WorldWideScience

Sample records for non-targeted malicious email

  1. Detecting and combating malicious email

    CERN Document Server

    Ryan, Julie JCH

    2014-01-01

    Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute the malicious activity vary widely, from fully manual (e.g. human-directed) to fully automated. One example of a malicious email is one that contains an attachment which the recipient is directed to open. When the attachment is opened, malicious software is installed on the recipient's computer. Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The education of all users to detect potential malicious email is important to containing the threat and limiting the damage. It is increasingly necessary for all email users to understand how to recognize and combat malicious email. Detecting and Combating Malicious Email describes the different types of malicious email, shows how to differentiate malicious email from benign email, and suggest protective strategies for both perso...

  2. Detecting Targeted Malicious Email through Supervised Classification of Persistent Threat and Recipient Oriented Features

    Science.gov (United States)

    Amin, Rohan Mahesh

    2010-01-01

    Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…

  3. Detecting Malicious Content on Facebook

    OpenAIRE

    Dewan, Prateek; Kumaraguru, Ponnurangam

    2015-01-01

    Online Social Networks (OSNs) witness a rise in user activity whenever an event takes place. Malicious entities exploit this spur in user-engagement levels to spread malicious content that compromises system reputation and degrades user experience. It also generates revenue from advertisements, clicks, etc. for the malicious entities. Facebook, the world's biggest social network, is no exception and has recently been reported to face much abuse through scams and other type of malicious conten...

  4. Indicators of Malicious SSL Connections

    NARCIS (Netherlands)

    Bortolameotti, Riccardo; Peter, Andreas; Everts, Maarten Hinderik; Bolzoni, D.

    2015-01-01

    Internet applications use SSL to provide data confidential- ity to communicating entities. The use of encryption in SSL makes it impossible to distinguish between benign and malicious connections as the content cannot be inspected. Therefore, we propose and evaluate a set of indicators for malicious

  5. Indicators of malicious SSL connections

    NARCIS (Netherlands)

    Bortolameotti, R.; Peter, A.; Everts, M.H.; Bolzoni, D.

    2015-01-01

    Internet applications use SSL to provide data confidentiality to communicating entities. The use of encryption in SSL makes it impossible to distinguish between benign and malicious connections as the content cannot be inspected. Therefore, we propose and evaluate a set of indicators for malicious

  6. Email Updates

    Science.gov (United States)

    ... of this page: https://medlineplus.gov/listserv.html Email Updates To use the sharing features on this ... view your email history or unsubscribe. Prevent MedlinePlus emails from being marked as "spam" or "junk" To ...

  7. Email Negotiation

    OpenAIRE

    Bülow, Anne Marie

    2010-01-01

    This paper investigates a set of email negotiations in order to explain a high number of deadlocks. The paper argues that one reason is the combination of cognitive effort characteristic of the e-mail genre, and the argumentative pattern found when two parties simultaneously try to persuade the other of the justice of their cause. For a negotiation involving the wording of a contract, the evidence suggests that, while there is a distinct advantage in the features of reviewability and revis...

  8. Email Negotiation

    DEFF Research Database (Denmark)

    Bülow, Anne Marie

    the other of the justice of their cause. For a negotiation involving the wording of a contract, the evidence suggests that, while there is a distinct advantage in the features of reviewability and revisablity, the email format allows selective attention to the other party’s arguments, which can be shown...

  9. Therapeutic emails

    Directory of Open Access Journals (Sweden)

    Sinkule Jennifer

    2007-02-01

    Full Text Available Abstract Background In this paper, we show how counselors and psychologists can use emails for online management of substance abusers, including the anatomy and content of emails that clinicians should send substance abusers. Some investigators have attempted to determine if providing mental health services online is an efficacious delivery of treatment. The question of efficacy is an empirical issue that cannot be settled unless we are explicitly clear about the content and nature of online treatment. We believe that it is not the communications via internet that matters, but the content of these communications. The purpose of this paper is to provide the content of our online counseling services so others can duplicate the work and investigate its efficacy. Results We have managed nearly 300 clients online for recovery from substance abuse. Treatment included individual counseling (motivational interviewing, cognitive-behavior therapy, relapse prevention assignments, participation in an electronic support group and the development of a recovery team. Our findings of success with these interventions are reported elsewhere. Our experience has led to development of a protocol of care that is described more fully in this paper. This protocol is based on stages of change and relapse prevention theories and follows a Motivational Interviewing method of counseling. Conclusion The use of electronic media in providing mental health treatment remains controversial due to concerns about confidentiality, security and legal considerations. More research is needed to validate and generalize the use of online treatment for mental health problems. If researchers have to build on each others work, it is paramount that we share our protocols of care, as we have done in this paper.

  10. Detecting Malicious Code by Binary File Checking

    Directory of Open Access Journals (Sweden)

    Marius POPA

    2014-01-01

    Full Text Available The object, library and executable code is stored in binary files. Functionality of a binary file is altered when its content or program source code is changed, causing undesired effects. A direct content change is possible when the intruder knows the structural information of the binary file. The paper describes the structural properties of the binary object files, how the content can be controlled by a possible intruder and what the ways to identify malicious code in such kind of files. Because the object files are inputs in linking processes, early detection of the malicious content is crucial to avoid infection of the binary executable files.

  11. Detection of Malicious Flash Banner Advertisements

    Directory of Open Access Journals (Sweden)

    Kirill Alekseevich Samosadnyy

    2014-09-01

    Full Text Available The paper addresses the problem of detecting malicious flash advertisements. As a result, detection method based on dynamic analysis that modify flash application and execute it in Adobe Flash player is proposed and evaluated on synthetic and real world examples.

  12. Awareness of Malicious Social Engineering among Facebook Users

    Science.gov (United States)

    Slonka, Kevin J.

    2014-01-01

    With the rapid growth of Facebook, the social networking website is becoming a lucrative target for malicious activity. Users of Facebook therefore should be aware of various malicious attacks and know how to identify them. This research analyzed Facebook users' level of understanding in the domain of malicious social engineering on Facebook. The…

  13. A Study of Preventing Email (Spear) Phishing by Enabling Human Intelligence

    NARCIS (Netherlands)

    M.S. Bargh; A. Padmos; R. Choenni; F. Jansen; N. Stembert

    2015-01-01

    Cyber criminals use phishing emails in high-volume and spear phishing emails in low volume to achieve their malicious objectives. Hereby they inflict financial, reputational, and emotional damages on individuals and organizations. These (spear) phishing attacks get steadily more sophisticated as

  14. Product Offerings in Malicious Hacker Markets

    OpenAIRE

    Marin, Ericsson; Diab, Ahmad; Shakarian, Paulo

    2016-01-01

    Marketplaces specializing in malicious hacking products - including malware and exploits - have recently become more prominent on the darkweb and deepweb. We scrape 17 such sites and collect information about such products in a unified database schema. Using a combination of manual labeling and unsupervised clustering, we examine a corpus of products in order to understand their various categories and how they become specialized with respect to vendor and marketplace. This initial study prese...

  15. Finding Malicious Cyber Discussions in Social Media

    Science.gov (United States)

    2016-02-02

    reverse engineering, security, malware , blackhat) were labeled as cyber and posts on non- cyber topics (e.g., astronomy, electronics, beer, biology, mu...firewall, hash, infect, inject, install, key, malicious, malware , network, obfuscate, overflow, packet, password, payload, request, risk, scan, script...cyber vulnerabilities (e.g., malware , overflow, attack). The keyword system lacked the keywords used in Heartbleed discussions, and thus suffered from

  16. Android Malware Clustering through Malicious Payload Mining

    OpenAIRE

    Li, Yuping; Jang, Jiyong; Hu, Xin; Ou, Xinming

    2017-01-01

    Clustering has been well studied for desktop malware analysis as an effective triage method. Conventional similarity-based clustering techniques, however, cannot be immediately applied to Android malware analysis due to the excessive use of third-party libraries in Android application development and the widespread use of repackaging in malware development. We design and implement an Android malware clustering system through iterative mining of malicious payload and checking whether malware s...

  17. Are blockchains immune to all malicious attacks?

    OpenAIRE

    Xu, Jennifer J.

    2016-01-01

    Background: In recent years, blockchain technology has attracted considerable attention. It records cryptographic transactions in a public ledger that is difficult to alter and compromise because of the distributed consensus. As a result, blockchain is believed to resist fraud and hacking. Results: This work explores the types of fraud and malicious activities that can be prevented by blockchain technology and identifies attacks to which blockchain remains vulnerable. Conclusions: This study ...

  18. Non-targeted effects of ionising radiation

    International Nuclear Information System (INIS)

    Belyakov, O.V.

    2008-01-01

    The universality of the target theory of radiation-induced effects is challenged by observations on non-targeted effects such as bystander effects and genomic instability. Essential features of non-targeted effects are that they do not require direct nuclear exposure by radiation and they are particularly significant at low doses. This new evidence suggests a need for a new paradigm in radiation biology. The new paradigm would cover both the classical (targeted) and the non-targeted effects. New aspects include the role of cellular communication and tissue-level responses. A better understanding of non-targeted effects may have important consequences for health risk assessment and, consequently, on radiation protection. Non-targeted effects may contribute to the estimation of cancer risk from occupational, medical and environmental exposures. In particular, they may have implications for the applicability of the Linear-No-Threshold (LNT) model in extrapolating radiation risk data into the low-dose region. This also means that the adequacy of the concept of dose to estimate risk is challenged by these findings. Moreover, these effects may provide new mechanistic explanations for the development of non-cancer diseases. Further research is required to determine if these effects, typically measured in cell cultures, are applicable in tissue level, whole animals, and ultimately in humans. (orig.)

  19. Email shape analysis

    OpenAIRE

    Sroufe, Paul; Phithakkitnukoon, Santi; Dantu, Ram; Cangussu, João

    2010-01-01

    Email has become an integral part of everyday life. Without a second thought we receive bills, bank statements, and sales promotions all to our inbox. Each email has hidden features that can be extracted. In this paper, we present a new mechanism to characterize an email without using content or context called Email Shape Analysis. We explore the applications of the email shape by carrying out a case study; botnet detection and two possible applications: spam filtering, and social-context bas...

  20. Characterizing and Measuring Maliciousness for Cybersecurity Risk Assessment

    Directory of Open Access Journals (Sweden)

    Zoe M. King

    2018-02-01

    Full Text Available Cyber attacks have been increasingly detrimental to networks, systems, and users, and are increasing in number and severity globally. To better predict system vulnerabilities, cybersecurity researchers are developing new and more holistic approaches to characterizing cybersecurity system risk. The process must include characterizing the human factors that contribute to cyber security vulnerabilities and risk. Rationality, expertise, and maliciousness are key human characteristics influencing cyber risk within this context, yet maliciousness is poorly characterized in the literature. There is a clear absence of literature pertaining to human factor maliciousness as it relates to cybersecurity and only limited literature relating to aspects of maliciousness in other disciplinary literatures, such as psychology, sociology, and law. In an attempt to characterize human factors as a contribution to cybersecurity risk, the Cybersecurity Collaborative Research Alliance (CSec-CRA has developed a Human Factors risk framework. This framework identifies the characteristics of an attacker, user, or defender, all of whom may be adding to or mitigating against cyber risk. The maliciousness literature and the proposed maliciousness assessment metrics are discussed within the context of the Human Factors Framework and Ontology. Maliciousness is defined as the intent to harm. Most maliciousness cyber research to date has focused on detecting malicious software but fails to analyze an individual’s intent to do harm to others by deploying malware or performing malicious attacks. Recent efforts to identify malicious human behavior as it relates to cybersecurity, include analyzing motives driving insider threats as well as user profiling analyses. However, cyber-related maliciousness is neither well-studied nor is it well understood because individuals are not forced to expose their true selves to others while performing malicious attacks. Given the difficulty of

  1. Characterizing and Measuring Maliciousness for Cybersecurity Risk Assessment.

    Science.gov (United States)

    King, Zoe M; Henshel, Diane S; Flora, Liberty; Cains, Mariana G; Hoffman, Blaine; Sample, Char

    2018-01-01

    Cyber attacks have been increasingly detrimental to networks, systems, and users, and are increasing in number and severity globally. To better predict system vulnerabilities, cybersecurity researchers are developing new and more holistic approaches to characterizing cybersecurity system risk. The process must include characterizing the human factors that contribute to cyber security vulnerabilities and risk. Rationality, expertise, and maliciousness are key human characteristics influencing cyber risk within this context, yet maliciousness is poorly characterized in the literature. There is a clear absence of literature pertaining to human factor maliciousness as it relates to cybersecurity and only limited literature relating to aspects of maliciousness in other disciplinary literatures, such as psychology, sociology, and law. In an attempt to characterize human factors as a contribution to cybersecurity risk, the Cybersecurity Collaborative Research Alliance (CSec-CRA) has developed a Human Factors risk framework. This framework identifies the characteristics of an attacker, user, or defender, all of whom may be adding to or mitigating against cyber risk. The maliciousness literature and the proposed maliciousness assessment metrics are discussed within the context of the Human Factors Framework and Ontology. Maliciousness is defined as the intent to harm. Most maliciousness cyber research to date has focused on detecting malicious software but fails to analyze an individual's intent to do harm to others by deploying malware or performing malicious attacks. Recent efforts to identify malicious human behavior as it relates to cybersecurity, include analyzing motives driving insider threats as well as user profiling analyses. However, cyber-related maliciousness is neither well-studied nor is it well understood because individuals are not forced to expose their true selves to others while performing malicious attacks. Given the difficulty of interviewing malicious

  2. Characterizing and Measuring Maliciousness for Cybersecurity Risk Assessment

    Science.gov (United States)

    King, Zoe M.; Henshel, Diane S.; Flora, Liberty; Cains, Mariana G.; Hoffman, Blaine; Sample, Char

    2018-01-01

    Cyber attacks have been increasingly detrimental to networks, systems, and users, and are increasing in number and severity globally. To better predict system vulnerabilities, cybersecurity researchers are developing new and more holistic approaches to characterizing cybersecurity system risk. The process must include characterizing the human factors that contribute to cyber security vulnerabilities and risk. Rationality, expertise, and maliciousness are key human characteristics influencing cyber risk within this context, yet maliciousness is poorly characterized in the literature. There is a clear absence of literature pertaining to human factor maliciousness as it relates to cybersecurity and only limited literature relating to aspects of maliciousness in other disciplinary literatures, such as psychology, sociology, and law. In an attempt to characterize human factors as a contribution to cybersecurity risk, the Cybersecurity Collaborative Research Alliance (CSec-CRA) has developed a Human Factors risk framework. This framework identifies the characteristics of an attacker, user, or defender, all of whom may be adding to or mitigating against cyber risk. The maliciousness literature and the proposed maliciousness assessment metrics are discussed within the context of the Human Factors Framework and Ontology. Maliciousness is defined as the intent to harm. Most maliciousness cyber research to date has focused on detecting malicious software but fails to analyze an individual’s intent to do harm to others by deploying malware or performing malicious attacks. Recent efforts to identify malicious human behavior as it relates to cybersecurity, include analyzing motives driving insider threats as well as user profiling analyses. However, cyber-related maliciousness is neither well-studied nor is it well understood because individuals are not forced to expose their true selves to others while performing malicious attacks. Given the difficulty of interviewing

  3. Enhancement of Email Security in Nuclear Malaysia

    International Nuclear Information System (INIS)

    Mohd Fauzi Haris; Raja Murzaferi Raja Moktar; Saaidi Ismail; Mohd Dzul Aiman Aslan; Mohamad Safuan Sulaiman

    2013-01-01

    Task to protect network and data security is not simple and easy. The more advance ICT technology available in the market, the more dependability to the knowledge, skills and appropriate tools would be in order one to cater these threats. Cyber security threats can be considered almost impossible to be demolished or at least to be avoided totally and what we really need is technical capabilities that may include appropriate knowledge and tools to reduce the cyber threats in the organization. Email is one of the important today's application that is being used by many people all around the globe either they are in corporate organizations, government bodies, students and teachers. The total number of worldwide email accounts is expected to increase from 3.3 billion accounts in 2012 to over 4.3 billion accounts by year-end 2016. This represents an average annual growth rate of 6% over the next four years [1]. Parallel with the increment of the usage, number of abusive and misuse of the email is also reported either in the form of spamming, delivery of malicious file attachments, phishing and others. These show the importance to tighten up the security of the email. This paper will discuss and share actions that have been taken by IT Center to enhance the security of official email application. (author)

  4. Defending Malicious Script Attacks Using Machine Learning Classifiers

    Directory of Open Access Journals (Sweden)

    Nayeem Khan

    2017-01-01

    Full Text Available The web application has become a primary target for cyber criminals by injecting malware especially JavaScript to perform malicious activities for impersonation. Thus, it becomes an imperative to detect such malicious code in real time before any malicious activity is performed. This study proposes an efficient method of detecting previously unknown malicious java scripts using an interceptor at the client side by classifying the key features of the malicious code. Feature subset was obtained by using wrapper method for dimensionality reduction. Supervised machine learning classifiers were used on the dataset for achieving high accuracy. Experimental results show that our method can efficiently classify malicious code from benign code with promising results.

  5. Spoiled Onions: Exposing Malicious Tor Exit Relays

    OpenAIRE

    Winter, Philipp; Lindskog, Stefan

    2014-01-01

    Several hundred Tor exit relays together push more than 1 GiB/s of network traffic. However, it is easy for exit relays to snoop and tamper with anonymised network traffic and as all relays are run by independent volunteers, not all of them are innocuous. In this paper, we seek to expose malicious exit relays and document their actions. First, we monitored the Tor network after developing a fast and modular exit relay scanner. We implemented several scanning modules for detecting common attac...

  6. E-mail marketing

    OpenAIRE

    Jurnečková, Jana

    2014-01-01

    The thesis deals with e-mail marketing. It focuses on identifying factors that affect the behavior of users of e-mail and newsletter subscribers. It evaluates the role of e-mail marketing as a part of communication mix of companies and e-shops, current trends, e-mail campaigns, e-mail marketing software provider. To study the behavior of users of e-mail and newsletter subscribers a questionnaire survey was conducted on a sample of 610 respondents and in-depth interviews (n = 30). Content anal...

  7. An Approach for Detecting Malicious Emails Using Runtime Monitoring with Hidden Data

    Science.gov (United States)

    2016-09-01

    Management and Budget, Paperwork Reduction Project (0704-0188) Washington, DC 20503. 1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE September 2016...awareness of conditions, a quality mentioned in the Fiskiran and Lee’s paper [3]. In addition, by using temporal assertions, we demonstrate the detection of...requirements [18]. For example, we give a generalization of how natural language can be ambiguous. No restaurants will allow smoking inside. Here no

  8. Analysis of Malicious Traffic in Modbus/TCP Communications

    Science.gov (United States)

    Kobayashi, Tiago H.; Batista, Aguinaldo B.; Medeiros, João Paulo S.; Filho, José Macedo F.; Brito, Agostinho M.; Pires, Paulo S. Motta

    This paper presents the results of our analysis about the influence of Information Technology (IT) malicious traffic on an IP-based automation environment. We utilized a traffic generator, called MACE (Malicious trAffic Composition Environment), to inject malicious traffic in a Modbus/TCP communication system and a sniffer to capture and analyze network traffic. The realized tests show that malicious traffic represents a serious risk to critical information infrastructures. We show that this kind of traffic can increase latency of Modbus/TCP communication and that, in some cases, can put Modbus/TCP devices out of communication.

  9. Development of a Malicious Insider Composite Vulnerability Assessment Methodology

    National Research Council Canada - National Science Library

    King, William H

    2006-01-01

    .... There are very few vulnerability and impact models capable of providing information owners with the ability to comprehensively assess the effectiveness an organization's malicious insider mitigation strategies...

  10. Malicious Cognitive User Identification Algorithm in Centralized Spectrum Sensing System

    Directory of Open Access Journals (Sweden)

    Jingbo Zhang

    2017-11-01

    Full Text Available Collaborative spectral sensing can fuse the perceived results of multiple cognitive users, and thus will improve the accuracy of perceived results. However, the multi-source features of the perceived results result in security problems in the system. When there is a high probability of a malicious user attack, the traditional algorithm can correctly identify the malicious users. However, when the probability of attack by malicious users is reduced, it is almost impossible to use the traditional algorithm to correctly distinguish between honest users and malicious users, which greatly reduces the perceived performance. To address the problem above, based on the β function and the feedback iteration mathematical method, this paper proposes a malicious user identification algorithm under multi-channel cooperative conditions (β-MIAMC, which involves comprehensively assessing the cognitive user’s performance on multiple sub-channels to identify the malicious user. Simulation results show under the same attack probability, compared with the traditional algorithm, the β-MIAMC algorithm can more accurately identify the malicious users, reducing the false alarm probability of malicious users by more than 20%. When the attack probability is greater than 7%, the proposed algorithm can identify the malicious users with 100% certainty.

  11. Hacked E-mail

    Science.gov (United States)

    ... your email address was “spoofed,” or faked, and hackers don’t actually have access to your account. ... use public Wi-Fi .) Tagged with: antivirus , email , hacker , imposter , password , phishing , scam , social networking July 2013 ...

  12. Efektivitas Email Untuk Pemasaran

    OpenAIRE

    Oetomo, Budi Sutedjo Dharma

    2009-01-01

    Lebih dari 500 juta orang dan badan USAha telah tergabung di internet. Pada umumnya, mereka telah terbiasa untuk memanfaatkan fitur dan aplikasi yang tersedia di internet, seperti email, mailing list, web, blog dan situs jejaring sosial. Diantara fitur dan aplikasi internet itu yang hampir digunakan oleh setiap orang dan badan USAha adalah email, karena mereka telah memiliki alamat email, bahkan lebih dari satu buah. Kini, fitur email telah dimanfaatkan untuk kegiatan pemasaran, khususnya pro...

  13. RECEIVING UNWANTED EMAIL?

    CERN Multimedia

    Denise Heagerty

    2002-01-01

    Unsolicited email, commonly known as SPAM, is a growing problem across the Internet at large. You are recommended to delete it. If the email looks suspicious, do not even open it (from Outlook you can delete email using the right button of your mouse to select the message and then selecting delete). Viruses are often hidden inside attachments, so do not open attachments in unsolicited email. SPAM and virus emails can be disguised to trick you into reading the email and/or performing an action. Here are examples of some techniques to help you recognise them: fake email addresses: emails can appear to be from people you know or even from yourself. Your own email address can appear in emails which you did not send, resulting in non-delivery messages or unexpected replies. Fake addresses may be used to send viruses. If the email looks suspicious then delete it and do not open the attachments. If you are unsure then check with the sender first. enticing subjects: the email subject uses words to make you curious...

  14. A Probabilistic Analysis Framework for Malicious Insider Threats

    DEFF Research Database (Denmark)

    Chen, Taolue; Kammuller, Florian; Nemli, Ibrahim

    2015-01-01

    Malicious insider threats are difficult to detect and to mitigate. Many approaches for explaining behaviour exist, but there is little work to relate them to formal approaches to insider threat detection. In this work we present a general formal framework to perform analysis for malicious insider...

  15. Fluctuations in email size

    Science.gov (United States)

    Matsubara, Yoshitsugu; Musashi, Yasuo

    2017-12-01

    The purpose of this study is to explain fluctuations in email size. We have previously investigated the long-term correlations between email send requests and data flow in the system log of the primary staff email server at a university campus, finding that email size frequency follows a power-law distribution with two inflection points, and that the power-law property weakens the correlation of the data flow. However, the mechanism underlying this fluctuation is not completely understood. We collected new log data from both staff and students over six academic years and analyzed the frequency distribution thereof, focusing on the type of content contained in the emails. Furthermore, we obtained permission to collect "Content-Type" log data from the email headers. We therefore collected the staff log data from May 1, 2015 to July 31, 2015, creating two subdistributions. In this paper, we propose a model to explain these subdistributions, which follow log-normal-like distributions. In the log-normal-like model, email senders -consciously or unconsciously- regulate the size of new email sentences according to a normal distribution. The fitting of the model is acceptable for these subdistributions, and the model demonstrates power-law properties for large email sizes. An analysis of the length of new email sentences would be required for further discussion of our model; however, to protect user privacy at the participating organization, we left this analysis for future work. This study provides new knowledge on the properties of email sizes, and our model is expected to contribute to the decision on whether to establish upper size limits in the design of email services.

  16. E-mail marketing

    OpenAIRE

    TŮMOVÁ, Kateřina

    2012-01-01

    The aim of this work is to specify the e-mail marketing and in the practical application to evaluate the pros and cons of e-mail marketing as a tool of targeted marketing communication.Based on personal interviews with representatives of the company was described their existing e-mail marketing.Through the survey it was found, how customers perceive the company's e-mail marketing.Based on the survey, changes were proposed at the end of the thesis.

  17. Abnormally Malicious Autonomous Systems and their Internet Connectivity

    Energy Technology Data Exchange (ETDEWEB)

    Shue, Craig A [ORNL; Kalafut, Prof. Andrew [Grand Valley State University (GVSU), Michigan; Gupta, Prof. Minaxi [Indiana University

    2011-01-01

    While many attacks are distributed across botnets, investigators and network operators have recently targeted malicious networks through high profile autonomous system (AS) de-peerings and network shut-downs. In this paper, we explore whether some ASes indeed are safe havens for malicious activity. We look for ISPs and ASes that exhibit disproportionately high malicious behavior using ten popular blacklists, plus local spam data, and extensive DNS resolutions based on the contents of the blacklists. We find that some ASes have over 80% of their routable IP address space blacklisted. Yet others account for large fractions of blacklisted IP addresses. Several ASes regularly peer with ASes associated with significant malicious activity. We also find that malicious ASes as a whole differ from benign ones in other properties not obviously related to their malicious activities, such as more frequent connectivity changes with their BGP peers. Overall, we conclude that examining malicious activity at AS granularity can unearth networks with lax security or those that harbor cybercrime.

  18. FNAL central email systems

    Energy Technology Data Exchange (ETDEWEB)

    Schmidt, Jack; Lilianstrom, Al; Pasetes, Ray; Hill, Kevin; /Fermilab

    2004-10-01

    The FNAL Email System is the primary point of entry for email destined for an employee or user at Fermilab. This centrally supported system is designed for reliability and availability. It uses multiple layers of protection to help ensure that: (1) SPAM messages are tagged properly; (2) All mail is inspected for viruses; and (3) Valid mail gets delivered. This system employs numerous redundant subsystems to accomplish these tasks.

  19. Dynamic detection technology of malicious code for Android system

    Directory of Open Access Journals (Sweden)

    Li Boya

    2017-02-01

    Full Text Available With the increasing popularization of mobile phones,people's dependence on them is rising,the security problems become more and more prominent.According to the calling of the APK file permission and the API function in Android system,this paper proposes a dynamic detecting method based on API interception technology to detect the malicious code.The experimental results show that this method can effectively detect the malicious code in Android system.

  20. Hiding in Plain Sight: The Anatomy of Malicious Facebook Pages

    OpenAIRE

    Dewan, Prateek; Kumaraguru, Ponnurangam

    2015-01-01

    Facebook is the world's largest Online Social Network, having more than 1 billion users. Like most other social networks, Facebook is home to various categories of hostile entities who abuse the platform by posting malicious content. In this paper, we identify and characterize Facebook pages that engage in spreading URLs pointing to malicious domains. We used the Web of Trust API to determine domain reputations of URLs published by pages, and identified 627 pages publishing untrustworthy info...

  1. EmailTime: visual analytics and statistics for temporal email

    Science.gov (United States)

    Erfani Joorabchi, Minoo; Yim, Ji-Dong; Shaw, Christopher D.

    2011-01-01

    Although the discovery and analysis of communication patterns in large and complex email datasets are difficult tasks, they can be a valuable source of information. We present EmailTime, a visual analysis tool of email correspondence patterns over the course of time that interactively portrays personal and interpersonal networks using the correspondence in the email dataset. Our approach is to put time as a primary variable of interest, and plot emails along a time line. EmailTime helps email dataset explorers interpret archived messages by providing zooming, panning, filtering and highlighting etc. To support analysis, it also measures and visualizes histograms, graph centrality and frequency on the communication graph that can be induced from the email collection. This paper describes EmailTime's capabilities, along with a large case study with Enron email dataset to explore the behaviors of email users within different organizational positions from January 2000 to December 2001. We defined email behavior as the email activity level of people regarding a series of measured metrics e.g. sent and received emails, numbers of email addresses, etc. These metrics were calculated through EmailTime. Results showed specific patterns in the use email within different organizational positions. We suggest that integrating both statistics and visualizations in order to display information about the email datasets may simplify its evaluation.

  2. Identification of Malicious Web Pages by Inductive Learning

    Science.gov (United States)

    Liu, Peishun; Wang, Xuefang

    Malicious web pages are an increasing threat to current computer systems in recent years. Traditional anti-virus techniques focus typically on detection of the static signatures of Malware and are ineffective against these new threats because they cannot deal with zero-day attacks. In this paper, a novel classification method for detecting malicious web pages is presented. This method is generalization and specialization of attack pattern based on inductive learning, which can be used for updating and expanding knowledge database. The attack pattern is established from an example and generalized by inductive learning, which can be used to detect unknown attacks whose behavior is similar to the example.

  3. Non-targeted effects of ionising radiation (note). A new European integrated project, 2006-2010

    International Nuclear Information System (INIS)

    Salomaa, S.; Wright, E.G.; Hildebrandt, G.; Kadhim, M.; Little, M.P.; Prise, K.M.; Belyakov, O.V.

    2007-01-01

    Complete text of publication follows. The general objectives of the NOTE project are: (1) to investigate the mechanisms of nontargeted effects, in particular, bystander effects, genomic instability and adaptive response; (2) to investigate if and how non-targeted effects modulate the cancer risk in the low dose region, and whether they relate to protective or harmful functions; (3) to investigate if ionising radiation can cause non-cancer diseases or beneficial effects at low and intermediate doses; (4) to investigate individual susceptibility and other factors modifying non-targeted responses; (5) to assess the relevance of non-targeted effects for radiation protection and to set the scientific basis for a modern, more realistic, radiation safety system; (6) to contribute to the conceptualisation of a new paradigm in radiation biology that would cover both the classical direct (DNA-targeted) and non-targeted (indirect) effects. The NOTE brings together 19 major European and Canadian groups involved in the discovery, characterisation and mechanistic investigation of non-targeted effects of ionising radiation in cellular, tissue and animal models. The NOTE research activities are organised in six work packages. Four work packages (WPs 2-5) are problem-oriented, focussing on major questions relevant for the scientific basis of the system of radiation protection: WP2 Mechanisms of non-targeted effects, WP3 Non-cancer diseases, WP4 Factors modifying non-targeted responses, WP5 Modelling of non-targeted effects. The integration activities provided by WP6 strengthen the collaboration by supporting the access to infrastructures, mobility and training. WP7 provides dissemination and exploitation activities in the form of workshops and a public website. Managerial activities (WP1) ensure the organisation and structures for decision making, monitoring of progress, knowledge management and efficient flow of information and financing. Coordinator of the NOTE project is Prof

  4. On the ground truth problem of malicious DNS traffic analysis

    DEFF Research Database (Denmark)

    Stevanovic, Matija; Pedersen, Jens Myrup; D’Alconzo, Alessandro

    2015-01-01

    algorithms at their core. These methods require accurate ground truth of both malicious and benign DNS traffic for model training as well as for the performance evaluation. This paper elaborates on the problem of obtaining such a ground truth and evaluates practices employed by contemporary detection methods...

  5. Computationally Secure Pattern Matching in the Presence of Malicious Adversaries

    DEFF Research Database (Denmark)

    Hazay, Carmit; Toft, Tomas

    2010-01-01

    simulation in the presence of malicious, polynomial-time adversaries (assuming that ElGamal encryption is semantically secure) and exhibits computation and communication costs of O(n + m) in a constant round complexity. In addition to the above, we propose a collection of protocols for variations...

  6. Protect Heterogeneous Environment Distributed Computing from Malicious Code Assignment

    Directory of Open Access Journals (Sweden)

    V. S. Gorbatov

    2011-09-01

    Full Text Available The paper describes the practical implementation of the protection system of heterogeneous environment distributed computing from malicious code for the assignment. A choice of technologies, development of data structures, performance evaluation of the implemented system security are conducted.

  7. Behavior Analysis Usage with Behavior Tures Adoption for Malicious Code Detection on JAVASCRIPT Scenarios Example

    Directory of Open Access Journals (Sweden)

    Y. M. Tumanov

    2010-03-01

    Full Text Available The article offers the method of malicious JavaScript code detection, based on behavior analysis. Conceptions of program behavior, program state, an algorithm of malicious code detection are described.

  8. Uncovering the footprints of malicious traffic in cellular data networks

    OpenAIRE

    Raghuramu, A; Zang, H; Chuah, CN

    2015-01-01

    © Springer International Publishing Switzerland 2015. In this paper, we present a comprehensive characterization of malicious traffic generated by mobile devices using Deep Packet Inspection (DPI) records and security event logs from a large US based cellular provider network. Our analysis reveals that 0.17% of mobile devices in the cellular network are affected by security threats. This proportion, while small, is orders of magnitude higher than the last reported (in 2013) infection rate of ...

  9. E-mail: Outlook Express

    Directory of Open Access Journals (Sweden)

    Zainul Bakri

    2012-10-01

    Full Text Available Salah satu layanan Internet yang sangat penting adalah electronic mail atau sering hanya disebut sebagai e-mail. Untuk menggunakan e-mail, diperlukan piranti lunak khusus supaya pengguna dapat mengirim dan menerima e-mail. Jenis piranti lunak e-mail diantaranya adalah Outlook Express yang merupakan satu paket yang didistribusikan bersama Internet Explorer versi 4. Piranti lunak ini dijalankan pada PC yang mempunyai sistem operasi Windows 95 atau 98. Jenis piranti lunak e-mail yang lain adalah Eudora, Pegasus dan sebagainya. Bahkan ada yang diintegrasikan dengan Web Browser (alat untuk menelusuri situs Web misalnya IE,dan Netscape.Sebagai layaknya pelayanan pos, maka setiap pengguna e-mail mempunyai alamat tertentu yang tidak mungkin dipunyai oleh pengguna lainnya diseluruh dunia. Untuk keperluan pendistribusian, maka e-mail mempunyai semacam kantor pos yang ditempatkan dalam sebuah komputer server (mail server atau sering disebut sebagai host. 

  10. Studies of Non-Targeted Effects of Ionising Radiation

    International Nuclear Information System (INIS)

    Oleg V Belyakov; Heli Mononen; Marjo Peraelae

    2006-01-01

    The discovery of ionising radiation induced non-targeted effects is important for understanding the dose-response mechanisms relevant to low dose irradiation in vivo. One important question is whether the non-targeted effects relates to a protective mechanism or whether, conversely, it amplifies the number of cells damaged by the isolated radiation tracks of low dose exposures leading to an increased risk of carcinogenesis. One theory supported by the experimental data obtained during this project is that the main functions of the non-targeted effects are to decrease the risk of transformation in a multicellular organism exposed to radiation. Differences in the gene expression profiles, temporal and spatial patterns of key proteins expressed in directly irradiated and bystander cells may determine how the cells ultimately respond to low doses of radiation. Such a mechanism of co-operative response would make the tissue system much more robust. (N.C.)

  11. Studies of Non-Targeted Effects of Ionising Radiation

    Energy Technology Data Exchange (ETDEWEB)

    Oleg V Belyakov; Heli Mononen; Marjo Peraelae [STUK - Radiation and Nuclear Safety Authority, Helsinki (Finland)

    2006-07-01

    The discovery of ionising radiation induced non-targeted effects is important for understanding the dose-response mechanisms relevant to low dose irradiation in vivo. One important question is whether the non-targeted effects relates to a protective mechanism or whether, conversely, it amplifies the number of cells damaged by the isolated radiation tracks of low dose exposures leading to an increased risk of carcinogenesis. One theory supported by the experimental data obtained during this project is that the main functions of the non-targeted effects are to decrease the risk of transformation in a multicellular organism exposed to radiation. Differences in the gene expression profiles, temporal and spatial patterns of key proteins expressed in directly irradiated and bystander cells may determine how the cells ultimately respond to low doses of radiation. Such a mechanism of co-operative response would make the tissue system much more robust. (N.C.)

  12. Behavioral biometrics for verification and recognition of malicious software agents

    Science.gov (United States)

    Yampolskiy, Roman V.; Govindaraju, Venu

    2008-04-01

    Homeland security requires technologies capable of positive and reliable identification of humans for law enforcement, government, and commercial applications. As artificially intelligent agents improve in their abilities and become a part of our everyday life, the possibility of using such programs for undermining homeland security increases. Virtual assistants, shopping bots, and game playing programs are used daily by millions of people. We propose applying statistical behavior modeling techniques developed by us for recognition of humans to the identification and verification of intelligent and potentially malicious software agents. Our experimental results demonstrate feasibility of such methods for both artificial agent verification and even for recognition purposes.

  13. Predicting malicious behavior tools and techniques for ensuring global security

    CERN Document Server

    Jackson, Gary M

    2012-01-01

    A groundbreaking exploration of how to identify and fight security threats at every level This revolutionary book combines real-world security scenarios with actual tools to predict and prevent incidents of terrorism, network hacking, individual criminal behavior, and more. Written by an expert with intelligence officer experience who invented the technology, it explores the keys to understanding the dark side of human nature, various types of security threats (current and potential), and how to construct a methodology to predict and combat malicious behavior. The companion CD demonstrates ava

  14. Common Knowledge in Email Exchanges

    NARCIS (Netherlands)

    Sietsma, F.; Apt, K.R.

    We consider a framework in which a group of agents communicates by means of emails, with the possibility of replies, forwards and blind carbon copies (BCC). We study the epistemic consequences of such email exchanges by introducing an appropriate epistemic language and semantics. This allows us to

  15. Common knowledge in email exchanges

    NARCIS (Netherlands)

    Sietsma, F.; Apt, K.R.

    2011-01-01

    We consider a framework in which a group of agents communicates by means of emails, with the possibility of replies, forwards and blind carbon copies (BCC). We study the epistemic consequences of such email exchanges by introducing an appropriate epistemic language and semantics. This allows us to

  16. Leveraging Client-Side DNS Failure Patterns to Identify Malicious Behaviors

    Science.gov (United States)

    2015-09-28

    malicious behavior found in our dataset and (ii) to create ground truth to evaluate the system proposed in Section V. We begin by removing those cases that...2011. [10] S. Hao, N. Feamster, and R. Pandrangi, “Monitoring the Initial DNS Behavior of Malicious Domains,” in ACM IMC , 2011. [11] R. Perdisci et...distribution is unlimited. Leveraging Client-Side DNS Failure Patterns to Identify Malicious Behaviors The views, opinions and/or findings contained in

  17. Mifrenz: Safe email for children

    Directory of Open Access Journals (Sweden)

    Tim Hunt

    Full Text Available Products currently available for monitoring children\\'s email usage are either considered to encourage dubious ethical behaviour or are time consuming for parents to administer. This paper describes the development of a new email client application for children called Mifrenz. This new application gives parents the ability to let their children safely use email, with the minimum of intervention. It was developed using mostly free software and also with the desire to provide real first hand programming examples to demonstrate to students.

  18. Effects of neonicotinoids and fipronil on non-target invertebrates.

    Science.gov (United States)

    Pisa, L W; Amaral-Rogers, V; Belzunces, L P; Bonmatin, J M; Downs, C A; Goulson, D; Kreutzweiser, D P; Krupke, C; Liess, M; McField, M; Morrissey, C A; Noome, D A; Settele, J; Simon-Delso, N; Stark, J D; Van der Sluijs, J P; Van Dyck, H; Wiemers, M

    2015-01-01

    We assessed the state of knowledge regarding the effects of large-scale pollution with neonicotinoid insecticides and fipronil on non-target invertebrate species of terrestrial, freshwater and marine environments. A large section of the assessment is dedicated to the state of knowledge on sublethal effects on honeybees (Apis mellifera) because this important pollinator is the most studied non-target invertebrate species. Lepidoptera (butterflies and moths), Lumbricidae (earthworms), Apoidae sensu lato (bumblebees, solitary bees) and the section "other invertebrates" review available studies on the other terrestrial species. The sections on freshwater and marine species are rather short as little is known so far about the impact of neonicotinoid insecticides and fipronil on the diverse invertebrate fauna of these widely exposed habitats. For terrestrial and aquatic invertebrate species, the known effects of neonicotinoid pesticides and fipronil are described ranging from organismal toxicology and behavioural effects to population-level effects. For earthworms, freshwater and marine species, the relation of findings to regulatory risk assessment is described. Neonicotinoid insecticides exhibit very high toxicity to a wide range of invertebrates, particularly insects, and field-realistic exposure is likely to result in both lethal and a broad range of important sublethal impacts. There is a major knowledge gap regarding impacts on the grand majority of invertebrates, many of which perform essential roles enabling healthy ecosystem functioning. The data on the few non-target species on which field tests have been performed are limited by major flaws in the outdated test protocols. Despite large knowledge gaps and uncertainties, enough knowledge exists to conclude that existing levels of pollution with neonicotinoids and fipronil resulting from presently authorized uses frequently exceed the lowest observed adverse effect concentrations and are thus likely to have large

  19. Computationally Secure Pattern Matching in the Presence of Malicious Adversaries

    DEFF Research Database (Denmark)

    Hazay, Carmit; Toft, Tomas

    2014-01-01

    for important variations of the secure pattern matching problem that are significantly more efficient than the current state of art solutions: First, we deal with secure pattern matching with wildcards. In this variant the pattern may contain wildcards that match both 0 and 1. Our protocol requires O......We propose a protocol for the problem of secure two-party pattern matching, where Alice holds a text t∈{0,1}∗ of length n, while Bob has a pattern p∈{0,1}∗ of length m. The goal is for Bob to (only) learn where his pattern occurs in Alice’s text, while Alice learns nothing. Private pattern matching...... is an important problem that has many applications in the area of DNA search, computational biology and more. Our construction guarantees full simulation in the presence of malicious, polynomial-time adversaries (assuming the hardness of DDH assumption) and exhibits computation and communication costs of O...

  20. Detecting malicious chaotic signals in wireless sensor network

    Science.gov (United States)

    Upadhyay, Ranjit Kumar; Kumari, Sangeeta

    2018-02-01

    In this paper, an e-epidemic Susceptible-Infected-Vaccinated (SIV) model has been proposed to analyze the effect of node immunization and worms attacking dynamics in wireless sensor network. A modified nonlinear incidence rate with cyrtoid type functional response has been considered using sleep and active mode approach. Detailed stability analysis and the sufficient criteria for the persistence of the model system have been established. We also established different types of bifurcation analysis for different equilibria at different critical points of the control parameters. We performed a detailed Hopf bifurcation analysis and determine the direction and stability of the bifurcating periodic solutions using center manifold theorem. Numerical simulations are carried out to confirm the theoretical results. The impact of the control parameters on the dynamics of the model system has been investigated and malicious chaotic signals are detected. Finally, we have analyzed the effect of time delay on the dynamics of the model system.

  1. Protecting software agents from malicious hosts using quantum computing

    Science.gov (United States)

    Reisner, John; Donkor, Eric

    2000-07-01

    We evaluate how quantum computing can be applied to security problems for software agents. Agent-based computing, which merges technological advances in artificial intelligence and mobile computing, is a rapidly growing domain, especially in applications such as electronic commerce, network management, information retrieval, and mission planning. System security is one of the more eminent research areas in agent-based computing, and the specific problem of protecting a mobile agent from a potentially hostile host is one of the most difficult of these challenges. In this work, we describe our agent model, and discuss the capabilities and limitations of classical solutions to the malicious host problem. Quantum computing may be extremely helpful in addressing the limitations of classical solutions to this problem. This paper highlights some of the areas where quantum computing could be applied to agent security.

  2. Fast and maliciously secure two-party computation using the GPU

    DEFF Research Database (Denmark)

    Frederiksen, Tore Kasper; Nielsen, Jesper Buus

    2013-01-01

    We describe, and implement, a maliciously secure protocol for two-party computation in a parallel computational model. Our protocol is based on Yao’s garbled circuit and an efficient OT extension. The implementation is done using CUDA and yields fast results for maliciously secure two-party compu......-party computation in a financially feasible and practical setting by using a consumer grade CPU and GPU. Our protocol further uses some novel constructions in order to combine garbled circuits and an OT extension in a parallel and maliciously secure setting.......We describe, and implement, a maliciously secure protocol for two-party computation in a parallel computational model. Our protocol is based on Yao’s garbled circuit and an efficient OT extension. The implementation is done using CUDA and yields fast results for maliciously secure two...

  3. A Study on Architecture of Malicious Code Blocking Scheme with White List in Smartphone Environment

    Science.gov (United States)

    Lee, Kijeong; Tolentino, Randy S.; Park, Gil-Cheol; Kim, Yong-Tae

    Recently, the interest and demands for mobile communications are growing so fast because of the increasing prevalence of smartphones around the world. In addition, the existing feature phones were replaced by smartphones and it has widely improved while using the explosive growth of Internet users using smartphones, e-commerce enabled Internet banking transactions and the importance of protecting personal information. Therefore, the development of smartphones antivirus products was developed and launched in order to prevent malicious code or virus infection. In this paper, we proposed a new scheme to protect the smartphone from malicious codes and malicious applications that are element of security threats in mobile environment and to prevent information leakage from malicious code infection. The proposed scheme is based on the white list smartphone application which only allows installing authorized applications and to prevent the installation of malicious and untrusted mobile applications which can possibly infect the applications and programs of smartphones.

  4. Email Adaptation for Conflict Handling

    DEFF Research Database (Denmark)

    Lee, Joyce Yi‐Hui; Panteli, Niki; Bülow, Anne Marie

    2018-01-01

    This paper explores the context of email‐based communication in anestablished but fragile, inter‐organisational partnership, which wasoften overlain with conflict. Drawing upon adaptation theory, thisstudy explores how participants adapt to the use of email to handleconflict. Extensive data were...... obtained during a 6‐month field studyof a case of cross‐border inter‐organisational collaboration in EastAsia. We observed that the individuals involved in the cross‐borderpartnership used email as a lean form of communication to stopcovert conflict from explicitly emerging. In contrast to prior researchon...... the leanness of email in managing conflict, we found that underthe described conflict situation the very leanness of emailwas appreciated and thus, exploited by those concerned tomanage the conflict situation. Specifically, we identified 4 keyconflict‐triggered adaptation strategies, namely...

  5. Comparative ecotoxicity of chlorantraniliprole to non-target soil invertebrates.

    Science.gov (United States)

    Lavtižar, Vesna; Berggren, Kristina; Trebše, Polonca; Kraak, Michiel H S; Verweij, Rudo A; van Gestel, Cornelis A M

    2016-09-01

    The insecticide chlorantraniliprole (CAP) is gaining importance in agricultural practice, but data on its possible negative effects on non-target organisms is severely deficient. This study therefore determined CAP toxicity to non-target soil invertebrates playing a crucial role in ecosystem functioning, including springtails (Folsomia candida), isopods (Porcellio scaber), enchytraeids (Enchytraeus crypticus) and oribatid mites (Oppia nitens). In sublethal toxicity tests in Lufa 2.2 soil, chronic exposure to CAP concentrations up to 1000 mg/kgdw did not affect the survival and reproduction of E. crypticus and O. nitens nor the survival, body weight and consumption of P. scaber. In contrast, the survival and reproduction of F. candida was severely affected, with an EC50 for effects on reproduction of 0.14 mg CAP/kgdw. The toxicity of CAP to the reproduction of F. candida was tested in four different soils following OECD guideline 232, and additionally in an avoidance test according to ISO guideline 17512-2. A significantly lower toxicity in soils rich in organic matter was observed, compared to low organic soils. Observations in the avoidance test with F. candida suggest that CAP acted in a prompt way, by affecting collembolan locomotor abilities thus preventing them from escaping contaminated soil. This study shows that CAP may especially pose a risk to non-target soil arthropods closely related to insects, while other soil invertebrates seem rather insensitive. Copyright © 2016 Elsevier Ltd. All rights reserved.

  6. Major Cyber threat on Nuclear Facility and Key Entry Points of Malicious Codes

    Energy Technology Data Exchange (ETDEWEB)

    Shin, Ickhyun; Kwon, Kookheui [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2013-05-15

    Cyber security incident explicitly shows that the domestic intra net system which is not connected to the Internet can be compromised by the USB based mal ware which was developed by the state-sponsored group. It also tells that the actor for cyber-attack has been changed from script kiddies to state's governments and the target has been changed to nation's main infrastructures such as electricity, transportation and etc. Since the cyber sabotage on nuclear facility has been proven to be possible and can be replicated again with same method, the cyber security on nuclear facility must be strengthened. In this paper, it is explained why the malicious code is the one of the biggest cyber threat in nuclear facility's digital I and C(Instrumentation and Controls) system by analyzing recent cyber attacks and well-known malicious codes. And a feasible cyber attack scenario on nuclear facility's digital I and C system is suggested along with some security measures for prevention of malicious code. As experienced from the cyber sabotage on Iranian nuclear facility in 2010, cyber attack on nuclear facility can be replicated by infecting the computer network with malicious codes. One of the cyber attack scenario on nuclear digital I and C computer network with using malicious code was suggested to help security manager establishing cyber security plan for prevention of malicious code. And some security measures on prevention of malicious code are also provided for reference.

  7. Major Cyber threat on Nuclear Facility and Key Entry Points of Malicious Codes

    International Nuclear Information System (INIS)

    Shin, Ickhyun; Kwon, Kookheui

    2013-01-01

    Cyber security incident explicitly shows that the domestic intra net system which is not connected to the Internet can be compromised by the USB based mal ware which was developed by the state-sponsored group. It also tells that the actor for cyber-attack has been changed from script kiddies to state's governments and the target has been changed to nation's main infrastructures such as electricity, transportation and etc. Since the cyber sabotage on nuclear facility has been proven to be possible and can be replicated again with same method, the cyber security on nuclear facility must be strengthened. In this paper, it is explained why the malicious code is the one of the biggest cyber threat in nuclear facility's digital I and C(Instrumentation and Controls) system by analyzing recent cyber attacks and well-known malicious codes. And a feasible cyber attack scenario on nuclear facility's digital I and C system is suggested along with some security measures for prevention of malicious code. As experienced from the cyber sabotage on Iranian nuclear facility in 2010, cyber attack on nuclear facility can be replicated by infecting the computer network with malicious codes. One of the cyber attack scenario on nuclear digital I and C computer network with using malicious code was suggested to help security manager establishing cyber security plan for prevention of malicious code. And some security measures on prevention of malicious code are also provided for reference

  8. IDMA: improving the defense against malicious attack for mobile ad hoc networks based on ARIP protocol

    Science.gov (United States)

    Peng, Chaorong; Chen, Chang Wen

    2008-04-01

    Malicious nodes are mounting increasingly sophisticated attacking operations on the Mobile Ad Hoc Networks (MANETs). This is mainly because the IP-based MANETs are vulnerable to attacks by various malicious nodes. However, the defense against malicious attack can be improved when a new layer of network architecture can be developed to separate true IP address from disclosing to the malicious nodes. In this paper, we propose a new algorithm to improve the defense against malicious attack (IDMA) that is based on a recently developed Assignment Router Identify Protocol (ARIP) for the clustering-based MANET management. In the ARIP protocol, we design the ARIP architecture based on the new Identity instead of the vulnerable IP addresses to provide the required security that is embedded seamlessly into the overall network architecture. We make full use of ARIP's special property to monitor gateway forward packets by Reply Request Route Packets (RREP) without additional intrusion detection layer. We name this new algorithm IDMA because of its inherent capability to improve the defense against malicious attacks. Through IDMA, a watching algorithm can be established so as to counterattack the malicious node in the routing path when it unusually drops up packets. We provide analysis examples for IDMA for the defense against a malicious node that disrupts the route discovery by impersonating the destination, or by responding with state of corrupted routing information, or by disseminating forged control traffic. The IDMA algorithm is able to counterattack the malicious node in the cases when the node lunch DoS attack by broadcast a large number of route requests, or make Target traffic congestion by delivering huge mount of data; or spoof the IP addresses and send forge packets with a fake ID to the same Target causing traffic congestion at that destination. We have implemented IDMA algorism using the GloMoSim simulator and have demonstrated its performance under a variety of

  9. Quantitative modeling of responses to chronic ionizing radiation exposure using targeted and non-targeted effects.

    Directory of Open Access Journals (Sweden)

    Igor Shuryak

    Full Text Available The biological effects of chronic ionizing radiation exposure can be difficult to study, but important to understand in order to protect the health of occupationally-exposed persons and victims of radiological accidents or malicious events. They include targeted effects (TE caused by ionizations within/close to nuclear DNA, and non-targeted effects (NTE caused by damage to other cell structures and/or activation of stress-signaling pathways in distant cells. Data on radiation damage in animal populations exposed over multiple generations to wide ranges of dose rates after the Chernobyl nuclear-power-plant accident are very useful for enhancing our understanding of these processes. We used a mechanistically-motivated mathematical model which includes TE and NTE to analyze a large published data set on chromosomal aberrations in pond snail (Lymnaea stagnalis embryos collected over 16 years from water bodies contaminated by Chernobyl fallout, and from control locations. The fraction of embryo cells with aberrations increased dramatically (>10-fold and non-linearly over a dose rate range of 0.03-420 μGy/h (0.00026-3.7 Gy/year. NTE were very important for describing the non-linearity of this radiation response: the TE-only model (without NTE performed dramatically worse than the TE+NTE model. NTE were predicted to reach ½ of maximal intensity at 2.5 μGy/h (0.022 Gy/year and to contribute >90% to the radiation response slope at dose rates <11 μGy/h (0.1 Gy/year. Internally-incorporated 90Sr was possibly more effective per unit dose than other radionuclides. The radiation response shape for chromosomal aberrations in snail embryos was consistent with data for a different endpoint: the fraction of young amoebocytes in adult snail haemolymph. Therefore, radiation may affect different snail life stages by similar mechanisms. The importance of NTE in our model-based analysis suggests that the search for modulators of NTE-related signaling pathways

  10. Content-Agnostic Malware Detection in Heterogeneous Malicious Distribution Graph

    KAUST Repository

    Alabdulmohsin, Ibrahim

    2016-10-26

    Malware detection has been widely studied by analysing either file dropping relationships or characteristics of the file distribution network. This paper, for the first time, studies a global heterogeneous malware delivery graph fusing file dropping relationship and the topology of the file distribution network. The integration offers a unique ability of structuring the end-to-end distribution relationship. However, it brings large heterogeneous graphs to analysis. In our study, an average daily generated graph has more than 4 million edges and 2.7 million nodes that differ in type, such as IPs, URLs, and files. We propose a novel Bayesian label propagation model to unify the multi-source information, including content-agnostic features of different node types and topological information of the heterogeneous network. Our approach does not need to examine the source codes nor inspect the dynamic behaviours of a binary. Instead, it estimates the maliciousness of a given file through a semi-supervised label propagation procedure, which has a linear time complexity w.r.t. the number of nodes and edges. The evaluation on 567 million real-world download events validates that our proposed approach efficiently detects malware with a high accuracy. © 2016 Copyright held by the owner/author(s).

  11. Parsing (malicious pleasures: Schadenfreude and gloating at others’ adversity

    Directory of Open Access Journals (Sweden)

    Colin Wayne Leach

    2015-02-01

    Full Text Available We offer the first empirical comparison of the pleasure in seeing (i.e., schadenfreude and in causing (i.e., gloating others’ adversity. In Study 1, we asked participants to recall and report on an (individual or group episode of pleasure that conformed to our formal definition of schadenfreude, gloating, pride, or joy, without reference to an emotion word. Schadenfreude and gloating were distinct in the situational features of the episode, participants’ appraisals of it, and their expressions of pleasure (e.g., smiling, boasting. In Study 2, we had participants imagine being in an (individual or group emotion episode designed to fit our conceptualization of schadenfreude or gloating. Individual and group versions of the emotions did not differ much in either study. However, the two pleasures differed greatly in their situational features, appraisals, experience, and expression. This parsing of the particular pleasures of schadenfreude and gloating brings nuance to the study of (malicious pleasure, which tends to be less finely conceptualized and examined than displeasure despite its importance to social relations.

  12. ATR-dependent bystander effects in non-targeted cells

    International Nuclear Information System (INIS)

    Burdak-Rothkamm, S.

    2007-01-01

    Complete text of publication follows. Radiation induced non-targeted bystander effects have been reported for a range of endpoints including the induction of γH2AX foci which serve as a marker for DNA double strand breaks. We have recently reported the induction of γH2AX foci in non-targeted bystander cells up to 48 hours after irradiation and the involvement of reactive oxygen species (ROS) and TGF-beta 1 in the induction of γH2AX foci (Oncogene (2007) 26:993-1002). Here, we wanted to determine the role of the PI3-like kinases ATM, ATR and DNA-PK in DNA damage signalling in bystander cells. Conditioned medium from T98G cells irradiated with 2 Gy of X-rays was transferred onto non-irradiated cells that were subsequently analysed for the induction of γH2AX, ATR and 53BP1 foci as well as clonogenic survival. Irradiated T98G glioma cells generated signals that induced γH2AX and 53BP1 foci in cells treated with the conditioned medium from irradiated cells. These foci co-localised with ATR foci. Inhibition of ATM and DNA-PK could not suppress the induction of bystander γH2AX foci whereas the mutation of ATR in Seckel cells abrogated bystander foci induction. A restriction of bystander foci to the S-phase of the cell cycle both in T98G cells and in ATR- proficient fibroblasts was observed. These results identify ATR as a central player within the bystander signalling cascade leading to γH2AX and 53BP1 foci formation, and suggest a mechanism of DNA damage induction in non-targeted cells. Further investigations have shown decreased clonogenic cell survival in bystander T98G and ATR wild-type fibroblasts. ATR mutated Seckel cells and also ATM-/- fibroblasts were resistant to this effect suggesting a role for both ATR and ATM in the bystander signalling cascade with regard to cell survival. Taken together, these observations support a hypothesis of DNA damage-induced accumulation of stalled replication forks in bystander cells which are subsequently processed by

  13. Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection

    KAUST Repository

    Wang, Wei; Wang, Xing; Feng, Dawei; Liu, Jiqiang; Han, Zhen; Zhang, Xiangliang

    2014-01-01

    Android has been a major target of malicious applications (malapps). How to detect and keep the malapps out of the app markets is an ongoing challenge. One of the central design points of Android security mechanism is permission control

  14. DroidEnsemble: Detecting Android Malicious Applications with Ensemble of String and Structural Static Features

    KAUST Repository

    Wang, Wei; Gao, Zhenzhen; Zhao, Meichen; Li, Yidong; Liu, Jiqiang; Zhang, Xiangliang

    2018-01-01

    Android platform has dominated the Operating System of mobile devices. However, the dramatic increase of Android malicious applications (malapps) has caused serious software failures to Android system and posed a great threat to users. The effective

  15. Toxicological effects of pyrethroids on non-target aquatic insects.

    Science.gov (United States)

    Antwi, Frank B; Reddy, Gadi V P

    2015-11-01

    The toxicological effects of pyrethroids on non-target aquatic insects are mediated by several modes of entry of pyrethroids into aquatic ecosystems, as well as the toxicological characteristics of particular pyrethroids under field conditions. Toxicokinetics, movement across the integument of aquatic insects, and the toxicodynamics of pyrethroids are discussed, and their physiological, symptomatic and ecological effects evaluated. The relationship between pyrethroid toxicity and insecticide uptake is not fully defined. Based on laboratory and field data, it is likely that the susceptibility of aquatic insects (vector and non-vector) is related to biochemical and physiological constraints associated with life in aquatic ecosystems. Understanding factors that influence aquatic insects susceptibility to pyrethroids is critical for the effective and safe use of these compounds in areas adjacent to aquatic environments. Copyright © 2015 The Authors. Published by Elsevier B.V. All rights reserved.

  16. Non-targeted bystander effects induced by ionizing radiation

    International Nuclear Information System (INIS)

    Morgan, William F.; Sowa, Marianne B.

    2007-01-01

    Radiation-induced bystander effects refer to those responses occurring in cells that were not subject to energy deposition events following ionizing radiation. These bystander cells may have been neighbors of irradiated cells, or physically separated but subject to soluble secreted signals from irradiated cells. Bystander effects have been observed in vitro and in vivo and for various radiation qualities. In tribute to an old friend and colleague, Anthony V. Carrano, who would have said 'well what are the critical questions that should be addressed, and so what?', we review the evidence for non-targeted radiation-induced bystander effects with emphasis on prevailing questions in this rapidly developing research field, and the potential significance of bystander effects in evaluating the detrimental health effects of radiation exposure

  17. Some important questions connected with non-targeted effects

    International Nuclear Information System (INIS)

    Baverstock, Keith; Belyakov, Oleg V.

