences of these events for B-cell functions remain u...

  6. Crystal Structure of the Herpesvirus Nuclear Egress Complex Provides Insights into Inner Nuclear Membrane Remodeling

    Directory of Open Access Journals (Sweden)

    Tzviya Zeev-Ben-Mordehai

    2015-12-01

    Full Text Available Although nucleo-cytoplasmic transport is typically mediated through nuclear pore complexes, herpesvirus capsids exit the nucleus via a unique vesicular pathway. Together, the conserved herpesvirus proteins pUL31 and pUL34 form the heterodimeric nuclear egress complex (NEC, which, in turn, mediates the formation of tight-fitting membrane vesicles around capsids at the inner nuclear membrane. Here, we present the crystal structure of the pseudorabies virus NEC. The structure revealed that a zinc finger motif in pUL31 and an extensive interaction network between the two proteins stabilize the complex. Comprehensive mutational analyses, characterized both in situ and in vitro, indicated that the interaction network is not redundant but rather complementary. Fitting of the NEC crystal structure into the recently determined cryoEM-derived hexagonal lattice, formed in situ by pUL31 and pUL34, provided details on the molecular basis of NEC coat formation and inner nuclear membrane remodeling.

  7. Security Analysis of 7-Round MISTY1 against Higher Order Differential Attacks

    Science.gov (United States)

    Tsunoo, Yukiyasu; Saito, Teruo; Shigeri, Maki; Kawabata, Takeshi

    MISTY1 is a 64-bit block cipher that has provable security against differential and linear cryptanalysis. MISTY1 is one of the algorithms selected in the European NESSIE project, and it has been recommended for Japanese e-Government ciphers by the CRYPTREC project. This paper shows that higher order differential attacks can be successful against 7-round versions of MISTY1 with FL functions. The attack on 7-round MISTY1 can recover a partial subkey with a data complexity of 254.1 and a computational complexity of 2120.8, which signifies the first successful attack on 7-round MISTY1 with no limitation such as a weak key. This paper also evaluates the complexity of this higher order differential attack on MISTY1 in which the key schedule is replaced by a pseudorandom function. It is shown that resistance to the higher order differential attack is not substantially improved even in 7-round MISTY1 in which the key schedule is replaced by a pseudorandom function.

  8. A Reasoning Method of Cyber-Attack Attribution Based on Threat Intelligence

    OpenAIRE

    Li Qiang; Yang Ze-Ming; Liu Bao-Xu; Jiang Zheng-Wei

    2016-01-01

    With the increasing complexity of cyberspace security, the cyber-attack attribution has become an important challenge of the security protection systems. The difficult points of cyber-attack attribution were forced on the problems of huge data handling and key data missing. According to this situation, this paper presented a reasoning method of cyber-attack attribution based on threat intelligence. The method utilizes the intrusion kill chain model and Bayesian network to build attack chain a...

  9. Lipid clustering correlates with membrane curvature as revealed by molecular simulations of complex lipid bilayers.

    Directory of Open Access Journals (Sweden)

    Heidi Koldsø

    2014-10-01

    Full Text Available Cell membranes are complex multicomponent systems, which are highly heterogeneous in the lipid distribution and composition. To date, most molecular simulations have focussed on relatively simple lipid compositions, helping to inform our understanding of in vitro experimental studies. Here we describe on simulations of complex asymmetric plasma membrane model, which contains seven different lipids species including the glycolipid GM3 in the outer leaflet and the anionic lipid, phosphatidylinositol 4,5-bisphophate (PIP2, in the inner leaflet. Plasma membrane models consisting of 1500 lipids and resembling the in vivo composition were constructed and simulations were run for 5 µs. In these simulations the most striking feature was the formation of nano-clusters of GM3 within the outer leaflet. In simulations of protein interactions within a plasma membrane model, GM3, PIP2, and cholesterol all formed favorable interactions with the model α-helical protein. A larger scale simulation of a model plasma membrane containing 6000 lipid molecules revealed correlations between curvature of the bilayer surface and clustering of lipid molecules. In particular, the concave (when viewed from the extracellular side regions of the bilayer surface were locally enriched in GM3. In summary, these simulations explore the nanoscale dynamics of model bilayers which mimic the in vivo lipid composition of mammalian plasma membranes, revealing emergent nanoscale membrane organization which may be coupled both to fluctuations in local membrane geometry and to interactions with proteins.

  10. Complexation-Induced Phase Separation: Preparation of Metal-Rich Polymeric Membranes

    KAUST Repository

    Villalobos Vazquez de la Parra, Luis Francisco

    2017-08-01

    The majority of state-of-the-art polymeric membranes for industrial or medical applications are fabricated by phase inversion. Complexation induced phase separation (CIPS)—a surprising variation of this well-known process—allows direct fabrication of hybrid membranes in existing facilities. In the CIPS process, a first step forms the thin metal-rich selective layer of the membrane, and a succeeding step the porous support. Precipitation of the selective layer takes place in the same solvent used to dissolve the polymer and is induced by a small concentration of metal ions. These ions form metal-coordination-based crosslinks leading to the formation of a solid skin floating on top of the liquid polymer film. A subsequent precipitation in a nonsolvent bath leads to the formation of the porous support structure. Forming the dense layer and porous support by different mechanisms while maintaining the simplicity of a phase inversion process, results in unprecedented control over the final structure of the membrane. The thickness and morphology of the dense layer as well as the porosity of the support can be controlled over a wide range by manipulating simple process parameters. CIPS facilitates control over (i) the thickness of the dense layer throughout several orders of magnitude—from less than 15 nm to more than 6 μm, (ii) the type and amount of metal ions loaded in the dense layer, (iii) the morphology of the membrane surface, and (iv) the porosity and structure of the support. The nature of the CIPS process facilitates a precise loading of a high concentration of metal ions that are located in only the top layer of the membrane. Moreover, these metal ions can be converted—during the membrane fabrication process—to nanoparticles or crystals. This simple method opens up fascinating possibilities for the fabrication of metal-rich polymeric membranes with a new set of properties. This dissertation describes the process in depth and explores promising

  11. Ruthenium complexes with phenylterpyridine derivatives target cell membrane and trigger death receptors-mediated apoptosis in cancer cells.

    Science.gov (United States)

    Deng, Zhiqin; Gao, Pan; Yu, Lianling; Ma, Bin; You, Yuanyuan; Chan, Leung; Mei, Chaoming; Chen, Tianfeng

    2017-06-01

    Elucidation of the communication between metal complexes and cell membrane may provide useful information for rational design of metal-based anticancer drugs. Herein we synthesized a novel class of ruthenium (Ru) complexes containing phtpy derivatives (phtpy = phenylterpyridine), analyzed their structure-activity relationship and revealed their action mechanisms. The result showed that, the increase in the planarity of hydrophobic Ru complexes significantly enhanced their lipophilicity and cellular uptake. Meanwhile, the introduction of nitro group effectively improved their anticancer efficacy. Further mechanism studies revealed that, complex (2c), firstly accumulated on cell membrane and interacted with death receptors to activate extrinsic apoptosis signaling pathway. The complex was then transported into cell cytoplasm through transferrin receptor-mediated endocytosis. Most of the intracellular 2c accumulated in cell plasma, decreasing the level of cellular ROS, inducing the activation of caspase-9 and thus intensifying the apoptosis. At the same time, the residual 2c can translocate into cell nucleus to interact with DNA, induce DNA damage, activate p53 pathway and enhance apoptosis. Comparing with cisplatin, 2c possesses prolonged circulation time in blood, comparable antitumor ability and importantly, much lower toxicity in vivo. Taken together, this study uncovers the role of membrane receptors in the anticancer actions of Ru complexes, and provides fundamental information for rational design of membrane receptor targeting anticancer drugs. Copyright © 2017 Elsevier Ltd. All rights reserved.

  12. Robustness and structure of complex networks

    Science.gov (United States)

    Shao, Shuai

    This dissertation covers the two major parts of my PhD research on statistical physics and complex networks: i) modeling a new type of attack -- localized attack, and investigating robustness of complex networks under this type of attack; ii) discovering the clustering structure in complex networks and its influence on the robustness of coupled networks. Complex networks appear in every aspect of our daily life and are widely studied in Physics, Mathematics, Biology, and Computer Science. One important property of complex networks is their robustness under attacks, which depends crucially on the nature of attacks and the structure of the networks themselves. Previous studies have focused on two types of attack: random attack and targeted attack, which, however, are insufficient to describe many real-world damages. Here we propose a new type of attack -- localized attack, and study the robustness of complex networks under this type of attack, both analytically and via simulation. On the other hand, we also study the clustering structure in the network, and its influence on the robustness of a complex network system. In the first part, we propose a theoretical framework to study the robustness of complex networks under localized attack based on percolation theory and generating function method. We investigate the percolation properties, including the critical threshold of the phase transition pc and the size of the giant component Pinfinity. We compare localized attack with random attack and find that while random regular (RR) networks are more robust against localized attack, Erdoḧs-Renyi (ER) networks are equally robust under both types of attacks. As for scale-free (SF) networks, their robustness depends crucially on the degree exponent lambda. The simulation results show perfect agreement with theoretical predictions. We also test our model on two real-world networks: a peer-to-peer computer network and an airline network, and find that the real-world networks

  13. Evaluation of hydroacid complex in the forward osmosis–membrane distillation (FO–MD) system for desalination

    KAUST Repository

    Wang, Peng; Cui, Yue; Ge, Qingchun; Fern Tew, Tjin; Chung, Neal Tai-Shung

    2015-01-01

    The incorporation of membrane distillation (MD) into forward osmosis (FO) provides process sustainability to regenerate the draw solution and to produce clean water simultaneously. However, the reverse salt flux is the major hurdle in the FO-MD system because it not only reduces the effective osmotic driving force across the membrane but also increases the replenishment cost and scaling issue. For the first time, a hydroacid complex with abundant hydrophilic groups and ionic species is evaluated as the draw solutes in the hybrid FO-MD system consisting of multi-bore PVDF MD membranes for seawater/brackish desalination. In order to evaluate the practicality of the hydroacid complex in the FO-MD system, FO and MD experiments were conducted at elevated temperatures and concentrations. The hydroacid complex has displayed desired properties such as high solubility, low viscosity, excellent thermal stability and minimal reverse salt flux suitable for FO and MD operations. FO-MD desalination process was demonstrated with a highest seawater desalination flux of 6/32 LMH (FO/MD). This study may open up the prospective of employing the hydroacid complex as the draw solute in FO-MD hybrid systems for seawater /brackish desalination. © 2015 Elsevier B.V.

  14. Evaluation of hydroacid complex in the forward osmosis–membrane distillation (FO–MD) system for desalination

    KAUST Repository

    Wang, Peng

    2015-11-01

    The incorporation of membrane distillation (MD) into forward osmosis (FO) provides process sustainability to regenerate the draw solution and to produce clean water simultaneously. However, the reverse salt flux is the major hurdle in the FO-MD system because it not only reduces the effective osmotic driving force across the membrane but also increases the replenishment cost and scaling issue. For the first time, a hydroacid complex with abundant hydrophilic groups and ionic species is evaluated as the draw solutes in the hybrid FO-MD system consisting of multi-bore PVDF MD membranes for seawater/brackish desalination. In order to evaluate the practicality of the hydroacid complex in the FO-MD system, FO and MD experiments were conducted at elevated temperatures and concentrations. The hydroacid complex has displayed desired properties such as high solubility, low viscosity, excellent thermal stability and minimal reverse salt flux suitable for FO and MD operations. FO-MD desalination process was demonstrated with a highest seawater desalination flux of 6/32 LMH (FO/MD). This study may open up the prospective of employing the hydroacid complex as the draw solute in FO-MD hybrid systems for seawater /brackish desalination. © 2015 Elsevier B.V.

  15. Functional Assembly of Soluble and Membrane Recombinant Proteins of Mammalian NADPH Oxidase Complex.

    Science.gov (United States)

    Souabni, Hajer; Ezzine, Aymen; Bizouarn, Tania; Baciou, Laura

    2017-01-01

    Activation of phagocyte cells from an innate immune system is associated with a massive consumption of molecular oxygen to generate highly reactive oxygen species (ROS) as microbial weapons. This is achieved by a multiprotein complex, the so-called NADPH oxidase. The activity of phagocyte NADPH oxidase relies on an assembly of more than five proteins, among them the membrane heterodimer named flavocytochrome b 558 (Cytb 558 ), constituted by the tight association of the gp91 phox (also named Nox2) and p22 phox proteins. The Cytb 558 is the membrane catalytic core of the NADPH oxidase complex, through which the reducing equivalent provided by NADPH is transferred via the associated prosthetic groups (one flavin and two hemes) to reduce dioxygen into superoxide anion. The other major proteins (p47 phox , p67 phox , p40 phox , Rac) requisite for the complex activity are cytosolic proteins. Thus, the NADPH oxidase functioning relies on a synergic multi-partner assembly that in vivo can be hardly studied at the molecular level due to the cell complexity. Thus, a cell-free assay method has been developed to study the NADPH oxidase activity that allows measuring and eventually quantifying the ROS generation based on optical techniques following reduction of cytochrome c. This setup is a valuable tool for the identification of protein interactions, of crucial components and additives for a functional enzyme. Recently, this method was improved by the engineering and the production of a complete recombinant NADPH oxidase complex using the combination of purified proteins expressed in bacterial and yeast host cells. The reconstitution into artificial membrane leads to a fully controllable system that permits fine functional studies.

  16. Surfactant-free purification of membrane protein complexes from bacteria: application to the staphylococcal penicillin-binding protein complex PBP2/PBP2a

    International Nuclear Information System (INIS)

    Paulin, Sarah; Rosado, Helena; Taylor, Peter W; Jamshad, Mohammed; Dafforn, Timothy R; Garcia-Lara, Jorge; Foster, Simon J; Galley, Nicola F; Roper, David I

    2014-01-01

    Surfactant-mediated removal of proteins from biomembranes invariably results in partial or complete loss of function and disassembly of multi-protein complexes. We determined the capacity of styrene-co-maleic acid (SMA) co-polymer to remove components of the cell division machinery from the membrane of drug-resistant staphylococcal cells. SMA-lipid nanoparticles solubilized FtsZ-PBP2-PBP2a complexes from intact cells, demonstrating the close physical proximity of these proteins within the lipid bilayer. Exposure of bacteria to (-)-epicatechin gallate, a polyphenolic agent that abolishes β-lactam resistance in staphylococci, disrupted the association between PBP2 and PBP2a. Thus, SMA purification provides a means to remove native integral membrane protein assemblages with minimal physical disruption and shows promise as a tool for the interrogation of molecular aspects of bacterial membrane protein structure and function. (paper)

  17. Surfactant-free purification of membrane protein complexes from bacteria: application to the staphylococcal penicillin-binding protein complex PBP2/PBP2a

    Science.gov (United States)

    Paulin, Sarah; Jamshad, Mohammed; Dafforn, Timothy R.; Garcia-Lara, Jorge; Foster, Simon J.; Galley, Nicola F.; Roper, David I.; Rosado, Helena; Taylor, Peter W.

    2014-07-01

    Surfactant-mediated removal of proteins from biomembranes invariably results in partial or complete loss of function and disassembly of multi-protein complexes. We determined the capacity of styrene-co-maleic acid (SMA) co-polymer to remove components of the cell division machinery from the membrane of drug-resistant staphylococcal cells. SMA-lipid nanoparticles solubilized FtsZ-PBP2-PBP2a complexes from intact cells, demonstrating the close physical proximity of these proteins within the lipid bilayer. Exposure of bacteria to (-)-epicatechin gallate, a polyphenolic agent that abolishes β-lactam resistance in staphylococci, disrupted the association between PBP2 and PBP2a. Thus, SMA purification provides a means to remove native integral membrane protein assemblages with minimal physical disruption and shows promise as a tool for the interrogation of molecular aspects of bacterial membrane protein structure and function.

  18. DAG-based attack and defense modeling: don’t miss the forest for the attack trees

    NARCIS (Netherlands)

    Kordy, Barbara; Piètre-Cambacédès, Ludovic; Schweitzer, Patrick

    2015-01-01

    This paper presents the current state of the art on attack and defense modeling approaches that are based on directed acyclic graphs (DAGs). DAGs allow for a hierarchical decomposition of complex scenarios into simple, easily understandable and quantifiable actions. Methods based on threat trees and

  19. A cellular backline: specialization of host membranes for defence.

    Science.gov (United States)

    Faulkner, Christine

    2015-03-01

    In plant-pathogen interactions, the host plasma membrane serves as a defence front for pathogens that invade from the extracellular environment. As such, the lipid bilayer acts as a scaffold that targets and delivers defence responses to the site of attack. During pathogen infection, numerous changes in plasma membrane composition, organization, and structure occur. There is increasing evidence that this facilitates the execution of a variety of responses, highlighting the regulatory role membranes play in cellular responses. Membrane microdomains such as lipid rafts are hypothesized to create signalling platforms for receptor signalling in response to pathogen perception and for callose synthesis. Further, the genesis of pathogen-associated structures such as papillae and the extra-haustorial membrane necessitates polarization of membranes and membrane trafficking pathways. Unlocking the mechanisms by which this occurs will enable greater understanding of how targeted defences, some of which result in resistance, are executed. This review will survey some of the changes that occur in host membranes during pathogen attack and how these are associated with the generation of defence responses. © The Author 2015. Published by Oxford University Press on behalf of the Society for Experimental Biology. All rights reserved. For permissions, please email: journals.permissions@oup.com.

  20. Promotion of mitochondrial membrane complex assembly by a proteolytically inactive yeast Lon

    NARCIS (Netherlands)

    Rep, M; van Dijl, J M; Suda, K; Schatz, G; Grivell, L A; Suzuki, C K

    1996-01-01

    Afg3p and Rca1p are adenosine triphosphate (ATP)-dependent metalloproteases in yeast mitochondria. Cells lacking both proteins exhibit defects in respiration-dependent growth, degradation of mitochondrially synthesized proteins, and assembly of inner-membrane complexes. Defects in growth and protein

  1. Crystallization of Mitochondrial Respiratory Complex II fromChicken Heart: A Membrane-Protein Complex Diffracting to 2.0Angstrom

    Energy Technology Data Exchange (ETDEWEB)

    Huang, Li-shar; Borders, Toni M.; Shen, John T.; Wang, Chung-Jen; Berry, Edward A.

    2004-12-17

    Procedure is presented for preparation of diffraction-quality crystals of a vertebrate mitochondrial respiratory Complex II. The crystals have the potential to diffract to at least 2.0 Angstrom with optimization of post-crystal-growth treatment and cryoprotection. This should allow determination of the structure of this important and medically relevant membrane protein complex at near-atomic resolution and provide great detail of the mode of binding of substrates and inhibitors at the two substrate-binding sites.

  2. Excitation energy transfer between Light-harvesting complex II and Photosystem I in reconstituted membranes.

    Science.gov (United States)

    Akhtar, Parveen; Lingvay, Mónika; Kiss, Teréz; Deák, Róbert; Bóta, Attila; Ughy, Bettina; Garab, Győző; Lambrev, Petar H

    2016-04-01

    Light-harvesting complex II (LHCII), the major peripheral antenna of Photosystem II in plants, participates in several concerted mechanisms for regulation of the excitation energy and electron fluxes in thylakoid membranes. In part, these include interaction of LHCII with Photosystem I (PSI) enhancing the latter's absorption cross-section - for example in the well-known state 1 - state 2 transitions or as a long-term acclimation to high light. In this work we examined the capability of LHCII to deliver excitations to PSI in reconstituted membranes in vitro. Proteoliposomes with native plant thylakoid membrane lipids and different stoichiometric ratios of LHCII:PSI were reconstituted and studied by steady-state and time-resolved fluorescence spectroscopy. Fluorescence emission from LHCII was strongly decreased in PSI-LHCII membranes due to trapping of excitations by PSI. Kinetic modelling of the time-resolved fluorescence data revealed the existence of separate pools of LHCII distinguished by the time scale of energy transfer. A strongly coupled pool, equivalent to one LHCII trimer per PSI, transferred excitations to PSI with near-unity efficiency on a time scale of less than 10ps but extra LHCIIs also contributed significantly to the effective antenna size of PSI, which could be increased by up to 47% in membranes containing 3 LHCII trimers per PSI. The results demonstrate a remarkable competence of LHCII to increase the absorption cross-section of PSI, given the opportunity that the two types of complexes interact in the membrane. Copyright © 2016 Elsevier B.V. All rights reserved.

  3. Identification of chromatophore membrane protein complexes formed under different nitrogen availability conditions in Rhodospirillum rubrum

    DEFF Research Database (Denmark)

    Selao, Tiago Toscano; Branca, Rui; Chae, Pil Seok

    2011-01-01

    of two-dimensional Blue Native/SDS-PAGE and NSI-LC-LTQ-Orbitrap mass spectrometry. We have identified several membrane protein complexes, including components of the ATP synthase, reaction center, light harvesting, and NADH dehydrogenase complexes. Additionally, we have identified differentially...

  4. Microbial Adhesion and Biofilm Formation on Microfiltration Membranes: A Detailed Characterization Using Model Organisms with Increasing Complexity

    Directory of Open Access Journals (Sweden)

    L. Vanysacker

    2013-01-01

    Full Text Available Since many years, membrane biofouling has been described as the Achilles heel of membrane fouling. In the present study, an ecological assay was performed using model systems with increasing complexity: a monospecies assay using Pseudomonas aeruginosa or Escherichia coli separately, a duospecies assay using both microorganisms, and a multispecies assay using activated sludge with or without spiked P. aeruginosa. The microbial adhesion and biofilm formation were evaluated in terms of bacterial cell densities, species richness, and bacterial community composition on polyvinyldifluoride, polyethylene, and polysulfone membranes. The data show that biofouling formation was strongly influenced by the kind of microorganism, the interactions between the organisms, and the changes in environmental conditions whereas the membrane effect was less important. The findings obtained in this study suggest that more knowledge in species composition and microbial interactions is needed in order to understand the complex biofouling process. This is the first report describing the microbial interactions with a membrane during the biofouling development.

  5. Microbial Adhesion and Biofilm Formation on Microfiltration Membranes: A Detailed Characterization Using Model Organisms with Increasing Complexity

    Science.gov (United States)

    Vanysacker, L.; Denis, C.; Declerck, P.; Piasecka, A.; Vankelecom, I. F. J.

    2013-01-01

    Since many years, membrane biofouling has been described as the Achilles heel of membrane fouling. In the present study, an ecological assay was performed using model systems with increasing complexity: a monospecies assay using Pseudomonas aeruginosa or Escherichia coli separately, a duospecies assay using both microorganisms, and a multispecies assay using activated sludge with or without spiked P. aeruginosa. The microbial adhesion and biofilm formation were evaluated in terms of bacterial cell densities, species richness, and bacterial community composition on polyvinyldifluoride, polyethylene, and polysulfone membranes. The data show that biofouling formation was strongly influenced by the kind of microorganism, the interactions between the organisms, and the changes in environmental conditions whereas the membrane effect was less important. The findings obtained in this study suggest that more knowledge in species composition and microbial interactions is needed in order to understand the complex biofouling process. This is the first report describing the microbial interactions with a membrane during the biofouling development. PMID:23986906

  6. False Positive and False Negative Effects on Network Attacks

    Science.gov (United States)

    Shang, Yilun

    2018-01-01

    Robustness against attacks serves as evidence for complex network structures and failure mechanisms that lie behind them. Most often, due to detection capability limitation or good disguises, attacks on networks are subject to false positives and false negatives, meaning that functional nodes may be falsely regarded as compromised by the attacker and vice versa. In this work, we initiate a study of false positive/negative effects on network robustness against three fundamental types of attack strategies, namely, random attacks (RA), localized attacks (LA), and targeted attack (TA). By developing a general mathematical framework based upon the percolation model, we investigate analytically and by numerical simulations of attack robustness with false positive/negative rate (FPR/FNR) on three benchmark models including Erdős-Rényi (ER) networks, random regular (RR) networks, and scale-free (SF) networks. We show that ER networks are equivalently robust against RA and LA only when FPR equals zero or the initial network is intact. We find several interesting crossovers in RR and SF networks when FPR is taken into consideration. By defining the cost of attack, we observe diminishing marginal attack efficiency for RA, LA, and TA. Our finding highlights the potential risk of underestimating or ignoring FPR in understanding attack robustness. The results may provide insights into ways of enhancing robustness of network architecture and improve the level of protection of critical infrastructures.

  7. Selective transport and incorporation of highly charged metal and metal complex ions in self-assembled polyelectrolyte multilayer membranes

    International Nuclear Information System (INIS)

    Toutianoush, Ali; Tieke, Bernd

    2002-01-01

    The transport of aqueous salts containing mono-, di- and trivalent metal and tetravalent metal complex ions across ultrathin polyvinylammonium/polyvinylsulphate (PVA/PVS) membranes is described. The membranes were prepared by electrostatic layer-by-layer (LBL) assembly of the two polyelectrolytes. Using spectroscopic measurements and permeability studies, it is demonstrated that the transport of copper(II) chloride, lanthanum(III) chloride, barium chloride and potassium hexacyanoferrate(II) is accompanied by the permanent incorporation of the metal and metal complex ions in the membrane. Upon the uptake of copper, lanthanum and hexacyanoferrate ions, the membranes become cross-linked so that the permeation rates of other salts not taken up by the membrane, e.g. sodium chloride, potassium chloride and magnesium chloride, are decreased. The uptake of barium ions leads to a decrease of the cross-linking density of the membrane so that the permeation rate of NaCl is increased. Possible mechanisms for the ion uptake are discussed

  8. Complex descemet′s membrane tears and detachment during phacoemulsification

    Directory of Open Access Journals (Sweden)

    Faik Orucoglu

    2015-01-01

    Full Text Available Purpose: To report a case of complex Descemet′s membrane detachment (DMD and tears during phacoemulsification cataract surgery. Case Report: A 64-year-old woman underwent phacoemulsification surgery in her right eye and developed tears and partial loss of Descemet′s membrane (DM while the aspiration port was inserted through the main incision. Massive corneal edema obscured the view and the anterior chamber was barely visible the following day. Scheimpflug imaging was used to complement slit lamp examination in the postoperative period. Frequent topical corticosteroid drops were initiated. After 5 days of treatment, multiple tears and detachment of DM were visible and the anterior chamber was filled with air. After 5 weeks, the cornea regained much of its clarity despite large DM tears and focal loss of DM. Conclusion: Despite partial loss of DM, the corneal edema mostly disappeared after 5 weeks of air bubble injection. Scheimpflug imaging was beneficial in the diagnosis and monitoring of DM tears and detachments.

  9. Predator attack rate evolution in space: the role of ecology mediated by complex emergent spatial structure and self-shading.

    Science.gov (United States)

    Messinger, Susanna M; Ostling, Annette

    2013-11-01

    Predation interactions are an important element of ecological communities. Population spatial structure has been shown to influence predator evolution, resulting in the evolution of a reduced predator attack rate; however, the evolutionary role of traits governing predator and prey ecology is unknown. The evolutionary effect of spatial structure on a predator's attack rate has primarily been explored assuming a fixed metapopulation spatial structure, and understood in terms of group selection. But endogenously generated, emergent spatial structure is common in nature. Furthermore, the evolutionary influence of ecological traits may be mediated through the spatial self-structuring process. Drawing from theory on pathogens, the evolutionary effect of emergent spatial structure can be understood in terms of self-shading, where a voracious predator limits its long-term invasion potential by reducing local prey availability. Here we formalize the effects of self-shading for predators using spatial moment equations. Then, through simulations, we show that in a spatial context self-shading leads to relationships between predator-prey ecology and the predator's attack rate that are not expected in a non-spatial context. Some relationships are analogous to relationships already shown for host-pathogen interactions, but others represent new trait dimensions. Finally, since understanding the effects of ecology using existing self-shading theory requires simplifications of the emergent spatial structure that do not apply well here, we also develop metrics describing the complex spatial structure of the predator and prey populations to help us explain the evolutionary effect of predator and prey ecology in the context of self-shading. The identification of these metrics may provide a step towards expansion of the predictive domain of self-shading theory to more complex spatial dynamics. Copyright © 2013 Elsevier Inc. All rights reserved.

  10. Proteomic screen for multiprotein complexes in synaptic plasma membrane from rat hippocampus by blue native gel electrophoresis and tandem mass spectrometry.

    Science.gov (United States)

    Li, Xuanwen; Xie, Chunliang; Jin, Qihui; Liu, Mingjun; He, Quanyuan; Cao, Rui; Lin, Yong; Li, Jianglin; Li, Yan; Chen, Ping; Liang, Songping

    2009-07-01

    Neuronal synapses are specialized sites for information exchange between neurons. Many diseases, such as addiction and mood disorders, likely result from altered expression of synaptic proteins, or altered formation of synaptic complexes involved in neurotransmission or neuroplasticity. A detailed description of native multiprotein complexes in synaptic plasma membranes (PM) is therefore essential for understanding biological mechanisms and disease processes. For the first time in this study, two-dimensional Blue Native/SDS-PAGE electrophoresis, combined with tandem mass spectrometry, was used to screen multiprotein complexes in synaptic plasma membranes from rat hippocampus. As a result, 514 unique proteins were identified, of which 36% were integral membrane proteins. In addition, 19 potentially novel and known heterooligomeric multiprotein complexes were found, such as the SNARE and ATPase complexes. A potentially novel protein complex, involving syntaxin, synapsin I and Na+/K+ ATPase alpha-1, was further confirmed by co-immunoprecipitation and immunofluorescence staining. As demonstrated here, Blue Native-PAGE is a powerful tool for the separation of hydrophobic membrane proteins. The combination of Blue Native-PAGE and mass spectrometry could systematically identify multiprotein complexes.

  11. Simulation of Attacks for Security in Wireless Sensor Network.

    Science.gov (United States)

    Diaz, Alvaro; Sanchez, Pablo

    2016-11-18

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node's software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work.

  12. Simulation of Attacks for Security in Wireless Sensor Network

    Science.gov (United States)

    Diaz, Alvaro; Sanchez, Pablo

    2016-01-01

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node’s software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work. PMID:27869710

  13. Correlation between spatial (3D) structure of pea and bean thylakoid membranes and arrangement of chlorophyll-protein complexes.

    Science.gov (United States)

    Rumak, Izabela; Mazur, Radosław; Gieczewska, Katarzyna; Kozioł-Lipińska, Joanna; Kierdaszuk, Borys; Michalski, Wojtek P; Shiell, Brian J; Venema, Jan Henk; Vredenberg, Wim J; Mostowska, Agnieszka; Garstka, Maciej

    2012-05-25

    The thylakoid system in plant chloroplasts is organized into two distinct domains: grana arranged in stacks of appressed membranes and non-appressed membranes consisting of stroma thylakoids and margins of granal stacks. It is argued that the reason for the development of appressed membranes in plants is that their photosynthetic apparatus need to cope with and survive ever-changing environmental conditions. It is not known however, why different plant species have different arrangements of grana within their chloroplasts. It is important to elucidate whether a different arrangement and distribution of appressed and non-appressed thylakoids in chloroplasts are linked with different qualitative and/or quantitative organization of chlorophyll-protein (CP) complexes in the thylakoid membranes and whether this arrangement influences the photosynthetic efficiency. Our results from TEM and in situ CLSM strongly indicate the existence of different arrangements of pea and bean thylakoid membranes. In pea, larger appressed thylakoids are regularly arranged within chloroplasts as uniformly distributed red fluorescent bodies, while irregular appressed thylakoid membranes within bean chloroplasts correspond to smaller and less distinguished fluorescent areas in CLSM images. 3D models of pea chloroplasts show a distinct spatial separation of stacked thylakoids from stromal spaces whereas spatial division of stroma and thylakoid areas in bean chloroplasts are more complex. Structural differences influenced the PSII photochemistry, however without significant changes in photosynthetic efficiency. Qualitative and quantitative analysis of chlorophyll-protein complexes as well as spectroscopic investigations indicated a similar proportion between PSI and PSII core complexes in pea and bean thylakoids, but higher abundance of LHCII antenna in pea ones. Furthermore, distinct differences in size and arrangements of LHCII-PSII and LHCI-PSI supercomplexes between species are suggested

  14. Gamma-irradiation and neutron effect on DNA-membrane complexes of mammalian cells

    International Nuclear Information System (INIS)

    Lapidus, I.L.; Nazarov, V.M.; Ehrtsgreber, G.

    1984-01-01

    The first results of radiobiological investigations in the biophysical channel of the JINR reactor IBR-2 are presented. Sedimentation behaviour of DNA-membrane complexes has been studied at irradiation of the Chinese hamster cells (VT9-4) in a wide dose range of 137 Cs γ-irradiation and neutrons. An earlier assumption of the authors on the role of DNA double-strand breaks in changing the relative sedimentation velocity of complexes at irradiation of cells with doses over 50 Gy has been confirmed

  15. Protecting infrastructure networks from cost-based attacks

    International Nuclear Information System (INIS)

    Wang Xingang; Guan Shuguang; Lai, Choy Heng

    2009-01-01

    It is well known that heterogeneous networks are vulnerable to the intentional removal of a small fraction of highly connected or loaded nodes, implying that to protect the network effectively, the important nodes should be allocated more defense resource than the others. However, if too much resource is allocated to the few important nodes, the numerous less-important nodes will be less protected, which if attacked together can still lead to devastating damage. A natural question is therefore how to efficiently distribute the limited defense resource among the network nodes such that the network damage is minimized against any attack strategy. In this paper, taking into account the factor of attack cost, the problem of network security is reconsidered in terms of efficient network defense against cost-based attacks. The results show that, for a general complex network, there exists an optimal distribution of the defense resource with which the network is best protected from cost-based attacks. Furthermore, it is found that the configuration of the optimal defense is dependent on the network parameters. Specifically, networks of larger size, sparser connection and more heterogeneous structure will more likely benefit from the defense optimization.

  16. Cationic membranes complexed with oppositely charged microtubules: hierarchical self-assembly leading to bio-nanotubes

    International Nuclear Information System (INIS)

    Raviv, Uri; Needleman, Daniel J; Safinya, Cyrus R

    2006-01-01

    The self-assembly of microtubules and charged membranes has been studied, using x-ray diffraction and electron microscopy. Polyelectrolyte lipid complexes usually form structures templated by the lipid phase, when the polyelectrolyte curvature is much larger than the membrane spontaneous curvature. When the polyelectrolyte curvature approaches the membrane spontaneous curvature, as in microtubules, two types of new structures emerge. Depending on the conditions, vesicles either adsorb onto the microtubule, forming a 'beads on a rod' structure, or coat the microtubule, which now forms the template. Tubulin oligomers then coat the external lipid layer, forming a lipid protein nanotube. The tubulin oligomer coverage at the external layer is determined by the membrane charge density. The energy barrier between the beads on a rod and the lipid-protein nanotube states depends on the membrane bending rigidity and membrane charge density. By controlling the lipid/tubulin stoichiometry we can switch between lipid-protein nanotubes with open ends to lipid-protein nanotubes with closed end with lipid cups. This forms the basis for controlled drug encapsulation and release

  17. Robustness analysis of interdependent networks under multiple-attacking strategies

    Science.gov (United States)

    Gao, Yan-Li; Chen, Shi-Ming; Nie, Sen; Ma, Fei; Guan, Jun-Jie

    2018-04-01

    The robustness of complex networks under attacks largely depends on the structure of a network and the nature of the attacks. Previous research on interdependent networks has focused on two types of initial attack: random attack and degree-based targeted attack. In this paper, a deliberate attack function is proposed, where six kinds of deliberate attacking strategies can be derived by adjusting the tunable parameters. Moreover, the robustness of four types of interdependent networks (BA-BA, ER-ER, BA-ER and ER-BA) with different coupling modes (random, positive and negative correlation) is evaluated under different attacking strategies. Interesting conclusions could be obtained. It can be found that the positive coupling mode can make the vulnerability of the interdependent network to be absolutely dependent on the most vulnerable sub-network under deliberate attacks, whereas random and negative coupling modes make the vulnerability of interdependent network to be mainly dependent on the being attacked sub-network. The robustness of interdependent network will be enhanced with the degree-degree correlation coefficient varying from positive to negative. Therefore, The negative coupling mode is relatively more optimal than others, which can substantially improve the robustness of the ER-ER network and ER-BA network. In terms of the attacking strategies on interdependent networks, the degree information of node is more valuable than the betweenness. In addition, we found a more efficient attacking strategy for each coupled interdependent network and proposed the corresponding protection strategy for suppressing cascading failure. Our results can be very useful for safety design and protection of interdependent networks.

  18. Stimulation of DNA synthesis in bacterial DNA-membrane complexes after low doses of ionizing radiation

    Energy Technology Data Exchange (ETDEWEB)

    Watkins, D K [Hammersmith Hospital, London (UK). M.R.C. Experimental Radiopathology Unit

    1980-09-01

    DNA-membrane complexes from three strains of E. coli were irradiated and changes in the rates of DNA synthesis were observed. Doses from 1-10 krad to complexes from W3110 and pol A1 strains gave up to a 100 per cent increase in DNA synthesis; under the same conditions, no change was observed in Bsub(s-1). The degree of stimulation did not depend on the presence of oxygen during irradiation, and a post-irradiation incubation was necessary to achieve activation. The properties of all three complexes were similar when unirradiated. Irradiation of intact organisms under conditions which produced marked, oxygen-dependent inhibition of the Bsub(s-1) complex had no significant effect on those from W3110 and pol A1. Enhanced DNA synthesis is concluded to be due wholly to repair of pre-existing DNA. It is further postulated that DNA synthesis in untreated complexes (E.coli B's,W3110 and pol A1) is mainly of the repair-type and does not necessarily take place at the site of DNA-membrane attachment.

  19. Carbonic anhydrase activity of integral-functional complexes of thylakoid membranes of spinach chloroplasts

    Directory of Open Access Journals (Sweden)

    A. V. Semenihin

    2015-06-01

    Full Text Available Isolated thylakoid membranes were disrupted by treatment with nonionic detergents digitonin or dodecyl maltoside. Solubilized polypeptide complexes were separated by native gel charge shift electrophoresis. The position of ATP-synthase complex and its isolated catalytic part (CF1 within gel was determined using the color reaction for ATPase activity. Due to the presence of cytochromes, the red band in unstained gels corresponded to the cytochrome b6f complex. Localization of the cytochrome b6f complex, ATP synthase and coupling CF1 in the native gel was confirmed by their subunit composition determined after SDS-electrophoretic analysis. Carbonic anhydrase (CA activity in polypeptide zones of PS II, cytochrome b6f complex, and ATP-synthase CF1 was identified in native gels using indicator bromothymol blue. CA activity of isolated CF1 in solution was determined by infrared gas analysis as the rate of bicarbonate dehydration. The water-soluble acetazolamide, an inhibitor of CA, unlike lipophilic ethoxyzolamide inhibited CA activity of CF1. Thus, it was shown for the first time that ATP-synthase has a component which is capable of catalyzing the interconversion of forms of carbonic acid associated with proton exchange. The data obtained suggest the presence of multiple forms of carbonic anhydrase in the thylakoid membranes of spinach chloroplasts and confirm their involvement in the proton transfer to the ATP synthase.

  20. Quantum private query with perfect user privacy against a joint-measurement attack

    Energy Technology Data Exchange (ETDEWEB)

    Yang, Yu-Guang, E-mail: yangyang7357@bjut.edu.cn [College of Computer Science and Technology, Beijing University of Technology, Beijing 100124 (China); State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093 (China); Liu, Zhi-Chao [College of Computer Science and Technology, Beijing University of Technology, Beijing 100124 (China); Li, Jian [School of Computer, Beijing University of Posts and Telecommunications, Beijing 100876 (China); Chen, Xiu-Bo [Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876 (China); Zuo, Hui-Juan [College of Mathematics and Information Science, Hebei Normal University, Shijiazhuang 050024 (China); Zhou, Yi-Hua; Shi, Wei-Min [College of Computer Science and Technology, Beijing University of Technology, Beijing 100124 (China)

    2016-12-16

    The joint-measurement (JM) attack is the most powerful threat to the database security for existing quantum-key-distribution (QKD)-based quantum private query (QPQ) protocols. Wei et al. (2016) [28] proposed a novel QPQ protocol against the JM attack. However, their protocol relies on two-way quantum communication thereby affecting its real implementation and communication efficiency. Moreover, it cannot ensure perfect user privacy. In this paper, we present a new one-way QPQ protocol in which the special way of classical post-processing of oblivious key ensures the security against the JM attack. Furthermore, it realizes perfect user privacy and lower complexity of communication. - Highlights: • A special classical post-processing ensures the security against the JM attack. • It ensures perfect user privacy. • It ensures lower complexity of communication. Alice's conclusive key rate is 1/6.

  1. Quantum private query with perfect user privacy against a joint-measurement attack

    International Nuclear Information System (INIS)

    Yang, Yu-Guang; Liu, Zhi-Chao; Li, Jian; Chen, Xiu-Bo; Zuo, Hui-Juan; Zhou, Yi-Hua; Shi, Wei-Min

    2016-01-01

    The joint-measurement (JM) attack is the most powerful threat to the database security for existing quantum-key-distribution (QKD)-based quantum private query (QPQ) protocols. Wei et al. (2016) [28] proposed a novel QPQ protocol against the JM attack. However, their protocol relies on two-way quantum communication thereby affecting its real implementation and communication efficiency. Moreover, it cannot ensure perfect user privacy. In this paper, we present a new one-way QPQ protocol in which the special way of classical post-processing of oblivious key ensures the security against the JM attack. Furthermore, it realizes perfect user privacy and lower complexity of communication. - Highlights: • A special classical post-processing ensures the security against the JM attack. • It ensures perfect user privacy. • It ensures lower complexity of communication. Alice's conclusive key rate is 1/6.

  2. Chitosan-silica complex membranes from sulfonic acid functionalized silica nanoparticles for pervaporation dehydration of ethanol-water solutions.

    Science.gov (United States)

    Liu, Ying-Ling; Hsu, Chih-Yuan; Su, Yu-Huei; Lai, Juin-Yih

    2005-01-01

    Nanosized silica particles with sulfonic acid groups (ST-GPE-S) were utilized as a cross-linker for chitosan to form a chitosan-silica complex membranes, which were applied to pervaporation dehydration of ethanol-water solutions. ST-GPE-S was obtained from reacting nanoscale silica particles with glycidyl phenyl ether, and subsequent sulfonation onto the attached phenyl groups. The chemical structure of the functionalized silica was characterized with FTIR, (1)H NMR, and energy-dispersive X-ray. Homogeneous dispersion of the silica particles in chitosan was observed with electronic microscopies, and the membranes obtained were considered as nanocomposites. The silica nanoparticles in the membranes served as spacers for polymer chains to provide extra space for water permeation, so as to bring high permeation rates to the complex membranes. With addition of 5 parts per hundred of functionalized silica into chitosan, the resulting membrane exhibited a separation factor of 919 and permeation flux of 410 g/(m(2) h) in pervaporation dehydration of 90 wt % ethanol aqueous solution at 70 degrees C.

  3. Internal differential collision attacks on the reduced-round Grøstl-0 hash function

    DEFF Research Database (Denmark)

    Ideguchi, Kota; Tischhauser, Elmar Wolfgang; Preneel, Bart

    2014-01-01

    . This results in collision attacks and semi-free-start collision attacks on the Grøstl-0 hash function and compression function with reduced rounds. Specifically, we show collision attacks on the Grøstl-0-256 hash function reduced to 5 and 6 out of 10 rounds with time complexities 248 and 2112 and on the Grøstl......-0-512 hash function reduced to 6 out of 14 rounds with time complexity 2183. Furthermore, we demonstrate semi-free-start collision attacks on the Grøstl-0-256 compression function reduced to 8 rounds and the Grøstl-0-512 compression function reduced to 9 rounds. Finally, we show improved...

  4. Roles of the TRAPP-II Complex and the Exocyst in Membrane Deposition during Fission Yeast Cytokinesis.

    Directory of Open Access Journals (Sweden)

    Ning Wang

    2016-04-01

    Full Text Available The cleavage-furrow tip adjacent to the actomyosin contractile ring is believed to be the predominant site for plasma-membrane insertion through exocyst-tethered vesicles during cytokinesis. Here we found that most secretory vesicles are delivered by myosin-V on linear actin cables in fission yeast cytokinesis. Surprisingly, by tracking individual exocytic and endocytic events, we found that vesicles with new membrane are deposited to the cleavage furrow relatively evenly during contractile-ring constriction, but the rim of the cleavage furrow is the main site for endocytosis. Fusion of vesicles with the plasma membrane requires vesicle tethers. Our data suggest that the transport particle protein II (TRAPP-II complex and Rab11 GTPase Ypt3 help to tether secretory vesicles or tubulovesicular structures along the cleavage furrow while the exocyst tethers vesicles at the rim of the division plane. We conclude that the exocyst and TRAPP-II complex have distinct localizations at the division site, but both are important for membrane expansion and exocytosis during cytokinesis.

  5. NMR spectroscopic and analytical ultracentrifuge analysis of membrane protein detergent complexes

    OpenAIRE

    Choe Senyon; Riek Roland; Johnson Casey; Kefala Georgia; Maslennikov Innokentiy; Kwiatkowski Witek

    2007-01-01

    Abstract Background Structural studies of integral membrane proteins (IMPs) are hampered by inherent difficulties in their heterologous expression and in the purification of solubilized protein-detergent complexes (PDCs). The choice and concentrations of detergents used in an IMP preparation play a critical role in protein homogeneity and are thus important for successful crystallization. Results Seeking an effective and standardized means applicable to genomic approaches for the characteriza...

  6. Membrane fusion by VAMP3 and plasma membrane t-SNAREs

    International Nuclear Information System (INIS)

    Hu Chuan; Hardee, Deborah; Minnear, Fred

    2007-01-01

    Pairing of SNARE (soluble N-ethylmaleimide-sensitive factor attachment protein receptor) proteins on vesicles (v-SNAREs) and SNARE proteins on target membranes (t-SNAREs) mediates intracellular membrane fusion. VAMP3/cellubrevin is a v-SNARE that resides in recycling endosomes and endosome-derived transport vesicles. VAMP3 has been implicated in recycling of transferrin receptors, secretion of α-granules in platelets, and membrane trafficking during cell migration. Using a cell fusion assay, we examined membrane fusion capacity of the ternary complexes formed by VAMP3 and plasma membrane t-SNAREs syntaxin1, syntaxin4, SNAP-23 and SNAP-25. VAMP3 forms fusogenic pairing with t-SNARE complexes syntaxin1/SNAP-25, syntaxin1/SNAP-23 and syntaxin4/SNAP-25, but not with syntaxin4/SNAP-23. Deletion of the N-terminal domain of syntaxin4 enhanced membrane fusion more than two fold, indicating that the N-terminal domain negatively regulates membrane fusion. Differential membrane fusion capacities of the ternary v-/t-SNARE complexes suggest that transport vesicles containing VAMP3 have distinct membrane fusion kinetics with domains of the plasma membrane that present different t-SNARE proteins

  7. Trafficking of plant plasma membrane aquaporins: multiple regulation levels and complex sorting signals.

    Science.gov (United States)

    Chevalier, Adrien S; Chaumont, François

    2015-05-01

    Aquaporins are small channel proteins which facilitate the diffusion of water and small neutral molecules across biological membranes. Compared with animals, plant genomes encode numerous aquaporins, which display a large variety of subcellular localization patterns. More specifically, plant aquaporins of the plasma membrane intrinsic protein (PIP) subfamily were first described as plasma membrane (PM)-resident proteins, but recent research has demonstrated that the trafficking and subcellular localization of these proteins are complex and highly regulated. In the past few years, PIPs emerged as new model proteins to study subcellular sorting and membrane dynamics in plant cells. At least two distinct sorting motifs (one cytosolic, the other buried in the membrane) are required to direct PIPs to the PM. Hetero-oligomerization and interaction with SNAREs (soluble N-ethylmaleimide-sensitive factor protein attachment protein receptors) also influence the subcellular trafficking of PIPs. In addition to these constitutive processes, both the progression of PIPs through the secretory pathway and their dynamics at the PM are responsive to changing environmental conditions. © The Author 2014. Published by Oxford University Press on behalf of Japanese Society of Plant Physiologists. All rights reserved. For permissions, please email: journals.permissions@oup.com.

