WorldWideScience

Sample records for severe heart attack

  1. Heart Attack Recovery FAQs

    Science.gov (United States)

    ... recommendations to make a full recovery. View an animation of a heart attack . Heart Attack Recovery Questions ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  2. Women's Heart Disease: Heart Attack Symptoms

    Science.gov (United States)

    ... of this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter ... most common heart attack symptom in men and women is chest pain or discomfort. However, women also ...

  3. Heart attack - discharge

    Science.gov (United States)

    ... and lifestyle Cholesterol - drug treatment Controlling your high blood pressure Deep vein thrombosis - discharge Dietary fats explained Fast food tips Heart attack - discharge Heart attack - what to ask your doctor Heart bypass ... pacemaker - discharge High blood pressure - what to ask your doctor How to read ...

  4. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  5. Pericarditis - after heart attack

    Science.gov (United States)

    ... include: A previous heart attack Open heart surgery Chest trauma A heart attack that has affected the thickness of your heart muscle Symptoms Symptoms include: Anxiety Chest pain from the swollen pericardium rubbing on the ...

  6. Heart Attack

    Science.gov (United States)

    ... family history of heart attack race – African Americans, Mexican Americans, Native Americans, and native Hawaiians are at ... Your doctor will prescribe the medicines that are right for you. If you have had a heart ...

  7. Heart Attack Symptoms in Women

    Science.gov (United States)

    ... fat, cholesterol and other substances (plaque). Watch an animation of a heart attack . Many women think the ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  8. Heart Attack

    Science.gov (United States)

    ... properly causes your body's blood sugar levels to rise, increasing your risk of heart attack. Metabolic syndrome. This occurs when you have obesity, high blood pressure and high blood sugar. Having metabolic ...

  9. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  10. Heart Attack Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for heart...

  11. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  12. Dysfunction of Right Heart in Attack Period of Bronchial Asthma in Children

    Directory of Open Access Journals (Sweden)

    V.А. Kondratiev

    2015-11-01

    Full Text Available There were performed Doppler echocardiography investigations of functional state of the right heart in 42 children aged 5–17 years old in attack period of bronchial asthma of moderate to severe degree. Changes of intra-cardiac hemodynamics of the right heart in children in attack period of bronchial asthma were characterized by disturbance of systolic and diastolic function of the right ventricle and right atrium. Combined systolic-diastolic variant of the right ventricle dysfunction was typical for attack period of bronchial asthma in children and developed in 95.5 % of cases. Elevation of pressure in pulmonary artery was typical and significantly more often occurred in severe asthma attack, herewith pulmonary hypertension of the second degree predominated.

  13. Calcium Supplements: A Risk Factor for Heart Attack?

    Science.gov (United States)

    ... factor for heart attack? I've read that calcium supplements may increase the risk of heart attack. ... D. Some doctors think it's possible that taking calcium supplements may increase your risk of a heart ...

  14. Diabetes - preventing heart attack and stroke

    Science.gov (United States)

    Diabetes complications - heart; Coronary artery disease - diabetes; CAD - diabetes; Cerebrovascular disease - diabetes ... People with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure and high ...

  15. Fuzzy Expert System for Heart Attack Diagnosis

    Science.gov (United States)

    Hassan, Norlida; Arbaiy, Nureize; Shah, Noor Aziyan Ahmad; Afizah Afif@Afip, Zehan

    2017-08-01

    Heart attack is one of the serious illnesses and reported as the main killer disease. Early prevention is significant to reduce the risk of having the disease. The prevention efforts can be strengthen through awareness and education about risk factor and healthy lifestyle. Therefore the knowledge dissemination is needed to play role in order to distribute and educate public in health care management and disease prevention. Since the knowledge dissemination in medical is important, there is a need to develop a knowledge based system that can emulate human intelligence to assist decision making process. Thereby, this study utilized hybrid artificial intelligence (AI) techniques to develop a Fuzzy Expert System for Diagnosing Heart Attack Disease (HAD). This system integrates fuzzy logic with expert system, which helps the medical practitioner and people to predict the risk and as well as diagnosing heart attack based on given symptom. The development of HAD is expected not only providing expert knowledge but potentially become one of learning resources to help citizens to develop awareness about heart-healthy lifestyle.

  16. Warning Signs of Heart Attack, Stroke and Cardiac Arrest

    Science.gov (United States)

    ... for Heart.org CPR & ECC for Heart.org Shop for Heart.org Causes for Heart.org Advocate ... SIGNS may include breaking out in a cold sweat, nausea or lightheadedness. Learn more about heart attack ...

  17. What Is a Heart Attack?

    Science.gov (United States)

    ... medical center. Support from family and friends also can help relieve stress and anxiety. Let your loved ones know how you feel and what they can do to help you. Risk of a Repeat Heart Attack Once ...

  18. Mortality from heart attack in Belgrade population during the period 1990-2004

    Directory of Open Access Journals (Sweden)

    Ratkov Isidora

    2008-01-01

    Full Text Available INTRODUCTION In most countries, cardiovascular diseases are the leading disorders, with ischemic heart diseases being the leading cause of death. According to WHO data, every year about 17 million people die of cardiovascular diseases, which is 30% of all deaths. Ischemic heart diseases contribute from one-third to one-half of all deaths due to cardiovascular diseases. Three point eight million men and 3.4 million women in the world die every year from ischemic heart diseases, and in Europe about 2 million. The highest mortality rate from ischemic heart diseases occurs in India, China and Russia. OBJECTIVE The aim of this descriptive epidemiological study was to determine heart attack mortality in Belgrade population during the period 1990-2004. METHOD In the study, we conducted investigation of Belgrade population during the period 1990-2004. Mortality data were obtained from the city institution for statistics. The mortality rates were calculated based on the total Belgrade population obtained from the mean values for the last two register years (1991 and 2002. The mortality rates were standardized using the direct method of standardization according to the world (Segi standard population. RESULTS In the Belgrade population during the period 1990-2004, the participation of mortality rate due to heart attack among deaths from cardiovascular diseases was 17% in males and 10% in females. In Belgrade male population, mean standardized mortality rates (per 100,000 habitants were 50.5 for heart attack, 8.3 for chronic ischemic heart diseases and 4.6 for angina pectoris, while in females the rates were 30.8, 6.7 and 4.2, respectively. Mortality from ischemic heart diseases and from heart attack was higher in males than in females. During the studied 15-year period, on average 755 males and 483 females died due to heart attack every year. Mean standardized mortality rates per 100,000 habitants were 50.0 in male and 31.1 in female population. Males

  19. Knowledge of Signs and Symptoms of Heart Attack and Stroke among Singapore Residents

    Directory of Open Access Journals (Sweden)

    Joy Li Juan Quah

    2014-01-01

    Full Text Available Aim. To determine the level of knowledge of signs and symptoms of heart attack and stroke in Singapore resident population, in comparison to the global community. Methods. A population based, random sample of 7,840 household addresses was selected from a validated national sampling frame. Each participant was asked eight questions on signs and symptoms of heart attack and 10 questions on stroke. Results. The response rate was 65.2% with 4,192 respondents. The level of knowledge for preselected, common signs and symptoms of heart attack and stroke was 57.8% and 57.1%, respectively. The respondents scored a mean of 5.0 (SD 2.4 out of 8 for heart attack, while they scored a mean of 6.8 (SD 2.9 out of 10 for stroke. Respondents who were ≥50 years, with lower educational level, and unemployed/retired had the least knowledge about both conditions. The level of knowledge of signs and symptoms of heart attack and stroke in Singapore is comparable to USA and Canada. Conclusion. We found a comparable knowledge of stroke and heart attack signs and symptoms in the community to countries within the same economic, educational, and healthcare strata. However older persons, those with lower educational level and those who are unemployed/retired, require more public health education efforts.

  20. US State-level income inequality and risks of heart attack and coronary risk behaviors: longitudinal findings.

    Science.gov (United States)

    Pabayo, Roman; Kawachi, Ichiro; Gilman, Stephen E

    2015-07-01

    To examine prospectively the association between US state income inequality and incidence of heart attack. We used data from the National Epidemiologic Survey on Alcohol and Related Conditions (n = 34,445). Respondents completed interviews at baseline (2001-2002) and follow-up (2004-2005). Weighted multilevel modeling was used to determine if US state-level income inequality (measured by the Gini coefficient) at baseline was a predictor of heart attack during follow-up, controlling for individual-level and state-level covariates. In comparison to residents of US states in the lowest quartile of income inequality, those living in the second [Adjusted Odds Ratio (AOR) = 1.71, 95 % CI 1.16-2.53)], third (AOR = 1.81, 95 % CI 1.28-2.57), and fourth (AOR = 2.04, 95 % CI 1.26-3.29) quartiles were more likely to have a heart attack. Similar findings were obtained when we excluded those who had a heart attack prior to baseline. This study is one of the first to empirically show the longitudinal relationship between income inequality and coronary heart disease. Living in a state with higher income inequality increases the risk for heart attack among US adults.

  1. Gender differences in the link between childhood socioeconomic conditions and heart attack risk in adulthood.

    Science.gov (United States)

    Hamil-Luker, Jenifer; O'Rand, Angela M

    2007-02-01

    A growing body of evidence shows that childhood socioeconomic status (SES) is predictive of disease risk in later life, with those from the most disadvantaged backgrounds more likely to experience poor adult-health outcomes. Most of these studies, however are based on middle-aged male populations and pay insufficient attention to the pathways between childhood risks and specific adult disorders. This article examines gender differences in the link between childhood SES and heart attack risk trajectories and the mechanisms by which early environments affect future disease risk. By using methods that model both latent and path-specific influences, we identify heterogeneity in early life conditions and human, social, and health capital in adulthood that contribute to diverse heart attack risk trajectories between and among men and women as they age into their 60s and 70s. We find that key risk factors for heart attack operate differently for men and women. For men, childhood SES does not differentiate those at low, increasing, and high risk for heart attack. In contrast, women who grew up without a father and/or under adverse economic conditions are the most likely to experience elevated risk for heart attack, even after we adjust for the unequal distribution of working and living conditions, social relationships, access to health care, and adult lifestyle behaviors that influence health outcomes.

  2. Higher coronary heart disease and heart attack morbidity in Appalachian coal mining regions.

    Science.gov (United States)

    Hendryx, Michael; Zullig, Keith J

    2009-11-01

    This study analyzes the U.S. 2006 Behavioral Risk Factor Surveillance System survey data (N=235,783) to test whether self-reported cardiovascular disease rates are higher in Appalachian coal mining counties compared to other counties after control for other risks. Dependent variables include self-reported measures of ever (1) being diagnosed with cardiovascular disease (CVD) or with a specific form of CVD including (2) stroke, (3) heart attack, or (4) angina or coronary heart disease (CHD). Independent variables included coal mining, smoking, BMI, drinking, physician supply, diabetes co-morbidity, age, race/ethnicity, education, income, and others. SUDAAN Multilog models were estimated, and odds ratios tested for coal mining effects. After control for covariates, people in Appalachian coal mining areas reported significantly higher risk of CVD (OR=1.22, 95% CI=1.14-1.30), angina or CHD (OR=1.29, 95% CI=1.19-1.39) and heart attack (OR=1.19, 95% CI=1.10-1.30). Effects were present for both men and women. Cardiovascular diseases have been linked to both air and water contamination in ways consistent with toxicants found in coal and coal processing. Future research is indicated to assess air and water quality in coal mining communities in Appalachia, with corresponding environmental programs and standards established as indicated.

  3. Ventilatory control of heart rate during inhalation of 5% CO2 and types of panic attacks.

    Science.gov (United States)

    Ley, R

    1991-09-01

    Differences in the magnitude of increases in heart rate during prolonged inhalation of 5% CO2 range from a mean of 25 b/min for a group of eight panic-disorder patients who panicked (Woods, Charney, Goodman, & Heninger, 1988. Archives of General Psychiatry, 45, 43-52) to zero b/min for 16 patients, eight of whom panicked (Craske & Barlow, 1990. Journal of Abnormal Psychology, 99, 302-307). What accounts for this disparity? The present paper describes how heart rate can be increased by means of voluntary overbreathing during prolonged inhalation of 5% CO2 in air. This suggests that differences in the degree of overbreathing may explain differences in the magnitude of increases in heart rate during inhalation of 5% CO2. An explanation is also offered for the curious finding that some patients experience "panic attacks" with zero increase in heart rate. Evidence suggests that this is likely to happen in cognitively based panic attacks, in contrast to hyperventilatory attacks or anticipatory attacks.

  4. Higher coronary heart disease and heart attack morbidity in Appalachian coal mining regions

    Energy Technology Data Exchange (ETDEWEB)

    Hendryx, M.; Zullig, K.J. [West Virginia University, Morgantown, WV (United States). Dept. of Community Medicine

    2009-11-15

    This study analyzes the U.S. 2006 Behavioral Risk Factor Surveillance System survey data (N = 235,783) to test whether self-reported cardiovascular disease rates are higher in Appalachian coal mining counties compared to other counties after control for other risks. Dependent variables include self-reported measures of ever (1) being diagnosed with cardiovascular disease (CVD) or with a specific form of CVD including (2) stroke, (3) heart attack, or (4) angina or coronary heart disease (CHD). Independent variables included coal mining, smoking, BMI, drinking, physician supply, diabetes co-morbidity, age, race/ethnicity, education, income, and others. SUDAAN Multilog models were estimated, and odds ratios tested for coal mining effects. After control for covariates, people in Appalachian coal mining areas reported significantly higher risk of CVD (OR = 1.22, 95% CI = 1.14-1.30), angina or CHO (OR = 1.29, 95% C1 = 1.19-1.39) and heart attack (OR = 1.19, 95% C1 = 1.10-1.30). Effects were present for both men and women. Cardiovascular diseases have been linked to both air and water contamination in ways consistent with toxicants found in coal and coal processing. Future research is indicated to assess air and water quality in coal mining communities in Appalachia, with corresponding environmental programs and standards established as indicated.

  5. Investigating the Possibility to Individualize Asthma Attack Therapy Based on Attack Severity and Patient Characteristics

    Directory of Open Access Journals (Sweden)

    Sárkány Zoltán

    2016-03-01

    Full Text Available Introduction: The objective of this study was to investigate with the help of a computerized simulation model whether the treatment of an acute asthma attack can be individualized based on the severity of the attack and the characteristics of the patient. Material and Method: A stochastic lung model was used to simulate the deposition of 1 nm - 10 μm particles during a mild and a moderate asthma attack. Breathing parameters were varied to maximize deposition, and simulation results were compared with those obtained in the case of a severe asthma attack. In order to investigate the effect of height on the deposition of inhaled particles, another series of simulations was carried out with identical breathing parameters, comparing patient heights of 155 cm, 175 cm and 195 cm. Results: The optimization process yielded an increase in the maximum deposition values of around 6-7% for each type of investigated asthma attack, and the difference between attacks of different degree of severity was around 5% for both the initial and the optimized values, a higher degree of obstruction increasing the amount of deposited particles. Conclusions: Our results suggest that the individualization of asthma attack treatment cannot be based on particles of different size, as the highest deposited fraction in all three types of attacks can be obtained using 0.01 μm particles. The use of a specific set of breathing parameters yields a difference between a mild and a moderate, as well as a moderate and a severe asthma attack of around 5%.

  6. Before Using Aspirin to Lower Your Risk of Heart Attack or Stroke, Here Is What You Should Know

    Science.gov (United States)

    ... Medicines Safe Daily Use of Aspirin Before Using Aspirin to Lower Your Risk of Heart Attack or ... care provider can determine whether regular use of aspirin will help to prevent a heart attack or ...

  7. Knowledge of heart attack and stroke symptomology: a cross-sectional comparison of rural and non-rural US adults

    Directory of Open Access Journals (Sweden)

    Swanoski Michael T

    2012-06-01

    Full Text Available Abstract Background Understanding the signs and symptoms of heart attacks and strokes are important not only in saving lives, but also in preserving quality of life. Findings from recent research have yielded that the prevalence of cardiovascular disease risk factors are higher in rural populations, suggesting that adults living in rural locales may be at higher risk for heart attack and/or stroke. Knowledge of heart attack and stroke symptomology as well as calling 911 for a suspected heart attack or stroke are essential first steps in seeking care. This study sought to examine the knowledge of heart attack and stroke symptoms among rural adults in comparison to non-rural adults living in the U.S. Methods Using multivariate techniques, a cross-sectional analysis of an amalgamated multi-year Behavioral Risk Factor Surveillance Survey (BRFSS database was performed. The dependent variable for this analysis was low heart attack and stroke knowledge score. The covariates for the analysis were: age, sex, race/ethnicity, annual household income, attained education, health insurance status, having a health care provider (HCP, timing of last routine medical check-up, medical care deferment because of cost, self-defined health status and geographic locale. Results The weighted n for this study overall was 103,262,115 U.S. adults > =18 years of age. Approximately 22.0% of these respondents were U.S. adults living in rural locales. Logistic regression analysis revealed that those U.S. adults who had low composite heart attack and stroke knowledge scores were more likely to be rural (OR = 1.218 95%CI 1.216-1.219 rather than non-rural residents. Furthermore, those with low scores were more likely to be: male (OR = 1.353 95%CI 1.352-1.354, >65 years of age (OR = 1.369 95%CI 1.368-1.371, African American (OR = 1.892 95%CI 1.889-1.894, not educated beyond high school (OR = 1.400 955CI 1.399-1.402, uninsured (OR = 1.308 95%CI 1

  8. Panic Attack or Heart Attack?

    Science.gov (United States)

    ... When in doubt about symptoms, seek care without delay to rule out heart disease. Heart disease affects your heart's ... which cause you concern, see your doctor without delay and ask for testing to rule out heart disease. 1 Gadolinium side effects could ...

  9. Comparing Asian American Women's Knowledge, Self-Efficacy, and Perceived Risk of Heart Attack to Other Racial and Ethnic Groups: The mPED Trial.

    Science.gov (United States)

    Fukuoka, Yoshimi; Lisha, Nadra E; Vittinghoff, Eric

    2017-09-01

    The aim of the study was to compare knowledge and awareness of heart attacks/heart disease and perceived risk for future heart attack in Asian/Pacific Islander women, compared to other racial and ethnic groups. In this cross-sectional study, 318 women enrolled in a mobile phone-based physical activity education trial were analyzed. Heart attack knowledge, self-efficacy for recognizing and responding to heart attack symptoms, and perceived risk for a future heart attack were measured. Analyses were conducted using logistic, proportional odds, and linear regression models, depending on the outcome and adjusting for age. Pairwise differences between Asian/Pacific Islanders and the other four groups were assessed using a Bonferroni correction (p Asian/Pacific Islander women had significantly lower total scores for knowledge of heart attack and self-efficacy for heart attack recognition and care seeking behavior compared to the Caucasian women (p = 0.001 and p = 0.002, respectively). However, perceived risk did not differ among the groups. Forty-six percent of the Asian American women, compared to 25% of Caucasian women, falsely believed "breast cancer is the number one cause of death for women (p = 0.002)." In addition, Asian/Pacific Islander women were less likely to report "arm pain, numbness, tingling, or radiating" as one of the heart attack symptoms compared to the Caucasian and the multiracial group (34%, 63% [p Asian/Pacific Islander women and Caucasian women.

  10. Can You Recognize a Heart Attack or Stroke? What To Do When Every Moment Counts

    Science.gov (United States)

    ... Special Issues Subscribe August 2014 Print this issue Can You Recognize a Heart Attack or Stroke? What ... could prevent many of these deaths. Fast action can also limit permanent damage to the body. Heart ...

  11. Understand Your Risk of Heart Attack

    Science.gov (United States)

    ... not as great as men's. Heredity (Including Race) Children of parents with heart disease are more likely to develop it themselves. African Americans have more severe high blood pressure than Caucasians and a higher risk of heart ...

  12. Plasma Exchange in Severe Attacks of Neuromyelitis Optica

    Directory of Open Access Journals (Sweden)

    Mickael Bonnan

    2012-01-01

    Full Text Available Background. Neuromyelitis optica (NMO attacks are poorly controlled by steroids and evolve in stepwise neurological impairments. Assuming the strong humoral response underlying NMO attacks, plasma exchange (PLEX is an appropriate technique in severe NMO attacks. Objective. Presenting an up-to-date review of the literature of PLEX in NMO. Methods. We summarize the rationale of PLEX in relation with the physiology of NMO, the main technical aspects, and the available studies. Results. PLEX in severe attacks from myelitis or optic neuritis are associated with a better outcome, depending on PLEX delay (“time is cord and eyes”. NMO-IgG status has no influence. Finally, we build up an original concept linking the inner dynamic of the lesion, the timing of PLEX onset and the expected clinical results. Conclusion. PLEX is a safe and efficient add-on therapy in NMO, in synergy with steroids. Large therapeutic trials are required to definitely assess the procedure and define the time opportunity window.

  13. Applying Magneto-rheology to Reduce Blood Viscosity and Suppress Turbulence to Prevent Heart Attacks

    Science.gov (United States)

    Tao, R.

    Heart attacks are the leading causes of death in USA. Research indicates one common thread, high blood viscosity, linking all cardiovascular diseases. Turbulence in blood circulation makes different regions of the vasculature vulnerable to development of atherosclerotic plaque. Turbulence is also responsible for systolic ejection murmurs and places heavier workload on heart, a possible trigger of heart attacks. Presently, neither medicine nor method is available to suppress turbulence. The only method to reduce the blood viscosity is to take medicine, such as aspirin. However, using medicine to reduce the blood viscosity does not help suppressing turbulence. In fact, the turbulence gets worse as the Reynolds number goes up with the viscosity reduction by the medicine. Here we report our new discovery: application of a strong magnetic field to blood along its flow direction, red blood cells are polarized in the magnetic field and aggregated into short chains along the flow direction. The blood viscosity becomes anisotropic: Along the flow direction the viscosity is significantly reduced, but in the directions perpendicular to the flow the viscosity is considerably increased. In this way, the blood flow becomes laminar, turbulence is suppressed, the blood circulation is greatly improved, and the risk for heart attacks is reduced. While these effects are not permanent, they last for about 24 hours after one magnetic therapy treatment.

  14. An avatar based education application to improve patients' knowledge of and response to heart attack symptoms: a pragmatic randomized controlled trial protocol.

    Science.gov (United States)

    Tongpeth, Jintana; Du, Huiyun; Clark, Robyn

    2018-06-19

    To evaluate the effectiveness of an interactive, avatar based education application to improve knowledge of and response to heart attack symptoms in people who are at risk of a heart attack. Poor knowledge of heart attack symptoms is recognised as a significant barrier to timely medical treatment. Numerous studies have demonstrated that technology can assist in patient education to improve knowledge and self-care. A single-center, non-blinded, two parallel groups, pragmatic randomized controlled trial. Seventy patients will be recruited from the coronary care unit of a public hospital. Eligible participants will be randomised to either the usual care or the intervention group (usual care plus avatar-based heart attack education app). The primary outcome of this study is knowledge. Secondary outcomes include response to heart attack symptoms, health service use and satisfaction. Study participants will be followed-up for six months. This study will evaluate the avatar based education app as a method to deliver vital information to patients. Participants' knowledge of and response to heart attack symptoms, as well as their health service use, will be assessed to evaluate the intervention effectiveness. This article is protected by copyright. All rights reserved. This article is protected by copyright. All rights reserved.

  15. Aspirin for Reducing Your Risk of Heart Attack and Stroke: Know the Facts

    Science.gov (United States)

    ... the-Counter Medicines Safe Daily Use of Aspirin Aspirin for Reducing Your Risk of Heart Attack and ... any pharmacy, grocery or convenience store and buy aspirin without a prescription. The Drug Facts label on ...

  16. Non-invasive ventilation in severe asthma attack, its possibilities and problems.

    Science.gov (United States)

    Murase, K; Tomii, K; Chin, K; Niimi, A; Ishihara, K; Mishima, M

    2011-06-01

    Asthma attack is characterized by episodic attacks of cough, dyspnea and wheeze occurring due to bronchoconstriction, airway hyperresponsiveness and mucous hypersecretion. Although nationwide clinical guidelines have been published to establish the standard care of asthma, choices in the treatment of fatal asthma attacks remain of clinical significance. Especially, in a severe asthma attack, despite the application of conventional medical treatment, respiratory management is critical. Even though non-invasive ventilation (NIV) has been shown to be effective in a wide variety of clinical settings, reports of NIV in asthmatic patients are scarce. According to a few prospective clinical trials reporting promising results in favour of the use of NIV in a severe asthma attack, a trial of NIV prior to invasive mechanical ventilation seems acceptable and may benefit patients by decreasing the need for intubation and by supporting pharmaceutical treatments. Although selecting the appropriate patients for NIV use is a key factor in successful NIV application, how to distinguish such patients is quite controversial. Larger high quality clinical trails are urgently required to confirm the benefits of NIV to patients with severe asthma attack. In this article, we focus on the body of evidence supporting the use of NIV in asthma attacks and discuss its advantages as well its problems.

  17. Cancer and heart attack survivors’ expectations of employment status: results from the English Longitudinal Study of Ageing

    Directory of Open Access Journals (Sweden)

    Saskia F. A. Duijts

    2017-08-01

    Full Text Available Abstract Background Sociodemographic, health- and work-related factors have been found to influence return to work in cancer survivors. It is feasible though that behavioural factors, such as expectation of being at work, could also affect work-related outcomes. Therefore, the effect of earlier identified factors and expectation of being at work on future employment status in cancer survivors was explored. To assess the degree to which these factors specifically concern cancer survivors, a comparison with heart attack survivors was made. Methods Data from the English Longitudinal Study of Ageing were used. Cancer and heart attack survivors of working age in the UK were included and followed up for 2 years. Baseline characteristics of both cancer and heart attack survivors were compared regarding employment status. Univariate and multivariate regression analyses were performed in survivors at work, and the interaction between independent variables and diagnose group was assessed. Results In cancer survivors at work (N = 159, alcohol consumption, participating in moderate or vigorous sport activities, general health and participation were univariate associated with employment status at two-year follow-up. Only fair general health (compared to very good general health remained statistically significant in the multivariate model (OR 0.31; 95% CI 0.13–0.76; p = 0.010. In heart attack survivors at work (N = 78, gender, general health and expectation of being at work were univariate associated with employment status at follow-up. Female gender (OR 0.03; 95% CI 0.00–0.57; p = 0.018 and high expectation of being at work (OR 10.68; 95% CI 1.23–93.92; p = 0.033 remained significant in the multivariate model. The influence of gender (p = 0.066 and general health (p = 0.020 regarding employment status was found to differ significantly between cancer and heart attack survivors. Conclusions When predicting future employment status in cancer

  18. Cancer and heart attack survivors' expectations of employment status: results from the English Longitudinal Study of Ageing.

    Science.gov (United States)

    Duijts, Saskia F A; van der Beek, Allard J; Bleiker, Eveline M A; Smith, Lee; Wardle, Jane

    2017-08-07

    Sociodemographic, health- and work-related factors have been found to influence return to work in cancer survivors. It is feasible though that behavioural factors, such as expectation of being at work, could also affect work-related outcomes. Therefore, the effect of earlier identified factors and expectation of being at work on future employment status in cancer survivors was explored. To assess the degree to which these factors specifically concern cancer survivors, a comparison with heart attack survivors was made. Data from the English Longitudinal Study of Ageing were used. Cancer and heart attack survivors of working age in the UK were included and followed up for 2 years. Baseline characteristics of both cancer and heart attack survivors were compared regarding employment status. Univariate and multivariate regression analyses were performed in survivors at work, and the interaction between independent variables and diagnose group was assessed. In cancer survivors at work (N = 159), alcohol consumption, participating in moderate or vigorous sport activities, general health and participation were univariate associated with employment status at two-year follow-up. Only fair general health (compared to very good general health) remained statistically significant in the multivariate model (OR 0.31; 95% CI 0.13-0.76; p = 0.010). In heart attack survivors at work (N = 78), gender, general health and expectation of being at work were univariate associated with employment status at follow-up. Female gender (OR 0.03; 95% CI 0.00-0.57; p = 0.018) and high expectation of being at work (OR 10.68; 95% CI 1.23-93.92; p = 0.033) remained significant in the multivariate model. The influence of gender (p = 0.066) and general health (p = 0.020) regarding employment status was found to differ significantly between cancer and heart attack survivors. When predicting future employment status in cancer survivors in the UK, general health is the most relevant factor

  19. Severe asthma and acute attacks: diagnosis and management in ...

    African Journals Online (AJOL)

    Patients who continue to have symptoms with frequent attacks of asthma despite being adherent to treatment with multiple asthma medications, have severe asthma. Severe asthma has significant implications for the affected individual and utilise a disproportionate share of the health care costs associated with asthma.

  20. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. ...

  1. Cyber attack analysis on cyber-physical systems: Detectability, severity, and attenuation strategy

    Science.gov (United States)

    Kwon, Cheolhyeon

    Security of Cyber-Physical Systems (CPS) against malicious cyber attacks is an important yet challenging problem. Since most cyber attacks happen in erratic ways, it is usually intractable to describe and diagnose them systematically. Motivated by such difficulties, this thesis presents a set of theories and algorithms for a cyber-secure architecture of the CPS within the control theoretic perspective. Here, instead of identifying a specific cyber attack model, we are focused on analyzing the system's response during cyber attacks. Firstly, we investigate the detectability of the cyber attacks from the system's behavior under cyber attacks. Specifically, we conduct a study on the vulnerabilities in the CPS's monitoring system against the stealthy cyber attack that is carefully designed to avoid being detected by its detection scheme. After classifying three kinds of cyber attacks according to the attacker's ability to compromise the system, we derive the necessary and sufficient conditions under which such stealthy cyber attacks can be designed to cause the unbounded estimation error while not being detected. Then, the analytical design method of the optimal stealthy cyber attack that maximizes the estimation error is developed. The proposed stealthy cyber attack analysis is demonstrated with illustrative examples on Air Traffic Control (ATC) system and Unmanned Aerial Vehicle (UAV) navigation system applications. Secondly, in an attempt to study the CPSs' vulnerabilities in more detail, we further discuss a methodology to identify potential cyber threats inherent in the given CPSs and quantify the attack severity accordingly. We then develop an analytical algorithm to test the behavior of the CPS under various cyber attack combinations. Compared to a numerical approach, the analytical algorithm enables the prediction of the most effective cyber attack combinations without computing the severity of all possible attack combinations, thereby greatly reducing the

  2. Disorders of cardiac hemodynamic in attack period of bronchial asthma in children

    Directory of Open Access Journals (Sweden)

    Kondratiev V.А.

    2016-05-01

    Full Text Available By dopplerechocardiography method there was studied functional state of cardiac ventricles and character of hemodynamic disorders in 48 patients aged 5-17 years in attack period of moderately-severe and severe bronchial asthma. Group of comparison included 40 healthy peers. Disorders of central and peripheral hemodynamic in attack period of bronchial asthma in children were accompanied both by systolic and diastolic dysfunction of the left and right heart ventricles, herewith right ventricle was functioning in the mode of hyperdynamic, and left one – in the mode of hypodynamic. Combined systolic-diastolic variant of dysfunction both of right and left ventricles was developing in 58,3% of patients with moderately-severe and in 91,6% of patients with severe bronchial asthma. In the attack period of bronchial asthma in children equal directionality of systolic and diastolic dysfunction of heart ventricles was developing; this was characterized by synchronization of their function. Assessment of functional interaction of the ventricles under conditions of severe asthma attack showed direct and high (r=0,67 correlative interaction between finding of Tei index of the left and right ventricles, which characterize their systolic function; this, under conditions of increased hemodynamic pre-loading testified to compensatory increase of systolic interaction of ventricles. Direct and high (r=0,69 correlative interaction between time indices of isovolumic relaxation of the left and right ventricles, characterizing their diastolic function, testified to compensatory increase of diastolic interaction of ventricles under conditions of increase of hemodynamic post-loading. Imbalance of central and peripheral link of hemodynamic in attack period of bronchial asthma in children testified to development of cardiac insufficiency, which was compensated predominantly at the expense of increase of heart contractions rate.

  3. Does Uninsurance Affect the Health Outcomes of the Insured? Evidence from Heart Attack Patients in California

    NARCIS (Netherlands)

    Meltem Daysal, N.

    2012-01-01

    Abstract: In this paper, I examine the impact of uninsured patients on the health of the insured, focusing on one health outcome - the in-hospital mortality rate of insured heart attack patients. I employ panel data models using patient discharge and hospital financial data from California

  4. Does uninsurance affect the health outcomes of the insured? Evidence from heart attack patients in California

    NARCIS (Netherlands)

    Meltem Daysal, N.

    2012-01-01

    In this paper, I examine the impact of uninsured patients on the in-hospital mortality rate of insured heart attack patients. I employ panel data models using patient discharge and hospital financial data from California (1999–2006). My results indicate that uninsured patients have an economically

  5. Tracks FAQs: How Do Heart Attack Hospitalization Rates In My Community Compare With Other Counties Or States?

    Centers for Disease Control (CDC) Podcasts

    In this podcast, CDC Tracking experts discuss how to compare heart attack hospitalization rates in your community with other counties or states. Do you have a question for our Tracking experts? Please e-mail questions to trackingsupport@cdc.gov.

  6. Family history and body mass index predict perceived risks of diabetes and heart attack among community-dwelling Caucasian, Filipino, Korean, and Latino Americans--DiLH Survey.

    Science.gov (United States)

    Fukuoka, Yoshimi; Choi, JiWon; S Bender, Melinda; Gonzalez, Prisila; Arai, Shoshana

    2015-07-01

    The purpose of the study was to explore the perceived risk for diabetes and heart attack and associated health status of Caucasian, Filipino, Korean, and Latino Americans without diabetes. A cross-sectional survey was conducted with 904 urban adults (mean age 44.3±16.1 years; 64.3% female) in English, Spanish or Korean between August and December 2013. Perceived risk for developing diabetes was indicated by 46.5% (n=421), and 14.3% (n=129) perceived themselves to be at risk for having a heart attack in their lifetime. Significant predictors of pessimistic diabetes risk perceptions: Filipino (adjusted odds ratio [AOR]=1.7; 95% CI: 1.04-2.86) and Korean (AOR=2.4; 1.33-4.48) ethnicity, family history of diabetes (AOR=1.4; 1.00-1.84), female gender (AOR=1.4; 1.04-1.96), high cholesterol (AOR= 1.6; 1.09-2.37) and higher body mass index (BMI) (AOR=1.1; 1.08-1.15). Predictors of pessimistic heart attack risk perceptions were family history of an early heart attack (AOR=2.9; 1.69-5.02), high blood pressure (AOR=2.4; 1.45-3.84), and higher BMI (AOR=1.1; 1.04-1.12) after controlling for socio-demographic factors. Older age, physical inactivity, smoking, and low HDL levels were not associated with risk perceptions. Multiple risk factors were predictive of greater perceived diabetes risk, whereas, only family history of heart attack, high blood pressure and increases in BMI significantly contributed to perceived risk of heart attack among ethnically diverse at risk middle-aged adults. It is important that healthcare providers address the discordance between an individual's risk perceptions and the presence of actual risk factors. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  7. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... major stroke. It's important to call 9-1-1 immediately for any stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. The content in this ...

  8. Heart Health - Brave Heart

    Science.gov (United States)

    ... Bar Home Current Issue Past Issues Cover Story Heart Health Brave Heart Past Issues / Winter 2009 Table of Contents For ... you can have a good life after a heart attack." Lifestyle Changes Surviving—and thriving—after such ...

  9. Xamoterol in severe congestive heart failure

    DEFF Research Database (Denmark)

    Tangø, M; Lyngborg, K; Mehlsen, J

    1992-01-01

    Twelve patients in severe congestive heart failure were given placebo, 100 mg xamoterol (Corwin) twice daily and 200 mg xamoterol twice daily, respectively, in 3 two-week periods in a double-blind randomised study. At the end of each treatment period the patients were evaluated. No differences were...... found between placebo and xamoterol in the following parameters: New York Heart Association function group index, heart volume, body weight, exercise duration on bicycle and treadmill, heart rate and systolic and diastolic blood pressure at rest. However, during exercise we found significantly lower...... heart rate and rate-pressure product during xamoterol treatment. This reduction is probably indicating occupation of beta-adrenoreceptors with concomitant reduced oxygen consumption during exercise....

  10. Heart Disease Risk Factors

    Science.gov (United States)

    ... About CDC.gov . Home About Heart Disease Coronary Artery Disease Heart Attack Heart Attack Signs and Symptoms ... Privacy FOIA No Fear Act OIG 1600 Clifton Road Atlanta , GA 30329-4027 USA 800-CDC-INFO ( ...

  11. Preliminary data from γ-cardiography during the abatement of an asthmatic attack (1961)

    International Nuclear Information System (INIS)

    Georges, R.; Vernejoul, P. de; Raynaud, C.; Blanchon, P.; Kellershohn, C.; Turiaf, J.

    1961-01-01

    The authors used gamma cardiology during the abatement of 16 cases of asthma with a view to detecting heart attacks not otherwise visible with routine methods of examination: clinical, radiological and electro-cardio-graphical. In gamma cardiology, a radioactive indicator is used and its path followed in the cavities of the heart. The method makes it possible to study the circulation in the right heart, the pulmonary crossing, and the left heart, as well as evaluation of the heart-flow. As a result of their investigations the authors, after having discussed the significance of the data obtained with the method, suggest that it is possible by the use of gamma cardiography during the abatement of an asthma attack: 1- To confirm attacks of the right heart which have already been detected by ordinary methods. 2- To confirm the presence of modifications in the recorded curves which suggest, in the case of the left heart, possible attack; such on attack is also indicated, in a small number of cases, by electrocardiography curves. Some considerations are put forward by the authors concerning the physiopathology of attacks on the left heart. (authors) [fr

  12. The association of a heart attack or stroke with depressive symptoms stratified by the presence of a close social contact: findings from the National Health and Aging Trends Study Cohort.

    Science.gov (United States)

    Simning, Adam; Seplaki, Christopher L; Conwell, Yeates

    2018-01-01

    The objective of the study is to examine whether the risk of having clinically significant depressive symptoms following a heart attack or stroke varies by the presence of a close social contact. The National Health and Aging Trends Study is a nationally representative longitudinal survey of US Medicare beneficiaries aged 65 and older initiated in 2011. A total of 5643 older adults had information on social contacts at baseline and depressive symptoms at the 1-year follow-up interview. The two-item Patient Health Questionnaire identified clinically significant depressive symptoms. Interview questions examined social contacts and the presence of self-reported heart attack or stroke during the year of follow-up. A total of 297 older adults reported experiencing a heart attack and/or stroke between their baseline and follow-up interviews. In regression analyses accounting for sociodemographics, baseline depressive symptoms, medical comorbidity, and activities of daily living impairment, older adults with no close social contacts had increased odds of depressive symptoms at follow-up after experiencing a heart attack or stroke, while those with close social contacts had increased odds of depressive symptoms at follow-up after experiencing a stroke, but not a heart attack. Older adults have increased odds of having depressive symptoms following a self-reported stroke, but only those with no close social contacts had increased odds of depressive symptoms following a heart attack. Social networks may play a role in the mechanisms underlying depression among older adults experiencing certain acute health events. Future work exploring the potential causal relationships suggested here, if confirmed, could inform interventions to alleviate or prevent depression among at risk older adults. Copyright © 2017 John Wiley & Sons, Ltd. Copyright © 2017 John Wiley & Sons, Ltd.

  13. Heart Health - Heart Disease: Symptoms, Diagnosis, Treatment

    Science.gov (United States)

    ... Bar Home Current Issue Past Issues Cover Story Heart Health Heart Disease: Symptoms, Diagnosis, Treatment Past Issues / Winter 2009 ... of this page please turn Javascript on. Most heart attacks happen when a clot in the coronary ...

  14. Association of heart failure severity with risk of diabetes

    DEFF Research Database (Denmark)

    Demant, Malene N; Gislason, Gunnar H; Køber, Lars

    2014-01-01

    AIMS/HYPOTHESIS: Heart failure has been suggested to increase the risk of developing diabetes. We investigated the relation between heart failure severity, defined by loop-diuretic dosage, and the risk of developing diabetes in a nationwide cohort of patients with heart failure. METHODS: We...... followed all Danish patients discharged from hospitalisation for first-time heart failure in 1997-2010, without prior use of hypoglycaemic agents, until a claimed prescription for hypoglycaemic agents, death or 31 December 2010. The association of loop-diuretic dosage (furosemide equivalents) 90 days after.......32), 2.28 (2.01, 2.59), 2.88 (2.52, 3.30) and 3.02 (2.66, 3.43) without RASi treatment. CONCLUSIONS/INTERPRETATION: In a nationwide cohort of patients with heart failure, severity of heart failure was associated with a stepwise increased risk of developing diabetes. Increased awareness of risk...

  15. Tracks FAQs: How Do Heart Attack Hospitalization Rates In My Community Compare With Other Counties Or States?

    Centers for Disease Control (CDC) Podcasts

    2011-09-01

    In this podcast, CDC Tracking experts discuss how to compare heart attack hospitalization rates in your community with other counties or states. Do you have a question for our Tracking experts? Please e-mail questions to trackingsupport@cdc.gov.  Created: 9/1/2011 by National Center for Environmental Health, Division of Environmental Hazards and Health Effects, Environmental Health Tracking Branch.   Date Released: 9/1/2011.

  16. Adults with Congenital Heart Defects

    Science.gov (United States)

    ... Ebstein's Anomaly l-Transposition of the Great Arteries Patent Ductus Arteriosus (PDA) Pulmonary Valve Stenosis and Regurgitation ... Sodium and Salt 3 Heart Attack Symptoms in Women 4 Warning Signs of a Heart Attack 5 ...

  17. Coronary heart disease risk in patients with stroke or transient ischemic attack and no known coronary heart disease: findings from the Stroke Prevention by Aggressive Reduction in Cholesterol Levels (SPARCL) trial

    DEFF Research Database (Denmark)

    Amarenco, Pierre; Goldstein, Larry B; Sillesen, Henrik

    2010-01-01

    Noncoronary forms of atherosclerosis (including transient ischemic attacks or stroke of carotid origin or >50% stenosis of the carotid artery) are associated with a 10-year vascular risk of >20% and are considered as a coronary heart disease (CHD) -risk equivalent from the standpoint of lipid...... management. The Stroke Prevention by Aggressive Reduction in Cholesterol Levels (SPARCL) trial included patients with stroke or transient ischemic attack and no known CHD regardless of the presence of carotid atherosclerosis. We evaluated the risk of developing clinically recognized CHD in SPARCL patients....

  18. The effects of stress, anxiety, and outdoor temperature on the frequency and severity of Raynaud's attacks: the Raynaud's Treatment Study.

    Science.gov (United States)

    Brown, K M; Middaugh, S J; Haythornthwaite, J A; Bielory, L

    2001-04-01

    It was expected that stress and anxiety would be related to Raynaud's phenomenon (RP) attack characteristics when mild outdoor temperatures produced partial or no digital vasoconstriction. Hypotheses were that in warmer temperature categories, compared to those below 40 degrees F, higher stress or anxiety would be associated with more frequent, severe, and painful attacks. The Raynaud's Treatment Study recruited 313 participants with primary RP. Outcomes were attack rate, severity, and pain. Predictors were average daily outdoor temperature, stress, anxiety, age, gender, and a stress-by-temperature or an anxiety-by-temperature interaction. Outcomes were tested separately in multiple linear regression models. Stress and anxiety were tested in separate models. Stress was not a significant predictor of RP attack characteristics. Higher anxiety was related to more frequent attacks above 60 degrees F. It was also related to greater attack severity at all temperatures, and to greater pain above 60 degrees F and between 40 degrees and 49.9 degrees F.

  19. Heart disease and diet

    Science.gov (United States)

    Diet - heart disease; CAD - diet; Coronary artery disease - diet; Coronary heart disease - diet ... diet and lifestyle can reduce your risk of: Heart disease, heart attacks, and stroke Conditions that lead ...

  20. Heart-Health Screenings

    Science.gov (United States)

    ... Tools For Your Heart Health • Watch, Learn & Live Animations Library Subscribe to Heart Insight magazine and monthly ... in Spanish . Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  1. Heart Lesion After the First Attack of the Rheumatic Fever 22 Years Experience in Single Centre

    Science.gov (United States)

    Bejiqi, Ramush A.; Retkoceri, Ragip; Zeka, Naim; Bejiqi, Hana; Retkoceri, Arber

    2015-01-01

    Background: Acute rheumatic fever and its sequels, rheumatic heart diseases, remain major unsolved preventable health problems in Kosovo population, particularly among the disadvantages indigenous Albanian and Egyptians people. In Kosovo, despite of performing secondary prophylaxis with benzathine penicillin, acute rheumatic fever hospitalization rates have remained essentially unchanged for the last 20 years. The role of echocardiography in the diagnosis of acute rheumatic carditis was established over the last 20 years. Aims: In this study we aimed to determine the prevalence of rheumatic heart disease in children from Kosovo population with first attack of acute rheumatic fever. Also, we presented that echocardiography examination detects a greater prevalence of rheumatic heart disease than other diagnostic procedures. We aimed to compare the sensitivity and specificity of cardiac auscultation, ECG record, lab analysis to echocardiography and to determine the feasibility of specific age in this setting. Methods: To optimize accurate diagnosis of rheumatic fever and rheumatic heart disease, we utilized two group models. In the first group of 388 children, hospitalized and treated before 1999, diagnosis of rheumatic fever was decided basing on the clinical and laboratory findings whereas in second group (221 children treated from1999 to 2010) clinical and lab diagnosis were amplified also on the detection by echocardiography. Conclusion: In second group, using echocardiography as a method of diagnosis and assessment children with rheumatic fever, we found high rates of undetected rheumatic heart disease in this high-risk group population. Echocardiographic examination of children with rheumatic fever for rheumatic heart disease may over diagnose rheumatic heart disease unless congenital mitral valve anomalies and physiological regurgitation are excluded. PMID:25870479

  2. Efficacy of a Community-Based Physical Activity Program KM2H2 for Stroke and Heart Attack Prevention among Senior Hypertensive Patients: A Cluster Randomized Controlled Phase-II Trial.

    Directory of Open Access Journals (Sweden)

    Jie Gong

    Full Text Available To evaluate the efficacy of the program Keep Moving toward Healthy Heart and Healthy Brain (KM2H2 in encouraging physical activities for the prevention of heart attack and stroke among hypertensive patients enrolled in the Community-Based Hypertension Control Program (CBHCP.Cluster randomized controlled trial with three waves of longitudinal assessments at baseline, 3 and 6 months post intervention.Community-based and patient-centered self-care for behavioral intervention in urban settings of China.A total of 450 participants diagnosed with hypertension from 12 community health centers in Wuhan, China were recruited, and were randomly assigned by center to receive either KM2H2 plus standard CBHCP care (6 centers and 232 patients or the standard care only (6 centers and 218 patients.KM2H2 is a behavioral intervention guided by the Transtheoretical Model, the Model of Personalized Medicine and Social Capital Theory. It consists of six intervention sessions and two booster sessions engineered in a progressive manner. The purpose is to motivate and maintain physical activities for the prevention of heart attack and stroke.Heart attack and stroke (clinically diagnosed, primary outcome, blood pressure (measured, secondary outcome, and physical activity (self-report, tertiary outcome were assessed at the individual level during the baseline, 3- and 6-month post-intervention.Relative to the standard care, receiving KM2H2 was associated with significant reductions in the incidence of heart attack (3.60% vs. 7.03%, p < .05 and stroke (5.11% vs. 9.90%, p<0.05, and moderate reduction in blood pressure (-3.72 mmHg in DBP and -2.92 mmHg in DBP at 6-month post-intervention; and significant increases in physical activity at 3- (d = 0.53, 95% CI: 0.21, 0.85 and 6-month (d = 0.45, 95% CI: 0.04, 0.85 post-intervention, respectively.The program KM2H2 is efficacious to reduce the risk of heart attack and stroke among senior patients who are on anti

  3. Heart failure due to severe myocardial calcification

    International Nuclear Information System (INIS)

    Takahashi, Shouichi; Maida, Kiyoshi; Yokoyama, Hitoshi; Tanaka, Shigeo

    1993-01-01

    A 28-year-old female who had had irradiation on the chest wall at the age of 5 as a remedy for keloid granulation after burn, recently developed congestive heart failure. Severe tricuspid regurgitation was demonstrated by echocardiography with a certain calcification in the cardiac shadow on chest radiogram. Calcified right ventricle and ventricular septum were noticed operatively, which disturbed ventricular motion and also caused tricuspid valve deformity. These calcified myocardium apparently corresponded with the irradiation field. After tricuspid valve replacement, she regained physical activity satisfactorily without congestive heart failure. Because she had no other known causes of cardiac calcification such as hypercalcemia, myocarditis, myocardial infarction or renal diseases, irradiation on the chest wall could be responsible for the severe myocardial calcification. (author)

  4. Coronary Artery Dissection: Not Just a Heart Attack

    Science.gov (United States)

    ... for Heart.org CPR & ECC for Heart.org Shop for Heart.org Causes for Heart.org Advocate ... chest pain or pressure, shortness of breath, profuse sweating and dizziness. “Around 80 percent of the time, ...

  5. Heart disease and depression

    Science.gov (United States)

    ... gov/ency/patientinstructions/000790.htm Heart disease and depression To use the sharing features on this page, ... a heart attack or heart surgery Signs of Depression It is pretty common to feel down or ...

  6. Severe right heart failure in a patient with Grave's disease.

    Science.gov (United States)

    Xenopoulos, N P; Braden, G A; Applegate, R J

    1996-11-01

    This brief report presents a patient with isolated right heart failure and two rare underlying causes, hyperthyroidism and dysplastic tricuspid valve. Repair of the tricuspid valve and treatment of the hyperthyroidism were both essential for successful treatment of the right heart failure. Most important, recrudescence of hyperthyroidism in this patient was associated with reappearance of florid right heart failure. This report provides further information about a potential linkage of hyperthyroidism and severe right heart failure.

  7. Risks for Heart Disease & Stroke

    Science.gov (United States)

    ... Prevent Risks for Heart Disease & Stroke Risks for Heart Disease & Stroke About 1.5 million heart attacks and ... can’t change some of your risks for heart disease and stroke, but you can manage many of ...

  8. Gender differences in treatment of severe carotid stenosis after transient ischemic attack.

    Science.gov (United States)

    Poisson, Sharon N; Johnston, S Claiborne; Sidney, Stephen; Klingman, Jeffrey G; Nguyen-Huynh, Mai N

    2010-09-01

    Gender differences in carotid endarterectomy (CEA) rates after transient ischemic attack are not well studied, although some reports suggest that eligible men are more likely to have CEA than women after stroke. We retrospectively identified all patients diagnosed with transient ischemic attack and >or=70% carotid stenosis on ultrasound in 2003 to 2004 from 19 emergency departments. Medical records were abstracted for clinical data; 90-day follow-up events, including stroke, cardiovascular events, or death; CEA within 6 months; and postoperative 30-day outcomes. We assessed gender as a predictor of CEA and its complications adjusting for demographic and clinical variables as well as time to CEA between groups. Of 299 patients identified, 47% were women. Women were older with higher presenting systolic blood pressure and less likely to smoke or to have coronary artery disease or diabetes. Fewer women (36.4%) had CEA than men (53.8%; P=0.004). Reasons for withholding surgical treatment were similar in women and men, and there were no differences in follow-up stroke, cardiovascular event, postoperative complications, or death. Time to CEA was also significantly delayed in women. Women with severe carotid stenosis and recent transient ischemic attack are less likely to undergo CEA than men, and surgeries are more delayed.

  9. Intraventricular Hemorrhage in Moderate to Severe Congenital Heart Disease.

    Science.gov (United States)

    Ortinau, Cynthia M; Anadkat, Jagruti S; Smyser, Christopher D; Eghtesady, Pirooz

    2018-01-01

    Determine the prevalence of intraventricular hemorrhage in infants with moderate to severe congenital heart disease, investigate the impact of gestational age, cardiac diagnosis, and cardiac intervention on intraventricular hemorrhage, and compare intraventricular hemorrhage rates in preterm infants with and without congenital heart disease. A single-center retrospective review. A tertiary care children's hospital. All infants admitted to St. Louis Children's Hospital from 2007 to 2012 with moderate to severe congenital heart disease requiring cardiac intervention in the first 90 days of life and all preterm infants without congenital heart disease or congenital anomalies/known genetic diagnoses admitted during the same time period. None. Cranial ultrasound data were reviewed for presence/severity of intraventricular hemorrhage. Head CT and brain MRI data were also reviewed in the congenital heart disease infants. Univariate analyses were undertaken to determine associations with intraventricular hemorrhage, and a final multivariate logistic regression model was performed. There were 339 infants with congenital heart disease who met inclusion criteria and 25.4% were born preterm. Intraventricular hemorrhage was identified on cranial ultrasound in 13.3% of infants, with the majority of intraventricular hemorrhage being low-grade (grade I/II). The incidence increased as gestational age decreased such that intraventricular hemorrhage was present in 8.7% of term infants, 19.2% of late preterm infants, 26.3% of moderately preterm infants, and 53.3% of very preterm infants. There was no difference in intraventricular hemorrhage rates between cardiac diagnoses. Additionally, the rate of intraventricular hemorrhage did not increase after cardiac intervention, with only three infants demonstrating new/worsening high-grade (grade III/IV) intraventricular hemorrhage after surgery. In a multivariate model, only gestational age at birth and African-American race were predictors

  10. Association of heart rate profile during exercise with the severity of coronary artery disease.

    Science.gov (United States)

    Cay, Serkan; Ozturk, Sezgin; Biyikoglu, Funda; Yildiz, Abdulkadir; Cimen, Tolga; Uygur, Belma; Tuna, Funda

    2009-05-01

    Coronary artery disease is the leading cause of morbidity and mortality around the world. Autonomic nervous system abnormalities are associated with coronary artery disease and its complications. Exercise stress tests are routinely used for the detection of the presence of coronary artery disease. In this study, we observed the association between heart rate profile during exercise and the severity of coronary artery disease. One hundred and sixty patients with abnormal exercise treadmill test (> or =1 mm horizontal or downsloping ST-segment depression; 119 men, 41 women; mean age = 57 +/- 9 years) were included in the study. Use of any drug affecting heart rate was not permitted. Resting heart rate before exercise, maximum heart rate during exercise, and resting heart rate after exercise (5 min later) were measured and two parameters were calculated: heart rate increment (maximum heart rate - resting heart rate before exercise) and heart rate decrement (maximum heart rate - resting heart rate after exercise). All patients underwent selective coronary angiography and subclassified into two groups according to stenotic lesion severity. Group 1 had at least 50% of stenotic lesion and group 2 had less than 50%. Patients in the first group had increased resting heart rate, decreased maximum heart rate, decreased heart rate increment, and decreased heart rate decrement compared with second group. All patients were classified into tertiles of resting heart rate, heart rate increment, and heart rate decrement level to evaluate whether these parameters were associated with severity of coronary artery stenosis in the study. The multiple-adjusted odds ratio of the risk of severe coronary atherosclerosis was 21.888 (95% confidence interval 6.983-68.606) for the highest tertile of resting heart rate level compared with the lowest tertile. In addition, the multiple-adjusted odds ratio of the risk of severe coronary atherosclerosis was 20.987 (95% confidence interval 6

  11. Options for Heart Valve Replacement

    Science.gov (United States)

    ... Guide: Understanding Your Heart Valve Problem | Spanish Symptom Tracker | Spanish Pre-surgery Checklist | Spanish What Is Heart ... Cardiac Arrest: How Are They Different? 7 Warning Signs of a Heart Attack 8 Low Blood Pressure - ...

  12. HE4 Serum Levels Are Associated with Heart Failure Severity in Patients With Chronic Heart Failure

    NARCIS (Netherlands)

    Piek, Arnold; Meijers, Wouter C.; Schroten, Nicolas F.; Gansevoort, Ron T.; de Boer, Rudolf A.; Sillje, Herman H. W.

    Background: The novel biomarker human epididymis protein 4 (HE4) shows prognostic value in acute heart failure (HF) patients. We measured HE4 levels in patients with chronic heart failure (CHF) and correlated them to HF severity, kidney function, and HF biomarkers, and determined its predictive

  13. Congenital Anorectal Malformation Severity Does Not Predict Severity of Congenital Heart Defects

    NARCIS (Netherlands)

    Jonker, Jara E.; Liem, Eryn T.; Elzenga, Nynke J.; Molenbuur, Bouwe; Trzpis, Monika; Broens, Paul M. A.

    2016-01-01

    Objective To determine the prevalence of congenital heart defects (CHDs) in patients with mild or severe congenital anorectal malformations (CARMs), and whether all patients with CARM need pediatric cardiology screening. Study design We included 129 patients with CARM born between 2004 and 2013, and

  14. Neonate With Severe Heart Failure Related to Vein of Galen Malformation

    Directory of Open Access Journals (Sweden)

    Meng-Yu Chen

    2010-08-01

    Full Text Available We report a full-term female neonate who presented with respiratory distress and severe heart failure soon after birth. Heart failure secondary to perinatal infection was initially suspected. Subsequent echocardiography revealed aortic runoff, which led to consideration of an intracranial vascular abnormality. Ultrasound and magnetic resonance imaging of the brain confirmed a diagnosis of vein of Galen aneurismal malformation (VGAM. Endovascular coil embolization of the vascular anomaly was performed, resulting in improvement of heart failure. VGAM should be considered in the differential diagnosis of neonatal congestive heart failure with a structurally normal heart. Urgent endovascular embolization and aggressive medical treatment of heart failure improve prognosis in neonatal VGAM.

