WorldWideScience

Sample records for preventing heart attack

  1. Diabetes - preventing heart attack and stroke

    Science.gov (United States)

    Diabetes complications - heart; Coronary artery disease - diabetes; CAD - diabetes; Cerebrovascular disease - diabetes ... People with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure and high ...

  2. Fuzzy Expert System for Heart Attack Diagnosis

    Science.gov (United States)

    Hassan, Norlida; Arbaiy, Nureize; Shah, Noor Aziyan Ahmad; Afizah Afif@Afip, Zehan

    2017-08-01

    Heart attack is one of the serious illnesses and reported as the main killer disease. Early prevention is significant to reduce the risk of having the disease. The prevention efforts can be strengthen through awareness and education about risk factor and healthy lifestyle. Therefore the knowledge dissemination is needed to play role in order to distribute and educate public in health care management and disease prevention. Since the knowledge dissemination in medical is important, there is a need to develop a knowledge based system that can emulate human intelligence to assist decision making process. Thereby, this study utilized hybrid artificial intelligence (AI) techniques to develop a Fuzzy Expert System for Diagnosing Heart Attack Disease (HAD). This system integrates fuzzy logic with expert system, which helps the medical practitioner and people to predict the risk and as well as diagnosing heart attack based on given symptom. The development of HAD is expected not only providing expert knowledge but potentially become one of learning resources to help citizens to develop awareness about heart-healthy lifestyle.

  3. Heart Attack Recovery FAQs

    Science.gov (United States)

    ... recommendations to make a full recovery. View an animation of a heart attack . Heart Attack Recovery Questions ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  4. Women's Heart Disease: Heart Attack Symptoms

    Science.gov (United States)

    ... of this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter ... most common heart attack symptom in men and women is chest pain or discomfort. However, women also ...

  5. Heart attack - discharge

    Science.gov (United States)

    ... and lifestyle Cholesterol - drug treatment Controlling your high blood pressure Deep vein thrombosis - discharge Dietary fats explained Fast food tips Heart attack - discharge Heart attack - what to ask your doctor Heart bypass ... pacemaker - discharge High blood pressure - what to ask your doctor How to read ...

  6. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  7. Pericarditis - after heart attack

    Science.gov (United States)

    ... include: A previous heart attack Open heart surgery Chest trauma A heart attack that has affected the thickness of your heart muscle Symptoms Symptoms include: Anxiety Chest pain from the swollen pericardium rubbing on the ...

  8. Heart Attack

    Science.gov (United States)

    ... family history of heart attack race – African Americans, Mexican Americans, Native Americans, and native Hawaiians are at ... Your doctor will prescribe the medicines that are right for you. If you have had a heart ...

  9. Heart Attack Symptoms in Women

    Science.gov (United States)

    ... fat, cholesterol and other substances (plaque). Watch an animation of a heart attack . Many women think the ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  10. Heart Attack

    Science.gov (United States)

    ... properly causes your body's blood sugar levels to rise, increasing your risk of heart attack. Metabolic syndrome. This occurs when you have obesity, high blood pressure and high blood sugar. Having metabolic ...

  11. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  12. Heart Attack Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for heart...

  13. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  14. Before Using Aspirin to Lower Your Risk of Heart Attack or Stroke, Here Is What You Should Know

    Science.gov (United States)

    ... Medicines Safe Daily Use of Aspirin Before Using Aspirin to Lower Your Risk of Heart Attack or ... care provider can determine whether regular use of aspirin will help to prevent a heart attack or ...

  15. Calcium Supplements: A Risk Factor for Heart Attack?

    Science.gov (United States)

    ... factor for heart attack? I've read that calcium supplements may increase the risk of heart attack. ... D. Some doctors think it's possible that taking calcium supplements may increase your risk of a heart ...

  16. Applying Magneto-rheology to Reduce Blood Viscosity and Suppress Turbulence to Prevent Heart Attacks

    Science.gov (United States)

    Tao, R.

    Heart attacks are the leading causes of death in USA. Research indicates one common thread, high blood viscosity, linking all cardiovascular diseases. Turbulence in blood circulation makes different regions of the vasculature vulnerable to development of atherosclerotic plaque. Turbulence is also responsible for systolic ejection murmurs and places heavier workload on heart, a possible trigger of heart attacks. Presently, neither medicine nor method is available to suppress turbulence. The only method to reduce the blood viscosity is to take medicine, such as aspirin. However, using medicine to reduce the blood viscosity does not help suppressing turbulence. In fact, the turbulence gets worse as the Reynolds number goes up with the viscosity reduction by the medicine. Here we report our new discovery: application of a strong magnetic field to blood along its flow direction, red blood cells are polarized in the magnetic field and aggregated into short chains along the flow direction. The blood viscosity becomes anisotropic: Along the flow direction the viscosity is significantly reduced, but in the directions perpendicular to the flow the viscosity is considerably increased. In this way, the blood flow becomes laminar, turbulence is suppressed, the blood circulation is greatly improved, and the risk for heart attacks is reduced. While these effects are not permanent, they last for about 24 hours after one magnetic therapy treatment.

  17. Can You Recognize a Heart Attack or Stroke? What To Do When Every Moment Counts

    Science.gov (United States)

    ... Special Issues Subscribe August 2014 Print this issue Can You Recognize a Heart Attack or Stroke? What ... could prevent many of these deaths. Fast action can also limit permanent damage to the body. Heart ...

  18. Efficacy of a Community-Based Physical Activity Program KM2H2 for Stroke and Heart Attack Prevention among Senior Hypertensive Patients: A Cluster Randomized Controlled Phase-II Trial.

    Directory of Open Access Journals (Sweden)

    Jie Gong

    Full Text Available To evaluate the efficacy of the program Keep Moving toward Healthy Heart and Healthy Brain (KM2H2 in encouraging physical activities for the prevention of heart attack and stroke among hypertensive patients enrolled in the Community-Based Hypertension Control Program (CBHCP.Cluster randomized controlled trial with three waves of longitudinal assessments at baseline, 3 and 6 months post intervention.Community-based and patient-centered self-care for behavioral intervention in urban settings of China.A total of 450 participants diagnosed with hypertension from 12 community health centers in Wuhan, China were recruited, and were randomly assigned by center to receive either KM2H2 plus standard CBHCP care (6 centers and 232 patients or the standard care only (6 centers and 218 patients.KM2H2 is a behavioral intervention guided by the Transtheoretical Model, the Model of Personalized Medicine and Social Capital Theory. It consists of six intervention sessions and two booster sessions engineered in a progressive manner. The purpose is to motivate and maintain physical activities for the prevention of heart attack and stroke.Heart attack and stroke (clinically diagnosed, primary outcome, blood pressure (measured, secondary outcome, and physical activity (self-report, tertiary outcome were assessed at the individual level during the baseline, 3- and 6-month post-intervention.Relative to the standard care, receiving KM2H2 was associated with significant reductions in the incidence of heart attack (3.60% vs. 7.03%, p < .05 and stroke (5.11% vs. 9.90%, p<0.05, and moderate reduction in blood pressure (-3.72 mmHg in DBP and -2.92 mmHg in DBP at 6-month post-intervention; and significant increases in physical activity at 3- (d = 0.53, 95% CI: 0.21, 0.85 and 6-month (d = 0.45, 95% CI: 0.04, 0.85 post-intervention, respectively.The program KM2H2 is efficacious to reduce the risk of heart attack and stroke among senior patients who are on anti

  19. Coronary heart disease risk in patients with stroke or transient ischemic attack and no known coronary heart disease: findings from the Stroke Prevention by Aggressive Reduction in Cholesterol Levels (SPARCL) trial

    DEFF Research Database (Denmark)

    Amarenco, Pierre; Goldstein, Larry B; Sillesen, Henrik

    2010-01-01

    Noncoronary forms of atherosclerosis (including transient ischemic attacks or stroke of carotid origin or >50% stenosis of the carotid artery) are associated with a 10-year vascular risk of >20% and are considered as a coronary heart disease (CHD) -risk equivalent from the standpoint of lipid...... management. The Stroke Prevention by Aggressive Reduction in Cholesterol Levels (SPARCL) trial included patients with stroke or transient ischemic attack and no known CHD regardless of the presence of carotid atherosclerosis. We evaluated the risk of developing clinically recognized CHD in SPARCL patients....

  20. Warning Signs of Heart Attack, Stroke and Cardiac Arrest

    Science.gov (United States)

    ... for Heart.org CPR & ECC for Heart.org Shop for Heart.org Causes for Heart.org Advocate ... SIGNS may include breaking out in a cold sweat, nausea or lightheadedness. Learn more about heart attack ...

  1. What Is a Heart Attack?

    Science.gov (United States)

    ... medical center. Support from family and friends also can help relieve stress and anxiety. Let your loved ones know how you feel and what they can do to help you. Risk of a Repeat Heart Attack Once ...

  2. Multi-constituent cardiovascular pills (MCCP)--challenges and promises of population-based prophylactic drug therapy for prevention of heart attack.

    Science.gov (United States)

    Jamieson, Michael J; Naghavi, Morteza

    2007-01-01

    Risk factors for atherosclerotic cardiovascular disease (CVD) are highly co-prevalent but poorly identified and treated. The Screening for Heart Attack Prevention and Education (SHAPE) Task Force from the Association for Eradication of Heart Attack (AEHA) has recently proposed a new strategy that recommends screening for subclinical atherosclerosis and implementing aggressive treatment of "vulnerable patients". The Task Force has also envisioned future developments that may shift mass screening strategies to mass prophylactic therapy. The "Polypill" concept, introduced by Wald and Law suggests a combination of statin, low-dose antihypertensives, aspirin and folic acid, in a single pill, taken prophylactically by high risk population can cut CVD event rates by as much as 80%. In this communication, we review the challenges and promises of such a strategy. "Polypill" is but one of an astronomical number of possible multiconstituent pills (MCCP). Attractive as the MCCP concept is, it lacks evidence from randomized controlled trials, and begs numerous questions about the credibility of the concept, the design and synthesis of such complex pills, pharmacokinetics, pharmacodynamics, bioequivalence, "class" vs. unique properties, interactions, evidence of clinical efficacy and safety, regulatory approval, post-marketing surveillance, prescription vs. over-the-counter use, responsibility for initiating and monitoring therapy, patient education, counterfeiting and importation, reimbursement, advertisement, patent protection, commercial viability, etc. If these issues are favorably addressed, MCCP stand to dramatically change the manner in which CVD is prevented particularly in developing societies. Notwithstanding, assuming low commercial interests, realizing the promises of MCCP will demand serious attention from national public health policymakers. The clinical and regulatory implications of population-based secondary prevention (which rely on a different evidence base

  3. Mortality from heart attack in Belgrade population during the period 1990-2004

    Directory of Open Access Journals (Sweden)

    Ratkov Isidora

    2008-01-01

    Full Text Available INTRODUCTION In most countries, cardiovascular diseases are the leading disorders, with ischemic heart diseases being the leading cause of death. According to WHO data, every year about 17 million people die of cardiovascular diseases, which is 30% of all deaths. Ischemic heart diseases contribute from one-third to one-half of all deaths due to cardiovascular diseases. Three point eight million men and 3.4 million women in the world die every year from ischemic heart diseases, and in Europe about 2 million. The highest mortality rate from ischemic heart diseases occurs in India, China and Russia. OBJECTIVE The aim of this descriptive epidemiological study was to determine heart attack mortality in Belgrade population during the period 1990-2004. METHOD In the study, we conducted investigation of Belgrade population during the period 1990-2004. Mortality data were obtained from the city institution for statistics. The mortality rates were calculated based on the total Belgrade population obtained from the mean values for the last two register years (1991 and 2002. The mortality rates were standardized using the direct method of standardization according to the world (Segi standard population. RESULTS In the Belgrade population during the period 1990-2004, the participation of mortality rate due to heart attack among deaths from cardiovascular diseases was 17% in males and 10% in females. In Belgrade male population, mean standardized mortality rates (per 100,000 habitants were 50.5 for heart attack, 8.3 for chronic ischemic heart diseases and 4.6 for angina pectoris, while in females the rates were 30.8, 6.7 and 4.2, respectively. Mortality from ischemic heart diseases and from heart attack was higher in males than in females. During the studied 15-year period, on average 755 males and 483 females died due to heart attack every year. Mean standardized mortality rates per 100,000 habitants were 50.0 in male and 31.1 in female population. Males

  4. Knowledge of Signs and Symptoms of Heart Attack and Stroke among Singapore Residents

    Directory of Open Access Journals (Sweden)

    Joy Li Juan Quah

    2014-01-01

    Full Text Available Aim. To determine the level of knowledge of signs and symptoms of heart attack and stroke in Singapore resident population, in comparison to the global community. Methods. A population based, random sample of 7,840 household addresses was selected from a validated national sampling frame. Each participant was asked eight questions on signs and symptoms of heart attack and 10 questions on stroke. Results. The response rate was 65.2% with 4,192 respondents. The level of knowledge for preselected, common signs and symptoms of heart attack and stroke was 57.8% and 57.1%, respectively. The respondents scored a mean of 5.0 (SD 2.4 out of 8 for heart attack, while they scored a mean of 6.8 (SD 2.9 out of 10 for stroke. Respondents who were ≥50 years, with lower educational level, and unemployed/retired had the least knowledge about both conditions. The level of knowledge of signs and symptoms of heart attack and stroke in Singapore is comparable to USA and Canada. Conclusion. We found a comparable knowledge of stroke and heart attack signs and symptoms in the community to countries within the same economic, educational, and healthcare strata. However older persons, those with lower educational level and those who are unemployed/retired, require more public health education efforts.

  5. Dysfunction of Right Heart in Attack Period of Bronchial Asthma in Children

    Directory of Open Access Journals (Sweden)

    V.А. Kondratiev

    2015-11-01

    Full Text Available There were performed Doppler echocardiography investigations of functional state of the right heart in 42 children aged 5–17 years old in attack period of bronchial asthma of moderate to severe degree. Changes of intra-cardiac hemodynamics of the right heart in children in attack period of bronchial asthma were characterized by disturbance of systolic and diastolic function of the right ventricle and right atrium. Combined systolic-diastolic variant of the right ventricle dysfunction was typical for attack period of bronchial asthma in children and developed in 95.5 % of cases. Elevation of pressure in pulmonary artery was typical and significantly more often occurred in severe asthma attack, herewith pulmonary hypertension of the second degree predominated.

  6. US State-level income inequality and risks of heart attack and coronary risk behaviors: longitudinal findings.

    Science.gov (United States)

    Pabayo, Roman; Kawachi, Ichiro; Gilman, Stephen E

    2015-07-01

    To examine prospectively the association between US state income inequality and incidence of heart attack. We used data from the National Epidemiologic Survey on Alcohol and Related Conditions (n = 34,445). Respondents completed interviews at baseline (2001-2002) and follow-up (2004-2005). Weighted multilevel modeling was used to determine if US state-level income inequality (measured by the Gini coefficient) at baseline was a predictor of heart attack during follow-up, controlling for individual-level and state-level covariates. In comparison to residents of US states in the lowest quartile of income inequality, those living in the second [Adjusted Odds Ratio (AOR) = 1.71, 95 % CI 1.16-2.53)], third (AOR = 1.81, 95 % CI 1.28-2.57), and fourth (AOR = 2.04, 95 % CI 1.26-3.29) quartiles were more likely to have a heart attack. Similar findings were obtained when we excluded those who had a heart attack prior to baseline. This study is one of the first to empirically show the longitudinal relationship between income inequality and coronary heart disease. Living in a state with higher income inequality increases the risk for heart attack among US adults.

  7. Gender differences in the link between childhood socioeconomic conditions and heart attack risk in adulthood.

    Science.gov (United States)

    Hamil-Luker, Jenifer; O'Rand, Angela M

    2007-02-01

    A growing body of evidence shows that childhood socioeconomic status (SES) is predictive of disease risk in later life, with those from the most disadvantaged backgrounds more likely to experience poor adult-health outcomes. Most of these studies, however are based on middle-aged male populations and pay insufficient attention to the pathways between childhood risks and specific adult disorders. This article examines gender differences in the link between childhood SES and heart attack risk trajectories and the mechanisms by which early environments affect future disease risk. By using methods that model both latent and path-specific influences, we identify heterogeneity in early life conditions and human, social, and health capital in adulthood that contribute to diverse heart attack risk trajectories between and among men and women as they age into their 60s and 70s. We find that key risk factors for heart attack operate differently for men and women. For men, childhood SES does not differentiate those at low, increasing, and high risk for heart attack. In contrast, women who grew up without a father and/or under adverse economic conditions are the most likely to experience elevated risk for heart attack, even after we adjust for the unequal distribution of working and living conditions, social relationships, access to health care, and adult lifestyle behaviors that influence health outcomes.

  8. Higher coronary heart disease and heart attack morbidity in Appalachian coal mining regions.

    Science.gov (United States)

    Hendryx, Michael; Zullig, Keith J

    2009-11-01

    This study analyzes the U.S. 2006 Behavioral Risk Factor Surveillance System survey data (N=235,783) to test whether self-reported cardiovascular disease rates are higher in Appalachian coal mining counties compared to other counties after control for other risks. Dependent variables include self-reported measures of ever (1) being diagnosed with cardiovascular disease (CVD) or with a specific form of CVD including (2) stroke, (3) heart attack, or (4) angina or coronary heart disease (CHD). Independent variables included coal mining, smoking, BMI, drinking, physician supply, diabetes co-morbidity, age, race/ethnicity, education, income, and others. SUDAAN Multilog models were estimated, and odds ratios tested for coal mining effects. After control for covariates, people in Appalachian coal mining areas reported significantly higher risk of CVD (OR=1.22, 95% CI=1.14-1.30), angina or CHD (OR=1.29, 95% CI=1.19-1.39) and heart attack (OR=1.19, 95% CI=1.10-1.30). Effects were present for both men and women. Cardiovascular diseases have been linked to both air and water contamination in ways consistent with toxicants found in coal and coal processing. Future research is indicated to assess air and water quality in coal mining communities in Appalachia, with corresponding environmental programs and standards established as indicated.

  9. Ventilatory control of heart rate during inhalation of 5% CO2 and types of panic attacks.

    Science.gov (United States)

    Ley, R

    1991-09-01

    Differences in the magnitude of increases in heart rate during prolonged inhalation of 5% CO2 range from a mean of 25 b/min for a group of eight panic-disorder patients who panicked (Woods, Charney, Goodman, & Heninger, 1988. Archives of General Psychiatry, 45, 43-52) to zero b/min for 16 patients, eight of whom panicked (Craske & Barlow, 1990. Journal of Abnormal Psychology, 99, 302-307). What accounts for this disparity? The present paper describes how heart rate can be increased by means of voluntary overbreathing during prolonged inhalation of 5% CO2 in air. This suggests that differences in the degree of overbreathing may explain differences in the magnitude of increases in heart rate during inhalation of 5% CO2. An explanation is also offered for the curious finding that some patients experience "panic attacks" with zero increase in heart rate. Evidence suggests that this is likely to happen in cognitively based panic attacks, in contrast to hyperventilatory attacks or anticipatory attacks.

  10. Quick Reference: Cyber Attacks Awareness and Prevention Method for Home Users

    OpenAIRE

    Haydar Teymourlouei

    2015-01-01

    It is important to take security measures to protect your computer information, reduce identify theft, and prevent from malicious cyber-attacks. With cyber-attacks on the continuous rise, people need to understand and learn ways to prevent from these attacks. Cyber-attack is an important factor to be considered if one is to be able to protect oneself from malicious attacks. Without proper security measures, most computer technology would hinder home users more than such t...

  11. Higher coronary heart disease and heart attack morbidity in Appalachian coal mining regions

    Energy Technology Data Exchange (ETDEWEB)

    Hendryx, M.; Zullig, K.J. [West Virginia University, Morgantown, WV (United States). Dept. of Community Medicine

    2009-11-15

    This study analyzes the U.S. 2006 Behavioral Risk Factor Surveillance System survey data (N = 235,783) to test whether self-reported cardiovascular disease rates are higher in Appalachian coal mining counties compared to other counties after control for other risks. Dependent variables include self-reported measures of ever (1) being diagnosed with cardiovascular disease (CVD) or with a specific form of CVD including (2) stroke, (3) heart attack, or (4) angina or coronary heart disease (CHD). Independent variables included coal mining, smoking, BMI, drinking, physician supply, diabetes co-morbidity, age, race/ethnicity, education, income, and others. SUDAAN Multilog models were estimated, and odds ratios tested for coal mining effects. After control for covariates, people in Appalachian coal mining areas reported significantly higher risk of CVD (OR = 1.22, 95% CI = 1.14-1.30), angina or CHO (OR = 1.29, 95% C1 = 1.19-1.39) and heart attack (OR = 1.19, 95% C1 = 1.10-1.30). Effects were present for both men and women. Cardiovascular diseases have been linked to both air and water contamination in ways consistent with toxicants found in coal and coal processing. Future research is indicated to assess air and water quality in coal mining communities in Appalachia, with corresponding environmental programs and standards established as indicated.

  12. Risks for Heart Disease & Stroke

    Science.gov (United States)

    ... Prevent Risks for Heart Disease & Stroke Risks for Heart Disease & Stroke About 1.5 million heart attacks and ... can’t change some of your risks for heart disease and stroke, but you can manage many of ...

  13. Knowledge of heart attack and stroke symptomology: a cross-sectional comparison of rural and non-rural US adults

    Directory of Open Access Journals (Sweden)

    Swanoski Michael T

    2012-06-01

    Full Text Available Abstract Background Understanding the signs and symptoms of heart attacks and strokes are important not only in saving lives, but also in preserving quality of life. Findings from recent research have yielded that the prevalence of cardiovascular disease risk factors are higher in rural populations, suggesting that adults living in rural locales may be at higher risk for heart attack and/or stroke. Knowledge of heart attack and stroke symptomology as well as calling 911 for a suspected heart attack or stroke are essential first steps in seeking care. This study sought to examine the knowledge of heart attack and stroke symptoms among rural adults in comparison to non-rural adults living in the U.S. Methods Using multivariate techniques, a cross-sectional analysis of an amalgamated multi-year Behavioral Risk Factor Surveillance Survey (BRFSS database was performed. The dependent variable for this analysis was low heart attack and stroke knowledge score. The covariates for the analysis were: age, sex, race/ethnicity, annual household income, attained education, health insurance status, having a health care provider (HCP, timing of last routine medical check-up, medical care deferment because of cost, self-defined health status and geographic locale. Results The weighted n for this study overall was 103,262,115 U.S. adults > =18 years of age. Approximately 22.0% of these respondents were U.S. adults living in rural locales. Logistic regression analysis revealed that those U.S. adults who had low composite heart attack and stroke knowledge scores were more likely to be rural (OR = 1.218 95%CI 1.216-1.219 rather than non-rural residents. Furthermore, those with low scores were more likely to be: male (OR = 1.353 95%CI 1.352-1.354, >65 years of age (OR = 1.369 95%CI 1.368-1.371, African American (OR = 1.892 95%CI 1.889-1.894, not educated beyond high school (OR = 1.400 955CI 1.399-1.402, uninsured (OR = 1.308 95%CI 1

  14. Panic Attack or Heart Attack?

    Science.gov (United States)

    ... When in doubt about symptoms, seek care without delay to rule out heart disease. Heart disease affects your heart's ... which cause you concern, see your doctor without delay and ask for testing to rule out heart disease. 1 Gadolinium side effects could ...

  15. Comparing Asian American Women's Knowledge, Self-Efficacy, and Perceived Risk of Heart Attack to Other Racial and Ethnic Groups: The mPED Trial.

    Science.gov (United States)

    Fukuoka, Yoshimi; Lisha, Nadra E; Vittinghoff, Eric

    2017-09-01

    The aim of the study was to compare knowledge and awareness of heart attacks/heart disease and perceived risk for future heart attack in Asian/Pacific Islander women, compared to other racial and ethnic groups. In this cross-sectional study, 318 women enrolled in a mobile phone-based physical activity education trial were analyzed. Heart attack knowledge, self-efficacy for recognizing and responding to heart attack symptoms, and perceived risk for a future heart attack were measured. Analyses were conducted using logistic, proportional odds, and linear regression models, depending on the outcome and adjusting for age. Pairwise differences between Asian/Pacific Islanders and the other four groups were assessed using a Bonferroni correction (p Asian/Pacific Islander women had significantly lower total scores for knowledge of heart attack and self-efficacy for heart attack recognition and care seeking behavior compared to the Caucasian women (p = 0.001 and p = 0.002, respectively). However, perceived risk did not differ among the groups. Forty-six percent of the Asian American women, compared to 25% of Caucasian women, falsely believed "breast cancer is the number one cause of death for women (p = 0.002)." In addition, Asian/Pacific Islander women were less likely to report "arm pain, numbness, tingling, or radiating" as one of the heart attack symptoms compared to the Caucasian and the multiracial group (34%, 63% [p Asian/Pacific Islander women and Caucasian women.

  16. Treatment-resistant hypertension and the incidence of cardiovascular disease and end-stage renal disease: results from the Antihypertensive and Lipid-Lowering Treatment to Prevent Heart Attack Trial (ALLHAT).

    Science.gov (United States)

    Muntner, Paul; Davis, Barry R; Cushman, William C; Bangalore, Sripal; Calhoun, David A; Pressel, Sara L; Black, Henry R; Kostis, John B; Probstfield, Jeffrey L; Whelton, Paul K; Rahman, Mahboob

    2014-11-01

    Apparent treatment-resistant hypertension (aTRH) is defined as uncontrolled hypertension despite the use of ≥3 antihypertensive medication classes or controlled hypertension while treated with ≥4 antihypertensive medication classes. Although a high prevalence of aTRH has been reported, few data are available on its association with cardiovascular and renal outcomes. We analyzed data on 14 684 Antihypertensive and Lipid-Lowering Treatment to Prevent Heart Attack Trial (ALLHAT) participants to determine the association between aTRH (n=1870) with coronary heart disease, stroke, all-cause mortality, heart failure, peripheral artery disease, and end-stage renal disease. We defined aTRH as blood pressure not at goal (systolic/diastolic blood pressure ≥140/90 mm Hg) while taking ≥3 classes of antihypertensive medication or taking ≥4 classes of antihypertensive medication with blood pressure at goal during the year 2 ALLHAT study visit (1996-2000). Use of a diuretic was not required to meet the definition of aTRH. Follow-up occurred through 2002. The multivariable adjusted hazard ratios (95% confidence intervals) comparing participants with versus without aTRH were as follows: coronary heart disease (1.44 [1.18-1.76]), stroke (1.57 [1.18-2.08]), all-cause mortality (1.30 [1.11-1.52]), heart failure (1.88 [1.52-2.34]), peripheral artery disease (1.23 [0.85-1.79]), and end-stage renal disease (1.95 [1.11-3.41]). aTRH was also associated with the pooled outcomes of combined coronary heart disease (hazard ratio, 1.47; 95% confidence interval, 1.26-1.71) and combined cardiovascular disease (hazard ratio, 1.46; 95% confidence interval, 1.29-1.64). These results demonstrate that aTRH increases the risk for cardiovascular disease and end-stage renal disease. Studies are needed to identify approaches to prevent aTRH and reduce risk for adverse outcomes among individuals with aTRH. © 2014 American Heart Association, Inc.

  17. The association of a heart attack or stroke with depressive symptoms stratified by the presence of a close social contact: findings from the National Health and Aging Trends Study Cohort.

    Science.gov (United States)

    Simning, Adam; Seplaki, Christopher L; Conwell, Yeates

    2018-01-01

    The objective of the study is to examine whether the risk of having clinically significant depressive symptoms following a heart attack or stroke varies by the presence of a close social contact. The National Health and Aging Trends Study is a nationally representative longitudinal survey of US Medicare beneficiaries aged 65 and older initiated in 2011. A total of 5643 older adults had information on social contacts at baseline and depressive symptoms at the 1-year follow-up interview. The two-item Patient Health Questionnaire identified clinically significant depressive symptoms. Interview questions examined social contacts and the presence of self-reported heart attack or stroke during the year of follow-up. A total of 297 older adults reported experiencing a heart attack and/or stroke between their baseline and follow-up interviews. In regression analyses accounting for sociodemographics, baseline depressive symptoms, medical comorbidity, and activities of daily living impairment, older adults with no close social contacts had increased odds of depressive symptoms at follow-up after experiencing a heart attack or stroke, while those with close social contacts had increased odds of depressive symptoms at follow-up after experiencing a stroke, but not a heart attack. Older adults have increased odds of having depressive symptoms following a self-reported stroke, but only those with no close social contacts had increased odds of depressive symptoms following a heart attack. Social networks may play a role in the mechanisms underlying depression among older adults experiencing certain acute health events. Future work exploring the potential causal relationships suggested here, if confirmed, could inform interventions to alleviate or prevent depression among at risk older adults. Copyright © 2017 John Wiley & Sons, Ltd. Copyright © 2017 John Wiley & Sons, Ltd.

  18. An avatar based education application to improve patients' knowledge of and response to heart attack symptoms: a pragmatic randomized controlled trial protocol.

    Science.gov (United States)

    Tongpeth, Jintana; Du, Huiyun; Clark, Robyn

    2018-06-19

    To evaluate the effectiveness of an interactive, avatar based education application to improve knowledge of and response to heart attack symptoms in people who are at risk of a heart attack. Poor knowledge of heart attack symptoms is recognised as a significant barrier to timely medical treatment. Numerous studies have demonstrated that technology can assist in patient education to improve knowledge and self-care. A single-center, non-blinded, two parallel groups, pragmatic randomized controlled trial. Seventy patients will be recruited from the coronary care unit of a public hospital. Eligible participants will be randomised to either the usual care or the intervention group (usual care plus avatar-based heart attack education app). The primary outcome of this study is knowledge. Secondary outcomes include response to heart attack symptoms, health service use and satisfaction. Study participants will be followed-up for six months. This study will evaluate the avatar based education app as a method to deliver vital information to patients. Participants' knowledge of and response to heart attack symptoms, as well as their health service use, will be assessed to evaluate the intervention effectiveness. This article is protected by copyright. All rights reserved. This article is protected by copyright. All rights reserved.

  19. Aspirin for Reducing Your Risk of Heart Attack and Stroke: Know the Facts

    Science.gov (United States)

    ... the-Counter Medicines Safe Daily Use of Aspirin Aspirin for Reducing Your Risk of Heart Attack and ... any pharmacy, grocery or convenience store and buy aspirin without a prescription. The Drug Facts label on ...

  20. Rehab for the Heart (A Cup of Health with CDC)

    Centers for Disease Control (CDC) Podcasts

    Each year, nearly 790,000 adults in the U.S. suffer a heart attack. For a third of these, it's not their first. Cardiac rehabilitation could have prevented many of these. In this podcast, Dr. Fleetwood Loustalot discusses the importance of getting cardiac rehab after a heart attack.

  1. Healthy Heart Collaboration and Developed Toolkit

    Science.gov (United States)

    Impact: EPA is raising awareness of heart disease and its link to air pollution and other environmental factors as a partner in Million Hearts, a national initiative to prevent heart attacks and strokes. The talk will provide an up to date review of the evidence linking air poll...

  2. A self-confirming engine for preventing man-in-the-middle attack

    OpenAIRE

    Kanamori, Masataka; Kobayashi, Takashi; Yamaguchi, Suguru

    2004-01-01

    In this paper, we focus on how to correct address mapping violation, in which an attacker rewrites the address mapping table of a victim to perform a Man-in-the-Middle (MITM) attack. We propose a technique for preventing MITM attacks in which a malicious user intercepts and possibly alters the data transmitted between two hosts. MITM attack is hard for legitimate users to notice during their normal communication, because each user believes they are communicating directly. Address mapping viol...

  3. Cancer and heart attack survivors’ expectations of employment status: results from the English Longitudinal Study of Ageing

    Directory of Open Access Journals (Sweden)

    Saskia F. A. Duijts

    2017-08-01

    Full Text Available Abstract Background Sociodemographic, health- and work-related factors have been found to influence return to work in cancer survivors. It is feasible though that behavioural factors, such as expectation of being at work, could also affect work-related outcomes. Therefore, the effect of earlier identified factors and expectation of being at work on future employment status in cancer survivors was explored. To assess the degree to which these factors specifically concern cancer survivors, a comparison with heart attack survivors was made. Methods Data from the English Longitudinal Study of Ageing were used. Cancer and heart attack survivors of working age in the UK were included and followed up for 2 years. Baseline characteristics of both cancer and heart attack survivors were compared regarding employment status. Univariate and multivariate regression analyses were performed in survivors at work, and the interaction between independent variables and diagnose group was assessed. Results In cancer survivors at work (N = 159, alcohol consumption, participating in moderate or vigorous sport activities, general health and participation were univariate associated with employment status at two-year follow-up. Only fair general health (compared to very good general health remained statistically significant in the multivariate model (OR 0.31; 95% CI 0.13–0.76; p = 0.010. In heart attack survivors at work (N = 78, gender, general health and expectation of being at work were univariate associated with employment status at follow-up. Female gender (OR 0.03; 95% CI 0.00–0.57; p = 0.018 and high expectation of being at work (OR 10.68; 95% CI 1.23–93.92; p = 0.033 remained significant in the multivariate model. The influence of gender (p = 0.066 and general health (p = 0.020 regarding employment status was found to differ significantly between cancer and heart attack survivors. Conclusions When predicting future employment status in cancer

  4. Cancer and heart attack survivors' expectations of employment status: results from the English Longitudinal Study of Ageing.

    Science.gov (United States)

    Duijts, Saskia F A; van der Beek, Allard J; Bleiker, Eveline M A; Smith, Lee; Wardle, Jane

    2017-08-07

    Sociodemographic, health- and work-related factors have been found to influence return to work in cancer survivors. It is feasible though that behavioural factors, such as expectation of being at work, could also affect work-related outcomes. Therefore, the effect of earlier identified factors and expectation of being at work on future employment status in cancer survivors was explored. To assess the degree to which these factors specifically concern cancer survivors, a comparison with heart attack survivors was made. Data from the English Longitudinal Study of Ageing were used. Cancer and heart attack survivors of working age in the UK were included and followed up for 2 years. Baseline characteristics of both cancer and heart attack survivors were compared regarding employment status. Univariate and multivariate regression analyses were performed in survivors at work, and the interaction between independent variables and diagnose group was assessed. In cancer survivors at work (N = 159), alcohol consumption, participating in moderate or vigorous sport activities, general health and participation were univariate associated with employment status at two-year follow-up. Only fair general health (compared to very good general health) remained statistically significant in the multivariate model (OR 0.31; 95% CI 0.13-0.76; p = 0.010). In heart attack survivors at work (N = 78), gender, general health and expectation of being at work were univariate associated with employment status at follow-up. Female gender (OR 0.03; 95% CI 0.00-0.57; p = 0.018) and high expectation of being at work (OR 10.68; 95% CI 1.23-93.92; p = 0.033) remained significant in the multivariate model. The influence of gender (p = 0.066) and general health (p = 0.020) regarding employment status was found to differ significantly between cancer and heart attack survivors. When predicting future employment status in cancer survivors in the UK, general health is the most relevant factor

  5. Comprehensive cardiac rehabilitation for secondary prevention after transient ischemic attack or mild stroke: I: feasibility and risk factors.

    Science.gov (United States)

    Prior, Peter L; Hachinski, Vladimir; Unsworth, Karen; Chan, Richard; Mytka, Sharon; O'Callaghan, Christina; Suskin, Neville

    2011-11-01

    Comprehensive cardiac rehabilitation (CCR), which integrates structured lifestyle interventions and medications, reduces morbidity and mortality among cardiac patients. CCR has not typically been used with cerebrovascular populations, despite important commonalities with heart patients. We tested feasibility and effectiveness of 6-month outpatient CCR for secondary prevention after transient ischemic attack or mild, nondisabling stroke. This article presents risk factors. A future article will discuss psychological outcomes. Consecutive consenting subjects having sustained a transient ischemic attack or mild, nondisabling stroke within the previous 12 months (mean, 11.5 weeks; event-to-CCR entry) with ≥1 vascular risk factor, were recruited from a stroke prevention clinic providing usual care. We measured 6-month CCR outcomes following a prospective cohort design. Of 110 subjects recruited from January 2005 to April 2006, 100 subjects (mean age, 64.9 years; 46 women) entered and 80 subjects completed CCR. We obtained favorable, significant intake-to-exit changes in: aerobic capacity (+31.4%; Pstroke, offering a promising model for vascular protection across chronic disease entities. We know of no similar previous investigation, and are now conducting a randomized trial.

  6. A SURVEY ON DELAY AND NEIGHBOR NODE MONITORING BASED WORMHOLE ATTACK PREVENTION AND DETECTION

    Directory of Open Access Journals (Sweden)

    Sudhir T Bagade

    2016-12-01

    Full Text Available In Mobile Ad-hoc Networks (MANET, network layer attacks, for example wormhole attacks, disrupt the network routing operations and can be used for data theft. Wormhole attacks are of two types: hidden and exposed wormhole. There are various mechanisms in literature which are used to prevent and detect wormhole attacks. In this paper, we survey wormhole prevention and detection techniques and present our critical observations for each. These techniques are based on cryptographic mechanisms, monitoring of packet transmission delay and control packet forwarding behavior of neighbor nodes. We compare the techniques using the following criteria- extra resources needed applicability to different network topologies and routing protocols, prevention/detection capability, etc. We conclude the paper with potential research directions.

  7. Heart Lesion After the First Attack of the Rheumatic Fever 22 Years Experience in Single Centre

    Science.gov (United States)

    Bejiqi, Ramush A.; Retkoceri, Ragip; Zeka, Naim; Bejiqi, Hana; Retkoceri, Arber

    2015-01-01

    Background: Acute rheumatic fever and its sequels, rheumatic heart diseases, remain major unsolved preventable health problems in Kosovo population, particularly among the disadvantages indigenous Albanian and Egyptians people. In Kosovo, despite of performing secondary prophylaxis with benzathine penicillin, acute rheumatic fever hospitalization rates have remained essentially unchanged for the last 20 years. The role of echocardiography in the diagnosis of acute rheumatic carditis was established over the last 20 years. Aims: In this study we aimed to determine the prevalence of rheumatic heart disease in children from Kosovo population with first attack of acute rheumatic fever. Also, we presented that echocardiography examination detects a greater prevalence of rheumatic heart disease than other diagnostic procedures. We aimed to compare the sensitivity and specificity of cardiac auscultation, ECG record, lab analysis to echocardiography and to determine the feasibility of specific age in this setting. Methods: To optimize accurate diagnosis of rheumatic fever and rheumatic heart disease, we utilized two group models. In the first group of 388 children, hospitalized and treated before 1999, diagnosis of rheumatic fever was decided basing on the clinical and laboratory findings whereas in second group (221 children treated from1999 to 2010) clinical and lab diagnosis were amplified also on the detection by echocardiography. Conclusion: In second group, using echocardiography as a method of diagnosis and assessment children with rheumatic fever, we found high rates of undetected rheumatic heart disease in this high-risk group population. Echocardiographic examination of children with rheumatic fever for rheumatic heart disease may over diagnose rheumatic heart disease unless congenital mitral valve anomalies and physiological regurgitation are excluded. PMID:25870479

  8. ShadowNet: An Active Defense Infrastructure for Insider Cyber Attack Prevention

    Energy Technology Data Exchange (ETDEWEB)

    Cui, Xiaohui [ORNL; Beaver, Justin M [ORNL; Treadwell, Jim N [ORNL

    2012-01-01

    The ShadowNet infrastructure for insider cyber attack prevention is comprised of a tiered server system that is able to dynamically redirect dangerous/suspicious network traffic away from production servers that provide web, ftp, database and other vital services to cloned virtual machines in a quarantined environment. This is done transparently from the point of view of both the attacker and normal users. Existing connections, such as SSH sessions, are not interrupted. Any malicious activity performed by the attacker on a quarantined server is not reflected on the production server. The attacker is provided services from the quarantined server, which creates the impression that the attacks performed are successful. The activities of the attacker on the quarantined system are able to be recorded much like a honeypot system for forensic analysis.

  9. Rehab for the Heart (A Cup of Health with CDC)

    Centers for Disease Control (CDC) Podcasts

    2017-08-24

    Each year, nearly 790,000 adults in the U.S. suffer a heart attack. For a third of these, it’s not their first. Cardiac rehabilitation could have prevented many of these. In this podcast, Dr. Fleetwood Loustalot discusses the importance of getting cardiac rehab after a heart attack.  Created: 8/24/2017 by MMWR.   Date Released: 8/24/2017.

  10. Heart Disease Prevention: Does Oral Health Matter?

    Science.gov (United States)

    ... Will taking care of my teeth help prevent heart disease? Answers from Thomas J. Salinas, D.D.S. Taking ... teeth isn't a proven way to prevent heart disease. While there appears to be some connection between ...

  11. Heart Age PSA (:60)

    Centers for Disease Control (CDC) Podcasts

    2015-09-01

    This 60 second public service announcement is based on the September 2015 CDC Vital Signs report. Your heart age is the age of your heart and blood vessels as a result of your risk factors for heart attack and stroke. If you smoke or have high blood pressure, your heart age will be much higher than your actual age. Learn what you can do to lower your heart age and keep it low.  Created: 9/1/2015 by National Center for Chronic Disease Prevention and Health Promotion (NCCDPHP).   Date Released: 9/1/2015.

  12. CDC Vital Signs-Heart Age

    Centers for Disease Control (CDC) Podcasts

    2015-09-01

    This podcast is based on the September 2015 CDC Vital Signs report. Your heart age is the age of your heart and blood vessels as a result of your risk factors for heart attack and stroke. If you smoke or have high blood pressure, your heart age will be much higher than your actual age. Learn what you can do to lower your heart age and keep it low.  Created: 9/1/2015 by National Center for Chronic Disease Prevention and Health Promotion (NCCDPHP).   Date Released: 9/1/2015.

  13. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. ...

  14. Understanding public confidence in government to prevent terrorist attacks.

    Energy Technology Data Exchange (ETDEWEB)

    Baldwin, T. E.; Ramaprasad, A,; Samsa, M. E.; Decision and Information Sciences; Univ. of Illinois at Chicago

    2008-04-02

    A primary goal of terrorism is to instill a sense of fear and vulnerability in a population and to erode its confidence in government and law enforcement agencies to protect citizens against future attacks. In recognition of its importance, the Department of Homeland Security includes public confidence as one of the principal metrics used to assess the consequences of terrorist attacks. Hence, a detailed understanding of the variations in public confidence among individuals, terrorist event types, and as a function of time is critical to developing this metric. In this exploratory study, a questionnaire was designed, tested, and administered to small groups of individuals to measure public confidence in the ability of federal, state, and local governments and their public safety agencies to prevent acts of terrorism. Data was collected from three groups before and after they watched mock television news broadcasts portraying a smallpox attack, a series of suicide bomber attacks, a refinery explosion attack, and cyber intrusions on financial institutions, resulting in identity theft. Our findings are: (a) although the aggregate confidence level is low, there are optimists and pessimists; (b) the subjects are discriminating in interpreting the nature of a terrorist attack, the time horizon, and its impact; (c) confidence recovery after a terrorist event has an incubation period; and (d) the patterns of recovery of confidence of the optimists and the pessimists are different. These findings can affect the strategy and policies to manage public confidence after a terrorist event.

  15. Estimating Longitudinal Risks and Benefits From Cardiovascular Preventive Therapies Among Medicare Patients: The Million Hearts Longitudinal ASCVD Risk Assessment Tool: A Special Report From the American Heart Association and American College of Cardiology.

    Science.gov (United States)

    Lloyd-Jones, Donald M; Huffman, Mark D; Karmali, Kunal N; Sanghavi, Darshak M; Wright, Janet S; Pelser, Colleen; Gulati, Martha; Masoudi, Frederick A; Goff, David C

    2017-03-28

    The Million Hearts Initiative has a goal of preventing 1 million heart attacks and strokes-the leading causes of mortality-through several public health and healthcare strategies by 2017. The American Heart Association and American College of Cardiology support the program. The Cardiovascular Risk Reduction Model was developed by Million Hearts and the Center for Medicare & Medicaid Services as a strategy to assess a value-based payment approach toward reduction in 10-year predicted risk of atherosclerotic cardiovascular disease (ASCVD) by implementing cardiovascular preventive strategies to manage the "ABCS" (aspirin therapy in appropriate patients, blood pressure control, cholesterol management, and smoking cessation). The purpose of this special report is to describe the development and intended use of the Million Hearts Longitudinal ASCVD Risk Assessment Tool. The Million Hearts Tool reinforces and builds on the "2013 ACC/AHA Guideline on the Assessment of Cardiovascular Risk" by allowing clinicians to estimate baseline and updated 10-year ASCVD risk estimates for primary prevention patients adhering to the appropriate ABCS over time, alone or in combination. The tool provides updated risk estimates based on evidence from high-quality systematic reviews and meta-analyses of the ABCS therapies. This novel approach to personalized estimation of benefits from risk-reducing therapies in primary prevention may help target therapies to those in whom they will provide the greatest benefit, and serves as the basis for a Center for Medicare & Medicaid Services program designed to evaluate the Million Hearts Cardiovascular Risk Reduction Model. Copyright © 2017 American Heart Association, Inc., and the American College of Cardiology Foundation. Published by Elsevier Inc. All rights reserved.

  16. Shilling Attack Prevention for Recommender Systems Using Social-based Clustering

    KAUST Repository

    Lee, Tak

    2011-06-06

    A Recommender System (RS) is a system that utilizes user and item information to predict the feeling of users towards unfamiliar items. Recommender Systems have become popular tools for online stores due to their usefulness in confidently recommending items to users. A popular algorithm for recommender system is Collaborative Filtering (CF). CF uses other users\\' profiles to predict whether a user is interested in a particular object. This system, however, is vulnerable to malicious users seeking to promote items by manipulating rating predictions with fake user profiles. Profiles with behaviors similar to "victim" users alter the prediction of a Recommender System. Manipulating rating predictions through injected profiles is referred to as a shilling attack. It is important to develop shilling attack prevention frameworks for to protect the trustworthiness of Recommender Systems. In this thesis, we will demonstrate a new methodology that utilizes social information to prevent malicious users from manipulating the prediction system. The key element in our new methodology rests upon the concept of trust among real users, an element we claim absent among malicious profiles. In order to use trust information for shilling attack prevention, we first develop a weighting system which makes the system rely more on trustworthy users when making predictions. We then use this trust information to cluster out untrustworthy users to improve rating robustness. The robustness of the new and classic systems is then evaluated with data from a public commercial consumer RS, Epinions.com. Several complexity reduction procedures are also introduced to make implementing the algorithms mentioned possible for a huge commercial database.

  17. How to Prevent Heart Disease: MedlinePlus Health Topic

    Science.gov (United States)

    ... and your heart (Medical Encyclopedia) Also in Spanish Topic Image MedlinePlus Email Updates Get How to Prevent ... your heart Stress and your heart Related Health Topics Blood Thinners Cholesterol Heart Diseases Heart Health Tests ...

  18. Does Uninsurance Affect the Health Outcomes of the Insured? Evidence from Heart Attack Patients in California

    NARCIS (Netherlands)

    Meltem Daysal, N.

    2012-01-01

    Abstract: In this paper, I examine the impact of uninsured patients on the health of the insured, focusing on one health outcome - the in-hospital mortality rate of insured heart attack patients. I employ panel data models using patient discharge and hospital financial data from California

  19. Does uninsurance affect the health outcomes of the insured? Evidence from heart attack patients in California

    NARCIS (Netherlands)

    Meltem Daysal, N.

    2012-01-01

    In this paper, I examine the impact of uninsured patients on the in-hospital mortality rate of insured heart attack patients. I employ panel data models using patient discharge and hospital financial data from California (1999–2006). My results indicate that uninsured patients have an economically

  20. Tracks FAQs: How Do Heart Attack Hospitalization Rates In My Community Compare With Other Counties Or States?

    Centers for Disease Control (CDC) Podcasts

    In this podcast, CDC Tracking experts discuss how to compare heart attack hospitalization rates in your community with other counties or states. Do you have a question for our Tracking experts? Please e-mail questions to trackingsupport@cdc.gov.

  1. Family history and body mass index predict perceived risks of diabetes and heart attack among community-dwelling Caucasian, Filipino, Korean, and Latino Americans--DiLH Survey.

    Science.gov (United States)

    Fukuoka, Yoshimi; Choi, JiWon; S Bender, Melinda; Gonzalez, Prisila; Arai, Shoshana

    2015-07-01

    The purpose of the study was to explore the perceived risk for diabetes and heart attack and associated health status of Caucasian, Filipino, Korean, and Latino Americans without diabetes. A cross-sectional survey was conducted with 904 urban adults (mean age 44.3±16.1 years; 64.3% female) in English, Spanish or Korean between August and December 2013. Perceived risk for developing diabetes was indicated by 46.5% (n=421), and 14.3% (n=129) perceived themselves to be at risk for having a heart attack in their lifetime. Significant predictors of pessimistic diabetes risk perceptions: Filipino (adjusted odds ratio [AOR]=1.7; 95% CI: 1.04-2.86) and Korean (AOR=2.4; 1.33-4.48) ethnicity, family history of diabetes (AOR=1.4; 1.00-1.84), female gender (AOR=1.4; 1.04-1.96), high cholesterol (AOR= 1.6; 1.09-2.37) and higher body mass index (BMI) (AOR=1.1; 1.08-1.15). Predictors of pessimistic heart attack risk perceptions were family history of an early heart attack (AOR=2.9; 1.69-5.02), high blood pressure (AOR=2.4; 1.45-3.84), and higher BMI (AOR=1.1; 1.04-1.12) after controlling for socio-demographic factors. Older age, physical inactivity, smoking, and low HDL levels were not associated with risk perceptions. Multiple risk factors were predictive of greater perceived diabetes risk, whereas, only family history of heart attack, high blood pressure and increases in BMI significantly contributed to perceived risk of heart attack among ethnically diverse at risk middle-aged adults. It is important that healthcare providers address the discordance between an individual's risk perceptions and the presence of actual risk factors. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  2. Baseline Quality of Life and Risk of Stroke in the ALLHAT Study (Antihypertensive and Lipid-Lowering Treatment to Prevent Heart Attack Trial).

    Science.gov (United States)

    Shams, Tanzila; Auchus, Alexander P; Oparil, Suzanne; Wright, Clinton B; Wright, Jackson; Furlan, Anthony J; Sila, Cathy A; Davis, Barry R; Pressel, Sara; Yamal, Jose-Miguel; Einhorn, Paula T; Lerner, Alan J

    2017-11-01

    The visual analogue scale is a self-reported, validated tool to measure quality of life (QoL). Our purpose was to determine whether baseline QoL predicted strokes in the ALLHAT study (Antihypertensive and Lipid Lowering Treatment to Prevent Heart Attack Trial) and evaluate determinants of poststroke change in QoL. In the ALLHAT study, among the 33 357 patients randomized to treatment arms, 1525 experienced strokes; 1202 (79%) strokes were nonfatal. This study cohort includes 32 318 (97%) subjects who completed the baseline visual analogue scale QoL estimate. QoL was measured on a visual analogue scale and adjusted using a Torrance transformation (transformed QoL [TQoL]). Kaplan-Meier curves and adjusted proportional hazards analyses were used to estimate the effect of TQoL on the risk of stroke, on a continuous scale (0-1) and by quartiles (≤0.81, >0.81≤0.89, >0.89≤0.95, >0.95). We analyzed the change from baseline to first poststroke TQoL using adjusted linear regression. After adjusting for multiple stroke risk factors, the hazard ratio for stroke events for baseline TQoL was 0.93 (95% confidence interval, 0.89-0.98) per 0.1 U increase. The lowest baseline TQoL quartile had a 20% increased stroke risk (hazard ratio=1.20 [95% confidence interval, 1.00-1.44]) compared with the reference highest quartile TQoL. Poststroke TQoL change was significant within all treatment groups ( P ≤0.001). Multivariate regression analysis revealed that baseline TQoL was the strongest predictor of poststroke TQoL with similar results for the untransformed QoL. The lowest baseline TQoL quartile had a 20% higher stroke risk than the highest quartile. Baseline TQoL was the only factor that predicted poststroke change in TQoL. URL: http://www.clinicaltrials.gov. Unique identifier: NCT00000542. © 2017 American Heart Association, Inc.

  3. Using Combined One-Time Password for Prevention of Phishing Attacks

    Directory of Open Access Journals (Sweden)

    S. Nasiri

    2017-12-01

    Full Text Available Αs technologies and communications develop, more sabotaging attacks occur including phishing attacks which jeopardize users' security and critical information like their passwords and credentials. Several solutions have been proposed for existing dangers. One of which is the use of one-time passwords. This issue has remained as a main challenge and requires more extensive research. In this research, we have focused on one-time password combinations and we also have proposed solutions based on behavioral patterns which lead to significant optimizations while tending the simplicity for users. Efficiency of the proposed method has been measured through defining scenarios, modeling and simulations based on a prevention rate index. In addition, complexity coefficient of the proposed method showing the probability of unpredictability of passwords for attackers has been calculated. Ultimately, a descriptive comparison has shown that the proposed method is superior to some of the existing methods.

