WorldWideScience

Sample records for sarin attack disaster

  1. [Blasting damage in manmade disasters and terrorist attacks].

    Science.gov (United States)

    Shapovalov, V M; Samokhvalov, I M

    2012-01-01

    In the present case of explosive injuries in peacetime, when suddenly there are usually accidental or intentional explosions methane in mines, tanks with gas or explosives, fuel tanks or gas content, gas tanks, gas pipelines, product pipelines, as well as the explosion of military ordnance--grenades, mines, fuses, shells, and accidentally found child or maliciously used by terrorists. Collected statistical data on manmade disasters in coal mines and explosive injuries in terrorist attacks, the physical parameters of which were able to identify only approximately and type of damage incurred,mostly multiple and combinative combined and presented significant challenges in health care. The reasons and circumstances of the explosion in peacetime, gave a detailed description of the damaging factors, mechanisms, and characteristics arise from injuries suffered in the blast injuries. We describe the pathogenesis of blast injury, basic and clinical manifestations of lesions in the explosions.

  2. Method for the analysis of the methylphosphonic acid metabolites of sarin and its ethanol-substituted analogue in urine as applied to the victims of the Tokyo sarin disaster.

    Science.gov (United States)

    Minami, M; Hui, D M; Katsumata, M; Inagaki, H; Boulet, C A

    1997-08-01

    An analysis method for the methylphosphonic acid metabolites of sarin in urine using trimethylsilyl derivatization and flame photometric detection is described in this report. Authentic reference standards of isopropyl methylphosphonic acid (IMPA) and ethyl methylphosphonic acid (EMPA) as well as methylphosphonic acid were employed to estimate the concentration in human urine. A sample pretreatment procedure was developed for urine using a column of cation-loaded ion-exchange resins (Ag+ -, Ba2+ - or H+ -Dowex) and adjusting the pH of the eluate from the column to 3.75-3.85 improved recovery of the target compounds. The eluate was evaporated to dryness under vacuum prior to trimethylsilylation, to remove water and any hydroxy- or amino-carrying volatile substances. The sarin metabolites, because of their low volatility, were concentrated and could be derivatized for analysis. The use of synthesized authentic sarin and ethylsarin metabolites, i.e., IMPA and EMPA, made it possible to establish the necessary sample pretreatment procedures for derivatization and gas chromatography-flame photometric detection (GC-FPD) analysis. The detection limits were 0.025 ppm both for EMPA and [MPA, and 0.625 microM for MPA, respectively. This method can be useful for estimating the exposure level to sarin by assaying the metabolites in urine and it is applicable to a large numbers of samples.

  3. Perievent Panic Attack and Depression after the World Trade Center Disaster: A Structural Equation Model Analysis

    Science.gov (United States)

    Adams, Richard E.; Boscarino, Joseph A.

    2011-01-01

    Research suggests that perievent panic attacks – panic attacks in temporal proximity to traumatic events – are predictive of later mental health status, including the onset of depression. Using a community sample of New York City residents interviewed 1 year and 2 years after the World Trade Center Disaster, we estimated a structural equation model (SEM) using pre-disaster psychological status and post-disaster life events, together with psychosocial resources, to assess the relationship between perievent panic and later onset depression. Bivariate results revealed a significant association between perievent panic and both year-1 and year-2 depression. Results for the SEM, however, showed that perievent panic was predictive of year-1 depression, but not year-2 depression, once potential confounders were controlled. Year-2 stressors and year-2 psychosocial resources were the best predictors of year-2 depression onset. Pre-disaster psychological problems were directly implicated in year-1 depression, but not year-2 depression. We conclude that a conceptual model that includes pre- and post-disaster variables best explains the complex causal pathways between psychological status, stressor exposure, perievent panic attacks, and depression onset two years after the World Trade Center attacks. PMID:21957721

  4. Extending injury prevention methodology to chemical terrorism preparedness: the Haddon Matrix and sarin.

    Science.gov (United States)

    Varney, Shawn; Hirshon, Jon Mark; Dischinger, Patricia; Mackenzie, Colin

    2006-01-01

    The Haddon Matrix offers a classic epidemiological model for studying injury prevention. This methodology places the public health concepts of agent, host, and environment within the three sequential phases of an injury-producing incident-pre-event, event, and postevent. This study uses this methodology to illustrate how it could be applied in systematically preparing for a mass casualty disaster such as an unconventional sarin attack in a major urban setting. Nineteen city, state, federal, and military agencies responded to the Haddon Matrix chemical terrorism preparedness exercise and offered feedback in the data review session. Four injury prevention strategies (education, engineering, enforcement, and economics) were applied to the individual factors and event phases of the Haddon Matrix. The majority of factors identified in all phases were modifiable, primarily through educational interventions focused on individual healthcare providers and first responders. The Haddon Matrix provides a viable means of studying an unconventional problem, allowing for the identification of modifiable factors to decrease the type and severity of injuries following a mass casualty disaster such as a sarin release. This strategy could be successfully incorporated into disaster planning for other weapons attacks that could potentially cause mass casualties.

  5. The World Trade Center attack. Disaster preparedness: health care is ready, but is the bureaucracy?

    Science.gov (United States)

    Mattox, K

    2001-12-01

    When a disaster occurs, it is for governments to provide the leadership, civil defense, security, evacuation, and public welfare. The medical aspects of a disaster account for less than 10% of resource and personnel expenditure. Hospitals and health care provider teams respond to unexpected occurrences such as explosions, earthquakes, floods, fires, war, or the outbreak of an infectious epidemic. In some geographic locations where natural disasters are common, such as earthquakes in Japan, such disaster practice drills are common. In other locations, disaster drills become pro forma and have no similarity to real or even projected and predicted disasters. The World Trade Center disaster on 11 September 2001 provides new information, and points out new threats, new information systems, new communication opportunities, and new detection methodologies. It is time for leaders of medicine to re-examine their approaches to disaster preparedness.

  6. Research Methods in Child Disaster Studies: A Review of Studies Generated by the September 11, 2001, Terrorist Attacks; the 2004 Indian Ocean Tsunami; and Hurricane Katrina

    Science.gov (United States)

    Pfefferbaum, Betty; Weems, Carl F.; Scott, Brandon G.; Nitiéma, Pascal; Noffsinger, Mary A.; Pfefferbaum, Rose L.; Varma, Vandana; Chakraburtty, Amarsha

    2013-01-01

    Background: A comprehensive review of the design principles and methodological approaches that have been used to make inferences from the research on disasters in children is needed. Objective: To identify the methodological approaches used to study children's reactions to three recent major disasters--the September 11, 2001, attacks; the…

  7. Fear of Terrorism and Preparedness in New York City 2 Years After the Attacks: Implications for Disaster Planning and Research

    Science.gov (United States)

    Boscarino, Joseph A.; Adams, Richard E.; Figley, Charles R.; Galea, Sandro; Foa, Edna B.

    2009-01-01

    Objectives To help improve disaster planning and research, we studied psychosocial predictors of terrorism fear and preparedness among New York City residents after the World Trade Center disaster (WTCD). Method We conducted a random cross-sectional survey of 1,681 adults interviewed 2 years after the WTCD. Participants were living in New York City at the time of the attack and exposed to ongoing terrorist threats. Results We found 44.9 percent (95% confidence interval [CI] = 41.9−47.9) of residents were concerned about future attacks and 16.9 percent (95% CI = 14.7−19.3) reported a fear level of “10” on a 10-point analog scale. Furthermore, 14.8 percent (95% CI = 12.8−17.0) reported they had made some plans for a future attack, a significant increase from the previous year. In addition, although 42.6 percent (95% CI = 39.6−45.7) indicated that they would likely wait for evacuation instructions following a chemical, biological, or nuclear attack, 34.4 percent (95% CI = 31.5−37.3) reported they would evacuate immediately against official advice. Predictors of high terrorism fear in a multivariate model included Hispanic ethnicity (odds ratio [OR] = 2.0, P = .006), lower education (OR = 4.4, P terrorism threats, terrorism fear and preparedness were related to socioeconomic factors, mental health status, terrorism exposure levels, and exposure to stressful life events. PMID:17041297

  8. Lab-on-a-chip for rapid electrochemical detection of nerve agent Sarin

    DEFF Research Database (Denmark)

    Tan, Hsih-Yin; Loke, Weng Keong; Nguyen, Nam-Trung

    2014-01-01

    , sensitive and easy to use portable test kit would be of interest to first responders investigating such attacks. We report here an amperometric-based approach for detecting trace amounts of Sarin in water samples using a screen-printed electrode (SPE) integrated in a microfluidic chip. Enzymatic inhibition...

  9. The current state of affairs for disaster planning for a nuclear terrorist attack.

    Science.gov (United States)

    Goffman, Thomas E

    2009-01-01

    The author presents current thinking on the effects of an atomic bomb blast from a medical point of view and will argue that current US Federal plans for a nuclear disaster are simply crude, insufficient, disarticulated, and principally relies on martial law as a means of crowd control. The simple physics of a fusion reaction bomb is discussed along with the plans of other countries, apparently "secret"American plans, which show a poor knowledge of the physics of nuclear bombs as well as poor insight into what will be needed to help the maximum number of citizens. An alternative plan involving computer modeling and educating the public to the effects of a fission explosion are presented. The key issue of statewide planning is discussed, as the Federal government has dumped medical problems on "the local level."

  10. Pathways for the Oxidation of Sarin in Urban Atmospheres

    Energy Technology Data Exchange (ETDEWEB)

    Gerald E. Streit; James E. Bossert; Jeffrey S. Gaffney; Jon Reisner; Laurie A. McNair; Michael Brown; Scott Elliott

    1998-11-01

    Terrorists have threatened and carried out chemicalhiological agent attacks on targets in major cities. The nerve agent sarin figured prominently in one well-publicized incident. Vapors disseminating from open containers in a Tokyo subway caused thousands of casualties. High-resolution tracer transport modeling of agent dispersion is at hand and will be enhanced by data on reactions with components of the urban atmosphere. As a sample of the level of complexity currently attainable, we elaborate the mechanisms by which sarin can decompose in polluted air. A release scenario is outlined involving the passage of a gas-phase agent through a city locale in the daytime. The atmospheric chemistry database on related organophosphorus pesticides is mined for rate and product information. The hydroxyl,radical and fine-mode particles are identified as major reactants. A review of urban air chernistry/rnicrophysics generates concentration tables for major oxidant and aerosol types in both clean and dirty environments. Organic structure-reactivity relationships yield an upper limit of 10-1' cm3 molecule-' S-* for hydrogen abstraction by hydroxyl. The associated midday loss time scale could be as little as one hour. Product distributions are difficult to define but may include nontoxic organic oxygenates, inorganic phosphorus acids, sarin-like aldehydes, and nitrates preserving cholinergic capabilities. Agent molecules will contact aerosol surfaces in on the order of minutes, with hydrolysis and side-chain oxidation as likely reaction channels.

  11. Energetics and Dynamics of the Reactions of O(3P) with Dimethyl Methylphosphonate and Sarin

    Science.gov (United States)

    Conforti, Patrick F.; Braunstein, Matthew; Dodd, James A.

    2009-10-01

    Electronic structure and molecular dynamics calculations were performed on the reaction systems O(3P) + sarin and O(3P) + dimethyl methylphosphonate (DMMP), a sarin simulant. Transition state geometries, energies, and heats of reaction for the major reaction pathways were determined at several levels of theory, including AM1, B3LYP/6-311+G(d,p), and CBS-QB3. The major reaction pathways for both systems are similar and include H-atom abstraction, H-atom elimination, and methyl elimination, in rough order from low to high energy. The H-atom abstraction channels have fairly low barriers (˜10 kcal mol-1) and are close to thermoneutral, while the other channels have relatively high energy barriers (>40 kcal mol-1) and a wide range of reaction enthalpies. We have also found a two-step pathway leading to methyl elimination through O-atom attack on the phosphorus atom for DMMP and sarin. For sarin, the two-step methyl elimination pathway is significantly lower in energy than the single-step pathway. We also present results of O(3P) + sarin and O(3P) + DMMP reaction cross sections over a broad range of collision energies (2-10 km s-1 collision velocities) obtained using the direct dynamics method with an AM1 semiempirical potential. These excitation functions are intended as an approximate guide to future hyperthermal measurements, which to our knowledge have not yet examined either of these systems. The reaction barriers, reaction enthalpies, transition state structures, and excitation functions are generally similar for DMMP and sarin, with some moderate differences for methyl elimination energetics, which indicates DMMP will likely be a good substitute for sarin in many O(3P) chemical investigations.

  12. Research Methods in Child Disaster Studies: A Review of Studies Generated by the September 11, 2001, Terrorist Attacks; the 2004 Indian Ocean Tsunami; and Hurricane Katrina

    Science.gov (United States)

    Weems, Carl F.; Scott, Brandon G.; Nitiéma, Pascal; Noffsinger, Mary A.; Pfefferbaum, Rose L.; Varma, Vandana; Chakraburtty, Amarsha

    2013-01-01

    Background A comprehensive review of the design principles and methodological approaches that have been used to make inferences from the research on disasters in children is needed. Objective To identify the methodological approaches used to study children’s reactions to three recent major disasters—the September 11, 2001, attacks; the 2004 Indian Ocean Tsunami; and Hurricane Katrina. Methods This review was guided by a systematic literature search. Results A total of 165 unduplicated empirical reports were generated by the search and examined for this review. This included 83 references on September 11, 29 on the 2004 Tsunami, and 53 on Hurricane Katrina. Conclusions A diversity of methods has been brought to bear in understanding children’s reactions to disasters. While cross-sectional studies predominate, pre-event data for some investigations emerged from archival data and data from studies examining non-disaster topics. The nature and extent of the influence of risk and protective variables beyond disaster exposure are not fully understood due, in part, to limitations in the study designs used in the extant research. Advancing an understanding of the roles of exposure and various individual, family, and social factors depends upon the extent to which measures and assessment techniques are valid and reliable, as well as on data sources and data collection designs. Comprehensive assessments that extend beyond questionnaires and checklists to include interviews and cognitive and biological measures to elucidate the negative and positive effects of disasters on children also may improve the knowledge base. PMID:24443635

  13. To leave an area after disaster: how evacuees from the WTC buildings left the WTC area following the attacks.

    Science.gov (United States)

    Zimmerman, Rae; Sherman, Martin F

    2011-05-01

    How people leave a devastated area after a disaster is critical to understanding their ability to cope with risks they face while evacuating. Knowledge of their needs for communications about these risks is particularly crucial in planning for emergency responses. A convenience sample of 1,444 persons who survived the World Trade Center (WTC) attacks on September 11, 2001 were surveyed to ascertain their initial and ultimate destinations once they had left the buildings, how they arrived there, the role of types of obstacles they encountered, and the need for information and the seeking of other people as potential factors in influencing the process of leaving immediately. This survey was part of a larger, original survey. Results showed differences in how people traveled by mode to initial and ultimate destinations, how immediately they left the area, and factors associated with when they left. How they traveled and when they left were associated with where people lived, their tendency in times of stress to seek out other people including who they knew in the immediate area (e.g., co-workers or friends), the physical conditions surrounding them, and the importance to some of waiting for more information. Many people indicated they did not leave immediately because they had no information about where to go or what services would be available to them. Perceptions and communications about risks they were facing were reflected in the choices they considered in how and when to leave the area. These findings have numerous ramifications for understanding and guiding personal behavior in catastrophic situations. © 2010 Society for Risk Analysis.

  14. Sarin

    Science.gov (United States)

    ... e.g., Salmonella species, Escherichia coli O157:H7, Shigella ) Francisella tularensis (tularemia) Key Facts About Tularemia Frequently ... salmonellosis) Salmonella Typhi (typhoid fever) Salmonellosis ( Salmonella species) Shigella (shigellosis) Shigellosis ( Shigella ) Smallpox (variola major) Smallpox Basics ...

  15. The longitudinal course of PTSD among disaster workers deployed to the World Trade Center following the attacks of September 11th.

    Science.gov (United States)

    Cukor, Judith; Wyka, Katarzyna; Mello, Brittany; Olden, Megan; Jayasinghe, Nimali; Roberts, Jennifer; Giosan, Cezar; Crane, Michael; Difede, Joann

    2011-10-01

    This study examined the long-term mental health outcomes of 2,960 nonrescue disaster workers deployed to the World Trade Center site in New York City following the September 11, 2001 (9/11) terrorist attacks. Semistructured interviews and standardized self-report measures were used to assess the prevalence of posttraumatic stress disorder (PTSD) and other psychopathology 4 and 6 years after the attacks. Clinician-measured rates of PTSD and partial PTSD 4-years posttrauma were 8.4% and 8.9%, respectively, in a subsample of 727 individuals. Rates decreased to 5.8% and 7.7% for full and partial PTSD 6 years posttrauma. For the larger sample, self-report scores revealed probable PTSD and partial PTSD prevalence to be 4.8% and 3.6% at 4 years, and 2.4% and 1.8% at 6 years. Approximately 70% of workers never met criteria for PTSD. Although PTSD rates decreased significantly over time, many workers remained symptomatic, with others showing delayed-onset PTSD. The strongest predictors of ongoing PTSD 6 years following 9/11 were trauma history (odds ratio (OR) = 2.27, 95% confidence interval (CI) [1.06, 4.85]); the presence of major depressive disorder 1-2 years following the trauma (OR = 2.80, 95% CI [1.17, 6.71]); and extent of occupational exposure (OR = 1.31, 95% CI [1.13, 1.51]). The implications of the findings for both screening and treatment of disaster workers are discussed.

  16. The Mental Health Consequences of Disaster-Related Loss: Findings from Primary Care One Year After the 9/11 Terrorist Attacks

    Science.gov (United States)

    Neria, Yuval; Olfson, Mark; Gameroff, Marc J.; Wickramaratne, Priya; Gross, Raz; Pilowsky, Daniel J.; Blanco, Carlos; Manetti-Cusa, Julián; Lantigua, Rafael; Shea, Steven; Weissman, Myrna M.

    2013-01-01

    This study examines the long-term psychiatric consequences, pain interference in daily activities, work loss, and functional impairment associated with 9/11-related loss among low-income, minority primary care patients in New York City. A systematic sample of 929 adult patients completed a survey that included a sociodemographic questionnaire, the PTSD Checklist, the PRIME-MD Patient Health Questionnaire, and the Medical Outcomes Study Short Form-12 (SF-12). Approximately one-quarter of the sample reported knowing someone who was killed in the attacks of 9/11, and these patients were sociodemographically similar to the rest of the sample. Compared to patients who had not experienced 9/11-related loss, patients who experienced loss were roughly twice as likely (OR = 1.97, 95%; CI = 1.40, 2.77) to screen positive for at least one mental disorder, including major depressive disorder (MDD; 29.2%), generalized anxiety disorder (GAD; 19.4%), and posttraumatic stress disorder (PTSD; 17.1%). After controlling for pre-9/11 trauma, 9/11-related loss was significantly related to extreme pain interference, work loss, and functional impairment. The results suggest that disaster-related mental health care in this clinical population should emphasize evidence-based treatments for mood and anxiety disorders. PMID:19152283

  17. Hydrolysis of DFP and the Nerve Agent (S)-Sarin by DFPase Proceeds Along Two Different Reaction Pathways: Implica-tions for Engineering Bioscavengers

    Energy Technology Data Exchange (ETDEWEB)

    Wymore, Troy W [ORNL; Langan, Paul [ORNL; Smith, Jeremy C [ORNL; Field, Martin J. [Institut de Biologie Structurale Jean-Pierre Ebel; Parks, Jerry M [ORNL

    2014-01-01

    Organophosphorus (OP) nerve agents such as (S)-sarin are among the most highly toxic compounds that have been synthesized. Engineering enzymes that catalyze the hydrolysis of nerve agents ( bioscavengers ) is an emerging prophylactic approach to diminishing their toxic effects. Although its native function is not known, diisopropyl fluorophosphatase (DFPase) from Loligo vulgaris catalyzes the hydrolysis of OP compounds. Here, we investigate the mechanisms of diisopropylfluorophosphate (DFP) and (S)-sarin hydrolysis by DFPase with quantum mechanical/molecular mechanical (QM/MM) umbrella sampling simulations. We find that the mechanism for hydrolysis of DFP involves nucleophilic attack by Asp229 on phosphorus to form a pentavalent intermediate. P F bond dissociation then yields a phosphoacyl enzyme intermediate in the rate-limiting step. The simulations suggest that a water molecule, coordinated to the catalytic Ca2+, donates a proton to Asp121 and then attacks the tetrahedral phosphoacyl intermediate to liberate the diisopropylphosphate product. In contrast, the calculated free energy barrier for hydrolysis of (S)-sarin by the same mechanism is highly unfavorable, primarily due to the instability of the pentavalent phosphoenzyme species. Instead, simulations suggest that hydrolysis of (S)-sarin proceeds by a mechanism in which Asp229 could activate an intervening water molecule for nucleophilic attack on the substrate. These findings may lead to improved strategies for engineering DFPase and related six-bladed -propeller folds for more efficient degradation of OP compounds.

  18. [Disaster medicine].

    Science.gov (United States)

    Carli, Pierre; Telionri, Caroline

    2015-01-01

    For over 30 years, the French hospital and pre-hospital medical teams are trained in disaster medicine. In fact, they are regularly confronted with the management of multiple casualties in accidents or even terrorist attacks, and more rarely to large-scale disasters. The intervention of physicians of the EMS system (SAMU-SMUR) in the field allows an original healthcare organization: in an advanced medical post, the victims are triaged according to their severity and benefit if needed of initial resuscitation. SAMU medical regulating center then organize their transport and repartition in several hospitals put on alert. To cope with a mass casualty situation, the hospital also has a specific organization, the White Plan. This plan, initiated by the director, assisted by a medico-administrative cell crisis can mobilize all the resources of the institution. Personnel are recalled and the ability of emergency units is increased. Care, less urgent, other patients are postponed. There are many plans for responding to disasters. ORSEC plans of the ministry of Interior articulate with the ORSAN plans of the ministry of Health. This complementarity allows a global mobilization of public services in disasters or exceptional medical situations.

  19. The Need for Situational Awareness in a CBRNE Attack

    Directory of Open Access Journals (Sweden)

    Jordan Nelms

    2011-02-01

    Full Text Available Six years before the terrorist attacks on the World Trade Center and the Pentagon, and eight years before the United States went to war with Saddam Hussein for his alleged concealment of chemical and biological weapons caches, Japan's Tokyo subway was struck by one of the most vicious terror attacks in modern history.  The 1995 Sarin terrorist attack represents an important case study for post-9/11 emergency managers because it highlights the key issues first responders and public health officials face when confronted with a CBRNE ('C'hemical, 'B'iological, 'R'adiological, 'N'uclear, 'E'xplosive mass-casualty attack.

  20. Neurobehavioral teratogenicity of sarin in an avian model

    NARCIS (Netherlands)

    Yanai, Joseph; Pinkas, Adi; Seidler, Frederic J.; Ryde, Ian T.; Van der Zee, Eddy A.; Slotkin, Theodore A.

    2009-01-01

    Nerve gas organophosphates like satin are likely to be used in urban terrorism, leading to widespread exposures of pregnant women and young children. Here, we established a model for sarin neurobehavioral teratogenicity in the developing chick so as to explore the consequences of apparently subtoxic

  1. Functionalized photonic crystal for the sensing of Sarin agents.

    Science.gov (United States)

    Yan, Chunxiao; Qi, Fenglian; Li, Shuguang; Xu, Jiayu; Liu, Chao; Meng, Zihui; Qiu, Lili; Xue, Min; Lu, Wei; Yan, Zequn

    2016-10-01

    The indiscriminate use of nerve agents by terrorist groups has attracted attention of the scientific communities toward the development of novel sensor technique for these deadly chemicals. A photonic crystal (PhC) hydrogel immobilized with butyrylcholinesterase (BuChE) was firstly prepared for the sensing of Sarin agents. Periodic polystyrene colloidal (240nm) array was embedded inside an acrylamide hydrogel, and then BuChE was immobilized inside the hydrogel matrix via condensation with 3-(diethoxyphosphoryloxy)-1,2,3-benzotriazin-4(3h)-one (DEPBT). It indicated that a total of 3.7 units of BuChE were immobilized onto the PhC hydrogel. The functionalized hydrogel recognized the Sarin agent and then shrunk, thus the diffraction of PhC hydrogel blue shifted significantly, and a limit of detection (LOD) of 10(-15)molL(-1) was achieved.

  2. Low Dose Sarin Leads To Murine Cardiac Dysfunction

    Science.gov (United States)

    2010-03-01

    killing of three dogs by a nerve agent (Robertson, 2002). These events demonstrate the intent and willingness of such organizations to employ chemical...Echocardiography. The American Journal of Cardiology , 1381 - 1386. Damodaran, T. V., Jones, K. H., Patel, A. G., & Abou-Donia, M. B. (2003). Sarin...Gonzadlez, A., & Querejeta, R. (2001). Clinical Aspects of Hypertensive Myocardial Fibrosis. Current Opinion in Cardiology , 328 - 335. Duncan, A. M

  3. Engineering Bacteria to Catabolize the Carbonaceous Component of Sarin: Teaching E. coli to Eat Isopropanol

    DEFF Research Database (Denmark)

    Brown, Margaret E.; Mukhopadhyay, Aindrila; Keasling, Jay D.

    2016-01-01

    We report an engineered strain of Escherichia coli that catabolizes the carbonaceous component of the extremely toxic chemical warfare agent sarin. Enzymatic decomposition of sarin generates isopropanol waste that, with this engineered strain, is then transformed into acetyl-CoA by enzymatic conv...

  4. Influence of pretreatment of carbamates on dynamic pulmonary mechanics in rats exposed to sarin aerosols.

    Science.gov (United States)

    Husain, K; Kumar, P; Vijayaraghavan, R; Singh, R; Das Gupta, S

    1993-07-01

    The effect of pretreatment of two carbamates, pyridostigmine and physostigmine on dynamic pulmonary mechanics has been studied in rats exposed to sarin aerosols. Sign-free dose of pyridostigmine (0.075 mg/kg, i.m.) or physostigmine (0.1 mg/kg, i.m.) did not significantly alter the parameters of the dynamic pulmonary mechanics 20 min after treatment. However, sarin (51.2 mg/m3, for 15 min) depressed the respiratory rate, air flow and minute volume and enhanced the transthoracic pressure and tidal volume. Pretreatment with carbamates 20 min prior to sarin exposure significantly modified or counteracted the above induced changes. It is concluded that the protective effect of carbamates is mainly due to the correction of respiratory changes caused by sarin aerosols in rats.

  5. A critical role of acute bronchoconstriction in the mortality associated with high-dose sarin inhalation: Effects of epinephrine and oxygen therapies

    Energy Technology Data Exchange (ETDEWEB)

    Gundavarapu, Sravanthi; Zhuang, Jianguo; Barrett, Edward G.; Xu, Fadi; Russell, Robert G.; Sopori, Mohan L., E-mail: msopori@lrri.org

    2014-01-15

    Sarin is an organophosphate nerve agent that is among the most lethal chemical toxins known to mankind. Because of its vaporization properties and ease and low cost of production, sarin is the nerve agent with a strong potential for use by terrorists and rouge nations. The primary route of sarin exposure is through inhalation and, depending on the dose, sarin leads to acute respiratory failure and death. The mechanism(s) of sarin-induced respiratory failure is poorly understood. Sarin irreversibly inhibits acetylcholine esterase, leading to excessive synaptic levels of acetylcholine and, we have previously shown that sarin causes marked ventilatory changes including weakened response to hypoxia. We now show that LD{sub 50} sarin inhalation causes severe bronchoconstriction in rats, leading to airway resistance, increased hypoxia-induced factor-1α, and severe lung epithelium injury. Transferring animals into 60% oxygen chambers after sarin exposure improved the survival from about 50% to 75% at 24 h; however, many animals died within hours after removal from the oxygen chambers. On the other hand, if LD{sub 50} sarin-exposed animals were administered the bronchodilator epinephrine, > 90% of the animals survived. Moreover, while both epinephrine and oxygen treatments moderated cardiorespiratory parameters, the proinflammatory cytokine surge, and elevated expression of hypoxia-induced factor-1α, only epinephrine consistently reduced the sarin-induced bronchoconstriction. These data suggest that severe bronchoconstriction is a critical factor in the mortality induced by LD{sub 50} sarin inhalation, and epinephrine may limit the ventilatory, inflammatory, and lethal effects of sarin. - Highlights: • Inhalation exposure of rats to LD{sub 50} sarin causes death through respiratory failure. • Severe bronchoconstriction is the major cause of sarin-induced respiratory failure. • Transfer of sarin exposed rats to 60% oxygen improves the mortality temporarily.

  6. Mechanisms of Organophosphorus (OP) Injury: Sarin-Induced Hippocampal Gene Expression Changes and Pathway Perturbation

    Science.gov (United States)

    2012-01-01

    1996) Amnesia from sarin poisoning . Lancet 347:1343. Henderson RF, Barr EB, Blackwell WB, Clark CR, Conn CA, Kalra R, March TH, Sopori ML...rat hepatocytes. Toxicol Lett 38:239-49. Landauer MR, Romano JA. (1984) Acute behavioral toxicity of the organophosphate sarin in rats...neuropathy induced by organophosphates . Toxicol Mech Methods 21:1-5. Miyaki K, Nishiwaki Y, Maekawa K, Ogawa Y, Asukai N, Yoshimura K, Etoh N

  7. Heart Attack

    Science.gov (United States)

    ... a million people in the U.S. have a heart attack. About half of them die. Many people have permanent heart damage or die because they don't get ... It's important to know the symptoms of a heart attack and call 9-1-1 if someone ...

  8. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants. © 2010 IEEE....

  9. Spatially localized attacks on interdependent networks: the existence of a finite critical attack size

    CERN Document Server

    Berezin, Yehiel; Danziger, Michael M; Li, Daqing; Havlin, Shlomo

    2013-01-01

    Many real world complex systems such as infrastructure, communication and transportation networks are embedded in space, where entities of one system may depend on entities of other systems. These systems are subject to geographically localized failures due to malicious attacks or natural disasters. Here we study the resilience of a system composed of two interdependent spatially embedded networks to localized geographical attacks. We find that if an attack is larger than a finite (zero fraction of the system) critical size, it will spread through the entire system and lead to its complete collapse. If the attack is below the critical size, it will remain localized. In contrast, under random attack a finite fraction of the system needs to be removed to initiate system collapse. We present both numerical simulations and a theoretical approach to analyze and predict the effect of local attacks and the critical attack size. Our results demonstrate the high risk of local attacks on interdependent spatially embedd...

  10. Reflection on Disaster and Disaster Economy

    Institute of Scientific and Technical Information of China (English)

    LIU Zhonggui

    2001-01-01

    The paper mainly deals with disaster and presents a discussion and analysis of disaster economy study and its development. It also addresses some noteworthy issues in disaster economy study with a view to promoting disaster prevention and reduction.

  11. Disaster Research

    DEFF Research Database (Denmark)

    Given the tendency of books on disasters to predominantly focus on strong geophysical or descriptive perspectives and in-depth accounts of particular catastrophes, Disaster Research provides a much-needed multidisciplinary perspective of the area. This book is is structured thematically around ke...

  12. [Switch from emergency medicine to disaster medicine].

    Science.gov (United States)

    Morikawa, Kentaro; Shimizu, Keiki

    2016-02-01

    Disaster medical system in Japan has been changing after huge disaster attack. Disaster Medical Assistance Team (DMAT) was established on 1995 after the Hanshin-Awaji Great Earthquake and played important role in the Great Eastern Japan Earthquake on 2011. The action of DMAT is specialized within acute phase. Continual medical aid activity is required from acute phase to chronic phase. After DMAT evacuation, Japan Medical Association Team (JMAT), Japanese Red Cross Teams, Medical university teams and many other medical teams work sequentially in the disaster area. On the other hand, unbalance in the disaster area is occurred. Disaster medical coordinator accommodates that unbalance situation. Development of receive system for many medical assistance teams will be required.

  13. DISASTER MANAGEMENT

    Directory of Open Access Journals (Sweden)

    Himanshu A. Joshi

    2012-10-01

    Full Text Available With the tropical climate and unstable land forms, coupled with high population density, poverty, illiteracy and lack of adequate infrastructure, India is one of the most vulnerable developing countries to suffer very often from various natural disasters, which strikes causing devastating impact on human life, economy and environment. Though it is almost impossible to fully recoup the damaged caused by the disaster it is possible to minimize potential risks by developing early warning strategies. “Efficient management of Disasters, rather than mere response to their occurrence has, in recent times, received increased attention both within India and abroad.” Hospitals play a key role in Management of the affected population by providing immediate and effective treatment at the site and in the hospital. Considering the wide range of disasters and no bar for time, place and people it requires immediate intervention, and this management would be an extension of emergency or casualty services of hospital. It adds an extra load to hospital, functions, and to cope up this situation it requires to have a systematic, planned and effective approach. In this article, I have discussed a model disaster management plan for a hospital, clinical principles of management of casualties and specific problems of Disaster Management. A guide line for operational framework to face disaster in the form of Disaster manual is suggested for each hospital. A preplanned disaster management plan according to this guideline would provide an edge to a hospital in such crucial situations and in turn will serve the humanity & society.

  14. Shark attack.

    Science.gov (United States)

    Guidera, K J; Ogden, J A; Highhouse, K; Pugh, L; Beatty, E

    1991-01-01

    Shark attacks are rare but devastating. This case had major injuries that included an open femoral fracture, massive hemorrhage, sciatic nerve laceration, and significant skin and muscle damage. The patient required 15 operative procedures, extensive physical therapy, and orthotic assistance. A review of the literature pertaining to shark bites is included.

  15. Visualizing disaster attitudes resulting from terrorist activities.

    Science.gov (United States)

    Khalid, Halimahtun M; Helander, Martin G; Hood, Nilwan A

    2013-09-01

    The purpose of this study was to analyze people's attitudes to disasters by investigating how people feel, behave and think during disasters. We focused on disasters induced by humans, such as terrorist attacks. Two types of textual information were collected - from Internet blogs and from research papers. The analysis enabled forecasting of attitudes for the design of proactive disaster advisory scheme. Text was analyzed using a text mining tool, Leximancer. The outcome of this analysis revealed core themes and concepts in the text concerning people's attitudes. The themes and concepts were sorted into three broad categories: Affect, Behaviour, and Cognition (ABC), and the data was visualized in semantic maps. The maps reveal several knowledge pathways of ABC for developing attitudinal ontologies, which describe the relations between affect, behaviour and cognition, and the sequence in which they develop. Clearly, terrorist attacks induced trauma and people became highly vulnerable.

  16. Node Survival in Networks under Correlated Attacks.

    Directory of Open Access Journals (Sweden)

    Yan Hao

    Full Text Available We study the interplay between correlations, dynamics, and networks for repeated attacks on a socio-economic network. As a model system we consider an insurance scheme against disasters that randomly hit nodes, where a node in need receives support from its network neighbors. The model is motivated by gift giving among the Maasai called Osotua. Survival of nodes under different disaster scenarios (uncorrelated, spatially, temporally and spatio-temporally correlated and for different network architectures are studied with agent-based numerical simulations. We find that the survival rate of a node depends dramatically on the type of correlation of the disasters: Spatially and spatio-temporally correlated disasters increase the survival rate; purely temporally correlated disasters decrease it. The type of correlation also leads to strong inequality among the surviving nodes. We introduce the concept of disaster masking to explain some of the results of our simulations. We also analyze the subsets of the networks that were activated to provide support after fifty years of random disasters. They show qualitative differences for the different disaster scenarios measured by path length, degree, clustering coefficient, and number of cycles.

  17. FEMA Disaster Declarations Summary

    Data.gov (United States)

    Department of Homeland Security — The FEMA Disaster Declarations Summary is a summarized dataset describing all federally declared disasters, starting with the first disaster declaration in 1953,...

  18. Community Disasters, Psychological Trauma, and Crisis Intervention

    OpenAIRE

    Boscarino, Joseph A

    2015-01-01

    The current issue of International Journal of Emergency Mental Health and Human Resilience is focused on community disasters, the impact of trauma exposure, and crisis intervention. The articles incorporated include studies ranging from the World Trade Center disaster to Hurricane Sandy. These studies are related to public attitudes and beliefs about disease outbreaks, the impact of volunteerism following the World Trade Center attacks, alcohol misuse among police officers after Hurricane Kat...

  19. HEALTH AND ENVIRONMENTAL CONSEQUENCES OF THE WORLD TRADE CENTER DISASTER

    Science.gov (United States)

    The attack on the World Trade Center (WTC) created an acute environmental disaster of enormous magnitude. This study characterizes the environmental exposures resulting from destruction of the WTC and assesses their effects on health. Methods include ambient air sampling; analyse...

  20. [Current organization of disaster medicine].

    Science.gov (United States)

    Julien, Henri

    2013-12-01

    The concept of disaster medicine, derivedfrom medical management of casualties caused by terrorist attacks or earthquakes, began to be taught in medical school in 1982. It adapts military intervention tactics to civilian practices, and differentiates major disasters (in which preformed teams are sent to the scene) from disasters with limited effects (predefined plans form the backbone of the rescue organization). Management of blast and crush syndromes, triage, care of numerous burn victims, on-site amputation, necrotomy, medicopsychological support, mass decontamination, and rescue management are some of the aspects with which physicians should be familiar. Predefined intervention teams and ad hoc materials have been created to provide autonomous logistic support. Regulations, ethical aspects and managerial methods still need to be refined, and research and teaching must be given a new impetus.

  1. Chromogenic detection of Sarin by discolouring decomplexation of a metal coordination complex.

    Science.gov (United States)

    Ordronneau, Lucie; Carella, Alexandre; Pohanka, Miroslav; Simonato, Jean-Pierre

    2013-10-11

    An innovative chromogenic sensing concept based on decomplexation of a tris-(bipyridine)iron(II) coordination complex has been developed for the detection of organophosphorus nerve agents. It was evaluated both on a simulant and real Sarin in vapour and liquid phases.

  2. Intravenous and inhalation toxicokinetics of sarin stereoisomers in atropinized guinea pigs

    NARCIS (Netherlands)

    Spruit, W.E.T.; Langenberg, J.P.; Trap, H.C.; Wiel, H.J. van der; Helmich, R.B.; Helden, H.P.M. van; Benschop, H.P.

    2000-01-01

    We report the first toxicokinetic studies of (±)-sarin. The toxicokinetics of the stereoisomers of this nerve agent were studied in anesthetized, atropinized, and restrained guinea pigs after intravenous bolus administration of a dose corresponding to 0.8 LD50 and after nose-only exposure to vapor c

  3. Novel brain-penetrating oximes for reactivation of cholinesterase inhibited by sarin and VX surrogates.

    Science.gov (United States)

    Chambers, Janice E; Meek, Edward C; Chambers, Howard W

    2016-06-01

    Current oxime reactivators for organophosphate-inhibited cholinesterase (ChE) do not effectively cross the blood-brain barrier and therefore cannot restore brain ChE activity in vivo. Our laboratories have studied highly relevant sarin and VX surrogates, which differ from their respective nerve agents only in the leaving group and thereby leave ChE phosphylated with the same chemical moiety as sarin and VX. Our laboratories have developed novel substituted phenoxyalkyl pyridinium oximes that lead to reduced ChE inhibition in the brains of rats challenged with a high sublethal dosage of the sarin surrogate, whereas 2-PAM did not, using a paradigm designed to demonstrate brain penetration. In addition, treatment of rats with these novel oximes is associated with attenuation of seizure-like behavior compared to rats treated with 2-PAM, providing additional evidence that the oximes penetrate the blood-brain barrier. Further, some of the oximes provided 24-h survival superior to 2-PAM, and shortened the duration of seizure-like behavior when rats were challenged with lethal dosages of the sarin and VX surrogates, providing additional support for the conclusion that these oximes penetrate the brain.

  4. A Communications Strategy for Disaster Relief

    Science.gov (United States)

    2015-03-01

    government. inReach Communication capabilities rely on the Iridium satellite network. The inReach Extreme product uses the Iridium Global Satellite System... Iridium Communication between satellites and handsets is done using a TDMA and FDMA based system using L-band spectrum between 1,616 and 1,626.5... attacks on the United States and to support civil authorities in mitigating the effects of potential attacks and natural disasters.”29 Another key

  5. 5 CFR 230.401 - Agency authority to take personnel actions in a national emergency disaster.

    Science.gov (United States)

    2010-01-01

    ... actions in a national emergency disaster. 230.401 Section 230.401 Administrative Personnel OFFICE OF... personnel actions in a national emergency disaster. (a) Upon an attack on the United States, agencies are... organizations during a period of disaster without regard to any regulation or instruction of OPM, except...

  6. Surviving Disasters

    Science.gov (United States)

    Henke, Karen Greenwood

    2008-01-01

    Schools play a unique role in communities when disaster strikes. They serve as shelter for evacuees and first responders; they are a trusted source of information; and once danger has passed, the district, as employer and community center, often serves as a foundation for recovery. Technology plays a key role in a school district's ability to…

  7. Disaster Preparedness and Response: Applied Exposure Science

    Science.gov (United States)

    In 2007, the ISEA, predecessor to ISES, held a special roundtable to discuss lessons learned for exposure science during and following environmental disasters, especially the 9/11 attacks and Hurricane Katrina. Since then, environmental agencies have been involved in responses to...

  8. Social epidemics in the aftermath of disasters.

    NARCIS (Netherlands)

    IJzermans, C.J.

    2002-01-01

    Issue/problem: After disasters, terrorist attacks and wars social epidemics of medically unexplained physical symptoms/syndromes (ups) are often seen. In modern times people feel more vulnerable and especially under pressure of those incidents, everyday symptoms are interpreted as disease and causal

  9. Social epidemics in the aftermath of disasters.

    NARCIS (Netherlands)

    IJzermans, C.J.

    2002-01-01

    Issue/problem: After disasters, terrorist attacks and wars social epidemics of medically unexplained physical symptoms/syndromes (ups) are often seen. In modern times people feel more vulnerable and especially under pressure of those incidents, everyday symptoms are interpreted as disease and

  10. Social epidemics in the aftermath of disasters.

    NARCIS (Netherlands)

    IJzermans, C.J.

    2002-01-01

    Issue/problem: After disasters, terrorist attacks and wars social epidemics of medically unexplained physical symptoms/syndromes (ups) are often seen. In modern times people feel more vulnerable and especially under pressure of those incidents, everyday symptoms are interpreted as disease and causal

  11. Post-disaster reproductive health outcomes.

    Science.gov (United States)

    Zotti, Marianne E; Williams, Amy M; Robertson, McKaylee; Horney, Jennifer; Hsia, Jason

    2013-07-01

    We examined methodological issues in studies of disaster-related effects on reproductive health outcomes and fertility among women of reproductive age and infants in the United States (US). We conducted a systematic literature review of 1,635 articles and reports published in peer-reviewed journals or by the government from January 1981 through December 2010. We classified the studies using three exposure types: (1) physical exposure to toxicants; (2) psychological trauma; and (3) general exposure to disaster. Fifteen articles met our inclusion criteria concerning research focus and design. Overall studies pertained to eight different disasters, with most (n = 6) focused on the World Trade Center attack. Only one study examined pregnancy loss, i.e., occurrence of spontaneous abortions post-disaster. Most studies focused on associations between disaster and adverse birth outcomes, but two studies pertained only to post-disaster fertility while another two examined it in addition to adverse birth outcomes. In most studies disaster-affected populations were assumed to have experienced psychological trauma, but exposure to trauma was measured in only four studies. Furthermore, effects of both physical exposure to toxicants and psychological trauma on disaster-affected populations were examined in only one study. Effects on birth outcomes were not consistently demonstrated, and study methodologies varied widely. Even so, these studies suggest an association between disasters and reproductive health and highlight the need for further studies to clarify associations. We postulate that post-disaster surveillance among pregnant women could improve our understanding of effects of disaster on the reproductive health of US pregnant women.

  12. Nerve agent analogues that produce authentic soman, sarin, tabun, and cyclohexyl methylphosphonate-modified human butyrylcholinesterase.