  15. Palliative Care in Heart Failure

    Directory of Open Access Journals (Sweden)

    Hatice Mert

    2012-04-01

    Full Text Available Heart failure is an important health problem since its incidence and prevalence is increasing year by year. Since symptom burden and mortality are high in heart failure, supportive and palliative care should be provided. However, very few patients are referred to palliative care services. In comparison with cancer patients, it is difficult to identify end of life care for patients with heart failure, because these patients are hospitalized when the signs of acute decompensation appear, and their symptoms decrease and functional status improve before they are discharged. Therefore, palliative care, which is a holistic approach aiming to improve patients’ quality of life, to detect and treat the attacks of the disease before they become severe, and to deal with patients’ physical, psychological, social, and mental health altogether during their care, should be integrated into heart failure patients’ care. [TAF Prev Med Bull 2012; 11(2.000: 217-222

  16. Implications of the Hemodynamic Optimization Approach Guided by Right Heart Catheterization in Patients with Severe Heart Failure

    Directory of Open Access Journals (Sweden)

    Luís E. Rohde

    2002-03-01

    Full Text Available OBJECTIVE: To report the hemodynamic and functional responses obtained with clinical optimization guided by hemodynamic parameters in patients with severe and refractory heart failure. METHODS: Invasive hemodynamic monitoring using right heart catheterization aimed to reach low filling pressures and peripheral resistance. Frequent adjustments of intravenous diuretics and vasodilators were performed according to the hemodynamic measurements. RESULTS: We assessed 19 patients (age = 48±12 years and ejection fraction = 21±5% with severe heart failure. The intravenous use of diuretics and vasodilators reduced by 12 mm Hg (relative reduction of 43% pulmonary artery occlusion pressure (P<0.001, with a concomitant increment of 6 mL per beat in stroke volume (relative increment of 24%, P<0.001. We observed significant associations between pulmonary artery occlusion pressure and mean pulmonary artery pressure (r=0.76; P<0.001 and central venous pressure (r=0.63; P<0.001. After clinical optimization, improvement in functional class occurred (P< 0.001, with a tendency towards improvement in ejection fraction and no impairment to renal function. CONCLUSION: Optimization guided by hemodynamic parameters in patients with refractory heart failure provides a significant improvement in the hemodynamic profile with concomitant improvement in functional class. This study emphasizes that adjustments in blood volume result in imme-diate benefits for patients with severe heart failure.

  17. CARDIAC EMERGENCY: LIFT UP YOUR HEARTS

    CERN Multimedia

    2000-01-01

    50 000 deaths every year in France following heart problems. You or someone close to you, a friend, a relative, a colleague at work. You all probably know someone who has had a heart attack. Noting that 80% of all deaths occur outside hospital, the Fédération Française de Cardiologie, working in collaboration with first aid groups (rescue associations, etc.), are launching a nationwide campaign to train as many people as possible in what to do for cardiac first aid. According to specialists, more than half of all heart attack victims could have survived if someone nearby had been quick at doing what was needed. The CERN Fire Brigade is helping in this campaign by offering two free training sessions, each lasting three hours and mainly based on recognizing a heart attack, the proper way of calling for help, and practice in mouth-to-mouth resuscitation and heart massage. The courses will be held on 20 November and 6 December from4 to 7 p.m. at Building 65. So don’t wait, stop b...

  18. GRAVES’ DISEASE INDUCED REVERSIBLE SEVERE RIGHT HEART FAILURE

    Directory of Open Access Journals (Sweden)

    Kathyayani

    2015-07-01

    Full Text Available A middle aged man presented with evidence of right - sided heart failure in atrial fibrillation (AF and was found to have severe Tricuspid Regurgitation (TR with pulmonary artery hypertension (PAH, with normal left ventricular function. The common possible seconda ry causes of PAH were ruled out, but during investigation he was found to have elevated thyroid function tests compatible with the diagnosis of Graves’ disease. The treatment of Graves’ disease was started with anti - thyroid drugs and associated with a sign ificant reduction in the pulmonary arterial pressure. This case report is presented to highlight one of the rare and underdiagnosed presentations of Graves’ disease. Thyrotoxicosis can present with profound cardiovascular complications. In recent times, th ere have been few reports of secondary PAH with TR in patients with hyperthyroidism. Previously asymptomatic Graves’ disease having the signs and symptoms of right heart failure is a rare presentation and the association could be easily missed. This case p resentation emphasizes that the diagnosis of thyroid heart disease with heart failure secondary to Graves’ disease should be considered in any patient regardless of age, gender with clinical features of heart failure of unknown etiology and timely initiation of anti - thyroid drugs is necessary to treat these reversible cardiac failures.

  19. Heart Disease Affects Women of All Ages

    Science.gov (United States)

    Skip Navigation Bar Home Current Issue Past Issues Heart Disease Affects Women of All Ages Past Issues / Winter ... weeks of a heart attack. For Women with Heart Disease: About 6 million American women have coronary heart ...

  20. Graves' disease presenting as right heart failure with severe pulmonary hypertension

    OpenAIRE

    Furqan Mohd Akram Khan; Anannya Mukherji; Shekhar T. Nabar; Ashwini G

    2016-01-01

    We report a patient who presented to our institution with clinical features of right sided heart failure and hyperthyroidism. Diagnosis of grave's disease induced reversible severe pulmonary hypertension leading to severe tricuspid regurgitation and right sided heart failure was made after all the common causes were ruled out using the biochemical and radiological investigations and review of literature. Graves disease is a common cause hyperthyroidism, is an immune system disorder that resul...

  1. Heart Age PSA (:60)

    Centers for Disease Control (CDC) Podcasts

    This 60 second public service announcement is based on the September 2015 CDC Vital Signs report. Your heart age is the age of your heart and blood vessels as a result of your risk factors for heart attack and stroke. If you smoke or have high blood pressure, your heart age will be much higher than your actual age. Learn what you can do to lower your heart age and keep it low.

  2. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants....

  3. Total Dietary Fiber, and Selected Vegetable, Fruit, Legume and Cereal Fiber Intake and Risk of Heart Attack in Periodontitis Subjects

    Directory of Open Access Journals (Sweden)

    Nelson Wood

    2011-10-01

    Full Text Available Background: Epidemiological studies have found an association between periodontal disease and coronary artery disease(Arbes, Slade et al. 1999; Beck, Elter et al. 2001; Genco, Offenbacher et al. 2002, and have even implicated periodontal disease as a risk factor(Arbes, Slade et al. 1999; Beck, Elter et al. 2001, however have not proven causality(Hujoel, Drangholt et al. 2000. Although dietary amounts, sources, and types (soluble versus insoluble of fiber have been shown to reduce the risk of heart attack (Liu, Buring et al. 2002; Negri, Vecchia et al. 2003, this author is unaware of studies that have examined the association between food sources of dietary fiber and heart attack risk in subjects with periodontitis.This study was designed to determine whether total dietary fiber and fiber from different plant sources (vegetables, fruits, legumes, or cereals modified self-reported HA risk, as well as acute-phase inflammatory responses in subjects with periodontitis using NHANES III data.Objectives: The objective of this study was to investigate the association between total dietary fiber intake levels, and selected vegetables, fruits, legumes, and cereal fiber intake and the risk of self-reported history of heart attack (HA in periodontitis subjects using data available in the Third National Health and Nutrition Examination Survey (NHANES III.Materials and Methods: Adult participants in NHANES III were used in this study. Zero to thirty three (0-33 percent of sites with periodontal attachment loss > 3 mm was considered a healthy periodontium, while greater than thirty three percent (>33 of sites with periodontal attachment loss of > 3 mm as periodontitis. The outcome variable was the self-reported history of HA. Total dietary fiber, and monthly selected vegetable, fruit, legume and cereal consumption were divided into low and adequate levels. Data was analyzed by Kruskal-Wallis, ANOVA and multivariate analyses using SPSS ®. P<0.05 was used to

  4. Lysine clonixinate versus dipyrone (metamizole) for the acute treatment of severe migraine attacks: a single-blind, randomized study

    OpenAIRE

    Krymchantowski,Abouch Valenty; Carneiro,Henrique; Barbosa,Jackeline; Jevoux,Carla

    2008-01-01

    BACKGROUND AND OBJECTIVE: Nonsteroidal anti-inflammatory drugs (NSAID) are effective to treat migraine attacks. Lysine clonixinate (LC) and dipyrone (metamizol) have been proven effective to treat acute migraine. The aim of this study was to evaluate the efficacy and tolerability of the intravenous formulations of LC and dipyrone in the treatment of severe migraine attacks. METHOD: Thirty patients (28 women, 2 men), aged 18 to 48 years with migraine according the International Headache Societ...

  5. Severe angina pectoris in asthma attack: a case report.

    Science.gov (United States)

    Nabavizadeh, Seyed Hesamedin; Farahbakhsh, Nazanin; Fazel, Ali; Mosavat, Fereshteh; Anushiravani, Amir

    2016-06-01

    Asthma is a chronic inflammatory disorder of the airways related to the obstruction of reversible airflow. Asthma presents as recurrent attacks of cough and dyspnea. Poor control causes recurrent admissions to the ICU, and mortality is related to poor drug compliance and follow-up. Angina pectoris is a syndrome of recurrent chest discomfort related to myocardial ischemia. The presence of these two disorders rarely has been reported. We reported a 12-year-old boy who was referred with exacerbation of asthma and developed angina pectoris during hospitalization. He had labored breathing and diffuse wheezing. During treatment of the asthma, the patient developed severe chest pain due to shunt formation and coronary hypoxia, caused by the sole administration of ventolin, since oxygen had been disconnected. After receiving appropriate therapy, both his asthma and angina recovered, and, to date, he has not experienced angina pectoris again.

  6. Warning Signs of Heart Failure

    Science.gov (United States)

    ... the two terms are used interchangeably. View an animation of heart failure . If you have been diagnosed ... resources here Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  7. Rehab for the Heart (A Minute of Health with CDC)

    Centers for Disease Control (CDC) Podcasts

    2017-08-24

    Each year, nearly 790,000 adults in the U.S. suffer a heart attack. This podcast discusses the importance of getting cardiac rehab after a heart attack.  Created: 8/24/2017 by MMWR.   Date Released: 8/24/2017.

  8. Determination of Relations between Systolic Blood Pressure and Heart Attack in Patients with Type 2 Diabetes with Association Rules

    Directory of Open Access Journals (Sweden)

    Seyyed Payam Shariatpanahi

    2018-03-01

    Full Text Available Abstract Background: Today, the high prevalence of diabetes and its complications are one of the most important public health issues worldwide. For this reason, finding relations between diabetes risk factors is very effective in preventing and reducing complications. For discovering these relations, the data mining methods can be used. By extracting association rules, which is one of the data mining techniques, we can discover the relations between a large numbers of variables in a disease. Materials and Methods: The population of this study was 1046 patients with type 2 diabetes, whose data had recorded between 2011 and 2014 at the Special Clinic for Diabetes in Tehran's Imam Khomeini Hospital. After pre-processing step with SPSS19 software, 573 people entered the analysis phase. The FP-Growth algorithm was applied to the data set to discover the relations between heart attack and other risk factors using Rapid miner5 software. Relations, after extraction, were given to the doctor to confirm clinical validation. Results: The obtained results of studying these 573 people (Including 292 (51% women and 281 (49% men, with age range 27 to 82 years showed that the lack of blood pressure, creatinine and diastolic blood pressure at its normal level, despite higher systolic blood pressure level than normal, doesn't increase the probability of heart attack. Conclusion: Using association rules is a good way of identifying relations between the risk factors of a disease. Also, it can provide new hypotheses to do epidemiological studies for researchers.

  9. CDC Vital Signs-Heart Age

    Centers for Disease Control (CDC) Podcasts

    This podcast is based on the September 2015 CDC Vital Signs report. Your heart age is the age of your heart and blood vessels as a result of your risk factors for heart attack and stroke. If you smoke or have high blood pressure, your heart age will be much higher than your actual age. Learn what you can do to lower your heart age and keep it low.

  10. Rehab for the Heart (A Cup of Health with CDC)

    Centers for Disease Control (CDC) Podcasts

    Each year, nearly 790,000 adults in the U.S. suffer a heart attack. For a third of these, it's not their first. Cardiac rehabilitation could have prevented many of these. In this podcast, Dr. Fleetwood Loustalot discusses the importance of getting cardiac rehab after a heart attack.

  11. Risks for Heart Valve Problems

    Science.gov (United States)

    ... and Live Our Interactive Cardiovascular Library has detailed animations and illustrations to help you learn about conditions, treatments and procedures related to heart disease and stroke. Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  12. Increased mortality after dronedarone therapy for severe heart failure

    DEFF Research Database (Denmark)

    Køber, Lars; Torp-Pedersen, Christian; McMurray, John J V

    2008-01-01

    BACKGROUND: Dronedarone is a novel antiarrhythmic drug with electrophysiological properties that are similar to those of amiodarone, but it does not contain iodine and thus does not cause iodine-related adverse reactions. Therefore, it may be of value in the treatment of patients with heart failure....... METHODS: In a multicenter study with a double-blind design, we planned to randomly assign 1000 patients who were hospitalized with symptomatic heart failure and severe left ventricular systolic dysfunction to receive 400 mg of dronedarone twice a day or placebo. The primary end point was the composite...... of death from any cause or hospitalization for heart failure. RESULTS: After inclusion of 627 patients (310 in the dronedarone group and 317 in the placebo group), the trial was prematurely terminated for safety reasons, at the recommendation of the data and safety monitoring board, in accordance...

  13. Healthy Heart Collaboration and Developed Toolkit

    Science.gov (United States)

    Impact: EPA is raising awareness of heart disease and its link to air pollution and other environmental factors as a partner in Million Hearts, a national initiative to prevent heart attacks and strokes. The talk will provide an up to date review of the evidence linking air poll...

  14. Heart Failure in Children and Adolescents

    Science.gov (United States)

    ... the lungs where oxygen is added. Watch an animation of blood flow in the heart All the ... resources here Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  15. Valsartan in the treatment of heart attack survivors

    Directory of Open Access Journals (Sweden)

    Bodh I Jugdutt

    2006-06-01

    Full Text Available Bodh I JugduttDivision of Cardiology, Department of Medicine, University of Alberta, Edmonton, Alberta, CanadaAbstract: Survivors of myocardial infarction (MI are at high risk of disability and death. This is due to infarct-related complications such as heart failure, cardiac remodeling with progressive ventricular dilation, dysfunction, and hypertrophy, and arrhythmias including ventricular and atrial fibrillation. Angiotensin (Ang II, the major effector molecule of the renin–angiotensin–aldosterone system (RAAS is a major contributor to these complications. RAAS inhibition, with angiotensin-converting enzyme (ACE inhibitors were first shown to reduce mortality and morbidity after MI. Subsequently, angiotensin receptor blockers (ARBs, that produce more complete blockade of the effects of Ang II at the Ang II type 1 (AT1 receptor, were introduced and the ARB valsartan was shown to be as effective as an ACE inhibitor in reducing mortality and morbidity in high-risk post-MI suvivors with left ventricular (LV systolic dysfunction and and/or heart failure and in heart failure patients, respectively, in two major trials (VALIANT and Val-HeFT. Both these trials used an ACE inhibitor as comparator on top of background therapy. Evidence favoring the use of valsartan for secondary prevention in post-MI survivors is reviewed.Keywords: valsartan, myocardial infarction, infarct survivors, remodeling, heart failure

  16. Lysine clonixinate versus dipyrone (metamizole) for the acute treatment of severe migraine attacks: a single-blind, randomized study.

    Science.gov (United States)

    Krymchantowski, Abouch Valenty; Carneiro, Henrique; Barbosa, Jackeline; Jevoux, Carla

    2008-06-01

    Nonsteroidal anti-inflammatory drugs (NSAID) are effective to treat migraine attacks. Lysine clonixinate (LC) and dipyrone (metamizol) have been proven effective to treat acute migraine. The aim of this study was to evaluate the efficacy and tolerability of the intravenous formulations of LC and dipyrone in the treatment of severe migraine attacks. Thirty patients (28 women, 2 men), aged 18 to 48 years with migraine according the International Headache Society (IHS) (2004) were studied. The patients were randomized into 2 groups when presenting to an emergency department with a severe migraine attack. The study was single-blind. Headache intensity, nausea, photophobia and side effects were evaluated at 0, 30, 60 and 90 minutes after the drug administration. Rectal indomethacin as rescue medication (RM) was available after 2 hours and its use compared between groups. All patients completed the study. At 30 minutes, 0% of the dipyrone group 13% of the LC group were pain free (p=0.46). At 60 and 90 minutes, 2 (13%) and 5 (33%) patients from the dipyrone group and 11 (73%) and 13 (86.7%) patients from the LC group were pain free (p<0.001). At 60 minutes, significantly more patients from the LC group were nausea-free (p<0.001). Regarding photophobia, there were no differences between groups at 60 minutes (p=0.11). The use of RM at 2 hours did not differ among groups (p=0.50). Pain in the site of the injection was reported by more patients of the LC group compared to the dipyrone group (p<0.0001). LC is significantly superior to dipyrone in treating severe migraine attacks. LC promotes significantly more burning at the site of the injection.

  17. Perceived Social Support and Markers of Heart Failure Severity

    Science.gov (United States)

    2011-09-09

    that the heart may be overworking to compensate for cardiac damage (Hunt et al., 2005). To assess the presence and severity of cardiac-related...of depressive symptoms to include hopelessness, irritability, fatigue, appetite, and suicidal ideation. The BDI-II is a widely adopted measure

  18. Transient complete atrioventricular block with Morgagni—Adams—Stokes attacks in a child after aortic valve replacement

    Directory of Open Access Journals (Sweden)

    D. R. Sabirova

    2014-01-01

    Full Text Available The diagnosis and treatment of life-threatening arrhythmias after surgical correction of congenital heart diseases is one the urgent problems in pediatrlc cardiology. The paper describes the clinical picture, diagnosis, and therapy in a patent with transient complete atrioventricular block after open heart surgery. A protracted Morgagni—Adams—Stokes attack is one of the causes of sudden cardiac death. The occurrence of even single syncopes in patients after surgery for congenital heart disease requires that the arrhythmogenic nature of the attack should be ruled out for the timely and adequate therapy including the implantation of antiarrhythmic devices.

  19. Heart Age PSA (:60)

    Centers for Disease Control (CDC) Podcasts

    2015-09-01

    This 60 second public service announcement is based on the September 2015 CDC Vital Signs report. Your heart age is the age of your heart and blood vessels as a result of your risk factors for heart attack and stroke. If you smoke or have high blood pressure, your heart age will be much higher than your actual age. Learn what you can do to lower your heart age and keep it low.  Created: 9/1/2015 by National Center for Chronic Disease Prevention and Health Promotion (NCCDPHP).   Date Released: 9/1/2015.

  20. Medications Used to Treat Heart Failure

    Science.gov (United States)

    ... and Live Our Interactive Cardiovascular Library has detailed animations and illustrations to help you learn about conditions, treatments and procedures related to heart disease and stroke. Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  1. Dilated cardiomyopathy and severe heart failure. An update for pediatricians.

    Science.gov (United States)

    Caviedes Bottner, Paola; Córdova Fernández, Tamara; Larraín Valenzuela, Marcos; Cruces Romero Presentación de Casos Clínicos, Pablo

    2018-06-01

    Dilated cardiomyopathy is the main cause of heart failure leading to heart transplant. Its prognosis is variable and depends on the etiology, the patient's age at onset, and the severity. The management of dilated cardiomyopathy is aimed at minimizing symptoms and preventing disease progression; it requires a comprehensive screening for comorbidities and the prevention of complications to improve the overall status of these children and mitigate their prognosis. Here we present a review oriented at the multidisciplinary management that pediatricians should consider when seeing these patients. Sociedad Argentina de Pediatría.

  2. Multi-constituent cardiovascular pills (MCCP)--challenges and promises of population-based prophylactic drug therapy for prevention of heart attack.

    Science.gov (United States)

    Jamieson, Michael J; Naghavi, Morteza

    2007-01-01

    Risk factors for atherosclerotic cardiovascular disease (CVD) are highly co-prevalent but poorly identified and treated. The Screening for Heart Attack Prevention and Education (SHAPE) Task Force from the Association for Eradication of Heart Attack (AEHA) has recently proposed a new strategy that recommends screening for subclinical atherosclerosis and implementing aggressive treatment of "vulnerable patients". The Task Force has also envisioned future developments that may shift mass screening strategies to mass prophylactic therapy. The "Polypill" concept, introduced by Wald and Law suggests a combination of statin, low-dose antihypertensives, aspirin and folic acid, in a single pill, taken prophylactically by high risk population can cut CVD event rates by as much as 80%. In this communication, we review the challenges and promises of such a strategy. "Polypill" is but one of an astronomical number of possible multiconstituent pills (MCCP). Attractive as the MCCP concept is, it lacks evidence from randomized controlled trials, and begs numerous questions about the credibility of the concept, the design and synthesis of such complex pills, pharmacokinetics, pharmacodynamics, bioequivalence, "class" vs. unique properties, interactions, evidence of clinical efficacy and safety, regulatory approval, post-marketing surveillance, prescription vs. over-the-counter use, responsibility for initiating and monitoring therapy, patient education, counterfeiting and importation, reimbursement, advertisement, patent protection, commercial viability, etc. If these issues are favorably addressed, MCCP stand to dramatically change the manner in which CVD is prevented particularly in developing societies. Notwithstanding, assuming low commercial interests, realizing the promises of MCCP will demand serious attention from national public health policymakers. The clinical and regulatory implications of population-based secondary prevention (which rely on a different evidence base

  3. Heart Failure: Diagnosis, Severity Estimation and Prediction of Adverse Events Through Machine Learning Techniques

    Directory of Open Access Journals (Sweden)

    Evanthia E. Tripoliti

    Full Text Available Heart failure is a serious condition with high prevalence (about 2% in the adult population in developed countries, and more than 8% in patients older than 75 years. About 3–5% of hospital admissions are linked with heart failure incidents. Heart failure is the first cause of admission by healthcare professionals in their clinical practice. The costs are very high, reaching up to 2% of the total health costs in the developed countries. Building an effective disease management strategy requires analysis of large amount of data, early detection of the disease, assessment of the severity and early prediction of adverse events. This will inhibit the progression of the disease, will improve the quality of life of the patients and will reduce the associated medical costs. Toward this direction machine learning techniques have been employed. The aim of this paper is to present the state-of-the-art of the machine learning methodologies applied for the assessment of heart failure. More specifically, models predicting the presence, estimating the subtype, assessing the severity of heart failure and predicting the presence of adverse events, such as destabilizations, re-hospitalizations, and mortality are presented. According to the authors' knowledge, it is the first time that such a comprehensive review, focusing on all aspects of the management of heart failure, is presented. Keywords: Heart failure, Diagnosis, Prediction, Severity estimation, Classification, Data mining

  4. CDC Vital Signs-Heart Age

    Centers for Disease Control (CDC) Podcasts

    2015-09-01

    This podcast is based on the September 2015 CDC Vital Signs report. Your heart age is the age of your heart and blood vessels as a result of your risk factors for heart attack and stroke. If you smoke or have high blood pressure, your heart age will be much higher than your actual age. Learn what you can do to lower your heart age and keep it low.  Created: 9/1/2015 by National Center for Chronic Disease Prevention and Health Promotion (NCCDPHP).   Date Released: 9/1/2015.

  5. Cardiovascular cast model fabrication and casting effectiveness evaluation in fetus with severe congenital heart disease or normal heart.

    Science.gov (United States)

    Wang, Yu; Cao, Hai-yan; Xie, Ming-xing; He, Lin; Han, Wei; Hong, Liu; Peng, Yuan; Hu, Yun-fei; Song, Ben-cai; Wang, Jing; Wang, Bin; Deng, Cheng

    2016-04-01

    To investigate the application and effectiveness of vascular corrosion technique in preparing fetal cardiovascular cast models, 10 normal fetal heart specimens with other congenital disease (control group) and 18 specimens with severe congenital heart disease (case group) from induced abortions were enrolled in this study from March 2013 to June 2015 in our hospital. Cast models were prepared by injecting casting material into vascular lumen to demonstrate real geometries of fetal cardiovascular system. Casting effectiveness was analyzed in terms of local anatomic structures and different anatomical levels (including overall level, atrioventricular and great vascular system, left-sided and right-sided heart), as well as different trimesters of pregnancy. In our study, all specimens were successfully casted. Casting effectiveness analysis of local anatomic structures showed a mean score from 1.90±1.45 to 3.60±0.52, without significant differences between case and control groups in most local anatomic structures except left ventricle, which had a higher score in control group (P=0.027). Inter-group comparison of casting effectiveness in different anatomical levels showed no significant differences between the two groups. Intra-group comparison also revealed undifferentiated casting effectiveness between atrioventricular and great vascular system, or left-sided and right-sided heart in corresponding group. Third-trimester group had a significantly higher perfusion score in great vascular system than second-trimester group (P=0.046), while the other anatomical levels displayed no such difference. Vascular corrosion technique can be successfully used in fabrication of fetal cardiovascular cast model. It is also a reliable method to demonstrate three-dimensional anatomy of severe congenital heart disease and normal heart in fetus.

  6. Somatic hospital contacts, invasive cardiac procedures, and mortality from heart disease in patients with severe mental disorder.

    Science.gov (United States)

    Laursen, Thomas Munk; Munk-Olsen, Trine; Agerbo, Esben; Gasse, Christiane; Mortensen, Preben Bo

    2009-07-01

    Excess mortality from heart disease is observed in patients with severe mental disorder. This excess mortality may be rooted in adverse effects of pharmacological or psychotropic treatment, lifestyle factors, or inadequate somatic care. To examine whether persons with severe mental disorder, defined as persons admitted to a psychiatric hospital with bipolar affective disorder, schizoaffective disorder, or schizophrenia, are in contact with hospitals and undergoing invasive procedures for heart disease to the same degree as the nonpsychiatric general population, and to determine whether they have higher mortality rates of heart disease. A population-based cohort of 4.6 million persons born in Denmark was followed up from 1994 to 2007. Rates of mortality, somatic contacts, and invasive procedures were estimated by survival analysis. Incidence rate ratios of heart disease admissions and heart disease mortality as well as probability of invasive cardiac procedures. The incidence rate ratio of heart disease contacts in persons with severe mental disorder compared with the rate for the nonpsychiatric general population was only slightly increased, at 1.11 (95% confidence interval, 1.08-1.14). In contrast, their excess mortality rate ratio from heart disease was 2.90 (95% confidence interval, 2.71-3.10). Five years after the first contact for somatic heart disease, the risk of dying of heart disease was 8.26% for persons with severe mental disorder (aged mental disorder as compared with the nonpsychiatric general population (7.04% vs 12.27%, respectively). Individuals with severe mental disorder had only negligible excess rates of contact for heart disease. Given their excess mortality from heart disease and lower rates of invasive procedures after first contact, it would seem that the treatment for heart disease offered to these individuals in Denmark is neither sufficiently efficient nor sufficiently intensive. This undertreatment may explain part of their excess

  7. Understanding How Components of Organisations Contribute to Attacks

    DEFF Research Database (Denmark)

    Gu, Min; Aslanyan, Zaruhi; Probst, Christian W.

    2016-01-01

    Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors is diffi......Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors...... is difficult. Recently, system models have been used for automatically identifying possible attacks on the modelled organisation. The generated attacks consider all three layers, making the contribution of building infrastructure, computer infrastructure, and humans (insiders and outsiders) explicit. However......, this contribution is only visible in the attack trees as part of the performed steps; it cannot be mapped back to the model directly since the actions usually involve several elements (attacker and targeted actor or asset). Especially for large attack trees, understanding the relations between several model...

  8. Rehab for the Heart (A Cup of Health with CDC)

    Centers for Disease Control (CDC) Podcasts

    2017-08-24

    Each year, nearly 790,000 adults in the U.S. suffer a heart attack. For a third of these, it’s not their first. Cardiac rehabilitation could have prevented many of these. In this podcast, Dr. Fleetwood Loustalot discusses the importance of getting cardiac rehab after a heart attack.  Created: 8/24/2017 by MMWR.   Date Released: 8/24/2017.

  9. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  10. The usefulness of the nuclear cardiology in the cellular implant in patients with severe myocardial damage

    International Nuclear Information System (INIS)

    Omelas A, M.; Arguero S, R.; Garrido G, M.H.; Rodriguez C, A.; Careaga, G.; Castano G, R.; Nambo, M.J.; Pascual P, J.; Ortega R, A.; Gaxiola A, A.; Magana S, J.A.; Estrada A, H.; Equipo de Tecnicos en Medicina Nuclear

    2005-01-01

    The recent therapeutic advances as the cellular implant as well as those different protocols of image acquisition in the field of the Nuclear Cardiology its have allowed that the patient with severe myocardial damage and without some possibility of revascularization is benefited with these advances. Doubtless the Tl-201 par excellence has an important paper for standardize the more appropriate therapeutic behavior for the heart attack patient; reason by this investigation protocol was developed. The objective of the study was to identify the heart attack regions without viable tissue with SPECT in patient with important myocardial damage without some possibility of traditional revascularization; for the 'Stem cell' cellular implantation therapy. The methodology it was carried out by a study of myocardial perfusion in 10 patients with important myocardial damage previous cellular implants, with PICANUC/ SPECT methodology and using a software (Emory Tool Box) for the image processing validated by the University of Emory Atlanta GA; and using as tracer the Tl - 201 to identify the heart attack regions without presence of viable tissue with an analysis model of 17 segments standardized for the left ventricle; qualifying this way the myocardial perfusion in: 0 (normal), 1 (light), 2 (moderate), 3 (severe), 4 (absent) and x (bad technique). The conclusions were that the SPECT study with PICANUC methodology with Tl-201 is safe and effective for the precise localization for the cellular implantation via direct intra myocardial. (Author)

  11. An Adaptive Approach for Defending against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Muhai Li

    2010-01-01

    Full Text Available In various network attacks, the Distributed Denial-of-Service (DDoS attack is a severe threat. In order to deal with this kind of attack in time, it is necessary to establish a special type of defense system to change strategy dynamically against attacks. In this paper, we introduce an adaptive approach, which is used for defending against DDoS attacks, based on normal traffic analysis. The approach can check DDoS attacks and adaptively adjust its configurations according to the network condition and attack severity. In order to insure the common users to visit the victim server that is being attacked, we provide a nonlinear traffic control formula for the system. Our simulation test indicates that the nonlinear control approach can prevent the malicious attack packets effectively while making legitimate traffic flows arrive at the victim.

  12. Retrospective evaluation of coyote attacks in dogs: 154 cases (1997-2012).

    Science.gov (United States)

    Frauenthal, Virginia M; Bergman, Philip; Murtaugh, Robert J

    2017-05-01

    To describe the clinical presentation and outcome of known attacks in client-owned dogs caused by the common coyote, Canis latrans. Retrospective observational study. Private referral hospital. One hundred fifty-four client-owned dogs known to be attacked by coyotes. None. Records from a private referral hospital from May 1997 through December 2012 were reviewed. Time of day and month/season of year, signalment, body temperature, heart rate, respiratory rate, body weight, location and severity of wounds inflicted, common injuries, length of hospitalization, necessity of surgical wound repair under anesthesia, antimicrobial use and mortality were recorded. Eighty-six percent of dogs presenting following coyote attack weighed Dogs with bite wounds to the thorax had the highest mortality at 21.3%. Criteria for systemic inflammatory response syndrome (SIRS) based on admission vital signs were met in 58.8% of dogs and the presence of SIRS was significantly associated with mortality (P hernia (9/154; 5.8%), and abdominal penetrating wounds (8/146; 5.5%). Dogs dogs are a problem in Southern California and are associated with substantial morbidity and mortality, especially in dogs with wounds to the thorax. Aggressive management involving surgical wound repair was associated with survival to discharge. © Veterinary Emergency and Critical Care Society 2017.

  13. Conditions for oxygen-deficient combustion during accidents with severe core concrete thermal attack

    International Nuclear Information System (INIS)

    Luangdilok, W.; Elicson, G.T.; Berger, W.E. Jr.

    1993-01-01

    This paper addresses the interactions between MCCI (molten core-concrete interactions)-induced offgas releases, mostly the combustible gases, natural circulation between the cavity and the lower containment based on recent research developments in the area of mixed convection flow (Epstein, et al., 1989; Epstein, 1988; Epstein, 1992) between compartments, and their effects on combustion in PWR containments during prolonged severe accidents. Specifically, large dry PWR containments undergoing severe core-concrete attack during station blackouts where the containment atmosphere is expected to be inerted are objects of this analysis. The purpose of this paper, given the conditions that oxygen can be brought to the cavity, is to demonstrate that consumption of most oxygen present in the containment can be achieved in a reasonable time scale assuming that combustion is not subject to flammability limits due to the high cavity temperatures. The conditions for cavity combustion depend on several factors including good gas flowpaths between the cavity and other containment regions, and combustion processes within the cavity with the hot debris acting as the ignition source

  14. An Analysis of Attacks on Blockchain Consensus

    OpenAIRE

    Bissias, George; Levine, Brian Neil; Ozisik, A. Pinar; Andresen, Gavin

    2016-01-01

    We present and validate a novel mathematical model of the blockchain mining process and use it to conduct an economic evaluation of the double-spend attack, which is fundamental to all blockchain systems. Our analysis focuses on the value of transactions that can be secured under a conventional double-spend attack, both with and without a concurrent eclipse attack. Our model quantifies the importance of several factors that determine the attack's success, including confirmation depth, attacke...

  15. Problem: Heart Valve Regurgitation

    Science.gov (United States)

    ... should be completely closed For example: Watch an animation of mitral valve regurgitation A leaking mitral valve ... Not Alone Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  16. Bone marrow-derived mesenchymal stromal cell treatment in patients with severe ischaemic heart failure

    DEFF Research Database (Denmark)

    Mathiasen, Anders Bruun; Qayyum, Abbas Ali; Jørgensen, Erik

    2015-01-01

    AIMS: Regenerative treatment with mesenchymal stromal cells (MSCs) has been promising in patients with ischaemic heart failure but needs confirmation in larger randomized trials. We aimed to study effects of intra-myocardial autologous bone marrow-derived MSC treatment in patients with severe isc...... identified. CONCLUSION: Intra-myocardial injections of autologous culture expanded MSCs were safe and improved myocardial function in patients with severe ischaemic heart failure. STUDY REGISTRATION NUMBER: NCT00644410 (ClinicalTrials.gov)....... ischaemic heart failure. METHODS AND RESULTS: The MSC-HF trial is a randomized, double-blind, placebo-controlled trial. Patients were randomized 2 : 1 to intra-myocardial injections of MSC or placebo, respectively. The primary endpoint was change in left ventricular end-systolic volume (LVESV), measured...

  17. Pulse pressure as a haemodynamic variable in systolic heart failure

    NARCIS (Netherlands)

    Petrie, Colin James

    2016-01-01

    In patients with heart failure, the heart is unable to pump enough blood to satisfy the requirements of the body. Explanations for this include heart muscle damage after a heart attack. This could be very recently, or in the past, sometimes dating back many years. In other cases the explanation for

  18. Infarto agudo del miocardio sin elevación del segmento T: Consideraciones fisiopatológicas y clínicas Heart attack without an elevation of the T segment: Clinical and pathophysiological

    Directory of Open Access Journals (Sweden)

    Maikel Rodulfo García

    2010-09-01

    Full Text Available Se revisaron numerosos documentos (impresos y electrónicos sobre afecciones cardiovasculares, particularmente acerca del infarto agudo del miocardio sin elevación del segmento T, teniendo en cuenta que la mortalidad hospitalaria es menor cuando se produce un síndrome coronario con esa característica. Para actualizar el tema se valoraron diversos aspectos relacionados con concepto, clasificación, fisiopatología, diagnóstico, cuadro clínico, exámenes complementarios y factores de riesgo, puesto que las enfermedades del corazón son actualmente la principal causa de muerte en naciones industrializadas y se espera que también lo sean en los países en vías de desarrollo para el 2020, entre ellos Cuba.Several documents (printed and electronic about cardiovascular diseases were reviewed, particularly heart attack without an elevation of the T-segment, taking into account that the hospital mortality is lower when a coronary syndrome with that characteristic occurs. To update the topic several aspects related to concept, classification, pathophysiology, diagnosis, clinical pattern, laboratory tests and risk factors were valued since heart diseases are actually the main cause of death in industrialized nations and it is expected that they will also be the same cause of death in developing countries for 2020, among them, Cuba.

  19. Recognizing Advanced Heart Failure and Knowing Your Options

    Science.gov (United States)

    ... and Live Our Interactive Cardiovascular Library has detailed animations and illustrations to help you learn about conditions, treatments and procedures related to heart disease and stroke. Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  20. Blind Data Attack on BGP Routers

    Science.gov (United States)

    2017-03-01

    Second Reader Dr. Cynthia Irvine Chair, Cyber Academic Group iii THIS PAGE INTENTIONALLY LEFT BLANK iv ABSTRACT Transport Communication Protocol (TCP...Postgraduate School. The experience of higher learning at this institution was incredible, and I would whole-heartedly recommend it to any of my peers and...data attack packets to the victim device. Scapy is a Python library that is used to craft and send packets [28]. BGP is supported in Python through

  1. Heart Rate and Initial Presentation of Cardiovascular Diseases (Caliber)

    Science.gov (United States)

    2013-09-17

    Abdominal Aortic Aneurysm; Coronary Heart Disease NOS; Unheralded Coronary Death; Intracerebral Haemorrhage; Heart Failure; Ischemic Stroke; Myocardial Infarction; Stroke; Peripheral Arterial Disease; Stable Angina Pectoris; Subarachnoid Haemorrhage; Transient Ischemic Attack; Unstable Angina; Cardiac Arrest, Sudden Cardiac Death

  2. Empowered to gain a new foothold in life—A study of the meaning of participating in cardiac rehabilitation to patients afflicted by a minor heart attack

    Directory of Open Access Journals (Sweden)

    Charlotte P. Simonÿ

    2015-12-01

    Full Text Available This study aimed to investigate what it means to patients afflicted by a minor heart attack to participate in cardiac rehabilitation (CR. CR is well-established internationally to support patients towards moving forward in satisfying, healthy, and well-functioning lives. Studies indicate that patients achieve improvement in quality of life when participating in CR. However, knowledge of how patients are supported during CR is sparse. Moreover, knowledge of what participating in CR means to patients afflicted by a minor heart attack is lacking. In-depth knowledge in this area is crucial in order to understand these patients’ particular gains and needs. In a phenomenological-hermeneutic frame field observations, focus group interviews, and individual interviews were conducted among 11 patients during and after their participation in CR. Field notes and transcribed interviews underwent three-phased interpretation. It was found that patients were supported to gain renewed balance in their lives during CR. Three themes were identified: (1 receiving a helpful but limited caring hand, (2 being supported to find new values in life, and (3 developing responsibility for the remaining time. The patients were carefully guided through a difficult time and supported to continue in healthy everyday lives. They were given hope which enabled them to find themselves a new foothold in life with respect to their own sense of well-being. This guidance and a sense of hopefulness were provided by heart specialists and more seasoned heart patients. In conclusion, patients were empowered to achieve a healthier lifestyle and improve their personal well-being during CR. However, structural barriers in the programme prevented adequate support regarding the patients’ total needs. Knowledge of the benefits of CR emphasizes the significance of the programme and highlights the importance of high inclusion. Efforts should be made to develop more flexible and longer lasting

  3. Heart-related anxieties in relation to general anxiety and severity of illness in cardiology patients.

    Science.gov (United States)

    Muschalla, Beate; Glatz, Johannes; Linden, Michael

    2014-01-01

    Absence of an adequate reason for anxiety is a criterion for pathological anxiety. However, the presence of danger or fear-provoking stimuli may even be a risk factor for anxiety and does not exclude that there is additionally pathological anxiety too. The question is, to what degree can heart-related anxiety be explained by the severity of illness or trait anxiety? Two hundred and nine patients (37.8% women) from a cardiology inpatient unit completed the Heart-Anxiety-Questionnaire, Progression-Anxiety-Questionnaire, Job-Anxiety-Scale and the State-Trait-Anxiety-Inventory. The severity of cardiac illness was rated by the treating cardiologists using the Multidimensional Severity of Morbidity Rating. Time absent from work due to sickness was assessed as an indicator for illness-related impairment. Heart anxiety was significantly related to progression anxiety and, to a lesser extent, trait anxiety and indicators of subjective symptoms of somatic illness. No association was found with medical ratings for prognosis, multimorbidity, or reduction in life expectancy. Heart-related anxiety is a symptom of an anxiety disorder. Although partially dependent on subjective suffering, it cannot be explained by the severity of medical illness. Treatment of health-related anxieties should focus on how to cope with subjective symptoms of illness.

  4. The potential influence of atherogenic dyslipidemia on the severity of chronic Chagas heart disease

    Directory of Open Access Journals (Sweden)

    Luz Peverengo

    2016-02-01

    Full Text Available SUMMARY Introduction: chronic Chagas heart disease (CCHD is the most common manifestation of American Trypanosomiasis, causing about 50,000 deaths annually. Several factors bear correlation with the severity of CCHD. However, to our knowledge, the assessment on the contribution of major cardiovascular risk factors (CRF, such as hypertension and atherogenic dyslipidemia (AD to CCHD severity is scarce, despite their well-established role in coronary artery disease, heart failure and stroke. Objective: to explore the potential relationship of blood pressure and AD with the clinical profile of patients with CCHD. Methods: we performed a cross-sectional study in T. cruziseropositive patients categorized according to a standard CCHD classification. All individuals were subjected to complete clinical examination. Autoantibodies induced by T. cruzi were assessed by ELISA. Results: we observed that Atherogenic index (AI levels rose significantly in relation to the severity of the CCHD stage, with CCHD III cases showing the highest values of AI. Furthermore, those patients with globally dilated cardiomyopathy with reduced ejection fraction showed higher levels of AI. In regard to autoantibodies, anti-B13 also showed relation with the severity of the disease. Conclusion: we observed that AI correlated with CCHD stages and contributed, in association with anti-B13 antibodies and age, to the prediction of systolic heart failure.

  5. Women's knowledge about heart disease: Differences among ethnic and cultural groups in the Israeli Women's Health in Midlife Study.

    Science.gov (United States)

    Blumstein, Tzvia; Benyamini, Yael; Boyko, Valentina; Lerner-Geva, Liat

    2016-01-01

    The current investigation aimed to assess levels of knowledge about risk factors for heart disease among midlife Israeli women, and to evaluate the relationship of knowledge to personal risk factors and vulnerability to heart disease. Face-to-face interviews with women aged 45-64 years were conducted during 2004-2006 within three population groups: long-term Jewish residents (LTR), immigrants from the former Soviet Union, and Arab women. The survey instrument included six knowledge statements relating to: the risk after menopause, family history, elevated cholesterol level, diabetes, obesity, and warning signs of a heart attack. The findings showed wide disparities in knowledge by educational level and between immigrants and LTR, after taking into account personal risk factors and education. Personal risk factors were not significantly related to the knowledge items, except for personal history of cardiovascular disease, which was associated with knowledge about "warning signs of a heart attack" and "family history." Women who perceived themselves as more vulnerable to heart disease were more likely to identify several risk factors correctly. These findings stress the need to increase knowledge about heart disease, especially among less educated and minority women, and to emphasize the risk of patients' personal status by health providers.

  6. Simulation of Exercise-Induced Syncope in a Heart Model with Severe Aortic Valve Stenosis

    Directory of Open Access Journals (Sweden)

    Matjaž Sever

    2012-01-01

    Full Text Available Severe aortic valve stenosis (AVS can cause an exercise-induced reflex syncope (RS. The precise mechanism of this syncope is not known. The changes in hemodynamics are variable, including arrhythmias and myocardial ischemia, and one of the few consistent changes is a sudden fall in systemic and pulmonary arterial pressures (suggesting a reduced vascular resistance followed by a decline in heart rate. The contribution of the cardioinhibitory and vasodepressor components of the RS to hemodynamics was evaluated by a computer model. This lumped-parameter computer simulation was based on equivalent electronic circuits (EECs that reflect the hemodynamic conditions of a heart with severe AVS and a concomitantly decreased contractility as a long-term detrimental consequence of compensatory left ventricular hypertrophy. In addition, the EECs model simulated the resetting of the sympathetic nervous tone in the heart and systemic circuit during exercise and exercise-induced syncope, the fluctuating intra-thoracic pressure during respiration, and the passive relaxation of ventricle during diastole. The results of this simulation were consistent with the published case reports of exertional syncope in patients with AVS. The value of the EEC model is its ability to quantify the effect of a selective and gradable change in heart rate, ventricular contractility, or systemic vascular resistance on the hemodynamics during an exertional syncope in patients with severe AVS.

  7. Congenital Anorectal Malformation Severity Does Not Predict Severity of Congenital Heart Defects.

    Science.gov (United States)

    Jonker, Jara E; Liem, Eryn T; Elzenga, Nynke J; Molenbuur, Bouwe; Trzpis, Monika; Broens, Paul M A

    2016-12-01

    To determine the prevalence of congenital heart defects (CHDs) in patients with mild or severe congenital anorectal malformations (CARMs), and whether all patients with CARM need pediatric cardiology screening. We included 129 patients with CARM born between 2004 and 2013, and referred to University Medical Center Groningen. Recto-perineal and recto-vestibular fistulas were classified as mild CARMs, all others as severe. Significant patent foramen ovale, secundum atrial septal defect, and small ventricular septum defect were classified as minor CHDs, all others as major. Of 129 patients with CARM, 67% had mild CARM, 33% severe CARM, and 17% were additionally diagnosed with CHD. CHDs were distributed equally in patients with mild or severe CARMs. Patients with multiple congenital abnormalities were more frequently diagnosed with CHD (n = 16, 36%) than patients without multiple congenital malformations (n = 5, 9%, P = .001). Patients with CARM diagnosed with CHD using pediatric cardiac echo screening were younger than 3 months of age at diagnosis. Earlier general pediatric examinations missed 7 (50%) children with mild and 4 (50%) with severe CHDs. The severity of CARM could predict neither prevalence nor severity of CHD. More than one-half of CHDs were missed during the first physical examination. No new CHDs were found in patients older than 3 months of age at the time CARMs were diagnosed. We recommend screening all patients with CARM younger than 3 months of age for CHD at the time CARM is diagnosed. Preoperative echocardiography should be the rule in children younger than 3 months of age and with multiple congenital anomalies. Copyright © 2016 Elsevier Inc. All rights reserved.

  8. Radiological attacks and accidents. Medical consequences

    International Nuclear Information System (INIS)

    Sakuta, Hidenari

    2007-01-01

    Probability of the occurrence of radiological attacks appears to be elevated after the terrorist attacks against the United States on September 11 in 2001. There are a lot of scenarios of radiological attack: simple radiological device, radiological disperse device (RDD or dirty bomb), attacks against nuclear reactor, improvised nuclear device, and nuclear weapons. Of these, RDD attack is the most probable scenario, because it can be easily made and can generate enormous psychological and economic damages. Radiological incidents are occurring to and fro in the world, including several cases of theft to nuclear facilities and unsuccessful terrorist attacks against them. Recently, a former Russian spy has allegedly been killed using polonium-210. In addition, serious radiological accidents have occurred in Chernobyl, Goiania, and Tokai-mura. Planning, preparation, education, and training exercise appear to be essential factors to cope with radiological attacks and accidents effectively without feeling much anxiety. Triage and psychological first aid are prerequisite to manage and provide effective medial care for mass casualties without inducing panic. (author)

  9. Echocardiographic parameters and survival in Chagas heart disease with severe systolic dysfunction.

    Science.gov (United States)

    Rassi, Daniela do Carmo; Vieira, Marcelo Luiz Campos; Arruda, Ana Lúcia Martins; Hotta, Viviane Tiemi; Furtado, Rogério Gomes; Rassi, Danilo Teixeira; Rassi, Salvador

    2014-03-01

    Echocardiography provides important information on the cardiac evaluation of patients with heart failure. The identification of echocardiographic parameters in severe Chagas heart disease would help implement treatment and assess prognosis. To correlate echocardiographic parameters with the endpoint cardiovascular mortality in patients with ejection fraction Celular em Cardiopatias) - Chagas heart disease arm. The following parameters were collected: left ventricular systolic and diastolic diameters and volumes; ejection fraction; left atrial diameter; left atrial volume; indexed left atrial volume; systolic pulmonary artery pressure; integral of the aortic flow velocity; myocardial performance index; rate of increase of left ventricular pressure; isovolumic relaxation time; E, A, Em, Am and Sm wave velocities; E wave deceleration time; E/A and E/Em ratios; and mitral regurgitation. In the mean 24.18-month follow-up, 27 patients died. The mean ejection fraction was 26.6 ± 5.34%. In the multivariate analysis, the parameters ejection fraction (HR = 1.114; p = 0.3704), indexed left atrial volume (HR = 1.033; p 70.71 mL/m2 were associated with a significant increase in mortality (log rank p < 0.0001). The indexed left atrial volume was the only independent predictor of mortality in this population of Chagasic patients with severe systolic dysfunction.

  10. Heart Health Tests for Diabetes Patients

    Science.gov (United States)

    ... or fluids in the body. They include: Electrocardiogram ("EKG" or "ECG") This test measures the electrical activity ... Tools & Resources Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  11. Echocardiographic Parameters and Survival in Chagas Heart Disease with Severe Systolic Dysfunction

    International Nuclear Information System (INIS)

    Rassi, Daniela do Carmo; Vieira, Marcelo Luiz Campos; Arruda, Ana Lúcia Martins; Hotta, Viviane Tiemi; Furtado, Rogério Gomes; Rassi, Danilo Teixeira; Rassi, Salvador

    2014-01-01

    Echocardiography provides important information on the cardiac evaluation of patients with heart failure. The identification of echocardiographic parameters in severe Chagas heart disease would help implement treatment and assess prognosis. To correlate echocardiographic parameters with the endpoint cardiovascular mortality in patients with ejection fraction < 35%. Study with retrospective analysis of pre-specified echocardiographic parameters prospectively collected from 60 patients included in the Multicenter Randomized Trial of Cell Therapy in Patients with Heart Diseases (Estudo Multicêntrico Randomizado de Terapia Celular em Cardiopatias) - Chagas heart disease arm. The following parameters were collected: left ventricular systolic and diastolic diameters and volumes; ejection fraction; left atrial diameter; left atrial volume; indexed left atrial volume; systolic pulmonary artery pressure; integral of the aortic flow velocity; myocardial performance index; rate of increase of left ventricular pressure; isovolumic relaxation time; E, A, Em, Am and Sm wave velocities; E wave deceleration time; E/A and E/Em ratios; and mitral regurgitation. In the mean 24.18-month follow-up, 27 patients died. The mean ejection fraction was 26.6 ± 5.34%. In the multivariate analysis, the parameters ejection fraction (HR = 1.114; p = 0.3704), indexed left atrial volume (HR = 1.033; p < 0.0001) and E/Em ratio (HR = 0.95; p = 0.1261) were excluded. The indexed left atrial volume was an independent predictor in relation to the endpoint, and values > 70.71 mL/m 2 were associated with a significant increase in mortality (log rank p < 0.0001). The indexed left atrial volume was the only independent predictor of mortality in this population of Chagasic patients with severe systolic dysfunction

  12. Echocardiographic Parameters and Survival in Chagas Heart Disease with Severe Systolic Dysfunction

    Energy Technology Data Exchange (ETDEWEB)

    Rassi, Daniela do Carmo, E-mail: dani.rassi@hotmail.com [Faculdade de Medicina e Hospital das Clínicas da Universidade Federal de Goiás (UFG), Goiânia, GO (Brazil); Vieira, Marcelo Luiz Campos [Instituto do Coração da Faculdade de Medicina da Universidade de São Paulo (USP), São Paulo, SP (Brazil); Arruda, Ana Lúcia Martins [Instituto de Radiologia da Faculdade de Medicina da Universidade de São Paulo (USP), São Paulo, SP (Brazil); Hotta, Viviane Tiemi [Instituto do Coração da Faculdade de Medicina da Universidade de São Paulo (USP), São Paulo, SP (Brazil); Furtado, Rogério Gomes; Rassi, Danilo Teixeira; Rassi, Salvador [Faculdade de Medicina e Hospital das Clínicas da Universidade Federal de Goiás (UFG), Goiânia, GO (Brazil)

    2014-03-15

    Echocardiography provides important information on the cardiac evaluation of patients with heart failure. The identification of echocardiographic parameters in severe Chagas heart disease would help implement treatment and assess prognosis. To correlate echocardiographic parameters with the endpoint cardiovascular mortality in patients with ejection fraction < 35%. Study with retrospective analysis of pre-specified echocardiographic parameters prospectively collected from 60 patients included in the Multicenter Randomized Trial of Cell Therapy in Patients with Heart Diseases (Estudo Multicêntrico Randomizado de Terapia Celular em Cardiopatias) - Chagas heart disease arm. The following parameters were collected: left ventricular systolic and diastolic diameters and volumes; ejection fraction; left atrial diameter; left atrial volume; indexed left atrial volume; systolic pulmonary artery pressure; integral of the aortic flow velocity; myocardial performance index; rate of increase of left ventricular pressure; isovolumic relaxation time; E, A, Em, Am and Sm wave velocities; E wave deceleration time; E/A and E/Em ratios; and mitral regurgitation. In the mean 24.18-month follow-up, 27 patients died. The mean ejection fraction was 26.6 ± 5.34%. In the multivariate analysis, the parameters ejection fraction (HR = 1.114; p = 0.3704), indexed left atrial volume (HR = 1.033; p < 0.0001) and E/Em ratio (HR = 0.95; p = 0.1261) were excluded. The indexed left atrial volume was an independent predictor in relation to the endpoint, and values > 70.71 mL/m{sup 2} were associated with a significant increase in mortality (log rank p < 0.0001). The indexed left atrial volume was the only independent predictor of mortality in this population of Chagasic patients with severe systolic dysfunction.

  13. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  14. Heart scanner - who's between a rock and a hard place?

    African Journals Online (AJOL)

    evidence of coronary heart disease succumbs to a fatal heart attack. Cardiac symptoms, positive stress test results and angiographically visible narrowings are all dependent on significant lumenal stenosis. Considerable atherosclerosis can be present in an asymptomatic patient in whom physical examination, stress testing ...

  15. Reversal of echocardiographic right-sided heart pathology in a dog with severe pulmonary hypertension: a case report

    Directory of Open Access Journals (Sweden)

    McMahon P

    2015-06-01

    Full Text Available Peggy McMahon,1 Carley Saelinger 2  1Emergency and Critical Care Department, 2Cardiology Department, Animal Specialty and Emergency Center, Los Angeles, CA, USA Abstract: Pathologic right-sided heart changes are a common echocardiographic finding in patients with pulmonary hypertension (PH. Canines with PH may have right heart pathology documented via echocardiographic color Doppler interrogation including tricuspid valve regurgitation, pulmonic valve insufficiency, elevated pulmonary arterial systolic pressure, elevated pulmonary arterial diastolic pressure, and alterations in ejection profiles. Two-dimensional echocardiographic findings may include right ventricular hypertrophy, interventricular septal flattening, paradoxical interventricular septal motion, pulmonary artery dilation, and potentially abnormal left heart dimensions. In veterinary medicine, much confidence is given to the measurement of pulmonary arterial systolic pressure estimated from tricuspid valve regurgitation to grade the severity of PH and monitor its improvement with little emphasis placed on the integration of two-dimensional echocardiographic right and left heart pathology in conjunction with Doppler findings. To the authors’ knowledge, marked improvement and/or resolution of echocardiographic-documented right heart pathology have not been previously reported in the veterinary literature. This case report documents profound echocardiographic improvement of right-sided heart disease in a dog with severe PH. Keywords: canine, pulmonary hypertension, tricuspid valve regurgitation, right heart hypertrophy, sildenafil  

  16. A retrospective analysis of practice patterns in the management of acute asthma attack across Turkey.

    Science.gov (United States)

    Türktaş, Haluk; Bavbek, Sevim; Misirligil, Zeynep; Gemicioğlu, Bilun; Mungan, Dilşad

    2010-12-01

    To evaluate patient characteristics and practice patterns in the management of acute asthma attack at tertiary care centers across Turkey. A total of 294 patients (mean age: 50.4 ± 15.1 years; females: 80.3%) diagnosed with persistent asthma were included in this retrospective study upon their admission to the hospital with an acute asthma attack. Patient demographics, asthma control level, asthma attack severity and the management of the attack were evaluated. There was no influence of gender on asthma control and attack severity. In 57.5% of the patients, asthma attack was moderate. Most patients (78.9%) were hospitalized with longer duration evident in the severe attack. Spirometry and chest X-Ray were the most frequent tests (85.4%), while steroids (72.0% parenteral; 29.0% oral) and short-acting beta-agonists (SABA) + anticholinergics (45.5%) were the main drugs of choice in the attack management. Attack severity and pre-attack asthma control level was significantly correlated (p attack asthma was uncontrolled in 42.6% of the patients with severe attack. Most of the patients were on combination of more than one (two in 38.7% and 3-4 in 31.2%) controller drugs before the attack. Providing country specific data on practice patterns in the management of acute asthma attack in a representative cohort in Turkey, prescription of steroids and SABA + anticholinergics as the main drugs of choice was in line with guidelines while the significant relation of pre-attack asthma control to risk/severity of asthma attack and rate/duration of hospitalization seem to be the leading results of the present study. Copyright © 2010 Elsevier Ltd. All rights reserved.

  17. An evaluation of several methods of determining the local angle of attack on wind turbine blades

    DEFF Research Database (Denmark)

    Guntur, Srinivas; Sørensen, Niels N.

    2014-01-01

    Several methods of determining the angles of attack (AOAs) on wind turbine blades are discussed in this paper. A brief survey of the methods that have been used in the past are presented, and the advantages of each method are discussed relative to their application in the BEM theory. Data from...... existing as well as new full rotor CFD computations of the MEXICO rotor are used in this analysis. A more accurate estimation of the AOA is possible from 3D full rotor CFD computations, but when working with experimental data, pressure measurements and sectional forces are often the only data available...

  18. Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?

