WorldWideScience

Sample records for multiple attack study

  1. Gray Matter Is Targeted in First-Attack Multiple Sclerosis

    Schutzer, Steven E.; Angel, Thomas E.; Liu, Tao; Schepmoes, Athena A.; Xie, Fang; Bergquist, Jonas P.; Vecsei, Lazlo' ; Zadori, Denes; Camp, David G.; Holland, Bart K.; Smith, Richard D.; Coyle, Patricia K.

    2013-09-10

    The cause of multiple sclerosis (MS), its driving pathogenesis at the earliest stages, and what factors allow the first clinical attack to manifest remain unknown. Some imaging studies suggest gray rather than white matter may be involved early, and some postulate this may be predictive of developing MS. Other imaging studies are in conflict. To determine if there was objective molecular evidence of gray matter involvement in early MS we used high-resolution mass spectrometry to identify proteins in the cerebrospinal fluid (CSF) of first-attack MS patients (two independent groups) compared to established relapsing remitting (RR) MS and controls. We found that the CSF proteins in first-attack patients were differentially enriched for gray matter components (axon, neuron, synapse). Myelin components did not distinguish these groups. The results support that gray matter dysfunction is involved early in MS, and also may be integral for the initial clinical presentation.

  2. Multiple cyber attacks against a target with observation errors and dependent outcomes: Characterization and optimization

    Hu, Xiaoxiao; Xu, Maochao; Xu, Shouhuai; Zhao, Peng

    2017-01-01

    In this paper we investigate a cybersecurity model: An attacker can launch multiple attacks against a target with a termination strategy that says that the attacker will stop after observing a number of successful attacks or when the attacker is out of attack resources. However, the attacker's observation of the attack outcomes (i.e., random variables indicating whether the target is compromised or not) has an observation error that is specified by both a false-negative and a false-positive probability. The novelty of the model we study is the accommodation of the dependence between the attack outcomes, because the dependence was assumed away in the literature. In this model, we characterize the monotonicity and bounds of the compromise probability (i.e., the probability that the target is compromised). In addition to extensively showing the impact of dependence on quantities such as compromise probability and attack cost, we give methods for finding the optimal strategy that leads to maximum compromise probability or minimum attack cost. This study highlights that the dependence between random variables cannot be assumed away, because the results will be misleading. - Highlights: • A novel cybersecurity model is proposed to accommodate the dependence among attack outcomes. • The monotonicity and bounds of the compromise probability are studied. • The dependence effect on the compromise probability and attack cost is discussed via simulation. • The optimal strategy that leads to maximum compromise probability or minimum attack cost is presented.

  3. Robust multiple frequency multiple power localization schemes in the presence of multiple jamming attacks.

    Ahmed Abdulqader Hussein

    Full Text Available Localization of the wireless sensor network is a vital area acquiring an impressive research concern and called upon to expand more with the rising of its applications. As localization is gaining prominence in wireless sensor network, it is vulnerable to jamming attacks. Jamming attacks disrupt communication opportunity among the sender and receiver and deeply impact the localization process, leading to a huge error of the estimated sensor node position. Therefore, detection and elimination of jamming influence are absolutely indispensable. Range-based techniques especially Received Signal Strength (RSS is facing severe impact of these attacks. This paper proposes algorithms based on Combination Multiple Frequency Multiple Power Localization (C-MFMPL and Step Function Multiple Frequency Multiple Power Localization (SF-MFMPL. The algorithms have been tested in the presence of multiple types of jamming attacks including capture and replay, random and constant jammers over a log normal shadow fading propagation model. In order to overcome the impact of random and constant jammers, the proposed method uses two sets of frequencies shared by the implemented anchor nodes to obtain the averaged RSS readings all over the transmitted frequencies successfully. In addition, three stages of filters have been used to cope with the replayed beacons caused by the capture and replay jammers. In this paper the localization performance of the proposed algorithms for the ideal case which is defined by without the existence of the jamming attack are compared with the case of jamming attacks. The main contribution of this paper is to achieve robust localization performance in the presence of multiple jamming attacks under log normal shadow fading environment with a different simulation conditions and scenarios.

  4. Animal attack: an unusual case of multiple trauma in childhood.

    O'Grady, E

    2014-11-01

    A 2½ year old girl attended our facility following attack by a tapir at a city zoo. She sustained multiple injuries including a forearm laceration and multiple perforating wounds to her abdominal wall. She had several procedures, including bowel resection, performed under the care of the General Paediatric Surgery and Plastic Surgery teams and was treated with a course of IV antibiotics. She recovered well and to date has suffered no long-term adverse outcome.

  5. Diffusion Weighted Imaging in Acute Attacks of Multiple Sclerosis

    Davoudi, Yasmin; Foroughipour, Mohsen; Torabi, Reza; Layegh, Parvaneh; Matin, Nassim; Shoeibi, Ali

    2016-01-01

    Multiple sclerosis (MS) is one of the most common autoimmune disorders of the central nervous system. In spite of various imaging modalities, the definitive diagnosis of MS remains challenging. This study was designed to evaluate the usefulness of diffusion weighted imaging (DWI) in the diagnosis of acute MS attack and to compare its results with contrast enhanced MRI (CE-MRI). In this cross sectional study, seventy patients with definite diagnosis of relapsing-remitting MS were included. CE-MRI using 0.1 mmol/kg gadolinium as well as DWI sequences were performed for all patients. The percentage of patients with positive DWI was compared with the results of CE-MRI and the consistency between the two imaging modalities was evaluated. Moreover, the relationship between the time of onset of patient’s symptoms and test results for both methods were investigated. CE-MRI yielded positive results for 61 (87%) patients and DWI yielded positive for 53 (76%) patients. In fifty patients (71.42%), both tests were positive and in six cases (8.57%), both were negative. The test results of three patients turned out to be positive in DWI, while they tested negative in CE-MRI. There was no significant relationship between the results of CE-MRI as well as DWI and the time of imaging from the onset of symptoms. These data indicate that while CE-MRI will depict more positive results, there are cases in which DWI will show a positive result while CE-MRI is negative. We suggest that the combination of these two imaging modalities might yield more positive results in diagnosing acute MS attack giving rise to a more accurate diagnosis

  6. Speculative Attacks with Multiple Sources of Public Information

    Cornand, Camille; Heinemann, Frank

    2005-01-01

    We propose a speculative attack model in which agents receive multiple public signals. It is characterised by its focus on an informational structure, which sets free from the strict separation between public information and private information. Diverse pieces of public information can be taken into account differently by players and are likely to lead to different appreciations ex post. This process defines players’ private value. The main result is to show that equilibrium uniqueness depend...

  7. Robustness analysis of interdependent networks under multiple-attacking strategies

    Gao, Yan-Li; Chen, Shi-Ming; Nie, Sen; Ma, Fei; Guan, Jun-Jie

    2018-04-01

    The robustness of complex networks under attacks largely depends on the structure of a network and the nature of the attacks. Previous research on interdependent networks has focused on two types of initial attack: random attack and degree-based targeted attack. In this paper, a deliberate attack function is proposed, where six kinds of deliberate attacking strategies can be derived by adjusting the tunable parameters. Moreover, the robustness of four types of interdependent networks (BA-BA, ER-ER, BA-ER and ER-BA) with different coupling modes (random, positive and negative correlation) is evaluated under different attacking strategies. Interesting conclusions could be obtained. It can be found that the positive coupling mode can make the vulnerability of the interdependent network to be absolutely dependent on the most vulnerable sub-network under deliberate attacks, whereas random and negative coupling modes make the vulnerability of interdependent network to be mainly dependent on the being attacked sub-network. The robustness of interdependent network will be enhanced with the degree-degree correlation coefficient varying from positive to negative. Therefore, The negative coupling mode is relatively more optimal than others, which can substantially improve the robustness of the ER-ER network and ER-BA network. In terms of the attacking strategies on interdependent networks, the degree information of node is more valuable than the betweenness. In addition, we found a more efficient attacking strategy for each coupled interdependent network and proposed the corresponding protection strategy for suppressing cascading failure. Our results can be very useful for safety design and protection of interdependent networks.

  8. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  9. DETECTION AND LOCALIZATION OF MULTIPLE SPOOFING ATTACKERS FOR MOBILE WIRELESS NETWORKS

    R. Maivizhi

    2015-06-01

    Full Text Available The openness nature of wireless networks allows adversaries to easily launch variety of spoofing attacks and causes havoc in network performance. Recent approaches used Received Signal Strength (RSS traces, which only detect spoofing attacks in mobile wireless networks. However, it is not always desirable to use these methods as RSS values fluctuate significantly over time due to distance, noise and interference. In this paper, we discusses a novel approach, Mobile spOofing attack DEtection and Localization in WIireless Networks (MODELWIN system, which exploits location information about nodes to detect identity-based spoofing attacks in mobile wireless networks. Also, this approach determines the number of attackers who used the same node identity to masquerade as legitimate device. Moreover, multiple adversaries can be localized accurately. By eliminating attackers the proposed system enhances network performance. We have evaluated our technique through simulation using an 802.11 (WiFi network and an 802.15.4 (Zigbee networks. The results prove that MODELWIN can detect spoofing attacks with a very high detection rate and localize adversaries accurately.

  10. DMP: Detouring Using Multiple Paths against Jamming Attack for Ubiquitous Networking System

    Mihui Kim

    2010-04-01

    Full Text Available To successfully realize the ubiquitous network environment including home automation or industrial control systems, it is important to be able to resist a jamming attack. This has recently been considered as an extremely threatening attack because it can collapse the entire network, despite the existence of basic security protocols such as encryption and authentication. In this paper, we present a method of jamming attack tolerant routing using multiple paths based on zones. The proposed scheme divides the network into zones, and manages the candidate forward nodes of neighbor zones. After detecting an attack, detour nodes decide zones for rerouting, and detour packets destined for victim nodes through forward nodes in the decided zones. Simulation results show that our scheme increases the PDR (Packet Delivery Ratio and decreases the delay significantly in comparison with rerouting by a general routing protocol on sensor networks, AODV (Ad hoc On Demand Distance Vector, and a conventional JAM (Jammed Area Mapping service with one reroute.

  11. DMP: detouring using multiple paths against jamming attack for ubiquitous networking system.

    Kim, Mihui; Chae, Kijoon

    2010-01-01

    To successfully realize the ubiquitous network environment including home automation or industrial control systems, it is important to be able to resist a jamming attack. This has recently been considered as an extremely threatening attack because it can collapse the entire network, despite the existence of basic security protocols such as encryption and authentication. In this paper, we present a method of jamming attack tolerant routing using multiple paths based on zones. The proposed scheme divides the network into zones, and manages the candidate forward nodes of neighbor zones. After detecting an attack, detour nodes decide zones for rerouting, and detour packets destined for victim nodes through forward nodes in the decided zones. Simulation results show that our scheme increases the PDR (Packet Delivery Ratio) and decreases the delay significantly in comparison with rerouting by a general routing protocol on sensor networks, AODV (Ad hoc On Demand Distance Vector), and a conventional JAM (Jammed Area Mapping) service with one reroute.

  12. Clinical study on transient ischemic attack

    Takusagawa, Yoshihiko; Fujiwara, Yasuhiro; Ichiki, Ken; Suga, Takeshi; Nishigaki, Shinichi

    1986-01-01

    The purpose of this study was to neuroradiologically elucidate the mechanism by which transient ischemic attack (TIA) occurs. A total of 65 patients with TIA, including 52 with TIA in the internal carotid artery (Group I) and 13 with TIA in the vertebrobasilar artery (Group II), underwent computed tomography (CT) and cerebral angiography (CAG). In Group I, CAG revealed normal findings in 25 patients, extracranial lesions in 14, intracranial lesions in 11, and mixed extra- and intra-cranial lesions in 2; and the corresponding figures for Group II were 8, 4, 1 and 0, respectively. CT findings in Groups I and II included: normal findings in 27 and 9 patients, atrophied cerebrum and dilated cerebral ventricle in 7 and 2, TIA-unrelated infarction in 5 and one, and TIA-related infarction in 15 and one, respectively. In the 15 patients with TIA-related infarction in Group I, 10 had infarction in the basal cell nucleolus and the other 5 had widespread infarction extending to the area under the cortex. The latter 5 patients had cerebral infarction, and showed recanalization of the vessels. This finding may support the theory of ''microembolus'' as a possible cause of TIA. (Namekawa, K.)

  13. Epileptic negative drop attacks in atypical benign partial epilepsy: a neurophysiological study.

    Hirano, Yoshiko; Oguni, Hirokazu; Osawa, Makiko

    2009-03-01

    We conducted a computer-assisted polygraphic analysis of drop attacks in a child with atypical benign partial epilepsy (ABPE) to investigate neurophysiological characteristics. The patient was a six-year two-month-old girl, who had started to have focal motor seizures, later combined with daily epileptic negative myoclonus (ENM) and drop attacks, causing multiple injuries. We studied episodes of ENM and drop attacks using video-polygraphic and computer-assisted back-averaging analysis. A total of 12 ENM episodes, seven involving the left arm (ENMlt) and five involving both arms (ENMbil), and five drop attacks were captured for analysis. All episodes were time-locked to spike-and-wave complexes (SWC) arising from both centro-temporo-parietal (CTP) areas. The latency between the onset of SWC and ENMlt, ENMbil, and drop attacks reached 68 ms, 42 ms, and 8 ms, respectively. The height of the spike as well as the slow-wave component of SWC for drop attacks were significantly larger than that for both ENMlt and ENMbil (p negative myoclonus involving not only upper proximal but also axial muscles, causing the body to fall. Thus, drop attacks in ABPE are considered to be epileptic negative drop attacks arising from bilateral CTP foci and differ from drop attacks of a generalized origin seen in Lennox-Gastaut syndrome and myoclonic-astatic epilepsy.

  14. A Novel Multiple-Bits Collision Attack Based on Double Detection with Error-Tolerant Mechanism

    Ye Yuan

    2018-01-01

    Full Text Available Side-channel collision attacks are more powerful than traditional side-channel attack without knowing the leakage model or establishing the model. Most attack strategies proposed previously need quantities of power traces with high computational complexity and are sensitive to mistakes, which restricts the attack efficiency seriously. In this paper, we propose a multiple-bits side-channel collision attack based on double distance voting detection (DDVD and also an improved version, involving the error-tolerant mechanism, which can find all 120 relations among 16 key bytes when applied to AES (Advanced Encryption Standard algorithm. In addition, we compare our collision detection method called DDVD with the Euclidean distance and the correlation-enhanced collision method under different intensity of noise, which indicates that our detection technique performs better in the circumstances of noise. Furthermore, 4-bit model of our collision detection method is proven to be optimal in theory and in practice. Meanwhile the corresponding practical attack experiments are also performed on a hardware implementation of AES-128 on FPGA board successfully. Results show that our strategy needs less computation time but more traces than LDPC method and the online time for our strategy is about 90% less than CECA and 96% less than BCA with 90% success rate.

  15. Deep Attack Weapons Mix Study (DAWMS) Case Study

    Bexfield, James

    2001-01-01

    .... This report describes the process used to conduct the Deep Attack Weapons Mix Study (DAWMS) in 1995-1997. This case study focuses on the weapons being procured by the Services and whether a joint viewpoint would result in a more effective mix...

  16. Studies on sulfate attack: Mechanisms, test methods, and modeling

    Santhanam, Manu

    The objective of this research study was to investigate various issues pertaining to the mechanism, testing methods, and modeling of sulfate attack in concrete. The study was divided into the following segments: (1) effect of gypsum formation on the expansion of mortars, (2) attack by the magnesium ion, (3) sulfate attack in the presence of chloride ions---differentiating seawater and groundwater attack, (4) use of admixtures to mitigate sulfate attack---entrained air, sodium citrate, silica fume, and metakaolin, (5) effects of temperature and concentration of the attack solution, (6) development of new test methods using concrete specimens, and (7) modeling of the sulfate attack phenomenon. Mortar specimens using portland cement (PC) and tricalcium silicate (C 3S), with or without mineral admixtures, were prepared and immersed in different sulfate solutions. In addition to this, portland cement concrete specimens were also prepared and subjected to complete and partial immersion in sulfate solutions. Physical measurements, chemical analyses and microstructural studies were performed periodically on the specimens. Gypsum formation was seen to cause expansion of the C3S mortar specimens. Statistical analyses of the data also indicated that the quantity of gypsum was the most significant factor controlling the expansion of mortar bars. The attack by magnesium ion was found to drive the reaction towards the formation of brucite. Decalcification of the C-S-H and its subsequent conversion to the non-cementitious M-S-H was identified as the mechanism of destruction in magnesium sulfate attack. Mineral admixtures were beneficial in combating sodium sulfate attack, while reducing the resistance to magnesium sulfate attack. Air entrainment did not change the measured physical properties, but reduced the visible distress of the mortars. Sodium citrate caused a substantial reduction in the rate of damage of the mortars due to its retarding effect. Temperature and

  17. Neuroradiological study of transient ischemic attack

    Takusagawa, Yoshihiko; Fujiwara, Yasuhiro; Ichiki, Ken; Suga, Takeshi; Nishigaki, Shinichi

    1986-08-01

    Fifty-two patients with carotid TIAs and thirteen patients with vertebrobasilar TIAs were investigated by angiography and computed tomography. TIA was diagnosed by clinical symptoms in accordance with the criteria for TIA of the Joint Committee for Stroke Facilities in the U.S.A. (1974). The 65 patients with TIAs included 49 males and 16 females with average age of 63.5 years old at the initial episode of TIA. As for the diseases associated with TIA, hypertension (51 %), diabetes mellitus (15 %) and ischemic heart diseases (11 %) were the major disorders. Atrial fibrillation was observed in 2 cases. Intervals from last TIA attack to angiography were less than 7 days in 22 cases, 8 -- 30 days in 19 cases, 1 -- 4 monthes in 14 cases and more than 4 monthes in 10 cases, respectively. The cases in which angiography was done earlier after attacks displayed more abnormal findings. In 52 patients with caroted TIAs the artherosclerotic change of extracranial portion of the internal carotid artery was found in 14 cases (27 %), that of intracranial portion of the artery in 11 cases (21 %) and both lesions in 2 cases (4 %). On the other hand, in 13 patients with vertebrobasilar TIAs, this change was observed in 4 cases at the extracranival potion and in 1 case at the intracranial potion (siphon) of the internal carotid artery. Abnormal CT findings were found in 29 of 65 patients, namely 9 had ventricular dilatation and brain atrophy, 6 had cerebral infarction which was not associated with associated with symptoms of TIA. In carotid TIAs, Cerebral infarction was associated with symptoms of TIAs in 15 cases, namely 10 had a small low density area in the basal ganglia near the internal capsule and 5 had a low density area in the cortical or subcortical region. All of these 5 cases had cerebral embolism, which recanalized after attacks. (J.P.N.).

  18. Neuroradiological study of transient ischemic attack

    Takusagawa, Yoshihiko; Fujiwara, Yasuhiro; Ichiki, Ken; Suga, Takeshi; Nishigaki, Shinichi

    1986-01-01

    Fifty-two patients with carotid TIAs and thirteen patients with vertebrobasilar TIAs were investigated by angiography and computed tomography. TIA was diagnosed by clinical symptoms in accordance with the criteria for TIA of the Joint Committee for Stroke Facilities in the U.S.A. (1974). The 65 patients with TIAs included 49 males and 16 females with average age of 63.5 years old at the initial episode of TIA. As for the diseases associated with TIA, hypertension (51 %), diabetes mellitus (15 %) and ischemic heart diseases (11 %) were the major disorders. Atrial fibrillation was observed in 2 cases. Intervals from last TIA attack to angiography were less than 7 days in 22 cases, 8 ∼ 30 days in 19 cases, 1 ∼ 4 monthes in 14 cases and more than 4 monthes in 10 cases, respectively. The cases in which angiography was done earlier after attacks displayed more abnormal findings. In 52 patients with caroted TIAs the artherosclerotic change of extracranial portion of the internal carotid artery was found in 14 cases (27 %), that of intracranial portion of the artery in 11 cases (21 %) and both lesions in 2 cases (4 %). On the other hand, in 13 patients with vertebrobasilar TIAs, this change was observed in 4 cases at the extracranival potion and in 1 case at the intracranial potion (siphon) of the internal carotid artery. Abnormal CT findings were found in 29 of 65 patients, namely 9 had ventricular dilatation and brain atrophy, 6 had cerebral infarction which was not associated with associated with symptoms of TIA. In carotid TIAs, Cerebral infarction was associated with symptoms of TIAs in 15 cases, namely 10 had a small low density area in the basal ganglia near the internal capsule and 5 had a low density area in the cortical or subcortical region. All of these 5 cases had cerebral embolism, which recanalized after attacks. (J.P.N.)

  19. Single and Multiple UAV Cyber-Attack Simulation and Performance Evaluation

    Ahmad Y. Javaid

    2015-02-01

    Full Text Available Usage of ground, air and underwater unmanned vehicles (UGV, UAV and UUV has increased exponentially in the recent past with industries producing thousands of these unmanned vehicles every year.With the ongoing discussion of integration of UAVs in the US National Airspace, the need of a cost-effective way to verify the security and resilience of a group of communicating UAVs under attack has become very important. The answer to this need is a simulation testbed which can be used to simulate the UAV Network (UAVNet. One of these attempts is - UAVSim (Unmanned Aerial Vehicle Simulation testbed developed at the University of Toledo. It has the capability of simulating large UAV networks as well as small UAV networks with large number of attack nodes. In this paper, we analyse the performance of the simulation testbed for two attacks, targeting single and multiple UAVs. Traditional and generic computing resource available in a regular computer laboratory was used. Various evaluation results have been presented and analysed which suggest the suitability of UAVSim for UAVNet attack and swarm simulation applications.

  20. Blood flow velocity in migraine attacks - a transcranial Doppler study

    Zwetsloot, C.P.; Caekebeke, J.F.V.; Jansen, J.C.; Odink, J.; Ferrari, M.D.

    1991-01-01

    A pulsed Doppler device was used to measure blood flow velocities in the common carotid artery, the extracranial part of the internal carotid artery, the external carotid artery, the middle cerebral artery, and the anterior cerebral artery in 31 migraneurs without aura (n=27) and with aura (n=4), both during and ouside an attack. The aims were to compare blood flow velocity during and between migraine attacks and to study asymmetries of the blood flow velocity. Compared with blood flow velocity values obtained in the attack-free interval, blood flow velocity was lower during attacks without aura in both common carotid arteries, but not in the other extra- and intracranial vessels which were examined. However, during attacks of migraine with aura, blood flow velocity tended to be lower in all examined vessels. There were no asymmetries of the blood flow velocity. It is suggested that during migraine attacks without aura there is a dissociation in blood flow regulation in the common carotid and middle cerebral arteries. 20 refs., 2 tabs

  1. Blood flow velocity in migraine attacks - a transcranial Doppler study

    Zwetsloot, C.P.; Caekebeke, J.F.V.; Jansen, J.C.; Odink, J.; Ferrari, M.D. (Rijksuniversiteit Leiden (Netherlands))

    1991-05-01

    A pulsed Doppler device was used to measure blood flow velocities in the common carotid artery, the extracranial part of the internal carotid artery, the external carotid artery, the middle cerebral artery, and the anterior cerebral artery in 31 migraneurs without aura (n=27) and with aura (n=4), both during and ouside an attack. The aims were to compare blood flow velocity during and between migraine attacks and to study asymmetries of the blood flow velocity. Compared with blood flow velocity values obtained in the attack-free interval, blood flow velocity was lower during attacks without aura in both common carotid arteries, but not in the other extra- and intracranial vessels which were examined. However, during attacks of migraine with aura, blood flow velocity tended to be lower in all examined vessels. There were no asymmetries of the blood flow velocity. It is suggested that during migraine attacks without aura there is a dissociation in blood flow regulation in the common carotid and middle cerebral arteries. 20 refs., 2 tabs.

  2. CD26 + CD4 + T cell counts and attack risk in interferon-treated multiple sclerosis

    Sellebjerg, F; Ross, C; Koch-Henriksen, Nils

    2005-01-01

    in patients with CD26 + CD4 + T cell counts above median, and this risk was independent of the risk conferred by neutralizing anti-IFN-beta antibodies. CD26 + CD4 + T cell counts may identify patients with MS at increased risk of attack during treatment with IFN-beta....... and CCR5 on T cells is altered in patients with active MS. We studied the expression of these molecules by flow cytometry in patients followed for six months during immunomodulatory treatment. In interferon (IFN)-beta-treated patients, we found that the hazard ratio for developing an attack was 28...

  3. The effects of stress, anxiety, and outdoor temperature on the frequency and severity of Raynaud's attacks: the Raynaud's Treatment Study.

    Brown, K M; Middaugh, S J; Haythornthwaite, J A; Bielory, L

    2001-04-01

    It was expected that stress and anxiety would be related to Raynaud's phenomenon (RP) attack characteristics when mild outdoor temperatures produced partial or no digital vasoconstriction. Hypotheses were that in warmer temperature categories, compared to those below 40 degrees F, higher stress or anxiety would be associated with more frequent, severe, and painful attacks. The Raynaud's Treatment Study recruited 313 participants with primary RP. Outcomes were attack rate, severity, and pain. Predictors were average daily outdoor temperature, stress, anxiety, age, gender, and a stress-by-temperature or an anxiety-by-temperature interaction. Outcomes were tested separately in multiple linear regression models. Stress and anxiety were tested in separate models. Stress was not a significant predictor of RP attack characteristics. Higher anxiety was related to more frequent attacks above 60 degrees F. It was also related to greater attack severity at all temperatures, and to greater pain above 60 degrees F and between 40 degrees and 49.9 degrees F.

  4. Olfactory bulb and olfactory sulcus depths are associated with disease duration and attack frequency in multiple sclerosis patients.

    Tanik, Nermin; Serin, Halil Ibrahim; Celikbilek, Asuman; Inan, Levent Ertugrul; Gundogdu, Fatma

    2015-11-15

    Multiple sclerosis (MS) is a neuroinflammatory and neurodegenerative disease that progresses to axonal loss and demyelinization. Olfactory dysfunction in patients with MS has been reported frequently. We were interested in the associations of olfactory bulb (OB) and olfactory sulcus depth (OSD) with disease duration and attack frequency. We included 25 patients with MS and 30 age- and sex-matched controls in this study. The Expanded Disability Status Scale, Beck Depression Inventory, and Mini Mental State Examination were applied. OB, OSD, and magnetic resonance imaging plaque numbers were calculated. OB volume and OSD in patients with MS were significantly lower than those in the control group (right and left OB: p<0.001; right OSD: p=0.001; and left OSD: p=0.039). Disease duration was negatively correlated with right and left OB volume (right OB: r=-0.434, p=0.030 and left OB: r=-0.518, p=0.008). Attack frequency was negatively correlated with left OB volume and left OSD (left OB: r=-0.428, p=0.033 and left OSD: r=-0.431, p=0.032). The OB and OSD were atrophied significantly in patients with MS, and this was correlated with disease duration and attack frequency. The left side tended to be dominant. Copyright © 2015 Elsevier B.V. All rights reserved.

  5. The contribution of diffusion-weighted MR imaging in multiple sclerosis during acute attack

    Yurtsever, Ismail; Hakyemez, Bahattin; Taskapilioglu, Ozlem; Erdogan, Cuneyt; Turan, Omer Faruk; Parlak, Mufit

    2008-01-01

    Purpose: The aims of the study are firstly, to determine the difference in diffusion-weighted imaging (DWI) in normal appearing white matter (NAWM) between patients with acute multiple sclerosis (MS) and controls; secondly, to determine whether there is a correlation between EDSS scores and DWI in acute plaques and also NAWM. Materials and method: Out of 50 patients with acute MS attack, 35 patients had active plaques with diffuse or ring enhancement on postcontrast images. Eighteen healthy volunteers constituted the control group. While 26 of 35 had relapsing-remitting, 9 had secondary progressive MS. Apparent diffusion coefficients (ADC) of the active plaques, NAWM at the level of centrum semiovale and occipital horn of lateral ventricle in the patients and NAWM in control group were measured. ADC values of active plaques were compared with WM of the patients and the control group. The relationship of ADC value of active plaques and WM in MS with expanded disability status scale (EDSS) was investigated by using Mann-Whitney U-test. Results: Of 63 plaques totally, 26 and 37 of the active plaques had diffuse and ring enhancement, respectively. There was no statistically significant difference between ADC value of active plaques and EDSS (p > 0.05). However, there was a statistically significant difference between ADC value of WM occipital horn and EDSS (p 0.05). Conclusion: Apparently normal tissue in MS patients may show early abnormalities when investigated carefully enough, and there is an even though moderate correlation between EDSS and ADC values and early alterations of ADC value are starting in the occipital white matter along the ventricles. This has to be verified in larger series

  6. Case studies of attacks on communication networks

    Kang, Sin Bok; Han, Eon Suk [Korea Atomic Energy Research Institute, Taejon (Korea, Republic of)

    1996-06-15

    Recently, as the computer hardware and communications are developed, the data exchange through inter-networking has been highlighted and the data is being recognized as a great asset. Most of the organizations, businesses and enterprises are open to the external world-computer communication networks, attention must be focused on the securities of the information infrastructure. A government organization has been developing 'Circuits Analyzers', and 'Hacker-Tracking Program' and is struggling to track down sneakers. In this report, we analyze the contents of the cases where the communication network has been invaded, from the past up until now in Korea. This report also contains the result of a study on E-mail security, for the protection of KAERI Integrated Management Information System under which utilizes the CALS concepts and web services. (Author)

  7. Case studies of attacks on communication networks

    Kang, Sin Bok; Han, Eon Suk

    1996-06-01

    Recently, as the computer hardware and communications are developed, the data exchange through inter-networking has been highlighted and the data is being recognized as a great asset. Most of the organizations, businesses and enterprises are open to the external world-computer communication networks, attention must be focused on the securities of the information infrastructure. A government organization has been developing 'Circuits Analyzers', and 'Hacker-Tracking Program' and is struggling to track down sneakers. In this report, we analyze the contents of the cases where the communication network has been invaded, from the past up until now in Korea. This report also contains the result of a study on E-mail security, for the protection of KAERI Integrated Management Information System under which utilizes the CALS concepts and web services. (Author)

  8. Study of attack in college volleyball

    Yordan Portela Pozo

    2014-03-01

    This work is done in order to analyze the positive and negative aspects that affected the performance of the auction action in volleyball players performing this action (in this case male in the Provincial University Games in 2012 in Havana , for which I take as a case study to the players of the University of Information Sciences and its opponents in those games, completing a total of 268 shares auctions in 7 games with a total of 15 September analyzed taking account of changes in the sport of Volleyball university in Cuba, data recorded by an observation sheet previously completed by the authors. The main results in this paper show that the greatest amount of shots that were done in these games were diagonal and a good percentage of positive linear auctions however were few and with very poor results. The primary role of the auction for the game's success is fully confirmed in this work because this action is achieved through many points in the game of volleyball and thus leads to a better result.

  9. Involvement of individual subsites and secondary substrate binding sites in multiple attack on amylose by barley alpha-amylase

    Kramhøft, Birte; Bak-Jensen, Kristian Sass; Mori, Haruhide

    2005-01-01

    Barley alpha-amylase 1 (AMY1) hydrolyzed amylose with a degree of multiple attack (DMA) of 1.9; that is, on average, 2.9 glycoside bonds are cleaved per productive enzyme-substrate encounter. Six AMY1 mutants, spanning the substrate binding cleft from subsites -6 to +4, and a fusion protein, AMY1...... translocation of substrate in the binding cleft upon the initial cleavage to produce G6-G10, essentially independent of subsite mutations, and short-distance moves resulting in individually very different rates of release of G1-G4. Accordingly, the degree of multiple attack as well as the profile of products...

  10. Engineering a horseradish peroxidase C stable to radical attacks by mutating multiple radical coupling sites.

    Kim, Su Jin; Joo, Jeong Chan; Song, Bong Keun; Yoo, Young Je; Kim, Yong Hwan

    2015-04-01

    Peroxidases have great potential as industrial biocatalysts. In particular, the oxidative polymerization of phenolic compounds catalyzed by peroxidases has been extensively examined because of the advantage of this method over other conventional chemical methods. However, the industrial application of peroxidases is often limited because of their rapid inactivation by phenoxyl radicals during oxidative polymerization. In this work, we report a novel protein engineering approach to improve the radical stability of horseradish peroxidase isozyme C (HRPC). Phenylalanine residues that are vulnerable to modification by the phenoxyl radicals were identified using mass spectrometry analysis. UV-Vis and CD spectra showed that radical coupling did not change the secondary structure or the active site of HRPC. Four phenylalanine (Phe) residues (F68, F142, F143, and F179) were each mutated to alanine residues to generate single mutants to examine the role of these sites in radical coupling. Despite marginal improvement of radical stability, each single mutant still exhibited rapid radical inactivation. To further reduce inactivation by radical coupling, the four substitution mutations were combined in F68A/F142A/F143A/F179A. This mutant demonstrated dramatic enhancement of radical stability by retaining 41% of its initial activity compared to the wild-type, which was completely inactivated. Structure and sequence alignment revealed that radical-vulnerable Phe residues of HPRC are conserved in homologous peroxidases, which showed the same rapid inactivation tendency as HRPC. Based on our site-directed mutagenesis and biochemical characterization, we have shown that engineering radical-vulnerable residues to eliminate multiple radical coupling can be a good strategy to improve the stability of peroxidases against radical attack. © 2014 Wiley Periodicals, Inc.

  11. An Analysis of Media’s Role: Case Study of Army Public School (APS Peshawar Attack

    Qureshi Rameesha

    2016-12-01

    Full Text Available The study aimed at analyzing the role of media during and after terrorist attacks by examining the media handling of APS Peshawar attack. The sample consisted of males and females selected on convenience basis from universities of Rawalpindi and Islamabad. It was hypothesized that (1 Extensive media coverage of terrorist attacks leads to greater publicity/recognition of terrorist groups (2 Media coverage of APS Peshawar attack increased fear and anxiety in public (3 Positive media handling/coverage of APS Peshawar attack led to public solidarity and peace. The results indicate that i Media coverage of terrorist attacks does help terrorist groups to gain publicity and recognition amongst public ii Media coverage of Aps Peshawar attack did not increase fear/anxiety in fact it directed the Pakistani nation towards public solidarity and peace.

  12. Sleep bruxism possibly triggered by multiple sclerosis attacks and treated successfully with botulinum toxin: Report of three cases.

    Sevim, Serhan; Kaleağası, Hakan; Fidancı, Halit

    2015-09-01

    Sleep bruxism refers to a nocturnal parafunctional activity including the clenching, grinding or gnashing of teeth. While most of the nocturnal bruxism cases seen in the general population are apparently idiopathic, it has been reported to be associated with a range of neurological diseases such as Huntington's disease, cranio-cervical dystonia and post-anoxic brain damage, but not multiple sclerosis (MS). We describe three cases of MS patients who have had moderate to severe complaints of bruxism in the two weeks following their relevant MS attacks. None of the three patients had a diagnosis of bruxism prior to her attack. The diagnosis was confirmed in one out of three by a polysomnography. One patient did not have any complaints related to bruxism previous to her attack, whereas two had mild and infrequent complaints. The symptoms of the relevant attacks were left hemihypesthesia in all and hemiparesis in two. None of the patients had spasticity that could result in severe teeth clenching. All three patients presented with morning headaches and jaw pain or tightness and were treated successfully with botulinum toxin (Btx) injections applied to their masseter and temporalis muscles. The cause of bruxism is controversial but lesions of the cortico-basalganglia-thalamo-cotrical loops are thought to be most likely. However, acute or chronic lesions in those pathways were not demonstrated in the 3 patients. It is feasible that they had normal appearing white matter interruptions in their cortico-basalganglia-thalamocortical loops along with their relevant attack. Copyright © 2015 Elsevier B.V. All rights reserved.

  13. A multiple linear regression analysis of hot corrosion attack on a series of nickel base turbine alloys

    Barrett, C. A.

    1985-01-01

    Multiple linear regression analysis was used to determine an equation for estimating hot corrosion attack for a series of Ni base cast turbine alloys. The U transform (i.e., 1/sin (% A/100) to the 1/2) was shown to give the best estimate of the dependent variable, y. A complete second degree equation is described for the centered" weight chemistries for the elements Cr, Al, Ti, Mo, W, Cb, Ta, and Co. In addition linear terms for the minor elements C, B, and Zr were added for a basic 47 term equation. The best reduced equation was determined by the stepwise selection method with essentially 13 terms. The Cr term was found to be the most important accounting for 60 percent of the explained variability hot corrosion attack.

  14. Development of an accelerated test for Internal Sulfate Attack study

    Khelil Nacim

    2014-04-01

    Full Text Available Internal Sulfate Attack (ISA is a pathology that occurs under certain conditions in concrete having undergone heating above 70 °C at early age (through heating in pre-casting industry or due to hydration in large concrete parts. This reaction deemed very slow, numerous methods to speed up reactions leading to delayed ettringite formation have been developed. These methods are all based on the material damage. Another type of test is currently under development. It is based on rehabilitation techniques such as electrochemical chloride extraction (ECE in order to accelerate the leaching of alkalis that could be one of the triggers of the pathology. The study presented in this paper focused on concrete specimens prepared from cement (CEM I 52.5 N enriched with Na2SO4. These concretes have undergone a heat treatment typical of those used in precast plants (up to 24 hours with a maximum temperature of 80 °C. Various paths were explored for the development of the accelerated test. The first results showed that it was necessary to use a removable titanium anode ruthenium anode instead of stainless steel embedded in the concrete. Then tests with de-ionized water as the solute to the cathode did not accelerate the onset of expansions. The experiment has been modified and potassium carbonate was added to the solution. This modification didn’t show any significant improvement, and other experiments are being carried out to explain this result.

  15. Study of DSR and AODV under Sinkhole Attack and Its Proposed Prevention Technique

    Winnie Main; Narendra M. Shekokar

    2014-01-01

    Mobile Ad-hoc Networks (MANET) are wireless mobile nodes that communicate without any predefined infrastructure. This allows MANETs to be easily setup in geographical and terrestrial constraints. To achieve this kind of communication MANET routing protocols play an important role. Two routing protocols, DSR and AODV are studied in detail. This basic trait of a MANET makes its routing protocols very vulnerable to security attacks. One such attack is the ‘Sinkhole’ attack which ...

  16. Detecting SYN flood attacks via statistical monitoring charts: A comparative study

    Bouyeddou, Benamar

    2017-12-14

    Accurate detection of cyber-attacks plays a central role in safeguarding computer networks and information systems. This paper addresses the problem of detecting SYN flood attacks, which are the most popular Denial of Service (DoS) attacks. Here, we compare the detection capacity of three commonly monitoring charts namely, a Shewhart chart, a Cumulative Sum (CUSUM) control chart and exponentially weighted moving average (EWMA) chart, in detecting SYN flood attacks. The comparison study is conducted using the publicly available benchmark datasets: the 1999 DARPA Intrusion Detection Evaluation Datasets.

  17. Security awareness for public bus transportation : case studies of attacks against the Israeli public bus system.

    2012-03-01

    This report presents 16 case studies of attacks planned or carried out against Israeli bus targets, along with statistical data on the number, frequency, and lethality of attacks against bus targets that have taken place in Israel since 1970 and duri...

  18. STUDY OF PRIVILEGE ESCALATION ATTACK ON ANDROID AND ITS COUNTERMEASURES

    REJO MATHEW

    2012-01-01

    Android is most commonly used platform for smartphones today which boasts of an advanced security model having MAC and sandboxing. These features allow developers and users to restrict the execution of anapplication to the privileges assigned. The exploitation of vulnerabilities of the program is confined within the privilege boundaries of an applications sandbox. Privilege escalation attacks have grown manifold as the use of android systems have increased. Different kinds of mechanisms have ...

  19. Exploring Energy Consumption of Juice Filming Charging Attack on Smartphones: A Pilot Study

    Jiang, Lijun; Meng, Weizhi; Wang, Michael Yu

    2017-01-01

    ) attack is one example, which can steal users’ sensitive information from both Android OS and iOS devices, through automatically recording phone-screen information and the user inputs during the charging process. The rationale is that users’ information can be leaked through a standard micro USB connector...... that employs the Mobile High-Definition Link (MHL) standard. Motivated by the potential damage of charging attack, we focus on JFC attack in this paper, and investigate for the first time the energy consumption, especially CPU usage caused by JFC attack. In particular, we conduct a user study with over 500...... participants and identify that JFC attack may increase CPU usage when connecting the phone to the malicious charger, but this anomaly is hard for raising the attention from a common user. Our work aims to complement existing state-of-the-art results, raise more attention and stimulate more research on charging...

  20. Targeting p110gamma in gastrointestinal cancers: attack on multiple fronts

    Marco eFalasca

    2014-10-01

    Full Text Available Phosphoinositide 3-kinases (PI3Ks regulate several cellular functions that are critical for cancer progression and development, including cell survival, proliferation and migration. Three classes of PI3Ks exist with the class I PI3K encompassing four isoforms of the catalytic subunit known as p110α, p110β, p110γ and p110δ. Although for many years attention has been mainly focused on p110α recent evidence supports the conclusion that p110β, p110γ and p110δ can also have a role in cancer. Amongst these, accumulating evidence now supports the conclusion that p110γ is involved in several cellular processes associated with cancer development and progression and indeed this specific isoform has emerged as a novel important player in cancer progression. Studies from our laboratory have identified a specific overexpression of p110γ in human pancreatic ductal adenocarcinoma (PDAC and in hepatocellular carcinoma (HCC tissues compared to their normal counterparts. Our data have further established that selective inhibition of this PI3K isoform is able to block PDAC and HCC cell proliferation, strongly suggesting that pharmacological inhibition of this enzyme can directly affect these tumors growth. Furthermore increasing evidence suggests that p110γ plays also a key role in the interactions between cancer cells and tumor microenvironment and in particular in tumor-associated immune response. It has also been reported that p110γ can regulate invasion of myeloid cells into tumors and tumor angiogenesis. Finally p110γ has also been directly involved in regulation of cancer cell migration. Taken together these data indicate that p110γ plays multiple roles in regulation of several processes that are critical for tumor progression and metastasis. This review will discuss the role of p110γ in gastrointestinal tumor development and progression and how targeting this enzyme might represent a way to target very aggressive tumors such as pancreatic and

  1. A Collaborative Approach for Monitoring Nodes Behavior during Spectrum Sensing to Mitigate Multiple Attacks in Cognitive Radio Networks

    Mahmoud Khasawneh

    2017-01-01

    Full Text Available Spectrum sensing is the first step to overcome the spectrum scarcity problem in Cognitive Radio Networks (CRNs wherein all unutilized subbands in the radio environment are explored for better spectrum utilization. Adversary nodes can threaten these spectrum sensing results by launching passive and active attacks that prevent legitimate nodes from using the spectrum efficiently. Securing the spectrum sensing process has become an important issue in CRNs in order to ensure reliable and secure spectrum sensing and fair management of resources. In this paper, a novel collaborative approach during spectrum sensing process is proposed. It monitors the behavior of sensing nodes and identifies the malicious and misbehaving sensing nodes. The proposed approach measures the node’s sensing reliability using a value called belief level. All the sensing nodes are grouped into a specific number of clusters. In each cluster, a sensing node is selected as a cluster head that is responsible for collecting sensing-reputation reports from different cognitive nodes about each node in the same cluster. The cluster head analyzes information to monitor and judge the nodes’ behavior. By simulating the proposed approach, we showed its importance and its efficiency for achieving better spectrum security by mitigating multiple passive and active attacks.

  2. Recurrent transient ischaemic attack and early risk of stroke: data from the PROMAPA study.

    Purroy, Francisco; Jiménez Caballero, Pedro Enrique; Gorospe, Arantza; Torres, María José; Alvarez-Sabin, José; Santamarina, Estevo; Martínez-Sánchez, Patricia; Cánovas, David; Freijo, María José; Egido, Jose Antonio; Ramírez-Moreno, Jose M; Alonso-Arias, Arantza; Rodríguez-Campello, Ana; Casado, Ignacio; Delgado-Mederos, Raquel; Martí-Fàbregas, Joan; Fuentes, Blanca; Silva, Yolanda; Quesada, Helena; Cardona, Pere; Morales, Ana; de la Ossa, Natalia Pérez; García-Pastor, Antonio; Arenillas, Juan F; Segura, Tomas; Jiménez, Carmen; Masjuán, Jaime

    2013-06-01

    Many guidelines recommend urgent intervention for patients with two or more transient ischaemic attacks (TIAs) within 7 days (multiple TIAs) to reduce the early risk of stroke. To determine whether all patients with multiple TIAs have the same high early risk of stroke. Between April 2008 and December 2009, we included 1255 consecutive patients with a TIA from 30 Spanish stroke centres (PROMAPA study). We prospectively recorded clinical characteristics. We also determined the short-term risk of stroke (at 7 and 90 days). Aetiology was categorised using the TOAST (Trial of Org 10172 in Acute Stroke Treatment) classification. Clinical variables and extracranial vascular imaging were available and assessed in 1137/1255 (90.6%) patients. 7-Day and 90-day stroke risk were 2.6% and 3.8%, respectively. Large-artery atherosclerosis (LAA) was confirmed in 190 (16.7%) patients. Multiple TIAs were seen in 274 (24.1%) patients. Duration <1 h (OR=2.97, 95% CI 2.20 to 4.01, p<0.001), LAA (OR=1.92, 95% CI 1.35 to 2.72, p<0.001) and motor weakness (OR=1.37, 95% CI 1.03 to 1.81, p=0.031) were independent predictors of multiple TIAs. The subsequent risk of stroke in these patients at 7 and 90 days was significantly higher than the risk after a single TIA (5.9% vs 1.5%, p<0.001 and 6.8% vs 3.0%, respectively). In the logistic regression model, among patients with multiple TIAs, no variables remained as independent predictors of stroke recurrence. According to our results, multiple TIAs within 7 days are associated with a greater subsequent risk of stroke than after a single TIA. Nevertheless, we found no independent predictor of stroke recurrence among these patients.

  3. Project ATTACK and Project VISTA: Benchmark studies on the road to NATO's early TNF policy

    Garrity, P.J.

    1994-01-01

    This paper is concerned with those studies and analyses that affected early NATO nuclear policy and force structure. The discussion focuses specifically on two open-quotes benchmarkclose quotes activities. Project VISTA and Project ATTACK. These two studies were chosen less because one can document their direct impact on NATO nuclear policy and more because they capture the state of thinking about tactical nuclear weapons at a particular point of time. Project VISTA offers an especially important benchmark in this respect. Project ATTACK is a rather different kind of benchmark. It is not a pathbreaking study. It is much narrower and more technical than VISTA. It appears to have received no public attention. Project ATTACK is interesting because it seems to capture a open-quotes nuts-and-boltsclose quotes feel for how U.S. (and thereby NATO) theater nuclear policy was evolving prior to MC 48. The background and context for Project VISTA and Project ATTACK are presented and discussed

  4. Classification of HTTP Attacks: A Study on the ECML/PKDD 2007 Discovery Challenge

    Gallagher, Brian [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Eliassi-Rad, Tina [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2009-07-08

    As the world becomes more reliant on Web applications for commercial, financial, and medical transactions, cyber attacks on the World Wide Web are increasing in frequency and severity. Web applications provide an attractive alternative to traditional desktop applications due to their accessibility and ease of deployment. However, the accessibility of Web applications also makes them extremely vulnerable to attack. This inherent vulnerability is intensified by the distributed nature ofWeb applications and the complexity of configuring application servers. These factors have led to a proliferation of Web-based attacks, in which attackers surreptitiously inject code into HTTP requests, allowing them to execute arbitrary commands on remote systems and perform malicious activities such as reading, altering, or destroying sensitive data. One approach for dealing with HTTP-based attacks is to identify malicious code in incoming HTTP requests and eliminate bad requests before they are processed. Using machine learning techniques, we can build a classifier to automatically label requests as “Valid” or “Attack.” For this study, we develop a simple, but effective HTTP attack classifier, based on the vector space model used commonly for Information Retrieval. Our classifier not only separates attacks from valid requests, but can also identify specific attack types (e.g., “SQL Injection” or “Path Traversal”). We demonstrate the effectiveness of our approach through experiments on the ECML/PKDD 2007 Discovery Challenge data set. Specifically, we show that our approach achieves higher precision and recall than previous methods. In addition, our approach has a number of desirable characteristics, including robustness to missing contextual information, interpretability of models, and scalability.

  5. Hypergraph Representations: A Study of Carib Attacks on Colonial Forces, 1509-1700

    Termeh Shafie

    2017-10-01

    Full Text Available Network data consisting of recorded historical events can be represented as hyper-graphs where the ties or events can connect any number of nodes or event related attributes. In this paper, we perform a centrality analysis of a directed hypergraph representing attacks by indigenous peoples from the Lesser Antilles on European colonial settlements, 1509–1700. The results of central attacks with respect to at- tacked colonial force, member of attack alliances, and year and location of attack are discussed and compared to a non-relational exploratory analysis of the data. This comparison points to the importance of a mixed methods approach to enhance the analysis and to obtain a complementary understanding of a network study.

  6. A Study on the VHCF Fatigue Behaviors of Hydrogen Attacked Inconel 718 Alloy

    Suh, Chang-Min [Kyungpook National Univ., DMI Senior Fellow, Daegu (Korea, Republic of); Nahm, Seung-Hoon [Korea Research Institute of Standards and Science, Daejeon (Korea, Republic of); Kim, Jun-Hyong; Pyun, Young-Sik [Sun Moon Univ., Chunan (Korea, Republic of)

    2016-07-15

    This study is to investigate the influence of hydrogen attack and UNSM on fatigue behaviors of the Inconel 718 alloy. The decrease of the fatigue life between the untreated and the hydrogen attacked material is 10-20%. The fatigue lives of hydrogen attacked specimen decreased without a fatigue limit, similar to those of nonferrous materials. Due to hydrogen embrittlement, about 80% of the surface cracks were smaller than the average grain size of 13 μm. Many small surface cracks caused by the embrittling effect of hydrogen attack were initiated at the grain boundaries and surface scratches. Cracks were irregularly distributed, grew, and then coalesced through tearing, leading to a reduction of fatigue life. Results revealed that the fatigue lives of UNSM-treated specimens were longer than those of the untreated specimens.

  7. Creative Persuasion: A Study on Adversarial Behaviors and Strategies in Phishing Attacks.

    Rajivan, Prashanth; Gonzalez, Cleotilde

    2018-01-01

    Success of phishing attacks depend on effective exploitation of human weaknesses. This research explores a largely ignored, but crucial aspect of phishing: the adversarial behavior. We aim at understanding human behaviors and strategies that adversaries use, and how these may determine the end-user response to phishing emails. We accomplish this through a novel experiment paradigm involving two phases. In the adversarial phase, 105 participants played the role of a phishing adversary who were incentivized to produce multiple phishing emails that would evade detection and persuade end-users to respond. In the end-user phase, 340 participants performed an email management task, where they examined and classified phishing emails generated by participants in phase-one along with benign emails. Participants in the adversary role, self-reported the strategies they employed in each email they created, and responded to a test of individual creativity. Data from both phases of the study was combined and analyzed, to measure the effect of adversarial behaviors on end-user response to phishing emails. We found that participants who persistently used specific attack strategies (e.g., sending notifications, use of authoritative tone, or expressing shared interest) in all their attempts were overall more successful, compared to others who explored different strategies in each attempt. We also found that strategies largely determined whether an end-user was more likely to respond to an email immediately, or delete it. Individual creativity was not a reliable predictor of adversarial performance, but it was a predictor of an adversary's ability to evade detection. In summary, the phishing example provided initially, the strategies used, and the participants' persistence with some of the strategies led to higher performance in persuading end-users to respond to phishing emails. These insights may be used to inform tools and training procedures to detect phishing strategies in

  8. A study of mobile botnets: analysis of attack strategies

    Pieterse, H

    2012-10-01

    Full Text Available and the internet. The situation has changed significantly with the fast-growing popularity of smartphones such as Android- based phones and Apple?s iPhone. Today, smartphones offer their users endless capabilities and allow communication to occur via multiple... mechanisms. Due to the popularity of smartphones and the advanced capabilities offered, botnets are expected to move towards mobile networks. A mobile botnet is a collection of compromised smartphones controlled by a botmaster through a command...

  9. Brain Tissue Volumes and Perfusion Change with the Number of Optic Neuritis Attacks in Relapsing Neuromyelitis Optica: A Voxel-Based Correlation Study.

    Carlos A Sánchez-Catasús

    Full Text Available Recent neuroimaging studies show that brain abnormalities in neuromyelitis optica (NMO are more frequent than earlier described. Yet, more research considering multiple aspects of NMO is necessary to better understand these abnormalities. A clinical feature of relapsing NMO (RNMO is that the incremental disability is attack-related. Therefore, association between the attack-related process and neuroimaging might be expected. On the other hand, the immunopathological analysis of NMO lesions has suggested that CNS microvasculature could be an early disease target, which could alter brain perfusion. Brain tissue volume changes accompanying perfusion alteration could also be expected throughout the attack-related process. The aim of this study was to investigate in RNMO patients, by voxel-based correlation analysis, the assumed associations between regional brain white (WMV and grey matter volumes (GMV and/or perfusion on one side, and the number of optic neuritis (ON attacks, myelitis attacks and/or total attacks on the other side. For this purpose, high resolution T1-weighted MRI and perfusion SPECT imaging were obtained in 15 RNMO patients. The results showed negative regional correlations of WMV, GMV and perfusion with the number of ON attacks, involving important components of the visual system, which could be relevant for the comprehension of incremental visual disability in RNMO. We also found positive regional correlation of perfusion with the number of ON attacks, mostly overlapping the brain area where the WMV showed negative correlation. This provides evidence that brain microvasculature is an early disease target and suggests that perfusion alteration could be important in the development of brain structural abnormalities in RNMO.

  10. Transient ischemic attacks with and without a relevant infarct on computed tomographic scans cannot be distinguished clinically. Dutch Transient Ischemic Attack Study Group

    Koudstaal, P. J.; van Gijn, J.; Lodder, J.; Frenken, W. G.; Vermeulen, M.; Franke, C. L.; Hijdra, A.; Bulens, C.

    1991-01-01

    We prospectively studied clinical and computed tomographic (CT) scan findings in 79 patients with a transient ischemic attack (TIA) and a relevant cerebral infarction on CT, also known as cerebral infarction with transient signs (CITS). We compared the results with those of 527 concurrent patients

  11. Movement Conservatism and the Attack on Ethnic Studies

    Nicol, Donna J.

    2013-01-01

    This article offers a critical examination of the role that conservative corporate philanthropy played in initiating the assault against the Ethnic Studies discipline during the Academic Culture Wars of the 1980s and 1990s. This research focuses on the development of movement conservatism as an emerging political force that brought together…

  12. MULTIPLE PERSONALITY: CASE REPORT STUDY

    Miloš Židanik

    2004-07-01

    Full Text Available Background. Multiple personality disorder is characterised by splited individual ego-states and splited professional community arguing whether this disorder actually exists or not.Methods. In this case report study a supportive psychodynamic psychotherapy of a patient with multiple personality disorder is presented, that lasted for 4.5 years and resulted in ego-reintegration.Conclusions. The spliting between different ego-states is powered by unneutralised aggression with the possibility of hetero- and autoaggressive behaviour. Therefore the patient in the analytically oriented psychotherapeutic process is at high risk and a safe therapeutic (e. g. in-patient setting has to be provided.

  13. Short-term outcome of patients with possible transient ischemic attacks: a prospective study

    Correia, Mariana; Fonseca, Ana Catarina; Canh?o, Patr?cia

    2015-01-01

    Background Patients with transient ischemic attack (TIA) have an increased risk of vascular events. There is scarce data regarding the prognosis of patients with transient neurological symptoms less typical of TIA, in whom a vascular origin cannot be excluded, also known as possible TIA. In this study we aimed to compare the short-term prognosis between TIA and Possible TIA patients. Methods Patients with transient neurological events consecutively referred to a TIA Clinic during five years w...

  14. Accurately Identifying New QoS Violation Driven by High-Distributed Low-Rate Denial of Service Attacks Based on Multiple Observed Features

    Jian Kang

    2015-01-01

    Full Text Available We propose using multiple observed features of network traffic to identify new high-distributed low-rate quality of services (QoS violation so that detection accuracy may be further improved. For the multiple observed features, we choose F feature in TCP packet header as a microscopic feature and, P feature and D feature of network traffic as macroscopic features. Based on these features, we establish multistream fused hidden Markov model (MF-HMM to detect stealthy low-rate denial of service (LDoS attacks hidden in legitimate network background traffic. In addition, the threshold value is dynamically adjusted by using Kaufman algorithm. Our experiments show that the additive effect of combining multiple features effectively reduces the false-positive rate. The average detection rate of MF-HMM results in a significant 23.39% and 44.64% improvement over typical power spectrum density (PSD algorithm and nonparametric cumulative sum (CUSUM algorithm.

  15. Normal levels of cerebrospinal fluid hypocretin-1 and daytime sleepiness during attacks of relapsing-remitting multiple sclerosis and monosymptomatic optic neuritis

    Knudsen, S; Jennum, P J; Korsholm, K

    2008-01-01

    There is emerging evidence that multiple sclerosis (MS), the hypothalamic sleep-wake regulating neuropeptide hypocretin-1 (hcrt-1) and the sleep disorder narcolepsy may be connected. Thus, the major pathophysiological component of narcolepsy is lack of hcrt-1. Dysfunction of the hypocretin system....../ml). No statistically significant differences were found between attack and remission. MRI scans revealed no hypothalamic lesions. The results show that the hypocretin system is intact and sleepiness is not typical in RRMS and MON without hypothalamic lesions on MRI....