    2010-01-01

    This paper briefly reviews the highlights of experimental evidence that led to the adoption of the term 'non-targeted' to describe new effects induced by ionising radiation that did not fit the classical radiobiological paradigm, principally genomic instability and bystander effect, identifying the reports that were most influential on the subsequent course of radiobiological research. The issue of appropriate terminology for the new effects is discussed. Particular emphasis is placed on the inheritance of genomic instability, where there are issues concerning which effects should be considered as transgenerational. Finally, in respect of the question as to whether these new effects are likely to have an impact on human health is addressed. It is concluded that there is a need for a clearer terminology to facilitate research progress, that real health effects cannot be ruled out and that therefore there is a need for new paradigms not only for radiobiology but also for risk assessment and radiological protection.

  18. A framework for detection of malicious software in Android handheld systems using machine learning techniques

    OpenAIRE

    Torregrosa García, Blas

    2015-01-01

    The present study aims at designing and developing new approaches to detect malicious applications in Android-based devices. More precisely, MaLDroide (Machine Learning-based Detector for Android malware), a framework for detection of Android malware based on machine learning techniques, is introduced here. It is devised to identify malicious applications. Este trabajo tiene como objetivo el diseño y el desarrollo de nuevas formas de detección de aplicaciones maliciosas en los dispositivos...

  19. The Enemy Within: The Emerging Threats to Healthcare from Malicious Mobile Devices

    OpenAIRE

    Zawoad, Shams; Hasan, Ragib

    2012-01-01

    With the proliferation of wireless networks, mobile devices and medical devices are increasingly being equipped with wireless interfaces, such as Bluetooth and WiFi to allow easy access to and control of the medical devices. Unfortunately, the very presence and usage of such interfaces also expose the medical devices to novel attacks from malicious parties. The emerging threat from malicious mobile devices is significant and severe, since attackers can steal confidential data from a patient's...

  20. Sistema Automatizado de Emailing Marketing

    OpenAIRE

    Martínez López, Javier

    2010-01-01

    Projecte final de carrera realitzat en col.laboració amb E-xpertel S.A El presente proyecto describe el diseño e implementación de un sistema de automatización de campañas de marketing a través de email hacia clientes y/o clientes potenciales. Este sistema tiene como objetivos principales adquirir nuevos clientes y conseguir la delización de los mismos. El sistema se complementa con una plataforma CRM (Customer Relationship Management) para el mantenimiento de datos de empresa...

  1. A security approach based on honeypots: Protecting Online Social network from malicious profiles

    Directory of Open Access Journals (Sweden)

    Fatna Elmendili, Nisrine Maqran

    2017-04-01

    Full Text Available In the recent years, the fast development and the exponential utilization of social networks have prompted an expansion of social Computing. In social networks users are interconnected by edges or links, where Facebook, twitter, LinkedIn are most popular social networks websites. Due to the growing popularity of these sites they serve as a target for cyber criminality and attacks. It is mostly based on how users are using these sites like Twitter and others. Attackers can easily access and gather personal and sensitive user’s information. Users are less aware and least concerned about the security setting. And they easily become victim of identity breach. To detect malicious users or fake profiles different techniques have been proposed like our approach which is based on the use of social honeypots to discover malicious profiles in it. Inspired by security researchers who used honeypots to observe and analyze malicious activity in the networks, this method uses social honeypots to trap malicious users. The two key elements of the approach are: (1 The deployment of social honeypots for harvesting information of malicious profiles. (2 Analysis of the characteristics of these malicious profiles and those of deployed honeypots for creating classifiers that allow to filter the existing profiles and monitor the new profiles.

  2. Research on Propagation Model of Malicious Programs in Ad Hoc Wireless Network

    Directory of Open Access Journals (Sweden)

    Weimin GAO

    2014-01-01

    Full Text Available Ad Hoc wireless network faces more security threats than traditional network due to its P2P system structure and the limited node resources. In recent years, malicious program has become one of the most important researches on international network security and information security. The research of malicious programs on wireless network has become a new research hotspot in the field of malicious programs. This paper first analyzed the Ad Hoc network system structure, security threats, the common classification of malicious programs and the bionic propagation model. Then starting from the differential equations of the SEIR virus propagation model, the question caused by introducing the SEIR virus propagation model in Ad Hoc wireless network was analyzed. This paper improved the malicious program propagation model through introducing the network topology features and concepts such as immunization delay, and designed an improved algorithm combined with the dynamic evolution of malware propagation process. Considering of the network virus propagation characteristics, network characteristics and immunization strategy to improve simulation model experiment analysis, the experimental results show that both the immunization strategy and the degrees of node can affect the propagation of malicious program.

  3. The Importance of Etiquette in School Email

    Science.gov (United States)

    Filippone, Monica; Survinski, Melissa

    2016-01-01

    This article investigates the appropriate use of email among secondary and postsecondary students and instructors and provides recommendations for proper email etiquette. A review of the current literature shows that poor email etiquette can impact the working relationship between teachers and students. Evidence indicates that email etiquette must…

  4. Effects of malicious ocular laser exposure in commercial airline pilots.

    Science.gov (United States)

    Palakkamanil, Mathew M; Fielden, Michael P

    2015-12-01

    Intentional malicious laser strikes on commercial pilots are committed by individuals who target a laser into airplane cockpits during takeoff and landing. Because laser exposure to pilots is a relatively new but growing occurrence, our study investigates the ocular effect of this laser exposure in pilots. Retrospective chart review by a single ophthalmologist. All commercial airline pilots (58 male, 3 female) who experienced a laser strike while flying between April 2012 and November 2014 who presented to our clinic were included. A retrospective chart review was performed in a retinal specialist's practice. Ocular assessment was performed within 3 days of laser exposure. A complete ophthalmic evaluation was conducted, including Early Treatment Diabetic Retinopathy Study visual acuity, colour vision, visual fields, intraocular pressure, slit-lamp examination, dilated fundus examination, colour fundus photographs, and ocular coherence tomography. Sixty-four laser strike incidents involving commercial pilots were included. All pilots in the study experienced some degree of immediate ocular irritation or light sensitivity. No definite cases of ocular damage were attributed to laser strikes. No pilot had any functional ocular deficits. Our study revealed that laser strikes on aircraft did not result in permanent visual functional or structural deficits. However, laser strikes cause immediate visual effects, including glare, flash blindness, and ocular irritation that can interfere with a pilot's visual function. Given the widespread accessibility of high-power lasers and the rapid increase in incidents, laser strikes threaten to jeopardize aviation safety unless effective preventative measures are put in place. Copyright © 2015 Canadian Ophthalmological Society. Published by Elsevier Inc. All rights reserved.

  5. Email-Set Visualization: Facilitating Re-Finding in Email Archives

    OpenAIRE

    Gorton, Douglas; Murthy, Uma; Vemuri, Naga Srinivas; Pérez-Quiñones, Manuel A.

    2007-01-01

    In this paper we describe ESVT – EmailSet Visualization Tool, an email archive tool that provides users a visualization to re-find and discover information in their email archive. ESVT is an end-to-end email archive tool that can be used from archiving a user’s email messages to visualizing queries on the email archive. We address email archiving by allowing import of email messages from an email server or from a standard existing email client. The central idea in ESVT’s visualization, an “em...

  6. Is Email Business Dying?: A Study on Evolution of Email Spam Over Fifteen Years

    OpenAIRE

    De Wang; Danesh Irani; Calton Pu

    2014-01-01

    With the increasing dedication and sophistication of spammers, email spam is a persistent problem even today. Popular social network sites such as Facebook, Twitter, and Google+ are not exempt from email spam as they all interface with email systems. While some report predicts that email spam business is dying due to the decreasing volume of email spam. Whether email spam business is really dying is an interesting question. In this paper, we analyze email spam trends on Spam Archive dataset, ...

  7. Perancangan Email Client Dengan Pengklasifikasian Email Menggunakan Algoritma Vector Space Model

    OpenAIRE

    Christian, Moses

    2015-01-01

    On today's age of technology, widely used email to send information throughout the world. During the classification of the email is still done manually and less objective. So in this study, the authors apply the method of Vector Space Model (VSM) to make an automatic email classification and more objective. With this method of email classification can be done automatically based on address, subject, and body of an email that allows users to email in the organization of every incoming email in...

  8. The future impacts of non-targeted effects.

    Science.gov (United States)

    Bright, Scott; Kadhim, Munira

    2018-04-11

    Ionizing radiation was traditionally thought to exert its detrimental effects through interaction with sensitive cellular targets, nuclear DNA being of most importance. This theory has since merged with a more recently described radiation response called non-targeted effects (NTE). This review will briefly look at the various types of NTE and the potential implications they may have for radiobiology research and its applications. The most well-known NTE are genomic instability (GI) and bystander effects (BE). Other NTE include abscopal effects, which are similar to bystander effects but are generally based in a clinical environment with immune involvement as the defining feature. Currently, our understanding of NTE is limited to certain signaling pathways/molecules, and as yet there is no theory that describes or can accurately predict the occurrence or outcome of these NTE. There are numerous groups investigating these processes in vitro and in vivo, and thus steady progress is being made. Developing a deeper understanding of NTE has potential impacts for therapy and diagnosis, safer occupational exposures, space flight and our general understanding of radiation biology.

  9. Malicious acts involving radioactive sources: prevention and preparedness for response

    International Nuclear Information System (INIS)

    Pradeepkumar, K.S.

    2008-01-01

    . Periodic mobile radiological monitoring of cities covering all areas including scrap yards, aerial gamma surveys using 'Aerial Gamma Spectrometry System (AGSS)' which have better coverage and sensitiveness to detect potential RDD sources - even if kept inside buildings - also are to be used for combing operation when suggested by intelligence information. Preparedness for response necessitates development of monitoring and assessment teams, first responders and medical teams who should be able to reach the affected area to carry out the rescue operations and prevent spread of contamination. This paper discusses the methodology and monitoring systems to be developed to prevent the usage of radioactive sources for malicious purposes, state of the art systems and methodology for the detection and assessment of radioactive contamination as well as requirement of training of emergency response teams for response to radiological emergencies. (author)

  10. Making Nuclear Malaysia Email Archives Portable

    International Nuclear Information System (INIS)

    Shaharum Ramli

    2013-01-01

    Nuclear Malaysia e-mails can be accessed from any computer and anywhere, even worldwide, via web access. However, this mobility is lost when the e-mails are moved to a personal computer into archive files such as Microsoft Outlook data files. Outlook e-mail archives can only be read on the computer where it is stored. This removal has to be done because of storage space constraints on the e-mail server. This paper shows how e-mail archives can be made portable, brought and read anywhere using a free portable e-mail client application such as Mozilla Thunderbird, Portable Edition. (author)

  11. Effect of Gratitude on Benign and Malicious Envy: The Mediating Role of Social Support

    Science.gov (United States)

    Xiang, Yanhui; Chao, Xiaomei; Ye, Yanyan

    2018-01-01

    Gratitude has been investigated in various areas in psychology. The present research showed that gratitude had some positive effects on some aspects of our life, such as subjective well-being, life satisfaction, and social relationships. It can also help us relieve negative emotions. However, the existing literature has not studied the influence of gratitude on envy. The present study used structural equation modeling to test the mediating role of social support between gratitude and two types of envy (malicious and benign). We recruited 426 Chinese undergraduates to complete the Gratitude Questionnaire, Malicious and Benign Envy Scales, and the Multi-Dimensional Scale of Perceived Social Support. Results showed that gratitude positively predicted benign envy and negatively predicted malicious envy. In addition, the indirect effect of gratitude on two types of envy via social support was significant. These results revealed the direct relationship between gratitude and malicious/benign envy, and the mediating effect of social support, which will contribute to find effective measures to inhibit malicious envy and promote benign envy from the perspective of cultivating gratitude and increasing individuals' social support. PMID:29867595

  12. Effect of Gratitude on Benign and Malicious Envy: The Mediating Role of Social Support

    Directory of Open Access Journals (Sweden)

    Yanhui Xiang

    2018-05-01

    Full Text Available Gratitude has been investigated in various areas in psychology. The present research showed that gratitude had some positive effects on some aspects of our life, such as subjective well-being, life satisfaction, and social relationships. It can also help us relieve negative emotions. However, the existing literature has not studied the influence of gratitude on envy. The present study used structural equation modeling to test the mediating role of social support between gratitude and two types of envy (malicious and benign. We recruited 426 Chinese undergraduates to complete the Gratitude Questionnaire, Malicious and Benign Envy Scales, and the Multi-Dimensional Scale of Perceived Social Support. Results showed that gratitude positively predicted benign envy and negatively predicted malicious envy. In addition, the indirect effect of gratitude on two types of envy via social support was significant. These results revealed the direct relationship between gratitude and malicious/benign envy, and the mediating effect of social support, which will contribute to find effective measures to inhibit malicious envy and promote benign envy from the perspective of cultivating gratitude and increasing individuals' social support.

  13. Effect of Gratitude on Benign and Malicious Envy: The Mediating Role of Social Support.

    Science.gov (United States)

    Xiang, Yanhui; Chao, Xiaomei; Ye, Yanyan

    2018-01-01

    Gratitude has been investigated in various areas in psychology. The present research showed that gratitude had some positive effects on some aspects of our life, such as subjective well-being, life satisfaction, and social relationships. It can also help us relieve negative emotions. However, the existing literature has not studied the influence of gratitude on envy. The present study used structural equation modeling to test the mediating role of social support between gratitude and two types of envy (malicious and benign). We recruited 426 Chinese undergraduates to complete the Gratitude Questionnaire, Malicious and Benign Envy Scales, and the Multi-Dimensional Scale of Perceived Social Support. Results showed that gratitude positively predicted benign envy and negatively predicted malicious envy. In addition, the indirect effect of gratitude on two types of envy via social support was significant. These results revealed the direct relationship between gratitude and malicious/benign envy, and the mediating effect of social support, which will contribute to find effective measures to inhibit malicious envy and promote benign envy from the perspective of cultivating gratitude and increasing individuals' social support.

  14. Non-cancer diseases and non-targeted effects

    Energy Technology Data Exchange (ETDEWEB)

    Hildebrandt, Guido, E-mail: guido.hildebrandt@med.uni-rostock.de [Department of Radiotherapy and Radiation Oncology, University of Leipzig, Stephanstrasse 9a, 04103 Leipzig (Germany); Department of Radiotherapy, University of Rostock, Suedring 75, 18059 Rostock (Germany)

    2010-05-01

    It is well established that moderate to high doses of radiation can increase the occurrence also of a variety of non-cancer effects in exposed individuals, but for radiation protection purposes it has generally been assumed that there is a threshold of dose below which no significant non-cancer effects (apart from hereditary disease) arise. In recent years, there is growing epidemiological evidence of excess risk of late occurring cardiovascular disease at much lower radiation doses and occurring over much longer intervals after radiation exposure without a clear cut threshold. However, the epidemiological evidence available so far for non-cancer health effects after exposure to moderate or low radiation doses is suggestive rather than persuasive. The mechanisms of radiation-induced vascular disease induction are far away from being understood. However, it seems to be very likely that inflammatory responses are involved. Recent experimental studies by Stewart et al. could demonstrate that high dose exposure to the cardiovascular system is associated with an earlier onset and accelerated development of macrophage-rich, inflammatory atherosclerotic lesions prone to intra-plaque hemorrhage and may also cause a decrease in myocardial perfusion. Both, macro-vascular and micro-vascular radiation effects involve the endothelium and pro-inflammatory signalling cascades. If modulation of inflammatory response is arguably also the most likely cause of radiation-induced cardiovascular disease after low dose exposure, this also implies a role for non-targeted radiation effects. In the absence of a convincing mechanistic explanation of the currently available epidemiological evidence for radiation-induced cardiovascular risk at low radiation doses, caution is required in the interpretation of the statistical associations. On the other hand, the possibility of such a causal explanation cannot be reliably excluded. Further epidemiological and biological evidence from currently

  15. Effect of malachite green toxicity on non target soil organisms.

    Science.gov (United States)

    Gopinathan, R; Kanhere, J; Banerjee, J

    2015-02-01

    Although malachite green (MG), is banned in Europe and US for its carcinogenic and teratogenic effect, the dye being cheap, is persistently used in various countries for fish farming, silk, dye, leather and textile industries. Current research, however, fails to elucidate adequate knowledge concerning the effects of MG in our ecosystem. In the present investigation, for the first time, an attempt has been made to study the effects of MG on soil biota by testing Bacillus subtilis, Azotobacter chroococcum, Saccharomyces cerevisiae, Penicillium roqueforti, Eisenia fetida and seeds of three crop plants of different families. Various tests were conducted for determining cytotoxicity, genotoxicity, acute toxicity, morphological and germination effect. Our data confirmed MG toxicity on fungi and bacteria (gram positive and gram negative organisms) showing elevated level of ROS. Genotoxicity caused in the microorganisms was detected by DNA polymorphism and fragmentation. Also, scanning electron microscopy data suggests that the inhibitory effect of MG to these beneficial microbes in the ecosystem might be due to pore formation in the cell and its eventual disruption. Filter paper and artificial soil test conducted on earthworms demonstrated a LC 50 of 2.6 mg cm(-2) and 1.45 mg kg(-1) respectively with severe morphological damage. However, seed germination of Mung bean, Wheat and Mustard was found to be unaffected in presence of MG up to 100 mL(-1) concentration. Thus, understanding MG toxicity in non target soil organisms and emphasis on its toxicological effects would potentially explicate its role as an environmental contaminant. Copyright © 2014 Elsevier Ltd. All rights reserved.

  16. Conversation Threads Hidden within Email Server Logs

    Science.gov (United States)

    Palus, Sebastian; Kazienko, Przemysław

    Email server logs contain records of all email Exchange through this server. Often we would like to analyze those emails not separately but in conversation thread, especially when we need to analyze social network extracted from those email logs. Unfortunately each mail is in different record and those record are not tided to each other in any obvious way. In this paper method for discussion threads extraction was proposed together with experiments on two different data sets - Enron and WrUT..

  17. Understanding email communication of persons with aphasia

    NARCIS (Netherlands)

    Al Mahmud, A.; Martens, J.B.O.S.

    2011-01-01

    An email program has been developed by the Aphasia Union Netherlands (AVN) to enhance communication between aphasics mutually and with their therapists. In this paper we report intermediate evaluation results of the AVN email program. We evaluated the email program in two ways: a. by analyzing the

  18. Elucidating the Dark Side of Envy: Distinctive Links of Benign and Malicious Envy With Dark Personalities

    Science.gov (United States)

    Lange, Jens; Paulhus, Delroy L.; Crusius, Jan

    2017-01-01

    Researchers have recently drawn a contrast between two forms of envy: benign and malicious envy. In three studies (total N = 3,123), we challenge the assumption that malicious envy is destructive, whereas benign envy is entirely constructive. Instead, both forms have links with the Dark Triad of personality. Benign envy is associated with Machiavellian behaviors, whereas malicious envy is associated with both Machiavellian and psychopathic behaviors. In Study 1, this pattern emerged from meta-analyzed trait correlations. In Study 2, a manipulation affecting the envy forms mediated an effect on antisocial behavioral intentions. Study 3 replicated these patterns by linking envy to specific antisocial behaviors and their impact on status in the workplace. Together, our correlational and experimental results suggest that the two forms of envy can both be malevolent. Instead of evaluating envy’s morality, we propose to focus on its functional value. PMID:29271287

  19. WPMSD: A Malicious Script Detection Method Inspired by the Process of Immunoglobulin Secretion

    Directory of Open Access Journals (Sweden)

    Hui Zhao

    2011-10-01

    Full Text Available Inspired by the process of immunoglobulin secretion in biological body, we present a Web Page Malicious Script Detection Method (WPMSD. In this paper, Firstly, the basic definitions of artificial immune items are given. Secondly, according to the spreading range of malicious script, the immunoglobulin number is changed as the detector clone proliferation is stimulated by malicious scripts. Further more, the nonlinear dynamics of antibody number is discussed. Thirdly, we propose a probability approach to trigger alarms to inform that the detected scripts are harmful. Finally, the WPMSD collects the effective immunoglobulin set based on Hidden Markov Model (HMM to update the detector gene library. Compared with the traditional immune based detection methods, such as Negative Selection Algorithm (NSA, Dynamic Colonel Selection (DynamiCS, and Variable size Detector (Vdetector, the false alarm rate of WPMSD has been reduced by 18.09%, 12.6%, and 7.47% respectively.

  20. System for Malicious Node Detection in IPv6-Based Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Kresimir Grgic

    2016-01-01

    Full Text Available The trend of implementing the IPv6 into wireless sensor networks (WSNs has recently occurred as a consequence of a tendency of their integration with other types of IP-based networks. The paper deals with the security aspects of these IPv6-based WSNs. A brief analysis of security threats and attacks which are present in the IPv6-based WSN is given. The solution to an adaptive distributed system for malicious node detection in the IPv6-based WSN is proposed. The proposed intrusion detection system is based on distributed algorithms and a collective decision-making process. It introduces an innovative concept of probability estimation for malicious behaviour of sensor nodes. The proposed system is implemented and tested through several different scenarios in three different network topologies. Finally, the performed analysis showed that the proposed system is energy efficient and has a good capability to detect malicious nodes.

  1. Computer Security: e-mail is broken and there is nothing we can do

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2016-01-01

    Have you ever received an e-mail from a friend or someone you know and been surprised or appalled by its contents? Or, worse, have you have received a response to an e-mail that wasn’t written by you? Maybe with similarly surprising or appalling contents? If yes, welcome to the insecurity of the mail protocol, where nothing is as it seems…   No, this time we are not talking about “phishing” or malicious attachments but the very basics of the e-mail protocol. “SMTP” aka the “Simple Mail Transfer Protocol” is exactly what it says: very simple! In many respects, e-mails are identical to physical hand-written letters: you cannot deduce from the sender’s address nor from the message text whether it has really been sent by that person. Impersonation has never been as easy as with the SMTP protocol. Due to its simple design, I can pretend to be Mickey Mouse, Harry Potter or anyone else, and send you text messages...

  2. Detection of Illegitimate Emails using Boosting Algorithm

    DEFF Research Database (Denmark)

    Nizamani, Sarwat; Memon, Nasrullah; Wiil, Uffe Kock

    2011-01-01

    and spam email detection. For our desired task, we have applied a boosting technique. With the use of boosting we can achieve high accuracy of traditional classification algorithms. When using boosting one has to choose a suitable weak learner as well as the number of boosting iterations. In this paper, we......In this paper, we report on experiments to detect illegitimate emails using boosting algorithm. We call an email illegitimate if it is not useful for the receiver or for the society. We have divided the problem into two major areas of illegitimate email detection: suspicious email detection...

  3. On Successful E-Mail Writing

    Directory of Open Access Journals (Sweden)

    Vesna Vulić

    2009-12-01

    Full Text Available This article is intended to be a simplified guide for the efficient use of e-mail in business and private communication in English. E-mailing is frequently used as a substitute for other kinds of communication in today’s working environment, due in particular, to the fact that messages are transmitted instantly, irrespective of the distance of the recipient. Due to the speed and volume of e-mail, mastering the art of effective e-mail writing includes the knowledge of Network Etiquette or ‘Netiquette’ and it is therefore important that whether it be for business or private use, the basics of e-mail etiquette are followed. When writing an e-mail it is important to consider the recipient. Careful consideration will determine the content and style of the e-mail. No less important is knowing the points of detail in writing e-mail. That is, to be clear and concise in the specific information that the e-mail should contain. Furthermore, abbreviations, acronyms and emoticons are frequently found in e-mail and their use should also be considered. An e-mail is a valuable communication tool and it is essential to use it effectively in order to improve both professional and private communication.

  4. Behavioral analysis of malicious code through network traffic and system call monitoring

    Science.gov (United States)

    Grégio, André R. A.; Fernandes Filho, Dario S.; Afonso, Vitor M.; Santos, Rafael D. C.; Jino, Mario; de Geus, Paulo L.

    2011-06-01

    Malicious code (malware) that spreads through the Internet-such as viruses, worms and trojans-is a major threat to information security nowadays and a profitable business for criminals. There are several approaches to analyze malware by monitoring its actions while it is running in a controlled environment, which helps to identify malicious behaviors. In this article we propose a tool to analyze malware behavior in a non-intrusive and effective way, extending the analysis possibilities to cover malware samples that bypass current approaches and also fixes some issues with these approaches.

  5. Detecting Malicious Nodes in Medical Smartphone Networks Through Euclidean Distance-Based Behavioral Profiling

    DEFF Research Database (Denmark)

    Meng, Weizhi; Li, Wenjuan; Wang, Yu

    2017-01-01

    and healthcare personnel. The underlying network architecture to support such devices is also referred to as medical smartphone networks (MSNs). Similar to other networks, MSNs also suffer from various attacks like insider attacks (e.g., leakage of sensitive patient information by a malicious insider......). In this work, we focus on MSNs and design a trust-based intrusion detection approach through Euclidean distance-based behavioral profiling to detect malicious devices (or called nodes). In the evaluation, we collaborate with healthcare organizations and implement our approach in a real simulated MSN...

  6. Accuracy comparison among different machine learning techniques for detecting malicious codes

    Science.gov (United States)

    Narang, Komal

    2016-03-01

    In this paper, a machine learning based model for malware detection is proposed. It can detect newly released malware i.e. zero day attack by analyzing operation codes on Android operating system. The accuracy of Naïve Bayes, Support Vector Machine (SVM) and Neural Network for detecting malicious code has been compared for the proposed model. In the experiment 400 benign files, 100 system files and 500 malicious files have been used to construct the model. The model yields the best accuracy 88.9% when neural network is used as classifier and achieved 95% and 82.8% accuracy for sensitivity and specificity respectively.

  7. Assessing e-mail intent and tasks in e-mail messages

    NARCIS (Netherlands)

    Sappelli, M.; Pasi, G.; Verberne, S.; Boer, M. de; Kraaij, W.

    2016-01-01

    In this paper, we analyze corporate e-mail messages as a medium to convey work tasks. Research indicates that categorization of e-mail could alleviate the common problem of information overload. Although e-mail clients provide possibilities of e-mail categorization, not many users spend effort on

  8. Using Insights from Email Users to Inform Organisational Email Management Policy

    Science.gov (United States)

    Ramsay, Judith; Renaud, Karen

    2012-01-01

    One would expect email substantially to increase organisational productivity and efficiency. There is little empirical evidence of this since email use is such a complex tool that it would be well nigh impossible to attribute efficiency increases solely to email. There is anecdotal evidence of the positive aspects of email (Phillips, S.R. and…

  9. Enter your email-address: how German internet users manage their email addresses

    NARCIS (Netherlands)

    Utz, S.

    2004-01-01

    Writing E-mail is the most popular Internet activity. Meanwhile, many people have more than one E-mail address. The question how people manage their E-mail addresses, more specifically, whether they use them deliberately for different purposes, is the central question of this paper. E-mail addresses

  10. On the requirements to establish a European radiological preparedness for malicious airborne dispersion scenarios

    DEFF Research Database (Denmark)

    Andersson, Kasper Grann; Astrup, Poul; Roos, Per

    2011-01-01

    European computerised decision support systems are currently targeted for large accidental atmospheric contaminant releases from nuclear installations. To make these systems applicable also for malicious dispersion events, such as ‘dirty bomb’ blasts, a series of modifications and extensions are ...

  11. Leveling up and down: the experiences of benign and malicious envy.

    Science.gov (United States)

    van de Ven, Niels; Zeelenberg, Marcel; Pieters, Rik

    2009-06-01

    Envy is the painful emotion caused by the good fortune of others. This research empirically supports the distinction between two qualitatively different types of envy, namely benign and malicious envy. It reveals that the experience of benign envy leads to a moving-up motivation aimed at improving one's own position, whereas the experience of malicious envy leads to a pulling-down motivation aimed at damaging the position of the superior other. Study 1 used guided recall of the two envy types in a culture (the Netherlands) that has separate words for benign and malicious envy. Analyses of the experiential content of these emotions found the predicted differences. Study 2 and 3 used one sample from the United States and one from Spain, respectively, where a single word exists for both envy types. A latent class analysis based on the experiential content of envy confirmed the existence of separate experiences of benign and malicious envy in both these cultures as well. The authors discuss the implications of distinguishing the two envy types for theories of cooperation, group performance, and Schadenfreude.

  12. Dispositional envy revisited: unraveling the motivational dynamics of benign and malicious envy.

    Science.gov (United States)

    Lange, Jens; Crusius, Jan

    2015-02-01

    Previous research has conceptualized dispositional envy as a unitary construct. Recently however, episodic envy has been shown to emerge in two qualitatively different forms. Benign envy is related to the motivation to move upward, whereas malicious envy is related to pulling superior others down. In four studies (N = 1,094)--using the newly developed Benign and Malicious Envy Scale (BeMaS)--we show that dispositional envy is also characterized by two independent dimensions related to distinct motivational dynamics and behavioral consequences. Dispositional benign and malicious envy uniquely predict envious responding following upward social comparisons. Furthermore, they are differentially connected to hope for success and fear of failure. Corresponding to these links, dispositional benign envy predicted faster race performance of marathon runners mediated via higher goal setting. In contrast, dispositional malicious envy predicted race goal disengagement. The findings highlight that disentangling the two sides of envy opens up numerous research avenues. © 2014 by the Society for Personality and Social Psychology, Inc.

  13. Leveling up and down : The experiences of benign and malicious envy

    NARCIS (Netherlands)

    van de Ven, N.; Zeelenberg, M.; Pieters, R.

    2009-01-01

    Envy is the painful emotion caused by the good fortune of others. This research empirically supports the distinction between two qualitatively different types of envy, namely benign and malicious envy. It reveals that the experience of benign envy leads to a moving-up motivation aimed at improving

  14. Theoretical Approaches on Successful Email Marketing Campaigns

    Directory of Open Access Journals (Sweden)

    Camelia Budac

    2016-01-01

    This paper aims to bring some clarifications on what could bring success to email marketingcampaigns. Responses are related to how sent emails can draw the attention of people (ie how theycan be observed, given that, users’ inboxes are invaded by messages of all kinds, how to measurethe results of a campaign and which are the best practices through which we can get higher returnsfrom email marketing campaigns.

  15. Transparent Proxy for Secure E-Mail

    Science.gov (United States)

    Michalák, Juraj; Hudec, Ladislav

    2010-05-01

    The paper deals with the security of e-mail messages and e-mail server implementation by means of a transparent SMTP proxy. The security features include encryption and signing of transported messages. The goal is to design and implement a software proxy for secure e-mail including its monitoring, administration, encryption and signing keys administration. In particular, we focus on automatic public key on-the-fly encryption and signing of e-mail messages according to S/MIME standard by means of an embedded computer system whose function can be briefly described as a brouter with transparent SMTP proxy.

  16. On Successful E-Mail Writing

    OpenAIRE

    Vesna Vulić

    2009-01-01

    This article is intended to be a simplified guide for the efficient use of e-mail in business and private communication in English. E-mailing is frequently used as a substitute for other kinds of communication in today’s working environment, due in particular, to the fact that messages are transmitted instantly, irrespective of the distance of the recipient. Due to the speed and volume of e-mail, mastering the art of effective e-mail writing includes the knowledge of Network Etiquette o...

  17. NON-TARGET AND ECOSYSTEM IMPACTS FROM GENETICALLY MODIFIED CROPS CONTAINING PLANT INCORPORATED PROTECTANTS (PIPS)

    Science.gov (United States)

    The risk of unintended and unexpected adverse impacts on non-target organisms and ecosystems is a key issue in environmental risk assessment of PIP crop plants. While there has been considerable examination of the effects of insect resistant crops on certain non-target organisms...

  18. MedlinePlus Connect: Email List

    Science.gov (United States)

    ... MedlinePlus Connect → Email List URL of this page: https://medlineplus.gov/connect/emaillist.html MedlinePlus Connect: Email ... will change.) Old URLs New URLs Web Application https://apps.nlm.nih.gov/medlineplus/services/mpconnect.cfm? ...

  19. CEAI: CCM based Email Authorship Identification Model

    DEFF Research Database (Denmark)

    Nizamani, Sarwat; Memon, Nasrullah

    2013-01-01

    In this paper we present a model for email authorship identification (EAI) by employing a Cluster-based Classification (CCM) technique. Traditionally, stylometric features have been successfully employed in various authorship analysis tasks; we extend the traditional feature-set to include some...... more interesting and effective features for email authorship identification (e.g. the last punctuation mark used in an email, the tendency of an author to use capitalization at the start of an email, or the punctuation after a greeting or farewell). We also included Info Gain feature selection based...... reveal that the proposed CCM-based email authorship identification model, along with the proposed feature set, outperforms the state-of-the-art support vector machine (SVM)-based models, as well as the models proposed by Iqbal et al. [1, 2]. The proposed model attains an accuracy rate of 94% for 10...

  20. N-grams Based Supervised Machine Learning Model for Mobile Agent Platform Protection against Unknown Malicious Mobile Agents

    Directory of Open Access Journals (Sweden)

    Pallavi Bagga

    2017-12-01

    Full Text Available From many past years, the detection of unknown malicious mobile agents before they invade the Mobile Agent Platform has been the subject of much challenging activity. The ever-growing threat of malicious agents calls for techniques for automated malicious agent detection. In this context, the machine learning (ML methods are acknowledged more effective than the Signature-based and Behavior-based detection methods. Therefore, in this paper, the prime contribution has been made to detect the unknown malicious mobile agents based on n-gram features and supervised ML approach, which has not been done so far in the sphere of the Mobile Agents System (MAS security. To carry out the study, the n-grams ranging from 3 to 9 are extracted from a dataset containing 40 malicious and 40 non-malicious mobile agents. Subsequently, the classification is performed using different classifiers. A nested 5-fold cross validation scheme is employed in order to avoid the biasing in the selection of optimal parameters of classifier. The observations of extensive experiments demonstrate that the work done in this paper is suitable for the task of unknown malicious mobile agent detection in a Mobile Agent Environment, and also adds the ML in the interest list of researchers dealing with MAS security.

  1. The implementation of flipped classroom model in CIE in the environment of non-target language

    Science.gov (United States)

    Xiao, Renfei; Mustofa, Ali; Zhang, Fang; Su, Xiaoxue

    2018-01-01

    This paper sets a theoretical framework that it’s both feasible and indispensable of flipping classroom in Chinese International Education (CIE) in the non-target language environments. There are mainly three sections included: 1) what is flipped classroom and why it becomes inevitable existence; 2) why should we flip the classroom in CIE environments, especially in non-target language environments; 3) take Pusat Bahasa Mandarin Universitas Negeri Surabaya as an instance to discuss the application of flipped classroom in non-target language environments.

  2. Did You Get My E-Mail? Moving E-Mails beyond the Inbox

    Science.gov (United States)

    Ellis, Susan J.

    2011-01-01

    The challenge today is how to make e-mail and other forms of electronic communication effective in motivating volunteer action. Is it possible to make e-mails feel personal and welcoming? E-mail, instant messaging, texting, and social media are tools that allow individuals to communicate quickly and inexpensively, but they are lifeless without the…

  3. An Evaluation of Machine Learning Methods to Detect Malicious SCADA Communications

    Energy Technology Data Exchange (ETDEWEB)

    Beaver, Justin M [ORNL; Borges, Raymond Charles [ORNL; Buckner, Mark A [ORNL

    2013-01-01

    Critical infrastructure Supervisory Control and Data Acquisition (SCADA) systems were designed to operate on closed, proprietary networks where a malicious insider posed the greatest threat potential. The centralization of control and the movement towards open systems and standards has improved the efficiency of industrial control, but has also exposed legacy SCADA systems to security threats that they were not designed to mitigate. This work explores the viability of machine learning methods in detecting the new threat scenarios of command and data injection. Similar to network intrusion detection systems in the cyber security domain, the command and control communications in a critical infrastructure setting are monitored, and vetted against examples of benign and malicious command traffic, in order to identify potential attack events. Multiple learning methods are evaluated using a dataset of Remote Terminal Unit communications, which included both normal operations and instances of command and data injection attack scenarios.

  4. Assessment of information impacts in power system security against malicious attacks in a general framework

    International Nuclear Information System (INIS)

    Bompard, E.; Napoli, R.; Xue, F.

    2009-01-01

    In the analysis of power systems security, recently a new concern related to possible malicious attacks caught much attention. Coordination among different transmission system operators (TSO) in an interconnected power system to counteract such attacks has become an important problem. This paper presents a general framework for describing the physical, cyber and decision-making aspects of the problem and their interrelations; within this framework, an analytic tool for the assessment of information impacts in handling on-line security after a malicious attack is proposed and discussed. The model is based on the socially rational multi-agent systems and the equilibrium of a fictitious play is considered to analyze the impacts of various levels of information available to the interconnected system operators on the outcomes of the decision-making process under attack. A 34-buses test system, with 3 systems interconnected by tie-lines, is presented to illustrate the model and compare the impacts of different information scenarios

  5. Assessment of information impacts in power system security against malicious attacks in a general framework

    Energy Technology Data Exchange (ETDEWEB)

    Bompard, E. [Dipartimento di Ingegneria Elettrica, Politecnico di Torino, I-10129 Torino (Italy)], E-mail: ettore.bompard@polito.it; Napoli, R.; Xue, F. [Dipartimento di Ingegneria Elettrica, Politecnico di Torino, I-10129 Torino (Italy)

    2009-06-15

    In the analysis of power systems security, recently a new concern related to possible malicious attacks caught much attention. Coordination among different transmission system operators (TSO) in an interconnected power system to counteract such attacks has become an important problem. This paper presents a general framework for describing the physical, cyber and decision-making aspects of the problem and their interrelations; within this framework, an analytic tool for the assessment of information impacts in handling on-line security after a malicious attack is proposed and discussed. The model is based on the socially rational multi-agent systems and the equilibrium of a fictitious play is considered to analyze the impacts of various levels of information available to the interconnected system operators on the outcomes of the decision-making process under attack. A 34-buses test system, with 3 systems interconnected by tie-lines, is presented to illustrate the model and compare the impacts of different information scenarios.

  6. MalWebID-Autodetection and Identification of Malicious Web Hosts Through Live Traffic Analysis

    Science.gov (United States)

    2013-03-01

    site (i.e., Porn , Rx/Pharmaceutical, illegal activity, etc.) – propagate or contain viruses, spyware, or other harmful programs, participate in spamming...abu- sive sites remain a constant problem. This thesis explores a technique to discern hosts that support abusive web infrastructure by discovering...in- clude, but is not limited to, web sites that cater to, sponsor, or actively participate in supporting various forms of malicious content. Thus

  7. Application for automatic e-mail forwarding

    OpenAIRE

    Skupek, Rok

    2010-01-01

    The diploma thesis has two main goals: the first objective is to develop a dynamic library, which will contain methods able to download e-mail messages from mail server using POP3 protocol. The second objective involves development of application for processing and distribution of e-mail messages. Introduction cointains presentation of a practical application example in real time situation. Here are described procedures used for development of server - client communication library, which u...

  8. New method for assessing risks of email

    Science.gov (United States)

    Raja, Seyyed H.; Afrooz, Farzad

    2013-03-01

    E-mail technology, has become one of the requirements of human lives for correspondence between individuals. Given this, the important point is that the messages, server and client of e-mail and correspondences that exchanged between different people have acceptable security, to make people sure to use of this technology. In the information age, many of financial and non financial transactions are done electronically, data exchange takes place via the internet and theft and manipulation of data can make exorbitant cost in terms of integrity, financial, political, economic and culture. E-mail correspondence in there is same and it is very important. With review took place, a method that will focus on email system for risks assessment is not provided. We are examining ways of assessing for other systems and their strengths and weaknesses, then we use Mr Convery method for assessing email risks which it is for assessing network risks. At the end of paper we have offered special table for email risk assessment.

  9. Is Email Business Dying?: A Study on Evolution of Email Spam Over Fifteen Years

    Directory of Open Access Journals (Sweden)

    De Wang

    2014-05-01

    Full Text Available With the increasing dedication and sophistication of spammers, email spam is a persistent problem even today. Popular social network sites such as Facebook, Twitter, and Google+ are not exempt from email spam as they all interface with email systems. While some report predicts that email spam business is dying due to the decreasing volume of email spam. Whether email spam business is really dying is an interesting question. In this paper, we analyze email spam trends on Spam Archive dataset, which contains 5.5 million spam emails over 15 years (1998 – 2013. We statistically analyze emails contents including header information (e.g. content type and embedded items (e.g. URL links. Also, we investigate topic drift using topic modeling technique. Moreover, we perform network analysis on sender-to-receiver IP routing networks. Our study shows the dynamic nature of email spam over one and a half decades and demonstrate that the email spam business is not dying but more capricious.

  10. AppFA: A Novel Approach to Detect Malicious Android Applications on the Network

    Directory of Open Access Journals (Sweden)

    Gaofeng He

    2018-01-01

    Full Text Available We propose AppFA, an Application Flow Analysis approach, to detect malicious Android applications (simply apps on the network. Unlike most of the existing work, AppFA does not need to install programs on mobile devices or modify mobile operating systems to extract detection features. Besides, it is able to handle encrypted network traffic. Specifically, we propose a constrained clustering algorithm to classify apps network traffic, and use Kernel Principal Component Analysis to build their network behavior profiles. After that, peer group analysis is explored to detect malicious apps by comparing apps’ network behavior profiles with the historical data and the profiles of their selected peer groups. These steps can be repeated every several minutes to meet the requirement of online detection. We have implemented AppFA and tested it with a public dataset. The experimental results show that AppFA can cluster apps network traffic efficiently and detect malicious Android apps with high accuracy and low false positive rate. We have also tested the performance of AppFA from the computational time standpoint.

  11. Side Effects of Nitrification Inhibitors on Non Target Microbial Processes in Soils

    OpenAIRE

    Johannes Carl Gottlieb Ottow; Gero Benckiser; Ferisman Tindaon

    2011-01-01

    Agricultural chemicals have been used extensively in modern agriculture and toxicological studies suggest a great potential for inducing undesirable effects on non target organisms. A model experiment was conducted in order to determine side effects of three nitrification inhibitors (NIs, 3,4dimethylpyrazolephosphate = DMPP, 4-Chlormethylpyrazole phosphate = ClMPP and dicyandiamide = DCD) on non target microbial processes in soils. Side effects and dose response curve of three NIs were quanti...

  12. Management and Archiving e-mail Messages in Governmental Organization

    OpenAIRE

    Ashraf Mohamed A.Mohsen

    2006-01-01

    The study deals great issue of digital preservation that is e-mail archiving, it covered all aspects of the topic; it discuss: e-mail system, components of e-mail message, advantages and disadvantages of e-mail, official e-mail messages, management of e-mail messages, organizing and arrangement of e-mail messages, keeping and deleting messages, archiving e-mail messages, and some related issues like: privacy and security.

  13. Email for clinical communication between healthcare professionals.

    Science.gov (United States)

    Goyder, Clare; Atherton, Helen; Car, Mate; Heneghan, Carl J; Car, Josip

    2015-02-20

    Email is one of the most widely used methods of communication, but its use in healthcare is still uncommon. Where email communication has been utilised in health care, its purposes have included clinical communication between healthcare professionals, but the effects of using email in this way are not well known. We updated a 2012 review of the use of email for two-way clinical communication between healthcare professionals. To assess the effects of email for clinical communication between healthcare professionals on healthcare professional outcomes, patient outcomes, health service performance, and service efficiency and acceptability, when compared to other forms of communicating clinical information. We searched: the Cochrane Consumers and Communication Review Group Specialised Register, Cochrane Central Register of Controlled Trials (CENTRAL, The Cochrane Library, Issue 9 2013), MEDLINE (OvidSP) (1946 to August 2013), EMBASE (OvidSP) (1974 to August 2013), PsycINFO (1967 to August 2013), CINAHL (EbscoHOST) (1982 to August 2013), and ERIC (CSA) (1965 to January 2010). We searched grey literature: theses/dissertation repositories, trials registers and Google Scholar (searched November 2013). We used additional search methods: examining reference lists and contacting authors. Randomised controlled trials, quasi-randomised trials, controlled before and after studies, and interrupted time series studies examining interventions in which healthcare professionals used email for communicating clinical information in the form of: 1) unsecured email, 2) secure email, or 3) web messaging. All healthcare professionals, patients and caregivers in all settings were considered. Two authors independently assessed studies for inclusion, assessed the included studies' risk of bias, and extracted data. We contacted study authors for additional information and have reported all measures as per the study report. The previous version of this review included one randomised controlled

  14. Troubleshooting Requests e-mail Confirmation

    CERN Multimedia

    TS Department

    2004-01-01

    In an ongoing effort to improve quality of the repair requests, a new e-mail confirmation automatic system will be implemented starting from the 21st October. All repair requests transmitted to the TCR (72201) or the FM Helpdesk (77777) will be confirmed in an e-mail to the requestor, provided that the latter has a valid e-mail address in the HR database. The e-mail will contain a reference number, a brief description of the problem, the location and a contact where more information can be obtained. A second e-mail will be sent when the processing of the repair request is finished. We hope that this initiative will improve the transparency and quality of our service. Helpdesk Troubleshooting Requests (reminder) We remind you that all the repair requests and other communication concerning the CERN machine buildings have to be transmitted to the TCR via 72201, whereas the ones concerning tertiary buildings are handled directly by the FM helpdesk under the phone number 77777, i.e. problems on systems and equ...

  15. [WMN: a negative ERPs component related to working memory during non-target visual stimuli processing].

    Science.gov (United States)

    Zhao, Lun; Wei, Jin-he

    2003-10-01

    To study non-target stimuli processing in the brain. Features of the event-related potentials (ERPs) from non-target stimuli during selective response task (SR) was compared with that during visual selective discrimination (DR) task in 26 normal subjects. The stimuli consisted of two color LED flashes (red and green) appeared randomly in left (LVF) or right (RVF) visual field with same probability. ERPs were derived at 9 electrode sites on the scalp under 2 task conditions: a) SR, making switch response to the target (NT) stimuli from LVF or RVF in one direction and making no response to the non-target (NT) ones; b) DR, making switching response to T stimuli differentially, i.e., to the left for T from LVF and to the right for T from RVF. 1) the non-target stimuli in DR conditions, compared with that in SR condition, elicited smaller P2 and P3 components and larger N2 component at the frontal brain areas; 2) a significant negative component, named as WMN (working memory negativity), appeared in the non-target ERPs during DR in the period of 100 to 700 ms post stimulation which was predominant at the frontal brain areas. According to the major difference between brain activities for non-target stimuli during SR and DR, the predominant appearance of WMN at the frontal brain areas demonstrated that the non-target stimulus processing was an active process and was related to working memory, i.e., the temporary elimination and the retrieval of the response mode which was stored in working memory.

  16. Non-targeted effects of ionising radiation. Proceedings of the RISC-RAD specialised training course

    International Nuclear Information System (INIS)

    Belyakov, O.V.

    2008-12-01

    The training course 'Non-targeted effects of ionising radiation' took place at the STUK, Radiation and Nuclear Safety Authority, Helsinki, Finland 14-16 February 2005. Proceeding of this course is collected in this volume. The idea of the course was to convene a number of scientists leading in the area of non-targeted effects of ionising radiation with the aim to outline their visions for the role of these effects and outline the future directions of radiation research on the basis of their expertise. The course was supported by the RISC-RAD IP FI6R-CT-2003-508842, Euratom specific programme for research and training on nuclear energy, 6th FP of the EC. The main objectives of the training course were: (1) to clarify the mechanisms of non-targeted effects, in particular, bystander effects, genomic instability and adaptive response; (2) to look if and how non-targeted effects modulate the cancer risk in the low dose region, and whether they relate to protective or harmful functions; (3) to clarify if ionising radiation can cause non-cancer diseases or beneficial effects at low and intermediate doses; (4) address the issue of individual susceptibility and other factors modifying non-targeted responses; (5) attempt to assess the relevance of non-targeted effects for radiation protection and to set the scientific basis for a modern, more realistic, radiation safety system; (6) and finally to contribute to the conceptualisation of a new paradigm in radiation biology that would cover both the classical direct (DNA-targeted) and non-targeted (indirect) effects

  17. The Security Email Based on Smart Card

    Science.gov (United States)

    Lina, Zhang; Jiang, Meng Hai.

    Email has become one of the most important communication tools in modern internet society, and its security is an important issue that can't be ignored. The security requirements of Email can be summarized as confidentiality, integrity, authentication and non-repudiation. Recently many researches on IBE (identify based encrypt) have been carried out to solve these security problems. However, because of IBE's fatal flaws and great advantages of PKI (Public Key Infrastructure), PKI is found to be still irreplaceable especially in the applications based on smart card. In this paper, a construction of security Email is presented, then the design of relatively cryptography algorithms and the configuration of certificates are elaborated, and finally the security for the proposed system is discussed.

  18. Non-targeted effects of ionising radiation - Implications for radiation protection

    International Nuclear Information System (INIS)

    Sisko Salomaa

    2006-01-01

    The universality of the target theory of radiation-induced effects is challenged by observations on non-targeted effects such as bystander effects, genomic instability and adaptive response. Essential features of non-targeted effects are that they do not require direct nuclear exposure by radiation and they are particularly significant at low doses. This new evidence suggests a need for a new paradigm in radiation biology. The new paradigm should cover both the classical (targeted) and the non-targeted effects. New aspects include the role of cellular communication and tissue-level responses. A better understanding of non-targeted effects may have important consequences for health risk assessment and, consequently, on radiation protection. Non-targeted effects may contribute to the estimation of cancer risk from occupational, medical and environmental exposures. In particular, they may have implications for the applicability of the Linear-No-Threshold (LNT) model in extrapolating radiation risk data into the low-dose region. This also means that the adequacy of the concept of dose to estimate risk is challenged by these findings. Moreover, these effects may provide new mechanistic explanations for the development of non-cancer diseases. Further research is required to determine if these effects, typically measured in cell cultures, are applicable in tissue level, whole animals, and ultimately in humans. (author)

  19. Side Effects of Nitrification Inhibitors on Non Target Microbial Processes in Soils

    Directory of Open Access Journals (Sweden)

    Johannes Carl Gottlieb Ottow

    2011-01-01

    Full Text Available Agricultural chemicals have been used extensively in modern agriculture and toxicological studies suggest a great potential for inducing undesirable effects on non target organisms. A model experiment was conducted in order to determine side effects of three nitrification inhibitors (NIs, 3,4dimethylpyrazolephosphate = DMPP, 4-Chlor-methylpyrazole phosphate = ClMPP and dicyandiamide = DCD on non target microbial processes in soils. Side effects and dose response curve of three NIs were quantified under laboratory conditions using silty clay, loam and a sandy soils. Dehydrogenase, dimethylsulfoxide reductase as well as nitrogenase activity (NA and potential denitrification capacity were measured as common and specific non target microbial processes. The influence of 5-1000 times the base concentration, dose response curves were examined, and no observable effect level = NOEL, as well as effective dose ED10 and ED50 (10% and 50% inhibition were calculated. The NOEL for microbial non target processes were about 30–70 times higher than base concentration in all investigated soils. The potential denitrification capacity revealed to be the most sensitive parameter. ClMPP exhibited the strongest influence on the non target microbial processes in the three soils. The NOEL, ED10 and ED50 values were higher in clay than in loamy or sandy soil. The NIs was the most effective in sandy soils.

  20. Non-targeted effects of ionising radiation - Implications for radiation protection

    Energy Technology Data Exchange (ETDEWEB)

    Sisko Salomaa [STUK - Radiation and Nuclear Safety Authority, Helsinki (Finland)

    2006-07-01

    The universality of the target theory of radiation-induced effects is challenged by observations on non-targeted effects such as bystander effects, genomic instability and adaptive response. Essential features of non-targeted effects are that they do not require direct nuclear exposure by radiation and they are particularly significant at low doses. This new evidence suggests a need for a new paradigm in radiation biology. The new paradigm should cover both the classical (targeted) and the non-targeted effects. New aspects include the role of cellular communication and tissue-level responses. A better understanding of non-targeted effects may have important consequences for health risk assessment and, consequently, on radiation protection. Non-targeted effects may contribute to the estimation of cancer risk from occupational, medical and environmental exposures. In particular, they may have implications for the applicability of the Linear-No-Threshold (LNT) model in extrapolating radiation risk data into the low-dose region. This also means that the adequacy of the concept of dose to estimate risk is challenged by these findings. Moreover, these effects may provide new mechanistic explanations for the development of non-cancer diseases. Further research is required to determine if these effects, typically measured in cell cultures, are applicable in tissue level, whole animals, and ultimately in humans. (author)

  1. Online Counseling Using Email: A Qualitative Study

    Science.gov (United States)

    Salleh, Amla; Hamzah, Ramlan; Nordin, Norazah; Ghavifekr, Simin; Joorabchi, Toktam Namyandeh

    2015-01-01

    Despite numerous studies in increasingly popular online mental health service, the nature of the relationship between online counselors and their clients, particularly in the email modality, deserves more attention. To enhance the knowledge in this area, this study was conducted to explore whether the online counseling relationship could be…

  2. E-mail security a pocket guide

    CERN Document Server

    Furnell, Steven

    2010-01-01

    This pocket guide will help businesses to address the most important issues. Its comprehensive approach covers both the technical and the managerial aspects of the subject, offering valuable insights for IT professionals, managers and executives, as well as for individual users of e-mail.

  3. Network Analysis with the Enron Email Corpus

    Science.gov (United States)

    Hardin, J. S.; Sarkis, G.; URC, P. .

    2015-01-01

    We use the Enron email corpus to study relationships in a network by applying six different measures of centrality. Our results came out of an in-semester undergraduate research seminar. The Enron corpus is well suited to statistical analyses at all levels of undergraduate education. Through this article's focus on centrality, students can explore…

  4. Fighting Spam: Moving Email to the Cloud

    Science.gov (United States)

    Schrader, Andrew

    2011-01-01

    On average, more than 90% of email is unwanted junk mail--spam. Many spam messages include annoying promotions for irrelevant products, but others include viruses and pornographic content, which can pose a severe legal issue for schools. Spam puts districts in a difficult situation as schools try to enhance learning in the classroom with advanced…

  5. Secure e-mail and Web browsing

    CERN Multimedia

    CERN. Geneva

    2009-01-01

    This is an entry-level 1.5-hour training course aimed to show how to detect and avoid typical security pitfalls encountered when e-mailing and browsing the Web. It is designed for non-technical users of Internet Explorer and Outlook. Register at CTA

  6. SPAM: Beware of emails asking for passwords

    CERN Multimedia

    IT Department

    2008-01-01

    CERN’s Computing Rules (Operational Circular No. 5) require that passwords remain confidential and must never be given to anyone, not even helpdesk or other support personnel. If you think that your password could have been exposed then you must immediately change it. Cybercriminals are making growing use of fake e-mail messages and Web sites to steal account and identity information from users. This technique is called ‘phishing’. The fake emails often look real and try to trick you into giving your password or other personal data. CERN has recently been targeted by a fake email message which requested users to send their username, password and date of birth. This case was promptly blocked by the CERN Mail Service, however future cases may still occur. Users need to be vigilant for any requests for passwords or personal data. Fake emails should be immediately deleted. In case of questions on this topic, you may contact helpdesk@cern.ch. CERN IT Department

  7. Two time-delay dynamic model on the transmission of malicious signals in wireless sensor network

    International Nuclear Information System (INIS)

    Keshri, Neha; Mishra, Bimal Kumar

    2014-01-01

    Highlights: • Role of time delay to reduce the adversary effect in WSN is explored. • Model with two time delays is proposed to analyse spread of malicious signal in WSN. • Dynamical behaviour of worm-free equilibrium and endemic equilibrium is shown. • Threshold condition for switch of stability are obtained analytically. • Relation between stability and the two time delays is also explored. - Abstract: Deployed in a hostile environment, motes of a Wireless sensor network (WSN) could be easily compromised by the attackers because of several constraints such as limited processing capabilities, memory space, and limited battery life time etc. While transmitting the data to their neighbour motes within the network, motes are easily compromised due to resource constraints. Here time delay can play an efficient role to reduce the adversary effect on motes. In this paper, we propose an epidemic model SEIR (Susceptible–Exposed–Infectious–Recovered) with two time delays to describe the transmission dynamics of malicious signals in wireless sensor network. The first delay accounts for an exposed (latent) period while the second delay is for the temporary immunity period due to multiple worm outbreaks. The dynamical behaviour of worm-free equilibrium and endemic equilibrium is shown from the point of stability which switches under some threshold condition specified by the basic reproduction number. Our results show that the global properties of equilibria also depends on the threshold condition and that latent and temporary immunity period in a mote does not affect the stability, but they play a positive role to control malicious attack. Moreover, numerical simulations are given to support the theoretical analysis

  8. Social networking through email : studying email usage patterns of persons with aphasia

    NARCIS (Netherlands)

    Al Mahmud, A.; Martens, J.B.O.S.

    2016-01-01

    Background: A social networking program has been developed by the Aphasia Union Netherlands (AVN) to enhance communication between older persons with aphasia (PWA) mutually and with their therapists. The medium of communication is email. Aims: The aim of the paper is to understand the email usage

  9. Understanding the spread of malicious mobile-phone programs and their damage potential

    OpenAIRE

    Wang, Pu; Gonzalez, Marta C.; Menezes, Ronaldo; Barabási, Albert-László

    2013-01-01

    The fast growing market for smart phones coupled with their almost constant on-line presence makes these devices the new targets of malicious code (virus) writers. To aggravate the issue, the security level of these devices is far below the state-of-the art of what is used in personal computers. It has been recently found that the topological spread of multimedia message service (MMS) viruses is highly restricted by the underlying fragmentation of the call graph—the term topological here refe...

  10. Malware Analyst's Cookbook and DVD Tools and Techniques for Fighting Malicious Code

    CERN Document Server

    Ligh, Michael; Hartstein, Blake

    2010-01-01

    A computer forensics "how-to" for fighting malicious code and analyzing incidents. With our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software. Written by well-known malware experts, this guide reveals solutions to numerous problems and includes a DVD of custom programs and tools that illustrate the concepts, enhancing your skills.: Security professionals face a constant battle agains

  11. Cisco Router and Switch Forensics Investigating and Analyzing Malicious Network Activity

    CERN Document Server

    Liu, Dale

    2009-01-01

    Cisco IOS (the software that runs the vast majority of Cisco routers and all Cisco network switches) is the dominant routing platform on the Internet and corporate networks. This widespread distribution, as well as its architectural deficiencies, makes it a valuable target for hackers looking to attack a corporate or private network infrastructure. Compromised devices can disrupt stability, introduce malicious modification, and endanger all communication on the network. For security of the network and investigation of attacks, in-depth analysis and diagnostics are critical, but no book current

  12. Dataset of anomalies and malicious acts in a cyber-physical subsystem.

    Science.gov (United States)

    Laso, Pedro Merino; Brosset, David; Puentes, John

    2017-10-01

    This article presents a dataset produced to investigate how data and information quality estimations enable to detect aNomalies and malicious acts in cyber-physical systems. Data were acquired making use of a cyber-physical subsystem consisting of liquid containers for fuel or water, along with its automated control and data acquisition infrastructure. Described data consist of temporal series representing five operational scenarios - Normal, aNomalies, breakdown, sabotages, and cyber-attacks - corresponding to 15 different real situations. The dataset is publicly available in the .zip file published with the article, to investigate and compare faulty operation detection and characterization methods for cyber-physical systems.

  13. Community composition of target vs. non-target fungi in fungicide treated wheat

    DEFF Research Database (Denmark)

    Knorr, Kamilla; Jørgensen, Lise Nistrup; Justesen, Annemarie Fejer

    2012-01-01

    disease in wheat and within the last decade, new aggressive strains of yellow rust has caused severe epidemics that lead to substantial yield losses. This study explored the community composition of target versus non-target fungi in yellow rust infected wheat as affected by treatment timing and dose......Fungicide treatments are common control strategies used to manage fungal pathogens in agricultural fields, however, effects of treatments on the composition of total fungal communities, including non-target fungi, in the phyllosphere is not well known. Yellow rust (Puccinia striiformis) is a common...