    Directory of Open Access Journals (Sweden)

    Ines Goicoechea-Telleria

    2018-01-01

    Full Text Available The use of biometrics keeps growing. Every day, we use biometric recognition to unlock our phones or to have access to places such as the gym or the office, so we rely on the security manufacturers offer when protecting our privileges and private life. It is well known that it is possible to hack into a fingerprint sensor using fake fingers made of Play-Doh and other easy-to-obtain materials but to what extent? Is this true for all users or only for specialists with a deep knowledge on biometrics? Are smartphone fingerprint sensors as reliable as desktop sensors? To answer these questions, we performed 3 separate evaluations. First, we evaluated 4 desktop fingerprint sensors of different technologies by attacking them with 7 different fake finger materials. All of them were successfully attacked by an experienced attacker. Secondly, we carried out a similar test on 5 smartphones with embedded sensors using the most successful materials, which also hacked the 5 sensors. Lastly, we gathered 15 simulated attackers with no background in biometrics to create fake fingers of several materials, and they had one week to attack the fingerprint sensors of the same 5 smartphones, with the starting point of a short video with the techniques to create them. All 5 smartphones were successfully attacked by an inexperienced attacker. This paper will provide the results achieved, as well as an analysis on the attack potential of every case. All results are given following the metrics of the standard ISO/IEC 30107-3.

  19. Quantum key distribution with several intercept-resend attacks via a depolarizing channel

    International Nuclear Information System (INIS)

    Dehmani, Mustapha; Errahmani, Mohamed; Ez-Zahraouy, Hamid; Benyoussef, Abdelilah

    2012-01-01

    The disturbance effect of a depolarizing channel on the security of the quantum key distribution of the four-state BB84 protocol, with multiple sequential intercept-resend attacks of many eavesdroppers, has been studied. The quantum bit error rate and the mutual information are computed for an arbitrary number N of eavesdroppers. It is found that the quantum error rate decreases with increasing the depolarizing parameter p characterizing the noise of the channel. For p tr of p below which the information is secure and otherwise the information is not secure. The value of p tr decreases with increasing the number of attacks. In contrast, for p ⩾ 0.165, the information is not secure independently of the number of eavesdroppers. Phase diagrams corresponding to the secure—unsecure information are also established. (paper)

  20. Clinical characteristics of disabling attacks at onset in patients with neuromyelitis optica spectrum disorder.

    Science.gov (United States)

    Seok, Jin Myoung; Cho, Eun Bin; Lee, Hye Lim; Cho, Hye-Jin; Min, Ju-Hong; Lee, Kwang Ho; Kim, Byoung Joon

    2016-09-15

    Individual attacks of neuromyelitis optica (NMO) are generally severe enough to cause disability even after the onset attack. We aimed to elucidate the clinical characteristics of disabling attacks at the onset of NMO. We investigated the clinical characteristics at onset and at first relapse in patients with NMO or NMO spectrum disorder with seropositive for the anti-aquaporin-4 antibody. A disabling attack at onset (DAO) was defined as an onset attack in which, at best recovery (allowing up to one year), patients were unable to walk without assistance or were left functionally blind in at least one affected eye. Fifty-seven patients were enrolled (53 females; onset age, 41.9±14.8years). Ten patients (17.5%) had a DAO; four had become unable to walk without assistance following myelitis, and six had severe visual impairment following optic neuritis despite rescue treatments. Attack severity at nadir was the only clinical factor predicting a DAO (odds ratio, 2.120; 95% CI, 1.162-3.869; P=0.014). The use of immunosuppressants delayed the interval to the first relapse (P=0.003). Our study showed characteristics of NMO onset attacks that caused severe disability. However, no clinically modifiable factors predicted disabling attacks, except attack severity. Copyright © 2016 Elsevier B.V. All rights reserved.

  1. Perceived family social support buffers against the effects of exposure to rocket attacks on adolescent depression, aggression, and severe violence.

    Science.gov (United States)

    Shahar, Golan; Henrich, Christopher C

    2016-02-01

    The authors compared the protective effects of 3 sources of perceived social support-from family members, friends, and school personnel-on internalizing and externalizing symptoms in adolescents exposed to rocket attacks. Data were based on 362 Israeli adolescents (median age = 14), chronically exposed to rockets from the Gaza Strip, for whom robust effects of exposure on internalizing and externalizing symptoms were reported during the 2009-2010 period (Henrich & Shahar, 2013). New analyses revealed that perceived family social support assessed in 2009 buffered against the effect of exposure to rocket attacks on depression, aggression, and severe violence during 2009-2010. Findings are consistent with a human-ecological perspective exposure to political violence and encourage the employment of family-based preventive interventions in afflicted areas. (c) 2016 APA, all rights reserved).

  2. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  3. "Dateline NBC"'s Persuasive Attack on Wal-Mart.

    Science.gov (United States)

    Benoit, William L.; Dorries, Bruce

    1996-01-01

    Develops a typology of persuasive attack strategies. Identifies two key components of persuasive attack: responsibility and offensiveness. Describes several strategies for intensifying each of these elements. Applies this analysis to "Dateline NBC"'s allegations that Wal-Mart's "Buy American" campaign was deceptive. Concludes…

  4. Coronary Physiology During Exercise and Vasodilation in the Healthy Heart and in Severe Aortic Stenosis

    NARCIS (Netherlands)

    Lumley, Matthew; Williams, Rupert; Asrress, Kaleab N.; Arri, Satpal; Briceno, Natalia; Ellis, Howard; Rajani, Ronak; Siebes, Maria; Piek, Jan J.; Clapp, Brian; Redwood, Simon R.; Marber, Michael S.; Chambers, John B.; Perera, Divaka

    2016-01-01

    Severe aortic stenosis (AS) can manifest as exertional angina even in the presence of unobstructed coronary arteries. The authors describe coronary physiological changes during exercise and hyperemia in the healthy heart and in patients with severe AS. Simultaneous intracoronary pressure and flow

  5. An SDN-Based Fingerprint Hopping Method to Prevent Fingerprinting Attacks

    Directory of Open Access Journals (Sweden)

    Zheng Zhao

    2017-01-01

    Full Text Available Fingerprinting attacks are one of the most severe threats to the security of networks. Fingerprinting attack aims to obtain the operating system information of target hosts to make preparations for future attacks. In this paper, a fingerprint hopping method (FPH is proposed based on software-defined networks to defend against fingerprinting attacks. FPH introduces the idea of moving target defense to show a hopping fingerprint toward the fingerprinting attackers. The interaction of the fingerprinting attack and its defense is modeled as a signal game, and the equilibriums of the game are analyzed to develop an optimal defense strategy. Experiments show that FPH can resist fingerprinting attacks effectively.

  6. Relationship between advanced glycation end-products with the severity of chronic heart failure in 85 patients

    Directory of Open Access Journals (Sweden)

    Amir Farhang Zand Parsa

    2013-12-01

    Full Text Available Background: Advanced glycation end-products (AGEs came up with the recent researches regarding new biomarkers for the diagnosis of heart failure. AGEs are the end products of non-enzymatic glycation and oxidation of proteins, lipids and nucleotides during Maillard biochemical reaction. Although it has been known that AGEs have a role in the pathogenesis of chronic heart failure (CHF, information regarding its role and its pathogenetic mechanism is very limited. The aim of this study was to find any relationship between AGEs with the etiology and severity of chronic heart failure.Methods: This study is a prospective cross sectional study that enrolled 85 patients with chronic heart failure. Measurement of left ventricle ejection fraction (LVEF was done by echocardiography. Blood samples were collected for measuring AGEs just before or after echocardiography assessment (in the same session. Measurement of AGEs was done by the enzyme-linked immunosorbent assay (ELISA method. The relationship between AGEs with the severity of CHF and as well as the etiology of CHF were evaluated via SPSS-15.Results: Of 85 patients 48 (56.5% patients were male and 37 (43.5% were female; Mean±SD of their ages was 55.8±13.4 years old (ranges from 27 to 84 years. Correlation coefficient between LVEF and AGEs was 0.269 (P=0.013. Mean of AGEs in patients with and without ischemic etiology of their heart failure were 16.8±9.8µg/ml and 11.6±7.3 µg/ml, respectively. Although trend was in favor of ischemic heart failure, the difference between two groups was not statistically significant (P= 0.141.Conclusion: According to this study the rate of AGES could be helpful in the diagnosis and assessment of severity of CHF. Based on our findings, higher blood levels of AGEs in the ischemic CHF cases, also it could be concluded that in the future this marker may be used for etiologic differentiation of heart failure syndrome.

  7. Preliminary data from {gamma}-cardiography during the abatement of an asthmatic attack (1961); Premieres donnees de la {gamma}-cardiographie au decours de l'etat de mal asthmatique (1961)

    Energy Technology Data Exchange (ETDEWEB)

    Georges, R; Vernejoul, P de; Raynaud, C; Blanchon, P; Kellershohn, C; Turiaf, J [Commissariat a l' Energie Atomique, Saclay (France). Centre d' Etudes Nucleaires

    1961-07-01

    The authors used gamma cardiology during the abatement of 16 cases of asthma with a view to detecting heart attacks not otherwise visible with routine methods of examination: clinical, radiological and electro-cardio-graphical. In gamma cardiology, a radioactive indicator is used and its path followed in the cavities of the heart. The method makes it possible to study the circulation in the right heart, the pulmonary crossing, and the left heart, as well as evaluation of the heart-flow. As a result of their investigations the authors, after having discussed the significance of the data obtained with the method, suggest that it is possible by the use of gamma cardiography during the abatement of an asthma attack: 1- To confirm attacks of the right heart which have already been detected by ordinary methods. 2- To confirm the presence of modifications in the recorded curves which suggest, in the case of the left heart, possible attack; such on attack is also indicated, in a small number of cases, by electrocardiography curves. Some considerations are put forward by the authors concerning the physiopathology of attacks on the left heart. (authors) [French] Les auteurs ont fait appel a la gammacardiographie au decours de 16 cas d'etat de mal asthmatique, dans le but d'objectiver des atteintes cardiaques incapables d'etre revelees par les moyens d'exploration de routine: cliniques, radiologiques et electrocardiographiques. La gammacardiographie est un procede qui enregistre a l'aide d'un indicateur radioactif, le trajet de celui-ci dans les cavites cardiaques. Elle permet l'etude de la circulation dans le coeur droit, de la traversee pulmonaire, et le coeur gauche, de meme que le calcul du debit cardiaque. Au terme de leurs investigations, les auteurs apres avoir discute la signification des donnees fournies par la methode admettent que la gammacardiographie objective au secours de l'etat de mal asthmatique: 1- La confirmation de l'atteinte du coeur droit deja etablie

  8. The usefulness of treatment evaluation of severe heart failure by ECG-gated myocardial SPECT

    International Nuclear Information System (INIS)

    Ohkoshi, Nobuyuki; Watanabe, Shingo; Matsumoto, Tooru

    2011-01-01

    Our purpose of study was to investigate the usefulness of treatment evaluation of severe heart failure by Electrocardiogram (ECG)-gated myocardial single photon emission computed tomography (SPECT). We evaluated the cardiac function in the case of severe heart failure by gated SPECT and compared it with the cardiac function obtained by left ventriculography (LVG), echocardiography, cardiac MRI, and B-type natriuretic peptide (BNP) values. We investigated the correlation of ejection fraction (EF), time lag of wall motion between the septal and lateral walls of the left ventricle for cardiac resynchronization therapy (CRT) and wall thickening (WT). We classified the left ventricular (LV) into basal, middle and apical areas for comparison of WT. We investigated the effect of a perfusion defect score in these comparisons. The gated SPECT results were correlated with comparative subjects in EF. The results were correlated with MRI on the middle area of the LV in the comparison of WT. We thought it was possible that there was an effect from a perfusion defect score in a time lag comparison of wall motion. Treatment evaluation of severe heart failure by gated SPECT is useful, because it is able to obtain three-dimensional cardiac function analysis, and it offers objectivity and reproducible quantitative evaluation. At the same time, perfusion SPECT is helpful for CRT and LV-plasty. (author)

  9. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia.

    Science.gov (United States)

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (2003). Problems faced, lessons learnt, and costs incurred are discussed. A burns disaster plan drawing on lessons learnt from these attacks is presented. Thirty-one patients were treated at the SGH Burns Centre in three attacks (2002 Bali attack [n = 15], 2003 Jakarta attack [n = 14], and 2005 Bali attack [n = 2]). For the 2002 Bali attack, median age was 29 years (range 20 to 50 years), median percentage of total burn surface area (TBSA) was 29% (range 5% to 55%), and median abbreviated burn severity index (ABSI) was 6 (range 3 to 10). Eight of 15 patients were admitted to the intensive care unit. For the 2003 Jakarta attack, median age was 35 years (range 24 to 56 years), median percentage of TBSA was 10% (range 2% to 46%), and median ABSI was 4 (range 3 to 9). A large number of patients had other injuries. Problems faced included manpower issues, lack of bed space, shortage of blood products, and lack of cadaver skin. The changing nature of terror attacks mandates continued vigilance and disaster preparedness. The multidimensional burns patient, complicated by other injuries, is likely to become increasingly common. A burns disaster plan with emphasis on effective command, control, and communication as well as organisation of health care personnel following a 'team concept' will do much to ensure that the sudden onset of a crisis situation at an unexpected time does not overwhelm hospital manpower and resources.

  10. Participation in Heart-Healthy Behaviors: A Secondary Analysis of the American Heart Association Go Red Heart Match Data.

    Science.gov (United States)

    Arslanian-Engoren, Cynthia; Eastwood, Jo-Ann; De Jong, Marla J; Berra, Kathy

    2015-01-01

    The American Heart Association created Go Red Heart Match, a free and secure online program that enables women to connect with each other to fight heart disease either personally or as a caregiver for someone with heart disease. Through these connections, participants have an opportunity to develop a personal, private, and supportive relationship with other women; share common experiences; and motivate and encourage each other to follow a heart-healthy lifestyle. The aims of this study were to describe the demographic characteristics of the Go Red Heart Match responders and to determine whether participation in the program prompted participants to engage in heart-healthy behaviors. A secondary analysis of data collected as part of a needs assessment survey from the American Heart Association Go Red Heart Match was conducted. A total of 117 (35%) of the 334 invited women completed the survey. Most responders were female, married, and college educated. A total of 105 (90%) responders were diagnosed with a type of heart disease or stroke and 77 (73%) responders had undergone treatment. As a result of participating in the program, 75% of the responders reported the following improvements in heart-healthy behaviors: eating a more heart-healthy diet (54%), exercising more frequently (53%), losing weight (47%), and quitting smoking (10%). Responders who had a diagnosis of heart attack (n = 48) were more likely (P = .003) to quit smoking than were those with other diagnoses (n = 69). Notably, 48% of responders reported encouraging someone else in their life to speak to their doctor about their risk for heart disease. Most women who participated in Heart Match reported engaging in new heart-healthy behaviors. The findings support expanding the existing program in a more diverse population as a potentially important way to reach women and encourage cardiovascular disease risk reduction for those with heart disease and stroke.

  11. Clinical Outcomes in 3343 Children and Adults With Rheumatic Heart Disease From 14 Low- and Middle-Income Countries: Two-Year Follow-Up of the Global Rheumatic Heart Disease Registry (the REMEDY Study).

    Science.gov (United States)

    Zühlke, Liesl; Karthikeyan, Ganesan; Engel, Mark E; Rangarajan, Sumathy; Mackie, Pam; Cupido-Katya Mauff, Blanche; Islam, Shofiqul; Daniels, Rezeen; Francis, Veronica; Ogendo, Stephen; Gitura, Bernard; Mondo, Charles; Okello, Emmy; Lwabi, Peter; Al-Kebsi, Mohammed M; Hugo-Hamman, Christopher; Sheta, Sahar S; Haileamlak, Abraham; Daniel, Wandimu; Goshu, Dejuma Yadeta; Abdissa, Senbeta G; Desta, Araya G; Shasho, Bekele A; Begna, Dufera M; ElSayed, Ahmed; Ibrahim, Ahmed S; Musuku, John; Bode-Thomas, Fidelia; Yilgwan, Christopher C; Amusa, Ganiyu A; Ige, Olukemi; Okeahialam, Basil; Sutton, Christopher; Misra, Rajeev; Abul Fadl, Azza; Kennedy, Neil; Damasceno, Albertino; Sani, Mahmoud U; Ogah, Okechukwu S; Elhassan, Taiwo OlunugaHuda H M; Mocumbi, Ana Olga; Adeoye, Abiodun M; Mntla, Phindile; Ojji, Dike; Mucumbitsi, Joseph; Teo, Koon; Yusuf, Salim; Mayosi, Bongani M

    2016-11-08

    There are few contemporary data on the mortality and morbidity associated with rheumatic heart disease or information on their predictors. We report the 2-year follow-up of individuals with rheumatic heart disease from 14 low- and middle-income countries in Africa and Asia. Between January 2010 and November 2012, we enrolled 3343 patients from 25 centers in 14 countries and followed them for 2 years to assess mortality, congestive heart failure, stroke or transient ischemic attack, recurrent acute rheumatic fever, and infective endocarditis. Vital status at 24 months was known for 2960 (88.5%) patients. Two-thirds were female. Although patients were young (median age, 28 years; interquartile range, 18-40), the 2-year case fatality rate was high (500 deaths, 16.9%). Mortality rate was 116.3/1000 patient-years in the first year and 65.4/1000 patient-years in the second year. Median age at death was 28.7 years. Independent predictors of death were severe valve disease (hazard ratio [HR], 2.36; 95% confidence interval [CI], 1.80-3.11), congestive heart failure (HR, 2.16; 95% CI, 1.70-2.72), New York Heart Association functional class III/IV (HR, 1.67; 95% CI, 1.32-2.10), atrial fibrillation (HR, 1.40; 95% CI, 1.10-1.78), and older age (HR, 1.02; 95% CI, 1.01-1.02 per year increase) at enrollment. Postprimary education (HR, 0.67; 95% CI, 0.54-0.85) and female sex (HR, 0.65; 95% CI, 0.52-0.80) were associated with lower risk of death. Two hundred and four (6.9%) patients had new congestive heart failure (incidence, 38.42/1000 patient-years), 46 (1.6%) had a stroke or transient ischemic attack (8.45/1000 patient-years), 19 (0.6%) had recurrent acute rheumatic fever (3.49/1000 patient-years), and 20 (0.7%) had infective endocarditis (3.65/1000 patient-years). Previous stroke and older age were independent predictors of stroke/transient ischemic attack or systemic embolism. Patients from low- and lower-middle-income countries had significantly higher age- and sex

  12. SDN-Based Double Hopping Communication against Sniffer Attack

    Directory of Open Access Journals (Sweden)

    Zheng Zhao

    2016-01-01

    Full Text Available Sniffer attack has been a severe threat to network communication security. Traditional network usually uses static network configuration, which provides convenience to sniffer attack. In this paper, an SDN-based double hopping communication (DHC approach is proposed to solve this problem. In DHC, ends in communication packets as well as the routing paths are changed dynamically. Therefore, the traffic will be distributed to multiple flows and transmitted along different paths. Moreover, the data from multiple users will be mixed, bringing difficulty for attackers in obtaining and recovering the communication data, so that sniffer attack will be prevented effectively. It is concluded that DHC is able to increase the overhead of sniffer attack, as well as the difficulty of communication data recovery.

  13. Effect of percutaneous renal sympathetic nerve radiofrequency ablation in patients with severe heart failure.

    Science.gov (United States)

    Dai, Qiming; Lu, Jing; Wang, Benwen; Ma, Genshan

    2015-01-01

    This study aimed to investigate the clinical feasibility and effects of percutaneous renal sympathetic nerve radiofrequency ablation in patients with heart failure. A total of 20 patients with heart failure were enrolled, aged from 47 to 75 years (63±10 years). They were divided into the standard therapy (n = 10), and renal nerve radiofrequency ablation groups (n = 10). There were 15 males and 5 female patients, including 8 ischemic cardiomyopathy, 8 dilated cardiomyopathy, and 8 hypertensive cardiopathy. All of the patients met the criteria of New York Heart Association classes III-IV cardiac function. Patients with diabetes and renal failure were excluded. Percutaneous renal sympathetic nerve radiofrequency ablation was performed on the renal artery wall under X-ray guidance. Serum electrolytes, neurohormones, and 24 h urine volume were recorded 24 h before and after the operation. Echocardiograms were performed to obtain left ventricular ejection fraction at baseline and 6 months. Heart rate, blood pressure, symptoms of dyspnea and edema were also monitored. After renal nerve ablation, 24 h urine volume was increased, while neurohormone levels were decreased compared with those of pre-operation and standard therapy. No obvious change in heart rate or blood pressure was recorded. Symptoms of heart failure were improved in patients after the operation. No complications were recorded in the study. Percutaneous renal sympathetic nerve radiofrequency ablation may be a feasible, safe, and effective treatment for the patients with severe congestive heart failure.

  14. Levosimendan treatment of severe acute congestive heart failure refractory to dobutamine/milrinone in children

    Directory of Open Access Journals (Sweden)

    Prijić Sergej

    2011-01-01

    Full Text Available Introduction. Levosimendan is a novel positive inotropic agent which, improves myocardial contractility through its calcium-sensitizing action, without causing an increase in myocardial oxygen demand. Also, by opening ATP-sensitive potassium channels, it causes vasodilatation with the reduction in both afterload and preload. Because of the long halflife, its effects last for up 7 to 9 days after 24-hour infusion. Case report. We presented three patients 2, 15 and 17 years old. All the patients had severe acute deterioration of the previously diagnosed chronic heart failure (dilatative cardiomyopathy; univentricular heart with bidirectional Glenn anastomosis and restrictive bulboventricular foramen; bacterial endocarditis on artificial aortic valve with severe stenosis and regurgitation. Signs and symptoms of severe heart failure, cardiomegaly (cardio-thoracic index 0.65 and left ventricular dilatation (end-diastolic diameter z-score 2.6; 4.1 and 4.0 were confirmed on admission. Also, myocardial contractility was poor with ejection fraction (EF - 27%, 25%, 35%, fractional shortening (FS - 13%, 11%, 15% and stroke volume (SV - 40, 60, 72 mL/m2. The treatment with standard intravenous inotropic agents resulted in no improvement but in clinical deterioration. Thus, standard intravenous inotropic support was stopped and levosimendan treatment was introduced. All the patients received a continuous 24-h infusion 0.1 μg/kg/min of levosimendan. In a single patient an initial loading dose of 11 μg/kg over 10 min was administrated, too. Levosimendan treatment resulted in both clinical and echocardiography improvement with the improved EF (42%, 34%, 44%, FS (21%, 16%, 22% and SV (59, 82, 93 mL/m2. Hemodynamic improvement was registered too, with the reduction in heart rate in all the treated patients from 134-138 bpm before, to less than 120 bpm after the treatment. These parameters were followed by the normalization of lactate levels. Nevertheless, left

  15. Chronic oral pathology and ischemic heart disease and its complications

    Directory of Open Access Journals (Sweden)

    Ivaschenko Y.Y.

    2013-09-01

    Full Text Available Objective: to establish the relationship of chronic generalized periodontitis, multiple cavities and dentofacial anomalies with various forms of coronary heart disease and its complications. Material and methods. The study included 294 patients with coronary heart disease and its complications. The patients were divided into two groups. Group I included 89 patients with acute Q-myocardial infarction, which was placed in the presence of at least 2 of the following criteria identified on the basis of a comprehensive clinical and instrumental examination: clinical, laboratory confirmation (CK-MB, electrocardiographic signs of damage or myocardial necrosis. The following statistical methods were used: multi-variate and univariate analysis of variance, non-parametric tests, crosstabulation, chi-square test, Fisher»s exact test. As a measure of variability of the normal distribution standard deviation was used. Results. It is noted that in patients with myocardial infarction more likely than in patients without coronary heart attack in history severe generalized periodontitis, dentofacial anomalies and multiple dental caries have appeared. In patients with acute myocardial infarction, severe periodontal disease has been associated with increased fibrinogen levels in the blood and an increase in the dispersion of the interval QT, which are known to be indicators of poor prognosis in acute coronary disease.

  16. Antioxidant status in acute asthmatic attack in children

    International Nuclear Information System (INIS)

    Al-Abdulla, N.O.; Al-Naama, L.M.; Hassan, M.K.

    2010-01-01

    Objectives: To determine the oxidant - antioxidant imbalance in asthmatic children, by measuring the levels of malondialdehyde (MDA) as an oxidant marker of lipid peroxidation as well as antioxidant compounds like vitamin C, vitamin E and uric acid and to investigate whether their concentrations are associated with more severe asthma. Methods: This case controlled prospective study was conducted on 219 children aged 1-12 years, attending Basra Maternity and Children Hospital. Included were 98 asthmatic children during acute attack and 121 non asthmatic, apparently healthy children. Serum malondialdehyde (MDA) as an oxidant marker of lipid peroxidation, and vitamin C, vitamin E and uric acid (as antioxidants) were estimated in asthmatic children during acute attack and compared with non-asthmatic children. Results: Asthmatic children during exacerbation of their asthma have significant lower serum levels of antioxidant compounds like vitamin C, vitamin E and uric acid (p<0.001) and significantly high malondialdehyde as compared with the controls. MDA was significantly elevated (P< 0.001), while that of vitamin C, vitamin E and uric acid were significantly decreased with increasing severity of asthmatic attack (P<0.001). A significant negative correlation between MDA with vitamin C (P<0.05, r = - 0.44) was observed in severe asthmatic attacks. Conclusion: Asthmatic patients during acute attack suffer a high degree of reactive oxygen species formation causing considerable oxidative stress that is indicated by the high level of oxidants (MDA) and low level of antioxidants. (author)

  17. Intravenous lysine clonixinate for the acute treatment of severe migraine attacks: a double-blind, randomized, placebo-controlled study

    Directory of Open Access Journals (Sweden)

    Abouch Valenty Krymchantowski, MD, PhD

    2003-09-01

    Full Text Available Background: Several nonsteroidal anti-inflammatory drugs (NSAIDs have been shown to be effective in the treatment of migraine. However, few commercially available NSAIDs can be administered IV. Lysine clonixinate (LC, an NSAID derived from nicotinic acid, has been proved effective in various algesic syndromes (eg, renal colic, muscular pain, nerve compression, odontalgia. The oral formulation of LC has been shown to be effective in the treatment of migraine of moderate severity. Objective: The aim of this study was to assess the efficacy and tolerability of the IV formulation of LC in the treatment of severe migraine. Methods: This double-blind, randomized, placebo-controlled, prospective study enrolled patients with severe migraine (without aura as defined by the criteria of the International Headache Society. When patients presented to a neurology hospital with an outpatient headache unit (Instituto de Neurologia Deolindo Couto, Rio de Janeiro, Brazil with a severe migraine attack that had lasted <4 hours, they were randomized to 1 of 2 groups (IV placebo [25 mL of 0.9% saline] or IV LC [21 mL of 0.9% saline plus 4 mL of LC 200 mg]. Headache intensity and adverse effects (AEs were assessed before (0 minute and 30, 60, and 90 minutes after study drug administration. Rescue medication was available 2 hours after study drug administration, and its use was compared between groups. Results: Thirty-two patients (23 women, 9 men; mean [SD] age, 32 [2] years; range, 18–58 years entered the study. Twenty-nine patients (21 women, 8 men; mean [SD] age, 32 [2] years; range, 18–56 years completed the study. Three patients (all in the placebo group did not complete the study (1 patient was unable to rate the pain severity after drug administration and 2 patients refused IV drug administration. Among study completers, 17 patients received LC and 12 placebo. At 30 minutes, 1 patient (8.3% in the placebo group and 5 patients (29.4% in the LC group were

  18. Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, MAC layer attacks are considered...... the most harmful as they directly affect the available resources and thus the nodes’ energy consumption. The first endeavour of this paper is to model the activities of MAC layer security attacks to understand the flow of activities taking place when mounting the attack and when actually executing it....... The second aim of the paper is to simulate these attacks on hybrid MAC mechanisms, which shows the performance degradation of aWSN under the considered attacks. The modelling and implementation of the security attacks give an actual view of the network which can be useful in further investigating secure...

  19. VTAC: virtual terrain assisted impact assessment for cyber attacks

    Science.gov (United States)

    Argauer, Brian J.; Yang, Shanchieh J.

    2008-03-01

    Overwhelming intrusion alerts have made timely response to network security breaches a difficult task. Correlating alerts to produce a higher level view of intrusion state of a network, thus, becomes an essential element in network defense. This work proposes to analyze correlated or grouped alerts and determine their 'impact' to services and users of the network. A network is modeled as 'virtual terrain' where cyber attacks maneuver. Overlaying correlated attack tracks on virtual terrain exhibits the vulnerabilities exploited by each track and the relationships between them and different network entities. The proposed impact assessment algorithm utilizes the graph-based virtual terrain model and combines assessments of damages caused by the attacks. The combined impact scores allow to identify severely damaged network services and affected users. Several scenarios are examined to demonstrate the uses of the proposed Virtual Terrain Assisted Impact Assessment for Cyber Attacks (VTAC).

  20. Noninvasive positive pressure ventilation in acute asthmatic attack

    Directory of Open Access Journals (Sweden)

    A. Soroksky

    2010-03-01

    Full Text Available Asthma is characterised by reversible airway obstruction. In most patients, control of disease activity is easily achieved. However, in a small minority, asthma may be fatal. Between the two extremes lie patients with severe asthmatic attacks, refractory to standard treatment. These patients are at an increased risk of recurrent severe attacks, with respiratory failure, and mechanical ventilation. Invasive mechanical ventilation of the asthmatic patient is associated with a higher risk of complications and, therefore, is a measure of last resort. Noninvasive positive pressure ventilation (NPPV is another treatment modality that may be beneficial in patients with severe asthmatic attack who are at an increased risk of developing respiratory failure. These patients have the potential to benefit from early respiratory support in the form of NPPV. However, reports of NPPV in asthmatic patients are scarce, and its usage in asthmatic attacks is, therefore, still controversial. Only a few reports of NPPV in asthma have been published over the last decade. These studies mostly involve small numbers of patients and those who have problematic methodology. In this article we review the available evidence for NPPV in asthma and try to formulate our recommendations for NPPV application in asthma based on the available evidence and reports.

  1. Problems of rapid digitalization in severe congestive heart failure.

    Science.gov (United States)

    Haustein, K O; Assmann, I; Fiehring, H

    1980-02-01

    The pharmacodynamic effects (changes of systolic time intervals, STI, reaction of pulmonary arterial pressure) of digitoxin were studied in 7 patients with severe congestive heart failure in comparison with the corresponding plasma level. STI indicated glycoside-dependent changes, i.e. shortening of LVETc and QS2c and normalization of prolonged PEPc, while ICT shortening was less observed. In 2 patients with cor pulmonale a pulmonary oedema occurred accompanied with prolonged LVETc. During the early period of glycoside-dependent recompensation no significant correlation between STI shortening and glycoside plasma level was observed. Because of the retarded normalization of the haemodynamics of the pulmonary circulation and because of possible side-effects, rapid digitalization has to be reconsidered.

  2. Cardiac I123-MIBG Correlates Better than Ejection Fraction with Symptoms Severity in Systolic Heart Failure

    Energy Technology Data Exchange (ETDEWEB)

    Miranda, Sandra M.; Moscavitch, Samuel D.; Carestiato, Larissa R. [Programa de Pós-Graduação em Ciências Cardiovasculares, Hospital Universitário Antonio Pedro, Universidade Federal Fluminense, Rio de Janeiro, RJ (Brazil); Felix, Renata M. [Departamento de Medicina Nuclear, Hospital Pró-Cardíaco, Rio de Janeiro, RJ (Brazil); Rodrigues, Ronaldo C.; Messias, Leandro R. [Programa de Pós-Graduação em Ciências Cardiovasculares, Hospital Universitário Antonio Pedro, Universidade Federal Fluminense, Rio de Janeiro, RJ (Brazil); Azevedo, Jader C. [Programa de Pós-Graduação em Ciências Cardiovasculares, Hospital Universitário Antonio Pedro, Universidade Federal Fluminense, Rio de Janeiro, RJ (Brazil); Departamento de Medicina Nuclear, Hospital Pró-Cardíaco, Rio de Janeiro, RJ (Brazil); Nóbrega, Antonio Cláudio L.; Mesquita, Evandro Tinoco [Programa de Pós-Graduação em Ciências Cardiovasculares, Hospital Universitário Antonio Pedro, Universidade Federal Fluminense, Rio de Janeiro, RJ (Brazil); Mesquita, Claudio Tinoco, E-mail: ctinocom@cardiol.br [Programa de Pós-Graduação em Ciências Cardiovasculares, Hospital Universitário Antonio Pedro, Universidade Federal Fluminense, Rio de Janeiro, RJ (Brazil); Departamento de Medicina Nuclear, Hospital Pró-Cardíaco, Rio de Janeiro, RJ (Brazil)

    2013-07-15

    The association of autonomic activation, left ventricular ejection fraction (LVEF) and heart failure functional class is poorly understood. Our aim was to correlate symptom severity with cardiac sympathetic activity, through iodine-123-metaiodobenzylguanidine ({sup 123}I-MIBG) scintigraphy and with LVEF in systolic heart failure (HF) patients without previous beta-blocker treatment. Thirty-one patients with systolic HF, class I to IV of the New York Heart Association (NYHA), without previous beta-blocker treatment, were enrolled and submitted to {sup 123}I-MIBG scintigraphy and to radionuclide ventriculography for LVEF determination. The early and delayed heart/mediastinum (H/M) ratio and the washout rate (WR) were performed. According with symptom severity, patients were divided into group A, 13 patients in NYHA class I/II, and group B, 18 patients in NYHA class III/IV. Compared with group B patients, group A had a significantly higher LVEF (25% ± 12% in group B vs. 32% ± 7% in group A, p = 0.04). Group B early and delayed H/M ratios were lower than group A ratios (early H/M 1.49 ± 0.15 vs. 1.64 ± 0.14, p = 0.02; delayed H/M 1.39 ± 0.13 vs. 1.58 ± 0.16, p = 0.001, respectively). WR was significantly higher in group B (36% ± 17% vs. 30% ± 12%, p= 0.04). The variable that showed the best correlation with NYHA class was the delayed H/M ratio (r= -0.585; p=0.001), adjusted for age and sex. This study showed that cardiac {sup 123}I-MIBG correlates better than ejection fraction with symptom severity in systolic heart failure patients without previous beta-blocker treatment.

  3. 77 FR 5373 - American Heart Month, 2012

    Science.gov (United States)

    2012-02-03

    ...; its victims are fathers and daughters, grandparents and siblings, cherished friends and community... Federal agencies and forging new public-private partnerships to prevent one million heart attacks and... research to unlock new treatments for cardiovascular disease. And the Centers for Disease Control and...

  4. Posttraumatic stress disorder following asthma attack (post-asthma attack PTSD) and psychiatric co-morbidity: the impact of alexithymia and coping.

    Science.gov (United States)

    Chung, Man Cheung; Rudd, Hannah; Wall, Natalie

    2012-05-30

    This study investigated the prevalence of post-asthma attack posttraumatic stress disorder (PTSD) and the severity of psychiatric co-morbidity among a group of college students and whether alexithymia and coping strategies would relate to health outcomes. This is a cross-sectional study in which 156 college students who had previously experienced asthma attack were recruited. They completed a demographic page, Asthma Symptom Checklist, PTSD Checklist, General Health Questionnaire-28, Toronto Alexithymia Scale and the COPE. They were also matched with 141 students without asthma. The results showed that 3% met the criteria for full-PTSD, 44% for partial and 53% for no-PTSD. There were no significant differences between the asthma and control groups in severity of psychiatric co-morbid symptoms. Path analyses showed that asthma severity was significantly correlated with PTSD and psychiatric co-morbidity. It was also correlated with alexithymia which was in turn associated with psychiatric co-morbidity but not PTSD. Coping strategies were not correlated with health outcomes. To conclude, people can develop PTSD symptoms and degrees of psychiatric co-morbid symptoms after suffering asthma attack. The severity of these symptoms relates to people's perceptions of asthma severity and alexithymia. Copyright © 2012 Elsevier Ltd. All rights reserved.

  5. Can News Draw Blood The Impact of Media Coverage on the Number and Severity of Terror Attacks

    Science.gov (United States)

    2016-05-01

    groups devote to carrying out attacks, p are the costs of a single attack, and E measures the effectiveness of terrorist attacks, e.g. the average...8i) h A. h · A ( b) (r r ) A 2(a+b)JP , w ere IS t e expressiOn = a+ jP u3 + s- u1 . s A2 + 4bEw > 0, all three eigenvalues will be elements of the...May 2016 164 Jahn, Vera ; Steinhardt, Max Friedrich : Innovation and Immigration - Insights from a Placement Policy, February 2016 163 Beckmann

  6. Recurrent spontaneous attacks of dizziness.

    Science.gov (United States)

    Lempert, Thomas

    2012-10-01

    This article describes the common causes of recurrent vertigo and dizziness that can be diagnosed largely on the basis of history. Ninety percent of spontaneous recurrent vertigo and dizziness can be explained by six disorders: (1) Ménière disease is characterized by vertigo attacks, lasting 20 minutes to several hours, with concomitant hearing loss, tinnitus, and aural fullness. Aural symptoms become permanent during the course of the disease. (2) Attacks of vestibular migraine may last anywhere from minutes to days. Most patients have a previous history of migraine headaches, and many experience migraine symptoms during the attack. (3) Vertebrobasilar TIAs affect older adults with vascular risk factors. Most attacks last less than 1 hour and are accompanied by other symptoms from the posterior circulation territory. (4) Vestibular paroxysmia is caused by vascular compression of the eighth cranial nerve. It manifests itself with brief attacks of vertigo that recur many times per day, sometimes with concomitant cochlear symptoms. (5) Orthostatic hypotension causes brief episodes of dizziness lasting seconds to a few minutes after standing up and is relieved by sitting or lying down. In older adults, it may be accompanied by supine hypertension. (6) Panic attacks usually last minutes, occur in specific situations, and are accompanied by choking, palpitations, tremor, heat, and anxiety. Less common causes of spontaneous recurrent vertigo and dizziness include perilymph fistula, superior canal dehiscence, autoimmune inner ear disease, otosclerosis, cardiac arrhythmia, and medication side effects. Neurologists need to venture into otolaryngology, internal medicine, and psychiatry to master the differential diagnosis of recurrent dizziness.

  7. HEART FAILURE – KEEPING STEP WITH THE PROGRESS

    Directory of Open Access Journals (Sweden)

    Camelia Diaconu

    2018-06-01

    Full Text Available Chronic heart failure continues to represent a major problem for the healthcare systems worldwide, because of high prevalence and impact on patients’ quality of life. Between May 25-28, 2018, in Vienna, Austria, took place the European Congress of Heart Failure and the World Congress on Acute Heart Failure, organized by the European Society of Cardiology. The congress was a forum of exchanging expertise in diagnosis and treatment of heart failure, and also an opportunity to present the latest progresses regarding the management of this pathology. It seems that an integrated, multidisciplinary team approach is the future for heart failure management. This team should include internists, cardiologists, general practitioners, and nurses. The new President of the Heart Failure Association of the European Society of Cardiology is from a Balkan country, Prof. Petar M. Seferovic, from the Belgrade University Medical Center, Serbia. In one of his presentations, Prof. Seferovic highlighted that the treatment of chronic heart failure should explore new frontiers. Recently, there is much interest in established antidiabetic drugs to treat cardiovascular complications of diabetes. Introduction of sodium-glucose transport protein 2 (SGLT2 inhibitors in the late 1990s was a major breakthrough in the treatment of diabetes complications. These drugs are the only antidiabetic drugs with good results in the treatment of cardiovascular diseases, demonstrated by several large randomized controlled trials, such as EMPA-REG (the first study to demonstrate a significant reduction in both cardiovascular mortality and heart failure-related hospitalization in patients treated with empaglifozin, a SGLT2 inhibitor. SGLT2 inhibitors are now recommended by some guidelines for the prevention of heart failure and associated mortality in patients with type 2 diabetes. The international registry REPORT HF, presented in Vienna, enrolled more than 18,000 patients from 44

  8. Effect of Helicobacter Pylori Treatment on the Number and Intensity of Migraine Attacks

    Directory of Open Access Journals (Sweden)

    Alireza Bakhshipour

    2012-06-01

    Full Text Available Background: Migraine is a common headache with an unknown cause. Migraine is about three times more common in women (18.2% than in men (6.2%. The recent studies have posed the possible relationship between the Helicobacter pylori infection and migraine headache. This study tries to analyze the effect of treating H. pylori infection on number and severity of migraine attacks.Materials and Methods: In this clinical pilot study, a number of 60 patients with migraine were examined in terms of infecting with H. pylori. Patients with the infections were treated by H. pylori eradication treatment standard triple regimen and the frequency and severity of their migraine attacks were measured for three months and finally the average of frequency and severity of attacks before and after treatment were compared. Results: The average frequency of the migraine attacks in patients with the H.pylori infection who have been treated was 7.1 before treatment and 2.7 after treatment (p=0.001. Likewise, the severity rate of such attacks in such patients was 9 which decreased to 4.5 after treatment (p=0.002. Conclusion: According to our study, patients with migraine attacks are preferred to be examined tested in terms of infecting with H. pylori. Thus, and eradication of this infection can be effective in decreasing of the migraine attacks.

  9. Is diet an essential risk factor for coronary heart disease?

    OpenAIRE

    Ball, K. P.

    1980-01-01

    Cigarette smoking, hypertension and diet each play a major role in the development of coronary heart attacks in most industrialized nations. In some countries where cigarette smoking and hypertension are prevalent there is a low risk of coronary heart disease (CHD). Hyperlipidaemia resulting from national food habits appears to be the essential factor in the high rates of CHD in developed countries.

  10. Relationship between regional severity of emphysema and coronary heart disease

    International Nuclear Information System (INIS)

    Nagao, Michinobu; Sakai, Shinya; Yasuhara, Yoshifumi; Ikezoe, Junpei; Murase, Kenya; Ichiki, Taku

    2000-01-01

    We analyzed the relationship between regional severity of emphysema, which was evaluated by three-dimensional fractal analysis (3D-FA) of Technegas SPECT images, and coronary heart disease (CHD). For 22 patients with emphysema who underwent Technegas SPECT, we followed up CHD events. The follow-up period was 5.4±0.5 (mean ±SD) years. We defined the upper-lung fractal dimension (U-FD) and lower-lung fractal dimension (L-FD) obtained with 3D-FA of Technegas SPECT images as the regional severity of emphysema. FD became greater with the progression of emphysematous change. During the follow-up period, CHD events occurred in 6 (27%) of the 22 patients. The ratio of U-FD to L-FD for patients with CHD events (0.87±0.22) was significantly smaller than for patients without CHD events (1.52±0.38) (p=0.0015). These findings suggest that severer emphysema in the lower lung indicates a higher risk of CHD than that in the upper lung. (author)

  11. Blood pressure, risk of ischemic cerebrovascular and ischemic heart disease, and longevity in alpha(1)-antitrypsin deficiency

    DEFF Research Database (Denmark)

    Dahl, Morten; Tybjaerg-Hansen, Anne; Sillesen, Henrik

    2003-01-01

    Because elastase in alpha(1)-antitrypsin deficiency may attack elastin in the arterial wall, we tested whether alpha(1)-antitrypsin deficiency is associated with reduced blood pressure, risk of ischemic cerebrovascular (ICVD) and ischemic heart disease (IHD), and longevity.......Because elastase in alpha(1)-antitrypsin deficiency may attack elastin in the arterial wall, we tested whether alpha(1)-antitrypsin deficiency is associated with reduced blood pressure, risk of ischemic cerebrovascular (ICVD) and ischemic heart disease (IHD), and longevity....

  12. Recurrent Syncope Attributed to Left Main Coronary Artery Severe Stenosis

    Directory of Open Access Journals (Sweden)

    Min Li

    2015-01-01

    Full Text Available Patients with acute coronary syndrome (ACS rarely manifest as recurrent syncope due to malignant ventricular arrhythmia. We report a case of a 56-year-old Chinese male with complaints of paroxysmal chest burning sensation and distress for 2 weeks as well as loss of consciousness for 3 days. The electrocardiogram (ECG revealed paroxysmal multimorphologic ventricular tachycardia during attack and normal heart rhythm during intervals. Coronary angiograph showed 90% stenosis in left main coronary artery and 80% stenosis in anterior descending artery. Two stents sized 4.0*18 mm and 2.75*18 mm were placed at left main coronary artery and anterior descending artery, respectively, during percutaneous coronary intervention (PCI. The patient was discharged and never had ventricular arrhythmia again during a 3-month follow-up since the PCI. This indicated that ventricular tachycardia was correlated with persistent severe myocardial ischemia. Coronary vasospasm was highly suspected to be the reason of the sudden attack and acute exacerbation. PCI is recommended in patients with both severe coronary artery stenosis and ventricular arrhythmia. Removing myocardial ischemia may stop or relieve ventricular arrhythmia and prevent cardiac arrest.

  13. False Positive and False Negative Effects on Network Attacks

    Science.gov (United States)

    Shang, Yilun

    2018-01-01

    Robustness against attacks serves as evidence for complex network structures and failure mechanisms that lie behind them. Most often, due to detection capability limitation or good disguises, attacks on networks are subject to false positives and false negatives, meaning that functional nodes may be falsely regarded as compromised by the attacker and vice versa. In this work, we initiate a study of false positive/negative effects on network robustness against three fundamental types of attack strategies, namely, random attacks (RA), localized attacks (LA), and targeted attack (TA). By developing a general mathematical framework based upon the percolation model, we investigate analytically and by numerical simulations of attack robustness with false positive/negative rate (FPR/FNR) on three benchmark models including Erdős-Rényi (ER) networks, random regular (RR) networks, and scale-free (SF) networks. We show that ER networks are equivalently robust against RA and LA only when FPR equals zero or the initial network is intact. We find several interesting crossovers in RR and SF networks when FPR is taken into consideration. By defining the cost of attack, we observe diminishing marginal attack efficiency for RA, LA, and TA. Our finding highlights the potential risk of underestimating or ignoring FPR in understanding attack robustness. The results may provide insights into ways of enhancing robustness of network architecture and improve the level of protection of critical infrastructures.

  14. Trace Attack against Biometric Mobile Applications

    Directory of Open Access Journals (Sweden)

    Sanaa Ghouzali

    2016-01-01

    Full Text Available With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen. Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy.

  15. TCPL: A Defense against wormhole attacks in wireless sensor networks

    International Nuclear Information System (INIS)

    Kumar, K. E. Naresh; Waheed, Mohd. Abdul; Basappa, K. Kari

    2010-01-01

    Do In this paper presents recent advances in technology have made low-cost, low-power wireless sensors with efficient energy consumption. A network of such nodes can coordinate among themselves for distributed sensing and processing of certain data. For which, we propose an architecture to provide a stateless solution in sensor networks for efficient routing in wireless sensor networks. This type of architecture is known as Tree Cast. We propose a unique method of address allocation, building up multiple disjoint trees which are geographically inter-twined and rooted at the data sink. Using these trees, routing messages to and from the sink node without maintaining any routing state in the sensor nodes is possible. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many sensor network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication. We present a new, general mechanism, called packet leashes, for detecting and thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes.

  16. 75 FR 70273 - National Heart, Lung, and Blood Institute; Notice of Closed Meetings

    Science.gov (United States)

    2010-11-17

    ... Institute Special Emphasis Panel, The Antihypertensive and Lipid-Lowering to Prevent Heart Attack Trial... Research Demonstration and Dissemination Projects. Date: December 14, 2010. Time: 8 a.m. to 2 p.m. Agenda... Assistance Program Nos. 93.233, National Center for Sleep Disorders Research; 93.837, Heart and Vascular...

  17. Restoration of heart functions using human embryonic stem cells derived heart muscle cells.

    Science.gov (United States)

    Gepstein, Lior; Kehat, Izhak

    2005-02-01

    Extract: Recent advances in molecular and cellular biology and specifically in the areas of stem cell biology and tissue engineering have paved the way for the development of a new field in biomedicine, regenerative medicine. This exciting approach seeks to develop new biological solutions, using the mobilization of endogenous stem cells or delivery of exogenous cells to replace or modify the function of diseased, absent, or malfunctioning tissue. The adult heart represents an attractive candidate for these emerging technologies, since adult cardiomyocytes have limited regenerative capacity. Thus, any significant heart cell loss or dysfunction, such as occurs during heart attack, is mostly irreversible and may lead to the development of progressive heart failure, one of the leading causes of world-wide morbidity and mortality. Similarly, dysfunction of the specialized electrical conduction system within the heart may result in inefficient rhythm initiation or impulse conduction, leading to significant slowing of the heart rate, usually requiring the implantation of a permanent electronic pacemaker. Replacement of the dysfunctional myocardium (heart muscle) by implantation of external heart muscle cells is emerging as a novel paradigm for restoration of the myocardial electromechanical properties, but has been significantly hampered by the paucity of cell sources for human heart cells and by the relatively limited evidence for functional integration between grafted and host cells. The recently described human embryonic stem cell (hESC) lines may provide a possible solution for the aforementioned cell sourcing problem.

  18. Thwarting Nonintrusive Occupancy Detection Attacks from Smart Meters

    Directory of Open Access Journals (Sweden)

    Dapeng Man

    2017-01-01

    Full Text Available Occupancy information is one of the most important privacy issues of a home. Unfortunately, an attacker is able to detect occupancy from smart meter data. The current battery-based load hiding (BLH methods cannot solve this problem. To thwart occupancy detection attacks, we propose a framework of battery-based schemes to prevent occupancy detection (BPOD. BPOD monitors the power consumption of a home and detects the occupancy in real time. According to the detection result, BPOD modifies those statistical metrics of power consumption, which highly correlate with the occupancy by charging or discharging a battery, creating a delusion that the home is always occupied. We evaluate BPOD in a simulation using several real-world smart meter datasets. Our experiment results show that BPOD effectively prevents the threshold-based and classifier-based occupancy detection attacks. Furthermore, BPOD is also able to prevent nonintrusive appliance load monitoring attacks (NILM as a side-effect of thwarting detection attacks.

  19. Why cryptography should not rely on physical attack complexity

    CERN Document Server

    Krämer, Juliane

    2015-01-01

    This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successfully implemented in practice, they have generally not been considered a serious threat. In short, their physical attack complexity has been overestimated and the implied security threat has been underestimated. First, the book introduces the photonic side channel, which offers not only temporal resolution, but also the highest possible spatial resolution. Due to the high cost of its initial implementation, it has not been taken seriously. The work shows both simple and differential photonic side channel analyses. Then, it presents a fault attack against pairing-based cryptography. Due to the need for at least two indepe...

  20. Mending broken hearts : Cardiac regeneration in zebrafish

    NARCIS (Netherlands)

    kruse, fabian

    2017-01-01

    Cardiovascular disease is the leading global cause of death, accounting for more than 30% of all deaths. It claims more lives than all forms of cancer combined. Bearing these facts in mind, research in this field is direly needed. A heart attack, also known as myocardial infarction (MI), happens

  1. Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers

    NARCIS (Netherlands)

    Pieters, Wolter; Davarynejad, Mohsen

    2015-01-01

    Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of multiple steps and alternative paths. It is possible to derive properties of the overall attacks from properties of individual steps, such as cost for the attacker and probability of success. However, in

  2. Are the rules for the right to self-defense outdated to address current conflicts like attacks from non-state actors and cyber-attacks?

    Directory of Open Access Journals (Sweden)

    Gonzalo J. Arias

    2017-06-01

    Full Text Available The latest US-led coalition’s attacks against ISIS in Syria raised the question whether states can use defensive force against non-state actors. Two critical incidents had previously triggered the discussion on the importance and consequences of cyber-attacks as a new form armed attacks. The first one occurred in Estonia in 2007, when the country experienced extensive computer hacking attacks that lasted several weeks. The second incident happened in 2008, during the Georgia–Russia conflict over South Ossetia, when Georgia experienced cyber-attacks similar to those suffered by Estonia in the previous year. Furthermore, on June 21, 2016, the central banks of Indonesia and South Korea were hit by cyber-attacks on their public websites since activist hacking group Anonymous pledged last month to target banks across the world. The previous incidents have created, once again, public questioning if the rules on the use of force and the right of self-defense established in the United Nations Charter are sufficient and efficient to address these new forms of attacks.

  3. Severe obesity, heart disease, and death among white, African American, and Hispanic postmenopausal women.

    Science.gov (United States)

    McTigue, Kathleen M; Chang, Yue-Fang; Eaton, Charles; Garcia, Lorena; Johnson, Karen C; Lewis, Cora E; Liu, Simin; Mackey, Rachel H; Robinson, Jennifer; Rosal, Milagros C; Snetselaar, Linda; Valoski, Alice; Kuller, Lewis H

    2014-03-01

    To compare mortality, nonfatal coronary heart disease (CHD), and congestive heart failure (CHF) risk across BMI categories in white, African American, and Hispanic women, with a focus on severe obesity (BMI ≥ 40), and examine heterogeneity in weight-related CHD risk. Among 156,775 Women's Health Initiative observational study and clinical trial participants (September 1993-12 September 2005), multivariable Cox models estimated relative risk for mortality, CHD, and CHF. CHD incidence was calculated by anthropometry, race, and cardiovascular risk factors (CVRF). Mortality, nonfatal CHD, and CHF incidence generally rose with BMI category. For severe obesity versus normal BMI, hazard ratios (HRs, 95% confidence interval) for mortality were 1.97 (1.77-2.20) in white, 1.55 (1.20-2.00) in African American, and 2.59 (1.55-4.31) in Hispanic women; for CHD, HRs were 2.05 (1.80-2.35), 2.24 (1.57-3.19), and 2.95 (1.60-5.41) respectively; for CHF, HRs were 5.01 (4.33-5.80), 3.60 (2.30-5.62), and 6.05 (2.49-14.69). CVRF variation resulted in substantial variation in CHD rates across BMI categories, even in severe obesity. CHD incidence was similar by race/ethnicity when differences in BMI or CVRF were accounted for. Severe obesity increases mortality, nonfatal CHD, and CHF risk in women of diverse race/ethnicity. CVRF heterogeneity contributes to variation in CHD incidence even in severe obesity. Copyright © 2012 The Obesity Society.

  4. The usefulness of the nuclear cardiology in the cellular implant in patients with severe myocardial damage; La utilidad de la cardiologia nuclear en el implante celular en pacientes con dano miocardico severo

    Energy Technology Data Exchange (ETDEWEB)

    Omelas A, M.; Arguero S, R.; Garrido G, M.H.; Rodriguez C, A.; Careaga, G.; Castano G, R.; Nambo, M.J.; Pascual P, J.; Ortega R, A.; Gaxiola A, A.; Magana S, J.A.; Estrada A, H.; Equipo de Tecnicos en Medicina Nuclear [Centro Medico Nacional Siglo XXI IMSS Hospital de Cardiologia-Servicio de Medicina Nuclear Mexico DF (Mexico)

    2005-07-01

    The recent therapeutic advances as the cellular implant as well as those different protocols of image acquisition in the field of the Nuclear Cardiology its have allowed that the patient with severe myocardial damage and without some possibility of revascularization is benefited with these advances. Doubtless the Tl-201 par excellence has an important paper for standardize the more appropriate therapeutic behavior for the heart attack patient; reason by this investigation protocol was developed. The objective of the study was to identify the heart attack regions without viable tissue with SPECT in patient with important myocardial damage without some possibility of traditional revascularization; for the 'Stem cell' cellular implantation therapy. The methodology it was carried out by a study of myocardial perfusion in 10 patients with important myocardial damage previous cellular implants, with PICANUC/ SPECT methodology and using a software (Emory Tool Box) for the image processing validated by the University of Emory Atlanta GA; and using as tracer the Tl - 201 to identify the heart attack regions without presence of viable tissue with an analysis model of 17 segments standardized for the left ventricle; qualifying this way the myocardial perfusion in: 0 (normal), 1 (light), 2 (moderate), 3 (severe), 4 (absent) and x (bad technique). The conclusions were that the SPECT study with PICANUC methodology with Tl-201 is safe and effective for the precise localization for the cellular implantation via direct intra myocardial. (Author)

  5. Treatment-resistant hypertension and the incidence of cardiovascular disease and end-stage renal disease: results from the Antihypertensive and Lipid-Lowering Treatment to Prevent Heart Attack Trial (ALLHAT).

    Science.gov (United States)

    Muntner, Paul; Davis, Barry R; Cushman, William C; Bangalore, Sripal; Calhoun, David A; Pressel, Sara L; Black, Henry R; Kostis, John B; Probstfield, Jeffrey L; Whelton, Paul K; Rahman, Mahboob

    2014-11-01

    Apparent treatment-resistant hypertension (aTRH) is defined as uncontrolled hypertension despite the use of ≥3 antihypertensive medication classes or controlled hypertension while treated with ≥4 antihypertensive medication classes. Although a high prevalence of aTRH has been reported, few data are available on its association with cardiovascular and renal outcomes. We analyzed data on 14 684 Antihypertensive and Lipid-Lowering Treatment to Prevent Heart Attack Trial (ALLHAT) participants to determine the association between aTRH (n=1870) with coronary heart disease, stroke, all-cause mortality, heart failure, peripheral artery disease, and end-stage renal disease. We defined aTRH as blood pressure not at goal (systolic/diastolic blood pressure ≥140/90 mm Hg) while taking ≥3 classes of antihypertensive medication or taking ≥4 classes of antihypertensive medication with blood pressure at goal during the year 2 ALLHAT study visit (1996-2000). Use of a diuretic was not required to meet the definition of aTRH. Follow-up occurred through 2002. The multivariable adjusted hazard ratios (95% confidence intervals) comparing participants with versus without aTRH were as follows: coronary heart disease (1.44 [1.18-1.76]), stroke (1.57 [1.18-2.08]), all-cause mortality (1.30 [1.11-1.52]), heart failure (1.88 [1.52-2.34]), peripheral artery disease (1.23 [0.85-1.79]), and end-stage renal disease (1.95 [1.11-3.41]). aTRH was also associated with the pooled outcomes of combined coronary heart disease (hazard ratio, 1.47; 95% confidence interval, 1.26-1.71) and combined cardiovascular disease (hazard ratio, 1.46; 95% confidence interval, 1.29-1.64). These results demonstrate that aTRH increases the risk for cardiovascular disease and end-stage renal disease. Studies are needed to identify approaches to prevent aTRH and reduce risk for adverse outcomes among individuals with aTRH. © 2014 American Heart Association, Inc.