  4. Valsartan in the treatment of heart attack survivors

    Directory of Open Access Journals (Sweden)

    Bodh I Jugdutt

    2006-06-01

    Full Text Available Bodh I JugduttDivision of Cardiology, Department of Medicine, University of Alberta, Edmonton, Alberta, CanadaAbstract: Survivors of myocardial infarction (MI are at high risk of disability and death. This is due to infarct-related complications such as heart failure, cardiac remodeling with progressive ventricular dilation, dysfunction, and hypertrophy, and arrhythmias including ventricular and atrial fibrillation. Angiotensin (Ang II, the major effector molecule of the renin–angiotensin–aldosterone system (RAAS is a major contributor to these complications. RAAS inhibition, with angiotensin-converting enzyme (ACE inhibitors were first shown to reduce mortality and morbidity after MI. Subsequently, angiotensin receptor blockers (ARBs, that produce more complete blockade of the effects of Ang II at the Ang II type 1 (AT1 receptor, were introduced and the ARB valsartan was shown to be as effective as an ACE inhibitor in reducing mortality and morbidity in high-risk post-MI suvivors with left ventricular (LV systolic dysfunction and and/or heart failure and in heart failure patients, respectively, in two major trials (VALIANT and Val-HeFT. Both these trials used an ACE inhibitor as comparator on top of background therapy. Evidence favoring the use of valsartan for secondary prevention in post-MI survivors is reviewed.Keywords: valsartan, myocardial infarction, infarct survivors, remodeling, heart failure

  5. Determination of Relations between Systolic Blood Pressure and Heart Attack in Patients with Type 2 Diabetes with Association Rules

    Directory of Open Access Journals (Sweden)

    Seyyed Payam Shariatpanahi

    2018-03-01

    Full Text Available Abstract Background: Today, the high prevalence of diabetes and its complications are one of the most important public health issues worldwide. For this reason, finding relations between diabetes risk factors is very effective in preventing and reducing complications. For discovering these relations, the data mining methods can be used. By extracting association rules, which is one of the data mining techniques, we can discover the relations between a large numbers of variables in a disease. Materials and Methods: The population of this study was 1046 patients with type 2 diabetes, whose data had recorded between 2011 and 2014 at the Special Clinic for Diabetes in Tehran's Imam Khomeini Hospital. After pre-processing step with SPSS19 software, 573 people entered the analysis phase. The FP-Growth algorithm was applied to the data set to discover the relations between heart attack and other risk factors using Rapid miner5 software. Relations, after extraction, were given to the doctor to confirm clinical validation. Results: The obtained results of studying these 573 people (Including 292 (51% women and 281 (49% men, with age range 27 to 82 years showed that the lack of blood pressure, creatinine and diastolic blood pressure at its normal level, despite higher systolic blood pressure level than normal, doesn't increase the probability of heart attack. Conclusion: Using association rules is a good way of identifying relations between the risk factors of a disease. Also, it can provide new hypotheses to do epidemiological studies for researchers.

  6. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... major stroke. It's important to call 9-1-1 immediately for any stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. The content in this ...

  7. SiC: An Agent Based Architecture for Preventing and Detecting Attacks to Ubiquitous Databases

    OpenAIRE

    Pinzón, Cristian; de Paz Santana, Yanira; Bajo Pérez, Javier; Abraham, Ajith P.; Corchado Rodríguez, Juan M.

    2009-01-01

    One of the main attacks to ubiquitous databases is the structure query language (SQL) injection attack, which causes severe damages both in the commercial aspect and in the user’s confidence. This chapter proposes the SiC architecture as a solution to the SQL injection attack problem. This is a hierarchical distributed multiagent architecture, which involves an entirely new approach with respect to existing architectures for the prevention and detection of SQL injections. SiC incorporates a k...

  8. 77 FR 5373 - American Heart Month, 2012

    Science.gov (United States)

    2012-02-03

    ...; its victims are fathers and daughters, grandparents and siblings, cherished friends and community... Federal agencies and forging new public-private partnerships to prevent one million heart attacks and... research to unlock new treatments for cardiovascular disease. And the Centers for Disease Control and...

  9. Heart Health - Brave Heart

    Science.gov (United States)

    ... Bar Home Current Issue Past Issues Cover Story Heart Health Brave Heart Past Issues / Winter 2009 Table of Contents For ... you can have a good life after a heart attack." Lifestyle Changes Surviving—and thriving—after such ...

  10. Adaptive Suspicious Prevention for Defending DoS Attacks in SDN-Based Convergent Networks.

    Science.gov (United States)

    Dao, Nhu-Ngoc; Kim, Joongheon; Park, Minho; Cho, Sungrae

    2016-01-01

    The convergent communication network will play an important role as a single platform to unify heterogeneous networks and integrate emerging technologies and existing legacy networks. Although there have been proposed many feasible solutions, they could not become convergent frameworks since they mainly focused on converting functions between various protocols and interfaces in edge networks, and handling functions for multiple services in core networks, e.g., the Multi-protocol Label Switching (MPLS) technique. Software-defined networking (SDN), on the other hand, is expected to be the ideal future for the convergent network since it can provide a controllable, dynamic, and cost-effective network. However, SDN has an original structural vulnerability behind a lot of advantages, which is the centralized control plane. As the brains of the network, a controller manages the whole network, which is attractive to attackers. In this context, we proposes a novel solution called adaptive suspicious prevention (ASP) mechanism to protect the controller from the Denial of Service (DoS) attacks that could incapacitate an SDN. The ASP is integrated with OpenFlow protocol to detect and prevent DoS attacks effectively. Our comprehensive experimental results show that the ASP enhances the resilience of an SDN network against DoS attacks by up to 38%.

  11. Heart Disease Risk Factors

    Science.gov (United States)

    ... About CDC.gov . Home About Heart Disease Coronary Artery Disease Heart Attack Heart Attack Signs and Symptoms ... Privacy FOIA No Fear Act OIG 1600 Clifton Road Atlanta , GA 30329-4027 USA 800-CDC-INFO ( ...

  12. A Socio-Technical Approach to Preventing, Mitigating, and Recovering from Ransomware Attacks.

    Science.gov (United States)

    Sittig, Dean F; Singh, Hardeep

    2016-01-01

    Recently there have been several high-profile ransomware attacks involving hospitals around the world. Ransomware is intended to damage or disable a user's computer unless the user makes a payment. Once the attack has been launched, users have three options: 1) try to restore their data from backup; 2) pay the ransom; or 3) lose their data. In this manuscript, we discuss a socio-technical approach to address ransomware and outline four overarching steps that organizations can undertake to secure an electronic health record (EHR) system and the underlying computing infrastructure. First, health IT professionals need to ensure adequate system protection by correctly installing and configuring computers and networks that connect them. Next, the health care organizations need to ensure more reliable system defense by implementing user-focused strategies, including simulation and training on correct and complete use of computers and network applications. Concomitantly, the organization needs to monitor computer and application use continuously in an effort to detect suspicious activities and identify and address security problems before they cause harm. Finally, organizations need to respond adequately to and recover quickly from ransomware attacks and take actions to prevent them in future. We also elaborate on recommendations from other authoritative sources, including the National Institute of Standards and Technology (NIST). Similar to approaches to address other complex socio-technical health IT challenges, the responsibility of preventing, mitigating, and recovering from these attacks is shared between health IT professionals and end-users.

  13. Robust Structural Analysis and Design of Distributed Control Systems to Prevent Zero Dynamics Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Weerakkody, Sean [Carnegie Mellon Univ., Pittsburgh, PA (United States); Liu, Xiaofei [Carnegie Mellon Univ., Pittsburgh, PA (United States); Sinopoli, Bruno [Carnegie Mellon Univ., Pittsburgh, PA (United States)

    2017-12-12

    We consider the design and analysis of robust distributed control systems (DCSs) to ensure the detection of integrity attacks. DCSs are often managed by independent agents and are implemented using a diverse set of sensors and controllers. However, the heterogeneous nature of DCSs along with their scale leave such systems vulnerable to adversarial behavior. To mitigate this reality, we provide tools that allow operators to prevent zero dynamics attacks when as many as p agents and sensors are corrupted. Such a design ensures attack detectability in deterministic systems while removing the threat of a class of stealthy attacks in stochastic systems. To achieve this goal, we use graph theory to obtain necessary and sufficient conditions for the presence of zero dynamics attacks in terms of the structural interactions between agents and sensors. We then formulate and solve optimization problems which minimize communication networks while also ensuring a resource limited adversary cannot perform a zero dynamics attacks. Polynomial time algorithms for design and analysis are provided.

  14. Prevention of Acute Rheumatic Fever and Rheumatic Heart Disease

    Science.gov (United States)

    ... Patient Page Prevention of Acute Rheumatic Fever and Rheumatic Heart Disease Mariana Mirabel , Kumar Narayanan , Xavier Jouven , Eloi Marijon ... regurgitant ) valves. Over time, there is progressive damage (rheumatic heart disease, RHD) that may lead to heart failure, stroke, ...

  15. 75 FR 70273 - National Heart, Lung, and Blood Institute; Notice of Closed Meetings

    Science.gov (United States)

    2010-11-17

    ... Institute Special Emphasis Panel, The Antihypertensive and Lipid-Lowering to Prevent Heart Attack Trial... Research Demonstration and Dissemination Projects. Date: December 14, 2010. Time: 8 a.m. to 2 p.m. Agenda... Assistance Program Nos. 93.233, National Center for Sleep Disorders Research; 93.837, Heart and Vascular...

  16. Preliminary data from γ-cardiography during the abatement of an asthmatic attack (1961)

    International Nuclear Information System (INIS)

    Georges, R.; Vernejoul, P. de; Raynaud, C.; Blanchon, P.; Kellershohn, C.; Turiaf, J.

    1961-01-01

    The authors used gamma cardiology during the abatement of 16 cases of asthma with a view to detecting heart attacks not otherwise visible with routine methods of examination: clinical, radiological and electro-cardio-graphical. In gamma cardiology, a radioactive indicator is used and its path followed in the cavities of the heart. The method makes it possible to study the circulation in the right heart, the pulmonary crossing, and the left heart, as well as evaluation of the heart-flow. As a result of their investigations the authors, after having discussed the significance of the data obtained with the method, suggest that it is possible by the use of gamma cardiography during the abatement of an asthma attack: 1- To confirm attacks of the right heart which have already been detected by ordinary methods. 2- To confirm the presence of modifications in the recorded curves which suggest, in the case of the left heart, possible attack; such on attack is also indicated, in a small number of cases, by electrocardiography curves. Some considerations are put forward by the authors concerning the physiopathology of attacks on the left heart. (authors) [fr

  17. Cross-site scripting attacks procedure and Prevention Strategies

    Directory of Open Access Journals (Sweden)

    Wang Xijun

    2016-01-01

    Full Text Available Cross-site scripting attacks and defense has been the site of attack and defense is an important issue, this paper, the definition of cross-site scripting attacks, according to the current understanding of the chaos on the cross-site scripting, analyzes the causes and harm cross-site scripting attacks formation of attacks XXS complete process XSS attacks made a comprehensive analysis, and then for the web program includes Mobility there are cross-site scripting filter laxity given from ordinary users browse the web and web application developers two the defense cross-site scripting attacks effective strategy.

  18. Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method.

    Science.gov (United States)

    Dhamodharan, Udaya Suriya Raj Kumar; Vayanaperumal, Rajamani

    2015-01-01

    Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. Basically a Sybil attack means a node which pretends its identity to other nodes. Communication to an illegal node results in data loss and becomes dangerous in the network. The existing method Random Password Comparison has only a scheme which just verifies the node identities by analyzing the neighbors. A survey was done on a Sybil attack with the objective of resolving this problem. The survey has proposed a combined CAM-PVM (compare and match-position verification method) with MAP (message authentication and passing) for detecting, eliminating, and eventually preventing the entry of Sybil nodes in the network. We propose a scheme of assuring security for wireless sensor network, to deal with attacks of these kinds in unicasting and multicasting.

  19. Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method

    Directory of Open Access Journals (Sweden)

    Udaya Suriya Raj Kumar Dhamodharan

    2015-01-01

    Full Text Available Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. Basically a Sybil attack means a node which pretends its identity to other nodes. Communication to an illegal node results in data loss and becomes dangerous in the network. The existing method Random Password Comparison has only a scheme which just verifies the node identities by analyzing the neighbors. A survey was done on a Sybil attack with the objective of resolving this problem. The survey has proposed a combined CAM-PVM (compare and match-position verification method with MAP (message authentication and passing for detecting, eliminating, and eventually preventing the entry of Sybil nodes in the network. We propose a scheme of assuring security for wireless sensor network, to deal with attacks of these kinds in unicasting and multicasting.

  20. Heart Health - Heart Disease: Symptoms, Diagnosis, Treatment

    Science.gov (United States)

    ... Bar Home Current Issue Past Issues Cover Story Heart Health Heart Disease: Symptoms, Diagnosis, Treatment Past Issues / Winter 2009 ... of this page please turn Javascript on. Most heart attacks happen when a clot in the coronary ...

  1. Review Of Prevention Techniques For Denial Of Service DOS Attacks In Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Poonam Rolla

    2015-08-01

    Full Text Available Wireless Sensor Networks comprised of several tiny sensor nodes which are densely deployed over the region to monitor the environmental conditions. These sensor nodes have certain design issues out of which security is the main predominant factor as it effects the whole lifetime of network. DDoS Distributed denial of service attack floods unnecessary packets in the sensor network. A review on DDoS attacks and their prevention techniques have been done in this paper.

  2. Insider Threat: Preventing Direct Action Attacks Within the United States Army

    Science.gov (United States)

    2017-06-09

    Intelligence Agency, 2012. Joint Chiefs of Staff. Joint Publication (JP) 3-07.2, Antiterrorism. Washington, DC: Government Printing Office, 2010. 81...Federal Bureau of Investigation GEN General (Army rank, O-10) HIPAA Health Insurance Portability and Accountability Act of 1996 INSCOM Intelligence and...commanders, and the intelligence community to prevent insider threats from developing into direct action attacks, this study sought to answer the

  3. Preventing DoS attacks in peer-to-peer media streaming systems

    Science.gov (United States)

    Conner, William; Nahrstedt, Klara; Gupta, Indranil

    2006-01-01

    This paper presents a framework for preventing both selfishness and denial-of-service attacks in peer-to-peer media streaming systems. Our framework, called Oversight, achieves prevention of these undesirable activities by running a separate peer-to-peer download rate enforcement protocol along with the underlying peer-to-peer media streaming protocol. This separate Oversight protocol enforces download rate limitations on each participating peer. These limitations prevent selfish or malicious nodes from downloading an overwhelming amount of media stream data that could potentially exhaust the entire system. Since Oversight is based on a peer-to-peer architecture, it can accomplish this enforcement functionality in a scalable, efficient, and decentralized way that fits better with peer-to-peer media streaming systems compared to other solutions based on central server architectures. As peer-to-peer media streaming systems continue to grow in popularity, the threat of selfish and malicious peers participating in such large peer-to-peer networks will continue to grow as well. For example, since peer-to-peer media streaming systems allow users to send small request messages that result in the streaming of large media objects, these systems provide an opportunity for malicious users to exhaust resources in the system with little effort expended on their part. However, Oversight addresses these threats associated with selfish or malicious peers who cause such disruptions with excessive download requests. We evaluated our Oversight solution through simulations and our results show that applying Oversight to peer-to-peer media streaming systems can prevent both selfishness and denial-of-service attacks by effectively limiting the download rates of all nodes in the system.

  4. SiC: An Agent Based Architecture for Preventing and Detecting Attacks to Ubiquitous Databases

    Science.gov (United States)

    Pinzón, Cristian; de Paz, Yanira; Bajo, Javier; Abraham, Ajith; Corchado, Juan M.

    One of the main attacks to ubiquitous databases is the structure query language (SQL) injection attack, which causes severe damages both in the commercial aspect and in the user’s confidence. This chapter proposes the SiC architecture as a solution to the SQL injection attack problem. This is a hierarchical distributed multiagent architecture, which involves an entirely new approach with respect to existing architectures for the prevention and detection of SQL injections. SiC incorporates a kind of intelligent agent, which integrates a case-based reasoning system. This agent, which is the core of the architecture, allows the application of detection techniques based on anomalies as well as those based on patterns, providing a great degree of autonomy, flexibility, robustness and dynamic scalability. The characteristics of the multiagent system allow an architecture to detect attacks from different types of devices, regardless of the physical location. The architecture has been tested on a medical database, guaranteeing safe access from various devices such as PDAs and notebook computers.

  5. Can the Pelargonium sidoides root extract EPs® 7630 prevent asthma attacks during viral infections of the upper respiratory tract in children?

    Science.gov (United States)

    Tahan, Fulya; Yaman, Melih

    2013-01-15

    Asthma is a chronic disease characterized by airway inflammation. Viral infection initiates an immune inflammatory response that may produce asthma attacks. There is no effective preventing therapy for asthma attack during upper respiratory tract viral infections. To investigate the efficacy of 5 days of Pelargonium sidoides therapy for preventing asthma attack during upper respiratory tract viral infections. Sixty one asthmatic children with upper respiratory tract viral infection were enrolled in the study. The patients were randomized to receive Pelargonium sidoides daily for 5 days (n=30) or not (n=31). Before and after treatment, they all were examined and symptom scores were determined. Following five days treatment, children were evaluated whether or not they had an asthma attack. Treatment with Pelargonium sidoides was not associated with a statistically significant differences in fever and muscle aches (p>0.05, Chi-square test). There were significant differences in cough frequency and nasal congestion between the groups (pasthma attack between the groups (pasthma attack. Our study shows that Pelargonium sidoides may prevent asthma attacks during upper respiratory tract viral infections. Copyright © 2012 Elsevier GmbH. All rights reserved.

  6. Tracks FAQs: How Do Heart Attack Hospitalization Rates In My Community Compare With Other Counties Or States?

    Centers for Disease Control (CDC) Podcasts

    2011-09-01

    In this podcast, CDC Tracking experts discuss how to compare heart attack hospitalization rates in your community with other counties or states. Do you have a question for our Tracking experts? Please e-mail questions to trackingsupport@cdc.gov.  Created: 9/1/2011 by National Center for Environmental Health, Division of Environmental Hazards and Health Effects, Environmental Health Tracking Branch.   Date Released: 9/1/2011.

  7. Adults with Congenital Heart Defects

    Science.gov (United States)

    ... Ebstein's Anomaly l-Transposition of the Great Arteries Patent Ductus Arteriosus (PDA) Pulmonary Valve Stenosis and Regurgitation ... Sodium and Salt 3 Heart Attack Symptoms in Women 4 Warning Signs of a Heart Attack 5 ...

  8. Division for Heart Disease and Stroke Prevention: Data Trends & Maps

    Data.gov (United States)

    U.S. Department of Health & Human Services — The CDC Division for Heart Disease and Stroke Prevention's Data Trends & Maps online tool allows searching for and view of health indicators related to Heart...

  9. A novel proposed network security management approach for cyber attacks

    International Nuclear Information System (INIS)

    Ahmed, Z.; Nazir, B.; Zafar, M.F.; Anwar, M.M.; Azam, K.; Asar, A.U.

    2007-01-01

    Network security is a discipline that focuses on securing networks from unauthorized access. Given the Escalating threats of malicious cyber attacks, modern enterprises employ multiple lines of defense. A comprehensive defense strategy against such attacks should include (I) an attack detection component that deter- mines the fact that a program is compromised, (2) an attack identification and prevention component that identifies attack packets so that one can block such packets in the future and prevents the attack from further propagation. Over the last decade, a significant amount of research has been vested in the systems that can detect cyber attacks either statically at compile time or dynamically at run time, However, not much effort is spent on automated attack packet identification or attack prevention. In this paper we present a unified solution to the problems mentioned above. We implemented this solution after the forward engineering of Open Source Security Information Management (OSSIM) system called Preventive Information Security management (PrISM) system that correlates input from different sensors so that the resulting product can automatically detect any cyber attack against it and prevents by identifying the actual attack packet(s). The PrISM was always able to detect the attacks, identify the attack packets and most often prevent by blocking the attacker's IP address to continue normal execution. There is no additional run-time performance overhead for attack prevention. (author)

  10. Understand Your Risk of Heart Attack

    Science.gov (United States)

    ... not as great as men's. Heredity (Including Race) Children of parents with heart disease are more likely to develop it themselves. African Americans have more severe high blood pressure than Caucasians and a higher risk of heart ...

  11. Heart disease and diet

    Science.gov (United States)

    Diet - heart disease; CAD - diet; Coronary artery disease - diet; Coronary heart disease - diet ... diet and lifestyle can reduce your risk of: Heart disease, heart attacks, and stroke Conditions that lead ...

  12. Empowered to gain a new foothold in life—A study of the meaning of participating in cardiac rehabilitation to patients afflicted by a minor heart attack

    Directory of Open Access Journals (Sweden)

    Charlotte P. Simonÿ

    2015-12-01

    Full Text Available This study aimed to investigate what it means to patients afflicted by a minor heart attack to participate in cardiac rehabilitation (CR. CR is well-established internationally to support patients towards moving forward in satisfying, healthy, and well-functioning lives. Studies indicate that patients achieve improvement in quality of life when participating in CR. However, knowledge of how patients are supported during CR is sparse. Moreover, knowledge of what participating in CR means to patients afflicted by a minor heart attack is lacking. In-depth knowledge in this area is crucial in order to understand these patients’ particular gains and needs. In a phenomenological-hermeneutic frame field observations, focus group interviews, and individual interviews were conducted among 11 patients during and after their participation in CR. Field notes and transcribed interviews underwent three-phased interpretation. It was found that patients were supported to gain renewed balance in their lives during CR. Three themes were identified: (1 receiving a helpful but limited caring hand, (2 being supported to find new values in life, and (3 developing responsibility for the remaining time. The patients were carefully guided through a difficult time and supported to continue in healthy everyday lives. They were given hope which enabled them to find themselves a new foothold in life with respect to their own sense of well-being. This guidance and a sense of hopefulness were provided by heart specialists and more seasoned heart patients. In conclusion, patients were empowered to achieve a healthier lifestyle and improve their personal well-being during CR. However, structural barriers in the programme prevented adequate support regarding the patients’ total needs. Knowledge of the benefits of CR emphasizes the significance of the programme and highlights the importance of high inclusion. Efforts should be made to develop more flexible and longer lasting

  13. An Approach for Prevention of MitM Attack Based on Rogue AP in Wireless Network

    Directory of Open Access Journals (Sweden)

    Zhendong Wu

    2014-12-01

    Full Text Available With the rapid development of WLAN, more and more schools and businesses have begun to provide the WLAN for users. However, WLAN is considerably more susceptible to MitM (man- in-the-middle attack. To overcome it, we propose a dynamic password technology named Two-way Dynamic Authentication Technology (TDAT. It uses two-factor during the initial authentication, and uses a two-way hash chain during the cross-domain authentication. TDAT effectively protects users' authentication credentials and improves users' experience. In an actual wireless network environment, we implement a MitM attack framework based on Rogue AP. Then we effectively prevent this MitM attack by using TDAT. Moreover we analyze the security of TDAT by using BAN logic.

  14. Heart-Health Screenings

    Science.gov (United States)

    ... Tools For Your Heart Health • Watch, Learn & Live Animations Library Subscribe to Heart Insight magazine and monthly ... in Spanish . Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  15. Current strategies for preventing renal dysfunction in patients with heart failure: a heart failure stage approach

    Science.gov (United States)

    Issa, Victor Sarli; Andrade, Lúcia; Bocchi, Edimar Alcides

    2013-01-01

    Renal dysfunction is common during episodes of acute decompensated heart failure, and historical data indicate that the mean creatinine level at admission has risen in recent decades. Different mechanisms underlying this change over time have been proposed, such as demographic changes, hemodynamic and neurohumoral derangements and medical interventions. In this setting, various strategies have been proposed for the prevention of renal dysfunction with heterogeneous results. In the present article, we review and discuss the main aspects of renal dysfunction prevention according to the different stages of heart failure. PMID:23644863

  16. The role of noninvasive cardiovascular testing, applied clinical nutrition and nutritional supplements in the prevention and treatment of coronary heart disease.

    Science.gov (United States)

    Houston, Mark

    2018-03-01

    Numerous clinical trials suggest that we have reached a limit in our ability to decrease the incidence of coronary heart disease (CHD) and cardiovascular disease (CVD) utilizing the traditional diagnostic evaluation, prevention and treatment strategies for the top five cardiovascular risk factors of hypertension, diabetes mellitus, dyslipidemia, obesity and smoking. About 80% of heart disease (heart attacks, angina, coronary heart disease and congestive heart failure) can be prevented by optimal nutrition, optimal exercise, optimal weight and body composition, mild alcohol intake and avoiding smoking. Statistics show that approximately 50% of patients continue to have CHD or myocardial infarction (MI) despite presently defined 'normal' levels of the five risk factors listed above. This is often referred to as the 'CHD gap'. Novel and more accurate definitions and evaluations of these top five risk factors are required, such as 24 h ambulatory blood pressure (ABM) results, advanced lipid profiles, redefined fasting and 2 h dysglycemia parameters, a focus on visceral obesity and body composition and the effects of adipokines on cardiovascular risk. There are numerous traumatic insults from the environment that damage the cardiovascular system but there are only three finite vascular endothelial responses, which are inflammation, oxidative stress and immune vascular dysfunction. In addition, the concept of translational cardiovascular medicine is mandatory in order to correlate the myriad of CHD risk factors to the presence or absence of functional or structural damage to the vascular system, preclinical and clinical CHD. This can be accomplished by utilizing advanced and updated CV risk scoring systems, new and redefined CV risk factors and biomarkers, micronutrient testing, cardiovascular genetics, nutrigenomics, metabolomics, genetic expression testing and noninvasive cardiovascular testing.

  17. Coronary Artery Dissection: Not Just a Heart Attack

    Science.gov (United States)

    ... for Heart.org CPR & ECC for Heart.org Shop for Heart.org Causes for Heart.org Advocate ... chest pain or pressure, shortness of breath, profuse sweating and dizziness. “Around 80 percent of the time, ...

  18. An SDN-Based Fingerprint Hopping Method to Prevent Fingerprinting Attacks

    Directory of Open Access Journals (Sweden)

    Zheng Zhao

    2017-01-01

    Full Text Available Fingerprinting attacks are one of the most severe threats to the security of networks. Fingerprinting attack aims to obtain the operating system information of target hosts to make preparations for future attacks. In this paper, a fingerprint hopping method (FPH is proposed based on software-defined networks to defend against fingerprinting attacks. FPH introduces the idea of moving target defense to show a hopping fingerprint toward the fingerprinting attackers. The interaction of the fingerprinting attack and its defense is modeled as a signal game, and the equilibriums of the game are analyzed to develop an optimal defense strategy. Experiments show that FPH can resist fingerprinting attacks effectively.

  19. Heart disease and depression

    Science.gov (United States)

    ... gov/ency/patientinstructions/000790.htm Heart disease and depression To use the sharing features on this page, ... a heart attack or heart surgery Signs of Depression It is pretty common to feel down or ...

  20. Antibiotics for secondary prevention of coronary heart disease

    DEFF Research Database (Denmark)

    Sethi, Naqash J.; Safi, Sanam; Korang, Steven Kwasi

    2017-01-01

    This is a protocol for a Cochrane Review (Intervention). The objectives are as follows: To assess the beneficial and harmful effects of antibiotics for the secondary prevention of coronary heart disease. As a secondary objective, we plan to assess the effects of individual types of antibiotics...

  1. Options for Heart Valve Replacement

    Science.gov (United States)

    ... Guide: Understanding Your Heart Valve Problem | Spanish Symptom Tracker | Spanish Pre-surgery Checklist | Spanish What Is Heart ... Cardiac Arrest: How Are They Different? 7 Warning Signs of a Heart Attack 8 Low Blood Pressure - ...

  2. Adult Learners' Preferred Methods of Learning Preventative Heart Disease Care

    Science.gov (United States)

    Alavi, Nasim

    2016-01-01

    The purpose of this study was to investigate the preferred method of learning about heart disease by adult learners. This research study also investigated if there was a statistically significant difference between race/ethnicity, age, and gender of adult learners and their preferred method of learning preventative heart disease care. This…

  3. Forensics Investigation of Web Application Security Attacks

    OpenAIRE

    Amor Lazzez; Thabet Slimani

    2015-01-01

    Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the sec...

  4. Primary prevention in patients with a strong family history of coronary heart disease.

    Science.gov (United States)

    Burke, Lora A

    2003-01-01

    The interplay of genetic and environmental factors places first-degree relatives of individuals with premature coronary heart disease at greater risk of developing the disease than the general population. Disease processes, such as dyslipidemia, hypertension, and glucose and insulin metabolism, and lifestyle habits, such as eating and exercise patterns, as well as socioeconomic status aggregate in families with coronary heart disease. The degree of risk associated with a family history varies with the degree of relationship and the age at onset of disease. All individuals with a family history of premature heart disease should have a thorough coronary risk assessment performed, which can be initiated in an office visit. Absolute risk for coronary heart disease determination will predict the intensity of preventive interventions. This article reviews the components of risk determination and primary prevention in individuals with a strong family history of coronary heart disease.

  5. CARDIAC EMERGENCY: LIFT UP YOUR HEARTS

    CERN Multimedia

    2000-01-01

    50 000 deaths every year in France following heart problems. You or someone close to you, a friend, a relative, a colleague at work. You all probably know someone who has had a heart attack. Noting that 80% of all deaths occur outside hospital, the Fédération Française de Cardiologie, working in collaboration with first aid groups (rescue associations, etc.), are launching a nationwide campaign to train as many people as possible in what to do for cardiac first aid. According to specialists, more than half of all heart attack victims could have survived if someone nearby had been quick at doing what was needed. The CERN Fire Brigade is helping in this campaign by offering two free training sessions, each lasting three hours and mainly based on recognizing a heart attack, the proper way of calling for help, and practice in mouth-to-mouth resuscitation and heart massage. The courses will be held on 20 November and 6 December from4 to 7 p.m. at Building 65. So don’t wait, stop b...

  6. Thwarting Nonintrusive Occupancy Detection Attacks from Smart Meters

    Directory of Open Access Journals (Sweden)

    Dapeng Man

    2017-01-01

    Full Text Available Occupancy information is one of the most important privacy issues of a home. Unfortunately, an attacker is able to detect occupancy from smart meter data. The current battery-based load hiding (BLH methods cannot solve this problem. To thwart occupancy detection attacks, we propose a framework of battery-based schemes to prevent occupancy detection (BPOD. BPOD monitors the power consumption of a home and detects the occupancy in real time. According to the detection result, BPOD modifies those statistical metrics of power consumption, which highly correlate with the occupancy by charging or discharging a battery, creating a delusion that the home is always occupied. We evaluate BPOD in a simulation using several real-world smart meter datasets. Our experiment results show that BPOD effectively prevents the threshold-based and classifier-based occupancy detection attacks. Furthermore, BPOD is also able to prevent nonintrusive appliance load monitoring attacks (NILM as a side-effect of thwarting detection attacks.

  7. Lifestyle Changes for Heart Attack Prevention

    Science.gov (United States)

    ... alcohol consumption contributes to obesity, alcoholism, suicide and accidents. However, there is a cardioprotective effect of moderate ... to the Terms and Conditions and Privacy Policy Work with your doctor to lower your HBP and ...

  8. Heart Disease Affects Women of All Ages

    Science.gov (United States)

    Skip Navigation Bar Home Current Issue Past Issues Heart Disease Affects Women of All Ages Past Issues / Winter ... weeks of a heart attack. For Women with Heart Disease: About 6 million American women have coronary heart ...

  9. Heart Age PSA (:60)

    Centers for Disease Control (CDC) Podcasts

    This 60 second public service announcement is based on the September 2015 CDC Vital Signs report. Your heart age is the age of your heart and blood vessels as a result of your risk factors for heart attack and stroke. If you smoke or have high blood pressure, your heart age will be much higher than your actual age. Learn what you can do to lower your heart age and keep it low.

  10. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  11. Total Dietary Fiber, and Selected Vegetable, Fruit, Legume and Cereal Fiber Intake and Risk of Heart Attack in Periodontitis Subjects

    Directory of Open Access Journals (Sweden)

    Nelson Wood

    2011-10-01

    Full Text Available Background: Epidemiological studies have found an association between periodontal disease and coronary artery disease(Arbes, Slade et al. 1999; Beck, Elter et al. 2001; Genco, Offenbacher et al. 2002, and have even implicated periodontal disease as a risk factor(Arbes, Slade et al. 1999; Beck, Elter et al. 2001, however have not proven causality(Hujoel, Drangholt et al. 2000. Although dietary amounts, sources, and types (soluble versus insoluble of fiber have been shown to reduce the risk of heart attack (Liu, Buring et al. 2002; Negri, Vecchia et al. 2003, this author is unaware of studies that have examined the association between food sources of dietary fiber and heart attack risk in subjects with periodontitis.This study was designed to determine whether total dietary fiber and fiber from different plant sources (vegetables, fruits, legumes, or cereals modified self-reported HA risk, as well as acute-phase inflammatory responses in subjects with periodontitis using NHANES III data.Objectives: The objective of this study was to investigate the association between total dietary fiber intake levels, and selected vegetables, fruits, legumes, and cereal fiber intake and the risk of self-reported history of heart attack (HA in periodontitis subjects using data available in the Third National Health and Nutrition Examination Survey (NHANES III.Materials and Methods: Adult participants in NHANES III were used in this study. Zero to thirty three (0-33 percent of sites with periodontal attachment loss > 3 mm was considered a healthy periodontium, while greater than thirty three percent (>33 of sites with periodontal attachment loss of > 3 mm as periodontitis. The outcome variable was the self-reported history of HA. Total dietary fiber, and monthly selected vegetable, fruit, legume and cereal consumption were divided into low and adequate levels. Data was analyzed by Kruskal-Wallis, ANOVA and multivariate analyses using SPSS ®. P<0.05 was used to

  12. Stabilization of mitochondrial membrane potential prevents doxorubicin-induced cardiotoxicity in isolated rat heart

    International Nuclear Information System (INIS)

    Montaigne, David; Marechal, Xavier; Baccouch, Riadh; Modine, Thomas; Preau, Sebastien; Zannis, Konstantinos; Marchetti, Philippe; Lancel, Steve; Neviere, Remi

    2010-01-01

    The present study was undertaken to examine the effects of doxorubicin on left ventricular function and cellular energy state in intact isolated hearts, and, to test whether inhibition of mitochondrial membrane potential dissipation would prevent doxorubicin-induced mitochondrial and myocardial dysfunction. Myocardial contractile performance and mitochondrial respiration were evaluated by left ventricular tension and its first derivatives and cardiac fiber respirometry, respectively. NADH levels, mitochondrial membrane potential and glucose uptake were monitored non-invasively via epicardial imaging of the left ventricular wall of Langendorff-perfused rat hearts. Heart performance was reduced in a time-dependent manner in isolated rat hearts perfused with Krebs-Henseleit solution containing 1 μM doxorubicin. Compared with controls, doxorubicin induced acute myocardial dysfunction (dF/dt max of 105 ± 8 mN/s in control hearts vs. 49 ± 7 mN/s in doxorubicin-treated hearts; *p < 0.05). In cardiac fibers prepared from perfused hearts, doxorubicin induced depression of mitochondrial respiration (respiratory control ratio of 4.0 ± 0.2 in control hearts vs. 2.2 ± 0.2 in doxorubicin-treated hearts; *p < 0.05) and cytochrome c oxidase kinetic activity (24 ± 1 μM cytochrome c/min/mg in control hearts vs. 14 ± 3 μM cytochrome c/min/mg in doxorubicin-treated hearts; *p < 0.05). Acute cardiotoxicity induced by doxorubicin was accompanied by NADH redox state, mitochondrial membrane potential, and glucose uptake reduction. Inhibition of mitochondrial permeability transition pore opening by cyclosporine A largely prevented mitochondrial membrane potential dissipation, cardiac energy state and dysfunction. These results suggest that in intact hearts an impairment of mitochondrial metabolism is involved in the development of doxorubicin cardiotoxicity.

  13. The 'diet heart' hypothesis in secondary prevention of coronary heart disease.

    Science.gov (United States)

    de Lorgeril, M; Salen, P; Monjaud, I; Delaye, J

    1997-01-01

    From this detailed analysis of the main dietary trials conducted over the last 30 years in the secondary prevention of coronary heart disease, it can be said that the older trials were conducted on low risk patients and used high fat diets (about 40% of energy as lipids), comprising low saturated fat and cholesterol intake but very high (15 to 20% of energy) polyunsaturated fat intake, particularly from the omega-6 fatty acid family. These experimental diets were designed to reduce blood cholesterol and failed to improve prognosis. By contrast, recent trials were not primarily designed to reduce cholesterol, were conducted in medium- and high-risk patients and used low fat diets supplemented by omega-3 fatty acids from various sources. In two of these trials, the consumption of natural antioxidants, oligoelements and vegetable proteins was increased. Recurrence rate was reduced in the range of 30 to 70%. One conclusion from these well-conducted recent experiments on more than 3000 patients is that new and more specific dietary recommendations are clearly warranted in secondary prevention of coronary heart disease. They should be more specific and more clearly defined and therefore different from those generally provided in the U.S.A. and Europe at present. In a recent Consensus Panel statement, authors wrote less than one line to describe a cardioprotective diet in patients with coronary heart disease, summarized as diet and coronary heart disease is more complex than the current cholesterol hypothesis. They identified at least seven major dietary factors, including fibres, although the evidence of an effect on coronary heart disease is weak. However, they did not mention vegetable and fish proteins which are rich in arginine and L-glutamine, major regulators of cardiovascular function. Thus, new dietary advice should include: reduce intake of total (not more than 30% of energy) and saturated (less than 10%) fats maintain intake at least minimally, of the essential

  14. Warning Signs of Heart Failure

    Science.gov (United States)

    ... the two terms are used interchangeably. View an animation of heart failure . If you have been diagnosed ... resources here Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  15. Whispering through DDoS attack

    Directory of Open Access Journals (Sweden)

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  16. Performance analysis and implementation of proposed mechanism for detection and prevention of security attacks in routing protocols of vehicular ad-hoc network (VANET

    Directory of Open Access Journals (Sweden)

    Parul Tyagi

    2017-07-01

    Full Text Available Next-generation communication networks have become widely popular as ad-hoc networks, broadly categorized as the mobile nodes based on mobile ad-hoc networks (MANET and the vehicular nodes based vehicular ad-hoc networks (VANET. VANET is aimed at maintaining safety to vehicle drivers by begin autonomous communication with the nearby vehicles. Each vehicle in the ad-hoc network performs as an intelligent mobile node characterized by high mobility and formation of dynamic networks. The ad-hoc networks are decentralized dynamic networks that need efficient and secure communication requirements due to the vehicles being persistently in motion. These networks are more susceptible to various attacks like Warm Hole attacks, denial of service attacks and Black Hole Attacks. The paper is a novel attempt to examine and investigate the security features of the routing protocols in VANET, applicability of AODV (Ad hoc On Demand protocol to detect and tackle a particular category of network attacks, known as the Black Hole Attacks. A new algorithm is proposed to enhance the security mechanism of AODV protocol and to introduce a mechanism to detect Black Hole Attacks and to prevent the network from such attacks in which source node stores all route replies in a look up table. This table stores the sequences of all route reply, arranged in ascending order using PUSH and POP operations. The priority is calculated based on sequence number and discard the RREP having presumably very high destination sequence number. The result show that proposed algorithm for detection and prevention of Black Hole Attack increases security in Intelligent Transportation System (ITS and reduces the effect of malicious node in the VANET. NCTUNs simulator is used in this research work.

  17. Health behavior of patients with ischemic heart disease

    Directory of Open Access Journals (Sweden)

    Paweł Węgorowski

    2017-06-01

    Full Text Available Admission By analyzing the available scientific literature, it is possible to define ischemic heart disease as a set of disease symptoms that are a consequence of a chronic state of imbalance between the ability to supply nutrients and oxygen and the real need of myocardial cells for these substances. Adapting life-style behaviors to healthy living is a priority to prevent the onset and development of cardiovascular disease, especially ischemic heart disease, Purpose of research The aim of the study is to determine the health behavior of patients with ischemic heart disease. Materials and methods The study was conducted from 01.08.2015 to 28.12.2015 in a group of 35 people (15 women and 20 men. The research method used in the work is a diagnostic survey, the research technique used was a survey of its own author. Conclusions By analyzing the data collected, it is important to note that patients with coronary heart disease are often associated with health problems such as hypertension, diabetes and abnormal weight. The nutritional habits of the subjects studied can be described as abnormal, particularly the excessive intake of oily meat and too little fish intake. It has also been observed that most of the patients studied have familial predisposition to ischemic heart disease. Discussion Heart attacks occur mostly in people with obesity, diabetes and atherosclerosis. It is also closely related to ischemic heart disease. The health behaviors of patients suffering from Ischemic Heart Disease are moderately satisfactory and therefore the role of a nurse practitioner as a health educator is very difficult but essential in the prevention of ischemic heart disease.

  18. Rehab for the Heart (A Minute of Health with CDC)

    Centers for Disease Control (CDC) Podcasts

    2017-08-24

    Each year, nearly 790,000 adults in the U.S. suffer a heart attack. This podcast discusses the importance of getting cardiac rehab after a heart attack.  Created: 8/24/2017 by MMWR.   Date Released: 8/24/2017.

  19. Health-Related Quality of Life with Subcutaneous C1-Inhibitor for Prevention of Attacks of Hereditary Angioedema.

    Science.gov (United States)

    Lumry, William R; Craig, Timothy; Zuraw, Bruce; Longhurst, Hilary; Baker, James; Li, H Henry; Bernstein, Jonathan A; Anderson, John; Riedl, Marc A; Manning, Michael E; Keith, Paul K; Levy, Donald S; Caballero, Teresa; Banerji, Aleena; Gower, Richard G; Farkas, Henriette; Lawo, John-Philip; Pragst, Ingo; Machnig, Thomas; Watson, Douglas J

    2018-01-31

    Hereditary angioedema with C1-inhibitor deficiency (C1-INH-HAE) impairs health-related quality of life (HRQoL). The objective of this study was to assess HRQoL outcomes in patients self-administering subcutaneous C1-INH (C1-INH[SC]; HAEGARDA) for routine prevention of HAE attacks. Post hoc analysis of data from the placebo-controlled, crossover phase III COMPACT study (Clinical Studies for Optimal Management of Preventing Angioedema with Low-Volume Subcutaneous C1-Inhibitor Replacement Therapy). Ninety patients with C1-INH-HAE were randomized to 1 of 4 treatment sequences: C1-INH(SC) 40 or 60 IU/kg twice weekly for 16 weeks, preceded or followed by 16 weeks of twice weekly placebo injections. All HAE attacks were treated with open-label on-demand treatment as necessary. HRQoL assessments at week 14 (last visit) included the European Quality of Life-5 Dimensions Questionnaire (EQ-5D-3L), the Hospital Anxiety and Depression Scale (HADS), the Work Productivity and Activity Impairment Questionnaire (WPAI), and the Treatment Satisfaction Questionnaire for Medication (TSQM). Compared with placebo (on-demand treatment alone), treatment with twice weekly C1-INH(SC) (both doses combined) was associated with better EQ-5D visual analog scale general health, less HADS anxiety, less WPAI presenteeism, work productivity loss, and activity impairment, and greater TSQM effectiveness and overall treatment satisfaction. More patients self-reported a "good/excellent" response during routine prevention with C1-INH(SC) compared with on-demand only (placebo prophylaxis) management. For each HRQoL measure, a greater proportion of patients had a clinically meaningful improvement during C1-INH(SC) treatment compared with placebo. In patients with frequent HAE attacks, a treatment strategy of routine prevention with self-administered twice weekly C1-INH(SC) had a greater impact on improving multiple HAE-related HRQoL impairments, most notably anxiety and work productivity, compared with on

  20. [Secondary prevention of coronary heart disease is less agressive in patients over 64 years].

    Science.gov (United States)

    Muñoz, Miguel A; Marrugat, Jaume

    2003-06-01

    Although elderly people has a higher incidence of coronary heart disease, this group is seldom included in clinical trials. Studies performed in Spain on elderly coronary heart disease patients have been conducted in hospital settings. The aim of our study was to analyse wether the management of coronary heart disease patients over 64 years of age cared by family physicians differed from that of the rest. Cross-sectional multicentre study embedded in a clinical trial on 1,022 patients with stable coronary heart disease in which socio-demographic variables, comorbidity, treatment and cardiovascular risk- factor control were collected. Mean age was 64 10, 74.0% were men and 53.8% of subjects were over 64 years. Patients over 64 years had a greater cardiovascular comorbidity (87.7 vs 82.6%; p = 0.002) and received lower number of drugs than the rest in the prevention of recurrences (60.4 vs 70.9%; p < 0.001). Probability to receive less than two drugs on secondary prevention by subjects over 64 years was 0.45 (95% CI, 0.30-0.68) despite comorbidity, sex and cardiovascular risk profile.Conclusions. Coronary heart disease patients over 64 years receive less drugs for coronary event recurrence prevention than their younger counterparts despite their worse cardiovascular risk profile.

  1. CDC Vital Signs-Heart Age

    Centers for Disease Control (CDC) Podcasts

    This podcast is based on the September 2015 CDC Vital Signs report. Your heart age is the age of your heart and blood vessels as a result of your risk factors for heart attack and stroke. If you smoke or have high blood pressure, your heart age will be much higher than your actual age. Learn what you can do to lower your heart age and keep it low.

  2. Predicting the effect of prevention of ischaemic heart disease

    DEFF Research Database (Denmark)

    Brønnum-Hansen, Henrik

    2002-01-01

    Priority setting in public health policy must be based on information on the effectiveness of alternative preventive and therapeutic interventions. The purpose of this study is to predict the effect on mortality from ischaemic heart disease (IHD) in Denmark of reduced exposure to the risk factors...... hypertension, hypercholesterolaemia, cigarette smoking, and physical inactivity....

  3. Securing internet by eliminating DDOS attacks

    Science.gov (United States)

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  4. Preventable Deaths from Heart Disease and Stroke PSA (:60)

    Centers for Disease Control (CDC) Podcasts

    2013-09-03

    This 60 second public service announcement is based on the September 2013 CDC Vital Signs report. More than 800,000 Americans die each year from heart disease and stroke. Learn how to manage all the major risk factors.  Created: 9/3/2013 by Centers for Disease Control and Prevention (CDC).   Date Released: 9/3/2013.

  5. Risks for Heart Valve Problems

    Science.gov (United States)

    ... and Live Our Interactive Cardiovascular Library has detailed animations and illustrations to help you learn about conditions, treatments and procedures related to heart disease and stroke. Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  6. Heart Failure in Children and Adolescents

    Science.gov (United States)

    ... the lungs where oxygen is added. Watch an animation of blood flow in the heart All the ... resources here Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  7. Can a Copycat Effect be Observed in Terrorist Suicide Attacks?

    Directory of Open Access Journals (Sweden)

    Nicholas Farnham

    2017-03-01

    Full Text Available The purpose of this paper is to explore how a copycat effect – established within the field of suicide studies – may manifest itself in terrorist suicide attacks, and takes an exploratory approach in evaluating the prospect of incorporating open-data resources in future counter-terrorism research. This paper explores a possible ‘copycat effect’ in cases of suicide terrorism, which entails a perpetrator being inspired by a preceding attack to carry out a similar attack not long after the original. In the wake of mounting risks of lone wolf terrorist attacks today and due to the general difficulties faced in preventing such attacks, in this paper we explore a potential area of future prevention in media reporting, security and anti-terrorism policies today. Using the START Global Terrorism Database (GTD, this paper investigates terrorist suicide-attack clusters and analyses the relationship between attacks found within the same cluster. Using a mixed-method approach, our analyses did not uncover clear evidence supporting a copycat effect among the studied attacks. These and other findings have numerous policy and future research implications.

  8. On node replication attack in wireless sensor networks

    International Nuclear Information System (INIS)

    Qabulio, M.; Malkani, Y.A.

    2015-01-01

    WSNs (Wireless Sensor Networks) comprise a large number of small, inexpensive, low power and memory constrained sensing devices (called sensor nodes) that are densely deployed to measure a given physical phenomenon. Since WSNs are commonly deployed in a hostile and unattended environment, it is easy for an adversary to physically capture one or more legitimate sensor nodes, re-program and redeploy them in the network. As a result, the adversary becomes able to deploy several identical copies of physically captured nodes in the network in order to perform illegitimate activities. This type of attack is referred to as Node Replication Attack or Clone Node Attack. By launching node replication attack, an adversary can easily get control on the network which consequently is the biggest threat to confidentiality, integrity and availability of data and services. Thus, detection and prevention of node replication attack in WSNs has become an active area of research and to date more than two dozen schemes have been proposed, which address this issue. In this paper, we present a comprehensive review, classification and comparative analysis of twenty five of these schemes which help to detect and/or prevent node replication attack in WSNs. (author)

  9. On Node Replication Attack in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Mumtaz Qabulio

    2016-04-01

    Full Text Available WSNs (Wireless Sensor Networks comprise a large number of small, inexpensive, low power and memory constrained sensing devices (called sensor nodes that are densely deployed to measure a given physical phenomenon. Since WSNs are commonly deployed in a hostile and unattended environment, it is easy for an adversary to physically capture one or more legitimate sensor nodes, re-program and redeploy them in the network. As a result, the adversary becomes able to deploy several identical copies of physically captured nodes in the network in order to perform illegitimate activities. This type of attack is referred to as Node Replication Attack or Clone Node Attack. By launching node replication attack, an adversary can easily get control on the network which consequently is the biggest threat to confidentiality, integrity and availability of data and services. Thus, detection and prevention of node replication attack in WSNs has become an active area of research and to date more than two dozen schemes have been proposed, which address this issue. In this paper, we present a comprehensive review, classification and comparative analysis of twenty five of these schemes which help to detect and/or prevent node replication attack in WSNs

  10. Transient complete atrioventricular block with Morgagni—Adams—Stokes attacks in a child after aortic valve replacement

    Directory of Open Access Journals (Sweden)

    D. R. Sabirova

    2014-01-01

    Full Text Available The diagnosis and treatment of life-threatening arrhythmias after surgical correction of congenital heart diseases is one the urgent problems in pediatrlc cardiology. The paper describes the clinical picture, diagnosis, and therapy in a patent with transient complete atrioventricular block after open heart surgery. A protracted Morgagni—Adams—Stokes attack is one of the causes of sudden cardiac death. The occurrence of even single syncopes in patients after surgery for congenital heart disease requires that the arrhythmogenic nature of the attack should be ruled out for the timely and adequate therapy including the implantation of antiarrhythmic devices.

  11. Medications Used to Treat Heart Failure

    Science.gov (United States)

    ... and Live Our Interactive Cardiovascular Library has detailed animations and illustrations to help you learn about conditions, treatments and procedures related to heart disease and stroke. Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  12. Bridging the gap in heart failure prevention: rationale and design of the Nurse-led Intervention for Less Chronic Heart Failure (NIL-CHF) Study

    DEFF Research Database (Denmark)

    Carrington, Melinda J; Stewart, Simon; de Courten, Barbora

    2010-01-01

    AIMS: The primary objective of the Nurse-led Intervention for Less Chronic Heart Failure (NIL-CHF) Study is to develop a programme of care that cost-effectively prevents the development of chronic heart failure (CHF). Methods NIL-CHF is a randomized controlled trial of a hybrid, home- and clinic-...

  13. Priming and warnings are not effective to prevent social engineering attacks

    NARCIS (Netherlands)

    Junger, Marianne; Montoya, L.; Overink, F.J.

    2017-01-01

    Humans tend to trust each other and to easily disclose personal information. This makes them vulnerable to social engineering attacks. The present study investigated the effectiveness of two interventions that aim to protect users against social engineering attacks, namely priming through cues to

  14. Can Vitamins Help Prevent a Heart Attack?

    Science.gov (United States)

    ... uptodate.com/home. Accessed Nov. 26, 2016. Loffredo L, et al. Supplementation with vitamin E alone is associated with reduced myocardial infarction: ... Cardiovascular Diseases. 2015;25:354. Pilz S, et al. Vitamin D and cardiovascular ... L, et al. Prospective association between the dietary inflammatory ...