  8. Formation of complexes between functionalized chitosan membranes and copper: A study by angle resolved XPS

    Energy Technology Data Exchange (ETDEWEB)

    Jurado-López, Belén [Departamento de Química Inorgánica, Facultad de Ciencias, Universidad de Málaga, 29071 Málaga (Spain); Vieira, Rodrigo Silveira [Chemical Engineering Department, Universidade Federal do Ceará, UFC, 60455-760 Fortaleza, CE (Brazil); Rabelo, Rodrigo Balloni; Beppu, Marisa Masumi [School of Chemical Engineering, University of Campinas, UNICAMP, P.O. Box 6066, 13081-970 Campinas, SP (Brazil); Casado, Juan [Departamento de Química-Física, Facultad de Ciencias, Universidad de Málaga, 29071 Málaga (Spain); Rodríguez-Castellón, Enrique, E-mail: castellon@uma.es [Departamento de Química Inorgánica, Facultad de Ciencias, Universidad de Málaga, 29071 Málaga (Spain)

    2017-01-01

    Chitosan is a biopolymer with potential applications in various fields. Recently, it has been used for heavy metals removal like copper, due to the presence of amino and hydroxyl groups in its structure. Chitosan membranes were crosslinked with epichlorohydrin and bisoxirano and functionalized with chelating agents, such as iminodiacetic acid, aspartic acid and tris-(2-amino-ethyl) polyamine. These membranes were used for copper adsorption and the formed complexes were characterized. Thermal and crystalline properties of chitosan membranes were studied by TG-DCS and X-ray diffraction. Raman, XPS and FT-IR data confirmed that copper is linked to the modified chitosan membranes by the amino groups. The oxidation state of copper-chitosan membranes were also studied by angle resolved XPS, and by UV–Vis diffuse reflectance spectroscopy. - Highlights: • Chitosan membranes were crosslinked with epichlorohydrin and bisoxirano and functionalized with chelating agents. • The chelating agent were iminodiacetic acid, aspartic acid and tris-(2-amino-ethyl) polyamine. • The functionalized membranes were used for copper adsorption and studied by ARXPS, Raman, TG-DCS, FT-IR and XRD. • Spectroscopic data confirmed that copper is linked to the modified chitosan membranes by the amino groups.

  9. Crystal structure of the potassium-importing KdpFABC membrane complex

    Energy Technology Data Exchange (ETDEWEB)

    Huang, Ching-Shin; Pedersen, Bjørn Panyella; Stokes, David L.

    2017-06-21

    Cellular potassium import systems play a fundamental role in osmoregulation, pH homeostasis and membrane potential in all domains of life. In bacteria, the kdp operon encodes a four-subunit potassium pump that maintains intracellular homeostasis, cell shape and turgor under conditions in which potassium is limiting1. This membrane complex, called KdpFABC, has one channel-like subunit (KdpA) belonging to the superfamily of potassium transporters and another pump-like subunit (KdpB) belonging to the superfamily of P-type ATPases. Although there is considerable structural and functional information about members of both superfamilies, the mechanism by which uphill potassium transport through KdpA is coupled with ATP hydrolysis by KdpB remains poorly understood. Here we report the 2.9 Å X-ray structure of the complete Escherichia coli KdpFABC complex with a potassium ion within the selectivity filter of KdpA and a water molecule at a canonical cation site in the transmembrane domain of KdpB. The structure also reveals two structural elements that appear to mediate the coupling between these two subunits. Specifically, a protein-embedded tunnel runs between these potassium and water sites and a helix controlling the cytoplasmic gate of KdpA is linked to the phosphorylation domain of KdpB. On the basis of these observations, we propose a mechanism that repurposes protein channel architecture for active transport across biomembranes.

  10. The restoration of DNA-membrane complex of Bacillus subtilis after γ-irradiation

    International Nuclear Information System (INIS)

    Chefranova, O.A.; Gaziev, A.I.

    1979-01-01

    It is shown that structural damages arising in DNA-membrane complexes (DMA) of Bacillus subtillis after γ-irradiation are reversible in the postradiation period. The ability of bacteria to restore radiation damage of DMA correlates with their radiosensitivity. DMA restoration process is supposed to depend on the products of PoIA and rec A genes

  11. Strengthening Crypto-1 Cipher Against Algebraic Attacks

    Directory of Open Access Journals (Sweden)

    Farah Afianti

    2015-08-01

    Full Text Available In the last few years, several studies addressed the problem of data security in Mifare Classic. One of its weaknesses is the low random number quality. This causes SAT solver attacks to have lower complexity. In order to strengthen Crypto-1 against SAT solver attacks, a modification of the feedback function with better cryptographic properties is proposed. It applies a primitive polynomial companion matrix. SAT solvers cannot directly attack the feedback shift register that uses the modified Boolean feedback function, the register has to be split into smaller groups. Experimental testing showed that the amount of memory and CPU time needed were highest when attacking the modified Crypto-1 using the modified feedback function and the original filter function. In addition, another modified Crypto-1, using the modified feedback function and a modified filter function, had the lowest percentage of revealed variables. It can be concluded that the security strength and performance of the modified Crypto-1 using the modified feedback function and the modified filter function are better than those of the original Crypto-1.

  12. Taxonomies for Reasoning About Cyber-physical Attacks in IoT-based Manufacturing Systems

    Directory of Open Access Journals (Sweden)

    Yao Pan

    2017-03-01

    Full Text Available The Internet of Things (IoT has transformed many aspects of modern manufacturing, from design to production to quality control. In particular, IoT and digital manufacturing technologies have substantially accelerated product development- cycles and manufacturers can now create products of a complexity and precision not heretofore possible. New threats to supply chain security have arisen from connecting machines to the Internet and introducing complex IoT-based systems controlling manufacturing processes. By attacking these IoT-based manufacturing systems and tampering with digital files, attackers can manipulate physical characteristics of parts and change the dimensions, shapes, or mechanical properties of the parts, which can result in parts that fail in the field. These defects increase manufacturing costs and allow silent problems to occur only under certain loads that can threaten safety and/or lives. To understand potential dangers and protect manufacturing system safety, this paper presents two taxonomies: one for classifying cyber-physical attacks against manufacturing processes and another for quality control measures for counteracting these attacks. We systematically identify and classify possible cyber-physical attacks and connect the attacks with variations in manufacturing processes and quality control measures. Our taxonomies also provide a scheme for linking emerging IoT-based manufacturing system vulnerabilities to possible attacks and quality control measures.

  13. The absence of chlorophyll b affects lateral mobility of photosynthetic complexes and lipids in grana membranes of Arabidopsis and barley chlorina mutants.

    Science.gov (United States)

    Tyutereva, Elena V; Evkaikina, Anastasiia I; Ivanova, Alexandra N; Voitsekhovskaja, Olga V

    2017-09-01

    The lateral mobility of integral components of thylakoid membranes, such as plastoquinone, xanthophylls, and pigment-protein complexes, is critical for the maintenance of efficient light harvesting, high rates of linear electron transport, and successful repair of damaged photosystem II (PSII). The packaging of the photosynthetic pigment-protein complexes in the membrane depends on their size and stereometric parameters which in turn depend on the composition of the complexes. Chlorophyll b (Chlb) is an important regulator of antenna size and composition. In this study, the lateral mobility (the mobile fraction size) of pigment-protein complexes and lipids in grana membranes was analyzed in chlorina mutants of Arabidopsis and barley lacking Chlb. In the Arabidopsis ch1-3 mutant, diffusion of membrane lipids decreased as compared to wild-type plants, but the diffusion of photosynthetic complexes was not affected. In the barley chlorina f2 3613 mutant, the diffusion of pigment-protein complexes significantly decreased, while the diffusion of lipids increased, as compared to wild-type plants. We propose that the size of the mobile fractions of pigment-protein complexes in grana membranes in vivo is higher than reported previously. The data are discussed in the context of the protein composition of antennae, characteristics of the plastoquinone pool, and production of reactive oxygen species in leaves of chlorina mutants.

  14. Determinants for membrane association and permeabilization of the coxsackievirus 2B protein and the identification of the Golgi complex as the target organelle.

    Science.gov (United States)

    de Jong, Arjan S; Wessels, Els; Dijkman, Henri B P M; Galama, Jochem M D; Melchers, Willem J G; Willems, Peter H G M; van Kuppeveld, Frank J M

    2003-01-10

    The 2B protein of enterovirus is responsible for the alterations in the permeability of secretory membranes and the plasma membrane in infected cells. The structural requirements for the membrane association and the subcellular localization of this essential virus protein, however, have not been defined. Here, we provide evidence that the 2B protein is an integral membrane protein in vivo that is predominantly localized at the Golgi complex upon individual expression. Addition of organelle-specific targeting signals to the 2B protein revealed that the Golgi localization is an absolute prerequisite for the ability of the protein to modify plasma membrane permeability. Expression of deletion mutants and heterologous proteins containing specific domains of the 2B protein demonstrated that each of the two hydrophobic regions could mediate membrane binding individually. However, the presence of both hydrophobic regions was required for the correct membrane association, efficient Golgi targeting, and the membrane-permeabilizing activity of the 2B protein, suggesting that the two hydrophobic regions are cooperatively involved in the formation of a membrane-integral complex. The formation of membrane-integral pores by the 2B protein in the Golgi complex and the possible mechanism by which a Golgi-localized virus protein modifies plasma membrane permeability are discussed.

  15. Comparing Alternatives to Measure the Impact of DDoS Attack Announcements on Target Stock Prices

    NARCIS (Netherlands)

    Abhishta,; Joosten, Reinoud; Nieuwenhuis, Lambert J.M.

    2017-01-01

    Distributed denial of service (DDoS) attacks are responsible for creating unavailability of online resources. Botnets based on internet of things (IOT) devices are now being used to conduct DDoS attacks. The estimation of direct and indirect economic damages caused by these attacks is a complex

  16. Network resilience against intelligent attacks constrained by the degree-dependent node removal cost

    International Nuclear Information System (INIS)

    Annibale, A; Coolen, A C C; Bianconi, G

    2010-01-01

    We study the resilience of complex networks against attacks in which nodes are targeted intelligently, but where disabling a node has a cost to the attacker which depends on its degree. Attackers have to meet these costs with limited resources, which constrains their actions. A network's integrity is quantified in terms of the efficacy of the process that it supports. We calculate how the optimal attack strategy and the most attack-resistant network degree statistics depend on the node removal cost function and the attack resources. The resilience of networks against intelligent attacks is found to depend strongly on the node removal cost function faced by the attacker. In particular, if node removal costs increase sufficiently fast with the node degree, power law networks are found to be more resilient than Poissonian ones, even against optimized intelligent attacks. For cost functions increasing quadratically in the node degrees, intelligent attackers cannot damage the network more than random damages would.

  17. The sources of primary data for the development potentially dangerous patterns of cyber-attacks

    OpenAIRE

    Грищук, Руслан Валентинович; Житомирський військовий інститут імені С. П. Корольова; Охрімчук, Володимир Васильович; Житомирський військовий інститут імені С. П. Корольова; Ахтирцева, Влада Сергіївна; в/ч А1912

    2016-01-01

    It was established fact that the efficiency of modern systems of information and cyber security essentially de-pends on correct and timely development by vendors of antivirus software patterns of the detected cyber-attacks and timely update databases pattern of attacks these users of security. However, the constant improvement of the technological complexity of cyber-attacks requires from vendors constant improvement of mechanisms of development patterns of cyber-attacks. One of the promising...

  18. Large-scale preparation of the homogeneous LolA–lipoprotein complex and efficient in vitro transfer of lipoproteins to the outer membrane in a LolB-dependent manner

    OpenAIRE

    Watanabe, Shoji; Oguchi, Yuki; Yokota, Naoko; Tokuda, Hajime

    2007-01-01

    An ATP-binding cassette transporter LolCDE complex of Escherichia coli releases lipoproteins destined to the outer membrane from the inner membrane as a complex with a periplasmic chaperone, LolA. Interaction of the LolA–lipoprotein complex with an outer membrane receptor, LolB, then causes localization of lipoproteins to the outer membrane. As far as examined, formation of the LolA–lipoprotein complex strictly depends on ATP hydrolysis by the LolCDE complex in the presence of LolA. It has be...

  19. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    The need to assess security and take protection decisions is at least as old as our civilisation. However, the complexity and development speed of our interconnected technical systems have surpassed our capacity to imagine and evaluate risk scenarios. This holds in particular for risks...... that are caused by the strategic behaviour of adversaries. Therefore, technology-supported methods are needed to help us identify and manage these risks. In this paper, we describe the attack navigator: a graph-based approach to security risk assessment inspired by navigation systems. Based on maps of a socio...

  20. [Comparative analysis of phenomenology of paroxysms of atrial fibrillation and panic attacks].

    Science.gov (United States)

    San'kova, T A; Solov'eva, A D; Nedostup, A V

    2004-01-01

    To study phenomenology of attacks of atrial fibrillation (AF) and to compare it with phenomenology of panic attacks for elucidation of pathogenesis of atrial fibrillation and for elaboration of rational therapeutic intervention including those aimed at correction of psychovegetative abnormalities. Patients with nonrheumatic paroxysmal AF (n=105) and 100 patients with panic attacks (n=100). Clinical, cardiological and neurological examination, analysis of patients complaints during attacks of AF, and comparison them with diagnostic criteria for panic attack. It was found that clinical picture of attacks of AF comprised vegetative, emotional and functional neurological phenomena similar to those characteristic for panic attacks. This similarity as well as positive therapeutic effect of clonazepam allowed to propose a novel pathogenic mechanism of AF attacks. Severity of psychovegetative disorders during paroxysm of AF could be evaluated by calculation of psychovegetative iudex: Psychovegetative index should be used for detection of panic attack-like component in clinical picture of AF paroxysm and thus for determination of indications for inclusion of vegetotropic drugs, e. g. clonazepam, in complex preventive therapy.

  1. Mitochondrial cardiolipin/phospholipid trafficking: the role of membrane contact site complexes and lipid transfer proteins.

    Science.gov (United States)

    Schlattner, Uwe; Tokarska-Schlattner, Malgorzata; Rousseau, Denis; Boissan, Mathieu; Mannella, Carmen; Epand, Richard; Lacombe, Marie-Lise

    2014-04-01

    Historically, cellular trafficking of lipids has received much less attention than protein trafficking, mostly because its biological importance was underestimated, involved sorting and translocation mechanisms were not known, and analytical tools were limiting. This has changed during the last decade, and we discuss here some progress made in respect to mitochondria and the trafficking of phospholipids, in particular cardiolipin. Different membrane contact site or junction complexes and putative lipid transfer proteins for intra- and intermembrane lipid translocation have been described, involving mitochondrial inner and outer membrane, and the adjacent membranes of the endoplasmic reticulum. An image emerges how cardiolipin precursors, remodeling intermediates, mature cardiolipin and its oxidation products could migrate between membranes, and how this trafficking is involved in cardiolipin biosynthesis and cell signaling events. Particular emphasis in this review is given to mitochondrial nucleoside diphosphate kinase D and mitochondrial creatine kinases, which emerge to have roles in both, membrane junction formation and lipid transfer. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  2. Coordination kinetics of different metal ions with the amidoximated polyacrylonitrile nanofibrous membranes and catalytic behaviors of their complexes

    Energy Technology Data Exchange (ETDEWEB)

    Li, Fu; Dong, Yong Chun; Kang, Wei Min; Cheng, Bowen; Qu, Xiang; Cui, Guixin [School of Textiles, Tianjin Polytechnic University, Tianjin (China)

    2016-12-15

    Two transition metal ions (Fe{sup 3+} and Cu{sup 2+}) and a rare earth metal ion (Ce{sup 3+}) were selected to coordinate with amidoximated polyacrylonitrile (PAN) nanofibrous membrane for preparing three metal modified PAN nanofibrous membrane complexes (M-AO-n-PANs, M = Fe, Cu, or Ce) as the heterogeneous Fenton catalysts for the dye degradation in water under visible irradiation. The coordination kinetics of three metal ions with modified PAN nanofibrous membranes was studied and the catalytic properties of the resulting complexes were also compared. The results indicated that increasing metal ion concentrations in solution or higher coordination temperature led to a significant increase in metal content, particularly in Fe and Cu contents of the complexes. Their coordination process could be described using Langmuir isotherm and pseudo-second-order kinetic equations. Moreover, Fe-AO-n-PAN had the best photocatalytic efficiency for the dye degradation in acidic medium, but a lower photocatalytic activity than Cu-AO-n-PAN in alkali medium.

  3. [Effect of damage integrity rat brain synaptic membranes on the functional activity GABA(A)-receptor/Cl(-)-ionophore complex in the CNC].

    Science.gov (United States)

    Rebrov, I G; Kalinina, M V

    2013-01-01

    Functional activity of the CGABA(A)-receptor/Cl(-) ionophore complex was investigated the muscimol-stimulated entry of the radioactive isotope 36Cl(-) in synaptoneurosomes in changing the structure and permeability of neuronal membranes. Integrity of the membranes was damaged by removal of Ca(+2) and Mg(+2) from the incubation medium and by the method of freezing-thawing synaptoneurosomes. In both cases, an increase in basal 36Cl(-) entry into synaptoneurosomes, indicating increased nonspecific permeability of neuronal membranes, and decreased activity the CABA(A)-receptor/Cl(-) ionophore complex. The conclusion about the relationship of processes damage neuronal membranes and reducing the inhibitory processes in the epileptic focus.

  4. Targeting and Assembly of Components of the TOC Protein Import Complex at the Chloroplast Outer Envelope Membrane

    Directory of Open Access Journals (Sweden)

    Lynn G.L. Richardson

    2014-06-01

    Full Text Available The translocon at the outer envelope membrane of chloroplasts (TOC initiates the import of thousands of nuclear encoded preproteins required for chloroplast biogenesis and function. The multimeric TOC complex contains two GTP-regulated receptors, Toc34 and Toc159, which recognize the transit peptides of preproteins and initiate protein import through a β–barrel membrane channel, Toc75. Different isoforms of Toc34 and Toc159 assemble with Toc75 to form structurally and functionally diverse translocons, and the composition and levels of TOC translocons is required for the import of specific subsets of coordinately expressed proteins during plant growth and development. Consequently, the proper assembly of the TOC complexes is key to ensuring organelle homeostasis. This review will focus on our current knowledge of the targeting and assembly of TOC components to form functional translocons at the outer membrane. Our analyses reveal that the targeting of TOC components involves elements common to the targeting of other outer membrane proteins, but also include unique features that appear to have evolved to specifically facilitate assembly of the import apparatus.

  5. Targeting and assembly of components of the TOC protein import complex at the chloroplast outer envelope membrane.

    Science.gov (United States)

    Richardson, Lynn G L; Paila, Yamuna D; Siman, Steven R; Chen, Yi; Smith, Matthew D; Schnell, Danny J

    2014-01-01

    The translocon at the outer envelope membrane of chloroplasts (TOC) initiates the import of thousands of nuclear encoded preproteins required for chloroplast biogenesis and function. The multimeric TOC complex contains two GTP-regulated receptors, Toc34 and Toc159, which recognize the transit peptides of preproteins and initiate protein import through a β-barrel membrane channel, Toc75. Different isoforms of Toc34 and Toc159 assemble with Toc75 to form structurally and functionally diverse translocons, and the composition and levels of TOC translocons is required for the import of specific subsets of coordinately expressed proteins during plant growth and development. Consequently, the proper assembly of the TOC complexes is key to ensuring organelle homeostasis. This review will focus on our current knowledge of the targeting and assembly of TOC components to form functional translocons at the outer membrane. Our analyses reveal that the targeting of TOC components involves elements common to the targeting of other outer membrane proteins, but also include unique features that appear to have evolved to specifically facilitate assembly of the import apparatus.

  6. Improved meet-in-the-middle attacks on reduced-round Piccolo

    DEFF Research Database (Denmark)

    Liu, Ya; Cheng, Liang; Liu, Zhiqiang

    2018-01-01

    Piccolo is a lightweight block cipher that adopts a generalized Feistel network structure with 4 branches, each of which is 16 bit long. The key length is 80 or 128 bit, denoted by Piccolo-80 and Piccolo-128, respectively. In this paper, we mounted meet-in-the-middle attacks on 14-round Piccolo-80...... and at the end, respectively. Based on this structure, we mounted an attack on 14-round Piccolo-80 from the 5th round to the 18th round. The data, time, and memory complexities were 252 chosen plaintexts, 267.44 encryptions, and 264.91 blocks, respectively. For Piccolo-128, we built a 7-round distinguisher...... to attack 18-round Piccolo-128 from the 4th round to the 21st round. The data, time, and memory complexities were 252 chosen plaintexts, 2126.63 encryptions, and 2125.29 blocks, respectively. If not considering results on biclique cryptanalysis, these are currently the best public results on this reduced...

  7. Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers

    NARCIS (Netherlands)

    Pieters, Wolter; Davarynejad, Mohsen

    2015-01-01

    Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of multiple steps and alternative paths. It is possible to derive properties of the overall attacks from properties of individual steps, such as cost for the attacker and probability of success. However, in

  8. A simple coherent attack and practical security of differential phase shift quantum cryptography

    International Nuclear Information System (INIS)

    Kronberg, D A

    2014-01-01

    The differential phase shift quantum key distribution protocol reveals good security against such powerful attacks as unambiguous state discrimination and beam splitting attacks. Its complete security analysis is complex due to high dimensions of the supposed spaces and density operators. In this paper, we consider a particular and conceptually simple coherent attack, available in practical implementations. The main condition for this attack is the length of used coherent state tuples of order 8–12. We show that under this condition, no high level of practical distance between legitimate users can be achieved. (paper)

  9. Electrospinning fabrication and oxygen sensing properties of Cu(I) complex-polystyrene composite microfibrous membranes

    Energy Technology Data Exchange (ETDEWEB)

    Wang Liyan, E-mail: wanglykmmc@163.co [Department of Orthodontics, School of Stomatology, Fourth Military Medical University, XiAn (China); Xu Yun [Department of Orthodontics, School of Stomatology, KunMing Medical College, Kunming (China); Lin Zhu [Department of Orthodontics, School of Stomatology, Fourth Military Medical University, XiAn (China); Zhao Ning [Department of Orthodontics, School of Stomatology, West China College, SiChuan University, ChengDu (China); Xu Yanhua [Department of Orthodontics, School of Stomatology, KunMing Medical College, Kunming (China)

    2011-07-15

    In this paper, a phosphorescent Cu(I) complex of [Cu(POP)(ECI-Phen)]BF{sub 4}, where POP=bis[2-(diphenylphosphino)phenyl]ether, and ECI-Phen=1-ethyl-2-(N-ethyl-carbazole-yl-4-)imidazo[4,5-f]1,10-phenanthroline, is incorporated into a polystyrene matrix of polystyrene (PS) to form microfibers membranes. The possibility of using the resulted composite microfibrous membranes as an optical oxygen sensor is explored. Good linearity and short response time are obtained with a sensitivity of 9.8. These results suggest that phosphorescent [Cu(POP)(ECI-Phen)]BF{sub 4} is a promising candidate for oxygen-sensors and PS is an excellent matrix for oxygen sensing material because it owns a large surface-area-to-volume ratio and can supply a homogeneous matrix for probe molecules. Further analysis suggests that the molecular structure of diamine ligand in Cu(I) complexes is critical for sensitivity due to the characteristic electronic structure of excited state Cu(I) complexes. - Highlights: {yields} Cu(I) complex is incorporated into polystyrene matrix to form nanofibers. {yields} Resulted sample exhibit good linearity and short response time. {yields} PS is an excellent matrix for oxygen sensing material for probe molecules. {yields} Molecular structure of diamine ligand is critical for sensitivity.

  10. Electrospinning fabrication and oxygen sensing properties of Cu(I) complex-polystyrene composite microfibrous membranes

    International Nuclear Information System (INIS)

    Wang Liyan; Xu Yun; Lin Zhu; Zhao Ning; Xu Yanhua

    2011-01-01

    In this paper, a phosphorescent Cu(I) complex of [Cu(POP)(ECI-Phen)]BF 4 , where POP=bis[2-(diphenylphosphino)phenyl]ether, and ECI-Phen=1-ethyl-2-(N-ethyl-carbazole-yl-4-)imidazo[4,5-f] 1,10-phenanthroline, is incorporated into a polystyrene matrix of polystyrene (PS) to form microfibers membranes. The possibility of using the resulted composite microfibrous membranes as an optical oxygen sensor is explored. Good linearity and short response time are obtained with a sensitivity of 9.8. These results suggest that phosphorescent [Cu(POP)(ECI-Phen)]BF 4 is a promising candidate for oxygen-sensors and PS is an excellent matrix for oxygen sensing material because it owns a large surface-area-to-volume ratio and can supply a homogeneous matrix for probe molecules. Further analysis suggests that the molecular structure of diamine ligand in Cu(I) complexes is critical for sensitivity due to the characteristic electronic structure of excited state Cu(I) complexes. - Highlights: → Cu(I) complex is incorporated into polystyrene matrix to form nanofibers. → Resulted sample exhibit good linearity and short response time. → PS is an excellent matrix for oxygen sensing material for probe molecules. → Molecular structure of diamine ligand is critical for sensitivity.

  11. Study the effect of ion-complex on the properties of composite gel polymer electrolyte based on Electrospun PVdF nanofibrous membrane

    International Nuclear Information System (INIS)

    Li, Weili; Xing, Yujin; Wu, Yuhui; Wang, Jiawei; Chen, Lizhuang; Yang, Gang; Tang, Benzhong

    2015-01-01

    In this paper, nanofibrous membranes based on poly(vinylidene fluoride) (PVdF) doped with ion-complex (SiO 2 -PAALi) were prepared by electrospinning technique and the corresponding composite gel-polymer electrolytes (CGPEs) were obtained after being activated in liquid electrolyte. The microstructure, physical and electrochemical performances of the nanofibrous membranes and the corresponding CGPEs were studied by various measurements such as Fourier Transform Infrared Spectroscopy(FTIR), Scanning Electron Microscope (SEM), Differential Scanning Calorimetry (DSC), Thermal Gravimetric Analysis (TGA), Stress-strain test, Linear Sweep Voltammetry (LSV), AC impedance measurement and Charge/discharge cycle test. As to the ion-complex doped nanofibrous membranes, PVdF can provide mechanical support with network structure composed of fully interconnection; while the ion-complexes are absorbed onto the surface of the PVdF nanofibers evenly instead of being aggregated. With the help of doped ion-complex, the prepared nanofibrous membranes present good liquid electrolyte absorbability, excellent mechanical performance, and high decomposition temperature. For the corresponding CGPEs, they possess high ionic conductivity, wide electrochemical window, and good charge/discharge cycle performance

  12. Signal signature and transcriptome changes of Arabidopsis during pathogen and insect attack.

    Science.gov (United States)

    De Vos, Martin; Van Oosten, Vivian R; Van Poecke, Remco M P; Van Pelt, Johan A; Pozo, Maria J; Mueller, Martin J; Buchala, Antony J; Métraux, Jean-Pierre; Van Loon, L C; Dicke, Marcel; Pieterse, Corné M J

    2005-09-01

    Plant defenses against pathogens and insects are regulated differentially by cross-communicating signaling pathways in which salicylic acid (SA), jasmonic acid (JA), and ethylene (ET) play key roles. To understand how plants integrate pathogen- and insect-induced signals into specific defense responses, we monitored the dynamics of SA, JA, and ET signaling in Arabidopsis after attack by a set of microbial pathogens and herbivorous insects with different modes of attack. Arabidopsis plants were exposed to a pathogenic leaf bacterium (Pseudomonas syringae pv. tomato), a pathogenic leaf fungus (Alternaria brassicicola), tissue-chewing caterpillars (Pieris rapae), cell-content-feeding thrips (Frankliniella occidentalis), or phloem-feeding aphids (Myzus persicae). Monitoring the signal signature in each plant-attacker combination showed that the kinetics of SA, JA, and ET production varies greatly in both quantity and timing. Analysis of global gene expression profiles demonstrated that the signal signature characteristic of each Arabidopsis-attacker combination is orchestrated into a surprisingly complex set of transcriptional alterations in which, in all cases, stress-related genes are overrepresented. Comparison of the transcript profiles revealed that consistent changes induced by pathogens and insects with very different modes of attack can show considerable overlap. Of all consistent changes induced by A. brassicicola, Pieris rapae, and E occidentalis, more than 50% also were induced consistently by P. syringae. Notably, although these four attackers all stimulated JA biosynthesis, the majority of the changes in JA-responsive gene expression were attacker specific. All together, our study shows that SA, JA, and ET play a primary role in the orchestration of the plant's defense response, but other regulatory mechanisms, such as pathway cross-talk or additional attacker-induced signals, eventually shape the highly complex attacker-specific defense response.

  13. Isolation of Synaptosomes, Synaptic Plasma Membranes, and Synaptic Junctional Complexes.

    Science.gov (United States)

    Michaelis, Mary L; Jiang, Lei; Michaelis, Elias K

    2017-01-01

    Isolation of synaptic nerve terminals or synaptosomes provides an opportunity to study the process of neurotransmission at many levels and with a variety of approaches. For example, structural features of the synaptic terminals and the organelles within them, such as synaptic vesicles and mitochondria, have been elucidated with electron microscopy. The postsynaptic membranes are joined to the presynaptic "active zone" of transmitter release through cell adhesion molecules and remain attached throughout the isolation of synaptosomes. These "post synaptic densities" or "PSDs" contain the receptors for the transmitters released from the nerve terminals and can easily be seen with electron microscopy. Biochemical and cell biological studies with synaptosomes have revealed which proteins and lipids are most actively involved in synaptic release of neurotransmitters. The functional properties of the nerve terminals, such as responses to depolarization and the uptake or release of signaling molecules, have also been characterized through the use of fluorescent dyes, tagged transmitters, and transporter substrates. In addition, isolated synaptosomes can serve as the starting material for the isolation of relatively pure synaptic plasma membranes (SPMs) that are devoid of organelles from the internal environment of the nerve terminal, such as mitochondria and synaptic vesicles. The isolated SPMs can reseal and form vesicular structures in which transport of ions such as sodium and calcium, as well as solutes such as neurotransmitters can be studied. The PSDs also remain associated with the presynaptic membranes during isolation of SPM fractions, making it possible to isolate the synaptic junctional complexes (SJCs) devoid of the rest of the plasma membranes of the nerve terminals and postsynaptic membrane components. Isolated SJCs can be used to identify the proteins that constitute this highly specialized region of neurons. In this chapter, we describe the steps involved

  14. Membrane transporters and drought resistance – a complex issue

    Directory of Open Access Journals (Sweden)

    Karolina Maria Jarzyniak

    2014-12-01

    Full Text Available Land plants have evolved complex adaptation strategies to survive changes in water status in the environment. Understanding the molecular nature of such adaptive changes allows the development of rapid innovations to improve crop performance. Plant membrane transport systems play a significant role when adjusting to water scarcity. Here we put proteins participating in transmembrane allocations of various molecules in the context of stomatal, cuticular and root responses, representing a part of the drought resistance strategy. Their role in the transport of signaling molecules, ions or osmolytes is summarized and the challenge of the forthcoming research, resulting from the recent discoveries, is highlighted.

  15. The survival of Teredo navalis L. in timber wrapped in TERRAM4000 and a plastic membrane

    DEFF Research Database (Denmark)

    Eriksen, Anne Marie; Gregory, D. J.; Botfeldt, Knud Bo

    2014-01-01

    had been confirmed, the blocks were removed and wrapped in either TERRAM4000 (polypropylene and polyethylene) or a proprietary plastic membrane (polyethylene), normally used on fishing piles or piers, as a protection against shipworm in Denmark. An optical oxygen sensor was packed together with each...... block to measure the amount of available oxygen around the wood. After one week the oxygen level around the test blocks wrapped in the plastic membrane had dropped drastically and lead to the death of all shipworms within the test blocks after one-four weeks. Although no new shipworm attacked the wood...... plastic materials (TERRAM4000 and a plastic membrane) to stop both initial attack by T. navalis and their effects on wood with active woodborer degradation. Blocks of pinewood were submerged in the southern part of the Kattegat in Denmark, where shipworm is known to be prolific. After settling and attack...

  16. Strategic defense and attack for reliability systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2008-01-01

    This article illustrates a method by which arbitrarily complex series/parallel reliability systems can be analyzed. The method is illustrated with the series-parallel and parallel-series systems. Analytical expressions are determined for the investments and utilities of the defender and the attacker, depend on their unit costs of investment for each component, the contest intensity for each component, and their evaluations of the value of system functionality. For a series-parallel system, infinitely many components in parallel benefit the defender maximally regardless of the finite number of parallel subsystems in series. Conversely, infinitely many components in series benefit the attacker maximally regardless of the finite number of components in parallel in each subsystem. For a parallel-series system, the results are opposite. With equivalent components, equal unit costs for defender and attacker, equal intensity for all components, and equally many components in series and parallel, the defender always prefers the series-parallel system rather than the parallel-series system, and converse holds for the attacker. Hence from the defender's perspective, ceteris paribus, the series-parallel system is more reliable, and has fewer 'cut sets' or failure modes

  17. Higher Order Differential Attack on 6-Round MISTY1

    Science.gov (United States)

    Tsunoo, Yukiyasu; Saito, Teruo; Nakashima, Hiroki; Shigeri, Maki

    MISTY1 is a 64-bit block cipher that has provable security against differential and linear cryptanalysis. MISTY1 is one of the algorithms selected in the European NESSIE project, and it has been recommended for Japanese e-Government ciphers by the CRYPTREC project. This paper reports a previously unknown higher order differential characteristic of 4-round MISTY1 with the FL functions. It also shows that a higher order differential attack that utilizes this newly discovered characteristic is successful against 6-round MISTY1 with the FL functions. This attack can recover a partial subkey with a data complexity of 253.7 and a computational complexity of 264.4, which is better than any previous cryptanalysis of MISTY1.

  18. Subunit Organisation of In Vitro Reconstituted HOPS and CORVET Multisubunit Membrane Tethering Complexes

    Science.gov (United States)

    Guo, Zhong; Johnston, Wayne; Kovtun, Oleksiy; Mureev, Sergey; Bröcker, Cornelia; Ungermann, Christian; Alexandrov, Kirill

    2013-01-01

    Biochemical and structural analysis of macromolecular protein assemblies remains challenging due to technical difficulties in recombinant expression, engineering and reconstitution of multisubunit complexes. Here we use a recently developed cell-free protein expression system based on the protozoan Leishmania tarentolae to produce in vitro all six subunits of the 600 kDa HOPS and CORVET membrane tethering complexes. We demonstrate that both subcomplexes and the entire HOPS complex can be reconstituted in vitro resulting in a comprehensive subunit interaction map. To our knowledge this is the largest eukaryotic protein complex in vitro reconstituted to date. Using the truncation and interaction analysis, we demonstrate that the complex is assembled through short hydrophobic sequences located in the C-terminus of the individual Vps subunits. Based on this data we propose a model of the HOPS and CORVET complex assembly that reconciles the available biochemical and structural data. PMID:24312556

  19. Analysing initial attack on wildland fires using stochastic simulation.

    Science.gov (United States)

    Jeremy S. Fried; J. Keith Gilless; James. Spero

    2006-01-01

    Stochastic simulation models of initial attack on wildland fire can be designed to reflect the complexity of the environmental, administrative, and institutional context in which wildland fire protection agencies operate, but such complexity may come at the cost of a considerable investment in data acquisition and management. This cost may be well justified when it...

  20. Drug Release from ß-Cyclodextrin Complexes and Drug Transfer into Model Membranes Studied by Affinity Capillary Electrophoresis.

    Science.gov (United States)

    Darwish, Kinda A; Mrestani, Yahya; Rüttinger, Hans-Hermann; Neubert, Reinhard H H

    2016-05-01

    Is to characterize the drug release from the ß-cyclodextrin (ß-CD) cavity and the drug transfer into model membranes by affinity capillary electrophoresis. Phospholipid liposomes with and without cholesterol were used to mimic the natural biological membrane. The interaction of cationic and anionic drugs with ß-CD and the interaction of the drugs with liposomes were detected separately by measuring the drug mobility in ß-CD containing buffer and liposome containing buffer; respectively. Moreover, the kinetics of drug release from ß-CD and its transfer into liposomes with or without cholesterol was studied by investigation of changes in the migration behaviours of the drugs in samples, contained drug, ß-CD and liposome, at 1:1:1 molar ratio at different time intervals; zero time, 30 min, 1, 2, 4, 6, 8, 10 and 24 h. Lipophilic drugs such as propranolol and ibuprofen were chosen for this study, because they form complexes with ß-CD. The mobility of the both drug liposome mixtures changed with time to a final state. For samples of liposomal membranes with cholesterol the final state was faster reached than without cholesterol. The study confirmed that the drug release from the CD cavity and its transfer into the model membrane was more enhanced by the competitive displacement of the drug from the ß-CD cavity by cholesterol, the membrane component. The ACE method here developed can be used to optimize the drug release from CD complexes and the drug transfer into model membranes.

  1. Contribution of cubilin and amnionless to processing and membrane targeting of cubilin-amnionless complex

    DEFF Research Database (Denmark)

    Coudroy, Gwénaëlle; Gburek, Jakub; Kozyraki, Renata

    2005-01-01

    Cubilin is a peripheral apical membrane receptor for multiple ligands that are taken up in several absorptive epithelia. Recently, amnionless (AMN) was identified to form a functional receptor complex with cubilin. By expression in transfected polarized MDCK cells of AMN and several cubilin fragm...

  2. Finding Multi-step Attacks in Computer Networks using Heuristic Search and Mobile Ambients

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.

    2009-01-01

    An important aspect of IT security governance is the proactive and continuous identification of possible attacks in computer networks. This is complicated due to the complexity and size of networks, and due to the fact that usually network attacks are performed in several steps. This thesis proposes

  3. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  4. On the Estimation of the k-RSA Attack

    Directory of Open Access Journals (Sweden)

    Anatoliy Sergeyevich Makeyev

    2016-03-01

    Full Text Available In this paper, we discuss the attack on the RSA cryptosystem with  modules (≥2. We also provide estimation of the attacks’s complexity. Finally, we give the experimental results for different modules and open exponents.

  5. A Case Of Transient Ischemic Attack Presenting As Hemichroea

    Directory of Open Access Journals (Sweden)

    Hasan Hüseyin Özdemir

    2013-12-01

    Full Text Available Chorea is defined as; involuntary movements of the distal parts of limbs which have arrhythmic, rapid, bouncing or smooth, simple or complex properties. Choreiform movements occur when putamen, globus pallidus and subthalamic nucleus are affected. Chorea can be observed during the course of metabolic and vascular diseases, neurodegenerative or hereditary diseases. Chorea may be a rare symptom of cerebral hypoperfusion. Transient ischemic attack is an event that occurs in short term characterized by a temporary ischemia of brain. A wide variety of symptoms can be seen depending on the localization of cerebral hypoperfusion. Hemichorea is a very rare finding observed during transient ischemic attacks. In this article hemichorea in a case of symptomatic transient ischemic attack is discussed with relevant literature.

  6. Computer Network Attack Versus Operational Maneuver from the Sea

    National Research Council Canada - National Science Library

    Herdegen, Dale

    2000-01-01

    ...) vulnerable to computer network attack (CNA). Mission command and control can reduce the impact of the loss of command and control, but it can not overcome the vast and complex array of threats...

  7. Temperature-dependent phase transitions in zeptoliter volumes of a complex biological membrane

    International Nuclear Information System (INIS)

    Nikiforov, Maxim P; Jesse, Stephen; Kalinin, Sergei V; Hohlbauch, Sophia; Proksch, Roger; King, William P; Voitchovsky, Kislon; Contera, Sonia Antoranz

    2011-01-01

    Phase transitions in purple membrane have been a topic of debate for the past two decades. In this work we present studies of a reversible transition of purple membrane in the 50-60 deg. C range in zeptoliter volumes under different heating regimes (global heating and local heating). The temperature of the reversible phase transition is 52 ± 5 deg. C for both local and global heating, supporting the hypothesis that this transition is mainly due to a structural rearrangement of bR molecules and trimers. To achieve high resolution measurements of temperature-dependent phase transitions, a new scanning probe microscopy-based method was developed. We believe that our new technique can be extended to other biological systems and can contribute to the understanding of inhomogeneous phase transitions in complex systems.

  8. Integral and peripheral association of proteins and protein complexes with Yersinia pestis inner and outer membranes

    Directory of Open Access Journals (Sweden)

    Bunai Christine L

    2009-02-01

    Full Text Available Abstract Yersinia pestis proteins were sequentially extracted from crude membranes with a high salt buffer (2.5 M NaBr, an alkaline solution (180 mM Na2CO3, pH 11.3 and membrane denaturants (8 M urea, 2 M thiourea and 1% amidosulfobetaine-14. Separation of proteins by 2D gel electrophoresis was followed by identification of more than 600 gene products by MS. Data from differential 2D gel display experiments, comparing protein abundances in cytoplasmic, periplasmic and all three membrane fractions, were used to assign proteins found in the membrane fractions to three protein categories: (i integral membrane proteins and peripheral membrane proteins with low solubility in aqueous solutions (220 entries; (ii peripheral membrane proteins with moderate to high solubility in aqueous solutions (127 entries; (iii cytoplasmic or ribosomal membrane-contaminating proteins (80 entries. Thirty-one proteins were experimentally associated with the outer membrane (OM. Circa 50 proteins thought to be part of membrane-localized, multi-subunit complexes were identified in high Mr fractions of membrane extracts via size exclusion chromatography. This data supported biologically meaningful assignments of many proteins to the membrane periphery. Since only 32 inner membrane (IM proteins with two or more predicted transmembrane domains (TMDs were profiled in 2D gels, we resorted to a proteomic analysis by 2D-LC-MS/MS. Ninety-four additional IM proteins with two or more TMDs were identified. The total number of proteins associated with Y. pestis membranes increased to 456 and included representatives of all six β-barrel OM protein families and 25 distinct IM transporter families.

  9. Distribution of nuclease attack sites and complexity of DNA in the products of post-irradiation degradiation of rat thymus chromatin

    International Nuclear Information System (INIS)

    Zvonareva, N.B.; Zhivotovsky, B.D.; Hanson, K.P.

    1983-01-01

    The distribution of nuclease attack sites in chromatin has been studied on the basis of the quantitative relationship of the single- and double-stranded fragments of various lengths in the products of post-irradiation degradation of chromatin (PDN). It has been shown that in irradiated thymocytes internucleosome degradation of chromatin occurs and the products of the enzymic digestion of chromatin derive from randomly distributed genome areas accumulate. Analysis of the reassociation curves has not shown any differences in the complexity of the PDN fractions and total DNA. (author)

  10. Biologically Complex Planar Cell Plasma Membranes Supported on Polyelectrolyte Cushions Enhance Transmembrane Protein Mobility and Retain Native Orientation.

    Science.gov (United States)

    Liu, Han-Yuan; Chen, Wei-Liang; Ober, Christopher K; Daniel, Susan

    2018-01-23

    Reconstituted supported lipid bilayers (SLB) are widely used as in vitro cell-surface models because they are compatible with a variety of surface-based analytical techniques. However, one of the challenges of using SLBs as a model of the cell surface is the limited complexity in membrane composition, including the incorporation of transmembrane proteins and lipid diversity that may impact the activity of those proteins. Additionally, it is challenging to preserve the transmembrane protein native orientation, function, and mobility in SLBs. Here, we leverage the interaction between cell plasma membrane vesicles and polyelectrolyte brushes to create planar bilayers from cell plasma membrane vesicles that have budded from the cell surface. This approach promotes the direct incorporation of membrane proteins and other species into the planar bilayer without using detergent or reconstitution and preserves membrane constituents. Furthermore, the structure of the polyelectrolyte brush serves as a cushion between the planar bilayer and rigid supporting surface, limiting the interaction of the cytosolic domains of membrane proteins with this surface. Single particle tracking was used to analyze the motion of GPI-linked yellow fluorescent proteins (GPI-YFP) and neon-green fused transmembrane P2X2 receptors (P2X2-neon) and shows that this platform retains over 75% mobility of multipass transmembrane proteins in its native membrane environment. An enzyme accessibility assay confirmed that the protein orientation is preserved and results in the extracellular domain facing toward the bulk phase and the cytosolic side facing the support. Because the platform presented here retains the complexity of the cell plasma membrane and preserves protein orientation and mobility, it is a better representative mimic of native cell surfaces, which may find many applications in biological assays aimed at understanding cell membrane phenomena.

  11. Proteomic analysis reveals the diversity and complexity of membrane proteins in chickpea (Cicer arietinum L.

    Directory of Open Access Journals (Sweden)

    Jaiswal Dinesh Kumar

    2012-10-01

    Full Text Available Abstract Background Compartmentalization is a unique feature of eukaryotes that helps in maintaining cellular homeostasis not only in intra- and inter-organellar context, but also between the cells and the external environment. Plant cells are highly compartmentalized with a complex metabolic network governing various cellular events. The membranes are the most important constituents in such compartmentalization, and membrane-associated proteins play diverse roles in many cellular processes besides being part of integral component of many signaling cascades. Results To obtain valuable insight into the dynamic repertoire of membrane proteins, we have developed a proteome reference map of a grain legume, chickpea, using two-dimensional gel electrophoresis. MALDI-TOF/TOF and LC-ESI-MS/MS analysis led to the identification of 91 proteins involved in a variety of cellular functions viz., bioenergy, stress-responsive and signal transduction, metabolism, protein synthesis and degradation, among others. Significantly, 70% of the identified proteins are putative integral membrane proteins, possessing transmembrane domains. Conclusions The proteomic analysis revealed many resident integral membrane proteins as well as membrane-associated proteins including those not reported earlier. To our knowledge, this is the first report of membrane proteome from aerial tissues of a crop plant. The findings may provide a better understanding of the biochemical machinery of the plant membranes at the molecular level that might help in functional genomics studies of different developmental pathways and stress-responses.