  6. An evaluation of several methods of determining the local angle of attack on wind turbine blades

    International Nuclear Information System (INIS)

    Guntur, S; Sørensen, N N

    2014-01-01

    Several methods of determining the angles of attack (AOAs) on wind turbine blades are discussed in this paper. A brief survey of the methods that have been used in the past are presented, and the advantages of each method are discussed relative to their application in the BEM theory. Data from existing as well as new full rotor CFD computations of the MEXICO rotor are used in this analysis. A more accurate estimation of the AOA is possible from 3D full rotor CFD computations, but when working with experimental data, pressure measurements and sectional forces are often the only data available. The aim of this work is to analyse the reliability of some of the simpler methods of estimating the 3D effective AOA compared some of the more rigorous CFD based methods

  7. A qualitative study of younger men's experience of heart attack (myocardial infarction).

    Science.gov (United States)

    Merritt, Christopher J; de Zoysa, Nicole; Hutton, Jane M

    2017-09-01

    The effects of heart attack, or myocardial infarction (MI), across psychosocial domains may be particularly acute in younger adults, for whom serious health events are non-normative. MI morbidity is declining in Western countries, but in England MI numbers have plateaued for the under-45 cohort, where approximately 90% of patients are male. Qualitative research on younger adults' experience of MI is limited, and no study has sampled exclusively under-45s. This study aimed to understand how a sample of men under 45 adjusted to and made sense of MI. Qualitative research design based on semi-structured in-depth interviews. Ten men aged under 45 who had experienced MI in the past 3-6 months were purposively recruited and interviewed. Interviews were transcribed verbatim and analysed using interpretative phenomenological analysis. Seven superordinate themes were identified. This article focuses in depth on the three most original themes: (1) 'I'm less of a man', which described experiences of losing 'maleness' (strength, independence, ability to provide) post-MI; (2) 'Shortened horizons', which covered participants' sense of foreshortened future and consequent reprioritization; and (3) 'Life loses its colour', describing the loss of pleasure from lifestyle-related changes. Themes broadly overlapped with the qualitative literature on younger adult MI. However, some themes (e.g., loss of 'maleness' post-MI, and ambivalence towards MI risk factors) appeared unique to this study. Themes were also discussed in relation to risk factors for anxiety and depression and how this might inform clinical care for a younger, male population. Statement of contribution What is already known on this subject? Myocardial infarction (MI) morbidity is not declining in England for under-45s. Adjustment to MI is particularly challenging for younger adults, perhaps because it is non-normative. However, little is known about the experience of MI in younger adults. What does this study add? This

  8. Low heat pain thresholds in migraineurs between attacks.

    Science.gov (United States)

    Schwedt, Todd J; Zuniga, Leslie; Chong, Catherine D

    2015-06-01

    Between attacks, migraine is associated with hypersensitivities to sensory stimuli. The objective of this study was to investigate hypersensitivity to pain in migraineurs between attacks. Cutaneous heat pain thresholds were measured in 112 migraineurs, migraine free for ≥ 48 hours, and 75 healthy controls. Pain thresholds at the head and at the arm were compared between migraineurs and controls using two-tailed t-tests. Among migraineurs, correlations between heat pain thresholds and headache frequency, allodynia symptom severity, and time interval until next headache were calculated. Migraineurs had lower pain thresholds than controls at the head (43.9 ℃ ± 3.2 ℃ vs. 45.1 ℃ ± 3.0 ℃, p = 0.015) and arm (43.2 ℃ ± 3.4 ℃ vs. 44.8 ℃ ± 3.3 ℃, p pain thresholds and headache frequency or allodynia symptom severity. For the 41 migraineurs for whom time to next headache was known, there were positive correlations between time to next headache and pain thresholds at the head (r = 0.352, p = 0.024) and arm (r = 0.312, p = 0.047). This study provides evidence that migraineurs have low heat pain thresholds between migraine attacks. Mechanisms underlying these lower pain thresholds could also predispose migraineurs to their next migraine attack, a hypothesis supported by finding positive correlations between pain thresholds and time to next migraine attack. © International Headache Society 2014 Reprints and permissions: sagepub.co.uk/journalsPermissions.nav.

  9. On node replication attack in wireless sensor networks

    International Nuclear Information System (INIS)

    Qabulio, M.; Malkani, Y.A.

    2015-01-01

    WSNs (Wireless Sensor Networks) comprise a large number of small, inexpensive, low power and memory constrained sensing devices (called sensor nodes) that are densely deployed to measure a given physical phenomenon. Since WSNs are commonly deployed in a hostile and unattended environment, it is easy for an adversary to physically capture one or more legitimate sensor nodes, re-program and redeploy them in the network. As a result, the adversary becomes able to deploy several identical copies of physically captured nodes in the network in order to perform illegitimate activities. This type of attack is referred to as Node Replication Attack or Clone Node Attack. By launching node replication attack, an adversary can easily get control on the network which consequently is the biggest threat to confidentiality, integrity and availability of data and services. Thus, detection and prevention of node replication attack in WSNs has become an active area of research and to date more than two dozen schemes have been proposed, which address this issue. In this paper, we present a comprehensive review, classification and comparative analysis of twenty five of these schemes which help to detect and/or prevent node replication attack in WSNs. (author)

  10. On Node Replication Attack in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Mumtaz Qabulio

    2016-04-01

    Full Text Available WSNs (Wireless Sensor Networks comprise a large number of small, inexpensive, low power and memory constrained sensing devices (called sensor nodes that are densely deployed to measure a given physical phenomenon. Since WSNs are commonly deployed in a hostile and unattended environment, it is easy for an adversary to physically capture one or more legitimate sensor nodes, re-program and redeploy them in the network. As a result, the adversary becomes able to deploy several identical copies of physically captured nodes in the network in order to perform illegitimate activities. This type of attack is referred to as Node Replication Attack or Clone Node Attack. By launching node replication attack, an adversary can easily get control on the network which consequently is the biggest threat to confidentiality, integrity and availability of data and services. Thus, detection and prevention of node replication attack in WSNs has become an active area of research and to date more than two dozen schemes have been proposed, which address this issue. In this paper, we present a comprehensive review, classification and comparative analysis of twenty five of these schemes which help to detect and/or prevent node replication attack in WSNs

  11. X-ray diagnosis and treatment for severe respiratory complications during cardiac catheterizations on pediatric congenital heart disease

    International Nuclear Information System (INIS)

    Wang Cheng; Zhao Shihua; Jiang Shiliang; Huang Lianjun; Xu Zhongying; Ling Jian; Zheng Hong; Xie Ruolan; Lu Minjie

    2005-01-01

    Objective: To study the radiological features of severe respiratory complications during cardiac catheterizations on pediatric congenital heart disease so as to make early diagnosis and treatment. We also intend to find the mechanism of these complications. Methods: A total of 9 pediatric cases with severe respiratory complications during cardiac catheterizations were included in the study. The clinical manifestations, radiological features, and corresponding treatments were reviewed. Results: Most of the cases had severe hypoxia, with 6 cases presenting with bradycardia. Opacification of two lung fields was found in 7 cases, pulmonary edema in 1 case, and atelectasis of the upper right lung in 1 case. With intubation, oxygen inhalation and administration of certain drugs, all cases were saved except 1 case with pulmonary edema. Conclusion: Severe respiratory complications during cardiac catheterizations on pediatric congenital heart disease are emergent and critical, and they often presented with various manifestations. Early diagnosis and correct treatment are the key to successful salvage. (authors)

  12. Investigation of impingement attack mechanism of copper alloy condenser tubes

    Energy Technology Data Exchange (ETDEWEB)

    Fukumura, Takuya; Nakajima, Nobuo; Arioka, Koji; Totsuka, Nobuo; Nakagawa, Tomokazu [Institute of Nuclear Safety System Inc., Mihama, Fukui (Japan)

    2001-09-01

    In order to investigate generation and growth mechanisms of impingement attacks of sea water against copper alloy condenser tubes used in condensers of nuclear power plants, we took out condenser tubes from actual condensers, cut them into several pieces and carried out several material tests mainly for impinged spots. In addition water flow inside of a pit was analyzed. From the results of the investigation, it was found that all of impingement attacks were found in the marks left by sessile organisms and none were found in downstream of the marks as frequently proposed so far. At the pits generated inside the marks, iron coating was striped and zinc content was deficient in some cases. Combining these data and the result of flow analysis, we considered the following mechanism of the impingement attacks: sessile organisms clinging to the surface of the condenser tube and growth, occlusion of the tube, extinction and decomposition of sessile organisms, pollution corrosion under the organisms and cavity formation, occlusion removal by the cleaning, generation of impingement attacks by flow collision inside the cavity, growth of the impingement attacks. (author)

  13. Complement activation, endothelial dysfunction, insulin resistance and chronic heart failure

    DEFF Research Database (Denmark)

    Bjerre, M.; Kistorp, C.; Hansen, T.K.

    2010-01-01

    Objectives. Patients with chronic heart failure (CHF) have an exaggerated immune response, endothelial damage/dysfunction, and increased risk of diabetes mellitus (DM). The inter-relationship(s) between indices of complement activation (soluble membrane attack complex, sMAC), inflammation (hs...... to ischemic heart disease (IHD) as compared with CHF patients with non-ischemic ethiology (p = 0.02), but were not predictive of survival or progression of CHF. A moderate strong relation between sMAC and sEsel levels was found beta = 0.33 (p ... damaging of the heart tissue...

  14. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  15. Command Disaggregation Attack and Mitigation in Industrial Internet of Things

    Directory of Open Access Journals (Sweden)

    Peng Xun

    2017-10-01

    Full Text Available A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1 the command sequence is disordered and (2 disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  16. Command Disaggregation Attack and Mitigation in Industrial Internet of Things.

    Science.gov (United States)

    Xun, Peng; Zhu, Pei-Dong; Hu, Yi-Fan; Cui, Peng-Shuai; Zhang, Yan

    2017-10-21

    A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  17. Correlation between serum Hcy content and coronary atherosclerosis severity in patients with H-type hypertension and coronary heart disease

    Directory of Open Access Journals (Sweden)

    Xiao-Mei Li

    2017-03-01

    Full Text Available Objective: To analyze the correlation between serum Hcy content and coronary atherosclerosis severity in patients with H-type hypertension and coronary heart disease. Methods: 48 patients with H-type hypertension and coronary heart disease were selected as observation group, and 57 patients with normal hypertension and coronary heart disease were selected as control group. Echocardiography was used to determine coronary lesion parameters, enzymelinked immunosorbent assay (ELISA was used to determine serum levels of homocysteine (Hcy and coronary heart disease-related indexes, and the correlation between Hcy levels and coronary heart disease was further analyzed. Results: Serum Hcy level of observation group was higher than that of control group (P<0.05, absolute GLPSS value and E/A value under echocardiography were less than those of control group while E-DT and E/e value were higher than those of control group (P<0.05; serum adiponectin (APN level was lower than that of control group while P-selectin, asymmetric dimethylarginine (ADMA, oxidized high-density lipoprotein (OX-HDL, MMP-2, MMP-9, lipoprotein-associated phospholipase A2 (Lp-PLA2 and Resistin levels were higher than those of control group (P<0.05; Hcy was negatively correlated with absolute GLPSS value, E/A value and APN level, and was positively correlated with E-DT value, E/e value as well as P-selectin, ADMA, OX-HDL, MMP-2, MMP-9, Lp- PLA2 and Resistin levels (P<0.05. Conclusions: There is direct correlation between serum Hcy levels and the severity of coronary heart disease in patients with H-type hypertension and coronary heart disease, it can be a reliable way to early screen for coronary heart disease and evaluate the illness, and it is also a new target of coronary heart disease intervention.

  18. Six-month outcome after transcatheter edge-to-edge repair of severe tricuspid regurgitation in patients with heart failure.

    Science.gov (United States)

    Orban, Mathias; Besler, Christian; Braun, Daniel; Nabauer, Michael; Zimmer, Marion; Orban, Martin; Noack, Thilo; Mehilli, Julinda; Hagl, Christian; Seeburger, Joerg; Borger, Michael; Linke, Axel; Thiele, Holger; Massberg, Steffen; Ender, Joerg; Lurz, Philipp; Hausleiter, Jörg

    2018-06-01

    Severe tricuspid regurgitation (TR) is common in patients with right-sided heart failure (HF) and causes substantial morbidity and mortality. Treatment options beyond medical therapy are limited for high-risk patients. Transcatheter edge-to-edge tricuspid valve (TV) repair showed procedural safety and short-term efficacy. Impact on mid-term outcome is unclear. This dual-centre observational study evaluates the mid-term safety, efficacy and clinical outcome after edge-to-edge TV repair for severe TR in patients with HF. Overall, 50 patients with right-sided HF and severe TR were treated with the transcatheter edge-to-edge repair technique; 14 patients were treated for isolated TR and 36 patients for combined mitral regurgitation (MR) and TR. At 6-month follow-up (available for 98% of patients), a persistent reduction of at least one echocardiographic TR grade was achieved in 90% of patients and New York Heart Association class improved in 79% of patients. The 6-minute walk distance increased by 44% (+84 m, P edge-to-edge TV repair for severe TR is safe and effective in reducing TR. It appears to be associated with improved clinical outcome in the majority of patients. © 2018 The Authors. European Journal of Heart Failure © 2018 European Society of Cardiology.

  19. Clinical significance of power spectral analysis of heart rate variability and {sup 123}I-metaiodobenzylguanidine (MIBG) myocardial imaging for assessing the severity of heart failure

    Energy Technology Data Exchange (ETDEWEB)

    Ishida, Yoshio; Fukuoka, Shuji; Shimotsu, Yoriko; Sasaki, Tatsuya; Kamakura, Shiro; Yasumura, Yoshio; Miyatake, Kunio; Shimomura, Katsuro [National Cardiovascular Center, Suita, Osaka (Japan); Tani, Akihiro

    1997-04-01

    The significance of power spectral analysis of heart rate variability and of MIBG myocardial imaging to see the sympathetic nervous function was evaluated in patients with congestive heart failure due to dilated cardiomyopathy. Subjects were 10 normal volunteers and 8 patients with severity NYHA II; 10 normals and 25 patients with NYHA II and III; and 17 patients treated with a beta-blocker (metoprolol 5-40 mg). ECG was recorded with a portable ECG recorder for measuring RR intervals for 24 hr, which were applied for power spectral analysis. Early and delayed imagings with 111 MBq of {sup 123}I-MIBG were performed at 15 min and 4 hr, respectively, after its intravenous administration for acquisition of anterior planar and SPECT images. Myocardial blood flow SPECT was also done with 111 MBq of {sup 201}Tl given intravenously, and difference of total defect scores between MIBG and Tl images was computed. MIBG myocardial sympathetic nerve imaging in those patients was found useful to assess the severity of heart failure, to predict the risk patients for beta-blocker treatment and to assess the risk in complicated ventricular tachycardia. (K.H.)

  20. Development of Tc99m-Saccharic Acid for Heart Imaging

    International Nuclear Information System (INIS)

    Shafii Khamis; Mohd Azfar Adenan; Bohari Yaacob; Amir Fitri Shafii

    2014-01-01

    Cardiovascular disease especially the coronary heart disease (CHD) is the leading cause of death worldwide. Coronary heart disease is a common term for the buildup of plaque in the heart coronary arteries that could block the blood supply to the myocardial and this could lead to heart attack. An estimated 17 million people died from cardiovascular disease in 2008 representing 30% of all global death. In United Kingdom, coronary heart disease killed as much as 82,000 people each year. Hence, early detection of the coronary heart disease is very important in reducing the mortality among the world population. One of the most sensitive detection methods is by radioimaging using Technetium-99m radiopharmaceuticals. Several different radio imaging agents such as Tc99m radiopharmaceutical were developed as radiagnostic agent in determining the CHD especially in identifying the blockage of the coronary artery of the heart muscle. Despite the success of Tc99m-sestamibi and Tc99m-tetrofosmin as effective agents for myocardial perfusion study, the search for other Tc99m heart imaging agents has never been interrupted. This report described the formulation of the Tc99m-saccharic acid radiopharmaceutical kit, radiolabelling of the kit, radiochemical purity evaluation of the Tc99m labeled saccharaic acid, and animal study involving radio imaging using gamma camera. The animal are then sacrificed and the biological distribution of the Tc99m-saccharic acid in-vivo was determined. Comparative study was also conducted using commercially available Tc99m-tetrafosmin, a CHD radiopharmaceutical kit. The Tc99m-saccharic acid developed gave a very high labeling efficiency of >92% with Tc99m and good uptake in the heart muscle. The saccharic acid kit developed was also found to be comparable in quality to the commercially available Tc99-tetrafosmin kit. (author)

  1. Telomere elongation protects heart and lung tissue cells from fatal damage in rats exposed to severe hypoxia.

    Science.gov (United States)

    Wang, Yaping; Zhao, Zhen; Zhu, Zhiyong; Li, Pingying; Li, Xiaolin; Xue, Xiaohong; Duo, Jie; Ma, Yingcai

    2018-02-17

    The effects of acute hypoxia at high altitude on the telomere length of the cells in the heart and lung tissues remain unclear. This study aimed to investigate the change in telomere length of rat heart and lung tissue cells in response to acute exposure to severe hypoxia and its role in hypoxia-induced damage to heart and lung tissues. Forty male Wistar rats (6-week old) were randomized into control group (n = 10) and hypoxia group (n = 30). Rats in control group were kept at an altitude of 1500 m, while rats in hypoxia group were exposed to simulated hypoxia with an altitude of 5000 m in a low-pressure oxygen chamber for 1, 3, and 7 days (n = 10). The left ventricular and right middle lobe tissues of each rat were collected for measurement of telomere length and reactive oxygen species (ROS) content, and the mRNA and protein levels of telomerase reverse transcriptase (TERT), hypoxia-inducible factor1α (HIF-1α), and hypoxia-inducible factor1α (HIF-2α). Increased exposure to hypoxia damaged rat heart and lung tissue cells and increased ROS production and telomere length. The mRNA and protein levels of TERT and HIF-1α were significantly higher in rats exposed to hypoxia and increased with prolonged exposure; mRNA and protein levels of HIF-2α increased only in rats exposed to hypoxia for 7 days. TERT was positively correlated with telomere length and the levels of HIF-1α but not HIF-2α. Acute exposure to severe hypoxia causes damage to heart and lung tissues due to the production of ROS but promotes telomere length and adaptive response by upregulating TERT and HIF-1α, which protect heart and lung tissue cells from fatal damage.

  2. Multi-Layer Approach for the Detection of Selective Forwarding Attacks.

    Science.gov (United States)

    Alajmi, Naser; Elleithy, Khaled

    2015-11-19

    Security breaches are a major threat in wireless sensor networks (WSNs). WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD). The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable.

  3. Multi-Layer Approach for the Detection of Selective Forwarding Attacks

    Directory of Open Access Journals (Sweden)

    Naser Alajmi

    2015-11-01

    Full Text Available Security breaches are a major threat in wireless sensor networks (WSNs. WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD. The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable.

  4. CPR in the Schools: Training Students to Save Heart Attack Victims.

    Science.gov (United States)

    Britton, Royce J.

    1978-01-01

    A community cardiac emergency medical plan should include training of family and co-workers of high risk patients, including teenage students. The American Heart Association lists ways to introduce cardiopulmonary resuscitation (CPR) into school curricula and describes the plan implemented in Pennsylvania. (MF)

  5. Frequency and severity of rheumatic heart disease in the catchment area of Gauteng hospitals, 1993-1995

    NARCIS (Netherlands)

    Clur, Sally-Ann

    2006-01-01

    OBJECTIVE: Identification of frequency and severity of rheumatic fever/rheumatic heart disease (RF/RHD) in the catchment area of Gauteng hospitals. DESIGN: A retrospective descriptive analysis using hospital-based computer databases. SETTING: Helen Joseph, Chris Hani Baragwanath and Johannesburg

  6. Strengthening Crypto-1 Cipher Against Algebraic Attacks

    Directory of Open Access Journals (Sweden)

    Farah Afianti

    2015-08-01

    Full Text Available In the last few years, several studies addressed the problem of data security in Mifare Classic. One of its weaknesses is the low random number quality. This causes SAT solver attacks to have lower complexity. In order to strengthen Crypto-1 against SAT solver attacks, a modification of the feedback function with better cryptographic properties is proposed. It applies a primitive polynomial companion matrix. SAT solvers cannot directly attack the feedback shift register that uses the modified Boolean feedback function, the register has to be split into smaller groups. Experimental testing showed that the amount of memory and CPU time needed were highest when attacking the modified Crypto-1 using the modified feedback function and the original filter function. In addition, another modified Crypto-1, using the modified feedback function and a modified filter function, had the lowest percentage of revealed variables. It can be concluded that the security strength and performance of the modified Crypto-1 using the modified feedback function and the modified filter function are better than those of the original Crypto-1.

  7. Pulmonary hypertension and right heart failure due to severe hypernatremic dehydration.

    Science.gov (United States)

    Chiwane, Saurabh; Ahmed, Tageldin M; Bauerfeld, Christian P; Chauhan, Monika

    2017-07-01

    Neonates are at risk of developing hypernatremic dehydration and its associated complications, such as stroke, dural sinus thrombosis and renal vein thrombosis. Pulmonary hypertension has not been described as a complication of hypernatremia. We report a case of a seven-day-old neonate with severe hypernatremic dehydration who went on to develop pulmonary hypertension and right heart failure needing extracorporeal membrane oxygenation (ECMO). Normal or high anion gap metabolic acidosis commonly accompanies hypernatremic dehydration. The presence of acidosis and/or hypoxia can delay the normal drop in pulmonary vascular resistance (PVR) after birth, causing pulmonary hypertension and right ventricular failure. A high index of suspicion is paramount to diagnose pulmonary hypertension and aggressive correction of the acidosis and hypoxia is needed. In the presence of severe right ventricular failure, ECMO can be used as a bridge to recovery while underlying metabolic derangements are being corrected.

  8. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    Science.gov (United States)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  9. Examining the Relationship between Heart Rate and Problem Behavior: A Case Study of Severe Skin Picking in Prader-Willi Syndrome

    Science.gov (United States)

    Hall, Scott S.; Hammond, Jennifer L.; Hustyi, Kristin M.

    2013-01-01

    Few studies have examined the relationship between heart rate and self-injurious behavior (SIB) shown by individuals with IDD (intellectual and developmental disabilities). In this single-case study, we simultaneously monitored heart rate and activity levels during a functional analysis of severe skin picking behavior exhibited by a young man with…

  10. Assessing risk from intelligent attacks: A perspective on approaches

    International Nuclear Information System (INIS)

    Guikema, Seth D.; Aven, Terje

    2010-01-01

    Assessing the uncertainties in and severity of the consequences of intelligent attacks are fundamentally different from risk assessment for accidental events and other phenomena with inherently random failures. Intelligent attacks against a system involve adaptation on the part of the adversary. The probabilities of the initiating events depend on the risk management actions taken, and they may be more difficult to assess due to high degrees of epistemic uncertainty about the motivations and future actions of adversaries. Several fundamentally different frameworks have been proposed for assessing risk from intelligent attacks. These include basing risk assessment and management on game theoretic modelling of attacker actions, using a probabilistic risk analysis (PRA) approach based on eliciting probabilities of different initiating events from appropriate experts, assessing uncertainties beyond probabilities and expected values, and ignoring the probabilities of the attacks and choosing to protect highest valued targets. In this paper we discuss and compare the fundamental assumptions that underlie each of these approaches. We then suggest a new framework that makes the fundamental assumptions underlying the approaches clear to decision makers and presents them with a suite of results from conditional risk analysis methods. Each of the conditional methods presents the risk from a specified set of fundamental assumptions, allowing the decision maker to see the impacts of these assumptions on the risk management strategies considered and to weight the different conditional results with their assessments of the relative likelihood of the different sets of assumptions.

  11. Vulnerability of water supply systems to cyber-physical attacks

    Science.gov (United States)

    Galelli, Stefano; Taormina, Riccardo; Tippenhauer, Nils; Salomons, Elad; Ostfeld, Avi

    2016-04-01

    The adoption of smart meters, distributed sensor networks and industrial control systems has largely improved the level of service provided by modern water supply systems. Yet, the progressive computerization exposes these critical infrastructures to cyber-physical attacks, which are generally aimed at stealing critical information (cyber-espionage) or causing service disruption (denial-of-service). Recent statistics show that water and power utilities are undergoing frequent attacks - such as the December power outage in Ukraine - , attracting the interest of operators and security agencies. Taking the security of Water Distribution Networks (WDNs) as domain of study, our work seeks to characterize the vulnerability of WDNs to cyber-physical attacks, so as to conceive adequate defense mechanisms. We extend the functionality of EPANET, which models hydraulic and water quality processes in pressurized pipe networks, to include a cyber layer vulnerable to repeated attacks. Simulation results on a medium-scale network show that several hydraulic actuators (valves and pumps, for example) can be easily attacked, causing both service disruption - i.e., water spillage and loss of pressure - and structural damages - e.g., pipes burst. Our work highlights the need for adequate countermeasures, such as attacks detection and reactive control systems.

  12. An efficient algorithm for the detection of exposed and hidden wormhole attack

    International Nuclear Information System (INIS)

    Khan, Z.A.; Rehman, S.U.; Islam, M.H.

    2016-01-01

    MANETs (Mobile Ad Hoc Networks) are slowly integrating into our everyday lives, their most prominent uses are visible in the disaster and war struck areas where physical infrastructure is almost impossible or very hard to build. MANETs like other networks are facing the threat of malicious users and their activities. A number of attacks have been identified but the most severe of them is the wormhole attack which has the ability to succeed even in case of encrypted traffic and secure networks. Once wormhole is launched successfully, the severity increases by the fact that attackers can launch other attacks too. This paper presents a comprehensive algorithm for the detection of exposed as well as hidden wormhole attack while keeping the detection rate to maximum and at the same reducing false alarms. The algorithm does not require any extra hardware, time synchronization or any special type of nodes. The architecture consists of the combination of Routing Table, RTT (Round Trip Time) and RSSI (Received Signal Strength Indicator) for comprehensive detection of wormhole attack. The proposed technique is robust, light weight, has low resource requirements and provides real-time detection against the wormhole attack. Simulation results show that the algorithm is able to provide a higher detection rate, packet delivery ratio, negligible false alarms and is also better in terms of Ease of Implementation, Detection Accuracy/ Speed and processing overhead. (author)

  13. Heart Team therapeutic decision-making and treatment in severe aortic valve stenosis

    DEFF Research Database (Denmark)

    Thyregod, Hans Gustav Hørsted; Holmberg, Fredrik; Gerds, Thomas Alexander

    2016-01-01

    Objectives: After transcatheter aortic valve implantation (TAVI) has been available for high-risk patients with severe aortic valve stenosis (AVS), the decision-making of the Heart Team (HT) has not been examined. Design: All adult patients with severe AVS referred to a large tertiary medical......%), and surgical aortic valve replacement (SAVR) in 392 (81%) of patients. In patients referred to intervention, TAVI compared with SAVR patients were older (OR = 1.17 per year, 95% CI 1.09-1.26; p obesity (OR = 4.69, 1.......51-13.77; p disease (COPD) (OR = 3.66, 1.21-10.75; p = 0.02). MT patients compared with patients referred to any intervention were older, had a higher prevalence of COPD, peripheral arterial disease, previous myocardial infarction, and cerebrovascular disease...

  14. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  15. Positive affect and survival in patients with stable coronary heart disease: findings from the Heart and Soul Study.

    Science.gov (United States)

    Hoen, Petra W; Denollet, Johan; de Jonge, Peter; Whooley, Mary A

    2013-07-01

    Positive affect can improve survival, but the mechanisms responsible for this association are unknown. We sought to evaluate the association between positive affect and mortality in patients with stable coronary heart disease and to determine biological and behavioral factors that might explain this association. The Heart and Soul Study is a prospective cohort study of 1,018 outpatients with stable coronary heart disease. Participants were recruited between September 11, 2000, and December 20, 2002, and were followed up to June 2011. Baseline positive affect was assessed by using the 10-item positive affect subscale of the Positive and Negative Affect Schedule. Cox proportional hazards regression was used to estimate the risk of mortality (primary outcome measure) and cardiovascular events (heart failure, myocardial infarction, stroke, transient ischemic attack) associated with positive affect, adjusting for baseline cardiac disease severity and depression. We also evaluated the extent to which these associations were explained by potential biological and behavioral mediators. A total of 369 patients (36%) died during a mean ± SD follow-up period of 7.1 ± 2.5 years. Positive affect was not significantly associated with cardiovascular events (hazard ratio [HR]: 0.89; 95% CI, 0.79-1.00; P = .06). However, each standard deviation (8.8-point) increase in positive affect score was associated with a 16% decreased risk of all-cause mortality (HR: 0.84; 95% CI, 0.76-0.92; P = .001). After adjustment for cardiac disease severity and depressive symptoms, positive affect remained significantly associated with improved survival (HR: 0.87; 95% CI, 0.78-0.97; P = .01). The association was no longer significant after adjustment for behavioral factors, and particularly physical activity (HR: 0.92; 95% CI, 0.82-1.03; P = .16). Further adjustment for C-reactive protein and omega-3 fatty acids did not result in any meaningful changes (HR: 0.94; 95% CI, 0.84-1.06; P = .31). In this

  16. Social engineering attack examples, templates and scenarios

    CSIR Research Space (South Africa)

    Mouton, Francois

    2016-06-01

    Full Text Available that are representative of real-world examples, whilst still being general enough to encompass several different real-world examples. The proposed social engineering attack templates cover all three types of communication, namely bidirectional communication...

  17. Crony Attack: Strategic Attack’s Silver Bullet

    Science.gov (United States)

    2006-11-01

    physical assets or financial assets. The form of crony attack that most closely resembles classic strategic attack is to deny, degrade, or destroy a money...February 1951. Reprinted in Airpower Studies Coursebook , Air Command and Staff College, Maxwell AFB, AL, 2002, 152–58. Hirsch, Michael. “NATO’s Game of

  18. SYN Flood Attack Detection in Cloud Computing using Support Vector Machine

    Directory of Open Access Journals (Sweden)

    Zerina Mašetić

    2017-11-01

    Full Text Available Cloud computing is a trending technology, as it reduces the cost of running a business. However, many companies are skeptic moving about towards cloud due to the security concerns. Based on the Cloud Security Alliance report, Denial of Service (DoS attacks are among top 12 attacks in the cloud computing. Therefore, it is important to develop a mechanism for detection and prevention of these attacks. The aim of this paper is to evaluate Support Vector Machine (SVM algorithm in creating the model for classification of DoS attacks and normal network behaviors. The study was performed in several phases: a attack simulation, b data collection, cfeature selection, and d classification. The proposedmodel achieved 100% classification accuracy with true positive rate (TPR of 100%. SVM showed outstanding performance in DoS attack detection and proves that it serves as a valuable asset in the network security area.

  19. Massive attack of honeybee on macaws (Ara ararauna and Ara chloropterus) in Brazil - A case report.

    Science.gov (United States)

    Milbradt, Elisane Lenita; Silva, Tarcísio Macedo; Hataka, Alessandre; Teixeira, Carlos Roberto; Okamoto, Adriano Sakai; Andreatti Filho, Raphael Lucio

    2017-09-15

    Three adult birds of the species Ara chloropterus and five of the species Ara ararauna from a conservation breeding facility suffered a massive attack by honeybees. The A. chloropterus birds presented swollen puncture lesions with stingers (mainly in the facial regions without feathers), swelling of the eyelids and subcutaneous tissue, and respiratory distress, and they were treated with intramuscular injections of 1.67 mg/kg of promethazine and 10 mg/kg of hydrocortisone followed by removal of the stingers. Complete remission of the clinical signs occurred 48 hours after start of treatment. The five A. ararauna birds died before they arrived at the veterinary hospital, and the necropsies found stingers in the areas of the face without feathers and the subcutaneous tissue, which were associated with erythema, bruising, and swelling. Food content from the crop was found in the oral cavity and the tracheal lumen, and marked congestion was observed in the heart, liver, spleen, lungs, kidneys, brain, and cerebellum. Among the histopathological findings, significant swelling of the myocytes in the endocardium and vascular dilation with erythroid repletion were observed, and there were multifocal areas of centrilobular necrosis associated with severe congestion and hemorrhaging in the hepatic tissue. Severe acute tubular necrosis and hydropic-vacuolar degeneration were observed in the kidneys. The clinical signs and pathological findings suggest envenomation due to a massive bee attack, the first such report for Psittacidae. Copyright © 2017 Elsevier Ltd. All rights reserved.

  20. [Comparative analysis of phenomenology of paroxysms of atrial fibrillation and panic attacks].

    Science.gov (United States)

    San'kova, T A; Solov'eva, A D; Nedostup, A V

    2004-01-01

    To study phenomenology of attacks of atrial fibrillation (AF) and to compare it with phenomenology of panic attacks for elucidation of pathogenesis of atrial fibrillation and for elaboration of rational therapeutic intervention including those aimed at correction of psychovegetative abnormalities. Patients with nonrheumatic paroxysmal AF (n=105) and 100 patients with panic attacks (n=100). Clinical, cardiological and neurological examination, analysis of patients complaints during attacks of AF, and comparison them with diagnostic criteria for panic attack. It was found that clinical picture of attacks of AF comprised vegetative, emotional and functional neurological phenomena similar to those characteristic for panic attacks. This similarity as well as positive therapeutic effect of clonazepam allowed to propose a novel pathogenic mechanism of AF attacks. Severity of psychovegetative disorders during paroxysm of AF could be evaluated by calculation of psychovegetative iudex: Psychovegetative index should be used for detection of panic attack-like component in clinical picture of AF paroxysm and thus for determination of indications for inclusion of vegetotropic drugs, e. g. clonazepam, in complex preventive therapy.

  1. Matrix metalloproteinases during and outside of migraine attacks without aura

    DEFF Research Database (Denmark)

    Ashina, M.; Tvedskov, J.F.; Thiesen, Kerstin Lipka

    2010-01-01

    Ashina M, Tvedskov JF, Lipka K, Bilello J, Penkowa M & Olesen J. Matrix metalloproteinases during and outside of migraine attacks without aura. Cephalalgia 2009. London. ISSN 0333-1024To test the hypothesis that permeability of the blood-brain barrier (BBB) is altered during migraine attack due...... to enhanced activation of matrix metalloproteinases (MMPs), we investigated MMP-3, MMP-9 and tissue inhibitor of metalloproteases (TIMP)-1 in the external jugular vein during and outside of migraine attacks in 21 patients with migraine without aura. In addition, we measured plasma levels of several other...... of MMP-3 in the external jugular (P = 0.002) and cubital (P = 0.008) vein during attacks compared with outside of attacks. We found no correlation of ictal or interictal MMP-3, MMP-9 and TIMP-1 to migraine duration and frequency analysed in 21 patients (P > 0.05). There was no difference between ictal...

  2. [Acute asthma attacks introduced by anesthesia before nasal endoscopic surgery].

    Science.gov (United States)

    Lü, Xiaofei; Han, Demin; Zhou, Bing; Ding, Bin

    2004-05-01

    In order to pay our attention to the perioperative treatment before nasal endoscopic surgery. Three patients with asthma accompanied chronic sinusitis were analyzed systemically, who had undergone acute attacks of asthma introduced by anesthesia. Anesthetic drugs and instruments can lead to acute attacks of asthma, because sinusitis with asthma means allergic airway inflammation, broncho-hyperreactivity and lower compensatory pulmonary function. Then all of the 3 cases had missed the preoperative treatment. Anesthetic drugs and instruments can lead to acute attacks of asthma. The perioperative treatment before nasal endoscopic surgery is very important for the prevention of the occurrences of this severe complication. Except emergency, the operation should be can celled for avoiding the acute attack of asthma introduced by anesthesia.

  3. Asthma-like attacks terminated by slow pathway ablation

    Directory of Open Access Journals (Sweden)

    Selcuk Ozturk

    2017-01-01

    Full Text Available Asthma is a chronic airway disease in which the pathological mechanisms are reversible airway obstruction, bronchial hyper reactivity, and constriction of the lower airways. Supraventricular tachycardia (SVT is a common arrhythmia which originates above the bundle of His and causing heart rates exceeding 150 beats/min. SVT patients present with palpitation, chest pain, chest discomfort, dyspnea, hyperventilation, and lightheadedness, occasionally. Besides, extraordinary presentations of SVT are available in literature. In this report, we describe a case of a patient presenting with treatment-resistant asthma-like attacks lasting for 20 years whom was suspected SVT as an underlying etiology and treated by slow pathway radiofrequency ablation.

  4. The Diabetic Foot Attack: "'Tis Too Late to Retreat!"

    Science.gov (United States)

    Vas, Prashanth R J; Edmonds, Michael; Kavarthapu, Venu; Rashid, Hisham; Ahluwalia, Raju; Pankhurst, Christian; Papanas, Nikolaos

    2018-03-01

    The "diabetic foot attack" is one of the most devastating presentations of diabetic foot disease, typically presenting as an acutely inflamed foot with rapidly progressive skin and tissue necrosis, at times associated with significant systemic symptoms. Without intervention, it may escalate over hours to limb-threatening proportions and poses a high amputation risk. There are only best practice approaches but no international protocols to guide management. Immediate recognition of a typical infected diabetic foot attack, predominated by severe infection, with prompt surgical intervention to debride all infected tissue alongside broad-spectrum antibiotic therapy is vital to ensure both limb and patient survival. Postoperative access to multidisciplinary and advanced wound care therapies is also necessary. More subtle forms exist: these include the ischemic diabetic foot attack and, possibly, in a contemporary categorization, acute Charcot neuroarthropathy. To emphasize the importance of timely action especially in the infected and ischemic diabetic foot attack, we revisit the concept of "time is tissue" and draw parallels with advances in acute myocardial infarction and stroke care. At the moment, international protocols to guide management of severe diabetic foot presentations do not specifically use the term. However, we believe that it may help increase awareness of the urgent actions required in some situations.

  5. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  6. Valvular Heart Disease in Heart Failure

    Directory of Open Access Journals (Sweden)

    Giuseppe MC Rosano

    2017-01-01

    Full Text Available Structural valvular heart disease may be the cause of heart failure or may worsen the clinical status of patients with heart failure. Heart failure may also develop in patients treated with valve surgery. Patients with heart failure with valvular heart disease are at increased risk of events including sudden cardiac death. Before considering intervention (surgical or percutaneous all patients should receive appropriate medical and device therapy taking into account that vasodilators must be used with caution in patients with severe aortic stenosis. Numerous percutaneous and/or hybrid procedures have been introduced in the past few years and they are changing the management of valvular heart disease. In patients with heart failure and valvular heart disease, either primary or functional, the whole process of decision-making should be staged through a comprehensive evaluation of the risk– benefit ratio of different treatment strategies and should be made by a multidisciplinary ‘heart team’ with a particular expertise in valvular heart disease. The heart team should include heart failure cardiologists, cardiac surgeons/structural valve interventionists, imaging specialists, anaesthetists, geriatricians and intensive care specialists. This article will review recent developments and distill practical guidance in the management of this important heart failure co-morbidity.

  7. Generalised Category Attack—Improving Histogram-Based Attack on JPEG LSB Embedding

    Science.gov (United States)

    Lee, Kwangsoo; Westfeld, Andreas; Lee, Sangjin

    We present a generalised and improved version of the category attack on LSB steganography in JPEG images with straddled embedding path. It detects more reliably low embedding rates and is also less disturbed by double compressed images. The proposed methods are evaluated on several thousand images. The results are compared to both recent blind and specific attacks for JPEG embedding. The proposed attack permits a more reliable detection, although it is based on first order statistics only. Its simple structure makes it very fast.

  8. Difficult cases in heart failure: the challenge of neurocognitive dysfunction in severe heart failure.

    Science.gov (United States)

    Sangha, Sumadeep S; Uber, Patricia A; Park, Myung H; Scott, Robert L; Mehra, Mandeep R

    2002-01-01

    Often ignored, neurocognitive dysfunction in chronic heart failure represents a daunting morbidity progressing to loss of self-reliance. Although the precise mechanisms arbitrating the development of this disorder remain elusive, microembolization and cerebral hypoperfusion are implicated. Other causes of cognitive decline may include prior cardiac surgery, chronic hypertension, sleep disordered breathing, hyperhomocysteinemia, dementia of aging, and more traditional causes such as Alzheimer's disease. The discovery of neurocognitive defects in heart failure must prompt a well-constructed diagnostic evaluation to search for the underlying causes since this process may be at least partially reversible in many cases. Copyright 2002 CHF, Inc

  9. Actual management and prognosis of severe isolated tricuspid regurgitation associated with atrial fibrillation without structural heart disease.

    Science.gov (United States)

    Takahashi, Yusuke; Izumi, Chisato; Miyake, Makoto; Imanaka, Miyako; Kuroda, Maiko; Nishimura, Shunsuke; Yoshikawa, Yusuke; Amano, Masashi; Imamura, Sari; Onishi, Naoaki; Tamaki, Yodo; Enomoto, Soichiro; Tamura, Toshihiro; Kondo, Hirokazu; Kaitani, Kazuaki; Nakagawa, Yoshihisa

    2017-09-15

    Patients with atrial fibrillation (AF) without structural heart diseases can show severe tricuspid regurgitation (TR), especially among aged people. The aim of this study was to clarify the actual management, prognosis, and prognostic factors for severe isolated TR associated with AF without structural heart diseases. We retrospectively investigated actual management in 178 consecutive patients with severe isolated TR associated with AF between 1999 and 2011 in our institution. Prognosis and its predictors were also investigated in 115 patients (68 persistent TR and 47 transient TR) who were followed-up for >1year. During the follow-up period (mean: 5.9years), event free rate from death due to right-sided heart failure (RHF) was 97% at 5years. Persistent TR was associated with higher risk of hospitalization due to RHF than transient TR (log-rank P=0.048) and death due to RHF were all seen in patients with persistent TR who experienced hospitalization due to RHF. Among patients with persistent TR, right ventricular outflow tract dimension >35.3mm, right atrial area >40.3cm 2 , and tenting height >2.1mm were associated with higher risk of hospitalization due to RHF (adjusted hazard ratio: 3.32, 3.83, and 2.89, respectively; P=0.003, 0.002, and 0.009, respectively). The prognosis of severe isolated TR associated with AF was good with a focus on cardiac death. However, the incidence of cardiac death increased among patients who experienced hospitalization due to RHF. Larger right ventricular outflow tract dimension, right atrial area and tenting height were predictors of hospitalization due to RHF. Copyright © 2017 Elsevier B.V. All rights reserved.

  10. Characteristics of asthma attack with long-term management for bronchial asthma.

    Science.gov (United States)

    Kawahara, Noriko; Hasegawa, Shunji; Hashimoto, Kunio; Matsubara, Tomoyo; Ichiyama, Takashi; Furukawa, Susumu

    2009-10-01

    There have been no reports on the evaluation of the usefulness of long-term asthma management based on the Japanese Pediatric Guideline for the Treatment and Management of Bronchial Asthma 2005 (JPGL 2005). The purpose of the present study was to retrospectively investigate the records of 350 patients admitted to Yamaguchi University Hospital who had asthma attacks from January 2006 to June 2008. There were 149 patients who were treated for more than 3 months in accordance with the guideline (long-term management group) and 201 who were not (non-long-term management group). The patients were divided into three age groups: 100 infants, 159 toddlers, and 91 schoolchildren. The onset age of asthma in the long-term management group was earlier than that in the non-long-term management group in toddlers and schoolchildren. The white blood cell counts and C-reactive protein levels were higher in the non-long-term management group in schoolchildren, suggesting the complication of some infections. The severity of asthma in the long-term management group was greater than that in the non-long-term management group among all three age groups. There were no significant differences, however, in the severity of asthma attack at admission between the long-term and non-long-term management groups in the three age groups. Patients who had severe asthma tended to be treated with long-term management, which suggests that long-term asthma management according to JPGL 2005 may reduce the severity of asthma attack at that admission, because the severity of asthma in patients undergoing long-term management correlates with the severity of asthma attack.

  11. Current indications for transplantation: stratification of severe heart failure and shared decision-making.

    Science.gov (United States)

    Vucicevic, Darko; Honoris, Lily; Raia, Federica; Deng, Mario

    2018-01-01

    Heart failure (HF) is a complex clinical syndrome that results from structural or functional cardiovascular disorders causing a mismatch between demand and supply of oxygenated blood and consecutive failure of the body's organs. For those patients with stage D HF, advanced therapies, such as mechanical circulatory support (MCS) or heart transplantation (HTx), are potentially life-saving options. The role of risk stratification of patients with stage D HF in a value-based healthcare framework is to predict which subset might benefit from advanced HF (AdHF) therapies, to improve outcomes related to the individual patient including mortality, morbidity and patient experience as well as to optimize health care delivery system outcomes such as cost-effectiveness. Risk stratification and subsequent outcome prediction as well as therapeutic recommendation-making need to be based on the comparative survival benefit rationale. A robust model needs to (I) have the power to discriminate (i.e., to correctly risk stratify patients); (II) calibrate (i.e., to show agreement between the predicted and observed risk); (III) to be applicable to the general population; and (IV) provide good external validation. The Seattle Heart Failure Model (SHFM) and the Heart Failure Survival Score (HFSS) are two of the most widely utilized scores. However, outcomes for patients with HF are highly variable which make clinical predictions challenging. Despite our clinical expertise and current prediction tools, the best short- and long-term survival for the individual patient, particularly the sickest patient, is not easy to identify because among the most severely ill, elderly and frail patients, most preoperative prediction tools have the tendency to be imprecise in estimating risk. They should be used as a guide in a clinical encounter grounded in a culture of shared decision-making, with the expert healthcare professional team as consultants and the patient as an empowered decision-maker in a

  12. Fatal injection: a survey of modern code injection attack countermeasures

    Directory of Open Access Journals (Sweden)

    Dimitris Mitropoulos

    2017-11-01

    Full Text Available With a code injection attack (CIA an attacker can introduce malicious code into a computer program or system that fails to properly encode data that comes from an untrusted source. A CIA can have different forms depending on the execution context of the application and the location of the programming flaw that leads to the attack. Currently, CIAs are considered one of the most damaging classes of application attacks since they can severely affect an organisation’s infrastructure and cause financial and reputational damage to it. In this paper we examine and categorize the countermeasures developed to detect the various attack forms. In particular, we identify two distinct categories. The first incorporates static program analysis tools used to eliminate flaws that can lead to such attacks during the development of the system. The second involves the use of dynamic detection safeguards that prevent code injection attacks while the system is in production mode. Our analysis is based on nonfunctional characteristics that are considered critical when creating security mechanisms. Such characteristics involve usability, overhead, implementation dependencies, false positives and false negatives. Our categorization and analysis can help both researchers and practitioners either to develop novel approaches, or use the appropriate mechanisms according to their needs.

  13. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited...

  14. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...

  15. Defending networks against denial-of-service attacks

    Science.gov (United States)

    Gelenbe, Erol; Gellman, Michael; Loukas, George

    2004-11-01

    Denial of service attacks, viruses and worms are common tools for malicious adversarial behavior in networks. Experience shows that over the last few years several of these techniques have probably been used by governments to impair the Internet communications of various entities, and we can expect that these and other information warfare tools will be used increasingly as part of hostile behavior either independently, or in conjunction with other forms of attack in conventional or asymmetric warfare, as well as in other forms of malicious behavior. In this paper we concentrate on Distributed Denial of Service Attacks (DDoS) where one or more attackers generate flooding traffic and direct it from multiple sources towards a set of selected nodes or IP addresses in the Internet. We first briefly survey the literature on the subject, and discuss some examples of DDoS incidents. We then present a technique that can be used for DDoS protection based on creating islands of protection around a critical information infrastructure. This technique, that we call the CPN-DoS-DT (Cognitive Packet Networks DoS Defence Technique), creates a self-monitoring sub-network surrounding each critical infrastructure node. CPN-DoS-DT is triggered by a DDoS detection scheme, and generates control traffic from the objects of the DDoS attack to the islands of protection where DDOS packet flows are destroyed before they reach the critical infrastructure. We use mathematical modelling, simulation and experiments on our test-bed to show the positive and negative outcomes that may result from both the attack, and the CPN-DoS-DT protection mechanism, due to imperfect detection and false alarms.

  16. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  17. Iraqi violence, Saudi attack and further bombings

    Energy Technology Data Exchange (ETDEWEB)

    Anon

    2006-03-15

    Iraq moved closer to all-out civil war following an attack on the Imam Ali al-Hadi mosque in Samarra, one of Shi'i Islam's holiest shrines, on 22nd February. In the days that followed, several hundred Iraqis died in inter-communal violence. Attacks on installations close to the Basrah Oil Terminal were reported. Earlier in the month, the main oil storage facility in Kirkuk was bombed, forcing the Northern Oil Company to shut-in the 0.3 mn bpd field. Oil and electricity supplies in southern Iraq were cut by attacks on installations some 40 miles south of Baghdad. Turkey agreed to resume product exports to Iraq after a deal was agreed on repaying Iraqi debts of $1 bn to Turkish suppliers. An official Australian inquiry into illegal payments made under the UN's oil-for-food programme is to investigate allegations involving two Australian-controlled oil firms. (author)

  18. Classifier fusion for VoIP attacks classification

    Science.gov (United States)

    Safarik, Jakub; Rezac, Filip

    2017-05-01

    SIP is one of the most successful protocols in the field of IP telephony communication. It establishes and manages VoIP calls. As the number of SIP implementation rises, we can expect a higher number of attacks on the communication system in the near future. This work aims at malicious SIP traffic classification. A number of various machine learning algorithms have been developed for attack classification. The paper presents a comparison of current research and the use of classifier fusion method leading to a potential decrease in classification error rate. Use of classifier combination makes a more robust solution without difficulties that may affect single algorithms. Different voting schemes, combination rules, and classifiers are discussed to improve the overall performance. All classifiers have been trained on real malicious traffic. The concept of traffic monitoring depends on the network of honeypot nodes. These honeypots run in several networks spread in different locations. Separation of honeypots allows us to gain an independent and trustworthy attack information.

  19. A taxonomy and discussion of software attack technologies

    Science.gov (United States)

    Banks, Sheila B.; Stytz, Martin R.

    2005-03-01

    Software is a complex thing. It is not an engineering artifact that springs forth from a design by simply following software coding rules; creativity and the human element are at the heart of the process. Software development is part science, part art, and part craft. Design, architecture, and coding are equally important activities and in each of these activities, errors may be introduced that lead to security vulnerabilities. Therefore, inevitably, errors enter into the code. Some of these errors are discovered during testing; however, some are not. The best way to find security errors, whether they are introduced as part of the architecture development effort or coding effort, is to automate the security testing process to the maximum extent possible and add this class of tools to the tools available, which aids in the compilation process, testing, test analysis, and software distribution. Recent technological advances, improvements in computer-generated forces (CGFs), and results in research in information assurance and software protection indicate that we can build a semi-intelligent software security testing tool. However, before we can undertake the security testing automation effort, we must understand the scope of the required testing, the security failures that need to be uncovered during testing, and the characteristics of the failures. Therefore, we undertook the research reported in the paper, which is the development of a taxonomy and a discussion of software attacks generated from the point of view of the security tester with the goal of using the taxonomy to guide the development of the knowledge base for the automated security testing tool. The representation for attacks and threat cases yielded by this research captures the strategies, tactics, and other considerations that come into play during the planning and execution of attacks upon application software. The paper is organized as follows. Section one contains an introduction to our research

  20. Blocking of Brute Force Attack

    OpenAIRE

    M.Venkata Krishna Reddy

    2012-01-01

    A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your Web site requires user authentication, you are a good target for a brute-force attack. An attacker can always discover a password through a brute-force attack, but the downside is that it co...

  1. Open-Heart surgery and cerebrovascular accident: retrospective study at King Khalid University Hospital

    International Nuclear Information System (INIS)

    Al-Satli, R.A.; Takrouri, Mohammad S.M.; Al-Daif, A.; Fouda, Mohamed N.; Maher, S.; Al-Khwsky, F.

    2000-01-01

    Stroke after coronary by-pass grafting (CABG) is often disabling. The incidence of ischemic stroke may approach 3% to 5%. Several risk factors have been identified including previous history of stroke, prolonged cardiopulmonary bypass time, and postoperative atrial fibrillation. Objective was to determine the incidence and risk factors of neurological deficit after open heart surgery. Retrospective study was done during the period 1992-1995 at the King Khalid University Hospital, Riyadh, Saudi Arabia. There were 350 patients who were subjected to (CABG), 10 patients (2.8%) found to suffer from cerebrovascular accidents (CVA) following open-heart surgery. In 8 patients, the complaint lasted more than 24 hours (stroke), while 2 patients developed transient ischemic attacks (TIA). Five factors were found to be associated with increased risk of post cardiac surgery CVA. These factors are postoperative atrial fibrillation, carotid bruit, past history of heart failure, past history of CVA and smoking. The authors concluded that it is necessary to start a prospective study to verify the area of improvement with regards to technique, selection of patients and mode of perfusion during cardiopulmonary bypass (CPB) Arabia. (author)

  2. Functional promoter variant in zinc finger protein 202 predicts severe atherosclerosis and ischemic heart disease

    DEFF Research Database (Denmark)

    Frikke-Schmidt, R.; Nordestgaard, Børge; Grande, Peer

    2008-01-01

    Objectives This study was designed to test the hypotheses that single nucleotide polymorphisms ( SNPs), in zinc finger protein 202 ( ZNF202), predict severe atherosclerosis and ischemic heart disease ( IHD). Background ZNF202 is a transcriptional repressor controlling promoter elements in genes...... involved in vascular maintenance and lipid metabolism. Methods We first determined genotype association for 9 ZNF202 SNPs with severe atherosclerosis ( ankle brachial index >0.7 vs. ...,998 controls. Finally, we determined whether g. -660A>G altered transcriptional activity of the ZNF202 promoter in vitro. Results Cross-sectionally, ZNF202 g. -660 GG versus AA homozygosity predicted an odds ratio for severe atherosclerosis of 2.01 ( 95% confidence interval [CI]: 1.34 to 3.01). Prospectively...

  3. Attack tree analysis for insider threats on the IoT using isabelle

    DEFF Research Database (Denmark)

    Kammüller, Florian; Nurse, Jason R. C.; Probst, Christian W.

    2016-01-01

    The Internet-of-Things (IoT) aims at integrating small devices around humans. The threat from human insiders in "regular" organisations is real; in a fully-connected world of the IoT, organisations face a substantially more severe security challenge due to unexpected access possibilities and info....... On the classified IoT attack examples, we show how this logical approach can be used to make the models more precise and to analyse the previously identified Insider IoT attacks using Isabelle attack trees....

  4. Survival of the relocated population of the U. S. after a nuclear attack. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Haaland, C.M.; Chester, C.V.; Wigner, E.P.

    1976-06-01

    The feasibility of continued survival after a hypothetical nuclear attack is evaluated for people relocated from high-risk areas during the crisis period before the attack. The attack consists of 6559 MT, of which 5951 MT are ground bursts on military, industrial, and urban targets. Relocated people are assumed to be adequately protected from fallout radiation by shelters of various kinds. The major problems in the postattack situation will be the control of exposure to fallout radiation, and prevention of severe food shortages to several tens of millions of people.

  5. Solidarity under Attack

    DEFF Research Database (Denmark)

    Meret, Susi; Goffredo, Sergio

    2017-01-01

    https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack......https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack...

  6. DAILY CHANGES OF CENTRAL HEMODYNAMICS IN PATIENTS WITH CHRONIC HEART FAILURE WITH NIGHT-TIME DYSPNOEA ATTACK

    Directory of Open Access Journals (Sweden)

    S. A. Dovgolis

    2006-01-01

    Full Text Available Aim. To study daily changes of central hemodynamics (CHD in patients with chronic heart failure (CHF and the effects of therapy. Materials and methods. 22 patients with ischemic heart disease and CHF of III-IV functional class (FC by NYHA, age 60,5±10,5 were observed. Patients were suffering from night-time dyspnoea attacks and had pulmonary artery occlusion pressure (PAOP 15-20 mm Hg. CHD was monitored invasively before the treatment and after 4 weeks of CHF treatment. Results. According to the cardiac index (CI at admission patients were split into two groups. 9 patients of group-I had CI ≤2,15 l\\min\\m2, and 13 patients of group-II had CI >2,15 l\\min\\m2. In patients of group-I CI increased in 4 weeks of treatment. The treatment caused considerable clinical improvement in all patients. The CHD indexes also improved. Initially evening-night-time peaks of PAOP (р≤0,002, systolic (SBP (р≤0,003, diastolic (DBP (р=0,002 and average (BPa (р=0,0007 blood pressure (BP as well as double multiplication (DM (р≤0,008 were registered in patients of group-I. At the end of treatment only evening-night increase in DBP (р=0,002 and BPa (р≤0,006 were noted. In patients of group-II after 4 weeks of treatment CI decreased or didn’t change. Towards 28-th day of treatment 10 patients had clinical improvements. Only one patient’s FC NYHA increased. At the end of treatment the normalization of CHD was registered totally in group. Initially evening-night-time peaks of PAOP (р≤0,002, SBP (р≤0, 0001, CI (р=0,057 and DM (р=0,084 were registered in patients of group-II. At the end of treatment evening-night-time peaks of PAOP (р≤0,015, SBP (р≤0,044, CI (р≤0,005 and DM (р≤0,044 still remained. Besides, evening-night-time peaks of cardiac output (р≤0,01 and systolic index (р≤0, 06 have added. Conclusion. In patients with CHF with initial CI ≤2,15 l\\min\\m2 treatment results in the normalization of CHD and its daily

  7. Exercise tolerance in asymptomatic patients with moderate-severe valvular heart disease and preserved ejection fraction.