  15. Nutritional aspects to prevent heart diseases in traditional Persian medicine.

    Science.gov (United States)

    Kordafshari, Gholamreza; Kenari, Hoorieh Mohammadi; Esfahani, Mohammad Mehdi; Ardakani, Mohammad Reza Shams; Keshavarz, Mansoor; Nazem, Esmaeil; Moghimi, Maryam; Zargaran, Arman

    2015-01-01

    Cardiovascular diseases are major health complications currently in various societies. Management of heart diseases as a prevention step or as treatment with low-cost procedures like lifestyle modifications including nutrition are important current trends. Although the term nutrition dates back to 2 past centuries, Persian physicians contributed to this term at least from 1000 years ago. Rhazes (865-925 AD) was one of the pioneers in this field. He preferred using foods in treating illnesses. "Foods and drinks" were 1 subject from 6 principles (Setteh Zarorieh) that Persian physicians believed can affect human health. In this review, we described some medieval Persian views on the role of nutrition in heart diseases and compare their prescriptions with current findings. Interestingly, current investigations mostly support Persian medicine principles. Historically, this work shows that the concept of nutrition in heart diseases has had a successful background at least from 1000 years ago in Persia. © The Author(s) 2014.

  16. Determinants for acceptance of preventive treatment against heart disease - a web-based population survey.

    Science.gov (United States)

    Bo, Nielsen Jesper; Ejg, Jarbøl Dorte; Dorte, Gyrd-Hansen; Lind, Barfoed Benedicte Marie; Veldt, Larsen Pia

    2014-08-02

    Patients' perception of risk and their lifestyle choices are of major importance in the treatment of common chronic diseases. This study reveals determinants for and knowledge about why people accept or reject preventive medical interventions against heart disease. A representative sample of 40-60-year-old Danish inhabitants was invited to participate in a web-based survey. The respondents were presented with a hypothetical scenario and asked to imagine that they were at an increased risk of heart disease, and subsequently presented with an offer of a preventive medical intervention. The aim was to elicit preference structures when potential patients are presented with different treatment conditions. About one third of the respondents were willing to accept preventive medical treatment. Respondents with personal experience with heart disease were more likely to accept treatment than respondents with family members with heart disease or no prior experience with heart disease. The willingness to accept treatment was similar for both genders, and when adjusting for experience with heart disease, age was not associated with willingness to accept treatment. Socioeconomic status in terms of lower education was positively associated with acceptance. The price of treatment reduced willingness to accept for the lower income groups, whereas it had no effect in the highest income group. Some 57% of respondents who were willing to accept treatment changed their decision following information on potential side effects. In accordance with our pre-study hypothesis, individuals with low income were more sensitive to price than individuals with high income. Thus, if the price of preventive medication increases above certain limits, a substantial proportion of the population may refrain from treatment. More than half of the respondents who were initially willing to accept treatment changed their decision when informed about the presence of potential side effects. This is an

  17. Heart Lesion After the First Attack of the Rheumatic Fever 22 Years Experience in Single Centre

    OpenAIRE

    Bejiqi, Ramush A.; Retkoceri, Ragip; Zeka, Naim; Bejiqi, Hana; Retkoceri, Arber

    2015-01-01

    Background: Acute rheumatic fever and its sequels, rheumatic heart diseases, remain major unsolved preventable health problems in Kosovo population, particularly among the disadvantages indigenous Albanian and Egyptians people. In Kosovo, despite of performing secondary prophylaxis with benzathine penicillin, acute rheumatic fever hospitalization rates have remained essentially unchanged for the last 20 years. The role of echocardiography in the diagnosis of acute rheumatic carditis was estab...

  18. Wine and heart health

    Science.gov (United States)

    Health and wine; Wine and heart disease; Preventing heart disease - wine; Preventing heart disease - alcohol ... more often just to lower your risk of heart disease. Heavier drinking can harm the heart and ...

  19. Preventing Wormhole Attacks on Wireless Ad Hoc Networks: A Graph Theoretic Approach

    National Research Council Canada - National Science Library

    Lazos, L; Poovendran, Radha; Meadows, C; Syverson, P; Chang, L. W

    2005-01-01

    We study the problem of characterizing the wormhole attack, an attack that can be mounted on a wide range of wireless network protocols without compromising any cryptographic quantity or network node...

  20. An Adaptive Approach for Defending against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Muhai Li

    2010-01-01

    Full Text Available In various network attacks, the Distributed Denial-of-Service (DDoS attack is a severe threat. In order to deal with this kind of attack in time, it is necessary to establish a special type of defense system to change strategy dynamically against attacks. In this paper, we introduce an adaptive approach, which is used for defending against DDoS attacks, based on normal traffic analysis. The approach can check DDoS attacks and adaptively adjust its configurations according to the network condition and attack severity. In order to insure the common users to visit the victim server that is being attacked, we provide a nonlinear traffic control formula for the system. Our simulation test indicates that the nonlinear control approach can prevent the malicious attack packets effectively while making legitimate traffic flows arrive at the victim.

  1. Using agility to combat cyber attacks.

    Science.gov (United States)

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  2. Adaptive cyber-attack modeling system

    Science.gov (United States)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  3. Disorders of cardiac hemodynamic in attack period of bronchial asthma in children

    Directory of Open Access Journals (Sweden)

    Kondratiev V.А.

    2016-05-01

    Full Text Available By dopplerechocardiography method there was studied functional state of cardiac ventricles and character of hemodynamic disorders in 48 patients aged 5-17 years in attack period of moderately-severe and severe bronchial asthma. Group of comparison included 40 healthy peers. Disorders of central and peripheral hemodynamic in attack period of bronchial asthma in children were accompanied both by systolic and diastolic dysfunction of the left and right heart ventricles, herewith right ventricle was functioning in the mode of hyperdynamic, and left one – in the mode of hypodynamic. Combined systolic-diastolic variant of dysfunction both of right and left ventricles was developing in 58,3% of patients with moderately-severe and in 91,6% of patients with severe bronchial asthma. In the attack period of bronchial asthma in children equal directionality of systolic and diastolic dysfunction of heart ventricles was developing; this was characterized by synchronization of their function. Assessment of functional interaction of the ventricles under conditions of severe asthma attack showed direct and high (r=0,67 correlative interaction between finding of Tei index of the left and right ventricles, which characterize their systolic function; this, under conditions of increased hemodynamic pre-loading testified to compensatory increase of systolic interaction of ventricles. Direct and high (r=0,69 correlative interaction between time indices of isovolumic relaxation of the left and right ventricles, characterizing their diastolic function, testified to compensatory increase of diastolic interaction of ventricles under conditions of increase of hemodynamic post-loading. Imbalance of central and peripheral link of hemodynamic in attack period of bronchial asthma in children testified to development of cardiac insufficiency, which was compensated predominantly at the expense of increase of heart contractions rate.

  4. Million Hearts 2022: Understanding the Links between Environmental Pollutant Exposure and Cardiovascular and Cerebrovascular Events - Justus-Warren Heart Disease and Stroke Prevention Task Force

    Science.gov (United States)

    The webinar was requested by the Justus-Warren Heart Disease and Stroke Prevention Task Force. From their website, “The task force was established in 1995 in North Carolina to provide statewide leadership for the prevention and management of cardiovascular disease. Meetings are...

  5. Problem: Heart Valve Regurgitation

    Science.gov (United States)

    ... should be completely closed For example: Watch an animation of mitral valve regurgitation A leaking mitral valve ... Not Alone Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  6. European Consensus on Primary Prevention of Coronary Heart Disease.

    Science.gov (United States)

    Assmann, G

    1988-07-01

    The European Consensus on Primary Prevention of Coronary Heart Disease has recommended that providing care for individuals at particular risk for coronary artery disease (CAD) requires case finding through medical examinations in primary care, hospital and employment health examination settings. Decisions concerning management of elevated lipid levels should be based on overall cardiovascular risk. The goal of reducing cholesterol levels through risk reduction can ultimately be accomplished only with the implementation of health education efforts directed toward all age groups and actions by government and supranational agencies, including adequate food labelling to identify fat content, selective taxation to encourage healthful habits and wider availability of exercise facilities. Only measures directed at the overall population can eventually reach the large proportion of individuals at mildly to moderately increased risk for CAD. The European Policy Statement on the Prevention of Coronary Heart Disease recognizes that the question of lipid elevation as a risk factor for CAD involves assessment, not only of cholesterol level alone, but also of triglycerides and the HDL cholesterol lipid fraction. Five specific categories of dyslipidemia have been identified, with individualized screening and treatment strategies advised for each. It is the consensus of the study group panel members that these procedures are both practical and feasible. They begin the necessary long term process to reduce the unacceptably high levels of morbidity and mortality due to CAD throughout the European community.

  7. SDN-Based Double Hopping Communication against Sniffer Attack

    Directory of Open Access Journals (Sweden)

    Zheng Zhao

    2016-01-01

    Full Text Available Sniffer attack has been a severe threat to network communication security. Traditional network usually uses static network configuration, which provides convenience to sniffer attack. In this paper, an SDN-based double hopping communication (DHC approach is proposed to solve this problem. In DHC, ends in communication packets as well as the routing paths are changed dynamically. Therefore, the traffic will be distributed to multiple flows and transmitted along different paths. Moreover, the data from multiple users will be mixed, bringing difficulty for attackers in obtaining and recovering the communication data, so that sniffer attack will be prevented effectively. It is concluded that DHC is able to increase the overhead of sniffer attack, as well as the difficulty of communication data recovery.

  8. Pulse pressure as a haemodynamic variable in systolic heart failure

    NARCIS (Netherlands)

    Petrie, Colin James

    2016-01-01

    In patients with heart failure, the heart is unable to pump enough blood to satisfy the requirements of the body. Explanations for this include heart muscle damage after a heart attack. This could be very recently, or in the past, sometimes dating back many years. In other cases the explanation for

  9. A Review Of Recent Cyber-Attacks In Fiji

    Directory of Open Access Journals (Sweden)

    Neeraj A. Sharma

    2015-08-01

    Full Text Available Computing technology has evolved in such dramatic ways that a child can use such technology and their features. Internet is one such technology which allows peripheral devices to be connected to each other creating a network to share information. In the same way information can be attacked. In this paper we will be discussing the different types of cyber-attack that recently took place in Fiji. Common attacks discussed in this review paper are phishing email scams website defacement and skimming. Apart from common preventative methods some novel recommendations have been made. We believe the Fiji experiences and recommendations will assist technology users prepare better against such attacks.

  10. Detection and Prevention of Denial of Service (DoS Attacks in Mobile Ad Hoc Networks using Reputation-based Incentive Schemes

    Directory of Open Access Journals (Sweden)

    Mieso, K Denko

    2005-08-01

    Full Text Available Mobile ad hoc networks (MANETs are dynamic mobile networks that can be formed in the absence of any pre-existing communication infrastructure. In addition to node mobility, a MANET is characterized by limited resources such as bandwidth, battery power, and storage space. The underlying assumption in MANETs is that the intermediate nodes cooperate in forwarding packets. However, this assumption does not hold in commercial and emerging civilian applications. MANETs are vulnerable to Denial of Service (DoS due to their salient characteristics. There is a need to provide an incentive mechanism that can provide cooperation among nodes in the network and improve overall network performance by reducing DoS attacks. In this paper, we propose a reputation-based incentive mechanism for detecting and preventing DoS attacks. DoS attacks committed by selfish and malicious nodes were investigated. Our scheme motivates nodes to cooperate and excludes them from the network only if they fail to do so. We evaluated the performance of our scheme using the packet delivery ratio, the routing and communication overhead, and misbehaving node detection in a discrete event-simulation environment. The results indicate that a reputation-based incentive mechanism can significantly reduce the effect of DoS attacks and improve performance in MANETs.

  11. Recognizing Advanced Heart Failure and Knowing Your Options

    Science.gov (United States)

    ... and Live Our Interactive Cardiovascular Library has detailed animations and illustrations to help you learn about conditions, treatments and procedures related to heart disease and stroke. Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  12. Human behaviour can trigger large carnivore attacks in developed countries.

    Science.gov (United States)

    Penteriani, Vincenzo; Delgado, María del Mar; Pinchera, Francesco; Naves, Javier; Fernández-Gil, Alberto; Kojola, Ilpo; Härkönen, Sauli; Norberg, Harri; Frank, Jens; Fedriani, José María; Sahlén, Veronica; Støen, Ole-Gunnar; Swenson, Jon E; Wabakken, Petter; Pellegrini, Mario; Herrero, Stephen; López-Bao, José Vicente

    2016-02-03

    The media and scientific literature are increasingly reporting an escalation of large carnivore attacks on humans in North America and Europe. Although rare compared to human fatalities by other wildlife, the media often overplay large carnivore attacks on humans, causing increased fear and negative attitudes towards coexisting with and conserving these species. Although large carnivore populations are generally increasing in developed countries, increased numbers are not solely responsible for the observed rise in the number of attacks by large carnivores. Here we show that an increasing number of people are involved in outdoor activities and, when doing so, some people engage in risk-enhancing behaviour that can increase the probability of a risky encounter and a potential attack. About half of the well-documented reported attacks have involved risk-enhancing human behaviours, the most common of which is leaving children unattended. Our study provides unique insight into the causes, and as a result the prevention, of large carnivore attacks on people. Prevention and information that can encourage appropriate human behaviour when sharing the landscape with large carnivores are of paramount importance to reduce both potentially fatal human-carnivore encounters and their consequences to large carnivores.

  13. Blind Data Attack on BGP Routers

    Science.gov (United States)

    2017-03-01

    Second Reader Dr. Cynthia Irvine Chair, Cyber Academic Group iii THIS PAGE INTENTIONALLY LEFT BLANK iv ABSTRACT Transport Communication Protocol (TCP...Postgraduate School. The experience of higher learning at this institution was incredible, and I would whole-heartedly recommend it to any of my peers and...data attack packets to the victim device. Scapy is a Python library that is used to craft and send packets [28]. BGP is supported in Python through

  14. Study of DSR and AODV under Sinkhole Attack and Its Proposed Prevention Technique

    OpenAIRE

    Winnie Main; Narendra M. Shekokar

    2014-01-01

    Mobile Ad-hoc Networks (MANET) are wireless mobile nodes that communicate without any predefined infrastructure. This allows MANETs to be easily setup in geographical and terrestrial constraints. To achieve this kind of communication MANET routing protocols play an important role. Two routing protocols, DSR and AODV are studied in detail. This basic trait of a MANET makes its routing protocols very vulnerable to security attacks. One such attack is the ‘Sinkhole’ attack which ...

  15. Neutralizing SQL Injection Attack Using Server Side Code Modification in Web Applications

    Directory of Open Access Journals (Sweden)

    Asish Kumar Dalai

    2017-01-01

    Full Text Available Reports on web application security risks show that SQL injection is the top most vulnerability. The journey of static to dynamic web pages leads to the use of database in web applications. Due to the lack of secure coding techniques, SQL injection vulnerability prevails in a large set of web applications. A successful SQL injection attack imposes a serious threat to the database, web application, and the entire web server. In this article, the authors have proposed a novel method for prevention of SQL injection attack. The classification of SQL injection attacks has been done based on the methods used to exploit this vulnerability. The proposed method proves to be efficient in the context of its ability to prevent all types of SQL injection attacks. Some popular SQL injection attack tools and web application security datasets have been used to validate the model. The results obtained are promising with a high accuracy rate for detection of SQL injection attack.

  16. Implementation of Telephone-Based Secondary Preventive Intervention after Stroke and Transient Ischemic Attack - Participation Rate, Reasons for Nonparticipation and One-Year Mortality

    Directory of Open Access Journals (Sweden)

    Anna-Lotta Irewall

    2014-02-01

    Full Text Available Background and Purpose: Patients who experience a stroke or transient ischemic attack (TIA are known to be at high risk of subsequent vascular events, underscoring the need for secondary preventive intervention. However, previous studies have indicated insufficiency in the implementation of secondary prevention, emphasizing the need to develop effective methods of follow-up. In the present study, we examined the potential of implementing a telephone-based, nurse-led, secondary preventive follow-up in stroke and TIA patients on a population level by analyzing the participation rate, reasons for nonparticipation, and one-year mortality. Methods: Between January 1, 2010 and December 31, 2011, all patients admitted to Östersund hospital, Sweden, and diagnosed with either stroke or TIA were considered for inclusion into the secondary preventive follow-up. Baseline data were collected at the hospital, and reasons for nonparticipation were documented. Multivariate logistic regression was performed to identify predictors of the patient decision not to participate and to explore independent associations between baseline characteristics and exclusion. A one-year follow-up of mortality was also performed; the survival functions of the three groups (included, excluded, declining participation was calculated using the Kaplan-Meier estimator. Results: From a total of 810 identified patients, 430 (53.1% were included in the secondary preventive follow-up, 289 (35.7% were excluded mainly due to physical or cognitive disability, and 91 (11.2% declined participation. Age ≥85 years, ischemic and hemorrhagic stroke, modified Rankin scale score >3, body mass index ≥25, congestive heart failure, and lower education level were independently associated with exclusion, whereas lower education level was the only factor independently associated with the patient decision not to participate. Exclusion was associated with a more than 12 times higher risk of mortality

  17. Heart Rate and Initial Presentation of Cardiovascular Diseases (Caliber)

    Science.gov (United States)

    2013-09-17

    Abdominal Aortic Aneurysm; Coronary Heart Disease NOS; Unheralded Coronary Death; Intracerebral Haemorrhage; Heart Failure; Ischemic Stroke; Myocardial Infarction; Stroke; Peripheral Arterial Disease; Stable Angina Pectoris; Subarachnoid Haemorrhage; Transient Ischemic Attack; Unstable Angina; Cardiac Arrest, Sudden Cardiac Death

  18. Inflammation and neuropathic attacks in hereditary brachial plexus neuropathy

    Science.gov (United States)

    Klein, C; Dyck, P; Friedenberg, S; Burns, T; Windebank, A; Dyck, P

    2002-01-01

    Objective: To study the role of mechanical, infectious, and inflammatory factors inducing neuropathic attacks in hereditary brachial plexus neuropathy (HBPN), an autosomal dominant disorder characterised by attacks of pain and weakness, atrophy, and sensory alterations of the shoulder girdle and upper limb muscles. Methods: Four patients from separate kindreds with HBPN were evaluated. Upper extremity nerve biopsies were obtained during attacks from a person of each kindred. In situ hybridisation for common viruses in nerve tissue and genetic testing for a hereditary tendency to pressure palsies (HNPP; tomaculous neuropathy) were undertaken. Two patients treated with intravenous methyl prednisolone had serial clinical and electrophysiological examinations. One patient was followed prospectively through pregnancy and during the development of a stereotypic attack after elective caesarean delivery. Results: Upper extremity nerve biopsies in two patients showed prominent perivascular inflammatory infiltrates with vessel wall disruption. Nerve in situ hybridisation for viruses was negative. There were no tomaculous nerve changes. In two patients intravenous methyl prednisolone ameliorated symptoms (largely pain), but with tapering of steroid dose, signs and symptoms worsened. Elective caesarean delivery did not prevent a typical postpartum attack. Conclusions: Inflammation, probably immune, appears pathogenic for some if not all attacks of HBPN. Immune modulation may be useful in preventing or reducing the neuropathic attacks, although controlled trials are needed to establish efficacy, as correction of the mutant gene is still not possible. The genes involved in immune regulation may be candidates for causing HBPN disorders. PMID:12082044

  19. Preventive strike vs. false targets and protection in defense strategy

    International Nuclear Information System (INIS)

    Levitin, Gregory; Hausken, Kjell

    2011-01-01

    A defender allocates its resource between defending an object passively and striking preventively against an attacker seeking to destroy the object. With no preventive strike the defender distributes its entire resource between deploying false targets, which the attacker cannot distinguish from the genuine object, and protecting the object. If the defender strikes preventively, the attacker's vulnerability depends on its protection and on the defender's resource allocated to the strike. If the attacker survives, the object's vulnerability depends on the attacker's revenge attack resource allocated to the attacked object. The optimal defense resource distribution between striking preventively, deploying the false targets and protecting the object is analyzed. Two cases of the attacker strategy are considered: when the attacker attacks all of the targets and when it chooses a number of targets to attack. An optimization model is presented for making a decision about the efficiency of the preventive strike based on the estimated attack probability, dependent on a variety of model parameters.

  20. Cyber attacks, countermeasures, and protection schemes — A state of the art survey

    OpenAIRE

    Shabut, Antesar M.; Lwin, K.T.; Hossain, M.A.

    2017-01-01

    Thousands of cyber-attacks (fraudulent online activities to acquire users’ sensitive information via email, during online transactions, live video streaming, online gaming and browsing) are launched every day against Internet users across the world. To prevent these attacks, researchers have responded with a number of protection systems. Currently, the methods which cyber-attackers use to conduct attacks is associated with exploiting humans. Such attacks are recorded more frequently than befo...

  1. Establishing an Effective Combat Strategy for Prevalent Cyber- Attacks

    OpenAIRE

    Vivian Ogochukwu Nwaocha; Inyiama H.C.

    2011-01-01

    As organisations continue to incorporate the Internet as a key component of their operations, the global cyber-threat level is increasing. One of the most common types of cyber-threats is known as the Distributed Denial of Service (DDoS) attack – an attack preventing users from accessing a system for a period of time. Recent DDoS attacks have left large corporate and government networks inaccessible to customers, partners and users for hours or days, resulting in significant financial, reputa...

  2. Vital Signs – Preventable Deaths from Heart Disease and Stroke

    Centers for Disease Control (CDC) Podcasts

    2013-09-03

    This podcast is based on the September 2013 CDC Vital Signs report. More than 800,000 Americans die each year from heart disease and stroke. Learn how to manage all the major risk factors.  Created: 9/3/2013 by Centers for Disease Control and Prevention (CDC).   Date Released: 9/3/2013.

  3. Protecting mobile agents from external replay attacks

    OpenAIRE

    Garrigues Olivella, Carles; Migas, Nikos; Buchanan, William; Robles, Sergi; Borrell Viader, Joan

    2014-01-01

    Peer-reviewed This paper presents a protocol for the protection of mobile agents against external replay attacks. This kind of attacks are performed by malicious platforms when dispatching an agent multiple times to a remote host, thus making it reexecute part of its itinerary. Current proposals aiming to address this problem are based on storing agent identifiers, or trip markers, inside agent platforms, so that future reexecutions can be detected and prevented. The problem of these solut...

  4. Subclinical endophthalmitis following a rooster attack.

    Science.gov (United States)

    Lekse Kovach, Jaclyn; Maguluri, Srilakshmi; Recchia, Franco M

    2006-12-01

    Ocular injury resulting from rooster attacks is rarely reported in the literature. Sadly, the target of these attacks is most often children younger than 3 years old, whose naiveté of the aggressive, territorial behavior of birds can place them at risk. Acute sequelae of these attacks can result in a lifetime of visual impairment. The possibility of a subacute or occult infection is an unusual occurrence that must always be considered. In an effort to prevent future attacks and ocular casualties, we present a case of a 12-month-old boy who suffered an open globe following a rooster attack. The open globe was emergently repaired. One week later, a white cataract was noticed on examination in the absence of systemic or ocular signs of inflammation. Traumatic endophthalmitis and lenticular abscess were suspected during examination under anesthesia. Vitrectomy, lensectomy, and injection of intravitreal antibiotics were performed. Culture of lenticular and vitreous aspirates grew alpha-streptococcus. Alpha-streptococcal endophthalmitis can result from ocular injuries caused by rooster pecking. The infection may present insidiously and without typical ocular or systemic symptoms or signs. Management is challenging and may require surgery.

  5. Challenges to developing effective streptococcal vaccines to prevent rheumatic fever and rheumatic heart disease

    Directory of Open Access Journals (Sweden)

    Sharma A

    2014-05-01

    Full Text Available Abhinay Sharma, D Patric Nitsche-SchmitzDepartment of Medical Microbiology, Helmholtz Center for Infection Research, Braunschweig, GermanyAbstract: Acute rheumatic fever is a sequela of Streptococcus pyogenes and potentially of Streptococcus dysgalactiae subsp. equisimilis infections. Acute rheumatic fever is caused by destructive autoimmunity and inflammation in the extracellular matrix and can lead to rheumatic heart disease, which is the most frequent cardiologic disease that is acquired in youth. Although effective treatments are available, acute rheumatic fever and rheumatic heart disease remain serious threats to human health, which affect millions and cause high economic losses. This has motivated the search for a vaccine that prevents the causative streptococcal infections. A variety of potential vaccine candidates have been identified and investigated in the past. Today, new approaches are applied to find alternative candidates. Nevertheless, several obstacles lie in the way of an approved S. pyogenes vaccine for use in humans. Herein, a subjective selection of promising vaccine candidates with respect to the prevention of acute rheumatic fever/rheumatic heart disease and safety regarding immunological side effects is discussed.Keywords: autoimmune disease, side effects, M protein vaccine, molecular mimicry, coiled-coil, collagen binding, PARF

  6. Preventing Heart Disease - At Any Age

    Science.gov (United States)

    ... Check Recipe Certification Program Nutrition Requirements Heart-Check Professional Resources Contact the Heart-Check Certification Program Simple Cooking and Recipes Dining Out Choosing a Restaurant Deciphering ...

  7. Integrating Million Hearts into nursing and interprofessional educational curricula and community settings: a key strategy for improving population health across the United States.

    Science.gov (United States)

    Sustersic Gawlik, Kate; Mazurek Melnyk, Bernadette

    2015-01-01

    Million Hearts is a national initiative to prevent 1 million heart attacks and strokes by 2017 by screening and educating the public on the "ABCS" of cardiovascular health. Million Hearts is an innovative platform for educating nursing and health sciences students on the importance of population health and interprofessional teamwork. The National Interprofessional Education and Practice Consortium to Advance Million Hearts was created, and a free on-line educational module was developed to help health care professionals and health sciences faculty and students learn about the Million Hearts initiative, conduct community screenings, and refer people who screen positive to appropriate resources. After completion of the module, individuals receive certification as a Million Hearts Fellow. More than 2,500 individuals from 80 colleges across the United States have accessed the module. More than 20,000 people have been screened. The module and screenings have been incorporated into health sciences curricula and community activities. Academic institutions and health science professions partnering together as part of the National Interprofessional Education and Practice Consortium to Advance Million Hearts provide a unique opportunity to demonstrate the impact that a unified approach can have on improving population health through the use of screening, education, and prevention. Copyright © 2015 Elsevier Inc. All rights reserved.

  8. [Prevention of coronary heart disease: smoking].

    Science.gov (United States)

    Heitzer, T; Meinertz, T

    2005-01-01

    Smoking is the leading preventable cause of illness and premature death in Germany, claiming over 110,000 lives a year because it directly increases the risk of dying from heart disease, stroke, emphysema and a variety of cancers. The overwhelming majority of smokers begin tobacco use before they reach adulthood. Among those young people who smoke, the average age is now 13-14. In Germany, about 39% of male and 31% of female adults (age 18-60 years) continue to smoke, despite information about the unequivocally negative health consequences of smoking. The exact mechanisms of smoking-related vascular disease are not yet known. Smoking causes acute hemodynamic alterations such as increase in heart rate, systematic and coronary vascular resistance, myocardial contractility, and myocardial oxygen demand. These short-term effects could lower the ischemic threshold in smokers with coronary artery disease and contribute to the increased risk for acute cardiovascular events. Endothelial damage is thought to be an initiating event in atherosclerosis and early studies have demonstrated that long-term smoking has direct toxic effects with structural changes of human endothelial cells. Recent research has shown the importance of the functional role of the endothelium in regulating vascular tone, platelet-endothelial interactions, leukocyte adhesion and smooth muscle cell proliferation via synthesis and release of a variety of substances such as nitric oxide. There is strong evidence that smoking leads to endothelial dysfunction mainly by increased inactivation of nitric oxide by oxygen-derived free radicals. Smoking also increases oxidative modification of LDL and is associated with lower HDL plasma levels. Smoking induces a systemic inflammatory response with increased leukocyte count and elevation of the C-reactive protein level. Importantly, the prothrombotic effects of smoking have been repeatedly demonstrated to cause alterations in platelet function, imbalance of

  9. Heart Health Tests for Diabetes Patients

    Science.gov (United States)

    ... or fluids in the body. They include: Electrocardiogram ("EKG" or "ECG") This test measures the electrical activity ... Tools & Resources Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  10. Oral anticoagulation for stroke prevention amongst atrial fibrillation patients with valvular heart disease: an update.

    Science.gov (United States)

    Ha, Andrew C T; Verma, Atul; Verma, Subodh

    2017-03-01

    The majority of evidence on the safety and efficacy of oral anticoagulation for stroke prevention amongst patients with atrial fibrillation is derived from those without significant valvular heart disease. This article will review current knowledge, areas of uncertainty and controversy, and ongoing research on oral anticoagulation for stroke prevention amongst patients with valvular heart disease. The rates of stroke, systemic embolism, and major bleeding were similar for patients with and without significant native valvular disease when treated with direct oral anticoagulants (DOACs) or vitamin K antagonists. There are very limited prospective data on the safety and efficacy of DOAC use for patients with bioprosthetic valves or rheumatic mitral stenosis. Atrial fibrillation patients with concomitant valvulopathies constitute a group with high thromboembolic risk and should be treated with oral anticoagulation. There is good supportive evidence that DOAC is well tolerated and effective in preventing thromboembolism amongst patients with native valvular disease. Further research is underway to better define the risks and benefits of DOAC use among patients with bioprosthetic valves or rheumatic mitral stenosis in preventing thromboembolic events. Until then, vitamin K antagonists remain the oral anticoagulant of choice for these patient subsets.

  11. Why cryptography should not rely on physical attack complexity

    CERN Document Server

    Krämer, Juliane

    2015-01-01

    This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successfully implemented in practice, they have generally not been considered a serious threat. In short, their physical attack complexity has been overestimated and the implied security threat has been underestimated. First, the book introduces the photonic side channel, which offers not only temporal resolution, but also the highest possible spatial resolution. Due to the high cost of its initial implementation, it has not been taken seriously. The work shows both simple and differential photonic side channel analyses. Then, it presents a fault attack against pairing-based cryptography. Due to the need for at least two indepe...

  12. DoS attacks targeting SIP server and improvements of robustness

    OpenAIRE

    Vozňák, Miroslav; Šafařík, Jakub

    2012-01-01

    The paper describes the vulnerability of SIP servers to DoS attacks and methods for server protection. For each attack, this paper describes their impact on a SIP server, evaluation of the threat and the way in which they are executed. Attacks are described in detail, and a security precaution is made to prevent each of them. The proposed solution of the protection is based on a specific topology of an intrusion protection systems components consisting of a combination of...

  13. Modeling attacker-defender interactions in information networks.

    Energy Technology Data Exchange (ETDEWEB)

    Collins, Michael Joseph

    2010-09-01

    The simplest conceptual model of cybersecurity implicitly views attackers and defenders as acting in isolation from one another: an attacker seeks to penetrate or disrupt a system that has been protected to a given level, while a defender attempts to thwart particular attacks. Such a model also views all non-malicious parties as having the same goal of preventing all attacks. But in fact, attackers and defenders are interacting parts of the same system, and different defenders have their own individual interests: defenders may be willing to accept some risk of successful attack if the cost of defense is too high. We have used game theory to develop models of how non-cooperative but non-malicious players in a network interact when there is a substantial cost associated with effective defensive measures. Although game theory has been applied in this area before, we have introduced some novel aspects of player behavior in our work, including: (1) A model of how players attempt to avoid the costs of defense and force others to assume these costs; (2) A model of how players interact when the cost of defending one node can be shared by other nodes; and (3) A model of the incentives for a defender to choose less expensive, but less effective, defensive actions.

  14. Chess therapy: A new approach to curing panic attack.

    Science.gov (United States)

    Barzegar, Kazem; Barzegar, Somayeh

    2017-12-01

    To study the effect of playing cell phone chess game on treating panic attack. The chess game on an android cell phone was played by the researcher who was affected by panic attack as a post-traumatic disorder immediately after or before feeling of the start of symptoms. The right level of difficulty, i.e., levels 2-4, was selected for optimal results. Playing chess game on the android cell phone prevented the manifestation of panic attack and led to the cure of this traumatic condition. Chess therapy with the right level of difficulty can be recommended as a very effective non-pharmaceutical method for the successful treatment of panic attacks. Copyright © 2017 Elsevier B.V. All rights reserved.

  15. Heart scanner - who's between a rock and a hard place?

    African Journals Online (AJOL)

    evidence of coronary heart disease succumbs to a fatal heart attack. Cardiac symptoms, positive stress test results and angiographically visible narrowings are all dependent on significant lumenal stenosis. Considerable atherosclerosis can be present in an asymptomatic patient in whom physical examination, stress testing ...

  16. Epidemiology and prevention of coronary heart disease in families.

    Science.gov (United States)

    Higgins, M

    2000-04-01

    Although family histories are used primarily to aid in diagnosis and risk assessment, their value is enhanced when the family is considered as a unit for research and disease prevention. The value of a family history of coronary heart disease (CHD) is increased when the age, sex, number of relatives, and age at onset of disease are incorporated in a quantitative family risk score. Medical and lifestyle risk factors that aggregate in families include dyslipidemia, hypertension, obesity, hyperfibrinogenemia, diabetes mellitus, smoking habits, eating patterns, alcohol consumption, physical activity, and socioeconomic status. Advances in detecting and understanding interactions between genetic susceptibility and modifiable risk factors should lead to improvements in prevention and treatment. However, working with families can be difficult. In the United States, families are usually small, are often widely dispersed, and may not be intact. Family histories may be unknown, affected relatives may be dead, and secular trends mask similarities among generations. Many exposures occur outside the home, and families change over time. Ethical, legal, and social issues arise when dealing with families. Nevertheless, opportunities are missed when research, clinical practice, and prevention focus on individual patients. Greater emphasis on families is needed to reduce the burden of CHD.

  17. Genetic risk, coronary heart disease events, and the clinical benefit of statin therapy: an analysis of primary and secondary prevention trials.

    Science.gov (United States)

    Mega, J L; Stitziel, N O; Smith, J G; Chasman, D I; Caulfield, M; Devlin, J J; Nordio, F; Hyde, C; Cannon, C P; Sacks, F; Poulter, N; Sever, P; Ridker, P M; Braunwald, E; Melander, O; Kathiresan, S; Sabatine, M S

    2015-06-06

    Genetic variants have been associated with the risk of coronary heart disease. In this study, we tested whether or not a composite of these variants could ascertain the risk of both incident and recurrent coronary heart disease events and identify those individuals who derive greater clinical benefit from statin therapy. A community-based cohort study (the Malmo Diet and Cancer Study) and four randomised controlled trials of both primary prevention (JUPITER and ASCOT) and secondary prevention (CARE and PROVE IT-TIMI 22) with statin therapy, comprising a total of 48,421 individuals and 3477 events, were included in these analyses. We studied the association of a genetic risk score based on 27 genetic variants with incident or recurrent coronary heart disease, adjusting for traditional clinical risk factors. We then investigated the relative and absolute risk reductions in coronary heart disease events with statin therapy stratified by genetic risk. We combined data from the different studies using a meta-analysis. When individuals were divided into low (quintile 1), intermediate (quintiles 2-4), and high (quintile 5) genetic risk categories, a significant gradient in risk for incident or recurrent coronary heart disease was shown. Compared with the low genetic risk category, the multivariable-adjusted hazard ratio for coronary heart disease for the intermediate genetic risk category was 1·34 (95% CI 1·22-1·47, pgenetic risk category was 1·72 (1·55-1·92, pgenetic risk categories. Similarly, we noted greater absolute risk reductions in those individuals in higher genetic risk categories (p=0·0101), resulting in a roughly threefold decrease in the number needed to treat to prevent one coronary heart disease event in the primary prevention trials. Specifically, in the primary prevention trials, the number needed to treat to prevent one such event in 10 years was 66 in people at low genetic risk, 42 in those at intermediate genetic risk, and 25 in those at high

  18. AntibIoTic: Protecting IoT Devices Against DDoS Attacks

    DEFF Research Database (Denmark)

    De Donno, Michele; Dragoni, Nicola; Giaretta, Alberto

    2018-01-01

    The 2016 is remembered as the year that showed to the world how dangerous Distributed Denial of Service attacks can be. Gauge of the disruptiveness of DDoS attacks is the number of bots involved: the bigger the botnet, the more powerful the attack. This character, along with the increasing...... availability of connected and insecure IoT devices, makes DDoS and IoT the perfect pair for the malware industry. In this paper we present the main idea behind AntibIoTic, a palliative solution to prevent DDoS attacks perpetrated through IoT devices....

  19. SDN-based path hopping communication against eavesdropping attack

    Science.gov (United States)

    Zhang, Chuanhao; Bu, Youjun; Zhao, Zheng

    2016-10-01

    Network eavesdropping is one of the most popular means used by cyber attackers, which has been a severe threat to network communication security. Adversaries could capture and analyze network communication data from network nodes or links, monitor network status and steal sensitive data such as username and password etc. Traditional network usually uses static network configuration, and existing defense methods, including firewall, IDS, IPS etc., cannot prevent eavesdropping, which has no distinguishing characteristic. Network eavesdropping become silent during most of the time of the attacking process, which is why it is difficult to discover and to defend. But A successful eavesdropping attack also has its' precondition, which is the target path should be relatively stable and has enough time of duration. So, In order to resolve this problem, it has to work on the network architecture. In this paper, a path hopping communication(PHC) mechanism based on Software Define Network (SDN) was proposed to solve this problem. In PHC, Ends in communication packets as well as the routing paths were changed dynamically. Therefore, the traffic would be distributed to multiple flows and transmitted along different paths. so that Network eavesdropping attack could be prevented effectively. It was concluded that PHC was able to increase the overhead of Network eavesdropping, as well as the difficulty of communication data recovery.

  20. HEART FAILURE – KEEPING STEP WITH THE PROGRESS

    Directory of Open Access Journals (Sweden)

    Camelia Diaconu

    2018-06-01

    Full Text Available Chronic heart failure continues to represent a major problem for the healthcare systems worldwide, because of high prevalence and impact on patients’ quality of life. Between May 25-28, 2018, in Vienna, Austria, took place the European Congress of Heart Failure and the World Congress on Acute Heart Failure, organized by the European Society of Cardiology. The congress was a forum of exchanging expertise in diagnosis and treatment of heart failure, and also an opportunity to present the latest progresses regarding the management of this pathology. It seems that an integrated, multidisciplinary team approach is the future for heart failure management. This team should include internists, cardiologists, general practitioners, and nurses. The new President of the Heart Failure Association of the European Society of Cardiology is from a Balkan country, Prof. Petar M. Seferovic, from the Belgrade University Medical Center, Serbia. In one of his presentations, Prof. Seferovic highlighted that the treatment of chronic heart failure should explore new frontiers. Recently, there is much interest in established antidiabetic drugs to treat cardiovascular complications of diabetes. Introduction of sodium-glucose transport protein 2 (SGLT2 inhibitors in the late 1990s was a major breakthrough in the treatment of diabetes complications. These drugs are the only antidiabetic drugs with good results in the treatment of cardiovascular diseases, demonstrated by several large randomized controlled trials, such as EMPA-REG (the first study to demonstrate a significant reduction in both cardiovascular mortality and heart failure-related hospitalization in patients treated with empaglifozin, a SGLT2 inhibitor. SGLT2 inhibitors are now recommended by some guidelines for the prevention of heart failure and associated mortality in patients with type 2 diabetes. The international registry REPORT HF, presented in Vienna, enrolled more than 18,000 patients from 44

  1. Migraine Trainers as Models: the effectiveness of Lay trainerswith migraine for behavioural attack prevention

    NARCIS (Netherlands)

    S.Y.M. Mérelle (Saskia)

    2008-01-01

    textabstractMigraine is a chronic brain disorder, characterized by attacks of severe headache accompanied by nausea, vomiting and sensitivity to light, sound and smell. Attacks can be preceded by premonitory symptoms such as fatigue, muscular stiff ness or negative aff ect. It has been shown that

  2. Preliminary data from {gamma}-cardiography during the abatement of an asthmatic attack (1961); Premieres donnees de la {gamma}-cardiographie au decours de l'etat de mal asthmatique (1961)

    Energy Technology Data Exchange (ETDEWEB)

    Georges, R; Vernejoul, P de; Raynaud, C; Blanchon, P; Kellershohn, C; Turiaf, J [Commissariat a l' Energie Atomique, Saclay (France). Centre d' Etudes Nucleaires

    1961-07-01

    The authors used gamma cardiology during the abatement of 16 cases of asthma with a view to detecting heart attacks not otherwise visible with routine methods of examination: clinical, radiological and electro-cardio-graphical. In gamma cardiology, a radioactive indicator is used and its path followed in the cavities of the heart. The method makes it possible to study the circulation in the right heart, the pulmonary crossing, and the left heart, as well as evaluation of the heart-flow. As a result of their investigations the authors, after having discussed the significance of the data obtained with the method, suggest that it is possible by the use of gamma cardiography during the abatement of an asthma attack: 1- To confirm attacks of the right heart which have already been detected by ordinary methods. 2- To confirm the presence of modifications in the recorded curves which suggest, in the case of the left heart, possible attack; such on attack is also indicated, in a small number of cases, by electrocardiography curves. Some considerations are put forward by the authors concerning the physiopathology of attacks on the left heart. (authors) [French] Les auteurs ont fait appel a la gammacardiographie au decours de 16 cas d'etat de mal asthmatique, dans le but d'objectiver des atteintes cardiaques incapables d'etre revelees par les moyens d'exploration de routine: cliniques, radiologiques et electrocardiographiques. La gammacardiographie est un procede qui enregistre a l'aide d'un indicateur radioactif, le trajet de celui-ci dans les cavites cardiaques. Elle permet l'etude de la circulation dans le coeur droit, de la traversee pulmonaire, et le coeur gauche, de meme que le calcul du debit cardiaque. Au terme de leurs investigations, les auteurs apres avoir discute la signification des donnees fournies par la methode admettent que la gammacardiographie objective au secours de l'etat de mal asthmatique: 1- La confirmation de l'atteinte du coeur droit deja etablie

  3. SCADA system vulnerabilities to cyber attack

    Energy Technology Data Exchange (ETDEWEB)

    Shaw, W. T. [Cyber Security Consulting (Canada)

    2004-10-01

    The susceptibility to terrorist attacks of computer-based supervisory control (SCADA) systems that are used to monitor and control water distribution systems, oil and gas pipelines and the electrical grid, is discussed. The discussion includes ways in which SCADA systems may be attacked and remedial actions that may be taken to reduce or eliminate the possibility of such attacks. Attacks may take the form of causing the system to generate false data to divert attention from impending system disasters, or commandeer the system to seriously disable it, or cause damage to the process or equipment being controlled by sending improper control commands. SCADA systems are also vulnerable to internal threats, either from an accidental action that results in damage, or an intentional action, as for example by a disgruntled employee, or ex-employee, usually by way of reprogramming an RTU or PLC by accessing the polling/communications circuit. Recent SCADA systems are much more susceptible to concerted cyber attacks because of the adoption of IT technologies and standards into the design of such systems. (Older systems are more likely to be unique designs, hence less susceptible to attack). As far as protection of SCADA systems is concerned, there are no technologies that would prevent a technologically sophisticated terrorist or disgruntled employee from doing major damage to the system, however, the IT world has developed a range of technologies for the protection of IT assets, and many of these same technologies can also be used to safeguard modern SCADA systems.

  4. Participation in Heart-Healthy Behaviors: A Secondary Analysis of the American Heart Association Go Red Heart Match Data.

    Science.gov (United States)

    Arslanian-Engoren, Cynthia; Eastwood, Jo-Ann; De Jong, Marla J; Berra, Kathy

    2015-01-01

    The American Heart Association created Go Red Heart Match, a free and secure online program that enables women to connect with each other to fight heart disease either personally or as a caregiver for someone with heart disease. Through these connections, participants have an opportunity to develop a personal, private, and supportive relationship with other women; share common experiences; and motivate and encourage each other to follow a heart-healthy lifestyle. The aims of this study were to describe the demographic characteristics of the Go Red Heart Match responders and to determine whether participation in the program prompted participants to engage in heart-healthy behaviors. A secondary analysis of data collected as part of a needs assessment survey from the American Heart Association Go Red Heart Match was conducted. A total of 117 (35%) of the 334 invited women completed the survey. Most responders were female, married, and college educated. A total of 105 (90%) responders were diagnosed with a type of heart disease or stroke and 77 (73%) responders had undergone treatment. As a result of participating in the program, 75% of the responders reported the following improvements in heart-healthy behaviors: eating a more heart-healthy diet (54%), exercising more frequently (53%), losing weight (47%), and quitting smoking (10%). Responders who had a diagnosis of heart attack (n = 48) were more likely (P = .003) to quit smoking than were those with other diagnoses (n = 69). Notably, 48% of responders reported encouraging someone else in their life to speak to their doctor about their risk for heart disease. Most women who participated in Heart Match reported engaging in new heart-healthy behaviors. The findings support expanding the existing program in a more diverse population as a potentially important way to reach women and encourage cardiovascular disease risk reduction for those with heart disease and stroke.

  5. Secondary prevention- an essential component of the comprehensive rehabilitation of patients with heart failure

    Directory of Open Access Journals (Sweden)

    Pop Dana

    2017-12-01

    Full Text Available Heart failure is currently a real public health problem due to the extremely high morbidity and mortality of this disease. In this context, cardiovascular prevention measures should be implemented as early as possible. In addition to classic prevention measures, a number of extremely important specific recommendations should be considered: informing patients about their underlying disease, identifying the cardiovascular and non-cardiovascular factors that have led to cardiac decompensation, reducing daily salt consumption, monitoring body weight, forbidding smoking and recreational substances, conducting a regular exercise program under supervision, and increasing adherence to treatment.

  6. Effective heart disease prevention: lessons from a qualitative study of user perspectives in Bangladeshi, Indian and Pakistani communities.

    Science.gov (United States)

    Netto, G; McCloughan, L; Bhatnagar, A

    2007-03-01

    Coronary heart disease (CHD) has a high mortality, incidence and prevalence among Indian, Pakistani and Bangladeshi communities in the UK, indicating the need for effective heart disease prevention initiatives for these communities. This paper considers how service user perspectives can be used to develop effective, culturally focused CHD prevention interventions for these target groups by addressing identified barriers, including deeply held cultural beliefs. A qualitative research study, using a longitudinal action research approach. This was a community-based study in Edinburgh. Six focus group discussions--two for each community--were organized with participants from these communities at the beginning of the project. A further six focus group discussions for the same communities were organized six months later. Over the period examined, participants reported varying changes in levels of knowledge relating to the nature, causes and symptoms of CHD. Some participants reported taking slight to significant steps to reduce or prevent heart disease, while others did not. The project was viewed as helpful in increasing knowledge about CHD and preventive measures and encouraging healthier lifestyles. However, persistent barriers to change were also identified, requiring changes to the project that involved not only matching intervention materials and messages to observable, superficial characteristics of the target population, but more fundamental changes that address the cultural, social, historical, environmental and psychological forces that influence health behaviour. CHD prevention initiatives need to identify and respond to deep-rooted influences on health-behaviour in 'at-risk' groups, in addition to superficial characteristics of the target populations. It is important for specific prevention initiatives to be linked into wider CHD frameworks to ensure transferability of learning and integration within wider service provision.

  7. [Acute asthma attacks introduced by anesthesia before nasal endoscopic surgery].

    Science.gov (United States)

    Lü, Xiaofei; Han, Demin; Zhou, Bing; Ding, Bin

    2004-05-01

    In order to pay our attention to the perioperative treatment before nasal endoscopic surgery. Three patients with asthma accompanied chronic sinusitis were analyzed systemically, who had undergone acute attacks of asthma introduced by anesthesia. Anesthetic drugs and instruments can lead to acute attacks of asthma, because sinusitis with asthma means allergic airway inflammation, broncho-hyperreactivity and lower compensatory pulmonary function. Then all of the 3 cases had missed the preoperative treatment. Anesthetic drugs and instruments can lead to acute attacks of asthma. The perioperative treatment before nasal endoscopic surgery is very important for the prevention of the occurrences of this severe complication. Except emergency, the operation should be can celled for avoiding the acute attack of asthma introduced by anesthesia.

  8. Countermeasures Against Blinding Attack on Superconducting Nanowire Detectors for QKD

    Directory of Open Access Journals (Sweden)

    Elezov M.S.

    2015-01-01

    Full Text Available Nowadays, the superconducting single-photon detectors (SSPDs are used in Quantum Key Distribution (QKD instead of single-photon avalanche photodiodes. Recently bright-light control of the SSPD has been demonstrated. This attack employed a “backdoor” in the detector biasing technique. We developed the autoreset system which returns the SSPD to superconducting state when it is latched. We investigate latched state of the SSPD and define limit conditions for effective blinding attack. Peculiarity of the blinding attack is a long nonsingle photon response of the SSPD. It is much longer than usual single photon response. Besides, we need follow up response duration of the SSPD. These countermeasures allow us to prevent blind attack on SSPDs for Quantum Key Distribution.

  9. SYN Flood Attack Detection in Cloud Computing using Support Vector Machine

    Directory of Open Access Journals (Sweden)

    Zerina Mašetić

    2017-11-01

    Full Text Available Cloud computing is a trending technology, as it reduces the cost of running a business. However, many companies are skeptic moving about towards cloud due to the security concerns. Based on the Cloud Security Alliance report, Denial of Service (DoS attacks are among top 12 attacks in the cloud computing. Therefore, it is important to develop a mechanism for detection and prevention of these attacks. The aim of this paper is to evaluate Support Vector Machine (SVM algorithm in creating the model for classification of DoS attacks and normal network behaviors. The study was performed in several phases: a attack simulation, b data collection, cfeature selection, and d classification. The proposedmodel achieved 100% classification accuracy with true positive rate (TPR of 100%. SVM showed outstanding performance in DoS attack detection and proves that it serves as a valuable asset in the network security area.

  10. Noninvasive imaging in the assessment and prevention of coronary heart disease

    International Nuclear Information System (INIS)

    Llerena Rojas, Luis Roberto; Peix Gonzalez, Amalia; Valiente Mustelier, Juan

    2011-01-01

    Echocardiography, multidetector computed tomography, magnetic resonance imaging, and nuclear cardiology can all help prevent coronary heart disease. Echocardiography can identify asymptomatic individuals who are at risk of coronary disease and who should receive aggressive preventative therapy by providing data on the carotid intima-media thickness, arterial stiffness and flow-mediated dilatation of the brachial artery. The calcium score is an independent predictor of cardiac events that influences clinical risk scores such as the Framingham risk score. By using multidetector computed tomography or magnetic resonance imaging for coronary angiography, it is possible to visualize both the lumen and vessel walls of coronary arteries and to discriminate between calcified and noncalcified atherosclerotic plaque before invasive coronary angiography is performed. With nuclear cardiology, the functional effects of atherosclerotic lesions can be evaluated by assessing perfusion and ventricular function simultaneously

  11. [Comparative analysis of phenomenology of paroxysms of atrial fibrillation and panic attacks].

    Science.gov (United States)

    San'kova, T A; Solov'eva, A D; Nedostup, A V

    2004-01-01

    To study phenomenology of attacks of atrial fibrillation (AF) and to compare it with phenomenology of panic attacks for elucidation of pathogenesis of atrial fibrillation and for elaboration of rational therapeutic intervention including those aimed at correction of psychovegetative abnormalities. Patients with nonrheumatic paroxysmal AF (n=105) and 100 patients with panic attacks (n=100). Clinical, cardiological and neurological examination, analysis of patients complaints during attacks of AF, and comparison them with diagnostic criteria for panic attack. It was found that clinical picture of attacks of AF comprised vegetative, emotional and functional neurological phenomena similar to those characteristic for panic attacks. This similarity as well as positive therapeutic effect of clonazepam allowed to propose a novel pathogenic mechanism of AF attacks. Severity of psychovegetative disorders during paroxysm of AF could be evaluated by calculation of psychovegetative iudex: Psychovegetative index should be used for detection of panic attack-like component in clinical picture of AF paroxysm and thus for determination of indications for inclusion of vegetotropic drugs, e. g. clonazepam, in complex preventive therapy.