  14. Impact of fungicide and insecticide use on non-target aquatic organisms in rice paddy fields

    Directory of Open Access Journals (Sweden)

    Alana Cristina Dorneles Wandscheer

    Full Text Available ABSTRACT: The intensive use of plant protection products in rice paddy fields ( Oryza sativa L. has caused concern about the environmental impact on communities of non-target organisms that are natural inhabitants in these agroecosystems. The purpose of this review is to analyze the data currently available in the literature about some important fungicides and insecticides (such as trifloxystrobin, tebuconazole, tricyclazole, lambda-cyhalothrin, and thiamethoxam, which are currently used to control pests and diseases in rice paddy fields, as well as their effects on the community of non-target aquatic organisms.

  15. Non-targeted and delayed effects of exposure to ionizing radiation

    International Nuclear Information System (INIS)

    Zuo Yahui; Tong Jian

    2007-01-01

    Non-targeted and delayed effects are relative phenomena in cellular responses to ionizing radiation. These effects (bystander effects, genomic instability and adaptive responses) have been studied most extensively for radiation exposures. It is clear that adaptive responses, bystander effects and genomic instability will play an important role in the low dose-response to radiation. This review will provide a synthesis of the known, and proposed interrelationships amongst low-dose cellular responses to radiation, It also will examine the potential biological significance of non-targeted and delayed effects of exposure to ionizing radiation. (authors)

  16. Study on the non-target effect of ionizing radiation using single cell gel electrophoresis

    International Nuclear Information System (INIS)

    Wang Yan; Li Deguan; Liu Jianfeng; Chu Liping; Liu Qiang

    2008-01-01

    Objective: To assess the non-target effect of ionizing radiation by single cell gel electrophoresis (SCGE). Methods: Cross incubated the irradiated( 137 Cs; 2Gy) or non-irradiated lymphocytes of human peripheral blood in the irradiated or non-irradiated plasma respectively, then, assess the DNA damage of lymphocytes using SCGE analysis. Results: The lymphocytes incubated in the irradiated plasma presented more obvious DNA damage than the incubated in the non-irradiated plasma dose (P<0.05). Conclusion: The non-target effect of ionizing radiation can be assessed by SCGE, and the results confirm that cytokines may play a great role in it. (authors)

  17. Clustering and classification of email contents

    Directory of Open Access Journals (Sweden)

    Izzat Alsmadi

    2015-01-01

    Full Text Available Information users depend heavily on emails’ system as one of the major sources of communication. Its importance and usage are continuously growing despite the evolution of mobile applications, social networks, etc. Emails are used on both the personal and professional levels. They can be considered as official documents in communication among users. Emails’ data mining and analysis can be conducted for several purposes such as: Spam detection and classification, subject classification, etc. In this paper, a large set of personal emails is used for the purpose of folder and subject classifications. Algorithms are developed to perform clustering and classification for this large text collection. Classification based on NGram is shown to be the best for such large text collection especially as text is Bi-language (i.e. with English and Arabic content.

  18. INTELLIGENT E-MAIL PERSONALIZATION SYSTEM

    Directory of Open Access Journals (Sweden)

    SHANMUGASUNDARAM HARIHARAN

    2011-02-01

    Full Text Available In Internet era E-mail has become the most important mode of communication in every day life. E-mail offers several advantages like secure delivery, speed, cheaper cost, acknowledgement report, transparent service, and distributed environment. As spammers try to induce large amount of spam or unsolicited mails, managing these E-mails’s in an efficient manner requires huge attention. This paper focus on personalizing the E-mail messages after eliminating the spam messages. The basic step starts with pre-processing the documents and classifying the contents into several folders or categories. The next step is to cluster the documents based on the relativeness they have using cosine similarity metric. This clustering approach is carried out using unsupervised method. The mail messages are the parsed through a filter that would identify the spam immediately. Studies on personalization of mails after spam identification, prioritizing the E-mail’s based on the importance and summarization of were also proposed. The results were quiet promising leading to efficient spam identification providing a platform for further improvements to build a domain independent personalizer system.

  19. E-mail to SMS service change

    CERN Multimedia

    IT Department

    2010-01-01

    If you have a CERN e-mail account, you have probably already used one of the popular services that CERN’s IT Department offers to CERN users: the mail2SMS service. It allows any CERN e-mail account holder to send short messages (SMS) free of charge to CERN GSM phone numbers. Further to recent negotiations with our GSM operator, this service has been extended. It is now possible to send short messages free of charge to any Swiss mobile number. This extension of service aims at replacing the similar service that was made available by SWITCH(1) to CERN users (address: mobilenumber@sms.switch.ch). Because of repeated abuse, this service will be definitively stopped for CERN users on 15th January 2010. Please keep in mind that CERN’s e-mail to SMS service still has some restrictions: messages can only be sent from CERN mail accounts, and not from personal ones, such as GMAIL, MSN, Yahoo; the maximum length of the message is 160 characters (standard maximum SMS length); and only Swiss mobile...

  20. Probabilistic Localization and Tracking of Malicious Insiders Using Hyperbolic Position Bounding in Vehicular Networks

    Directory of Open Access Journals (Sweden)

    Laurendeau Christine

    2009-01-01

    Full Text Available A malicious insider in a wireless network may carry out a number of devastating attacks without fear of retribution, since the messages it broadcasts are authenticated with valid credentials such as a digital signature. In attributing an attack message to its perpetrator by localizing the signal source, we can make no presumptions regarding the type of radio equipment used by a malicious transmitter, including the transmitting power utilized to carry out an exploit. Hyperbolic position bounding (HPB provides a mechanism to probabilistically estimate the candidate location of an attack message's originator using received signal strength (RSS reports, without assuming knowledge of the transmitting power. We specialize the applicability of HPB into the realm of vehicular networks and provide alternate HPB algorithms to improve localization precision and computational efficiency. We extend HPB for tracking the consecutive locations of a mobile attacker. We evaluate the localization and tracking performance of HPB in a vehicular scenario featuring a variable number of receivers and a known navigational layout. We find that HPB can position a transmitting device within stipulated guidelines for emergency services localization accuracy.

  1. Tumor Microenvironment Modulation via Gold Nanoparticles Targeting Malicious Exosomes: Implications for Cancer Diagnostics and Therapy

    Directory of Open Access Journals (Sweden)

    Catarina Roma-Rodrigues

    2017-01-01

    Full Text Available Exosomes are nanovesicles formed in the endosomal pathway with an important role in paracrine and autocrine cell communication. Exosomes secreted by cancer cells, malicious exosomes, have important roles in tumor microenvironment maturation and cancer progression. The knowledge of the role of exosomes in tumorigenesis prompted a new era in cancer diagnostics and therapy, taking advantage of the use of circulating exosomes as tumor biomarkers due to their stability in body fluids and targeting malignant exosomes’ release and/or uptake to inhibit or delay tumor development. In recent years, nanotechnology has paved the way for the development of a plethora of new diagnostic and therapeutic platforms, fostering theranostics. The unique physical and chemical properties of gold nanoparticles (AuNPs make them suitable vehicles to pursuit this goal. AuNPs’ properties such as ease of synthesis with the desired shape and size, high surface:volume ratio, and the possibility of engineering their surface as desired, potentiate AuNPs’ role in nanotheranostics, allowing the use of the same formulation for exosome detection and restraining the effect of malicious exosomes in cancer progression.

  2. Tumor Microenvironment Modulation via Gold Nanoparticles Targeting Malicious Exosomes: Implications for Cancer Diagnostics and Therapy.

    Science.gov (United States)

    Roma-Rodrigues, Catarina; Raposo, Luís R; Cabral, Rita; Paradinha, Fabiana; Baptista, Pedro V; Fernandes, Alexandra R

    2017-01-14

    Exosomes are nanovesicles formed in the endosomal pathway with an important role in paracrine and autocrine cell communication. Exosomes secreted by cancer cells, malicious exosomes, have important roles in tumor microenvironment maturation and cancer progression. The knowledge of the role of exosomes in tumorigenesis prompted a new era in cancer diagnostics and therapy, taking advantage of the use of circulating exosomes as tumor biomarkers due to their stability in body fluids and targeting malignant exosomes' release and/or uptake to inhibit or delay tumor development. In recent years, nanotechnology has paved the way for the development of a plethora of new diagnostic and therapeutic platforms, fostering theranostics. The unique physical and chemical properties of gold nanoparticles (AuNPs) make them suitable vehicles to pursuit this goal. AuNPs' properties such as ease of synthesis with the desired shape and size, high surface:volume ratio, and the possibility of engineering their surface as desired, potentiate AuNPs' role in nanotheranostics, allowing the use of the same formulation for exosome detection and restraining the effect of malicious exosomes in cancer progression.

  3. Non-targeted plasma metabolome of early and late lactation gilts

    Science.gov (United States)

    Female pigs nursing their first litter (first-parity gilts) have increased energy requirements not only to support their piglets, but they themselves are still maturing. Non-targeted plasma metabolomics were used to investigate the differences between (1) post-farrowing and weaning (early or late l...

  4. Effects of suction-dredging for cockles on non-target fauna in the Wadden Sea

    NARCIS (Netherlands)

    Hiddink, JG

    2003-01-01

    Suction dredging for cockles removes large cockles from tidal flats and may also cause mortality of non-target fauna and make the habitat less suitable for some species. This study examines whether suction dredging for cockles on tidal flats of the Dutch Wadden Sea had affected densities of

  5. Non-targeted mutagenesis of unirradiated lambda phage in Escherichia coli

    International Nuclear Information System (INIS)

    Wood, R.D.; Hutchinson, F.

    1984-01-01

    Non-targeted mutagenesis of lambda phage by ultraviolet light is the increase over background mutagenesis when non-irradiated phage are grown in irradiated Escherichia coli host cells. Such mutagenesis is caused by different processes from targeted mutagenesis, in which mutations in irradiated phage are correlated with photoproducts in the phage DNA. Non-irradiated phage grown in heavily irradiated uvr + host cells showed non-targeted mutations, which were 3/4 frameshifts, whereas targeted mutations were 2/3 transitions. For non-targeted mutagenesis in heavily irradiated host cells, there were one or two mutant phage per mutant burst. From the results of a series of experiments with various mutant host cells, a major pathway of non-targeted mutagenesis by ultraviolet light was proposed which acts in addition to ''SOS induction''. This pathway involves binding of the enzyme DNA polymerase I to damaged genomic DNA, and low polymerase activity leads to frameshift mutations during semiconservative DNA replication. The data suggest that this process will play a much smaller role in ultraviolet mutagenesis of the bacterial genome than it does in the mutagenesis of lambda phage. (author)

  6. Impact of parathion exposure on some biochemical parameters in rabbit as a non target organism

    Directory of Open Access Journals (Sweden)

    Nagat Aly

    2015-03-01

    Conclusion: The results indicated that changes in body and organ weights have been used as indicators of adverse effects of parathion and also alteration in tested enzymes activity can be used as relevant biomarkers for monitoring toxicity due to parathion exposure in non target organisms.

  7. Non-targeted mutagenesis of unirradiated lambda phage in Escherichia coli

    Energy Technology Data Exchange (ETDEWEB)

    Wood, R.D.; Hutchinson, F. (Yale Univ., New Haven, CT (USA). Dept. of Molecular Biophysics and Biochemistry)

    1984-03-05

    Non-targeted mutagenesis of lambda phage by ultraviolet light is the increase over background mutagenesis when non-irradiated phage are grown in irradiated Escherichia coli host cells. Such mutagenesis is caused by different processes from targeted mutagenesis, in which mutations in irradiated phage are correlated with photoproducts in the phage DNA. Non-irradiated phage grown in heavily irradiated uvr/sup +/ host cells showed non-targeted mutations, which were 3/4 frameshifts, whereas targeted mutations were 2/3 transitions. For non-targeted mutagenesis in heavily irradiated host cells, there were one or two mutant phage per mutant burst. From the results of a series of experiments with various mutant host cells, a major pathway of non-targeted mutagenesis by ultraviolet light was proposed which acts in addition to ''SOS induction''. This pathway involves binding of the enzyme DNA polymerase I to damaged genomic DNA, and low polymerase activity leads to frameshift mutations during semiconservative DNA replication. The data suggest that this process will play a much smaller role in ultraviolet mutagenesis of the bacterial genome than it does in the mutagenesis of lambda phage.

  8. Manifestations and mechanisms of non-targeted effects of ionizing radiation

    International Nuclear Information System (INIS)

    Wright, Eric G.

    2010-01-01

    A well-established radiobiological paradigm is that the biological effects of ionizing radiation occur in irradiated cells as a consequence of the DNA damage they incur. However, many observations of, so-called, non-targeted effects indicate that genetic alterations are not restricted to directly irradiated cells. Non-targeted effects are responses exhibited by non-irradiated cells that are the descendants of irradiated cells (radiation-induced genomic instability) or by cells that have communicated with irradiated cells (radiation-induced bystander effects). Radiation-induced genomic instability is characterized by chromosomal abnormalities, gene mutations and cell death. Similar effects, as well as responses that may be regarded as protective, have been attributed to bystander mechanisms. The majority of studies to date have used in vitro systems but some non-targeted effects have been demonstrated in vivo and there is also evidence for radiation-induced instability in the mammalian germ line. However, there may be situations where radiation-induced genomic instability in vivo may not necessarily identify genomically unstable somatic cells but the manifestation of responses to ongoing production of damaging signals generated by genotype-dependent mechanisms having properties in common with inflammatory processes. Non-targeted mechanisms have significant implications for understanding mechanisms of radiation action but the current state of knowledge does not permit definitive statements about whether these phenomena have implications for assessing radiation risk.

  9. Indirect Effects of Functional Communication Training on Non-Targeted Disruptive Behavior

    Science.gov (United States)

    Schieltz, Kelly M.; Wacker, David P.; Harding, Jay W.; Berg, Wendy K.; Lee, John F.; Padilla Dalmau, Yaniz C.; Mews, Jayme; Ibrahimovic, Muska

    2011-01-01

    The purpose of this study was to evaluate the effects of functional communication training (FCT) on the occurrence of non-targeted disruptive behavior. The 10 participants were preschool-aged children with developmental disabilities who engaged in both destructive (property destruction, aggression, self-injury) and disruptive (hand flapping,…

  10. Effects of neonicotinoids and fipronil on non-target invertebrates : Environmental Science and Pollution Research

    NARCIS (Netherlands)

    Pisa, L.W.; Amaral-Rogers, V.; Belzunces, L.P.; Bonmatin, J.M.; Downs, C.A.; Goulson, D.; Kreutzweiser, D.P.; Krupke, C.; Liess, M.; McField, M.; Morrissey, C.A.; Noome, D.A.; Settele, J.; Simon-Delso, N.; Stark, J.D.; Van der Sluijs, J.P.; Van Dyck, H.; Wiemers, M.

    2015-01-01

    We assessed the state of knowledge regarding the effects of large-scale pollution with neonicotinoid insecticides and fipronil on non-target invertebrate species of terrestrial, freshwater and marine environments. A large section of the assessment is dedicated to the state of knowledge on sublethal

  11. Using Email to Improve Parental Involvement in Middle School

    Science.gov (United States)

    Radin, Benjamin Theodore

    2013-01-01

    The purpose of this study was to test the relationship between the type of school-to-home communication (regularly sent, structured emails versus ad hoc emails), the originator of these emails (teacher or student), and Parental Involvement (PI) as measured according to the frequency of email contact and distribution of student and parent emails…

  12. Email and Epistolary technologies: Presence, Intimacy, Disembodiment

    Directory of Open Access Journals (Sweden)

    Esther Milne

    2003-01-01

    Full Text Available A key problem for critical media practice is how to assess accurately the technological impact, historical significance and cultural consequences of a particular change in a communications system. Contemporary theorising about the impact of electronic, digitally networked culture is often articulated within an eschatological narrative of apocalypse and last things. The old is cast as naive and redundant while the new appears triumphant, conquering and redemptive. Washing away the sins of the old, the new technology arrives, it seems, out of nowhere. In response to such socio-technological representations, this paper argues that the dialectic between old and new communication systems is more complex than has been assumed by contemporary media theory. Rather than a narrative of radical changes, decisive shifts and abrupt breaks, the relation between epistolary and email technology reveals certain continuities. Specifically, tropes of presence and intimacy are traced through three media sites: a "virtual community" of British nineteenth-century letter writers, the postcard correspondence of an Australian First World War soldier and a twenty first century email discussion list. Mapping these sites reveals a central paradox of technological and discursive cultural practice, namely, that material signifiers can be used to produce incorporeal presence.

  13. Non-targeted effects of ionising radiation—Implications for low dose risk

    DEFF Research Database (Denmark)

    Kadhim, Munira; Salomaa, Sisko; Wright, Eric

    2013-01-01

    and adaptive responses are powered by fundamental, but not clearly understood systems that maintain tissue homeostasis. Despite excellent research in this field by various groups, there are still gaps in our understanding of the likely mechanisms associated with non-DNA targeted effects, particularly......Non-DNA targeted effects of ionising radiation, which include genomic instability, and a variety of bystander effects including abscopal effects and bystander mediated adaptive response, have raised concerns about the magnitude of low-dose radiation risk. Genomic instability, bystander effects....... Furthermore, it is still not known what the initial target and early interactions in cells are that give rise to non-targeted responses in neighbouring or descendant cells. This paper provides a commentary on the current state of the field as a result of the non-targeted effects of ionising radiation (NOTE...

  14. E-mail security: new restriction on attachments

    CERN Multimedia

    The Mail Team

    2006-01-01

    In order to further protect CERN mail users against viruses that spread using malicious files, from 1st March onwards dangerous file types already forbidden as mail attachments will also be forbidden as contents of an archive attachment (.zip and .rar compressed files). More details, including a list of blocked file types, can be found at http://cern.ch/mmmservices/Help/?kbid=171010 The Mail Team

  15. E-mail security: new restriction on attachments

    CERN Multimedia

    The Mail Team

    2006-01-01

    In order to further protect CERN mail users against viruses that spread using malicious files, from 1st March onwards dangerous file types already forbidden as mail attachments will also be forbidden as contents of an archive attachment (.zip and .rar compressed files). More details, including a list of blocked file types, can be found at http://cern.ch/mmmservices/Help/?kbid=171010. The Mail Team

  16. Two Quarantine Models on the Attack of Malicious Objects in Computer Network

    Directory of Open Access Journals (Sweden)

    Bimal Kumar Mishra

    2012-01-01

    Full Text Available SEIQR (Susceptible, Exposed, Infectious, Quarantined, and Recovered models for the transmission of malicious objects with simple mass action incidence and standard incidence rate in computer network are formulated. Threshold, equilibrium, and their stability are discussed for the simple mass action incidence and standard incidence rate. Global stability and asymptotic stability of endemic equilibrium for simple mass action incidence have been shown. With the help of Poincare Bendixson Property, asymptotic stability of endemic equilibrium for standard incidence rate has been shown. Numerical methods have been used to solve and simulate the system of differential equations. The effect of quarantine on recovered nodes is analyzed. We have also analyzed the behavior of the susceptible, exposed, infected, quarantine, and recovered nodes in the computer network.

  17. Impact of genetically modified maize expressing Cry 3Bb1 on some non-target arthropods

    Czech Academy of Sciences Publication Activity Database

    Hussein, Hany; Svobodová, Zdeňka; Habuštová, Oxana; Půža, Vladimír; Sehnal, František

    2012-01-01

    Roč. 8, č. 10 (2012), s. 5124-5131 ISSN 1819-544X R&D Projects: GA MZe QH91093 Grant - others:projekt MOBITAG(CZ) REGPOT-2008-1, GA 229518 Institutional support: RVO:60077344 Keywords : MON 88017 * Cry3Bb1 * non-target organisms Subject RIV: GF - Plant Pathology, Vermin, Weed, Plant Protection http://www.aensiweb.com/jasr/jasr/2012/5124-5131.pdf

  18. Assessing Potential Impact of Bt Eggplants on Non-Target Arthropods in the Philippines

    Science.gov (United States)

    Navasero, Mario V.; Candano, Randolph N.; Hautea, Desiree M.; Hautea, Randy A.; Shotkoski, Frank A.; Shelton, Anthony M.

    2016-01-01

    Studies on potential adverse effects of genetically engineered crops are part of an environmental risk assessment that is required prior to the commercial release of these crops. Of particular concern are non-target organisms (NTOs) that provide important ecosystem services. Here, we report on studies conducted in the Philippines over three cropping seasons with Bt eggplants expressing Cry1Ac for control of the eggplant fruit and shoot borer (EFSB), Leucinodes orbonalis, to examine potential effects on field abundance, community composition, structure and biodiversity of NTO’s, particularly non-target arthropod (NTA) communities. We document that many arthropod taxa are associated with Bt eggplants and their non-Bt comparators and that the number of taxa and their densities varied within season and across trials. However, we found few significant differences in seasonal mean densities of arthropod taxa between Bt and non-Bt eggplants. As expected, a lower abundance of lepidopteran pests was detected in Bt eggplants. Higher abundance of a few non-target herbivores was detected in non-Bt eggplants as were a few non-target beneficials that might control them. Principal Response Curve (PRC) analyses showed no statistically significant impact of Bt eggplants on overall arthropod communities through time in any season. Furthermore, we found no significant adverse impacts of Bt eggplants on species abundance, diversity and community dynamics, particularly for beneficial NTAs. These results support our previous studies documenting that Bt eggplants can effectively and selectively control the main pest of eggplant in Asia, the EFSB. The present study adds that it can do so without adverse effects on NTAs. Thus, Bt eggplants can be a foundational component for controlling EFSB in an Integrated Pest Management (IPM) program and dramatically reduce dependence on conventional insecticides. PMID:27798662

  19. Detecting android malicious apps and categorizing benign apps with ensemble of classifiers

    KAUST Repository

    Wang, Wei

    2017-01-17

    Android platform has dominated the markets of smart mobile devices in recent years. The number of Android applications (apps) has seen a massive surge. Unsurprisingly, Android platform has also become the primary target of attackers. The management of the explosively expansive app markets has thus become an important issue. On the one hand, it requires effectively detecting malicious applications (malapps) in order to keep the malapps out of the app market. On the other hand, it needs to automatically categorize a big number of benign apps so as to ease the management, such as correcting an app’s category falsely designated by the app developer. In this work, we propose a framework to effectively and efficiently manage a big app market in terms of detecting malapps and categorizing benign apps. We extract 11 types of static features from each app to characterize the behaviors of the app, and employ the ensemble of multiple classifiers, namely, Support Vector Machine (SVM), K-Nearest Neighbor (KNN), Naive Bayes (NB), Classification and Regression Tree (CART) and Random Forest (RF), to detect malapps and to categorize benign apps. An alarm will be triggered if an app is identified as malicious. Otherwise, the benign app will be identified as a specific category. We evaluate the framework on a large app set consisting of 107,327 benign apps as well as 8,701 malapps. The experimental results show that our method achieves the accuracy of 99.39% in the detection of malapps and achieves the best accuracy of 82.93% in the categorization of benign apps.

  20. Study of target and non-target interplay in spatial attention task.

    Science.gov (United States)

    Sweeti; Joshi, Deepak; Panigrahi, B K; Anand, Sneh; Santhosh, Jayasree

    2018-02-01

    Selective visual attention is the ability to selectively pay attention to the targets while inhibiting the distractors. This paper aims to study the targets and non-targets interplay in spatial attention task while subject attends to the target object present in one visual hemifield and ignores the distractor present in another visual hemifield. This paper performs the averaged evoked response potential (ERP) analysis and time-frequency analysis. ERP analysis agrees to the left hemisphere superiority over late potentials for the targets present in right visual hemifield. Time-frequency analysis performed suggests two parameters i.e. event-related spectral perturbation (ERSP) and inter-trial coherence (ITC). These parameters show the same properties for the target present in either of the visual hemifields but show the difference while comparing the activity corresponding to the targets and non-targets. In this way, this study helps to visualise the difference between targets present in the left and right visual hemifields and, also the targets and non-targets present in the left and right visual hemifields. These results could be utilised to monitor subjects' performance in brain-computer interface (BCI) and neurorehabilitation.

  1. Non-target adjacent stimuli classification improves performance of classical ERP-based brain computer interface

    Science.gov (United States)

    Ceballos, G. A.; Hernández, L. F.

    2015-04-01

    Objective. The classical ERP-based speller, or P300 Speller, is one of the most commonly used paradigms in the field of Brain Computer Interfaces (BCI). Several alterations to the visual stimuli presentation system have been developed to avoid unfavorable effects elicited by adjacent stimuli. However, there has been little, if any, regard to useful information contained in responses to adjacent stimuli about spatial location of target symbols. This paper aims to demonstrate that combining the classification of non-target adjacent stimuli with standard classification (target versus non-target) significantly improves classical ERP-based speller efficiency. Approach. Four SWLDA classifiers were trained and combined with the standard classifier: the lower row, upper row, right column and left column classifiers. This new feature extraction procedure and the classification method were carried out on three open databases: the UAM P300 database (Universidad Autonoma Metropolitana, Mexico), BCI competition II (dataset IIb) and BCI competition III (dataset II). Main results. The inclusion of the classification of non-target adjacent stimuli improves target classification in the classical row/column paradigm. A gain in mean single trial classification of 9.6% and an overall improvement of 25% in simulated spelling speed was achieved. Significance. We have provided further evidence that the ERPs produced by adjacent stimuli present discriminable features, which could provide additional information about the spatial location of intended symbols. This work promotes the searching of information on the peripheral stimulation responses to improve the performance of emerging visual ERP-based spellers.

  2. Morphological Effect of Non-targeted Biomolecule-Modified MNPs on Reticuloendothelial System.

    Science.gov (United States)

    Li, Xiao; Hu, Yan; Xiao, Jie; Cheng, Dengfeng; Xiu, Yan; Shi, Hongcheng

    2015-12-01

    Magnetic nanoparticles (MNPs) with special morphology were commonly used as biomaterials, while morphological effects of non-targeted biomolecule-modified MNPs on biological behaviors were still unclear. In this research, spherical and rod-like Fe3O4 in a comparable size were synthesized and then surface-modified by bovine serum albumin (BSA) as a model of non-targeted biomolecule-modified MNPs. Morphological effects were featured by TEM and quantification of in vitro phagocytic uptake, as well as the in vivo quantification of particles in reticuloendothelial system (RES)-related organs of normal Kunming mice. For these non-targeted BSA-modified MNPs, intracellular distributions were the same, but the rod-like MNPs were more likely to be uptake by macrophages; furthermore, the BSA-modified MNPs gathered in RES-related organs soon after intravenous injection, but the rod-like ones were expelled from the lung more quickly and expelled from the spleen more slowly. These preliminary results may be referable if MNPs or other similar biomolecule-modified nanoparticles were used.

  3. Communicating the non-targeted effects of radiation from irradiated to non-irradiated cells

    International Nuclear Information System (INIS)

    Laiakis, E.C.; Morgan, W.F.

    2005-01-01

    For many years, the central dogma in radiobiology has been that energy deposited in the cell nucleus is responsible for the biological effects associated with radiation exposure. However, non-targeted and delayed effects of radiation have shifted this belief. The studies of radiation-induced genomic instability, the bystander and abscopal effects, clastogenic factors, and the Death Inducing Effect have dominated the interest of the radiobiology field of late. The passing of signals from irradiated to non-irradiated cells can be accomplished through cell-to-cell gap junction communication or secretion of molecules, which in turn can elicit a response through activation of signal transduction pathways. Proposed mediators of this phenotype include proteins involved with inflammation. Given their size and connection with oxidative stress, cytokines are an attractive candidate as mediators of the induction of the non-targeted effects of radiation. Here we review the evidence for a possible connection between these delayed non-targeted effects of radiation and the cytokine cascades associated with inflammation. (author)

  4. A Software Assurance Framework for Mitigating the Risks of Malicious Software in Embedded Systems Used in Aircraft

    Science.gov (United States)

    2011-09-01

    in what order, certain programming techniques such as recursion and trampoline code make this task impossible at compile time (and thus not...attack is used to jump to the hidden malicious code. This code just returns until it is time to cause a problem Stack Data Trampoline or

  5. Voting-based Classification for E-mail Spam Detection

    Directory of Open Access Journals (Sweden)

    Bashar Awad Al-Shboul

    2016-06-01

    Full Text Available The problem of spam e-mail has gained a tremendous amount of attention. Although entities tend to use e-mail spam filter applications to filter out received spam e-mails, marketing companies still tend to send unsolicited e-mails in bulk and users still receive a reasonable amount of spam e-mail despite those filtering applications. This work proposes a new method for classifying e-mails into spam and non-spam. First, several e-mail content features are extracted and then those features are used for classifying each e-mail individually. The classification results of three different classifiers (i.e. Decision Trees, Random Forests and k-Nearest Neighbor are combined in various voting schemes (i.e. majority vote, average probability, product of probabilities, minimum probability and maximum probability for making the final decision. To validate our method, two different spam e-mail collections were used.

  6. ASSESSING POSSIBLE ECOLOGICAL RISKS OF GENETICALLY MODIFIED CROPS: GENE EXPRESSION ASSAYS AND GENETIC MONITORING OF NON-TARGET ORGANISMS

    Science.gov (United States)

    Widespread planting of genetically modified crops with the Bt transgene pesticide has led to concern over non-target effects of Bt compounds in agroecosystems. While some research suggests that non-target organisms exposed to Bt toxin exhibit reduced fecundity and increased morta...

  7. E-mail, decisional styles, and rest breaks.

    Science.gov (United States)

    Baker, James R; Phillips, James G

    2007-10-01

    E-mail is a common but problematic work application. A scale was created to measure tendencies to use e-mail to take breaks (e-breaking); and self-esteem and decisional style (vigilance, procrastination, buck-passing, hypervigilance) were used to predict the self-reported and actual e-mail behaviors of 133 participants (students and marketing employees). Individuals who were low in defensive avoidance (buck-passing) engaged in more e-mailing per week, both in time spent on e-mail and message volume. E-breakers were more likely to engage in behavioral procrastination and spent more time on personal e-mail.

  8. Assessing risks to non-target species during poison baiting programs for feral cats.

    Directory of Open Access Journals (Sweden)

    Tony Buckmaster

    Full Text Available Poison baiting is used frequently to reduce the impacts of pest species of mammals on agricultural and biodiversity interests. However, baiting may not be appropriate if non-target species are at risk of poisoning. Here we use a desktop decision tree approach to assess the risks to non-target vertebrate species in Australia that arise from using poison baits developed to control feral house cats (Felis catus. These baits are presented in the form of sausages with toxicant implanted in the bait medium within an acid-soluble polymer capsule (hard shell delivery vehicle, or HSDV that disintegrates after ingestion. Using criteria based on body size, diet and feeding behaviour, we assessed 221 of Australia's 3,769 native vertebrate species as likely to consume cat-baits, with 47 of these likely to ingest implanted HSDVs too. Carnivorous marsupials were judged most likely to consume both the baits and HSDVs, with some large-bodied and ground-active birds and reptiles also consuming them. If criteria were relaxed, a further 269 species were assessed as possibly able to consume baits and 343 as possibly able to consume HSDVs; most of these consumers were birds. One threatened species, the Tasmanian devil (Sarcophilus harrisii was judged as definitely able to consume baits with implanted HSDVs, whereas five threatened species of birds and 21 species of threatened mammals were rated as possible consumers. Amphibia were not considered to be at risk. We conclude that most species of native Australian vertebrates would not consume surface-laid baits during feral cat control programs, and that significantly fewer would be exposed to poisoning if HSDVs were employed. However, risks to susceptible species should be quantified in field or pen trials prior to the implementation of a control program, and minimized further by applying baits at times and in places where non-target species have little access.

  9. Non-targeted analysis of unexpected food contaminants using LC-HRMS.

    Science.gov (United States)

    Kunzelmann, Marco; Winter, Martin; Åberg, Magnus; Hellenäs, Karl-Erik; Rosén, Johan

    2018-03-29

    A non-target analysis method for unexpected contaminants in food is described. Many current methods referred to as "non-target" are capable of detecting hundreds or even thousands of contaminants. However, they will typically still miss all other possible contaminants. Instead, a metabolomics approach might be used to obtain "true non-target" analysis. In the present work, such a method was optimized for improved detection capability at low concentrations. The method was evaluated using 19 chemically diverse model compounds spiked into milk samples to mimic unknown contamination. Other milk samples were used as reference samples. All samples were analyzed with UHPLC-TOF-MS (ultra-high-performance liquid chromatography time-of-flight mass spectrometry), using reversed-phase chromatography and electrospray ionization in positive mode. Data evaluation was performed by the software TracMass 2. No target lists of specific compounds were used to search for the contaminants. Instead, the software was used to sort out all features only occurring in the spiked sample data, i.e., the workflow resembled a metabolomics approach. Procedures for chemical identification of peaks were outside the scope of the study. Method, study design, and settings in the software were optimized to minimize manual evaluation and faulty or irrelevant hits and to maximize hit rate of the spiked compounds. A practical detection limit was established at 25 μg/kg. At this concentration, most compounds (17 out of 19) were detected as intact precursor ions, as fragments or as adducts. Only 2 irrelevant hits, probably natural compounds, were obtained. Limitations and possible practical use of the approach are discussed.

  10. Assessing risks to non-target species during poison baiting programs for feral cats.

    Science.gov (United States)

    Buckmaster, Tony; Dickman, Christopher R; Johnston, Michael J

    2014-01-01

    Poison baiting is used frequently to reduce the impacts of pest species of mammals on agricultural and biodiversity interests. However, baiting may not be appropriate if non-target species are at risk of poisoning. Here we use a desktop decision tree approach to assess the risks to non-target vertebrate species in Australia that arise from using poison baits developed to control feral house cats (Felis catus). These baits are presented in the form of sausages with toxicant implanted in the bait medium within an acid-soluble polymer capsule (hard shell delivery vehicle, or HSDV) that disintegrates after ingestion. Using criteria based on body size, diet and feeding behaviour, we assessed 221 of Australia's 3,769 native vertebrate species as likely to consume cat-baits, with 47 of these likely to ingest implanted HSDVs too. Carnivorous marsupials were judged most likely to consume both the baits and HSDVs, with some large-bodied and ground-active birds and reptiles also consuming them. If criteria were relaxed, a further 269 species were assessed as possibly able to consume baits and 343 as possibly able to consume HSDVs; most of these consumers were birds. One threatened species, the Tasmanian devil (Sarcophilus harrisii) was judged as definitely able to consume baits with implanted HSDVs, whereas five threatened species of birds and 21 species of threatened mammals were rated as possible consumers. Amphibia were not considered to be at risk. We conclude that most species of native Australian vertebrates would not consume surface-laid baits during feral cat control programs, and that significantly fewer would be exposed to poisoning if HSDVs were employed. However, risks to susceptible species should be quantified in field or pen trials prior to the implementation of a control program, and minimized further by applying baits at times and in places where non-target species have little access.

  11. Develop a solution for protecting and securing enterprise networks from malicious attacks

    Science.gov (United States)

    Kamuru, Harshitha; Nijim, Mais

    2014-05-01

    In the world of computer and network security, there are myriad ways to launch an attack, which, from the perspective of a network, can usually be defined as "traffic that has huge malicious intent." Firewall acts as one of the measure in order to secure the device from incoming unauthorized data. There are infinite number of computer attacks that no firewall can prevent, such as those executed locally on the machine by a malicious user. From the network's perspective, there are numerous types of attack. All the attacks that degrade the effectiveness of data can be grouped into two types: brute force and precision. The Firewall that belongs to Juniper has the capability to protect against both types of attack. Denial of Service (DoS) attacks are one of the most well-known network security threats under brute force attacks, which is largely due to the high-profile way in which they can affect networks. Over the years, some of the largest, most respected Internet sites have been effectively taken offline by Denial of Service (DOS) attacks. A DoS attack typically has a singular focus, namely, to cause the services running on a particular host or network to become unavailable. Some DoS attacks exploit vulnerabilities in an operating system and cause it to crash, such as the infamous Win nuke attack. Others submerge a network or device with traffic so that there are no more resources to handle legitimate traffic. Precision attacks typically involve multiple phases and often involves a bit more thought than brute force attacks, all the way from reconnaissance to machine ownership. Before a precision attack is launched, information about the victim needs to be gathered. This information gathering typically takes the form of various types of scans to determine available hosts, networks, and ports. The hosts available on a network can be determined by ping sweeps. The available ports on a machine can be located by port scans. Screens cover a wide variety of attack traffic

  12. Evaluation of a non-targeted "Omic"' approach in the safety assessment of genetically modified plants

    DEFF Research Database (Denmark)

    Metzdorff, Stine Broeng; Kok, E. J.; Knuthsen, Pia

    2006-01-01

    -time PCR, and High Performance Liquid Chromatography. Analysis by cDNA microarray was used as a non-targeted approach for the identification of potential unintended effects caused by the transformation. The results revealed that, although the transgenic lines possessed different types of integration events...... has the potential to become a useful tool for screening of unintended effects, but state that it is crucial to have substantial information on the natural variation in traditional crops in order to be able to interpret "ornics" data correctly within the framework of food safety assessment strategies...

  13. Effectiveness and Limitations of E-Mail Security Protocols

    OpenAIRE

    M. Tariq Banday

    2011-01-01

    Simple Mail Transport Protocol is the most widely adopted protocol for e-mail delivery. However, it lackssecurity features for privacy, authentication of sending party, integrity of e-mail message, nonrepudiationand consistency of e-mail envelope. To make e-mail communication secure and private,e-mail servers incorporate one or more security features using add-on security protocols. The add-onsecurity protocols provide a reasonable security but have several limitations. This paper discussesli...

  14. Students’ Use of Email and Facebook: A Comparative Perspective

    OpenAIRE

    Rahman, Synthia Bintey

    2013-01-01

    Facebook and email have become widely used communication media to Internet users. University students are a major part of Internet users and they use email and Facebook for multiple communication purposes. This research investigates the context of using Facebook and email by university students, the context of choosing any of the medium in respective communication over the last two years, and student perceptions with regard to Facebook and email as communication media. This study was accompli...

  15. Electronic Identities: The Strategic Use of Email for Impression Management.

    Science.gov (United States)

    Kersten, Larry; Phillips, Stephen R.

    Traditionally, e-mail (electronic mail) has been seen as an efficient communications medium for the transmission of simple, routine, unambiguous messages. More recent research has argued that the simple, efficient view of e-mail is incomplete. Future research should be extended into the strategic and symbolic functions of email, such as the use of…

  16. A Generalized Email Classification System for Workflow Analysis

    NARCIS (Netherlands)

    P. Chaipornkaew (Piyanuch); T. Prexawanprasut (Takorn); C-L. Chang (Chia-Lin); M.J. McAleer (Michael)

    2017-01-01

    textabstractOne of the most powerful internet communication channels is email. As employees and their clients communicate primarily via email, much crucial business data is conveyed via email content. Where businesses are understandably concerned, they need a sophisticated workflow management

  17. Using Mobile-Based Email for English Foreign Language Learners

    Science.gov (United States)

    Alzu'bi, Mohammad Akram mohammad; Sabha, Muhannad Rushdi Nimer

    2013-01-01

    This study aimed at investigating the role of Mobile-based Email in improving Ajloun College English Students' Achievement. It attempts to answer the following questions: What is the potential contribution of mobile-based email exchanged to writing skills? What is the potential contribution of mobile-based email exchanged to vocabulary…

  18. Teaching Email Politeness in the EFL/ESL Classroom

    Science.gov (United States)

    Economidou-Kogetsidis, Maria

    2015-01-01

    Writing status-congruent emails is a skill that requires high pragmatic competence and awareness of the politeness conventions and email etiquette that need to be followed. Planning and composing such emails pose a greater challenge for EFL learners who use English in "lingua franca" communication (ELF), as they not only often struggle…

  19. You’ve Got Email: a Workflow Management Extraction System

    NARCIS (Netherlands)

    P. Chaipornkaew (Piyanuch); T. Prexawanprasut (Takorn); M.J. McAleer (Michael)

    2017-01-01

    textabstractEmail is one of the most powerful tools for communication. Many businesses use email as the main channel for communication, so it is possible that substantial data are included in email content. In order to help businesses grow faster, a workflow management system may be required. The

  20. Investigasi Forensik Pada E-Mail Spoofing Menggunakan Metode Header Analysis

    OpenAIRE

    Hoiriyah, Hoiriyah; Sugiantoro, Bambang; Prayudi, Yudi

    2016-01-01

    Email merupakan salah satu fasilitas internet yang banyak digunakan untuk komunikasi dan bertukar informasi. Hal ini memungkinkan pihak ketiga menyalahgunakan email untuk mendapatkan informasi secara ilegal dengan mengubah identitas pengirim email dan menjadikannya seperti email yang berasal dari email yang sah (legitimate email), aktivitas tersebut biasa dikenal dengan istilah email spoofing. Untuk dapat mendeteksi adanya email spoofing, maka perlu adanya investigasi forensik email terhadap ...

  1. The effect of lindane on non-target fauna in a maize agro-ecosystem in Zambia

    International Nuclear Information System (INIS)

    Deedat, Y.D.; Chanda, S.; Chivundu, A.M.; Kalembe, G.; Mecha, C.D.

    1997-01-01

    The effect of lindane on non-target fauna in a maize agro-ecosystem was studied in Zambia in 1992 and 1993. While lindane was effective against the stalk borers, a target pest, it also affected other non-target fauna. Ants, spiders and springtails were significantly reduced. However the effect was only transient and lasted for approximately two months. Lindane appeared to have no real effect on aerial non-target fauna or on soil inhabiting microorganisms. (author). 8 refs, 6 tabs

  2. Do insect repellents induce drift behaviour in aquatic non-target organisms?

    Science.gov (United States)

    Fink, Patrick; Moelzner, Jana; Berghahn, Ruediger; von Elert, Eric

    2017-01-01

    Synthetic insect repellents are compounds applied to surfaces to discourage insects, mainly mosquitoes, from landing on those surfaces. As some of these repellents have repeatedly been detected in surface waters at significant concentrations, they may also exert repellent effects on aquatic non-target organisms. In running water systems, aquatic invertebrates actively enter downstream drift in order to avoid unfavourable environmental conditions. We thus tested the hypothesis that the widely used insect repellents DEET (N,N-Diethyl-m-toluamide), EBAAP (3-[N-butyl-N-acetyl]-aminopropionic acid ethyl ester) and Icaridin (1-piperidinecarboxylic acid 2-(2-hydroxyethyl)-1-methylpropyl ester) induce downstream drift behaviour in the aquatic invertebrates Gammarus pulex (Crustacea, Amphipoda) and Cloeon dipterum (Insecta, Ephemeroptera), using a laboratory-scale drift assay. We found no clear increase in the drift behaviour of both invertebrate species across a concentration gradient of eight orders of magnitude and even beyond maximum environmental concentrations for any of the three repellents. We found no evidence for a direct drift-inducing activity of insect repellents on aquatic non-target organisms. Copyright © 2016 Elsevier Ltd. All rights reserved.

  3. Acquisition of Cry1Ac protein by non-target arthropods in Bt soybean fields.

    Directory of Open Access Journals (Sweden)

    Huilin Yu

    Full Text Available Soybean tissue and arthropods were collected in Bt soybean fields in China at different times during the growing season to investigate the exposure of arthropods to the plant-produced Cry1Ac toxin and the transmission of the toxin within the food web. Samples from 52 arthropod species/taxa belonging to 42 families in 10 orders were analysed for their Cry1Ac content using enzyme-linked immunosorbent assay (ELISA. Among the 22 species/taxa for which three samples were analysed, toxin concentration was highest in the grasshopper Atractomorpha sinensis and represented about 50% of the concentration in soybean leaves. Other species/taxa did not contain detectable toxin or contained a concentration that was between 1 and 10% of that detected in leaves. These Cry1Ac-positive arthropods included a number of mesophyll-feeding Hemiptera, a cicadellid, a curculionid beetle and, among the predators, a thomisid spider and an unidentified predatory bug belonging to the Anthocoridae. Within an arthropod species/taxon, the Cry1Ac content sometimes varied between life stages (nymphs/larvae vs. adults and sampling dates (before, during, and after flowering. Our study is the first to provide information on Cry1Ac-expression levels in soybean plants and Cry1Ac concentrations in non-target arthropods in Chinese soybean fields. The data will be useful for assessing the risk of non-target arthropod exposure to Cry1Ac in soybean.

  4. Short communication. Incidence of the OLIPE mass-trapping on olive non-target arthropods

    Energy Technology Data Exchange (ETDEWEB)

    Porcel, M.; Ruano, F.; Sanllorente, O.; Caballero, J. A.; Campos, M.

    2009-07-01

    Due to the widespread of mass-trapping systems for Bactrocera oleae (Gmelin) (Diptera: Tephritidae) control in organic olive cropping, an assessment of the impact on arthropods of the olive agroecosystem was undertaken for the OLIPE trap type. The sampling was carried out in Los Pedroches valley (Cordoba, southern Spain) in three different organic orchard sites. Six OLIPE traps baited with diammonium phosphate were collected from each site (18 in total) from July to November 2002 every 15 days on average. Additionally, in the latest sampling dates, half the traps were reinforced with pheromone to assess its impact on non-target arthropods. From an average of 43.0 catches per trap (cpt) of non-target arthropods during the whole sampling period, the highest number of captures corresponds to the Order Diptera (that represents a 68.5%), followed distantly by the family Formicidae (12.9%) and the Order Lepidoptera (10.4%). Besides the impact on ant populations, other beneficial groups were recorded such as parasitoids (Other Hymenoptera: 2.6%) and predators (Araneae: 1.0%; Neuroptera s.l.: 0.4%). Concerning the temporal distribution of catches, total captures peaked on July and had a slight increase at the beginning of autumn. No significant differences were observed between traps with and without pheromone. The results evidence that a considerable amount of non-specific captures could be prevented by improving the temporal planning of the mass-trapping system. (Author) 25 refs.

  5. [Exposure degree of important non-target arthropods to Cry2Aa in Bt rice fields].

    Science.gov (United States)

    Zhang, Qing-Ling; Li, Yun-He; Hua, Hong-Xia; Yang, Chang-Ju; Wu, Hong-Jin; Peng, Yu-Fa

    2013-06-01

    Based on the principle of "risk = hazard x exposure", the selected representative nontarget organisms in the assessment of the potential effects of insect-resistant genetically modified (GM) crops on non-target arthropods in laboratory are generally the arthropod species highly exposed to the insecticidal proteins expressed by the GM crops in farmland ecosystem. In order to understand the exposure degree of the important arthropod species to Cry proteins in Bt rice fields, and to select the appropriate non-target arthropods in the risk assessment of insect-resistant GM crops, the enzyme-linked immunosorbent assay (ELISA) was conducted to measure the Cry2Aa protein concentration in the arthropods collected from the cry2Aa rice fields at different rice growth stages. The results showed that there was a significant difference in the Cry2Aa content protein concentration in different arthropod species. Some species did not contain Cry2Aa protein, while some species contained larger amounts of Cry2Aa protein. Relative to the arthropods colleted after rice anthesis, the arthropods colleted in rice anthesis contained relative higher concentrations of Cry2Aa protein, especially for the predacious arthropods. No Cry proteins were detected in parasitic arthropods. This study provided references for the laboratory assessment of the effects of GM rice on nontarget arthropods.

  6. Acquisition of Cry1Ac Protein by Non-Target Arthropods in Bt Soybean Fields

    Science.gov (United States)

    Yu, Huilin; Romeis, Jörg; Li, Yunhe; Li, Xiangju; Wu, Kongming

    2014-01-01

    Soybean tissue and arthropods were collected in Bt soybean fields in China at different times during the growing season to investigate the exposure of arthropods to the plant-produced Cry1Ac toxin and the transmission of the toxin within the food web. Samples from 52 arthropod species/taxa belonging to 42 families in 10 orders were analysed for their Cry1Ac content using enzyme-linked immunosorbent assay (ELISA). Among the 22 species/taxa for which three samples were analysed, toxin concentration was highest in the grasshopper Atractomorpha sinensis and represented about 50% of the concentration in soybean leaves. Other species/taxa did not contain detectable toxin or contained a concentration that was between 1 and 10% of that detected in leaves. These Cry1Ac-positive arthropods included a number of mesophyll-feeding Hemiptera, a cicadellid, a curculionid beetle and, among the predators, a thomisid spider and an unidentified predatory bug belonging to the Anthocoridae. Within an arthropod species/taxon, the Cry1Ac content sometimes varied between life stages (nymphs/larvae vs. adults) and sampling dates (before, during, and after flowering). Our study is the first to provide information on Cry1Ac-expression levels in soybean plants and Cry1Ac concentrations in non-target arthropods in Chinese soybean fields. The data will be useful for assessing the risk of non-target arthropod exposure to Cry1Ac in soybean. PMID:25110881

  7. Assessment of Total Risk on Non-Target Organisms in Fungicide Application for Agricultural Sustainability

    Directory of Open Access Journals (Sweden)

    Ali Musa Bozdogan

    2014-02-01

    Full Text Available In Turkey, in 2010, the amount of pesticide (active ingredient; a.i. used in agriculture was about 23,000 metric tons, of which approximately 32% was fungicides. In 2012, 14 a.i. were used for fungus control in wheat cultivation areas in Adana province, Turkey. These a.i. were: azoxystrobin, carbendazim, difenoconazole, epoxiconazole, fluquinconazole, prochloraz, propiconazole, prothioconazole, pyraclostrobin, spiroxamine, tebuconazole, thiophanate-methyl, triadimenol, and trifloxystrobin. In this study, the potential risk of a.i. on non-target organisms in fungicide application of wheat cultivation was assessed by The Pesticide Occupational and Environmental Risk (POCER indicators. In this study, the highest human health risk was for fluquinconazole (Exceedence Factor (EF 1.798 for human health, whereas the fungicide with the highest environmental risk was propiconazole (EF 2.000 for the environment. For non-target organisms, the highest potential risk was determined for propiconazole when applied at 0.1250 kg a.i. ha-1 (EF 2.897. The lowest total risk was for azoxystrobin when applied at  0.0650 kg a.i. ha-1 (EF 0.625.

  8. A Malicious Pattern Detection Engine for Embedded Security Systems in the Internet of Things

    Directory of Open Access Journals (Sweden)

    Doohwan Oh

    2014-12-01

    Full Text Available With the emergence of the Internet of Things (IoT, a large number of physical objects in daily life have been aggressively connected to the Internet. As the number of objects connected to networks increases, the security systems face a critical challenge due to the global connectivity and accessibility of the IoT. However, it is difficult to adapt traditional security systems to the objects in the IoT, because of their limited computing power and memory size. In light of this, we present a lightweight security system that uses a novel malicious pattern-matching engine. We limit the memory usage of the proposed system in order to make it work on resource-constrained devices. To mitigate performance degradation due to limitations of computation power and memory, we propose two novel techniques, auxiliary shifting and early decision. Through both techniques, we can efficiently reduce the number of matching operations on resource-constrained systems. Experiments and performance analyses show that our proposed system achieves a maximum speedup of 2.14 with an IoT object and provides scalable performance for a large number of patterns.

  9. A malicious pattern detection engine for embedded security systems in the Internet of Things.

    Science.gov (United States)

    Oh, Doohwan; Kim, Deokho; Ro, Won Woo

    2014-12-16

    With the emergence of the Internet of Things (IoT), a large number of physical objects in daily life have been aggressively connected to the Internet. As the number of objects connected to networks increases, the security systems face a critical challenge due to the global connectivity and accessibility of the IoT. However, it is difficult to adapt traditional security systems to the objects in the IoT, because of their limited computing power and memory size. In light of this, we present a lightweight security system that uses a novel malicious pattern-matching engine. We limit the memory usage of the proposed system in order to make it work on resource-constrained devices. To mitigate performance degradation due to limitations of computation power and memory, we propose two novel techniques, auxiliary shifting and early decision. Through both techniques, we can efficiently reduce the number of matching operations on resource-constrained systems. Experiments and performance analyses show that our proposed system achieves a maximum speedup of 2.14 with an IoT object and provides scalable performance for a large number of patterns.

  10. A Malicious Pattern Detection Engine for Embedded Security Systems in the Internet of Things

    Science.gov (United States)

    Oh, Doohwan; Kim, Deokho; Ro, Won Woo

    2014-01-01

    With the emergence of the Internet of Things (IoT), a large number of physical objects in daily life have been aggressively connected to the Internet. As the number of objects connected to networks increases, the security systems face a critical challenge due to the global connectivity and accessibility of the IoT. However, it is difficult to adapt traditional security systems to the objects in the IoT, because of their limited computing power and memory size. In light of this, we present a lightweight security system that uses a novel malicious pattern-matching engine. We limit the memory usage of the proposed system in order to make it work on resource-constrained devices. To mitigate performance degradation due to limitations of computation power and memory, we propose two novel techniques, auxiliary shifting and early decision. Through both techniques, we can efficiently reduce the number of matching operations on resource-constrained systems. Experiments and performance analyses show that our proposed system achieves a maximum speedup of 2.14 with an IoT object and provides scalable performance for a large number of patterns. PMID:25521382

  11. Effective Proactive and Reactive Defense Strategies against Malicious Attacks in a Virtualized Honeynet

    Directory of Open Access Journals (Sweden)

    Frank Yeong-Sung Lin

    2013-01-01

    Full Text Available Virtualization plays an important role in the recent trend of cloud computing. It allows the administrator to manage and allocate hardware resources flexibly. However, it also causes some security issues. This is a critical problem for service providers, who simultaneously strive to defend against malicious attackers while providing legitimate users with high quality service. In this paper, the attack-defense scenario is formulated as a mathematical model where the defender applies both proactive and reactive defense mechanisms against attackers with different attack strategies. In order to simulate real-world conditions, the attackers are assumed to have incomplete information and imperfect knowledge of the target network. This raises the difficulty of solving the model greatly, by turning the problem nondeterministic. After examining the experiment results, effective proactive and reactive defense strategies are proposed. This paper finds that a proactive defense strategy is suitable for dealing with aggressive attackers under “winner takes all” circumstances, while a reactive defense strategy works better in defending against less aggressive attackers under “fight to win or die” circumstances.

  12. Sodium fluoroacetate toxicity: a case report of malicious poisoning in dogs across a Phoenix, Arizona neighborhood.

    Science.gov (United States)

    Brower, Alexandra; Struthers, Jason; Schmidt, Jemima

    2017-12-01

    In May 2016, thirteen dogs housed in backyards within a single neighborhood were reported to have developed convulsions and died within a 24 h period. An investigation of the scene by law enforcement resulted in submission of eight dogs for postmortem examination. It was suspected that a rapid acting toxin was the cause of death. A gas chromatography-mass spectrophotometry (GC-MS) protocol combined with thin-layer chromatography that allows screening for common convulsants failed to identify a toxin in either pooled gastric content or liver samples from select cases. After consultation with a veterinary toxicologist, sodium fluoroacetate poisoning was investigated. Sodium fluoroacetate, also known as 1080, is a pesticide that was available in the United States from the 1940's to the 1970's, but since 1972 has been banned or under EPA restricted use. When gastric content was re-tested using a GC-MS protocol with selective fluoroacetate ion monitoring and carbon 14 radiolabeling to facilitate quantification, 379 ppb sodium fluoroacetate was detected in a pooled gastric content sample. In spite of its banned status, sodium fluoroacetate remains a rarely reported cause of malicious poisoning in domestic dogs in the United Sates. This compound is highly toxic and is capable of causing death in dogs, humans, other mammals, and insects in ingested quantities as small as a few droplets. Even when geographic or historical proximity to a source is not evident, this intoxication should be considered in dogs exhibiting compatible clinical signs.

  13. Challenges in ensuring radiological safety and nuclear forensic for malicious acts involving nuclear and other radioactive material

    International Nuclear Information System (INIS)

    Sharma, Ranjit; Chatterjee, M.K.; Singh, Rajvir; Pradeepkumar, K.S.

    2010-01-01

    Nuclear and other radioactive materials may get smuggled into the country aimed at malicious acts. Radioactive material detected accidentally or during inspection at the entry points/national borders may indicate illicit trafficking for the purpose of nuclear/radiological terrorism. As country requires prevention and preparedness for response to these malicious acts, nuclear forensic techniques are to be developed incorporating radiological safety aspects. Nuclear forensics helps in determining the origin, intended use, legal owner and the smuggled route etc. by using fingerprinting as well as comparison with reference data. The suggested sequence of methods for analysis of radioactive material/samples will be radiological assessment, physical characterization, traditional forensic analysis, isotope analysis along with elemental/chemical analysis

  14. Structure identification by Mass Spectrometry Non-Targeted Analysis using the US EPA’s CompTox Chemistry Dashboard

    Science.gov (United States)

    Identification of unknowns in mass spectrometry based non-targeted analyses (NTA) requires the integration of complementary pieces of data to arrive at a confident, consensus structure. Researchers use chemical reference databases, spectral matching, fragment prediction tools, r...

  15. Does Bt rice pose risks to non-target arthropods? Results of a meta-analysis in China

    Science.gov (United States)

    Transgenic Bt rice expressing the protoxin proteins derived from Bacillus thuringiensis Berliner (Bt) have been developed since 1989. Their ecological risks toward non-target organisms have been investigated. However, these studies were conducted individually, yielding inconsistent conclusions and u...

  16. bit.ly/malicious: Deep Dive into Short URL based e-Crime Detection

    OpenAIRE

    Gupta, Neha; Aggarwal, Anupama; Kumaraguru, Ponnurangam

    2014-01-01

    Existence of spam URLs over emails and Online Social Media (OSM) has become a massive e-crime. To counter the dissemination of long complex URLs in emails and character limit imposed on various OSM (like Twitter), the concept of URL shortening has gained a lot of traction. URL shorteners take as input a long URL and output a short URL with the same landing page (as in the long URL) in return. With their immense popularity over time, URL shorteners have become a prime target for the attackers ...

  17. The effect of target and non-target similarity on neural classification performance: A boost from confidence

    OpenAIRE

    Amar R Marathe; Anthony J Ries; Vernon J Lawhern; Vernon J Lawhern; Brent J Lance; Jonathan eTouryan; Kaleb eMcDowell; Hubert eCecotti

    2015-01-01

    Brain computer interaction (BCI) technologies have proven effective in utilizing single-trial classification algorithms to detect target images in rapid serial visualization presentation tasks. While many factors contribute to the accuracy of these algorithms, a critical aspect that is often overlooked concerns the feature similarity between target and non-target images. In most real-world environments there are likely to be many shared features between targets and non-targets resulting in si...

  18. The effect of target and non-target similarity on neural classification performance: a boost from confidence

    OpenAIRE

    Marathe, Amar R.; Ries, Anthony J.; Lawhern, Vernon J.; Lance, Brent J.; Touryan, Jonathan; McDowell, Kaleb; Cecotti, Hubert

    2015-01-01

    Brain computer interaction (BCI) technologies have proven effective in utilizing single-trial classification algorithms to detect target images in rapid serial visualization presentation tasks. While many factors contribute to the accuracy of these algorithms, a critical aspect that is often overlooked concerns the feature similarity between target and non-target images. In most real-world environments there are likely to be many shared features between targets and non-targets resulting in si...

  19. Anticoagulant rodenticide toxicity to non-target wildlife under controlled exposure conditions

    Science.gov (United States)

    Rattner, Barnett A.; Mastrota, F. Nicholas; van den Brink, Nico; Elliott, J.; Shore, R.; Rattner, B.