  16. Detecting SYN flood attacks via statistical monitoring charts: A comparative study

    Bouyeddou, Benamar; Harrou, Fouzi; Sun, Ying; Kadri, Benamar

    2017-01-01

    Accurate detection of cyber-attacks plays a central role in safeguarding computer networks and information systems. This paper addresses the problem of detecting SYN flood attacks, which are the most popular Denial of Service (DoS) attacks. Here, we

  17. THE SECURITY OF CRITICAL ENERGY INFRASTRUCTURE IN THE AGE OF MULTIPLE ATTACK VECTORS: NATO’S MULTI-FACETED APPROACH

    Sorin Dumitru Ducaru

    2017-06-01

    Full Text Available The current NATO threat landscape is characterized by a combination or “hybrid blend” of unconventional emerging challenges (like cyber and terrorist attacks and re-emerging conventional ones (like Russia’s recent military resurgence and assertiveness, that led to the illegal annexation of Crimea and destabilization in Eastern Ukraine. While the resurgence of the Russian military activity pushed the Alliance in the direction of re-discovering its deterrence and collective defence role, the new, not-traditional, trans-national and essentially non-military treats that generate effects below the threshold of an armed attack require a new paradigm shift with a focus on resilience although the protection of critical energy infrastructure is first and foremost a national responsibility, NATO can contribute to meeting the infrastructure protection challenge on many levels. Given the fact that its core deterrence and defence mandate relies in a great measure on the security of Allies’ energy infrastructure NATO’s role and actions in reducing the vulnerabilities and strengthening the resilience of such infrastructure can only increase. A multi-faceted, multi-stakeholder and networked approach is needed to be able to strengthen defences and resilience of critical infrastructure such as energy. Understanding and defending against cyber or terrorist threat vectors, increased situational awareness, education, training, exercises, trusted partnerships as well as increasing strategic security dialogue and cooperation are key for such a comprehensive/network approach to the challenge.

  18. Attack surfaces

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants....

  19. Lysine clonixinate versus dipyrone (metamizole) for the acute treatment of severe migraine attacks: a single-blind, randomized study

    Krymchantowski,Abouch Valenty; Carneiro,Henrique; Barbosa,Jackeline; Jevoux,Carla

    2008-01-01

    BACKGROUND AND OBJECTIVE: Nonsteroidal anti-inflammatory drugs (NSAID) are effective to treat migraine attacks. Lysine clonixinate (LC) and dipyrone (metamizol) have been proven effective to treat acute migraine. The aim of this study was to evaluate the efficacy and tolerability of the intravenous formulations of LC and dipyrone in the treatment of severe migraine attacks. METHOD: Thirty patients (28 women, 2 men), aged 18 to 48 years with migraine according the International Headache Societ...

  20. A fatal elephant attack.

    Hejna, Petr; Zátopková, Lenka; Safr, Miroslav

    2012-01-01

    A rare case of an elephant attack is presented. A 44-year-old man working as an elephant keeper was attacked by a cow elephant when he tripped over a foot chain while the animal was being medically treated. The man fell down and was consequently repeatedly attacked with elephant tusks. The man sustained multiple stab injuries to both groin regions, a penetrating injury to the abdominal wall with traumatic prolapse of the loops of the small bowel, multiple defects of the mesentery, and incomplete laceration of the abdominal aorta with massive bleeding into the abdominal cavity. In addition to the penetrating injuries, the man sustained multiple rib fractures with contusion of both lungs and laceration of the right lobe of the liver, and comminuted fractures of the pelvic arch and left femoral body. The man died shortly after he had been received at the hospital. The cause of death was attributed to traumatic shock. © 2011 American Academy of Forensic Sciences.

  1. A performance study of unmanned aerial vehicle-based sensor networks under cyber attack

    Puchaty, Ethan M.

    In UAV-based sensor networks, an emerging area of interest is the performance of these networks under cyber attack. This study seeks to evaluate the performance trade-offs from a System-of-Systems (SoS) perspective between various UAV communications architecture options in the context two missions: tracking ballistic missiles and tracking insurgents. An agent-based discrete event simulation is used to model a sensor communication network consisting of UAVs, military communications satellites, ground relay stations, and a mission control center. Network susceptibility to cyber attack is modeled with probabilistic failures and induced data variability, with performance metrics focusing on information availability, latency, and trustworthiness. Results demonstrated that using UAVs as routers increased network availability with a minimal latency penalty and communications satellite networks were best for long distance operations. Redundancy in the number of links between communication nodes helped mitigate cyber-caused link failures and add robustness in cases of induced data variability by an adversary. However, when failures were not independent, redundancy and UAV routing were detrimental in some cases to network performance. Sensitivity studies indicated that long cyber-caused downtimes and increasing failure dependencies resulted in build-ups of failures and caused significant degradations in network performance.

  2. Cerebrospinal fluid neurofilament tracks fMRI correlates of attention at the first attack of multiple sclerosis.

    Tortorella, C; Direnzo, V; Taurisano, P; Romano, R; Ruggieri, M; Zoccolella, S; Mastrapasqua, M; Popolizio, T; Blasi, G; Bertolino, A; Trojano, M

    2015-04-01

    Identifying markers of cognitive dysfunction in multiple sclerosis (MS) is extremely challenging since it means supplying potential biomarkers for neuroprotective therapeutic strategies. The aim of this study is to investigate the relationship between fMRI correlates of attention performance and cerebrospinal fluid (CSF) neurofilament light chain (NFL) levels in patients with clinically isolated syndrome (CIS) suggestive of MS. Twenty-one untreated, cognitively preserved CIS patients underwent BOLD-fMRI while performing the Variable Attentional Control (VAC) task, a cognitive paradigm requiring increasing levels of attentional control processing. CSF NFL was assessed by ELISA technique. SPM8 random-effects models were used for statistical analyses of fMRI data (p<0.05 corrected). Repeated-measures ANOVA on imaging data showed an interaction between attentional control load and NFL levels in the right putamen. At the high level of attentional control demand CIS patients with "low NFL levels" showed greater activity in the putamen compared with subjects with "high NFL levels" (p=0.001). These results are independent of cognitive impairment index. Our findings suggest a relationship between CSF NFL levels and load-dependent failure of putaminal recruitment pattern during sustained attention in CIS and suggest a role of CSF NFL as a marker of subclinical abnormality of cognitive pathway recruitment in CIS. © The Author(s), 2014.

  3. A study on the mechanism of speculative attack and the defence strategy of the central bank.

    Chang-Hyun Yun

    1999-09-01

    Full Text Available We first analyze the concrete mechanism of speculative attack on the foreign exchange market which became very prevalent phenomena during the foreign exchange crisis. When the central bank of the domestic country tries to defend the attack by increasing the interest rate, some problems can arise in that the speculative attacks through foreign exchange options market and/or index futures markets can be very successful due to that policy. So the central bank should pay much attention to the microstructure of the financial markets when the defence strategy against speculative attack is determined.

  4. On resilience studies of system detection and recovery techniques against stealthy insider attacks

    Wei, Sixiao; Zhang, Hanlin; Chen, Genshe; Shen, Dan; Yu, Wei; Pham, Khanh D.; Blasch, Erik P.; Cruz, Jose B.

    2016-05-01

    With the explosive growth of network technologies, insider attacks have become a major concern to business operations that largely rely on computer networks. To better detect insider attacks that marginally manipulate network traffic over time, and to recover the system from attacks, in this paper we implement a temporal-based detection scheme using the sequential hypothesis testing technique. Two hypothetical states are considered: the null hypothesis that the collected information is from benign historical traffic and the alternative hypothesis that the network is under attack. The objective of such a detection scheme is to recognize the change within the shortest time by comparing the two defined hypotheses. In addition, once the attack is detected, a server migration-based system recovery scheme can be triggered to recover the system to the state prior to the attack. To understand mitigation of insider attacks, a multi-functional web display of the detection analysis was developed for real-time analytic. Experiments using real-world traffic traces evaluate the effectiveness of Detection System and Recovery (DeSyAR) scheme. The evaluation data validates the detection scheme based on sequential hypothesis testing and the server migration-based system recovery scheme can perform well in effectively detecting insider attacks and recovering the system under attack.

  5. The role of sleep in migraine attacks

    Elaine Inamorato

    1993-11-01

    Full Text Available Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. In view of this variable relationship we studied the records of 159 consecutive outpatients of our Headache Unit. In 121 records there was reference to sleep involvement, in 55% by a single form and in 45% by more than one form. When only one form was related, relief was most common (70%. 30% of that group of patients had the migraine attack precipitated by sleep, 24% by deprivation and 6% by sleep excess. When the effects of sleep were multiple, these effects were as expected logically in 65%: «in accordance» group (e.g attack precipitated by sleep deprivation and relieved by sleep onset. In a second group, («conflicting» where the involvement was not logical, there were three different combinations of sleep involvement, possibly due to more than one pathophysiological mechanism.

  6. Heart Attack

    ... properly causes your body's blood sugar levels to rise, increasing your risk of heart attack. Metabolic syndrome. This occurs when you have obesity, high blood pressure and high blood sugar. Having metabolic ...

  7. Heart Attack

    ... family history of heart attack race – African Americans, Mexican Americans, Native Americans, and native Hawaiians are at ... Your doctor will prescribe the medicines that are right for you. If you have had a heart ...

  8. Effect of peripheral vision training on the attack of beginner indoor soccer players: a study during competition

    Nelson Kautzner Marques Junior

    2009-01-01

    Full Text Available This study was conducted within the context of Human Motor Skill Science, in the area of Biophysical Dimension and following the research line of the Study of Learning Mechanisms and Processes and of Motor Conduct within the epistemological construct of phenomenological explanation. The objective of this study was to investigate peripheral vision training (PVT and its effect on attack runs during indoor soccer, taking into account dominant laterality (brain hemisphere function in both learning speed andoffensive skills. Ten beginner indoor soccer players aged 10.4 ± 2.31 years, from Lar da Criança Padre Franz Neumair, Ititioca, Niterói, Rio de Janeiro, Brazil, participated in the study. The boys were divided into an experimental group (EG, n = 5 and a controlgroup (CG, n = 5 with similar dominant laterality (brain hemisphere function (H (EG: 80% left H and 20% right H, CG: 60% left H and 40% right H. The players underwent nine training sessions, followed by a championship, and then six additional sessions, followed by a second championship. Each championship was filmed for scoutvideo analysis. Two-way ANOVA revealed a significant difference in peripheral vision during offensive runs between CG and EG, with marked acquisition of peripheral vision in EG. The quality of the attack runs was significant (two-way ANOVA. EG was the better team at the beginning of the attack runs and during attack development, whereas CG was better at attack finalization during the first championship. EG showed more competence in attack run finalization during the second championship. No significant difference in the number of goals scored was observed between the two groups (two-wayANOVA, p>0.05. The frequency of participation in the training sessions was significant (t-test for independent samples, p≤0.05, with EG attending more sessions. In conclusion, EG acquired peripheral vision, a finding suggesting that PVT improves the attack capacity of indoor soccer

  9. Open-label, multicenter study of self-administered icatibant for attacks of hereditary angioedema

    Aberer, W; Maurer, M; Reshef, A

    2014-01-01

    Historically, treatment for hereditary angioedema (HAE) attacks has been administered by healthcare professionals (HCPs). Patient self-administration could reduce delays between symptom onset and treatment, and attack burden. The primary objective was to assess the safety of self-administered ica...

  10. Unveiling Flat Traffic on the Internet: An SSH Attack Case Study

    Jonker, Mattijs; Hofstede, R.J.; Sperotto, Anna; Pras, Aiko

    Many types of brute-force attacks are known to exhibit a characteristic ‘flat’ behavior at the network-level, meaning that connections belonging to an attack feature a similar number of packets and bytes, and duration. Flat traffic usually results from repeating similar application-layer actions,

  11. Using attack-defense trees to analyze threats and countermeasures in an ATM: A case study

    Fraile, Marlon; Ford, Margaret; Gadyatskaya, Olga; Kumar, Rajesh; Stoelinga, Mariëlle Ida Antoinette; Trujillo-Rasua, Rolando

    2016-01-01

    Securing automated teller machines (ATMs), as critical and complex infrastructure, requires a precise understanding of the associated threats. This paper reports on the application of attack-defense trees to model and analyze the security of ATMs.We capture the most dangerous multi-stage attack

  12. Construction of War Discourse on International News Agencies: Case Study Terrorist attacks November 13th 2015

    Ángel TORRES-TOUKOUMIDIS

    2017-01-01

    Full Text Available This study analyzes warmongering rhetoric presented by international agencies Reuters, Al Arabiya, Al Jazeera and Associated Press (AP of the information related to the terrorist attacks in Paris on November 13th, 2015 for 15 days after the event. We have started from a quantitative and qualitative analysis of 550 information units using the software MAXQDA (v. 11.0.11. Subsequently, the semantic criteria of media discourse: functionality, significance and direction of the goal was applied on the selected sample. The results demonstrate the prevailing demonization of Islam, the exaltation of fear and panic in the discursive construction and it highlighted the spectacle of the information as a communicative strategy on the rhetorical guidance.

  13. The distinguishing motor features of cataplexy: a study from video-recorded attacks.

    Pizza, Fabio; Antelmi, Elena; Vandi, Stefano; Meletti, Stefano; Erro, Roberto; Baumann, Christian R; Bhatia, Kailash P; Dauvilliers, Yves; Edwards, Mark J; Iranzo, Alex; Overeem, Sebastiaan; Tinazzi, Michele; Liguori, Rocco; Plazzi, Giuseppe

    2018-05-01

    To describe the motor pattern of cataplexy and to determine its phenomenological differences from pseudocataplexy in the differential diagnosis of episodic falls. We selected 30 video-recorded cataplexy and 21 pseudocataplexy attacks in 17 and 10 patients evaluated for suspected narcolepsy and with final diagnosis of narcolepsy type 1 and conversion disorder, respectively, together with self-reported attacks features, and asked expert neurologists to blindly evaluate the motor features of the attacks. Video documented and self-reported attack features of cataplexy and pseudocataplexy were contrasted. Video-recorded cataplexy can be positively differentiated from pseudocataplexy by the occurrence of facial hypotonia (ptosis, mouth opening, tongue protrusion) intermingled by jerks and grimaces abruptly interrupting laughter behavior (i.e. smile, facial expression) and postural control (head drops, trunk fall) under clear emotional trigger. Facial involvement is present in both partial and generalized cataplexy. Conversely, generalized pseudocataplexy is associated with persistence of deep tendon reflexes during the attack. Self-reported features confirmed the important role of positive emotions (laughter, telling a joke) in triggering the attacks, as well as the more frequent occurrence of partial body involvement in cataplexy compared with pseudocataplexy. Cataplexy is characterized by abrupt facial involvement during laughter behavior. Video recording of suspected cataplexy attacks allows the identification of positive clinical signs useful for diagnosis and, possibly in the future, for severity assessment.

  14. Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers

    Pieters, Wolter; Davarynejad, Mohsen

    2015-01-01

    Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of multiple steps and alternative paths. It is possible to derive properties of the overall attacks from properties of individual steps, such as cost for the attacker and probability of success. However, in

  15. Underlying Reasons for Success and Failure of Terrorist Attacks: Selected Case Studies

    McCleskey, Edward; McCord, Diana; Leetz, Jennifer; Markey, John

    2007-01-01

    .... This is the second of a two-phased effort: Phase I focused on assessing the underlying reasons for the success and failure of terrorist attacks against targets within the United States and against U.S. interests abroad...

  16. Development of mental health first aid guidelines for panic attacks: a Delphi study

    Jorm Anthony F

    2009-08-01

    Full Text Available Abstract Background Panic attacks are common, and while they are not life-threatening events, they can lead to the development of panic disorder and agoraphobia. Appropriate help at the time that a panic attack occurs may decrease the fear associated with the attack and reduce the risk of developing an anxiety disorder. However, few people have the knowledge and skills required to assist. Simple first aid guidelines may help members of the public to offer help to people who experience panic attacks. Methods The Delphi method was used to reach consensus in a panel of experts. Experts included 50 professionals and 6 people who had experience of panic attacks and were active in mental health advocacy. Statements about how to assist someone who is having a panic attack were sourced through a systematic search of both professional and lay literature. These statements were rated for importance as first aid guidelines by the expert and consumer panels and guidelines were written using the items most consistently endorsed. Results Of 144 statements presented to the panels, 27 were accepted. These statements were used to develop the guidelines appended to this paper. Conclusion There are a number of actions which are considered to be useful for members of the public to do if they encounter someone who is having a panic attack. These guidelines will be useful in revision of curricula of mental health first aid programs. They can also be used by members of the public who want immediate information about how to assist someone who is experiencing panic attacks.

  17. Incidence of Stroke and Transient Ischemic Attack in Croatia: A Population Based Study.

    Kadojić, Dragutin; Demarin, Vida; Dikanović, Marinko; Lusić, Ivo; Tuskan-Mohar, Lidija; Trkanjec, Zlatko; Mihaljević, Ivan; Kadojić, Mira; Bitunjac, Milan; Vranjes, Zeljko

    2015-09-01

    The aim of this population based neuroepidemiological study was to establish the real incidence rates of acute cerebrovascular disease (CVD): stroke and transient ischemic attack (TIA) in the Republic of Croatia. Multicentric study included 89 501 persons of all ages in four regional centres in Croatia: Zagreb, Osijek + Slavonski Brod, Rijeka and Split. The following incidence rates of stroke, expressed at population of 100 000, have been established: Zagreb 290.52, Osijek + Slavonski Brod 302.14, Rijeka 219.65, Split 195.82. Incidence rate of stroke for the Republic of Croatia is 251.39. The following incidence rates of TIA, expressed at population of 100,000, have been established: Zagreb 87.15, Osijek + Slavonski Brod 156.53, Rijeka 90.11, Split 59.10. Incidence rate of TIA for the Republic of Croatia is 100.55. In the continental part of Croatia (Zagreb, Osijek + Slavonski Brod) incidence rate of stroke is higher by 45%, while incidence rate of TIA is higher by 82% than in the coastal part of Croatia, probably due to different lifestyle and environmental factors. The study has shown relatively high incidence rates of acute CVD (stroke and TIA) in the Republic of Croatia, which proves that CVD are a great public health problem.

  18. The Obesity Paradox in Recurrent Attacks of Gout in Observational Studies: Clarification and Remedy

    Nguyen, Uyen-Sa D. T.; Zhang, Yuqing; Louie-Gao, Qiong; Niu, Jingbo; Felson, David T.; LaValley, Michael P.; Choi, Hyon K.

    2016-01-01

    Objective Obesity is strongly associated with incident gout risk; its association with risk of recurrent gout attacks has been null or weak, constituting an obesity paradox. We sought to demonstrate and overcome the methodologic issues associated with the obesity paradox for risk of recurrent gout attacks. Methods Using the MRFIT database, we decomposed the total effect of obesity into its direct and indirect (i.e., mediated) effects using marginal structural models. We also estimated the total effect of BMI change from baseline among incident gout patients. Results Of 11,816 gout-free subjects at baseline, we documented 408 incident gout cases, with 132 developing recurrent gout attacks over a 7-year follow-up. The adjusted odds ratio (OR) for incident gout among obese individuals was 2.6, while that for recurrent gout attacks among gout patients was 0.98 (i.e., the obesity paradox). These ORs correlated well with the ORs for the indirect and direct effects of obesity on risk of recurrent gout attacks (i.e., 2.83 and 0.98, respectively). Compared with no BMI change, the OR of losing vs. gaining >5% of baseline BMI was 0.61 and 1.60 for recurrent gout attacks, respectively (P for trend gout attacks is explained by the absence of the direct effect, which is often measured in conventional analyses and misinterpreted as the intended total effect of interest. In contrast, the BMI change analysis correctly estimated the intended total effect of BMI, and revealed a dose-response relationship. PMID:27331767

  19. Migraine attacks among medical students in Soochow University, Southeast China: a cross-sectional study

    Gu X

    2018-04-01

    Full Text Available Xiao Gu,1,2 Yaojie Xie1 1School of Nursing, The Hong Kong Polytechnic University, Hong Kong; 2Intensive Care Unit, Suzhou Municipal Hospital, Suzhou, China Purpose: Migraine is one of the most common primary headache disorders and is burdensome to both the individual and society, influencing the academic performance and quality of daily lives of medical students worldwide. This study aimed to investigate the migraine prevalence in a sample of university medical students in China and to examine the features and typical trigger factors of migraine among these students. Patients and methods: From May 2016 to August 2016, a total of 1,060 medical students who were enrolled in Soochow University in Jiangsu Province in China were chosen through stratified random sampling. A self-administered questionnaire that included the ID MigraineTM for screening of migraine cases was used to collect data. The frequency, severity, duration of migraine attacks, and relevant trigger factors were measured for migraine cases. In total, 986 students completed the questionnaire. Results: The overall migraine prevalence among students was 7.91%, with 4.64% in male and 9.84% in female students. Junior-grade students had a higher migraine prevalence than senior students (prevalence of migraine of year 1 to year 5 undergraduates: 10.83%, 8.9% vs. 6.25%, 4.42%, 5.33%, P<0.05; prevalence of migraine of year 1 to year 3 graduates: 9.68%, 9.71% vs. 6.38%, P<0.05. Students with a positive family history were more likely to suffer migraine than those without (OR=8.48, 95% CI: 4.33–16.59. Stress (n=73, 93.59%, lack of sleep (n=72, 92.31%, and change of sleeping time (n=68, 87.18% were the top three trigger factors among the students. Conclusion: Migraine was common among medical students from a university in China, and especially higher in female and junior-grade students, and those with a family history of migraine. Reducing stress and improving sleep quality might be effective

  20. The effect of climate variability on urinary stone attacks: increased incidence associated with temperature over 18 °C: a population-based study.

    Park, Hyoung Keun; Bae, Sang Rak; Kim, Satbyul E; Choi, Woo Suk; Paick, Sung Hyun; Ho, Kim; Kim, Hyeong Gon; Lho, Yong Soo

    2015-02-01

    The aim of this study was to evaluate the effect of seasonal variation and climate parameters on urinary tract stone attack and investigate whether stone attack is increased sharply at a specific point. Nationwide data of total urinary tract stone attack numbers per month between January 2006 and December 2010 were obtained from the Korean Health Insurance Review and Assessment Service. The effects of climatic factors on monthly urinary stone attack were assessed using auto-regressive integrated moving average (ARIMA) regression method. A total of 1,702,913 stone attack cases were identified. Mean monthly and monthly average daily urinary stone attack cases were 28,382 ± 2,760 and 933 ± 85, respectively. The stone attack showed seasonal trends of sharp incline in June, a peak plateau from July to September, and a sharp decline after September. The correlation analysis showed that ambient temperature (r = 0.557, p r = 0.513, p stone attack cases. However, after adjustment for trends and seasonality, ambient temperature was the only climate factor associated with the stone attack cases in ARIMA regression test (p = 0.04). Threshold temperature was estimated as 18.4 °C. Risk of urinary stone attack significantly increases 1.71% (1.02-2.41 %, 95% confidence intervals) with a 1 °C increase of ambient temperature above the threshold point. In conclusion, monthly urinary stone attack cases were changed according to seasonal variation. Among the climates variables, only temperature had consistent association with stone attack and when the temperature is over 18.4 °C, urinary stone attack would be increased sharply.

  1. Effect of peripheral vision training on the attack of beginner indoor soccer players: a study during competition

    Nelson Kautzner Marques Junior

    2009-01-01

    Full Text Available http://dx.doi.org/10.5007/1980-0037.2009v11n1p119   In the area of Biophysical Dimension and following the research line of the Study of Learning Mechanisms and Processes and of Motor Conduct within the epistemological construct of phenomenological explanation. The objective of this study was to investigate peripheral vision training (PVT and its effect on attack runs during indoor soccer, taking into account dominant laterality (brain hemisphere function in both learning speed and offensive skills. Ten beginner indoor soccer players aged 10.4 ± 2.31 years, from Lar da Criança Padre Franz Neumair, Ititioca, Niterói, Rio de Janeiro, Brazil, participated in the study. The boys were divided into an experimental group (EG, n = 5 and a control group (CG, n = 5 with similar dominant laterality (brain hemisphere function (H (EG: 80% left H and 20% right H, CG: 60% left H and 40% right H. The players underwent nine training sessions, followed by a championship, and then six additional sessions, followed by a second championship. Each championship was filmed for scout video analysis. Two-way ANOVA revealed a significant difference in peripheral vision during offensive runs between CG and EG, with marked acquisition of peripheral vision in EG. The quality of the attack runs was significant (two-way ANOVA. EG was the better team at the beginning of the attack runs and during attack development, whereas CG was better at attack finalization during the first championship. EG showed more competence in attack run finalization during the second championship. No significant difference in the number of goals scored was observed between the two groups (two-way ANOVA, p>0.05. The frequency of participation in the training sessions was significant (t-test for independent samples, p≤0.05, with EG attending more sessions. In conclusion, EG acquired peripheral vision, a finding suggesting that PVT improves the attack capacity of indoor soccer players.

  2. Patients' anticipated actions following transient ischaemic attack symptoms: a qualitative vignette-based study.

    Magin, Parker; Joyce, Terry; Levi, Christopher; Lasserson, Daniel

    2017-02-03

    Transient Ischaemic Attack (TIA) requires urgent investigation and management. Urgent management reduces the risk of subsequent stroke markedly, but non-presentation or delays in patient presentation to health services have been found to compromise timely management. We aimed to explore general practice patients' anticipated responses to TIA symptoms. This was a qualitative study employing semi-structured telephone interviews. Participants were recruited from respondents in an earlier quantitative study based in Australian general practices. Maximum variation purposive sampling of patients from that study (on the basis of age, rurality, gender and previous experience of stroke/TIA) continued until thematic saturation was achieved. After initial interviews explored knowledge of TIA and potential responses, subsequent interviews further explored anticipated responses via clinical vignettes containing TIA and non-TIA symptoms. Transcribed interviews were coded independently by two researchers. Data collection and analysis were concurrent and cumulative, using a process of iterative thematic analysis and constant comparison. A schema explaining participants' anticipated actions emerged during this process and was iteratively tested in later interviews. Thirty-seven interviews were conducted and a 'spectrum of action', from watchful waiting (only responding if symptoms recurred) to summoning an ambulance immediately, was established. Intermediate actions upon the spectrum were: intending to mention the episode to a general practitioner (GP) at a routine appointment; consulting a GP non-urgently; consulting a general practitioner (GP) urgently; and attending an Emergency Department urgently. The substrate for decision-making relating to this spectrum operated via three constructs: the 'individual set' of the participant (their inherent disposition towards action in response to health matters in general), their 'discriminatory power' (the ability to discriminate TIA

  3. Four-year follow-up of transient ischemic attacks, strokes, and mimics: a retrospective transient ischemic attack clinic cohort study.

    Dutta, Dipankar; Bowen, Emily; Foy, Chris

    2015-05-01

    There is limited information on outcomes from rapid access transient ischemic attack (TIA) clinics. We present 4-year outcomes of TIAs, strokes, and mimics from a UK TIA clinic database. All patients referred between April 2010 and May 2012 were retrospectively identified and outcomes determined. End points were stroke, myocardial infarction, any vascular event (TIA, stroke, or myocardial infarction), and all-cause death. Data were analyzed by survival analysis. Of 1067 patients, 31.6% were TIAs, 18% strokes, and 50.4% mimics. Median assessment time was 4.5 days from onset and follow-up was for 34.9 months. Subsequent strokes occurred in 7.1% of patients with TIA, 10.9% of patients with stroke, and 2.0% of mimics at the end of follow-up. Stroke risk at 90 days was 1.3% for patients diagnosed as TIA or stroke. Compared with mimics, hazard ratios for subsequent stroke were 3.88 (1.90-7.91) for TIA and 5.84 (2.81-12.11) for stroke. Hazard ratio for any subsequent vascular event was 2.91 (1.97-4.30) for TIA and 2.83 (1.81-4.41) for stroke. Hazard ratio for death was 1.68 (1.10-2.56) for TIA and 2.19 (1.38-3.46) for stroke. Our results show a lower 90-day stroke incidence after TIA or minor stroke than in earlier studies, suggesting that rapid access daily TIA clinics may be having a significant effect on reducing strokes. © 2015 American Heart Association, Inc.

  4. When hawks attack: animal-borne video studies of goshawk pursuit and prey-evasion strategies

    Kane, Suzanne Amador; Fulton, Andrew H.; Rosenthal, Lee J.

    2015-01-01

    Video filmed by a camera mounted on the head of a Northern Goshawk (Accipiter gentilis) was used to study how the raptor used visual guidance to pursue prey and land on perches. A combination of novel image analysis methods and numerical simulations of mathematical pursuit models was used to determine the goshawk's pursuit strategy. The goshawk flew to intercept targets by fixing the prey at a constant visual angle, using classical pursuit for stationary prey, lures or perches, and usually using constant absolute target direction (CATD) for moving prey. Visual fixation was better maintained along the horizontal than vertical direction. In some cases, we observed oscillations in the visual fix on the prey, suggesting that the goshawk used finite-feedback steering. Video filmed from the ground gave similar results. In most cases, it showed goshawks intercepting prey using a trajectory consistent with CATD, then turning rapidly to attack by classical pursuit; in a few cases, it showed them using curving non-CATD trajectories. Analysis of the prey's evasive tactics indicated that only sharp sideways turns caused the goshawk to lose visual fixation on the prey, supporting a sensory basis for the surprising frequency and effectiveness of this tactic found by previous studies. The dynamics of the prey's looming image also suggested that the goshawk used a tau-based interception strategy. We interpret these results in the context of a concise review of pursuit–evasion in biology, and conjecture that some prey deimatic ‘startle’ displays may exploit tau-based interception. PMID:25609783

  5. User-Centric Key Entropy: Study of Biometric Key Derivation Subject to Spoofing Attacks

    Lavinia Mihaela Dinca

    2017-02-01

    Full Text Available Biometric data can be used as input for PKI key pair generation. The concept of not saving the private key is very appealing, but the implementation of such a system shouldn’t be rushed because it might prove less secure then current PKI infrastructure. One biometric characteristic can be easily spoofed, so it was believed that multi-modal biometrics would offer more security, because spoofing two or more biometrics would be very hard. This notion, of increased security of multi-modal biometric systems, was disproved for authentication and matching, studies showing that not only multi-modal biometric systems are not more secure, but they introduce additional vulnerabilities. This paper is a study on the implications of spoofing biometric data for retrieving the derived key. We demonstrate that spoofed biometrics can yield the same key, which in turn will lead an attacker to obtain the private key. A practical implementation is proposed using fingerprint and iris as biometrics and the fuzzy extractor for biometric key extraction. Our experiments show what happens when the biometric data is spoofed for both uni-modal systems and multi-modal. In case of multi-modal system tests were performed when spoofing one biometric or both. We provide detailed analysis of every scenario in regard to successful tests and overall key entropy. Our paper defines a biometric PKI scenario and an in depth security analysis for it. The analysis can be viewed as a blueprint for implementations of future similar systems, because it highlights the main security vulnerabilities for bioPKI. The analysis is not constrained to the biometric part of the system, but covers CA security, sensor security, communication interception, RSA encryption vulnerabilities regarding key entropy, and much more.

  6. DNSSEC and Its Potential for DDoS Attacks - A Comprehensive Measurement Study

    van Rijswijk, Roland M.; Sperotto, Anna; Pras, Aiko

    2014-01-01

    Over the past five years we have witnessed the introduction of DNSSEC, a security extension to the DNS that relies on digital signatures. DNSSEC strengthens DNS by preventing attacks such as cache poisoning. However, a common argument against the deployment of DNSSEC is its potential for abuse in

  7. What Do Firewalls Protect?An Empirical Study of Firewalls, Vulnerabilities, and Attacks

    Peisert, Sean; Bishop, Matt; Marzullo, Keith

    2010-01-01

    Firewalls are a cornerstone of how sites implement "defense in depth." Many security policies assume that outside attackers must first penetrate a firewall configured to block their access. This paper examines what firewalls protect against, and whether those protections are sufficient to warrant placing the current level of trust in firewalls.

  8. Experimental and numerical study on cement paste degradation under external sulfate attack

    Ma, X.; Copuroglu, O.; Schlangen, H.E.J.G.; Han, N; Xing, F; Saouma, V.; Bolander, J.; Landis, E.

    2016-01-01

    External sulfate attack is one of the situations that may cause gradual but severe damage in cementitious materials, which may lead to cracking, increased permeability and strength loss. In this paper, thin-walled hollow cement paste cylinders with a wall thickness of 2.5mm were made considering the

  9. Hydrogen-Atom Attack on Methyl Viologen in Aqueous Solution Studied by Pulse Radiolysis

    Solar, S.; Solar, W.; Getoff, N.

    1984-01-01

    Using hydrogen at high pressures of up to 150 bar (0.12 mol dm–3 H2) as an OH scavenger in aqueous MV2+ solutions (pH 1) it is possible to differentiate between two kinds of transient formed simultaneously by H-atom attack on methyl viologen. One of them is assigned to an H adduct on the N atom, ...

  10. Effect of peripheral vision training on the attack of beginner indoor soccer players: a study during competition

    Nelson Kautzner Marques Junior

    2009-01-01

    This study was conducted within the context of Human Motor Skill Science, in the area of Biophysical Dimension and following the research line of the Study of Learning Mechanisms and Processes and of Motor Conduct within the epistemological construct of phenomenological explanation. The objective of this study was to investigate peripheral vision training (PVT) and its effect on attack runs during indoor soccer, taking into account dominant laterality (brain hemisphere function) in both learn...

  11. Effectiveness of icatibant for treatment of hereditary angioedema attacks is not affected by body weight: findings from the Icatibant Outcome Survey, a cohort observational study.

    Caballero, Teresa; Zanichelli, Andrea; Aberer, Werner; Maurer, Marcus; Longhurst, Hilary J; Bouillet, Laurence; Andresen, Irmgard

    2018-01-01

    Icatibant is a bradykinin B2-receptor antagonist used for the treatment of hereditary angioedema attacks resulting from C1-inhibitor deficiency. Treatment is not adjusted by body weight however the impact of body mass index (BMI) on the effectiveness of icatibant is not documented in the literature. We examined disease characteristics and icatibant treatment effectiveness in patients stratified by BMI in the Icatibant Outcome Survey, an ongoing, international, observational study monitoring the real-world safety and effectiveness of icatibant. Attack and treatment characteristics as well as outcomes following treatment with icatibant were compared among patients with underweight, normal, overweight, and obese BMI. Data from 2697 icatibant-treated attacks in 342 patients (3.5, 44.7, 34.8, and 17.0% patients of underweight, normal, overweight, and obese BMI, respectively) were analyzed. There was no significant difference in the frequency and severity of attacks across BMI groups, although obese patients tended to have more attacks of high severity. There was no impact of BMI on the frequency of laryngeal attacks, but patients with normal BMI had fewer cutaneous attacks and more abdominal attacks. Most attacks (71.9-83.8%) were treated with a single icatibant injection without the need for rescue with plasma-derived C1-inhibitor (pdC1-INH), regardless of BMI. Patients with obese BMI used pdC1-INH as rescue treatment more often (P < 0.0001; P = 0.0232 excluding 2 outliers) and treated attacks earlier than patients with normal BMI (P = 0.007). Furthermore, time to resolution and duration of attack were shorter for patients with high BMI (P < 0.001 for overweight and P < 0.05 for obese versus normal). Overall, icatibant was comparatively effective in treating attacks in patients across all BMI groups. Trial registration NCT01034969.

  12. Increased Risk of Pregnancy Complications After Stroke : The FUTURE Study (Follow-Up of Transient Ischemic Attack and Stroke Patients and Unelucidated Risk Factor Evaluation)

    van Alebeek, Mayte E; de Vrijer, Myrthe; Arntz, Renate M; Maaijwee, Noortje A M M; Synhaeve, Nathalie E; Schoonderwaldt, Hennie; van der Vlugt, Maureen J; van Dijk, Ewoud J; de Heus, Roel; Rutten-Jacobs, Loes C A; de Leeuw, Frank-Erik

    BACKGROUND AND PURPOSE: The study goal was to investigate the prevalence of pregnancy complications and pregnancy loss in women before, during, and after young ischemic stroke/transient ischemic attack. METHODS: In the FUTURE study (Follow-Up of Transient Ischemic Attack and Stroke Patients and

  13. Socioeconomic status and transient ischaemic attack/stroke: a prospective observational study.

    Kerr, Gillian D; Higgins, Peter; Walters, Matthew; Ghosh, Sandip K; Wright, Fiona; Langhorne, Peter; Stott, David J

    2011-01-01

    Lower socioeconomic status (SES) is associated with an increased risk of stroke but the mechanisms are unclear. We aimed to determine whether low-SES stroke/transient ischaemic attack (TIA) patients have a greater burden of vascular risk factors/co-morbidity and reduced health care access. We prospectively studied 467 consecutive stroke and TIA patients from 3 Scottish hospitals (outpatients and inpatients) during 2007/2008. We recorded vascular risk factors, stroke severity, co-morbidity measures, investigations and health service utilisation. SES was derived from postcodes using Scottish Neighbourhood Statistics and analysed in quartiles. TIA/stroke patients in the lowest SES quartile were younger (64 years, SD 14.1) than those in the highest quartile (72 years, SD 12.9; p p = 0.001) but there was no association with other vascular risk factors/co-morbidity. There was a trend for those with lower SES to have a more severe stroke [modified National Institutes of Health Stroke Scale score and interquartile range: 4 (2-6) vs. 3 (1-5); multivariate p = 0.05]. Lower SES groups were less likely to have neuro-imaging (82 vs. 90%; p = 0.036) or an electrocardiogram (72 vs. 87%; p = 0.003), but differences were no longer significant on multivariate analysis. However, there was equal access to stroke unit care. Low-SES TIA and stroke patients are younger and have a more severe deficit; an increased prevalence of smoking is likely to be a major contributor. We found equal access to stroke unit care for low-SES patients. Copyright © 2010 S. Karger AG, Basel.

  14. Review of Studies of the Economic Impact of the September 11, 2001, Terrorist Attacks on the World Trade Center

    2002-05-29

    of the Budget, • New York City Partnership and Chamber of Commerce , Washington, DC 20548 Report Documentation Page Report Date 29MAY2002 Report Type...700R Impact of Terrorist Attacks on the World Trade Center 10 Eight Studies (cont’d) ! New York City Partnership and Chamber of Commerce , Economic...Center 29 Observations Observations The New York City Partnership and Chamber of Commerce study generated the most comprehensive estimates—direct and

  15. Effect of peripheral vision training on the attack of beginner indoor soccer players: a study during competition

    Nelson Kautzner Marques Junior

    2009-01-01

    http://dx.doi.org/10.5007/1980-0037.2009v11n1p119   In the area of Biophysical Dimension and following the research line of the Study of Learning Mechanisms and Processes and of Motor Conduct within the epistemological construct of phenomenological explanation. The objective of this study was to investigate peripheral vision training (PVT) and its effect on attack runs during indoor soccer, taking into account dominant laterality (brain hemisphere function) in both learning speed and ...

  16. A qualitative study of younger men's experience of heart attack (myocardial infarction).

    Merritt, Christopher J; de Zoysa, Nicole; Hutton, Jane M

    2017-09-01

    The effects of heart attack, or myocardial infarction (MI), across psychosocial domains may be particularly acute in younger adults, for whom serious health events are non-normative. MI morbidity is declining in Western countries, but in England MI numbers have plateaued for the under-45 cohort, where approximately 90% of patients are male. Qualitative research on younger adults' experience of MI is limited, and no study has sampled exclusively under-45s. This study aimed to understand how a sample of men under 45 adjusted to and made sense of MI. Qualitative research design based on semi-structured in-depth interviews. Ten men aged under 45 who had experienced MI in the past 3-6 months were purposively recruited and interviewed. Interviews were transcribed verbatim and analysed using interpretative phenomenological analysis. Seven superordinate themes were identified. This article focuses in depth on the three most original themes: (1) 'I'm less of a man', which described experiences of losing 'maleness' (strength, independence, ability to provide) post-MI; (2) 'Shortened horizons', which covered participants' sense of foreshortened future and consequent reprioritization; and (3) 'Life loses its colour', describing the loss of pleasure from lifestyle-related changes. Themes broadly overlapped with the qualitative literature on younger adult MI. However, some themes (e.g., loss of 'maleness' post-MI, and ambivalence towards MI risk factors) appeared unique to this study. Themes were also discussed in relation to risk factors for anxiety and depression and how this might inform clinical care for a younger, male population. Statement of contribution What is already known on this subject? Myocardial infarction (MI) morbidity is not declining in England for under-45s. Adjustment to MI is particularly challenging for younger adults, perhaps because it is non-normative. However, little is known about the experience of MI in younger adults. What does this study add? This

  17. Study on Fluid-Induced Vibration Power Harvesting of Square Columns under Different Attack Angles

    Meng Zhang

    2017-01-01

    Full Text Available A model of the flow-vibration-electrical circuit multiphysical coupling system for solving square column vortex-induced vibration piezoelectric energy harvesting (VIVPEH is proposed in this paper. The quasi steady state theory is adopted to describe the fluid solid coupling process of vortex-induced vibration based on the finite volume method coupled Gauss equation. The vibrational response and the quasi steady state form of the output voltage are solved by means of the matrix coefficient method and interactive computing. The results show that attack angles play an important role in the performance of square column VIVPEH, of which α=45° is a relatively ideal attack angle of square column VIVPEH.

  18. Study of thallium scintigraphy for myocardial infarction performed within 72 hours of attack

    Setsuda, Koichi; Tomita, Yoshifumi; Takayama, Morimasa (Nippon Medical School, Tokyo)

    1983-11-01

    In 40 cases undergoing /sup 201/Tl myocardial scanning within 72 hours of attack of myocardial infarction, a significant correlation was found between the infarct size determined by myocardial scanning and the size of the infarction estimated on the basis of ECG findings and serum enzymes. The group with high pulmonary capillary wedge pressure was the group with low Tl scores. The group showing dyskinesis and aneurysm in left ventriculography showed low Tl scores and a significant correlation between the ejection fraction calculated from left ventriculograms and the Tl score. The above date indicate that /sup 201/Tl myocardial scanning in the acute phase after attack of infarction reflects the infarction size and cardiac function.

  19. Underlying Reasons for Success and Failure of Terrorist Attacks: Selected Case Studies

    2007-06-04

    Ibrahim had exhibited antisocial behavior as early as high school217 and had a significant criminal past—in 1996, he was sentenced to five years in prison...media. In addition to long-term emotional health issues, the attacks of September 11 have had a lasting effect on the physical health of those who were...Psychological and Behavioural Reactions to the Bombings in London on 7 July 2005: Cross Sectional Survey of a Representative Sample of Londoners

  20. Lysine clonixinate versus dipyrone (metamizole) for the acute treatment of severe migraine attacks: a single-blind, randomized study.

    Krymchantowski, Abouch Valenty; Carneiro, Henrique; Barbosa, Jackeline; Jevoux, Carla

    2008-06-01

    Nonsteroidal anti-inflammatory drugs (NSAID) are effective to treat migraine attacks. Lysine clonixinate (LC) and dipyrone (metamizol) have been proven effective to treat acute migraine. The aim of this study was to evaluate the efficacy and tolerability of the intravenous formulations of LC and dipyrone in the treatment of severe migraine attacks. Thirty patients (28 women, 2 men), aged 18 to 48 years with migraine according the International Headache Society (IHS) (2004) were studied. The patients were randomized into 2 groups when presenting to an emergency department with a severe migraine attack. The study was single-blind. Headache intensity, nausea, photophobia and side effects were evaluated at 0, 30, 60 and 90 minutes after the drug administration. Rectal indomethacin as rescue medication (RM) was available after 2 hours and its use compared between groups. All patients completed the study. At 30 minutes, 0% of the dipyrone group 13% of the LC group were pain free (p=0.46). At 60 and 90 minutes, 2 (13%) and 5 (33%) patients from the dipyrone group and 11 (73%) and 13 (86.7%) patients from the LC group were pain free (p<0.001). At 60 minutes, significantly more patients from the LC group were nausea-free (p<0.001). Regarding photophobia, there were no differences between groups at 60 minutes (p=0.11). The use of RM at 2 hours did not differ among groups (p=0.50). Pain in the site of the injection was reported by more patients of the LC group compared to the dipyrone group (p<0.0001). LC is significantly superior to dipyrone in treating severe migraine attacks. LC promotes significantly more burning at the site of the injection.

  1. A Study of Multiplicities in Hadronic Interactions

    Estrada Tristan, Nora Patricia; /San Luis Potosi U.

    2006-02-01

    Using data from the SELEX (Fermilab E781) experiment obtained with a minimum-bias trigger, we study multiplicity and angular distributions of secondary particles produced in interactions in the experimental targets. We observe interactions of {Sigma}{sup -}, proton, {pi}{sup -}, and {pi}{sup +}, at beam momenta between 250 GeV/c and 650 GeV/c, in copper, polyethylene, graphite, and beryllium targets. We show that the multiplicity and angular distributions for meson and baryon beams at the same momentum are identical. We also show that the mean multiplicity increases with beam momentum, and presents only small variations with the target material.

  2. Cancer and heart attack survivors’ expectations of employment status: results from the English Longitudinal Study of Ageing

    Saskia F. A. Duijts

    2017-08-01

    Full Text Available Abstract Background Sociodemographic, health- and work-related factors have been found to influence return to work in cancer survivors. It is feasible though that behavioural factors, such as expectation of being at work, could also affect work-related outcomes. Therefore, the effect of earlier identified factors and expectation of being at work on future employment status in cancer survivors was explored. To assess the degree to which these factors specifically concern cancer survivors, a comparison with heart attack survivors was made. Methods Data from the English Longitudinal Study of Ageing were used. Cancer and heart attack survivors of working age in the UK were included and followed up for 2 years. Baseline characteristics of both cancer and heart attack survivors were compared regarding employment status. Univariate and multivariate regression analyses were performed in survivors at work, and the interaction between independent variables and diagnose group was assessed. Results In cancer survivors at work (N = 159, alcohol consumption, participating in moderate or vigorous sport activities, general health and participation were univariate associated with employment status at two-year follow-up. Only fair general health (compared to very good general health remained statistically significant in the multivariate model (OR 0.31; 95% CI 0.13–0.76; p = 0.010. In heart attack survivors at work (N = 78, gender, general health and expectation of being at work were univariate associated with employment status at follow-up. Female gender (OR 0.03; 95% CI 0.00–0.57; p = 0.018 and high expectation of being at work (OR 10.68; 95% CI 1.23–93.92; p = 0.033 remained significant in the multivariate model. The influence of gender (p = 0.066 and general health (p = 0.020 regarding employment status was found to differ significantly between cancer and heart attack survivors. Conclusions When predicting future employment status in cancer

  3. Cancer and heart attack survivors' expectations of employment status: results from the English Longitudinal Study of Ageing.

    Duijts, Saskia F A; van der Beek, Allard J; Bleiker, Eveline M A; Smith, Lee; Wardle, Jane

    2017-08-07

    Sociodemographic, health- and work-related factors have been found to influence return to work in cancer survivors. It is feasible though that behavioural factors, such as expectation of being at work, could also affect work-related outcomes. Therefore, the effect of earlier identified factors and expectation of being at work on future employment status in cancer survivors was explored. To assess the degree to which these factors specifically concern cancer survivors, a comparison with heart attack survivors was made. Data from the English Longitudinal Study of Ageing were used. Cancer and heart attack survivors of working age in the UK were included and followed up for 2 years. Baseline characteristics of both cancer and heart attack survivors were compared regarding employment status. Univariate and multivariate regression analyses were performed in survivors at work, and the interaction between independent variables and diagnose group was assessed. In cancer survivors at work (N = 159), alcohol consumption, participating in moderate or vigorous sport activities, general health and participation were univariate associated with employment status at two-year follow-up. Only fair general health (compared to very good general health) remained statistically significant in the multivariate model (OR 0.31; 95% CI 0.13-0.76; p = 0.010). In heart attack survivors at work (N = 78), gender, general health and expectation of being at work were univariate associated with employment status at follow-up. Female gender (OR 0.03; 95% CI 0.00-0.57; p = 0.018) and high expectation of being at work (OR 10.68; 95% CI 1.23-93.92; p = 0.033) remained significant in the multivariate model. The influence of gender (p = 0.066) and general health (p = 0.020) regarding employment status was found to differ significantly between cancer and heart attack survivors. When predicting future employment status in cancer survivors in the UK, general health is the most relevant factor

  4. Using Correspondence Analysis in Multiple Case Studies

    Kienstra, Natascha; van der Heijden, Peter G.M.

    2015-01-01

    In qualitative research of multiple case studies, Miles and Huberman proposed to summarize the separate cases in a so-called meta-matrix that consists of cases by variables. Yin discusses cross-case synthesis to study this matrix. We propose correspondence analysis (CA) as a useful tool to study

  5. Using correspondence analysis in multiple case studies

    Kienstra, N.H.H.; van der Heijden, P.G.M.

    2015-01-01

    In qualitative research of multiple case studies, Miles and Huberman proposed to summarize the separate cases in a so-called meta-matrix that consists of cases by variables. Yin discusses cross-case synthesis to study this matrix. We propose correspondence analysis (CA) as a useful tool to study

  6. A system dynamics case study of resilient response to IP theft from a cyber- attack

    Sepúlveda Estay, Daniel Alberto; Khan, Omera

    2017-01-01

    and swiftness of the supply chain response (resilience). However, current resilience frameworks are qualitative, do not address evolution over time as a relevant aspect, and thus do not provide indications on how to design a resilient response. This paper contributes to closing this gap by developing a system...... dynamics model from an actual case of resilient response after a cyber-attack. Both casespecific and generic structures are extracted from the case data analysis, and a reaction mechanism is proposed that results in the observed behavior. The identification of these structures should eventually aid...

  7. Resolved multisite OH-attack on aqueous aniline studied by pulse radiolysis

    Solar, S.; Solar, W.; Getoff, N.

    1986-01-01

    The individual formation and decay kinetics as well as the absorption characteristics of the simultaneously formed primary species by OH attack on aniline in aqueous solution (pH 8-9.6), saturated with N 2 O, have been determined by pulse radiolysis combined with a computer optimization procedure. Further the rate constant of e - sub(aq) with aniline was determined to (3.0+-0.1) x l0 7 dm 3 mol -1 cm -1 . Qualitative analysis of final products were also performed. (author)

  8. Association of Job Stressors With Panic Attack and Panic Disorder in a Working Population in Japan: A Cross-Sectional Study.

    Asai, Yumi; Imamura, Kotaro; Kawakami, Norito

    2017-06-01

    This study aimed to investigate associations of job stressors with panic attack (PA) and panic disorder (PD) among Japanese workers. A cross-sectional online questionnaire survey was conducted of 2060 workers. Job strain, effort/reward imbalance, and workplace social support were measured by the job content questionnaire and effort/reward imbalance questionnaire. These variables were classified into tertiles. PA/PD were measured by self-report based on the mini international neuropsychiatric interview (MINI). Multiple logistic regression was conducted, adjusting for demographic, lifestyle, and health-related covariates. Data from 1965 participants were analyzed. Adjusted odds ratio (OR) of PA/PD was significantly greater for the group with high effort/reward imbalance compared with the group with low effort/reward imbalance (ORs, 2.64 and 2.94, respectively, both P imbalance was associated with having PA/PD among Japanese workers.

  9. Renal dysfunction and chronic kidney disease in ischemic stroke and transient ischemic attack: A population-based study.

    Hayden, Derek; McCarthy, Christine; Akijian, Layan; Callaly, Elizabeth; Ní Chróinín, Danielle; Horgan, Gillian; Kyne, Lorraine; Duggan, Joseph; Dolan, Eamon; O' Rourke, Killian; Williams, David; Murphy, Sean; O'Meara, Yvonne; Kelly, Peter J

    2017-10-01

    Background and purpose The prevalence of chronic kidney disease (estimated glomerular filtration rate (eGFR) chronic kidney disease (CKD)) in ischemic stroke and transient ischemic attack (TIA) is unknown, as estimates have been based on single-point estimates of renal function. Studies investigating the effect of renal dysfunction (eGFR < 60 mL/min per 1.73 m 2 , renal dysfunction) on post-stroke outcomes are limited to hospitalized cohorts and have provided conflicting results. Methods We investigated rates, determinants and outcomes of renal dysfunction in ischemic stroke and TIA in the North Dublin Population Stroke Study. We also investigate the persistence of renal dysfunction in 90-day survivors to determine the prevalence of CKD. Ascertainment included hot and cold pursuit using multiple overlapping sources. Survival analysis was performed using Kaplan-Meier survival curves and Cox proportional hazards modeling. Results In 547 patients (ischemic stroke in 76.4%, TIA in 23.6%), the mean eGFR at presentation was 63.7 mL/min/1.73 m 2 (SD 22.1). Renal dysfunction was observed in 44.6% (244/547). Among 90-day survivors, 31.2% (139/446) met criteria for CKD. After adjusting for age and stroke severity, eGFR < 45 mL/min/1.73 m 2 (hazard ratio 2.53, p = 0.01) independently predicted 28-day fatality but not at two years. Poor post-stroke functional outcome (Modified Rankin Scale 3-5) at two years was more common in those with renal dysfunction (52.5% vs. 20.6%, p < 0.001). After adjusting for age, stroke severity and pre-stroke disability, renal dysfunction (OR 2.17, p = 0.04) predicted poor functional outcome. Conclusion Renal dysfunction and CKD are common in ischemic stroke and TIA. Renal dysfunction is associated with considerable post-stroke morbidity and mortality. Further studies are needed to investigate if modifiable mechanisms underlie these associations.

  10. Crony Attack: Strategic Attack’s Silver Bullet

    2006-11-01

    physical assets or financial assets. The form of crony attack that most closely resembles classic strategic attack is to deny, degrade, or destroy a money...February 1951. Reprinted in Airpower Studies Coursebook , Air Command and Staff College, Maxwell AFB, AL, 2002, 152–58. Hirsch, Michael. “NATO’s Game of

  11. Security awareness for public bus transportation : case studies of attacks against the Israeli public bus system [research brief].

    2012-03-01

    Government regulators and transportation operators of public bus systems are concerned about terrorist attacks. Bus attacks in Israel between late September 2000 and the end of 2006, a period known as the Second Intifada, are particularly well known....

  12. Simulator study of the effectiveness of an automatic control system designed to improve the high-angle-of-attack characteristics of a fighter airplane

    Gilbert, W. P.; Nguyen, L. T.; Vangunst, R. W.

    1976-01-01

    A piloted, fixed-base simulation was conducted to study the effectiveness of some automatic control system features designed to improve the stability and control characteristics of fighter airplanes at high angles of attack. These features include an angle-of-attack limiter, a normal-acceleration limiter, an aileron-rudder interconnect, and a stability-axis yaw damper. The study was based on a current lightweight fighter prototype. The aerodynamic data used in the simulation were measured on a 0.15-scale model at low Reynolds number and low subsonic Mach number. The simulation was conducted on the Langley differential maneuvering simulator, and the evaluation involved representative combat maneuvering. Results of the investigation show the fully augmented airplane to be quite stable and maneuverable throughout the operational angle-of-attack range. The angle-of-attack/normal-acceleration limiting feature of the pitch control system is found to be a necessity to avoid angle-of-attack excursions at high angles of attack. The aileron-rudder interconnect system is shown to be very effective in making the airplane departure resistant while the stability-axis yaw damper provided improved high-angle-of-attack roll performance with a minimum of sideslip excursions.

  13. Heart Attack Recovery FAQs

    ... recommendations to make a full recovery. View an animation of a heart attack . Heart Attack Recovery Questions ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  14. The Effect of Cryphonectria parasitica Attack on Castanea sativa Histological Properties (Case Study: Visroud Forest- Guilan

    Afrooz Hasani boosari

    2018-02-01

    attacks wooden fiber more than other organs of trees. The irregular cell structure of the vessels and fibers of the diseased wood showed (Fig.5 some similarity with cancer in animals and humans. Conclusion: This is the first detailed study that has been conducted on Cryphonectria parasitica diseased Iranian Chestnut trees. One way to prevent the spread of the disease in forests is to remove the diseased trees. These logs can be used in making furniture, shipbuilding, wooden building construction, and musical instruments. Heat treatment can be suggested for more dimensional stability and especially for sterilization of the timber obtained from the diseased trees.

  15. Shark attack-related injuries: Epidemiology and implications for plastic surgeons.

    Ricci, Joseph A; Vargas, Christina R; Singhal, Dhruv; Lee, Bernard T

    2016-01-01

    The increased media attention to shark attacks has led to a heightened fear and public awareness. Although few sharks are considered dangerous, attacks on humans can result in large soft tissue defects necessitating the intervention of reconstructive surgeons. This study aims to evaluate and describe the characteristics of shark-related injuries in order to improve treatment. The Global Shark Accident File, maintained by the Shark Research Institute (Princeton, NJ, USA), is a compilation of all known worldwide shark attacks. Database records since the 1900s were reviewed to identify differences between fatal and nonfatal attacks, including: geography, injury pattern, shark species, and victim activity. Since the 1900s, there have been 5034 reported shark attacks, of which 1205 (22.7%) were fatal. Although the incidence of attacks per decade has increased, the percentage of fatalities has decreased. Characteristics of fatal attacks included swimming (p = 0.001), boating (p = 0.001), three or more bite sites (p = 0.03), limb loss (p = 0.001), or tiger shark attack (p = 0.002). The most common attacks were bites to the legs (41.8%) or arms (18.4%), with limb loss occurring in 7% of attacks. Geographically, the majority of attacks occurred in North America (36.7%) and Australia (26.5%). Most attacks in the USA occurred in Florida (49.1%) and California (13.6%). Although rare, shark attacks result in devastating injuries to patients. As these injuries often involve multiple sites and limb loss, this creates a significant challenge for reconstructive surgeons. Proper identification of the characteristics of the attack can aid in providing optimal care for those affected. Copyright © 2015 British Association of Plastic, Reconstructive and Aesthetic Surgeons. Published by Elsevier Ltd. All rights reserved.

  16. Population-based study of ABCD2 score, carotid stenosis, and atrial fibrillation for early stroke prediction after transient ischemic attack: the North Dublin TIA study.