  12. Membrane fusion

    DEFF Research Database (Denmark)

    Bendix, Pól Martin

    2015-01-01

    At Stanford University, Boxer lab, I worked on membrane fusion of small unilamellar lipid vesicles to flat membranes tethered to glass surfaces. This geometry closely resembles biological systems in which liposomes fuse to plasma membranes. The fusion mechanism was studied using DNA zippering...... between complementary strands linked to the two apposing membranes closely mimicking the zippering mechanism of SNARE fusion complexes....

  13. Kinetic and spectroscopic studies of cytochrome b-563 in isolated cytochrome b/f complex and in thylakoid membranes

    Energy Technology Data Exchange (ETDEWEB)

    Hind, G.; Clark, R.D.; Houchins, J.P.

    1983-01-01

    Extensive studies, performed principally by Hauska, Hurt and collaborators, have shown that a cytochrome (cyt) b/f complex isolated from photosynthetic membranes of spinach or Anabaena catalyzes electron transport from plastoquinol (PQH/sub 2/) to plastocyanin or algal cyt c-552. The complex from spinach thylakoids generated a membrane potential when reconstituted into liposomes, and although the electrogenic mechanism remains unknown, a key role for cyt b-563 is widely accepted. Electrogenesis by a Q-cycle mechanism requires a plastoquinone (PQ) reductase to be associated with the stromal side of the thylakoid b/f complex though this activity has yet to be demonstrated. It seemed possible that more gentle isolation of the complex might yield a form containing additional polypeptides, perhaps including a PQ reductase or a component involved in returning electrons from reduced ferredoxin to the complex in cyclic electron flow. Optimization of the isolation of cyt b/f complex for Hybrid 424 spinach from a growth room was also required. The procedure we devised is compared to the protocol of Hurt and Hauska (1982). 13 references.

  14. Game Theoretic Solutions to Cyber Attack and Network Defense Problems

    National Research Council Canada - National Science Library

    Shen, Dan; Chen, Genshe; Cruz, Jr., , Jose B; Blasch, Erik; Kruger, Martin

    2007-01-01

    .... The protection and defense against cyber attacks to computer network is becoming inadequate as the hacker knowledge sophisticates and as the network and each computer system become more complex...

  15. Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model

    DEFF Research Database (Denmark)

    Li, Wenjuan; Meng, Weizhi; Kwok, Lam-For

    2017-01-01

    To defend against complex attacks, collaborative intrusion detection networks (CIDNs) have been developed to enhance the detection accuracy, which enable an IDS to collect information and learn experience from others. However, this kind of networks is vulnerable to malicious nodes which are utili......To defend against complex attacks, collaborative intrusion detection networks (CIDNs) have been developed to enhance the detection accuracy, which enable an IDS to collect information and learn experience from others. However, this kind of networks is vulnerable to malicious nodes which...... are utilized by insider attacks (e.g., betrayal attacks). In our previous research, we developed a notion of intrusion sensitivity and identified that it can help improve the detection of insider attacks, whereas it is still a challenge for these nodes to automatically assign the values. In this article, we...... of intrusion sensitivity based on expert knowledge. In the evaluation, we compare the performance of three different supervised classifiers in assigning sensitivity values and investigate our trust model under different attack scenarios and in a real wireless sensor network. Experimental results indicate...

  16. New separation technique. Catalytically functionated separation membrane

    Energy Technology Data Exchange (ETDEWEB)

    Urgami, Tadashi [Kansai Univ., Osaka (Japan)

    1989-02-01

    This report introduces research examples, showing the fundamental principle of the membrane by separating the catalytically functionated separation membrane into enzyme fixing separation membrane, polymerized metal complex separation membrane and polymer catalyst separation membrane. This membrane can achieve both functions of separation and catalytic reaction simultaneously and has sufficient possibility to combine powerful functions. Enzyme fixing separation membrane is prepared by carrier combination method, bridging method or covering method and the enzyme fixing method with polymerized complex in which enzyme is controlled to prevent the activity lowering as much as possible and enzyme is fixed from an aqueous solution into polymer membrane. This membrane is applied to the continuous manufacturing of invert sugar from cane sugar and adsorption and removing of harmful substances from blood by utilizing both micro-capsuled urease and active carbon. Alginic acid-copper (II) complex membrane is used for the polymerized metal complex membrane and polystyrene sulfonate membrane is used for the polymer catalyst separation membrane. 28 refs., 4 figs., 1 tabs.

  17. A conserved endoplasmic reticulum membrane protein complex (EMC facilitates phospholipid transfer from the ER to mitochondria.

    Directory of Open Access Journals (Sweden)

    Sujoy Lahiri

    2014-10-01

    Full Text Available Mitochondrial membrane biogenesis and lipid metabolism require phospholipid transfer from the endoplasmic reticulum (ER to mitochondria. Transfer is thought to occur at regions of close contact of these organelles and to be nonvesicular, but the mechanism is not known. Here we used a novel genetic screen in S. cerevisiae to identify mutants with defects in lipid exchange between the ER and mitochondria. We show that a strain missing multiple components of the conserved ER membrane protein complex (EMC has decreased phosphatidylserine (PS transfer from the ER to mitochondria. Mitochondria from this strain have significantly reduced levels of PS and its derivative phosphatidylethanolamine (PE. Cells lacking EMC proteins and the ER-mitochondria tethering complex called ERMES (the ER-mitochondria encounter structure are inviable, suggesting that the EMC also functions as a tether. These defects are corrected by expression of an engineered ER-mitochondrial tethering protein that artificially tethers the ER to mitochondria. EMC mutants have a significant reduction in the amount of ER tethered to mitochondria even though ERMES remained intact in these mutants, suggesting that the EMC performs an additional tethering function to ERMES. We find that all Emc proteins interact with the mitochondrial translocase of the outer membrane (TOM complex protein Tom5 and this interaction is important for PS transfer and cell growth, suggesting that the EMC forms a tether by associating with the TOM complex. Together, our findings support that the EMC tethers ER to mitochondria, which is required for phospholipid synthesis and cell growth.

  18. Oxidative degradation of polybenzimidazole membranes as electrolytes for high temperature proton exchange membrane fuel cells

    DEFF Research Database (Denmark)

    Liao, J.H.; Li, Qingfeng; Rudbeck, H.C.

    2011-01-01

    the oxidative degradation of the polymer membrane was studied under the Fenton test conditions by the weight loss, intrinsic viscosity, size exclusion chromatography, scanning electron microscopy and Fourier transform infrared spectroscopy. During the Fenton test, significant weight losses depending...... on the initial molecular weight of the polymer were observed. At the same time, viscosity and SEC measurements revealed a steady decrease in molecular weight. The degradation of acid doped PBI membranes under Fenton test conditions is proposed to start by the attack of hydroxyl radicals at the carbon atom......Polybenzimidazole membranes imbibed with acid are emerging as a suitable electrolyte material for high-temperature polymer electrolyte fuel cells. The oxidative stability of polybenzimidazole has been identified as an important issue for the long-term durability of such cells. In this paper...

  19. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    Science.gov (United States)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  20. Autophagosomal membranes assemble at ER-plasma membrane contact sites.

    Science.gov (United States)

    Nascimbeni, Anna Chiara; Codogno, Patrice; Morel, Etienne

    2017-01-01

    The biogenesis of autophagosome, the double membrane bound organelle related to macro-autophagy, is a complex event requiring numerous key-proteins and membrane remodeling events. Our recent findings identify the extended synaptotagmins, crucial tethers of Endoplasmic Reticulum-plasma membrane contact sites, as key-regulators of this molecular sequence.

  1. Identifying and tracking attacks on networks: C3I displays and related technologies

    Science.gov (United States)

    Manes, Gavin W.; Dawkins, J.; Shenoi, Sujeet; Hale, John C.

    2003-09-01

    Converged network security is extremely challenging for several reasons; expanded system and technology perimeters, unexpected feature interaction, and complex interfaces all conspire to provide hackers with greater opportunities for compromising large networks. Preventive security services and architectures are essential, but in and of themselves do not eliminate all threat of compromise. Attack management systems mitigate this residual risk by facilitating incident detection, analysis and response. There are a wealth of attack detection and response tools for IP networks, but a dearth of such tools for wireless and public telephone networks. Moreover, methodologies and formalisms have yet to be identified that can yield a common model for vulnerabilities and attacks in converged networks. A comprehensive attack management system must coordinate detection tools for converged networks, derive fully-integrated attack and network models, perform vulnerability and multi-stage attack analysis, support large-scale attack visualization, and orchestrate strategic responses to cyber attacks that cross network boundaries. We present an architecture that embodies these principles for attack management. The attack management system described engages a suite of detection tools for various networking domains, feeding real-time attack data to a comprehensive modeling, analysis and visualization subsystem. The resulting early warning system not only provides network administrators with a heads-up cockpit display of their entire network, it also supports guided response and predictive capabilities for multi-stage attacks in converged networks.

  2. Short length transmembrane domains having voluminous exoplasmic halves determine retention of Type II membrane proteins in the Golgi complex

    OpenAIRE

    Quiroga, Rodrigo; Trenchi, Alejandra; Gonzalez Montoro, Ayelén; Valdez, Javier Esteban; Maccioni, Hugo Jose Fernando

    2017-01-01

    It is still unclear why some proteins that travel along the secretory pathway are retained in the Golgi complex whereas others make their way to the plasma membrane. Recent bioinformatic analyses on a large number of single-spanning membrane proteins support the hypothesis that specific features of the transmembrane domain (TMD) are relevant to the sorting of these proteins to particular organelles. Here we experimentally test this hypothesis for Golgi and plasma membrane proteins. Using the ...

  3. Characterization of inclusion complexes of organic ions with hydrophilic hosts by ion transfer voltammetry with solvent polymeric membranes.

    Science.gov (United States)

    Olmos, José Manuel; Laborda, Eduardo; Ortuño, Joaquín Ángel; Molina, Ángela

    2017-03-01

    The quantitative characterization of inclusion complexes formed in aqueous phase between organic ions and hydrophilic hosts by ion-transfer voltammetry with solvent polymeric membrane ion sensors is studied, both in a theoretical and experimental way. Simple analytical solutions are presented for the determination of the binding constant of the complex from the variation with the host concentration of the electrochemical signal. These solutions are valid for any voltammetric technique and for solvent polymeric membrane ion sensors comprising one polarisable interface (1PI) and also, for the first time, two polarisable interfaces (2PIs). Suitable experimental conditions and data analysis procedures are discussed and applied to the study of the interactions of a common ionic liquid cation (1-octyl-3-metyl-imidazolium) and an ionisable drug (clomipramine) with two hydrophilic cyclodextrins: α-cyclodextrin and 2-hydroxypropyl-β-cyclodextrin. The experimental study is performed via square wave voltammetry with 2PIs and 1PI solvent polymeric membranes and in both cases the electrochemical experiments enable the detection of inclusion complexes and the determination of the corresponding binding constant. Copyright © 2016 Elsevier B.V. All rights reserved.

  4. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  5. Crony Attack: Strategic Attack’s Silver Bullet

    Science.gov (United States)

    2006-11-01

    physical assets or financial assets. The form of crony attack that most closely resembles classic strategic attack is to deny, degrade, or destroy a money...February 1951. Reprinted in Airpower Studies Coursebook , Air Command and Staff College, Maxwell AFB, AL, 2002, 152–58. Hirsch, Michael. “NATO’s Game of

  6. The higher level of complexity of K-Ras4B activation at the membrane.

    Science.gov (United States)

    Jang, Hyunbum; Banerjee, Avik; Chavan, Tanmay S; Lu, Shaoyong; Zhang, Jian; Gaponenko, Vadim; Nussinov, Ruth

    2016-04-01

    Is nucleotide exchange sufficient to activate K-Ras4B? To signal, oncogenic rat sarcoma (Ras) anchors in the membrane and recruits effectors by exposing its effector lobe. With the use of NMR and molecular dynamics (MD) simulations, we observed that in solution, farnesylated guanosine 5'-diphosphate (GDP)-bound K-Ras4B is predominantly autoinhibited by its hypervariable region (HVR), whereas the GTP-bound state favors an activated, HVR-released state. On the anionic membrane, the catalytic domain adopts multiple orientations, including parallel (∼180°) and perpendicular (∼90°) alignments of the allosteric helices, with respect to the membrane surface direction. In the autoinhibited state, the HVR is sandwiched between the effector lobe and the membrane; in the active state, with membrane-anchored farnesyl and unrestrained HVR, the catalytic domain fluctuates reinlessly, exposing its effector-binding site. Dimerization and clustering can reduce the fluctuations. This achieves preorganized, productive conformations. Notably, we also observe HVR-autoinhibited K-Ras4B-GTP states, with GDP-bound-like orientations of the helices. Thus, we propose that the GDP/GTP exchange may not be sufficient for activation; instead, our results suggest that the GDP/GTP exchange, HVR sequestration, farnesyl insertion, and orientation/localization of the catalytic domain at the membrane conjointly determine the active or inactive state of K-Ras4B. Importantly, K-Ras4B-GTP can exist in active and inactive states; on its own, GTP binding may not compel K-Ras4B activation.-Jang, H., Banerjee, A., Chavan, T. S, Lu, S., Zhang, J., Gaponenko, V., Nussinov, R. The higher level of complexity of K-Ras4B activation at the membrane. © FASEB.

  7. A comparative spectroscopic and kinetic study of photoexcitations in detergent-isolated and membrane-embedded LH2 light-harvesting complexes.

    Science.gov (United States)

    Freiberg, Arvi; Rätsep, Margus; Timpmann, Kõu

    2012-08-01

    Integral membrane proteins constitute more than third of the total number of proteins present in organisms. Solubilization with mild detergents is a common technique to study the structure, dynamics, and catalytic activity of these proteins in purified form. However beneficial the use of detergents may be for protein extraction, the membrane proteins are often denatured by detergent solubilization as a result of native lipid membrane interactions having been modified. Versatile investigations of the properties of membrane-embedded and detergent-isolated proteins are, therefore, required to evaluate the consequences of the solubilization procedure. Herein, the spectroscopic and kinetic fingerprints have been established that distinguish excitons in individual detergent-solubilized LH2 light-harvesting pigment-protein complexes from them in the membrane-embedded complexes of purple photosynthetic bacteria Rhodobacter sphaeroides. A wide arsenal of spectroscopic techniques in visible optical range that include conventional broadband absorption-fluorescence, fluorescence anisotropy excitation, spectrally selective hole burning and fluorescence line-narrowing, and transient absorption-fluorescence have been applied over broad temperature range between physiological and liquid He temperatures. Significant changes in energetics and dynamics of the antenna excitons upon self-assembly of the proteins into intracytoplasmic membranes are observed, analyzed, and discussed. This article is part of a Special Issue entitled: Photosynthesis Research for Sustainability: from Natural to Artificial. Copyright © 2011. Published by Elsevier B.V.

  8. Porous rod-like MgO complex membrane with good anti-bacterial activity directed by conjugated linolenic acid polymer

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Hua-Jie, E-mail: wanghuajie972001@163.com; Chen, Meng [Henan Normal University, College of Chemistry and Chemical Engineering (China); Mi, Li-Wei, E-mail: mlwzzu@163.com [Zhongyuan University of Technology, Center for Advanced Materials Research (China); Shi, Li-Hua [Anyang 101 Education Center (China); Cao, Ying, E-mail: caoying1130@sina.com [Zhongyuan University of Technology, Center for Advanced Materials Research (China)

    2016-02-15

    The problem of infection in the tissue engineering substitutes is driving us to seek new coating materials. We previously found that conjugated linolenic acid (CLnA) has well biocompatibility and excellent membrane-forming property. The objective of this study is to endow the anti-bacterial activity to CLnA membra ne by linking with MgO. The results showed that the CLnA polymer membrane can be loaded with porous rod-like MgO and such complex membrane showed anti-bacterial sensitivity against gram-positive bacteria (Staphylococcus aureus) even at the low concentration (0.15 μg/mm{sup 2}). In the present study, the best zone of inhibition got to 18.2 ± 0.8 mm when the amount of MgO reach 2.42 ± 0.58 μg/mm{sup 2}. It was deduced that the porous rod-like structure of MgO was directed by CLnA in its polymerization process. Such CLnA/MgO complex membrane can be helpful in the tissue engineering, medicine, food engineering, food preservation, etc. on the basis of its good anti-bacterial activity.

  9. Glycosylinositol phosphorylceramides from Rosa cell cultures are boron-bridged in the plasma membrane and form complexes with rhamnogalacturonan II.

    Science.gov (United States)

    Voxeur, Aline; Fry, Stephen C

    2014-07-01

    Boron (B) is essential for plant cell-wall structure and membrane functions. Compared with its role in cross-linking the pectic domain rhamnogalacturonan II (RG-II), little information is known about the biological role of B in membranes. Here, we investigated the involvement of glycosylinositol phosphorylceramides (GIPCs), major components of lipid rafts, in the membrane requirement for B. Using thin-layer chromatography and mass spectrometry, we first characterized GIPCs from Rosa cell culture. The major GIPC has one hexose residue, one hexuronic acid residue, inositol phosphate, and a ceramide moiety with a C18 trihydroxylated mono-unsaturated long-chain base and a C24 monohydroxylated saturated fatty acid. Disrupting B bridging (by B starvation in vivo or by treatment with cold dilute HCl or with excess borate in vitro) enhanced the GIPCs' extractability. As RG-II is the main B-binding site in plants, we investigated whether it could form a B-centred complex with GIPCs. Using high-voltage paper electrophoresis, we showed that addition of GIPCs decreased the electrophoretic mobility of radiolabelled RG-II, suggesting formation of a GIPC-B-RG-II complex. Last, using polyacrylamide gel electrophoresis, we showed that added GIPCs facilitate RG-II dimerization in vitro. We conclude that B plays a structural role in the plasma membrane. The disruption of membrane components by high borate may account for the phytotoxicity of excess B. Moreover, the in-vitro formation of a GIPC-B-RG-II complex gives the first molecular explanation of the wall-membrane attachment sites observed in vivo. Finally, our results suggest a role for GIPCs in the RG-II dimerization process. © 2014 The Authors. The Plant Journal published by Society for Experimental Biology and John Wiley & Sons Ltd.

  10. Integrated approach for investigating the durability of self-consolidating concrete to sulfate attack

    Science.gov (United States)

    Bassuoni, Mohamed Tamer F.

    The growing use of self-consolidating concrete (SCC) in various infrastructure applications exposed to sulfate-rich environments necessitates conducting comprehensive research to evaluate its durability to external sulfate attack. Since the reliability and adequacy of standard sulfate immersion tests have been questioned, the current thesis introduced an integrated testing approach for assessing the durability of a wide scope of SCC mixtures to external sulfate attack. This testing approach involved progressive levels of complexity from single to multiple damage processes. A new series of sulfate attack tests involving multiple field-like parameters and combined damage mechanisms (various cations, controlled pH, wetting-drying, partial immersion, freezing-thawing, and cyclic cold-hot conditions with or without sustained flexural loading) were designed to evaluate the performance (suitability) of the SCC mixtures under various sulfate attack exposure scenarios. The main mixture design variables of SCC included the type of binder (single, binary, ternary and quaternary), air-entrainment, sand-to-aggregate mass ratio and hybrid fibre reinforcement. The comprehensive database and knowledge obtained from this research were used to develop smart models (fuzzy and neuro-fuzzy inference systems) based on artificial-intelligence to evaluate and predict the performance of the SCC mixtures under various sulfate attack exposure regimes implemented in this study. In full immersion tests involving high concentration sodium and magnesium sulfate solutions with controlled pH, the low penetrability of SCC was responsible for the high durability of specimens. Ternary and quaternary cementitious systems with or without limestone materials provided a passivating layer, with or without acid neutralization capacity, which protected SCC from severe damage in the aggressive sulfuric acid and ammonium sulfate solutions. In contrast to conclusions drawn from the sodium sulfate immersion

  11. Using attack-defense trees to analyze threats and countermeasures in an ATM: A case study

    NARCIS (Netherlands)

    Fraile, Marlon; Ford, Margaret; Gadyatskaya, Olga; Kumar, Rajesh; Stoelinga, Mariëlle Ida Antoinette; Trujillo-Rasua, Rolando

    2016-01-01

    Securing automated teller machines (ATMs), as critical and complex infrastructure, requires a precise understanding of the associated threats. This paper reports on the application of attack-defense trees to model and analyze the security of ATMs.We capture the most dangerous multi-stage attack

  12. Epileptic negative drop attacks in atypical benign partial epilepsy: a neurophysiological study.

    Science.gov (United States)

    Hirano, Yoshiko; Oguni, Hirokazu; Osawa, Makiko

    2009-03-01

    We conducted a computer-assisted polygraphic analysis of drop attacks in a child with atypical benign partial epilepsy (ABPE) to investigate neurophysiological characteristics. The patient was a six-year two-month-old girl, who had started to have focal motor seizures, later combined with daily epileptic negative myoclonus (ENM) and drop attacks, causing multiple injuries. We studied episodes of ENM and drop attacks using video-polygraphic and computer-assisted back-averaging analysis. A total of 12 ENM episodes, seven involving the left arm (ENMlt) and five involving both arms (ENMbil), and five drop attacks were captured for analysis. All episodes were time-locked to spike-and-wave complexes (SWC) arising from both centro-temporo-parietal (CTP) areas. The latency between the onset of SWC and ENMlt, ENMbil, and drop attacks reached 68 ms, 42 ms, and 8 ms, respectively. The height of the spike as well as the slow-wave component of SWC for drop attacks were significantly larger than that for both ENMlt and ENMbil (p negative myoclonus involving not only upper proximal but also axial muscles, causing the body to fall. Thus, drop attacks in ABPE are considered to be epileptic negative drop attacks arising from bilateral CTP foci and differ from drop attacks of a generalized origin seen in Lennox-Gastaut syndrome and myoclonic-astatic epilepsy.

  13. Role for ribosome-associated complex and stress-seventy subfamily B (RAC-Ssb) in integral membrane protein translation.

    Science.gov (United States)

    Acosta-Sampson, Ligia; Döring, Kristina; Lin, Yuping; Yu, Vivian Y; Bukau, Bernd; Kramer, Günter; Cate, Jamie H D

    2017-12-01

    Targeting of most integral membrane proteins to the endoplasmic reticulum is controlled by the signal recognition particle, which recognizes a hydrophobic signal sequence near the protein N terminus. Proper folding of these proteins is monitored by the unfolded protein response and involves protein degradation pathways to ensure quality control. Here, we identify a new pathway for quality control of major facilitator superfamily transporters that occurs before the first transmembrane helix, the signal sequence recognized by the signal recognition particle, is made by the ribosome. Increased rates of translation elongation of the N-terminal sequence of these integral membrane proteins can divert the nascent protein chains to the ribosome-associated complex and stress-seventy subfamily B chaperones. We also show that quality control of integral membrane proteins by ribosome-associated complex-stress-seventy subfamily B couples translation rate to the unfolded protein response, which has implications for understanding mechanisms underlying human disease and protein production in biotechnology. © 2017 by The American Society for Biochemistry and Molecular Biology, Inc.

  14. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  15. Sensitivity and repair of DNA-membrane complex of E.coli B/r and E.coli B/sub(S-1) irradiated with gamma-quanta

    International Nuclear Information System (INIS)

    Morozov, I.I.; Sulimova, T.V.; Ryabchenko, N.I.; Myasnik, M.N.

    1977-01-01

    Irradiation of E. coli B/r and E. coli Bsub(S-1) with gamma-quanta (14 to 42 krad) in Tris buffer at 0 deg C causes a 85% release of DNA molecules from a DNA: membrane complex which is partly repaired on incubation of cells in Tris buffer, pH 8.1, at 37 deg C. A short-term (2 min) addition of nutrient medium to irradiated cells also rises the radioresistance of DNA: membrane complex while further treatment of bacteria under similar conditions causes no additional rejoining of DNA with membranes

  16. Polyurethane Nanofiber Membranes for Waste Water Treatment by Membrane Distillation

    OpenAIRE

    Jiříček, T.; Komárek, M.; Lederer, T.

    2017-01-01

    Self-sustained electrospun polyurethane nanofiber membranes were manufactured and tested on a direct-contact membrane distillation unit in an effort to find the optimum membrane thickness to maximize flux rate and minimize heat losses across the membrane. Also salt retention and flux at high salinities up to 100 g kg−1 were evaluated. Even though the complex structure of nanofiber layers has extreme specific surface and porosity, membrane performance was surprisingly predictable; the highest ...

  17. Security and Risk Analysis of Nuclear Safeguards Instruments Using Attack Trees

    International Nuclear Information System (INIS)

    Naumann, I.; Wishard, B.

    2015-01-01

    The IAEA's nuclear safeguards instruments must be frequently evaluated against attack vectors, which are extremely varied and, at first approximation, may seem inconsequential, but are not. To accurately analyze the impact of attacks on a multi-component system requires a highly structured and well-documented assessment. Tree structures, such as fault trees, have long been used to assess the consequences of selecting potential solutions and their impact on risk. When applied to security threats by introducing threat agents (adversaries) and vulnerabilities, this approach can be extremely valuable in uncovering previously unidentified risks and identifying mitigation steps. This paper discusses how attack trees can be used for the security analysis of nuclear safeguards instruments. The root node of such a tree represents an objective that negatively impacts security such as disclosing and/or falsifying instrument data or circumventing safeguards methods. Usually, this objective is rather complex and attaining it requires a combination of several security breaches which may vary on how much funding or what capabilities are required in order to execute them. Thus, it is necessary to break the root objective into smaller, less complex units. Once a leaf node describes a reasonably comprehensible action, it is the security experts' task to allocate levels of difficulty and funding to this node. Eventually, the paths from the leaf nodes to the root node describe all possible combinations of actions necessary to carry out a successful attack. The use of a well-structured attack tree facilitates the developer in thinking like the adversary providing more effective security solutions. (author)

  18. The higher level of complexity of K-Ras4B activation at the membrane

    Science.gov (United States)

    Jang, Hyunbum; Banerjee, Avik; Chavan, Tanmay S.; Lu, Shaoyong; Zhang, Jian; Gaponenko, Vadim; Nussinov, Ruth

    2016-01-01

    Is nucleotide exchange sufficient to activate K-Ras4B? To signal, oncogenic rat sarcoma (Ras) anchors in the membrane and recruits effectors by exposing its effector lobe. With the use of NMR and molecular dynamics (MD) simulations, we observed that in solution, farnesylated guanosine 5′-diphosphate (GDP)-bound K-Ras4B is predominantly autoinhibited by its hypervariable region (HVR), whereas the GTP-bound state favors an activated, HVR-released state. On the anionic membrane, the catalytic domain adopts multiple orientations, including parallel (∼180°) and perpendicular (∼90°) alignments of the allosteric helices, with respect to the membrane surface direction. In the autoinhibited state, the HVR is sandwiched between the effector lobe and the membrane; in the active state, with membrane-anchored farnesyl and unrestrained HVR, the catalytic domain fluctuates reinlessly, exposing its effector-binding site. Dimerization and clustering can reduce the fluctuations. This achieves preorganized, productive conformations. Notably, we also observe HVR-autoinhibited K-Ras4B-GTP states, with GDP-bound-like orientations of the helices. Thus, we propose that the GDP/GTP exchange may not be sufficient for activation; instead, our results suggest that the GDP/GTP exchange, HVR sequestration, farnesyl insertion, and orientation/localization of the catalytic domain at the membrane conjointly determine the active or inactive state of K-Ras4B. Importantly, K-Ras4B-GTP can exist in active and inactive states; on its own, GTP binding may not compel K-Ras4B activation.—Jang, H., Banerjee, A., Chavan, T. S, Lu, S., Zhang, J., Gaponenko, V., Nussinov, R. The higher level of complexity of K-Ras4B activation at the membrane. PMID:26718888

  19. A blind video watermarking scheme resistant to rotation and collusion attacks

    Directory of Open Access Journals (Sweden)

    Amlan Karmakar

    2016-04-01

    Full Text Available In this paper, Discrete Cosine Transform (DCT based blind video watermarking algorithm is proposed, which is perceptually invisible and robust against rotation and collusion attacks. To make the scheme resistant against rotation, watermark is embedded within the square blocks, placed on the middle position of every luminance channel. Then Zernike moments of those square blocks are calculated. The rotation invariance property of the Complex Zernike moments is exploited to predict the rotation angle of the video at the time of extraction of watermark bits. To make the scheme robust against collusion, design of the scheme is done in such a way that the embedding blocks will vary for the successive frames of the video. A Pseudo Random Number (PRN generator and a permutation vector are used to achieve the goal. The experimental results show that the scheme is robust against conventional video attacks, rotation attack and collusion attacks.

  20. Model cell membranes

    DEFF Research Database (Denmark)

    Günther-Pomorski, Thomas; Nylander, Tommy; Cardenas Gomez, Marite

    2014-01-01

    The high complexity of biological membranes has motivated the development and application of a wide range of model membrane systems to study biochemical and biophysical aspects of membranes in situ under well defined conditions. The aim is to provide fundamental understanding of processes control...

  1. Multidimensional zero-correlation attacks on lightweight block cipher HIGHT: Improved cryptanalysis of an ISO standard

    DEFF Research Database (Denmark)

    Wen, Long; Wang, Meiqin; Bogdanov, Andrey

    2014-01-01

    results on HIGHT, its security evaluation against the recent zero-correlation linear attacks is still lacking. At the same time, the Feistel-type structure of HIGHT suggests that it might be susceptible to this type of cryptanalysis. In this paper, we aim to bridge this gap. We identify zero......-correlation linear approximations over 16 rounds of HIGHT. Based upon those, we attack 27-round HIGHT (round 4 to round 30) with improved time complexity and practical memory requirements. This attack of ours is the best result on HIGHT to date in the classical single-key setting. We also provide the first attack...

  2. Heart Attack Recovery FAQs

    Science.gov (United States)

    ... recommendations to make a full recovery. View an animation of a heart attack . Heart Attack Recovery Questions ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  3. Computing Preferred Extensions for Argumentation Systems with Sets of Attacking

    DEFF Research Database (Denmark)

    Nielsen, Søren Holbech; Parsons, Simon

    2006-01-01

    The hitherto most abstract, and hence general, argumentation system, is the one described by Dung in a paper from 1995. This framework does not allow for joint attacks on arguments, but in a recent paper we adapted it to support such attacks, and proved that this adapted framework enjoyed the same...... formal properties as that of Dung. One problem posed by Dung's original framework, which was neglected for some time, is how to compute preferred extensions of the argumentation systems. However, in 2001, in a paper by Doutre and Mengin, a procedure was given for enumerating preferred extensions...... for these systems. In this paper we propose a method for enumerating preferred extensions of the potentially more complex systems, where joint attacks are allowed. The method is inspired by the one given by Doutre and Mengin....

  4. RIN4 functions with plasma membrane H+-ATPases to regulate stomatal apertures during pathogen attack

    DEFF Research Database (Denmark)

    Liu, Jun; Elmore, James M.; Fuglsang, Anja Thoe

    2009-01-01

    Abstract Pathogen perception by the plant innate immune system is of central importance to plant survival and productivity. The Arabidopsis protein RIN4 is a negative regulator of plant immunity. In order to identify additional proteins involved in RIN4- mediated immune signal transduction, we...... purified components of the RIN4 protein complex. We identified six novel proteins that had not previously been implicated in RIN4 signaling, including the plasma membrane (PM) H+-ATPases AHA1 and/or AHA2. RIN4 interacts with AHA1 and AHA2 both in vitro and in vivo. RIN4 overexpression and knockout lines...... exhibit differential PM H+-ATPase activity. PM H+-ATPase activation induces stomatal opening, enabling bacteria to gain entry into the plant leaf; inactivation induces stomatal closure thus restricting bacterial invasion. The rin4 knockout line exhibited reduced PM H+-ATPase activity and, importantly, its...

  5. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  6. Quantum attack-resistent certificateless multi-receiver signcryption scheme.

    Directory of Open Access Journals (Sweden)

    Huixian Li

    Full Text Available The existing certificateless signcryption schemes were designed mainly based on the traditional public key cryptography, in which the security relies on the hard problems, such as factor decomposition and discrete logarithm. However, these problems will be easily solved by the quantum computing. So the existing certificateless signcryption schemes are vulnerable to the quantum attack. Multivariate public key cryptography (MPKC, which can resist the quantum attack, is one of the alternative solutions to guarantee the security of communications in the post-quantum age. Motivated by these concerns, we proposed a new construction of the certificateless multi-receiver signcryption scheme (CLMSC based on MPKC. The new scheme inherits the security of MPKC, which can withstand the quantum attack. Multivariate quadratic polynomial operations, which have lower computation complexity than bilinear pairing operations, are employed in signcrypting a message for a certain number of receivers in our scheme. Security analysis shows that our scheme is a secure MPKC-based scheme. We proved its security under the hardness of the Multivariate Quadratic (MQ problem and its unforgeability under the Isomorphism of Polynomials (IP assumption in the random oracle model. The analysis results show that our scheme also has the security properties of non-repudiation, perfect forward secrecy, perfect backward secrecy and public verifiability. Compared with the existing schemes in terms of computation complexity and ciphertext length, our scheme is more efficient, which makes it suitable for terminals with low computation capacity like smart cards.

  7. Protecting Database Centric Web Services against SQL/XPath Injection Attacks

    Science.gov (United States)

    Laranjeiro, Nuno; Vieira, Marco; Madeira, Henrique

    Web services represent a powerful interface for back-end database systems and are increasingly being used in business critical applications. However, field studies show that a large number of web services are deployed with security flaws (e.g., having SQL Injection vulnerabilities). Although several techniques for the identification of security vulnerabilities have been proposed, developing non-vulnerable web services is still a difficult task. In fact, security-related concerns are hard to apply as they involve adding complexity to already complex code. This paper proposes an approach to secure web services against SQL and XPath Injection attacks, by transparently detecting and aborting service invocations that try to take advantage of potential vulnerabilities. Our mechanism was applied to secure several web services specified by the TPC-App benchmark, showing to be 100% effective in stopping attacks, non-intrusive and very easy to use.

  8. Blocking of Brute Force Attack

    OpenAIRE

    M.Venkata Krishna Reddy

    2012-01-01

    A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your Web site requires user authentication, you are a good target for a brute-force attack. An attacker can always discover a password through a brute-force attack, but the downside is that it co...

  9. CR2-mediated activation of the complement alternative pathway results in formation of membrane attack complexes on human B lymphocytes

    DEFF Research Database (Denmark)

    Nielsen, C H; Marquart, H V; Prodinger, W M

    2001-01-01

    the alternative pathway. Blockade of the CR2 ligand-binding site with the monoclonal antibody FE8 resulted in 56 +/- 13% and 71 +/- 9% inhibition of the C3-fragment and MAC deposition, respectively, whereas the monoclonal antibody HB135, directed against an irrelevant CR2 epitope, had no effect. Blockade......Normal human B lymphocytes activate the alternative pathway of complement via complement receptor type 2 (CR2, CD21), that binds hydrolysed C3 (iC3) and thereby promotes the formation of a membrane-bound C3 convertase. We have investigated whether this might lead to the generation of a C5...... processes on CR2, indicate that MAC formation is a consequence of alternative pathway activation....

  10. Solidarity under Attack

    DEFF Research Database (Denmark)

    Meret, Susi; Goffredo, Sergio

    2017-01-01

    https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack......https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack...

  11. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants....

  12. Stability of integral membrane proteins under high hydrostatic pressure: the LH2 and LH3 antenna pigment-protein complexes from photosynthetic bacteria.

    Science.gov (United States)

    Kangur, Liina; Timpmann, Kõu; Freiberg, Arvi

    2008-07-03

    The bacteriochlorophyll a-containing LH2 and LH3 antenna complexes are the integral membrane proteins that catalyze the photosynthetic process in purple photosynthetic bacteria. The LH2 complex from Rhodobacter sphaeroides shows characteristic strong absorbance at 800 and 850 nm due to the pigment molecules confined in two separate areas of the protein. In the LH3 complex from Rhodopesudomonas acidophila the corresponding bands peak at 800 and 820 nm. Using the bacteriochlorophyll a cofactors as intrinsic probes to monitor local changes in the protein structure, we investigate spectral responses of the antenna complexes to very high hydrostatic pressures up to 2.5 GPa when embedded into natural membrane environment or extracted with detergent. We first demonstrate that high pressure does induce significant alterations to the tertiary structure of the proteins not only in proximity of the 800 nm-absorbing bacteriochlorophyll a molecules known previously (Gall, A.; et al. Biochemistry 2003, 42, 13019) but also of the 850 nm- and 820 nm-absorbing molecules, including breakage of the hydrogen bond they are involved in. The membrane-protected complexes appear more resilient to damaging effects of the compression compared with the complexes extracted into mixed detergent-buffer environment. Increased resistance of the isolated complexes is observed at high protein concentration resulting aggregation as well as when cosolvent (glycerol) is added into the solution. These stability variations correlate with ability of penetration of the surrounding polar solvent (water) into the hydrophobic protein interiors, being thus the principal reason of the pressure-induced denaturation of the proteins. Considerable variability of elastic properties of the isolated complexes was also observed, tentatively assigned to heterogeneous protein packing in detergent micelles. While a number of the isolated complexes release most of their bacteriochlorophyll a content under high pressure

  13. Identification and characterization of stable membrane protein complexes

    NARCIS (Netherlands)

    Spelbrink, R.E.J.

    2007-01-01

    Many membrane proteins exist as oligomers. Such oligomers play an important role in a broad variety of cellular processes such as ion transport, energy transduction, osmosensing and cell wall synthesis. We developed an electrophoresis-based method of identifying oligomeric membrane proteins that are

  14. Iron-complexed adsorptive membrane for As(V) species in water

    International Nuclear Information System (INIS)

    Shinde, Rakesh N.; Das, Sadananda; Acharya, R.; Rajurkar, N.S.; Pandey, Ashok K.

    2012-01-01

    Highlights: ► Functionalized membrane was prepared by graft polymerization in host membrane. ► Fe 3+ ions fixed in membrane made it selective for As(V) ions. ► As(V) preconcentrated selectively in membrane samples was quantified by INAA. ► As(V) in ground water sample was easily quantified in 2–3 ppb using membrane. ► Total inorganic arsenic could be quantified by oxidation of As(III) to As(V). - Abstract: Selective preconcentration of a target analyte in the solid phase is an effective route not only to enhance detection limit of the conventional analytical method but also for elimination of interfering matrix. An adsorptive membrane was developed for selective preconcentration and quantification of ultra-trace (ppb) amounts of As(V) present in a variety of aqueous samples. The precursor membrane was prepared by UV-initiator induced graft polymerization of sulphate and phosphate bearing monomers (1:1 mol proportion) in pores of the host microporous poly(propylene) membrane. Fe 3+ ions were loaded in the precursor membrane to make it selective for As(V) ions. The presence of phosphate functional groups prevent leaching of Fe 3+ ions from the membrane when it comes in contact with solution like seawater having high ionic strength. The optimized membrane was characterized in terms of its physical structure, chemical structure and experimental conditions affecting As(V) uptake in the membrane. The possibility of quantifying total preconcentration of As content was also explored by converting As(III) to As(V). To quantify As(V), the membrane samples were subjected to instrumental neutron activation analysis (INAA). The studies carried in the present work showed that quantification of inorganic arsenic species in natural water samples is easily possible in 2–3 ppb concentration range.

  15. Native proteomic analysis of protein complexes in murine intestinal brush border membranes

    Czech Academy of Sciences Publication Activity Database

    Babušiak, M.; Man, Petr; Petrák, J.; Vyoral, D.

    2007-01-01

    Roč. 7, č. 1 (2007), s. 121-129 ISSN 1615-9853 R&D Projects: GA ČR(CZ) GD204/03/H066; GA AV ČR KJB500200612; GA MŠk LC545 Grant - others:GA ČR(CZ) GA303/04/0003; GA MZd(CZ) NR8930; GA MŠk(CZ) LC06044; CZ(CZ) 023736; GA MZd(CZ) NR8317 Program:NR Institutional research plan: CEZ:AV0Z50200510 Keywords : blue native electrophoresis * brush border membranes * protein complexes Subject RIV: EE - Microbiology, Virology Impact factor: 5.479, year: 2007

  16. Synchrotron small-angle x-ray scattering investigation on integral membrane protein light-harvesting complex LH2 from photosynthetic bacterium rhodopseudomonas acidophila

    International Nuclear Information System (INIS)

    Du Luchao; Weng Yuxiang; Hong Xinguo; Xian Dingchang; Kobayashi Katsumi

    2006-01-01

    Structures of membrane protein in solution are different from that in crystal phase. We present the primary results of small angle x-ray scattering (SAXS) resolved topological structures of a light harvesting antenna membrane protein complex LH2 from photosynthetic bacteria Rhodopseudomonas acidophila in detergent solution for the first time. Our results show that the elliptical shape of the LH2 complex in solution clearly deviates from its circular structure in crystal phase determined by x-ray diffraction. This result provides an insight into the structure and function interplay in LH2. (authors)

  17. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  18. Separation of metallic cations by means of coupled filtration on a ceramic membrane. Use of a complexing heteropolyanion

    International Nuclear Information System (INIS)

    Brun, Stephane

    1999-01-01

    In the field of the high level nuclear waste reprocessing, the Nuclear French Agency is currently carrying out studies on several processes (including the SESAME process) which aim at separating radioactive elements in order to dispose them specifically or to transmute them. One of these processes concerns the selective extraction of americium at an upper oxidation state than Ill. This work deals with the separation of Am(IV) from Ln(Ill) by means of complexation-coupled tangential filtration on alumina-titanium ceramic membranes. The chosen selective complexing agent is a lacunar heteropolyanion from the tungstophosphate family α_2P_2W_1_7O_6_1"1"0"-, which synthesis and various properties in solution have been studied. The polyanion stability in 0.5 M nitric solution strongly depends on the quality of the synthesised product. Two analytical techniques were developed to check the quality of the synthesised sets: "3"1P NMR and arsenazo-lanthanum complexometric titration. The separation studies on the cerium (IV)-neodymium (Ill) system were carried out to simulate americium(IV)/lanthanides(Ill) system. For the two alumina-titanium membranes studied (ultrafiltration and nano-filtration), the solvent flow can be described through a capillary mechanism which is characteristic of porous membranes. The ion transfer through the membranes, mainly governed by electrostatic interactions, strongly depends on the ionic strength at the membrane-solution interface. The best separation results, using nano-filtration, still remain below the expected performances, with a Ce(IV)/Nd(Ill) separation factor of 35 on a single stage in 0,5 M nitric medium. (author) [fr

  19. Cyber attacks against state estimation in power systems: Vulnerability analysis and protection strategies

    Science.gov (United States)

    Liu, Xuan

    Power grid is one of the most critical infrastructures in a nation and could suffer a variety of cyber attacks. With the development of Smart Grid, false data injection attack has recently attracted wide research interest. This thesis proposes a false data attack model with incomplete network information and develops optimal attack strategies for attacking load measurements and the real-time topology of a power grid. The impacts of false data on the economic and reliable operations of power systems are quantitatively analyzed in this thesis. To mitigate the risk of cyber attacks, a distributed protection strategies are also developed. It has been shown that an attacker can design false data to avoid being detected by the control center if the network information of a power grid is known to the attacker. In practice, however, it is very hard or even impossible for an attacker to obtain all network information of a power grid. In this thesis, we propose a local load redistribution attacking model based on incomplete network information and show that an attacker only needs to obtain the network information of the local attacking region to inject false data into smart meters in the local region without being detected by the state estimator. A heuristic algorithm is developed to determine a feasible attacking region by obtaining reduced network information. This thesis investigates the impacts of false data on the operations of power systems. It has been shown that false data can be designed by an attacker to: 1) mask the real-time topology of a power grid; 2) overload a transmission line; 3) disturb the line outage detection based on PMU data. To mitigate the risk of cyber attacks, this thesis proposes a new protection strategy, which intends to mitigate the damage effects of false data injection attacks by protecting a small set of critical measurements. To further reduce the computation complexity, a mixed integer linear programming approach is also proposed to

  20. Whispering through DDoS attack

    OpenAIRE

    Miralem Mehic; Jiri Slachta; Miroslav Voznak

    2016-01-01

    Denial of service (DoS) attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS) attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes o...

  1. Polyurethane Nanofiber Membranes for Waste Water Treatment by Membrane Distillation

    Directory of Open Access Journals (Sweden)

    T. Jiříček

    2017-01-01

    Full Text Available Self-sustained electrospun polyurethane nanofiber membranes were manufactured and tested on a direct-contact membrane distillation unit in an effort to find the optimum membrane thickness to maximize flux rate and minimize heat losses across the membrane. Also salt retention and flux at high salinities up to 100 g kg−1 were evaluated. Even though the complex structure of nanofiber layers has extreme specific surface and porosity, membrane performance was surprisingly predictable; the highest flux was achieved with the thinnest membranes and the best energy efficiency was achieved with the thickest membranes. All membranes had salt retention above 99%. Nanotechnology offers the potential to find modern solutions for desalination of waste waters, by introducing new materials with revolutionary properties, but new membranes must be developed according to the target application.

  2. Trp[superscript 2313]-His[superscript 2315] of Factor VIII C2 Domain Is Involved in Membrane Binding Structure of a Complex Between the C[subscript 2] Domain and an Inhibitor of Membrane Binding

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Zhuo; Lin, Lin; Yuan, Cai; Nicolaes, Gerry A.F.; Chen, Liqing; Meehan, Edward J.; Furie, Bruce; Furie, Barbara; Huang, Mingdong (Harvard-Med); (UAH); (Maastricht); (Chinese Aca. Sci.)

    2010-11-03

    Factor VIII (FVIII) plays a critical role in blood coagulation by forming the tenase complex with factor IXa and calcium ions on a membrane surface containing negatively charged phospholipids. The tenase complex activates factor X during blood coagulation. The carboxyl-terminal C2 domain of FVIII is the main membrane-binding and von Willebrand factor-binding region of the protein. Mutations of FVIII cause hemophilia A, whereas elevation of FVIII activity is a risk factor for thromboembolic diseases. The C2 domain-membrane interaction has been proposed as a target of intervention for regulation of blood coagulation. A number of molecules that interrupt FVIII or factor V (FV) binding to cell membranes have been identified through high throughput screening or structure-based design. We report crystal structures of the FVIII C2 domain under three new crystallization conditions, and a high resolution (1.15 {angstrom}) crystal structure of the FVIII C2 domain bound to a small molecular inhibitor. The latter structure shows that the inhibitor binds to the surface of an exposed {beta}-strand of the C2 domain, Trp{sup 2313}-His{sup 2315}. This result indicates that the Trp{sup 2313}-His{sup 2315} segment is an important constituent of the membrane-binding motif and provides a model to understand the molecular mechanism of the C2 domain membrane interaction.