    2018-01-01

    Much of our understanding of anticoagulant rodenticide toxicity to non-target wildlife has been derived from molecular through whole animal research and registration studies in domesticated birds and mammals, and to a lesser degree from trials with captive wildlife. Using these data, an adverse outcome pathway identifying molecular initiating and anchoring events (inhibition of vitamin K epoxide reductase, failure to activate clotting factors), and established and plausible linkages (coagulopathy, hemorrhage, anemia, reduced fitness) associated with toxicity, is presented. Controlled exposure studies have demonstrated that second-generation anticoagulant rodenticides (e.g., brodifacoum) are more toxic than first- and intermediate-generation compounds (e.g., warfarin, diphacinone), however the difference in potency is diminished when first- and intermediate-generation compounds are administered on multiple days. Differences in species sensitivity are inconsistent among compounds. Numerous studies have compared mortality rate of predators fed prey or tissue containing anticoagulant rodenticides. In secondary exposure studies in birds, brodifacoum appears to pose the greatest risk, with bromadiolone, difenacoum, flocoumafen and difethialone being less hazardous than brodifacoum, and warfarin, coumatetralyl, coumafuryl, chlorophacinone and diphacinone being even less hazardous. In contrast, substantial mortality was noted in secondary exposure studies in mammals ingesting prey or tissue diets containing either second- or intermediate-generation compounds. Sublethal responses (e.g., prolonged clotting time, reduced hematocrit and anemia) have been used to study the sequelae of anticoagulant intoxication, and to some degree in the establishment of toxicity thresholds or toxicity reference values. Surprisingly few studies have undertaken histopathological evaluations to identify cellular lesions and hemorrhage associated with anticoagulant rodenticide exposure in non-target

  20. Impacts of transgenic poplar-cotton agro-ecosystems upon target pests and non-target insects under field conditions.

    Science.gov (United States)

    Zhang, D J; Liu, J X; Lu, Z Y; Li, C L; Comada, E; Yang, M S

    2015-07-27

    Poplar-cotton agro-ecosystems are the main agricultural planting modes of cotton fields in China. With increasing acres devoted to transgenic insect-resistant poplar and transgenic insect-resistant cotton, studies examining the effects of transgenic plants on target and non-target insects become increasingly important. We systematically surveyed populations of both target pests and non-target insects for 4 different combinations of poplar-cotton eco-systems over 3 years. Transgenic Bt cotton strongly resisted the target insects Fall webworm moth [Hyphantria cunea (Drury)], Sylepta derogata Fabrieius, and American bollworm (Heliothis armigera), but no clear impact on non-target insect cotton aphids (Aphis gossypii). Importantly, intercrops containing transgenic Pb29 poplar significantly increased the inhibitory effects of Bt cotton on Fall webworm moth in ecosystem IV. Highly resistant Pb29 poplar reduced populations of the target pests Grnsonoma minutara Hubner and non-target insect poplar leaf aphid (Chaitophorus po-pulialbae), while Fall webworm moth populations were unaffected. We determined the effects of Bt toxin from transgenic poplar and cotton on target and non-target pests in different ecosystems of cotton-poplar intercrops and identified the synergistic effects of such combinations toward both target and non-target insects.

  1. The effect of target and non-target similarity on neural classification performance: A boost from confidence

    Directory of Open Access Journals (Sweden)

    Amar R Marathe

    2015-08-01

    Full Text Available Brain computer interaction (BCI technologies have proven effective in utilizing single-trial classification algorithms to detect target images in rapid serial visualization presentation tasks. While many factors contribute to the accuracy of these algorithms, a critical aspect that is often overlooked concerns the feature similarity between target and non-target images. In most real-world environments there are likely to be many shared features between targets and non-targets resulting in similar neural activity between the two classes. It is unknown how current neural-based target classification algorithms perform when qualitatively similar target and non-target images are presented. This study address this question by comparing behavioral and neural classification performance across two conditions: first, when targets were the only infrequent stimulus presented amongst frequent background distracters; and second when targets were presented together with infrequent non-targets containing similar visual features to the targets. The resulting findings show that behavior is slower and less accurate when targets are presented together with similar non-targets; moreover, single-trial classification yielded high levels of misclassification when infrequent non-targets are included. Furthermore, we present an approach to mitigate the image misclassification. We use confidence measures to assess the quality of single-trial classification, and demonstrate that a system in which low confidence trials are reclassified through a secondary process can result in improved performance.

  2. Radiation responses of stem cells: targeted and non-targeted effects

    International Nuclear Information System (INIS)

    Kavanagh, J.N.; Waring, E.J.; Prise, K.M.

    2015-01-01

    Stem cells are fundamental to the development of any tissue or organism via their ability to self-renew, which is aided by their unlimited proliferative capacity and their ability to produce fully differentiated offspring, often from multiple lineages. Stems cells are long lived and have the potential to accumulate mutations, including in response to radiation exposure. It is thought that stem cells have the potential to be induced into a cancer stem cell phenotype and that these may play an important role in resistance to radiotherapy. For radiation-induced carcinogenesis, the role of targeted and non-targeted effects is unclear with tissue or origin being important. Studies of genomic instability and bystander responses have shown consistent effects in haematopoietic models. Several models of radiation have predicted that stem cells play an important role in tumour initiation and that bystander responses could play a role in proliferation and self-renewal. (authors)

  3. Biosafety research for non-target organism risk assessment of RNAi-based GE plants

    Science.gov (United States)

    Roberts, Andrew F.; Devos, Yann; Lemgo, Godwin N. Y.; Zhou, Xuguo

    2015-01-01

    RNA interference, or RNAi, refers to a set of biological processes that make use of conserved cellular machinery to silence genes. Although there are several variations in the source and mechanism, they are all triggered by double stranded RNA (dsRNA) which is processed by a protein complex into small, single stranded RNA, referred to as small interfering RNAs (siRNA) with complementarity to sequences in genes targeted for silencing. The use of the RNAi mechanism to develop new traits in plants has fueled a discussion about the environmental safety of the technology for these applications, and this was the subject of a symposium session at the 13th ISBGMO in Cape Town, South Africa. This paper continues that discussion by proposing research areas that may be beneficial for future environmental risk assessments of RNAi-based genetically modified plants, with a particular focus on non-target organism assessment. PMID:26594220

  4. Molecular effects and bioaccumulation of levonorgestrel in the non-target organism Dreissena polymorpha

    International Nuclear Information System (INIS)

    Contardo-Jara, Valeska; Lorenz, Claudia; Pflugmacher, Stephan; Nuetzmann, Gunnar; Kloas, Werner; Wiegand, Claudia

    2011-01-01

    Bioaccumulation and effects of the contraceptive hormone levonorgestrel were examined in the non-target organism Dreissena polymorpha. Molecular biomarkers of biotransformation, elimination, antioxidant defence and protein damage were analyzed after exposure to increasing concentrations of levonorgestrel in a flow-through system. The lowest concentration (0.312 μg L -1 ) was 100-fold bioconcentrated within four days. A decrease of the bioconcentration factor was observed within one week for the highest test concentrations (3.12 and 6.24 μg L -1 ) suggesting enhanced excretory processes. The immediate mRNA up-regulation of pi class glutathione S-transferase proved that phase II biotransformation processes were induced. Disturbance of fundamental cell functions was assumed since the aryl hydrocarbon receptor has been permanently down-regulated. mRNA up-regulation of P-glycoprotein, superoxide dismutase and metallothioneine suggested enhanced elimination processes and ongoing oxidative stress. mRNA up-regulation of heat shock protein 70 in mussels exposed to the two highest concentrations clearly indicated impacts on protein damage. - Fundamental cell processes as biotransformation, elimination and prevention from oxidative stress are influenced by exposure of the contraceptive levonorgestrel in non-target organisms. - Research highlights: → Bioaccumulation of levonorgestrel in mussels is higher than expected based on its lipophilicity. → Exposure to levonorgestrel causes oxidative stress and enhanced elimination processes. → Glutathione S-transferase (pi class) mRNA induction after one day hint on phase II biotransformation. → mRNA induction of heat shock protein 70 after one week prove protein damage.

  5. Effects of the light goose conservation order on non-target waterfowl distribution during spring migration

    Science.gov (United States)

    Dinges, Andrew J.; Webb, Elisabeth B.; Vrtiska, Mark P.

    2015-01-01

    The Light Goose Conservation Order (LGCO) was initiated in 1999 to reduce mid-continent populations of light geese (lesser snow geese Chen caerulescens and Ross's geese C. rossi). However, concern about potential for LGCO activities (i.e. hunting activities) to negatively impact non-target waterfowl species during spring migration in the Rainwater Basin (RWB) of Nebraska prompted agency personnel to limit the number of hunt days each week and close multiple public wetlands to LGCO activities entirely. To evaluate the effects of the LGCO in the RWB, we quantified waterfowl density at wetlands open and closed to LGCO hunting and recorded all hunter encounters during springs 2011 and 2012. We encountered a total of 70 hunting parties on 22 study wetlands, with over 90% of these encounters occurring during early season when the majority of waterfowl used the RWB region. We detected greater overall densities of dabbling ducks Anas spp., as well as for mallards A. platyrhynchos and northern pintails A. acuta on wetlands closed to the LGCO. We detected no effects of hunt day in the analyses of dabbling duck densities. We detected no differences in mean weekly dabbling duck densities among wetlands open to hunting, regardless of weekly or cumulative hunting encounter frequency throughout early season. Additionally, hunting category was not a predictor for the presence of greater white-fronted geese Anser albifronsin a logistic regression model. Given that dabbling duck densities were greater on wetlands closed to hunting, providing wetlands free from hunting disturbance as refugia during the LGCO remains an important management strategy at migration stopover sites. However, given that we did not detect an effect of hunt day or hunting frequency on dabbling duck density, our results suggest increased hunting frequency at sites already open to hunting would likely have minimal impacts on the distribution of non-target waterfowl species using the region for spring

  6. Competitive release and outbreaks of non-target pests associated with transgenic Bt cotton.

    Science.gov (United States)

    Zeilinger, Adam R; Olson, Dawn M; Andow, David A

    2016-06-01

    The adoption of transgenic Bt cotton has, in some cases, led to environmental and economic benefits through reduced insecticide use. However, the distribution of these benefits and associated risks among cotton growers and cotton-growing regions has been uneven due in part to outbreaks of non-target or secondary pests, thereby requiring the continued use of synthetic insecticides. In the southeastern USA, Bt cotton adoption has resulted in increased abundance of and damage from stink bug pests, Euschistus servus and Nezara viridula (Heteroptera: Pentatomidae). While the impact of increased stink bug abundance has been well-documented, the causes have remained unclear. We hypothesize that release from competition with Bt-susceptible target pests may drive stink bug outbreaks in Bt cotton. We first examined the evidence for competitive release of stink bugs through meta-analysis of previous studies. We then experimentally tested if herbivory by Bt-susceptible Helicoverpa zea increases stink bug leaving rates and deters oviposition on non-Bt cotton. Consistent with previous studies, we found differences in leaving rates only for E servus, but we found that both species strongly avoided ovipositing on H. zea-damaged plants. Considering all available evidence, competitive release of stink bug populations in Bt cotton likely contributes to outbreaks, though the relative importance of competitive release remains an open question. Ecological risk assessments of Bt crops and other transgenic insecticidal crops would benefit from greater understanding of the ecological mechanisms underlying non-target pest outbreaks and greater attention to indirect ecological effects more broadly.

  7. Effects of the herbicide glyphosate on non-target plant native species from Chaco forest (Argentina).

    Science.gov (United States)

    Florencia, Ferreira María; Carolina, Torres; Enzo, Bracamonte; Leonardo, Galetto

    2017-10-01

    Agriculture based on transgenic crops has expanded in Argentina into areas formerly occupied by Chaco forest. Even though glyphosate is the herbicide most widely used in the world, increasing evidence indicates severe ecotoxicological effects on non-target organisms as native plants. The aim of this work is to determine glyphosate effects on 23 native species present in the remaining Chaco forests immersed in agricultural matrices. This is a laboratory/greenhouse approach studying acute effects on seedlings after 21 days. A gradient of glyphosate rates (525, 1050, 2100, 4200, and 8400g ai/Ha; recommended field application rate (RFAR) = 2100g ai/Ha) was applied on four-week seedlings cultivated in a greenhouse and response variables (phytotoxicity, growth reduction, and sensitivity to the herbicide) were measured. This gradient of herbicide rates covers realistic rates of glyphosate applications in the crop field and also those that can reach vegetation of forest relicts by off-target drift and overspray. Testing was performed following guidelines for vegetative vigour (post-germination spray). All species showed lethal or sublethal effects after the application of the 25% of RFAR (50% of species showed severe phytotoxicity or death and 70% of species showed growth reduction). The results showed a gradient of sensitivity to glyphosate by which some of the studied species are very sensitive to glyphosate and seedlings died with 25% of RFAR while other species can be classified as herbicide-tolerant. Thus, the vegetation present in the forest relicts could be strongly affected by glyphosate application on crops. Lethal and sublethal effects of glyphosate on non-target plants could promote both the loss of biodiversity in native forest relicts immersed in the agroecosystems and the selection of new crop weeds considering that some biotypes are continuously exposed to low doses of glyphosate. Copyright © 2017 Elsevier Inc. All rights reserved.

  8. DETECTION OF MALICIOUS SOFTWARE USING CLASSICAL AND NEURAL NETWORK CLASSIFICATION METHODS

    Directory of Open Access Journals (Sweden)

    S. V. Zhernakov

    2015-01-01

    Full Text Available Formulation of the problem: the spectrum of problems solved by modern mobile systems such as Android is constantly growing. This is because on the one hand by the potential opportunities that are implemented in hardware, as well as their integration with modern information technologies, which in turn harmoniously complement and create powerful ardware and software information systems, capable of performing many functions, including pro- information boards. Increasing the flow of information, complexity of the processes and of the hardware and software component devices such as Android, forcing developers to create new means of protection, efficiency and qualitative performing the process. This is especially important in the development of automated systems instrumental performing classification (clustering of existing software into two classes: safe and malicious software. The aim is to increase the reliability and quality of recognition of modern built-in security of information, as well as the rationale and the selection methods of carrying out these functions. The methods used are: to accomplish the goals are analyzed and used classical methods of classification, neural network method based on standard architectures, and support vector machine (SVM - machine. Novelty: The paper presents the concept of the use of support vector in identifying deleterious software developed methodological, algorithmic and software that implements this concept in relation to the means of mobile communication. Result: The obtained qualitative and quantitative characteristics-security software. Practical value: the technique of development of advanced information security systems in mobile environments such as Android. It presents an approach to the description of behavioral malware (based on the following virus: none - wakes - Analysis of weaknesses - the action: a healthy regime or attack (threat.

  9. Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection

    KAUST Repository

    Wang, Wei

    2014-10-07

    Android has been a major target of malicious applications (malapps). How to detect and keep the malapps out of the app markets is an ongoing challenge. One of the central design points of Android security mechanism is permission control that restricts the access of apps to core facilities of devices. However, it imparts a significant responsibility to the app developers with regard to accurately specifying the requested permissions and to the users with regard to fully understanding the risk of granting certain combinations of permissions. Android permissions requested by an app depict the app\\'s behavioral patterns. In order to help understanding Android permissions, in this paper, we explore the permission-induced risk in Android apps on three levels in a systematic manner. First, we thoroughly analyze the risk of an individual permission and the risk of a group of collaborative permissions. We employ three feature ranking methods, namely, mutual information, correlation coefficient, and T-test to rank Android individual permissions with respect to their risk. We then use sequential forward selection as well as principal component analysis to identify risky permission subsets. Second, we evaluate the usefulness of risky permissions for malapp detection with support vector machine, decision trees, as well as random forest. Third, we in depth analyze the detection results and discuss the feasibility as well as the limitations of malapp detection based on permission requests. We evaluate our methods on a very large official app set consisting of 310 926 benign apps and 4868 real-world malapps and on a third-party app sets. The empirical results show that our malapp detectors built on risky permissions give satisfied performance (a detection rate as 94.62% with a false positive rate as 0.6%), catch the malapps\\' essential patterns on violating permission access regulations, and are universally applicable to unknown malapps (detection rate as 74.03%).

  10. DroidEnsemble: Detecting Android Malicious Applications with Ensemble of String and Structural Static Features

    KAUST Repository

    Wang, Wei

    2018-05-11

    Android platform has dominated the Operating System of mobile devices. However, the dramatic increase of Android malicious applications (malapps) has caused serious software failures to Android system and posed a great threat to users. The effective detection of Android malapps has thus become an emerging yet crucial issue. Characterizing the behaviors of Android applications (apps) is essential to detecting malapps. Most existing work on detecting Android malapps was mainly based on string static features such as permissions and API usage extracted from apps. There also exists work on the detection of Android malapps with structural features, such as Control Flow Graph (CFG) and Data Flow Graph (DFG). As Android malapps have become increasingly polymorphic and sophisticated, using only one type of static features may result in false negatives. In this work, we propose DroidEnsemble that takes advantages of both string features and structural features to systematically and comprehensively characterize the static behaviors of Android apps and thus build a more accurate detection model for the detection of Android malapps. We extract each app’s string features, including permissions, hardware features, filter intents, restricted API calls, used permissions, code patterns, as well as structural features like function call graph. We then use three machine learning algorithms, namely, Support Vector Machine (SVM), k-Nearest Neighbor (kNN) and Random Forest (RF), to evaluate the performance of these two types of features and of their ensemble. In the experiments, We evaluate our methods and models with 1386 benign apps and 1296 malapps. Extensive experimental results demonstrate the effectiveness of DroidEnsemble. It achieves the detection accuracy as 95.8% with only string features and as 90.68% with only structural features. DroidEnsemble reaches the detection accuracy as 98.4% with the ensemble of both types of features, reducing 9 false positives and 12 false

  11. Anticipating hidden text salting in emails (extended abstract)

    OpenAIRE

    Lioma, Christina; Moens, Marie-Francine; Gomez, Juan Carlos; De Beer, Jan; Bergholz, Andre; Paass, Gerhard; Horkan, Patrick

    2008-01-01

    Salting is the intentional addition or distortion of content, aimed to evade automatic filtering. Salting is usually found in spam emails. Salting can also be hidden in phishing emails, which aim to steal personal information from users. We present a novel method that detects hidden salting tricks as visual anomalies in text. We solely use these salting tricks to successfully classify emails as phishing (F-measure >90%).

  12. Using Rhythms of Relationships to Understand Email Archives

    National Research Council Canada - National Science Library

    Perer, Adam; Shneiderman, Ben; Oard, Douglas W

    2005-01-01

    ...: analyzing the temporal rhythms of social relationships. We provide methods for constructing meaningful rhythms from the email headers by identifying relationships and interpreting their attributes. With these visualization techniques, email archive explorers can uncover insights that may have been otherwise hidden in the archive. We apply our methods to an individual's fifteen-year email archive, which consists of about 45,000 messages and over 4,000 relationships.

  13. Are You Managing Your Email - Or is Email Managing You? An Analysis of Email Among Personnel Within Army Project Management Offices

    National Research Council Canada - National Science Library

    Baroni, Brian; Cook, Linda; Keitelman, Marian; Miller, Steven; Wardle, Adelia

    2005-01-01

    Based on a class project that developed leadership communication competencies for seven levels of Army civilians, email was found to be the most prevalent means of communication, regardless of leadership level...

  14. PENGIRIMAN E-MAIL SPAM SEBAGAI KEJAHATAN CYBER DI INDONESIA

    Directory of Open Access Journals (Sweden)

    Eka Nugraha Putra

    2018-01-01

    Full Text Available The Internet is part of the development of technology, where the internet provides many impacts, both positive and negative. Currently, privacy issues on the internet have also become a complicated legal issue, this is due to quite a number of privacy-related issues, but not all countries in the world manage privacy issues on the internet. As a means of communicating the Internet has introduced e-mail that provides convenience and practicality. But in its development e-mail has an adverse impact on its users in the form of e-mail spam. In terms of its actions, sending spam e-mail is quite a disadvantage, even violate the privacy. Some countries have also set it to one type of cybercrime (cybercrime. This research will discuss e-mail spam in Indonesia, how the legislation in Indonesia see the action of this spam e-mail, is there any possibility of spam e-mail is criminalized as a cybercrime. The research will also look at how spam e-mails violate privacy and review and analyze internet privacy settings in Indonesia in relation to the criminalization of spam email.

  15. Decisional style, mood and work communication: email diaries.

    Science.gov (United States)

    Shirren, S; Phillips, J G

    2011-10-01

    To understand the use of technology to support interpersonal interaction, a theory of decisional style was applied to email use within the workplace. Previous research has used self-report and rating scales to address employee email behaviours, but this falls short of management's capability to monitor the actual behaviour. Thirty-nine employed individuals completed a five-day communication diary recording their actual behaviour upon receiving personal and work-related emails as well as the Melbourne Decision Making Questionnaire and the Depression Anxiety Stress Scales. It was found that vigilant individuals were more likely to use email in an efficient manner by deleting personal email and being less likely to open email later. Procrastinators, buckpassers and people experiencing high levels of negative affect were all more likely to delay dealing with email, which could be viewed as dealing with email in a less efficient manner. STATEMENT OF RELEVANCE: This work offers insights as to how people receive and process emails and is thus relevant to the development and implementation of collaborative technologies. Whilst other studies use individual's self-reports, this study uses a more accurate communication diary. Decisional style can predict the monitoring and response to electronic communication.

  16. Reaching consumers: How the tobacco industry uses email marketing.

    Science.gov (United States)

    Brock, Betsy; Carlson, Samantha C; Moilanen, Molly; Schillo, Barbara A

    2016-12-01

    Tobacco companies are restricted from engaging in many traditional forms of marketing. Direct marketing is one way tobacco companies can reach consumers while complying with regulation and avoiding negative public perception. There is little research on this type of opt-in marketing, which includes mail marketing, email marketing, web marketing, and mobile marketing, and its impact is not well understood. This study examined 6990 tobacco company emails received by individuals living in the state of Minnesota, US between January 2010 and May 2015 to determine email frequency by brand. These emails were gathered as part of ongoing surveillance of tobacco industry direct marketing. A subset of these emails received between October 2014 and May 2015 (n = 1646) were content analyzed to identify the purpose of the email communication along with type of product promoted. Tobacco companies use email to communicate with consumers on a regular basis. This communication was observed to be as frequent as nine times per month. Emails are most commonly used to promote contests (54.1%), content on tobacco company websites (39.1%), and tobacco coupons (15.7%). Email promotion of menthol-flavored tobacco products was common and was associated with promotion of coupons. Emails promoting menthol had a 1.9 times higher prevalence of also promoting coupons (95% CI: 1.52-2.37). Little is known about tobacco company email marketing and this study fills an identified research gap. A deeper understanding of this type of marketing is needed in order to counter tobacco industry messaging and advance tobacco control.

  17. Reaching consumers: How the tobacco industry uses email marketing

    Directory of Open Access Journals (Sweden)

    Betsy Brock

    2016-12-01

    Full Text Available Tobacco companies are restricted from engaging in many traditional forms of marketing. Direct marketing is one way tobacco companies can reach consumers while complying with regulation and avoiding negative public perception. There is little research on this type of opt-in marketing, which includes mail marketing, email marketing, web marketing, and mobile marketing, and its impact is not well understood. This study examined 6990 tobacco company emails received by individuals living in the state of Minnesota, US between January 2010 and May 2015 to determine email frequency by brand. These emails were gathered as part of ongoing surveillance of tobacco industry direct marketing. A subset of these emails received between October 2014 and May 2015 (n = 1646 were content analyzed to identify the purpose of the email communication along with type of product promoted. Tobacco companies use email to communicate with consumers on a regular basis. This communication was observed to be as frequent as nine times per month. Emails are most commonly used to promote contests (54.1%, content on tobacco company websites (39.1%, and tobacco coupons (15.7%. Email promotion of menthol-flavored tobacco products was common and was associated with promotion of coupons. Emails promoting menthol had a 1.9 times higher prevalence of also promoting coupons (95% CI: 1.52–2.37. Little is known about tobacco company email marketing and this study fills an identified research gap. A deeper understanding of this type of marketing is needed in order to counter tobacco industry messaging and advance tobacco control.

  18. Plenary panel 1: The scientific bases of radiation protection. Non-targeted effects of ionising radiation - Implications for radiation protection

    International Nuclear Information System (INIS)

    Salomaa, S.

    2006-01-01

    The universality of the target theory of radiation-induced effects is challenged by observations on non-targeted effects such as bystander effects, genomic instability and adaptive response. Essential features of non-targeted effects are that they do not require direct nuclear exposure by radiation and they are particularly significant at low doses. This new evidence suggests a need for a new paradigm in radiation biology. The new paradigm should cover both the classical (targeted) and the non-targeted effects. New aspects include the role of cellular communication and tissue-level responses. A better understanding of non-targeted effects may have important consequences for health risk assessment and, consequently, on radiation protection. Non-targeted effects may contribute to the estimation of cancer risk from occupational, medical and environmental exposures. In particular, they may have implications for the applicability of the Linear-No-Threshold (L.N.T.) model in extrapolating radiation risk data into the low-dose region. This also means that the adequacy of the concept of dose to estimate risk is challenged by these findings. Moreover, these effects may provide new mechanistic explanations for the development of non-cancer diseases. Further research is required to determine if these effects, typically measured in cell cultures, are applicable in tissue level, whole animals, and ultimately in humans. (authors)

  19. Plenary panel 1: The scientific bases of radiation protection. Non-targeted effects of ionising radiation - Implications for radiation protection

    Energy Technology Data Exchange (ETDEWEB)

    Salomaa, S. [STUK - Radiation and Nuclear Safety Authority, Helsinki (Finland)

    2006-07-01

    The universality of the target theory of radiation-induced effects is challenged by observations on non-targeted effects such as bystander effects, genomic instability and adaptive response. Essential features of non-targeted effects are that they do not require direct nuclear exposure by radiation and they are particularly significant at low doses. This new evidence suggests a need for a new paradigm in radiation biology. The new paradigm should cover both the classical (targeted) and the non-targeted effects. New aspects include the role of cellular communication and tissue-level responses. A better understanding of non-targeted effects may have important consequences for health risk assessment and, consequently, on radiation protection. Non-targeted effects may contribute to the estimation of cancer risk from occupational, medical and environmental exposures. In particular, they may have implications for the applicability of the Linear-No-Threshold (L.N.T.) model in extrapolating radiation risk data into the low-dose region. This also means that the adequacy of the concept of dose to estimate risk is challenged by these findings. Moreover, these effects may provide new mechanistic explanations for the development of non-cancer diseases. Further research is required to determine if these effects, typically measured in cell cultures, are applicable in tissue level, whole animals, and ultimately in humans. (authors)

  20. Bt crop effects on functional guilds of non-target arthropods: a meta-analysis.

    Directory of Open Access Journals (Sweden)

    L LaReesa Wolfenbarger

    Full Text Available BACKGROUND: Uncertainty persists over the environmental effects of genetically-engineered crops that produce the insecticidal Cry proteins of Bacillus thuringiensis (Bt. We performed meta-analyses on a modified public database to synthesize current knowledge about the effects of Bt cotton, maize and potato on the abundance and interactions of arthropod non-target functional guilds. METHODOLOGY/PRINCIPAL FINDINGS: We compared the abundance of predators, parasitoids, omnivores, detritivores and herbivores under scenarios in which neither, only the non-Bt crops, or both Bt and non-Bt crops received insecticide treatments. Predators were less abundant in Bt cotton compared to unsprayed non-Bt controls. As expected, fewer specialist parasitoids of the target pest occurred in Bt maize fields compared to unsprayed non-Bt controls, but no significant reduction was detected for other parasitoids. Numbers of predators and herbivores were higher in Bt crops compared to sprayed non-Bt controls, and type of insecticide influenced the magnitude of the difference. Omnivores and detritivores were more abundant in insecticide-treated controls and for the latter guild this was associated with reductions of their predators in sprayed non-Bt maize. No differences in abundance were found when both Bt and non-Bt crops were sprayed. Predator-to-prey ratios were unchanged by either Bt crops or the use of insecticides; ratios were higher in Bt maize relative to the sprayed non-Bt control. CONCLUSIONS/SIGNIFICANCE: Overall, we find no uniform effects of Bt cotton, maize and potato on the functional guilds of non-target arthropods. Use of and type of insecticides influenced the magnitude and direction of effects; insecticde effects were much larger than those of Bt crops. These meta-analyses underscore the importance of using controls not only to isolate the effects of a Bt crop per se but also to reflect the replacement of existing agricultural practices. Results will

  1. Does Non-Targeted Community CPR Training Increase Bystander CPR Frequency?

    Science.gov (United States)

    Uber, Amy; Sadler, Richard C; Chassee, Todd; Reynolds, Joshua C

    2018-05-01

    Only 37% of out-of-hospital cardiac arrests (OHCA) receive bystander Cardiopulmonary resuscitation (CPR) in Kent County, MI. In May 2014, prehospital providers offered one-time, point-of-contact compression-only CPR training to 2,253 passersby at 7 public locations in Grand Rapids, Michigan. To assess the impact of this intervention, we compared bystander CPR frequency and clinical outcomes in regions surrounding training sites before and after the intervention, adjusting for prehospital covariates. We aimed to assess the effect of this broad, non-targeted intervention on bystander CPR frequency, type of CPR utilized, and clinical outcomes. We also tested for differences in geospatial variation of bystander CPR and clinical outcomes clustered around training sites. Retrospective, observational, before-after study of adult, EMS-treated OHCA in Kent County from January 1, 2010 to December 31, 2015. We generated a 5-kilometer radius surrounding each training site to estimate any geospatial influence that training sites might have on bystander CPR frequency in nearby OHCA cases. Chi-squared, Fisher's exact, and t-tests assessed differences in subject features. Difference-in-differences analysis with generalized estimating equation (GEE) modeling assessed bystander CPR frequency, adjusting for training site, covariates (age, sex, witnessed, shockable rhythm, public location), and clustering around training sites. Similar modeling tested for changes in bystander CPR type, return of spontaneous circulation (ROSC), survival to hospital discharge, and cerebral performance category (CPC) of 1-2 at hospital discharge. We included 899 cases before and 587 cases post-intervention. Overall, we observed no increase in the frequency of bystander CPR or favorable clinical outcomes. We did observe an increase in compression-only CPR, but this was paradoxically restricted to OHCA cases falling outside radii around training sites. In adjusted modeling, the bystander CPR training

  2. The Perceived Helpfulness of Rendering Emotional First Aid via Email

    Science.gov (United States)

    Gilat, Itzhak; Reshef, Eyal

    2015-01-01

    The present research examined the perceived helpfulness of an increasingly widespread mode of psychological assistance, namely, emotional first aid via email. The sample comprised 62 naturally occurring email interactions between distressful clients and trained volunteers operating within the framework of the Israeli Association for Emotional…

  3. A Discourse Analysis of School Counseling Supervisory E-Mail

    Science.gov (United States)

    Luke, Melissa; Gordon, Cynthia

    2011-01-01

    This article is a discourse analysis of weekly computer-mediated communications between 8 school counseling interns and their e-mail supervisor over a 16-week semester. Course-required e-mail supervision was provided as an adjunct to traditional face-to-face individual and group supervision. School counselor supervisees and supervisor enacted 3…

  4. Student Perceptions of Peer Credibility Based on Email Addresses

    Science.gov (United States)

    Livermore, Jeffrey A.; Scafe, Marla G.; Wiechowski, Linda S.; Maier, David J.

    2013-01-01

    The purpose of this study was to evaluate students' perceptions of their peer's credibility based on email addresses. The survey was conducted at a community college in Michigan where all students were registered and actively taking at least one course. The survey results show that a student's selection of an email address does influence other…

  5. Faculty Perceptions of Student Credibility Based on Email Addresses

    Science.gov (United States)

    Livermore, Jeffrey A.; Wiechowski, Linda S.; Scafe, Marla G.

    2011-01-01

    The purpose of this study was to evaluate faculty perceptions of student credibility based on email addresses. The survey was conducted at an upper division business school in Michigan where all students have completed at least two years of college courses. The survey results show that a student's selection of an email address does influence the…

  6. Student Perceptions of Faculty Credibility Based on Email Addresses

    Science.gov (United States)

    Livermore, Jeffrey A.; Scafe, Marla G.; Wiechowski, Linda S.

    2010-01-01

    The purpose of this study was to evaluate students' perceptions of faculty credibility based on email addresses. The survey was conducted at an upper division business school in Michigan where all students have completed at least two years of college courses. The survey results show that a faculty member's selection of an email address does…

  7. Instruction and Pragmatic Change during Study Abroad Email Communication

    Science.gov (United States)

    Alcón-Soler, Eva

    2015-01-01

    The study deals with the effect of instruction and study abroad (SA) on pragmatic knowledge. More specifically, the focus is on gains in explicit knowledge of request mitigators, and whether learners draw on this knowledge when they perform email requests. Email requests produced by 60 Spanish students staying abroad (30 treatment/30 control…

  8. Private E-Mail Requests and the Diffusion of Responsibility.

    Science.gov (United States)

    Barron, Greg; Yechiam, Eldad

    2002-01-01

    Discussion of e-mail technology and requesting information from multiple sources simultaneously focuses on an experiment demonstrating that addressing e-mails simultaneously to multiple recipients may actually reduce the number of helpful responses. Discusses diffusion of responsibility and implications for the application of social cueing theory…

  9. E-Mail at Work: Is it Really Private?

    Science.gov (United States)

    Rosenblum, Cindy

    This paper examines the controversy of e-mail privacy in the workplace. Once an employee uses an e-mail system that belongs to the employer, according to recent case law, their privacy rights are forfeited. Employers will now have to start creating policies to safeguard themselves from expensive litigation, and employees will have to be more…

  10. Technology Corner: Analysing E-mail Headers For Forensic Investigation

    Directory of Open Access Journals (Sweden)

    M. Tariq Banday

    2011-06-01

    Full Text Available Electronic Mail (E-Mail, which is one of the most widely used applications of Internet, has become a global communication infrastructure service.  However, security loopholes in it enable cybercriminals to misuse it by forging its headers or by sending it anonymously for illegitimate purposes, leading to e-mail forgeries. E-mail messages include transit handling envelope and trace information in the form of structured fields which are not stripped after messages are delivered, leaving a detailed record of e-mail transactions.  A detailed header analysis can be used to map the networks traversed by messages, including information on the messaging software and patching policies of clients and gateways, etc. Cyber forensic e-mail analysis is employed to collect credible evidence to bring criminals to justice. This paper projects the need for e-mail forensic investigation and lists various methods and tools used for its realization. A detailed header analysis of a multiple tactic spoofed e-mail message is carried out in this paper. It also discusses various possibilities for detection of spoofed headers and identification of its originator. Further, difficulties that may be faced by investigators during forensic investigation of an e-mail message have been discussed along with their possible solutions.

  11. Detection of Fraudulent Emails by Employing Advanced Feature Abundance

    DEFF Research Database (Denmark)

    Nizamani, Sarwat; Memon, Nasrullah; Glasdam, Mathies

    2014-01-01

    In this paper, we present a fraudulent email detection model using advanced feature choice. We extracted various kinds of features and compared the performance of each category of features with the others in terms of the fraudulent email detection rate. The different types of features...... are incorporated step by step. The detection of fraudulent email has been considered as a classification problem and it is evaluated using various state-of-the art algorithms and on CCM [1] which is authors' previous cluster based classification model. The experiments have been performed on diverse feature sets...... and the different classification methods. The comparison of the results is also presented and the evaluations shows that for the fraudulent email detection tasks, the feature set is more important regardless of classification method. The results of the study suggest that the task of fraudulent emails detection...

  12. Intense or malicious? The decoding of eyebrow-lowering frowning in laughter animations depends on the presentation mode

    Science.gov (United States)

    Hofmann, Jennifer

    2014-01-01

    Joyful laughter is the only laughter type that has received sufficient validation in terms of morphology (i.e., face, voice). Still, it is unclear whether joyful laughter involves one prototypical facial-morphological configuration (Duchenne Display and mouth opening) to be decoded as such, or whether qualitatively distinct facial markers occur at different stages of laughter intensity. It was proposed that intense laughter goes along with eyebrow-lowering frowning, but in decoding studies of pictures, these “frowns” were associated with perceived maliciousness rather than higher intensity. Thus, two studies were conducted to investigate the influence of the presentation mode (static, dynamic) and eyebrow-lowering frowning on the perception of laughter animations of different intensity. In Study 1, participants (N = 110) were randomly assigned to two presentation modes (static pictures vs. dynamic videos) to watch animations of Duchenne laughter and laughter with added eyebrow-lowering frowning. Ratings on the intensity, valence, and contagiousness of the laughter were completed. In Study 2, participants (N = 55) saw both animation types in both presentation modes sequentially. Results confirmed that the static presentation lead to eyebrow-lowering frowning in intense laughter being perceived as more malicious, less intense, less benevolent, and less contagious compared to the dynamic presentation. This was replicated for maliciousness in Study 2, although participants could potentially infer the “frown” as a natural element of the laugh, as they had seen the video and the picture. Thus, a dynamic presentation is necessary for detecting graduating intensity markers in the joyfully laughing face. While this study focused on the decoding, future studies should investigate the encoding of frowning in laughter. This is important, as tools assessing facially expressed joy might need to account for laughter intensity markers that differ from the Duchenne Display

  13. Acute Toxicity of the Antifouling Compound Butenolide in Non-Target Organisms

    KAUST Repository

    Zhang, Yi-Fan

    2011-08-29

    Butenolide [5-octylfuran-2(5H)-one] is a recently discovered and very promising anti-marine-fouling compound. In this study, the acute toxicity of butenolide was assessed in several non-target organisms, including micro algae, crustaceans, and fish. Results were compared with previously reported results on the effective concentrations used on fouling (target) organisms. According to OECD\\'s guideline, the predicted no effect concentration (PNEC) was 0.168 µg l^(−1), which was among one of the highest in representative new biocides. Mechanistically, the phenotype of butenolide-treated Danio rerio (zebrafish) embryos was similar to the phenotype of the pro-caspase-3 over-expression mutant with pericardial edema, small eyes, small brains, and increased numbers of apoptotic cells in the bodies of zebrafish embryos. Butenolide also induced apoptosis in HeLa cells, with the activation of c-Jun N-terminal kinases (JNK), Bcl-2 family proteins, and caspases and proteasomes/lysosomes involved in this process. This is the first detailed toxicity and toxicology study on this antifouling compound.

  14. Non-target-site resistance to ALS-inhibiting herbicides in a Sagittaria trifolia L. population.

    Science.gov (United States)

    Zhao, Bochui; Fu, Danni; Yu, Yang; Huang, Chengtian; Yan, Kecheng; Li, Pingsheng; Shafi, Jamil; Zhu, He; Wei, Songhong; Ji, Mingshan

    2017-08-01

    Sagittaria trifolia L. is one of the most competitive weeds in rice fields in northeastern China. The continuous use of acetolactate synthase (ALS)-inhibitors has led to the evolution of herbicide resistant S. trifolia. A subpopulation BC1, which was derived from the L1 population, was analyzed using DNA sequencing and ALS enzyme activity assays and levels of resistance to five ALS-inhibiting herbicides was determined. DNA sequencing and ALS enzyme assays revealed no amino acid substitutions and no significant differences in enzyme sensitivity between susceptible and resistant populations. Whole-plant dose-response experiments showed that the BC1 population exhibited different levels of resistance (resistance ratios ranging from 2.14 to 51.53) to five ALS herbicides, and the addition of malathion (P450 inhibitor) to bensulfuron-methyl, penoxsulam and bispyribac-sodium strongly reduced the dry weight accumulation of the BC1 population compared with the effects of the three herbicides alone. The results of the present study demonstrated that the BC1 population has evolved non-target-site resistance to ALS-inhibiting herbicides. Copyright © 2017 Elsevier Inc. All rights reserved.

  15. Fungicides transport in runoff from vineyard plot and catchment: contribution of non-target areas.

    Science.gov (United States)

    Lefrancq, Marie; Payraudeau, Sylvain; García Verdú, Antonio Joaquín; Maillard, Elodie; Millet, Maurice; Imfeld, Gwenaël

    2014-04-01

    Surface runoff and erosion during the course of rainfall events are major processes of pesticides transport from agricultural land to aquatic ecosystem. These processes are generally evaluated either at the plot or the catchment scale. Here, we compared at both scales the transport and partitioning in runoff water of two widely used fungicides, i.e., kresoxim-methyl (KM) and cyazofamid (CY). The objective was to evaluate the relationship between fungicides runoff from the plot and from the vineyard catchment. The results show that seasonal exports for KM and CY at the catchment were larger than those obtained at the plot. This underlines that non-target areas within the catchment largely contribute to the overall load of runoff-associated fungicides. Estimations show that 85 and 62 % of the loads observed for KM and CY at the catchment outlet cannot be explained by the vineyard plots. However, the partitioning of KM and CY between three fractions, i.e., the suspended solids (>0.7 μm) and two dissolved fractions (i.e., between 0.22 and 0.7 µm and plot scales enable to evaluate the sources areas of pesticide off-site transport.

  16. Toxicity risk of non-target organs at risk receiving low-dose radiation: case report

    International Nuclear Information System (INIS)

    Shueng, Pei-Wei; Lin, Shih-Chiang; Chang, Hou-Tai; Chong, Ngot-Swan; Chen, Yu-Jen; Wang, Li-Ying; Hsieh, Yen-Ping; Hsieh, Chen-Hsi

    2009-01-01

    The spine is the most common site for bone metastases. Radiation therapy is a common treatment for palliation of pain and for prevention or treatment of spinal cord compression. Helical tomotherapy (HT), a new image-guided intensity modulated radiotherapy (IMRT), delivers highly conformal dose distributions and provides an impressive ability to spare adjacent organs at risk, thus increasing the local control of spinal column metastases and decreasing the potential risk of critical organs under treatment. However, there are a lot of non-target organs at risk (OARs) occupied by low dose with underestimate in this modern rotational IMRT treatment. Herein, we report a case of a pathologic compression fracture of the T9 vertebra in a 55-year-old patient with cholangiocarcinoma. The patient underwent HT at a dose of 30 Gy/10 fractions delivered to T8-T10 for symptom relief. Two weeks after the radiotherapy had been completed, the first course of chemotherapy comprising gemcitabine, fluorouracil, and leucovorin was administered. After two weeks of chemotherapy, however, the patient developed progressive dyspnea. A computed tomography scan of the chest revealed an interstitial pattern with traction bronchiectasis, diffuse ground-glass opacities, and cystic change with fibrosis. Acute radiation pneumonitis was diagnosed. Oncologists should be alert to the potential risk of radiation toxicities caused by low dose off-targets and abscopal effects even with highly conformal radiotherapy

  17. Prioritizing plant defence over growth through WRKY regulation facilitates infestation by non-target herbivores

    Science.gov (United States)

    Li, Ran; Zhang, Jin; Li, Jiancai; Zhou, Guoxin; Wang, Qi; Bian, Wenbo; Erb, Matthias; Lou, Yonggen

    2015-01-01

    Plants generally respond to herbivore attack by increasing resistance and decreasing growth. This prioritization is achieved through the regulation of phytohormonal signaling networks. However, it remains unknown how this prioritization affects resistance against non-target herbivores. In this study, we identify WRKY70 as a specific herbivore-induced, mitogen-activated protein kinase-regulated rice transcription factor that physically interacts with W-box motifs and prioritizes defence over growth by positively regulating jasmonic acid (JA) and negatively regulating gibberellin (GA) biosynthesis upon attack by the chewing herbivore Chilo suppressalis. WRKY70-dependent JA biosynthesis is required for proteinase inhibitor activation and resistance against C. suppressalis. In contrast, WRKY70 induction increases plant susceptibility against the rice brown planthopper Nilaparvata lugens. Experiments with GA-deficient rice lines identify WRKY70-dependent GA signaling as the causal factor in N. lugens susceptibility. Our study shows that prioritizing defence over growth leads to a significant resistance trade-off with important implications for the evolution and agricultural exploitation of plant immunity. DOI: http://dx.doi.org/10.7554/eLife.04805.001 PMID:26083713

  18. The drug target genes show higher evolutionary conservation than non-target genes.

    Science.gov (United States)

    Lv, Wenhua; Xu, Yongdeng; Guo, Yiying; Yu, Ziqi; Feng, Guanglong; Liu, Panpan; Luan, Meiwei; Zhu, Hongjie; Liu, Guiyou; Zhang, Mingming; Lv, Hongchao; Duan, Lian; Shang, Zhenwei; Li, Jin; Jiang, Yongshuai; Zhang, Ruijie

    2016-01-26

    Although evidence indicates that drug target genes share some common evolutionary features, there have been few studies analyzing evolutionary features of drug targets from an overall level. Therefore, we conducted an analysis which aimed to investigate the evolutionary characteristics of drug target genes. We compared the evolutionary conservation between human drug target genes and non-target genes by combining both the evolutionary features and network topological properties in human protein-protein interaction network. The evolution rate, conservation score and the percentage of orthologous genes of 21 species were included in our study. Meanwhile, four topological features including the average shortest path length, betweenness centrality, clustering coefficient and degree were considered for comparison analysis. Then we got four results as following: compared with non-drug target genes, 1) drug target genes had lower evolutionary rates; 2) drug target genes had higher conservation scores; 3) drug target genes had higher percentages of orthologous genes and 4) drug target genes had a tighter network structure including higher degrees, betweenness centrality, clustering coefficients and lower average shortest path lengths. These results demonstrate that drug target genes are more evolutionarily conserved than non-drug target genes. We hope that our study will provide valuable information for other researchers who are interested in evolutionary conservation of drug targets.

  19. Non-targeted effects of radiation exposure: recent advances and implications

    International Nuclear Information System (INIS)

    Kadhim, M.A.; Hill, M.A.

    2015-01-01

    The target theory of radiation-induced effects has been challenged by numerous studies, which indicate that in addition to biological effects resulting from direct DNA damage within the cell, a variety of non-DNA targeted effects (NTE) may make important contributions to the overall outcome. Ionising radiation induces complex, global cellular responses, such as genomic instability (GI) in both irradiated and never-irradiated 'bystander' cells that receive molecular signals produced by irradiated cells. GI is a well-known feature of many cancers, increasing the probability of cells to acquire the 'hallmarks of cancer' during the development of tumours. Although epidemiological data include contributions of both direct and NTE, they lack (i) statistical power at low dose where differences in dose response for NTE and direct effects are likely to be more important and (ii) heterogeneity of non-targeted responses due to genetic variability between individuals. In this article, NTE focussing on GI and bystander effects were critically examined, the specific principles of NTE were discussed and the potential influence on human health risk assessment from low-dose radiation was considered. (authors)

  20. Contribution of non-target-site resistance in imidazolinone-resistant Imisun sunflower

    Directory of Open Access Journals (Sweden)

    Gabriela Breccia

    2017-08-01

    Full Text Available ABSTRACT The first commercial herbicide-resistant trait in sunflower (Helianthus annuus L. is known as ‘Imisun’. Imidazolinone resistance in Imisun cultivars has been reported to be genetically controlled by a major gene (known as Imr1 or Ahasl1-1 and modifier genes. Imr1 is an allelic variant of the Ahasl1 locus that codes for the acetohydroxyacid synthase, which is the target site of these herbicides. The mechanism of resistance endowed by modifier genes has not been characterized and it could be related to non-target-site resistance. The objective of this study was to evaluate the role of cytochrome P450 monooxygenases (P450s in Imisun resistance. The response to imazapyr herbicide in combination with P450s inhibitor malathion was evaluated in 2 Imisun lines, IMI-1 and RHA426. Malathion reduced herbicide efficacy in both lines, but IMI-1 was affected in a greater extent. A significant reduction in plant growth in response to P450s inhibitors 1-aminobenzotriazole and piperonyl butoxide treatment was detected in the Imisun line HA425. The increased susceptibility to imazapyr after P450s-inhibitor treatment indicates that herbicide metabolism by P450s is a mechanism involved in Imisun resistance. These results also suggest the involvement of different P450s isozymes in endowing resistance to imazapyr in Imisun cultivars.

  1. Non-target effects of fungicides on nectar-inhabiting fungi of almond flowers.

    Science.gov (United States)

    Schaeffer, Robert N; Vannette, Rachel L; Brittain, Claire; Williams, Neal M; Fukami, Tadashi

    2017-04-01

    Nectar mediates interactions between plants and pollinators in natural and agricultural systems. Specialized microorganisms are common nectar inhabitants, and potentially important mediators of plant-pollinator interactions. However, their diversity and role in mediating pollination services in agricultural systems are poorly characterized. Moreover, agrochemicals are commonly applied to minimize crop damage, but may present ecological consequences for non-target organisms. Assessment of ecological risk has tended to focus on beneficial macroorganisms such as pollinators, with less attention paid to microorganisms. Here, using culture-independent methods, we assess the impact of two widely-used fungicides on nectar microbial community structure in the mass-flowering crop almond (Prunus dulcis). We predicted that fungicide application would reduce fungal richness and diversity, whereas competing bacterial richness would increase, benefitting from negative effects on fungi. We found that fungicides reduced fungal richness and diversity in exposed flowers, but did not significantly affect bacterial richness, diversity, or community composition. The relative abundance of Metschnikowia OTUs, nectar specialists that can impact pollination, was reduced by both fungicides. Given growing recognition of the importance of nectar microorganisms as mediators of plant-pollinator mutualisms, future research should consider the impact of management practices on plant-associated microorganisms and consequences for pollination services in agricultural landscapes. © 2016 Society for Applied Microbiology and John Wiley & Sons Ltd.

  2. A Non-Targeted Approach Unravels the Volatile Network in Peach Fruit

    Science.gov (United States)

    Sánchez, Gerardo; Besada, Cristina; Badenes, María Luisa; Monforte, Antonio José; Granell, Antonio

    2012-01-01

    Volatile compounds represent an important part of the plant metabolome and are of particular agronomic and biological interest due to their contribution to fruit aroma and flavor and therefore to fruit quality. By using a non-targeted approach based on HS-SPME-GC-MS, the volatile-compound complement of peach fruit was described. A total of 110 volatile compounds (including alcohols, ketones, aldehydes, esters, lactones, carboxylic acids, phenolics and terpenoids) were identified and quantified in peach fruit samples from different genetic backgrounds, locations, maturity stages and physiological responses. By using a combination of hierarchical cluster analysis and metabolomic correlation network analysis we found that previously known peach fruit volatiles are clustered according to their chemical nature or known biosynthetic pathways. Moreover, novel volatiles that had not yet been described in peach were identified and assigned to co-regulated groups. In addition, our analyses showed that most of the co-regulated groups showed good intergroup correlations that are therefore consistent with the existence of a higher level of regulation orchestrating volatile production under different conditions and/or developmental stages. In addition, this volatile network of interactions provides the ground information for future biochemical studies as well as a useful route map for breeding or biotechnological purposes. PMID:22761719

  3. Non-targeted effects of radiation: applications for radiation protection and contribution to LNT discussion

    International Nuclear Information System (INIS)

    Belyakov, O.V.; Folkard, M.; Prise, K.M.; Michael, B.D.; Mothersill, C.

    2002-01-01

    According to the target theory of radiation induced effects (Lea, 1946), which forms a central core of radiation biology, DNA damage occurs during or very shortly after irradiation of the nuclei in targeted cells and the potential for biological consequences can be expressed within one or two cell generations. A range of evidence has now emerged that challenges the classical effects resulting from targeted damage to DNA. These effects have also been termed non-(DNA)-targeted (Ward, 1999) and include radiation-induced bystander effects (Iyer and Lehnert, 2000a), genomic instability (Wright, 2000), adaptive response (Wolff, 1998), low dose hyper-radiosensitivity (HRS) (Joiner, et al., 2001), delayed reproductive death (Seymour, et al., 1986) and induction of genes by radiation (Hickman, et al., 1994). An essential feature of non-targeted effects is that they do not require a direct nuclear exposure by irradiation to be expressed and they are particularly significant at low doses. This new evidence suggests a new paradigm for radiation biology that challenges the universality of target theory. In this paper we will concentrate on the radiation-induced bystander effects because of its particular importance for radiation protection

  4. Evolution of insecticide resistance in non-target black flies (Diptera: Simuliidae from Argentina

    Directory of Open Access Journals (Sweden)

    Cristina Mónica Montagna

    2012-06-01

    Full Text Available Black flies, a non-target species of the insecticides used in fruit production, represent a severe medical and veterinary problem. Large increases in the level of resistance to the pyrethroids fenvalerate (more than 355-fold and deltamethrin (162-fold and a small increase in resistance to the organophosphate azinphos methyl (2-fold were observed between 1996-2008 in black fly larvae under insecticide pressure. Eventually, no change or a slight variation in insecticide resistance was followed by a subsequent increase in resistance. The evolution of pesticide resistance in a field population is a complex and stepwise process that is influenced by several factors, the most significant of which is the insecticide selection pressure, such as the dose and frequency of application. The variation in insecticide susceptibility within a black fly population in the productive area may be related to changes in fruit-pest control. The frequency of individuals with esterase activities higher than the maximum value determined in the susceptible population increased consistently over the sampling period. However, the insecticide resistance was not attributed to glutathione S-transferase activity. In conclusion, esterase activity in black flies from the productive area is one mechanism underlying the high levels of resistance to pyrethroids, which have been recently used infrequently. These enzymes may be reselected by currently used pesticides and enhance the resistance to these insecticides.

  5. Evolution of insecticide resistance in non-target black flies (Diptera: Simuliidae) from Argentina.

    Science.gov (United States)

    Montagna, Cristina Mónica; Gauna, Lidia Ester; D'Angelo, Ana Pechen de; Anguiano, Olga Liliana

    2012-06-01

    Black flies, a non-target species of the insecticides used in fruit production, represent a severe medical and veterinary problem. Large increases in the level of resistance to the pyrethroids fenvalerate (more than 355-fold) and deltamethrin (162-fold) and a small increase in resistance to the organophosphate azinphos methyl (2-fold) were observed between 1996-2008 in black fly larvae under insecticide pressure. Eventually, no change or a slight variation in insecticide resistance was followed by a subsequent increase in resistance. The evolution of pesticide resistance in a field population is a complex and stepwise process that is influenced by several factors, the most significant of which is the insecticide selection pressure, such as the dose and frequency of application. The variation in insecticide susceptibility within a black fly population in the productive area may be related to changes in fruit-pest control. The frequency of individuals with esterase activities higher than the maximum value determined in the susceptible population increased consistently over the sampling period. However, the insecticide resistance was not attributed to glutathione S-transferase activity. In conclusion, esterase activity in black flies from the productive area is one mechanism underlying the high levels of resistance to pyrethroids, which have been recently used infrequently. These enzymes may be reselected by currently used pesticides and enhance the resistance to these insecticides.

  6. Involvement of ways of death receptors in the target and non target effects of ionizing radiations

    International Nuclear Information System (INIS)

    Luce, A.

    2008-10-01

    Delayed cell death by mitotic catastrophe is a frequent mode of breast cancer cell death after γ-irradiation. Whereas the mechanisms that underlie the early γ-irradiation-induced cell death are well documented, those that drive the delayed cell death are largely unknown. Here we show that the Fas, TRAIL and TNF-α death receptor pathways mediate the delayed cell death observed after γ-irradiation of breast cancer cells. Receptors of the three pathways are over expressed early after irradiation and sensitize cells to apoptosis, whereas their ligands are over expressed three to four days after γ-irradiation, leading to apoptosis of the irradiated cells through a mitotic catastrophe. We also show for the first time that irradiated breast cancer cells excrete soluble forms of the three ligands which can induce the death of sensitive bystander cells. Altogether, these results define the molecular basis of the delayed cell death induced by targeted and non-targeted effects of γ-irradiation. (author)

  7. Email medication counseling services provided by Finnish community pharmacies.

    Science.gov (United States)

    Pohjanoksa-Mäntylä, Marika K; Kulovaara, Heidi; Bell, J Simon; Enäkoski, Marianne; Airaksinen, Marja S

    2008-12-01

    The importance of email as a mode of communication between medication users and pharmacists is likely to increase. However, little is known about the email medication counseling practices of community pharmacies. To determine the prevalence of email medication counseling services in Finland and to assess the accuracy and comprehensiveness of responses by pharmacies providing the opportunity for email medication counseling to inquiries related to use of antidepressants. An inventory was made of all Finnish community pharmacies that provided the opportunity for email medication counseling. Data related to the accuracy and comprehensiveness of responses were collected, using a virtual pseudo-customer method with 3 scenarios related to common concerns of patients on antidepressants. Two inquiries were emailed to each pharmacy that provided the opportunity for email medication counseling in January and February 2005. The responses were content analyzed by 2 researchers, using a prestructured scoring system. Almost one-third (30%, n = 182) of Finnish community pharmacies maintained a working Web site, and 94% of those provided the opportunity for email medication counseling. An online "ask-the-pharmacist" service was offered by 13% (n = 23) of the pharmacies with a Web site. Pharmacies responded to 54% of the email inquiries sent by the virtual pseudo-customers. The response rate and the content score ratio between mean and maximum scores varied among the scenarios. The content score ratio was highest for the scenarios concerning the adverse effects of fluoxetine (0.53, n = 55) and interactions with mirtazapine (0.52, n = 63) and lowest for the scenario related to sexual dysfunction and weight gain associated with citalopram (0.38, n = 52). Community pharmacies are potential providers of email medication counseling services. However, more attention should be directed to responding to consumer inquiries and to the content of these responses.

  8. Analyzing E-mail communication of prospective learners

    Directory of Open Access Journals (Sweden)

    Anurag SAXENA

    2005-10-01

    Full Text Available Analyzing E-mail communication of prospective learners Vibha JOSHIAnurag SAXENA Reader School of Management IGNOU, New Delhi, INDIA ABSTRACT Today, computer has replaced all means of communication significantly. E-mail is the most popular means of communication through computers. It has vanished the boundaries between the cities, countries and continents. Earlier Studies that used this medium, had shown evidence of higher quality of responses and also significant cost savings feature of this method (mainly for convenience of dispatch for research purposes. In this communication, an attempt has been made to utilize email responses of prospective learners in education discipline based programs offered through open learning system. The inception of this study is linked to the creation of website (http://www.ignou.ac.in/ and availability of information related to all activated and prospective programs of studies, various school of studies, faculty email addresses and faculty vis-à-vis program coordinator in the University. The present study analyzed 65 email responses received from July 2002 to till date by the researcher on her email ID. These respondents got the email ID from the University website and due to their eagerness to attain qualifications in the field of education/guidance/educational management, sent an e-mail to the program coordinator(s. These email responses were analyzed in order to visualize the learner profiles and viability of the ongoing as well as prospective programs of studies. This paper tries to analyze the e-mail responses of the people who either by surfing IGNOU’s website or from other sources came to know about the various programs of studies offered by the School of Education. The study validates that there is an amount of hidden information even in the curiosity of the learners.

  9. Non-target activity detection by post-radioembolization yttrium-90 PET/CT: Image assessment technique and case examples

    Directory of Open Access Journals (Sweden)

    Yung Hsiang eKao

    2014-02-01

    Full Text Available High-resolution yttrium-90 (90Y imaging of post-radioembolization microsphere biodistribution may be achieved by conventional positron emission tomography with integrated computed tomography (PET/CT scanners that have time-of-flight capability. However, reconstructed 90Y PET/CT images have high background noise, making non-target activity detection technically challenging. This educational article describes our image assessment technique for non-target activity detection by 90Y PET/CT which qualitatively overcomes the problem of background noise. We present selected case examples of non-target activity in untargeted liver, stomach, gallbladder, chest wall and kidney, supported by angiography and 90Y bremsstrahlung single photon emission computed tomography with integrated computed tomography (SPECT/CT or technetium-99m macroaggregated albumin SPECT/CT.

  10. Malicious release of radioactive materials in urban area. Exposure of the public and emergency staff, protective measures

    International Nuclear Information System (INIS)

    Koch, Wolfgang; Lange, Florentin

    2016-01-01

    The preparedness for hypothetical radiological scenarios is part of the tasks for governmental authorities, safety and emergency organizations and the staff in case of the incident. The EURATOM guideline for radiation protection has to be implemented into national laws. According to the guidelines it is required that emergency planning has to be prepared for hypothetical radiological scenarios including terroristic or other maliciously motivated attacks using radioactive materials. The study includes assumptions on the released respirable radioactivity, restriction of the hazardous area, wind induced re-suspension of radioactive dusts and inhalation exposure, and mitigation measures.

  11. Save our inboxes! Use e-mail wisely

    CERN Multimedia

    Achintya Rao

    2013-01-01

    At CERN, with collaborators all over the world, e-mail is inevitably the primary means of communication: we use it for everything from coordinating projects to organising lunches. But e-mail can also be one of the most inefficient means of communication we have! Here's how to fix it.   Let’s get straight to the point: we receive too many e-mails. Think about all the e-mails that you deleted without a second thought. Think about the times you’ve unnecessarily been in CC. Take a look at the unread e-mails sitting in your inbox at this very moment, ones that you have no intention of ever looking at. You can, however, tame this overload with a few simple measures and turn e-mail into an important communication and productivity tool. Many recommendations for improving e-mail etiquette suggest an abrasive approach riddled with bullet points. In a vastly multi-cultural setting such as CERN, however this approach may fail. So, here are a few dos and don’ts based o...