    Science.gov (United States)

    Gilley, Cynthia; MacDonald, Mary; Nachon, Florian; Schopfer, Lawrence M; Zhang, Jun; Cashman, John R; Lockridge, Oksana

    2009-10-01

    The goal was to test 14 nerve agent model compounds of soman, sarin, tabun, and cyclohexyl methylphosphonofluoridate (GF) for their suitability as substitutes for true nerve agents. We wanted to know whether the model compounds would form the identical covalent adduct with human butyrylcholinesterase that is produced by reaction with true nerve agents. Nerve agent model compounds containing thiocholine or thiomethyl in place of fluorine or cyanide were synthesized as Sp and Rp stereoisomers. Purified human butyrylcholinesterase was treated with a 45-fold molar excess of nerve agent analogue at pH 7.4 for 17 h at 21 degrees C. The protein was denatured by boiling and was digested with trypsin. Aged and nonaged active site peptide adducts were quantified by matrix-assisted laser desorption/ionization time-of-flight (MALDI-TOF) mass spectrometry of the tryptic digest mixture. The active site peptides were isolated by HPLC and analyzed by MALDI-TOF-TOF mass spectrometry. Serine 198 of butyrylcholinesterase was covalently modified by all 14 compounds. Thiocholine was the leaving group in all compounds that had thiocholine in place of fluorine or cyanide. Thiomethyl was the leaving group in the GF thiomethyl compounds. However, sarin thiomethyl compounds released either thiomethyl or isopropyl, while soman thiomethyl compounds released either thiomethyl or pinacolyl. Thiocholine compounds reacted more rapidly with butyrylcholinesterase than thiomethyl compounds. Labeling with the model compounds resulted in aged adducts that had lost the O-alkyl group (O-ethyl for tabun, O-cyclohexyl for GF, isopropyl for sarin, and pinacolyl for soman) in addition to the thiocholine or thiomethyl group. The nerve agent model compounds containing thiocholine and the GF thiomethyl analogue were found to be suitable substitutes for true soman, sarin, tabun, and GF in terms of the adduct that they produced with human butyrylcholinesterase. However, the soman and sarin thiomethyl compounds

  13. Disaster management following explosion.

    Science.gov (United States)

    Sharma, B R

    2008-01-01

    Explosions and bombings remain the most common deliberate cause of disasters involving large numbers of casualties, especially as instruments of terrorism. These attacks are virtually always directed against the untrained and unsuspecting civilian population. Unlike the military, civilians are poorly equipped or prepared to handle the severe emotional, logistical, and medical burdens of a sudden large casualty load, and thus are completely vulnerable to terrorist aims. To address the problem to the maximum benefit of mass disaster victims, we must develop collective forethought and a broad-based consensus on triage and these decisions must reach beyond the hospital emergency department. It needs to be realized that physicians should never be placed in a position of individually deciding to deny treatment to patients without the guidance of a policy or protocol. Emergency physicians, however, may easily find themselves in a situation in which the demand for resources clearly exceeds supply and for this reason, emergency care providers, personnel, hospital administrators, religious leaders, and medical ethics committees need to engage in bioethical decision-making.

  14. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    -technical system, the attack navigator identifies routes to an attacker goal. Specific attacker properties such as skill or resources can be included through attacker profiles. This enables defenders to explore attack scenarios and the effectiveness of defense alternatives under different threat conditions....

  15. Extension of the transferable potentials for phase equilibria force field to dimethylmethyl phosphonate, sarin, and soman.

    Science.gov (United States)

    Sokkalingam, Nandhini; Kamath, Ganesh; Coscione, Maria; Potoff, Jeffrey J

    2009-07-30

    The transferable potentials for phase equilibria force field is extended to dimethylmethylphosphonate (DMMP), sarin, and soman by introducing a new interaction site representing the phosphorus atom. Parameters for the phosphorus atom are optimized to reproduce the liquid densities at 303 and 373 K and the normal boiling point of DMMP. Calculations for sarin and soman are performed in predictive mode, without further parameter optimization. Vapor-liquid coexistence curves, critical properties, vapor pressures and heats of vaporization are predicted over a wide range of temperatures with histogram reweighting Monte Carlo simulations in the grand canonical ensemble. Excellent agreement with experiment is achieved for all compounds, with unsigned errors of less than 1% for vapor pressures and normal boiling points and under 5% for heats of vaporization and liquid densities at ambient conditions.

  16. Theoretical modeling study for the phosphonylation mechanisms of the catalytic triad of acetylcholinesterase by sarin.

    Science.gov (United States)

    Wang, Jing; Gu, Jiande; Leszczynski, Jerzy

    2008-03-20

    Potential energy surfaces for the process of phosphonylation of the catalytic triad of acetylcholinesterase by sarin have been explored at the B3LYP/6-311G(d,p) level of theory through a computational study. It is concluded that the phosphonylation process involves a critical addition-elimination mechanism. The first nucleophilic addition process is the rate-determining step. The following elimination process of the fluoride ion comprises a composite reaction that includes several steps, and it occurs rapidly by comparison with the rate-determining step. The mobility characteristics of histidine play an important role in the reaction. A double proton-transfer mechanism is proposed for the catalytic triad during the phosphonylation process of sarin on AChE. The effect of aqueous solvation has been considered via the polarizable continuum model (PCM). One concludes that the energy barriers are generally lowered in solvent, compared to the gas-phase reactions.

  17. Disaster Management for Cooling Tower- Case Study.

    Directory of Open Access Journals (Sweden)

    1Deshmukh Azhar A

    2016-05-01

    Full Text Available Cooling towers are prone to numerous disasters that can arise naturally or through human intervention. The safety of cooling towers becomes utmost importance for the plants to function properly. The study focused on identification of various disasters and the risks associated with them. The disasters can be earthquake, volcanoes, storm, extreme temperature, fire incident, terror attack, hazardous material leakage etc. The impact and vulnerability analysis of these disasters is conducted to find the associated risks properly. Mitigating risks is as important as identifying them. The two most important risks identified are Design Risk and Bacterial Risk. The preparedness to these risks helps in mitigating them. A probabilistic catastrophic risk model has been identified which performs a cost benefit analysis for mitigating the risks

  18. Kinetics of sarin (GB) following a single sublethal inhalation exposure in the guinea pig.

    Science.gov (United States)

    Whalley, Christopher E; McGuire, Jeffrey M; Miller, Dennis B; Jakubowski, Edward M; Mioduszewski, Robert J; Thomson, Sandra A; Lumley, Lucille A; McDonough, John H; Shih, Tsung-Ming A

    2007-06-01

    To improve toxicity estimates from sublethal exposures to chemical warfare nerve agents (CWNA), it is necessary to generate mathematical models of the absorption, distribution, and elimination of nerve agents. However, current models are based on representative data sets generated with different routes of exposure and in different species and are designed to interpolate between limited laboratory data sets to predict a wide range of possible human exposure scenarios. This study was performed to integrate CWNA sublethal toxicity data in male Duncan Hartley guinea pigs. Specific goal was to compare uptake and clearance kinetics of different sublethal doses of sarin (either 0.1 x or 0.4 x LC50) in blood and tissues of guinea pigs exposed to agent by acute whole-body inhalation exposure after the 60-min LC50 was determined. Arterial catheterization allowed repeated blood sampling from the same animal at various time periods. Blood and tissue levels of acetylcholinesterase, butyrylcholinesterase, and regenerated sarin (rGB) were determined at various time points during and following sarin exposure. The following pharmacokinetic parameters were calculated from the graph of plasma or RBC rGB concentration versus time: time to reach the maximal concentration; maximal concentration; mean residence time; clearance; volume of distribution at steady state; terminal elimination-phase rate constant; and area under plasma concentration time curve extrapolated to infinity using the WinNonlin analysis program 5.0. Plasma and RBC t(1/2) for rGB was also calculated. Data will be used to develop mathematical model of absorption and distribution of sublethal sarin doses into susceptible tissues.

  19. Sarin-induced brain damage in rats is attenuated by delayed administration of midazolam.

    Science.gov (United States)

    Chapman, Shira; Yaakov, Guy; Egoz, Inbal; Rabinovitz, Ishai; Raveh, Lily; Kadar, Tamar; Gilat, Eran; Grauer, Ettie

    2015-07-01

    Sarin poisoned rats display a hyper-cholinergic activity including hypersalivation, tremors, seizures and death. Here we studied the time and dose effects of midazolam treatment following nerve agent exposure. Rats were exposed to sarin (1.2 LD50, 108 μg/kg, im), and treated 1 min later with TMB4 and atropine (TA 7.5 and 5 mg/kg, im, respectively). Midazolam was injected either at 1 min (1 mg/kg, im), or 1 h later (1 or 5 mg/kg i.m.). Cortical seizures were monitored by electrocorticogram (ECoG). At 5 weeks, rats were assessed in a water maze task, and then their brains were extracted for biochemical analysis and histological evaluation. Results revealed a time and dose dependent effects of midazolam treatment. Rats treated with TA only displayed acute signs of sarin intoxication, 29% died within 24h and the ECoG showed seizures for several hours. Animals that received midazolam within 1 min survived with only minor clinical signs but with no biochemical, behavioral, or histological sequel. Animals that lived to receive midazolam at 1h (87%) survived and the effects of the delayed administration were dose dependent. Midazolam 5 mg/kg significantly counteracted the acute signs of intoxication and the impaired behavioral performance, attenuated some of the inflammatory response with no effect on morphological damage. Midazolam 1mg/kg showed only a slight tendency to modulate the cognitive function. In addition, the delayed administration of both midazolam doses significantly attenuated ECoG compared to TA treatment only. These results suggest that following prolonged seizure, high dose midazolam is beneficial in counteracting adverse effects of sarin poisoning.

  20. Natural Detoxification Capacity to Inactivate Nerve Agents Sarin and VX in the Rat Blood

    Directory of Open Access Journals (Sweden)

    Jiří Bajgal

    2016-03-01

    Full Text Available Background: The method of continual determination of the rat blood cholinesterase activity was developed to study the changes of the blood cholinesterases following different intervetions. Aims: The aim of this study is registration of cholinesterase activity in the rat blood and its changes to demonstrate detoxification capacity of rats to inactivate sarin or VX in vivo. Methods: The groups of female rats were premedicated (ketamine and xylazine and cannulated to a. femoralis. Continual blood sampling (0.02 ml/min and monitoring of the circulating blood cholinesterase activity were performed. Normal activity was monitored 1–2 min and then the nerve agent was administered i.m. (2× LD50. Using different time intervals of the leg compression and relaxation following the agent injection, cholinesterase activity was monitored and according to the inhibition obtained, detoxification capacity was assessed. Results: Administration of sarin to the leg, then 1 and 5 min compression and 20 min later relaxation showed that further inhibition in the blood was not observed. On the other hand, VX was able to inhibit blood cholinesterases after this intervention. Conclusions: The results demonstrated that sarin can be naturally detoxified on the contrary to VX. Described method can be used as model for other studies dealing with changes of cholinesterases in the blood following different factors.

  1. Coping motives and trait negative affect: testing mediation and moderation models of alcohol problems among American Red Cross disaster workers who responded to the September 11,2001 terrorist attacks.

    Science.gov (United States)

    Gaher, Raluca M; Simons, Jeffrey S; Jacobs, Gerard A; Meyer, David; Johnson-Jimenez, Erika

    2006-08-01

    This study explored the mechanism by which trait negative affect and alcohol coping motives are associated with alcohol-related problems in a sample of American Red Cross workers who participated in the relief operation following the attacks in New York City, the Pentagon, and the Pennsylvania crash site on Sept. 11th 2001. The results supported the mediation but not moderation model of coping motives. The support for the mediation model was fairly strong, including small to moderate associations between negative affect and alcohol problems, moderate to strong associations between negative affect and coping motives, and evidence of coping motives mediating the negative affect to alcohol problems relationships. The association between negative affect and coping motives was stronger among younger participants.

  2. Low-level exposure of guinea pigs and marmosets to sarin vapour in air: Lowest-observable-adverse-effect level (LOAEL) for miosis

    NARCIS (Netherlands)

    Helden, H.P.M. van; Trap, H.C.; Kuijpers, W.C.; Oostdijk, J.P.; Benschop, H.P.; Langenberg, J.P.

    2004-01-01

    The purpose of this pilot study was to indicate, for low-level exposure of conscious guinea pigs and marmoset monkeys to sarin vapour in air, the lowest-observable-adverse-effect level (LOAEL) of sarin for miosis. This is the concentration × time (C·t) value (t = 5 h) of exposure at which miosis

  3. Hormone-dependence of sarin lethality in rats: Sex differences and stage of the estrous cycle

    Energy Technology Data Exchange (ETDEWEB)

    Smith, Carl D., E-mail: carl.d.smith179.mil@mail.mil; Wright, Linnzi K.M.; Garcia, Gregory E.; Lee, Robyn B.; Lumley, Lucille A.

    2015-09-15

    Chemical warfare nerve agents (CWNAs) are highly toxic compounds that cause a cascade of symptoms and death, if exposed casualties are left untreated. Numerous rodent models have investigated the toxicity and mechanisms of toxicity of CWNAs, but most are limited to male subjects. Given the profound physiological effects of circulating gonadal hormones in female rodents, it is possible that the daily cyclical fluctuations of these hormones affect females' sensitivity to the lethal effects of CWNAs, and previous reports that included female subjects did not control for the stage of the hormonal cycle. The aim of the current study was to determine the 24-hour median lethal dose (LD{sub 50}) of the CWNA sarin in male, ovariectomized (OVEX) female, and female rats during different stages of the estrous cycle (diestrus, proestrus, and estrus). Additionally, baseline activity levels of plasma acetylcholinesterase, butyrylcholinesterase, and carboxylesterase were measured to determine differences among the groups. Results indicated that females in proestrus had a significantly higher LD{sub 50} of sarin compared to OVEX and estrous females. Although some sex differences were observed in the activity levels of plasma esterases, they were not consistent and likely not large enough to significantly affect the LD{sub 50}s. These results suggest that hormonal cyclicity can influence the outcome of CWNA-related studies using female rodents, and that this variability can be minimized by controlling for the stage of the cycle. Additional research is necessary to determine the precise mechanism of the observed differences because it is unlikely to be solely explained by plasma esterase activity. - Highlights: • The LD{sub 50} of sarin was determined in female rats throughout the stages of the estrous cycle. • Females in proestrus had a significantly higher LD{sub 50} compared to estrous or ovariectomized females. • No sex differences were observed between male and female

  4. Kinetic analysis of interactions of different sarin and tabun analogues with human acetylcholinesterase and oximes: is there a structure-activity relationship?

    Science.gov (United States)

    Aurbek, Nadine; Herkert, Nadja M; Koller, Marianne; Thiermann, Horst; Worek, Franz

    2010-09-06

    The repeated misuse of highly toxic organophosphorus compound (OP) based chemical warfare agents in military conflicts and terrorist attacks poses a continuous threat to the military and civilian sector. The toxic symptomatology of OP poisoning is mainly caused by inhibition of acetylcholinesterase (AChE, E.C. 3.1.1.7) resulting in generalized cholinergic crisis due to accumulation of the neurotransmitter acetylcholine (ACh) in synaptic clefts. Beside atropine as competitive antagonist of ACh at muscarinic ACh receptors oximes as reactivators of OP-inhibited AChE are a mainstay of standard antidotal treatment. However, human AChE inhibited by certain OP is rather resistant to oxime-induced reactivation. The development of more effective oxime-based reactivators may fill the gaps. To get more insight into a potential structure-activity relationship between human AChE, OPs and oximes in vitro studies were conducted to investigate interactions of different tabun and sarin analogues with human AChE and the oximes obidoxime and HI 6 by determination of various kinetic constants. Rate constants for the inhibition of human AChE by OPs, spontaneous dealkylation and reactivation as well as reactivation by obidoxime and HI 6 of OP-inhibited human AChE were determined. The recorded kinetic data did not allow a general statement concerning a structure-activity relationship between human AChE, OP and oximes.

  5. Generating IDS Attack Pattern Automatically Based on Attack Tree

    Institute of Scientific and Technical Information of China (English)

    向尕; 曹元大

    2003-01-01

    Generating attack pattern automatically based on attack tree is studied. The extending definition of attack tree is proposed. And the algorithm of generating attack tree is presented. The method of generating attack pattern automatically based on attack tree is shown, which is tested by concrete attack instances. The results show that the algorithm is effective and efficient. In doing so, the efficiency of generating attack pattern is improved and the attack trees can be reused.

  6. Disaster in Crisis

    DEFF Research Database (Denmark)

    Illner, Peer

    Since the inception of disaster studies in academia after WWII, two kinds of actors have been distinguished as involved in disasters. On the one hand, disasters involve formal actors, such as professional aid workers employed by state-run relief agencies; on the other hand, disasters involve...... initiatives and bottom-up organising as the preferred method to combat disaster. Once construed as strictly a responsibility of the state, the mitigation and management of disasters has shifted since the 1970s into a matter for civil society: a shift which has been heralded as progressive, democratic...... the banner of disaster. Focussing on the modifications to disaster management in the United States between 1970 and 2012, I show how the inclusion of civil society in the provision of aid services was accompanied by a structural withdrawal of the state from disaster relief and other welfare services. I...

  7. The enduring mental health impact of the September 11th terrorist attacks: challenges and lessons learned.

    Science.gov (United States)

    Ozbay, Fatih; Auf der Heyde, Tanja; Reissman, Dori; Sharma, Vansh

    2013-09-01

    The authors review the existing literature on the mental health impact of the September 11th attacks and the implications for disaster mental health clinicians and policy makers. The authors discuss the demographic characteristics of those affected and the state of mental health needs and existing mental health delivery services; the nature of the disaster and primary impacts on lives, infrastructure, and socioeconomic factors; the acute aftermath in the days and weeks after the attacks; the persistent mental health impact and evolution of services of the postacute aftermath; and the implications for future disaster mental health practitioners and policy makers.

  8. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  9. Transient Ischemic Attack

    Medline Plus

    Full Text Available Transient Ischemic Attack TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood ... The only difference between a stroke and TIA is that with TIA the blockage is transient (temporary). ...

  10. Social engineering attack framework

    CSIR Research Space (South Africa)

    Mouton, F

    2014-07-01

    Full Text Available link. A social engineering attack targets this weakness by; using various manipulation techniques in order to elicit sensitive; information. The field of social engineering is still in its infancy; stages with regards to formal definitions and attack...

  11. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... Ischemic Attack TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood clot blocks an artery for a short time. The only difference between a stroke ...

  12. Wildfire Disasters and Nursing.

    Science.gov (United States)

    Hanes, Patricia Frohock

    2016-12-01

    Multiple factors contribute to wildfires in California and other regions: drought, winds, climate change, and spreading urbanization. Little has been done to study the multiple roles of nurses related to wildfire disasters. Major nursing organizations support disaster education for nurses. It is essential for nurses to recognize their roles in each phase of the disaster cycle: mitigation, preparedness, response, and recovery. Skills learned in the US federal all-hazards approach to disasters can then be adapted to more specific disasters, such as wildfires, and issues affecting health care. Nursing has an important role in each phase of the disaster cycle.

  13. Watermark copy attack

    OpenAIRE

    Kutter, Martin; Voloshynovskyy, Svyatoslav; Herrigel, Alexander

    2000-01-01

    Research in digital watermarking has progressed along two paths. While new watermarking technologies are being developed, some researchers are also investigating di erent ways of attacking digital watermarks. Common attacks to watermarks usually aim to destroy theembedded watermark or to impair its detection. In this paper we propose a conceptually new attack for digitally watermarked images. The proposed attack doesnot destroy anembedded watermark, but copies it from one image to a di erent ...

  14. The Watermark Template Attack

    OpenAIRE

    Herrigel, Alexander; Voloshynovskyy, Svyatoslav; Rytsar, Yuriy

    2001-01-01

    This paper presents a new attack, called the watermark template attach, for watermarked images. In contrast to the Stirmark benchmark, this attack does not severely reduce the quality of the image. This attack maintains, therefore, the commercial value of the watermarked image. In contrast to previous approaches, it is not the aim of the attack to change the statistics of embedded watermarks fooling the detection process but to utilize specific concepts that have been recently developed for m...

  15. Introduction and Overview: Counseling Psychologists' Roles, Training, and Research Contributions to Large-Scale Disasters

    Science.gov (United States)

    Jacobs, Sue C.; Leach, Mark M.; Gerstein, Lawrence H.

    2011-01-01

    Counseling psychologists have responded to many disasters, including the Haiti earthquake, the 2001 terrorist attacks in the United States, and Hurricane Katrina. However, as a profession, their responses have been localized and nonsystematic. In this first of four articles in this contribution, "Counseling Psychology and Large-Scale Disasters,…

  16. Engineering Bacteria to Catabolize the Carbonaceous Component of Sarin: Teaching E. coli to Eat Isopropanol

    Energy Technology Data Exchange (ETDEWEB)

    Brown, Margaret E. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Joint BioEnergy Inst. (JBEI), Emeryville, CA (United States); Mukhopadhyay, Aindrila [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Joint BioEnergy Inst. (JBEI), Emeryville, CA (United States); Keasling, Jay D. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Joint BioEnergy Inst. (JBEI), Emeryville, CA (United States); Univ. of California, Berkeley, CA (United States); Technical Univ. of Denmark, Horsholm (Denmark)

    2016-07-12

    In this paper, we report an engineered strain of Escherichia coli that catabolizes the carbonaceous component of the extremely toxic chemical warfare agent sarin. Enzymatic decomposition of sarin generates isopropanol waste that, with this engineered strain, is then transformed into acetyl-CoA by enzymatic conversion with a key reaction performed by the acetone carboxylase complex (ACX). We engineered the heterologous expression of the ACX complex from Xanthobacter autotrophicus PY2 to match the naturally occurring subunit stoichiometry and purified the recombinant complex from E. coli for biochemical analysis. Incorporating this ACX complex and enzymes from diverse organisms, we introduced an isopropanol degradation pathway in E. coli, optimized induction conditions, and decoupled enzyme expression to probe pathway bottlenecks. Our engineered E. coli consumed 65% of isopropanol compared to no-cell controls and was able to grow on isopropanol as a sole carbon source. Finally, in the process, reconstitution of this large ACX complex (370 kDa) in a system naïve to its structural and mechanistic requirements allowed us to study this otherwise cryptic enzyme in more detail than would have been possible in the less genetically tractable native Xanthobacter system.

  17. Inhalation toxicokinetics of c(+ or -) p(+ or -)-soman and (+ or -)-sarin in the guinea pig

    Energy Technology Data Exchange (ETDEWEB)

    Langenberg, J.P.; Trap, H.C.; Spruit, W.E.; Due, A.H.; Helmich, R.B.

    1993-05-13

    The inhalation toxicokinetics of C(+/-)p(+/-)-soman and (+/-)-sarin were studied in anesthetized, atropinized guinea pigs. An apparatus was constructed for continuous generation of nerve agent vapor in air and nose-only exposure. During exposure the respiratory minute volume (RMV) and respiratory frequency (RF) were monitored. Blood samples were taken for gas chromatographic analysis of the concentrations of nerve agent stereoisomers, and to measure the progressive inhibition of acetylcholinesterase (AChE). The animals were exposed for 8 min to 0.40.8 LCt5O of C(+/-)P(+/-)-soman or (+/-)-sarin. Concentrations of the P(-)isomers increased rapidly during exposure, up to several ng/ml blood. The absorption phase of C(+)P(-)-soman lagged behind that of the c(-)P(-)-isomer. The measured progression of AChE inhibition was approximately in accordance with the observed blood levels of C(+/-)P(-)soman. P(-)-isomers were detected in blood upon exposure for 5 h to 0.1 LCt5O of c(+/-)P(+/-)-soman, with maximum concentrations of ca. 40 pg/ml. Blood AChE was gradually inhibited up to ca. 95 % during the 5 h exposure. There were no soman-related effects on RMV and RF.

  18. Engineering Bacteria to Catabolize the Carbonaceous Component of Sarin: Teaching E. coli to Eat Isopropanol.

    Science.gov (United States)

    Brown, Margaret E; Mukhopadhyay, Aindrila; Keasling, Jay D

    2016-12-16

    We report an engineered strain of Escherichia coli that catabolizes the carbonaceous component of the extremely toxic chemical warfare agent sarin. Enzymatic decomposition of sarin generates isopropanol waste that, with this engineered strain, is then transformed into acetyl-CoA by enzymatic conversion with a key reaction performed by the acetone carboxylase complex (ACX). We engineered the heterologous expression of the ACX complex from Xanthobacter autotrophicus PY2 to match the naturally occurring subunit stoichiometry and purified the recombinant complex from E. coli for biochemical analysis. Incorporating this ACX complex and enzymes from diverse organisms, we introduced an isopropanol degradation pathway in E. coli, optimized induction conditions, and decoupled enzyme expression to probe pathway bottlenecks. Our engineered E. coli consumed 65% of isopropanol compared to no-cell controls and was able to grow on isopropanol as a sole carbon source. In the process, reconstitution of this large ACX complex (370 kDa) in a system naïve to its structural and mechanistic requirements allowed us to study this otherwise cryptic enzyme in more detail than would have been possible in the less genetically tractable native Xanthobacter system.

  19. Colorimetric dipstick for assay of organophosphate pesticides and nerve agents represented by paraoxon, sarin and VX.

    Science.gov (United States)

    Pohanka, Miroslav; Karasova, Jana Zdarova; Kuca, Kamil; Pikula, Jiri; Holas, Ondrej; Korabecny, Jan; Cabal, Jiri

    2010-04-15

    A dipstick for fast assay of nerve agents and organophosphate pesticides was developed. Indicator pH papers were used as detectors. The principle of the assay is based on enzymatic hydrolysis of acetylcholine into acetic acid and choline by acetylcholinesterase. Acidification of the reaction medium due to accumulation of acetic acid was visible. The colour changed from dark red to yellow as the pH indicator recognized pH shift. Presence of an organophosphate pesticide or a nerve agent results in irreversible inhibition of acetylcholinesterase intercepted on the dipstick. The inhibition stops the enzymatic reaction. The inhibition appears as no change of the medium pH. Three compounds were assayed: paraoxon-ethyl as representative organophosphate pesticides and nerve agents sarin and VX. The achieved limit of detection was 5 x 10(-8)M for paraoxon-ethyl and 5 x 10(-9)M for sarin and VX. Dipsticks were found stable for at least one month. Suitability of these dipsticks for routine assay is discussed.

  20. PRIORITIZATION OF PEDIATRIC CBRNE DISASTER PREPAREDNESS EDUCATION AND TRAINING NEEDS

    OpenAIRE

    2014-01-01

    Children are the members of our population who are most vulnerable to the effects of a chemical, biological, radiological, nuclear or explosive (CBRNE) attack. It has been over 12 years since 9/11 and the majority of clinicians who would be providing care to children in the event of another attack still lack the requisite disaster preparedness training. The purpose of this report is to provide an overview of the recent developments that will enable the affordable creation of key CBRNE educati...

  1. Structure of a prereaction complex between the nerve agent sarin, its biological target acetylcholinesterase, and the antidote HI-6.

    Science.gov (United States)

    Allgardsson, Anders; Berg, Lotta; Akfur, Christine; Hörnberg, Andreas; Worek, Franz; Linusson, Anna; Ekström, Fredrik J

    2016-05-17

    Organophosphorus nerve agents interfere with cholinergic signaling by covalently binding to the active site of the enzyme acetylcholinesterase (AChE). This inhibition causes an accumulation of the neurotransmitter acetylcholine, potentially leading to overstimulation of the nervous system and death. Current treatments include the use of antidotes that promote the release of functional AChE by an unknown reactivation mechanism. We have used diffusion trap cryocrystallography and density functional theory (DFT) calculations to determine and analyze prereaction conformers of the nerve agent antidote HI-6 in complex with Mus musculus AChE covalently inhibited by the nerve agent sarin. These analyses reveal previously unknown conformations of the system and suggest that the cleavage of the covalent enzyme-sarin bond is preceded by a conformational change in the sarin adduct itself. Together with data from the reactivation kinetics, this alternate conformation suggests a key interaction between Glu202 and the O-isopropyl moiety of sarin. Moreover, solvent kinetic isotope effect experiments using deuterium oxide reveal that the reactivation mechanism features an isotope-sensitive step. These findings provide insights into the reactivation mechanism and provide a starting point for the development of improved antidotes. The work also illustrates how DFT calculations can guide the interpretation, analysis, and validation of crystallographic data for challenging reactive systems with complex conformational dynamics.

  2. Pet Disaster Preparedness

    Science.gov (United States)

    ... Safety Checklist – Arabic Pets and Disaster Safety Checklist – Chinese Pets and Disaster Safety Checklist – French Pets and ... Cross serves in the US, its territories and military installations around the world. Please try again. Your ...

  3. Disaster Case Management

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Disaster Case Management Program (DCM) is a time-limited process that involves a partnership between a case manager and a disaster survivor (also known as a...

  4. The Oxime Pro-2-PAM Provides Minimal Protection Against the CNS Effects of the Nerve Agents Sarin, Cyclosarin, and VX in Guinea Pigs

    Science.gov (United States)

    2011-01-01

    Figure 2. Representative micrographs of neuronal damage in CA1 hippocampus (A–D), basolateral (BL) amygdalae (E–H), piriform cortex (I–L) and striatum (M...E) BL amygdala, (I) piriform cortex, and (M) striatum. Although animals that received pro-2-PAM at 1 min after VX or sarin and that had their... piriform cortex (K, sarin; L, VX) and striatum (O, sarin; P, VX). Magnification 200×. A B C D E F G H I J K L M N O P

  5. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  6. Community Disasters, Psychological Trauma, and Crisis Intervention.

    Science.gov (United States)

    Boscarino, Joseph A

    The current issue of International Journal of Emergency Mental Health and Human Resilience is focused on community disasters, the impact of trauma exposure, and crisis intervention. The articles incorporated include studies ranging from the World Trade Center disaster to Hurricane Sandy. These studies are related to public attitudes and beliefs about disease outbreaks, the impact of volunteerism following the World Trade Center attacks, alcohol misuse among police officers after Hurricane Katrina, posttraumatic stress disorder after Hurricane Sandy among those exposed to the Trade Center disaster, compassion fatigue and burnout among trauma workers, crisis interventions in Eastern Europe, and police officers' use of stress intervention services. While this scope is broad, it reflects the knowledge that has emerged since the Buffalo Creek and Chernobyl catastrophes, to the more recent Hurricane Katrina and Sandy disasters. Given the current threat environment, psychologists, social workers, and other providers need to be aware of these developments and be prepared to mitigate the impact of psychological trauma following community disasters, whether natural or man-made.

  7. Return of ambiguity attacks

    Science.gov (United States)

    Craver, Scott A.

    2002-04-01

    The ambiguity attack, or invertibility attack, was described several years ago as a potential threat to digital watermarking systems. By manipulating the invertibility of watermark embedding, one could negate or subvert the meaning of a copyright mark. These attacks were easily prevented, however, with the appropriate application of one-way functions and cryptographic hashes in watermarking protocols. New research in watermarking, however, has caused the ambiguity attack to resurface as a threat, and this time it will not be as easy averted. Recent work in public-key watermarking create scenarios in which one-way functions may be ineffective against this threat. Furthermore, there are also positive uses for ambiguity attacks, as components in watermarking protocols. This paper provides an overview of the past and possible future of these unusual attacks.

  8. Comparison of in vitro potency of oximes (pralidoxime, obidoxime, HI-6) to reactivate sarin-inhibited acetylcholinesterase in various parts of pig brain.

    Science.gov (United States)

    Kuca, Kamil; Cabal, Jiri; Kassa, Jiri; Jun, Daniel; Hrabinová, Martina

    2005-01-01

    The potency of currently used oximes to reactivate sarin-inhibited acetylcholinesterase (AChE) in various parts of pig brain and whole pig brain was evaluated using in vitro methods. Significant differences in reactivation potency among all tested oximes were observed. At concentrations (10(-4) M) corresponding to recommended doses in vivo, the oxime HI-6 seems to be a more efficacious reactivator of sarin-inhibited AChE in whole pig brain as well as in cerebral hemispheres and cerebellum compared with the other oximes studied. Nevertheless, there are not any differences in the potency of oximes tested to reactivate sarin-inhibited AChE in medulla oblongata. Thus, the oxime HI-6 appears to be the most promising oxime among currently available oximes for the antidotal treatment of acute sarin poisoning, although it is not more efficacious than other currently used oximes in medulla oblongata, whose function is necessary for the vital functions of respiration and circulation.

  9. Attack-Related Life Disruption and Child Psychopathology in New York City Public Schoolchildren 6-Months Post-9/11

    Science.gov (United States)

    Comer, Jonathan S.; Fan, Bin; Duarte, Cristiane S.; Wu, Ping; Musa, George J.; Mandell, Donald J.; Albano, Anne Marie; Hoven, Christina W.

    2010-01-01

    In the aftermath of disasters, understanding relationships between disaster-related life disruption and children's functioning is key to informing future postdisaster intervention efforts. The present study examined attack-related life disruptions and psychopathology in a representative sample (N = 8,236) of New York City public schoolchildren…

  10. Adversary Model: Adaptive Chosen Ciphertext Attack with Timing Attack

    OpenAIRE

    2014-01-01

    We have introduced a novel adversary model in Chosen-Ciphertext Attack with Timing Attack (CCA2-TA) and it was a practical model because the model incorporates the timing attack. This paper is an extended paper for 'A Secure TFTP Protocol with Security Proofs'. Keywords - Timing Attack, Random Oracle Model, Indistinguishabilit, Chosen Plaintext Attack, CPA, Chosen Ciphertext Attack, IND-CCA1, Adaptive Chosen Ciphertext Attack, IND-CCA2, Trivial File Transfer Protocol, TFTP, Security, Trust, P...

  11. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  12. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2017, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. ...

  13. Seven Deadliest Network Attacks

    CERN Document Server

    Prowell, Stacy; Borkin, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service War Dialing Penetration "Testing" Protocol Tunneling Spanning Tree At

  14. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  15. Hormone-dependence of sarin lethality in rats: sex differences and stage of the estrous cycle

    Science.gov (United States)

    Smith, Carl D.; Wright, Linnzi K.M.; Garcia, Gregory E.; Lee, Robyn B.; Lumley, Lucille A.

    2015-01-01

    Chemical warfare nerve agents (CWNAs) are highly toxic compounds that cause a cascade of symptoms and death, if exposed casualties are left untreated. Numerous rodent models have investigated the toxicity and mechanisms of toxicity of CWNAs, but most are limited to male subjects. Given the profound physiological effects of circulating gonadal hormones in female rodents, it is possible that the daily cyclical fluctuations of these hormones affect females’ sensitivity to the lethal effects of CWNAs, and previous reports that included female subjects did not control for the stage of the hormonal cycle. The aim of the current study was to determine the 24-hour median lethal dose (LD50) of the CWNA sarin in male, ovariectomized (OVEX) female, and female rats during different stages of the estrous cycle (diestrus, proestrus, and estrus). Additionally, baseline activity levels of plasma acetylcholinesterase, butyrylcholinesterase, and carboxylesterase were measured to determine differences among the groups. Results indicated that females in proestrus had a significantly higher LD50 of sarin compared to OVEX and estrous females. Although some sex differences were observed in the activity levels of plasma esterases, they were not consistent and likely not large enough to significantly affect the LD50s. These results suggest that hormonal cyclicity can influence the outcome of CWNA-related studies using female rodents, and that this variability can be minimized by controlling for the stage of the cycle. Additional research is necessary to determine the precise mechanism of the observed differences because it is unlikely to be solely explained by plasma esterase activity. PMID:26079828

  16. Repeated low-dose exposures to sarin, soman, or VX affect acoustic startle in guinea pigs.

    Science.gov (United States)

    Smith, C D; Lee, R B; Moran, A V; Sipos, M L

    2016-01-01

    Chemical warfare nerve agents (CWNAs) are known to cause behavioral abnormalities in cases of human exposures and in animal models. The behavioral consequences of single exposures to CWNAs that cause observable toxic signs are particularly well characterized in animals; however, less is known regarding repeated smaller exposures that may or may not cause observable toxic signs. In the current study, guinea pigs were exposed to fractions (0.1, 0.2, or 0.4) of a medial lethal dose (LD50) of sarin, soman, or VX for two weeks. On each exposure day, and for a post-exposure period, acoustic startle response (ASR) was measured in each animal. Although relatively few studies use guinea pigs to measure behavior, this species is ideal for CWNA-related experiments because their levels of carboxylesterases closely mimic those of humans, unlike rats or mice. Results showed that the 0.4 LD50 doses of soman and VX transiently increased peak startle amplitude by the second week of injections, with amplitude returning to baseline by the second week post-exposure. Sarin also increased peak startle amplitude independent of week. Latencies to peak startle and PPI were affected by agent exposure but not consistently among the three agents. Most of the changes in startle responses returned to baseline following the cessation of exposures. These data suggest that doses of CWNAs not known to produce observable toxic signs in guinea pigs can affect behavior in the ASR paradigm. Further, these deficits are transient and usually return to baseline shortly after the end of a two-week exposure period.

  17. History of Disaster Medicine.

    Science.gov (United States)

    Suner, Selim

    2015-10-01

    Erik Noji, mentioned, tongue in cheek, Noah as the first disaster manager during a lecture in 2005. The canonical description of "The Genesis Flood" does describe Noah as a master planner and executer of an evacuation of biblical proportions. After gaining knowledge of a potential catastrophic disaster he planned and executed an evacuation to mitigate the effects of the "Genesis Flood" by building the Ark and organizing a mass exodus. He had to plan for food, water, shelter, medical care, waste disposal and other needs of all the evacuees. Throughout history, management of large disasters was conducted by the military. Indeed, the military still plays a large role in disaster response in many countries, particularly if the response is overseas and prolonged. The histories of emergency preparedness, disaster management and disaster medicine have coevolved and are inextricably intertwined. While disaster management in one form or another existed as long as people started living together in communities, the development of disaster medicine took off with the emergence of modern medicine. Similar to disaster management, disaster medicine also has roots in military organizations.

  18. Hurricane Katrina disaster diplomacy.

    Science.gov (United States)

    Kelman, Ilan

    2007-09-01

    Hurricane Katrina struck the United States at the end of August 2005. The consequent devastation appeared to be beyond the US government's ability to cope with and aid was offered by several states in varying degrees of conflict with the US. Hurricane Katrina therefore became a potential case study for 'disaster diplomacy', which examines how disaster-related activities do and do not yield diplomatic gains. A review of past disaster diplomacy work is provided. The literature's case studies are then categorised using a new typology: propinquity, aid relationship, level and purpose. Hurricane Katrina and its aftermath are then placed in the context of the US government's foreign policy, the international response to the disaster and the US government's reaction to these responses. The evidence presented is used to discuss the potential implications of Hurricane Katrina disaster diplomacy, indicating that factors other than disaster-related activities generally dominate diplomatic relations and foreign policy.

  19. Simulating and Communicating Outcomes in Disaster Management Situations

    Directory of Open Access Journals (Sweden)

    Michal Lichter

    2015-09-01

    Full Text Available An important, but overlooked component of disaster managment is raising the awareness and preparedness of potential stakeholders. We show how recent advances in agent-based modeling and geo-information analytics can be combined to this effect. Using a dynamic simulation model, we estimate the long run outcomes of two very different urban disasters with severe consequences: an earthquake and a missile attack. These differ in terms of duration, intensity, permanence, and focal points. These hypothetical shocks are simulated for the downtown area of Jerusalem. Outcomes are compared in terms of their potential for disaster mitigation. The spatial and temporal dynamics of the simulation yield rich outputs. Web-based mapping is used to visualize these results and communicate risk to policy makers, planners, and the informed public. The components and design of this application are described. Implications for participatory disaster management and planning are discussed.

  20. Reduction of earthquake disasters

    Institute of Scientific and Technical Information of China (English)

    陈顒; 陈祺福; 黄静; 徐文立

    2003-01-01

    The article summarizes the researches on mitigating earthquake disasters of the past four years in China. The studyof earthquake disasters′ quantification shows that the losses increase remarkably when population concentrates inurban area and social wealth increase. The article also summarizes some new trends of studying earthquake disas-ters′ mitigation, which are from seismic hazard to seismic risk, from engineering disaster to social disaster andintroduces the community-centered approach.

  1. Disaster mental health

    DEFF Research Database (Denmark)

    Henderson, Silja; Berliner, Peter; Elsass, Peter

    2015-01-01

    In this chapter we focus on disaster mental health, particularly theoretical and research-based implications for intervention. The field of disaster mental health research is vast and impossible to cover in a single chapter, but we will visit central research, concepts, and understandings within...... disaster mental health and intervention, and refer to further literature where meaningful. We conclude the chapter with recommendations for further research....

  2. Mathematical Attacks on RSA Cryptosystem

    Directory of Open Access Journals (Sweden)

    Imad K. Salah

    2006-01-01

    Full Text Available In this paper some of the most common attacks against Rivest, Shamir, and Adleman (RSA cryptosystem are presented. We describe the integer factoring attacks, attacks on the underlying mathematical function, as well as attacks that exploit details in implementations of the algorithm. Algorithms for each type of attacks are developed and analyzed by their complexity, memory requirements and area of usage.

  3. Preparing for Disaster: Taking the Lead

    Science.gov (United States)

    Colber, Judith

    2008-01-01

    In this article, Irwin Redlener, director of the National Center for Disaster Preparedness describes disasters in relation to five phases that may serve as a helpful framework for planning disaster response: (1) before the disaster (pre-disaster); (2) during the disaster (intra-disaster); (3) immediately after the disaster (immediate…

  4. Monitoring recent lake level variations on the Tibetan Plateau using CryoSat-2 SARIn mode data

    DEFF Research Database (Denmark)

    Jiang, Liguang; Nielsen, Karina; Andersen, Ole Baltazar;

    2017-01-01

    to monitor lake levels. In this study, Cryosat-2 SARIn mode data over the period 2010–2015 are used to investigate recent lake level variations. The estimated water levels of the 70 largest lakes (> 100 km2) on the TP show that 48 lakes reveal a rising trend (avg. 0.28 ± 0.06 m/yr) while the other 22 show...

  5. CRUCIAL: Cryosat-2 Success over Inland Water and Land: SAR and SARin Full Bit Rate Altimetric Heights and Validation

    Science.gov (United States)

    Moore, Philip; Birkinshaw, Stephen; Restano, Marco; Ambrozio, Americo; Benveniste, Jerome

    2016-04-01

    CRUCIAL is an ESA/STSE funded project investigating innovative land and inland water applications from Cryosat-2 with a forward-look component to the future Sentinel-3 and Jason-CS/Sentinel-6 missions. The high along-track sampling and resolution of Cryosat-2 altimeter in SAR and SARin modes offer the opportunity to recover high frequency signals over inland waters. This paper will present the theoretical approach to analysis of the FBR L1A Doppler beams to form a product using ground cell gridding, beam steering and beam stacking from which inland water heights are derivable from the retracked Cryosat-2 altimetric waveforms. Details of the processing strategy will include a comparison of waveforms and heights from the burst echoes (~80 m along-track) and from multi-look waveforms (~320 m along-track). SAR and SARin FBR data are available for the Amazon, Brahmaputra and Mekong. The Mekong and Amazon FBR SAR data has been processed for 2011-2015 and results will be compared against stage data from the nearest gauge. Similarly, heights from Tonle Sap will be compared against Jason-2 data from the United States Department of Agriculture web site. A strategy to select the number of multi-looks over rivers will also be presented. Results of FBR SARin processing will be presented including comparison of heights from the two antennae and the extraction of slope of the ground surface.

  6. Nocturnal panic attacks

    Directory of Open Access Journals (Sweden)

    Lopes Fabiana L.

    2002-01-01

    Full Text Available The panic-respiration connection has been presented with increasing evidences in the literature. We report three panic disorder patients with nocturnal panic attacks with prominent respiratory symptoms, the overlapping of the symptoms with the sleep apnea syndrome and a change of the diurnal panic attacks, from spontaneous to situational pattern. The implication of these findings and awareness to the distinct core of the nocturnal panic attacks symptoms may help to differentiate them from sleep disorders and the search for specific treatment.