  3. Giant plasma membrane vesicles: models for understanding membrane organization.

    Science.gov (United States)

    Levental, Kandice R; Levental, Ilya

    2015-01-01

    The organization of eukaryotic membranes into functional domains continues to fascinate and puzzle cell biologists and biophysicists. The lipid raft hypothesis proposes that collective lipid interactions compartmentalize the membrane into coexisting liquid domains that are central to membrane physiology. This hypothesis has proven controversial because such structures cannot be directly visualized in live cells by light microscopy. The recent observations of liquid-liquid phase separation in biological membranes are an important validation of the raft hypothesis and enable application of the experimental toolbox of membrane physics to a biologically complex phase-separated membrane. This review addresses the role of giant plasma membrane vesicles (GPMVs) in refining the raft hypothesis and expands on the application of GPMVs as an experimental model to answer some of key outstanding problems in membrane biology. Copyright © 2015 Elsevier Inc. All rights reserved.

  4. The big and intricate dreams of little organelles: Embracing complexity in the study of membrane traffic.

    Science.gov (United States)

    Liu, Allen P; Botelho, Roberto J; Antonescu, Costin N

    2017-09-01

    Compartmentalization of eukaryotic cells into dynamic organelles that exchange material through regulated membrane traffic governs virtually every aspect of cellular physiology including signal transduction, metabolism and transcription. Much has been revealed about the molecular mechanisms that control organelle dynamics and membrane traffic and how these processes are regulated by metabolic, physical and chemical cues. From this emerges the understanding of the integration of specific organellar phenomena within complex, multiscale and nonlinear regulatory networks. In this review, we discuss systematic approaches that revealed remarkable insight into the complexity of these phenomena, including the use of proximity-based proteomics, high-throughput imaging, transcriptomics and computational modeling. We discuss how these methods offer insights to further understand molecular versatility and organelle heterogeneity, phenomena that allow a single organelle population to serve a range of physiological functions. We also detail on how transcriptional circuits drive organelle adaptation, such that organelles may shift their function to better serve distinct differentiation and stress conditions. Thus, organelle dynamics and membrane traffic are functionally heterogeneous and adaptable processes that coordinate with higher-order system behavior to optimize cell function under a range of contexts. Obtaining a comprehensive understanding of organellar phenomena will increasingly require combined use of reductionist and system-based approaches. © 2017 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  5. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks. In prac......In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks....... In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...

  6. Using Combined One-Time Password for Prevention of Phishing Attacks

    Directory of Open Access Journals (Sweden)

    S. Nasiri

    2017-12-01

    Full Text Available Αs technologies and communications develop, more sabotaging attacks occur including phishing attacks which jeopardize users' security and critical information like their passwords and credentials. Several solutions have been proposed for existing dangers. One of which is the use of one-time passwords. This issue has remained as a main challenge and requires more extensive research. In this research, we have focused on one-time password combinations and we also have proposed solutions based on behavioral patterns which lead to significant optimizations while tending the simplicity for users. Efficiency of the proposed method has been measured through defining scenarios, modeling and simulations based on a prevention rate index. In addition, complexity coefficient of the proposed method showing the probability of unpredictability of passwords for attackers has been calculated. Ultimately, a descriptive comparison has shown that the proposed method is superior to some of the existing methods.

  7. Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks

    Directory of Open Access Journals (Sweden)

    Apostolos P. Fournaris

    2017-07-01

    Full Text Available Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT and Operational Technology (OT systems that are meant to operate harmonically under a security critical framework. As security IT countermeasures are gradually been installed in many embedded system nodes, thus securing them from many well-know cyber attacks there is a lurking danger that is still overlooked. Apart from the software vulnerabilities that typical malicious programs use, there are some very interesting hardware vulnerabilities that can be exploited in order to mount devastating software or hardware attacks (typically undetected by software countermeasures capable of fully compromising any embedded system device. Real-time microarchitecture attacks such as the cache side-channel attacks are such case but also the newly discovered Rowhammer fault injection attack that can be mounted even remotely to gain full access to a device DRAM (Dynamic Random Access Memory. Under the light of the above dangers that are focused on the device hardware structure, in this paper, an overview of this attack field is provided including attacks, threat directives and countermeasures. The goal of this paper is not to exhaustively overview attacks and countermeasures but rather to survey the various, possible, existing attack directions and highlight the security risks that they can pose to security critical embedded systems as well as indicate their strength on compromising the Quality of Service (QoS such systems are designed to provide.

  8. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  9. Quantum chemical study of halophilic interactions. Communication 3. Non-empirical study of the ways of tetrachloromethane attack by halide ions

    International Nuclear Information System (INIS)

    Kobychev, V.B.; Vitkovskaya, N.M.; Abramov, A.V.; Timokhin, B.V.

    1999-01-01

    It has been shown by means of non-empirical calculations of model reactions between tetrachloromethane and chlorine/iodine anions that in case of attack via carbon atom according to mechanism S N 2 formation of weakly-bound CCl 4 complexes with halide ions is observed at initial state. Further transformation of the complexes is restricted by considerable potential barriers. Attack of nucleophil via chlorine atom with formation of stable complexes CCl 3 -Cl-Hlg - is preferable [ru

  10. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  11. Invisible Trojan-horse attack.

    Science.gov (United States)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin; Makarov, Vadim

    2017-08-21

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Ac´ın-Ribordy-Gisin (SARG04) QKD protocol at 1924 nm versus that at 1536 nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N. Jain et al., New J. Phys. 16, 123030 (2014). However at 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.

  12. Synthesis and Functional Reconstitution of Light-Harvesting Complex II into Polymeric Membrane Architectures.

    Science.gov (United States)

    Zapf, Thomas; Tan, Cherng-Wen Darren; Reinelt, Tobias; Huber, Christoph; Shaohua, Ding; Geifman-Shochat, Susana; Paulsen, Harald; Sinner, Eva-Kathrin

    2015-12-01

    One of most important processes in nature is the harvesting and dissipation of solar energy with the help of light-harvesting complex II (LHCII). This protein, along with its associated pigments, is the main solar-energy collector in higher plants. We aimed to generate stable, highly controllable, and sustainable polymer-based membrane systems containing LHCII-pigment complexes ready for light harvesting. LHCII was produced by cell-free protein synthesis based on wheat-germ extract, and the successful integration of LHCII and its pigments into different membrane architectures was monitored. The unidirectionality of LHCII insertion was investigated by protease digestion assays. Fluorescence measurements indicated chlorophyll integration in the presence of LHCII in spherical as well as planar bilayer architectures. Surface plasmon enhanced fluorescence spectroscopy (SPFS) was used to reveal energy transfer from chlorophyll b to chlorophyll a, which indicates native folding of the LHCII proteins. © 2015 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  13. Disrupting assembly of the inner membrane complex blocks Plasmodium falciparum sexual stage development.

    Directory of Open Access Journals (Sweden)

    Molly Parkyn Schneider

    2017-10-01

    Full Text Available Transmission of malaria parasites relies on the formation of a specialized blood form called the gametocyte. Gametocytes of the human pathogen, Plasmodium falciparum, adopt a crescent shape. Their dramatic morphogenesis is driven by the assembly of a network of microtubules and an underpinning inner membrane complex (IMC. Using super-resolution optical and electron microscopies we define the ultrastructure of the IMC at different stages of gametocyte development. We characterize two new proteins of the gametocyte IMC, called PhIL1 and PIP1. Genetic disruption of PhIL1 or PIP1 ablates elongation and prevents formation of transmission-ready mature gametocytes. The maturation defect is accompanied by failure to form an enveloping IMC and a marked swelling of the digestive vacuole, suggesting PhIL1 and PIP1 are required for correct membrane trafficking. Using immunoprecipitation and mass spectrometry we reveal that PhIL1 interacts with known and new components of the gametocyte IMC.

  14. The Importance of Loosely Systematized Game Phases in Sports: The Case of Attack Coverage Systems in High-Level Women’s Volleyball

    Directory of Open Access Journals (Sweden)

    Lorenzo Laporta

    2015-03-01

    Full Text Available Change is ubiquitous, but its degree and rate often affords detection of emerging patterns and establishing behavioral dynamics based on expected regularities. Match analysis capitalizes on such regularities, capturing information relevant for enhancing structure and reducing improvisation to a minimum. However, what if a game phase is only loosely regular, defying pattern systematization? Is it still possible to unfold principles of behavior capable of abstracting over-arching patterns? Our research focused on analysis of complex IV (KIV or attack coverage in volleyball. Fourteen matches from the 2013 Volleyball Women’s World Grand Champions Cup were analyzed. Results showed the occurrence of KIV corresponded to fewer than 5% of the total number of actions, and plays where a team successfully conquered a point after attack coverage was circa 1%, meaning this game complex will only make a difference in balanced matches. Overall, twenty-nine attack coverage structures emerged, denoting very high organizational variability. Attack coverage therefore provides an example of principle-based and not structured-based game phase. Associative analysis showed that quick attack tempos constrain the emergence of more complex attack coverage structures. The search for principle-based instead of structure-based game phases may provide useful insights for comprehension of game dynamics and for informing training processes.

  15. Whispering through DDoS attack

    Directory of Open Access Journals (Sweden)

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  16. Some scale-free networks could be robust under selective node attacks

    Science.gov (United States)

    Zheng, Bojin; Huang, Dan; Li, Deyi; Chen, Guisheng; Lan, Wenfei

    2011-04-01

    It is a mainstream idea that scale-free network would be fragile under the selective attacks. Internet is a typical scale-free network in the real world, but it never collapses under the selective attacks of computer viruses and hackers. This phenomenon is different from the deduction of the idea above because this idea assumes the same cost to delete an arbitrary node. Hence this paper discusses the behaviors of the scale-free network under the selective node attack with different cost. Through the experiments on five complex networks, we show that the scale-free network is possibly robust under the selective node attacks; furthermore, the more compact the network is, and the larger the average degree is, then the more robust the network is; with the same average degrees, the more compact the network is, the more robust the network is. This result would enrich the theory of the invulnerability of the network, and can be used to build robust social, technological and biological networks, and also has the potential to find the target of drugs.

  17. Equivalent complex conductivities representing the effects of T-tubules and folded surface membranes on the electrical admittance and impedance of skeletal muscles measured by external-electrode method

    Science.gov (United States)

    Sekine, Katsuhisa

    2017-12-01

    In order to represent the effects of T-tubules and folded surface membranes on the electrical admittance and impedance of skeletal muscles measured by the external-electrode method, analytical relations for the equivalent complex conductivities of hypothetical smooth surface membranes were derived. In the relations, the effects of each tubule were represented by the admittance of a straight cable. The effects of the folding of a surface membrane were represented by the increased area of surface membranes. The equivalent complex conductivities were represented as summation of these effects, and the effects of the T-tubules were different between the transversal and longitudinal directions. The validity of the equivalent complex conductivities was supported by the results of finite-difference method (FDM) calculations made using three-dimensional models in which T-tubules and folded surface membranes were represented explicitly. FDM calculations using the equivalent complex conductivities suggested that the electrically inhomogeneous structure due to the existence of muscle cells with T-tubules was sufficient for explaining the experimental results previously obtained using the external-electrode method. Results of FDM calculations in which the structural changes caused by muscle contractions were taken into account were consistent with the reported experimental results.

  18. Intentional risk management through complex networks analysis

    CERN Document Server

    Chapela, Victor; Moral, Santiago; Romance, Miguel

    2015-01-01

    This book combines game theory and complex networks to examine intentional technological risk through modeling. As information security risks are in constant evolution,  the methodologies and tools to manage them must evolve to an ever-changing environment. A formal global methodology is explained  in this book, which is able to analyze risks in cyber security based on complex network models and ideas extracted from the Nash equilibrium. A risk management methodology for IT critical infrastructures is introduced which provides guidance and analysis on decision making models and real situations. This model manages the risk of succumbing to a digital attack and assesses an attack from the following three variables: income obtained, expense needed to carry out an attack, and the potential consequences for an attack. Graduate students and researchers interested in cyber security, complex network applications and intentional risk will find this book useful as it is filled with a number of models, methodologies a...

  19. Heart attack - discharge

    Science.gov (United States)

    ... and lifestyle Cholesterol - drug treatment Controlling your high blood pressure Deep vein thrombosis - discharge Dietary fats explained Fast food tips Heart attack - discharge Heart attack - what to ask your doctor Heart bypass ... pacemaker - discharge High blood pressure - what to ask your doctor How to read ...

  20. Two conformational states of the membrane-associated Bacillus thuringiensis Cry4Ba δ-endotoxin complex revealed by electron crystallography: Implications for toxin-pore formation

    International Nuclear Information System (INIS)

    Ounjai, Puey; Unger, Vinzenz M.; Sigworth, Fred J.; Angsuthanasombat, Chanan

    2007-01-01

    The insecticidal nature of Cry δ-endotoxins produced by Bacillus thuringiensis is generally believed to be caused by their ability to form lytic pores in the midgut cell membrane of susceptible insect larvae. Here we have analyzed membrane-associated structures of the 65-kDa dipteran-active Cry4Ba toxin by electron crystallography. The membrane-associated toxin complex was crystallized in the presence of DMPC via detergent dialysis. Depending upon the charge of the adsorbed surface, 2D crystals of the oligomeric toxin complex have been captured in two distinct conformations. The projection maps of those crystals have been generated at 17 A resolution. Both complexes appeared to be trimeric; as in one crystal form, its projection structure revealed a symmetrical pinwheel-like shape with virtually no depression in the middle of the complex. The other form revealed a propeller-like conformation displaying an obvious hole in the center region, presumably representing the toxin-induced pore. These crystallographic data thus demonstrate for the first time that the 65-kDa activated Cry4Ba toxin in association with lipid membranes could exist in at least two different trimeric conformations, conceivably implying the closed and open states of the pore

  1. Jaguar Attack on a Child: Case Report and Literature Review

    Directory of Open Access Journals (Sweden)

    Iserson, Kenneth V.

    2015-02-01

    Full Text Available Jaguar attacks on humans rarely occur in the wild. When they do, they are often fatal. We describe a jaguar attack on a three-year-old girl near her home deep in a remote area of the Guyanese jungle. The patient had a complex but, relatively, rapid transport to a medical treatment facility for her life-threatening injuries. The child, who suffered typical jaguar-inflicted injury patterns and survived, is highlighted. We review jaguar anatomy, environmental status, hunting and killing behaviors, and discuss optimal medical management, given the resource-limited treatment environment of this international emergency medicine case. [West J Emerg Med. 2015;16(2:303–309.

  2. Cationic liposome/DNA complexes: from structure to interactions with cellular membranes.

    Science.gov (United States)

    Caracciolo, Giulio; Amenitsch, Heinz

    2012-10-01

    Gene-based therapeutic approaches are based upon the concept that, if a disease is caused by a mutation in a gene, then adding back the wild-type gene should restore regular function and attenuate the disease phenotype. To deliver the gene of interest, both viral and nonviral vectors are used. Viruses are efficient, but their application is impeded by detrimental side-effects. Among nonviral vectors, cationic liposomes are the most promising candidates for gene delivery. They form stable complexes with polyanionic DNA (lipoplexes). Despite several advantages over viral vectors, the transfection efficiency (TE) of lipoplexes is too low compared with those of engineered viral vectors. This is due to lack of knowledge about the interactions between complexes and cellular components. Rational design of efficient lipoplexes therefore requires deeper comprehension of the interactions between the vector and the DNA as well as the cellular pathways and mechanisms involved. The importance of the lipoplex structure in biological function is revealed in the application of synchrotron small-angle X-ray scattering in combination with functional TE measurements. According to current understanding, the structure of lipoplexes can change upon interaction with cellular membranes and such changes affect the delivery efficiency. Recently, a correlation between the mechanism of gene release from complexes, the structure, and the physical and chemical parameters of the complexes has been established. Studies aimed at correlating structure and activity of lipoplexes are reviewed herein. This is a fundamental step towards rational design of highly efficient lipid gene vectors.

  3. Tracking Glideosome-associated protein 50 reveals the development and organization of the inner membrane complex of Plasmodium falciparum.

    Science.gov (United States)

    Yeoman, Jeffrey A; Hanssen, Eric; Maier, Alexander G; Klonis, Nectarios; Maco, Bohumil; Baum, Jake; Turnbull, Lynne; Whitchurch, Cynthia B; Dixon, Matthew W A; Tilley, Leann

    2011-04-01

    The most deadly of the human malaria parasites, Plasmodium falciparum, has different stages specialized for invasion of hepatocytes, erythrocytes, and the mosquito gut wall. In each case, host cell invasion is powered by an actin-myosin motor complex that is linked to an inner membrane complex (IMC) via a membrane anchor called the glideosome-associated protein 50 (PfGAP50). We generated P. falciparum transfectants expressing green fluorescent protein (GFP) chimeras of PfGAP50 (PfGAP50-GFP). Using immunoprecipitation and fluorescence photobleaching, we show that C-terminally tagged PfGAP50-GFP can form a complex with endogenous copies of the linker protein PfGAP45 and the myosin A tail domain-interacting protein (MTIP). Full-length PfGAP50-GFP is located in the endoplasmic reticulum in early-stage parasites and then redistributes to apical caps during the formation of daughter merozoites. In the final stage of schizogony, the PfGAP50-GFP profile extends further around the merozoite surface. Three-dimensional (3D) structured illumination microscopy reveals the early-stage IMC as a doubly punctured flat ellipsoid that separates to form claw-shaped apposed structures. A GFP fusion of PfGAP50 lacking the C-terminal membrane anchor is misdirected to the parasitophorous vacuole. Replacement of the acid phosphatase homology domain of PfGAP50 with GFP appears to allow correct trafficking of the chimera but confers a growth disadvantage.

  4. Yeast Mitochondrial Interactosome Model: Metabolon Membrane Proteins Complex Involved in the Channeling of ADP/ATP

    Directory of Open Access Journals (Sweden)

    Benjamin Clémençon

    2012-02-01

    Full Text Available The existence of a mitochondrial interactosome (MI has been currently well established in mammalian cells but the exact composition of this super-complex is not precisely known, and its organization seems to be different from that in yeast. One major difference is the absence of mitochondrial creatine kinase (MtCK in yeast, unlike that described in the organization model of MI, especially in cardiac, skeletal muscle and brain cells. The aim of this review is to provide a detailed description of different partner proteins involved in the synergistic ADP/ATP transport across the mitochondrial membranes in the yeast Saccharomyces cerevisiae and to propose a new mitochondrial interactosome model. The ADP/ATP (Aacp and inorganic phosphate (PiC carriers as well as the VDAC (or mitochondrial porin catalyze the import and export of ADP, ATP and Pi across the mitochondrial membranes. Aacp and PiC, which appear to be associated with the ATP synthase, consist of two nanomotors (F0, F1 under specific conditions and form ATP synthasome. Identification and characterization of such a complex were described for the first time by Pedersen and co-workers in 2003.

  5. Shooting Alone: The Pre-Attack Experiences and Behaviors of U.S. Solo Mass Murderers.

    Science.gov (United States)

    Gill, Paul; Silver, James; Horgan, John; Corner, Emily

    2017-05-01

    This paper outlines the sociodemographic, developmental, antecedent attack, attack preparation, and commission properties of 115 mass murderers between 1990 and 2014. The results indicate that mass murderer attacks are usually the culmination of a complex mix of personal, political, and social drivers that crystalize at the same time to drive the individual down the path of violent action. We specifically focus upon areas related to prior criminal engagement, leakage, and attack location familiarity. Whether the violence comes to fruition is usually a combination of the availability and vulnerability of suitable targets that suit the heady mix of personal and political grievances and the individual's capability to engage in an attack from both a psychological and technical capability standpoint. Many individual cases share a mixture of unfortunate personal life circumstances coupled with an intensification of beliefs/grievances that later developed into the idea to engage in violence. © 2016 American Academy of Forensic Sciences.

  6. Localization of the AP-3 adaptor complex defines a novel endosomal exit site for lysosomal membrane proteins

    NARCIS (Netherlands)

    Peden, A.A.; Oorschot, V.; Hesser, B.A.; Austin, C.D.; Scheller, R.H.; Klumperman, J.

    2004-01-01

    The adaptor protein (AP) 3 adaptor complex has been implicated in the transport of lysosomal membrane proteins, but its precise site of action has remained controversial. Here, we show by immuno-electron microscopy that AP-3 is associated with budding profiles evolving from a tubular endosomal

  7. Tactic determinants of game practiced by middle attacker in men’s volleyball

    Directory of Open Access Journals (Sweden)

    Gustavo De Conti Teixeira Costa

    2016-07-01

    Full Text Available DOI: http://dx.doi.org/10.5007/1980-0037.2016v18n3p371   Among volleyball skills, spike is responsible for the highest number of scores, and the first tempo of attack is related to the higher incidence of score a point, by hindering the defensive opponent’s action. However, most of the studies show general results and do not specify the conditions and constraints of each attack zone. Thus, the aim of this study was analyzing the offensive game (complex I performed by the middle attacker at the 2014/2015 National men’s Brazilian Championship (Superliga. The sample wascomposed by 142 games of 12 teams, totaling 5350 receptions, setting and spikes actions. The results showed that the middle spikes occurred mostly after receptions A and B, being the most frequent attack scoring point as well as the most powerful one. Moreover, the relationship between the reception effect and setting effect was observed, showing that the best receptions influenced the setting type and the attack effect. Therefore, the middle attack had effective effect in the winning score, since it decreased the chances of opponent’s defense, due to the reduced time to defensive organization. Finally, the situational constraints delimited the middle attacker actions. Based on the above, we suggest that future studies should restrict the analysis conditions and situational constraints of each specific game situation.

  8. The LOCAL attack: Cryptanalysis of the authenticated encryption scheme ALE

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Rechberger, Christian

    2014-01-01

    We show how to produce a forged (ciphertext, tag) pair for the scheme ALE with data and time complexity of 2102 ALE encryptions of short messages and the same number of authentication attempts. We use a differential attack based on a local collision, which exploits the availability of extracted...

  9. High angle of attack aerodynamics subsonic, transonic, and supersonic flows

    CERN Document Server

    Rom, Josef

    1992-01-01

    The aerodynamics of aircraft at high angles of attack is a subject which is being pursued diligently, because the modern agile fighter aircraft and many of the current generation of missiles must perform well at very high incidence, near and beyond stall. However, a comprehensive presentation of the methods and results applicable to the studies of the complex aerodynamics at high angle of attack has not been covered in monographs or textbooks. This book is not the usual textbook in that it goes beyond just presenting the basic theoretical and experimental know-how, since it contains reference material to practical calculation methods and technical and experimental results which can be useful to the practicing aerospace engineers and scientists. It can certainly be used as a text and reference book for graduate courses on subjects related to high angles of attack aerodynamics and for topics related to three-dimensional separation in viscous flow courses. In addition, the book is addressed to the aerodynamicist...

  10. Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0

    NARCIS (Netherlands)

    Gadyatskaya, Olga; Jhawar, Ravi; Kordy, P.T.; Lounis, Karim; Mauw, Sjouke; Trujillo-Rasua, Rolando

    2016-01-01

    In this tool demonstration paper we present the ADTool2.0: an open-source software tool for design, manipulation and analysis of attack trees. The tool supports ranking of attack scenarios based on quantitative attributes entered by the user; it is scriptable; and it incorporates attack trees with

  11. Nanodisc-solubilized membrane protein library reflects the membrane proteome.

    Science.gov (United States)

    Marty, Michael T; Wilcox, Kyle C; Klein, William L; Sligar, Stephen G

    2013-05-01

    The isolation and identification of unknown membrane proteins offers the prospect of discovering new pharmaceutical targets and identifying key biochemical receptors. However, interactions between membrane protein targets and soluble ligands are difficult to study in vitro due to the insolubility of membrane proteins in non-detergent systems. Nanodiscs, nanoscale discoidal lipid bilayers encircled by a membrane scaffold protein belt, have proven to be an effective platform to solubilize membrane proteins and have been used to study a wide variety of purified membrane proteins. This report details the incorporation of an unbiased population of membrane proteins from Escherichia coli membranes into Nanodiscs. This solubilized membrane protein library (SMPL) forms a soluble in vitro model of the membrane proteome. Since Nanodiscs contain isolated proteins or small complexes, the SMPL is an ideal platform for interactomics studies and pull-down assays of membrane proteins. Sodium dodecyl sulfate-polyacrylamide gel electrophoresis analysis of the protein population before and after formation of the Nanodisc library indicates that a large percentage of the proteins are incorporated into the library. Proteomic identification of several prominent bands demonstrates the successful incorporation of outer and inner membrane proteins into the Nanodisc library.

  12. Mitochondrial membrane potential in human neutrophils is maintained by complex III activity in the absence of supercomplex organisation

    NARCIS (Netherlands)

    van Raam, Bram J.; Sluiter, Wim; de Wit, Elly; Roos, Dirk; Verhoeven, Arthur J.; Kuijpers, Taco W.

    2008-01-01

    BACKGROUND: Neutrophils depend mainly on glycolysis for their energy provision. Their mitochondria maintain a membrane potential (Deltapsi(m)), which is usually generated by the respiratory chain complexes. We investigated the source of Deltapsi(m) in neutrophils, as compared to peripheral blood

  13. Complexation induced phase separation: preparation of composite membranes with a nanometer thin dense skin loaded with metal ions

    KAUST Repository

    Villalobos Vazquez de la Parra, Luis Francisco; Karunakaran, Madhavan; Peinemann, Klaus-Viktor

    2015-01-01

    We present the development of a facile phase-inversion method for forming asymmetric membranes with a precise high metal ion loading capacity in only the dense layer. The approach combines the use of macromolecule-metal intermolecular complexes to form the dense layer of asymmetric membranes with nonsolvent-induced phase separation to form the porous support. This allows the independent optimization of both the dense layer and porous support while maintaining the simplicity of a phase-inversion process. Moreover, it facilitates control over (i) the thickness of the dense layer throughout several orders of magnitude—from less than 15 nm to more than 6 μm, (ii) the type and amount of metal ions loaded in the dense layer, (iii) the morphology of the membrane surface, and (iv) the porosity and structure of the support. This simple and scalable process provides a new platform for building multifunctional membranes with a high loading of well-dispersed metal ions in the dense layer.

  14. Complexation induced phase separation: preparation of composite membranes with a nanometer thin dense skin loaded with metal ions

    KAUST Repository

    Villalobos Vazquez de la Parra, Luis Francisco

    2015-04-21

    We present the development of a facile phase-inversion method for forming asymmetric membranes with a precise high metal ion loading capacity in only the dense layer. The approach combines the use of macromolecule-metal intermolecular complexes to form the dense layer of asymmetric membranes with nonsolvent-induced phase separation to form the porous support. This allows the independent optimization of both the dense layer and porous support while maintaining the simplicity of a phase-inversion process. Moreover, it facilitates control over (i) the thickness of the dense layer throughout several orders of magnitude—from less than 15 nm to more than 6 μm, (ii) the type and amount of metal ions loaded in the dense layer, (iii) the morphology of the membrane surface, and (iv) the porosity and structure of the support. This simple and scalable process provides a new platform for building multifunctional membranes with a high loading of well-dispersed metal ions in the dense layer.

  15. Combining blue native polyacrylamide gel electrophoresis with liquid chromatography tandem mass spectrometry as an effective strategy for analyzing potential membrane protein complexes of Mycobacterium bovis bacillus Calmette-Guérin

    Directory of Open Access Journals (Sweden)

    Li Weijun

    2011-01-01

    Full Text Available Abstract Background Tuberculosis is an infectious bacterial disease in humans caused primarily by Mycobacterium tuberculosis, and infects one-third of the world's total population. Mycobacterium bovis bacillus Calmette-Guérin (BCG vaccine has been widely used to prevent tuberculosis worldwide since 1921. Membrane proteins play important roles in various cellular processes, and the protein-protein interactions involved in these processes may provide further information about molecular organization and cellular pathways. However, membrane proteins are notoriously under-represented by traditional two-dimensional polyacrylamide gel electrophoresis (2-D PAGE and little is known about mycobacterial membrane and membrane-associated protein complexes. Here we investigated M. bovis BCG by an alternative proteomic strategy coupling blue native PAGE to liquid chromatography tandem mass spectrometry (LC-MS/MS to characterize potential protein-protein interactions in membrane fractions. Results Using this approach, we analyzed native molecular composition of protein complexes in BCG membrane fractions. As a result, 40 proteins (including 12 integral membrane proteins, which were organized in 9 different gel bands, were unambiguous identified. The proteins identified have been experimentally confirmed using 2-D SDS PAGE. We identified MmpL8 and four neighboring proteins that were involved in lipid transport complexes, and all subunits of ATP synthase complex in their monomeric states. Two phenolpthiocerol synthases and three arabinosyltransferases belonging to individual operons were obtained in different gel bands. Furthermore, two giant multifunctional enzymes, Pks7 and Pks8, and four mycobacterial Hsp family members were determined. Additionally, seven ribosomal proteins involved in polyribosome complex and two subunits of the succinate dehydrogenase complex were also found. Notablely, some proteins with high hydrophobicity or multiple transmembrane

  16. Combining blue native polyacrylamide gel electrophoresis with liquid chromatography tandem mass spectrometry as an effective strategy for analyzing potential membrane protein complexes of Mycobacterium bovis bacillus Calmette-Guérin.

    Science.gov (United States)

    Zheng, Jianhua; Wei, Candong; Zhao, Lina; Liu, Liguo; Leng, Wenchuan; Li, Weijun; Jin, Qi

    2011-01-18

    Tuberculosis is an infectious bacterial disease in humans caused primarily by Mycobacterium tuberculosis, and infects one-third of the world's total population. Mycobacterium bovis bacillus Calmette-Guérin (BCG) vaccine has been widely used to prevent tuberculosis worldwide since 1921. Membrane proteins play important roles in various cellular processes, and the protein-protein interactions involved in these processes may provide further information about molecular organization and cellular pathways. However, membrane proteins are notoriously under-represented by traditional two-dimensional polyacrylamide gel electrophoresis (2-D PAGE) and little is known about mycobacterial membrane and membrane-associated protein complexes. Here we investigated M. bovis BCG by an alternative proteomic strategy coupling blue native PAGE to liquid chromatography tandem mass spectrometry (LC-MS/MS) to characterize potential protein-protein interactions in membrane fractions. Using this approach, we analyzed native molecular composition of protein complexes in BCG membrane fractions. As a result, 40 proteins (including 12 integral membrane proteins), which were organized in 9 different gel bands, were unambiguous identified. The proteins identified have been experimentally confirmed using 2-D SDS PAGE. We identified MmpL8 and four neighboring proteins that were involved in lipid transport complexes, and all subunits of ATP synthase complex in their monomeric states. Two phenolpthiocerol synthases and three arabinosyltransferases belonging to individual operons were obtained in different gel bands. Furthermore, two giant multifunctional enzymes, Pks7 and Pks8, and four mycobacterial Hsp family members were determined. Additionally, seven ribosomal proteins involved in polyribosome complex and two subunits of the succinate dehydrogenase complex were also found. Notablely, some proteins with high hydrophobicity or multiple transmembrane helixes were identified well in our work. In this

  17. The work-averse cyber attacker model : theory and evidence from two million attack signatures

    NARCIS (Netherlands)

    Allodi, L.; Massacci, F.; Williams, J.

    The typical cyber attacker is assumed to be all powerful and to exploit all possible vulnerabilities. In this paper we present, and empirically validate, a novel and more realistic attacker model. The intuition of our model is that an attacker will optimally choose whether to act and weaponize a new

  18. Password-only authenticated three-party key exchange proven secure against insider dictionary attacks.

    Science.gov (United States)

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Paik, Juryon; Won, Dongho

    2014-01-01

    While a number of protocols for password-only authenticated key exchange (PAKE) in the 3-party setting have been proposed, it still remains a challenging task to prove the security of a 3-party PAKE protocol against insider dictionary attacks. To the best of our knowledge, there is no 3-party PAKE protocol that carries a formal proof, or even definition, of security against insider dictionary attacks. In this paper, we present the first 3-party PAKE protocol proven secure against both online and offline dictionary attacks as well as insider and outsider dictionary attacks. Our construct can be viewed as a protocol compiler that transforms any 2-party PAKE protocol into a 3-party PAKE protocol with 2 additional rounds of communication. We also present a simple and intuitive approach of formally modelling dictionary attacks in the password-only 3-party setting, which significantly reduces the complexity of proving the security of 3-party PAKE protocols against dictionary attacks. In addition, we investigate the security of the well-known 3-party PAKE protocol, called GPAKE, due to Abdalla et al. (2005, 2006), and demonstrate that the security of GPAKE against online dictionary attacks depends heavily on the composition of its two building blocks, namely a 2-party PAKE protocol and a 3-party key distribution protocol.

  19. Attack robustness and centrality of complex networks.

    Directory of Open Access Journals (Sweden)

    Swami Iyer

    Full Text Available Many complex systems can be described by networks, in which the constituent components are represented by vertices and the connections between the components are represented by edges between the corresponding vertices. A fundamental issue concerning complex networked systems is the robustness of the overall system to the failure of its constituent parts. Since the degree to which a networked system continues to function, as its component parts are degraded, typically depends on the integrity of the underlying network, the question of system robustness can be addressed by analyzing how the network structure changes as vertices are removed. Previous work has considered how the structure of complex networks change as vertices are removed uniformly at random, in decreasing order of their degree, or in decreasing order of their betweenness centrality. Here we extend these studies by investigating the effect on network structure of targeting vertices for removal based on a wider range of non-local measures of potential importance than simply degree or betweenness. We consider the effect of such targeted vertex removal on model networks with different degree distributions, clustering coefficients and assortativity coefficients, and for a variety of empirical networks.

  20. Self-Healing Proton-Exchange Membranes Composed of Nafion-Poly(vinyl alcohol) Complexes for Durable Direct Methanol Fuel Cells.

    Science.gov (United States)

    Li, Yixuan; Liang, Liang; Liu, Changpeng; Li, Yang; Xing, Wei; Sun, Junqi

    2018-04-30

    Proton-exchange membranes (PEMs) that can heal mechanical damage to restore original functions are important for the fabrication of durable and reliable direct methanol fuel cells (DMFCs). The fabrication of healable PEMs that exhibit satisfactory mechanical stability, enhanced proton conductivity, and suppressed methanol permeability via hydrogen-bonding complexation between Nafion and poly(vinyl alcohol) (PVA) followed by postmodification with 4-carboxybenzaldehyde (CBA) molecules is presented. Compared with pure Nafion, the CBA/Nafion-PVA membranes exhibit enhanced mechanical properties with an ultimate tensile strength of ≈20.3 MPa and strain of ≈380%. The CBA/Nafion-PVA membrane shows a proton conductivity of 0.11 S cm -1 at 80 °C, which is 1.2-fold higher than that of a Nafion membrane. The incorporated PVA gives the CBA/Nafion-PVA membranes excellent proton conductivity and methanol resistance. The resulting CBA/Nafion-PVA membranes are capable of healing mechanical damage of several tens of micrometers in size and restoring their original proton conductivity and methanol resistance under the working conditions of DMFCs. The healing property originates from the reversibility of hydrogen-bonding interactions between Nafion and CBA-modified PVA and the high chain mobility of Nafion and CBA-modified PVA. © 2018 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  1. Activation of the ficolin-lectin pathway during attacks of hereditary angioedema

    DEFF Research Database (Denmark)

    Csuka, Dorottya; Munthe-Fog, Lea; Hein, Estrid

    2014-01-01

    enrolled. We analyzed blood samples drawn during attacks, and obtained 35 samples from the same patients during symptom-free periods. The serum levels of ficolin-2, ficolin-3, MASP-2, ficolin-3/MASP-2 complex, C1-INH, and C4, as well as the extent of ficolin-3-mediated terminal complement complex (FCN3-TCC......) deposition, were measured using ELISA-based methods. RESULTS: Levels of MASP-2 and of the ficolin-3/MASP-2 complex were elevated (P TCC was lower (P TCC...

  2. Web server attack analyzer

    OpenAIRE

    Mižišin, Michal

    2013-01-01

    Web server attack analyzer - Abstract The goal of this work was to create prototype of analyzer of injection flaws attacks on web server. Proposed solution combines capabilities of web application firewall and web server log analyzer. Analysis is based on configurable signatures defined by regular expressions. This paper begins with summary of web attacks, followed by detection techniques analysis on web servers, description and justification of selected implementation. In the end are charact...

  3. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  4. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based......Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identified...... on invalidating policies in the system model by identifying possible sequences of actions that lead to an attack. The generated attacks are precise enough to illustrate the threat, and they are general enough to hide the details of individual steps....

  5. Membrane microdomains and the cytoskeleton constrain AtHIR1 dynamics and facilitate the formation of an AtHIR1-associated immune complex.

    Science.gov (United States)

    Lv, Xueqin; Jing, Yanping; Xiao, Jianwei; Zhang, Yongdeng; Zhu, Yingfang; Julian, Russell; Lin, Jinxing

    2017-04-01

    Arabidopsis hypersensitive-induced reaction (AtHIR) proteins function in plant innate immunity. However, the underlying mechanisms by which AtHIRs participate in plant immunity remain elusive. Here, using VA-TIRFM and FLIM-FRET, we revealed that AtHIR1 is present in membrane microdomains and co-localizes with the membrane microdomain marker REM1.3. Single-particle tracking analysis revealed that membrane microdomains and the cytoskeleton, especially microtubules, restrict the lateral mobility of AtHIR1 at the plasma membrane and facilitate its oligomerization. Furthermore, protein proximity index measurements, fluorescence cross-correlation spectroscopy, and biochemical experiments demonstrated that the formation of the AtHIR1 complex upon pathogen perception requires intact microdomains and cytoskeleton. Taken together, these findings suggest that microdomains and the cytoskeleton constrain AtHIR1 dynamics, promote AtHIR1 oligomerization, and increase the efficiency of the interactions of AtHIR1 with components of the AtHIR1 complex in response to pathogens, thus providing valuable insight into the mechanisms of defense-related responses in plants. © 2017 The Authors The Plant Journal © 2017 John Wiley & Sons Ltd.

  6. Primordial membranes

    DEFF Research Database (Denmark)

    Hanczyc, Martin M; Monnard, Pierre-Alain

    2017-01-01

    Cellular membranes, which are self-assembled bilayer structures mainly composed of lipids, proteins and conjugated polysaccharides, are the defining feature of cell physiology. It is likely that the complexity of contemporary cells was preceded by simpler chemical systems or protocells during...... the various evolutionary stages that led from inanimate to living matter. It is also likely that primitive membranes played a similar role in protocell 'physiology'. The composition of such ancestral membranes has been proposed as mixtures of single hydrocarbon chain amphiphiles, which are simpler versions...

  7. Cyber-Attacks and the Risks for CERN

    CERN Multimedia

    Computer Security Team

    2013-01-01

    In the previous Bulletin, we discussed the cyber-risks for the accelerator complex. However, looking at the broader picture, the cyber-risks for CERN are much more diverse.   Attacks can not only harm the operation of accelerators or experiments, but also impact negatively on the operation of the Organization as a whole and/or its reputation. This would not only hamper and impede our work while making us looking plain stupid, but might also make funding agencies reconsider whether their money is well invested in CERN… Examples? Sure, let’s be imaginative! What would be the consequences, if: a laptop holding sensitive CERN documents is lost or stolen, and ends up on eBay? your password is compromised and your mail account misused to send nasty messages to thousands of external mail addresses? an attacker manages to add photos of naked women/men onto a prominent CERN website, and boasts about this on Twitter? confidential documents like job application forms or passwo...

  8. Security attack detection algorithm for electric power gis system based on mobile application

    Science.gov (United States)

    Zhou, Chao; Feng, Renjun; Wang, Liming; Huang, Wei; Guo, Yajuan

    2017-05-01

    Electric power GIS is one of the key information technologies to satisfy the power grid construction in China, and widely used in power grid construction planning, weather, and power distribution management. The introduction of electric power GIS based on mobile applications is an effective extension of the geographic information system that has been widely used in the electric power industry. It provides reliable, cheap and sustainable power service for the country. The accurate state estimation is the important conditions to maintain the normal operation of the electric power GIS. Recent research has shown that attackers can inject the complex false data into the power system. The injection attack of this new type of false data (load integrity attack LIA) can successfully bypass the routine detection to achieve the purpose of attack, so that the control center will make a series of wrong decision. Eventually, leading to uneven distribution of power in the grid. In order to ensure the safety of the electric power GIS system based on mobile application, it is very important to analyze the attack mechanism and propose a new type of attack, and to study the corresponding detection method and prevention strategy in the environment of electric power GIS system based on mobile application.

  9. Introducing Membrane Charge and Membrane Potential to T Cell Signaling

    Directory of Open Access Journals (Sweden)

    Yuanqing Ma

    2017-11-01

    Full Text Available While membrane models now include the heterogeneous distribution of lipids, the impact of membrane charges on regulating the association of proteins with the plasma membrane is often overlooked. Charged lipids are asymmetrically distributed between the two leaflets of the plasma membrane, resulting in the inner leaflet being negatively charged and a surface potential that attracts and binds positively charged ions, proteins, and peptide motifs. These interactions not only create a transmembrane potential but they can also facilitate the formation of charged membrane domains. Here, we reference fields outside of immunology in which consequences of membrane charge are better characterized to highlight important mechanisms. We then focus on T cell receptor (TCR signaling, reviewing the evidence that membrane charges and membrane-associated calcium regulate phosphorylation of the TCR–CD3 complex and discuss how the immunological synapse exhibits distinct patterns of membrane charge distribution. We propose that charged lipids, ions in solution, and transient protein interactions form a dynamic equilibrium during T cell activation.

  10. Terrorists and Suicide Attacks

    National Research Council Canada - National Science Library

    Cronin, Audrey K

    2003-01-01

    Suicide attacks by terrorist organizations have become more prevalent globally, and assessing the threat of suicide attacks against the United States and its interests at home and abroad has therefore...

  11. APC binds the Miro/Milton motor complex to stimulate transport of mitochondria to the plasma membrane.

    Science.gov (United States)

    Mills, Kate M; Brocardo, Mariana G; Henderson, Beric R

    2016-02-01

    Mutations in adenomatous polyposis coli (APC) disrupt regulation of Wnt signaling, mitosis, and the cytoskeleton. We describe a new role for APC in the transport of mitochondria. Silencing of wild-type APC by small interfering RNA caused mitochondria to redistribute from the cell periphery to the perinuclear region. We identified novel APC interactions with the mitochondrial kinesin-motor complex Miro/Milton that were mediated by the APC C-terminus. Truncating mutations in APC abolished its ability to bind Miro/Milton and reduced formation of the Miro/Milton complex, correlating with disrupted mitochondrial distribution in colorectal cancer cells that could be recovered by reconstitution of wild-type APC. Using proximity ligation assays, we identified endogenous APC-Miro/Milton complexes at mitochondria, and live-cell imaging showed that loss of APC slowed the frequency of anterograde mitochondrial transport to the membrane. We propose that APC helps drive mitochondria to the membrane to supply energy for cellular processes such as directed cell migration, a process disrupted by cancer mutations. © 2016 Mills et al. This article is distributed by The American Society for Cell Biology under license from the author(s). Two months after publication it is available to the public under an Attribution–Noncommercial–Share Alike 3.0 Unported Creative Commons License (http://creativecommons.org/licenses/by-nc-sa/3.0).

  12. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  13. Attack Trees with Sequential Conjunction

    NARCIS (Netherlands)

    Jhawar, Ravi; Kordy, Barbara; Mauw, Sjouke; Radomirović, Sasa; Trujillo-Rasua, Rolando

    2015-01-01

    We provide the first formal foundation of SAND attack trees which are a popular extension of the well-known attack trees. The SAND at- tack tree formalism increases the expressivity of attack trees by intro- ducing the sequential conjunctive operator SAND. This operator enables the modeling of

  14. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  15. Investigating the Possibility to Individualize Asthma Attack Therapy Based on Attack Severity and Patient Characteristics

    Directory of Open Access Journals (Sweden)

    Sárkány Zoltán

    2016-03-01

    Full Text Available Introduction: The objective of this study was to investigate with the help of a computerized simulation model whether the treatment of an acute asthma attack can be individualized based on the severity of the attack and the characteristics of the patient. Material and Method: A stochastic lung model was used to simulate the deposition of 1 nm - 10 μm particles during a mild and a moderate asthma attack. Breathing parameters were varied to maximize deposition, and simulation results were compared with those obtained in the case of a severe asthma attack. In order to investigate the effect of height on the deposition of inhaled particles, another series of simulations was carried out with identical breathing parameters, comparing patient heights of 155 cm, 175 cm and 195 cm. Results: The optimization process yielded an increase in the maximum deposition values of around 6-7% for each type of investigated asthma attack, and the difference between attacks of different degree of severity was around 5% for both the initial and the optimized values, a higher degree of obstruction increasing the amount of deposited particles. Conclusions: Our results suggest that the individualization of asthma attack treatment cannot be based on particles of different size, as the highest deposited fraction in all three types of attacks can be obtained using 0.01 μm particles. The use of a specific set of breathing parameters yields a difference between a mild and a moderate, as well as a moderate and a severe asthma attack of around 5%.

  16. Membrane compartment of Can1 (MCC): specialized functional microdomain of the yeast plasma membrane

    OpenAIRE

    Doudová, Lenka

    2017-01-01

    Membrane compartment of Can1 (MCC): specialized functional microdomain of the yeast plasma membrane Yeast plasma membrane is divided into several different compartments. Membrane compartment of Can1 is specific for its protein and lipid composition, furthermore it creates furrow-like invaginations on the plasma membrane. These invaginations are made by multiprotein complexes called eisosomes, which are located in the cytosolic side of MCCs. It was established that this domain plays an importa...

  17. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  18. Classification of HTTP Attacks: A Study on the ECML/PKDD 2007 Discovery Challenge

    Energy Technology Data Exchange (ETDEWEB)

    Gallagher, Brian [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Eliassi-Rad, Tina [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2009-07-08

    As the world becomes more reliant on Web applications for commercial, financial, and medical transactions, cyber attacks on the World Wide Web are increasing in frequency and severity. Web applications provide an attractive alternative to traditional desktop applications due to their accessibility and ease of deployment. However, the accessibility of Web applications also makes them extremely vulnerable to attack. This inherent vulnerability is intensified by the distributed nature ofWeb applications and the complexity of configuring application servers. These factors have led to a proliferation of Web-based attacks, in which attackers surreptitiously inject code into HTTP requests, allowing them to execute arbitrary commands on remote systems and perform malicious activities such as reading, altering, or destroying sensitive data. One approach for dealing with HTTP-based attacks is to identify malicious code in incoming HTTP requests and eliminate bad requests before they are processed. Using machine learning techniques, we can build a classifier to automatically label requests as “Valid” or “Attack.” For this study, we develop a simple, but effective HTTP attack classifier, based on the vector space model used commonly for Information Retrieval. Our classifier not only separates attacks from valid requests, but can also identify specific attack types (e.g., “SQL Injection” or “Path Traversal”). We demonstrate the effectiveness of our approach through experiments on the ECML/PKDD 2007 Discovery Challenge data set. Specifically, we show that our approach achieves higher precision and recall than previous methods. In addition, our approach has a number of desirable characteristics, including robustness to missing contextual information, interpretability of models, and scalability.