    Science.gov (United States)

    Olaf, Schulz; Debora, Brala; Ricarda, Bensch; Gunnar, Berghöfer; Jochen, Krämer; Schimke, Ingolf; Halle, Martin; Jaffe, Allan

    2012-12-20

    For asymptomatic patients with moderate-severe valvular heart disease, in whom symptoms may be obscured, objective exercise tolerance measures are warranted for decisions concerning physical activities and surgical treatment. We compared 61 patients (39 with aortic stenosis, 22 with aortic or mitral regurgitation) to 23 controls without valvular heart disease but with indications for stress testing. All participants underwent cardiopulmonary function testing and dobutamine stress echocardiography. Blood was drawn before as well as after bicycle stress to assess high-sensitivity cardiac troponin T (hscTnT). Patients who underwent surgery were re-evaluated 1.5 ±0.9 years after the operation. Conventional bicycle test following guideline criteria revealed a pathologic result in 26% of the patients, whereas spiroergometry showed an objectively reduced exercise tolerance in 59%, reaching a prognostically relevant feature in 39%. Stress echocardiography detected a reduced systolic reserve in 33% and elevated filling pressures in 62%. These abnormalities were significantly less present in the control group (4, 17, 9, 9, 4% respectively, p valvular heart disease beyond stress-test criteria recommended in recent guidelines. High-sensitivity cardiac troponin I may be of additional value. Results of these tests presage post-operative function.

  8. Dolichoectasia and Small Vessel Disease in Young Patients With Transient Ischemic Attack and Stroke.

    Science.gov (United States)

    Thijs, Vincent; Grittner, Ulrike; Fazekas, Franz; McCabe, Dominick J H; Giese, Anne-Katrin; Kessler, Christof; Martus, Peter; Norrving, Bo; Ringelstein, Erich Bernd; Schmidt, Reinhold; Tanislav, Christian; Putaala, Jukka; Tatlisumak, Turgut; von Sarnowski, Bettina; Rolfs, Arndt; Enzinger, Christian

    2017-09-01

    We evaluated whether basilar dolichoectasia is associated with markers of cerebral small vessel disease in younger transient ischemic attack and ischemic stroke patients. We used data from the SIFAP1 study (Stroke in Young Fabry Patients), a large prospective, hospital-based, screening study for Fabry disease in young (ischemic attack/stroke patients in whom detailed clinical data and brain MRI were obtained, and stroke subtyping with TOAST classification (Trial of ORG 10172 in Acute Stroke Treatment) was performed. Dolichoectasia was found in 508 of 3850 (13.2%) of patients. Dolichoectasia was associated with older age (odds ratio per decade, 1.26; 95% confidence interval, 1.09-1.44), male sex (odds ratio, 1.96; 95% confidence interval, 1.59-2.42), and hypertension (odds ratio, 1.39; 95% confidence interval, 1.13-1.70). Dolichoectasia was more common in patients with small infarctions (33.9% versus 29.8% for acute lesions, P =0.065; 29.1% versus 16.5% for old lesions, P ischemic attack and ischemic stroke. URL: http://www.clinicaltrials.gov. Unique identifier: NCT00414583. © 2017 American Heart Association, Inc.

  9. Randomised trial of low-dose amiodarone in severe congestive heart failure. Grupo de Estudio de la Sobrevida en la Insuficiencia Cardiaca en Argentina (GESICA)

    Science.gov (United States)

    Doval, H C; Nul, D R; Grancelli, H O; Perrone, S V; Bortman, G R; Curiel, R

    1994-08-20

    In severe heart failure many deaths are sudden and are presumed to be due to ventricular arrhythmias. The GESICA trial evaluated the effect of low-dose amiodarone on two-year mortality in patients with severe heart failure. Our prospective multicentre trial included 516 patients on optimal standard treatment for heart failure. Patients were randomised to 300 mg/day amiodarone (260) or to standard treatment (256). Intention-to-treat analysis showed 87 deaths in the amiodarone group (33.5%) compared with 106 in the control group (41.4%) (risk reduction 28%; 95% CI 4%-45%; log rank test p = 0.024). There were reductions in both sudden death (risk reduction 27%; p = 0.16) and death due to progressive heart failure (risk reduction 23%; p = 0.16). Fewer patients in the amiodarone group died or were admitted to hospital due to worsening heart failure (119 versus 149 in the control group; risk reduction 31%; 95% CI 13-46%; p = 0.0024). The decrease in mortality and hospital admission was present in all subgroups examined and independent of the presence of non-sustained ventricular tachycardia. Side-effects were reported in 17 patients (6.1%); amiodarone was withdrawn in 12. Low-dose amiodarone proved to be an effective and reliable treatment, reducing mortality and hospital admission in patients with severe heart failure independently of the presence of complex ventricular arrhythmias.

  10. Illness severity, trait anxiety, cognitive impairment and heart rate variability in bipolar disorder.

    Science.gov (United States)

    Levy, Boaz

    2014-12-30

    Numerous studies have documented a significant association between symptom severity and cognitive functioning in bipolar disorder (BD). These findings advanced speculations about a potential link between the physiological stress associated with illness severity and cognitive dysfunction. To explore this hypothesis, the current study employed heart rate variability (HRV) as a physiological measure that is sensitive to the effects of chronic stress, and a scale of trait anxiety for assessing a psychological condition that is correlated with hyper sympathetic arousal. Analyses indicated that BD patients with High Illness Severity reported more symptoms of trait-anxiety (i.e., State Trait Anxiety Inventory), performed more poorly on a computerized neuropsychological battery (i.e., CNS Vital Signs), and exhibited a more constricted HRV profile (i.e., lower SDNN with elevated LF/HF ratio) than patients with Low Illness Severity. Illness severity was determined by a history of psychosis, illness duration, and number of mood episodes. A third group of healthy controls (n=22) performed better on the neuropsychological battery and exhibited a healthier HRV profile than the BD groups. This study provides preliminary evidence that illness severity and cognitive impairment in BD may be associated with state anxiety and neuro-cardiac alterations that are sensitive to physiological stress. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  11. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  12. Depletion-of-Battery Attack: Specificity, Modelling and Analysis.

    Science.gov (United States)

    Shakhov, Vladimir; Koo, Insoo

    2018-06-06

    The emerging Internet of Things (IoT) has great potential; however, the societal costs of the IoT can outweigh its benefits. To unlock IoT potential, there needs to be improvement in the security of IoT applications. There are several standardization initiatives for sensor networks, which eventually converge with the Internet of Things. As sensor-based applications are deployed, security emerges as an essential requirement. One of the critical issues of wireless sensor technology is limited sensor resources, including sensor batteries. This creates a vulnerability to battery-exhausting attacks. Rapid exhaustion of sensor battery power is not only explained by intrusions, but can also be due to random failure of embedded sensor protocols. Thus, most wireless sensor applications, without tools to defend against rash battery exhausting, would be unable to function during prescribed times. In this paper, we consider a special type of threat, in which the harm is malicious depletion of sensor battery power. In contrast to the traditional denial-of-service attack, quality of service under the considered attack is not necessarily degraded. Moreover, the quality of service can increase up to the moment of the sensor set crashes. We argue that this is a distinguishing type of attack. Hence, the application of a traditional defense mechanism against this threat is not always possible. Therefore, effective methods should be developed to counter the threat. We first discuss the feasibility of rash depletion of battery power. Next, we propose a model for evaluation of energy consumption when under attack. Finally, a technique to counter the attack is discussed.

  13. Rebound Attack on the Full LANE Compression Function

    DEFF Research Database (Denmark)

    Matusiewicz, Krystian; Naya-Plasencia, Maria; Nikolic, Ivica

    2009-01-01

    In this work, we apply the rebound attack to the AES based SHA-3 candidate Lane. The hash function Lane uses a permutation based compression function, consisting of a linear message expansion and 6 parallel lanes. In the rebound attack on Lane, we apply several new techniques to construct...... a collision for the full compression function of Lane-256 and Lane-512. Using a relatively sparse truncated differential path, we are able to solve for a valid message expansion and colliding lanes independently. Additionally, we are able to apply the inbound phase more than once by exploiting the degrees...

  14. Identifying and tracking attacks on networks: C3I displays and related technologies

    Science.gov (United States)

    Manes, Gavin W.; Dawkins, J.; Shenoi, Sujeet; Hale, John C.

    2003-09-01

    Converged network security is extremely challenging for several reasons; expanded system and technology perimeters, unexpected feature interaction, and complex interfaces all conspire to provide hackers with greater opportunities for compromising large networks. Preventive security services and architectures are essential, but in and of themselves do not eliminate all threat of compromise. Attack management systems mitigate this residual risk by facilitating incident detection, analysis and response. There are a wealth of attack detection and response tools for IP networks, but a dearth of such tools for wireless and public telephone networks. Moreover, methodologies and formalisms have yet to be identified that can yield a common model for vulnerabilities and attacks in converged networks. A comprehensive attack management system must coordinate detection tools for converged networks, derive fully-integrated attack and network models, perform vulnerability and multi-stage attack analysis, support large-scale attack visualization, and orchestrate strategic responses to cyber attacks that cross network boundaries. We present an architecture that embodies these principles for attack management. The attack management system described engages a suite of detection tools for various networking domains, feeding real-time attack data to a comprehensive modeling, analysis and visualization subsystem. The resulting early warning system not only provides network administrators with a heads-up cockpit display of their entire network, it also supports guided response and predictive capabilities for multi-stage attacks in converged networks.

  15. Finding Multi-step Attacks in Computer Networks using Heuristic Search and Mobile Ambients

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.

    2009-01-01

    An important aspect of IT security governance is the proactive and continuous identification of possible attacks in computer networks. This is complicated due to the complexity and size of networks, and due to the fact that usually network attacks are performed in several steps. This thesis proposes

  16. Clinical usefulness of 123I-MIBG myocardial scintigraphy as a marker of the severity and prognosis of congestive heart failure

    International Nuclear Information System (INIS)

    Shiga, Koji

    1999-01-01

    To evaluate the clinical usefulness of 123 I-MIBG myocardial scintigraphy in patients with congestive heart failure. Myocardial dynamic imaging was performed immediately after 123 I-MIBG administration at 1 frame/sec for 500 sec in 52 patients with or without congestive heart failure. The %uptake/ROI, dynamic heart to mediastinum uptake ratio (H/M) and dynamic washout rate (WR) were calculated from their time activity curves to assess the relationship between the NYHA functional class and these values. In 52 other patients with heart failure, the initial and delayed MIBG anterior planar images were obtained, and H/M in delayed images and WR between initial and delayed images were measured. The patients were followed up for 31.8±16.8 months, and their survival rates were compared among three groups, H/M 123 I-MIBG myocardial scintigraphy is very useful to diagnose the severity and prognosis in patients with congestive heart failure. (K.H.)

  17. Heart failure severity, inappropriate ICD therapy, and novel ICD programming: a MADIT-RIT substudy.

    Science.gov (United States)

    Daimee, Usama A; Vermilye, Katherine; Rosero, Spencer; Schuger, Claudio D; Daubert, James P; Zareba, Wojciech; McNitt, Scott; Polonsky, Bronislava; Moss, Arthur J; Kutyifa, Valentina

    2017-12-01

    The effects of heart failure (HF) severity on risk of inappropriate implantable cardioverter-defibrillator (ICD) therapy have not been thoroughly investigated. We aimed to study the association between HF severity and inappropriate ICD therapy in MADIT-RIT. MADIT-RIT randomized 1,500 patients to three ICD programming arms: conventional (Arm A), high-rate cut-off (Arm B: ≥200 beats/min), and delayed therapy (Arm C: 60-second delay for ≥170 beats/min). We evaluated the association between New York Heart Association (NYHA) class III (n = 256) versus class I-II (n = 251) and inappropriate ICD therapy in Arm A patients with ICD-only and cardiac resynchronization therapy with defibrillator (CRT-D). We additionally assessed benefit of novel ICD programming in Arms B and C versus Arm A by NYHA classification. In Arm A, the risk of inappropriate therapy was significantly higher in those with NYHA III versus NYHA I-II for both ICD (hazard ratio [HR] = 2.55, confidence interval [CI]: 1.51-4.30, P programming significantly reduced inappropriate therapy in patients with both NYHA III (Arm B vs Arm A: HR = 0.08, P programming with high-rate cut-off or delayed detection reduces inappropriate ICD therapies in both mild and moderate HF. © 2017 Wiley Periodicals, Inc.

  18. Association of Tricuspid Regurgitation and Severity of Mitral Stenosis in Patients with Rheumatic Heart Disease

    International Nuclear Information System (INIS)

    Ahmed, R.; Kazmi, N.; Naz, F.; Malik, S.; Gillani, S.

    2016-01-01

    Background: Rheumatic heart disease is a common ailment in Pakistan and Mitral stenosis is its flag bearer Severity of mitral stenosis is the key factor in deciding for mitral valve surgery. Methods: This case series study was conducted at Ayub Teaching Hospital .Cases of Rheumatic heart disease with mitral stenosis were diagnosed clinically. 2D echocardiography was used to find severity of mitral stenosis. Data was entered into SPSS-17.0 and results were recorded and analysed. Pearsons two tailed correlation was used to find the correlation between presence of tricuspid regurgitation in patients with severe mitral stenosis, p was <0.05. Results: A total 35 patients with pure mitral stenosis were included in study, out of which 8 were male and 27 were females. Mean age in males was 34.5±15.85 years while in females it was 31±8 years. Twenty-two out of 35 (62.86 percent) patients had tricuspid regurgitation while 13 out 35 (37.14 percent) had no tricuspid regurgitation. Mean (MVA) mitral valve area in patients with tricuspid regurgitation was 0.84±0.3 cm/sup 2/ while mean (MVA) mitral valve area in patients without tricuspid regurgitation was 1.83±0.7 cm/sup 2/. Mean left atrial (L.A) size was 45.23±1.5mm/sup 2/ in patients with tricuspid regurgitation, while it was 44.13±6.14mm/sup 2/ in patients without tricuspid regurgitation. Mean RSVP was 57.5mmHg in patients with tricuspid regurgitation while RSVP could not be calculated in patients without tricuspid regurgitation. Conclusions: It was concluded that tricuspid regurgitation was strongly associated with severe mitral stenosis as almost all patients with severe mitral stenosis had tricuspid regurgitation and none of the patients with mild mitral stenosis had tricuspid regurgitation. (author)

  19. Playing Attack and Defense with Trusted Storage

    DEFF Research Database (Denmark)

    Gonzalez, Javier; Bonnet, Philippe; Bouganim, Luc

    2014-01-01

    It is often convenient to assume in a data management platform that one or several computing devices are trusted, specially when the goal is to provide privacy guarantees over personal data. But what does it take for a computing device to be trusted? More specifically, how can a personal device...... provide trusted storage? This is the question we tackle in this demonstration. We describe how secure devices, equipped with a trusted execution environment, differ from general purpose devices. We illustrate with our demonstration scenario, that it is much more difficult to attack a storage service...... running on a secure device, than to attack the same service running on a general purpose device....

  20. Whispering through DDoS attack

    OpenAIRE

    Miralem Mehic; Jiri Slachta; Miroslav Voznak

    2016-01-01

    Denial of service (DoS) attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS) attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes o...

  1. Estimating Longitudinal Risks and Benefits From Cardiovascular Preventive Therapies Among Medicare Patients: The Million Hearts Longitudinal ASCVD Risk Assessment Tool: A Special Report From the American Heart Association and American College of Cardiology.

    Science.gov (United States)

    Lloyd-Jones, Donald M; Huffman, Mark D; Karmali, Kunal N; Sanghavi, Darshak M; Wright, Janet S; Pelser, Colleen; Gulati, Martha; Masoudi, Frederick A; Goff, David C

    2017-03-28

    The Million Hearts Initiative has a goal of preventing 1 million heart attacks and strokes-the leading causes of mortality-through several public health and healthcare strategies by 2017. The American Heart Association and American College of Cardiology support the program. The Cardiovascular Risk Reduction Model was developed by Million Hearts and the Center for Medicare & Medicaid Services as a strategy to assess a value-based payment approach toward reduction in 10-year predicted risk of atherosclerotic cardiovascular disease (ASCVD) by implementing cardiovascular preventive strategies to manage the "ABCS" (aspirin therapy in appropriate patients, blood pressure control, cholesterol management, and smoking cessation). The purpose of this special report is to describe the development and intended use of the Million Hearts Longitudinal ASCVD Risk Assessment Tool. The Million Hearts Tool reinforces and builds on the "2013 ACC/AHA Guideline on the Assessment of Cardiovascular Risk" by allowing clinicians to estimate baseline and updated 10-year ASCVD risk estimates for primary prevention patients adhering to the appropriate ABCS over time, alone or in combination. The tool provides updated risk estimates based on evidence from high-quality systematic reviews and meta-analyses of the ABCS therapies. This novel approach to personalized estimation of benefits from risk-reducing therapies in primary prevention may help target therapies to those in whom they will provide the greatest benefit, and serves as the basis for a Center for Medicare & Medicaid Services program designed to evaluate the Million Hearts Cardiovascular Risk Reduction Model. Copyright © 2017 American Heart Association, Inc., and the American College of Cardiology Foundation. Published by Elsevier Inc. All rights reserved.

  2. Investigating Effect of Olfactory Stimulation by Vanilla on the Rate of Apnea Attacks in Neonates with Apnea of Prematurity: A Randomized Clinical Trial

    Directory of Open Access Journals (Sweden)

    Sakineh Yaghoubi

    2017-12-01

    Full Text Available Background Apnea of prematurity (AOP is a developmental disorder that affects the premature newborns frequently. One of the new non-drug methods for controlling apnea attacks is olfactory stimulation. The aim of this study was to determine the effect of olfactory stimulation by vanilla on the rate of apnea attacks in neonates with AOP. Materials and Methods: This study is a single-blind randomized clinical trial study. The study samples included a total of 40 premature neonates with AOP who were admitted to the neonatal Intensive care unit (NICU of Shahid Sadoughi hospital in Yazd, Iran, in 2016 and were assigned randomly in experimental (n=20, and control (n=20 groups. The experimental group was exposed to cotton impregnated with 2ml of vanillin extractfor 24 hours. The number of apnea attacks, heart rate, and arterial oxygen saturation (SaO2 level were measured before, during and after intervention for three consecutive days. Data analysis was performed using statistical analysis in SPSS version 22.0 software. Results: The results showed that there was no significant difference between the two groups in terms of mean number of apnea attacks (p>0.05. However, there was a significant difference between in the experimental group on the first day (2.84 ± 1.25, and second day (1.63 ± 1.01 in terms of the mean number of attacks. Also, there was a significant difference between the mean heart rate and SaO2 level in both the experimental and control groups (p

  3. Short-term effect of severe exposure to methylmercury on atherosclerotic heart disease and hypertension mortality in Minamata.

    Science.gov (United States)

    Inoue, Sachiko; Yorifuji, Takashi; Tsuda, Toshihide; Doi, Hiroyuki

    2012-02-15

    Recent studies suggest potential adverse effects of methylmercury exposure on myocardial infarction and hypertension, although the evidence is still limited. We thus evaluated this association using age-standardized mortality ratios (ASMRs) in Minamata, where severe methylmercury poisoning had occurred. We obtained mortality data from annual vital statistics and demographic statistics from census. We then compared mortality of atherosclerotic heart disease including degenerative heart disease and hypertension in Minamata-city with those in Kumamoto Prefecture, which includes Minamata city, as a control. We estimated ASMRs and 95% confidence intervals (CIs) during the period from 1953 to 1970. ASMRs of atherosclerotic heart disease were continuously decreased during the period from 1953 to 1967. In contrast, the ASMR of hypertension was significantly elevated during the period from 1963 to 1967 (SMR=1.38, CI; 1.06-1.80); but they decreased later. Although dilution is present in this ecological study, our study supports the notion that methylmercury exposure induces hypertension. Copyright © 2011 Elsevier B.V. All rights reserved.

  4. Summary of the clinical use of the Symbion total artificial heart: a registry report.

    Science.gov (United States)

    Johnson, K E; Prieto, M; Joyce, L D; Pritzker, M; Emery, R W

    1992-01-01

    Several models of total artificial hearts have been used for transient or permanent circulatory support in patients with decompensation. The most successful and widely used device, however, has been the Symbion total artificial heart. From Dec. 12, 1982, to Jan. 1, 1991, 180 Symbion total artificial hearts were implanted in 176 patients in 28 centers. Five patients received a Symbion total artificial heart as a permanent circulatory support device, whereas 171 patients received the device as a bridge to heart transplantation. Of the 175 bridge devices (171 patients) 141 were Symbion J7-70 hearts and 34 were Symbion J7-100 hearts. Four patients received two total artificial hearts, the second one after the failure of a transplanted heart because of either rejection (two patients) or donor heart failure (2 patients). Most of the recipients were males (152). The age was 42 +/- 12 years (mean +/- SD) with a weight of 74 +/- 14 kg. The most common indications for implantation included deterioration while awaiting heart transplant (36%) and acute cardiogenic shock (32%). The cause of heart disease was primarily ischemic (52%) and idiopathic (35%) cardiomyopathy. Duration of implantation ranged from 0 to 603 days (mean 25 +/- 64 days). One hundred three (60%) patients had the device less than 2 weeks, 37 (22%) between 2 to 4 weeks and 31 (18%) more than 4 weeks. Complications during implantation included infection (37%), thromboembolic events (stroke 7%, transient ischemic attack 4%), kidney failure requiring dialysis (20%), bleeding requiring intervention (26%), and device malfunction (4%). Of the 171 patients, 118 (69%) underwent orthotopic heart transplantation. Actuarial survival for all patients with implants was 62% for 30 days and 42% for 1 year, and for patients with transplants was 72% for 30 days and 57% for 1 year. The main causes of death were sepsis (33%), multiorgan failure (21%), and posttransplant rejection (10%). The results indicate a relative success of

  5. New Trends in Heart Regeneration: A Review

    Directory of Open Access Journals (Sweden)

    Kochegarov A

    2016-11-01

    Full Text Available In this review, we focus on new approaches that could lead to the regeneration of heart muscle and the restoration of cardiac muscle function derived from newly-formed cardiomyocytes. Various strategies for the production of cardiomyocytes from embryonic stem cells, induced pluripotent stem cells, adult bone marrow stem cells and cardiac spheres from human heart biopsies are described. Pathological conditions which lead to atherosclerosis and coronary artery disease often are followed by myocardial infarction causing myocardial cell death. After cell death, there is very little self-regeneration of the cardiac muscle tissue, which is replaced by non-contractile connective tissue, thus weakening the ability of the heart muscle to contract fully and leading to heart failure. A number of experimental research approaches to stimulate heart muscle regeneration with the hope of regaining normal or near normal heart function in the damaged heart muscle have been attempted. Some of these very interesting studies have used a variety of stem cell types in combination with potential cardiogenic differentiation factors in an attempt to promote differentiation of new cardiac muscle for possible future use in the clinical treatment of patients who have suffered heart muscle damage from acute myocardial infarctions or related cardiovascular diseases. Although progress has been made in recent years relative to promoting the differentiation of cardiac muscle tissue from non-muscle cells, much work remains to be done for this technology to be used routinely in translational clinical medicine to treat patients with damaged heart muscle tissue and return such individuals to pre-heart-attack activity levels.

  6. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks. In prac......In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks....... In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...

  7. Hereditary angioedema attacks resolve faster and are shorter after early icatibant treatment.

    Directory of Open Access Journals (Sweden)

    Marcus Maurer

    Full Text Available BACKGROUND: Attacks of hereditary angioedema (HAE are unpredictable and, if affecting the upper airway, can be lethal. Icatibant is used for physician- or patient self-administered symptomatic treatment of HAE attacks in adults. Its mode of action includes disruption of the bradykinin pathway via blockade of the bradykinin B(2 receptor. Early treatment is believed to shorten attack duration and prevent severe outcomes; however, evidence to support these benefits is lacking. OBJECTIVE: To examine the impact of timing of icatibant administration on the duration and resolution of HAE type I and II attacks. METHODS: The Icatibant Outcome Survey is an international, prospective, observational study for patients treated with icatibant. Data on timings and outcomes of icatibant treatment for HAE attacks were collected between July 2009-February 2012. A mixed-model of repeated measures was performed for 426 attacks in 136 HAE type I and II patients. RESULTS: Attack duration was significantly shorter in patients treated <1 hour of attack onset compared with those treated ≥ 1 hour (6.1 hours versus 16.8 hours [p<0.001]. Similar significant effects were observed for <2 hours versus ≥ 2 hours (7.2 hours versus 20.2 hours [p<0.001] and <5 hours versus ≥ 5 hours (8.0 hours versus 23.5 hours [p<0.001]. Treatment within 1 hour of attack onset also significantly reduced time to attack resolution (5.8 hours versus 8.8 hours [p<0.05]. Self-administrators were more likely to treat early and experience shorter attacks than those treated by a healthcare professional. CONCLUSION: Early blockade of the bradykinin B(2 receptor with icatibant, particularly within the first hour of attack onset, significantly reduced attack duration and time to attack resolution.

  8. Intravenous lysine clonixinate for the acute treatment of severe migraine attacks: a double-blind, randomized, placebo-controlled study.

    Science.gov (United States)

    Krymchantowski, Abouch Valenty; Silva, Marcus Tulius T

    2003-09-01

    Several nonsteroidal anti-inflammatory drugs (NSAIDs) have been shown to be effective in the treatment of migraine. However, few commercially available NSAIDs can be administered IV. Lysine clonixinate (LC), an NSAID derived from nicotinic acid, has been proved effective in various algesic syndromes (eg, renal colic, muscular pain, nerve compression, odontalgia). The oral formulation of LC has been shown to be effective in the treatment of migraine of moderate severity. The aim of this study was to assess the efficacy and tolerability of the IV formulation of LC in the treatment of severe migraine. This double-blind, randomized, placebo-controlled, prospective study enrolled patients with severe migraine (without aura) as defined by the criteria of the International Headache Society. When patients presented to a neurology hospital with an outpatient headache unit (Instituto de Neurologia Deolindo Couto, Rio de Janeiro, Brazil) with a severe migraine attack that had lasted <4 hours, they were randomized to 1 of 2 groups (IV placebo [25 mL of 0.9% saline] or IV LC [21 mL of 0.9% saline plus 4 mL of LC 200 mg]). Headache intensity and adverse effects (AEs) were assessed before (0 minute) and 30, 60, and 90 minutes after study drug administration. Rescue medication was available 2 hours after study drug administration, and its use was compared between groups. Thirty-two patients (23 women, 9 men; mean [SD] age, 32 [2] years; range, 18-58 years) entered the study. Twenty-nine patients (21 women, 8 men; mean [SD] age, 32 [2] years; range, 18-56 years) completed the study. Three patients (all in the placebo group) did not complete the study (1 patient was unable to rate the pain severity after drug administration and 2 patients refused IV drug administration). Among study completers, 17 patients received LC and 12 placebo. At 30 minutes, 1 patient (8.3%) in the placebo group and 5 patients (29.4%) in the LC group were pain free; the between-group difference was not

  9. Intravenous lysine clonixinate for the acute treatment of severe migraine attacks: a double-blind, randomized, placebo-controlled study☆

    Science.gov (United States)

    Krymchantowski, Abouch Valenty; Silva, Marcus Tulius T

    2003-01-01

    Background Several nonsteroidal anti-inflammatory drugs (NSAIDs) have been shown to be effective in the treatment of migraine. However, few commercially available NSAIDs can be administered IV. Lysine clonixinate (LC), an NSAID derived from nicotinic acid, has been proved effective in various algesic syndromes (eg, renal colic, muscular pain, nerve compression, odontalgia). The oral formulation of LC has been shown to be effective in the treatment of migraine of moderate severity. Objective The aim of this study was to assess the efficacy and tolerability of the IV formulation of LC in the treatment of severe migraine. Methods This double-blind, randomized, placebo-controlled, prospective study enrolled patients with severe migraine (without aura) as defined by the criteria of the International Headache Society. When patients presented to a neurology hospital with an outpatient headache unit (Instituto de Neurologia Deolindo Couto, Rio de Janeiro, Brazil) with a severe migraine attack that had lasted <4 hours, they were randomized to 1 of 2 groups (IV placebo [25 mL of 0.9% saline] or IV LC [21 mL of 0.9% saline plus 4 mL of LC 200 mg]). Headache intensity and adverse effects (AEs) were assessed before (0 minute) and 30, 60, and 90 minutes after study drug administration. Rescue medication was available 2 hours after study drug administration, and its use was compared between groups. Results Thirty-two patients (23 women, 9 men; mean [SD] age, 32 [2] years; range, 18–58 years) entered the study. Twenty-nine patients (21 women, 8 men; mean [SD] age, 32 [2] years; range, 18–56 years) completed the study. Three patients (all in the placebo group) did not complete the study (1 patient was unable to rate the pain severity after drug administration and 2 patients refused IV drug administration). Among study completers, 17 patients received LC and 12 placebo. At 30 minutes, 1 patient (8.3%) in the placebo group and 5 patients (29.4%) in the LC group were pain free

  10. Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks

    Directory of Open Access Journals (Sweden)

    Apostolos P. Fournaris

    2017-07-01

    Full Text Available Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT and Operational Technology (OT systems that are meant to operate harmonically under a security critical framework. As security IT countermeasures are gradually been installed in many embedded system nodes, thus securing them from many well-know cyber attacks there is a lurking danger that is still overlooked. Apart from the software vulnerabilities that typical malicious programs use, there are some very interesting hardware vulnerabilities that can be exploited in order to mount devastating software or hardware attacks (typically undetected by software countermeasures capable of fully compromising any embedded system device. Real-time microarchitecture attacks such as the cache side-channel attacks are such case but also the newly discovered Rowhammer fault injection attack that can be mounted even remotely to gain full access to a device DRAM (Dynamic Random Access Memory. Under the light of the above dangers that are focused on the device hardware structure, in this paper, an overview of this attack field is provided including attacks, threat directives and countermeasures. The goal of this paper is not to exhaustively overview attacks and countermeasures but rather to survey the various, possible, existing attack directions and highlight the security risks that they can pose to security critical embedded systems as well as indicate their strength on compromising the Quality of Service (QoS such systems are designed to provide.

  11. Parent reports of health-related quality of life and heart failure severity score independently predict outcome in children with dilated cardiomyopathy.

    Science.gov (United States)

    den Boer, Susanna L; Baart, Sara J; van der Meulen, Marijke H; van Iperen, Gabriëlle G; Backx, Ad P; Ten Harkel, Arend D; Rammeloo, Lukas A; du Marchie Sarvaas, Gideon J; Tanke, Ronald B; Helbing, Willem A; Utens, Elisabeth M; Dalinghaus, Michiel

    2017-08-01

    Dilated cardiomyopathy in children causes heart failure and has a poor prognosis. Health-related quality of life in this patient group is unknown. Moreover, results may provide detailed information of parents' sense of their child's functioning. We hypothesised that health-related quality of life, as rated by parents, and the paediatric heart failure score, as assessed by physicians, have both predictive value on outcome. Methods and results In this prospective study, health-related quality of life was assessed by parent reports: the Infant Toddler Quality of Life questionnaire (0-4 years) or Child Health Questionnaire-Parent Form 50 (4-18 years) at 3-6-month intervals. We included 90 children (median age 3.8 years, interquartile range (IQR) 0.9-12.3) whose parents completed 515 questionnaires. At the same visit, physicians completed the New York University Pediatric Heart Failure Index. Compared with Dutch normative data, quality of life was severely impaired at diagnosis (0-4 years: 7/10 subscales and 4-18 years: 8/11 subscales) and ⩾1 year after diagnosis (3/10 and 6/11 subscales). Older children were more impaired (pFailure Index were independently predictive of the risk of death and heart transplantation (hazard ratio 1.24 per 10% decrease of predicted, 95% confidence interval (CI) 1.06-1.47 and hazard ratio 1.38 per unit, 95% CI 1.19-1.61, respectively). Physical impairment rated by parents and heart failure severity assessed by physicians independently predicted the risk of death or heart transplantation in children with dilated cardiomyopathy.

  12. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  13. Neuroradiological study of transient ischemic attack

    Energy Technology Data Exchange (ETDEWEB)

    Takusagawa, Yoshihiko; Fujiwara, Yasuhiro; Ichiki, Ken; Suga, Takeshi; Nishigaki, Shinichi

    1986-08-01

    Fifty-two patients with carotid TIAs and thirteen patients with vertebrobasilar TIAs were investigated by angiography and computed tomography. TIA was diagnosed by clinical symptoms in accordance with the criteria for TIA of the Joint Committee for Stroke Facilities in the U.S.A. (1974). The 65 patients with TIAs included 49 males and 16 females with average age of 63.5 years old at the initial episode of TIA. As for the diseases associated with TIA, hypertension (51 %), diabetes mellitus (15 %) and ischemic heart diseases (11 %) were the major disorders. Atrial fibrillation was observed in 2 cases. Intervals from last TIA attack to angiography were less than 7 days in 22 cases, 8 -- 30 days in 19 cases, 1 -- 4 monthes in 14 cases and more than 4 monthes in 10 cases, respectively. The cases in which angiography was done earlier after attacks displayed more abnormal findings. In 52 patients with caroted TIAs the artherosclerotic change of extracranial portion of the internal carotid artery was found in 14 cases (27 %), that of intracranial portion of the artery in 11 cases (21 %) and both lesions in 2 cases (4 %). On the other hand, in 13 patients with vertebrobasilar TIAs, this change was observed in 4 cases at the extracranival potion and in 1 case at the intracranial potion (siphon) of the internal carotid artery. Abnormal CT findings were found in 29 of 65 patients, namely 9 had ventricular dilatation and brain atrophy, 6 had cerebral infarction which was not associated with associated with symptoms of TIA. In carotid TIAs, Cerebral infarction was associated with symptoms of TIAs in 15 cases, namely 10 had a small low density area in the basal ganglia near the internal capsule and 5 had a low density area in the cortical or subcortical region. All of these 5 cases had cerebral embolism, which recanalized after attacks. (J.P.N.).

  14. Neuroradiological study of transient ischemic attack

    International Nuclear Information System (INIS)

    Takusagawa, Yoshihiko; Fujiwara, Yasuhiro; Ichiki, Ken; Suga, Takeshi; Nishigaki, Shinichi

    1986-01-01

    Fifty-two patients with carotid TIAs and thirteen patients with vertebrobasilar TIAs were investigated by angiography and computed tomography. TIA was diagnosed by clinical symptoms in accordance with the criteria for TIA of the Joint Committee for Stroke Facilities in the U.S.A. (1974). The 65 patients with TIAs included 49 males and 16 females with average age of 63.5 years old at the initial episode of TIA. As for the diseases associated with TIA, hypertension (51 %), diabetes mellitus (15 %) and ischemic heart diseases (11 %) were the major disorders. Atrial fibrillation was observed in 2 cases. Intervals from last TIA attack to angiography were less than 7 days in 22 cases, 8 ∼ 30 days in 19 cases, 1 ∼ 4 monthes in 14 cases and more than 4 monthes in 10 cases, respectively. The cases in which angiography was done earlier after attacks displayed more abnormal findings. In 52 patients with caroted TIAs the artherosclerotic change of extracranial portion of the internal carotid artery was found in 14 cases (27 %), that of intracranial portion of the artery in 11 cases (21 %) and both lesions in 2 cases (4 %). On the other hand, in 13 patients with vertebrobasilar TIAs, this change was observed in 4 cases at the extracranival potion and in 1 case at the intracranial potion (siphon) of the internal carotid artery. Abnormal CT findings were found in 29 of 65 patients, namely 9 had ventricular dilatation and brain atrophy, 6 had cerebral infarction which was not associated with associated with symptoms of TIA. In carotid TIAs, Cerebral infarction was associated with symptoms of TIAs in 15 cases, namely 10 had a small low density area in the basal ganglia near the internal capsule and 5 had a low density area in the cortical or subcortical region. All of these 5 cases had cerebral embolism, which recanalized after attacks. (J.P.N.)

  15. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  16. Tachycardia-Induced Right Heart Failure and Severe Tricuspid Regurgitation That Improved with Medication.

    Science.gov (United States)

    Yang, Young Ae; Yang, Dong Heon; Kim, Hong Nyun; Kwon, Sang Hoon; Jang, Se Young; Bae, Myung Hwan; Lee, Jang Hoon; Chae, Shung Chull

    2015-12-01

    Secondary tricuspid regurgitation (TR) primarily develops due to left heart failure or primary pulmonary diseases. Tricuspid annular dilation, which is commonly caused by right ventricular volume and pressure overload followed by right ventricle dilation, is believed to be the main mechanism underlying secondary TR. It is reported that once the tricuspid annulus is dilated, its size cannot spontaneously return to normal, and it may continue to dilate. These reports also suggest the use of an aggressive surgical approach for secondary TR. In the present report, we describe a case of tachycardia-induced severe TR that was completely resolved without the need for surgery.

  17. Invisible Trojan-horse attack.

    Science.gov (United States)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin; Makarov, Vadim

    2017-08-21

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Ac´ın-Ribordy-Gisin (SARG04) QKD protocol at 1924 nm versus that at 1536 nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N. Jain et al., New J. Phys. 16, 123030 (2014). However at 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.

  18. Association between congenital heart defects and severe infections in children with Down syndrome.

    Science.gov (United States)

    Faria, Paula Foresti; Nicolau, Juliana Augusta Zeglin; Melek, Marina Zaponi; de Oliveira, Nanci de Santa Palmieri; Bermudez, Beatriz Elizabeth Bagatin Veleda; Nisihara, Renato Mitsunori

    2014-01-01

    There is a high prevalence of congenital heart disease (CHD) in Down syndrome (DS) patients. Children with DS and CHD also present greater susceptibility to pulmonary infections than those without CHD. To investigate the prevalence and types of CHD and their association with severe infections in children with DS in southern Brazil seen in a reference outpatient clinic. Children aged between six and 48 months with a diagnosis of DS were included consecutively in the period May 2001 to May 2012, and the presence of CHD and severe infections (pneumonia and sepsis) was investigated, classified and analyzed. A total of 127 patients were included, of whom 89 (70.1%) had some type of CHD, 33 (37.7%) of them requiring surgical correction. Severe infections (pneumonia and sepsis) were seen in 23.6% and 5.5%, respectively. Of the cases of pneumonia, 70% had associated CHD (p=0.001) and of those with sepsis, 85% presented CHD (p=0.001). Our study showed a high prevalence of CHD and its association with severe infections in children with DS seen in southern Brazil. Copyright © 2013 Sociedade Portuguesa de Cardiologia. Published by Elsevier España. All rights reserved.

  19. Risk Due to Radiological Terror Attacks With Natural Radionuclides

    International Nuclear Information System (INIS)

    Friedrich, Steinhaeusler; Lyudmila, Zaitseva; Stan, Rydell

    2008-01-01

    The naturally occurring radionuclides radium (Ra-226) and polonium (Po-210) have the potential to be used for criminal acts. Analysis of international incident data contained in the Database on Nuclear Smuggling, Theft and Orphan Radiation Sources (CSTO), operated at the University of Salzburg, shows that several acts of murder and terrorism with natural radionuclides have already been carried out in Europe and Russia. Five different modes of attack (T) are possible: (1) Covert irradiation of an individual in order to deliver a high individual dose; (2) Covert irradiation of a group of persons delivering a large collective dose; (3) Contamination of food or drink; (4) Generation of radioactive aerosols or solutions; (5) Combination of Ra-226 with conventional explosives (Dirty Bomb).This paper assesses the risk (R) of such criminal acts in terms of: (a) Probability of terrorist motivation deploying a certain attack mode T; (b) Probability of success by the terrorists for the selected attack mode T; (c) Primary damage consequence (C) to the attacked target (activity, dose); (d) Secondary damage consequence (C') to the attacked target (psychological and socio-economic effects); (e) Probability that the consequences (C, C') cannot be brought under control, resulting in a failure to manage successfully the emergency situation due to logistical and/or technical deficits in implementing adequate countermeasures. Extensive computer modelling is used to determine the potential impact of such a criminal attack on directly affected victims and on the environment

  20. Risk Due to Radiological Terror Attacks With Natural Radionuclides

    Science.gov (United States)

    Friedrich, Steinhäusler; Stan, Rydell; Lyudmila, Zaitseva

    2008-08-01

    The naturally occurring radionuclides radium (Ra-226) and polonium (Po-210) have the potential to be used for criminal acts. Analysis of international incident data contained in the Database on Nuclear Smuggling, Theft and Orphan Radiation Sources (CSTO), operated at the University of Salzburg, shows that several acts of murder and terrorism with natural radionuclides have already been carried out in Europe and Russia. Five different modes of attack (T) are possible: (1) Covert irradiation of an individual in order to deliver a high individual dose; (2) Covert irradiation of a group of persons delivering a large collective dose; (3) Contamination of food or drink; (4) Generation of radioactive aerosols or solutions; (5) Combination of Ra-226 with conventional explosives (Dirty Bomb). This paper assesses the risk (R) of such criminal acts in terms of: (a) Probability of terrorist motivation deploying a certain attack mode T; (b) Probability of success by the terrorists for the selected attack mode T; (c) Primary damage consequence (C) to the attacked target (activity, dose); (d) Secondary damage consequence (C') to the attacked target (psychological and socio-economic effects); (e) Probability that the consequences (C, C') cannot be brought under control, resulting in a failure to manage successfully the emergency situation due to logistical and/or technical deficits in implementing adequate countermeasures. Extensive computer modelling is used to determine the potential impact of such a criminal attack on directly affected victims and on the environment.

  1. Incidence and impact of dog attacks on guide dogs in the UK.

    Science.gov (United States)

    Brooks, A; Moxon, R; England, G C W

    2010-06-19

    In a retrospective survey, researchers identified 100 incidents of attacks on guide dogs by other dogs. These were reviewed in order to determine the number, severity and impact on the handler and dog, and the characteristics of the aggressors and victims. During the study period there were more than three attacks reported each month, with 61 per cent of the attacks being upon dogs that were in harness and working with an owner or trainer. The majority of the dogs that were attacked were male (62 per cent), and the breeds that were over-represented (relative to their prevalence in the general guide dog population) were the labrador and the golden retriever x flat-coated retriever crossbreed. Most of the attacks occurred in public places between 09.00 and 15.00 and the majority (61 per cent) of the attacking dogs were off the lead at the time of the attack. Thirty-eight per cent of the attacking dogs were of bull breeds, which were over-represented among attackers compared with the proportion of this breed type in the general dog population. Veterinary attention was sought after 41 per cent of the attacks, and in 19 per cent of instances there was injury to the handler or to a member of the public. The attacks were reported to have affected the working performance and behaviour of the victim dog in 45 per cent of the instances, and two dogs had to be subsequently withdrawn from working as guide dogs.

  2. Detection of attack-targeted scans from the Apache HTTP Server access logs

    Directory of Open Access Journals (Sweden)

    Merve Baş Seyyar

    2018-01-01

    Full Text Available A web application could be visited for different purposes. It is possible for a web site to be visited by a regular user as a normal (natural visit, to be viewed by crawlers, bots, spiders, etc. for indexing purposes, lastly to be exploratory scanned by malicious users prior to an attack. An attack targeted web scan can be viewed as a phase of a potential attack and can lead to more attack detection as compared to traditional detection methods. In this work, we propose a method to detect attack-oriented scans and to distinguish them from other types of visits. In this context, we use access log files of Apache (or ISS web servers and try to determine attack situations through examination of the past data. In addition to web scan detections, we insert a rule set to detect SQL Injection and XSS attacks. Our approach has been applied on sample data sets and results have been analyzed in terms of performance measures to compare our method and other commonly used detection techniques. Furthermore, various tests have been made on log samples from real systems. Lastly, several suggestions about further development have been also discussed.

  3. Real-Time Detection of Application-Layer DDoS Attack Using Time Series Analysis

    Directory of Open Access Journals (Sweden)

    Tongguang Ni

    2013-01-01

    Full Text Available Distributed denial of service (DDoS attacks are one of the major threats to the current Internet, and application-layer DDoS attacks utilizing legitimate HTTP requests to overwhelm victim resources are more undetectable. Consequently, neither intrusion detection systems (IDS nor victim server can detect malicious packets. In this paper, a novel approach to detect application-layer DDoS attack is proposed based on entropy of HTTP GET requests per source IP address (HRPI. By approximating the adaptive autoregressive (AAR model, the HRPI time series is transformed into a multidimensional vector series. Then, a trained support vector machine (SVM classifier is applied to identify the attacks. The experiments with several databases are performed and results show that this approach can detect application-layer DDoS attacks effectively.

  4. Formal reconstruction of attack scenarios in mobile ad hoc and sensor networks

    Directory of Open Access Journals (Sweden)

    Rekhis Slim

    2011-01-01

    Full Text Available Abstract Several techniques of theoretical digital investigation are presented in the literature but most of them are unsuitable to cope with attacks in wireless networks, especially in Mobile Ad hoc and Sensor Networks (MASNets. In this article, we propose a formal approach for digital investigation of security attacks in wireless networks. We provide a model for describing attack scenarios in a wireless environment, and system and network evidence generated consequently. The use of formal approaches is motivated by the need to avoid ad hoc generation of results that impedes the accuracy of analysis and integrity of investigation. We develop an inference system that integrates the two types of evidence, handles incompleteness and duplication of information in them, and allows possible and provable actions and attack scenarios to be generated. To illustrate the proposal, we consider a case study dealing with the investigation of a remote buffer overflow attack.

  5. Depression and coronary artery disease -real heart attack

    International Nuclear Information System (INIS)

    Farooqi, S.; Ahmed, B.

    2001-01-01

    Both depression and ischaemic heart disease are said to become the leading causes of morbidity and mortality in developing countries during the next two decades. The relationship between these two disorders has long been speculated but only recently addressed scientifically. A Medline search was conducted to obtain the articles that address the association between depressive disorders and coronary artery disease (CAD). Most studies following large cohorts over a period ranging from 4.5 to 27 years have shown that depression is associated with a significantly high risk of developing CAD. These studies also show that patients who have depression following myocardial infarction hat poorer prognosis on major cardiac end points like reoccurrence of myocardial infarction and death as compared to the non-depressed group. The psychosocial variables associated with depression like social isolation, acute and chronic stressful life events are also associated with increased risk of developing CAD. The mechanisms underlying this association between depression and CAD are unknown at present. The effectiveness of psychosocial interventions in reducing this increased risks have been demonstrated while the trials assessing the efficacy and safety of anti depressed drugs are underway. The implications of these finding are discussed in the context of developing countries. (author)

  6. Case report of a fatal bear attack documented by forensic wildlife genetics.

    Science.gov (United States)

    Frosch, Christiane; Dutsov, Aleksandar; Georgiev, Georgi; Nowak, Carsten

    2011-08-01

    Fatal bear attacks on humans are extremely rare across Europe. Here we report a fatal bear attack on a man in Bulgaria. We used microsatellite analysis for bear individualization based on hair samples found near the man's corpse. The genetic profile of the killing bear was compared to that of a bear shot three days later near the killing scene. Our results show that the wrong bear has been shot. Shortly after our results were reported a second person was attacked by a bear nearby. This case documents the importance of forensic DNA analysis following severe wildlife attacks in order to improve wildlife management actions in regions were direct human-bear conflicts are likely to happen. Copyright © 2011 Elsevier Ireland Ltd. All rights reserved.

  7. Whispering through DDoS attack

    Directory of Open Access Journals (Sweden)

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  8. Depletion-of-Battery Attack: Specificity, Modelling and Analysis

    Directory of Open Access Journals (Sweden)

    Vladimir Shakhov

    2018-06-01

    Full Text Available The emerging Internet of Things (IoT has great potential; however, the societal costs of the IoT can outweigh its benefits. To unlock IoT potential, there needs to be improvement in the security of IoT applications. There are several standardization initiatives for sensor networks, which eventually converge with the Internet of Things. As sensor-based applications are deployed, security emerges as an essential requirement. One of the critical issues of wireless sensor technology is limited sensor resources, including sensor batteries. This creates a vulnerability to battery-exhausting attacks. Rapid exhaustion of sensor battery power is not only explained by intrusions, but can also be due to random failure of embedded sensor protocols. Thus, most wireless sensor applications, without tools to defend against rash battery exhausting, would be unable to function during prescribed times. In this paper, we consider a special type of threat, in which the harm is malicious depletion of sensor battery power. In contrast to the traditional denial-of-service attack, quality of service under the considered attack is not necessarily degraded. Moreover, the quality of service can increase up to the moment of the sensor set crashes. We argue that this is a distinguishing type of attack. Hence, the application of a traditional defense mechanism against this threat is not always possible. Therefore, effective methods should be developed to counter the threat. We first discuss the feasibility of rash depletion of battery power. Next, we propose a model for evaluation of energy consumption when under attack. Finally, a technique to counter the attack is discussed.

  9. The tell-tale: what do heart rate; skin temperature and skin conductance reveal about emotions of people with severe and profound intellectual disabilities?

    Science.gov (United States)

    Vos, Pieter; De Cock, Paul; Munde, Vera; Petry, Katja; Van Den Noortgate, Wim; Maes, Bea

    2012-01-01

    Identifying emotions in people with severe and profound intellectual disabilities is a difficult challenge. Since self-reports are not available, behaviour is the most used source of information. Given the limitations and caveats associated with using behaviour as the sole source of information about their emotions, it is important to supplement behavioural information with information from another source. As it is accepted that emotions consist of language, behaviour and physiology, in this article we investigated if physiology could give information about the emotions of people with severe and profound intellectual disabilities. To this aim we tested hypotheses derived from the motivational model of Bradley, Codispoti, Cuthbert, and Lang (2001) about the relation between heart rate and the valence of emotions and between heart rate, skin conductance and skin temperature and behavioural expressions of emotions of people with severe and profound intellectual disability. We presented 27 participants with 4 staff-selected negative and 4 staff-selected positive stimuli. The situations were videotaped and their heart rate, skin conductance and skin temperature was measured. Each behaviour of the participant was coded using the observational method developed by Petry and Maes (2006). As hypothesized, we found a lower heart rate when participants were presented with negative stimuli than when they were presented with positive stimuli in the first 6s of stimuli presentation. Their skin temperature was higher for the expression of low intensity negative emotions compared to the expression of low intensity positive emotions. The results suggest that, as with people without disability, heart rate and skin temperature can give information about the emotions of persons with severe and profound ID. Copyright © 2012 Elsevier Ltd. All rights reserved.

  10. Ischaemia-induced (symptomatic) migraine attacks may be more frequent than migraine-induced ischaemic insults

    DEFF Research Database (Denmark)

    Olesen, Jes; Friberg, L; Olsen, T S

    1993-01-01

    deficits after the very first migraine attack, severe atherosclerosis, risk factors for stroke, high age and no family history of migraine. In these cases the evidence indicates that thromboembolic ischaemia had triggered an attack of migraine with aura (likely symptomatic migraine). Three young females...

  11. Guideline on management of the acute asthma attack in children by Italian Society of Pediatrics.

    Science.gov (United States)

    Indinnimeo, Luciana; Chiappini, Elena; Miraglia Del Giudice, Michele

    2018-04-06

    Acute asthma attack is a frequent condition in children. It is one of the most common reasons for emergency department (ED) visit and hospitalization. Appropriate care is fundamental, considering both the high prevalence of asthma in children, and its life-threatening risks. Italian Society of Pediatrics recently issued a guideline on the management of acute asthma attack in children over age 2, in ambulatory and emergency department settings. The Grading of Recommendations Assessment, Development, and Evaluation (GRADE) methodology was adopted. A literature search was performed using the Cochrane Library and Medline/PubMed databases, retrieving studies in English or Italian and including children over age 2 year. Inhaled ß 2 agonists are the first line drugs for acute asthma attack in children. Ipratropium bromide should be added in moderate/severe attacks. Early use of systemic steroids is associated with reduced risk of ED visits and hospitalization. High doses of inhaled steroids should not replace systemic steroids. Aminophylline use should be avoided in mild/moderate attacks. Weak evidence supports its use in life-threatening attacks. Epinephrine should not be used in the treatment of acute asthma for its lower cost / benefit ratio, compared to β 2 agonists. Intravenous magnesium solphate could be used in children with severe attacks and/or forced expiratory volume1 (FEV1) lower than 60% predicted, unresponsive to initial inhaled therapy. Heliox could be administered in life-threatening attacks. Leukotriene receptor antagonists are not recommended. This Guideline is expected to be a useful resource in managing acute asthma attacks in children over age 2.

  12. [Therapy costs of adult patients admitting to emergency unit of a university hospital with asthma acute attack].

    Science.gov (United States)

    Serinken, Mustafa; Dursunoğlu, Neşe; Cimrin, Arif H

    2009-01-01

    In the present study, hospital costs of patients who admitted to the emergency department with asthma attack and several variables that could effect this cost were analyzed and data were collected in order to reduce economical burden of that disease was aimed. Between September 2005 and February 2007 patients with acute asthma attack, admitted to Pamukkale University Hospital Emergency Department were retrospectively evaluated. Totally 108 patients who met the inclusion criteria admitted to the emergency department with asthma acute attack. Of those 97 were women (89.8%). Forty mild, 51 moderate, 15 severe and 2 life-threatening attacks were detected. Severe and life-threatening attacks were more frequent in patients graduated from primary school compared with the other groups. Mean therapy costs of the patients who were hospitalized and treated in the emergency department were 836.60 +/- 324.30 TL (Turkish Lira) and 170.66 +/- 86.71 TL respectively. Treatment procedures consisted of 45.8% of and 38.5% hospital costs for patients treated in the emergency department and for patients hospitalized respectively. There was a statistically significant difference in the comparison of costs according to the attack severity (p= 0.0001). Education level of the patients had a significant effect on hospital costs (p= 0.025). Comorbidities were found a significant increasing factor of treatment costs (p= 0.017). There were no effects of sex, age, medical insurance or duration of asthma disease on the hospital costs. The relation between low-education level, living in the rural area and admissions with severe attacks of asthma to emergency department show the importance of treatment success with patient compliance. Positive and negative factors effecting disease control should be detected by evaluating larger populations to reduce economical burden of asthma.

  13. Heart transplantation in adults with congenital heart disease.

    Science.gov (United States)

    Houyel, Lucile; To-Dumortier, Ngoc-Tram; Lepers, Yannick; Petit, Jérôme; Roussin, Régine; Ly, Mohamed; Lebret, Emmanuel; Fadel, Elie; Hörer, Jürgen; Hascoët, Sébastien

    2017-05-01

    With the advances in congenital cardiac surgery and postoperative care, an increasing number of children with complex congenital heart disease now reach adulthood. There are already more adults than children living with a congenital heart defect, including patients with complex congenital heart defects. Among these adults with congenital heart disease, a significant number will develop ventricular dysfunction over time. Heart failure accounts for 26-42% of deaths in adults with congenital heart defects. Heart transplantation, or heart-lung transplantation in Eisenmenger syndrome, then becomes the ultimate therapeutic possibility for these patients. This population is deemed to be at high risk of mortality after heart transplantation, although their long-term survival is similar to that of patients transplanted for other reasons. Indeed, heart transplantation in adults with congenital heart disease is often challenging, because of several potential problems: complex cardiac and vascular anatomy, multiple previous palliative and corrective surgeries, and effects on other organs (kidney, liver, lungs) of long-standing cardiac dysfunction or cyanosis, with frequent elevation of pulmonary vascular resistance. In this review, we focus on the specific problems relating to heart and heart-lung transplantation in this population, revisit the indications/contraindications, and update the long-term outcomes. Copyright © 2017. Published by Elsevier Masson SAS.

  14. Hydrogen attack evaluation of boiler tube using ultrasonic wave

    International Nuclear Information System (INIS)

    Won, Soon Ho; Hyun, Yang Ki; Lee, Jong O; Cho, Kyung Shik; Lee, Jae Do

    2001-01-01

    The presence of hydrogen in industrial plants is a source of damage. Hydrogen attack is one such form of degradation and often causing large tube ruptures that necessitate an immediate shutdown. Hydrogen attack may reduce the fracture toughness as well as the strength of steels. This reduction is caused partially by the presence of cavities and microcracks at the grain boundaries. In the past several techniques have been used with limited results. This paper describes the application of an ultrasonic velocity, attenuation and backscatter techniques for detecting the presence of hydrogen damage in utility boiler tubes. Ultrasonic tests showed a decrease in wave velocity and an increase in attenuation. Such results demonstrate the potential for ultrasonic nondestructive testing to quantify damage. Based on this study, recommendations are that both velocity and attenuation be used to detect hydrogen attack in steels.

  15. Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress

    National Research Council Canada - National Science Library

    Wilson, Clay

    2005-01-01

    Many international terrorist groups now actively use computers and the Internet to communicate, and several may develop or acquire the necessary technical skills to direct a coordinated attack against...

  16. Migraine Trainers as Models: the effectiveness of Lay trainerswith migraine for behavioural attack prevention

    NARCIS (Netherlands)

    S.Y.M. Mérelle (Saskia)

    2008-01-01

    textabstractMigraine is a chronic brain disorder, characterized by attacks of severe headache accompanied by nausea, vomiting and sensitivity to light, sound and smell. Attacks can be preceded by premonitory symptoms such as fatigue, muscular stiff ness or negative aff ect. It has been shown that

  17. Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0

    NARCIS (Netherlands)

    Gadyatskaya, Olga; Jhawar, Ravi; Kordy, P.T.; Lounis, Karim; Mauw, Sjouke; Trujillo-Rasua, Rolando

    2016-01-01

    In this tool demonstration paper we present the ADTool2.0: an open-source software tool for design, manipulation and analysis of attack trees. The tool supports ranking of attack scenarios based on quantitative attributes entered by the user; it is scriptable; and it incorporates attack trees with

  18. SiC: An Agent Based Architecture for Preventing and Detecting Attacks to Ubiquitous Databases

    OpenAIRE

    Pinzón, Cristian; de Paz Santana, Yanira; Bajo Pérez, Javier; Abraham, Ajith P.; Corchado Rodríguez, Juan M.

    2009-01-01

    One of the main attacks to ubiquitous databases is the structure query language (SQL) injection attack, which causes severe damages both in the commercial aspect and in the user’s confidence. This chapter proposes the SiC architecture as a solution to the SQL injection attack problem. This is a hierarchical distributed multiagent architecture, which involves an entirely new approach with respect to existing architectures for the prevention and detection of SQL injections. SiC incorporates a k...