    Sheehan, Orla C

    2010-05-01

    Transient ischemic attack (TIA) etiologic data and the ABCD(2) score may improve early stroke risk prediction, but studies are required in population-based cohorts. We investigated the external validity of the ABCD(2) score, carotid stenosis, and atrial fibrillation for prediction of early recurrent stroke after TIA.

  17. Icatibant, an inhibitor of bradykinin receptor 2, for hereditary angioedema attacks: prospective experimental single-cohort study.

    Campos, Regis Albuquerque; Valle, Solange Oliveira Rodrigues; França, Alfeu Tavares; Cordeiro, Elisabete; Serpa, Faradiba Sarquis; Mello, Yara Ferreira; Malheiros, Teresinha; Toledo, Eliana; Mansour, Elie; Fusaro, Gustavo; Grumach, Anete Sevciovic

    2014-01-01

    Hereditary angioedema (HAE) with C1 inhibitor deficiency manifests as recurrent episodes of edema involving the skin, upper respiratory tract and gastrointestinal tract. It can be lethal due to asphyxia. The aim here was to evaluate the response to therapy for these attacks using icatibant, an inhibitor of the bradykinin receptor, which was recently introduced into Brazil. Prospective experimental single-cohort study on the efficacy and safety of icatibant for HAE patients. Patients with a confirmed HAE diagnosis were enrolled according to symptoms and regardless of the time since onset of the attack. Icatibant was administered in accordance with the protocol that has been approved in Brazil. Symptom severity was assessed continuously and adverse events were monitored. 24 attacks in 20 HAE patients were treated (female/male 19:1; 19-55 years; median 29 years of age). The symptoms were: subcutaneous edema (22/24); abdominal pain (15/24) and upper airway obstruction (10/24). The time taken until onset of relief was: 5-10 minutes (5/24; 20.8%); 10-20 (5/24; 20.8%); 20-30 (8/24; 33.4%); 30-60 (5/24; 20.8%); and 2 hours (1/24; 4.3%). The time taken for complete resolution of symptoms ranged from 4.3 to 33.4 hours. Adverse effects were only reported at injection sites. Mild to moderate erythema and/or feelings of burning were reported by 15/24 patients, itching by 3 and no adverse effects in 6. HAE type I patients who received icatibant responded promptly; most achieved improved symptom severity within 30 minutes. Local adverse events occurred in 75% of the patients.

  18. Icatibant, an inhibitor of bradykinin receptor 2, for hereditary angioedema attacks: prospective experimental single-cohort study

    Regis Albuquerque Campos

    Full Text Available CONTEXT AND OBJECTIVE: Hereditary angioedema (HAE with C1 inhibitor deficiency manifests as recurrent episodes of edema involving the skin, upper respiratory tract and gastrointestinal tract. It can be lethal due to asphyxia. The aim here was to evaluate the response to therapy for these attacks using icatibant, an inhibitor of the bradykinin receptor, which was recently introduced into Brazil.DESIGN AND SETTING: Prospective experimental single-cohort study on the efficacy and safety of icatibant for HAE patients.METHODS: Patients with a confirmed HAE diagnosis were enrolled according to symptoms and regardless of the time since onset of the attack. Icatibant was administered in accordance with the protocol that has been approved in Brazil. Symptom severity was assessed continuously and adverse events were monitored.RESULTS: 24 attacks in 20 HAE patients were treated (female/male 19:1; 19-55 years; median 29 years of age. The symptoms were: subcutaneous edema (22/24; abdominal pain (15/24 and upper airway obstruction (10/24. The time taken until onset of relief was: 5-10 minutes (5/24; 20.8%; 10-20 (5/24; 20.8%; 20-30 (8/24; 33.4%; 30-60 (5/24; 20.8%; and 2 hours (1/24; 4.3%. The time taken for complete resolution of symptoms ranged from 4.3 to 33.4 hours. Adverse effects were only reported at injection sites. Mild to moderate erythema and/or feelings of burning were reported by 15/24 patients, itching by 3 and no adverse effects in 6.CONCLUSION: HAE type I patients who received icatibant responded promptly; most achieved improved symptom severity within 30 minutes. Local adverse events occurred in 75% of the patients.

  19. Weekly and holiday-related patterns of panic attacks in panic disorder: a population-based study.

    Kao, Li-Ting; Xirasagar, Sudha; Chung, Kuo-Hsuan; Lin, Herng-Ching; Liu, Shih-Ping; Chung, Shiu-Dong

    2014-01-01

    While chronobiological studies have reported seasonal variation in panic attacks (PA) episodes, information on the timing of PA by week-days may enable better understanding of the triggers of PA episodes and thereby provide pointers for suitable interventional approaches to minimize PA attacks. This study investigated weekly variation in potential PA admissions including associations with holidays using a population-based longitudinal, administrative claims-based dataset in an Asian population. This study used ambulatory care data from the "Longitudinal Health Insurance Database 2000. We identified 993 patients with panic disorder (PD), and they had 4228 emergency room (ER) admissions for potential PA in a 3-year period between 1 January 2009 and 31 December 2011. One-way analysis of variance (ANOVA) was used to examine associations between the potential PA admissions and holidays/weekend days/work-days of the week. The daily mean number of potential PA admissions was 3.96 (standard deviation 2.05). One-way ANOVA showed significant differences in potential PA admissions by holiday and day of the week (pholidays. Furthermore, the weekly variations were similar for females and males, although females always had higher potential PA admissions on both weekdays and holidays than the males. We found that potential PA admissions among persons with PD varied systematically by day of the week, with a significant peak on weekends and holidays.

  20. SPECT study of cerebral blood flow reactivity after acetazolamide in patients with transient ischemic attacks

    Chollet, F.; Celsis, P.; Clanet, M.; Guiraud-Chaumeil, B.; Rascol, A.; Marc-Vergnes, J.P.

    1989-01-01

    We investigated 15 patients with one or more transient ischemic attacks (TIAs) in the internal carotid artery territory within the month following the most recent TIA. Cerebral blood flow (CBF) was measured by single-photon emission computed tomography, using intravenous xenon-133 before and after injection of 1 g acetazolamide. Six patients had severe carotid stenosis or occlusion; the other nine patients had no significant carotid lesions. Twenty age-matched volunteers free of neurologic symptoms or history were used as controls. Mean CBF in the sylvian region was not significantly different between patients and controls. Seven patients exhibited a focal hypoperfusion at rest in the symptomatic hemisphere, and their hypoperfused areas were hyporeactive after administration of acetazolamide. Seven other patients exhibited hyporeactive areas after acetazolamide administration while their CBF tomograms at rest were normal. Thus, CBF abnormalities were detected in 14 of the 15 patients. Our findings suggest that CBF measured early after acetazolamide administration could be useful to confirm the clinical diagnosis of TIA. In the nine patients with no significant lesion of the internal carotid artery, the areas of hypoperfusion were small and were probably related to the focal ischemic event. In the six patients with severe lesions of the internal carotid artery, abnormalities were of variable size and intensity but were often large and pronounced. The discrepancy between these two subgroups of patients could be ascribed to the hemodynamic influence of the internal carotid artery lesions. Moreover, our findings may provide some insight into the pathophysiology of TIAs

  1. A semi-quantitative study of transient ischemic attacks by diffusion weighted magnetic resonance imaging

    Wen Feng; Guo Liang

    2007-01-01

    Objective: To explore the incidence and morphological findings of transient ischemic attacks (TIA) related-focus by diffusion weighted magnetic resonance imaging(DWI), and the semi-quantitative characteristics of TIA related-focus on DWI manifestation were researched. Methods: A prospective analysis was performed on 39 TIA patients who were admitted to the Pudong New Area People Hospital and who had also undergone DWI scan 3 , and rADC ratio of the lesion was (-25.8 ± 9.01)%, and rAI ratio was(59.9 ± 12.9)% and compared with that of the contralateral side there was significant difference. Conclusion: The incidence of positivity rate of DWI is more than that obtained by conventional MR imaging. The related focus of TIA are very small and the ADC value of the lesion is decreased slightly, but averge intensity is increased highly. These data may be of value in identifying those TIA patients for whom MRI evaluation with DWI is of great clinical utility. (authors)

  2. Etiological classifications of transient ischemic attacks: subtype classification by TOAST, CCS and ASCO--a pilot study.

    Amort, Margareth; Fluri, Felix; Weisskopf, Florian; Gensicke, Henrik; Bonati, Leo H; Lyrer, Philippe A; Engelter, Stefan T

    2012-01-01

    In patients with transient ischemic attacks (TIA), etiological classification systems are not well studied. The Trial of ORG 10172 in Acute Stroke Treatment (TOAST), the Causative Classification System (CCS), and the Atherosclerosis Small Vessel Disease Cardiac Source Other Cause (ASCO) classification may be useful to determine the underlying etiology. We aimed at testing the feasibility of each of the 3 systems. Furthermore, we studied and compared their prognostic usefulness. In a single-center TIA registry prospectively ascertained over 2 years, we applied 3 etiological classification systems. We compared the distribution of underlying etiologies, the rates of patients with determined versus undetermined etiology, and studied whether etiological subtyping distinguished TIA patients with versus without subsequent stroke or TIA within 3 months. The 3 systems were applicable in all 248 patients. A determined etiology with the highest level of causality was assigned similarly often with TOAST (35.9%), CCS (34.3%), and ASCO (38.7%). However, the frequency of undetermined causes differed significantly between the classification systems and was lowest for ASCO (TOAST: 46.4%; CCS: 37.5%; ASCO: 18.5%; p CCS, and ASCO, cardioembolism (19.4/14.5/18.5%) was the most common etiology, followed by atherosclerosis (11.7/12.9/14.5%). At 3 months, 33 patients (13.3%, 95% confidence interval 9.3-18.2%) had recurrent cerebral ischemic events. These were strokes in 13 patients (5.2%; 95% confidence interval 2.8-8.8%) and TIAs in 20 patients (8.1%, 95% confidence interval 5.0-12.2%). Patients with a determined etiology (high level of causality) had higher rates of subsequent strokes than those without a determined etiology [TOAST: 6.7% (95% confidence interval 2.5-14.1%) vs. 4.4% (95% confidence interval 1.8-8.9%); CSS: 9.3% (95% confidence interval 4.1-17.5%) vs. 3.1% (95% confidence interval 1.0-7.1%); ASCO: 9.4% (95% confidence interval 4.4-17.1%) vs. 2.6% (95% confidence interval

  3. The preliminary study of CT cerebral perfusion imaging in transient ischemic attacks

    Lu Jie; Li Kuncheng; Du Xiangying

    2002-01-01

    Objective: To probe the application of CT cerebral perfusion imaging on transient ischemic attacks (TIA). Methods: Conventional CT and CT cerebral perfusion imaging were performed on 5 normal adults and 20 patients with clinically diagnosed TIA. After regular CT examination, dynamic scans of 40 seconds were performed on selected slice (usually on the basal ganglia slice), while 40 ml non-ionic contrast material were bolus injected through antecubital vein with. These dynamic images were processed with the 'Perfusion CT' software package on a PC based workstation. Cerebral blood flow (CBF) and time to peak (TP) enhancement were measured within specific regions of the brain on CT perfusion images. Quantitative analysis was performed for these images. Results: A gradient of perfusion between gray matter and white matter was showed on cT perfusion images in normal adults and TIA patients. CBF and TP for normal cortical and white matter were 378.2 ml·min -1 ·L -1 , 7.8 s and 112.5 ml·min -1 ·L -1 , 9.9 s, respectively. In 20 cases with TIA, persisting abnormal perfusion changes corresponding to clinical symptoms were found in 15 cases with prolonged TP. Other 5 cases showed normal results. TP of affected side (11.8 +- 4.4) s compared with that of the contralateral side (9.1 +- 3.1) s was significantly prolonged (t = 5.277, P -1 · -1 ] and contralateral side [(229.1 +- 41.4) ml·min -1 ·L -1 ]. Conclusion: Perfusion CT provides valuable hemodynamic information and shows the extent of perfusion disturbances for patients with TIA

  4. The molecular epidemiology of respiratory viruses associated with asthma attacks: A single-center observational study in Japan.

    Saraya, Takeshi; Kimura, Hirokazu; Kurai, Daisuke; Ishii, Haruyuki; Takizawa, Hajime

    2017-10-01

    Few reports have described the significance of viral respiratory infections (VRIs) in exacerbation of asthma in adult patients. The aim of this study was to elucidate the profiles of VRIs in adult patients with asthma along with their molecular epidemiology.A cross-sectional observational study was conducted at Kyorin University Hospital from August 2012 to May 2015. To identify respiratory pathogens in inpatients and outpatients suffering from asthma attacks, RT-PCR/sequencing/phylogenetic analysis methods were applied alongside conventional microbiological methods. Phylogenetic and pairwise distance analyses of 10 viruses were performed.A total of 106 asthma attack patients enrolled in this study in both inpatient (n = 49) and outpatient (n = 57) settings. The total 106 respiratory samples were obtained from nasopharyngeal swab (n = 68) or sputum (n = 38). Among these, patients with virus alone (n = 39), virus and bacterial (n = 5), and bacterial alone (n = 5) were identified. The ratio of virus-positive patients in inpatient or outpatient to the total cases were 31.1% (n = 33) and 10.4% (n = 11), respectively. The frequency of virus-positive patients was significantly higher in inpatients (75.3%, n = 33) than in outpatients (19.3%, n = 11). Major VRIs included human rhinovirus (HRV) (n = 24), human metapneumovirus (hMPV) (n = 9), influenza virus (Inf-V) (n = 8), and respiratory syncytial virus (RSV) (n = 3) infections with seasonal variations. HRV-A and HRV-C were the most commonly detected viruses, with wide genetic divergence on phylogenetic analysis.Asthmatic exacerbations in adults are highly associated with VRIs such as HRV-A or HRV-C, hMPV, RSV, and Inf-V infections with seasonal variations and genetic divergence, but similar frequencies of VRIs occurred in asthma attack patients throughout the seasons.

  5. Regional cerebral blood flow in patients with transient ischemic attacks studied by Xenon-133 inhalation and emission tomography

    Vorstrup, S; Hemmingsen, R; Henriksen, L

    1983-01-01

    Cerebral blood flow CBF was studied in 14 patients with transient ischemic attacks TIA and arteriosclerotic neck vessel disease. CBF was measured by a rapidly rotating single photon emission computerized tomograph using Xenon-133 inhalation. This method yields images of 3 brain slices depicting CBF...... with no abnormality on the CT-scan. The abnormal blood flow pattern was found to be unchanged after clinically successful reconstructive vascular surgery. This suggests the presence of irreversible ischemic tissue damage without gross emollition (incomplete infarction). It is concluded, that TIAs are often harmful...... events, as no less than 9 of the 14 patients studied had evidence of complete and/or incomplete infarction. Thorough examination and rational therapy should be instituted as soon as possible to prevent further ischemic lesions....

  6. The Cyber-Physical Attacker

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  7. WILD PIG ATTACKS ON HUMANS

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  8. Concept definition and aerodynamic technology studies for single-engine V/STOL fighter/attack aircraft

    Nelms, W. P.; Durston, D. A.

    1981-01-01

    The results obtained in the early stages of a research program to develop aerodynamic technology for single-engine V/STOL fighter/attack aircraft projected for the post-1990 period are summarized. This program includes industry studies jointly sponsored by NASA and the Navy. Four contractors have identified promising concepts featuring a variety of approaches for providing propulsive lift. Vertical takeoff gross weights range from about 10,000 to 13,600 kg (22,000 to 30,000 lb). The aircraft have supersonic capability, are highly maneuverable, and have significant short takeoff overload capability. The contractors have estimated the aerodynamics and identified aerodynamic uncertainties associated with their concepts. Wind-tunnel research programs will be formulated to investigate these uncertainties. A description of the concepts is emphasized.

  9. Effects on alcohol use and anxiety of the September 11, 2001, attacks and chronic work stressors: a longitudinal cohort study.

    Richman, Judith A; Wislar, Joseph S; Flaherty, Joseph A; Fendrich, Michael; Rospenda, Kathleen M

    2004-11-01

    We hypothesized that chronic stressors associated with an everyday social role (work) would interact with a traumatic macrosocial stressor (the terrorist attacks of September 11, 2001) in predicting mental health status (during the fall of 2001). We used mail surveys returned as part of wave 3 of a workplace cohort study, both before and after September 11, 2001, to assess decision latitude, sexual harassment, generalized workplace abuse, psychological distress, and alcohol use. We also used regression analyses to assess the main effect of September 11 and interactions between September 11 and stressors, after control for baseline mental health. The main effect of September 11 on elevated alcohol use was significant for women but not for men. For women, work stressors significantly interacted with experiencing the events of September 11 to affect alcohol use and anxiety outcomes. Women experiencing chronic work stressors were most vulnerable to elevated psychological distress and alcohol use after September 11, 2001.

  10. Mass casualty response in the 2008 Mumbai terrorist attacks.

    Roy, Nobhojit; Kapil, Vikas; Subbarao, Italo; Ashkenazi, Isaac

    2011-12-01

    The November 26-29, 2008, terrorist attacks on Mumbai were unique in its international media attention, multiple strategies of attack, and the disproportionate national fear they triggered. Everyone was a target: random members of the general population, iconic targets, and foreigners alike were under attack by the terrorists. A retrospective, descriptive study of the distribution of terror victims to various city hospitals, critical radius, surge capacity, and the nature of specialized medical interventions was gathered through police, legal reports, and interviews with key informants. Among the 172 killed and 304 injured people, about four-fifths were men (average age, 33 years) and 12% were foreign nationals. The case-fatality ratio for this event was 2.75:1, and the mortality rate among those who were critically injured was 12%. A total of 38.5% of patients arriving at the hospitals required major surgical intervention. Emergency surgical operations were mainly orthopedic (external fixation for compound fractures) and general surgical interventions (abdominal explorations for penetrating bullet/shrapnel injuries). The use of heavy-duty automatic weapons, explosives, hostages, and arson in these terrorist attacks alerts us to new challenges to medical counterterrorism response. The need for building central medical control for a coordinated response and for strengthening public hospital capacity are lessons learned for future attacks. These particular terrorist attacks had global consequences, in terms of increased security checks and alerts for and fears of further similar "Mumbai-style" attacks. The resilience of the citizens of Mumbai is a critical measure of the long-term effects of terror attacks.

  11. Terrorists and Suicide Attacks

    Cronin, Audrey K

    2003-01-01

    Suicide attacks by terrorist organizations have become more prevalent globally, and assessing the threat of suicide attacks against the United States and its interests at home and abroad has therefore...

  12. Solidarity under Attack

    Meret, Susi; Goffredo, Sergio

    2017-01-01

    https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack......https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack...

  13. Pericarditis - after heart attack

    ... include: A previous heart attack Open heart surgery Chest trauma A heart attack that has affected the thickness of your heart muscle Symptoms Symptoms include: Anxiety Chest pain from the swollen pericardium rubbing on the ...

  14. Heart attack first aid

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  15. Stakeholders and Apart Hotels: Multiple Case Study

    Elizabeth Kyoko Wada

    2012-09-01

    Full Text Available Means of accommodation involve a wide range of social actors and agents, as well as different business models. Management strategies in this sector have been increasingly important for long-term sustainability and competitiveness of business organizations. This study aims to analyze the interactions between apart-hotels and their stakeholders to foster an improvement of services provided, aligning the interface of strategic management from the point of view of managers and their key stakeholders. It is an exploratory study, with qualitative chacter, along with multiple case studies of the following establishments: Travel Inn, Hotels Slaviero and Etoile george v. Brazilian enterprises, which manage lodging facilities with apart-hotel concepts, combining features that enable comparative analysis of the study. For conceptual understanding, this study was based on literature about stakeholders, taking the work of Freeman (1984 and Freeman et al (2010 as main references. The research was conducted through semi-structured interviews with managers of lodging facilities and their key stakeholders and through direct observation and documentation. We found that not all groups of influence are considered in the planning of service flats. However, the organizations surveyed indicated that the market has realized the importance of the groups that exert influence and are influenced by their goals, and are therefore increasingly alert for integration of such groups in their strategic planning.

  16. Risk for Major Bleeding in Patients Receiving Ticagrelor Compared With Aspirin After Transient Ischemic Attack or Acute Ischemic Stroke in the SOCRATES Study (Acute Stroke or Transient Ischemic Attack Treated With Aspirin or Ticagrelor and Patient Outcomes).

    Easton, J Donald; Aunes, Maria; Albers, Gregory W; Amarenco, Pierre; Bokelund-Singh, Sara; Denison, Hans; Evans, Scott R; Held, Peter; Jahreskog, Marianne; Jonasson, Jenny; Minematsu, Kazuo; Molina, Carlos A; Wang, Yongjun; Wong, K S Lawrence; Johnston, S Claiborne

    2017-09-05

    Patients with minor acute ischemic stroke or transient ischemic attack are at high risk for subsequent stroke, and more potent antiplatelet therapy in the acute setting is needed. However, the potential benefit of more intense antiplatelet therapy must be assessed in relation to the risk for major bleeding. The SOCRATES trial (Acute Stroke or Transient Ischemic Attack Treated With Aspirin or Ticagrelor and Patient Outcomes) was the first trial with ticagrelor in patients with acute ischemic stroke or transient ischemic attack in which the efficacy and safety of ticagrelor were compared with those of aspirin. The main safety objective was assessment of PLATO (Platelet Inhibition and Patient Outcomes)-defined major bleeds on treatment, with special focus on intracranial hemorrhage (ICrH). An independent adjudication committee blinded to study treatment classified bleeds according to the PLATO, TIMI (Thrombolysis in Myocardial Infarction), and GUSTO (Global Use of Strategies to Open Occluded Coronary Arteries) definitions. The definitions of ICrH and major bleeding excluded cerebral microbleeds and asymptomatic hemorrhagic transformations of cerebral infarctions so that the definitions better discriminated important events in the acute stroke population. A total of 13 130 of 13 199 randomized patients received at least 1 dose of study drug and were included in the safety analysis set. PLATO major bleeds occurred in 31 patients (0.5%) on ticagrelor and 38 patients (0.6%) on aspirin (hazard ratio, 0.83; 95% confidence interval, 0.52-1.34). The most common locations of major bleeds were intracranial and gastrointestinal. ICrH was reported in 12 patients (0.2%) on ticagrelor and 18 patients (0.3%) on aspirin. Thirteen of all 30 ICrHs (4 on ticagrelor and 9 on aspirin) were hemorrhagic strokes, and 4 (2 in each group) were symptomatic hemorrhagic transformations of brain infarctions. The ICrHs were spontaneous in 6 and 13, traumatic in 3 and 3, and procedural in 3 and 2

  17. Intravenous lysine clonixinate for the acute treatment of severe migraine attacks: a double-blind, randomized, placebo-controlled study

    Abouch Valenty Krymchantowski, MD, PhD

    2003-09-01

    Full Text Available Background: Several nonsteroidal anti-inflammatory drugs (NSAIDs have been shown to be effective in the treatment of migraine. However, few commercially available NSAIDs can be administered IV. Lysine clonixinate (LC, an NSAID derived from nicotinic acid, has been proved effective in various algesic syndromes (eg, renal colic, muscular pain, nerve compression, odontalgia. The oral formulation of LC has been shown to be effective in the treatment of migraine of moderate severity. Objective: The aim of this study was to assess the efficacy and tolerability of the IV formulation of LC in the treatment of severe migraine. Methods: This double-blind, randomized, placebo-controlled, prospective study enrolled patients with severe migraine (without aura as defined by the criteria of the International Headache Society. When patients presented to a neurology hospital with an outpatient headache unit (Instituto de Neurologia Deolindo Couto, Rio de Janeiro, Brazil with a severe migraine attack that had lasted <4 hours, they were randomized to 1 of 2 groups (IV placebo [25 mL of 0.9% saline] or IV LC [21 mL of 0.9% saline plus 4 mL of LC 200 mg]. Headache intensity and adverse effects (AEs were assessed before (0 minute and 30, 60, and 90 minutes after study drug administration. Rescue medication was available 2 hours after study drug administration, and its use was compared between groups. Results: Thirty-two patients (23 women, 9 men; mean [SD] age, 32 [2] years; range, 18–58 years entered the study. Twenty-nine patients (21 women, 8 men; mean [SD] age, 32 [2] years; range, 18–56 years completed the study. Three patients (all in the placebo group did not complete the study (1 patient was unable to rate the pain severity after drug administration and 2 patients refused IV drug administration. Among study completers, 17 patients received LC and 12 placebo. At 30 minutes, 1 patient (8.3% in the placebo group and 5 patients (29.4% in the LC group were

  18. Triggers of acute attacks of gout, does age of gout onset matter? A primary care based cross-sectional study.

    Abhishek, Abhishek; Valdes, Ana M; Jenkins, Wendy; Zhang, Weiya; Doherty, Michael

    2017-01-01

    To determine the proportion of people with gout who self-report triggers of acute attacks; identify the commonly reported triggers, and examine the disease and demographic features associated with self-reporting any trigger(s) of acute attacks of gout. Individuals with gout were asked to fill a questionnaire enquiring about triggers that precipitated their acute gout attacks. Binary logistic regression was used to compute odds ratio (OR) and 95% confidence intervals (CI) to examine the association between having ≥1 self-reported trigger of acute gout and disease and demographic risk factors and to adjust for covariates. All statistical analyses were performed using STATA. 550 participants returned completed questionnaires. 206 (37.5%) reported at least one trigger of acute attacks, and less than 5% reported >2 triggers. Only 28.73% participants reported that their most recent gout attack was triggered by dietary or lifestyle risk factors. The most frequently self-reported triggers were alcohol intake (14.18%), red-meat or sea-food consumption (6%), dehydration (4.91%), injury or excess activity (4.91%), and excessively warm or cold weather (4.36% and 5.45%). Patients who had onset of gout before the age of 50 years were significantly more likely to identify a trigger for precipitating their acute gout attacks (aOR (95%CI) 1.73 (1.12-2.68) after adjusting for covariates. Most people with gout do not identify any triggers for acute attacks, and identifiable triggers are more common in those with young onset gout. Less than 20% people self-reported acute gout attacks from conventionally accepted triggers of gout e.g. alcohol, red-meat intake, while c.5% reported novel triggers such as dehydration, injury or physical activity, and weather extremes.

  19. Do obese adults have a higher risk of asthma attack when exposed to indoor mold? A study based on the 2005 Behavioral Risk Factor Surveillance System.

    Wen, Xiao-Jun; Balluz, Lina; Mokdad, Ali

    2009-01-01

    Some studies show an association between asthma and obesity, but it is unknown whether exposure to mold will increase the risk of asthma attacks among obese people. This study examined whether obese adults have a higher risk of asthma attacks than non-obese adults when exposed to indoor mold. We used data from the 2005 Behavioral Risk Factor Surveillance System to conduct a cross-sectional analysis among 9,668 respondents who reported exposure to indoor mold. With exposure to indoor mold, weighted prevalence of asthma attacks among obese respondents was 11.4% (95% confidence interval [CI] 6.0, 20.6], which was 2.3 times as high as among the exposed non-obese respondents (5.0%, 95% CI 2.8, 8.8). This ratio was almost the same as the ratio of 2.0:1 between the obese respondents (5.7%, 95% CI 4.6, 7.2) and the non-obese respondents (2.8%, 95% CI 2.3, 3.9) when neither group had exposure to mold. The odds ratio of asthma attack among obese people was 3.10 (95% CI 1.10, 8.67) for those with exposure to mold and 2.21 (95% CI 1.54, 3.17) for those without exposure to mold after adjusting for age, sex, race/ethnicity, and smoking status. Our study suggests that obese adults who have been exposed to indoor mold may not necessarily have a higher risk of asthma attack than obese adults who have not been exposed, even though obesity and exposure to indoor mold are both major risk factors for asthma attack. Medical professionals should not only incorporate weight-control or weight-reduction measures as the components of asthma treatment plans, but also advise asthma patients to avoid exposure to indoor mold.

  20. A novel proposed network security management approach for cyber attacks

    Ahmed, Z.; Nazir, B.; Zafar, M.F.; Anwar, M.M.; Azam, K.; Asar, A.U.

    2007-01-01

    Network security is a discipline that focuses on securing networks from unauthorized access. Given the Escalating threats of malicious cyber attacks, modern enterprises employ multiple lines of defense. A comprehensive defense strategy against such attacks should include (I) an attack detection component that deter- mines the fact that a program is compromised, (2) an attack identification and prevention component that identifies attack packets so that one can block such packets in the future and prevents the attack from further propagation. Over the last decade, a significant amount of research has been vested in the systems that can detect cyber attacks either statically at compile time or dynamically at run time, However, not much effort is spent on automated attack packet identification or attack prevention. In this paper we present a unified solution to the problems mentioned above. We implemented this solution after the forward engineering of Open Source Security Information Management (OSSIM) system called Preventive Information Security management (PrISM) system that correlates input from different sensors so that the resulting product can automatically detect any cyber attack against it and prevents by identifying the actual attack packet(s). The PrISM was always able to detect the attacks, identify the attack packets and most often prevent by blocking the attacker's IP address to continue normal execution. There is no additional run-time performance overhead for attack prevention. (author)

  1. Composite Dos Attack Model

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  2. Predicting Factors of Zone 4 Attack in Volleyball.

    Costa, Gustavo C; Castro, Henrique O; Evangelista, Breno F; Malheiros, Laura M; Greco, Pablo J; Ugrinowitsch, Herbert

    2017-06-01

    This study examined 142 volleyball games of the Men's Super League 2014/2015 seasons in Brazil from which we analyzed 24-26 games of each participating team, identifying 5,267 Zone 4 attacks for further analysis. Within these Zone 4 attacks, we analyzed the association between the effect of the attack carried out and the separate effects of serve reception, tempo and type of attack. We found that the reception, tempo of attack, second tempo of attack, and power of diagonal attack were predictors of the attack effect in Zone 4. Moreover, placed attacks showed a tendency to not yield a score. In conclusion, winning points in high-level men's volleyball requires excellent receptions, a fast attack tempo and powerfully executed of attacks.

  3. Regional cerebral blood flow in patients with transient ischemic attacks studied by Xenon-133 inhalation and emission tomography

    Vorstrup, S.; Hemmingsen, R.; Henriksen, L.; Lindewald, H.; Engell, H.C.; Lassen, N.A.

    1983-01-01

    Cerebral blood flow CBF was studied in 14 patients with transient ischemic attacks TIA and arteriosclerotic neck vessel disease. CBF was measured by a rapidly rotating single photon emission computerized tomograph using Xenon-133 inhalation. This method yields images of 3 brain slices depicting CBF with a spatial resolution of 1.7 cm. Based primarily on the clinical evidence and on the angiographical findings embolism was considered the pathogenetic factor in 10 cases, whereas chronic hemodynamic insufficiency rendered symptomatic by postural factors probably accounted for the symptoms in 4 patients. Of the 14 patients, all studied days to weeks after the most recent TIA, four showed hypoperfused areas on the CBF-tomograms and with roughly the same location hypodense areas on CT-scanning, i.e. areas of complete infarction. However, an additional five patients showed reduction of CBF in areas with no abnormality on the CT-scan. The abnormal blood flow pattern was found to be unchanged after clinically successful reconstructive vascular surgery. This suggests the presence of irreversible ischemic tissue damage without gross emollition (incomplete infarction). It is concluded, that TIAs are often harmful events, as no less than 9 of the 14 patients studied had evidence of complete and/or incomplete infarction. Thorough examination and rational therapy should be instituted as soon as possible to prevent further ischemic lesions

  4. A Study on Salt Attack Protection of Structural and Finishing Materials in Power Plant Structures

    Kim, W B; Kweon, K J; Suh, Y P; Nah, H S; Lee, K J; Park, D S; Jo, Y K [Korea Electric Power Research Institute, Taejeon (Korea, Republic of)

    1998-12-31

    This is a final report written by both KEPRI and KICT as a co-operative research titled {sup A} study on Salt Protection of Structural and Finishings in Power Plant Structures{sup .} This study presented the methods to prevent the chloride-induced corrosion of power plant structures through collection and analysis of research datum relating to design, construction and maintenance for the prevention of structural and finishing materials, thru material performance tests for anti-corrosion under many kinds of chloride-induced corrosion environments. As a result, this study proposed the guidelines for design, construction and maintenance of power plant structures due to chloride-induced corrosion. (author). 257 refs., 111 figs., 86 tabs.

  5. A Study on Salt Attack Protection of Structural and Finishing Materials in Power Plant Structures

    Kim, W.B.; Kweon, K.J.; Suh, Y.P.; Nah, H.S.; Lee, K.J.; Park, D.S.; Jo, Y.K. [Korea Electric Power Research Institute, Taejeon (Korea, Republic of)

    1997-12-31

    This is a final report written by both KEPRI and KICT as a co-operative research titled {sup A} study on Salt Protection of Structural and Finishings in Power Plant Structures{sup .} This study presented the methods to prevent the chloride-induced corrosion of power plant structures through collection and analysis of research datum relating to design, construction and maintenance for the prevention of structural and finishing materials, thru material performance tests for anti-corrosion under many kinds of chloride-induced corrosion environments. As a result, this study proposed the guidelines for design, construction and maintenance of power plant structures due to chloride-induced corrosion. (author). 257 refs., 111 figs., 86 tabs.

  6. A comparison of low-dose risperidone to paroxetine in the treatment of panic attacks: a randomized, single-blind study

    Galynker Igor I

    2009-05-01

    Full Text Available Abstract Background Because a large proportion of patients with panic attacks receiving approved pharmacotherapy do not respond or respond poorly to medication, it is important to identify additional therapeutic strategies for the management of panic symptoms. This article describes a randomized, rater-blind study comparing low-dose risperidone to standard-of-care paroxetine for the treatment of panic attacks. Methods Fifty six subjects with a history of panic attacks were randomized to receive either risperidone or paroxetine. The subjects were then followed for eight weeks. Outcome measures included the Panic Disorder Severity Scale (PDSS, the Hamilton Anxiety Scale (Ham-A, the Hamilton Depression Rating Scale (Ham-D, the Sheehan Panic Anxiety Scale-Patient (SPAS-P, and the Clinical Global Impression scale (CGI. Results All subjects demonstrated a reduction in both the frequency and severity of panic attacks regardless of treatment received. Statistically significant improvements in rating scale scores for both groups were identified for the PDSS, the Ham-A, the Ham-D, and the CGI. There was no difference between treatment groups in the improvement in scores on the measures PDSS, Ham-A, Ham-D, and CGI. Post hoc tests suggest that subjects receiving risperidone may have a quicker clinical response than subjects receiving paroxetine. Conclusion We can identify no difference in the efficacy of paroxetine and low-dose risperidone in the treatment of panic attacks. Low-dose risperidone appears to be tolerated equally well as paroxetine. Low-dose risperidone may be an effective treatment for anxiety disorders in which panic attacks are a significant component. Trial Registration ClinicalTrials.gov Identifier: NCT100457106

  7. Perception of Recurrent Stroke Risk among Black, White and Hispanic Ischemic Stroke and Transient Ischemic Attack Survivors: The SWIFT Study

    Boden-Albala, Bernadette; Carman, Heather; Moran, Megan; Doyle, Margaret; Paik, Myunghee C.

    2011-01-01

    Objectives Risk modification through behavior change is critical for primary and secondary stroke prevention. Theories of health behavior identify perceived risk as an important component to facilitate behavior change; however, little is known about perceived risk of vascular events among stroke survivors. Methods The SWIFT (Stroke Warning Information and Faster Treatment) study includes a prospective population-based ethnically diverse cohort of ischemic stroke and transient ischemic attack survivors. We investigate the baseline relationship between demographics, health beliefs, and knowledge on risk perception. Regression models examined predictors of inaccurate perception. Results Only 20% accurately estimated risk, 10% of the participants underestimated risk, and 70% of the 817 study participants significantly overestimated their risk for a recurrent stroke. The mean perceived likelihood of recurrent ischemic stroke in the next 10 years was 51 ± 7%. We found no significant differences by race-ethnicity with regard to accurate estimation of risk. Inaccurate estimation of risk was associated with attitudes and beliefs [worry (p risk factors. Conclusion This paper provides a unique perspective on how factors such as belief systems influence risk perception in a diverse population at high stroke risk. There is a need for future research on how risk perception can inform primary and secondary stroke prevention. Copyright © 2011 S. Karger AG, Basel PMID:21894045

  8. Quantum mechanical study of solvent effects in a prototype SN2 reaction in solution: Cl- attack on CH3Cl.

    Kuechler, Erich R; York, Darrin M

    2014-02-07

    The nucleophilic attack of a chloride ion on methyl chloride is an important prototype SN2 reaction in organic chemistry that is known to be sensitive to the effects of the surrounding solvent. Herein, we develop a highly accurate Specific Reaction Parameter (SRP) model based on the Austin Model 1 Hamiltonian for chlorine to study the effects of solvation into an aqueous environment on the reaction mechanism. To accomplish this task, we apply high-level quantum mechanical calculations to study the reaction in the gas phase and combined quantum mechanical/molecular mechanical simulations with TIP3P and TIP4P-ew water models and the resulting free energy profiles are compared with those determined from simulations using other fast semi-empirical quantum models. Both gas phase and solution results with the SRP model agree very well with experiment and provide insight into the specific role of solvent on the reaction coordinate. Overall, the newly parameterized SRP Hamiltonian is able to reproduce both the gas phase and solution phase barriers, suggesting it is an accurate and robust model for simulations in the aqueous phase at greatly reduced computational cost relative to comparably accurate ab initio and density functional models.

  9. Myocardial infarction (heart attack) and its risk factors: a statistical study

    Salahuddin; Alamgir

    2005-01-01

    A Statistical technique of odds ratio analysis was performed to look at the association of Myocardial Infarction with sex, smoking, hypertension, cholesterol, diabetes, family history, number of dependents, household income and residence. For this purpose a total of 506 patients were examined and their personal and medical data were collected. For each patient, the phenomenon of myocardial infarction was studied in relation to different risk factors. The analysis suggests that smoking, hypertension, cholesterol level, diabetes, family history are important risk factors for the occurrence of MI. (author)

  10. Note on Studying Change Point of LRD Traffic Based on Li's Detection of DDoS Flood Attacking

    Zhengmin Xia

    2010-01-01

    Full Text Available Distributed denial-of-service (DDoS flood attacks remain great threats to the Internet. To ensure network usability and reliability, accurate detection of these attacks is critical. Based on Li's work on DDoS flood attack detection, we propose a DDoS detection method by monitoring the Hurst variation of long-range dependant traffic. Specifically, we use an autoregressive system to estimate the Hurst parameter of normal traffic. If the actual Hurst parameter varies significantly from the estimation, we assume that DDoS attack happens. Meanwhile, we propose two methods to determine the change point of Hurst parameter that indicates the occurrence of DDoS attacks. The detection rate associated with one method and false alarm rate for the other method are also derived. The test results on DARPA intrusion detection evaluation data show that the proposed approaches can achieve better detection performance than some well-known self-similarity-based detection methods.

  11. Anger attacks in obsessive compulsive disorder

    Nitesh Prakash Painuly

    2011-01-01

    Full Text Available Background: Research on anger attacks has been mostly limited to depression, and only a few studies have focused on anger attacks in obsessive compulsive disorder. Materials and Methods: In a cross-sectional study all new obsessive compulsive disorder patients aged 20-60 years attending an outpatient clinic were assessed using the anger attack questionnaire, irritability, depression and anxiety scale (for the direction of the aggressive behavior and quality of life (QOL. Results: The sample consisted of 42 consecutive subjects with obsessive compulsive disorder, out of which 21 (50% had anger attacks. The obsessive compulsive disorder subjects with and without anger attacks did not show significant differences in terms of sociodemographic variables, duration of illness, treatment, and family history. However, subjects with anger attacks had significantly higher prevalence of panic attacks and comorbid depression. Significantly more subjects with anger attacks exhibited aggressive acts toward spouse, parents, children, and other relatives in the form of yelling and threatening to hurt, trying to hurt, and threatening to leave. However, the two groups did not differ significantly in terms of QOL, except for the psychological domain being worse in the subjects with anger attacks. Conclusion: Anger attacks are present in half of the patients with obsessive compulsive disorder, and they correlate with the presence of comorbid depression.

  12. Detection of complex cyber attacks

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  13. Multiplicity: An Explorative Interview Study on Personal Experiences of People with Multiple Selves.

    Ribáry, Gergő; Lajtai, László; Demetrovics, Zsolt; Maraz, Aniko

    2017-01-01

    Background and aims: Personality psychology research relies on the notion that humans have a single self that is the result of the individual's thoughts, feelings, and behaviors that can be reliably described (i.e., through traits). People who identify themselves as "multiple" have a system of multiple or alternative, selves, that share the same physical body. This is the first study to explore the phenomenon of multiplicity by assessing the experiences of people who identify themselves as "multiple." Methods: First, an Internet forum search was performed using the terms "multiplicity" and "multiple system." Based on that search, people who identified themselves as multiple were contacted. Interviews were conducted by a consultant psychiatrist, which produced six case vignettes. Results: Multiplicity is discussed on Twitter, Tumblr, Google+ and several other personal websites, blogs, and forums maintained by multiples. According to the study's estimates, there are 200-300 individuals who participate in these forums and believe they are multiple. Based on the six interviews, it appears that multiples have several selves who are relatively independent of each other and constitute the personality's system. Each "resident person" or self, has their own unique behavioral pattern, which is triggered by different situations. However, multiples are a heterogeneous group in terms of their system organization, memory functions, and control over switching between selves. Conclusions: Multiplicity can be placed along a continuum between identity disturbance and dissociative identity disorder (DID), although most systems function relatively well in everyday life. Further research is needed to explore this phenomenon, especially in terms of the extent to which multiplicity can be regarded as a healthy way of coping.

  14. Intravenous lysine clonixinate for the acute treatment of severe migraine attacks: a double-blind, randomized, placebo-controlled study.

    Krymchantowski, Abouch Valenty; Silva, Marcus Tulius T

    2003-09-01

    Several nonsteroidal anti-inflammatory drugs (NSAIDs) have been shown to be effective in the treatment of migraine. However, few commercially available NSAIDs can be administered IV. Lysine clonixinate (LC), an NSAID derived from nicotinic acid, has been proved effective in various algesic syndromes (eg, renal colic, muscular pain, nerve compression, odontalgia). The oral formulation of LC has been shown to be effective in the treatment of migraine of moderate severity. The aim of this study was to assess the efficacy and tolerability of the IV formulation of LC in the treatment of severe migraine. This double-blind, randomized, placebo-controlled, prospective study enrolled patients with severe migraine (without aura) as defined by the criteria of the International Headache Society. When patients presented to a neurology hospital with an outpatient headache unit (Instituto de Neurologia Deolindo Couto, Rio de Janeiro, Brazil) with a severe migraine attack that had lasted <4 hours, they were randomized to 1 of 2 groups (IV placebo [25 mL of 0.9% saline] or IV LC [21 mL of 0.9% saline plus 4 mL of LC 200 mg]). Headache intensity and adverse effects (AEs) were assessed before (0 minute) and 30, 60, and 90 minutes after study drug administration. Rescue medication was available 2 hours after study drug administration, and its use was compared between groups. Thirty-two patients (23 women, 9 men; mean [SD] age, 32 [2] years; range, 18-58 years) entered the study. Twenty-nine patients (21 women, 8 men; mean [SD] age, 32 [2] years; range, 18-56 years) completed the study. Three patients (all in the placebo group) did not complete the study (1 patient was unable to rate the pain severity after drug administration and 2 patients refused IV drug administration). Among study completers, 17 patients received LC and 12 placebo. At 30 minutes, 1 patient (8.3%) in the placebo group and 5 patients (29.4%) in the LC group were pain free; the between-group difference was not

  15. Increasing Incidence of Hospitalization for Stroke and Transient Ischemic Attack in Young Adults: A Registry-Based Study.

    Tibæk, Maiken; Dehlendorff, Christian; Jørgensen, Henrik S; Forchhammer, Hysse B; Johnsen, Søren P; Kammersgaard, Lars P

    2016-05-11

    Studies have reported increasing incidence of ischemic stroke in adults younger than 50 to 55 years. Information on temporal trends of other stroke subtypes and transient ischemic attack (TIA) is sparse. The aim of this study was to investigate temporal trends of the incidence of hospitalizations for TIA and stroke including sex- and subtype-specific trends in young adults aged 15 to 30 years. From the Danish National Patient Register, we identified all cases of first-ever stroke and TIA (age 15-30 years) in Denmark, who were hospitalized during the study period of 1994 to 2012. Incidence rates and estimated annual percentage changes (EAPCs) were estimated by using Poisson regression. During the study period, 4156 cases of first-ever hospitalization for stroke/TIA were identified. The age-standardized incidence rates of hospitalizations for stroke increased significantly (EAPC 1.83% [95% CI 1.11-2.55%]) from 11.97/100 000 person-years (PY) in 1994 to 16.77/100 000 PY in 2012. TIA hospitalizations increased from 1.93/100 000 PY in 1994 to 5.81/100 000 PY in 2012 and after 2006 more markedly in men than in women (EAPC 16.61% [95% CI 10.45-23.12%]). The incidence of hospitalizations for ischemic stroke was markedly lower among men, but increased significantly from 2006 (EAPC 14.60% [95% CI 6.22-23.63%]). The incidences of hospitalizations for intracerebral hemorrhage and subarachnoid hemorrhage remained stable during the study period. The incidence rates of first-time hospitalizations for ischemic stroke and TIA in young Danish adults have increased substantially since the mid 1990s. The increase was particularly prominent in the most recent years. © 2016 The Authors. Published on behalf of the American Heart Association, Inc., by Wiley Blackwell.

  16. Web server attack analyzer

    Mižišin, Michal

    2013-01-01

    Web server attack analyzer - Abstract The goal of this work was to create prototype of analyzer of injection flaws attacks on web server. Proposed solution combines capabilities of web application firewall and web server log analyzer. Analysis is based on configurable signatures defined by regular expressions. This paper begins with summary of web attacks, followed by detection techniques analysis on web servers, description and justification of selected implementation. In the end are charact...

  17. Hotels as a target for terrorism: a study of the Helsinki area hotels’ preparedness for an attack

    Kovalevskiy, Andrey

    2015-01-01

    The threat of terrorism is an issue that is not to be taken lightly in the world of today. The year 2015 has sadly been marked with an unsettlingly high number of acts of terror across the globe that claimed a multitude of civilian lives. The hospitality industry and hotels in particular are especially vulnerable to a potential terrorist attack, and this fact attracted the author’s attention to the issue of the prevention of such attacks and the measures (if any) that the Helsinki hotels are ...

  18. Seven Deadliest Microsoft Attacks

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  19. Transient Ischemic Attack

    Full Text Available ... stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. ...

  20. Seven deadliest USB attacks

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  1. DDOS ATTACK DETECTION SIMULATION AND HANDLING MECHANISM

    Ahmad Sanmorino

    2013-11-01

    Full Text Available In this study we discuss how to handle DDoS attack that coming from the attacker by using detection method and handling mechanism. Detection perform by comparing number of packets and number of flow. Whereas handling mechanism perform by limiting or drop the packets that detected as a DDoS attack. The study begins with simulation on real network, which aims to get the real traffic data. Then, dump traffic data obtained from the simulation used for detection method on our prototype system called DASHM (DDoS Attack Simulation and Handling Mechanism. From the result of experiment that has been conducted, the proposed method successfully detect DDoS attack and handle the incoming packet sent by attacker.

  2. Case studies: Soil mapping using multiple methods

    Petersen, Hauke; Wunderlich, Tina; Hagrey, Said A. Al; Rabbel, Wolfgang; Stümpel, Harald

    2010-05-01

    Soil is a non-renewable resource with fundamental functions like filtering (e.g. water), storing (e.g. carbon), transforming (e.g. nutrients) and buffering (e.g. contamination). Degradation of soils is meanwhile not only to scientists a well known fact, also decision makers in politics have accepted this as a serious problem for several environmental aspects. National and international authorities have already worked out preservation and restoration strategies for soil degradation, though it is still work of active research how to put these strategies into real practice. But common to all strategies the description of soil state and dynamics is required as a base step. This includes collecting information from soils with methods ranging from direct soil sampling to remote applications. In an intermediate scale mobile geophysical methods are applied with the advantage of fast working progress but disadvantage of site specific calibration and interpretation issues. In the framework of the iSOIL project we present here some case studies for soil mapping performed using multiple geophysical methods. We will present examples of combined field measurements with EMI-, GPR-, magnetic and gammaspectrometric techniques carried out with the mobile multi-sensor-system of Kiel University (GER). Depending on soil type and actual environmental conditions, different methods show a different quality of information. With application of diverse methods we want to figure out, which methods or combination of methods will give the most reliable information concerning soil state and properties. To investigate the influence of varying material we performed mapping campaigns on field sites with sandy, loamy and loessy soils. Classification of measured or derived attributes show not only the lateral variability but also gives hints to a variation in the vertical distribution of soil material. For all soils of course soil water content can be a critical factor concerning a succesful

  3. Association between self-perceived psychological stress and transitory ischaemic attack and minor stroke: A case-control study.

    Ramírez-Moreno, J M; Muñoz Vega, P; Espada, S; Bartolomé Alberca, S; Aguirre, J; Peral, D

    2017-12-22

    Stroke has a complex aetiopathogenesis influenced by numerous risk factors. There is growing interest in the study of the pathophysiological changes associated with stress and their potential relationship with cerebrovascular disease. The purpose of this paper is to assess the strength of association between exposure to stress and stroke. We conducted a case-control study (1:1) to compare exposure to stress in a group of patients with a history of a first transient ischaemic attack (TIA) or minor stroke and in a control group. Participants were asked a subjective question about their perception of stress in the previous months and completed the standardised Effort-Reward Imbalance (ERI) questionnaire. Logistic regression models were used for data analysis. The study included data on 50 cases and 50 controls. There were no significant differences in demographic variables and economic, social, and employment status between cases and controls. Fifty percent of the cases reported moderate to severe stress, compared to 30% of controls (OR: 2.33; 95% CI: 1.02-5.30; P=.041). ERI questionnaire results found that greater effort at work (OR: 1.48; 95% CI: 1.19-1.83) and greater commitment is associated with stroke (OR: 1.34; 95% CI: 1.17-1.54), while higher reward constitutes a protective factor against the disease (OR: 0.71; 95% CI: 0.61-0.82). There is a strong association between self-perceived psychological stress and TIA. The imbalance between effort and reward at work is also clearly related to TIA. Copyright © 2017 Sociedad Española de Neurología. Publicado por Elsevier España, S.L.U. All rights reserved.

  4. Protecting mobile agents from external replay attacks

    Garrigues Olivella, Carles; Migas, Nikos; Buchanan, William; Robles, Sergi; Borrell Viader, Joan

    2014-01-01

    Peer-reviewed This paper presents a protocol for the protection of mobile agents against external replay attacks. This kind of attacks are performed by malicious platforms when dispatching an agent multiple times to a remote host, thus making it reexecute part of its itinerary. Current proposals aiming to address this problem are based on storing agent identifiers, or trip markers, inside agent platforms, so that future reexecutions can be detected and prevented. The problem of these solut...

  5. Cyber attack analysis on cyber-physical systems: Detectability, severity, and attenuation strategy

    Kwon, Cheolhyeon

    computational cost. The proposed algorithm is validated through a linearized longitudinal motion of a UAV example. Finally, we propose an attack attenuation strategy via the controller design for CPSs that are robust to various types of cyber attacks. While the previous studies have investigated a secure control by assuming a specific attack strategy, in this research we propose a hybrid robust control scheme that contains multiple sub-controllers, each matched to a specific type of cyber attacks. Then the system can be adapted to various cyber attacks (including those that are not assumed for sub-controller design) by switching its sub-controllers to achieve the best performance. Then, a method for designing a secure switching logic to counter all possible cyber attacks is proposed and it verifies mathematically the system's performance and stability as well. The performance of the proposed control scheme is demonstrated by an example with the hybrid H2 - H-infinity controller applied to a UAV example.

  6. Delay in Seeking Medical Help following Transient Ischemic Attack (TIA) or “Mini-Stroke”: A Qualitative Study

    Mc Sharry, Jennifer; Baxter, Alison; Wallace, Louise M.; Kenton, Anthony; Turner, Andrew; French, David P.

    2014-01-01

    Background Prompt treatment following Transient Ischemic Attack (TIA) can reduce the risk of subsequent stroke and disability. However, many patients delay in making contact with medical services. This study aimed to explore TIA patients' accounts of delay between symptom onset and contacting medical services including how decisions to contact services were made and the factors discussed in relation to delay. Methods Twenty interviews were conducted with TIA patients in England. Using a previous systematic review as an initial framework, interview data were organised into categories of symptom recognition, presence of others and type of care sought. A thematic analysis was then conducted to explore descriptions of care-seeking relevant to each category. Results Delay in contacting medical services varied from less than an hour to eight days. Awareness of typical stroke symptoms could lead to urgent action when more severe TIA symptoms were present but could lead to delay when experienced symptoms were less severe. The role of friends and family varied widely from deciding on and enacting care-seeking decisions to simply providing transport to the GP practice. When family or friends played a greater role, and both made and enacted care-seeking decisions, delays were often shorter, even when patients themselves failed to identify symptoms. Healthcare professionals also impacted on patients' care-seeking with greater delays in seeking further care for the same episode described when patients perceived a lack of urgency during initial healthcare interactions. Conclusions This study provides new information on patients' decisions to contact medical services following TIA and identifies overlapping factors that can lead to delay in receiving appropriate treatment. While recognition of symptoms may contribute to delay in contacting medical services, additional factors, including full responsibility being taken by others and initial healthcare interactions, can over

  7. Delay in seeking medical help following Transient Ischemic Attack (TIA) or "mini-stroke": a qualitative study.

    Mc Sharry, Jennifer; Baxter, Alison; Wallace, Louise M; Kenton, Anthony; Turner, Andrew; French, David P

    2014-01-01

    Prompt treatment following Transient Ischemic Attack (TIA) can reduce the risk of subsequent stroke and disability. However, many patients delay in making contact with medical services. This study aimed to explore TIA patients' accounts of delay between symptom onset and contacting medical services including how decisions to contact services were made and the factors discussed in relation to delay. Twenty interviews were conducted with TIA patients in England. Using a previous systematic review as an initial framework, interview data were organised into categories of symptom recognition, presence of others and type of care sought. A thematic analysis was then conducted to explore descriptions of care-seeking relevant to each category. Delay in contacting medical services varied from less than an hour to eight days. Awareness of typical stroke symptoms could lead to urgent action when more severe TIA symptoms were present but could lead to delay when experienced symptoms were less severe. The role of friends and family varied widely from deciding on and enacting care-seeking decisions to simply providing transport to the GP practice. When family or friends played a greater role, and both made and enacted care-seeking decisions, delays were often shorter, even when patients themselves failed to identify symptoms. Healthcare professionals also impacted on patients' care-seeking with greater delays in seeking further care for the same episode described when patients perceived a lack of urgency during initial healthcare interactions. This study provides new information on patients' decisions to contact medical services following TIA and identifies overlapping factors that can lead to delay in receiving appropriate treatment. While recognition of symptoms may contribute to delay in contacting medical services, additional factors, including full responsibility being taken by others and initial healthcare interactions, can over-ride or undermine the importance of patients

  8. Cardiorespiratory Fitness after Transient Ischemic Attack and Minor Ischemic Stroke : Baseline Data of the MoveIT Study

    Boss, H. Myrthe; Deijle, Inger A.; Van Schaik, Sander M.; de Melker, Edwin C.; van den Berg, Bob T.J.; Weinstein, Henry C.; Geerlings, Mirjam I.; Kappelle, L. Jaap; Van den Berg-Vos, Renske M.

    2017-01-01

    Background Cardiorespiratory fitness (CRF) is reduced in patients with stroke. It is unclear whether it is also reduced in patients with a transient ischemic attack (TIA) or minor stroke. We investigated the CRF in patients with a recent TIA or minor stroke and explored which determinants are

  9. The effect of the September 11 terrorist attacks on suicide and deliberate self-harm : A time trend study

    De Lange, AW; Neeleman, J

    2004-01-01

    Suicide rates may be affected by world news. Our objective was to investigate the possible impact of the terrorist attacks of September 11, 2001, on suicidal behavior in the Netherlands. There was evidence of an increase in rates of suicide and deliberate self-harm in the weeks immediately following

  10. Multiplicity: An Explorative Interview Study on Personal Experiences of People with Multiple Selves

    Gergő Ribáry

    2017-06-01

    Full Text Available Background and aims: Personality psychology research relies on the notion that humans have a single self that is the result of the individual's thoughts, feelings, and behaviors that can be reliably described (i.e., through traits. People who identify themselves as “multiple” have a system of multiple or alternative, selves, that share the same physical body. This is the first study to explore the phenomenon of multiplicity by assessing the experiences of people who identify themselves as “multiple.”Methods: First, an Internet forum search was performed using the terms “multiplicity” and “multiple system.” Based on that search, people who identified themselves as multiple were contacted. Interviews were conducted by a consultant psychiatrist, which produced six case vignettes.Results: Multiplicity is discussed on Twitter, Tumblr, Google+ and several other personal websites, blogs, and forums maintained by multiples. According to the study's estimates, there are 200–300 individuals who participate in these forums and believe they are multiple. Based on the six interviews, it appears that multiples have several selves who are relatively independent of each other and constitute the personality's system. Each “resident person” or self, has their own unique behavioral pattern, which is triggered by different situations. However, multiples are a heterogeneous group in terms of their system organization, memory functions, and control over switching between selves.Conclusions: Multiplicity can be placed along a continuum between identity disturbance and dissociative identity disorder (DID, although most systems function relatively well in everyday life. Further research is needed to explore this phenomenon, especially in terms of the extent to which multiplicity can be regarded as a healthy way of coping.

