WorldWideScience

Sample records for politicians spin attacks

  1. Harassment, stalking, threats and attacks targeting New Zealand politicians: A mental health issue.

    Science.gov (United States)

    Every-Palmer, Susanna; Barry-Walsh, Justin; Pathé, Michele

    2015-07-01

    Due to the nature of their work, politicians are at greater risk of stalking, harassment and attack than the general population. The small, but significantly elevated risk of violence to politicians is predominantly due not to organised terrorism or politically motivated extremists but to fixated individuals with untreated serious mental disorders, usually psychosis. Our objective was to ascertain the frequency, nature and effects of unwanted harassment of politicians in New Zealand and the possible role of mental illness in this harassment. New Zealand Members of Parliament were surveyed, with an 84% response rate (n = 102). Quantitative and qualitative data were collected on Parliamentarians' experiences of harassment and stalking. Eighty-seven percent of politicians reported unwanted harassment ranging from disturbing communications to physical violence, with most experiencing harassment in multiple modalities and on multiple occasions. Cyberstalking and other forms of online harassment were common, and politicians felt they (and their families) had become more exposed as a result of the Internet. Half of MPs had been personally approached by their harassers, 48% had been directly threatened and 15% had been attacked. Some of these incidents were serious, involving weapons such as guns, Molotov cocktails and blunt instruments. One in three politicians had been targeted at their homes. Respondents believed the majority of those responsible for the harassment exhibited signs of mental illness. The harassment of politicians in New Zealand is common and concerning. Many of those responsible were thought to be mentally ill by their victims. This harassment has significant psychosocial costs for both the victim and the perpetrator and represents an opportunity for mental health intervention. © The Royal Australian and New Zealand College of Psychiatrists 2015.

  2. Politicians spin attacks against methadone, syringe replacement / Milda Seputyte

    Index Scriptorium Estoniae

    Seputyte, Milda

    2005-01-01

    Leedu parlamendiliikmed osalevad kampaanias, millega võideldakse narkomaanidele tasuta süstalde jagamise ja sõltuvuse vastase aine metadooni vastu, kuna nende arvates need meetmed pigem süvendavad narkomaaniat

  3. Experimental Flight Characterization of Spin Stabilized Projectiles at High Angle of Attack

    Science.gov (United States)

    2017-08-07

    impact point prediction for applications such as high-arcing, spin-stabilized munitions. 15. SUBJECT TERMS aerodynamics, spark range, spin...angles of attack increase the delivery error due to poor fire-control solutions (i.e., understanding the relationship between the gun pointing angle and...of downrange travel ) is also evident in the horizontal data. Fig. 3 Center-of-gravity motion The rolling motion is captured in Fig. 4. These

  4. Politicians lie, so do I.

    Science.gov (United States)

    Celse, Jérémy; Chang, Kirk

    2017-11-30

    This research analyzed whether political leaders make people lie via priming experiments. Priming is a non-conscious and implicit memory effect in which exposure to one stimulus affects the response to another. Following priming theories, we proposed an innovative concept that people who perceive leaders to be dishonest (such as liars) are likely to lie themselves. We designed three experiments to analyze and critically discussed the potential influence of prime effect on lying behavior, through the prime effect of French political leaders (including general politicians, presidents and parties). Experiment 1 discovered that participants with non-politician-prime were less likely to lie (compared to politician-prime). Experiment 2A discovered that, compared to Hollande-prime, Sarkozy-prime led to lying behavior both in gravity (i.e., bigger lies) and frequency (i.e., lying more frequently). Experiment 2B discovered that Republicans-prime yielded an impact on more lying behavior, and Sarkozy-prime made such impact even stronger. Overall, the research findings suggest that lying can be triggered by external influencers such as leaders, presidents and politicians in the organizations. Our findings have provided valuable insights into organizational leaders and managers in their personnel management practice, especially in the intervention of lying behavior. Our findings also have offered new insights to explain non-conscious lying behavior.

  5. Criticizing politicians in Ancient Comedy

    Directory of Open Access Journals (Sweden)

    María José García Soler

    2016-08-01

    Full Text Available Old Comedy brought into focus all aspects of life in Athens, with an infinitefreedom of speech. One of its main targets were the politicians who ruled thedestinies of the polis, criticized mercilessly for their public activities, but also fortheir physical and moral characteristics.

  6. How politicians and bureaucrats network

    DEFF Research Database (Denmark)

    Alexander, Damon; Lewis, Jenny; Considine, Mark

    2011-01-01

    Effective public administration relies on the passage of information through interpersonal communication networks. While we have a vast research literature concerning formal structures and roles in organizations, including public agencies and government institutions, we know far less about the flow...... of information through semiformal, voluntary interactions. In this paper we use a large survey to explore the networking patterns of politicians and bureaucrats and to compare these with the more formal structural attributes of hierarchy and functional specialization. Social network analysis and standard...

  7. Danish Politicians' Views on Special Operations

    DEFF Research Database (Denmark)

    Jensen, Lars Henrik Ehrensvärd

    2017-01-01

    and willingness of Danish politicians regarding the use of special operations. This may indicate a difference between the potential opportunities for employing special operations and what the politicians believe these to be and are willing to promote or allow. Conclusion: Pending further analysis of the data...

  8. Leading local politicians visit CERN

    CERN Multimedia

    2001-01-01

    Left to right:  Professor Maiani, Ernest Nycollin, Anne-Marie Comparini, and Jean Pépin surrounded by young PRAC. On the 13th of November leading local politicians : Mme Anne-Marie Comparini, Présidente du Conseil régional de Rhône-Alpes, M. Ernest Nycollin, Président du Conseil général de la Haute-Savoie et M. Jean Pépin, Président du Conseil général de l'Ain took part in a ceremony which featured the insertion of one of the first LHC magnets into its cryostat.  The department of l'Ain financed a large part of the contruction of building SMA 18 which will see intense activity during the assembly of LHC magnets over the next four years. The department of Haute-Savoie helped in the development of the ultrasonic welding machine for the superconducting cables and the conception of integrated circuits that will be used to measure temperature and pressure inside the magnets. T...

  9. Politics Backstage - Television Documentaries, Politics and Politicians

    Directory of Open Access Journals (Sweden)

    Ib Bondebjerg

    2006-09-01

    Full Text Available This article deals with "the transformation of visibility" in political discourse on and representation of politics and politicians in resent Dansih television documentaries. Drawing on the theories of Habermas, Meyrowitz and John B. Thompson, it is argued that the political persona on television is moved closer to the individual citizen, creating a sort "mediated quasi-inter- action" giving mediated communication a stronger element of face-to-face interaction. Together with the more pervasive "live" coverage of politics and politicians, this expands media coverage to both the backstage of political processes and the private and personal backstage of politicians, changing the form of democracy and public debate.

  10. Rotary balance data for a single-engine trainer design for an angle-of-attack range of 8 deg to 90 deg. [conducted in langely spin tunnel

    Science.gov (United States)

    Pantason, P.; Dickens, W.

    1979-01-01

    Aerodynamic characteristics obtained in a rotational flow environment utilizing a rotary balance located in the Langley spin tunnel are presented in plotted form for a 1/6 scale, single engine trainer airplane model. The configurations tested included the basic airplane, various wing leading edge devices, elevator, aileron and rudder control settings as well as airplane components. Data are presented without analysis for an angle of attack range of 8 to 90 degrees and clockwise and counter-clockwise rotations.

  11. Politicians, Managers, and Street-Level Bureaucrats

    DEFF Research Database (Denmark)

    May, Peter J.; Winter, Søren

    2010-01-01

    This article addresses the influence of politicians, managers, and the dispositions of street-level bureaucrats in shaping actions at the frontlines of policy implementation. We investigate these for the implementation of employment policy reforms in Denmark. Our findings show a large percentage...... of caseworkers emphasizing actions that are consistent with the national employment reform goal of getting clients into jobs quickly. The influence of politicians and managers in bringing this about is relatively limited in comparison to the influences of caseworkers’ understanding of policy goals...

  12. Politicians, Managers, and Street-Level Bureaucrats

    DEFF Research Database (Denmark)

    J. May, Peter; Winter, Søren

    2009-01-01

    This article addresses the influence of politicians, managers, and the dispositions of street-level bureaucrats in shaping actions at the frontlines of policy implementation. We investigate these for the implementation of employment policy reforms in Denmark. Our findings show a large percentage...... of caseworkers emphasizing actions that are consistent with the national employment reform goal of getting clients into jobs quickly. The influence of politicians and managers in bringing this about is relatively limited in comparison to the influences of caseworkers’ understanding of policy goals...

  13. Actors in Corruption: Business Politicians in Italy.

    Science.gov (United States)

    della Porta, Donatella

    1996-01-01

    Argues that the development of political corruption brings about important changes in the political system and in the characteristics of the political class. Describes the emergence and activities of a group of "business politicians" in Italy who have transformed political parties into socializing agencies for illicit activities. (MJP)

  14. Politicians, Managers, and Street-Level Bureaucrats

    DEFF Research Database (Denmark)

    J. May, Peter; Winter, Søren

    This article addresses the influence of politicians, managers, and the dispositions of street-level bureaucrats in shaping actions at the frontlines of policy implementation. We investigate these for the implementation of employment policy reforms in Denmark. Our findings show a large percentage ...

  15. Politicians, Managers, and Street-Level Bureaucrats

    DEFF Research Database (Denmark)

    May, Peter J.; Winter, Søren

    2012-01-01

    This article addresses the influence of politicians, managers, and the dispositions of street level bureaucrats in shaping actions at the frontlines of policy implementation. We investigate these for the implementation of employment policy reforms in Denmark. Our findings show a large percentage...... of caseworkers emphasizing actions that are consistent with thenational employment reform goal of getting clients into jobs quickly. The influence of politicians and managers in bringing this about is relatively limited in comparison to the influences of caseworkers’ understanding of policy goals......, their professional knowledge, and their policy predispositions. Our main contribution is an unpacking of the political and managerial influences on caseworkers’ policy emphases. We find direct effects and, more notably, indirect effects that operate on the influence of caseworkers’ perceptions of policy goals...

  16. Politics Backstage - Television Documentaries, Politics and Politicians

    OpenAIRE

    Ib Bondebjerg

    2006-01-01

    This article deals with "the transformation of visibility" in political discourse on and representation of politics and politicians in resent Dansih television documentaries. Drawing on the theories of Habermas, Meyrowitz and John B. Thompson, it is argued that the political persona on television is moved closer to the individual citizen, creating a sort "mediated quasi-inter- action" giving mediated communication a stronger element of face-to-face interaction. Together...

  17. Politicians' Motivation, Role of Elections, and Policy Choices

    NARCIS (Netherlands)

    P.T. Wrasai (Phongthorn)

    2005-01-01

    textabstractWe develop a simple two period model to study the importance of motivational differences among politicians in describing the role of elections and explaining policy choices. In our model, politicians differ in their motives of running public office. Good politicians care about policies

  18. “GLOSSY” POLITICIANS: PORTRAYING WOMEN POLITICIANS IN ROMANIAN CONSUMER MAGAZINES

    Directory of Open Access Journals (Sweden)

    ROMINA SURUGIU

    2012-05-01

    Full Text Available Women consumer magazines (glossies represent the most important part of the specialized media all over the world. The main ingredients of their editorial “recipe” are the positive tone of the articles, and the optimistic, yet shallow approach to all the theme/subjects covered. Magazines are considered to be beautiful objects that inspire people to cherish them. Women magazines have been criticized in feminist media studies for portraying women in a stereotyped way and for encouraging a consumerist behavior among them. The role models offered by these media are mainly taken from the show business and fashion industry. Women politician are rarely present in the pages of these publications, especially in countries as Romania where the political participation of women is one of the lowest in Europe. The paper presents in the first part official figures regarding the political participation of Romanian women, and it discusses the results of the most important academic studies on women and media. A previous research showed, for example, that in a four years period, three important Romanian magazines published only 9 article presenting women politicians. The general assumption in magazines desks (and in the society is that politics is a dirty business that does not match the beautiful world of magazines. The second part will focus on a case study, considered to be relevant for explaining the general image of women politicians and politics in Romanian consumer magazines. A visual analysis (from the popular culture perspective will be done to Elena Udrea’s pictorial feature for Tabu (Taboo magazine (November 2011. The choice of the case study was motivated by the following reasons: Elena Udrea is a controversial, yet successful politician, she has impersonated popular culture icons (Madonna, Jackie, Cleopatra and the feature has generated many positive and negative comments in media.

  19. Knowledge and attitudes of Swedish politicians concerning induced abortion.

    Science.gov (United States)

    Sydsjö, Adam; Josefsson, Ann; Bladh, Marie; Muhrbeck, Måns; Sydsjö, Gunilla

    2012-12-01

    Induced abortion is more frequent in Sweden than in many other Western countries. We wanted to investigate attitudes and knowledge about induced abortion among politicians responsible for healthcare in three Swedish counties. A study-specific questionnaire was sent to all 375 elected politicians in three counties; 192 (51%) responded. The politicians stated that they were knowledgeable about the Swedish abortion law. More than half did not consider themselves, in their capacity as politicians, sufficiently informed about abortion-related matters. Most politicians (72%) considered induced abortion to be primarily a 'women's rights issue' rather than an ethical one, and 54% considered 12 weeks' gestational age an adequate upper limit for induced abortion. Only about a third of the respondents were correctly informed about the number of induced abortions annually carried out in Sweden. Information and knowledge on induced abortion among Swedish county politicians seem not to be optimal. Changes aimed at reducing the current high abortion rates will probably not be easy to achieve as politicians seem to be reluctant to commit themselves on ethical issues and consider induced abortion mainly a women's rights issue.

  20. Rotary balance data for a typical single-engine general aviation design for an angle-of-attack range of 20 to 90 deg. 3: Influence of control deflection on predicted model D spin modes

    Science.gov (United States)

    Ralston, J. N.; Barnhart, B. P.

    1984-01-01

    The influence of control deflections on the rotational flow aerodynamics and on predicted spin modes is discussed for a 1/6-scale general aviation airplane model. The model was tested for various control settings at both zero and ten degree sideslip angles. Data were measured, using a rotary balance, over an angle-of-attack range of 30 deg to 90 deg, and for clockwise and counter-clockwise rotations covering an omegab/2V range of 0 to 0.5.

  1. Rational Planning and Politicians' Preferences for Spending and Reform

    DEFF Research Database (Denmark)

    George, Bert; Deschmidt, Sebastian; Nielsen, Poul Aaes

    2017-01-01

    The rational planning cycle of formulating strategic goals and using performance information to assess goal implementation is assumed to assist decision-making by politicians. Empirical evidence supporting this assumption is scarce. Our study replicates Nielsen and Baekgaard's (2015) experiment...

  2. The Tradition of Marketing Nigeria Politicians through Visual Media ...

    African Journals Online (AJOL)

    The Tradition of Marketing Nigeria Politicians through Visual Media. ... Before Nigerian independence in 1960, all political campaigns and debates were limited by the colonial masters to ... EMAIL FREE FULL TEXT EMAIL FREE FULL TEXT

  3. Trusting Politicians and Institutions in a Multi-Level Setting

    DEFF Research Database (Denmark)

    Hansen, Sune Welling; Kjær, Ulrik

    Trust in government and in politicians is a very crucial prerequisite for democratic processes. This goes not only for the national level of government but also for the regional and local. We make use of a large scale survey among citizens in Denmark to evaluate trust in politicians at different...... formation processes can negatively influence trust in the mayor and the councilors. Reaching out for the local power by being disloyal to one’s own party or by breaking deals already made can sometimes secure the mayoralty but it comes with a prize: lower trust among the electorate....

  4. [The cognitive-behavioral aspects of the personality of politicians].

    Science.gov (United States)

    Resch, Mária; Bella, Tamás

    2010-01-17

    At the research of the personality of politicians, the task is not psychopathology and thereby the diagnose of a certain illness, but the identification of those features, characteristic marks and the examination of those cognitive functions, attitudes that might affect the ability to lead, might influence the managerial and negotiating style as well as the decisions made during an eventual crisis. Basically, there are two approaches considering the role of personality in politics. The first one regards political events as a projection of the personality of the leading politician; the other one denies entirely the significance of the personality. With reference to the first school, the aim of the present essay is, from among the examinations of the personality of the politician by indirect and direct methods, the determination of the cognitive and behavioral marks connected to the last method. Among the indirect examinations are the analysis of speeches and interviews (psycholinguistics), the reflection of the metacommunicative marks and the psychological elaboration of biographical data (psychobiography). The character of the leading politician is important with respect to image building, campaign work and party competition, "survival".

  5. How Politicians Make Decisions: A Political Choice Experiment

    OpenAIRE

    Fatás, Enrique; Neugebauer, Tibor; Tamborero, Pilar

    2004-01-01

    The present paper reports on a political choice experiment with elected real-world politicians. A questionnaire on political and public issues is taken to examine whether prospect theory predicts the responses of experts from the field better than rational choice theory. The results indicate that framing effects exist but that expertise may weaken the deviation from rational choice.

  6. From hybrid-media system to hybrid-media politicians

    DEFF Research Database (Denmark)

    Blach-Ørsten, Mark; Eberholst, Mads Kæmsgaard; Burkal, Rasmus

    2017-01-01

    ’ media use is changing rapidly; 15%–16% of Danish candidates used Twitter in 2011 but 68% in 2015. In this large-sample content analysis, party leaders have high traditional-news-media and low Twitter presence, and younger candidates visa-versa, but some politicians have high presence in both. Hybrid...

  7. Do People “Like” Politicians on Facebook? Not really

    DEFF Research Database (Denmark)

    Nielsen, Rasmus Kleis; Cristian, Vaccari

    2013-01-01

    The online popularity of a few exceptional candidates has led many to suggest that social media have given politicians powerful new ways of communicating directly with voters. Examining whether this is happening on a significant scale, we find that, based on analysis of 224 major party candidates...

  8. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants....

  9. Effect of holding office on the behavior of politicians.

    Science.gov (United States)

    Enemark, Daniel; Gibson, Clark C; McCubbins, Mathew D; Seim, Brigitte

    2016-11-29

    Reciprocity is central to our understanding of politics. Most political exchanges-whether they involve legislative vote trading, interbranch bargaining, constituent service, or even the corrupt exchange of public resources for private wealth-require reciprocity. But how does reciprocity arise? Do government officials learn reciprocity while holding office, or do recruitment and selection practices favor those who already adhere to a norm of reciprocity? We recruit Zambian politicians who narrowly won or lost a previous election to play behavioral games that provide a measure of reciprocity. This combination of regression discontinuity and experimental designs allows us to estimate the effect of holding office on behavior. We find that holding office increases adherence to the norm of reciprocity. This study identifies causal effects of holding office on politicians' behavior.

  10. How politicians make decisions under risk: a political choice experiment

    OpenAIRE

    Enrique Fatás; Tibor Neugebauer; Pilar Tamborero

    2004-01-01

    We report on an experimental study with real-world politicians. These political experts face political choice problems under risk and probability. Thus, we test the frequently observed violations of rational choice theory -the reference point effect, loss aversion, framing effects, and the common ratio effect- with experts from the field. Their choices violate expected utility theory. Nevertheless, they appear to be more rational and less risk averse (loving) in the domain of gains (losses) t...

  11. Campaign Spending with Office-Seeking Politicians, Rational Voters and Multiple Lobbies

    NARCIS (Netherlands)

    Prat, A.

    1998-01-01

    I introduce a microfounded model of campaign finance with office-seeking politicians, a continuum of voters, and a large number of heterogeneous lobbies. Lobbies make contributions to politicians according to a common agency framework. Politicians use contributions to finance their electoral

  12. Heart Attack

    Science.gov (United States)

    ... properly causes your body's blood sugar levels to rise, increasing your risk of heart attack. Metabolic syndrome. This occurs when you have obesity, high blood pressure and high blood sugar. Having metabolic ...

  13. Heart Attack

    Science.gov (United States)

    ... family history of heart attack race – African Americans, Mexican Americans, Native Americans, and native Hawaiians are at ... Your doctor will prescribe the medicines that are right for you. If you have had a heart ...

  14. Divine marriage and the image of a politician

    Directory of Open Access Journals (Sweden)

    Šerman Elena M.

    2014-01-01

    Full Text Available It is a common place of the contemporary political science that the pattern of the image of a politician contains components based on the archaic cognitive structures. First of all, to such components the archetypes belong. The archetype is in turn intimately associated with the corresponding myth and ritual. Some of the rituals that accompany the realization of an archetype have roots stretching back into the cradle of human civilization, but remain relevant in the 21st century. The paper deals with the technologies of using the mythological motif of the divine (sacred marriage as a means of cultivation of the image of a politician. As a case studies the marriages of Corneliu Zelea Codreanu, the leader of the Rumanian extreme right-wing 'Legion of the Archangel Michael' (1926, and of the radical Yugoslav nationalist Željko Ražnatović Arkan, the commander of the 'Serb Volunteer Guard' (1995, are taken. The use of this subject has everything to do with the Jungian archetype which forms the basis of the image of the extreme right-wing politicians, namely, that of the Hero, for the motif of the 'bride acquisition' with the subsequent marriage is one of the culmination points of the corresponding mythological narrative. As the mass media render national importance to the actual marriage, not only does it activate through certain technologies the archaic layers of conscience of the target population, but it also reproduces an old behavioural pattern, i. e. participation in the mystery. In the author's opinion, the success of the activation of the divine marriage motif depends on a series of factors, such as the type of the society (agrarian or semi-agrarian, the charismatic type of the political leader, as well as certain ideology. The successful use of this motif makes it possible not only to sustain the positive image of a politician, but also to create a political myth. The author gives special consideration to the role of mass media in this

  15. Mário Schenberg: Physicist, politician and art critic

    International Nuclear Information System (INIS)

    Guzzo, M. M.; Reggiani, N.

    2015-01-01

    Mário Schenberg is considered one of the greatest theoretical physicists of Brazil. He worked in different fields of physics including thermodynamics, quantum mechanics, statistical mechanics, general relativity, astrophysics and mathematics. He was assistant of the Ukrainian naturalized Italian physicist Gleb Wataghin and worked with prestigious physicists like as the Brazilians José Leite Lopes and César Lattes, the Russian-born American George Gamow and the Indian astrophysicist Subrahmanyan Chandrasekhar. Besides, he was also an active politician and critic of art

  16. The Digital Political Communication of South Korean Politicians

    Directory of Open Access Journals (Sweden)

    Heike Hermanns

    2017-12-01

    Full Text Available The internet and social media have been credited with the potential to reinvigorate democracy by offering new avenues of political participation and communication between citi-zens and politicians. The results of empirical studies, however, call for caution, as many politi-cians refrain from fully exploring the interactive potential of new media. This case study focus-es on the web presence of Korean parliamentarians, using basic statistical analyses to explore the use of ICT as a means of political communication. It finds that Korean parliamentarians are less active online, treating ICT mainly as another channel for information distribution. It is thus concluded that ICT is not revolutionizing politics but reinforcing existing patterns of communi-cation that leave a gap between citizens and representatives. This paper was previously submit-ted to CeDem Asia 2016. The literature review and the methodology section have been expand-ed, and additional statistical data as well as further findings on Twitter were added.

  17. Geoscientists as Politicians; it is a necessity, not a luxury.

    Science.gov (United States)

    Hawarey, Mosab

    2016-04-01

    Conventionally speaking, geoscientists are not thought of as the proper material to become politicians. Rather, lawyers and businessmen are the premium candidates, all along with retired brass. This is highly eccentric when we execute a disciplined thought process based on the Measure of Rightness and Wrongness (MRW). As with any scientific research geoscientists are delighted to present to the world, any argument that lacks the underpinning MRW is useless; without the MRW one might hear 10 different opinions and consider each of them right because the presenter of each opinion has done his homework brilliantly. Facts are facts because of their own selves not because of people's perceptions of them. Perceptions might differ, but facts remain facts. Every two different points are a distance apart from each other; one straight distance. When there are 10 different opinions about that distance: bring a tape and measure it; the tape would constitute the MRW here, and the measurement might fit one out of the 10 opinions, and might fit none; there is absolutely no other probability. The same argument holds for all topics: regardless of the numerous opinions, only one is right or none is; two different opinions cannot be right at the same time. So, what is the material of Geoscientists? They are individuals with analytical capabilities, with skills to recognize problems, with skills to structure ways to deal with those problems, and with abilities to make the best usage of available resources. They are individuals who have made the conscious choice to dedicate their whole lives to study, understand, and sustain earth; hence all its inhabitants. It's not a mere profession for them; it's an obsession and way of life. By definition; they are scientists of Earth, they care about Earth as if they have fallen in love with it. It wasn't just a feeling that rushed through their veins for an hour then dissipated; they decided to pursue their own lives for the sake of maintaining

  18. Noblesse oblige? Social status and economic inequality maintenance among politicians.

    Science.gov (United States)

    Kraus, Michael W; Callaghan, Bennett

    2014-01-01

    Economic inequality is at historically high levels in the United States and is among the most pressing issues facing society. And yet, predicting the behavior of politicians with respect to their support of economic inequality remains a significant challenge. Given that high status individuals tend to conceive of the current structure of society as fair and just, we expected that high status members of the U.S. House of Representatives would be more likely to support economic inequality in their legislative behavior than would their low status counterparts. Results supported this prediction particularly among Democratic members of Congress: Whereas Republicans tended to support legislation increasing economic inequality regardless of their social status, the social status of Democrats - measured in terms of average wealth, race, or gender - was a significant predictor of support for economic inequality. Policy implications of the observed relationship between social status and support for economic inequality are considered.

  19. Effect of holding office on the behavior of politicians

    Science.gov (United States)

    Enemark, Daniel; Gibson, Clark C.; McCubbins, Mathew D.; Seim, Brigitte

    2016-01-01

    Reciprocity is central to our understanding of politics. Most political exchanges—whether they involve legislative vote trading, interbranch bargaining, constituent service, or even the corrupt exchange of public resources for private wealth—require reciprocity. But how does reciprocity arise? Do government officials learn reciprocity while holding office, or do recruitment and selection practices favor those who already adhere to a norm of reciprocity? We recruit Zambian politicians who narrowly won or lost a previous election to play behavioral games that provide a measure of reciprocity. This combination of regression discontinuity and experimental designs allows us to estimate the effect of holding office on behavior. We find that holding office increases adherence to the norm of reciprocity. This study identifies causal effects of holding office on politicians’ behavior. PMID:27856736

  20. [Marcel Sembat's Psychology: the Hobby of a Politician?

    Science.gov (United States)

    Carroy, Jacqueline

    The socialist politician Marcel Sembat’s unpublished manuscripts reveal the unexpected figure of a diarist with a passion for his own intimate, bodily, sexual and affective economy, and of an autodidact and sometimes polemical reader of psychology (for instance Pierre Janet’s). Sembat was recognized nonetheless as a potentially publishable author by Georges Dumas, the editor of the Journal de psychologie normale et pathologique, who asked him to contribute an article – which was never published – on dreaming. Sembat was also particularly receptive to Freud’s early conceptions of sexuality. Was Marcel Sembat an amateur, like the painter Ingres playing the violin? Could he be characterized as a “psychologist from below”? As a dilettante? Or simply as a cultivated man according to the meaning this period ascribed to the term?

  1. Magnus effects on spinning transonic missiles

    Science.gov (United States)

    Seginer, A.; Rosenwasser, I.

    1983-01-01

    Magnus forces and moments were measured on a basic-finner model spinning in transonic flow. Spin was induced by canted fins or by full-span or semi-span, outboard and inboard roll controls. Magnus force and moment reversals were caused by Mach number, reduced spin rate, and angle of attack variations. Magnus center of pressure was found to be independent of the angle of attack but varied with the Mach number and model configuration or reduced spin rate.

  2. The Working Conditions of Elite Politicians and Administrators at the National and Local Level

    DEFF Research Database (Denmark)

    Hjelmar, Ulf; Holm Pedersen, Lene; Bhatti, Yosef

    between family and work, exposure to the media, and harassment/threats against the politicians or their families. More than 70% of the ministers and mayors answered the survey. The surveys were supplemented by in-depth interviews with 3 ministers, 4 mayors and 5 top-administrators concerning the same...... exposed to harassment. Comparing the national and the local level politicians at the national level work longer hours, but surprisingly the politicians at the local level are equally much exposed to face-to-face harassment, though less to harassment on the social media. In comparison to the top...... politicians, the top administrators are less exposed to harassment. The implications of these results for the power balance between top politicians and administrators are discussed....

  3. Building up trust with the female politicians and women's organizations

    International Nuclear Information System (INIS)

    Heininen-Ojanperae, Marke

    1995-01-01

    Since the Finnish Parliament by its decision on September 24, 1993, cancelled or abandoned the option of a fifth nuclear unit for Finland, it has been difficult to approach the politicians in terms of promoting nuclear energy. Thus, our lacking of a concrete target, namely a scheme, a program or a definite project, has brought about an opportunity to find new and innovational forms of influence. As the future option of nuclear energy should be kept open from the energy security point of view and because existing installations are in operation with the consequently piling up nuclear waste, the dialogue should continue in a balanced and constructive way. Moreover, the environmental benefits of the existing and possible future units are always available. This general condition, the lack of a visible objective, applies to both male and female promoters, but it may be that men are more dependent on working in society in line with their Big Project thinking whereas the ladies' social roles have traditionally been more maintenance-oriented

  4. How do politicians use Facebook? An applied Social Observatory

    Directory of Open Access Journals (Sweden)

    Simon Caton

    2015-11-01

    Full Text Available In the age of the digital generation, written public data is ubiquitous and acts as an outlet for today's society. Platforms like Facebook, Twitter, Google+ and LinkedIn have profoundly changed how we communicate and interact. They have enabled the establishment of and participation in digital communities as well as the representation, documentation and exploration of social behaviours, and had a disruptive effect on how we use the Internet. Such digital communications present scholars with a novel way to detect, observe, analyse and understand online communities over time. This article presents the formalization of a Social Observatory: a low latency method for the observation and measurement of social indicators within an online community. Our framework facilitates interdisciplinary research methodologies via tools for data acquisition and analysis in inductive and deductive settings. By focusing our Social Observatory on the public Facebook profiles of 187 federal German politicians we illustrate how we can analyse and measure sentiment, public opinion, and information discourse in advance of the federal elections. To this extent, we analysed 54,665 posts and 231,147 comments, creating a composite index of overall public sentiment and the underlying conceptual discussion themes. Our case study demonstrates the observation of communities at various resolutions: “zooming” in on specific subsets or communities as a whole. The results of the case study illustrate the ability to observe published sentiment and public dialogue as well as the difficulties associated with established methods within the field of sentiment analysis within short informal text.

  5. Personality and Party Ideology Among Politicians. A Closer Look at Political Elites From Canada and Belgium

    Science.gov (United States)

    Joly, Jeroen K.; Hofmans, Joeri; Loewen, Peter

    2018-01-01

    We examined the relationship between Big Five personality and the political ideology of elected politicians. To this end, we studied 303 politicians from Flanders, Wallonia, and Canada, relating their self-reported Big Five scores to a partisanship-based measure of political ideology. Our findings show that, in line with the congruency model of personality, Openness to Experience is the best and most consistent correlate of political ideology, with politicians high on Openness to Experience being more likely to be found among the more progressive left-wing political parties. PMID:29719525

  6. Personality and Party Ideology Among Politicians. A Closer Look at Political Elites From Canada and Belgium.

    Science.gov (United States)

    Joly, Jeroen K; Hofmans, Joeri; Loewen, Peter

    2018-01-01

    We examined the relationship between Big Five personality and the political ideology of elected politicians. To this end, we studied 303 politicians from Flanders, Wallonia, and Canada, relating their self-reported Big Five scores to a partisanship-based measure of political ideology. Our findings show that, in line with the congruency model of personality, Openness to Experience is the best and most consistent correlate of political ideology, with politicians high on Openness to Experience being more likely to be found among the more progressive left-wing political parties.

  7. Heart Attack Recovery FAQs

    Science.gov (United States)

    ... recommendations to make a full recovery. View an animation of a heart attack . Heart Attack Recovery Questions ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  8. MARKETING POLITICIANS ON FACEBOOK: AN EXAMINATION OF THE SINGAPORE GENERAL ELECTION 2011

    OpenAIRE

    LENG Ho Keat

    2012-01-01

    In recent years, politicians have been using social network sites in garnering votes and supporters. However, marketing on social network sites is distinctively different from traditional marketing as consumers no longer play a passive role on this new marketing platform. This paper examines the use of social network site by two young female politicians in the recent General Election in Singapore and concludes that campaigning on social network sites raises two important issues. First of all,...

  9. THE ROLE OF LANGUAGE GAME IN THE BUILDING UP OF A POLITICIAN'S IMAGE (PRAGMALINGUISTIC PERLOCUTIONARY EXPERIMENT)

    OpenAIRE

    Khanina E. A.

    2016-01-01

    The article discusses the results of the pragmalinguistic experiment. Since language game is a result of speech creative work, which manifests the individuality of a linguistic personality, the politician can intentionally use language game and thereby consciously form his attractive image. The politician, who uses different kinds of language game, makes some personal characteristics building up the portrait aspect of effective political image more distinguished and thus affects the election ...

  10. How Politicians' Reelection Efforts Can Reduce Public Trust, Electoral Support, and Policy Approval

    DEFF Research Database (Denmark)

    Bøggild, Troels

    2016-01-01

    shows that, in addition to outcomes, people care about procedural fairness and, particularly, impartial decision-makers who make decisions without personal motives and interests. This, I argue, confronts politicians with a delicate task: Politicians must present voters with favorable policy outcomes...... but without appearing as if they pursue these policies based on a personal, vote-maximizing motive for reelection. In four survey experiments, I find support for this argument. Participants were significantly less inclined to trust and vote for politicians and support their policies when political decisions......Politicians’ desire for reelection motivates them to be responsive to voters’ policy preferences. In the traditional view, voters choose between candidates based on their delivery of favorable outcomes such as ideologically appealing policies or a prospering economy. However, research in psychology...

  11. Terrorists and Suicide Attacks

    National Research Council Canada - National Science Library

    Cronin, Audrey K

    2003-01-01

    Suicide attacks by terrorist organizations have become more prevalent globally, and assessing the threat of suicide attacks against the United States and its interests at home and abroad has therefore...

  12. Solidarity under Attack

    DEFF Research Database (Denmark)

    Meret, Susi; Goffredo, Sergio

    2017-01-01

    https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack......https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack...

  13. Pericarditis - after heart attack

    Science.gov (United States)

    ... include: A previous heart attack Open heart surgery Chest trauma A heart attack that has affected the thickness of your heart muscle Symptoms Symptoms include: Anxiety Chest pain from the swollen pericardium rubbing on the ...

  14. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  15. How Do Politicians Attribute Bureaucratic Responsibility for Performance? Negativity Bias and Interest Group Advocacy

    DEFF Research Database (Denmark)

    Nielsen, Poul A.; Moynihan, Donald P.

    2017-01-01

    Voters reward or punish politicians by deeming them responsible for positive and negative outcomes, but how, in turn, do politicians attribute responsibility to those who actually deliver public services? Inattention to this question renders incomplete current perspectives on democratic processes...... to attribute causal responsibility to bureaucratic leaders, but only in cases of low performance, suggesting a negativity bias in public sector responsibility attribution processes. Additionally, we offer evidence that interest group advocates influence how elected officials use performance information...... to attribute responsibility, but contingent on ideological alignment....

  16. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  17. Deconstructing national leadership: politicians' accounts of electoral success and failure in the Irish Lisbon Treaty referenda.

    Science.gov (United States)

    Burns, Michele; Stevenson, Clifford

    2013-03-01

    The Self Categorization approach to national leadership proposes that leaders rhetorically construct national identity as essentialized and inevitable in order to consensualize and mobilize the population. In contrast, discursive studies have demonstrated how national politicians flexibly construct the nation to manage their own accountability in local interactions, though this in turn has neglected broader leadership processes. The present paper brings both approaches together to examine how and when national politicians construct versions of national identity in order to account for their failure as well as success in mobilizing the electorate. Eight semi-structured conversational style interviews were conducted with a strategic sample of eight leading Irish politicians on the subject of the 2008/2009 Irish Lisbon Treaty referenda. Using a Critical Discourse Psychology approach, the hegemonic repertoire of the 'settled will' of the informed and consensualized Irish nation was identified across all interviews. Politicians either endorsed the 'settled will' repertoire as evidence of their successful leadership, or rejected the repertoire by denying the rationality or unity of the populace to account for their failure. Our results suggest national identity is only constructed as essentialized and inevitable to the extent that it serves a strategic political purpose. © 2011 The British Psychological Society.

  18. Gender differences in personal values of national and local Italian politicians, activists and voters.

    Science.gov (United States)

    Francescato, Donata; Mebane, Minou E; Vecchione, Michele

    2017-10-01

    Theorists of politics of presence postulate that women elected to political office would still hold values similar to ordinary women and therefore represent them better than male politicians. Gender differences in personal values, which underline and give coherence to core political values, have been found among voters: males score higher on self-enhancement values (power and achievement) and females higher on self-transcendence values (universalism and benevolence). Our study aims to explore if gender differences in personal values are still present among activists, local and national politicians. We administer a shortened version of the Portrait Values Questionnaire to 233 Italian national politicians (46% females), 425 local politicians (56% females), 626 political activists (44% females), and 3249 ordinary citizens (49% females). Our results confirm only partially politics of presence theory: females at all levels of political involvement score higher in self-transcendent values that emphasise concern for the welfare of others, but no significant gender differences emerge for self-enhancement, which favour the pursuit of self-interest. Our findings support ethical struggles for more balanced gender representation: a higher proportion of women in politics could strengthen the political representation of self-transcendence values. © 2015 International Union of Psychological Science.

  19. [Training of managers and politicians in ethics of science and ethics of public health].

    Science.gov (United States)

    Beaudry, Nicole

    2013-01-01

    First of all, I will identify the various possible objectives of training in ethics of science and health. I will then examine the institutional context in which managers and politicians act in the light of what is done in Quebec. This analysis will lead me to defend the thesis that in Quebec at least such training is necessary.

  20. Two politicians in a realistic experiment: attraction, discrepancy, intensity of delivery, and attitude change

    NARCIS (Netherlands)

    Wiegman, O.

    1985-01-01

    The leader of the Socialists in the Dutch Parliament and his Liberal opponent participated in this realistic experiment. Identical TV interviews with the two politicians were recorded and shown to subjects of both parties. The intensity of delivery was also varied: emotional versus rational. Our

  1. Outsourcing primary health care services--how politicians explain the grounds for their decisions.

    Science.gov (United States)

    Laamanen, Ritva; Simonsen-Rehn, Nina; Suominen, Sakari; Øvretveit, John; Brommels, Mats

    2008-12-01

    To explore outsourcing of primary health care (PHC) services in four municipalities in Finland with varying amounts and types of outsourcing: a Southern municipality (SM) which contracted all PHC services to a not-for-profit voluntary organization, and Eastern (EM), South-Western (SWM) and Western (WM) municipalities which had contracted out only a few services to profit or public organizations. A mail survey to all municipality politicians (response rate 52%, N=101) in 2004. Data were analyzed using cross-tabulations, Spearman correlation and linear regression analyses. Politicians were willing to outsource PHC services only partially, and many problems relating to outsourcing were reported. Politicians in all municipalities were least likely to outsource preventive services. A multiple linear regression model showed that reported preference to outsource in EM and in SWM was lower than in SM, and also lower among politicians from "leftist" political parties than "rightist" political parties. Perceived difficulties in local health policy issues were related to reduced preference to outsource. The model explained 27% of the variance of the inclination to outsource PHC services. The findings highlight how important it is to take into account local health policy issues when assessing service-provision models.

  2. The Effects of Tax Competition when Politicians Create Rents to Buy Political Support

    DEFF Research Database (Denmark)

    Eggert, Wolfgang; Sørensen, Peter Birch

    We set up a probabilistic voting model to explore the hypothesis that tax competition improves public sector efficiency and social welfare. In the absence of tax base mobility, distortions in the political process induce vote-maximising politicians to create rents to public sector employees...