  12. Knowledge gaps and misconceptions about coronary heart disease among U.S. South Asians.

    Science.gov (United States)

    Kandula, Namratha R; Tirodkar, Manasi A; Lauderdale, Diane S; Khurana, Neerja R; Makoul, Gregory; Baker, David W

    2010-04-01

    Although South Asians are at higher risk for coronary heart disease (CHD) than most other U.S. racial/ethnic groups, very little research has addressed this disparity. As a first step in developing culturally targeted CHD prevention messages for this rapidly growing community, this study examined South Asians' knowledge and beliefs about CHD. Analyses, conducted in 2009, were based on data collected from January to July 2008 in a cross-sectional study population of 270 South Asian adults in Illinois. Interviews were conducted in English, Hindi, or Urdu using a standardized questionnaire. Multivariate regression models were used to examine the associations between sociodemographics and CHD knowledge and attitudes about preventability. Eighty-one percent of respondents had one or more CHD risk factors. Most participants (89%) said they knew little or nothing about CHD. Stress was the most frequently mentioned risk factor (44%). Few mentioned controlling blood pressure (11%); cholesterol (10%); and diabetes (5%) for prevention. Fifty-three percent said that heart attacks are not preventable. Low education level, being interviewed in Urdu or Hindi, and low level of acculturation were associated with less knowledge and believing that CHD is not preventable. A majority of South Asians in this study believed that CHD is not preventable and had low awareness of modifiable risk factors. As a first step, CHD education should target the knowledge gaps that may affect risk factor control and behavior change. Educational messages may need to be somewhat different for subgroups (e.g., by education and language) to be maximally effective. 2010 American Journal of Preventive Medicine. Published by Elsevier Inc. All rights reserved.

  13. Time-Efficient Cloning Attacks Identification in Large-Scale RFID Systems

    Directory of Open Access Journals (Sweden)

    Ju-min Zhao

    2017-01-01

    Full Text Available Radio Frequency Identification (RFID is an emerging technology for electronic labeling of objects for the purpose of automatically identifying, categorizing, locating, and tracking the objects. But in their current form RFID systems are susceptible to cloning attacks that seriously threaten RFID applications but are hard to prevent. Existing protocols aimed at detecting whether there are cloning attacks in single-reader RFID systems. In this paper, we investigate the cloning attacks identification in the multireader scenario and first propose a time-efficient protocol, called the time-efficient Cloning Attacks Identification Protocol (CAIP to identify all cloned tags in multireaders RFID systems. We evaluate the performance of CAIP through extensive simulations. The results show that CAIP can identify all the cloned tags in large-scale RFID systems fairly fast with required accuracy.

  14. Smartphone electrographic monitoring for atrial fibrillation in acute ischemic stroke and transient ischemic attack.

    Science.gov (United States)

    Tu, Hans T; Chen, Ziyuan; Swift, Corey; Churilov, Leonid; Guo, Ruibing; Liu, Xinfeng; Jannes, Jim; Mok, Vincent; Freedman, Ben; Davis, Stephen M; Yan, Bernard

    2017-10-01

    Rationale Paroxysmal atrial fibrillation is a common and preventable cause of devastating strokes. However, currently available monitoring methods, including Holter monitoring, cardiac telemetry and event loop recorders, have drawbacks that restrict their application in the general stroke population. AliveCor™ heart monitor, a novel device that embeds miniaturized electrocardiography (ECG) in a smartphone case coupled with an application to record and diagnose the ECG, has recently been shown to provide an accurate and sensitive single lead ECG diagnosis of atrial fibrillation. This device could be used by nurses to record a 30-s ECG instead of manual pulse taking and automatically provide a diagnosis of atrial fibrillation. Aims To compare the proportion of patients with paroxysmal atrial fibrillation detected by AliveCor™ ECG monitoring with current standard practice. Sample size 296 Patients. Design Consecutive ischemic stroke and transient ischemic attack patients presenting to participating stroke units without known atrial fibrillation will undergo intermittent AliveCor™ ECG monitoring administered by nursing staff at the same frequency as the vital observations of pulse and blood pressure until discharge, in addition to the standard testing paradigm of each participating stroke unit to detect paroxysmal atrial fibrillation. Study outcome Proportion of patients with paroxysmal atrial fibrillation detected by AliveCor™ ECG monitoring compared to 12-lead ECG, 24-h Holter monitoring and cardiac telemetry. Discussion Use of AliveCor™ heart monitor as part of routine stroke unit nursing observation has the potential to be an inexpensive non-invasive method to increase paroxysmal atrial fibrillation detection, leading to improvement in stroke secondary prevention.

  15. Mitigate DoS and DDoS attacks in Mobile Ad Hoc Networks

    DEFF Research Database (Denmark)

    Michalas, Antonis; Komninos, Nikos; Prasad, Neeli R.

    2011-01-01

    This paper proposes a technique to defeat Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks in Ad Hoc Networks. The technique is divided into two main parts and with game theory and cryptographic puzzles. Introduced first is a new client puzzle to prevent DoS attacks...... in DoS and DDoS attacks. Experimental results show the effectiveness of the approach for devices with limited resources and for environments like ad hoc networks where nodes must exchange information quickly....

  16. Fatal injection: a survey of modern code injection attack countermeasures

    Directory of Open Access Journals (Sweden)

    Dimitris Mitropoulos

    2017-11-01

    Full Text Available With a code injection attack (CIA an attacker can introduce malicious code into a computer program or system that fails to properly encode data that comes from an untrusted source. A CIA can have different forms depending on the execution context of the application and the location of the programming flaw that leads to the attack. Currently, CIAs are considered one of the most damaging classes of application attacks since they can severely affect an organisation’s infrastructure and cause financial and reputational damage to it. In this paper we examine and categorize the countermeasures developed to detect the various attack forms. In particular, we identify two distinct categories. The first incorporates static program analysis tools used to eliminate flaws that can lead to such attacks during the development of the system. The second involves the use of dynamic detection safeguards that prevent code injection attacks while the system is in production mode. Our analysis is based on nonfunctional characteristics that are considered critical when creating security mechanisms. Such characteristics involve usability, overhead, implementation dependencies, false positives and false negatives. Our categorization and analysis can help both researchers and practitioners either to develop novel approaches, or use the appropriate mechanisms according to their needs.

  17. Using the Domain Name System to Thwart Automated Client-Based Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Taylor, Curtis R [ORNL; Shue, Craig A [ORNL

    2011-09-01

    On the Internet, attackers can compromise systems owned by other people and then use these systems to launch attacks automatically. When attacks such as phishing or SQL injections are successful, they can have negative consequences including server downtime and the loss of sensitive information. Current methods to prevent such attacks are limited in that they are application-specific, or fail to block attackers. Phishing attempts can be stopped with email filters, but if the attacker manages to successfully bypass these filters, then the user must determine if the email is legitimate or not. Unfortunately, they often are unable to do so. Since attackers have a low success rate, they attempt to compensate for it in volume. In order to have this high throughput, attackers take shortcuts and break protocols. We use this knowledge to address these issues by implementing a system that can detect malicious activity and use it to block attacks. If the client fails to follow proper procedure, they can be classified as an attacker. Once an attacker has been discovered, they will be isolated and monitored. This can be accomplished using existing software in Ubuntu Linux applications, along with our custom wrapper application. After running the system and seeing its performance on three popular Web browsers Chromium, Firefox and Internet Explorer as well as two popular email clients, Thunderbird and Evolution, we found that not only is this system conceivable, it is effective and has low overhead.

  18. Palliative Care in Heart Failure

    Directory of Open Access Journals (Sweden)

    Hatice Mert

    2012-04-01

    Full Text Available Heart failure is an important health problem since its incidence and prevalence is increasing year by year. Since symptom burden and mortality are high in heart failure, supportive and palliative care should be provided. However, very few patients are referred to palliative care services. In comparison with cancer patients, it is difficult to identify end of life care for patients with heart failure, because these patients are hospitalized when the signs of acute decompensation appear, and their symptoms decrease and functional status improve before they are discharged. Therefore, palliative care, which is a holistic approach aiming to improve patients’ quality of life, to detect and treat the attacks of the disease before they become severe, and to deal with patients’ physical, psychological, social, and mental health altogether during their care, should be integrated into heart failure patients’ care. [TAF Prev Med Bull 2012; 11(2.000: 217-222

  19. The ATPG Attack for Reverse Engineering of Combinational Hybrid Custom-Programmable Circuits

    Science.gov (United States)

    2017-03-23

    Introduction The widely practiced horizontal integrated circuit supply chain exposes a design to various types of attacks including the reverse engineering ...STT_CMOS designs for reverse- engineering prevention, DAC 2016. [5] M. E. Massad and et. al. Integrated circuit (IC) decamouflaging: reverse...The ATPG Attack for Reverse Engineering of Combinational Hybrid Custom-Programmable Circuits Raza Shafiq Hamid Mahmoodi Houman Homayoun Hassan

  20. Is diet an essential risk factor for coronary heart disease?

    OpenAIRE

    Ball, K. P.

    1980-01-01

    Cigarette smoking, hypertension and diet each play a major role in the development of coronary heart attacks in most industrialized nations. In some countries where cigarette smoking and hypertension are prevalent there is a low risk of coronary heart disease (CHD). Hyperlipidaemia resulting from national food habits appears to be the essential factor in the high rates of CHD in developed countries.

  1. Research on the technology of detecting the SQL injection attack and non-intrusive prevention in WEB system

    Science.gov (United States)

    Hu, Haibin

    2017-05-01

    Among numerous WEB security issues, SQL injection is the most notable and dangerous. In this study, characteristics and procedures of SQL injection are analyzed, and the method for detecting the SQL injection attack is illustrated. The defense resistance and remedy model of SQL injection attack is established from the perspective of non-intrusive SQL injection attack and defense. Moreover, the ability of resisting the SQL injection attack of the server has been comprehensively improved through the security strategies on operation system, IIS and database, etc.. Corresponding codes are realized. The method is well applied in the actual projects.

  2. Blood pressure, risk of ischemic cerebrovascular and ischemic heart disease, and longevity in alpha(1)-antitrypsin deficiency

    DEFF Research Database (Denmark)

    Dahl, Morten; Tybjaerg-Hansen, Anne; Sillesen, Henrik

    2003-01-01

    Because elastase in alpha(1)-antitrypsin deficiency may attack elastin in the arterial wall, we tested whether alpha(1)-antitrypsin deficiency is associated with reduced blood pressure, risk of ischemic cerebrovascular (ICVD) and ischemic heart disease (IHD), and longevity.......Because elastase in alpha(1)-antitrypsin deficiency may attack elastin in the arterial wall, we tested whether alpha(1)-antitrypsin deficiency is associated with reduced blood pressure, risk of ischemic cerebrovascular (ICVD) and ischemic heart disease (IHD), and longevity....

  3. The Evaluation of a Regional Faith Community Network's Million Hearts Program.

    Science.gov (United States)

    Cooper, Jennifer; Zimmerman, Wendy

    2016-01-01

    The goal of the Million Hearts initiative is to prevent one million heart attacks and strokes by 2017. Maryland was one state in the Association of State and Territorial Health Official's Million Hearts State Learning Collaborative. Washington County, Maryland formed a collaboration between the County Health Department, Meritus Health System, and the Meritus Health Parish Nurse Coordinator to address hypertension in the county. Within a regional network of 52 faith communities, the Parish Nurse Coordinator recruited 25 faith community nurses to participate in a three-month program. Nurses were trained on proper blood pressure measurement and 22 nurses identified 58 participants engaged in blood pressure self-monitoring and coaching for lifestyle changes. Additionally, nurses took 1,729 blood pressures and provided health education to individuals within their congregations. Fifty-one participants participated in blood pressure self-monitoring and lifestyle coaching with faith community nurses. There was improvement in six out of seven lifestyle areas. Eight-two percent of participants (N = 42) decreased their systolic and/or diastolic blood pressure over three months. Coaching provided by faith community nurses can create an environment of sustained support to promote improved lifestyle and blood pressure changes over time. © 2015 Wiley Periodicals, Inc.

  4. Heart Failure

    Science.gov (United States)

    ... Other diseases. Chronic diseases — such as diabetes, HIV, hyperthyroidism, hypothyroidism, or a buildup of iron (hemochromatosis) or ... transplantation or support with a ventricular assist device. Prevention The key to preventing heart failure is to ...

  5. Paraoxonase 2 prevents the development of heart failure.

    Science.gov (United States)

    Li, Wei; Kennedy, David; Shao, Zhili; Wang, Xi; Kamdar, Andre Klaassen; Weber, Malory; Mislick, Kayla; Kiefer, Kathryn; Morales, Rommel; Agatisa-Boyle, Brendan; Shih, Diana M; Reddy, Srinivasa T; Moravec, Christine S; Tang, W H Wilson

    2018-05-02

    Mitochondrial oxidation is a major source of reactive oxygen species (ROS) and mitochondrial dysfunction plays a central role in development of heart failure (HF). Paraoxonase 2 deficient (PON2-def) mitochondria are impaired in function. In this study, we tested whether PON2-def aggravates HF progression. Using qPCR, immunoblotting and lactonase activity assay, we demonstrate that PON2 activity was significantly decreased in failing hearts despite increased PON2 expression. To determine the cardiac-specific function of PON2, we performed heart transplantations in which PON2-def and wild type (WT) donor hearts were implanted into WT recipient mice. Beating scores of the donor hearts, assessed at 4 weeks post-transplantation, were significantly decreased in PON2-def hearts when compared to WT donor hearts. By using a transverse aortic constriction (TAC) model, we found PON2 deficiency significantly exacerbated left ventricular remodeling and cardiac fibrosis post-TAC. We further demonstrated PON2 deficiency significantly enhanced ROS generation in heart tissues post-TAC. ROS generation was measured through dihydroethidium (DHE) using high-pressure liquid chromatography (HPLC) with a fluorescent detector. By using neonatal cardiomyocytes treated with CoCl 2 to mimic hypoxia, we found PON2 deficiency dramatically increased ROS generation in the cardiomyocytes upon CoCl 2 treatment. In response to a short CoCl 2 exposure, cell viability and succinate dehydrogenase (SDH) activity assessed by MTT assay were significantly diminished in PON2-def cardiomyocytes compared to those in WT cardiomyocytes. PON2-def cardiomyocytes also had lower baseline SDH activity. By using adult mouse cardiomyocytes and mitochondrial ToxGlo assay, we found impaired cellular ATP generation in PON2-def cells compared to that in WT cells, suggesting that PON2 is necessary for proper mitochondrial function. Our study suggests a cardioprotective role for PON2 in both experimental and human heart

  6. Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems

    Directory of Open Access Journals (Sweden)

    Omar Achbarou

    2017-03-01

    Full Text Available Cloud computing is a new way of integrating a set of old technologies to implement a new paradigm that creates an avenue for users to have access to shared and configurable resources through internet on-demand. This system has many common characteristics with distributed systems, hence, the cloud computing also uses the features of networking. Thus the security is the biggest issue of this system, because the services of cloud computing is based on the sharing. Thus, a cloud computing environment requires some intrusion detection systems (IDSs for protecting each machine against attacks. The aim of this work is to present a classification of attacks threatening the availability, confidentiality and integrity of cloud resources and services. Furthermore, we provide literature review of attacks related to the identified categories. Additionally, this paper also introduces related intrusion detection models to identify and prevent these types of attacks.

  7. 2017 consensus of the Asia Pacific Heart Rhythm Society on stroke prevention in atrial fibrillation

    Directory of Open Access Journals (Sweden)

    Chern-En Chiang, MD, PhD

    2017-08-01

    Full Text Available Atrial fibrillation (AF is the most common sustained arrhythmia, causing a 2-fold increase in mortality and a 5-fold increase in stroke. The Asian population is rapidly aging, and in 2050, the estimated population with AF will reach 72 million, of whom 2.9 million may suffer from AF-associated stroke. Therefore, stroke prevention in AF is an urgent issue in Asia. Many innovative advances in the management of AF-associated stroke have emerged recently, including new scoring systems for predicting stroke and bleeding risks, the development of non-vitamin K antagonist oral anticoagulants (NOACs, knowledge of their special benefits in Asians, and new techniques. The Asia Pacific Heart Rhythm Society (APHRS aimed to update the available information, and appointed the Practice Guideline sub-committee to write a consensus statement regarding stroke prevention in AF. The Practice Guidelines sub-committee members comprehensively reviewed updated information on stroke prevention in AF, emphasizing data on NOACs from the Asia Pacific region, and summarized them in this 2017 Consensus of the Asia Pacific Heart Rhythm Society on Stroke Prevention in AF. This consensus includes details of the updated recommendations, along with their background and rationale, focusing on data from the Asia Pacific region. We hope this consensus can be a practical tool for cardiologists, neurologists, geriatricians, and general practitioners in this region. We fully realize that there are gaps, unaddressed questions, and many areas of uncertainty and debate in the current knowledge of AF, and the physician׳s decision remains the most important factor in the management of AF.

  8. The history of hormone therapy use and recent controversy related to heart disease and breast cancer arising from prevention trial outcomes.

    Science.gov (United States)

    Alexander, Ivy M

    2012-01-01

    The reasons for hormone therapy use have changed dramatically over time from being very popular for the purpose of preserving youth in women to menopause-related symptom management, disease prevention, and now back to menopause-related symptom management. Over time, several important risks associated with the use of hormone therapy have become evident, causing dramatic reductions in the use of hormone therapy for periods of time following identification of these risks. Most recently, randomized controlled prevention trials that evaluated hormone therapy for the purpose of reducing or preventing coronary heart disease among women have found that hormone therapy is associated with increased rather than decreased risks for coronary heart disease. The most recent of these trials again identified increased risks for breast cancer associated with estrogen plus progestogen therapy. The evolving evidence base from these randomized controlled prevention trials is complicated and in some cases contradictory. Specifically, the data suggest that the timing of when hormone therapy is initiated once a woman is postmenopausal may influence her risk for developing heart disease and breast cancer. In this article, contradictory evidence is carefully sifted so risks and benefits can be weighed by clinicians when partnering with women to individualize decisions about using hormone therapy. © 2012 by the American College of Nurse-Midwives.

  9. Restoration of heart functions using human embryonic stem cells derived heart muscle cells.

    Science.gov (United States)

    Gepstein, Lior; Kehat, Izhak

    2005-02-01

    Extract: Recent advances in molecular and cellular biology and specifically in the areas of stem cell biology and tissue engineering have paved the way for the development of a new field in biomedicine, regenerative medicine. This exciting approach seeks to develop new biological solutions, using the mobilization of endogenous stem cells or delivery of exogenous cells to replace or modify the function of diseased, absent, or malfunctioning tissue. The adult heart represents an attractive candidate for these emerging technologies, since adult cardiomyocytes have limited regenerative capacity. Thus, any significant heart cell loss or dysfunction, such as occurs during heart attack, is mostly irreversible and may lead to the development of progressive heart failure, one of the leading causes of world-wide morbidity and mortality. Similarly, dysfunction of the specialized electrical conduction system within the heart may result in inefficient rhythm initiation or impulse conduction, leading to significant slowing of the heart rate, usually requiring the implantation of a permanent electronic pacemaker. Replacement of the dysfunctional myocardium (heart muscle) by implantation of external heart muscle cells is emerging as a novel paradigm for restoration of the myocardial electromechanical properties, but has been significantly hampered by the paucity of cell sources for human heart cells and by the relatively limited evidence for functional integration between grafted and host cells. The recently described human embryonic stem cell (hESC) lines may provide a possible solution for the aforementioned cell sourcing problem.

  10. Randomised controlled trial of a secondary prevention program for myocardial infarction patients ('ProActive Heart': study protocol. Secondary prevention program for myocardial infarction patients

    Directory of Open Access Journals (Sweden)

    Taylor C Barr

    2009-05-01

    Full Text Available Abstract Background Coronary heart disease (CHD is a significant cause of health and economic burden. Secondary prevention programs play a pivotal role in the treatment and management of those affected by CHD although participation rates are poor due to patient, provider, health system and societal-level barriers. As such, there is a need to develop innovative secondary prevention programs to address the treatment gap. Telephone-delivered care is convenient, flexible and has been shown to improve behavioural and clinical outcomes following myocardial infarction (MI. This paper presents the design of a randomised controlled trial to evaluate the efficacy of a six-month telephone-delivered secondary prevention program for MI patients (ProActive Heart. Methods 550 adult MI patients have been recruited over a 14 month period (December 2007 to January 2009 through two Brisbane metropolitan hospitals, and randomised to an intervention or control group (n = 225 per group. The intervention commences within two weeks of hospital discharge delivered by study-trained health professionals ('health coaches' during up to 10 × 30 minute scripted telephone health coaching sessions. Participants also receive a ProActive Heart handbook and an educational resource to use during the health coaching sessions. The intervention focuses on appropriate modification of CHD risk factors, compliance with pharmacological management, and management of psychosocial issues. Data collection occurs at baseline or prior to commencement of the intervention (Time 1, six months follow-up or the completion of the intervention (Time 2, and at 12 months follow-up for longer term outcomes (Time 3. Primary outcome measures include quality of life (Short Form-36 and physical activity (Active Australia Survey. A cost-effective analysis of the costs and outcomes for patients in the intervention and control groups is being conducted from the perspective of health care costs to the

  11. Review and expectations of terror attack emergency rescue

    Directory of Open Access Journals (Sweden)

    De-wen WANG

    2012-03-01

    Full Text Available Ten years of anti-terror struggle since the 9/11 event has indicated adequately that terrorism is a global problem and international danger. Likewise, anti-terror emergency rescue is also an important task which will influence the safety and benefit of every country all over the world. This paper reviews the main progress and result of international anti-terror struggle in the last ten years, and also introduces the new characteristic of the international anti-terror activity. Besides that, this paper also brings forward the further consideration about the anti-terror emergency medical rescue and the researches remaining to be carried out. The latter includes: (1 to further perfect the high-efficient medical rescue command organization; (2 to further perfect the emergency medical rescue prearranged scheme; (3 to further perfect the construction of rescue system and rescue base after various types of terror attack; (4 to further promote the anti-terror consciousness in the public, and pay more attention to the prevention and investigation of the psychological disaster; (5 to further carry out the basic investigation on emergency medical rescue after various terror attack injuries (for example the types and characteristics of new injuries, pathophysiology and prevention and treatment of stress-psychological effect induced by terror attack, new high-efficient medical rescue measure and equipments, and so on.

  12. A DoS/DDoS Attack Detection System Using Chi-Square Statistic Approach

    Directory of Open Access Journals (Sweden)

    Fang-Yie Leu

    2010-04-01

    Full Text Available Nowadays, users can easily access and download network attack tools, which often provide friendly interfaces and easily operated features, from the Internet. Therefore, even a naive hacker can also launch a large scale DoS or DDoS attack to prevent a system, i.e., the victim, from providing Internet services. In this paper, we propose an agent based intrusion detection architecture, which is a distributed detection system, to detect DoS/DDoS attacks by invoking a statistic approach that compares source IP addresses' normal and current packet statistics to discriminate whether there is a DoS/DDoS attack. It first collects all resource IPs' packet statistics so as to create their normal packet distribution. Once some IPs' current packet distribution suddenly changes, very often it is an attack. Experimental results show that this approach can effectively detect DoS/DDoS attacks.

  13. Cardiac Rehabilitation: MedlinePlus Health Topic

    Science.gov (United States)

    ... in Spanish Electrocardiogram (Medical Encyclopedia) Also in Spanish Topic Image MedlinePlus Email Updates Get Cardiac Rehabilitation updates ... How to take your pulse Pulse Related Health Topics Heart Attack Heart Diseases How to Prevent Heart ...

  14. Comparing the new European cardiovascular disease prevention guideline with prior American Heart Association guidelines: an editorial review.

    Science.gov (United States)

    Ton, Van-Khue; Martin, Seth S; Blumenthal, Roger S; Blaha, Michael J

    2013-05-01

    Atherosclerotic heart disease and stroke remain the leading causes of death and disability worldwide. Cardiovascular disease (CVD) prevention can improve the well-being of a population and possibly cut downstream healthcare spending, and must be the centerpiece of any sustainable health economy model. As lifestyle and CVD risk factors differ among ethnicities, cultures, genders, and age groups, an accurate risk assessment model is the critical first step for guiding appropriate use of testing, lifestyle counseling resources, and preventive medications. Examples of such models include the US Framingham Risk Score and the European SCORE system. The European Society of Cardiology recently published an updated set of guidelines on CVD prevention. This review highlights the similarities and differences between European and US risk assessment models, as well as their respective recommendations on the use of advanced testing for further risk reclassification and the appropriate use of medications. In particular, we focus on head-to-head comparison of the new European guideline with prior American Heart Association statements (2002, 2010, and 2011) covering risk assessment and treatment of asymptomatic adults. Despite minor disagreements on the weight of recommendations in certain areas, such as the use of coronary calcium score and non-high-density lipoprotein cholesterol in risk assessment, CVD prevention experts across the 2 continents agree on 1 thing: prevention works in halting the progression of atherosclerosis and decreasing disease burden over a lifetime. © 2012 Wiley Periodicals, Inc.

  15. Mending broken hearts : Cardiac regeneration in zebrafish

    NARCIS (Netherlands)

    kruse, fabian

    2017-01-01

    Cardiovascular disease is the leading global cause of death, accounting for more than 30% of all deaths. It claims more lives than all forms of cancer combined. Bearing these facts in mind, research in this field is direly needed. A heart attack, also known as myocardial infarction (MI), happens

  16. Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers

    NARCIS (Netherlands)

    Pieters, Wolter; Davarynejad, Mohsen

    2015-01-01

    Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of multiple steps and alternative paths. It is possible to derive properties of the overall attacks from properties of individual steps, such as cost for the attacker and probability of success. However, in

  17. Breakthrough attacks in patients with hereditary angioedema receiving long-term prophylaxis are responsive to icatibant

    DEFF Research Database (Denmark)

    Aberer, Werner; Maurer, Marcus; Bouillet, Laurence

    2017-01-01

    BACKGROUND: Patients with hereditary angioedema (HAE) due to C1-inhibitor deficiency (C1-INH-HAE) experience recurrent attacks of cutaneous or submucosal edema that may be frequent and severe; prophylactic treatments can be prescribed to prevent attacks. However, despite the use of long-term prop...

  18. Identifying and tracking attacks on networks: C3I displays and related technologies

    Science.gov (United States)

    Manes, Gavin W.; Dawkins, J.; Shenoi, Sujeet; Hale, John C.

    2003-09-01

    Converged network security is extremely challenging for several reasons; expanded system and technology perimeters, unexpected feature interaction, and complex interfaces all conspire to provide hackers with greater opportunities for compromising large networks. Preventive security services and architectures are essential, but in and of themselves do not eliminate all threat of compromise. Attack management systems mitigate this residual risk by facilitating incident detection, analysis and response. There are a wealth of attack detection and response tools for IP networks, but a dearth of such tools for wireless and public telephone networks. Moreover, methodologies and formalisms have yet to be identified that can yield a common model for vulnerabilities and attacks in converged networks. A comprehensive attack management system must coordinate detection tools for converged networks, derive fully-integrated attack and network models, perform vulnerability and multi-stage attack analysis, support large-scale attack visualization, and orchestrate strategic responses to cyber attacks that cross network boundaries. We present an architecture that embodies these principles for attack management. The attack management system described engages a suite of detection tools for various networking domains, feeding real-time attack data to a comprehensive modeling, analysis and visualization subsystem. The resulting early warning system not only provides network administrators with a heads-up cockpit display of their entire network, it also supports guided response and predictive capabilities for multi-stage attacks in converged networks.

  19. A UNIFIED APPROACH FOR DETECTION AND PREVENTION OF DDOS ATTACKS USING ENHANCED SUPPORT VECTOR MACHINES AND FILTERING MECHANISMS

    Directory of Open Access Journals (Sweden)

    T. Subbulakshmi

    2014-10-01

    Full Text Available Distributed Denial of Service (DDoS attacks were considered to be a tremendous threat to the current information security infrastructure. During DDoS attack, multiple malicious hosts that are recruited by the attackers launch a coordinated attack against one host or a network victim, which cause denial of service to legitimate users. The existing techniques suffer from more number of false alarms and more human intervention for attack detection. The objective of this paper is to monitor the network online which automatically initiates detection mechanism if there is any suspicious activity and also defense the hosts from being arrived at the network. Both spoofed and non spoofed IP’s are detected in this approach. Non spoofed IP’s are detected using Enhanced Support Vector Machines (ESVM and spoofed IP’s are detected using Hop Count Filtering (HCF mechanism. The detected IP’s are maintained separately to initiate the defense process. The attack strength is calculated using Lanchester Law which initiates the defense mechanism. Based on the calculated attack strength any of the defense schemes such as Rate based limiting or History based IP filtering is automatically initiated to drop the packets from the suspected IP. The integrated online monitoring approach for detection and defense of DDoS attacks is deployed in an experimental testbed. The online approach is found to be obvious in the field of integrated DDoS detection and defense.

  20. African-Americans and Heart Disease, Stroke

    Science.gov (United States)

    ... Research for Heart.org Educator for Heart.org CPR & ECC for Heart.org Shop for Heart.org ... controlled diabetes and suffered preventable complications such as blindness, amputations, or renal failure. For diabetes and other ...

  1. Are the effects of drugs to prevent and to treat heart failure always concordant? The statin paradox and its implications for understanding the actions of antidiabetic medications.

    Science.gov (United States)

    Packer, Milton

    2018-03-22

    Most treatments for chronic heart failure are effective both in preventing its onset and reducing its progression. However, statins prevent the development of heart failure, but they do not decrease morbidity and mortality in those with established heart failure. This apparent discordance cannot be explained by an effect to prevent interval myocardial infarctions. Instead, it seems that the disease that statins were preventing in trials of patients with a metabolic disorder was different from the disease that they were treating in trials of chronic heart failure. The most common phenotype of heart failure in patients with obesity and diabetes is heart failure with a preserved ejection fraction (HFpEF). In this disorder, the anti-inflammatory effects of statins might ameliorate myocardial fibrosis and cardiac filling abnormalities, but these actions may have little relevance to patients with heart failure and a reduced ejection fraction (HFrEF), whose primary derangement is cardiomyocyte loss and stretch. These distinctions may explain why statins were ineffective in trials that focused on HFrEF, but have been reported to produce with favourable effects in observational studies of HFpEF. Similarly, selective cytokine antagonists were ineffective in HFrEF, but have been associated with benefits in HFpEF. These observations may have important implications for our understanding of the effects of antihyperglycaemic medications. Glucagon-like peptide-1 receptor agonists have had neutral effects on heart failure events in people at risk for HFpEF, but have exerted deleterious actions in HFrEF. Similarly, sodium-glucose co-transporter 2 inhibitors, which exert anti-inflammatory effects and reduce heart failure events in patients who are prone to HFpEF, may not be effective in HFrEF. The distinctions between HFrEF and HFpEF may explain why the effects of drugs on heart failure events in diabetes trials may not be relevant to their use in patients with systolic dysfunction

  2. Lifestyle interventions to prevent cardiovascular events after stroke and transient ischemic attack

    NARCIS (Netherlands)

    Deijle, Inger A.; Van Schaik, Sander M.; Van Wegen, Erwin E.H.; Weinstein, Henry C.; Kwakkel, Gert; Van Den Berg-Vos, Renske M.

    2017-01-01

    Background and Purpose - Patients with a transient ischemic attack or ischemic stroke have an increased risk of subsequent cardiovascular events. The purpose of this systematic review and meta-analysis was to determine whether lifestyle interventions focusing on behaviorally modifiable risk factors

  3. The potential of socio-psychological models for the development of prevention programs (Part 1

    Directory of Open Access Journals (Sweden)

    Bovina I.B.

    2014-12-01

    Full Text Available This paper considers the problem of designing prevention programs in health and disease. We note that smoking cessation on the planet would reduce mortality from various types of cancer by 25%, and would also save the lives of hundreds of thousands of people who die each year from heart attacks. Losing weight by only 10% through proper nutrition and exercise would reduce the incidence of cardiovascular disease, as well as certain types of cancer. Based on the literature review, we reveal the different types of prevention, show the importance of preventive measures aimed at the patient's immediate environment. Among the main difficulties associated with the development of effective prevention programs we discuss the following: 1 ignoring the psychological mechanisms of behavior change; 2 irrelevance of media broadcast methods in prevention campaigns; 3 the time between the problem behavior and its negative effects on health. We discuss the potential of social influence models for the development of prevention programs in the field of health and disease.

  4. Detection of network attacks based on adaptive resonance theory

    Science.gov (United States)

    Bukhanov, D. G.; Polyakov, V. M.

    2018-05-01

    The paper considers an approach to intrusion detection systems using a neural network of adaptive resonant theory. It suggests the structure of an intrusion detection system consisting of two types of program modules. The first module manages connections of user applications by preventing the undesirable ones. The second analyzes the incoming network traffic parameters to check potential network attacks. After attack detection, it notifies the required stations using a secure transmission channel. The paper describes the experiment on the detection and recognition of network attacks using the test selection. It also compares the obtained results with similar experiments carried out by other authors. It gives findings and conclusions on the sufficiency of the proposed approach. The obtained information confirms the sufficiency of applying the neural networks of adaptive resonant theory to analyze network traffic within the intrusion detection system.

  5. Pop a Pill (A Cup of Health with CDC)

    Centers for Disease Control (CDC) Podcasts

    An aspirin a day can keep heart trouble away, but many adults with cardiovascular disease still don’t adhere to this preventive therapy. In this podcast, Dr. Mary George discusses the potential benefits of aspirin therapy in preventing heart attacks and strokes.

  6. Development and Validation of a Model to Predict Absolute Vascular Risk Reduction by Moderate-Intensity Statin Therapy in Individual Patients With Type 2 Diabetes Mellitus: The Anglo Scandinavian Cardiac Outcomes Trial, Antihypertensive and Lipid-Lowering Treatment to Prevent Heart Attack Trial, and Collaborative Atorvastatin Diabetes Study.

    Science.gov (United States)

    Kaasenbrood, Lotte; Poulter, Neil R; Sever, Peter S; Colhoun, Helen M; Livingstone, Shona J; Boekholdt, S Matthijs; Pressel, Sara L; Davis, Barry R; van der Graaf, Yolanda; Visseren, Frank L J

    2016-05-01

    In this study, we aimed to translate the average relative effect of statin therapy from trial data to the individual patient with type 2 diabetes mellitus by developing and validating a model to predict individualized absolute risk reductions (ARR) of cardiovascular events. Data of 2725 patients with type 2 diabetes mellitus from the Lipid Lowering Arm of the Anglo Scandinavian Cardiac Outcomes Trial (ASCOT-LLA) study (atorvastatin 10 mg versus placebo) were used for model derivation. The model was based on 8 clinical predictors including treatment allocation (statin/placebo). Ten-year individualized ARR on major cardiovascular events by statin therapy were calculated for each patient by subtracting the estimated on-treatment risk from the estimated off-treatment risk. Predicted 10-year ARR by statin therapy was 4% (median ARR, 3.2%; interquartile range, 2.5%-4.3%; 95% confidence interval for 3.2% ARR, -1.4% to 6.8%). Addition of treatment interactions did not improve model performance. Therefore, the wide distribution in ARR was a consequence of the underlying distribution in cardiovascular risk enrolled in these trials. External validation of the model was performed in data from the Antihypertensive and Lipid-Lowering Treatment to Prevent Heart Attack Trial (ALLHAT-LLT; pravastatin 40 mg versus usual care) and Collaborative Atorvastatin Diabetes Study (CARDS; atorvastatin 10 mg versus placebo) of 3878 and 2838 patients with type 2 diabetes mellitus, respectively. Model calibration was adequate in both external data sets, discrimination was moderate (ALLHAT-LLT: c-statistics, 0.64 [95% confidence interval, 0.61-0.67] and CARDS: 0.68 [95% confidence interval, 0.64-0.72]). ARRs of major cardiovascular events by statin therapy can be accurately estimated for individual patients with type 2 diabetes mellitus using a model based on routinely available patient characteristics. There is a wide distribution in ARR that may complement informed decision making. URL: http

  7. A qualitative study of younger men's experience of heart attack (myocardial infarction).

    Science.gov (United States)

    Merritt, Christopher J; de Zoysa, Nicole; Hutton, Jane M

    2017-09-01

    The effects of heart attack, or myocardial infarction (MI), across psychosocial domains may be particularly acute in younger adults, for whom serious health events are non-normative. MI morbidity is declining in Western countries, but in England MI numbers have plateaued for the under-45 cohort, where approximately 90% of patients are male. Qualitative research on younger adults' experience of MI is limited, and no study has sampled exclusively under-45s. This study aimed to understand how a sample of men under 45 adjusted to and made sense of MI. Qualitative research design based on semi-structured in-depth interviews. Ten men aged under 45 who had experienced MI in the past 3-6 months were purposively recruited and interviewed. Interviews were transcribed verbatim and analysed using interpretative phenomenological analysis. Seven superordinate themes were identified. This article focuses in depth on the three most original themes: (1) 'I'm less of a man', which described experiences of losing 'maleness' (strength, independence, ability to provide) post-MI; (2) 'Shortened horizons', which covered participants' sense of foreshortened future and consequent reprioritization; and (3) 'Life loses its colour', describing the loss of pleasure from lifestyle-related changes. Themes broadly overlapped with the qualitative literature on younger adult MI. However, some themes (e.g., loss of 'maleness' post-MI, and ambivalence towards MI risk factors) appeared unique to this study. Themes were also discussed in relation to risk factors for anxiety and depression and how this might inform clinical care for a younger, male population. Statement of contribution What is already known on this subject? Myocardial infarction (MI) morbidity is not declining in England for under-45s. Adjustment to MI is particularly challenging for younger adults, perhaps because it is non-normative. However, little is known about the experience of MI in younger adults. What does this study add? This

  8. Preoperative Prevention of Heart Failure in Noncardiac Surgery

    Directory of Open Access Journals (Sweden)

    V. V. Likhvantsev

    2016-01-01

    Full Text Available Congestive heart failure is consistently associated with adverse outcomes, and is characterized by a twofold increase in mortality in noncardiac surgery. In this regard, developing the methods aimed to prevent and treatacute heart failure (AHF in the intraoperative period remain a challenging problem.Objective. To evaluate the efficacy of preoperative levosimendan infusion in reduction both mortality and duration of treatment of elderly patients with reduced left ventricular ejection fraction in noncardiac surgery.Material and Methods. Design: Multicenter blind randomized placebocontrolled study. Patients: 81 patients operated on abdominal organs. The main endpoint of the study: The length of stay in the Intensive Care Unit (ICU and at the hospital were chosen as the primary endpoints. The secondary endpoints of the study were 30 day and annual mortality, the rate of acute myocardial infarction and stroke.Results. Levosimendan infusion at a rate of 0,05 μg/kg/min — 0,1 μg/kg/min to patients with low left ven tricular ejection fraction just before the surgery reduced the length of stay in ICU for 2 days and required hospital stay for 3 days. NTproBNP showed the best ratio of sensitivity/specificity in predicting 30day mortality in cumulative group: AUC=0,86 (90,77 to 0,93, P<0,0001. From other indicators the most informative were the Inotropes scoring, no change or decrease of a left ventricular ejection fraction, and cardiac index.Conclusion. To reduce perioperative mortality, the intravenous infusion of levosimendan at a rate of 0,05—0,1 μg/kg/min in elderly patients with low left ventricular ejection fraction is recommened as a preoperative preparation the day before the alleged noncardiac surgery.

  9. Complement activation, endothelial dysfunction, insulin resistance and chronic heart failure

    DEFF Research Database (Denmark)

    Bjerre, M.; Kistorp, C.; Hansen, T.K.

    2010-01-01

    Objectives. Patients with chronic heart failure (CHF) have an exaggerated immune response, endothelial damage/dysfunction, and increased risk of diabetes mellitus (DM). The inter-relationship(s) between indices of complement activation (soluble membrane attack complex, sMAC), inflammation (hs...... to ischemic heart disease (IHD) as compared with CHF patients with non-ischemic ethiology (p = 0.02), but were not predictive of survival or progression of CHF. A moderate strong relation between sMAC and sEsel levels was found beta = 0.33 (p ... damaging of the heart tissue...

  10. Drugs from the Sea: A Marine Sponge-Derived Compound Prevents Type 1 Diabetes

    Directory of Open Access Journals (Sweden)

    Luc Van Kaer

    2001-01-01

    Full Text Available More than one million Americans have Type 1 diabetes. This disease — also known as autoimmune or juvenile diabetes — strikes children suddenly, makes them dependent on insulin injections for life, and carries the constant threat of devastating complications. While it can and does strike adults, nearly half of all new cases are diagnosed in children. A child is diagnosed with Type 1 diabetes every hour. Type 1 diabetes is caused by the inability of a person’s pancreas to produce sufficient amounts of insulin to control their blood sugar levels and sustain life. While insulin injections allow affected individuals to control their blood sugar and stay alive, it is not a cure nor does it prevent the devastating complications of this disease, which include kidney failure, blindness, amputations, heart attack, and stroke. In Type 1 diabetes, the body’s own immune system goes awry, attacking and destroying insulin-producing cells in the pancreas.

  11. World Heart Day

    Centers for Disease Control (CDC) Podcasts

    2009-09-01

    For World Heart Day, learn more about what heart-healthy steps you can take in the workplace.  Created: 9/1/2009 by National Center for Chronic Disease Prevention and Health Promotion (NCCDPHP).   Date Released: 9/9/2009.

  12. Develop a solution for protecting and securing enterprise networks from malicious attacks

    Science.gov (United States)

    Kamuru, Harshitha; Nijim, Mais

    2014-05-01

    In the world of computer and network security, there are myriad ways to launch an attack, which, from the perspective of a network, can usually be defined as "traffic that has huge malicious intent." Firewall acts as one of the measure in order to secure the device from incoming unauthorized data. There are infinite number of computer attacks that no firewall can prevent, such as those executed locally on the machine by a malicious user. From the network's perspective, there are numerous types of attack. All the attacks that degrade the effectiveness of data can be grouped into two types: brute force and precision. The Firewall that belongs to Juniper has the capability to protect against both types of attack. Denial of Service (DoS) attacks are one of the most well-known network security threats under brute force attacks, which is largely due to the high-profile way in which they can affect networks. Over the years, some of the largest, most respected Internet sites have been effectively taken offline by Denial of Service (DOS) attacks. A DoS attack typically has a singular focus, namely, to cause the services running on a particular host or network to become unavailable. Some DoS attacks exploit vulnerabilities in an operating system and cause it to crash, such as the infamous Win nuke attack. Others submerge a network or device with traffic so that there are no more resources to handle legitimate traffic. Precision attacks typically involve multiple phases and often involves a bit more thought than brute force attacks, all the way from reconnaissance to machine ownership. Before a precision attack is launched, information about the victim needs to be gathered. This information gathering typically takes the form of various types of scans to determine available hosts, networks, and ports. The hosts available on a network can be determined by ping sweeps. The available ports on a machine can be located by port scans. Screens cover a wide variety of attack traffic

  13. CodeArmor : Virtualizing the Code Space to Counter Disclosure Attacks

    NARCIS (Netherlands)

    Chen, Xi; Bos, Herbert; Giuffrida, Cristiano

    2017-01-01

    Code diversification is an effective strategy to prevent modern code-reuse exploits. Unfortunately, diversification techniques are inherently vulnerable to information disclosure. Recent diversification-aware ROP exploits have demonstrated that code disclosure attacks are a realistic threat, with an

  14. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  15. Laypersons' understanding of relative risk reductions: randomised cross-sectional study

    DEFF Research Database (Denmark)

    Sorensen, Lene; Gyrd-Hansen, Dorte; Kristiansen, Ivar S

    2008-01-01

    of a representative sample (n = 1,519) of lay people with mean age 59 (range 40-98) years in Denmark. In addition to demographic information, respondents were asked to consider a hypothetical drug treatment to prevent heart attack. Its effectiveness was randomly presented as RRR of 10, 20, 30, 40, 50 or 60 percent......, and half of the respondents were presented with quantitative information on the baseline risk of heart attack. The respondents had also been asked whether they were diagnosed with hypercholesterolemia or had experienced a heart attack. RESULTS: In total, 873 (58%) of the respondents consented...

  16. Entropy-Based Application Layer DDoS Attack Detection Using Artificial Neural Networks

    Directory of Open Access Journals (Sweden)

    Khundrakpam Johnson Singh

    2016-10-01

    Full Text Available Distributed denial-of-service (DDoS attack is one of the major threats to the web server. The rapid increase of DDoS attacks on the Internet has clearly pointed out the limitations in current intrusion detection systems or intrusion prevention systems (IDS/IPS, mostly caused by application-layer DDoS attacks. Within this context, the objective of the paper is to detect a DDoS attack using a multilayer perceptron (MLP classification algorithm with genetic algorithm (GA as learning algorithm. In this work, we analyzed the standard EPA-HTTP (environmental protection agency-hypertext transfer protocol dataset and selected the parameters that will be used as input to the classifier model for differentiating the attack from normal profile. The parameters selected are the HTTP GET request count, entropy, and variance for every connection. The proposed model can provide a better accuracy of 98.31%, sensitivity of 0.9962, and specificity of 0.0561 when compared to other traditional classification models.

  17. Post-attack aposematic display in prey facilitates predator avoidance learning

    Directory of Open Access Journals (Sweden)

    Changku eKang

    2016-04-01

    Full Text Available Warning signals protect unpalatable prey from predation because predators who learn the association between the warning signal and prey unprofitability decrease attacks on the prey. Most of the research have focused on visual aposematic signals that are constantly presented and visible to the predators. But a variety of chemically defended insects are rather cryptic when resting, and only in response to predator attacks (post-attack they perform displays of conspicuous abdomens or hindwings normally hidden under forewings. The function of those displays in unpalatable insects is not well understood. We examined two adaptive hypotheses on this facultative aposematic display using wild-caught oriental tits (Parus minor as predators. First, we tested whether the display increases the rejection of the prey by predators upon seeing the display (i.e. at the moment of attack through learning trials (aposematic signaling hypothesis. Second, we tested whether the display facilitates the memory formation between cryptic visible form of the prey and prey defense so that it prevents the predators initiate an attack upon seeing the cryptic form (facilitation hypothesis. We found that predators learned to avoid attacking the prey which supports the facilitation hypothesis. However, the support for the aposematic signaling hypothesis was equivocal. Our results open new directions of research by highlighting the possibility that similar facilitation effects may contribute to the evolution of various forms of post-attack visual displays in chemically, or otherwise, defended animals.

  18. Diabetes Increases Cryoinjury Size with Associated Effects on Cx43 Gap Junction Function and Phosphorylation in the Mouse Heart.

    Science.gov (United States)

    Palatinus, Joseph A; Gourdie, Robert G

    2016-01-01

    Diabetic patients develop larger myocardial infarctions and have an increased risk of death following a heart attack. The poor response to myocardial injury in the diabetic heart is likely related to the many metabolic derangements from diabetes that create a poor substrate in general for wound healing, response to injury and infection. Studies in rodents have implicated a role for the gap junction protein connexin 43 (Cx43) in regulating the injury response in diabetic skin wounds. In this study, we sought to determine whether diabetes alters Cx43 molecular interactions or intracellular communication in the cryoinjured STZ type I diabetic mouse heart. We found that epicardial cryoinjury size is increased in diabetic mice and this increase is prevented by preinjury insulin administration. Consistent with these findings, we found that intercellular coupling via gap junctions is decreased after insulin administration in diabetic and nondiabetic mice. This decrease in coupling is associated with a concomitant increase in phosphorylation of Cx43 at serine 368, a residue known to decrease channel conductance. Taken together, our results suggest that insulin regulates both gap junction-mediated intercellular communication and injury propagation in the mouse heart.

  19. The American Heart Association Ideal Cardiovascular Health and Incident Type 2 Diabetes Mellitus Among Blacks: The Jackson Heart Study

    OpenAIRE

    Effoe, Valery S.; Carnethon, Mercedes R.; Echouffo‐Tcheugui, Justin B.; Chen, Haiying; Joseph, Joshua J.; Norwood, Arnita F.; Bertoni, Alain G.

    2017-01-01

    Background: The concept of ideal cardiovascular health (CVH), defined by the American Heart Association primarily for coronary heart disease and stroke prevention, may apply to diabetes mellitus prevention among blacks. Methods and Results: Our sample included 2668 adults in the Jackson Heart Study with complete baseline data on 6 of 7 American Heart Association CVH metrics (body mass index, healthy diet, smoking, total cholesterol, blood pressure, and physical activity). Incident diabetes me...

  20. Hereditary angioedema attacks resolve faster and are shorter after early icatibant treatment.

    Directory of Open Access Journals (Sweden)

    Marcus Maurer

    Full Text Available BACKGROUND: Attacks of hereditary angioedema (HAE are unpredictable and, if affecting the upper airway, can be lethal. Icatibant is used for physician- or patient self-administered symptomatic treatment of HAE attacks in adults. Its mode of action includes disruption of the bradykinin pathway via blockade of the bradykinin B(2 receptor. Early treatment is believed to shorten attack duration and prevent severe outcomes; however, evidence to support these benefits is lacking. OBJECTIVE: To examine the impact of timing of icatibant administration on the duration and resolution of HAE type I and II attacks. METHODS: The Icatibant Outcome Survey is an international, prospective, observational study for patients treated with icatibant. Data on timings and outcomes of icatibant treatment for HAE attacks were collected between July 2009-February 2012. A mixed-model of repeated measures was performed for 426 attacks in 136 HAE type I and II patients. RESULTS: Attack duration was significantly shorter in patients treated <1 hour of attack onset compared with those treated ≥ 1 hour (6.1 hours versus 16.8 hours [p<0.001]. Similar significant effects were observed for <2 hours versus ≥ 2 hours (7.2 hours versus 20.2 hours [p<0.001] and <5 hours versus ≥ 5 hours (8.0 hours versus 23.5 hours [p<0.001]. Treatment within 1 hour of attack onset also significantly reduced time to attack resolution (5.8 hours versus 8.8 hours [p<0.05]. Self-administrators were more likely to treat early and experience shorter attacks than those treated by a healthcare professional. CONCLUSION: Early blockade of the bradykinin B(2 receptor with icatibant, particularly within the first hour of attack onset, significantly reduced attack duration and time to attack resolution.

  1. N-acetylcysteine prevents ketamine-induced adverse effects on development, heart rate and monoaminergic neurons in zebrafish.

    Science.gov (United States)

    Robinson, Bonnie; Dumas, Melanie; Gu, Qiang; Kanungo, Jyotshna

    2018-06-08

    N-acetylcysteine, a precursor molecule of glutathione, is an antioxidant. Ketamine, a pediatric anesthetic, has been implicated in cardiotoxicity and neurotoxicity including modulation of monoaminergic systems in mammals and zebrafish. Here, we show that N-acetylcysteine prevents ketamine's adverse effects on development and monoaminergic neurons in zebrafish embryos. The effects of ketamine and N-acetylcysteine alone or in combination were measured on the heart rate, body length, brain serotonergic neurons and tyrosine hydroxylase-immunoreactive (TH-IR) neurons. In the absence of N-acetylcysteine, a concentration of ketamine that produces an internal embryo exposure level comparable to human anesthetic plasma concentrations significantly reduced heart rate and body length and those effects were prevented by N-acetylcysteine co-treatment. Ketamine also reduced the areas occupied by serotonergic neurons in the brain, whereas N-acetylcysteine co-exposure counteracted this effect. TH-IR neurons in the embryo brain and TH-IR cells in the trunk were significantly reduced with ketamine treatment, but not in the presence of N-acetylcysteine. In our continued search for compounds that can prevent ketamine toxicity, this study using specific endpoints of developmental toxicity, cardiotoxicity and neurotoxicity, demonstrates protective effects of N-acetylcysteine against ketamine's adverse effects. This is the first study that shows the protective effects of N-acetylcysteine on ketamine-induced developmental defects of monoaminergic neurons as observed in a whole organism. Published by Elsevier B.V.

  2. Nursery Pest Management of Phytolyma lata Walker (Scott) Attack ...

    African Journals Online (AJOL)

    The establishment of plantations of Milicia excelsa has been constrained by the gall-forming psyllid Phytolyma lata Walker (Scott) that causes extensive damage to young plants. We present findings of an experiment aimed at preventing Phytolyma attack on Milicia seedlings in the nursery using chemical control and ...

  3. CPR in the Schools: Training Students to Save Heart Attack Victims.

    Science.gov (United States)

    Britton, Royce J.

    1978-01-01

    A community cardiac emergency medical plan should include training of family and co-workers of high risk patients, including teenage students. The American Heart Association lists ways to introduce cardiopulmonary resuscitation (CPR) into school curricula and describes the plan implemented in Pennsylvania. (MF)

  4. Heart disease - risk factors

    Science.gov (United States)

    Heart disease - prevention; CVD - risk factors; Cardiovascular disease - risk factors; Coronary artery disease - risk factors; CAD - risk ... a certain health condition. Some risk factors for heart disease you cannot change, but some you can. ...