  19. Anger attacks in obsessive compulsive disorder

    Directory of Open Access Journals (Sweden)

    Nitesh Prakash Painuly

    2011-01-01

    Full Text Available Background: Research on anger attacks has been mostly limited to depression, and only a few studies have focused on anger attacks in obsessive compulsive disorder. Materials and Methods: In a cross-sectional study all new obsessive compulsive disorder patients aged 20-60 years attending an outpatient clinic were assessed using the anger attack questionnaire, irritability, depression and anxiety scale (for the direction of the aggressive behavior and quality of life (QOL. Results: The sample consisted of 42 consecutive subjects with obsessive compulsive disorder, out of which 21 (50% had anger attacks. The obsessive compulsive disorder subjects with and without anger attacks did not show significant differences in terms of sociodemographic variables, duration of illness, treatment, and family history. However, subjects with anger attacks had significantly higher prevalence of panic attacks and comorbid depression. Significantly more subjects with anger attacks exhibited aggressive acts toward spouse, parents, children, and other relatives in the form of yelling and threatening to hurt, trying to hurt, and threatening to leave. However, the two groups did not differ significantly in terms of QOL, except for the psychological domain being worse in the subjects with anger attacks. Conclusion: Anger attacks are present in half of the patients with obsessive compulsive disorder, and they correlate with the presence of comorbid depression.

  20. A Novel Real-Time DDoS Attack Detection Mechanism Based on MDRA Algorithm in Big Data

    Directory of Open Access Journals (Sweden)

    Bin Jia

    2016-01-01

    Full Text Available In the wake of the rapid development and wide application of information technology and Internet, our society has come into the information explosion era. Meanwhile, it brings in new and severe challenges to the field of network attack behavior detection due to the explosive growth and high complexity of network traffic. Therefore, an effective and efficient detection mechanism that can detect attack behavior from large scale of network traffic plays an important role. In this paper, we focus on how to distinguish the attack traffic from normal data flows in Big Data and propose a novel real-time DDoS attack detection mechanism based on Multivariate Dimensionality Reduction Analysis (MDRA. In this mechanism, we first reduce the dimensionality of multiple characteristic variables in a network traffic record by Principal Component Analysis (PCA. Then, we analyze the correlation of the lower dimensional variables. Finally, the attack traffic can be differentiated from the normal traffic by MDRA and Mahalanobis distance (MD. Compared with previous research methods, our experimental results show that higher precision rate is achieved and it approximates to 100% in True Negative Rate (TNR for detection; CPU computing time is one-eightieth and memory resource consumption is one-third of the previous detection method based on Multivariate Correlation Analysis (MCA; computing complexity is constant.

  1. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  2. Pericarditis - after heart attack

    Science.gov (United States)

    ... include: A previous heart attack Open heart surgery Chest trauma A heart attack that has affected the thickness of your heart muscle Symptoms Symptoms include: Anxiety Chest pain from the swollen pericardium rubbing on the ...

  3. The Cell Wall Teichuronic Acid Synthetase (TUAS Is an Enzyme Complex Located in the Cytoplasmic Membrane of Micrococcus luteus

    Directory of Open Access Journals (Sweden)

    Lingyi Lynn Deng

    2010-01-01

    composed of disaccharide repeating units [-4-β-D-ManNAcAp-(1→6α-D-Glcp−1-]n, which is covalently anchored to the peptidoglycan on the inner cell wall and extended to the outer surface of the cell envelope. An enzyme complex responsible for the TUA chain biosynthesis was purified and characterized. The 440 kDa enzyme complex, named teichuronic acid synthetase (TUAS, is an octomer composed of two kinds of glycosyltransferases, Glucosyltransferase, and ManNAcA-transferase, which is capable of catalyzing the transfer of disaccharide glycosyl residues containing both glucose and the N-acetylmannosaminuronic acid residues. TUAS displays hydrophobic properties and is found primarily associated with the cytoplasmic membrane. The purified TUAS contains carotinoids and lipids. TUAS activity is diminished by phospholipase digestion. We propose that TUAS serves as a multitasking polysaccharide assembling station on the bacterial membrane.

  4. Role of PINK1 binding to the TOM complex and alternate intracellular membranes in recruitment and activation of the E3 ligase Parkin.

    Science.gov (United States)

    Lazarou, Michael; Jin, Seok Min; Kane, Lesley A; Youle, Richard J

    2012-02-14

    Mutations in the mitochondrial kinase PINK1 and the cytosolic E3 ligase Parkin can cause Parkinson's disease. Damaged mitochondria accumulate PINK1 on the outer membrane where, dependent on kinase activity, it recruits and activates Parkin to induce mitophagy, potentially maintaining organelle fidelity. How PINK1 recruits Parkin is unknown. We show that endogenous PINK1 forms a 700 kDa complex with the translocase of the outer membrane (TOM) selectively on depolarized mitochondria whereas PINK1 ectopically targeted to the outer membrane retains association with TOM on polarized mitochondria. Inducibly targeting PINK1 to peroxisomes or lysosomes, which lack a TOM complex, recruits Parkin and activates ubiquitin ligase activity on the respective organelles. Once there, Parkin induces organelle selective autophagy of peroxisomes but not lysosomes. We propose that the association of PINK1 with the TOM complex allows rapid reimport of PINK1 to rescue repolarized mitochondria from mitophagy, and discount mitochondrial-specific factors for Parkin translocation and activation. Copyright © 2012 Elsevier Inc. All rights reserved.

  5. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  6. Cell-free system for synthesizing membrane proteins cell free method for synthesizing membrane proteins

    Science.gov (United States)

    Laible, Philip D; Hanson, Deborah K

    2013-06-04

    The invention provides an in vitro method for producing proteins, membrane proteins, membrane-associated proteins, and soluble proteins that interact with membrane-associated proteins for assembly into an oligomeric complex or that require association with a membrane for proper folding. The method comprises, supplying intracytoplasmic membranes from organisms; modifying protein composition of intracytoplasmic membranes from organism by modifying DNA to delete genes encoding functions of the organism not associated with the formation of the intracytoplasmic membranes; generating appropriate DNA or RNA templates that encode the target protein; and mixing the intracytoplasmic membranes with the template and a transcription/translation-competent cellular extract to cause simultaneous production of the membrane proteins and encapsulation of the membrane proteins within the intracytoplasmic membranes.

  7. Cache timing attacks on recent microarchitectures

    DEFF Research Database (Denmark)

    Andreou, Alexandres; Bogdanov, Andrey; Tischhauser, Elmar Wolfgang

    2017-01-01

    Cache timing attacks have been known for a long time, however since the rise of cloud computing and shared hardware resources, such attacks found new potentially devastating applications. One prominent example is S$A (presented by Irazoqui et al at S&P 2015) which is a cache timing attack against...... AES or similar algorithms in virtualized environments. This paper applies variants of this cache timing attack to Intel's latest generation of microprocessors. It enables a spy-process to recover cryptographic keys, interacting with the victim processes only over TCP. The threat model is a logically...... separated but CPU co-located attacker with root privileges. We report successful and practically verified applications of this attack against a wide range of microarchitectures, from a two-core Nehalem processor (i5-650) to two-core Haswell (i7-4600M) and four-core Skylake processors (i7-6700). The attack...

  8. A Characeae Cells Plasma Membrane as a Model for Selection of Bioactive Compounds and Drugs: Interaction of HAMLET-Like Complexes with Ion Channels of Chara corallina Cells Plasmalemma.

    Science.gov (United States)

    Kataev, Anatoly; Zherelova, Olga; Grishchenko, Valery

    2016-12-01

    Interaction of a HAMLET-like La-OA cytotoxic complex (human α-lactalbumin-oleic acid) and its constituents with the excitable plasmalemma of giant Chara corallina cells was investigated. The voltage-clamp technique was used to study Ca 2+ and Cl - transient currents in the plasmalemma of intact cells. The action of the complex and OA on the target cell membrane has a dose-dependent character. It was found that the La-OA complex has an inhibiting effect on Ca 2+ current across the plasmalemma, while α-lactalbumin alone does not affect the electrophysiological characteristics of the cellular membrane. However, oleic acid blocks Ca 2+ current across the plasmalemma. This is accompanied by the induction of a non-selective conductivity in the cellular membrane, a decrease in the resting potential and plasma membrane resistance of algal cells. We propose that the cytotoxicity of La-OA and other HAMLET-like complexes is determined by oleic acid acting as a blocker of potential-dependent Ca 2+ channels in the plasma membrane of target cells. The presented results show that the study model of green algae C. corallina cells plasmalemma is a convenient tool for the investigation of ion channels in many animal cells.

  9. Model of mouth-to-mouth transfer of bacterial lipoproteins through inner membrane LolC, periplasmic LolA, and outer membrane LolB

    OpenAIRE

    Okuda, Suguru; Tokuda, Hajime

    2009-01-01

    Outer membrane-specific lipoproteins in Escherichia coli are released from the inner membrane by an ATP-binding cassette transporter, the LolCDE complex, which causes the formation of a soluble complex with a periplasmic molecular chaperone, LolA. LolA then transports lipoproteins to the outer membrane where an outer membrane receptor, LolB, incorporates lipoproteins into the outer membrane. The molecular mechanisms underlying the Lol-dependent lipoprotein sorting have been clarified in detai...

  10. Comparison of dot-ELISA and standard ELISA for detection of Neisseria meningitidis outer membrane complex-specific antibodies

    Directory of Open Access Journals (Sweden)

    Elza FT Belo

    Full Text Available Dot-ELISA using the outer membrane complex antigens of Neisseria meningitidis as a target was standardized for rapid detection of meningococcal-specific antibodies in human serum. We investigated the level of meningococcal-specific IgG, IgA, and IgM in serum using dot-ELISA with outer membrane antigens prepared from Neisseria meningitidis serotype B:4.19:P1.15,3,7,9 (a strain isolated from a Brazilian epidemic. The dot-ELISA is based on the same principles as the standard ELISA and is useful for detection of anti-N. meningitidis B antibodies in serum of patients with meningococcal infections. For the assay, outer membrane complexes (OMCs were absorbed by nitrocellulose membrane and blocked with a 5% skim milk solution. Serum samples were drawn upon hospital admission and during convalescence from patients with meningococcal septicemia, and single samples were drawn from uninfected controls. We retrospectively examined a total of 57 serum samples: 35 from patients infected with N. meningitidis B, 12 from patients infected with Haemophilus influenzae b, and 10 from health individuals. When performed at room temperature, dot-ELISA took approximately four hours to perform, and the optimum antigen concentration was 0.42 µg per dot. The specificity of IgG, IgM, and IgA demonstrates that dot-ELISA using OMCs from N. meningitidis B as a target is suitable for serologic verification of clinically suspected meningococcal disease in patients and for titer determination of antibodies produced during different phases of natural infection. Furthermore, the sensitivity of dot-ELISA was comparable to that of standard ELISA. Overall, dot-ELISA is simple to perform, rapid, and low cost. Further validation of the test as a screening tool is required.

  11. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  12. Forensics Investigation of Web Application Security Attacks

    OpenAIRE

    Amor Lazzez; Thabet Slimani

    2015-01-01

    Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the sec...

  13. Elongated membrane tethers, individually anchored by high affinity α4β1/VCAM-1 complexes, are the quantal units of monocyte arrests.

    Directory of Open Access Journals (Sweden)

    Calvin Chu

    Full Text Available The α4β1 integrin facilitates both monocyte rolling and adhesion to the vascular endothelium and is physiologically activated by monocyte chemoattractant protein (MCP-1. The current study investigated the initial events in the adhesion of THP-1 cells to immobilized Vascular Cell Adhesion Molecule 1 (VCAM-1. Using AFM force measurements, cell adhesion was shown to be mediated by two populations of α4β1/VCAM-1 complexes. A low affinity form of α4β1 was anchored to the elastic elements of the cytoskeleton, while a higher affinity conformer was coupled to the viscous elements of the cell membrane. Within 100 ms of contact, THP-1 cells, stimulated by co-immobilized MCP-1, exhibited a tremendous increase in adhesion to VCAM-1. Enhanced cell adhesion was accompanied by a local decoupling of the cell membrane from the cytoskeleton and the formation of long membrane tethers. The tethers were individually anchored by multiple α4β1/VCAM-1 complexes that prolonged the extension of the viscous tethers. In vivo, the formation of these membrane tethers may provide the quantal structural units for the arrest of rolling monocytes within the blood vessels.

  14. Adaptive cyber-attack modeling system

    Science.gov (United States)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  15. Predicting Factors of Zone 4 Attack in Volleyball.

    Science.gov (United States)

    Costa, Gustavo C; Castro, Henrique O; Evangelista, Breno F; Malheiros, Laura M; Greco, Pablo J; Ugrinowitsch, Herbert

    2017-06-01

    This study examined 142 volleyball games of the Men's Super League 2014/2015 seasons in Brazil from which we analyzed 24-26 games of each participating team, identifying 5,267 Zone 4 attacks for further analysis. Within these Zone 4 attacks, we analyzed the association between the effect of the attack carried out and the separate effects of serve reception, tempo and type of attack. We found that the reception, tempo of attack, second tempo of attack, and power of diagonal attack were predictors of the attack effect in Zone 4. Moreover, placed attacks showed a tendency to not yield a score. In conclusion, winning points in high-level men's volleyball requires excellent receptions, a fast attack tempo and powerfully executed of attacks.

  16. Poly/vinyl alcohol/ membranes for reverse osmosis

    Science.gov (United States)

    Katz, M. G.; Wydeven, T., Jr.

    1981-01-01

    A description is presented of the results of studies of the water and salt transport properties of PVA membranes, taking into account radiation crosslinked PVA membranes, diffusive salt permeability through PVA membranes, and heat treated PVA membranes. The experimental findings support an occurrence of independent water, and salt permeation processes. It is suggested that the salt permeation is governed by a solution-diffusion transport mechanism. The preparation of thin skinned, asymmetric PVA membranes is also discussed. The employed method has a certain similarity to the classical phase inversion method, which is widely applied in the casting of asymmetric reverse osmosis membranes. Instead of using a gelling bath composed of a nonsolvent for the membrane material and miscible with the solvent from which the membrane is cast, a 'complexing' bath is used, which is a solution of a complexing agent in water.

  17. Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?

    Directory of Open Access Journals (Sweden)

    Ines Goicoechea-Telleria

    2018-01-01

    Full Text Available The use of biometrics keeps growing. Every day, we use biometric recognition to unlock our phones or to have access to places such as the gym or the office, so we rely on the security manufacturers offer when protecting our privileges and private life. It is well known that it is possible to hack into a fingerprint sensor using fake fingers made of Play-Doh and other easy-to-obtain materials but to what extent? Is this true for all users or only for specialists with a deep knowledge on biometrics? Are smartphone fingerprint sensors as reliable as desktop sensors? To answer these questions, we performed 3 separate evaluations. First, we evaluated 4 desktop fingerprint sensors of different technologies by attacking them with 7 different fake finger materials. All of them were successfully attacked by an experienced attacker. Secondly, we carried out a similar test on 5 smartphones with embedded sensors using the most successful materials, which also hacked the 5 sensors. Lastly, we gathered 15 simulated attackers with no background in biometrics to create fake fingers of several materials, and they had one week to attack the fingerprint sensors of the same 5 smartphones, with the starting point of a short video with the techniques to create them. All 5 smartphones were successfully attacked by an inexperienced attacker. This paper will provide the results achieved, as well as an analysis on the attack potential of every case. All results are given following the metrics of the standard ISO/IEC 30107-3.

  18. Eculizumab for dense deposit disease and C3 glomerulonephritis.

    Science.gov (United States)

    Bomback, Andrew S; Smith, Richard J; Barile, Gaetano R; Zhang, Yuzhou; Heher, Eliot C; Herlitz, Leal; Stokes, M Barry; Markowitz, Glen S; D'Agati, Vivette D; Canetta, Pietro A; Radhakrishnan, Jai; Appel, Gerald B

    2012-05-01

    The principle defect in dense deposit disease and C3 glomerulonephritis is hyperactivity of the alternative complement pathway. Eculizumab, a monoclonal antibody that binds to C5 to prevent formation of the membrane attack complex, may prove beneficial. In this open-label, proof of concept efficacy and safety study, six subjects with dense deposit disease or C3 glomerulonephritis were treated with eculizumab every other week for 1 year. All had proteinuria >1 g/d and/or AKI at enrollment. Subjects underwent biopsy before enrollment and repeat biopsy at the 1-year mark. The subjects included three patients with dense deposit disease (including one patient with recurrent dense deposit disease in allograft) and three patients with C3 glomerulonephritis (including two patients with recurrent C3 glomerulonephritis in allograft). Genetic and complement function testing revealed a mutation in CFH and MCP in one subject each, C3 nephritic factor in three subjects, and elevated levels of serum membrane attack complex in three subjects. After 12 months, two subjects showed significantly reduced serum creatinine, one subject achieved marked reduction in proteinuria, and one subject had stable laboratory parameters but histopathologic improvements. Elevated serum membrane attack complex levels normalized on therapy and paralleled improvements in creatinine and proteinuria. Clinical and histopathologic data suggest a response to eculizumab in some but not all subjects with dense deposit disease and C3 glomerulonephritis. Elevation of serum membrane attack complex before treatment may predict response. Additional research is needed to define the subgroup of dense deposit disease/C3 glomerulonephritis patients in whom eculizumab therapy can be considered.

  19. A Novel Multiple-Bits Collision Attack Based on Double Detection with Error-Tolerant Mechanism

    Directory of Open Access Journals (Sweden)

    Ye Yuan

    2018-01-01

    Full Text Available Side-channel collision attacks are more powerful than traditional side-channel attack without knowing the leakage model or establishing the model. Most attack strategies proposed previously need quantities of power traces with high computational complexity and are sensitive to mistakes, which restricts the attack efficiency seriously. In this paper, we propose a multiple-bits side-channel collision attack based on double distance voting detection (DDVD and also an improved version, involving the error-tolerant mechanism, which can find all 120 relations among 16 key bytes when applied to AES (Advanced Encryption Standard algorithm. In addition, we compare our collision detection method called DDVD with the Euclidean distance and the correlation-enhanced collision method under different intensity of noise, which indicates that our detection technique performs better in the circumstances of noise. Furthermore, 4-bit model of our collision detection method is proven to be optimal in theory and in practice. Meanwhile the corresponding practical attack experiments are also performed on a hardware implementation of AES-128 on FPGA board successfully. Results show that our strategy needs less computation time but more traces than LDPC method and the online time for our strategy is about 90% less than CECA and 96% less than BCA with 90% success rate.

  20. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia.

    Science.gov (United States)

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (2003). Problems faced, lessons learnt, and costs incurred are discussed. A burns disaster plan drawing on lessons learnt from these attacks is presented. Thirty-one patients were treated at the SGH Burns Centre in three attacks (2002 Bali attack [n = 15], 2003 Jakarta attack [n = 14], and 2005 Bali attack [n = 2]). For the 2002 Bali attack, median age was 29 years (range 20 to 50 years), median percentage of total burn surface area (TBSA) was 29% (range 5% to 55%), and median abbreviated burn severity index (ABSI) was 6 (range 3 to 10). Eight of 15 patients were admitted to the intensive care unit. For the 2003 Jakarta attack, median age was 35 years (range 24 to 56 years), median percentage of TBSA was 10% (range 2% to 46%), and median ABSI was 4 (range 3 to 9). A large number of patients had other injuries. Problems faced included manpower issues, lack of bed space, shortage of blood products, and lack of cadaver skin. The changing nature of terror attacks mandates continued vigilance and disaster preparedness. The multidimensional burns patient, complicated by other injuries, is likely to become increasingly common. A burns disaster plan with emphasis on effective command, control, and communication as well as organisation of health care personnel following a 'team concept' will do much to ensure that the sudden onset of a crisis situation at an unexpected time does not overwhelm hospital manpower and resources.

  1. Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks

    Directory of Open Access Journals (Sweden)

    Željko Gavrić

    2018-01-01

    Full Text Available Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the security issue is very important. DOS (denial of service attacks are a fundamental threat to the functioning of wireless sensor networks. This paper describes some of the most common DOS attacks and potential methods of protection against them. The case study shows one of the most frequent attacks on wireless sensor networks – the interference attack. In the introduction of this paper authors assume that the attack interference can cause significant obstruction of wireless sensor networks. This assumption has been proved in the case study through simulation scenario and simulation results.

  2. Securing internet by eliminating DDOS attacks

    Science.gov (United States)

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  3. Complex N-Glycans Influence the Spatial Arrangement of Voltage Gated Potassium Channels in Membranes of Neuronal-Derived Cells.

    Directory of Open Access Journals (Sweden)

    M Kristen Hall

    Full Text Available The intrinsic electrical properties of a neuron depend on expression of voltage gated potassium (Kv channel isoforms, as well as their distribution and density in the plasma membrane. Recently, we showed that N-glycosylation site occupancy of Kv3.1b modulated its placement in the cell body and neurites of a neuronal-derived cell line, B35 neuroblastoma cells. To extrapolate this mechanism to other N-glycosylated Kv channels, we evaluated the impact of N-glycosylation occupancy of Kv3.1a and Kv1.1 channels. Western blots revealed that wild type Kv3.1a and Kv1.1 α-subunits had complex and oligomannose N-glycans, respectively, and that abolishment of the N-glycosylation site(s generated Kv proteins without N-glycans. Total internal reflection fluorescence microscopy images revealed that N-glycans of Kv3.1a contributed to its placement in the cell membrane while N-glycans had no effect on the distribution of Kv1.1. Based on particle analysis of EGFP-Kv proteins in the adhered membrane, glycosylated forms of Kv3.1a, Kv1.1, and Kv3.1b had differences in the number, size or density of Kv protein clusters in the cell membrane of neurites and cell body of B35 cells. Differences were also observed between the unglycosylated forms of the Kv proteins. Cell dissociation assays revealed that cell-cell adhesion was increased by the presence of complex N-glycans of Kv3.1a, like Kv3.1b, whereas cell adhesion was similar in the oligomannose and unglycosylated Kv1.1 subunit containing B35 cells. Our findings provide direct evidence that N-glycans of Kv3.1 splice variants contribute to the placement of these glycoproteins in the plasma membrane of neuronal-derived cells while those of Kv1.1 were absent. Further when the cell membrane distribution of the Kv channel was modified by N-glycans then the cell-cell adhesion properties were altered. Our study demonstrates that N-glycosylation of Kv3.1a, like Kv3.1b, provides a mechanism for the distribution of these

  4. New attacks on Wi-Fi Protected Setup

    OpenAIRE

    Hamed Mohtadi; Alireza Rahimi

    2015-01-01

    Wi-Fi Protected Setup (WPS) is a network security standard that is used to secure networks in home and office, introduced in 2006 by the Wi-Fi Alliance. It provides easier configuration setup and is used in almost all recent Wi-Fi devices. In this paper we propose two attacks on this standard. The first attack is an offline brute force attack that uses imbalance on registration protocol. This attack needs user action, but it is more efficient than previous attacks. The second attack uses weak...

  5. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  6. A Framework For Analyzing And Mitigating The Vulnerabilities Of Complex Systems Via Attack And Protection Trees

    National Research Council Canada - National Science Library

    Edge, Kenneth S

    2007-01-01

    .... Attack trees by themselves do not provide enough decision support to system defenders. This research develops the concept of using protection trees to offer a detailed risk analysis of a system...

  7. Detection of inhomogeneities in membrane ohmic resistance in geometrically complex systems

    DEFF Research Database (Denmark)

    Svirskis, G; Hounsgaard, J; Gutman, A

    2000-01-01

    DC field-evoked transients in arbitrarily shaped neurons and syncytia were analyzed theoretically. In systems with homogeneous passive membrane properties, the transients develop much faster than the membrane discharges. Conductance of the proximal membrane could be larger due to the injury impos...

  8. Discontinuous phase formation and selective attack of SiC materials exposed to low oxygen partial pressure environments

    Energy Technology Data Exchange (ETDEWEB)

    Butt, D.P. [Los Alamos National Lab., NM (United States); Tressler, R.E.; Spear, K.E. [Pennsylvania State Univ., University Park, PA (United States). Dept. of Materials Science and Engineering

    1993-09-01

    Three SiC materials were exposed to gas mixtures containing N{sub 2}, H{sub 2}, and CO at 1000-1300C, 1-740 torr for a few to 1000 h. Kinetic and thermodynamic studies indicate that CO is the predominant oxidizing species. A variety of corrosion processes were observed, including surface and internal pit formation, needle growth, grain boundary attack, and attack of impurities and surrounding material. In the case of a siliconized SiC, impurities such as Ca, Al, and Fe diffused rapidly through the Si matrix forming complex calcium aluminosilicates on the surface, leaving behind internal voids. Evaluation of the mechanical properties, including fractography, revealed a variety of degradative phenomena. Efforts to identify causes of pit formation suggested that the overall process was complex. Pits formed during attack of grain boundaries and regions containing transition metal impurities. Studies of single crystals showed preferential attack near impurities and crystalline defects, indicating that damaged crystals or certain crystal orientations in the polycrystalline materials are susceptible to attack. In addition, under some conditions where pit formation was observed, the strength of certain materials increased apparently due to flaw healing. It is suggested that flaws can heal in the absence of mechanical stress due to their high surface energy. However, second phases observed within partially healed surface cracks suggest impurities also contribute to the flaw healing processes.

  9. Invisible Trojan-horse attack

    DEFF Research Database (Denmark)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin

    2017-01-01

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance...

  10. From isolated light-harvesting complexes to the thylakoid membrane: a single-molecule perspective

    Science.gov (United States)

    Gruber, J. Michael; Malý, Pavel; Krüger, Tjaart P. J.; Grondelle, Rienk van

    2018-01-01

    The conversion of solar radiation to chemical energy in plants and green algae takes place in the thylakoid membrane. This amphiphilic environment hosts a complex arrangement of light-harvesting pigment-protein complexes that absorb light and transfer the excitation energy to photochemically active reaction centers. This efficient light-harvesting capacity is moreover tightly regulated by a photoprotective mechanism called non-photochemical quenching to avoid the stress-induced destruction of the catalytic reaction center. In this review we provide an overview of single-molecule fluorescence measurements on plant light-harvesting complexes (LHCs) of varying sizes with the aim of bridging the gap between the smallest isolated complexes, which have been well-characterized, and the native photosystem. The smallest complexes contain only a small number (10-20) of interacting chlorophylls, while the native photosystem contains dozens of protein subunits and many hundreds of connected pigments. We discuss the functional significance of conformational dynamics, the lipid environment, and the structural arrangement of this fascinating nano-machinery. The described experimental results can be utilized to build mathematical-physical models in a bottom-up approach, which can then be tested on larger in vivo systems. The results also clearly showcase the general property of biological systems to utilize the same system properties for different purposes. In this case it is the regulated conformational flexibility that allows LHCs to switch between efficient light-harvesting and a photoprotective function.

  11. Malaria Parasite CLAG3, a Protein Linked to Nutrient Channels, Participates in High Molecular Weight Membrane-Associated Complexes in the Infected Erythrocyte.

    Directory of Open Access Journals (Sweden)

    Kayvan Zainabadi

    Full Text Available Malaria infected erythrocytes show increased permeability to a number of solutes important for parasite growth as mediated by the Plasmodial Surface Anion Channel (PSAC. The P. falciparum clag3 genes have recently been identified as key determinants of PSAC, though exactly how they contribute to channel function and whether additional host/parasite proteins are required remain unknown. To begin to answer these questions, I have taken a biochemical approach. Here I have used an epitope-tagged CLAG3 parasite to perform co-immunoprecipitation experiments using membrane fractions of infected erythrocytes. Native PAGE and mass spectrometry studies reveal that CLAG3 participate in at least three different high molecular weight complexes: a ~720kDa complex consisting of CLAG3, RHOPH2 and RHOPH3; a ~620kDa complex consisting of CLAG3 and RHOPH2; and a ~480kDa complex composed solely of CLAG3. Importantly, these complexes can be found throughout the parasite lifecycle but are absent in untransfected controls. Extracellular biotin labeling and protease susceptibility studies localize the 480kDa complex to the erythrocyte membrane. This complex, likely composed of a homo-oligomer of 160kDa CLAG3, may represent a functional subunit, possibly the pore, of PSAC.

  12. Radiological attacks and accidents. Medical consequences

    International Nuclear Information System (INIS)

    Sakuta, Hidenari

    2007-01-01

    Probability of the occurrence of radiological attacks appears to be elevated after the terrorist attacks against the United States on September 11 in 2001. There are a lot of scenarios of radiological attack: simple radiological device, radiological disperse device (RDD or dirty bomb), attacks against nuclear reactor, improvised nuclear device, and nuclear weapons. Of these, RDD attack is the most probable scenario, because it can be easily made and can generate enormous psychological and economic damages. Radiological incidents are occurring to and fro in the world, including several cases of theft to nuclear facilities and unsuccessful terrorist attacks against them. Recently, a former Russian spy has allegedly been killed using polonium-210. In addition, serious radiological accidents have occurred in Chernobyl, Goiania, and Tokai-mura. Planning, preparation, education, and training exercise appear to be essential factors to cope with radiological attacks and accidents effectively without feeling much anxiety. Triage and psychological first aid are prerequisite to manage and provide effective medial care for mass casualties without inducing panic. (author)

  13. Simulating SQL-Injection Cyber-attacks using GNS3

    OpenAIRE

    Al-Mahrouqi, Aadil; Tobin, Patrick; Abdalla, Sameh; Kechadi, Tahar

    2015-01-01

    Network Forensics is a subtopic of Digital Forensics wherein research on artificat investigations and intrusions evidence acquisition is addressed. Among many challenges in the field, the problem of losing data artifacts in the state of flux, (i.e., live volatile data), when network devices are suddenly non-operational remains a topic of interest to many investigators. The main objective of this article is to simulate an SQL injection attack scenarios in a complex network environment. We desi...

  14. Script-viruses Attacks on UNIX OS

    Directory of Open Access Journals (Sweden)

    D. M. Mikhaylov

    2010-06-01

    Full Text Available In this article attacks on UNIX OS are considered. Currently antivirus developers are concentrated on protecting systems from viruses that are most common and attack popular operating systems. If the system or its components are not often attacked then the antivirus products are not protecting these components as it is not profitable. The same situation is with script-viruses for UNIX OS as most experts consider that it is impossible for such viruses to get enough rights to attack. Nevertheless the main conclusion of this article is the fact that such viruses can be very powerful and can attack systems and get enough rights.

  15. Membrane paradigm

    International Nuclear Information System (INIS)

    Price, R.H.; Thorne, K.S.

    1986-01-01

    The membrane paradigm is a modified frozen star approach to modeling black holes, with particles and fields assuming a complex, static, boundary-layer type structure (membrane) near the event horizon. The membrane has no effects on the present or future evolution of particles and fields above itself. The mathematical representation is a combination of a formalism containing terms for the shear and bulk viscosity, surface pressure, momentum, temperature, entropy, etc., of the horizon and the 3+1 formalism. The latter model considers a family of three-dimensional spacelike hypersurfaces in one-dimensional time. The membrane model considers a magnetic field threading the hole and undergoing torque from the hole rotation. The field is cleaned by the horizon and distributed over the horizon so that ohmic dissipation is minimized. The membrane paradigm is invalid inside the horizon, but is useful for theoretically probing the properties of slowly evolving black holes

  16. Polymorphic Attacks and Network Topology: Application of Concepts from Natural Systems

    Science.gov (United States)

    Rangan, Prahalad

    2010-01-01

    The growing complexity of interactions between computers and networks makes the subject of network security a very interesting one. As our dependence on the services provided by computing networks grows, so does our investment in such technology. In this situation, there is a greater risk of occurrence of targeted malicious attacks on computers…

  17. Contribution of ankyrin-band 3 complexes to the organization and mechanical properties of the membrane skeleton of human erythrocyte

    Energy Technology Data Exchange (ETDEWEB)

    Shen, B.W. [Argonne National Lab., IL (United States). Biological and Medical Research Div.

    1995-02-01

    To understand the role of ankyrin-band 3 complexes in the organization of the spectrin-based membrane skeleton and its contribution to the mechanical properties of human erythrocytes, intact skeletons and single-layered skeleton leaflets were prepared from intact and physically sheared membrane ghosts, expanded in low salt buffer, and examined by transmission electron microscopy. While the structures of intact skeletons and single-layered skeleton leaflets shared many common features, including rigid junctional complexes of spectrin, actin, and band 4.1; short stretches ({approximately}50 {angstrom}) of flexible spectrin filaments; and globular masses of ankyrin-band 3 complexes situated close to the middle of the spectrin filaments, the definition of structural units in the intact skeleton is obscured by the superposition of the two layers. However, the spatial disposition of structural elements can be clearly defined in the images of the single-layered skeleton leaflets. Partially expanded skeletal leaflets contain conglomerates of ankyrin-band 3 complexes arranged in a circular or clove-leaf configuration that straddles multiple strands of thick spectrin cables, presumably reflecting the association of ankyrin-band 3 complexes on neighboring spectrin tetramers as well as the lateral association of the spectrin filaments. Hyperexpansion of the skeleton leaflets led to dissociation of the conglomerates of ankyrin-band 3 complexes, full-extension of the spectrin tetramers, and separation of the individual strands of spectrin tetramers. Clearly defined stands of spectrin tetramers in the hyperexpanded single-layered skeletal leaflets often contained two sets of globular protein masses that divided the spectrin tetramers into three segments of approximately equal length.

  18. Structural and thermodynamic characterization of doxycycline/β-cyclodextrin supramolecular complex and its bacterial membrane interactions.

    Science.gov (United States)

    Suárez, Diego F; Consuegra, Jessika; Trajano, Vivianne C; Gontijo, Sávio M L; Guimarães, Pedro P G; Cortés, Maria E; Denadai, Ângelo L; Sinisterra, Rubén D

    2014-06-01

    Doxycycline is a semi-synthetic antibiotic commonly used for the treatment of many aerobic and anaerobic bacteria. It inhibits the activity of matrix metalloproteinases (MMPs) and affects cell proliferation. In this study, the structural and thermodynamic parameters of free DOX and a DOX/βCD complex were investigated, as well as their interactions and effects on Staphylococcus aureus cells and cellular cytotoxicity. Complexation of DOX and βCD was confirmed to be an enthalpy- and entropy-driven process, and a low equilibrium constant was obtained. Treatment of S. aureus with higher concentrations of DOX or DOX/βCD resulted in an exponential decrease in S. aureus cell size, as well as a gradual neutralization of zeta potential. These thermodynamic profiles suggest that ion-pairing and hydrogen bonding interactions occur between DOX and the membrane of S. aureus. In addition, the adhesion of βCD to the cell membrane via hydrogen bonding is hypothesized to mediate a synergistic effect which accounts for the higher activity of DOX/βCD against S. aureus compared to pure DOX. Lower cytotoxicity and induction of osteoblast proliferation was also associated with DOX/βCD compared with free DOX. These promising findings demonstrate the potential for DOX/βCD to mediate antimicrobial activity at lower concentrations, and provides a strategy for the development of other antimicrobial formulations. Copyright © 2014. Published by Elsevier B.V.

  19. Fatty acid profiles from the plasma membrane and detergent resistant membranes of two plant species.

    Science.gov (United States)

    Carmona-Salazar, Laura; El Hafidi, Mohammed; Gutiérrez-Nájera, Nora; Noyola-Martínez, Liliana; González-Solís, Ariadna; Gavilanes-Ruíz, Marina

    2015-01-01

    It is essential to establish the composition of the plant plasma membrane in order to understand its organization and behavior under continually changing environments. Knowledge of the lipid phase, in particular the fatty acid (FA) complex repertoire, is important since FAs determine many of the physical-chemical membrane properties. FAs are constituents of the membrane glycerolipid and sphingolipid backbones and can also be linked to some sterols. In addition, FAs are components of complex lipids that can constitute membrane micro-domains, and the use of detergent-resistant membranes is a common approach to study their composition. The diversity and cellular allocation of the membrane lipids containing FAs are very diverse and the approaches to analyze them provide only general information. In this work, a detailed FA analysis was performed using highly purified plasma membranes from bean leaves and germinating maize embryos and their respective detergent-resistant membrane preparations. The analyses showed the presence of a significant amount of very long chain FAs (containing 28C, 30C and 32C), in both plasma membrane preparations from bean and maize, that have not been previously reported. Herein is demonstrated that a significant enrichment of very long chain saturated FAs and saturated FAs can occur in detergent-resistant membrane preparations, as compared to the plasma membranes from both plant species. Considering that a thorough analysis of FAs is rarely performed in purified plasma membranes and detergent-resistant membranes, this work provides qualitative and quantitative evidence on the contributions of the length and saturation of FAs to the organization of the plant plasma membrane and detergent-resistant membranes. Copyright © 2014 Elsevier Ltd. All rights reserved.

  20. Key Recovery Attacks on Recent Authenticated Ciphers

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Dobraunig, Christoph; Eichlseder, Maria

    2014-01-01

    In this paper, we cryptanalyze three authenticated ciphers: AVALANCHE, Calico, and RBS. While the former two are contestants in the ongoing international CAESAR competition for authenticated encryption schemes, the latter has recently been proposed for lightweight applications such as RFID systems...... and wireless networks. All these schemes use well-established and secure components such as the AES, Grain-like NFSRs, ChaCha and SipHash as their building blocks. However, we discover key recovery attacks for all three designs, featuring square-root complexities. Using a key collision technique, we can...

  1. Hybrid attacks on model-based social recommender systems

    Science.gov (United States)

    Yu, Junliang; Gao, Min; Rong, Wenge; Li, Wentao; Xiong, Qingyu; Wen, Junhao

    2017-10-01

    With the growing popularity of the online social platform, the social network based approaches to recommendation emerged. However, because of the open nature of rating systems and social networks, the social recommender systems are susceptible to malicious attacks. In this paper, we present a certain novel attack, which inherits characteristics of the rating attack and the relation attack, and term it hybrid attack. Furtherly, we explore the impact of the hybrid attack on model-based social recommender systems in multiple aspects. The experimental results show that, the hybrid attack is more destructive than the rating attack in most cases. In addition, users and items with fewer ratings will be influenced more when attacked. Last but not the least, the findings suggest that spammers do not depend on the feedback links from normal users to become more powerful, the unilateral links can make the hybrid attack effective enough. Since unilateral links are much cheaper, the hybrid attack will be a great threat to model-based social recommender systems.

  2. Lipid organization of the plasma membrane

    NARCIS (Netherlands)

    Ingólfsson, Helgi I; Melo, Manuel N; van Eerden, Floris J; Arnarez, Clément; Lopez, Cesar A; Wassenaar, Tsjerk A; Periole, Xavier; de Vries, Alex H; Tieleman, D Peter; Marrink, Siewert J

    2014-01-01

    The detailed organization of cellular membranes remains rather elusive. Based on large-scale molecular dynamics simulations, we provide a high-resolution view of the lipid organization of a plasma membrane at an unprecedented level of complexity. Our plasma membrane model consists of 63 different

  3. Drug-model membrane interactions

    International Nuclear Information System (INIS)

    Deniz, Usha K.

    1994-01-01

    In the present day world, drugs play a very important role in medicine and it is necessary to understand their mode of action at the molecular level, in order to optimise their use. Studies of drug-biomembrane interactions are essential for gaining such as understanding. However, it would be prohibitively difficult to carry out such studies, since biomembranes are highly complex systems. Hence, model membranes (made up of these lipids which are important components of biomembranes) of varying degrees of complexity are used to investigate drug-membrane interactions. Bio- as well as model-membranes undergo a chain melting transition when heated, the chains being in a disordered state above the transition point, T CM . This transition is of physiological importance since biomembranes select their components such that T CM is less than the ambient temperature but not very much so, so that membrane flexibility is ensured and porosity, avoided. The influence of drugs on the transition gives valuable clues about various parameters such as the location of the drug in the membrane. Deep insights into drug-membrane interactions are obtained by observing the effect of drugs on membrane structure and the mobilities of the various groups in lipids, near T CM . Investigation of such changes have been carried out with several drugs, using techniques such as DSC, XRD and NMR. The results indicate that the drug-membrane interaction not only depends on the nature of drug and lipids but also on the form of the model membrane - stacked bilayer or vesicles. The light that these results shed on the nature of drug-membrane interactions is discussed. (author). 13 refs., 13 figs., 1 tab

  4. MACHINE LEARNING IMPLEMENTATION FOR THE CLASSIFICATION OF ATTACKS ON WEB SYSTEMS. PART 2

    Directory of Open Access Journals (Sweden)

    K. Smirnova

    2017-11-01

    Full Text Available The possibility of applying machine learning for the classification of malicious requests to aWeb application is considered. This approach excludes the use of deterministic analysis systems (for example, expert systems,and is based on the application of a cascade of neural networks or perceptrons on an approximate model to the real humanbrain. The main idea of the work is to enable to describe complex attack vectors consisting of feature sets, abstract terms forcompiling a training sample, controlling the quality of recognition and classifying each of the layers (networks participatingin the work, with the ability to adjust not the entire network, but only a small part of it, in the training of which a mistake orinaccuracy crept in. The design of the developed network can be described as a cascaded, scalable neural network.When using neural networks to detect attacks on web systems, the issue of vectorization and normalization of features isacute. The most commonly used methods for solving these problems are not designed for the case of deliberate distortion ofthe signs of an attack.The proposed approach makes it possible to obtain a neural network that has been studied in more detail by small features,and also to eliminate the normalization issues in order to avoid deliberately bypassing the intrusion detection system. Byisolating one more group of neurons in the network and teaching it to samples containing various variants of circumvention ofthe attack classification, the developed intrusion detection system remains able to classify any types of attacks as well as theiraggregates, putting forward more stringent measures to counteract attacks. This allows you to follow the life cycle of theattack in more detail: from the starting trial attack to deliberate sophisticated attempts to bypass the system and introducemore decisive measures to actively counteract the attack, eliminating the chances of a false alarm system.

  5. An Analysis of Attacks on Blockchain Consensus

    OpenAIRE

    Bissias, George; Levine, Brian Neil; Ozisik, A. Pinar; Andresen, Gavin

    2016-01-01

    We present and validate a novel mathematical model of the blockchain mining process and use it to conduct an economic evaluation of the double-spend attack, which is fundamental to all blockchain systems. Our analysis focuses on the value of transactions that can be secured under a conventional double-spend attack, both with and without a concurrent eclipse attack. Our model quantifies the importance of several factors that determine the attack's success, including confirmation depth, attacke...

  6. Membrane fusion and exocytosis.

    Science.gov (United States)

    Jahn, R; Südhof, T C

    1999-01-01

    Membrane fusion involves the merger of two phospholipid bilayers in an aqueous environment. In artificial lipid bilayers, fusion proceeds by means of defined transition states, including hourglass-shaped intermediates in which the proximal leaflets of the fusing membranes are merged whereas the distal leaflets are separate (fusion stalk), followed by the reversible opening of small aqueous fusion pores. Fusion of biological membranes requires the action of specific fusion proteins. Best understood are the viral fusion proteins that are responsible for merging the viral with the host cell membrane during infection. These proteins undergo spontaneous and dramatic conformational changes upon activation. In the case of the paradigmatic fusion proteins of the influenza virus and of the human immunodeficiency virus, an amphiphilic fusion peptide is inserted into the target membrane. The protein then reorients itself, thus forcing the fusing membranes together and inducing lipid mixing. Fusion of intracellular membranes in eukaryotic cells involves several protein families including SNAREs, Rab proteins, and Sec1/Munc-18 related proteins (SM-proteins). SNAREs form a novel superfamily of small and mostly membrane-anchored proteins that share a common motif of about 60 amino acids (SNARE motif). SNAREs reversibly assemble into tightly packed helical bundles, the core complexes. Assembly is thought to pull the fusing membranes closely together, thus inducing fusion. SM-proteins comprise a family of soluble proteins that bind to certain types of SNAREs and prevent the formation of core complexes. Rab proteins are GTPases that undergo highly regulated GTP-GDP cycles. In their GTP form, they interact with specific proteins, the effector proteins. Recent evidence suggests that Rab proteins function in the initial membrane contact connecting the fusing membranes but are not involved in the fusion reaction itself.

  7. Automated classification of computer network attacks

    CSIR Research Space (South Africa)

    Van Heerden, R

    2013-11-01

    Full Text Available according to the relevant types of attack scenarios depicted in the ontology. The two network attack instances are the Distributed Denial of Service attack on SpamHaus in 2013 and the theft of 42 million Rand ($6.7 million) from South African Postbank...

  8. Expectation-Maximization Tensor Factorization for Practical Location Privacy Attacks

    Directory of Open Access Journals (Sweden)

    Murakami Takao

    2017-10-01

    Full Text Available Location privacy attacks based on a Markov chain model have been widely studied to de-anonymize or de-obfuscate mobility traces. An adversary can perform various kinds of location privacy attacks using a personalized transition matrix, which is trained for each target user. However, the amount of training data available to the adversary can be very small, since many users do not disclose much location information in their daily lives. In addition, many locations can be missing from the training traces, since many users do not disclose their locations continuously but rather sporadically. In this paper, we show that the Markov chain model can be a threat even in this realistic situation. Specifically, we focus on a training phase (i.e. mobility profile building phase and propose Expectation-Maximization Tensor Factorization (EMTF, which alternates between computing a distribution of missing locations (E-step and computing personalized transition matrices via tensor factorization (M-step. Since the time complexity of EMTF is exponential in the number of missing locations, we propose two approximate learning methods, one of which uses the Viterbi algorithm while the other uses the Forward Filtering Backward Sampling (FFBS algorithm. We apply our learning methods to a de-anonymization attack and a localization attack, and evaluate them using three real datasets. The results show that our learning methods significantly outperform a random guess, even when there is only one training trace composed of 10 locations per user, and each location is missing with probability 80% (i.e. even when users hardly disclose two temporally-continuous locations.

  9. Homeoviscous adaptation and the regulation of membrane lipids

    DEFF Research Database (Denmark)

    Ernst, Robert; Ejsing, Christer S; Antonny, Bruno

    2016-01-01

    Biological membranes are complex and dynamic assemblies of lipids and proteins. Poikilothermic organisms including bacteria, fungi, reptiles, and fish do not control their body temperature and must adapt their membrane lipid composition in order to maintain membrane fluidity in the cold. This ada......Biological membranes are complex and dynamic assemblies of lipids and proteins. Poikilothermic organisms including bacteria, fungi, reptiles, and fish do not control their body temperature and must adapt their membrane lipid composition in order to maintain membrane fluidity in the cold....... This adaptive response was termed homeoviscous adaptation and has been frequently studied with a specific focus on the acyl chain composition of membrane lipids. Massspectrometry-based lipidomics can nowadays provide more comprehensive insights into the complexity of lipid remodeling during adaptive responses...... such as neurons maintain unique lipid compositions with specific physicochemical properties. To date little is known about the sensory mechanisms regulating the acyl chain profile in such specialized cells or during adaptive responses. Here we summarize our current understanding of lipid metabolic networks...

  10. Developing a virtualised testbed environment in preparation for testing of network based attacks

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2013-11-01

    Full Text Available Computer network attacks are difficult to simulate due to the damage they may cause to live networks and the complexity required simulating a useful network. We constructed a virtualised network within a vSphere ESXi environment which is able...

  11. Sedimentation properties of DNA-membrane complexes and yield of DNA breaks at irradiation of mammalian cells

    International Nuclear Information System (INIS)

    Erzgraber, G.; Kozubek, S.; Lapidus, I.L.