  3. The effects of tax competition when politicians create rents to buy political support

    DEFF Research Database (Denmark)

    Eggert, Wolfgang; Sørensen, Peter Birch

    2008-01-01

    We set up a probabilistic voting model to explore the hypothesis that tax competition improves public sector efficiency and social welfare. In the absence of tax base mobility, distortions in the political process induce vote-maximising politicians to create rents to public sector employees...

  4. The Influence of Negative Advertising Frames on Political Cynicism and Politician Accountability.

    Science.gov (United States)

    Schenck-Hamlin, William J.; Procter, David E.; Rumsey, Deborah J.

    2000-01-01

    Examines the influence of negative political advertising frames on the thoughts and feelings undergraduate students generate in response to campaign advertising. Finds that participants were more likely to generate cynical comments and hold politicians accountable for the country's ills when reading candidate theme advertisements than ad hoc issue…

  5. Career or Family? The Fight of Two Prominent Scandinavian Feminist Politicians

    NARCIS (Netherlands)

    Ribberink, J.C.A.P.

    2017-01-01

    Internationally, in the twentieth century, women in higher and managerial occupations were confronted with barriers because they had to fight prejudices concerning their ability to maintain themselves in traditionally male occupations. This was the case for instance, with women politicians in the

  6. What's behind the leadership shift in sustainable development from politicians to CEOs?

    NARCIS (Netherlands)

    Zoeteman, B.C.J.

    2013-01-01

    Leadership in sustainable development has gradually shifted during the past decades, with forward-thinking CEOs of prominent multinational corporations increasingly taking over the role formerly played exclusively by national politicians. This paper discusses possible drivers for a growing divide in

  7. Dark Matter: The "Gravitational Pull" of Maternalist Discourses on Politicians' Decision Making for Early Childhood Policy in Australia

    Science.gov (United States)

    Bown, Kathryn; Sumsion, Jennifer; Press, Frances

    2011-01-01

    The article reports on a study investigating influences on Australian politicians' decision making for early childhood education and care (ECEC) policy. The astronomical concept of dark matter is utilised as a metaphor for considering normalising, and therefore frequently difficult to detect and disrupt, influences implicated in politicians'…

  8. Who will attack the competitors? How political parties resolve strategic and collective action dilemmas in negative campaigning.

    Science.gov (United States)

    Dolezal, Martin; Ennser-Jedenastik, Laurenz; Müller, Wolfgang C

    2017-11-01

    Negative campaigning presents parties with a collective action problem. While parties would prefer to have their competitors attacked, potential backlash effects from negative messages mean that individual politicians typically lack the incentives to carry out such attacks. We theorize that parties solve this problem by implementing a division of labour that takes into account the incentives of individual office holders, their availability for campaign activity, and media relevance. Drawing on these arguments we expect that holders of high public office and party leaders are less likely to issue attacks, leaving the bulk of the 'dirty work' to be carried out by party floor leaders and general secretaries. Examining almost 8000 press releases issued by over 600 individual politicians during four election campaigns in Austria, we find strong support for our theoretical expectations.

  9. Web server attack analyzer

    OpenAIRE

    Mižišin, Michal

    2013-01-01

    Web server attack analyzer - Abstract The goal of this work was to create prototype of analyzer of injection flaws attacks on web server. Proposed solution combines capabilities of web application firewall and web server log analyzer. Analysis is based on configurable signatures defined by regular expressions. This paper begins with summary of web attacks, followed by detection techniques analysis on web servers, description and justification of selected implementation. In the end are charact...

  10. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  11. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. ...

  12. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  13. Who takes care of the children? The presentation of female top politicians in the media

    Directory of Open Access Journals (Sweden)

    Christina Holtz-Bacha

    2013-10-01

    Full Text Available The essay reflects on the media representation commonly associates with women politicians. Starting with a critique of media coverage about some political leaders in several countries, such as Angela Merkel, Michelle Bachelet, Ségolène Royal, Cristina Fernández de Kirchner and Hillary Clinton, the paper discusses the phenomenon of the double bind to which women are subjected in politics: if a woman presents herself as being cool, calculating and aggressive as it is expected in the political business she risks to be rejected as a virago. If she recommends herself with allegedly female traits, she will be regarded as not being viable for the serious challenges of the political business. There is no easy formula for how women should represent themselves. Since there are only few opportunities for direct contact between politicians and the electorate, it is necessary to deal with public image reported by media.

  14. Plants under dual attack

    NARCIS (Netherlands)

    Ponzio, C.A.M.

    2016-01-01

    Though immobile, plants are members of complex environments, and are under constant threat from a wide range of attackers, which includes organisms such as insect herbivores or plant pathogens. Plants have developed sophisticated defenses against these attackers, and include chemical responses

  15. Heart attack - discharge

    Science.gov (United States)

    ... and lifestyle Cholesterol - drug treatment Controlling your high blood pressure Deep vein thrombosis - discharge Dietary fats explained Fast food tips Heart attack - discharge Heart attack - what to ask your doctor Heart bypass ... pacemaker - discharge High blood pressure - what to ask your doctor How to read ...

  16. Perceptions of Social Media: A Joint Arena for Voters and Politicians?

    OpenAIRE

    Segaard, Signe Bock

    2015-01-01

    While observers have focused on the political use of social media when exploring their democratic potential, we know little about users’ perceptions of these media. These perceptions could well be important to understanding the political use of social media. In exploring users’ perceptions, the article asks whether politicians and voters view social media in a similar way, and to what extent they consider social media to be an apt arena for political communication. Within a Norwegian context,...

  17. The Werther Effect of Two Celebrity Suicides: an Entertainer and a Politician

    OpenAIRE

    Kim, Jae-Hyun; Park, Eun-Cheol; Nam, Jung-Mo; Park, SoHee; Cho, Jaelim; Kim, Sun-Jung; Choi, Jae-Woo; Cho, Eun

    2013-01-01

    PURPOSE: Suicide is a major health problem in Korea. Extensive media exposure of celebrity suicide may induce imitative suicide, a phenomenon called the Werther effect. We examined the increased suicide risk following the suicides of an entertainer and a politician, and identified the relative suicide risks. METHODS: News articles about the celebrity suicides were obtained from three major newspapers and analysed for quantitative and qualitative features. Imitative suicide risk was investigat...

  18. What Drives Politicians to Run for Office: Money, Fame or Public Service?

    OpenAIRE

    Balian Arpie G.; Gasparyan Arman

    2017-01-01

    This is a multiple case study that investigates the motivations and ambitions of politicians who run for elections. It uses a mixed research design that applies inductive reasoning in the collection and analysis of data from six communities of rural Armenia. Data-collection instruments include in-depth interviews, focus groups, field observations and community survey. Whereas the study considers various theories of motivation and ambition, the conclusive evidence shows that the attractiveness...

  19. THE ATTITUDES OF DANISH POLITICIANS TO THE PROSPECTS OF URANIUM MINING IN GREENLAND

    OpenAIRE

    Westerberg, Niklas; Szpisjak, Aron; Schow, Marco

    2014-01-01

    The following case study may well function as a basis or groundwork for another project on Greenland concerning natural resources. The study gathered data primarily from interviews with experts on the subject i.e. politicians. The main point of this study is the attitudes of the Danish party political spectrum to the prospect of uranium extraction in Greenland. The study discusses whether or not Greenland has jurisdiction over its own resources, as well as entailing a summary of the jurisdict...

  20. Two politicians in a realistic experiment: attraction, discrepancy, intensity of delivery, and attitude change

    OpenAIRE

    Wiegman, O.

    1985-01-01

    The leader of the Socialists in the Dutch Parliament and his Liberal opponent participated in this realistic experiment. Identical TV interviews with the two politicians were recorded and shown to subjects of both parties. The intensity of delivery was also varied: emotional versus rational. Our findgins indicated that the experimental interveiw changed the attitude of the subjects. In addition, support was found for a second hypothesis: Attitude change was greater for the attractive source f...

  1. Women Politicians and Parliamentary Elections in Ukraine and Georgia in 2012

    Directory of Open Access Journals (Sweden)

    Tetiana Kostiuchenko

    2015-09-01

    Full Text Available Abstract: Post-communist countries undergoing social transformations in the last twenty years needed to implement political and economic reforms. Changes also had to support the principles of equality in the access to power, specifically gender quotas in executive and legislative branches of government and within political parties. The events in Ukraine and Georgia in 2004-2005 known as the “colour revolutions” gave impulse to the promotion of equality and implementation of reforms. However, the number of women participating in national politics in both countries remains low. This paper proposes an analysis of gender equality principles during the parliamentary election campaigns in Ukraine and Georgia in 2012 from the perspective of women’s participation in politics and their self-representation as politicians. This empirical study covers public attitudes towards women in politics and examines networks of female parliamentarians. The findings raise hopes for better representation of women in politics as female politicians promote them from the top down, and mass public perception of gender equality principles set the ground for bottom-up activism. Keywords: Gender Equality, Women Politicians, Public Attitudes, Social Network Analysis (SNA

  2. Politics and Politicians – Main Topic and Main Characters on Television News

    Directory of Open Access Journals (Sweden)

    Viktorija Car

    2010-01-01

    Full Text Available The paper examines the relationship between television as a medium, and politics and politicians as the content of television news in Croatia. The first part of the paper explains the models of ‘media logic’, ‘partisan logic’ and ‘party logic’. The second part of the paper presents the results of the research conducted on the representative sample of primetime news HTV Dnevnik for the period 1991-2009, and Nova TV Dnevnik and RTL Vijesti for the period 2005-2009. The goal of the research was to examine the presence of political topics on primetime news, as well to what extent politicians are presented as main characters. The results show a sustained decline of politics on the news and their simultaneous replacement by news on disasters and lifestyle. Further, citizens and their opinion become more important than opinions of politicians, experts and scientists. Comparing the news on public service television and on commercial televisions, the author elaborates on the internal processes and changes of the television medium and finally introduces the concept of ‘power logic’ to explain news selection and news editing on the Croatian TV channels.

  3. Monarchy, jesters, politicians and audiences Comparison of TV satire in UK and Spain

    Directory of Open Access Journals (Sweden)

    José Luis Valhondo Crego, Ph. D.

    2011-01-01

    Full Text Available Satire programmes have become a frequent form of political communication on TV. After the liberalisation of media and the globalization of formats, countries like Spain have adopted satirical formats derived from earlier ones, which relied on old traditions from nearly the inception of television similar to the United Kingdom. The goal of this article is to build a definition of the genre, taking into account the examples of the two mentioned countries and, also, referring to both periods, before and after liberalisation. We will use a comparative methodology relative to the profile of the audiences, of the buffoons of satire and the role played by the politicians through the short history of television satire. The results point to an evolution. During the sixties in the past century, the genre targeted the middle classes, writers tried to popularize politics for a society respectful to the Establishment and politicians censored the program in case it created an imbalance between ideological options during elections. In the nineties, satire jesters acquired the main role in the show and the politicians not only immunized themselves against satire but seemed to take advantage of it.

  4. "Islam" In the Anti-Multicultural Rhetoric of Western European Politicians and Anthropologists: Congruence or Coincidence?

    Directory of Open Access Journals (Sweden)

    Marko Pišev

    2016-02-01

    Full Text Available The recent rhetoric of the "end" or "failure" of multiculturalism in Europe and beyond came as no surprise to anthropologists. Moreover, the statements made by leading politicians of key European economies seem as though they are based on the decades old anthropological critique of the consequences of the failed implementation of multicultural policies in Europe and on the global level. It is as though the messages we have been getting over the course of the last few years – that multicultural policies are contraindicated, that they weaken the contacts between cultures, rob individuals of the right to change and chose their identities and strengthen intra-cultural mediators of power, with patriarchy, violence against women and children, leaving school, religious fundamentalism and even terrorism as main consequences – are being read by politicians from anthropological analyses of abuses of collective "cultural" rights. The paper considers the nature of this similarity between the discourse of politicians and anthropologists with a special emphasis on the status of "Islam" in them, and discusses whether it is congruence or mere coincidence of stances toward minorities, immigrants and cultural differences, as toward the regulations which were tasked with protecting this diversity as a fundamental European value which today, at least at the rhetorical level, seems to be fading.

  5. Rotary balance data for a typical single-engine general aviation design for an angle-of-attack range of 8 deg to 90 deg. 1: Influence of airplane components for model D. [Langley spin tunnel tests

    Science.gov (United States)

    Ralston, J.

    1983-01-01

    The influence of airplane components, as well as wing location and tail length, on the rotational flow aerodynamics is discussed for a 1/6 scale general aviation airplane model. The airplane was tested in a built-up fashion (i.e., body, body-wing, body-wing-vertical, etc.) in the presence of two wing locations and two body lengths. Data were measured, using a rotary balance, over an angle-of-attack range of 8 deg to 90 deg, and for clockwise and counter-clockwise rotations covering an omega b/2V range of 0 to 0.9.

  6. The good, the bad, and the voter: the impact of hate speech prosecution of a politician on the electoral support for his party

    NARCIS (Netherlands)

    van Spanje, J.; de Vreese, C.

    2015-01-01

    Hate speech prosecution of politicians is a common phenomenon in established democracies. Examples of politicians tried for hate speech include Nick Griffin in Britain and Jean-Marie Le Pen in France. Does hate speech prosecution of politicians affect the electoral support for their party? This is

  7. Spin current

    CERN Document Server

    Valenzuela, Sergio O; Saitoh, Eiji; Kimura, Takashi

    2012-01-01

    In a new branch of physics and technology called spin-electronics or spintronics, the flow of electrical charge (usual current) as well as the flow of electron spin, the so-called 'spin current', are manipulated and controlled together. This book provides an introduction and guide to the new physics and application of spin current.

  8. Heart Attack Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for heart...

  9. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  10. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  11. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  12. Geometrical spin symmetry and spin

    International Nuclear Information System (INIS)

    Pestov, I. B.

    2011-01-01

    Unification of General Theory of Relativity and Quantum Mechanics leads to General Quantum Mechanics which includes into itself spindynamics as a theory of spin phenomena. The key concepts of spindynamics are geometrical spin symmetry and the spin field (space of defining representation of spin symmetry). The essence of spin is the bipolar structure of geometrical spin symmetry induced by the gravitational potential. The bipolar structure provides a natural derivation of the equations of spindynamics. Spindynamics involves all phenomena connected with spin and provides new understanding of the strong interaction.

  13. Why do Indonesian politicians promote shari’alaws? An analytic framework for Muslim-majority democracies

    OpenAIRE

    Pisani, Elizabeth; Buehler, Michael

    2016-01-01

    Taking the discussion in the existing literature on the adoption of shari’a laws in democratising Muslim-majority countries as a starting point, we posit that there are two broad motivations for democratically-elected politicians to adopt shari’a laws and regulations: ideological conviction on the one hand and response to the expressed or perceived preference of constituents on the other hand. The ‘demand side’ can be further divided into the preferences of individual voters, and the interest...

  14. Freedom of speech versus freedom of religion? The case of Dutch politician Geert Wilders

    OpenAIRE

    Howard, Erica

    2017-01-01

    Dutch right-wing politician Geert Wilders has already been prosecuted once for incitement to hatred and group defamation over remarks and a film criticising Islam and comparing the Quran to Hitler’s Mein Kampf. He was acquitted, but now faces another criminal trial on the same charges concerning remarks he made in March 2014 about ‘fewer Moroccans’. This Article examines Wilders’ expressions which led to both prosecutions. The case law of the European Court of Human Rights on freedom of expre...

  15. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  16. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  17. Political strategies in difficult times - The "backstage" experience of Swedish politicians on formal priority setting in healthcare.

    Science.gov (United States)

    Garpenby, Peter; Nedlund, Ann-Charlotte

    2016-08-01

    This paper contributes to the knowledge on the governing of healthcare in a democratic context in times of austerity. Resource allocation in healthcare is a highly political issue but the political nature of healthcare is not always made clear and the role of politicians is often obscure. The absence of politicians in rationing/disinvestment arrangements is usually explained with blame-shifting arguments; they prefer to delegate "the burden of responsibility" to administrative agencies or professionals. Drawing on a case where Swedish regional politicians involved themselves in setting priorities at a more detailed level than previously, the findings suggest that the subject of "blame avoidance" is more complicated than usually assumed. A qualitative case study was designed, involving semi-structured interviews with 14 regionally elected politicians in one Swedish health authority, conducted in June 2011. The interviews were analysed through a thematic analysis in accordance with the "framework approach" by Ritchie and Lewis. Findings show that an overarching strategy among the politicians was to appear united and to suppress conflict, which served to underpin the vital strategy of bringing the medical profession into the process. A key finding is the importance that politicians, when appearing "backstage", attach to the prevention of blame from the medical profession. This case illustrates that one has to take into account that priority settings requires various types of skills and knowledges - not only technical but also political and social. Another important lesson points toward the need to broaden the political leadership repertoire, as leadership in the case of priority setting is not about politicians being all in or all out. The results suggest that in a priority-setting process it is of importance to have politics on-board at an early stage to secure loyalty to the process, although not necessarily being involved in all details. Copyright © 2016 Elsevier

  18. The Werther Effect of Two Celebrity Suicides: an Entertainer and a Politician

    Science.gov (United States)

    Kim, Jae-Hyun; Park, Eun-Cheol; Nam, Jung-Mo; Park, SoHee; Cho, Jaelim; Kim, Sun-Jung; Choi, Jae-Woo; Cho, Eun

    2013-01-01

    Purpose Suicide is a major health problem in Korea. Extensive media exposure of celebrity suicide may induce imitative suicide, a phenomenon called the Werther effect. We examined the increased suicide risk following the suicides of an entertainer and a politician, and identified the relative suicide risks. Methods News articles about the celebrity suicides were obtained from three major newspapers and analysed for quantitative and qualitative features. Imitative suicide risk was investigated by applying a Poisson time series autoregression model with suicide mortality data from the National Statistics Office for 1.5 years before and 1.5 years after each celebrity’s suicide. The period with a significantly increased number of suicides immediately after the celebrity’s suicide determined the Werther effect band. The relative risk during this period was examined for different ages, genders, and suicide methods. Results News reports were more numerous and they contained more positive definitions about the entertainer’s suicide. The risk of suicide deaths rose markedly after both celebrity suicides. However, the Werther effect band was longer for the entertainer (6 weeks) than for the politician (4 weeks). The relative suicide risk was significant for almost all ages and both genders during that of both individuals. Use of the same suicide method was a prominent risk factor after both celebrity suicides. Conclusions Our results confirm the existence of imitative suicide behaviours, suggesting a facilitation effect of media reports. Guidelines for responsible media reporting need to be implemented to enhance public mental health in Korea. PMID:24386428

  19. The werther effect of two celebrity suicides: an entertainer and a politician.

    Directory of Open Access Journals (Sweden)

    Jae-Hyun Kim

    Full Text Available PURPOSE: Suicide is a major health problem in Korea. Extensive media exposure of celebrity suicide may induce imitative suicide, a phenomenon called the Werther effect. We examined the increased suicide risk following the suicides of an entertainer and a politician, and identified the relative suicide risks. METHODS: News articles about the celebrity suicides were obtained from three major newspapers and analysed for quantitative and qualitative features. Imitative suicide risk was investigated by applying a Poisson time series autoregression model with suicide mortality data from the National Statistics Office for 1.5 years before and 1.5 years after each celebrity's suicide. The period with a significantly increased number of suicides immediately after the celebrity's suicide determined the Werther effect band. The relative risk during this period was examined for different ages, genders, and suicide methods. RESULTS: News reports were more numerous and they contained more positive definitions about the entertainer's suicide. The risk of suicide deaths rose markedly after both celebrity suicides. However, the Werther effect band was longer for the entertainer (6 weeks than for the politician (4 weeks. The relative suicide risk was significant for almost all ages and both genders during that of both individuals. Use of the same suicide method was a prominent risk factor after both celebrity suicides. CONCLUSIONS: Our results confirm the existence of imitative suicide behaviours, suggesting a facilitation effect of media reports. Guidelines for responsible media reporting need to be implemented to enhance public mental health in Korea.

  20. Thinking politics sociologically - The Daily Life of the Professional Politician between Innovation and Determinism

    Directory of Open Access Journals (Sweden)

    Massimo Cerulo

    2012-06-01

    Full Text Available Abstract: The aim of my essay is to present some reflections on the possibility of thinking politics sociologically, from the point of view of a sociologist of everyday-life. During more than one year of ethnographic research on the field, I followed sixteen politicians in Calabria (south of Italy, eleven men and five women, using theshadowing technique and interviews. I will, here, attempt to resume some results of my enquiry, focusing in particular on the relation between innovation and determinism, as it comes out from the everyday actions of the political agents. Referring to the socialtheory of Pierre Bourdieu and to his analysis of the political field, I will underline how this latter influences practically the political agents. The internal dynamics in the political field seem to firmly bind the politicians and by consequence these latter appearto be forced to lay down experience and innovation. Their behaviour and their actions are determined by the political field’s logic and they seem compelled to act and take the world for granted.It appears therefore that there is no space for imagination in the professional politician’s everyday-life. The political field seems to spread an inescapable determinism.

  1. Can trust in politicians explain individuals' support for climate policy? The case of CO2 tax

    International Nuclear Information System (INIS)

    Hammar, Henrik; Jagers, Sverker C.

    2006-01-01

    This article provides an analysis of the support for public policies from a trust perspective. The empirical focus is on the use of a tax on carbon dioxide (CO 2 ), a policy tool aimed at coordinating national emissions targets in Sweden. Among economists and experts in the field of climate policy, a CO 2 tax is viewed as a cost-effective policy. The policy problem is that public support for CO 2 taxes is very low, leaving policy makers with high-cost options. Apart from traditional explanatory variables such as demographic factors, level of education, ideology and self-interest, what can explain this public opposition? Using individual level data, we analyse whether support for increases in the CO 2 tax on gasoline can be explained by citizens' generalized trust in other individuals (who they do not necessarily know) or by their trust in politicians. We find that only the latter measure gains support in a regression analysis. Moreover, when splitting the sample into high-trusting and low-trusting individuals, we find that high-trusting individuals who have access to a car (compared with those without access) are statistically no more likely to resist increases in CO 2 taxes than people without access to a car. Rather, it is individuals with access to a car and who do not trust their politicians who are likely to resist CO 2 taxes. (Author)

  2. The political attack ad

    Directory of Open Access Journals (Sweden)

    Palma Peña-Jiménez, Ph.D.

    2011-01-01

    Full Text Available During election campaigns the political spot has a clear objective: to win votes. This message is communicated to the electorate through television and Internet, and usually presents a negative approach, which includes a direct critical message against the opponent, rather than an exposition of proposals. This article is focused on the analysis of the campaign attack video ad purposely created to encourage the disapproval of the political opponent among voters. These ads focus on discrediting the opponent, many times, through the transmission of ad hominem messages, instead of disseminating the potential of the political party and the virtues and manifesto of its candidate. The article reviews the development of the attack ad since its first appearance, which in Spain dates back to 1996, when the famous Doberman ad was broadcast, and examines the most memorable campaign attack ads.

  3. A fatal elephant attack.

    Science.gov (United States)

    Hejna, Petr; Zátopková, Lenka; Safr, Miroslav

    2012-01-01

    A rare case of an elephant attack is presented. A 44-year-old man working as an elephant keeper was attacked by a cow elephant when he tripped over a foot chain while the animal was being medically treated. The man fell down and was consequently repeatedly attacked with elephant tusks. The man sustained multiple stab injuries to both groin regions, a penetrating injury to the abdominal wall with traumatic prolapse of the loops of the small bowel, multiple defects of the mesentery, and incomplete laceration of the abdominal aorta with massive bleeding into the abdominal cavity. In addition to the penetrating injuries, the man sustained multiple rib fractures with contusion of both lungs and laceration of the right lobe of the liver, and comminuted fractures of the pelvic arch and left femoral body. The man died shortly after he had been received at the hospital. The cause of death was attributed to traumatic shock. © 2011 American Academy of Forensic Sciences.

  4. Exposure to Political Disparagement Humor and Its Impact on Trust in Politicians: How Long Does It Last?

    Science.gov (United States)

    Mendiburo-Seguel, Andrés; Vargas, Salvador; Rubio, Andrés

    2017-01-01

    The experimental research that looks into the effects of political humor on an individual's attitudes toward politics and politicians does not evaluate its long-term effects. With this in mind, this study aims to determine the possible effects that being exposed to humor which belittles politicians may have on an ordinary citizen's trust in them, while at the same time it observes the possible effects that such exposure has on them and the time such effects last. Two hypotheses were tested. The first one was that humor involves less cognitive elaboration, which leads to a short-term impact on the perception of the individual. The second one was that the repetition of a message can augment the swing of such message. Also, a series of elements regarding disposition toward politicians and political affiliation were considered. Two experiments were designed. The first experiment, ( N = 94), considered three groups: one exposed to political disparagement humor; one control group exposed to disparagement humor against non-politician subjects; and a control group exposed to a non-humorous political video. Trust in politicians was evaluated first at baseline, then immediately after the experimental manipulation, and once again a week after the experimental manipulation had happened. In the second experiment ( N = 146), participants were randomly assigned to one experimental and two control groups. The trust in politicians of the three groups was estimated and they were sent political cartoons, non-political cartoons, and newspaper headlines regarding political topics twice a day for a week via WhatsApp. Trust in politicians among the three groups was assessed again after 1 week, and for a third time 1 week after that. As a result, it was observed that a one-off exposure to political disparagement humor affects trust in politicians negatively; however, the effect it attains is short-lived and can be explained through the political content of the item and not only humor

  5. Exposure to Political Disparagement Humor and Its Impact on Trust in Politicians: How Long Does It Last?

    Directory of Open Access Journals (Sweden)

    Andrés Mendiburo-Seguel

    2017-12-01

    Full Text Available The experimental research that looks into the effects of political humor on an individual’s attitudes toward politics and politicians does not evaluate its long-term effects. With this in mind, this study aims to determine the possible effects that being exposed to humor which belittles politicians may have on an ordinary citizen’s trust in them, while at the same time it observes the possible effects that such exposure has on them and the time such effects last. Two hypotheses were tested. The first one was that humor involves less cognitive elaboration, which leads to a short-term impact on the perception of the individual. The second one was that the repetition of a message can augment the swing of such message. Also, a series of elements regarding disposition toward politicians and political affiliation were considered. Two experiments were designed. The first experiment, (N = 94, considered three groups: one exposed to political disparagement humor; one control group exposed to disparagement humor against non-politician subjects; and a control group exposed to a non-humorous political video. Trust in politicians was evaluated first at baseline, then immediately after the experimental manipulation, and once again a week after the experimental manipulation had happened. In the second experiment (N = 146, participants were randomly assigned to one experimental and two control groups. The trust in politicians of the three groups was estimated and they were sent political cartoons, non-political cartoons, and newspaper headlines regarding political topics twice a day for a week via WhatsApp. Trust in politicians among the three groups was assessed again after 1 week, and for a third time 1 week after that. As a result, it was observed that a one-off exposure to political disparagement humor affects trust in politicians negatively; however, the effect it attains is short-lived and can be explained through the political content of the item and

  6. Attacker Model Lab

    OpenAIRE

    2006-01-01

    tut quiz present Tutorial Quiz Presentation Interactive Media Element This interactive tutorial the two sub-classes of computer attackers: amateurs and professionals. It provides valuable insight into the nature of necessary protection measure for information assets. CS3600 Information Assurance: Introduction to Computer Security Course

  7. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... major stroke. It's important to call 9-1-1 immediately for any stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. The content in this ...

  8. Temporal Cyber Attack Detection.

    Energy Technology Data Exchange (ETDEWEB)

    Ingram, Joey Burton [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Draelos, Timothy J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Galiardi, Meghan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Doak, Justin E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Rigorous characterization of the performance and generalization ability of cyber defense systems is extremely difficult, making it hard to gauge uncertainty, and thus, confidence. This difficulty largely stems from a lack of labeled attack data that fully explores the potential adversarial space. Currently, performance of cyber defense systems is typically evaluated in a qualitative manner by manually inspecting the results of the system on live data and adjusting as needed. Additionally, machine learning has shown promise in deriving models that automatically learn indicators of compromise that are more robust than analyst-derived detectors. However, to generate these models, most algorithms require large amounts of labeled data (i.e., examples of attacks). Algorithms that do not require annotated data to derive models are similarly at a disadvantage, because labeled data is still necessary when evaluating performance. In this work, we explore the use of temporal generative models to learn cyber attack graph representations and automatically generate data for experimentation and evaluation. Training and evaluating cyber systems and machine learning models requires significant, annotated data, which is typically collected and labeled by hand for one-off experiments. Automatically generating such data helps derive/evaluate detection models and ensures reproducibility of results. Experimentally, we demonstrate the efficacy of generative sequence analysis techniques on learning the structure of attack graphs, based on a realistic example. These derived models can then be used to generate more data. Additionally, we provide a roadmap for future research efforts in this area.

  9. Malnutrition in elder care: qualitative analysis of ethical perceptions of politicians and civil servants.

    Science.gov (United States)

    Mamhidir, Anna-Greta; Kihlgren, Mona; Soerlie, Venke

    2010-06-16

    Few studies have paid attention to ethical responsibility related to malnutrition in elder care. The aim was to illuminate whether politicians and civil servants reason about malnutrition in elder care in relation to ethical responsibility, and further about possible causes and how to address them. Eighteen elected politicians and appointed civil servants at the municipality and county council level from two counties in Sweden were interviewed. They worked at a planning, control and executive level, with responsibility for both the elder care budget and quality of care. Qualitative method was used for the data analysis. Two themes emerged from their reasoning about malnutrition related to ethical responsibility. The theme assumed role involves the subthemes quality of care and costs, competent staff and govern at a distance. Old and ill patients were mentioned as being at risk for malnutrition. Caregivers were expected to be knowledgeable and stated primary responsible for providing adequate nutritional care. Extended physician responsibility was requested owing to patients' illnesses. Little was reported on the local management's role or on their own follow-up routines. The theme moral perception includes the subthemes discomfort, trust and distrust. Feelings of discomfort concerned caregivers having to work in a hurried, task-oriented manner. Trust meant that they believed for the most part that caregivers had the competence to deal appropriately with nutritional care, but they felt distrust when nutritional problems reappeared on their agenda. No differences could be seen between the politicians and civil servants. New knowledge about malnutrition in elder care related to ethical responsibility was illuminated by persons holding top positions. Malnutrition was stressed as an important dimension of the elder care quality. Governing at a distance meant having trust in the staff, on the one hand, and discomfort and distrust when confronted with reports of

  10. Blocking of Brute Force Attack

    OpenAIRE

    M.Venkata Krishna Reddy

    2012-01-01

    A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your Web site requires user authentication, you are a good target for a brute-force attack. An attacker can always discover a password through a brute-force attack, but the downside is that it co...

  11. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  12. [Paul Konitzer (1894-1947): hygienist, physician, social medicine and health politician].

    Science.gov (United States)

    Schneck, Peter

    2004-01-01

    Paul Konitzer was one of the outstanding and well-known physicians in the years after the World War II in East-Germany. THe paper describes his professional way as hygienist, social medical, municipal physician and last but not least as health politician in the times of four different political regimes: the imperial era in Germany till 1918, the time of "Weimarer Republic" till 1933, the Nazi dictatorship till 1945 and the early years in the Soviet occupation zone of Germany. The life of Konitzer is a typical example of the fate of a German doctor in the first half of the 20th century. Konitzer was arrested in February 1947 by the Soviet Military Government in Berlin in connection with some political troubles and reproach with a typhus epidemic in a German camp for Russian Prisoners of War in the Nazi era. On April 22nd 1947 he died in prison of Dresden by suicide without condemnation.

  13. What Drives Politicians to Run for Office: Money, Fame or Public Service?

    Directory of Open Access Journals (Sweden)

    Balian Arpie G.

    2017-06-01

    Full Text Available This is a multiple case study that investigates the motivations and ambitions of politicians who run for elections. It uses a mixed research design that applies inductive reasoning in the collection and analysis of data from six communities of rural Armenia. Data-collection instruments include in-depth interviews, focus groups, field observations and community survey. Whereas the study considers various theories of motivation and ambition, the conclusive evidence shows that the attractiveness of office at the local-government level in smaller rural communities is not driven by financial considerations and is rather compelled by the desire to make a difference motivated primarily by personal interest in and dedication to bringing positive change in the quality of life in one’s own community. The study also shows that motivators oft en stem from several other factors, including one’s deep-rooted connection with the community, lineage, length of term in office, record of community satisfaction, resultant personal power built over the years in service and the need to be acclaimed by one’s own community. A derivative closely linked to the priority of building the personal reputation of an incumbent mayor is the resultant power of decision-making. These conclusions can be explained using the model offered by Besley and Ghatak (2005 where politicians view public service as a personal mission. This study connects personal drive to sense of community and ancestral presence. The study also explains why mission accomplishment is more attractive than personal profit-making and how the sense of community and ownership are linked to personal drive.

  14. The management of high-level nuclear wastes - Issues politicians face regarding the risk of ionizing radiation

    International Nuclear Information System (INIS)

    Bataille, C.

    1992-01-01

    The management of ionizing radiation is not a new issue, and it is not a subject that could be easily communicated with the general public. Politicians responsible for decision making are faced with the public who are concerned with the risks. Without general acceptance and support from the public, nuclear programs can not be pursued. The author provides three key guidelines for politicians to follow, the same advice given to the French Parliament earlier: addressing the protection of the population and environment in a responsible manner, assuming an open, non secretive and transparent approach, and adopting a democratic attitude to allow public participation in decision making

  15. Automated Discovery of Mimicry Attacks

    National Research Council Canada - National Science Library

    Giffin, Jonathon T; Jha, Somesh; Miller, Barton P

    2006-01-01

    .... These systems are useful only if they detect actual attacks. Previous research developed manually-constructed mimicry and evasion attacks that avoided detection by hiding a malicious series of system calls within a valid sequence allowed by the model...

  16. Heart Attack Symptoms in Women

    Science.gov (United States)

    ... fat, cholesterol and other substances (plaque). Watch an animation of a heart attack . Many women think the ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  17. Spin current

    CERN Document Server

    Valenzuela, Sergio O; Saitoh, Eiji; Kimura, Takashi

    2017-01-01

    Since the discovery of the giant magnetoresistance effect in magnetic multilayers in 1988, a new branch of physics and technology, called spin-electronics or spintronics, has emerged, where the flow of electrical charge as well as the flow of electron spin, the so-called “spin current,” are manipulated and controlled together. The physics of magnetism and the application of spin current have progressed in tandem with the nanofabrication technology of magnets and the engineering of interfaces and thin films. This book aims to provide an introduction and guide to the new physics and applications of spin current, with an emphasis on the interaction between spin and charge currents in magnetic nanostructures.

  18. Attack Trees with Sequential Conjunction

    NARCIS (Netherlands)

    Jhawar, Ravi; Kordy, Barbara; Mauw, Sjouke; Radomirović, Sasa; Trujillo-Rasua, Rolando

    2015-01-01

    We provide the first formal foundation of SAND attack trees which are a popular extension of the well-known attack trees. The SAND at- tack tree formalism increases the expressivity of attack trees by intro- ducing the sequential conjunctive operator SAND. This operator enables the modeling of

  19. Spin doctoring

    OpenAIRE

    Vozková, Markéta

    2011-01-01

    1 ABSTRACT The aim of this text is to provide an analysis of the phenomenon of spin doctoring in the Euro-Atlantic area. Spin doctors are educated people in the fields of semiotics, cultural studies, public relations, political communication and especially familiar with the infrastructure and the functioning of the media industry. Critical reflection of manipulative communication techniques puts spin phenomenon in historical perspective and traces its practical use in today's social communica...

  20. Walking the tightrope-perspectives on local politicians' role in implementing a national social care policy on evidence-based practice.

    Science.gov (United States)

    Bäck, A; Ståhl, C; von Thiele Schwarz, U; Richter, A; Hasson, H

    2016-01-01

    Despite national policy recommending evidence-based practice (EBP), its application in social care has been limited. While local politicians can affect the process, little is known about their knowledge, attitudes and roles regarding EBP. The aim here is twofold: to explore the role of local politicians in the implementation of EBP in social care from both their own and a management perspective; and to examine factors politicians perceive as affecting their decisions and actions concerning the implementation of EBP policy. Local politicians (N = 13) and managers (N = 22) in social care were interviewed. Qualitative thematic analysis with both inductive and deductive codes was used. Politicians were rather uninformed regarding EBP and national policy. The factors limiting their actions were, beside the lack of awareness, lack of ability to question existing working methods, and a need for support in the steering of EBP. Thus, personal interest played a significant part in what role the politicians assumed. This resulted in some politicians taking a more active role in steering EBP while others were not involved. From the managers' perspective, a more active steering by politicians was desired. Setting budget and objectives, as well as active follow-up of work processes and outcomes, were identified as means to affect the implementation of EBP. However, the politicians seemed unaware of the facilitating effects of these actions. Local politicians had a possibility to facilitate the implementation of EBP, but their role was unclear. Personal interest played a big part in determining what role was taken. The results imply that social care politicians might need support in the development of their steering of EBP. Moving the responsibility for EBP facilitation upwards in the political structure could be an important step in developing EBP in social care.

  1. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  2. 'Of course we are on Facebook': Use and non-use of social media among Swedish and Norwegian politicians.

    Science.gov (United States)

    Larsson, Anders O; Kalsnes, Bente

    2014-12-01

    While plenty of research has provided important insights into the uses of the Internet by politicians during elections, a relatively scarce amount of work has looked into these uses outside of such parliamentary events. This article seeks to remedy this lack of research by presenting a study on the 'routine' uses of two of the currently most popular social media services - Facebook and Twitter. Focusing on politicians elected to the national parliaments of Norway and Sweden, the article employs novel methodologies for data collection and statistical analyses in order to provide an overarching, structural view of the day-to-day social media practices of Scandinavian politicians. Findings indicate that use levels are rather low for both services - the median amount of tweets sent and messages posted on Facebook is close to one per day. Further analyses reveal that the most active politicians could be labelled as 'underdogs', as they are more likely to be younger, in opposition and out of the political limelight.

  3. Digital Communication and Politics in Aragon. A two-way communication formula for the interaction between politicians and citizens

    Directory of Open Access Journals (Sweden)

    María Ruiz-Carreras

    2010-01-01

    Full Text Available This research presents blogs as an innovative and rich tool for political communication. Blogs can facilitate two-way communication and true interaction between citizens and politicians. The article analyses in depth the content, uses, and characteristics of five weblogs written by Aragonese politicians. Although the study detects some weaknesses in the current political use of blogs, it encourages political parties to use blogs and other online resources, not only during electoral campaigns to improve the reputation of political leaders but also continuously and particularly in situations of special interest for the citizenship. The study shows that the use of blogs by Aragonese politicians is no longer just a transitory phenomenon and has become a reality. The article also demonstrates that politicians use blogs mostly as a pre-electoral tooland to a much lesser extent as an element of communication to promote democracy. It has been observed that politicians’ blogs are used as a tool to overcome situations of crisis and to compensate negative opinions caused by questionable acts.

  4. The micro dynamics of agency: Repetition and subversion in a Mexican right-wing female politician's life story

    NARCIS (Netherlands)

    Davids, T.

    2011-01-01

    This article analyses the micro dynamics of agency represented in the life story of a Mexican right-wing female politician - particularly how agency manifests itself in the way she repeats the rhetorical structures of her party's discourse. Although claiming to be a modern woman, a high ranking

  5. Spin 1990

    International Nuclear Information System (INIS)

    Anton, Gisela

    1990-01-01

    The idea of the intrinsic angular momentum, or 'spin', of a particle has played an essential part in fundamental physics for more than 60 years, and its continuing importance was underlined at the 9th International Symposium on High Energy Spin Physics, held in September in Bonn.

  6. Spin 1990

    Energy Technology Data Exchange (ETDEWEB)

    Anton, Gisela

    1990-12-15

    The idea of the intrinsic angular momentum, or 'spin', of a particle has played an essential part in fundamental physics for more than 60 years, and its continuing importance was underlined at the 9th International Symposium on High Energy Spin Physics, held in September in Bonn.