  12. Data Leakage Prevention: E-Mail Protection via Gateway

    Science.gov (United States)

    Kaur, Kamaljeet; Gupta, Ishu; Singh, Ashutosh Kumar

    2018-01-01

    Protection of digital assets and intellectual property is becoming a challenge for most of the companies. Due to increasing availability of database services on internet, data may be insecure after passing through precarious networks. To protect intellectual property (IP) is a major concern for today's organizations, because a leakage that compromises IP means, sensitive information of a company is in the hands of biggest competitors. Electronic information processing and communication is replacing paper in many applications increasingly. Instead of paper, an email is being used for communication at workplace and from social media logins to bank accounts. Nowadays an email is becoming a mainstream business tool. An email can be misused to leave company’s sensitive data open to compromise. So, it may be of little surprise that attacks on emails are common. So, here we need an email protection system (EPS) that will protect information to leave organization via mail. In this paper, we developed an algorithm that will offer email protection via gateway during data transfer. This algorithm matches the patterns with the keywords stored in the database and then takes the actions accordingly to protect the data. This paper describes why email protection is important? How companies can protect their confidential information from being leaked by insiders.

  13. Analysis of E-mail Transactions in Virtual Reference Services

    Directory of Open Access Journals (Sweden)

    Astutik Nur Qomariyah

    2016-01-01

    Full Text Available Today, the use of traditional reference desk in the academic libraries has been rarely used, thus expanding or even move to a virtual reference service. A minimum level of virtual reference services are provided in the academic library is currently in general is the electronic mail (e-mail. One of the academic library specifically provide virtual reference services via e-mail is a Petra Christian University (PCU Library (ref-desk@petra.ac.id.. In such services librarians provide assistance to users in finding information and answer questions. This study aimed to analyze the transaction reference services virtually through e-mail at the PCU Library, with a view of the types of questions based on user background, the writing style of language communication interaction used based on user background, and cultural values are revealed behind the user in virtual reference services (e-mail. This study uses content analysis (content analysis of the transcript e-mail received librarians of reference services began March 10 until June 16, 2015. The results showed that the types of questions asked in reference service virtual (e-mail in the Library UK Petra include: specific search, access online resources, operation of online resources, policies and procedures for services, and library holdings with background the student (PCU and non-PCU, faculty, and librarians. Based on the background of users found that overall more types of questions asked in virtual reference services (e-mail is a problem of access to online resources, and generally submitted by the students. Then, the writing style of the user's language in interaction reference service virtual (e-mail tends to be formal, which includes the word greeting, the message will be delivered, and regards cover, either by the student (PCU and non-PCU, lecturer, or librarians. While cultural values that revealed the background behind the user in virtual reference services (e-mail is obedience, courtesy and

  14. Publication’s e-mail marketing procedure

    OpenAIRE

    Ebrahim, Nader Ale

    2016-01-01

    Your research findings and publications have to reach thousands of your peers and colleagues by sending an email. If you have recently published a study that would be of interest to others in your field, market it through email. “E-mail marketing” allow the researchers to increase the research impact and citations for their publications. This workshop will provide various techniques to increase the visibility and enhance the impact of researcher’s output by employing the publications E-mail m...

  15. Direct e-mail marketing: Case of Serbia

    Directory of Open Access Journals (Sweden)

    Končar Jelena A.

    2005-01-01

    Full Text Available Direct e-mail marketing refers to approaching customers directly, without employing intermediaries. It represents a direct mode of communication with the target population, which affects the creation of stronger and more loyal relationships with prospective customers, compared to traditional direct marketing resources (TV, radio, print and advertising panels, etc. The main goal of direct e-mail marketing is building long-term "one to one" relationships with current and prospective customers. Direct e-mail marketing is not aimed at momentary sale, but at boosting certain product preferences due to the engagement of numerous electronic media.

  16. Non-targeted glycosidic profiling of international wines using neutral loss-high resolution mass spectrometry.

    Science.gov (United States)

    Barnaba, C; Dellacassa, E; Nicolini, G; Nardin, T; Serra, M; Larcher, R

    2018-07-06

    Many metabolites naturally occur as glycosides, since sugar moieties can be crucial for their biological activity and increase their water solubility. In the plant kingdom they may occur as glycosides or sugar esters, depending on precursor chemical structure, and in wine they have traditionally attracted attention due to their organoleptic properties, such as astringency and bitterness, and because they affect the colour and aroma of wines. A new approach directed at detailed description of glycosides in a large selection of monovarietal wines (8 samples each of Pinot Blanc, Muller Thurgau, Riesling, Traminer, Merlot, Pinot Noir and Cabernet Sauvignon) was developed by combining high performance liquid chromatography with high resolution tandem mass spectrometry. Analytical separation was performed on an Accucore™ Polar Premium LC column, while mass analysis was performed in negative ion mode with an non-targeted screening approach, using a Full MS/AIF/NL dd-MS 2 experiment at a resolving power of 140,000 FWHM. Over 280 glycoside-like compounds were detected, of which 133 (including low-molecular weight phenols, flavonoids and monoterpenols) were tentatively identified in the form of pentose (6), deoxyhexose (17), hexose (73), hexose-pentose (16), hexose-deoxyhexose (7), dihexose (5) and hexose ester (9) derivatives. It was not possible to univocally define the corresponding chemical structure for the remaining 149 glycosides. Non-parametric statistical analysis showed it was possible to well characterise the glycosylated profile of all red and Traminer wines, while the identified glycosides were almost entirely lacking in Pinot Blanc, Riesling and Muller Thurgau wines. Also Tukey's Honestly Significant Difference test (p wines from each other according to their glycosylated profile. Copyright © 2018 Elsevier B.V. All rights reserved.

  17. The Impact of a Targeted Training Program on E-Mail System Processing Capabilities and Self-Perception of E-Mail Overload

    Science.gov (United States)

    Einstein, Michael M.

    2014-01-01

    As business e-mail volumes continue to grow and employees spend increasingly larger portions of their day processing e-mail, there is strong evidence of the negative impacts of e-mail processing, especially with respect to e-mail overload. This study sought to determine whether a training program focused on select e-mail features and processing…

  18. EPA’s Non-Targeted Analysis Research Program: Expanding public data resources in support of exposure science

    Science.gov (United States)

    Suspect screening (SSA) and non-targeted analysis (NTA) methods using high-resolution mass spectrometry (HRMS) offer new approaches to efficiently generate exposure data for chemicals in a variety of environmental and biological media. These techniques aid characterization of the...

  19. Non-target effects of broadleaf herbicide on a native perennial forb: a demographic framework for assessing and minimizing impacts

    Science.gov (United States)

    Elizabeth E. Crone; Marilyn Marler; Dean E. Pearson

    2009-01-01

    Invasive species are one of the leading threats to biodiversity worldwide. Therefore, chemical herbicides are increasingly used to control invasive plants in natural and semi-natural areas. Little is known about the non-target impacts of these chemicals on native species. We conducted an experiment to test the demographic effects of the herbicide picloram on a native...

  20. Beemsterboer email discussion Jan. 10 - Mar. 4, 2014

    Science.gov (United States)

    A series of emails between Beemsterboer Slag Corp. and the Air Enforcement department of EPA Region 5 regarding site monitoring, and transportation of pet coke and met coke from facilities in Chicago, Illinois.

  1. Manipulating E-Mail Server Feedback for Spam Prevention

    Directory of Open Access Journals (Sweden)

    O. A. Okunade

    2017-08-01

    Full Text Available The cyber criminals who infect machines with bots are not the same as the spammers who rent botnets to distribute their messages. The activities of these spammers account for the majority of spam emails traffic on the internet. Once their botnets and campaigns are identified, it is not enough to keep on filtering the spam emails, it is necessary to deploy techniques that will carry the fight to their end. It is observed that spammers also take into account server feedback (for example to detect and remove non-existent recipients from email address lists. We can take advantage of this observation by returning fake information, thereby poisoning the server feedback on which the spammers rely. The results of this paper show that by sending misleading information to a spammer, it is possible to prevent recipients from receiving subsequent spam emails from that same spammer.

  2. End of Interactive Emailing from the Technical Network

    CERN Multimedia

    2006-01-01

    According to the CNIC Security Policy for Control Systems (EDMS #584092), interactive emailing on PCs (and other devices) connected to the Technical Network is prohibited. Please note that from November 6th, neither reading emails nor sending emails interactively using e.g. Outlook or Pine mail clients on PCs connected to the Technical Network will be possible anymore. However, automatically generated emails will not be blocked and can still be sent off using CERNMX.CERN.CH as mail server. These restrictions DO NOT apply to PCs connected to any other network, like the General Purpose (or office) network. If you have questions, please do not hesitate to contact Uwe Epting, Pierre Charrue or Stefan Lueders (Technical-Network.Administrator@cern.ch). Your CNIC Working Group

  3. Non-target screening to trace ozonation transformation products in a wastewater treatment train including different post-treatments.

    Science.gov (United States)

    Schollée, Jennifer E; Bourgin, Marc; von Gunten, Urs; McArdell, Christa S; Hollender, Juliane

    2018-05-25

    Ozonation and subsequent post-treatments are increasingly implemented in wastewater treatment plants (WWTPs) for enhanced micropollutant abatement. While this technology is effective, micropollutant oxidation leads to the formation of ozonation transformation products (OTPs). Target and suspect screening provide information about known parent compounds and known OTPs, but for a more comprehensive picture, non-target screening is needed. Here, sampling was conducted at a full-scale WWTP to investigate OTP formation at four ozone doses (2, 3, 4, and 5 mg/L, ranging from 0.3 to 1.0 gO 3 /gDOC) and subsequent changes during five post-treatment steps (i.e., sand filter, fixed bed bioreactor, moving bed bioreactor, and two granular activated carbon (GAC) filters, relatively fresh and pre-loaded). Samples were measured with online solid-phase extraction coupled to liquid chromatography high-resolution tandem mass spectrometry (LC-HRMS/MS) using electrospray ionization (ESI) in positive and negative modes. Existing non-target screening workflows were adapted to (1) examine the formation of potential OTPs at four ozone doses and (2) compare the removal of OTPs among five post-treatments. In (1), data processing included principal component analysis (PCA) and chemical knowledge on possible oxidation reactions to prioritize non-target features likely to be OTPs. Between 394 and 1328 unique potential OTPs were detected in positive ESI for the four ozone doses tested; between 12 and 324 unique potential OTPs were detected in negative ESI. At a specific ozone dose of 0.5 gO 3 /gDOC, 27 parent compounds were identified and were related to 69 non-target features selected as potential OTPs. Two OTPs were confirmed with reference standards (venlafaxine N-oxide and chlorothiazide); 34 other potential OTPs were in agreement with literature data and/or reaction mechanisms. In (2), hierarchical cluster analysis (HCA) was applied on profiles detected in positive ESI mode across the

  4. Analysis of E-mail Transactions in Virtual Reference Services

    Directory of Open Access Journals (Sweden)

    Astutik Nur Qomariyah

    2018-01-01

    Full Text Available Today, the use of traditional reference desk in the academic libraries has been rarely used, thus expanding or even move to a virtual reference service. A minimum level of virtual reference services are provided in the academic library is currently in general is the electronic mail (e-mail. One of the academic library specifically provide virtual reference services via e-mail is a Petra Christian University (PCU Library (refdesk@petra.ac.id.. In such services librarians provide assistance to users in finding information and answer questions. This study aimed to analyze the transaction reference services virtually through e-mail at the PCU Library, with a view of the types of questions based on user background, the writing style of language communication interaction used based on user background, and cultural values are revealed behind the user in virtual reference services (e-mail. This study uses content analysis (content analysis of the transcript e-mail received librarians of reference services began March 10 until June 16, 2015. The results showed that the types of questions asked in reference service virtual (e-mail in the Library UK Petra include: specific search, access online resources, operation of online resources, policies and procedures for services, and library holdings with background the student (PCU and non-PCU, faculty, and librarians. Based on the background of users found that overall more types of questions asked in virtual reference services (e-mail is a problem of access to online resources, and generally submitted by the students. Then, the writing style of the user's language in interaction reference service virtual (e-mail tends to be formal, which includes the word greeting, the message will be delivered, and regards cover, either by the student (PCU and non-PCU, lecturer, or librarians. While cultural values that revealed the background behind the user in virtual reference services (e-mail is obedience, courtesy and

  5. Email for the coordination of healthcare appointments and attendance reminders.

    Science.gov (United States)

    Atherton, Helen; Sawmynaden, Prescilla; Meyer, Barbara; Car, Josip

    2012-08-15

    Email is a popular and commonly-used method of communication, but its use in health care is not routine. Where email communication has been utilised in health care, its purposes have included the coordination of healthcare appointments and attendance reminders, but the effects of using email in this way are not known. This review considers the use of email for the coordination of healthcare appointments and reminders for attendance; particularly scheduling, rescheduling and cancelling healthcare appointments, and providing prompts/reminders for attendance at appointments. To assess the effects of using email for the coordination of healthcare appointments and attendance reminders, compared to other forms of coordinating appointments and reminders, on outcomes for health professionals, patients and carers, and health services, including harms. We searched: the Cochrane Consumers and Communication Review Group Specialised Register, the Cochrane Central Register of Controlled Trials (CENTRAL, The Cochrane Library, Issue 1 2010), MEDLINE (OvidSP) (1950 to January 2010), EMBASE (OvidSP) (1980 to January 2010), PsycINFO (OvidSP) (1967 to January 2010), CINAHL (EbscoHOST) (1982 to February 2010),and ERIC (CSA) (1965 to January 2010). We searched grey literature: theses/dissertation repositories, trials registers and Google Scholar (searched July 2010). We used additional search methods: examining reference lists and contacting authors. Randomised controlled trials, quasi-randomised trials, controlled before and after studies and interrupted time series studies of interventions that use email for scheduling health appointments, for reminders for a scheduled health appointment or for ongoing coordination of health appointments and that took the form of 1) unsecured email 2) secure email or 3) web messaging. All healthcare professionals, patients and caregivers in all settings were considered. Two review authors independently assessed the titles and abstracts of retrieved

  6. Email networks and the spread of computer viruses

    Science.gov (United States)

    Newman, M. E.; Forrest, Stephanie; Balthrop, Justin

    2002-09-01

    Many computer viruses spread via electronic mail, making use of computer users' email address books as a source for email addresses of new victims. These address books form a directed social network of connections between individuals over which the virus spreads. Here we investigate empirically the structure of this network using data drawn from a large computer installation, and discuss the implications of this structure for the understanding and prevention of computer virus epidemics.

  7. Direct e-mail marketing: Case of Serbia

    OpenAIRE

    Končar Jelena A.; Vukmirović Goran; Katai Žita

    2005-01-01

    Direct e-mail marketing refers to approaching customers directly, without employing intermediaries. It represents a direct mode of communication with the target population, which affects the creation of stronger and more loyal relationships with prospective customers, compared to traditional direct marketing resources (TV, radio, print and advertising panels, etc). The main goal of direct e-mail marketing is building long-term "one to one" relationships with current and prospective customers....

  8. The role of email addresses and email contact in encouraging web response in a mixed mode design

    OpenAIRE

    Cernat, Alexandru; Lynn, Peter

    2014-01-01

    We examine whether propensity to participate in a web-CAPI mixed-mode survey is influenced by being contacted by email in addition to mail. In panel surveys, researchers can ask at each wave for an email address, but there is little evidence regarding the value of doing so. Using data from a large sample with an experimental design (IP5) we find that using a respondent-supplied email address to send additional invites and reminders does not affect response rates compared to using mailed invit...

  9. Identifying spam e-mail messages using an intelligence algorithm

    Directory of Open Access Journals (Sweden)

    Parichehr Ghaedi

    2014-06-01

    Full Text Available During the past few years, there have been growing interests in using email for delivering various types of messages such as social, financial, etc. There are also people who use email messages to promote products and services or even to do criminal activities called Spam email. These unwanted messages are sent to different target population for different purposes and there is a growing interest to develop methods to filter such email messages. This paper presents a method to filter Spam email messages based on the keyword pattern. In this article, a multi-agent filter trade based on the Bayes rule, which has benefit of using the users’ interest, keywords and investigation the message content according to its topic, has been used. Then Nested Neural Network has been used to detect the spam messages. To check the authenticity of this proposed method, we test it for a couple of email messages, so that it could determine spams and hams from each other, effectively. The result shows the superiority of this method over the previous ones including filters with Multi-Layer Perceptron that detect spams.

  10. Email as a Data Collection Tool when Interviewing Older Adults

    Directory of Open Access Journals (Sweden)

    Mario A. Brondani DDS, MSc, PhD

    2011-09-01

    Full Text Available This article explores several aspects of electronic communication, specifically its advantages and disadvantages within the context of a brief experience using email to interview elders. Two older adults participated via email as the psychosocial impact of aging was collected using such venue. Our experiences are compared with published reports from others to analyze the benefits and limitations of email as a research tool. The email was spontaneous, comprehensive, interactive, efficient, confidential, and cost effective. The use of email within this exploratory study appeared to be an effective approach to collecting qualitative information about beliefs and behaviours from older adults who feel comfortable with this form of communication. The lack of similar studies limited the scope of discussion and comparison of findings; generalization is limited due to the small sample size. This investigation, however, suggested that the use of email as an interview tool may be considered in today's exploratory research arena as an alternative to conference calls or face-to-face interviews when time is a constraint.

  11. CEAI: CCM-based email authorship identification model

    Directory of Open Access Journals (Sweden)

    Sarwat Nizamani

    2013-11-01

    Full Text Available In this paper we present a model for email authorship identification (EAI by employing a Cluster-based Classification (CCM technique. Traditionally, stylometric features have been successfully employed in various authorship analysis tasks; we extend the traditional feature set to include some more interesting and effective features for email authorship identification (e.g., the last punctuation mark used in an email, the tendency of an author to use capitalization at the start of an email, or the punctuation after a greeting or farewell. We also included Info Gain feature selection based content features. It is observed that the use of such features in the authorship identification process has a positive impact on the accuracy of the authorship identification task. We performed experiments to justify our arguments and compared the results with other base line models. Experimental results reveal that the proposed CCM-based email authorship identification model, along with the proposed feature set, outperforms the state-of-the-art support vector machine (SVM-based models, as well as the models proposed by Iqbal et al. (2010, 2013 [1,2]. The proposed model attains an accuracy rate of 94% for 10 authors, 89% for 25 authors, and 81% for 50 authors, respectively on Enron dataset, while 89.5% accuracy has been achieved on authors’ constructed real email dataset. The results on Enron dataset have been achieved on quite a large number of authors as compared to the models proposed by Iqbal et al. [1,2].

  12. Internet and Email Use Among STD Clinic Patients

    Science.gov (United States)

    Mark, Karen E.; Wald, Anna; Drolette, Linda; Golden, Matthew R.

    2009-01-01

    Background Little data exist on Internet and email use among STD clinic patients for research and clinical care communication. Methods An anonymous cross-sectional survey of STD clinic patients aged ≥ 18 years in Seattle, Washington, March 13–22, 2006. Results Of 489 study period patients, 251 (51%) completed the questionnaire. Participants had a median age of 30 (range 18–66) years and were 69% male, 56% White, 19% African-American, 9% Hispanic, and 7% Asian/Pacific Islander. 75% had some post-secondary education but half reported an annual income of email that they check at least 3 times a week, and 144 (57%) were willing to receive an email reminding them to come back for a follow-up appointment if diagnosed with an STD. MSM were more likely than women and heterosexual men to be regular Internet and email users (92% versus 70%, p = 0.001) and to have met a sex partner over the Internet during the past year (69% versus 11%, p email use, as was racial/ethnic background (86% of Whites, 48% of African-Americans, 73% of Hispanics, 100% of Asians/Pacific Islanders, and 57% of others, p email use are common and acceptable to many STD clinic patients for research and clinical purposes. PMID:18685548

  13. The non-targeted effects of radiation are perpetuated by exosomes

    Energy Technology Data Exchange (ETDEWEB)

    Al-Mayah, Ammar; Bright, Scott; Chapman, Kim [Genomic Instability Group, Oxford Brookes University, Gipsy Lane Campus, Headington, Oxford OX3 0BP (United Kingdom); Irons, Sarah [Insect Virus Research Group, Oxford Brookes University, Gipsy Lane Campus, Headington, Oxford OX3 0BP (United Kingdom); Luo, Ping [Izon Science Ltd., The Oxford Science Park, Magdalen Centre, Robert Robinson Avenue, Oxford OX4 4GA (United Kingdom); Carter, David [Chromatin and non-coding RNA, Oxford Brookes University, Gipsy Lane Campus, Headington, Oxford OX3 0BP (United Kingdom); Goodwin, Edwin [The New Mexico Consortium, Los Alamos, NM 87544 (United States); Kadhim, Munira, E-mail: mkadhim@brookes.ac.uk [Genomic Instability Group, Oxford Brookes University, Gipsy Lane Campus, Headington, Oxford OX3 0BP (United Kingdom)

    2015-02-15

    Highlights: • Radiation induces a DNA damaging process in bystander cells through cell–cell signalling. • Exosome RNA and protein molecules play crucial roles in bystander effects. • Cell progeny inherit the ability to secret bystander effect-inducing exosomes. • This mechanism is most likely accountable for the propagation of GI. - Abstract: Exosomes contain cargo material from endosomes, cytosol, plasma membrane and microRNA molecules, they are released by a number of non-cancer and cancer cells into both the extracellular microenvironment and body fluids such as blood plasma. Recently we demonstrated radiation-induced non-targeted effects [NTE: genomic instability (GI) and bystander effects (BE)] are partially mediated by exosomes, particularly the RNA content. However the mechanistic role of exosomes in NTE is yet to be fully understood. The present study used MCF7 cells to characterise the longevity of exosome-induced activity in the progeny of irradiated and unirradiated bystander cells. Exosomes extracted from conditioned media of irradiated and bystander progeny were added to unirradiated cells. Analysis was carried out at 1 and 20/24 population doublings following medium/exosome transfer for DNA/chromosomal damage. Results confirmed exosomes play a significant role in mediating NTE of ionising radiation (IR). This effect was remarkably persistent, observed >20 doublings post-irradiation in the progeny of bystander cells. Additionally, cell progeny undergoing a BE were themselves capable of inducing BE in other cells via exosomes they released. Furthermore we investigated the role of exosome cargo. Culture media from cells exposed to 2 Gy X-rays was subjected to ultracentrifugation and four inoculants prepared, (a) supernatants with exosomes removed, and pellets with (b) exosome proteins denatured, (c) RNA degraded, and (d) a combination of protein–RNA inactivation. These were added to separate populations of unirradiated cells. The BE was

  14. The non-targeted effects of radiation are perpetuated by exosomes

    International Nuclear Information System (INIS)

    Al-Mayah, Ammar; Bright, Scott; Chapman, Kim; Irons, Sarah; Luo, Ping; Carter, David; Goodwin, Edwin; Kadhim, Munira

    2015-01-01

    Highlights: • Radiation induces a DNA damaging process in bystander cells through cell–cell signalling. • Exosome RNA and protein molecules play crucial roles in bystander effects. • Cell progeny inherit the ability to secret bystander effect-inducing exosomes. • This mechanism is most likely accountable for the propagation of GI. - Abstract: Exosomes contain cargo material from endosomes, cytosol, plasma membrane and microRNA molecules, they are released by a number of non-cancer and cancer cells into both the extracellular microenvironment and body fluids such as blood plasma. Recently we demonstrated radiation-induced non-targeted effects [NTE: genomic instability (GI) and bystander effects (BE)] are partially mediated by exosomes, particularly the RNA content. However the mechanistic role of exosomes in NTE is yet to be fully understood. The present study used MCF7 cells to characterise the longevity of exosome-induced activity in the progeny of irradiated and unirradiated bystander cells. Exosomes extracted from conditioned media of irradiated and bystander progeny were added to unirradiated cells. Analysis was carried out at 1 and 20/24 population doublings following medium/exosome transfer for DNA/chromosomal damage. Results confirmed exosomes play a significant role in mediating NTE of ionising radiation (IR). This effect was remarkably persistent, observed >20 doublings post-irradiation in the progeny of bystander cells. Additionally, cell progeny undergoing a BE were themselves capable of inducing BE in other cells via exosomes they released. Furthermore we investigated the role of exosome cargo. Culture media from cells exposed to 2 Gy X-rays was subjected to ultracentrifugation and four inoculants prepared, (a) supernatants with exosomes removed, and pellets with (b) exosome proteins denatured, (c) RNA degraded, and (d) a combination of protein–RNA inactivation. These were added to separate populations of unirradiated cells. The BE was

  15. Exploration of the Malicious Online Marketing about Taobao Shops%网络恶意营销的反思与治理

    Institute of Scientific and Technical Information of China (English)

    刘欢

    2015-01-01

    对网络恶意营销进行界定分析,指出构建商业伦理是治理网络恶意营销的关键,并尝试从宏观、微观两个层面对商业伦理进行阐释。%This paper gives a definition of malicious online marketing and states that business ethics is the key to the governance of malicious online marketing and the building of business ethics, as a systematic project, should be dealt with from macroscopic and microscopic aspects.

  16. Who sends the email? Using electronic surveys in violence research.

    Science.gov (United States)

    Sutherland, Melissa A; Amar, Angela F; Laughon, Kathryn

    2013-08-01

    Students aged 16-24 years are at greatest risk for interpersonal violence and the resulting short and long-term health consequences. Electronic survey methodology is well suited for research related to interpersonal violence. Yet methodological questions remain about best practices in using electronic surveys. While researchers often indicate that potential participants receive multiple emails as reminders to complete the survey, little mention is made of the sender of the recruitment email. The purpose of this analysis is to describe the response rates from three violence-focused research studies when the recruitment emails are sent from a campus office, researcher or survey sampling firm. Three violence-focused studies were conducted about interpersonal violence among college students in the United States. Seven universities and a survey sampling firm were used to recruit potential participants to complete an electronic survey. The sender of the recruitment emails varied within and across the each of the studies depending on institutional review boards and university protocols. An overall response rate of 30% was noted for the 3 studies. Universities in which researcher-initiated recruitment emails were used had higher response rates compared to universities where campus officials sent the recruitment emails. Researchers found lower response rates to electronic surveys at Historically Black Colleges or Universities and that other methods were needed to improve response rates. The sender of recruitment emails for electronic surveys may be an important factor in response rates for violence-focused research. For researchers identification of best practices for survey methodology is needed to promote accurate disclosure and increase response rates.

  17. Who Sends the Email? Using Electronic Surveys in Violence Research

    Directory of Open Access Journals (Sweden)

    Melissa A Sutherland

    2013-08-01

    Full Text Available Introduction: Students aged 16–24 years are at greatest risk for interpersonal violence and the resulting short and long-term health consequences. Electronic survey methodology is well suited for research related to interpersonal violence. Yet methodological questions remain about best practices in using electronic surveys. While researchers often indicate that potential participants receive multiple emails as reminders to complete the survey, little mention is made of the sender of the recruitment email. The purpose of this analysis is to describe the response rates from three violence-focused research studies when the recruitment emails are sent from a campus office, researcher or survey sampling firm. Methods: Three violence-focused studies were conducted about interpersonal violence among college students in the United States. Seven universities and a survey sampling firm were used to recruit potential participants to complete an electronic survey. The sender of the recruitment emails varied within and across the each of the studies depending on institutional review boards and university protocols.Results: An overall response rate of 30% was noted for the 3 studies. Universities in which researcher initiated recruitment emails were used had higher response rates compared to universities where campus officials sent the recruitment emails. Researchers found lower response rates to electronic surveys at Historically Black Colleges or Universities and that other methods were needed to improve response rates.Conclusion: The sender of recruitment emails for electronic surveys may be an important factor in response rates for violence-focused research. For researchers identification of best practices for survey methodology is needed to promote accurate disclosure and increase response rates. [West J Emerg Med. 2013;14(4:363–369.

  18. DESCRIPTIVE STUDY OF HONORIFIC USE IN KOREAN EMAIL DISCOURSE

    Directory of Open Access Journals (Sweden)

    Jaegu Kim

    2016-07-01

    Full Text Available It is a relatively new field that examines how Korean culture affects Korean language use in terms of age difference in a corpus of computer mediated email discourse. The purpose of this descriptive study and experiment is to prove the close relationship between Korean language and culture. This paper shows the descriptive study of Korean culture in relation to language use. Korean culture acknowledges an inherent hierarchy with regard to age, and considers [+age] as relating socially to [+power]. When younger Koreans converse with older ones, they express different morpho-syntactic patterns, which is an age complex. The main task of the experiment was to examine the way through which the age complex is reflected by Korean honorific linguistic system in email discourse. I asked 15 Korean native speakers between the ages of 20 to 25 to write emails expressing an impositive request to [+age (46-50 years old], [-age (below 25 years old] and [=age] recipients. The results show significant differences in the use of grammatical features in emails written to [+age] recipients, as compared to emails written to [-age] and [=age] recipients. The implication of the findings is that the cultural values that are attached to age and aging in the Korean society affects Koreans’ language use, which means Korean language and culture are closely intermingled.

  19. Implementasi Algoritma Kriptografi RSA untuk Enkripsi dan Dekripsi Email

    Directory of Open Access Journals (Sweden)

    Albert Ginting

    2015-04-01

    Full Text Available In the world of Internet nothing is really safe. There's always a gap in any application made. Likewise in email delivery. To minimize attacks on the data transmission is usually applied cryptography. One fairly popular cryptographic algorithms are RSA algorithm. In this study will discuss the implementation of a cryptographic algorithm RSA encryption and decryption process email. To test created a java-based email client program with message encryption and decryption features messages. This application uses the Java programming language and Netbeans 7.4 as editor. Mail servers used is Google Mail. The initial step of this study was to download email from the Google server and encrypt the message. The second step is decrypt the message to verify whether the message is still the same as the original message before it is encrypted . Results from this study is the application that can encrypt and decrypt messages using RSA cryptographic algorithm. With this application is expected to mail delivery is much safer. Because encrypted email will generate a random decimal number of unknown value .

  20. Detection of fraudulent emails by employing advanced feature abundance

    Directory of Open Access Journals (Sweden)

    Sarwat Nizamani

    2014-11-01

    Full Text Available In this paper, we present a fraudulent email detection model using advanced feature choice. We extracted various kinds of features and compared the performance of each category of features with the others in terms of the fraudulent email detection rate. The different types of features are incorporated step by step. The detection of fraudulent email has been considered as a classification problem and it is evaluated using various state-of-the art algorithms and on CCM (Nizamani et al., 2011 [1] which is authors’ previous cluster based classification model. The experiments have been performed on diverse feature sets and the different classification methods. The comparison of the results is also presented and the evaluation show that for the fraudulent email detection tasks, the feature set is more important regardless of classification method. The results of the study suggest that the task of fraudulent emails detection requires the better choice of feature set; while the choice of classification method is of less importance.

  1. Evil acts and malicious gossip: a multiagent model of the effects of gossip in socially distributed person perception.

    Science.gov (United States)

    Smith, Eliot R

    2014-11-01

    Although person perception is central to virtually all human social behavior, it is ordinarily studied in isolated individual perceivers. Conceptualizing it as a socially distributed process opens up a variety of novel issues, which have been addressed in scattered literatures mostly outside of social psychology. This article examines some of these issues using a series of multiagent models. Perceivers can use gossip (information from others about social targets) to improve their ability to detect targets who perform rare negative behaviors. The model suggests that they can simultaneously protect themselves against being influenced by malicious gossip intended to defame specific targets. They can balance these potentially conflicting goals by using specific strategies including disregarding gossip that differs from a personally obtained impression. Multiagent modeling demonstrates the outcomes produced by different combinations of assumptions about gossip, and suggests directions for further research and theoretical development. © 2014 by the Society for Personality and Social Psychology, Inc.

  2. Justifying the need for forensically ready protocols: A case study of identifying malicious web servers using client honeypots

    Energy Technology Data Exchange (ETDEWEB)

    Seifert, Christian; Endicott-Popovsky, Barbara E.; Frincke, Deborah A.; Komisarczuk, Peter; Muschevici, Radu; Welch, Ian D.

    2008-01-03

    Abstract: Client honeypot technology can find malicious web servers that attack web browsers and push malware, so called drive-by-downloads, to the client machine. Merely recording the network traffic is insufficient to perform an efficient forensic analysis of the attack. Custom tools need to be developed to access and examine the embedded data of the network protocols. Once the information is extracted from the network data, it cannot be used to perform a behavioral analysis on the attack, therefore limiting the ability to answer what exactly happened on the attacked system. Implementation of a record/ replay mechanism is proposed that allows the forensic examiner to easily extract application data from recorded network streams and allows applications to interact with such data for behavioral analysis purposes. A concrete implementation of such a setup for HTTP and DNS protocols using the HTTP proxy Squid and DNS proxy pdnsd is presented and its effect on digital forensic analysis demonstrated.

  3. Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks

    Directory of Open Access Journals (Sweden)

    Javier Portela

    2016-11-01

    Full Text Available Social network analysis aims to obtain relational data from social systems to identify leaders, roles, and communities in order to model profiles or predict a specific behavior in users’ network. Preserving anonymity in social networks is a subject of major concern. Anonymity can be compromised by disclosing senders’ or receivers’ identity, message content, or sender-receiver relationships. Under strongly incomplete information, a statistical disclosure attack is used to estimate the network and node characteristics such as centrality and clustering measures, degree distribution, and small-world-ness. A database of email networks in 29 university faculties is used to study the method. A research on the small-world-ness and Power law characteristics of these email networks is also developed, helping to understand the behavior of small email networks.

  4. Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks

    Science.gov (United States)

    Portela, Javier; García Villalba, Luis Javier; Silva Trujillo, Alejandra Guadalupe; Sandoval Orozco, Ana Lucila; Kim, Tai-Hoon

    2016-01-01

    Social network analysis aims to obtain relational data from social systems to identify leaders, roles, and communities in order to model profiles or predict a specific behavior in users’ network. Preserving anonymity in social networks is a subject of major concern. Anonymity can be compromised by disclosing senders’ or receivers’ identity, message content, or sender-receiver relationships. Under strongly incomplete information, a statistical disclosure attack is used to estimate the network and node characteristics such as centrality and clustering measures, degree distribution, and small-world-ness. A database of email networks in 29 university faculties is used to study the method. A research on the small-world-ness and Power law characteristics of these email networks is also developed, helping to understand the behavior of small email networks. PMID:27809275

  5. ENHANCING DISTANT LEARNING THROUGH EMAIL COMMUNICATION: A Case of BOU

    Directory of Open Access Journals (Sweden)

    K. M. Rezanur RAHMAN

    2008-04-01

    Full Text Available Today computer has replaced all means of traditional communication significantly. Many distant learning tools claim to be interactive, but few can offer two-way communication. Email is the most popular means of communication medium now-a-days. Therefore, it may be used as an educational tool for learning. In present socio-economic condition of Bangladesh, learners can afford computer, cell phone and Internet. We took this opportunity to investigate the prospective use of these tools for distant learning. The present survey has been carried out to understand the present status of Internet knowledge among the learners and their views for possible introduction of e-mail communication as supporting tool for learning. BOU’s available infrastructural facilities for providing Internet support have been investigated. Furthermore, possible solutions have been pointed out to provide e-mail facility to the learner in a cost effective way.

  6. Scientific Opinion on the assessment of potential impacts of genetically modified plants on non-target organisms

    DEFF Research Database (Denmark)

    Arpaia, Salvatore; Bartsch, Detlef; Delos, Marc

    The European Food Safety Authority (EFSA) asked the Panel on Genetically Modified Organisms to establish a self-tasking Working Group with the aim of (1) producing a scientific review of the current guidance of the GMO Panel for Environmental Risk Assessment (ERA), focusing on the potential impacts...... of GM plants on Non-Target Organisms (NTOs), (2) proposing criteria for NTOs selection, and (3) providing advise on standardized testing methodology. This initiative was undertaken in response to a need and request from a wide range of stakeholders, including the European Commission and Member States....... In first instance, the self-tasking Working Group on Non-Target Organisms (EFSA NTO WG) mainly considered impacts of GM plants on invertebrate species, but also took account of ecosystem functions that could be altered. The EFSA NTO WG considered the necessity for clear and objective protection goals...

  7. Non-target effects of the entomopathogenic fungus Metarhizium brunneum (BIPESCO 5/F52) on predatory arthropods

    DEFF Research Database (Denmark)

    Campos de Azevedo, Ana Gorete

    females in the presence of M. brunneum revealed that gravid A. aphidimyza are able to perceive the risk posed by M. brunneum and react to that by choosing a pathogen-free site for offspring. In conclusion, non-target effects of M. brunneum on predatory arthropods may be expected. However, knowledge......The overall objective of this PhD thesis was to investigate the interactions that may occur when combining natural enemies of an herbivore. This was done by assessing the non-target effects of the generalist entomopathogenic fungus Metarhizium brunneum on four different predatory arthropods...... of the life cycles of the predatory arthropods and the optimal timing for releasing the natural enemies can reduce the risk of antagonistic interactions. Findings confirm that A. aphidimyza females are able to change their oviposition behavior in the presence of the entomopathogen. It furthermore confirms...

  8. Non-target trials with Pseudomonas fluorescens strain CL145A, a lethal control agent of dreissenid mussels (Bivalvia: Dreissenidae

    Directory of Open Access Journals (Sweden)

    Daniel P. Molloy

    2013-01-01

    Full Text Available In an effort to develop an efficacious and environmentally safe method for managing zebra mussels (Dreissena polymorpha and quaggamussels (Dreissena rostriformis bugensis, we initiated a research project investigating the potential use of bacteria and their naturalmetabolic products as biocontrol agents. This project resulted in the discovery of an environmental isolate lethal to dreissenid mussels,Pseudomonas fluorescens strain CL145A (Pf-CL145A. In previous published reports we have demonstrated that: 1 Pf-CL145A’s mode ofaction is intoxication (not infection; 2 natural product within ingested bacterial cells lyse digestive tract epithelial cells leading to dreisseniddeath; and 3 high dreissenid kill rates (>90% are achievable following treatment with Pf-CL145A cells, irrespective of whether thebacterial cells are dead or alive. Investigating the environmental safety of Pf-CL145A was also a key element in our research efforts, andherein, we report the results of non-target trials demonstrating Pf-CL145A’s high specificity to dreissenids. These acute toxicity trials weretypically single-dose, short-term (24-72 h exposures to Pf-CL145A cells under aerated conditions at concentrations highly lethal todreissenids (100 or 200 mg/L. These trials produced no evidence of mortality among the ciliate Colpidium colpoda, the cladoceran Daphniamagna, three fish species (Pimephales promelas, Salmo trutta, and Lepomis macrochirus, and seven bivalve species (Mytilus edulis,Pyganodon grandis, Pyganodon cataracta, Lasmigona compressa, Strophitus undulatus, Lampsilis radiata, and Elliptio complanata. Lowmortality (3-27% was recorded in the amphipod Hyalella azteca, but additional trials suggested that most, if not all, of the mortality couldbe attributed to some other unidentified factor (e.g., possibly particle load or a water quality issue rather than Pf-CL145A’s dreissenidkillingnatural product. In terms of potential environmental safety, the results of

  9. Monitoring Agent for Detecting Malicious Packet Drops for Wireless Sensor Networks in the Microgrid and Grid-Enabled Vehicles

    Directory of Open Access Journals (Sweden)

    Jongbin Ko

    2012-05-01

    Full Text Available Of the range of wireless communication technologies, wireless sensor networks (WSN will be one of the most appropriate technologies for the Microgrid and Grid-enabled Vehicles in the Smartgrid. To ensure the security of WSN, the detection of attacks is more efficient than their prevention because of the lack of computing power. Malicious packet drops are the easiest means of attacking WSNs. Thus, the sensors used for constructing a WSN require a packet drop monitoring agent, such as Watchdog. However, Watchdog has a partial drop problem such that an attacker can manipulate the packet dropping rate below the minimum misbehaviour monitoring threshold. Furthermore, Watchdog does not consider real traffic situations, such as congestion and collision, and so it has no way of recognizing whether a packet drop is due to a real attack or network congestion. In this paper, we propose a malicious packet drop monitoring agent, which considers traffic conditions. We used the actual traffic volume on neighbouring nodes and the drop rate while monitoring a sending node for specific period. It is more effective in real network scenarios because unlike Watchdog it considers the actual traffic, which only uses the Pathrater. Moreover, our proposed method does not require authentication, packet encryption or detection packets. Thus, there is a lower likelihood of detection failure due to packet spoofing, Man-In-the Middle attacks or Wormhole attacks. To test the suitability of our proposed concept for a series of network scenarios, we divided the simulations into three types: one attack node, more than one attack nodes and no attack nodes. The results of the simulations meet our expectations.

  10. Exogenous Nitric Oxide Suppresses in Vivo X-ray-Induced Targeted and Non-Targeted Effects in Zebrafish Embryos

    Directory of Open Access Journals (Sweden)

    E.Y. Kong

    2016-08-01

    Full Text Available The present paper studied the X-ray-induced targeted effect in irradiated zebrafish embryos (Danio rerio, as well as a non-targeted effect in bystander naïve embryos partnered with irradiated embryos, and examined the influence of exogenous nitric oxide (NO on these targeted and non-targeted effects. The exogenous NO was generated using an NO donor, S-nitroso-N-acetylpenicillamine (SNAP. The targeted and non-targeted effects, as well as the toxicity of the SNAP, were assessed using the number of apoptotic events in the zebrafish embryos at 24 h post fertilization (hpf revealed through acridine orange (AO staining. SNAP with concentrations of 20 and 100 µM were first confirmed to have no significant toxicity on zebrafish embryos. The targeted effect was mitigated in zebrafish embryos if they were pretreated with 100 µM SNAP prior to irradiation with an X-ray dose of 75 mGy but was not alleviated in zebrafish embryos if they were pretreated with 20 µM SNAP. On the other hand, the non-targeted effect was eliminated in the bystander naïve zebrafish embryos if they were pretreated with 20 or 100 µM SNAP prior to partnering with zebrafish embryos having been subjected to irradiation with an X-ray dose of 75 mGy. These findings revealed the importance of NO in the protection against damages induced by ionizing radiations or by radiation-induced bystander signals, and could have important impacts on development of advanced cancer treatment strategies.

  11. Discourse strategies in professional e-mail negotiation

    DEFF Research Database (Denmark)

    Jensen, Astrid

    2009-01-01

    The purpose of this article is to report on some of the preliminary results of an on-going study on the use of discourse strategies in e-mail negotiation. The analysis aims at showing how relations between the participants develop through the use of specific discourse strategies in their e......-mail communication which covers a period of three months, during which the relationship progresses from initial contact to on-going business. Drawing on Hyland's (2005) concept of metadiscourse combined with Charles' (1996) categories of ‘old and new relationship negotiations', this study provides insights...

  12. BEWARE OF OPENING ATTACHMENTS IN E-MAIL

    CERN Multimedia

    2000-01-01

    Following the recent e-mail viruses you are asked to be cautious when opening e-mail attachments on your PC. Attachments that are apparently harmless might hide active content producing nasty effects as soon as they are opened. Some of these so called 'Trojan horses' can conceal themselves in very attractive pictures and funny slide shows.On the PC Windows infrastructure, CERN runs software to protect users from known viruses, but new ones can sometimes arrive before our software recognises them. They can enter your system when you open an attachment. To remove them it may be necessary to re-install the Windows software on your PC.

  13. Machine Learning for Email Spam Filtering and Priority Inbox

    CERN Document Server

    Conway, Drew

    2011-01-01

    If you're an experienced programmer willing to crunch data, this concise guide will show you how to use machine learning to work with email. You'll learn how to write algorithms that automatically sort and redirect email based on statistical patterns. Authors Drew Conway and John Myles White approach the process in a practical fashion, using a case-study driven approach rather than a traditional math-heavy presentation. This book also includes a short tutorial on using the popular R language to manipulate and analyze data. You'll get clear examples for analyzing sample data and writing machi

  14. Promotion and communication through e-mail marketing campaigns

    Directory of Open Access Journals (Sweden)

    Raluca Dania TODOR

    2017-07-01

    Full Text Available The main purpose of this article is to try to emphasize the e-mail marketing campaigns importance and efficiency and the way they increase the interaction between a company and potential customers and to increase their interest in a company’s products and services and finally trigger the buying decision. Also the present paper’s aim is to exemplify how business can gain benefits by using marketing automation tools like e-mail marketing campaigns which is considered nowadays a form of direct marketing which is less expensive than the traditional direct marketing alternatives.

  15. Unraveling mulitple translatorship through an e-mail correspondence

    DEFF Research Database (Denmark)

    Jansen, Hanne

    2017-01-01

    The aim of this study is to shed light on questions of “multiple translatorship” and particularly on translation collaboration processes. The empirical material consists of more than three hundred e-mails exchanged between two co-translators who translated Claudio Magris’s novel Alla cieca (2005......) into Danish. The theoretical framework presents a double perspective through which the e-mail correspondence is studied: on the one hand, as an ethnographic “thick description” (focusing on translation as an event), with the aim of uncovering who the agents involved are, how they interact, and what...

  16. Email for communicating results of diagnostic medical investigations to patients.

    Science.gov (United States)

    Meyer, Barbara; Atherton, Helen; Sawmynaden, Prescilla; Car, Josip

    2012-08-15

    As medical care becomes more complex and the ability to test for conditions grows, pressure on healthcare providers to convey increasing volumes of test results to patients is driving investigation of alternative technological solutions for their delivery. This review addresses the use of email for communicating results of diagnostic medical investigations to patients. To assess the effects of using email for communicating results of diagnostic medical investigations to patients, compared to SMS/ text messaging, telephone communication or usual care, on outcomes, including harms, for health professionals, patients and caregivers, and health services. We searched: the Cochrane Consumers and Communication Review Group Specialised Register, Cochrane Central Register of Controlled Trials (CENTRAL, The Cochrane Library, Issue 1 2010), MEDLINE (OvidSP) (1950 to January 2010), EMBASE (OvidSP) (1980 to January 2010), PsycINFO (OvidSP) (1967 to January 2010), CINAHL (EbscoHOST) (1982 to February 2010), and ERIC (CSA) (1965 to January 2010). We searched grey literature: theses/dissertation repositories, trials registers and Google Scholar (searched July 2010). We used additional search methods: examining reference lists and contacting authors. Randomised controlled trials, quasi-randomised trials, controlled before and after studies and interrupted time series studies of interventions using email for communicating results of any diagnostic medical investigations to patients, and taking the form of 1) unsecured email 2) secure email or 3) web messaging. All healthcare professionals, patients and caregivers in all settings were considered. Two review authors independently assessed the titles and abstracts of retrieved citations. No studies were identified for inclusion. Consequently, no data collection or analysis was possible. No studies met the inclusion criteria, therefore there are no results to report on the use of email for communicating results of diagnostic medical

  17. Test and Evaluation of the Malicious Activity Simulation Tool (MAST) in a Local Area Network (LAN) Running the Common PC Operating System Environment (COMPOSE)

    Science.gov (United States)

    2013-09-01

    Malicious Activity Simulation Tool MMORPG Massively Multiplayer Online Role-Playing Game MMS Mission Management Server MOA Memorandum of Agreement MS...conferencing, and massively multiplayer online role- playing games ( MMORPG ). During all of these Internet-based exchanges and transactions, the Internet user

  18. Compatibility of organic farming treatments against Monosteira unicostata with non-target arthropod fauna of almond trees canopy

    Energy Technology Data Exchange (ETDEWEB)

    Sánchez-Ramos, I.; Marcotegui, A.; Pascual, S.; Fernández, C.E.; Cobos, G.; González-Núñez, M.

    2017-07-01

    Field trials had shown that 1-2 applications of kaolin and potassium salts of fatty acids combined with thyme essential oil (PSTEO) reduced the abundance of the lace bug Monosteira unicostata (Mulsant & Rey) (Hemiptera: Tingidae), an important pest of almond trees in the Mediterranean region. These products could be useful for the control of this pest in organic production of almonds, but higher number of applications could be necessary. However, the possible detrimental effects on the almond orchard ecosystem should be evaluated. In the present work, the effects observed on the non-target arthropod fauna of the almond trees canopy in those field assays are shown. First, a comprehensive report of the non-target arthropod fauna of the almond tree is provided. Regarding natural enemies, most of the predatory arthropods captured were spiders belonging to different families like Salticidae, Thomisidae, Philodromidae, Theridiidae, Araneidae or Oxyopidae. Other predatory families that appeared in significant numbers were Chrysopidae, Anthocoridae, Aeolothripidae, Coccinellidae, Phytoseiidae, Erythraeidae or Forficulidae. Among parasitoids, the most abundant families were Eulophidae, Scelionidae and Dryinidae. Kaolin reduced the abundance of natural enemies and other non-target arthropods as well as their diversity and number of species. On the contrary, PSTEO only produced a slight reduction in the number of natural enemies, whereas no effect was found on the diversity and species richness. These effects were observed despite the reduced number of applications, so greater effect is expected if its frequency is increased in order to achieve an efficient control of M. unicostata.

  19. Attractive Toxic Sugar Bait (ATSB) For Control of Mosquitoes and Its Impact on Non-Target Organisms: A Review.

    Science.gov (United States)

    Fiorenzano, Jodi M; Koehler, Philip G; Xue, Rui-De

    2017-04-10

    Mosquito abatement programs contend with mosquito-borne diseases, insecticidal resistance, and environmental impacts to non-target organisms. However, chemical resources are limited to a few chemical classes with similar modes of action, which has led to insecticide resistance in mosquito populations. To develop a new tool for mosquito abatement programs that control mosquitoes while combating the issues of insecticidal resistance, and has low impacts of non-target organisms, novel methods of mosquito control, such as attractive toxic sugar baits (ATSBs), are being developed. Whereas insect baiting to dissuade a behavior, or induce mortality, is not a novel concept, as it was first introduced in writings from 77 AD, mosquito baiting through toxic sugar baits (TSBs) had been quickly developing over the last 60 years. This review addresses the current body of research of ATSB by providing an overview of active ingredients (toxins) include in TSBs, attractants combined in ATSB, lethal effects on mosquito adults and larvae, impact on non-target insects, and prospects for the use of ATSB.

  20. Augmentative biocontrol in natural marine habitats: persistence, spread and non-target effects of the sea urchin Evechinus chloroticus.

    Directory of Open Access Journals (Sweden)

    Javier Atalah

    Full Text Available Augmentative biocontrol aims to control established pest populations through enhancement of their indigenous enemies. To our knowledge, this approach has not been applied at an operational scale in natural marine habitats, in part because of the perceived risk of adverse non-target effects on native ecosystems. In this paper, we focus on the persistence, spread and non-target effects of the sea urchin Evechinus chloroticus when used as biocontrol agent to eradicate an invasive kelp from Fiordland, New Zealand. Rocky reef macrobenthic assemblages were monitored over 17 months in areas where the indigenous algal canopy was either removed or left intact prior to the translocation of a large number of urchins (>50 ind.·m(-2. Urchin densities in treated areas significantly declined ∼9 months after transplant, and began spreading to adjacent sites. At the end of the 17-month study, densities had declined to ∼5 ind.·m(-2. Compared to controls, treatment sites showed persistent shifts from kelp forest to urchin barrens, which were accompanied by significant reductions in taxa richness. Although these non-target effects were pronounced, they were considered to be localised and reversible, and arguably outweigh the irreversible and more profound ecological impacts associated with the establishment of an invasive species in a region of high conservation value. Augmentative biocontrol, used in conjunction with traditional control methods, represents a promising tool for the integrated management of marine pests.

  1. Radiation induced COX-2 expression and mutagenesis at non-targeted lung tissues of gpt delta transgenic mice

    Science.gov (United States)

    Chai, Y; Calaf, G M; Zhou, H; Ghandhi, S A; Elliston, C D; Wen, G; Nohmi, T; Amundson, S A; Hei, T K

    2013-01-01

    Background: Although radiation-induced bystander effects have been confirmed using a variety of endpoints, the mechanism(s) underlying these effects are not well understood, especially for in vivo study. Methods: A 1-cm2 area (1 cm × 1 cm) in the lower abdominal region of gpt delta transgenic mice was irradiated with 5 Gy of 300 keV X-rays, and changes in out-of-field lung and liver were observed. Results: Compared with sham-treated controls, the Spi− mutation frequency increased 2.4-fold in non-targeted lung tissues at 24 h after partial body irradiation (PBIR). Consistent with dramatic Cyclooxygenase 2 (COX-2) induction in the non-targeted bronchial epithelial cells, increasing levels of prostaglandin, together with 8-hydroxydeoxyguanosine, in the out-of-field lung tissues were observed after PBIR. In addition, DNA double-strand breaks and apoptosis were induced in bystander lung tissues after PBIR. Conclusion: The PBIR induces DNA damage and mutagenesis in non-targeted lung tissues, especially in bronchial epithelial cells, and COX-2 has an essential role in bystander mutagenesis. PMID:23321513

  2. Compatibility of organic farming treatments against Monosteira unicostata with non-target arthropod fauna of almond trees canopy

    International Nuclear Information System (INIS)

    Sánchez-Ramos, I.; Marcotegui, A.; Pascual, S.; Fernández, C.E.; Cobos, G.; González-Núñez, M.

    2017-01-01

    Field trials had shown that 1-2 applications of kaolin and potassium salts of fatty acids combined with thyme essential oil (PSTEO) reduced the abundance of the lace bug Monosteira unicostata (Mulsant & Rey) (Hemiptera: Tingidae), an important pest of almond trees in the Mediterranean region. These products could be useful for the control of this pest in organic production of almonds, but higher number of applications could be necessary. However, the possible detrimental effects on the almond orchard ecosystem should be evaluated. In the present work, the effects observed on the non-target arthropod fauna of the almond trees canopy in those field assays are shown. First, a comprehensive report of the non-target arthropod fauna of the almond tree is provided. Regarding natural enemies, most of the predatory arthropods captured were spiders belonging to different families like Salticidae, Thomisidae, Philodromidae, Theridiidae, Araneidae or Oxyopidae. Other predatory families that appeared in significant numbers were Chrysopidae, Anthocoridae, Aeolothripidae, Coccinellidae, Phytoseiidae, Erythraeidae or Forficulidae. Among parasitoids, the most abundant families were Eulophidae, Scelionidae and Dryinidae. Kaolin reduced the abundance of natural enemies and other non-target arthropods as well as their diversity and number of species. On the contrary, PSTEO only produced a slight reduction in the number of natural enemies, whereas no effect was found on the diversity and species richness. These effects were observed despite the reduced number of applications, so greater effect is expected if its frequency is increased in order to achieve an efficient control of M. unicostata.

  3. Simultaneous quantification of tumor uptake for targeted and non-targeted liposomes and their encapsulated contents by ICP-MS

    Science.gov (United States)

    Cheng, Zhiliang; Zaki, Ajlan Al; Hui, James Z; Tsourkas, Andrew

    2012-01-01

    Liposomes are intensively being developed for biomedical applications including drug and gene delivery. However, targeted liposomal delivery in cancer treatment is a very complicated multi-step process. Unfavorable liposome biodistribution upon intravenous administration and membrane destabilization in blood circulation could result in only a very small fraction of cargo reaching the tumors. It would therefore be desirable to develop new quantitative strategies to track liposomal delivery systems to improve the therapeutic index and decrease systemic toxicity. Here, we developed a simple and non-radiative method to quantify the tumor uptake of targeted and non-targeted control liposomes as well as their encapsulated contents simultaneously. Specifically, four different chelated lanthanide metals were encapsulated or surface-conjugated onto tumor-targeted and non-targeted liposomes, respectively. The two liposome formulations were then injected into tumor-bearing mice simultaneously and their tumor delivery was determined quantitatively via inductively coupled plasma-mass spectroscopy (ICP-MS), allowing for direct comparisons. Tumor uptake of the liposomes themselves and their encapsulated contents were consistent with targeted and non-targeted liposome formulations that were injected individually. PMID:22882145

  4. Control of sand flies with attractive toxic sugar baits (ATSB) and potential impact on non-target organisms in Morocco.

    Science.gov (United States)

    Qualls, Whitney A; Müller, Gunter C; Khallaayoune, Khalid; Revay, Edita E; Zhioua, Elyes; Kravchenko, Vasiliy D; Arheart, Kristopher L; Xue, Rui-De; Schlein, Yosef; Hausmann, Axel; Kline, Daniel L; Beier, John C

    2015-02-08

    The persistence and geographical expansion of leishmaniasis is a major public health problem that requires the development of effective integrated vector management strategies for sand fly control. Moreover, these strategies must be economically and environmentally sustainable approaches that can be modified based on the current knowledge of sand fly vector behavior. The efficacy of using attractive toxic sugar baits (ATSB) for sand fly control and the potential impacts of ATSB on non-target organisms in Morocco was investigated. Sand fly field experiments were conducted in an agricultural area along the flood plain of the Ourika River. Six study sites (600 m x 600 m); three with "sugar rich" (with cactus hedges bearing countless ripe fruits) environments and three with "sugar poor" (green vegetation only suitable for plant tissue feeding) environments were selected to evaluate ATSB, containing the toxin, dinotefuran. ATSB applications were made either with bait stations or sprayed on non-flowering vegetation. Control sites were established in both sugar rich and sugar poor environments. Field studies evaluating feeding on vegetation treated with attractive (non-toxic) sugar baits (ASB) by non-target arthropods were conducted at both sites with red stained ASB applied to non-flowering vegetation, flowering vegetation, or on bait stations. At both the sites, a single application of ATSB either applied to vegetation or bait stations significantly reduced densities of both female and male sand flies (Phlebotomus papatasi and P. sergenti) for the five-week trial period. Sand fly populations were reduced by 82.8% and 76.9% at sugar poor sites having ATSB applied to vegetation or presented as a bait station, respectively and by 78.7% and 83.2%, respectively at sugar rich sites. The potential impact of ATSB on non-targets, if applied on green non-flowering vegetation and bait stations, was low for all non-target groups as only 1% and 0.7% were stained with non-toxic bait

  5. E-mail et Web : pour une navigation sans risque

    CERN Multimedia

    CERN. Geneva

    2010-01-01

    Présentation orale en français, support visuel en anglais. À travers des exemples concrets, vous consoliderez vos connaissances et pourrez ainsi réajuster vos habitudes concernant l’utilisation sécurisée de votre boîte e-mail et de votre navigateur Web.

  6. Changing a Course of Action: Teachers' E-mail Discussion.

    Science.gov (United States)

    Serafin, Ana Gil

    This study examined the e-mail interactions of teachers who were graduate students in an educational leadership program at a commuter university. Participants attended a 3-hour-per-week course. The instructor inserted into the course syllabus an assessment plan that required computer use, making the students responsible for accessing the…

  7. Communicative In-Betweens of E-mail Communication

    DEFF Research Database (Denmark)

    Hansen, Ejvind

    2009-01-01

    In this paper I seek to deconstruct internet-based communication. I highlight Derrida’s focus on the margins and in-betweens of communication, and relate it to the genre of e-mail. I argue (i) that the silence between the dialogic turns becomes more marked, while (ii) the separation of present an...

  8. Colleges Get out of E-Mail Business

    Science.gov (United States)

    Carnevale, Dan

    2008-01-01

    Frantic troubleshooting by an overworked staff versus someone else fixing problems smoothly. A sliver of server space per person versus a five-gigabyte chunk. Half a million dollars versus free. That's what colleges are faced with as they decide whether to continue running their own e-mail services or outsource them to a professional service like…

  9. E-Mail from Professor Enhances Student Motivation and Attitudes

    Science.gov (United States)

    Legg, Angela M.; Wilson, Janie H.

    2009-01-01

    Traditionally, professors use the first day of class to build rapport. However, current technology allows professors to contact students prior to the first day of class. This study assessed how the receipt of a welcoming e-mail from a female professor 1 week before the first day of class affected student motivation and attitudes toward the…

  10. SPAM: Beware of e-mails asking for passwords

    CERN Multimedia

    IT Department

    2008-01-01

    CERN’s Computing Rules (Operational Circular No. 5) require that passwords remain confidential and never be given to anyone, not even helpdesk or other support personnel. If you think that your password could have been exposed then you must immediately change it. Cybercriminals are making growing use of fake e-mail messages and Web sites to steal account and identity information from users. This technique is called ‘phishing’. The fake e-mails often look real and try to trick you into giving your password or other personal data. CERN has recently been targeted by a fake e-mail message which requested users to send their username, password and date of birth. This case was promptly blocked by the CERN Mail Service, but future cases may still occur. Users need to be vigilant regarding any requests for passwords or personal data. Fake e-mails should be immediately deleted. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN IT Department

  11. The Communicative Functions of Emoticons in Workplace E-Mails :-)

    DEFF Research Database (Denmark)

    Skovholt, Karianne; Grønning, Anette; Kankaanranta, Anne

    2014-01-01

    CMC research presents emoticons as visual representations of writers' emotions. We argue that the emoticons in authentic workplace e-mails do not primarily indicate writers' emotions. Rather, they provide information about how an utterance is supposed to be interpreted. We show that emoticons...