  11. Assessment of demyelination, edema, and gliosis by in vivo determination of T1 and T2 in the brain of patients with acute attack of multiple sclerosis

    Larsson, H B; Frederiksen, J; Petersen, J

    1989-01-01

    -body superconductive MR-scanner, operating at 1.5 T. The measurements were repeated several times, from onset of the disease and during remission by use of six-point partial saturation inversion recovery and 32-echo multiple spin-echo sequences, giving T1 and T2, respectively. We also focused on the issue, whether T1....... Hendriksen, and J. Olesen, Magn. Reson. Med. 7, 43 (1988)). In some of the acute plaques a slight initial increase in T1 and T2 was seen, when the measurement was repeated in about 10 days. Thereafter T1 decreased slowly in all but one patient as a function of days. In all cases the T1 relaxation process...

  12. Multiple sclerosis in women having children by multiple partners. A population-based study in Denmark

    Basso, Olga; Campi, Rita; Frydenberg, Morten

    2004-01-01

    We investigated whether having children with multiple men is a risk factor for being diagnosed with multiple sclerosis (MS). We studied a cohort of 151,328 women, of whom 64,704 had different men fathering their children and 86,624 the same partner for all births. Women were included if they had ...

  13. Plants under dual attack

    Ponzio, C.A.M.

    2016-01-01

    Though immobile, plants are members of complex environments, and are under constant threat from a wide range of attackers, which includes organisms such as insect herbivores or plant pathogens. Plants have developed sophisticated defenses against these attackers, and include chemical responses

  14. Heart attack - discharge

    ... and lifestyle Cholesterol - drug treatment Controlling your high blood pressure Deep vein thrombosis - discharge Dietary fats explained Fast food tips Heart attack - discharge Heart attack - what to ask your doctor Heart bypass ... pacemaker - discharge High blood pressure - what to ask your doctor How to read ...

  15. Transient ischemic attacks and presence of an acute brain lesion in diffusion-weighted MRI: study of 50 patients

    Sabeti M

    2012-10-01

    Full Text Available Background: Finding an acute brain lesion by diffusion-weighted (DW MRI upon an episode of transient ischemic attack (TIA is a predictor of imminent stroke in the near future. Therefore, exploring risk factors associated with lesions in DW-MRI of the brain is important in adopting an approach to TIA management. In the current study, we tried to determine the risk factors associated with lesions in DW-MRI of the brain in patients experiencing TIA episodes.Methods: Fifty patients with TIA were recruited consecutively in Sina Hospital, Tehran, Iran, over a 6-month period between July 2008 and January 2009. All of the patients underwent a complete neurological examination and laboratory tests. Brain DW-MRIs were performed for all the patients within 72 hours of a TIA episode.Results: DW-MRI revealed an acute lesion in 16% of the participants. There was a significant correlation between presence of an acute lesion in DW-MRI and TIA duration, history of diabetes mellitus and presence of unilateral facial palsy (P=0.0003, P=0.02 and P=0.008, respectively. Other variables such as age, hypertension, hyperlipidemia, past history of TIA, headache, vertigo, and sensory or visual disturbances had no significant relation with the presence of an acute lesion in DW-MRI.Conclusion: Duration of TIA, presence of diabetes mellitus and unilateral facial palsy are risk factors for an acute lesion in DW-MRI, meaning that patients with such risk factors are at risk for stroke in the near future.

  16. Defense and attack of complex and dependent systems

    Hausken, Kjell

    2010-01-01

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  17. Defense and attack of complex and dependent systems

    Hausken, Kjell, E-mail: kjell.hausken@uis.n [Faculty of Social Sciences, University of Stavanger, N-4036 Stavanger (Norway)

    2010-01-15

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  18. Integrating cyber attacks within fault trees

    Nai Fovino, Igor; Masera, Marcelo; De Cian, Alessio

    2009-01-01

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  19. Integrating cyber attacks within fault trees

    Nai Fovino, Igor [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy)], E-mail: igor.nai@jrc.it; Masera, Marcelo [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy); De Cian, Alessio [Department of Electrical Engineering, University di Genova, Genoa (Italy)

    2009-09-15

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  20. Workplace response of companies exposed to the 9/11 World Trade Center attack: a focus-group study

    North, Carol S.; Pfefferbaum, Betty; Hong, Barry A.; Gordon, Mollie R.; Kim, You-Seung; Lind, Lisa; Pollio, David E.

    2014-01-01

    The terrorist attacks of 11 September 2001 (9/11) left workplaces in pressing need of a mental health response capability. Unaddressed emotional sequelae may be devastating to the productivity and economic stability of a company’s workforce. In the second year after the attacks, 85 employees of five highly affected agencies participated in 12 focus groups to discuss workplace mental health issues. Managers felt ill prepared to manage the magnitude and the intensity of employees’ emotional responses. Rapid return to work, provision of workplace mental health services, and peer support were viewed as contributory to emotional recovery. Formal mental health services provided were perceived as insufficient. Drawing on their post-9/11 workplace experience, members of these groups identified practical measures that they found helpful in promoting healing outside of professional mental health services. These measures, consistent with many principles of psychological first aid, may be applied by workplace leaders who are not mental health professionals. PMID:23066661

  1. Screening for generalized anxiety disorder symptoms in the wake of terrorist attacks: a study in primary care.

    Ghafoori, Bita; Neria, Yuval; Gameroff, Marc J; Olfson, Mark; Lantigua, Rafael; Shea, Steven; Weissman, Myrna M

    2009-06-01

    Little is known about the mental health impact of terrorism beyond posttraumatic stress disorder (PTSD) and depression. The associations between exposure to the September 11, 2001 (9/11) attacks in New York City and generalized anxiety disorder (GAD) symptoms were examined in a sample of 929 primary care patients. After controlling for PTSD, depression, panic and substance use disorders, and pre-9/11 trauma, patients who screened positive (vs. negative) for GAD symptoms were roughly twice as likely to report having a loved one at the 9/11 disaster site, twice as likely to know someone who was killed by the attacks, and twice as likely to know someone who was involved with the rescue/recovery efforts after the disaster. Implications for treatment and future research are discussed.

  2. Adaptive cyber-attack modeling system

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  3. Heart Attack Payment - National

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for heart...

  4. Heart Attack Payment - Hospital

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  5. Heart Attack Payment - State

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  6. Cooperating attackers in neural cryptography.

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  7. Baseline Quality of Life and Risk of Stroke in the ALLHAT Study (Antihypertensive and Lipid-Lowering Treatment to Prevent Heart Attack Trial).

    Shams, Tanzila; Auchus, Alexander P; Oparil, Suzanne; Wright, Clinton B; Wright, Jackson; Furlan, Anthony J; Sila, Cathy A; Davis, Barry R; Pressel, Sara; Yamal, Jose-Miguel; Einhorn, Paula T; Lerner, Alan J

    2017-11-01

    The visual analogue scale is a self-reported, validated tool to measure quality of life (QoL). Our purpose was to determine whether baseline QoL predicted strokes in the ALLHAT study (Antihypertensive and Lipid Lowering Treatment to Prevent Heart Attack Trial) and evaluate determinants of poststroke change in QoL. In the ALLHAT study, among the 33 357 patients randomized to treatment arms, 1525 experienced strokes; 1202 (79%) strokes were nonfatal. This study cohort includes 32 318 (97%) subjects who completed the baseline visual analogue scale QoL estimate. QoL was measured on a visual analogue scale and adjusted using a Torrance transformation (transformed QoL [TQoL]). Kaplan-Meier curves and adjusted proportional hazards analyses were used to estimate the effect of TQoL on the risk of stroke, on a continuous scale (0-1) and by quartiles (≤0.81, >0.81≤0.89, >0.89≤0.95, >0.95). We analyzed the change from baseline to first poststroke TQoL using adjusted linear regression. After adjusting for multiple stroke risk factors, the hazard ratio for stroke events for baseline TQoL was 0.93 (95% confidence interval, 0.89-0.98) per 0.1 U increase. The lowest baseline TQoL quartile had a 20% increased stroke risk (hazard ratio=1.20 [95% confidence interval, 1.00-1.44]) compared with the reference highest quartile TQoL. Poststroke TQoL change was significant within all treatment groups ( P ≤0.001). Multivariate regression analysis revealed that baseline TQoL was the strongest predictor of poststroke TQoL with similar results for the untransformed QoL. The lowest baseline TQoL quartile had a 20% higher stroke risk than the highest quartile. Baseline TQoL was the only factor that predicted poststroke change in TQoL. URL: http://www.clinicaltrials.gov. Unique identifier: NCT00000542. © 2017 American Heart Association, Inc.

  8. Genetic Epidemiological Studies of Multiple Sclerose

    I.A. Hoppenbrouwers (Ilse)

    2011-01-01

    textabstractThe objective of this thesis was to find new risk alleles for MS. This may finally result in a better understanding of the pathogenesis of MS. Knowledge of MS disease pathways can direct strategies for prevention, diagnosis and therapy. In our study, we included MS patients from a

  9. Hypergame theory applied to cyber attack and defense

    House, James Thomas; Cybenko, George

    2010-04-01

    This work concerns cyber attack and defense in the context of game theory--specifically hypergame theory. Hypergame theory extends classical game theory with the ability to deal with differences in players' expertise, differences in their understanding of game rules, misperceptions, and so forth. Each of these different sub-scenarios, or subgames, is associated with a probability--representing the likelihood that the given subgame is truly "in play" at a given moment. In order to form an optimal attack or defense policy, these probabilities must be learned if they're not known a-priori. We present hidden Markov model and maximum entropy approaches for accurately learning these probabilities through multiple iterations of both normal and modified game play. We also give a widely-applicable approach for the analysis of cases where an opponent is aware that he is being studied, and intentionally plays to spoil the process of learning and thereby obfuscate his attributes. These are considered in the context of a generic, abstract cyber attack example. We demonstrate that machine learning efficacy can be heavily dependent on the goals and styles of participant behavior. To this end detailed simulation results under various combinations of attacker and defender behaviors are presented and analyzed.

  10. Use of Attack Graphs in Security Systems

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  11. Genome-wide association study identifies multiple susceptibility loci for multiple myeloma

    Mitchell, Jonathan S; Li, Ni; Weinhold, Niels

    2016-01-01

    Multiple myeloma (MM) is a plasma cell malignancy with a significant heritable basis. Genome-wide association studies have transformed our understanding of MM predisposition, but individual studies have had limited power to discover risk loci. Here we perform a meta-analysis of these GWAS, add a ...

  12. Memory, Multiplication and Mnemonics: A Study into the Recall of Basic Multiplication Facts

    Brewer, Robert A.

    2004-01-01

    The purpose of this study is to examine what effects the mnemonic devices of pictures and stories have on the memorization and recall of multiplication facts. This study was conducted on a fourth grade classroom in which the students were divided into three groups. The first group was given standard flashcards, the second group was given a set of…

  13. Subjective Cognitive Impairment, Depressive Symptoms, and Fatigue after a TIA or Transient Neurological Attack: A Prospective Study.

    van Rooij, Frank G; Plaizier, Nicole O; Vermeer, Sarah E; Góraj, Bozena M; Koudstaal, Peter J; Richard, Edo; de Leeuw, Frank-Erik; Kessels, Roy P C; van Dijk, Ewoud J

    2017-01-01

    Subjective cognitive impairment (SCI), depressive symptoms, and fatigue are common after stroke and are associated with reduced quality of life. We prospectively investigated their prevalence and course after a transient ischemic attack (TIA) or nonfocal transient neurological attack (TNA) and the association with diffusion-weighted imaging (DWI) lesions. The Cognitive Failures Questionnaire, Hospital Anxiety and Depression Scale, and Subjective Fatigue subscale from the Checklist Individual Strength were used to assess subjective complaints shortly after TIA or TNA and six months later. With repeated measure analysis, the associations between DWI lesion presence or clinical diagnosis (TIA or TNA) and subjective complaints over time were determined. We included 103 patients (28 DWI positive). At baseline, SCI and fatigue were less severe in DWI positive than in DWI negative patients, whereas at follow-up, there were no differences. SCI ( p = 0.02) and fatigue ( p = 0.01) increased in severity only in DWI positive patients. There were no differences between TIA and TNA. Subjective complaints are highly prevalent in TIA and TNA patients. The short-term prognosis is not different between DWI-positive and DWI negative patients, but SCI and fatigue increase in severity within six months after the event when an initial DWI lesion is present.

  14. [Asthma at acute attack stage treated with "Shao's five needling therapy": a multi-central randomized controlled study].

    Shao, Su-Ju; Quan, Chun-Fen; Shao, Su-Xia; Zhou, Miao; Jing, Xin-Jian; Zhao, Yu-Xiao; Ren, Zhi-Xin; Wang, Pei-Yu; Gao, Xi-Yan; Yang, Jie; Ren, Zhong; Kong, Li

    2013-09-01

    To evaluate the clinical efficacy of asthma at acute attack stage treated with "Shao's five needling therapy". The randomized controlled method was applied to divide 210 cases into an observation group and a control group, 105 cases in each one. In the observation group, "Shao's five needling therapy" [Feishu (BL 13), Dazhui (GV 14), Fengmen (BL 12)] and the combined therapy were adopted, including oxygen uptake, aerosol inhalation and oral administration of prednisone. In the control group, the oral administration of theophylline sustained release tablet and the combined therapy were applied. The treatment was continued for 7 days. The clinical symptoms and physical signs such as wheezing, cough, expectoration, chest stuffiness, wheezing rale and shortness of breath, as well as lung function indices such as forced expiratory volume one second (FEV1) and peak expiratory flow (PEF) were observed before and after treatment in the two groups. In the observation group, 69 cases were cured clinically, 20 cases effective remarkably, 7 cases effective and 0 case failed. In the control group, 49 cases were cured clinically, 31 cases effective remarkably, 15 cases effective and 0 case failed. The difference in the efficacy was significant in comparison of the two groups (P asthma at acute attack stage. It significantly relieves the symptoms and physical signs of the patients and improves lung functions. The effect is better than that of theophylline sustained release tablet.

  15. Paying for Mitigation: A Multiple Country Study

    Carlsson, Fredrik; Kataria, Mitesh; Krupnick, Alan; Lampi, Elina; Loefgren, Aasa; Ping Qin; Chung, Susie; Sterner, Thomas

    2010-05-15

    Unique survey data from a contingent valuation study conducted in three different countries (China, Sweden, and the United States) were used to investigate the ordinary citizen's willingness to pay (WTP) for reducing CO{sub 2} emissions. We find that a large majority of the respondents in all three countries believe that the mean global temperature has increased over the last 100 years and that humans are responsible for the increase. A smaller share of Americans, however, believes these statements, when compared to the Chinese and Swedes. A larger share of Americans is also pessimistic and believes that nothing can be done to stop climate change. We also find that Sweden has the highest WTP for reductions of CO{sub 2}, while China has the lowest. Thus, even though the Swedes and Chinese are similar to each other in their attitudes toward climate change, they differ considerably in their WTP. When WTP is measured as a share of household income, the willingness to pay is the same for Americans and Chinese, while again higher for the Swedes

  16. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  17. The study of multiple PET reconstructed parameter

    Yin, D. Y.; Tian, J.

    2000-01-01

    PET, compared with SPECT, uses some similar techniques in image reconstruction, on the other hand, there are some difference on the techniques. A phantom experiment was conducted and the result was evaluated objectively through quantitative analysis in order to find ideal filter and cutoff frequency (Fc) for clinical application. The PET phantom have 6 solid inserts (cold) in the upper half and 6 hollow ones (hot) in the lower part. The middle insert is 1cm in diameter, the outer five have diameters of 1 to 3cm respectively. The phantom filled with 111 MBq 18 FDG and studied with segmentation acquisition. 25 set of images were reconstructed using HANN, HAMM, PARZEN, BUTTERWORTH, BUTTERWORTH2 filter and 0.1, 0.2, 0.3, 0.4, 0.5 Fe successively.A ROI of 4*4 pixels was drawn over middle 1 cm, outer 1cm, 3 cm cold column area and background area, the ratio between the ROI of cold column and background was calculated to evaluate the image contrast. A ROI of 15*15 pixels was drawn on the background area to get s.d as a judgement of image noise. A profile curve was drawn on the hollow column of middle 1 cm and outer 1 cm and their FWHM were compared with the real diameter to reflect linearity. With the same Fc, the contrast using HANN and HAMM filter was superior to other filter, The effect of the filter on image noise is listed in high to low order as HAMM, HANN, BUTTERWORTH, PARZEN and BUTTERWORTH2. The higher Fc, the higher image noise. The FWHM will increases as the Fc value decreases. With same Fc, the FWHM of different filter from small to big is HAMM, BUTTERWORTH, HANN, PARZEN, BUTTERWORTH2. The outer FWHM is larger than the middle one. For brain image, we suggest HAMM and HANN with Fc 0.3, 0.4 For image demanding lower resolution, we suggest BUTTERWORTH with Fc 0.4, 0.5, 2. For hot image, we can increase Fc to get high resolution. The FWHM value closed to the real value when HANN, HANN with Fc 0.3 and BUTTERWORTH with Fc 0.2. The 5% difference of FWHM between

  18. Hybrid attacks on model-based social recommender systems

    Yu, Junliang; Gao, Min; Rong, Wenge; Li, Wentao; Xiong, Qingyu; Wen, Junhao

    2017-10-01

    With the growing popularity of the online social platform, the social network based approaches to recommendation emerged. However, because of the open nature of rating systems and social networks, the social recommender systems are susceptible to malicious attacks. In this paper, we present a certain novel attack, which inherits characteristics of the rating attack and the relation attack, and term it hybrid attack. Furtherly, we explore the impact of the hybrid attack on model-based social recommender systems in multiple aspects. The experimental results show that, the hybrid attack is more destructive than the rating attack in most cases. In addition, users and items with fewer ratings will be influenced more when attacked. Last but not the least, the findings suggest that spammers do not depend on the feedback links from normal users to become more powerful, the unilateral links can make the hybrid attack effective enough. Since unilateral links are much cheaper, the hybrid attack will be a great threat to model-based social recommender systems.

  19. Seven Deadliest Wireless Technologies Attacks

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  20. Quantum chemical study of halophilic interactions. Communication 3. Non-empirical study of the ways of tetrachloromethane attack by halide ions

    Kobychev, V.B.; Vitkovskaya, N.M.; Abramov, A.V.; Timokhin, B.V.

    1999-01-01

    It has been shown by means of non-empirical calculations of model reactions between tetrachloromethane and chlorine/iodine anions that in case of attack via carbon atom according to mechanism S N 2 formation of weakly-bound CCl 4 complexes with halide ions is observed at initial state. Further transformation of the complexes is restricted by considerable potential barriers. Attack of nucleophil via chlorine atom with formation of stable complexes CCl 3 -Cl-Hlg - is preferable [ru

  1. The political attack ad

    Palma Peña-Jiménez, Ph.D.

    2011-01-01

    Full Text Available During election campaigns the political spot has a clear objective: to win votes. This message is communicated to the electorate through television and Internet, and usually presents a negative approach, which includes a direct critical message against the opponent, rather than an exposition of proposals. This article is focused on the analysis of the campaign attack video ad purposely created to encourage the disapproval of the political opponent among voters. These ads focus on discrediting the opponent, many times, through the transmission of ad hominem messages, instead of disseminating the potential of the political party and the virtues and manifesto of its candidate. The article reviews the development of the attack ad since its first appearance, which in Spain dates back to 1996, when the famous Doberman ad was broadcast, and examines the most memorable campaign attack ads.

  2. Study on variable pitch strategy in H-type wind turbine considering effect of small angle of attack

    Zhao, Zhenzhou; Qian, Siyuan; Shen, Wenzhong

    2017-01-01

    Variable-pitch (VP) technology is an effective approach to upgrade the aerodynamics of the blade of an H-type vertical-axis wind turbine (VAWT). At present, most of the research efforts are focused on the performance improvement of the azimuth angle owing to the large angle of attack (Ao...... distribution in the swept area of turbine changes from an arched shape of the FP-VAWT into a rectangular shape of the VP-VAWT. At last, an 18.9% growth in power efficiency is achieved. All of the above results confirm that the new VP-technology can effectively improve VAWT performance and also widens...... the highest performance tip speed ratio zone which makes the turbines capable of running with high efficiency in wider zones....

  3. Whole brain white matter changes revealed by multiple diffusion metrics in multiple sclerosis: A TBSS study

    Liu, Yaou, E-mail: asiaeurope80@gmail.com [Department of Radiology, Xuanwu Hospital, Capital Medical University, Beijing 100053 (China); Duan, Yunyun, E-mail: xiaoyun81.love@163.com [Department of Radiology, Xuanwu Hospital, Capital Medical University, Beijing 100053 (China); He, Yong, E-mail: yong.h.he@gmail.com [State Key Laboratory of Cognitive Neuroscience and Learning, Beijing Normal University, Beijing 100875 (China); Yu, Chunshui, E-mail: csyuster@gmail.com [Department of Radiology, Xuanwu Hospital, Capital Medical University, Beijing 100053 (China); Wang, Jun, E-mail: jun_wang@bnu.edu.cn [State Key Laboratory of Cognitive Neuroscience and Learning, Beijing Normal University, Beijing 100875 (China); Huang, Jing, E-mail: sainthj@126.com [Department of Radiology, Xuanwu Hospital, Capital Medical University, Beijing 100053 (China); Ye, Jing, E-mail: jingye.2007@yahoo.com.cn [Department of Neurology, Xuanwu Hospital, Capital Medical University, Beijing 100053 (China); Parizel, Paul M., E-mail: paul.parizel@ua.ac.be [Department of Radiology, Antwerp University Hospital and University of Antwerp, Wilrijkstraat 10, 2650 Edegem, 8 Belgium (Belgium); Li, Kuncheng, E-mail: kunchengli55@gmail.com [Department of Radiology, Xuanwu Hospital, Capital Medical University, Beijing 100053 (China); Shu, Ni, E-mail: nshu55@gmail.com [State Key Laboratory of Cognitive Neuroscience and Learning, Beijing Normal University, Beijing 100875 (China)

    2012-10-15

    Objective: To investigate whole brain white matter changes in multiple sclerosis (MS) by multiple diffusion indices, we examined patients with diffusion tensor imaging and utilized tract-based spatial statistics (TBSS) method to analyze the data. Methods: Forty-one relapsing-remitting multiple sclerosis (RRMS) patients and 41 age- and gender-matched normal controls were included in this study. Diffusion weighted images were acquired by employing a single-shot echo planar imaging sequence on a 1.5 T MR scanner. Voxel-wise analyses of multiple diffusion metrics, including fractional anisotropy (FA), mean diffusivity (MD), axial diffusivity (AD) and radial diffusivity (RD) were performed with TBSS. Results: The MS patients had significantly decreased FA (9.11%), increased MD (8.26%), AD (3.48%) and RD (13.17%) in their white matter skeletons compared with the controls. Through TBSS analyses, we found abnormal diffusion changes in widespread white matter regions in MS patients. Specifically, decreased FA, increased MD and increased RD were involved in whole-brain white matter, while several regions exhibited increased AD. Furthermore, white matter regions with significant correlations between the diffusion metrics and the clinical variables (the EDSS scores, disease durations and white matter lesion loads) in MS patients were identified. Conclusion: Widespread white matter abnormalities were observed in MS patients revealed by multiple diffusion metrics. The diffusion changes and correlations with clinical variables were mainly attributed to increased RD, implying the predominant role of RD in reflecting the subtle pathological changes in MS.

  4. Whole brain white matter changes revealed by multiple diffusion metrics in multiple sclerosis: A TBSS study

    Liu, Yaou; Duan, Yunyun; He, Yong; Yu, Chunshui; Wang, Jun; Huang, Jing; Ye, Jing; Parizel, Paul M.; Li, Kuncheng; Shu, Ni

    2012-01-01

    Objective: To investigate whole brain white matter changes in multiple sclerosis (MS) by multiple diffusion indices, we examined patients with diffusion tensor imaging and utilized tract-based spatial statistics (TBSS) method to analyze the data. Methods: Forty-one relapsing-remitting multiple sclerosis (RRMS) patients and 41 age- and gender-matched normal controls were included in this study. Diffusion weighted images were acquired by employing a single-shot echo planar imaging sequence on a 1.5 T MR scanner. Voxel-wise analyses of multiple diffusion metrics, including fractional anisotropy (FA), mean diffusivity (MD), axial diffusivity (AD) and radial diffusivity (RD) were performed with TBSS. Results: The MS patients had significantly decreased FA (9.11%), increased MD (8.26%), AD (3.48%) and RD (13.17%) in their white matter skeletons compared with the controls. Through TBSS analyses, we found abnormal diffusion changes in widespread white matter regions in MS patients. Specifically, decreased FA, increased MD and increased RD were involved in whole-brain white matter, while several regions exhibited increased AD. Furthermore, white matter regions with significant correlations between the diffusion metrics and the clinical variables (the EDSS scores, disease durations and white matter lesion loads) in MS patients were identified. Conclusion: Widespread white matter abnormalities were observed in MS patients revealed by multiple diffusion metrics. The diffusion changes and correlations with clinical variables were mainly attributed to increased RD, implying the predominant role of RD in reflecting the subtle pathological changes in MS

  5. Attacker Model Lab

    2006-01-01

    tut quiz present Tutorial Quiz Presentation Interactive Media Element This interactive tutorial the two sub-classes of computer attackers: amateurs and professionals. It provides valuable insight into the nature of necessary protection measure for information assets. CS3600 Information Assurance: Introduction to Computer Security Course

  6. Transient Ischemic Attack

    Full Text Available ... major stroke. It's important to call 9-1-1 immediately for any stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. The content in this ...

  7. Temporal Cyber Attack Detection.

    Ingram, Joey Burton [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Draelos, Timothy J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Galiardi, Meghan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Doak, Justin E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Rigorous characterization of the performance and generalization ability of cyber defense systems is extremely difficult, making it hard to gauge uncertainty, and thus, confidence. This difficulty largely stems from a lack of labeled attack data that fully explores the potential adversarial space. Currently, performance of cyber defense systems is typically evaluated in a qualitative manner by manually inspecting the results of the system on live data and adjusting as needed. Additionally, machine learning has shown promise in deriving models that automatically learn indicators of compromise that are more robust than analyst-derived detectors. However, to generate these models, most algorithms require large amounts of labeled data (i.e., examples of attacks). Algorithms that do not require annotated data to derive models are similarly at a disadvantage, because labeled data is still necessary when evaluating performance. In this work, we explore the use of temporal generative models to learn cyber attack graph representations and automatically generate data for experimentation and evaluation. Training and evaluating cyber systems and machine learning models requires significant, annotated data, which is typically collected and labeled by hand for one-off experiments. Automatically generating such data helps derive/evaluate detection models and ensures reproducibility of results. Experimentally, we demonstrate the efficacy of generative sequence analysis techniques on learning the structure of attack graphs, based on a realistic example. These derived models can then be used to generate more data. Additionally, we provide a roadmap for future research efforts in this area.

  8. Protecting Mobile Crowd Sensing against Sybil Attacks Using Cloud Based Trust Management System

    Shih-Hao Chang

    2016-01-01

    Full Text Available Mobile crowd sensing (MCS arises as a new sensing paradigm, which leverages citizens for large-scale sensing by various mobile devices to efficiently collect and share local information. Unlike other MCS application challenges that consider user privacy and data trustworthiness, this study focuses on the network trustworthiness problem, namely, Sybil attacks in MCS network. The Sybil attack in computer security is a type of security attack, which illegally forges multiple identities in peer-to-peer networks, namely, Sybil identities. These Sybil identities will falsify multiple identities that negatively influence the effectiveness of sensing data in this MCS network or degrading entire network performance. To cope with this problem, a cloud based trust management scheme (CbTMS was proposed to detect Sybil attacks in the MCS network. The CbTMS was proffered for performing active and passive checking scheme, in addition to the mobile PCS trustworthiness management, and includes a decision tree algorithm, to verify the covered nodes in the MCS network. Simulation studies show that our CbTMS can efficiently detect the malicious Sybil nodes in the network and cause 6.87 Wh power reduction compared with other malicious Sybil node attack mode.

  9. Further attacks on Yeung-Mintzer fragile watermarking scheme

    Fridrich, Jessica; Goljan, Miroslav; Memon, Nasir D.

    2000-05-01

    In this paper, we describe new and improved attacks on the authentication scheme previously proposed by Yeung and Mintzer. Previous attacks assumed that the binary watermark logo inserted in an image for the purposes of authentication was known. Here we remove that assumption and show how the scheme is still vulnerable, even if the binary logo is not known but the attacker has access to multiple images that have been watermarked with the same secret key and contain the same (but unknown) logo. We present two attacks. The first attack infers the secret watermark insertion function and the binary logo, given multiple images authenticated with the same key and containing the same logo. We show that a very good approximation to the logo and watermark insertion function can be constructed using as few as two images. With color images, one needs many more images, nevertheless the attack is still feasible. The second attack we present, which we call the 'collage-attack' is a variation of the Holliman-Memon counterfeiting attack. The proposed variation does not require knowledge of the watermark logo and produces counterfeits of superior quality by means of a suitable dithering process that we develop.

  10. Blocking of Brute Force Attack

    M.Venkata Krishna Reddy

    2012-01-01

    A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your Web site requires user authentication, you are a good target for a brute-force attack. An attacker can always discover a password through a brute-force attack, but the downside is that it co...

  11. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  12. SDN-Based Double Hopping Communication against Sniffer Attack

    Zheng Zhao

    2016-01-01

    Full Text Available Sniffer attack has been a severe threat to network communication security. Traditional network usually uses static network configuration, which provides convenience to sniffer attack. In this paper, an SDN-based double hopping communication (DHC approach is proposed to solve this problem. In DHC, ends in communication packets as well as the routing paths are changed dynamically. Therefore, the traffic will be distributed to multiple flows and transmitted along different paths. Moreover, the data from multiple users will be mixed, bringing difficulty for attackers in obtaining and recovering the communication data, so that sniffer attack will be prevented effectively. It is concluded that DHC is able to increase the overhead of sniffer attack, as well as the difficulty of communication data recovery.

  13. Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks

    Željko Gavrić

    2018-01-01

    Full Text Available Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the security issue is very important. DOS (denial of service attacks are a fundamental threat to the functioning of wireless sensor networks. This paper describes some of the most common DOS attacks and potential methods of protection against them. The case study shows one of the most frequent attacks on wireless sensor networks – the interference attack. In the introduction of this paper authors assume that the attack interference can cause significant obstruction of wireless sensor networks. This assumption has been proved in the case study through simulation scenario and simulation results.

  14. Simulation of Attacks for Security in Wireless Sensor Network.

    Diaz, Alvaro; Sanchez, Pablo

    2016-11-18

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node's software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work.

  15. Simulation of Attacks for Security in Wireless Sensor Network

    Diaz, Alvaro; Sanchez, Pablo

    2016-01-01

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node’s software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work. PMID:27869710

  16. Develop a solution for protecting and securing enterprise networks from malicious attacks

    Kamuru, Harshitha; Nijim, Mais

    2014-05-01

    In the world of computer and network security, there are myriad ways to launch an attack, which, from the perspective of a network, can usually be defined as "traffic that has huge malicious intent." Firewall acts as one of the measure in order to secure the device from incoming unauthorized data. There are infinite number of computer attacks that no firewall can prevent, such as those executed locally on the machine by a malicious user. From the network's perspective, there are numerous types of attack. All the attacks that degrade the effectiveness of data can be grouped into two types: brute force and precision. The Firewall that belongs to Juniper has the capability to protect against both types of attack. Denial of Service (DoS) attacks are one of the most well-known network security threats under brute force attacks, which is largely due to the high-profile way in which they can affect networks. Over the years, some of the largest, most respected Internet sites have been effectively taken offline by Denial of Service (DOS) attacks. A DoS attack typically has a singular focus, namely, to cause the services running on a particular host or network to become unavailable. Some DoS attacks exploit vulnerabilities in an operating system and cause it to crash, such as the infamous Win nuke attack. Others submerge a network or device with traffic so that there are no more resources to handle legitimate traffic. Precision attacks typically involve multiple phases and often involves a bit more thought than brute force attacks, all the way from reconnaissance to machine ownership. Before a precision attack is launched, information about the victim needs to be gathered. This information gathering typically takes the form of various types of scans to determine available hosts, networks, and ports. The hosts available on a network can be determined by ping sweeps. The available ports on a machine can be located by port scans. Screens cover a wide variety of attack traffic

  17. Attack Helicopter Operations: Art or Science

    1991-05-13

    ATTACK HELICOPTER OPERATIONS: ART OR SCIENCE ? BY LIEUTENANT COLONEL JAN CALLEN United States Army DISTRIBUTION STATEMENT A: Approved for public release...TASK IWORK UNIT ELEMENT NO. NO. NO. ACCESSION NC 11. TITLE (Include Socurity Classification) Attack Helicopter Operations: Art or Science ? 12. PERSONAL...OPERATIONS: ART OR SCIENCE ? AN INDIVIDUAL STUDY PROJECT by Lieutenant Colonel Jan Callen United States Army Colonel Greg Snelgrove Project Adviser U.S

  18. Consciousness in Non-Epileptic Attack Disorder

    Reuber, M.; Kurthen, M.

    2011-01-01

    Non-epileptic attack disorder (NEAD) is one of the most important differential diagnoses of epilepsy. Impairment of\\ud consciousness is the key feature of non-epileptic attacks (NEAs). The first half of this review summarises the clinical research\\ud literature featuring observations relating to consciousness in NEAD. The second half places this evidence in the wider context\\ud of the recent discourse on consciousness in neuroscience and the philosophy of mind. We argue that studies of consci...

  19. How Multiple Interventions Influenced Employee Turnover: A Case Study.

    Hatcher, Timothy

    1999-01-01

    A 3-year study of 46 textile industry workers identified causes of employee turnover (supervision, training, organizational communication) using performance analysis. A study of multiple interventions based on the analysis resulted in changes in orientation procedures, organizational leadership, and climate, reducing turnover by 24%. (SK)

  20. Automated Discovery of Mimicry Attacks

    Giffin, Jonathon T; Jha, Somesh; Miller, Barton P

    2006-01-01

    .... These systems are useful only if they detect actual attacks. Previous research developed manually-constructed mimicry and evasion attacks that avoided detection by hiding a malicious series of system calls within a valid sequence allowed by the model...

  1. Heart Attack Symptoms in Women

    ... fat, cholesterol and other substances (plaque). Watch an animation of a heart attack . Many women think the ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  2. Quantitative Verification and Synthesis of Attack-Defence Scenarios

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    2016-01-01

    analysis of quantitative properties of complex attack-defence scenarios, using an extension of attack-defence trees which models temporal ordering of actions and allows explicit dependencies in the strategies adopted by attackers and defenders. We adopt a game-theoretic approach, translating attack...... which guarantee or optimise some quantitative property, such as the probability of a successful attack, the expected cost incurred, or some multi-objective trade-off between the two. We implement our approach, building upon the PRISM-games model checker, and apply it to a case study of an RFID goods...

  3. On localization attacks against cloud infrastructure

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  4. Attack Trees with Sequential Conjunction

    Jhawar, Ravi; Kordy, Barbara; Mauw, Sjouke; Radomirović, Sasa; Trujillo-Rasua, Rolando

    2015-01-01

    We provide the first formal foundation of SAND attack trees which are a popular extension of the well-known attack trees. The SAND at- tack tree formalism increases the expressivity of attack trees by intro- ducing the sequential conjunctive operator SAND. This operator enables the modeling of

  5. Nebulized fluticasone propionate, a viable alternative to systemic route in the management of childhood moderate asthma attack: A double-blind, double-dummy study.

    Demirca, Beyza Poplata; Cagan, Hasret; Kiykim, Ayca; Arig, Ulku; Arpa, Medeni; Tulunay, Aysin; Ozen, Ahmet; Karakoc-Aydiner, Elif; Baris, Safa; Barlan, I B

    2015-09-01

    In this study, we compared the clinical and immunological efficacy of nebulized corticosteroid (CS) to systemic route during treatment of moderate asthma attack in children. In this randomized, placebo-controlled, double-blind, double-dummy, prospective study, 81 children aged 12 months to 16 years experiencing asthma attack randomized into two treatment groups to receive, either; nebulized fluticasone propionate (n = 39, 2000 mcg/day) or oral methylprednisolone (n = 41, 1 mg/kg/day). Pulmonary index scores (PIS) were assessed at admission and at 1st, 4th, 8th, 12th, 24th, 48th hours, as well as, on day 7 and peak expiratory flow (PEF) at baseline and at the 7th day. Daily symptom and medication scores were recorded for all subjects. Immunological studies included phytohemagglutinin induced peripheral blood mononuclear cells culture supernatant for cytokine responses and CD4(+) CD25(+) FOXP3(+) T regulatory cell (T reg) percentage at baseline and day 7. The changes in PIS and PEF were similar in both treatment groups, with a significant improvement in both values at the 7th day, when compared to baseline. In both groups, significant reductions in symptom and medication scores were observed during the treatment period with no significant difference between the groups. At day 7 of intervention, phytohemagglutinin induced IL-4 level was significantly decreased only in the nebulized group compared to baseline (p = 0.01). Evaluation of cytokine responses by means of fold increase (stimulated (S)/unstimulated (US) ratio) revealed a significant reduction in IL-4, IL-5 and IL-17 only in nebulized group (p = 0.01, 0.01, 0.02; respectively). The fold increase value of IL-5 was significantly lower at 7th day in nebulized group when compared to systemic one (p = 0.02). At 7th day, although in both treatment groups the percentage of T reg cells was suppressed, it remained significantly higher in the nebule one when compared to systemic route (p = 0.04). In the management of

  6. Detecting Distributed SQL Injection Attacks in a Eucalyptus Cloud Environment

    Kebert, Alan; Barnejee, Bikramjit; Solano, Juan; Solano, Wanda

    2013-01-01

    The cloud computing environment offers malicious users the ability to spawn multiple instances of cloud nodes that are similar to virtual machines, except that they can have separate external IP addresses. In this paper we demonstrate how this ability can be exploited by an attacker to distribute his/her attack, in particular SQL injection attacks, in such a way that an intrusion detection system (IDS) could fail to identify this attack. To demonstrate this, we set up a small private cloud, established a vulnerable website in one instance, and placed an IDS within the cloud to monitor the network traffic. We found that an attacker could quite easily defeat the IDS by periodically altering its IP address. To detect such an attacker, we propose to use multi-agent plan recognition, where the multiple source IPs are considered as different agents who are mounting a collaborative attack. We show that such a formulation of this problem yields a more sophisticated approach to detecting SQL injection attacks within a cloud computing environment.

  7. Study of the multiplication factor in the core of Saclay

    Jacrot, B.; Netter, F.; Raievski, V.

    1953-01-01

    Several methods were studied for the measure of the multiplication factor strength in a core, by experiences in subcritical regime. These methods are applied to the determination of the effect on the reactivity of such different parameters of the battery that: heavy water level, position of the regulating plates. These results are used to establish an experimental relation between the time of the rise of the divergent core and the factor of effective multiplication. It is also given the application of these methods to the assessment of the power of the core. (author) [fr

  8. Optimal counterterrorism and the recruitment effect of large terrorist attacks

    Jensen, Thomas

    2011-01-01

    We analyze a simple dynamic model of the interaction between terrorists and authorities. Our primary aim is to study optimal counterterrorism and its consequences when large terrorist attacks lead to a temporary increase in terrorist recruitment. First, we show that an increase in counterterrorism...... makes it more likely that terrorist cells plan small rather than large attacks and therefore may increase the probability of a successful attack. Analyzing optimal counterterrorism we see that the recruitment effect makes authorities increase the level of counterterrorism after large attacks. Therefore......, in periods following large attacks a new attack is more likely to be small compared to other periods. Finally, we analyze the long-run consequences of the recruitment effect. We show that it leads to more counterterrorism, more small attacks, and a higher sum of terrorism damage and counterterrorism costs...

  9. An Exploratory Study on Multiple Intelligences and Social Work Education

    Matto, Holly; Berry-Edwards, Janice; Hutchison, Elizabeth D.; Bryant, Shirley A.; Waldbillig, Amy

    2006-01-01

    This study surveyed social work educators about the importance of multiple intelligences for social work practice and social work education. The sample consisted of 91 faculty members who responded to an online survey that asked them to rate the importance of 7 intelligences (linguistic, logical-mathematical, musical, bodily-kinesthetic, spatial,…

  10. Multiple scattering in synchrotron studies of disordered materials

    Poulsen, H.F.; Neuefeind, J.

    1995-01-01

    A formalism for the multiple scattering and self-absorption in synchrotron studies of disordered materials is presented. The formalism goes beyond conventionally used approximations and treat the cross sections, the beam characteristics, the state of polarization, and the electronic correction terms in full. Using hard X-rays it is shown how the simulated distributions can be directly compared to experimental data. ((orig.))

  11. Multiple small-angle neutron scattering studies of anisotropic materials

    Allen, A J; Long, G G; Ilavsky, J

    2002-01-01

    Building on previous work that considered spherical scatterers and randomly oriented spheroidal scatterers, we describe a multiple small-angle neutron scattering (MSANS) analysis for nonrandomly oriented spheroids. We illustrate this with studies of the multi-component void morphologies found in plasma-spray thermal barrier coatings. (orig.)

  12. Airport Managers' Perspectives on Security and Safety Management Systems in Aviation Operations: A Multiple Case Study

    Brown, Willie L., Jr.

    Global terrorism continues to persist despite the great efforts of various countries to protect and safely secure their citizens. As airports form the entry and exit ports of a country, they are one of the most vulnerable locations to terror attacks. Managers of international airports constantly face similar challenges in developing and implementing airport security protocols. Consequently, the technological advances of today have brought both positive and negative impacts on security and terrorism of airports, which are mostly managed by the airport managers. The roles of the managers have greatly increased over the years due to technological advances. The developments in technology have had different roles in security, both in countering terrorism and, at the same time, increasing the communication methods of the terrorists. The purpose of this qualitative multiple case study was to investigate the perspectives of airport managers with regard to societal security and social interactions in the socio-technical systems of the National Terrorism Advisory System (NTAS). Through the data gained regarding managers' perception and experiences, the researcher hoped to enable the development of security measures and policies that are appropriate for airports as socio-technical systems. The researcher conducted interviews with airport managers to gather relevant data to fulfill the rationale of the study. Ten to twelve airport managers based in three commercial aviation airports in Maryland, United States participated in the study. The researcher used a qualitative thematic analysis procedure to analyze the data responses of participants in the interview sessions.

  13. A neurophysiological study of facial numbness in multiple sclerosis: Integration with clinical data and imaging findings.

    Koutsis, Georgios; Kokotis, Panagiotis; Papagianni, Aikaterini E; Evangelopoulos, Maria-Eleftheria; Kilidireas, Constantinos; Karandreas, Nikolaos

    2016-09-01

    To integrate neurophysiological findings with clinical and imaging data in a consecutive series of multiple sclerosis (MS) patients developing facial numbness during the course of an MS attack. Nine consecutive patients with MS and recent-onset facial numbness were studied clinically, imaged with routine MRI, and assessed neurophysiologically with trigeminal somatosensory evoked potential (TSEP), blink reflex (BR), masseter reflex (MR), facial nerve conduction, facial muscle and masseter EMG studies. All patients had unilateral facial hypoesthesia on examination and lesions in the ipsilateral pontine tegmentum on MRI. All patients had abnormal TSEPs upon stimulation of the affected side, excepting one that was tested following remission of numbness. BR was the second most sensitive neurophysiological method with 6/9 examinations exhibiting an abnormal R1 component. The MR was abnormal in 3/6 patients, always on the affected side. Facial conduction and EMG studies were normal in all patients but one. Facial numbness was always related to abnormal TSEPs. A concomitant R1 abnormality on BR allowed localization of the responsible pontine lesion, which closely corresponded with MRI findings. We conclude that neurophysiological assessment of MS patients with facial numbness is a sensitive tool, which complements MRI, and can improve lesion localization. Copyright © 2016 Elsevier B.V. All rights reserved.

  14. Seven Deadliest Unified Communications Attacks

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  15. False Positive and False Negative Effects on Network Attacks

    Shang, Yilun

    2018-01-01

    Robustness against attacks serves as evidence for complex network structures and failure mechanisms that lie behind them. Most often, due to detection capability limitation or good disguises, attacks on networks are subject to false positives and false negatives, meaning that functional nodes may be falsely regarded as compromised by the attacker and vice versa. In this work, we initiate a study of false positive/negative effects on network robustness against three fundamental types of attack strategies, namely, random attacks (RA), localized attacks (LA), and targeted attack (TA). By developing a general mathematical framework based upon the percolation model, we investigate analytically and by numerical simulations of attack robustness with false positive/negative rate (FPR/FNR) on three benchmark models including Erdős-Rényi (ER) networks, random regular (RR) networks, and scale-free (SF) networks. We show that ER networks are equivalently robust against RA and LA only when FPR equals zero or the initial network is intact. We find several interesting crossovers in RR and SF networks when FPR is taken into consideration. By defining the cost of attack, we observe diminishing marginal attack efficiency for RA, LA, and TA. Our finding highlights the potential risk of underestimating or ignoring FPR in understanding attack robustness. The results may provide insights into ways of enhancing robustness of network architecture and improve the level of protection of critical infrastructures.

  16. First-Ever Stroke and Transient Ischemic Attack Incidence and 30-Day Case-Fatality Rates in a Population-Based Study in Argentina

    Bahit, M Cecilia; Coppola, Mariano L; Riccio, Patricia M

    2016-01-01

    BACKGROUND AND PURPOSE: Epidemiological data about stroke are scarce in low- and middle-income Latin-American countries. We investigated annual incidence of first-ever stroke and transient ischemic attack (TIA) and 30-day case-fatality rates in a population-based setting in Tandil, Argentina....... METHODS: We prospectively identified all first-ever stroke and TIA cases from overlapping sources between January 5, 2013, and April 30, 2015, in Tandil, Argentina. We calculated crude and standardized incidence rates. We estimated 30-day case-fatality rates. RESULTS: We identified 334 first-ever strokes.......1% (95% CI, 14.2-36.6) for intracerebral hemorrhage, and 1.9% (95% CI, 0.4-5.8) for TIA. CONCLUSIONS: This study provides the first prospective population-based stroke and TIA incidence and case-fatality estimate in Argentina. First-ever stroke incidence was lower than that reported in previous Latin...

  17. The Balance Attack Against Proof-Of-Work Blockchains: The R3 Testbed as an Example

    Natoli, Christopher; Gramoli, Vincent

    2016-01-01

    In this paper, we identify a new form of attack, called the Balance attack, against proof-of-work blockchain systems. The novelty of this attack consists of delaying network communications between multiple subgroups of nodes with balanced mining power. Our theoretical analysis captures the precise tradeoff between the network delay and the mining power of the attacker needed to double spend in Ethereum with high probability. We quantify our probabilistic analysis with statistics taken from th...

  18. The Multiple Roles of Women Pursuing Doctoral Studies

    Malone, Laurell Coleman M.S.

    1998-01-01

    Increases in the employment of women in administrative and managerial careers have drawn attention to a need for research that examines the interdependency of work and family roles, a need that is particularly crucial in the area of academic administration. This was a qualitative study of the strategies and support systems women educational administrators use to deal with the multiple roles they perform in life and work while pursuing doctoral studies. Forty-four women educational admini...

  19. The attack navigator

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    The need to assess security and take protection decisions is at least as old as our civilisation. However, the complexity and development speed of our interconnected technical systems have surpassed our capacity to imagine and evaluate risk scenarios. This holds in particular for risks...... that are caused by the strategic behaviour of adversaries. Therefore, technology-supported methods are needed to help us identify and manage these risks. In this paper, we describe the attack navigator: a graph-based approach to security risk assessment inspired by navigation systems. Based on maps of a socio...

  20. Attacks on computer systems

    Dejan V. Vuletić

    2012-01-01

    Full Text Available Computer systems are a critical component of the human society in the 21st century. Economic sector, defense, security, energy, telecommunications, industrial production, finance and other vital infrastructure depend on computer systems that operate at local, national or global scales. A particular problem is that, due to the rapid development of ICT and the unstoppable growth of its application in all spheres of the human society, their vulnerability and exposure to very serious potential dangers increase. This paper analyzes some typical attacks on computer systems.

  1. Comparison of frovatriptan plus dexketoprofen (25 mg or 37.5 mg) with frovatriptan alone in the treatment of migraine attacks with or without aura: a randomized study.

    Tullo, Vincenzo; Valguarnera, Fabio; Barbanti, Piero; Cortelli, Pietro; Sette, Giuliano; Allais, Gianni; d'Onofrio, Florindo; Curone, Marcella; Zava, Dario; Pezzola, Deborha; Benedetto, Chiara; Frediani, Fabio; Bussone, Gennaro

    2014-05-01

    Drugs for migraine attacks include triptans and NSAIDs; their combination could provide greater symptom relief. A total of 314 subjects with history of migraine, with or without aura, were randomized to frovatriptan 2.5 mg alone (Frova), frovatriptan 2.5 mg + dexketoprofen 25 mg (FroDex25) or frovatriptan 2.5 mg + dexketoprofen 37.5 mg (FroDex37.5) and treated at least one migraine attack. This was a multicenter, randomized, double-blind, parallel-group study. The primary end point was the proportion of pain free (PF) at two hours. Secondary end points were PF at one and four hours, pain relief (PR) at one, two, four hours, sustained PF (SPF) at 24 and 48 hours, recurrence at 48 hours, resolution of nausea, photophobia and phonophobia at two and four hours, the use of rescue medication and the judgment of the treatment. The results were assessed in the full analysis set (FAS) population, which included all subjects randomized and treated for whom at least one post-dose intensity of headache was recorded. The proportions of subjects PF at two hours (primary end point) were 29% (27/93) with Frova compared with 51% (48/95 FroDex25 and 46/91 FroDex37.5) with each combination therapies ( P dexketoprofen. FroDex improved initial efficacy at two hours compared to Frova whilst maintaining efficacy at 48 hours in this study. Tolerability profiles were comparable. Intrinsic pharmacokinetic properties of the two single drugs contribute to this improved efficacy profile.

  2. Empowered to gain a new foothold in life—A study of the meaning of participating in cardiac rehabilitation to patients afflicted by a minor heart attack

    Charlotte P. Simonÿ

    2015-12-01

    Full Text Available This study aimed to investigate what it means to patients afflicted by a minor heart attack to participate in cardiac rehabilitation (CR. CR is well-established internationally to support patients towards moving forward in satisfying, healthy, and well-functioning lives. Studies indicate that patients achieve improvement in quality of life when participating in CR. However, knowledge of how patients are supported during CR is sparse. Moreover, knowledge of what participating in CR means to patients afflicted by a minor heart attack is lacking. In-depth knowledge in this area is crucial in order to understand these patients’ particular gains and needs. In a phenomenological-hermeneutic frame field observations, focus group interviews, and individual interviews were conducted among 11 patients during and after their participation in CR. Field notes and transcribed interviews underwent three-phased interpretation. It was found that patients were supported to gain renewed balance in their lives during CR. Three themes were identified: (1 receiving a helpful but limited caring hand, (2 being supported to find new values in life, and (3 developing responsibility for the remaining time. The patients were carefully guided through a difficult time and supported to continue in healthy everyday lives. They were given hope which enabled them to find themselves a new foothold in life with respect to their own sense of well-being. This guidance and a sense of hopefulness were provided by heart specialists and more seasoned heart patients. In conclusion, patients were empowered to achieve a healthier lifestyle and improve their personal well-being during CR. However, structural barriers in the programme prevented adequate support regarding the patients’ total needs. Knowledge of the benefits of CR emphasizes the significance of the programme and highlights the importance of high inclusion. Efforts should be made to develop more flexible and longer lasting

  3. Ecoinformatics Can Infer Causal Effects of Crop Variety on Insect Attack by Capitalizing on 'Pseudoexperiments' Created When Different Crop Varieties Are Interspersed: A Case Study in Almonds.

    Rosenheim, Jay A; Higbee, Bradley S; Ackerman, Jonathan D; Meisner, Matthew H

    2017-12-05

    Capturing the complementary strengths of observational and experimental research methods usually requires the researcher to gather separate experimental and observational data sets. In some cases, however, commercial agricultural practices produce the spatial and temporal mixing of 'treatments' independently of other possibly covarying factors that is normally achieved only with formal experimentation. The resulting 'pseudoexperiments' can provide strong evidence for causal relationships. Here, we analyze a large observational data set that creates a series of such pseudoexperiments to assess the effect of different commercial varieties of almond, Prunus dulcis (Mill.) on the impact of two key lepidopteran pests, the navel orangeworm Amyelois transitella (Walker) (Lepidoptera: Pyralidae), and the peach twig borer Anarsia lineatella Zeller (Lepidoptera: Gelechiidae). Almonds are universally planted as polycultures of different varieties to obtain efficient cross-pollination. We find substantial differences across almond varieties in the rates of infestation of almond hulls and nutmeats by the two pests. We find no support for the hypothesis that earlier-maturing varieties sustain higher attack; for A. transitella, later-maturing varieties instead had more frequent infestation. On many almond varieties, A. lineatella reaches high infestation levels by feeding almost exclusively on the hulls, rather than nutmeats. Given the importance of these pests in directly destroying almond nuts and in promoting aflatoxin-producing Aspergillus sp. fungal infections of almonds, further work exploring the impact of these pests is warranted. Because many crops requiring cross-pollination are planted as mixtures of different varieties, commercial agricultural production data hold great potential for studying within-crop variation in susceptibility to insect attack. © The Author(s) 2017. Published by Oxford University Press on behalf of Entomological Society of America. All rights

  4. Recent "phishing" attacks

    IT Department

    2009-01-01

    Over the last few weeks there has been a marked increase in the number of attacks on CERN made by cybercriminals. Typical attacks arrive in the form of e-mail messages purporting to come from the CERN Help Desk, Mail Service, or some similarly official-sounding entity and suggest that there is a problem with your account, such as it being over-quota. They then ask you to click on a link or to reply and give your password. Please don’t! Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. NEVER provide your password or other details if these are requested. These messages try to trick you into clicking on Web links which will help them to install malicious software on your computer, and anti-virus software cannot be relied on to detect all cases. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN Comput...

  5. On using the Multiple Signal Classification algorithm to study microbaroms

    Marcillo, O. E.; Blom, P. S.; Euler, G. G.

    2016-12-01

    Multiple Signal Classification (MUSIC) (Schmidt, 1986) is a well-known high-resolution algorithm used in array processing for parameter estimation. We report on the application of MUSIC to infrasonic array data in a study of the structure of microbaroms. Microbaroms can be globally observed and display energy centered around 0.2 Hz. Microbaroms are an infrasonic signal generated by the non-linear interaction of ocean surface waves that radiate into the ocean and atmosphere as well as the solid earth in the form of microseisms. Microbaroms sources are dynamic and, in many cases, distributed in space and moving in time. We assume that the microbarom energy detected by an infrasonic array is the result of multiple sources (with different back-azimuths) in the same bandwidth and apply the MUSIC algorithm accordingly to recover the back-azimuth and trace velocity of the individual components. Preliminary results show that the multiple component assumption in MUSIC allows one to resolve the fine structure in the microbarom band that can be related to multiple ocean surface phenomena.

  6. Study on the multiple cancer in A-bomb survivors

    Wakabayashi, Toshiro; Yamamoto, Tsutomu.

    1984-01-01

    Autopsy data from cohort studies performed on A-bomb victims revealed that the incidence rate of multiple cancer was 7.8% (193 of 2,472 cancer A-bomb victims), being higher than that (5.8%) found from the tumor registry in Hiroshima and Nagasaki. Multiple cancer occurred more frequently in women than in men in both Nagasaki and Hiroshima. The incidence of multiple cancer was 1.5 times higher in the victims exposed to more than 100 rad (Vsub(+) group) than in those exposed to less than one rad (V 0 group), suggesting that there might be dose-response relationship, although this was not statistically significant between the exposed groups. According to the organs, relative risk ratio of developing cancer in the Vsub(+) group to that in the V 0 group was high in the colon and rectum, bladder, lungs, and testes in men; in the thyroid gland, lungs, colon and rectum, bladder, and breast in women, although no statistically significant differences were observed between the groups. This was suggestive of cancer that arises frequently in the lungs of men in the Vsub(+) group. Occult cancer of the thyroid gland and testes was also discussed in relation to the incidence of multiple cancer. (Namekawa, K.)

  7. Nonepileptic attack disorder among married women.

    Dhanaraj, M; Rangaraj, R; Arulmozhi, T; Vengatesan, A

    2005-06-01

    To study the clinical features, precipitating stressful life events and prognosis of nonepileptic attack disorder (NEAD) among married women. Prospective cohort study with 1-year follow-up. A tertiary care teaching hospital. Of the 1020 patients with epilepsy referred to the epilepsy clinic during 2002-2003, 30 were married women with NEAD. The diagnostic criteria for NEAD included normal EEG during ictal and post-ictal phase of the generalized 'attack.' The data collected included clinical characteristics, semiology of the attacks, precipitating stressful events, and co-morbid psychiatric disorders. The control group included 30 age-matched married women with generalized tonic-clonic seizures. The long-term outcome and factors influencing the outcomes were analyzed. The mean duration of illness was 18 months, and the pattern of the attack was 'fall and lying still' in 53% and 'fall with generalized motor movements' in 47%. The frequency was one or more per week in 57% and occasionally in 43%. The important stressful events were matrimonial discord following illegal relationship of the husband with another woman (chi2 = 9.02, P = 0.003) and constant quarrel with other family members (chi2 = 5.19, P = 0.02). The prevalence of sexual abuse was low (7%). Co-morbid psychiatric disorder was observed in 70%. At the end of 1 year, 39% were free from the attack. Resolution of the stressful life events (chi2 = 4.52, P = 0.03) and lower frequency of attack at the time of reporting (chi2 = 3.88, P = 0.05) correlated with good outcomes. Among patients with NEAD in India, the major precipitating factors were matrimonial discord following illegal relationship of the husband with another woman and constant quarrel with other family members and not sexual abuse. Women with low frequency of attack at the time of reporting and the remission of the stressful events had better outcomes.