    1985-01-01

    The dependence of the relative sedimentation velocity of DNA-membrane complexes on the dose of irradiation and time of incubation of Chinese Hamster cells is analysed. It is concluded that the initial part of the curve provides the information on the occurrence of single strand breaks in DNA; the position of the local maximum allows us to calculate the yield of DNA double strand breaks. The reparation decay constant can be estimated as well

  12. Cyber Attacks and Combat Behavior

    Directory of Open Access Journals (Sweden)

    Carataș Maria Alina

    2017-01-01

    Full Text Available Cyber terrorism is an intangible danger, a real over the corner threat in the life of individuals,organizations, and governments and is getting harder to deal with its damages. The motivations forthe cyber-attacks are different, depending on the terrorist group, from cybercrime to hacktivism,attacks over the authorities’ servers. Organizations constantly need to find new ways ofstrengthening protection against cyber-attacks, assess their cyber readiness, expand the resiliencecapacity and adopts international security regulations.

  13. Attacks on public telephone networks: technologies and challenges

    Science.gov (United States)

    Kosloff, T.; Moore, Tyler; Keller, J.; Manes, Gavin W.; Shenoi, Sujeet

    2003-09-01

    Signaling System 7 (SS7) is vital to signaling and control in America's public telephone networks. This paper describes a class of attacks on SS7 networks involving the insertion of malicious signaling messages via compromised SS7 network components. Three attacks are discussed in detail: IAM flood attacks, redirection attacks and point code spoofing attacks. Depending on their scale of execution, these attacks can produce effects ranging from network congestion to service disruption. Methods for detecting these denial-of-service attacks and mitigating their effects are also presented.

  14. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica......Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error......-prone and impracticable for large systems. Nonetheless, the automated generation of attack trees has only been explored in connection to computer networks and levering rich models, whose analysis typically leads to an exponential blow-up of the state space. We propose a static analysis approach where attack trees...... are automatically inferred from a process algebraic specification in a syntax-directed fashion, encompassing a great many application domains and avoiding incurring systematically an exponential explosion. Moreover, we show how the standard propositional denotation of an attack tree can be used to phrase...

  15. Pareto Efficient Solutions of Attack-Defence Trees

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2015-01-01

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as proba......Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes......, such as probability or cost of attacks and defences. In case of multiple parameters most analytical methods optimise one parameter at a time, e.g., minimise cost or maximise probability of an attack. Such methods may lead to sub-optimal solutions when optimising conflicting parameters, e.g., minimising cost while...... maximising probability. In order to tackle this challenge, we devise automated techniques that optimise all parameters at once. Moreover, in the case of conflicting parameters our techniques compute the set of all optimal solutions, defined in terms of Pareto efficiency. The developments are carried out...

  16. Protecting ICS Systems Within the Energy Sector from Cyber Attacks

    Science.gov (United States)

    Barnes, Shaquille

    Advance persistent threat (APT) groups are continuing to attack the energy sector through cyberspace, which poses a risk to our society, national security, and economy. Industrial control systems (ICSs) are not designed to handle cyber-attacks, which is why asset owners need to implement the correct proactive and reactive measures to mitigate the risk to their ICS environments. The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) responded to 290 incidents for fiscal year 2016, where 59 of those incidents came from the Energy Sector. APT groups know how vulnerable energy sector ICS systems are and the destruction they can cause when they go offline such as loss of production, loss of life, and economic impact. Defending against APT groups requires more than just passive controls such as firewalls and antivirus solutions. Asset owners should implement a combination of best practices and active defense in their environment to defend against APT groups. Cyber-attacks against critical infrastructure will become more complex and harder to detect and respond to with traditional security controls. The purpose of this paper was to provide asset owners with the correct security controls and methodologies to help defend against APT groups.

  17. Organization and Dynamics of Receptor Proteins in a Plasma Membrane.

    Science.gov (United States)

    Koldsø, Heidi; Sansom, Mark S P

    2015-11-25

    The interactions of membrane proteins are influenced by their lipid environment, with key lipid species able to regulate membrane protein function. Advances in high-resolution microscopy can reveal the organization and dynamics of proteins and lipids within living cells at resolutions membranes of in vivo-like complexity. We explore the dynamics of proteins and lipids in crowded and complex plasma membrane models, thereby closing the gap in length and complexity between computations and experiments. Our simulations provide insights into the mutual interplay between lipids and proteins in determining mesoscale (20-100 nm) fluctuations of the bilayer, and in enabling oligomerization and clustering of membrane proteins.

  18. Export of a Toxoplasma gondii rhoptry neck protein complex at the host cell membrane to form the moving junction during invasion.

    Directory of Open Access Journals (Sweden)

    Sébastien Besteiro

    2009-02-01

    Full Text Available One of the most conserved features of the invasion process in Apicomplexa parasites is the formation of a moving junction (MJ between the apex of the parasite and the host cell membrane that moves along the parasite and serves as support to propel it inside the host cell. The MJ was, up to a recent period, completely unknown at the molecular level. Recently, proteins originated from two distinct post-Golgi specialised secretory organelles, the micronemes (for AMA1 and the neck of the rhoptries (for RON2/RON4/RON5 proteins, have been shown to form a complex. AMA1 and RON4 in particular, have been localised to the MJ during invasion. Using biochemical approaches, we have identified RON8 as an additional member of the complex. We also demonstrated that all RON proteins are present at the MJ during invasion. Using metabolic labelling and immunoprecipitation, we showed that RON2 and AMA1 were able to interact in the absence of the other members. We also discovered that all MJ proteins are subjected to proteolytic maturation during trafficking to their respective organelles and that they could associate as non-mature forms in vitro. Finally, whereas AMA1 has previously been shown to be inserted into the parasite membrane upon secretion, we demonstrated, using differential permeabilization and loading of RON-specific antibodies into the host cell, that the RON complex is targeted to the host cell membrane, where RON4/5/8 remain associated with the cytoplasmic face. Globally, these results point toward a model of MJ organization where the parasite would be secreting and inserting interacting components on either side of the MJ, both at the host and at its own plasma membranes.

  19. Cross-site scripting attacks procedure and Prevention Strategies

    Directory of Open Access Journals (Sweden)

    Wang Xijun

    2016-01-01

    Full Text Available Cross-site scripting attacks and defense has been the site of attack and defense is an important issue, this paper, the definition of cross-site scripting attacks, according to the current understanding of the chaos on the cross-site scripting, analyzes the causes and harm cross-site scripting attacks formation of attacks XXS complete process XSS attacks made a comprehensive analysis, and then for the web program includes Mobility there are cross-site scripting filter laxity given from ordinary users browse the web and web application developers two the defense cross-site scripting attacks effective strategy.

  20. Heart Attack Symptoms in Women

    Science.gov (United States)

    ... fat, cholesterol and other substances (plaque). Watch an animation of a heart attack . Many women think the ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  1. On the anatomy of social engineering attacks : A literature-based dissection of successful attacks

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    The aim of this studywas to explore the extent towhich persuasion principles are used in successful social engineering attacks. Seventy-four scenarioswere extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenariowas split into attack steps, containing

  2. In-vivo identification of direct electron transfer from Shewanella oneidensis MR-1 to electrodes via outer-membrane OmcA-MtrCAB protein complexes

    Energy Technology Data Exchange (ETDEWEB)

    Okamoto, Akihiro [Department of Applied Chemistry, School of Engineering, University of Tokyo, 7-3-1 Hongo, Bunkyo-ku, Tokyo 113-8656 (Japan); Nakamura, Ryuhei, E-mail: nakamura@light.t.u-tokyo.ac.jp [Department of Applied Chemistry, School of Engineering, University of Tokyo, 7-3-1 Hongo, Bunkyo-ku, Tokyo 113-8656 (Japan); Hashimoto, Kazuhito, E-mail: hashimoto@light.t.u-tokyo.ac.jp [Department of Applied Chemistry, School of Engineering, University of Tokyo, 7-3-1 Hongo, Bunkyo-ku, Tokyo 113-8656 (Japan); ERATO/JST, HASHIMOTO Light Energy Conversion Project (Japan)

    2011-06-30

    Graphical abstract: . Display Omitted Highlights: > Monolayer biofilm of Shewanella cells was prepared on an ITO electrode. > Extracellular electron transfer (EET) process was examined with series of mutants. > Direct ET was confirmed with outer-membrane-bound OmcA-MtrCAB complex. > The EET process was not prominently influenced by capsular polysaccharide. - Abstract: The direct electron-transfer (DET) property of Shewanella bacteria has not been resolved in detail due to the complexity of in vivo electrochemistry in whole-cell systems. Here, we report the in vivo assignment of the redox signal indicative of the DET property in biofilms of Shewanella oneidensis MR-1 by cyclic voltammetry (CV) with a series of mutants and a chemical marking technique. The CV measurements of monolayer biofilms formed by deletion mutants of c-type cytochromes ({Delta}mtrA, {Delta}mtrB, {Delta}mtrC/{Delta}omcA, and {Delta}cymA), and pilin ({Delta}pilD), capsular polysaccharide ({Delta}SO3177) and menaquinone ({Delta}menD) biosynthetic proteins demonstrated that the electrochemical redox signal with a midpoint potential at 50 mV (vs. SHE) was due to an outer-membrane-bound OmcA-MtrCAB protein complex of decaheme cytochromes, and did not involve either inner-membrane-bound CymA protein or secreted menaquinone. Using the specific binding affinity of nitric monoxide for the heme groups of c-type cytochromes, we further confirmed this conclusion. The heterogeneous standard rate constant for the DET process was estimated to be 300 {+-} 10 s{sup -1}, which was two orders of magnitude higher than that previously reported for the electron shuttling process via riboflavin. Experiments using a mutant unable to produce capsular polysaccharide ({Delta}SO3177) revealed that the DET property of the OmcA-MtrCAB complex was not influenced by insulating and hydrophilic extracellular polysaccharide. Accordingly, under physiological conditions, S. oneidensis MR-1 utilizes a high density of outer-membrane

  3. Platelet degranulation and monocyte-platelet complex formation are increased in the acute and convalescent phases after ischaemic stroke or transient ischaemic attack.

    LENUS (Irish Health Repository)

    McCabe, Dominick J H

    2004-06-01

    Flow cytometric studies suggest that platelets are activated in ischaemic stroke or transient ischaemic attack (TIA). However, few studies have measured circulating leucocyte-platelet complexes in this patient population. Whole blood flow cytometry was used to quantify the expression of CD62P-, CD63-, and PAC1-binding, and the percentages of leucocyte-platelet complexes in acute (1-27 d, n = 79) and convalescent (79-725 d, n = 70) ischaemic cerebrovascular disease (CVD) patients compared with controls without CVD (n = 27). We performed a full blood count, and measured plasma levels of soluble P-selectin, soluble E-selectin, and von Willebrand factor antigen (VWF:Ag) as additional markers of platelet and\\/or endothelial cell activation. The median percentage CD62P expression and the median percentage monocyte-platelet complexes were higher in both acute and convalescent CVD patients than controls (P <\\/= 0.02). The mean white cell count and mean VWF:Ag levels were significantly elevated in the acute and convalescent phases after ischaemic stroke or TIA (P <\\/= 0.02). Otherwise, there was no significant increase in any other marker of platelet or endothelial activation in CVD patients. There was a positive correlation between the percentage expression of CD62P and the percentages of both neutrophil-platelet and monocyte-platelet complexes in the acute phase, and the percentages of all leucocyte-platelet complexes in the convalescent phase after ischaemic CVD. This study provides evidence for ongoing excessive platelet and\\/or endothelial activation in ischaemic CVD patients despite treatment with antithrombotic therapy.

  4. DDOS ATTACK DETECTION SIMULATION AND HANDLING MECHANISM

    Directory of Open Access Journals (Sweden)

    Ahmad Sanmorino

    2013-11-01

    Full Text Available In this study we discuss how to handle DDoS attack that coming from the attacker by using detection method and handling mechanism. Detection perform by comparing number of packets and number of flow. Whereas handling mechanism perform by limiting or drop the packets that detected as a DDoS attack. The study begins with simulation on real network, which aims to get the real traffic data. Then, dump traffic data obtained from the simulation used for detection method on our prototype system called DASHM (DDoS Attack Simulation and Handling Mechanism. From the result of experiment that has been conducted, the proposed method successfully detect DDoS attack and handle the incoming packet sent by attacker.

  5. Model checking exact cost for attack scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2017-01-01

    Attack trees constitute a powerful tool for modelling security threats. Many security analyses of attack trees can be seamlessly expressed as model checking of Markov Decision Processes obtained from the attack trees, thus reaping the benefits of a coherent framework and a mature tool support....... However, current model checking does not encompass the exact cost analysis of an attack, which is standard for attack trees. Our first contribution is the logic erPCTL with cost-related operators. The extended logic allows to analyse the probability of an event satisfying given cost bounds and to compute...... the exact cost of an event. Our second contribution is the model checking algorithm for erPCTL. Finally, we apply our framework to the analysis of attack trees....

  6. Complex interplay between the P-glycoprotein multidrug efflux pump and the membrane: its role in modulating protein function

    Directory of Open Access Journals (Sweden)

    Frances Jane Sharom

    2014-03-01

    Full Text Available Multidrug resistance in cancer is linked to expression of the P-glycoprotein multidrug transporter (Pgp, ABCB1, which exports many structurally diverse compounds from cells. Substrates first partition into the bilayer and then interact with a large flexible binding pocket within the transporter’s transmembrane regions. Pgp has been described as a hydrophobic vacuum cleaner or an outwardly-directed drug/lipid flippase. Recent X-ray crystal structures have shed some light on the nature of the drug-binding pocket and suggested routes by which substrates can enter it from the membrane. Detergents have profound effects on Pgp function, and several appear to be substrates. Biochemical and biophysical studies in vitro, some using purified reconstituted protein, have explored the effects of the membrane environment. They have demonstrated that Pgp is involved in a complex relationship with its lipid environment, which modulates the behaviour of its substrates, as well as various functions of the protein, including ATP hydrolysis, drug binding and drug transport. Membrane lipid composition and fluidity, phospholipid headgroup and acyl chain length all influence Pgp function. Recent studies focusing on thermodynamics and kinetics have revealed some important principles governing Pgp-lipid and substrate-lipid interactions, and how these affect drug binding and transport. In some cells, Pgp is associated with cholesterol-rich microdomains which may modulate its functions. The relationship between Pgp and cholesterol remains an open question; however it clearly affects several aspects of its function in addition to substrate-membrane partitioning. The action of Pgp modulators appears to depend on their membrane permeability, and membrane fluidizers and surfactants reverse drug resistance, likely via an indirect mechanism. A detailed understanding of how the membrane affects Pgp substrates and Pgp’s catalytic cycle may lead to new strategies to combat

  7. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  8. Understanding How Components of Organisations Contribute to Attacks

    DEFF Research Database (Denmark)

    Gu, Min; Aslanyan, Zaruhi; Probst, Christian W.

    2016-01-01

    Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors is diffi......Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors...... is difficult. Recently, system models have been used for automatically identifying possible attacks on the modelled organisation. The generated attacks consider all three layers, making the contribution of building infrastructure, computer infrastructure, and humans (insiders and outsiders) explicit. However......, this contribution is only visible in the attack trees as part of the performed steps; it cannot be mapped back to the model directly since the actions usually involve several elements (attacker and targeted actor or asset). Especially for large attack trees, understanding the relations between several model...

  9. [Terrorist attack trauma - an individual entity of polytrauma : A 10-year update].

    Science.gov (United States)

    Güsgen, C; Franke, A; Hentsch, S; Kollig, E; Schwab, R

    2017-10-01

    The incidence of terrorist attacks is increasing worldwide, and they have also become a permanent threat in European cities. Due to its complexity, terrorist attack trauma places high demands on the strategy of surgical treatment. The combination of various mechanisms, explosions and gunshot injuries, with the characteristic pressure (blast) damage and a high proportion of penetrating trauma with simultaneous burns are characteristic features. Unlike in military conflicts, injuries to people of all ages and without ballistic body protection (body armor) are to be expected. The mechanism of the attack and its local conditions are of relevance for the assessment of the situation and the expected injury patterns. Thus, suicide attacks result in several times higher numbers of fatalities and casualties. Explosions on free ground lead to different types of injury than those in closed or semi-enclosed spaces. The treatment principles of the Advanced Trauma Life Support (ATLS®) are based on the intrahospital care of casualties as well as damage control strategies with trigger factors. In order to prepare and educate clinics and surgeons in Germany for such scenarios, various course formats of the professional societies, the German Society for General and Visceral Surgery (DGAV) and the German Society for Trauma Surgery (DGU) have now been established.

  10. Layer-by-layer cell membrane assembly

    Science.gov (United States)

    Matosevic, Sandro; Paegel, Brian M.

    2013-11-01

    Eukaryotic subcellular membrane systems, such as the nuclear envelope or endoplasmic reticulum, present a rich array of architecturally and compositionally complex supramolecular targets that are as yet inaccessible. Here we describe layer-by-layer phospholipid membrane assembly on microfluidic droplets, a route to structures with defined compositional asymmetry and lamellarity. Starting with phospholipid-stabilized water-in-oil droplets trapped in a static droplet array, lipid monolayer deposition proceeds as oil/water-phase boundaries pass over the droplets. Unilamellar vesicles assembled layer-by-layer support functional insertion both of purified and of in situ expressed membrane proteins. Synthesis and chemical probing of asymmetric unilamellar and double-bilayer vesicles demonstrate the programmability of both membrane lamellarity and lipid-leaflet composition during assembly. The immobilized vesicle arrays are a pragmatic experimental platform for biophysical studies of membranes and their associated proteins, particularly complexes that assemble and function in multilamellar contexts in vivo.

  11. On Linear Hulls, Statistical Saturation Attacks, PRESENT and a Cryptanalysis of PUFFIN

    DEFF Research Database (Denmark)

    Leander, Gregor

    2011-01-01

    which breaks the cipher for at least a quarter of the keys with a complexity less than 258. In the case of PRESENT we show that the design is sound. The design criteria are sufficient to ensure the resistance against linear attacks, taking into account the notion of linear hulls. Finally, we show...

  12. Attack Graph Construction for Security Events Analysis

    Directory of Open Access Journals (Sweden)

    Andrey Alexeevich Chechulin

    2014-09-01

    Full Text Available The paper is devoted to investigation of the attack graphs construction and analysis task for a network security evaluation and real-time security event processing. Main object of this research is the attack modeling process. The paper contains the description of attack graphs building, modifying and analysis technique as well as overview of implemented prototype for network security analysis based on attack graph approach.

  13. Automated Discovery of Mimicry Attacks

    National Research Council Canada - National Science Library

    Giffin, Jonathon T; Jha, Somesh; Miller, Barton P

    2006-01-01

    .... These systems are useful only if they detect actual attacks. Previous research developed manually-constructed mimicry and evasion attacks that avoided detection by hiding a malicious series of system calls within a valid sequence allowed by the model...

  14. Relation between sedimentation behaviour of DNA-membrane complexes and DNA single- and double-strand breaks after irradiation with gamma-rays, pulse neutrons and 12C ions

    International Nuclear Information System (INIS)

    Erzgraber, G.; Lapidus, I.L.

    1985-01-01

    The experimental data on sedimentation behaviour of DNA-membrane complexes at radiation of the Chinese hamster cells (V79-4) in a wide dose range of 127 Cs γ-rays, pulse neutrons (reactor IBR-2, Laboratory of Neutron Physics, JINR, Dubna) are accelerated 12 C ions (cyclotron U-200, Laboratory of Nuclear Reactions, JINR, Dubna) are presented An assumption on the role of DNA single- and double-strend breaks in changing the sedimentation properties of DNA-membrane complexes has been confirmed by the experiments with radiation of different quality. The possibility of estimating induction and repair of DNA breaks on the basis of dependence of the relative sedimentation velocity of complexes on the irradiation does is discussed

  15. Role of plasma membrane surface charges in dictating the feasibility of membrane-nanoparticle interactions

    Science.gov (United States)

    Sinha, Shayandev; Jing, Haoyuan; Sachar, Harnoor Singh; Das, Siddhartha

    2017-12-01

    Receptor-ligand (R-L) binding mediated interactions between the plasma membrane (PM) and a nanoparticle (NP) require the ligand-functionalized NPs to come to a distance of separation (DOS) of at least dRL (length of the R-L complex) from the receptor-bearing membranes. In this letter, we establish that the membrane surface charges and the surrounding ionic environment dictate whether or not the attainment of such a critical DOS is possible. The negatively charged membrane invariably induces a negative electrostatic potential at the NP surface, repelling the NP from the membrane. This is countered by the attractive influences of the thermal fluctuations and van der Waals (vdw) interactions that drive the NP close to the membrane. For a NP approaching the membrane from a distance, the ratio of the repulsive (electrostatic) and attractive (thermal and vdW) effects balances at a critical NP-membrane DOS of dg,c. For a given set of parameters, there can be two possible values of dg,c, namely, dg,c,1 and dg,c,2 with dg,c,1 ≫ dg,c,2. We establish that any R-L mediated NP-membrane interaction is possible only if dRL > dg,c,1. Therefore, our study proposes a design criterion for engineering ligands for a NP that will ensure the appropriate length of the R-L complex in order to ensure the successful membrane-NP interaction in the presence of a given electrostatic environment. Finally, we discuss the manner in which our theory can help designing ligand-grafted NPs for targeted drug delivery, design biomimetics NPs, and also explain various experimental results.

  16. Analysis of Protein-Membrane Interactions

    DEFF Research Database (Denmark)

    Kemmer, Gerdi Christine

    Cellular membranes are complex structures, consisting of hundreds of different lipids and proteins. These membranes act as barriers between distinct environments, constituting hot spots for many essential functions of the cell, including signaling, energy conversion, and transport. These functions....... Discovered interactions were then probed on the level of the membrane using liposome-based assays. In the second part, a transmembrane protein was investigated. Assays to probe activity of the plasma membrane ATPase (Arabidopsis thaliana H+ -ATPase isoform 2 (AHA2)) in single liposomes using both giant...... are implemented by soluble proteins reversibly binding to, as well as by integral membrane proteins embedded in, cellular membranes. The activity and interaction of these proteins is furthermore modulated by the lipids of the membrane. Here, liposomes were used as model membrane systems to investigate...

  17. Chlorine-Resistant Polyamide Reverse Osmosis Membrane with Monitorable and Regenerative Sacrificial Layers.

    Science.gov (United States)

    Huang, Hai; Lin, Saisai; Zhang, Lin; Hou, Li'an

    2017-03-22

    Improving chlorine stability is a high priority for aromatic polyamide (PA) reverse osmosis (RO) membranes especially in long-term desalination. In this Research Article, PA RO membranes of sustainable chlorine resistance was synthesized. Glycylglycine (Gly) was grafted onto the membrane surface as a regenerative chlorine sacrificial layer, and the zeta-potential was used to monitor the membrane performance and to conduct timely regeneration operations for chlorinated Gly. The Gly-grafted PA membrane exhibited ameliorative chlorine resistance in which the N-H moiety of glycylglycine served as sacrificial pendants against chlorine attacks. Cyclic chlorination experiments, combined with FT-IR and XPS analysis, were carried out to characterize the membrane. Results indicated that the resulting N-halamines could be fast regenerated by a simple alkaline reduction step (pH 10). A synchronous relationship between the zeta-potential and the chlorination extent of the sacrificial layer was observed. This indicated that the zeta-potential can be used as an on-site sensor to conduct a timely regeneration operation. The intrinsic mechanism of the surface sacrificial process was also studied.

  18. Structure and physical properties of bio membranes and model membranes

    International Nuclear Information System (INIS)

    Tibor Hianik

    2006-01-01

    Bio membranes belong to the most important structures of the cell and the cell organelles. They play not only structural role of the barrier separating the external and internal part of the membrane but contain also various functional molecules, like receptors, ionic channels, carriers and enzymes. The cell membrane also preserves non-equilibrium state in a cell which is crucial for maintaining its excitability and other signaling functions. The growing interest to the bio membranes is also due to their unique physical properties. From physical point of view the bio membranes, that are composed of lipid bilayer into which are incorporated integral proteins and on their surface are anchored peripheral proteins and polysaccharides, represent liquid s crystal of smectic type. The bio membranes are characterized by anisotropy of structural and physical properties. The complex structure of bio membranes makes the study of their physical properties rather difficult. Therefore several model systems that mimic the structure of bio membranes were developed. Among them the lipid monolayers at an air-water interphase, bilayer lipid membranes, supported bilayer lipid membranes and liposomes are most known. This work is focused on the introduction into the physical word of the bio membranes and their models. After introduction to the membrane structure and the history of its establishment, the physical properties of the bio membranes and their models are stepwise presented. The most focus is on the properties of lipid monolayers, bilayer lipid membranes, supported bilayer lipid membranes and liposomes that were most detailed studied. This lecture has tutorial character that may be useful for undergraduate and graduate students in the area of biophysics, biochemistry, molecular biology and bioengineering, however it contains also original work of the author and his co-worker and PhD students, that may be useful also for specialists working in the field of bio membranes and model

  19. Heterotrimeric G protein beta1gamma2 subunits change orientation upon complex formation with G protein-coupled receptor kinase 2 (GRK2) on a model membrane.

    Science.gov (United States)

    Boughton, Andrew P; Yang, Pei; Tesmer, Valerie M; Ding, Bei; Tesmer, John J G; Chen, Zhan

    2011-09-13

    Few experimental techniques can assess the orientation of peripheral membrane proteins in their native environment. Sum Frequency Generation (SFG) vibrational spectroscopy was applied to study the formation of the complex between G protein-coupled receptor (GPCR) kinase 2 (GRK2) and heterotrimeric G protein β(1)γ(2) subunits (Gβγ) at a lipid bilayer, without any exogenous labels. The most likely membrane orientation of the GRK2-Gβγ complex differs from that predicted from the known protein crystal structure, and positions the predicted receptor docking site of GRK2 such that it would more optimally interact with GPCRs. Gβγ also appears to change its orientation after binding to GRK2. The developed methodology is widely applicable for the study of other membrane proteins in situ.

  20. Initiation of poliovirus plus-strand RNA synthesis in a membrane complex of infected HeLa cells

    International Nuclear Information System (INIS)

    Takeda, N.; Kuhn, R.J.; Yang, C.F.; Takegami, T.; Wimmer, E.

    1986-01-01

    An in vitro poliovirus RNA-synthesizing system derived from a crude membrance fraction of infected HeLa cells was used to analyze the mechanism of initiation of poliovirus plus-strand RNA synthesis. This system contains an activity that synthesizes the nucleotidyl proteins VPg-pU and VPg-pUpU. These molecules represent the 5'-terminal structure of nascent RNA molecules and of virion RNA. The membranous replication complex is also capable of synthesizing mucleotidyl proteins containing nine or more of the poliovirus 5'-proximal nucleotides as assayed by the formation of the RNase T 1 -resistant oligonucleotide VPg-pUUAAAACAGp or by fingerprint analysis of the in vitro-synthesized 32 P-RNA. Incubation of preformed VPg-pUpU with unlabeled nucleoside triphosphates resulted in the formation of VPg-pUUAAAACAGp. This reaction, which appeared to be an elongation of VPg-pUpU, was stimulated by the addition of a soluble fraction (S-10) obtained from uninfected HeLa cells. Preformed VPg-pU could be chased into VPg-pUpU in the presence of UTP. The data are consistent with a model that VPg-pU can function as a primer for poliovirus plus-strand RNA synthesis in the membranous replication complex and that the elongation reaction may be stimulated by a host cellular factor

  1. When Sinuses Attack! (For Kids)

    Science.gov (United States)

    ... First Aid & Safety Doctors & Hospitals Videos Recipes for Kids Kids site Sitio para niños How the Body Works ... Search English Español When Sinuses Attack! KidsHealth / For Kids / When Sinuses Attack! What's in this article? What ...

  2. DNA-membrane complex restoration in Micrococcus radiodurans after X-irradiation: relation to repair, DNA synthesis and DNA degradation

    Energy Technology Data Exchange (ETDEWEB)

    Dardalhon-Samsonoff, M; Averbeck, D [Institut du Radium, 75 - Paris (France). Lab. Curie

    1980-07-01

    The DNA-membrane complex in Micrococcus radiodurans was shown to be essentially constituted of proteins, lipids and DNA. The complex was dissociated immediately after X-irradiation of cells and restored during post-incubation in complete medium. In X-irradiated protoplasts some DNA remained associated with the complex. Restoration of the complex during post-incubation was only seen in a medium favouring DNA polymerase and ligase activities. Under this condition no DNA synthesis occurred, suggesting that complex restoration may involve ligase activity. The complex restoration in the wild type and the X-ray sensitive mutant UV17 of M. radiodurans was strictly dependent on the X-ray dose. It was correlated with survival and DNA degradation but always preceded the onset of DNA synthesis after X-irradiation. At the same dose the complex restoration was about 2 fold lower in mutant than in wild type cells indicating that the restoration of the complex is related to repair capacity. The results are consistent with the idea that the complex protects X-irradiated DNA of M. radiodurans from further breakdown and, subsequently, permits DNA synthesis and repair to occur.

  3. A taxonomy and discussion of software attack technologies

    Science.gov (United States)

    Banks, Sheila B.; Stytz, Martin R.

    2005-03-01

    Software is a complex thing. It is not an engineering artifact that springs forth from a design by simply following software coding rules; creativity and the human element are at the heart of the process. Software development is part science, part art, and part craft. Design, architecture, and coding are equally important activities and in each of these activities, errors may be introduced that lead to security vulnerabilities. Therefore, inevitably, errors enter into the code. Some of these errors are discovered during testing; however, some are not. The best way to find security errors, whether they are introduced as part of the architecture development effort or coding effort, is to automate the security testing process to the maximum extent possible and add this class of tools to the tools available, which aids in the compilation process, testing, test analysis, and software distribution. Recent technological advances, improvements in computer-generated forces (CGFs), and results in research in information assurance and software protection indicate that we can build a semi-intelligent software security testing tool. However, before we can undertake the security testing automation effort, we must understand the scope of the required testing, the security failures that need to be uncovered during testing, and the characteristics of the failures. Therefore, we undertook the research reported in the paper, which is the development of a taxonomy and a discussion of software attacks generated from the point of view of the security tester with the goal of using the taxonomy to guide the development of the knowledge base for the automated security testing tool. The representation for attacks and threat cases yielded by this research captures the strategies, tactics, and other considerations that come into play during the planning and execution of attacks upon application software. The paper is organized as follows. Section one contains an introduction to our research

  4. Heart Attack

    Science.gov (United States)

    ... properly causes your body's blood sugar levels to rise, increasing your risk of heart attack. Metabolic syndrome. This occurs when you have obesity, high blood pressure and high blood sugar. Having metabolic ...

  5. Software-based Microarchitectural Attacks

    OpenAIRE

    Gruss, Daniel

    2017-01-01

    Modern processors are highly optimized systems where every single cycle of computation time matters. Many optimizations depend on the data that is being processed. Software-based microarchitectural attacks exploit effects of these optimizations. Microarchitectural side-channel attacks leak secrets from cryptographic computations, from general purpose computations, or from the kernel. This leakage even persists across all common isolation boundaries, such as processes, containers, and virtual ...

  6. Dynamic nuclear polarization methods in solids and solutions to explore membrane proteins and membrane systems.

    Science.gov (United States)

    Cheng, Chi-Yuan; Han, Songi

    2013-01-01

    Membrane proteins regulate vital cellular processes, including signaling, ion transport, and vesicular trafficking. Obtaining experimental access to their structures, conformational fluctuations, orientations, locations, and hydration in membrane environments, as well as the lipid membrane properties, is critical to understanding their functions. Dynamic nuclear polarization (DNP) of frozen solids can dramatically boost the sensitivity of current solid-state nuclear magnetic resonance tools to enhance access to membrane protein structures in native membrane environments. Overhauser DNP in the solution state can map out the local and site-specific hydration dynamics landscape of membrane proteins and lipid membranes, critically complementing the structural and dynamics information obtained by electron paramagnetic resonance spectroscopy. Here, we provide an overview of how DNP methods in solids and solutions can significantly increase our understanding of membrane protein structures, dynamics, functions, and hydration in complex biological membrane environments.

  7. Attack and Vulnerability Penetration Testing: FreeBSD

    Directory of Open Access Journals (Sweden)

    Abdul Hanan Abdullah

    2013-07-01

    Full Text Available Computer system security has become a major concern over the past few years. Attacks, threasts or intrusions, against computer system and network have become commonplace events. However, there are some system devices and other tools that are available to overcome the threat of these attacks. Currently, cyber attack is a major research and inevitable. This paper presents some steps of penetration in FreeBSD operating system, some tools and new steps to attack used in this experiment, probes for reconnaissance, guessing password via brute force, gaining privilege access and flooding victim machine to decrease availability. All these attacks were executed and infiltrate within the environment of Intrusion Threat Detection Universiti Teknologi Malaysia (ITD UTM data set. This work is expected to be a reference for practitioners to prepare their systems from Internet attacks.

  8. Schistosoma mansoni; relationship between membrane turnover rates and susceptibility to immune damage. Part of a coordinated programme on preparation of irradiated vaccines against some human diseases

    International Nuclear Information System (INIS)

    Pereira Tavares, C.A.

    1983-11-01

    It is known that the schistosomulum of Schistosoma mansoni become refractory to damage by antibody and complement in vitro in the presence of serum, or Concanavalin A (Con A), or after contact with host tissues, presumably due to intrinsic changes in the surface membrane. This project studied the effect of dialysed fetal calf serum (DFCS) and Con A on the synthesis and turnover of individual proteins in the surface membrane using the incorporation of 14 C- and 3 H-labelled Arginine and the separation of the membrane proteins in SDS-PAGE. The results indicate that during the period in which schistosomules become resistant to immune attack, no qualitative alterations in electrophoretic patterns of surface proteins were observed. There was, however, a marked heterogeneity in synthesis and degradation among constituent proteins. In addition, Con A which had been shown to be effective in stimulating loss of susceptibility to immune attack, caused a slight decrease in the synthesis and turnover rate of high molecular weight proteins, whilst DFCS increased synthesis and turnover of low molecular weight proteins. This suggests that at least two processes occur in the membrane which may be related to the development of protection against immune attack. Serum might stimulate the loss of crucial antigens by accelerating their turnover making antibody attachment difficult, and Con A could be stabilizing the membrane by crosslinking large macromolecules. It is possible that in vivo both mechanisms occur to make the schistosomule surface refractory to damage

  9. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  10. Biogenesis and Membrane Targeting of Lipoproteins.

    Science.gov (United States)

    Narita, Shin-Ichiro; Tokuda, Hajime

    2010-09-01

    Bacterial lipoproteins represent a unique class of membrane proteins, which are anchored to membranes through triacyl chains attached to the amino-terminal cysteine. They are involved in various functions localized in cell envelope. Escherichia coli possesses more than 90 species of lipoproteins, most of which are localized in the outer membrane, with others being in the inner membrane. All lipoproteins are synthesized in the cytoplasm with an N-terminal signal peptide, translocated across the inner membrane by the Sec translocon to the periplasmic surface of the inner membrane, and converted to mature lipoproteins through sequential reactions catalyzed by three lipoprotein-processing enzymes: Lgt, LspA, and Lnt. The sorting of lipoproteins to the outer membrane requires a system comprising five Lol proteins. An ATP-binding cassette transporter, LolCDE, initiates the sorting by mediating the detachment of lipoproteins from the inner membrane. Formation of the LolA-lipoprotein complex is coupled to this LolCDE-dependent release reaction. LolA accommodates the amino-terminal acyl chain of lipoproteins in its hydrophobic cavity, thereby generating a hydrophilic complex that can traverse the periplasmic space by diffusion. Lipoproteins are then transferred to LolB on the outer membrane and anchored to the inner leaflet of the outer membrane by the action of LolB. In contrast, since LolCDE does not recognize lipoproteins possessing Asp at position +2, these lipoproteins remain anchored to the inner membrane. Genes for Lol proteins are widely conserved among gram-negative bacteria, and Lol-mediated outer membrane targeting of lipoproteins is considered to be the general lipoprotein localization mechanism.

  11. Sorting of bacterial lipoproteins to the outer membrane by the Lol system.

    Science.gov (United States)

    Narita, Shin-ichiro; Tokuda, Hajime

    2010-01-01

    Bacterial lipoproteins comprise a subset of membrane proteins with a lipid-modified cysteine residue at their amino termini through which they are anchored to the membrane. In Gram-negative bacteria, lipoproteins are localized on either the inner or the outer membrane. The Lol system is responsible for the transport of lipoproteins to the outer membrane.The Lol system comprises an inner-membrane ABC transporter LolCDE complex, a periplasmic carrier protein, LolA, and an outer membrane receptor protein, LolB. Lipoproteins are synthesized as precursors in the cytosol and then translocated across the inner membrane by the Sec translocon to the outer leaflet of the inner membrane, where lipoprotein precursors are processed to mature lipoproteins. The LolCDE complex then mediates the release of outer membrane-specific lipoproteins from the inner membrane while the inner membrane-specific lipoproteins possessing Asp at position 2 are not released by LolCDE because it functions as a LolCDE avoidance signal, causing the retention of these lipoproteins in the inner membrane. A water-soluble lipoprotein-LolA complex is formed as a result of the release reaction mediated by LolCDE. This complex traverses the hydrophilic periplasm to reach the outer membrane, where LolB accepts a lipoprotein from LolA and then catalyzes its incorporation into the inner leaflet of the outer membrane.

  12. Cell Membrane Transport Mechanisms: Ion Channels and Electrical Properties of Cell Membranes.

    Science.gov (United States)

    Kulbacka, Julita; Choromańska, Anna; Rossowska, Joanna; Weżgowiec, Joanna; Saczko, Jolanta; Rols, Marie-Pierre

    2017-01-01

    Cellular life strongly depends on the membrane ability to precisely control exchange of solutes between the internal and external (environmental) compartments. This barrier regulates which types of solutes can enter and leave the cell. Transmembrane transport involves complex mechanisms responsible for passive and active carriage of ions and small- and medium-size molecules. Transport mechanisms existing in the biological membranes highly determine proper cellular functions and contribute to drug transport. The present chapter deals with features and electrical properties of the cell membrane and addresses the questions how the cell membrane accomplishes transport functions and how transmembrane transport can be affected. Since dysfunctions of plasma membrane transporters very often are the cause of human diseases, we also report how specific transport mechanisms can be modulated or inhibited in order to enhance the therapeutic effect.

  13. Recurrent spontaneous attacks of dizziness.

    Science.gov (United States)

    Lempert, Thomas

    2012-10-01

    This article describes the common causes of recurrent vertigo and dizziness that can be diagnosed largely on the basis of history. Ninety percent of spontaneous recurrent vertigo and dizziness can be explained by six disorders: (1) Ménière disease is characterized by vertigo attacks, lasting 20 minutes to several hours, with concomitant hearing loss, tinnitus, and aural fullness. Aural symptoms become permanent during the course of the disease. (2) Attacks of vestibular migraine may last anywhere from minutes to days. Most patients have a previous history of migraine headaches, and many experience migraine symptoms during the attack. (3) Vertebrobasilar TIAs affect older adults with vascular risk factors. Most attacks last less than 1 hour and are accompanied by other symptoms from the posterior circulation territory. (4) Vestibular paroxysmia is caused by vascular compression of the eighth cranial nerve. It manifests itself with brief attacks of vertigo that recur many times per day, sometimes with concomitant cochlear symptoms. (5) Orthostatic hypotension causes brief episodes of dizziness lasting seconds to a few minutes after standing up and is relieved by sitting or lying down. In older adults, it may be accompanied by supine hypertension. (6) Panic attacks usually last minutes, occur in specific situations, and are accompanied by choking, palpitations, tremor, heat, and anxiety. Less common causes of spontaneous recurrent vertigo and dizziness include perilymph fistula, superior canal dehiscence, autoimmune inner ear disease, otosclerosis, cardiac arrhythmia, and medication side effects. Neurologists need to venture into otolaryngology, internal medicine, and psychiatry to master the differential diagnosis of recurrent dizziness.

  14. Shark Attack Project - Marine Attack at Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Adrianus J

    2005-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  15. Heart Attack

    Science.gov (United States)

    ... family history of heart attack race – African Americans, Mexican Americans, Native Americans, and native Hawaiians are at ... Your doctor will prescribe the medicines that are right for you. If you have had a heart ...

  16. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  17. Further attacks on Yeung-Mintzer fragile watermarking scheme

    Science.gov (United States)

    Fridrich, Jessica; Goljan, Miroslav; Memon, Nasir D.

    2000-05-01

    In this paper, we describe new and improved attacks on the authentication scheme previously proposed by Yeung and Mintzer. Previous attacks assumed that the binary watermark logo inserted in an image for the purposes of authentication was known. Here we remove that assumption and show how the scheme is still vulnerable, even if the binary logo is not known but the attacker has access to multiple images that have been watermarked with the same secret key and contain the same (but unknown) logo. We present two attacks. The first attack infers the secret watermark insertion function and the binary logo, given multiple images authenticated with the same key and containing the same logo. We show that a very good approximation to the logo and watermark insertion function can be constructed using as few as two images. With color images, one needs many more images, nevertheless the attack is still feasible. The second attack we present, which we call the 'collage-attack' is a variation of the Holliman-Memon counterfeiting attack. The proposed variation does not require knowledge of the watermark logo and produces counterfeits of superior quality by means of a suitable dithering process that we develop.

  18. Pareto Efficient Solution of Attack-Defence Trees

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as

  19. Amyloid and membrane complexity: The toxic interplay revealed by AFM.

    Science.gov (United States)

    Canale, Claudio; Oropesa-Nuñez, Reinier; Diaspro, Alberto; Dante, Silvia

    2018-01-01

    Lipid membranes play a fundamental role in the pathological development of protein misfolding diseases. Several pieces of evidence suggest that the lipid membrane could act as a catalytic surface for protein aggregation. Furthermore, a leading theory indicates the interaction between the cell membrane and misfolded oligomer species as the responsible for cytotoxicity, hence, for neurodegeneration in disorders such as Alzheimer's and Parkinson's disease. The definition of the mechanisms that drive the interaction between pathological protein aggregates and plasma membrane is fundamental for the development of effective therapies for a large class of diseases. Atomic force microscopy (AFM) has been employed to study how amyloid aggregates affect the cell physiological properties. Considerable efforts were spent to characterize the interaction with model systems, i.e., planar supported lipid bilayers, but some works also addressed the problem directly on living cells. Here, an overview of the main works involving the use of the AFM on both model system and living cells will be provided. Different kind of approaches will be presented, as well as the main results derived from the AFM analysis. Copyright © 2017 Elsevier Ltd. All rights reserved.

  20. Selective laser melting-enabled electrospinning: Introducing complexity within electrospun membranes.

    Science.gov (United States)

    Paterson, Thomas E; Beal, Selina N; Santocildes-Romero, Martin E; Sidambe, Alfred T; Hatton, Paul V; Asencio, Ilida Ortega

    2017-06-01

    Additive manufacturing technologies enable the creation of very precise and well-defined structures that can mimic hierarchical features of natural tissues. In this article, we describe the development of a manufacturing technology platform to produce innovative biodegradable membranes that are enhanced with controlled microenvironments produced via a combination of selective laser melting techniques and conventional electrospinning. This work underpins the manufacture of a new generation of biomaterial devices that have significant potential for use as both basic research tools and components of therapeutic implants. The membranes were successfully manufactured and a total of three microenvironment designs (niches) were chosen for thorough characterisation. Scanning electron microscopy analysis demonstrated differences in fibre diameters within different areas of the niche structures as well as differences in fibre density. We also showed the potential of using the microfabricated membranes for supporting mesenchymal stromal cell culture and proliferation. We demonstrated that mesenchymal stromal cells grow and populate the membranes penetrating within the niche-like structures. These findings demonstrate the creation of a very versatile tool that can be used in a variety of tissue regeneration applications including bone healing.

  1. Lanthanide metal complex-based membrane electrodes for sensing of biological amino alcohols

    International Nuclear Information System (INIS)

    Mahajan, Rakesh Kumar; Kaur, Ravneet; Shinoda, Satoshi; Tsukube, Hiroshi

    2008-01-01

    Electrodes selective for amino alcohols were prepared by incorporating lanthanide tris(β-diketonates) in PVC membranes, which formed 1:1 highly coordinated complexes with amino alcohols. Several electrodes gave near-Nernstian slopes for 2-amino-3-methyl-1-butanol in the linear concentration range of 1.0 x 10 -1 to 1.0 x 10 -3 M, while the low detection limits of these electrodes were order of ∼10 -4 M. Although the observed response profiles were significantly dependent on the natures of the targeted amino alcohols, the electrodes exhibited stable potentiometric signals in the pH range of 6-12 in short time period of 20 s. The related monoalcohol, diol, and zwitterionic amino acid substrates gave no response, indicating that the present type of lanthanide tris(β-diketonates) were applicable in potentiometric sensing of amino alcohols

  2. Attacks on the AJPS Mersenne-based cryptosystem

    NARCIS (Netherlands)

    K. de Boer (Koen); L. Ducas (Léo); S. Jeffery (Stacey); R. M. de Wolf (Ronald)

    2018-01-01

    textabstractAggarwal, Joux, Prakash and Santha recently introduced a new potentially quantum-safe public-key cryptosystem, and suggested that a brute-force attack is essentially optimal against it. They consider but then dismiss both Meet-in-the-Middle attacks and LLL-based attacks. Very soon after

  3. The political attack ad

    Directory of Open Access Journals (Sweden)

    Palma Peña-Jiménez, Ph.D.

    2011-01-01

    Full Text Available During election campaigns the political spot has a clear objective: to win votes. This message is communicated to the electorate through television and Internet, and usually presents a negative approach, which includes a direct critical message against the opponent, rather than an exposition of proposals. This article is focused on the analysis of the campaign attack video ad purposely created to encourage the disapproval of the political opponent among voters. These ads focus on discrediting the opponent, many times, through the transmission of ad hominem messages, instead of disseminating the potential of the political party and the virtues and manifesto of its candidate. The article reviews the development of the attack ad since its first appearance, which in Spain dates back to 1996, when the famous Doberman ad was broadcast, and examines the most memorable campaign attack ads.

  4. Robust Detection of Stepping-Stone Attacks

    National Research Council Canada - National Science Library

    He, Ting; Tong, Lang

    2006-01-01

    The detection of encrypted stepping-stone attack is considered. Besides encryption and padding, the attacker is capable of inserting chaff packets and perturbing packet timing and transmission order...

  5. A Framework for Attack-Resilient Industrial Control Systems : Attack Detection and Controller Reconfiguration

    OpenAIRE

    Paridari, Kaveh; O'Mahony, Niamh; Mady, Alie El-Din; Chabukswar, Rohan; Boubekeur, Menouer; Sandberg, Henrik

    2017-01-01

    Most existing industrial control systems (ICSs), such as building energy management systems (EMSs), were installed when potential security threats were only physical. With advances in connectivity, ICSs are now, typically, connected to communications networks and, as a result, can be accessed remotely. This extends the attack surface to include the potential for sophisticated cyber attacks, which can adversely impact ICS operation, resulting in service interruption, equipment damage, safety c...