  7. Supply Chain Attack Framework and Attack Patterns

    Science.gov (United States)

    2013-12-01

    Malware is embedded in a replacement server motherboard (e.g., in the flash memory) in order to alter server functionality from that intended. Attack...Slashdot: Dell Ships Infected Motherboards July 21, 2010(c/o Rick Dove) Threat: An adversary with access to hardware procurement, maintenance, or upgrade...control can embed malware in a critical component server motherboard . Vulnerabilities: The control processes and mechanisms for hardware

  8. Agriculture: Natural Events and Disasters

    Science.gov (United States)

    Natural Events and DiasastersInformation on Natural Events and Disasters. Every year natural disasters, such as hurricanes, floods, fires, earthquakes, and tornadoes, challenge agricultural production.

  9. When is a natural disaster a development disaster; when is a natural disaster not a disaster?

    Science.gov (United States)

    Mutter, J. C.; Archibong, B.; Pi, D.

    2009-12-01

    Extremes of nature like hurricanes, droughts and earthquakes influence human welfare in a variety of ways. While it might seem counterintuitive, evidence from long run macro-economic data suggests that when natural extremes are especially destructive to human societies, and earn the title “natural disaster” they can actually have a beneficial effect on development. The process involved may be akin to the “The gale of creative destruction” first described by the economist Joseph Schumpeter. Applied to disasters the notion is that, in the short term, disasters can stimulate certain industries such as construction with capital flows coming into the disaster region from outside sources such as central government or international aid that can stimulate the economy. Longer term, outdated and inefficient public and private infrastructure destroyed in the disaster can be replaced by up to date, efficient systems that permit the economy to function more effectively, so that post-disaster growth can exceed pre-disaster levels. Disasters are macro-economic shocks, fundamentally similar to the banking shock that lead to the current global recession and, in the same way require external capital stimuli to overcome and that stimulus can result in stronger economies after recovery. These large-scale and long-run trends disguise the fact that disasters have very different development outcomes for different societies. Globally, there is evidence that poorer countries are not systematically stimulated by disaster shocks and may even be driven into poverty traps by certain disasters. Locally, the recovery from Hurricane Katrina in New Orleans has had been very different for different social groups, with both over-recovery and under-recovery occurring simultaneously and in close proximity. We discuss the conditions under which disasters might be a stimulating force and when they might lead to development setbacks.

  10. Disaster Risk Management - The Kenyan Challenge

    Science.gov (United States)

    Nabutola, W.; Scheer, S.

    2009-04-01

    Keywords: natural disasters; man-made disasters; terrorist attacks; land slides; disaster policies and legislations; fire; earthquakes; hurricanes; soil erosion; disaster research policy; Preamble: "Risk does not begin and end on the floor of the New York Stock Exchange. The vastness of the subject matter is daunting. Risk touches on the most profound aspects of psychology, mathematics, statistics and history. The literature is monumental; each day's headlines bring many new items of interest. But I know we are not unique, everywhere in the world risks abound." "AGAINST THE GODS the remarkable story of risk" by Peter L. Bernstein, 1998 The real challenge is what can we, as a nation do to avert, prevent them, or in the unfortunate event that they occur, how can we mitigate their impact on the economy? Introductory remarks: Disaster in Kenya, as indeed anywhere else, is not one of those happenings we can wish away. It can strike anywhere any time. Some of it is man-made but most of it is natural. The natural are sometimes induced by man in one way or another. For example, when we harvest trees without replacing them, this diminishes the forest cover and can lead to soil erosion, whose advanced form is land slides. Either way disasters in their different forms and sizes present challenges to the way we live our lives or not, perhaps, even how we die. Disasters in our country have reached crisis stage. ‘In Chinese language, crisis means danger, but it also means opportunity' Les Brown, motivational speaker in "the power of a larger vision" Why I am interested Whereas Kenya experiences man made and natural disasters, there are more sinister challenges of the man-made variety. These loom on the horizon and, from time to time raise their ugly heads, taking many Kenyan lives in their wake, and property destroyed. These are post election violence and terrorist attacks, both related to politics, internal and external. In January 2008, soon after presidential and national

  11. Disaster Risk Management - The Kenyan Challenges

    Science.gov (United States)

    Nabutola, W.

    2009-04-01

    Keywords: natural disasters; man-made disasters; terrorist attacks; land slides; disaster policies and legislations; fire; earthquakes; hurricanes; soil erosion; disaster research policy; Preamble: "Risk does not begin and end on the floor of the New York Stock Exchange. The vastness of the subject matter is daunting. Risk touches on the most profound aspects of psychology, mathematics, statistics and history. The literature is monumental; each day's headlines bring many new items of interest. But I know we are not unique, everywhere in the world risks abound." "AGAINST THE GODS the remarkable story of risk" by Peter L. Bernstein, 1998 The real challenge is what can we, as a nation do to avert, prevent them, or in the unfortunate event that they occur, how can we mitigate their impact on the economy? Introductory remarks: Disaster in Kenya, as indeed anywhere else, is not one of those happenings we can wish away. It can strike anywhere any time. Some of it is man-made but most of it is natural. The natural are sometimes induced by man in one way or another. For example, when we harvest trees without replacing them, this diminishes the forest cover and can lead to soil erosion, whose advanced form is land slides. Either way disasters in their different forms and sizes present challenges to the way we live our lives or not, perhaps, even how we die. Disasters in our country have reached crisis stage. ‘In Chinese language, crisis means danger, but it also means opportunity' Les Brown, motivational speaker in "the power of a larger vision" Why I am interested Whereas Kenya experiences man made and natural disasters, there are more sinister challenges of the man-made variety. These loom on the horizon and, from time to time raise their ugly heads, taking many Kenyan lives in their wake, and property destroyed. These are post election violence and terrorist attacks, both related to politics, internal and external. In January 2008, soon after presidential and national

  12. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood clot blocks an ... a short time. The only difference between a stroke and TIA is that with TIA the blockage ...

  13. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  14. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  15. Heart Attack Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for heart...

  16. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood clot blocks an ... a short time. The only difference between a stroke and TIA is that with TIA the blockage ...

  17. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... Attack Stent © 2017, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. The content in this library is for educational purposes only, and therefore is not intended to be ...

  18. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  19. The Role of the Military in Disaster Response in the U.S.

    Directory of Open Access Journals (Sweden)

    Naim Kapucu

    2011-10-01

    Full Text Available Several scholarly works have documented a heightened military involvement in responding to natural and man-made disasters. This is due to both the historical focus of the military on responding to domestic disasters and the recent impact of large-scale terrorist attacks on the U.S. territory. While retaining its primary role of safeguarding the country from external threats, the military has become one of the main partners of federal, state, and local agencies in disaster response operations, providing its available resources, logistical capacity, and operational services effectively used against both man-made and natural disasters. This article discusses the role of the military in responding to natural and man-made disasters and explores the historical involvement of military in disaster management.

  20. The Role of the Military in Disaster Response in the U.S.

    Directory of Open Access Journals (Sweden)

    Naim Kapucu

    2016-02-01

    Full Text Available Several scholarly works have documented a heightened military involvement in responding to natural and man-made disasters. This is due to both the historical focus of the military on responding to domestic disasters and the recent impact of large-scale terrorist attacks on the U.S. territory. While retaining its primary role of safeguarding the country from external threats, the military has become one of the main partners of federal, state, and local agencies in disaster response operations, providing its available resources, logistical capacity, and operational services effectively used against both man-made and natural disasters. This article discusses the role of the military in responding to natural and man-made disasters and explores the historical involvement of military in disaster management.

  1. Bayesian Watermark Attacks

    OpenAIRE

    Shterev, Ivo; Dunson, David

    2012-01-01

    This paper presents an application of statistical machine learning to the field of watermarking. We propose a new attack model on additive spread-spectrum watermarking systems. The proposed attack is based on Bayesian statistics. We consider the scenario in which a watermark signal is repeatedly embedded in specific, possibly chosen based on a secret message bitstream, segments (signals) of the host data. The host signal can represent a patch of pixels from an image or a video frame. We propo...

  2. DNS rebinding attacks

    OpenAIRE

    Kokkinopoulos, Georgios

    2009-01-01

    Approved for public release, distribution unlimited. A Domain Name System (DNS) Rebinding attack compromises the integrity of name resolution in DNS with the goal of controlling the IP address of the host to which the victim ultimately connects. The same origin policy and DNS Pinning techniques were introduced to protect Web browsers from DNS rebinding attacks, but their effectiveness has been undermined by vulnerabilities introduced by plug-ins such as JavaScript and Adobe Flash Play...

  3. PRIORITIZATION OF PEDIATRIC CBRNE DISASTER PREPAREDNESS EDUCATION AND TRAINING NEEDS

    Science.gov (United States)

    Siegel, David; Strauss-Riggs, Kandra; Needle, Scott

    2014-01-01

    Children are the members of our population who are most vulnerable to the effects of a chemical, biological, radiological, nuclear or explosive (CBRNE) attack. It has been over 12 years since 9/11 and the majority of clinicians who would be providing care to children in the event of another attack still lack the requisite disaster preparedness training. The purpose of this report is to provide an overview of the recent developments that will enable the affordable creation of key CBRNE educational and just in time material. In 2011, the National Center for Disaster Medicine and Public Health (NCDMPH) convened a pediatric disaster preparedness conference. Much of the initial groundwork for development of a pediatric disaster preparedness curriculum, including the identification of target audiences and requisite role specific CBRNE curriculum content, was the product of this conference. Much of the needed pediatric education and training content for the diagnosis and treatment of the injurious effects of CBRNE has recently been both developed and well vetted. Bringing together these efforts in an educational program will result in a workforce that is better trained and prepared to address the needs of children impacted by these types of disasters. PMID:25587241

  4. High Order Differential Attack and Trace Attack to Block Ciphers

    Institute of Scientific and Technical Information of China (English)

    HU Yupu; CHEN Kai; Xiao Guozhen

    2001-01-01

    In this paper, we prove a high or-der differential property of power function, then giverespectively high order differential attack and traceattack to block ciphers. These attacks depend onlyon block cipher's algebraic shape on GF(2n) and haveno relation with its designing structure. The condi-tions are given for both effective attacks and strengthagainst attacks.

  5. Pre-attack stress-load, appraisals, and coping in children’s responses to the 9/11 terrorist attacks

    Science.gov (United States)

    Lengua, Liliana J.; Long, Anna C.; Meltzoff, Andrew N.

    2013-01-01

    Background Appraisal and coping following a disaster are important factors in children’s post-traumatic stress (PTS) symptoms. However, little is known about predictors of disaster coping responses. This study examined stress-load, appraisals and coping styles measured prior to the September 11 terrorist attacks as predictors of 9/11-specific appraisals, coping and PTS. Methods A community sample of children and parents (N = 143) participating in an ongoing study were interviewed by phone approximately 1 month following 9/11. Results Pre-attack stress-load, appraisal and coping styles predicted children’s 9/11-specific appraisals, coping, and PTS. 9/11-specific threat appraisals and avoidant coping predicted higher PTS and mediated the effects of pre-attack stress-load and threat appraisal. Conclusions Pre-disaster stress-load, appraisal and coping styles predict disaster-specific appraisal and coping, which in turn, contribute to PTS. Coping interventions might mitigate PTS symptoms following a disaster. PMID:17176377

  6. Disaster Management through Experiential Learning

    Science.gov (United States)

    Rijumol, K. C.; Thangarajathi, S.; Ananthasayanam, R.

    2010-01-01

    Disasters can strike at any time, at any place. The world is becoming increasingly vulnerable to natural disasters. From earthquakes to floods and famines, mankind is even more threatened by the forces of nature. The Theme of the 2006 to 2007 International Day for Disaster Reduction was "Disaster Risk Reduction begins at schools" and…

  7. Financial Protection Against Natural Disasters

    OpenAIRE

    World Bank Group

    2014-01-01

    The primary objective of this report is to take stock of the global progress on financial protection against natural disasters over the last decade and bring together the latest thinking on disaster risk financing and insurance. Disaster risk financing and insurance helps minimize the cost and optimize the timing of meeting post-disaster funding needs without compromising development goals...

  8. Life After a Heart Attack

    Science.gov (United States)

    ... symptoms of a heart attack. It presents one woman's real-life experience with heart attack symptoms, which started during her pregnancy. The video also explains how a heart attack occurs and encourages women to seek care right away for heart attack symptoms. For more information, ...

  9. What Is a Heart Attack?

    Science.gov (United States)

    ... symptoms of a heart attack. It presents one woman's real-life experience with heart attack symptoms, which started during her pregnancy. The video also explains how a heart attack occurs and encourages women to seek care right away for heart attack symptoms. For more information, ...

  10. What Causes a Heart Attack?

    Science.gov (United States)

    ... symptoms of a heart attack. It presents one woman's real-life experience with heart attack symptoms, which started during her pregnancy. The video also explains how a heart attack occurs and encourages women to seek care right away for heart attack symptoms. For more information, ...

  11. XQuery Injection Attack and Countermeasures

    Institute of Scientific and Technical Information of China (English)

    谭玉森

    2014-01-01

    As a database that allows data to be stored in XML format, XML database suffers from some similar attacks as traditional relational database does. These attacks include injection attack by XQuey function in application software. These include BaseX, eXist and MarkLogic. In order to defeat these attacks, countermeasures are proposed.

  12. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  13. Soon After the Disaster

    Institute of Scientific and Technical Information of China (English)

    LI LI

    2010-01-01

    @@ China's disaster relief departments have initiated a first-class emergency response for disaster relief in the wake of a 7.1-magnitude earthquake that hit Qinghai Province at 7:49 a.m.on April 14. The decision was made by the Ministry of Civil Affairs and the National Committee for Disaster Reduction at noon of the same day.As of 4:30 p.m.April 15,the shallow earthquake with its epicenter in the Tibetan Autonomous Prefecture of Yushu in the province has left at least 760 people dead,11,477 others injured and around 100,000 homeless,local authorities say.

  14. The political attack ad

    Directory of Open Access Journals (Sweden)

    Palma Peña-Jiménez, Ph.D.

    2011-01-01

    Full Text Available During election campaigns the political spot has a clear objective: to win votes. This message is communicated to the electorate through television and Internet, and usually presents a negative approach, which includes a direct critical message against the opponent, rather than an exposition of proposals. This article is focused on the analysis of the campaign attack video ad purposely created to encourage the disapproval of the political opponent among voters. These ads focus on discrediting the opponent, many times, through the transmission of ad hominem messages, instead of disseminating the potential of the political party and the virtues and manifesto of its candidate. The article reviews the development of the attack ad since its first appearance, which in Spain dates back to 1996, when the famous Doberman ad was broadcast, and examines the most memorable campaign attack ads.

  15. Shark attack in Natal.

    Science.gov (United States)

    White, J A

    1975-02-01

    The injuries in 5 cases of shark attack in Natal during 1973-74 are reviewed. Experience in shark attacks in South Africa during this period is discussed (1965-73), and the value of protecting heavily utilized beaches in Natal with nets is assessed. The surgical applications of elasmobranch research at the Oceanographic Research Institute (Durban) and at the Headquarters of the Natal Anti-Shark Measures Board (Umhlanga Rocks) are described. Modern trends in the training of surf life-guards, the provision of basic equipment for primary resuscitation of casualties on the beaches, and the policy of general and local care of these patients in Natal are discussed.

  16. Integrating the disaster cycle model into traditional disaster diplomacy concepts.

    Science.gov (United States)

    Callaway, David W; Yim, Eugene S; Stack, Colin; Burkle, Frederick M

    2012-03-01

    Disaster diplomacy is an evolving contemporary model that examines how disaster response strategies can facilitate cooperation between parties in conflict. The concept of disaster diplomacy has emerged during the past decade to address how disaster response can be leveraged to promote peace, facilitate communication, promote human rights, and strengthen intercommunity ties in the increasingly multipolar modern world. Historically, the concept has evolved through two camps, one that focuses on the interactions between national governments in conflict and another that emphasizes the grassroots movements that can promote change. The two divergent approaches can be reconciled and disaster diplomacy further matured by contextualizing the concept within the disaster cycle, a model well established within the disaster risk management community. In particular, access to available health care, especially for the most vulnerable populations, may need to be negotiated. As such, disaster response professionals, including emergency medicine specialists, can play an important role in the development and implementation of disaster diplomacy concepts.

  17. Resilience in disaster research

    DEFF Research Database (Denmark)

    Dahlberg, Rasmus; Johannessen-Henry, Christine Tind; Raju, Emmanuel

    2015-01-01

    This paper explores the concept of resilience in disaster management settings in modern society. The diversity and relatedness of ‘resilience’ as a concept and as a process are reflected in its presentation through three ‘versions’: (i) pastoral care and the role of the church for victims...... of disaster trauma, (ii) federal policy and the US Critical Infrastructure Plan, and (iii) the building of resilient communities for disaster risk reduction practices. The three versions aim to offer characteristic expressions of resilience, as increasingly evident in current disaster literature....... In presenting resilience through the lens of these three versions, the article highlights the complexity in using resilience as an all-encompassing word. The article also suggests the need for understanding the nexuses between risk, vulnerability, and policy for the future of resilience discourse....

  18. Disaster Debris Recovery Database

    Data.gov (United States)

    U.S. Environmental Protection Agency — The US EPA Region 5 Disaster Debris Recovery Database includes public datasets of over 3,500 composting facilities, demolition contractors, haulers, transfer...

  19. A Peanut Butter Disaster

    Science.gov (United States)

    Vento, Carla J.

    1976-01-01

    A discussion of how cross-age tutoring was used with older pupils helping younger ones by making media curriculum materials. How this method was applied to disaster preparedness education is described. (HB)

  20. FEMA Disaster Recovery Centers

    Data.gov (United States)

    Department of Homeland Security — This is a search site for FEMA's Disaster Recovery Centers (DRC). A DRC is a readily accessible facility or mobile office set up by FEMA where applicants may go for...

  1. Medical student disaster medicine education: the development of an educational resource.

    Science.gov (United States)

    Pfenninger, Ernst G; Domres, Bernd D; Stahl, Wolfgang; Bauer, Andreas; Houser, Christine M; Himmelseher, Sabine

    2010-02-16

    Disaster medicine education is an enormous challenge, but indispensable for disaster preparedness. We aimed to develop and implement a disaster medicine curriculum for medical student education that can serve as a peer-reviewed, structured educational guide and resource. Additionally, the process of designing, approving and implementing such a curriculum is presented. The six-step approach to curriculum development for medical education was used as a formal process instrument. Recognized experts from professional and governmental bodies involved in disaster health care provided input using disaster-related physician training programs, scientific evidence if available, proposals for education by international disaster medicine organizations and their expertise as the basis for content development. The final course consisted of 14 modules composed of 2-h units. The concepts of disaster medicine, including response, medical assistance, law, command, coordination, communication, and mass casualty management, are introduced. Hospital preparedness plans and experiences from worldwide disaster assistance are reviewed. Life-saving emergency and limited individual treatment under disaster conditions are discussed. Specifics of initial management of explosive, war-related, radiological/nuclear, chemical, and biological incidents emphasizing infectious diseases and terrorist attacks are presented. An evacuation exercise is completed, and a mass casualty triage is simulated in collaboration with local disaster response agencies. Decontamination procedures are demonstrated at a nuclear power plant or the local fire department, and personal decontamination practices are exercised. Mannequin resuscitation is practiced while personal protective equipment is utilized. An interactive review of professional ethics, stress disorders, psychosocial interventions, and quality improvement efforts complete the training. The curriculum offers medical disaster education in a reasonable time

  2. The system was blinking red: Awareness Contexts and Disasters

    Directory of Open Access Journals (Sweden)

    Vivian B. Martin

    2015-12-01

    Full Text Available The awareness context has been a source of inspiration for grounded theories for more than 50 years; yet little has been done to extend the theory beyond nursing and the medical field, and a few works on identity. This paper extends the awareness context by examining its role in several high-profile disasters, natural and man-made, where gaining a clear sense of what was going on was often blocked by poor information flow and general communication failures, interpersonal and technological. Selective coding and the introduction of new concepts after analyzing hundreds of pages of documents issued by special commissions in the aftermath of the 9/11 attacks, Hurricane Katrina, the Deepwater Horizon oil spill in the Gulf, and the Sago Mine Disaster not only explain various processes around awareness in the midst of crisis, but also illuminate pre-crisis patterns that, if attended, could have mitigated the impact of the disasters.

  3. Nonprofit Organizations in Disaster Response and Management: A Network Analysis

    Directory of Open Access Journals (Sweden)

    Naim Kapucu

    2011-05-01

    Full Text Available This paper tracks changes in the national disaster management system with regard to the nonprofit sector by looking at the roles ascribed to nonprofit organizations in the Federal Response Plan (FRP, National Response Plan (NRP, and National Response Framework (NRF. Additionally, the data collected from news reports and organizational after action reports about the inter-organizational interactions of emergency management agencies during the September 11 th attacks and Hurricane Katrina are analyzed by using network analysis tools. The findings of the study indicate that there has been an increase in the interactions of the National Voluntary Organizations Active in Disasters (NVOAD network member organizations on par with policy changes in the NRP to involve nonprofit organizations in the national disaster planning process. In addition, those organizations close to the center of the network experienced enhanced communication and resource acquisition allowing them to successfully accomplish their missions, a finding that supports the development of strong network connections.

  4. Health and environmental consequences of the world trade center disaster.

    OpenAIRE

    Landrigan, Philip J; LIOY, PAUL J.; Thurston, George; Berkowitz, Gertrud; Chen, L C; Chillrud, Steven N.; Gavett, Stephen H; Georgopoulos, Panos G; Geyh, Alison S.; Levin, Stephen; Perera, Frederica; Rappaport, Stephen M.; Small, Christopher; ,

    2004-01-01

    The attack on the World Trade Center (WTC) created an acute environmental disaster of enormous magnitude. This study characterizes the environmental exposures resulting from destruction of the WTC and assesses their effects on health. Methods include ambient air sampling; analyses of outdoor and indoor settled dust; high-altitude imaging and modeling of the atmospheric plume; inhalation studies of WTC dust in mice; and clinical examinations, community surveys, and prospective epidemiologic st...

  5. FEMA’s Disaster Declaration Process: A Primer

    Science.gov (United States)

    2010-03-18

    Loma Prieta earthquake, Hurricane Andrew, the Midwest floods of 1993, and the Northridge earthquake. However, these were not the only events deemed...Katrina, the Loma Prieta and Northridge earthquakes, the Mount St. Helens volcanic eruption, and the September 11 terrorist attacks. In these instances...be based on a finding that the disaster is of such severity and magnitude that effective response is beyond the capabilities of the state and the

  6. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  7. Stealth Disasters and Geoethics

    Science.gov (United States)

    Kieffer, Susan W.

    2013-04-01

    Natural processes of the earth unleash energy in ways that are sometimes harmful or, at best, inconvenient, for humans: earthquakes, volcanic eruptions, hurricanes, landslides, floods. Ignoring the biological component of the geosphere, we have historically called such events "natural disasters." They are typically characterized by a sudden onset and relatively immediate consequences. There are many historical examples and our human societies have evolved various ways of coping with them logistically, economically, and psychologically. Preparation, co-existence, recovery, and remediation are possible, at least to some extent, even in the largest of events. Geoethical questions exist in each stage, but the limited local extent of these disasters allows the possibility of discussion and resolution. There are other disasters that involve the natural systems that support us. Rather than being driven primarily by natural non-biological processes, these are driven by human behavior. Examples are climate change, desertification, acidification of the oceans, and compaction and erosion of fertile soils. They typically have more gradual onsets than natural disasters and, because of this, I refer to these as "stealth disasters." Although they are unfolding unnoticed or ignored by many, they are having near-term consequences. At a global scale they are new to human experience. Our efforts at preparation, co-existence, recovery, and remediation lag far behind those that we have in place for natural disasters. Furthermore, these four stages in stealth disaster situations involve many ethical questions that typically must be solved in the context of much larger cultural and social differences than encountered in natural disaster settings. Four core ethical principles may provide guidelines—autonomy, non-maleficence, beneficence, and justice (e.g., Jamais Cascio). Geoscientists can contribute to the solutions in many ways. We can work to ensure that as people take responsibility

  8. Disaster Metrics: A Comprehensive Framework for Disaster Evaluation Typologies.

    Science.gov (United States)

    Wong, Diana F; Spencer, Caroline; Boyd, Lee; Burkle, Frederick Skip; Archer, Frank

    2017-05-08

    Introduction The frequency of disasters is increasing around the world with more people being at risk. There is a moral imperative to improve the way in which disaster evaluations are undertaken and reported with the aim of reducing preventable mortality and morbidity in future events. Disasters are complex events and undertaking disaster evaluations is a specialized area of study at an international level. Hypothesis/Problem While some frameworks have been developed to support consistent disaster research and evaluation, they lack validation, consistent terminology, and standards for reporting across the different phases of a disaster. There is yet to be an agreed, comprehensive framework to structure disaster evaluation typologies. The aim of this paper is to outline an evolving comprehensive framework for disaster evaluation typologies. It is anticipated that this new framework will facilitate an agreement on identifying, structuring, and relating the various evaluations found in the disaster setting with a view to better understand the process, outcomes, and impacts of the effectiveness and efficiency of interventions. Research was undertaken in two phases: (1) a scoping literature review (peer-reviewed and "grey literature") was undertaken to identify current evaluation frameworks and typologies used in the disaster setting; and (2) a structure was developed that included the range of typologies identified in Phase One and suggests possible relationships in the disaster setting. No core, unifying framework to structure disaster evaluation and research was identified in the literature. The authors propose a "Comprehensive Framework for Disaster Evaluation Typologies" that identifies, structures, and suggests relationships for the various typologies detected. The proposed Comprehensive Framework for Disaster Evaluation Typologies outlines the different typologies of disaster evaluations that were identified in this study and brings them together into a single

  9. Toward to Disaster Mitigation Science

    Science.gov (United States)

    Kaneda, Yoshiyuki; Shiraki, Wataru; Tokozakura, Eiji

    2016-04-01

    Destructive natural disasters such as earthquakes and tsunamis have occurred frequently in the world. For the reduction and mitigation of damages by destructive natural disasters, early detection of natural disasters and speedy and proper evacuations are indispensable. And hardware and software preparations for reduction and mitigation of natural disasters are quite important and significant. Finally, methods on restorations and revivals are necessary after natural disasters. We would like to propose natural disaster mitigation science for early detections, evacuations and restorations against destructive natural disasters. In natural disaster mitigation science, there are lots of research fields such as natural science, engineering, medical treatment, social science and literature/art etc. Especially, natural science, engineering and medical treatment are fundamental research fields for natural disaster mitigation, but social sciences such as sociology, psychology etc. are very important research fields for restorations after natural disasters. We have to progress the natural disaster mitigation science against destructive natural disaster mitigation. in the near future. We will present the details of natural disaster mitigation science.

  10. Resolving pathways of interaction of mipafox and a sarin analog with human acetylcholinesterase by kinetics, mass spectrometry and molecular modeling approaches.

    Science.gov (United States)

    Mangas, I; Taylor, P; Vilanova, E; Estévez, J; França, T C C; Komives, E; Radić, Z

    2016-03-01

    The hydroxyl oxygen of the catalytic triad serine in the active center of serine hydrolase acetylcholinesterase (AChE) attacks organophosphorus compounds (OPs) at the phosphorus atom to displace the primary leaving group and to form a covalent bond. Inhibited AChE can be reactivated by cleavage of the Ser-phosphorus bond either spontaneously or through a reaction with nucleophilic agents, such as oximes. At the same time, the inhibited AChE adduct can lose part of the molecule by progressive dealkylation over time in a process called aging. Reactivation of the aged enzyme has not yet been demonstrated. Here, our goal was to study oxime reactivation and aging reactions of human AChE inhibited by mipafox or a sarin analog (Flu-MPs, fluorescent methylphosphonate). Progressive reactivation was observed after Flu-MPs inhibition using oxime 2-PAM. However, no reactivation was observed after mipafox inhibition with 2-PAM or the more potent oximes used. A peptide fingerprinted mass spectrometry (MS) method, which clearly distinguished the peptide with the active serine (active center peptide, ACP) of the human AChE adducted with OPs, was developed by MALDI-TOF and MALDI-TOF/TOF. The ACP was detected with a diethyl-phosphorylated adduct after paraoxon inhibition, and with an isopropylmethyl-phosphonylated and a methyl-phosphonylated adduct after Flu-MPs inhibition and subsequent aging. Nevertheless, nonaged nonreactivated complexes were seen after mipafox inhibition and incubation with oximes, where MS data showed an ACP with an NN diisopropyl phosphoryl adduct. The kinetic experiments showed no reactivation of activity. The computational molecular model analysis of the mipafox-inhibited hAChE plots of energy versus distance between the atoms separated by dealkylation showed a high energy demand, thus little aging probability. However, with Flu-MPs and DFP, where aging was observed in our MS data and in previously published crystal structures, the energy demand calculated

  11. Resolving pathways of interaction of mipafox and a sarin-analog with human acetylcholinesterase by kinetics, mass spectrometry and molecular modeling approaches

    Science.gov (United States)

    Mangas, I; Taylor, P; Vilanova, E; Estévez, J; Franca, T; Radić, Z

    2016-01-01

    The hydroxyl oxygen of the catalytic triad serine in the active center of serine hydrolase acetylcholinesterase (AChE) attacks organophosphorus compounds (OPs) at the phosphorus atom to displace the primary leaving group and to form a covalent bond. Inhibited AChE can be reactivated by cleavage of the Ser-phosphorus bond either spontaneously or through a reaction with nucleophilic agents, such as oximes. At the same time, the inhibited AChE adduct can lose part of the molecule by progressive dealkylation over time in a process called aging. Reactivation of the aged enzyme has not yet been demonstrated. Here our goal was to study oxime reactivation and aging reactions of human AChE inhibited by mipafox or a sarin analog (Flu-MPs, fluorescent methylphosphonate). Progressive reactivation was observed after Flu-MPs inhibition using oxime 2-PAM. However, no reactivation was observed after mipafox inhibition with 2-PAM or the more potent oximes used. A peptide mass fingerprinted mass spectrometry (MS) method, which clearly distinguished the peptide with the active serine (active center peptide, ACP) of the human AChE adducted with OPs, was developed by MALDI-TOF and MALDI-TOF-TOF. The ACP was detected with a diethyl phosphorylated adduct after paraoxon inhibition, and with an isopropylmethyl phosphonylated and a methyl phosphonylated adduct after Flu-MPs inhibition and subsequent aging. Nevertheless, nonaged nonreactivated complexes were seen after mipafox inhibition and incubation with oximes, where MS data showed an ACP with an NN diidopropyl phosphoryl adduct. The kinetic experiments showed no reactivation of activity. The computational molecular model analysis of the mipafox-inhibited hAChE plots of energy versus distance between the atoms separated by dealkylation showed a high energy demand, thus little aging probability. However with Flu-MPs and DFP, where aging was observed in our MS data and in previously published crystal structures, the energy demand

  12. Disaster: would your community bounce back?

    Energy Technology Data Exchange (ETDEWEB)

    Sims, Benjamin H [Los Alamos National Laboratory

    2011-01-12

    What makes some communities or organizations able to quickly bounce back from a disaster, while others take a long time to recover? This question has become very important for emergency planners in federal, state, and local government - particularly since the 9/11 attacks and Hurricane Katrina, which nearly destroyed New Orleans five years ago. These events have made people aware that we can't always prevent disasters, but might be able to improve the ability of communities and regions to respond to and bounce back from major disruptions. Social scientists have found that most communities are, in fact, quite resilient to most disasters. People tend to work together, overcome divisions, identify problems, and develop improvised solutions. This often leads to a greater sense of community and a sense of personal accomplishment. Long-term recovery can be harder, but rebuilding can create jobs and stimulate economies. Communities may even end up better than they were before. But there are some disturbing exceptions to this trend, including Hurricane Katrina. The hurricane killed many people, the federal and local emergency response was not effective, people who could not evacuate were housed in the Superdome and Convention Center in terrible conditions, crime was prevalent, and local government did not appear to have control over the situation. A significant portion of the population was eventually evacuated to other cities. Even five years later, many people have not returned, and large parts of the city have not been rebuilt. Clearly, New Orleans lacked sufficient resilience to overcome a disaster of the magnitude of Katrina. There are four factors that social scientists are beginning to agree are important for community resilience: (1) A strong, diverse economy - Stable jobs, good incomes, diversity of industries, personal savings; (2) Robust social networks - Community members know each other, help each other, and have connections outside the community; (3

  13. When women attack.

    Science.gov (United States)

    McLaughlin, Bryan; Davis, Catasha; Coppini, David; Kim, Young Mie; Knisely, Sandra; McLeod, Douglas

    2015-01-01

    The common assumption that female candidates on the campaign trail should not go on the attack, because such tactics contradict gender stereotypes, has not received consistent support. We argue that in some circumstances gender stereotypes will favor female politicians going negative. To test this proposition, this study examines how gender cues affect voter reactions to negative ads in the context of a political sex scandal, a context that should prime gender stereotypes that favor females. Using an online experiment involving a national sample of U.S. adults (N = 599), we manipulate the gender and partisan affiliation of a politician who attacks a male opponent caught in a sex scandal involving sexually suggestive texting to a female intern. Results show that in the context of a sex scandal, a female candidate going on the attack is evaluated more positively than a male. Moreover, while female participants viewed the female sponsor more favorably, sponsor gender had no effect on male participants. Partisanship also influenced candidate evaluations: the Democratic female candidate was evaluated more favorably than her Republican female counterpart.

  14. Comparison of the efficacy of HI6 and 2-PAM against soman, tabun, sarin, and VX in the rabbit

    Energy Technology Data Exchange (ETDEWEB)

    Koplovitz, I.; Stewart, J.R.

    1994-12-31

    This study compared the efficacy of H16 and 2-PAM against nerve agent (soman tabun sarin and VX) -induced lethality in the atropinesterase-free rabbits pretreated with vehicle (controls) or pyridostigmine. Treatment was administered at signs or 2 min after agent challenge and consisted ofoxime (l00umol/lkg) + atropine 13 mg(kg) (alone or together with diazepam). Twenty-four-h LD50 values were calculated for soman- and tabun-intoxicated animals, whereas 24-h survival was noted in animals given 10 LD50s of sarin or VX. In pyridostigmine and control rabbits intoxicated with soman and treated with oxime + atropine (alone or together with diazepam), HI6 was 35 times more effective than 2-PAM. In contrast 1116 was less effective than 2-PAM against tabun poisoning. In pyridostigmine-pretreated animals exposed to tabun, efficacy was increased more than 3-fold when compare to tabun-challenged animals treated with atropine + H16 alone. Both oximes were highly effective against satin and VX. These findings suggest that Hifi could replace 2-PAM as therapy for nerve agent poisoning because it is superior to 2-PAM against soman, and when used in pyridostigmine-pretreated animals it affords excellent protection against all four nerve agents when used in combination with atropine (alone or together with diazepam) therapy.

  15. Exploring the physicochemical properties of oxime-reactivation therapeutics for cyclosarin, sarin, tabun, and VX inactivated acetylcholinesterase.

    Science.gov (United States)

    Esposito, Emilio Xavier; Stouch, Terry R; Wymore, Troy; Madura, Jeffry D

    2014-01-21

    The inactivation of acetylcholinesterase (AChE) by organophosphorus agent (OP) compounds is a serious problem regardless of how the individual was exposed. The reactivation of OP-inactivated AChE is dependent on the OP conjugate, and commonly a specific oxime is better at reactivating a specific OP conjugate than several diverse OP conjugates. The presented research explores the physicochemical properties needed for the reactivation of OP-inactivated AChE. Four different OPs, cyclosarin, sarin, tabun, and VX, were analyzed using the same set of oxime reactivators. A trial descriptor pool of semiempirical, traditional, and molecular interaction field descriptors was used to construct an ensemble of QSAR models for each OP-conjugate pair. Based on the molecular information and the cross-validation ability, individual QSAR models were selected to be part of an OP-conjugate consensus model. The OP-conjugate specific models provide important insight into the physicochemical properties required to reactivate the OP conjugates of interest. The reactivation of AChE inactivated with either cyclosarin or tabun requires the oxime therapeutic to possess an overall polar-positive surface area. Oxime therapeutics for the reactivation of sarin-inactivated AChE are conformationally dependent while oxime reverse therapeutics for VX require a compact region with a highly hydrophilic region and two positively charged pyridine rings.

  16. FEMA Historical Disaster Declarations - shp

    Data.gov (United States)

    Department of Homeland Security — The Historical Disaster Declarations provides geospatial view to the Robert T. Stafford Disaster Relief and Emergency Assistance Act (referred to as the Stafford Act...

  17. Study Links Disasters to Dementia

    Science.gov (United States)

    ... news/fullstory_161672.html Study Links Disasters to Dementia Losing home was tied to greater mental decline ... Earthquakes, floods and other natural disasters may raise dementia risk for seniors forced to leave their homes, ...

  18. Attack Trees with Sequential Conjunction

    NARCIS (Netherlands)

    Jhawar, Ravi; Kordy, Barbara; Mauw, Sjouke; Radomirović, Sasa; Trujillo-Rasua, Rolando

    2015-01-01

    We provide the first formal foundation of SAND attack trees which are a popular extension of the well-known attack trees. The SAND at- tack tree formalism increases the expressivity of attack trees by intro- ducing the sequential conjunctive operator SAND. This operator enables the modeling of

  19. Replacement Attack: A New Zero Text Watermarking Attack

    Science.gov (United States)

    Bashardoost, Morteza; Mohd Rahim, Mohd Shafry; Saba, Tanzila; Rehman, Amjad

    2017-03-01

    The main objective of zero watermarking methods that are suggested for the authentication of textual properties is to increase the fragility of produced watermarks against tampering attacks. On the other hand, zero watermarking attacks intend to alter the contents of document without changing the watermark. In this paper, the Replacement attack is proposed, which focuses on maintaining the location of the words in the document. The proposed text watermarking attack is specifically effective on watermarking approaches that exploit words' transition in the document. The evaluation outcomes prove that tested word-based method are unable to detect the existence of replacement attack in the document. Moreover, the comparison results show that the size of Replacement attack is estimated less accurate than other common types of zero text watermarking attacks.

  20. Translocal disaster interventions:

    DEFF Research Database (Denmark)

    Dalgas, Karina Märcher

    2017-01-01

    to provide equal as well as equitable relief. Drawing attention to the practice of excluding the migrants households of origin from the receipt of targeted relief, the article suggests that disaster management should re-consider the assumption that such households are automatically (the sole) recipients......The disaster-prone Philippine archipelago is a major point of origin of migrants worldwide. Based on ethnographic fieldwork in the Philippines and Denmark, this article investigates citizens’ responses to the Bohol earthquake of 2013. I examine how individual migrants channel relief...... to their neighborhoods of origin through their networks of social relations abroad and within the areas of impact, and how these individual relief channels both complement and conflict with official disaster responses. Focusing on inter-household resource flows, I argue that individual relief channels form part of local...

  1. Disaster Management through Wireless Sensor Networks (WSN for hazardous and scarce areas for easy and timely deployment of the network

    Directory of Open Access Journals (Sweden)

    Pallavi Sharma

    2013-12-01

    Full Text Available We are living in the world where almost everything is dependent on right information. Nowadays many kinds of disasters are happening around the world like: earthquake, hurricane, terrorist attacks, explosions or biological warfare etc. are few of them. Therefore steps are required to be taken to prevent from these kinds of threats and for the rescue measures or disaster management operations quick and correct information is required. Wireless communication plays an important role in helping these kinds of situations. Among all Wireless Communication, Wireless Sensor Network (WSN is able to cause immediate alert for disaster management operations to begin. In this paper we will focus on the disaster detection and disaster managing operations through WSN. First we need to understand the basic architecture of WSN and then how it can be helpful for disaster management. We will see the world’s scenario and incidents for examples.

  2. Comparative efficacy of diazepam and avizafone against sarin-induced neuropathology and respiratory failure in guinea pigs: influence of atropine dose.

    Science.gov (United States)

    Taysse, L; Calvet, J-H; Buée, J; Christin, D; Delamanche, S; Breton, P

    2003-06-30

    This investigation compared the efficacy of diazepam and the water-soluble prodiazepam-avizafone-in sarin poisoning therapy. Guinea pigs, pretreated with pyridostigmine 0.1 mg/kg, were intoxicated with 4LD(50) of sarin (s.c. route) and 1 min after intoxication treated by intramuscular injection of atropine (3 or 33.8 mg/kg), pralidoxime (32 mg/kg) and either diazepam (2 mg/kg) or avizafone (3.5 mg/kg). EEG and pneumo-physiological parameters were simultaneously recorded. When atropine was administered at a dose of 3 mg/kg, seizures were observed in 87.5% of the cases; if an anticonvulsant was added (diazepam (2 mg/kg) or avizafone (3.5 mg/kg)), seizure was prevented but respiratory disorders were observed. At 33.8 mg/kg, atropine markedly increased the seizure threshold and prevented early respiratory distress induced by sarin. When diazepam was administered together with atropine, seizures were not observed but 62.5% of the animals displayed respiratory difficulties. These symptoms were not observed when using avizafone. The pharmacokinetic data showed marked variation of the plasma levels of atropine and diazepam in different antidote combination groups, where groups receiving diazepam exhibited the lowest concentration of atropine in plasma. Taken together, the results indicate that avizafone is suitable in therapy against sarin when an anticonvulsant is judged necessary.

  3. Research on the Robustness of Interdependent Networks under Localized Attack

    Directory of Open Access Journals (Sweden)

    Junde Wang

    2017-06-01

    Full Text Available Critical infrastructures (CI are the cornerstone of modern society, and they are connected with each other through material, energy, or information. The robustness of interdependent CI systems under attack has been a hot topic in recent years, but previous studies mainly focused on malicious attacks or random failure. To analyze the impact of some natural disasters whose destructive force is mainly related to distance with respect to interdependent CI systems, we present a new localized attack mode considering destructive force decays with distance, and carry out simulations on several interdependent networks constructed by artificial and real world networks. Furthermore, this article analyzes the influence of coupling strength and coupling pattern on the robustness of interdependent system. The results show that dependency links between networks decrease the robustness of interdependence networks, but the robustness under failure probability degradation is not vulnerable like that under malicious attack or random failure. In addition, the coupling preference has little effect on the robustness of interdependent networks under the new localized attack strategy; when the average degree of subnetworks is large, the same conclusion can be obtained for the coupling strength.

  4. Learning from history: The Glasgow Airport terrorist attack.

    Science.gov (United States)

    Crichton, Gillies

    Glasgow Airport was the target of a terrorist attack on 30th June, 2007. Many people within Scotland had come to believe that Scotland was immune from terrorism. This perception was in large part informed by Scotland's experience during the protracted Troubles in Northern Ireland, during which the Provisional Irish Republican Army's mainland bombing campaign focused on targets in England, sparing both Scotland and Wales. While Glasgow Airport did not expect such an attack to take place, meticulous planning, organising and testing of plans had taken place to mitigate the unlikely event of such an attack. The attack stands up as a shining example of robust business continuity management, where the airport reopened for business as usual in less than 24 hours from the time of the attack. Little is known about how the airport handled the situation in conjunction with other responding agencies as people tend to want to focus on high-profile disasters only. Yet countless such incidents are happening worldwide on a daily basis, in which there are excellent learning opportunities, and, taken in the spirit of converting hindsight into foresight, the likelihood of similar incidents could potentially be reduced in the future.

  5. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    Directory of Open Access Journals (Sweden)

    Yi-Hsun Wang

    2010-09-01

    Full Text Available Web applications suffer from cross-site scripting (XSS attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of generating mutated XSS attacks in a fully automatic way. Mutated XSS attack generation depends on the analysis of attack vectors and the structural learning mechanism. For the kernel of the learning mechanism, we use a Hidden Markov model (HMM as the structure of the attack vector model to capture the implicit manner of the attack vector, and this manner is benefited from the syntax meanings that are labeled by the proposed tokenizing mechanism. Bayes theorem is used to determine the number of hidden states in the model for generalizing the structure model. The paper has the contributions as following: (1 automatically learn the structure of attack vectors from practical data analysis to modeling a structure model of attack vectors, (2 mimic the manners and the elements of attack vectors to extend the ability of testing tool for identifying XSS vulnerabilities, (3 be helpful to verify the flaws of blacklist sanitization procedures of Web applications. We evaluated the proposed mechanism by Burp Intruder with a dataset collected from public XSS archives. The results show that mutated XSS attack generation can identify potential vulnerabilities.