  7. Spin tomography

    Energy Technology Data Exchange (ETDEWEB)

    D' Ariano, G M [Quantum Optics and Information Group, INFM Udr Pavia, Dipartimento di Fisica ' Alessandro Volta' and INFM, Via Bassi 6, 27100 Pavia (Italy); Maccone, L [Quantum Optics and Information Group, INFM Udr Pavia, Dipartimento di Fisica ' Alessandro Volta' and INFM, Via Bassi 6, 27100 Pavia (Italy); Paini, M [Quantum Optics and Information Group, INFM Udr Pavia, Dipartimento di Fisica ' Alessandro Volta' and INFM, Via Bassi 6, 27100 Pavia (Italy)

    2003-02-01

    We propose a tomographic reconstruction scheme for spin states. The experimental set-up, which is a modification of the Stern-Gerlach scheme, can be easily performed with currently available technology. The method is generalized to multiparticle states, analysing the spin-1/2 case for indistinguishable particles. Some Monte Carlo numerical simulations are given to illustrate the technique.

  8. Spin tomography

    International Nuclear Information System (INIS)

    D'Ariano, G M; Maccone, L; Paini, M

    2003-01-01

    We propose a tomographic reconstruction scheme for spin states. The experimental set-up, which is a modification of the Stern-Gerlach scheme, can be easily performed with currently available technology. The method is generalized to multiparticle states, analysing the spin-1/2 case for indistinguishable particles. Some Monte Carlo numerical simulations are given to illustrate the technique

  9. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    The need to assess security and take protection decisions is at least as old as our civilisation. However, the complexity and development speed of our interconnected technical systems have surpassed our capacity to imagine and evaluate risk scenarios. This holds in particular for risks...... that are caused by the strategic behaviour of adversaries. Therefore, technology-supported methods are needed to help us identify and manage these risks. In this paper, we describe the attack navigator: a graph-based approach to security risk assessment inspired by navigation systems. Based on maps of a socio...

  10. Attacks on computer systems

    Directory of Open Access Journals (Sweden)

    Dejan V. Vuletić

    2012-01-01

    Full Text Available Computer systems are a critical component of the human society in the 21st century. Economic sector, defense, security, energy, telecommunications, industrial production, finance and other vital infrastructure depend on computer systems that operate at local, national or global scales. A particular problem is that, due to the rapid development of ICT and the unstoppable growth of its application in all spheres of the human society, their vulnerability and exposure to very serious potential dangers increase. This paper analyzes some typical attacks on computer systems.

  11. Spin glasses

    CERN Document Server

    Bovier, Anton

    2007-01-01

    Spin glass theory is going through a stunning period of progress while finding exciting new applications in areas beyond theoretical physics, in particular in combinatorics and computer science. This collection of state-of-the-art review papers written by leading experts in the field covers the topic from a wide variety of angles. The topics covered are mean field spin glasses, including a pedagogical account of Talagrand's proof of the Parisi solution, short range spin glasses, emphasizing the open problem of the relevance of the mean-field theory for lattice models, and the dynamics of spin glasses, in particular the problem of ageing in mean field models. The book will serve as a concise introduction to the state of the art of spin glass theory, usefull to both graduate students and young researchers, as well as to anyone curious to know what is going on in this exciting area of mathematical physics.

  12. Spin symposium

    Energy Technology Data Exchange (ETDEWEB)

    Anon.

    1989-01-15

    The recent 8th International Symposium on High Energy Spin Physics at the University of Minnesota in Minneapolis, Minnesota, opened with a bang when L. Pondrom (Wisconsin), donning a hard hat borrowed from construction workers, ventured that 'spin, the notorious inessential complication of hadronic physics, is finally telling us what real QCD (quantum chromodynamics, the field theory of quarks and gluons) looks like.' He was referring to an animated discussion on the meaning of the recent spin oriented (polarized) scattering results from the European Muon Collaboration (EMC) at CERN and reported at the Symposium by R. Garnet (Liverpool) and P. Schuler (Yale) which show that the proton spin is not simply a reflection of the spins of its constituent quarks.

  13. Recent "phishing" attacks

    CERN Multimedia

    IT Department

    2009-01-01

    Over the last few weeks there has been a marked increase in the number of attacks on CERN made by cybercriminals. Typical attacks arrive in the form of e-mail messages purporting to come from the CERN Help Desk, Mail Service, or some similarly official-sounding entity and suggest that there is a problem with your account, such as it being over-quota. They then ask you to click on a link or to reply and give your password. Please don’t! Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. NEVER provide your password or other details if these are requested. These messages try to trick you into clicking on Web links which will help them to install malicious software on your computer, and anti-virus software cannot be relied on to detect all cases. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN Comput...

  14. Reproductive rights in Poland: when politicians fear the wrath of the Church.

    Science.gov (United States)

    Heinen, Jacqueline; Portet, Stéphane

    2010-01-01

    The historical prestige of the Polish Catholic Church is the result of its presence as a national symbol of resistance, both under foreign occupation and during the communist regime. In the post-communist era the power of the Church within the political arena has significantly increased, through the Concordat that was signed with the state as well as through formal and informal ties with political parties. Catholicism is the de facto religion of the state, even if Poland remains a nominally secular country. This was illustrated by the adoption, in 1993, of a total abortion ban. Although the relation of Poles to the Catholic dogma on sexuality and reproductive rights tends to be weak, fearing criticism from Church authorities, most politicians avoid controversial topics and express their commitment to Catholic dogma. Thus women's groups have encountered serious difficulties in their efforts to defend women's rights to sexual and reproductive autonomy. Although accession to the European Union has put Poland in an awkward position with respect to equality of rights between women and men, it has not fundamentally altered the real situation with respect to the controversial topic of abortion.

  15. Spin systems

    CERN Document Server

    Caspers, W J

    1989-01-01

    This book is about spin systems as models for magnetic materials, especially antiferromagnetic lattices. Spin-systems are well-defined models, for which, in special cases, exact properties may be derived. These special cases are for the greater part, one- dimensional and restricted in their applicability, but they may give insight into general properties that also exist in higher dimension. This work pays special attention to qualitative differences between spin lattices of different dimensions. It also replaces the traditional picture of an (ordered) antiferromagnetic state of a Heisenberg sy

  16. Cyber Attacks and Combat Behavior

    Directory of Open Access Journals (Sweden)

    Carataș Maria Alina

    2017-01-01

    Full Text Available Cyber terrorism is an intangible danger, a real over the corner threat in the life of individuals,organizations, and governments and is getting harder to deal with its damages. The motivations forthe cyber-attacks are different, depending on the terrorist group, from cybercrime to hacktivism,attacks over the authorities’ servers. Organizations constantly need to find new ways ofstrengthening protection against cyber-attacks, assess their cyber readiness, expand the resiliencecapacity and adopts international security regulations.

  17. Politician2.0 on Facebook: Information Behavior and Dissemination on Social Networking Sites – Gaps and Best-Practice. Evaluation Results of a novel eParticipation toolbox to let politicians engage with citizens online.

    Directory of Open Access Journals (Sweden)

    Timo Wandhoefer

    2012-01-01

    Full Text Available This article covers our findings on information behavior and dissemination of parliamentary decision-makers in terms of using Social Networking Sites like Facebook. The article investigates why politicians use those technologies and integrate them more and more in their everyday workflow. In addition to the purpose of social network usage, the focus of our paper is also on best practices and how to deal with challenges like authenticity of politicians’ online profiles. The results presented within the remit of this paper are the outcome of 16 semi-structured interviews that took place as part of an evaluation effort within the EU research project WeGov [1]. The overall aim of the project is to develop a toolbox that enriches the dialogue between citizens and politicians on the web.

  18. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  19. Spin electronics

    CERN Document Server

    Buhrman, Robert; Daughton, James; Molnár, Stephan; Roukes, Michael

    2004-01-01

    This report is a comparative review of spin electronics ("spintronics") research and development activities in the United States, Japan, and Western Europe conducted by a panel of leading U.S. experts in the field. It covers materials, fabrication and characterization of magnetic nanostructures, magnetism and spin control in magnetic nanostructures, magneto-optical properties of semiconductors, and magnetoelectronics and devices. The panel's conclusions are based on a literature review and a series of site visits to leading spin electronics research centers in Japan and Western Europe. The panel found that Japan is clearly the world leader in new material synthesis and characterization; it is also a leader in magneto-optical properties of semiconductor devices. Europe is strong in theory pertaining to spin electronics, including injection device structures such as tunneling devices, and band structure predictions of materials properties, and in development of magnetic semiconductors and semiconductor heterost...

  20. Crony Attack: Strategic Attack’s Silver Bullet

    Science.gov (United States)

    2006-11-01

    physical assets or financial assets. The form of crony attack that most closely resembles classic strategic attack is to deny, degrade, or destroy a money...February 1951. Reprinted in Airpower Studies Coursebook , Air Command and Staff College, Maxwell AFB, AL, 2002, 152–58. Hirsch, Michael. “NATO’s Game of

  1. Spin Conference

    International Nuclear Information System (INIS)

    Anon.

    1983-01-01

    The 5th International Symposium on High Energy Spin Physics met in September at Brookhaven. The symposium has evolved to include a number of diverse specialities: theory, including parity violations and proposed quantum chromodynamics (QCD) tests with polarized beams; experiment, including the large spin effects discovered in high transverse momentum elastic scattering and hyperon production, dibaryons, and magnetic moments; acceleration and storage of polarized protons and electrons; and development of polarized sources and targets

  2. Mainlandization, the ICAC, and the Seriousness Attached by Local Politicians to Corruption in Post-1997 Hong Kong.

    Science.gov (United States)

    Li, Li; Lo, T Wing

    2018-05-01

    To date, few studies have focused on how the public has perceived the effectiveness of the Independent Commission Against Corruption (ICAC). Furthermore, little is known about how the public has assessed the functions of the ICAC during the political-economic convergence between Hong Kong and mainland China since 1997. This study attempts to explore local politicians' perceptions towards the ICAC in post-1997 Hong Kong. The quantitative data show that the important historical juncture of mainlandization has been politicized in Hong Kong and has deeply influenced the seriousness attached by local politicians to corruption. Moreover, a mediating path of the effect of "Conflict of Interest" on the "Perceived Seriousness of Corruption" has been found, that is, mainlandization is found to have brought about increased levels of conflict of interest among government officials, which has weakened the symbolic anti-corruption function of the ICAC and, in turn, has affected the perceived seriousness attached to corruption.

  3. Smileys Without Borders. A Critique of Transboundary Interaction Between Politicians, Journalists and PR Practitioners on Social Media

    Directory of Open Access Journals (Sweden)

    Peter Berglez

    2018-01-01

    Full Text Available The purpose of the article is to contribute a critical theoretical understanding of cross-professional relations on social media, focusing on politicians, journalists and PR practitioners. It is well known that these professional groups establish personal and close relations in offline contexts, but more attention needs to be paid to the role of social media. Here, it is argued that, in the context of digital media use, semi-private chatting, humour, and mutual acknowledgement, including the use of likes, smileys, heart symbols, etc. are evidence of a 'neoliberalization' of cross-professional relations. The underlying idea is that the common practice of self-branding undermines representations of professional belonging and exacerbates the blurring of professional boundaries. The critical conceptualization of such 'transboundary' interaction between politicians, journalists and PR practitioners, which is guided by a cultural materialist approach, includes the presentation of examples deriving from the Swedish Twittersphere, and suggestions for empirical research.

  4. The Institutional Anchoring of Social Media Venues as Arenas for Local Political Communication. Perceptions by Voters and Politicians

    OpenAIRE

    Segaard, Signe Bock

    2017-01-01

    The article explores social media as institutions for political communication between voters and politicians. While observers have focused on the political use of social media when exploring their democratic potential, little is known about the users’ perceptions of these media. But as institutions are more than just behavior – they are also about formal as well as informal rules, norms and understandings – these perceptions could well be important to understanding the institutional anchoring...

  5. Threatening communication: A qualitative study of fear appeal effectiveness beliefs among intervention developers, policymakers, politicians, scientists, and advertising professionals

    OpenAIRE

    Peters, Gjalt-Jorn Y; Ruiter, Robert A C; Kok, Gerjo

    2013-01-01

    Threatening communication is a widely applied method in behavior change interventions, which at the same time has been heavily criticized in the psychological literature. The current paper describes a study of the reasons for this persistent wide application of threatening communication. We conducted qualitative interviews with 33 key actors in behavior change intervention development in The Netherlands. Specifically, we interviewed intervention developers, policymakers, politicians, scientis...

  6. Threats to Mutual Trust: Czech Local Politicians and Local Journalists in the Era of Professional Political Communication

    Directory of Open Access Journals (Sweden)

    Roman Hájek

    2015-06-01

    Full Text Available The study discusses changes in the relationship between local journalists and local politicians in the Czech Republic as a consequence of the professionalization of political communications at national as well as local levels following the so-called Velvet Revolution of 1989. This phenomenon has been studied widely in Western democracies but is relatively new in the Czech Republic. Politicians’ improved communication skills and the employment of communication professionals in politics influence trust – a key component in the relationship – between politicians and journalists. The article is based on semi-structured interviews with 10 journalists and 11 politicians from different Czech localities, which aim to explore how these actors understand and maintain levels of mutual trust. First we describe key components of trust and explain why in the era of professionalized political communication trust is perceived as more threatened than in the 1990s and we conclude by exploring the three most important threats to trust as identified by our interviewees.

  7. Invisible Trojan-horse attack

    DEFF Research Database (Denmark)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin

    2017-01-01

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance...

  8. When Sinuses Attack! (For Kids)

    Science.gov (United States)

    ... First Aid & Safety Doctors & Hospitals Videos Recipes for Kids Kids site Sitio para niños How the Body Works ... Search English Español When Sinuses Attack! KidsHealth / For Kids / When Sinuses Attack! What's in this article? What ...

  9. Invisible Trojan-horse attack.

    Science.gov (United States)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin; Makarov, Vadim

    2017-08-21

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Ac´ın-Ribordy-Gisin (SARG04) QKD protocol at 1924 nm versus that at 1536 nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N. Jain et al., New J. Phys. 16, 123030 (2014). However at 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.

  10. Magnus effects at high angles of attack and critical Reynolds numbers

    Science.gov (United States)

    Seginer, A.; Ringel, M.

    1983-01-01

    The Magnus force and moment experienced by a yawed, spinning cylinder were studied experimentally in low speed and subsonic flows at high angles of attack and critical Reynolds numbers. Flow-field visualization aided in describing a flow model that divides the Magnus phenomenon into a subcritical region, where reverse Magnus loads are experienced, and a supercritical region where these loads are not encountered. The roles of the spin rate, angle of attack, and crossflow Reynolds number in determining the boundaries of the subcritical region and the variations of the Magnus loads were studied.

  11. Spin modes

    International Nuclear Information System (INIS)

    Gaarde, C.

    1985-01-01

    An analysis of spectra of (p,n) reactions showed that they were very selective in exciting spin modes. Charge exchange reactions at intermediate energies give important new understanding of the M1-type of excitations and of the spin structure of continuum p spectra in general. In this paper, the author discusses three charge exchange reactions: (p,n); ( 3 H,t); and (d,2p) at several targets. Low-lying states and the Δ region are discussed separately. Finally, the charge exchange reaction with heavy ion beams is briefly discussed. (G.J.P./Auth.)

  12. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  13. Shark Attack Project - Marine Attack at Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Adrianus J

    2005-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  14. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  15. Forensics Investigation of Web Application Security Attacks

    OpenAIRE

    Amor Lazzez; Thabet Slimani

    2015-01-01

    Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the sec...

  16. Spinning worlds

    NARCIS (Netherlands)

    Schwarz, H.

    2017-01-01

    The thesis "Spinning Worlds" is about the characterisation of two types of gas-giant exoplanets: Hot Jupiters, with orbital periods of fewer than five days, and young, wide-orbit gas giants, with orbital periods as long as thousands of years. The thesis is based on near-infrared observations of 1

  17. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  18. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  19. Panic Attacks and Panic Disorder

    Science.gov (United States)

    ... Major changes in your life, such as a divorce or the addition of a baby Smoking or ... quality of life. Complications that panic attacks may cause or be linked to include: Development of specific ...

  20. Genetic attack on neural cryptography

    International Nuclear Information System (INIS)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-01-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size

  1. Genetic attack on neural cryptography

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  2. What Is a Heart Attack?

    Science.gov (United States)

    ... medical center. Support from family and friends also can help relieve stress and anxiety. Let your loved ones know how you feel and what they can do to help you. Risk of a Repeat Heart Attack Once ...

  3. Software-based Microarchitectural Attacks

    OpenAIRE

    Gruss, Daniel

    2017-01-01

    Modern processors are highly optimized systems where every single cycle of computation time matters. Many optimizations depend on the data that is being processed. Software-based microarchitectural attacks exploit effects of these optimizations. Microarchitectural side-channel attacks leak secrets from cryptographic computations, from general purpose computations, or from the kernel. This leakage even persists across all common isolation boundaries, such as processes, containers, and virtual ...

  4. OPERATION COBRA. Deliberate Attack, Exploitation

    Science.gov (United States)

    1984-05-25

    to attack Sens, then continue to Troyes , on the Seine River. CCA was in the north, crossing the Loing River at Souppes against light resistance and...advanced from Troyes and prepared positions close to Sens. Under strong artillery support, a task force from CCA (TF Oden) attacked the enemy frontally...movement towards the Seine River on 24 August with an advance toward Troyes . Facing the combat command were what remained of the 51st SS Brigade, light

  5. When Perception Becomes Reality and Truth is Relative: Spin Strategies and Political Influence over Media Reporting in Macedonian Media

    Directory of Open Access Journals (Sweden)

    Žaneta Trajkoska

    2018-03-01

    Full Text Available The power of politicians presenting itself in front of the public rests in the media, so politicians are likely to use the media to create the preferred media frames and to set the agenda (agenda setting. Worldwide, spin-doctors have their own influence in the modeling of the media reality, processes that are comparable in Macedonia as well. The paper strive to describe the presence of the spinning in Macedonia and its impact on the news content. Furthermore, it deals with the spinning tactics and their manifestation in the political communication, explaining the models in which political spinning is functioning in Macedonia. Main research questions are focused on: (1 how does the process of creating the news is carry out and what affects the news content production; (2 what specific strategic doctrines spin-doctors are using to influence the process of daily reporting and to participate in the creation of the media reality; (3 how the spin-doctors present information and communicate with the public and what methods and tools are characteristic for spinning cycles.

  6. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  7. Spin Coherence in Semiconductor Nanostructures

    National Research Council Canada - National Science Library

    Flatte, Michael E

    2006-01-01

    ... dots, tuning of spin coherence times for electron spin, tuning of dipolar magnetic fields for nuclear spin, spontaneous spin polarization generation and new designs for spin-based teleportation and spin transistors...

  8. Can trust in politicians explain individuals' support for climate policy? The case of CO{sub 2} tax

    Energy Technology Data Exchange (ETDEWEB)

    Hammar, Henrik [Goeteborg Univ., Dept. of Economics, Goeteborg (Sweden); National Inst. of Economic Research (NIER), Stockholm (Sweden); Jagers, Sverker C. [Goeteborg Univ., Dept. of Polital Science, Goeteborg (Sweden)

    2006-07-01

    This article provides an analysis of the support for public policies from a trust perspective. The empirical focus is on the use of a tax on carbon dioxide (CO{sub 2}), a policy tool aimed at coordinating national emissions targets in Sweden. Among economists and experts in the field of climate policy, a CO{sub 2} tax is viewed as a cost-effective policy. The policy problem is that public support for CO{sub 2} taxes is very low, leaving policy makers with high-cost options. Apart from traditional explanatory variables such as demographic factors, level of education, ideology and self-interest, what can explain this public opposition? Using individual level data, we analyse whether support for increases in the CO{sub 2} tax on gasoline can be explained by citizens' generalized trust in other individuals (who they do not necessarily know) or by their trust in politicians. We find that only the latter measure gains support in a regression analysis. Moreover, when splitting the sample into high-trusting and low-trusting individuals, we find that high-trusting individuals who have access to a car (compared with those without access) are statistically no more likely to resist increases in CO{sub 2} taxes than people without access to a car. Rather, it is individuals with access to a car and who do not trust their politicians who are likely to resist CO{sub 2} taxes. (Author)

  9. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica......Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error......-prone and impracticable for large systems. Nonetheless, the automated generation of attack trees has only been explored in connection to computer networks and levering rich models, whose analysis typically leads to an exponential blow-up of the state space. We propose a static analysis approach where attack trees...... are automatically inferred from a process algebraic specification in a syntax-directed fashion, encompassing a great many application domains and avoiding incurring systematically an exponential explosion. Moreover, we show how the standard propositional denotation of an attack tree can be used to phrase...

  10. An Analysis of Attacks on Blockchain Consensus

    OpenAIRE

    Bissias, George; Levine, Brian Neil; Ozisik, A. Pinar; Andresen, Gavin

    2016-01-01

    We present and validate a novel mathematical model of the blockchain mining process and use it to conduct an economic evaluation of the double-spend attack, which is fundamental to all blockchain systems. Our analysis focuses on the value of transactions that can be secured under a conventional double-spend attack, both with and without a concurrent eclipse attack. Our model quantifies the importance of several factors that determine the attack's success, including confirmation depth, attacke...

  11. Recurrent spontaneous attacks of dizziness.

    Science.gov (United States)

    Lempert, Thomas

    2012-10-01

    This article describes the common causes of recurrent vertigo and dizziness that can be diagnosed largely on the basis of history. Ninety percent of spontaneous recurrent vertigo and dizziness can be explained by six disorders: (1) Ménière disease is characterized by vertigo attacks, lasting 20 minutes to several hours, with concomitant hearing loss, tinnitus, and aural fullness. Aural symptoms become permanent during the course of the disease. (2) Attacks of vestibular migraine may last anywhere from minutes to days. Most patients have a previous history of migraine headaches, and many experience migraine symptoms during the attack. (3) Vertebrobasilar TIAs affect older adults with vascular risk factors. Most attacks last less than 1 hour and are accompanied by other symptoms from the posterior circulation territory. (4) Vestibular paroxysmia is caused by vascular compression of the eighth cranial nerve. It manifests itself with brief attacks of vertigo that recur many times per day, sometimes with concomitant cochlear symptoms. (5) Orthostatic hypotension causes brief episodes of dizziness lasting seconds to a few minutes after standing up and is relieved by sitting or lying down. In older adults, it may be accompanied by supine hypertension. (6) Panic attacks usually last minutes, occur in specific situations, and are accompanied by choking, palpitations, tremor, heat, and anxiety. Less common causes of spontaneous recurrent vertigo and dizziness include perilymph fistula, superior canal dehiscence, autoimmune inner ear disease, otosclerosis, cardiac arrhythmia, and medication side effects. Neurologists need to venture into otolaryngology, internal medicine, and psychiatry to master the differential diagnosis of recurrent dizziness.

  12. Spin glasses

    International Nuclear Information System (INIS)

    Mookerjee, Abhijit

    1976-01-01

    ''Spin glasses'', are entire class of magnetic alloys of moderate dilution, in which the magnetic atoms are far enough apart to be unlike the pure metal, but close enough so that the indirect exchange energy between them (mediated by the s-d interaction between local moments and conduction electrons) dominates all other energies. Characteristic critical phenomena displayed such as freezing of spin orientation at 'Tsub(c)' and spreading of magnetic ordering, are pointed out. Anomalous behaviour, associated with these critical phenomena, as reflected in : (i) Moessbauer spectroscopy giving hyperfine splitting at Tsub(c), (ii) maxima in susceptibility and remanent magnetism, (iii) thermopower maxima and change in slope, (iv) Characteristic cusp in susceptibility and its removal by very small magnetic fields, and (v) conductivity-resistivity measurements, are discussed. Theoretical developments aimed at explaining these phenomena, in particular, the ideas from percolation and localisation theories, and the approach based on the gellations of polymers, are discussed. Finally, a new approach based on renormalisation group in disordered systems is also briefly mentioned. (K.B.)

  13. Mitigating Higher Ed Cyber Attacks

    Science.gov (United States)

    Rogers, Gary; Ashford, Tina

    2015-01-01

    In this presentation we will discuss the many and varied cyber attacks that have recently occurred in the higher ed community. We will discuss the perpetrators, the victims, the impact and how these institutions have evolved to meet this threat. Mitigation techniques and defense strategies will be covered as will a discussion of effective security…

  14. Detection of complex cyber attacks

    Science.gov (United States)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  15. Heat and spin interconversion

    International Nuclear Information System (INIS)

    Ohnuma, Yuichi; Matsuo, Mamoru; Maekawa, Sadamichi; Saitoh, Eeiji

    2017-01-01

    Spin Seebeck and spin Peltier effects, which are mutual conversion phenomena of heat and spin, are discussed on the basis of the microscopic theory. First, the spin Seebeck effect, which is the spin-current generation due to heat current, is discussed. The recent progress in research on the spin Seebeck effect are introduced. We explain the origin of the observed sign changes of the spin Seebeck effect in compensated ferromagnets. Next, the spin Peltier effect, which is the heat-current generation due to spin current, is discussed. Finally, we show that the spin Seebeck and spin Peltier effects are summarized by Onsager's reciprocal relation and derive Kelvin's relation for the spin and heat transports. (author)

  16. Entangled spins and ghost-spins

    Directory of Open Access Journals (Sweden)

    Dileep P. Jatkar

    2017-09-01

    Full Text Available We study patterns of quantum entanglement in systems of spins and ghost-spins regarding them as simple quantum mechanical toy models for theories containing negative norm states. We define a single ghost-spin as in [20] as a 2-state spin variable with an indefinite inner product in the state space. We find that whenever the spin sector is disentangled from the ghost-spin sector (both of which could be entangled within themselves, the reduced density matrix obtained by tracing over all the ghost-spins gives rise to positive entanglement entropy for positive norm states, while negative norm states have an entanglement entropy with a negative real part and a constant imaginary part. However when the spins are entangled with the ghost-spins, there are new entanglement patterns in general. For systems where the number of ghost-spins is even, it is possible to find subsectors of the Hilbert space where positive norm states always lead to positive entanglement entropy after tracing over the ghost-spins. With an odd number of ghost-spins however, we find that there always exist positive norm states with negative real part for entanglement entropy after tracing over the ghost-spins.

  17. When truth is personally inconvenient, attitudes change: the impact of extreme weather on implicit support for green politicians and explicit climate-change beliefs.

    Science.gov (United States)

    Rudman, Laurie A; McLean, Meghan C; Bunzl, Martin

    2013-11-01

    A naturalistic investigation of New Jersey residents, both before and after they experienced Hurricanes Irene and Sandy, examined support for politicians committed or opposed to policies designed to combat climate change. At Time 1, before both hurricanes, participants showed negative implicit attitudes toward a green politician, but at Time 2, after the hurricanes, participants drawn from the same cohort showed a reversed automatic preference. Moreover, those who were significantly affected by Hurricane Sandy were especially likely to implicitly prefer the green politician, and implicit attitudes were the best predictor of voting after the storms, whereas explicit climate-change beliefs was the best predictor before the storms. In concert, the results suggest that direct experience with extreme weather can increase pro-environmentalism, and further support conceptualizing affective experiences as a source of implicit attitudes.

  18. Spin transport in nanowires

    OpenAIRE

    Pramanik, S.; bandyopadhyay, S.; Cahay, M.

    2003-01-01

    We study high-field spin transport of electrons in a quasi one-dimensional channel of a $GaAs$ gate controlled spin interferometer (SPINFET) using a semiclassical formalism (spin density matrix evolution coupled with Boltzmann transport equation). Spin dephasing (or depolarization) is predominantly caused by D'yakonov-Perel' relaxation associated with momentum dependent spin orbit coupling effects that arise due to bulk inversion asymmetry (Dresselhaus spin orbit coupling) and structural inve...

  19. Science, the public, and social elites: how the general public, scientists, top politicians and managers perceive science.

    Science.gov (United States)

    Prpić, Katarina

    2011-11-01

    This paper finds that the Croatian public's and the social elites' perceptions of science are a mixture of scientific and technological optimism, of the tendency to absolve science of social responsibility, of skepticism about the social effects of science, and of cognitive optimism and skepticism. However, perceptions differ significantly according to the different social roles and the wider value system of the observed groups. The survey data show some key similarities, as well as certain specificities in the configuration of the types of views of the four groups--the public, scientists, politicians and managers. The results suggest that the well-known typology of the four cultures reveals some of the ideologies of the key actors of scientific and technological policy. The greatest social, primarily educational and socio-spatial, differentiation of the perceptions of science was found in the general public.

  20. Partidele româneşti, între politicianism şi politică

    Directory of Open Access Journals (Sweden)

    Bogdan Ficeac

    2011-08-01

    Full Text Available The „originality” of the Romanian transition from totalitarianism to democracy represents, in fact, the failure of this process. The power was not transferred from the hands of a leader or of a small group of discretionary leaders to the legal-rational-bureaucratic institutions, but to the large structures of new rich, which control the entire economic and political life of the country, including the political parties. The only way to cure the Romanian political life is to professionalize the politics, to provoke the politicians to live for politics not off politics. This vital goal could be reach by strictly bringing into force the EU rules and practice, especially the EU model of spending the public money.

  1. Peacetime Use of Computer Network Attack

    National Research Council Canada - National Science Library

    Busby, Daniel

    2000-01-01

    .... PDD-63 alerts the nation to prepare for impending cyber attacks. This paper examines the nature, scale, and likelihood of cyber attacks posited in PDD-63 and finds that the country does not face an imminent "electronic Pearl Harbor...

  2. Women's Heart Disease: Heart Attack Symptoms

    Science.gov (United States)

    ... of this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter ... most common heart attack symptom in men and women is chest pain or discomfort. However, women also ...

  3. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  4. Robust Detection of Stepping-Stone Attacks

    National Research Council Canada - National Science Library

    He, Ting; Tong, Lang

    2006-01-01

    The detection of encrypted stepping-stone attack is considered. Besides encryption and padding, the attacker is capable of inserting chaff packets and perturbing packet timing and transmission order...

  5. Using an ontology for network attack planning

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-09-01

    Full Text Available The modern complexity of network attacks and their counter-measures (cyber operations) requires detailed planning. This paper presents a Network Attack Planning ontology which is aimed at providing support for planning such network operations within...

  6. Attack Graph Construction for Security Events Analysis

    Directory of Open Access Journals (Sweden)

    Andrey Alexeevich Chechulin

    2014-09-01

    Full Text Available The paper is devoted to investigation of the attack graphs construction and analysis task for a network security evaluation and real-time security event processing. Main object of this research is the attack modeling process. The paper contains the description of attack graphs building, modifying and analysis technique as well as overview of implemented prototype for network security analysis based on attack graph approach.

  7. Magnetic Nanostructures Spin Dynamics and Spin Transport

    CERN Document Server

    Farle, Michael

    2013-01-01

    Nanomagnetism and spintronics is a rapidly expanding and increasingly important field of research with many applications already on the market and many more to be expected in the near future. This field started in the mid-1980s with the discovery of the GMR effect, recently awarded with the Nobel prize to Albert Fert and Peter Grünberg. The present volume covers the most important and most timely aspects of magnetic heterostructures, including spin torque effects, spin injection, spin transport, spin fluctuations, proximity effects, and electrical control of spin valves. The chapters are written by internationally recognized experts in their respective fields and provide an overview of the latest status.

  8. Moth tails divert bat attack: evolution of acoustic deflection.

    Science.gov (United States)

    Barber, Jesse R; Leavell, Brian C; Keener, Adam L; Breinholt, Jesse W; Chadwell, Brad A; McClure, Christopher J W; Hill, Geena M; Kawahara, Akito Y

    2015-03-03

    Adaptations to divert the attacks of visually guided predators have evolved repeatedly in animals. Using high-speed infrared videography, we show that luna moths (Actias luna) generate an acoustic diversion with spinning hindwing tails to deflect echolocating bat attacks away from their body and toward these nonessential appendages. We pit luna moths against big brown bats (Eptesicus fuscus) and demonstrate a survival advantage of ∼ 47% for moths with tails versus those that had their tails removed. The benefit of hindwing tails is equivalent to the advantage conferred to moths by bat-detecting ears. Moth tails lured bat attacks to these wing regions during 55% of interactions between bats and intact luna moths. We analyzed flight kinematics of moths with and without hindwing tails and suggest that tails have a minimal role in flight performance. Using a robust phylogeny, we find that long spatulate tails have independently evolved four times in saturniid moths, further supporting the selective advantage of this anti-bat strategy. Diversionary tactics are perhaps more common than appreciated in predator-prey interactions. Our finding suggests that focusing on the sensory ecologies of key predators will reveal such countermeasures in prey.

  9. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  10. Automated classification of computer network attacks

    CSIR Research Space (South Africa)

    Van Heerden, R

    2013-11-01

    Full Text Available according to the relevant types of attack scenarios depicted in the ontology. The two network attack instances are the Distributed Denial of Service attack on SpamHaus in 2013 and the theft of 42 million Rand ($6.7 million) from South African Postbank...

  11. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  12. ‘Of course we are on Facebook’: Use and non-use of social media among Swedish and Norwegian politicians

    Science.gov (United States)

    Kalsnes, Bente

    2014-01-01

    While plenty of research has provided important insights into the uses of the Internet by politicians during elections, a relatively scarce amount of work has looked into these uses outside of such parliamentary events. This article seeks to remedy this lack of research by presenting a study on the ‘routine’ uses of two of the currently most popular social media services – Facebook and Twitter. Focusing on politicians elected to the national parliaments of Norway and Sweden, the article employs novel methodologies for data collection and statistical analyses in order to provide an overarching, structural view of the day-to-day social media practices of Scandinavian politicians. Findings indicate that use levels are rather low for both services – the median amount of tweets sent and messages posted on Facebook is close to one per day. Further analyses reveal that the most active politicians could be labelled as ‘underdogs’, as they are more likely to be younger, in opposition and out of the political limelight. PMID:28596632

  13. DYNAMICS OF THE MOST INFLUENTIAL POLITICIANS OF THE REPUBLIC OF KHAKASSIA (BY RESULTS OF MONITORING EXPERT POLLS OF 1998–2014

    Directory of Open Access Journals (Sweden)

    Vladimir Il’ich Zlotkovskij

    2017-02-01

    The following conclusions are drawn by results of the conducted researches. First, line items of heads of managerial and economic structures in the top ten of the most influential republican politicians during the researched period underwent to essential transformation. In 1998, there was a rare situation in the Russian practice heavily on the political elite of the economic elite in the name of the representatives of the leading industrial enterprises of Khakassia – Sayan Aluminum Plant. Over time, the situation has changed in 2009. was set up regional “party of power” in the face of the Republican government and the party “United Russia”, around which all the relevant actors of regional political process. Secondly, engaging the top positions in the power structures necessary but not sufficient condition for the occurrence of the most influential Republican politicians. This number does not include bank and trade union officials, media executives and university leaders of political parties, with the exception of “United Russia”, public organizations and associations. Third, in recent years, as part of the 30 most influential politicians intensified the “political weight” of the leaders of the republican government and the law enforcement system and decreased – employees legislative authorities, media leaders and heads of local self-government. Fourthly, results of monitoring expert polls on determination of the leading republican politicians act as the effective tool for understanding and forecasting of regional political process.

  14. Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers

    NARCIS (Netherlands)

    Pieters, Wolter; Davarynejad, Mohsen

    2015-01-01

    Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of multiple steps and alternative paths. It is possible to derive properties of the overall attacks from properties of individual steps, such as cost for the attacker and probability of success. However, in

  15. Whispering through DDoS attack

    OpenAIRE

    Miralem Mehic; Jiri Slachta; Miroslav Voznak

    2016-01-01

    Denial of service (DoS) attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS) attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes o...

  16. Script-viruses Attacks on UNIX OS

    Directory of Open Access Journals (Sweden)

    D. M. Mikhaylov

    2010-06-01

    Full Text Available In this article attacks on UNIX OS are considered. Currently antivirus developers are concentrated on protecting systems from viruses that are most common and attack popular operating systems. If the system or its components are not often attacked then the antivirus products are not protecting these components as it is not profitable. The same situation is with script-viruses for UNIX OS as most experts consider that it is impossible for such viruses to get enough rights to attack. Nevertheless the main conclusion of this article is the fact that such viruses can be very powerful and can attack systems and get enough rights.

  17. Spin-polarized spin excitation spectroscopy

    International Nuclear Information System (INIS)

    Loth, Sebastian; Lutz, Christopher P; Heinrich, Andreas J

    2010-01-01

    We report on the spin dependence of elastic and inelastic electron tunneling through transition metal atoms. Mn, Fe and Cu atoms were deposited onto a monolayer of Cu 2 N on Cu(100) and individually addressed with the probe tip of a scanning tunneling microscope. Electrons tunneling between the tip and the substrate exchange energy and spin angular momentum with the surface-bound magnetic atoms. The conservation of energy during the tunneling process results in a distinct onset threshold voltage above which the tunneling electrons create spin excitations in the Mn and Fe atoms. Here we show that the additional conservation of spin angular momentum leads to different cross-sections for spin excitations depending on the relative alignment of the surface spin and the spin of the tunneling electron. For this purpose, we developed a technique for measuring the same local spin with a spin-polarized and a non-spin-polarized tip by exchanging the last apex atom of the probe tip between different transition metal atoms. We derive a quantitative model describing the observed excitation cross-sections on the basis of an exchange scattering process.

  18. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks. In prac......In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks....... In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...

  19. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based......Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identified...... on invalidating policies in the system model by identifying possible sequences of actions that lead to an attack. The generated attacks are precise enough to illustrate the threat, and they are general enough to hide the details of individual steps....

  20. Whispering through DDoS attack

    Directory of Open Access Journals (Sweden)

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  1. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  2. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  3. Cache timing attacks on recent microarchitectures

    DEFF Research Database (Denmark)

    Andreou, Alexandres; Bogdanov, Andrey; Tischhauser, Elmar Wolfgang

    2017-01-01

    Cache timing attacks have been known for a long time, however since the rise of cloud computing and shared hardware resources, such attacks found new potentially devastating applications. One prominent example is S$A (presented by Irazoqui et al at S&P 2015) which is a cache timing attack against...... AES or similar algorithms in virtualized environments. This paper applies variants of this cache timing attack to Intel's latest generation of microprocessors. It enables a spy-process to recover cryptographic keys, interacting with the victim processes only over TCP. The threat model is a logically...... separated but CPU co-located attacker with root privileges. We report successful and practically verified applications of this attack against a wide range of microarchitectures, from a two-core Nehalem processor (i5-650) to two-core Haswell (i7-4600M) and four-core Skylake processors (i7-6700). The attack...

  4. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  5. Attack-Resistant Trust Metrics

    Science.gov (United States)

    Levien, Raph

    The Internet is an amazingly powerful tool for connecting people together, unmatched in human history. Yet, with that power comes great potential for spam and abuse. Trust metrics are an attempt to compute the set of which people are trustworthy and which are likely attackers. This chapter presents two specific trust metrics developed and deployed on the Advogato Website, which is a community blog for free software developers. This real-world experience demonstrates that the trust metrics fulfilled their goals, but that for good results, it is important to match the assumptions of the abstract trust metric computation to the real-world implementation.

  6. Spin nematics next to spin singlets

    Science.gov (United States)

    Yokoyama, Yuto; Hotta, Chisa

    2018-05-01

    We provide a route to generate nematic order in a spin-1/2 system. Unlike the well-known magnon-binding mechanism, our spin nematics requires neither the frustration effect nor spin polarization in a high field or in the vicinity of a ferromagnet, but instead appears next to the spin singlet phase. We start from a state consisting of a quantum spin-1/2 singlet dimer placed on each site of a triangular lattice, and show that interdimer ring exchange interactions efficiently dope the SU(2) triplets that itinerate and interact, easily driving a stable singlet state to either Bose-Einstein condensates or a triplet crystal, some hosting a spin nematic order. A variety of roles the ring exchange serves includes the generation of a bilinear-biquadratic interaction between nearby triplets, which is responsible for the emergent nematic order separated from the singlet phase by a first-order transition.