  19. Coronary Physiology During Exercise and Vasodilation in the Healthy Heart and in Severe Aortic Stenosis.

    Science.gov (United States)

    Lumley, Matthew; Williams, Rupert; Asrress, Kaleab N; Arri, Satpal; Briceno, Natalia; Ellis, Howard; Rajani, Ronak; Siebes, Maria; Piek, Jan J; Clapp, Brian; Redwood, Simon R; Marber, Michael S; Chambers, John B; Perera, Divaka

    2016-08-16

    Severe aortic stenosis (AS) can manifest as exertional angina even in the presence of unobstructed coronary arteries. The authors describe coronary physiological changes during exercise and hyperemia in the healthy heart and in patients with severe AS. Simultaneous intracoronary pressure and flow velocity recordings were made in unobstructed coronary arteries of 22 patients with severe AS (mean effective orifice area 0.7 cm(2)) and 38 controls, at rest, during supine bicycle exercise, and during hyperemia. Stress echocardiography was performed to estimate myocardial work. Wave intensity analysis was used to quantify waves that accelerate and decelerate coronary blood flow (CBF). Despite a greater myocardial workload in AS patients compared with controls at rest (12,721 vs. 9,707 mm Hg/min(-1); p = 0.003) and during exercise (27,467 vs. 20,841 mm Hg/min(-1); p = 0.02), CBF was similar in both groups. Hyperemic CBF was less in AS compared with controls (2,170 vs. 2,716 cm/min(-1); p = 0.05). Diastolic time fraction was greater in AS compared with controls, but minimum microvascular resistance was similar. With exercise and hyperemia, efficiency of perfusion improved in the healthy heart, demonstrated by an increase in the relative contribution of accelerating waves. By contrast, in AS, perfusion efficiency decreased due to augmentation of early systolic deceleration and an attenuated rise in systolic acceleration waves. Invasive coronary physiological evaluation can be safely performed during exercise and hyperemia in patients with severe aortic stenosis. Ischemia in AS is not related to microvascular disease; rather, it is driven by abnormal cardiac-coronary coupling. Copyright © 2016 American College of Cardiology Foundation. Published by Elsevier Inc. All rights reserved.

  20. The work-averse cyber attacker model : theory and evidence from two million attack signatures

    NARCIS (Netherlands)

    Allodi, L.; Massacci, F.; Williams, J.

    The typical cyber attacker is assumed to be all powerful and to exploit all possible vulnerabilities. In this paper we present, and empirically validate, a novel and more realistic attacker model. The intuition of our model is that an attacker will optimally choose whether to act and weaponize a new

  1. Right heart structural changes are independently associated with exercise capacity in non-severe COPD.

    Directory of Open Access Journals (Sweden)

    Michael J Cuttica

    Full Text Available Pulmonary hypertension (PH occurs frequently and results in functional limitation in advanced COPD. Data regarding the functional consequence of PH in less severe COPD are limited. Whether echocardiographic evidence of right sided heart pathology is associated with functional outcomes in patients with non-severe COPD is unknown.We evaluated pulmonary function, six minute walk distance, and echocardiography in 74 consecutive patients with non-severe COPD. We performed multivariable linear regression to evaluate the association between right heart echocardiographic parameters and six minute walk distance adjusting for lung function, age, sex, race, and BMI.The mean six minute walk distance was 324±106 meters. All subjects had preserved left ventricular (LV systolic function (LV ejection fraction 62.3%±6.1%. 54.1% had evidence of some degree of diastolic dysfunction. 17.6% of subjects had evidence of right ventricular enlargement and 36.5% had right atrial enlargement. In univariate analysis RV wall thickness (β = -68.6; p = 0.002, log right atrial area (β = -297.9; p = 0.004, LV mass index (β = -1.3; p = 0.03, E/E' ratio (β = -5.5; p = 0.02, and degree of diastolic dysfunction (β = -42.8; p = 0.006 were associated with six minute walk distance. After adjustment for co-variables, the associations between right atrial area (log right atrial area β = -349.8; p = 0.003 and right ventricular wall thickness (β = -43.8; p = 0.04 with lower six minute walk distance remained significant independent of forced expiratory volume in one second (FEV1. LV mass index, E/E' ratio, and degree of diastolic dysfunction were not independent predictors of six minute walk distance.In patients with non-severe COPD right sided cardiac structural changes are associated with lower six minute walk distance independent of lung function. These findings may indicate that echocardiographic evidence of pulmonary

  2. Gender-specific heart rate dynamics in severe intrauterine growth-restricted fetuses.

    Science.gov (United States)

    Gonçalves, Hernâni; Bernardes, João; Ayres-de-Campos, Diogo

    2013-06-01

    Management of intrauterine growth restriction (IUGR) remains a major issue in perinatology. The objective of this paper was the assessment of gender-specific fetal heart rate (FHR) dynamics as a diagnostic tool in severe IUGR. FHR was analyzed in the antepartum period in 15 severe IUGR fetuses and 18 controls, matched for gestational age, in relation to fetal gender. Linear and entropy methods, such as mean FHR (mFHR), low (LF), high (HF) and movement frequency (MF), approximate, sample and multiscale entropy. Sensitivities and specificities were estimated using Fisher linear discriminant analysis and the leave-one-out method. Overall, IUGR fetuses presented significantly lower mFHR and entropy compared with controls. However, gender-specific analysis showed that significantly lower mFHR was only evident in IUGR males and lower entropy in IUGR females. In addition, lower LF/(MF+HF) was patent in IUGR females compared with controls, but not in males. Rather high sensitivities and specificities were achieved in the detection of the FHR recordings related with IUGR male fetuses, when gender-specific analysis was performed at gestational ages less than 34 weeks. Severe IUGR fetuses present gender-specific linear and entropy FHR changes, compared with controls, characterized by a significantly lower entropy and sympathetic-vagal balance in females than in males. These findings need to be considered in order to achieve better diagnostic results. Copyright © 2013 Elsevier Ltd. All rights reserved.

  3. Web server attack analyzer

    OpenAIRE

    Mižišin, Michal

    2013-01-01

    Web server attack analyzer - Abstract The goal of this work was to create prototype of analyzer of injection flaws attacks on web server. Proposed solution combines capabilities of web application firewall and web server log analyzer. Analysis is based on configurable signatures defined by regular expressions. This paper begins with summary of web attacks, followed by detection techniques analysis on web servers, description and justification of selected implementation. In the end are charact...

  4. [Anxiety and polymorphism Val66Met of BDNF gene--predictors of depression severity in ischemic heart disease].

    Science.gov (United States)

    Golimbet, V E; Volel', B A; Kopylov, F Iu; Dolzhikov, A V; Korovaitseva, G I; Kasparov, S V; Isaeva, M I

    2015-01-01

    In a framework of search for early predictors of depression in patients with ischemic heart disease (IHD) we studied effect of molecular-genetic factors (polymorphism of brain-derived neirotrophic factor--BDNF), personality traits (anxiety, neuroticism), IHD severity, and psychosocial stressors on manifestations of depression in men with verified diagnosis of IHD. Severity of depression was assessed by Hamilton Depression Rating Scale 21-item (HAMD 21), anxiety and neuroticism were evaluated by the Spielberger State-Trait Anxiety Inventory and "Big Five" questionnaire, respectively. It wa shown that personal anxiety and ValVal genotype of BDNF gene appeared to be predictors of moderate and severe depression.

  5. Chronic heart failure

    OpenAIRE

    Hopper, Ingrid; Easton, Kellie

    2017-01-01

    1. The common symptoms and signs of chronic heart failure are dyspnoea, ankle swelling, raised jugular venous pressure and basal crepitations. Other conditions may be confused with chronic heart failure, including dependent oedema or oedema due to renal or hepatic disease. Shortness of breath may be due to respiratory disease or severe anaemia. Heart failure secondary to lung disease (cor pulmonale) should be distinguished from congestive cardiac failure. Heart failure may also present with l...

  6. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  7. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based......Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identified...... on invalidating policies in the system model by identifying possible sequences of actions that lead to an attack. The generated attacks are precise enough to illustrate the threat, and they are general enough to hide the details of individual steps....

  8. Periodontitis in Chronic Heart Failure.

    Science.gov (United States)

    Fröhlich, Hanna; Herrmann, Kristina; Franke, Jennifer; Karimi, Alamara; Täger, Tobias; Cebola, Rita; Katus, Hugo A; Zugck, Christian; Frankenstein, Lutz

    2016-08-01

    Periodontal disease has been associated with an increased risk of cardiovascular events. The purpose of our study was to investigate whether a correlation between periodontitis and chronic heart failure exists, as well as the nature of the underlying cause. We enrolled 71 patients (mean age, 54 ± 13 yr; 56 men) who had stable chronic heart failure; all underwent complete cardiologic and dental evaluations. The periodontal screening index was used to quantify the degree of periodontal disease. We compared the findings to those in the general population with use of data from the 4th German Dental Health Survey. Gingivitis, moderate periodontitis, and severe periodontitis were present in 17 (24%), 17 (24%), and 37 (52%) patients, respectively. Severe periodontitis was more prevalent among chronic heart failure patients than in the general population. In contrast, moderate periodontitis was more prevalent in the general population (P periodontal disease was not associated with the cause of chronic heart failure or the severity of heart failure symptoms. Six-minute walking distance was the only independent predictor of severe periodontitis. Periodontal disease is highly prevalent in chronic heart failure patients regardless of the cause of heart failure. Prospective trials are warranted to clarify the causal relationship between both diseases.

  9. Valvular Heart Disease.

    Science.gov (United States)

    Mrsic, Zorana; Hopkins, Scott P; Antevil, Jared L; Mullenix, Philip S

    2018-03-01

    This article outlines the diagnosis and management of commonly occurring valvular heart diseases for the primary care provider. Basic understanding of pathologic murmurs is important for appropriate referral. Echocardiography is the gold standard for diagnosis and severity grading. Patients with progressive valvular heart disease should be followed annually by cardiology and imaging should be performed based on the severity of valvular dysfunction. Surgery or intervention is recommended only when symptoms dictate or when changes in left ventricular function occur. Surgery or intervention should be performed after discussion by a heart team, including cardiologists and cardiac surgeons. Published by Elsevier Inc.

  10. PERIOPERATIVE PERIOD FOLLOWING HEART TRANSPLANTATION WITH SEVERE LEFT VENTRICULAR HYPERTROPHY

    Directory of Open Access Journals (Sweden)

    V. N. Poptsov

    2012-01-01

    Full Text Available Use donor hearts with left ventricular hypertrophy (LVH is controversial. This category of heart recipients has increasing risk of early graft failure. We proposed that heart transplantation (HT with LVH ≥1.5 cm may be successful if performed in selective category patients from alternate transplant list. This study included 10 pati- ents (2 female and 8 male at the age 26–62 (44 ± 3, who needed urgent HT. This study showed that recipients with LVH ≥1.5 cm demanded more high and long inotropic support with adrenalin and dopamine, more fre- quent use of levosimendan infusion (in 40% of cases and intraaortic balloon conterpulsation (in 50% of cases. However we didn’t observed any difference in survival rate (90.0% vs 89.0% and ICU time (4.8 ± 0.6 days vs 4.1 ± 0.4 days between HT recipients with and without LVH. Our study showed that HT from donor with LVH ≥1.5 cm may be performed in patients, demanding urgent HT, with acceptable early posttransplant results. 

  11. Study on the clinical significance of determination of serum brain natriuretic peptide (BNP) levels in patients with heart failure

    International Nuclear Information System (INIS)

    Ji Naijun; Mei Yibeng; Fan Bifu; Chen Donghai; Guan Lihua; Gao Meiying; Tong Lijun; Li Fuyuan; Pan Jiongwei

    2004-01-01

    Objective: To study the clinical significance of the changes of serum BNP levels in patients with heart failure (HF). Methods: Serum BNP levels in 88 patients with HF(NYHA II-IV), 20 patients with compensated cardiac function (NYHA I) and 30 controls were determined with RIA. Results: The serum BNP levels in patients with HF (264±63.9 pmol/L) were significantly higher than those in patients with compensated cardiac function (NYHA I, 11.6±4.7 pmol/L, t=2.133, p 0.05). As the cardiac function deteriorated from NYHA II to NYHA IV, the BNP levels increased consecutively with significant differences from each other (F=2.595, p<0.05). BNP levels in patients with acute left heart failure were significantly higher than those in patients with chronic heart failure (t=2.268, p<0.05) and fell promptly at relief of the attack (p<0.05). Conclusion: Determination of serum BNP levels in patients with HF was helpful to the study of the severity and prognosis of the disease

  12. Terrorists and Suicide Attacks

    National Research Council Canada - National Science Library

    Cronin, Audrey K

    2003-01-01

    Suicide attacks by terrorist organizations have become more prevalent globally, and assessing the threat of suicide attacks against the United States and its interests at home and abroad has therefore...

  13. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  14. Treating a patient with lower limb injury from shark attack – a case report

    Directory of Open Access Journals (Sweden)

    Uroš Ahčan

    2014-02-01

    Full Text Available Background: Every year a number of people are attacked by sharks worldwide; however, death as a consequence is quite unusual. In recent years, the number of reported shark attacks worldwide has been around 67 per year with fatalities averaging 5 persons annually. Shark attacks in the Adriatic Sea are very rare.Case report: In 2008, a great white shark attack happened in the Adriatic Sea, in which a man suffered a severe injury to his lower extremity and profuse bleeding that led to haemorrhagic shock.Conclusion: The expeditious intervention at the site of attack and the exemplary cooperation of medical teams in two centres in the neighbouring countries of Croatia and Slovenia has saved the life of the unusually injured patient and resulted in a satisfactory functional outcome.

  15. Attack Trees with Sequential Conjunction

    NARCIS (Netherlands)

    Jhawar, Ravi; Kordy, Barbara; Mauw, Sjouke; Radomirović, Sasa; Trujillo-Rasua, Rolando

    2015-01-01

    We provide the first formal foundation of SAND attack trees which are a popular extension of the well-known attack trees. The SAND at- tack tree formalism increases the expressivity of attack trees by intro- ducing the sequential conjunctive operator SAND. This operator enables the modeling of

  16. Investigating the effect of Network Parameters on Coordinated Cyber Attacks against a Simulated Power Plant

    OpenAIRE

    GENGE BELA; SIATERLIS CHRISTOS

    2011-01-01

    The fact that modern Networked Industrial Control Systems (NICS) depend on Information and Communication Technologies (ICT), is well known. Although many studies have focused on the security of these systems, today we still lack the proper understanding of the effects that cyber attacks have on NICS. In this paper we use our previously developed framework to study the effects of coordinated cyber attacks against NICS. Coordinated attacks rely on several infected hosts to disrupt the ...

  17. Histone methylations in heart development, congenital and adult heart diseases.

    Science.gov (United States)

    Zhang, Qing-Jun; Liu, Zhi-Ping

    2015-01-01

    Heart development comprises myocyte specification, differentiation and cardiac morphogenesis. These processes are regulated by a group of core cardiac transcription factors in a coordinated temporal and spatial manner. Histone methylation is an emerging epigenetic mechanism for regulating gene transcription. Interplay among cardiac transcription factors and histone lysine modifiers plays important role in heart development. Aberrant expression and mutation of the histone lysine modifiers during development and in adult life can cause either embryonic lethality or congenital heart diseases, and influences the response of adult hearts to pathological stresses. In this review, we describe current body of literature on the role of several common histone methylations and their modifying enzymes in heart development, congenital and adult heart diseases.

  18. Management preferences of pediatricians in moderate and severe acute asthma.

    Science.gov (United States)

    Arga, Mustafa; Bakirtas, Arzu; Catal, Ferhat; Derinoz, Oksan; Topal, Erdem; Demirsoy, M Sadik; Turktas, Ipek

    2013-05-01

    To assess and compare management preferences of physicians for moderate and severe acute asthma based on case scenarios and to determine the factors influencing their decisions. A questionnaire based on the Global Initiative on Asthma (GINA) guideline and comprising eight questions on management of acute asthma was delivered to participants of two national pediatric congresses. Management of moderate and severe acute asthma cases was evaluated by two clinical case scenarios for estimation of acute attack severity, initial treatment, treatment after 1h, and discharge recommendations. A uniform answer box comprising the possible choices was provided just below the questions, and respondents were requested to tick the answers they thought was appropriate. Four-hundred and eighteen questionnaires were analyzed. All questions regarding moderate and severe acute asthma case scenarios were answered accurately by 15.8% and 17.0% of physicians, respectively. The initial treatment of moderate and severe cases was known by 100.0% and 78.2% of physicians, respectively. Knowledge of the appropriate plan for treatment after 1h was low both for moderate (45.0%) and severe attacks (35.4%). Discharge recommendations were adequate in 32.5% and 70.8% of physicians for moderate and severe attacks, respectively. Multiple logistic regression analysis revealed that working at a hospital with a continuing medical education program was the only significant predictor of a correct response to all questions regarding severe attacks (p = .04; 95%CI, 1.02-3.21). No predictors were found for information on moderate attacks. Pediatricians have difficulty in planning treatment after 1 hour both for moderate and severe asthma attacks. Postgraduate education programs that target physicians in hospitals without continuing medical education facilities may improve guideline adherence.

  19. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  20. Ethanol accumulation during severe drought may signal tree vulnerability to detection and attack by bark beetles

    Science.gov (United States)

    Rick G. Kelsey; D. Gallego; F.J. Sánchez-Garcia; J.A. Pajares

    2014-01-01

    Tree mortality from temperature-driven drought is occurring in forests around the world, often in conjunction with bark beetle outbreaks when carbon allocation to tree defense declines. Physiological metrics for detecting stressed trees with enhanced vulnerability prior to bark beetle attacks remain elusive. Ethanol, water, monoterpene concentrations, and composition...

  1. Cyber attacks against state estimation in power systems: Vulnerability analysis and protection strategies

    Science.gov (United States)

    Liu, Xuan

    Power grid is one of the most critical infrastructures in a nation and could suffer a variety of cyber attacks. With the development of Smart Grid, false data injection attack has recently attracted wide research interest. This thesis proposes a false data attack model with incomplete network information and develops optimal attack strategies for attacking load measurements and the real-time topology of a power grid. The impacts of false data on the economic and reliable operations of power systems are quantitatively analyzed in this thesis. To mitigate the risk of cyber attacks, a distributed protection strategies are also developed. It has been shown that an attacker can design false data to avoid being detected by the control center if the network information of a power grid is known to the attacker. In practice, however, it is very hard or even impossible for an attacker to obtain all network information of a power grid. In this thesis, we propose a local load redistribution attacking model based on incomplete network information and show that an attacker only needs to obtain the network information of the local attacking region to inject false data into smart meters in the local region without being detected by the state estimator. A heuristic algorithm is developed to determine a feasible attacking region by obtaining reduced network information. This thesis investigates the impacts of false data on the operations of power systems. It has been shown that false data can be designed by an attacker to: 1) mask the real-time topology of a power grid; 2) overload a transmission line; 3) disturb the line outage detection based on PMU data. To mitigate the risk of cyber attacks, this thesis proposes a new protection strategy, which intends to mitigate the damage effects of false data injection attacks by protecting a small set of critical measurements. To further reduce the computation complexity, a mixed integer linear programming approach is also proposed to

  2. Preoperative assessment of congestive liver dysfunction using technetium-99m galactosyl human Serum albumin liver scintigraphy in patients with severe valvular heart disease

    International Nuclear Information System (INIS)

    Nishi, Hiroyuki; Matsumiya, Goro; Takano, Hiroshi; Ichikawa, Hajime; Miyagawa, Shigeru; Sawa, Yoshiki; Takahashi, Toshiki

    2007-01-01

    Severe valvular heart disease is often complicated by congestive liver dysfunction, which greatly compromises the operative results. We evaluated congestive liver dysfunction by a novel approach using technetium-99m galactosyl human serum albumin ( 99m Tc-GSA) with liver scintigraphy. Between 1998 and 2004, we performed scintigraphy accompanied by 99m Tc-GSA in 28 patients who had valvular heart disease with moderate-to-severe tricuspid regurgitation and who showed symptoms of right heart failure. Based on the results, we calculated a receptor index (LHL15) and an index of blood clearance (HH15) and assessed the correlation between these factors and postoperative liver dysfunction, defined as the maximum serum total bilirubin level (max T-bil) as >2.0 mg/dl. Nineteen patients, including four who died in hospital, had postoperative liver dysfunction. The level of HH15 was significantly higher and the level of cholinesterase was significantly lower (P 99m Tc-GSA is a clinically useful predictor of postoperative liver dysfunction in patients with severe valvular disease. (author)

  3. Anger attacks in obsessive compulsive disorder

    Directory of Open Access Journals (Sweden)

    Nitesh Prakash Painuly

    2011-01-01

    Full Text Available Background: Research on anger attacks has been mostly limited to depression, and only a few studies have focused on anger attacks in obsessive compulsive disorder. Materials and Methods: In a cross-sectional study all new obsessive compulsive disorder patients aged 20-60 years attending an outpatient clinic were assessed using the anger attack questionnaire, irritability, depression and anxiety scale (for the direction of the aggressive behavior and quality of life (QOL. Results: The sample consisted of 42 consecutive subjects with obsessive compulsive disorder, out of which 21 (50% had anger attacks. The obsessive compulsive disorder subjects with and without anger attacks did not show significant differences in terms of sociodemographic variables, duration of illness, treatment, and family history. However, subjects with anger attacks had significantly higher prevalence of panic attacks and comorbid depression. Significantly more subjects with anger attacks exhibited aggressive acts toward spouse, parents, children, and other relatives in the form of yelling and threatening to hurt, trying to hurt, and threatening to leave. However, the two groups did not differ significantly in terms of QOL, except for the psychological domain being worse in the subjects with anger attacks. Conclusion: Anger attacks are present in half of the patients with obsessive compulsive disorder, and they correlate with the presence of comorbid depression.

  4. Clinical usefulness of {sup 123}I-MIBG myocardial scintigraphy as a marker of the severity and prognosis of congestive heart failure

    Energy Technology Data Exchange (ETDEWEB)

    Shiga, Koji [Kyoto Prefectural Univ. of Medicine (Japan)

    1999-04-01

    To evaluate the clinical usefulness of {sup 123}I-MIBG myocardial scintigraphy in patients with congestive heart failure. Myocardial dynamic imaging was performed immediately after {sup 123}I-MIBG administration at 1 frame/sec for 500 sec in 52 patients with or without congestive heart failure. The %uptake/ROI, dynamic heart to mediastinum uptake ratio (H/M) and dynamic washout rate (WR) were calculated from their time activity curves to assess the relationship between the NYHA functional class and these values. In 52 other patients with heart failure, the initial and delayed MIBG anterior planar images were obtained, and H/M in delayed images and WR between initial and delayed images were measured. The patients were followed up for 31.8{+-}16.8 months, and their survival rates were compared among three groups, H/M<1.5, 1.5{<=}H/M<2.0 and H/M{>=}2.0, or WR<45, 45{<=}WR<60 and WR{>=}60[%], respectively. The parameter, such as H/M, WR, age, X-ray cardiothoracic ratio (CTR), echocardiographic end-diastolic diameter (Dd), fractional shortening (%FS) or radionuclide left ventricular ejection fraction (LVEF), which was the most important prognostic predictor was analyzed. MIBG showed that the dynamic kinetics immediately after administration which reflected the severity of congestive heart failure, %uptake/ROI and dynamic H/M were significantly lower and dynamic WR was significantly higher in the advanced NYHA functional class. During the follow-up period, 13 patients died of heart failure. The survival rate in the group of H/M<1.5 or WR{>=}60[%] was significantly poorer than the other groups, and the most important predictive indicator for the prognosis was found to be H/M or WR exceeding age, CTR, Dd, %FS and LVEF {sup 123}I-MIBG myocardial scintigraphy is very useful to diagnose the severity and prognosis in patients with congestive heart failure. (K.H.)

  5. A video-polygraphic analysis of the cataplectic attack

    DEFF Research Database (Denmark)

    Rubboli, G; d'Orsi, G; Zaniboni, A

    2000-01-01

    OBJECTIVES AND METHODS: To perform a video-polygraphic analysis of 11 cataplectic attacks in a 39-year-old narcoleptic patient, correlating clinical manifestations with polygraphic findings. Polygraphic recordings monitored EEG, EMG activity from several cranial, trunk, upper and lower limbs musc...... of REM sleep and neural structures subserving postural control....

  6. Breakthrough attacks in patients with hereditary angioedema receiving long-term prophylaxis are responsive to icatibant

    DEFF Research Database (Denmark)

    Aberer, Werner; Maurer, Marcus; Bouillet, Laurence

    2017-01-01

    BACKGROUND: Patients with hereditary angioedema (HAE) due to C1-inhibitor deficiency (C1-INH-HAE) experience recurrent attacks of cutaneous or submucosal edema that may be frequent and severe; prophylactic treatments can be prescribed to prevent attacks. However, despite the use of long-term prop...

  7. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  8. Efficacy of nebulized fluticasone propionate in adult patients admitted to the emergency department due to bronchial asthma attack.

    Science.gov (United States)

    Starobin, Daniel; Bolotinsky, Ludmila; Or, Jack; Fink, Gershon; Shtoeger, Zev

    2008-01-01

    Locally delivered steroids by inhalers or nebulizers have been shown in small trials to be effective in acute asthma attack, but evidence-based data are insufficient to establish their place as routine management of adult asthma attacks. To determine the efficacy of nebulized compared to systemic steroids in adult asthmatics admitted to the emergency department following an acute attack. Adult asthmatics admitted to the ED were assigned in random consecutive case fashion to one of three protocol groups: group 1--nebulized steroid fluticasone (Flixotide Nebules), group 2--intravenous methylprednisolone, group 3--combined treatment by both routes. Objective and subjective parameters, such as peak expiratory flow, oxygen saturation, heart rate and dyspnea score, were registered before and 2 hours after ED treatment was initiated. Steroids were continued for 1 week following the ED visit according to the protocol arm. Data on hospital admission/discharge rate, ED readmissions in the week after enrollment and other major events related to asthma were registered. Altogether, 73 adult asthmatics were assigned to receive treatment: 24 patients in group 1, 23 in group 2 and 26 in group 3. Mean age was 44.4 +/- 16.8 years (range 17-75 years). Peak expiratory flow and dyspnea score significantly improved in group 1 patients compared with patients in the other groups after 2 hours of ED treatment (P = 0.021 and 0.009, respectively). The discharge rate after ED treatment was significantly higher in groups 1 and 3 than in group 2 (P = 0.05). All 73 patients were alive a week after enrollment. Five patients (20.8%) in the Flixotide treatment arm were hospitalized and required additional systemic steroids. Multivariate analysis of factors affecting hospitalization rate demonstrated that severity of asthma (odds ratio 8.11) and group 2 (OD 4.17) had a negative effect, whereas adherence to chronic anti-asthma therapy (OD 0.49) reduced the hospitalization rate. Our study cohort

  9. Presentation Attack Detection for Iris Recognition System Using NIR Camera Sensor

    Science.gov (United States)

    Nguyen, Dat Tien; Baek, Na Rae; Pham, Tuyen Danh; Park, Kang Ryoung

    2018-01-01

    Among biometric recognition systems such as fingerprint, finger-vein, or face, the iris recognition system has proven to be effective for achieving a high recognition accuracy and security level. However, several recent studies have indicated that an iris recognition system can be fooled by using presentation attack images that are recaptured using high-quality printed images or by contact lenses with printed iris patterns. As a result, this potential threat can reduce the security level of an iris recognition system. In this study, we propose a new presentation attack detection (PAD) method for an iris recognition system (iPAD) using a near infrared light (NIR) camera image. To detect presentation attack images, we first localized the iris region of the input iris image using circular edge detection (CED). Based on the result of iris localization, we extracted the image features using deep learning-based and handcrafted-based methods. The input iris images were then classified into real and presentation attack categories using support vector machines (SVM). Through extensive experiments with two public datasets, we show that our proposed method effectively solves the iris recognition presentation attack detection problem and produces detection accuracy superior to previous studies. PMID:29695113

  10. Presentation Attack Detection for Iris Recognition System Using NIR Camera Sensor

    Directory of Open Access Journals (Sweden)

    Dat Tien Nguyen

    2018-04-01

    Full Text Available Among biometric recognition systems such as fingerprint, finger-vein, or face, the iris recognition system has proven to be effective for achieving a high recognition accuracy and security level. However, several recent studies have indicated that an iris recognition system can be fooled by using presentation attack images that are recaptured using high-quality printed images or by contact lenses with printed iris patterns. As a result, this potential threat can reduce the security level of an iris recognition system. In this study, we propose a new presentation attack detection (PAD method for an iris recognition system (iPAD using a near infrared light (NIR camera image. To detect presentation attack images, we first localized the iris region of the input iris image using circular edge detection (CED. Based on the result of iris localization, we extracted the image features using deep learning-based and handcrafted-based methods. The input iris images were then classified into real and presentation attack categories using support vector machines (SVM. Through extensive experiments with two public datasets, we show that our proposed method effectively solves the iris recognition presentation attack detection problem and produces detection accuracy superior to previous studies.

  11. Presentation Attack Detection for Iris Recognition System Using NIR Camera Sensor.

    Science.gov (United States)

    Nguyen, Dat Tien; Baek, Na Rae; Pham, Tuyen Danh; Park, Kang Ryoung

    2018-04-24

    Among biometric recognition systems such as fingerprint, finger-vein, or face, the iris recognition system has proven to be effective for achieving a high recognition accuracy and security level. However, several recent studies have indicated that an iris recognition system can be fooled by using presentation attack images that are recaptured using high-quality printed images or by contact lenses with printed iris patterns. As a result, this potential threat can reduce the security level of an iris recognition system. In this study, we propose a new presentation attack detection (PAD) method for an iris recognition system (iPAD) using a near infrared light (NIR) camera image. To detect presentation attack images, we first localized the iris region of the input iris image using circular edge detection (CED). Based on the result of iris localization, we extracted the image features using deep learning-based and handcrafted-based methods. The input iris images were then classified into real and presentation attack categories using support vector machines (SVM). Through extensive experiments with two public datasets, we show that our proposed method effectively solves the iris recognition presentation attack detection problem and produces detection accuracy superior to previous studies.

  12. "Awake" ECCO2R superseded intubation in a near-fatal asthma attack.

    Science.gov (United States)

    Schneider, Thomas-Michael; Bence, Tibor; Brettner, Franz

    2017-01-01

    Near-fatal asthma attacks are life threatening events that often require mechanical ventilation. Extracorporeal carbon dioxide removal (ECCO 2 R) is, beside extracorporeal membrane oxygenation (ECMO), a well-established rescue option whenever ventilation gets to its limits. But there seems to be very rare experience with those techniques in avoiding mechanical ventilation in severe asthma attacks. A 67-year-old man with a near-fatal asthma attack deteriorated under non-invasive ventilation conditions. Beside pharmacological treatment, the intensivists decided to use an extracorporeal carbon dioxide removal system (ECCO 2 R) to avoid sedation and intubation. Within only a few hours, there was a breakthrough and the patient's status improved continuously. One and a half days later, weaning from ECCO 2 R was already completed. The discussion deals with several advantages of extracorporeal lung support in acute asthma, the potential of avoiding intubation and sedation, as well as the benefits of a conscious and spontaneously breathing patient. Extracorporeal membrane oxygenation (ECMO) in general and ECCO 2 R in particular is a highly effective method for the treatment of an acute near-fatal asthma attack. Pathophysiological aspects favor the "awake" approach, without sedation, intubation, and mechanical ventilation. Therefore, experienced clinicians might consider "awake" ECCO 2 R in similar cases.

  13. SDN-based path hopping communication against eavesdropping attack

    Science.gov (United States)

    Zhang, Chuanhao; Bu, Youjun; Zhao, Zheng

    2016-10-01

    Network eavesdropping is one of the most popular means used by cyber attackers, which has been a severe threat to network communication security. Adversaries could capture and analyze network communication data from network nodes or links, monitor network status and steal sensitive data such as username and password etc. Traditional network usually uses static network configuration, and existing defense methods, including firewall, IDS, IPS etc., cannot prevent eavesdropping, which has no distinguishing characteristic. Network eavesdropping become silent during most of the time of the attacking process, which is why it is difficult to discover and to defend. But A successful eavesdropping attack also has its' precondition, which is the target path should be relatively stable and has enough time of duration. So, In order to resolve this problem, it has to work on the network architecture. In this paper, a path hopping communication(PHC) mechanism based on Software Define Network (SDN) was proposed to solve this problem. In PHC, Ends in communication packets as well as the routing paths were changed dynamically. Therefore, the traffic would be distributed to multiple flows and transmitted along different paths. so that Network eavesdropping attack could be prevented effectively. It was concluded that PHC was able to increase the overhead of Network eavesdropping, as well as the difficulty of communication data recovery.

  14. Novel Psychological Formulation and Treatment of "Tic Attacks" in Tourette Syndrome.

    Science.gov (United States)

    Robinson, Sally; Hedderly, Tammy

    2016-01-01

    One important, but underreported, phenomenon in Tourette syndrome (TS) is the occurrence of "tic attacks." These episodes have been described at conferences as sudden bouts of tics and/or functional tic-like movements, lasting from 15 min to several hours. They have also been described by patients in online TS communities. To date, there are no reports of tic attacks in the literature. The aim of this article is to stimulate discussion and inform clinical practices by describing the clinical presentation of 12 children (mean age 11 years and 3 months; SD = 2 years and 4 months) with TS and tic attacks, with a detailed case report for one case (13-year-old male). These children commonly present acutely to casualty departments and undergo unnecessary medical investigations. Interestingly, all children reported comorbid anxiety, with worries about the tics themselves and an increased internal focus of attention on tics once the attacks had started. In keeping with other children, the index case reported a strong internal focus of attention, with a relationship between physiological sensations/tic urges, worries about having tic attacks, and behavioral responses (e.g., body scanning, situational avoidance, and other responses). In our experience, the attacks reduce with psychological therapy, for example, the index case attended 13 sessions of therapy that included metacognitive and attention training techniques, as well as cognitive-behavioral strategies. Following treatment, an improvement was seen across a range of measures assessing tics, mood, anxiety, and quality of life. Thus, psychological techniques used to treat anxiety disorders are effective at supporting a reduction in tic attacks through modifying attention, worry processes, and negative beliefs. It is hypothesized that an attentional style of threat monitoring, difficulties tolerating internal sensory urges, cognitive misattributions, and maladaptive coping strategies contribute to the

  15. Cache timing attacks on recent microarchitectures

    DEFF Research Database (Denmark)

    Andreou, Alexandres; Bogdanov, Andrey; Tischhauser, Elmar Wolfgang

    2017-01-01

    Cache timing attacks have been known for a long time, however since the rise of cloud computing and shared hardware resources, such attacks found new potentially devastating applications. One prominent example is S$A (presented by Irazoqui et al at S&P 2015) which is a cache timing attack against...... AES or similar algorithms in virtualized environments. This paper applies variants of this cache timing attack to Intel's latest generation of microprocessors. It enables a spy-process to recover cryptographic keys, interacting with the victim processes only over TCP. The threat model is a logically...... separated but CPU co-located attacker with root privileges. We report successful and practically verified applications of this attack against a wide range of microarchitectures, from a two-core Nehalem processor (i5-650) to two-core Haswell (i7-4600M) and four-core Skylake processors (i7-6700). The attack...

  16. Comparison of artificial intelligence classifiers for SIP attack data

    Science.gov (United States)

    Safarik, Jakub; Slachta, Jiri

    2016-05-01

    Honeypot application is a source of valuable data about attacks on the network. We run several SIP honeypots in various computer networks, which are separated geographically and logically. Each honeypot runs on public IP address and uses standard SIP PBX ports. All information gathered via honeypot is periodically sent to the centralized server. This server classifies all attack data by neural network algorithm. The paper describes optimizations of a neural network classifier, which lower the classification error. The article contains the comparison of two neural network algorithm used for the classification of validation data. The first is the original implementation of the neural network described in recent work; the second neural network uses further optimizations like input normalization or cross-entropy cost function. We also use other implementations of neural networks and machine learning classification algorithms. The comparison test their capabilities on validation data to find the optimal classifier. The article result shows promise for further development of an accurate SIP attack classification engine.

  17. Improving access to important recovery information for heart patients with low health literacy: reflections on practice-based initiatives.

    Science.gov (United States)

    Naccarella, Lucio; Biuso, Catuscia; Jennings, Amanda; Patsamanis, Harry

    2018-05-29

    Evidence exists for the association between health literacy and heart health outcomes. Cardiac rehabilitation is critical for recovery from heart attack and reducing hospital readmissions. Despite this, literacy. This brief case study reflects and documents practice-based initiatives by Heart Foundation Victoria to improve access to recovery information for patients with low literacy levels. Three key initiatives, namely the Six Steps To Cardiac Recovery resource, the Love Your Heart book and the nurse ambassador program, were implemented informed by mixed methods that assessed need and capacity at the individual, organisational and systems levels. Key outcomes included increased access to recovery information for patients with low health literacy, nurse knowledge and confidence to engage with patients on recovery information, improved education of patients and improved availability and accessibility of information for patients in diverse formats. Given the challenges involved in addressing heart health literacy, multifaceted practice-based approaches are essential to improve access to recovery information for patients with low literacy levels. What is known about the topic? Significant challenges exist for patients with lower health literacy receiving recovery information after a heart attack in hospitals. What does this paper add? This case study provides insights into a practice-based initiative by Heart Foundation Victoria to improve access to recovery information for patients with low literacy levels. What are the implications for practitioners? Strategies to improve recovery through increased heart health literacy must address the needs of patients, nursing staff and the health system within hospitals. Such strategies need to be multifaceted and designed to build the capacity of nurses, heart patients and their carers, as well as support from hospital management.

  18. The distinguishing motor features of cataplexy: a study from video-recorded attacks.

    Science.gov (United States)

    Pizza, Fabio; Antelmi, Elena; Vandi, Stefano; Meletti, Stefano; Erro, Roberto; Baumann, Christian R; Bhatia, Kailash P; Dauvilliers, Yves; Edwards, Mark J; Iranzo, Alex; Overeem, Sebastiaan; Tinazzi, Michele; Liguori, Rocco; Plazzi, Giuseppe

    2018-05-01

    To describe the motor pattern of cataplexy and to determine its phenomenological differences from pseudocataplexy in the differential diagnosis of episodic falls. We selected 30 video-recorded cataplexy and 21 pseudocataplexy attacks in 17 and 10 patients evaluated for suspected narcolepsy and with final diagnosis of narcolepsy type 1 and conversion disorder, respectively, together with self-reported attacks features, and asked expert neurologists to blindly evaluate the motor features of the attacks. Video documented and self-reported attack features of cataplexy and pseudocataplexy were contrasted. Video-recorded cataplexy can be positively differentiated from pseudocataplexy by the occurrence of facial hypotonia (ptosis, mouth opening, tongue protrusion) intermingled by jerks and grimaces abruptly interrupting laughter behavior (i.e. smile, facial expression) and postural control (head drops, trunk fall) under clear emotional trigger. Facial involvement is present in both partial and generalized cataplexy. Conversely, generalized pseudocataplexy is associated with persistence of deep tendon reflexes during the attack. Self-reported features confirmed the important role of positive emotions (laughter, telling a joke) in triggering the attacks, as well as the more frequent occurrence of partial body involvement in cataplexy compared with pseudocataplexy. Cataplexy is characterized by abrupt facial involvement during laughter behavior. Video recording of suspected cataplexy attacks allows the identification of positive clinical signs useful for diagnosis and, possibly in the future, for severity assessment.

  19. Recent computer attacks via Instant Messaging

    CERN Multimedia

    IT Department

    2008-01-01

    Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. Several computers at CERN have recently been broken into by attackers who have tricked users of Instant Messaging applications (e.g. MSN, Yahoo Messenger, etc.) into clicking on web links which appeared to come from known contacts. The links appeared to be photos from ‘friends’ and requested software to be installed. In practice, attacker software was installed and the messages did not come from real contacts. In the past such fake messages were mainly sent by email but now a wider range of applications are being targeted, including Instant Messaging. Cybercriminals are making growing use of fake messages to try to trick you into clicking on Web links which will help them to install malicious software on your computer. Anti-virus software cann...

  20. State of the art on defenses against wormhole attacks in wireless sensor networks

    DEFF Research Database (Denmark)

    Prasad, Neeli R.; Giannetsos, T.; Dimitriou, T.

    2009-01-01

    describe the wormhole attack, a severe routing attack against sensor networks that is particularly challenging to defend against. We detail its characteristics and study its effects on the successful operation of a sensor network. We present state-of-the-art research for addressing wormhole related...... the possibility of using more sophisticated methods, like intrusion detection systems, to achieve a more complete and autonomic defense mechanism against wormhole attackers. We present our work on intrusion detection and introduce a lightweight IDS framework, called LIDeA, designed for wireless sensor networks....... LIDeA is based on a distributed architecture, in which nodes overhear their neighboring nodes and collaborate with each other in order to successfully detect an intrusion. We conclude by highlighting how such a system can be used for defending against wormhole attackers....

  1. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  2. Forensics Investigation of Web Application Security Attacks

    OpenAIRE

    Amor Lazzez; Thabet Slimani

    2015-01-01

    Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the sec...

  3. Educational series in congenital heart disease:Congenital left-sided heart obstruction

    OpenAIRE

    Carr, Michelle; Curtis, Stephanie; Marek, Jan

    2018-01-01

    Congenital obstruction of the left ventricular outflow tract remains a significant problem and multilevel obstruction can often coexist. Obstruction can take several morphological forms and may involve the subvalvar, valvar or supravalvar portion of the aortic valve complex. Congenital valvar stenosis presenting in the neonatal period represents a spectrum of disorders ranging from the hypoplastic left heart syndrome to almost normal hearts. Treatment options vary dependent on the severity of...

  4. Baseline Quality of Life and Risk of Stroke in the ALLHAT Study (Antihypertensive and Lipid-Lowering Treatment to Prevent Heart Attack Trial).

    Science.gov (United States)

    Shams, Tanzila; Auchus, Alexander P; Oparil, Suzanne; Wright, Clinton B; Wright, Jackson; Furlan, Anthony J; Sila, Cathy A; Davis, Barry R; Pressel, Sara; Yamal, Jose-Miguel; Einhorn, Paula T; Lerner, Alan J

    2017-11-01

    The visual analogue scale is a self-reported, validated tool to measure quality of life (QoL). Our purpose was to determine whether baseline QoL predicted strokes in the ALLHAT study (Antihypertensive and Lipid Lowering Treatment to Prevent Heart Attack Trial) and evaluate determinants of poststroke change in QoL. In the ALLHAT study, among the 33 357 patients randomized to treatment arms, 1525 experienced strokes; 1202 (79%) strokes were nonfatal. This study cohort includes 32 318 (97%) subjects who completed the baseline visual analogue scale QoL estimate. QoL was measured on a visual analogue scale and adjusted using a Torrance transformation (transformed QoL [TQoL]). Kaplan-Meier curves and adjusted proportional hazards analyses were used to estimate the effect of TQoL on the risk of stroke, on a continuous scale (0-1) and by quartiles (≤0.81, >0.81≤0.89, >0.89≤0.95, >0.95). We analyzed the change from baseline to first poststroke TQoL using adjusted linear regression. After adjusting for multiple stroke risk factors, the hazard ratio for stroke events for baseline TQoL was 0.93 (95% confidence interval, 0.89-0.98) per 0.1 U increase. The lowest baseline TQoL quartile had a 20% increased stroke risk (hazard ratio=1.20 [95% confidence interval, 1.00-1.44]) compared with the reference highest quartile TQoL. Poststroke TQoL change was significant within all treatment groups ( P ≤0.001). Multivariate regression analysis revealed that baseline TQoL was the strongest predictor of poststroke TQoL with similar results for the untransformed QoL. The lowest baseline TQoL quartile had a 20% higher stroke risk than the highest quartile. Baseline TQoL was the only factor that predicted poststroke change in TQoL. URL: http://www.clinicaltrials.gov. Unique identifier: NCT00000542. © 2017 American Heart Association, Inc.

  5. Adaptive cyber-attack modeling system

    Science.gov (United States)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  6. Predicting Factors of Zone 4 Attack in Volleyball.

    Science.gov (United States)

    Costa, Gustavo C; Castro, Henrique O; Evangelista, Breno F; Malheiros, Laura M; Greco, Pablo J; Ugrinowitsch, Herbert

    2017-06-01

    This study examined 142 volleyball games of the Men's Super League 2014/2015 seasons in Brazil from which we analyzed 24-26 games of each participating team, identifying 5,267 Zone 4 attacks for further analysis. Within these Zone 4 attacks, we analyzed the association between the effect of the attack carried out and the separate effects of serve reception, tempo and type of attack. We found that the reception, tempo of attack, second tempo of attack, and power of diagonal attack were predictors of the attack effect in Zone 4. Moreover, placed attacks showed a tendency to not yield a score. In conclusion, winning points in high-level men's volleyball requires excellent receptions, a fast attack tempo and powerfully executed of attacks.

  7. A hospital-based survey of patients with severe valvular heart disease in China.

    Science.gov (United States)

    Hu, Po; Liu, Xian-Bao; Liang, Jie; Zhu, Qi-Feng; Pu, Chao-Xia; Tang, Meng-Yao; Wang, Jian-An

    2017-03-15

    Due to increasing aging, the epidemiology of VHD may have changed in China. This study aimed to provide contemporary information on the prevalence, distribution patterns, and etiology of severe VHD in China. This was a retrospective survey at Second Affiliated Hospital of Zhejiang University, which included all consecutive patients between 2010 and 2015. In all, 139,496 patients were enrolled. Among severe valve diseases, MR was the most frequent (n=946, 0.68%) followed by MS (n=524, 0.38%), AS (n=392, 0.28%), and AR (n=371, 0.27%). Severe MR and AS prevalence rates increased strikingly with age. Rheumatic heart disease had an prevalence of 1.56% (n=2179), and remained one of the most common causes of severe VHD in patients younger than 65years old (99.5% of MS with rheumatic; 27.6% of MR with rheumatic; 25.7% of AS with rheumatic; 31.6% of AR with rheumatic). Aortic valve calcification was the predominant AS etiology, and its prevalence greatly increased with age. In severe AR, rheumatic fever was the most common etiology in patients below 65; in those above 65, etiology was mostly degenerative. In severe primary MR, mitral valve prolapse was the most common cause. Prevalence of secondary MR increased with age, from 16.4% in 18-44years old to 51.7% in individuals ≥75. Severe valvular diseases are very common; rheumatic fever and degenerative valvular changes remain predominant causes in patients below 65 and older ones, respectively. Young adults present mainly with primary MR, while secondary MR is more common in elderly ones. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  8. Usefulness of modified Pulmonary Index Score (mPIS) as a quantitative tool for the evaluation of severe acute exacerbation in asthmatic children.

    Science.gov (United States)

    Koga, Takeshi; Tokuyama, Kenichi; Itano, Atsushi; Morita, Eiji; Ueda, Yutaka; Katsunuma, Toshio

    2015-04-01

    Acute exacerbation of asthma is divided qualitatively into mild, moderate, and severe attacks and respiratory failure. This system is, however, not suitable for estimating small changes in respiratory condition with time and for determining the efficacy of treatments, because it has a qualitative, but not quantitative nature. To evaluate the usefulness of quantitative estimation of asthma exacerbation, modified Pulmonary Index Score (mPIS) values were measured in 87 asthmatic children (mean age, 5.0 ± 0.4 years) during hospitalization. mPIS was calculated by adding the sum of scores for 6 items (scores of 0-3 were given for each item). These consisted of heart rate, respiratory rate, accessory muscle use, inspiratory-to-expiratory flow ratio, degree of wheezing, and oxygen saturation in room air. Measurements were made at visits and at hospitalization and were then made twice a day until discharge. mPIS values were highly correlated among raters. mPIS values at visits were 9.1 ± 0.1 and 12.6 ± 0.4 in subjects with moderate and severe attacks, respectively (p asthma attacks, including the determination of a treatment plan, and prediction of the period of hospitalization in admitted patients, although prospective studies would be required to establish our hypothesis. Copyright © 2014 Japanese Society of Allergology. Production and hosting by Elsevier B.V. All rights reserved.

  9. Moderate overweight is beneficial and severe obesity detrimental for patients with documented atherosclerotic heart disease.

    Science.gov (United States)

    Azimi, Aziza; Charlot, Mette Gitz; Torp-Pedersen, Christian; Gislason, Gunnar H; Køber, Lars; Jensen, Lisette Okkels; Thayssen, Per; Ravkilde, Jan; Tilsted, Hans-Henrik; Lassen, Jens Flensted; Thuesen, Leif

    2013-05-01

    Obesity is paradoxically associated with enhanced survival in patients with established cardiovascular disease. We explored this paradox further by examining the influence of obesity on survival in patients with verified atherosclerotic heart disease. This retrospective registry based cohort study included all patients from the Western Denmark Heart Registry with coronary atherosclerosis confirmed by coronary angiography from January 2000 to December 2010. Patients were divided into eight groups according to body mass index (BMI) based on WHO BMI classification. Department of Cardiology, Copenhagen University Hospital Gentofte, Hellerup, Denmark. The study included 37 573 patients (70.7% men) with a mean age of (66.3 ± 11.1) years. During the 11 years of follow-up, 5866 (15.6%) patients died. Multivariable analysis confirmed that the risk of death was the lowest among the preobese patients (27.5 ≤ BMIObese classes I and II did not differ from the reference group (23 ≤ BMIheart disease patients have improved survival compared with normal weight patients. Underweight and severely obese patients have increased mortality. Our results lean more towards an overweight paradox than an obesity paradox.

  10. Assessing the risk of attack in the management of asthma: a review and proposal for revision of the current control-centred paradigm.

    Science.gov (United States)

    Blakey, John D; Woolnough, Kerry; Fellows, Jodie; Walker, Samantha; Thomas, Mike; Pavord, Ian D

    2013-09-01

    Asthma guidelines focus on day-to-day control of symptoms. However, asthma attacks remain common. They continue to cause mortality and considerable morbidity, and are a major financial burden to the UK National Health Service (NHS) and the wider community. Asthma attacks have chronic consequences, being associated with loss of lung function and significant psychological morbidity. In this article we argue that addressing daily symptom control is only one aspect of asthma treatment, and that there should be a more explicit focus on reducing the risk of asthma attacks. Management of future risk by general practitioners is already central to other conditions such as ischaemic heart disease and chronic renal impairment. We therefore propose a revised approach that separately considers the related domains of daily control and future risk of asthma attack. We believe this approach will have advantages over the current 'stepwise' approach to asthma management. It should encourage individualised treatment, including non-pharmacological measures, and thus may lead to more efficacious and less harmful management strategies. We speculate that this type of approach has the potential to reduce morbidity and healthcare costs related to asthma attacks.

  11. Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks

    Directory of Open Access Journals (Sweden)

    Željko Gavrić

    2018-01-01

    Full Text Available Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the security issue is very important. DOS (denial of service attacks are a fundamental threat to the functioning of wireless sensor networks. This paper describes some of the most common DOS attacks and potential methods of protection against them. The case study shows one of the most frequent attacks on wireless sensor networks – the interference attack. In the introduction of this paper authors assume that the attack interference can cause significant obstruction of wireless sensor networks. This assumption has been proved in the case study through simulation scenario and simulation results.

  12. Protecting Database Centric Web Services against SQL/XPath Injection Attacks

    Science.gov (United States)

    Laranjeiro, Nuno; Vieira, Marco; Madeira, Henrique

    Web services represent a powerful interface for back-end database systems and are increasingly being used in business critical applications. However, field studies show that a large number of web services are deployed with security flaws (e.g., having SQL Injection vulnerabilities). Although several techniques for the identification of security vulnerabilities have been proposed, developing non-vulnerable web services is still a difficult task. In fact, security-related concerns are hard to apply as they involve adding complexity to already complex code. This paper proposes an approach to secure web services against SQL and XPath Injection attacks, by transparently detecting and aborting service invocations that try to take advantage of potential vulnerabilities. Our mechanism was applied to secure several web services specified by the TPC-App benchmark, showing to be 100% effective in stopping attacks, non-intrusive and very easy to use.

  13. Securing internet by eliminating DDOS attacks

    Science.gov (United States)

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  14. Plants under dual attack

    NARCIS (Netherlands)

    Ponzio, C.A.M.

    2016-01-01

    Though immobile, plants are members of complex environments, and are under constant threat from a wide range of attackers, which includes organisms such as insect herbivores or plant pathogens. Plants have developed sophisticated defenses against these attackers, and include chemical responses

  15. Heart rate is a marker of amiodarone mortality reduction in severe heart failure. The GESICA-GEMA Investigators. Grupo de Estudio de la Sobrevida en la Insuficiencia Cardiaca en Argentina-Grupo de Estudios Multicéntricos en Argentina.

    Science.gov (United States)

    Nul, D R; Doval, H C; Grancelli, H O; Varini, S D; Soifer, S; Perrone, S V; Prieto, N; Scapin, O

    1997-05-01

    The impact of amiodarone on mortality in patients with severe congestive heart failure (CHF) (New York Heart Association functional classes II [advanced], III and IV; left ventricular ejection fraction Insuficiencia Cardiaca en Argentina (GESICA) trial was analyzed in relation to initial mean baseline heart rate (BHR) and its change after 6 months of follow-up. Trials of amiodarone therapy in CHF have produced discordant results, suggesting that the effect is not uniform in all patient subgroups with regard to survival. The present analysis was carried out in 516 patients randomized to receive amiodarone, 300 mg/day (n = 260), or nonantiarrhythmic therapy (n = 256, control group) and followed up for 2 years. Survival was evaluated for patients with a BHR > or = 90 beats/min (control: n = 132; amiodarone: n = 122) and or = 90 beats/min, amiodarone therapy reduced mortality to 38.4% compared with 62.4% in control patients (relative risk [RR] 0.55, 95% confidence interval [CI] 0.35 to 0.95, p or = 90 beats/min, which was reduced at 6 months. Elevated rest heart rates in severe CHF identify a subgroup of patients who benefit from treatment with amiodarone. Amiodarone-induced heart rate slowing may be an important benefit for patients.

  16. New attacks on Wi-Fi Protected Setup

    OpenAIRE

    Hamed Mohtadi; Alireza Rahimi

    2015-01-01

    Wi-Fi Protected Setup (WPS) is a network security standard that is used to secure networks in home and office, introduced in 2006 by the Wi-Fi Alliance. It provides easier configuration setup and is used in almost all recent Wi-Fi devices. In this paper we propose two attacks on this standard. The first attack is an offline brute force attack that uses imbalance on registration protocol. This attack needs user action, but it is more efficient than previous attacks. The second attack uses weak...

  17. frequency of severe mitral stenosis in young female patients having pure mitral stenosis secondary to rheumatic heart disease

    International Nuclear Information System (INIS)

    Ahmad, S.; Hayat, U.; Naz, H.

    2010-01-01

    High morbidity and mortality due to Rheumatic heart disease (RHD) associated with females is mainly because of late diagnosis on one hand and socioeconomic reasons on the other hand. Poor referral to tertiary care centres leads to delayed diagnosis which results in complications. The objectives of this cross-sectional descriptive study was to assess the frequency of severe mitral stenosis in woman of child bearing age, having pure mitral stenosis (MS) secondary to rheumatic heart disease. Methods: Two hundred and fifty women of child bearing age with RHD were enrolled in the study using consecutive non-probability sampling technique. Out of these 250 patients, cases of pure MS were selected. Patients with associated mitral regurgitation and aortic valve disease were excluded. After admission, assessment of mitral valve stenosis was done with 2D colour Doppler echocardiography. Results: Out of 250 consecutive patients of rheumatic carditis, 110 (44%) patients had pure mitral valve stenosis, 85 (34%) had stenosis with mitral regurgitation and 55 (22%) patients had both mitral and aortic valve problem of varying severity. Among 110 patients with pure mitral valve stenosis, 48 (43.6%) had severe mitral valve stenosis. Severe mitral valve gradient (MVG) and high pulmonary artery pressure (PAP) was observed in 66 (60%) and 49 (44.5%) of the patients respectively. Conclusion: This high frequency can be linked to lack of early detection of the disease at primary level, poor management of throat infections and poor rheumatic fever prophylaxis at community level. (author )

  18. Comparative assessment of the diets of healthy individuals, subjects with preclinical coronary heart disease and patients with severe heart diseases

    International Nuclear Information System (INIS)

    Aronov, D.M.; Eganyan, R.A.; Kovaleva, O.F.; Zhidko, N.I.; Danielov, G.Eh.; Rozhnov, A.V.; Shcherbakova, I.A.

    1991-01-01

    92 males aged 26 to 55 (28 healthy individuals, 45 persons with preclinical coronary heart disease and 19 patients with functional class 1-2 coronary heart disease) were examined to study the peculiarities and dietary patterns of persons with a high physical working capacity and having no typical clinical signs of the disease. All persons were subjected to a complex examination which included questionnarire, myocardial scintigraphy with 201 Tl at a maximum physical loading, echocardiography, coronaroangiography. Certain dietary peculiarities are established in persons with preclinical coronary heart disease

  19. Invisible Trojan-horse attack

    DEFF Research Database (Denmark)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin

    2017-01-01

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance...

  20. Using Combined One-Time Password for Prevention of Phishing Attacks

    Directory of Open Access Journals (Sweden)

    S. Nasiri

    2017-12-01

    Full Text Available Αs technologies and communications develop, more sabotaging attacks occur including phishing attacks which jeopardize users' security and critical information like their passwords and credentials. Several solutions have been proposed for existing dangers. One of which is the use of one-time passwords. This issue has remained as a main challenge and requires more extensive research. In this research, we have focused on one-time password combinations and we also have proposed solutions based on behavioral patterns which lead to significant optimizations while tending the simplicity for users. Efficiency of the proposed method has been measured through defining scenarios, modeling and simulations based on a prevention rate index. In addition, complexity coefficient of the proposed method showing the probability of unpredictability of passwords for attackers has been calculated. Ultimately, a descriptive comparison has shown that the proposed method is superior to some of the existing methods.