  6. Disaster Education in Australian Schools

    Science.gov (United States)

    Boon, Helen J.; Pagliano, Paul J.

    2014-01-01

    Australia regularly suffers floods, droughts, bushfires and cyclones, which are predicted to increase and/or intensify in the future due to climate change. While school-aged children are among the most vulnerable to natural disasters, they can be empowered through education to prepare for and respond to disasters. School disaster education is…

  7. Natural disasters and human mobility

    NARCIS (Netherlands)

    Mbaye, L.; Zimmermann, K.

    2016-01-01

    This paper reviews the effect of natural disasters on human mobility or migration. Although there is an increase of natural disasters and migration recently and more patterns to observe, the relationship remains complex. While some authors find that disasters increase migration, others show that

  8. Transcriptional responses of the nerve agent-sensitive brain regions amygdala, hippocampus, piriform cortex, septum, and thalamus following exposure to the organophosphonate anticholinesterase sarin

    Directory of Open Access Journals (Sweden)

    Meyerhoff James L

    2011-07-01

    Full Text Available Abstract Background Although the acute toxicity of organophosphorus nerve agents is known to result from acetylcholinesterase inhibition, the molecular mechanisms involved in the development of neuropathology following nerve agent-induced seizure are not well understood. To help determine these pathways, we previously used microarray analysis to identify gene expression changes in the rat piriform cortex, a region of the rat brain sensitive to nerve agent exposure, over a 24-h time period following sarin-induced seizure. We found significant differences in gene expression profiles and identified secondary responses that potentially lead to brain injury and cell death. To advance our understanding of the molecular mechanisms involved in sarin-induced toxicity, we analyzed gene expression changes in four other areas of the rat brain known to be affected by nerve agent-induced seizure (amygdala, hippocampus, septum, and thalamus. Methods We compared the transcriptional response of these four brain regions to sarin-induced seizure with the response previously characterized in the piriform cortex. In this study, rats were challenged with 1.0 × LD50 sarin and subsequently treated with atropine sulfate, 2-pyridine aldoxime methylchloride, and diazepam. The four brain regions were collected at 0.25, 1, 3, 6, and 24 h after seizure onset, and total RNA was processed for microarray analysis. Results Principal component analysis identified brain region and time following seizure onset as major sources of variability within the dataset. Analysis of variance identified genes significantly changed following sarin-induced seizure, and gene ontology analysis identified biological pathways, functions, and networks of genes significantly affected by sarin-induced seizure over the 24-h time course. Many of the molecular functions and pathways identified as being most significant across all of the brain regions were indicative of an inflammatory response. There

  9. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  10. Enhancing disaster management by mapping disaster proneness and preparedness.

    Science.gov (United States)

    Mishra, Vishal; Fuloria, Sanjay; Bisht, Shailendra Singh

    2012-07-01

    The focus of most disaster management programmes is to deploy resources-physical and human-from outside the disaster zone. This activity can produce a delay in disaster mitigation and recovery efforts, and a consequent loss of human lives and economic resources. It may be possible to expedite recovery and prevent loss of life by mapping out disaster proneness and the availability of resources in advance. This study proposes the development of two indices to do so. The Indian census data of 2001 is used to develop a methodology for creating one index on disaster proneness and one on resourcefulness for administrative units (tehsils). Findings reveal that tehsil residents face an elevated risk of disaster and that they are also grossly under-prepared for such events. The proposed indices can be used to map regional service provision facilities and to assist authorities in evaluating immediate, intermediate, and long-term disaster recovery needs and resource requirements.

  11. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    CERN Document Server

    Wang, Yi-Hsun; Lee, Hahn-Ming; 10.4204/EPTCS.35.2

    2010-01-01

    Web applications suffer from cross-site scripting (XSS) attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of generating mutated XSS attacks in a fully automatic way. Mutated XSS attack generation depends on the analysis of attack vectors and the structural learning mechanism. For the kernel of the learning mechanism, we use a Hidden Markov model (HMM) as the structure of the attack vector model to capture the implicit manner of the attack vector, and this manner is benefited from the syntax meanings that are labeled by the proposed tokenizing mechanism. Bayes theorem is used to determine the number of hidden states in the model...

  12. Attacks on computer systems

    Directory of Open Access Journals (Sweden)

    Dejan V. Vuletić

    2012-01-01

    Full Text Available Computer systems are a critical component of the human society in the 21st century. Economic sector, defense, security, energy, telecommunications, industrial production, finance and other vital infrastructure depend on computer systems that operate at local, national or global scales. A particular problem is that, due to the rapid development of ICT and the unstoppable growth of its application in all spheres of the human society, their vulnerability and exposure to very serious potential dangers increase. This paper analyzes some typical attacks on computer systems.

  13. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    The need to assess security and take protection decisions is at least as old as our civilisation. However, the complexity and development speed of our interconnected technical systems have surpassed our capacity to imagine and evaluate risk scenarios. This holds in particular for risks...... that are caused by the strategic behaviour of adversaries. Therefore, technology-supported methods are needed to help us identify and manage these risks. In this paper, we describe the attack navigator: a graph-based approach to security risk assessment inspired by navigation systems. Based on maps of a socio...

  14. The Ontology of Disaster.

    Science.gov (United States)

    Thompson, Neil

    1995-01-01

    Explores some key existential or ontological concepts to show their applicability to the complex area of disaster impact as it relates to health and social welfare practice. Draws on existentialist philosophy, particularly that of John Paul Sartre, and introduces some key ontological concepts to show how they specifically apply to the experience…

  15. Food for Disasters

    Centers for Disease Control (CDC) Podcasts

    2012-07-23

    When disaster strikes, you might not have access to food or water. This podcast discusses types of emergency food supplies you should keep on hand in your emergency kit.  Created: 7/23/2012 by Office of Public Health Preparedness and Response (PHPR).   Date Released: 7/23/2012.

  16. Disaster Risk Profile

    OpenAIRE

    World Bank

    2017-01-01

    Afghanistan’s rugged mountain landscape and generally arid climate make it prone to several natural hazards. Climate change also poses threat to Afghanistan’s natural resources, of which the majority of Afghans depend for their livelihood. The country’s low level of socio-economic development makes it extremely vulnerable to disasters, resulting in frequent loss of lives, livelihoods, and ...

  17. Resilience in disaster research

    DEFF Research Database (Denmark)

    Dahlberg, Rasmus; Johannessen-Henry, Christine Tind; Raju, Emmanuel;

    2015-01-01

    This paper explores the concept of resilience in disaster management settings in modern society. The diversity and relatedness of ‘resilience’ as a concept and as a process are reflected in its presentation through three ‘versions’: (i) pastoral care and the role of the church for victims of disa...

  18. Mold After a Disaster

    Science.gov (United States)

    ... Part 3 of 3) Hot Weather Tips Heat Stress in Older Adults FAQs Extreme Heat PSAs Related Links MMWR Bibliography CDC's Program Floods Flood Readiness Personal Hygiene After a Disaster Cleanup of Flood Water After a Flood Worker Safety Educational Materials Floods ...

  19. The Ontology of Disaster.

    Science.gov (United States)

    Thompson, Neil

    1995-01-01

    Explores some key existential or ontological concepts to show their applicability to the complex area of disaster impact as it relates to health and social welfare practice. Draws on existentialist philosophy, particularly that of John Paul Sartre, and introduces some key ontological concepts to show how they specifically apply to the experience…

  20. When Facing Natural Disasters

    Institute of Scientific and Technical Information of China (English)

    Liu Xinwen

    2008-01-01

    @@ China last experienced a strong earthquake in 1976 in Tang Shan, Hehei Province. At the beginning of this year, severe snow storms struck more than half of China. What impact have these natural disasters left on China, especially the latest earthquake in Sichuan? Let's do a comparison.

  1. Disaster Changes Us

    Institute of Scientific and Technical Information of China (English)

    2003-01-01

    On scientists confirming that sex is a channel for HIV AIDS infection, the sexual emancipation that had flourished in America and Europe since the middle of the last century subsided. More stress has since been placed on family issues. A disaster can thus change moral standards and senses of value, as well as behavior.

  2. Recent "phishing" attacks

    CERN Multimedia

    IT Department

    2009-01-01

    Over the last few weeks there has been a marked increase in the number of attacks on CERN made by cybercriminals. Typical attacks arrive in the form of e-mail messages purporting to come from the CERN Help Desk, Mail Service, or some similarly official-sounding entity and suggest that there is a problem with your account, such as it being over-quota. They then ask you to click on a link or to reply and give your password. Please don’t! Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. NEVER provide your password or other details if these are requested. These messages try to trick you into clicking on Web links which will help them to install malicious software on your computer, and anti-virus software cannot be relied on to detect all cases. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN Comput...

  3. Importance Must Be Attached to Seismic Disaster Reduction in the Surge of Urbanization

    Institute of Scientific and Technical Information of China (English)

    WANG Wenqing

    2001-01-01

    @@ A cluster of seismic disasters attacked many areas of the world in 1999, such as the 7.4 Ms earthquake in Turkey on 17 August and the 7. 6 Ms earthquake in Chinese Taiwan on 21 September, causing great casualty and enormous property loss. How to raise the aseismatic capacity of cities has since become a hot topic of public concern worldwide.

  4. Social and psychological resources and health outcomes after the World Trade Center disaster.

    Science.gov (United States)

    Adams, Richard E; Boscarino, Joseph A; Galea, Sandro

    2006-01-01

    Previous studies on community disasters tend to assess non-representative samples and use nonstandard measures of well-being. Additionally, few of these studies are longitudinal in design. In this report, we examine the consequences of the World Trade Center Disaster (WTCD) within a stress model perspective to assess level of exposure to the disaster and well-being after this event, as measured by the SF12 mental health and physical health scales. Data come from a two-wave panel study of 1681 English or Spanish speaking adults living in New York City on the day of the terrorist attacks and were collected by telephone interviews 1 and 2 years after the disaster. In ordinary least-squares regression models that contained demographic characteristics, stress risk factors, and social psychological resources as independent variables, level of exposure to the disaster was associated with poorer Wave 2 physical well-being, but not psychological health. Level of disaster exposure was not related to Wave 2 physical health, however, once the Wave 1 level of physical health was controlled, suggesting that disaster exposure did not have a lasting impact on variation in physical well-being. Results also indicated that experiencing a panic attack, negative life events, or traumatic events were related to poorer physical health. Respondents who met screening criteria for possible alcohol dependence post-disaster, experienced negative life events, or experienced traumatic events, were more likely to suffer from poorer mental health compared to those who did not meet the criteria, experience negative life events or experience traumas. We discuss these findings relative to community disasters in industrialized and developing countries.

  5. Assessment of Global Weather Disasters in 2000

    Institute of Scientific and Technical Information of China (English)

    LIU Chuanfeng

    2001-01-01

    The global climate in 2000 kept warmer than that in the average year. The strong La Nina weakened abruptly after reaching its second peak value over the central and eastern Pacific region along the equator in January. The event had significant impacts upon the world climate, especially that in the tropical regions. Many areas of the Northern Hemisphere suffered severe cold weather in winter and heat wave in summer. The globe was afflicted with severe high temperature, drought and forest fire, whereas many areas in southern Asia, Western Europe, southern Africa, and northern South America were frequently attacked by storm rainfall. It is estimated that the global economic loss caused by weather disasters in 2000 was over $100 billion with hundreds of millions of people affected.

  6. Improving Disaster Governance : Proposals for a Multi-Level Human Rights Disaster Governance Matrix

    NARCIS (Netherlands)

    Lane, Charlotte; Hesselman, Marlies

    2016-01-01

    'Good’ (natural) disaster governance faces multiple challenges given the broad range of resources, skills, expertise and international cooperation that adequate disaster response commands. Disaster governance needs coordinated action across space and time, at different levels and in the full disaste

  7. The performance and potentials of the CryoSat-2 SAR and SARIn modes for lake level estimation

    DEFF Research Database (Denmark)

    Nielsen, Karina; Stenseng, Lars; Andersen, Ole Baltazar

    2017-01-01

    Over the last few decades, satellite altimetry has proven to be valuable for monitoring lake levels. With the new generation of altimetry missions, CryoSat-2 and Sentinel-3, which operate in Synthetic Aperture Radar (SAR) and SAR Interferometric (SARIn) modes, the footprint size is reduced...... to approximately 300 m in the along-track direction. Here, the performance of these new modes is investigated in terms of uncertainty of the estimated water level from CryoSat-2 data and the agreement with in situ data. The data quality is compared to conventional low resolution mode (LRM) altimetry products from...... of that of the Envisat results. Generally, the CryoSat-2 lake levels also show a better agreement with the in situ data. The lower uncertainty of the CryoSat-2 results entails a more detailed description of water level variations....

  8. Tracing Technique for Blaster Attack

    CERN Document Server

    S., Siti Rahayu; S., Shahrin; A., Faizal M; M, Mohd Zaki; R, Irda

    2009-01-01

    Blaster worm of 2003 is still persistent, the infection appears to have successfully transitioned to new hosts as the original systems are cleaned or shut off, suggesting that the Blaster worm, and other similar worms, will remain significant Internet threats for many years after their initial release. This paper is to propose technique on tracing the Blaster attack from various logs in different OSI layers based on fingerprint of Blaster attack on victim logs, attacker logs and IDS alert log. The researchers intended to do a preliminary investigation upon this particular attack so that it can be used for further research in alert correlation and computer forensic investigation.

  9. The Timing of Terrorist Attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2016-01-01

    I use a simple optimal stopping model to derive policy relevant insights on the timing of one-shot attacks by small autonomous terrorist units or “lone wolf” individuals. A main insight is that an increase in proactive counterterrorism measures can lead to a short term increase in the number...... of attempted terrorist attacks because it makes it more risky for existing terrorist units to pursue further development of capabilities. This is consistent with the events in London in 2005 where a terrorist attack on 7 July was followed by a similar but unsuccessful attack two weeks later....

  10. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  11. Seven Deadliest Web Application Attacks

    CERN Document Server

    Shema, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting web applications? Then you need Seven Deadliest Web Application Attacks. This book pinpoints the most dangerous hacks and exploits specific to web applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. .. .. Attacks detailed in this book include: ..: ..; Cross-Site Scripting (XSS) ..; Cross-Site Request Fo

  12. Efficacy of novel phenoxyalkyl pyridinium oximes as brain-penetrating reactivators of cholinesterase inhibited by surrogates of sarin and VX.

    Science.gov (United States)

    Chambers, Janice E; Chambers, Howard W; Funck, Kristen E; Meek, Edward C; Pringle, Ronald B; Ross, Matthew K

    2016-11-25

    Pyridinium oximes are strong nucleophiles and many are effective reactivators of organophosphate-inhibited cholinesterase (ChE). However, the current oxime reactivators are ineffective at crossing the blood-brain barrier and reactivating brain ChE in the intact organism. Our laboratories have developed a series of substituted phenoxyalkyl pyridinium oximes (US patent 9,227,937 B2) with the goal of identifying reactivators effective in crossing the blood-brain barrier. The first 35 of the series were found to have similar in vitro efficacy as reactivators of ChE inhibited by a sarin surrogate (phthalimidyl isopropyl methylphosphonate, PIMP) or a VX surrogate (nitrophenyl ethyl methylphosphonate, NEMP) in bovine brain preparations as previously observed in rat brain preparations. A number of these novel oximes have shown the ability to decrease the level of ChE inhibition in the brains of rats treated with a high sublethal dosage of either a sarin surrogate (nitrophenyl isopropyl methylphosphonate, NIMP) or the VX surrogate NEMP. Levels of reactivation at 2 h after oxime administration were up to 35% while the currently approved therapeutic, 2-PAM, yielded no reduction in brain ChE inhibition. In addition, there was evidence of attenuation of seizure-like behavior with several of the more effective novel oximes, but not 2-PAM. Therefore these novel oximes have demonstrated an ability to reactivate inhibited ChE in brain preparations from two species and in vivo data support their ability to enter the brain and provide a therapeutic action. These novel oximes have the potential to be developed into improved antidotes for nerve agent therapy.

  13. 7 CFR 760.1001 - Eligible counties, disaster events, and disaster periods.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Eligible counties, disaster events, and disaster..., disaster events, and disaster periods. (a) Except as provided in this subpart, FSA will provide assistance... eligible disaster events in eligible disaster counties provided in paragraph (c) of this section. (b)...

  14. Disaster Response in India

    Science.gov (United States)

    2000-08-01

    and preventative measures. The cumulative effects of deforestation, erosion, water-logging, salinity and nutrient depletion all over the country have...and the Sahel (Mali, Niger); and 1982-86 drought in the Sahel (Sudan, Ethiopia). during disasters) in terms of migration and loss of employment but...attribute drought in the country to the following major causes: • El Niño effect, the periodic appearance of warm and saline oce- anic currents in the

  15. The World Trade Center Attack: Helping the helpers: the role of critical incident stress management

    Science.gov (United States)

    Hammond, Jeffrey; Brooks, Jill

    2001-01-01

    Healthcare and prehospital workers involved in disaster response are susceptible to a variety of stress-related psychological and physical sequelae. Critical incident stress management, of which critical incident stress debriefing is a component, can mitigate the response to these stressors. Critical incident stress debriefing is a peer-driven, therapist-guided, structured, group intervention designed to accelerate the recovery of personnel. The attack on the World Trade Center, and the impact it may have on rescue, prehospital, and healthcare workers, should urge us to incorporate critical incident stress management into disaster management plans. PMID:11737916

  16. The World Trade Center attack. Helping the helpers: the role of critical incident stress management.

    Science.gov (United States)

    Hammond, J; Brooks, J

    2001-12-01

    Healthcare and prehospital workers involved in disaster response are susceptible to a variety of stress-related psychological and physical sequelae. Critical incident stress management, of which critical incident stress debriefing is a component, can mitigate the response to these stressors. Critical incident stress debriefing is a peer-driven, therapist-guided, structured, group intervention designed to accelerate the recovery of personnel. The attack on the World Trade Center, and the impact it may have on rescue, prehospital, and healthcare workers, should urge us to incorporate critical incident stress management into disaster management plans.

  17. Transfusion service disaster planning.

    Science.gov (United States)

    Bundy, K L; Foss, M L; Stubbs, J R

    2008-01-01

    The Mayo Clinic, in Rochester, Minnesota, recently set forth a directive to develop a Mayo Emergency Incident Command System (MEICS) plan to respond to major disasters. The MEICS plan that was developed interfaces with national response plans to ensure effective communication and coordination between our institution and local, state, and federal agencies to establish a common language and communication structure. The MEICS plan addresses multiple aspects of dealing with resource needs during a crisis, including the need for blood and transfusion medicine services. The MEICS plan was developed to supplement our current local emergency preparedness procedures and provide a mechanism for responding to the escalating severity of an emergency to deal with situations of a magnitude that is outside the normal experience. A plan was developed to interface the existing Transfusion Medicine disaster plan standard operating procedures (SOP) with the institutional and Department of Laboratory Medicine (DLMP) MEICS plans. The first step in developing this interface was defining MEICS. Other major steps were defining the chain of command, developing a method for visually indicating who is "in charge," planning communication, defining the actions to be taken, assessing resource needs, developing flowcharts and updating SOPs, and developing a blood rationing team to deal with anticipated blood shortages. Several key features of the interface and updated disaster plan that were developed are calling trees for response personnel, plans for relocating leadership to alternative command centers, and action sheets to assist with resource assessment. The action sheets also provide documentation of key actions by response personnel.

  18. Robust Disaster Recovery System Model

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    Highly security-critical system should possess features of continuous service. We present a new Robust Disaster Recovery System Model (RDRSM). Through strengthening the ability of safe communications, RDRSM guarantees the secure and reliable command on disaster recovery. Its self-supervision capability can monitor the integrality and security of disaster recovery system itself. By 2D and 3D real-time visible platform provided by GIS, GPS and RS, the model makes the using, management and maintenance of disaster recovery system easier. RDRSM possesses predominant features of security, robustness and controllability. And it can be applied to highly security-critical environments such as E-government and bank. Conducted by RDRSM, an important E-government disaster recovery system has been constructed successfully. The feasibility of this model is verified by practice. We especially emphasize the significance of some components of the model, such as risk assessment, disaster recovery planning, system supervision and robust communication support.

  19. FEMA Disaster Declaration Summary -shp

    Data.gov (United States)

    Department of Homeland Security — This dataset lists all official FEMA Disaster Declarations. This is raw, unedited data from FEMA's National Emergency Management Information System (NEMIS) and as...

  20. FEMA Disaster Declaration Summary - API

    Data.gov (United States)

    Department of Homeland Security — This dataset lists all official FEMA Disaster Declarations. This is raw, unedited data from FEMA's National Emergency Management Information System (NEMIS) and as...

  1. Invisible Trojan-horse attack.

    Science.gov (United States)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin; Makarov, Vadim

    2017-08-21

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Ac´ın-Ribordy-Gisin (SARG04) QKD protocol at 1924 nm versus that at 1536 nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N. Jain et al., New J. Phys. 16, 123030 (2014). However at 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.

  2. Media participation and mental health in terrorist attack survivors.

    Science.gov (United States)

    Thoresen, Siri; Jensen, Tine K; Dyb, Grete

    2014-12-01

    Terrorism and disasters receive massive media attention, and victims are often approached by reporters. Not much is known about how terror and disaster victims perceive the contact with media and whether such experiences influence mental health. In this study, we describe how positive and negative experiences with media relate to posttraumatic stress (PTS) reactions among survivors of the 2011 Utøya Island terrorist attack in Norway. Face-to-face interviews were conducted with 285 survivors (47.0% female and 53.0% male) 14-15 months after the terrorist attack. Most survivors were approached by reporters (94%), and participated in media interviews (88%). The majority of survivors evaluated their media contact and participation as positive, and media participation was unrelated to PTS reactions. Survivors who found media participation distressing had more PTS reactions (quite distressing: B = 0.440, extremely distressing: B = 0.611, p = .004 in adjusted model). Perceiving media participation as distressing was slightly associated with lower levels of social support (r = -.16, p = .013), and regretting media participation was slightly associated with feeling let down (r = .18, p = .004). Reporters should take care when interviewing victims, and clinicians should be aware of media exposure as a potential additional strain on victims.

  3. The Design and Verification of Disaster Recovery Strategies in Cloud Disaster Recovery Center

    Directory of Open Access Journals (Sweden)

    Gang Li

    2013-10-01

    Full Text Available  Disaster recovery is an important means to ensure business continuity. However, the disaster recovery investment is so huge that the cloud disaster recovery becomes a best choice for enterprises, especially for SMEs. This paper discusses the necessity and importance of the cloud disaster recovery center and the vital indicators of disaster recovery by analyzing the classification and selecting principle of cloud disaster recovery strategy, developing disaster recovery strategy based on major disaster recovery strategy finally. In the end, this paper verifies the feasibility of the disaster recovery strategy by two specific cases of disaster recovery implementation.

  4. The Psychology of Ongoing Threat: Relative Risk Appraisal, the September 11 Attacks, and Terrorism-Related Fears

    Science.gov (United States)

    Marshall, Randall D.; Bryant, Richard A.; Amsel, Lawrence; Suh, Eun Jung; Cook, Joan M.; Neria, Yuval

    2007-01-01

    There are now replicated findings that posttraumatic stress disorder (PTSD) symptoms related to the September 11, 2001, attacks occurred in large numbers of persons who did not fit the traditional definition of exposure to a traumatic event. These data are not explained by traditional epidemiologic "bull's eye" disaster models, which assume the…

  5. Comparison of nursing students’ Satisfaction about two methods of demonstration and simulation for training of mask making against chemical attacks

    Directory of Open Access Journals (Sweden)

    Monireh Ebadi

    2016-04-01

    Conclusion: there was no significant difference between the satisfaction for two methods of demonstration and simulation but researchers suggest that simulation method can be used for mask making training against chemical attacks as they believe that this method is the best way to promote military nurses ’education and control disaster situations.

  6. Disasters And Minimum Health Standards In Disaster Response

    Directory of Open Access Journals (Sweden)

    Sibel GOGEN

    Full Text Available Millions of people are affected by natural or man made disasters all over the world. The number of people affected by disasters increase globally, due to global climate changes, increasing poverty, low life standards, inappropriate infrastructure, lack of early response systems, abuse of natural sources, and beside these, nuclear weapons, wars and conflicts, terrorist actions, migration, displacement and population movements. 95 % of life loss due to disasters are in the underdeveloped or developing countries. Turkey is a developing country, highly affected by disasters. For coping with disasters, not only national action plans, but also International Action Plans and cooperations are needed. Since all the disasters have direct and indirect effects on health, applications of minimal health standarts in disaster response, will reduce the morbidity and mortality rates. In this paper, water supplies and sanitation, vector control, waste control, burial of corpses, nutrition and minimum health standards in disaster response, are reviewed. [TAF Prev Med Bull 2004; 3(12.000: 296-306

  7. The Effects of Repeated Low-Level Sarin Exposure on Muscarinic M1 Receptor Binding, Amyloid Precursor Protein Levels and Neuropathology

    Science.gov (United States)

    2005-08-01

    Muscarinic; Nerve agents; Organophosphorus; Pirenzepine ; Receptor Binding; Sarin 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT...either Bmax (receptor density) or Kd (receptor affinity) following cortical M1 muscarinic receptor binding using [3H]- Pirenzepine , across all five...binding assays using [3H]- Pirenzepine (m1AChR ligand; Hammer et al., 1980), Western blotting using an antibody to APP in cortex, and neuropathological

  8. The oxime pro-2-PAM provides minimal protection against the CNS effects of the nerve agents sarin, cyclosarin, and VX in guinea pigs.

    Science.gov (United States)

    Shih, Tsung-Ming; Guarisco, John A; Myers, Todd M; Kan, Robert K; McDonough, John H

    2011-01-01

    This study examined whether pro-2-PAM, a pro-drug dihydropyridine derivative of the oxime 2-pralidoxime (2-PAM) that can penetrate the brain, could prevent or reverse the central toxic effects of three nerve agents; sarin, cyclosarin, and VX. The first experiment tested whether pro-2-PAM could reactivate guinea pig cholinesterase (ChE) in vivo in central and peripheral tissues inhibited by these nerve agents. Pro-2-PAM produced a dose-dependent reactivation of sarin- or VX-inhibited ChE in both peripheral and brain tissues, but with substantially greater reactivation in peripheral tissues compared to brain. Pro-2-PAM produced 9-25% reactivation of cyclosarin-inhibited ChE in blood, heart, and spinal cord, but no reactivation in brain or muscle tissues. In a second experiment, the ability of pro-2-PAM to block or terminate nerve agent-induced electroencephalographic seizure activity was evaluated. Pro-2-PAM was able to block sarin- or VX-induced seizures (16-33%) over a dose range of 24-32 mg/kg, but was ineffective against cyclosarin-induced seizures. Animals that were protected from seizures showed significantly less weight loss and greater behavioral function 24 h after exposure than those animals that were not protected. Additionally, brains were free from neuropathology when pro-2-PAM prevented seizures. In summary, pro-2-PAM provided modest reactivation of sarin- and VX-inhibited ChE in the brain and periphery, which was reflected by a limited ability to block or terminate seizures elicited by these agents. Pro-2-PAM was able to reactivate blood, heart, and spinal cord ChE inhibited by cyclosarin, but was not effective against cyclosarin-induced seizures.

  9. CRUCIAL: Cryosat-2 Success over Inland Water and Land: Analyses and Validation of SAR and SARin Full Bit Rate Altimetric Heights

    Science.gov (United States)

    Moore, Philip; Benveniste, Jérôme; Birkinshaw, Stephen; Ambrózio, Américo; Restano, Marco

    2016-07-01

    CRUCIAL is an ESA/STSE funded project investigating innovative land and inland water applications from Cryosat-2 with a forward-look component to the future Sentinel-3 and Jason-CS/Sentinel-6 missions. The high along-track sampling of Cryosat-2 in its SAR and SARin modes offer the opportunity to recover high frequency signals over inland waters. A theoretical approach has been developed to process the FBR L1A Doppler beams to form a product using ground cell gridding, beam steering and beam stacking from which inland water heights are derivable from the retracked Cryosat-2 altimetric waveforms. Results of the processing strategy will include a comparison of waveforms and heights from the burst echoes (˜80 m along-track) and from multi-look waveforms (˜320 m along-track). SAR and SARin FBR data are available for the Amazon, Brahmaputra and Mekong for 2011-2015. FBR SAR results will be compared against stage data from the nearest gauge where applicable with heights from Tonle Sap compared against Jason-2 data from the United States Department of Agriculture. A strategy to select the number of multi-looks over rivers will also be presented. Results of FBR SARin processing for the Amazon and Brahmaputra will be presented including comparison of heights from the two antennae, extraction of slope of the ground surface and validation against ground data where appropriate.

  10. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  11. Economic development and natural disasters

    NARCIS (Netherlands)

    Klomp, Jeroen

    2016-01-01

    In this study we examine the impact of large-scale natural disasters on economic development. A major obstacle in exploring this relationship is the poor data quality on GDP per capita in low-income countries, while at the same time more than 90% of all disasters that happen worldwide occur in th

  12. Dynamic Routing during Disaster Events

    NARCIS (Netherlands)

    Fitrianie , S.; Rothkrantz , L.J.M.

    2015-01-01

    Innovations in mobile technology allow people to request route information on their smartphone to reach safe areas during emergency and disaster evacuations. In return, the affected people in the field can send their observation reports, e.g. using a dedicated icon-based disaster language. However,

  13. [Disaster medicine, organization and management].

    Science.gov (United States)

    Spiette, Catherine; Houzé-Cerfon, Vanessa; Ducassé, Jean-Louis

    2013-01-01

    A disaster situation requires an organised command of the emergency services as well as of the treatment of victims and their orientation. The aim is to avoid any deterioration in the quality of the emergency care provided to the patients. A medical speciality, disaster medicine requires specific training.

  14. Longitudinal health effects of disasters.

    NARCIS (Netherlands)

    Yzermans, C.J.

    2004-01-01

    Background: We carry out prospective, longitudinal studies on the possible health effects of two disasters in the Netherlands: the explosion of fireworks depot in a residential area (Enschede) and a fire in discotheque in Volendam. Learning from the chaotic aftermath previous disasters, the Dutch g

  15. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  16. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security...

  17. Multiculturalism & The Charlie Hebdo Attack

    DEFF Research Database (Denmark)

    Lægaard, Sune

    2016-01-01

    The attack on Charlie Hebdo has by many been linked to multiculturalism. But it is unclear exactly how the connection between multiculturalism and the attack should be understood and whether there indeed is such a connection. The article discusses this by distinguishing between different senses o...... of multiculturalism and different ways in which one might think that there is a link between multiculturalism and the attack. On this basis the resulting claims are discussed as to whether they are in fact plausible, which many of them turn out not to be....

  18. Multiculturalism & The Charlie Hebdo Attack

    DEFF Research Database (Denmark)

    Lægaard, Sune

    2016-01-01

    The attack on Charlie Hebdo has by many been linked to multiculturalism. But it is unclear exactly how the connection between multiculturalism and the attack should be understood and whether there indeed is such a connection. The article discusses this by distinguishing between different senses...... of multiculturalism and different ways in which one might think that there is a link between multiculturalism and the attack. On this basis the resulting claims are discussed as to whether they are in fact plausible, which many of them turn out not to be....

  19. Disastrous assumptions about community disasters

    Energy Technology Data Exchange (ETDEWEB)

    Dynes, R.R. [Univ. of Delaware, Newark, DE (United States). Disaster Research Center

    1995-12-31

    Planning for local community disasters is compounded with erroneous assumptions. Six problematic models are identified: agent facts, big accident, end of the world, media, command and control, administrative. Problematic assumptions in each of them are identified. A more adequate model centered on problem solving is identified. That there is a discrepancy between disaster planning efforts and the actual response experience seems rather universal. That discrepancy is symbolized by the graffiti which predictably surfaces on many walls in post disaster locations -- ``First the earthquake, then the disaster.`` That contradiction is seldom reduced as a result of post disaster critiques, since the most usual conclusion is that the plan was adequate but the ``people`` did not follow it. Another explanation will be provided here. A more plausible explanation for failure is that most planning efforts adopt a number of erroneous assumptions which affect the outcome. Those assumptions are infrequently changed or modified by experience.

  20. Analyzing covert social network foundation behind terrorism disaster

    CERN Document Server

    Maeno, Yoshiharu

    2007-01-01

    This paper addresses a method to analyze the covert social network foundation hidden behind the terrorism disaster. It is to solve a node discovery problem, which means to discover a node, which functions relevantly in a social network, but escaped from monitoring on the presence and mutual relationship of nodes. The method aims at integrating the expert investigator's prior understanding, insight on the terrorists' social network nature derived from the complex graph theory, and computational data processing. The social network responsible for the 9/11 attack in 2001 is used to execute simulation experiment to evaluate the performance of the method.

  1. Social Engineering:A Partial Technical attack

    OpenAIRE

    P.S.Maan; Manish Sharma

    2012-01-01

    This paper suggests the crystal clear concept behind the social engineering attack. Basically social engineering is a non technical attack. But social engineering attack is an attack on human psychology to get the information, but using what? Basically it is an attack on human psychology by using some technical skills or technology. Social engineering attack has many types like fake mail, telephonic cheat etc. which are impossible without any technical skills, so in this paper we suggest that...

  2. Hurricane! Coping With Disaster

    Science.gov (United States)

    Lifland, Jonathan

    A new AGU book, Hurricane! Coping With Disaster, analyzes the progress made in hurricane science and recounts how advances in the field have affected the public's and the scientific community's understanding of these storms. The book explores the evolution of hurricane study, from the catastrophic strike in Galveston, Texas in 1900—still the worst natural disaster in United States history—to today's satellite and aircraft observations that track a storm's progress and monitor its strength. In this issue, Eos talks with Robert Simpson, the books' senior editor.Simpson has studied severe storms for more than 60 years, including conducting one of the first research flights through a hurricane in 1945. He was the founding director of the (U.S.) National Hurricane Research Project and has served as director of the National Hurricane Center. In collaboration with Herbert Saffir, Simpson helped design and implement the Saffir/Simpson damage potential scale that is widely used to identify potential damage from hurricanes.

  3. The World Trade Center Attack: Helping the helpers: the role of critical incident stress management

    OpenAIRE

    Hammond, Jeffrey; Brooks, Jill

    2001-01-01

    Healthcare and prehospital workers involved in disaster response are susceptible to a variety of stress-related psychological and physical sequelae. Critical incident stress management, of which critical incident stress debriefing is a component, can mitigate the response to these stressors. Critical incident stress debriefing is a peer-driven, therapist-guided, structured, group intervention designed to accelerate the recovery of personnel. The attack on the World Trade Center, and the impac...

  4. Disaster event: Window of opportunity to implement global disaster policies?

    Directory of Open Access Journals (Sweden)

    Siambabala B. Manyena

    2013-03-01

    Full Text Available Disasters have been predominantly construed as destructive events causing loss of lives, livelihoods and hard-won development. Much less attention has been paid to the constructive nature of disasters as creating potential windows of opportunities to address the overlooked and neglected aspects of disaster risk reduction. Using material from Zimbabwe, this article examines whether the humanitarian crisis, as manifested in the cholera disaster of 2008–2009, created a window of opportunity to accelerate the implementation of the Hyogo Framework for Action. The findings suggest that the humanitarian crisis did not necessarily create a window of opportunity to accelerate the implementation of the framework, owing to (1 inadequate authority and power of the agency responsible for disaster risk reduction, (2 an inadequate legal and institutional framework that outlines clear coordination, accountability mechanisms, resource mobilisation, community participation, and integration of development with regard to disaster risk reduction and (3 a lack of an integrated evidence-based approach to advocate disaster risk reduction in Zimbabwe.

  5. Estimates of forest height in the Amazon basin using radar altimeter data of SARIN mode onboard Cryosat-2

    Science.gov (United States)

    Yang, L.; Sun, G.; Liu, Q.

    2013-12-01

    Forest height is an important parameter for global carbon cycle studies. New technologies are required since the end of the operation ofGeoscience Laser Altimeter System (GLAS) onboard The Ice, Cloud, and land Elevation Satellite (IceSat) in 2009. CryoSat-2 is a European Space Agencyenvironmental research satellite which was launched in April 2010.The SIRAL (SAR Interferometer Radar Altimeter) on board CryoSat-2 provides three operational modes for different observational requirements. Before the launch of Icesat2 around July 2016, CryoSat data represents a unique source of information on regional-to-global scale forest canopy height.We propose to use radar altimetry waveforms from the synthetic aperture/interferometric (SARin) mode to estimate canopy height in the Amazon basin. To understand the relation between canopy structure and the SIRAL waveform in Ku band, a 3D model was developed and implemented based on a Lidar model by introducingthe scattering items from crown, trunk and ground surface at Ku band. The vertical distribution of tree crown volume within a SIRAL footprint was calculated from its 3-D stand model by summing the volumes of all tree crown cells at the same height from the ground. The preliminary comparisons between simulated and measured SIRAL waveforms show that the model captures the major characteristics of the SIRAL signature. Cryosat waveform data of SARin mode and from June, 2011 to June, 2012 (cycle 04) is used to retrieve canopy height at Amazon basin under Cryosat groundtrack. The canopy height is derived by extracting the key points of vegetation and ground returns after noise estimation. Because of lack of field tree height measurement in 2012 at Amazon, we validated the results using the field measurements at four areas (the km 67 camp, the km 77 camp, Ruropolis, the Taoajos river) of Tapajos National Forest, Brazil in November 1999, and compared the results with the canopy height estimation from previous studies using Laser

  6. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  7. Disaster and Sociolegal Studies

    Directory of Open Access Journals (Sweden)

    Susan Sterett

    2013-04-01

    Full Text Available Disasters are treated as independent events external to law. However, social processes define the beginning, end and extent of those events for mitigation, adaptation and response and recovery; those processes include the mobilization of law by people and organizations. Within the sociology of disaster, it is tempting to treat law as a problem-solving tool. Sociolegal analysis approaches law more skeptically: legal actors face problems and defer to the decisions others have made, or discount future problems as much as other institutions do and thereby contribute to problems, or offer compensation that does not ameliorate the inequality within and among countries that disaster can exacerbate. Law can signal that it is doing something about problems via national or supranational rights; for it actually to help requires legal actors to mobilize. Finally, the site of law has been displaced: from law being within public authority enacted through institutions to law as a matter of individual, self-governance set in expectation of disaster, and humanitarian assistance done through non-governmental organizations. This collection contributes analyses of individuals and organizations' action in disaster through legal processes. Los desastres se tratan como hechos independientes externos al derecho. Sin embargo, los procesos sociales definen el principio, el final y el alcance de esos acontecimientos en lo que respecta a su mitigación, adaptación, respuesta y recuperación; esos procesos incluyen la movilización del derecho por personas y organizaciones. En el ámbito de la sociología de los desastres, es tentador tratar el derecho como una herramienta para la resolución de problemas. Sin embargo, los análisis sociojurídicos se aproximan al derecho de forma más escéptica: los actores legales se enfrentan a problemas y se adhieren a decisiones que otros han tomado, o descartan problemas futuros de la misma forma que otras instituciones, aumentando

  8. Social Engineering:A Partial Technical attack

    Directory of Open Access Journals (Sweden)

    P. S. Maan

    2012-03-01

    Full Text Available This paper suggests the crystal clear concept behind the social engineering attack. Basically social engineering is a non technical attack. But social engineering attack is an attack on human psychology to get the information, but using what? Basically it is an attack on human psychology by using some technical skills or technology. Social engineering attack has many types like fake mail, telephonic cheat etc. which are impossible without any technical skills, so in this paper we suggest that , it is a partial technical attack and can be divided in human based and typical computer based social engineering attack.

  9. An Efficient Algorithm for the Detection of Exposed and Hidden Wormhole Attack

    Directory of Open Access Journals (Sweden)

    ZUBAIR AHMED KHAN

    2016-07-01

    Full Text Available MANETs (Mobile Ad Hoc Networks are slowly integrating into our everyday lives, their most prominent uses are visible in the disaster and war struck areas where physical infrastructure is almost impossible or very hard to build. MANETs like other networks are facing the threat of malicious users and their activities. A number of attacks have been identified but the most severe of them is the wormhole attack which has the ability to succeed even in case of encrypted traffic and secure networks. Once wormhole is launched successfully, the severity increases by the fact that attackers can launch other attacks too. This paper presents a comprehensive algorithm for the detection of exposed as well as hidden wormhole attack while keeping the detection rate to maximum and at the same reducing false alarms. The algorithm does not require any extra hardware, time synchronization or any special type of nodes. The architecture consists of the combination of Routing Table, RTT (Round Trip Time and RSSI (Received Signal Strength Indicator for comprehensive detection of wormhole attack. The proposed technique is robust, light weight, has low resource requirements and provides real-time detection against the wormhole attack. Simulation results show that the algorithm is able to provide a higher detection rate, packet delivery ratio, negligible false alarms and is also better in terms of Ease of Implementation, Detection Accuracy/ Speed and processing overhead.

  10. Microarchitectural Side-Channel Attacks

    OpenAIRE

    Gallais, Jean-Francois

    2013-01-01

    Cryptanalysis is the science which evaluates the security of a cryptosystem and detects its weaknesses and flaws. Initially confined to the black-box model, where only the input and output data were considered, cryptanalysis is now broadened to the security evaluation of the physical implementation of a cryptosystem. The implementation attacks which compose physical cryptanalysis are divided into fault attacks, exploiting the effect of disruption of the normal functioning of the device, and s...

  11. Additive attacks on speaker recognition

    Science.gov (United States)

    Farrokh Baroughi, Alireza; Craver, Scott

    2014-02-01

    Speaker recognition is used to identify a speaker's voice from among a group of known speakers. A common method of speaker recognition is a classification based on cepstral coefficients of the speaker's voice, using a Gaussian mixture model (GMM) to model each speaker. In this paper we try to fool a speaker recognition system using additive noise such that an intruder is recognized as a target user. Our attack uses a mixture selected from a target user's GMM model, inverting the cepstral transformation to produce noise samples. In our 5 speaker data base, we achieve an attack success rate of 50% with a noise signal at 10dB SNR, and 95% by increasing noise power to 0dB SNR. The importance of this attack is its simplicity and flexibility: it can be employed in real time with no processing of an attacker's voice, and little computation is needed at the moment of detection, allowing the attack to be performed by a small portable device. For any target user, knowing that user's model or voice sample is sufficient to compute the attack signal, and it is enough that the intruder plays it while he/she is uttering to be classiffed as the victim.

  12. 13 CFR 123.2 - What are disaster loans and disaster declarations?

    Science.gov (United States)

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false What are disaster loans and disaster declarations? 123.2 Section 123.2 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION DISASTER LOAN PROGRAM Overview § 123.2 What are disaster loans and disaster declarations? SBA offers...

  13. The public health dimension of disasters: health outcome assessment of disasters.

    NARCIS (Netherlands)

    Berg, B. van den; Grievink, L.; Gutschmidt, K.; Lang, T.; Palmer, S.; Ruijten, M.; Stumpel, R.; Yzermans, J.

    2008-01-01

    A broad range of health problems are related to disasters. Insight into these health problems is needed for targeted disaster management. Disaster health outcome assessment can provide insight into the health effects of disasters. During the 15th World Congress on Disaster and Emergency Medicine in

  14. Disaster Preparedness: Guidelines for School Nurses

    Science.gov (United States)

    Doyle, Janice; Loyacono, Thomas R.

    2007-01-01

    These guidelines help school nurses understand their role in preparing for disasters and major emergencies. The guidelines are suitable for planning for a variety of emergency and disaster situations. Disaster Preparedness Guidelines for School Nurses is based on the four phases of disaster management as defined by the Federal Emergency Management…

  15. Learning from Disaster Simulation Drills in Japan

    OpenAIRE

    World Bank

    2017-01-01

    Large-scale natural disasters are a frequent and common occurrence in Japan. Over the years, Japan has evolved its disaster management system to address all phases of a disaster: from disaster prevention, mitigation, and preparedness, to emergency response, recovery, and rehabilitation. This report consists of four parts: Introduction (Chapter 1, 2, 3), Simulation drills (Chapter 4, 5, 6, ...