  12. Writing for Business Purposes: Elements of Email Etiquette

    OpenAIRE

    Gabriela Dumbravă; Adriana Koronka

    2006-01-01

    Starting from the premise that electronic mail has experienced an explosive development throughout the world over the past few years, gaining substantial territory in the field of business communication, the paper focuses on the basic elements of email etiquette and on their importance in writing an effective and competitive electronic message. adapted to the context and purpose of professional writing.

  13. Orality and literacy, formality and informality in email communication

    Directory of Open Access Journals (Sweden)

    Carmen Pérez Sabater

    2008-04-01

    Full Text Available Approaches to the linguistic characteristics of computer-mediated communication (CMC have highlighted the frequent oral traits involved in electronic mail along with features of written language. But email is today a new communication exchange medium in social, professional and academic settings, frequently used as a substitute for the traditional formal letter. The oral characterizations and linguistic formality involved in this use of emails are still in need of research. This paper explores the formal and informal features in emails based on a corpus of messages exchanged by academic institutions, and studies the similarities and differences on the basis of their mode of communication (one-to-one or one-to-many and the sender’s mother tongue (native or nonnative. The language samples collected were systematically analyzed for formality of greetings and farewells, use of contractions, politeness indicators and non-standard linguistic features. The findings provide new insights into traits of orality and formality in email communication and demonstrate the emergence of a new style in writing for even the most important, confidential and formal purposes which seems to be forming a new sub-genre of letter-writing.

  14. Advanced Email Risk Classification and Recipient Decision Assistance

    Science.gov (United States)

    Estes, Aaron

    2016-01-01

    Email attacks comprise an overwhelming majority of the daily attacks on modern enterprise. "Phishing" is the leading attack vector for the world's most dangerous threats such as the so-called, Advanced Persistent Threat (APT), and hacktivist groups such as Anonymous and LulzSec. The leading mitigation strategy is a combination of user…

  15. The Use of Email to Coach Preservice Early Childhood Teachers

    Science.gov (United States)

    Barton, Erin E.; Fuller, Elizabeth A.; Schnitz, Alana

    2016-01-01

    The purpose of this study was to examine the impact of performance feedback on preservice teachers' use of recommended practices within inclusive early childhood classrooms. A multiple baseline design across behaviors was used to examine the relation between performance feedback delivered via email and practicum students' use of target-recommended…

  16. Enhancing Distant Learning through Email Communication: A Case of BOU

    Science.gov (United States)

    Rahman, K. M. Rezanur; Anwar, Sadat; Numan, Sharker Md.

    2008-01-01

    Today computer has replaced all means of traditional communication significantly. Many distant learning tools claim to be interactive, but few can offer two-way communication. Email is the most popular means of communication medium now-a-days. Therefore, it may be used as an educational tool for learning. In present socioeconomic condition of…

  17. Hesitative introduction of E-mail consultations in general practice.

    NARCIS (Netherlands)

    Verheij, R.; Ton, C.; Tates, K.

    2008-01-01

    Introduction: The Dutch Council for Public Health and Health Care reported in 2005 that 70% of internet users would want to have the opportunity to consult their own general practitioner by e-mail [1]. Since January 1, 2006, general practitioners in the Netherlands are reimbursed 4.50 euro for

  18. Combined influence of Bt rice and rice dwarf virus on biological parameters of a non-target herbivore, Nephotettix cincticeps (Uhler) (Hemiptera: Cicadellidae)

    Science.gov (United States)

    The advent of genetically modified (GM) Bt rice creates the possibility of interactions among Bt crops, crop pathogens and non-target herbivores. In particular, information on how pathogen-infected Bt-expressing plants will influence non-target herbivores is necessary to predict the sustainability o...

  19. The Educational Impact of E-Mail: Extraverted versus Introverted Students.

    Science.gov (United States)

    Kunderewicz, Larisa; Michener, Stacey; Chambliss, Catherine

    College students (N=151) completed surveys assessing the relationship between e-mail use and extraversion. The variables studied included time spent on e-mail; the frequency of e-mail usage; and the purposes e-mail served for each student. The results suggest that extraverts use e-mail as a form of procrastination more than introverts, and that…

  20. Toxicological Evaluation of a New Lepidopteran Insecticide, Flubendiamide, in Non-Target Drosophila melanogaster Meigen (Diptera: Drosophilidae

    Directory of Open Access Journals (Sweden)

    Saurabh Sarkar

    2018-04-01

    Full Text Available Background: Flubendiamide, comparatively a new pesticide designed to eradicate lepidopteran insect pests is known to have low risk to birds, mammals, fish, algae, honey bees, non-target arthropods, earthworms, soil macro- and micro-organisms, non-target plants as well as sewage treatment organisms; however, the risk assessment for aquatic invertebrates from metabolite could not be finalized with available data. Methods: Different concentrations of flubendiamide (TATA TAKUMI®, Rallis, India were introduced to larvae, pupae, and adult flies. A wide range of comparatively higher concentrations was selected for acute LC50 than chronic LC50 due to their exposure duration. Furthermore, relatively lower concentrations were introduced to larvae for assessment of emergence. Results: At chronic exposure, the effect-concentration relationship exhibited a linear response when adult emergence was considered in Drosophila melanogaster. When acute LC50 of flubendiamide in 3rd instar larvae was compared with the chronic LC50 then it was seen to be approximately 21 fold higher whereas chronic LC50 for adult flies was nearly 19 times less than the adult acute LC50. Similarly, adult emergence was seen to lower by 91.95% at 1500 µg/mL concentration. The chronic LC50 of the flubendiamide in Drosophila was approximately 170303 times more than the reported No Observed Effect Concentration (NOEC. Conclusion: Hence, the chemical, flubendiamide can induce its effects at very low concentration, far below the lethal ones. Thus, the study is of relevance for the non-target insects as well as the insect dependent organisms.

  1. The Presence of Algae Mitigates the Toxicity of Copper-Based Algaecides to a Non-Target Organism.

    Science.gov (United States)

    Bishop, West M; Willis, Ben E; Richardson, Robert J; Cope, W Gregory

    2018-05-07

    Copper-based algaecides are routinely applied to target noxious algal blooms in freshwaters. Standard toxicity testing data with copper suggest typical concentrations used to control algae can cause deleterious acute impacts to non-target organisms. These "clean" water experiments lack algae, which are specifically targeted in field applications of algaecides and contain competing ligands. This research measured the influence of algae on algaecide exposure and subsequent response of the non-target species Daphnia magna to copper sulfate and an ethanolamine-chelated copper algaecide (Captain®). Significant shifts (Palgae were present in exposures along with a copper salt or chelated copper formulation. Copper sulfate 48-h LC50 values shifted from 75.3 to 317.8 and 517.8 µg Cu/L whereas Captain increased from 353.8 to 414.2 and 588.5 µg Cu/L in no algae, 5 × 10 5 and 5 × 10 6 cells/mL algae treatments, respectively. Larger shifts were measured with copper sulfate exposures, although Captain was less toxic to Daphnia magna in all corresponding treatments. Captain was more effective at controlling Scenedesmus dimorphus at most concentrations, and control was inversely proportional to toxicity to D. magna. Overall, incorporating target competing ligands (i.e., algae) into standard toxicity testing is important for accurate risk assessment, and copper formulation can significantly alter algaecidal efficacy and risks to non-target organisms. This article is protected by copyright. All rights reserved. This article is protected by copyright. All rights reserved.

  2. The intensity of non-target site mechanisms influences the level of resistance of sourgrass to glyphosate

    Directory of Open Access Journals (Sweden)

    Flávia Regina da Costa

    2014-02-01

    Full Text Available Non-target site mechanisms are involved in the resistance of sourgrass (Digitaria insularis to glyphosate. Studies on the 14C-glyphosate absorption and translocation as well as the detection of glyphosate and its metabolites in sourgrass plants were carried out under controlled conditions to investigate if the differential response of resistant sourgrass biotypes (R1 and R2 is derived from the intensity of non-target site mechanisms involved in the resistance to glyphosate. Different pattern of absorption was observed between S (susceptible and R2 from 12 up to 48 hours after treatment with glyphosate (HAT, and between S and R1 just at 12 HAT. The initial difference in glyphosate absorption among the biotypes did not maintained at 96 HAT and afterwards. Smaller amount of herbicide left the treated leaf into the rest of shoot and roots in R2 (25% than in S (58% and R1 (52%. In addition, slight difference in glyphosate translocation was observed between S and R1. We found high percentage (81% of glyphosate in the S biotype up to 168 HAT, while just 44% and 2% of glyphosate was recovered from R1 and R2 plant tissues. In addition, high percentage of glyphosate metabolites was found in R2 (98% and R1 (56% biotypes, while a very low percentage (11% was found in the S biotype. As previous studies indicated resistant factors of 3.5 and 5.6 for R1 and R2, respectively, we conclude that the differential response of sourgrass biotypes is derived from the intensity of the non-target site mechanisms involved in the resistance to glyphosate.

  3. A new approach to data evaluation in the non-target screening of organic trace substances in water analysis.

    Science.gov (United States)

    Müller, Alexander; Schulz, Wolfgang; Ruck, Wolfgang K L; Weber, Walter H

    2011-11-01

    Non-target screening via high performance liquid chromatography-mass spectrometry (HPLC-MS) has gained increasingly in importance for monitoring organic trace substances in water resources targeted for the production of drinking water. In this article a new approach for evaluating the data from non-target HPLC-MS screening in water is introduced and its advantages are demonstrated using the supply of drinking water as an example. The crucial difference between this and other approaches is the comparison of samples based on compounds (features) determined by their full scan data. In so doing, we take advantage of the temporal, spatial, or process-based relationships among the samples by applying the set operators, UNION, INTERSECT, and COMPLEMENT to the features of each sample. This approach regards all compounds, detectable by the used analytical method. That is the fundamental meaning of non-target screening, which includes all analytical information from the applied technique for further data evaluation. In the given example, in just one step, all detected features (1729) of a landfill leachate sample could be examined for their relevant influences on water purification respectively drinking water. This study shows that 1721 out of 1729 features were not relevant for the water purification. Only eight features could be determined in the untreated water and three of them were found in the final drinking water after ozonation. In so doing, it was possible to identify 1-adamantylamine as contamination of the landfill in the drinking water at a concentration in the range of 20 ng L(-1). To support the identification of relevant compounds and their transformation products, the DAIOS database (Database-Assisted Identification of Organic Substances) was used. This database concept includes some functions such as product ion search to increase the efficiency of the database query after the screening. To identify related transformation products the database function

  4. The cultivation of Bt corn producing Cry1Ac toxins does not adversely affect non-target arthropods.

    Directory of Open Access Journals (Sweden)

    Yanyan Guo

    Full Text Available Transgenic corn producing Cry1Ac toxins from Bacillus thuringiensis (Bt provides effective control of Asian corn borer, Ostrinia furnacalis (Guenée, and thus reduces insecticide applications. However, whether Bt corn exerts undesirable effects on non-target arthropods (NTAs is still controversial. We conducted a 2-yr study in Shangzhuang Agricultural Experiment Station to assess the potential impact of Bt corn on field population density, biodiversity, community composition and structure of NTAs. On each sampling date, the total abundance, Shannon's diversity index, Pielou's evenness index and Simpson's diversity index were not significantly affected by Bt corn as compared to non-Bt corn. The "sampling dates" had a significant effect on these indices, but no clear tendencies related to "Bt corn" or "sampling dates X corn variety" interaction were recorded. Principal response curve analysis of variance indicated that Bt corn did not alter the distribution of NTAs communities. Bray-Curtis dissimilarity and distance analysis showed that Cry1Ac toxin exposure did not increase community dissimilarities between Bt and non-Bt corn plots and that the evolution of non-target arthropod community was similar on the two corn varieties. The cultivation of Bt corn failed to show any detrimental evidence on the density of non-target herbivores, predators and parasitoids. The composition of herbivores, predators and parasitoids was identical in Bt and non-Bt corn plots. Taken together, results from the present work support that Bt corn producing Cry1Ac toxins does not adversely affect NTAs.

  5. The impact of a conditional cash transfer program on the utilization of non-targeted services: Evidence from Afghanistan.

    Science.gov (United States)

    Witvorapong, Nopphol; Foshanji, Abo Ismael

    2016-03-01

    While existing research suggests that health-related conditional cash transfer (CCT) programs have positive impacts on the utilization of CCT-targeted health services, little is known as to whether they also influence the utilization of non-targeted health services-defined as general health services for which program participants are not financially motivated. Based on a sample of 6649 households in a CCT program that took place in May 2009-June 2011 in Afghanistan, we evaluate the impact of the receipt of CCTs on the utilization of non-targeted health services both by women, who were direct beneficiaries of the program, and by members of their households. We estimate the outcomes of interest through four probit models, accounting for potential endogeneity of the CCT receipt and dealing with lack of credible exclusion restrictions in different ways. In comparison with the control group, the receipt of CCTs is found to be associated with an increase in the probability of utilizing non-targeted services among household members across regression models. The results are mixed, with regard to the utilization by women, suggesting that there exist non-economic barriers to health care, unique to women, that are not captured by the data. The results confirm the importance of accounting for direct as well as indirect effects in policy evaluation and suggest that future studies investigate more deeply the role of community health workers in removing non-economic barriers for Afghan women and the possibility of introducing an incentive structure to motivate them to contribute more actively to population health in Afghanistan. Copyright © 2016 Elsevier Ltd. All rights reserved.

  6. The tick biocontrol agent Metarhizium brunneum (= M. anisopliae) (strain F52) does not reduce non-target arthropods.

    Science.gov (United States)

    Fischhoff, Ilya R; Keesing, Felicia; Ostfeld, Richard S

    2017-01-01

    Previous studies have found that Met52®, which contains the entomopathogenic fungus Metarhizium brunneum, is effective in reducing the abundance of Ixodes scapularis, the tick vector for the bacterium causing Lyme disease and for other tick-borne pathogens. Given widespread interest in effective, safe methods for controlling ticks, Met52 has the potential to be used at increasing scales. The non-target impacts of Met52, as applied for tick control, have not yet been assessed. A Before-After-Control-Impact experiment was conducted to assess the effects of Met52 on non-target arthropods in lawn and forest habitats typical of residential yards. Ground-dwelling arthropods were collected using bulk sampling of soil and litter, and pitfall sampling. Arthropods were sampled once before and twice after treatment of plots with either Met52 or water (control). Multivariate general linear models were used to jointly model the abundance of arthropod orders. For each sampling method and post-spray sampling occasion, Akaike Information Criterion values were used to compare the fits of two alternative models: one that included effects of period (before vs. after spray), habitat (lawn vs. forest), and treatment (Met52 vs. control), versus a nested null model that included effects of period, and habitat, but no treatment effect. The null model was consistently better supported by the data. Significant effects were found of period and habitat but not treatment. Retrospective power analysis indicated the study had 80% power to detect a 50% reduction in arthropod abundance, as measured by bulk samples taken before versus one week after treatment. The deployment of Met52 in suburban settings is unlikely to cause meaningful reductions in the abundance of non-target arthropods.

  7. The tick biocontrol agent Metarhizium brunneum (= M. anisopliae (strain F52 does not reduce non-target arthropods.

    Directory of Open Access Journals (Sweden)

    Ilya R Fischhoff

    Full Text Available Previous studies have found that Met52®, which contains the entomopathogenic fungus Metarhizium brunneum, is effective in reducing the abundance of Ixodes scapularis, the tick vector for the bacterium causing Lyme disease and for other tick-borne pathogens. Given widespread interest in effective, safe methods for controlling ticks, Met52 has the potential to be used at increasing scales. The non-target impacts of Met52, as applied for tick control, have not yet been assessed. A Before-After-Control-Impact experiment was conducted to assess the effects of Met52 on non-target arthropods in lawn and forest habitats typical of residential yards. Ground-dwelling arthropods were collected using bulk sampling of soil and litter, and pitfall sampling. Arthropods were sampled once before and twice after treatment of plots with either Met52 or water (control. Multivariate general linear models were used to jointly model the abundance of arthropod orders. For each sampling method and post-spray sampling occasion, Akaike Information Criterion values were used to compare the fits of two alternative models: one that included effects of period (before vs. after spray, habitat (lawn vs. forest, and treatment (Met52 vs. control, versus a nested null model that included effects of period, and habitat, but no treatment effect. The null model was consistently better supported by the data. Significant effects were found of period and habitat but not treatment. Retrospective power analysis indicated the study had 80% power to detect a 50% reduction in arthropod abundance, as measured by bulk samples taken before versus one week after treatment. The deployment of Met52 in suburban settings is unlikely to cause meaningful reductions in the abundance of non-target arthropods.

  8. Compatibility of organic farming treatments against Monosteira unicostata with non-target arthropod fauna of almond trees canopy

    Directory of Open Access Journals (Sweden)

    Ismael Sánchez-Ramos

    2017-07-01

    Full Text Available Field trials had shown that 1-2 applications of kaolin and potassium salts of fatty acids combined with thyme essential oil (PSTEO reduced the abundance of the lace bug Monosteira unicostata (Mulsant & Rey (Hemiptera: Tingidae, an important pest of almond trees in the Mediterranean region. These products could be useful for the control of this pest in organic production of almonds, but higher number of applications could be necessary. However, the possible detrimental effects on the almond orchard ecosystem should be evaluated. In the present work, the effects observed on the non-target arthropod fauna of the almond trees canopy in those field assays are shown. First, a comprehensive report of the non-target arthropod fauna of the almond tree is provided. Regarding natural enemies, most of the predatory arthropods captured were spiders belonging to different families like Salticidae, Thomisidae, Philodromidae, Theridiidae, Araneidae or Oxyopidae. Other predatory families that appeared in significant numbers were Chrysopidae, Anthocoridae, Aeolothripidae, Coccinellidae, Phytoseiidae, Erythraeidae or Forficulidae. Among parasitoids, the most abundant families were Eulophidae, Scelionidae and Dryinidae. Kaolin reduced the abundance of natural enemies and other non-target arthropods as well as their diversity and number of species. On the contrary, PSTEO only produced a slight reduction in the number of natural enemies, whereas no effect was found on the diversity and species richness. These effects were observed despite the reduced number of applications, so greater effect is expected if its frequency is increased in order to achieve an efficient control of M. unicostata.

  9. Non-targeted Colonization by the Endomycorrhizal Fungus, Serendipita vermifera, in Three Weeds Typically Co-occurring with Switchgrass

    Directory of Open Access Journals (Sweden)

    Prasun Ray

    2018-01-01

    Full Text Available Serendipita vermifera (=Sebacina vermifera; isolate MAFF305830 is a mycorrhizal fungus originally isolated from the roots of an Australian orchid that we have previously shown to be beneficial in enhancing biomass yield and drought tolerance in switchgrass, an important bioenergy crop for cellulosic ethanol production in the United States. However, almost nothing is known about how this root-associated fungus proliferates and grows through the soil matrix. Such information is critical to evaluate the possibility of non-target effects, such as unintended spread to weedy plants growing near a colonized switchgrass plant in a field environment. A microcosm experiment was conducted to study movement of vegetative mycelia of S. vermifera between intentionally inoculated switchgrass (Panicum virgatum L. and nearby weeds. We constructed size-exclusion microcosms to test three different common weeds, large crabgrass (Digitaria sanguinalis L., Texas panicum (Panicum texanum L., and Broadleaf signalgrass (Brachiaria platyphylla L., all species that typically co-occur in Southern Oklahoma and potentially compete with switchgrass. We report that such colonization of non-target plants by S. vermifera can indeed occur, seemingly via co-mingled root systems. As a consequence of colonization, significant enhancement of growth was noted in signalgrass, while a mild increase (albeit not significant was evident in crabgrass. Migration of the fungus seems unlikely in root-free bulk soil, as we failed to see transmission when the roots were kept separate. This research is the first documentation of non-targeted colonization of this unique root symbiotic fungus and highlights the need for such assessments prior to deployment of biological organisms in the field.

  10. Statistics-based email communication security behavior recognition

    Science.gov (United States)

    Yi, Junkai; Su, Yueyang; Zhao, Xianghui

    2017-08-01

    With the development of information technology, e-mail has become a popular communication medium. It has great significant to determine the relationship between the two sides of the communication. Firstly, this paper analysed and processed the content and attachment of e-mail using the skill of steganalysis and malware analysis. And it also conducts the following feature extracting and behaviour model establishing which based on Naive Bayesian theory. Then a behaviour analysis method was employed to calculate and evaluate the communication security. Finally, some experiments about the accuracy of the behavioural relationship of communication identifying has been carried out. The result shows that this method has a great effects and correctness as eighty-four percent.

  11. BEBAN JARINGAN SAAT MENGAKSES EMAIL DARI BEBERAPA MAIL SERVER

    Directory of Open Access Journals (Sweden)

    Husni Thamrin

    2017-01-01

    Full Text Available Expensive internet facilities require prudent in its use both as a source of information and communication media. This paper discusses observations of the perceived burden of network bandwidth when accessing some of the mail server using a webmail application. Mail server in question consists of three commercial server and 2 non-commercial server. Data when it download home page, while logged in, open the email, and during idle logout recorded with sniffer Wireshark. Observations in various situations and scenarios indicate that access Yahoo email gives the network load is very high while the SquirrelMail gives the network load is very low than 5 other mail servers. For an institution, use a local mail server (institutional is highly recommended in the context of banddwidth savings.

  12. The non-target bi-ovarian branches occlusion in fibroids embolization on resumption of menses and ovarian function

    International Nuclear Information System (INIS)

    Guo Wenbo; Yang Jianyong; Chen Wei; Zhuang Wenquan; Yao Shuzhong

    2005-01-01

    Objective: To evaluate the effect of the non-target bi-ovarian branches occlusion in fibroids embolization on resumption of menses and ovarian function. Methods: The patients with the non-target bi-ovarian branches occlusion in uterine fibroids embolization (UFE) were classified into two groups, one for lipiodol deposited in bi-ovarian areas (Group A) , another for non lipiodol deposited in ovarian areas or in single ovarian area (Group B of non lipiodol deposited in bi-ovarian areas). The statistical difference between the data of group A and group B were assessed with Fisher test. All UFE were performed with the mixture of lipiodol and pingyangmycin. The serum level of Follicle stimulating hormone (FSH), luteinizing hormone (LH) and estradiol (E2) were measured before UFE and 6 months after UFE. The statistical difference between the data of before and after UFE was assessed with t test. Results: Fifteen patients [age ranged 26-46 years, average (39.00 ± 5.62) years] had been followed up for an average (30.5±6.4) months (range 16-47 months). In 12 of 15, regular menses resumed after an average of (3.0 ±0.3) weeks (range 2-6 weeks). In 3 of 15 (20%), regular menses did not resume. The sexual hormone findings of menopause were found in three cases with amenorrhea after UFE. Amenorrhea was found in three cases with lipiodol deposited in bi-ovarian areas (Group A). Non-amenorrhea was found in the group of non-lipiodol deposited in bi-ovarian areas (Group B). There were significant statistical difference between Group A and Group B (P=0.002 19). Non amenorrhea was found in the patients aged over 45 years old. Three patients were found amenorrhea in the patients aged younger than 45 years old. There were no significant statistical difference between the serum level of FSH, LH and E2 before and 6 months after UFE (P>0.05). Conclusion: The incidence of amenorrhea is very high in the patients with lipiodol deposited in bi-ovarian areas when the bi-ovarian branches of

  13. Scientific Opinion addressing the state of the science on risk assessment of plant protection products for non-target arthropods

    DEFF Research Database (Denmark)

    EFSA PPR Panel (EFSA Panel on Plant Protection Products and their Residues); Topping, Christopher John

    2015-01-01

    scheme is reviewed, taking into consideration recent workshops and progress in science. Proposals are made for specific protection goals which aim to protect important ecosystem services such as food web support, pest control and biodiversity. In order to address recovery and source–sink population...... dynamics, conducting a landscape-level risk assessment is suggested. A new risk assessment scheme is suggested which integrates modelling approaches. The main exposure routes for non-target arthropods are identified and proposals are made on how to integrate them in the risk assessment. The appropriateness...

  14. Non-targeted detection of chemical contamination in carbonated soft drinks using NMR spectroscopy, variable selection and chemometrics

    Energy Technology Data Exchange (ETDEWEB)

    Charlton, Adrian J. [Department for Environment, Food and Rural Affairs, Central Science Laboratory, Sand Hutton, York YO41 1LZ (United Kingdom)], E-mail: adrian.charlton@csl.gov.uk; Robb, Paul; Donarski, James A.; Godward, John [Department for Environment, Food and Rural Affairs, Central Science Laboratory, Sand Hutton, York YO41 1LZ (United Kingdom)

    2008-06-23

    An efficient method for detecting malicious and accidental contamination of foods has been developed using a combined {sup 1}H nuclear magnetic resonance (NMR) and chemometrics approach. The method has been demonstrated using a commercially available carbonated soft drink, as being capable of identifying atypical products and to identify contaminant resonances. Soft-independent modelling of class analogy (SIMCA) was used to compare {sup 1}H NMR profiles of genuine products (obtained from the manufacturer) against retail products spiked in the laboratory with impurities. The benefits of using feature selection for extracting contaminant NMR frequencies were also assessed. Using example impurities (paraquat, p-cresol and glyphosate) NMR spectra were analysed using multivariate methods resulting in detection limits of approximately 0.075, 0.2, and 0.06 mM for p-cresol, paraquat and glyphosate, respectively. These detection limits are shown to be approximately 100-fold lower than the minimum lethal dose for paraquat. The methodology presented here is used to assess the composition of complex matrices for the presence of contaminating molecules without a priori knowledge of the nature of potential contaminants. The ability to detect if a sample does not fit into the expected profile without recourse to multiple targeted analyses is a valuable tool for incident detection and forensic applications.

  15. Non-targeted detection of chemical contamination in carbonated soft drinks using NMR spectroscopy, variable selection and chemometrics

    International Nuclear Information System (INIS)

    Charlton, Adrian J.; Robb, Paul; Donarski, James A.; Godward, John

    2008-01-01

    An efficient method for detecting malicious and accidental contamination of foods has been developed using a combined 1 H nuclear magnetic resonance (NMR) and chemometrics approach. The method has been demonstrated using a commercially available carbonated soft drink, as being capable of identifying atypical products and to identify contaminant resonances. Soft-independent modelling of class analogy (SIMCA) was used to compare 1 H NMR profiles of genuine products (obtained from the manufacturer) against retail products spiked in the laboratory with impurities. The benefits of using feature selection for extracting contaminant NMR frequencies were also assessed. Using example impurities (paraquat, p-cresol and glyphosate) NMR spectra were analysed using multivariate methods resulting in detection limits of approximately 0.075, 0.2, and 0.06 mM for p-cresol, paraquat and glyphosate, respectively. These detection limits are shown to be approximately 100-fold lower than the minimum lethal dose for paraquat. The methodology presented here is used to assess the composition of complex matrices for the presence of contaminating molecules without a priori knowledge of the nature of potential contaminants. The ability to detect if a sample does not fit into the expected profile without recourse to multiple targeted analyses is a valuable tool for incident detection and forensic applications

  16. E-mail communication patterns and job burnout

    Science.gov (United States)

    2018-01-01

    A considerable body of research has documented the negative effects of job burnout on employees and their organizations, emphasizing the importance of the identification of early signs of the phenomenon for the purposes of prevention and intervention. However, such timely identification is difficult due to the time and cost of assessing the burnout levels of all employees in an organization using established scales. In this paper, we propose an innovative way to identify employees at risk of job burnout by analyzing their e-mail communication patterns. Building on the Job Demands–Resources model, we theorize about the relationship between e-mail communication patterns and levels of employee exhaustion and disengagement (two dimensions of burnout). We analyzed 52,190 e-mails exchanged between 57 employees of a medium sized R&D company over a five-month period. We then related these employees’ communication patterns to their levels of burnout, collected using an established scale (the OLBI–Oldenburg Burnout Inventory). Our results provide support for the overall proposition of the paper, that e-mail communications can be used to identify individuals at risk of job burnout. Our models explain up to 34% of the variance of burnout and up to 37% and 19% respectively of the variance of exhaustion and disengagement. They also successfully distinguish between employees with a higher risk of burnout and those with lower levels of risk (F1 score of 84% with recall of 100% and 73% precision). We discuss the implications of our results and present suggestions for future research. PMID:29518128

  17. Ombuds' corner: Code of Conduct and e-mails

    CERN Multimedia

    Vincent Vuillemin

    2011-01-01

    In this series, the Bulletin aims to explain the role of the Ombuds at CERN by presenting practical examples of misunderstandings that could have been resolved by the Ombuds if he had been contacted earlier. Please note that, in all the situations we present, the names are fictitious and used only to improve clarity.   Luke* holds a key position in the coordination of a large project. He is also a recognized expert in modeling complicated structures. Because of his expertise in the field, he receives a considerable number of e-mails every day which he has trouble responding to in addition to his responsibilities of management and development. Constantly interrupted, he tends to answer his emails quickly, sometimes even in an instinctive way, which leads to somewhat laconic messages. One day he receives an e-mail from Dave* challenging some of the decisions taken by the project’s management. Luke agrees with Dave’s remarks, which seem justified given his own expertise of the su...

  18. Classification of Phishing Email Using Random Forest Machine Learning Technique

    Directory of Open Access Journals (Sweden)

    Andronicus A. Akinyelu

    2014-01-01

    Full Text Available Phishing is one of the major challenges faced by the world of e-commerce today. Thanks to phishing attacks, billions of dollars have been lost by many companies and individuals. In 2012, an online report put the loss due to phishing attack at about $1.5 billion. This global impact of phishing attacks will continue to be on the increase and thus requires more efficient phishing detection techniques to curb the menace. This paper investigates and reports the use of random forest machine learning algorithm in classification of phishing attacks, with the major objective of developing an improved phishing email classifier with better prediction accuracy and fewer numbers of features. From a dataset consisting of 2000 phishing and ham emails, a set of prominent phishing email features (identified from the literature were extracted and used by the machine learning algorithm with a resulting classification accuracy of 99.7% and low false negative (FN and false positive (FP rates.

  19. Non-targeted and delayed effects of exposure to ionizing radiation: I. Radiation-induced genomic instability and bystander effects in vitro

    Science.gov (United States)

    Morgan, William F.

    2003-01-01

    A long-standing dogma in the radiation sciences is that energy from radiation must be deposited in the cell nucleus to elicit a biological effect. A number of non-targeted, delayed effects of ionizing radiation have been described that challenge this dogma and pose new challenges to evaluating potential hazards associated with radiation exposure. These effects include induced genomic instability and non-targeted bystander effects. The in vitro evidence for non-targeted effects in radiation biology will be reviewed, but the question as to how one extrapolates from these in vitro observations to the risk of radiation-induced adverse health effects such as cancer remains open.

  20. Assessing patient characteristics and radiation-induced non-targeted effects in vivo for high dose-rate (HDR) brachytherapy.

    Science.gov (United States)

    Pinho, Christine; Timotin, Emilia; Wong, Raimond; Sur, Ranjan K; Hayward, Joseph E; Farrell, Thomas J; Seymour, Colin; Mothersill, Carmel

    2015-01-01

    To test whether blood, urine, and tissue based colony-forming assays are a useful clinical detection tool for assessing fractionated treatment responses and non-targeted radiation effects in bystander cells. To assess patients' responses to radiation treatments, blood serum, urine, and an esophagus explant-based in vivo colony-forming assay were used from oesophageal carcinoma patients. These patients underwent three fractions of high dose rate (HDR) intraluminal brachytherapy (ILBT). Human keratinocyte reporters exposed to blood sera taken after the third fraction of brachytherapy had a significant increase in cloning efficiency compared to baseline samples (p fractions for the blood sera data only. Patient characteristics such as gender had no statistically significant effect (p > 0.05). Large variability was observed among the patients' tissue samples, these colony-forming assays showed no significant changes throughout fractionated brachytherapy (p > 0.05). Large inter-patient variability was found in the urine and tissue based assays, so these techniques were discontinued. However, the simple blood-based assay had much less variability. This technique may have future applications as a biological dosimeter to predict treatment outcome and assess non-targeted radiation effects.

  1. Quality of laboratory studies assessing effects of Bt-proteins on non-target organisms: minimal criteria for acceptability.

    Science.gov (United States)

    De Schrijver, Adinda; Devos, Yann; De Clercq, Patrick; Gathmann, Achim; Romeis, Jörg

    2016-08-01

    The potential risks that genetically modified plants may pose to non-target organisms and the ecosystem services they contribute to are assessed as part of pre-market risk assessments. This paper reviews the early tier studies testing the hypothesis whether exposure to plant-produced Cry34/35Ab1 proteins as a result of cultivation of maize 59122 is harmful to valued non-target organisms, in particular Arthropoda and Annelida. The available studies were assessed for their scientific quality by considering a set of criteria determining their relevance and reliability. As a case-study, this exercise revealed that when not all quality criteria are met, weighing the robustness of the study and its relevance for risk assessment is not obvious. Applying a worst-case expected environmental concentration of bioactive toxins equivalent to that present in the transgenic crop, confirming exposure of the test species to the test substance, and the use of a negative control were identified as minimum criteria to be met to guarantee sufficiently reliable data. This exercise stresses the importance of conducting studies meeting certain quality standards as this minimises the probability of erroneous or inconclusive results and increases confidence in the results and adds certainty to the conclusions drawn.

  2. Rapid response: email, immediacy, and medical humanitarianism in Aceh, Indonesia.

    Science.gov (United States)

    Grayman, Jesse Hession

    2014-11-01

    After more than 20 years of sporadic separatist insurgency, the Free Aceh Movement and the Indonesian government signed an internationally brokered peace agreement in August 2005, just eight months after the Indian Ocean tsunami devastated Aceh's coastal communities. This article presents a medical humanitarian case study based on ethnographic data I collected while working for a large aid agency in post-conflict Aceh from 2005 to 2007. In December 2005, the agency faced the first test of its medical and negotiation capacities to provide psychiatric care to a recently amnestied political prisoner whose erratic behavior upon returning home led to his re-arrest and detention at a district police station. I juxtapose two methodological approaches-an ethnographic content analysis of the agency's email archive and field-based participant-observation-to recount contrasting narrative versions of the event. I use this contrast to illustrate and critique the immediacy of the humanitarian imperative that characterizes the industry. Immediacy is explored as both an urgent moral impulse to assist in a crisis and a form of mediation that seemingly projects neutral and transparent transmission of content. I argue that the sense of immediacy afforded by email enacts and amplifies the humanitarian imperative at the cost of abstracting elite humanitarian actors out of local and moral context. As a result, the management and mediation of this psychiatric case by email produced a bureaucratic model of care that failed to account for complex conditions of chronic political and medical instability on the ground. Copyright © 2014 Elsevier Ltd. All rights reserved.

  3. 20180318 - Structure identification by Mass Spectrometry Non-Targeted Analysis using the US EPA’s CompTox Chemistry Dashboard (ACS Spring)

    Science.gov (United States)

    Identification of unknowns in mass spectrometry based non-targeted analyses (NTA) requires the integration of complementary pieces of data to arrive at a confident, consensus structure. Researchers use chemical reference databases, spectral matching, fragment prediction tools, r...

  4. Phishtest: Measuring the Impact of Email Headers on the Predictive Accuracy of Machine Learning Techniques

    Science.gov (United States)

    Tout, Hicham

    2013-01-01

    The majority of documented phishing attacks have been carried by email, yet few studies have measured the impact of email headers on the predictive accuracy of machine learning techniques in detecting email phishing attacks. Research has shown that the inclusion of a limited subset of email headers as features in training machine learning…

  5. Email Related Crimes%电子邮件犯罪

    Institute of Scientific and Technical Information of China (English)

    王小刚

    2006-01-01

    @@ Email has fast emerged as the world's most preferred form of communication. Billions of email messages traverse1 the globe daily. Like any other form of communication, email is also misused by criminal elements. The ease, speed and relative anonymity2 of email has made it a powerful tool for criminals.

  6. Measuring Future Worker Productivity via Business Email Message Creation: Implications for Education

    Science.gov (United States)

    Hagler, Barbara E.; Erthal, Margaret; Walzer, Dona; Anderson, Marcia A.

    2009-01-01

    Objective: This research was conducted to determine if relationships exist among college students' business email message productivity score and (a) email message quality score, (b) text keying method used to create email message, and (c) self-reported college English grade. Background: Email is increasingly the communication channel preferred for…

  7. Employees' Perceptions of Email Communication, Volume and Management Strategies in an Australian University

    Science.gov (United States)

    Pignata, Silvia; Lushington, Kurt; Sloan, Jeremy; Buchanan, Fiona

    2015-01-01

    Despite email playing a central role in university business, little is known about the strategies used by staff to manage email and the factors contributing to email overload. In a mixed method study undertaken in one Australian university comparing academic (n = 193) and professional (n = 278) staff, we found that while email volume was higher in…

  8. 36 CFR 1250.24 - Will you accept a FOIA request through email?

    Science.gov (United States)

    2010-07-01

    ... request through email? 1250.24 Section 1250.24 Parks, Forests, and Public Property NATIONAL ARCHIVES AND... Access Records Under FOIA § 1250.24 Will you accept a FOIA request through email? Yes, send email FOIA... of your email message that you are sending a FOIA request. The body of the message must contain all...

  9. 36 CFR 1250.76 - May I email my FOIA appeal?

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false May I email my FOIA appeal... email my FOIA appeal? Yes, you may submit a FOIA appeal via email to http://www.archives.gov/global_pages/inquire_form.html. You must put the words “FOIA Appeal” in the subject line of your email message...

  10. Effect of the entomopathogenic fungus Lecanicillium muscariumon the predatory mite Phytoseiulus persimilis as a non-target organism.

    Science.gov (United States)

    Donka, András; Sermann, Helga; Büttner, Carmen

    2008-01-01

    In biological control, different benefit organisms have to combine for an effective management. If entomopathogenic fungi will be integrated, than it has to be considered also the effect on non-target organisms Like beneficial arthropods. Because of the high importance of predatory mite Phytoseiulus persimilis in biological control it was to determine side effects of Leconicillium muscarium on this species. In two standardised biotests in petri dish and on plants (P. vulgaris) individuals were dipped in suspension or set down on leafs after spraying with L. muscarium at different spore density. Results indicate pathogenicity for the predatory mite in principle. But the dimension of infection risk decrease, all the more conditions approach to practical sequence. Under practical conditions on plants and in practical relevant concentration of 10(6) and 10(7) sp./ml no risk is to expect on the plant.

  11. Targeted and non-targeted drug screening in whole blood by UHPLC-TOF-MS with data-independent acquisition

    DEFF Research Database (Denmark)

    Mollerup, Christian Brinch; Dalsgaard, Petur Weihe; Mardal, Marie

    2017-01-01

    of peaks to inspect by three orders of magnitude, down to four peaks per DUID sample. The screening allowed for tentative identification of metabolites and drugs not included in the initial screening, and three drugs and thirteen metabolites were tentatively identified in the authentic DUID samples......High-resolution mass spectrometry (HRMS) is widely used for the drug screening of biological samples in clinical and forensic laboratories. With the continuous addition of new psychoactive substances (NPS), keeping such methods updated is challenging. HRMS allows for combined targeted and non......-targeted screening; first, peaks are identified by software algorithms, and identifications are based on reference standard data. Remaining unknown peaks are attempted identified with in silico and literature data. However, several thousand peaks remain where most are unidentifiable or uninteresting in drug...

  12. Effect of an insecticide on growth and metabolism of some non-target soil micro-organisms

    International Nuclear Information System (INIS)

    Balasubramanian, A.; Nilakantan, Gita

    1975-01-01

    Aldicarb, a systemic insecticide, enhanced the growth of Rhizobium japonicum in vitro at 1 ppm concentration but inhibited it at 5 ppm level. The cell yields of Azotobacter chroococcum and Pseudomonas solanacearum were reduced by both the concentrations of the chemical. 1 and 5 ppm levels of the insecticide the incorporation of 14 C-glucose by R. japonicum, but it was stimulated in the case of R. chroococcum. In the case of P. solanacearum, however, 1 ppm level of the insecticide enhanced the incorporation of the label. Uptake of 32 P-di-potassium hydrogen phosphate by the cells was also significantly reduced indicating that the metabolic activities of these non-target soil micro-organisms are altered by the insecticide treatment. (author)

  13. A Review on the Toxicity and Non-Target Effects of Macrocyclic Lactones in Terrestrial and Aquatic Environments

    Science.gov (United States)

    Lumaret, Jean-Pierre; Errouissi, Faiek; Floate, Kevin; Römbke, Jörg; Wardhaugh, Keith

    2012-01-01

    The avermectins, milbemycins and spinosyns are collectively referred to as macrocyclic lactones (MLs) which comprise several classes of chemicals derived from cultures of soil micro-organisms. These compounds are extensively and increasingly used in veterinary medicine and agriculture. Due to their potential effects on non-target organisms, large amounts of information on their impact in the environment has been compiled in recent years, mainly caused by legal requirements related to their marketing authorization or registration. The main objective of this paper is to critically review the present knowledge about the acute and chronic ecotoxicological effects of MLs on organisms, mainly invertebrates, in the terrestrial and aquatic environment. Detailed information is presented on the mode-of-action as well as the ecotoxicity of the most important compounds representing the three groups of MLs. This information, based on more than 360 references, is mainly provided in nine tables, presenting the effects of abamectin, ivermectin, eprinomectin, doramectin, emamectin, moxidectin, and spinosad on individual species of terrestrial and aquatic invertebrates as well as plants and algae. Since dung dwelling organisms are particularly important non-targets, as they are exposed via dung from treated animals over their whole life-cycle, the information on the effects of MLs on dung communities is compiled in an additional table. The results of this review clearly demonstrate that regarding environmental impacts many macrocyclic lactones are substances of high concern particularly with larval instars of invertebrates. Recent studies have also shown that susceptibility varies with life cycle stage and impacts can be mitigated by using MLs when these stages are not present. However information on the environmental impact of the MLs is scattered across a wide range of specialised scientific journals with research focusing mainly on ivermectin and to a lesser extent on abamectin

  14. Fabrication of nano-mosquitocides using chitosan from crab shells: Impact on non-target organisms in the aquatic environment.

    Science.gov (United States)

    Murugan, Kadarkarai; Anitha, Jaganathan; Dinesh, Devakumar; Suresh, Udaiyan; Rajaganesh, Rajapandian; Chandramohan, Balamurugan; Subramaniam, Jayapal; Paulpandi, Manickam; Vadivalagan, Chitravel; Amuthavalli, Pandiyan; Wang, Lan; Hwang, Jiang-Shiou; Wei, Hui; Alsalhi, Mohamad Saleh; Devanesan, Sandhanasamy; Kumar, Suresh; Pugazhendy, Kannaiyan; Higuchi, Akon; Nicoletti, Marcello; Benelli, Giovanni

    2016-10-01

    Mosquitoes are arthropods of huge medical and veterinary relevance, since they vector pathogens and parasites of public health importance, including malaria, dengue and Zika virus. Currently, nanotechnology is considered a potential eco-friendly approach in mosquito control research. We proposed a novel method of biofabrication of silver nanoparticles (AgNP) using chitosan (Ch) from crab shells. Ch-AgNP nanocomposite was characterized by UV-vis spectroscopy, FTIR, SEM, EDX and XRD. Ch-AgNP were tested against larvae and pupae of the malaria vector Anopheles stephensi obtaining LC50 ranging from 3.18 ppm (I) to 6.54 ppm (pupae). The antibacterial properties of Ch-AgNP were proved against Bacillus subtilis, Klebsiella pneumoniae and Salmonella typhi, while no growth inhibition was reported in assays conducted on Proteus vulgaris. Concerning non-target effects, in standard laboratory considtions the predation efficiency of Danio rerio zebrafishes was 68.8% and 61.6% against I and II instar larvae of A. stephensi, respectively. In a Ch-AgNP-contaminated environment, fish predation was boosted to 89.5% and 77.3%, respectively. Quantitative analysis of antioxidant enzymes SOD, CAT and LPO from hepatopancreas of fresh water crabs Paratelphusa hydrodromous exposed for 16 days to a Ch-AgNP-contaminated aquatic environment were conducted. Notably, deleterious effects of Ch-AgNP contaminating aquatic enviroment on the non-target crab P. hydrodromous were observed, particularly when doses higher than 8-10ppm are tested. Overall, this research highlights the potential of Ch-AGNP for the development of newer control tools against young instar populations of malaria mosquitoes, also highlighting some risks concerned the employ of nanoparticles in aquatic environments. Copyright © 2016 Elsevier Inc. All rights reserved.

  15. Efficacy and Ecotoxicity of Novel Anti-Fouling Nanomaterials in Target and Non-Target Marine Species.

    Science.gov (United States)

    Avelelas, Francisco; Martins, Roberto; Oliveira, Tânia; Maia, Frederico; Malheiro, Eliana; Soares, Amadeu M V M; Loureiro, Susana; Tedim, João

    2017-04-01

    Biofouling is a global problem that affects virtually all the immersed structures. Currently, several novel environmentally friendly approaches are being tested worldwide to decrease the toxicity of biocides in non-fouling species, such as the encapsulation/immobilization of commercially available biocides, in order to achieve control over the leaching rate. The present study addresses the toxicity of two widely used booster biocides, zinc pyrithione (ZnPT) and copper pyrithione (CuPT), in its free and incorporated forms in order to assess their toxicity and anti-fouling efficacy in target and non-target species. To achieve this goal, the following marine organisms were tested; the green microalgae Tetraselmis chuii (non-target species) and both target species, the diatom Phaeodactylum tricornutum and the mussel Mytilus edulis. Organisms were exposed to both biocides, two unloaded nanostructured materials and nanomaterials loaded with biocides, from 10 μg/L to 100 mg/L total weight, following standard protocols. The most eco-friendly and simultaneously efficient anti-fouling solution against the two photosynthetic species (nanoclays loaded with ZnPT) was then tested on mussels to assess its lethal efficacy (LC 50  = 123 μg/L) and compared with free biocide (LC 50  = 211 μg/L) and unloaded material (LC 50  > 1000 μg/L). A second exposure test with sub-lethal concentrations (lower than 100 μg/L), using mussels, was carried out to assess biochemical changes caused by the tested compounds. Oxidative stress, detoxification and neurotransmission markers were not responsive; however, different antioxidant patterns were found with free ZnPT and loaded nanoclay exposures. Thus, the immobilization of the biocide ZnPT into nanoclays proved to be a promising efficient and eco-friendly anti-fouling strategy.

  16. Striking Plasticity of CRISPR-Cas9 and Key Role of Non-target DNA, as Revealed by Molecular Simulations.

    Science.gov (United States)

    Palermo, Giulia; Miao, Yinglong; Walker, Ross C; Jinek, Martin; McCammon, J Andrew

    2016-10-26

    The CRISPR (clustered regularly interspaced short palindromic repeats)-Cas9 system recently emerged as a transformative genome-editing technology that is innovating basic bioscience and applied medicine and biotechnology. The endonuclease Cas9 associates with a guide RNA to match and cleave complementary sequences in double stranded DNA, forming an RNA:DNA hybrid and a displaced non-target DNA strand. Although extensive structural studies are ongoing, the conformational dynamics of Cas9 and its interplay with the nucleic acids during association and DNA cleavage are largely unclear. Here, by employing multi-microsecond time scale molecular dynamics, we reveal the conformational plasticity of Cas9 and identify key determinants that allow its large-scale conformational changes during nucleic acid binding and processing. We show how the "closure" of the protein, which accompanies nucleic acid binding, fundamentally relies on highly coupled and specific motions of the protein domains, collectively initiating the prominent conformational changes needed for nucleic acid association. We further reveal a key role of the non-target DNA during the process of activation of the nuclease HNH domain, showing how the nontarget DNA positioning triggers local conformational changes that favor the formation of a catalytically competent Cas9. Finally, a remarkable conformational plasticity is identified as an intrinsic property of the HNH domain, constituting a necessary element that allows for the HNH repositioning. These novel findings constitute a reference for future experimental studies aimed at a full characterization of the dynamic features of the CRISPR-Cas9 system, and-more importantly-call for novel structure engineering efforts that are of fundamental importance for the rational design of new genome-engineering applications.

  17. Mobile radiation monitoring of Delhi for the prevention of malicious acts during the Common Wealth Games (CWG-2010)

    International Nuclear Information System (INIS)

    Saindane, Shashank S.; Chatterjee, M.K.; Romal, Jis; Pradeepkumar, K.S.; Singh, B.R.

    2012-01-01

    Radioactive sources are widely used in industry, research, agriculture and medical applications. In spite of various measures adopted for ensuring the safety and security of these sources, similar to Mayapuri incident, many cases of lost, misplaced, stolen radioactive sources and inadvertent radiation exposure due to radiological emergencies are reported world over. In the aftermath of the attack on the World Trade Center 2001, malicious acts using radioactive material is considered as a threat for which prevention and preparedness for response are recommended by IAEA. Hence radiation monitoring of all related area prior to and during Major Public Events (MPEs) like Olympics, World cup football etc are implemented by many nations for prevention and preparedness to such radiological threats/emergencies. Department of Atomic Energy (DAE) through their Emergency Response Centres planned and executed detailed radiation monitoring programme for the Delhi Common Wealth Games (CWG 2010) which covered all CWG stadiums. Commonwealth village etc. In addition to DAE emergency response teams of 15 members in readiness, source recovery and shielding facilities, Portable Personnel Decontamination Unit (PPDU), Radiation monitors, Protective gears, Aerial Gamma Spectrometry System (AGSS for Aerial surveys) etc. were maintained at two DAE control rooms. This paper discusses the mobile radiation monitoring carried out on Delhi city roads with the help of various state-of-the-art monitoring systems to detect the presence or movement of any orphan sources. The mobile radiation monitoring was focused on main road networks connecting to stadiums, areas surrounding stadiums, airport and Games village. For this state-of-the-art systems like Portable Mobile Gamma Spectrometry System (PMGSS), Portable Radiation Scanner (PRS), Compact Radiation Monitoring System integrated with GPS, GSM based Radiation Monitoring System (GRaMS), Gammatracers, Selection and placement of different monitoring

  18. Nuclear medicine image and data interchange through e-mail

    Energy Technology Data Exchange (ETDEWEB)

    Lyra, M; Skouroliakou, K; Perris, A; Georgossopoulos, C; Pappas, D [Radiology Department, Athens University, Athens (Greece); Stefanides, C [Pediatric Hospital, Aglaia Kyriakou, Athens (Greece)

    1999-12-31

    Prosperity of easy interchange in every day practice of Nuclear Medicine found its application through the INTERNET media. We use a simple and safe way to interchange images and diagnostic information between the scintigraphic acquisition and processing location and the clinical department in order to improve patient`s health care and young doctor`s education. images and patient reports are transferred and saved through dedicated software to a workstation that transforms y-camera scintigraphic images in a PC readable format. Diagnosis reports and scintigraphic images are incorporated to a database directory in hypertext form. Usual WWW connection gives the possibility of patients` examinations transfer by email attachments as well as interchange of relative comments towards both directions. Cost effective solution has been achieved using standard hard- and soft-ware. Furthermore, both educational files can be downloaded from our department ftp location, by a unique password. (authors) 7 refs., 3 figs.

  19. E-mail security: mail clients must use encrypted protocols

    CERN Multimedia

    2006-01-01

    In the coming weeks, users of mail clients other than Outlook (e.g. Pine, Mozilla, Mac Mail, etc.) may receive an e-mail from Mail-service@cern.ch with instructions to update the security settings of their mail client. The aim of this campaign is to enforce the use of encrypted and authenticated mail protocols in order to prevent the propagation of viruses and protect passwords from theft. As a first step, from 6 June 2006 onwards, access to mail servers from outside CERN will require a securely configured mail client as described in the help page http://cern.ch/mmmservices/Help/?kbid=191040. On this page most users will also find tools that will update their mail client settings automatically. Note that Outlook clients and WebMail access are not affected. The Mail Team

  20. Nuclear medicine image and data interchange through e-mail

    International Nuclear Information System (INIS)

    Lyra, M.; Skouroliakou, K.; Perris, A.; Georgossopoulos, C.; Pappas, D.; Stefanides, C.

    1998-01-01

    Prosperity of easy interchange in every day practice of Nuclear Medicine found its application through the INTERNET media. We use a simple and safe way to interchange images and diagnostic information between the scintigraphic acquisition and processing location and the clinical department in order to improve patient's health care and young doctor's education. images and patient reports are transferred and saved through dedicated software to a workstation that transforms y-camera scintigraphic images in a PC readable format. Diagnosis reports and scintigraphic images are incorporated to a database directory in hypertext form. Usual WWW connection gives the possibility of patients' examinations transfer by email attachments as well as interchange of relative comments towards both directions. Cost effective solution has been achieved using standard hard- and soft-ware. Furthermore, both educational files can be downloaded from our department ftp location, by a unique password. (authors)

  1. E-Mail Server and Traffic Control Management in 2012

    Directory of Open Access Journals (Sweden)

    Cosmin Catalin Olteanu

    2012-12-01

    Full Text Available Emails represents one of the most used communication system in world wide web for more than 15 years and “spam” messages are one of the most annoying and disturbing phenomena. All of us are aware that online marketers are trying to transmit their advertising messages to as many addresses they can. For such “unwanted” messages, adaptive systems must be assembled to review and mark what is wright and what is bad. Always these systems must adapt to consumers preferences to mark only that messages that are not in his white list. Surveys for more than 3000000 messages showed me that some criteria can be defined by start.

  2. Advantages and Disadvantages of Educational Email Alerts for Family Physicians: Viewpoint

    Science.gov (United States)

    Badran, Hani; Grad, Roland

    2015-01-01

    Background Electronic knowledge resources constitute an important channel for accredited Continuing Medical Education (CME) activities. However, email usage for educational purposes is controversial. On the one hand, family physicians become aware of new information, confirm what they already know, and obtain reassurance by reading educational email alerts. Email alerts can also encourage physicians to search Web-based resources. On the other hand, technical difficulties and privacy issues are common obstacles. Objective The purpose of this discussion paper, informed by a literature review and a small qualitative study, was to understand family physicians’ knowledge, attitudes, and behavior in regard to email in general and educational emails in particular, and to explore the advantages and disadvantages of educational email alerts. In addition, we documented participants’ suggestions to improve email alert services for CME. Methods We conducted a qualitative descriptive study using the “Knowledge, Attitude, Behavior” model. We conducted semi-structured face-to-face interviews with 15 family physicians. We analyzed the collected data using inductive-deductive thematic qualitative data analysis. Results All 15 participants scanned and prioritized their email, and 13 of them checked their email daily. Participants mentioned (1) advantages of educational email alerts such as saving time, convenience and valid information, and (2) disadvantages such as an overwhelming number of emails and irrelevance. They offered suggestions to improve educational email. Conclusions The advantages of email alerts seem to compensate for their disadvantages. Suggestions proposed by family physicians can help to improve educational email alerts. PMID:25803184

  3. Advantages and disadvantages of educational email alerts for family physicians: viewpoint.

    Science.gov (United States)

    Badran, Hani; Pluye, Pierre; Grad, Roland

    2015-02-27

    Electronic knowledge resources constitute an important channel for accredited Continuing Medical Education (CME) activities. However, email usage for educational purposes is controversial. On the one hand, family physicians become aware of new information, confirm what they already know, and obtain reassurance by reading educational email alerts. Email alerts can also encourage physicians to search Web-based resources. On the other hand, technical difficulties and privacy issues are common obstacles. The purpose of this discussion paper, informed by a literature review and a small qualitative study, was to understand family physicians' knowledge, attitudes, and behavior in regard to email in general and educational emails in particular, and to explore the advantages and disadvantages of educational email alerts. In addition, we documented participants' suggestions to improve email alert services for CME. We conducted a qualitative descriptive study using the "Knowledge, Attitude, Behavior" model. We conducted semi-structured face-to-face interviews with 15 family physicians. We analyzed the collected data using inductive-deductive thematic qualitative data analysis. All 15 participants scanned and prioritized their email, and 13 of them checked their email daily. Participants mentioned (1) advantages of educational email alerts such as saving time, convenience and valid information, and (2) disadvantages such as an overwhelming number of emails and irrelevance. They offered suggestions to improve educational email. The advantages of email alerts seem to compensate for their disadvantages. Suggestions proposed by family physicians can help to improve educational email alerts.

  4. The relative efficacy of telephone and email reminders to elicit blood donation.

    Science.gov (United States)

    Germain, M; Godin, G

    2016-04-01

    The aim of the study was to test the relative efficacy of telephone and email reminders to trigger blood donation. A sample of 3454 donors was randomized to one of three conditions: phone only (n = 1176), email only (n = 1091) and phone + email (n = 1187). There was a higher proportion of donors who registered to give blood in the phone + email condition (18·45%) compared to the other two conditions (phone: 15·73%, P email: 13·20%; P email conditions did not differ significantly (P = 0·16), suggesting equivalent efficacy. © 2015 International Society of Blood Transfusion.

  5. PLS-based and regularization-based methods for the selection of relevant variables in non-targeted metabolomics data

    Directory of Open Access Journals (Sweden)

    Renata Bujak

    2016-07-01

    Full Text Available Non-targeted metabolomics constitutes a part of systems biology and aims to determine many metabolites in complex biological samples. Datasets obtained in non-targeted metabolomics studies are multivariate and high-dimensional due to the sensitivity of mass spectrometry-based detection methods as well as complexity of biological matrices. Proper selection of variables which contribute into group classification is a crucial step, especially in metabolomics studies which are focused on searching for disease biomarker candidates. In the present study, three different statistical approaches were tested using two metabolomics datasets (RH and PH study. Orthogonal projections to latent structures-discriminant analysis (OPLS-DA without and with multiple testing correction as well as least absolute shrinkage and selection operator (LASSO were tested and compared. For the RH study, OPLS-DA model built without multiple testing correction, selected 46 and 218 variables based on VIP criteria using Pareto and UV scaling, respectively. In the case of the PH study, 217 and 320 variables were selected based on VIP criteria using Pareto and UV scaling, respectively. In the RH study, OPLS-DA model built with multiple testing correction, selected 4 and 19 variables as statistically significant in terms of Pareto and UV scaling, respectively. For PH study, 14 and 18 variables were selected based on VIP criteria in terms of Pareto and UV scaling, respectively. Additionally, the concept and fundaments of the least absolute shrinkage and selection operator (LASSO with bootstrap procedure evaluating reproducibility of results, was demonstrated. In the RH and PH study, the LASSO selected 14 and 4 variables with reproducibility between 99.3% and 100%. However, apart from the popularity of PLS-DA and OPLS-DA methods in metabolomics, it should be highlighted that they do not control type I or type II error, but only arbitrarily establish a cut-off value for PLS-DA loadings

  6. Selection of focal earthworm species as non-target soil organisms for environmental risk assessment of genetically modified plants.

    Science.gov (United States)

    van Capelle, Christine; Schrader, Stefan; Arpaia, Salvatore

    2016-04-01

    By means of a literature survey, earthworm species of significant relevance for soil functions in different biogeographical regions of Europe (Atlantic, Boreal, Mediterranean) were identified. These focal earthworm species, defined here according to the EFSA Guidance Document on the environmental risk assessment (ERA) of genetically modified plants, are typical for arable soils under crop rotations with maize and/or potatoes within the three regions represented by Ireland, Sweden and Spain, respectively. Focal earthworm species were selected following a matrix of four steps: Identification of functional groups, categorization of non-target species, ranking species on ecological criteria, and final selection of focal species. They are recommended as appropriate non-target organisms to assess environmental risks of genetically modified (GM) crops; in this case maize and potatoes. In total, 44 literature sources on earthworms in arable cropping systems including maize or potato from Ireland, Sweden and Spain were collected, which present information on species diversity, individual density and specific relevance for soil functions. By means of condensed literature data, those species were identified which (i) play an important functional role in respective soil systems, (ii) are well adapted to the biogeographical regions, (iii) are expected to occur in high abundances under cultivation of maize or potato and (iv) fulfill the requirements for an ERA test system based on life-history traits. First, primary and secondary decomposers were identified as functional groups being exposed to the GM crops. In a second step, anecic and endogeic species were categorized as potential species. In step three, eight anecic and endogeic earthworm species belonging to the family Lumbricidae were ranked as relevant species: Aporrectodea caliginosa, Aporrectodea rosea, Aporrectodea longa, Allolobophora chlorotica, Lumbricus terrestris, Lumbricus friendi, Octodrilus complanatus and

  7. Structural and functional effects of herbicides on non-target organisms in aquatic ecosystems with an emphasis on atrazine

    Science.gov (United States)

    Fairchild, James; Kortekamp, Andreas

    2011-01-01

    for controlling nuisance aquatic vegetation. Although aquatic herbicide exposure has been widely documented, these exposures are not necessarily related to adverse non-target ecological effects on natural communities in aquatic environments. This chapter evaluates the potential for effects of herbicides on the structure and function of aquatic envrionments at the population, community, and ecosystem levels of biological organization. In this manuscript I examine several critical aspects of the subject matter area: primary herbicides in use and chemical modes of action; the regulatory process used for registration and risk assessment of herbicides; data regarding non-target risks and the relative sensitivity of aquatic plants, inveretebrates, and fish to herbicides; and emerging areas of science regarding the potential for endocrine-disrupting effects of herbicides on aquatic vertebrates. Much of the focus of this paper is on atrazine due to the extensive database which exists regarding its fate and effects. 