  8. Attack Classification Schema for Smart City WSNs

    Victor Garcia-Font

    2017-04-01

    Full Text Available Urban areas around the world are populating their streets with wireless sensor networks (WSNs in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  9. Attack Classification Schema for Smart City WSNs.

    Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena

    2017-04-05

    Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  10. Investigating the Possibility to Individualize Asthma Attack Therapy Based on Attack Severity and Patient Characteristics

    Sárkány Zoltán

    2016-03-01

    Full Text Available Introduction: The objective of this study was to investigate with the help of a computerized simulation model whether the treatment of an acute asthma attack can be individualized based on the severity of the attack and the characteristics of the patient. Material and Method: A stochastic lung model was used to simulate the deposition of 1 nm - 10 μm particles during a mild and a moderate asthma attack. Breathing parameters were varied to maximize deposition, and simulation results were compared with those obtained in the case of a severe asthma attack. In order to investigate the effect of height on the deposition of inhaled particles, another series of simulations was carried out with identical breathing parameters, comparing patient heights of 155 cm, 175 cm and 195 cm. Results: The optimization process yielded an increase in the maximum deposition values of around 6-7% for each type of investigated asthma attack, and the difference between attacks of different degree of severity was around 5% for both the initial and the optimized values, a higher degree of obstruction increasing the amount of deposited particles. Conclusions: Our results suggest that the individualization of asthma attack treatment cannot be based on particles of different size, as the highest deposited fraction in all three types of attacks can be obtained using 0.01 μm particles. The use of a specific set of breathing parameters yields a difference between a mild and a moderate, as well as a moderate and a severe asthma attack of around 5%.

  11. Modeling Resources Allocation in Attacker-Defender Games with "Warm Up" CSF.

    Guan, Peiqiu; Zhuang, Jun

    2016-04-01

    Like many other engineering investments, the attacker's and defender's investments may have limited impact without initial capital to "warm up" the systems. This article studies such "warm up" effects on both the attack and defense equilibrium strategies in a sequential-move game model by developing a class of novel and more realistic contest success functions. We first solve a single-target attacker-defender game analytically and provide numerical solutions to a multiple-target case. We compare the results of the models with and without consideration of the investment "warm up" effects, and find that the defender would suffer higher expected damage, and either underestimate the attacker effort or waste defense investment if the defender falsely believes that no investment "warm up" effects exist. We illustrate the model results with real data, and compare the results of the models with and without consideration of the correlation between the "warm up" threshold and the investment effectiveness. Interestingly, we find that the defender is suggested to give up defending all the targets when the attack or the defense "warm up" thresholds are sufficiently high. This article provides new insights and suggestions on policy implications for homeland security resource allocation. © 2015 Society for Risk Analysis.

  12. Epidemiological study of multiple sclerosis in La Rioja.

    Bártulos Iglesias, M; Marzo Sola, M E; Estrella Ruiz, L A; Bravo Anguiano, Y

    2015-01-01

    Multiple sclerosis is a demyelinating disease that causes severe disability in younger patients. Many epidemiology studies have confirmed a variable prevalence. The objective of this study was to analyse the prevalence of this disease in La Rioja (Spain), using such variables as age and sex; type of progression, initial form of the disease, EDSS and number of relapses; disease-modifying treatment and reasons for treatment withdrawal; personal and family history of cancer; and incidence and mortality. Analysis of patients in La Rioja diagnosed with MS (according to Poser criteria or the 2005 McDonald criteria) during a 10-year period (2001-2011). Data were collected from hospital records, multiple sclerosis associations, and personal records kept by neurologists. The MS prevalence rate in La Rioja is 65 patients/100 000 inhabitants with an incidence rate of 3.5 cases/100 000 residents per year. Relapsing-remitting MS is present in 67.6% of the patient total. Mean age of onset is 20-29 years (range, 12 to 70). Most EDSS scores were mostly ≤ 2. Untreated MS cases account for 47.6% of the total and the most commonly used therapy is interferon. We detected 4 haematological tumours and 7 families with multiple members affected by MS. Prevalence and incidence are similar to those found in other regions Spain. The average age at onset age for primary progressive MS is slightly higher than in other papers (40-49 years). In families with multiple patients, MS may be more aggressive. Disability in these patients remains very severe. We require more epidemiology studies with a variety of data gathering methods to support findings for prevalence obtained in different provinces. Copyright © 2013 Sociedad Española de Neurología. Published by Elsevier España, S.L.U. All rights reserved.

  13. Cyber Attacks and Combat Behavior

    Carataș Maria Alina

    2017-01-01

    Full Text Available Cyber terrorism is an intangible danger, a real over the corner threat in the life of individuals,organizations, and governments and is getting harder to deal with its damages. The motivations forthe cyber-attacks are different, depending on the terrorist group, from cybercrime to hacktivism,attacks over the authorities’ servers. Organizations constantly need to find new ways ofstrengthening protection against cyber-attacks, assess their cyber readiness, expand the resiliencecapacity and adopts international security regulations.

  14. Command Disaggregation Attack and Mitigation in Industrial Internet of Things

    Peng Xun

    2017-10-01

    Full Text Available A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1 the command sequence is disordered and (2 disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  15. Command Disaggregation Attack and Mitigation in Industrial Internet of Things.

    Xun, Peng; Zhu, Pei-Dong; Hu, Yi-Fan; Cui, Peng-Shuai; Zhang, Yan

    2017-10-21

    A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  16. Pareto Efficient Solutions of Attack-Defence Trees

    Aslanyan, Zaruhi; Nielson, Flemming

    2015-01-01

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as proba......Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes......, such as probability or cost of attacks and defences. In case of multiple parameters most analytical methods optimise one parameter at a time, e.g., minimise cost or maximise probability of an attack. Such methods may lead to sub-optimal solutions when optimising conflicting parameters, e.g., minimising cost while...... maximising probability. In order to tackle this challenge, we devise automated techniques that optimise all parameters at once. Moreover, in the case of conflicting parameters our techniques compute the set of all optimal solutions, defined in terms of Pareto efficiency. The developments are carried out...

  17. Numerical study of impact erosion of multiple solid particle

    Zheng, Chao; Liu, Yonghong; Chen, Cheng; Qin, Jie; Ji, Renjie; Cai, Baoping

    2017-11-01

    Material erosion caused by continuous particle impingement during hydraulic fracturing results in significant economic loss and increased production risks. The erosion process is complex and has not been clearly explained through physical experiments. To address this problem, a multiple particle model in a 3D configuration was proposed to investigate the dynamic erosion process. This approach can significantly reduce experiment costs. The numerical model considered material damping and elastic-plastic material behavior of target material. The effects of impact parameters on erosion characteristics, such as plastic deformation, contact time, and energy loss rate, were investigated. Based on comprehensive studies, the dynamic erosion mechanism and geometry evolution of eroded crater was obtained. These findings can provide a detailed erosion process of target material and insights into the material erosion caused by multiple particle impingement.

  18. Seven Deadliest Social Network Attacks

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  19. Serial MRI studies using gadolinium DTPA in active multiple sclerosis

    Miller, D.H.; Johnson, G.; Barnes, D.; Rudge, P.; McDonald, W.I.

    1988-01-01

    It has been suggested that blood brain barrier (BBB) impairment is a necessary early event in the pathogenesis of the multiple sclerosis (MS) lesions. To evaluate such an hypothesis in vivo would require: (1) serial imaging studies using a modality with high sensitivity for detecting plaques; (2) a contrast enhancing agent which demonstrates BBB impairment. A serial magnetic resonance imaging (MRI) study was undertaken of a group of MS patients using the contrast agent gadolinium-DTPA. As it has been suggested that T 1 and T 2 relaxation times are longer in acute than chronic MS lesions, these were also measured. 3 refs.; 1 figure

  20. Developing Simulated Cyber Attack Scenarios Against Virtualized Adversary Networks

    2017-03-01

    enclave, as shown in Figure 11, is a common design for many secure networks. Different variations of a cyber-attack scenario can be rehearsed based...achieved a greater degree of success against multiple variations of an enemy network. E. ATTACK TYPES A primary goal of this thesis is to define and...2013. [33] R. Goldberg , “Architectural principles for virtual computer systems,” Ph.D. dissertation, Dept. of Comp. Sci., Harvard Univ., Cambridge

  1. A review of multiple stressor studies that include ionising radiation

    Vanhoudt, Nathalie; Vandenhove, Hildegarde; Real, Almudena; Bradshaw, Clare; Stark, Karolina

    2012-01-01

    Studies were reviewed that investigated the combined effects of ionising radiation and other stressors on non-human biota. The aim was to determine the state of research in this area of science, and determine if a review of the literature might permit a gross generalization as to whether the combined effects of multi-stressors and radiation are fundamentally additive, synergistic or antagonistic. A multiple stressor database was established for different organism groups. Information was collected on species, stressors applied and effects evaluated. Studies were mostly laboratory based and investigated two-component mixtures. Interactions declared positive occurred in 58% of the studies, while 26% found negative interactions. Interactions were dependent on dose/concentration, on organism's life stage and exposure time and differed among endpoints. Except for one study, none of the studies predicted combined effects following Concentration Addition or Independent Action, and hence, no justified conclusions can be made about synergism or antagonism. - This review on multiple stressor studies involving radiation, highlights that most experimental designs used did not allow to deduce the nature of the interactive effects.

  2. Robustness of non-interdependent and interdependent networks against dependent and adaptive attacks

    Tyra, Adam; Li, Jingtao; Shang, Yilun; Jiang, Shuo; Zhao, Yanjun; Xu, Shouhuai

    2017-09-01

    Robustness of complex networks has been extensively studied via the notion of site percolation, which typically models independent and non-adaptive attacks (or disruptions). However, real-life attacks are often dependent and/or adaptive. This motivates us to characterize the robustness of complex networks, including non-interdependent and interdependent ones, against dependent and adaptive attacks. For this purpose, dependent attacks are accommodated by L-hop percolation where the nodes within some L-hop (L ≥ 0) distance of a chosen node are all deleted during one attack (with L = 0 degenerating to site percolation). Whereas, adaptive attacks are launched by attackers who can make node-selection decisions based on the network state in the beginning of each attack. The resulting characterization enriches the body of knowledge with new insights, such as: (i) the Achilles' Heel phenomenon is only valid for independent attacks, but not for dependent attacks; (ii) powerful attack strategies (e.g., targeted attacks and dependent attacks, dependent attacks and adaptive attacks) are not compatible and cannot help the attacker when used collectively. Our results shed some light on the design of robust complex networks.

  3. Research participation after terrorism: an open cohort study of survivors and parents after the 2011 Utøya attack in Norway.

    Stene, Lise Eilin; Dyb, Grete

    2016-02-01

    Reliable estimates of treatment needs after terrorism are essential to develop an effective public health response. More knowledge is required on research participation among survivors of terrorism to interpret the results properly and advance disaster research methodology. This article reports factors associated with participation in an open cohort study of survivors of the Utøya youth camp attack and their parents. Overall, 490 survivors were invited to two semi-structured interviews that were performed 4-5 and 14-15 months after the attack. The parents of 482 survivors aged 13-32 years were eligible for a complementary study. The study had an open cohort design in which all of the eligible survivors were invited to both waves. Pearson's Chi squared tests (categorical variables) and independent t tests (continuous variables) were used to compare survivors by participation. Altogether, 355 (72.4 %) survivors participated: 255 in both waves, 70 in wave 1 only, and 30 in wave 2 only. Compared with the two-wave participants, wave-1-only participants were more often non-Norwegian and reported higher exposure, whereas wave-2-only participants reported more posttraumatic stress, anxiety/depression, and somatic symptoms. In total, 331 (68.7 %) survivors had ≥1 participating parents, including 311 (64.5 %) with maternal and 243 (50.4 %) with paternal participation. Parental non-participation was associated with non-Norwegian origin, somatic symptoms and less social support. Additionally, paternal non-participation was associated with having divorced parents, and maternal non-participation was associated with higher age, not living with parents, posttraumatic stress and anxiety/depression symptoms. Survivors with initial non-participation had more symptoms than did the other participants. Thus, an open cohort design in post-terrorism studies might improve the participation among survivors with higher morbidity. Because the factors associated with maternal and

  4. Team effectiveness in academic medical libraries: a multiple case study.

    Martin, Elaine Russo

    2006-07-01

    The objective of this study is to apply J. Richard Hackman's framework on team effectiveness to academic medical library settings. The study uses a qualitative, multiple case study design, employing interviews and focus groups to examine team effectiveness in three academic medical libraries. Another site was selected as a pilot to validate the research design, field procedures, and methods to be used with the cases. In all, three interviews and twelve focus groups, with approximately seventy-five participants, were conducted at the case study libraries. Hackman identified five conditions leading to team effectiveness and three outcomes dimensions that defined effectiveness. The participants in this study identified additional characteristics of effectiveness that focused on enhanced communication, leadership personality and behavior, and relationship building. The study also revealed an additional outcome dimension related to the evolution of teams. Introducing teams into an organization is not a trivial matter. Hackman's model of effectiveness has implications for designing successful library teams.

  5. The association of a heart attack or stroke with depressive symptoms stratified by the presence of a close social contact: findings from the National Health and Aging Trends Study Cohort.

    Simning, Adam; Seplaki, Christopher L; Conwell, Yeates

    2018-01-01

    The objective of the study is to examine whether the risk of having clinically significant depressive symptoms following a heart attack or stroke varies by the presence of a close social contact. The National Health and Aging Trends Study is a nationally representative longitudinal survey of US Medicare beneficiaries aged 65 and older initiated in 2011. A total of 5643 older adults had information on social contacts at baseline and depressive symptoms at the 1-year follow-up interview. The two-item Patient Health Questionnaire identified clinically significant depressive symptoms. Interview questions examined social contacts and the presence of self-reported heart attack or stroke during the year of follow-up. A total of 297 older adults reported experiencing a heart attack and/or stroke between their baseline and follow-up interviews. In regression analyses accounting for sociodemographics, baseline depressive symptoms, medical comorbidity, and activities of daily living impairment, older adults with no close social contacts had increased odds of depressive symptoms at follow-up after experiencing a heart attack or stroke, while those with close social contacts had increased odds of depressive symptoms at follow-up after experiencing a stroke, but not a heart attack. Older adults have increased odds of having depressive symptoms following a self-reported stroke, but only those with no close social contacts had increased odds of depressive symptoms following a heart attack. Social networks may play a role in the mechanisms underlying depression among older adults experiencing certain acute health events. Future work exploring the potential causal relationships suggested here, if confirmed, could inform interventions to alleviate or prevent depression among at risk older adults. Copyright © 2017 John Wiley & Sons, Ltd. Copyright © 2017 John Wiley & Sons, Ltd.

  6. Effects of non-invasive vagus nerve stimulation on attack frequency over time and expanded response rates in patients with chronic cluster headache: a post hoc analysis of the randomised, controlled PREVA study.

    Gaul, Charly; Magis, Delphine; Liebler, Eric; Straube, Andreas

    2017-12-01

    In the PREVention and Acute treatment of chronic cluster headache (PREVA) study, attack frequency reductions from baseline were significantly more pronounced with non-invasive vagus nerve stimulation plus standard of care (nVNS + SoC) than with SoC alone. Given the intensely painful and frequent nature of chronic cluster headache attacks, additional patient-centric outcomes, including the time to and level of therapeutic response, were evaluated in a post hoc analysis of the PREVA study. After a 2-week baseline phase, 97 patients with chronic cluster headache entered a 4-week randomised phase to receive nVNS + SoC (n = 48) or SoC alone (n = 49). All 92 patients who continued into a 4-week extension phase received nVNS + SoC. Compared with SoC alone, nVNS + SoC led to a significantly lower mean weekly attack frequency by week 2 of the randomised phase; the attack frequency remained significantly lower in the nVNS + SoC group through week 3 of the extension phase (P cluster headache attack frequency within 2 weeks after its addition to SoC and was associated with significantly higher ≥25%, ≥50%, and ≥75% response rates than SoC alone. The rapid decrease in weekly attack frequency justifies a 4-week trial period to identify responders to nVNS, with a high degree of confidence, among patients with chronic cluster headache.

  7. Modeling attacking of high skills volleyball players

    Vladimir Gamaliy

    2014-12-01

    Full Text Available Purpose: to determine the model indicators of technical and tactical actions in the attack highly skilled volleyball players. Material and Methods: the study used statistical data of major international competitions: Olympic Games – 2012 World Championships – 2010, World League – 2010–2014 European Championship – 2010–2014. A total of 130 analyzed games. Methods were used: analysis and generalization of scientific and methodological literature, analysis of competitive activity highly skilled volleyball players, teacher observation, modeling technical and tactical actions in attacking highly skilled volleyball players. Results: it was found that the largest volume application of technical and tactical actions in the attack belongs to the group tactics «supple movement», whose indicator is 21,3%. The smallest amount of application belongs to the group tactics «flight level» model whose indicators is 5,4%, the efficiency of 3,4%, respectively. It is found that the power service in the jump from model parameters used in 51,6% of cases, the planning targets – 21,7% and 4,4% planning to reduce. Attacks performed with the back line, on model parameters used in the amount of 20,8% efficiency –13,7%. Conclusions: we prove that the performance of technical and tactical actions in the attack can be used as model in the control system of training and competitive process highly skilled volleyball players

  8. Network resilience against intelligent attacks constrained by the degree-dependent node removal cost

    Annibale, A; Coolen, A C C; Bianconi, G

    2010-01-01

    We study the resilience of complex networks against attacks in which nodes are targeted intelligently, but where disabling a node has a cost to the attacker which depends on its degree. Attackers have to meet these costs with limited resources, which constrains their actions. A network's integrity is quantified in terms of the efficacy of the process that it supports. We calculate how the optimal attack strategy and the most attack-resistant network degree statistics depend on the node removal cost function and the attack resources. The resilience of networks against intelligent attacks is found to depend strongly on the node removal cost function faced by the attacker. In particular, if node removal costs increase sufficiently fast with the node degree, power law networks are found to be more resilient than Poissonian ones, even against optimized intelligent attacks. For cost functions increasing quadratically in the node degrees, intelligent attackers cannot damage the network more than random damages would.

  9. Impact of Cyber Attacks on High Voltage DC Transmission Damping Control

    Rui Fan

    2018-04-01

    Full Text Available Hybrid AC/HVDC (AC-HVDC grids have evolved to become huge cyber-physical systems that are vulnerable to cyber attacks because of the wide attack surface and increasing dependence on intelligent electronic devices, computing resources and communication networks. This paper, for the first time, studies the impact of cyber attacks on HVDC transmission oscillation damping control.Three kinds of cyber attack models are considered: timing attack, replay attack and false data injection attack. Followed by a brief introduction of the HVDC model and conventional oscillation damping control method, the design of three attack models is described in the paper. These attacks are tested on a modified IEEE New England 39-Bus AC-HVDC system. Simulation results have shown that all three kinds of attacks are capable of driving the AC-HVDC system into large oscillations or even unstable conditions.

  10. Integrated approach for investigating the durability of self-consolidating concrete to sulfate attack

    Bassuoni, Mohamed Tamer F.

    The growing use of self-consolidating concrete (SCC) in various infrastructure applications exposed to sulfate-rich environments necessitates conducting comprehensive research to evaluate its durability to external sulfate attack. Since the reliability and adequacy of standard sulfate immersion tests have been questioned, the current thesis introduced an integrated testing approach for assessing the durability of a wide scope of SCC mixtures to external sulfate attack. This testing approach involved progressive levels of complexity from single to multiple damage processes. A new series of sulfate attack tests involving multiple field-like parameters and combined damage mechanisms (various cations, controlled pH, wetting-drying, partial immersion, freezing-thawing, and cyclic cold-hot conditions with or without sustained flexural loading) were designed to evaluate the performance (suitability) of the SCC mixtures under various sulfate attack exposure scenarios. The main mixture design variables of SCC included the type of binder (single, binary, ternary and quaternary), air-entrainment, sand-to-aggregate mass ratio and hybrid fibre reinforcement. The comprehensive database and knowledge obtained from this research were used to develop smart models (fuzzy and neuro-fuzzy inference systems) based on artificial-intelligence to evaluate and predict the performance of the SCC mixtures under various sulfate attack exposure regimes implemented in this study. In full immersion tests involving high concentration sodium and magnesium sulfate solutions with controlled pH, the low penetrability of SCC was responsible for the high durability of specimens. Ternary and quaternary cementitious systems with or without limestone materials provided a passivating layer, with or without acid neutralization capacity, which protected SCC from severe damage in the aggressive sulfuric acid and ammonium sulfate solutions. In contrast to conclusions drawn from the sodium sulfate immersion

  11. Transient ischemic attack: diagnostic evaluation.

    Messé, Steven R; Jauch, Edward C

    2008-08-01

    A transient ischemic attack portends significant risk of a stroke. Consequently, the diagnostic evaluation in the emergency department is focused on identifying high-risk causes so that preventive strategies can be implemented. The evaluation consists of a facilitated evaluation of the patient's metabolic, cardiac, and neurovascular systems. At a minimum, the following tests are recommended: fingerstick glucose level, electrolyte levels, CBC count, urinalysis, and coagulation studies; noncontrast computed tomography (CT) of the head; electrocardiography; and continuous telemetry monitoring. Vascular imaging studies, such as carotid ultrasonography, CT angiography, or magnetic resonance angiography, should be performed on an urgent basis and prioritized according to the patient's risk stratification for disease. Consideration should be given for echocardiography if no large vessel abnormality is identified.

  12. Studies of the Seasonal Pattern of Multiple Maternities.

    Fellman, Johan

    2017-06-01

    The seasonality of population data has been of great interest in demographic studies. When seasonality is analyzed, the population at risk plays a central role. In a study of the monthly number of births and deaths, the population at risk is the product of the size of the population and the length of the month. Usually, the population can be assumed to be constant, and consequently, the population at risk is proportional to the length of the month. Hence, the number of cases per day has to be analyzed. If one studies the seasonal variation in twin or multiple maternities, the population at risk is the total number of monthly confinements, and the study should be based on the rates of the multiple maternities. Consequently, if one considers monthly twinning rates, the monthly number of birth data is eliminated and one obtains an unaffected seasonality measure of the twin maternities. The strength of the seasonality is measured by a chi-squared test or by the standard deviation. When seasonal models are applied, one must pay special attention to how well the model fits the data. If the goodness of fit is poor, it can erroneously result in a statement that the seasonality is slight, although the observed seasonal fluctuations are marked.

  13. MR imaging studies of multiple myeloma in the vertebral column

    Albert, S.; Leeds, N.E.

    1990-01-01

    This paper studies the sensitivity and characteristics of MR imaging in the diagnosis of myeloma in the vertebral column. The cervical, thoracic, and lumbar spines of 12 patients with known multiple myeloma were imaged with small flip angle, fast gradient-echo, proton-density (FPD) as well as spin-echo T1-weighted, T2-weighted, and intermediate (SE 2,000/20-30) imaging. The FPD images were acquired with pulse sequence gradient recalled acquisition in a steady state at a magnetic field strength of 1.5T with use of a license-plate and a circular surface coil

  14. Invisible Trojan-horse attack

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin

    2017-01-01

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance...

  15. When Sinuses Attack! (For Kids)

    ... First Aid & Safety Doctors & Hospitals Videos Recipes for Kids Kids site Sitio para niños How the Body Works ... Search English Español When Sinuses Attack! KidsHealth / For Kids / When Sinuses Attack! What's in this article? What ...

  16. Lifestyle risk factors for ischemic stroke and transient ischemic attack in young adults in the Stroke in Young Fabry Patients study.

    von Sarnowski, Bettina; Putaala, Jukka; Grittner, Ulrike; Gaertner, Beate; Schminke, Ulf; Curtze, Sami; Huber, Roman; Tanislav, Christian; Lichy, Christoph; Demarin, Vida; Basic-Kes, Vanja; Ringelstein, E Bernd; Neumann-Haefelin, Tobias; Enzinger, Christian; Fazekas, Franz; Rothwell, Peter M; Dichgans, Martin; Jungehulsing, Gerhard J; Heuschmann, Peter U; Kaps, Manfred; Norrving, Bo; Rolfs, Arndt; Kessler, Christof; Tatlisumak, Turgut

    2013-01-01

    Although many stroke patients are young or middle-aged, risk factor profiles in these age groups are poorly understood. The Stroke in Young Fabry Patients (sifap1) study prospectively recruited a large multinational European cohort of patients with cerebrovascular events aged 18 to 55 years to establish their prevalence of Fabry disease. In a secondary analysis of patients with ischemic stroke or transient ischemic attack, we studied age- and sex-specific prevalences of various risk factors. Among 4467 patients (median age, 47 years; interquartile range, 40-51), the most frequent well-documented and modifiable risk factors were smoking (55.5%), physical inactivity (48.2%), arterial hypertension (46.6%), dyslipidemia (34.9%), and obesity (22.3%). Modifiable less well-documented or potentially modifiable risk factors like high-risk alcohol consumption (33.0%) and short sleep duration (20.6%) were more frequent in men, and migraine (26.5%) was more frequent in women. Women were more often physically inactive, most pronouncedly at ages young patients with acute ischemic cerebrovascular events, modifiable risk factors were highly prevalent, particularly in men and older patients. These data emphasize the need for vigorous primary and secondary prevention measures already in young populations targeting modifiable lifestyle vascular risk factors.

  17. The Need for Situational Awareness in a CBRNE Attack

    Jordan Nelms

    2011-02-01

    Full Text Available Six years before the terrorist attacks on the World Trade Center and the Pentagon, and eight years before the United States went to war with Saddam Hussein for his alleged concealment of chemical and biological weapons caches, Japan's Tokyo subway was struck by one of the most vicious terror attacks in modern history.  The 1995 Sarin terrorist attack represents an important case study for post-9/11 emergency managers because it highlights the key issues first responders and public health officials face when confronted with a CBRNE ('C'hemical, 'B'iological, 'R'adiological, 'N'uclear, 'E'xplosive mass-casualty attack.

  18. Modelling Social-Technical Attacks with Timed Automata

    David, Nicolas; David, Alexandre; Hansen, Rene Rydhof

    2015-01-01

    . In this paper we develop an approach towards modelling socio-technical systems in general and socio-technical attacks in particular, using timed automata and illustrate its application by a complex case study. Thanks to automated model checking and automata theory, we can automatically generate possible attacks...... in our model and perform analysis and simulation of both model and attack, revealing details about the specific interaction between attacker and victim. Using timed automata also allows for intuitive modelling of systems, in which quantities like time and cost can be easily added and analysed....

  19. Poor Long-Term Functional Outcome After Stroke Among Adults Aged 18 to 50 Years: Follow-Up of Transient Ischemic Attack and Stroke Patients and Unelucidated Risk Factor Evaluation (FUTURE) Study

    Synhaeve, N.E.; Arntz, R.M.; Maaijwee, N.A.M.M.; Rutten-Jacobs, L.C.A.; Schoonderwaldt, H.C.; Dorresteijn, L.D.A.; Kort, P.L.M. de; Dijk, E.J. van; Leeuw, F.E. de

    2014-01-01

    BACKGROUND AND PURPOSE: Stroke in young adults has a dramatic effect on life; therefore, we investigated the long-term functional outcome after transient ischemic attack, ischemic stroke, or intracerebral hemorrhage in adults aged 18 to 50 years. METHODS: We studied 722 young patients with

  20. Poststroke Epilepsy Is Associated With a High Mortality After a Stroke at Young Age: Follow-Up of Transient Ischemic Attack and Stroke Patients and Unelucidated Risk Factor Evaluation Study

    Arntz, R.M.; Rutten-Jacobs, L.C.A.; Maaijwee, N.A.M.M.; Schoonderwaldt, H.C.; Dorresteijn, L.D.; Dijk, E.J. van; Leeuw, F.E. de

    2015-01-01

    BACKGROUND AND PURPOSE: Poststroke epilepsy is a common complication after a young stroke. We investigated the association between poststroke epilepsy and mortality. METHODS: We performed a prospective cohort study among 631 patients with a first-ever transient ischemic attack or ischemic stroke,

  1. Attack strategies on quantum cryptographic protocols

    Schauer, S.; Suda, M.

    2006-01-01

    Full text: Quantum key distribution (QKD) and quantum authentication (QA) have been a topic of extensive research in the last 20 years. In course of that many attacks on QKD and QA protocols have been studied. Among these, Zhang, Lee and Guo presented an attack on a QKD protocol using entanglement swapping. Based on that strategy we take a look at other protocols to inspect how much information an adversary may get if he shares entanglement with either one or both parties. We will present some protocols where an adversary can even get full information about the key using entanglement. (author)

  2. Invisible Trojan-horse attack.

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin; Makarov, Vadim

    2017-08-21

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Ac´ın-Ribordy-Gisin (SARG04) QKD protocol at 1924 nm versus that at 1536 nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N. Jain et al., New J. Phys. 16, 123030 (2014). However at 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.

  3. Some double resonance and multiple quantum NMR studies in solids

    Wemmer, D.E.

    1978-08-01

    The first section of this work presents the theory and experimental applications to analysis of molecular motion of chemical shielding lineshapes obtained with high resolution double resonance NMR techniques. Analysis of /sup 13/C powder lineshapes in hexamethylbenzene (HMB) and decamethylferrocene (DMFe) show that these molecules reorient in a jumping manner about the symmetry axis. Analysis of proton chemical shielding lineshapes of residual protons in heavy ice (D/sub 2/O) show that protons are exchanged among the tetrahedral positions of neighboring oxygen atoms, consistent with motion expected from defect migration. The second section describes the application of Fourier Transform Double Quantum NMR to measurement of chemical shielding of deuterium in powder samples. Studies of partially deuterated benzene and ferrocene give equal shielding anisotropies, ..delta..sigma = -6.5 ppM. Theoretical predictions and experimental measurements of dipolar couplings between deuterons using FTDQ NMR are presented. Crystals of BaClO/sub 3/.D/sub 2/O, ..cap alpha..,..beta.. d-2 HMB and ..cap alpha..,..beta..,..gamma.. d-3 HMB were studied, as were powders of d-2 HMB and anisic acid. The third section discusses general multiple quantum spectroscopy in dipolar coupled spin systems. Theoretical description is made for creation and detection of coherences between states without quantum number selection rules ..delta..m = +-1. Descriptions of techniques for partial selectivity of order in preparation and detection of multiple quantum coherences are made. The effects on selectivity and resolution of echo pulses during multiple quantum experiments are discussed. Experimental observation of coherences up to order 6 have been made in a sample of benzene dissolved in a liquid crystal. Experimental verifications of order selection and echo generation have been made.

  4. Some double resonance and multiple quantum NMR studies in solids

    Wemmer, D.E.

    1978-08-01

    The first section of this work presents the theory and experimental applications to analysis of molecular motion of chemical shielding lineshapes obtained with high resolution double resonance NMR techniques. Analysis of 13 C powder lineshapes in hexamethylbenzene (HMB) and decamethylferrocene (DMFe) show that these molecules reorient in a jumping manner about the symmetry axis. Analysis of proton chemical shielding lineshapes of residual protons in heavy ice (D 2 O) show that protons are exchanged among the tetrahedral positions of neighboring oxygen atoms, consistent with motion expected from defect migration. The second section describes the application of Fourier Transform Double Quantum NMR to measurement of chemical shielding of deuterium in powder samples. Studies of partially deuterated benzene and ferrocene give equal shielding anisotropies, Δsigma = -6.5 ppM. Theoretical predictions and experimental measurements of dipolar couplings between deuterons using FTDQ NMR are presented. Crystals of BaClO 3 .D 2 O, α,β d-2 HMB and α,β,γ d-3 HMB were studied, as were powders of d-2 HMB and anisic acid. The third section discusses general multiple quantum spectroscopy in dipolar coupled spin systems. Theoretical description is made for creation and detection of coherences between states without quantum number selection rules Δm = +-1. Descriptions of techniques for partial selectivity of order in preparation and detection of multiple quantum coherences are made. The effects on selectivity and resolution of echo pulses during multiple quantum experiments are discussed. Experimental observation of coherences up to order 6 have been made in a sample of benzene dissolved in a liquid crystal. Experimental verifications of order selection and echo generation have been made

  5. Application distribution model and related security attacks in VANET

    Nikaein, Navid; Kanti Datta, Soumya; Marecar, Irshad; Bonnet, Christian

    2013-03-01

    In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker`s model as an extension to the work done in [6]. Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e.g. malware, spamming and phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.

  6. Where can an Insider attack?

    Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming

    2006-01-01

    By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage...... to the targeted organisation. While the problem is well recognised in the security community as well as in law-enforcement and intelligence communities, the main resort still is to audit log files \\$\\backslash\\$emph{after the fact}. There has been little research into developing models, automated tools......, and techniques for analysing and solving (parts of) the problem. In this paper we first develop a formal model of systems, that can describe real-world scenarios. These high-level models are then mapped to acKlaim, a process algebra with support for access control, that is used to study and analyse properties...

  7. Countermeasures for unintentional and intentional video watermarking attacks

    Deguillaume, Frederic; Csurka, Gabriela; Pun, Thierry

    2000-05-01

    These last years, the rapidly growing digital multimedia market has revealed an urgent need for effective copyright protection mechanisms. Therefore, digital audio, image and video watermarking has recently become a very active area of research, as a solution to this problem. Many important issues have been pointed out, one of them being the robustness to non-intentional and intentional attacks. This paper studies some attacks and proposes countermeasures applied to videos. General attacks are lossy copying/transcoding such as MPEG compression and digital/analog (D/A) conversion, changes of frame-rate, changes of display format, and geometrical distortions. More specific attacks are sequence edition, and statistical attacks such as averaging or collusion. Averaging attack consists of averaging locally consecutive frames to cancel the watermark. This attack works well for schemes which embed random independent marks into frames. In the collusion attack the watermark is estimated from single frames (based on image denoising), and averaged over different scenes for better accuracy. The estimated watermark is then subtracted from each frame. Collusion requires that the same mark is embedded into all frames. The proposed countermeasures first ensures robustness to general attacks by spread spectrum encoding in the frequency domain and by the use of an additional template. Secondly, a Bayesian criterion, evaluating the probability of a correctly decoded watermark, is used for rejection of outliers, and to implement an algorithm against statistical attacks. The idea is to embed randomly chosen marks among a finite set of marks, into subsequences of videos which are long enough to resist averaging attacks, but short enough to avoid collusion attacks. The Bayesian criterion is needed to select the correct mark at the decoding step. Finally, the paper presents experimental results showing the robustness of the proposed method.

  8. Can we monitor heart attack in the troponin era: evidence from a population-based cohort study

    Rankin Jamie M

    2011-06-01

    Full Text Available Abstract Background Troponins (highly sensitive biomarkers of myocardial damage increase counts of myocardial infarction (MI in clinical practice, but their impact on trends in admission rates for MI in National statistics is uncertain. Methods Cases coded as MI or other cardiac diagnoses in the Hospital Morbidity Data Collection (MI-HMDC in Western Australia in 1998 and 2003 were classified using revised criteria for MI developed by an International panel convened by the American Heart Association (AHA criteria using information on symptoms, ECGs and cardiac biomarkers abstracted from samples of medical notes. Age-sex standardized rates of MI-HMDC were compared with rates of MI based on AHA criteria including troponins (MI-AHA or traditional biomarkers only (MI-AHAck. Results Between 1998 and 2003, rates of MI-HMDC decreased by 3.5% whereas rates of MI-AHA increased by 17%, a difference largely due to increased false-negative cases in the HMDC associated with marked increased use of troponin tests in cardiac admissions generally, and progressively lower test thresholds. In contrast, rates of MI-AHAck declined by 18%. Conclusions Increasing misclassification of MI-AHA by the HMDC may be due to reluctance by clinicians to diagnose MI based on relatively small increases in troponin levels. These influences are likely to continue. Monitoring MI using AHA criteria will require calibration of commercially available troponin tests and agreement on lower diagnostic thresholds for epidemiological studies. Declining rates of MI-AHAck are consistent with long-standing trends in MI in Western Australia, suggesting that neither MI-HMDC nor MI-AHA reflect the true underlying population trends in MI.

  9. Assessing the external validity of model-based estimates of the incidence of heart attack in England: a modelling study

    Peter Scarborough

    2016-11-01

    Full Text Available Abstract Background The DisMod II model is designed to estimate epidemiological parameters on diseases where measured data are incomplete and has been used to provide estimates of disease incidence for the Global Burden of Disease study. We assessed the external validity of the DisMod II model by comparing modelled estimates of the incidence of first acute myocardial infarction (AMI in England in 2010 with estimates derived from a linked dataset of hospital records and death certificates. Methods Inputs for DisMod II were prevalence rates of ever having had an AMI taken from a population health survey, total mortality rates and AMI mortality rates taken from death certificates. By definition, remission rates were zero. We estimated first AMI incidence in an external dataset from England in 2010 using a linked dataset including all hospital admissions and death certificates since 1998. 95 % confidence intervals were derived around estimates from the external dataset and DisMod II estimates based on sampling variance and reported uncertainty in prevalence estimates respectively. Results Estimates of the incidence rate for the whole population were higher in the DisMod II results than the external dataset (+54 % for men and +26 % for women. Age-specific results showed that the DisMod II results over-estimated incidence for all but the oldest age groups. Confidence intervals for the DisMod II and external dataset estimates did not overlap for most age groups. Conclusion By comparison with AMI incidence rates in England, DisMod II did not achieve external validity for age-specific incidence rates, but did provide global estimates of incidence that are of similar magnitude to measured estimates. The model should be used with caution when estimating age-specific incidence rates.

  10. Managing uncertainty: a qualitative study of GPs' views on the diagnosis and immediate management of transient ischaemic attack and the potential of a diagnostic tool.

    Bose, Priyanka; Tarrant, Carolyn; Mistri, Amit K; Wilson, Andrew

    2018-04-12

    Most patients with transient ischaemic attack (TIA) present to their GP. Early identification and treatment reduces the risk of subsequent stroke and consequent disability and mortality. To explore GPs' views on the diagnosis and immediate management of suspected TIA, and the potential utility of a diagnostic tool. This is a qualitative interview study based in Leicestershire, UK. A purposive sample of 10 GPs participated in 30-minute semi-structured telephone interviews. Data were analysed thematically. GPs reported that TIA was more likely to be suspected when patients were more obvious candidates for TIA based on their history, characteristics and symptom presentation. Referrals were in part a strategy to manage risk under conditions of uncertainty and to seek reassurance. GPs valued using a TIA risk stratification tool but felt this did not inform their diagnostic decision making. A diagnostic tool for TIA in primary care was seen to have potential to improve the decision-making process about diagnosis and management and enhance confidence of GPs, particularly in ruling out TIAs. GPs saw benefits of using hard thresholds, but remained concerned about missing TIAs and saw a tool as an adjunct to clinical judgement. GPs weigh up the likelihood of TIA in the context of assessments of candidacy and diverse, often vague, symptoms. A diagnostic tool could support GPs in this process and help reduce reliance on referrals to TIA clinics for reassurance, provided the tool was designed to support decision making in cases of less 'typical' presentations.

  11. Radiology response in the emergency department during a mass casualty incident: a retrospective study of the two terrorist attacks on 22 July 2011 in Norway

    Young, Victoria Solveig; Eggesboe, Heidi B.; Enden, Tone; Gaarder, Christine; Naess, Paal Aksel

    2017-01-01

    To describe the use of radiology in the emergency department (ED) in a trauma centre during a mass casualty incident, using a minimum acceptable care (MAC) strategy in which CT was restricted to potentially severe head injuries. We retrospectively studied the initial use of imaging on patients triaged to the trauma centre following the twin terrorist attacks in Norway on 22 July 2011. Nine patients from the explosion and 15 from the shooting were included. Fourteen patients had an Injury Severity Score >15. During the first 15 h, 22/24 patients underwent imaging in the ED. All 15 gunshot patients had plain films taken in the ED, compared to three from the explosion. A CT was performed in 18/24 patients; ten of these were completed in the ED and included five non-head CTs, the latter representing deviations from the MAC strategy. No CT referrals were delayed or declined. Mobilisation of radiology personnel resulted in a tripling of the staff. Plain film and CT capacity was never exceeded despite deviations from the MAC strategy. An updated disaster management plan will require the radiologist to cancel non-head CTs performed in the ED until no additional MCI patients are expected. (orig.)

  12. Radiology response in the emergency department during a mass casualty incident: a retrospective study of the two terrorist attacks on 22 July 2011 in Norway

    Young, Victoria Solveig; Eggesboe, Heidi B.; Enden, Tone [Oslo University Hospital, Division of Radiology and Nuclear Medicine, Oslo (Norway); Gaarder, Christine [Oslo University Hospital, Department of Traumatology, Oslo (Norway); Naess, Paal Aksel [Oslo University Hospital, Department of Traumatology, Oslo (Norway); Oslo University Hospital, Department of Paediatric Surgery, Oslo (Norway); University of Oslo, Institute of Clinical Medicine, Faculty of Medicine, Oslo (Norway)

    2017-07-15

    To describe the use of radiology in the emergency department (ED) in a trauma centre during a mass casualty incident, using a minimum acceptable care (MAC) strategy in which CT was restricted to potentially severe head injuries. We retrospectively studied the initial use of imaging on patients triaged to the trauma centre following the twin terrorist attacks in Norway on 22 July 2011. Nine patients from the explosion and 15 from the shooting were included. Fourteen patients had an Injury Severity Score >15. During the first 15 h, 22/24 patients underwent imaging in the ED. All 15 gunshot patients had plain films taken in the ED, compared to three from the explosion. A CT was performed in 18/24 patients; ten of these were completed in the ED and included five non-head CTs, the latter representing deviations from the MAC strategy. No CT referrals were delayed or declined. Mobilisation of radiology personnel resulted in a tripling of the staff. Plain film and CT capacity was never exceeded despite deviations from the MAC strategy. An updated disaster management plan will require the radiologist to cancel non-head CTs performed in the ED until no additional MCI patients are expected. (orig.)

  13. Sequential and Parallel Attack Tree Modelling

    Arnold, Florian; Guck, Dennis; Kumar, Rajesh; Stoelinga, Mariëlle Ida Antoinette; Koornneef, Floor; van Gulijk, Coen

    The intricacy of socio-technical systems requires a careful planning and utilisation of security resources to ensure uninterrupted, secure and reliable services. Even though many studies have been conducted to understand and model the behaviour of a potential attacker, the detection of crucial

  14. Association between Terror Attacks and Suicide Attempts

    Weizman, Tal; Yagil, Yaron; Schreiber, Shaul

    2009-01-01

    Based on Durkheim's "Control theory," we explored the association between frequency of terror attacks in Israel and the frequency of suicide attempts admitted to the Emergency Room of a major general hospital in Tel-Aviv (1999-2004). Analysis of the six-year study period as a whole revealed no significant correlation between the…

  15. Shark Attack Project - Marine Attack at Towed Hydrophone Arrays

    Kalmijn, Adrianus J

    2005-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  16. Multiple Contexts, Multiple Methods: A Study of Academic and Cultural Identity among Children of Immigrant Parents

    Urdan, Tim; Munoz, Chantico

    2012-01-01

    Multiple methods were used to examine the academic motivation and cultural identity of a sample of college undergraduates. The children of immigrant parents (CIPs, n = 52) and the children of non-immigrant parents (non-CIPs, n = 42) completed surveys assessing core cultural identity, valuing of cultural accomplishments, academic self-concept,…

  17. Network overload due to massive attacks

    Kornbluth, Yosef; Barach, Gilad; Tuchman, Yaakov; Kadish, Benjamin; Cwilich, Gabriel; Buldyrev, Sergey V.

    2018-05-01

    We study the cascading failure of networks due to overload, using the betweenness centrality of a node as the measure of its load following the Motter and Lai model. We study the fraction of survived nodes at the end of the cascade pf as a function of the strength of the initial attack, measured by the fraction of nodes p that survive the initial attack for different values of tolerance α in random regular and Erdös-Renyi graphs. We find the existence of a first-order phase-transition line pt(α ) on a p -α plane, such that if p pt , pf is large and the giant component of the network is still present. Exactly at pt, the function pf(p ) undergoes a first-order discontinuity. We find that the line pt(α ) ends at a critical point (pc,αc) , in which the cascading failures are replaced by a second-order percolation transition. We find analytically the average betweenness of nodes with different degrees before and after the initial attack, we investigate their roles in the cascading failures, and we find a lower bound for pt(α ) . We also study the difference between localized and random attacks.

  18. Team effectiveness in academic medical libraries: a multiple case study*

    Russo Martin, Elaine

    2006-01-01

    Objectives: The objective of this study is to apply J. Richard Hackman's framework on team effectiveness to academic medical library settings. Methods: The study uses a qualitative, multiple case study design, employing interviews and focus groups to examine team effectiveness in three academic medical libraries. Another site was selected as a pilot to validate the research design, field procedures, and methods to be used with the cases. In all, three interviews and twelve focus groups, with approximately seventy-five participants, were conducted at the case study libraries. Findings: Hackman identified five conditions leading to team effectiveness and three outcomes dimensions that defined effectiveness. The participants in this study identified additional characteristics of effectiveness that focused on enhanced communication, leadership personality and behavior, and relationship building. The study also revealed an additional outcome dimension related to the evolution of teams. Conclusions: Introducing teams into an organization is not a trivial matter. Hackman's model of effectiveness has implications for designing successful library teams. PMID:16888659

  19. Counting equations in algebraic attacks on block ciphers

    Knudsen, Lars Ramkilde; Miolane, Charlotte Vikkelsø

    2010-01-01

    This paper is about counting linearly independent equations for so-called algebraic attacks on block ciphers. The basic idea behind many of these approaches, e.g., XL, is to generate a large set of equations from an initial set of equations by multiplication of existing equations by the variables...... in the system. One of the most difficult tasks is to determine the exact number of linearly independent equations one obtain in the attacks. In this paper, it is shown that by splitting the equations defined over a block cipher (an SP-network) into two sets, one can determine the exact number of linearly...... independent equations which can be generated in algebraic attacks within each of these sets of a certain degree. While this does not give us a direct formula for the success of algebraic attacks on block ciphers, it gives some interesting bounds on the number of equations one can obtain from a given block...

  20. Fusion of Heterogeneous Intrusion Detection Systems for Network Attack Detection

    Jayakumar Kaliappan

    2015-01-01

    Full Text Available An intrusion detection system (IDS helps to identify different types of attacks in general, and the detection rate will be higher for some specific category of attacks. This paper is designed on the idea that each IDS is efficient in detecting a specific type of attack. In proposed Multiple IDS Unit (MIU, there are five IDS units, and each IDS follows a unique algorithm to detect attacks. The feature selection is done with the help of genetic algorithm. The selected features of the input traffic are passed on to the MIU for processing. The decision from each IDS is termed as local decision. The fusion unit inside the MIU processes all the local decisions with the help of majority voting rule and makes the final decision. The proposed system shows a very good improvement in detection rate and reduces the false alarm rate.

  1. Multiple comparison procedures for neuroimaging genomewide association studies.

    Hua, Wen-Yu; Nichols, Thomas E; Ghosh, Debashis

    2015-01-01

    Recent research in neuroimaging has focused on assessing associations between genetic variants that are measured on a genomewide scale and brain imaging phenotypes. A large number of works in the area apply massively univariate analyses on a genomewide basis to find single nucleotide polymorphisms that influence brain structure. In this paper, we propose using various dimensionality reduction methods on both brain structural MRI scans and genomic data, motivated by the Alzheimer's Disease Neuroimaging Initiative (ADNI) study. We also consider a new multiple testing adjustment method and compare it with two existing false discovery rate (FDR) adjustment methods. The simulation results suggest an increase in power for the proposed method. The real-data analysis suggests that the proposed procedure is able to find associations between genetic variants and brain volume differences that offer potentially new biological insights. © The Author 2014. Published by Oxford University Press. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  2. Forensics Investigation of Web Application Security Attacks

    Amor Lazzez; Thabet Slimani

    2015-01-01

    Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the sec...

  3. A study of biorthogonal multiple vector-valued wavelets

    Han Jincang; Cheng Zhengxing; Chen Qingjiang

    2009-01-01

    The notion of vector-valued multiresolution analysis is introduced and the concept of biorthogonal multiple vector-valued wavelets which are wavelets for vector fields, is introduced. It is proved that, like in the scalar and multiwavelet case, the existence of a pair of biorthogonal multiple vector-valued scaling functions guarantees the existence of a pair of biorthogonal multiple vector-valued wavelet functions. An algorithm for constructing a class of compactly supported biorthogonal multiple vector-valued wavelets is presented. Their properties are investigated by means of operator theory and algebra theory and time-frequency analysis method. Several biorthogonality formulas regarding these wavelet packets are obtained.

  4. A pilot study of a family focused, psychosocial intervention with war-exposed youth at risk of attack and abduction in north-eastern Democratic Republic of Congo.

    O'Callaghan, Paul; Branham, Lindsay; Shannon, Ciarán; Betancourt, Theresa S; Dempster, Martin; McMullen, John

    2014-07-01

    Rural communities in the Haut-Uele Province of northern Democratic Republic of Congo live in constant danger of attack and/or abduction by units of the Lord's Resistance Army operating in the region. This pilot study sought to develop and evaluate a community-participative psychosocial intervention involving life skills and relaxation training and Mobile Cinema screenings with this war-affected population living under current threat. 159 war-affected children and young people (aged 7-18) from the villages of Kiliwa and Li-May in north-eastern DR Congo took part in this study. In total, 22% of participants had been abduction previously while 73% had a family member abducted. Symptoms of post-traumatic stress reactions, internalising problems, conduct problems and pro-social behaviour were assessed by blinded interviewers at pre- and post-intervention and at 3-month follow-up. Participants were randomised (with an accompanying caregiver) to 8 sessions of a group-based, community-participative, psychosocial intervention (n=79) carried out by supervised local, lay facilitators or a wait-list control group (n=80). Average seminar attendance rates were high: 88% for participants and 84% for caregivers. Drop-out was low: 97% of participants were assessed at post-intervention and 88% at 3 month follow-up. At post-test, participants reported significantly fewer symptoms of post-traumatic stress reactions compared to controls (Cohen's d=0.40). At 3 month follow up, large improvements in internalising symptoms and moderate improvements in pro-social scores were reported, with caregivers noting a moderate to large decline in conduct problems among the young people. Trial Registration clinicalTrials.gov, Identifier: NCT01542398. Copyright © 2014 Elsevier Ltd. All rights reserved.

  5. TCPL: A Defense against wormhole attacks in wireless sensor networks

    Kumar, K. E. Naresh; Waheed, Mohd. Abdul; Basappa, K. Kari

    2010-01-01

    Do In this paper presents recent advances in technology have made low-cost, low-power wireless sensors with efficient energy consumption. A network of such nodes can coordinate among themselves for distributed sensing and processing of certain data. For which, we propose an architecture to provide a stateless solution in sensor networks for efficient routing in wireless sensor networks. This type of architecture is known as Tree Cast. We propose a unique method of address allocation, building up multiple disjoint trees which are geographically inter-twined and rooted at the data sink. Using these trees, routing messages to and from the sink node without maintaining any routing state in the sensor nodes is possible. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many sensor network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication. We present a new, general mechanism, called packet leashes, for detecting and thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes.

  6. Superposition Attacks on Cryptographic Protocols

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  7. Genetic attack on neural cryptography.

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  8. Panic Attacks and Panic Disorder

    ... Major changes in your life, such as a divorce or the addition of a baby Smoking or ... quality of life. Complications that panic attacks may cause or be linked to include: Development of specific ...

  9. Genetic attack on neural cryptography

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-01-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size

  10. Genetic attack on neural cryptography

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  11. What Is a Heart Attack?

    ... medical center. Support from family and friends also can help relieve stress and anxiety. Let your loved ones know how you feel and what they can do to help you. Risk of a Repeat Heart Attack Once ...

  12. Effect of urgent treatment of transient ischaemic attack and minor stroke on early recurrent stroke (EXPRESS study): a prospective population-based sequential comparison.

    Rothwell, Peter M; Giles, Matthew F; Chandratheva, Arvind; Marquardt, Lars; Geraghty, Olivia; Redgrave, Jessica N E; Lovelock, Caroline E; Binney, Lucy E; Bull, Linda M; Cuthbertson, Fiona C; Welch, Sarah J V; Bosch, Shelley; Alexander, Faye C; Carasco-Alexander, Faye; Silver, Louise E; Gutnikov, Sergei A; Mehta, Ziyah

    2007-10-20

    The risk of recurrent stroke is up to 10% in the week after a transient ischaemic attack (TIA) or minor stroke. Modelling studies suggest that urgent use of existing preventive treatments could reduce the risk by 80-90%, but in the absence of evidence many health-care systems make little provision. Our aim was to determine the effect of more rapid treatment after TIA and minor stroke in patients who are not admitted direct to hospital. We did a prospective before (phase 1: April 1, 2002, to Sept 30, 2004) versus after (phase 2: Oct 1, 2004, to March 31, 2007) study of the effect on process of care and outcome of more urgent assessment and immediate treatment in clinic, rather than subsequent initiation in primary care, in all patients with TIA or minor stroke not admitted direct to hospital. The study was nested within a rigorous population-based incidence study of all TIA and stroke (Oxford Vascular Study; OXVASC), such that case ascertainment, investigation, and follow-up were complete and identical in both periods. The primary outcome was the risk of stroke within 90 days of first seeking medical attention, with independent blinded (to study period) audit of all events. Of the 1278 patients in OXVASC who presented with TIA or stroke (634 in phase 1 and 644 in phase 2), 607 were referred or presented direct to hospital, 620 were referred for outpatient assessment, and 51 were not referred to secondary care. 95% (n=591) of all outpatient referrals were to the study clinic. Baseline characteristics and delays in seeking medical attention were similar in both periods, but median delay to assessment in the study clinic fell from 3 (IQR 2-5) days in phase 1 to less than 1 (0-3) day in phase 2 (prisk of recurrent stroke in the patients referred to the study clinic was 10.3% (32/310 patients) in phase 1 and 2.1% (6/281 patients) in phase 2 (adjusted hazard ratio 0.20, 95% CI 0.08-0.49; p=0.0001); there was no significant change in risk in patients treated elsewhere. The

  13. Software-based Microarchitectural Attacks

    Gruss, Daniel

    2017-01-01

    Modern processors are highly optimized systems where every single cycle of computation time matters. Many optimizations depend on the data that is being processed. Software-based microarchitectural attacks exploit effects of these optimizations. Microarchitectural side-channel attacks leak secrets from cryptographic computations, from general purpose computations, or from the kernel. This leakage even persists across all common isolation boundaries, such as processes, containers, and virtual ...

  14. OPERATION COBRA. Deliberate Attack, Exploitation

    1984-05-25

    to attack Sens, then continue to Troyes , on the Seine River. CCA was in the north, crossing the Loing River at Souppes against light resistance and...advanced from Troyes and prepared positions close to Sens. Under strong artillery support, a task force from CCA (TF Oden) attacked the enemy frontally...movement towards the Seine River on 24 August with an advance toward Troyes . Facing the combat command were what remained of the 51st SS Brigade, light

  15. Transient ischemic attack and minor stroke are the most common manifestations of acute cerebrovascular disease: a prospective, population-based study--the Aarhus TIA study.

    von Weitzel-Mudersbach, Paul; Andersen, Grethe; Hundborg, Heidi H; Johnsen, Søren P

    2013-01-01

    Severity of acute vascular illness may have changed in the last decades due to improvements in primary and secondary prevention. Population-based data on the severity of acute ischemic cerebrovascular disease are sparse. We aimed to examine incidence, characteristics and severity of acute ischemic cerebrovascular disease in a well-defined population. All patients admitted with transient ischemic attack (TIA) or acute ischemic stroke from March 1, 2007, to February 29, 2008, with residence in the Aarhus area, were included. Incidence rates and characteristics of TIA and ischemic stroke were compared. TIA accounted for 30%, TIA and minor stroke combined for 65% of all acute ischemic cerebrovascular events. Age-adjusted incidence rates of TIA and ischemic stroke were 72.2/100,000 and 129.5/100,000 person-years, respectively. TIA patients were younger than stroke patients (66.3 vs. 72.7 years; p TIA and stroke patients share many characteristics; however, TIA patients are younger and have fewer manifestations of atherosclerotic diseases, indicating a high potential for secondary prevention. Copyright © 2012 S. Karger AG, Basel.

  16. Strengthening Crypto-1 Cipher Against Algebraic Attacks

    Farah Afianti

    2015-08-01

    Full Text Available In the last few years, several studies addressed the problem of data security in Mifare Classic. One of its weaknesses is the low random number quality. This causes SAT solver attacks to have lower complexity. In order to strengthen Crypto-1 against SAT solver attacks, a modification of the feedback function with better cryptographic properties is proposed. It applies a primitive polynomial companion matrix. SAT solvers cannot directly attack the feedback shift register that uses the modified Boolean feedback function, the register has to be split into smaller groups. Experimental testing showed that the amount of memory and CPU time needed were highest when attacking the modified Crypto-1 using the modified feedback function and the original filter function. In addition, another modified Crypto-1, using the modified feedback function and a modified filter function, had the lowest percentage of revealed variables. It can be concluded that the security strength and performance of the modified Crypto-1 using the modified feedback function and the modified filter function are better than those of the original Crypto-1.

  17. Vulnerability of complex networks under intentional attack with incomplete information

    Wu, J; Deng, H Z; Tan, Y J; Zhu, D Z

    2007-01-01

    We study the vulnerability of complex networks under intentional attack with incomplete information, which means that one can only preferentially attack the most important nodes among a local region of a network. The known random failure and the intentional attack are two extreme cases of our study. Using the generating function method, we derive the exact value of the critical removal fraction f c of nodes for the disintegration of networks and the size of the giant component. To validate our model and method, we perform simulations of intentional attack with incomplete information in scale-free networks. We show that the attack information has an important effect on the vulnerability of scale-free networks. We also demonstrate that hiding a fraction of the nodes information is a cost-efficient strategy for enhancing the robustness of complex networks

  18. Multiple sclerosis and anterograde axonal degeneration study by magnetic resonance

    Martinez Pardo, P.; Capdevila Cirera, A.; Sanz Marin, P.M.; Gili Planas, J.