  16. 75 FR 60588 - Immediate Disaster Assistance Program

    Science.gov (United States)

    2010-10-01

    ... disaster business loans, and Military Reservist EIDL loans. SBA also has authority under Section 7(b) to... Military Reservist economic injury disasters (Sec. 123.500 et seq.). Disaster declarations under section... Declarations. The Military Reservist economic injury disaster loan (MREIDL) program is a specialized...

  17. 29 CFR 4041.4 - Disaster relief.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 9 2010-07-01 2010-07-01 false Disaster relief. 4041.4 Section 4041.4 Labor Regulations...-EMPLOYER PLANS General Provisions § 4041.4 Disaster relief. When the President of the United States declares that, under the Disaster Relief Act (42 U.S.C. 5121, 5122(2), 5141(b)), a major disaster exists...

  18. Investigating the significance of disaster information management

    Directory of Open Access Journals (Sweden)

    Mukundi Mutasa

    2013-01-01

    Full Text Available Disaster information informs disaster risk management interventions. However, it is the systematic management of this key resource that has not yet been fully embraced. In some cases, information is still haphazardly collected, analysed, managed and disseminated. This paper, utilising mainly secondary literature sources, explores the importance of disaster information and its systematic management in disaster risk management programming. It presents challenges associated with information management in disaster situations and critiques the trend whereby the collection, management and dissemination of information are usually limited to disaster situations. This only serves to further marginalise post-disaster recovery processes, which are integral with regard to generating knowledge essential for the formulation of future disaster mitigation strategies. The paper concludes by arguing for the integration of disaster information management into current disaster risk management curriculum.

  19. The Performance and Potentials of the CryoSat-2 SAR and SARIn Modes for Lake Level Estimation

    Directory of Open Access Journals (Sweden)

    Karina Nielsen

    2017-05-01

    Full Text Available Over the last few decades, satellite altimetry has proven to be valuable for monitoring lake levels. With the new generation of altimetry missions, CryoSat-2 and Sentinel-3, which operate in Synthetic Aperture Radar (SAR and SAR Interferometric (SARIn modes, the footprint size is reduced to approximately 300 m in the along-track direction. Here, the performance of these new modes is investigated in terms of uncertainty of the estimated water level from CryoSat-2 data and the agreement with in situ data. The data quality is compared to conventional low resolution mode (LRM altimetry products from Envisat, and the performance as a function of the lake area is tested. Based on a sample of 145 lakes with areas ranging from a few to several thousand km 2 , the CryoSat-2 results show an overall superior performance. For lakes with an area below 100 km 2 , the uncertainty of the lake levels is only half of that of the Envisat results. Generally, the CryoSat-2 lake levels also show a better agreement with the in situ data. The lower uncertainty of the CryoSat-2 results entails a more detailed description of water level variations.

  20. QSAR models for the reactivation of sarin inhibited acetylcholinesterase by quaternary pyridinium oximes based on Monte Carlo method.

    Science.gov (United States)

    Veselinović, Aleksandar M; Veselinović, Jovana B; Toropov, Andrey A; Toropova, Alla P; Nikolić, Goran M

    2014-01-01

    Monte Carlo method has been used as a computational tool for building QSAR models for the reactivation of sarin inhibited acetylcholinesterase (AChE) by quaternary pyridinium oximes. Simplified molecular input line entry system (SMILES) together with hydrogen-suppressed graph (HSG) was used to represent molecular structure. Total number of considered oximes was 46 and activity was defined as logarithm of the AChE reactivation percentage by oximes with concentration of 0.001 M. One-variable models have been calculated with CORAL software for one data split into training, calibration and test set. Computational experiments indicated that this approach can satisfactorily predict the desired endpoint. Best QSAR model had the following statistical parameters: for training set r2=0.7096, s=0.177, MAE=0.148; calibration set: r2=0.6759, s=0.330, MAE=0.271 and test set: r2=0.8620, s=0.182, MAE=0.150. Structural indicators (SMILES based molecular fragments) for the increase and the decrease of the stated activity are defined. Using defined structural alerts computer aided design of new oxime derivatives with desired activity is presented.

  1. QSAR Models for the Reactivation of Sarin Inhibited AChE by Quaternary Pyridinium Oximes Based on Monte Carlo Method.

    Science.gov (United States)

    Veselinović, Aleksandar M; Veselinović, Jovana B; Toropov, Andrey A; Toropova, Alla P; Nikolić, Goran M

    2014-11-26

    For three random splits, one-variable models of oximes reactivation of sarin inhibited acetylcholinesterase (logarithm of the AChE reactivation percentage by oximes with concentration of 0.001 M) have been calculated with CORAL software. The total number of considered oximes was 42. Simplified molecular input line entry system (SMILES) and hydrogen-suppressed graph (HSG) are used to represent the molecular structure. Using CORAL software by means of the calculation with Monte Carlo optimization of the so called correlation weights for the molecular fragments, optimal SMILES-based descriptors were defined, which are correlated with an endpoint for the training set. The predictability of these descriptors for an external test are estimated. In this study hybrid representation HSG together with SMILES was used. The "classic" scheme (i.e. split data into the training set and test set) of building up quantitative structure-activity relationships was employed. Computational experiments indicated that this approach can satisfactorily predict the desired endpoint. Best model had following statistical characteristics n=32, r2= 0.6012, s= 0.279, F= 45 for training and n=10, r2= 0.9301, s= 0.076, Rm2=0.9206 for test set.

  2. C41SR and Urban Disasters Disaster Response & Recovery Tools

    Energy Technology Data Exchange (ETDEWEB)

    Brouillette, Greg A. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States). Risk Analysis and Decision Support Group

    2007-03-27

    These are slides for various presentations on C41SR and urban disasters disasters response and recovery tools. These are all mainly charts and images of disaster response and recovery tools. Slides included have headings such as the following: vignette of a disaster response, situational awareness and common operating picture available to EOC, plume modeling capability, Program ASPECT Chemical Response Products, EPA ASPECT - Hurricane RITA Response 9/25/2005, Angel Fire Imagery, incident commander's view/police chief's view/ EMS' view, common situational awareness and collaborative planning, exercise, training capability, systems diagram, Austere Challenge 06 Sim/C4 Requirements, common situational awareness and collaborative planning, exercise, training environment, common situational awareness, real world, crisis response, and consequence management.

  3. Fear of Terrorism in New York After the September 11 Terrorist Attacks: Implications for Emergency Mental Health and Preparedness

    Science.gov (United States)

    Boscarino, Joseph A.; Figley, Charles R.; Adams, Richard E.

    2009-01-01

    To examine the public’s response to future terrorist attacks, we surveyed 1,001 New Yorkers in the community one year after the September 11 attacks. Overall, New Yorkers were very concerned about future terrorist attacks and also concerned about attacks involving biological or nuclear weapons. In addition, while most New Yorkers reported that if a biological or nuclear attack occurred they would evaluate available information before evacuating, a significant number reported they would immediately evacuate, regardless of police or public health communications to the contrary. The level of public concern was significantly higher on all measures among New York City and Long Island residents (downstate) compared to the rest of the state. A model predicting higher fear of terrorism indicated that downstate residents, women, those 45 to 64 years old, African Americans and Hispanics, those with less education/income, and those more likely to flee, were more fearful of future attacks. In addition, making disaster preparations and carefully evaluating emergency information also predicted a higher level of fear as well. A second model predicting who would flee suggested that those more likely to evaluate available information were less likely to immediately evacuate, while those with a higher fear of future attacks were more likely to flee the area. Given these findings and the possibility of future attacks, mental health professionals need to be more involved in preparedness efforts, especially related to the psychological impact of attacks involving weapons of mass destruction. PMID:14730761

  4. Lifestyle Changes for Heart Attack Prevention

    Science.gov (United States)

    ... symptoms of a heart attack. It presents one woman's real-life experience with heart attack symptoms, which started during her pregnancy. The video also explains how a heart attack occurs and encourages women to seek care right away for heart attack symptoms. For more information, ...

  5. How Is a Heart Attack Treated?

    Science.gov (United States)

    ... symptoms of a heart attack. It presents one woman's real-life experience with heart attack symptoms, which started during her pregnancy. The video also explains how a heart attack occurs and encourages women to seek care right away for heart attack symptoms. For more information, ...

  6. How Is a Heart Attack Diagnosed?

    Science.gov (United States)

    ... symptoms of a heart attack. It presents one woman's real-life experience with heart attack symptoms, which started during her pregnancy. The video also explains how a heart attack occurs and encourages women to seek care right away for heart attack symptoms. For more information, ...

  7. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  8. The environmental and medical geochemistry of potentially hazardous materials produced by disasters

    Science.gov (United States)

    Plumlee, Geoffrey S.; Morman, Suzette A.; Meeker, G.P.; Hoefen, Todd M.; Hageman, Philip L.; Wolf, Ruth E.

    2014-01-01

    Many natural or human-caused disasters release potentially hazardous materials (HM) that may pose threats to the environment and health of exposed humans, wildlife, and livestock. This chapter summarizes the environmentally and toxicologically significant physical, mineralogical, and geochemical characteristics of materials produced by a wide variety of recent disasters, such as volcanic eruptions, hurricanes and extreme storms, spills of mining/mineral-processing wastes or coal extraction by-products, and the 2001 attacks on and collapse of the World Trade Center towers. In describing these characteristics, this chapter also illustrates the important roles that geochemists and other earth scientists can play in environmental disaster response and preparedness. In addition to characterizing in detail the physical, chemical, and microbial makeup of HM generated by the disasters, these roles also include (1) identifying and discriminating potential multiple sources of the materials; (2) monitoring, mapping, and modeling dispersal and evolution of the materials in the environment; (3) understanding how the materials are modified by environmental processes; (4) identifying key characteristics and processes that influence the materials' toxicity to exposed humans and ecosystems; (5) estimating shifts away from predisaster environmental baseline conditions; and (6) using geochemical insights learned from past disasters to help estimate, prepare for, and increase societal resilience to the environmental and related health impacts of future disasters.

  9. A Simulation Study for Emergency/Disaster Management by Applying Complex Networks Theory

    Directory of Open Access Journals (Sweden)

    Li Jin

    2014-04-01

    Full Text Available Earthquakes, hurricanes, flooding and terrorist attacks pose a severe threat to our society. What’s more, when such a disaster happens, it can spread in a wide range with ubiquitous presence of a large-scale networked system. Therefore, the emergency/disaster management faces new challenges that the decision-makers have extra difficulties in perceiving the disaster dynamic spreading processes under this networked environment. This study tries to use the complex networks theory to tackle this complexity and the result shows the theory is a promising approach to support disaster/emergency management by focusing on simulation experiments of small world networks and scale free networks. The theory can be used to capture and describe the evolution mechanism, evolution discipline and overall behavior of a networked system. In particular, the complex networks theory is very strong at analyzing the complexity and dynamical changes of a networked system, which can improve the situation awareness after a disaster has occurred and help perceive its dynamic process, which is very important for high-quality decision making. In addition, this study also shows the use of the complex networks theory can build a visualized process to track the dynamic spreading of a disaster in a networked system.

  10. RESIST SRP AGAINST WORMHOLE ATTACK

    Directory of Open Access Journals (Sweden)

    Marjan Kuchaki Rafsanjani

    2013-06-01

    Full Text Available Ad-hoc networks refer to temporary or interim networks which form for special purposes. Actually they are wireless networks with mobile nodes. These networks use no network assisting element for path routing and in these networks available nodes are responsible for path routing. Therefore when malicious nodes want to find a way to interfere with the path routing then the existence of a secure route protocol (SRP can prevent the interference. SRP protocol is one of the secure algorithms of path routing protocol but it is notresistant against wormhole attack. Wormhole attack is considered as a subtle attack in which two malicious nodes make a short connection in network's topology through private or implicit connection and represent two non neighbor nodes as neighbors and prevent the correctoperation of path routing protocol by using this method. One of the methods of preventing wormhole attack is by using packet leashes. We try to decrease the wormhole attack occurrence in this routing protocol by a kind of packet leashes called temporal leashes. We alsowill minimize problems resulting from using temporal leashes by different methods and modifications in its structure.

  11. Network robustness under large-scale attacks

    CERN Document Server

    Zhou, Qing; Liu, Ruifang; Cui, Shuguang

    2014-01-01

    Network Robustness under Large-Scale Attacks provides the analysis of network robustness under attacks, with a focus on large-scale correlated physical attacks. The book begins with a thorough overview of the latest research and techniques to analyze the network responses to different types of attacks over various network topologies and connection models. It then introduces a new large-scale physical attack model coined as area attack, under which a new network robustness measure is introduced and applied to study the network responses. With this book, readers will learn the necessary tools to evaluate how a complex network responds to random and possibly correlated attacks.

  12. Disaster Preparedness for Your Pet

    Science.gov (United States)

    ... and prepare a disaster kit for your pet. Leaving pets out of evacuation plans can put pets, ... during an evacuation Contact your local emergency management office and ask if they offer accommodations for owners ...

  13. Disaster Debris Recovery Database - Recovery

    Data.gov (United States)

    U.S. Environmental Protection Agency — The US EPA Region 5 Disaster Debris Recovery Database includes public datasets of over 6,000 composting facilities, demolition contractors, transfer stations,...

  14. Natural disasters and IDPs’ rights

    Directory of Open Access Journals (Sweden)

    Walter Kälin

    2005-07-01

    Full Text Available In the understandable rush to provide assistance to the survivors of the tsunami, insufficient attention has been devoted to protecting the human rights of those forcibly displaced by the disaster.

  15. Disaster Debris Recovery Database - Landfills

    Data.gov (United States)

    U.S. Environmental Protection Agency — The US EPA Region 5 Disaster Debris Recovery Database includes public datasets of over 6,000 composting facilities, demolition contractors, transfer stations,...

  16. FEMA Current Disaster Declarations -shp

    Data.gov (United States)

    Department of Homeland Security — This dataset lists the current Disaster Declarations in Shapefile. This data was compiled and distributed by FEMA Mapping and Analysis Center (MAC). Metadata file...

  17. FEMA Disaster Recovery Centers - KML

    Data.gov (United States)

    Department of Homeland Security — This is a KML file for FEMA's Disaster Recovery Centers (DRC). A DRC is a readily accessible facility or mobile office set up by FEMA where applicants may go for...

  18. Human Response to Natural Disasters

    Directory of Open Access Journals (Sweden)

    Dara Nix-Stevenson

    2013-07-01

    Full Text Available This study elaborates on the connection between socioeconomic status, education, and the ability to respond to natural disasters. Using the aftermath of Hurricane Katrina and other natural disasters as teachable moments, I foreground how uneven access to resources and capital leave some people more vulnerable than others to natural disasters and how marginal communities inevitably bear the accompanying repercussions of who gets what, when, and how much in the postdisaster emergency relief and reconstruction phase. This occurs not necessarily and merely through a “natural” disaster, as the Boxer Day Tsunami or Hurricane Katrina, but through processes of social, political, and economic disempowerment associated with prior racialized histories and inequitable access to cultural capital.

  19. Evacuation models and disaster psychology

    NARCIS (Netherlands)

    H.C.M. Vorst

    2010-01-01

    In evacuation models of buildings, neighborhoods, areas, cities and countries important psychological parameters are not frequently used. In this paper the relevance of some important variables from disaster psychology will be discussed. Modeling psychological variables will enhance prediction of hu

  20. [Disaster psychiatry in late life].

    Science.gov (United States)

    Awata, Shuichi

    2013-10-01

    Disaster preparedness in geriatric psychiatry was proposed on the basis of experience of the Great East Japan Earthquake. 1) Frail or demented elderly should be considered as a special population at risk for disaster victims and addressed in local disaster prevention programs. 2) To response to various psychiatric symptoms(delirium, BPSD, depression, anxiety, insomnia, and posttraumatic stress disorder) caused by medical conditions and rapid environmental changes due to disaster, linkage and coordination systems between psychiatric and medical sections should be established. 3) As a medium- and long-term support for the elderly who lost the community familiar to them, creation of a new community should be promoted in order to prevent depression, alcohol dependence, BPSD, and suicide.

  1. Earthquake Disaster Management and Insurance

    Institute of Scientific and Technical Information of China (English)

    2004-01-01

    As one of the most powerful tools to reduce the earthquake loss, the Earthquake Disaster Management [EDM] and Insurance [EI] have been highlighted and have had a great progress in many countries in recent years. Earthquake disaster management includes a series of contents, such as earthquake hazard and risk analysis, vulnerability analysis of building and infrastructure, earthquake aware training, and building the emergency response system. EI, which has been included in EDM after this practice has been...

  2. Information Management and Disaster Archives

    OpenAIRE

    Odabaş, Hüseyin; Odabaş, Z. Yonca; Polat, Coşkun

    2008-01-01

    Information management is a discipline which gives opportunity the collection of every kind of explicit or tacit information reresource appearing in the result of past activities and experience, sharing it by passing through suitable processes and achieving useful results from them. Disaster is a fact that affects both individual and social lives in negative ways. In order to mitigate these effects the concept of disaster management provides many opportunities. As a result of these processes ...

  3. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...... side-channels attacks can be applied to ECC. This paper reflects an ongoing research in the field of countermeasures against the attacks mentioned above....

  4. Global Mapping of Cyber Attacks

    Science.gov (United States)

    2014-01-01

    permutations of rows and columns. 3 Related Work Most prior empirical cyber security work is interested in characterizing the mode of operation of attack...The attribute networks (ICT att, bandwidth att, bribes att, ICT vie and ICT % diff) have all 1 component, and density and clustering coefficient...attnlrutes or attackers and victims ICT att x ICT vie 0.19*** 0.23*** 0.51*** 0.47*** Bribes att x ICT vie 0.21• 0.21* -0.26* -0.27 Bandwidth att

  5. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica......Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error...

  6. A disaster relief exercise

    Science.gov (United States)

    Quagliotti, Fulvia; Novaro Mascarello, Laura

    2016-04-01

    The Remotely Piloted Aircraft Systems (RPAS) is an effective tool for military applications, both for properly military operations, such as research missions and road surveillance, and for civilian support after natural disasters, like landslides, floods, and earthquakes, when reaching victims is often hard or it would take too much time for their survival. Information are needed without hazarding the life of the military troops. When roads, bridges and other communication ways are usually not available, the unmanned platform is the only easy and fast way to contact people. It can be launched directly from the operation site and it could take crucial information or carry medication, necessaries and everything that could help rescue teams. The unmanned platform can also be used for the first aid in an emergency situation when the use of a helicopter is too dangerous and other troops could be involved in heavy fighting. The RPAS has some advantages. First is the reduced cost, compared to traditional aircraft, that could enable the user to have several operating units. Secondly, pilots are not on board and therefore, if needed, the crew' rotation and rest do not imply the need to stop operations. The third fact is that, depending on the type of delivery that is used, the operations may take place on a twenty-four hours' base. The main benefit achieved with these three facts is that continuous operation may take place and eventually make up the capacity difference. To sum up, the main motivation behind this employment of UAS is to replace human lives on the cockpits and to assure the execution of Dangerous, Dull and Dirty missions. In May 2015, the ERIDANO Exercise was performed in Moncalieri city, near Turin (Italy) and it was a joint exercise between the Italian Army, National Emergency Service and Politecnico of Turin. The aim was the control and management of emergency situations due to natural disasters. In particular, a flood was simulated. A multicopter was used

  7. Natural disasters and gender dynamics

    Science.gov (United States)

    Roder, Giulia; Tarolli, Paolo

    2016-04-01

    Worldwide statistics reveal that the increasing number of risks and disaster impacts within the last decades have caused highly severe damages, with high death toll and huge economic damages (World Bank, 2010). As a consequence people's vulnerabilities have increased disproportionally in recent years. Individuals' ability to anticipate, prepare, cope, respond and recover from disasters differs according to some socio-economic attributes present in each community. The research on natural disasters in a gendered perspective is fairly limited compared to other variables. In fact, the need to track social vulnerabilities and investigate gender dynamics into all levels of the disaster life cycle has been recognized only recently, during the Sendai Framework for Disaster Risk Reduction (March 2015). For this purpose, we propose a review of the literature regarding the ways men and women conceptualise natural disasters, prepare and react, both physically and psychologically, to catastrophic events. This work tries to give some interpretation to these subjects analysing the social context in which sex discrepancies are developed, in different countries, cultures and in various socio-economic backgrounds. Findings highlighted that women perceived more the risk, and they have developed personal strategies to better react and withstand the impacts of negative occurrences. Being at home, working in the house and caring the children have been always placed them at a higher exposure to disasters. However, these circumstances, they gave them the means to organize the family for evacuations thanks to their deep knowledge of the territory they live and the neighbourhood networks they create. Women seem to be not sole victims, but valuable resources able to take leading roles in building disaster resilience. Some case studies, however, continue to demonstrate a female's higher fear and powerless face hazardous events than their counterparts, showing various mental health disorders

  8. NASA's Applied Sciences: Natural Disasters Program

    Science.gov (United States)

    Kessler, Jason L.

    2010-01-01

    Fully utilize current and near-term airborne and spaceborne assets and capabilities. NASA spaceborne instruments are for research but can be applied to natural disaster response as appropriate. NASA airborne instruments can be targeted specifically for disaster response. Could impact research programs. Better flow of information improves disaster response. Catalog capability, product, applicable disaster, points of contact. Ownership needs to come from the highest level of NASA - unpredictable and irregular nature of disasters requires contingency funding for disaster response. Build-in transfer of applicable natural disaster research capabilities to operational functionality at other agencies (e.g., USFS, NOAA, FEMA...) at the outset, whenever possible. For the Decadal Survey Missions, opportunities exist to identify needs and requirements early in the mission design process. Need to understand additional needs and commitments for meeting the needs of the disaster community. Opportunity to maximize disaster response and mitigation from the Decadal Survey Missions. Additional needs or capabilities may require agency contributions.

  9. Structure of HI-6*sarin-acetylcholinesterase determined by X-ray crystallography and molecular dynamics simulation: reactivator mechanism and design.

    Directory of Open Access Journals (Sweden)

    Fredrik Ekström

    Full Text Available Organophosphonates such as isopropyl metylphosphonofluoridate (sarin are extremely toxic as they phosphonylate the catalytic serine residue of acetylcholinesterase (AChE, an enzyme essential to humans and other species. Design of effective AChE reactivators as antidotes to various organophosphonates requires information on how the reactivators interact with the phosphonylated AChEs. However, such information has not been available hitherto because of three main challenges. First, reactivators are generally flexible in order to change from the ground state to the transition state for reactivation; this flexibility discourages determination of crystal structures of AChE in complex with effective reactivators that are intrinsically disordered. Second, reactivation occurs upon binding of a reactivator to the phosphonylated AChE. Third, the phosphorous conjugate can develop resistance to reactivation. We have identified crystallographic conditions that led to the determination of a crystal structure of the sarin(nonaged-conjugated mouse AChE in complex with [(E-[1-[(4-carbamoylpyridin-1-ium-1-ylmethoxymethyl]pyridin-2-ylidene]methyl]-oxoazanium dichloride (HI-6 at a resolution of 2.2 A. In this structure, the carboxyamino-pyridinium ring of HI-6 is sandwiched by Tyr124 and Trp286, however, the oxime-pyridinium ring is disordered. By combining crystallography with microsecond molecular dynamics simulation, we determined the oxime-pyridinium ring structure, which shows that the oxime group of HI-6 can form a hydrogen-bond network to the sarin isopropyl ether oxygen, and a water molecule is able to form a hydrogen bond to the catalytic histidine residue and subsequently deprotonates the oxime for reactivation. These results offer insights into the reactivation mechanism of HI-6 and design of better reactivators.

  10. Acute effects of a sarin-like organophosphorus agent, bis(isopropyl methyl)phosphonate, on cardiovascular parameters in anaesthetized, artificially ventilated rats

    Energy Technology Data Exchange (ETDEWEB)

    Watanabe, Yoshimasa [Department of Pharmacology, Graduate School of Medical Sciences, Nagoya City University, Nagoya (Japan); Itoh, Takeo, E-mail: titoh@med.nagoya-cu.ac.jp [Department of Pharmacology, Graduate School of Medical Sciences, Nagoya City University, Nagoya (Japan); Shiraishi, Hiroaki [Department of Forensic Medicine, Institute of Biomedical and Health Sciences, Hiroshima University, Hiroshima (Japan); Maeno, Yoshitaka [Department of Forensic Medical Science, Graduate School of Medical Sciences, Nagoya City University, Nagoya (Japan); Arima, Yosuke; Torikoshi, Aiko; Namera, Akira [Department of Forensic Medicine, Institute of Biomedical and Health Sciences, Hiroshima University, Hiroshima (Japan); Makita, Ryosuke [Department of Nursing, Faculty of Health Sciences, Hiroshima Cosmopolitan University, Hiroshima (Japan); Yoshizumi, Masao [Department of Cardiovascular Physiology and Medicine, Institute of Biomedical and Health Sciences, Hiroshima University, Hiroshima (Japan); Nagao, Masataka [Department of Forensic Medicine, Institute of Biomedical and Health Sciences, Hiroshima University, Hiroshima (Japan)

    2013-10-01

    The organophosphorus compound sarin irreversibly inhibits acetylcholinesterase. We examined the acute cardiovascular effects of a sarin-like organophosphorus agent, bis(isopropyl methyl)phosphonate (BIMP), in anaesthetized, artificially ventilated rats. Intravenous administration of BIMP (0.8 mg/kg; the LD50 value) induced a long-lasting increase in blood pressure and tended to increase heart rate. In rats pretreated with the non-selective muscarinic-receptor antagonist atropine, BIMP significantly increased both heart rate and blood pressure. In atropine-treated rats, hexamethonium (antagonist of ganglionic nicotinic receptors) greatly attenuated the BIMP-induced increase in blood pressure without changing the BIMP-induced increase in heart rate. In rats treated with atropine plus hexamethonium, intravenous phentolamine (non-selective α-adrenergic receptor antagonist) plus propranolol (non-selective β-adrenergic receptor antagonist) completely blocked the BIMP-induced increases in blood pressure and heart rate. In atropine-treated rats, the reversible acetylcholinesterase inhibitor neostigmine (1 mg/kg) induced a transient increase in blood pressure, but had no effect on heart rate. These results suggest that in anaesthetized rats, BIMP induces powerful stimulation of sympathetic as well as parasympathetic nerves and thereby modulates heart rate and blood pressure. They may also indicate that an action independent of acetylcholinesterase inhibition contributes to the acute cardiovascular responses induced by BIMP. - Highlights: • A sarin-like agent BIMP markedly increased blood pressure in anaesthetized rats. • Muscarinic receptor blockade enhanced the BIMP-induced increase in blood pressure. • Ganglionic nicotinic receptor blockade attenuated the BIMP-induced response. • Blockade of α- as well as β-receptors attenuated the BIMP-induced response.

  11. Post- and peritraumatic stress in disaster survivors: an explorative study about the influence of individual and event characteristics across different types of disasters

    Directory of Open Access Journals (Sweden)

    Anna Grimm

    2012-05-01

    Full Text Available Background : Examination of existing research on posttraumatic adjustment after disasters suggests that survivors’ posttraumatic stress levels might be better understood by investigating the influence of the characteristics of the event experienced on how people thought and felt, during the event as well as afterwards. Objective : To compare survivors’ perceived post- and peritraumatic emotional and cognitive reactions across different types of disasters. Additionally, to investigate individual and event characteristics. Design : In a European multi-centre study, 102 survivors of different disasters terror attack, flood, fire and collapse of a building were interviewed about their responses during the event. Survivors’ perceived posttraumatic stress levels were assessed with the Impact of Event Scale-Revised (IES-R. Peritraumatic emotional stress and risk perception were rated retrospectively. Influences of individual characteristics, such as socio-demographic data, and event characteristics, such as time and exposure factors, on post- and peritraumatic outcomes were analyzed. Results : Levels of reported post- and peritraumatic outcomes differed significantly between types of disasters. Type of disaster was a significant predictor of all three outcome variables but the factors gender, education, time since event, injuries and fatalities were only significant for certain outcomes. Conclusion : Results support the hypothesis that there are differences in perceived post- and peritraumatic emotional and cognitive reactions after experiencing different types of disasters. However, it should be noted that these findings were not only explained by the type of disaster itself but also by individual and event characteristics. As the study followed an explorative approach, further research paths are discussed to better understand the relationships between variables.

  12. A Rapid and Sensitive Strip-Based Quick Test for Nerve Agents Tabun, Sarin, and Soman Using BODIPY-Modified Silica Materials.

    Science.gov (United States)

    Climent, Estela; Biyikal, Mustafa; Gawlitza, Kornelia; Dropa, Tomáš; Urban, Martin; Costero, Ana M; Martínez-Máñez, Ramón; Rurack, Knut

    2016-08-01

    Test strips that in combination with a portable fluorescence reader or digital camera can rapidly and selectively detect chemical warfare agents (CWAs) such as Tabun (GA), Sarin (GB), and Soman (GD) and their simulants in the gas phase have been developed. The strips contain spots of a hybrid indicator material consisting of a fluorescent BODIPY indicator covalently anchored into the channels of mesoporous SBA silica microparticles. The fluorescence quenching response allows the sensitive detection of CWAs in the μg m(-3) range in a few seconds.

  13. Quantitation of metabolites of the nerve agents sarin, soman, cyclohexylsarin, VX, and Russian VX in human urine using isotope-dilution gas chromatography-tandem mass spectrometry.

    Science.gov (United States)

    Barr, John R; Driskell, W J; Aston, Linda S; Martinez, Rodolfo A

    2004-01-01

    Organophosphorus nerve agents are among the most toxic organic compounds known and continue to be a threat for both military and terrorist use. We have developed an isotope-dilution gas chromatography-tandem mass spectrometric (GC-MS-MS) method for quantitating the urinary metabolites of the organophosphorus nerve agents sarin (GB), soman (GD), VX, Russian VX (RVX), and cyclohexylsarin (GF). Urine samples were acidified, extracted into ether-acetonitrile, derivatized by methylation with diazomethane, and analyzed by GC-MS-MS. The limits of detection were less than 1 micro g/L for all analytes.

  14. Waiting for Disasters: A Risk Reduction Assessment of Technological Disasters

    Science.gov (United States)

    Rovins, Jane; Winningham, Sam

    2010-05-01

    This session provides a risk reduction/mitigation assessment of natural hazards causation of technological disasters and possible solution. People use technology in an attempt to not only control their environment but nature itself in order to make them feel safe and productive. Most strategies for managing hazards followed a traditional planning model i.e. study the problem, identify and implement a solution, and move on to the next problem. This approach is often viewed as static model and risk reduction is more of an upward, positive, linear trend. However, technological disasters do not allow risk reduction action to neatly fit this upward, positive, linear trend with actual or potential threats to the environment and society. There are different types of technological disasters, including industrial accidents; pipeline ruptures; accidents at power, water and heat supply systems and other lines of communication; sudden collapse of buildings and mines; air crashes; shipwrecks; automobile and railway accidents to name a few. Natural factors can play an essential role in triggering or magnifying technological disasters. They can result from the direct destruction of given technical objects by a hazardous natural process such as the destruction of an atomic power plant or chemical plant due to an earthquake. Other examples would include the destruction of communications or infrastructure systems by heavy snowfalls, strong winds, avalanches. Events in the past ten years clearly demonstrate that natural disasters and the technological disasters that accompany them are not problems that can be solved in isolation and risk reduction can play an important part. Risk reduction was designed to head off the continuing rising financial and structural tolls from disasters. All Hazard Risk Reduction planning was supposed to include not only natural, but technological, and human-made disasters as well. The subsequent disaster risk reduction (DRR) indicators were to provide the

  15. Measuring vulnerability to disaster displacement

    Science.gov (United States)

    Brink, Susan A.; Khazai, Bijan; Power, Christopher; Wenzel, Friedemann

    2015-04-01

    Large scale disasters can cause devastating impacts in terms of population displacement. Between 2008 and 2013, on average 27 million people were displaced annually by disasters (Yonetani 2014). After large events such as hurricane Katrina or the Port-au-Prince earthquake, images of inadequate public shelter and concerns about large scale and often inequitable migration have been broadcast around the world. Population displacement can often be one of the most devastating and visible impacts of a natural disaster. Despite the importance of population displacement in disaster events, measures to understand the socio-economic vulnerability of a community often use broad metrics to estimate the total socio-economic risk of an event rather than focusing on the specific impacts that a community faces in a disaster. Population displacement is complex and multi-causal with the physical impact of a disaster interacting with vulnerability arising from the response, environmental issues (e.g., weather), cultural concerns (e.g., expectations of adequate shelter), and many individual factors (e.g., mobility, risk perception). In addition to the complexity of the causes, population displacement is difficult to measure because of the wide variety of different terms and definitions and its multi-dimensional nature. When we speak of severe population displacement, we may refer to a large number of displaced people, an extended length of displacement or associated difficulties such as poor shelter quality, risk of violence and crime in shelter communities, discrimination in aid, a lack of access to employment or other difficulties that can be associated with large scale population displacement. We have completed a thorough review of the literature on disaster population displacement. Research has been conducted on historic events to understand the types of negative impacts associated with population displacement and also the vulnerability of different groups to these impacts. We

  16. Promoting a culture of disaster preparedness.

    Science.gov (United States)

    Medina, Angeli

    2016-01-01

    Disasters from all hazards, ranging from natural disasters, human-induced disasters, effects of climate change to social conflicts can significantly affect the healthcare system and community. This requires a paradigm shift from a reactive approach to a disaster risk management 'all-hazards' approach. Disaster management is a joint effort of the city, state, regional, national, multi-agencies and international organisations that requires effective communication, collaboration and coordination. This paper offers lessons learned and best practices, which, when taken into consideration, can strengthen the phases of disaster risk management.

  17. Performance of attack strategies on modular networks

    CERN Document Server

    da Cunha, Bruno Requião

    2016-01-01

    Vulnerabilities of complex networks have became a trend topic in complex systems recently due to its real world applications. Most real networks tend to be very fragile to high betweenness adaptive attacks. However, recent contributions have shown the importance of interconnected nodes in the integrity of networks and module-based attacks have appeared promising when compared to traditional malicious non-adaptive attacks. In the present work we deeply explore the trade-off associated with attack procedures, introducing a generalized robustness measure and presenting an attack performance index that takes into account both robustness of the network against the attack and the run-time needed to obtained the list of targeted nodes for the attack. Besides, we introduce the concept of deactivation point aimed to mark the point at which the network stops to function properly. We then show empirically that non-adaptive module-based attacks perform better than high degree and betweenness adaptive attacks in networks ...

  18. Mitigating Higher Ed Cyber Attacks

    Science.gov (United States)

    Rogers, Gary; Ashford, Tina

    2015-01-01

    In this presentation we will discuss the many and varied cyber attacks that have recently occurred in the higher ed community. We will discuss the perpetrators, the victims, the impact and how these institutions have evolved to meet this threat. Mitigation techniques and defense strategies will be covered as will a discussion of effective security…

  19. Television journalism during terror attacks

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    2008-01-01

    This article views television news coverage of ongoing terrorist attacks and their immediate aftermath as a special genre within journalism, and describes norms connected with the genre. The description is based on qualitative analyses of the coverage on major American networks the first 24 hours...

  20. FLOODING ATTACK AWARE SECURE AODV

    Directory of Open Access Journals (Sweden)

    S. Madhavi

    2013-01-01

    Full Text Available Providing security in a Mobile Ad hoc Network (MANET is a challenging task due to its inherent nature. Flooding is a type of Denial of Service (DoS attack in MANET. Intentional flooding may lead to disturbances in the networking operation. This kind of attack consumes battery power, storage space and bandwidth. Flooding the excessive number of packets may degrade the performance of the network. This study considers hello flooding attack. As the hello packets are continuously flooded by the malicious node, the neighbor node is not able to process other packets. The functioning of the legitimate node is diverted and destroys the networking operation. Absence of hello packet during the periodical hello interval may lead to wrong assumption that the neighbor node has moved away. So one of the intermediate neighbor nodes sends Route Error (RERR message and the source node reinitiates the route discovery process. In a random fashion the hello interval values are changed and convey this information to other nodes in the network in a secured manner. This study identifies and prevents the flooding attack. This methodology considers the performance parameters such as packet delivery ratio, delay and throughput. This algorithm is implemented in Secure AODV and tested in ad hoc environment. The result of the proposed algorithm decreases the control overhead by 2%.

  1. Television Journalism During Terror Attacks

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    This article views television news coverage of ongoing terrorist attacks and their immediate aftermath as a special genre within journalism, and describes norms connected with the genre. The description is based on qualitative analyses of the coverage on the major American networks in the fi rst 24...

  2. 20 CFR 625.7 - Disaster Unemployment Assistance: Duration.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Disaster Unemployment Assistance: Duration... DISASTER UNEMPLOYMENT ASSISTANCE § 625.7 Disaster Unemployment Assistance: Duration. DUA shall be payable... unemployment which begin during a Disaster Assistance Period. ...

  3. Monitoring recent lake level variations on the Tibetan Plateau using CryoSat-2 SARIn mode data

    Science.gov (United States)

    Jiang, Liguang; Nielsen, Karina; Andersen, Ole B.; Bauer-Gottwein, Peter

    2017-01-01

    Lakes on the Tibetan Plateau (TP) are of great interest due to their value as water resources but also as an important indicator of climate change. However, in situ data in this region are extremely scarce and only a few lakes have gauge measurements. Satellite altimetry has been used successfully to monitor lake levels. In this study, Cryosat-2 SARIn mode data over the period 2010-2015 are used to investigate recent lake level variations. The estimated water levels of the 70 largest lakes (> 100 km2) on the TP show that 48 lakes reveal a rising trend (avg. 0.28 ± 0.06 m/yr) while the other 22 show a slightly decreasing trend (avg. -0.10 ± 0.04 m/yr). To compare with the change rates during 2003-2009, ICESat data which cover 42 of the 70 lakes are also used. When combining the data, the results show that during the period of 2003-2015, 28 lakes maintained a rising trend and the change rates are comparable. Lakes in the northern part of the TP experienced pronounced rising (avg. 0.37 ± 0.10 m/yr), while lakes in southern part were steady or decreasing even in glaciated basins with high precipitation. Factor analysis indicates that driving factors for lake change are variable due to high spatial heterogeneity. However, autumn/winter temperature plays an important role in lake level change. These results demonstrate that lakes on the TP are still rapidly changing under climate change, especially in northern part of the TP, but the driving factors are variable and more research is needed to understand the mechanisms behind observed changes.

  4. Terrorist attacks escalate in frequency and fatalities preceding highly lethal attacks.

    Science.gov (United States)

    Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G; Schimel, Jeff; Webber, David

    2014-01-01

    Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates--both in the number of people killed per attack and in the frequency of attacks--leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack.

  5. Attack Vulnerability of Network Controllability.

    Science.gov (United States)

    Lu, Zhe-Ming; Li, Xin-Feng

    2016-01-01

    Controllability of complex networks has attracted much attention, and understanding the robustness of network controllability against potential attacks and failures is of practical significance. In this paper, we systematically investigate the attack vulnerability of network controllability for the canonical model networks as well as the real-world networks subject to attacks on nodes and edges. The attack strategies are selected based on degree and betweenness centralities calculated for either the initial network or the current network during the removal, among which random failure is as a comparison. It is found that the node-based strategies are often more harmful to the network controllability than the edge-based ones, and so are the recalculated strategies than their counterparts. The Barabási-Albert scale-free model, which has a highly biased structure, proves to be the most vulnerable of the tested model networks. In contrast, the Erdős-Rényi random model, which lacks structural bias, exhibits much better robustness to both node-based and edge-based attacks. We also survey the control robustness of 25 real-world networks, and the numerical results show that most real networks are control robust to random node failures, which has not been observed in the model networks. And the recalculated betweenness-based strategy is the most efficient way to harm the controllability of real-world networks. Besides, we find that the edge degree is not a good quantity to measure the importance of an edge in terms of network controllability.

  6. Building Networks of Disaster Preparedness Schools in Taiwan

    OpenAIRE

    Chang, Tzu-chau; Lin, Weiru

    2012-01-01

    The aims of the education for natural disaster preparedness in Taiwan are to prepare every school disaster free and every student with disaster preparedness. The education for disaster preparedness has been through three stages since 2003: project for cultivating professionals for disaster preparedness education (2003-2006), project for disaster preparedness schools (2006- 2010), and building networks of disaster preparedness schools (2011-2014). The framework of the disaster preparedness edu...

  7. Building Networks of Disaster Preparedness Schools in Taiwan

    OpenAIRE

    Chang, Tzu-chau; Lin, Weiru

    2012-01-01

    The aims of the education for natural disaster preparedness in Taiwan are to prepare every school disaster free and every student with disaster preparedness. The education for disaster preparedness has been through three stages since 2003: project for cultivating professionals for disaster preparedness education (2003-2006), project for disaster preparedness schools (2006- 2010), and building networks of disaster preparedness schools (2011-2014). The framework of the disaster preparedness edu...

  8. Natural disasters and suicide: evidence from Japan.

    Science.gov (United States)

    Matsubayashi, Tetsuya; Sawada, Yasuyuki; Ueda, Michiko

    2013-04-01

    Previous research shows no consensus as to whether and how natural disasters affect suicide rates in their aftermath. Using prefecture-level panel data of natural disasters and suicide in Japan between 1982 and 2010, we estimate both contemporaneous and lagged effects of natural disasters on the suicide rates of various demographic groups. We find that when the damage caused by natural disasters is extremely large, as in the case of the Great Hanshin-Awaji Earthquake in 1995, suicide rates tend to increase in the immediate aftermath of the disaster and several years later. However, when the damage by natural disasters is less severe, suicide rates tend to decrease after the disasters, especially one or two years later. Thus, natural disasters affect the suicide rates of affected populations in a complicated way, depending on the severity of damages as well as on how many years have passed since the disaster. We also find that the effects of natural disasters on suicide rates vary considerably across demographic groups, which suggests that some population subgroups are more vulnerable to the impact of natural disasters than others. We then test the possibility that natural disasters enhance people's willingness to help others in society, an effect that may work as a protective factor against disaster victims' suicidal risks. We find that natural disasters increase the level of social ties in affected communities, which may mitigate some of the adverse consequence of natural disasters, resulting in a decline in suicide rates. Our findings also indicate that when natural disasters are highly destructive and disruptive, such protective features of social connectedness are unlikely to be enough to compensate for the severe negative impact of disasters on health outcomes.

  9. Challenges of DNA profiling in mass disaster investigations.

    Science.gov (United States)

    Alonso, Antonio; Martin, Pablo; Albarrán, Cristina; Garcia, Pilar; Fernandez de Simon, Lourdes; Jesús Iturralde, Maria; Fernández-Rodriguez, Amparo; Atienza, Inmaculada; Capilla, Javier; García-Hirschfeld, Julia; Martinez, Pilar; Vallejo, Gloria; García, Oscar; García, Emilio; Real, Pilar; Alvarez, David; León, Antonio; Sancho, Manuel

    2005-08-01

    In cases of mass disaster, there is often a need for managing, analyzing, and comparing large numbers of biological samples and DNA profiles. This requires the use of laboratory information management systems for large-scale sample logging and tracking, coupled with bioinformatic tools for DNA database searching according to different matching algorithms, and for the evaluation of the significance of each match by likelihood ratio calculations. There are many different interrelated factors and circumstances involved in each specific mass disaster scenario that may challenge the final DNA identification goal, such as: the number of victims, the mechanisms of body destruction, the extent of body fragmentation, the rate of DNA degradation, the body accessibility for sample collection, or the type of DNA reference samples availability. In this paper, we examine the different steps of the DNA identification analysis (DNA sampling, DNA analysis and technology, DNA database searching, and concordance and kinship analysis) reviewing the "lessons learned" and the scientific progress made in some mass disaster cases described in the scientific literature. We will put special emphasis on the valuable scientific feedback that genetic forensic community has received from the collaborative efforts of several public and private USA forensic laboratories in assisting with the more critical areas of the World Trade Center (WTC) mass fatality of September 11, 2001. The main challenges in identifying the victims of the recent South Asian Tsunami disaster, which has produced the steepest death count rise in history, will also be considered. We also present data from two recent mass fatality cases that involved Spanish victims: the Madrid terrorist attack of March 11, 2004, and the Yakolev-42 aircraft accident in Trabzon, Turkey, of May 26, 2003.