  6. Evidence that assembly of the yeast cytochrome bc1 complex involves formation of a large core structure in the inner mitochondrial membrane

    Science.gov (United States)

    Zara, Vincenzo; Conte, Laura; Trumpower, Bernard L.

    2009-01-01

    The assembly status of the cytochrome bc1 complex has been analyzed in distinct yeast deletion strains in which genes for one or more of the bc1 subunits had been deleted. In all the yeast strains tested a bc1 sub-complex of about 500 kDa was found when the mitochondrial membranes were analyzed by blue native electrophoresis. The subsequent molecular characterization of this sub-complex, carried out in the second dimension by SDS-PAGE and immunodecoration, revealed the presence of the two catalytic subunits cytochrome b and cytochrome c1, associated with the non catalytic subunits core protein 1, core protein 2, Qcr7p and Qcr8p. Altogether these bc1 subunits build up the core structure of the cytochrome bc1 complex which is then able to sequentially bind the remaining subunits, such as Qcr6p, Qcr9p, the Rieske iron-sulfur protein and Qcr10p. This bc1 core structure may represent a true assembly intermediate during the maturation of the bc1 complex, first because of its wide distribution in distinct yeast deletion strains and second for its characteristics of stability which resemble those of the intact homodimeric bc1 complex. Differently from this latter, however, the bc1 core structure is not able to interact with the cytochrome c oxidase complex to form respiratory supercomplexes. The characterization of this novel core structure of the bc1 complex provides a number of new elements for clarification of the molecular events leading to the maturation of the yeast cytochrome bc1 complex in the inner mitochondrial membrane. PMID:19236481

  7. An Adaptive Approach for Defending against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Muhai Li

    2010-01-01

    Full Text Available In various network attacks, the Distributed Denial-of-Service (DDoS attack is a severe threat. In order to deal with this kind of attack in time, it is necessary to establish a special type of defense system to change strategy dynamically against attacks. In this paper, we introduce an adaptive approach, which is used for defending against DDoS attacks, based on normal traffic analysis. The approach can check DDoS attacks and adaptively adjust its configurations according to the network condition and attack severity. In order to insure the common users to visit the victim server that is being attacked, we provide a nonlinear traffic control formula for the system. Our simulation test indicates that the nonlinear control approach can prevent the malicious attack packets effectively while making legitimate traffic flows arrive at the victim.

  8. Attacking 44 Rounds of the SHACAL-2 Block Cipher Using Related-Key Rectangle Cryptanalysis

    Science.gov (United States)

    Lu, Jiqiang; Kim, Jongsung

    SHACAL-2 is a 64-round block cipher with a 256-bit block size and a variable length key of up to 512 bits. It is a NESSIE selected block cipher algorithm. In this paper, we observe that, when checking whether a candidate quartet is useful in a (related-key) rectangle attack, we can check the two pairs from the quartet one after the other, instead of checking them simultaneously; if the first pair does not meet the expected conditions, we can discard the quartet immediately. We next exploit a 35-round related-key rectangle distinguisher with probability 2-460 for the first 35 rounds of SHACAL-2, which is built on an existing 24-round related-key differential and a new 10-round differential. Finally, taking advantage of the above observation, we use the distinguisher to mount a related-key rectangle attack on the first 44 rounds of SHACAL-2. The attack requires 2233 related-key chosen plaintexts, and has a time complexity of 2497.2 computations. This is better than any previously published cryptanalytic results on SHACAL-2 in terms of the numbers of attacked rounds.

  9. Countermeasures for unintentional and intentional video watermarking attacks

    Science.gov (United States)

    Deguillaume, Frederic; Csurka, Gabriela; Pun, Thierry

    2000-05-01

    These last years, the rapidly growing digital multimedia market has revealed an urgent need for effective copyright protection mechanisms. Therefore, digital audio, image and video watermarking has recently become a very active area of research, as a solution to this problem. Many important issues have been pointed out, one of them being the robustness to non-intentional and intentional attacks. This paper studies some attacks and proposes countermeasures applied to videos. General attacks are lossy copying/transcoding such as MPEG compression and digital/analog (D/A) conversion, changes of frame-rate, changes of display format, and geometrical distortions. More specific attacks are sequence edition, and statistical attacks such as averaging or collusion. Averaging attack consists of averaging locally consecutive frames to cancel the watermark. This attack works well for schemes which embed random independent marks into frames. In the collusion attack the watermark is estimated from single frames (based on image denoising), and averaged over different scenes for better accuracy. The estimated watermark is then subtracted from each frame. Collusion requires that the same mark is embedded into all frames. The proposed countermeasures first ensures robustness to general attacks by spread spectrum encoding in the frequency domain and by the use of an additional template. Secondly, a Bayesian criterion, evaluating the probability of a correctly decoded watermark, is used for rejection of outliers, and to implement an algorithm against statistical attacks. The idea is to embed randomly chosen marks among a finite set of marks, into subsequences of videos which are long enough to resist averaging attacks, but short enough to avoid collusion attacks. The Bayesian criterion is needed to select the correct mark at the decoding step. Finally, the paper presents experimental results showing the robustness of the proposed method.

  10. Link-layer Jamming Attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    2004-01-01

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  11. Link-layer jamming attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  12. A Smart Trust Management Method to Detect On-Off Attacks in the Internet of Things

    Directory of Open Access Journals (Sweden)

    Jean Caminha

    2018-01-01

    Full Text Available Internet of Things (IoT resources cooperate with themselves for requesting and providing services. In heterogeneous and complex environments, those resources must trust each other. On-Off attacks threaten the IoT trust security through nodes performing good and bad behaviors randomly, to avoid being rated as a menace. Some countermeasures demand prior levels of trust knowledge and time to classify a node behavior. In some cases, a malfunctioning node can be mismatched as an attacker. In this paper, we introduce a smart trust management method, based on machine learning and an elastic slide window technique that automatically assesses the IoT resource trust, evaluating service provider attributes. In simulated and real-world data, this method was able to identify On-Off attackers and fault nodes with a precision up to 96% and low time consumption.

  13. A computer network attack taxonomy and ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-01-01

    Full Text Available of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example, after the launch of a DDOS (Distributed Denial of Service) attack, zombie computers may still connect to the target...-scrap- value-of-a-hacked-pc-revisited/ . Lancor, L., & Workman, R. (2007). Using Google Hacking to Enhance Defense Strategies. ACM SIGCSE Bulletin, 39 (1), 491-495. Lau, F., Rubin, S. H., Smith, M. H., & Trajkovic, L. (2000). Distributed Denial of Service...

  14. Modeling two-phase flow in three-dimensional complex flow-fields of proton exchange membrane fuel cells

    Science.gov (United States)

    Kim, Jinyong; Luo, Gang; Wang, Chao-Yang

    2017-10-01

    3D fine-mesh flow-fields recently developed by Toyota Mirai improved water management and mass transport in proton exchange membrane (PEM) fuel cell stacks, suggesting their potential value for robust and high-power PEM fuel cell stack performance. In such complex flow-fields, Forchheimer's inertial effect is dominant at high current density. In this work, a two-phase flow model of 3D complex flow-fields of PEMFCs is developed by accounting for Forchheimer's inertial effect, for the first time, to elucidate the underlying mechanism of liquid water behavior and mass transport inside 3D complex flow-fields and their adjacent gas diffusion layers (GDL). It is found that Forchheimer's inertial effect enhances liquid water removal from flow-fields and adds additional flow resistance around baffles, which improves interfacial liquid water and mass transport. As a result, substantial improvements in high current density cell performance and operational stability are expected in PEMFCs with 3D complex flow-fields, compared to PEMFCs with conventional flow-fields. Higher current density operation required to further reduce PEMFC stack cost per kW in the future will necessitate optimizing complex flow-field designs using the present model, in order to efficiently remove a large amount of product water and hence minimize the mass transport voltage loss.

  15. Unified communications forensics anatomy of common UC attacks

    CERN Document Server

    Grant, Nicholas Mr

    2013-01-01

    Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: analysis of forensic artifacts in common UC attacks an in-depth look at established UC technologies and attack exploits hands-on understanding of UC attack vectors and associated countermeasures

  16. A data fusion approach to indications and warnings of terrorist attacks

    Science.gov (United States)

    McDaniel, David; Schaefer, Gregory

    2014-05-01

    Indications and Warning (I&W) of terrorist attacks, particularly IED attacks, require detection of networks of agents and patterns of behavior. Social Network Analysis tries to detect a network; activity analysis tries to detect anomalous activities. This work builds on both to detect elements of an activity model of terrorist attack activity - the agents, resources, networks, and behaviors. The activity model is expressed as RDF triples statements where the tuple positions are elements or subsets of a formal ontology for activity models. The advantage of a model is that elements are interdependent and evidence for or against one will influence others so that there is a multiplier effect. The advantage of the formality is that detection could occur hierarchically, that is, at different levels of abstraction. The model matching is expressed as a likelihood ratio between input text and the model triples. The likelihood ratio is designed to be analogous to track correlation likelihood ratios common in JDL fusion level 1. This required development of a semantic distance metric for positive and null hypotheses as well as for complex objects. The metric uses the Web 1Terabype database of one to five gram frequencies for priors. This size requires the use of big data technologies so a Hadoop cluster is used in conjunction with OpenNLP natural language and Mahout clustering software. Distributed data fusion Map Reduce jobs distribute parts of the data fusion problem to the Hadoop nodes. For the purposes of this initial testing, open source models and text inputs of similar complexity to terrorist events were used as surrogates for the intended counter-terrorist application.

  17. Airfuge centrifugation procedure for the measurement of ligand binding to membrane-associated and detergent-solubilized plasma membrane receptors

    Energy Technology Data Exchange (ETDEWEB)

    Li, E L.F.; Perdue, J F [Lady Davis Institute, Sir Mortimer B. Davis Jewish General Hospital, Montreal, Quebec, Canada

    1980-10-01

    A method is described in which high-speed centrifugation of membranes through an oil phase is used to separate membrane-bound and detergent-solubilized polypeptide receptor-iodinated ligand complexes from unbound ligands. Three centrifuges, the Brinkmann Eppendorf (5412), the Beckman Microfuge B and the Beckman Airfuge were evaluated for this capability. Under the conditions described, the Beckman Airfuge surpassed the others in recovering previously /sup 125/I- and /sup 32/P-labelled cell membranes. The Airfuge method was compared with the more classically employed membrane filtration method to measure specific (/sup 125/I)insulin and (/sup 125/I)thrombin binding to human placental membranes and an enriched plasma membrane fraction from mouse embryo fibroblasts, respectively, and found to be 4 to 5 times more sensitive. For example, specific binding of ligand to its receptor was demonstrated with 5 ..mu..g of protein. With slight modifications, the polyethyleneglycol 6000 method of precipitating /sup 125/I-labelled ligand-soluble receptor complexes can be adapted to the Airfuge sedimentation through oil procedure.

  18. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  19. Alloys influence in ferritic steels with hydrogen attack

    International Nuclear Information System (INIS)

    Moro, L; Rey Saravia, D; Lombardich, J; Saggio, M; Juan, A; Blanco, J

    2003-01-01

    Materials exposed to a corrosive environment and high temperatures, are associated with a decrease of their mechanical properties and embitterment.At room temperatures atomic hydrogen diffuses easily through metals structure, it accumulates in lattice defects forming molecular hydrogen and generating cracking due to internal stresses.Under high temperatures the phenomenon is more complex.The steels in these conditions present different structures of precipitates, that the change under creep conditions period.In this work it is determined the influence of Cr and V alloys, the changes of ferritic steel resistance in a corrosive environment and high temperatures.1.25 Cr 1 Mo 0.25 V and 2.25Cr 1 Mo under different loads and temperatures previously attacked by hydrogen environment.The hydrogen is induced by the electrolytic technique, optimizing the choice of temperatures, current density, electrolyte, etc. In order to control an adequate cathode charge, a follow up procedure is carried out by electronic barrier microscopy.After the attack, the material is settled at room temperatures for certain period of time, to allow the hydrogen to leave and evaluate the residual damage.Creep by torsion assays, under constant load and temperature is used as an experimental technique.With the outcome data curves are drawn in order to study the secondary creep rate, with the applied load and temperature, determining the value of stress exponent n and the activation energy Q.Comparing to equal assays to the same ferritic steels but non attacked by hydrogen, these values allows the prediction of microstructure changes present during these tests

  20. Real-life applications with membrane computing

    CERN Document Server

    Zhang, Gexiang; Gheorghe, Marian

    2017-01-01

    This book thoroughly investigates the underlying theoretical basis of membrane computing models, and reveals their latest applications. In addition, to date there have been no illustrative case studies or complex real-life applications that capitalize on the full potential of the sophisticated membrane systems computational apparatus; gaps that this book remedies. By studying various complex applications – including engineering optimization, power systems fault diagnosis, mobile robot controller design, and complex biological systems involving data modeling and process interactions – the book also extends the capabilities of membrane systems models with features such as formal verification techniques, evolutionary approaches, and fuzzy reasoning methods. As such, the book offers a comprehensive and up-to-date guide for all researchers, PhDs and undergraduate students in the fields of computer science, engineering and the bio-sciences who are interested in the applications of natural computing models.

  1. Influence of thylakoid membrane lipids on the structure of aggregated light-harvesting complexes of the diatom Thalassiosira pseudonana and the green alga Mantoniella squamata.

    Science.gov (United States)

    Schaller-Laudel, Susann; Latowski, Dariusz; Jemioła-Rzemińska, Małgorzata; Strzałka, Kazimierz; Daum, Sebastian; Bacia, Kirsten; Wilhelm, Christian; Goss, Reimund

    2017-07-01

    The study investigated the effect of the thylakoid membrane lipids monogalactosyldiacylglycerol (MGDG), digalactosyldiacylglycerol (DGDG), sulphoquinovosyldiacylglycerol (SQDG) and phosphatidylglycerol (PG) on the structure of two algal light-harvesting complexes (LHCs). In contrast to higher plants whose thylakoid membranes are characterized by an enrichment of the neutral galactolipids MGDG and DGDG, both the green alga Mantoniella squamata and the centric diatom Thalassiosira pseudonana contain membranes with a high content of the negatively charged lipids SQDG and PG. The algal thylakoids do not show the typical grana-stroma differentiation of higher plants but a regular arrangement. To analyze the effect of the membrane lipids, the fucoxanthin chlorophyll protein (FCP) complex of T. pseudonana and the LHC of M. squamata (MLHC) were prepared by successive cation precipitation using Triton X-100 as detergent. With this method, it is possible to isolate LHCs with a reduced amount of associated lipids in an aggregated state. The results from 77 K fluorescence and photon correlation spectroscopy show that neither the neutral galactolipids nor the negatively charged lipids are able to significantly alter the aggregation state of the FCP or the MLHC. This is in contrast to higher plants where SQDG and PG lead to a strong disaggregation of the LHCII whereas MGDG and DGDG induce the formation of large macroaggregates. The results indicate that LHCs which are integrated into thylakoid membranes with a high amount of negatively charged lipids and a regular arrangement are less sensitive to lipid-induced structural alterations than their counterparts in membranes enriched in neutral lipids with a grana-stroma differentiation. © 2017 Scandinavian Plant Physiology Society.

  2. Classifying network attack scenarios using an ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-03-01

    Full Text Available ) or to the target?s reputation. The Residue sub-phase refers to damage or artefacts of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example after the launch of a DDOS..., A. (1995). Hacking theft of $10 million from citibank revealed. Retrieved 10/10, 2011, from http://articles.latimes.com/1995-08-19/business/fi-36656_1_citibank-system Hurley, E. (2004). SCO site succumbs to DDoS attack. Retrieved 10/10, 2011, from...

  3. Overexpression of the PAP1 transcription factor reveals a complex regulation of flavonoid and phenylpropanoid metabolism in Nicotiana tabacum plants attacked by Spodoptera litura.

    Science.gov (United States)

    Mitsunami, Tomoko; Nishihara, Masahiro; Galis, Ivan; Alamgir, Kabir Md; Hojo, Yuko; Fujita, Kohei; Sasaki, Nobuhiro; Nemoto, Keichiro; Sawasaki, Tatsuya; Arimura, Gen-ichiro

    2014-01-01

    Anthocyanin pigments and associated flavonoids have demonstrated antioxidant properties and benefits for human health. Consequently, current plant bioengineers have focused on how to modify flavonoid metabolism in plants. Most of that research, however, does not consider the role of natural biotic stresses (e.g., herbivore attack). To understand the influence of herbivore attack on the metabolic engineering of flavonoids, we examined tobacco plants overexpressing the Arabidopsis PAP1 gene (encoding an MYB transcription factor), which accumulated anthocyanin pigments and other flavonoids/phenylpropanoids. In comparison to wild-type and control plants, transgenic plants exhibited greater resistance to Spodoptera litura. Moreover, herbivory suppressed the PAP1-induced increase of transcripts of flavonoid/phenylpropanoid biosynthetic genes (e.g., F3H) and the subsequent accumulation of these genes' metabolites, despite the unaltered PAP1 mRNA levels after herbivory. The instances of down-regulation were independent of the signaling pathways mediated by defense-related jasmonates but were relevant to the levels of PAP1-induced and herbivory-suppressed transcription factors, An1a and An1b. Although initially F3H transcripts were suppressed by herbivory, after the S. litura feeding was interrupted, F3H transcripts increased. We hypothesize that in transgenic plants responding to herbivory, there is a complex mechanism regulating enriched flavonoid/phenylpropanoid compounds, via biotic stress signals.

  4. Overexpression of the PAP1 transcription factor reveals a complex regulation of flavonoid and phenylpropanoid metabolism in Nicotiana tabacum plants attacked by Spodoptera litura.

    Directory of Open Access Journals (Sweden)

    Tomoko Mitsunami

    Full Text Available Anthocyanin pigments and associated flavonoids have demonstrated antioxidant properties and benefits for human health. Consequently, current plant bioengineers have focused on how to modify flavonoid metabolism in plants. Most of that research, however, does not consider the role of natural biotic stresses (e.g., herbivore attack. To understand the influence of herbivore attack on the metabolic engineering of flavonoids, we examined tobacco plants overexpressing the Arabidopsis PAP1 gene (encoding an MYB transcription factor, which accumulated anthocyanin pigments and other flavonoids/phenylpropanoids. In comparison to wild-type and control plants, transgenic plants exhibited greater resistance to Spodoptera litura. Moreover, herbivory suppressed the PAP1-induced increase of transcripts of flavonoid/phenylpropanoid biosynthetic genes (e.g., F3H and the subsequent accumulation of these genes' metabolites, despite the unaltered PAP1 mRNA levels after herbivory. The instances of down-regulation were independent of the signaling pathways mediated by defense-related jasmonates but were relevant to the levels of PAP1-induced and herbivory-suppressed transcription factors, An1a and An1b. Although initially F3H transcripts were suppressed by herbivory, after the S. litura feeding was interrupted, F3H transcripts increased. We hypothesize that in transgenic plants responding to herbivory, there is a complex mechanism regulating enriched flavonoid/phenylpropanoid compounds, via biotic stress signals.

  5. Overexpression of the PAP1 Transcription Factor Reveals a Complex Regulation of Flavonoid and Phenylpropanoid Metabolism in Nicotiana tabacum Plants Attacked by Spodoptera litura

    Science.gov (United States)

    Mitsunami, Tomoko; Nishihara, Masahiro; Galis, Ivan; Alamgir, Kabir Md; Hojo, Yuko; Fujita, Kohei; Sasaki, Nobuhiro; Nemoto, Keichiro; Sawasaki, Tatsuya; Arimura, Gen-ichiro

    2014-01-01

    Anthocyanin pigments and associated flavonoids have demonstrated antioxidant properties and benefits for human health. Consequently, current plant bioengineers have focused on how to modify flavonoid metabolism in plants. Most of that research, however, does not consider the role of natural biotic stresses (e.g., herbivore attack). To understand the influence of herbivore attack on the metabolic engineering of flavonoids, we examined tobacco plants overexpressing the Arabidopsis PAP1 gene (encoding an MYB transcription factor), which accumulated anthocyanin pigments and other flavonoids/phenylpropanoids. In comparison to wild-type and control plants, transgenic plants exhibited greater resistance to Spodoptera litura. Moreover, herbivory suppressed the PAP1-induced increase of transcripts of flavonoid/phenylpropanoid biosynthetic genes (e.g., F3H) and the subsequent accumulation of these genes' metabolites, despite the unaltered PAP1 mRNA levels after herbivory. The instances of down-regulation were independent of the signaling pathways mediated by defense-related jasmonates but were relevant to the levels of PAP1-induced and herbivory-suppressed transcription factors, An1a and An1b. Although initially F3H transcripts were suppressed by herbivory, after the S. litura feeding was interrupted, F3H transcripts increased. We hypothesize that in transgenic plants responding to herbivory, there is a complex mechanism regulating enriched flavonoid/phenylpropanoid compounds, via biotic stress signals. PMID:25268129

  6. Protein receptor-independent plasma membrane remodeling by HAMLET: a tumoricidal protein-lipid complex.

    Science.gov (United States)

    Nadeem, Aftab; Sanborn, Jeremy; Gettel, Douglas L; James, Ho C S; Rydström, Anna; Ngassam, Viviane N; Klausen, Thomas Kjær; Pedersen, Stine Falsig; Lam, Matti; Parikh, Atul N; Svanborg, Catharina

    2015-11-12

    A central tenet of signal transduction in eukaryotic cells is that extra-cellular ligands activate specific cell surface receptors, which orchestrate downstream responses. This ''protein-centric" view is increasingly challenged by evidence for the involvement of specialized membrane domains in signal transduction. Here, we propose that membrane perturbation may serve as an alternative mechanism to activate a conserved cell-death program in cancer cells. This view emerges from the extraordinary manner in which HAMLET (Human Alpha-lactalbumin Made LEthal to Tumor cells) kills a wide range of tumor cells in vitro and demonstrates therapeutic efficacy and selectivity in cancer models and clinical studies. We identify a ''receptor independent" transformation of vesicular motifs in model membranes, which is paralleled by gross remodeling of tumor cell membranes. Furthermore, we find that HAMLET accumulates within these de novo membrane conformations and define membrane blebs as cellular compartments for direct interactions of HAMLET with essential target proteins such as the Ras family of GTPases. Finally, we demonstrate lower sensitivity of healthy cell membranes to HAMLET challenge. These features suggest that HAMLET-induced curvature-dependent membrane conformations serve as surrogate receptors for initiating signal transduction cascades, ultimately leading to cell death.

  7. Anti-discrimination Analysis Using Privacy Attack Strategies

    KAUST Repository

    Ruggieri, Salvatore

    2014-09-15

    Social discrimination discovery from data is an important task to identify illegal and unethical discriminatory patterns towards protected-by-law groups, e.g., ethnic minorities. We deploy privacy attack strategies as tools for discrimination discovery under hard assumptions which have rarely tackled in the literature: indirect discrimination discovery, privacy-aware discrimination discovery, and discrimination data recovery. The intuition comes from the intriguing parallel between the role of the anti-discrimination authority in the three scenarios above and the role of an attacker in private data publishing. We design strategies and algorithms inspired/based on Frèchet bounds attacks, attribute inference attacks, and minimality attacks to the purpose of unveiling hidden discriminatory practices. Experimental results show that they can be effective tools in the hands of anti-discrimination authorities.

  8. Improvements in the susceptibility to hydrogen attack and stress-relief cracking of 2 1/4Cr-1Mo steels

    International Nuclear Information System (INIS)

    Imanaka, T.; Sato, S.; Shimomura, J.; Aso, K.

    1985-01-01

    The influence of sulphur content at extremely low level on the susceptibility to hydrogen attack and stress-relief cracking in 2 1/4Cr-1Mo steels was studied. The reduction of sulphur content and/or the addition of REM (rare earth metal) or Ca in accordance with sulphur content remarkably improve the resistivity against hydrogen attack and stress-relief cracking. Micro-structural examination has showed that there exist Mn-REM-S-Al-O complex particles in the REM-added steels. It is concluded that the effect of REM on hydrogen attack and stress-relief cracking is to reduce ''the free sulphur'' in 2 1/4Cr-1Mo steels

  9. Lipopolysaccharide Membranes and Membrane Proteins of Pseudomonas aeruginosa Studied by Computer Simulation

    Energy Technology Data Exchange (ETDEWEB)

    Straatsma, TP

    2006-12-01

    Pseudomonas aeruginosa is a ubiquitous environmental Gram-negative bacterium with high metabolic versatility and an exceptional ability to adapt to a wide range of ecological environments, including soil, marches, coastal habitats, plant and animal tissues. Gram-negative microbes are characterized by the asymmetric lipopolysaccharide outer membrane, the study of which is important for a number of applications. The adhesion to mineral surfaces plays a central role in characterizing their contribution to the fate of contaminants in complex environmental systems by effecting microbial transport through soils, respiration redox chemistry, and ion mobility. Another important application stems from the fact that it is also a major opportunistic human pathogen that can result in life-threatening infections in many immunocompromised patients, such as lung infections in children with cystic fibrosis, bacteraemia in burn victims, urinary-tract infections in catheterized patients, hospital-acquired pneumonia in patients on respirators, infections in cancer patients receiving chemotherapy, and keratitis and corneal ulcers in users of extended-wear soft contact lenses. The inherent resistance against antibiotics which has been linked with the specific interactions in the outer membrane of P. aeruginosa makes these infections difficult to treat. Developments in simulation methodologies as well as computer hardware have enabled the molecular simulation of biological systems of increasing size and with increasing accuracy, providing detail that is difficult or impossible to obtain experimentally. Computer simulation studies contribute to our understanding of the behavior of proteins, protein-protein and protein-DNA complexes. In recent years, a number of research groups have made significant progress in applying these methods to the study of biological membranes. However, these applications have been focused exclusively on lipid bilayer membranes and on membrane proteins in lipid

  10. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  11. Sensitive determination of trace mercury by UV-visible diffuse reflectance spectroscopy after complexation and membrane filtration-enrichment.

    Science.gov (United States)

    Yin, Changhai; Iqbal, Jibran; Hu, Huilian; Liu, Bingxiang; Zhang, Lei; Zhu, Bilin; Du, Yiping

    2012-09-30

    A simple, sensitive and selective solid phase reflectometry method is proposed for the determination of trace mercury in aqueous samples. The complexation reagent dithizone was firstly injected into the properly buffered solution with vigorous stirring, which started a simultaneous formation of nanoparticles suspension of dithizone and its complexation reaction with the mercury(II) ions to make Hg-dithizone nanoparticles. After a definite time, the mixture was filtered with membrane, and then quantified directly on the surface of the membrane by using integrating sphere accessory of the UV-visible spectrophotometer. The quantitative analysis was carried out at a wavelength of 485 nm since it yielded the largest difference in diffuse reflectance spectra before and after reaction with mercury(II).A good linear correlation in the range of 0.2-4.0 μg/L with a squared correlation coefficient (R(2)) of 0.9944 and a detection limit of 0.12 μg/L were obtained. The accuracy of the method was evaluated by the analysis of spiked mercury(II) concentrations determined using this method along with those determined by the atomic fluorescence mercury vapourmeter and the results obtained were in good agreement. The proposed method was applied to the determination of mercury in tap water and river water samples with the recovery in an acceptable range (95.7-105.3%). Copyright © 2012 Elsevier B.V. All rights reserved.

  12. Using agility to combat cyber attacks.

    Science.gov (United States)

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  13. Polymer and Membrane Design for Low Temperature Catalytic Reactions

    KAUST Repository

    Villalobos, Luis Francisco

    2016-02-29

    Catalytically active asymmetric membranes have been developed with high loadings of palladium nanoparticles located solely in the membrane\\'s ultrathin skin layer. The manufacturing of these membranes requires polymers with functional groups, which can form insoluble complexes with palladium ions. Three polymers have been synthesized for this purpose and a complexation/nonsolvent induced phase separation followed by a palladium reduction step is carried out to prepare such membranes. Parameters to optimize the skin layer thickness and porosity, the palladium loading in this layer, and the palladium nanoparticles size are determined. The catalytic activity of the membranes is verified with the reduction of a nitro-compound and with a liquid phase Suzuki-Miyaura coupling reaction. Very low reaction times are observed. © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  14. Performance enhancement of membrane electrode assemblies with plasma etched polymer electrolyte membrane in PEM fuel cell

    Energy Technology Data Exchange (ETDEWEB)

    Cho, Yong-Hun; Yoon, Won-Sub [School of Advanced Materials Engineering, Kookmin University, 861-1 Jeongneung-dong, Seongbuk-gu, Seoul 136-702 (Korea); Bae, Jin Woo; Cho, Yoon-Hwan; Lim, Ju Wan; Ahn, Minjeh; Jho, Jae Young; Sung, Yung-Eun [World Class University (WCU) program of Chemical Convergence for Energy and Environment (C2E2), School of Chemical and Biological Engineering, College of Engineering, Seoul National University (SNU), 599 Gwanak-Ro, Gwanak-gu, Seoul 151-744 (Korea); Kwon, Nak-Hyun [Fuel Cell Vehicle Team 3, Advanced Technology Center, Corporate Research and Development Division, Hyundai-Kia Motors, 104 Mabuk-dong, Giheung-gu, Yongin-si, Gyeonggi-do 446-912 (Korea)

    2010-10-15

    In this work, a surface modified Nafion 212 membrane was fabricated by plasma etching in order to enhance the performance of a membrane electrode assembly (MEA) in a polymer electrolyte membrane fuel cell. Single-cell performance of MEA at 0.7 V was increased by about 19% with membrane that was etched for 10 min compared to that with untreated Nafion 212 membrane. The MEA with membrane etched for 20 min exhibited a current density of 1700 mA cm{sup -2} at 0.35 V, which was 8% higher than that of MEA with untreated membrane (1580 mA cm{sup -2}). The performances of MEAs containing etched membranes were affected by complex factors such as the thickness and surface morphology of the membrane related to etching time. The structural changes and electrochemical properties of the MEAs with etched membranes were characterized by field emission scanning electron microscopy, Fourier transform-infrared spectrometry, electrochemical impedance spectroscopy, and cyclic voltammetry. (author)

  15. Women's Heart Disease: Heart Attack Symptoms

    Science.gov (United States)

    ... of this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter ... most common heart attack symptom in men and women is chest pain or discomfort. However, women also ...

  16. A novel proposed network security management approach for cyber attacks

    International Nuclear Information System (INIS)

    Ahmed, Z.; Nazir, B.; Zafar, M.F.; Anwar, M.M.; Azam, K.; Asar, A.U.

    2007-01-01

    Network security is a discipline that focuses on securing networks from unauthorized access. Given the Escalating threats of malicious cyber attacks, modern enterprises employ multiple lines of defense. A comprehensive defense strategy against such attacks should include (I) an attack detection component that deter- mines the fact that a program is compromised, (2) an attack identification and prevention component that identifies attack packets so that one can block such packets in the future and prevents the attack from further propagation. Over the last decade, a significant amount of research has been vested in the systems that can detect cyber attacks either statically at compile time or dynamically at run time, However, not much effort is spent on automated attack packet identification or attack prevention. In this paper we present a unified solution to the problems mentioned above. We implemented this solution after the forward engineering of Open Source Security Information Management (OSSIM) system called Preventive Information Security management (PrISM) system that correlates input from different sensors so that the resulting product can automatically detect any cyber attack against it and prevents by identifying the actual attack packet(s). The PrISM was always able to detect the attacks, identify the attack packets and most often prevent by blocking the attacker's IP address to continue normal execution. There is no additional run-time performance overhead for attack prevention. (author)

  17. Specific interaction of postsynaptic densities with membrane rafts isolated from synaptic plasma membranes.

    Science.gov (United States)

    Liu, Qian; Yao, Wei-Dong; Suzuki, Tatsuo

    2013-06-01

    Postsynaptic membrane rafts are believed to play important roles in synaptic signaling, plasticity, and maintenance. We recently demonstrated the presence, at the electron microscopic level, of complexes consisting of membrane rafts and postsynaptic densities (PSDs) in detergent-resistant membranes (DRMs) prepared from synaptic plasma membranes (SPMs) ( Suzuki et al., 2011 , J Neurochem, 119, 64-77). To further explore these complexes, here we investigated the nature of the binding between purified SPM-DRMs and PSDs in vitro. In binding experiments, we used SPM-DRMs prepared after treating SPMs with n-octyl-β-d-glucoside, because at concentrations of 1.0% or higher it completely separates SPM-DRMs and PSDs, providing substantially PSD-free unique SPM-DRMs as well as DRM-free PSDs. PSD binding to PSD-free DRMs was identified by mass spectrometry, Western blotting, and electron microscopy. PSD proteins were not incorporated into SPMs, and significantly less PSD proteins were incorporated into DRMs prepared from liver membranes, providing in vitro evidence that binding of PSDs to DRMs is specific and suggestion of the presence of specific interacting molecules. These specific interactions may have important roles in synaptic development, function, and plasticity in vivo. In addition, the binding system we developed may be a good tool to search for binding molecules and binding mechanisms between PSDs and rafts.

  18. Dietary Tocotrienol/γ-Cyclodextrin Complex Increases Mitochondrial Membrane Potential and ATP Concentrations in the Brains of Aged Mice

    Directory of Open Access Journals (Sweden)

    Anke Schloesser

    2015-01-01

    Full Text Available Brain aging is accompanied by a decrease in mitochondrial function. In vitro studies suggest that tocotrienols, including γ- and δ-tocotrienol (T3, may exhibit neuroprotective properties. However, little is known about the effect of dietary T3 on mitochondrial function in vivo. In this study, we monitored the effect of a dietary T3/γ-cyclodextrin complex (T3CD on mitochondrial membrane potential and ATP levels in the brain of 21-month-old mice. Mice were fed either a control diet or a diet enriched with T3CD providing 100 mg T3 per kg diet for 6 months. Dietary T3CD significantly increased mitochondrial membrane potential and ATP levels compared to those of controls. The increase in MMP and ATP due to dietary T3CD was accompanied by an increase in the protein levels of the mitochondrial transcription factor A (TFAM. Furthermore, dietary T3CD slightly increased the mRNA levels of superoxide dismutase, γ-glutamyl cysteinyl synthetase, and heme oxygenase 1 in the brain. Overall, the present data suggest that T3CD increases TFAM, mitochondrial membrane potential, and ATP synthesis in the brains of aged mice.

  19. Adaptive optimisation-offline cyber attack on remote state estimator

    Science.gov (United States)

    Huang, Xin; Dong, Jiuxiang

    2017-10-01

    Security issues of cyber-physical systems have received increasing attentions in recent years. In this paper, deception attacks on the remote state estimator equipped with the chi-squared failure detector are considered, and it is assumed that the attacker can monitor and modify all the sensor data. A novel adaptive optimisation-offline cyber attack strategy is proposed, where using the current and previous sensor data, the attack can yield the largest estimation error covariance while ensuring to be undetected by the chi-squared monitor. From the attacker's perspective, the attack is better than the existing linear deception attacks to degrade the system performance. Finally, some numerical examples are provided to demonstrate theoretical results.

  20. Liquid Membranes as a Tool for Chemical Speciation of Metals in Natural Waters: Organic and Inorganic Complexes of Nickel

    Directory of Open Access Journals (Sweden)

    Cristina Vergel

    2018-04-01

    Full Text Available The different species of nickel present in natural waters exhibit different transport behaviour through bulk liquid membranes (BLMs. This fact has been used to design and optimise a separation/pre-concentration system applicable to separate labile and non-labile nickel fractions. A hydrazone derivative—1,2-cyclohexanedione bis-benzoyl-hydrazone (1,2-CHBBH dissolved in toluene/dimethyl formamide (2% DMF—was used as a chemical carrier of nickel species, from an aqueous source solution (sample to a receiving acidic solution. Both chemical and hydrodynamic conditions controlling the transport system were studied and optimised. Under optimum conditions, variations in the transport of nickel ions as a function of organic (humic acids and inorganic (chloride ions ligands were studied. Relationships between the permeability coefficient (P or recovery efficiency (%R and the concentrations of ligands and nickel species were analysed using Winhumic V software. A negative correlation between P and the concentration of organic nickel complexes was found, suggesting that only labile nickel species are transported through the liquid membrane, with non-labile complexes remaining in the water sample; allowing for their separation and subsequent quantification in natural waters.

  1. Liquid Membranes as a Tool for Chemical Speciation of Metals in Natural Waters: Organic and Inorganic Complexes of Nickel.

    Science.gov (United States)

    Vergel, Cristina; Mendiguchía, Carolina; Moreno, Carlos

    2018-04-15

    The different species of nickel present in natural waters exhibit different transport behaviour through bulk liquid membranes (BLMs). This fact has been used to design and optimise a separation/pre-concentration system applicable to separate labile and non-labile nickel fractions. A hydrazone derivative-1,2-cyclohexanedione bis-benzoyl-hydrazone (1,2-CHBBH) dissolved in toluene/dimethyl formamide (2% DMF)-was used as a chemical carrier of nickel species, from an aqueous source solution (sample) to a receiving acidic solution. Both chemical and hydrodynamic conditions controlling the transport system were studied and optimised. Under optimum conditions, variations in the transport of nickel ions as a function of organic (humic acids) and inorganic (chloride ions) ligands were studied. Relationships between the permeability coefficient ( P ) or recovery efficiency (%R) and the concentrations of ligands and nickel species were analysed using Winhumic V software. A negative correlation between P and the concentration of organic nickel complexes was found, suggesting that only labile nickel species are transported through the liquid membrane, with non-labile complexes remaining in the water sample; allowing for their separation and subsequent quantification in natural waters.

  2. Cyber-physical attacks a growing invisible threat

    CERN Document Server

    Loukas, George

    2015-01-01

    Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building's lights, make a car veer off the road,  or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism. The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means. Perpetrators can now cause damage without the same risk, and without the political, social, or moral

  3. MACHINE LEARNING IMPLEMENTATION FOR THE CLASSIFICATION OF ATTACKS ON WEB SYSTEMS. PART 1

    Directory of Open Access Journals (Sweden)

    K. Smirnova

    2017-08-01

    Full Text Available The possibility of applying machine learning is considered for the classification of malicious requests to a Web application. This approach excludes the use of deterministic analysis systems (for example, expert systems, and based on the application of a cascade of neural networks or perceptrons on an approximate model to the real human brain. The main idea of the work is to enable to describe complex attack vectors consisting of feature sets, abstract terms for compiling a training sample, controlling the quality of recognition and classifying each of the layers (networks participating in the work, with the ability to adjust not the entire network, But only a small part of it, in the training of which a mistake or inaccuracy crept in.  The design of the developed network can be described as a cascaded, scalable neural network.  The developed system of intrusion detection uses a three-layer neural network. Layers can be built independently of each other by cascades. In the first layer, for each class of attack recognition, there is a corresponding network and correctness is checked on this network. To learn this layer, we have chosen classes of things that can be classified uniquely as yes or no, that is, they are linearly separable. Thus, a layer is obtained not just of neurons, but of their microsets, which can best determine whether is there some data class in the query or not. The following layers are not trained to recognize the attacks themselves, they are trained that a set of attacks creates certain threats. This allows you to more accurately recognize the attacker's attempts to bypass the defense system, as well as classify the target of the attack, and not just its fact. Simple layering allows you to minimize the percentage of false positives.

  4. A mechanism of acquired resistance to complement-mediated lysis by Entamoeba histolytica.

    Science.gov (United States)

    Gutiérrez-Kobeh, L; Cabrera, N; Pérez-Montfort, R

    1997-04-01

    Some Entamoeba histolytica strains resist complement-mediated lysis by serum. Susceptible and resistant strains activate the complement system equivalently, but resistant amebas evade killing by membrane attack complexes. Our objective was to determine the mechanism by which trophozoites of E. histolytica resist lysis by human serum. Amebas were made resistant to lysis by incubation with increasing concentrations of normal human serum. The possibility that resistant cells ingest membrane attack complexes was explored by subcellular fractionation of susceptible and resistant trophozoites treated with sublytic concentrations of human serum containing radiolabeled C9. In both cases, most of the label was in the fractions containing plasma membrane. The susceptible strain consistently showed more label associated with these fractions than the resistant strain. Thus, the possibility that the membrane attack complexes were released to the medium was explored. Both resistant and susceptible trophozoites release to the medium similar amounts of material excluded by Sepharose CL-2B in the presence or absence of normal human serum. Labeled C9 elutes together with the main bulk of proteins from the medium: this indicates that it is not in vesicles or high molecular weight aggregates. Coincubation of susceptible amebas with lysates of resistant trophozoites confers resistance to susceptible cells within 30 min. Resistance to lysis by serum can also be acquired by susceptible amebas after coincubation with lysates from human erythrocytes or after feeding them with whole human red blood cells. Resistant but not susceptible trophozoites show intense immunofluorescent staining on their surface with anti-human erythrocytic membrane antibody. These results suggest that amebas acquire resistance to lysis by serum by incorporating into their membranes complement regulatory proteins.

  5. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  6. Synergistic enhancement of chemokine generation and lung injury by C5a or the membrane attack complex of complement

    DEFF Research Database (Denmark)

    Czermak, B J; Lentsch, A B; Bless, N M

    1999-01-01

    demonstrated synergistic production of C-X-C (macrophage inflammatory protein-2 and cytokine-induced neutrophil chemoattractant) and C-C (macrophage inflammatory protein-1alpha and monocyte chemoattractant-1) chemokines. In the absence of the costimulus, C5a or MAC did not induce chemokine generation....... In in vivo studies, C5a and MAC alone caused limited or no intrapulmonary generation of chemokines, but in the presence of a costimulus (IgG immune complexes) C5a and MAC caused synergistic intrapulmonary generation of C-X-C and C-C chemokines but not of tumor necrosis factor alpha. Under these conditions...... increased neutrophil accumulation occurred, as did lung injury. These observations suggest that C5a and MAC function synergistically with a costimulus to enhance chemokine generation and the intensity of the lung inflammatory response....

  7. A fatal elephant attack.

    Science.gov (United States)

    Hejna, Petr; Zátopková, Lenka; Safr, Miroslav

    2012-01-01

    A rare case of an elephant attack is presented. A 44-year-old man working as an elephant keeper was attacked by a cow elephant when he tripped over a foot chain while the animal was being medically treated. The man fell down and was consequently repeatedly attacked with elephant tusks. The man sustained multiple stab injuries to both groin regions, a penetrating injury to the abdominal wall with traumatic prolapse of the loops of the small bowel, multiple defects of the mesentery, and incomplete laceration of the abdominal aorta with massive bleeding into the abdominal cavity. In addition to the penetrating injuries, the man sustained multiple rib fractures with contusion of both lungs and laceration of the right lobe of the liver, and comminuted fractures of the pelvic arch and left femoral body. The man died shortly after he had been received at the hospital. The cause of death was attributed to traumatic shock. © 2011 American Academy of Forensic Sciences.

  8. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  9. Foveal and peripheral fields of vision influences perceptual skill in anticipating opponents' attacking position in volleyball.

    Science.gov (United States)

    Schorer, Jörg; Rienhoff, Rebecca; Fischer, Lennart; Baker, Joseph

    2013-09-01

    The importance of perceptual-cognitive expertise in sport has been repeatedly demonstrated. In this study we examined the role of different sources of visual information (i.e., foveal versus peripheral) in anticipating volleyball attack positions. Expert (n = 11), advanced (n = 13) and novice (n = 16) players completed an anticipation task that involved predicting the location of volleyball attacks. Video clips of volleyball attacks (n = 72) were spatially and temporally occluded to provide varying amounts of information to the participant. In addition, participants viewed the attacks under three visual conditions: full vision, foveal vision only, and peripheral vision only. Analysis of variance revealed significant between group differences in prediction accuracy with higher skilled players performing better than lower skilled players. Additionally, we found significant differences between temporal and spatial occlusion conditions. Both of those factors interacted separately, but not combined with expertise. Importantly, for experts the sum of both fields of vision was superior to either source in isolation. Our results suggest different sources of visual information work collectively to facilitate expert anticipation in time-constrained sports and reinforce the complexity of expert perception.

  10. Machine Learning Methods for Attack Detection in the Smart Grid.

    Science.gov (United States)

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.

  11. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. ...

  12. The TIC complex uncovered: The alternative view on the molecular mechanism of protein translocation across the inner envelope membrane of chloroplasts.

    Science.gov (United States)

    Nakai, Masato

    2015-09-01

    Chloroplasts must import thousands of nuclear-encoded preproteins synthesized in the cytosol through two successive protein translocons at the outer and inner envelope membranes, termed TOC and TIC, respectively, to fulfill their complex physiological roles. The molecular identity of the TIC translocon had long remained controversial; two proteins, namely Tic20 and Tic110, had been proposed to be central to protein translocation across the inner envelope membrane. Tic40 also had long been considered to be another central player in this process. However, recently, a novel 1-megadalton complex consisting of Tic20, Tic56, Tic100, and Tic214 was identified at the chloroplast inner membrane of Arabidopsis and was demonstrated to constitute a general TIC translocon which functions in concert with the well-characterized TOC translocon. On the other hand, direct interaction between this novel TIC transport system and Tic110 or Tic40 was hardly observed. Consequently, the molecular model for protein translocation across the inner envelope membrane of chloroplasts might need to be extensively revised. In this review article, I intend to propose such alternative view regarding the TIC transport system in contradistinction to the classical view. I also would emphasize importance of reevaluation of previous works in terms of with what methods these classical Tic proteins such as Tic110 or Tic40 were picked up as TIC constituents at the very beginning as well as what actual evidence there were to support their direct and specific involvement in chloroplast protein import. This article is part of a Special Issue entitled: Chloroplast Biogenesis. Copyright © 2014 Elsevier B.V. All rights reserved.

  13. Application distribution model and related security attacks in VANET

    Science.gov (United States)

    Nikaein, Navid; Kanti Datta, Soumya; Marecar, Irshad; Bonnet, Christian

    2013-03-01

    In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker`s model as an extension to the work done in [6]. Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e.g. malware, spamming and phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.

  14. Nonepileptic attack disorder among married women.

    Science.gov (United States)

    Dhanaraj, M; Rangaraj, R; Arulmozhi, T; Vengatesan, A

    2005-06-01

    To study the clinical features, precipitating stressful life events and prognosis of nonepileptic attack disorder (NEAD) among married women. Prospective cohort study with 1-year follow-up. A tertiary care teaching hospital. Of the 1020 patients with epilepsy referred to the epilepsy clinic during 2002-2003, 30 were married women with NEAD. The diagnostic criteria for NEAD included normal EEG during ictal and post-ictal phase of the generalized 'attack.' The data collected included clinical characteristics, semiology of the attacks, precipitating stressful events, and co-morbid psychiatric disorders. The control group included 30 age-matched married women with generalized tonic-clonic seizures. The long-term outcome and factors influencing the outcomes were analyzed. The mean duration of illness was 18 months, and the pattern of the attack was 'fall and lying still' in 53% and 'fall with generalized motor movements' in 47%. The frequency was one or more per week in 57% and occasionally in 43%. The important stressful events were matrimonial discord following illegal relationship of the husband with another woman (chi2 = 9.02, P = 0.003) and constant quarrel with other family members (chi2 = 5.19, P = 0.02). The prevalence of sexual abuse was low (7%). Co-morbid psychiatric disorder was observed in 70%. At the end of 1 year, 39% were free from the attack. Resolution of the stressful life events (chi2 = 4.52, P = 0.03) and lower frequency of attack at the time of reporting (chi2 = 3.88, P = 0.05) correlated with good outcomes. Among patients with NEAD in India, the major precipitating factors were matrimonial discord following illegal relationship of the husband with another woman and constant quarrel with other family members and not sexual abuse. Women with low frequency of attack at the time of reporting and the remission of the stressful events had better outcomes.