    1993-01-01

    Multiple sclerosis (MS) is a disease of the central nervous system that affects specifically the myelin. Its diagnosis by imaging techniques is, since the development of magnetic resonance (MR), relatively simple, and its occasional association with anterograde axonal degeneration (WD) has been reported. In both disorders, there is a lengthening of the T1 and T2 relaxation times. In the present report, 76 patients with MS with less than 4 plaques in the typical periventricular position were studied retrospectively, resulting in a rate of association with anterograde axonal degeneration of 8%. We consider that in spite of their same behavior in MR,MS and WD, with moreover represent completely different pathologies, are perfectly differential by MR. The S-E images with longer repetition and echo times in the axial and coronal planes have proved to be those most sensitive for this differentiation. Given that MS is specific pathology of then myelin, the axonal damages in delayed until several plaques adjacent to an axon affect it. We consider that this, added to the restriction of our study group (less than 4 plaques), is the cause of the pow percentage of the MS-WD association in our study. (Author)

  19. Radiology response in the emergency department during a mass casualty incident: a retrospective study of the two terrorist attacks on 22 July 2011 in Norway.

    Young, Victoria Solveig; Eggesbø, Heidi B; Gaarder, Christine; Næss, Pål Aksel; Enden, Tone

    2017-07-01

    To describe the use of radiology in the emergency department (ED) in a trauma centre during a mass casualty incident, using a minimum acceptable care (MAC) strategy in which CT was restricted to potentially severe head injuries. We retrospectively studied the initial use of imaging on patients triaged to the trauma centre following the twin terrorist attacks in Norway on 22 July 2011. Nine patients from the explosion and 15 from the shooting were included. Fourteen patients had an Injury Severity Score >15. During the first 15 h, 22/24 patients underwent imaging in the ED. All 15 gunshot patients had plain films taken in the ED, compared to three from the explosion. A CT was performed in 18/24 patients; ten of these were completed in the ED and included five non-head CTs, the latter representing deviations from the MAC strategy. No CT referrals were delayed or declined. Mobilisation of radiology personnel resulted in a tripling of the staff. Plain film and CT capacity was never exceeded despite deviations from the MAC strategy. An updated disaster management plan will require the radiologist to cancel non-head CTs performed in the ED until no additional MCI patients are expected. • Minimum acceptable care (MAC) should replace normal routines in mass casualty incidents. • MAC implied reduced use of imaging in the emergency department (ED). • CT in ED was restricted to suspected severe head injuries during MAC. • The radiologist should cancel all non-head CTs in the ED during MAC.

  20. Mixed methods feasibility study for a trial of blood pressure telemonitoring for people who have had stroke/transient ischaemic attack (TIA).

    Hanley, Janet; Fairbrother, Peter; Krishan, Ashma; McCloughan, Lucy; Padfield, Paul; Paterson, Mary; Pinnock, Hilary; Sheikh, Aziz; Sudlow, Cathie; Todd, Allison; McKinstry, Brian

    2015-03-25

    Good blood pressure (BP) control reduces the risk of recurrence of stroke/transient ischaemic attack (TIA). Although there is strong evidence that BP telemonitoring helps achieve good control, none of the major trials have considered the effectiveness in stroke/TIA survivors. We therefore conducted a feasibility study for a trial of BP telemonitoring for stroke/TIA survivors with uncontrolled BP in primary care. Phase 1 was a pilot trial involving 55 patients stratified by stroke/TIA randomised 3:1 to BP telemonitoring for 6 months or usual care. Phase 2 was a qualitative evaluation and comprised semi-structured interviews with 16 trial participants who received telemonitoring and 3 focus groups with 23 members of stroke support groups and 7 carers. Overall, 125 patients (60 stroke patients, 65 TIA patients) were approached and 55 (44%) patients were randomised including 27 stroke patients and 28 TIA patients. Fifty-two participants (95%) attended the 6-month follow-up appointment, but one declined the second daytime ambulatory blood pressure monitoring (ABPM) measurement resulting in a 93% completion rate for ABPM - the proposed primary outcome measure for a full trial. Adherence to telemonitoring was good; of the 40 participants who were telemonitoring, 38 continued to provide readings throughout the 6 months. There was a mean reduction of 10.1 mmHg in systolic ABPM in the telemonitoring group compared with 3.8 mmHg in the control group, which suggested the potential for a substantial effect from telemonitoring. Our qualitative analysis found that many stroke patients were concerned about their BP and telemonitoring increased their engagement, was easy, convenient and reassuring. A full-scale trial is feasible, likely to recruit well and have good rates of compliance and follow-up. ISRCTN61528726 15/12/2011.

  1. Novel Method For Low-Rate Ddos Attack Detection

    Chistokhodova, A. A.; Sidorov, I. D.

    2018-05-01

    The relevance of the work is associated with an increasing number of advanced types of DDoS attacks, in particular, low-rate HTTP-flood. Last year, the power and complexity of such attacks increased significantly. The article is devoted to the analysis of DDoS attacks detecting methods and their modifications with the purpose of increasing the accuracy of DDoS attack detection. The article details low-rate attacks features in comparison with conventional DDoS attacks. During the analysis, significant shortcomings of the available method for detecting low-rate DDoS attacks were found. Thus, the result of the study is an informal description of a new method for detecting low-rate denial-of-service attacks. The architecture of the stand for approbation of the method is developed. At the current stage of the study, it is possible to improve the efficiency of an already existing method by using a classifier with memory, as well as additional information.

  2. Can a Copycat Effect be Observed in Terrorist Suicide Attacks?

    Nicholas Farnham

    2017-03-01

    Full Text Available The purpose of this paper is to explore how a copycat effect – established within the field of suicide studies – may manifest itself in terrorist suicide attacks, and takes an exploratory approach in evaluating the prospect of incorporating open-data resources in future counter-terrorism research. This paper explores a possible ‘copycat effect’ in cases of suicide terrorism, which entails a perpetrator being inspired by a preceding attack to carry out a similar attack not long after the original. In the wake of mounting risks of lone wolf terrorist attacks today and due to the general difficulties faced in preventing such attacks, in this paper we explore a potential area of future prevention in media reporting, security and anti-terrorism policies today. Using the START Global Terrorism Database (GTD, this paper investigates terrorist suicide-attack clusters and analyses the relationship between attacks found within the same cluster. Using a mixed-method approach, our analyses did not uncover clear evidence supporting a copycat effect among the studied attacks. These and other findings have numerous policy and future research implications.

  3. The natural history of multiple sclerosis: a geographically based study 10: relapses and long-term disability.

    Scalfari, Antonio; Neuhaus, Anneke; Degenhardt, Alexandra; Rice, George P; Muraro, Paolo A; Daumer, Martin; Ebers, George C

    2010-07-01

    The relationship of relapses to long-term disability in multiple sclerosis is uncertain. Relapse reduction is a common therapeutic target but clinical trials have shown dissociation between relapse suppression and disability accumulation. We investigated relationships between relapses and disability progression for outcomes of requiring assistance to walk, being bedridden and dying from multiple sclerosis [Disability Status Scale 6, 8, 10] by analysing 28 000 patient-years of evolution in 806-bout onset patients from the London Ontario natural history cohort. Having previously shown no effect of relapse frequency among progressive multiple sclerosis subtypes, here we examined these measures in the pre-progressive or relapsing-remitting phase. Survival was compared among groups stratified by (i) early relapses--number of attacks during the first 2 years of multiple sclerosis; (ii) length of first inter-attack interval; (iii) interval between onset and Disability Status Scale 3 (moderate disability); (iv) number of attacks from the third year of disease up to onset of progression; and (v) during the entire relapsing-remitting phase. Early clinical features can predict hard disability outcomes. Frequent relapses in the first 2 years and shorter first inter-attack intervals predicted shorter times to reach hard disability endpoints. Attack frequencies, in the first 2 years, of 1 versus >or=3, gave differences of 7.6, 12.8 and 20.3 years in times from disease onset to Disability Status Scale 6, 8 and 10, respectively. Time to Disability Status Scale 3 highly and independently predicted time to Disability Status Scale 6, 8 and 10. In contrast, neither total number of relapsing-remitting phase attacks nor of relapses experienced during the relapsing-remitting phase after the second year up to onset of progression showed a deleterious effect on times from disease onset, from progression onset and from Disability Status Scale 3 to these hard endpoints. The failure of a

  4. Single vs. multiple fraction regimens for palliative radiotherapy treatment of multiple myeloma. A prospective randomised study

    Rudzianskiene, Milda; Inciura, Arturas; Gerbutavicius, Rolandas; Rudzianskas, Viktoras; Dambrauskiene, Ruta; Juozaityte, Elona [Lithuanian University of Health Sciences, Oncology Institute, Kaunas (Lithuania); Macas, Andrius [Lithuanian University of Health Sciences, Anaesthesiology Department, Kaunas (Lithuania); Simoliuniene, Renata [Lithuanian University of Health Sciences, Department of Physics, Mathematics and Biophysics, Kaunas (Lithuania); Kiavialaitis, Greta Emilia [University Hospital Zurich, Intitute of Anesthesiology, Zurich (Switzerland)

    2017-09-15

    To compare the impact of a single fraction (8 Gy x 1 fraction) and multifraction (3 Gy x 10 fractions) radiotherapy regimens on pain relief, recalcification and the quality of life (QoL) in patients with bone destructions due to multiple myeloma (MM). In all, 101 patients were included in a randomised prospective clinical trial: 58 patients were included in the control arm (3 Gy x 10 fractions) and 43 patients into the experimental arm (8 Gy x 1 fraction). The response rate was defined according to the International Consensus on Palliative Radiotherapy criteria. Recalcification was evaluated with radiographs. QoL questionnaires were completed before and 4 weeks after treatment. Pain relief was obtained in 81/101 patients (80.2%): complete response in 56 (69%) and partial in 25 patients (30.9%). No significant differences were observed in analgesic response between the groups. Significant factors for pain relief were female gender, age under 65, IgG MM type, presence of recalcification at the irradiated site. Recalcification was found in 32/101 patients (33.7%): complete in 17 (53.2%) and partial in 15 (46.2%). No significant differences were observed in recalcification between the groups. Significant factors for recalcification were Karnofsky index ≥ 60%, haemoglobin level ≤ 80 g/dl, MM stage II and analgesic response at the irradiated site. The QoL after radiotherapy was improved in the control group. The same analgesic and recalcification response was observed using two different radiotherapy regimens. Higher doses should be used to achieve a better QoL. (orig.) [German] Vergleich der einzeitigen vs. fraktionierten palliativen Radiotherapie in Bezug auf Schmerzlinderung, Knochenrekalzifizierung und Lebensqualitaet (QoL) bei Patienten mit multiplem Myelom (MM). In die randomisierte, prospektive Studie wurden 101 Patienten eingeschlossen: Die Kontrollgruppe (n = 58) erhielt eine fraktionierte (3 Gy x 10 Fraktionen) und die Experimentgruppe (n = 43) eine

  5. Multiple-source multiple-harmonic active vibration control of variable section cylindrical structures: A numerical study

    Liu, Jinxin; Chen, Xuefeng; Gao, Jiawei; Zhang, Xingwu

    2016-12-01

    Air vehicles, space vehicles and underwater vehicles, the cabins of which can be viewed as variable section cylindrical structures, have multiple rotational vibration sources (e.g., engines, propellers, compressors and motors), making the spectrum of noise multiple-harmonic. The suppression of such noise has been a focus of interests in the field of active vibration control (AVC). In this paper, a multiple-source multiple-harmonic (MSMH) active vibration suppression algorithm with feed-forward structure is proposed based on reference amplitude rectification and conjugate gradient method (CGM). An AVC simulation scheme called finite element model in-loop simulation (FEMILS) is also proposed for rapid algorithm verification. Numerical studies of AVC are conducted on a variable section cylindrical structure based on the proposed MSMH algorithm and FEMILS scheme. It can be seen from the numerical studies that: (1) the proposed MSMH algorithm can individually suppress each component of the multiple-harmonic noise with an unified and improved convergence rate; (2) the FEMILS scheme is convenient and straightforward for multiple-source simulations with an acceptable loop time. Moreover, the simulations have similar procedure to real-life control and can be easily extended to physical model platform.

  6. RApid Primary care Initiation of Drug treatment for Transient Ischaemic Attack (RAPID−TIA): study protocol for a pilot randomised controlled trial

    2013-01-01

    Background People who have a transient ischaemic attack (TIA) or minor stroke are at high risk of a recurrent stroke, particularly in the first week after the event. Early initiation of secondary prevention drugs is associated with an 80% reduction in risk of stroke recurrence. This raises the question as to whether these drugs should be given before being seen by a specialist – that is, in primary care or in the emergency department. The aims of the RAPID-TIA pilot trial are to determine the feasibility of a randomised controlled trial, to analyse cost effectiveness and to ask: Should general practitioners and emergency doctors (primary care physicians) initiate secondary preventative measures in addition to aspirin in people they see with suspected TIA or minor stroke at the time of referral to a specialist? Methods/Design This is a pilot randomised controlled trial with a sub-study of accuracy of primary care physician diagnosis of TIA. In the pilot trial, we aim to recruit 100 patients from 30 general practices (including out-of-hours general practice centres) and 1 emergency department whom the primary care physician diagnoses with TIA or minor stroke and randomly assign them to usual care (that is, initiation of aspirin and referral to a TIA clinic) or usual care plus additional early initiation of secondary prevention drugs (a blood-pressure lowering protocol, simvastatin 40 mg and dipyridamole 200 mg m/r bd). The primary outcome of the main study will be the number of strokes at 90 days. The diagnostic accuracy sub-study will include these 100 patients and an additional 70 patients in whom the primary care physician thinks the diagnosis of TIA is possible, rather than probable. For the pilot trial, we will report recruitment rate, follow-up rate, a preliminary estimate of the primary event rate and occurrence of any adverse events. For the diagnostic study, we will calculate sensitivity and specificity of primary care physician diagnosis using the final

  7. RApid Primary care Initiation of Drug treatment for Transient Ischaemic Attack (RAPID-TIA): study protocol for a pilot randomised controlled trial.

    Edwards, Duncan; Fletcher, Kate; Deller, Rachel; McManus, Richard; Lasserson, Daniel; Giles, Matthew; Sims, Don; Norrie, John; McGuire, Graham; Cohn, Simon; Whittle, Fiona; Hobbs, Vikki; Weir, Christopher; Mant, Jonathan

    2013-07-02

    People who have a transient ischaemic attack (TIA) or minor stroke are at high risk of a recurrent stroke, particularly in the first week after the event. Early initiation of secondary prevention drugs is associated with an 80% reduction in risk of stroke recurrence. This raises the question as to whether these drugs should be given before being seen by a specialist--that is, in primary care or in the emergency department. The aims of the RAPID-TIA pilot trial are to determine the feasibility of a randomised controlled trial, to analyse cost effectiveness and to ask: Should general practitioners and emergency doctors (primary care physicians) initiate secondary preventative measures in addition to aspirin in people they see with suspected TIA or minor stroke at the time of referral to a specialist? This is a pilot randomised controlled trial with a sub-study of accuracy of primary care physician diagnosis of TIA. In the pilot trial, we aim to recruit 100 patients from 30 general practices (including out-of-hours general practice centres) and 1 emergency department whom the primary care physician diagnoses with TIA or minor stroke and randomly assign them to usual care (that is, initiation of aspirin and referral to a TIA clinic) or usual care plus additional early initiation of secondary prevention drugs (a blood-pressure lowering protocol, simvastatin 40 mg and dipyridamole 200 mg m/r bd). The primary outcome of the main study will be the number of strokes at 90 days. The diagnostic accuracy sub-study will include these 100 patients and an additional 70 patients in whom the primary care physician thinks the diagnosis of TIA is possible, rather than probable. For the pilot trial, we will report recruitment rate, follow-up rate, a preliminary estimate of the primary event rate and occurrence of any adverse events. For the diagnostic study, we will calculate sensitivity and specificity of primary care physician diagnosis using the final TIA clinic diagnosis as the

  8. Multiple sclerosis and continence issues: an exploratory study.

    Wollin, Judy; Bennie, Mary; Leech, Christine; Windsor, Carol; Spencer, Nancy

    The study described in this article aimed to identify issues relating to incontinence and assess the impact of referral to a continence adviser on the lives of people with multiple sclerosis (MS). The study design used an in-depth, two-phase anonymous mail survey within a general community as nominated by the participants. Fifty-six people participated in phase 1 and eleven people completed phase 2. The results indicated that incontinence is a problem for the vast majority of participants--people with MS. One-third of the eligible participants took up the option of a consultation, assessment and treatment from a continence nurse. Reasons for not taking up the visit from the continence nurse included 'managing OK', 'didn't think it would help', 'embarrassed' and 'too busy'. Increasing awareness of urinary incontinence in the community is important and education needs to focus on at-risk groups in presenting the range of options available to assist people experiencing incontinence.

  9. Combined interpretation of multiple geophysical techniques: an archaeological case study

    Riedl, S.; Reichmann, S.; Tronicke, J.; Lück, E.

    2009-04-01

    subsurface structures and relevant geometries. From this data set, we interpret the depth and the extent of foundation and wall remains in the southern and central part of the site indicating the extent of the old orangery. This case study clearly illustrates the benefit of using multiple geophysical methods in archaeological studies. It further illustrates the advantage of 3-D GPR surveying at sites where anthropogenic disturbances (such as metallic pipes and other utilities) might limit the applicability of commonly applied mapping techniques such as magnetic gradiometry or EM38 conductivity mapping.

  10. Effectiveness of the Call in Beach Volleyball Attacking Play

    Künzell Stefan

    2014-12-01

    Full Text Available In beach volleyball the setter has the opportunity to give her or his hitter a “call”. The call intends that the setter suggests to her or his partner where to place the attack in the opponent’s court. The effectiveness of a call is still unknown. We investigated the women’s and men’s Swiss National Beach Volleyball Championships in 2011 and analyzed 2185 attacks. We found large differences between female and male players. While men called in only 38.4% of attacks, women used calls in 85.5% of attacks. If the male players followed a given call, 63% of the attacks were successful. The success rate of attacks without any call was 55.8% and 47.6% when the call was ignored. These differences were not significant (χ2(2 = 4.55, p = 0.103. In women’s beach volleyball, the rate of successful attacks was 61.5% when a call was followed, 35% for attacks without a call, and 42.6% when a call was ignored. The differences were highly significant (χ2(2 = 23.42, p < 0.0005. Taking into account the findings of the present study, we suggested that the call was effective in women’s beach volleyball, while its effect in men’s game was unclear. Considering the quality of calls we indicate that there is a significant potential to increase the effectiveness of a call.

  11. Optimizing power system investments and resilience against attacks

    Fang, Yiping; Sansavini, Giovanni

    2017-01-01

    This paper studies the combination of capacity expansion and switch installation in electric systems that ensures optimum performance under nominal operations and attacks. The planner–attacker–defender model is adopted to develop decisions that minimize investment and operating costs, and functionality loss after attacks. The model bridges long-term system planning for transmission expansion and short-term switching operations in reaction to attacks. The mixed-integer optimization is solved by decomposition via two-layer cutting plane algorithm. Numerical results on an IEEE system shows that small investments in transmission line switching enhance resilience by responding to disruptions via system reconfiguration. Sensitivity analyses show that transmission planning under the assumption of small-scale attacks provides the most robust strategy, i.e. the minimum-regret planning, if many constraints and limited investment budget affect the planning. On the other hand, the assumption of large-scale attacks provides the most robust strategy if the planning process involves large flexibility and budget. - Highlights: • Investment optimization in power systems under attacks is presented. • Capacity expansion and switch installation for system reconfiguration are combined. • The problem is solved by decomposition via two-layer cutting plane algorithm. • Small investments in switch installation enhance resilience by response to attacks. • Sensitivity analyses identify robust planning against different attack scenarios.

  12. Variability of clinical features in attacks of migraine with aura

    Hansen, Jakob M; Goadsby, Peter J; Charles, Andrew C

    2016-01-01

    . CONCLUSION: These findings are consistent with variable involvement of different brain regions during a migraine attack. The variable occurrence of nausea, and phonophobia in conjunction with photophobia, both defining features of migraine, may be an important consideration in designing clinical studies......BACKGROUND: There is significant variability in the clinical presentation of migraine, both among patients, and between attacks in an individual patient. We examined clinical features of migraine with aura in a large group of patients enrolled in a clinical trial, and compared retrospective...... a detailed retrospective description of the clinical features of their attacks of migraine. During the trial, clinical symptoms in migraine attacks starting with aura were recorded prospectively in 861 attacks. RESULTS: Retrospectively reported visual aura symptoms were variable and often overlapping...

  13. Risks of cyber attacks on financial audit activity

    Gheorghe N. Popescu

    2018-02-01

    Full Text Available Simultaneously with increasing the speed and precision of data processing, multiple connectivity, fast transmission over long distances, and their results, the development and generalization of automatic processing, brought many new vulnerabilities and deficiencies, otherwise inevitable, the basis of new risk categories. The risks of cyber attacks on financial auditing involve the risk management of information systems security. Identifying, mitigating or eliminating the effects are mandatory requirements without which a high-quality financial audit can not be achieved in a highly computerized environment. To substantiate specific risk management actions on information systems security, in this study we analyzed the main types and techniques used in cyber attacks by making their radiography, identifying the strengths and weaknesses of new technologies and systems that are or not favoring security systems. At the same time, we analyzed the security system of an information system, organized it in layers, and revealed the specific areas for the security evaluation of the Mehari method. Finally, some of the results of a survey based on a questionnaire made with the support of master students of the "Information Systems Audit and Control" course were revealed, with three of the most common weaknesses identified for each security domain.

  14. Preventing Wormhole Attacks on Wireless Ad Hoc Networks: A Graph Theoretic Approach

    Lazos, L; Poovendran, Radha; Meadows, C; Syverson, P; Chang, L. W

    2005-01-01

    We study the problem of characterizing the wormhole attack, an attack that can be mounted on a wide range of wireless network protocols without compromising any cryptographic quantity or network node...

  15. Longitudinal patterns and predictors of multiple health risk behaviors among adolescents : the TRAILS study

    Visser, Leenke; de Winter, Andrea F.; Verhulst, Frank C.; Vollebergh, Wilma A.M.; Reijneveld, Sijmen A.

    BACKGROUND: Most studies on multiple health risk behaviors among adolescents have cross-sectionally studied a limited number of health behaviors or determinants. PURPOSE: To examine the prevalence, longitudinal patterns and predictors of individual and multiple health risk behaviors among

  16. Self reported stressful life events and exacerbations in multiple sclerosis: prospective study

    D. Buljevac (Dragan); W.C.J. Hop (Wim); W. Reedeker; A.C.J.W. Janssens (Cécile); F.G.A. van der Meché (Frans); P.A. van Doorn (Pieter); R.Q. Hintzen (Rogier)

    2003-01-01

    textabstractOBJECTIVE: To study the relation between self reported stressful life events not related to multiple sclerosis and the occurrence of exacerbations in relapsing-remitting multiple sclerosis. DESIGN: Longitudinal, prospective cohort study. SETTING: Outpatient clinic of

  17. Supporting Affect Regulation in Children With Multiple Disabilities During Psychotherapy: A Multiple Case Design Study of Therapeutic Attachment. [Miscellaneous Article

    Schuengel, C; Sterkenburg, P S; Jeczynski, P; Janssen, C G C; Jongbloed, G

    2009-01-01

    : In a controlled multiple case design study, the development of a therapeutic relationship and its role in affect regulation were studied in 6 children with visual disabilities, severe intellectual disabilities, severe challenging behavior, and prolonged social deprivation. In the 1st phase,

  18. A multiple regression method for genomewide association studies ...

    Bujun Mei

    2018-06-07

    Jun 7, 2018 ... Similar to the typical genomewide association tests using LD ... new approach performed validly when the multiple regression based on linkage method was employed. .... the model, two groups of scenarios were simulated.

  19. MRI study of degenerative process in multiple system atrophy

    Yagishita, Toshiyuki; Kojima, Shigeyuki; Hirayama, Keizo

    1995-01-01

    The characteristic morphological changes of the brainstem and cerebellar regions of multiple system atrophy (MSA) were studied by MRI in varing subtypes, that is olivoponto cerebellar atrophy (OPCA: 23 cases), striatonigral degeneration (SND: 7 cases) and Shy-Drager's syndrome (SDS: 9 cases). OPCA was characterized by atrophy of the entire regions of the brainstem and the cerebellum. SND and SDS tended to show atrophy similar in type but lessin extent to OPCA. The common lesions in MSA were atrophy of the pontine base and cerebellum, and dilation of the fourth ventricle. Atrophy of the pontine base was more dominant in the inferior part than in the superior part, and cerebellar atrophy was more dominant in the superior part than in the inferior part, indicating that degeneration of the pontocerebellar pathway proceeds principally along fibers connecting the inferior part of the pons and the superior part of the cerebellum. Dilation of the fourth ventricle indicated atrophy of the middle cerebellar peduncle. In almost all the cases of OPCA and about a half the cases of SND and SDS, the pontine base and the middle cerebellar peduncle appeared as high signal intensity on T 2 weighted image and as low intensity on T 1 , suggesting degeneration and demyelination. In a few cases of OPCA, the dorsolateral part of the putamen were demonstrated as low signal intensity on T 2 weighted image. (author)

  20. MRI study of degenerative process in multiple system atrophy

    Yagishita, Toshiyuki; Kojima, Shigeyuki; Hirayama, Keizo [Chiba Univ. (Japan). School of Medicine

    1995-02-01

    The characteristic morphological changes of the brainstem and cerebellar regions of multiple system atrophy (MSA) were studied by MRI in varing subtypes, that is olivoponto cerebellar atrophy (OPCA: 23 cases), striatonigral degeneration (SND: 7 cases) and Shy-Drager`s syndrome (SDS: 9 cases). OPCA was characterized by atrophy of the entire regions of the brainstem and the cerebellum. SND and SDS tended to show atrophy similar in type but lessin extent to OPCA. The common lesions in MSA were atrophy of the pontine base and cerebellum, and dilation of the fourth ventricle. Atrophy of the pontine base was more dominant in the inferior part than in the superior part, and cerebellar atrophy was more dominant in the superior part than in the inferior part, indicating that degeneration of the pontocerebellar pathway proceeds principally along fibers connecting the inferior part of the pons and the superior part of the cerebellum. Dilation of the fourth ventricle indicated atrophy of the middle cerebellar peduncle. In almost all the cases of OPCA and about a half the cases of SND and SDS, the pontine base and the middle cerebellar peduncle appeared as high signal intensity on T{sub 2} weighted image and as low intensity on T{sub 1}, suggesting degeneration and demyelination. In a few cases of OPCA, the dorsolateral part of the putamen were demonstrated as low signal intensity on T{sub 2} weighted image. (author).

  1. Multiple Study of Case Involving Implementation of Lean Manufacturing

    Delvio Venanzi

    2018-03-01

    Full Text Available This article aims to show some factors that can cause companies to succeed or fail in their attempts to use lean manufacturing, by performing a multiple case study which presents two successful cases and three conditions of failure, in a survey of five large companies, all belonging to the metal-mechanical sector, located in Campinas and Sorocaba, both in the state of São Paulo, Brazil. The data were collected using exploratory research between the periods of January 2013 and February 2015. The results show that successful cases of lean manufacturing implementation are the result of a more organized work environment, standardization of production and service areas, employee satisfaction, productivity results and quality of the final product. Unsuccessful deployments result from poor execution and faulty planning, that has no benefit and ultimately decrease the morale of its employees, creating more distrust and frustration directly influencing the results and productivity. In other words, lean manufacturing implementation requires hard and continuous work and these procedures should be aligned with the mission and goals of companies and mainly focus on the maintenance result by using tools to monitor and track the process systematically and also making investments to eliminate waste.

  2. Challenges in clinical studies with multiple imaging probes

    Krohn, Kenneth A.; O'Sullivan, Finbarr; Crowley, John; Eary, Janet F.; Linden, Hannah M.; Link, Jeanne M.; Mankoff, David A.; Muzi, Mark; Rajendran, Joseph G.; Spence, Alexander M.; Swanson, Kristin R.

    2007-01-01

    This article addresses two related issues: (a) When a new imaging agent is proposed, how does the imager integrate it with other biomarkers, either sampled or imaged? (b) When we have multiple imaging agents, is the information additive or duplicative and how is this objectively determined? Molecular biology is leading to new treatment options with reduced normal tissue toxicity, and imaging should have a role in objectively evaluating new treatments. There are two roles for molecular characterization of disease. Molecular imaging measurements before therapy help predict the aggressiveness of disease and identify therapeutic targets and, therefore, help choose the optimal therapy for an individual. Measurements of specific biochemical processes made during or after therapy should be sensitive measures of tumor response. The rules of evidence are not fully developed for the prognostic role of imaging biomarkers, but the potential of molecular imaging provides compelling motivation to push forward with convincing validation studies. New imaging procedures need to be characterized for their effectiveness under realistic clinical conditions to improve the management of patients and achieve a better outcome. The purpose of this article is to promote a critical discussion within the molecular imaging community because our future value to the overall biomedical community will be in supporting better treatment outcomes rather than in detection

  3. Terpenoid biosynthesis in Arabidopsis attacked by caterpillars and aphids: effects of aphid density on the attraction of a caterpillar parasitoid.

    Kroes, Anneke; Weldegergis, Berhane T; Cappai, Francesco; Dicke, Marcel; van Loon, Joop J A

    2017-12-01

    One of the responses of plants to insect attack is the production of volatile organic compounds that mediate indirect defence of plants by attracting natural enemies of the attacking herbivores. Herbivore-induced plant volatiles (HIPVs) include terpenoids that play key roles in the attraction of natural enemies. Crosstalk between phytohormonal signalling pathways is well known to affect the regulation of plant defences, including the emission of HIPVs. Thus, simultaneous feeding on the same plant by caterpillars and aphids, can affect the attraction of parasitoids by the plant compared to single insect attack. The role of aphid density in the regulation of HIPV emission by plants under dual attack has not been studied previously. Here, we investigated the attraction of Diadegma semiclausum, a parasitoid of the Diamondback moth Plutella xylostella, to volatiles emitted by Arabidopsis thaliana plants, simultaneously attacked by host caterpillars, and by the non-host aphid Brevicoryne brassicae. Our study shows that the effect of aphid infestation on parasitoid attraction is influenced by the density of the aphids. Biosynthesis and emission of (E,E)-α-farnesene could be linked to the observed preference of D. semiclausum parasitoids for the HIPV blend emitted by plants dually infested by caterpillars and aphids at a high density compared to dually infested plants with a low aphid density. Parasitoids such as D. semiclausum are important enemies of herbivorous insects and a better understanding of how plants express indirect defence mechanisms in response to multiple insect attack will provide important knowledge on plant-herbivore-parasitoid interactions under multiple stress conditions.

  4. [Efficacy and safety of tulobuterol patch versus oral salbutamol sulfate in children with mild or moderate acute attack of bronchial asthma: a comparative study].

    Lin, Qian; Liu, Quan-Hua; Bao, Yi-Xiao

    2013-06-01

    To compare tulobuterol patch and oral salbutamol sulfate in terms of efficacy and safety in children with mild or moderate acute attack of bronchial asthma. A total of 92 children with mild and moderate acute asthmatic attack were randomly divided into salbutamol group (n=46) and tulobuterol group (n=46). Both groups received routine treatment with antihistamine, selective leukotriene receptor antagonist and glucocorticoid. In addition, the salbutamol group was given slow-release capsules of salbutamol sulfate, and the tulobuterol group was treated with tulobuterol patch. The two groups were compared with respect to symptom scores of cough, wheeze, respiratory rate, wheezing sound, three depression sign and peak expiratory flow, as well as adverse events. As the treatment proceeded, symptom scores decreased in both groups; on the third day of treatment, all symptom scores except cough score showed a significant decrease in both groups (Pattack.

  5. A cross sectional study of the relationship between the exposure of pregnant women to military attacks in 2014 in Gaza and the load of heavy metal contaminants in the hair of mothers and newborns.

    Manduca, Paola; Diab, Safwat Y; Qouta, Samir R; Albarqouni, Nabil Ma; Punamaki, Raiija-Leena

    2017-08-02

    Metal contamination of humans in war areas has rarely been investigated. Weaponry's heavy metals become environmentally stable war remnants and accumulate in living things. They also pose health risks in terms of prenatal intake, with potential long term risks for reproductive and children's health. We studied the contribution of military attacks to the load of 23 metals in the hair of Palestinian women in the Gaza Strip, who were pregnant at the time of the military attacks in 2014, and their newborns. We compared the metal load in the mothers with values for adult hair from outside the war area (RHS) as the reference. We investigated heavy metals trans-passing in utero, and assessed if the heavy metal intake could derive from sources unrelated to the war. Cross sectional study. Cross sectional convenience sample of 502 mothers delivering in the Gaza Strip and their newborns. Measure of the load of heavy metals in mother and newborn hair by inductively coupled plasma-mass spectrometry (ICP-MS). Comparison of metal loads with the reference RHS, between groups with different exposures to attacks and house/agriculture chemicals, and between mothers and newborns. Data for birth registry and for exposures to war and other known risk factors were obtained at interview with the mothers. Photographic documentation of damage from military attacks was obtained. The whole cross sectional convenience sample had a significantly higher load of heavy metals than the reference RHS. Women exposed to military attacks had a significantly higher load of heavy metals than those not exposed; the load in newborns correlated positively with the mothers' load. No significant difference was found between users/non-users of house/agriculture chemicals. No other known confounder was identified. High heavy metal loads in mothers, reflected in those of their newborns, were associated with exposure to military attacks, posing a risk of immediate and long term negative outcomes for pregnancy and

  6. Analytical Characterization of Internet Security Attacks

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  7. Sensitivity analysis in multiple imputation in effectiveness studies of psychotherapy.

    Crameri, Aureliano; von Wyl, Agnes; Koemeda, Margit; Schulthess, Peter; Tschuschke, Volker

    2015-01-01

    The importance of preventing and treating incomplete data in effectiveness studies is nowadays emphasized. However, most of the publications focus on randomized clinical trials (RCT). One flexible technique for statistical inference with missing data is multiple imputation (MI). Since methods such as MI rely on the assumption of missing data being at random (MAR), a sensitivity analysis for testing the robustness against departures from this assumption is required. In this paper we present a sensitivity analysis technique based on posterior predictive checking, which takes into consideration the concept of clinical significance used in the evaluation of intra-individual changes. We demonstrate the possibilities this technique can offer with the example of irregular longitudinal data collected with the Outcome Questionnaire-45 (OQ-45) and the Helping Alliance Questionnaire (HAQ) in a sample of 260 outpatients. The sensitivity analysis can be used to (1) quantify the degree of bias introduced by missing not at random data (MNAR) in a worst reasonable case scenario, (2) compare the performance of different analysis methods for dealing with missing data, or (3) detect the influence of possible violations to the model assumptions (e.g., lack of normality). Moreover, our analysis showed that ratings from the patient's and therapist's version of the HAQ could significantly improve the predictive value of the routine outcome monitoring based on the OQ-45. Since analysis dropouts always occur, repeated measurements with the OQ-45 and the HAQ analyzed with MI are useful to improve the accuracy of outcome estimates in quality assurance assessments and non-randomized effectiveness studies in the field of outpatient psychotherapy.

  8. Multiple Myeloma and lifetime occupation: results from the EPILYMPH study

    Perrotta Carla

    2012-12-01

    Full Text Available Abstract Background The EPILYMPH study applied a detailed occupational exposure assessment approach to a large multi-centre case–control study conducted in six European countries. This paper analysed multiple myeloma (MM risk associated with level of education, and lifetime occupational history and occupational exposures, based on the EPILYMPH data set. Methods 277 MM cases and four matched controls per each case were included. Controls were randomly selected, matching for age (+/− 5 years, centre and gender. Lifetime occupations and lifetime exposure to specific workplace agents was obtained through a detailed questionnaire. Local industrial hygienists assessed likelihood and intensity for specific exposures. The odds ratio and 95% confidence intervals (OR, 95% CI were calculated for level of education, individual occupations and specific exposures. Unconditional logistic regression models were run for individual occupations and exposures. Results A low level of education was associated with MM OR=1.68 (95% CI 1.02-2.76. An increased risk was observed for general farmers (OR=1.77; 95% CI 1.05-2.99 and cleaning workers (OR=1.69; 95% CI 1.04-2.72 adjusting for level of education. Risk was also elevated, although not significant, for printers (OR=2.06; 95% CI 0.97-4.34. Pesticide exposure over a period of ten years or more increased MM risk (OR=1.62; 95% CI 1.01-2.58. Conclusion These results confirm an association of MM with farm work, and indicate its association with printing and cleaning. While prolonged exposure to pesticides seems to be a risk factor for MM, an excess risk associated with exposure to organic solvents could not be confirmed.

  9. Automated Generation of Attack Trees

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica......Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error......-prone and impracticable for large systems. Nonetheless, the automated generation of attack trees has only been explored in connection to computer networks and levering rich models, whose analysis typically leads to an exponential blow-up of the state space. We propose a static analysis approach where attack trees...... are automatically inferred from a process algebraic specification in a syntax-directed fashion, encompassing a great many application domains and avoiding incurring systematically an exponential explosion. Moreover, we show how the standard propositional denotation of an attack tree can be used to phrase...

  10. Severe asthma and acute attacks: diagnosis and management in ...

    Patients who continue to have symptoms with frequent attacks of asthma despite being adherent to treatment with multiple asthma medications, have severe asthma. Severe asthma has significant implications for the affected individual and utilise a disproportionate share of the health care costs associated with asthma.

  11. Detection and isolation of routing attacks through sensor watermarking

    Ferrari, R.; Herdeiro Teixeira, A.M.; Sun, J; Jiang, Z-P

    2017-01-01

    In networked control systems, leveraging the peculiarities of the cyber-physical domains and their interactions may lead to novel detection and defense mechanisms against malicious cyber-attacks. In this paper, we propose a multiplicative sensor watermarking scheme, where each sensor's output is

  12. Primary intervention for memory structuring and meaning acquisition (PIMSMA): study of a mental health first-aid intervention in the ED with injured survivors of suicide bombing attacks.

    Schreiber, Shaul; Dolberg, Ornah T; Barkai, Gabriel; Peles, Einat; Leor, Agnes; Rapoport, Elena; Heinik, Jeremia; Bloch, Miki

    2007-01-01

    To assess the impact of a structured intervention, the "primary intervention for memory structuring and meaning acquisition" (PIMSMA) performed randomly in the emergency department with survivors of suicide bombing attacks, on their medium-term mental health outcome. Follow up and assessment 3-9 months postinjury, and 24 months thereafter. A tertiary referral general hospital in Tel Aviv, Israel. Injured survivors of 9 suicide bombing and suicide shooting, men and women aged 16-72 at the time of the incident. Diagnosis of posttraumatic stress disorder (PTSD) was made using the Hebrew validated version of the DSM-IV SCID-PTSD rating scale. Other psychiatric symptoms were assessed using the following rating scales: impact of event scale (IES), Hamilton rating scale for depression (HAM-D) and for anxiety (HAM-A), and the Pittsburgh sleep quality index (PSQI). Effects of PIMSMA and PTSD level of psychological distress were analyzed using ANOVA and for change over time for continuous variables repeated measured multivariate analyses was performed, and for categorical variables nonparametric-related sample McNemar. Logistic regression for variable associated with PTSD was performed. Out of 213 eligible injured survivors evacuated to our ER, 129 were retrieved 3-9 months after the incident, and 53 were available for assessment 2 years later. Multivariate analyses for being PTSD vs non-PTSD at the first evaluation, being hospitalized OR = 5.6 (95 percent CI 1.1-27.6) and treated OR = 24.5 (95 percent CI 2.8-200) were the only predictors, with no effect (p = 0.9) for PIMSMA vs other supportive intervention. Predictor for PTSD at the second evaluation were IES severity score at first evaluation OR = 1.1 (95 percent CI 1.04-1.2). The PIMSMA approach is as good as the nonspecific supportive treatment performed routinely in the ED with all survivors of traumatic events of any origin. Further studies are needed to establish valid, evidence-based treatment approaches for the

  13. An Analysis of Attacks on Blockchain Consensus

    Bissias, George; Levine, Brian Neil; Ozisik, A. Pinar; Andresen, Gavin

    2016-01-01

    We present and validate a novel mathematical model of the blockchain mining process and use it to conduct an economic evaluation of the double-spend attack, which is fundamental to all blockchain systems. Our analysis focuses on the value of transactions that can be secured under a conventional double-spend attack, both with and without a concurrent eclipse attack. Our model quantifies the importance of several factors that determine the attack's success, including confirmation depth, attacke...

  14. Administrative support of novice science teachers: A multiple case study

    Iacuone, Leann

    Novice science teachers leave the confines of colleges and universities to embark on a new adventure in education where they aim to influence young minds, make a difference in the world, and share their love for their content. They have learned their pedagogical skills with the support and assistance of fellow classmates, a supporting professor, and a cooperating teacher. These teachers enter their new place of employment and are met with many unexpected challenges, such as a lack of resources, no one to ask questions of, and a busy staff with already established relationships, causing them to feel an overall lack of support and resulting in many new teachers rethinking their career choice and leaving the field of education within 5 years of entering. This multiple-case study investigated the administrative support 4 novice science teachers received during an academic year and the novice teachers' perceptions of the support they received to answer the following research question: How do novice science teachers who have consistent interactions with administrators develop during their first year? To answer this question, semistructured interviews, reflection journals, observations, resumes, long-range plans, and student discipline referrals were collected. The findings from this study show novice science teachers who had incidents occur in the classroom requiring administrative assistance and guidance felt more confident in enforcing their classroom management policies and procedures as the year progressed to change student behavior. The novice science teachers perceived administrators who provided resources including technology, office supplies, science supplies, and the guidance of a mentor as supportive. Novice science teachers who engaged in dialogue after administrative observations, were provided the opportunity to attend professional development outside the district, and had a mentor who taught the same discipline made more changes to their instructional

  15. Computer studies of multiple-quantum spin dynamics

    Murdoch, J.B.

    1982-11-01

    The excitation and detection of multiple-quantum (MQ) transitions in Fourier transform NMR spectroscopy is an interesting problem in the quantum mechanical dynamics of spin systems as well as an important new technique for investigation of molecular structure. In particular, multiple-quantum spectroscopy can be used to simplify overly complex spectra or to separate the various interactions between a nucleus and its environment. The emphasis of this work is on computer simulation of spin-system evolution to better relate theory and experiment.

  16. A study of the treatment of oral multiple primary cancers

    Sato, Takayuki; Kamata, Shin-etsu; Kawabata, Kazuyoshi

    2003-01-01

    The subjects were 30 multiple primary cancers (out of 2,169 oral squamous cell carcinoma including lip cancers), which were treated at the Division of Head and Neck, Cancer Institute Hospital. Seven synchronous carcinomas and 23 metachronous cases were seen. The most common site of the primary cancer was the tongue. Surgical treatment was performed for the first treatment in 5 cases of the 7 synchronous cancers. On the other hand, radical treatment was performed in 11 cases of the 23 metachronous cancers. Fourteen of the 18 cases were treated by surgical treatment and controlled. It is suggested that surgical treatment is the most effective for oral multiple primary cancers. (author)

  17. Computer studies of multiple-quantum spin dynamics

    Murdoch, J.B.

    1982-11-01

    The excitation and detection of multiple-quantum (MQ) transitions in Fourier transform NMR spectroscopy is an interesting problem in the quantum mechanical dynamics of spin systems as well as an important new technique for investigation of molecular structure. In particular, multiple-quantum spectroscopy can be used to simplify overly complex spectra or to separate the various interactions between a nucleus and its environment. The emphasis of this work is on computer simulation of spin-system evolution to better relate theory and experiment

  18. Recurrent spontaneous attacks of dizziness.

    Lempert, Thomas

    2012-10-01

    This article describes the common causes of recurrent vertigo and dizziness that can be diagnosed largely on the basis of history. Ninety percent of spontaneous recurrent vertigo and dizziness can be explained by six disorders: (1) Ménière disease is characterized by vertigo attacks, lasting 20 minutes to several hours, with concomitant hearing loss, tinnitus, and aural fullness. Aural symptoms become permanent during the course of the disease. (2) Attacks of vestibular migraine may last anywhere from minutes to days. Most patients have a previous history of migraine headaches, and many experience migraine symptoms during the attack. (3) Vertebrobasilar TIAs affect older adults with vascular risk factors. Most attacks last less than 1 hour and are accompanied by other symptoms from the posterior circulation territory. (4) Vestibular paroxysmia is caused by vascular compression of the eighth cranial nerve. It manifests itself with brief attacks of vertigo that recur many times per day, sometimes with concomitant cochlear symptoms. (5) Orthostatic hypotension causes brief episodes of dizziness lasting seconds to a few minutes after standing up and is relieved by sitting or lying down. In older adults, it may be accompanied by supine hypertension. (6) Panic attacks usually last minutes, occur in specific situations, and are accompanied by choking, palpitations, tremor, heat, and anxiety. Less common causes of spontaneous recurrent vertigo and dizziness include perilymph fistula, superior canal dehiscence, autoimmune inner ear disease, otosclerosis, cardiac arrhythmia, and medication side effects. Neurologists need to venture into otolaryngology, internal medicine, and psychiatry to master the differential diagnosis of recurrent dizziness.

  19. Single vs. multiple fraction regimens for palliative radiotherapy treatment of multiple myeloma. A prospective randomised study

    Rudzianskiene, Milda; Inciura, Arturas; Gerbutavicius, Rolandas; Rudzianskas, Viktoras; Dambrauskiene, Ruta; Juozaityte, Elona; Macas, Andrius; Simoliuniene, Renata; Kiavialaitis, Greta Emilia

    2017-01-01

    To compare the impact of a single fraction (8 Gy x 1 fraction) and multifraction (3 Gy x 10 fractions) radiotherapy regimens on pain relief, recalcification and the quality of life (QoL) in patients with bone destructions due to multiple myeloma (MM). In all, 101 patients were included in a randomised prospective clinical trial: 58 patients were included in the control arm (3 Gy x 10 fractions) and 43 patients into the experimental arm (8 Gy x 1 fraction). The response rate was defined according to the International Consensus on Palliative Radiotherapy criteria. Recalcification was evaluated with radiographs. QoL questionnaires were completed before and 4 weeks after treatment. Pain relief was obtained in 81/101 patients (80.2%): complete response in 56 (69%) and partial in 25 patients (30.9%). No significant differences were observed in analgesic response between the groups. Significant factors for pain relief were female gender, age under 65, IgG MM type, presence of recalcification at the irradiated site. Recalcification was found in 32/101 patients (33.7%): complete in 17 (53.2%) and partial in 15 (46.2%). No significant differences were observed in recalcification between the groups. Significant factors for recalcification were Karnofsky index ≥ 60%, haemoglobin level ≤ 80 g/dl, MM stage II and analgesic response at the irradiated site. The QoL after radiotherapy was improved in the control group. The same analgesic and recalcification response was observed using two different radiotherapy regimens. Higher doses should be used to achieve a better QoL. (orig.) [de

  20. Are blockchains immune to all malicious attacks?

    Xu, Jennifer J.

    2016-01-01

    Background: In recent years, blockchain technology has attracted considerable attention. It records cryptographic transactions in a public ledger that is difficult to alter and compromise because of the distributed consensus. As a result, blockchain is believed to resist fraud and hacking. Results: This work explores the types of fraud and malicious activities that can be prevented by blockchain technology and identifies attacks to which blockchain remains vulnerable. Conclusions: This study ...

  1. A multiple feedback methodology for the study of creativity evaluations

    Glaveanu, Vlad Petre

    2012-01-01

    The cultural psychology perspective emphasizes the role of communication and social interaction in the construction of representations and evaluations concerning creativity. In terms of creativity assessment, this approach leads to the use of a multiple feedback methodology selecting several groups...... useful for investigating the social and cultural dynamics of creativity....

  2. Multiple Epiphyseal Dysplasia: A Clinical and Molecular Genetic Study

    J.B.A. van Mourik (Jan)

    1998-01-01

    textabstractMultiple epiphyseal dysplasia (MED) is one of the most common osteochondrodysplasias [Wynne-Davies and Gormley 1985]. During childhood and adolescence it affects the epiphyses of the tubular bones, resulting in axial deformities and shorter limbs.·Later in life MED can lead to

  3. Poor long-term functional outcome after stroke among adults aged 18 to 50 years: Follow-Up of Transient Ischemic Attack and Stroke Patients and Unelucidated Risk Factor Evaluation (FUTURE) study.

    Synhaeve, Nathalie E; Arntz, Renate M; Maaijwee, Noortje A M; Rutten-Jacobs, Loes C A; Schoonderwaldt, Henny C; Dorresteijn, Lucille D A; de Kort, Paul L M; van Dijk, Ewoud J; de Leeuw, Frank-Erik

    2014-04-01

    Stroke in young adults has a dramatic effect on life; therefore, we investigated the long-term functional outcome after transient ischemic attack, ischemic stroke, or intracerebral hemorrhage in adults aged 18 to 50 years. We studied 722 young patients with first-ever stroke admitted between January 1, 1980, and November 1, 2010. Functional outcome was assessed by stroke subtype with the modified Rankin Scale and Instrumental Activities of Daily Living scale. After a mean follow-up of 9.1 (SD, 8.2) years, 32.0% of all patients had a poor functional outcome (modified Rankin Scale, >2); for ischemic stroke, this was 36.5%, for intracerebral hemorrhage 49.3%, and for transient ischemic attack 16.8%. At follow-up, 10.8% of transient ischemic attack, 14.6% of ischemic stroke, and 18.2% of intracerebral hemorrhage patients had a poor outcome as assessed by Instrumental Activities of Daily Living (ischemic stroke or intracerebral hemorrhage in young adults, 1 of 8 survivors is still dependent in daily life.

  4. Chronic pain in multiple sclerosis: A 10-year longitudinal study.

    Young, Jamie; Amatya, Bhasker; Galea, Mary P; Khan, Fary

    2017-07-01

    Pain is a common symptom associated with multiple sclerosis (MS), and has lasting effects on an individual's functional capacity and quality of life. A wide range of prevalence rates of pain (between 23% and 90%)have been reported in MS and this is mainly due to the methodological differences amongst the studies such as variability in patient sources, method of sampling and the definition of pain used. Chronic pain in MS, defined as pain lasting for greater than 3-6 months, can have a significant impact on their biopsychosocial health, including negative impact on activities of daily living, relationships and social participation. The long-term course of MS-related pain and its impact in an Australian cohort over a 7-year period has been investigated earlier. The aim of this longitudinal study was to describe the impact of chronic pain, pain-related disability and carer burden in persons with MS over a 10-year period. The aim of this longitudinal study was to describe the impact of chronic pain, pain-related disability and carer burden in persons with MS over a 10-year period. This was a prospective longitudinal study conducted at the Rehabilitation Department of Royal Melbourne Hospital (RMH), a tertiary referral hospital in Victoria and Australia. The source of participants was from the RMH MS database and contains detailed MS patient information including demographic data, diagnosis details (using McDonald's criteria), pain characteristics. Structured face-face interviews and validated measures were used, which include the visual analogue scale (VAS); chronic pain grade (CPG); the assessment of quality of life (AQoL) and the carer strain index (CSI). The mean age of the participants (n=70) was 55.3 years and majority (70%) were female. The mean age of the participants (n=70) was 55.3 years and majority (70%) were female. The findings show that over time (10 years), participants report having greater bilateral bodily pain and greater description of pain as 'worse

  5. Quantum key distribution with several intercept-resend attacks via a depolarizing channel

    Dehmani, Mustapha; Errahmani, Mohamed; Ez-Zahraouy, Hamid; Benyoussef, Abdelilah

    2012-01-01

    The disturbance effect of a depolarizing channel on the security of the quantum key distribution of the four-state BB84 protocol, with multiple sequential intercept-resend attacks of many eavesdroppers, has been studied. The quantum bit error rate and the mutual information are computed for an arbitrary number N of eavesdroppers. It is found that the quantum error rate decreases with increasing the depolarizing parameter p characterizing the noise of the channel. For p tr of p below which the information is secure and otherwise the information is not secure. The value of p tr decreases with increasing the number of attacks. In contrast, for p ⩾ 0.165, the information is not secure independently of the number of eavesdroppers. Phase diagrams corresponding to the secure—unsecure information are also established. (paper)

  6. Quantum Communication Attacks on Classical Cryptographic Protocols

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited...

  7. Quantum Communication Attacks on Classical Cryptographic Protocols

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...

  8. Personality factors and posttraumatic stress: associations in civilians one year after air attacks.

    Lecic-Tosevski, Dusica; Gavrilovic, Jelena; Knezevic, Goran; Priebe, Stefan

    2003-12-01

    There is an ongoing debate on which risk factors for developing posttraumatic stress symptoms are more important--personality traits reflecting vulnerability, previous stressful experiences or characteristics of the traumatic event. In this study, posttraumatic stress symptoms and their relationship with personality traits, previous stressful experiences and exposure to stressful events during air attacks in Yugoslavia were investigated. The Millon Clinical Multiaxial Inventory (MCMI; Millon, 1983), Impact of Events Scale (IES; Horowitz, Wilner, & Alvarez, 1979), Life Stressor Checklist Revised (LSCL-R; Wolfe & Kimerling, 1997), and List of Stressors were administered to a homogeneous group of medical students 1 year after the attacks. In multiple regression analyses, compulsive and passive-aggressive personality traits and a higher level of exposure to stressors during air attacks independently predicted the degree of intrusion symptoms. Avoidance symptoms were predicted by avoidant personality traits and a higher exposure to stressors both previously in life and during the attacks. In the next step, we tested in analyses of variance whether personality traits, previous stressful experiences, and stressful events during attacks as independent variables interact in predicting intrusion and avoidance symptoms. For this, students were clustered into three groups depending on their predominant personality traits. In addition to direct predictive effects, there were significant interaction effects in predicting both intrusion and avoidance. The findings suggest that each of the tested factors, i.e., personality traits, previous stressful experiences, and exposure to traumatic events may have an independent and direct influence on developing posttraumatic stress. However, the effect of these factors cannot just be added up. Rather, the factors interact in their impact on posttraumatic stress symptoms. Bigger samples and longitudinal designs will be required to

  9. It is not just a Minor Thing - A Phenomenological-Hermeneutic Study of Patients' Experiences when afflicted by a Minor Heart Attack and Participating in Cardiac Rehabilitation

    Simonÿ, Charlotte P; Dreyer, Pia; Pedersen, Birthe D

    2017-01-01

    , leading to vulnerability and helplessness; Understanding that life has become frail: patients feel shaken as they realise that the disease is chronic and life-threatening; and An altered life: patients must adjust to new limitations in their everyday lives. Conclusions: Patients experience an overall...... demanding transition when they are afflicted by a minor heat attack, whereby their lives are sweepingly changed. Supporting patients’ integrity, which becomes vulnerable during the various stages of transitions, is essential to ensure a healthy outcome. Being together with fellow patients during cardiac...

  10. Controlling sulfate attack in Mississippi Department of Transportation structures.

    2010-08-01

    At some construction sites in Mississippi, deterioration of concrete in contact with the surrounding soil could be related to the high sulfate content of the adjacent soils. Studies dating to 1966 have documented sulfate attack associated with specif...

  11. Resilience of LTE networks against smart jamming attacks

    Aziz, Farhan M.; Shamma, Jeff S.; Stuber, Gordon L.

    2014-01-01

    Commercial LTE networks are being studied for mission-critical applications, such as public safety and smart grid communications. In this paper, LTE networks are shown vulnerable to Denial-of-Service (DOS) and loss of service attacks from smart

  12. Controlling sulfate attack in Mississippi Department of Transportation structures

    2010-08-01

    At some construction sites in Mississippi, deterioration of concrete in contact with the surrounding soil could be related to the high sulfate content of the adjacent soils. Studies dating to 1966 have documented sulfate attack associated with sp...

  13. Transient Ischemic Attack

    ... About Research NINDS is the leading supporter of research on stroke and TIA in the U.S. and sponsors studies ranging from clinical trials to investigations of basic biological ... Organizations Publications Definition A ...

  14. A retrospective analysis of practice patterns in the management of acute asthma attack across Turkey.

    Türktaş, Haluk; Bavbek, Sevim; Misirligil, Zeynep; Gemicioğlu, Bilun; Mungan, Dilşad

    2010-12-01

    To evaluate patient characteristics and practice patterns in the management of acute asthma attack at tertiary care centers across Turkey. A total of 294 patients (mean age: 50.4 ± 15.1 years; females: 80.3%) diagnosed with persistent asthma were included in this retrospective study upon their admission to the hospital with an acute asthma attack. Patient demographics, asthma control level, asthma attack severity and the management of the attack were evaluated. There was no influence of gender on asthma control and attack severity. In 57.5% of the patients, asthma attack was moderate. Most patients (78.9%) were hospitalized with longer duration evident in the severe attack. Spirometry and chest X-Ray were the most frequent tests (85.4%), while steroids (72.0% parenteral; 29.0% oral) and short-acting beta-agonists (SABA) + anticholinergics (45.5%) were the main drugs of choice in the attack management. Attack severity and pre-attack asthma control level was significantly correlated (p attack asthma was uncontrolled in 42.6% of the patients with severe attack. Most of the patients were on combination of more than one (two in 38.7% and 3-4 in 31.2%) controller drugs before the attack. Providing country specific data on practice patterns in the management of acute asthma attack in a representative cohort in Turkey, prescription of steroids and SABA + anticholinergics as the main drugs of choice was in line with guidelines while the significant relation of pre-attack asthma control to risk/severity of asthma attack and rate/duration of hospitalization seem to be the leading results of the present study. Copyright © 2010 Elsevier Ltd. All rights reserved.