  10. No Evidence of Suicide Increase Following Terrorist Attacks in the United States: An Interrupted Time-Series Analysis of September 11 and Oklahoma City

    Science.gov (United States)

    Pridemore, William Alex; Trahan, Adam; Chamlin, Mitchell B.

    2009-01-01

    There is substantial evidence of detrimental psychological sequelae following disasters, including terrorist attacks. The effect of these events on extreme responses such as suicide, however, is unclear. We tested competing hypotheses about such effects by employing autoregressive integrated moving average techniques to model the impact of…

  11. Education and research on disaster nursing in Japan.

    Science.gov (United States)

    Yamamoto, Aiko

    2008-01-01

    The educational and research program "Disaster Nursing in a Ubiquitous Society in Japan" has facilitated the development of various networks for disaster nursing, disaster nursing care strategies, and disaster nursing education. Replication of these activities related to disaster nursing are encouraged globally to improve disaster outcomes.

  12. Perfection of Recent Attacks using IP

    Directory of Open Access Journals (Sweden)

    A. RENGARAJAN

    2012-02-01

    Full Text Available The Internet threat monitoring (ITM systems have been deployed to detect widespread attacks on the Internet in recent years. However, the effectiveness of ITM systems critically depends on the confidentiality of the location of their monitors. If adversaries learn the monitor locations of an ITM system, they can bypass the monitors and focus on the uncovered IP address space without being detected. In this paper, we study a new class of attacks, the invisible LOCalization (iLOC attack. The iLOC attack can accurately and invisibly localize monitors of ITM systems. In the iLOC attack, the attacker launches low-rate port-scan traffic, encoded with a selected pseudo noise code (PN-code, to targeted networks. While the secret PN-code is invisible to others, the attacker can accurately determine the existence of monitors in the targeted networks based on whether the PN-code is embedded in the report data queried from the data center of the ITM system. We formally analyze the impact of various parameters on attack effectiveness. We implement the iLOC attack and conduct the performance evaluation on a real-world ITM system to demonstrate the possibility of such attacks. We also conduct extensive simulations on the iLOC attack using real-world traces. Our data show that the iLOC attack can accurately identify monitors while being invisible to ITM systems. Finally, we present a set of guidelines to counteract the iLOC attack.

  13. SBA Disaster Loan Data FY2012

    Data.gov (United States)

    Small Business Administration — SBA Disaster Loan Data for FY 2012 provides verified loss and approved loan amount totals for both home and business disaster loans, segmented by city, county, zip...

  14. 78 FR 4967 - Alabama Disaster #AL-00046

    Science.gov (United States)

    2013-01-23

    ... From the Federal Register Online via the Government Publishing Office SMALL BUSINESS ADMINISTRATION Alabama Disaster AL-00046 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY... adversely affected by the disaster: Primary Counties: Mobile; Pike. Contiguous Counties: Alabama:...

  15. 78 FR 44187 - Montana Disaster # MT-00079

    Science.gov (United States)

    2013-07-23

    ... From the Federal Register Online via the Government Publishing Office SMALL BUSINESS ADMINISTRATION Montana Disaster MT-00079 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY... have been determined to be adversely affected by the disaster: Primary Counties: Blaine,...

  16. 78 FR 45283 - Missouri Disaster #MO-00066

    Science.gov (United States)

    2013-07-26

    ... From the Federal Register Online via the Government Publishing Office SMALL BUSINESS ADMINISTRATION Missouri Disaster MO-00066 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY... adversely affected by the disaster: Primary Counties: Barton; Callaway; Cape Girardeau; Chariton;...

  17. 78 FR 15796 - Michigan Disaster #MI-00038.

    Science.gov (United States)

    2013-03-12

    ... From the Federal Register Online via the Government Publishing Office SMALL BUSINESS ADMINISTRATION Michigan Disaster MI-00038. AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY... adversely affected by the disaster: Primary Counties: Mecosta. Contiguous Counties: Michigan:...

  18. SBA Disaster Loan Data FY2005

    Data.gov (United States)

    Small Business Administration — SBA Disaster Loan Data for FY 2005 provides verified loss and approved loan amount totals for both home and business disaster loans, segmented by city, county, zip...

  19. SBA Disaster Loan Data FY2004

    Data.gov (United States)

    Small Business Administration — SBA Disaster Loan Data for FY 2004 provides verified loss and approved loan amount totals for both home and business disaster loans, segmented by city, county, zip...

  20. [Perspectives on researches in disaster psychiatry].

    Science.gov (United States)

    Tomita, Hiroaki

    2014-01-01

    After experiencing the catastrophic Great East Japan Earthquake and Tsunami disaster in 2011, Tohoku University founded the International Research Institute of Disaster Science (IRIDeS) in April, 2012. IRIDeS, comprising 7 divisions and 36 laboratories with broad areas of specialization, from the humanities to natural sciences, aims to become a global center for the study of disasters and disaster mitigation, learning from and building upon past lessons in disaster management from Japan and around the world. In IRIDeS, the Department of Disaster Psychiatry is in charge of dealing with issues related to disaster psychiatry, including the psychosocial impact of disasters. Now, at more than 2 and a half years after the catastrophic disaster, the psychological impact actually seems to be getting stronger and wider, whereas the memory of the disaster seems to be waning in other areas of the country. In such a situation, where a number of problems need to be resolved, what can/should we do as psychiatrists? On the other hand, other natural disasters, such as storms and floods, have kept hitting Japan, and catastrophes seem to strike somewhere in the world every year. In addition, we need to prepare for the possibility of a Nankai Trough Quake and an earthquake directly hitting the Tokyo area, which may occur sometime in the future. Considering the situation, we need to establish an education system for disaster psychiatry, and proceed with research to collect useful information to prepare for coming disasters. The aim of our department is to integrate multi-faceted basic and clinical research approaches to investigate the following topics: 1) to identify social, psychological, and biological factors involved in the pathophysiology of and recovery from disaster-related mental health problems; 2) to develop systems for disaster prevention, disaster response, and recovery, considering disaster-related psychiatric and psychological issues; 3) to develop useful tools for the

  1. Land tenure, disasters and vulnerability.

    Science.gov (United States)

    Reale, Andreana; Handmer, John

    2011-01-01

    Although often overlooked, land tenure is an important variable impacting on vulnerability to disaster. Vulnerability can occur either where land tenure is perceived to be insecure, or where insecure tenure results in the loss of land, especially when alternative livelihood and housing options are limited. Disasters often provide the catalyst for such loss. This paper avoids making generalisations about the security of particular types of tenure, but instead explores factors that mediate tenure security, particularly in the wake of a disaster. The paper identifies five mediating factors: (1) the local legal system; (2) government administrative authority; (3) the economy; (4) evidence of tenure, and; (5) custom and dominant social attitudes. It is shown that some mediating factors are more salient for particular types of tenure than others. The paper will highlight the importance of land tenure in any assessment of vulnerability, and conclude with suggestions for further research.

  2. Indicators of Disaster Risk and Risk Management

    OpenAIRE

    Omar D. Cardona

    2005-01-01

    This document is the summary report of the IDB-sponsored system of disaster risk and risk management indicators presented at the World Conference on Disaster Reduction in Kobe, Japan, 2005. The indices estimate disaster risk loss, distribution, vulnerability and management for 12 countries in Latin America and the Caribbean. The objective of this program is to facilitate access to relevant information on disaster risk and risk management by national decision-makers, thus making possible the i...

  3. Selective chromo-fluorogenic detection of DFP (a Sarin and Soman mimic) and DCNP (a Tabun mimic) with a unique probe based on a boron dipyrromethene (BODIPY) dye.

    Science.gov (United States)

    Barba-Bon, Andrea; Costero, Ana M; Gil, Salvador; Martínez-Máñez, Ramón; Sancenón, Félix

    2014-11-21

    A novel colorimetric probe (P4) for the selective differential detection of DFP (a Sarin and Soman mimic) and DCNP (a Tabun mimic) was prepared. Probe P4 contains three reactive sites; i.e. (i) a nucleophilic phenol group able to undergo phosphorylation with nerve gases, (ii) a carbonyl group as a reactive site for cyanide; and (iii) a triisopropylsilyl (TIPS) protecting group that is known to react with fluoride. The reaction of P4 with DCNP in acetonitrile resulted in both the phosphorylation of the phenoxy group and the release of cyanide, which was able to react with the carbonyl group of P4 to produce a colour modulation from pink to orange. In contrast, phosphorylation of P4 with DFP in acetonitrile released fluoride that hydrolysed the TIPS group in P4 to yield a colour change from pink to blue. Probe P4 was able to discriminate between DFP and DCNP with remarkable sensitivity; limits of detection of 0.36 and 0.40 ppm for DCNP and DFP, respectively, were calculated. Besides, no interference from other organophosphorous derivatives or with presence of acid was observed. The sensing behaviour of P4 was also retained when incorporated into silica gel plates or onto polyethylene oxide membranes, which allowed the development of simple test strips for the colorimetric detection of DCNP and DFP in the vapour phase. P4 is the first probe capable of colorimetrically differentiating between a Tabun mimic (DCNP) and a Sarin and Soman mimic (DFP).

  4. Synthesis and in-vitro reactivation screening of imidazolium aldoximes as reactivators of sarin and VX-inhibited human acetylcholinesterase (hAChE).

    Science.gov (United States)

    Sharma, Rahul; Gupta, Bhanushree; Sahu, Arvind Kumar; Acharya, Jyotiranjan; Satnami, Manmohan L; Ghosh, Kallol K

    2016-11-25

    Post-treatment of organophosphate (OP) poisoning involves the application of oxime reactivator as an antidote. Structurally different oximes are widely studied to examine their kinetic and mechanistic behavior against OP-inhibited cholinesterase enzyme. A series of structurally related 1,3-disubstituted-2-[(hydroxyiminomethyl)alkyl]imidazolium halides (5a-5e, 9a-9c) were synthesized and further evaluated for their in-vitro reactivation ability to reactivate sarin- and VX-inhibited human acetylcholinesterase (hAChE). The observed results were compared with the reactivation efficacy of standard reactivators; 2-PAM, obidoxime and HI-6. Amongst the synthesized oximes, 5a, 9a and 9b were found to be most potent reactivators against sarin-inhibited hAChE while in case of VX only 9a exhibited comparable reactivity with 2-PAM. Incorporation of pyridinium ring to the imidazole ring resulted in substantial increase in the reactivation strength of prepared reactivator. Physicochemical properties of synthesized reactivators have also been evaluated.

  5. Promoting Disaster Science and Disaster Science Communities as Part of Sound Disaster Preparedness

    Science.gov (United States)

    McNutt, M. K.

    2015-12-01

    During disasters, effectively engaging the vast expertise of the academic community can help responders make timely and critical decisions. A barrier to such engagement, however, is the cultural gap between reward systems in academia and in the disaster response community. Responders often are focused on ending the emergency quickly with minimal damage. Academic scientists often need to produce peer reviewed publications to justify their use of time and money. Each community is used to speaking to different audiences, and delivering answers on their own time scales. One approach to bridge this divide is to foster a cohesive community of interdisciplinary disaster scientists: researchers who focus on crises that severely and negatively disrupt the environment or threaten human health, and are able to apply scientific methods in a timely manner to understand how to prevent, mitigate, respond to, or recover from such events. Once organized, a disaster science community could develop its own unique culture. It is well known in the disaster response community that all the preparation that takes place before an event ever occurs is what truly makes the difference in reducing response time, improving coordination, and ultimately reducing impacts. In the same vein, disaster scientists would benefit from consistently interacting with the response community. The advantage of building a community for all disasters, rather than for just one type, is that it will help researchers maintain momentum between emergencies, which may be decades or more apart. Every disaster poses similar challenges: Knowing when to speak to the press and what to say; how to get rapid, actionable peer review; how to keep proprietary industry information confidential; how to develop "no regrets" actions; and how to communicate with decision makers and the public. During the Deepwater Horizonspill, I personally worked with members of the academic research community who cared not whether they got a peer

  6. Zika Attacks Nerves, Muscles, Other Tissues

    Science.gov (United States)

    ... page: https://medlineplus.gov/news/fullstory_164010.html Zika Attacks Nerves, Muscles, Other Tissues Monkey study may ... 2017 (HealthDay News) -- Scientists have learned where the Zika virus attacks the body in monkeys. In their ...

  7. Classification of cyber attacks in South Africa

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-05-01

    Full Text Available This paper introduces a classification scheme for the visual classification of cyber attacks. Through the use of the scheme, the impact of various cyber attacks throughout the history of South Africa are investigated and classified. The goal...

  8. Using an ontology for network attack planning

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-09-01

    Full Text Available The modern complexity of network attacks and their counter-measures (cyber operations) requires detailed planning. This paper presents a Network Attack Planning ontology which is aimed at providing support for planning such network operations within...

  9. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  10. Social engineering attack examples, templates and scenarios

    CSIR Research Space (South Africa)

    Mouton, Francois

    2016-06-01

    Full Text Available link. A social engineering attack targets this weakness by using various manipulation techniques to elicit sensitive information. The field of social engineering is still in its early stages with regard to formal definitions, attack frameworks...

  11. 77 FR 16314 - Kansas Disaster # KS-00062

    Science.gov (United States)

    2012-03-20

    ... ADMINISTRATION Kansas Disaster KS-00062 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY: This is a notice of an Administrative declaration of a disaster for the State of Kansas dated 03/12/2012... INFORMATION CONTACT: A. Escobar, Office of Disaster Assistance, U.S. Small Business Administration, 409...

  12. 75 FR 42470 - Wyoming Disaster #WY-00014

    Science.gov (United States)

    2010-07-21

    ... ADMINISTRATION Wyoming Disaster WY-00014 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY: This is a Notice of the Presidential declaration of a major disaster for Public Assistance Only for the..., Fort Worth, TX 76155. FOR FURTHER INFORMATION CONTACT: A. Escobar, Office of Disaster Assistance,...

  13. 77 FR 16314 - Alaska Disaster #AK-00024

    Science.gov (United States)

    2012-03-20

    ... ADMINISTRATION Alaska Disaster AK-00024 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY: This is a notice of an Administrative declaration of a disaster for the State of Alaska dated 03/13/2012... INFORMATION CONTACT: A. Escobar, Office of Disaster Assistance, U.S. Small Business Administration, 409...

  14. 78 FR 39822 - Texas Disaster #TX-00409

    Science.gov (United States)

    2013-07-02

    ... ADMINISTRATION Texas Disaster TX-00409 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY: This is a notice of an Administrative declaration of a disaster for the State of Texas dated 06/25/2013... CONTACT: A. Escobar, Office of Disaster Assistance, U.S. Small Business Administration, 409 3rd Street...

  15. 78 FR 47816 - Ohio Disaster # OH-00040

    Science.gov (United States)

    2013-08-06

    ... ADMINISTRATION Ohio Disaster OH-00040 AGENCY: U.S. Small Business Administration . ACTION: Notice. SUMMARY: This is a notice of an Administrative declaration of a disaster for the State of Ohio dated 07/29/2013... INFORMATION CONTACT: A. Escobar, Office of Disaster Assistance, U.S. Small Business Administration, 409...

  16. 76 FR 53019 - Texas Disaster #TX-00380

    Science.gov (United States)

    2011-08-24

    ... ADMINISTRATION Texas Disaster TX-00380 AGENCY: U.S. Small Business Administration. ACTION: Notice SUMMARY: This is a Notice of the Presidential declaration of a major disaster for Public Assistance Only for the..., Fort Worth, TX 76155. FOR FURTHER INFORMATION CONTACT: A Escobar, Office of Disaster Assistance,...

  17. 76 FR 60959 - Texas Disaster # TX-00382

    Science.gov (United States)

    2011-09-30

    ... ADMINISTRATION Texas Disaster TX-00382 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY: This is a Notice of the Presidential declaration of a major disaster for Public Assistance Only for the... 76155. FOR FURTHER INFORMATION CONTACT: A. Escobar, Office of Disaster Assistance, U.S. Small...

  18. 76 FR 47637 - Montana Disaster #MT-00062

    Science.gov (United States)

    2011-08-05

    ... ADMINISTRATION Montana Disaster MT-00062 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY: This is a Notice of the Presidential declaration of a major disaster for the State of Montana (FEMA..., Fort Worth, TX 76155. FOR FURTHER INFORMATION CONTACT: A. Escobar, Office of Disaster Assistance,...

  19. 78 FR 47815 - Colorado Disaster # CO-00060

    Science.gov (United States)

    2013-08-06

    ... ADMINISTRATION Colorado Disaster CO-00060 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY: This is a Notice of the Presidential declaration of a major disaster for Public Assistance Only for the... Disaster Assistance, U.S. Small Business Administration, 409 3rd Street SW., Suite 6050, Washington,...

  20. 77 FR 16315 - Ohio Disaster #OH-00032

    Science.gov (United States)

    2012-03-20

    ... ADMINISTRATION Ohio Disaster OH-00032 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY: This is a notice of an Administrative declaration of a disaster for the State of Ohio dated 03/13/2012... CONTACT: A. Escobar, Office of Disaster Assistance, U.S. Small Business Administration, 409 3rd Street...

  1. 76 FR 61775 - Kansas Disaster #KS-00059

    Science.gov (United States)

    2011-10-05

    ... ADMINISTRATION Kansas Disaster KS-00059 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY: This is a Notice of the Presidential declaration of a major disaster for Public Assistance Only for the..., Fort Worth, TX 76155. FOR FURTHER INFORMATION CONTACT: A. Escobar, Office of Disaster Assistance,...

  2. 76 FR 11835 - Oregon Disaster #OR-00036

    Science.gov (United States)

    2011-03-03

    ... ADMINISTRATION Oregon Disaster OR-00036 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY: This is a Notice of the Presidential declaration of a major disaster for Public Assistance Only for the... CONTACT: A. Escobar, Office of Disaster Assistance, U.S. Small Business Administration, 409 3rd Street,...

  3. 76 FR 35260 - Illinois Disaster # IL-00030

    Science.gov (United States)

    2011-06-16

    ... ADMINISTRATION Illinois Disaster IL-00030 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY: This is a Notice of the Presidential declaration of a major disaster for the State of Illinois (FEMA..., Fort Worth, TX 76155. FOR FURTHER INFORMATION CONTACT: A. Escobar, Office of Disaster Assistance,...

  4. 75 FR 70763 - Texas Disaster #TX-00363

    Science.gov (United States)

    2010-11-18

    ... ADMINISTRATION Texas Disaster TX-00363 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY: This is a notice of an Administrative declaration of a disaster for the State of Texas dated 11/09/2010... INFORMATION CONTACT: A. Escobar, Office of Disaster Assistance, U.S. Small Business Administration, 409...

  5. 78 FR 9448 - Arkansas Disaster #AR-00061

    Science.gov (United States)

    2013-02-08

    ... ADMINISTRATION Arkansas Disaster AR-00061 AGENCY: U.S. Small Business Administration. ACTION: Notice SUMMARY: This is a Notice of the Presidential declaration of a major disaster for Public Assistance Only for the... Disaster Assistance, U.S. Small Business Administration, 409 3rd Street SW., Suite 6050, Washington,...

  6. 76 FR 47637 - Kansas Disaster #KS-00055

    Science.gov (United States)

    2011-08-05

    ... ADMINISTRATION Kansas Disaster KS-00055 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY: This is a Notice of the Presidential declaration of a major disaster for Public Assistance Only for the... CONTACT: A. Escobar, Office of Disaster Assistance, U.S. Small Business Administration, 409 3rd Street,...

  7. 77 FR 16315 - Indiana Disaster #IN-00041

    Science.gov (United States)

    2012-03-20

    ... ADMINISTRATION Indiana Disaster IN-00041 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY: This is a Notice of the Presidential declaration of a major disaster for the State of Indiana (FEMA... Disaster Assistance, U.S. Small Business Administration, 409 3rd Street SW., Suite 6050, Washington,...

  8. 78 FR 51262 - Wisconsin Disaster # WI-00046

    Science.gov (United States)

    2013-08-20

    ... ADMINISTRATION Wisconsin Disaster WI-00046 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY: This is a Notice of the Presidential declaration of a major disaster for Public Assistance Only for the..., Office of Disaster Assistance, U.S. Small Business Administration, 409 3rd Street, SW., Suite...

  9. 78 FR 39821 - Alaska Disaster #AK-00029

    Science.gov (United States)

    2013-07-02

    ... ADMINISTRATION Alaska Disaster AK-00029 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY: This is a Notice of the Presidential declaration of a major disaster for Public Assistance Only for the..., Fort Worth, TX 76155. FOR FURTHER INFORMATION CONTACT: A. Escobar, Office of Disaster Assistance,...

  10. 76 FR 44647 - Ohio Disaster #OH-00029

    Science.gov (United States)

    2011-07-26

    ... ADMINISTRATION Ohio Disaster OH-00029 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY: This is a Notice of the Presidential declaration of a major disaster for Public Assistance Only for the... Disaster Assistance, U.S. Small Business Administration, 409 3rd Street, SW., Suite 6050, Washington,...

  11. 76 FR 35260 - Texas Disaster # TX-00375

    Science.gov (United States)

    2011-06-16

    ... ADMINISTRATION Texas Disaster TX-00375 AGENCY: U.S. Small Business Administration. ACTION: Amendment 1. SUMMARY: This is an amendment of the Administrative declaration of a disaster for the State of TEXAS dated 04/26... INFORMATION CONTACT: A. Escobar, Office of Disaster Assistance, U.S. Small Business Administration, 409...

  12. 76 FR 38263 - Oklahoma Disaster # OK-00052

    Science.gov (United States)

    2011-06-29

    ... ADMINISTRATION Oklahoma Disaster OK-00052 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY: This is a Notice of the Presidential declaration of a major disaster for Public Assistance Only for... CONTACT: A. Escobar, Office of Disaster Assistance, U.S. Small Business Administration, 409 3rd Street,...

  13. 78 FR 39822 - Alaska Disaster #AK-00028

    Science.gov (United States)

    2013-07-02

    ... ADMINISTRATION Alaska Disaster AK-00028 AGENCY: U.S. Small Business Administration. ACTION: Notice SUMMARY: This is a Notice of the Presidential declaration of a major disaster for the State of Alaska (FEMA-4122-DR... INFORMATION CONTACT: A. Escobar, Office of Disaster Assistance, U.S. Small Business Administration, 409...

  14. 76 FR 59177 - Georgia Disaster #GA-00036

    Science.gov (United States)

    2011-09-23

    ... ADMINISTRATION Georgia Disaster GA-00036 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY: This is a notice of an Administrative declaration of a disaster for the State of GEORGIA dated 09/13..., Office of Disaster Assistance, U.S. Small Business Administration, 409 3rd Street, SW., Suite...

  15. 76 FR 59176 - Indiana Disaster #IN-00036

    Science.gov (United States)

    2011-09-23

    ... ADMINISTRATION Indiana Disaster IN-00036 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY: This is a notice of an Administrative declaration of a disaster for the State of Indiana dated 09/12... 76155. FOR FURTHER INFORMATION CONTACT: A. Escobar, Office of Disaster Assistance, U.S. Small...

  16. 77 FR 15179 - Disaster Declaration for Washington

    Science.gov (United States)

    2012-03-14

    ... Counties: Clallam, Grays Harbor, King, Klickitat, Lewis, Mason, Pierce, Skamania, Snohomish, Thurston... ADMINISTRATION [Disaster Declaration 13027 and 13028; Washington Disaster WA-00036] Disaster Declaration for Washington AGENCY: U.S. Small Business Administration. ] ACTION: Notice. SUMMARY: This is a Notice of...

  17. Characteristics of Disaster Associated with Chronic Stress.

    Science.gov (United States)

    Fleming, India; Baum, Andrew

    Historically, most investigations of the social and psychological effects of disaster have focused on describing the impact of single traumatic events rather than on developing an understanding of how disasters or particular characteristics of disasters affect various groups of victims. This study investigated the hypothesis that stress caused by…

  18. Military Nurses’ Experience in Disaster Response

    Science.gov (United States)

    2016-06-07

    preparedness, military nurses need instruction in dealing with media during crises, and psychological support teams should be included in disaster...better pre-deployment disaster training and preparedness. It also identifies the need for psychological support during and after disaster responses to... psychological support 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME OF RESPONSIBLE PERSON Debra

  19. 76 FR 45644 - Arizona Disaster #AZ-00016

    Science.gov (United States)

    2011-07-29

    ... is hereby amended to modify the incident description for this disaster from Monument Fire to Monument... ADMINISTRATION Arizona Disaster AZ-00016 AGENCY: U.S. Small Business Administration. ACTION: Amendment 1. SUMMARY: This is an amendment of the Administrative declaration of disaster for the State of Arizona dated...

  20. Pondering over Several Problems in Disaster Research

    Institute of Scientific and Technical Information of China (English)

    SHAN Xiuzheng

    2001-01-01

    Some related problems in disaster research are presented. The paper concludes that catastrophology is an extremely important natural-social science, that human calamities are even more destructive than natural disasters and that research on disasters such as highway traffic accidents, nuclear wars, population expansion, environment pollution and the like are of important practical meaning and far-reaching historic significance.

  1. National Satellite Disaster Reduction Application Service

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    @@ The groundbreaking ceremony for National Satellite Disaster Reduction Application Service was held on January 22,2008 in Beijing.The establishment of the center will further improve the disaster monitoring system using remote sensing technology and provides a platform for the application of remote sensing technology and satellite constellation in China's disaster reduction and relief services.

  2. DISASTER MANAGEMENT CYCLE – A THEORETICAL APPROACH

    Directory of Open Access Journals (Sweden)

    Himayatullah KHAN

    2008-01-01

    Full Text Available The present study explains the various concepts used in disastermanagement. The concepts explained include: Disaster, Hazard,Vulnerability, Capacity, Risk and Disaster Management Cycle. In addition tothe terminologies, the study also seeks to explain various types of disasters.

  3. A Study of Gaps in Attack Analysis

    Science.gov (United States)

    2016-10-12

    at- tack analysis as opposed to analyzing individual attacks; making detection sensors temporally and spatially dynamic; making attack identification...and Analysis Environment Asymmetry 22 3.5 Legacy Support Requirements 27 3.6 Sensors are Static Spatially and Temporally , While Attacks are Dynamic 28...or analysis, typically due to a lack of context from the points of attack. 2. Systems are designed for expressiveness and flexibility a. Many languages

  4. Terror attacks influence driving behavior in Israel

    Science.gov (United States)

    Stecklov, Guy; Goldstein, Joshua R.

    2004-01-01

    Terror attacks in Israel produce a temporary lull in light accidents followed by a 35% spike in fatal accidents on Israeli roads 3 days after the attack. Our results are based on time-series analysis of Israeli traffic flows, accidents, and terror attacks from January 2001 through June 2002. Whereas prior studies have focused on subjective reports of posttraumatic stress, our study shows a population-level behavioral response to violent terror attacks. PMID:15448203

  5. Sybil attack in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Abirami.K

    2013-04-01

    Full Text Available Wireless network is very susceptible to different types of attack. The main attack is Sybil attack, which allows forming other attacks on the network. Security is very important to the wireless network. In wireless sensor network, to verify node identities by cryptographic authentication but this is not easy because sensor node which contains limited resources. Therefore the current research is going on how to handling the situation of different traffic levels and transmission power for security.

  6. New Multi-step Worm Attack Model

    OpenAIRE

    Robiah, Y.; Rahayu, S. Siti; Shahrin , S.; M. FAIZAL A.; Zaki, M. Mohd; Marliza, R.

    2010-01-01

    The traditional worms such as Blaster, Code Red, Slammer and Sasser, are still infecting vulnerable machines on the internet. They will remain as significant threats due to their fast spreading nature on the internet. Various traditional worms attack pattern has been analyzed from various logs at different OSI layers such as victim logs, attacker logs and IDS alert log. These worms attack pattern can be abstracted to form worms' attack model which describes the process of worms' infection. Fo...

  7. Biomechanics of knife stab attacks.

    Science.gov (United States)

    Chadwick, E K; Nicol, A C; Lane, J V; Gray, T G

    1999-10-25

    Equipment, materials and methods for the measurement of the biomechanical parameters governing knife stab attacks have been developed and data have been presented that are relevant to the improvement of standards for the testing of stab-resistant materials. A six-camera Vicon motion analysis system was used to measure velocity, and derive energy and momentum during the approach phase of the attack and a specially developed force-measuring knife was used to measure three-dimensional forces and torque during the impact phase. The body segments associated with the knife were modelled as a series of rigid segments: trunk, upper arm, forearm and hand. The velocities of these segments, together with knowledge of the mass distribution from biomechanical tables, allowed the calculation of the individual segment energy and momentum values. The instrumented knife measured four components of load: axial force (along the length of the blade), cutting force (parallel to the breadth of the blade), lateral force (across the blade) and torque (twisting action) using foil strain gauges. Twenty volunteers were asked to stab a target with near maximal effort. Three styles of stab were used: a short thrust forward, a horizontal style sweep around the body and an overhand stab. These styles were chosen based on reported incidents, providing more realistic data than had previously existed. The 95th percentile values for axial force and energy were 1885 N and 69 J, respectively. The ability of current test methods to reproduce the mechanical parameters measured in human stab attacks has been assessed. It was found that current test methods could reproduce the range of energy and force values measured in the human stab attacks, although the simulation was not accurate in some respects. Non-axial force and torque values were also found to be significant in the human tests, but these are not reproduced in the standard mechanical tests.

  8. System i Disaster Recovery Planning

    CERN Document Server

    Dolewski, Richard

    2008-01-01

    Mapping out all the preparations necessary for an effective disaster recovery plan and its safeguard-a continuous maintenance program-this guide is aimed at IT managers of small and medium businesses. The opening section covers the initial steps of auditing vulnerability, ranking essential IT functions, and reviewing the storage of tape backups, with the following discussion focused on the elements of the plan itself. The plan includes a mission statement, a definition of disaster, the assignment of staff to teams, methods of compensating for human error, and standards for documenting the step

  9. [Disaster nursing and primary school teachers' disaster-related healthcare knowledge and skills].

    Science.gov (United States)

    Lai, Fu-Chih; Lei, Hsin-Min; Fang, Chao-Ming; Chen, Jiun-Jung; Chen, Bor-An

    2012-06-01

    The World Bank has ranked Taiwan as the 5th highest risk country in the world in terms of full-spectrum disaster risk. With volatile social, economic, and geologic environments and the real threat of typhoons, earthquakes, and nuclear disasters, the government has made a public appeal to raise awareness and reduce the impact of disasters. Disasters not only devastate property and the ecology, but also cause striking and long-lasting impacts on life and health. Thus, healthcare preparation and capabilities are critical to reducing their impact. Relevant disaster studies indicate children as a particularly vulnerable group during a disaster due to elevated risks of physical injury, infectious disease, malnutrition, and post-traumatic stress disorder. Primary school teachers are frontline educators, responders, and rehabilitators, respectively, prior to, during, and after disasters. The disaster prevention project implemented by the Taiwan Ministry of Education provides national guidelines for disaster prevention and education. However, within these guidelines, the focus of elementary school disaster prevention education is on disaster prevention and mitigation. Little guidance or focus has been given to disaster nursing response protocols necessary to handle issues such as post-disaster infectious diseases, chronic disease management, and psychological health and rehabilitation. Disaster nursing can strengthen the disaster healthcare response capabilities of school teachers, school nurses, and children as well as facilitate effective cooperation among communities, disaster relief institutes, and schools. Disaster nursing can also provide healthcare knowledge essential to increase disaster awareness, preparation, response, and rehabilitation. Implementing proper disaster nursing response protocols in Taiwan's education system is critical to enhancing disaster preparedness in Taiwan.

  10. Synthesis and in vitro reactivation study of isonicotinamide derivatives of 2-(hydroxyimino)-N-(pyridin-3-yl)acetamide as reactivators of Sarin and VX inhibited human acetylcholinesterase (hAChE).

    Science.gov (United States)

    Karade, Hitendra N; Raviraju, G; Acharya, B N; Valiveti, Aditya Kapil; Bhalerao, Uma; Acharya, Jyotiranjan

    2016-09-15

    Previously (Karade et al., 2014), we have reported the synthesis and in vitro evaluation of bis-pyridinium derivatives of pyridine-3-yl-(2-hydroxyimino acetamide), as reactivators of sarin and VX inhibited hAChE. Few of the molecules showed superior in vivo protection efficacy (mice model) (Kumar et al., 2014; Swami et al., 2016) in comparison to 2-PAM against DFP and sarin poisoning. Encouraged by these results, herein we report the synthesis and in vitro evaluation of isonicotinamide derivatives of pyridine-3-yl-(2-hydroxyimino acetamide) (4a-4d) against sarin and VX inhibited erythrocyte ghost hAChE. Reactivation kinetics of these compounds was studied and the determined kinetic parameters were compared with that of commercial reactivators viz. 2-PAM and obidoxime. In comparison to 2-PAM and obidoxime, oxime 4a and 4b exhibited enhanced reactivation efficacy toward sarin inhibited hAChE while oxime 4c showed far greater reactivation efficacy toward VX inhibited hAChE. The acid dissociation constant and IC50 values of these oximes were determined and correlated with the observed reactivation potential.

  11. Screening for Generalized Anxiety Disorder Symptoms in the Wake of Terrorist Attacks: A Study in Primary Care

    Science.gov (United States)

    Ghafoori, Bita; Neria, Yuval; Gameroff, Marc J.; Olfson, Mark; Lantigua, Rafael; Shea, Steven; Weissman, Myrna M.

    2013-01-01

    Little is known about the mental health impact of terrorism beyond posttraumatic stress disorder (PTSD) and depression. The associations between exposure to the September 11, 2001 (9/11) attacks in New York City and generalized anxiety disorder (GAD) symptoms were examined in a sample of 929 primary care patients. After controlling for PTSD, depression, panic and substance use disorders, and pre-9/11 trauma, patients who screened positive (vs. negative) for GAD symptoms were roughly twice as likely to report having a loved one at the 9/11 disaster site, twice as likely to know someone who was killed by the attacks, and twice as likely to know someone who was involved with the rescue/recovery efforts after the disaster. Implications for treatment and future research are discussed. PMID:19475656

  12. Information for disasters, information disasters, and disastrous information.

    Science.gov (United States)

    McDonnell, Sharon M; Perry, Helen N; McLaughlin, Brooke; McCurdy, Bronwen; Parrish, R Gibson

    2007-01-01

    Information is needed to support humanitarian responses in every phase of a disaster. Participants of a multilateral working group convened to examine how best to meet these information needs. Although information systems based on routine reporting of diseases are desirable because they have the potential to identify trends, these systems usually do not deliver on their promise due to inadequate organization and management to support them. To identify organizational and management characteristics likely to be associated with successful information systems in disaster settings, evaluations of the Integrated Disease Surveillance and Response (IDSR) programs in 12 participating countries were reviewed. Characteristics that were mentioned repeatedly in the evaluations as associated with success were grouped into nine categories: (1) human resources management and supervision; (2) political support; (3) strengthened laboratory capacity; (4) communication and feedback (through many mechanisms); (5) infrastructure and resources; (6) system design and capacity; (7) coordination and partnerships with stakeholders; (8) community input; and (9) evaluation. Selected characteristics and issues within each category are discussed. Based on the review of the IDSR evaluations and selected articles in the published literature, recommendations are provided for improving the short- and long-term organization and management of information systems in humanitarian responses associated with disasters. It is suggested that information systems that follow these recommendations are more likely to yield quality information and be sustainable even in disaster settings.

  13. Challenges in disaster data collection during recent disasters.

    Science.gov (United States)

    Morton, Melinda; Levy, J Lee

    2011-06-01

    Gathering essential health data to provide rapid and effective medical relief to populations devastated by the effects of a disaster-producing event involves challenges. These challenges include response to environmental hazards, security of personnel and resources, political and economic issues, cultural barriers, and difficulties in communication, particularly between aid agencies. These barriers often impede the timely collection of key health data such as morbidity and mortality, rapid health and sheltering needs assessments, key infrastructure assessments, and nutritional needs assessments. Examples of these challenges following three recent events: (1) the Indian Ocean tsunami; (2) Hurricane Katrina; and (3) the 2010 earthquake in Haiti are reviewed. Some of the innovative and cutting-edge approaches for surmounting many of these challenges include: (1) the establishment of geographical information systems (GIS) mapping disaster databases; (2) establishing internet surveillance networks and data repositories; (3) utilization of personal digital assistant-based platforms for data collection; (4) involving key community stakeholders in the data collection process; (5) use of pre-established, local, collaborative networks to coordinate disaster efforts; and (6) exploring potential civil-military collaborative efforts. The application of these and other innovative techniques shows promise for surmounting formidable challenges to disaster data collection.

  14. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof;

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based...

  15. On Mitigating Distributed Denial of Service Attacks

    Science.gov (United States)

    Gao, Zhiqiang

    2006-01-01

    Denial of service (DoS) attacks and distributed denial of service (DDoS) attacks are probably the most ferocious threats in the Internet, resulting in tremendous economic and social implications/impacts on our daily lives that are increasingly depending on the well-being of the Internet. How to mitigate these attacks effectively and efficiently…

  16. Automated classification of computer network attacks

    CSIR Research Space (South Africa)

    Van Heerden, R

    2013-11-01

    Full Text Available In this paper we demonstrate how an automated reasoner, HermiT, is used to classify instances of computer network based attacks in conjunction with a network attack ontology. The ontology describes different types of network attacks through classes...

  17. 47 CFR 76.1612 - Personal attack.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Personal attack. 76.1612 Section 76.1612... CABLE TELEVISION SERVICE Notices § 76.1612 Personal attack. (a) When, during origination cablecasting of issues of public importance, an attack is made upon the honesty, character, integrity, or like...

  18. Cache timing attacks on recent microarchitectures

    DEFF Research Database (Denmark)

    Andreou, Alexandres; Bogdanov, Andrey; Tischhauser, Elmar Wolfgang

    2017-01-01

    Cache timing attacks have been known for a long time, however since the rise of cloud computing and shared hardware resources, such attacks found new potentially devastating applications. One prominent example is S$A (presented by Irazoqui et al at S&P 2015) which is a cache timing attack against...

  19. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  20. On Mitigating Distributed Denial of Service Attacks

    Science.gov (United States)

    Gao, Zhiqiang

    2006-01-01

    Denial of service (DoS) attacks and distributed denial of service (DDoS) attacks are probably the most ferocious threats in the Internet, resulting in tremendous economic and social implications/impacts on our daily lives that are increasingly depending on the well-being of the Internet. How to mitigate these attacks effectively and efficiently…

  1. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  2. Ethics in disaster management

    Directory of Open Access Journals (Sweden)

    Surya Parkash

    2012-07-01

    Full Text Available In any profession, a basic set of moral values needs to be followed to comply with what we call ethics. Geoscientists have significant roles to play, more particularly in the field of geohazards, to appraise society about the possibilities of natural hazards such as landslides, avalanches, floods, volcanoes, and earthquakes. Geoscientists cannot only assess these hazards, but they can also estimate the potential consequences if these hazards occur in a given place and at a given time. However, sometimes it has been found that the credibility of geoscientists among society and government is lost, due to some unethical practices for short-term gain, or due to incorrect understanding of geological phenomena. Some of the hazards that cannot be predicted with the existing capabilities have been forecast by some pseudo-geoscientists, to draw social/ media attention, thereby bringing the reputation of the profession into disrepute. There is the need to be fair enough to accept the limitations of our profession in providing information about natural hazards that are not yet fully understood by the professionals themselves. More specifically, the predictions related to earthquakes have drawn the attention of society as well as media in the developing countries where the ‘common’ people have different perceptions. Most often, popular myths take over scientific facts among the public, and this can lead to rumors about natural hazards. This article will mention some cases of rumors about natural disasters, and particularly earthquakes, and the response of society, media and government. It emphasizes the role of geoscientists as the ethical responsibility to inform the public about the actual situations and the geohazards, to avoid panic caused by rumors from non-specialists or hyperactive pseudo experts. This article indicates the recent rumors about a lake outburst, flash floods, and volcanic activities after a moderate earthquake (M 6.9, September 18

  3. Ethics in disaster management

    Science.gov (United States)

    Parkash, S.

    2012-04-01

    Ethics are basically a minimum level of moral values in a society that one must follow to do justice for honest practices in any profession. Geoscientists have significant roles to play, more particularly in the field of geohazards, to appraise the society about the possibilities of natural hazards like landslides, avalanches, floods, volcanoes, earthquake etc. They can not only assess these hazards but also can estimate the potential consequences if these hazards occur in a given place and a given time. However, sometimes it has been found that the credibility of geoscientist among the society and the governance is lost due to some unethical practices for a short term gain or due to improper understanding of the geological phenomena. Some of the hazards that cannot be predicted with the existing capabilities have been forecasted by some geoscientists to draw social/media's attention, thereby bringing the reputation of the profession down. One must be fair enough to accept the limitations of our profession in informing about natural hazards which are yet not fully well understood by the professionals in this field. More specifically the predictions related to earthquakes have drawn the attention of the society as well as media in the developing world where common people have different perceptions. Most often the popular myths take over the scientific facts among the public and lead to rumours about natural hazards. The paper attempts to cite some cases of rumours about natural disasters, particularly earthquakes and response of the society, media and governance. It emphasizes the role of geoscientists as the ethical responsibility to inform the public about the factual situations on the geohazards, to avert the panic caused by rumours from non-specialists or hyper-active pseudo experts. The paper points out the recent rumours about lake outburst, flash-floods and volcanic activities after a moderate earthquake (M6.8, 18 September 2011) in the Sikkim State, India

  4. The San Bernardino, California, Terror Attack: Two Emergency Departments’ Response

    Directory of Open Access Journals (Sweden)

    Carol Lee, MD

    2016-01-01

    Full Text Available On December 2, 2015, a terror attack in the city of San Bernardino, California killed 14 Americans and injured 22 in the deadliest attack on U.S. soil since September 11, 2001. Although emergency personnel and law enforcement officials frequently deal with multi-casualty incidents (MCIs, what occurred that day required an unprecedented response. Most of the severely injured victims were transported to either Loma Linda University Medical Center (LLUMC or Arrowhead Regional Medical Center (ARMC. These two hospitals operate two designated trauma centers in the region and played crucial roles during the massive response that followed this attack. In an effort to shed a light on our response to others, we provide an account of how these two teaching hospitals prepared for and coordinated the medical care of these victims. In general, both centers were able to quickly mobilize large number of staff and resources. Prior disaster drills proved to be invaluable. Both centers witnessed excellent teamwork and coordination involving first responders, law enforcement, administration, and medical personnel from multiple specialty services. Those of us working that day felt safe and protected. Although we did identify areas we could have improved upon, including patchy communication and crowd-control, they were minor in nature and did not affect patient care. MCIs pose major challenges to emergency departments and trauma centers across the country. Responding to such incidents requires an ever-evolving approach as no two incidents will present exactly alike. It is our hope that this article will foster discussion and lead to improvements in management of future MCIs.

  5. The San Bernardino, California, Terror Attack: Two Emergency Departments' Response.

    Science.gov (United States)

    Lee, Carol; Walters, Elizabeth; Borger, Rodney; Clem, Kathleen; Fenati, Gregory; Kiemeney, Michael; Seng, Sakona; Yuen, Ho-Wang; Neeki, Michael; Smith, Dustin

    2016-01-01

    On December 2, 2015, a terror attack in the city of San Bernardino, California killed 14 Americans and injured 22 in the deadliest attack on U.S. soil since September 11, 2001. Although emergency personnel and law enforcement officials frequently deal with multi-casualty incidents (MCIs), what occurred that day required an unprecedented response. Most of the severely injured victims were transported to either Loma Linda University Medical Center (LLUMC) or Arrowhead Regional Medical Center (ARMC). These two hospitals operate two designated trauma centers in the region and played crucial roles during the massive response that followed this attack. In an effort to shed a light on our response to others, we provide an account of how these two teaching hospitals prepared for and coordinated the medical care of these victims. In general, both centers were able to quickly mobilize large number of staff and resources. Prior disaster drills proved to be invaluable. Both centers witnessed excellent teamwork and coordination involving first responders, law enforcement, administration, and medical personnel from multiple specialty services. Those of us working that day felt safe and protected. Although we did identify areas we could have improved upon, including patchy communication and crowd-control, they were minor in nature and did not affect patient care. MCIs pose major challenges to emergency departments and trauma centers across the country. Responding to such incidents requires an ever-evolving approach as no two incidents will present exactly alike. It is our hope that this article will foster discussion and lead to improvements in management of future MCIs.