  5. Prevention of hypoxic fetal complications in pregnant women with congenital heart disease and anemia

    Directory of Open Access Journals (Sweden)

    Iu. Davydova

    2016-06-01

    Full Text Available The aim of the study is — to develop a strategy of prevention of hypoxic fetal abnormalities in pregnant women with congenital heart disease, heart failure and iron deficiency anemia. Materials and methods. The study included 86 pregnant women with CHD and NYHA II–III. 68 women in the third trimester of pregnancy is diagnosed anemia (group I, 18 pregnant women with CHD, NYHA II–III without anemia (II group, the control group consisted of 24 pregnant women without cardiac disease, with physiological pregnancy. All pregnant with information registration consent studied the concentration of ferritin, hemoglobin level, morphological study of the placenta. All pregnant women were assigned to iron supplements, oral iron (III hydroxide polymaltose complex (Maltofer when hemoglobin levels above 95 g/l and the expected delivery date more than 40 days of starting treatment. When the hemoglobin level below 95 g/l of intravenously administered iron (III hydroxide sucrose complex (Venofer followed by transfer to oral iron (III. Results. In groups of pregnant I and II did not have perinatal losses, births in gestation less than 28 weeks, with a score Apgar at birth of less than 4 points. Pregnant women with cyanotic heart defects and the need for early delivery in less than 37 weeks are not included in the study. Also, there is a correlation between the degree of severity of anemia in women with CHD with HF and prematurity, and the presence of IUGR child birth asphyxia able to varying degrees (respectively, r=0.8, r=0.75 and r=0.85. Conclusions. Formation of fetoplacental unit in women with CHD on a background of heart failure occurs with complications associated with the presence of tissue hypoxia, as well as the possible impact on the process of oxidative stress. The development of iron deficiency anemia in this group is an additional risk factor for placental dysfunction, which is confirmed by morphometric and morphological studies of placentas

  6. Attacks on IEEE 802.11 wireless networks

    Directory of Open Access Journals (Sweden)

    Dejan Milan Tepšić

    2013-06-01

    Full Text Available Security of wireless computer networks was initially secured with the WEP security protocol, which relies on the RC4 encryption algorithm and the CRC algorithm to check the integrity. The basic problems of the WEP are a short initialization vector, unsafe data integrity checking, using a common key, the lack of mechanisms for management and exchange of keys, the lack of protection from the endless insertion of the same package into the network, the lack of authentication of access points and the like. The consequences of these failures are easy attacks against the WEP network, namely their complete insecurity. Therefore, the work began on the IEEE 802.11i protocol, which should radically improve the security of wireless networks. Since the development of a protocol lasted, the WPA standard was released to offset the security gap caused by the WEP. The WPA also relies on RC4 and CRC algorithms, but brings temporary keys and the MIC algorithm for data integrity. The 802.1X authentication was introduced and common keys are no longer needed, since it is possible to use an authentication server. The length of the initialization vector was increased and the vector is obtained based on the packet serial number, in order to prevent the insertion of the same packet into the network. The weakness of the WPA security mechanism is the use of a common key. WPA2 (802.11i later appeared. Unlike the WPA mechanism that worked on old devices with the replacement of software, WPA2 requires new network devices that can perform AES encryption. AES replaces the RC4 algorithm and delivers much greater security. Data integrity is protected by encryption. Despite progress, there are still weaknesses in wireless networks. Attacks for denial of service are possible as well as spoofing package headers attacks. For now, it is not advisable to use wireless networks in environments where unreliability and unavailability are not tolerated. Introduction In the entire history of

  7. Reduced intrinsic heart rate is associated with reduced arrhythmic susceptibility in guinea-pig heart.

    Science.gov (United States)

    Osadchii, Oleg E

    2014-12-01

    In the clinical setting, patients with slower resting heart rate are less prone to cardiovascular death compared with those with elevated heart rate. However, electrophysiological adaptations associated with reduced cardiac rhythm have not been thoroughly explored. In this study, relationships between intrinsic heart rate and arrhythmic susceptibility were examined by assessments of action potential duration (APD) rate adaptation and inducibility of repolarization alternans in sinoatrial node (SAN)-driven and atrioventricular (AV)-blocked guinea-pig hearts perfused with Langendorff apparatus. Electrocardiograms, epicardial monophasic action potentials, and effective refractory periods (ERP) were assessed in normokalemic and hypokalemic conditions. Slower basal heart rate in AV-blocked hearts was associated with prolonged ventricular repolarization during spontaneous beating, and with attenuated APD shortening at increased cardiac activation rates during dynamic pacing, when compared with SAN-driven hearts. During hypokalemic perfusion, the inducibility of repolarization alternans and tachyarrhythmia by rapid pacing was found to be lower in AV-blocked hearts. This difference was ascribed to prolonged ERP in the setting of reduced basal heart rate, which prevented ventricular capture at critically short pacing intervals required to induce arrhythmia. Reduced basal heart rate is associated with electrophysiological changes that prevent electrical instability upon an abrupt cardiac acceleration.

  8. Vitamin D and Heart Failure.

    Science.gov (United States)

    Marshall Brinkley, D; Ali, Omair M; Zalawadiya, Sandip K; Wang, Thomas J

    2017-10-01

    Vitamin D is principally known for its role in calcium homeostasis, but preclinical studies implicate multiple pathways through which vitamin D may affect cardiovascular function and influence risk for heart failure. Many adults with cardiovascular disease have low vitamin D status, making it a potential therapeutic target. We review the rationale and potential role of vitamin D supplementation in the prevention and treatment of chronic heart failure. Substantial observational evidence has associated low vitamin D status with the risk of heart failure, ventricular remodeling, and clinical outcomes in heart failure, including mortality. However, trials assessing the influence of vitamin D supplementation on surrogate markers and clinical outcomes in heart failure have generally been small and inconclusive. There are insufficient data to recommend routine assessment or supplementation of vitamin D for the prevention or treatment of chronic heart failure. Prospective trials powered for clinical outcomes are warranted.

  9. The C60-Fullerene Porphyrin Adducts for Prevention of the Doxorubicin-Induced Acute Cardiotoxicity in Rat Myocardial Cells

    Directory of Open Access Journals (Sweden)

    Seyed Vahid Shetab Boushehri

    2010-10-01

    Full Text Available This is a fullerene-based low toxic nanocationite designed for targeted delivery of the paramagnetic stable isotope of magnesium to the doxorubicin (DXR-induced damaged heart muscle providing a prominent effect close to about 80% recovery of the tissue hypoxia symptoms in less than 24 hrs after a single injection (0.03 - 0.1 LD50. Magnesium magnetic isotope effect selectively stimulates the ATP formation in the oxygen-depleted cells due to a creatine kinase (CK and mitochondrial respiratory chain-focusing "attack" of 25Mg2+ released by nanoparticles. These "smart nanoparticles" with membranotropic properties release the overactivating cations only in response to the intracellular acidosis. The resulting positive changes in the energy metabolism of heart cell may help to prevent local myocardial hypoxic (ischemic disorders and, hence, to protect the heart muscle from a serious damage in a vast variety of the hypoxia-induced clinical situations including DXR side effects.

  10. Elders' Knowledge about Risk Factors of Coronary Heart Disease, Their Perceived Risk, and Adopted Preventive Behaviors

    Science.gov (United States)

    Al Khayyal, Hatem; El Geneidy, Moshera; El Shazly, Somaya Abdel Moneim

    2016-01-01

    Coronary heart disease is the most frequent single cause of death among persons over 65 years of age and it seems to continue to be a significant threat to the health and wellbeing of the elderly population all over the world, yet the condition is largely preventable. The aims of this study to assess and determine the relations among elder's…

  11. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    Science.gov (United States)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  12. A COMPREHENSIVE SURVEY ON DETECTING BLACK HOLE ATTACK IN MOBILE AD-HOC NETWORK (MANET

    Directory of Open Access Journals (Sweden)

    Pascal Maniriho

    2018-01-01

    Full Text Available The infrastructure-less nature and mobility of nodes in mobile ad-hoc network (MANET make it to be very susceptible to various attacks. Besides, owing to its flexibility and simplicity, there is no predefined time or permission set for nodes to leave or join the network and each node can act as a client or server.  Nevertheless, securing communication between nodes has become a challenging problem than in other types of network. Attacks in MANET range into different categories. Black hole attack is one of the attacks that has been addressed by many researchers in the recent years. It does occur when a harmful mobile node called black hole becomes a part of the network and tries to use its malicious behaviors by sending fake route reply packets (RREP for any received route request packets (RREQ. When these faked packets arrive to the source node, it does reply to them by sending data packet via the established route. Once the packets are received by the black hole, it drops them before reaching the destination.  Hence, preventing the source node from reaching the intended destination. In this paper, we present an overview of a wide range of techniques suggested in the literature for detecting and preventing black hole attacks in mobile ad hoc network. Additionally, the effect of each approach on the network performance is also presented.

  13. Iran the aerial defense facing a preventive attack against the nuclear sites

    International Nuclear Information System (INIS)

    Gruselle, B.; Payre, G.

    2006-01-01

    In the context of the nuclear uranium enrichment program development facing the international opinion, the author discusses the Iran policy of implementing a defense against an aerial attack. Even with the modernization of its anti-aerial defense, the Iran will cannot support an aerial american campaign, precise and long. (A.L.B.)

  14. Are blockchains immune to all malicious attacks?

    OpenAIRE

    Xu, Jennifer J.

    2016-01-01

    Background: In recent years, blockchain technology has attracted considerable attention. It records cryptographic transactions in a public ledger that is difficult to alter and compromise because of the distributed consensus. As a result, blockchain is believed to resist fraud and hacking. Results: This work explores the types of fraud and malicious activities that can be prevented by blockchain technology and identifies attacks to which blockchain remains vulnerable. Conclusions: This study ...

  15. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  16. CLINICAL AND ECONOMICAL ASSESSMENTS OF METOPROLOL TARTRATE/SUCCINATE USAGE IN PATIENTS WITH ISCHEMIC HEART DISEASE

    Directory of Open Access Journals (Sweden)

    M. V. Soura

    2008-01-01

    Full Text Available Clinical and clinicoeconomical studies review is presented as well as results of author’s comparative cost analysis on metoprolol tartrate (Betaloc and metoprolol succinate (Betaloc ZOK usage in patients with ischemic heart disease. Efficacy of metoprolol therapy is proven in randomized clinical studies in patients with angina and myocardial infarction (MI. In angina patients metoprolol prevents cardiac attacks, MI, reduces nitroglycerine consumption, increases exercise tolerability, prolongs the exercise time before ST segment depression (succinate better than tartrate, decrease of angina intensity. In MI patients metoprolol therapy reduces mortality, sudden death, recurring MI and the rate of early post MI angina attacks. Nowadays metoprolol is the only β-blocker having indication on secondary MI prevention. Besides for the present metoprolol succinate is the only β-blocker with proven direct antisclerosis effect. According to Swedish clinicoeconomical study in patients after MI secondary prevention with metoprolol therapy saves the costs in comparison with placebo. American clinicoeconomical model of metoprolol and atenolol usage in all patients with MI could result in significant reduction in mortality and recurring MI rate, prolong the life and improve its quality, save financial resources. The cost of monthly treatment of angina patient with metoprolol tartrate (Betaloc and metoprolol succinate (Betaloc ZOK is 135 and 354 rubles, respectively. The price range of comparative β-blockers in ascending order is the following: atenolol (Atenolol Nicomed → metoprolol tartrate (Betaloc → metoprolol succinate (Betaloc ZOK → bisoprolol (Concor → nebivolol (Nebilet. In conclusion, metoprolol therapy is the one of mostly economically reasonable approach.

  17. Crony Attack: Strategic Attack’s Silver Bullet

    Science.gov (United States)

    2006-11-01

    physical assets or financial assets. The form of crony attack that most closely resembles classic strategic attack is to deny, degrade, or destroy a money...February 1951. Reprinted in Airpower Studies Coursebook , Air Command and Staff College, Maxwell AFB, AL, 2002, 152–58. Hirsch, Michael. “NATO’s Game of

  18. Asthma-like attacks terminated by slow pathway ablation

    Directory of Open Access Journals (Sweden)

    Selcuk Ozturk

    2017-01-01

    Full Text Available Asthma is a chronic airway disease in which the pathological mechanisms are reversible airway obstruction, bronchial hyper reactivity, and constriction of the lower airways. Supraventricular tachycardia (SVT is a common arrhythmia which originates above the bundle of His and causing heart rates exceeding 150 beats/min. SVT patients present with palpitation, chest pain, chest discomfort, dyspnea, hyperventilation, and lightheadedness, occasionally. Besides, extraordinary presentations of SVT are available in literature. In this report, we describe a case of a patient presenting with treatment-resistant asthma-like attacks lasting for 20 years whom was suspected SVT as an underlying etiology and treated by slow pathway radiofrequency ablation.

  19. Evolving Use of Natriuretic Peptides as Part of Strategies for Heart Failure Prevention.

    Science.gov (United States)

    McDonald, Ken; Wilkinson, Mark

    2017-01-01

    Heart failure (HF) remains one of the major cardiovascular challenges to the Western world. Once established, HF is characterized by compromised life expectancy and quality of life with considerable dependence on hospital care for episodic clinical deterioration. Much is understood about the risk factors that predispose to the development of HF. With such a broad range of factors, it is clear that there is a large population at risk, potentially in excess of 25% of the adult population. Therein lies the major challenge at the outset of our efforts to prevent HF. With such a large population at risk, how do we develop an effective prevention strategy? HF prevention requires a multimodal approach. In this review, we focus primarily on the role of natriuretic peptide (NP) as a tool in a prevention strategy. Prevention of HF is a major public health challenge, underlined by the concerning epidemiological trends, the associated costs, and the continued difficulty to find effective therapies for the growing number of patients with preserved systolic function HF. Population-based approaches focusing on lifestyle and risk factor control have made some impact but not to a satisfactory level and also tend to result in a uniform approach across a population with different risk profiles. Individualizing risk is therefore required, with emerging data indicating that NP-guided risk stratification and intervention can reduce downstream incident HF and other cardiovascular events. © 2016 American Association for Clinical Chemistry.

  20. Survival of the relocated population of the U. S. after a nuclear attack. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Haaland, C.M.; Chester, C.V.; Wigner, E.P.

    1976-06-01

    The feasibility of continued survival after a hypothetical nuclear attack is evaluated for people relocated from high-risk areas during the crisis period before the attack. The attack consists of 6559 MT, of which 5951 MT are ground bursts on military, industrial, and urban targets. Relocated people are assumed to be adequately protected from fallout radiation by shelters of various kinds. The major problems in the postattack situation will be the control of exposure to fallout radiation, and prevention of severe food shortages to several tens of millions of people.

  1. Genetics Home Reference: critical congenital heart disease

    Science.gov (United States)

    ... Facebook Twitter Home Health Conditions Critical congenital heart disease Critical congenital heart disease Printable PDF Open All Close All ... for Disease Control and Prevention: Congenital Heart Defects Disease InfoSearch: Congenital Heart Defects KidsHealth from Nemours Lucile Packard Children's ...

  2. The Effective Ransomware Prevention Technique Using Process Monitoring on Android Platform

    OpenAIRE

    Song, Sanggeun; Kim, Bongjoon; Lee, Sangjun

    2016-01-01

    Due to recent indiscriminate attacks of ransomware, damage cases including encryption of users’ important files are constantly increasing. The existing vaccine systems are vulnerable to attacks of new pattern ransomware because they can only detect the ransomware of existing patterns. More effective technique is required to prevent modified ransomware. In this paper, an effective method is proposed to prevent the attacks of modified ransomware on Android platform. The proposed technique speci...

  3. Congenital heart disease and rheumatic heart disease in Africa: recent advances and current priorities.

    Science.gov (United States)

    Zühlke, Liesl; Mirabel, Mariana; Marijon, Eloi

    2013-11-01

    Africa has one of the highest prevalence of heart diseases in children and young adults, including congenital heart disease (CHD) and rheumatic heart disease (RHD). We present here an extensive review of recent data from the African continent highlighting key studies and information regarding progress in CHD and RHD since 2005. Main findings include evidence that the CHD burden is underestimated mainly due to the poor outcome of African children with CHD. The interest in primary prevention for RHD has been recently re-emphasised, and new data are available regarding echocardiographic screening for subclinical RHD and initiation of secondary prevention. There is an urgent need for comprehensive service frameworks to improve access and level of care and services for patients, educational programmes to reinforce the importance of prevention and early diagnosis and a relevant research agenda focusing on the African context.

  4. Protecting water and wastewater infrastructure from cyber attacks

    Science.gov (United States)

    Panguluri, Srinivas; Phillips, William; Cusimano, John

    2011-12-01

    Multiple organizations over the years have collected and analyzed data on cyber attacks and they all agree on one conclusion: cyber attacks are real and can cause significant damages. This paper presents some recent statistics on cyber attacks and resulting damages. Water and wastewater utilities must adopt countermeasures to prevent or minimize the damage in case of such attacks. Many unique challenges are faced by the water and wastewater industry while selecting and implementing security countermeasures; the key challenges are: 1) the increasing interconnection of their business and control system networks, 2) large variation of proprietary industrial control equipment utilized, 3) multitude of cross-sector cyber-security standards, and 4) the differences in the equipment vendor's approaches to meet these security standards. The utilities can meet these challenges by voluntarily selecting and adopting security standards, conducting a gap analysis, performing vulnerability/risk analysis, and undertaking countermeasures that best meets their security and organizational requirements. Utilities should optimally utilize their limited resources to prepare and implement necessary programs that are designed to increase cyber-security over the years. Implementing cyber security does not necessarily have to be expensive, substantial improvements can be accomplished through policy, procedure, training and awareness. Utilities can also get creative and allocate more funding through annual budgets and reduce dependence upon capital improvement programs to achieve improvements in cyber-security.

  5. Protecting water and wastewater infrastructure from cyber attacks

    Institute of Scientific and Technical Information of China (English)

    Srinivas Panguluri; William Phillips; John Cusimano

    2011-01-01

    Multiple organizations over the years have collected and analyzed data on cyber attacks and they all agree on one conclusion:cyber attacks are real and can cause significant damages.This paper presents some recent statistics on cyber attacks and resulting damages.Water and wastewater utilities must adopt countermeasures to prevent or minimize the damage in case of such attacks.Many unique challenges are faced by the water and wastewater industry while selecting and implementing security countermeasures; the key challenges are:1) the increasing interconnection of their business and control system networks,2) large variation of proprietary industrial control equipment utilized,3) multitude of cross-sector cyber-security standards,and 4) the differences in the equipment vendor's approaches to meet these security standards.The utilities can meet these challenges by voluntarily selecting and adopting security standards,conducting a gap analysis,performing vulnerability/risk analysis,and undertaking countermeasures that best meets their security and organizational requirements.Utilities should optimally utilize their limited resources to prepare and implement necessary programs that are designed to increase cyber-security over the years.Implementing cyber security does not necessarily have to be expensive,substantial improvements can be accomplished through policy,procedure,training and awareness.Utilities can also get creative and allocate more funding through annual budgets and reduce dependence upon capital improvement programs to achieve improvements in cyber-security.

  6. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  7. Secure Data Aggregation in Wireless Sensor Network-Fujisaki Okamoto(FO) Authentication Scheme against Sybil Attack.

    Science.gov (United States)

    Nirmal Raja, K; Maraline Beno, M

    2017-07-01

    In the wireless sensor network(WSN) security is a major issue. There are several network security schemes proposed in research. In the network, malicious nodes obstruct the performance of the network. The network can be vulnerable by Sybil attack. When a node illicitly assertions multiple identities or claims fake IDs, the WSN grieves from an attack named Sybil attack. This attack threatens wireless sensor network in data aggregation, synchronizing system, routing, fair resource allocation and misbehavior detection. Henceforth, the research is carried out to prevent the Sybil attack and increase the performance of the network. This paper presents the novel security mechanism and Fujisaki Okamoto algorithm and also application of the work. The Fujisaki-Okamoto (FO) algorithm is ID based cryptographic scheme and gives strong authentication against Sybil attack. By using Network simulator2 (NS2) the scheme is simulated. In this proposed scheme broadcasting key, time taken for different key sizes, energy consumption, Packet delivery ratio, Throughput were analyzed.

  8. GA-DoSLD: Genetic Algorithm Based Denial-of-Sleep Attack Detection in WSN

    Directory of Open Access Journals (Sweden)

    Mahalakshmi Gunasekaran

    2017-01-01

    Full Text Available Denial-of-sleep (DoSL attack is a special category of denial-of-service attack that prevents the battery powered sensor nodes from going into the sleep mode, thus affecting the network performance. The existing schemes used for the DoSL attack detection do not provide an optimal energy conservation and key pairing operation. Hence, in this paper, an efficient Genetic Algorithm (GA based denial-of-sleep attack detection (GA-DoSLD algorithm is suggested for analyzing the misbehaviors of the nodes. The suggested algorithm implements a Modified-RSA (MRSA algorithm in the base station (BS for generating and distributing the key pair among the sensor nodes. Before sending/receiving the packets, the sensor nodes determine the optimal route using Ad Hoc On-Demand Distance Vector Routing (AODV protocol and then ensure the trustworthiness of the relay node using the fitness calculation. The crossover and mutation operations detect and analyze the methods that the attackers use for implementing the attack. On determining an attacker node, the BS broadcasts the blocked information to all the other sensor nodes in the network. Simulation results prove that the suggested algorithm is optimal compared to the existing algorithms such as X-MAC, ZKP, and TE2P schemes.

  9. Detecting and Mitigating Smart Insider Jamming Attacks in MANETs Using Reputation-Based Coalition Game

    Directory of Open Access Journals (Sweden)

    Ashraf Al Sharah

    2016-01-01

    Full Text Available Security in mobile ad hoc networks (MANETs is challenging due to the ability of adversaries to gather necessary intelligence to launch insider jamming attacks. The solutions to prevent external attacks on MANET are not applicable for defense against insider jamming attacks. There is a need for a formal framework to characterize the information required by adversaries to launch insider jamming attacks. In this paper, we propose a novel reputation-based coalition game in MANETs to detect and mitigate insider jamming attacks. Since there is no centralized controller in MANETs, the nodes rely heavily on availability of transmission rates and a reputation for each individual node in the coalition to detect the presence of internal jamming node. The nodes will form a stable grand coalition in order to make a strategic security defense decision, maintain the grand coalition based on node reputation, and exclude any malicious node based on reputation value. Simulation results show that our approach provides a framework to quantify information needed by adversaries to launch insider attacks. The proposed approach will improve MANET’s defense against insider attacks, while also reducing incorrect classification of legitimate nodes as jammers.

  10. PKI Layer Cake: New Collision Attacks against the Global X.509 Infrastructure

    Science.gov (United States)

    Kaminsky, Dan; Patterson, Meredith L.; Sassaman, Len

    Research unveiled in December of 2008 [15] showed how MD5's long-known flaws could be actively exploited to attack the real-worldCertification Authority infrastructure. In this paper, we demonstrate two new classes of collision, which will be somewhat trickier to address than previous attacks against X.509: the applicability of MD2 preimage attacks against the primary root certificate for Verisign, and the difficulty of validating X.509 Names contained within PKCS#10 Certificate Requests.We also draw particular attention to two possibly unrecognized vectors for implementation flaws that have been problematic in the past: the ASN.1 BER decoder required to parsePKCS#10, and the potential for SQL injection fromtext contained within its requests. Finally, we explore why the implications of these attacks are broader than some have realized - first, because Client Authentication is sometimes tied to X.509, and second, because Extended Validation certificates were only intended to stop phishing attacks from names similar to trusted brands. As per the work of Adam Barth and Collin Jackson [4], EV does not prevent an attacker who can synthesize or acquire a "low assurance" certificate for a given name from acquiring the "green bar" EV experience.

  11. [A survey of perioperative asthmatic attack among patients with bronchial asthma underwent general anesthesia].

    Science.gov (United States)

    Ie, Kenya; Yoshizawa, Atsuto; Hirano, Satoru; Izumi, Sinyuu; Hojo, Masaaki; Sugiyama, Haruhito; Kobayasi, Nobuyuki; Kudou, Kouichirou; Maehara, Yasuhiro; Kawachi, Masaharu; Miyakoshi, Kouichi

    2010-07-01

    We investigated the risk factor of perioperative asthmatic attack and effectiveness of preventing treatment for asthmatic attack before operation. We performed retrospective chart review of one hundred eleven patients with asthma underwent general anesthesia and surgical intervention from January 2006 to October 2007 in our hospital. The rate of perioperative asthmatic attack were as follows; 10.2% (5 in 49 cases) in no pretreatment group, 7.5% (3 in 40 cases) in any pretreatments except for systemic steroid, and 4.5% (1 in 22 cases) in systemic steroid pretreatment group. Neither preoperative asthma severity nor duration from the last attack had significant relevancy to perioperative attack rate. The otolaryngological surgery, especially those have nasal polyp and oral surgery had high perioperative asthma attack rate, although there was no significant difference. We recommend the systemic steroid pretreatment for asthmatic patients, especially when they have known risk factor such as administration of the systemic steroid within 6 months, or possibly new risk factor such as nasal polyp, otolaryngological and oral surgery.

  12. Current and potential cyber attacks on medical journals; guidelines for improving security.

    Science.gov (United States)

    Dadkhah, Mehdi; Seno, Seyed Amin Hosseini; Borchardt, Glenn

    2017-03-01

    At the moment, scholarly publishing is faced with much academic misconduct and threats such as predatory journals, hijacked journals, phishing, and other scams. In response, we have been discussing this misconduct and trying to increase the awareness of researchers, but it seems that there is a lack of research that presents guidelines for editors to help them protect themselves against these threats. It seems that information security is missing in some parts of scholarly publishing that particularly involves medical journals. In this paper, we explain different types of cyber-attacks that especially threaten editors and academic journals. We then explain the details involved in each type of attack. Finally, we present general guidelines for detection and prevention of the attacks. In some cases, we use small experiments to show that our claim is true. Finally, we conclude the paper with a prioritization of these attacks. Copyright © 2016 European Federation of Internal Medicine. Published by Elsevier B.V. All rights reserved.

  13. Statistical studies for SNP association in acute coronary syndrome ex vivo use of agonists and nanoparticles

    CSIR Research Space (South Africa)

    Das Roy, P

    2014-06-01

    Full Text Available for Scientific and Industrial Research, Pretoria Background information Acute Coronary Syndrome (ACS), nick named as heart attack, is becoming one of the more frequent causes of death in today’s fast paced stressed out life, 4.8% of total death around... it occurs in order to prevent further blood loss during bleeding. However, sometime this platelet aggregation within the blood vessels cause the blocking of blood flow to the heart and hence cause what we know as heart attack, strokes, and peripheral...

  14. A Game Theoretical Approach to Hacktivism: Is Attack Likelihood a Product of Risks and Payoffs?

    Science.gov (United States)

    Bodford, Jessica E; Kwan, Virginia S Y

    2018-02-01

    The current study examines hacktivism (i.e., hacking to convey a moral, ethical, or social justice message) through a general game theoretic framework-that is, as a product of costs and benefits. Given the inherent risk of carrying out a hacktivist attack (e.g., legal action, imprisonment), it would be rational for the user to weigh these risks against perceived benefits of carrying out the attack. As such, we examined computer science students' estimations of risks, payoffs, and attack likelihood through a game theoretic design. Furthermore, this study aims at constructing a descriptive profile of potential hacktivists, exploring two predicted covariates of attack decision making, namely, peer prevalence of hacking and sex differences. Contrary to expectations, results suggest that participants' estimations of attack likelihood stemmed solely from expected payoffs, rather than subjective risks. Peer prevalence significantly predicted increased payoffs and attack likelihood, suggesting an underlying descriptive norm in social networks. Notably, we observed no sex differences in the decision to attack, nor in the factors predicting attack likelihood. Implications for policymakers and the understanding and prevention of hacktivism are discussed, as are the possible ramifications of widely communicated payoffs over potential risks in hacking communities.

  15. Lone Actor Terrorist Attack Planning and Preparation: A Data-Driven Analysis.

    Science.gov (United States)

    Schuurman, Bart; Bakker, Edwin; Gill, Paul; Bouhana, Noémie

    2017-10-23

    This article provides an in-depth assessment of lone actor terrorists' attack planning and preparation. A codebook of 198 variables related to different aspects of pre-attack behavior is applied to a sample of 55 lone actor terrorists. Data were drawn from open-source materials and complemented where possible with primary sources. Most lone actors are not highly lethal or surreptitious attackers. They are generally poor at maintaining operational security, leak their motivations and capabilities in numerous ways, and generally do so months and even years before an attack. Moreover, the "loneness" thought to define this type of terrorism is generally absent; most lone actors uphold social ties that are crucial to their adoption and maintenance of the motivation and capability to commit terrorist violence. The results offer concrete input for those working to detect and prevent this form of terrorism and argue for a re-evaluation of the "lone actor" concept. © 2017 The Authors. Journal of Forensic Sciences published by Wiley Periodicals, Inc. on behalf of American Academy of Forensic Sciences.

  16. Multiplayer Game for DDoS Attacks Resilience in Ad Hoc Networks

    DEFF Research Database (Denmark)

    Mikalas, Antonis; Komninos, Nikos; Prasad, Neeli R.

    2011-01-01

    This paper proposes a multiplayer game to prevent Distributed Denial of Service attack (DDoS) in ad hoc networks. The multiplayer game is based on game theory and cryptographic puzzles. We divide requests from nodes into separate groups which decreases the ability of malicious nodes to cooperate...... with one another in order to effectively make a DDoS attack. Finally, through our experiments we have shown that the total overhead of the multiplayer game as well as the the total time that each node needs to be served is affordable for devices that have limited resources and for environments like ad hoc...

  17. Nutrition in Heart Failure

    OpenAIRE

    Reci Meseri

    2013-01-01

    Heart failure is defined as decreased ability of heart due to various reasons. It%u2019s seen 2-3% but the prevalence increases sharply after the age of seventy. The objectives of nutrition therapy in heart failure are to prevent from water retention and edema, to avoid from hard digestion and to offer a balanced diet. In order to avoid fluid retention and edema, daily sodium and fluid intake must be monitored carefully. Main dilemma of the heart failure patients is the obesity-cachexia dilem...

  18. Astragalus Granule Prevents Ca2+ Current Remodeling in Heart Failure by the Downregulation of CaMKII

    Directory of Open Access Journals (Sweden)

    Sinai Li

    2017-01-01

    Full Text Available Background. Astragalus was broadly used for treating heart failure (HF and arrhythmias in East Asia for thousands of years. Astragalus granule (AG, extracted from Astragalus, shows beneficial effect on the treatment of HF in clinical research. We hypothesized that administration of AG prevents the remodeling of L-type Ca2+ current (ICa-L in HF mice by the downregulation of Ca2+/calmodulin-dependent protein kinase II (CaMKII. Methods. HF mice were induced by thoracic aortic constriction (TAC. After 4 weeks of AG treatment, cardiac function and QT interval were evaluated. Single cardiac ventricular myocyte was then isolated and whole-cell patch clamp was used to record action potential (AP and ICa-L. The expressions of L-type calcium channel alpha 1C subunit (Cav1.2, CaMKII, and phosphorylated protein kinase A (p-PKA were examined by western blot. Results. The failing heart manifested distinct electrical remodeling including prolonged repolarization time and altered ICa-L kinetics. AG treatment attenuated this electrical remodeling, supported by AG-related shortened repolarization time, decreased peak ICa-L, accelerated ICa-L inactivation, and positive frequency-dependent ICa-L facilitation. In addition, AG treatment suppressed the overexpression of CaMKII, but not p-PKA, in the failing heart. Conclusion. AG treatment protected the failing heart against electrical remodeling and ICa-L remodeling by downregulating CaMKII.

  19. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  20. A taxonomy and discussion of software attack technologies

    Science.gov (United States)

    Banks, Sheila B.; Stytz, Martin R.

    2005-03-01

    Software is a complex thing. It is not an engineering artifact that springs forth from a design by simply following software coding rules; creativity and the human element are at the heart of the process. Software development is part science, part art, and part craft. Design, architecture, and coding are equally important activities and in each of these activities, errors may be introduced that lead to security vulnerabilities. Therefore, inevitably, errors enter into the code. Some of these errors are discovered during testing; however, some are not. The best way to find security errors, whether they are introduced as part of the architecture development effort or coding effort, is to automate the security testing process to the maximum extent possible and add this class of tools to the tools available, which aids in the compilation process, testing, test analysis, and software distribution. Recent technological advances, improvements in computer-generated forces (CGFs), and results in research in information assurance and software protection indicate that we can build a semi-intelligent software security testing tool. However, before we can undertake the security testing automation effort, we must understand the scope of the required testing, the security failures that need to be uncovered during testing, and the characteristics of the failures. Therefore, we undertook the research reported in the paper, which is the development of a taxonomy and a discussion of software attacks generated from the point of view of the security tester with the goal of using the taxonomy to guide the development of the knowledge base for the automated security testing tool. The representation for attacks and threat cases yielded by this research captures the strategies, tactics, and other considerations that come into play during the planning and execution of attacks upon application software. The paper is organized as follows. Section one contains an introduction to our research

  1. Revisiting the Estonian Cyber Attacks: Digital Threats and Multinational Responses

    Directory of Open Access Journals (Sweden)

    Stephen Herzog

    2011-01-01

    Full Text Available In April 2007, the Estonian Government moved a memorial commemorating the Soviet liberation of the country from the Nazis to a less prominent and visible location in Tallinn. This decision triggered rioting among Russian-speaking minorities and cyber terrorism targeting Estonia's critical economic and political infrastructure. Drawing upon the Estonian cyber attacks, this article argues that globalization and the Internet have enabled transnational groups—such as the Russian diaspora—to avenge their grievances by threatening the sovereignty of nation-states in cyberspace. Sophisticated and virtually untraceable political "hacktivists" may now possess the ability to disrupt or destroy government operations, banking transactions, city power grids, and even military weapon systems. Fortunately, western countries banded together to effectively combat the Estonian cyber attacks and minimize their effects. However, this article concludes that in the age of globalization, interdependence, and digital interconnectedness, nation-states must engage in increased cooperative cyber-defense activities to counter and prevent devastating Internet attacks and their implications.

  2. Blocking of Brute Force Attack

    OpenAIRE

    M.Venkata Krishna Reddy

    2012-01-01

    A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your Web site requires user authentication, you are a good target for a brute-force attack. An attacker can always discover a password through a brute-force attack, but the downside is that it co...

  3. The acute and preventative treatment of episodic migraine

    Directory of Open Access Journals (Sweden)

    Sarah Miller

    2012-01-01

    Full Text Available Episodic migraine is a common debilitating condition with significant worldwide impact. An effective management plan must include acute treatment to relieve the pain and potential disability associated with the attacks and may also include preventative treatments with an aim of decreasing attack frequency and severity in the longer term. Acute treatments must be limited to a maximum of 2-3 days a week to prevent medication overuse headache and focus on simple analgesia, non-steroidal anti-inflammatory drugs and triptans. Preventative treatments are numerous and should be considered when migraine attacks are frequent and or disabling, acute medication is failing, in special circumstances such as hemiplegic migraines or if the patient requests them. All preventative medications must be given at therapeutic doses for at least 6-8 weeks before an adequate trial can be judged ineffective. The most important factor in choosing drugs is the patient and the clinical features of their attack and treatment should be tailored to these. Relative co-morbidities will influence drug choice, as will the side effect profile and the efficacy of the drug. First line preventative drugs include ß-blockers, amitriptyline and anti-epileptic drugs such as topiramate and valproate. Drugs with lower efficacy or poorer side effect profiles include selective serotonin reuptake inhibitors (SSRIs, calcium channel antagonists, gabapentin and herbal medicines.

  4. Retrospective evaluation of coyote attacks in dogs: 154 cases (1997-2012).

    Science.gov (United States)

    Frauenthal, Virginia M; Bergman, Philip; Murtaugh, Robert J

    2017-05-01

    To describe the clinical presentation and outcome of known attacks in client-owned dogs caused by the common coyote, Canis latrans. Retrospective observational study. Private referral hospital. One hundred fifty-four client-owned dogs known to be attacked by coyotes. None. Records from a private referral hospital from May 1997 through December 2012 were reviewed. Time of day and month/season of year, signalment, body temperature, heart rate, respiratory rate, body weight, location and severity of wounds inflicted, common injuries, length of hospitalization, necessity of surgical wound repair under anesthesia, antimicrobial use and mortality were recorded. Eighty-six percent of dogs presenting following coyote attack weighed Dogs with bite wounds to the thorax had the highest mortality at 21.3%. Criteria for systemic inflammatory response syndrome (SIRS) based on admission vital signs were met in 58.8% of dogs and the presence of SIRS was significantly associated with mortality (P hernia (9/154; 5.8%), and abdominal penetrating wounds (8/146; 5.5%). Dogs dogs are a problem in Southern California and are associated with substantial morbidity and mortality, especially in dogs with wounds to the thorax. Aggressive management involving surgical wound repair was associated with survival to discharge. © Veterinary Emergency and Critical Care Society 2017.

  5. Surveillance and threat detection prevention versus mitigation

    CERN Document Server

    Kirchner, Richard

    2014-01-01

    Surveillance and Threat Detection offers readers a complete understanding of the terrorist/criminal cycle, and how to interrupt that cycle to prevent an attack. Terrorists and criminals often rely on pre-attack and pre-operational planning and surveillance activities that can last a period of weeks, months, or even years. Identifying and disrupting this surveillance is key to prevention of attacks. The systematic capture of suspicious events and the correlation of those events can reveal terrorist or criminal surveillance, allowing security professionals to employ appropriate countermeasures and identify the steps needed to apprehend the perpetrators. The results will dramatically increase the probability of prevention while streamlining protection assets and costs. Readers of Surveillance and Threat Detection will draw from real-world case studies that apply to their real-world security responsibilities. Ultimately, readers will come away with an understanding of how surveillance detection at a high-value, f...

  6. Prospective Vigilance: Assessing Complex Coordinated Attack Preparedness Programs

    Science.gov (United States)

    2017-12-01

    INTENTIONALLY LEFT BLANK xiii LIST OF ACRONYMS AND ABBREVIATIONS CCA complex coordinate attack EMS emergency medical services FBI Federal Bureau...the Bombings in London on 7th July 2005, vol. HC 1087 (London: The Stationery Office, 2006), https://www.gov.uk/government/uploads/system/uploads...School Center for Homeland Defense and Security Mobile Education Team, DHS Office of Bombing Prevention, and DHS Active Shooter training. 55 NCTC, DHS

  7. Stroke Prevention in Atrial Fibrillation and Valvular Heart Disease.

    Science.gov (United States)

    Ahmad, Saad; Wilt, Heath

    2016-01-01

    There is a clinically staggering burden of disease stemming from cerebrovascular events, of which a majority are ischemic in nature and many are precipitated by atrial fibrillation (AF). AF can occur in isolation or in association with myocardial or structural heart disease. In the latter case, and when considering health at an international level, congenital and acquired valve-related diseases are frequent contributors to the current pandemic of AF and its clinical impact. Guidelines crafted by the American Heart Association, American College of Cardiology, European Society of Cardiology and Heart Rhythm Society underscore the use of vitamin K antagonists (VKAs) among patients with valvular heart disease, particularly in the presence of concomitant AF, to reduce the risk of ischemic stroke of cardioembolic origin; however, the non-VKAs, also referred to as direct, target-specific or new oral anticoagulants (NOACs), have not been actively studied in this particular population. In fact, each of the new agents is approved in patients with AF not caused by a valve problem. The aim of our review is to carefully examine the available evidence from pivotal phase 3 clinical trials of NOACs and determine how they might perform in patients with AF and concomitant valvular heart disease.

  8. Solidarity under Attack

    DEFF Research Database (Denmark)

    Meret, Susi; Goffredo, Sergio

    2017-01-01

    https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack......https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack...

  9. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants....

  10. DAILY CHANGES OF CENTRAL HEMODYNAMICS IN PATIENTS WITH CHRONIC HEART FAILURE WITH NIGHT-TIME DYSPNOEA ATTACK

    Directory of Open Access Journals (Sweden)

    S. A. Dovgolis

    2006-01-01

    Full Text Available Aim. To study daily changes of central hemodynamics (CHD in patients with chronic heart failure (CHF and the effects of therapy. Materials and methods. 22 patients with ischemic heart disease and CHF of III-IV functional class (FC by NYHA, age 60,5±10,5 were observed. Patients were suffering from night-time dyspnoea attacks and had pulmonary artery occlusion pressure (PAOP 15-20 mm Hg. CHD was monitored invasively before the treatment and after 4 weeks of CHF treatment. Results. According to the cardiac index (CI at admission patients were split into two groups. 9 patients of group-I had CI ≤2,15 l\\min\\m2, and 13 patients of group-II had CI >2,15 l\\min\\m2. In patients of group-I CI increased in 4 weeks of treatment. The treatment caused considerable clinical improvement in all patients. The CHD indexes also improved. Initially evening-night-time peaks of PAOP (р≤0,002, systolic (SBP (р≤0,003, diastolic (DBP (р=0,002 and average (BPa (р=0,0007 blood pressure (BP as well as double multiplication (DM (р≤0,008 were registered in patients of group-I. At the end of treatment only evening-night increase in DBP (р=0,002 and BPa (р≤0,006 were noted. In patients of group-II after 4 weeks of treatment CI decreased or didn’t change. Towards 28-th day of treatment 10 patients had clinical improvements. Only one patient’s FC NYHA increased. At the end of treatment the normalization of CHD was registered totally in group. Initially evening-night-time peaks of PAOP (р≤0,002, SBP (р≤0, 0001, CI (р=0,057 and DM (р=0,084 were registered in patients of group-II. At the end of treatment evening-night-time peaks of PAOP (р≤0,015, SBP (р≤0,044, CI (р≤0,005 and DM (р≤0,044 still remained. Besides, evening-night-time peaks of cardiac output (р≤0,01 and systolic index (р≤0, 06 have added. Conclusion. In patients with CHF with initial CI ≤2,15 l\\min\\m2 treatment results in the normalization of CHD and its daily

  11. Anti-spoofing for display and print attacks on palmprint verification systems

    Science.gov (United States)

    Kanhangad, Vivek; Bhilare, Shruti; Garg, Pragalbh; Singh, Pranjalya; Chaudhari, Narendra

    2015-05-01

    A number of approaches for personal authentication using palmprint features have been proposed in the literature, majority of which focus on improving the matching performance. However, of late, preventing potential attacks on biometric systems has become a major concern as more and more biometric systems get deployed for wide range of applications. Among various types of attacks, sensor level attack, commonly known as spoof attack, has emerged as the most common attack due to simplicity in its execution. In this paper, we present an approach for detection of display and print based spoof attacks on palmprint verifcation systems. The approach is based on the analysis of acquired hand images for estimating surface re ectance. First and higher order statistical features computed from the distributions of pixel intensities and sub-band wavelet coeefficients form the feature set. A trained binary classifier utilizes the discriminating information to determine if the acquired image is of real hand or a fake one. Experiments are performed on a publicly available hand image dataset, containing 1300 images corresponding to 230 subjects. Experimental results show that the real hand biometrics samples can be substituted by the fake digital or print copies with an alarming spoof acceptance rate as high as 79.8%. Experimental results also show that the proposed spoof detection approach is very effective for discriminating between real and fake palmprint images. The proposed approach consistently achieves over 99% average 10-fold cross validation classification accuracy in our experiments.

  12. Role of depression in secondary prevention of Chinese coronary heart disease patients receiving percutaneous coronary intervention.

    Directory of Open Access Journals (Sweden)

    Can Feng

    Full Text Available Coronary heart disease (CHD patients who have undergone percutaneous coronary intervention (PCI have higher rates of depression than the general population. However, few researchers have assessed the impact of depression on the secondary prevention of CHD in China.The main purpose of this investigation was to explore the relationship between depression and secondary prevention of CHD in Chinese patients after PCI.This descriptive, cross-sectional one-site study recruited both elective and emergency PCI patients one year after discharge. Data from 1934 patients were collected in the clinic using questionnaires and medical history records between August 2013 and September 2015. Depression was evaluated by the 9-item Patient Health Questionnaire. Secondary prevention of CHD was compared between depression and non-depression groups.We found that depression affected secondary prevention of CHD in the following aspects: lipid levels, blood glucose levels, smoking status, physical activity, BMI, and rates of medication use.Depressive patients with CHD are at increased risk of not achieving the lifestyle and risk factor control goals recommended in the 2006 AHA guidelines. Screening should focus on patients after PCI because treating depression can improve outcomes by improving secondary prevention of CHD.

  13. Dolichoectasia and Small Vessel Disease in Young Patients With Transient Ischemic Attack and Stroke.

    Science.gov (United States)

    Thijs, Vincent; Grittner, Ulrike; Fazekas, Franz; McCabe, Dominick J H; Giese, Anne-Katrin; Kessler, Christof; Martus, Peter; Norrving, Bo; Ringelstein, Erich Bernd; Schmidt, Reinhold; Tanislav, Christian; Putaala, Jukka; Tatlisumak, Turgut; von Sarnowski, Bettina; Rolfs, Arndt; Enzinger, Christian

    2017-09-01

    We evaluated whether basilar dolichoectasia is associated with markers of cerebral small vessel disease in younger transient ischemic attack and ischemic stroke patients. We used data from the SIFAP1 study (Stroke in Young Fabry Patients), a large prospective, hospital-based, screening study for Fabry disease in young (ischemic attack/stroke patients in whom detailed clinical data and brain MRI were obtained, and stroke subtyping with TOAST classification (Trial of ORG 10172 in Acute Stroke Treatment) was performed. Dolichoectasia was found in 508 of 3850 (13.2%) of patients. Dolichoectasia was associated with older age (odds ratio per decade, 1.26; 95% confidence interval, 1.09-1.44), male sex (odds ratio, 1.96; 95% confidence interval, 1.59-2.42), and hypertension (odds ratio, 1.39; 95% confidence interval, 1.13-1.70). Dolichoectasia was more common in patients with small infarctions (33.9% versus 29.8% for acute lesions, P =0.065; 29.1% versus 16.5% for old lesions, P ischemic attack and ischemic stroke. URL: http://www.clinicaltrials.gov. Unique identifier: NCT00414583. © 2017 American Heart Association, Inc.

  14. A systematic review of published interventions for primary and secondary prevention of ischaemic heart disease (IHD in rural populations of Australia

    Directory of Open Access Journals (Sweden)

    Laura V. Alston

    2016-08-01

    Full Text Available Abstract Background Rural Australians are known to experience a higher burden of ischaemic heart disease (IHD than their metropolitan counterparts and the reasons for this appear to be highly complex and not well understood. It is not clear what interventions and prevention efforts have occurred specifically in rural Australia in terms of IHD. A summary of this evidence could have implications for future action and research in improving the health of rural communities. The aim of this study was to review all published interventions conducted in rural Australia that were aimed at the primary and/or secondary prevention of ischaemic heart disease (IHD in adults. Methods Systematic review of the peer-reviewed literature published between January 1990 and December 2015. Search terms were derived from four major topics: (1 rural; (2 ischaemic heart disease; (3 Australia and; (4 intervention/prevention. Terms were adapted for six databases and three independent researchers screened results. Studies were included if the published work described an intervention focussed on the prevention or reduction of IHD or risk factors, specifically in a rural population of Australia, with outcomes specific to participants including, but not limited to, changes in diet, exercise, cholesterol or blood pressure levels. Results Of 791 papers identified in the search, seven studies met the inclusion criteria, and one further study was retrieved from searching reference lists of screened abstracts. Typically, excluded studies focused on cardiovascular diseases without specific reference to IHD, or presented intervention results without stratification by rurality. Larger trials that included metropolitan residents without stratification were excluded due to differences in the specific needs, characteristics and health service access challenges of rural populations. Six interventions were primary prevention studies, one was secondary prevention only and one included both

  15. A Bioterrorism Prevention Strategy for the 21st Century

    National Research Council Canada - National Science Library

    Lein, Brian

    2003-01-01

    .... The results of the anthrax attack and multiple wargames revealed that the United States is currently ill prepared to prevent or deter a bioterrorism attack against it's homeland and protect the citizens...

  16. N-acetylcysteine prevents nitrosative stress-associated depression of blood pressure and heart rate in streptozotocin diabetic rats.

    Science.gov (United States)

    Nagareddy, Prabhakara Reddy; Xia, Zhengyuan; MacLeod, Kathleen M; McNeill, John H

    2006-04-01

    Previous studies have indicated that cardiovascular abnormalities such as depressed blood pressure and heart rate occur in streptozotocin (STZ) diabetic rats. Chronic diabetes, which is associated with increased expression of inducible nitric oxide synthase (iNOS) and oxidative stress, may produce peroxynitrite/nitrotyrosine and cause nitrosative stress. We hypothesized that nitrosative stress causes cardiovascular depression in STZ diabetic rats and therefore can be corrected by reducing its formation. Control and STZ diabetic rats were treated orally for 9 weeks with N-acetylcysteine (NAC), an antioxidant and inhibitor of iNOS. At termination, the mean arterial blood pressure (MABP) and heart rate (HR) were measured in conscious rats. Nitrotyrosine and endothelial nitric oxide synthase (eNOS) and iNOS expression were assessed in the heart and mesenteric arteries by immunohistochemistry and Western blot experiments. Untreated diabetic rats showed depressed MABP and HR that was prevented by treatment with NAC. In untreated diabetic rats, levels of 15-F(2t)-isoprostane, an indicator of lipid peroxidation increased, whereas plasma nitric oxide and antioxidant concentrations decreased. Furthermore, decreased eNOS and increased iNOS expression were associated with elevated nitrosative stress in blood vessel and heart tissue of untreated diabetic rats. N-acetylcysteine treatment of diabetic rats not only restored the antioxidant capacity but also reduced the expression of iNOS and nitrotyrosine and normalized the expression of eNOS to that of control rats in heart and superior mesenteric arteries. The results suggest that nitrosative stress depress MABP and HR following diabetes. Further studies are required to elucidate the mechanisms involved in nitrosative stress mediated depression of blood pressure and heart rate.

  17. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  18. Toward Exposing Timing-Based Probing Attacks in Web Applications

    Directory of Open Access Journals (Sweden)

    Jian Mao

    2017-02-01

    Full Text Available Web applications have become the foundation of many types of systems, ranging from cloud services to Internet of Things (IoT systems. Due to the large amount of sensitive data processed by web applications, user privacy emerges as a major concern in web security. Existing protection mechanisms in modern browsers, e.g., the same origin policy, prevent the users’ browsing information on one website from being directly accessed by another website. However, web applications executed in the same browser share the same runtime environment. Such shared states provide side channels for malicious websites to indirectly figure out the information of other origins. Timing is a classic side channel and the root cause of many recent attacks, which rely on the variations in the time taken by the systems to process different inputs. In this paper, we propose an approach to expose the timing-based probing attacks in web applications. It monitors the browser behaviors and identifies anomalous timing behaviors to detect browser probing attacks. We have prototyped our system in the Google Chrome browser and evaluated the effectiveness of our approach by using known probing techniques. We have applied our approach on a large number of top Alexa sites and reported the suspicious behavior patterns with corresponding analysis results. Our theoretical analysis illustrates that the effectiveness of the timing-based probing attacks is dramatically limited by our approach.

  19. Toward Exposing Timing-Based Probing Attacks in Web Applications.

    Science.gov (United States)

    Mao, Jian; Chen, Yue; Shi, Futian; Jia, Yaoqi; Liang, Zhenkai

    2017-02-25

    Web applications have become the foundation of many types of systems, ranging from cloud services to Internet of Things (IoT) systems. Due to the large amount of sensitive data processed by web applications, user privacy emerges as a major concern in web security. Existing protection mechanisms in modern browsers, e.g., the same origin policy, prevent the users' browsing information on one website from being directly accessed by another website. However, web applications executed in the same browser share the same runtime environment. Such shared states provide side channels for malicious websites to indirectly figure out the information of other origins. Timing is a classic side channel and the root cause of many recent attacks, which rely on the variations in the time taken by the systems to process different inputs. In this paper, we propose an approach to expose the timing-based probing attacks in web applications. It monitors the browser behaviors and identifies anomalous timing behaviors to detect browser probing attacks. We have prototyped our system in the Google Chrome browser and evaluated the effectiveness of our approach by using known probing techniques. We have applied our approach on a large number of top Alexa sites and reported the suspicious behavior patterns with corresponding analysis results. Our theoretical analysis illustrates that the effectiveness of the timing-based probing attacks is dramatically limited by our approach.

  20. Security attack detection algorithm for electric power gis system based on mobile application

    Science.gov (United States)

    Zhou, Chao; Feng, Renjun; Wang, Liming; Huang, Wei; Guo, Yajuan

    2017-05-01

    Electric power GIS is one of the key information technologies to satisfy the power grid construction in China, and widely used in power grid construction planning, weather, and power distribution management. The introduction of electric power GIS based on mobile applications is an effective extension of the geographic information system that has been widely used in the electric power industry. It provides reliable, cheap and sustainable power service for the country. The accurate state estimation is the important conditions to maintain the normal operation of the electric power GIS. Recent research has shown that attackers can inject the complex false data into the power system. The injection attack of this new type of false data (load integrity attack LIA) can successfully bypass the routine detection to achieve the purpose of attack, so that the control center will make a series of wrong decision. Eventually, leading to uneven distribution of power in the grid. In order to ensure the safety of the electric power GIS system based on mobile application, it is very important to analyze the attack mechanism and propose a new type of attack, and to study the corresponding detection method and prevention strategy in the environment of electric power GIS system based on mobile application.