  7. Migraine attacks the Basal Ganglia

    Directory of Open Access Journals (Sweden)

    Bigal Marcelo

    2011-09-01

    Full Text Available Abstract Background With time, episodes of migraine headache afflict patients with increased frequency, longer duration and more intense pain. While episodic migraine may be defined as 1-14 attacks per month, there are no clear-cut phases defined, and those patients with low frequency may progress to high frequency episodic migraine and the latter may progress into chronic daily headache (> 15 attacks per month. The pathophysiology of this progression is completely unknown. Attempting to unravel this phenomenon, we used high field (human brain imaging to compare functional responses, functional connectivity and brain morphology in patients whose migraine episodes did not progress (LF to a matched (gender, age, age of onset and type of medication group of patients whose migraine episodes progressed (HF. Results In comparison to LF patients, responses to pain in HF patients were significantly lower in the caudate, putamen and pallidum. Paradoxically, associated with these lower responses in HF patients, gray matter volume of the right and left caudate nuclei were significantly larger than in the LF patients. Functional connectivity analysis revealed additional differences between the two groups in regard to response to pain. Conclusions Supported by current understanding of basal ganglia role in pain processing, the findings suggest a significant role of the basal ganglia in the pathophysiology of the episodic migraine.

  8. Anger attacks in obsessive compulsive disorder

    Directory of Open Access Journals (Sweden)

    Nitesh Prakash Painuly

    2011-01-01

    Full Text Available Background: Research on anger attacks has been mostly limited to depression, and only a few studies have focused on anger attacks in obsessive compulsive disorder. Materials and Methods: In a cross-sectional study all new obsessive compulsive disorder patients aged 20-60 years attending an outpatient clinic were assessed using the anger attack questionnaire, irritability, depression and anxiety scale (for the direction of the aggressive behavior and quality of life (QOL. Results: The sample consisted of 42 consecutive subjects with obsessive compulsive disorder, out of which 21 (50% had anger attacks. The obsessive compulsive disorder subjects with and without anger attacks did not show significant differences in terms of sociodemographic variables, duration of illness, treatment, and family history. However, subjects with anger attacks had significantly higher prevalence of panic attacks and comorbid depression. Significantly more subjects with anger attacks exhibited aggressive acts toward spouse, parents, children, and other relatives in the form of yelling and threatening to hurt, trying to hurt, and threatening to leave. However, the two groups did not differ significantly in terms of QOL, except for the psychological domain being worse in the subjects with anger attacks. Conclusion: Anger attacks are present in half of the patients with obsessive compulsive disorder, and they correlate with the presence of comorbid depression.

  9. Spin-Mechatronics

    Science.gov (United States)

    Matsuo, Mamoru; Saitoh, Eiji; Maekawa, Sadamichi

    2017-01-01

    We investigate the interconversion phenomena between spin and mechanical angular momentum in moving objects. In particular, the recent results on spin manipulation and spin-current generation by mechanical motion are examined. In accelerating systems, spin-dependent gauge fields emerge, which enable the conversion from mechanical angular momentum into spins. Such a spin-mechanical effect is predicted by quantum theory in a non-inertial frame. Experiments which confirm the effect, i.e., the resonance frequency shift in nuclear magnetic resonance, the stray field measurement of rotating metals, and electric voltage generation in liquid metals, are discussed.

  10. Time-motion analysis of goalball players in attacks: differences of the player positions and the throwing techniques.

    Science.gov (United States)

    Monezi, Lucas Antônio; Magalhães, Thiago Pinguelli; Morato, Márcio Pereira; Mercadante, Luciano Allegretti; Furtado, Otávio Luis Piva da Cunha; Misuta, Milton Shoiti

    2018-03-26

    In this study, we aimed to analyse goalball players time-motion variables (distance covered, time spent, maximum and average velocities) in official goalball match attacks, taking into account the attack phases (preparation and throwing), player position (centres and wings) and throwing techniques (frontal, spin and between the legs). A total of 365 attacks were assessed using a video based method (2D) through manual tracking using the Dvideo system. Inferential non-parametric statistics were applied for comparison of preparation vs. throwing phase, wings vs. centres and, among the throwing techniques, frontal, spin and between the legs. Significant differences were found between the attack preparation versus the throwing phase for all player time-motion variables: distance covered, time spent, maximum player velocity and average player velocity. Wing players performed most of the throws (85%) and covered longer distances than centres (1.65 vs 0.31 m). The between the legs and the spin throwing techniques presented greater values for most of the time-motion variables (distance covered, time spent and maximum player velocity) than did the frontal technique in both attack phases. These findings provide important information regarding players' movement patterns during goalball matches that can be used to plan more effective training.

  11. DDOS ATTACK DETECTION SIMULATION AND HANDLING MECHANISM

    Directory of Open Access Journals (Sweden)

    Ahmad Sanmorino

    2013-11-01

    Full Text Available In this study we discuss how to handle DDoS attack that coming from the attacker by using detection method and handling mechanism. Detection perform by comparing number of packets and number of flow. Whereas handling mechanism perform by limiting or drop the packets that detected as a DDoS attack. The study begins with simulation on real network, which aims to get the real traffic data. Then, dump traffic data obtained from the simulation used for detection method on our prototype system called DASHM (DDoS Attack Simulation and Handling Mechanism. From the result of experiment that has been conducted, the proposed method successfully detect DDoS attack and handle the incoming packet sent by attacker.

  12. Model checking exact cost for attack scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2017-01-01

    Attack trees constitute a powerful tool for modelling security threats. Many security analyses of attack trees can be seamlessly expressed as model checking of Markov Decision Processes obtained from the attack trees, thus reaping the benefits of a coherent framework and a mature tool support....... However, current model checking does not encompass the exact cost analysis of an attack, which is standard for attack trees. Our first contribution is the logic erPCTL with cost-related operators. The extended logic allows to analyse the probability of an event satisfying given cost bounds and to compute...... the exact cost of an event. Our second contribution is the model checking algorithm for erPCTL. Finally, we apply our framework to the analysis of attack trees....

  13. Securing internet by eliminating DDOS attacks

    Science.gov (United States)

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  14. Spin in hadron physics

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2006-07-01

    The following topics were ealt with: Hadron physics with proton and deuteron probes, physics projects with Georgian participation, spin physics with antiprotons and leptons, spin filtering experiments, ISTC projects, technical issues for FAIR. (HSI)

  15. Dynamic nuclear spin polarization

    Energy Technology Data Exchange (ETDEWEB)

    Stuhrmann, H B [GKSS-Forschungszentrum Geesthacht GmbH (Germany)

    1996-11-01

    Polarized neutron scattering from dynamic polarized targets has been applied to various hydrogenous materials at different laboratories. In situ structures of macromolecular components have been determined by nuclear spin contrast variation with an unprecedented precision. The experiments of selective nuclear spin depolarisation not only opened a new dimension to structural studies but also revealed phenomena related to propagation of nuclear spin polarization and the interplay of nuclear polarisation with the electronic spin system. The observation of electron spin label dependent nuclear spin polarisation domains by NMR and polarized neutron scattering opens a way to generalize the method of nuclear spin contrast variation and most importantly it avoids precontrasting by specific deuteration. It also likely might tell us more about the mechanism of dynamic nuclear spin polarisation. (author) 4 figs., refs.

  16. Labor Supply of Politicians

    DEFF Research Database (Denmark)

    Fisman, Raymond; Harmon, Nikolaj Arpe; Kamenica, Emir

    2015-01-01

    Using data on Members of the European Parliament (MEPs), we examine the impact of salaries on the composition and the behavior of legislators. Employing a differences-in-differences approach, we exploit the introduction of a law that equalized MEPs’ salaries which had previously differed by as much...... as a factor of ten. Increasing salaries raises the fraction of MEPs who run for reelection but decreases the quality of elected MEPs (proxied by college quality). Salary has no discernible impact on effort or legislative output. Higher salaries induce more political competition....

  17. Labor Supply of Politicians

    DEFF Research Database (Denmark)

    Fisman, Raymond; Harmon, Nikolaj Arpe; Kamenica, Emir

    Using data on Members of the European Parliament (MEPs), we examine the impact of salaries on the composition and the behavior of legislators. Employing a differences-in-differences approach, we exploit the introduction of a law that equalized MEPs’ salaries which had previously differed by as much...... as a factor of ten. Increasing salaries raises the fraction of MEPs who run for reelection but decreases the quality of elected MEPs (proxied by college quality.) Salary has no discernible impact on effort or legislative output. Higher salaries induce more political competition....

  18. Where can an Insider attack?

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming

    2006-01-01

    By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage...... to the targeted organisation. While the problem is well recognised in the security community as well as in law-enforcement and intelligence communities, the main resort still is to audit log files \\$\\backslash\\$emph{after the fact}. There has been little research into developing models, automated tools......, and techniques for analysing and solving (parts of) the problem. In this paper we first develop a formal model of systems, that can describe real-world scenarios. These high-level models are then mapped to acKlaim, a process algebra with support for access control, that is used to study and analyse properties...

  19. Transient ischemic attack: diagnostic evaluation.

    Science.gov (United States)

    Messé, Steven R; Jauch, Edward C

    2008-08-01

    A transient ischemic attack portends significant risk of a stroke. Consequently, the diagnostic evaluation in the emergency department is focused on identifying high-risk causes so that preventive strategies can be implemented. The evaluation consists of a facilitated evaluation of the patient's metabolic, cardiac, and neurovascular systems. At a minimum, the following tests are recommended: fingerstick glucose level, electrolyte levels, CBC count, urinalysis, and coagulation studies; noncontrast computed tomography (CT) of the head; electrocardiography; and continuous telemetry monitoring. Vascular imaging studies, such as carotid ultrasonography, CT angiography, or magnetic resonance angiography, should be performed on an urgent basis and prioritized according to the patient's risk stratification for disease. Consideration should be given for echocardiography if no large vessel abnormality is identified.

  20. Integrating cyber attacks within fault trees

    International Nuclear Information System (INIS)

    Nai Fovino, Igor; Masera, Marcelo; De Cian, Alessio

    2009-01-01

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  1. Visualizing Risks: Icons for Information Attack Scenarios

    National Research Council Canada - National Science Library

    Hosmer, Hilary

    2000-01-01

    .... Visual attack scenarios help defenders see system ambiguities, imprecision, vulnerabilities and omissions, thus speeding up risk analysis, requirements gathering, safeguard selection, cryptographic...

  2. Classifying network attack scenarios using an ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-03-01

    Full Text Available ) or to the target?s reputation. The Residue sub-phase refers to damage or artefacts of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example after the launch of a DDOS..., A. (1995). Hacking theft of $10 million from citibank revealed. Retrieved 10/10, 2011, from http://articles.latimes.com/1995-08-19/business/fi-36656_1_citibank-system Hurley, E. (2004). SCO site succumbs to DDoS attack. Retrieved 10/10, 2011, from...

  3. A computer network attack taxonomy and ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-01-01

    Full Text Available of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example, after the launch of a DDOS (Distributed Denial of Service) attack, zombie computers may still connect to the target...-scrap- value-of-a-hacked-pc-revisited/ . Lancor, L., & Workman, R. (2007). Using Google Hacking to Enhance Defense Strategies. ACM SIGCSE Bulletin, 39 (1), 491-495. Lau, F., Rubin, S. H., Smith, M. H., & Trajkovic, L. (2000). Distributed Denial of Service...

  4. Integrating cyber attacks within fault trees

    Energy Technology Data Exchange (ETDEWEB)

    Nai Fovino, Igor [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy)], E-mail: igor.nai@jrc.it; Masera, Marcelo [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy); De Cian, Alessio [Department of Electrical Engineering, University di Genova, Genoa (Italy)

    2009-09-15

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  5. A Beautiful Spin

    International Nuclear Information System (INIS)

    Ji Xiangdong

    2003-01-01

    Spin is a beautiful concept that plays an ever important role in modern physics. In this talk, I start with a discussion of the origin of spin, and then turn to three themes in which spin has been crucial in subatomic physics: a lab to explore physics beyond the standard model, a tool to measure physical observables that are hard to obtain otherwise, a probe to unravel nonperturbative QCD. I conclude with some remarks on a world without spin

  6. Threatening communication: A qualitative study of fear appeal effectiveness beliefs among intervention developers, policymakers, politicians, scientists, and advertising professionals

    Science.gov (United States)

    Peters, Gjalt-Jorn Y; Ruiter, Robert A C; Kok, Gerjo

    2014-01-01

    Threatening communication is a widely applied method in behavior change interventions, which at the same time has been heavily criticized in the psychological literature. The current paper describes a study of the reasons for this persistent wide application of threatening communication. We conducted qualitative interviews with 33 key actors in behavior change intervention development in The Netherlands. Specifically, we interviewed intervention developers, policymakers, politicians, scientists, and advertising professionals. The interviews were transcribed and subsequently coded using NVivo. We found that participants most closely involved with the actual intervention development were generally convinced that threatening information was to be prevented, but often did not understand the exact processes involved. They were often under the impression that rather than a potent efficacy enhancing element, a behavioral suggestion would suffice to prevent threatening communication from backfiring. As participants were further removed from the actual intervention development, they generally tended to be more in favor of threatening communication. The main reasons for use of threatening information were to attract attention or prompt self-reflection through confrontation, because target population members were assumed to like threatening information and respond rationally to increased risk perceptions by changing their behavior, or simply because no alternatives were available. In addition, intervention developers frequently had to deal with supervisors or funders who preferred threatening communication. Thus, when communicating with practitioners, it seems fruitful to provide them with a toolbox of evidence-based behavior change methods that promote adaptive, rather than maladaptive, behavior; to promote basing interventions on the most relevant behavioral determinants as identified by determinant analyses; and to equip intervention developers with the tools to persuade

  7. Threatening communication: a qualitative study of fear appeal effectiveness beliefs among intervention developers, policymakers, politicians, scientists, and advertising professionals.

    Science.gov (United States)

    Peters, Gjalt-Jorn Y; Ruiter, Robert A C; Kok, Gerjo

    2014-04-01

    Threatening communication is a widely applied method in behavior change interventions, which at the same time has been heavily criticized in the psychological literature. The current paper describes a study of the reasons for this persistent wide application of threatening communication. We conducted qualitative interviews with 33 key actors in behavior change intervention development in The Netherlands. Specifically, we interviewed intervention developers, policymakers, politicians, scientists, and advertising professionals. The interviews were transcribed and subsequently coded using NVivo. We found that participants most closely involved with the actual intervention development were generally convinced that threatening information was to be prevented, but often did not understand the exact processes involved. They were often under the impression that rather than a potent efficacy enhancing element, a behavioral suggestion would suffice to prevent threatening communication from backfiring. As participants were further removed from the actual intervention development, they generally tended to be more in favor of threatening communication. The main reasons for use of threatening information were to attract attention or prompt self-reflection through confrontation, because target population members were assumed to like threatening information and respond rationally to increased risk perceptions by changing their behavior, or simply because no alternatives were available. In addition, intervention developers frequently had to deal with supervisors or funders who preferred threatening communication. Thus, when communicating with practitioners, it seems fruitful to provide them with a toolbox of evidence-based behavior change methods that promote adaptive, rather than maladaptive, behavior; to promote basing interventions on the most relevant behavioral determinants as identified by determinant analyses; and to equip intervention developers with the tools to persuade

  8. Spin at Lausanne

    International Nuclear Information System (INIS)

    Anon.

    1980-01-01

    From 25 September to 1 October, some 150 spin enthusiasts gathered in Lausanne for the 1980 International Symposium on High Energy Physics with Polarized Beams and Polarized Targets. The programme was densely packed, covering physics interests with spin as well as the accelerator and target techniques which make spin physics possible

  9. Spin-Caloritronic Batteries

    DEFF Research Database (Denmark)

    Yu, Xiao-Qin; Zhu, Zhen-Gang; Su, Gang

    2017-01-01

    The thermoelectric performance of a topological energy converter is analyzed. The H-shaped device is based on a combination of transverse topological effects involving the spin: the inverse spin Hall effect and the spin Nernst effect. The device can convert a temperature drop in one arm into an e...

  10. Spinning Eggs and Ballerinas

    Science.gov (United States)

    Cross, Rod

    2013-01-01

    Measurements are presented on the rise of a spinning egg. It was found that the spin, the angular momentum and the kinetic energy all decrease as the egg rises, unlike the case of a ballerina who can increase her spin and kinetic energy by reducing her moment of inertia. The observed effects can be explained, in part, in terms of rolling friction…

  11. Social media - a political journalist’s friend or foe? - Political journalists’ opinions on how social media influence their job and possibilities to communicate with politicians

    OpenAIRE

    Rosenback, Michaela

    2017-01-01

    Developing technologies and social media platforms offer new ways of producing and receiving political content. The political elites need to follow, and update social media on a regular basis, and political messages are being blended into the world of entertainment and show business. At the same time, journalists have incorporated social media in their daily job and use social media platforms as working tools. This affects the interconnections between journalists and politicians, making their...

  12. Felicjan Sławoj-Składkowski (1885-1962): The only known doctor-soldier-politician with an outdoor-wooden-toilet named after him.

    Science.gov (United States)

    Ohry, Avi

    2017-05-01

    Felicjan Sławoj-Składkowski was a Polish physician, General and politician who served as Polish Minister of Internal Affairs and was the last Prime Minister of Poland before the Second World War. The lack of basic sanitation in many of Poland's villages caused him to issue a decree that every household in Poland must have a latrine in working order. Wooden sheds were built in the backyards, subsequently named 'sławojkis'.

  13. Spin physics in semiconductors

    CERN Document Server

    2017-01-01

    This book offers an extensive introduction to the extremely rich and intriguing field of spin-related phenomena in semiconductors. In this second edition, all chapters have been updated to include the latest experimental and theoretical research. Furthermore, it covers the entire field: bulk semiconductors, two-dimensional semiconductor structures, quantum dots, optical and electric effects, spin-related effects, electron-nuclei spin interactions, Spin Hall effect, spin torques, etc. Thanks to its self-contained style, the book is ideally suited for graduate students and researchers new to the field.

  14. Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0

    NARCIS (Netherlands)

    Gadyatskaya, Olga; Jhawar, Ravi; Kordy, P.T.; Lounis, Karim; Mauw, Sjouke; Trujillo-Rasua, Rolando

    2016-01-01

    In this tool demonstration paper we present the ADTool2.0: an open-source software tool for design, manipulation and analysis of attack trees. The tool supports ranking of attack scenarios based on quantitative attributes entered by the user; it is scriptable; and it incorporates attack trees with

  15. The work-averse cyber attacker model : theory and evidence from two million attack signatures

    NARCIS (Netherlands)

    Allodi, L.; Massacci, F.; Williams, J.

    The typical cyber attacker is assumed to be all powerful and to exploit all possible vulnerabilities. In this paper we present, and empirically validate, a novel and more realistic attacker model. The intuition of our model is that an attacker will optimally choose whether to act and weaponize a new

  16. Inverse spin Hall effect by spin injection

    Science.gov (United States)

    Liu, S. Y.; Horing, Norman J. M.; Lei, X. L.

    2007-09-01

    Motivated by a recent experiment [S. O. Valenzuela and M. Tinkham, Nature (London) 442, 176 (2006)], the authors present a quantitative microscopic theory to investigate the inverse spin-Hall effect with spin injection into aluminum considering both intrinsic and extrinsic spin-orbit couplings using the orthogonalized-plane-wave method. Their theoretical results are in good agreement with the experimental data. It is also clear that the magnitude of the anomalous Hall resistivity is mainly due to contributions from extrinsic skew scattering.

  17. Attack Tree Generation by Policy Invalidation

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Naeem Akram, R.; Jajodia, S.

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identi﬿cation. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identi﬿ed

  18. Evaluation of Crosstalk Attacks in Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    2016-01-01

    WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks...

  19. Drammer : Deterministic Rowhammer attacks on mobile platforms

    NARCIS (Netherlands)

    Van Der Veen, Victor; Fratantonio, Yanick; Lindorfer, Martina; Gruss, Daniel; Maurice, Clémentine; Vigna, Giovanni; Bos, Herbert; Razavi, Kaveh; Giuffrida, Cristiano

    2016-01-01

    Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and completely subvert a system. However, existing efforts either describe probabilistic (and thus unreliable) attacks or rely on special (and often unavailable) memory management features to place victim objects

  20. Collaborative Attack Mitigation and Response: A survey

    NARCIS (Netherlands)

    Steinberger, Jessica; Sperotto, Anna; Baier, Harald; Pras, Aiko

    2015-01-01

    Over recent years, network-based attacks have become to one of the top causes of network infrastructure and service outages. To counteract a network-based attack, an approach is to move mitigation from the target network to the networks of Internet Service Providers (ISP). However, it remains

  1. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...

  2. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  3. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  4. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  5. Bulk electron spin polarization generated by the spin Hall current

    OpenAIRE

    Korenev, V. L.

    2005-01-01

    It is shown that the spin Hall current generates a non-equilibrium spin polarization in the interior of crystals with reduced symmetry in a way that is drastically different from the previously well-known equilibrium polarization during the spin relaxation process. The steady state spin polarization value does not depend on the strength of spin-orbit interaction offering possibility to generate relatively high spin polarization even in the case of weak spin-orbit coupling.

  6. Bulk electron spin polarization generated by the spin Hall current

    Science.gov (United States)

    Korenev, V. L.

    2006-07-01

    It is shown that the spin Hall current generates a nonequilibrium spin polarization in the interior of crystals with reduced symmetry in a way that is drastically different from the previously well-known “equilibrium” polarization during the spin relaxation process. The steady state spin polarization value does not depend on the strength of spin-orbit interaction offering possibility to generate relatively high spin polarization even in the case of weak spin-orbit coupling.

  7. Muon spin relaxation in random spin systems

    International Nuclear Information System (INIS)

    Toshimitsu Yamazaki

    1981-01-01

    The longitudinal relaxation function Gsub(z)(t) of the positive muon can reflect dynamical characters of local field in a unique way even when the correlation time is longer than the Larmor period of local field. This method has been applied to studies of spin dynamics in spin glass systems, revealing sharp but continuous temperature dependence of the correlation time. Its principle and applications are reviewed. (author)

  8. Adaptive cyber-attack modeling system

    Science.gov (United States)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  9. Situational awareness of a coordinated cyber attack

    Science.gov (United States)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  10. Radiological attacks and accidents. Medical consequences

    International Nuclear Information System (INIS)

    Sakuta, Hidenari

    2007-01-01

    Probability of the occurrence of radiological attacks appears to be elevated after the terrorist attacks against the United States on September 11 in 2001. There are a lot of scenarios of radiological attack: simple radiological device, radiological disperse device (RDD or dirty bomb), attacks against nuclear reactor, improvised nuclear device, and nuclear weapons. Of these, RDD attack is the most probable scenario, because it can be easily made and can generate enormous psychological and economic damages. Radiological incidents are occurring to and fro in the world, including several cases of theft to nuclear facilities and unsuccessful terrorist attacks against them. Recently, a former Russian spy has allegedly been killed using polonium-210. In addition, serious radiological accidents have occurred in Chernobyl, Goiania, and Tokai-mura. Planning, preparation, education, and training exercise appear to be essential factors to cope with radiological attacks and accidents effectively without feeling much anxiety. Triage and psychological first aid are prerequisite to manage and provide effective medial care for mass casualties without inducing panic. (author)

  11. Spin Hall effects

    Science.gov (United States)

    Sinova, Jairo; Valenzuela, Sergio O.; Wunderlich, J.; Back, C. H.; Jungwirth, T.

    2015-10-01

    Spin Hall effects are a collection of relativistic spin-orbit coupling phenomena in which electrical currents can generate transverse spin currents and vice versa. Despite being observed only a decade ago, these effects are already ubiquitous within spintronics, as standard spin-current generators and detectors. Here the theoretical and experimental results that have established this subfield of spintronics are reviewed. The focus is on the results that have converged to give us the current understanding of the phenomena, which has evolved from a qualitative to a more quantitative measurement of spin currents and their associated spin accumulation. Within the experimental framework, optical-, transport-, and magnetization-dynamics-based measurements are reviewed and linked to both phenomenological and microscopic theories of the effect. Within the theoretical framework, the basic mechanisms in both the extrinsic and intrinsic regimes are reviewed, which are linked to the mechanisms present in their closely related phenomenon in ferromagnets, the anomalous Hall effect. Also reviewed is the connection to the phenomenological treatment based on spin-diffusion equations applicable to certain regimes, as well as the spin-pumping theory of spin generation used in many measurements of the spin Hall angle. A further connection to the spin-current-generating spin Hall effect to the inverse spin galvanic effect is given, in which an electrical current induces a nonequilibrium spin polarization. This effect often accompanies the spin Hall effect since they share common microscopic origins. Both can exhibit the same symmetries when present in structures comprising ferromagnetic and nonmagnetic layers through their induced current-driven spin torques or induced voltages. Although a short chronological overview of the evolution of the spin Hall effect field and the resolution of some early controversies is given, the main body of this review is structured from a pedagogical

  12. The susceptibilities in the spin-S Ising model

    International Nuclear Information System (INIS)

    Ainane, A.; Saber, M.

    1995-08-01

    The susceptibilities of the spin-S Ising model are evaluated using the effective field theory introduced by Tucker et al. for studying general spin-S Ising model. The susceptibilities are studied for all spin values from S = 1/2 to S = 5/2. (author). 12 refs, 4 figs

  13. Neutron spin quantum precession using multilayer spin splitters and a phase-spin echo interferometer

    International Nuclear Information System (INIS)

    Ebisawa, Toru; Tasaki, Seiji; Kawai, Takeshi; Hino, Masahiro; Akiyoshi, Tsunekazu; Achiwa, Norio; Otake, Yoshie; Funahashi, Haruhiko.

    1996-01-01

    Neutron spin quantum precession by multilayer spin splitter has been demonstrated using a new spin interferometer. The multilayer spin splitter consists of a magnetic multilayer mirror on top, followed by a gap layer and a non magnetic multilayer mirror which are evaporated on a silicon substrate. Using the multilayer spin splitter, a polarized neutron wave in a magnetic field perpendicular to the polarization is split into two spin eigenstates with a phase shift in the direction of the magnetic field. The spin quantum precession is equal to the phase shift, which depends on the effective thickness of the gap layer. The demonstration experiments verify the multilayer spin splitter as a neutron spin precession device as well as the coherent superposition principle of the two spin eigenstates. We have developed a new phase-spin echo interferometer using the multilayer spin splitters. We present successful performance tests of the multilayer spin splitter and the phase-spin echo interferometer. (author)

  14. Higher spin gauge theories

    CERN Document Server

    Henneaux, Marc; Vasiliev, Mikhail A

    2017-01-01

    Symmetries play a fundamental role in physics. Non-Abelian gauge symmetries are the symmetries behind theories for massless spin-1 particles, while the reparametrization symmetry is behind Einstein's gravity theory for massless spin-2 particles. In supersymmetric theories these particles can be connected also to massless fermionic particles. Does Nature stop at spin-2 or can there also be massless higher spin theories. In the past strong indications have been given that such theories do not exist. However, in recent times ways to evade those constraints have been found and higher spin gauge theories have been constructed. With the advent of the AdS/CFT duality correspondence even stronger indications have been given that higher spin gauge theories play an important role in fundamental physics. All these issues were discussed at an international workshop in Singapore in November 2015 where the leading scientists in the field participated. This volume presents an up-to-date, detailed overview of the theories i...

  15. Classification of cyber attacks in South Africa

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-05-01

    Full Text Available various ATM's throughout South Africa. Two criminals, Motsoane and Masoleng, were arrested in February 2012 and both sentenced to 15 years in jail [36, 37]. 3.10 2013: IOL DDoS Anonymous Africa claimed responsibility for launching a Distributed Denial... of Service (DDoS) attack on the Independent Newspaper web site iol.co.za. The attack was in response to claims that the IOL group supports Zimbabwean president Robert Mugabe. The following taunt was sent to boast about the attack: “IOL bad boys bad boys...

  16. Attacker Modelling in Ubiquitous Computing Systems

    DEFF Research Database (Denmark)

    Papini, Davide

    in with our everyday life. This future is visible to everyone nowadays: terms like smartphone, cloud, sensor, network etc. are widely known and used in our everyday life. But what about the security of such systems. Ubiquitous computing devices can be limited in terms of energy, computing power and memory...... attacker remain somehow undened and still under extensive investigation. This Thesis explores the nature of the ubiquitous attacker with a focus on how she interacts with the physical world and it denes a model that captures the abilities of the attacker. Furthermore a quantitative implementation...

  17. The Nuclear Spin Nanomagnet

    OpenAIRE

    Korenev, V. L.

    2007-01-01

    Linearly polarized light tuned slightly below the optical transition of the negatively charged exciton (trion) in a single quantum dot causes the spontaneous nuclear spin polarization (self-polarization) at a level close to 100%. The effective magnetic field of spin-polarized nuclei brings the optical transition energy into resonance with photon energy. The resonantly enhanced Overhauser effect sustains the stability of the nuclear self-polarization even in the absence of spin polarization of...

  18. A controllable spin prism

    International Nuclear Information System (INIS)

    Hakioglu, T

    2009-01-01

    Based on Khodas et al (2004 Phys. Rev. Lett. 92 086602), we propose a device acting like a controllable prism for an incident spin. The device is a large quantum well where Rashba and Dresselhaus spin-orbit interactions are present and controlled by the plunger gate potential, the electric field and the barrier height. A totally destructive interference can be manipulated externally between the Rashba and Dresselhaus couplings. The spin-dependent transmission/reflection amplitudes are calculated as the control parameters are changed. The device operates as a spin prism/converter/filter in different regimes and may stimulate research in promising directions in spintronics in analogy with linear optics.

  19. Operator spin foam models

    International Nuclear Information System (INIS)

    Bahr, Benjamin; Hellmann, Frank; Kaminski, Wojciech; Kisielowski, Marcin; Lewandowski, Jerzy

    2011-01-01

    The goal of this paper is to introduce a systematic approach to spin foams. We define operator spin foams, that is foams labelled by group representations and operators, as our main tool. A set of moves we define in the set of the operator spin foams (among other operations) allows us to split the faces and the edges of the foams. We assign to each operator spin foam a contracted operator, by using the contractions at the vertices and suitably adjusted face amplitudes. The emergence of the face amplitudes is the consequence of assuming the invariance of the contracted operator with respect to the moves. Next, we define spin foam models and consider the class of models assumed to be symmetric with respect to the moves we have introduced, and assuming their partition functions (state sums) are defined by the contracted operators. Briefly speaking, those operator spin foam models are invariant with respect to the cellular decomposition, and are sensitive only to the topology and colouring of the foam. Imposing an extra symmetry leads to a family we call natural operator spin foam models. This symmetry, combined with assumed invariance with respect to the edge splitting move, determines a complete characterization of a general natural model. It can be obtained by applying arbitrary (quantum) constraints on an arbitrary BF spin foam model. In particular, imposing suitable constraints on a spin(4) BF spin foam model is exactly the way we tend to view 4D quantum gravity, starting with the BC model and continuing with the Engle-Pereira-Rovelli-Livine (EPRL) or Freidel-Krasnov (FK) models. That makes our framework directly applicable to those models. Specifically, our operator spin foam framework can be translated into the language of spin foams and partition functions. Among our natural spin foam models there are the BF spin foam model, the BC model, and a model corresponding to the EPRL intertwiners. Our operator spin foam framework can also be used for more general spin

  20. PREFACE: Spin Electronics

    Science.gov (United States)

    Dieny, B.; Sousa, R.; Prejbeanu, L.

    2007-04-01

    Conventional electronics has in the past ignored the spin on the electron, however things began to change in 1988 with the discovery of giant magnetoresistance in metallic thin film stacks which led to the development of a new research area, so called spin-electronics. In the last 10 years, spin-electronics has achieved a number of breakthroughs from the point of view of both basic science and application. Materials research has led to several major discoveries: very large tunnel magnetoresistance effects in tunnel junctions with crystalline barriers due to a new spin-filtering mechanism associated with the spin-dependent symmetry of the electron wave functions new magnetic tunnelling barriers leading to spin-dependent tunnelling barrier heights and acting as spin-filters magnetic semiconductors with increasingly high ordering temperature. New phenomena have been predicted and observed: the possibility of acting on the magnetization of a magnetic nanostructure with a spin-polarized current. This effect, due to a transfer of angular momentum between the spin polarized conduction electrons and the local magnetization, can be viewed as the reciprocal of giant or tunnel magnetoresistance. It can be used to switch the magnetization of a magnetic nanostructure or to generate steady magnetic excitations in the system. the possibility of generating and manipulating spin current without charge current by creating non-equilibrium local accumulation of spin up or spin down electrons. The range of applications of spin electronics materials and phenomena is expanding: the first devices based on giant magnetoresistance were the magnetoresistive read-heads for computer disk drives. These heads, introduced in 1998 with current-in plane spin-valves, have evolved towards low resistance tunnel magnetoresistice heads in 2005. Besides magnetic recording technology, these very sensitive magnetoresistive sensors are finding applications in other areas, in particular in biology. magnetic

  1. Topologically Massive Higher Spin Gravity

    NARCIS (Netherlands)

    Bagchi, A.; Lal, S.; Saha, A.; Sahoo, B.

    2011-01-01

    We look at the generalisation of topologically massive gravity (TMG) to higher spins, specifically spin-3. We find a special "chiral" point for the spin-three, analogous to the spin-two example, which actually coincides with the usual spin-two chiral point. But in contrast to usual TMG, there is the

  2. Spin-orbit and spin-lattice coupling

    International Nuclear Information System (INIS)

    Bauer, Gerrit E.W.; Ziman, Timothy; Mori, Michiyasu

    2014-01-01

    We pursued theoretical research on the coupling of electron spins in the condensed matter to the lattice as mediated by the spin-orbit interaction with special focus on the spin and anomalous Hall effects. (author)

  3. YET ANOTHER ATTACK ON WAGES AND CONDITIONS.

    Science.gov (United States)

    McCarthy, Andrew

    2016-10-01

    An unobjectionable-sounding title obscures the real intent of the latest in a series of Bills which the federal Coalition government is attempting to legislate in its ongoing attempts to undermine employee wages and conditions and attack unions.

  4. A Unique Fatal Moose Attack Mimicking Homicide.

    Science.gov (United States)

    Gudmannsson, Petur; Berge, Johan; Druid, Henrik; Ericsson, Göran; Eriksson, Anders

    2018-03-01

    Fatalities caused by animal attacks are rare, but have the potential to mimic homicide. We present a case in which a moose attacked and killed a woman who was walking her dog in a forest. Autopsy showed widespread blunt trauma with a large laceration on one leg in which blades of grass were embedded. Flail chest was the cause of death. The case was initially conceived as homicide by means of a riding lawn mower. A review of the case by moose experts and analyses of biological trace material that proved to originate from moose, established the true source of injury. The dog probably provoked a moose, which, in response, stomped and gored the victim to death. The injuries resembled those previously reported from attacks by cattle and water buffalo. Fatal moose attacks constitute an extremely rare threat in boreal areas, but can be considered in traumatic deaths of unknown cause. © 2017 American Academy of Forensic Sciences.

  5. Diabetes - preventing heart attack and stroke

    Science.gov (United States)

    Diabetes complications - heart; Coronary artery disease - diabetes; CAD - diabetes; Cerebrovascular disease - diabetes ... People with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure and high ...

  6. Marine Attack on Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Ad

    2002-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  7. Heuristic attacks against graphical password generators

    CSIR Research Space (South Africa)

    Peach, S

    2010-05-01

    Full Text Available In this paper the authors explore heuristic attacks against graphical password generators. A new trend is emerging to use user clickable pictures to generate passwords. This technique of authentication can be successfully used for - for example...

  8. On localization attacks against cloud infrastructure

    Science.gov (United States)

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  9. Using agility to combat cyber attacks.

    Science.gov (United States)

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  10. Social engineering attack examples, templates and scenarios

    CSIR Research Space (South Africa)

    Mouton, Francois

    2016-06-01

    Full Text Available that are representative of real-world examples, whilst still being general enough to encompass several different real-world examples. The proposed social engineering attack templates cover all three types of communication, namely bidirectional communication...

  11. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  12. The role of sleep in migraine attacks

    Directory of Open Access Journals (Sweden)

    Elaine Inamorato

    1993-11-01

    Full Text Available Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. In view of this variable relationship we studied the records of 159 consecutive outpatients of our Headache Unit. In 121 records there was reference to sleep involvement, in 55% by a single form and in 45% by more than one form. When only one form was related, relief was most common (70%. 30% of that group of patients had the migraine attack precipitated by sleep, 24% by deprivation and 6% by sleep excess. When the effects of sleep were multiple, these effects were as expected logically in 65%: «in accordance» group (e.g attack precipitated by sleep deprivation and relieved by sleep onset. In a second group, («conflicting» where the involvement was not logical, there were three different combinations of sleep involvement, possibly due to more than one pathophysiological mechanism.

  13. ATTACK WARNING: Costs to Modernize NORAD's Computer System Significantly Understated

    National Research Council Canada - National Science Library

    Cross, F

    1991-01-01

    ...) Integrated Tactical Warning and Attack Assessment (ITW/AA) system. These subsystems provide critical strategic surveillance and attack warning and assessment information to United States and Canadian leaders...

  14. Spin Current Noise of the Spin Seebeck Effect and Spin Pumping

    Science.gov (United States)

    Matsuo, M.; Ohnuma, Y.; Kato, T.; Maekawa, S.

    2018-01-01

    We theoretically investigate the fluctuation of a pure spin current induced by the spin Seebeck effect and spin pumping in a normal-metal-(NM-)ferromagnet(FM) bilayer system. Starting with a simple ferromagnet-insulator-(FI-)NM interface model with both spin-conserving and non-spin-conserving processes, we derive general expressions of the spin current and the spin-current noise at the interface within second-order perturbation of the FI-NM coupling strength, and estimate them for a yttrium-iron-garnet-platinum interface. We show that the spin-current noise can be used to determine the effective spin carried by a magnon modified by the non-spin-conserving process at the interface. In addition, we show that it provides information on the effective spin of a magnon, heating at the interface under spin pumping, and spin Hall angle of the NM.

  15. RAPTOR: Ransomware Attack PredicTOR

    OpenAIRE

    Quinkert, Florian; Holz, Thorsten; Hossain, KSM Tozammel; Ferrara, Emilio; Lerman, Kristina

    2018-01-01

    Ransomware, a type of malicious software that encrypts a victim's files and only releases the cryptographic key once a ransom is paid, has emerged as a potentially devastating class of cybercrimes in the past few years. In this paper, we present RAPTOR, a promising line of defense against ransomware attacks. RAPTOR fingerprints attackers' operations to forecast ransomware activity. More specifically, our method learns features of malicious domains by looking at examples of domains involved in...

  16. Attack Helicopter Operations: Art or Science

    Science.gov (United States)

    1991-05-13

    ATTACK HELICOPTER OPERATIONS: ART OR SCIENCE ? BY LIEUTENANT COLONEL JAN CALLEN United States Army DISTRIBUTION STATEMENT A: Approved for public release...TASK IWORK UNIT ELEMENT NO. NO. NO. ACCESSION NC 11. TITLE (Include Socurity Classification) Attack Helicopter Operations: Art or Science ? 12. PERSONAL...OPERATIONS: ART OR SCIENCE ? AN INDIVIDUAL STUDY PROJECT by Lieutenant Colonel Jan Callen United States Army Colonel Greg Snelgrove Project Adviser U.S

  17. Protecting mobile agents from external replay attacks

    OpenAIRE

    Garrigues Olivella, Carles; Migas, Nikos; Buchanan, William; Robles, Sergi; Borrell Viader, Joan

    2014-01-01

    Peer-reviewed This paper presents a protocol for the protection of mobile agents against external replay attacks. This kind of attacks are performed by malicious platforms when dispatching an agent multiple times to a remote host, thus making it reexecute part of its itinerary. Current proposals aiming to address this problem are based on storing agent identifiers, or trip markers, inside agent platforms, so that future reexecutions can be detected and prevented. The problem of these solut...

  18. Semantic Identification Attacks on Web Browsing

    OpenAIRE

    Guha, Neel

    2016-01-01

    We introduce a Semantic Identification Attack, in which an adversary uses semantic signals about the pages visited in one browsing session to identify other browsing sessions launched by the same user. This attack allows an adver- sary to determine if two browsing sessions originate from the same user regardless of any measures taken by the user to disguise their browser or network. We use the MSNBC Anonymous Browsing data set, which contains a large set of user visits (labeled by category) t...