  8. Toxicity of Insecticides on Various Life Stages of Two Tortricid Pests of Cranberries and on a Non-Target Predator

    Directory of Open Access Journals (Sweden)

    Cesar Rodriguez-Saona

    2016-04-01

    Full Text Available Laboratory and extended laboratory bioassays were conducted to determine the residual toxicities of various insecticides against two key pests of cranberries, Sparganothis sulfureana and Choristoneura parallela (Lepidoptera: Tortricidae, and their non-target effects on the predatory Orius insidiosus (Hemiptera: Anthocoridae. The effects of nine insecticides with different modes of action on S. sulfureana and Ch. parallela eggs, larvae, and adults were tested in the laboratory, while the efficacy of a post-bloom application on larval mortality and mass of these pests and on adult O. insidiosus was evaluated in extended laboratory experiments. The organophosphate chlorpyrifos and the spinosyn spinetoram provided long-lasting (seven-day control against all stages of both pests. The growth regulator methoxyfenozide and the diamides chlorantraniliprole and cyantraniliprole had strong (1–7 days larvicidal, particularly on young larvae, and growth inhibitory activity, but only the diamides were adulticidal. Among neonicotinoids, acetamiprid had stronger ovicidal and adulticidal activity than thiamethoxam, showing within-insecticide class differences in toxicities; however, both were weak on larvae. Lethality of novaluron and indoxacarb was inconsistent, varying depending on species and stage. Chlorpyrifos was most toxic to O. insidiosus. These results show species- and stage-specific toxicities, and greater compatibility with biological control, of the newer reduced-risk classes of insecticides than older chemistries.

  9. Differentiating signals to make biological sense - A guide through databases for MS-based non-targeted metabolomics.

    Science.gov (United States)

    Gil de la Fuente, Alberto; Grace Armitage, Emily; Otero, Abraham; Barbas, Coral; Godzien, Joanna

    2017-09-01

    Metabolite identification is one of the most challenging steps in metabolomics studies and reflects one of the greatest bottlenecks in the entire workflow. The success of this step determines the success of the entire research, therefore the quality at which annotations are given requires special attention. A variety of tools and resources are available to aid metabolite identification or annotation, offering different and often complementary functionalities. In preparation for this article, almost 50 databases were reviewed, from which 17 were selected for discussion, chosen for their online ESI-MS functionality. The general characteristics and functions of each database is discussed in turn, considering the advantages and limitations of each along with recommendations for optimal use of each tool, as derived from experiences encountered at the Centre for Metabolomics and Bioanalysis (CEMBIO) in Madrid. These databases were evaluated considering their utility in non-targeted metabolomics, including aspects such as identifier assignment, structural assignment and interpretation of results. © 2017 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  10. Toxicity of Insecticides on Various Life Stages of Two Tortricid Pests of Cranberries and on a Non-Target Predator.

    Science.gov (United States)

    Rodriguez-Saona, Cesar; Wanumen, Andrea Carolina; Salamanca, Jordano; Holdcraft, Robert; Kyryczenko-Roth, Vera

    2016-04-15

    Laboratory and extended laboratory bioassays were conducted to determine the residual toxicities of various insecticides against two key pests of cranberries, Sparganothis sulfureana and Choristoneura parallela (Lepidoptera: Tortricidae), and their non-target effects on the predatory Orius insidiosus (Hemiptera: Anthocoridae). The effects of nine insecticides with different modes of action on S. sulfureana and Ch. parallela eggs, larvae, and adults were tested in the laboratory, while the efficacy of a post-bloom application on larval mortality and mass of these pests and on adult O. insidiosus was evaluated in extended laboratory experiments. The organophosphate chlorpyrifos and the spinosyn spinetoram provided long-lasting (seven-day) control against all stages of both pests. The growth regulator methoxyfenozide and the diamides chlorantraniliprole and cyantraniliprole had strong (1-7 days) larvicidal, particularly on young larvae, and growth inhibitory activity, but only the diamides were adulticidal. Among neonicotinoids, acetamiprid had stronger ovicidal and adulticidal activity than thiamethoxam, showing within-insecticide class differences in toxicities; however, both were weak on larvae. Lethality of novaluron and indoxacarb was inconsistent, varying depending on species and stage. Chlorpyrifos was most toxic to O. insidiosus. These results show species- and stage-specific toxicities, and greater compatibility with biological control, of the newer reduced-risk classes of insecticides than older chemistries.

  11. The beta-receptor blocker metoprolol alters detoxification processes in the non-target organism Dreissena polymorpha

    Energy Technology Data Exchange (ETDEWEB)

    Contardo-Jara, Valeska, E-mail: contardo@igb-berlin.d [Dpt. Ecophysiology and Aquaculture, Leibniz-Institute of Freshwater Ecology and Inland Fisheries, Mueggelseedamm 301, 12587 Berlin (Germany); Pflugmacher, Stephan, E-mail: pflugmacher@igb-berlin.d [Dpt. Ecophysiology and Aquaculture, Leibniz-Institute of Freshwater Ecology and Inland Fisheries, Mueggelseedamm 301, 12587 Berlin (Germany); Nuetzmann, Gunnar, E-mail: nuetzmann@igb-berlin.d [Dpt. Ecohydrology, Leibniz-Institute of Freshwater Ecology and Inland Fisheries, Mueggelseedamm 301, 12587 Berlin (Germany); Kloas, Werner, E-mail: werner.kloas@igb-berlin.d [Dpt. Ecophysiology and Aquaculture, Leibniz-Institute of Freshwater Ecology and Inland Fisheries, Mueggelseedamm 301, 12587 Berlin (Germany); Wiegand, Claudia, E-mail: wiegand@biology.sdu.d [University of Southern Denmark Institute of Biology, Campusvej 55, 5230 Odense M (Denmark)

    2010-06-15

    Due to increasing amounts of pharmaceutically active compounds (PhACs) in the aquatic environment, their largely unknown effects to non-target organisms need to be assessed. This study examined physiological changes in the freshwater mussel Dreissena polymorpha exposed to increasing concentrations (0.534, 5.34, 53.4 and 534 mug L{sup -1}) of the beta-blocker metoprolol in a flow-through system for seven days. The two lower concentrations represent the environmentally relevant range. Surprisingly, metallothionein mRNA was immediately up-regulated in all treatments. For the two higher concentrations mRNA up-regulation in gills was found for P-glycoprotein after one day, and after four days for pi class glutathione S-transferase, demonstrating elimination and biotransformation processes, respectively. Additionally, catalase and superoxide dismutase were up-regulated in the digestive gland indicating oxidative stress. In all treated mussels a significant up-regulation of heat shock protein mRNA was observed in gills after four days, which suggests protein damage and the requirement for repair processes. Metoprolol was 20-fold bioaccumulated for environmentally relevant concentrations. - Evidence for significant physiological changes in an aquatic mollusc due to exposure to a pharmaceutically active compound detected by real-time PCR.

  12. The alpha-particle irradiator set up at the ISS for radiobiological studies on targeted and non-targeted effects

    International Nuclear Information System (INIS)

    Esposito, G.; Antonelli, F.; Belli, M.; Campa, A.; Simone, G.; Sorrentino, E.; Tabocchini, M.A.

    2008-01-01

    In this paper we describe the alpha-particle irradiator that has been set up at the Istituto Superiore di Sanita (ISS) for controlled exposure of cultured mammalian cells. It can be equipped with two different sources, namely 2'4'4'Cm and 2'4'1'Am, allowing irradiation at different dose-rates (typically 1-100 mGy/min). The irradiator has dimensions small enough to be inserted into a standard cell culture incubator to perform irradiation of cultured cells in physiological conditions. The dose uniformity is such that the variations in the irradiation area are less than ± 12% of the average dose value on different irradiation areas up to ∼ 25 cm'2. Moreover, in the framework of the FP6 Euratom Integrated Project Non-targeted effects of ionizing radiation (NOTE), Petri dishes were realized for housing permeable membrane insert(s) to be used in co-culture experiments. Aluminium shields were also realized for half shield irradiation experiments. The alpha-particle irradiator of the ISS has been successfully used for studying DNA damage, namely double strand breaks (DSB, as measured by the γ-H2AX assay), in directly hit and in bystander primary human fibroblasts [it

  13. The effects of organochlorine pesticides on some non-target organisms in maize and cowpea agro-ecosystems in Ghana

    International Nuclear Information System (INIS)

    Montford, K.G.

    1997-01-01

    In order to study the effects of organochlorine pesticides on non-target organisms under tropical conditions, a three-year study was conducted in Ghana applying lindane at 1 kg AI. ha -1 and endosulfan at 0.75 kg AI. ha -1 to maize and cowpeas respectively. The endosulfan treatment was preceded by two consecutive treatments with cypermethrin at 50 g AI ha -1 . Lindane significantly reduced the numbers of ants, spiders and springtails trapped though the numbers of ants and spiders generally recovered within the cropping period. Lindane significantly increased the numbers of leafhoppers caught from maize plots probably due to the elimination of a natural enemy. Ant, spider and springtail numbers were also significantly reduced by the endosulfan treatment in cowpea plots 5. Lindane did not significantly increase maize yields in two of the three years. Endosulfan contributed to significant yield increases and reduced seed damage in cowpeas. Neither lindane nor endosulfan seemed to have any significant adverse effects on the activities of soil microfauna and microflora based on the rates of decomposition of leaf discs buried in the experimental plots. (author). 12 refs, 10 figs, 9 tabs

  14. Acute toxicity of chlorantraniliprole to non-target crayfish (Procambarus clarkii) associated with rice-crayfish cropping systems.

    Science.gov (United States)

    Barbee, Gary C; McClain, W Ray; Lanka, Srinivas K; Stout, Michael J

    2010-09-01

    Chlorantraniliprole, a novel anthranilic diamide insecticide, was recently introduced into the United States where rice-crayfish crop rotations are practiced to control rice water weevil (Lissorhoptrus oryzophilus Kuschel) infestations. Chlorantraniliprole has high margins of mammalian safety and excellent insecticidal efficacy, but its toxicity to non-target crayfish is uncertain. In this study, the acute toxicity of chlorantraniliprole to the red swamp crayfish Procambarus clarkii Girard was determined using aquatic and feeding assays. The aquatic 96 h median lethal toxicity (LC(50)) data indicate that technical-grade chlorantraniliprole is highly toxic (US EPA category) to crayfish with an LC(50) of 951 microg L(-1) (95% CL = 741-1118 microg L(-1)). A no observed effect concentration (NOEC) of 480 microg L(-1) was recorded. Neither the 36 day chronic feeding study, where crayfish fed on chlorantraniliprole-treated rice seed in aquaria, nor the 144 h acute feeding test, where crayfish fed on rice seeds treated with chlorantraniliprole, produced mortality or abnormal behavior. Chlorantraniliprole is three orders of magnitude less acutely toxic to P. clarkii than lambda-cyhalothrin and etofenprox, two pyrethroid insecticides also used in rice, and is less likely to cause acute crayfish toxicity in rice pond ecosystems. Based on acute toxicity data, the use of chlorantraniliprole should be more compatible with rice-crayfish crop rotations than pyrethroids. (c) 2010 Society of Chemical Industry.

  15. Death receptor pathways mediate targeted and non-targeted effects of ionizing radiations in breast cancer cells

    International Nuclear Information System (INIS)

    Luce, A.; Courtin, A.; Levalois, C.; Altmeyer-Morel, S.; Chevillard, S.; Lebeau, J.; Romeo, P.H.

    2009-01-01

    Delayed cell death by mitotic catastrophe is a frequent mode of solid tumor cell death after γ-irradiation, a widely used treatment of cancer. Whereas the mechanisms that underlie the early γ-irradiation-induced cell death are well documented, those that drive the delayed cell death are largely unknown. Here we show that the Fas, tumor necrosis factor-related apoptosis-inducing ligand (TRAIL) and tumor necrosis factor (TNF)-α death receptor pathways mediate the delayed cell death observed after γ-irradiation of breast cancer cells. Early after irradiation, we observe the increased expression of Fas, TRAIL-R and TNF-R that first sensitizes cells to apoptosis. Later, the increased expression of FasL, TRAIL and TNF-α permit the apoptosis engagement linked to mitotic catastrophe. Treatments with TNF-α, TRAIL or anti-Fas antibody, early after radiation exposure, induce apoptosis, whereas the neutralization of the three death receptors pathways impairs the delayed cell death. We also show for the first time that irradiated breast cancer cells excrete soluble forms of the three ligands that can induce the death of sensitive bystander cells. Overall, these results define the molecular basis of the delayed cell death of irradiated cancer cells and identify the death receptors pathways as crucial actors in apoptosis induced by targeted as well as non-targeted effects of ionizing radiation. (authors)

  16. Two non-target recessive genes confer resistance to the anti-oomycete microtubule inhibitor zoxamide in Phytophthora capsici.

    Directory of Open Access Journals (Sweden)

    Yang Bi

    Full Text Available This study characterized isolates of P. capsici that had developed a novel mechanism of resistance to zoxamide, which altered the minimum inhibition concentration (MIC but not the EC50. Molecular analysis revealed that the β-tubulin gene of the resistant isolates contained no mutations and was expressed at the same level as in zoxamide-sensitive isolates. This suggested that P. capsici had developed a novel non-target-site-based resistance to zoxamide. Analysis of the segregation ratio of zoxamide-resistance in the sexual progeny of the sensitive isolates PCAS1 and PCAS2 indicated that the resistance to zoxamide was controlled by one or more recessive nuclear genes. Furthermore, the segregation of resistance in the F1, F2, and BC1 progeny was in accordance with the theoretical ratios of the χ(2 test (P>0.05, which suggested that the resistance to zoxamide was controlled by two recessive genes, and that resistance to zoxamide occurred when at least one pair of these alleles was homozygous. This implies that the risk of zoxamide-resistance in P. capsici is low to moderate. Nevertheless this potential for resistance should be monitored closely, especially if two compatible mating types co-exist in the same field.

  17. Assessing environmental impacts of genetically modified plants on non-target organisms: The relevance of in planta studies.

    Science.gov (United States)

    Arpaia, Salvatore; Birch, A Nicholas E; Kiss, Jozsef; van Loon, Joop J A; Messéan, Antoine; Nuti, Marco; Perry, Joe N; Sweet, Jeremy B; Tebbe, Christoph C

    2017-04-01

    In legal frameworks worldwide, genetically modified plants (GMPs) are subjected to pre-market environmental risk assessment (ERA) with the aim of identifying potential effects on the environment. In the European Union, the EFSA Guidance Document introduces the rationale that GMPs, as well as their newly produced metabolites, represent the potential stressor to be evaluated during ERA. As a consequence, during several phases of ERA for cultivation purposes, it is considered necessary to use whole plants or plant parts in experimental protocols. The importance of in planta studies as a strategy to address impacts of GMPs on non-target organisms is demonstrated, to evaluate both effects due to the intended modification in plant phenotype (e.g. expression of Cry proteins) and effects due to unintended modifications in plant phenotype resulting from the transformation process (e.g. due to somaclonal variations or pleiotropic effects). In planta tests are also necessary for GMPs in which newly expressed metabolites cannot easily be studied in vitro. This paper reviews the scientific literature supporting the choice of in planta studies as a fundamental tool in ERA of GMPs in cultivation dossiers; the evidence indicates they can realistically mimic the ecological relationships occurring in their receiving environments and provide important insights into the biology and sustainable management of GMPs. Copyright © 2017 Elsevier B.V. All rights reserved.

  18. Email authentication using symmetric and asymmetric key algorithm encryption

    Science.gov (United States)

    Halim, Mohamad Azhar Abdul; Wen, Chuah Chai; Rahmi, Isredza; Abdullah, Nurul Azma; Rahman, Nurul Hidayah Ab.

    2017-10-01

    Protection of sensitive or classified data from unauthorized access, hackers and other personals is virtue. Storage of data is done in devices such as USB, external hard disk, laptops, I-Pad or at cloud. Cloud computing presents with both ups and downs. However, storing information elsewhere increases risk of being attacked by hackers. Besides, the risk of losing the device or being stolen is increased in case of storage in portable devices. There are array of mediums of communications and even emails used to send data or information but these technologies come along with severe weaknesses such as absence of confidentiality where the message sent can be altered and sent to the recipient. No proofs are shown to the recipient that the message received is altered. The recipient would not find out unless he or she checks with the sender. Without encrypted of data or message, sniffing tools and software can be used to hack and read the information since it is in plaintext. Therefore, an electronic mail authentication is proposed, namely Hybrid Encryption System (HES). The security of HES is protected using asymmetric and symmetric key algorithms. The asymmetric algorithm is RSA and symmetric algorithm is Advance Encryption Standard. With the combination for both algorithms in the HES may provide the confidentiality and authenticity to the electronic documents send from the sender to the recipient. In a nutshell, the HES will help users to protect their valuable documentation and data from illegal third party user.

  19. Email solicitation for scholarly work--a single researcher's perspective.

    Science.gov (United States)

    Bugeja, Justine; Grech, Victor

    2015-01-01

    Publishing is important for career progression. The traditional journal model results in subscribers bearing publication costs. The eagerness with which researchers seek journals for the publishing of their work, along with the internet, has resulted in the creation of a new model called open access (OA). Author/s or their institution/s pay an actual publication fee. This has in turn resulted in the creation of questionable journals which charge steep publishing fees. Emails soliciting publication to one of the authors (VG) were collected for the month of March 2015. Information collected included costs of OA publishing, and whether or not this information was readily available. The appropriateness of said solicitations was also assessed with regard to topics with which the targeted author was familiar. There was a total of 44 solicitations: 3 were duplicates. Out of 41 solicitations, 20 (49%) were appropriate. The open access fee was readily available in 27 out of 41 solicitations (66%). The open access fee averaged $475, ranging from $25 to $1500. The only journal which provided true OA was Medical Principles and Practice, with no fees charged whatsoever. Potential authors should carefully investigate OA journals prior to choosing journals wherein to submit their work.

  20. Improving email strategies to target stress and productivity in clinical practice.

    Science.gov (United States)

    Armstrong, Melissa J

    2017-12-01

    Physician burnout is gaining increased attention in medicine and neurology and often relates to hours worked and insufficient time. One component of this is administrative burden, which relates to regulatory requirements and electronic health record tasks but may also involve increased time spent processing emails. Research in academic medical centers demonstrates that physicians face increasing inbox sizes related to mass distribution emails from various sources on top of emails required for patient care, research, and teaching. This commentary highlights the contribution of administrative tasks to physician burnout, research to date on email in medical contexts, and corporate strategies for reducing email burden that are applicable to neurology clinical practice. Increased productivity and decreased stress can be achieved by limiting the amount one accesses email, managing inbox size, and utilizing good email etiquette. Department and practice physician leaders have roles in decreasing email volume and modeling good practice.

  1. 78 FR 45910 - Proposed Information Collection; Comment Request; Current Population Survey (CPS) Email Address...

    Science.gov (United States)

    2013-07-30

    ... Population Survey (CPS) Email Address Collection Test Supplement AGENCY: U.S. Census Bureau, Commerce. ACTION... request clearance for the collection of data concerning the November 2013 Email Address Collection Test... tool to help increase response rates. We foresee that in the future, we could collect email addresses...

  2. Email use in elementary school: an analysis of exchange patterns and content

    NARCIS (Netherlands)

    van der Meij, Hans; Boersma, Kerst

    Email was embedded in a project in design and technology education in elementary school. During four lessons children worked in groups on building a flying object. These groups communicated through email with groups of children from another school. The analyses of the emails, as viewed from

  3. 49 CFR 551.63 - May a foreign manufacturer submit a designation by email or facsimile?

    Science.gov (United States)

    2010-10-01

    ... email or facsimile? 551.63 Section 551.63 Transportation Other Regulations Relating to Transportation... foreign manufacturer submit a designation by email or facsimile? No, the statute requires designation... designation documents submitted via email or facsimile, as they do not satisfy this requirement. ...

  4. The Application of E-Mail to College English Teaching in China

    Science.gov (United States)

    Wang, Guofeng

    2010-01-01

    With the development of information technology in the past 10 years, e-mail has been widely used in the field of English teaching. This paper, based on an analysis of the ways of using e-mail in college English teaching in China, probes the feasibility and the benefits of application of e-mail to college English teaching.

  5. Etiquette for medical students' email communication with faculty members: a single-institution study.

    Science.gov (United States)

    Kim, Do-Hwan; Yoon, Hyun Bae; Yoo, Dong-Mi; Lee, Sang-Min; Jung, Hee-Yeon; Kim, Seog Ju; Shin, Jwa-Seop; Lee, Seunghee; Yim, Jae-Joon

    2016-04-27

    Email is widely used as a means of communication between faculty members and students in medical education because of its practical and educational advantages. However, because of the distinctive nature of medical education, students' inappropriate email etiquette may adversely affect their learning as well as faculty members' perception of them. Little data on medical students' competency in professional email writing is available; therefore, this study explored the strengths and weaknesses of medical students' email etiquette and factors that contribute to professional email writing. A total of 210 emails from four faculty members at Seoul National University College of Medicine were collected. An evaluation criteria and a scoring rubric were developed based on the various email-writing guidelines. The rubric comprised 10 items, including nine items for evaluation related to the email components and one item for the assessment of global impression of politeness. Three evaluators independently assessed all emails according to the criteria. Students were identified as being 61.0% male and 52.8% were in the undergraduate-entry program. The sum of each component score was 62.21 out of 100 and the mean value for global impression was 2.6 out of 4. The results demonstrated that students' email etiquettes remained low-to-mediocre for most criteria, except for readability and honorifics. Three criteria, salutation (r=0.668), closing (r=0.653), and sign-off (r=0.646), showed a strong positive correlation with the global impression of politeness. Whether a student entered a graduate-entry program or an undergraduate-entry program significantly contributed to professional email writing after other variables were controlled. Although students in the graduate-entry program demonstrated a relatively superior level of email etiquette, the majority of medical students did not write emails professionally. Educating all medical students in email etiquette may well contribute to

  6. A statistical simulation model for field testing of non-target organisms in environmental risk assessment of genetically modified plants.

    Science.gov (United States)

    Goedhart, Paul W; van der Voet, Hilko; Baldacchino, Ferdinando; Arpaia, Salvatore

    2014-04-01

    Genetic modification of plants may result in unintended effects causing potentially adverse effects on the environment. A comparative safety assessment is therefore required by authorities, such as the European Food Safety Authority, in which the genetically modified plant is compared with its conventional counterpart. Part of the environmental risk assessment is a comparative field experiment in which the effect on non-target organisms is compared. Statistical analysis of such trials come in two flavors: difference testing and equivalence testing. It is important to know the statistical properties of these, for example, the power to detect environmental change of a given magnitude, before the start of an experiment. Such prospective power analysis can best be studied by means of a statistical simulation model. This paper describes a general framework for simulating data typically encountered in environmental risk assessment of genetically modified plants. The simulation model, available as Supplementary Material, can be used to generate count data having different statistical distributions possibly with excess-zeros. In addition the model employs completely randomized or randomized block experiments, can be used to simulate single or multiple trials across environments, enables genotype by environment interaction by adding random variety effects, and finally includes repeated measures in time following a constant, linear or quadratic pattern in time possibly with some form of autocorrelation. The model also allows to add a set of reference varieties to the GM plants and its comparator to assess the natural variation which can then be used to set limits of concern for equivalence testing. The different count distributions are described in some detail and some examples of how to use the simulation model to study various aspects, including a prospective power analysis, are provided.

  7. Low doses and non-targeted effects in environmental radiation protection; where are we now and where should we go?

    Science.gov (United States)

    Mothersill, Carmel; Rusin, Andrej; Seymour, Colin

    2017-11-01

    The field of low dose radiobiology has advanced considerably in the last 30 years from small indications in the 1980's that all was not simple, to a paradigm shift which occurred during the 1990's, which severely dented the dose-driven models and DNA centric theories which had dominated until then. However while the science has evolved, the application of that science in environmental health protection has not. A reason for this appears to be the uncertainties regarding the shape of the low dose response curve, which lead regulators to adopt a precautionary approach to radiation protection. Radiation protection models assume a linear relationship between dose (i.e. energy deposition) and effect (in this case probability of an adverse DNA interaction leading to a mutation). This model does not consider non-targeted effects (NTE) such as bystander effects or delayed effects, which occur in progeny cells or offspring not directly receiving energy deposition from the dose. There is huge controversy concerning the role of NTE with some saying they reflect "biology" and that repair and homeostatic mechanisms sort out the apparent damage while others consider them to be a class of damage which increases the size of the target. One thing which has recently become apparent is that NTE may be very critical for modelling long-term effects at the level of the population rather than the individual. The issue is that NTE resulting from an acute high dose such as occurred after the A-bomb or Chernobyl occur in parallel with chronic effects induced by the continuing residual effects due to radiation dose decay. This means that if ambient radiation doses are measured for example 25 years after the Chernobyl accident, they only represent a portion of the dose effect because the contribution of NTE is not included. Copyright © 2017. Published by Elsevier Inc.

  8. Monitoring the effects of a lepidopteran insecticide, Flubendiamide, on the biology of a non-target dipteran insect, Drosophila melanogaster.

    Science.gov (United States)

    Sarkar, Saurabh; Roy, Sumedha

    2017-10-13

    Various organisms are adversely affected when subjected to chronic fluoride exposure. This highly electronegative ion present in several insecticide formulations is found to be lethal to target pests. In the present study, Drosophila melanogaster is treated with sub-lethal concentrations of a diamide insecticide formulation, Flubendiamide. Chronic exposure to the diamide (0.5-100 μg/mL) was found to be responsible for increase in fluoride ion concentration in larval as well as adult body fluid. Interestingly, 100 μg/mL Flubendiamide exposure resulted in 107 and 298% increase in fluoride ion concentration whereas only 23 and 52% of Flubendiamide concentration increase in larval and adult body fluid, respectively. Further, in this study, selected life cycle parameters like larval duration, pupal duration and emergence time showed minimal changes, whereas percentage of emergence and fecundity revealed significant treatment-associated variation. It can be noted that nearly 79% reduction in fecundity was observed with 100 μg/mL Flubendiamide exposure. The variations in these parameters indicate probable involvement of fluoride ion in detectable alterations in the biology of the non-target model insect, D. melanogaster. Furthermore, the outcomes of life cycle study suggest change in resource allocation pattern in the treated flies. The altered resource allocation might have been sufficient to resist changes in selective life cycle parameters, but it could not defend the changes in fecundity. The significant alterations indicate a definite trade-off pattern, where the treated individuals happen to compromise. Thus, survival is apparently taking an upper hand in comparison to reproductive ability in response to Flubendiamide exposure. Graphical abstract The figure demonstrates increase in Fluoride and Flubendiamide concentrations in Drosophila melanogaster after chronic sub-lethal exposure to Flubendiamide. Treatment-induced alterations in larval and pupal duration

  9. EMAIL MARKETING CAMPAIGNS: THE EASIEST PATH FROM ORGANIZATIONS TO CONSUMERS – AN EXPLORATORY ASSESSMENT

    Directory of Open Access Journals (Sweden)

    Pantea Carmen

    2010-07-01

    Full Text Available The email is a valuable marketing tool for conveying short, simple messages that call for action on behalf of the recipient. Usually companies develop email marketing campaigns for attracting new customers, persuading the existing customers to buy again, encourage customer loyalty, announce or remind about special offers or events. For an email marketing campaign to be efficient, it is wanted a greater number of responses from those in the target. The paper assesses in an exploratory manner the frequency in using the email accounts, the level of exposure to email marketing campaigns as well as the type of information wanted to be received by the Romanian users.

  10. Understanding Patient Experience Using Internet-based Email Surveys: A Feasibility Study at Mount Sinai Hospital.

    Science.gov (United States)

    Morgan, Matthew; Lau, Davina; Jivraj, Tanaz; Principi, Tania; Dietrich, Sandra; Bell, Chaim M

    2015-01-01

    Email is becoming a widely accepted communication tool in healthcare settings. This study sought to test the feasibility of Internet-based email surveys of patient experience in the ambulatory setting. We conducted a study of email Internet-based surveys sent to patients in selected ambulatory clinics at Mount Sinai Hospital in Toronto, Canada. Our findings suggest that email links to Internet surveys are a feasible, timely and efficient method to solicit patient feedback about their experience. Further research is required to optimally leverage Internet-based email surveys as a tool to better understand the patient experience.

  11. Securing E-mail Communication Using Hybrid Cryptosystem on Android-based Mobile Devices

    Directory of Open Access Journals (Sweden)

    Andri Zakariya

    2012-12-01

    Full Text Available One of the most popular internet services is electronic mail (e-mail. By using mobile devices with internet connection, e-mail can be widely used by anyone to exchange information anywhere and anytime whether public or confidential. Unfortunately, there are some security issues with email communication; e-mail is sent in over open networks and e-mail is stored on potentially insecure mail servers. Moreover, e-mail has no integrity protection so the body can be undectected altered in transit or on the e-mail server. E-mail also has no data origin authentication, so people cannot be sure that the emails they receive are from the e-mail address owner. In order to solve this problem, this study proposes a secure method of e-mail communication on Android-based mobile devices using a hybrid cryptosystem which combines symmetric encryption, asymmetric encryption and hash function. The experimental results show that the proposed method succeeded in meeting those aspects of information security including confidentiality, data integrity, authentication, and non-repudiation.

  12. Assessing non-target effects and host feeding of the exotic parasitoid Apanteles taragamae, a potential biological control agent of the cowpea pod borer Maruca vitrata

    NARCIS (Netherlands)

    Dannon, A.E.; Tamo, M.; Huis, van A.; Dicke, M.

    2012-01-01

    Apanteles taragamae Viereck is a larval parasitoid introduced in Benin for classical biological control of the cowpea pod borer Maruca vitrata Fabricius. In the laboratory, we evaluated the effects of A. taragamae on non-target herbivore species, and on another parasitoid of M. vitrata, i.e. the

  13. The effect of antibiotics and diet on enterolactone concentration and metabolome studied by targeted and non-targeted LC-MS metabolomics

    DEFF Research Database (Denmark)

    Bolvig, Anne Katrine; Nørskov, Natalja; Hedemann, Mette Skou

    2017-01-01

    with lower levels of ENL. Here, we investigate the link between antibiotic use and lignan metabolism in pigs using LC-MS/MS. The effect of lignan intake and antibiotic use on the gut microbial community and the pig metabolome is studied by 16S rRNA sequencing and non-targeted LC-MS. Treatment...

  14. An open workflow to generate “MS Ready” structures and improve non-targeted mass spectrometry (ACS Fall 1 of 3)

    Science.gov (United States)

    High-throughput non-targeted analyses (NTA) rely on chemical reference databases for tentative identification of observed chemical features. Many of these databases and online resources incorporate chemical structure data not in a form that is readily observed by mass spectromet...

  15. Meta-Analysis of PECS with Individuals with ASD: Investigation of Targeted versus Non-Targeted Outcomes, Participant Characteristics, and Implementation Phase

    Science.gov (United States)

    Ganz, Jennifer B.; Davis, John L.; Lund, Emily M.; Goodwyn, Fara D.; Simpson, Richard L.

    2012-01-01

    The Picture Exchange Communication System (PECS) is a widely used picture/icon aided augmentative communication system designed for learners with autism and other developmental disorders. This meta-analysis analyzes the extant empirical literature for PECS relative to targeted (functional communication) and non-targeted concomitant outcomes…

  16. An Empirical Study of Email-Based Advertisement and its Influence on Consumers’ Attitude

    Directory of Open Access Journals (Sweden)

    Navid Behravan

    2012-07-01

    Full Text Available E-commerce becomes a cornerstone for many businesses over the recent years. Align with e-commerce activities, the marketing communication through online media plays a major role in achieving competitive advantageous. E-mail advertising in this context offers a cost effective, direct and reciprocal means for businesses overcoming time and geographical barriers. As so, this study discussed the advertising e-mail characteristics and its influences on customers' attitude about email-based advertisement. According to the research findings, entertainment and informativeness of advertising email content is strongly and positively affect customers’ attitude about email-based advertisement. On the other hand, the privacy of advertising e-mail is strongly, yet negatively influences the customers’ attitude towards email-based advertisement.

  17. Clinician-patient E-mail communication: challenges for reimbursement.

    Science.gov (United States)

    Komives, Eugenie M

    2005-01-01

    Clinicians are rapidly gaining experience with online clinician-patient consultation, and more tools are becoming available to support these efforts. In addition, we now have evidence that using electronic communication is cost-effective to payers and appealing to patients and providers. At present, there appear to be few barriers to the adoption of these solutions for practices that use other online services. Security concerns can easily be overcome by using programs described in this commentary. Larger and longer studies that evaluate the benefits and cost savings in more detail may help convince other payers and providers of the utility of the Web-based programs. More studies are needed to understand the effect of dinician-patient electronic communication on the costs of caring for chronic illness. When these solutions also include support tools, such as electronic prescribing, which could improve patient safety and quality of care, they should be encouraged. In their article entitled, "Electrons in Flight-Email between Doctors and Patients," Delbanco and Sands postulate that the future of e-communication in medicine will be integrated with a patient-controlled health record and will include secure synchronous and asynchronous communication, video conferencing and messaging, instant transcription into the written record, full-patient access to the record, translation into different languages, connectivity to multiple data sources, incorporation of multi-media educational materials. It-will also allow data from home-based diagnostic technology to be sent to clinicians. "Electronic communication will move medicine inexorably toward such transparency, enabling doctors and patients to share knowledge, responsibility, and decision-making more equally. We need to explore rapidly how this change will affect the quality of care for patients and the quality of life for doctors." The widespread dependence on Internet-based electronic communication to support a variety of

  18. Can an aquatic macrophyte bioaccumulate glyphosate? A watershed scale study using a non-target hydrophyte Ludwigia peploides

    Science.gov (United States)

    Perez, Debora; Okada, Elena; Menone, Mirta; Aparicio, Virginia; Costa, Jose Luis

    2017-04-01

    The hydrophyte Ludwigia peploides is widely distributed in South America streams, and therefore, it can be used as a biomonitor for pesticides used in agricultural production. Glyphosate is one of the main pesticides used in Argentina. This has resulted in its occurrence in non-target wetland ecosystems. The objectives of this study were to: 1) establish and validate an extraction and quantification methodology for glyphosate in L.peploides plants, and 2) evaluated the role of this species as a glyphosate biomonitor in the agricultural watershed of the El Crespo stream. For the first objective, we collected plant material in the field. The leaves were dissected and oven dried at 60° C, grinded and sieved through a 0.5 mm mesh. Different solutions were tested for the extraction step. Labeled glyphosate was used as an internal standard to evaluate the recovery rate and the matrix effect of the different extraction methods. Glyphosate was derivatized with FMOC-Cl and then quantified by ultra-performance liquid chromatography (UPLC) coupled to a mass tandem spectrometer (MS/MS). The method based on an aqueous phase extraction step 0.01 mg/mL of activated carbon as a clean-up to decrease the matrix interference had a recovery of 117 ± 20% and the matrix effect was less than 20%. This method was used to analyze the glyphosate levels in L.peploides in the El Crespo stream. For the second objective, plants of L.peploides were collected on March 2016 in eight monitoring sites of the stream from the headwaters to the stream mouth. Surface water and sediments samples were collected at the same time to calculate the bioconcentration factors (BCFs) and biota-sediment bioaccumulation factors (BSAFs). The BCFs ranged between 28.57 - 280 L/Kg and the BSAFs ranged between 2.52- 30.66 at different sites. These results indicate that L.peploides can bioaccumulated glyphosate in its leaves and the major bioavailability is given mainly by the herbicide molecules present in surface

  19. Prone versus supine positioning for whole and partial-breast radiotherapy: A comparison of non-target tissue dosimetry

    International Nuclear Information System (INIS)

    Kirby, Anna M.; Evans, Philip M.; Donovan, Ellen M.; Convery, Helen M.; Haviland, Joanna S.; Yarnold, John R.

    2010-01-01

    Purpose: To compare non-target tissue (including left-anterior-descending coronary-artery (LAD)) dosimetry of prone versus supine whole (WBI) and partial-breast irradiation (PBI). Methods and materials: Sixty-five post-lumpectomy breast cancer patients underwent CT-imaging supine and prone. On each dataset, the whole-breast clinical-target-volume (WB-CTV), partial-breast CTV (tumour-bed + 15 mm), ipsilateral-lung and chest-wall were outlined. Heart and LAD were outlined in left-sided cases (n = 30). Tangential-field WBI and PBI plans were generated for each position. Mean LAD, heart, and ipsilateral-lung doses (x mean ), maximum LAD (LAD max ) doses, and the volume of chest-wall receiving 50 Gy (V 50Gy ) were compared. Results: Two-hundred and sixty plans were generated. Prone positioning reduced heart and LAD doses in 19/30 WBI cases (median reduction in LAD mean = 6.2 Gy) and 7/30 PBI cases (median reduction in LAD max = 29.3 Gy) (no difference in 4/30 cases). However, prone positioning increased cardiac doses in 8/30 WBI (median increase in LAD mean = 9.5 Gy) and 19/30 PBI cases (median increase in LAD max = 22.9 Gy) (no difference in 3/30 cases). WB-CTV > 1000cm 3 was associated with improved cardiac dosimetry in the prone position for WBI (p = 0.04) and PBI (p = 0.04). Prone positioning reduced ipsilateral-lung mean in 65/65 WBI and 61/65 PBI cases, and chest-wall V 50Gy in all WBI cases. PBI reduced normal-tissue doses compared to WBI in all cases, regardless of the treatment position. Conclusions: In the context of tangential-field WBI and PBI, prone positioning is likely to benefit left-breast-affected women of larger breast volume, but to be detrimental in left-breast-affected women of smaller breast volume. Right-breast-affected women are likely to benefit from prone positioning regardless of breast volume.

  20. What parents want from emails with their pediatrician: implications for teaching communication skills.

    Science.gov (United States)

    Schiller, Jocelyn H; Christner, Jennifer G; Stansfield, Robert Brent; Watnick, Caroline S; Mullan, Patricia B

    2013-07-01

    Physician-patient email communication is increasing but trainees receive no education on this communication medium. Research eliciting patient preferences about email communication could inform training. Investigators elicited parents' perspectives on physician-parent email communication and compared parent and faculty assessments of medical students' emails. This mixed methods study explored physician-parent email communication in 5 parent focus groups using qualitative analyses to identify themes. Differences between faculty and parent assessment scores for students' email responses were calculated using univariate general linear modeling. Themes that emerged were: (1) Building the Relationship, (2) Clarity of Communication and (3) Expectations. Parents criticized student's statements as condescending. The sum of assessment scores by parents and faculty were moderately correlated (r(44)=.407, Pparents gave students lower scores on "acknowledges validity/expresses empathy" (P=.01) and higher scores on "provides next steps" (PParents place value on students' abilities to communicate clearly and convey respect and empathy in email. Parent and faculty perspectives on email communication are similar but not the same. Differences between parental and faculty assessments of medical students' emails supports the need for the involvement of patients and families in email communication curriculum development. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  1. THE DEVELOPMENT OF E-MAIL LITERACY: FROM WRITING TO PEERS TO WRITING TO AUTHORITY FIGURES

    Directory of Open Access Journals (Sweden)

    Chi-Fen Emily Chen

    2006-05-01

    Full Text Available Though e-mail has become a common interpersonal communication medium, it does not mean that this medium is used without difficulty. While people can write e-mails to peers in any manner they like, writing e-mails to authority figures requires higher pragmatic competence and critical language awareness of how discourse shapes and reflects power asymmetry in an institutional context. For L2 learners, the challenge of composing this type of e-mail can be greater due not only to their limited linguistic ability but also their unfamiliarity with the target culture's norms and values. To provide a deeper understanding of how an L2 learner develops e-mail literacy in the target language environment, this paper presents a longitudinal case study of a Taiwanese graduate student’s e-mail practice in English during her studies at a U.S. university for two and a half years. Using a critical discourse analysis approach, the study reveals the complexity of an L2 learner’s evolving e-mail practice and struggle for appropriateness, particularly in her e-mail communication with professors. Her development of e-mail literacy is discussed in relation to her evolving understanding of the e-mail medium, changing performance of student identity, increasing knowledge of student-professor interaction and realization of culture-specific politeness.

  2. The style of academic e-mails and conventional letters: contrastive analysis of four conversational routines

    Directory of Open Access Journals (Sweden)

    Clyde Ancarno

    2005-04-01

    Full Text Available This paper presents the results of a corpus-based study which investigates the genre of academic email and more specifically its pragmatic dimension. Four conversational routines (thank yous, apologies, requests, offers are analysed and compared in two channels: academic e-mails and conventional print letters. In addition, data from both native and non-native speakers of English is considered, which sheds light on some of the differences found in the academic e-mail writing of learners of English. The findings indicate that academic e-mail is a relatively formal type of correspondence which is still largely influenced, as is to be expected, by the genre of the academic letter, and that as a genre, academic e-mail is in the process of formation or semi-formation. Finally, native speakers of English are found to be more informal than non-native speakers of English in academic e-mails.

  3. Modeling Personalized Email Prioritization: Classification-based and Regression-based Approaches

    Energy Technology Data Exchange (ETDEWEB)

    Yoo S.; Yang, Y.; Carbonell, J.

    2011-10-24

    Email overload, even after spam filtering, presents a serious productivity challenge for busy professionals and executives. One solution is automated prioritization of incoming emails to ensure the most important are read and processed quickly, while others are processed later as/if time permits in declining priority levels. This paper presents a study of machine learning approaches to email prioritization into discrete levels, comparing ordinal regression versus classier cascades. Given the ordinal nature of discrete email priority levels, SVM ordinal regression would be expected to perform well, but surprisingly a cascade of SVM classifiers significantly outperforms ordinal regression for email prioritization. In contrast, SVM regression performs well -- better than classifiers -- on selected UCI data sets. This unexpected performance inversion is analyzed and results are presented, providing core functionality for email prioritization systems.

  4. Rancang Bangun Aplikasi Enkripsi dan Dekripsi Email Dengan Menggunakan Algoritma Advanced Encryption Standard Dan Knapsack

    Directory of Open Access Journals (Sweden)

    Timothy John Pattiasina

    2014-07-01

    Full Text Available Advanced Encryption Standard (AES dan Knapsack adalah dua algoritma enkripsi simetris dan asimetris yang paling sering digunakan. Penelitian ini menganalisa kedua algoritma AES dan algoritma Knapsack. Prototipe aplikasi enkripsi email ini dirancang dengan menggabungkan karateristik algoritma AES dan Knapsack untuk memecahkan masalah keamanan email. Algoritma AES digunakan untuk mengenkripsi dan deskripsi email berupa teks atau file, sedangkan Algoritma Knapsack di gunakan untuk mengenkripsi kunci AES. Enkripsi hybrid yang diterapkan pada aplikasi bertujuan untuk menambah keamanan informasi dalam sebuah jaringan.

  5. Normative Data for Email Writing by Native Speakers of British English

    Directory of Open Access Journals (Sweden)

    Lindsey Thiel

    2015-05-01

    Full Text Available This dataset includes emails from forty two control participants ranging from 16 to 88 years of age (mean = 46 and 9 to 24 years of education (mean = 13. Three emails were produced by each participant (between 2011 and 2014, each within a time limit of three minutes. It is expected that this normative data will be useful for clinicians and researchers working with adults with acquired language disorders in assessing email writing.

  6. Normative Data for Email Writing by Native Speakers of British English

    OpenAIRE

    Thiel, Lindsey; Sage, Karen; Conroy, Paul

    2015-01-01

    This dataset includes emails from forty two control participants ranging from 16 to 88 years of age (mean = 46) and 9 to 24 years of education (mean = 13). Three emails were produced by each participant (between 2011 and 2014), each within a time limit of three minutes. It is expected that this normative data will be useful for clinicians and researchers working with adults with acquired language disorders in assessing email writing.

  7. Assessment of email communication skills of rheumatology fellows: a pilot study

    Science.gov (United States)

    Dhuper, Sonal; Siva, Chokkalingam; Fresen, John L; Petruc, Marius; Velázquez, Celso R

    2010-01-01

    Physician–patient email communication is gaining popularity. However, a formal assessment of physicians' email communication skills has not been described. We hypothesized that the email communication skills of rheumatology fellows can be measured in an objective structured clinical examination (OSCE) setting using a novel email content analysis instrument which has 18 items. During an OSCE, we asked 50 rheumatology fellows to respond to a simulated patient email. The content of the responses was assessed using our instrument. The majority of rheumatology fellows wrote appropriate responses scoring a mean (±SD) of 10.6 (±2.6) points (maximum score 18), with high inter-rater reliability (0.86). Most fellows were concise (74%) and courteous (68%) but not formal (22%). Ninety-two percent of fellows acknowledged that the patient's condition required urgent medical attention, but only 30% took active measures to contact the patient. No one encrypted their messages. The objective assessment of email communication skills is possible using simulated emails in an OSCE setting. The variable email communication scores and incidental patient safety gaps identified, suggest a need for further training and defined proficiency standards for physicians' email communication skills. PMID:20962134

  8. Non-targeted and delayed effects of exposure to ionizing radiation: II. Radiation-induced genomic instability and bystander effects in vivo, clastogenic factors and transgenerational effects

    Science.gov (United States)

    Morgan, William F.

    2003-01-01

    The goal of this review is to summarize the evidence for non-targeted and delayed effects of exposure to ionizing radiation in vivo. Currently, human health risks associated with radiation exposures are based primarily on the assumption that the detrimental effects of radiation occur in irradiated cells. Over the years a number of non-targeted effects of radiation exposure in vivo have been described that challenge this concept. These include radiation-induced genomic instability, bystander effects, clastogenic factors produced in plasma from irradiated individuals that can cause chromosomal damage when cultured with nonirradiated cells, and transgenerational effects of parental irradiation that can manifest in the progeny. These effects pose new challenges to evaluating the risk(s) associated with radiation exposure and understanding radiation-induced carcinogenesis.

  9. No association between the use of Bti for mosquito control and the dynamics of non-target aquatic invertebrates in French coastal and continental wetlands.

    Science.gov (United States)

    Lagadic, Laurent; Schäfer, Ralf B; Roucaute, Marc; Szöcs, Eduard; Chouin, Sébastien; de Maupeou, Jérôme; Duchet, Claire; Franquet, Evelyne; Le Hunsec, Benoit; Bertrand, Céline; Fayolle, Stéphanie; Francés, Benoît; Rozier, Yves; Foussadier, Rémi; Santoni, Jean-Baptiste; Lagneau, Christophe

    2016-05-15

    The environmental safety of Bacillus thuringiensis subsp. israelensis (Bti) is still controversial, mainly because most of the previous field studies on its undesired effects were spatially limited and did not address the relationship between community similarity and application time and frequency. No general statement can therefore be drawn on the usage conditions of Bti that insure protection of non-target organisms. The present study was conducted in eight sites distributed over the main geographical sectors where mosquito control is implemented in mainland France and Corsica. Changes in non-target aquatic invertebrates were followed at elapsed time after repeated applications of two Bti formulations (VectoBac® WDG or 12AS) up to four consecutive years. We examined the influence of both larvicide treatments and environmental variables on community dynamics and dissimilarity between treated and control areas. As it can be argued that chironomids are the most vulnerable group of non-target invertebrates, we scrutinised potential Bti-related effects on the dynamics of their community. The use of VectoBac® WDG and 12AS in coastal and continental wetlands had no immediate or long-term detectable effect on the taxonomic structure and taxa abundance of non-target aquatic invertebrate communities, including chironomids. This applied to the main habitats where mosquito larvae occur, regardless of their geographic location. Flooding, whose frequency and duration depend on local meteorological and hydrological conditions, was identified as the main environmental driver of invertebrate community dynamics. Our findings add support to the environmental safety of currently available Bti formulations when following recommended application rates and best mosquito control practices. Copyright © 2016 Elsevier B.V. All rights reserved.

  10. DAMPAK APLIKASI INSEKTISIDA PERMETRIN TERHADAP HAMA PENGISAP BIJAIJ HELOPELTIS SPP. (HEMIPTERA: MIRIDAE DAN ARTROPODA NON-TARGET PADA PERTANAMAN KAKAO (THEOBROMA CACAO L.

    Directory of Open Access Journals (Sweden)

    Rosma Hasibuan

    2014-08-01

    Full Text Available Impact of Permethrin-Insecticide Application on Mirid Pest of Cocoa Helopeltis spp. (Hemiptera: Miridae and on Non-target  Arthropods in Cocoa Plantations (Theobroma cacao L.. Cocoa mirid bugs, Helopeltis spp., (Hemiptera: Miridae are the most important pest of cocoa in Indonesia. A field study was conducted to investigate the effect of permethrin on cocoa mirids and non-target arthropods at a cocoa plantation in specific place. A randomized complete block design was used in which each of four blocks consisted of 5 treatments (4 concentrations of permethrin; 50; 100; 200; and 250 ppm and control. The results indicated that the application of permethrin significantly increased the cocoa mirids mortaliiy throughout all sprayed cocoa trees (up to 100% 72 h after application. Even at 1 h after application, the percentage of Cocoa mirids mortality 29.2% - 53.9% on cocoa trees sprayed with permethrin at concentrations of 50 - 250 ppm was significantly higher than that on control plant (3.6%. At 72 h after treatments, application of permethrin at concentrations of 200 and 250 ppm caused a complete kill (mortalty of 100% in the test mirids. Meanwhile, ground cloths caught at least 22 fanilies of abore-ground arthropods that were found killed by permethrin applications. Moreover, the number of non-target arthropods killed by permethrin at concentrations of 100 - 250 ppm (27.3 - 85.3 individuals/ground cloth were signifcantly higher than that on control trees. These results demonstrated that despite high efficacy of permethrin in controlling of cocoa mirids (Hetopeltis spp., its application also had adverse effects on non-target arthropods incocoa plantations.

  11. Effects of seed mixture sowing with resistant and susceptible rice on population dynamics of target planthoppers and non-target stemborers and leaffolders.

    Science.gov (United States)

    Li, Zhuo; Wan, Guijun; Wang, Long; Parajulee, Megha N; Zhao, Zihua; Chen, Fajun

    2018-07-01

    The widespread planting of insect-resistant crops has caused a dramatic shift in agricultural landscapes, thus raising concerns about the potential impact on both target and non-target pests worldwide. In this study, we examined the potential effects of six seed mixture ratios of insect-resistance dominance [100% (R100), 95% (S05R95), 90% (S10R90), 80% (S20R80), 60% (S40R60), and 0% (S100)] on target and non-target pests in a 2-year field trial in southern China. The occurrence of the target pests Nilaparvata lugens and Sogatella furcifera decreased with an increase in the ratio of resistant rice, and mixture ratios with ≥90% resistant rice significantly increased the pest suppression efficiency, with the lowest occurrences of the non-target pests Sesamia inferens, Chilo suppressalis and Cnaphalocrocis medinalis for S100 and S10R90 seed mixture ratios. Furthermore, there were no significant differences in the 1000-grain dry weight and grain yield between R100 and other treatments with ≥80% resistant seeds in the mixture (S20R80, S10R90 and S05R95). S10R90 produced a good yield and provided the most effective control of both target and non-target pests, with the potential to significantly reduce the application of chemical pesticides for integrated pest management in paddy fields. It is further presumed that the strategy of seed mixture with resistant and susceptible rice would be advantageous for rice yield stability. © 2018 Society of Chemical Industry. © 2018 Society of Chemical Industry.

  12. Effects of seed mixture sowing with transgenic Bt rice and its parental line on the population dynamics of target stemborers and leafrollers, and non-target planthoppers.

    Science.gov (United States)

    Li, Zhuo; Li, Li-Kun; Liu, Bin; Wang, Long; Parajulee, Megha N; Chen, Fa-Jun

    2018-01-24

    The widespread planting of insect-resistant crops has caused a dramatic shift in agricultural landscapes, thus raising concerns about the potential impacts on both target and non-target pests. In this study, we examined the potential effects of intra-specific seed mixture sowing with transgenic Bt rice (Bt) and its parental non-transgenic line (Nt) (100% Bt rice [Bt 100 ], 5% Nt+95% Bt [Nt 05 Bt 95 ], 10% Nt+90% Bt [Nt 10 Bt 90 ], 20% Nt+80% Bt [Nt 20 Bt 80 ], 40% Nt+60% Bt [Nt 40 Bt 60 ] and 100% Nt rice [Nt 100 ]) on target and non-target pests in a 2-year field trial in southern China. The occurrence of target pests, Sesamia inferens, Chilo suppressalis and Cnaphalocrocis medinalis, decreased with the increased ratio of Bt rice, and the mixture ratios with more than 90% Bt rice (Bt 100 and Nt 05 Bt 95 ) significantly increased the pest suppression efficiency, with the lowest occurrences of non-target planthoppers, Nilaparvata lugens and Sogatella furcifera in Nt 100 and Nt 05 Bt 95 . Furthermore, there were no significant differences in 1000-grain dry weight and grain dry weight per 100 plants between Bt 100 and Nt 05 Bt 95 . Seed mixture sowing of Bt rice with ≤10% (especially 5%) of its parent line was sufficient to overcome potential compliance issues that exist with the use of block or structured refuge to provide most effective control of both target and non-target pests without compromising the grain yield. It is also expected that the strategy of seed mixture sowing with transgenic Bt rice and the non-transgenic parental line would provide rice yield stability while decreasing the insecticide use frequency in rice production. © 2018 Institute of Zoology, Chinese Academy of Sciences.

  13. Influence of eye size and beam entry angle on dose to non-targeted tissues of the eye during stereotactic x-ray radiosurgery of AMD

    International Nuclear Information System (INIS)

    Cantley, Justin L; Bolch, Wesley E; Hanlon, Justin; Chell, Erik; Lee, Choonsik; Smith, W Clay

    2013-01-01

    Age-related macular degeneration is a leading cause of vision loss for the elderly population of industrialized nations. The IRay® Radiotherapy System, developed by Oraya® Therapeutics, Inc., is a stereotactic low-voltage irradiation system designed to treat the wet form of the disease. The IRay System uses three robotically positioned 100 kVp collimated photon beams to deliver an absorbed dose of up to 24 Gy to the macula. The present study uses the Monte Carlo radiation transport code MCNPX to assess absorbed dose to six non-targeted tissues within the eye—total lens, radiosensitive tissues of the lens, optic nerve, distal tip of the central retinal artery, non-targeted portion of the retina, and the ciliary body-–all as a function of eye size and beam entry angle. The ocular axial length was ranged from 20 to 28 mm in 2 mm increments, with the polar entry angle of the delivery system varied from 18° to 34° in 2° increments. The resulting data showed insignificant variations in dose for all eye sizes. Slight variations in the dose to the optic nerve and the distal tip of the central retinal artery were noted as the polar beam angle changed. An increase in non-targeted retinal dose was noted as the entry angle increased, while the dose to the lens, sensitive volume of the lens, and ciliary body decreased as the treatment polar angle increased. Polar angles of 26° or greater resulted in no portion of the sensitive volume of the lens receiving an absorbed dose of 0.5 Gy or greater. All doses to non-targeted structures reported in this study were less than accepted thresholds for post-procedure complications. (paper)

  14. Influence of eye size and beam entry angle on dose to non-targeted tissues of the eye during stereotactic x-ray radiosurgery of AMD

    Science.gov (United States)

    Cantley, Justin L.; Hanlon, Justin; Chell, Erik; Lee, Choonsik; Smith, W. Clay; Bolch, Wesley E.

    2013-10-01

    Age-related macular degeneration is a leading cause of vision loss for the elderly population of industrialized nations. The IRay® Radiotherapy System, developed by Oraya® Therapeutics, Inc., is a stereotactic low-voltage irradiation system designed to treat the wet form of the disease. The IRay System uses three robotically positioned 100 kVp collimated photon beams to deliver an absorbed dose of up to 24 Gy to the macula. The present study uses the Monte Carlo radiation transport code MCNPX to assess absorbed dose to six non-targeted tissues within the eye—total lens, radiosensitive tissues of the lens, optic nerve, distal tip of the central retinal artery, non-targeted portion of the retina, and the ciliary body--all as a function of eye size and beam entry angle. The ocular axial length was ranged from 20 to 28 mm in 2 mm increments, with the polar entry angle of the delivery system varied from 18° to 34° in 2° increments. The resulting data showed insignificant variations in dose for all eye sizes. Slight variations in the dose to the optic nerve and the distal tip of the central retinal artery were noted as the polar beam angle changed. An increase in non-targeted retinal dose was noted as the entry angle increased, while the dose to the lens, sensitive volume of the lens, and ciliary body decreased as the treatment polar angle increased. Polar angles of 26° or greater resulted in no portion of the sensitive volume of the lens receiving an absorbed dose of 0.5 Gy or greater. All doses to non-targeted structures reported in this study were less than accepted thresholds for post-procedure complications.

  15. Field response of aboveground non-target arthropod community to transgenic Bt-Cry1Ab rice plant residues in postharvest seasons.

    Science.gov (United States)

    Bai, Yao-Yu; Yan, Rui-Hong; Ye, Gong-Yin; Huang, Fangneng; Wangila, David S; Wang, Jin-Jun; Cheng, Jia-An

    2012-10-01

    Risk assessments of ecological effects of transgenic rice expressing lepidoptera-Cry proteins from Bacillus thuringiensis (Bt) on non-target arthropods have primarily focused on rice plants during cropping season, whereas few studies have investigated the effects in postharvest periods. Harvested rice fallow fields provide a critical over-wintering habitat for arthropods in the Chinese rice ecosystems, particularly in the southern region of the country. During 2006-08, two independent field trials were conducted in Chongqing, China to investigate the effects of transgenic Cry1Ab rice residues on non-target arthropod communities. In each trial, pitfall traps were used to sample arthropods in field plots planted with one non-Bt variety and two Bt rice lines expressing the Cry1Ab protein. Aboveground arthropods in the trial plots during the postharvest season were abundant, while community densities varied significantly between the two trials. A total of 52,386 individual insects and spiders, representing 93 families, was captured in the two trials. Predominant arthropods sampled were detritivores, which accounted for 91.9% of the total captures. Other arthropods sampled included predators (4.2%), herbivores (3.2%), and parasitoids (0.7%). In general, there were no significant differences among non-Bt and Bt rice plots in all arthropod community-specific parameters for both trials, suggesting no adverse impact of the Bt rice plant residues on the aboveground non-target arthropod communities during the postharvest season. The results of this study provide additional evidence that Bt rice is safe to non-target arthropod communities in the Chinese rice ecosystems.

  16. Use of anticoagulant rodenticides in outdoor urban areas: considerations and proposals for the protection of public health and non-target species.

    Science.gov (United States)

    Dutto, M; Di Domenico, D; Rubbiani, M

    2018-01-01

    Rodent control operations represent an important tool for the prevention and management of infestations, in outdoor environments, by synanthropic rodents (Rattus rattus and R. norvegicus), which are a source of economic and environmental damage with significant sanitary implications. Although the use of anticoagulants is safer to humans and pets compared to the use of acute poisoning substances, an intrinsic hazard of the active ingredients exists, i.e. the possible poisoning of non-target organisms (e.g., children, pets and wildlife) following exposure. The risks arising from the use of anticoagulants for rodent control operations in anthropic contexts can therefore only be mitigated by a proper selection of the active ingredient, bait formulation and administration techniques, since an active ingredient with selective action towards non-target species does not currently exist on the market. This document lists practical proposals aimed at reducing the possibility of toxic exposure to anticoagulant rodenticides and mitigate the toxicological risk of human baits and non-target species.