  15. Mitigating Higher Ed Cyber Attacks

    Rogers, Gary; Ashford, Tina

    2015-01-01

    In this presentation we will discuss the many and varied cyber attacks that have recently occurred in the higher ed community. We will discuss the perpetrators, the victims, the impact and how these institutions have evolved to meet this threat. Mitigation techniques and defense strategies will be covered as will a discussion of effective security…

  16. Inflammation and neuropathic attacks in hereditary brachial plexus neuropathy

    Klein, C; Dyck, P; Friedenberg, S; Burns, T; Windebank, A; Dyck, P

    2002-01-01

    Objective: To study the role of mechanical, infectious, and inflammatory factors inducing neuropathic attacks in hereditary brachial plexus neuropathy (HBPN), an autosomal dominant disorder characterised by attacks of pain and weakness, atrophy, and sensory alterations of the shoulder girdle and upper limb muscles. Methods: Four patients from separate kindreds with HBPN were evaluated. Upper extremity nerve biopsies were obtained during attacks from a person of each kindred. In situ hybridisation for common viruses in nerve tissue and genetic testing for a hereditary tendency to pressure palsies (HNPP; tomaculous neuropathy) were undertaken. Two patients treated with intravenous methyl prednisolone had serial clinical and electrophysiological examinations. One patient was followed prospectively through pregnancy and during the development of a stereotypic attack after elective caesarean delivery. Results: Upper extremity nerve biopsies in two patients showed prominent perivascular inflammatory infiltrates with vessel wall disruption. Nerve in situ hybridisation for viruses was negative. There were no tomaculous nerve changes. In two patients intravenous methyl prednisolone ameliorated symptoms (largely pain), but with tapering of steroid dose, signs and symptoms worsened. Elective caesarean delivery did not prevent a typical postpartum attack. Conclusions: Inflammation, probably immune, appears pathogenic for some if not all attacks of HBPN. Immune modulation may be useful in preventing or reducing the neuropathic attacks, although controlled trials are needed to establish efficacy, as correction of the mutant gene is still not possible. The genes involved in immune regulation may be candidates for causing HBPN disorders. PMID:12082044

  17. Data-plane Defenses against Routing Attacks on Tor

    Tan Henry

    2016-10-01

    Full Text Available Tor is susceptible to traffic correlation attacks in which an adversary who observes flows entering and leaving the anonymity network can apply statistical techniques to correlate flows and de-anonymize their endpoints. While an adversary may not be naturally positioned to conduct such attacks, a recent study shows that the Internet’s control-plane can be manipulated to increase an adversary’s view of the network, and consequently, improve its ability to perform traffic correlation. This paper explores, in-depth, the effects of control-plane attacks on the security of the Tor network. Using accurate models of the live Tor network, we quantify Tor’s susceptibility to these attacks by measuring the fraction of the Tor network that is vulnerable and the advantage to the adversary of performing the attacks. We further propose defense mechanisms that protect Tor users from manipulations at the control-plane. Perhaps surprisingly, we show that by leveraging existing trust anchors in Tor, defenses deployed only in the data-plane are sufficient to detect most control-plane attacks. Our defenses do not assume the active participation of Internet Service Providers, and require only very small changes to Tor. We show that our defenses result in a more than tenfold decrease in the effectiveness of certain control-plane attacks.

  18. Changes in vestibular evoked myogenic potentials after Meniere attacks.

    Kuo, Shih-Wei; Yang, Ting-Hua; Young, Yi-Ho

    2005-09-01

    The aim of this study was to apply videonystagmography (VNG) and vestibular evoked myogenic potential (VEMP) tests to patients with Meniere attacks, to explore the mechanics of where saccular disorders may affect the semicircular canals. From January 2001 to December 2003, 12 consecutive patients with unilateral definite Meniere's disease with vertiginous attacks underwent VNG for recording spontaneous nystagmus, as well as VEMP tests. At the very beginning of the Meniere attack, the spontaneous nystagmus beat toward the lesion side in 5 patients (42%) and toward the healthy side in 7 patients (58%). Twenty-four hours later, only 6 patients (50%) showed spontaneous nystagmus beating toward the healthy side. Nevertheless, spontaneous nystagmus subsided in all patients within 48 hours. The VEMP test was performed within 24 hours of a Meniere attack; the VEMPs were normal in 4 patients and abnormal in 8 patients (67%). After 48 hours, 4 patients with initially abnormal VEMPs had resolution and return to normal VEMPs, and the other 4 patients still had absent VEMPs. Most patients (67%) with Meniere attacks revealed abnormal VEMPs, indicating that the saccule participates in a Meniere attack. This is an important idea that stimulates consideration of the mechanism of Meniere attacks.

  19. A Monte Carlo Study on Multiple Output Stochastic Frontiers

    Henningsen, Géraldine; Henningsen, Arne; Jensen, Uwe

    , dividing all other output quantities by the selected output quantity, and using these ratios as regressors (OD). Another approach is the stochastic ray production frontier (SR) which transforms the output quantities into their Euclidean distance as the dependent variable and their polar coordinates......In the estimation of multiple output technologies in a primal approach, the main question is how to handle the multiple outputs. Often an output distance function is used, where the classical approach is to exploit its homogeneity property by selecting one output quantity as the dependent variable...... of both specifications for the case of a Translog output distance function with respect to different common statistical problems as well as problems arising as a consequence of zero values in the output quantities. Although, our results partly show clear reactions to statistical misspecifications...

  20. Pathological study of multiple myeloma in atomic bomb survivors

    Takaki, Y.; Kishikawa, M.; Bundo, K. (Nagasaki Univ. (Japan). School of Medicine)

    1980-11-01

    Pathological records of autopsies carried out in Nagasaki from '46 to '77 were reviewed. Of 9331 autopsies, 5787 were unexposed cases and were used as a control. 9.2% of the deaths were due to hematologic disorders. There was no evidence that the incidence of multiple myeloma among a-bomb survivors increased compared with the control. The incidences of leukemia, lymphoma and aplastic anemia were also listed.

  1. Interpreting Multiple Logistic Regression Coefficients in Prospective Observational Studies

    1982-11-01

    prompted close examination of the issue at a workshop on hypertriglyceridemia where some of the cautions and perspectives given in this paper were...characteristics. If this is not the interest, then to isolate and-understand the effect of a characteris- tic on CHD when it could be one of several interacting...also easily extended to the case when several independent variables are modeled in a multiple logistic equation. In this instance, if xlx 2,..., x are

  2. Robustness of coevolution in resolving prisoner's dilemma games on interdependent networks subject to attack

    Liu, Penghui; Liu, Jing

    2017-08-01

    Recently, coevolution between strategy and network structure has been established as a rule to resolve social dilemmas and reach optimal situations for cooperation. Many follow-up researches have focused on studying how coevolution helps networks reorganize to deter the defectors and many coevolution methods have been proposed. However, the robustness of the coevolution rules against attacks have not been studied much. Since attacks may directly influence the original evolutionary process of cooperation, the robustness should be an important index while evaluating the quality of a coevolution method. In this paper, we focus on investigating the robustness of an elementary coevolution method in resolving the prisoner's dilemma game upon the interdependent networks. Three different types of time-independent attacks, named as edge attacks, instigation attacks and node attacks have been employed to test its robustness. Through analyzing the simulation results obtained, we find this coevolution method is relatively robust against the edge attack and the node attack as it successfully maintains cooperation in the population over the entire attack range. However, when the instigation probability of the attacked individuals is large or the attack range of instigation attack is wide enough, coevolutionary rule finally fails in maintaining cooperation in the population.

  3. Wolf Attack Probability: A Theoretical Security Measure in Biometric Authentication Systems

    Une, Masashi; Otsuka, Akira; Imai, Hideki

    This paper will propose a wolf attack probability (WAP) as a new measure for evaluating security of biometric authentication systems. The wolf attack is an attempt to impersonate a victim by feeding “wolves” into the system to be attacked. The “wolf” means an input value which can be falsely accepted as a match with multiple templates. WAP is defined as a maximum success probability of the wolf attack with one wolf sample. In this paper, we give a rigorous definition of the new security measure which gives strength estimation of an individual biometric authentication system against impersonation attacks. We show that if one reestimates using our WAP measure, a typical fingerprint algorithm turns out to be much weaker than theoretically estimated by Ratha et al. Moreover, we apply the wolf attack to a finger-vein-pattern based algorithm. Surprisingly, we show that there exists an extremely strong wolf which falsely matches all templates for any threshold value.

  4. Study of the multiplication factor in the core of Saclay; Etude du facteur de multiplication dans la pile de Saclay

    Jacrot, B; Netter, F; Raievski, V [Commissariat a l' Energie Atomique, Saclay(France). Centre d' Etudes Nucleaires

    1953-07-01

    Several methods were studied for the measure of the multiplication factor strength in a core, by experiences in subcritical regime. These methods are applied to the determination of the effect on the reactivity of such different parameters of the battery that: heavy water level, position of the regulating plates. These results are used to establish an experimental relation between the time of the rise of the divergent core and the factor of effective multiplication. It is also given the application of these methods to the assessment of the power of the core. (author) [French] Des methodes ont ete etudie pour la mesure du facteur de multiplication effectif dans une pile, par des experiences en regime sous-critique. Ces methodes sont appliquees a la determination de l'effet sur la reactivite de differents parametres de la pile tels que: niveau d'eau lourde, position des plaques de reglage. Ces resultats sont utilises pour etablir une relation experimentale entre le temps de la montee de la pile divergente et le facteur de multiplication effectif. On donne egalement l'application de ces methodes a l'evaluation de la puissance de la pile. (auteur)

  5. Fuzzy Expert System for Heart Attack Diagnosis

    Hassan, Norlida; Arbaiy, Nureize; Shah, Noor Aziyan Ahmad; Afizah Afif@Afip, Zehan

    2017-08-01

    Heart attack is one of the serious illnesses and reported as the main killer disease. Early prevention is significant to reduce the risk of having the disease. The prevention efforts can be strengthen through awareness and education about risk factor and healthy lifestyle. Therefore the knowledge dissemination is needed to play role in order to distribute and educate public in health care management and disease prevention. Since the knowledge dissemination in medical is important, there is a need to develop a knowledge based system that can emulate human intelligence to assist decision making process. Thereby, this study utilized hybrid artificial intelligence (AI) techniques to develop a Fuzzy Expert System for Diagnosing Heart Attack Disease (HAD). This system integrates fuzzy logic with expert system, which helps the medical practitioner and people to predict the risk and as well as diagnosing heart attack based on given symptom. The development of HAD is expected not only providing expert knowledge but potentially become one of learning resources to help citizens to develop awareness about heart-healthy lifestyle.

  6. The radiographic diagnosis of early attacking congenital syphilis of bone

    Ji Yaping; Zhuge Moyi

    2005-01-01

    Objective: To explore the method of radiological diagnosis of early attacking congenital syphilis. Methods: Seven cases of early attacking congenital syphilis of bone were retrospectively analyzed, diagnosed serologically, and were taken X-rays of the long bones. Results: Bone radiographs abnormalities were identified in 6 of 7 cases. Five cases suffered periotities, six cases metaphysitis, and three cases combined with diaphysitis. Seven cases had swollen soft tissue. The vertebraes, craniums and epiphysitis were not found abnormal in 7 cases. Diffusion, multiple and symmetric metaphysitis, periosteitis and osteitis were the radiological characters of congenital syphilis of bone. Conclusion: Radiography can affirm the diagnose of early attacking congenital syphilis and definite the arrange and depth. Radiographs of the extremities should be routinely taken in suspected infants. (authors)

  7. An observational study of alemtuzumab following fingolimod for multiple sclerosis

    Willis, Mark; Pearson, Owen; Illes, Zsolt

    2017-01-01

    OBJECTIVE: To describe a series of patients with relapsing multiple sclerosis (MS) who experienced significant and unexpected disease activity within the first 12 months after switching from fingolimod to alemtuzumab. METHODS: Patients with relapsing MS treated sequentially with fingolimod...... then alemtuzumab who experienced significant subsequent disease activity were identified by personal communication with 6 different European neuroscience centers. RESULTS: Nine patients were identified. Median disease duration to alemtuzumab treatment was 94 (39-215) months and follow-up from time of first...... consideration should be given to mode of action of individual therapies and sequential treatment effects in MS when designing personalized treatment regimens....

  8. Distributed Secure Coordinated Control for Multiagent Systems Under Strategic Attacks.

    Feng, Zhi; Wen, Guanghui; Hu, Guoqiang

    2017-05-01

    This paper studies a distributed secure consensus tracking control problem for multiagent systems subject to strategic cyber attacks modeled by a random Markov process. A hybrid stochastic secure control framework is established for designing a distributed secure control law such that mean-square exponential consensus tracking is achieved. A connectivity restoration mechanism is considered and the properties on attack frequency and attack length rate are investigated, respectively. Based on the solutions of an algebraic Riccati equation and an algebraic Riccati inequality, a procedure to select the control gains is provided and stability analysis is studied by using Lyapunov's method.. The effect of strategic attacks on discrete-time systems is also investigated. Finally, numerical examples are provided to illustrate the effectiveness of theoretical analysis.

  9. Grid attacks avian flu

    2006-01-01

    During April, a collaboration of Asian and European laboratories analysed 300,000 possible drug components against the avian flu virus H5N1 using the EGEE Grid infrastructure. Schematic presentation of the avian flu virus.The distribution of the EGEE sites in the world on which the avian flu scan was performed. The goal was to find potential compounds that can inhibit the activities of an enzyme on the surface of the influenza virus, the so-called neuraminidase, subtype N1. Using the Grid to identify the most promising leads for biological tests could speed up the development process for drugs against the influenza virus. Co-ordinated by CERN and funded by the European Commission, the EGEE project (Enabling Grids for E-sciencE) aims to set up a worldwide grid infrastructure for science. The challenge of the in silico drug discovery application is to identify those molecules which can dock on the active sites of the virus in order to inhibit its action. To study the impact of small scale mutations on drug r...

  10. Study of multiple scattering effects in heavy ion RBS

    Fang, Z; O` Connor, D J [Newcastle Univ., NSW (Australia). Dept. of Physics

    1997-12-31

    Multiple scattering effect is normally neglected in conventional Rutherford Backscattering (RBS) analysis. The backscattered particle yield normally agrees well with the theory based on the single scattering model. However, when heavy incident ions are used such as in heavy ion Rutherford backscattering (HIRBS), or the incident ion energy is reduced, multiple scattering effect starts to play a role in the analysis. In this paper, the experimental data of 6MeV C ions backscattered from a Au target are presented. In measured time of flight spectrum a small step in front of the Au high energy edge is observed. The high energy edge of the step is about 3.4 ns ahead of the Au signal which corresponds to an energy {approx} 300 keV higher than the 135 degree single scattering energy. This value coincides with the double scattering energy of C ion undergoes two consecutive 67.5 degree scattering. Efforts made to investigate the origin of the high energy step observed lead to an Monte Carlo simulation aimed to reproduce the experimental spectrum on computer. As a large angle scattering event is a rare event, two consecutive large angle scattering is extremely hard to reproduce in a random simulation process. Thus, the simulation has not found a particle scattering into 130-140 deg with an energy higher than the single scattering energy. Obviously faster algorithms and a better physical model are necessary for a successful simulation. 16 refs., 3 figs.

  11. Study of multiple scattering effects in heavy ion RBS

    Fang, Z.; O`Connor, D.J. [Newcastle Univ., NSW (Australia). Dept. of Physics

    1996-12-31

    Multiple scattering effect is normally neglected in conventional Rutherford Backscattering (RBS) analysis. The backscattered particle yield normally agrees well with the theory based on the single scattering model. However, when heavy incident ions are used such as in heavy ion Rutherford backscattering (HIRBS), or the incident ion energy is reduced, multiple scattering effect starts to play a role in the analysis. In this paper, the experimental data of 6MeV C ions backscattered from a Au target are presented. In measured time of flight spectrum a small step in front of the Au high energy edge is observed. The high energy edge of the step is about 3.4 ns ahead of the Au signal which corresponds to an energy {approx} 300 keV higher than the 135 degree single scattering energy. This value coincides with the double scattering energy of C ion undergoes two consecutive 67.5 degree scattering. Efforts made to investigate the origin of the high energy step observed lead to an Monte Carlo simulation aimed to reproduce the experimental spectrum on computer. As a large angle scattering event is a rare event, two consecutive large angle scattering is extremely hard to reproduce in a random simulation process. Thus, the simulation has not found a particle scattering into 130-140 deg with an energy higher than the single scattering energy. Obviously faster algorithms and a better physical model are necessary for a successful simulation. 16 refs., 3 figs.

  12. Suicide bomb attack causing penetrating craniocerebral injury

    Hussain Manzar

    2013-02-01

    Full Text Available 【Abstract】Penetrating cerebral injuries caused by foreign bodies are rare in civilian neurosurgical trauma, al-though there are various reports of blast or gunshot inju-ries in warfare due to multiple foreign bodies like pellets and nails. In our case, a 30-year-old man presented to neurosur-gery clinic with signs and symptoms of right-sided weak-ness after suicide bomb attack. The skull X-ray showed a single intracranial nail. Small craniotomy was done and the nail was removed with caution to avoid injury to surround-ing normal brain tissue. At 6 months’ follow-up his right-sided power improved to against gravity. Key words: Head injury, penetrating; Bombs; Nails

  13. Peacetime Use of Computer Network Attack

    Busby, Daniel

    2000-01-01

    .... PDD-63 alerts the nation to prepare for impending cyber attacks. This paper examines the nature, scale, and likelihood of cyber attacks posited in PDD-63 and finds that the country does not face an imminent "electronic Pearl Harbor...

  14. Women's Heart Disease: Heart Attack Symptoms

    ... of this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter ... most common heart attack symptom in men and women is chest pain or discomfort. However, women also ...

  15. Stochastic Model of TCP SYN Attacks

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  16. Robust Detection of Stepping-Stone Attacks

    He, Ting; Tong, Lang

    2006-01-01

    The detection of encrypted stepping-stone attack is considered. Besides encryption and padding, the attacker is capable of inserting chaff packets and perturbing packet timing and transmission order...

  17. Using an ontology for network attack planning

    Van Heerden, R

    2016-09-01

    Full Text Available The modern complexity of network attacks and their counter-measures (cyber operations) requires detailed planning. This paper presents a Network Attack Planning ontology which is aimed at providing support for planning such network operations within...

  18. Trauma-Focused Early Intensive Cognitive Behavioral Intervention (TF-EICBI) in children and adolescent survivors of suicide bombing attacks (SBAs). A preliminary study.

    Leor, Agnes; Dolberg, Orna T; Eshel, Shira Pagorek; Yagil, Yaron; Schreiber, Shaul

    2013-01-01

    To describe and evaluate the impact of an early intervention (Trauma-Focused Early Intensive Cognitive Behavioral Intervention, TF-EICBI) in children and adolescents who were victims of suicide bombing attacks (SBAs) in Israel. Description of an intervention and preliminary experience in its use. An acute trauma center of a Child and Adolescent Psychiatric Unit in a Department of Psychiatry of a university-affiliated medical center. Ten children and adolescents who were victims of SBAs and underwent early interventions (EIG) were compared to 11 adolescent victims who received no intervention (NEIG). The EIG included all the children and adolescent survivors of various SBAs that had occurred during 1 year who presented to our hospital after the TF-EICBI was implemented (June 2001). The NEIG comprised all adolescents girls children and adolescents after SBAs.

  19. Enhancing cognition with video games: a multiple game training study.

    Adam C Oei

    Full Text Available Previous evidence points to a causal link between playing action video games and enhanced cognition and perception. However, benefits of playing other video games are under-investigated. We examined whether playing non-action games also improves cognition. Hence, we compared transfer effects of an action and other non-action types that required different cognitive demands.We instructed 5 groups of non-gamer participants to play one game each on a mobile device (iPhone/iPod Touch for one hour a day/five days a week over four weeks (20 hours. Games included action, spatial memory, match-3, hidden- object, and an agent-based life simulation. Participants performed four behavioral tasks before and after video game training to assess for transfer effects. Tasks included an attentional blink task, a spatial memory and visual search dual task, a visual filter memory task to assess for multiple object tracking and cognitive control, as well as a complex verbal span task. Action game playing eliminated attentional blink and improved cognitive control and multiple-object tracking. Match-3, spatial memory and hidden object games improved visual search performance while the latter two also improved spatial working memory. Complex verbal span improved after match-3 and action game training.Cognitive improvements were not limited to action game training alone and different games enhanced different aspects of cognition. We conclude that training specific cognitive abilities frequently in a video game improves performance in tasks that share common underlying demands. Overall, these results suggest that many video game-related cognitive improvements may not be due to training of general broad cognitive systems such as executive attentional control, but instead due to frequent utilization of specific cognitive processes during game play. Thus, many video game training related improvements to cognition may be attributed to near-transfer effects.

  20. Enhancing Cognition with Video Games: A Multiple Game Training Study

    Oei, Adam C.; Patterson, Michael D.

    2013-01-01

    Background Previous evidence points to a causal link between playing action video games and enhanced cognition and perception. However, benefits of playing other video games are under-investigated. We examined whether playing non-action games also improves cognition. Hence, we compared transfer effects of an action and other non-action types that required different cognitive demands. Methodology/Principal Findings We instructed 5 groups of non-gamer participants to play one game each on a mobile device (iPhone/iPod Touch) for one hour a day/five days a week over four weeks (20 hours). Games included action, spatial memory, match-3, hidden- object, and an agent-based life simulation. Participants performed four behavioral tasks before and after video game training to assess for transfer effects. Tasks included an attentional blink task, a spatial memory and visual search dual task, a visual filter memory task to assess for multiple object tracking and cognitive control, as well as a complex verbal span task. Action game playing eliminated attentional blink and improved cognitive control and multiple-object tracking. Match-3, spatial memory and hidden object games improved visual search performance while the latter two also improved spatial working memory. Complex verbal span improved after match-3 and action game training. Conclusion/Significance Cognitive improvements were not limited to action game training alone and different games enhanced different aspects of cognition. We conclude that training specific cognitive abilities frequently in a video game improves performance in tasks that share common underlying demands. Overall, these results suggest that many video game-related cognitive improvements may not be due to training of general broad cognitive systems such as executive attentional control, but instead due to frequent utilization of specific cognitive processes during game play. Thus, many video game training related improvements to cognition may be

  1. Enhancing cognition with video games: a multiple game training study.

    Oei, Adam C; Patterson, Michael D

    2013-01-01

    Previous evidence points to a causal link between playing action video games and enhanced cognition and perception. However, benefits of playing other video games are under-investigated. We examined whether playing non-action games also improves cognition. Hence, we compared transfer effects of an action and other non-action types that required different cognitive demands. We instructed 5 groups of non-gamer participants to play one game each on a mobile device (iPhone/iPod Touch) for one hour a day/five days a week over four weeks (20 hours). Games included action, spatial memory, match-3, hidden- object, and an agent-based life simulation. Participants performed four behavioral tasks before and after video game training to assess for transfer effects. Tasks included an attentional blink task, a spatial memory and visual search dual task, a visual filter memory task to assess for multiple object tracking and cognitive control, as well as a complex verbal span task. Action game playing eliminated attentional blink and improved cognitive control and multiple-object tracking. Match-3, spatial memory and hidden object games improved visual search performance while the latter two also improved spatial working memory. Complex verbal span improved after match-3 and action game training. Cognitive improvements were not limited to action game training alone and different games enhanced different aspects of cognition. We conclude that training specific cognitive abilities frequently in a video game improves performance in tasks that share common underlying demands. Overall, these results suggest that many video game-related cognitive improvements may not be due to training of general broad cognitive systems such as executive attentional control, but instead due to frequent utilization of specific cognitive processes during game play. Thus, many video game training related improvements to cognition may be attributed to near-transfer effects.

  2. Chess therapy: A new approach to curing panic attack.

    Barzegar, Kazem; Barzegar, Somayeh

    2017-12-01

    To study the effect of playing cell phone chess game on treating panic attack. The chess game on an android cell phone was played by the researcher who was affected by panic attack as a post-traumatic disorder immediately after or before feeling of the start of symptoms. The right level of difficulty, i.e., levels 2-4, was selected for optimal results. Playing chess game on the android cell phone prevented the manifestation of panic attack and led to the cure of this traumatic condition. Chess therapy with the right level of difficulty can be recommended as a very effective non-pharmaceutical method for the successful treatment of panic attacks. Copyright © 2017 Elsevier B.V. All rights reserved.

  3. Attack Graph Construction for Security Events Analysis

    Andrey Alexeevich Chechulin

    2014-09-01

    Full Text Available The paper is devoted to investigation of the attack graphs construction and analysis task for a network security evaluation and real-time security event processing. Main object of this research is the attack modeling process. The paper contains the description of attack graphs building, modifying and analysis technique as well as overview of implemented prototype for network security analysis based on attack graph approach.

  4. Attacks and countermeasures on AES and ECC

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  5. Automated classification of computer network attacks

    Van Heerden, R

    2013-11-01

    Full Text Available according to the relevant types of attack scenarios depicted in the ontology. The two network attack instances are the Distributed Denial of Service attack on SpamHaus in 2013 and the theft of 42 million Rand ($6.7 million) from South African Postbank...

  6. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  7. Negative affect and smoking motives sequentially mediate the effect of panic attacks on tobacco-relevant processes.

    Farris, Samantha G; Zvolensky, Michael J; Blalock, Janice A; Schmidt, Norman B

    2014-05-01

    Empirical work has documented a robust and consistent relation between panic attacks and smoking behavior. Theoretical models posit smokers with panic attacks may rely on smoking to help them manage chronically elevated negative affect due to uncomfortable bodily states, which may explain higher levels of nicotine dependence and quit problems. The current study examined the effects of panic attack history on nicotine dependence, perceived barriers for quitting, smoking inflexibility when emotionally distressed, and expired carbon monoxide among 461 treatment-seeking smokers. A multiple mediator path model was evaluated to examine the indirect effects of negative affect and negative affect reduction motives as mediators of the panic attack-smoking relations. Panic attack history was indirectly related to greater levels of nicotine dependence (b = 0.039, CI95% = 0.008, 0.097), perceived barriers to smoking cessation (b = 0.195, CI95% = 0.043, 0.479), smoking inflexibility/avoidance when emotionally distressed (b = 0.188, CI95% = 0.041, 0.445), and higher levels of expired carbon monoxide (b = 0.071, CI95% = 0.010, 0.230) through the sequential effects of negative affect and negative affect smoking motives. The present results provide empirical support for the sequential mediating role of negative affect and smoking motives for negative affect reduction in the relation between panic attacks and a variety of smoking variables in treatment-seeking smokers. These mediating variables are likely important processes to address in smoking cessation treatment, especially in panic-vulnerable smokers.

  8. Perspective and Experiences of Iranian People With Multiple Sclerosis Regarding Leisure: A Qualitative Study

    Ghanbari; Shayanpour

    2015-01-01

    Background Multiple Sclerosis, as a progressive disease, influences most of occupational performance areas. Objectives This study was conducted to describe the perspectives and experiences regarding leisure of people with multiple sclerosis in Ahvaz city, Iran. Patients and Methods The study was a descriptive phenomenological study using purposeful sampling. Data saturation was ach...

  9. Attacker-defender game from a network science perspective

    Li, Ya-Peng; Tan, Suo-Yi; Deng, Ye; Wu, Jun

    2018-05-01

    Dealing with the protection of critical infrastructures, many game-theoretic methods have been developed to study the strategic interactions between defenders and attackers. However, most game models ignore the interrelationship between different components within a certain system. In this paper, we propose a simultaneous-move attacker-defender game model, which is a two-player zero-sum static game with complete information. The strategies and payoffs of this game are defined on the basis of the topology structure of the infrastructure system, which is represented by a complex network. Due to the complexity of strategies, the attack and defense strategies are confined by two typical strategies, namely, targeted strategy and random strategy. The simulation results indicate that in a scale-free network, the attacker virtually always attacks randomly in the Nash equilibrium. With a small cost-sensitive parameter, representing the degree to which costs increase with the importance of a target, the defender protects the hub targets with large degrees preferentially. When the cost-sensitive parameter exceeds a threshold, the defender switches to protecting nodes randomly. Our work provides a new theoretical framework to analyze the confrontations between the attacker and the defender on critical infrastructures and deserves further study.

  10. Motion-compensating gradients in the study of multiple sclerosis

    Runge, V.M.; Wood, M.L.; Kaufman, D.L.

    1987-01-01

    A low bandwidth motion compensating technique (no. 1) was compared with a conventional spin-echo technique (no. 2) in 20 patients with multiple sclerosis using a 1.0-T MR imaging system. In technique 1, refocusing gradients were employed to compensate for motion of constant velocity along the frequency-encoding direction. The sampling time was also increased to provide a greater S/N. Use of technique 1 was resulted in detection of 42% +- 23% more lesions (n = 8). The contrast-to-noise ratio for gray versus white matter improved by 87% +- 54% and that for lesion versus white matter by 66% +- 22%. The S/N for white matter improved by 56% +- 25%. An increase in chemical shift artifact was noted but not felt to be detrimental to lesion visualization. In the majority of cases, normal brain stem structures were more distinctly visualized. In two cases, pontine lesions were more clearly demarcated due to reduced pulsation artifacts. The combined use of refocusing gradients and low bandwidth techniques provides reduction of motion artifacts (from CSF and vessel pulsation) and improved S/N, leading to improved lesion detection

  11. Psychiatrists' attitudes to multiple personality disorder: a questionnaire study.

    Mai, F M

    1995-04-01

    To assess the attitudes of a random sample of Canadian psychiatrists to Multiple Personality Disorder (MPD) and assess the relative prevalence of the condition in three comparable cities in Ontario. A questionnaire was sent to all psychiatrists who were members of the Canadian Psychiatric Association and who were resident in Ottawa, Kingston and London. Questions were asked on the respondent's personal clinical experience of MPD and his/her attitude to this condition. Some personal and demographic questions were also included. 180 out of 294 questionnaires (61.2%) were returned. The existence of MPD was doubted by 27.8% of psychiatrists who responded to the questionnaire, with a significantly higher proportion in London than in Kingston or in Ottawa. A substantial majority in all three cities agreed that media publicity and the psychiatrist's own belief system affected the prevalence of MPD. These results confirm that there is a split in the profession regarding belief in the existence of MPD as a diagnosis.

  12. Development of Cyber-attack Risk Assessment Model for Nuclear Power Plants

    Park, Jong Woo; Lee, Seung Jun

    2017-01-01

    In this work, a risk evaluation method to identify significant cyber-attack scenarios and important components which should be defensed was proposed based on the probabilistic safety assessment (PSA) method which is widely used for evaluating risk of NPPs. NPPs adopting digital systems have been facing the risk of cyber-attacks. To develop efficient and reasonable defense strategy, it is required to identify significant cyber-attack scenarios and important components because there are huge number of critical digital assets in an NPP. By evaluating the risk of cyber-attack, the risk-informed defense strategies against cyber-attack could be suggested. In this work, the method to identify important cyber-attack scenarios and to evaluate the quantitative risk caused by cyber-attacks was proposed. For a future study, more feasible scenarios will be analyzed and additional modifications will be made in the model if necessary.

  13. Attack Detection/Isolation via a Secure Multisensor Fusion Framework for Cyberphysical Systems

    Arash Mohammadi

    2018-01-01

    Full Text Available Motivated by rapid growth of cyberphysical systems (CPSs and the necessity to provide secure state estimates against potential data injection attacks in their application domains, the paper proposes a secure and innovative attack detection and isolation fusion framework. The proposed multisensor fusion framework provides secure state estimates by using ideas from interactive multiple models (IMM combined with a novel fuzzy-based attack detection/isolation mechanism. The IMM filter is used to adjust the system’s uncertainty adaptively via model probabilities by using a hybrid state model consisting of two behaviour modes, one corresponding to the ideal scenario and one associated with the attack behaviour mode. The state chi-square test is then incorporated through the proposed fuzzy-based fusion framework to detect and isolate potential data injection attacks. In other words, the validation probability of each sensor is calculated based on the value of the chi-square test. Finally, by incorporation of the validation probability of each sensor, the weights of its associated subsystem are computed. To be concrete, an integrated navigation system is simulated with three types of attacks ranging from a constant bias attack to a non-Gaussian stochastic attack to evaluate the proposed attack detection and isolation fusion framework.

  14. An association study of 13 SNPs from seven candidate genes with pediatric asthma and a preliminary study for genetic testing by multiple variants in Taiwanese population.

    Wang, Jiu-Yao; Liou, Ya-Huei; Wu, Ying-Jye; Hsiao, Ya-Hsin; Wu, Lawrence Shih-Hsin

    2009-03-01

    Asthma is one of the most common chronic diseases in children. It is caused by complex interactions between various genetic factors and exposures to environmental allergens and irritants. Because of the heterogeneity of the disease and the genetic and cultural differences among different populations, a proper association study and genetic testing for asthma and susceptibility genes is difficult to perform. We assessed 13 single-nucleotide polymorphisms (SNPs) in seven well-known asthma susceptibility genes and looked for association with pediatric asthma using 449 asthmatic subjects and 512 non-asthma subjects in Taiwanese population. CD14-159 C/T and MS4A2 Glu237Gly were identified to have difference in genotype/allele frequencies between the control group and asthma patients. Moreover, the genotype synergistic analysis showed that the co-contribution of two functional SNPs was riskier or more protective from asthma attack. Our study provided a genotype synergistic method for studying gene-gene interaction on polymorphism basis and genetic testing using multiple polymorphisms.

  15. Association between intracranial plasmacytoma and multiple myeloma: clinicopathological outcome study.

    Schwartz, T H; Rhiew, R; Isaacson, S R; Orazi, A; Bruce, J N

    2001-11-01

    Intracranial plasmacytomas are rare lesions that can arise from the calvarium, dura, or cranial base and exhibit a benign course unless associated with myeloma. Attention has recently been focused on the role of the cell adhesion molecules CD56 and CD31 in the pathogenesis of myeloma. No such information is available for intracranial plasmacytomas and myeloma-associated lesions. We investigated the relationship between CD56 and CD31 expression, intracranial location, and progression to myeloma for a series of nine intracranial plasmacytomas (three dural, one calvarial, and five cranial base lesions). These parameters were also correlated with proliferation indices, as assessed by MIB-1 immunostaining of the histological sections. A single pathologist (AO) performed immunohistochemical analyses and reviewed all slides. Intracranial plasmacytomas presented more commonly in female patients (89%). The three dural lesions were CD56- and CD31-negative and exhibited MIB-1 staining of less than 10%; no patient developed myeloma or recurrence. Of the five cranial base lesions, three were CD56-positive, none was CD31-positive, and two exhibited MIB-1 labeling of more than 45%, with plasmablastic morphological features. Compared with other intracranial plasmacytomas, five of five patients with cranial base lesions developed bone marrow biopsy-proven myeloma (P myeloma soon after diagnosis. Both of the two highly proliferative plasmablastic lesions recurred, one after gross total resection without radiotherapy and the other after a biopsy and 2000-cGy radiotherapy. Among intracranial plasmacytomas, cranial base location was the strongest predictor of the development of multiple myeloma. Expression of the cell adhesion molecules CD31 and CD56 was not predictive of outcome. Extramedullary dural-based lesions were CD56-negative and were not associated with myeloma. A high proliferation index and plasmablastic morphological features were predictive of a short time to recurrence

  16. Understanding public confidence in government to prevent terrorist attacks.

    Baldwin, T. E.; Ramaprasad, A,; Samsa, M. E.; Decision and Information Sciences; Univ. of Illinois at Chicago

    2008-04-02

    A primary goal of terrorism is to instill a sense of fear and vulnerability in a population and to erode its confidence in government and law enforcement agencies to protect citizens against future attacks. In recognition of its importance, the Department of Homeland Security includes public confidence as one of the principal metrics used to assess the consequences of terrorist attacks. Hence, a detailed understanding of the variations in public confidence among individuals, terrorist event types, and as a function of time is critical to developing this metric. In this exploratory study, a questionnaire was designed, tested, and administered to small groups of individuals to measure public confidence in the ability of federal, state, and local governments and their public safety agencies to prevent acts of terrorism. Data was collected from three groups before and after they watched mock television news broadcasts portraying a smallpox attack, a series of suicide bomber attacks, a refinery explosion attack, and cyber intrusions on financial institutions, resulting in identity theft. Our findings are: (a) although the aggregate confidence level is low, there are optimists and pessimists; (b) the subjects are discriminating in interpreting the nature of a terrorist attack, the time horizon, and its impact; (c) confidence recovery after a terrorist event has an incubation period; and (d) the patterns of recovery of confidence of the optimists and the pessimists are different. These findings can affect the strategy and policies to manage public confidence after a terrorist event.

  17. Human behaviour can trigger large carnivore attacks in developed countries.

    Penteriani, Vincenzo; Delgado, María del Mar; Pinchera, Francesco; Naves, Javier; Fernández-Gil, Alberto; Kojola, Ilpo; Härkönen, Sauli; Norberg, Harri; Frank, Jens; Fedriani, José María; Sahlén, Veronica; Støen, Ole-Gunnar; Swenson, Jon E; Wabakken, Petter; Pellegrini, Mario; Herrero, Stephen; López-Bao, José Vicente

    2016-02-03

    The media and scientific literature are increasingly reporting an escalation of large carnivore attacks on humans in North America and Europe. Although rare compared to human fatalities by other wildlife, the media often overplay large carnivore attacks on humans, causing increased fear and negative attitudes towards coexisting with and conserving these species. Although large carnivore populations are generally increasing in developed countries, increased numbers are not solely responsible for the observed rise in the number of attacks by large carnivores. Here we show that an increasing number of people are involved in outdoor activities and, when doing so, some people engage in risk-enhancing behaviour that can increase the probability of a risky encounter and a potential attack. About half of the well-documented reported attacks have involved risk-enhancing human behaviours, the most common of which is leaving children unattended. Our study provides unique insight into the causes, and as a result the prevention, of large carnivore attacks on people. Prevention and information that can encourage appropriate human behaviour when sharing the landscape with large carnivores are of paramount importance to reduce both potentially fatal human-carnivore encounters and their consequences to large carnivores.

  18. Vulnerability of water supply systems to cyber-physical attacks

    Galelli, Stefano; Taormina, Riccardo; Tippenhauer, Nils; Salomons, Elad; Ostfeld, Avi

    2016-04-01

    The adoption of smart meters, distributed sensor networks and industrial control systems has largely improved the level of service provided by modern water supply systems. Yet, the progressive computerization exposes these critical infrastructures to cyber-physical attacks, which are generally aimed at stealing critical information (cyber-espionage) or causing service disruption (denial-of-service). Recent statistics show that water and power utilities are undergoing frequent attacks - such as the December power outage in Ukraine - , attracting the interest of operators and security agencies. Taking the security of Water Distribution Networks (WDNs) as domain of study, our work seeks to characterize the vulnerability of WDNs to cyber-physical attacks, so as to conceive adequate defense mechanisms. We extend the functionality of EPANET, which models hydraulic and water quality processes in pressurized pipe networks, to include a cyber layer vulnerable to repeated attacks. Simulation results on a medium-scale network show that several hydraulic actuators (valves and pumps, for example) can be easily attacked, causing both service disruption - i.e., water spillage and loss of pressure - and structural damages - e.g., pipes burst. Our work highlights the need for adequate countermeasures, such as attacks detection and reactive control systems.

  19. Whispering through DDoS attack

    Miralem Mehic; Jiri Slachta; Miroslav Voznak

    2016-01-01

    Denial of service (DoS) attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS) attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes o...

  20. Script-viruses Attacks on UNIX OS

    D. M. Mikhaylov

    2010-06-01

    Full Text Available In this article attacks on UNIX OS are considered. Currently antivirus developers are concentrated on protecting systems from viruses that are most common and attack popular operating systems. If the system or its components are not often attacked then the antivirus products are not protecting these components as it is not profitable. The same situation is with script-viruses for UNIX OS as most experts consider that it is impossible for such viruses to get enough rights to attack. Nevertheless the main conclusion of this article is the fact that such viruses can be very powerful and can attack systems and get enough rights.

  1. Incidence and impact of dog attacks on guide dogs in the UK.

    Brooks, A; Moxon, R; England, G C W

    2010-06-19

    In a retrospective survey, researchers identified 100 incidents of attacks on guide dogs by other dogs. These were reviewed in order to determine the number, severity and impact on the handler and dog, and the characteristics of the aggressors and victims. During the study period there were more than three attacks reported each month, with 61 per cent of the attacks being upon dogs that were in harness and working with an owner or trainer. The majority of the dogs that were attacked were male (62 per cent), and the breeds that were over-represented (relative to their prevalence in the general guide dog population) were the labrador and the golden retriever x flat-coated retriever crossbreed. Most of the attacks occurred in public places between 09.00 and 15.00 and the majority (61 per cent) of the attacking dogs were off the lead at the time of the attack. Thirty-eight per cent of the attacking dogs were of bull breeds, which were over-represented among attackers compared with the proportion of this breed type in the general dog population. Veterinary attention was sought after 41 per cent of the attacks, and in 19 per cent of instances there was injury to the handler or to a member of the public. The attacks were reported to have affected the working performance and behaviour of the victim dog in 45 per cent of the instances, and two dogs had to be subsequently withdrawn from working as guide dogs.

  2. Protecting Cryptographic Memory against Tampering Attack

    Mukherjee, Pratyay

    In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks. In prac......In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks....... In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...

  3. A Design Study to Develop Young Children's Understanding of Multiplication and Division

    Bicknell, Brenda; Young-Loveridge, Jenny; Nguyen, Nhung

    2016-01-01

    This design study investigated the use of multiplication and division problems to help 5-year-old children develop an early understanding of multiplication and division. One teacher and her class of 15 5-year-old children were involved in a collaborative partnership with the researchers. The design study was conducted over two 4-week periods in…

  4. Multiple case study in seven European countries regarding culture-sensitive classroom quality assessment

    Slot, P.L.|info:eu-repo/dai/nl/328192694; Cadima, Joana; Salminen, Jenni; Pastori, Giulia; Lerkkanen, Marja-Kristiina

    This report presents the findings of a multiple case study, conducted in seven European countries to examine common and culturally differing aspects of curriculum, pedagogy, and quality of Early Childhood Education and Care (ECEC) provisions in Europe. This multiple case study involved intensive

  5. Competitive Reactions to Advertising and Promotion Attacks

    Jan-Benedict E. M. Steenkamp; Vincent R. Nijs; Dominique M. Hanssens; Marnik G. Dekimpe

    2005-01-01

    How do competitors react to each other's price-promotion and advertising attacks? What are the reasons for the observed reaction behavior? We answer these questions by performing a large-scale empirical study on the short-run and long-run reactions to promotion and advertising shocks in over 400 consumer product categories over a four-year time span. Our results clearly show that the most predominant form of competitive response is passive in nature. When a reaction does occur, it is usually ...

  6. Attack Tree Generation by Policy Invalidation

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based......Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identified...... on invalidating policies in the system model by identifying possible sequences of actions that lead to an attack. The generated attacks are precise enough to illustrate the threat, and they are general enough to hide the details of individual steps....

  7. Whispering through DDoS attack

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  8. Network Protection Against DDoS Attacks

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  9. Cache timing attacks on recent microarchitectures

    Andreou, Alexandres; Bogdanov, Andrey; Tischhauser, Elmar Wolfgang

    2017-01-01

    Cache timing attacks have been known for a long time, however since the rise of cloud computing and shared hardware resources, such attacks found new potentially devastating applications. One prominent example is S$A (presented by Irazoqui et al at S&P 2015) which is a cache timing attack against...... AES or similar algorithms in virtualized environments. This paper applies variants of this cache timing attack to Intel's latest generation of microprocessors. It enables a spy-process to recover cryptographic keys, interacting with the victim processes only over TCP. The threat model is a logically...... separated but CPU co-located attacker with root privileges. We report successful and practically verified applications of this attack against a wide range of microarchitectures, from a two-core Nehalem processor (i5-650) to two-core Haswell (i7-4600M) and four-core Skylake processors (i7-6700). The attack...

  10. Somatotype, Level of Competition, and Performance in Attack in Elite Male Volleyball

    Giannopoulos, Nikiforos; Vagenas, George; Noutsos, Konstantinos; Barzouka, Karolina; Bergeles, Nikolaos

    2017-01-01

    Abstract This study investigated the relationship between somatotype, level of competition, and performance in attack in elite level male volleyball players. The objective was to test for the potential covariation of competition level (Division A1 vs. A2) and playing position (hitters vs. centers vs. opposites) considering performance in attack. Anthropometric, body composition and somatotype variables were measured according to the Heath-Carter method. The attack actions of 144 players from 48 volleyball matches were analyzed and their performance was rated using a 5-point numerical scale. Results showed that players of Division A1 were taller, heavier, more muscular, and less endomorphic compared to those of Division A2. MANOVA and follow-up discriminant function analysis revealed somatotype differences among playing positions with centers and opposites being endomorph-ectomorph and hitters being central. Centers performed constantly better than hitters and opposites regardless of the division and somatotype. Multiple linear regression analysis showed that variables defining ectomorph and endomorph players, centers, and players of Division A1 significantly determined the relative performance superiority and were able to explain the variation in performance by almost 25%. These results could be taken into account by coaches when assigning players to particular playing positions or when designing individualized position-specific training programs. PMID:28828084

  11. Somatotype, Level of Competition, and Performance in Attack in Elite Male Volleyball

    Giannopoulos Nikiforos

    2017-08-01

    Full Text Available This study investigated the relationship between somatotype, level of competition, and performance in attack in elite level male volleyball players. The objective was to test for the potential covariation of competition level (Division A1 vs. A2 and playing position (hitters vs. centers vs. opposites considering performance in attack. Anthropometric, body composition and somatotype variables were measured according to the Heath-Carter method. The attack actions of 144 players from 48 volleyball matches were analyzed and their performance was rated using a 5-point numerical scale. Results showed that players of Division A1 were taller, heavier, more muscular, and less endomorphic compared to those of Division A2. MANOVA and follow-up discriminant function analysis revealed somatotype differences among playing positions with centers and opposites being endomorph-ectomorph and hitters being central. Centers performed constantly better than hitters and opposites regardless of the division and somatotype. Multiple linear regression analysis showed that variables defining ectomorph and endomorph players, centers, and players of Division A1 significantly determined the relative performance superiority and were able to explain the variation in performance by almost 25%. These results could be taken into account by coaches when assigning players to particular playing positions or when designing individualized position-specific training programs.

  12. Defending networks against denial-of-service attacks

    Gelenbe, Erol; Gellman, Michael; Loukas, George

    2004-11-01

    Denial of service attacks, viruses and worms are common tools for malicious adversarial behavior in networks. Experience shows that over the last few years several of these techniques have probably been used by governments to impair the Internet communications of various entities, and we can expect that these and other information warfare tools will be used increasingly as part of hostile behavior either independently, or in conjunction with other forms of attack in conventional or asymmetric warfare, as well as in other forms of malicious behavior. In this paper we concentrate on Distributed Denial of Service Attacks (DDoS) where one or more attackers generate flooding traffic and direct it from multiple sources towards a set of selected nodes or IP addresses in the Internet. We first briefly survey the literature on the subject, and discuss some examples of DDoS incidents. We then present a technique that can be used for DDoS protection based on creating islands of protection around a critical information infrastructure. This technique, that we call the CPN-DoS-DT (Cognitive Packet Networks DoS Defence Technique), creates a self-monitoring sub-network surrounding each critical infrastructure node. CPN-DoS-DT is triggered by a DDoS detection scheme, and generates control traffic from the objects of the DDoS attack to the islands of protection where DDOS packet flows are destroyed before they reach the critical infrastructure. We use mathematical modelling, simulation and experiments on our test-bed to show the positive and negative outcomes that may result from both the attack, and the CPN-DoS-DT protection mechanism, due to imperfect detection and false alarms.

  13. DFT study on the attacking mechanisms of H and OH radicals to G-C and A-T base pairs in water

    Okutsu, N.; Shimamura, K.; Shimizu, E.; Kurita, N., E-mail: kurita@cs.tut.ac.jp [Department of Computer Science and Engineering, Toyohashi University of Technology, Toyohashi, Aichi, 441-8580 (Japan); Shulga, S. [Institute for Food Biotechnology and Genomics, National Academy of Sciences of Ukraine, Kyiv (Ukraine); Danilov, V. I. [Institute of Molecular Biology and Genetics, National Academy of Sciences of Ukraine, Kyiv (Ukraine)

    2016-02-01

    To elucidate the effect of radicals on DNA base pairs, we investigated the attacking mechanism of OH and H radicals to the G-C and A-T base pairs, using the density functional theory (DFT) calculations in water approximated by the continuum solvation model. The DFT calculations revealed that the OH radical abstracts the hydrogen atom of a NH{sub 2} group of G or A base and induces a tautomeric reaction for an A-T base pair more significantly than for a G-C base pair. On the other hand, the H radical prefers to bind to the Cytosine NH{sub 2} group of G-C base pair and induce a tautomeric reaction from G-C to G*-C*, whose activation free energy is considerably small (−0.1 kcal/mol) in comparison with that (42.9 kcal/mol) for the reaction of an A-T base pair. Accordingly, our DFT calculations elucidated that OH and H radicals have a significant effect on A-T and G-C base pairs, respectively. This finding will be useful for predicting the effect of radiation on the genetic information recorded in the base sequences of DNA duplexes.

  14. On a simulation study of cyber attacks on vehicle-to-infrastructure communication (V2I) in Intelligent Transportation System (ITS)

    Ekedebe, Nnanna; Yu, Wei; Song, Houbing; Lu, Chao

    2015-05-01

    An intelligent transportation system (ITS) is one typical cyber-physical system (CPS) that aims to provide efficient, effective, reliable, and safe driving experiences with minimal congestion and effective traffic flow management. In order to achieve these goals, various ITS technologies need to work synergistically. Nonetheless, ITS's reliance on wireless connectivity makes it vulnerable to cyber threats. Thus, it is critical to understand the impact of cyber threats on ITS. In this paper, using real-world transportation dataset, we evaluated the consequences of cyber threats - attacks against service availability by jamming the communication channel of ITS. In this way, we can have a better understanding of the importance of ensuring adequate security respecting safety and life-critical ITS applications before full and expensive real-world deployments. Our experimental data shows that cyber threats against service availability could adversely affect traffic efficiency and safety performances evidenced by exacerbated travel time, fuel consumed, and other evaluated performance metrics as the communication network is compromised. Finally, we discuss a framework to make ITS secure and more resilient against cyber threats.

  15. DFT study on the attacking mechanisms of H and OH radicals to G-C and A-T base pairs in water

    Okutsu, N.; Shimamura, K.; Shimizu, E.; Kurita, N.; Shulga, S.; Danilov, V. I.

    2016-01-01

    To elucidate the effect of radicals on DNA base pairs, we investigated the attacking mechanism of OH and H radicals to the G-C and A-T base pairs, using the density functional theory (DFT) calculations in water approximated by the continuum solvation model. The DFT calculations revealed that the OH radical abstracts the hydrogen atom of a NH 2 group of G or A base and induces a tautomeric reaction for an A-T base pair more significantly than for a G-C base pair. On the other hand, the H radical prefers to bind to the Cytosine NH 2 group of G-C base pair and induce a tautomeric reaction from G-C to G*-C*, whose activation free energy is considerably small (−0.1 kcal/mol) in comparison with that (42.9 kcal/mol) for the reaction of an A-T base pair. Accordingly, our DFT calculations elucidated that OH and H radicals have a significant effect on A-T and G-C base pairs, respectively. This finding will be useful for predicting the effect of radiation on the genetic information recorded in the base sequences of DNA duplexes

  16. Multiple Traumatic Events and Psychological Distress : The South Africa Stress and Health Study

    Williams, Stacey L.; Williams, David R.; Stein, Dan J.; Seedat, Soraya; Jackson, Pamela B.; Moomal, Hashim

    2007-01-01

    Using nationally representative data from South Africa, we examine lifetime prevalence of traumas and multiple traumas (number of events). Employing multiple regression analysis, we study sociodemographic risk of trauma, and the association between trauma and distress. Results indicate most South Africans experience at least one traumatic event during their lives, with the majority reporting multiple. Consistent variation in risk is evident for gender and marital status but not other sociodem...

  17. SQL Injection Attacks and Defense

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  18. Attack-Resistant Trust Metrics

    Levien, Raph

    The Internet is an amazingly powerful tool for connecting people together, unmatched in human history. Yet, with that power comes great potential for spam and abuse. Trust metrics are an attempt to compute the set of which people are trustworthy and which are likely attackers. This chapter presents two specific trust metrics developed and deployed on the Advogato Website, which is a community blog for free software developers. This real-world experience demonstrates that the trust metrics fulfilled their goals, but that for good results, it is important to match the assumptions of the abstract trust metric computation to the real-world implementation.

  19. Multiple comparisons in drug efficacy studies: scientific or marketing principles?

    Leo, Jonathan

    2004-01-01

    When researchers design an experiment to compare a given medication to another medication, a behavioral therapy, or a placebo, the experiment often involves numerous comparisons. For instance, there may be several different evaluation methods, raters, and time points. Although scientifically justified, such comparisons can be abused in the interests of drug marketing. This article provides two recent examples of such questionable practices. The first involves the case of the arthritis drug celecoxib (Celebrex), where the study lasted 12 months but the authors only presented 6 months of data. The second case involves the NIMH Multimodal Treatment Study (MTA) study evaluating the efficacy of stimulant medication for attention-deficit hyperactivity disorder where ratings made by several groups are reported in contradictory fashion. The MTA authors have not clarified the confusion, at least in print, suggesting that the actual findings of the study may have played little role in the authors' reported conclusions.

  20. Hereditary angioedema attacks resolve faster and are shorter after early icatibant treatment.

    Marcus Maurer

    Full Text Available BACKGROUND: Attacks of hereditary angioedema (HAE are unpredictable and, if affecting the upper airway, can be lethal. Icatibant is used for physician- or patient self-administered symptomatic treatment of HAE attacks in adults. Its mode of action includes disruption of the bradykinin pathway via blockade of the bradykinin B(2 receptor. Early treatment is believed to shorten attack duration and prevent severe outcomes; however, evidence to support these benefits is lacking. OBJECTIVE: To examine the impact of timing of icatibant administration on the duration and resolution of HAE type I and II attacks. METHODS: The Icatibant Outcome Survey is an international, prospective, observational study for patients treated with icatibant. Data on timings and outcomes of icatibant treatment for HAE attacks were collected between July 2009-February 2012. A mixed-model of repeated measures was performed for 426 attacks in 136 HAE type I and II patients. RESULTS: Attack duration was significantly shorter in patients treated <1 hour of attack onset compared with those treated ≥ 1 hour (6.1 hours versus 16.8 hours [p<0.001]. Similar significant effects were observed for <2 hours versus ≥ 2 hours (7.2 hours versus 20.2 hours [p<0.001] and <5 hours versus ≥ 5 hours (8.0 hours versus 23.5 hours [p<0.001]. Treatment within 1 hour of attack onset also significantly reduced time to attack resolution (5.8 hours versus 8.8 hours [p<0.05]. Self-administrators were more likely to treat early and experience shorter attacks than those treated by a healthcare professional. CONCLUSION: Early blockade of the bradykinin B(2 receptor with icatibant, particularly within the first hour of attack onset, significantly reduced attack duration and time to attack resolution.

  1. Privacy Protection Method for Multiple Sensitive Attributes Based on Strong Rule

    Tong Yi

    2015-01-01

    Full Text Available At present, most studies on data publishing only considered single sensitive attribute, and the works on multiple sensitive attributes are still few. And almost all the existing studies on multiple sensitive attributes had not taken the inherent relationship between sensitive attributes into account, so that adversary can use the background knowledge about this relationship to attack the privacy of users. This paper presents an attack model with the association rules between the sensitive attributes and, accordingly, presents a data publication for multiple sensitive attributes. Through proof and analysis, the new model can prevent adversary from using the background knowledge about association rules to attack privacy, and it is able to get high-quality released information. At last, this paper verifies the above conclusion with experiments.

  2. Cyber Attacks and Energy Infrastructures: Anticipating Risks

    Desarnaud, Gabrielle

    2017-01-01

    This study analyses the likelihood of cyber-attacks against European energy infrastructures and their potential consequences, particularly on the electricity grid. It also delivers a comparative analysis of measures taken by different European countries to protect their industries and collaborate within the European Union. The energy sector experiences an unprecedented digital transformation upsetting its activities and business models. Our energy infrastructures, sometimes more than a decade old and designed to remain functional for many years to come, now constantly interact with light digital components. The convergence of the global industrial system with the power of advanced computing and analytics reveals untapped opportunities at every step of the energy value chain. However, the introduction of digital elements in old and unprotected industrial equipment also exposes the energy industry to the cyber risk. One of the most compelling example of the type of threat the industry is facing, is the 2015 cyber-attack on the Ukraine power grid, which deprived about 200 000 people of electricity in the middle of the winter. The number and the level of technical expertise of cyber-attacks rose significantly after the discovery of the Stuxnet worm in the network of Natanz uranium enrichment site in 2010. Energy transition policies and the growing integration of renewable sources of energy will intensify this tendency, if cyber security measures are not part of the design of our future energy infrastructures. Regulators try to catch up and adapt, like in France where the authorities collaborate closely with the energy industry to set up a strict and efficient regulatory framework, and protect critical operators. This approach is adopted elsewhere in Europe, but common measures applicable to the whole European Union are essential to protect strongly interconnected energy infrastructures against a multiform threat that defies frontiers

  3. Context Switching with Multiple Register Windows: A RISC Performance Study

    Konsek, Marion B.; Reed, Daniel A.; Watcharawittayakul, Wittaya

    1987-01-01

    Although previous studies have shown that a large file of overlapping register windows can greatly reduce procedure call/return overhead, the effects of register windows in a multiprogramming environment are poorly understood. This paper investigates the performance of multiprogrammed, reduced instruction set computers (RISCs) as a function of window management strategy. Using an analytic model that reflects context switch and procedure call overheads, we analyze the performance of simple, linearly self-recursive programs. For more complex programs, we present the results of a simulation study. These studies show that a simple strategy that saves all windows prior to a context switch, but restores only a single window following a context switch, performs near optimally.