  1. Secure Data Aggregation in Wireless Sensor Network-Fujisaki Okamoto(FO) Authentication Scheme against Sybil Attack.

    Science.gov (United States)

    Nirmal Raja, K; Maraline Beno, M

    2017-07-01

    In the wireless sensor network(WSN) security is a major issue. There are several network security schemes proposed in research. In the network, malicious nodes obstruct the performance of the network. The network can be vulnerable by Sybil attack. When a node illicitly assertions multiple identities or claims fake IDs, the WSN grieves from an attack named Sybil attack. This attack threatens wireless sensor network in data aggregation, synchronizing system, routing, fair resource allocation and misbehavior detection. Henceforth, the research is carried out to prevent the Sybil attack and increase the performance of the network. This paper presents the novel security mechanism and Fujisaki Okamoto algorithm and also application of the work. The Fujisaki-Okamoto (FO) algorithm is ID based cryptographic scheme and gives strong authentication against Sybil attack. By using Network simulator2 (NS2) the scheme is simulated. In this proposed scheme broadcasting key, time taken for different key sizes, energy consumption, Packet delivery ratio, Throughput were analyzed.

  2. [A survey of perioperative asthmatic attack among patients with bronchial asthma underwent general anesthesia].

    Science.gov (United States)

    Ie, Kenya; Yoshizawa, Atsuto; Hirano, Satoru; Izumi, Sinyuu; Hojo, Masaaki; Sugiyama, Haruhito; Kobayasi, Nobuyuki; Kudou, Kouichirou; Maehara, Yasuhiro; Kawachi, Masaharu; Miyakoshi, Kouichi

    2010-07-01

    We investigated the risk factor of perioperative asthmatic attack and effectiveness of preventing treatment for asthmatic attack before operation. We performed retrospective chart review of one hundred eleven patients with asthma underwent general anesthesia and surgical intervention from January 2006 to October 2007 in our hospital. The rate of perioperative asthmatic attack were as follows; 10.2% (5 in 49 cases) in no pretreatment group, 7.5% (3 in 40 cases) in any pretreatments except for systemic steroid, and 4.5% (1 in 22 cases) in systemic steroid pretreatment group. Neither preoperative asthma severity nor duration from the last attack had significant relevancy to perioperative attack rate. The otolaryngological surgery, especially those have nasal polyp and oral surgery had high perioperative asthma attack rate, although there was no significant difference. We recommend the systemic steroid pretreatment for asthmatic patients, especially when they have known risk factor such as administration of the systemic steroid within 6 months, or possibly new risk factor such as nasal polyp, otolaryngological and oral surgery.

  3. Script-viruses Attacks on UNIX OS

    Directory of Open Access Journals (Sweden)

    D. M. Mikhaylov

    2010-06-01

    Full Text Available In this article attacks on UNIX OS are considered. Currently antivirus developers are concentrated on protecting systems from viruses that are most common and attack popular operating systems. If the system or its components are not often attacked then the antivirus products are not protecting these components as it is not profitable. The same situation is with script-viruses for UNIX OS as most experts consider that it is impossible for such viruses to get enough rights to attack. Nevertheless the main conclusion of this article is the fact that such viruses can be very powerful and can attack systems and get enough rights.

  4. Limb Shaking as a Manifestation of Low-flow Transient Ischemic Attacks

    Directory of Open Access Journals (Sweden)

    Mohana P. Maddula

    2010-03-01

    Full Text Available Limb shaking presenting as rhythmic involuntary hyperkinetic movements may represent as severe bilateral occlusive carotid disease. This unusual form of transient ischemic attack is often misdiagnosed as focal motor seizures. However, careful assessment reveals a lack of usual seizure characteristics such as a jacksonian march or facial involvement. The movements also appear to be precipitated by activities that lower blood pressure. We present two cases of patients with severe bilateral carotid stenosis leading to limb-shaking transient ischemic attacks. There was complete stenosis in the internal carotid artery (ICA contralateral to the jerking limb, combined with significant stenosis in the ipsilateral ICA. Cerebral perfusion on the occluded ICA side was maintained through collateral circulation from the opposite ICA and posterior circulation. When blood pressure was lowered orthostatically or by medication, the resulting cerebral hypoperfusion manifested as limb jerking. Recognition of limb shaking as a rare form of transient ischemic attack and differentiating it from focal motor epilepsy can facilitate early identification of critical carotid stenosis, allowing for appropriate interventions and thus reducing the risk of a disabling stroke. We recommend that clinicians should consider carotid disease in elderly patients presenting with orthostatic or episodic movement disorders.

  5. Social Sentiment Sensor in Twitter for Predicting Cyber-Attacks Using ℓ₁ Regularization.

    Science.gov (United States)

    Hernandez-Suarez, Aldo; Sanchez-Perez, Gabriel; Toscano-Medina, Karina; Martinez-Hernandez, Victor; Perez-Meana, Hector; Olivares-Mercado, Jesus; Sanchez, Victor

    2018-04-29

    In recent years, online social media information has been the subject of study in several data science fields due to its impact on users as a communication and expression channel. Data gathered from online platforms such as Twitter has the potential to facilitate research over social phenomena based on sentiment analysis, which usually employs Natural Language Processing and Machine Learning techniques to interpret sentimental tendencies related to users’ opinions and make predictions about real events. Cyber-attacks are not isolated from opinion subjectivity on online social networks. Various security attacks are performed by hacker activists motivated by reactions from polemic social events. In this paper, a methodology for tracking social data that can trigger cyber-attacks is developed. Our main contribution lies in the monthly prediction of tweets with content related to security attacks and the incidents detected based on ℓ 1 regularization.

  6. Health behavior of patients with ischemic heart disease

    Directory of Open Access Journals (Sweden)

    Paweł Węgorowski

    2017-06-01

    Full Text Available Admission By analyzing the available scientific literature, it is possible to define ischemic heart disease as a set of disease symptoms that are a consequence of a chronic state of imbalance between the ability to supply nutrients and oxygen and the real need of myocardial cells for these substances. Adapting life-style behaviors to healthy living is a priority to prevent the onset and development of cardiovascular disease, especially ischemic heart disease, Purpose of research The aim of the study is to determine the health behavior of patients with ischemic heart disease. Materials and methods The study was conducted from 01.08.2015 to 28.12.2015 in a group of 35 people (15 women and 20 men. The research method used in the work is a diagnostic survey, the research technique used was a survey of its own author. Conclusions By analyzing the data collected, it is important to note that patients with coronary heart disease are often associated with health problems such as hypertension, diabetes and abnormal weight. The nutritional habits of the subjects studied can be described as abnormal, particularly the excessive intake of oily meat and too little fish intake. It has also been observed that most of the patients studied have familial predisposition to ischemic heart disease. Discussion Heart attacks occur mostly in people with obesity, diabetes and atherosclerosis. It is also closely related to ischemic heart disease. The health behaviors of patients suffering from Ischemic Heart Disease are moderately satisfactory and therefore the role of a nurse practitioner as a health educator is very difficult but essential in the prevention of ischemic heart disease.

  7. Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version

    Science.gov (United States)

    Babu, M. Rajesh; Dian, S. Moses; Chelladurai, Siva; Palaniappan, Mathiyalagan

    2015-01-01

    The world is moving towards a new realm of computing such as Internet of Things. The Internet of Things, however, envisions connecting almost all objects within the world to the Internet by recognizing them as smart objects. In doing so, the existing networks which include wired, wireless, and ad hoc networks should be utilized. Moreover, apart from other networks, the ad hoc network is full of security challenges. For instance, the MANET (mobile ad hoc network) is susceptible to various attacks in which the black hole attacks and its versions do serious damage to the entire MANET infrastructure. The severity of this attack increases, when the compromised MANET nodes work in cooperation with each other to make a cooperative black hole attack. Therefore this paper proposes an alleviation procedure which consists of timely mandate procedure, hole detection algorithm, and sensitive guard procedure to detect the maliciously behaving nodes. It has been observed that the proposed procedure is cost-effective and ensures QoS guarantee by assuring resource availability thus making the MANET appropriate for Internet of Things. PMID:26495430

  8. Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version.

    Science.gov (United States)

    Babu, M Rajesh; Dian, S Moses; Chelladurai, Siva; Palaniappan, Mathiyalagan

    2015-01-01

    The world is moving towards a new realm of computing such as Internet of Things. The Internet of Things, however, envisions connecting almost all objects within the world to the Internet by recognizing them as smart objects. In doing so, the existing networks which include wired, wireless, and ad hoc networks should be utilized. Moreover, apart from other networks, the ad hoc network is full of security challenges. For instance, the MANET (mobile ad hoc network) is susceptible to various attacks in which the black hole attacks and its versions do serious damage to the entire MANET infrastructure. The severity of this attack increases, when the compromised MANET nodes work in cooperation with each other to make a cooperative black hole attack. Therefore this paper proposes an alleviation procedure which consists of timely mandate procedure, hole detection algorithm, and sensitive guard procedure to detect the maliciously behaving nodes. It has been observed that the proposed procedure is cost-effective and ensures QoS guarantee by assuring resource availability thus making the MANET appropriate for Internet of Things.

  9. Change in brain network connectivity during PACAP38-induced migraine attacks

    DEFF Research Database (Denmark)

    Amin, Faisal Mohammad; Hougaard, Anders; Magon, Stefano

    2016-01-01

    OBJECTIVE: To investigate resting-state functional connectivity in the salience network (SN), the sensorimotor network (SMN), and the default mode network (DMN) during migraine attacks induced by pituitary adenylate cyclase-activating polypeptide-38 (PACAP38). METHODS: In a double-blind, randomized...... connectivity with the bilateral opercular part of the inferior frontal gyrus in the SN. In SMN, there was increased connectivity with the right premotor cortex and decreased connectivity with the left visual cortex. Several areas showed increased (left primary auditory, secondary somatosensory, premotor......, and visual cortices) and decreased (right cerebellum and left frontal lobe) connectivity with DMN. We found no resting-state network changes after VIP (n = 15). CONCLUSIONS: PACAP38-induced migraine attack is associated with altered connectivity of several large-scale functional networks of the brain....

  10. Hybrid attacks on model-based social recommender systems

    Science.gov (United States)

    Yu, Junliang; Gao, Min; Rong, Wenge; Li, Wentao; Xiong, Qingyu; Wen, Junhao

    2017-10-01

    With the growing popularity of the online social platform, the social network based approaches to recommendation emerged. However, because of the open nature of rating systems and social networks, the social recommender systems are susceptible to malicious attacks. In this paper, we present a certain novel attack, which inherits characteristics of the rating attack and the relation attack, and term it hybrid attack. Furtherly, we explore the impact of the hybrid attack on model-based social recommender systems in multiple aspects. The experimental results show that, the hybrid attack is more destructive than the rating attack in most cases. In addition, users and items with fewer ratings will be influenced more when attacked. Last but not the least, the findings suggest that spammers do not depend on the feedback links from normal users to become more powerful, the unilateral links can make the hybrid attack effective enough. Since unilateral links are much cheaper, the hybrid attack will be a great threat to model-based social recommender systems.

  11. Level of consciousness on admission to a Heart Attack Centre is a predictor of survival from out-of-hospital cardiac arrest.

    Science.gov (United States)

    Deakin, Charles D; Fothergill, Rachael; Moore, Fionna; Watson, Lynne; Whitbread, Mark

    2014-07-01

    The relationship between the neurological status at the time of handover from the ambulance crew to a Heart Attack Centre (HAC) in patients who have achieved return of spontaneous circulation (ROSC) and subsequent outcome, in the context of current treatment standards, is unknown. A retrospective review of all patients treated by London Ambulance Service (LAS) from 1(st) April 2011 to 31(st) March 2013 admitted to a HAC in Greater London was undertaken. Neurological status (A - alert; V - responding to voice; P - responding to pain; U - unresponsive) recorded by the ambulance crew on handover was compared with length of hospital stay and survival to hospital discharge. A total of 475 sequential adult cardiac arrests of presumed cardiac origin, achieving ROSC on admission to a HAC were identified. Outcome data was available for 452 patients, of whom 253 (56.0%) survived to discharge. Level of consciousness on admission to the HAC was a predictor of duration of hospital stay (Pa shockable rhythm, 32.3% (120/371) were 'A' or 'V', compared with 9.1% (9/99) of those with non-shockable rhythms (PA or V) compared with those with non-shockable rhythms. Most patients who are conscious on admission to the HAC will survive, compared with approximately half of those who are unconscious (P or U), suggesting that critical care is generally appropriate at all levels of consciousness if ROSC has been achieved. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  12. Secure Fusion Estimation for Bandwidth Constrained Cyber-Physical Systems Under Replay Attacks.

    Science.gov (United States)

    Chen, Bo; Ho, Daniel W C; Hu, Guoqiang; Yu, Li; Bo Chen; Ho, Daniel W C; Guoqiang Hu; Li Yu; Chen, Bo; Ho, Daniel W C; Hu, Guoqiang; Yu, Li

    2018-06-01

    State estimation plays an essential role in the monitoring and supervision of cyber-physical systems (CPSs), and its importance has made the security and estimation performance a major concern. In this case, multisensor information fusion estimation (MIFE) provides an attractive alternative to study secure estimation problems because MIFE can potentially improve estimation accuracy and enhance reliability and robustness against attacks. From the perspective of the defender, the secure distributed Kalman fusion estimation problem is investigated in this paper for a class of CPSs under replay attacks, where each local estimate obtained by the sink node is transmitted to a remote fusion center through bandwidth constrained communication channels. A new mathematical model with compensation strategy is proposed to characterize the replay attacks and bandwidth constrains, and then a recursive distributed Kalman fusion estimator (DKFE) is designed in the linear minimum variance sense. According to different communication frameworks, two classes of data compression and compensation algorithms are developed such that the DKFEs can achieve the desired performance. Several attack-dependent and bandwidth-dependent conditions are derived such that the DKFEs are secure under replay attacks. An illustrative example is given to demonstrate the effectiveness of the proposed methods.

  13. The confused world of sulfate attack on concrete

    International Nuclear Information System (INIS)

    Neville, Adam

    2004-01-01

    External sulfate attack is not completely understood. Part I identifies the issues involved, pointing out disagreements, and distinguishes between the mere occurrence of chemical reactions of sulfates with hydrated cement paste and the damage or deterioration of concrete; only the latter are taken to represent sulfate attack. Furthermore, sulfate attack is defined as deleterious action involving sulfate ions; if the reaction is physical, then, it is physical sulfate attack that takes place. The discussion of the two forms of sulfate attack leads to a recommendation for distinct nomenclature. Sulfate attack on concrete structures in service is not widespread, and the amount of laboratory-based research seems to be disproportionately large. The mechanisms of attack by different sulfates--sodium, calcium, and magnesium--are discussed, including the issue of topochemical and through-solution reactions. The specific aspects of the action of magnesium sulfate are discussed, and the differences between laboratory conditions and field exposure are pointed out. Part II discusses the progress of sulfate attack and its manifestations. This is followed by a discussion of making sulfate-resisting concrete. One of the measures is to use Type V cement, and this topic is extensively discussed. Likewise, the influence of w/c on sulfate resistance is considered. The two parameters are not independent of one another. Moreover, the cation in the sulfate salt has a strong bearing on the efficiency of the Type V cement. Recent interpretations of the Bureau of Reclamation tests, both long term and accelerated, are evaluated, and it appears that they need reworking. Part III reviews the standards and guides for the classification of the severity of exposure of structures to sulfates and points out the lack of calibration of the various classes of exposure. A particular problem is the classification of soils because much depends on the extraction ratio of sulfate in the soil: there is a

  14. Reduced heart rate variability in social anxiety disorder: associations with gender and symptom severity.

    Directory of Open Access Journals (Sweden)

    Gail A Alvares

    Full Text Available BACKGROUND: Polyvagal theory emphasizes that autonomic nervous system functioning plays a key role in social behavior and emotion. The theory predicts that psychiatric disorders of social dysfunction are associated with reduced heart rate variability, an index of autonomic control, as well as social inhibition and avoidance. The purpose of this study was to examine whether heart rate variability was reduced in treatment-seeking patients diagnosed with social anxiety disorder, a disorder characterized by social fear and avoidance. METHODS: Social anxiety patients (n = 53 were recruited prior to receiving psychological therapy. Healthy volunteers were recruited through the University of Sydney and the general community and were matched by gender and age (n = 53. Heart rate variability was assessed during a five-minute recording at rest, with participants completing a range of self-report clinical symptom measures. RESULTS: Compared to controls, participants with social anxiety exhibited significant reductions across a number of heart rate variability measures. Reductions in heart rate variability were observed in females with social anxiety, compared to female controls, and in patients taking psychotropic medication compared to non-medicated patients. Finally, within the clinical group, we observed significant associations between reduced heart rate variability and increased social interaction anxiety, psychological distress, and harmful alcohol use. CONCLUSIONS: The results of this study confirm that social anxiety disorder is associated with reduced heart rate variability. Resting state heart rate variability may therefore be considered a marker for social approach-related motivation and capacity for social engagement. Additionally, heart rate variability may provide a useful biomarker to explain underlying difficulties with social approach, impaired stress regulation, and behavioral inhibition, especially in disorders associated with

  15. Association of Cardiac Hemodynamic Factors With Severity of White Matter Hyperintensities in Chronic Valvular Heart Disease.

    Science.gov (United States)

    Lee, Woo-Jin; Jung, Keun-Hwa; Ryu, Young Jin; Kim, Jeong-Min; Lee, Soon-Tae; Chu, Kon; Kim, Manho; Lee, Sang Kun; Roh, Jae-Kyu

    2018-01-01

    The cerebral white matter hyperintensity (WMH) is frequently noted in patients with chronic heart disease. Long-term alteration of cardiac hemodynamics might have an influence on the mechanism of cerebral WMH. To investigate the association between chronically altered cardiac hemodynamics and severity of cerebral WMH in patients with chronic valvular heart disease. This cross-sectional analysis identified 303 consecutive patients at a tertiary referral center between 2008 and 2016 who were 50 years or older, and diagnosed with severe chronic valvular heart disease and underwent cardiac catherization, echocardiography, and received brain magnetic resonance imaging. Among these patients, 71 with other demonstrated cardiac disease, central nervous system disease, and/or without sufficient catheterization data were excluded, and the remaining 232 patients were included in further analyses. The site and mechanism of valve diseases, as well as clinical and medication profiles, were reviewed. Cardiac catheterization parameters such as right atrial (RA) mean pressure, right ventricular pressure, and aortic mean pressure were obtained. Comprehensive echocardiographic hemodynamic markers such as left ventricular (LV) ejection fraction, LV mass index, LV end diastolic volume, cardiac index, and E/e' ratio were also obtained. White matter hyperintensity volume was quantitatively evaluated using volumetric analysis. This study included 232 patients (103 men [44.4%] and 129 women [55.6%]; mean [SD] (range) age, 65.6 [8.8] (51-88) years) in the final analysis. The mean (SD) WMH volume was 5.93 (7.14) mL (median [interquartile range], 4.33 [1.33-8.62] mL), and mean (SD) RA pressure was 10.0 (4.7) mm Hg. From the catheterization data, 147 patients (63.4%) were classified as having a disease involving the mitral valve; 93 (40.1%), aortic valve; 37 (15.9%), tricuspid valve; and 4 (1.7%), pulmonary valve. In multivariate linear regression analysis, adjusting the type and mechanism of

  16. Critical supply network protection against intentional attacks: A game-theoretical model

    International Nuclear Information System (INIS)

    Bricha, Naji; Nourelfath, Mustapha

    2013-01-01

    A crucial issue in today's critical supply chains is how to protect facilities against intentional attacks, since it has become unacceptable to ignore the high impact of low probability disruptions caused by these attacks. This article develops a game-theoretical model to deal with the protection of facilities, in the context of the uncapacitated fixed-charge location problem. Given a set of investment alternatives for protecting the facilities against identified threats, the objective is to select the optimal defence strategy. The attacker is considered as a player who tries to maximise the expected damage while weighing against the attacks expenditures. The conflict on facilities vulnerability is modelled using the concept of contest. The vulnerability of a facility is defined by its destruction probability. Contest success functions determine the vulnerability of each facility dependent on the relative investments of the defender and the attacker on each facility, and on the characteristics of the contest. A method is developed to evaluate the utilities of the players (i.e., the defender and the attacker). This method evaluates many expected costs, including the cost needed to restore disabled facilities, the backorder cost, and the cost incurred because of the increase in transportation costs after attacks. In fact, when one or several facilities are unavailable, transportation costs will increase since reassigned customers may receive shipments from facilities which are farther away. The model considers a non-cooperative two-period game between the players, and an algorithm is presented to determine the equilibrium solution and the optimal defence strategy. An illustrative example is presented. The approach is compared to other suggested strategies, and some managerial insights are provided in the context of facility location

  17. [Role of serum S1P levels during asthma attack in the evaluation of asthma severity].

    Science.gov (United States)

    Zhao, Yunwei; Xu, Yiqin; Li, Shuang; Wei, Yu; Wang, Chunling

    2017-09-01

    level and peripheral blood EOS in patients with mild, moderate and severe asthma (r value was 0.696, 0.746, 0.508, all P S1P level and EOS, FEV1 in healthy control group (r value was 0.324 and -0.048, both P > 0.05). ROC curve analysis showed that the area under curve (AUC) of serum S1P for assessing mild, moderate and severe asthma was 0.948, 1.000, 1.000, respectively; when the cut-off of S1P was 1 181.8, 1 534.2, 1 708.6 nmol/L, the sensitivity was 88.2%, 100%, 100%, and the specificity was 88.0%, 100% and 100%, respectively. During asthma attack, the serum S1P level was gradually increased with the exacerbation of the disease. Serum S1P level has significant evaluative effect on the severity of asthma.

  18. Combination therapy with milrinone and esmolol for heart protection in patients with severe sepsis: a prospective, randomized trial.

    Science.gov (United States)

    Wang, Zenggeng; Wu, Qinghua; Nie, Xiangbi; Guo, Jinghua; Yang, Chunli

    2015-11-01

    As a β-adrenoceptor antagonist (β-blocker), esmolol can reduce cardiac output and the phosphodiesterase III inhibitor milrinone has been shown to improve heart contractility in patients with septic shock. This study was performed to assess the effects of esmolol combined with milrinone in patients with severe sepsis. This prospective randomized study was conducted in patients with severe sepsis in the intensive care unit of the Jiangxi Provincial People's Hospital (Nanchang, Jiangsu, China) between June 2013 and June 2014. Patients were randomly divided into control (C), milrinone (M), and milrinone-esmolol (ME) groups. The primary outcome was the rate of controlling the heart rate (HR) to achieve target levels. Secondary outcomes included the 28-day survival rate and changes in hemodynamic variables, organ function variables, myocardial injury markers, and the serum levels of proinflammatory factors. A total of 90 patients with severe sepsis were included in this study (30 per group). The HR in the ME group was lower than in the M and C groups after 12 h. The rate of successful HR control during the first 96 h was significantly higher in the ME group (60.0 vs. 33.3 % in the M group, vs. 26.7 % in the C group). Also, patients in the ME group had higher 28-day overall survival compared with the M (Log rank statistic = 5.452; P = 0.020) and C groups (Log rank statistic = 10.206; P = 0.001). Additionally, several variables showed significant improvement in the ME group 96 h after treatment compared with the M and C groups (P milrinone and esmolol could improve cardiac function and the 28-day survival rate in patients with severe sepsis.

  19. Automated classification of computer network attacks

    CSIR Research Space (South Africa)

    Van Heerden, R

    2013-11-01

    Full Text Available according to the relevant types of attack scenarios depicted in the ontology. The two network attack instances are the Distributed Denial of Service attack on SpamHaus in 2013 and the theft of 42 million Rand ($6.7 million) from South African Postbank...

  20. Bush animal attacks: management of complex injuries in a resource-limited setting

    Directory of Open Access Journals (Sweden)

    Mitchell Katrina B

    2011-12-01

    Full Text Available Abstract Introduction Though animal-related injuries and fatalities have been documented throughout the world, the variety of attacks by wild animals native to rural East Africa are less commonly described. Given the proximity of our northwestern Tanzania hospital to Lake Victoria, Lake Tanganyika, and the Serengeti National Park, and presentation of several patients attacked by bush animals and suffering a variety of complex injuries, we sought to report the pattern of attacks and surgical management in a resource-limited setting. Materials and methods Four patients who were admitted to the northwestern Tanzania tertiary referral hospital, Bugando Medical Centre (BMC, in 2010-2011 suffered attacks by different bush animals: hyena, elephant, crocodile, and vervet monkey. These patients were triaged as trauma patients in the Casualty Ward, then admitted for inpatient monitoring and treatment. Their outcomes were followed to discharge. Results The age and gender of the patients attacked was variable, though all but the pediatric patient were participating in food gathering or guarding activities in rural locations at the time of the attacks. All patients required surgical management of their injuries, which included debridement and closure of wounds, chest tube insertion, amputation, and external fixation of an extremity fracture. All patients survived and were discharged home. Discussion Though human injuries secondary to encounters with undomesticated animals such as cows, moose, and camel are reported, they often are indirect traumas resulting from road traffic collisions. Snake attacks are well documented and common. However, this series of unique bush animal attacks describes the initial and surgical management of human injuries in the resource-limited setting of the developing world. Conclusion Animal attacks are common throughout the world, but their pattern may vary in Africa throughout jungle and bush environmental settings. It is

  1. Cyber Attacks and Combat Behavior

    Directory of Open Access Journals (Sweden)

    Carataș Maria Alina

    2017-01-01

    Full Text Available Cyber terrorism is an intangible danger, a real over the corner threat in the life of individuals,organizations, and governments and is getting harder to deal with its damages. The motivations forthe cyber-attacks are different, depending on the terrorist group, from cybercrime to hacktivism,attacks over the authorities’ servers. Organizations constantly need to find new ways ofstrengthening protection against cyber-attacks, assess their cyber readiness, expand the resiliencecapacity and adopts international security regulations.

  2. Attacks on public telephone networks: technologies and challenges

    Science.gov (United States)

    Kosloff, T.; Moore, Tyler; Keller, J.; Manes, Gavin W.; Shenoi, Sujeet

    2003-09-01

    Signaling System 7 (SS7) is vital to signaling and control in America's public telephone networks. This paper describes a class of attacks on SS7 networks involving the insertion of malicious signaling messages via compromised SS7 network components. Three attacks are discussed in detail: IAM flood attacks, redirection attacks and point code spoofing attacks. Depending on their scale of execution, these attacks can produce effects ranging from network congestion to service disruption. Methods for detecting these denial-of-service attacks and mitigating their effects are also presented.

  3. Social Sentiment Sensor in Twitter for Predicting Cyber-Attacks Using ℓ1 Regularization

    Science.gov (United States)

    Sanchez-Perez, Gabriel; Toscano-Medina, Karina; Martinez-Hernandez, Victor; Olivares-Mercado, Jesus; Sanchez, Victor

    2018-01-01

    In recent years, online social media information has been the subject of study in several data science fields due to its impact on users as a communication and expression channel. Data gathered from online platforms such as Twitter has the potential to facilitate research over social phenomena based on sentiment analysis, which usually employs Natural Language Processing and Machine Learning techniques to interpret sentimental tendencies related to users’ opinions and make predictions about real events. Cyber-attacks are not isolated from opinion subjectivity on online social networks. Various security attacks are performed by hacker activists motivated by reactions from polemic social events. In this paper, a methodology for tracking social data that can trigger cyber-attacks is developed. Our main contribution lies in the monthly prediction of tweets with content related to security attacks and the incidents detected based on ℓ1 regularization. PMID:29710833

  4. Social Sentiment Sensor in Twitter for Predicting Cyber-Attacks Using ℓ1 Regularization

    Directory of Open Access Journals (Sweden)

    Aldo Hernandez-Suarez

    2018-04-01

    Full Text Available In recent years, online social media information has been the subject of study in several data science fields due to its impact on users as a communication and expression channel. Data gathered from online platforms such as Twitter has the potential to facilitate research over social phenomena based on sentiment analysis, which usually employs Natural Language Processing and Machine Learning techniques to interpret sentimental tendencies related to users’ opinions and make predictions about real events. Cyber-attacks are not isolated from opinion subjectivity on online social networks. Various security attacks are performed by hacker activists motivated by reactions from polemic social events. In this paper, a methodology for tracking social data that can trigger cyber-attacks is developed. Our main contribution lies in the monthly prediction of tweets with content related to security attacks and the incidents detected based on ℓ 1 regularization.

  5. Classification of HTTP Attacks: A Study on the ECML/PKDD 2007 Discovery Challenge

    Energy Technology Data Exchange (ETDEWEB)

    Gallagher, Brian [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Eliassi-Rad, Tina [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2009-07-08

    As the world becomes more reliant on Web applications for commercial, financial, and medical transactions, cyber attacks on the World Wide Web are increasing in frequency and severity. Web applications provide an attractive alternative to traditional desktop applications due to their accessibility and ease of deployment. However, the accessibility of Web applications also makes them extremely vulnerable to attack. This inherent vulnerability is intensified by the distributed nature ofWeb applications and the complexity of configuring application servers. These factors have led to a proliferation of Web-based attacks, in which attackers surreptitiously inject code into HTTP requests, allowing them to execute arbitrary commands on remote systems and perform malicious activities such as reading, altering, or destroying sensitive data. One approach for dealing with HTTP-based attacks is to identify malicious code in incoming HTTP requests and eliminate bad requests before they are processed. Using machine learning techniques, we can build a classifier to automatically label requests as “Valid” or “Attack.” For this study, we develop a simple, but effective HTTP attack classifier, based on the vector space model used commonly for Information Retrieval. Our classifier not only separates attacks from valid requests, but can also identify specific attack types (e.g., “SQL Injection” or “Path Traversal”). We demonstrate the effectiveness of our approach through experiments on the ECML/PKDD 2007 Discovery Challenge data set. Specifically, we show that our approach achieves higher precision and recall than previous methods. In addition, our approach has a number of desirable characteristics, including robustness to missing contextual information, interpretability of models, and scalability.

  6. Defense and attack of complex and dependent systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2010-01-01

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  7. Defense and attack of complex and dependent systems

    Energy Technology Data Exchange (ETDEWEB)

    Hausken, Kjell, E-mail: kjell.hausken@uis.n [Faculty of Social Sciences, University of Stavanger, N-4036 Stavanger (Norway)

    2010-01-15

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  8. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica......Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error......-prone and impracticable for large systems. Nonetheless, the automated generation of attack trees has only been explored in connection to computer networks and levering rich models, whose analysis typically leads to an exponential blow-up of the state space. We propose a static analysis approach where attack trees...... are automatically inferred from a process algebraic specification in a syntax-directed fashion, encompassing a great many application domains and avoiding incurring systematically an exponential explosion. Moreover, we show how the standard propositional denotation of an attack tree can be used to phrase...

  9. Metaiodobenzylguanidine and heart rate variability in heart failure

    International Nuclear Information System (INIS)

    Kurata, Chinori; Shouda, Sakae; Mikami, Tadashi; Uehara, Akihiko; Ishikawa, Keiko; Tawarahara, Kei; Nakano, Tomoyasu; Matoh, Fumitaka; Takeuchi, Kazuhiko

    1998-01-01

    It is assumed that the low-frequency power (LF) of heart rate variability (HRV) increases with progress of congestive heart failure (CHF), therefore positively correlating with cardiac 123 I-metaiodobenzylguanidine (MIBG) washout. It is demonstrated here that HRV, including normalized LF, correlated inversely with MIBG washout and positively with the ratio of heart-to-mediastinum MIBG activity in controls and CHF patients, whereas these correlations were not observed within CHF patients. Thus MIBG washout may increase and HRV including normalized LF may decrease with CHF, although the HRV and MIBG measures may not similarly change in proportion to the severity of the cardiac autonomic dysfunction in CHF. (author)

  10. Metaiodobenzylguanidine and heart rate variability in heart failure

    Energy Technology Data Exchange (ETDEWEB)

    Kurata, Chinori; Shouda, Sakae; Mikami, Tadashi; Uehara, Akihiko; Ishikawa, Keiko [Hamamatsu Univ., Shizuoka (Japan). School of Medicine; Tawarahara, Kei; Nakano, Tomoyasu; Matoh, Fumitaka; Takeuchi, Kazuhiko

    1998-10-01

    It is assumed that the low-frequency power (LF) of heart rate variability (HRV) increases with progress of congestive heart failure (CHF), therefore positively correlating with cardiac {sup 123}I-metaiodobenzylguanidine (MIBG) washout. It is demonstrated here that HRV, including normalized LF, correlated inversely with MIBG washout and positively with the ratio of heart-to-mediastinum MIBG activity in controls and CHF patients, whereas these correlations were not observed within CHF patients. Thus MIBG washout may increase and HRV including normalized LF may decrease with CHF, although the HRV and MIBG measures may not similarly change in proportion to the severity of the cardiac autonomic dysfunction in CHF. (author)

  11. Pareto Efficient Solutions of Attack-Defence Trees

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2015-01-01

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as proba......Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes......, such as probability or cost of attacks and defences. In case of multiple parameters most analytical methods optimise one parameter at a time, e.g., minimise cost or maximise probability of an attack. Such methods may lead to sub-optimal solutions when optimising conflicting parameters, e.g., minimising cost while...... maximising probability. In order to tackle this challenge, we devise automated techniques that optimise all parameters at once. Moreover, in the case of conflicting parameters our techniques compute the set of all optimal solutions, defined in terms of Pareto efficiency. The developments are carried out...

  12. Leaf-cutting ant attack in initial pine plantations and growth of defoliated plants

    Directory of Open Access Journals (Sweden)

    Mariane Aparecida Nickele

    2012-07-01

    Full Text Available The objective of this work was to evaluate the natural attack by Acromyrmex crassispinus in initial Pinus taeda plantations without control measures against ants, as well as the effect of defoliation in seedlings of P. taeda. Evaluations of the attack of leaf-cutting ants on P. taeda plantations were done monthly in the first six months, then 9 and 12 months after planting. The percentages of plants that were naturally attacked by ants were registered. The effect of defoliation was evaluated by artificial defoliation, simulating the natural patterns of attack by A. crassispinus on P. taeda seedlings. The natural attack of A. crassispinus was greater during the first months after planting, being more intense in the first 30 days. Artificial defoliation indicated that there were no significant losses in diameter and height in plants with less than 75% defoliation. However, there were significant losses in diameter and height in plants with 100% defoliation, independently of the cut of the apical meristem, and also plant death. The control of leaf-cutting ants in P. taeda plantings, in which A. crassispinus is the most frequent leaf-cutting ant, should be intense only at the beginning of planting, since the most severe attacks occur during this time.

  13. Transient severe tricuspid regurgitation after transplantation of an extremely oversized donor heart in a child-Does size matter? A case report.

    Science.gov (United States)

    Birnbaum, J; Ulrich, S M; Schramm, R; Hagl, C; Lehner, A; Fischer, M; Haas, N A; Heineking, B

    2017-02-01

    In pediatric heart transplantation, the size of the donor organ is an important criterion for organ allocation. Oversized donor hearts are often accepted with good results, but some complications in relation to a high donor-recipient ratio have been described. Our patient was transplanted for progressive heart failure in dilated cardiomyopathy. The donor-to-recipient weight ratio was 3 (donor weight 65 kg, recipient weight 22 kg). The intra-operative echocardiography before chest closure showed excellent cardiac function, no tricuspid valve regurgitation, and a normal central venous pressure. After chest closure, central venous pressure increased substantially and echocardiography revealed a severe tricuspid insufficiency. As other reasons for right ventricular dysfunction, that is, myocardial ischemia, pulmonary hypertension, and rejection, were excluded, we assumed that the insufficiency was caused by an alteration of the right ventricular geometry. After 1 week, the valve insufficiency regressed to a minimal degree. In pediatric heart transplant patients with a high donor-to-recipient weight ratio, the outlined complication may occur. If other reasons for right ventricular heart failure can be ruled out, this entity is most likely caused by an acute and transient alteration of the right ventricular geometry that may disappear over time. © 2016 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  14. Cross-site scripting attacks procedure and Prevention Strategies

    Directory of Open Access Journals (Sweden)

    Wang Xijun

    2016-01-01

    Full Text Available Cross-site scripting attacks and defense has been the site of attack and defense is an important issue, this paper, the definition of cross-site scripting attacks, according to the current understanding of the chaos on the cross-site scripting, analyzes the causes and harm cross-site scripting attacks formation of attacks XXS complete process XSS attacks made a comprehensive analysis, and then for the web program includes Mobility there are cross-site scripting filter laxity given from ordinary users browse the web and web application developers two the defense cross-site scripting attacks effective strategy.

  15. On the anatomy of social engineering attacks : A literature-based dissection of successful attacks

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    The aim of this studywas to explore the extent towhich persuasion principles are used in successful social engineering attacks. Seventy-four scenarioswere extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenariowas split into attack steps, containing

  16. DDOS ATTACK DETECTION SIMULATION AND HANDLING MECHANISM

    Directory of Open Access Journals (Sweden)

    Ahmad Sanmorino

    2013-11-01

    Full Text Available In this study we discuss how to handle DDoS attack that coming from the attacker by using detection method and handling mechanism. Detection perform by comparing number of packets and number of flow. Whereas handling mechanism perform by limiting or drop the packets that detected as a DDoS attack. The study begins with simulation on real network, which aims to get the real traffic data. Then, dump traffic data obtained from the simulation used for detection method on our prototype system called DASHM (DDoS Attack Simulation and Handling Mechanism. From the result of experiment that has been conducted, the proposed method successfully detect DDoS attack and handle the incoming packet sent by attacker.

  17. Model checking exact cost for attack scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2017-01-01

    Attack trees constitute a powerful tool for modelling security threats. Many security analyses of attack trees can be seamlessly expressed as model checking of Markov Decision Processes obtained from the attack trees, thus reaping the benefits of a coherent framework and a mature tool support....... However, current model checking does not encompass the exact cost analysis of an attack, which is standard for attack trees. Our first contribution is the logic erPCTL with cost-related operators. The extended logic allows to analyse the probability of an event satisfying given cost bounds and to compute...... the exact cost of an event. Our second contribution is the model checking algorithm for erPCTL. Finally, we apply our framework to the analysis of attack trees....

  18. Resilience of LTE networks against smart jamming attacks

    KAUST Repository

    Aziz, Farhan M.

    2014-12-08

    Commercial LTE networks are being studied for mission-critical applications, such as public safety and smart grid communications. In this paper, LTE networks are shown vulnerable to Denial-of-Service (DOS) and loss of service attacks from smart jammers, who may employ simple narrowband jamming techniques to attack without any need to hack the network or its users. We modeled the utilities of jamming and anti-jamming actions played by the jammer and the network under the framework of single-shot and repeated Bayesian games. In a single-shot game formulation the only Nash Equilibria (NE) are pure strategy equilibria at which network utility is severely compromised. We propose a repeated-game learning and strategy algorithm for the network that outperforms single-shot games by a significant margin. Furthermore, all of our proposed actions and algorithms can be implemented with current technology.

  19. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  20. AR.Drone: security threat analysis and exemplary attack to track persons

    Science.gov (United States)

    Samland, Fred; Fruth, Jana; Hildebrandt, Mario; Hoppe, Tobias; Dittmann, Jana

    2012-01-01

    In this article we illustrate an approach of a security threat analysis of the quadrocopter AR.Drone, a toy for augmented reality (AR) games. The technical properties of the drone can be misused for attacks, which may relate security and/or privacy aspects. Our aim is to sensitize for the possibility of misuses and the motivation for an implementation of improved security mechanisms of the quadrocopter. We focus primarily on obvious security vulnerabilities (e.g. communication over unencrypted WLAN, usage of UDP, live video streaming via unencrypted WLAN to the control device) of this quadrocopter. We could practically verify in three exemplary scenarios that this can be misused by unauthorized persons for several attacks: high-jacking of the drone, eavesdropping of the AR.Drones unprotected video streams, and the tracking of persons. Amongst other aspects, our current research focuses on the realization of the attack of tracking persons and objects with the drone. Besides the realization of attacks, we want to evaluate the potential of this particular drone for a "safe-landing" function, as well as potential security enhancements. Additionally, in future we plan to investigate an automatic tracking of persons or objects without the need of human interactions.

  1. A DDoS Attack Detection Method Based on Hybrid Heterogeneous Multiclassifier Ensemble Learning

    Directory of Open Access Journals (Sweden)

    Bin Jia

    2017-01-01

    Full Text Available The explosive growth of network traffic and its multitype on Internet have brought new and severe challenges to DDoS attack detection. To get the higher True Negative Rate (TNR, accuracy, and precision and to guarantee the robustness, stability, and universality of detection system, in this paper, we propose a DDoS attack detection method based on hybrid heterogeneous multiclassifier ensemble learning and design a heuristic detection algorithm based on Singular Value Decomposition (SVD to construct our detection system. Experimental results show that our detection method is excellent in TNR, accuracy, and precision. Therefore, our algorithm has good detective performance for DDoS attack. Through the comparisons with Random Forest, k-Nearest Neighbor (k-NN, and Bagging comprising the component classifiers when the three algorithms are used alone by SVD and by un-SVD, it is shown that our model is superior to the state-of-the-art attack detection techniques in system generalization ability, detection stability, and overall detection performance.

  2. Attack Graph Construction for Security Events Analysis

    Directory of Open Access Journals (Sweden)

    Andrey Alexeevich Chechulin

    2014-09-01

    Full Text Available The paper is devoted to investigation of the attack graphs construction and analysis task for a network security evaluation and real-time security event processing. Main object of this research is the attack modeling process. The paper contains the description of attack graphs building, modifying and analysis technique as well as overview of implemented prototype for network security analysis based on attack graph approach.

  3. Pearl Harbor bombing attack: a contamination legacy revealed in the sedimentary record

    International Nuclear Information System (INIS)

    Ashwood, T.L.; Olsen, C.R.

    1988-01-01

    Sediment cores collected from Middle Loch and West Loch of Pearl Harbor were dated using fallout 137 Cs and excess 210 Pb and analysed for several major elements and trace metals. Results indicate that sediment deposited immediately following the 7 December, 1941, bombing attack on Pearl Harbor contained elevated levels of several trace metals. (author)

  4. Automated Discovery of Mimicry Attacks

    National Research Council Canada - National Science Library

    Giffin, Jonathon T; Jha, Somesh; Miller, Barton P

    2006-01-01

    .... These systems are useful only if they detect actual attacks. Previous research developed manually-constructed mimicry and evasion attacks that avoided detection by hiding a malicious series of system calls within a valid sequence allowed by the model...

  5. Peculiarities of Ischemic Heart Disease Course and Treatment in Patients with Glucose Metabolism Impairment and Diabetes Mellitus

    Directory of Open Access Journals (Sweden)

    O.M. Radchenko

    2015-09-01

    Full Text Available Combination of ischemic heart disease and diabetes mellitus is characterized by certain features of clinical picture and insufficient effectiveness of treatment of ischemic heart disease. With the aim of investigation of pathogenic mechanisms and features of the clinical course of ischemic heart disease associated with glucose homeostasis violation we examined 116 patients (51 women, 65 men, median of age 63 years old with normal regulation of glucose metabolism (NRG, n = 24, changes in fasting glucose (n = 23, violated glucose tolerance (n = 21, combined violation (n = 24 and diabetes mellitus (n = 24. We also conducted their prospective observation for 40 months with the following endpoints — hospitalization because of cardiovascular complications, death from them and the emergence of diabetes. It was established that ischemic heart disease associated with prediabetic disorders and diabetes mellitus has the following peculiarities: earlier clinical manifestation in women; more frequent and severe heart failure; lower tolerance to physical load in patients with angina pectoris; atypical manifestation of ischemic pain: longer attacks, atypical localization or absent pain; frequent combination with arrhythmias and conduction disorders; frequent affection of multiple coronary arteries, which leads to myocardial infarction with complicated course; eccentric type of left ventricle remodeling; significant calcification of mitral and aortic valves of heart. The main principles of treatment of ischemic heart disease: weight loss; active correction of glucose metabolism violations using medications (metformin even at the stage of prediabetes, because in chronic stable forms of ischemic heart disease metformin significantly improves glucose metabolism, decreases insulin resistance and does not increase the incidence of cardiovascular complications and decompensations of heart failure; the basic drugs for treatment of ischemic heart disease should be

  6. Dermatologia comparativa: lesão de ataque por caravela portuguesa (Physalia physalis Comparative dermatology: skin lesion produced by attack of jellyfishes (Physalia physalis

    Directory of Open Access Journals (Sweden)

    Maria do Carmo Araújo Palmeira Queiroz

    2011-06-01

    Full Text Available Demonstra-se lesão dermatológica, em caprichoso formato de coração, característica de ataque por caravela-portuguesa, em banhista do sexo feminino, 21 anosIt is reported the case of a 21-year-old female bather with a skin lesion, heart-shaped ,characteristic of attack by jellyfish

  7. [Investigation of the presence of human metapneumovirus in patients with chronic obstructive pulmonary disease and asthma and its relationship with the attacks].

    Science.gov (United States)

    Ilvan, Ahmet; Aslan, Gönül; Serin, Mehmet Sami; Calıkoğlu, Mukadder; Yılmaz, Fatma Mehtap; Tezcan, Seda; Taş, Dilaver; Ayrık, Cüneyt; Uygungül, Evren; Sezer, Ogün; Emekdaş, Gürol

    2013-10-01

    Human metapneumovirus (hMPV), an enveloped RNA virus classified in Paramyxoviridae family, was first characterized in 2001 from children with acute respiratory tract infection. Recent studies have suggested hMPV to play a role in chronic obstructive pulmonary disease (COPD) and asthma attacks. The aims of this study were to investigate the frequency of hMPV in patients with COPD and asthma, its effects on the severity of the attacks and the relationship between demographical and clinical factors. A total of 123 patients, including 66 with COPD (45 were in attack and 21 were stable) and 57 with asthma (33 were in attack and 24 were under control) diagnosed according to the criteria of Global Initiative for Chronic Obstructive Lung Disease and the Global Strategy for Asthma Management and Prevention, respectively, were included in the study. Nasopharyngeal lavage samples collected from all of the patients have been evaluated for the presence of hMPV-RNA by using a reverse transcriptase-polymerase chain reaction (RT-PCR) targeting F gene region of the virus. hMPV-RNA positivity rates in patients with COPD and asthma were observed as 30.3% (20/66) and 31.6% (18/57), respectively, and the difference between the groups were not statistically significant (p= 1.00). When patients were compared according to their disease status, hMPV was detected in 31.1% (14/45) of patients with COPD attack and 28.6% of stable patients (p> 0.05). These rates were found as 36.4% (12/33) and 25% (6/24) in patients with asthma attack and controlled asthma, respectively (p> 0.05). Although the virus detection rates in patients with COPD and asthma attacks (26/78; 33.3%) were higher than the patients with stable/controlled disease (12/45; 26.7%), the difference was not found as statistically significant (p= 0.57). The detection rate of hMPV-RNA was 26.1% in patients who can be treated at home and hospital without any need of intensive care and mechanical ventilation, while this rate was 36

  8. Transforming Graphical System Models to Graphical Attack Models

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2016-01-01

    Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations...... approach to transforming graphical system models to graphical attack models in the form of attack trees. Based on an asset in the model, our transformations result in an attack tree that represents attacks by all possible actors in the model, after which the actor in question has obtained the asset....

  9. When Sinuses Attack! (For Kids)

    Science.gov (United States)

    ... First Aid & Safety Doctors & Hospitals Videos Recipes for Kids Kids site Sitio para niños How the Body Works ... Search English Español When Sinuses Attack! KidsHealth / For Kids / When Sinuses Attack! What's in this article? What ...

  10. Clinical Predictors of Intensive Care Unit Admission for Asthmatic Children

    Directory of Open Access Journals (Sweden)

    Mohammad Hasan Kargar Maher

    2015-07-01

    Full Text Available IntroductionChildren with severe asthma attack are a challenging group of patients who could be difficult to treat and leading to significant morbidity and mortality. Asthma attack severity is qualitatively estimated as mild, moderate and severe attacks and respiratory failure based on conditions such as respiration status, feeling of dyspnea, and the degree of unconsciousness. part of which are subjective rather than objective. We investigated clinical findings as predictors of severe attack and probable requirement for Pediatric Intensive Care Unit (PICU admission.Materials and MethodsIn a cross sectional and analytical study 120 patients with asthma attack were enrolled from April 2010 to April 2014 (80 admitted in the ward and 40 in pediatric intensive care unit. Predictors of PICU admission were investigated regarding to initial heart rate(HR, respiratory rate (RR, Arterial Oxygen Saturation(SaO2 and PaCo2 and clinically evident cyanosis.ResultsInitial heart rate(p-value=0.02, respiratory rate (p-value=0.03, Arterial Oxygen Saturation(p-value=0.02 and PaCo2(p-value=0.03 and clinically evident cyanosis were significantly different in two groups(Ward admitted and PICU admittedConclusion There was a significant correlation between initial vital sign and blood gas analysis suggesting usefulness of these factors as predictors of severe asthma attack and subsequent clinical course.

  11. Pearl Harbor bombing attack: a contamination legacy revealed in the sedimentary record

    Energy Technology Data Exchange (ETDEWEB)

    Ashwood, T.L.; Olsen, C.R.

    1988-02-01

    Sediment cores collected from Middle Loch and West Loch of Pearl Harbor were dated using fallout /sup 137/Cs and excess /sup 210/Pb and analysed for several major elements and trace metals. Results indicate that sediment deposited immediately following the 7 December, 1941, bombing attack on Pearl Harbor contained elevated levels of several trace metals.

  12. Software-based Microarchitectural Attacks

    OpenAIRE

    Gruss, Daniel

    2017-01-01

    Modern processors are highly optimized systems where every single cycle of computation time matters. Many optimizations depend on the data that is being processed. Software-based microarchitectural attacks exploit effects of these optimizations. Microarchitectural side-channel attacks leak secrets from cryptographic computations, from general purpose computations, or from the kernel. This leakage even persists across all common isolation boundaries, such as processes, containers, and virtual ...

  13. Integrating cyber attacks within fault trees

    International Nuclear Information System (INIS)

    Nai Fovino, Igor; Masera, Marcelo; De Cian, Alessio

    2009-01-01

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  14. Integrating cyber attacks within fault trees

    Energy Technology Data Exchange (ETDEWEB)

    Nai Fovino, Igor [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy)], E-mail: igor.nai@jrc.it; Masera, Marcelo [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy); De Cian, Alessio [Department of Electrical Engineering, University di Genova, Genoa (Italy)

    2009-09-15

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  15. Attack and Vulnerability Penetration Testing: FreeBSD

    Directory of Open Access Journals (Sweden)

    Abdul Hanan Abdullah

    2013-07-01

    Full Text Available Computer system security has become a major concern over the past few years. Attacks, threasts or intrusions, against computer system and network have become commonplace events. However, there are some system devices and other tools that are available to overcome the threat of these attacks. Currently, cyber attack is a major research and inevitable. This paper presents some steps of penetration in FreeBSD operating system, some tools and new steps to attack used in this experiment, probes for reconnaissance, guessing password via brute force, gaining privilege access and flooding victim machine to decrease availability. All these attacks were executed and infiltrate within the environment of Intrusion Threat Detection Universiti Teknologi Malaysia (ITD UTM data set. This work is expected to be a reference for practitioners to prepare their systems from Internet attacks.

  16. Effect of maternal age and cardiac disease severity on outcome of pregnancy in women with congenital heart disease.

    Science.gov (United States)

    Furenäs, Eva; Eriksson, Peter; Wennerholm, Ulla-Britt; Dellborg, Mikael

    2017-09-15

    There is an increasing prevalence of women with congenital heart defects reaching childbearing age. In western countries women tend to give birth at a higher age compared to some decades ago. We evaluated the CARdiac disease in PREGnancy (CARPREG) and modified World Health Organization (mWHO) risk classifications for cardiac complications during pregnancies in women with congenital heart defects and analyzed the impact of age on risk of obstetric and fetal outcome. A single-center observational study of cardiac, obstetric, and neonatal complications with data from cardiac and obstetric records of pregnancies in women with congenital heart disease. Outcomes of 496 pregnancies in 232 women, including induced abortion, miscarriage, stillbirth, and live birth were analyzed regarding complications, maternal age, mode of delivery, and two risk classifications: CARPREG and mWHO. There were 28 induced abortions, 59 fetal loss, 409 deliveries with 412 neonates. Cardiac (14%), obstetric (14%), and neonatal (15%) complications were noted, including one maternal death and five stillbirths. The rate of cesarean section was 19%. Age above 35years was of borderline importance for cardiac complications (p=0.054) and was not a significant additional risk factor for obstetric or neonatal complications. Both risk classifications had moderate clinical utility, with area under the curve (AUC) 0.71 for CARPREG and 0.65 for mWHO on cardiac complications. Pregnancy complications in women with congenital heart disease are common but severe complications are rare. Advanced maternal age does not seem to affect complication rate. Existing risk classification systems are insufficient in predicting complications. Copyright © 2017 Elsevier B.V. All rights reserved.

  17. Coping with Feelings

    Medline Plus

    Full Text Available ... a Heart Attack Treatment of a Heart Attack Life After a Heart Attack Heart Failure About Heart Failure Causes and Risks for Heart ... Cardiac Rehab? How Can I Live With Heart Failure? Medication Chart | Spanish Medical Contact List Preparing for ... Attack website Caregivers Nutrition Center Cardiac ...

  18. On Realistically Attacking Tor with Website Fingerprinting

    Directory of Open Access Journals (Sweden)

    Wang Tao

    2016-10-01

    Full Text Available Website fingerprinting allows a local, passive observer monitoring a web-browsing client’s encrypted channel to determine her web activity. Previous attacks have shown that website fingerprinting could be a threat to anonymity networks such as Tor under laboratory conditions. However, there are significant differences between laboratory conditions and realistic conditions. First, in laboratory tests we collect the training data set together with the testing data set, so the training data set is fresh, but an attacker may not be able to maintain a fresh data set. Second, laboratory packet sequences correspond to a single page each, but for realistic packet sequences the split between pages is not obvious. Third, packet sequences may include background noise from other types of web traffic. These differences adversely affect website fingerprinting under realistic conditions. In this paper, we tackle these three problems to bridge the gap between laboratory and realistic conditions for website fingerprinting. We show that we can maintain a fresh training set with minimal resources. We demonstrate several classification-based techniques that allow us to split full packet sequences effectively into sequences corresponding to a single page each. We describe several new algorithms for tackling background noise. With our techniques, we are able to build the first website fingerprinting system that can operate directly on packet sequences collected in the wild.

  19. AVQS: Attack Route-Based Vulnerability Quantification Scheme for Smart Grid

    Directory of Open Access Journals (Sweden)

    Jongbin Ko

    2014-01-01

    Full Text Available A smart grid is a large, consolidated electrical grid system that includes heterogeneous networks and systems. Based on the data, a smart grid system has a potential security threat in its network connectivity. To solve this problem, we develop and apply a novel scheme to measure the vulnerability in a smart grid domain. Vulnerability quantification can be the first step in security analysis because it can help prioritize the security problems. However, existing vulnerability quantification schemes are not suitable for smart grid because they do not consider network vulnerabilities. We propose a novel attack route-based vulnerability quantification scheme using a network vulnerability score and an end-to-end security score, depending on the specific smart grid network environment to calculate the vulnerability score for a particular attack route. To evaluate the proposed approach, we derive several attack scenarios from the advanced metering infrastructure domain. The experimental results of the proposed approach and the existing common vulnerability scoring system clearly show that we need to consider network connectivity for more optimized vulnerability quantification.

  20. AVQS: attack route-based vulnerability quantification scheme for smart grid.

    Science.gov (United States)

    Ko, Jongbin; Lim, Hyunwoo; Lee, Seokjun; Shon, Taeshik

    2014-01-01

    A smart grid is a large, consolidated electrical grid system that includes heterogeneous networks and systems. Based on the data, a smart grid system has a potential security threat in its network connectivity. To solve this problem, we develop and apply a novel scheme to measure the vulnerability in a smart grid domain. Vulnerability quantification can be the first step in security analysis because it can help prioritize the security problems. However, existing vulnerability quantification schemes are not suitable for smart grid because they do not consider network vulnerabilities. We propose a novel attack route-based vulnerability quantification scheme using a network vulnerability score and an end-to-end security score, depending on the specific smart grid network environment to calculate the vulnerability score for a particular attack route. To evaluate the proposed approach, we derive several attack scenarios from the advanced metering infrastructure domain. The experimental results of the proposed approach and the existing common vulnerability scoring system clearly show that we need to consider network connectivity for more optimized vulnerability quantification.

  1. Shark Attack Project - Marine Attack at Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Adrianus J

    2005-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  2. Relationship between serum thyroid hormones levels and heart failure in patients with coronary heart disease (CHD)

    International Nuclear Information System (INIS)

    Du Fuman; Liu Tongmei; Wang Weimin

    2006-01-01

    Objective: To investigate the relationship between serum thyroid hormones levels and severity of heart failure in patients with coronary heart disease (CHD). Methods: Serum thyroid hormones (FT 3 , FT 4 , TSH) levels were measured with RIA in 38 patients with CHD but no cardiac failure, 40 CHD patients with heat failure and 37 controls. Results: The serum FT 3 levels in patients with heart failure were significantly lower than those in the other two groups (P 4 and TSH in all these three groups of subjects. Moreover, the serum FT 3 levels in the patients with heart fail- ure were significantly positively correlated with the ejection fractions (EF) in these patients. Conclusion: Serum FT 3 levels dropped markedly in CHD patients with heart failure and the magnitude of decrease was positively correlated with the severity of the disease. (authors)

  3. Novel Method For Low-Rate Ddos Attack Detection

    Science.gov (United States)

    Chistokhodova, A. A.; Sidorov, I. D.