  1. Understanding network hacks attack and defense with Python

    CERN Document Server

    Ballmann, Bastian

    2015-01-01

    This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore the reader will be introduced to defense methods such as intrusion detection and prevention systems and log file analysis by diving into code.

  2. Hardening Logic Encryption against Key Extraction Attacks with Circuit Camouflage

    Science.gov (United States)

    2017-03-01

    camouflage; obfuscation; SAT; key extraction; reverse engineering ; security; trusted electronics Introduction Integrated Circuit (IC) designs are... Circuit camouflage is hardware obfuscation technology that prevents reverse engineering of a fabricated device by utilizing a relatively small...obfuscated with circuit camouflage technology, this type of attack becomes much more difficult because a reverse engineer cannot extract a gate- level

  3. Whispering through DDoS attack

    OpenAIRE

    Miralem Mehic; Jiri Slachta; Miroslav Voznak

    2016-01-01

    Denial of service (DoS) attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS) attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes o...

  4. Investigating Effect of Olfactory Stimulation by Vanilla on the Rate of Apnea Attacks in Neonates with Apnea of Prematurity: A Randomized Clinical Trial

    Directory of Open Access Journals (Sweden)

    Sakineh Yaghoubi

    2017-12-01

    Full Text Available Background Apnea of prematurity (AOP is a developmental disorder that affects the premature newborns frequently. One of the new non-drug methods for controlling apnea attacks is olfactory stimulation. The aim of this study was to determine the effect of olfactory stimulation by vanilla on the rate of apnea attacks in neonates with AOP. Materials and Methods: This study is a single-blind randomized clinical trial study. The study samples included a total of 40 premature neonates with AOP who were admitted to the neonatal Intensive care unit (NICU of Shahid Sadoughi hospital in Yazd, Iran, in 2016 and were assigned randomly in experimental (n=20, and control (n=20 groups. The experimental group was exposed to cotton impregnated with 2ml of vanillin extractfor 24 hours. The number of apnea attacks, heart rate, and arterial oxygen saturation (SaO2 level were measured before, during and after intervention for three consecutive days. Data analysis was performed using statistical analysis in SPSS version 22.0 software. Results: The results showed that there was no significant difference between the two groups in terms of mean number of apnea attacks (p>0.05. However, there was a significant difference between in the experimental group on the first day (2.84 ± 1.25, and second day (1.63 ± 1.01 in terms of the mean number of attacks. Also, there was a significant difference between the mean heart rate and SaO2 level in both the experimental and control groups (p

  5. Comparing primary prevention with secondary prevention to explain decreasing coronary heart disease death rates in Ireland, 1985-2000.

    LENUS (Irish Health Repository)

    Kabir, Zubair

    2007-01-01

    BACKGROUND: To investigate whether primary prevention might be more favourable than secondary prevention (risk factor reduction in patients with coronary heart disease(CHD)). METHODS: The cell-based IMPACT CHD mortality model was used to integrate data for Ireland describing CHD patient numbers, uptake of specific treatments, trends in major cardiovascular risk factors, and the mortality benefits of these specific risk factor changes in CHD patients and in healthy people without recognised CHD. RESULTS: Between 1985 and 2000, approximately 2,530 fewer deaths were attributable to reductions in the three major risk factors in Ireland. Overall smoking prevalence declined by 14% between 1985 and 2000, resulting in about 685 fewer deaths (minimum estimate 330, maximum estimate 1,285) attributable to smoking cessation: about 275 in healthy people and 410 in known CHD patients. Population total cholesterol concentrations fell by 4.6%, resulting in approximately 1,300 (minimum estimate 1,115, maximum estimate 1,660) fewer deaths attributable to dietary changes(1,185 in healthy people and 115 in CHD patients) plus 305 fewer deaths attributable to statin treatment (45 in people without CHD and 260 in CHD patients). Mean population diastolic blood pressure fell by 7.2%, resulting in approximately 170 (minimum estimate 105, maximum estimate 300) fewer deaths attributable to secular falls in blood pressure (140 in healthy people and 30 in CHD patients), plus approximately 70 fewer deaths attributable to antihypertensive treatments in people without CHD. Of all the deaths attributable to risk factor falls, some 1,715 (68%) occurred in people without recognized CHD and 815(32%) in CHD patients. CONCLUSION: Compared with secondary prevention, primary prevention achieved a two-fold larger reduction in CHD deaths. Future national CHD policies should therefore prioritize nationwide interventions to promote healthy diets and reduce smoking.

  6. Game Theory for Proactive Dynamic Defense and Attack Mitigation in Cyber-Physical Systems

    Energy Technology Data Exchange (ETDEWEB)

    Letchford, Joshua [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2016-09-01

    While there has been a great deal of security research focused on preventing attacks, there has been less work on how one should balance security and resilience investments. In this work we developed and evaluated models that captured both explicit defenses and other mitigations that reduce the impact of attacks. We examined these issues both in more broadly applicable general Stackelberg models and in more specific network and power grid settings. Finally, we compared these solutions to existing work in terms of both solution quality and computational overhead.

  7. Pop a Pill (A Cup of Health with CDC)

    Centers for Disease Control (CDC) Podcasts

    2015-07-16

    An aspirin a day can keep heart trouble away, but many adults with cardiovascular disease still don’t adhere to this preventive therapy. In this podcast, Dr. Mary George discusses the potential benefits of aspirin therapy in preventing heart attacks and strokes.  Created: 7/16/2015 by MMWR.   Date Released: 7/16/2015.

  8. PPARγ agonist pioglitazone reverses pulmonary hypertension and prevents right heart failure via fatty acid oxidation.

    Science.gov (United States)

    Legchenko, Ekaterina; Chouvarine, Philippe; Borchert, Paul; Fernandez-Gonzalez, Angeles; Snay, Erin; Meier, Martin; Maegel, Lavinia; Mitsialis, S Alex; Rog-Zielinska, Eva A; Kourembanas, Stella; Jonigk, Danny; Hansmann, Georg

    2018-04-25

    Right ventricular (RV) heart failure is the leading cause of death in pulmonary arterial hypertension (PAH). Peroxisome proliferator-activated receptor γ (PPARγ) acts as a vasoprotective metabolic regulator in smooth muscle and endothelial cells; however, its role in the heart is unclear. We report that deletion of PPARγ in cardiomyocytes leads to biventricular systolic dysfunction and intramyocellular lipid accumulation in mice. In the SU5416/hypoxia (SuHx) rat model, oral treatment with the PPARγ agonist pioglitazone completely reverses severe PAH and vascular remodeling and prevents RV failure. Failing RV cardiomyocytes exhibited mitochondrial disarray and increased intramyocellular lipids (lipotoxicity) in the SuHx heart, which was prevented by pioglitazone. Unbiased ventricular microRNA (miRNA) arrays, mRNA sequencing, and lipid metabolism studies revealed dysregulation of cardiac hypertrophy, fibrosis, myocardial contractility, fatty acid transport/oxidation (FAO), and transforming growth factor-β signaling in the failing RV. These epigenetic, transcriptional, and metabolic alterations were modulated by pioglitazone through miRNA/mRNA networks previously not associated with PAH/RV dysfunction. Consistently, pre-miR-197 and pre-miR-146b repressed genes that drive FAO ( Cpt1b and Fabp4 ) in primary cardiomyocytes. We recapitulated our major pathogenic findings in human end-stage PAH: (i) in the pressure-overloaded failing RV (miR-197 and miR-146b up-regulated), (ii) in peripheral pulmonary arteries (miR-146b up-regulated, miR-133b down-regulated), and (iii) in plexiform vasculopathy (miR-133b up-regulated, miR-146b down-regulated). Together, PPARγ activation can normalize epigenetic and transcriptional regulation primarily related to disturbed lipid metabolism and mitochondrial morphology/function in the failing RV and the hypertensive pulmonary vasculature, representing a therapeutic approach for PAH and other cardiovascular/pulmonary diseases. Copyright

  9. New Trends in Heart Regeneration: A Review

    Directory of Open Access Journals (Sweden)

    Kochegarov A

    2016-11-01

    Full Text Available In this review, we focus on new approaches that could lead to the regeneration of heart muscle and the restoration of cardiac muscle function derived from newly-formed cardiomyocytes. Various strategies for the production of cardiomyocytes from embryonic stem cells, induced pluripotent stem cells, adult bone marrow stem cells and cardiac spheres from human heart biopsies are described. Pathological conditions which lead to atherosclerosis and coronary artery disease often are followed by myocardial infarction causing myocardial cell death. After cell death, there is very little self-regeneration of the cardiac muscle tissue, which is replaced by non-contractile connective tissue, thus weakening the ability of the heart muscle to contract fully and leading to heart failure. A number of experimental research approaches to stimulate heart muscle regeneration with the hope of regaining normal or near normal heart function in the damaged heart muscle have been attempted. Some of these very interesting studies have used a variety of stem cell types in combination with potential cardiogenic differentiation factors in an attempt to promote differentiation of new cardiac muscle for possible future use in the clinical treatment of patients who have suffered heart muscle damage from acute myocardial infarctions or related cardiovascular diseases. Although progress has been made in recent years relative to promoting the differentiation of cardiac muscle tissue from non-muscle cells, much work remains to be done for this technology to be used routinely in translational clinical medicine to treat patients with damaged heart muscle tissue and return such individuals to pre-heart-attack activity levels.

  10. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks. In prac......In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks....... In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...

  11. Investigating multi-thread utilization as a software defence mechanism against side channel attacks

    CSIR Research Space (South Africa)

    Frieslaar, Ibraheem

    2016-11-01

    Full Text Available out information at critical points in the cryptographic algorithm and confuse the attacker. This research demonstrates it is capable of outperforming the known countermeasure of hiding and shuffling in terms of preventing the secret information from...

  12. Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks

    Directory of Open Access Journals (Sweden)

    Apostolos P. Fournaris

    2017-07-01

    Full Text Available Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT and Operational Technology (OT systems that are meant to operate harmonically under a security critical framework. As security IT countermeasures are gradually been installed in many embedded system nodes, thus securing them from many well-know cyber attacks there is a lurking danger that is still overlooked. Apart from the software vulnerabilities that typical malicious programs use, there are some very interesting hardware vulnerabilities that can be exploited in order to mount devastating software or hardware attacks (typically undetected by software countermeasures capable of fully compromising any embedded system device. Real-time microarchitecture attacks such as the cache side-channel attacks are such case but also the newly discovered Rowhammer fault injection attack that can be mounted even remotely to gain full access to a device DRAM (Dynamic Random Access Memory. Under the light of the above dangers that are focused on the device hardware structure, in this paper, an overview of this attack field is provided including attacks, threat directives and countermeasures. The goal of this paper is not to exhaustively overview attacks and countermeasures but rather to survey the various, possible, existing attack directions and highlight the security risks that they can pose to security critical embedded systems as well as indicate their strength on compromising the Quality of Service (QoS such systems are designed to provide.

  13. Anticoagulation in pregnant females with mechanical heart valves

    International Nuclear Information System (INIS)

    Shafique, H.; Chaudhry, A.; Ayyub, M.

    2006-01-01

    To evaluate the complications and outcome of anticoagulation therapy in pregnant females with valvular heart diseases. All pregnant females with prosthetic heart valves admitted in Armed Forces Institute of Cardiology from Jan 2004 to Dec 2004 were included in this study Basic demographic data including age, duration of pregnancy and complications observed were recorded. Warfarin was replaced with un-fractionated heparin (UFH) in first trimester and after that warfarin was continued with a targeted INR between 2.0-3.0. At 36 weeks warfarin was stopped and UFH was added; however, if patient went into spontaneous labour before this then immediate caesarian section was performed and UFH was restarted 4-6 hours after delivery along with oral warfarin. Out of 21 patients, sixteen (76.1%) had mitral valve diseases and five (23.9%) had both mitral and atrial. Majority (42.3%)of patients were in age group 26-30 years. Eleven (52.2%) reported in 9th month of gestation. Complications observed were hypertension (1), transient ischaemic attacks (1), pulmonary embolism (1), haemoptysis (1) and abortion (1). All patients, except one had successful completion of pregnancy. No case of foetal abnormality was seen. In 76% patients, daily dose of warfarin was <5 mg. Thrombo-prophylaxis in pregnancy with warfarin and UFH with an INR of 2.0-3.0 is effective in preventing thrombotic complications in females with mechanical valves without resulting in increase hemorrhagic complications. (author)

  14. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  15. Neuroradiological study of transient ischemic attack

    Energy Technology Data Exchange (ETDEWEB)

    Takusagawa, Yoshihiko; Fujiwara, Yasuhiro; Ichiki, Ken; Suga, Takeshi; Nishigaki, Shinichi

    1986-08-01

    Fifty-two patients with carotid TIAs and thirteen patients with vertebrobasilar TIAs were investigated by angiography and computed tomography. TIA was diagnosed by clinical symptoms in accordance with the criteria for TIA of the Joint Committee for Stroke Facilities in the U.S.A. (1974). The 65 patients with TIAs included 49 males and 16 females with average age of 63.5 years old at the initial episode of TIA. As for the diseases associated with TIA, hypertension (51 %), diabetes mellitus (15 %) and ischemic heart diseases (11 %) were the major disorders. Atrial fibrillation was observed in 2 cases. Intervals from last TIA attack to angiography were less than 7 days in 22 cases, 8 -- 30 days in 19 cases, 1 -- 4 monthes in 14 cases and more than 4 monthes in 10 cases, respectively. The cases in which angiography was done earlier after attacks displayed more abnormal findings. In 52 patients with caroted TIAs the artherosclerotic change of extracranial portion of the internal carotid artery was found in 14 cases (27 %), that of intracranial portion of the artery in 11 cases (21 %) and both lesions in 2 cases (4 %). On the other hand, in 13 patients with vertebrobasilar TIAs, this change was observed in 4 cases at the extracranival potion and in 1 case at the intracranial potion (siphon) of the internal carotid artery. Abnormal CT findings were found in 29 of 65 patients, namely 9 had ventricular dilatation and brain atrophy, 6 had cerebral infarction which was not associated with associated with symptoms of TIA. In carotid TIAs, Cerebral infarction was associated with symptoms of TIAs in 15 cases, namely 10 had a small low density area in the basal ganglia near the internal capsule and 5 had a low density area in the cortical or subcortical region. All of these 5 cases had cerebral embolism, which recanalized after attacks. (J.P.N.).

  16. Neuroradiological study of transient ischemic attack

    International Nuclear Information System (INIS)

    Takusagawa, Yoshihiko; Fujiwara, Yasuhiro; Ichiki, Ken; Suga, Takeshi; Nishigaki, Shinichi

    1986-01-01

    Fifty-two patients with carotid TIAs and thirteen patients with vertebrobasilar TIAs were investigated by angiography and computed tomography. TIA was diagnosed by clinical symptoms in accordance with the criteria for TIA of the Joint Committee for Stroke Facilities in the U.S.A. (1974). The 65 patients with TIAs included 49 males and 16 females with average age of 63.5 years old at the initial episode of TIA. As for the diseases associated with TIA, hypertension (51 %), diabetes mellitus (15 %) and ischemic heart diseases (11 %) were the major disorders. Atrial fibrillation was observed in 2 cases. Intervals from last TIA attack to angiography were less than 7 days in 22 cases, 8 ∼ 30 days in 19 cases, 1 ∼ 4 monthes in 14 cases and more than 4 monthes in 10 cases, respectively. The cases in which angiography was done earlier after attacks displayed more abnormal findings. In 52 patients with caroted TIAs the artherosclerotic change of extracranial portion of the internal carotid artery was found in 14 cases (27 %), that of intracranial portion of the artery in 11 cases (21 %) and both lesions in 2 cases (4 %). On the other hand, in 13 patients with vertebrobasilar TIAs, this change was observed in 4 cases at the extracranival potion and in 1 case at the intracranial potion (siphon) of the internal carotid artery. Abnormal CT findings were found in 29 of 65 patients, namely 9 had ventricular dilatation and brain atrophy, 6 had cerebral infarction which was not associated with associated with symptoms of TIA. In carotid TIAs, Cerebral infarction was associated with symptoms of TIAs in 15 cases, namely 10 had a small low density area in the basal ganglia near the internal capsule and 5 had a low density area in the cortical or subcortical region. All of these 5 cases had cerebral embolism, which recanalized after attacks. (J.P.N.)

  17. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  18. Bush animal attacks: management of complex injuries in a resource-limited setting

    Directory of Open Access Journals (Sweden)

    Mitchell Katrina B

    2011-12-01

    important to understand the management of these attacks in resource-limited health care environment. Further, the growing population and human encroachment on previously wild habitats such as the northwestern Tanzania bush argues for increased community awareness to assist in prevention of human injuries by animals.

  19. Invisible Trojan-horse attack.

    Science.gov (United States)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin; Makarov, Vadim

    2017-08-21

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Ac´ın-Ribordy-Gisin (SARG04) QKD protocol at 1924 nm versus that at 1536 nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N. Jain et al., New J. Phys. 16, 123030 (2014). However at 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.

  20. Prevention Research Matters

    Centers for Disease Control (CDC) Podcasts

    Prevention Research Matters is a series of one-on-one interviews with researchers from 26 university prevention research centers across the country. Their work focuses on preventing and controlling chronic diseases like obesity, cancer, and heart disease.

  1. Depression and coronary artery disease -real heart attack

    International Nuclear Information System (INIS)

    Farooqi, S.; Ahmed, B.

    2001-01-01

    Both depression and ischaemic heart disease are said to become the leading causes of morbidity and mortality in developing countries during the next two decades. The relationship between these two disorders has long been speculated but only recently addressed scientifically. A Medline search was conducted to obtain the articles that address the association between depressive disorders and coronary artery disease (CAD). Most studies following large cohorts over a period ranging from 4.5 to 27 years have shown that depression is associated with a significantly high risk of developing CAD. These studies also show that patients who have depression following myocardial infarction hat poorer prognosis on major cardiac end points like reoccurrence of myocardial infarction and death as compared to the non-depressed group. The psychosocial variables associated with depression like social isolation, acute and chronic stressful life events are also associated with increased risk of developing CAD. The mechanisms underlying this association between depression and CAD are unknown at present. The effectiveness of psychosocial interventions in reducing this increased risks have been demonstrated while the trials assessing the efficacy and safety of anti depressed drugs are underway. The implications of these finding are discussed in the context of developing countries. (author)

  2. Defending a single object against an attacker trying to detect a subset of false targets

    International Nuclear Information System (INIS)

    Peng, R.; Zhai, Q.Q.; Levitin, G.

    2016-01-01

    Deployment of false targets can be a very important and effective measure for enhancing the survivability of an object subjected to intentional attacks. Existing papers have assumed that false targets are either perfect or can be detected with a constant probability. In practice, the attacker may allocate part of its budget into intelligence actions trying to detect a subset of false targets. Analogously, the defender can allocate part of its budget into disinformation actions to prevent the false targets from being detected. In this paper, the detection probability of each false target is assumed to be a function of the intelligence and disinformation efforts allocated on the false target. The optimal resource distribution between target identification/disinformation and attack/protection efforts is studied as solutions of a non-cooperative two period min–max game between the two competitors for the case of constrained defense and attack resources. - Highlights: • A defense-attack problem is studied as a two-period min–max game. • Both intelligence contest over false targets and impact contest are considered. • Optimal defense and attack strategies are investigated with different parameters.

  3. ICS logging solution for network-based attacks using Gumistix technology

    Science.gov (United States)

    Otis, Jeremy R.; Berman, Dustin; Butts, Jonathan; Lopez, Juan

    2013-05-01

    Industrial Control Systems (ICS) monitor and control operations associated with the national critical infrastructure (e.g., electric power grid, oil and gas pipelines and water treatment facilities). These systems rely on technologies and architectures that were designed for system reliability and availability. Security associated with ICS was never an inherent concern, primarily due to the protections afforded by network isolation. However, a trend in ICS operations is to migrate to commercial networks via TCP/IP in order to leverage commodity benefits and cost savings. As a result, system vulnerabilities are now exposed to the online community. Indeed, recent research has demonstrated that many exposed ICS devices are being discovered using readily available applications (e.g., ShodanHQ search engine and Google-esque queries). Due to the lack of security and logging capabilities for ICS, most knowledge about attacks are derived from real world incidents after an attack has already been carried out and the damage has been done. This research provides a method for introducing sensors into the ICS environment that collect information about network-based attacks. The sensors are developed using an inexpensive Gumstix platform that can be deployed and incorporated with production systems. Data obtained from the sensors provide insight into attack tactics (e.g., port scans, Nessus scans, Metasploit modules, and zero-day exploits) and characteristics (e.g., attack origin, frequency, and level of persistence). Findings enable security professionals to draw an accurate, real-time awareness of the threats against ICS devices and help shift the security posture from reactionary to preventative.

  4. Can we reduce preventable heart failure readmissions in patients enrolled in a Disease Management Programme?

    LENUS (Irish Health Repository)

    Phelan, D

    2012-02-01

    BACKGROUND: Disease Management Programmes (DMPs) are successful in reducing hospital readmissions in heart failure (HF). However, there remain a number of patients enrolled in a DMP who are readmitted with HF. The primary aim of the study was to determine the proportion of preventable readmissions (PR). The secondary aim was to recognise patient characteristics which would identify certain patients at risk of having a PR. METHODS: A retrospective chart search was performed on patients readmitted over a 1-year period. RESULTS: 38.5% of readmissions were classified as PR. None of these patients made prior contact with the DMP. Admission levels of BNP, potassium, urea and creatinine were significantly lower in the PR group. CONCLUSION: DMP have proven benefits in reducing hospital readmission nonetheless a significant proportion of these readmissions are preventable. Further work is required to prospectively analyse why these patients fail to contact the DMP.

  5. Acquired heart conditions in adults with congenital heart disease: a growing problem.

    Science.gov (United States)

    Tutarel, Oktay

    2014-09-01

    The number of adults with congenital heart disease is increasing due to the great achievements in the field of paediatric cardiology, congenital heart surgery and intensive care medicine over the last decades. Mortality has shifted away from the infant and childhood period towards adulthood. As congenital heart disease patients get older, a high prevalence of cardiovascular risk factors is encountered similar to the general population. Consequently, the contribution of acquired morbidities, especially acquired heart conditions to patient outcome, is becoming increasingly important. Therefore, to continue the success story of the last decades in the treatment of congenital heart disease and to further improve the outcome of these patients, more attention has to be given to the prevention, detection and adequate therapy of acquired heart conditions. The aim of this review is to give an overview about acquired heart conditions that may be encountered in adults with congenital heart disease. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  6. Women's knowledge about heart disease: Differences among ethnic and cultural groups in the Israeli Women's Health in Midlife Study.

    Science.gov (United States)

    Blumstein, Tzvia; Benyamini, Yael; Boyko, Valentina; Lerner-Geva, Liat

    2016-01-01

    The current investigation aimed to assess levels of knowledge about risk factors for heart disease among midlife Israeli women, and to evaluate the relationship of knowledge to personal risk factors and vulnerability to heart disease. Face-to-face interviews with women aged 45-64 years were conducted during 2004-2006 within three population groups: long-term Jewish residents (LTR), immigrants from the former Soviet Union, and Arab women. The survey instrument included six knowledge statements relating to: the risk after menopause, family history, elevated cholesterol level, diabetes, obesity, and warning signs of a heart attack. The findings showed wide disparities in knowledge by educational level and between immigrants and LTR, after taking into account personal risk factors and education. Personal risk factors were not significantly related to the knowledge items, except for personal history of cardiovascular disease, which was associated with knowledge about "warning signs of a heart attack" and "family history." Women who perceived themselves as more vulnerable to heart disease were more likely to identify several risk factors correctly. These findings stress the need to increase knowledge about heart disease, especially among less educated and minority women, and to emphasize the risk of patients' personal status by health providers.

  7. Polar bear attacks on humans: Implications of a changing climate

    Science.gov (United States)

    Wilder, James; Vongraven, Dag; Atwood, Todd C.; Hansen, Bob; Jessen, Amalie; Kochnev, Anatoly A.; York, Geoff; Vallender, Rachel; Hedman, Daryll; Gibbons, Melissa

    2017-01-01

    Understanding causes of polar bear (Ursus maritimus) attacks on humans is critical to ensuring both human safety and polar bear conservation. Although considerable attention has been focused on understanding black (U. americanus) and grizzly (U. arctos) bear conflicts with humans, there have been few attempts to systematically collect, analyze, and interpret available information on human-polar bear conflicts across their range. To help fill this knowledge gap, a database was developed (Polar Bear-Human Information Management System [PBHIMS]) to facilitate the range-wide collection and analysis of human-polar bear conflict data. We populated the PBHIMS with data collected throughout the polar bear range, analyzed polar bear attacks on people, and found that reported attacks have been extremely rare. From 1870–2014, we documented 73 attacks by wild polar bears, distributed among the 5 polar bear Range States (Canada, Greenland, Norway, Russia, and United States), which resulted in 20 human fatalities and 63 human injuries. We found that nutritionally stressed adult male polar bears were the most likely to pose threats to human safety. Attacks by adult females were rare, and most were attributed to defense of cubs. We judged that bears acted as a predator in most attacks, and that nearly all attacks involved ≤2 people. Increased concern for both human and bear safety is warranted in light of predictions of increased numbers of nutritionally stressed bears spending longer amounts of time on land near people because of the loss of their sea ice habitat. Improved conflict investigation is needed to collect accurate and relevant data and communicate accurate bear safety messages and mitigation strategies to the public. With better information, people can take proactive measures in polar bear habitat to ensure their safety and prevent conflicts with polar bears. This work represents an important first step towards improving our understanding of factors influencing

  8. DNSSEC and Its Potential for DDoS Attacks - A Comprehensive Measurement Study

    NARCIS (Netherlands)

    van Rijswijk, Roland M.; Sperotto, Anna; Pras, Aiko

    2014-01-01

    Over the past five years we have witnessed the introduction of DNSSEC, a security extension to the DNS that relies on digital signatures. DNSSEC strengthens DNS by preventing attacks such as cache poisoning. However, a common argument against the deployment of DNSSEC is its potential for abuse in

  9. Clinical Outcomes in 3343 Children and Adults With Rheumatic Heart Disease From 14 Low- and Middle-Income Countries: Two-Year Follow-Up of the Global Rheumatic Heart Disease Registry (the REMEDY Study).

    Science.gov (United States)

    Zühlke, Liesl; Karthikeyan, Ganesan; Engel, Mark E; Rangarajan, Sumathy; Mackie, Pam; Cupido-Katya Mauff, Blanche; Islam, Shofiqul; Daniels, Rezeen; Francis, Veronica; Ogendo, Stephen; Gitura, Bernard; Mondo, Charles; Okello, Emmy; Lwabi, Peter; Al-Kebsi, Mohammed M; Hugo-Hamman, Christopher; Sheta, Sahar S; Haileamlak, Abraham; Daniel, Wandimu; Goshu, Dejuma Yadeta; Abdissa, Senbeta G; Desta, Araya G; Shasho, Bekele A; Begna, Dufera M; ElSayed, Ahmed; Ibrahim, Ahmed S; Musuku, John; Bode-Thomas, Fidelia; Yilgwan, Christopher C; Amusa, Ganiyu A; Ige, Olukemi; Okeahialam, Basil; Sutton, Christopher; Misra, Rajeev; Abul Fadl, Azza; Kennedy, Neil; Damasceno, Albertino; Sani, Mahmoud U; Ogah, Okechukwu S; Elhassan, Taiwo OlunugaHuda H M; Mocumbi, Ana Olga; Adeoye, Abiodun M; Mntla, Phindile; Ojji, Dike; Mucumbitsi, Joseph; Teo, Koon; Yusuf, Salim; Mayosi, Bongani M

    2016-11-08

    There are few contemporary data on the mortality and morbidity associated with rheumatic heart disease or information on their predictors. We report the 2-year follow-up of individuals with rheumatic heart disease from 14 low- and middle-income countries in Africa and Asia. Between January 2010 and November 2012, we enrolled 3343 patients from 25 centers in 14 countries and followed them for 2 years to assess mortality, congestive heart failure, stroke or transient ischemic attack, recurrent acute rheumatic fever, and infective endocarditis. Vital status at 24 months was known for 2960 (88.5%) patients. Two-thirds were female. Although patients were young (median age, 28 years; interquartile range, 18-40), the 2-year case fatality rate was high (500 deaths, 16.9%). Mortality rate was 116.3/1000 patient-years in the first year and 65.4/1000 patient-years in the second year. Median age at death was 28.7 years. Independent predictors of death were severe valve disease (hazard ratio [HR], 2.36; 95% confidence interval [CI], 1.80-3.11), congestive heart failure (HR, 2.16; 95% CI, 1.70-2.72), New York Heart Association functional class III/IV (HR, 1.67; 95% CI, 1.32-2.10), atrial fibrillation (HR, 1.40; 95% CI, 1.10-1.78), and older age (HR, 1.02; 95% CI, 1.01-1.02 per year increase) at enrollment. Postprimary education (HR, 0.67; 95% CI, 0.54-0.85) and female sex (HR, 0.65; 95% CI, 0.52-0.80) were associated with lower risk of death. Two hundred and four (6.9%) patients had new congestive heart failure (incidence, 38.42/1000 patient-years), 46 (1.6%) had a stroke or transient ischemic attack (8.45/1000 patient-years), 19 (0.6%) had recurrent acute rheumatic fever (3.49/1000 patient-years), and 20 (0.7%) had infective endocarditis (3.65/1000 patient-years). Previous stroke and older age were independent predictors of stroke/transient ischemic attack or systemic embolism. Patients from low- and lower-middle-income countries had significantly higher age- and sex

  10. Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0

    NARCIS (Netherlands)

    Gadyatskaya, Olga; Jhawar, Ravi; Kordy, P.T.; Lounis, Karim; Mauw, Sjouke; Trujillo-Rasua, Rolando

    2016-01-01

    In this tool demonstration paper we present the ADTool2.0: an open-source software tool for design, manipulation and analysis of attack trees. The tool supports ranking of attack scenarios based on quantitative attributes entered by the user; it is scriptable; and it incorporates attack trees with

  11. Cardiac-specific overexpression of catalase prevents diabetes-induced pathological changes by inhibiting NF-κB signaling activation in the heart.

    Science.gov (United States)

    Cong, Weitao; Ruan, Dandan; Xuan, Yuanhu; Niu, Chao; Tao, Youli; Wang, Yang; Zhan, Kungao; Cai, Lu; Jin, Litai; Tan, Yi

    2015-12-01

    Catalase is an antioxidant enzyme that specifically catabolizes hydrogen peroxide (H2O2). Overexpression of catalase via a heart-specific promoter (CAT-TG) was reported to reduce diabetes-induced accumulation of reactive oxygen species (ROS) and further prevent diabetes-induced pathological abnormalities, including cardiac structural derangement and left ventricular abnormity in mice. However, the mechanism by which catalase overexpression protects heart function remains unclear. This study found that activation of a ROS-dependent NF-κB signaling pathway was downregulated in hearts of diabetic mice overexpressing catalase. In addition, catalase overexpression inhibited the significant increase in nitration levels of key enzymes involved in energy metabolism, including α-oxoglutarate dehydrogenase E1 component (α-KGD) and ATP synthase α and β subunits (ATP-α and ATP-β). To assess the effects of the NF-κB pathway activation on heart function, Bay11-7082, an inhibitor of the NF-κB signaling pathway, was injected into diabetic mice, protecting mice against the development of cardiac damage and increased nitrative modifications of key enzymes involved in energy metabolism. In conclusion, these findings demonstrated that catalase protects mouse hearts against diabetic cardiomyopathy, partially by suppressing NF-κB-dependent inflammatory responses and associated protein nitration. Copyright © 2015 Elsevier Ltd. All rights reserved.

  12. Costs of heart disease and risk behaviour: implications for expenditure on prevention

    DEFF Research Database (Denmark)

    Kruse, Marie; Davidsen, Michael; Madsen, Mette

    2008-01-01

    , physical inactivity and smoking among future heart patients were estimated with the same method. RESULTS: Individuals with heart disease cost the healthcare system on average 3,195 (punhealthy lifestyle factors...... or cease unhealthy lifestyle may not only result in cost savings due to avoided heart disease. Additional cost savings may be obtained because heart patients who prior to the disease led a more healthy life consume fewer healthcare resources.......AIMS: The objective of this paper is firstly to estimate the healthcare costs attributable to heart disease in Denmark using recently available data for 2002-05. Secondly, to estimate the attributable healthcare costs of lifestyle risk factors among heart patients, in order to inform decision...

  13. Patients Commonly Believe Their Heart Failure Hospitalizations Are Preventable and Identify Worsening Heart Failure, Nonadherence, and a Knowledge Gap as Reasons for Admission.

    Science.gov (United States)

    Gilotra, Nisha A; Shpigel, Adam; Okwuosa, Ike S; Tamrat, Ruth; Flowers, Deirdre; Russell, Stuart D

    2017-03-01

    There are few data describing patient-identified precipitants of heart failure (HF) hospitalization. We hypothesized a patient's perception of reason for or preventability of an admission may be related to 30-day readmission rates. Ninety-four patients admitted with decompensated HF from July 2014 to March 2015 completed a brief questionnaire regarding circumstances leading to admission. Thirty-day outcomes were assessed via telephone call and chart review. Mean age was 58 ± 14 years, with 60% blacks (n = 56) and 41% females (n = 39). Median left ventricular ejection fraction was 30%; 27 had preserved ejection fraction. Seventy-two patients identified their hospitalization to be due to HF (± another condition). Most common patient-identified precipitants of admission were worsening HF (n = 37) and dietary nonadherence (n = 11). Readmitted patients tended to have longer time until first follow-up appointment (21 vs 8 days). Seven of the 42 patients who identified their hospitalization as preventable were readmitted compared with 21/49 who believed their hospitalization was unpreventable (P = .012). On multivariate regression analysis, patients who thought their hospitalization was preventable were less likely to be readmitted (odds ratio 0.31; 95% confidence interval 0.10-0.91; P = .04). Almost 50% of patients believe their HF hospitalization is preventable, and these patients appear to be less likely to be readmitted within 30 days. Notably, patients cite nonadherence and lack of knowledge as reasons hospitalizations are preventable. These results lend insight into possible interventions to reduce HF readmissions. Copyright © 2016 Elsevier Inc. All rights reserved.

  14. The work-averse cyber attacker model : theory and evidence from two million attack signatures

    NARCIS (Netherlands)

    Allodi, L.; Massacci, F.; Williams, J.

    The typical cyber attacker is assumed to be all powerful and to exploit all possible vulnerabilities. In this paper we present, and empirically validate, a novel and more realistic attacker model. The intuition of our model is that an attacker will optimally choose whether to act and weaponize a new

  15. Toward Exposing Timing-Based Probing Attacks in Web Applications †

    Science.gov (United States)

    Mao, Jian; Chen, Yue; Shi, Futian; Jia, Yaoqi; Liang, Zhenkai

    2017-01-01

    Web applications have become the foundation of many types of systems, ranging from cloud services to Internet of Things (IoT) systems. Due to the large amount of sensitive data processed by web applications, user privacy emerges as a major concern in web security. Existing protection mechanisms in modern browsers, e.g., the same origin policy, prevent the users’ browsing information on one website from being directly accessed by another website. However, web applications executed in the same browser share the same runtime environment. Such shared states provide side channels for malicious websites to indirectly figure out the information of other origins. Timing is a classic side channel and the root cause of many recent attacks, which rely on the variations in the time taken by the systems to process different inputs. In this paper, we propose an approach to expose the timing-based probing attacks in web applications. It monitors the browser behaviors and identifies anomalous timing behaviors to detect browser probing attacks. We have prototyped our system in the Google Chrome browser and evaluated the effectiveness of our approach by using known probing techniques. We have applied our approach on a large number of top Alexa sites and reported the suspicious behavior patterns with corresponding analysis results. Our theoretical analysis illustrates that the effectiveness of the timing-based probing attacks is dramatically limited by our approach. PMID:28245610

  16. Healthy Hearts (A Cup of Health with CDC)

    Centers for Disease Control (CDC) Podcasts

    Heart disease is among the leading causes of death worldwide. Combined with stroke, it accounts for one in three deaths. Improving heart health could save millions of lives each year. In this podcast, Dr. Barbara Bowman discusses ways to prevent heart problems.

  17. Risk of stroke and cardiovascular events after ischemic stroke or transient ischemic attack in patients with type 2 diabetes or metabolic syndrome: secondary analysis of the Stroke Prevention by Aggressive Reduction in Cholesterol Levels (SPARCL) trial

    DEFF Research Database (Denmark)

    Callahan, Alfred; Amarenco, Pierre; Goldstein, Larry B

    2011-01-01

    To perform a secondary analysis of the Stroke Prevention by Aggressive Reduction in Cholesterol Levels (SPARCL) trial, which tested the effect of treatment with atorvastatin in reducing stroke in subjects with a recent stroke or transient ischemic attack, to explore the effects of treatment...

  18. Web server attack analyzer

    OpenAIRE

    Mižišin, Michal

    2013-01-01

    Web server attack analyzer - Abstract The goal of this work was to create prototype of analyzer of injection flaws attacks on web server. Proposed solution combines capabilities of web application firewall and web server log analyzer. Analysis is based on configurable signatures defined by regular expressions. This paper begins with summary of web attacks, followed by detection techniques analysis on web servers, description and justification of selected implementation. In the end are charact...

  19. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based......Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identified...... on invalidating policies in the system model by identifying possible sequences of actions that lead to an attack. The generated attacks are precise enough to illustrate the threat, and they are general enough to hide the details of individual steps....

  20. Conclusions and recommendations from the symposium, Beyond Cholesterol: Prevention and Treatment of Coronary Heart Disease with n-3 Fatty Acids.

    Science.gov (United States)

    Deckelbaum, Richard J; Leaf, Alexander; Mozaffarian, Dariush; Jacobson, Terry A; Harris, William S; Akabas, Sharon R

    2008-06-01

    After the symposium "Beyond Cholesterol: Prevention and Treatment of Coronary Heart Disease with n-3 Fatty Acids," faculty who presented at the conference submitted manuscripts relating to their conference topics, and these are presented in this supplement. The content of these manuscripts was reviewed, and 2 conference calls were convened. The objective was to summarize existing evidence, gaps in evidence, and future research needed to strengthen recommendations for specific intakes of n-3 fatty acids for different conditions relating to cardiovascular disease. The following 2 questions were the main items discussed. What are the roles of n-3 fatty acids in primary versus secondary prevention of coronary heart disease? What are the roles of n-3 fatty acids in hypertriglyceridemia, in the metabolic syndrome and type 2 diabetes, and in sudden cardiac death, cardiac arrhythmias, and vulnerable plaque? Each area was summarized by using 2 general categories: 1) current knowledge for which general consensus exists, and 2) recommendations for research and policy. Additional references for these conclusions can be found in the articles included in the supplement.

  1. Terrorists and Suicide Attacks

    National Research Council Canada - National Science Library

    Cronin, Audrey K

    2003-01-01

    Suicide attacks by terrorist organizations have become more prevalent globally, and assessing the threat of suicide attacks against the United States and its interests at home and abroad has therefore...

  2. Anticoagulation in adults with congenital heart disease

    DEFF Research Database (Denmark)

    Jensen, A S; Idorn, L; Nørager, B

    2015-01-01

    Adults with congenital heart disease are a growing population. One of the major challenges in the care of these patients is to prevent thromboembolic episodes. Despite relative young age and no typical cardiovascular risk factors, this cohort has a high prevalence of thrombotic events....... Furthermore, there is a lack of scientific evidence regarding how to prevent thromboembolic events with anticoagulation in adults with congenital heart disease. The aim of this paper is to review the current literature pertaining to anticoagulation in adults with congenital heart disease and hence enable....... It is difficult to use treatment algorithms from the general adult population with acquired heart disease in this heterogeneous population due to special conditions such as myocardial scarring after previous surgery, atypical atrial flutter, prothrombotic conditions and the presence of interatrial shunts...

  3. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  4. Attack Trees with Sequential Conjunction

    NARCIS (Netherlands)

    Jhawar, Ravi; Kordy, Barbara; Mauw, Sjouke; Radomirović, Sasa; Trujillo-Rasua, Rolando

    2015-01-01

    We provide the first formal foundation of SAND attack trees which are a popular extension of the well-known attack trees. The SAND at- tack tree formalism increases the expressivity of attack trees by intro- ducing the sequential conjunctive operator SAND. This operator enables the modeling of

  5. Investigating the Possibility to Individualize Asthma Attack Therapy Based on Attack Severity and Patient Characteristics

    Directory of Open Access Journals (Sweden)

    Sárkány Zoltán

    2016-03-01

    Full Text Available Introduction: The objective of this study was to investigate with the help of a computerized simulation model whether the treatment of an acute asthma attack can be individualized based on the severity of the attack and the characteristics of the patient. Material and Method: A stochastic lung model was used to simulate the deposition of 1 nm - 10 μm particles during a mild and a moderate asthma attack. Breathing parameters were varied to maximize deposition, and simulation results were compared with those obtained in the case of a severe asthma attack. In order to investigate the effect of height on the deposition of inhaled particles, another series of simulations was carried out with identical breathing parameters, comparing patient heights of 155 cm, 175 cm and 195 cm. Results: The optimization process yielded an increase in the maximum deposition values of around 6-7% for each type of investigated asthma attack, and the difference between attacks of different degree of severity was around 5% for both the initial and the optimized values, a higher degree of obstruction increasing the amount of deposited particles. Conclusions: Our results suggest that the individualization of asthma attack treatment cannot be based on particles of different size, as the highest deposited fraction in all three types of attacks can be obtained using 0.01 μm particles. The use of a specific set of breathing parameters yields a difference between a mild and a moderate, as well as a moderate and a severe asthma attack of around 5%.

  6. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  7. Anger attacks in obsessive compulsive disorder

    Directory of Open Access Journals (Sweden)

    Nitesh Prakash Painuly

    2011-01-01

    Full Text Available Background: Research on anger attacks has been mostly limited to depression, and only a few studies have focused on anger attacks in obsessive compulsive disorder. Materials and Methods: In a cross-sectional study all new obsessive compulsive disorder patients aged 20-60 years attending an outpatient clinic were assessed using the anger attack questionnaire, irritability, depression and anxiety scale (for the direction of the aggressive behavior and quality of life (QOL. Results: The sample consisted of 42 consecutive subjects with obsessive compulsive disorder, out of which 21 (50% had anger attacks. The obsessive compulsive disorder subjects with and without anger attacks did not show significant differences in terms of sociodemographic variables, duration of illness, treatment, and family history. However, subjects with anger attacks had significantly higher prevalence of panic attacks and comorbid depression. Significantly more subjects with anger attacks exhibited aggressive acts toward spouse, parents, children, and other relatives in the form of yelling and threatening to hurt, trying to hurt, and threatening to leave. However, the two groups did not differ significantly in terms of QOL, except for the psychological domain being worse in the subjects with anger attacks. Conclusion: Anger attacks are present in half of the patients with obsessive compulsive disorder, and they correlate with the presence of comorbid depression.

  8. Ultrasound-targeted transfection of tissue-type plasminogen activator gene carried by albumin nanoparticles to dog myocardium to prevent thrombosis after heart mechanical valve replacement

    Directory of Open Access Journals (Sweden)

    Ji J

    2012-06-01

    Full Text Available Ji Jun, Ji Shang-Yi, Yang Jian-An, He Xia, Yang Xiao-Han, Ling Wen-Ping, Chen Xiao-LingDepartment of Pathology and Cardiovascular Surgery, Shenzhen Sun Yat-Sen Cardiovascular Hospital, Shenzhen, Guangdong, People's Republic of ChinaBackground: There are more than 300,000 prosthetic heart valve replacements each year worldwide. These patients are faced with a higher risk of thromboembolic events after heart valve surgery and long-term or even life-long anticoagulative and antiplatelet therapies are necessary. Some severe complications such as hemorrhaging or rebound thrombosis can occur when the therapy ceases. Tissue-type plasminogen activator (t-PA is a thrombolytic agent. One of the best strategies is gene therapy, which offers a local high expression of t-PA over a prolonged time period to avoid both systemic hemorrhaging and local rebound thrombosis. There are some issues with t-PA that need to be addressed: currently, there is no up-to-date report on how the t-PA gene targets the heart in vivo and the gene vector for t-PA needs to be determined.Aims: To fabricate an albumin nano-t-PA gene ultrasound-targeted agent and investigate its targeting effect on prevention of thrombosis after heart mechanic valve replacement under therapeutic ultrasound.Methods: A dog model of mechanical tricuspid valve replacement was constructed. A highly expressive t-PA gene plasmid was constructed and packaged by nanoparticles prepared with bovine serum albumin. This nanopackaged t-PA gene plasmid was further cross-linked to ultrasonic microbubbles prepared with sucrose and bovine serum albumin to form the ultrasonic-targeted agent for t-PA gene transfection. The agent was given intravenously followed by a therapeutic ultrasound treatment (1 MHz, 1.5 w/cm2, 10 minutes of the heart soon after valve replacement had been performed. The expression of t-PA in myocardium was detected with multiclonal antibodies to t-PA by the indirect immunohistochemical method

  9. Designing a Mobile Game for Home Computer Users to Protect Against Phishing Attacks

    OpenAIRE

    Arachchilage, Nalin Asanka Gamagedara; Cole, Melissa

    2016-01-01

    This research aims to design an educational mobile game for home computer users to prevent from phishing attacks. Phishing is an online identity theft which aims to steal sensitive information such as username, password and online banking details from victims. To prevent this, phishing education needs to be considered. Mobile games could facilitate to embed learning in a natural environment. The paper introduces a mobile game design based on a story which is simplifying and exaggerating real ...

  10. Transient ischemic attack: diagnostic evaluation.

    Science.gov (United States)

    Messé, Steven R; Jauch, Edward C

    2008-08-01

    A transient ischemic attack portends significant risk of a stroke. Consequently, the diagnostic evaluation in the emergency department is focused on identifying high-risk causes so that preventive strategies can be implemented. The evaluation consists of a facilitated evaluation of the patient's metabolic, cardiac, and neurovascular systems. At a minimum, the following tests are recommended: fingerstick glucose level, electrolyte levels, CBC count, urinalysis, and coagulation studies; noncontrast computed tomography (CT) of the head; electrocardiography; and continuous telemetry monitoring. Vascular imaging studies, such as carotid ultrasonography, CT angiography, or magnetic resonance angiography, should be performed on an urgent basis and prioritized according to the patient's risk stratification for disease. Consideration should be given for echocardiography if no large vessel abnormality is identified.

  11. The Justice of Preventive War

    National Research Council Canada - National Science Library

    Stephenson, Henry

    2004-01-01

    In response to the 9/11 attacks and continuing threats of mass-casualty terrorism, the United States has adopted a new security strategy that emphasizes anticipatory actions, including preventive war...

  12. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  13. An Enhancing Security Research of Tor Anonymous Communication to Against DDos Attacks

    Directory of Open Access Journals (Sweden)

    Feng Tao

    2017-01-01

    Full Text Available Tor (The Second Onion Router is modified by the first generation onion router and known as the most prevalent anonymous communication system. According to the advantage of low latency, high confidentiality of transmission content, high security of communication channels and et al., Tor is widely used in anonymous Web browsing, instant message and so on. However, the vulnerability and blemish of Tor affect system security. An identity and Signcryption-based concurrent signature scheme was used to prevent the behaviors of attackers from inserting controlled nodes and conspiring to make DDos attacks. The integrated security of Tor system was enhanced in our scheme. In addition we have proved the scheme.

  14. Canadian Cardiovascular Society Consensus Conference recommendations on heart failure update 2007: Prevention, management during intercurrent illness or acute decompensation, and use of biomarkers.

    Science.gov (United States)

    Arnold, J Malcom O; Howlett, Jonathan G; Dorian, Paul; Ducharme, Anique; Giannetti, Nadia; Haddad, Haissam; Heckman, George A; Ignaszewski, Andrew; Isaac, Debra; Jong, Philip; Liu, Peter; Mann, Elizabeth; McKelvie, Robert S; Moe, Gordon W; Parker, John D; Svendsen, Anna M; Tsuyuki, Ross T; O'Halloran, Kelly; Ross, Heather J; Rao, Vivek; Sequeira, Errol J; White, Michel

    2007-01-01

    Heart failure is common, yet it is difficult to treat. It presents in many different guises and circumstances in which therapy needs to be individualized. The Canadian Cardiovascular Society published a comprehensive set of recommendations in January 2006 on the diagnosis and management of heart failure, and the present update builds on those core recommendations. Based on feedback obtained through a national program of heart failure workshops during 2006, several topics were identified as priorities because of the challenges they pose to health care professionals. New evidence-based recommendations were developed using the structured approach for the review and assessment of evidence adopted and previously described by the Society. Specific recommendations and practical tips were written for the prevention of heart failure, the management of heart failure during intercurrent illness, the treatment of acute heart failure, and the current and future roles of biomarkers in heart failure care. Specific clinical questions that are addressed include: which patients should be identified as being at high risk of developing heart failure and which interventions should be used? What complications can occur in heart failure patients during an intercurrent illness, how should these patients be monitored and which medications may require a dose adjustment or discontinuation? What are the best therapeutic, both drug and nondrug, strategies for patients with acute heart failure? How can new biomarkers help in the treatment of heart failure, and when and how should BNP be measured in heart failure patients? The goals of the present update are to translate best evidence into practice, to apply clinical wisdom where evidence for specific strategies is weaker, and to aid physicians and other health care providers to optimally treat heart failure patients to result in a measurable impact on patient health and clinical outcomes in Canada.

  15. The Heartfile Lodhran CVD prevention project--end of project evaluation.

    Science.gov (United States)

    Nishtar, Sania; Badar, Asma; Kamal, Mohammad Umer; Iqbal, Azhar; Bajwa, Rashid; Shah, Tauqeer; Larik, Zahid; Karim, Fazle; Mehmood, Mahmood ul Hassan; Jehangir, Haroon; Azam, Syed Iqbal; Mirza, Yasir Abbas; Khan, Shahzad Ali; Qayyum, Aamra; Aqeel, Fauzia; Bakir, Abdul; Rahim, Ejaz

    2007-01-01

    Mainstream preventive interventions often fail to reach poor populations with a high risk of cardiovascular diseases (CVDs) in Pakistan. A community-based CVD primary prevention project aimed at developing approaches to reduce risk factors in such populations was established by Heartfile in collaboration with the National Rural Support Program in the district of Lodhran. The project implemented a range of activities integrated with existing social and health service mechanisms during a three year intervention period 2000/01-03/04. These were targeted in 4 key settings: community health education, mass media interventions, training of health professionals and health education through Lady Health Workers. The project received support from the Department for International Development, U.K. At the community level, a pre-test-post-test quasi-experimental design was used for examining project outcomes related to the community component of the intervention. Pre and post-intervention (training) evaluations were conducted involving all health care providers in randomly selected workshops in order to determine baseline levels of knowledge and the impact of training on knowledge level. In order to assess practices of physician and non-physician health care providers patient interviews, with control comparisons were conducted at each health care facility. Significant positive changes were observed in knowledge levels at a community level in the district of intervention compared with baseline knowledge levels particularly in relation to a heart healthy diet, beneficial level of physical activity, the causes of high blood pressure and heart attack and the effects of high blood pressure and active and passive smoking on health. Significant changes in behaviors at a practice level were not shown in the district of intervention. However the project played a critical role in spurring national action for the prevention and control of non-communicable diseases and introducing

  16. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  17. Cache timing attacks on recent microarchitectures

    DEFF Research Database (Denmark)

    Andreou, Alexandres; Bogdanov, Andrey; Tischhauser, Elmar Wolfgang

    2017-01-01

    Cache timing attacks have been known for a long time, however since the rise of cloud computing and shared hardware resources, such attacks found new potentially devastating applications. One prominent example is S$A (presented by Irazoqui et al at S&P 2015) which is a cache timing attack against...... AES or similar algorithms in virtualized environments. This paper applies variants of this cache timing attack to Intel's latest generation of microprocessors. It enables a spy-process to recover cryptographic keys, interacting with the victim processes only over TCP. The threat model is a logically...... separated but CPU co-located attacker with root privileges. We report successful and practically verified applications of this attack against a wide range of microarchitectures, from a two-core Nehalem processor (i5-650) to two-core Haswell (i7-4600M) and four-core Skylake processors (i7-6700). The attack...

  18. Improving access to important recovery information for heart patients with low health literacy: reflections on practice-based initiatives.