  19. Consciousness in Non-Epileptic Attack Disorder

    OpenAIRE

    Reuber, M.; Kurthen, M.

    2011-01-01

    Non-epileptic attack disorder (NEAD) is one of the most important differential diagnoses of epilepsy. Impairment of\\ud consciousness is the key feature of non-epileptic attacks (NEAs). The first half of this review summarises the clinical research\\ud literature featuring observations relating to consciousness in NEAD. The second half places this evidence in the wider context\\ud of the recent discourse on consciousness in neuroscience and the philosophy of mind. We argue that studies of consci...

  20. Cyber Security Audit and Attack Detection Toolkit

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  1. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    Science.gov (United States)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  2. Combined Heuristic Attack Strategy on Complex Networks

    Directory of Open Access Journals (Sweden)

    Marek Šimon

    2017-01-01

    Full Text Available Usually, the existence of a complex network is considered an advantage feature and efforts are made to increase its robustness against an attack. However, there exist also harmful and/or malicious networks, from social ones like spreading hoax, corruption, phishing, extremist ideology, and terrorist support up to computer networks spreading computer viruses or DDoS attack software or even biological networks of carriers or transport centers spreading disease among the population. New attack strategy can be therefore used against malicious networks, as well as in a worst-case scenario test for robustness of a useful network. A common measure of robustness of networks is their disintegration level after removal of a fraction of nodes. This robustness can be calculated as a ratio of the number of nodes of the greatest remaining network component against the number of nodes in the original network. Our paper presents a combination of heuristics optimized for an attack on a complex network to achieve its greatest disintegration. Nodes are deleted sequentially based on a heuristic criterion. Efficiency of classical attack approaches is compared to the proposed approach on Barabási-Albert, scale-free with tunable power-law exponent, and Erdős-Rényi models of complex networks and on real-world networks. Our attack strategy results in a faster disintegration, which is counterbalanced by its slightly increased computational demands.

  3. SCADA system vulnerabilities to cyber attack

    Energy Technology Data Exchange (ETDEWEB)

    Shaw, W. T. [Cyber Security Consulting (Canada)

    2004-10-01

    The susceptibility to terrorist attacks of computer-based supervisory control (SCADA) systems that are used to monitor and control water distribution systems, oil and gas pipelines and the electrical grid, is discussed. The discussion includes ways in which SCADA systems may be attacked and remedial actions that may be taken to reduce or eliminate the possibility of such attacks. Attacks may take the form of causing the system to generate false data to divert attention from impending system disasters, or commandeer the system to seriously disable it, or cause damage to the process or equipment being controlled by sending improper control commands. SCADA systems are also vulnerable to internal threats, either from an accidental action that results in damage, or an intentional action, as for example by a disgruntled employee, or ex-employee, usually by way of reprogramming an RTU or PLC by accessing the polling/communications circuit. Recent SCADA systems are much more susceptible to concerted cyber attacks because of the adoption of IT technologies and standards into the design of such systems. (Older systems are more likely to be unique designs, hence less susceptible to attack). As far as protection of SCADA systems is concerned, there are no technologies that would prevent a technologically sophisticated terrorist or disgruntled employee from doing major damage to the system, however, the IT world has developed a range of technologies for the protection of IT assets, and many of these same technologies can also be used to safeguard modern SCADA systems.

  4. Effect of spin rotation coupling on spin transport

    International Nuclear Information System (INIS)

    Chowdhury, Debashree; Basu, B.

    2013-01-01

    We have studied the spin rotation coupling (SRC) as an ingredient to explain different spin-related issues. This special kind of coupling can play the role of a Dresselhaus like coupling in certain conditions. Consequently, one can control the spin splitting, induced by the Dresselhaus like term, which is unusual in a semiconductor heterostructure. Within this framework, we also study the renormalization of the spin-dependent electric field and spin current due to the k → ⋅p → perturbation, by taking into account the interband mixing in the rotating system. In this paper we predict the enhancement of the spin-dependent electric field resulting from the renormalized spin rotation coupling. The renormalization factor of the spin electric field is different from that of the SRC or Zeeman coupling. The effect of renormalized SRC on spin current and Berry curvature is also studied. Interestingly, in the presence of this SRC-induced SOC it is possible to describe spin splitting as well as spin galvanic effect in semiconductors. -- Highlights: •Studied effect of spin rotation coupling on the spin electric field, spin current and Berry curvature. •In the k → ⋅p → framework we study the renormalization of spin electric field and spin current. •For an inertial system we have discussed the spin splitting. •Expression for the Berry phase in the inertial system is discussed. •The inertial spin galvanic effect is studied

  5. Effect of spin rotation coupling on spin transport

    Energy Technology Data Exchange (ETDEWEB)

    Chowdhury, Debashree, E-mail: debashreephys@gmail.com; Basu, B., E-mail: sribbasu@gmail.com

    2013-12-15

    We have studied the spin rotation coupling (SRC) as an ingredient to explain different spin-related issues. This special kind of coupling can play the role of a Dresselhaus like coupling in certain conditions. Consequently, one can control the spin splitting, induced by the Dresselhaus like term, which is unusual in a semiconductor heterostructure. Within this framework, we also study the renormalization of the spin-dependent electric field and spin current due to the k{sup →}⋅p{sup →} perturbation, by taking into account the interband mixing in the rotating system. In this paper we predict the enhancement of the spin-dependent electric field resulting from the renormalized spin rotation coupling. The renormalization factor of the spin electric field is different from that of the SRC or Zeeman coupling. The effect of renormalized SRC on spin current and Berry curvature is also studied. Interestingly, in the presence of this SRC-induced SOC it is possible to describe spin splitting as well as spin galvanic effect in semiconductors. -- Highlights: •Studied effect of spin rotation coupling on the spin electric field, spin current and Berry curvature. •In the k{sup →}⋅p{sup →} framework we study the renormalization of spin electric field and spin current. •For an inertial system we have discussed the spin splitting. •Expression for the Berry phase in the inertial system is discussed. •The inertial spin galvanic effect is studied.

  6. Spin temperature concept verified by optical magnetometry of nuclear spins

    Science.gov (United States)

    Vladimirova, M.; Cronenberger, S.; Scalbert, D.; Ryzhov, I. I.; Zapasskii, V. S.; Kozlov, G. G.; Lemaître, A.; Kavokin, K. V.

    2018-01-01

    We develop a method of nonperturbative optical control over adiabatic remagnetization of the nuclear spin system and apply it to verify the spin temperature concept in GaAs microcavities. The nuclear spin system is shown to exactly follow the predictions of the spin temperature theory, despite the quadrupole interaction that was earlier reported to disrupt nuclear spin thermalization. These findings open a way for the deep cooling of nuclear spins in semiconductor structures, with the prospect of realizing nuclear spin-ordered states for high-fidelity spin-photon interfaces.

  7. Spin labels. Applications in biology

    International Nuclear Information System (INIS)

    Frangopol, T.P.; Frangopol, M.; Ionescu, S.M.; Pop, I.V.; Benga, G.

    1980-11-01

    The main applications of spin labels in the study of biomembranes, enzymes, nucleic acids, in pharmacology, spin immunoassay are reviewed along with the fundamentals of the spin label method. 137 references. (author)

  8. Spin Switching via Quantum Dot Spin Valves

    Science.gov (United States)

    Gergs, N. M.; Bender, S. A.; Duine, R. A.; Schuricht, D.

    2018-01-01

    We develop a theory for spin transport and magnetization dynamics in a quantum dot spin valve, i.e., two magnetic reservoirs coupled to a quantum dot. Our theory is able to take into account effects of strong correlations. We demonstrate that, as a result of these strong correlations, the dot gate voltage enables control over the current-induced torques on the magnets and, in particular, enables voltage-controlled magnetic switching. The electrical resistance of the structure can be used to read out the magnetic state. Our model may be realized by a number of experimental systems, including magnetic scanning-tunneling microscope tips and artificial quantum dot systems.

  9. Physics lab in spin

    CERN Multimedia

    Hawkes, N

    1999-01-01

    RAL is fostering commerical exploitation of its research and facilities in two main ways : spin-out companies exploit work done at the lab, spin-in companies work on site taking advantage of the facilities and the expertise available (1/2 page).

  10. Summary: Symmetries and spin

    International Nuclear Information System (INIS)

    Haxton, W.C.

    1988-01-01

    I discuss a number of the themes of the Symmetries and Spin session of the 8th International Symposium on High Energy Spin Physics: parity nonconservation, CP/T nonconservation, and tests of charge symmetry and charge independence. 28 refs., 1 fig

  11. Spin, mass, and symmetry

    International Nuclear Information System (INIS)

    Peskin, M.E.

    1994-01-01

    When the strong interactions were a mystery, spin seemed to be just a complication on top of an already puzzling set of phenomena. But now that particle physicists have understood the strong, weak, and electromagnetic interactions, to be gauge theories, with matter built of quarks and leptons, it is recognized that the special properties of spin 1/2 and spin 1 particles have taken central role in the understanding of Nature. The lectures in this summer school will be devoted to the use of spin in unravelling detailed questions about the fundamental interactions. Thus, why not begin by posing a deeper question: Why is there spin? More precisely, why do the basic pointlike constituents of Nature carry intrinsic nonzero quanta of angular momentum? Though the authos has found no definite answer to this question, the pursuit of an answer has led through a wonderful tangle of speculations on the deep structure of Nature. Is spin constructed or is it fundamental? Is it the requirement of symmetry? In the furthest flights taken, it seems that space-time itself is too restrictive a notion, and that this must be generalized in order to gain a full appreciation of spin. In any case, there is no doubt that spin must play a central role in unlocking the mysteries of fundamental physics

  12. Classical spins in superconductors

    Energy Technology Data Exchange (ETDEWEB)

    Shiba, H [Tokyo Univ.; Maki, K

    1968-08-01

    It is shown that there exists a localized excited state in the energy gap in a superconductor with a classical spin. At finite concentration localized excited states around classical spins form an impurity band. The process of growth of the impurity band and its effects on observable quantities are investigated.

  13. Spin, mass, and symmetry

    Energy Technology Data Exchange (ETDEWEB)

    Peskin, M.E. [Stanford Univ., CA (United States)

    1994-12-01

    When the strong interactions were a mystery, spin seemed to be just a complication on top of an already puzzling set of phenomena. But now that particle physicists have understood the strong, weak, and electromagnetic interactions, to be gauge theories, with matter built of quarks and leptons, it is recognized that the special properties of spin 1/2 and spin 1 particles have taken central role in the understanding of Nature. The lectures in this summer school will be devoted to the use of spin in unravelling detailed questions about the fundamental interactions. Thus, why not begin by posing a deeper question: Why is there spin? More precisely, why do the basic pointlike constituents of Nature carry intrinsic nonzero quanta of angular momentum? Though the authos has found no definite answer to this question, the pursuit of an answer has led through a wonderful tangle of speculations on the deep structure of Nature. Is spin constructed or is it fundamental? Is it the requirement of symmetry? In the furthest flights taken, it seems that space-time itself is too restrictive a notion, and that this must be generalized in order to gain a full appreciation of spin. In any case, there is no doubt that spin must play a central role in unlocking the mysteries of fundamental physics.

  14. More spinoff from spin

    International Nuclear Information System (INIS)

    Masaike, Akira

    1993-01-01

    Despite playing a major role in today's Standard Model, spin - the intrinsic angular momentum carried by particles - is sometimes dismissed as an inessential complication. However several major spin questions with important implications for the Standard Model remain unanswered, and recent results and new technological developments made the 10th International Symposium on High Energy Spin Physics, held in Nagoya, Japan, in November, highly topical. The symposium covered a wide range of physics, reflecting the diversity of spin effects, however four main themes were - the spin content of the nucleon, tests of symmetries and physics beyond standard models, intermediate energy physics, and spin technologies. Opening the meeting, T. Kinoshita reviewed the status of measurements of the anomalous magnetic moment (g-2) of the electron and the muon. The forthcoming experiment at Brookhaven (September 1991, page 23) will probe beyond the energy ranges open to existing electronpositron colliders. For example muon substructure will be opened up to 5 TeV and Ws to 2 TeV. R.L. Jaffe classified quark-parton distributions in terms of their spin dependence, pointing out their leftright attributes, and emphasized the importance of measuring transverse spin distributions through lepton pair production

  15. Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks

    Directory of Open Access Journals (Sweden)

    Apostolos P. Fournaris

    2017-07-01

    Full Text Available Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT and Operational Technology (OT systems that are meant to operate harmonically under a security critical framework. As security IT countermeasures are gradually been installed in many embedded system nodes, thus securing them from many well-know cyber attacks there is a lurking danger that is still overlooked. Apart from the software vulnerabilities that typical malicious programs use, there are some very interesting hardware vulnerabilities that can be exploited in order to mount devastating software or hardware attacks (typically undetected by software countermeasures capable of fully compromising any embedded system device. Real-time microarchitecture attacks such as the cache side-channel attacks are such case but also the newly discovered Rowhammer fault injection attack that can be mounted even remotely to gain full access to a device DRAM (Dynamic Random Access Memory. Under the light of the above dangers that are focused on the device hardware structure, in this paper, an overview of this attack field is provided including attacks, threat directives and countermeasures. The goal of this paper is not to exhaustively overview attacks and countermeasures but rather to survey the various, possible, existing attack directions and highlight the security risks that they can pose to security critical embedded systems as well as indicate their strength on compromising the Quality of Service (QoS such systems are designed to provide.

  16. Predicting Factors of Zone 4 Attack in Volleyball.

    Science.gov (United States)

    Costa, Gustavo C; Castro, Henrique O; Evangelista, Breno F; Malheiros, Laura M; Greco, Pablo J; Ugrinowitsch, Herbert

    2017-06-01

    This study examined 142 volleyball games of the Men's Super League 2014/2015 seasons in Brazil from which we analyzed 24-26 games of each participating team, identifying 5,267 Zone 4 attacks for further analysis. Within these Zone 4 attacks, we analyzed the association between the effect of the attack carried out and the separate effects of serve reception, tempo and type of attack. We found that the reception, tempo of attack, second tempo of attack, and power of diagonal attack were predictors of the attack effect in Zone 4. Moreover, placed attacks showed a tendency to not yield a score. In conclusion, winning points in high-level men's volleyball requires excellent receptions, a fast attack tempo and powerfully executed of attacks.

  17. Spin-Wave Diode

    Directory of Open Access Journals (Sweden)

    Jin Lan (兰金

    2015-12-01

    Full Text Available A diode, a device allowing unidirectional signal transmission, is a fundamental element of logic structures, and it lies at the heart of modern information systems. The spin wave or magnon, representing a collective quasiparticle excitation of the magnetic order in magnetic materials, is a promising candidate for an information carrier for the next-generation energy-saving technologies. Here, we propose a scalable and reprogrammable pure spin-wave logic hardware architecture using domain walls and surface anisotropy stripes as waveguides on a single magnetic wafer. We demonstrate theoretically the design principle of the simplest logic component, a spin-wave diode, utilizing the chiral bound states in a magnetic domain wall with a Dzyaloshinskii-Moriya interaction, and confirm its performance through micromagnetic simulations. Our findings open a new vista for realizing different types of pure spin-wave logic components and finally achieving an energy-efficient and hardware-reprogrammable spin-wave computer.

  18. Spin physics at BNL

    International Nuclear Information System (INIS)

    Lowenstein, D.I.

    1985-01-01

    Spin Physics at the Alternating Gradient Synchrotron (AGS) of Brookhaven National Laboratory is the most recent of new capabilities being explored at this facility. During the summer of 1984 the AGS accelerated beams of polarized protons to 16.5 GeV/c at 40% polarization to two experiments (E782, E785). These experiments; single spin asymmetry in inclusive polarized pp interactions; and spin-spin effects in polarized pp elastic scattering, operated at the highest polarized proton energy ever achieved by any accelerator in the world. These experiments are reviewed after the complementary spin physics program with unpolarized protons, and the future possibilities with a booster injector for the AGS and the secondary benefits of a Relativisitic Heavy Ion Collider (RHIC), are placed within the context of the present physics program

  19. Superconductivity and spin fluctuations

    International Nuclear Information System (INIS)

    Scalapino, D.J.

    1999-01-01

    The organizers of the Memorial Session for Herman Rietschel asked that the author review some of the history of the interplay of superconductivity and spin fluctuations. Initially, Berk and Schrieffer showed how paramagnon spin fluctuations could suppress superconductivity in nearly-ferromagnetic materials. Following this, Rietschel and various co-workers wrote a number of papers in which they investigated the role of spin fluctuations in reducing the Tc of various electron-phonon superconductors. Paramagnon spin fluctuations are also believed to provide the p-wave pairing mechanism responsible for the superfluid phases of 3 He. More recently, antiferromagnetic spin fluctuations have been proposed as the mechanism for d-wave pairing in the heavy-fermion superconductors and in some organic materials as well as possibly the high-Tc cuprates. Here the author will review some of this early history and discuss some of the things he has learned more recently from numerical simulations

  20. Spin Hall and spin swapping torques in diffusive ferromagnets

    KAUST Repository

    Pauyac, C. O.

    2017-12-08

    A complete set of the generalized drift-diffusion equations for a coupled charge and spin dynamics in ferromagnets in the presence of extrinsic spin-orbit coupling is derived from the quantum kinetic approach, covering major transport phenomena, such as the spin and anomalous Hall effects, spin swapping, spin precession and relaxation processes. We argue that the spin swapping effect in ferromagnets is enhanced due to spin polarization, while the overall spin texture induced by the interplay of spin-orbital and spin precessional effects displays a complex spatial dependence that can be exploited to generate torques and nucleate/propagate domain walls in centrosymmetric geometries without use of external polarizers, as opposed to the conventional understanding of spin-orbit mediated torques.

  1. Spin Hall and spin swapping torques in diffusive ferromagnets

    KAUST Repository

    Pauyac, C. O.; Chshiev, M.; Manchon, Aurelien; Nikolaev, S. A.

    2017-01-01

    A complete set of the generalized drift-diffusion equations for a coupled charge and spin dynamics in ferromagnets in the presence of extrinsic spin-orbit coupling is derived from the quantum kinetic approach, covering major transport phenomena, such as the spin and anomalous Hall effects, spin swapping, spin precession and relaxation processes. We argue that the spin swapping effect in ferromagnets is enhanced due to spin polarization, while the overall spin texture induced by the interplay of spin-orbital and spin precessional effects displays a complex spatial dependence that can be exploited to generate torques and nucleate/propagate domain walls in centrosymmetric geometries without use of external polarizers, as opposed to the conventional understanding of spin-orbit mediated torques.

  2. Nonepileptic attack disorder among married women.

    Science.gov (United States)

    Dhanaraj, M; Rangaraj, R; Arulmozhi, T; Vengatesan, A

    2005-06-01

    To study the clinical features, precipitating stressful life events and prognosis of nonepileptic attack disorder (NEAD) among married women. Prospective cohort study with 1-year follow-up. A tertiary care teaching hospital. Of the 1020 patients with epilepsy referred to the epilepsy clinic during 2002-2003, 30 were married women with NEAD. The diagnostic criteria for NEAD included normal EEG during ictal and post-ictal phase of the generalized 'attack.' The data collected included clinical characteristics, semiology of the attacks, precipitating stressful events, and co-morbid psychiatric disorders. The control group included 30 age-matched married women with generalized tonic-clonic seizures. The long-term outcome and factors influencing the outcomes were analyzed. The mean duration of illness was 18 months, and the pattern of the attack was 'fall and lying still' in 53% and 'fall with generalized motor movements' in 47%. The frequency was one or more per week in 57% and occasionally in 43%. The important stressful events were matrimonial discord following illegal relationship of the husband with another woman (chi2 = 9.02, P = 0.003) and constant quarrel with other family members (chi2 = 5.19, P = 0.02). The prevalence of sexual abuse was low (7%). Co-morbid psychiatric disorder was observed in 70%. At the end of 1 year, 39% were free from the attack. Resolution of the stressful life events (chi2 = 4.52, P = 0.03) and lower frequency of attack at the time of reporting (chi2 = 3.88, P = 0.05) correlated with good outcomes. Among patients with NEAD in India, the major precipitating factors were matrimonial discord following illegal relationship of the husband with another woman and constant quarrel with other family members and not sexual abuse. Women with low frequency of attack at the time of reporting and the remission of the stressful events had better outcomes.

  3. Public Acceptance on Nuclear Power: A Strategic Need to Shift to 5Ps (Politicians, Policy Makers, Professionals, Public and Press) Acceptance on Nuclear Power

    International Nuclear Information System (INIS)

    Dato Syed Ahmad Idid, S.N. K. A.-I.

    2015-01-01

    Business should not be as usual in formulating strategies and plans to enhance awareness regarding the benefits of nuclear power as an option for energy mix. Although, presently 435 nuclear power reactors in operation in 30 countries are delivering cost competitive electricity to consumers, creating significant job, investment and business opportunities, supporting enterprises, contributing significantly to these nations economic growth, however these positive impacts and benefits have not be sufficiently transmitted to the various stakeholders and population, who have until recently only received unbalanced views and news from an uninformed press. Negative and generally unbalanced press coverage of isolated nuclear incidents and accidents such as TMI, Chernobyl and most recently Fukushima has resulted in public protests to nuclear power, contributing to several nuclear power programmes being delayed or not able to take off. This situation is further exacerbated by uninformed politicians and policy makers who have the influence but were not able to harness their positions to assure the public due to lack of knowledge regarding the economic and social benefits of nuclear power. As the challenges to the nuclear industry presently also include ageing nuclear professionals, lack of updates regarding business and financing opportunities to business and financing professionals, thus the benefits of career, business and financing opportunities must also be disseminated to these Professionals. This paper aims to highlight the fundamental need to expand present Public Awareness Programme to become the 5Ps (Politicians, Policy makers, Professionals, Public and Press) Awareness Programme on Nuclear Power. (author)

  4. Governance, Accountability, and Organizational Development: Eldercare Unit Managers' and Local Politicians' Experiences of and Responses to State Supervision of Swedish Eldercare.

    Science.gov (United States)

    Andersson, Katarina; Hanberger, Anders; Nygren, Lennart

    2018-02-22

    This article explores how local politicians and care unit managers in Swedish eldercare experience and respond to state supervision (SSV). Twelve politicians and twelve managers in 15 previously inspected municipalities were interviewed about their experiences of and reactions to SSV in relation to their views of care quality and routines in eldercare practice. The findings indicate that local managers and political chairs perceived SSV in eldercare positively at a superficial level but were critical of and disappointed with specific aspects of it. In terms of (a) governance, chairs and managers said SSV strengthened implementation of national policies via local actors, but they were critical of SSV's narrow focus on control and flaws in eldercare practice. With regard to (b) accountability, SSV was seen as limited to accountability for finances and systemic performance, and regarding (c) organizational development, SSV was seen as limited to improving routines and compliance with legislation, while local definitions of quality are broader than that. In general, local actors regarded SSV as improving administrative aspects and routines in practice but ignoring the relational content of eldercare quality.

  5. 12 CFR 263.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  6. 12 CFR 509.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding....17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  7. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  8. Resonant Tunneling Spin Pump

    Science.gov (United States)

    Ting, David Z.

    2007-01-01

    The resonant tunneling spin pump is a proposed semiconductor device that would generate spin-polarized electron currents. The resonant tunneling spin pump would be a purely electrical device in the sense that it would not contain any magnetic material and would not rely on an applied magnetic field. Also, unlike prior sources of spin-polarized electron currents, the proposed device would not depend on a source of circularly polarized light. The proposed semiconductor electron-spin filters would exploit the Rashba effect, which can induce energy splitting in what would otherwise be degenerate quantum states, caused by a spin-orbit interaction in conjunction with a structural-inversion asymmetry in the presence of interfacial electric fields in a semiconductor heterostructure. The magnitude of the energy split is proportional to the electron wave number. Theoretical studies have suggested the possibility of devices in which electron energy states would be split by the Rashba effect and spin-polarized currents would be extracted by resonant quantum-mechanical tunneling.

  9. Nuclear spins in nanostructures

    International Nuclear Information System (INIS)

    Coish, W.A.; Baugh, J.

    2009-01-01

    We review recent theoretical and experimental advances toward understanding the effects of nuclear spins in confined nanostructures. These systems, which include quantum dots, defect centers, and molecular magnets, are particularly interesting for their importance in quantum information processing devices, which aim to coherently manipulate single electron spins with high precision. On one hand, interactions between confined electron spins and a nuclear-spin environment provide a decoherence source for the electron, and on the other, a strong effective magnetic field that can be used to execute local coherent rotations. A great deal of effort has been directed toward understanding the details of the relevant decoherence processes and to find new methods to manipulate the coupled electron-nuclear system. A sequence of spectacular new results have provided understanding of spin-bath decoherence, nuclear spin diffusion, and preparation of the nuclear state through dynamic polarization and more general manipulation of the nuclear-spin density matrix through ''state narrowing.'' These results demonstrate the richness of this physical system and promise many new mysteries for the future. (Abstract Copyright [2009], Wiley Periodicals, Inc.)

  10. Trace Attack against Biometric Mobile Applications

    Directory of Open Access Journals (Sweden)

    Sanaa Ghouzali

    2016-01-01

    Full Text Available With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen. Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy.

  11. Subclinical endophthalmitis following a rooster attack.

    Science.gov (United States)

    Lekse Kovach, Jaclyn; Maguluri, Srilakshmi; Recchia, Franco M

    2006-12-01

    Ocular injury resulting from rooster attacks is rarely reported in the literature. Sadly, the target of these attacks is most often children younger than 3 years old, whose naiveté of the aggressive, territorial behavior of birds can place them at risk. Acute sequelae of these attacks can result in a lifetime of visual impairment. The possibility of a subacute or occult infection is an unusual occurrence that must always be considered. In an effort to prevent future attacks and ocular casualties, we present a case of a 12-month-old boy who suffered an open globe following a rooster attack. The open globe was emergently repaired. One week later, a white cataract was noticed on examination in the absence of systemic or ocular signs of inflammation. Traumatic endophthalmitis and lenticular abscess were suspected during examination under anesthesia. Vitrectomy, lensectomy, and injection of intravitreal antibiotics were performed. Culture of lenticular and vitreous aspirates grew alpha-streptococcus. Alpha-streptococcal endophthalmitis can result from ocular injuries caused by rooster pecking. The infection may present insidiously and without typical ocular or systemic symptoms or signs. Management is challenging and may require surgery.

  12. Modeling attacking of high skills volleyball players

    Directory of Open Access Journals (Sweden)

    Vladimir Gamaliy

    2014-12-01

    Full Text Available Purpose: to determine the model indicators of technical and tactical actions in the attack highly skilled volleyball players. Material and Methods: the study used statistical data of major international competitions: Olympic Games – 2012 World Championships – 2010, World League – 2010–2014 European Championship – 2010–2014. A total of 130 analyzed games. Methods were used: analysis and generalization of scientific and methodological literature, analysis of competitive activity highly skilled volleyball players, teacher observation, modeling technical and tactical actions in attacking highly skilled volleyball players. Results: it was found that the largest volume application of technical and tactical actions in the attack belongs to the group tactics «supple movement», whose indicator is 21,3%. The smallest amount of application belongs to the group tactics «flight level» model whose indicators is 5,4%, the efficiency of 3,4%, respectively. It is found that the power service in the jump from model parameters used in 51,6% of cases, the planning targets – 21,7% and 4,4% planning to reduce. Attacks performed with the back line, on model parameters used in the amount of 20,8% efficiency –13,7%. Conclusions: we prove that the performance of technical and tactical actions in the attack can be used as model in the control system of training and competitive process highly skilled volleyball players

  13. On the anatomy of social engineering attacks : A literature-based dissection of successful attacks

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    The aim of this studywas to explore the extent towhich persuasion principles are used in successful social engineering attacks. Seventy-four scenarioswere extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenariowas split into attack steps, containing

  14. Spin drift and spin diffusion currents in semiconductors

    Energy Technology Data Exchange (ETDEWEB)

    Idrish Miah, M [Nanoscale Science and Technology Centre and School of Biomolecular and Physical Sciences, Griffith University, Nathan, Brisbane, QLD 4111 (Australia)], E-mail: m.miah@griffith.edu.au

    2008-09-15

    On the basis of a spin drift-diffusion model, we show how the spin current is composed and find that spin drift and spin diffusion contribute additively to the spin current, where the spin diffusion current decreases with electric field while the spin drift current increases, demonstrating that the extension of the spin diffusion length by a strong field does not result in a significant increase in spin current in semiconductors owing to the competing effect of the electric field on diffusion. We also find that there is a spin drift-diffusion crossover field for a process in which the drift and diffusion contribute equally to the spin current, which suggests a possible method of identifying whether the process for a given electric field is in the spin drift or spin diffusion regime. Spin drift-diffusion crossover fields for GaAs are calculated and are found to be quite small. We derive the relations between intrinsic spin diffusion length and the spin drift-diffusion crossover field of a semiconductor for different electron statistical regimes. The findings resulting from this investigation might be important for semiconductor spintronics.

  15. Spin drift and spin diffusion currents in semiconductors

    Directory of Open Access Journals (Sweden)

    M Idrish Miah

    2008-01-01

    Full Text Available On the basis of a spin drift-diffusion model, we show how the spin current is composed and find that spin drift and spin diffusion contribute additively to the spin current, where the spin diffusion current decreases with electric field while the spin drift current increases, demonstrating that the extension of the spin diffusion length by a strong field does not result in a significant increase in spin current in semiconductors owing to the competing effect of the electric field on diffusion. We also find that there is a spin drift-diffusion crossover field for a process in which the drift and diffusion contribute equally to the spin current, which suggests a possible method of identifying whether the process for a given electric field is in the spin drift or spin diffusion regime. Spin drift-diffusion crossover fields for GaAs are calculated and are found to be quite small. We derive the relations between intrinsic spin diffusion length and the spin drift-diffusion crossover field of a semiconductor for different electron statistical regimes. The findings resulting from this investigation might be important for semiconductor spintronics.

  16. Spin drift and spin diffusion currents in semiconductors

    International Nuclear Information System (INIS)

    Idrish Miah, M

    2008-01-01

    On the basis of a spin drift-diffusion model, we show how the spin current is composed and find that spin drift and spin diffusion contribute additively to the spin current, where the spin diffusion current decreases with electric field while the spin drift current increases, demonstrating that the extension of the spin diffusion length by a strong field does not result in a significant increase in spin current in semiconductors owing to the competing effect of the electric field on diffusion. We also find that there is a spin drift-diffusion crossover field for a process in which the drift and diffusion contribute equally to the spin current, which suggests a possible method of identifying whether the process for a given electric field is in the spin drift or spin diffusion regime. Spin drift-diffusion crossover fields for GaAs are calculated and are found to be quite small. We derive the relations between intrinsic spin diffusion length and the spin drift-diffusion crossover field of a semiconductor for different electron statistical regimes. The findings resulting from this investigation might be important for semiconductor spintronics.

  17. Quantifying Spin Hall Angles from Spin Pumping : Experiments and Theory

    NARCIS (Netherlands)

    Mosendz, O.; Pearson, J.E.; Fradin, F.Y.; Bauer, G.E.W.; Bader, S.D.; Hoffmann, A.

    2010-01-01

    Spin Hall effects intermix spin and charge currents even in nonmagnetic materials and, therefore, ultimately may allow the use of spin transport without the need for ferromagnets. We show how spin Hall effects can be quantified by integrating Ni80Fe20|normal metal (N) bilayers into a coplanar

  18. Compound nucleus effects in spin-spin cross sections

    International Nuclear Information System (INIS)

    Thompson, W.J.

    1976-01-01

    By comparison with recent data, it is shown that spin-spin cross sections for low-energy neutrons may be dominated by a simple compound-elastic level-density effect, independent of spin-spin terms in the nucleon-nucleus optical-model potential. (Auth.)

  19. Attacks on public telephone networks: technologies and challenges

    Science.gov (United States)

    Kosloff, T.; Moore, Tyler; Keller, J.; Manes, Gavin W.; Shenoi, Sujeet

    2003-09-01

    Signaling System 7 (SS7) is vital to signaling and control in America's public telephone networks. This paper describes a class of attacks on SS7 networks involving the insertion of malicious signaling messages via compromised SS7 network components. Three attacks are discussed in detail: IAM flood attacks, redirection attacks and point code spoofing attacks. Depending on their scale of execution, these attacks can produce effects ranging from network congestion to service disruption. Methods for detecting these denial-of-service attacks and mitigating their effects are also presented.

  20. Cross-site scripting attacks procedure and Prevention Strategies

    Directory of Open Access Journals (Sweden)

    Wang Xijun

    2016-01-01

    Full Text Available Cross-site scripting attacks and defense has been the site of attack and defense is an important issue, this paper, the definition of cross-site scripting attacks, according to the current understanding of the chaos on the cross-site scripting, analyzes the causes and harm cross-site scripting attacks formation of attacks XXS complete process XSS attacks made a comprehensive analysis, and then for the web program includes Mobility there are cross-site scripting filter laxity given from ordinary users browse the web and web application developers two the defense cross-site scripting attacks effective strategy.

  1. Frustrated spin systems

    CERN Document Server

    2013-01-01

    This book covers all principal aspects of currently investigated frustrated systems, from exactly solved frustrated models to real experimental frustrated systems, going through renormalization group treatment, Monte Carlo investigation of frustrated classical Ising and vector spin models, low-dimensional systems, spin ice and quantum spin glass. The reader can - within a single book - obtain a global view of the current research development in the field of frustrated systems.This new edition is updated with recent theoretical, numerical and experimental developments in the field of frustrated

  2. SPINning parallel systems software

    International Nuclear Information System (INIS)

    Matlin, O.S.; Lusk, E.; McCune, W.

    2002-01-01

    We describe our experiences in using Spin to verify parts of the Multi Purpose Daemon (MPD) parallel process management system. MPD is a distributed collection of processes connected by Unix network sockets. MPD is dynamic processes and connections among them are created and destroyed as MPD is initialized, runs user processes, recovers from faults, and terminates. This dynamic nature is easily expressible in the Spin/Promela framework but poses performance and scalability challenges. We present here the results of expressing some of the parallel algorithms of MPD and executing both simulation and verification runs with Spin

  3. Spins in chemistry

    CERN Document Server

    McWeeny, Roy

    2004-01-01

    Originally delivered as a series of lectures, this volume systematically traces the evolution of the ""spin"" concept from its role in quantum mechanics to its assimilation into the field of chemistry. Author Roy McWeeny presents an in-depth illustration of the deductive methods of quantum theory and their application to spins in chemistry, following the path from the earliest concepts to the sophisticated physical methods employed in the investigation of molecular structure and properties. Starting with the origin and development of the spin concept, the text advances to an examination of sp

  4. NUCLEON SPIN: Enigma confirmed

    International Nuclear Information System (INIS)

    Anon.

    1994-01-01

    In 1987 the European Muon Collaboration (EMC - June 1988, page 9) reported results from a polarized muon-proton scattering experiment at CERN which puzzled the particle and nuclear physics communities. Contrary to the prediction of the naive quark model, the EMC found that little of the proton spin seemed to be carried by the spins of the quarks. An extensive experimental programme was therefore immediately proposed at CERN, SLAC (Stanford) and DESY (Hamburg) to measure the spin structure function of the neutron and to repeat the proton measurement with improved accuracy

  5. Spin-polarized SEM

    International Nuclear Information System (INIS)

    Konoto, Makoto

    2007-01-01

    Development of highly effective evaluation technology of magnetic structures on a nanometric scale is a key to understanding spintronics and related phenomena. A high-resolution spin-polarized scanning electron microscope (spin SEM) developed recently is quite suitable for probing such nanostructures because of the capability of analyzing local magnetization vectors in three dimensions. Utilizing the spin SEM, a layered antiferromagnetic structure with the 1nm-alternation of bilayer-sheet magnetization has been successfully resolved. The real-space imaging with full analysis of the temperature-dependent magnetization vectors will be demonstrated. (author)

  6. High spin structure functions

    International Nuclear Information System (INIS)

    Khan, H.

    1990-01-01

    This thesis explores deep inelastic scattering of a lepton beam from a polarized nuclear target with spin J=1. After reviewing the formation for spin-1/2, the structure functions for a spin-1 target are defined in terms of the helicity amplitudes for forward compton scattering. A version of the convolution model, which incorporates relativistic and binding energy corrections is used to calculate the structure functions of a neutron target. A simple parameterization of these structure functions is given in terms of a few neutron wave function parameters and the free nucleon structure functions. This allows for an easy comparison of structure functions calculated using different neutron models. (author)

  7. Spin Hall effect transistor

    Czech Academy of Sciences Publication Activity Database

    Wunderlich, Joerg; Park, B.G.; Irvine, A.C.; Zarbo, Liviu; Rozkotová, E.; Němec, P.; Novák, Vít; Sinova, Jairo; Jungwirth, Tomáš

    2010-01-01

    Roč. 330, č. 6012 (2010), s. 1801-1804 ISSN 0036-8075 R&D Projects: GA AV ČR KAN400100652; GA MŠk LC510 EU Projects: European Commission(XE) 215368 - SemiSpinNet Grant - others:AV ČR(CZ) AP0801 Program:Akademická prémie - Praemium Academiae Institutional research plan: CEZ:AV0Z10100521 Keywords : spin Hall effect * spintronics * spin transistor Subject RIV: BM - Solid Matter Physics ; Magnetism Impact factor: 31.364, year: 2010

  8. Spinning of refractory metals

    International Nuclear Information System (INIS)

    Chang Wenkua; Zheng Han

    1989-01-01

    The effects of spinning process parameters including max. pass percentage reduction, spinning temperature, feed rate, lubricant and annealing technology on the quality of shaped components are summarized and discussed in the present paper. The above mentioned parameters are adopted in the process of spinning of barrel-shaped and specially shaped components of refractory metals and their alloys W, Mo, Nb, Zr, TZM molybdenum alloy, C-103, C-752 niobium alloy etc. The cause of leading to usual defects of spun products of refractory metals such as lamellar as 'scaling', crack, swelling, wrinkle, etc. have been analysed and the ways to eliminate the defects have been put forward. 8 figs., 5 tabs. (Author)

  9. Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks

    Directory of Open Access Journals (Sweden)

    Željko Gavrić

    2018-01-01

    Full Text Available Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the security issue is very important. DOS (denial of service attacks are a fundamental threat to the functioning of wireless sensor networks. This paper describes some of the most common DOS attacks and potential methods of protection against them. The case study shows one of the most frequent attacks on wireless sensor networks – the interference attack. In the introduction of this paper authors assume that the attack interference can cause significant obstruction of wireless sensor networks. This assumption has been proved in the case study through simulation scenario and simulation results.

  10. Spin transfer torque with spin diffusion in magnetic tunnel junctions

    KAUST Repository

    Manchon, Aurelien

    2012-08-09

    Spin transport in magnetic tunnel junctions in the presence of spin diffusion is considered theoretically. Combining ballistic tunneling across the barrier and diffusive transport in the electrodes, we solve the spin dynamics equation in the metallic layers. We show that spin diffusion mixes the transverse spin current components and dramatically modifies the bias dependence of the effective spin transfer torque. This leads to a significant linear bias dependence of the out-of-plane torque, as well as a nonconventional thickness dependence of both spin torque components.

  11. Electron spin and nuclear spin manipulation in semiconductor nanosystems

    International Nuclear Information System (INIS)

    Hirayama, Yoshiro; Yusa, Go; Sasaki, Satoshi

    2006-01-01

    Manipulations of electron spin and nuclear spin have been studied in AlGaAs/GaAs semiconductor nanosystems. Non-local manipulation of electron spins has been realized by using the correlation effect between localized and mobile electron spins in a quantum dot- quantum wire coupled system. Interaction between electron and nuclear spins was exploited to achieve a coherent control of nuclear spins in a semiconductor point contact device. Using this device, we have demonstrated a fully coherent manipulation of any two states among the four spin levels of Ga and As nuclei. (copyright 2006 WILEY-VCH Verlag GmbH and Co. KGaA, Weinheim) (orig.)