  17. Comparing appropriateness and equivalence of email interviews to phone interviews in qualitative research on reproductive decisions.

    Science.gov (United States)

    Hershberger, Patricia E; Kavanaugh, Karen

    2017-10-01

    Despite an increasing use of qualitative email interviews by nurse researchers, there is little understanding about the appropriateness and equivalence of email interviews to other qualitative data collection methods, especially on sensitive topics research. The purpose is to describe our procedures for completing asynchronous, email interviews and to evaluate the appropriateness and equivalency of email interviews to phone interviews in two qualitative research studies that examined reproductive decisions. Content analysis guided the methodological appraisal of appropriateness and equivalency of in-depth, asynchronous email interviews to single phone interviews. Appropriateness was determined by: (a) participants' willingness to engage in email or phone interviews, (b) completing data collection in a timely period, and (c) participants' satisfaction with the interview. Equivalency was evaluated by: (a) completeness of the interview data, and (b) insight obtained from the data. Of the combined sample in the two studies (N=71), 31% of participants chose to participate via an email interview over a phone interview. The time needed to complete the email interviews averaged 27 to 28days and the number of investigator probe-participant response interchanges was 4 to 5cycles on average. In contrast, the phone interviews averaged 59 to 61min in duration. Most participants in both the email and phone interviews reported they were satisfied or very satisfied with their ability to express their true feelings throughout the interview. Regarding equivalence, 100% of the email and phone interviews provided insight into decision processes. Although insightful, two of the email and one phone interview had short answers or, at times, underdeveloped responses. Participants' quotes and behaviors cited within four published articles, a novel evaluation of equivalency, revealed that 20% to 37.5% of the citations about decision processes were from email participants, which is

  18. Email communication in a developing country: different family physician and patient perspectives.

    Science.gov (United States)

    Makarem, Nisrine N; Antoun, Jumana

    2016-01-01

    Email communication between physicians and patients could improve access to and delivery of health care. Most of the literature studies about email communication between physicians and patients have been conducted in developing countries. Therefore, this study aims to analyze the practices, attitudes, and barriers of both physicians' and patients' use of email within the same health care setting of a developing country. A cross-sectional paper-based survey was conducted among 39 physicians and 500 patients at the Family Medicine clinics of the American University of Beirut, a tertiary academic medical center. Most of the surveyed patients and physicians reported that they would like to communicate through email and agreed that it is useful. However, only 19% of the patients have ever communicated with their physicians via email, and only 5.1% of physicians have often communicated with their patients via email. Almost half of the patients surveyed were unaware of the possibility of this form of communication, and only 17% reported that their physician offered them his or her email address. In addition, physicians and patients did not agree on the services to be provided by email communication. For instance, almost half of the patients indicated consultation for an urgent medical matter as suitable for email communication. The use of email communication in health care is still scarce. Patients and physicians have different perspectives of its use and importance. Further rigorous research is needed to clarify the advantages and disadvantages of this form of communication, especially in the developing world. Interested physicians are encouraged to establish appropriate personal policies for email communication with adequate announcement and patient education plans.

  19. Email for the provision of information on disease prevention and health promotion.

    Science.gov (United States)

    Sawmynaden, Prescilla; Atherton, Helen; Majeed, Azeem; Car, Josip

    2012-11-14

    Email is a popular and commonly used method of communication, but its use in health care is not routine. Its application in health care has included the provision of information on disease prevention and health promotion, but the effects of using email in this way are not known. This review assesses the use of email for the provision of information on disease prevention and health promotion. To assess the effects of email for the provision of information on disease prevention and health promotion, compared to standard mail or usual care, on outcomes for healthcare professionals, patients and caregivers, and health services, including harms. We searched: the Cochrane Consumers and Communication Review Group Specialised Register (January 2010), the Cochrane Central Register of Controlled Trials (CENTRAL, The Cochrane Library, Issue 1 2010), MEDLINE (1950 to January 2010), EMBASE (1980 to January 2010), CINAHL (1982 to February 2010), ERIC (1965 to January 2010) and PsycINFO (1967 to January 2010). We searched grey literature: theses/dissertation repositories, trials registers and Google Scholar (searched July 2010). We used additional search methods: examining reference lists, contacting authors. Randomised controlled trials, quasi-randomised trials, controlled before and after studies and interrupted time series studies examining interventions where email is used by healthcare professionals to provide information to patients on disease prevention and health promotion, and taking the form of 1) unsecured email 2) secure email or 3) web messaging. We considered healthcare professionals or associated administrative staff as participants originating the email communication, and patients and caregivers as participants receiving the email communication, in all settings. Email communication was one-way from healthcare professionals or associated administrative staff originating the email communication, to patients or caregivers receiving the email communication. Two

  20. Design and Implementation of Malicious Code Detection Platform for iOS System%iOS系统恶意代码检测平台设计与实现

    Institute of Scientific and Technical Information of China (English)

    田庆宜

    2013-01-01

    随着苹果手机日益普及,苹果终端已成为黑客重要的攻击目标。黑客利用恶意代码窃取个人信息及窃财犯罪层出不穷。但目前执法部门缺乏对苹果iOS移动平台恶意代码的检测平台。文章以iOS平台安全模型为基础,在分析国内外攻击方法的基础上,设计了苹果恶意代码检测框架,在此基础上构筑了对iOS的app应用恶意代码检测平台。经实际测试,本平台具备对iOS系统恶意代码通讯流量及文件改变的检测能力。本平台总体成本较低,有利于装备基层执法部门。%With the increasing popularity of Apple mobile phone, apple terminal has become the important target of hackers. The malicious hackers steal personal information and crime emerge in an endless stream. But the law enforcement departments lack of detection platform for Apple iOS mobile platform of malicious code. This paper is based on the iOS platform security model, designed the apple of malicious code detection framework, on the basis of iOS app application platform to build a malicious code detection. The actual test, the platform has the ability of detecting malicious code iOS system communication trafifc and ifle change. The overall cost of the platform is relatively low, in favor of equipment in the basic law enforcement.

  1. Perceptions and use of e-mail among Universiti Utara Malaysia staff: A pilot study

    Science.gov (United States)

    Mohamed, Shafinah Farvin Packeer; Ku-Mahamud, Ku Ruhana; Ramli, Razamin; Abdullah, Kamarudin

    2017-10-01

    The use of e-mail has become common either for work purposes or personal usage. Despite its usefulness, complain about the overwhelming messages received which cause the users to have problem in managing those messages. Similar situation occurred among Universiti Utara Malaysia (UUM) staff. Thus, a pilot study was conducted to investigate its staff's perception and use of e-mail in order to improve the e-mail service provided to them. This paper discusses the findings from the pilot study, which involves 41 UUM staff. Self-administered questionnaires were used to gather the data, while descriptive statistical analysis was used for data analysis. The findings of the study reveal that UUM staff appreciate the e-mail service. However they faced problems like limited storage size and overwhelming e-mails. They think that UUM e-mail is being abused by the repeating advertisements and news sent to them. The output of this study can be used as a guideline by the UUM management in revising its e-mail policy to serve better quality of e-mail service.

  2. An E-mail Service in a Military Adolescent Medicine Clinic: will teens ...

    African Journals Online (AJOL)

    The goal of this study was to determine utilization patterns of an Adolescent Medicine Clinic e-mail service. An e-mail service was offered to 6134 patients presenting for care to a military Adolescent Medicine Clinic in San Antonio, Texas over a 6-month period. Families had to complete an authorization form acknowledging ...

  3. Ethical Judgments Concerning Email Use in the Workplace: University Students' Perceptions.

    Science.gov (United States)

    Keith, Nancy; Perreault, Heidi; Sutliff, Kris

    2001-01-01

    A survey of 1,272 college students showed that most believed it appropriate to use company e-mail accounts for personal messages, but inappropriate to read others' e-mail or send messages with ethnic, racial, or sexual content. Students who participated in ethics discussions were less likely to rate certain behaviors as appropriate. (Contains 22…

  4. Con Artists Attack Colleges with Fake Help-Desk E-Mail

    Science.gov (United States)

    Young, Jeffrey R.

    2008-01-01

    An e-mail scam has hit tens of thousands of users at dozens of colleges over the past few weeks, leaving network administrators scrambling to respond before campus computer accounts are taken over by spammers. Students, professors, and staff members at the affected colleges received e-mail messages that purported to come from the colleges' help…

  5. Redefining Technological Literacy in the Workplace: A Qualitative Study of Social Affordances in Workplace Email

    Science.gov (United States)

    Bacci, Tina Marie

    2011-01-01

    This dissertation examines the social affordances of workplace email use. Through group and individual interviews of six knowledge workers in a distributed real estate firm, it explores the extent workplace writers recognize and rely on extra-textual devices (i.e., copy, blind-copy, and forward devices) and email applications (i.e., email…

  6. New information technology and communication in health care: using e-mail for marketing services

    Directory of Open Access Journals (Sweden)

    Jorge Iván Martínez Espitia

    2015-01-01

    Full Text Available Research that was conducted was aimed to determine their use of e-mail independent health professionals. Email is one of the tools of information and communication that has shown great versatility and efciency as a means to improve the relationship between those who provide services or sell products users. Good communication is essential to keep current customers and attract new business prospects. To achieve the objective of the research a survey that measured the perception and use of email marketing by independent health professionals was conducted in Colombia. Four variables, including tenure email account, receiving these email accounts marketing of products or services, read marketing emails and use by marketing professionals were measured with email. The result of this study showed that independent health professionals in Colombia are familiar with this type of marketing. Generally interested incorporate it as one of your marketing tools, but do not know how to do this activity, which is described in a simple way how to do a marketing campaign with the use of emails to the users of health services.

  7. E-mail marketing grows up: a primer for the managed care industry.

    Science.gov (United States)

    Dysart, J

    2000-02-01

    Managed care plans are jumping onto the electronic marketing bandwagon in a big way, taking advantage of not only the basic E-mail system but also expanding on that medium and developing creative vehicles to send the health plan's message. In this article, the author describes how E-mail technology is being used to hone the marketing edge in MCOs.

  8. Location Is Everything: The Use and Marketing of Reference E-Mail

    Science.gov (United States)

    Collins, Susan L.

    2006-01-01

    Reference e-mail continues to be a vital reference service. This article studies the trends in reference e-mail use over an eight year period. Usage statistics are analyzed particularly in light of the marketing of the service via changes in the location of the service on the official university libraries' Web pages. Included are recommendations…

  9. Pandora's electronic box: GPs reflect upon email communication with their patients

    Directory of Open Access Journals (Sweden)

    Felicity Goodyear-Smith

    2005-11-01

    Conclusion Study sample closely mirrored current NZ GP population. Although few GPs emailed with patients, many might once barriers are addressed. GPs had a collective view of the appropriate boundaries for email communication, routine tasks and the transmission of information. GPs would encourage professional debate regarding guidelines for good practice, managing demand and remuneration.

  10. The Impact of Using Email on Improving the Writing Skills among Iranian Students

    Science.gov (United States)

    Janfaza, Abusaied; Shahsavari, Khadijeh; Soori, Afshin

    2014-01-01

    The need for the application of technology in education has been increased. One of the new approaches in technology is using email for learning a second or a foreign language. The present study aimed at investigating the effectiveness of using email in improving writing skills among Iranian EFL students. The participants of the study were 42…

  11. Power Perceptions and Negotiations in a Cross-National Email Writing Activity

    Science.gov (United States)

    Liu, Yichun

    2011-01-01

    The present study investigates EFL students' perceptions of power differentials and their negotiation strategies when communicating with native English-speaking students via emails. The study involved 28 Taiwanese and American undergraduates who participated in a semester-long cross-national email writing activity. Findings show that students in…

  12. Re-connect: designing accessible email communication support for persons with aphasia

    NARCIS (Netherlands)

    Mahmud, Al A.; Martens, J.B.O.S.

    2010-01-01

    In this paper we present some preliminary outcomes concerning the design of an email communication tool for persons with expressive aphasia. The purpose of our design is to make email accessible for aphasics. It is based on interviews with persons with aphasia and their partners and has been

  13. E-Mail Writing: Providing Background Information in the Core of Computer Assisted Instruction

    Science.gov (United States)

    Nazari, Behzad; Ninknejad, Sahar

    2015-01-01

    The present study highly supported the effective role of providing background information via email by the teacher to write e-mail by the students in learners' writing ability. A total number of 50 EFL advanced male students aged between 25 and 40 at different branches of Iran Language Institute in Tehran, Tehran. Through the placement test of…

  14. COMMUNICATION TOPICS AND STRATEGIES IN E-MAIL CONSULTATION: COMPARISON BETWEEN AMERICAN AND INTERNATIONAL UNIVERSITY STUDENTS

    Directory of Open Access Journals (Sweden)

    Sigrun Biesenbach-Lucas

    2005-05-01

    Full Text Available On today's "wired" college campuses, students avail themselves in increasing numbers of electronic channels, most notably e-mail, as a means to consult with their professors. While some research has investigated the purposes for which university students communicate with their instructors via e-mail, little research has examined differences in e-mail use between American and international students. In the present study, e-mail messages sent by American and international students enrolled in a teacher-preparation program to their professor were collected over the course of one semester. The messages were examined for three major communication topics (facilitative, substantive, relational and communication strategies (requesting, negotiating, reporting. Results indicate quantitative and qualitative differences in American and international students' e-mail topics and strategies, suggesting, similar to findings for face-to-face academic advising sessions, that American students demonstrate greater initiative and ability to adapt to the spatial and temporal remoteness between interlocutors in e-mail interaction, especially when using e-mail to solicit face-to-face appointments and input on projects. Findings also show that messages from both groups of students contained substantial relational communication, perhaps in an attempt to compensate for the lack of visual and paralinguistic clues in the e-mail medium.

  15. Use of email in communication between the Finnish primary healthcare system and general practitioners

    Directory of Open Access Journals (Sweden)

    Tuula Karhula

    2011-03-01

    Conclusion Especially during periods of change in the workplace, it is very important that management is conducted personally. Care must be taken so that disinformation does not spoil the informative value of email in the administration of primary health care. The needed technical assistance should be given to everyone in order to get the best advantage from the use of the email system.

  16. Relationships between Emotional States and Emoticons in Mobile Phone Email Communication in Japan

    Science.gov (United States)

    Kato, Shogo; Kato, Yuuki; Scott, Douglass

    2009-01-01

    Three related studies conducted on the role of emotional transfer in email messages were studied in order to better understand Japanese college students' online communications and their broader participation in online communications. The first study investigated users' initiatives in preventing emotional misunderstandings when sending email.…

  17. Mapping network development of international new ventures with the use of company e-mails

    NARCIS (Netherlands)

    Wakkee, I.A.M.

    2006-01-01

    International new ventures use e-mail frequently to communicate with globally dispersed contacts. In this paper we present and discuss a qualitative research method to map international network development based on company e-mails. Our approach also allows for combinations of inductive and deductive

  18. New information technology and communication in health care: using e-mail for marketing services

    Directory of Open Access Journals (Sweden)

    Jorge Iván Martínez Espitia

    2014-07-01

    Full Text Available Research that was conducted was aimed to determine their use of e-mail independent health professionals. Email is one of the tools of information and communication that has shown great versatility and efciency as a means to improve the relationship between those who provide services or sell products users. Good communication is essential to keep current customers and attract new business prospects. To achieve the objective of the research a survey that measured the perception and use of email marketing by independent health professionals was conducted in Colombia. Four variables, including tenure email account, receiving these email accounts marketing of products or services, read marketing emails and use by marketing professionals were measured with email. The result of this study showed that independent health professionals in Colombia are familiar with this type of marketing. Generally interested incorporate it as one of your marketing tools, but do not know how to do this activity, which is described in a simple way how to do a marketing campaign with the use of emails to the users of health services.

  19. Using Email Interviews in Qualitative Educational Research: Creating Space to Think and Time to Talk

    Science.gov (United States)

    James, Nalita

    2016-01-01

    The article explores how the Internet and email offer space for participants to think and make sense of their experiences in the qualitative research encounter. It draws on a research study that used email interviewing to generate online narratives to understand academic lives and identities through research encounters in virtual space. The…

  20. Understanding Style, Language and Etiquette in Email Communication in Higher Education: A Survey

    Science.gov (United States)

    Lewin-Jones, Jenny; Mason, Victoria

    2014-01-01

    This study investigates academic staff and student attitudes to style and etiquette of emails. Data were collected through two online staff and student surveys. Reported use and acceptability of particular features of email style were assessed. Open-ended responses yielded four themes: the balance between formality and informality, relationships,…

  1. Teaching Email Requests in the Academic Context: A Focus on the Role of Corrective Feedback

    Science.gov (United States)

    Nguyen, Thi Thuy Minh; Do, Thi Thanh Ha; Nguyen, Anh Tuan; Pham, Thi Thanh Thuy

    2015-01-01

    As email requests from students to professors have become increasingly common in academic settings, research has also shown second-language (L2) students' unfamiliarity with email etiquette in L2 has adversely affected their communication with their professors. The present study examines whether giving corrective feedback on students' performance…

  2. Using Email to Enable E[superscript 3] (Effective, Efficient, and Engaging) Learning

    Science.gov (United States)

    Kim, ChanMin

    2008-01-01

    This article argues that technology that supports both noncognitive and cognitive aspects can make learning more effective, efficient, and engaging (e[superscript 3]-learning). The technology of interest in this article is email. The investigation focuses on characteristics of email that are likely to enable e[superscript 3]-learning. In addition,…

  3. Test of the Behavioral Perspective Model in the Context of an E-Mail Marketing Experiment

    Science.gov (United States)

    Sigurdsson, Valdimar; Menon, R. G. Vishnu; Sigurdarson, Johannes Pall; Kristjansson, Jon Skafti; Foxall, Gordon R.

    2013-01-01

    An e-mail marketing experiment based on the behavioral perspective model was conducted to investigate consumer choice. Conversion e-mails were sent to two groups from the same marketing database of registered consumers interested in children's books. The experiment was based on A-B-A-C-A and A-C-A-B-A withdrawal designs and consisted of sending B…

  4. Combining textual and non-textual features for e-mail importance estimation

    NARCIS (Netherlands)

    Sappelli, M.; Verberne, S.; Kraaij, W.

    2013-01-01

    In this work, we present a binary classification problem in which we aim to identify those email messages that the receiver will reply to. The future goal is to develop a tool that informs a knowledge worker which emails are likely to need a reply. The Enron corpus was used to extract training

  5. Design and development of mobile Email system based on brew and IMAP4

    International Nuclear Information System (INIS)

    Chen Liangchen; Liu Shuzhen; Yan Xiaofei; Sun Gongxing

    2007-01-01

    In order to achieve IMAP4 support agreement in the mobile e-mail client application on the smart phone, using the Qualcomm introduced wireless devices designed for the BREW platform. Research on the BREW platform mobile and IMAP4 protocol, design and implement the 3G technology standard smart phone e-mail client based on the BREW platform. (authors)

  6. Using E-mail in a Math/Computer Core Course.

    Science.gov (United States)

    Gurwitz, Chaya

    This paper notes the advantages of using e-mail in computer literacy classes, and discusses the results of incorporating an e-mail assignment in the "Introduction to Mathematical Reasoning and Computer Programming" core course at Brooklyn College (New York). The assignment consisted of several steps. The students first read and responded…

  7. No association between the use of Bti for mosquito control and the dynamics of non-target aquatic invertebrates in French coastal and continental wetlands

    International Nuclear Information System (INIS)

    Lagadic, Laurent; Schäfer, Ralf B.; Roucaute, Marc; Szöcs, Eduard; Chouin, Sébastien; Maupeou, Jérôme de; Duchet, Claire

    2016-01-01

    The environmental safety of Bacillus thuringiensis subsp. israelensis (Bti) is still controversial, mainly because most of the previous field studies on its undesired effects were spatially limited and did not address the relationship between community similarity and application time and frequency. No general statement can therefore be drawn on the usage conditions of Bti that insure protection of non-target organisms. The present study was conducted in eight sites distributed over the main geographical sectors where mosquito control is implemented in mainland France and Corsica. Changes in non-target aquatic invertebrates were followed at elapsed time after repeated applications of two Bti formulations (VectoBac® WDG or 12AS) up to four consecutive years. We examined the influence of both larvicide treatments and environmental variables on community dynamics and dissimilarity between treated and control areas. As it can be argued that chironomids are the most vulnerable group of non-target invertebrates, we scrutinised potential Bti-related effects on the dynamics of their community. The use of VectoBac® WDG and 12AS in coastal and continental wetlands had no immediate or long-term detectable effect on the taxonomic structure and taxa abundance of non-target aquatic invertebrate communities, including chironomids. This applied to the main habitats where mosquito larvae occur, regardless of their geographic location. Flooding, whose frequency and duration depend on local meteorological and hydrological conditions, was identified as the main environmental driver of invertebrate community dynamics. Our findings add support to the environmental safety of currently available Bti formulations when following recommended application rates and best mosquito control practices. - Highlights: • Bti is used in a variety of continental and coastal wetlands against mosquito larvae. • Bti dosages recommended for mosquito control do not affect non-target invertebrates.

  8. No association between the use of Bti for mosquito control and the dynamics of non-target aquatic invertebrates in French coastal and continental wetlands

    Energy Technology Data Exchange (ETDEWEB)

    Lagadic, Laurent, E-mail: Laurent.Lagadic@rennes.inra.fr [INRA, UMR985 Écologie et Santé des Écosystèmes, Agrocampus Ouest, 65 rue de Saint Brieuc, F-35042 Rennes (France); Schäfer, Ralf B. [Quantitative Landscape Ecology, Institute for Environmental Sciences, University of Koblenz-Landau, Fortstraße 7, D-76829 Landau (Germany); Roucaute, Marc [INRA, UMR985 Écologie et Santé des Écosystèmes, Agrocampus Ouest, 65 rue de Saint Brieuc, F-35042 Rennes (France); Szöcs, Eduard [Quantitative Landscape Ecology, Institute for Environmental Sciences, University of Koblenz-Landau, Fortstraße 7, D-76829 Landau (Germany); Chouin, Sébastien; Maupeou, Jérôme de [Etablissement Interdépartemental pour la Démoustication du Littoral Atlantique, 1 rue Toufaire, F-17300 Rochefort-sur-Mer (France); Duchet, Claire [Entente Interdépartementale pour la Démoustication du Littoral Méditerranéen, 165 avenue Paul-Rimbaud, F-34184 Montpellier (France); and others

    2016-05-15

    The environmental safety of Bacillus thuringiensis subsp. israelensis (Bti) is still controversial, mainly because most of the previous field studies on its undesired effects were spatially limited and did not address the relationship between community similarity and application time and frequency. No general statement can therefore be drawn on the usage conditions of Bti that insure protection of non-target organisms. The present study was conducted in eight sites distributed over the main geographical sectors where mosquito control is implemented in mainland France and Corsica. Changes in non-target aquatic invertebrates were followed at elapsed time after repeated applications of two Bti formulations (VectoBac® WDG or 12AS) up to four consecutive years. We examined the influence of both larvicide treatments and environmental variables on community dynamics and dissimilarity between treated and control areas. As it can be argued that chironomids are the most vulnerable group of non-target invertebrates, we scrutinised potential Bti-related effects on the dynamics of their community. The use of VectoBac® WDG and 12AS in coastal and continental wetlands had no immediate or long-term detectable effect on the taxonomic structure and taxa abundance of non-target aquatic invertebrate communities, including chironomids. This applied to the main habitats where mosquito larvae occur, regardless of their geographic location. Flooding, whose frequency and duration depend on local meteorological and hydrological conditions, was identified as the main environmental driver of invertebrate community dynamics. Our findings add support to the environmental safety of currently available Bti formulations when following recommended application rates and best mosquito control practices. - Highlights: • Bti is used in a variety of continental and coastal wetlands against mosquito larvae. • Bti dosages recommended for mosquito control do not affect non-target invertebrates.

  9. Facework in Non-Face-Threatening Emails by Native and Non-Native English Speakers

    Directory of Open Access Journals (Sweden)

    - Зохре Ислами Р

    2015-12-01

    Full Text Available The aim of this research is to investigate the speech act of assignment submission and presence of facework in submission emails sent to faculty members by native and nonnative English speaking graduate students. Brown and Levinson’s politeness theory (1987 and Spencer-Oatey’s (2002, 2008 rapport management framework were utilized to analyze the emails. The corpus consisted of 105 emails from 40 NES and NNES students. Drawing on speech event analysis approach (Merrison, Wilson, Davies, & Haugh, 2012, we analyze both submission head act as well as optional elements like openings, small talk and closings in an email. Our exploratory study revealed that, contrary to the argument that CMC is a lean medium (Duthler, 2006 in which it is difficult to achieve interpersonal communication, through the employment of opening, small talk and closing strategies, students attended to relational goals in their email communication.

  10. Language Use in Computer-Mediated Communication: An Investigation into the Genre of Workplace Emails

    Directory of Open Access Journals (Sweden)

    Mohammad Awad AlAfnan

    2015-01-01

    Full Text Available This study investigated the moves and communicative purposes used in 522 email messages that were exchanged in a Malaysian private educational institute. Using Swales’s (1990 move approach, this study revealed that email writers used fourteen moves that are mainly six framing and eight content moves. Content moves included four main, one intertextual, one supporting and two follow-up moves. The four main content moves reflected the main communicative purposes of the emails that are discussing issues, enquiring about issues, couriering (delivering documents and informing about organizational and academic issues. The four communicative purposes varied in their structural organization, number of recipients and reaction to receiving the email. Keywords: Genre analysis; Email communication; Rhetorical moves; Communicative purposes; Discourse community

  11. A qualitative analysis of email interactions of children who use augmentative and alternative communication.

    Science.gov (United States)

    Sundqvist, Anett; Rönnberg, Jerker

    2010-12-01

    The aim of this study was to introduce email as a form of interaction for a group of six children who used augmentative and alternative communication. In a 12-week exploratory study, aspects of the email messages sent were analyzed. The content of the messages was analyzed by an inductive qualitative method, and seven descriptive categories emerged. The most frequently occurring categories were Social Etiquette, Personal/Family Statistics and Personal Common Ground. The children utilized different email strategies that included use of most of the above-mentioned categories. Through the email writing practice, the children developed new social skills and increased their social participation. Email practice may be a good strategy to increase children's social networks.

  12. Email English with new social media section and phrase bank of useful expressions

    CERN Document Server

    Emmerson, Paul

    2013-01-01

    Email English will help students of English to write effective and convincing communications, whether for work or study, whether by email or via social media. Based on hundreds of real examples, Email English deals systematically with key language for constructing effective and convincing emails in English as well as developing an appropriate voice through social media. Basics, including opening and closing emails, giving information, making requests, arranging meetings and checking understanding. Specific situations, such as negotiating, asking for payment and dealing with a supplier or customer. Skills such as describing business trends, relating cause and effect and reporting. General grammar problems, for instance, sentence structure, verb forms, comparison and punctuation. Communication styles: formal and informal, direct and indirect, ways of seeming friendlier. A NEW social media section presents strategies, tips and key language and expressions for writing blogs and on social media platforms such as F...

  13. Development of an E-mail Application Seemit and its Utilization in an Information Literacy Course

    Science.gov (United States)

    Kita, Toshihiro; Miyazaki, Makoto; Nakano, Hiroshi; Sugitani, Kenichi; Akiyama, Hidenori

    We have developed a simple e-mail application named Seemit which is designed for being used in information literacy courses. It has necessary and sufficient functionality of an e-mail application, and it has been developed for the purpose of learning basic operations and mechanisms of e-mail transfer easily. It is equipped with the function to automatically set the configuration of user's SMTP/POP servers and e-mail address, etc. The process of transferring e-mail via SMTP and POP can be demonstrated step by step showing actual messages passed during the client-server interaction. We have utilized Seemit in a university-wide information literacy course which holds about 1800 students.

  14. Using email reminders to engage physicians in an Internet-based CME intervention

    Directory of Open Access Journals (Sweden)

    Wall Terry

    2004-09-01

    Full Text Available Abstract Background Engaging practicing physicians in educational strategies that reinforce guideline adoption and improve the quality of healthcare may be difficult. Push technologies such as email offer new opportunities to engage physicians in online educational reinforcing strategies. The objectives are to investigate 1 the effectiveness of email announcements in engaging recruited community-based primary care physicians in an online guideline reinforcement strategy designed to promote Chlamydia screening, 2 the characteristics of physicians who respond to email announcements, as well as 3 how quickly and when they respond to email announcements. Methods Over a 45-week period, 445 recruited physicians received up to 33 email contacts announcing and reminding them of an online women's health guideline reinforcing CME activity. Participation was defined as physician log-on at least once to the website. Data were analyzed to determine participation, to compare characteristics of participants with recruited physicians who did not participate, and to determine at what point and when participants logged on. Results Of 445 recruited physicians with accurate email addresses, 47.2% logged on and completed at least one module. There were no significant differences by age, race, or specialty between participants and non-participants. Female physicians, US medical graduates and MDs had higher participation rates than male physicians, international medical graduates and DOs. Physicians with higher baseline screening rates were significantly more likely to log on to the course. The first 10 emails were the most effective in engaging community-based physicians to complete the intervention. Physicians were more likely to log on in the afternoon and evening and on Monday or Thursday. Conclusions Email course reminders may enhance recruitment of physicians to interventions designed to reinforce guideline adoption; physicians' response to email reminders may

  15. The impacts of email reminder/recall on adolescent influenza vaccination.

    Science.gov (United States)

    Dombkowski, Kevin J; Cowan, Anne E; Reeves, Sarah L; Foley, Matthew R; Dempsey, Amanda F

    2017-05-25

    We sought to: (1) explore the feasibility of using email for seasonal influenza vaccination reminders to parents of adolescents and (2) assess influenza vaccination rates among adolescents whose parents were randomized to either receive or not receive email reminders. Email addresses were obtained for parents of patients 10-18years from 4 practices in Michigan. Addresses were randomized to either receive email reminders, or not. Reminder messages were sent during October 2012-March 2013 (Season 1) and October 2013-March 2014 (Season 2). Vaccination status was determined 60days following the last email reminder for each season using the statewide Michigan Care Improvement Registry (MCIR); per protocol bivariate and multivariate logistic regression analyses were conducted to evaluate reminder notification. After email cleaning, testing, and matching with MCIR, approximately half of email addresses (2348 of 5312 in Season 1; 3457 of 6549 in Season 2) were randomized. Bivariate analyses found that influenza vaccination within 60days after notification date was similar among those notified (34%) versus not notified (29%) in both Season 1 (p=0.06) and Season 2 (39% vs. 37%, p=0.20). However, multivariate models adjusted for season, site, and receipt of notification in two seasons found a higher likelihood of influenza vaccination among children that received notification (aOR=1.28, 95% CI=1.09, 1.51); in addition, differences in influenza vaccination were also observed between practice sites (range: p=0.15 to pemail influenza vaccine reminders to parents of adolescents are feasible, but not without complications. Our study demonstrates that email reminders from practices can yield increases in influenza vaccination rates among adolescents. Practices should consider email as an option for influenza reminders and establish business practices for collecting and maintaining patient email addresses. This study is registered at www.ClinicalTrials.gov id #NCT01732315. Copyright

  16. Mass Communication and Journalism Faculty's Perceptions of the Effectiveness of Email Communication with College Students: A Nationwide Study

    Science.gov (United States)

    Yates, Bradford L.; Adams, Jennifer Wood; Brunner, Brigitta R.

    2009-01-01

    Nearly 700 US journalism and mass communication faculty (all teaching personnel) reported their perceptions of student email use via a web-based survey. This nationwide study focused on the content of email sent by faculty to students, email's effectiveness, and email's effect on student learning. Comparisons were made based on faculty gender,…

  17. A survey to evaluate patients' perspective concerning e-mail in an oncology practice

    International Nuclear Information System (INIS)

    Katzen, C.S.; Dicker, A.P.

    2001-01-01

    Purpose: Use of e-mail to improve physician-patient communication is becoming increasingly widespread, however, little research has been done to evaluate patients' interest and concerns regarding this technology. The goals of this study were to (1) evaluate the effectiveness of e-mail for communication between patients and their oncologist and (2) assess from the perspective of the patient the accessibility and usefulness of e-mail to facilitate medical treatment and advice as compared to conventional mail and telephone. E-mail as a clinical tool is a new trend in medicine that is growing quickly, however, there are few reports to date that evaluate the patients' perspective concerning e-mail usage. The use of e-mail in doctor-patient communication is potentially faster and more efficient than conventional mail and may reduce 'telephone tag'. E-mail initiated by the physician also allows for potential follow-up after treatment. Our study evaluated the types of transactions (personal medical questions, referrals, etc.) for which patients' preferred using e-mail in place of conventional communication methods. Materials and Methods: A self-administered survey (8 pages; 50 items) was mailed to 65 patients who were treated within the previous three years for prostate cancer in a radiation oncology practice. This survey explored the opinions and behaviors of patients with regard to online communication about general healthcare issues. The items included: patients' interest in e-mail, comfort in using e-mail, concerns about confidentiality, and access to e-mail. Patients' interest in using e-mail for specific situations were also evaluated, such as, making appointments, following up on treatment, or asking general health related questions. Patients' concerns about using email to communicate with healthcare organizations also were assessed. Results: The response rate to the survey was 63%, with a median age of 68 years (range 53-82), and the majority of respondents were

  18. The STRENGTH Ezine: an application of e-mail for health promotion in adolescent girls.

    Science.gov (United States)

    Abroms, Lorien C; Fagan, Pebbles; Eisenberg, Marla E; Lee, Hye-Seung H; Remba, Natania; Sorensen, Glorian

    2004-01-01

    Few studies have investigated the efficacy of e-mail for promoting behavior change. This study evaluates the participation in and outcomes associated with an e-mail-based health promotion program. Adolescent girls aged 15 to 17 years were recruited at a shopping mall. Participants with an e-mail address were assigned to the interactive e-mail magazine (Ezine) group (n = 37), whereas those not reporting an e-mail address were assigned to the non-Ezine group (n = 33). Participants in the Ezine group received the health Ezine, which included a quiz and an advice column, on a weekly basis. Results indicate that among the Ezine group, there was a high recall of the Ezine (81.1%), and more than one third of the participants replied to Ezine volumes with quiz answers or an advice question (36.6%). Differences in health behavior change between the Ezine and non-Ezine groups were not significant. E-mails on health-related matters can generate moderate levels of involvement in adolescent girls. Given the widespread use of e-mail, more studies are needed on the effective application of e-mail for health behavior change.

  19. E-mail Writing: Providing Background Information in the Core of Computer Assisted Instruction

    Directory of Open Access Journals (Sweden)

    Behzad NAZARI

    2015-01-01

    Full Text Available The present study highly supported the effective role of providing background information via e-mail by the teacher to write e-mail by the students in learners’ writing ability. A total number of 50 EFL advanced male students aged between 25 and 40 at different branches of Iran Language Institute in Tehran, Tehran. Through the placement test of Oxford English Language Placement Test (OELPT the students' proficiency level seems to be nearly the same. Participants were randomly assign into two groups of experimental and control, each consisting of 25 students. After the administration of the proficiency test, all groups were assigned to write topic 1 as the pre-test. Next, the teacher involved the learners in the new instruction (treatment. During writing topics 2, 3, 4, 5, 6, and 7 experimental group’s background knowledge was activated through e-mail before writing and e-mailing topics while the control group received no background knowledge activation through e-mail. After the treatment was given to the experimental group, the students in both groups were required to write another composition about the last topic, topic 8. Again, in this phase, none of the groups received any background information. The results indicated that providing background information via e-mail by the teacher to write e-mail by the students significantly improved learners’ writing ability.

  20. Email communication at the medical primary–secondary care interface: a qualitative exploration

    Science.gov (United States)

    Sampson, Rod; Barbour, Rosaline; Wilson, Philip

    2016-01-01

    Background There is little published research into the influence of email communication between primary and secondary care clinicians on patient care. Aim To explore the use of email communication between clinicians across the primary– secondary care interface, and how this may relate to patient care. Design and setting A qualitative study involving primary and secondary care services in the NHS Highland Health Board area, Scotland. Ten GPs and 12 hospital consultants were purposively sampled to reflect diversity. Method Eligible clinicians were invited to take part in a semi-structured interview. Data were analysed using a thematic analysis approach. Results Key themes that emerged for clinicians included general perceptions of email; using email in practice (managing workload, impact on patient journeys, and ‘quick answers’); system issues (variability and governance); relational aspects; and email skills. Conclusion Email communication between primary and secondary care clinicians generally has a positive impact on patient access to specialist expertise. Governance issues around the use of clinical email need to be defined. There may currently be a two-tier health service for those patients (and their GPs) requiring ‘quick answers’. PMID:27162209

  1. The relevance of existing health communication models in the email age: An

    Science.gov (United States)

    Fage-Butler, Antoinette Mary; Jensen, Matilde Nisbeth

    2015-01-01

    Email communication is being integrated relatively slowly into doctor–patient communication. Patients have expressed enthusiasm for the medium, while doctors are generally more reluctant. As existing health communication models have characteristically assumed the co-presence of doctor and patient and primarily reflect medical practitioners’ perspectives, their suitability in relation to email communication and patients’ perspectives warrants further investigation. Following a two-step process and using the methodology of the integrative literature review, 29 articles from 2004–2014 are analysed with the aim of investigating the advantages and disadvantages of the medium of email from the patient’s perspective. The findings are compared to the health communication models of biomedicine, patient-centeredness, patient education and patient empowerment to investigate these models’ relevance for doctor–patient email communication. Results show that patients identify numerous advantages with email communication, including improved convenience and access, more detailed informational exchanges, greater reflection opportunities, freedom from the medical gaze and the potential to level out power imbalances, as well as a number of primarily medium-related disadvantages. The findings indicate that email can counteract some of the communicative problems associated with biomedicine and suggest the ongoing relevance of aspects of the models of patient empowerment, patient-centeredness and patient education for email communication.

  2. Email communication at the medical primary-secondary care interface: a qualitative exploration.

    Science.gov (United States)

    Sampson, Rod; Barbour, Rosaline; Wilson, Philip

    2016-07-01

    There is little published research into the influence of email communication between primary and secondary care clinicians on patient care. To explore the use of email communication between clinicians across the primary- secondary care interface, and how this may relate to patient care. A qualitative study involving primary and secondary care services in the NHS Highland Health Board area, Scotland. Ten GPs and 12 hospital consultants were purposively sampled to reflect diversity. Eligible clinicians were invited to take part in a semi-structured interview. Data were analysed using a thematic analysis approach. Key themes that emerged for clinicians included general perceptions of email; using email in practice (managing workload, impact on patient journeys, and 'quick answers'); system issues (variability and governance); relational aspects; and email skills. Email communication between primary and secondary care clinicians generally has a positive impact on patient access to specialist expertise. Governance issues around the use of clinical email need to be defined. There may currently be a two-tier health service for those patients (and their GPs) requiring 'quick answers'. © British Journal of General Practice 2016.

  3. Pediatric caregiver attitudes toward email communication: survey in an urban primary care setting.

    Science.gov (United States)

    Dudas, Robert Arthur; Crocetti, Michael

    2013-10-23

    Overall usage of email communication between patients and physicians continues to increase, due in part to expanding the adoption of electronic health records and patient portals. Unequal access and acceptance of these technologies has the potential to exacerbate disparities in care. Little is known about the attitudes of pediatric caregivers with regard to their acceptance of email as a means to communicate with their health care providers. We conducted a survey to assess pediatric caregiver access to and attitudes toward the use of electronic communication modalities to communicate with health care providers in an urban pediatric primary care clinic. Participants were pediatric caregivers recruited from an urban pediatric primary care clinic in Baltimore, Maryland, who completed a 35-item questionnaire in this cross-sectional study. Of the 229 caregivers who completed the survey (91.2% response rate), 171 (74.6%) reported that they use email to communicate with others. Of the email users, 145 respondents (86.3%) stated that they would like to email doctors, although only 18 (10.7%) actually do so. Among email users, African-American caregivers were much less likely to support the expanded use of email communication with health care providers (adjusted OR 0.34, 95% CI 0.14-0.82) as were those with annual incomes less than US $30,000 (adjusted OR 0.26, 95% CI 0.09-0.74). Caregivers of children have access to email and many would be interested in communicating with health care providers. However, African-Americans and those in lower socioeconomic groups were much less likely to have positive attitudes toward email.

  4. Teleradiology with DICOM e-mail: recommendations of rate at GIT; Teleradiologie mit DICOM E-mail: Empfehlungen der rate at GIT

    Energy Technology Data Exchange (ETDEWEB)

    Mildenberger, P.; Kaemmerer, M.; Klos, G.; Schuetze, B. [Klinik und Poliklinik fuer Radiologie, Johannes Gutenberg-Univ. Mainz (Germany); Engelmann, U. [Deutsches Krebsforschungszentrum, Abt. Medizinische und Biologische Informatik, Heidelberg (Germany); Ruggiero, S.; Runa, A.; Weisser, G. [Inst. fuer Klinische Radiologie, Universitaetsklinikum Mannheim (Germany); Schroeter, A. [CHILI GmbH, Heidelberg (Germany); Walz, M. [TUeV Industrie Service GmbH, TUeV-SUeD-Gruppe, Aerztliche Stelle fuer Qualitaetssicherung in der Radiologie, Eschborn (Germany)

    2005-05-01

    E-mail is ideal for ad-hoc connections in teleradiology. The DICOM standard offers the possibility to append DICOM data types as a MIME attachment to any e-mail, thus ensuring the transmission of the original DICOM data. Nevertheless, there are additional requirements (e.g. protection of data privacy) which must be obeyed. Because of the lack of given standards which would grant interoperability as well as manufacturer independence, teleradiology has not been established in Germany until today. Therefore, the IT-Team (Arbeitsgemeinschaft fuer Informationstechnologie, rate at GIT) of the Radiological Society of Germany (Deutsche Roentgengesellschaft, DRG) set up an initiative to standardise telemedicine by using e-mail. Its members agreed that an e-mail-based variant would be the most practicable way to a communication solution - as easy to implement as to use. In their opinion, e-mail represents the smallest common denominator for a safe data interchange that would fulfill the legal advantages for telemedicine in Germany. (orig.)

  5. How to Increase the Efficiency and Reach of Email Marketing: Case Onninen Finland

    OpenAIRE

    Nuutinen, Sami

    2015-01-01

    This thesis took an analytical and practical approach on email marketing, and studied it from the perspective of the case study company Onninen. The aim was at finding out how to increase the efficiency and reach of email marketing at the case company. The case company, Onninen, is a large Finnish distributor of HVACR, steel, and electrical goods. Email marketing can be one of the most effective tools for marketers to invest in. In order to find solutions to the aforementioned aim of the...

  6. Open-Rate Controlled Experiment in E-Mail Marketing Campaigns

    OpenAIRE

    Biloš, Antun; Turkalj, Davorin; Kelić, Ivan

    2016-01-01

    Purpose – The main purpose of this paper is to test the controlled experiment (A/B split) methodology in B2C oriented e-mail marketing campaigns. Design/Methodology/Approach – E-mail marketing techniques have been a substantial part of e-marketing methodology since the early Internet days of the mid-1990s. From the very beginning of Internet utilization for business purposes, e-mail was one of the most widely used communication techniques in B2B and B2C markets alike. Due to high volumes o...

  7. Email Between Patient and Provider: Assessing the Attitudes and Perspectives of 624 Primary Health Care Patients.

    Science.gov (United States)

    Seth, Puneet; Abu-Abed, Mohamed Ismail; Kapoor, Vikram; Nicholson, Kathryn; Agarwal, Gina

    2016-12-22

    Email between patients and their health care providers can serve as a continuous and collaborative forum to improve access to care, enhance convenience of communication, reduce administrative costs and missed appointments, and improve satisfaction with the patient-provider relationship. The main objective of this study was to investigate the attitudes of patients aged 16 years and older toward receiving email communication for health-related purposes from an academic inner-city family health team in Southern Ontario. In addition to exploring the proportion of patients with a functioning email address and interest in email communication with their health care provider, we also examined patient-level predictors of interest in email communication. A cross-sectional study was conducted using a self-administered, 1-page survey of attitudes toward electronic communication for health purposes. Participants were recruited from attending patients at the McMaster Family Practice in Hamilton, Ontario, Canada. These patients were aged 16 years and older and were approached consecutively to complete the self-administered survey (N=624). Descriptive analyses were conducted using the Pearson chi-square test to examine correlations between variables. A logistic regression analysis was conducted to determine statistically significant predictors of interest in email communication (yes or no). The majority of respondents (73.2%, 457/624) reported that they would be willing to have their health care provider (from the McMaster Family Practice) contact them via email to communicate health-related information. Those respondents who checked their personal email more frequently were less likely to want to engage in this electronic communication. Among respondents who check their email less frequently (fewer than every 3 days), 46% (37/81) preferred to communicate with the McMaster Family Practice via email. Online applications, including email, are emerging as a viable avenue for patient

  8. Combined influence of Bt rice and rice dwarf virus on biological parameters of a non-target herbivore, Nephotettix cincticeps (Uhler (Hemiptera: Cicadellidae.

    Directory of Open Access Journals (Sweden)

    Qianjin Wang

    Full Text Available The advent of genetically modified (GM Bt rice creates the possibility of interactions among Bt crops, crop pathogens and non-target herbivores. In particular, information on how pathogen-infected Bt-expressing plants will influence non-target herbivores is necessary to predict the sustainability of GM cropping systems. Laboratory bioassays were conducted to evaluate the potential combined impacts of rice dwarf virus (RDV and two Bt rice lines, T1C-19 (Cry1C and T2A-1 (Cry2A, on non-target green rice leafhopper (GRLH, Nephotettix cincticeps (Uhler (Hemiptera: Cicadellidae. In the first experiment, GRLHs feeding preference tests on Bt rice lines compared to a parental control rice line, MH63, were conducted. As rice plants were uninfected with RDV, GRLHs generally preferred the control MH63 line over the two Bt lines during the initial 8 h, with no significant preference during the following 64 h. As rice plants were infected with RDV, there were no clear preferences between the Bt rice lines and the control MH63 line. In the second experiment, we assessed the combined influence of RDV-infection status and Bt rice lines on GRLH biological parameters. Egg duration, adult weights, and male adult longevity were significantly affected on RDV-infected Bt rice. Other parameters, egg hatching rate, nymph survival and fecundity were not significantly influenced. We infer that interaction effect among two testing Bt rice lines and RDV will not lead to enlarged pest populations, thus demonstrating that growing these two Bt rice lines will poses negligible risk to GRLH in sustainable rice agroecosystems. Long-term field experiments to monitor the population dynamics of GRLHs at large scale need to be carried out to confirm the current results.

  9. Combined influence of Bt rice and rice dwarf virus on biological parameters of a non-target herbivore, Nephotettix cincticeps (Uhler) (Hemiptera: Cicadellidae).

    Science.gov (United States)

    Wang, Qianjin; Han, Naishun; Dang, Cong; Lu, Zengbin; Wang, Fang; Yao, Hongwei; Peng, Yufa; Stanley, David; Ye, Gongyin

    2017-01-01

    The advent of genetically modified (GM) Bt rice creates the possibility of interactions among Bt crops, crop pathogens and non-target herbivores. In particular, information on how pathogen-infected Bt-expressing plants will influence non-target herbivores is necessary to predict the sustainability of GM cropping systems. Laboratory bioassays were conducted to evaluate the potential combined impacts of rice dwarf virus (RDV) and two Bt rice lines, T1C-19 (Cry1C) and T2A-1 (Cry2A), on non-target green rice leafhopper (GRLH), Nephotettix cincticeps (Uhler) (Hemiptera: Cicadellidae). In the first experiment, GRLHs feeding preference tests on Bt rice lines compared to a parental control rice line, MH63, were conducted. As rice plants were uninfected with RDV, GRLHs generally preferred the control MH63 line over the two Bt lines during the initial 8 h, with no significant preference during the following 64 h. As rice plants were infected with RDV, there were no clear preferences between the Bt rice lines and the control MH63 line. In the second experiment, we assessed the combined influence of RDV-infection status and Bt rice lines on GRLH biological parameters. Egg duration, adult weights, and male adult longevity were significantly affected on RDV-infected Bt rice. Other parameters, egg hatching rate, nymph survival and fecundity were not significantly influenced. We infer that interaction effect among two testing Bt rice lines and RDV will not lead to enlarged pest populations, thus demonstrating that growing these two Bt rice lines will poses negligible risk to GRLH in sustainable rice agroecosystems. Long-term field experiments to monitor the population dynamics of GRLHs at large scale need to be carried out to confirm the current results.

  10. Effect of seed kernel aqueous extract from Annona squamosa against three mosquito vectors and its impact on non-target aquatic organisms

    Directory of Open Access Journals (Sweden)

    Ravichandran Ramanibai

    2016-09-01

    Full Text Available Objective: To evaluate the toxicity of Annona squamosa (A. squamosa aqueous (physiological saline seed soluble extract and its control of mosquito population. Methods: Ovicidal, larvicidal and pupicidal activity of A. squamosa crude soluble seed kernel extract was determined according to World Health Organization. The mortality of each mosquito stage was recorded after 24 h exposured to plant material. Toxicity assay was used to assess the non-target organisms with different concentrations according to Organisation for Economic Co-operation and Development. Results: The aqueous solubilized extracts of A. squamosa elicit the toxicity against all stages of Aedes aegypti, Anopheles stephensi and Culex quinquefasciatus, and the LC50 values against stages of egg, 1st-4th larvae were (1.45 and 1.26–2.5 mg/mL, (1.12 and 1.19–2.81 mg/ mL and (1.80 and 2.12–3.41 mg/mL respectively. The pupicidal activity also brought forth amended activity against all three mosquitoes species, and the LC50 values were consider to be 3.19, 2.42 and 4.47 mg/mL. Ultimately there was no mortality observed from non-target organism of Chironomus costatus. Conclusions: Based on the findings of the study, it suggests that the use of A. squamosa plant extract can act as an alternate insecticidal agents for controlling target mosquitoes without affecting the non-target aquatic insect. Further investigation to identify the active compounds and their mechanisms of action is recommended.

  11. [Target and non-target screening of volatile organic compounds in industrial exhaust gas using thermal desorption-gas chromatography-mass spectrometry].

    Science.gov (United States)

    Ma, Huilian; Jin, Jing; Li, Yun; Chen, Jiping

    2017-10-08

    A method of comprehensive screening of the target and non-target volatile organic compounds (VOCs) in industrial exhaust gas using thermal desorption-gas chromatography-mass spectrometry (TD-GC-MS) has been developed. In this paper, two types of solid phase adsorption column were compared, and the Tenex SS TD Tube was selected. The analytes were enriched into the adsorption tube by constant flow sampling, and detected by TD-GC-MS in full scan mode. Target compounds were quantified by internal standard method, and the quantities of non-target compounds were calculated by response coefficient of toluene. The method detection limits (MDLs) for the 24 VOCs were 1.06 to 5.44 ng, and MDLs could also be expressed as 0.004 to 0.018 mg/m 3 assuming that the sampling volume was 300 mL. The average recoveries were in the range of 78.4% to 89.4% with the relative standard deviations (RSDs) of 3.9% to 14.4% ( n =7). The established analytical method was applied for the comprehensive screening of VOCs in a waste incineration power plant in Dalian city. Twenty-nine VOCs were identified. In these compounds, only five VOCs were the target compounds set in advance, which accounted for 26.7% of the total VOCs identified. Therefore, this study further proved the importance of screening non-target compounds in the analysis of VOCs in industrial exhaust gas, and has certain reference significance for the complete determination of VOCs distribution.

  12. Impact of transgenic soybean expressing Cry1Ac and Cry1F proteins on the non-target arthropod community associated with soybean in Brazil.

    Science.gov (United States)

    Marques, Luiz H; Santos, Antonio C; Castro, Boris A; Storer, Nicholas P; Babcock, Jonathan M; Lepping, Miles D; Sa, Verissimo; Moscardini, Valéria F; Rule, Dwain M; Fernandes, Odair A

    2018-01-01

    Field-scale studies that examine the potential for adverse effects of Bt crop technology on non-target arthropods may supplement data from laboratory studies to support an environmental risk assessment. A three year field study was conducted in Brazil to evaluate potential for adverse effects of cultivating soybean event DAS-81419-2 that produces the Cry1Ac and Cry1F proteins. To do so, we examined the diversity and abundance of non-target arthropods (NTAs) in Bt soybean in comparison with its non-Bt near isoline, with and without conventional insecticide applications, in three Brazilian soybean producing regions. Non-target arthropod abundance was surveyed using Moericke traps (yellow pan) and pitfall trapping. Total abundance (N), richness (S), Shannon-Wiener (H'), Simpson's (D) and Pielou's evenness (J) values for arthropod samples were calculated for each treatment and sampling period (soybean growth stages). A faunistic analysis was used to select the most representative NTAs which were used to describe the NTA community structure associated with soybean, and to test for effects due to the treatments effects via application of the Principal Response Curve (PRC) method. Across all years and sites, a total of 254,054 individuals from 190 taxa were collected by Moericke traps, while 29,813 individuals from 100 taxa were collected using pitfall traps. Across sites and sampling dates, the abundance and diversity measurements of representative NTAs were not significantly affected by Bt soybean as compared with non-sprayed non-Bt soybean. Similarly, community analyses and repeated measures ANOVA, when applicable, indicated that neither Bt soybean nor insecticide sprays altered the structure of the NTA communities under study. These results support the conclusion that transgenic soybean event DAS-81419-2 producing Cry1Ac and Cry1F toxins does not adversely affect the NTA community associated with soybean.

  13. [Double-ambient CO2 concentration affects the growth, development and sucking behavior of non-target brown plant hopper Nilaparvata lugens fed on transgenic Bt rice.

    Science.gov (United States)

    Lu, Yong Qing; Dai, Yang; Yu, Xiu Ying; Yu, Fu-Lan; Jiang, Shou Lin; Zhou, Zong Yuan; Chen, Fa Jun

    2018-02-01

    In recent years, the two issues of climate change including elevated CO 2 etc., and resistance of transgenic Bt crops against non-target insect pests have received widespread attention. Elevated CO 2 can affect the herbivorous insects. To date, there is no consensus about the effect of elevated CO 2 on the suck-feeding insect pests (non-target insect pests of transgenic Bt crops). Its effects on the suck-feeding behavior have rarely been reported. In this study, CO 2 levels were set up in artificial climate chamber to examined the effects of ambient (400 μL·L -1 ) and double-ambient (800 μL·L -1 ) CO 2 levels on the suck-feeding behavior, growth, development, and reproduction of the non-target insect pest of transgenic Bt rice, brown planthopper, Nilaparvata lugens. The results showed that CO 2 level significantly affected the egg and nymph duration, longevity and body mass of adults, and feeding behavior of the 4th and 5th instar nymphs, while had no effect on the fecundity of N. lugens. The duration of eggs and nymphs, and the longevity of female adults were significantly shortened by 4.0%, 4.2% and 6.6% respectively, the proportion of the macropterous adults was significantly increased by 11.6%, and the body mass of newly hatched female adults was significantly decreased by 2.2% by elevated CO 2 . In addition, elevated CO 2 significantly enhanced the stylet puncturing efficiency of the 4th and 5th instar nymphs of N. lugens. The duration ofphloem ingestion of the N4b waveform was significantly prolonged by 60.0% and 50.1%, and the frequency significantly was increased by 230.0% and 155.9% for the 4th and 5th instar nymphs of N. lugens by elevated CO 2 , respectively. It was concluded that double-ambient CO 2 could promote the growth and development of N. lugens through enhancing its suck-feeding, shorten the generation life-span and increase the macropertous adults' proportion of N. lugens. Thus, it could result in the occurrence of non-target rice

  14. Effects of herbicides on non-target plants: How do effects in standard plant tests relate to effects in natural habitats?

    DEFF Research Database (Denmark)

    Strandberg, Beate; Bruus, Marianne; Kjær, Christian

    areas where risk assessment seems to be insufficient. The most extensive conclusion is that seed production is a more sensible end-point for risk assessment of herbicides than the currently used end-point biomass. Crop species, in general, were not less sensitive to herbicides than non-target species......The report presents the results on effects of herbicides on plants found in natural habitats within the agricultural land. Furthermore, it evaluates whether the current risk assessment of herbicides represents an adequate safeguard for protection of these species and habitats. We found several....... Finally, we found that interactions between species are important for their responses to herbicides....

  15. Ongewenste email

    NARCIS (Netherlands)

    Happé, R.H.

    2002-01-01

    Voorstel van de schrijver om in het wetsontwerp massale bezwaarschriften de factor rechtsbescherming een ruimere plek te geven en de belastingplichtige het recht te laten behouden een bezwaarschrift in te dienen dat individueel wordt behandeld en afgedaan.

  16. Report: Congressionally Requested Inquiry Into the EPA’s Use of Private and Alias Email Accounts

    Science.gov (United States)

    Report #13-P-0433, September 26, 2013. We found no evidence that the EPA used, promoted or encouraged the use of private “non-governmental” email accounts to circumvent records management responsibilities

  17. Hierarchical and Matrix Structures in a Large Organizational Email Network: Visualization and Modeling Approaches

    OpenAIRE

    Sims, Benjamin H.; Sinitsyn, Nikolai; Eidenbenz, Stephan J.

    2014-01-01

    This paper presents findings from a study of the email network of a large scientific research organization, focusing on methods for visualizing and modeling organizational hierarchies within large, complex network datasets. In the first part of the paper, we find that visualization and interpretation of complex organizational network data is facilitated by integration of network data with information on formal organizational divisions and levels. By aggregating and visualizing email traffic b...

  18. Providing cell phone numbers and email addresses to Patients: the physician's perspective

    Science.gov (United States)

    2011-01-01

    Background The provision of cell phone numbers and email addresses enhances the accessibility of medical consultations, but can add to the burden of physicians' routine clinical practice and affect their free time. The objective was to assess the attitudes of physicians to providing their telephone number or email address to patients. Methods Primary care physicians in the southern region of Israel completed a structured questionnaire that related to the study objective. Results The study population included 120 primary care physicians with a mean age of 41.2 ± 8.5, 88 of them women (73.3%). Physicians preferred to provide their cell phone number rather than their email address (P = 0.0007). They preferred to answer their cell phones only during the daytime and at predetermined times, but would answer email most hours of the day, including weekends and holidays (P = 0.001). More physicians (79.7%) would have preferred allotted time for email communication than allotted time for cell phone communication (50%). However, they felt that email communication was more likely to lead to miscommunication than telephone calls (P = 0.0001). There were no differences between male and female physicians on the provision of cell phone numbers or email addresses to patients. Older physicians were more prepared to provide cell phone numbers that younger ones (P = 0.039). Conclusions The attitude of participating physicians was to provide their cell phone number or email address to some of their patients, but most of them preferred to give out their cell phone number. PMID:21426591

  19. Providing cell phone numbers and email addresses to Patients: the physician's perspective

    Directory of Open Access Journals (Sweden)

    Freud Tamar

    2011-03-01

    Full Text Available Abstract Background The provision of cell phone numbers and email addresses enhances the accessibility of medical consultations, but can add to the burden of physicians' routine clinical practice and affect their free time. The objective was to assess the attitudes of physicians to providing their telephone number or email address to patients. Methods Primary care physicians in the southern region of Israel completed a structured questionnaire that related to the study objective. Results The study population included 120 primary care physicians with a mean age of 41.2 ± 8.5, 88 of them women (73.3%. Physicians preferred to provide their cell phone number rather than their email address (P = 0.0007. They preferred to answer their cell phones only during the daytime and at predetermined times, but would answer email most hours of the day, including weekends and holidays (P = 0.001. More physicians (79.7% would have preferred allotted time for email communication than allotted time for cell phone communication (50%. However, they felt that email communication was more likely to lead to miscommunication than telephone calls (P = 0.0001. There were no differences between male and female physicians on the provision of cell phone numbers or email addresses to patients. Older physicians were more prepared to provide cell phone numbers that younger ones (P = 0.039. Conclusions The attitude of participating physicians was to provide their cell phone number or email address to some of their patients, but most of them preferred to give out their cell phone number.

  20. Email and All that Jazz: Training Staff to Use Electronic Communication Tools Professionally

    Science.gov (United States)

    Stephens, Karen

    2008-01-01

    There are many benefits of e-mails. Through e-mail, a person can relay specific details to any number of "need to know" persons at the press of a "send" key at any time of day, without playing endless phone tag or waking someone up on the wrong side of the time zone. A person can also get "newsy" information out fast and save printing money, too.…