    Science.gov (United States)

    Naccarella, Lucio; Biuso, Catuscia; Jennings, Amanda; Patsamanis, Harry

    2018-05-29

    Evidence exists for the association between health literacy and heart health outcomes. Cardiac rehabilitation is critical for recovery from heart attack and reducing hospital readmissions. Despite this, literacy. This brief case study reflects and documents practice-based initiatives by Heart Foundation Victoria to improve access to recovery information for patients with low literacy levels. Three key initiatives, namely the Six Steps To Cardiac Recovery resource, the Love Your Heart book and the nurse ambassador program, were implemented informed by mixed methods that assessed need and capacity at the individual, organisational and systems levels. Key outcomes included increased access to recovery information for patients with low health literacy, nurse knowledge and confidence to engage with patients on recovery information, improved education of patients and improved availability and accessibility of information for patients in diverse formats. Given the challenges involved in addressing heart health literacy, multifaceted practice-based approaches are essential to improve access to recovery information for patients with low literacy levels. What is known about the topic? Significant challenges exist for patients with lower health literacy receiving recovery information after a heart attack in hospitals. What does this paper add? This case study provides insights into a practice-based initiative by Heart Foundation Victoria to improve access to recovery information for patients with low literacy levels. What are the implications for practitioners? Strategies to improve recovery through increased heart health literacy must address the needs of patients, nursing staff and the health system within hospitals. Such strategies need to be multifaceted and designed to build the capacity of nurses, heart patients and their carers, as well as support from hospital management.

  19. Women's Heart Foundation

    Science.gov (United States)

    ... News Email: Click for e-News archive The Women's Heart Foundation is a 501c3 dedicated to prevention, ... Care Initiative® to achieve excellence of care of women. Executive nurses, civic leaders, women survivors and sponsors ...

  20. CSI cardiac prevent 2015

    Directory of Open Access Journals (Sweden)

    S Ramakrishnan

    2015-01-01

    Full Text Available The CSI Cardiac Prevent 2015 was held at Hotel Taj Palace, New Delhi, on September 25-27, 2015. The major challenge was to create interest among cardiologists and physicians on preventive cardiology, a neglected area. The theme of the conference was "Innovations in Heart Disease Prevention.′′ This conference included "CSI at WHF Roadmap Workshop, Inauguration Ceremony, scientific program, plenary sessions, Nursing/Dietician track, Industry Exhibition, Social Events," Great India blood pressure Survey, and CSI Smart Heart App. A total of 848 delegates/faculties attended this conference against a total of 1140 people registered for the meeting.

  1. Heart Health (A Cup of Health with CDC)

    Centers for Disease Control (CDC) Podcasts

    Cardiovascular disease, which includes heart disease, stroke, and high blood pressure, is the leading cause of death in the U.S. One in 10 U.S. adults have been diagnosed with some form of heart disease. In this podcast, Dr. Matthew Ritchey discusses the four simple steps to prevent heart disease.

  2. ACE inhibitors and calcium antagonists in the treatment of congestive heart failure

    DEFF Research Database (Denmark)

    Hansen, J F

    1995-01-01

    heart failure in the SOLVD trials. In post-myocardial infarction patients, the calcium antagonist nifedipine did not affect mortality or morbidity; diltiazem improved prognosis in patients without congestive heart failure and in patients with non-Q-wave infarction; and verapamil improved prognosis...... by prevention of reinfarction and sudden death. Combination treatment with both verapamil, which has pronounced antiischemic properties and prevents sudden death and reinfarction, and an ACE inhibitor, which prevents the progression of heart failure, is a possibility for future cardiovascular therapy...

  3. Heart transplantation from older donors

    Directory of Open Access Journals (Sweden)

    V. N. Poptsov

    2017-01-01

    Full Text Available In the current situation of the shortage of suitable donor organs, heart transplantation from older donors is one of the ways to increase the performance of more heart transplants, particularly, in patients with urgent need of transplantation. While planning a heart transplantation from older donor one should consider increased risk of early cardiac allograft dysfunction, preexisting coronary artery disease, accelerated transplant vasculopathy which may adversely affect early and long-term survival of recipients. Subject to careful selection of donor–recipient pairs, effective prevention and treatment of early cardiac allograft dysfunction, pre-existing atherosclerosis and transplant vasculopathy the early and long-term survival of heart transplant recipients from older donors is comparable to heart transplantation from young donors.

  4. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  5. [Vocal cord functions in patients with asthma attack].

    Science.gov (United States)

    Oktay, Burcu; Selçuk, Omer Tarik; Ardiç, Sadik; Saylam, Güleser; Yüceege, Melike; Bilgin, Esra; Korkmaz, Hakan

    2009-01-01

    This study was planned to evaluate vocal cord functions and to establish underlying vocal cord dysfunctions (VCD) in patients with asthma attack. All patients admitted to emergency service of our hospital with asthma attack between February 01, 2007 and June 01, 2007 were included in the evaluation. After the evaluation, all patients regarded to have asthma attacks based on GINA 2006 guide were enrolled in the study. After first intervention, patients underwent endoscopic larynx examination for the evaluation of vocal cord functions. Twenty four (65.7%) male and 11 female (31.4%), overall 35 patients diagnosed with asthma and who did not have the history of another disease were included in the study. At endoscopic larynx examination carried out after first medical examination, at the moment of asthma attack, tongue, tongue base, epiglottis and arytenoid were observed to be within normal limits. In 9 (25.7%) patients, upper respiratory tract was hyperemic and in 2 (5.7%) odematous. One patient had nasal polyposis (p> 0.05). In the evaluation of vocal cord functions, restriction in adduction was observed in merely one patient. All other functions were normal. Rima opening width was established to be mean 8.34 + or - 0.725. VCD was deteced in none of the patients included in the study. Although we did not detect VCD in any patient, VCD should be borne in mind in cases which presents with the clinical picture of asthma and responds weakly to the treatment or in cases of unexplained shortness of breath. This may prevent many unnecessary procedures such as medication, entubation, tracheostomy and iatrogenic mortality. Further longutudial studies are required in order to shed light on the assocation of asthma with VCD.

  6. PHACK: An Efficient Scheme for Selective Forwarding Attack Detection in WSNs

    Directory of Open Access Journals (Sweden)

    Anfeng Liu

    2015-12-01

    Full Text Available In this paper, a Per-Hop Acknowledgement (PHACK-based scheme is proposed for each packet transmission to detect selective forwarding attacks. In our scheme, the sink and each node along the forwarding path generate an acknowledgement (ACK message for each received packet to confirm the normal packet transmission. The scheme, in which each ACK is returned to the source node along a different routing path, can significantly increase the resilience against attacks because it prevents an attacker from compromising nodes in the return routing path, which can otherwise interrupt the return of nodes’ ACK packets. For this case, the PHACK scheme also has better potential to detect abnormal packet loss and identify suspect nodes as well as better resilience against attacks. Another pivotal issue is the network lifetime of the PHACK scheme, as it generates more acknowledgements than previous ACK-based schemes. We demonstrate that the network lifetime of the PHACK scheme is not lower than that of other ACK-based schemes because the scheme just increases the energy consumption in non-hotspot areas and does not increase the energy consumption in hotspot areas. Moreover, the PHACK scheme greatly simplifies the protocol and is easy to implement. Both theoretical and simulation results are given to demonstrate the effectiveness of the proposed scheme in terms of high detection probability and the ability to identify suspect nodes.

  7. Predicting Factors of Zone 4 Attack in Volleyball.

    Science.gov (United States)

    Costa, Gustavo C; Castro, Henrique O; Evangelista, Breno F; Malheiros, Laura M; Greco, Pablo J; Ugrinowitsch, Herbert

    2017-06-01

    This study examined 142 volleyball games of the Men's Super League 2014/2015 seasons in Brazil from which we analyzed 24-26 games of each participating team, identifying 5,267 Zone 4 attacks for further analysis. Within these Zone 4 attacks, we analyzed the association between the effect of the attack carried out and the separate effects of serve reception, tempo and type of attack. We found that the reception, tempo of attack, second tempo of attack, and power of diagonal attack were predictors of the attack effect in Zone 4. Moreover, placed attacks showed a tendency to not yield a score. In conclusion, winning points in high-level men's volleyball requires excellent receptions, a fast attack tempo and powerfully executed of attacks.

  8. A Novel Protective Framework for Defeating HTTP-Based Denial of Service and Distributed Denial of Service Attacks

    Directory of Open Access Journals (Sweden)

    Mohammed A. Saleh

    2015-01-01

    Full Text Available The growth of web technology has brought convenience to our life, since it has become the most important communication channel. However, now this merit is threatened by complicated network-based attacks, such as denial of service (DoS and distributed denial of service (DDoS attacks. Despite many researchers’ efforts, no optimal solution that addresses all sorts of HTTP DoS/DDoS attacks is on offer. Therefore, this research aims to fix this gap by designing an alternative solution called a flexible, collaborative, multilayer, DDoS prevention framework (FCMDPF. The innovative design of the FCMDPF framework handles all aspects of HTTP-based DoS/DDoS attacks through the following three subsequent framework’s schemes (layers. Firstly, an outer blocking (OB scheme blocks attacking IP source if it is listed on the black list table. Secondly, the service traceback oriented architecture (STBOA scheme is to validate whether the incoming request is launched by a human or by an automated tool. Then, it traces back the true attacking IP source. Thirdly, the flexible advanced entropy based (FAEB scheme is to eliminate high rate DDoS (HR-DDoS and flash crowd (FC attacks. Compared to the previous researches, our framework’s design provides an efficient protection for web applications against all sorts of DoS/DDoS attacks.

  9. Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?

    Directory of Open Access Journals (Sweden)

    Ines Goicoechea-Telleria

    2018-01-01

    Full Text Available The use of biometrics keeps growing. Every day, we use biometric recognition to unlock our phones or to have access to places such as the gym or the office, so we rely on the security manufacturers offer when protecting our privileges and private life. It is well known that it is possible to hack into a fingerprint sensor using fake fingers made of Play-Doh and other easy-to-obtain materials but to what extent? Is this true for all users or only for specialists with a deep knowledge on biometrics? Are smartphone fingerprint sensors as reliable as desktop sensors? To answer these questions, we performed 3 separate evaluations. First, we evaluated 4 desktop fingerprint sensors of different technologies by attacking them with 7 different fake finger materials. All of them were successfully attacked by an experienced attacker. Secondly, we carried out a similar test on 5 smartphones with embedded sensors using the most successful materials, which also hacked the 5 sensors. Lastly, we gathered 15 simulated attackers with no background in biometrics to create fake fingers of several materials, and they had one week to attack the fingerprint sensors of the same 5 smartphones, with the starting point of a short video with the techniques to create them. All 5 smartphones were successfully attacked by an inexperienced attacker. This paper will provide the results achieved, as well as an analysis on the attack potential of every case. All results are given following the metrics of the standard ISO/IEC 30107-3.

  10. Websites' analyses of security prevention from hackers

    International Nuclear Information System (INIS)

    Ran Min; Liu Baoxu

    2000-01-01

    The author describes the key technology about how to prevent website security problems upon the hacker's attack behavior process, which is based on the time sequence including before, after and then according to the different prevention strategy. And the solutions are given to authors' references

  11. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia.

    Science.gov (United States)

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (2003). Problems faced, lessons learnt, and costs incurred are discussed. A burns disaster plan drawing on lessons learnt from these attacks is presented. Thirty-one patients were treated at the SGH Burns Centre in three attacks (2002 Bali attack [n = 15], 2003 Jakarta attack [n = 14], and 2005 Bali attack [n = 2]). For the 2002 Bali attack, median age was 29 years (range 20 to 50 years), median percentage of total burn surface area (TBSA) was 29% (range 5% to 55%), and median abbreviated burn severity index (ABSI) was 6 (range 3 to 10). Eight of 15 patients were admitted to the intensive care unit. For the 2003 Jakarta attack, median age was 35 years (range 24 to 56 years), median percentage of TBSA was 10% (range 2% to 46%), and median ABSI was 4 (range 3 to 9). A large number of patients had other injuries. Problems faced included manpower issues, lack of bed space, shortage of blood products, and lack of cadaver skin. The changing nature of terror attacks mandates continued vigilance and disaster preparedness. The multidimensional burns patient, complicated by other injuries, is likely to become increasingly common. A burns disaster plan with emphasis on effective command, control, and communication as well as organisation of health care personnel following a 'team concept' will do much to ensure that the sudden onset of a crisis situation at an unexpected time does not overwhelm hospital manpower and resources.

  12. Assessing the risk of attack in the management of asthma: a review and proposal for revision of the current control-centred paradigm.

    Science.gov (United States)

    Blakey, John D; Woolnough, Kerry; Fellows, Jodie; Walker, Samantha; Thomas, Mike; Pavord, Ian D

    2013-09-01

    Asthma guidelines focus on day-to-day control of symptoms. However, asthma attacks remain common. They continue to cause mortality and considerable morbidity, and are a major financial burden to the UK National Health Service (NHS) and the wider community. Asthma attacks have chronic consequences, being associated with loss of lung function and significant psychological morbidity. In this article we argue that addressing daily symptom control is only one aspect of asthma treatment, and that there should be a more explicit focus on reducing the risk of asthma attacks. Management of future risk by general practitioners is already central to other conditions such as ischaemic heart disease and chronic renal impairment. We therefore propose a revised approach that separately considers the related domains of daily control and future risk of asthma attack. We believe this approach will have advantages over the current 'stepwise' approach to asthma management. It should encourage individualised treatment, including non-pharmacological measures, and thus may lead to more efficacious and less harmful management strategies. We speculate that this type of approach has the potential to reduce morbidity and healthcare costs related to asthma attacks.

  13. Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks

    Directory of Open Access Journals (Sweden)

    Željko Gavrić

    2018-01-01

    Full Text Available Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the security issue is very important. DOS (denial of service attacks are a fundamental threat to the functioning of wireless sensor networks. This paper describes some of the most common DOS attacks and potential methods of protection against them. The case study shows one of the most frequent attacks on wireless sensor networks – the interference attack. In the introduction of this paper authors assume that the attack interference can cause significant obstruction of wireless sensor networks. This assumption has been proved in the case study through simulation scenario and simulation results.

  14. Plants under dual attack

    NARCIS (Netherlands)

    Ponzio, C.A.M.

    2016-01-01

    Though immobile, plants are members of complex environments, and are under constant threat from a wide range of attackers, which includes organisms such as insect herbivores or plant pathogens. Plants have developed sophisticated defenses against these attackers, and include chemical responses

  15. Preventing High Blood Pressure

    Science.gov (United States)

    ... Heart Disease Cholesterol Salt Million Hearts® WISEWOMAN Preventing High Blood Pressure: Healthy Living Habits Recommend on Facebook Tweet Share ... meal and snack options can help you avoid high blood pressure and its complications. Be sure to eat plenty ...

  16. Prevention and control of rheumatic heart disease: Overcoming core challenges in resource-poor environments

    Science.gov (United States)

    Dougherty, Scott; Beaton, Andrea; Nascimento, Bruno R; Zühlke, Liesl J; Khorsandi, Maziar; Wilson, Nigel

    2018-01-01

    Rheumatic heart disease (RHD) has long receded as a significant threat to public health in high-income countries. In low-resource settings, however, the specter of RHD remains unabated, as exemplified by recent data from the Global Burden of Diseases Study. There are many complex reasons for this ongoing global disparity, including inadequate data on disease burden, challenges in effective advocacy, ongoing poverty and inequality, and weak health systems, most of which predominantly affect developing nations. In this review, we discuss how each of these acts as a core challenge in RHD prevention and control. We then examine key lessons learnt from successful control programs in the past and highlight resources that have been developed to help create strong national RHD control programs. PMID:29440834

  17. New attacks on Wi-Fi Protected Setup

    OpenAIRE

    Hamed Mohtadi; Alireza Rahimi

    2015-01-01

    Wi-Fi Protected Setup (WPS) is a network security standard that is used to secure networks in home and office, introduced in 2006 by the Wi-Fi Alliance. It provides easier configuration setup and is used in almost all recent Wi-Fi devices. In this paper we propose two attacks on this standard. The first attack is an offline brute force attack that uses imbalance on registration protocol. This attack needs user action, but it is more efficient than previous attacks. The second attack uses weak...

  18. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  19. Invisible Trojan-horse attack

    DEFF Research Database (Denmark)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin

    2017-01-01

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance...

  20. [Control of major cardiovascular risk factors of ischemic heart disease in secondary prevention in Aragón: COCINA study].

    Science.gov (United States)

    Cucalon Arenal, J M; Buisac Ramón, C; Marin Ibáñez, A; Castan Ruiz, S; Blay Cortes, M G; Barrasa Villar, J I

    2016-01-01

    Ischemic heart disease remains a leading cause of death in Spain. According to the American Heart Association/American College of Cardiology (AHA/ACC) and European national societies, secondary prevention for these patients consists of control of major cardiovascular risk factors (CVRF) and suitable lifestyle habits. To determine the degree of control of CVRF in the Aragonese population in secondary prevention. Cross-sectional study of a sample of 705 patients of Aragon who had suffered a cardiac event, selected opportunistically in consultations of family physicians participating in the 3 provinces of Aragon. The study was conducted in the second half of 2012. To measure the degree of control of different FRVC and lifestyle habits in this population. Anthropometric, different cardiovascular risk factors, treatment and lifestyle. 58% of men and 52% of women met criteria for monitoring of measured variables. The best result was obtained with smoking cessation and the worst with BMI. Hypertension, Dyslipidemia and Diabetes Mellitus achieve poor control results. The results show that the degree of control of CVRF is still low, especially in variables such as dyslipidemia and Diabetes Mellitus. Only 16.5% of control patients met criteria given the pharmacologically-modifiable cardiovascular risk factors. Copyright © 2015 SEHLELHA. Published by Elsevier España, S.L.U. All rights reserved.

  1. Radiological attacks and accidents. Medical consequences

    International Nuclear Information System (INIS)

    Sakuta, Hidenari

    2007-01-01

    Probability of the occurrence of radiological attacks appears to be elevated after the terrorist attacks against the United States on September 11 in 2001. There are a lot of scenarios of radiological attack: simple radiological device, radiological disperse device (RDD or dirty bomb), attacks against nuclear reactor, improvised nuclear device, and nuclear weapons. Of these, RDD attack is the most probable scenario, because it can be easily made and can generate enormous psychological and economic damages. Radiological incidents are occurring to and fro in the world, including several cases of theft to nuclear facilities and unsuccessful terrorist attacks against them. Recently, a former Russian spy has allegedly been killed using polonium-210. In addition, serious radiological accidents have occurred in Chernobyl, Goiania, and Tokai-mura. Planning, preparation, education, and training exercise appear to be essential factors to cope with radiological attacks and accidents effectively without feeling much anxiety. Triage and psychological first aid are prerequisite to manage and provide effective medial care for mass casualties without inducing panic. (author)

  2. Script-viruses Attacks on UNIX OS

    Directory of Open Access Journals (Sweden)

    D. M. Mikhaylov

    2010-06-01

    Full Text Available In this article attacks on UNIX OS are considered. Currently antivirus developers are concentrated on protecting systems from viruses that are most common and attack popular operating systems. If the system or its components are not often attacked then the antivirus products are not protecting these components as it is not profitable. The same situation is with script-viruses for UNIX OS as most experts consider that it is impossible for such viruses to get enough rights to attack. Nevertheless the main conclusion of this article is the fact that such viruses can be very powerful and can attack systems and get enough rights.

  3. Smoking Cessation Intervention After Ischemic Stroke or Transient Ischemic Attack. A Randomized Controlled Pilot Trial

    DEFF Research Database (Denmark)

    Brunner Frandsen, Nicole; Sørensen, Margit; Hyldahl, Tanja Kirstine

    2012-01-01

    BACKGROUND: Smoking cessation is widely recommended for secondary stroke prevention. However, little is known about the efficacy of smoking cessation intervention after stroke or transient ischemic attack (TIA). METHODS: Ninety-four smokers under age 76, admitted with ischemic stroke or TIA were ...

  4. Healthy Hearts (A Cup of Health with CDC)

    Centers for Disease Control (CDC) Podcasts

    2014-10-02

    Heart disease is among the leading causes of death worldwide. Combined with stroke, it accounts for one in three deaths. Improving heart health could save millions of lives each year. In this podcast, Dr. Barbara Bowman discusses ways to prevent heart problems.  Created: 10/2/2014 by MMWR.   Date Released: 10/2/2014.

  5. Targeting Pioglitazone Hydrochloride Therapy After Stroke or Transient Ischemic Attack According to Pretreatment Risk for Stroke or Myocardial Infarction.

    Science.gov (United States)

    Kernan, Walter N; Viscoli, Catherine M; Dearborn, Jennifer L; Kent, David M; Conwit, Robin; Fayad, Pierre; Furie, Karen L; Gorman, Mark; Guarino, Peter D; Inzucchi, Silvio E; Stuart, Amber; Young, Lawrence H

    2017-11-01

    There is growing recognition that patients may respond differently to therapy and that the average treatment effect from a clinical trial may not apply equally to all candidates for a therapy. To determine whether, among patients with an ischemic stroke or transient ischemic attack and insulin resistance, those at higher risk for future stroke or myocardial infarction (MI) derive more benefit from the insulin-sensitizing drug pioglitazone hydrochloride compared with patients at lower risk. A secondary analysis was conducted of the Insulin Resistance Intervention After Stroke trial, a double-blind, placebo-controlled trial of pioglitazone for secondary prevention. Patients were enrolled from 179 research sites in 7 countries from February 7, 2005, to January 15, 2013, and were followed up for a mean of 4.1 years through the study's end on July 28, 2015. Eligible participants had a qualifying ischemic stroke or transient ischemic attack within 180 days of entry and insulin resistance without type 1 or type 2 diabetes. Pioglitazone or matching placebo. A Cox proportional hazards regression model was created using baseline features to stratify patients above or below the median risk for stroke or MI within 5 years. Within each stratum, the efficacy of pioglitazone for preventing stroke or MI was calculated. Safety outcomes were death, heart failure, weight gain, and bone fracture. Among 3876 participants (1338 women and 2538 men; mean [SD] age, 63 [11] years), the 5-year risk for stroke or MI was 6.0% in the pioglitazone group among patients at lower baseline risk compared with 7.9% in the placebo group (absolute risk difference, -1.9% [95% CI, -4.4% to 0.6%]). Among patients at higher risk, the risk was 14.7% in the pioglitazone group vs 19.6% for placebo (absolute risk difference, -4.9% [95% CI, -8.6% to 1.2%]). Hazard ratios were similar for patients below or above the median risk (0.77 vs 0.75; P = .92). Pioglitazone increased weight less among patients at

  6. The potential role of honey and its polyphenols in preventing heart ...

    African Journals Online (AJOL)

    Many epidemiological studies have shown that regular intake of phenolic compounds is associated with reduced risk of heart diseases. In coronary heart disease, the protective effects of phenolic compounds include mainly antithrombotic, anti-ischemic, anti-oxidant, and vasorelaxant. It is suggested that flavonoids decrease ...

  7. Hybrid attacks on model-based social recommender systems

    Science.gov (United States)

    Yu, Junliang; Gao, Min; Rong, Wenge; Li, Wentao; Xiong, Qingyu; Wen, Junhao

    2017-10-01

    With the growing popularity of the online social platform, the social network based approaches to recommendation emerged. However, because of the open nature of rating systems and social networks, the social recommender systems are susceptible to malicious attacks. In this paper, we present a certain novel attack, which inherits characteristics of the rating attack and the relation attack, and term it hybrid attack. Furtherly, we explore the impact of the hybrid attack on model-based social recommender systems in multiple aspects. The experimental results show that, the hybrid attack is more destructive than the rating attack in most cases. In addition, users and items with fewer ratings will be influenced more when attacked. Last but not the least, the findings suggest that spammers do not depend on the feedback links from normal users to become more powerful, the unilateral links can make the hybrid attack effective enough. Since unilateral links are much cheaper, the hybrid attack will be a great threat to model-based social recommender systems.

  8. Level of consciousness on admission to a Heart Attack Centre is a predictor of survival from out-of-hospital cardiac arrest.

    Science.gov (United States)

    Deakin, Charles D; Fothergill, Rachael; Moore, Fionna; Watson, Lynne; Whitbread, Mark

    2014-07-01

    The relationship between the neurological status at the time of handover from the ambulance crew to a Heart Attack Centre (HAC) in patients who have achieved return of spontaneous circulation (ROSC) and subsequent outcome, in the context of current treatment standards, is unknown. A retrospective review of all patients treated by London Ambulance Service (LAS) from 1(st) April 2011 to 31(st) March 2013 admitted to a HAC in Greater London was undertaken. Neurological status (A - alert; V - responding to voice; P - responding to pain; U - unresponsive) recorded by the ambulance crew on handover was compared with length of hospital stay and survival to hospital discharge. A total of 475 sequential adult cardiac arrests of presumed cardiac origin, achieving ROSC on admission to a HAC were identified. Outcome data was available for 452 patients, of whom 253 (56.0%) survived to discharge. Level of consciousness on admission to the HAC was a predictor of duration of hospital stay (Pa shockable rhythm, 32.3% (120/371) were 'A' or 'V', compared with 9.1% (9/99) of those with non-shockable rhythms (PA or V) compared with those with non-shockable rhythms. Most patients who are conscious on admission to the HAC will survive, compared with approximately half of those who are unconscious (P or U), suggesting that critical care is generally appropriate at all levels of consciousness if ROSC has been achieved. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  9. A Zebrafish Heart Failure Model for Assessing Therapeutic Agents.

    Science.gov (United States)

    Zhu, Xiao-Yu; Wu, Si-Qi; Guo, Sheng-Ya; Yang, Hua; Xia, Bo; Li, Ping; Li, Chun-Qi

    2018-03-20

    Heart failure is a leading cause of death and the development of effective and safe therapeutic agents for heart failure has been proven challenging. In this study, taking advantage of larval zebrafish, we developed a zebrafish heart failure model for drug screening and efficacy assessment. Zebrafish at 2 dpf (days postfertilization) were treated with verapamil at a concentration of 200 μM for 30 min, which were determined as optimum conditions for model development. Tested drugs were administered into zebrafish either by direct soaking or circulation microinjection. After treatment, zebrafish were randomly selected and subjected to either visual observation and image acquisition or record videos under a Zebralab Blood Flow System. The therapeutic effects of drugs on zebrafish heart failure were quantified by calculating the efficiency of heart dilatation, venous congestion, cardiac output, and blood flow dynamics. All 8 human heart failure therapeutic drugs (LCZ696, digoxin, irbesartan, metoprolol, qiliqiangxin capsule, enalapril, shenmai injection, and hydrochlorothiazide) showed significant preventive and therapeutic effects on zebrafish heart failure (p failure model developed and validated in this study could be used for in vivo heart failure studies and for rapid screening and efficacy assessment of preventive and therapeutic drugs.

  10. Clinical pattern of heart diseases in children

    International Nuclear Information System (INIS)

    Ejaz, M.S.; Billoo, A.G.

    2000-01-01

    This study was done to determine various causes and clinical presentation of heart disease in children. It was a prospective hospital study conducted in Department of Pediatrics Civil Hospital, Karachi from August 1995 to February 1996. In this study, 70 patients of heart disease upto 12 years of age were inducted. There were 33 (47.14%) cases of congenital heart diseases and 37 (52.85%) cases of acquired heart diseases. The age distribution showed that heart disease was more frequent between 0-11 months of age (41.42%). Congenital heart diseases were also frequent between 0-11 months (28.57%). On the other hand acquired heart diseases were more common between 6-12 years (22.85%). In this study the males were predominantly involved, the male to female ratio was 1.05:1. In congenital heart disease it was 1.3:1 and in acquired heart diseases it was 0.85:1. Ventricular septal defect was the commonest congenital lesion reported (20%). Rheumatic fever and viral myocarditis were two frequently occurring acquired heart-diseases 17.14% each. The common presentation of heart diseases were respiratory distress (94.28%), fever (90%), feeding difficulty (57.14%) and failure to thrive (34.28%). In case of rheumatic fever, chorea was present in 8.57%, arthritis in 11.42% and S/C nodules (2.85%) cases respectively. The early management of the problem may help in decreasing morbidity and mortality due to these disease in children. Prenatal detection of congenital cardiac lesions by fetal echocardiography in high risk pregnancies, early intervention in neonatal period and counseling of the parents may help in prevention of congenital heart diseases in children. Primary prevention of rheumatic fever can be achieved by early diagnosis and treatment of streptococcal throat infection. (author)

  11. An Analysis of Attacks on Blockchain Consensus

    OpenAIRE

    Bissias, George; Levine, Brian Neil; Ozisik, A. Pinar; Andresen, Gavin

    2016-01-01

    We present and validate a novel mathematical model of the blockchain mining process and use it to conduct an economic evaluation of the double-spend attack, which is fundamental to all blockchain systems. Our analysis focuses on the value of transactions that can be secured under a conventional double-spend attack, both with and without a concurrent eclipse attack. Our model quantifies the importance of several factors that determine the attack's success, including confirmation depth, attacke...

  12. Psychosocial risk factors and heart failure hospitalization

    DEFF Research Database (Denmark)

    Rod, Naja Hulvej; Andersen, Ingelise; Prescott, Eva

    2011-01-01

    Prospective studies on the role of psychosocial factors in heart failure development are virtually nonexistent. The authors aimed to address the effect of psychosocial factors on the risk of heart failure hospitalization in men and women free of cardiovascular disease. In 1991-1993, the 8......-fourth of the population reported some degree of vital exhaustion. The vital exhaustion score was associated with a higher risk of heart failure in a dose-response manner (P risk of heart failure in both men (hazard ratio = 1.93, 95% confidence...... in the population, even a modestly higher risk of heart failure associated with vital exhaustion may be of importance in the planning of future preventive strategies for heart failure....

  13. Automated classification of computer network attacks

    CSIR Research Space (South Africa)

    Van Heerden, R

    2013-11-01

    Full Text Available according to the relevant types of attack scenarios depicted in the ontology. The two network attack instances are the Distributed Denial of Service attack on SpamHaus in 2013 and the theft of 42 million Rand ($6.7 million) from South African Postbank...

  14. Risk Factors and Prevention

    Science.gov (United States)

    ... Resources Risk Factors & Prevention Back to Patient Resources Risk Factors & Prevention Even people who look healthy and ... Blood Pressure , high cholesterol, diabetes, and thyroid disease. Risk Factors For Arrhythmias and Heart Disease The following ...

  15. Factors affecting ambulance utilization for asthma attack treatment: understanding where to target interventions.

    Science.gov (United States)

    Raun, L H; Ensor, K B; Campos, L A; Persse, D

    2015-05-01

    Asthma is a serious, sometimes fatal condition, in which attacks vary in severity, potentially requiring emergency medical services (EMS) ambulance treatment. A portion of asthma attacks requiring EMS ambulance treatment may be prevented with improved education and access to care. The aim of this study was to identify areas of the city with high rates of utilization of EMS ambulance for treatment, and the demographics, socio-economic status, and time of day associated with these rates, to better target future interventions to prevent emergencies and reduce cost. A cross-sectional study was conducted on individuals in Houston, TX (USA) requiring ambulance treatment for asthma attacks from 2004 to 2011. 12,155 EMS ambulance-treated asthma attack cases were linked to census tracts. High rate treatment areas were identified with geospatial mapping. Census tract demographic characteristics of these high rate areas were compared with the remainder of the city using logistic regression. The association between case level demographics and the time of day of asthma attack within the high rate area was also assessed with logistic regression. EMS ambulance-treated high rate areas were identified and found to have a utilization incidence rate over six times higher per 100,000 people than the remainder of the city. There is an increased risk of location in this high rate area with a census tract level increase of percent of population: earning less than $10,000 yearly income (RR 1.21, 1.16-1.26), which is black (RR 1.08, 1.07-1.10), which is female (RR 1.34, 1.20-1.49) and have obtained less than a high school degree (RR 1.02, 1.01-1.03). Within the high rate area, case level data indicates an increased risk of requiring an ambulance after normal doctor office hours for men compared with women (RR 1.13, 1.03-1.22), for black compared with Hispanic ethnicity (RR 1.31, 1.08-1.59), or for adults (less than 41 and greater than 60) compared with children. Interventions to prevent

  16. Localization-Free Detection of Replica Node Attacks in Wireless Sensor Networks Using Similarity Estimation with Group Deployment Knowledge

    Directory of Open Access Journals (Sweden)

    Chao Ding

    2017-01-01

    Full Text Available Due to the unattended nature and poor security guarantee of the wireless sensor networks (WSNs, adversaries can easily make replicas of compromised nodes, and place them throughout the network to launch various types of attacks. Such an attack is dangerous because it enables the adversaries to control large numbers of nodes and extend the damage of attacks to most of the network with quite limited cost. To stop the node replica attack, we propose a location similarity-based detection scheme using deployment knowledge. Compared with prior solutions, our scheme provides extra functionalities that prevent replicas from generating false location claims without deploying resource-consuming localization techniques on the resource-constraint sensor nodes. We evaluate the security performance of our proposal under different attack strategies through heuristic analysis, and show that our scheme achieves secure and robust replica detection by increasing the cost of node replication. Additionally, we evaluate the impact of network environment on the proposed scheme through theoretic analysis and simulation experiments, and indicate that our scheme achieves effectiveness and efficiency with substantially lower communication, computational, and storage overhead than prior works under different situations and attack strategies.

  17. Hotels as a target for terrorism: a study of the Helsinki area hotels’ preparedness for an attack

    OpenAIRE

    Kovalevskiy, Andrey

    2015-01-01

    The threat of terrorism is an issue that is not to be taken lightly in the world of today. The year 2015 has sadly been marked with an unsettlingly high number of acts of terror across the globe that claimed a multitude of civilian lives. The hospitality industry and hotels in particular are especially vulnerable to a potential terrorist attack, and this fact attracted the author’s attention to the issue of the prevention of such attacks and the measures (if any) that the Helsinki hotels are ...

  18. Computed Flow Through An Artificial Heart Valve

    Science.gov (United States)

    Rogers, Stewart E.; Kwak, Dochan; Kiris, Cetin; Chang, I-Dee

    1994-01-01

    Report discusses computations of blood flow through prosthetic tilting disk valve. Computational procedure developed in simulation used to design better artificial hearts and valves by reducing or eliminating following adverse flow characteristics: large pressure losses, which prevent hearts from working efficiently; separated and secondary flows, which causes clotting; and high turbulent shear stresses, which damages red blood cells. Report reiterates and expands upon part of NASA technical memorandum "Computed Flow Through an Artificial Heart and Valve" (ARC-12983). Also based partly on research described in "Numerical Simulation of Flow Through an Artificial Heart" (ARC-12478).

  19. Cyber Attacks and Combat Behavior

    Directory of Open Access Journals (Sweden)

    Carataș Maria Alina

    2017-01-01

    Full Text Available Cyber terrorism is an intangible danger, a real over the corner threat in the life of individuals,organizations, and governments and is getting harder to deal with its damages. The motivations forthe cyber-attacks are different, depending on the terrorist group, from cybercrime to hacktivism,attacks over the authorities’ servers. Organizations constantly need to find new ways ofstrengthening protection against cyber-attacks, assess their cyber readiness, expand the resiliencecapacity and adopts international security regulations.

  20. Attacks on public telephone networks: technologies and challenges

    Science.gov (United States)

    Kosloff, T.; Moore, Tyler; Keller, J.; Manes, Gavin W.; Shenoi, Sujeet

    2003-09-01

    Signaling System 7 (SS7) is vital to signaling and control in America's public telephone networks. This paper describes a class of attacks on SS7 networks involving the insertion of malicious signaling messages via compromised SS7 network components. Three attacks are discussed in detail: IAM flood attacks, redirection attacks and point code spoofing attacks. Depending on their scale of execution, these attacks can produce effects ranging from network congestion to service disruption. Methods for detecting these denial-of-service attacks and mitigating their effects are also presented.

  1. Defense and attack of complex and dependent systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2010-01-01

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  2. Defense and attack of complex and dependent systems

    Energy Technology Data Exchange (ETDEWEB)

    Hausken, Kjell, E-mail: kjell.hausken@uis.n [Faculty of Social Sciences, University of Stavanger, N-4036 Stavanger (Norway)

    2010-01-15

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  3. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica......Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error......-prone and impracticable for large systems. Nonetheless, the automated generation of attack trees has only been explored in connection to computer networks and levering rich models, whose analysis typically leads to an exponential blow-up of the state space. We propose a static analysis approach where attack trees...... are automatically inferred from a process algebraic specification in a syntax-directed fashion, encompassing a great many application domains and avoiding incurring systematically an exponential explosion. Moreover, we show how the standard propositional denotation of an attack tree can be used to phrase...

  4. Cheating prevention in visual cryptography.

    Science.gov (United States)

    Hu, Chih-Ming; Tzeng, Wen-Guey

    2007-01-01

    Visual cryptography (VC) is a method of encrypting a secret image into shares such that stacking a sufficient number of shares reveals the secret image. Shares are usually presented in transparencies. Each participant holds a transparency. Most of the previous research work on VC focuses on improving two parameters: pixel expansion and contrast. In this paper, we studied the cheating problem in VC and extended VC. We considered the attacks of malicious adversaries who may deviate from the scheme in any way. We presented three cheating methods and applied them on attacking existent VC or extended VC schemes. We improved one cheat-preventing scheme. We proposed a generic method that converts a VCS to another VCS that has the property of cheating prevention. The overhead of the conversion is near optimal in both contrast degression and pixel expansion.

  5. Pareto Efficient Solutions of Attack-Defence Trees

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2015-01-01

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as proba......Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes......, such as probability or cost of attacks and defences. In case of multiple parameters most analytical methods optimise one parameter at a time, e.g., minimise cost or maximise probability of an attack. Such methods may lead to sub-optimal solutions when optimising conflicting parameters, e.g., minimising cost while...... maximising probability. In order to tackle this challenge, we devise automated techniques that optimise all parameters at once. Moreover, in the case of conflicting parameters our techniques compute the set of all optimal solutions, defined in terms of Pareto efficiency. The developments are carried out...

  6. LONG-TERM CLINICAL OUTCOME IN NORMAL VOLUNTEERS AND PATIENTS WITH CEREBRAL TRANSIENT ISCHEMIC ATTACKS

    Directory of Open Access Journals (Sweden)

    J.Lotfi

    1999-06-01

    Full Text Available Detection and modification of the risk factors of stroke may be the most effective strategy for preventing its often irreversible consequences. A longitudinal prospective study was implemented to evaluate the effect of several risk factors on the course of cerebrovascular disease. The study groups were composed of 3S8 normal volunteers, and 308 patients with transient ischemic attacks. The two groups were followed for 4.2 (. 3.3 and 2.S years, respectively. Endpoints were defined as the occurrence of the following: transient ischemic attacks, stroke, multii-infarct dementia, dementia of the Alzheimer's type, or death. .Stroke and death were 2.5 times more frequent in the second group. Hypertension was the single predictor of reaching the endpoints (P<0.014. By excluding the cases with dementia of Ahheimers type, no single predictor could be identified. This study suggests that ischemic events arc significantly more frequent inpatients with transient ischemic attacks. A dichowmous split was observed between neurogenic and cardiogenic endpoints.

  7. Cost-effectiveness of optimizing prevention in patients with coronary heart disease: the EUROASPIRE III health economics project.

    Science.gov (United States)

    De Smedt, Delphine; Kotseva, Kornelia; De Bacquer, Dirk; Wood, David; De Backer, Guy; Dallongeville, Jean; Seppo, Lehto; Pajak, Andrzej; Reiner, Zeljko; Vanuzzo, Diego; Georgiev, Borislav; Gotcheva, Nina; Annemans, Lieven

    2012-11-01

    The EUROASPIRE III survey indicated that the guidelines on cardiovascular disease prevention are poorly implemented in patients with established coronary heart disease (CHD). The purpose of this health economic project was to assess the potential clinical effectiveness and cost-effectiveness of optimizing cardiovascular prevention in eight EUROASPIRE III countries (Belgium, Bulgaria, Croatia, Finland, France, Italy, Poland, and the U.K.). METHODS AND RESULTS The individual risk for subsequent cardiovascular events was estimated, based on published Framingham equations. Based on the EUROASPIRE III data, the type of suboptimal prevention, if any, was identified for each individual, and the effects of optimized tailored prevention (smoking cessation, diet and exercise, better management of elevated blood pressure and/or LDL-cholesterol) were estimated. Costs of prevention and savings of avoided events were based on country-specific data. A willingness to pay threshold of €30,000/quality-adjusted life year (QALY) was used. The robustness of the results was validated by sensitivity analyses. Overall, the cost-effectiveness analyses for the eight countries showed mainly favourable results with an average incremental cost-effectiveness ratio (ICER) of €12,484 per QALY. Only in the minority of patients at the lowest risk for recurrent events, intensifying preventive therapy seems not cost-effective. Also, the single impact of intensified cholesterol control seems less cost-effective, possibly because their initial 2-year risk was already fairly low, hence the room for improvement is rather limited. These results underscore the societal value of optimizing prevention in most patients with established CHD, but also highlight the need for setting priorities towards patients more at risk and the need for more studies comparing intensified prevention with usual care in these patients.

  8. On the anatomy of social engineering attacks : A literature-based dissection of successful attacks

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    The aim of this studywas to explore the extent towhich persuasion principles are used in successful social engineering attacks. Seventy-four scenarioswere extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenariowas split into attack steps, containing

  9. Public health preparedness and response to a radiological terrorist attack

    International Nuclear Information System (INIS)

    Yamaguchi, Ichiro

    2016-01-01

    Given the potential for intentional malevolent acts, the security of radioactive sources should be ensured. In the event of a terrorist attack using a radioactive source, we should care not only about health concerns of victims, especially including first responders who suffer from radiation injury, but also public health activities with affected people during the long recovery phase. Regarding the radiological public health viewpoint, preventive efforts are also important. In fact, regulatory reform is progressing in Japan according to the code of conduct issued by IAEA. One of the difficulties of countermeasures for the security of radioactive sources in Japan is to establish a disposal facility for disused sealed radioactive sources, since radioactive waste has been additionally a point of contention in society since the nuclear disaster. This paper presents an overview of countermeasures for terrorist attacks using a radioactive source, from the viewpoint of public health in Japan including the results of survey targeted hospitals equipped with blood irradiation machines. (author)

  10. DDOS ATTACK DETECTION SIMULATION AND HANDLING MECHANISM

    Directory of Open Access Journals (Sweden)

    Ahmad Sanmorino

    2013-11-01

    Full Text Available In this study we discuss how to handle DDoS attack that coming from the attacker by using detection method and handling mechanism. Detection perform by comparing number of packets and number of flow. Whereas handling mechanism perform by limiting or drop the packets that detected as a DDoS attack. The study begins with simulation on real network, which aims to get the real traffic data. Then, dump traffic data obtained from the simulation used for detection method on our prototype system called DASHM (DDoS Attack Simulation and Handling Mechanism. From the result of experiment that has been conducted, the proposed method successfully detect DDoS attack and handle the incoming packet sent by attacker.

  11. Model checking exact cost for attack scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2017-01-01

    Attack trees constitute a powerful tool for modelling security threats. Many security analyses of attack trees can be seamlessly expressed as model checking of Markov Decision Processes obtained from the attack trees, thus reaping the benefits of a coherent framework and a mature tool support....... However, current model checking does not encompass the exact cost analysis of an attack, which is standard for attack trees. Our first contribution is the logic erPCTL with cost-related operators. The extended logic allows to analyse the probability of an event satisfying given cost bounds and to compute...... the exact cost of an event. Our second contribution is the model checking algorithm for erPCTL. Finally, we apply our framework to the analysis of attack trees....

  12. Infarto agudo del miocardio sin elevación del segmento T: Consideraciones fisiopatológicas y clínicas Heart attack without an elevation of the T segment: Clinical and pathophysiological

    Directory of Open Access Journals (Sweden)

    Maikel Rodulfo García

    2010-09-01

    Full Text Available Se revisaron numerosos documentos (impresos y electrónicos sobre afecciones cardiovasculares, particularmente acerca del infarto agudo del miocardio sin elevación del segmento T, teniendo en cuenta que la mortalidad hospitalaria es menor cuando se produce un síndrome coronario con esa característica. Para actualizar el tema se valoraron diversos aspectos relacionados con concepto, clasificación, fisiopatología, diagnóstico, cuadro clínico, exámenes complementarios y factores de riesgo, puesto que las enfermedades del corazón son actualmente la principal causa de muerte en naciones industrializadas y se espera que también lo sean en los países en vías de desarrollo para el 2020, entre ellos Cuba.Several documents (printed and electronic about cardiovascular diseases were reviewed, particularly heart attack without an elevation of the T-segment, taking into account that the hospital mortality is lower when a coronary syndrome with that characteristic occurs. To update the topic several aspects related to concept, classification, pathophysiology, diagnosis, clinical pattern, laboratory tests and risk factors were valued since heart diseases are actually the main cause of death in industrialized nations and it is expected that they will also be the same cause of death in developing countries for 2020, among them, Cuba.

  13. Heart Health (A Cup of Health with CDC)

    Centers for Disease Control (CDC) Podcasts

    2014-02-27

    Cardiovascular disease, which includes heart disease, stroke, and high blood pressure, is the leading cause of death in the U.S. One in 10 U.S. adults have been diagnosed with some form of heart disease. In this podcast, Dr. Matthew Ritchey discusses the four simple steps to prevent heart disease.  Created: 2/27/2014 by MMWR.   Date Released: 2/27/2014.

  14. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  15. Understanding How Components of Organisations Contribute to Attacks

    DEFF Research Database (Denmark)

    Gu, Min; Aslanyan, Zaruhi; Probst, Christian W.

    2016-01-01

    Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors is diffi......Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors...... is difficult. Recently, system models have been used for automatically identifying possible attacks on the modelled organisation. The generated attacks consider all three layers, making the contribution of building infrastructure, computer infrastructure, and humans (insiders and outsiders) explicit. However......, this contribution is only visible in the attack trees as part of the performed steps; it cannot be mapped back to the model directly since the actions usually involve several elements (attacker and targeted actor or asset). Especially for large attack trees, understanding the relations between several model...

  16. Attack Graph Construction for Security Events Analysis

    Directory of Open Access Journals (Sweden)

    Andrey Alexeevich Chechulin

    2014-09-01

    Full Text Available The paper is devoted to investigation of the attack graphs construction and analysis task for a network security evaluation and real-time security event processing. Main object of this research is the attack modeling process. The paper contains the description of attack graphs building, modifying and analysis technique as well as overview of implemented prototype for network security analysis based on attack graph approach.

  17. Automated Discovery of Mimicry Attacks

    National Research Council Canada - National Science Library

    Giffin, Jonathon T; Jha, Somesh; Miller, Barton P

    2006-01-01

    .... These systems are useful only if they detect actual attacks. Previous research developed manually-constructed mimicry and evasion attacks that avoided detection by hiding a malicious series of system calls within a valid sequence allowed by the model...

  18. Dermatologia comparativa: lesão de ataque por caravela portuguesa (Physalia physalis Comparative dermatology: skin lesion produced by attack of jellyfishes (Physalia physalis

    Directory of Open Access Journals (Sweden)

    Maria do Carmo Araújo Palmeira Queiroz

    2011-06-01

    Full Text Available Demonstra-se lesão dermatológica, em caprichoso formato de coração, característica de ataque por caravela-portuguesa, em banhista do sexo feminino, 21 anosIt is reported the case of a 21-year-old female bather with a skin lesion, heart-shaped ,characteristic of attack by jellyfish

  19. Determinants for acceptance of preventive treatment against heart disease - a web-based population survey

    DEFF Research Database (Denmark)

    Nielsen, Jesper Bo; Jarbøl, Dorte Ejg; Gyrd-Hansen, Dorte

    2014-01-01

    . Socioeconomic status in terms of lower education was positively associated with acceptance. The price of treatment reduced willingness to accept for the lower income groups, whereas it had no effect in the highest income group. Some 57% of respondents who were willing to accept treatment changed their decision...... of the population may refrain from treatment. More than half of the respondents who were initially willing to accept treatment changed their decision when informed about the presence of potential side effects. This is an important observation in relation to risk communication, since most side effects occur very...... intervention. The aim was to elicit preference structures when potential patients are presented with different treatment conditions. Results: About one third of the respondents were willing to accept preventive medical treatment. Respondents with personal experience with heart disease were more likely...

  20. Transforming Graphical System Models to Graphical Attack Models

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2016-01-01

    Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations...... approach to transforming graphical system models to graphical attack models in the form of attack trees. Based on an asset in the model, our transformations result in an attack tree that represents attacks by all possible actors in the model, after which the actor in question has obtained the asset....

  1. When Sinuses Attack! (For Kids)

    Science.gov (United States)

    ... First Aid & Safety Doctors & Hospitals Videos Recipes for Kids Kids site Sitio para niños How the Body Works ... Search English Español When Sinuses Attack! KidsHealth / For Kids / When Sinuses Attack! What's in this article? What ...

  2. HeartCare+: A Smart Heart Care Mobile Application for Framingham-Based Early Risk Prediction of Hard Coronary Heart Diseases in Middle East

    Directory of Open Access Journals (Sweden)

    Hoda Ahmed Galal Elsayed

    2017-01-01

    Full Text Available Background. Healthcare is a challenging, yet so demanding sector that developing countries are paying more attention to recently. Statistics show that rural areas are expected to develop a high rate of heart diseases, which is a leading cause of sudden mortality, in the future. Thus, providing solutions that can assist rural people in detecting the cardiac risks early will be vital for uncovering and even preventing the long-term complications of cardiac diseases. Methodology. Mobile technology can be effectively utilized to limit the cardiac diseases’ prevalence in rural Middle East. This paper proposes a smart mobile solution for early risk detection of hard coronary heart diseases that uses the Framingham scoring model. Results. Smart HeartCare+ mobile app estimates accurately coronary heart diseases’ risk over 10 years based on clinical and nonclinical data and classifies the patient risk to low, moderate, or high. HeartCare+ also directs the patients to further treatment recommendations. Conclusion. This work attempts to investigate the effectiveness of the mobile technology in the early risk detection of coronary heart diseases. HeartCare+ app intensifies the communication channel between the lab workers and patients residing in rural areas and cardiologists and specialist residing in urban places.

  3. Software-based Microarchitectural Attacks

    OpenAIRE

    Gruss, Daniel

    2017-01-01

    Modern processors are highly optimized systems where every single cycle of computation time matters. Many optimizations depend on the data that is being processed. Software-based microarchitectural attacks exploit effects of these optimizations. Microarchitectural side-channel attacks leak secrets from cryptographic computations, from general purpose computations, or from the kernel. This leakage even persists across all common isolation boundaries, such as processes, containers, and virtual ...

  4. Integrating cyber attacks within fault trees

    International Nuclear Information System (INIS)

    Nai Fovino, Igor; Masera, Marcelo; De Cian, Alessio

    2009-01-01

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  5. Integrating cyber attacks within fault trees

    Energy Technology Data Exchange (ETDEWEB)

    Nai Fovino, Igor [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy)], E-mail: igor.nai@jrc.it; Masera, Marcelo [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy); De Cian, Alessio [Department of Electrical Engineering, University di Genova, Genoa (Italy)

    2009-09-15

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  6. Attack and Vulnerability Penetration Testing: FreeBSD

    Directory of Open Access Journals (Sweden)

    Abdul Hanan Abdullah

    2013-07-01

    Full Text Available Computer system security has become a major concern over the past few years. Attacks, threasts or intrusions, against computer system and network have become commonplace events. However, there are some system devices and other tools that are available to overcome the threat of these attacks. Currently, cyber attack is a major research and inevitable. This paper presents some steps of penetration in FreeBSD operating system, some tools and new steps to attack used in this experiment, probes for reconnaissance, guessing password via brute force, gaining privilege access and flooding victim machine to decrease availability. All these attacks were executed and infiltrate within the environment of Intrusion Threat Detection Universiti Teknologi Malaysia (ITD UTM data set. This work is expected to be a reference for practitioners to prepare their systems from Internet attacks.

  7. Attacks on quantum key distribution protocols that employ non-ITS authentication

    Science.gov (United States)

    Pacher, C.; Abidin, A.; Lorünser, T.; Peev, M.; Ursin, R.; Zeilinger, A.; Larsson, J.-Å.

    2016-01-01

    We demonstrate how adversaries with large computing resources can break quantum key distribution (QKD) protocols which employ a particular message authentication code suggested previously. This authentication code, featuring low key consumption, is not information-theoretically secure (ITS) since for each message the eavesdropper has intercepted she is able to send a different message from a set of messages that she can calculate by finding collisions of a cryptographic hash function. However, when this authentication code was introduced, it was shown to prevent straightforward man-in-the-middle (MITM) attacks against QKD protocols. In this paper, we prove that the set of messages that collide with any given message under this authentication code contains with high probability a message that has small Hamming distance to any other given message. Based on this fact, we present extended MITM attacks against different versions of BB84 QKD protocols using the addressed authentication code; for three protocols, we describe every single action taken by the adversary. For all protocols, the adversary can obtain complete knowledge of the key, and for most protocols her success probability in doing so approaches unity. Since the attacks work against all authentication methods which allow to calculate colliding messages, the underlying building blocks of the presented attacks expose the potential pitfalls arising as a consequence of non-ITS authentication in QKD post-processing. We propose countermeasures, increasing the eavesdroppers demand for computational power, and also prove necessary and sufficient conditions for upgrading the discussed authentication code to the ITS level.