  12. Counteracting Power Analysis Attacks by Masking

    Science.gov (United States)

    Oswald, Elisabeth; Mangard, Stefan

    The publication of power analysis attacks [12] has triggered a lot of research activities. On the one hand these activities have been dedicated toward the development of secure and efficient countermeasures. On the other hand also new and improved attacks have been developed. In fact, there has been a continuous arms race between designers of countermeasures and attackers. This chapter provides a brief overview of the state-of-the art in the arms race in the context of a countermeasure called masking. Masking is a popular countermeasure that has been extensively discussed in the scientific community. Numerous articles have been published that explain different types of masking and that analyze weaknesses of this countermeasure.

  13. The WOMBAT Attack Attribution Method: Some Results

    Science.gov (United States)

    Dacier, Marc; Pham, Van-Hau; Thonnard, Olivier

    In this paper, we present a new attack attribution method that has been developed within the WOMBAT project. We illustrate the method with some real-world results obtained when applying it to almost two years of attack traces collected by low interaction honeypots. This analytical method aims at identifying large scale attack phenomena composed of IP sources that are linked to the same root cause. All malicious sources involved in a same phenomenon constitute what we call a Misbehaving Cloud (MC). The paper offers an overview of the various steps the method goes through to identify these clouds, providing pointers to external references for more detailed information. Four instances of misbehaving clouds are then described in some more depth to demonstrate the meaningfulness of the concept.

  14. When measured spin polarization is not spin polarization

    International Nuclear Information System (INIS)

    Dowben, P A; Wu Ning; Binek, Christian

    2011-01-01

    Spin polarization is an unusually ambiguous scientific idiom and, as such, is rarely well defined. A given experimental methodology may allow one to quantify a spin polarization but only in its particular context. As one might expect, these ambiguities sometimes give rise to inappropriate interpretations when comparing the spin polarizations determined through different methods. The spin polarization of CrO 2 and Cr 2 O 3 illustrate some of the complications which hinders comparisons of spin polarization values. (viewpoint)

  15. Spin-4 extended conformal algebras

    International Nuclear Information System (INIS)

    Kakas, A.C.

    1988-01-01

    We construct spin-4 extended conformal algebras using the second hamiltonian structure of the KdV hierarchy. In the presence of a U(1) current a family of spin-4 algebras exists but the additional requirement that the spin-1 and spin-4 currents commute fixes the algebra uniquely. (orig.)

  16. Anisotropic spin relaxation in graphene

    NARCIS (Netherlands)

    Tombros, N.; Tanabe, S.; Veligura, A.; Jozsa, C.; Popinciuc, M.; Jonkman, H. T.; van Wees, B. J.

    2008-01-01

    Spin relaxation in graphene is investigated in electrical graphene spin valve devices in the nonlocal geometry. Ferromagnetic electrodes with in-plane magnetizations inject spins parallel to the graphene layer. They are subject to Hanle spin precession under a magnetic field B applied perpendicular

  17. Spin squeezing and quantum correlations

    Indian Academy of Sciences (India)

    2 states. A coherent spin-s state. (CSS) θ φ can then be thought of as having no quantum correlations as the constituent. 2s elementary spins point in the same direction ˆn(θ φ) which is the mean spin direction. 2. State classification and squeezing. In order to discuss squeezing, we begin with the squeezing condition itself.

  18. Geometry of spin coherent states

    Science.gov (United States)

    Chryssomalakos, C.; Guzmán-González, E.; Serrano-Ensástiga, E.

    2018-04-01

    Spin states of maximal projection along some direction in space are called (spin) coherent, and are, in many respects, the ‘most classical’ available. For any spin s, the spin coherent states form a 2-sphere in the projective Hilbert space \

  19. A novel proposed network security management approach for cyber attacks

    International Nuclear Information System (INIS)

    Ahmed, Z.; Nazir, B.; Zafar, M.F.; Anwar, M.M.; Azam, K.; Asar, A.U.

    2007-01-01

    Network security is a discipline that focuses on securing networks from unauthorized access. Given the Escalating threats of malicious cyber attacks, modern enterprises employ multiple lines of defense. A comprehensive defense strategy against such attacks should include (I) an attack detection component that deter- mines the fact that a program is compromised, (2) an attack identification and prevention component that identifies attack packets so that one can block such packets in the future and prevents the attack from further propagation. Over the last decade, a significant amount of research has been vested in the systems that can detect cyber attacks either statically at compile time or dynamically at run time, However, not much effort is spent on automated attack packet identification or attack prevention. In this paper we present a unified solution to the problems mentioned above. We implemented this solution after the forward engineering of Open Source Security Information Management (OSSIM) system called Preventive Information Security management (PrISM) system that correlates input from different sensors so that the resulting product can automatically detect any cyber attack against it and prevents by identifying the actual attack packet(s). The PrISM was always able to detect the attacks, identify the attack packets and most often prevent by blocking the attacker's IP address to continue normal execution. There is no additional run-time performance overhead for attack prevention. (author)

  20. Playing Attack and Defense with Trusted Storage

    DEFF Research Database (Denmark)

    Gonzalez, Javier; Bonnet, Philippe; Bouganim, Luc

    2014-01-01

    It is often convenient to assume in a data management platform that one or several computing devices are trusted, specially when the goal is to provide privacy guarantees over personal data. But what does it take for a computing device to be trusted? More specifically, how can a personal device...... provide trusted storage? This is the question we tackle in this demonstration. We describe how secure devices, equipped with a trusted execution environment, differ from general purpose devices. We illustrate with our demonstration scenario, that it is much more difficult to attack a storage service...... running on a secure device, than to attack the same service running on a general purpose device....

  1. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolić, Ivica; Rechberger, Christian

    2014-01-01

    ciphers, including the new standard SHA-3 (Keccak). The rebound attack is a start-from-the-middle approach for finding differential paths and conforming pairs in byte-oriented designs like Substitution-Permutation networks and AES. We apply our new compositional attack to the reduced version of the hash...... number of rounds. We also use neutral bits and message modification methods from the practice of collision search in MD5 and SHA-1 hash functions. These methods push the rotational property through more rounds than previous analysis suggested, and eventually establish a distinguishing property...

  2. A Distinguish Attack on COSvd Cipher

    OpenAIRE

    Mohammad Ali Orumiehchi ha; R. Mirghadri

    2007-01-01

    The COSvd Ciphers has been proposed by Filiol and others (2004). It is a strengthened version of COS stream cipher family denoted COSvd that has been adopted for at least one commercial standard. We propose a distinguish attack on this version, and prove that, it is distinguishable from a random stream. In the COSvd Cipher used one S-Box (10×8) on the final part of cipher. We focus on S-Box and use weakness this S-Box for distinguish attack. In addition, found a leak on HNLL that the sub s-bo...

  3. Attacks and infections in percolation processes

    International Nuclear Information System (INIS)

    Janssen, Hans-Karl; Stenull, Olaf

    2017-01-01

    We discuss attacks and infections at propagating fronts of percolation processes based on the extended general epidemic process. The scaling behavior of the number of the attacked and infected sites in the long time limit at the ordinary and tricritical percolation transitions is governed by specific composite operators of the field-theoretic representation of this process. We calculate corresponding critical exponents for tricritical percolation in mean-field theory and for ordinary percolation to 1-loop order. Our results agree well with the available numerical data. (paper)

  4. Attack strategies on quantum cryptographic protocols

    International Nuclear Information System (INIS)

    Schauer, S.; Suda, M.

    2006-01-01

    Full text: Quantum key distribution (QKD) and quantum authentication (QA) have been a topic of extensive research in the last 20 years. In course of that many attacks on QKD and QA protocols have been studied. Among these, Zhang, Lee and Guo presented an attack on a QKD protocol using entanglement swapping. Based on that strategy we take a look at other protocols to inspect how much information an adversary may get if he shares entanglement with either one or both parties. We will present some protocols where an adversary can even get full information about the key using entanglement. (author)

  5. Terwilliger and spin physics

    International Nuclear Information System (INIS)

    O'FAllon, J.R.

    1991-01-01

    The history of spin physics experiments is presented, with emphasis of Kent Terwilliger's involvement. Development of polarized beams and targets at the ZGS and AGS is recalled. P-P elastic scattering experiments are reviewed

  6. Transverse spin effects

    International Nuclear Information System (INIS)

    Ratcliffe, P.G.

    1993-01-01

    A discussion is presented of the role that transverse spin physics can play in providing information on the bound state dynamics in hadronic physics. Care is taken to distinguish between single- and double-spin measurements, each being discussed separately. In the case of single-spin effects it is stressed that as yet no satisfactory explanation has been provided within the framework if perturbative QCD which in fact generally predicts negligible effects. In order to clarify the situation experimental data at yet higher p T are necessary and semi-leptonic data could shed some light on the underlying scattering mechanisms. As regards double-spin correlations, the theoretical picture (although clouded by some ill-informed, often erroneous statements and even recent papers) is rather well understood and what is dearly missing is the experimental study of, for example, g 2 in deep-inelastic scattering. (author). 31 refs

  7. Spin polarized deuterium

    International Nuclear Information System (INIS)

    Glyde, H.R.; Hernadi, S.I.

    1986-01-01

    Several ground state properties of (electron) spin-polarized deuterium (D) such as the energy, single quasiparticle energies and lifetimes, Landau parameters and sound velocities are evaluated. The calculations begin with the Kolos-Wolneiwicz potential and use the Galitskii-FeynmanHartree-Fock (GFHF) approximation. The deuteron nucleas has spin I = 1, and spin states I/sub z/ = 1,0,-1. We explore D 1 , D 2 and D 3 in which, respectively, one spin state only is populated, two states are equally populated, and three states are equally populated. We find the GFHF describes D 1 well, but D 2 and D 3 less well. The Landau parameters, F/sub L/, are small compared to liquid 3 He and very small for doubly polarized D 1 (i.e. the F/sub L/ decrease with nuclear polarization)

  8. Microscopic studies of nonlocal spin dynamics and spin transport (invited)

    Energy Technology Data Exchange (ETDEWEB)

    Adur, Rohan; Du, Chunhui; Cardellino, Jeremy; Scozzaro, Nicolas; Wolfe, Christopher S.; Wang, Hailong; Herman, Michael; Bhallamudi, Vidya P.; Pelekhov, Denis V.; Yang, Fengyuan; Hammel, P. Chris, E-mail: hammel@physics.osu.edu [Department of Physics, The Ohio State University, Columbus, Ohio 43210 (United States)

    2015-05-07

    Understanding the behavior of spins coupling across interfaces in the study of spin current generation and transport is a fundamental challenge that is important for spintronics applications. The transfer of spin angular momentum from a ferromagnet into an adjacent normal material as a consequence of the precession of the magnetization of the ferromagnet is a process known as spin pumping. We find that, in certain circumstances, the insertion of an intervening normal metal can enhance spin pumping between an excited ferromagnetic magnetization and a normal metal layer as a consequence of improved spin conductance matching. We have studied this using inverse spin Hall effect and enhanced damping measurements. Scanned probe magnetic resonance techniques are a complementary tool in this context offering high resolution magnetic resonance imaging, localized spin excitation, and direct measurement of spin lifetimes or damping. Localized magnetic resonance studies of size-dependent spin dynamics in the absence of lithographic confinement in both ferromagnets and paramagnets reveal the close relationship between spin transport and spin lifetime at microscopic length scales. Finally, detection of ferromagnetic resonance of a ferromagnetic film using the photoluminescence of nitrogen vacancy spins in neighboring nanodiamonds demonstrates long-range spin transport between insulating materials, indicating the complexity and generality of spin transport in diverse, spatially separated, material systems.

  9. Microscopic studies of nonlocal spin dynamics and spin transport (invited)

    Science.gov (United States)

    Adur, Rohan; Du, Chunhui; Cardellino, Jeremy; Scozzaro, Nicolas; Wolfe, Christopher S.; Wang, Hailong; Herman, Michael; Bhallamudi, Vidya P.; Pelekhov, Denis V.; Yang, Fengyuan; Hammel, P. Chris

    2015-05-01

    Understanding the behavior of spins coupling across interfaces in the study of spin current generation and transport is a fundamental challenge that is important for spintronics applications. The transfer of spin angular momentum from a ferromagnet into an adjacent normal material as a consequence of the precession of the magnetization of the ferromagnet is a process known as spin pumping. We find that, in certain circumstances, the insertion of an intervening normal metal can enhance spin pumping between an excited ferromagnetic magnetization and a normal metal layer as a consequence of improved spin conductance matching. We have studied this using inverse spin Hall effect and enhanced damping measurements. Scanned probe magnetic resonance techniques are a complementary tool in this context offering high resolution magnetic resonance imaging, localized spin excitation, and direct measurement of spin lifetimes or damping. Localized magnetic resonance studies of size-dependent spin dynamics in the absence of lithographic confinement in both ferromagnets and paramagnets reveal the close relationship between spin transport and spin lifetime at microscopic length scales. Finally, detection of ferromagnetic resonance of a ferromagnetic film using the photoluminescence of nitrogen vacancy spins in neighboring nanodiamonds demonstrates long-range spin transport between insulating materials, indicating the complexity and generality of spin transport in diverse, spatially separated, material systems.

  10. Microscopic studies of nonlocal spin dynamics and spin transport (invited)

    International Nuclear Information System (INIS)

    Adur, Rohan; Du, Chunhui; Cardellino, Jeremy; Scozzaro, Nicolas; Wolfe, Christopher S.; Wang, Hailong; Herman, Michael; Bhallamudi, Vidya P.; Pelekhov, Denis V.; Yang, Fengyuan; Hammel, P. Chris

    2015-01-01

    Understanding the behavior of spins coupling across interfaces in the study of spin current generation and transport is a fundamental challenge that is important for spintronics applications. The transfer of spin angular momentum from a ferromagnet into an adjacent normal material as a consequence of the precession of the magnetization of the ferromagnet is a process known as spin pumping. We find that, in certain circumstances, the insertion of an intervening normal metal can enhance spin pumping between an excited ferromagnetic magnetization and a normal metal layer as a consequence of improved spin conductance matching. We have studied this using inverse spin Hall effect and enhanced damping measurements. Scanned probe magnetic resonance techniques are a complementary tool in this context offering high resolution magnetic resonance imaging, localized spin excitation, and direct measurement of spin lifetimes or damping. Localized magnetic resonance studies of size-dependent spin dynamics in the absence of lithographic confinement in both ferromagnets and paramagnets reveal the close relationship between spin transport and spin lifetime at microscopic length scales. Finally, detection of ferromagnetic resonance of a ferromagnetic film using the photoluminescence of nitrogen vacancy spins in neighboring nanodiamonds demonstrates long-range spin transport between insulating materials, indicating the complexity and generality of spin transport in diverse, spatially separated, material systems

  11. Exertional Rhabdomyolysis after Spinning

    OpenAIRE

    Jeong, Youjin; Kweon, Hyuk-Jung; Oh, Eun-Jung; Ahn, Ah-Leum; Choi, Jae-Kyung; Cho, Dong-Yung

    2016-01-01

    Any strenuous muscular exercise may trigger rhabdomyolysis. We report an episode of clinically manifested exertional rhabdomyolysis due to stationary cycling, commonly known as spinning. Reports of spinning-related rhabdomyolysis are rare in the English literature, and the current case appears to be the first such case reported in South Korea. A previously healthy 21-year-old Asian woman presented with severe thigh pain and reddish-brown urinary discoloration 24?48 hours after attending a spi...

  12. Higher Spins & Strings

    CERN Multimedia

    CERN. Geneva

    2014-01-01

    The conjectured relation between higher spin theories on anti de-Sitter (AdS) spaces and weakly coupled conformal field theories is reviewed. I shall then outline the evidence in favour of a concrete duality of this kind, relating a specific higher spin theory on AdS3 to a family of 2d minimal model CFTs. Finally, I shall explain how this relation fits into the framework of the familiar stringy AdS/CFT correspondence.

  13. Entangled spin chain

    Science.gov (United States)

    Salberger, Olof; Korepin, Vladimir

    We introduce a new model of interacting spin 1/2. It describes interactions of three nearest neighbors. The Hamiltonian can be expressed in terms of Fredkin gates. The Fredkin gate (also known as the controlled swap gate) is a computational circuit suitable for reversible computing. Our construction generalizes the model presented by Peter Shor and Ramis Movassagh to half-integer spins. Our model can be solved by means of Catalan combinatorics in the form of random walks on the upper half plane of a square lattice (Dyck walks). Each Dyck path can be mapped on a wave function of spins. The ground state is an equally weighted superposition of Dyck walks (instead of Motzkin walks). We can also express it as a matrix product state. We further construct a model of interacting spins 3/2 and greater half-integer spins. The models with higher spins require coloring of Dyck walks. We construct a SU(k) symmetric model (where k is the number of colors). The leading term of the entanglement entropy is then proportional to the square root of the length of the lattice (like in the Shor-Movassagh model). The gap closes as a high power of the length of the lattice [5, 11].

  14. Theory of spin Hall effect

    OpenAIRE

    Chudnovsky, Eugene M.

    2007-01-01

    An extension of Drude model is proposed that accounts for spin and spin-orbit interaction of charge carriers. Spin currents appear due to combined action of the external electric field, crystal field and scattering of charge carriers. The expression for spin Hall conductivity is derived for metals and semiconductors that is independent of the scattering mechanism. In cubic metals, spin Hall conductivity $\\sigma_s$ and charge conductivity $\\sigma_c$ are related through $\\sigma_s = [2 \\pi \\hbar...

  15. Investigating the Possibility to Individualize Asthma Attack Therapy Based on Attack Severity and Patient Characteristics

    Directory of Open Access Journals (Sweden)

    Sárkány Zoltán

    2016-03-01

    Full Text Available Introduction: The objective of this study was to investigate with the help of a computerized simulation model whether the treatment of an acute asthma attack can be individualized based on the severity of the attack and the characteristics of the patient. Material and Method: A stochastic lung model was used to simulate the deposition of 1 nm - 10 μm particles during a mild and a moderate asthma attack. Breathing parameters were varied to maximize deposition, and simulation results were compared with those obtained in the case of a severe asthma attack. In order to investigate the effect of height on the deposition of inhaled particles, another series of simulations was carried out with identical breathing parameters, comparing patient heights of 155 cm, 175 cm and 195 cm. Results: The optimization process yielded an increase in the maximum deposition values of around 6-7% for each type of investigated asthma attack, and the difference between attacks of different degree of severity was around 5% for both the initial and the optimized values, a higher degree of obstruction increasing the amount of deposited particles. Conclusions: Our results suggest that the individualization of asthma attack treatment cannot be based on particles of different size, as the highest deposited fraction in all three types of attacks can be obtained using 0.01 μm particles. The use of a specific set of breathing parameters yields a difference between a mild and a moderate, as well as a moderate and a severe asthma attack of around 5%.

  16. Spin-current emission governed by nonlinear spin dynamics.

    Science.gov (United States)

    Tashiro, Takaharu; Matsuura, Saki; Nomura, Akiyo; Watanabe, Shun; Kang, Keehoon; Sirringhaus, Henning; Ando, Kazuya

    2015-10-16

    Coupling between conduction electrons and localized magnetization is responsible for a variety of phenomena in spintronic devices. This coupling enables to generate spin currents from dynamical magnetization. Due to the nonlinearity of magnetization dynamics, the spin-current emission through the dynamical spin-exchange coupling offers a route for nonlinear generation of spin currents. Here, we demonstrate spin-current emission governed by nonlinear magnetization dynamics in a metal/magnetic insulator bilayer. The spin-current emission from the magnetic insulator is probed by the inverse spin Hall effect, which demonstrates nontrivial temperature and excitation power dependences of the voltage generation. The experimental results reveal that nonlinear magnetization dynamics and enhanced spin-current emission due to magnon scatterings are triggered by decreasing temperature. This result illustrates the crucial role of the nonlinear magnon interactions in the spin-current emission driven by dynamical magnetization, or nonequilibrium magnons, from magnetic insulators.

  17. Sequential and Parallel Attack Tree Modelling

    NARCIS (Netherlands)

    Arnold, Florian; Guck, Dennis; Kumar, Rajesh; Stoelinga, Mariëlle Ida Antoinette; Koornneef, Floor; van Gulijk, Coen

    The intricacy of socio-technical systems requires a careful planning and utilisation of security resources to ensure uninterrupted, secure and reliable services. Even though many studies have been conducted to understand and model the behaviour of a potential attacker, the detection of crucial

  18. Cooperative Electronic Attack using Unmanned Air Vehicles

    National Research Council Canada - National Science Library

    Mears, Mark J

    2006-01-01

    ... that are salient in the context of cooperative control. The utility of electronic attack is described in the context of integrated air defense systems that rely on RADAR sites that act as a network to gather information about potential airborne threats...

  19. Network overload due to massive attacks

    Science.gov (United States)

    Kornbluth, Yosef; Barach, Gilad; Tuchman, Yaakov; Kadish, Benjamin; Cwilich, Gabriel; Buldyrev, Sergey V.

    2018-05-01

    We study the cascading failure of networks due to overload, using the betweenness centrality of a node as the measure of its load following the Motter and Lai model. We study the fraction of survived nodes at the end of the cascade pf as a function of the strength of the initial attack, measured by the fraction of nodes p that survive the initial attack for different values of tolerance α in random regular and Erdös-Renyi graphs. We find the existence of a first-order phase-transition line pt(α ) on a p -α plane, such that if p pt , pf is large and the giant component of the network is still present. Exactly at pt, the function pf(p ) undergoes a first-order discontinuity. We find that the line pt(α ) ends at a critical point (pc,αc) , in which the cascading failures are replaced by a second-order percolation transition. We find analytically the average betweenness of nodes with different degrees before and after the initial attack, we investigate their roles in the cascading failures, and we find a lower bound for pt(α ) . We also study the difference between localized and random attacks.

  20. Attack Classification Schema for Smart City WSNs

    Directory of Open Access Journals (Sweden)

    Victor Garcia-Font

    2017-04-01

    Full Text Available Urban areas around the world are populating their streets with wireless sensor networks (WSNs in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  1. Adversarial Feature Selection Against Evasion Attacks.

    Science.gov (United States)

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection.

  2. Intrusion-Tolerant Replication under Attack

    Science.gov (United States)

    Kirsch, Jonathan

    2010-01-01

    Much of our critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As our dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including those…

  3. Strengthening Crypto-1 Cipher Against Algebraic Attacks

    Directory of Open Access Journals (Sweden)

    Farah Afianti

    2015-08-01

    Full Text Available In the last few years, several studies addressed the problem of data security in Mifare Classic. One of its weaknesses is the low random number quality. This causes SAT solver attacks to have lower complexity. In order to strengthen Crypto-1 against SAT solver attacks, a modification of the feedback function with better cryptographic properties is proposed. It applies a primitive polynomial companion matrix. SAT solvers cannot directly attack the feedback shift register that uses the modified Boolean feedback function, the register has to be split into smaller groups. Experimental testing showed that the amount of memory and CPU time needed were highest when attacking the modified Crypto-1 using the modified feedback function and the original filter function. In addition, another modified Crypto-1, using the modified feedback function and a modified filter function, had the lowest percentage of revealed variables. It can be concluded that the security strength and performance of the modified Crypto-1 using the modified feedback function and the modified filter function are better than those of the original Crypto-1.

  4. Wrap-Attack Pack: Product Packaging Exercise

    Science.gov (United States)

    Lee, Seung Hwan; Hoffman, K. Douglas

    2016-01-01

    Although many marketing courses discuss traditional concepts pertaining to product strategy, concepts specifically relating to packaging are often glossed over. This exercise, "Wrap-Attack Pack," teaches students about the utilitarian and hedonic design elements of packaging. More specifically, the primary objective is to creatively…

  5. Social Engineering Attack Detection Model: SEADMv2

    CSIR Research Space (South Africa)

    Mouton, F

    2015-10-01

    Full Text Available link in the security chain. A social engineering attack targets this weakness by using various manipulation techniques to elicit individuals to perform sensitive requests. The field of social engineering is still in its infancy as far as formal...

  6. Attack Classification Schema for Smart City WSNs.

    Science.gov (United States)

    Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena

    2017-04-05

    Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  7. Algebraic Side-Channel Attack on Twofish

    Directory of Open Access Journals (Sweden)

    Chujiao Ma

    2017-05-01

    Full Text Available While algebraic side-channel attack (ASCA has been successful in breaking simple cryptographic algorithms, it has never been done on larger or more complex algorithms such as Twofish. Compared to other algorithms that ASCA has been used on, Twofish is more difficult to attack due to the key-dependent S-boxes as well as the complex key scheduling. In this paper, we propose the first algebraic side-channel attack on Twofish, and examine the importance of side-channel information in getting past the key-dependent S-boxes and the complex key scheduling. The cryptographic algorithm and side-channel information are both expressed as boolean equations and a SAT solver is used to recover the key. While algebraic attack by itself is not sufficient to break the algorithm, with the help of side-channel information such as Hamming weights, we are able to correctly solve for 96 bits of the 128 bits key in under 2 hours with known plaintext/ciphertext.

  8. Armed Deterrence: Countering Soft Target Attacks

    Science.gov (United States)

    2016-02-06

    offer no security. With over 17,430 such geographically separated military sites across the United States, these fatal shootings by a Kuwaiti- born ...increasing trend and the carnage 4 that IS sympathizers can unleash. This coordinated attack on a concert hall, a soccer stadium, and restaurant

  9. 47 CFR 76.1612 - Personal attack.

    Science.gov (United States)

    2010-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND... issues of public importance, an attack is made upon the honesty, character, integrity, or like personal qualities of an identified person or group, the cable television system operator shall, within a reasonable...

  10. Rising Trend: Complex and sophisticated attack methods

    Indian Academy of Sciences (India)

    Stux, DuQu, Nitro, Luckycat, Exploit Kits, FLAME. ADSL/SoHo Router Compromise. Botnets of compromised ADSL/SoHo Routers; User Redirection via malicious DNS entry. Web Application attacks. SQL Injection, RFI etc. More and more Webshells. More utility to hackers; Increasing complexity and evading mechanisms.

  11. Strategic defense and attack for reliability systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2008-01-01

    This article illustrates a method by which arbitrarily complex series/parallel reliability systems can be analyzed. The method is illustrated with the series-parallel and parallel-series systems. Analytical expressions are determined for the investments and utilities of the defender and the attacker, depend on their unit costs of investment for each component, the contest intensity for each component, and their evaluations of the value of system functionality. For a series-parallel system, infinitely many components in parallel benefit the defender maximally regardless of the finite number of parallel subsystems in series. Conversely, infinitely many components in series benefit the attacker maximally regardless of the finite number of components in parallel in each subsystem. For a parallel-series system, the results are opposite. With equivalent components, equal unit costs for defender and attacker, equal intensity for all components, and equally many components in series and parallel, the defender always prefers the series-parallel system rather than the parallel-series system, and converse holds for the attacker. Hence from the defender's perspective, ceteris paribus, the series-parallel system is more reliable, and has fewer 'cut sets' or failure modes

  12. Validation Method of a Telecommunications Blackout Attack

    National Research Council Canada - National Science Library

    Amado, Joao; Nunes, Paulo

    2005-01-01

    ..., and to obtain the maximum disruptive effect over the services. The proposed method uses a top-down approach, starting on the service level and ending on the different network elements that can be identified in the end as the targets for the attack.

  13. Association between Terror Attacks and Suicide Attempts

    Science.gov (United States)

    Weizman, Tal; Yagil, Yaron; Schreiber, Shaul

    2009-01-01

    Based on Durkheim's "Control theory," we explored the association between frequency of terror attacks in Israel and the frequency of suicide attempts admitted to the Emergency Room of a major general hospital in Tel-Aviv (1999-2004). Analysis of the six-year study period as a whole revealed no significant correlation between the…

  14. Rising Trend: Complex and sophisticated attack methods

    Indian Academy of Sciences (India)

    Increased frequency and intensity of DoS/DDoS. Few Gbps is now normal; Anonymous VPNs being used; Botnets being used as a vehicle for launching DDoS attacks. Large scale booking of domain names. Hundred thousands of domains registered in short duration via few registrars; Single registrant; Most of the domains ...

  15. Understanding How Components of Organisations Contribute to Attacks

    DEFF Research Database (Denmark)

    Gu, Min; Aslanyan, Zaruhi; Probst, Christian W.

    2016-01-01

    Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors is diffi......Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors...... is difficult. Recently, system models have been used for automatically identifying possible attacks on the modelled organisation. The generated attacks consider all three layers, making the contribution of building infrastructure, computer infrastructure, and humans (insiders and outsiders) explicit. However......, this contribution is only visible in the attack trees as part of the performed steps; it cannot be mapped back to the model directly since the actions usually involve several elements (attacker and targeted actor or asset). Especially for large attack trees, understanding the relations between several model...

  16. An Adaptive Approach for Defending against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Muhai Li

    2010-01-01

    Full Text Available In various network attacks, the Distributed Denial-of-Service (DDoS attack is a severe threat. In order to deal with this kind of attack in time, it is necessary to establish a special type of defense system to change strategy dynamically against attacks. In this paper, we introduce an adaptive approach, which is used for defending against DDoS attacks, based on normal traffic analysis. The approach can check DDoS attacks and adaptively adjust its configurations according to the network condition and attack severity. In order to insure the common users to visit the victim server that is being attacked, we provide a nonlinear traffic control formula for the system. Our simulation test indicates that the nonlinear control approach can prevent the malicious attack packets effectively while making legitimate traffic flows arrive at the victim.

  17. Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, MAC layer attacks are considered...... the most harmful as they directly affect the available resources and thus the nodes’ energy consumption. The first endeavour of this paper is to model the activities of MAC layer security attacks to understand the flow of activities taking place when mounting the attack and when actually executing it....... The second aim of the paper is to simulate these attacks on hybrid MAC mechanisms, which shows the performance degradation of aWSN under the considered attacks. The modelling and implementation of the security attacks give an actual view of the network which can be useful in further investigating secure...

  18. Spin Torques in Systems with Spin Filtering and Spin Orbit Interaction

    KAUST Repository

    Ortiz Pauyac, Christian

    2016-06-19

    In the present thesis we introduce the reader to the field of spintronics and explore new phenomena, such as spin transfer torques, spin filtering, and three types of spin-orbit torques, Rashba, spin Hall, and spin swapping, which have emerged very recently and are promising candidates for a new generation of memory devices in computer technology. A general overview of these phenomena is presented in Chap. 1. In Chap. 2 we study spin transfer torques in tunnel junctions in the presence of spin filtering. In Chap. 3 we discuss the Rashba torque in ferromagnetic films, and in Chap. 4 we study spin Hall effect and spin swapping in ferromagnetic films, exploring the nature of spin-orbit torques based on these mechanisms. Conclusions and perspectives are summarized in Chap. 5.

  19. Recovery of human remains after shark attack.

    Science.gov (United States)

    Byard, Roger W; James, Ross A; Heath, Karen J

    2006-09-01

    Two cases of fatal shark attack are reported where the only tissues recovered were fragments of lung. Case 1: An 18-year-old male who was in the sea behind a boat was observed by friends to be taken by a great white shark (Carcharodon carcharias). The shark dragged him under the water and then, with a second shark, dismembered the body. Witnesses noted a large amount of blood and unrecognizable body parts coming to the surface. The only tissues recovered despite an intensive beach and sea search were 2 fragments of lung. Case 2: A 19-year-old male was attacked by a great white shark while diving. A witness saw the shark swim away with the victim's body in its mouth. Again, despite intensive beach and sea searches, the only tissue recovered was a single piece of lung, along with pieces of wetsuit and diving equipment. These cases indicate that the only tissue to escape being consumed or lost in fatal shark attacks, where there is a significant attack with dismemberment and disruption of the integrity of the body, may be lung. The buoyancy of aerated pulmonary tissue ensures that it rises quickly to the surface, where it may be recovered by searchers soon after the attack. Aeration of the lung would be in keeping with death from trauma rather than from drowning and may be a useful marker in unwitnessed deaths to separate ante- from postmortem injury, using only relatively small amounts of tissues. Early organ recovery enhances the identification of human tissues as the extent of morphologic alterations by putrefactive processes and sea scavengers will have been minimized. DNA testing is also possible on such recovered fragments, enabling confirmation of the identity of the victim.

  20. Optical spin generation/detection and spin transport lifetimes

    International Nuclear Information System (INIS)

    Miah, M. Idrish

    2011-01-01

    We generate electron spins in semiconductors by optical pumping. The detection of them is also performed by optical technique using time-resolved pump-probe photoluminescence polarization measurements in the presence of an external magnetic field perpendicular to the generated spin. The spin polarization in dependences of the pulse length, pump-probe delay and external magnetic field is studied. From the dependence of spin-polarization on the delay of the probe, the electronic spin transport lifetimes and the spin relaxation frequencies as a function of the strength of the magnetic field are estimated. The results are discussed based on hyperfine effects for interacting electrons.

  1. Optical spin generation/detection and spin transport lifetimes

    Energy Technology Data Exchange (ETDEWEB)

    Miah, M. Idrish, E-mail: m.miah@griffith.edu.au [Department of Physics, University of Chittagong, Chittagong 4331 (Bangladesh)

    2011-02-25

    We generate electron spins in semiconductors by optical pumping. The detection of them is also performed by optical technique using time-resolved pump-probe photoluminescence polarization measurements in the presence of an external magnetic field perpendicular to the generated spin. The spin polarization in dependences of the pulse length, pump-probe delay and external magnetic field is studied. From the dependence of spin-polarization on the delay of the probe, the electronic spin transport lifetimes and the spin relaxation frequencies as a function of the strength of the magnetic field are estimated. The results are discussed based on hyperfine effects for interacting electrons.

  2. Magnetocaloric effect in quantum spin-s chains

    Directory of Open Access Journals (Sweden)

    A. Honecker

    2009-01-01

    Full Text Available We compute the entropy of antiferromagnetic quantum spin-s chains in an external magnetic field using exact diagonalization and Quantum Monte Carlo simulations. The magnetocaloric effect, i. e., temperature variations during adiabatic field changes, can be derived from the isentropes. First, we focus on the example of the spin-s=1 chain and show that one can cool by closing the Haldane gap with a magnetic field. We then move to quantum spin-s chains and demonstrate linear scaling with s close to the saturation field. In passing, we propose a new method to compute many low-lying excited states using the Lanczos recursion.

  3. Rotational Invariance of the 2d Spin - Spin Correlation Function

    Science.gov (United States)

    Pinson, Haru

    2012-09-01

    At the critical temperature in the 2d Ising model on the square lattice, we establish the rotational invariance of the spin-spin correlation function using the asymptotics of the spin-spin correlation function along special directions (McCoy and Wu in the two dimensional Ising model. Harvard University Press, Cambridge, 1973) and the finite difference Hirota equation for which the spin-spin correlation function is shown to satisfy (Perk in Phys Lett A 79:3-5, 1980; Perk in Proceedings of III international symposium on selected topics in statistical mechanics, Dubna, August 22-26, 1984, JINR, vol II, pp 138-151, 1985).

  4. Transforming Graphical System Models to Graphical Attack Models

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2016-01-01

    Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations...... approach to transforming graphical system models to graphical attack models in the form of attack trees. Based on an asset in the model, our transformations result in an attack tree that represents attacks by all possible actors in the model, after which the actor in question has obtained the asset....

  5. New attacks on Wi-Fi Protected Setup

    OpenAIRE

    Hamed Mohtadi; Alireza Rahimi

    2015-01-01

    Wi-Fi Protected Setup (WPS) is a network security standard that is used to secure networks in home and office, introduced in 2006 by the Wi-Fi Alliance. It provides easier configuration setup and is used in almost all recent Wi-Fi devices. In this paper we propose two attacks on this standard. The first attack is an offline brute force attack that uses imbalance on registration protocol. This attack needs user action, but it is more efficient than previous attacks. The second attack uses weak...

  6. Efficient Spin Injection into Semiconductor

    International Nuclear Information System (INIS)

    Nahid, M.A.I.

    2010-06-01

    Spintronic research has made tremendous progress nowadays for making future devices obtain extra advantages of low power, and faster and higher scalability compared to present electronic devices. A spintronic device is based on the transport of an electron's spin instead of charge. Efficient spin injection is one of the very important requirements for future spintronic devices. However, the effective spin injection is an exceedingly difficult task. In this paper, the importance of spin injection, basics of spin current and the essential requirements of spin injection are illustrated. The experimental technique of electrical spin injection into semiconductor is also discussed based on the experimental experience. The electrical spin injection can easily be implemented for spin injection into any semiconductor. (author)

  7. 1994 Attack Team Workshop: Phase II - Full-Scale Offensive Fog Attack Tests

    National Research Council Canada - National Science Library

    Scheffey, Joseph

    1997-01-01

    .... This report demonstrates the benefits of using a medium angle fog stream to control the overhead fire threat when conducting a direct attack on a growing/steady state fire where the sea of the fire is obstructed...

  8. Overview of spin physics

    International Nuclear Information System (INIS)

    Yokosawa, A.

    1992-01-01

    Spin physics activities at medium and high energies became significantly active when polarized targets and polarized beams became accessible for hadron-hadron scattering experiments. My overview of spin physics will be inclined to the study of strong interaction using facilities at Argonne ZGS, Brookhaven AGS (including RHIC), CERN, Fermilab, LAMPF, an SATURNE. In 1960 accelerator physicists had already been convinced that the ZGS could be unique in accelerating a polarized beam; polarized beams were being accelerated through linear accelerators elsewhere at that time. However, there was much concern about going ahead with the construction of a polarized beam because (i) the source intensity was not high enough to accelerate in the accelerator, (ii) the use of the accelerator would be limited to only polarized-beam physics, that is, proton-proton interaction, and (iii) p-p elastic scattering was not the most popular topic in high-energy physics. In fact, within spin physics, π-nucleon physics looked attractive, since the determination of spin and parity of possible πp resonances attracted much attention. To proceed we needed more data beside total cross sections and elastic differential cross sections; measurements of polarization and other parameters were urgently needed. Polarization measurements had traditionally been performed by analyzing the spin of recoil protons. The drawbacks of this technique are: (i) it involves double scattering, resulting in poor accuracy of the data, and (ii) a carbon analyzer can only be used for a limited region of energy

  9. Noise in tunneling spin current across coupled quantum spin chains

    Science.gov (United States)

    Aftergood, Joshua; Takei, So

    2018-01-01

    We theoretically study the spin current and its dc noise generated between two spin-1 /2 spin chains weakly coupled at a single site in the presence of an over-population of spin excitations and a temperature elevation in one subsystem relative to the other, and we compare the corresponding transport quantities across two weakly coupled magnetic insulators hosting magnons. In the spin chain scenario, we find that applying a temperature bias exclusively leads to a vanishing spin current and a concomitant divergence in the spin Fano factor, defined as the spin current noise-to-signal ratio. This divergence is shown to have an exact analogy to the physics of electron scattering between fractional quantum Hall edge states and not to arise in the magnon scenario. We also reveal a suppression in the spin current noise that exclusively arises in the spin chain scenario due to the fermion nature of the spin-1/2 operators. We discuss how the spin Fano factor may be extracted experimentally via the inverse spin Hall effect used extensively in spintronics.

  10. A High-Spin Rate Measurement Method for Projectiles Using a Magnetoresistive Sensor Based on Time-Frequency Domain Analysis.

    Science.gov (United States)

    Shang, Jianyu; Deng, Zhihong; Fu, Mengyin; Wang, Shunting

    2016-06-16

    Traditional artillery guidance can significantly improve the attack accuracy and overall combat efficiency of projectiles, which makes it more adaptable to the information warfare of the future. Obviously, the accurate measurement of artillery spin rate, which has long been regarded as a daunting task, is the basis of precise guidance and control. Magnetoresistive (MR) sensors can be applied to spin rate measurement, especially in the high-spin and high-g projectile launch environment. In this paper, based on the theory of a MR sensor measuring spin rate, the mathematical relationship model between the frequency of MR sensor output and projectile spin rate was established through a fundamental derivation. By analyzing the characteristics of MR sensor output whose frequency varies with time, this paper proposed the Chirp z-Transform (CZT) time-frequency (TF) domain analysis method based on the rolling window of a Blackman window function (BCZT) which can accurately extract the projectile spin rate. To put it into practice, BCZT was applied to measure the spin rate of 155 mm artillery projectile. After extracting the spin rate, the impact that launch rotational angular velocity and aspect angle have on the extraction accuracy of the spin rate was analyzed. Simulation results show that the BCZT TF domain analysis method can effectively and accurately measure the projectile spin rate, especially in a high-spin and high-g projectile launch environment.