  6. Methods of Identifying and Preventing SQL Attacks

    Directory of Open Access Journals (Sweden)

    Bojken Shehu

    2012-11-01

    Full Text Available The paper begins by identifying the organizations which are vulnerable to the SQL attack referred to as an SQL injection attack. The term SQL injection attack is defined and a diagram is used to illustrate the way that attack occurs. In another section, the paper identifies the methods used to detect an attack to SQL, whereby the techniques are discussed extensively using relevant diagrams for illustration. The other sections cover the preventive methods, where the methods are also discussed with an illustration using diagrams.

  7. Lightweight Distance Bounding Protocol against Relay Attacks

    Science.gov (United States)

    Kim, Jin Seok; Cho, Kookrae; Yum, Dae Hyun; Hong, Sung Je; Lee, Pil Joong

    Traditional authentication protocols are based on cryptographic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the distance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack.

  8. Dealing with death and disaster

    NARCIS (Netherlands)

    Veere, van der H.

    2011-01-01

    The triple disaster of earthquake, tsunami and nuclear fallout has done great damage. From the perspective of the ritual system and worldview, veneration of ancestors and ritual duties, the damage is even greater although hard to imagine for outsiders to the specifics of Japanese culture. This artic

  9. The economics of natural disasters

    Science.gov (United States)

    Hallegatte, S.

    2007-05-01

    Mitigating natural disasters is probably more important for society than it can be inferred from direct losses. Total economic losses, indeed, can be much larger than direct losses, especially for large disasters, which affect the economy for extended periods of time (e.g., New Orleans after Katrina), and represent an important obstacle to economic development in certain regions (e.g. Central America). A series of recent modelling exercises highlights several findings. First, total economic losses due to an event are increasing nonlinearly as a function of its direct losses, because destructions both increase reconstruction needs and reduce reconstruction capacity. Second, endogenous economic dynamics has to be taken into account in the assessment of disaster consequences. More particularly, an economy in the expansion phase of its business cycle appears to be more vulnerable to extreme events than an economy in recession. This result is supported by the fact that worker availability is found to be one of the main obstacles to a rapid and efficient reconstruction. Third, natural disasters can create poverty traps for poor countries, which have a lower ability to fund and carry out reconstruction. As a consequence, climate change impacts from extreme events may be significant, and will depend on how societies are able to adapt their reconstruction capacity to new levels of risk.

  10. Prevent Injury After a Disaster

    Science.gov (United States)

    ... Part 3 of 3) Hot Weather Tips Heat Stress in Older Adults FAQs Extreme Heat PSAs Related Links MMWR Bibliography CDC's Program Floods Flood Readiness Personal Hygiene After a Disaster Cleanup of Flood Water After a Flood Worker Safety Educational Materials Floods ...

  11. An introduction to neglected disasters

    Directory of Open Access Journals (Sweden)

    Ben Wisner

    2009-04-01

    Full Text Available This theme issue of Jàmbá takes up the question of neglected disasters. It is an important topic because the world is changing, disasters are changing, and theory is changing. All these changes call for a re-assessment of why some human suffering and social disruption receive attention from authorities, donors, researchers and the media, while some does not. Recent progress in both development studies and disaster studies provides tools for answering this question. Development and disaster studies date in their current forms to ways of thinking that were current in academic and policy circles in the late 1950s and 1960s. At that time the world was recovering from world war and former colonies of Europe were gaining independence. It was a world in which (with some exceptions conflict was held in check in an uneasy cold war balance. It was also a world where a growing UN system held the promise of meeting humanitarian needs when they arose. That world is no more. ‘Development’ has changed.

  12. Dealing with death and disaster

    NARCIS (Netherlands)

    Veere, van der H.

    2011-01-01

    The triple disaster of earthquake, tsunami and nuclear fallout has done great damage. From the perspective of the ritual system and worldview, veneration of ancestors and ritual duties, the damage is even greater although hard to imagine for outsiders to the specifics of Japanese culture. This artic

  13. Thoughts on major natural disasters

    Institute of Scientific and Technical Information of China (English)

    LU Yong-xiang

    2008-01-01

    @@ Amajor fact revealed by the Sichuan earthquake is that natural disasters (NDs) have become a formidable challenge that human beings across the world have to face today. The new millennium has witnessed the frequent occurrence of devastating catastrophes, which led to massive death tolls and property damages, and caused tremendous anguish to society.

  14. Longitudinal health effects of disasters.

    NARCIS (Netherlands)

    IJzermans, C.J.; Donker, G.

    2003-01-01

    Background and Aim: We are involved in research on the possible health effects of three disasters in the Netherlands: a plane crash in an Amsterdam neighbourhood, the explosion of a firework factory in the city of Enschede and a fire in a discotheque in Volendam. Which methodologies were used and

  15. Longitudinal health effects of disasters.

    NARCIS (Netherlands)

    IJzermans, C.J.; Donker, G.

    2003-01-01

    Background and Aim: We are involved in research on the possible health effects of three disasters in the Netherlands: a plane crash in an Amsterdam neighbourhood, the explosion of a firework factory in the city of Enschede and a fire in a discotheque in Volendam. Which methodologies were used and wh

  16. InaSAFE applications in disaster preparedness

    Science.gov (United States)

    Pranantyo, Ignatius Ryan; Fadmastuti, Mahardika; Chandra, Fredy

    2015-04-01

    Disaster preparedness activities aim to reduce the impact of disasters by being better prepared to respond when a disaster occurs. In order to better anticipate requirements during a disaster, contingency planning activities can be undertaken prior to a disaster based on a realistic disaster scenario. InaSAFE is a tool that can inform this process. InaSAFE is a free and open source software that estimates the impact to people and infrastructure from potential hazard scenarios. By using InaSAFE, disaster managers can develop scenarios of disaster impacts (people and infrastructures affected) to inform their contingency plan and emergency response operation plan. While InaSAFE provides the software framework exposure data and hazard data are needed as inputs to run this software. Then InaSAFE can be used to forecast the impact of the hazard scenario to the exposure data. InaSAFE outputs include estimates of the number of people, buildings and roads are affected, list of minimum needs (rice and clean water), and response checklist. InaSAFE is developed by Indonesia's National Disaster Management Agency (BNPB) and the Australian Government, through the Australia-Indonesia Facility for Disaster Reduction (AIFDR), in partnership with the World Bank - Global Facility for Disaster Reduction and Recovery (GFDRR). This software has been used in many parts of Indonesia, including Padang, Maumere, Jakarta, and Slamet Mountain for emergency response and contingency planning.

  17. Wildfire disasters: implications for rural nurses.

    Science.gov (United States)

    Kulig, Judith C; Edge, Dana; Smolenski, Stephanie

    2014-08-01

    As natural disasters are increasing globally, nursing's role in responding to disasters is evolving. Disaster nursing has emerged as a specialty that focuses on the care of groups and communities during disaster response. The role of rural nurses in disasters is less well defined. A review of peer-reviewed literature combined with the International Council of Nurses framework of Disaster Nursing Competencies was conducted to understand the roles and functions of nurses in rural areas that experience disasters. The authors' findings from investigating the effects of four wildfires in rural Canadian communities are also discussed. Six major themes derived from our wildfire studies were generated within the context of nursing practice and are useful in the preparation of rural nurses involved in disaster management and recovery. This adds to the current literature which by and large has not addressed nursing in rural catastrophes. Well-prepared and educated rural nurses who combine theoretical knowledge with their understanding of a rural community potentially can reduce the impact of a disaster. Other nursing roles include mentoring nursing students in disaster preparation and assisting in initiatives to address community recovery in the aftermath of a disaster. Copyright © 2014 College of Emergency Nursing Australasia Ltd. Published by Elsevier Ltd. All rights reserved.

  18. Children's Cognitive Functioning in Disasters and Terrorism.

    Science.gov (United States)

    Pfefferbaum, Betty; Noffsinger, Mary A; Jacobs, Anne K; Varma, Vandana

    2016-05-01

    A growing literature has begun to address the cognitions that influence children's disaster reactions as well as the effects of disasters on children's cognitions. These cognitions must be viewed in the context of developmental and cultural considerations as well as disaster-related factors such as exposure and secondary stressors. This review examines the extant literature on children's cognitions related to disasters and terrorism including threat appraisal, beliefs, attention and concentration, memory, academic achievement, and executive functioning. The review highlights areas where research is lacking such as the effect of disasters on children's attention, concentration, content of disaster memories, and executive functioning. It also notes findings that may advance post-disaster screening and intervention.

  19. Country logistics performance and disaster impact.

    Science.gov (United States)

    Vaillancourt, Alain; Haavisto, Ira

    2016-04-01

    The aim of this paper is to deepen the understanding of the relationship between country logistics performance and disaster impact. The relationship is analysed through correlation analysis and regression models for 117 countries for the years 2007 to 2012 with disaster impact variables from the International Disaster Database (EM-DAT) and logistics performance indicators from the World Bank. The results show a significant relationship between country logistics performance and disaster impact overall and for five out of six specific logistic performance indicators. These specific indicators were further used to explore the relationship between country logistic performance and disaster impact for three specific disaster types (epidemic, flood and storm). The findings enhance the understanding of the role of logistics in a humanitarian context with empirical evidence of the importance of country logistics performance in disaster response operations.

  20. Continuous Weight Attack on Complex Network

    Institute of Scientific and Technical Information of China (English)

    YIN Yan-Ping; ZHANG Duan-Ming; TAN Jin; PAN Gui-Jun; HE Min-Hua

    2008-01-01

    We introduce a continuous weight attack strategy and numerically investigate the effect of continuous use a weight coefficient ω to define the attack intensity. The weight coefficient ω increases continuously from 1 to infinity, where 1 represents no attack and infinity represents complete destructive attack. Our results show that the continuous weight attack on two selected nodes with small ω (ω≈ 3) could achieve the same damage of complete elimination of a single selected node on both BA and ER networks. It is found that the continuous weight attack on a single selected edge with small ω (ω≈ 2) can reach the same effect of complete elimination of a single edge on BA network, but on ER network the damage of the continuous weight attack on a single edge is close to but always smaller than that of complete elimination of edge even if ω is very large.

  1. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  2. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  3. Whispering through DDoS attack

    Directory of Open Access Journals (Sweden)

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  4. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identifi...... on invalidating policies in the system model by identifying possible sequences of actions that lead to an attack. The generated attacks are precise enough to illustrate the threat, and they are general enough to hide the details of individual steps....... through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based...

  5. Terrorist Attacks and Financial Markets

    OpenAIRE

    Bonekamp, Bas; van Veen, Tom

    2017-01-01

    This paper investigates the magnitude and the duration of the effect of a terrorist attack on stock market indices. We investigate the impact of New York (2001), Madrid (2004), London (2005), Boston (2013), Paris (2015), Brussels (2016), Nice (2016) and Berlin(2016) on the stock indices of the USA (S&P), Japan (NIKKEI), Germany (DAX), Spain (IBEX), UK (FTSE), France (CAC) and the Euronext Index (BEL). We use both a graphical analysis and an event study methodology to assess the effect of terr...

  6. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  7. National Disaster Health Consortium: Competency-Based Training and a Report on the American Nurses Credentialing Center Disaster Certification Development.

    Science.gov (United States)

    Smith, Sherrill J; Farra, Sharon L

    2016-12-01

    As the largest profession of health care providers, nurses are an integral component of disaster response. Having clearly delineated competencies and developing training to acquire those competencies are needed to ensure nurses are ready when disasters occur. This article provides a review of nursing and interprofessional disaster competencies and development of a new interprofessional disaster certification. An overview of a standardized disaster training program, the National Disaster Health Consortium, is provided as an exemplar of a competency-based interprofessional disaster education program.

  8. Anger attacks in obsessive compulsive disorder

    Directory of Open Access Journals (Sweden)

    Nitesh Prakash Painuly

    2011-01-01

    Full Text Available Background: Research on anger attacks has been mostly limited to depression, and only a few studies have focused on anger attacks in obsessive compulsive disorder. Materials and Methods: In a cross-sectional study all new obsessive compulsive disorder patients aged 20-60 years attending an outpatient clinic were assessed using the anger attack questionnaire, irritability, depression and anxiety scale (for the direction of the aggressive behavior and quality of life (QOL. Results: The sample consisted of 42 consecutive subjects with obsessive compulsive disorder, out of which 21 (50% had anger attacks. The obsessive compulsive disorder subjects with and without anger attacks did not show significant differences in terms of sociodemographic variables, duration of illness, treatment, and family history. However, subjects with anger attacks had significantly higher prevalence of panic attacks and comorbid depression. Significantly more subjects with anger attacks exhibited aggressive acts toward spouse, parents, children, and other relatives in the form of yelling and threatening to hurt, trying to hurt, and threatening to leave. However, the two groups did not differ significantly in terms of QOL, except for the psychological domain being worse in the subjects with anger attacks. Conclusion: Anger attacks are present in half of the patients with obsessive compulsive disorder, and they correlate with the presence of comorbid depression.

  9. ACTIVITY ATTACK ON REDUCED VARIANTS OF RIJNDAEL

    Institute of Scientific and Technical Information of China (English)

    Wei Baodian; Liu Dongsu; Wang Xinmei

    2004-01-01

    The famous Square attacks against the Rijndael algorithm have taken advantage of the change of the balance of some bytes. Further study shows that the change of activity always happens before the change of balance, which builds the foundation for a new activity attack presented in this paper. In the activity attack, the round in which the activity changes is executed in an equivalent form to avoid the obstructive restriction of the subkeys of that round.The existence of the birthday paradox guarantees much fewer plaintexts necessary for activity attacks comparing with that for corresponding Square attacks. But no benefit may result from the new attacks performed independently because the activity attacks guess four instead of one key byte once. Only when both the balance property and the activity property are exploited at the same time can much better performance be obtained. The better performance in the simulation shows that the consuming time and chosen plaintexts necessary are both reduced to one tenth of those of the corresponding Square attacks. So the activity attacks could be viewed as an efficient supplement to the Square attacks.

  10. Psychological interventions following terrorist attacks.

    Science.gov (United States)

    Mansdorf, Irwin J

    2008-01-01

    Psychological reactions to terror attacks have been documented as ranging from no symptoms to transient behavioural symptoms to more serious posttraumatic stress. A review of representative studies is presented, with a critical analysis of the salient points of the various psychological intervention strategies for terrorist attacks. Common aspects of both most intervention approaches include multifaceted models that foster social support and include a preparatory phase, a phase of 'psychological first aid' and a follow-up phase of referral for more severe cases. The notion of intervention for all who may show some symptoms is not universally accepted. Where treatment or intervention is used, the debriefing aspect of CISM (Critical Incident Stress Management) remains highly disputed, with the focus on intrusively revisiting the trauma appearing to have questionable value at best. Some data questions whether formal treatment or intervention is necessary or even desirable. For many who choose not to seek out any help following a trauma, clinical data shows no negative results. Moreover, the preponderance of data shows that conventional 'debriefing' is not recommended. If the debriefing mechanism is refined so that intrusive emotional rehashing of the traumatic event is eliminated, the resultant interventions resemble resilience based approaches. Further defining when intervention is called for and refining the mechanisms of intervention in multi-stage intervention.

  11. Where can an Insider attack?

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming

    2006-01-01

    By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage to ...... of the modelled systems. Our analysis of processes identifies which actions may be performed by whom, at which locations, accessing which data. This allows to compute a superset of audit results---before an incident occurs.......By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage...... to the targeted organisation. While the problem is well recognised in the security community as well as in law-enforcement and intelligence communities, the main resort still is to audit log files \\$\\backslash\\$emph{after the fact}. There has been little research into developing models, automated tools...

  12. Migraine attacks the Basal Ganglia

    Directory of Open Access Journals (Sweden)

    Bigal Marcelo

    2011-09-01

    Full Text Available Abstract Background With time, episodes of migraine headache afflict patients with increased frequency, longer duration and more intense pain. While episodic migraine may be defined as 1-14 attacks per month, there are no clear-cut phases defined, and those patients with low frequency may progress to high frequency episodic migraine and the latter may progress into chronic daily headache (> 15 attacks per month. The pathophysiology of this progression is completely unknown. Attempting to unravel this phenomenon, we used high field (human brain imaging to compare functional responses, functional connectivity and brain morphology in patients whose migraine episodes did not progress (LF to a matched (gender, age, age of onset and type of medication group of patients whose migraine episodes progressed (HF. Results In comparison to LF patients, responses to pain in HF patients were significantly lower in the caudate, putamen and pallidum. Paradoxically, associated with these lower responses in HF patients, gray matter volume of the right and left caudate nuclei were significantly larger than in the LF patients. Functional connectivity analysis revealed additional differences between the two groups in regard to response to pain. Conclusions Supported by current understanding of basal ganglia role in pain processing, the findings suggest a significant role of the basal ganglia in the pathophysiology of the episodic migraine.

  13. Disaster Mythology and Availability Cascades

    Directory of Open Access Journals (Sweden)

    Lisa Grow Sun

    2013-04-01

    Full Text Available Sociological research conducted in the aftermath of natural disasters has uncovered a number of “disaster myths” – widely shared misconceptions about typical post-disaster human behavior. This paper discusses the possibility that perpetuation of disaster mythology reflects an “availability cascade,” defined in prior scholarship as a “self-reinforcing process of collective belief formation by which an expressed perception triggers a chain reaction that gives the perception increasing plausibility through its rising availability in public discourse.” (Kuran and Sunstein 1999. Framing the spread of disaster mythology as an availability cascade suggests that certain tools may be useful in halting the myths’ continued perpetuation. These tools include changing the legal and social incentives of so-called “availability entrepreneurs” – those principally responsible for beginning and perpetuating the cascade, as well as insulating decision-makers from political pressures generated by the availability cascade. This paper evaluates the potential effectiveness of these and other solutions for countering disaster mythology. Las investigaciones sociológicas realizadas tras los desastres naturales han hecho evidentes una serie de “mitos del desastre”, conceptos erróneos ampliamente compartidos sobre el comportamiento humano típico tras un desastre. Este artículo analiza la posibilidad de que la perpetuación de los mitos del desastre refleje una “cascada de disponibilidad”, definida en estudios anteriores como un “proceso de auto-refuerzo de la formación de una creencia colectiva, a través del que una percepción expresada produce una reacción en cadena que hace que la percepción sea cada vez más verosímil, a través de una mayor presencia en el discurso público” (Kuran y Sunstein 1999. Enmarcar la propagación de los mitos del desastre como una cascada de disponibilidad sugiere que ciertas herramientas pueden ser

  14. Emergency Preparedness for Disasters and Crises in the Hotel Industry

    Directory of Open Access Journals (Sweden)

    Ahmad Rasmi AlBattat

    2013-09-01

    Full Text Available Safety and security are the most important issues to tourist while traveling and the first aspect they consider is to be protected from hazards. Emergency planning and preparedness for a crisis are the most significant components of dealing with disasters. Hospitality practitioners noticed a rising number of natural and man-made crises that harm the hospitality industry, regarding its vulnerability to crisis and internal and external hazards. By using secondary data, this study aims to shed some light on this issue, contributing to knowledge and awareness on emergency preparedness for the hospitality industry. Moreover, the study aims to explain the management’s commitment to adopt, develop, and update emergency plans. The results of this study explain that tourism as an international mobile industry must respond to internal and external hazards such as disease movement and terrorist attacks. Marketing safety is important to promote hotels and tourist destinations to the guests and holiday advisors. Hotels have a long history of being a soft target for terrorist attacks, as can be seen in several accidents that have shaken the hotel industry in the past few decades. Hotels invest a lot to install protective techniques, but terrorists are becoming more organized. Practitioners propose disaster management frameworks using several measurements. Recovery from crisis and learning help business retention that minimizes negative impacts and prevent losses. Finally, evaluation and feedback are very important to overcome the hazards and return to normal, as well as adopting new ideas to deal with emergencies. Single- and double-loop organizational learning should benefit proactive preparedness.

  15. Natural Disasters and Disaster Relief in China in 2000

    Institute of Scientific and Technical Information of China (English)

    JI Mingxin

    2001-01-01

    @@ 1 Natural disastersIn 2000, the country suffered a lot from natural disasters, including droughts, floods, hails,typhoons, earthquakes, dust devils, snow, microtherms and cool injuries and so on. According to the 2000 statistics checked and ratified jointly by the Ministry of Civil Affairs (MOCA), State Statistical Administration (SSA), China Meteorological Administration (CMA) and the National Office of Headquarters for Flood Control and Drought Resistance, the country suffered a disasterhit crop area of 54 690 000 hectares, 34 370 000 hectares of which seriously affected and 10 150 000 hectares being a total crop failure, up 9%, 28. 5% and 49. 2% respectively from 1999; a total of 456 000 000 people were affected, up 29.1% from the previous year; 279 000 000 people were seriously affected, up 23. 4% from the year before; 3 014 persons died from the disasters, increasing by 18 persons; 4 671 000 victims were urgently transferred for resettlement,down 29. 7% from the year before; and 1 473 000 houses collapsed, reduced by 15.5% compared with the last year. In partial areas, damages were done at varying degrees to industrial & mining enterprises and public facilities.

  16. Field Organization and Disaster Medical Assistance Teams.

    Science.gov (United States)

    Arziman, Ibrahim

    2015-10-01

    Disasters cause an acute deterioration in all stages of life. An area affected by the disaster in which the normal activities of life are disrupted is described as a "Field" in disaster terminology. Although it is not easy to define the borders of this zone, the area where there is normally functioning society is accepted as the boundary. Disaster management is the responsibility of the local government. However, in many large disaster responses many non-governmental and international organizations play a role. A Disaster Medical Team is a trained, mobile, self-contained, self-sufficient, multidisciplinary medical team that can act in the acute phase of a sudden-onset disaster (48 to 72 hours after its occurrence) to provide medical treatment in the affected area. The medical team can include physicians, nurses, paramedics and EMTS, technicians, personnel to manage logistics, security and others. Various models of Disaster Medical Teams can be observed around the world. There is paucity of evidence based literature regarding DMTs. There is a need for epidemiological studies with rigorous designs and sampling. In this section of the special edition of the journal, field organizations in health management during disasters will be summarized, with emphasis on preparedness and response phases, and disaster medical teams will be discussed.

  17. HOUSEHOLD EXPENDITURE IN RESPONSE TO NATURAL DISASTERS

    Directory of Open Access Journals (Sweden)

    Eny Sulistyaningrum

    2015-09-01

    Full Text Available Natural disasters have increased in their frequency, and the intensity of their destruction over the last ten years in Indonesia. Households usually respond to these difficulties by cutting their consump-tion, especially for non-essential goods. Arguably natural disasters are exogenous events, so this paper uses the exogenous variation from natural disasters as a natural experiment design to estimate the effect of disasters on household expenditure. When a certain group is exposed to the causal variable of interest, such as a disaster, and other groups are not, the Difference In Difference model (DID can be used for estimation. Using a micro level survey data set from the Indonesian Family Life Survey (IFLS which covers approximately 83 percent of the Indonesian population within the survey area, this paper examines the effects of natural disasters on household expenditure. This paper also examines whether there are any different impacts from different types of disasters. The finding is there are no significant effects of disasters on total household expenditure for households living in disaster regions, whether they are affected directly or not by the disaster.

  18. Disaster Preparedness Among University Students in Guangzhou, China: Assessment of Status and Demand for Disaster Education.

    Science.gov (United States)

    Tan, Yibing; Liao, Xiaolan; Su, Haihao; Li, Chun; Xiang, Jiagen; Dong, Zhaoyang

    2017-06-01

    This study had 2 aims. First, we evaluated the current levels of disaster preparedness among university students in southern China. Second, we assessed students' demands for future disaster education. In addition, we examined the influence of demographic factors on current disaster preparedness status and demand. A cross-sectional design was used. The data were collected from 1893 students in 10 universities in the Guangzhou Higher Education Mega (GHEM) center. A self-administered questionnaire developed for this study was administered to assess the current status and demand for disaster education. The results are based on 1764 valid questionnaires. Among the participants, 77.8% reported having had disaster education experiences before, 85.5% indicated their desire for a systematic disaster course, and 75.4% expressed their willingness to take such a course upon its availability. The total mean score for demand for disaster course content (5-point Likert scale) was 4.17±0.84, with items relating to rescue skills given the highest scores. These results suggested that students had high desires for disaster preparedness knowledge, especially knowledge concerning rescue skills. We observed significant differences in disaster education experiences between male and female students and across programs, school years, and home locations. Furthermore, we observed significant differences in demand for disaster course content between male and female students and across universities, student programs, years of school, and students' majors. A systematic disaster course focused on rescue skills is needed by all types of universities. To improve the disaster education system in universities, disaster drills should be performed on a semester basis as a refresher and to enhance disaster preparedness. The government and universities should support building a simulated disaster rescue center and recruit faculty from the emergency department, especially those who have had disaster

  19. Aviation Disaster Intervention: A Mental Health Volunteer's Experience.

    Science.gov (United States)

    Tramonte, Michael R.

    The goals of this presentation were to help mental health professionals learn more about intervening in aviation disasters, learn about the uniqueness of disaster mental health, and share the presenter's mental health disaster experiences as they relate to aviation disasters. Survivors' emotional phases during the disaster recovery process are…

  20. Holistic Approach to Disaster Management for a Sustainable Future

    Science.gov (United States)

    Nath, Baiju K.

    2006-01-01

    Disasters are becoming the key concern of many nations. The term disaster usually meant for natural calamities. There of course may be a human hand behind each of the disasters, whether its' impact is small or large. Disasters can be categorized into natural and man made. In the case of natural disasters there may be some natural indicators to…

  1. Post-disaster stressful life events and WTC-related posttraumatic stress, depressive symptoms, and overall functioning among responders to the World Trade Center disaster.

    Science.gov (United States)

    Zvolensky, Michael J; Kotov, Roman; Schechter, Clyde B; Gonzalez, Adam; Vujanovic, Anka; Pietrzak, Robert H; Crane, Michael; Kaplan, Julia; Moline, Jacqueline; Southwick, Steven M; Feder, Adriana; Udasin, Iris; Reissman, Dori B; Luft, Benjamin J

    2015-02-01

    The current study examined contributions of post-disaster stressful life events in relation to the maintenance of WTC-related posttraumatic stress, depressive symptoms, and overall functioning among rescue, recovery, and clean-up workers who responded to the September 11, 2001 World Trade Center (WTC) terrorist attacks. Participants were 18,896 WTC responders, including 8466 police officers and 10,430 non-traditional responders (85.8% male; 86.4% Caucasian; M(age) = 39.5, SD = 8.8) participating in the WTC Health Program who completed an initial examination between July, 2002 and April, 2010 and who were reassessed, on average, 2.5 years later. Path analyses were conducted to evaluate contributions of life events to the maintenance of WTC-related posttraumatic stress, depressive symptoms, and overall functioning. These analyses were stratified by police and non-traditional responder groups and adjusted for age, sex, time from 9/11 to initial visit, WTC exposures (three WTC contextual exposures: co-worker, friend, or a relative died in the disaster; co-worker, friend, or a relative injured in the disaster; and responder was exposed to the dust cloud on 9/11), and interval from initial to first follow-up visit. In both groups, WTC-related posttraumatic stress, depressive symptoms, and overall functioning were stable over the follow-up period. WTC exposures were related to these three outcomes at the initial assessment. WTC-related posttraumatic stress, depressive symptoms, and overall functioning, at the initial assessment each predicted the occurrence of post-disaster stressful life events, as measured by Disaster Supplement of the Diagnostic Interview Schedule. Post-disaster stressful life events, in turn, were associated with subsequent mental health, indicating partial mediation of the stability of observed mental health. The present findings suggest a dynamic interplay between exposure, post-disaster stressful life events, and WTC-related posttraumatic stress

  2. Experiences from coordinating research after the 2011 terrorist attacks in Norway.

    Science.gov (United States)

    Refsdal, Nils O

    2014-01-01

    This brief report presents some of the lessons learned from coordinating research in which people directly affected by terrorist attacks in Norway in 2011 are taking part. After the terrorist attacks, it was decided to establish a national coordinating function in order to protect those who were affected when they participate in research. By gathering key stakeholders, it is possible to avoid duplication of research through practical measures such as information sharing, facilitating cooperation, and working toward sharing of data. In addition, a coordinating function provides a platform for working to increase the impact of the research among practitioners and policy makers, and inform the general public. The conclusions are that coordination should be interdisciplinary, that it is important to plan for the sharing and reuse of data, and that both the research community and the research infrastructure should take steps to improve preparedness when disaster inevitably strikes again.

  3. A Systematic Review of the Literature on Posttraumatic Stress Disorder in Victims of Terrorist Attacks.

    Science.gov (United States)

    Paz García-Vera, María; Sanz, Jesús; Gutiérrez, Sara

    2016-08-01

    This article was aimed at systematically reviewing the literature on posttraumatic stress disorder (PTSD) among victims of terrorist attacks. Electronic and hand searches of the literature identified 35 studies addressing PTSD prevalence based on validated diagnostic interviews. Overall, in the year after terrorist attacks, 33% to 39% of direct victims developed PTSD, whereas the percentage of indirect victims with PTSD was lower (4% in the affected community, 5%-6% among emergency, rescue, and recovery workers, and 17%-29% among relatives and friends of the injured or killed victims), but nonetheless above the prevalence in the general population. With the passing of time, a significant reduction of PTSD can be expected in the affected community and in the emergency and rescue personnel, but not in the injured victims, in the relatives and friends of the injured or killed victims, and in nontraditional, more vulnerable disaster workers. The implications of these results for the psychological treatment of terrorism victims are discussed.

  4. Association of PTSD symptoms with asthma attacks among hurricane Katrina survivors.

    Science.gov (United States)

    Arcaya, Mariana C; Lowe, Sarah R; Rhodes, Jean E; Waters, Mary C; Subramanian, S V

    2014-12-01

    The relationship between posttraumatic stress disorder (PTSD) and asthma in the wake of natural disasters is poorly understood. Using pre- and postdisaster data (N = 405) from the Resilience in Survivors of Katrina (RISK) project, we examined associations between PTSD symptoms, measured by the Impact of Event Scale-Revised (IES-R), and self-reported postdisaster asthma attacks. A 1-point increase in the IES-R avoidance score, which corresponded to one standard deviation change in this sample, was associated with double the odds of reporting an asthma attack or episode since the hurricane, 95% CI Revise spacing among characters: [1.22, 4.16]. Association with hyperarousal and intrusion symptoms was null. Further research using objective measures of asthma morbidity is needed; nevertheless, these findings may help inform postdisaster health services delivery and predisaster mitigation planning. Copyright © 2014 International Society for Traumatic Stress Studies.

  5. Natural hazard and disaster tourism

    Directory of Open Access Journals (Sweden)

    Rucińska Dorota

    2014-03-01

    Full Text Available An observed trend, which can be defined as tourist interest in natural hazards and disasters, has persuaded the authors to attempt to research several issues, including tourist motivations and specific tourism properties and functions of this form of activity. The objective also covered the allocation of this social and natural process in the general structure of tourism. This interest has a long history, and a new stage is currently forming, which partly results from factors affecting society, such as information and education, which provoke antagonistic reactions. Extreme natural phenomena entail a common reduction of tourist interest in the destination which hosted the event; however, it never drops to zero. Differences are visible depending on the type of phenomenon. On the other hand, natural hazards and disasters are considered to hold a specific tourism value. This article discusses the allocation of this human activity in the tourism forms known to scientists, accounting for its diversity and relating to ethics.

  6. Optimism following a tornado disaster.

    Science.gov (United States)

    Suls, Jerry; Rose, Jason P; Windschitl, Paul D; Smith, Andrew R

    2013-05-01

    Effects of exposure to a severe weather disaster on perceived future vulnerability were assessed in college students, local residents contacted through random-digit dialing, and community residents of affected versus unaffected neighborhoods. Students and community residents reported being less vulnerable than their peers at 1 month, 6 months, and 1 year after the disaster. In Studies 1 and 2, absolute risk estimates were more optimistic with time, whereas comparative vulnerability was stable. Residents of affected neighborhoods (Study 3), surprisingly, reported less comparative vulnerability and lower "gut-level" numerical likelihood estimates at 6 months, but later their estimates resembled the unaffected residents. Likelihood estimates (10%-12%), however, exceeded the 1% risk calculated by storm experts, and gut-level versus statistical-level estimates were more optimistic. Although people believed they had approximately a 1-in-10 chance of injury from future tornadoes (i.e., an overestimate), they thought their risk was lower than peers.

  7. The mass media and disasters

    Science.gov (United States)

    Rogers, E. M.

    1990-01-01

    Past investigations by myself and others on the role of the mass media in disasters indicate that news people typically find themselves in situations of uncertainty, ambiguity, and conflicting information; the communication and transportation services that these people use in covering a story become inoperative. However, the media are expected to make sense of the disaster situation almost immediately. the difficulties of doing so were reflected by the ABC Goodyear Blimp footage of the collapsed Nimitz Freeway in Oakland, California, broadcast nationally on the evening of October 17, 1989. The televised picture showed the disastrous results of the Loma Prieta earthquake, but for an hour or more the announcer could not correctly identify what was being shown. He did not seem to realize that the upper deck of the freeway had collapsed on the lower deck, crushing vechiles and people. 

  8. Detection of Denial-of-service Attacks

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Denial-of-service (DOS) is a type of computer attack, which can essentially disable computers and networks.Resource consumption type of DOS attack could not be detected by the traditional misuse detection technique. This paper presents a new method of support vector mchine (SVM) to detect these attacks. We find that a DOS attack to a host is related to the activities within an impact data set of the host. The SVM method is used to classify the subsets of an impact data set to estimate its anomalism. The experiment result shows that this method can detect resource consumption type of DOS attacks, such as SYNflood, Smurf and UDP-storm. A receiver operating characteristic curve is plotted to determine performance for any possible operating point of the DOS attacks detection.

  9. Percolation of localized attack on complex networks

    CERN Document Server

    Shao, Shuai; Stanley, H Eugene; Havlin, Shlomo

    2014-01-01

    The robustness of complex networks against node failure and malicious attack has been of interest for decades, while most of the research has focused on random attack or hub-targeted attack. In many real-world scenarios, however, attacks are neither random nor hub-targeted, but localized, where a group of neighboring nodes in a network are attacked and fail. In this paper we develop a percolation framework to analytically and numerically study the robustness of complex networks against such localized attack. In particular, we investigate this robustness in Erd\\H{o}s-R\\'{e}nyi networks, random-regular networks, and scale-free networks. Our results provide insight into how to better protect networks, enhance cybersecurity, and facilitate the design of more robust infrastructures.

  10. Social media and disasters: a functional framework for social media use in disaster planning, response, and research.

    Science.gov (United States)

    Houston, J Brian; Hawthorne, Joshua; Perreault, Mildred F; Park, Eun Hae; Goldstein Hode, Marlo; Halliwell, Michael R; Turner McGowen, Sarah E; Davis, Rachel; Vaid, Shivani; McElderry, Jonathan A; Griffith, Stanford A

    2015-01-01

    A comprehensive review of online, official, and scientific literature was carried out in 2012-13 to develop a framework of disaster social media. This framework can be used to facilitate the creation of disaster social media tools, the formulation of disaster social media implementation processes, and the scientific study of disaster social media effects. Disaster social media users in the framework include communities, government, individuals, organisations, and media outlets. Fifteen distinct disaster social media uses were identified, ranging from preparing and receiving disaster preparedness information and warnings and signalling and detecting disasters prior to an event to (re)connecting community members following a disaster. The framework illustrates that a variety of entities may utilise and produce disaster social media content. Consequently, disaster social media use can be conceptualised as occurring at a number of levels, even within the same disaster. Suggestions are provided on how the proposed framework can inform future disaster social media development and research.

  11. Formation of pyrophosphate-like adducts from nerve agents sarin, soman and cyclosarin in phosphate buffer: implications for analytical and toxicological investigations.

    Science.gov (United States)

    Gäb, Jürgen; John, Harald; Blum, Marc-Michael

    2011-01-15

    Phosphate buffer is frequently used in biological, biochemical and biomedical applications especially when pH is to be controlled around the physiological value of 7.4. One of the prerequisites of a buffer compound among good buffering capacity and pH stability over time is its non-reactivity with other constituents of the solution. This is especially important for quantitative analytical or toxicological assays. Previous work has identified a number of amino alcohol buffers like TRIS to react with G-type nerve agents sarin, soman and cyclosarin to form stable phosphonic diesters. In case of phosphate buffer we were able to confirm not only the rapid hydrolysis of these agents to the respective alkyl methylphosphonates but also the formation of substantial amounts of pyrophosphate-like adducts (phosphorylated methylphosphonates), which very slowly hydrolyzed following zero-order kinetics. This led to a complex mixture of phosphorus containing species with changing concentrations over time. We identified the molecular structure of these buffer adducts using 1D ¹H-³¹P HSQC NMR and LC-ESI-MS/MS techniques. Reaction rates of adduct formation are fast enough to compete with hydrolysis in aqueous solution and to yield substantial amounts of buffer adduct over the course of just a couple of minutes. Possible reaction mechanisms are discussed with respect to the formation and subsequent hydrolysis of the pyrophosphate-like compounds as well as the increased rate of hydrolysis of the nerve agent to the corresponding alkyl methylphosphonates. In summary, the use of phosphate buffer for the development of new assays with sarin, soman and cyclosarin is discouraged. Already existing protocols should be carefully reexamined on an individual basis.

  12. Seismic Disaster Reduction in China

    Institute of Scientific and Technical Information of China (English)

    Ministry of Construction

    2001-01-01

    @@ Great accomplishments have been made in seismic disaster reduction in China's engineering construction and city construction projects during the past decade (1990~2000). A new national map on the division of seismic intensity has been promulgated, and a series of anti-seismic standards and norms have been drafted or revised, which has further improved the country's technical code system on anti-seismic engineering measures.

  13. Reforming Disaster and Emergency Response

    Science.gov (United States)

    2011-03-24

    events ranging from the contamination of the Love Canal, the Cuban refugee crisis, the accident at the Three Mile Island nuclear power plant, the Loma ... Prieta Earthquake, and Hurricane Andrew. In 1993, during the Clinton Administration, FEMA initiated reforms that both streamlined disaster and relief...deploy teams and resources to maximize the speed and effectiveness of the anticipated federal response and, when necessary, performs preparedness and

  14. Fault Attack on the Balanced Shrinking Generator

    Institute of Scientific and Technical Information of China (English)

    GAO Juntao; LI Xuelian; HU Yupu

    2006-01-01

    Fault analysis, belonging to indirect attack, is a cryptanalysis technique for the physical implementation of cryptosystem. In this paper, we propose a fault attack on the Balanced Shrinking Generator. The results show that the attacker can obtain the secret key by analyzing faulty output sequences which is produced by changing control clock of one of Linear Feedback Shift Registers (LFSR). Therefore, the balanced shrinking generator has a trouble in hardware implementation.

  15. Impact of Alleged Russian Cyber Attacks

    Science.gov (United States)

    2009-05-01

    March 14, 2009). 96 Ivan Buranov, Vladimir Vodo, and Seda Yegikyan, Pro-Kremlin Activist Admits Attack on Estonian Websites, Denies Criminal...Vladimir Vodo, and Seda Yegikyan, Pro-Kremlin Activist Admits Attack on Estonian Websites, Denies Criminal Wrongdoing, Translated by Open Source...Buranov, Ivan; Vodo, Vladimir; and Yegikyan, Seda Pro-Kremlin Activist Admits Attack on Estonian Websites, Denies Criminal Wrongdoing, Translated

  16. Discussion on Standardization and Technology of Integrated Disaster Decrease for Agrometeorological Disaster

    Institute of Scientific and Technical Information of China (English)

    Huo Zhiguo

    2011-01-01

    China is a large agricultural country,the losses due to agrometeorological disasters account for 70% to 80% of the total losses caused by agricultural natural disasters.Every year,a variety of meteorological disasters hit 5,000 hectares of crops and affect 400 million persons,with the economic losses over 200 billion Yuan.In recent years,under the influence of global climatic changes,the agrometeorological disasters have become increasingly serious;the affected area,the disaster rate and the economic loss are tending to increase.Therefore,strengthening the agricultural disasters prevention and mitigation,establishing standardization system of monitoring,early warning,evaluation and prevention and control technology for agricultural meteorology,and achieving the standardization of disaster monitoring,early warning and evaluation business are of great significance for prevention and mitigation of agricultural disasters in China.

  17. The impact of disasters on small business disaster planning: a case study.

    Science.gov (United States)

    Flynn, David T

    2007-12-01

    A major flood in 1997 forced the evacuation of Grand Forks, North Dakota and caused damage of USD 1 billion. Despite this recent disaster there is only marginal evidence of an increase in disaster recovery planning by businesses that experienced the flood. This finding is consistent with the results of other business-related disaster research. Statistical tests of survey results from 2003 indicate that there is a significantly higher rate of disaster recovery planning in businesses started since the 1997 flood than in businesses started before the flood and still in business. Such an outcome indicates a need for public policy actions emphasizing the importance of disaster planning. Improved disaster planning is an aid to business recovery and the results demonstrate the need for more widespread efforts to improve disaster recovery planning on the part of smaller businesses, even in areas that have recently experienced disasters.

  18. Disaster documentation for the clinician.

    Science.gov (United States)

    Zoraster, Richard M; Burkle, Christopher M

    2013-08-01

    Documentation of the patient encounter is a traditional component of health care practice, a requirement of various regulatory agencies and hospital oversight committees, and a necessity for reimbursement. A disaster may create unexpected challenges to documentation. If patient volume and acuity overwhelm health care providers, what is the acceptable appropriate documentation? If alterations in scope of practice and environmental or resource limitations occur, to what degree should this be documented? The conflicts arising from allocation of limited resources create unfamiliar situations in which patient competition becomes a component of the medical decision making; should that be documented, and, if so, how? In addition to these challenges, ever-present liability worries are compounded by controversies over the standards to which health care providers will be held. Little guidance is available on how or what to document. We conducted a search of the literature and found no appropriate references for disaster documentation, and no guidelines from professional organizations. We review here the challenges affecting documentation during disasters and provide a rationale for specific patient care documentation that avoids regulatory and legal pitfalls.

  19. Meaning Making in the Context of Disasters.

    Science.gov (United States)

    Park, Crystal L

    2016-12-01

    Understanding the factors underlying adaptive psychological responses and recovery after disasters has important implications for intervention and prevention efforts. To date, little attention has been paid to successful coping processes in recovering from natural and technological disasters. This article takes a meaning making perspective to explicate how survivors successfully adapt after disasters. Relevant literature is reviewed to illustrate the process of adaptation and resilience after disasters. Studies to date suggest both survivors' global meaning, particularly their religiousness and sense of meaning, and their appraisals and meaning making after the disaster are important influences on their postdisaster resilience. Meanings made in the form of changes in global beliefs and perceived growth have been reported and shown to have inconsistent relations with adjustment. Although much more research is needed, current literature suggests that meaning making processes are central to recovery and resilience after a range of disasters. © 2016 Wiley Periodicals, Inc.

  20. Historical and projected costs of natural disasters

    Energy Technology Data Exchange (ETDEWEB)

    Engi, D.

    1995-04-01

    Natural disasters cause billions of dollars of damage and thousands Of deaths globally each year. While the magnitude is clear, the exact costs (in damage and fatalities) are difficult to clearly identify. This document reports on the results of a survey of data on the costs associated with significant natural disasters. There is an impressive amount of work and effort going into natural disaster research, mitigation, and relief. However, despite this effort, there are surprisingly few consistent and reliable data available regarding the effects of natural disasters. Even lacking consistent and complete data, it is clear that the damage and fatalities from natural disasters are increasing, both in the United States, and globally. Projections using the available data suggest that, in the United States alone, the costs of natural disasters between 1995 and 2010 will be in the range of $90 billion (94$) and 5000 lives.