    2018-05-01

    The relevance of the work is associated with an increasing number of advanced types of DDoS attacks, in particular, low-rate HTTP-flood. Last year, the power and complexity of such attacks increased significantly. The article is devoted to the analysis of DDoS attacks detecting methods and their modifications with the purpose of increasing the accuracy of DDoS attack detection. The article details low-rate attacks features in comparison with conventional DDoS attacks. During the analysis, significant shortcomings of the available method for detecting low-rate DDoS attacks were found. Thus, the result of the study is an informal description of a new method for detecting low-rate denial-of-service attacks. The architecture of the stand for approbation of the method is developed. At the current stage of the study, it is possible to improve the efficiency of an already existing method by using a classifier with memory, as well as additional information.

  4. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  5. Review Of Prevention Techniques For Denial Of Service DOS Attacks In Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Poonam Rolla

    2015-08-01

    Full Text Available Wireless Sensor Networks comprised of several tiny sensor nodes which are densely deployed over the region to monitor the environmental conditions. These sensor nodes have certain design issues out of which security is the main predominant factor as it effects the whole lifetime of network. DDoS Distributed denial of service attack floods unnecessary packets in the sensor network. A review on DDoS attacks and their prevention techniques have been done in this paper.

  6. Further attacks on Yeung-Mintzer fragile watermarking scheme

    Science.gov (United States)

    Fridrich, Jessica; Goljan, Miroslav; Memon, Nasir D.

    2000-05-01

    In this paper, we describe new and improved attacks on the authentication scheme previously proposed by Yeung and Mintzer. Previous attacks assumed that the binary watermark logo inserted in an image for the purposes of authentication was known. Here we remove that assumption and show how the scheme is still vulnerable, even if the binary logo is not known but the attacker has access to multiple images that have been watermarked with the same secret key and contain the same (but unknown) logo. We present two attacks. The first attack infers the secret watermark insertion function and the binary logo, given multiple images authenticated with the same key and containing the same logo. We show that a very good approximation to the logo and watermark insertion function can be constructed using as few as two images. With color images, one needs many more images, nevertheless the attack is still feasible. The second attack we present, which we call the 'collage-attack' is a variation of the Holliman-Memon counterfeiting attack. The proposed variation does not require knowledge of the watermark logo and produces counterfeits of superior quality by means of a suitable dithering process that we develop.

  7. Pareto Efficient Solution of Attack-Defence Trees

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as

  8. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  9. Genetic attack on neural cryptography

    International Nuclear Information System (INIS)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-01-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size

  10. Genetic attack on neural cryptography

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  11. Attacks on the AJPS Mersenne-based cryptosystem

    NARCIS (Netherlands)

    K. de Boer (Koen); L. Ducas (Léo); S. Jeffery (Stacey); R. M. de Wolf (Ronald)

    2018-01-01

    textabstractAggarwal, Joux, Prakash and Santha recently introduced a new potentially quantum-safe public-key cryptosystem, and suggested that a brute-force attack is essentially optimal against it. They consider but then dismiss both Meet-in-the-Middle attacks and LLL-based attacks. Very soon after

  12. The political attack ad

    Directory of Open Access Journals (Sweden)

    Palma Peña-Jiménez, Ph.D.

    2011-01-01

    Full Text Available During election campaigns the political spot has a clear objective: to win votes. This message is communicated to the electorate through television and Internet, and usually presents a negative approach, which includes a direct critical message against the opponent, rather than an exposition of proposals. This article is focused on the analysis of the campaign attack video ad purposely created to encourage the disapproval of the political opponent among voters. These ads focus on discrediting the opponent, many times, through the transmission of ad hominem messages, instead of disseminating the potential of the political party and the virtues and manifesto of its candidate. The article reviews the development of the attack ad since its first appearance, which in Spain dates back to 1996, when the famous Doberman ad was broadcast, and examines the most memorable campaign attack ads.

  13. Robust Detection of Stepping-Stone Attacks

    National Research Council Canada - National Science Library

    He, Ting; Tong, Lang

    2006-01-01

    The detection of encrypted stepping-stone attack is considered. Besides encryption and padding, the attacker is capable of inserting chaff packets and perturbing packet timing and transmission order...

  14. A Framework for Attack-Resilient Industrial Control Systems : Attack Detection and Controller Reconfiguration

    OpenAIRE

    Paridari, Kaveh; O'Mahony, Niamh; Mady, Alie El-Din; Chabukswar, Rohan; Boubekeur, Menouer; Sandberg, Henrik

    2017-01-01

    Most existing industrial control systems (ICSs), such as building energy management systems (EMSs), were installed when potential security threats were only physical. With advances in connectivity, ICSs are now, typically, connected to communications networks and, as a result, can be accessed remotely. This extends the attack surface to include the potential for sophisticated cyber attacks, which can adversely impact ICS operation, resulting in service interruption, equipment damage, safety c...

  15. Countermeasures for unintentional and intentional video watermarking attacks

    Science.gov (United States)

    Deguillaume, Frederic; Csurka, Gabriela; Pun, Thierry

    2000-05-01

    These last years, the rapidly growing digital multimedia market has revealed an urgent need for effective copyright protection mechanisms. Therefore, digital audio, image and video watermarking has recently become a very active area of research, as a solution to this problem. Many important issues have been pointed out, one of them being the robustness to non-intentional and intentional attacks. This paper studies some attacks and proposes countermeasures applied to videos. General attacks are lossy copying/transcoding such as MPEG compression and digital/analog (D/A) conversion, changes of frame-rate, changes of display format, and geometrical distortions. More specific attacks are sequence edition, and statistical attacks such as averaging or collusion. Averaging attack consists of averaging locally consecutive frames to cancel the watermark. This attack works well for schemes which embed random independent marks into frames. In the collusion attack the watermark is estimated from single frames (based on image denoising), and averaged over different scenes for better accuracy. The estimated watermark is then subtracted from each frame. Collusion requires that the same mark is embedded into all frames. The proposed countermeasures first ensures robustness to general attacks by spread spectrum encoding in the frequency domain and by the use of an additional template. Secondly, a Bayesian criterion, evaluating the probability of a correctly decoded watermark, is used for rejection of outliers, and to implement an algorithm against statistical attacks. The idea is to embed randomly chosen marks among a finite set of marks, into subsequences of videos which are long enough to resist averaging attacks, but short enough to avoid collusion attacks. The Bayesian criterion is needed to select the correct mark at the decoding step. Finally, the paper presents experimental results showing the robustness of the proposed method.

  16. Link-layer Jamming Attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    2004-01-01

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  17. Link-layer jamming attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  18. A computer network attack taxonomy and ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-01-01

    Full Text Available of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example, after the launch of a DDOS (Distributed Denial of Service) attack, zombie computers may still connect to the target...-scrap- value-of-a-hacked-pc-revisited/ . Lancor, L., & Workman, R. (2007). Using Google Hacking to Enhance Defense Strategies. ACM SIGCSE Bulletin, 39 (1), 491-495. Lau, F., Rubin, S. H., Smith, M. H., & Trajkovic, L. (2000). Distributed Denial of Service...

  19. SiC: An Agent Based Architecture for Preventing and Detecting Attacks to Ubiquitous Databases

    Science.gov (United States)

    Pinzón, Cristian; de Paz, Yanira; Bajo, Javier; Abraham, Ajith; Corchado, Juan M.

    One of the main attacks to ubiquitous databases is the structure query language (SQL) injection attack, which causes severe damages both in the commercial aspect and in the user’s confidence. This chapter proposes the SiC architecture as a solution to the SQL injection attack problem. This is a hierarchical distributed multiagent architecture, which involves an entirely new approach with respect to existing architectures for the prevention and detection of SQL injections. SiC incorporates a kind of intelligent agent, which integrates a case-based reasoning system. This agent, which is the core of the architecture, allows the application of detection techniques based on anomalies as well as those based on patterns, providing a great degree of autonomy, flexibility, robustness and dynamic scalability. The characteristics of the multiagent system allow an architecture to detect attacks from different types of devices, regardless of the physical location. The architecture has been tested on a medical database, guaranteeing safe access from various devices such as PDAs and notebook computers.

  20. Unified communications forensics anatomy of common UC attacks

    CERN Document Server

    Grant, Nicholas Mr

    2013-01-01

    Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: analysis of forensic artifacts in common UC attacks an in-depth look at established UC technologies and attack exploits hands-on understanding of UC attack vectors and associated countermeasures

  1. SenseMyHeart: A cloud service and API for wearable heart monitors.

    Science.gov (United States)

    Pinto Silva, P M; Silva Cunha, J P

    2015-01-01

    In the era of ubiquitous computing, the growing adoption of wearable systems and body sensor networks is trailing the path for new research and software for cardiovascular intensity, energy expenditure and stress and fatigue detection through cardiovascular monitoring. Several systems have received clinical-certification and provide huge amounts of reliable heart-related data in a continuous basis. PhysioNet provides equally reliable open-source software tools for ECG processing and analysis that can be combined with these devices. However, this software remains difficult to use in a mobile environment and for researchers unfamiliar with Linux-based systems. In the present paper we present an approach that aims at tackling these limitations by developing a cloud service that provides an API for a PhysioNet-based pipeline for ECG processing and Heart Rate Variability measurement. We describe the proposed solution, along with its advantages and tradeoffs. We also present some client tools (windows and Android) and several projects where the developed cloud service has been used successfully as a standard for Heart Rate and Heart Rate Variability studies in different scenarios.

  2. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  3. Vulnerability of industrial facilities to attacks with improvised explosive devices aimed at triggering domino scenarios

    International Nuclear Information System (INIS)

    Landucci, Gabriele; Reniers, Genserik; Cozzani, Valerio; Salzano, Ernesto

    2015-01-01

    Process- and chemical plants may constitute a critical target for a terrorist attack. In the present study, the analysis of industrial accidents induced by intentional acts of interference is carried out focusing on accident chains triggered by attacks with home-made (improvised) explosives. The effects of blast waves caused by improvised explosive devices are compared with those expected from a net equivalent charge of TNT by using a specific methodology for the assessment of stand-off distances. It is demonstrated that a home-made explosive device has a TNT efficiency comprised between 0.2 and 0.5. The model was applied to a case study, demonstrating the potentiality of improvised explosives in causing accident escalation sequences and severe effects on population and assets. The analysis of the case-study also allowed obtaining suggestions for an adequate security management. - Highlights: • Improvised explosives possibly used for terrorist attacks were described. • The TNT efficiency of ANFO and TATP was characterized. • Domino effects caused by an attack with improvised explosive were analyzed. • Domino scenarios induced by an attack were compared to conventional scenarios

  4. Face Spoof Attack Recognition Using Discriminative Image Patches

    Directory of Open Access Journals (Sweden)

    Zahid Akhtar

    2016-01-01

    Full Text Available Face recognition systems are now being used in many applications such as border crossings, banks, and mobile payments. The wide scale deployment of facial recognition systems has attracted intensive attention to the reliability of face biometrics against spoof attacks, where a photo, a video, or a 3D mask of a genuine user’s face can be used to gain illegitimate access to facilities or services. Though several face antispoofing or liveness detection methods (which determine at the time of capture whether a face is live or spoof have been proposed, the issue is still unsolved due to difficulty in finding discriminative and computationally inexpensive features and methods for spoof attacks. In addition, existing techniques use whole face image or complete video for liveness detection. However, often certain face regions (video frames are redundant or correspond to the clutter in the image (video, thus leading generally to low performances. Therefore, we propose seven novel methods to find discriminative image patches, which we define as regions that are salient, instrumental, and class-specific. Four well-known classifiers, namely, support vector machine (SVM, Naive-Bayes, Quadratic Discriminant Analysis (QDA, and Ensemble, are then used to distinguish between genuine and spoof faces using a voting based scheme. Experimental analysis on two publicly available databases (Idiap REPLAY-ATTACK and CASIA-FASD shows promising results compared to existing works.

  5. Anaesthetic management of emergency pacemaker implantation in a case of neonatal lupus erythematosus with complete congenital heart block & severe respiratory distress

    Directory of Open Access Journals (Sweden)

    Usha Kiran

    2007-01-01

    Full Text Available An 8-week old 3-kilogram male baby was brought to this tertiary care hospital with respiratory distress, marked tracheal tug, poor feeding and a heart rate of 46/minute. The child had been referred from a peripheral hospital as a case of neonatal lupus with complete congenital heart block. The mother was seropositive for systemic lupus erythematosus with a history of two abortions. Evaluation on admission revealed a heart rate between 40-60/ minute, respiratory rate 40-50/ minute, inspiratory stridor, bilateral crepitations, chest retrac-tion and a marked tracheal tug that improved with prone positioning. Electrocardiography and echocardiography confirmed complete congenital heart block with cardiomegaly and mild left ventricular dysfunction. Keeping in view the impending congestive heart failure, possible early cardiomyopathy and the bad obstetric history ur-gent pacemaker implantation was planned to allow early recovery of the child. The anaesthetic risk was high due to the heart block, ventricular dysfunction, laryngomalacia, severe tracheal tug and anticipated difficult weaning from controlled ventilation. General anaesthesia was administered with endotracheal tube and con-trolled ventilation using ketamine, rocuronium and sufentanil. For patient safety invasive monitoring was pro-vided and external pacing was kept standby. Epicardial pacemaker leads were implanted onto the left ventricu-lar wall through a left anterior 6th intercostal space thoracotomy. The child was electively ventilated for two post operative days. The tracheal tug and secretions gradually subsided over 2 weeks with oxygen, antibiotics, steroids, bronchodilators and physiotherapy. At the time of discharge from hospital 2 weeks after the implant the child was feeding well, tracheal tug was minimal and the lungs were clear.

  6. Identification of the protein responsible for pyruvate transport into rat liver and heart mitochondria by specific labelling with [3H]N-phenylmaleimide.

    OpenAIRE

    Thomas, A P; Halestrap, A P

    1981-01-01

    1. N-Phenylmaleimide irreversibly inhibits pyruvate transport into rat heart and liver mitochondria to a much greater extent than does N-ethylmaleimide, iodoacetate or bromopyruvate. alpha-Cyanocinnamate protects the pyruvate transporter from attack by this thiol-blocking reagent. 2. In both heart and liver mitochondria alpha-cyanocinnamate diminishes labelling by [3H]N-phenylmaleimide of a membrane protein of subunit mol.wt. 15000 on sodium dodecyl sulphate/polyacrylamide-gel electrophoresis...

  7. Classifying network attack scenarios using an ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-03-01

    Full Text Available ) or to the target?s reputation. The Residue sub-phase refers to damage or artefacts of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example after the launch of a DDOS..., A. (1995). Hacking theft of $10 million from citibank revealed. Retrieved 10/10, 2011, from http://articles.latimes.com/1995-08-19/business/fi-36656_1_citibank-system Hurley, E. (2004). SCO site succumbs to DDoS attack. Retrieved 10/10, 2011, from...

  8. Modelling Social-Technical Attacks with Timed Automata

    DEFF Research Database (Denmark)

    David, Nicolas; David, Alexandre; Hansen, Rene Rydhof

    2015-01-01

    . In this paper we develop an approach towards modelling socio-technical systems in general and socio-technical attacks in particular, using timed automata and illustrate its application by a complex case study. Thanks to automated model checking and automata theory, we can automatically generate possible attacks...... in our model and perform analysis and simulation of both model and attack, revealing details about the specific interaction between attacker and victim. Using timed automata also allows for intuitive modelling of systems, in which quantities like time and cost can be easily added and analysed....

  9. Rethinking Heart Failure

    OpenAIRE

    F?rstenwerth, Hauke

    2012-01-01

    An increasing body of clinical observations and experimental evidence suggests that cardiac dysfunction results from autonomic dysregulation of the contractile output of the heart. Excessive activation of the sympathetic nervous system and a decrease in parasympathetic tone are associated with increased mortality. Elevated levels of circulating catecholamines closely correlate with the severity and poor prognosis in heart failure. Sympathetic over-stimulation causes increased levels of catech...

  10. Quantitative Verification and Synthesis of Attack-Defence Scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    2016-01-01

    analysis of quantitative properties of complex attack-defence scenarios, using an extension of attack-defence trees which models temporal ordering of actions and allows explicit dependencies in the strategies adopted by attackers and defenders. We adopt a game-theoretic approach, translating attack...... which guarantee or optimise some quantitative property, such as the probability of a successful attack, the expected cost incurred, or some multi-objective trade-off between the two. We implement our approach, building upon the PRISM-games model checker, and apply it to a case study of an RFID goods...

  11. Situational awareness of a coordinated cyber attack

    Science.gov (United States)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  12. Impact of severity of congenital heart diseases on university graduation rate among male patients.

    Science.gov (United States)

    Özcan, Emin Evren; Küçük, Alaattin

    2012-04-01

    This study examines university graduation rates among individuals with congenital heart disease (CHD) in comparison to their healthy peers. The effect of disease severity, type of surgery, and timing of surgery on graduation rate was also evaluated. One hundred forty-five male patients with CHD at military age were enrolled in the study between the dates of January 2005 and May 2007. Severity of disease was operationalised in term of initial diagnosis (According to classification of 32th ACC Bethesta Conference Task Force 1). University graduation rates of among two groups of CHD patients (mild disease (group 1) or moderate to severe disease (group 2)) are compared to each other and to healthy peers. Patients with CHD have reduced rates of participation in higher education compared with healthy individuals (13.1% vs 20.7%, p=0.01). Furthermore, this negative effect on education participation rate is independent of the severity of disease (group 1, 16.4%, p=0.01; group 2, 9.7%, pgraduation rate was relatively higher in patients with mild disease severity, no significant difference was found between the two patient groups (p=0.23). Having an operation does not effect graduation rate (p=0.58), however greater age at the time of operation increases the likelihood of graduation (p=0.02). Being born with CHD significantly reduces the chance of completing higher education. This negative impact on university graduation rate is independent of the severity of the disease. No negative effects of disease related surgery or subsequent corrective surgery on education were observed. Patients who were operated on later in life were more likely to complete university education. Mean operation age of this group corresponds to the typical age during the last year of elementary school in Turkey.

  13. Anti-discrimination Analysis Using Privacy Attack Strategies

    KAUST Repository

    Ruggieri, Salvatore

    2014-09-15

    Social discrimination discovery from data is an important task to identify illegal and unethical discriminatory patterns towards protected-by-law groups, e.g., ethnic minorities. We deploy privacy attack strategies as tools for discrimination discovery under hard assumptions which have rarely tackled in the literature: indirect discrimination discovery, privacy-aware discrimination discovery, and discrimination data recovery. The intuition comes from the intriguing parallel between the role of the anti-discrimination authority in the three scenarios above and the role of an attacker in private data publishing. We design strategies and algorithms inspired/based on Frèchet bounds attacks, attribute inference attacks, and minimality attacks to the purpose of unveiling hidden discriminatory practices. Experimental results show that they can be effective tools in the hands of anti-discrimination authorities.

  14. Exploratory study into the awareness of heart diseases among Emirati women (UAE) and their health seeking behaviour- a qualitative study.

    Science.gov (United States)

    Khan, Sarah; Khoory, Ayesha; Al Zaffin, Dhabia; Al Suwaidi, Meera

    2016-11-07

    Cardiovascular diseases were the leading cause of death in women in the United Arab Emirates (UAE) in 2010. The UAE is expected to experience a tripling of heart diseases in the next two decades as risk factors for heart diseases increase. Research shows that first year survival rates of younger women suffering from a heart attack are lower than in men. Women present with a wider range of symptoms for heart diseases than men; non-recognition of atypical symptoms may explain the delay in seeking treatment and poor prognosis following heart diseases in women. No known study on awareness of heart diseases among women has been carried out in the Middle Eastern region. Social constructionist and interpretivist epistemological approaches have been considered in this qualitative study to explore the awareness of heart diseases and the health seeking behavior of Emirati women. Convenience sampling was used to recruit 41 Emirati women. Three focus groups and six in-depth semi-structured interviews were conducted to obtain data. Thematic content analysis was applied to the data following transcription and translation of recordings. Emirati women had limited knowledge on heart diseases. Women were generally unaware of the atypical symptoms, commonly experienced by women however they identified most risk factors associated with heart diseases. Lack of awareness of disease severity and symptoms, sociocultural influences and distrust in the healthcare system were considered the main barriers to seeking prompt treatment. This study clearly identified gaps and inaccuracies in knowledge of heart diseases, which could contribute to delayed health seeking action and possibly poorer prognosis among Emirati women. Absence of initiatives to educate women on cardiovascular diseases in UAE has erroneously deemed it a less serious concern among Emirati women. The findings from this study provide clear indications of the need to increase accountability of the healthcare system and to

  15. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  16. Simulation of Attacks for Security in Wireless Sensor Network.

    Science.gov (United States)

    Diaz, Alvaro; Sanchez, Pablo

    2016-11-18

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node's software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work.

  17. Simulation of Attacks for Security in Wireless Sensor Network

    Science.gov (United States)

    Diaz, Alvaro; Sanchez, Pablo

    2016-01-01

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node’s software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work. PMID:27869710

  18. Human Heart Pulse Wave Responses Measured Simultaneously at Several Sensor Placements by Two MR-Compatible Fibre Optic Methods

    Directory of Open Access Journals (Sweden)

    Teemu Myllylä

    2012-01-01

    Full Text Available This paper presents experimental measurements conducted using two noninvasive fibre optic methods for detecting heart pulse waves in the human body. Both methods can be used in conjunction with magnetic resonance imaging (MRI. For comparison, the paper also performs an MRI-compatible electrocardiogram (ECG measurement. By the simultaneous use of different measurement methods, the propagation of pressure waves generated by each heart pulse can be sensed extensively in different areas of the human body and at different depths, for example, on the chest and forehead and at the fingertip. An accurate determination of a pulse wave allows calculating the pulse transit time (PTT of a particular heart pulse in different parts of the human body. This result can then be used to estimate the pulse wave velocity of blood flow in different places. Both measurement methods are realized using magnetic resonance-compatible fibres, which makes the methods applicable to the MRI environment. One of the developed sensors is an extraordinary accelerometer sensor, while the other one is a more common sensor based on photoplethysmography. All measurements, involving several test patients, were performed both inside and outside an MRI room. Measurements inside the MRI room were conducted using a 3-Tesla strength closed MRI scanner in the Department of Diagnostic Radiology at the Oulu University Hospital.

  19. Security and Risk Analysis of Nuclear Safeguards Instruments Using Attack Trees

    International Nuclear Information System (INIS)

    Naumann, I.; Wishard, B.

    2015-01-01

    The IAEA's nuclear safeguards instruments must be frequently evaluated against attack vectors, which are extremely varied and, at first approximation, may seem inconsequential, but are not. To accurately analyze the impact of attacks on a multi-component system requires a highly structured and well-documented assessment. Tree structures, such as fault trees, have long been used to assess the consequences of selecting potential solutions and their impact on risk. When applied to security threats by introducing threat agents (adversaries) and vulnerabilities, this approach can be extremely valuable in uncovering previously unidentified risks and identifying mitigation steps. This paper discusses how attack trees can be used for the security analysis of nuclear safeguards instruments. The root node of such a tree represents an objective that negatively impacts security such as disclosing and/or falsifying instrument data or circumventing safeguards methods. Usually, this objective is rather complex and attaining it requires a combination of several security breaches which may vary on how much funding or what capabilities are required in order to execute them. Thus, it is necessary to break the root objective into smaller, less complex units. Once a leaf node describes a reasonably comprehensible action, it is the security experts' task to allocate levels of difficulty and funding to this node. Eventually, the paths from the leaf nodes to the root node describe all possible combinations of actions necessary to carry out a successful attack. The use of a well-structured attack tree facilitates the developer in thinking like the adversary providing more effective security solutions. (author)

  20. Using agility to combat cyber attacks.

    Science.gov (United States)

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  1. Heart failure severity, as determined by loop diuretic dosages, predicts the risk of developing diabetes after myocardial infarction: a nationwide cohort study

    DEFF Research Database (Denmark)

    Andersson, Charlotte; Norgaard, Mette Lykke; Hansen, Peter R

    2010-01-01

    Heart failure (HF) is associated with increased insulin resistance, but the consequences of HF for development of diabetes are not well studied. The aim of the present study was to investigate the relationship between HF severity and risk of developing diabetes in a nationwide cohort of patients ...

  2. Plant Responses to Pathogen Attack: Small RNAs in Focus.

    Science.gov (United States)

    Islam, Waqar; Noman, Ali; Qasim, Muhammad; Wang, Liande

    2018-02-08

    Small RNAs (sRNA) are a significant group of gene expression regulators for multiple biological processes in eukaryotes. In plants, many sRNA silencing pathways produce extensive array of sRNAs with specialized roles. The evidence on record advocates for the functions of sRNAs during plant microbe interactions. Host sRNAs are reckoned as mandatory elements of plant defense. sRNAs involved in plant defense processes via different pathways include both short interfering RNA (siRNA) and microRNA (miRNA) that actively regulate immunity in response to pathogenic attack via tackling pathogen-associated molecular patterns (PAMPs) and other effectors. In response to pathogen attack, plants protect themselves with the help of sRNA-dependent immune systems. That sRNA-mediated plant defense responses play a role during infections is an established fact. However, the regulations of several sRNAs still need extensive research. In this review, we discussed the topical advancements and findings relevant to pathogen attack and plant defense mediated by sRNAs. We attempted to point out diverse sRNAs as key defenders in plant systems. It is hoped that sRNAs would be exploited as a mainstream player to achieve food security by tackling different plant diseases.

  3. A novel proposed network security management approach for cyber attacks

    International Nuclear Information System (INIS)

    Ahmed, Z.; Nazir, B.; Zafar, M.F.; Anwar, M.M.; Azam, K.; Asar, A.U.

    2007-01-01

    Network security is a discipline that focuses on securing networks from unauthorized access. Given the Escalating threats of malicious cyber attacks, modern enterprises employ multiple lines of defense. A comprehensive defense strategy against such attacks should include (I) an attack detection component that deter- mines the fact that a program is compromised, (2) an attack identification and prevention component that identifies attack packets so that one can block such packets in the future and prevents the attack from further propagation. Over the last decade, a significant amount of research has been vested in the systems that can detect cyber attacks either statically at compile time or dynamically at run time, However, not much effort is spent on automated attack packet identification or attack prevention. In this paper we present a unified solution to the problems mentioned above. We implemented this solution after the forward engineering of Open Source Security Information Management (OSSIM) system called Preventive Information Security management (PrISM) system that correlates input from different sensors so that the resulting product can automatically detect any cyber attack against it and prevents by identifying the actual attack packet(s). The PrISM was always able to detect the attacks, identify the attack packets and most often prevent by blocking the attacker's IP address to continue normal execution. There is no additional run-time performance overhead for attack prevention. (author)

  4. An Acuity Tool for Heart Failure Case Management: Quantifying Workload, Service Utilization, and Disease Severity.

    Science.gov (United States)

    Kilgore, Matthew D

    The cardiology service line director at a health maintenance organization (HMO) in Washington State required a valid, reliable, and practical means for measuring workloads and other productivity factors for six heart failure (HF) registered nurse case managers located across three geographical regions. The Kilgore Heart Failure Case Management (KHFCM) Acuity Tool was systematically designed, developed, and validated to measure workload as a dependent function of the number of heart failure case management (HFCM) services rendered and the duration of times spent on various care duties. Research and development occurred at various HMO-affiliated internal medicine and cardiology offices throughout Western Washington. The concepts, methods, and principles used to develop the KHFCM Acuity Tool are applicable for any type of health care professional aiming to quantify workload using a high-quality objective tool. The content matter, scaling, and language on the KHFCM Acuity Tool are specific to HFCM settings. The content matter and numeric scales for the KHFCM Acuity Tool were developed and validated using a mixed-method participant action research method applied to a group of six outpatient HF case managers and their respective caseloads. The participant action research method was selected, because the application of this method requires research participants to become directly involved in the diagnosis of research problems, the planning and execution of actions taken to address those problems, and the implementation of progressive strategies throughout the course of the study, as necessary, to produce the most credible and practical practice improvements (; ; ; ). Heart failure case managers served clients with New York Heart Association Functional Class III-IV HF (), and encounters were conducted primarily by telephone or in-office consultation. A mix of qualitative and quantitative results demonstrated a variety of quality improvement outcomes achieved by the design

  5. Adaptive optimisation-offline cyber attack on remote state estimator

    Science.gov (United States)

    Huang, Xin; Dong, Jiuxiang

    2017-10-01

    Security issues of cyber-physical systems have received increasing attentions in recent years. In this paper, deception attacks on the remote state estimator equipped with the chi-squared failure detector are considered, and it is assumed that the attacker can monitor and modify all the sensor data. A novel adaptive optimisation-offline cyber attack strategy is proposed, where using the current and previous sensor data, the attack can yield the largest estimation error covariance while ensuring to be undetected by the chi-squared monitor. From the attacker's perspective, the attack is better than the existing linear deception attacks to degrade the system performance. Finally, some numerical examples are provided to demonstrate theoretical results.

  6. Cyber-physical attacks a growing invisible threat

    CERN Document Server

    Loukas, George

    2015-01-01

    Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building's lights, make a car veer off the road,  or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism. The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means. Perpetrators can now cause damage without the same risk, and without the political, social, or moral

  7. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  8. The association of vitamin D, cathelicidin, and vitamin D binding protein with acute asthma attacks in children.

    Science.gov (United States)

    Arikoglu, Tugba; Kuyucu, Semanur; Karaismailoglu, Eda; Batmaz, Sehra Birgul; Balci, Senay

    2015-01-01

    Recent evidence about the various effects of vitamin D (vit D) on innate and adaptive immunity has led to a search for the role of vit D in asthma. It is postulated that a decrease in cathelicidin, a multifunctional host defense molecule, production due to low vit D status may predispose to infectious complications in children with asthma. The aim of this study was to determine the association of vit D, vit D-binding protein (VDBP) and cathelicidin with acute asthma attacks among children with allergic asthma. This prospective study included 35 patients with acute asthma attack and 32 children with controlled asthma, and all were matched by sampling season, sensitization to mites, and previous severity of asthma. A comprehensive questionnaire about risk factors, blood sampling for 25-hydroxyvitamin D vit D, VDBP, and cathelicidin levels; spirometric indices were used. Factors that influence serum vit D and cathelicidin levels and the development of asthma attacks were evaluated with multivariate analysis. The mean serum vit D levels of the attack group was significantly lower than that of the controlled asthma group (p asthma group than with the controlled subjects with asthma (p = 0.002). There was no difference between the acute and controlled asthma groups in terms of markers of allergy and serum VDBP levels. Risk factors that may influence vit D levels revealed that body mass index (BMI) (p = 0.038), duration of sun exposure (p asthma showed that low serum levels of vit D were significantly related to the risk of asthma attacks (p asthma attacks and BMI. Vit D deficiency showed a significant relationship to the development of asthma attacks independent of cathelicidin deficiency and other factors associated with the severity of chronic asthma.

  9. [Definition of acute heart failure].

    Science.gov (United States)

    Metra, Marco; Carbone, Giorgio; Lombardi, Carlo; Borghi, Claudio; Vescovo, Giorgio

    2014-02-01

    Acute heart failure (AHF) is a potentially life-threatening condition that may arise as a deterioration of a previous heart failure or may be the first presentation of heart failure. Several causes or precipitating factors have been listed, as well as different mechanisms have been described, thus leading to a broad spectrum of clinical presentations. Symptoms and signs of AHF have a strong clinical and prognostic significance and are kept into consideration to guide disease management. In particular, a higher clinical severity or a worse prognosis are associated with lower blood pressure levels, fluid overload, evidence of myocardial ischemia or renal impairment. Putatively, interventions addressed to restore these factors may play a role in the management of AHF.

  10. A fatal elephant attack.

    Science.gov (United States)

    Hejna, Petr; Zátopková, Lenka; Safr, Miroslav

    2012-01-01

    A rare case of an elephant attack is presented. A 44-year-old man working as an elephant keeper was attacked by a cow elephant when he tripped over a foot chain while the animal was being medically treated. The man fell down and was consequently repeatedly attacked with elephant tusks. The man sustained multiple stab injuries to both groin regions, a penetrating injury to the abdominal wall with traumatic prolapse of the loops of the small bowel, multiple defects of the mesentery, and incomplete laceration of the abdominal aorta with massive bleeding into the abdominal cavity. In addition to the penetrating injuries, the man sustained multiple rib fractures with contusion of both lungs and laceration of the right lobe of the liver, and comminuted fractures of the pelvic arch and left femoral body. The man died shortly after he had been received at the hospital. The cause of death was attributed to traumatic shock. © 2011 American Academy of Forensic Sciences.

  11. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  12. Associations between DSM-IV mental disorders and subsequent heart disease onset: beyond depression

    Science.gov (United States)

    Scott, Kate M.; de Jonge, Peter; Alonso, Jordi; Viana, Maria Carmen; Liu, Zhaorui; O’Neill, Siobhan; Aguilar-Gaxiola, Sergio; Bruffaerts, Ronny; Caldas-de-Almeida, Jose Miguel; Stein, Dan J.; de Girolamo, Giovanni; Florescu, Silvia E.; Hu, Chiyi; Taib, Nezar Ismet; Lépine, Jean-Pierre; Levinson, Daphna; Matschinger, Herbert; Medina-Mora, Maria Elena; Piazza, Marina; Posada-Villa, José A.; Uda, Hidenori; Wojtyniak, Bogdan J.; Lim, Carmen C. W.; Kessler, Ronald C.

    2013-01-01

    Background Prior studies on the depression-heart disease association have not usually used diagnostic measures of depression, nor taken other mental disorders into consideration. As a result, it is not clear whether the association between depression and heart disease onset reflects a specific association, or the comorbidity between depression and other mental disorders. Additionally, the relative magnitude of associations of a range of mental disorders with heart disease onset is unknown. Methods Face-to-face household surveys were conducted in 19 countries (n=52,095; person years=2,141,194). The Composite International Diagnostic Interview retrospectively assessed lifetime prevalence and age at onset of 16 DSM-IV mental disorders. Heart disease was indicated by self-report of physician’s diagnosis, or self-report of heart attack, together with their timing (year). Survival analyses estimated associations between first onset of mental disorders and subsequent heart disease onset. Results After comorbidity adjustment, depression, panic disorder, specific phobia, post-traumatic stress disorder and alcohol use disorders were associated with heart disease onset (ORs 1.3–1.6). Increasing number of mental disorders was associated with heart disease in a dose-response fashion. Mood disorders and alcohol abuse were more strongly associated with earlier onset than later onset heart disease. Associations did not vary by gender. Conclusions Depression, anxiety and alcohol use disorders were significantly associated with heart disease onset; depression was the weakest predictor. If confirmed in future prospective studies, the breadth of psychopathology’s links with heart disease onset has substantial clinical and public health implications. PMID:23993321

  13. Associations between DSM-IV mental disorders and subsequent heart disease onset: beyond depression.

    Science.gov (United States)

    Scott, Kate M; de Jonge, Peter; Alonso, Jordi; Viana, Maria Carmen; Liu, Zhaorui; O'Neill, Siobhan; Aguilar-Gaxiola, Sergio; Bruffaerts, Ronny; Caldas-de-Almeida, Jose Miguel; Stein, Dan J; de Girolamo, Giovanni; Florescu, Silvia E; Hu, Chiyi; Taib, Nezar Ismet; Lépine, Jean-Pierre; Levinson, Daphna; Matschinger, Herbert; Medina-Mora, Maria Elena; Piazza, Marina; Posada-Villa, José A; Uda, Hidenori; Wojtyniak, Bogdan J; Lim, Carmen C W; Kessler, Ronald C

    2013-10-15

    Prior studies on the depression-heart disease association have not usually used diagnostic measures of depression, or taken other mental disorders into consideration. As a result, it is not clear whether the association between depression and heart disease onset reflects a specific association, or the comorbidity between depression and other mental disorders. Additionally, the relative magnitude of associations of a range of mental disorders with heart disease onset is unknown. Face-to-face household surveys were conducted in 19 countries (n=52,095; person years=2,141,194). The Composite International Diagnostic Interview retrospectively assessed lifetime prevalence and age at onset of 16 DSM-IV mental disorders. Heart disease was indicated by self-report of physician's diagnosis, or self-report of heart attack, together with their timing (year). Survival analyses estimated associations between first onset of mental disorders and subsequent heart disease onset. After comorbidity adjustment, depression, panic disorder, specific phobia, post-traumatic stress disorder and alcohol use disorders were associated with heart disease onset (ORs 1.3-1.6). Increasing number of mental disorders was associated with heart disease in a dose-response fashion. Mood disorders and alcohol abuse were more strongly associated with earlier onset than later onset heart disease. Associations did not vary by gender. Depression, anxiety and alcohol use disorders were significantly associated with heart disease onset; depression was the weakest predictor. If confirmed in future prospective studies, the breadth of psychopathology's links with heart disease onset has substantial clinical and public health implications. © 2013.

  14. Coping with Feelings

    Medline Plus

    Full Text Available ... for Heart.org Arrhythmia About Arrhythmia Why Arrhythmia Matters Understand Your Risk for Arrhythmia Symptoms, Diagnosis & Monitoring ... Heart Attack Treatment of a Heart Attack Life After a Heart Attack Heart Failure About Heart Failure ...

  15. Communicating with Professionals

    Medline Plus

    Full Text Available ... for Heart.org Arrhythmia About Arrhythmia Why Arrhythmia Matters Understand Your Risk for Arrhythmia Symptoms, Diagnosis & Monitoring ... Heart Attack Treatment of a Heart Attack Life After a Heart Attack Heart Failure About Heart Failure ...

  16. Coping with Feelings

    Medline Plus

    Full Text Available ... a Heart Attack Treatment of a Heart Attack Life After a Heart Attack Heart Failure About Heart ... or because you feel less control over your life. Every heart patient has some degree of fear, ...

  17. Machine Learning Methods for Attack Detection in the Smart Grid.

    Science.gov (United States)

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.

  18. Application distribution model and related security attacks in VANET

    Science.gov (United States)

    Nikaein, Navid; Kanti Datta, Soumya; Marecar, Irshad; Bonnet, Christian

    2013-03-01

    In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker`s model as an extension to the work done in [6]. Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e.g. malware, spamming and phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.

  19. Nonepileptic attack disorder among married women.

    Science.gov (United States)

    Dhanaraj, M; Rangaraj, R; Arulmozhi, T; Vengatesan, A

    2005-06-01

    To study the clinical features, precipitating stressful life events and prognosis of nonepileptic attack disorder (NEAD) among married women. Prospective cohort study with 1-year follow-up. A tertiary care teaching hospital. Of the 1020 patients with epilepsy referred to the epilepsy clinic during 2002-2003, 30 were married women with NEAD. The diagnostic criteria for NEAD included normal EEG during ictal and post-ictal phase of the generalized 'attack.' The data collected included clinical characteristics, semiology of the attacks, precipitating stressful events, and co-morbid psychiatric disorders. The control group included 30 age-matched married women with generalized tonic-clonic seizures. The long-term outcome and factors influencing the outcomes were analyzed. The mean duration of illness was 18 months, and the pattern of the attack was 'fall and lying still' in 53% and 'fall with generalized motor movements' in 47%. The frequency was one or more per week in 57% and occasionally in 43%. The important stressful events were matrimonial discord following illegal relationship of the husband with another woman (chi2 = 9.02, P = 0.003) and constant quarrel with other family members (chi2 = 5.19, P = 0.02). The prevalence of sexual abuse was low (7%). Co-morbid psychiatric disorder was observed in 70%. At the end of 1 year, 39% were free from the attack. Resolution of the stressful life events (chi2 = 4.52, P = 0.03) and lower frequency of attack at the time of reporting (chi2 = 3.88, P = 0.05) correlated with good outcomes. Among patients with NEAD in India, the major precipitating factors were matrimonial discord following illegal relationship of the husband with another woman and constant quarrel with other family members and not sexual abuse. Women with low frequency of attack at the time of reporting and the remission of the stressful events had better outcomes.

  20. Subclinical endophthalmitis following a rooster attack.

    Science.gov (United States)

    Lekse Kovach, Jaclyn; Maguluri, Srilakshmi; Recchia, Franco M

    2006-12-01

    Ocular injury resulting from rooster attacks is rarely reported in the literature. Sadly, the target of these attacks is most often children younger than 3 years old, whose naiveté of the aggressive, territorial behavior of birds can place them at risk. Acute sequelae of these attacks can result in a lifetime of visual impairment. The possibility of a subacute or occult infection is an unusual occurrence that must always be considered. In an effort to prevent future attacks and ocular casualties, we present a case of a 12-month-old boy who suffered an open globe following a rooster attack. The open globe was emergently repaired. One week later, a white cataract was noticed on examination in the absence of systemic or ocular signs of inflammation. Traumatic endophthalmitis and lenticular abscess were suspected during examination under anesthesia. Vitrectomy, lensectomy, and injection of intravitreal antibiotics were performed. Culture of lenticular and vitreous aspirates grew alpha-streptococcus. Alpha-streptococcal endophthalmitis can result from ocular injuries caused by rooster pecking. The infection may present insidiously and without typical ocular or systemic symptoms or signs. Management is challenging and may require surgery.

  1. Robustness analysis of interdependent networks under multiple-attacking strategies

    Science.gov (United States)

    Gao, Yan-Li; Chen, Shi-Ming; Nie, Sen; Ma, Fei; Guan, Jun-Jie

    2018-04-01

    The robustness of complex networks under attacks largely depends on the structure of a network and the nature of the attacks. Previous research on interdependent networks has focused on two types of initial attack: random attack and degree-based targeted attack. In this paper, a deliberate attack function is proposed, where six kinds of deliberate attacking strategies can be derived by adjusting the tunable parameters. Moreover, the robustness of four types of interdependent networks (BA-BA, ER-ER, BA-ER and ER-BA) with different coupling modes (random, positive and negative correlation) is evaluated under different attacking strategies. Interesting conclusions could be obtained. It can be found that the positive coupling mode can make the vulnerability of the interdependent network to be absolutely dependent on the most vulnerable sub-network under deliberate attacks, whereas random and negative coupling modes make the vulnerability of interdependent network to be mainly dependent on the being attacked sub-network. The robustness of interdependent network will be enhanced with the degree-degree correlation coefficient varying from positive to negative. Therefore, The negative coupling mode is relatively more optimal than others, which can substantially improve the robustness of the ER-ER network and ER-BA network. In terms of the attacking strategies on interdependent networks, the degree information of node is more valuable than the betweenness. In addition, we found a more efficient attacking strategy for each coupled interdependent network and proposed the corresponding protection strategy for suppressing cascading failure. Our results can be very useful for safety design and protection of interdependent networks.

  2. Optimizing power system investments and resilience against attacks

    International Nuclear Information System (INIS)

    Fang, Yiping; Sansavini, Giovanni

    2017-01-01

    This paper studies the combination of capacity expansion and switch installation in electric systems that ensures optimum performance under nominal operations and attacks. The planner–attacker–defender model is adopted to develop decisions that minimize investment and operating costs, and functionality loss after attacks. The model bridges long-term system planning for transmission expansion and short-term switching operations in reaction to attacks. The mixed-integer optimization is solved by decomposition via two-layer cutting plane algorithm. Numerical results on an IEEE system shows that small investments in transmission line switching enhance resilience by responding to disruptions via system reconfiguration. Sensitivity analyses show that transmission planning under the assumption of small-scale attacks provides the most robust strategy, i.e. the minimum-regret planning, if many constraints and limited investment budget affect the planning. On the other hand, the assumption of large-scale attacks provides the most robust strategy if the planning process involves large flexibility and budget. - Highlights: • Investment optimization in power systems under attacks is presented. • Capacity expansion and switch installation for system reconfiguration are combined. • The problem is solved by decomposition via two-layer cutting plane algorithm. • Small investments in switch installation enhance resilience by response to attacks. • Sensitivity analyses identify robust planning against different attack scenarios.

  3. Attacker Modelling in Ubiquitous Computing Systems

    DEFF Research Database (Denmark)

    Papini, Davide

    in with our everyday life. This future is visible to everyone nowadays: terms like smartphone, cloud, sensor, network etc. are widely known and used in our everyday life. But what about the security of such systems. Ubiquitous computing devices can be limited in terms of energy, computing power and memory...... attacker remain somehow undened and still under extensive investigation. This Thesis explores the nature of the ubiquitous attacker with a focus on how she interacts with the physical world and it denes a model that captures the abilities of the attacker. Furthermore a quantitative implementation...

  4. Peacetime Use of Computer Network Attack

    National Research Council Canada - National Science Library

    Busby, Daniel

    2000-01-01

    .... PDD-63 alerts the nation to prepare for impending cyber attacks. This paper examines the nature, scale, and likelihood of cyber attacks posited in PDD-63 and finds that the country does not face an imminent "electronic Pearl Harbor...

  5. A Bernoulli Gaussian Watermark for Detecting Integrity Attacks in Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Weerakkody, Sean [Carnegie Mellon Univ., Pittsburgh, PA (United States); Ozel, Omur [Carnegie Mellon Univ., Pittsburgh, PA (United States); Sinopoli, Bruno [Carnegie Mellon Univ., Pittsburgh, PA (United States)

    2017-11-02

    We examine the merit of Bernoulli packet drops in actively detecting integrity attacks on control systems. The aim is to detect an adversary who delivers fake sensor measurements to a system operator in order to conceal their effect on the plant. Physical watermarks, or noisy additive Gaussian inputs, have been previously used to detect several classes of integrity attacks in control systems. In this paper, we consider the analysis and design of Gaussian physical watermarks in the presence of packet drops at the control input. On one hand, this enables analysis in a more general network setting. On the other hand, we observe that in certain cases, Bernoulli packet drops can improve detection performance relative to a purely Gaussian watermark. This motivates the joint design of a Bernoulli-Gaussian watermark which incorporates both an additive Gaussian input and a Bernoulli drop process. We characterize the effect of such a watermark on system performance as well as attack detectability in two separate design scenarios. Here, we consider a correlation detector for attack recognition. We then propose efficiently solvable optimization problems to intelligently select parameters of the Gaussian input and the Bernoulli drop process while addressing security and performance trade-offs. Finally, we provide numerical results which illustrate that a watermark with packet drops can indeed outperform a Gaussian watermark.

  6. PrECast: An Efficient Crypto-Free Solution for Broadcast-Based Attacks in IPv4 Networks

    Directory of Open Access Journals (Sweden)

    Dalal Hanna

    2018-05-01

    Full Text Available Broadcasting is one of the essential features in the Internet Protocol Ver 4 (IPv4. Attackers often exploit this feature of the IP protocol to launch several attacks against a network or an individual host. Attackers may either be a part of a Local Area Network (LAN or outside a LAN to launch these attacks. There are numerous papers available in the literature to solve problems resulting from IP broadcasting. However, all these solutions target a specific problem that results from IP broadcasting. Furthermore, these solutions use either a computationally-intensive cryptographic scheme, the a priori relation between the host and the network or a modified protocol stack at every host. In this paper, we provide a seamless and transparent solution to eliminate IP broadcasting and thus eliminate all problems related to IP broadcasting. Our proposed solution is crypto-free and does not need any modification to the protocol stack.

  7. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    Directory of Open Access Journals (Sweden)

    Khaled Elleithy

    2005-02-01

    Full Text Available A denial of service attack (DOS is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack will be simulated against a Microsoft Windows 95 computer. The TCP SYN Flood attack will be simulated against a Microsoft Windows 2000 IIS FTP Server. Distributed DOS will be demonstrated by simulating a distribution zombie program that will carry the Ping of Death attack. This paper will demonstrate the potential damage from DOS attacks and analyze the ramifications of the damage.

  8. Attacks on IEEE 802.11 wireless networks

    Directory of Open Access Journals (Sweden)

    Dejan Milan Tepšić

    2013-06-01

    Full Text Available Security of wireless computer networks was initially secured with the WEP security protocol, which relies on the RC4 encryption algorithm and the CRC algorithm to check the integrity. The basic problems of the WEP are a short initialization vector, unsafe data integrity checking, using a common key, the lack of mechanisms for management and exchange of keys, the lack of protection from the endless insertion of the same package into the network, the lack of authentication of access points and the like. The consequences of these failures are easy attacks against the WEP network, namely their complete insecurity. Therefore, the work began on the IEEE 802.11i protocol, which should radically improve the security of wireless networks. Since the development of a protocol lasted, the WPA standard was released to offset the security gap caused by the WEP. The WPA also relies on RC4 and CRC algorithms, but brings temporary keys and the MIC algorithm for data integrity. The 802.1X authentication was introduced and common keys are no longer needed, since it is possible to use an authentication server. The length of the initialization vector was increased and the vector is obtained based on the packet serial number, in order to prevent the insertion of the same packet into the network. The weakness of the WPA security mechanism is the use of a common key. WPA2 (802.11i later appeared. Unlike the WPA mechanism that worked on old devices with the replacement of software, WPA2 requires new network devices that can perform AES encryption. AES replaces the RC4 algorithm and delivers much greater security. Data integrity is protected by encryption. Despite progress, there are still weaknesses in wireless networks. Attacks for denial of service are possible as well as spoofing package headers attacks. For now, it is not advisable to use wireless networks in environments where unreliability and unavailability are not tolerated. Introduction In the entire history of

  9. Temporal Cyber Attack Detection.

    Energy Technology Data Exchange (ETDEWEB)

    Ingram, Joey Burton [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Draelos, Timothy J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Galiardi, Meghan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Doak, Justin E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Rigorous characterization of the performance and generalization ability of cyber defense systems is extremely difficult, making it hard to gauge uncertainty, and thus, confidence. This difficulty largely stems from a lack of labeled attack data that fully explores the potential adversarial space. Currently, performance of cyber defense systems is typically evaluated in a qualitative manner by manually inspecting the results of the system on live data and adjusting as needed. Additionally, machine learning has shown promise in deriving models that automatically learn indicators of compromise that are more robust than analyst-derived detectors. However, to generate these models, most algorithms require large amounts of labeled data (i.e., examples of attacks). Algorithms that do not require annotated data to derive models are similarly at a disadvantage, because labeled data is still necessary when evaluating performance. In this work, we explore the use of temporal generative models to learn cyber attack graph representations and automatically generate data for experimentation and evaluation. Training and evaluating cyber systems and machine learning models requires significant, annotated data, which is typically collected and labeled by hand for one-off experiments. Automatically generating such data helps derive/evaluate detection models and ensures reproducibility of results. Experimentally, we demonstrate the efficacy of generative sequence analysis techniques on learning the structure of attack graphs, based on a realistic example. These derived models can then be used to generate more data. Additionally, we provide a roadmap for future research efforts in this area.

  10. 12 CFR 263.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  11. 12 CFR 509.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding....17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  12. Detection of complex cyber attacks

    Science.gov (United States)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  13. LEVERAGING TREATMENT OF SALT ATTACK AND RISING DAMP IN HERITAGE BUILDINGS IN PENANG, MALAYSIA

    Directory of Open Access Journals (Sweden)

    Haris Fadzilah Abdul Rahman

    2010-06-01

    Full Text Available Of the common building defects that occur in heritage buildings in Penang, Malaysia, salt attack and rising damp are considered the most challenging, particularly for building conservation. The problem of salt attack is closely associated with rising damp. Moisture from the rising damp makes the building’s existing salts soluble, or ground water that contains salt finds its way through the building wall. This moisture then evaporates on or just below the wall’s surface, leaving salt residue behind. High salt concentrations in masonry walls cause extensive fretting and crumbling of the lower parts of walls. These formations gradually contribute to building dilapidation and reduce the building’s aesthetic value. Sodium chloride and calcium sulphate are commonly found in masonry walls, apart from other forms of salts. The sources of these salts may be natural or manmade. This paper is based on research into the problems of salt attack and rising damp in heritage masonry buildings in Penang, Malaysia. Based on a case study of five buildings in Penang, the research findings showed that these buildings faced several common building defects, including salt attack and rising damp. Treatment guidelines for salt attack and rising damp are proposed within the Malaysian context of architectural heritage and climatic conditions.

  14. Hydrogen attack of pressure-vessel steel. Progress report, April 1, 1980-March 31, 1981

    International Nuclear Information System (INIS)

    Shewmon, P.G.

    1980-12-01

    The nucleation and growth of methane bubbles in the hydrogen attack of pressure vessel steel has been shown to obey models developed to describe the growth of bubbles limiting the creep ductility of metals. This has been done through studies of the effect of prior deformation on bubble nucleation as well as the effect of methane pressure (stress) and temperature on growth kinetics. A comprehensive model of the factors limiting growth has been developed. Its application to the hydrogen attack of a 2 1/4 Cr-1 Mo steel leads to several interesting predictions

  15. Vulnerability Assessment by Learning Attack Specifications in Graphs

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; Lopes, Raul H.C.

    This paper presents an evolutionary approach for learning attack specifications that describe attack scenarios. The objective is to find vulnerabilities in computer networks which minimise the cost of an attack with maximum impact. Although we focus on Insider Threat, the proposed approach applies

  16. [Terrorist attack trauma - an individual entity of polytrauma : A 10-year update].

    Science.gov (United States)

    Güsgen, C; Franke, A; Hentsch, S; Kollig, E; Schwab, R

    2017-10-01

    The incidence of terrorist attacks is increasing worldwide, and they have also become a permanent threat in European cities. Due to its complexity, terrorist attack trauma places high demands on the strategy of surgical treatment. The combination of various mechanisms, explosions and gunshot injuries, with the characteristic pressure (blast) damage and a high proportion of penetrating trauma with simultaneous burns are characteristic features. Unlike in military conflicts, injuries to people of all ages and without ballistic body protection (body armor) are to be expected. The mechanism of the attack and its local conditions are of relevance for the assessment of the situation and the expected injury patterns. Thus, suicide attacks result in several times higher numbers of fatalities and casualties. Explosions on free ground lead to different types of injury than those in closed or semi-enclosed spaces. The treatment principles of the Advanced Trauma Life Support (ATLS®) are based on the intrahospital care of casualties as well as damage control strategies with trigger factors. In order to prepare and educate clinics and surgeons in Germany for such scenarios, various course formats of the professional societies, the German Society for General and Visceral Surgery (DGAV) and the German Society for Trauma Surgery (DGU) have now been established.

  17. Attack Tree Generation by Policy Invalidation

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Naeem Akram, R.; Jajodia, S.

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identi﬿cation. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identi﬿ed

  18. Bisoprolol for congestive heart failure

    DEFF Research Database (Denmark)

    Rosenberg, J.; Gustafsson, F.

    2008-01-01

    was obtained from the FDA website. Conclusion: Bisoprolol is an effective and well-tolerated first-line beta-blocker for patients with systolic heart failure. The knowledge is primarily based on study patients with moderate-to-severe heart failure from the three CIBIS trials Udgivelsesdato: 2008/2...

  19. Neural network classifier of attacks in IP telephony

    Science.gov (United States)

    Safarik, Jakub; Voznak, Miroslav; Mehic, Miralem; Partila, Pavol; Mikulec, Martin

    2014-05-01

    Various types of monitoring mechanism allow us to detect and monitor behavior of attackers in VoIP networks. Analysis of detected malicious traffic is crucial for further investigation and hardening the network. This analysis is typically based on statistical methods and the article brings a solution based on neural network. The proposed algorithm is used as a classifier of attacks in a distributed monitoring network of independent honeypot probes. Information about attacks on these honeypots is collected on a centralized server and then classified. This classification is based on different mechanisms. One of them is based on the multilayer perceptron neural network. The article describes inner structure of used neural network and also information about implementation of this network. The learning set for this neural network is based on real attack data collected from IP telephony honeypot called Dionaea. We prepare the learning set from real attack data after collecting, cleaning and aggregation of this information. After proper learning is the neural network capable to classify 6 types of most commonly used VoIP attacks. Using neural network classifier brings more accurate attack classification in a distributed system of honeypots. With this approach is possible to detect malicious behavior in a different part of networks, which are logically or geographically divided and use the information from one network to harden security in other networks. Centralized server for distributed set of nodes serves not only as a collector and classifier of attack data, but also as a mechanism for generating a precaution steps against attacks.

  20. The total right/left-volume index: a new and simplified cardiac magnetic resonance measure to evaluate the severity of Ebstein anomaly of the tricuspid valve: a comparison with heart failure markers from various modalities.

    Science.gov (United States)

    Hösch, Olga; Sohns, Jan Martin; Nguyen, Thuy-Trang; Lauerer, Peter; Rosenberg, Christina; Kowallick, Johannes Tammo; Kutty, Shelby; Unterberg, Christina; Schuster, Andreas; Faßhauer, Martin; Staab, Wieland; Paul, Thomas; Lotz, Joachim; Steinmetz, Michael

    2014-07-01

    The classification of clinical severity of Ebstein anomaly still remains a challenge. The aim of this study was to focus on the interaction of the pathologically altered right heart with the anatomically-supposedly-normal left heart and to derive from cardiac magnetic resonance (CMR) a simple imaging measure for the clinical severity of Ebstein anomaly. Twenty-five patients at a mean age of 26±14 years with unrepaired Ebstein anomaly were examined in a prospective study. Disease severity was classified using CMR volumes and functional measurements in comparison with heart failure markers from clinical data, ECG, laboratory and cardiopulmonary exercise testing, and echocardiography. All examinations were completed within 24 hours. A total right/left-volume index was defined from end-diastolic volume measurements in CMR: total right/left-volume index=(RA+aRV+fRV)/(LA+LV). Mean total right/left-volume index was 2.6±1.7 (normal values: 1.1±0.1). This new total right/left-volume index correlated with almost all clinically used biomarkers of heart failure: brain natriuretic peptide (r=0.691; P=0.0003), QRS (r=0.432; P=0.039), peak oxygen consumption/kg (r=-0.479; P=0.024), ventilatory response to carbon dioxide production at anaerobic threshold (r=0.426; P=0.048), the severity of tricuspid regurgitation (r=0.692; P=0.009), tricuspid valve offset (r=0.583; P=0.004), and tricuspid annular plane systolic excursion (r=0.554; P=0.006). Previously described severity indices ([RA+aRV]/[fRV+LA+LV]) and fRV/LV end-diastolic volume corresponded only to some parameters. In patients with Ebstein anomaly, the easily acquired index of right-sided to left-sided heart volumes from CMR correlated well with established heart failure markers. Our data suggest that the total right/left-volume index should be used as a new and simplified CMR measure, allowing more accurate assessment of disease severity than previously described scoring systems. © 2014 American Heart Association, Inc.