  11. A Framework for Attack-Resilient Industrial Control Systems : Attack Detection and Controller Reconfiguration

    OpenAIRE

    Paridari, Kaveh; O'Mahony, Niamh; Mady, Alie El-Din; Chabukswar, Rohan; Boubekeur, Menouer; Sandberg, Henrik

    2017-01-01

    Most existing industrial control systems (ICSs), such as building energy management systems (EMSs), were installed when potential security threats were only physical. With advances in connectivity, ICSs are now, typically, connected to communications networks and, as a result, can be accessed remotely. This extends the attack surface to include the potential for sophisticated cyber attacks, which can adversely impact ICS operation, resulting in service interruption, equipment damage, safety c...

  12. Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?

    Directory of Open Access Journals (Sweden)

    Ines Goicoechea-Telleria

    2018-01-01

    Full Text Available The use of biometrics keeps growing. Every day, we use biometric recognition to unlock our phones or to have access to places such as the gym or the office, so we rely on the security manufacturers offer when protecting our privileges and private life. It is well known that it is possible to hack into a fingerprint sensor using fake fingers made of Play-Doh and other easy-to-obtain materials but to what extent? Is this true for all users or only for specialists with a deep knowledge on biometrics? Are smartphone fingerprint sensors as reliable as desktop sensors? To answer these questions, we performed 3 separate evaluations. First, we evaluated 4 desktop fingerprint sensors of different technologies by attacking them with 7 different fake finger materials. All of them were successfully attacked by an experienced attacker. Secondly, we carried out a similar test on 5 smartphones with embedded sensors using the most successful materials, which also hacked the 5 sensors. Lastly, we gathered 15 simulated attackers with no background in biometrics to create fake fingers of several materials, and they had one week to attack the fingerprint sensors of the same 5 smartphones, with the starting point of a short video with the techniques to create them. All 5 smartphones were successfully attacked by an inexperienced attacker. This paper will provide the results achieved, as well as an analysis on the attack potential of every case. All results are given following the metrics of the standard ISO/IEC 30107-3.

  13. Defense and attack of complex and dependent systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2010-01-01

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  14. Defense and attack of complex and dependent systems

    Energy Technology Data Exchange (ETDEWEB)

    Hausken, Kjell, E-mail: kjell.hausken@uis.n [Faculty of Social Sciences, University of Stavanger, N-4036 Stavanger (Norway)

    2010-01-15

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  15. Spin Structures in Magnetic Nanoparticles

    DEFF Research Database (Denmark)

    Mørup, Steen; Brok, Erik; Frandsen, Cathrine

    2013-01-01

    Spin structures in nanoparticles of ferrimagnetic materials may deviate locally in a nontrivial way from ideal collinear spin structures. For instance, magnetic frustration due to the reduced numbers of magnetic neighbors at the particle surface or around defects in the interior can lead to spin...... canting and hence a reduced magnetization. Moreover, relaxation between almost degenerate canted spin states can lead to anomalous temperature dependences of the magnetization at low temperatures. In ensembles of nanoparticles, interparticle exchange interactions can also result in spin reorientation....... Here, we give a short review of anomalous spin structures in nanoparticles....

  16. SPIN-selling

    CERN Document Server

    Rackham, Neil

    1995-01-01

    True or false? In selling high-value products or services: "closing" increases your chance of success; it is essential to describe the benefits of your product or service to the customer; objection handling is an important skill; and open questions are more effective than closed questions. All false, says Neil Rackham. He and his team studied more than 35,000 sales calls made by 10,000 sales people in 23 countries over 12 years. Their findings revealed that many of the methods developed for selling low-value goods just don't work for major sales. Rackham went on to introduce his SPIN-selling method, where SPIN describes the whole selling process - Situation questions, Problem questions, Implication questions, Need-payoff questions. SPIN-selling provides you with a set of simple and practical techniques which have been tried in many of today's leading companies with dramatic improvements to their sales performance.

  17. Perspectives on spin glasses

    CERN Document Server

    Contucci, Pierluigi

    2013-01-01

    Presenting and developing the theory of spin glasses as a prototype for complex systems, this book is a rigorous and up-to-date introduction to their properties. The book combines a mathematical description with a physical insight of spin glass models. Topics covered include the physical origins of those models and their treatment with replica theory; mathematical properties like correlation inequalities and their use in the thermodynamic limit theory; main exact solutions of the mean field models and their probabilistic structures; and the theory of the structural properties of the spin glass phase such as stochastic stability and the overlap identities. Finally, a detailed account is given of the recent numerical simulation results and properties, including overlap equivalence, ultrametricity and decay of correlations. The book is ideal for mathematical physicists and probabilists working in disordered systems.

  18. Exertional Rhabdomyolysis after Spinning.

    Science.gov (United States)

    Jeong, Youjin; Kweon, Hyuk-Jung; Oh, Eun-Jung; Ahn, Ah-Leum; Choi, Jae-Kyung; Cho, Dong-Yung

    2016-11-01

    Any strenuous muscular exercise may trigger rhabdomyolysis. We report an episode of clinically manifested exertional rhabdomyolysis due to stationary cycling, commonly known as spinning. Reports of spinning-related rhabdomyolysis are rare in the English literature, and the current case appears to be the first such case reported in South Korea. A previously healthy 21-year-old Asian woman presented with severe thigh pain and reddish-brown urinary discoloration 24-48 hours after attending a spinning class at a local gymnasium. Paired with key laboratory findings, her symptoms were suggestive of rhabdomyolysis. She required hospital admission to sustain renal function through fluid resuscitation therapy and fluid balance monitoring. Because exertional rhabdomyolysis may occur in any unfit but otherwise healthy individual who indulges in stationary cycling, the potential health risks of this activity must be considered.

  19. Spin Waves in Terbium

    DEFF Research Database (Denmark)

    Jensen, J.; Houmann, Jens Christian Gylden

    1975-01-01

    The selection rules for the linear couplings between magnons and phonons propagating in the c direction of a simple basal-plane hcp ferromagnet are determined by general symmetry considerations. The acoustic-optical magnon-phonon interactions observed in the heavy-rare-earth metals have been...... explained by Liu as originating from the mixing of the spin states of the conduction electrons due to the spin-orbit coupling. We find that this coupling mechanism introduces interactions which violate the selection rules for a simple ferromagnet. The interactions between the magnons and phonons propagating...... in the c direction of Tb have been studied experimentally by means of inelastic neutron scattering. The magnons are coupled to both the acoustic- and optical-transverse phonons. By studying the behavior of the acoustic-optical coupling, we conclude that it is a spin-mixed-induced coupling as proposed...

  20. Spin Physics at COMPASS

    International Nuclear Information System (INIS)

    Schill, Christian

    2012-01-01

    The COMPASS experiment is a fixed target experiment at the CERN SPS using muon and hadron beams for the investigation of the spin structure of the nucleon and hadron spectroscopy. The main objective of the muon physics program is the study of the spin of the nucleon in terms of its constituents, quarks and gluons. COMPASS has accumulated data during 6 years scattering polarized muons off longitudinally or transversely polarized deuteron ( 6 LiD) or proton (NH 3 ) targets. Results for the gluon polarization are obtained from longitudinal double spin cross section asymmetries using two different channels, open charm production and high transverse momentum hadron pairs, both proceeding through the photon-gluon fusion process. Also, the longitudinal spin structure functions of the proton and the deuteron were measured in parallel as well as the helicity distributions for the three lightest quark flavours. With a transversely polarized target, results were obtained with proton and deuteron targets for the Collins and Sivers asymmetries for charged hadrons as well as for identified kaons and pions. The Collins asymmetry is sensitive to the transverse spin structure of the nucleon, while the Sivers asymmetry reflects correlations between the quark transverse momentum and the nucleon spin. Recently, a new proposal for the COMPASS II experiment was accepted by the CERN SPS which includes two new topics: Exclusive reactions like DVCS and DVMP using the muon beam and a hydrogen target to study generalized parton distributions and Drell-Yan measurements using a pion beam and a polarized NH 3 target to study transverse momentum dependent distributions.

  1. Control of electron spin decoherence in nuclear spin baths

    Science.gov (United States)

    Liu, Ren-Bao

    2011-03-01

    Nuclear spin baths are a main mechanism of decoherence of spin qubits in solid-state systems, such as quantum dots and nitrogen-vacancy (NV) centers of diamond. The decoherence results from entanglement between the electron and nuclear spins, established by quantum evolution of the bath conditioned on the electron spin state. When the electron spin is flipped, the conditional bath evolution is manipulated. Such manipulation of bath through control of the electron spin not only leads to preservation of the center spin coherence but also demonstrates quantum nature of the bath. In an NV center system, the electron spin effectively interacts with hundreds of 13 C nuclear spins. Under repeated flip control (dynamical decoupling), the electron spin coherence can be preserved for a long time (> 1 ms) . Thereforesomecharacteristicoscillations , duetocouplingtoabonded 13 C nuclear spin pair (a dimer), are imprinted on the electron spin coherence profile, which are very sensitive to the position and orientation of the dimer. With such finger-print oscillations, a dimer can be uniquely identified. Thus, we propose magnetometry with single-nucleus sensitivity and atomic resolution, using NV center spin coherence to identify single molecules. Through the center spin coherence, we could also explore the many-body physics in an interacting spin bath. The information of elementary excitations and many-body correlations can be extracted from the center spin coherence under many-pulse dynamical decoupling control. Another application of the preserved spin coherence is identifying quantumness of a spin bath through the back-action of the electron spin to the bath. We show that the multiple transition of an NV center in a nuclear spin bath can have longer coherence time than the single transition does, when the classical noises due to inhomogeneous broadening is removed by spin echo. This counter-intuitive result unambiguously demonstrates the quantumness of the nuclear spin bath

  2. Spin Physics at RHIC

    International Nuclear Information System (INIS)

    Bland, L.C.

    2003-01-01

    The physics goals that will be addressed by colliding polarized protons at the Relativistic Heavy Ion Collider (RHIC) are described. The RHIC spin program provides a new generation of experiments that will unfold the quark, anti-quark and gluon contributions to the proton's spin. In addition to these longer term goals, this paper describes what was learned from the first polarized proton collisions at √(s)=200 GeV. These collisions took place in a five-week run during the second year of RHIC operation

  3. CONFERENCE: Muon spin rotation

    Energy Technology Data Exchange (ETDEWEB)

    Karlsson, Erik

    1986-11-15

    An international physics conference centred on muons without a word about leptons, weak interactions, EMC effects, exotic decay modes or any other standard high energy physics jargon. Could such a thing even have been imagined ten years ago? Yet about 120 physicists and chemists from 16 nations gathered at the end of June in Uppsala (Sweden) for their fourth meeting on Muon Spin Rotation, Relaxation and Resonance, without worrying about the muon as an elementary particle. This reflects how the experimental techniques based on the muon spin interactions have reached maturity and are widely recognized by condensed matter physicists and specialized chemists as useful tools.

  4. Spin Waves in Terbium

    DEFF Research Database (Denmark)

    Jensen, J.; Houmann, Jens Christian Gylden; Bjerrum Møller, Hans

    1975-01-01

    with the symmetry, we deduce the dispersion relation for the spin waves in a basal-plane ferromagnet. This phenomenological spin-wave theory accounts for the observed behavior of the magnon energies in Tb. The two q⃗-dependent Bogoliubov components of the magnon energies are derived from the experimental results......, which are corrected for the effect of the direct coupling between the magnons and the phonons, and for the field dependence of the relative magnetization at finite temperatures. A large q⃗-dependent difference between the two energy components is observed, showing that the anisotropy of the two...

  5. Spin puzzle in nucleon

    International Nuclear Information System (INIS)

    Ramachandran, R.

    1994-09-01

    The object of this brief review is to reconcile different points of view on how the spin of proton is made up from its constituents. On the basis of naive quark model with flavour symmetry such as isospin or SU(3) one finds a static description. On the contrary the local SU(3) colour symmetry gives a dynamical view. Both these views are contrasted and the role of U(1) axial anomaly and the ambiguity for the measurable spin content is discussed. (author). 16 refs, 1 fig

  6. Information Warfare: Defining the Legal Response to An Attack

    National Research Council Canada - National Science Library

    Pottorff, James

    1999-01-01

    This paper discusses the difficulty in determining whether an information warfare attack, such as a computer virus, can be treated as an "armed attack" for purposes of national defense under the United Nations charter. As the U.S...

  7. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    Directory of Open Access Journals (Sweden)

    Khaled Elleithy

    2005-02-01

    Full Text Available A denial of service attack (DOS is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack will be simulated against a Microsoft Windows 95 computer. The TCP SYN Flood attack will be simulated against a Microsoft Windows 2000 IIS FTP Server. Distributed DOS will be demonstrated by simulating a distribution zombie program that will carry the Ping of Death attack. This paper will demonstrate the potential damage from DOS attacks and analyze the ramifications of the damage.

  8. Calcium Supplements: A Risk Factor for Heart Attack?

    Science.gov (United States)

    ... factor for heart attack? I've read that calcium supplements may increase the risk of heart attack. ... D. Some doctors think it's possible that taking calcium supplements may increase your risk of a heart ...

  9. Cyber Attacks During the War on Terrorism: A Predictive Analysis

    National Research Council Canada - National Science Library

    Vatis, Michael

    2001-01-01

    .... Just as the terrorist attacks of September 11, 2001 defied what many thought possible, cyber attacks could escalate in response to United States and allied retaliatory measures against the terrorists...

  10. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited...

  11. Two fatal tiger attacks in zoos.

    Science.gov (United States)

    Tantius, Britta; Wittschieber, Daniel; Schmidt, Sven; Rothschild, Markus A; Banaschak, Sibylle

    2016-01-01

    Two captive tiger attacks are presented that took place in Cologne and Münster zoos. Both attacks occurred when the handlers, intent on cleaning the enclosures, entered whilst the tigers accidently retained access to the location, and thus defended their territory against the perceived intruders. Both victims suffered fatal neck injuries from the bites. At Münster, colleagues managed to lure the tiger away from its victim to enable treatment, whilst the Cologne zoo tiger had to be shot in order to allow access to be gained. Whilst it was judged that human error led to the deaths of the experienced zookeepers, the investigation in Münster was closed as no third party was found to be at fault, whereas the Cologne zoo director was initially charged with being negligent. These charges were subsequently dismissed as safety regulations were found to be up to date.

  12. RISK DISCLOSURE AGAINST ATTACK ON CRITICAL INFRASTRUCTURES

    Science.gov (United States)

    Yoshida, Mamoru; Kobayashi, Kiyoshi

    This paper analyzes the government's defensive and disclosure strategies to reduce the damage caused by terrorists that attack critical infrastructures using subjective game theory. The government recognizes a terrorist as a hidden opponent and the government's decision making about the policies against terror attacks depends on the belief about the existence of terrorist. In addition, it is not necessarily true that the government and the terrorist play the common game and make their decisions. Considering these points, the paper formulates the model in which the government and the terrorist formulate the subjective games respectively, and they induce the strategies using the equilibriums of their subjective games. The paper concluded that the government's disclosure about the implementation of the countermeasure, rather than the disclosure of warning level related with the belief about the existence of terrorist, brings about the higher increment of the subjective payoffs of the government.

  13. Marine microalgae attack and feed on metazoans

    DEFF Research Database (Denmark)

    Berge, Terje; Poulsen, Louise K.; Moldrup, Morten

    2012-01-01

    Free-living microalgae from the dinoflagellate genus Karlodinium are known to formmassive blooms in eutrophic coastal waters worldwide and are often associated with fish kills. Natural bloom populations, recently shown to consist of the two mixotrophic and toxic species Karlodinium armiger...... and Karlodinium veneficum have caused fast paralysis and mortality of finfish and copepods in the laboratory, and have been associated with reduced metazooplankton biomass in-situ. Here we show that a strain of K. armiger (K-0688) immobilises the common marine copepod Acartia tonsa in a densitydependent manner...... and collectively ingests the grazer to promote its own growth rate. In contrast, four strains of K. veneficum did not attack or affect the motility and survival of the copepods. Copepod immobilisation by the K. armiger strain was fast (within 15min) and caused by attacks of swarming cells, likely through...

  14. Cascade-based attacks on complex networks

    Science.gov (United States)

    Motter, Adilson E.; Lai, Ying-Cheng

    2002-12-01

    We live in a modern world supported by large, complex networks. Examples range from financial markets to communication and transportation systems. In many realistic situations the flow of physical quantities in the network, as characterized by the loads on nodes, is important. We show that for such networks where loads can redistribute among the nodes, intentional attacks can lead to a cascade of overload failures, which can in turn cause the entire or a substantial part of the network to collapse. This is relevant for real-world networks that possess a highly heterogeneous distribution of loads, such as the Internet and power grids. We demonstrate that the heterogeneity of these networks makes them particularly vulnerable to attacks in that a large-scale cascade may be triggered by disabling a single key node. This brings obvious concerns on the security of such systems.

  15. Research About Attacks Over Cloud Environment

    Directory of Open Access Journals (Sweden)

    Li Jie

    2017-01-01

    Full Text Available Cloud computing is expected to continue expanding in the next few years and people will start to see some of the following benefits in their real lives. Security of cloud computing environments is the set of control-based technologies and policies absolute to adhere regulatory compliance rules and protect information data applications and infrastructure related with cloud use. In this paper we suggest a model to estimating the cloud computing security and test the services provided to users. The simulator NG-Cloud Next Generation Secure Cloud Storage is used and modified to administer the proposed model. This implementation achieved security functions potential attacks as defined in the proposed model. Finally we also solve some attacks over cloud computing to provide the security and safety of the cloud.

  16. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...

  17. Spin transfer torque with spin diffusion in magnetic tunnel junctions

    KAUST Repository

    Manchon, Aurelien; Matsumoto, R.; Jaffres, H.; Grollier, J.

    2012-01-01

    in the metallic layers. We show that spin diffusion mixes the transverse spin current components and dramatically modifies the bias dependence of the effective spin transfer torque. This leads to a significant linear bias dependence of the out-of-plane torque

  18. Blind Data Attack on BGP Routers

    Science.gov (United States)

    2017-03-01

    Second Reader Dr. Cynthia Irvine Chair, Cyber Academic Group iii THIS PAGE INTENTIONALLY LEFT BLANK iv ABSTRACT Transport Communication Protocol (TCP...Postgraduate School. The experience of higher learning at this institution was incredible, and I would whole-heartedly recommend it to any of my peers and...data attack packets to the victim device. Scapy is a Python library that is used to craft and send packets [28]. BGP is supported in Python through

  19. Fighting Through a Logistics Cyber Attack

    Science.gov (United States)

    2015-06-19

    cumulative cost of cyber-attacks was more than the combined global black market cost of cocaine, heroin and marijuana. These alarming figures raised...the country to its knees. The Luftwaffe was uncontested in the Battle of Britain until radar’s ability to detect inbound aircraft provided the...manifest information in IGC and provides inbound passenger manifest data to the aerial port of debarkation (APOD) and other receiving activities for

  20. Are blockchains immune to all malicious attacks?

    OpenAIRE

    Xu, Jennifer J.

    2016-01-01

    Background: In recent years, blockchain technology has attracted considerable attention. It records cryptographic transactions in a public ledger that is difficult to alter and compromise because of the distributed consensus. As a result, blockchain is believed to resist fraud and hacking. Results: This work explores the types of fraud and malicious activities that can be prevented by blockchain technology and identifies attacks to which blockchain remains vulnerable. Conclusions: This study ...

  1. An Explanation of Nakamoto's Analysis of Double-spend Attacks

    OpenAIRE

    Ozisik, A. Pinar; Levine, Brian Neil

    2017-01-01

    The fundamental attack against blockchain systems is the double-spend attack. In this tutorial, we provide a very detailed explanation of just one section of Satoshi Nakamoto's original paper where the attack's probability of success is stated. We show the derivation of the mathematics relied upon by Nakamoto to create a model of the attack. We also validate the model with a Monte Carlo simulation, and we determine which model component is not perfect.

  2. Fuzzy Expert System for Heart Attack Diagnosis

    Science.gov (United States)

    Hassan, Norlida; Arbaiy, Nureize; Shah, Noor Aziyan Ahmad; Afizah Afif@Afip, Zehan

    2017-08-01

    Heart attack is one of the serious illnesses and reported as the main killer disease. Early prevention is significant to reduce the risk of having the disease. The prevention efforts can be strengthen through awareness and education about risk factor and healthy lifestyle. Therefore the knowledge dissemination is needed to play role in order to distribute and educate public in health care management and disease prevention. Since the knowledge dissemination in medical is important, there is a need to develop a knowledge based system that can emulate human intelligence to assist decision making process. Thereby, this study utilized hybrid artificial intelligence (AI) techniques to develop a Fuzzy Expert System for Diagnosing Heart Attack Disease (HAD). This system integrates fuzzy logic with expert system, which helps the medical practitioner and people to predict the risk and as well as diagnosing heart attack based on given symptom. The development of HAD is expected not only providing expert knowledge but potentially become one of learning resources to help citizens to develop awareness about heart-healthy lifestyle.

  3. Iraqi violence, Saudi attack and further bombings

    Energy Technology Data Exchange (ETDEWEB)

    Anon

    2006-03-15

    Iraq moved closer to all-out civil war following an attack on the Imam Ali al-Hadi mosque in Samarra, one of Shi'i Islam's holiest shrines, on 22nd February. In the days that followed, several hundred Iraqis died in inter-communal violence. Attacks on installations close to the Basrah Oil Terminal were reported. Earlier in the month, the main oil storage facility in Kirkuk was bombed, forcing the Northern Oil Company to shut-in the 0.3 mn bpd field. Oil and electricity supplies in southern Iraq were cut by attacks on installations some 40 miles south of Baghdad. Turkey agreed to resume product exports to Iraq after a deal was agreed on repaying Iraqi debts of $1 bn to Turkish suppliers. An official Australian inquiry into illegal payments made under the UN's oil-for-food programme is to investigate allegations involving two Australian-controlled oil firms. (author)

  4. Transverse Spin Physics: Recent Developments

    International Nuclear Information System (INIS)

    Yuan, Feng

    2008-01-01

    Transverse-spin physics has been very active and rapidly developing in the last few years. In this talk, I will briefly summarize recent theoretical developments, focusing on the associated QCD dynamics in transverse spin physics

  5. A stochastic picture of spin

    International Nuclear Information System (INIS)

    Faris, W.G.

    1981-01-01

    Dankel has shown how to incorporate spin into stochastic mechanics. The resulting non-local hidden variable theory gives an appealing picture of spin correlation experiments in which Bell's inequality is violated. (orig.)

  6. Nopcsa, Baron Franz. 2014. Traveler, Scholar, Politician, Adventurer – A Transylvanian Baron at the Birth of Albanian Independence (ed. and trans. from German Robert Elsie. Budapest: Central European University Press. 227 pp.

    Directory of Open Access Journals (Sweden)

    David Mandler

    2015-01-01

    Full Text Available Nopcsa, Baron Franz. 2014. Traveler, Scholar, Politician, Adventurer – A Transylvanian Baron at the Birth of Albanian Independence (ed. and trans. from German Robert Elsie. Budapest: Central European University Press. 227 pp.  Reviewed by David Mandler, Independent Scholar

  7. Quantitative Attack Tree Analysis via Priced Timed Automata

    NARCIS (Netherlands)

    Kumar, Rajesh; Ruijters, Enno Jozef Johannes; Stoelinga, Mariëlle Ida Antoinette; Sankaranarayanan, Sriram; Vicario, Enrico

    The success of a security attack crucially depends on the resources available to an attacker: time, budget, skill level, and risk appetite. Insight in these dependencies and the most vulnerable system parts is key to providing effective counter measures. This paper considers attack trees, one of the

  8. Pareto Efficient Solution of Attack-Defence Trees

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as

  9. Vulnerability Assessment by Learning Attack Specifications in Graphs

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; Lopes, Raul H.C.

    This paper presents an evolutionary approach for learning attack specifications that describe attack scenarios. The objective is to find vulnerabilities in computer networks which minimise the cost of an attack with maximum impact. Although we focus on Insider Threat, the proposed approach applies

  10. Attacks on the AJPS Mersenne-based cryptosystem

    NARCIS (Netherlands)

    K. de Boer (Koen); L. Ducas (Léo); S. Jeffery (Stacey); R. M. de Wolf (Ronald)

    2018-01-01

    textabstractAggarwal, Joux, Prakash and Santha recently introduced a new potentially quantum-safe public-key cryptosystem, and suggested that a brute-force attack is essentially optimal against it. They consider but then dismiss both Meet-in-the-Middle attacks and LLL-based attacks. Very soon after

  11. 12 CFR 747.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... INVESTIGATIONS Uniform Rules of Practice and Procedure § 747.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any court concerning all or any part of an...

  12. 12 CFR 308.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... PRACTICE RULES OF PRACTICE AND PROCEDURE Uniform Rules of Practice and Procedure § 308.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any...

  13. 12 CFR 19.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... OF PRACTICE AND PROCEDURE Uniform Rules of Practice and Procedure § 19.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any court concerning all...

  14. Limit Asthma Attacks Caused by Colds or Flu

    Science.gov (United States)

    Asthma: Limit asthma attacks caused by colds or flu A cold or the flu can trigger an asthma attack. Here's why — and how to keep your sneeze ... plan. If you notice warning signs of an asthma attack — such as coughing, wheezing, chest tightness or shortness ...

  15. Link-layer Jamming Attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    2004-01-01

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  16. Link-layer jamming attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  17. Regression Nodes: Extending attack trees with data from social sciences

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    In the field of security, attack trees are often used to assess security vulnerabilities probabilistically in relation to multi-step attacks. The nodes are usually connected via AND-gates, where all children must be executed, or via OR-gates, where only one action is necessary for the attack step to

  18. What Can We Learn?--The Algonquin Bear Attack.

    Science.gov (United States)

    Strickland, Dan

    1992-01-01

    Describes a bear attack in Algonquin Park in Lake Opeongo (Canada) in which a man and woman were killed. Hypothesizes that the bear deliberately preyed on its victims and concludes that the bear was physically normal. Despite this isolated attack, the chance of being attacked by a black bear when camping is virtually nonexistent. (KS)

  19. Quantitative Verification and Synthesis of Attack-Defence Scenarios Conference

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    Attack-defence trees are a powerful technique for formally evaluating attack-defence scenarios. They represent in an intuitive, graphical way the interaction between an attacker and a defender who compete in order to achieve conflicting objectives. We propose a novel framework for the formal

  20. Modeling and Analysis of Information Attack in Computer Networks

    National Research Council Canada - National Science Library

    Pepyne, David

    2003-01-01

    ... (as opposed to physical and other forms of attack) . Information based attacks are attacks that can be carried out from anywhere in the world, while sipping cappuccino at an Internet cafe' or while enjoying the comfort of a living room armchair...

  1. Muonium spin exchange in spin-polarized media: Spin-flip and -nonflip collisions

    International Nuclear Information System (INIS)

    Senba, M.

    1994-01-01

    The transverse relaxation of the muon spin in muonium due to electron spin exchange with a polarized spin-1/2 medium is investigated. Stochastic calculations, which assume that spin exchange is a Poisson process, are carried out for the case where the electron spin polarization of the medium is on the same axis as the applied field. Two precession signals of muonium observed in intermediate fields (B>30 G) are shown to have different relaxation rates which depend on the polarization of the medium. Furthermore, the precession frequencies are shifted by an amount which depends on the spin-nonflip rate. From the two relaxation rates and the frequency shift in intermediate fields, one can determine (i) the encounter rate of muonium and the paramagnetic species, (ii) the polarization of the medium, and most importantly (iii) the quantum-mechanical phase shift (and its sign) associated with the potential energy difference between electron singlet and triplet encounters. Effects of spin-nonflip collisions on spin dynamics are discussed for non-Poisson as well as Poisson processes. In unpolarized media, the time evolution of the muon spin in muonium is not influenced by spin-nonflip collisions, if the collision process is Poissonian. This seemingly obvious statement is not true anymore in non-Poissonian processes, i.e., it is necessary to specify both spin-flip and spin-nonflip rates to fully characterize spin dynamics

  2. Antiferromagnetic spin-orbitronics

    KAUST Repository

    Manchon, Aurelien; Saidaoui, Hamed Ben Mohamed; Ghosh, Sumit

    2015-01-01

    Antiferromagnets have long remained an intriguing and exotic state of matter, whose application has been restricted to enabling interfacial exchange bias in metallic and tunneling spin-valves [1]. Their role in the expanding field of applied spintronics has been mostly passive and the in-depth investigation of their basic properties mostly considered from a fundamental perspective.

  3. Antiferromagnetic spin-orbitronics

    KAUST Repository

    Manchon, Aurelien

    2015-05-01

    Antiferromagnets have long remained an intriguing and exotic state of matter, whose application has been restricted to enabling interfacial exchange bias in metallic and tunneling spin-valves [1]. Their role in the expanding field of applied spintronics has been mostly passive and the in-depth investigation of their basic properties mostly considered from a fundamental perspective.

  4. Brookhaven: Spin result underlined

    Energy Technology Data Exchange (ETDEWEB)

    Anon.

    1990-09-15

    A recent experiment looking at violent proton-proton elastic scattering confirms, with high precision, earlier data which puzzled many theorists. Most pictures of strong interactions based on perturbative quark-gluon field theory (Quantum Chromodynamics, QCD) suggested that spin effects should disappear with energy and as the collisions become more violent.

  5. Nuclear Spin Relaxation

    Indian Academy of Sciences (India)

    IAS Admin

    ments have shown that in some cases the nuclear spin systems may be held in special configurations called .... these methods have been commercialized, and used for clinical trials, in which hyperpolarized NMR is used to .... symmetric under exchange, meaning that exchanging the two nuclei leaves the state unchanged.

  6. Nuclear spin-off

    International Nuclear Information System (INIS)

    1981-11-01

    This booklet gives examples of 'nuclear spin off', from research programmes carried out for the UKAEA, under the following headings; non destructive testing; tribology; environmental protection; flow measurement; material sciences; mechanical engineering; marine services; biochemical technology; electronic instrumentation. (U.K.)

  7. Spin and isospin modes

    International Nuclear Information System (INIS)

    Suzuki, T.; Sagawa, H.

    2000-01-01

    Complete text of publication follows. Spin and isospin modes in nuclei are investigated. We discuss some of the following topics. 1. Spin-dipole excitations in 12 C and 16 O are studied (1). Effects of tensor and spin-orbit interactions on the distribution of the strengths are investigated, and neutral current neutrino scattering cross sections in 16 O are obtained for heavy-flavor neutrinos from the supernovae. 2. Gamow-Teller (GT) and spin-dipole (SD) modes in 208 Bi are investigated. Quenching and fragmentation of the GT strength are discussed (2). SD excitations and electric dipole (E1) transitions between the GT and SD states are studied (3). Calculated E1 strengths are compared with the sum rule values obtained within the 1p-1h and 1p-1h + 2p-2h configuration spaces. 3. Coulomb displacement energy (CDE) of the IAS of 14 Be is calculated, and the effects of the halo on the CDE and the configuration of the halo state are investigated. 4. Spreading width of IAS and isospin dependence of the width are investigated (4). Our formula for the width explains very well the observed isospin dependence (5). (author)

  8. Spin-polarized photoemission

    International Nuclear Information System (INIS)

    Johnson, Peter D.

    1997-01-01

    Spin-polarized photoemission has developed into a versatile tool for the study of surface and thin film magnetism. In this review, we examine the methodology of the technique and its application to a number of different problems, including both valence band and core level studies. After a detailed review of spin-polarization measurement techniques and the related experimental requirements we consider in detail studies of the bulk properties both above and below the Curie temperature. This section also includes a discussion of observations relating to unique metastable phases obtained via epitaxial growth. The application of the technique to the study of surfaces, both clean and adsorbate covered, is reviewed. The report then examines, in detail, studies of the spin-polarized electronic structure of thin films and the related interfacial magnetism. Finally, observations of spin-polarized quantum well states in non-magnetic thin films are discussed with particular reference to their mediation of the oscillatory exchange coupling in related magnetic multilayers. (author)

  9. Spin physics at ELSA

    International Nuclear Information System (INIS)

    Althoff, K.H.

    1989-01-01

    In 1987 the new Bonn stretcher accelerator ELSA came into operation. In this paper a short description of the accelerator and the three experimental facilities PHOENICS, ELAN and SAPHIR is given. The determination of spin observables is one of the main subjects of the experimental program. Some experiments are discussed in more detail

  10. Spin physics in semiconductors

    CERN Document Server

    Dyakonov, Mikhail I

    2008-01-01

    This book describes beautiful optical and transport phenomena related to the electron and nuclear spins in semiconductors with emphasis on a clear presentation of the physics involved. Recent results on quantum wells and quantum dots are reviewed. The book is intended for students and researchers in the fields of semiconductor physics and nanoelectronics.

  11. Brookhaven: Spin result underlined

    International Nuclear Information System (INIS)

    Anon.

    1990-01-01

    A recent experiment looking at violent proton-proton elastic scattering confirms, with high precision, earlier data which puzzled many theorists. Most pictures of strong interactions based on perturbative quark-gluon field theory (Quantum Chromodynamics, QCD) suggested that spin effects should disappear with energy and as the collisions become more violent

  12. Spin polarizability of hyperons

    Indian Academy of Sciences (India)

    K B VIJAYA KUMAR. Department of Physics, Mangalore University, Mangalagangothri 574 199, India. E-mail: kbvijayakumar@yahoo.com. DOI: 10.1007/s12043-014-0869-4; ePublication: 4 November 2014. Abstract. We review the recent progress of the theoretical understanding of spin polarizabilities of the hyperon in the ...

  13. The invariance of spin

    International Nuclear Information System (INIS)

    Bramson, B.D.

    1978-01-01

    An isolated system in general relativity makes a transition between stationary states. It is shown that the spin vectors of the system, long before and long after the emission of radiation, are supertranslation invariant and, hence, independent of the choice of Minkowski observation space. (author)

  14. Spin Injection in Indium Arsenide

    Directory of Open Access Journals (Sweden)

    Mark eJohnson

    2015-08-01

    Full Text Available In a two dimensional electron system (2DES, coherent spin precession of a ballistic spin polarized current, controlled by the Rashba spin orbit interaction, is a remarkable phenomenon that’s been observed only recently. Datta and Das predicted this precession would manifest as an oscillation in the source-drain conductance of the channel in a spin-injected field effect transistor (Spin FET. The indium arsenide single quantum well materials system has proven to be ideal for experimental confirmation. The 2DES carriers have high mobility, low sheet resistance, and high spin orbit interaction. Techniques for electrical injection and detection of spin polarized carriers were developed over the last two decades. Adapting the proposed Spin FET to the Johnson-Silsbee nonlocal geometry was a key to the first experimental demonstration of gate voltage controlled coherent spin precession. More recently, a new technique measured the oscillation as a function of channel length. This article gives an overview of the experimental phenomenology of the spin injection technique. We then review details of the application of the technique to InAs single quantum well (SQW devices. The effective magnetic field associated with Rashba spin-orbit coupling is described, and a heuristic model of coherent spin precession is presented. The two successful empirical demonstrations of the Datta Das conductance oscillation are then described and discussed.

  15. An overview of spin physics

    International Nuclear Information System (INIS)

    Prescott, C.Y.

    1991-07-01

    Spin physics is playing an increasingly important role in high energy experiments and theory. This review looks at selected topics in high energy spin physics that were discussed at the 9th International Symposium on High Energy Spin Physics at Bonn in September 1990

  16. Mechanical generation of spin current

    Directory of Open Access Journals (Sweden)

    Mamoru eMatsuo

    2015-07-01

    Full Text Available We focus the recent results on spin-current generation from mechanical motion such as rigid rotation and elastic deformations. Spin transport theory in accelerating frames is constructed by using the low energy expansion of the generally covariant Dirac equation. Related issues on spin-manipulation by mechanical rotation are also discussed.

  17. Spin Transport in Semiconductor heterostructures

    International Nuclear Information System (INIS)

    Marinescu, Domnita Catalina

    2011-01-01

    The focus of the research performed under this grant has been the investigation of spin transport in magnetic semiconductor heterostructures. The interest in these systems is motivated both by their intriguing physical properties, as the physical embodiment of a spin-polarized Fermi liquid, as well as by their potential applications as spintronics devices. In our work we have analyzed several different problems that affect the spin dynamics in single and bi-layer spin-polarized two-dimensional (2D) systems. The topics of interests ranged from the fundamental aspects of the electron-electron interactions, to collective spin and charge density excitations and spin transport in the presence of the spin-orbit coupling. The common denominator of these subjects is the impact at the macroscopic scale of the spin-dependent electron-electron interaction, which plays a much more subtle role than in unpolarized electron systems. Our calculations of several measurable parameters, such as the excitation frequencies of magneto-plasma modes, the spin mass, and the spin transresistivity, propose realistic theoretical estimates of the opposite-spin many-body effects, in particular opposite-spin correlations, that can be directly connected with experimental measurements.

  18. Spinning Them Off: Entrepreneuring Practices in Corporate Spin-Offs

    Directory of Open Access Journals (Sweden)

    Katja Maria Hydle

    2016-01-01

    Full Text Available This paper focuses on the practices between parent and child firms in corporate spinoffs. We uncover the enacted aspects of knowledge, called knowing, through theories from seven cases of incumbent-backed spin-offs and find that the management of the parent firms are highly involved in the spin-offs. The practices associated with spinning off are solving problems, involving multidisciplinary expertise and entrepreneuring management at the parent firm. We contribute to the spin-off literature by discussing the knowledge required for successfully spinning off child firms and to practice theory by empirically uncovering the practical understanding involved in the origin and perpetuation of an organization.

  19. Spin-orbit induced electronic spin separation in semiconductor nanostructures.

    Science.gov (United States)

    Kohda, Makoto; Nakamura, Shuji; Nishihara, Yoshitaka; Kobayashi, Kensuke; Ono, Teruo; Ohe, Jun-ichiro; Tokura, Yasuhiro; Mineno, Taiki; Nitta, Junsaku

    2012-01-01

    The demonstration of quantized spin splitting by Stern and Gerlach is one of the most important experiments in modern physics. Their discovery was the precursor of recent developments in spin-based technologies. Although electrical spin separation of charged particles is fundamental in spintronics, in non-uniform magnetic fields it has been difficult to separate the spin states of charged particles due to the Lorentz force, as well as to the insufficient and uncontrollable field gradients. Here we demonstrate electronic spin separation in a semiconductor nanostructure. To avoid the Lorentz force, which is inevitably induced when an external magnetic field is applied, we utilized the effective non-uniform magnetic field which originates from the Rashba spin-orbit interaction in an InGaAs-based heterostructure. Using a Stern-Gerlach-inspired mechanism, together with a quantum point contact, we obtained field gradients of 10(8) T m(-1) resulting in a highly polarized spin current.

  20. Spin Relaxation and Manipulation in Spin-orbit Qubits

    Science.gov (United States)

    Borhani, Massoud; Hu, Xuedong

    2012-02-01

    We derive a generalized form of the Electric Dipole Spin Resonance (EDSR) Hamiltonian in the presence of the spin-orbit interaction for single spins in an elliptic quantum dot (QD) subject to an arbitrary (in both direction and magnitude) applied magnetic field. We predict a nonlinear behavior of the Rabi frequency as a function of the magnetic field for sufficiently large Zeeman energies, and present a microscopic expression for the anisotropic electron g-tensor. Similarly, an EDSR Hamiltonian is devised for two spins confined in a double quantum dot (DQD). Finally, we calculate two-electron-spin relaxation rates due to phonon emission, for both in-plane and perpendicular magnetic fields. Our results have immediate applications to current EDSR experiments on nanowire QDs, g-factor optimization of confined carriers, and spin decay measurements in DQD spin-orbit qubits.