  8. Screening for congenital heart malformations in child health centres

    OpenAIRE

    Juttmann, Rikard

    1999-01-01

    textabstractThe objective of this thesis is to clarify the effectiveness and the efficiency of screening for congenital heart malformations in Dutch child health centres and the possibilities to optimise this prevention programme. To this end the following main questions will be addressed. 1. Does screening for congenital heart malformations, as actually performed in Dutch child health centres, prevent adverse outcomes of these disorders in the short and long run? What would be the answer to ...

  9. Increased heart rate caused by atrial pacing with the closed-loop stimulation function prevented micturition syncope

    Directory of Open Access Journals (Sweden)

    Tatsuo Haraki, MD,PhD

    2013-10-01

    Full Text Available A 70-year-old man had been experiencing syncope several times a year. We implanted a DDD pacemaker with closed-loop stimulation (CLS function. When he urinated early in the morning, his increased atrial pacing rates elevated his heart rate (HR during and after micturition. After implantation of the DDD-CLS mode, he did not experience symptoms. In contrast, in the DDD-R mode, his intrinsic HR changed to atrial pacing after micturition but decreased to the basal rate within 2 min, and he experienced a sense of cold perspiration and presyncope. Increased HRs caused by atrial pacing with the CLS function were useful in the prevention of micturition syncope.

  10. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  11. The global burden of paediatric heart disease

    DEFF Research Database (Denmark)

    Musa, Ndidiamaka L; Hjortdal, Vibeke; Zheleva, Bistra

    2017-01-01

    An estimated 15 million children die or are crippled annually by treatable or preventable heart disease in low- and middle-income countries. Global efforts to reduce under-5 mortality have focused on reducing death from communicable diseases in low- and middle-income countries with little...... to no attention focusing on paediatric CHD and acquired heart disease. Lack of awareness of CHD and acquired heart disease, access to care, poor healthcare infrastructure, competing health priorities, and a critical shortage of specialists are important reasons why paediatric heart disease has not been addressed...... in low resourced settings. Non-governmental organisations have taken the lead to address these challenges. This review describes the global burden of paediatric heart disease and strategies to improve the quality of care for paediatric heart disease. These strategies would improve outcomes for children...

  12. Coping with Feelings

    Medline Plus

    Full Text Available ... a Heart Attack Treatment of a Heart Attack Life After a Heart Attack Heart Failure About Heart Failure Causes and Risks for Heart ... Cardiac Rehab? How Can I Live With Heart Failure? Medication Chart | Spanish Medical Contact List Preparing for ... Attack website Caregivers Nutrition Center Cardiac ...

  13. Asthma in Children: Risk Factors, Clinical Features and Prevention

    Directory of Open Access Journals (Sweden)

    Serap Balci

    2010-02-01

    Full Text Available Asthma is the most common chronic disease of childhood. It is known that asthma prevalence has increased significantly especially in children in last 20 years. To stop this increase in asthma, causes and prevention measures should be known better. For the management of the illness, control of environmental and trigger factors causing asthma attack are extremely important. Asthmatic children and family should be informed by health staff about changes in their life and measures to prevent the attacks. Through this information asthmatic children and their families can be supported for a better quality of life. [TAF Prev Med Bull 2010; 9(1.000: 79-86

  14. Recurrent spontaneous attacks of dizziness.

    Science.gov (United States)

    Lempert, Thomas

    2012-10-01

    This article describes the common causes of recurrent vertigo and dizziness that can be diagnosed largely on the basis of history. Ninety percent of spontaneous recurrent vertigo and dizziness can be explained by six disorders: (1) Ménière disease is characterized by vertigo attacks, lasting 20 minutes to several hours, with concomitant hearing loss, tinnitus, and aural fullness. Aural symptoms become permanent during the course of the disease. (2) Attacks of vestibular migraine may last anywhere from minutes to days. Most patients have a previous history of migraine headaches, and many experience migraine symptoms during the attack. (3) Vertebrobasilar TIAs affect older adults with vascular risk factors. Most attacks last less than 1 hour and are accompanied by other symptoms from the posterior circulation territory. (4) Vestibular paroxysmia is caused by vascular compression of the eighth cranial nerve. It manifests itself with brief attacks of vertigo that recur many times per day, sometimes with concomitant cochlear symptoms. (5) Orthostatic hypotension causes brief episodes of dizziness lasting seconds to a few minutes after standing up and is relieved by sitting or lying down. In older adults, it may be accompanied by supine hypertension. (6) Panic attacks usually last minutes, occur in specific situations, and are accompanied by choking, palpitations, tremor, heat, and anxiety. Less common causes of spontaneous recurrent vertigo and dizziness include perilymph fistula, superior canal dehiscence, autoimmune inner ear disease, otosclerosis, cardiac arrhythmia, and medication side effects. Neurologists need to venture into otolaryngology, internal medicine, and psychiatry to master the differential diagnosis of recurrent dizziness.

  15. Reassessing guidelines for heart failure

    Directory of Open Access Journals (Sweden)

    Helmut Drexler

    2004-03-01

    Full Text Available Significant progress has been made in the last few years in the management of heart failure. In particular several trials have given significant results. It has become apparent that heart failure may be prevented in some patients by treatment of risk factors such as coronary artery disease. Experience with angiotensin-converting enzyme (ACE inhibitors has shown that the survival and symptomatic benefits do last in the long term, and confirm that they are the first-line treatment in heart failure. The results of a number of trials using the angiotensin receptor blockers (ARBs candesartan, valsartan and losartan are presented and discussed. There is also some experience now in the use of candesartan for patients with heart failure and preserved left ventricular systolic function. The COMET trial compared the β-blockers carvedilol and metoprolol tartrate, and suggests that there may be differences in clinical effect between β-blockers. The selective aldosterone receptor blocker eplerenone was evaluated in the EPHESUS trial in post-MI patients with signs of heart failure. Based on these clinical trials, heart failure guidelines are now being updated.

  16. Insulin Signaling and Heart Failure

    Science.gov (United States)

    Riehle, Christian; Abel, E. Dale

    2016-01-01

    Heart failure is associated with generalized insulin resistance. Moreover, insulin resistant states such as type 2 diabetes and obesity increases the risk of heart failure even after adjusting for traditional risk factors. Insulin resistance or type 2 diabetes alters the systemic and neurohumoral milieu leading to changes in metabolism and signaling pathways in the heart that may contribute to myocardial dysfunction. In addition, changes in insulin signaling within cardiomyocytes develop in the failing heart. The changes range from activation of proximal insulin signaling pathways that may contribute to adverse left ventricular remodeling and mitochondrial dysfunction to repression of distal elements of insulin signaling pathways such as forkhead (FOXO) transcriptional signaling or glucose transport which may also impair cardiac metabolism, structure and function. This article will review the complexities of insulin signaling within the myocardium and ways in which these pathways are altered in heart failure or in conditions associated with generalized insulin resistance. The implications of these changes for therapeutic approaches to treating or preventing heart failure will be discussed. PMID:27034277

  17. Empagliflozin Prevents Worsening of Cardiac Function in an Experimental Model of Pressure Overload-Induced Heart Failure

    Directory of Open Access Journals (Sweden)

    Nikole J. Byrne, BSc

    2017-08-01

    Full Text Available This study sought to determine whether the sodium/glucose cotransporter 2 (SGLT2 inhibitor empagliflozin improved heart failure (HF outcomes in nondiabetic mice. The EMPA-REG OUTCOME (Empagliflozin, Cardiovascular Outcome Event Trial in Type 2 Diabetes Mellitus Patients trial demonstrated that empagliflozin markedly prevented HF and cardiovascular death in subjects with diabetes. However, despite ongoing clinical trials in HF patients without type 2 diabetes, there are no objective and translational data to support an effect of SGLT2 inhibitors on cardiac structure and function, particularly in the absence of diabetes and in the setting of established HF. Male C57Bl/6 mice were subjected to either sham or transverse aortic constriction surgery to induce HF. Following surgery, mice that progressed to HF received either vehicle or empagliflozin for 2 weeks. Cardiac function was then assessed in vivo using echocardiography and ex vivo using isolated working hearts. Although vehicle-treated HF mice experienced a progressive worsening of cardiac function over the 2-week treatment period, this decline was blunted in empagliflozin-treated HF mice. Treatment allocation to empagliflozin resulted in an improvement in cardiac systolic function, with no significant changes in cardiac remodeling or diastolic dysfunction. Moreover, isolated hearts from HF mice treated with empagliflozin displayed significantly improved ex vivo cardiac function compared to those in vehicle-treated controls. Empagliflozin treatment of nondiabetic mice with established HF blunts the decline in cardiac function both in vivo and ex vivo, independent of diabetes. These data provide important basic and translational clues to support the evaluation of SGLT2 inhibitors as a treatment strategy in a broad range of patients with established HF.

  18. Interest of analyses of heart rate variability in the prevention of fatigue states in senior runners.

    Science.gov (United States)

    Leti, Thomas; Bricout, Véronique A

    2013-01-01

    The use of heart rate variability (HRV) in the management of sport training is a practice which tends to spread, especially in order to prevent the occurrence of fatigue states. To estimate the HRV parameters obtained using a heart rate recording, according to different exercise impacts, and to make the link with the appearance of subjective fatigue. Ten senior runners, aged 51±5 years, were each monitored over a period of 12 weeks in different conditions: (i) after a resting period, (ii) after a day with training, (iii) after a day of competition and (iv) after a rest day. They also completed three questionnaires, to assess fatigue (SFMS), profile of mood states (POMS) and quality of sleep. The HRV indices (heart rate, LF (n.u.), HF (n.u.) and LF/HF) were significantly altered with the competitive impact, shifting toward a sympathetic predominance. After rest and recovery nights, the LF (n.u.) increased significantly with the competitive impact (62.1±15.2 and 66.9±11.6 vs. 76.0±10.7; p<0.05 respectively) whereas the HF (n.u.) decreased significantly (37.9±15.2 and 33.1±11.6 vs. 24.0±10.7; p<0.05 respectively). Positive correlations were found between fatigue and frequency domain indices and between fatigue and training impact. Autonomic nervous system modulation-fatigue relationships were significant, suggesting the potential use of HRV in follow-up and control of training. Furthermore, the addition of questionnaires constitutes complementary tools that allow to achieve a greater relevance and accuracy of the athletes' fitness and results. Copyright © 2012 Elsevier B.V. All rights reserved.

  19. Session 4: CVD, diabetes and cancer: A dietary portfolio for management and prevention of heart disease.

    Science.gov (United States)

    Esfahani, Amin; Jenkins, David J A; Kendall, Cyril W C

    2010-02-01

    CHD is the leading cause of worldwide mortality. The prevalence of heart disease has been linked to the adoption of a sedentary lifestyle and the increased dietary dependence on saturated fats from animal sources and the intake of refined foods. Elevated blood cholesterol level is one of the major risk factors for CHD. While cholesterol-lowering drug therapy (statins) has been effective in reducing the risk of heart disease, there are those individuals who are unwilling or because of muscle pains or raised levels of liver or muscle enzymes are unable to take cholesterol-lowering medication. Fortunately, there is evidence linking a number of dietary components to CHD risk reduction. The strength of this evidence has prompted various regulatory bodies to advocate diet as the first line of defence for primary prevention of heart disease. It was therefore decided to combine four dietary components that have been shown to lower blood cholesterol concentrations (nuts, plant sterols, viscous fibre and vegetable protein) in a dietary portfolio in order to determine whether the combined effect is additive. In a metabolically-controlled setting this dietary portfolio has proved to be as effective as a starting dose of a first-generation statin cholesterol-lowering medication in reducing the risk of CHD. The dietary portfolio has also been shown to be effective in sustaining a clinically-significant effect in the long term under a 'real-world' scenario. However, success of the diet depends on compliance and despite the accessibility of the foods adherence has been found to vary greatly. Overall, the evidence supports the beneficial role of the dietary portfolio in reducing blood cholesterol levels and CHD risk.

  20. Shark Attack Project - Marine Attack at Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Adrianus J

    2005-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  1. Guidelines for Better Heart Health

    Science.gov (United States)

    Skip Navigation Bar Home Current Issue Past Issues Guidelines for Better Heart Health Past Issues / Winter 2007 ... women either had or did not have CVD. Guidelines at a Glance: Prevention should be tailored to ...

  2. Novel Method For Low-Rate Ddos Attack Detection

    Science.gov (United States)

    Chistokhodova, A. A.; Sidorov, I. D.

    2018-05-01

    The relevance of the work is associated with an increasing number of advanced types of DDoS attacks, in particular, low-rate HTTP-flood. Last year, the power and complexity of such attacks increased significantly. The article is devoted to the analysis of DDoS attacks detecting methods and their modifications with the purpose of increasing the accuracy of DDoS attack detection. The article details low-rate attacks features in comparison with conventional DDoS attacks. During the analysis, significant shortcomings of the available method for detecting low-rate DDoS attacks were found. Thus, the result of the study is an informal description of a new method for detecting low-rate denial-of-service attacks. The architecture of the stand for approbation of the method is developed. At the current stage of the study, it is possible to improve the efficiency of an already existing method by using a classifier with memory, as well as additional information.

  3. Rheumatic heart disease: infectious disease origin, chronic care approach.

    Science.gov (United States)

    Katzenellenbogen, Judith M; Ralph, Anna P; Wyber, Rosemary; Carapetis, Jonathan R

    2017-11-29

    Rheumatic heart disease (RHD) is a chronic cardiac condition with an infectious aetiology, causing high disease burden in low-income settings. Affected individuals are young and associated morbidity is high. However, RHD is relatively neglected due to the populations involved and its lower incidence relative to other heart diseases. In this narrative review, we describe how RHD care can be informed by and integrated with models of care developed for priority non-communicable diseases (coronary heart disease), and high-burden communicable diseases (tuberculosis). Examining the four-level prevention model (primordial through tertiary prevention) suggests primordial and primary prevention of RHD can leverage off existing tuberculosis control efforts, given shared risk factors. Successes in coronary heart disease control provide inspiration for similarly bold initiatives for RHD. Further, we illustrate how the Chronic Care Model (CCM), developed for use in non-communicable diseases, offers a relevant framework to approach RHD care. Systems strengthening through greater integration of services can improve RHD programs. Strengthening of systems through integration/linkages with other well-performing and resourced services in conjunction with policies to adopt the CCM framework for the secondary and tertiary prevention of RHD in settings with limited resources, has the potential to significantly reduce the burden of RHD globally. More research is required to provide evidence-based recommendations for policy and service design.

  4. Cholesterol and lifestyle

    Science.gov (United States)

    ... normal range. These healthy habits may help prevent future heart attacks and other health problems. Eat foods ... with health and disease. In: Goldman L, Schafer AI, eds. Goldman’s Cecil Medicine . 25th ed. Philadelphia, PA: ...

  5. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  6. Further attacks on Yeung-Mintzer fragile watermarking scheme

    Science.gov (United States)

    Fridrich, Jessica; Goljan, Miroslav; Memon, Nasir D.

    2000-05-01

    In this paper, we describe new and improved attacks on the authentication scheme previously proposed by Yeung and Mintzer. Previous attacks assumed that the binary watermark logo inserted in an image for the purposes of authentication was known. Here we remove that assumption and show how the scheme is still vulnerable, even if the binary logo is not known but the attacker has access to multiple images that have been watermarked with the same secret key and contain the same (but unknown) logo. We present two attacks. The first attack infers the secret watermark insertion function and the binary logo, given multiple images authenticated with the same key and containing the same logo. We show that a very good approximation to the logo and watermark insertion function can be constructed using as few as two images. With color images, one needs many more images, nevertheless the attack is still feasible. The second attack we present, which we call the 'collage-attack' is a variation of the Holliman-Memon counterfeiting attack. The proposed variation does not require knowledge of the watermark logo and produces counterfeits of superior quality by means of a suitable dithering process that we develop.

  7. Pareto Efficient Solution of Attack-Defence Trees

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as

  8. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  9. Genetic attack on neural cryptography

    International Nuclear Information System (INIS)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-01-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size

  10. Genetic attack on neural cryptography

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  11. Preventable Deaths from Heart Disease and Stroke PSA (:60)

    Centers for Disease Control (CDC) Podcasts

    This 60 second public service announcement is based on the September 2013 CDC Vital Signs report. More than 800,000 Americans die each year from heart disease and stroke. Learn how to manage all the major risk factors.

  12. The clinical profile of women with stable ischaemic heart disease in Spain. More effort is needed in secondary prevention. SIRENA study.

    Science.gov (United States)

    Gámez, J M; Ripoll, T; Barrios, V; Anguita, M; Pedreira, M; Madariaga, I

    2016-01-01

    Cardiovascular diseases are the leading cause of death for women, especially ischaemic heart disease, which is still considered a man's disease. In Spain, there are various registries on ischaemic heart disease, although none are exclusively for women. The objectives of the SIRENA study were to describe the clinical profile of women with ischaemic heart disease treated in cardiology consultations, to estimate its prevalence of cardiovascular risk factors and understand its clinical management. A multicentre observational study was conducted with a sample of 631 women with stable ischaemic heart disease, consecutively included during cardiology consultations. Forty-one researchers from all over Spain participated in the study. The mean age was 68.5 years. The clinical presentation was in the form of acute coronary syndrome in up to 67.2% of the patients. The prevalence of cardiovascular risk factors was high (77.7% of the patients had hypertension, 40.7% had diabetes and 68% had dyslipidaemia), with 30.7% having uncontrolled hypertension, 78.4% having LDL-cholesterol levels higher than 70mg/dL and 49.2% having HbA1c levels greater than 7%. The considerable majority of the patients underwent optimal medical treatment with antiplatelet agents, beta-blockers, renin-angiotensin-aldosterone system blockers and hypolipidaemic agents. Coronary angiography was performed for 88.3% of the patients, and 63.4% underwent percutaneous coronary intervention. Women with stable ischaemic heart disease in Spain initially present some form of acute coronary syndrome and a high prevalence of inadequately controlled cardiovascular risk factors, despite undergoing optimal medical therapy. A high percentage of these women undergo coronary revascularisation. Increased efforts are required for secondary prevention in women with stable ischaemic heart disease. Copyright © 2015 Elsevier España, S.L.U. y Sociedad Española de Medicina Interna (SEMI). All rights reserved.

  13. Combating nuclear terrorism in India: preventive nuclear forensic perspectives

    International Nuclear Information System (INIS)

    Raghav, N.K.; Lad, J.S.; Deshmukh, A.V.; Jagtap, S.S.

    2014-01-01

    Nuclear terrorism is constant threat to India by many terrorist organization and neighboring country. These organizations are directly or indirectly aided with nuclear material by terrorism supporting country. Such organization has a significant potential source for acquiring nuclear and other radioactive material. Possibility of leakage is widely feared because of the deteriorating law and order condition, great spur of nuclear proliferation after the cold war and disintegration of USSR. Terrorist could gain access to Nuclear and radioactive material and smuggle to India through porous borders. Preventive forensic approach in screening and searching nuclear and radioactive material will play cardinal role to prevent nuclear disaster happening in India. Future plans could be extracted from terrorists through their narco-tests, brain fingerprinting and a data base on this could be prepared, which could later be used to help prevent any attacks. In present paper authors strongly recommend setting up Preventive Forensic Units in India so that any internal or external nuclear attack could be aborted. (author)

  14. Attacks on the AJPS Mersenne-based cryptosystem

    NARCIS (Netherlands)

    K. de Boer (Koen); L. Ducas (Léo); S. Jeffery (Stacey); R. M. de Wolf (Ronald)

    2018-01-01

    textabstractAggarwal, Joux, Prakash and Santha recently introduced a new potentially quantum-safe public-key cryptosystem, and suggested that a brute-force attack is essentially optimal against it. They consider but then dismiss both Meet-in-the-Middle attacks and LLL-based attacks. Very soon after

  15. The political attack ad

    Directory of Open Access Journals (Sweden)

    Palma Peña-Jiménez, Ph.D.

    2011-01-01

    Full Text Available During election campaigns the political spot has a clear objective: to win votes. This message is communicated to the electorate through television and Internet, and usually presents a negative approach, which includes a direct critical message against the opponent, rather than an exposition of proposals. This article is focused on the analysis of the campaign attack video ad purposely created to encourage the disapproval of the political opponent among voters. These ads focus on discrediting the opponent, many times, through the transmission of ad hominem messages, instead of disseminating the potential of the political party and the virtues and manifesto of its candidate. The article reviews the development of the attack ad since its first appearance, which in Spain dates back to 1996, when the famous Doberman ad was broadcast, and examines the most memorable campaign attack ads.

  16. Robust Detection of Stepping-Stone Attacks

    National Research Council Canada - National Science Library

    He, Ting; Tong, Lang

    2006-01-01

    The detection of encrypted stepping-stone attack is considered. Besides encryption and padding, the attacker is capable of inserting chaff packets and perturbing packet timing and transmission order...

  17. Evaluation of insecticides for protecting southwestern ponderosa pines from attack by engraver beetles (Coleoptera: Curculionidae: Scolytinae)

    Science.gov (United States)

    Tom E. DeGomez; Christopher J. Hayes; John A. Anhold; Joel D. McMillin; Karen M. Clancy; Paul P. Bosu

    2006-01-01

    Insecticides that might protect pine trees from attack by engraver beetles (Ips spp.) have not been rigorously tested in the southwestern United States. We conducted two field experiments to evaluate the efficacy of several currently and potentially labeled preventative insecticides for protecting high-value ponderosa pine, Pinus ponderosa...

  18. A Framework for Attack-Resilient Industrial Control Systems : Attack Detection and Controller Reconfiguration

    OpenAIRE

    Paridari, Kaveh; O'Mahony, Niamh; Mady, Alie El-Din; Chabukswar, Rohan; Boubekeur, Menouer; Sandberg, Henrik

    2017-01-01

    Most existing industrial control systems (ICSs), such as building energy management systems (EMSs), were installed when potential security threats were only physical. With advances in connectivity, ICSs are now, typically, connected to communications networks and, as a result, can be accessed remotely. This extends the attack surface to include the potential for sophisticated cyber attacks, which can adversely impact ICS operation, resulting in service interruption, equipment damage, safety c...

  19. An Algorithm of Traffic Perception of DDoS Attacks against SOA Based on Time United Conditional Entropy

    Directory of Open Access Journals (Sweden)

    Yuntao Zhao

    2016-01-01

    Full Text Available DDoS attacks can prevent legitimate users from accessing the service by consuming resource of the target nodes, whose availability of network and service is exposed to a significant threat. Therefore, DDoS traffic perception is the premise and foundation of the whole system security. In this paper the method of DDoS traffic perception for SOA network based on time united conditional entropy was proposed. According to many-to-one relationship mapping between the source IP address and destination IP addresses of DDoS attacks, traffic characteristics of services are analyzed based on conditional entropy. The algorithm is provided with perception ability of DDoS attacks on SOA services by introducing time dimension. Simulation results show that the novel method can realize DDoS traffic perception with analyzing abrupt variation of conditional entropy in time dimension.

  20. Nutrition in Heart Failure

    Directory of Open Access Journals (Sweden)

    Reci Meseri

    2013-10-01

    Full Text Available Heart failure is defined as decreased ability of heart due to various reasons. It%u2019s seen 2-3% but the prevalence increases sharply after the age of seventy. The objectives of nutrition therapy in heart failure are to prevent from water retention and edema, to avoid from hard digestion and to offer a balanced diet. In order to avoid fluid retention and edema, daily sodium and fluid intake must be monitored carefully. Main dilemma of the heart failure patients is the obesity-cachexia dilemma. Since one of the main reasons of heart failure is cardiovascular diseases, in first phase, the patient may be obese. In the later phases, cachexia may show up. It was shown that cachexia is associated with mortality. Within this period, patients should not be over-fed and the patient should pass from catabolic state to anabolic state slowly. If the gastrointestinal track is functional oral/enteral feeding must be preferred. Multi vitamin and mineral supportsmay be beneficial, which may replace the increased loss, increase anti-inflammatory response and be anti-oxidants. Large, controlled and well-designed studies must be conducted in order to evaluate the benefits of nutritional practices such as nutritional assessment, enteral feeding and nutrient supports in heart failure patients.

  1. Heart Disease and Stroke in Women

    Centers for Disease Control (CDC) Podcasts

    2009-05-11

    This women's health podcast focuses on the impact of heart disease and stroke in women and includes steps to prevent these conditions.  Created: 5/11/2009 by Office of Women’s Health (OWH) and National Center for Chronic Disease Prevention and Health Promotion (NCCDPHP).   Date Released: 5/11/2009.

  2. Diabetes - what to ask your doctor - type 2

    Science.gov (United States)

    ... of the arteries High blood cholesterol levels High blood pressure Type 2 diabetes Patient Instructions ACE inhibitors Diabetes and exercise Diabetes - foot ulcers Diabetes - keeping active Diabetes - low blood sugar - self-care Diabetes - preventing heart attack and ...

  3. Countermeasures for unintentional and intentional video watermarking attacks

    Science.gov (United States)

    Deguillaume, Frederic; Csurka, Gabriela; Pun, Thierry

    2000-05-01

    These last years, the rapidly growing digital multimedia market has revealed an urgent need for effective copyright protection mechanisms. Therefore, digital audio, image and video watermarking has recently become a very active area of research, as a solution to this problem. Many important issues have been pointed out, one of them being the robustness to non-intentional and intentional attacks. This paper studies some attacks and proposes countermeasures applied to videos. General attacks are lossy copying/transcoding such as MPEG compression and digital/analog (D/A) conversion, changes of frame-rate, changes of display format, and geometrical distortions. More specific attacks are sequence edition, and statistical attacks such as averaging or collusion. Averaging attack consists of averaging locally consecutive frames to cancel the watermark. This attack works well for schemes which embed random independent marks into frames. In the collusion attack the watermark is estimated from single frames (based on image denoising), and averaged over different scenes for better accuracy. The estimated watermark is then subtracted from each frame. Collusion requires that the same mark is embedded into all frames. The proposed countermeasures first ensures robustness to general attacks by spread spectrum encoding in the frequency domain and by the use of an additional template. Secondly, a Bayesian criterion, evaluating the probability of a correctly decoded watermark, is used for rejection of outliers, and to implement an algorithm against statistical attacks. The idea is to embed randomly chosen marks among a finite set of marks, into subsequences of videos which are long enough to resist averaging attacks, but short enough to avoid collusion attacks. The Bayesian criterion is needed to select the correct mark at the decoding step. Finally, the paper presents experimental results showing the robustness of the proposed method.

  4. Link-layer Jamming Attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    2004-01-01

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  5. Link-layer jamming attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  6. A computer network attack taxonomy and ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-01-01

    Full Text Available of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example, after the launch of a DDOS (Distributed Denial of Service) attack, zombie computers may still connect to the target...-scrap- value-of-a-hacked-pc-revisited/ . Lancor, L., & Workman, R. (2007). Using Google Hacking to Enhance Defense Strategies. ACM SIGCSE Bulletin, 39 (1), 491-495. Lau, F., Rubin, S. H., Smith, M. H., & Trajkovic, L. (2000). Distributed Denial of Service...

  7. The Vulnerability of Nuclear Facilities to Cyber Attack; Strategic Insights: Spring 2010

    OpenAIRE

    Kesler, Brent

    2011-01-01

    This article appeared in Strategic Insights, Spring 2011 In June 2010, U.S. Senators Susan Collins, Joseph Lieberman, and Tom Carper introduced the Protecting Cyberspace as a National Asset Act. One of its many aims is to protect critical infrastructures in the United States from cyber attack. In January 2011, Brandon Milhorn, staff director of the Senate Homeland Security and Governmental Affairs Committee, defended the bill, saying that it would prevent a hacker from opening ...

  8. Unified communications forensics anatomy of common UC attacks

    CERN Document Server

    Grant, Nicholas Mr

    2013-01-01

    Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: analysis of forensic artifacts in common UC attacks an in-depth look at established UC technologies and attack exploits hands-on understanding of UC attack vectors and associated countermeasures

  9. Inhibition of N-type Ca2+ channels ameliorates an imbalance in cardiac autonomic nerve activity and prevents lethal arrhythmias in mice with heart failure.

    Science.gov (United States)

    Yamada, Yuko; Kinoshita, Hideyuki; Kuwahara, Koichiro; Nakagawa, Yasuaki; Kuwabara, Yoshihiro; Minami, Takeya; Yamada, Chinatsu; Shibata, Junko; Nakao, Kazuhiro; Cho, Kosai; Arai, Yuji; Yasuno, Shinji; Nishikimi, Toshio; Ueshima, Kenji; Kamakura, Shiro; Nishida, Motohiro; Kiyonaka, Shigeki; Mori, Yasuo; Kimura, Takeshi; Kangawa, Kenji; Nakao, Kazuwa

    2014-10-01

    Dysregulation of autonomic nervous system activity can trigger ventricular arrhythmias and sudden death in patients with heart failure. N-type Ca(2+) channels (NCCs) play an important role in sympathetic nervous system activation by regulating the calcium entry that triggers release of neurotransmitters from peripheral sympathetic nerve terminals. We have investigated the ability of NCC blockade to prevent lethal arrhythmias associated with heart failure. We compared the effects of cilnidipine, a dual N- and L-type Ca(2+) channel blocker, with those of nitrendipine, a selective L-type Ca(2+) channel blocker, in transgenic mice expressing a cardiac-specific, dominant-negative form of neuron-restrictive silencer factor (dnNRSF-Tg). In this mouse model of dilated cardiomyopathy leading to sudden arrhythmic death, cardiac structure and function did not significantly differ among the control, cilnidipine, and nitrendipine groups. However, cilnidipine dramatically reduced arrhythmias in dnNRSF-Tg mice, significantly improving their survival rate and correcting the imbalance between cardiac sympathetic and parasympathetic nervous system activity. A β-blocker, bisoprolol, showed similar effects in these mice. Genetic titration of NCCs, achieved by crossing dnNRSF-Tg mice with mice lacking CACNA1B, which encodes the α1 subunit of NCCs, improved the survival rate. With restoration of cardiac autonomic balance, dnNRSF-Tg;CACNA1B(+/-) mice showed fewer malignant arrhythmias than dnNRSF-Tg;CACNA1B(+/+) mice. Both pharmacological blockade of NCCs and their genetic titration improved cardiac autonomic balance and prevented lethal arrhythmias in a mouse model of dilated cardiomyopathy and sudden arrhythmic death. Our findings suggest that NCC blockade is a potentially useful approach to preventing sudden death in patients with heart failure. Published on behalf of the European Society of Cardiology. All rights reserved. © The Author 2014. For permissions please email: journals.permissions@oup.com.

  10. Congenital Heart Defects (For Parents)

    Science.gov (United States)

    ... to be associated with genetic disorders, such as Down syndrome . But the cause of most congenital heart defects isn't known. While they can't be prevented, many treatments are available for the defects and related health ...

  11. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  12. B vitamins and magnetic resonance imaging-detected ischemic brain lesions in patients with recent transient ischemic attack or stroke: the VITAmins TO Prevent Stroke (VITATOPS) MRI-substudy.

    Science.gov (United States)

    Cavalieri, Margherita; Schmidt, Reinhold; Chen, Christopher; Mok, Vincent; de Freitas, Gabriel R; Song, Swithin; Yi, Qilong; Ropele, Stefan; Grazer, Anja; Homayoon, Nina; Enzinger, Christian; Loh, Katherine; Wong, Ka Sing Lawrence; Wong, Adrian; Xiong, Yunyun; Chang, Hui Meng; Wong, Meng Cheong; Fazekas, Franz; Eikelboom, John W; Hankey, Graeme J

    2012-12-01

    Elevated concentrations of homocysteine are associated with cerebral small vessel disease (CSVD). B-vitamin supplementation with folate and vitamins B12 and B6 reduces homocysteine concentrations. In a substudy of the VITAmins TO Prevent Stroke (VITATOPS) trial, we assessed the hypothesis that the addition of once-daily supplements of B vitamins would reduce the progression of CSVD-related brain lesions. A total of 359 patients with recent stroke or transient ischemic attack, who were randomly allocated to double-blind treatment with placebo or b vitamins, underwent brain MRI at randomization and after 2 years of B-vitamin supplementation. MR images were analyzed blinded to treatment allocation. Outcomes related to the prespecified hypothesis were progression of white matter hyperintensities and incident lacunes. We also explored the effect of B-vitamin supplementation on the incidence of other ischemic abnormalities. After 2 years of treatment with b vitamins or placebo, there was no significant difference in white matter hyperintensities volume change (0.08 vs 0.13 cm3; P=0.419) and incidence of lacunes (8.0% vs 5.9%, P=0.434; odds ratio=1.38). In a subanalysis of patients with MRI evidence of severe CSVD at baseline, b-vitamin supplementation was associated with a significant reduction in white matter hyperintensities volume change (0.3 vs 1.7 cm3; P=0.039). Daily B-vitamin supplementation for 2 years did not significantly reduce the progression of brain lesions resulting from presumed CSVD in all patients with recent stroke or transient ischemic attack but may do so in the subgroup of patients with recent stroke or transient ischemic attack and severe CSVD. http://vitatops.highway1.com.au/. Unique identifier: NCT00097669 and ISRCTN74743444.

  13. Identification of the protein responsible for pyruvate transport into rat liver and heart mitochondria by specific labelling with [3H]N-phenylmaleimide.

    OpenAIRE

    Thomas, A P; Halestrap, A P

    1981-01-01

    1. N-Phenylmaleimide irreversibly inhibits pyruvate transport into rat heart and liver mitochondria to a much greater extent than does N-ethylmaleimide, iodoacetate or bromopyruvate. alpha-Cyanocinnamate protects the pyruvate transporter from attack by this thiol-blocking reagent. 2. In both heart and liver mitochondria alpha-cyanocinnamate diminishes labelling by [3H]N-phenylmaleimide of a membrane protein of subunit mol.wt. 15000 on sodium dodecyl sulphate/polyacrylamide-gel electrophoresis...

  14. Classifying network attack scenarios using an ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-03-01

    Full Text Available ) or to the target?s reputation. The Residue sub-phase refers to damage or artefacts of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example after the launch of a DDOS..., A. (1995). Hacking theft of $10 million from citibank revealed. Retrieved 10/10, 2011, from http://articles.latimes.com/1995-08-19/business/fi-36656_1_citibank-system Hurley, E. (2004). SCO site succumbs to DDoS attack. Retrieved 10/10, 2011, from...

  15. Modelling Social-Technical Attacks with Timed Automata

    DEFF Research Database (Denmark)

    David, Nicolas; David, Alexandre; Hansen, Rene Rydhof

    2015-01-01

    . In this paper we develop an approach towards modelling socio-technical systems in general and socio-technical attacks in particular, using timed automata and illustrate its application by a complex case study. Thanks to automated model checking and automata theory, we can automatically generate possible attacks...... in our model and perform analysis and simulation of both model and attack, revealing details about the specific interaction between attacker and victim. Using timed automata also allows for intuitive modelling of systems, in which quantities like time and cost can be easily added and analysed....

  16. Quantitative Verification and Synthesis of Attack-Defence Scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    2016-01-01

    analysis of quantitative properties of complex attack-defence scenarios, using an extension of attack-defence trees which models temporal ordering of actions and allows explicit dependencies in the strategies adopted by attackers and defenders. We adopt a game-theoretic approach, translating attack...... which guarantee or optimise some quantitative property, such as the probability of a successful attack, the expected cost incurred, or some multi-objective trade-off between the two. We implement our approach, building upon the PRISM-games model checker, and apply it to a case study of an RFID goods...

  17. Situational awareness of a coordinated cyber attack

    Science.gov (United States)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  18. Anti-discrimination Analysis Using Privacy Attack Strategies

    KAUST Repository

    Ruggieri, Salvatore

    2014-09-15

    Social discrimination discovery from data is an important task to identify illegal and unethical discriminatory patterns towards protected-by-law groups, e.g., ethnic minorities. We deploy privacy attack strategies as tools for discrimination discovery under hard assumptions which have rarely tackled in the literature: indirect discrimination discovery, privacy-aware discrimination discovery, and discrimination data recovery. The intuition comes from the intriguing parallel between the role of the anti-discrimination authority in the three scenarios above and the role of an attacker in private data publishing. We design strategies and algorithms inspired/based on Frèchet bounds attacks, attribute inference attacks, and minimality attacks to the purpose of unveiling hidden discriminatory practices. Experimental results show that they can be effective tools in the hands of anti-discrimination authorities.

  19. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  20. Suicide to harass others: clues from mythology to understanding suicide bombing attacks.

    Science.gov (United States)

    Preti, Antonio

    2006-01-01

    Suicide by revenge, the Samsonic suicide, and the suicide by devotio, all described in classical mythology and also reported in the ethnographic literature, belong to the same class of suicidal behaviors as kamikaze suicide and the suicide bombing attack: suicide to harass and burden others or suicide with a hostile intent. The lack of a social dimension to share in a positive manner may lead an individual to integrate him/herself in another social structure, e.g., a military organization, which allows the individual to express his/her desires and personal identity only by destroying others and themselves. The dynamics of these forms of suicide are also likely to work in other displays of life-threatening behavior, such as family annihilation, mass murder, and spree killing. A more thorough investigation of the dynamics operating in suicide bombing attacks could, therefore, contribute to preventative strategies against violence at large.

  1. Simulation of Attacks for Security in Wireless Sensor Network.

    Science.gov (United States)

    Diaz, Alvaro; Sanchez, Pablo

    2016-11-18

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node's software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work.

  2. Simulation of Attacks for Security in Wireless Sensor Network

    Science.gov (United States)

    Diaz, Alvaro; Sanchez, Pablo

    2016-01-01

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node’s software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work. PMID:27869710

  3. An Approach for Prevention of MitM Attack Based on Rogue AP in Wireless Network

    OpenAIRE

    Zhendong Wu; Mengru Cai; Siyu Liang

    2014-01-01

    With the rapid development of WLAN, more and more schools and businesses have begun to provide the WLAN for users. However, WLAN is considerably more susceptible to MitM (man- in-the-middle) attack. To overcome it, we propose a dynamic password technology named Two-way Dynamic Authentication Technology (TDAT). It uses two-factor during the initial authentication, and uses a two-way hash chain during the cross-domain authentication. TDAT effectively protects users' authentication credentials a...

  4. Potential of resveratrol in the treatment of heart failure.

    Science.gov (United States)

    Raj, Pema; Louis, Xavier Lieben; Thandapilly, Sijo Joseph; Movahed, Ali; Zieroth, Shelley; Netticadan, Thomas

    2014-01-30

    The concept of food has expanded beyond its traditional role of survival and hunger satisfaction, to include a role in the prevention and treatment of disease. Polyphenols are classes of compounds that are synthesized by plants to serve a wide variety of functions including growth pollination and defense. These compounds have recently received increased attention in medical research. In this group, one of the most studied has been resveratrol (3,5,4,-trihydroxystilbene), a polyphenol, which is found predominantly in grapes and berries. Over the past two decades, researchers have studied the ability of resveratrol to prevent or reverse the development of abnormalities in heart structure and function in animal models of heart disease and heart failure. The results from animal studies have been promising, and very recently, this knowledge has been translated into examining the efficacy of resveratrol in humans with heart disease/failure. In this review we will discuss the current status of resveratrol research on cardioprotection. Copyright © 2013 Elsevier Inc. All rights reserved.

  5. Cardiac telomere length in heart development, function, and disease.

    Science.gov (United States)

    Booth, S A; Charchar, F J

    2017-07-01

    Telomeres are repetitive nucleoprotein structures at chromosome ends, and a decrease in the number of these repeats, known as a reduction in telomere length (TL), triggers cellular senescence and apoptosis. Heart disease, the worldwide leading cause of death, often results from the loss of cardiac cells, which could be explained by decreases in TL. Due to the cell-specific regulation of TL, this review focuses on studies that have measured telomeres in heart cells and critically assesses the relationship between cardiac TL and heart function. There are several lines of evidence that have identified rapid changes in cardiac TL during the onset and progression of heart disease as well as at critical stages of development. There are also many factors, such as the loss of telomeric proteins, oxidative stress, and hypoxia, that decrease cardiac TL and heart function. In contrast, antioxidants, calorie restriction, and exercise can prevent both cardiac telomere attrition and the progression of heart disease. TL in the heart is also indicative of proliferative potential and could facilitate the identification of cells suitable for cardiac rejuvenation. Although these findings highlight the involvement of TL in heart function, there are important questions regarding the validity of animal models, as well as several confounding factors, that need to be considered when interpreting results and planning future research. With these in mind, elucidating the telomeric mechanisms involved in heart development and the transition to disease holds promise to prevent cardiac dysfunction and potentiate regeneration after injury. Copyright © 2017 the American Physiological Society.

  6. Adaptive optimisation-offline cyber attack on remote state estimator

    Science.gov (United States)

    Huang, Xin; Dong, Jiuxiang

    2017-10-01

    Security issues of cyber-physical systems have received increasing attentions in recent years. In this paper, deception attacks on the remote state estimator equipped with the chi-squared failure detector are considered, and it is assumed that the attacker can monitor and modify all the sensor data. A novel adaptive optimisation-offline cyber attack strategy is proposed, where using the current and previous sensor data, the attack can yield the largest estimation error covariance while ensuring to be undetected by the chi-squared monitor. From the attacker's perspective, the attack is better than the existing linear deception attacks to degrade the system performance. Finally, some numerical examples are provided to demonstrate theoretical results.

  7. Cyber-physical attacks a growing invisible threat

    CERN Document Server

    Loukas, George

    2015-01-01

    Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building's lights, make a car veer off the road,  or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism. The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means. Perpetrators can now cause damage without the same risk, and without the political, social, or moral

  8. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  9. Importance of beta-blocker dose in prevention of ventricular tachyarrhythmias, heart failure hospitalizations, and death in primary prevention implantable cardioverter-defibrillator recipients

    DEFF Research Database (Denmark)

    Ruwald, A C; Gislason, G H; Vinther, M

    2018-01-01

    Aims: There is a paucity of studies investigating a dose-dependent association between beta-blocker therapy and risk of outcome. In a nationwide cohort of primary prevention implantable cardioverter-defibrillator (ICD) patients, we aimed to investigate the dose-dependent association between beta-blocker...... therapy and risk of ventricular tachyarrhythmias (VT/VF), heart failure (HF) hospitalizations, and death. Methods and results: Information on ICD implantation, endpoints, comorbidities, beta-blocker usage, type, and dose were obtained through Danish nationwide registers. The two major beta-blockers...... carvedilol and metoprolol were examined in three dose levels; low (metoprolol ≤ 25 mg; carvedilol ≤ 12.5 mg), intermediate (metoprolol 26-199 mg; carvedilol 12.6-49.9 mg), and high (metoprolol ≥ 200 mg; carvedilol ≥ 50 mg). Time to events was investigated utilizing multivariate Cox models with beta-blocker...

  10. A fatal elephant attack.

    Science.gov (United States)

    Hejna, Petr; Zátopková, Lenka; Safr, Miroslav

    2012-01-01

    A rare case of an elephant attack is presented. A 44-year-old man working as an elephant keeper was attacked by a cow elephant when he tripped over a foot chain while the animal was being medically treated. The man fell down and was consequently repeatedly attacked with elephant tusks. The man sustained multiple stab injuries to both groin regions, a penetrating injury to the abdominal wall with traumatic prolapse of the loops of the small bowel, multiple defects of the mesentery, and incomplete laceration of the abdominal aorta with massive bleeding into the abdominal cavity. In addition to the penetrating injuries, the man sustained multiple rib fractures with contusion of both lungs and laceration of the right lobe of the liver, and comminuted fractures of the pelvic arch and left femoral body. The man died shortly after he had been received at the hospital. The cause of death was attributed to traumatic shock. © 2011 American Academy of Forensic Sciences.

  11. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  12. False Positive and False Negative Effects on Network Attacks

    Science.gov (United States)

    Shang, Yilun

    2018-01-01

    Robustness against attacks serves as evidence for complex network structures and failure mechanisms that lie behind them. Most often, due to detection capability limitation or good disguises, attacks on networks are subject to false positives and false negatives, meaning that functional nodes may be falsely regarded as compromised by the attacker and vice versa. In this work, we initiate a study of false positive/negative effects on network robustness against three fundamental types of attack strategies, namely, random attacks (RA), localized attacks (LA), and targeted attack (TA). By developing a general mathematical framework based upon the percolation model, we investigate analytically and by numerical simulations of attack robustness with false positive/negative rate (FPR/FNR) on three benchmark models including Erdős-Rényi (ER) networks, random regular (RR) networks, and scale-free (SF) networks. We show that ER networks are equivalently robust against RA and LA only when FPR equals zero or the initial network is intact. We find several interesting crossovers in RR and SF networks when FPR is taken into consideration. By defining the cost of attack, we observe diminishing marginal attack efficiency for RA, LA, and TA. Our finding highlights the potential risk of underestimating or ignoring FPR in understanding attack robustness. The results may provide insights into ways of enhancing robustness of network architecture and improve the level of protection of critical infrastructures.

  13. Associations between DSM-IV mental disorders and subsequent heart disease onset: beyond depression

    Science.gov (United States)

    Scott, Kate M.; de Jonge, Peter; Alonso, Jordi; Viana, Maria Carmen; Liu, Zhaorui; O’Neill, Siobhan; Aguilar-Gaxiola, Sergio; Bruffaerts, Ronny; Caldas-de-Almeida, Jose Miguel; Stein, Dan J.; de Girolamo, Giovanni; Florescu, Silvia E.; Hu, Chiyi; Taib, Nezar Ismet; Lépine, Jean-Pierre; Levinson, Daphna; Matschinger, Herbert; Medina-Mora, Maria Elena; Piazza, Marina; Posada-Villa, José A.; Uda, Hidenori; Wojtyniak, Bogdan J.; Lim, Carmen C. W.; Kessler, Ronald C.

    2013-01-01

    Background Prior studies on the depression-heart disease association have not usually used diagnostic measures of depression, nor taken other mental disorders into consideration. As a result, it is not clear whether the association between depression and heart disease onset reflects a specific association, or the comorbidity between depression and other mental disorders. Additionally, the relative magnitude of associations of a range of mental disorders with heart disease onset is unknown. Methods Face-to-face household surveys were conducted in 19 countries (n=52,095; person years=2,141,194). The Composite International Diagnostic Interview retrospectively assessed lifetime prevalence and age at onset of 16 DSM-IV mental disorders. Heart disease was indicated by self-report of physician’s diagnosis, or self-report of heart attack, together with their timing (year). Survival analyses estimated associations between first onset of mental disorders and subsequent heart disease onset. Results After comorbidity adjustment, depression, panic disorder, specific phobia, post-traumatic stress disorder and alcohol use disorders were associated with heart disease onset (ORs 1.3–1.6). Increasing number of mental disorders was associated with heart disease in a dose-response fashion. Mood disorders and alcohol abuse were more strongly associated with earlier onset than later onset heart disease. Associations did not vary by gender. Conclusions Depression, anxiety and alcohol use disorders were significantly associated with heart disease onset; depression was the weakest predictor. If confirmed in future prospective studies, the breadth of psychopathology’s links with heart disease onset has substantial clinical and public health implications. PMID:23993321

  14. Associations between DSM-IV mental disorders and subsequent heart disease onset: beyond depression.

    Science.gov (United States)

    Scott, Kate M; de Jonge, Peter; Alonso, Jordi; Viana, Maria Carmen; Liu, Zhaorui; O'Neill, Siobhan; Aguilar-Gaxiola, Sergio; Bruffaerts, Ronny; Caldas-de-Almeida, Jose Miguel; Stein, Dan J; de Girolamo, Giovanni; Florescu, Silvia E; Hu, Chiyi; Taib, Nezar Ismet; Lépine, Jean-Pierre; Levinson, Daphna; Matschinger, Herbert; Medina-Mora, Maria Elena; Piazza, Marina; Posada-Villa, José A; Uda, Hidenori; Wojtyniak, Bogdan J; Lim, Carmen C W; Kessler, Ronald C

    2013-10-15

    Prior studies on the depression-heart disease association have not usually used diagnostic measures of depression, or taken other mental disorders into consideration. As a result, it is not clear whether the association between depression and heart disease onset reflects a specific association, or the comorbidity between depression and other mental disorders. Additionally, the relative magnitude of associations of a range of mental disorders with heart disease onset is unknown. Face-to-face household surveys were conducted in 19 countries (n=52,095; person years=2,141,194). The Composite International Diagnostic Interview retrospectively assessed lifetime prevalence and age at onset of 16 DSM-IV mental disorders. Heart disease was indicated by self-report of physician's diagnosis, or self-report of heart attack, together with their timing (year). Survival analyses estimated associations between first onset of mental disorders and subsequent heart disease onset. After comorbidity adjustment, depression, panic disorder, specific phobia, post-traumatic stress disorder and alcohol use disorders were associated with heart disease onset (ORs 1.3-1.6). Increasing number of mental disorders was associated with heart disease in a dose-response fashion. Mood disorders and alcohol abuse were more strongly associated with earlier onset than later onset heart disease. Associations did not vary by gender. Depression, anxiety and alcohol use disorders were significantly associated with heart disease onset; depression was the weakest predictor. If confirmed in future prospective studies, the breadth of psychopathology's links with heart disease onset has substantial clinical and public health implications. © 2013.

  15. Coping with Feelings

    Medline Plus

    Full Text Available ... for Heart.org Arrhythmia About Arrhythmia Why Arrhythmia Matters Understand Your Risk for Arrhythmia Symptoms, Diagnosis & Monitoring ... Heart Attack Treatment of a Heart Attack Life After a Heart Attack Heart Failure About Heart Failure ...

  16. Communicating with Professionals

    Medline Plus

    Full Text Available ... for Heart.org Arrhythmia About Arrhythmia Why Arrhythmia Matters Understand Your Risk for Arrhythmia Symptoms, Diagnosis & Monitoring ... Heart Attack Treatment of a Heart Attack Life After a Heart Attack Heart Failure About Heart Failure ...

  17. Coping with Feelings

    Medline Plus

    Full Text Available ... a Heart Attack Treatment of a Heart Attack Life After a Heart Attack Heart Failure About Heart ... or because you feel less control over your life. Every heart patient has some degree of fear, ...

  18. Machine Learning Methods for Attack Detection in the Smart Grid.

    Science.gov (United States)

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.

  19. Application distribution model and related security attacks in VANET

    Science.gov (United States)

    Nikaein, Navid; Kanti Datta, Soumya; Marecar, Irshad; Bonnet, Christian

    2013-03-01

    In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker`s model as an extension to the work done in [6]. Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e.g. malware, spamming and phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.

  20. Nonepileptic attack disorder among married women.

    Science.gov (United States)

    Dhanaraj, M; Rangaraj, R; Arulmozhi, T; Vengatesan, A

    2005-06-01

    To study the clinical features, precipitating stressful life events and prognosis of nonepileptic attack disorder (NEAD) among married women. Prospective cohort study with 1-year follow-up. A tertiary care teaching hospital. Of the 1020 patients with epilepsy referred to the epilepsy clinic during 2002-2003, 30 were married women with NEAD. The diagnostic criteria for NEAD included normal EEG during ictal and post-ictal phase of the generalized 'attack.' The data collected included clinical characteristics, semiology of the attacks, precipitating stressful events, and co-morbid psychiatric disorders. The control group included 30 age-matched married women with generalized tonic-clonic seizures. The long-term outcome and factors influencing the outcomes were analyzed. The mean duration of illness was 18 months, and the pattern of the attack was 'fall and lying still' in 53% and 'fall with generalized motor movements' in 47%. The frequency was one or more per week in 57% and occasionally in 43%. The important stressful events were matrimonial discord following illegal relationship of the husband with another woman (chi2 = 9.02, P = 0.003) and constant quarrel with other family members (chi2 = 5.19, P = 0.02). The prevalence of sexual abuse was low (7%). Co-morbid psychiatric disorder was observed in 70%. At the end of 1 year, 39% were free from the attack. Resolution of the stressful life events (chi2 = 4.52, P = 0.03) and lower frequency of attack at the time of reporting (chi2 = 3.88, P = 0.05) correlated with good outcomes. Among patients with NEAD in India, the major precipitating factors were matrimonial discord following illegal relationship of the husband with another woman and constant quarrel with other family members and not sexual abuse. Women with low frequency of attack at the time of reporting and the remission of the stressful events had better outcomes.