  15. Atomic force microscopy studies of native photosynthetic membranes.

    Science.gov (United States)

    Sturgis, James N; Tucker, Jaimey D; Olsen, John D; Hunter, C Neil; Niederman, Robert A

    2009-05-05

    In addition to providing the earliest surface images of a native photosynthetic membrane at submolecular resolution, examination of the intracytoplasmic membrane (ICM) of purple bacteria by atomic force microscopy (AFM) has revealed a wide diversity of species-dependent arrangements of closely packed light-harvesting (LH) antennae, capable of fulfilling the basic requirements for efficient collection, transmission, and trapping of radiant energy. A highly organized architecture was observed with fused preparations of the pseudocrystalline ICM of Blastochloris viridis, consiting of hexagonally packed monomeric reaction center light-harvesting 1 (RC-LH1) core complexes. Among strains which also form a peripheral LH2 antenna, images of ICM patches from Rhodobacter sphaeroides exhibited well-ordered, interconnected networks of dimeric RC-LH1 core complexes intercalated by rows of LH2, coexisting with LH2-only domains. Other peripheral antenna-containing species, notably Rhodospirillum photometricum and Rhodopseudomonas palustris, showed a less regular organization, with mixed regions of LH2 and RC-LH1 cores, intermingled with large, paracrystalline domains. The ATP synthase and cytochrome bc(1) complex were not observed in any of these topographs and are thought to be localized in the adjacent cytoplasmic membrane or in inaccessible ICM regions separated from the flat regions imaged by AFM. The AFM images have served as a basis for atomic-resolution modeling of the ICM vesicle surface, as well as forces driving segregation of photosynthetic complexes into distinct domains. Docking of atomic-resolution molecular structures into AFM topographs of Rsp. photometricum membranes generated precise in situ structural models of the core complex surrounded by LH2 rings and a region of tightly packed LH2 complexes. A similar approach has generated a model of the highly curved LH2-only membranes of Rba. sphaeroides which predicts that sufficient space exists between LH2 complexes

  16. Subclinical endophthalmitis following a rooster attack.

    Science.gov (United States)

    Lekse Kovach, Jaclyn; Maguluri, Srilakshmi; Recchia, Franco M

    2006-12-01

    Ocular injury resulting from rooster attacks is rarely reported in the literature. Sadly, the target of these attacks is most often children younger than 3 years old, whose naiveté of the aggressive, territorial behavior of birds can place them at risk. Acute sequelae of these attacks can result in a lifetime of visual impairment. The possibility of a subacute or occult infection is an unusual occurrence that must always be considered. In an effort to prevent future attacks and ocular casualties, we present a case of a 12-month-old boy who suffered an open globe following a rooster attack. The open globe was emergently repaired. One week later, a white cataract was noticed on examination in the absence of systemic or ocular signs of inflammation. Traumatic endophthalmitis and lenticular abscess were suspected during examination under anesthesia. Vitrectomy, lensectomy, and injection of intravitreal antibiotics were performed. Culture of lenticular and vitreous aspirates grew alpha-streptococcus. Alpha-streptococcal endophthalmitis can result from ocular injuries caused by rooster pecking. The infection may present insidiously and without typical ocular or systemic symptoms or signs. Management is challenging and may require surgery.

  17. Technique of experimental evaluation of cloud environment attacks detection accuracy

    Directory of Open Access Journals (Sweden)

    Sergey A. Klimachev

    2018-05-01

    Full Text Available The article is devoted to research of efficiency evaluation of IDS used for dynamic and complex organizational and technical structure computing platform guard. The components of the platform have a set of heterogeneous parameters. Analysis of existing IDS evaluation technique revealed shortcomings in justification of quantitative metrics that describe the efficiency and reliability IDS resolving. This makes if difficult to prove IDS evaluation technique. The purpose of the study is to increase IDS evaluation objectivity. To achive the purpose it is necessary to develop the correct technique, tools, experimental stand. The article proposes the results of development and approbation of the technique of IDS efficiency evaluation and software for it. The technique is based on defining of optimal set of attack detection accuracy scores. The technique and the software allow solving problems of comparative analysis of IDS that have similar functionality. As a result of the research, a number of task have been solved, including the selection of universal quantitative metrics for attack detection accuracy evaluation, the defining of summarised attack detection accuracy evaluation metric based on defining of pareto-optimal set of scores that ensure the confidentiality, integrity and accessibility of cloud environment information and information resources,  the development of a functional model,  a functional scheme and a software for cloud environment IDS research.

  18. Optimizing power system investments and resilience against attacks

    International Nuclear Information System (INIS)

    Fang, Yiping; Sansavini, Giovanni

    2017-01-01

    This paper studies the combination of capacity expansion and switch installation in electric systems that ensures optimum performance under nominal operations and attacks. The planner–attacker–defender model is adopted to develop decisions that minimize investment and operating costs, and functionality loss after attacks. The model bridges long-term system planning for transmission expansion and short-term switching operations in reaction to attacks. The mixed-integer optimization is solved by decomposition via two-layer cutting plane algorithm. Numerical results on an IEEE system shows that small investments in transmission line switching enhance resilience by responding to disruptions via system reconfiguration. Sensitivity analyses show that transmission planning under the assumption of small-scale attacks provides the most robust strategy, i.e. the minimum-regret planning, if many constraints and limited investment budget affect the planning. On the other hand, the assumption of large-scale attacks provides the most robust strategy if the planning process involves large flexibility and budget. - Highlights: • Investment optimization in power systems under attacks is presented. • Capacity expansion and switch installation for system reconfiguration are combined. • The problem is solved by decomposition via two-layer cutting plane algorithm. • Small investments in switch installation enhance resilience by response to attacks. • Sensitivity analyses identify robust planning against different attack scenarios.

  19. Assembly of the membrane domain of ATP synthase in human mitochondria.

    Science.gov (United States)

    He, Jiuya; Ford, Holly C; Carroll, Joe; Douglas, Corsten; Gonzales, Evvia; Ding, Shujing; Fearnley, Ian M; Walker, John E

    2018-03-20

    The ATP synthase in human mitochondria is a membrane-bound assembly of 29 proteins of 18 kinds. All but two membrane components are encoded in nuclear genes, synthesized on cytoplasmic ribosomes, and imported into the matrix of the organelle, where they are assembled into the complex with ATP6 and ATP8, the products of overlapping genes in mitochondrial DNA. Disruption of individual human genes for the nuclear-encoded subunits in the membrane portion of the enzyme leads to the formation of intermediate vestigial ATPase complexes that provide a description of the pathway of assembly of the membrane domain. The key intermediate complex consists of the F 1 -c 8 complex inhibited by the ATPase inhibitor protein IF 1 and attached to the peripheral stalk, with subunits e, f, and g associated with the membrane domain of the peripheral stalk. This intermediate provides the template for insertion of ATP6 and ATP8, which are synthesized on mitochondrial ribosomes. Their association with the complex is stabilized by addition of the 6.8 proteolipid, and the complex is coupled to ATP synthesis at this point. A structure of the dimeric yeast F o membrane domain is consistent with this model of assembly. The human 6.8 proteolipid (yeast j subunit) locks ATP6 and ATP8 into the membrane assembly, and the monomeric complexes then dimerize via interactions between ATP6 subunits and between 6.8 proteolipids (j subunits). The dimers are linked together back-to-face by DAPIT (diabetes-associated protein in insulin-sensitive tissue; yeast subunit k), forming long oligomers along the edges of the cristae.

  20. Attacker Modelling in Ubiquitous Computing Systems

    DEFF Research Database (Denmark)

    Papini, Davide

    in with our everyday life. This future is visible to everyone nowadays: terms like smartphone, cloud, sensor, network etc. are widely known and used in our everyday life. But what about the security of such systems. Ubiquitous computing devices can be limited in terms of energy, computing power and memory...... attacker remain somehow undened and still under extensive investigation. This Thesis explores the nature of the ubiquitous attacker with a focus on how she interacts with the physical world and it denes a model that captures the abilities of the attacker. Furthermore a quantitative implementation...

  1. Minmax defense strategy for complex multi-state systems

    International Nuclear Information System (INIS)

    Hausken, Kjell; Levitin, Gregory

    2009-01-01

    This paper presents a general optimization methodology that merges game theory and multi-state system survivability theory. The defender has multiple alternatives of defense strategy that presumes separation and protection of system elements. The attacker also has multiple alternatives of its attack strategy based on a combination of different possible attack actions against different groups of system elements. The defender minimizes, and the attacker maximizes, the expected damage caused by the attack (taking into account the unreliability of system elements and the multi-state nature of complex series-parallel systems). The problem is defined as a two-period minmax non-cooperative game between the defender who moves first and the attacker who moves second. An exhaustive minmax optimization algorithm is presented based on a double-loop genetic algorithm for determining the solution. A universal generating function technique is applied for evaluating the losses caused by system performance reduction. Illustrative examples with solutions are presented

  2. Repeated noxious stimulation of the skin enhances cutaneous pain perception of migraine patients in-between attacks: clinical evidence for continuous sub-threshold increase in membrane excitability of central trigeminovascular neurons.

    Science.gov (United States)

    Weissman-Fogel, Irit; Sprecher, Elliot; Granovsky, Yelena; Yarnitsky, David

    2003-08-01

    Recent clinical studies showed that acute migraine attacks are accompanied by increased periorbital and bodily skin sensitivity to touch, heat and cold. Parallel pre-clinical studies showed that the underlying mechanism is sensitization of primary nociceptors and central trigeminovascular neurons. The present study investigates the sensory state of neuronal pathways that mediate skin pain sensation in migraine patients in between attacks. The assessments of sensory perception included (a) mechanical and thermal pain thresholds of the periorbital area, electrical pain threshold of forearm skin, (b) pain scores to phasic supra-threshold stimuli in the same modalities and areas as above, and (c) temporal summation of pain induced by applying noxious tonic heat pain and brief trains of noxious mechanical and electrical pulses to the above skin areas. Thirty-four pain-free migraine patients and 28 age- and gender-matched controls were studied. Patients did not differ from controls in their pain thresholds for heat (44+/-2.6 vs. 44.6+/-1.9 degrees C), and electrical (4.8+/-1.6 vs. 4.3+/-1.6 mA) stimulation, and in their pain scores for supra-threshold phasic stimuli for all modalities. They did, however, differ in their pain threshold for mechanical stimulation, just by one von Frey filament (P=0.01) and in their pain scores of the temporal summation tests. Increased summation of pain was found in migraineurs for repeated mechanical stimuli (delta visual analog scale (VAS) +2.32+/-0.73 in patients vs. +0.16+/-0.83 in controls, P=0.05) and repeated electrical stimuli (delta VAS +3.83+/-1.91 vs -3.79+/-2.31, P=0.01). Increased summation corresponded with more severe clinical parameters of migraine and tended to depend on interval since last migraine attack. The absence of clinically or overt laboratory expressed allodynia suggests that pain pathways are not sensitized in the pain-free migraine patients. Nevertheless, the increased temporal summation, and the slight

  3. Peacetime Use of Computer Network Attack

    National Research Council Canada - National Science Library

    Busby, Daniel

    2000-01-01

    .... PDD-63 alerts the nation to prepare for impending cyber attacks. This paper examines the nature, scale, and likelihood of cyber attacks posited in PDD-63 and finds that the country does not face an imminent "electronic Pearl Harbor...

  4. A highly sensitive PVC membrane iodide electrode based on complexes of mercury(II) as neutral carrier.

    Science.gov (United States)

    Chai, Y-Q; Yuan, R; Xu, L; Xu, W-J; Dai, J-Y; Jiang, F

    2004-09-01

    A novel solvent polymeric membrane electrode based on bis(1,3,4-thiadiazole) complexes of Hg(II) is described which has excellent selectivity and sensitivity toward iodide ion. The electrode, containing 1,4-bis(5-methyl-1,3,4-thiadiazole-2-yl-thio)butanemercury(II) [Hg(II)BMTB(NO3)4], has a Nernstian potentiometric response from 2.0 x 10(-8) to 2.0 x 10(-2) mol L(-1) with a detection limit of 8.0 x 10(-9) mol L(-1) and a slope of -59.0+/-0.5 mV/decade in 0.01 mol L(-1) phosphate buffer solution (pH 3.0, 20 degrees C). The selectivity sequence observed is iodide>bromide>thiocyanate>nitrite>nitrate>chloride>perchlorate>acetate>sulfate. The selectivity behavior is discussed in terms of the UV-Vis spectrum, and the process of transfer of iodide across the membrane interface is investigated by use of the AC impedance technique. The electrode was successfully applied to the determination of iodide in Jialing River and Spring in Jinyun Mountains, with satisfactory results.

  5. A new method for robust video watermarking resistant against key estimation attacks

    Science.gov (United States)

    Mitekin, Vitaly

    2015-12-01

    This paper presents a new method for high-capacity robust digital video watermarking and algorithms of embedding and extraction of watermark based on this method. Proposed method uses password-based two-dimensional pseudonoise arrays for watermark embedding, making brute-force attacks aimed at steganographic key retrieval mostly impractical. Proposed algorithm for 2-dimensional "noise-like" watermarking patterns generation also allows to significantly decrease watermark collision probability ( i.e. probability of correct watermark detection and extraction using incorrect steganographic key or password).. Experimental research provided in this work also shows that simple correlation-based watermark detection procedure can be used, providing watermark robustness against lossy compression and watermark estimation attacks. At the same time, without decreasing robustness of embedded watermark, average complexity of the brute-force key retrieval attack can be increased to 1014 watermark extraction attempts (compared to 104-106 for a known robust watermarking schemes). Experimental results also shows that for lowest embedding intensity watermark preserves it's robustness against lossy compression of host video and at the same time preserves higher video quality (PSNR up to 51dB) compared to known wavelet-based and DCT-based watermarking algorithms.

  6. Modes of Interaction of Pleckstrin Homology Domains with Membranes: Toward a Computational Biochemistry of Membrane Recognition.

    Science.gov (United States)

    Naughton, Fiona B; Kalli, Antreas C; Sansom, Mark S P

    2018-02-02

    Pleckstrin homology (PH) domains mediate protein-membrane interactions by binding to phosphatidylinositol phosphate (PIP) molecules. The structural and energetic basis of selective PH-PIP interactions is central to understanding many cellular processes, yet the molecular complexities of the PH-PIP interactions are largely unknown. Molecular dynamics simulations using a coarse-grained model enables estimation of free-energy landscapes for the interactions of 12 different PH domains with membranes containing PIP 2 or PIP 3 , allowing us to obtain a detailed molecular energetic understanding of the complexities of the interactions of the PH domains with PIP molecules in membranes. Distinct binding modes, corresponding to different distributions of cationic residues on the PH domain, were observed, involving PIP interactions at either the "canonical" (C) and/or "alternate" (A) sites. PH domains can be grouped by the relative strength of their C- and A-site interactions, revealing that a higher affinity correlates with increased C-site interactions. These simulations demonstrate that simultaneous binding of multiple PIP molecules by PH domains contributes to high-affinity membrane interactions, informing our understanding of membrane recognition by PH domains in vivo. Copyright © 2017. Published by Elsevier Ltd.

  7. A histologic, histomorphometric, and radiographic comparison between two complexes of CenoBoen/CenoMembrane and Bio-Oss/Bio-Gide in lateral ridge augmentation: A clinical trial.

    Science.gov (United States)

    Amoian, Babak; Moudi, Ehsan; Majidi, Maryam Seyed; Ali Tabatabaei, S M

    2016-09-01

    Several grafting materials have been used for alveolar ridge augmentation. The literature lacks researches to compare CenoBone to other grafting materials. The aim of this study was to compare CenoBone/CenoMembrane complex to Bio-Oss/Bio-Gide complex in lateral alveolar bone augmentation in terms of radiographic, histologic, and histomorphometric parameters. In this randomized controlled trial, ten patients who needed lateral ridge augmentation were selected and augmentations were done using either of CenoBone/CenoMembrane or Bio-Oss/Bio-Gide complexes. In the re-entry surgery in 6 months following augmentation, core biopsies were taken and clinical, radiographic, histologic, and histomorphometric evaluations were performed. No statistically significant difference was seen between groups except for the number of blood vessels and percentage of residual graft materials. CenoBone seems to present a comparable lateral ridge augmentation to Bio-Oss in.

  8. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    Directory of Open Access Journals (Sweden)

    Khaled Elleithy

    2005-02-01

    Full Text Available A denial of service attack (DOS is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack will be simulated against a Microsoft Windows 95 computer. The TCP SYN Flood attack will be simulated against a Microsoft Windows 2000 IIS FTP Server. Distributed DOS will be demonstrated by simulating a distribution zombie program that will carry the Ping of Death attack. This paper will demonstrate the potential damage from DOS attacks and analyze the ramifications of the damage.

  9. Evidence that the assembly of the yeast cytochrome bc1 complex involves the formation of a large core structure in the inner mitochondrial membrane.

    Science.gov (United States)

    Zara, Vincenzo; Conte, Laura; Trumpower, Bernard L

    2009-04-01

    The assembly status of the cytochrome bc(1) complex has been analyzed in distinct yeast deletion strains in which genes for one or more of the bc(1) subunits were deleted. In all the yeast strains tested, a bc(1) sub-complex of approximately 500 kDa was found when the mitochondrial membranes were analyzed by blue native electrophoresis. The subsequent molecular characterization of this sub-complex, carried out in the second dimension by SDS/PAGE and immunodecoration, revealed the presence of the two catalytic subunits, cytochrome b and cytochrome c(1), associated with the noncatalytic subunits core protein 1, core protein 2, Qcr7p and Qcr8p. Together, these bc(1) subunits build up the core structure of the cytochrome bc(1) complex, which is then able to sequentially bind the remaining subunits, such as Qcr6p, Qcr9p, the Rieske iron-sulfur protein and Qcr10p. This bc(1) core structure may represent a true assembly intermediate during the maturation of the bc(1) complex; first, because of its wide distribution in distinct yeast deletion strains and, second, for its characteristics of stability, which resemble those of the intact homodimeric bc(1) complex. By contrast, the bc(1) core structure is unable to interact with the cytochrome c oxidase complex to form respiratory supercomplexes. The characterization of this novel core structure of the bc(1) complex provides a number of new elements clarifying the molecular events leading to the maturation of the yeast cytochrome bc(1) complex in the inner mitochondrial membrane.

  10. A Socio-Technical Approach to Preventing, Mitigating, and Recovering from Ransomware Attacks.

    Science.gov (United States)

    Sittig, Dean F; Singh, Hardeep

    2016-01-01

    Recently there have been several high-profile ransomware attacks involving hospitals around the world. Ransomware is intended to damage or disable a user's computer unless the user makes a payment. Once the attack has been launched, users have three options: 1) try to restore their data from backup; 2) pay the ransom; or 3) lose their data. In this manuscript, we discuss a socio-technical approach to address ransomware and outline four overarching steps that organizations can undertake to secure an electronic health record (EHR) system and the underlying computing infrastructure. First, health IT professionals need to ensure adequate system protection by correctly installing and configuring computers and networks that connect them. Next, the health care organizations need to ensure more reliable system defense by implementing user-focused strategies, including simulation and training on correct and complete use of computers and network applications. Concomitantly, the organization needs to monitor computer and application use continuously in an effort to detect suspicious activities and identify and address security problems before they cause harm. Finally, organizations need to respond adequately to and recover quickly from ransomware attacks and take actions to prevent them in future. We also elaborate on recommendations from other authoritative sources, including the National Institute of Standards and Technology (NIST). Similar to approaches to address other complex socio-technical health IT challenges, the responsibility of preventing, mitigating, and recovering from these attacks is shared between health IT professionals and end-users.

  11. Attacks on IEEE 802.11 wireless networks

    Directory of Open Access Journals (Sweden)

    Dejan Milan Tepšić

    2013-06-01

    Full Text Available Security of wireless computer networks was initially secured with the WEP security protocol, which relies on the RC4 encryption algorithm and the CRC algorithm to check the integrity. The basic problems of the WEP are a short initialization vector, unsafe data integrity checking, using a common key, the lack of mechanisms for management and exchange of keys, the lack of protection from the endless insertion of the same package into the network, the lack of authentication of access points and the like. The consequences of these failures are easy attacks against the WEP network, namely their complete insecurity. Therefore, the work began on the IEEE 802.11i protocol, which should radically improve the security of wireless networks. Since the development of a protocol lasted, the WPA standard was released to offset the security gap caused by the WEP. The WPA also relies on RC4 and CRC algorithms, but brings temporary keys and the MIC algorithm for data integrity. The 802.1X authentication was introduced and common keys are no longer needed, since it is possible to use an authentication server. The length of the initialization vector was increased and the vector is obtained based on the packet serial number, in order to prevent the insertion of the same packet into the network. The weakness of the WPA security mechanism is the use of a common key. WPA2 (802.11i later appeared. Unlike the WPA mechanism that worked on old devices with the replacement of software, WPA2 requires new network devices that can perform AES encryption. AES replaces the RC4 algorithm and delivers much greater security. Data integrity is protected by encryption. Despite progress, there are still weaknesses in wireless networks. Attacks for denial of service are possible as well as spoofing package headers attacks. For now, it is not advisable to use wireless networks in environments where unreliability and unavailability are not tolerated. Introduction In the entire history of

  12. Temporal Cyber Attack Detection.

    Energy Technology Data Exchange (ETDEWEB)

    Ingram, Joey Burton [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Draelos, Timothy J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Galiardi, Meghan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Doak, Justin E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Rigorous characterization of the performance and generalization ability of cyber defense systems is extremely difficult, making it hard to gauge uncertainty, and thus, confidence. This difficulty largely stems from a lack of labeled attack data that fully explores the potential adversarial space. Currently, performance of cyber defense systems is typically evaluated in a qualitative manner by manually inspecting the results of the system on live data and adjusting as needed. Additionally, machine learning has shown promise in deriving models that automatically learn indicators of compromise that are more robust than analyst-derived detectors. However, to generate these models, most algorithms require large amounts of labeled data (i.e., examples of attacks). Algorithms that do not require annotated data to derive models are similarly at a disadvantage, because labeled data is still necessary when evaluating performance. In this work, we explore the use of temporal generative models to learn cyber attack graph representations and automatically generate data for experimentation and evaluation. Training and evaluating cyber systems and machine learning models requires significant, annotated data, which is typically collected and labeled by hand for one-off experiments. Automatically generating such data helps derive/evaluate detection models and ensures reproducibility of results. Experimentally, we demonstrate the efficacy of generative sequence analysis techniques on learning the structure of attack graphs, based on a realistic example. These derived models can then be used to generate more data. Additionally, we provide a roadmap for future research efforts in this area.

  13. 12 CFR 263.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  14. 12 CFR 509.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding....17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  15. A General Ligand Design for Gold Catalysis allowing Ligand-Directed Anti Nucleophilic Attack of Alkynes

    Science.gov (United States)

    Wang, Yanzhao; Wang, Zhixun; Li, Yuxue; Wu, Gongde; Cao, Zheng; Zhang, Liming

    2014-01-01

    Most homogenous gold catalyses demand ≥0.5 mol % catalyst loading. Due to the high cost of gold, these reactions are unlikely to be applicable in medium or large scale applications. Here we disclose a novel ligand design based on the privileged biphenyl-2-phosphine framework that offers a potentially general approach to dramatically lowering catalyst loading. In this design, an amide group at the 3’ position of the ligand framework directs and promotes nucleophilic attack at the ligand gold complex-activated alkyne, which is unprecedented in homogeneous gold catalysis considering the spatial challenge of using ligand to reach antiapproaching nucleophile in a linear P-Au-alkyne centroid structure. With such a ligand, the gold(I) complex becomes highly efficient in catalyzing acid addition to alkynes, with a turnover number up to 99,000. Density functional theory calculations support the role of the amide moiety in directing the attack of carboxylic acid via hydrogen bonding. PMID:24704803

  16. Evolution of a Rippled Membrane during Phospholipase A2 Hydrolysis Studied by Time-Resolved AFM

    DEFF Research Database (Denmark)

    Leidy, Chad; Mouritsen, Ole G.; Jørgensen, Kent

    2004-01-01

    The sensitivity of phospholipase A2 (PLA2) for lipid membrane curvature is explored by monitoring, through time-resolved atomic force microscopy, the hydrolysis of supported double bilayers in the ripple phase. The ripple phase presents a corrugated morphology. PLA2 is shown to have higher activity...... toward the ripple phase compared to the gel phase in 1,2-dimyristoyl-sn-glycero-3-phosphocholine (DMPC) membranes, indicating its preference for this highly curved membrane morphology. Hydrolysis of the stable and metastable ripple structures is monitored for equimolar DMPC/1,2-distearoyl- sn-glycero-3....... This is reflected in an increase in ripple spacing, followed by a sudden flattening of the lipid membrane during hydrolysis. Hydrolysis of the ripple phase results in anisotropic holes running parallel to the ripples, suggesting that the ripple phase has strip regions of higher sensitivity to enzymatic attack. Bulk...

  17. Vulnerability Assessment by Learning Attack Specifications in Graphs

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; Lopes, Raul H.C.

    This paper presents an evolutionary approach for learning attack specifications that describe attack scenarios. The objective is to find vulnerabilities in computer networks which minimise the cost of an attack with maximum impact. Although we focus on Insider Threat, the proposed approach applies

  18. Attack Tree Generation by Policy Invalidation

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Naeem Akram, R.; Jajodia, S.

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identi﬿cation. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identi﬿ed

  19. The mechanism of anthracene interaction with photosynthetic apparatus: A study using intact cells, thylakoid membranes and PS II complexes isolated from Chlamydomonas reinhardtii

    International Nuclear Information System (INIS)

    Aksmann, Anna; Shutova, Tatiana; Samuelsson, Goeran; Tukaj, Zbigniew

    2011-01-01

    Intact cells of Chlamydomonas reinhardtii as well as isolated thylakoid membranes and photosystem II complexes were used to examine a possible mechanism of anthracene (ANT) interaction with the photosynthetic apparatus. Since ANT concentrations above 1 mM were required to significantly inhibit the rate of oxygen evolution in PS II membrane fragments it may indicate that the toxicant did not directly interact with this photosystem. On the other hand, stimulation of oxygen uptake by ANT-treated thylakoids suggested that ANT could either act as an artificial electron acceptor in the photosynthetic electron transport chain or function as an uncoupler. Electron transfer from excited chlorophyll to ANT is impossible due to the very low reduction potential of ANT and therefore we propose that toxic concentrations of ANT increase the thylakoid membrane permeability and thereby function as an uncoupler, enhancing electron transport in vitro. Hence, its unspecific interference with photosynthetic membranes in vitro suggests that the inhibitory effect observed on intact cell photosynthesis is caused by uncoupling of phosphorylation.

  20. Atomistic Monte Carlo simulation of lipid membranes

    DEFF Research Database (Denmark)

    Wüstner, Daniel; Sklenar, Heinz

    2014-01-01

    Biological membranes are complex assemblies of many different molecules of which analysis demands a variety of experimental and computational approaches. In this article, we explain challenges and advantages of atomistic Monte Carlo (MC) simulation of lipid membranes. We provide an introduction...... of local-move MC methods in combination with molecular dynamics simulations, for example, for studying multi-component lipid membranes containing cholesterol....

  1. Neural network classifier of attacks in IP telephony

    Science.gov (United States)

    Safarik, Jakub; Voznak, Miroslav; Mehic, Miralem; Partila, Pavol; Mikulec, Martin

    2014-05-01

    Various types of monitoring mechanism allow us to detect and monitor behavior of attackers in VoIP networks. Analysis of detected malicious traffic is crucial for further investigation and hardening the network. This analysis is typically based on statistical methods and the article brings a solution based on neural network. The proposed algorithm is used as a classifier of attacks in a distributed monitoring network of independent honeypot probes. Information about attacks on these honeypots is collected on a centralized server and then classified. This classification is based on different mechanisms. One of them is based on the multilayer perceptron neural network. The article describes inner structure of used neural network and also information about implementation of this network. The learning set for this neural network is based on real attack data collected from IP telephony honeypot called Dionaea. We prepare the learning set from real attack data after collecting, cleaning and aggregation of this information. After proper learning is the neural network capable to classify 6 types of most commonly used VoIP attacks. Using neural network classifier brings more accurate attack classification in a distributed system of honeypots. With this approach is possible to detect malicious behavior in a different part of networks, which are logically or geographically divided and use the information from one network to harden security in other networks. Centralized server for distributed set of nodes serves not only as a collector and classifier of attack data, but also as a mechanism for generating a precaution steps against attacks.

  2. [Formation of purple membranes during salt bacteria cultivation].

    Science.gov (United States)

    Chekulaeva, L N; Korolev, Iu N; Telegin, N L; Rikhireva, G T

    1975-01-01

    Experiments have been carried out on cultivation of halophile with probe selection in the interval of 1--2 hours to record the spectra of repeated disturbed completed inner reflection. Periodicity in the changes of spectral characteristics of the culture with the interval of 20--24 hours is revealed. A clearly expressed dichroism of the amid II band of the membrane complex is found, the absence of this dichroism in the protein isolated from the membrane complex is stated. It is suggested that dichroism revealed is a specific feature of the presence of purpuric membranes in the cells. Spontaneous plane orientation of protein macromolecules in purpuric membranes is established. The level of dichroism of amid II band is shown to depend on fermentation conditions of salt bacteria.

  3. SCADA system vulnerabilities to cyber attack

    Energy Technology Data Exchange (ETDEWEB)

    Shaw, W. T. [Cyber Security Consulting (Canada)

    2004-10-01

    The susceptibility to terrorist attacks of computer-based supervisory control (SCADA) systems that are used to monitor and control water distribution systems, oil and gas pipelines and the electrical grid, is discussed. The discussion includes ways in which SCADA systems may be attacked and remedial actions that may be taken to reduce or eliminate the possibility of such attacks. Attacks may take the form of causing the system to generate false data to divert attention from impending system disasters, or commandeer the system to seriously disable it, or cause damage to the process or equipment being controlled by sending improper control commands. SCADA systems are also vulnerable to internal threats, either from an accidental action that results in damage, or an intentional action, as for example by a disgruntled employee, or ex-employee, usually by way of reprogramming an RTU or PLC by accessing the polling/communications circuit. Recent SCADA systems are much more susceptible to concerted cyber attacks because of the adoption of IT technologies and standards into the design of such systems. (Older systems are more likely to be unique designs, hence less susceptible to attack). As far as protection of SCADA systems is concerned, there are no technologies that would prevent a technologically sophisticated terrorist or disgruntled employee from doing major damage to the system, however, the IT world has developed a range of technologies for the protection of IT assets, and many of these same technologies can also be used to safeguard modern SCADA systems.

  4. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  5. Nanostructured Polysulfone-Based Block Copolymer Membranes

    KAUST Repository

    Xie, Yihui

    2016-05-01

    The aim of this work is to fabricate nanostructured membranes from polysulfone-based block copolymers through self-assembly and non-solvent induced phase separation. Block copolymers containing polysulfone are novel materials for this purpose providing better mechanical and thermal stability to membranes than polystyrene-based copolymers, which have been exclusively used now. Firstly, we synthesized a triblock copolymer, poly(tert-butyl acrylate)-b-polsulfone-b-poly(tert-butyl acrylate) through polycondensation and reversible addition-fragmentation chain-transfer polymerization. The obtained membrane has a highly porous interconnected skin layer composed of elongated micelles with a flower-like arrangement, on top of the graded finger-like macrovoids. Membrane surface hydrolysis was carried out in a combination with metal complexation to obtain metal-chelated membranes. The copper-containing membrane showed improved antibacterial capability. Secondly, a poly(acrylic acid)-b-polysulfone-b-poly(acrylic acid) triblock copolymer obtained by hydrolyzing poly(tert-butyl acrylate)-b-polsulfone-b-poly(tert-butyl acrylate) formed a thin film with cylindrical poly(acrylic acid) microdomains in polysulfone matrix through thermal annealing. A phase inversion membrane was prepared from the same polymer via self-assembly and chelation-assisted non-solvent induced phase separation. The spherical micelles pre-formed in a selective solvent mixture packed into an ordered lattice in aid of metal-poly(acrylic acid) complexation. The space between micelles was filled with poly(acrylic acid)-metal complexes acting as potential water channels. The silver0 nanoparticle-decorated membrane was obtained by surface reduction, having three distinct layers with different particle sizes. Other amphiphilic copolymers containing polysulfone and water-soluble segments such as poly(ethylene glycol) and poly(N-isopropylacrylamide) were also synthesized through coupling reaction and copper0-mediated

  6. Dynamin-like protein 1 at the Golgi complex: A novel component of the sorting/targeting machinery en route to the plasma membrane

    International Nuclear Information System (INIS)

    Bonekamp, Nina A.; Vormund, Kerstin; Jacob, Ralf; Schrader, Michael

    2010-01-01

    The final step in the liberation of secretory vesicles from the trans-Golgi network (TGN) involves the mechanical action of the large GTPase dynamin as well as conserved dynamin-independent fission mechanisms, e.g. mediated by Brefeldin A-dependent ADP-ribosylated substrate (BARS). Another member of the dynamin family is the mammalian dynamin-like protein 1 (DLP1/Drp1) that is known to constrict and tubulate membranes, and to divide mitochondria and peroxisomes. Here, we examined a potential role for DLP1 at the Golgi complex. DLP1 localized to the Golgi complex in some but not all cell lines tested, thus explaining controversial reports on its cellular distribution. After silencing of DLP1, an accumulation of the apical reporter protein YFP-GL-GPI, but not the basolateral reporter VSVG-SP-GFP at the Golgi complex was observed. A reduction in the transport of YFP-GL-GPI to the plasma membrane was confirmed by surface immunoprecipitation and TGN-exit assays. In contrast, YFP-GL-GPI trafficking was not disturbed in cells silenced for BARS, which is involved in basolateral sorting and trafficking of VSVG-SP-GFP in COS-7 cells. Our data indicate a new role for DLP1 at the Golgi complex and thus a role for DLP1 as a novel component of the apical sorting machinery at the TGN is discussed.

  7. Selective transport of metal ions through cation exchange membrane in the presence of a complexing agent

    Energy Technology Data Exchange (ETDEWEB)

    Tingchia Huang; Jaukai Wang (National Cheng Kung Univ., Tainan (Taiwan, Province of China))

    1993-01-01

    Selective transport of metal ions through a cation exchange membrane was studied in stirred batch dialyzer for the systems Ni[sup 2+]-Cu[sup 2+] and Cu[sup 2+]-Fe[sup 3+]. Oxalic acid, malonic acid, citric acid, glycine, and ethylenediaminetetraacetic acid were employed as the complexing agents added in the feed solution in order to increase the permselectivity of metal ions. The experimental results show that the selective transport behavior of metal ions depends on the valence and the concentration of metal ions, the stoichiometric ratio of complexing agent to metal ions, and the pH value of the feed solution, but is independent of the concentration of counterion in the stripping phase. A theoretical approach was formulated on the basis of the Nernst-Planck equation and interface quasi-equilibrium. Theoretical solutions obtained from numerical calculation were in agreement with the experimental data.

  8. Attack Methodology Analysis: Emerging Trends in Computer-Based Attack Methodologies and Their Applicability to Control System Networks

    Energy Technology Data Exchange (ETDEWEB)

    Bri Rolston

    2005-06-01

    Threat characterization is a key component in evaluating the threat faced by control systems. Without a thorough understanding of the threat faced by critical infrastructure networks, adequate resources cannot be allocated or directed effectively to the defense of these systems. Traditional methods of threat analysis focus on identifying the capabilities and motivations of a specific attacker, assessing the value the adversary would place on targeted systems, and deploying defenses according to the threat posed by the potential adversary. Too many effective exploits and tools exist and are easily accessible to anyone with access to an Internet connection, minimal technical skills, and a significantly reduced motivational threshold to be able to narrow the field of potential adversaries effectively. Understanding how hackers evaluate new IT security research and incorporate significant new ideas into their own tools provides a means of anticipating how IT systems are most likely to be attacked in the future. This research, Attack Methodology Analysis (AMA), could supply pertinent information on how to detect and stop new types of attacks. Since the exploit methodologies and attack vectors developed in the general Information Technology (IT) arena can be converted for use against control system environments, assessing areas in which cutting edge exploit development and remediation techniques are occurring can provide significance intelligence for control system network exploitation, defense, and a means of assessing threat without identifying specific capabilities of individual opponents. Attack Methodology Analysis begins with the study of what exploit technology and attack methodologies are being developed in the Information Technology (IT) security research community within the black and white hat community. Once a solid understanding of the cutting edge security research is established, emerging trends in attack methodology can be identified and the gap between

  9. Trace Attack against Biometric Mobile Applications

    Directory of Open Access Journals (Sweden)

    Sanaa Ghouzali

    2016-01-01

    Full Text Available With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen. Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy.

  10. Limit Asthma Attacks Caused by Colds or Flu

    Science.gov (United States)

    Asthma: Limit asthma attacks caused by colds or flu A cold or the flu can trigger an asthma attack. Here's why — and how to keep your sneeze ... plan. If you notice warning signs of an asthma attack — such as coughing, wheezing, chest tightness or shortness ...

  11. Quantitative Attack Tree Analysis via Priced Timed Automata

    NARCIS (Netherlands)

    Kumar, Rajesh; Ruijters, Enno Jozef Johannes; Stoelinga, Mariëlle Ida Antoinette; Sankaranarayanan, Sriram; Vicario, Enrico

    The success of a security attack crucially depends on the resources available to an attacker: time, budget, skill level, and risk appetite. Insight in these dependencies and the most vulnerable system parts is key to providing effective counter measures. This paper considers attack trees, one of the

  12. Finite Energy and Bounded Actuator Attacks on Cyber-Physical Systems

    Energy Technology Data Exchange (ETDEWEB)

    Djouadi, Seddik M [ORNL; Melin, Alexander M [ORNL; Ferragut, Erik M [ORNL; Laska, Jason A [ORNL; Dong, Jin [ORNL; Drira, Anis [ORNL

    2015-01-01

    As control system networks are being connected to enterprise level networks for remote monitoring, operation, and system-wide performance optimization, these same connections are providing vulnerabilities that can be exploited by malicious actors for attack, financial gain, and theft of intellectual property. Much effort in cyber-physical system (CPS) protection has focused on protecting the borders of the system through traditional information security techniques. Less effort has been applied to the protection of cyber-physical systems from intelligent attacks launched after an attacker has defeated the information security protections to gain access to the control system. In this paper, attacks on actuator signals are analyzed from a system theoretic context. The threat surface is classified into finite energy and bounded attacks. These two broad classes encompass a large range of potential attacks. The effect of theses attacks on a linear quadratic (LQ) control are analyzed, and the optimal actuator attacks for both finite and infinite horizon LQ control are derived, therefore the worst case attack signals are obtained. The closed-loop system under the optimal attack signals is given and a numerical example illustrating the effect of an optimal bounded attack is provided.

  13. Membrane interaction of retroviral Gag proteins

    Directory of Open Access Journals (Sweden)

    Robert Alfred Dick

    2014-04-01

    Full Text Available Assembly of an infectious retroviral particle relies on multimerization of the Gag polyprotein at the inner leaflet of the plasma membrane. The three domains of Gag common to all retroviruses-- MA, CA, and NC-- provide the signals for membrane binding, assembly, and viral RNA packaging, respectively. These signals do not function independently of one another. For example, Gag multimerization enhances membrane binding and is more efficient when NC is interacting with RNA. MA binding to the plasma membrane is governed by several principles, including electrostatics, recognition of specific lipid head groups, hydrophobic interactions, and membrane order. HIV-1 uses many of these principles while Rous sarcoma virus (RSV appears to use fewer. This review describes the principles that govern Gag interactions with membranes, focusing on RSV and HIV-1 Gag. The review also defines lipid and membrane behavior, and discusses the complexities in determining how lipid and membrane behavior impact Gag membrane binding.

  14. Modeling attacker-defender interactions in information networks.

    Energy Technology Data Exchange (ETDEWEB)

    Collins, Michael Joseph

    2010-09-01

    The simplest conceptual model of cybersecurity implicitly views attackers and defenders as acting in isolation from one another: an attacker seeks to penetrate or disrupt a system that has been protected to a given level, while a defender attempts to thwart particular attacks. Such a model also views all non-malicious parties as having the same goal of preventing all attacks. But in fact, attackers and defenders are interacting parts of the same system, and different defenders have their own individual interests: defenders may be willing to accept some risk of successful attack if the cost of defense is too high. We have used game theory to develop models of how non-cooperative but non-malicious players in a network interact when there is a substantial cost associated with effective defensive measures. Although game theory has been applied in this area before, we have introduced some novel aspects of player behavior in our work, including: (1) A model of how players attempt to avoid the costs of defense and force others to assume these costs; (2) A model of how players interact when the cost of defending one node can be shared by other nodes; and (3) A model of the incentives for a defender to choose less expensive, but less effective, defensive actions.

  15. Polymer and Membrane Design for Low Temperature Catalytic Reactions

    KAUST Repository

    Villalobos, Luis Francisco; Xie, Yihui; Nunes, Suzana Pereira; Peinemann, Klaus-Viktor

    2016-01-01

    Catalytically active asymmetric membranes have been developed with high loadings of palladium nanoparticles located solely in the membrane's ultrathin skin layer. The manufacturing of these membranes requires polymers with functional groups, which can form insoluble complexes with palladium ions. Three polymers have been synthesized for this purpose and a complexation/nonsolvent induced phase separation followed by a palladium reduction step is carried out to prepare such membranes. Parameters to optimize the skin layer thickness and porosity, the palladium loading in this layer, and the palladium nanoparticles size are determined. The catalytic activity of the membranes is verified with the reduction of a nitro-compound and with a liquid phase Suzuki-Miyaura coupling reaction. Very low reaction times are observed. © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  16. Piston-assisted proton pumping in Complex I of mitochondria membranes

    Science.gov (United States)

    Mourokh, Lev; Filonenko, Ilan

    2014-03-01

    Proton-pumping mechanism of Complex I remains mysterious because its electron and proton paths are well separated and the direct Coulomb interaction seems to be negligible. The structure of this enzyme was resolved very recently and its functionality was connected the shift of the helix HL. We model the helix as a piston oscillating between the protons and electrons. We assume that positive charges are accumulated near the edges of the helix. In the oxidized state, the piston is attracted to electrons, so its distance to the proton sites increases, the energy of these sites decreases and the sites can be populated. When electrons proceed to the drain, elastic forces return the piston to the original position and the energies of populated proton sites increase, so the protons can be transferred to the positive site of the membrane. In this work, we explore a simplified model when the interaction of the piston with electrons is replaced by a periodic force. We derive quantum Heisenberg equations for the proton operators and solve them jointly with the Langevin equation for the piston position. We show that the proton pumping is possible in such structure with parameters closely resembling the real system. We also address the feasibility of using such mechanism in nanoelectronics.

  17. Complexation-tailored morphology of asymmetric block copolymer membranes

    KAUST Repository

    Madhavan, Poornima

    2013-08-14

    Hydrogen-bond formation between polystyrene-b-poly (4-vinylpyridine) (PS-b-P4VP) block copolymer (BCP) and -OH/-COOH functionalized organic molecules was used to tune morphology of asymmetric nanoporous membranes prepared by simultaneous self-assembly and nonsolvent induced phase separation. The morphologies were characterized by field emmision scanning electron microscopy (FESEM) and atomic force microscopy (AFM). Hydrogen bonds were confirmed by infrared (IR), and the results were correlated to rheology characterization. The OH-functionalized organic molecules direct the morphology into hexagonal order. COOH-functionalized molecules led to both lamellar and hexagonal structures. Micelle formation in solutions and their sizes were determined using dynamic light scattering (DLS) measurements and water fluxes of 600-3200 L/m 2·h·bar were obtained. The pore size of the plain BCP membrane was smaller than with additives. The following series of additives led to pores with hexagonal order with increasing pore size: terephthalic acid (COOH-bifunctionalized) < rutin (OH-multifunctionalized) < 9-anthracenemethanol (OH-monofunctionalized) < 3,5-dihydroxybenzyl alcohol (OH-trifunctionalized). © 2013 American Chemical Society.

  18. Complexation-tailored morphology of asymmetric block copolymer membranes

    KAUST Repository

    Madhavan, Poornima; Peinemann, Klaus-Viktor; Nunes, Suzana Pereira

    2013-01-01

    Hydrogen-bond formation between polystyrene-b-poly (4-vinylpyridine) (PS-b-P4VP) block copolymer (BCP) and -OH/-COOH functionalized organic molecules was used to tune morphology of asymmetric nanoporous membranes prepared by simultaneous self-assembly and nonsolvent induced phase separation. The morphologies were characterized by field emmision scanning electron microscopy (FESEM) and atomic force microscopy (AFM). Hydrogen bonds were confirmed by infrared (IR), and the results were correlated to rheology characterization. The OH-functionalized organic molecules direct the morphology into hexagonal order. COOH-functionalized molecules led to both lamellar and hexagonal structures. Micelle formation in solutions and their sizes were determined using dynamic light scattering (DLS) measurements and water fluxes of 600-3200 L/m 2·h·bar were obtained. The pore size of the plain BCP membrane was smaller than with additives. The following series of additives led to pores with hexagonal order with increasing pore size: terephthalic acid (COOH-bifunctionalized) < rutin (OH-multifunctionalized) < 9-anthracenemethanol (OH-monofunctionalized) < 3,5-dihydroxybenzyl alcohol (OH-trifunctionalized). © 2013 American Chemical Society.

  19. Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, MAC layer attacks are considered...... the most harmful as they directly affect the available resources and thus the nodes’ energy consumption. The first endeavour of this paper is to model the activities of MAC layer security attacks to understand the flow of activities taking place when mounting the attack and when actually executing it....... The second aim of the paper is to simulate these attacks on hybrid MAC mechanisms, which shows the performance degradation of aWSN under the considered attacks. The modelling and implementation of the security attacks give an actual view of the network which can be useful in further investigating secure...

  20. Adamantane-based amphiphiles (ADAs) for membrane protein study: importance of a detergent hydrophobic group in membrane protein solubilisation.

    Science.gov (United States)

    Chae, Pil Seok; Bae, Hyoung Eun; Das, Manabendra

    2014-10-21

    We prepared adamantane-containing amphiphiles and evaluated them using a large membrane protein complex in terms of protein solubilisation and stabilization efficacy. These agents were superior to conventional detergents, especially in terms of the membrane protein solubilisation efficiency, implying a new detergent structure-property relationship.