  1. Invasive fungal infections after natural disasters.

    Science.gov (United States)

    Benedict, Kaitlin; Park, Benjamin J

    2014-03-01

    The link between natural disasters and subsequent fungal infections in disaster-affected persons has been increasingly recognized. Fungal respiratory conditions associated with disasters include coccidioidomycosis, and fungi are among several organisms that can cause near-drowning pneumonia. Wound contamination with organic matter can lead to post-disaster skin and soft tissue fungal infections, notably mucormycosis. The role of climate change in the environmental growth, distribution, and dispersal mechanisms of pathogenic fungi is not fully understood; however, ongoing climate change could lead to increased disaster-associated fungal infections. Fungal infections are an often-overlooked clinical and public health issue, and increased awareness by health care providers, public health professionals, and community members regarding disaster-associated fungal infections is needed.

  2. Integrated Countermeasures for Urban Industrial Disaster Reduction

    Institute of Scientific and Technical Information of China (English)

    JIN Lei

    2001-01-01

    The 2nd UN World Conference on Disaster Reduction convened in July 1999 proposed the "Geneva Strategy" which highlighted the need that disaster reduction should be focused on cities and communities in the 21st Cent try. Having long been engaged in research on urban disaster reduction, the author noticed that although great importance has been attached to natural disasters and related accidents in recent years, little attention has been paid to urban industrial accidents that constitute the biggest threat to cities. Urban disaster reduction should be given enough attention whether in developing large and medium-sized cities or promoting the construction of small towns in China. Attention should be paid not only to the research on the mechanism of industrial accidents,but also to industrial construction and disaster reduction planning and layout. This is of strategic importance to sustainable development.

  3. Building Disaster Resilience: Steps toward Sustainability

    Directory of Open Access Journals (Sweden)

    Susan L. Cutter

    2014-03-01

    Full Text Available Disaster losses continue to escalate globally and in many regions human losses (death, injury, permanent displacement often exceed the economic toll. Current disaster policies are reactive with a short-term focus―respond and rebuild as quickly as possible and in the same way after the event. Such policies ignore the longer-term approach of building disaster-resilient communities, in which investments made now show financial and social returns later by reducing the impact of disasters. This article provides a vision for resilient nations in 2030 based on three recent policy reports. It highlights the necessary steps to wards achieving sustainability using the lens of disaster resilience as the pathway towards strengthening communities' ability to prepare and plan for, absorb, respond to, and recover from present and future disasters.

  4. Facilitating disaster preparedness through local radio broadcasting.

    Science.gov (United States)

    Romo-Murphy, Eila; James, Ross; Adams, Mike

    2011-10-01

    The 2008 Disaster Mitigation Preparedness (DMP) study took place in Aceh province, Indonesia. It sought to help develop radio programmes and messages to increase resilience to disasters. The role of radio was evaluated during and after the 2004 Asian tsunami disaster. The study team interviewed 984 tsunami survivors from nine sub-districts of Banda Aceh, and local nongovernmental organisations convened eight focus groups around the area of Aceh Besar. Six key informant interviews were held with government disaster management agencies. The DMP survey is the first of its kind to interview a representative random sample of Banda Aceh residents. It reveals the importance of community and social networks, during disaster situations, when essential communications are down. A disaster warning information system based on a multi-media approach needs to be developed. The wider community should be involved in the planning, education and training of Banda Aceh and Aceh Besar residents to facilitate appropriate personal and community survival strategies.

  5. Evaluation of Hypervisor Stability towards Insider Attacks

    Institute of Scientific and Technical Information of China (English)

    Roman Kulikov; Svetlana Kolesnikova

    2016-01-01

    Virtualization technology plays a key role in cloud computing. Thus, the security issues of virtualization tools (hypervisors, emulators, etc.) should be under precise consideration. However, threats of insider attacks are underestimated. The virtualization tools and hypervisors have been poorly protected from this type of attacks. Furthermore, hypervisor is one of the most critical elements in cloud computing infrastructure. Firstly, hypervisor vulnerabilities analysis is provided. Secondly, a formal model of insider attack on hypervisor is developed. Consequently, on the basis of the formal attack model, we propose a new methodology of hypervisor stability evaluation. In this paper, certain security countermeasures are considered that should be integrated in hypervisor software architecture.

  6. Colluding attacks on a group signature scheme

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    Xie and Yu (2005) proposed a group signature scheme and claimed that it is the most efficient group signature scheme so far and secure. In this paper, we show that two dishonest group members can collude to launch two attacks on the scheme. In the first attack they can derive the group secret key and then generate untraceable group signatures. In the second attack, they can impersonate other group members once they see their signatures. Therefore we conclude that the signature scheme is not secure.We show that some parameters should be carefully selected in the scheme to resist our attacks.

  7. Off-Path Attacking the Web

    CERN Document Server

    Gilad, Yossi

    2012-01-01

    We show how an off-path (spoofing-only) attacker can perform cross-site scripting (XSS), cross-site request forgery (CSRF) and site spoofing/defacement attacks, without requiring vulnerabilities in either web-browser or server and circumventing known defenses. Attacker can also launch devastating denial of service (DoS) attacks, even when the connection between the client and the server is secured with SSL/TLS. The attacks are practical and require a puppet (malicious script in browser sandbox) running on a the victim client machine, and attacker capable of IP-spoofing on the Internet. Our attacks use a technique allowing an off-path attacker to learn the sequence numbers of both client and server in a TCP connection. The technique exploits the fact that many computers, in particular those running Windows, use a global IP-ID counter, which provides a side channel allowing efficient exposure of the connection sequence numbers. We present results of experiments evaluating the learning technique and the attacks ...

  8. Localized attack on clustering networks

    CERN Document Server

    Dong, Gaogao; Du, Ruijin; Shao, Shuai; Stanley, H Eugene; Shlomo, Havlin

    2016-01-01

    Clustering network is one of which complex network attracting plenty of scholars to discuss and study the structures and cascading process. We primarily analyzed the effect of clustering coefficient to other various of the single clustering network under localized attack. These network models including double clustering network and star-like NON with clustering and random regular (RR) NON of ER networks with clustering are made up of at least two networks among which exist interdependent relation among whose degree of dependence is measured by coupling strength. We show both analytically and numerically, how the coupling strength and clustering coefficient effect the percolation threshold, size of giant component, critical coupling point where the behavior of phase transition changes from second order to first order with the increase of coupling strength between the networks. Last, we study the two types of clustering network: one type is same with double clustering network in which each subnetwork satisfies ...

  9. Attacks on Local Searching Tools

    CERN Document Server

    Nielson, Seth James; Wallach, Dan S

    2011-01-01

    The Google Desktop Search is an indexing tool, currently in beta testing, designed to allow users fast, intuitive, searching for local files. The principle interface is provided through a local web server which supports an interface similar to Google.com's normal web page. Indexing of local files occurs when the system is idle, and understands a number of common file types. A optional feature is that Google Desktop can integrate a short summary of a local search results with Google.com web searches. This summary includes 30-40 character snippets of local files. We have uncovered a vulnerability that would release private local data to an unauthorized remote entity. Using two different attacks, we expose the small snippets of private local data to a remote third party.

  10. Connecting care competencies and culture during disasters

    Directory of Open Access Journals (Sweden)

    Chhabra Vivek

    2009-01-01

    Full Text Available Connecting care Competencies and Culture are core fundamentals in responding to disasters. Thick coordination between professionals, communities and agencies in different geographical areas is crucial to the happening of appropriate preparedness and thus efficient response and mitigation of a disaster. In the next few articles, we present diverse examples related to the preparedness and recovery process to adverse disasters across the globe

  11. Disaster Risk Transfer for Developing Countries

    Science.gov (United States)

    Linneroothbayer, J.; Mechler, R.; Pflug, G.; Hochrainer, S.

    2005-12-01

    Financing disaster recovery often diverts resources from development, which can have long-term effects on economic growth and the poor in developing countries. Moreover, post-disaster assistance, while important for humanitarian reasons, has failed to meet the needs of developing countries in reducing their exposure to disaster risks and assuring sufficient funds to governments and individuals for financing the recovery process. The authors argue that part of disaster aid should be refocused from post-disaster to pre-disaster assistance including financial disaster risk management. Such assistance is now possible with new modeling techniques for estimating and pricing risks of natural disasters coupled with the advent of novel insurance instruments for transferring catastrophe risk to the global financial markets. The authors illustrate the potential for risk transfer in developing countries using the IIASA CATSIM model, which shows the potential impacts of disasters on economic growth in selected developing countries and the pros and cons of financial risk management to reduce those adverse impacts. The authors conclude by summarizing the advantages of investing in risk-transfer instruments (coupled with preventive measures) as an alternative to traditional post-disaster donor assistance. Donor-supported risk-transfer programs would not only leverage limited disaster aid budgets, but would also free recipient countries from depending on the vagaries of post-disaster assistance. Both the donors and the recipients stand to gain, especially since the instruments can be designed to encourage preventive measures. Precedents already exist for imaginative risk-transfer programs in highly exposed developing countries, including national insurance systems, micro-insurance schemes like weather derivatives and novel instruments (e.g., catastrophe bonds) to provide insurance cover for public sector risks.

  12. Disaster Recovery plan for healthcare organisation

    OpenAIRE

    Prokeš, David

    2015-01-01

    Theme of this thesis is Disaster Recovery and Business Continuity Planning. Main goal is design of Disaster Recovery plan for specific healthcare organization. One part of the design is analysis of analyzed hospital and identification of core applications and weak spots of the system. Within the analysis is risk assessment and assessment of its impact on the main applications. Based on this research the Disaster Recovery Plan is proposed. First part defines basic parts of Business Continuity ...

  13. Coordinating Robot Teams for Disaster Relief

    Science.gov (United States)

    2015-05-01

    Coordinating Robot Teams for Disaster Relief Mark Roberts1, Thomas Apker2, Benjamin Johnson1, Bryan Auslander3, Briana Wellman4 & David W...for Humanitarian Assistance / Disaster Relief operations. We demonstrate that the SDP responds to a dynamic, open world while ensuring that vehicles...facilitate such information gathering tasks, freeing humans to perform more critical tasks in Humanitarian Assistance / Disaster Relief (HA/DR

  14. Research and Development of a Convertible Use Rapidly Expandable Model for Response to Disasters and Mass Casualties

    Science.gov (United States)

    2009-10-01

    were affected by a disaster. This is due to factors such as weather, rapid urbanization, poor land use, and environmental destruction . In addition, 98...including estimates of casualties, damage to properties, and the amount of resources required to mitigate the destruction and its aftermath...to ED peaked 2 to 3 hours after the event. Within in 12 hours 71% of 723 survivors of WTC attacks sought and received care. • Murrah Federal

  15. Disaster in my backyard : A serious game introduction to disaster information management

    NARCIS (Netherlands)

    Meesters, Kenny; van de Walle, B.A.; Comes, T.; Fiedrich, F.; Fortier, S.; Geldermann, J.; Müller, T.

    2013-01-01

    Disaster exercises are intended to improve disaster responses effectiveness. Exercises exist in a wide variety, ranging from table-top scenarios to full-scale disaster simulations, offering participants different learning experiences. However these exercises can be overwhelming to newcomers, especia

  16. Cold disasters: the most serious meteorological disasters to the cotton production in Xinjiang, China

    Science.gov (United States)

    Li, Xinjian; He, Qing; Yuan, Yujiang; Tang, Fenglan

    2003-07-01

    After analyzing the heat conditions in the years of serious reduction of cotton yield in the main cotton-growing areas of Xinjiang, it is found that the cold disasters, especially the delaying cold disasters, are the most serious meteorological disasters to the cotton production in Xinjiang.

  17. Experiencing Disasters Indirectly: How Traditional and New Media Disaster Coverage Impacts Youth

    Science.gov (United States)

    Houston, J. Brian; Pfefferbaum, Betty; Reyes, Gilbert

    2008-01-01

    Media coverage of disasters is often pervasive, continuous, and intense. Because media use has been found to influence the way that individuals view the world, it is worth reviewing how such coverage affects children who do not directly experience a disaster. This article reviews what is known about how disaster coverage in traditional media…

  18. Disaster in my backyard : A serious game introduction to disaster information management

    NARCIS (Netherlands)

    Meesters, Kenny; van de Walle, B.A.; Comes, T.; Fiedrich, F.; Fortier, S.; Geldermann, J.; Müller, T.

    2013-01-01

    Disaster exercises are intended to improve disaster responses effectiveness. Exercises exist in a wide variety, ranging from table-top scenarios to full-scale disaster simulations, offering participants different learning experiences. However these exercises can be overwhelming to newcomers, especia

  19. Effect Attack on Scale-Free Networks due to Cascading Failures

    Institute of Scientific and Technical Information of China (English)

    WANG Jian-Wei; RONG Li-Li

    2008-01-01

    Adopting the initial load era node j to be Lj = [kj(Σm∈Γjkm )]α with kj and Γj being the degree of the node j and the set of its neighbouring nodes respectively, we propose a cascading model based on a local preferential redistribution rule of the load after removing a node. Assuming that a failed node leads only to a redistribution of the load passing through it to its neighbouring nodes, we explore the response of scale-free networks subject to two different attack strategies on nodes and find some interesting and counterintuitive results in our cascading model. On the one hand, unexpectedly, the attack on the nodes with the lowest degree is more harmful than the attack on the highest degree nodes when α< 1/2. On the other hand, when α = 1/2, the effects of two attacks for the robustness against cascading failures are almost identical. In addition, the numerical simulations are also verified by the theoretical analysis. These results may be very helpful for real-life networks to protect the key nodes selected effectively and to avoid cascading-failure-induced disasters.

  20. Center for Disaster & Humanitarian Assistance Medicine

    Data.gov (United States)

    Federal Laboratory Consortium — The Center for Disaster and Humanitarian Assistance Medicine (CDHAM) was formally established at the Uniformed Services University of the Health Sciences (USUHS) by...

  1. Prehistoric disasters at Lajia Site, Qinghai, China

    Institute of Scientific and Technical Information of China (English)

    YANG Xiaoyan; XIA Zhengkai; YE Maolin

    2003-01-01

    Lajia Site, located near the upper reaches of the Yellow River and theborder of Qinghai Province and Gansu Province, is a large-scale site of the Qijia Culture. In 2000 and 2001, archaeologists excavated an unusual scene of prehistoric dramatic and miserable disasters. Lots of geologic-geographic evidences revealed that the Lajia Site was ruined by coinstantaneous disasters, mainly floods from the Yellow River and earthquakes, accompanying mountainous torrents. Study on these disasters and their driven forces could provide us not only the knowledge on the palaeoenvironment of the area, but also offer us a valuable site toassess the influence of the natural disasters on human civilization development.

  2. 75 FR 67162 - Nebraska Disaster #NE-00040

    Science.gov (United States)

    2010-11-01

    ... adversely affected by the disaster: Primary Counties: Cass, Johnson, Nemaha, Otoe, Pawnee, Richardson... Domestic Assistance Numbers 59002 and 59008) James E. Rivera, Associate Administrator for...

  3. 75 FR 22873 - Nebraska Disaster # NE-00035

    Science.gov (United States)

    2010-04-30

    ..., Pawnee, Pierce, Platte, Polk, Richardson, Saline, Seward, Stanton, Thurston, Valley, Wheeler, York The... 59002 and 59008) James E. Rivera, Associate Administrator for Disaster Assistance. BILLING CODE...

  4. 76 FR 58328 - Pennsylvania Disaster #PA-00042

    Science.gov (United States)

    2011-09-20

    ..., Fort Worth, TX 76155. FOR FURTHER INFORMATION CONTACT: A. Escobar, Office of Disaster Assistance, U.S..., Schuylkill, Susquehanna, Wayne. Delaware: New Castle. Maryland: Cecil. New Jersey: Burlington,...

  5. 76 FR 62132 - Delaware Disaster #DE-00009

    Science.gov (United States)

    2011-10-06

    ... Administration, Processing and Disbursement Center, 14925 Kingsport Road, Fort Worth, TX 76155. FOR FURTHER... determined to be adversely affected by the disaster: Primary Counties: New Castle. Contiguous...

  6. 77 FR 71667 - Delaware Disaster #DE-00014

    Science.gov (United States)

    2012-12-03

    ... Kingsport Road, Fort Worth, TX 76155. FOR FURTHER INFORMATION CONTACT: A. Escobar, Office of Disaster... Counties: Kent, New Castle, Sussex. The Interest Rates are: Percent For Physical Damage:...

  7. Disaster response for people with disability.

    Science.gov (United States)

    McDermott, Suzanne; Martin, Kathy; Gardner, Jevettra Devlin

    2016-04-01

    Emergency Preparedness for people with a disability has been a steadfast activity in the state of South Carolina. In October 2015, the state experienced a natural disaster termed "The 1000 Year Flood". The disability response to the disaster was swift due to the strong collaborative network. However, the disaster did present challenges that need to be further addressed. The retelling of South Carolina's response should be informative to other state programs that provide advocacy for people with disability. Agencies and organizations that respond to disasters can learn from South Carolina's experience to ensure that the needs of people with disabilities are addressed rapidly and efficiently.

  8. 75 FR 14331 - Disaster Assistance Loan Program

    Science.gov (United States)

    2010-03-25

    ... of employment (MSE) for Military Reservist Economic Injury Disaster Loan (MREIDL) assistance. SBA may... the applicant's status as a major source of employment for Military Reserve Economic Injury...

  9. 76 FR 31387 - Kentucky Disaster # KY-00040

    Science.gov (United States)

    2011-05-31

    ... disaster: Primary Counties (Physical Damage and Economic Injury Loans): Boyd, Crittenden, Graves, Hardin..., Spencer, Trigg. Illinois: Gallatin, Hardin, Massac, Pope, Pulaski. Indiana: Clark, Floyd, Harrison,...

  10. Differences in mental health outcomes by acculturation status following a major urban disaster.

    Science.gov (United States)

    Adams, Richard E; Boscarino, Joseph A

    2013-01-01

    A number of studies have assessed the association between acculturation and psychological outcomes following a traumatic event. Some suggest that low acculturation is associated with poorer health outcomes, while others show no differences or that low acculturation is associated with better outcomes. One year after the terrorist attacks on the World Trade Center, we surveyed a multi-ethnic population of New York City adults (N= 2,368). We assessed posttraumatic stress disorder (PTSD), major depression, panic attack, anxiety symptoms, and general physical and mental health status. We classified study respondents into "low," "moderate," or "high" acculturation, based on survey responses. Bivariate results indicated that low acculturation individuals were more likely to experience negative life events, have low social support, and less likely to have pre-disaster mental health disorders. Those in the low acculturation group were also more likely to experience post-disaster perievent panic attacks, have higher anxiety, and have poorer mental health status. However, using logistic regression to control for confounding, and adjusting for multiple comparisons, we found that none of these outcomes were associated with acculturation status. Thus, our study suggests that acculturation was not associated with mental health outcomes following a major traumatic event.

  11. General overview of the disaster management framework in Cameroon.

    Science.gov (United States)

    Bang, Henry Ngenyam

    2014-07-01

    Efficient and effective disaster management will prevent many hazardous events from becoming disasters. This paper constitutes the most comprehensive document on the natural disaster management framework of Cameroon. It reviews critically disaster management in Cameroon, examining the various legislative, institutional, and administrative frameworks that help to facilitate the process. Furthermore, it illuminates the vital role that disaster managers at the national, regional, and local level play to ease the process. Using empirical data, the study analyses the efficiency and effectiveness of the actions of disaster managers. Its findings reveal inadequate disaster management policies, poor coordination between disaster management institutions at the national level, the lack of trained disaster managers, a skewed disaster management system, and a top-down hierarchical structure within Cameroon's disaster management framework. By scrutinising the disaster management framework of the country, policy recommendations based on the research findings are made on the institutional and administrative frameworks.

  12. ROLE OF GEOMATICS IN THE MANAGEMENT OF DISASTERS ...

    African Journals Online (AJOL)

    Osondu

    Keywords: Geomatics, Disaster, Mapping, Assessment, Management. Introduction. A disaster is .... Land Use Planning for Disaster Management. The severity of the impacts ..... Regional Planning, School of Tropical. Environment Studies and ...

  13. HCI challenges for community-based disaster recovery

    NARCIS (Netherlands)

    Streefkerk, J.W.; Neef, M.; Meesters, K.; Pieneman, R.; Dongen, K. van

    2014-01-01

    In disaster recovery, responding professional organizations traditionally assess the needs of communities following a disaster. Recent disasters have shown that volunteer capacities within the community are not yet integrated in recovery activities. To improve the efficiency of responding profession

  14. The role of the organisational psychologist in disasters and emergency situations.

    Science.gov (United States)

    San Juan Guillén, César

    2011-04-01

    Interventions in extreme situations, such as natural or technological disasters, terrorist attacks or emergencies in general, take place in settings of great uncertainty and are always accompanied by extraordinary circumstances. For this reason, there are various processes related to implementing intervention protocols that must be carefully examined, including an evaluation of work scenarios, personnel selection, within-group relationships in work teams, decision-making processes, or certain peculiarities of burnout among emergency personnel. In the view of this author, an ad hoc review of the role of the organisational psychologist can highlight interesting analysis and performance possibilities that could make work in emergency and disasters contexts more effective. The aim of this paper is to provide an overview of the role of the organisational psychologist pre-and post-disaster. Furthermore, it supports the idea that professional profiles must be designed that take into account specific knowledge and skills, as well as certain aptitudes and values. © 2011 The Author(s). Disasters © Overseas Development Institute, 2011.

  15. Terrorist attacks escalate in frequency and fatalities preceding highly lethal attacks.

    Directory of Open Access Journals (Sweden)

    Andy Martens

    Full Text Available Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates--both in the number of people killed per attack and in the frequency of attacks--leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack.

  16. Governing Disasters : Embracing Human Rights in a Multi-Level, Multi-Duty Bearer, Disaster Governance Landscape

    NARCIS (Netherlands)

    Lane, Lottie; Hesselman, Marlies

    2017-01-01

    International and national disaster governance faces multiple challenges given the large variety and amounts of resources, skills and expertise that adequate disaster response commands. Moreover, disasters do not necessarily respect territorial boundaries, or may overwhelm the capacity of any one

  17. Enhancing Meteorological Disaster Forecast Capability to Sustain Social-Economic Development

    Institute of Scientific and Technical Information of China (English)

    China Meteorological Administration

    2001-01-01

    @@ With a wide and complicated territory, a large span of latitude from the south to the north and distinct monsoon variations, China is one of those areas afflicted with frequent meteorological disasters in the world, such as drought, flood, typhoon, megatherm, cool injury, early frost and snow, which have taken on an aggravating tendency in recent years. In 1991, the ChangjiangHuaihe Region (CHR) witnessed a severe, sustained flood rarely seen in the past decades. In 1994, floods attacked South China, North China and Northeast China, whereas the CHR suffered from the disaster of drought and the coastal areas from frequent typhoons, which caused great damages to the comparatively better-developed eastern region.

  18. The influence of a major disaster on suicide risk in the population.

    Science.gov (United States)

    Mezuk, Briana; Larkin, Gregory Luke; Prescott, Marta R; Tracy, Melissa; Vlahov, David; Tardiff, Kenneth; Galea, Sandro

    2009-12-01

    The authors investigated the relationship between the September 11, 2001 terrorist attacks and suicide risk in New York City from 1990 to 2006. The average monthly suicide rate over the study period was 0.56 per 100,000 people. The monthly rate after September 2001 was 0.11 per 100,000 people lower as compared to the rate in the period before. However, the rate of change in suicide was not significantly different before and after the disaster, and regression discontinuity analysis indicated no change at this date. There was no net change in the suicide rate in New York City attributable to this disaster, suggesting that factors other than exposure to traumatic events (e.g., cultural norms, availability of lethal methods) may be key drivers of suicide risk in this context.

  19. British used Congreve Rockets to Attack Napoleon

    Science.gov (United States)

    2004-01-01

    Sir William Congreve developed a rocket with a range of about 9,000 feet. The incendiary rocket used black powder, an iron case, and a 16-foot guide stick. In 1806, British used Congreve rockets to attack Napoleon's headquarters in France. In 1807, Congreve directed a rocket attack against Copenhagen.

  20. Fast Collision Attack on MD5

    NARCIS (Netherlands)

    M.M.J. Stevens (Marc)

    2006-01-01

    textabstractIn this paper, we present an improved attack algorithm to find two-block collisions of the hash function MD5. The attack uses the same differential path of MD5 and the set of sufficient conditions that was presented by Wang et al. We present a new technique which allows us to

  1. Quantifying Shannon's work function for cryptanalytic attacks

    NARCIS (Netherlands)

    van Son, R.J.J.H.

    2010-01-01

    Attacks on cryptographic systems are limited by the available computational resources. A theoretical understanding of these resource limitations is needed to evaluate the security of cryptographic primitives and procedures. This study uses an Attacker versus Environment game formalism based on compu

  2. Revisiting attacker model for smart vehicles

    NARCIS (Netherlands)

    Petit, Jonathan; Feiri, Michael; Kargl, Frank

    Because of the potential impact on user's life in cooperative automated safety applications, the security of Vehicle-to-X communication (V2X) is mandatory. However, the current attacker model used in literature is often too network-oriented, and it is unclear what realistic attacks could be. In this

  3. Evaluation of Crosstalk Attacks in Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    2016-01-01

    WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks with c...... with cascaded Erbium-doped fiber amplifiers and a comb laser....

  4. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolić, Ivica; Rechberger, Christian

    2014-01-01

    ciphers, including the new standard SHA-3 (Keccak). The rebound attack is a start-from-the-middle approach for finding differential paths and conforming pairs in byte-oriented designs like Substitution-Permutation networks and AES. We apply our new compositional attack to the reduced version of the hash...

  5. Fast Collision Attack on MD5

    NARCIS (Netherlands)

    Stevens, M.M.J.

    2006-01-01

    In this paper, we present an improved attack algorithm to find two-block collisions of the hash function MD5. The attack uses the same differential path of MD5 and the set of sufficient conditions that was presented by Wang et al. We present a new technique which allows us to deterministically fulfi

  6. Minimization and Reliability Analyses of Attack Graphs

    Science.gov (United States)

    2002-02-01

    they model only attacks. Since we have a generic state machine model , we can simultaneously model not just attacks, but also seemingly benign system...Finite State Machine Model The Network We model the network as a set of facts, each represented as a relational predicate. The state of the network

  7. Attack tree generation by policy invalidation

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Naeem Akram, R.; Jajodia, S.

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identified th

  8. 76 FR 78957 - Nebraska Disaster Number NE-00043

    Science.gov (United States)

    2011-12-20

    ... following areas as adversely affected by the disaster. Primary Counties: Richardson, Nemaha. All other... 59002 and 59008) James E. Rivera, Associate Administrator for Disaster Assistance. BILLING CODE...

  9. Health after disaster: A perspective of psychological/health reactions to disaster

    Directory of Open Access Journals (Sweden)

    Ursula Martin

    2015-12-01

    Full Text Available Superstorm Sandy, which affected millions of people in 2012, was a disaster in structural, financial, medical, and emotional terms. Many survivors experienced post-storm health psychology impacts. Depression levels increased by 25%, and physician visits were elevated by a significant amount. Clearly, large-scale disasters have a profound effect on the physical and emotional health of survivors. Understanding these effects can improve future disaster relief programs and policies. Exploration of post-disaster issues can inform government entities and non-government organizations to assist communities and individuals left in the aftermath of natural disasters.

  10. Land Use Planning and Disaster: A European Perspective From Spain

    Directory of Open Access Journals (Sweden)

    Juli Ponce

    2013-04-01

    Full Text Available The study deals with the role of EU and EU Member States in relation to disasters and land use planning. It considers how land use planning can evaluate and manage risks to avoid disasters, paying special attention to the European use of precautionary principle, sometimes explained with the sentence “Better safe than Sorry”. The analysis uses especially, but not only, the example of the Spanish legal system taking into account its inclusion in the more general EU legal system. The study also considers public responsibility in preventing disasters and possible consequences of maladministration when taking planning decisions, using real Spanish cases. Finally, the article explores the possibilities of planning as a tool to prevent disasters in relation to two specific areas: location of nuclear plants and new developments regarding the prevention of crime and terrorist attacks by means of urban planning (the so called Crime Prevention Through Environmental Design. El estudio analiza el papel de la Unión Europea (UE y los Estados miembros de la UE en relación con los desastres y la planificación del uso del suelo. Se describe cómo la planificación del uso del suelo puede evaluar y gestionar los riesgos para evitar desastres, prestando especial atención al uso europeo del principio de precaución, a veces resumido en la frase “Más vale prevenir que curar”. El análisis utiliza especialmente, pero no sólo, el ejemplo del sistema jurídico español, teniendo en cuenta su inclusión en el sistema legal general de la UE. El estudio también tiene en cuenta la responsabilidad pública en la prevención de desastres y las posibles consecuencias de la mala administración cuando se toman decisiones de planificación, a través de casos reales españolas. Por último, el artículo explora las posibilidades de la planificación como una herramienta para prevenir desastres en relación a dos áreas específicas: la ubicación de centrales

  11. New Multi-step Worm Attack Model

    CERN Document Server

    Robiah, Y; Shahrin, S; Faizal, M A; Zaki, M Mohd; Marliza, R

    2010-01-01

    The traditional worms such as Blaster, Code Red, Slammer and Sasser, are still infecting vulnerable machines on the internet. They will remain as significant threats due to their fast spreading nature on the internet. Various traditional worms attack pattern has been analyzed from various logs at different OSI layers such as victim logs, attacker logs and IDS alert log. These worms attack pattern can be abstracted to form worms' attack model which describes the process of worms' infection. For the purpose of this paper, only Blaster variants were used during the experiment. This paper proposes a multi-step worm attack model which can be extended into research areas in alert correlation and computer forensic investigation.

  12. Evaluating Deterioration of Concrete by Sulfate Attack

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Effects of factors such as water to cement ratio, fly ash and silica fume on the resistance of concrete to sulfate attack were investigated by dry-wet cycles and immersion method. The index of the resistance to sulfate attack was used to evaluate the deterioration degree of concrete damaged by sulfate. The relationship between the resistance of concrete to sulfate attack and its permeability/porosity were analyzed as well as its responding mechanism. Results show that the depth of sulfate crystal attack from surface to inner of concrete can be reduced by decreasing w/c and addition of combining fly ash with silica fume. The variation of relative elastic modulus ratio and relative flexural strength ratio of various specimens before and after being subjected to sulfate attack was compared.

  13. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  14. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  15. CompChall: Addressing Password Guessing Attacks

    CERN Document Server

    Goyal, Vipul; Singh, Mayank; Abraham, Ajith; Sanyal, Sugata

    2011-01-01

    Even though passwords are the most convenient means of authentication, they bring along themselves the threat of dictionary attacks. Dictionary attacks may be of two kinds: online and offline. While offline dictionary attacks are possible only if the adversary is able to collect data for a successful protocol execution by eavesdropping on the communication channel and can be successfully countered using public key cryptography, online dictionary attacks can be performed by anyone and there is no satisfactory solution to counter them. This paper presents a new authentication protocol which is called CompChall (computational challenge). The proposed protocol uses only one way hash functions as the building blocks and attempts to eliminate online dictionary attacks by implementing a challenge-response system. This challenge-response system is designed in a fashion that it does not pose any difficulty to a genuine user but is time consuming and computationally intensive for an adversary trying to launch a large n...

  16. Performance Evaluation of Wormhole Attack In AODV

    Directory of Open Access Journals (Sweden)

    Samuel Jacob

    2015-02-01

    Full Text Available The Mobile Ad hoc Networks (MANETs is a collection of wireless nodes which interact with each other by sending packets to one another or on behalf of another node, without any central network infrastructure to control data routing. For communication, the nodes cooperatively forward data packets to other nodes in network by using the routing protocol. But, these routing protocols are not secure, thus paving the way for the MANET to be open to malicious attacks. A malicious attack which is commonly observed in MANET environment is wormhole attack. The objective of this work is to analyze the performance parameters of throughput, delay and packet loss in AODV with the existence of wormhole attack. Simulation results have shown that the performance parameters are affected very much when there is an attack due to wormholes.

  17. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  18. SURVEY OF PACKET DROPPING ATTACK IN MANET

    Directory of Open Access Journals (Sweden)

    A.Janani

    2014-03-01

    Full Text Available Mobile Ad-hoc NETwork (MANET is an application of wireless network with self-configuring mobile nodes. MANET does not require any fixed infrastructure. Its development never has any threshold range. Nodes in MANET can communicate with each other if and only if all the nodes are in the same range. This wide distribution of nodes makes MANET vulnerable to various attacks, packet dropping attack or black hole attack is one of the possible attack. It is very hard to detect and prevent. To prevent from packet dropping attack, detection of misbehavior links and selfish nodes plays a vital role in MANETs. In this paper, a omprehensive investigation on detection of misbehavior links and malicious nodes is carried out.

  19. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    . In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...... but not the computation. Such weaker model can still be practically useful and moreover, may provide nice building-blocks to tackle full-fledged tampering in future. In this dissertation we study different models of memory-tampering and provide a number of solutions with different flavors. Mainly we took two different...

  20. Detection Block Model for SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Diksha G. Kumar

    2014-10-01

    Full Text Available With the rapid development of Internet, more and more organizations connect their databases to the Internet for resource sharing. However, due to developers' lack of knowledge of all possible attacks, web applications become vulnerable to multiple attacks. Thus the network databases could face multiple threats. Web applications generally consist of a three tier architecture where database is in the third pole, which is the most valuable asset in any organization. SQL injection is an attack technique in which specially crafted input string is entered in user input field. It is submitted to server and result is returned to the user. In SQL injection vulnerability, the database server is forced to execute malicious operations which may cause the data loss or corruption, denial of access, and unauthentic access to sensitive data by crafting specific inputs. An attacker can directly compromise the database, and that is why this is a most threatening web attack. SQL injection attack occupies first position in top ten vulnerabilities as specified by Open Web Application Security Project. It is probably the most common Website vulnerability today. Current scenarios which provide solutions to SQL injection attack either have limited scope i.e. can’t be implemented across all platforms, or do not cover all types of SQL injection attacks. In this work we implement Message Authentication Code (MAC based solution against SQL injection attacks. The model works both on client and server side. Client side implements a filter function and server side is based on information theory. MAC of static and dynamic queries is compared to detect SQL injection attack.

  1. Smart disaster mitigation in Thailand

    Science.gov (United States)

    Aimmanee, S.; Ekkawatpanit, C.; Asanuma, H.

    2016-04-01

    Thailand is notoriously exposed to several natural disasters, from heavy thunder storms to earthquakes and tsunamis, since it is located in the tropical area and has tectonic cracks underneath the ground. Besides these hazards flooding, despite being less severe, occurs frequently, stays longer than the other disasters, and affects a large part of the national territory. Recently in 2011 have also been recorded the devastating effects of major flooding causing the economic damages and losses around 50 billion dollars. Since Thailand is particularly exposed to such hazards, research institutions are involved in campaigns about monitoring, prevention and mitigation of the effects of such phenomena, with the aim to secure and protect human lives, and secondly, the remarkable cultural heritage. The present paper will first make a brief excursus on the main Thailand projects aimed at the mitigation of natural disasters, referring to projects of national and international relevance, being implemented, such as the ESCAP1999 (flow regime regulation and water conservation). Adaptable devices such as foldable flood barriers and hydrodynamically supported temporary banks have been utilized when flooding. In the second part of the paper, will be described some new ideas concerning the use of smart and biomimicking column structures capable of high-velocity water interception and velocity detection in the case of tsunami. The pole configuration is composite cylindrical shell structure embedded with piezoceramic sensor. The vortex shedding of the flow around the pole induces the vibration and periodically strains the piezoelectric element, which in turn generates the electrical sensorial signal. The internal space of the shell is filled with elastic foam to enhance the load carrying capability due to hydrodynamic application. This more rigid outer shell inserted with soft core material resemble lotus stem in nature in order to prolong local buckling and ovalization of column

  2. Disaster Research Team Building: A Case Study of a Web-based Disaster Research Training Program.

    Science.gov (United States)

    Beaton, Randal D; Johnson, L Clark; Maida, Carl A; Houston, J Brian; Pfefferbaum, Betty

    2012-11-19

    This case study describes the process and outcomes of the Northwest Center for Public Health Practice Child and Family Disaster Research Training (UWDRT) Program housed at the University of Washington, which used web-based distance learning technology. The purposes of this program were to provide training and to establish a regional cadre of researchers and clinicians; to increase disaster mental health research capacity and collaboration; and to improve the scientific rigor of research investigations of disaster mental health in children and families. Despite a number of obstacles encountered in development and implementation, outcomes of this program included increased team member awareness and knowledge of child and family disaster mental health issues; improved disaster and public health instruction and training independent of the UWDRT program; informed local and state disaster response preparedness and response; and contributions to the child and family disaster mental health research literature.

  3. Bridging international relations and disaster studies: the case of disaster-conflict scholarship.

    Science.gov (United States)

    Hollis, Simon

    2017-04-28

    International relations and disaster studies have much to gain by thinking critically about their respective theoretical and epistemological assumptions. Yet, few studies to date have sought to assess the potential value of linking these two disciplines. This paper begins to address this shortfall by examining the relationship between disasters and conflict as a research sphere that intersects international relations and disaster studies. Through an analysis of whether or not disasters contribute to intra-national and international conflict, this paper not only provides a review of the state of the art, but also serves to invite scholars to reflect on related concepts from other fields to strengthen their own approaches to the study of disasters in an international setting. An evaluation of the conceptual and theoretical contributions of each subject area provides useful heuristics for the development of disaster-conflict scholarship and encourages alternative modes of knowledge production through interdisciplinarity. © 2017 The Author(s). Disasters © Overseas Development Institute, 2017.

  4. Extreme Weather and Natural Disasters

    CERN Document Server

    Healey, Justin

    2012-01-01

    Australia is a vast land in which weather varies significantly in different parts of the continent. Recent extreme weather events in Australia, such as the Queensland floods and Victorian bushfires, are brutal reminders of nature's devastating power. Is global warming increasing the rate of natural disasters? What part do La Niña and El Niño play in the extreme weather cycle? Cyclones, floods, severe storms, bushfires, landslides, earthquakes, tsunamis - what are the natural and man-made causes of these phenomena, how predictable are they, and how prepared are we for the impacts of natural dis

  5. Marine Disaster Reduction in China

    Institute of Scientific and Technical Information of China (English)

    State Ocean Administration

    2001-01-01

    @@ 1 Coastal economic-social development and marine disaster The ocean covers 71% of the earth's surface. It is the cradle of life on earth, the treasure of resources and an important adjuster of the environment. Now we have come to realize that exploration of the ocean is an important solution to global issues including resource shortage,population explosion and environmental degradation. Man must rely more and more on the ocean in order to achieve sustainable development. The 21st Century will be a century of the ocean.

  6. Disaster medicine: the caring contradiction.

    Science.gov (United States)

    Crippen, David; Krin, Charles; Lorich, Dean; Mattox, Ken

    2010-01-01

    The nature of mankind is a concern for those in need. Disasters, both natural and manmade, have been with us since the beginning of recorded history but media coverage of them is a relatively new phenomenon. When these factors come together, there is great potential to both identify and serve the sick and injured. However, the mass media by its nature tends to enhance the humanistic aspect of rescue while minimizing the practical problems involved. We describe a recent scenario in Haiti that puts some of these complications into a practical perspective.

  7. 75 FR 8414 - California Disaster # CA-00150

    Science.gov (United States)

    2010-02-24

    ... From the Federal Register Online via the Government Publishing Office SMALL BUSINESS ADMINISTRATION California Disaster CA-00150 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY: This is a notice of an Administrative declaration of a disaster for the State of California dated...

  8. 76 FR 7622 - California Disaster #CA-00162

    Science.gov (United States)

    2011-02-10

    ... From the Federal Register Online via the Government Publishing Office SMALL BUSINESS ADMINISTRATION California Disaster CA-00162 AGENCY: U.S. Small Business Administration. ] ACTION: Notice. SUMMARY: This is a notice of an Administrative declaration of a disaster for the State of California dated...

  9. 77 FR 61815 - California Disaster #CA-00190

    Science.gov (United States)

    2012-10-11

    ... From the Federal Register Online via the Government Publishing Office SMALL BUSINESS ADMINISTRATION California Disaster CA-00190 AGENCY: U.S. Small Business Administration. ACTION: Amendment 1. SUMMARY: This is an amendment of the Administrative declaration of a disaster for the State of...

  10. 76 FR 38263 - California Disaster #CA-00172

    Science.gov (United States)

    2011-06-29

    ... From the Federal Register Online via the Government Publishing Office Small Business Administration California Disaster CA-00172 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY: This is a Notice of the Presidential declaration of a major disaster for Public Assistance Only for...

  11. 75 FR 17792 - California Disaster # CA-00150

    Science.gov (United States)

    2010-04-07

    ... From the Federal Register Online via the Government Publishing Office SMALL BUSINESS ADMINISTRATION California Disaster CA-00150 AGENCY: U.S. Small Business Administration. ACTION: Amendment 1. SUMMARY: This is an amendment of the Administrative declaration of disaster for the State of...

  12. 76 FR 5856 - California Disaster #CA-00164

    Science.gov (United States)

    2011-02-02

    ... From the Federal Register Online via the Government Publishing Office SMALL BUSINESS ADMINISTRATION California Disaster CA-00164 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY: This is a Notice of the Presidential declaration of a major disaster for Public Assistance Only for...

  13. 75 FR 13144 - California Disaster #CA-00151

    Science.gov (United States)

    2010-03-18

    ... From the Federal Register Online via the Government Publishing Office SMALL BUSINESS ADMINISTRATION California Disaster CA-00151 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY: This is a Notice of the Presidential declaration of a major disaster for Public Assistance Only for...

  14. 76 FR 11307 - California Disaster #CA-00162

    Science.gov (United States)

    2011-03-01

    ... From the Federal Register Online via the Government Publishing Office SMALL BUSINESS ADMINISTRATION California Disaster CA-00162 AGENCY: U.S. Small Business Administration. ACTION: Amendment 1. SUMMARY: This is an amendment of the Administrative declaration of a disaster for the State of...

  15. 75 FR 68848 - California Disaster #CA-00160

    Science.gov (United States)

    2010-11-09

    ... [Federal Register Volume 75, Number 216 (Tuesday, November 9, 2010)] [Notices] [Pages 68848-68849] [FR Doc No: 2010-28201] SMALL BUSINESS ADMINISTRATION [Disaster Declaration 12370 and 12371] California Disaster CA-00160 AGENCY: U.S. Small Business Administration. [[Page 68849

  16. 76 FR 18614 - California Disaster #CA-00167

    Science.gov (United States)

    2011-04-04

    ... From the Federal Register Online via the Government Publishing Office SMALL BUSINESS ADMINISTRATION California Disaster CA-00167 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY: This is a notice of an Administrative declaration of a disaster for the State of California dated...

  17. 76 FR 80446 - California Disaster #CA-00182

    Science.gov (United States)

    2011-12-23

    ... [Federal Register Volume 76, Number 247 (Friday, December 23, 2011)] [Notices] [Pages 80446-80447] [FR Doc No: 2011-32952] SMALL BUSINESS ADMINISTRATION [Disaster Declaration 12967 and 12968] California Disaster CA-00182 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY: This is...

  18. 76 FR 24555 - California Disaster #CA-00171

    Science.gov (United States)

    2011-05-02

    ... From the Federal Register Online via the Government Publishing Office SMALL BUSINESS ADMINISTRATION California Disaster CA-00171 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY: This is a notice of an Administrative declaration of a disaster for the State of CALIFORNIA dated...

  19. 77 FR 58901 - California Disaster #CA-00190

    Science.gov (United States)

    2012-09-24

    ... From the Federal Register Online via the Government Publishing Office SMALL BUSINESS ADMINISTRATION California Disaster CA-00190 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY: This is a notice of an Administrative declaration of a disaster for the State of California dated...

  20. 75 FR 27846 - California Disaster # CA-00155

    Science.gov (United States)

    2010-05-18

    ... [Federal Register Volume 75, Number 95 (Tuesday, May 18, 2010)] [Notices] [Page 27846] [FR Doc No: 2010-11746] SMALL BUSINESS ADMINISTRATION [Disaster Declaration 12166 and 12167] California Disaster CA-00155 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY: This is a Notice of...