  1. Excitation of coherent propagating spin waves by pure spin currents.

    Science.gov (United States)

    Demidov, Vladislav E; Urazhdin, Sergei; Liu, Ronghua; Divinskiy, Boris; Telegin, Andrey; Demokritov, Sergej O

    2016-01-28

    Utilization of pure spin currents not accompanied by the flow of electrical charge provides unprecedented opportunities for the emerging technologies based on the electron's spin degree of freedom, such as spintronics and magnonics. It was recently shown that pure spin currents can be used to excite coherent magnetization dynamics in magnetic nanostructures. However, because of the intrinsic nonlinear self-localization effects, magnetic auto-oscillations in the demonstrated devices were spatially confined, preventing their applications as sources of propagating spin waves in magnonic circuits using these waves as signal carriers. Here, we experimentally demonstrate efficient excitation and directional propagation of coherent spin waves generated by pure spin current. We show that this can be achieved by using the nonlocal spin injection mechanism, which enables flexible design of magnetic nanosystems and allows one to efficiently control their dynamic characteristics.

  2. Unified communications forensics anatomy of common UC attacks

    CERN Document Server

    Grant, Nicholas Mr

    2013-01-01

    Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: analysis of forensic artifacts in common UC attacks an in-depth look at established UC technologies and attack exploits hands-on understanding of UC attack vectors and associated countermeasures

  3. Quantitative Verification and Synthesis of Attack-Defence Scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    2016-01-01

    analysis of quantitative properties of complex attack-defence scenarios, using an extension of attack-defence trees which models temporal ordering of actions and allows explicit dependencies in the strategies adopted by attackers and defenders. We adopt a game-theoretic approach, translating attack...... which guarantee or optimise some quantitative property, such as the probability of a successful attack, the expected cost incurred, or some multi-objective trade-off between the two. We implement our approach, building upon the PRISM-games model checker, and apply it to a case study of an RFID goods...

  4. Wind tunneling testing and analysis relating to the spinning of light aircraft

    Science.gov (United States)

    Mccormick, B. W.; Zilliac, G. G.; Ballin, M. G.

    1984-01-01

    Included is a summary of two studies related to the spinning of light aircraft. The first study was conducted to demonstrate that the aerodynamic forces and moments acting on a tail of a spinning aircraft can be obtained from static wind-tunnel tests. The second study analytically investigated spinning using a high angle-of-attack aerodynamic model derived from a static wind-tunnel data base. The validity of the aerodynamic model is shown by comparisons with rotary-balance data and forced-oscillation tests. The results of a six-degree-of-freedom analysis show that the dynamics and aerodynamics of the steep- and flat-spin modes of a modified Yankee have been properly modeled.

  5. Hybrid attacks on model-based social recommender systems

    Science.gov (United States)

    Yu, Junliang; Gao, Min; Rong, Wenge; Li, Wentao; Xiong, Qingyu; Wen, Junhao

    2017-10-01

    With the growing popularity of the online social platform, the social network based approaches to recommendation emerged. However, because of the open nature of rating systems and social networks, the social recommender systems are susceptible to malicious attacks. In this paper, we present a certain novel attack, which inherits characteristics of the rating attack and the relation attack, and term it hybrid attack. Furtherly, we explore the impact of the hybrid attack on model-based social recommender systems in multiple aspects. The experimental results show that, the hybrid attack is more destructive than the rating attack in most cases. In addition, users and items with fewer ratings will be influenced more when attacked. Last but not the least, the findings suggest that spammers do not depend on the feedback links from normal users to become more powerful, the unilateral links can make the hybrid attack effective enough. Since unilateral links are much cheaper, the hybrid attack will be a great threat to model-based social recommender systems.

  6. Machine Learning Methods for Attack Detection in the Smart Grid.

    Science.gov (United States)

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.

  7. False Positive and False Negative Effects on Network Attacks

    Science.gov (United States)

    Shang, Yilun

    2018-01-01

    Robustness against attacks serves as evidence for complex network structures and failure mechanisms that lie behind them. Most often, due to detection capability limitation or good disguises, attacks on networks are subject to false positives and false negatives, meaning that functional nodes may be falsely regarded as compromised by the attacker and vice versa. In this work, we initiate a study of false positive/negative effects on network robustness against three fundamental types of attack strategies, namely, random attacks (RA), localized attacks (LA), and targeted attack (TA). By developing a general mathematical framework based upon the percolation model, we investigate analytically and by numerical simulations of attack robustness with false positive/negative rate (FPR/FNR) on three benchmark models including Erdős-Rényi (ER) networks, random regular (RR) networks, and scale-free (SF) networks. We show that ER networks are equivalently robust against RA and LA only when FPR equals zero or the initial network is intact. We find several interesting crossovers in RR and SF networks when FPR is taken into consideration. By defining the cost of attack, we observe diminishing marginal attack efficiency for RA, LA, and TA. Our finding highlights the potential risk of underestimating or ignoring FPR in understanding attack robustness. The results may provide insights into ways of enhancing robustness of network architecture and improve the level of protection of critical infrastructures.

  8. Spin current and spin transfer torque in ferromagnet/superconductor spin valves

    Science.gov (United States)

    Moen, Evan; Valls, Oriol T.

    2018-05-01

    Using fully self-consistent methods, we study spin transport in fabricable spin valve systems consisting of two magnetic layers, a superconducting layer, and a spacer normal layer between the ferromagnets. Our methods ensure that the proper relations between spin current gradients and spin transfer torques are satisfied. We present results as a function of geometrical parameters, interfacial barrier values, misalignment angle between the ferromagnets, and bias voltage. Our main results are for the spin current and spin accumulation as functions of position within the spin valve structure. We see precession of the spin current about the exchange fields within the ferromagnets, and penetration of the spin current into the superconductor for biases greater than the critical bias, defined in the text. The spin accumulation exhibits oscillating behavior in the normal metal, with a strong dependence on the physical parameters both as to the structure and formation of the peaks. We also study the bias dependence of the spatially averaged spin transfer torque and spin accumulation. We examine the critical-bias effect of these quantities, and their dependence on the physical parameters. Our results are predictive of the outcome of future experiments, as they take into account imperfect interfaces and a realistic geometry.

  9. Spin injection and spin accumulation in all-metal mesoscopic spin valves

    NARCIS (Netherlands)

    Jedema, FJ; Nijboer, MS; Filip, AT; van Wees, BJ

    2003-01-01

    We study the electrical injection and detection of spin accumulation in lateral ferromagnetic-metal-nonmagnetic-metal-ferromagnetic-metal (F/N/F) spin valve devices with transparent interfaces. Different ferromagnetic metals, Permalloy (Py), cobalt (Co), and nickel (Ni), are used as electrical spin

  10. Spin current evolution in the separated spin-up and spin-down quantum hydrodynamics

    International Nuclear Information System (INIS)

    Trukhanova, Mariya Iv.

    2015-01-01

    We have developed a method of quantum hydrodynamics (QHD) that describes particles with spin-up and with spin-down in separate. We have derived the equation of the spin current evolution as a part of the set of the quantum hydrodynamics equations that treat particles with different projection of spin on the preferable direction as two different species. We have studied orthogonal propagation of waves in the external magnetic field and determined the contribution of quantum corrections due to the Bohm potential and to magnetization energy of particles with different projections of spin in the spin-current wave dispersion. We have analyzed the limits of weak and strong magnetic fields. - Highlights: • We derive the spin current equation for particles with different projection of spin. • We predict the contribution of Bohm potential to the dynamics of spin current. • We derive the spin-current wave in the system of spin-polarized particles. • We study the propagation of spin-acoustic wave in magnetized dielectrics.

  11. Spin Torques in Systems with Spin Filtering and Spin Orbit Interaction

    KAUST Repository

    Ortiz Pauyac, Christian

    2016-01-01

    filtering. In Chap. 3 we discuss the Rashba torque in ferromagnetic films, and in Chap. 4 we study spin Hall effect and spin swapping in ferromagnetic films, exploring the nature of spin-orbit torques based on these mechanisms. Conclusions and perspectives

  12. Photon-gated spin transistor

    OpenAIRE

    Li, Fan; Song, Cheng; Cui, Bin; Peng, Jingjing; Gu, Youdi; Wang, Guangyue; Pan, Feng

    2017-01-01

    Spin-polarized field-effect transistor (spin-FET), where a dielectric layer is generally employed for the electrical gating as the traditional FET, stands out as a seminal spintronic device under the miniaturization trend of electronics. It would be fundamentally transformative if optical gating was used for spin-FET. We report a new type of spin-polarized field-effect transistor (spin-FET) with optical gating, which is fabricated by partial exposure of the (La,Sr)MnO3 channel to light-emitti...

  13. Optimal counterterrorism and the recruitment effect of large terrorist attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2011-01-01

    We analyze a simple dynamic model of the interaction between terrorists and authorities. Our primary aim is to study optimal counterterrorism and its consequences when large terrorist attacks lead to a temporary increase in terrorist recruitment. First, we show that an increase in counterterrorism...... makes it more likely that terrorist cells plan small rather than large attacks and therefore may increase the probability of a successful attack. Analyzing optimal counterterrorism we see that the recruitment effect makes authorities increase the level of counterterrorism after large attacks. Therefore......, in periods following large attacks a new attack is more likely to be small compared to other periods. Finally, we analyze the long-run consequences of the recruitment effect. We show that it leads to more counterterrorism, more small attacks, and a higher sum of terrorism damage and counterterrorism costs...

  14. Adaptive optimisation-offline cyber attack on remote state estimator

    Science.gov (United States)

    Huang, Xin; Dong, Jiuxiang

    2017-10-01

    Security issues of cyber-physical systems have received increasing attentions in recent years. In this paper, deception attacks on the remote state estimator equipped with the chi-squared failure detector are considered, and it is assumed that the attacker can monitor and modify all the sensor data. A novel adaptive optimisation-offline cyber attack strategy is proposed, where using the current and previous sensor data, the attack can yield the largest estimation error covariance while ensuring to be undetected by the chi-squared monitor. From the attacker's perspective, the attack is better than the existing linear deception attacks to degrade the system performance. Finally, some numerical examples are provided to demonstrate theoretical results.

  15. Efficient spin transport through polyaniline

    Science.gov (United States)

    Mendes, J. B. S.; Alves Santos, O.; Gomes, J. P.; Assis, H. S.; Felix, J. F.; Rodríguez-Suárez, R. L.; Rezende, S. M.; Azevedo, A.

    2017-01-01

    By using the spin pumping process, we show that it is possible to transport a pure spin current across layers of conducting polyaniline (PANI) with several hundred nanometers sandwiched between a film of the ferrimagnetic insulator yttrium iron garnet (YIG) and a thin layer of platinum. The spin current generated by microwave-driven ferromagnetic resonance of the YIG film, injected through the YIG/PANI interface, crosses the whole PANI layer and then is injected into the Pt layer. By means of the inverse spin Hall effect in the Pt, the spin current is converted into charge current and electrically detected as a dc voltage. We measured a spin diffusion length in PANI of 590 ± 40 nm, which is very large compared with normal metals, demonstrating that PANI can be used as an efficient spin current conductor and poor charge current conductor, opening the path towards spintronics applications based in this very attractive material.

  16. Neuroradiological study of transient ischemic attack

    Energy Technology Data Exchange (ETDEWEB)

    Takusagawa, Yoshihiko; Fujiwara, Yasuhiro; Ichiki, Ken; Suga, Takeshi; Nishigaki, Shinichi

    1986-08-01

    Fifty-two patients with carotid TIAs and thirteen patients with vertebrobasilar TIAs were investigated by angiography and computed tomography. TIA was diagnosed by clinical symptoms in accordance with the criteria for TIA of the Joint Committee for Stroke Facilities in the U.S.A. (1974). The 65 patients with TIAs included 49 males and 16 females with average age of 63.5 years old at the initial episode of TIA. As for the diseases associated with TIA, hypertension (51 %), diabetes mellitus (15 %) and ischemic heart diseases (11 %) were the major disorders. Atrial fibrillation was observed in 2 cases. Intervals from last TIA attack to angiography were less than 7 days in 22 cases, 8 -- 30 days in 19 cases, 1 -- 4 monthes in 14 cases and more than 4 monthes in 10 cases, respectively. The cases in which angiography was done earlier after attacks displayed more abnormal findings. In 52 patients with caroted TIAs the artherosclerotic change of extracranial portion of the internal carotid artery was found in 14 cases (27 %), that of intracranial portion of the artery in 11 cases (21 %) and both lesions in 2 cases (4 %). On the other hand, in 13 patients with vertebrobasilar TIAs, this change was observed in 4 cases at the extracranival potion and in 1 case at the intracranial potion (siphon) of the internal carotid artery. Abnormal CT findings were found in 29 of 65 patients, namely 9 had ventricular dilatation and brain atrophy, 6 had cerebral infarction which was not associated with associated with symptoms of TIA. In carotid TIAs, Cerebral infarction was associated with symptoms of TIAs in 15 cases, namely 10 had a small low density area in the basal ganglia near the internal capsule and 5 had a low density area in the cortical or subcortical region. All of these 5 cases had cerebral embolism, which recanalized after attacks. (J.P.N.).

  17. Neuroradiological study of transient ischemic attack

    International Nuclear Information System (INIS)

    Takusagawa, Yoshihiko; Fujiwara, Yasuhiro; Ichiki, Ken; Suga, Takeshi; Nishigaki, Shinichi

    1986-01-01

    Fifty-two patients with carotid TIAs and thirteen patients with vertebrobasilar TIAs were investigated by angiography and computed tomography. TIA was diagnosed by clinical symptoms in accordance with the criteria for TIA of the Joint Committee for Stroke Facilities in the U.S.A. (1974). The 65 patients with TIAs included 49 males and 16 females with average age of 63.5 years old at the initial episode of TIA. As for the diseases associated with TIA, hypertension (51 %), diabetes mellitus (15 %) and ischemic heart diseases (11 %) were the major disorders. Atrial fibrillation was observed in 2 cases. Intervals from last TIA attack to angiography were less than 7 days in 22 cases, 8 ∼ 30 days in 19 cases, 1 ∼ 4 monthes in 14 cases and more than 4 monthes in 10 cases, respectively. The cases in which angiography was done earlier after attacks displayed more abnormal findings. In 52 patients with caroted TIAs the artherosclerotic change of extracranial portion of the internal carotid artery was found in 14 cases (27 %), that of intracranial portion of the artery in 11 cases (21 %) and both lesions in 2 cases (4 %). On the other hand, in 13 patients with vertebrobasilar TIAs, this change was observed in 4 cases at the extracranival potion and in 1 case at the intracranial potion (siphon) of the internal carotid artery. Abnormal CT findings were found in 29 of 65 patients, namely 9 had ventricular dilatation and brain atrophy, 6 had cerebral infarction which was not associated with associated with symptoms of TIA. In carotid TIAs, Cerebral infarction was associated with symptoms of TIAs in 15 cases, namely 10 had a small low density area in the basal ganglia near the internal capsule and 5 had a low density area in the cortical or subcortical region. All of these 5 cases had cerebral embolism, which recanalized after attacks. (J.P.N.)

  18. Cyber Attacks and Energy Infrastructures: Anticipating Risks

    International Nuclear Information System (INIS)

    Desarnaud, Gabrielle

    2017-01-01

    This study analyses the likelihood of cyber-attacks against European energy infrastructures and their potential consequences, particularly on the electricity grid. It also delivers a comparative analysis of measures taken by different European countries to protect their industries and collaborate within the European Union. The energy sector experiences an unprecedented digital transformation upsetting its activities and business models. Our energy infrastructures, sometimes more than a decade old and designed to remain functional for many years to come, now constantly interact with light digital components. The convergence of the global industrial system with the power of advanced computing and analytics reveals untapped opportunities at every step of the energy value chain. However, the introduction of digital elements in old and unprotected industrial equipment also exposes the energy industry to the cyber risk. One of the most compelling example of the type of threat the industry is facing, is the 2015 cyber-attack on the Ukraine power grid, which deprived about 200 000 people of electricity in the middle of the winter. The number and the level of technical expertise of cyber-attacks rose significantly after the discovery of the Stuxnet worm in the network of Natanz uranium enrichment site in 2010. Energy transition policies and the growing integration of renewable sources of energy will intensify this tendency, if cyber security measures are not part of the design of our future energy infrastructures. Regulators try to catch up and adapt, like in France where the authorities collaborate closely with the energy industry to set up a strict and efficient regulatory framework, and protect critical operators. This approach is adopted elsewhere in Europe, but common measures applicable to the whole European Union are essential to protect strongly interconnected energy infrastructures against a multiform threat that defies frontiers

  19. LAN attack detection using Discrete Event Systems.

    Science.gov (United States)

    Hubballi, Neminath; Biswas, Santosh; Roopa, S; Ratti, Ritesh; Nandi, Sukumar

    2011-01-01

    Address Resolution Protocol (ARP) is used for determining the link layer or Medium Access Control (MAC) address of a network host, given its Internet Layer (IP) or Network Layer address. ARP is a stateless protocol and any IP-MAC pairing sent by a host is accepted without verification. This weakness in the ARP may be exploited by malicious hosts in a Local Area Network (LAN) by spoofing IP-MAC pairs. Several schemes have been proposed in the literature to circumvent these attacks; however, these techniques either make IP-MAC pairing static, modify the existing ARP, patch operating systems of all the hosts etc. In this paper we propose a Discrete Event System (DES) approach for Intrusion Detection System (IDS) for LAN specific attacks which do not require any extra constraint like static IP-MAC, changing the ARP etc. A DES model is built for the LAN under both a normal and compromised (i.e., spoofed request/response) situation based on the sequences of ARP related packets. Sequences of ARP events in normal and spoofed scenarios are similar thereby rendering the same DES models for both the cases. To create different ARP events under normal and spoofed conditions the proposed technique uses active ARP probing. However, this probing adds extra ARP traffic in the LAN. Following that a DES detector is built to determine from observed ARP related events, whether the LAN is operating under a normal or compromised situation. The scheme also minimizes extra ARP traffic by probing the source IP-MAC pair of only those ARP packets which are yet to be determined as genuine/spoofed by the detector. Also, spoofed IP-MAC pairs determined by the detector are stored in tables to detect other LAN attacks triggered by spoofing namely, man-in-the-middle (MiTM), denial of service etc. The scheme is successfully validated in a test bed. Copyright © 2010 ISA. Published by Elsevier Ltd. All rights reserved.

  20. Key Recovery Attacks on Recent Authenticated Ciphers

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Dobraunig, Christoph; Eichlseder, Maria

    2014-01-01

    In this paper, we cryptanalyze three authenticated ciphers: AVALANCHE, Calico, and RBS. While the former two are contestants in the ongoing international CAESAR competition for authenticated encryption schemes, the latter has recently been proposed for lightweight applications such as RFID systems...... and wireless networks. All these schemes use well-established and secure components such as the AES, Grain-like NFSRs, ChaCha and SipHash as their building blocks. However, we discover key recovery attacks for all three designs, featuring square-root complexities. Using a key collision technique, we can...

  1. Twisted Polynomials and Forgery Attacks on GCM

    DEFF Research Database (Denmark)

    Abdelraheem, Mohamed Ahmed A. M. A.; Beelen, Peter; Bogdanov, Andrey

    2015-01-01

    Polynomial hashing as an instantiation of universal hashing is a widely employed method for the construction of MACs and authenticated encryption (AE) schemes, the ubiquitous GCM being a prominent example. It is also used in recent AE proposals within the CAESAR competition which aim at providing...... in an improved key recovery algorithm. As cryptanalytic applications of our twisted polynomials, we develop the first universal forgery attacks on GCM in the weak-key model that do not require nonce reuse. Moreover, we present universal weak-key forgeries for the nonce-misuse resistant AE scheme POET, which...

  2. Competitive Reactions to Advertising and Promotion Attacks

    OpenAIRE

    Jan-Benedict E. M. Steenkamp; Vincent R. Nijs; Dominique M. Hanssens; Marnik G. Dekimpe

    2005-01-01

    How do competitors react to each other's price-promotion and advertising attacks? What are the reasons for the observed reaction behavior? We answer these questions by performing a large-scale empirical study on the short-run and long-run reactions to promotion and advertising shocks in over 400 consumer product categories over a four-year time span. Our results clearly show that the most predominant form of competitive response is passive in nature. When a reaction does occur, it is usually ...

  3. Spin Funneling for Enhanced Spin Injection into Ferromagnets

    Science.gov (United States)

    Sayed, Shehrin; Diep, Vinh Q.; Camsari, Kerem Yunus; Datta, Supriyo

    2016-07-01

    It is well-established that high spin-orbit coupling (SOC) materials convert a charge current density into a spin current density which can be used to switch a magnet efficiently and there is increasing interest in identifying materials with large spin Hall angle for lower switching current. Using experimentally benchmarked models, we show that composite structures can be designed using existing spin Hall materials such that the effective spin Hall angle is larger by an order of magnitude. The basic idea is to funnel spins from a large area of spin Hall material into a small area of ferromagnet using a normal metal with large spin diffusion length and low resistivity like Cu or Al. We show that this approach is increasingly effective as magnets get smaller. We avoid unwanted charge current shunting by the low resistive NM layer utilizing the newly discovered phenomenon of pure spin conduction in ferromagnetic insulators via magnon diffusion. We provide a spin circuit model for magnon diffusion in FMI that is benchmarked against recent experiments and theory.

  4. Shot noise of spin current and spin transfer torque

    Science.gov (United States)

    Yu, Yunjin; Zhan, Hongxin; Wan, Langhui; Wang, Bin; Wei, Yadong; Sun, Qingfeng; Wang, Jian

    2013-04-01

    We report the theoretical investigation of the shot noise of the spin current (Sσ) and the spin transfer torque (Sτ) for non-collinear spin polarized transport in a spin-valve device which consists of a normal scattering region connected by two ferromagnetic electrodes (MNM system). Our theory was developed using the non-equilibrium Green’s function method, and general nonlinear Sσ - V and Sτ - V relations were derived as a function of the angle θ between the magnetizations of two leads. We have applied our theory to a quantum dot system with a resonant level coupled with two ferromagnetic electrodes. It was found that, for the MNM system, the auto-correlation of the spin current is enough to characterize the fluctuation of the spin current. For a system with three ferromagnetic layers, however, both auto-correlation and cross-correlation of the spin current are needed to characterize the noise of the spin current. For a quantum dot with a resonant level, the derivative of spin torque with respect to bias voltage is proportional to sinθ when the system is far away from resonance. When the system is near resonance, the spin transfer torque becomes a non-sinusoidal function of θ. The derivative of the noise of the spin transfer torque with respect to the bias voltage Nτ behaves differently when the system is near or far away from resonance. Specifically, the differential shot noise of the spin transfer torque Nτ is a concave function of θ near resonance while it becomes a convex function of θ far away from resonance. For certain bias voltages, the period Nτ(θ) becomes π instead of 2π. For small θ, it was found that the differential shot noise of the spin transfer torque is very sensitive to the bias voltage and the other system parameters.

  5. Shot noise of spin current and spin transfer torque

    International Nuclear Information System (INIS)

    Yu Yunjin; Zhan Hongxin; Wan Langhui; Wang Bin; Wei Yadong; Sun Qingfeng; Wang Jian

    2013-01-01

    We report the theoretical investigation of the shot noise of the spin current (S σ ) and the spin transfer torque (S τ ) for non-collinear spin polarized transport in a spin-valve device which consists of a normal scattering region connected by two ferromagnetic electrodes (MNM system). Our theory was developed using the non-equilibrium Green’s function method, and general nonlinear S σ − V and S τ − V relations were derived as a function of the angle θ between the magnetizations of two leads. We have applied our theory to a quantum dot system with a resonant level coupled with two ferromagnetic electrodes. It was found that, for the MNM system, the auto-correlation of the spin current is enough to characterize the fluctuation of the spin current. For a system with three ferromagnetic layers, however, both auto-correlation and cross-correlation of the spin current are needed to characterize the noise of the spin current. For a quantum dot with a resonant level, the derivative of spin torque with respect to bias voltage is proportional to sinθ when the system is far away from resonance. When the system is near resonance, the spin transfer torque becomes a non-sinusoidal function of θ. The derivative of the noise of the spin transfer torque with respect to the bias voltage N τ behaves differently when the system is near or far away from resonance. Specifically, the differential shot noise of the spin transfer torque N τ is a concave function of θ near resonance while it becomes a convex function of θ far away from resonance. For certain bias voltages, the period N τ (θ) becomes π instead of 2π. For small θ, it was found that the differential shot noise of the spin transfer torque is very sensitive to the bias voltage and the other system parameters. (paper)

  6. Nucleon spin structure functions

    International Nuclear Information System (INIS)

    Close, F.E.

    1989-01-01

    There has been recent excitement arising from the claim by the EMC collaboration that none of the proton's spin is carried by quarks. There are many textbooks, including those written by some members of this audience which assert that the proton's spin is carried by quarks. I will review the history of deep inelastic scattering of polarized leptons from polarized protons, culminating in this most recent dramatic claim. I will show that, for the last decade, data have appeared consistent with predictions of the quark model and highlight what the new and potentially exciting data are. I will conclude with suggestions for the future, and discuss the polarization dependence of inclusive hadron production. 35 refs

  7. Art of spin decomposition

    International Nuclear Information System (INIS)

    Chen Xiangsong; Sun Weimin; Wang Fan; Goldman, T.

    2011-01-01

    We analyze the problem of spin decomposition for an interacting system from a natural perspective of constructing angular-momentum eigenstates. We split, from the total angular-momentum operator, a proper part which can be separately conserved for a stationary state. This part commutes with the total Hamiltonian and thus specifies the quantum angular momentum. We first show how this can be done in a gauge-dependent way, by seeking a specific gauge in which part of the total angular-momentum operator vanishes identically. We then construct a gauge-invariant operator with the desired property. Our analysis clarifies what is the most pertinent choice among the various proposals for decomposing the nucleon spin. A similar analysis is performed for extracting a proper part from the total Hamiltonian to construct energy eigenstates.

  8. Spin and Madelung fluid

    International Nuclear Information System (INIS)

    Salesi, G.

    1995-07-01

    Starting from the Pauli current the decomposition of the non-relativistic local velocity has been obtained in two parts (in the ordinary tensorial language): one parallel and the other orthogonal to the impulse. The former is recognized to be the classical part, that is, the center-of-mass (CM) velocity, and the latter the quantum one, that is, the velocity of the motion in the CM frame (namely, the internal spin motion or Zitterbewegung). Inserting this complete, composite expression of the velocity into the kinetic energy term of the classical non-relativistic (i.e. Newtonian) Lagrangian, the author straightforwardly get the appearance of the so called quantum potential associates as it is known, to the Madelung fluid. In such a way, the quantum mechanical behaviour of particles appears to be strictly correlated to the existence of spin and Zitterbewegung

  9. Rotary balance data for a single-engine agricultural airplane configuration for an angle-of-attack range of 8 deg to 90 deg

    Science.gov (United States)

    Mulcay, W. J.; Chu, J.

    1980-01-01

    Aerodynamic characteristics obtained in a helical flow environment utilizing a rotary balance located in the Langley spin tunnel are presented in plotted form for a 1/10 scale single engine agricultural airplane model. The configurations tested include the basic airplane, various wing leading edge and wing tip devices, elevator, aileron, and rudder control settings, and other modifications. Data are presented without analysis for an angle of attack range of 8 deg to 90 deg, and clockwise and counter-clockwise rotations covering a spin coefficient range from 0 to .9.

  10. Spin models for the single molecular magnet Mn12-AC

    Science.gov (United States)

    Al-Saqer, Mohamad A.

    2005-11-01

    The single molecular magnet (SMM) Mn12-AC attracted the attention of scientists since the discovery of its magnetic hystereses which are accompanied by sudden jumps in magnetic moments at low temperature. Unlike conventional bulk magnets, hysteresis in SMMs is of molecular origin. This qualifies them as candidates for next generation of high density storage media where a molecule which is at most few nanometers in size can be used to store a bit of information. However, the jumps in these hystereses, due to spin tunneling, can lead to undesired loss of information. Mn12-AC molecule contains twelve magnetic ions antiferromagnetically coupled by exchanges leading to S = 10 ground state manifold. The magnetic ions are surrounded by ligands which isolate them magnetically from neighboring molecules. The lowest state of S = 9 manifold is believed to lie at about 40 K above the ground state. Therefore, at low temperatures, the molecule is considered as a single uncoupled moment of spin S = 10. Such model has been used widely to understand phenomena exhibited by the molecule at low temperatures including the tunneling of its spin, while a little attention has been paid for the multi-spin nature of the molecule. Using the 8-spin model, we demonstrate that in order to understand the phenomena of tunneling, a full spin description of the molecule is required. We utilized a calculation scheme where a fraction of energy levels are used in the calculations and the influence of levels having higher energy is neglected. From the dependence of tunnel splittings on the number of states include, we conclude that models based on restricting the number of energy levels (single-spin and 8-spin models) lead to unreliable results of tunnel splitting calculations. To attack the full 12-spin model, we employed the Davidson algorithm to calculated lowest energy levels produced by exchange interactions and single ion anisotropies. The model reproduces the anisotropy properties at low

  11. Pangaea, She No Spin

    Science.gov (United States)

    McDowell, M.

    2002-12-01

    Looking at lopsided Pangaea, shown imaginatively on many illustrated proposals, I wondered what would happen if the configuration were put in high relief on a globe and spun on axis. Then I wondered if the present configuration of land masses would itself balance as a spinning top. So I got two Replogle globes, two boxes of colored modeling clay sticks, and two fat knitting needles, to fit through the capped holes at the poles of the globes. The clay sticks I cut up into 3 mm. (1/8") slices, using a different color for each continent, and applied to the first globe, assuming the extreme exaggeration above the geoid, no matter how crude, would tell the story. Inserting one needle through the globe and securing it, I balanced the globe on the point of the needle and twirled it like a top. Result: Wobbly! Top end of needle gyrated unevenly, and here it was supposed to make a smooth precessional cone. Oh boy. For the second globe, I used a Scotese "free stuff" interpretation of Pangaea, which I had to augment considerably using USGS, DuToit, Irving and other references, fitting it on the globe and applying identical clay color slices to what I judged generally accepted land surfaces. Result: the thing would hardly stand up, let alone spin. Conclusion: Although a refinement of application on the "today" globe might eliminate nutation, creating a smoother spin, there is no way any refinement of Pangaea on the same size globe can come close. While the concept of a supercontinent may be viable, I theorize that it had to have evolved on a far smaller globe, where land mass could balance, and the "breakup" would not have caused us to wildly gyrate on our axis. Because Pangaea, she no spin.

  12. Nuclear spin off

    International Nuclear Information System (INIS)

    1984-01-01

    The focus for nuclear energy research in the UK has been mainly the generation of electricity. However, nuclear technology is also applied in many areas other than energy production. Nuclear Spin Off shows how technology has been transferred to industry, agriculture, medicine and other areas, creating considerable material benefit. Nuclear research has produced revolutionary new materials and measuring and detection techniques. This film shows a wide range of uses. (author)

  13. Spinning out a star.

    Science.gov (United States)

    Lord, Michael D; Mandel, Stanley W; Wager, Jeffrey D

    2002-06-01

    Spinouts rarely take off; most, in fact, fall into one or more of four traps that doom them from the start. Some companies spin out ventures that are too close to the core of their businesses, in effect selling off their crown jewels. Sometimes, a parent company uses the spinout primarily to pawn off debt or expenses or to quickly raise external capital for itself. Other times, a company may try to spin out an area of its business that lacks one or more of the critical legs of a successful company--a coherent business model, say, or a solid financial base. And in many cases, parent companies can't bring themselves to sever their ownership ties and give up control of their spinouts. R.J. Reynolds, the tobacco giant, managed to avoid these traps when it successfully spun out a most unlikely venture, the pharmaceutical company Targacept. As the story illustrates, the problem with spinouts is similar to the problem of rich children. Their parents have the wherewithal to spoil them or shelter them or cling to them, but what they need is tough love and discipline--much the same discipline that characterizes successful start-ups. R.J. Reynolds recognized that it didn't know that much about the pharmaceutical business and couldn't merely try to spin out a small clone of itself. It had to treat the venture as if it were essentially starting from scratch, with a passionate entrepreneurial leader, a solid business plan, help from outside partners in the industry, and ultimately substantial venture backing. That these lessons are less obvious to executives contemplating spinning out ventures closer to their core businesses may be why so many spinouts fail.

  14. RHIC spin physics

    International Nuclear Information System (INIS)

    Bunce, G.

    1994-01-01

    The physics potential of colliding beams of protons, polarized either longitudinally or transversely, at RHIC is remarkable. A luminosity of L = 2 x 10 32 cm -2 with 70% polarized beams will be available with up to 250 GeV energy in each beam. The proposal to collide polarized protons in RHIC was submitted in August 1992 and approved in October 1993. We have funding for R ampersand D on Siberian Snakes, so that RHIC will be able to accelerate polarized protons early in its program. The expected date of the first heavy ion collisions is 1999. The spin physics program includes measurement of gluon and sea quark polarization in the longitudinally polarized proton, measurement and then application of parity violation in W and Z production, measurement of hard scattering parton-parton asymmetries, and quark polarization or transversity in transversely polarized protons. Single spin asymmetries allow sensitive searches for parity violation (longitudinal polarization), and correlations between quark spin and gluons (transverse). Probes include direct photons (to P T = 20 GeV/c), jets (to P T > 50 GeV/c), Drell-Yan pairs to M ell ell = 9 GeV, W ± , Z. This program is described in our Particle World paper. Here we will emphasize the new information included in our Update, given to the Brookhaven PAC this September

  15. Nuclear spin circular dichroism

    International Nuclear Information System (INIS)

    Vaara, Juha; Rizzo, Antonio; Kauczor, Joanna; Norman, Patrick; Coriani, Sonia

    2014-01-01

    Recent years have witnessed a growing interest in magneto-optic spectroscopy techniques that use nuclear magnetization as the source of the magnetic field. Here we present a formulation of magnetic circular dichroism (CD) due to magnetically polarized nuclei, nuclear spin-induced CD (NSCD), in molecules. The NSCD ellipticity and nuclear spin-induced optical rotation (NSOR) angle correspond to the real and imaginary parts, respectively, of (complex) quadratic response functions involving the dynamic second-order interaction of the electron system with the linearly polarized light beam, as well as the static magnetic hyperfine interaction. Using the complex polarization propagator framework, NSCD and NSOR signals are obtained at frequencies in the vicinity of optical excitations. Hartree-Fock and density-functional theory calculations on relatively small model systems, ethene, benzene, and 1,4-benzoquinone, demonstrate the feasibility of the method for obtaining relatively strong nuclear spin-induced ellipticity and optical rotation signals. Comparison of the proton and carbon-13 signals of ethanol reveals that these resonant phenomena facilitate chemical resolution between non-equivalent nuclei in magneto-optic spectra

  16. Rotary spin echoes

    Energy Technology Data Exchange (ETDEWEB)

    Solomon, I. [Commissariat a l' energie atomique et aux energies alternatives - CEA, Centre d' Etudes Nucleaires de Saclay, BP2, Gif-sur-Yvette (France)

    1959-07-01

    Torrey has observed the free precession of nuclear spins around an r-f field H{sub 1}, fixed in a frame rotating at the Larmor frequency ω{sub 0} = γH{sub 0} around a large d-c magnetic field H{sub 0}. He showed that for an H{sub 1}, much larger than inhomogeneity of H{sub 0}, the latter has a negligible effect on the decay of the spin magnetization which is mainly due to the inhomogeneity of H{sub 1}. We report here on a method of overcoming the inhomogeneity of H{sub 1}, by production of echoes in the rotating frame ('rotary echoes'). These echoes are obtained by a 180 deg. phase shift at t = τ on the r-f field so that H{sub 1}, is suddenly reversed, producing a re-focussing of the magnetization vectors at the time t = 2 τ. The rotary echoes so obtained are very similar to the usual spin-echoes with, however some specific features that make them particularly suitable for the measurement of long relaxation times. Reprint of a paper published in Physical Review Letters, vol. 2, no. 7, Apr 1959, p. 301-302.

  17. Rotary spin echoes

    International Nuclear Information System (INIS)

    Solomon, I.

    1959-01-01

    Torrey has observed the free precession of nuclear spins around an r-f field H 1 , fixed in a frame rotating at the Larmor frequency ω 0 = γH 0 around a large d-c magnetic field H 0 . He showed that for an H 1 , much larger than inhomogeneity of H 0 , the latter has a negligible effect on the decay of the spin magnetization which is mainly due to the inhomogeneity of H 1 . We report here on a method of overcoming the inhomogeneity of H 1 , by production of echoes in the rotating frame ('rotary echoes'). These echoes are obtained by a 180 deg. phase shift at t = τ on the r-f field so that H 1 , is suddenly reversed, producing a re-focussing of the magnetization vectors at the time t = 2 τ. The rotary echoes so obtained are very similar to the usual spin-echoes with, however some specific features that make them particularly suitable for the measurement of long relaxation times. Reprint of a paper published in Physical Review Letters, vol. 2, no. 7, Apr 1959, p. 301-302

  18. Spinning geometry = Twisted geometry

    International Nuclear Information System (INIS)

    Freidel, Laurent; Ziprick, Jonathan

    2014-01-01

    It is well known that the SU(2)-gauge invariant phase space of loop gravity can be represented in terms of twisted geometries. These are piecewise-linear-flat geometries obtained by gluing together polyhedra, but the resulting geometries are not continuous across the faces. Here we show that this phase space can also be represented by continuous, piecewise-flat three-geometries called spinning geometries. These are composed of metric-flat three-cells glued together consistently. The geometry of each cell and the manner in which they are glued is compatible with the choice of fluxes and holonomies. We first remark that the fluxes provide each edge with an angular momentum. By studying the piecewise-flat geometries which minimize edge lengths, we show that these angular momenta can be literally interpreted as the spin of the edges: the geometries of all edges are necessarily helices. We also show that the compatibility of the gluing maps with the holonomy data results in the same conclusion. This shows that a spinning geometry represents a way to glue together the three-cells of a twisted geometry to form a continuous geometry which represents a point in the loop gravity phase space. (paper)

  19. RHIC spin physics

    International Nuclear Information System (INIS)

    Bunce, G.

    1993-01-01

    The physics potential of colliding beams of protons, polarized either longitudinally or transversely, at RHIC is remarkable. A luminosity of L = 2 x 10 32 cm -2 sec -1 with 70% polarized beams will be available with up to 250 GeV energy in each beam. The proposal to collide polarized protons in RHIC was submitted in August 1992 and approved in October 1993, just after this workshop. The collaboration has been encouraged to complete R ampersand D on Siberian Snakes, so that RHIC will be able to accelerate polarized protons early in its program. The expected date of the first heavy ion collisions is 1999. The spin physics program includes measurement of gluon and sea quark polarization in the longitudinally polarized proton, measurement and then application of parity violation in W and Z production, measurement of hard scattering parton-parton asymmetries, and quark polarization or transversity in transversely polarized protons. Single spin asymmetries allow sensitive searches for parity violation (longitudinal polarization), and correlations between quark spin and gluons (transverse). Probes include direct photons (to p T = 20 GeV/c), jets (to p T > 50 GeV/c), Drell-Yan pairs (to m ll = 9 GeV), W +/- , Z. Here, the collaboration emphasizes the new information included in the Update, given to the Brookhaven PAC this September

  20. Numerical simulation of steady supersonic flow over spinning bodies of revolution

    Science.gov (United States)

    Sturek, W. B.; Schiff, L. B.

    1982-01-01

    A recently reported parabolized Navier-Stokes code has been employed to compute the supersonic flowfield about a spinning cone and spinning and nonspinning ogive cylinder and boattailed bodies of revolution at moderate incidence. The computations were performed for flow conditions where extensive measurements for wall pressure, boundary-layer velocity profiles, and Magnus force had been obtained. Comparisons between the computational results and experiment indicate excellent agreement for angles of attack up to 6 deg. At angles greater than 6 deg discrepancies are noted which are tentatively attributed to turbulence modeling errors. The comparisons for Magnus effects show that the code accurately predicts the effects of body shape for the selected models.