  4. Physical activity staging distribution: establishing a heuristic using multiple studies.

    Nigg, C; Hellsten, L; Norman, G; Braun, L; Breger, R; Burbank, P; Coday, M; Elliot, D; Garber, C; Greaney, M; Keteyian, S; Lees, F; Matthews, C; Moe, E; Resnick, B; Riebe, D; Rossi, J; Toobert, D; Wang, T; Welk, G; Williams, G

    2005-04-01

    The purpose of this study was to identify the population prevalence across the stages of change (SoC) for regular physical activity and to establish the prevalence of people at risk. With support from the National Institutes of Health, the American Heart Association, and the Robert Wood Johnson Foundation, nine Behavior Change Consortium studies with a common physical activity SoC measure agreed to collaborate and share data. The distribution pattern identified in these predominantly reactively recruited studies was Precontemplation (PC) = 5% (+/- 10), Contemplation (C) = 10% (+/- 10), Preparation (P) = 40% (+/- 10), Action = 10% (+/- 10), and Maintenance = 35% (+/- 10). With reactively recruited studies, it can be anticipated that there will be a higher percentage of the sample that is ready to change and a greater percentage of currently active people compared to random representative samples. The at-risk stage distribution (i.e., those not at criteria or PC, C, and P) was approximately 10% PC, 20% C, and 70% P in specific samples and approximately 20% PC, 10% C, and 70% P in the clinical samples. Knowing SoC heuristics can inform public health practitioners and policymakers about the population's motivation for physical activity, help track changes over time, and assist in the allocation of resources.

  5. Multiple Cultures of Doing Geography Facilitate Global Studies

    Ahamer, Gilbert

    2013-01-01

    Purpose: This article aims to explain why geography is a prime discipline for analysing globalisation and a multicultural view of Global Studies. The generic approach of human geography to first select an appropriate methodology is taken as a key approach. Design/methodology/approach: Concepts from aggregate disciplines such as history, economics,…

  6. Studies based on the Danish Multiple Sclerosis Registry

    Koch-Henriksen, Nils; Stenager, Egon; Brønnum-Hansen, Henrik

    2011-01-01

    , historical prospective studies identifying some risk factors (e.g. infectious mononucleosis) and refuting others (head trauma and a number of occupational exposures e.g. nurses, utility workers, people exposed to solvents). The most important results are briefly presented. CONCLUSION: The Danish MS register...

  7. The impact of secure messaging on workflow in primary care: Results of a multiple-case, multiple-method study.

    Hoonakker, Peter L T; Carayon, Pascale; Cartmill, Randi S

    2017-04-01

    Secure messaging is a relatively new addition to health information technology (IT). Several studies have examined the impact of secure messaging on (clinical) outcomes but very few studies have examined the impact on workflow in primary care clinics. In this study we examined the impact of secure messaging on workflow of clinicians, staff and patients. We used a multiple case study design with multiple data collections methods (observation, interviews and survey). Results show that secure messaging has the potential to improve communication and information flow and the organization of work in primary care clinics, partly due to the possibility of asynchronous communication. However, secure messaging can also have a negative effect on communication and increase workload, especially if patients send messages that are not appropriate for the secure messaging medium (for example, messages that are too long, complex, ambiguous, or inappropriate). Results show that clinicians are ambivalent about secure messaging. Secure messaging can add to their workload, especially if there is high message volume, and currently they are not compensated for these activities. Staff is -especially compared to clinicians- relatively positive about secure messaging and patients are overall very satisfied with secure messaging. Finally, clinicians, staff and patients think that secure messaging can have a positive effect on quality of care and patient safety. Secure messaging is a tool that has the potential to improve communication and information flow. However, the potential of secure messaging to improve workflow is dependent on the way it is implemented and used. Copyright © 2017 Elsevier B.V. All rights reserved.

  8. Occupational stress and psychopathology in health professionals: an explorative study with the multiple indicators multiple causes (MIMIC) model approach.

    Iliceto, Paolo; Pompili, Maurizio; Spencer-Thomas, Sally; Ferracuti, Stefano; Erbuto, Denise; Lester, David; Candilera, Gabriella; Girardi, Paolo

    2013-03-01

    Occupational stress is a multivariate process involving sources of pressure, psycho-physiological distress, locus of control, work dissatisfaction, depression, anxiety, mental health disorders, hopelessness, and suicide ideation. Healthcare professionals are known for higher rates of occupational-related distress (burnout and compassion fatigue) and higher rates of suicide. The purpose of this study was to explain the relationships between occupational stress and some psychopathological dimensions in a sample of health professionals. We investigated 156 nurses and physicians, 62 males and 94 females, who were administered self-report questionnaires to assess occupational stress [occupational stress inventory (OSI)], temperament (temperament evaluation of Memphis, Pisa, Paris, and San Diego autoquestionnaire), and hopelessness (Beck hopelessness scale). The best Multiple Indicators Multiple Causes model with five OSI predictors yielded the following results: χ2(9) = 14.47 (p = 0.11); χ2/df = 1.60; comparative fit index = 0.99; root mean square error of approximation = 0.05. This model provided a good fit to the empirical data, showing a strong direct influence of casual variables such as work dissatisfaction, absence of type A behavior, and especially external locus of control, psychological and physiological distress on latent variable psychopathology. Occupational stress is in a complex relationship with temperament and hopelessness and also common among healthcare professionals.

  9. Migraine attacks the Basal Ganglia

    Bigal Marcelo

    2011-09-01

    Full Text Available Abstract Background With time, episodes of migraine headache afflict patients with increased frequency, longer duration and more intense pain. While episodic migraine may be defined as 1-14 attacks per month, there are no clear-cut phases defined, and those patients with low frequency may progress to high frequency episodic migraine and the latter may progress into chronic daily headache (> 15 attacks per month. The pathophysiology of this progression is completely unknown. Attempting to unravel this phenomenon, we used high field (human brain imaging to compare functional responses, functional connectivity and brain morphology in patients whose migraine episodes did not progress (LF to a matched (gender, age, age of onset and type of medication group of patients whose migraine episodes progressed (HF. Results In comparison to LF patients, responses to pain in HF patients were significantly lower in the caudate, putamen and pallidum. Paradoxically, associated with these lower responses in HF patients, gray matter volume of the right and left caudate nuclei were significantly larger than in the LF patients. Functional connectivity analysis revealed additional differences between the two groups in regard to response to pain. Conclusions Supported by current understanding of basal ganglia role in pain processing, the findings suggest a significant role of the basal ganglia in the pathophysiology of the episodic migraine.

  10. Employment among patients with multiple sclerosis - A population study

    Lunde, Hanne Marie; Telstad, Wenche; Torkildsen, Nina Agnethe Grytten; Kyte, Lars; Aarseth, Jan; Myhr, Kjell-Morten; Bø, Lars

    2014-01-01

    OBJECTIVE: To investigate demographic and clinical factors associated with employment in MS. METHODS: The study included 213 (89.9%) of all MS patients in Sogn and Fjordane County, Western Norway at December 31st 2010. The patients underwent clinical evaluation, structured interviews and completed self-reported questionnaires. Demographic and clinical factors were compared between patients being employed versus patients being unemployed and according to disease course of MS. Logist...

  11. Dynamic capabilities and innovation: a Multiple-Case Study

    Bravo Ibarra, Edna Rocío; Mundet Hiern, Joan; Suñé Torrents, Albert

    2009-01-01

    After a detailed survey of the scientific literature, it was found that several characteristics of dynamic capabilities were similar to those of innovation capability. Therefore, with a deeper study of the first ones, it could be possible to design a model aimed to structure innovation capability. Thus, this work presents a conceptual model, where the innovation capability is shown as result of three processes: knowledge absorption and creation capability, knowledge integration and knowledge ...

  12. Carbon dioxide induced panic attacks and short term clonazepam treatment: preliminary study Ataques de pânico induzidos por dióxido de carbono e tratamento a curto prazo com clonazepam: estudo preliminar

    ANTONIO EGIDIO NARDI

    1999-06-01

    Full Text Available AIMS: 1. To verify the sensibility of panic patients to a mixture of 35% CO2 and 65% O2. 2. To determine if a ten days treatment with clonazepam attenuates the panic attacks induced by the inhalation of 35% carbon dioxide in panic disorder. METHOD: We randomly selected six panic disorder subjects, using the Structured Clinical Interview for DSM-IV. All subjects went double-blindly through an inhalation of 35% CO2 and compressed gas (atmospheric air on two occasions. First, at baseline, when they were drug free. Second, after a 10 days clonazepam treatment. RESULTS: Neither at baseline nor after treatment any patient had a panic attack during compressed gas inhalation. At the first test five patients (83.3% had a severe panic attack with high levels of subjective anxiety during carbon dioxide inhalation. After 9.6 (± 3.4 days of clonazepam treatment, only two (33.3% patients experienced a mild panic attack. CONCLUSION: This pilot study suggests the efficacy of the short term clonazepam therapy in attenuating panic attacks and supports the usefulness of the 35% carbon dioxide challenge test as an analogue method for study the efficacy of anti-panic drugs. Further placebo-controlled studies to pharmacological treatment are warranted.OBJETIVOS: 1. Verificar a sensibilidade de pacientes com transtorno do pânico ao teste de inalação com mistura de 35% de dióxido de carbono e 65% de oxigênio. 2. Determinar se o tratamento com clonazepam por período de dez dias bloqueia ou atenua os ataques de pânico induzidos pela inalação da mistura carbogênica, em pacientes com transtorno do pânico. METODOLOGIA: Foram selecionados randomicamente seis pacientes com transtorno do pânico (SCID-I, DSM-IV. Os pacientes foram submetidos de forma duplo-cega a testes de inalação com ar comprimido (gás atmosférico e dióxido de carbono em dois momentos. Primeiro, no início do estudo quando não estavam usando nenhuma medicação. Segundo, após período de

  13. Accounting for multiple births in neonatal and perinatal trials: systematic review and case study.

    Hibbs, Anna Maria; Black, Dennis; Palermo, Lisa; Cnaan, Avital; Luan, Xianqun; Truog, William E; Walsh, Michele C; Ballard, Roberta A

    2010-02-01

    To determine the prevalence in the neonatal literature of statistical approaches accounting for the unique clustering patterns of multiple births and to explore the sensitivity of an actual trial to several analytic approaches to multiples. A systematic review of recent perinatal trials assessed the prevalence of studies accounting for clustering of multiples. The Nitric Oxide to Prevent Chronic Lung Disease (NO CLD) trial served as a case study of the sensitivity of the outcome to several statistical strategies. We calculated odds ratios using nonclustered (logistic regression) and clustered (generalized estimating equations, multiple outputation) analyses. In the systematic review, most studies did not describe the random assignment of twins and did not account for clustering. Of those studies that did, exclusion of multiples and generalized estimating equations were the most common strategies. The NO CLD study included 84 infants with a sibling enrolled in the study. Multiples were more likely than singletons to be white and were born to older mothers (P accounted for clustering were statistically significant; analyses assuming independence were not. The statistical approach to multiples can influence the odds ratio and width of confidence intervals, thereby affecting the interpretation of a study outcome. A minority of perinatal studies address this issue. Copyright 2010 Mosby, Inc. All rights reserved.

  14. Reporting Multiple Individual Injuries in Studies of Team Ball Sports: A Systematic Review of Current Practice.

    Fortington, Lauren V; van der Worp, Henk; van den Akker-Scheek, Inge; Finch, Caroline F

    2017-06-01

    To identify and prioritise targets for injury prevention efforts, injury incidence studies are widely reported. The accuracy and consistency in calculation and reporting of injury incidence is crucial. Many individuals experience more than one injury but multiple injuries are not consistently reported in sport injury incidence studies. The aim of this systematic review was to evaluate current practice of how multiple injuries within individuals have been defined and reported in prospective, long-term, injury studies in team ball sports. A systematic search of three online databases for articles published before 2016. Publications were included if (1) they collected prospective data on musculoskeletal injuries in individual participants; (2) the study duration was >1 consecutive calendar year/season; and (3) individuals were the unit of analysis. Key study features were summarised, including definitions of injury, how multiple individual injuries were reported and results relating to multiple injuries. Of the 71 publications included, half did not specifically indicate multiple individual injuries; those that did were largely limited to reporting recurrent injuries. Eight studies reported the number/proportion of athletes with more than one injury, and 11 studies presented the mean/number of injuries per athlete. Despite it being relatively common to collect data on individuals across more than one season, the reporting of multiple injuries within individuals is much more limited. Ultimately, better addressing of multiple injuries will improve the accuracy of injury incidence studies and enable more precise targeting and monitoring of the effectiveness of preventive interventions.

  15. A Diagnostic Study of Pre-Service Teachers' Competency in Multiple-Choice Item Development

    Asim, Alice E.; Ekuri, Emmanuel E.; Eni, Eni I.

    2013-01-01

    Large class size is an issue in testing at all levels of Education. As a panacea to this, multiple choice test formats has become very popular. This case study was designed to diagnose pre-service teachers' competency in constructing questions (IQT); direct questions (DQT); and best answer (BAT) varieties of multiple choice items. Subjects were 88…

  16. Relationship between Multiple Intelligence, Reading Proficiency, and Implementing Motivational Strategies: A Study of Iranian Secondary Students

    Fayazi-Nasab, Ensieh; Ghafournia, Narjes

    2016-01-01

    There exist many factors, affecting reading ability. Multiple intelligence and motivational strategies are among the factors that seem to make significant contribution to the reading process. Thus, the present study probed the probable significant relation between Iranian language learners' multiple intelligences and reading ability. The study…

  17. SOLVING CUSTOMER COMPLAINTS: A STUDY OF MULTIPLE COMMERCIAL SETTINGS

    Gurau Calin

    2012-12-01

    Full Text Available Theme: Many reports stress the importance of solving customer complaints in order to maintain customer satisfaction, but also to learn from mistakes and further improve the customer service. However, relatively few empirical studies have been conducted regarding the effect of complains handling activities on customer satisfaction and on company-customer relationships. Objectives of research: This paper attempts to identify the main elements of the complaints handling strategy that are considered essential for customers, and their effect on customer satisfaction. Literature analysis/previous research: Previous studies define a complaint as a conflict between a consumer and a business organisation in which the fairness of the resolution procedures, the interpersonal communication and behaviour, and the outcome of the complaint resolution process are the principal evaluative criteria used by the customer. In our opinion, a complaint is not necessary a conflict, however, it can create a conflict between a customer and a business organisation, when the answer to the consumer’s complaint is not satisfactory. Therefore, the way in which business organisations deal with consumer complaints can significantly influence the consumers’ level of satisfaction and loyalty. Research methodology: The empirical analysis of primary data collected through face-to-face interviews with 150 French customers provides a detailed picture of the specific elements of complains handling which are perceived as important in four different settings defined in relation to the perceived importance of the product or service, and the emergency of the experienced problem. Results: The identified elements of the complaint-handling procedure have a variable importance from one element to the other, and in the context of various complaint situations. This finding highlights the fact that, depending on each situation, the factors that will determine customer

  18. Multiple comparative studies of Green Supply Chain Management

    Xu, Lihui; Mathiyazhagan, K.; Govindan, Kannan

    2013-01-01

    friendly operation strategies to lower their overall carbon footprint. Currently, there is increased awareness among customers even in developing countries about eco friendly manufacturing solutions. Multi-national firms have identified economies of developed nations as a potential market...... for their products. Such organizations in developing countries like India and China are under pressure to adopt green concepts in supply chain operations to compete in the market and satisfy their customers' increasing needs. This paper offers a comparative study of pressures that impact the adoption of Green Supply...

  19. SDN-based path hopping communication against eavesdropping attack

    Zhang, Chuanhao; Bu, Youjun; Zhao, Zheng

    2016-10-01

    Network eavesdropping is one of the most popular means used by cyber attackers, which has been a severe threat to network communication security. Adversaries could capture and analyze network communication data from network nodes or links, monitor network status and steal sensitive data such as username and password etc. Traditional network usually uses static network configuration, and existing defense methods, including firewall, IDS, IPS etc., cannot prevent eavesdropping, which has no distinguishing characteristic. Network eavesdropping become silent during most of the time of the attacking process, which is why it is difficult to discover and to defend. But A successful eavesdropping attack also has its' precondition, which is the target path should be relatively stable and has enough time of duration. So, In order to resolve this problem, it has to work on the network architecture. In this paper, a path hopping communication(PHC) mechanism based on Software Define Network (SDN) was proposed to solve this problem. In PHC, Ends in communication packets as well as the routing paths were changed dynamically. Therefore, the traffic would be distributed to multiple flows and transmitted along different paths. so that Network eavesdropping attack could be prevented effectively. It was concluded that PHC was able to increase the overhead of Network eavesdropping, as well as the difficulty of communication data recovery.

  20. Protecting water and wastewater infrastructure from cyber attacks

    Srinivas Panguluri; William Phillips; John Cusimano

    2011-01-01

    Multiple organizations over the years have collected and analyzed data on cyber attacks and they all agree on one conclusion:cyber attacks are real and can cause significant damages.This paper presents some recent statistics on cyber attacks and resulting damages.Water and wastewater utilities must adopt countermeasures to prevent or minimize the damage in case of such attacks.Many unique challenges are faced by the water and wastewater industry while selecting and implementing security countermeasures; the key challenges are:1) the increasing interconnection of their business and control system networks,2) large variation of proprietary industrial control equipment utilized,3) multitude of cross-sector cyber-security standards,and 4) the differences in the equipment vendor's approaches to meet these security standards.The utilities can meet these challenges by voluntarily selecting and adopting security standards,conducting a gap analysis,performing vulnerability/risk analysis,and undertaking countermeasures that best meets their security and organizational requirements.Utilities should optimally utilize their limited resources to prepare and implement necessary programs that are designed to increase cyber-security over the years.Implementing cyber security does not necessarily have to be expensive,substantial improvements can be accomplished through policy,procedure,training and awareness.Utilities can also get creative and allocate more funding through annual budgets and reduce dependence upon capital improvement programs to achieve improvements in cyber-security.

  1. Protecting water and wastewater infrastructure from cyber attacks

    Panguluri, Srinivas; Phillips, William; Cusimano, John

    2011-12-01

    Multiple organizations over the years have collected and analyzed data on cyber attacks and they all agree on one conclusion: cyber attacks are real and can cause significant damages. This paper presents some recent statistics on cyber attacks and resulting damages. Water and wastewater utilities must adopt countermeasures to prevent or minimize the damage in case of such attacks. Many unique challenges are faced by the water and wastewater industry while selecting and implementing security countermeasures; the key challenges are: 1) the increasing interconnection of their business and control system networks, 2) large variation of proprietary industrial control equipment utilized, 3) multitude of cross-sector cyber-security standards, and 4) the differences in the equipment vendor's approaches to meet these security standards. The utilities can meet these challenges by voluntarily selecting and adopting security standards, conducting a gap analysis, performing vulnerability/risk analysis, and undertaking countermeasures that best meets their security and organizational requirements. Utilities should optimally utilize their limited resources to prepare and implement necessary programs that are designed to increase cyber-security over the years. Implementing cyber security does not necessarily have to be expensive, substantial improvements can be accomplished through policy, procedure, training and awareness. Utilities can also get creative and allocate more funding through annual budgets and reduce dependence upon capital improvement programs to achieve improvements in cyber-security.

  2. Cranial Neuropathy in Multiple Sclerosis

    Mine Hayriye Sorgun

    2011-09-01

    Full Text Available OBJECTIVE: It has been reported that cranial neuropathy findings could be seen in the neurologic examination of multiple sclerosis (MS patients, although brain magnetic resonance imaging (MRI may not reveal any lesion responsible for the cranial nerve involvement. The aim of this study was to determine the frequency of brainstem and cranial nerve involvement, except for olfactory and optic nerves, during MS attacks, and to investigate the rate of an available explanation for the cranial neuropathy findings by lesion localization on brain MRI. METHODS: Ninety-five attacks of 86 MS patients were included in the study. The patients underwent a complete neurological examination, and cranial nerve palsies (CNP were determined during MS attacks. RESULTS: CNP were found as follows: 3rd CNP in 7 (7.4%, 4th CNP in 1 (1.1%, 5th CNP in 6 (6.3%, 6th CNP in 12 (12.6%, 7th CNP in 5 (5.3%, 8th CNP in 4 (4.2%, and 9th and 10th CNP in 2 (2.1% out of 95 attacks. Internuclear ophthalmoplegia (INO was detected in 5 (5.4%, nystagmus in 37 (38.9%, vertigo in 9 (6.3%, and diplopia in 14 (14.7% out of 95 attacks. Pons, mesencephalon and bulbus lesions were detected in 58.7%, 41.5% and 21.1% of the patients, respectively, on the brain MRI. Cranial nerve palsy findings could not be explained by the localization of the lesions on brainstem MRI in 5 attacks; 2 of them were 3rd CNP (1 with INO, 2 were 6th CNP and 1 was a combination of 6th, 7th and 8th CNP. CONCLUSION: The most frequently affected cranial nerve and brainstem region in MS patients is the 6th cranial nerve and pons, respectively. A few of the MS patients have normal brainstem MRI, although they have cranial neuropathy findings in the neurologic examination.

  3. Employment among patients with multiple sclerosis-a population study.

    Hanne Marie Bøe Lunde

    Full Text Available To investigate demographic and clinical factors associated with employment in MS.The study included 213 (89.9% of all MS patients in Sogn and Fjordane County, Western Norway at December 31st 2010. The patients underwent clinical evaluation, structured interviews and completed self-reported questionnaires. Demographic and clinical factors were compared between patients being employed versus patients being unemployed and according to disease course of MS. Logistic regression analysis was used to identify factors independently associated with current employment.After a mean disease duration of almost 19 years, 45% of the population was currently full-time or part- time employed. Patients with relapsing -remitting MS (RRMS had higher employment rate than patients with secondary (SPMS and primary progressive (PPMS. Higher educated MS patients with lower age at onset, shorter disease duration, less severe disability and less fatigue were most likely to be employed.Nearly half of all MS patients were still employed after almost two decades of having MS. Lower age at onset, shorter disease duration, higher education, less fatigue and less disability were independently associated with current employment. These key clinical and demographic factors are important to understand the reasons to work ability in MS. The findings highlight the need for environmental adjustments at the workplace to accommodate individual 's needs in order to improve working ability among MS patients.

  4. Employment among patients with multiple sclerosis-a population study.

    Bøe Lunde, Hanne Marie; Telstad, Wenche; Grytten, Nina; Kyte, Lars; Aarseth, Jan; Myhr, Kjell-Morten; Bø, Lars

    2014-01-01

    To investigate demographic and clinical factors associated with employment in MS. The study included 213 (89.9%) of all MS patients in Sogn and Fjordane County, Western Norway at December 31st 2010. The patients underwent clinical evaluation, structured interviews and completed self-reported questionnaires. Demographic and clinical factors were compared between patients being employed versus patients being unemployed and according to disease course of MS. Logistic regression analysis was used to identify factors independently associated with current employment. After a mean disease duration of almost 19 years, 45% of the population was currently full-time or part- time employed. Patients with relapsing -remitting MS (RRMS) had higher employment rate than patients with secondary (SPMS) and primary progressive (PPMS). Higher educated MS patients with lower age at onset, shorter disease duration, less severe disability and less fatigue were most likely to be employed. Nearly half of all MS patients were still employed after almost two decades of having MS. Lower age at onset, shorter disease duration, higher education, less fatigue and less disability were independently associated with current employment. These key clinical and demographic factors are important to understand the reasons to work ability in MS. The findings highlight the need for environmental adjustments at the workplace to accommodate individual 's needs in order to improve working ability among MS patients.

  5. A multiple-compartment model for biokinetics studies in plants

    Garcia, Fermin; Pietrobron, Flavio; Fonseca, Agnes M.F.; Mol, Anderson W.; Rodriguez, Oscar; Guzman, Fernando

    2001-01-01

    In the present work is used the system of linear equations based in the general Assimakopoulos's GMCM model , for the development of a new method that will determine the flow's parameters and transfer coefficients in plants. The need of mathematical models to quantify the penetration of a trace substance in animals and plants, has often been stressed in the literature. Usually, in radiological environment studies, it is used the mean value of contaminant concentrations on whole or edible part plant body, without taking in account vegetable physiology regularities. In this work concepts and mathematical formulation of a Vegetable Multi-compartment Model (VMCM), taking into account the plant's physiology regularities is presented. The model based in general ideas of the GMCM , and statistical Square Minimum Method STATFLUX is proposed to use in inverse sense: the experimental time dependence of concentration in each compartment, should be input, and the parameters should be determined from this data in a statistical approach. The case of Uranium metabolism is discussed. (author)

  6. Delusional disorder and schizophrenia: a comparative study across multiple domains.

    Peralta, V; Cuesta, M J

    2016-10-01

    Delusional disorder (DD) is an under-researched condition and its relationship to schizophrenia (SZ) controversial. This study aimed to further characterize DD and to examine multi-domain evidence for the distinction between DD and SZ. Using univariate analyses we examined 146 subjects with DD, 114 subjects with paranoid SZ and 244 subjects with non-paranoid SZ on 52 characteristics from several domains including demographics, risk factors, premorbid features, illness characteristics, index episode features, delusional-related features, response to treatment and outcome. In a further step, we searched for independent associations of the examined characteristics with DD v. SZ. Univariate analyses showed that DD differed from either form of SZ in 40 characteristics, the pattern of findings indicated that paranoid SZ was much more similar to non-paranoid SZ than DD. Relative to subjects with SZ, those with DD were more likely to have drug abuse before illness onset, better premorbid sexual adjustment, later age at illness onset, higher levels of affective symptoms and lack of insight, poorer response to antipsychotic medication, better functioning in the domains of personal care, paid work and social functioning; last, subjects with DD had fewer but more severe delusions and higher ratings of conviction of delusional experience than those with SZ. Predominance of jealousy and somatic delusions was confined to subjects with DD. DD and SZ represent two distinct classes of disorders, the differential features of DD being of nosological, aetiological and therapeutic relevance.

  7. Multiple Tier Fuel Cycle Studies for Waste Transmutation

    Hill, R.N.; Taiwo, T.A.; Stillman, J.A.; Graziano, D.J.; Bennett, D.R.; Trellue, H.; Todosow, M.; Halsey, W.G.; Baxter, A.

    2002-01-01

    As part of the U.S. Department of Energy Advanced Accelerator Applications Program, a systems study was conducted to evaluate the transmutation performance of advanced fuel cycle strategies. Three primary fuel cycle strategies were evaluated: dual-tier systems with plutonium separation, dual-tier systems without plutonium separation, and single-tier systems without plutonium separation. For each case, the system mass flow and TRU consumption were evaluated in detail. Furthermore, the loss of materials in fuel processing was tracked including the generation of new waste streams. Based on these results, the system performance was evaluated with respect to several key transmutation parameters including TRU inventory reduction, radiotoxicity, and support ratio. The importance of clean fuel processing (∼0.1% losses) and inclusion of a final tier fast spectrum system are demonstrated. With these two features, all scenarios capably reduce the TRU and plutonium waste content, significantly reducing the radiotoxicity; however, a significant infrastructure (at least 1/10 the total nuclear capacity) is required for the dedicated transmutation system. (authors)

  8. Multiple tier fuel cycle studies for waste transmutation

    Hill, R.N.; Taiwo, T.A.; Stillman, J.A.; Graziano, D.J.; Bennett, D.R.; Trellue, H.; Todosow, M.; Halsey, W.G.; Baxter, A.

    2002-01-01

    As part of the U.S. Department of Energy Advanced Accelerator Applications Program, a systems study was conducted to evaluate the transmutation performance of advanced fuel cycle strategies. Three primary fuel cycle strategies were evaluated: dual-tier systems with plutonium separation, dual-tier systems without plutonium separation, and single-tier systems without plutonium separation. For each case, the system mass flow and TRU consumption were evaluated in detail. Furthermore, the loss of materials in fuel processing was tracked including the generation of new waste streams. Based on these results, the system performance was evaluated with respect to several key transmutation parameters including TRU inventory reduction, radiotoxicity, and support ratio. The importance of clean fuel processing (∼0.1% losses) and inclusion of a final tier fast spectrum system are demonstrated. With these two features, all scenarios capably reduce the TRU and plutonium waste content, significantly reducing the radiotoxicity; however, a significant infrastructure (at least 1/10 the total nuclear capacity) is required for the dedicated transmutation system

  9. Investigating the effect of Network Parameters on Coordinated Cyber Attacks against a Simulated Power Plant

    GENGE BELA; SIATERLIS CHRISTOS

    2011-01-01

    The fact that modern Networked Industrial Control Systems (NICS) depend on Information and Communication Technologies (ICT), is well known. Although many studies have focused on the security of these systems, today we still lack the proper understanding of the effects that cyber attacks have on NICS. In this paper we use our previously developed framework to study the effects of coordinated cyber attacks against NICS. Coordinated attacks rely on several infected hosts to disrupt the ...

  10. Model checking exact cost for attack scenarios

    Aslanyan, Zaruhi; Nielson, Flemming

    2017-01-01

    Attack trees constitute a powerful tool for modelling security threats. Many security analyses of attack trees can be seamlessly expressed as model checking of Markov Decision Processes obtained from the attack trees, thus reaping the benefits of a coherent framework and a mature tool support....... However, current model checking does not encompass the exact cost analysis of an attack, which is standard for attack trees. Our first contribution is the logic erPCTL with cost-related operators. The extended logic allows to analyse the probability of an event satisfying given cost bounds and to compute...... the exact cost of an event. Our second contribution is the model checking algorithm for erPCTL. Finally, we apply our framework to the analysis of attack trees....

  11. Securing internet by eliminating DDOS attacks

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  12. Consciousness in non-epileptic attack disorder.

    Reuber, Markus; Kurthen, M

    2011-01-01

    Non-epileptic attack disorder (NEAD) is one of the most important differential diagnoses of epilepsy. Impairment of consciousness is the key feature of non-epileptic attacks (NEAs). The first half of this review summarises the clinical research literature featuring observations relating to consciousness in NEAD. The second half places this evidence in the wider context of the recent discourse on consciousness in neuroscience and the philosophy of mind. We argue that studies of consciousness should not only distinguish between the 'level' and `content' of consciousness but also between 'phenomenal consciousness' (consciousness of states it somehow "feels to be like") and 'access consciousness' (having certain 'higher' cognitive processes at one's disposal). The existing evidence shows that there is a great intra- and interindividual variability of NEA experience. However, in most NEAs phenomenal experience - and, as a precondition for that experience, vigilance or wakefulness - is reduced to a lesser degree than in those epileptic seizures involving impairment of consciousness. In fact, complete loss of "consciousness" is the exception rather than the rule in NEAs. Patients, as well as external observers, may have a tendency to overestimate impairments of consciousness during the seizures.

  13. Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis.

    Zhou, Wei; Wen, Junhao; Koh, Yun Sing; Xiong, Qingyu; Gao, Min; Dobbie, Gillian; Alam, Shafiq

    2015-01-01

    Recommender systems are highly vulnerable to shilling attacks, both by individuals and groups. Attackers who introduce biased ratings in order to affect recommendations, have been shown to negatively affect collaborative filtering (CF) algorithms. Previous research focuses only on the differences between genuine profiles and attack profiles, ignoring the group characteristics in attack profiles. In this paper, we study the use of statistical metrics to detect rating patterns of attackers and group characteristics in attack profiles. Another question is that most existing detecting methods are model specific. Two metrics, Rating Deviation from Mean Agreement (RDMA) and Degree of Similarity with Top Neighbors (DegSim), are used for analyzing rating patterns between malicious profiles and genuine profiles in attack models. Building upon this, we also propose and evaluate a detection structure called RD-TIA for detecting shilling attacks in recommender systems using a statistical approach. In order to detect more complicated attack models, we propose a novel metric called DegSim' based on DegSim. The experimental results show that our detection model based on target item analysis is an effective approach for detecting shilling attacks.

  14. Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis

    Zhou, Wei; Wen, Junhao; Koh, Yun Sing; Xiong, Qingyu; Gao, Min; Dobbie, Gillian; Alam, Shafiq

    2015-01-01

    Recommender systems are highly vulnerable to shilling attacks, both by individuals and groups. Attackers who introduce biased ratings in order to affect recommendations, have been shown to negatively affect collaborative filtering (CF) algorithms. Previous research focuses only on the differences between genuine profiles and attack profiles, ignoring the group characteristics in attack profiles. In this paper, we study the use of statistical metrics to detect rating patterns of attackers and group characteristics in attack profiles. Another question is that most existing detecting methods are model specific. Two metrics, Rating Deviation from Mean Agreement (RDMA) and Degree of Similarity with Top Neighbors (DegSim), are used for analyzing rating patterns between malicious profiles and genuine profiles in attack models. Building upon this, we also propose and evaluate a detection structure called RD-TIA for detecting shilling attacks in recommender systems using a statistical approach. In order to detect more complicated attack models, we propose a novel metric called DegSim’ based on DegSim. The experimental results show that our detection model based on target item analysis is an effective approach for detecting shilling attacks. PMID:26222882

  15. Effect of Angle of Attack on Slope Climbing Performance

    Creager, Colin M.; Jones, Lucas; Smith, Lauren M.

    2017-01-01

    Ascending steep slopes is often a very difficult challenge for off-road vehicles, whether on Earth or on extraterrestrial bodies. This challenge is even greater if the surface consists of loose granular soil that does not provide much shear strength. This study investigated how the path at which a vehicle traverses a slope, specifically the angle that it is commanded to drive relative to the base of the hill (the angle of attack), can affect its performance. A vehicle was driven in loose sand at slope angles up to 15 degrees and angles of attack ranging from 10 to 90 degrees. A novel photogrammetry technique was implemented to both track vehicle motion and create a three-dimensional profile of the terrain. This allowed for true wheel sinkage measurements. The study showed that though low angles of attack result in lower wheel slip and sinkage, the efficiency of the vehicles uphill motion increased at higher angles of attack. For slopes up to 15 degrees, a 90 degree angle of attack provided the greatest likelihood of successful ascent.

  16. Low heat pain thresholds in migraineurs between attacks.

    Schwedt, Todd J; Zuniga, Leslie; Chong, Catherine D

    2015-06-01

    Between attacks, migraine is associated with hypersensitivities to sensory stimuli. The objective of this study was to investigate hypersensitivity to pain in migraineurs between attacks. Cutaneous heat pain thresholds were measured in 112 migraineurs, migraine free for ≥ 48 hours, and 75 healthy controls. Pain thresholds at the head and at the arm were compared between migraineurs and controls using two-tailed t-tests. Among migraineurs, correlations between heat pain thresholds and headache frequency, allodynia symptom severity, and time interval until next headache were calculated. Migraineurs had lower pain thresholds than controls at the head (43.9 ℃ ± 3.2 ℃ vs. 45.1 ℃ ± 3.0 ℃, p = 0.015) and arm (43.2 ℃ ± 3.4 ℃ vs. 44.8 ℃ ± 3.3 ℃, p pain thresholds and headache frequency or allodynia symptom severity. For the 41 migraineurs for whom time to next headache was known, there were positive correlations between time to next headache and pain thresholds at the head (r = 0.352, p = 0.024) and arm (r = 0.312, p = 0.047). This study provides evidence that migraineurs have low heat pain thresholds between migraine attacks. Mechanisms underlying these lower pain thresholds could also predispose migraineurs to their next migraine attack, a hypothesis supported by finding positive correlations between pain thresholds and time to next migraine attack. © International Headache Society 2014 Reprints and permissions: sagepub.co.uk/journalsPermissions.nav.

  17. Visualizing Risks: Icons for Information Attack Scenarios

    Hosmer, Hilary

    2000-01-01

    .... Visual attack scenarios help defenders see system ambiguities, imprecision, vulnerabilities and omissions, thus speeding up risk analysis, requirements gathering, safeguard selection, cryptographic...

  18. Classifying network attack scenarios using an ontology

    Van Heerden, RP

    2012-03-01

    Full Text Available ) or to the target?s reputation. The Residue sub-phase refers to damage or artefacts of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example after the launch of a DDOS..., A. (1995). Hacking theft of $10 million from citibank revealed. Retrieved 10/10, 2011, from http://articles.latimes.com/1995-08-19/business/fi-36656_1_citibank-system Hurley, E. (2004). SCO site succumbs to DDoS attack. Retrieved 10/10, 2011, from...

  19. A computer network attack taxonomy and ontology

    Van Heerden, RP

    2012-01-01

    Full Text Available of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example, after the launch of a DDOS (Distributed Denial of Service) attack, zombie computers may still connect to the target...-scrap- value-of-a-hacked-pc-revisited/ . Lancor, L., & Workman, R. (2007). Using Google Hacking to Enhance Defense Strategies. ACM SIGCSE Bulletin, 39 (1), 491-495. Lau, F., Rubin, S. H., Smith, M. H., & Trajkovic, L. (2000). Distributed Denial of Service...

  20. Magnetic resonance imaging of multiple sclerosis brain lesions: A semeiologic study by multiple spin-echo sequences

    Caires, M.C.; Scheiber, C.; Rumbach, L.; Gounot, D.; Dumitresco, B.; Warter, J.M.; Collard, M.; Chambron, J.

    1986-01-01

    Nuclear magnetic resonance imaging (MRI) if the brain is now known as a very sensitive tool for clearly revealing lesions in white matter, and has thus become important in the study of multiple sclerosis (MS). Since 1981, others have shown the best of MRI: we can see 6 x more lesions than CT. MRI contrast bases mainly on the spatial heterogeneity of the relaxation time of different tissues. The sensitivity depends on the longer T1 and/or T2 of the pathological tissues compared to those of normal tissues. In our series, the authors use mainly T2 weighted MR images and they evaluate their interest for the diagnosis of MS. They study the frequency of the abnormalities and their semeiology in a small number of transversal sections imaged at the level of the lateral ventricles. The authors' aim is to describe the NMR-derived morphological signs of MS and to prospect its interest in the physiopathological studies of this disease

  1. Physical activity and exercise priorities in community dwelling people with multiple sclerosis: a Delphi study.

    Stennett, Andrea; De Souza, Lorraine; Norris, Meriel

    2018-07-01

    Exercise and physical activity have been found to be beneficial in managing disabilities caused by multiple sclerosis. Despite the known benefits, many people with multiple sclerosis are inactive. This study aimed to identify the prioritised exercise and physical activity practices of people with multiple sclerosis living in the community and the reasons why they are engaged in these activities. A four Round Delphi questionnaire scoped and determined consensus of priorities for the top 10 exercise and physical activities and the reasons why people with multiple sclerosis (n = 101) are engaged in these activities. Data were analysed using content analysis, descriptive statistics, and non-parametric tests. The top 10 exercise and physical activity practices and the top 10 reasons why people with multiple sclerosis (n = 70) engaged in these activities were identified and prioritised. Consensus was achieved for the exercise and physical activities (W = 0.744, p multiple sclerosis engaged in exercise and physical activity were diverse. These self-selected activities and reasons highlighted that people with multiple sclerosis might conceptualise exercise and physical activity in ways that may not be fully appreciated or understood by health professionals. Considerations of the views of people with multiple sclerosis may be essential if the goal of increasing physical activity in this population is to be achieved. Implications for Rehabilitation Health professionals should work collaboratively with people with multiple sclerosis to understand how they prioritise activities, the underlying reasons for their prioritisations and embed these into rehabilitation programmes. Health professionals should utilise activities prioritised by people with multiple sclerosis in the community as a way to support, promote, and sustain exercise and physical activity in this population. Rehabilitation interventions should include both the activities people with multiple

  2. Assessing Sexual Abuse/Attack Histories with Bariatric Surgery Patients

    Mahony, David

    2010-01-01

    This study assessed sexual abuse/attack histories in 537 bariatric surgery patients using the PsyBari. The prevalence rates found were lower (15.5%, 19.3% of women, 5.2% of men) than other studies that used bariatric surgery patients but consistent with studies that used nonbariatric obese subjects. Furthermore, bariatric surgery patients who…

  3. Preliminary study on radiation crosslinking of PE-NBR multiple phase system

    Wang Hong; Zhang Wanxi; Sun Jiazhen

    1989-01-01

    The effect of radiation crosslinking on the structure and properties of PE-NBR (polyethylene-acrylonitrile-butadiene rubber) multiple phase system was studied in this paper. The relationship of sol fraction and irradiated dose to multiplephase system was demonstrated

  4. An empirical study of rape in the context of multiple murder.

    DeLisi, Matt

    2014-03-01

    In recent years, multiple homicide offending has received increased research attention from criminologists; however, there is mixed evidence about the role of rape toward the perpetration of multiple murder. Drawing on criminal career data from a nonprobability sample of 618 confined male homicide offenders selected from eight U.S. states, the current study examines the role of rape as a predictor of multiple homicide offending. Bivariate analyses indicated a significant association between rape and murder charges. Multivariate path regression models indicated that rape had a significant and robust association with multiple murder. This relationship withstood the confounding effects of kidnapping, prior prison confinement, and prior murder, rape, and kidnapping. These results provide evidence that rape potentially serves as a gateway to multiple murder for some serious offenders. Suggestions for future research are proffered.

  5. MiMC: Efficient encryption and cryptographic hashing with minimal multiplicative complexity

    Albrecht, Martin; Grassi, Lorenzo; Rechberger, Christian

    2016-01-01

    and cryptographic hash functions is to reconsider and simplify the round function of the Knudsen-Nyberg cipher from 1995. The mapping F(x) := x3 is used as the main component there and is also the main component of our family of proposals called “MiMC”. We study various attack vectors for this construction and give...... a new attack vector that outperforms others in relevant settings. Due to its very low number of multiplications, the design lends itself well to a large class of applications, especially when the depth does not matter but the total number of multiplications in the circuit dominates all aspects...

  6. Cyber Attacks and Terrorism: A Twenty-First Century Conundrum.

    Albahar, Marwan

    2017-01-05

    In the recent years, an alarming rise in the incidence of cyber attacks has made cyber security a major concern for nations across the globe. Given the current volatile socio-political environment and the massive increase in the incidence of terrorism, it is imperative that government agencies rapidly realize the possibility of cyber space exploitation by terrorist organizations and state players to disrupt the normal way of life. The threat level of cyber terrorism has never been as high as it is today, and this has created a lot of insecurity and fear. This study has focused on different aspects of cyber attacks and explored the reasons behind their increasing popularity among the terrorist organizations and state players. This study proposes an empirical model that can be used to estimate the risk levels associated with different types of cyber attacks and thereby provide a road map to conceptualize and formulate highly effective counter measures and cyber security policies.

  7. Lead exposure potentiates predatory attack behavior in the cat

    Li Wenjie; Han Shenggao; Gregg, T.R.; Kemp, F.W.Francis W.; Davidow, A.L.; Louria, D.B.; Siegel, Allan; Bogden, J.D.

    2003-01-01

    Epidemiologic studies have demonstrated that environmental lead exposure is associated with aggressive behavior in children; however, numerous confounding variables limit the ability of these studies to establish a causal relationship. The study of aggressive behavior using a validated animal model was used to test the hypothesis that there is a causal relationship between lead exposure and aggression in the absence of confounding variables. We studied the effects of lead exposure on a feline model of aggression: predatory (quiet biting) attack of an anesthetized rat. Five cats were stimulated with a precisely controlled electrical current via electrodes inserted into the lateral hypothalamus. The response measure was the predatory attack threshold current (i.e., the current required to elicit an attack response on 50% of the trials). Blocks of trials were administered in which predatory attack threshold currents were measured three times a week for a total of 6-10 weeks, including before, during, and after lead exposure. Lead was incorporated into cat food 'treats' at doses of 50-150 mg/kg/day. Two of the five cats received a second period of lead exposure. Blood lead concentrations were measured twice a week and were <1, 21-77, and <20 μg/dL prior to, during, and after lead exposure, respectively. The predatory attack threshold decreased significantly during initial lead exposure in three of five cats and increased after the cessation of lead exposure in four of the five cats (P<0.01). The predatory attack thresholds and blood lead concentrations for each cat were inversely correlated (r=-0.35 to -0.74). A random-effects mixed model demonstrated a significant (P=0.0019) negative association between threshold current and blood lead concentration. The data of this study demonstrate that lead exposure enhances predatory aggression in the cat and provide experimental support for a causal relationship between lead exposure and aggressive behavior in humans

  8. Intact blood-brain barrier during spontaneous attacks of migraine without aura

    Amin, F M; Hougaard, A; Cramer, S P

    2017-01-01

    BACKGROUND AND PURPOSE: The integrity of the blood-brain barrier (BBB) has been questioned in migraine, but BBB permeability has never been investigated during spontaneous migraine attacks. In the present study, BBB permeability during spontaneous attacks of migraine without aura was investigated......, brain stem, posterior pons and whole brain. The paired samples t test was used to compare Ki (permeability) values between the attack and headache-free days. RESULTS: Nineteen patients completed the study. Median time from onset of migraine attack to scan was 6.5 h (range 4.0-15.5 h). No change...

  9. Multiple case study in seven European countries regarding culture-sensitive classroom quality assessment

    Slot, P.L.; Cadima, Joana; Salminen, Jenni; Pastori, Giulia; Lerkkanen, Marja-Kristiina

    2016-01-01

    This report presents the findings of a multiple case study, conducted in seven European countries to examine common and culturally differing aspects of curriculum, pedagogy, and quality of Early Childhood Education and Care (ECEC) provisions in Europe. This multiple case study involved intensive data collection on structural characteristics, process quality, implemented curricula and pedagogical approaches in four ECEC centers in each of the seven countries that were considered examples of ‘g...

  10. Multiple sectioning and perforation techniques for TEM sub-surface studies

    Lee, E.H.; Rowcliffe, A.F.

    1978-01-01

    Techniques for preparing multiple electron transparent regions at several depth levels below the surface of a metal disk specimen are described. These techniques are relatively rapid and find application in many areas involving surface studies. Examples are shown of multiple thin areas produced at intervals of approximately 200 nm below the original surface of a stainless steel bombarded with 4 MeV Ni +2 ions for void swelling studies

  11. Reporting Multiple Individual Injuries in Studies of Team Ball Sports: A Systematic Review of Current Practice

    Fortington, Lauren V; van der Worp, Henk; van den Akker-Scheek, Inge; Finch, Caroline F

    2017-01-01

    Background To identify and prioritise targets for injury prevention efforts, injury incidence studies are widely reported. The accuracy and consistency in calculation and reporting of injury incidence is crucial. Many individuals experience more than one injury but multiple injuries are not consistently reported in sport injury incidence studies. Objective The aim of this systematic review was to evaluate current practice of how multiple injuries within individuals have been defined and repor...

  12. Antioxidant status in acute asthmatic attack in children

    Al-Abdulla, N.O.; Al-Naama, L.M.; Hassan, M.K.

    2010-01-01

    Objectives: To determine the oxidant - antioxidant imbalance in asthmatic children, by measuring the levels of malondialdehyde (MDA) as an oxidant marker of lipid peroxidation as well as antioxidant compounds like vitamin C, vitamin E and uric acid and to investigate whether their concentrations are associated with more severe asthma. Methods: This case controlled prospective study was conducted on 219 children aged 1-12 years, attending Basra Maternity and Children Hospital. Included were 98 asthmatic children during acute attack and 121 non asthmatic, apparently healthy children. Serum malondialdehyde (MDA) as an oxidant marker of lipid peroxidation, and vitamin C, vitamin E and uric acid (as antioxidants) were estimated in asthmatic children during acute attack and compared with non-asthmatic children. Results: Asthmatic children during exacerbation of their asthma have significant lower serum levels of antioxidant compounds like vitamin C, vitamin E and uric acid (p<0.001) and significantly high malondialdehyde as compared with the controls. MDA was significantly elevated (P< 0.001), while that of vitamin C, vitamin E and uric acid were significantly decreased with increasing severity of asthmatic attack (P<0.001). A significant negative correlation between MDA with vitamin C (P<0.05, r = - 0.44) was observed in severe asthmatic attacks. Conclusion: Asthmatic patients during acute attack suffer a high degree of reactive oxygen species formation causing considerable oxidative stress that is indicated by the high level of oxidants (MDA) and low level of antioxidants. (author)

  13. Interval forecasting of cyber-attacks on industrial control systems

    Ivanyo, Y. M.; Krakovsky, Y. M.; Luzgin, A. N.

    2018-03-01

    At present, cyber-security issues of industrial control systems occupy one of the key niches in a state system of planning and management Functional disruption of these systems via cyber-attacks may lead to emergencies related to loss of life, environmental disasters, major financial and economic damage, or disrupted activities of cities and settlements. There is then an urgent need to develop protection methods against cyber-attacks. This paper studied the results of cyber-attack interval forecasting with a pre-set intensity level of cyber-attacks. Interval forecasting is the forecasting of one interval from two predetermined ones in which a future value of the indicator will be obtained. For this, probability estimates of these events were used. For interval forecasting, a probabilistic neural network with a dynamic updating value of the smoothing parameter was used. A dividing bound of these intervals was determined by a calculation method based on statistical characteristics of the indicator. The number of cyber-attacks per hour that were received through a honeypot from March to September 2013 for the group ‘zeppo-norcal’ was selected as the indicator.

  14. Transient Ischemic Attack Caused by Iron Deficiency Anemia

    Ufuk Emre

    2006-02-01

    Full Text Available Transient Ischemic Attack Caused by Iron Deficiency Anemia Transient ischemic attacks are episodes of transient focal ischemia involving the brain or brainstem. They are commonly two to thirty minutes in duration and lasting less than 24 hours. Anemia of iron deficiency isn’t frequently cause for transient ischemic attack. It has been reported as a risk factor for childhood ischemic strokes. In the iron deficiency anemia, T‹A may develop as result of hypercoagulable state and increased viscosity that is caused by anemic hypoxia that is result of reduce hemoglobine level, seconder thrombosis and microcytose As iron deficiency anemia has been reported so rarely in adult patients with transient ischemic attacks as a cause, we aimed to discuss the clinical and outcome features of two cases with iron deficiency anemia and transient ischemic attacks in this study. Materials and methods: Routine neurologic examination, biochemical screen, serological tests, vasculitic markers, thyroid function tests, vitamin B 12 level, cranial imaging, vertebral carotid doppler USG examination was conducted in the two patients. Anemia of iron deficiency was found as the only risk factor for TIA and the two patients were treated with replacement of iron and antiagregan therapy. Neurological examination revealed no abnormality through the two years of follow-up. The iron deficiency anemia may be cause of many neurologic problems such a irritability, lethargy, headache, development retardation except from T‹A. In the iron deficiency anemia, early diagnosis and treatment is important

  15. The multiple imputation method: a case study involving secondary data analysis.

    Walani, Salimah R; Cleland, Charles M

    2015-05-01

    To illustrate with the example of a secondary data analysis study the use of the multiple imputation method to replace missing data. Most large public datasets have missing data, which need to be handled by researchers conducting secondary data analysis studies. Multiple imputation is a technique widely used to replace missing values while preserving the sample size and sampling variability of the data. The 2004 National Sample Survey of Registered Nurses. The authors created a model to impute missing values using the chained equation method. They used imputation diagnostics procedures and conducted regression analysis of imputed data to determine the differences between the log hourly wages of internationally educated and US-educated registered nurses. The authors used multiple imputation procedures to replace missing values in a large dataset with 29,059 observations. Five multiple imputed datasets were created. Imputation diagnostics using time series and density plots showed that imputation was successful. The authors also present an example of the use of multiple imputed datasets to conduct regression analysis to answer a substantive research question. Multiple imputation is a powerful technique for imputing missing values in large datasets while preserving the sample size and variance of the data. Even though the chained equation method involves complex statistical computations, recent innovations in software and computation have made it possible for researchers to conduct this technique on large datasets. The authors recommend nurse researchers use multiple imputation methods for handling missing data to improve the statistical power and external validity of their studies.

  16. Magnetic resonance appearance of monoclonal gammopathies of unknown significance and multiple myeloma. The GRI Study Group.

    Bellaïche, L; Laredo, J D; Lioté, F; Koeger, A C; Hamze, B; Ziza, J M; Pertuiset, E; Bardin, T; Tubiana, J M

    1997-11-01

    A prospective multicenter study. To evaluate the use of magnetic resonance imaging, in the differentiation between monoclonal gammopathies of unknown significance and multiple myeloma. Although multiple myeloma has been studied extensively with magnetic resonance imaging, to the authors' knowledge, no study has evaluated the clinical interest of magnetic resonance imaging in the differentiation between monoclonal gammopathies of unknown significance and multiple myeloma. The magnetic resonance examinations of the thoracolumbar spine in 24 patients with newly diagnosed monoclonal gammopathies of unknown significance were compared with those performed in 44 patients with newly diagnosed nontreated multiple myeloma. All findings on magnetic resonance examination performed in patients with monoclonal gammopathies of unknown significance were normal, whereas findings on 38 (86%) of the 44 magnetic resonance examinations performed in patients with multiple myeloma were abnormal. Magnetic resonance imaging can be considered as an additional diagnostic tool in differentiating between monoclonal gammopathies of unknown significance and multiple myeloma, which may be helpful when routine criteria are not sufficient. An abnormal finding on magnetic resonance examination in a patient with monoclonal gammopathies of unknown significance should suggest the diagnosis of multiple myeloma after other causes of marrow signal abnormalities are excluded. Magnetic resonance imaging also may be proposed in the long-term follow-up of monoclonal gammopathies of unknown significance when a new biologic or clinical event suggests the diagnosis of malignant monoclonal gammopathy.

  17. Capacity and optimal collusion attack channels for Gaussian fingerprinting games

    Wang, Ying; Moulin, Pierre

    2007-02-01

    In content fingerprinting, the same media covertext - image, video, audio, or text - is distributed to many users. A fingerprint, a mark unique to each user, is embedded into each copy of the distributed covertext. In a collusion attack, two or more users may combine their copies in an attempt to "remove" their fingerprints and forge a pirated copy. To trace the forgery back to members of the coalition, we need fingerprinting codes that can reliably identify the fingerprints of those members. Researchers have been focusing on designing or testing fingerprints for Gaussian host signals and the mean square error (MSE) distortion under some classes of collusion attacks, in terms of the detector's error probability in detecting collusion members. For example, under the assumptions of Gaussian fingerprints and Gaussian attacks (the fingerprinted signals are averaged and then the result is passed through a Gaussian test channel), Moulin and Briassouli1 derived optimal strategies in a game-theoretic framework that uses the detector's error probability as the performance measure for a binary decision problem (whether a user participates in the collusion attack or not); Stone2 and Zhao et al. 3 studied average and other non-linear collusion attacks for Gaussian-like fingerprints; Wang et al. 4 stated that the average collusion attack is the most efficient one for orthogonal fingerprints; Kiyavash and Moulin 5 derived a mathematical proof of the optimality of the average collusion attack under some assumptions. In this paper, we also consider Gaussian cover signals, the MSE distortion, and memoryless collusion attacks. We do not make any assumption about the fingerprinting codes used other than an embedding distortion constraint. Also, our only assumptions about the attack channel are an expected distortion constraint, a memoryless constraint, and a fairness constraint. That is, the colluders are allowed to use any arbitrary nonlinear strategy subject to the above

  18. Multiple operating system rotation environment moving target defense

    Evans, Nathaniel; Thompson, Michael

    2016-03-22

    Systems and methods for providing a multiple operating system rotation environment ("MORE") moving target defense ("MTD") computing system are described. The MORE-MTD system provides enhanced computer system security through a rotation of multiple operating systems. The MORE-MTD system increases attacker uncertainty, increases the cost of attacking the system, reduces the likelihood of an attacker locating a vulnerability, and reduces the exposure time of any located vulnerability. The MORE-MTD environment is effectuated by rotation of the operating systems at a given interval. The rotating operating systems create a consistently changing attack surface for remote attackers.

  19. Influence of climate factors on emergency visits for childhood asthma attack.

    Hashimoto, Mitsuo; Fukuda, Taiki; Shimizu, Tetsuya; Watanabe, Shou; Watanuki, Satoshi; Eto, Yoshikatsu; Urashima, Mitsuyoshi

    2004-02-01

    Asthma attack shows strong seasonality. The purpose of the present study was to quantify the contribution of climate variables and other seasonal factors on the incidence of emergency visits for childhood asthma in Tokyo, Japan. The number of children who visited emergency rooms at Jikei university hospitals in Tokyo during 1998-2002 (5559 visits) was retrieved retrospectively from files from the Department of Pediatrics, and compared with 45 climate parameters from the Meteorological Agency using multiple regression models with a stepwise backward elimination approach. The number of visits (3.7 +/- 3.1) per night increased significantly when climate conditions showed a rapid decrease from higher barometric pressure, from higher air temperature and from higher humidity, as well as lower wind speed. The best-fit model demonstrated that a 22% variation in the number of visits was explained by a linear relationship with 12 climate variables, which increased to 36% after adjusting for calendar month and day of the week. Moreover, when the number of asthma visits was cut off at nine per night, the area under the receiver operator characteristics curve was 0.91 (95% CI: 0.89-0.94) in the multiple logistic regression model using the same variables. These results suggest that these models might quantify contributions of specific climate conditions and other seasonal factors on the number of emergency visits per night for childhood asthma attack in Tokyo, Japan.

  20. SYN Flood Attack Detection in Cloud Computing using Support Vector Machine

    Zerina Mašetić

    2017-11-01

    Full Text Available Cloud computing is a trending technology, as it reduces the cost of running a business. However, many companies are skeptic moving about towards cloud due to the security concerns. Based on the Cloud Security Alliance report, Denial of Service (DoS attacks are among top 12 attacks in the cloud computing. Therefore, it is important to develop a mechanism for detection and prevention of these attacks. The aim of this paper is to evaluate Support Vector Machine (SVM algorithm in creating the model for classification of DoS attacks and normal network behaviors. The study was performed in several phases: a attack simulation, b data collection, cfeature selection, and d classification. The proposedmodel achieved 100% classification accuracy with true positive rate (TPR of 100%. SVM showed outstanding performance in DoS attack detection and proves that it serves as a valuable asset in the network security area.