WorldWideScience

Sample records for spot heart attack

  1. Heart Attack

    Science.gov (United States)

    ... family history of heart attack race – African Americans, Mexican Americans, Native Americans, and native Hawaiians are at ... Your doctor will prescribe the medicines that are right for you. If you have had a heart ...

  2. Heart Attack

    Science.gov (United States)

    ... properly causes your body's blood sugar levels to rise, increasing your risk of heart attack. Metabolic syndrome. This occurs when you have obesity, high blood pressure and high blood sugar. Having metabolic ...

  3. Heart Attack Recovery FAQs

    Science.gov (United States)

    ... recommendations to make a full recovery. View an animation of a heart attack . Heart Attack Recovery Questions ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  4. Pericarditis - after heart attack

    Science.gov (United States)

    ... include: A previous heart attack Open heart surgery Chest trauma A heart attack that has affected the thickness of your heart muscle Symptoms Symptoms include: Anxiety Chest pain from the swollen pericardium rubbing on the ...

  5. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  6. Heart attack - discharge

    Science.gov (United States)

    ... and lifestyle Cholesterol - drug treatment Controlling your high blood pressure Deep vein thrombosis - discharge Dietary fats explained Fast food tips Heart attack - discharge Heart attack - what to ask your doctor Heart bypass ... pacemaker - discharge High blood pressure - what to ask your doctor How to read ...

  7. Heart Attack Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for heart...

  8. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  9. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  10. Women's Heart Disease: Heart Attack Symptoms

    Science.gov (United States)

    ... of this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter ... most common heart attack symptom in men and women is chest pain or discomfort. However, women also ...

  11. Panic Attack or Heart Attack?

    Science.gov (United States)

    ... When in doubt about symptoms, seek care without delay to rule out heart disease. Heart disease affects your heart's ... which cause you concern, see your doctor without delay and ask for testing to rule out heart disease. 1 Gadolinium side effects could ...

  12. Heart Attack Symptoms in Women

    Science.gov (United States)

    ... fat, cholesterol and other substances (plaque). Watch an animation of a heart attack . Many women think the ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  13. What Is a Heart Attack?

    Science.gov (United States)

    ... medical center. Support from family and friends also can help relieve stress and anxiety. Let your loved ones know how you feel and what they can do to help you. Risk of a Repeat Heart Attack Once ...

  14. Diabetes - preventing heart attack and stroke

    Science.gov (United States)

    Diabetes complications - heart; Coronary artery disease - diabetes; CAD - diabetes; Cerebrovascular disease - diabetes ... People with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure and high ...

  15. Calcium Supplements: A Risk Factor for Heart Attack?

    Science.gov (United States)

    ... factor for heart attack? I've read that calcium supplements may increase the risk of heart attack. ... D. Some doctors think it's possible that taking calcium supplements may increase your risk of a heart ...

  16. Warning Signs of Heart Attack, Stroke and Cardiac Arrest

    Science.gov (United States)

    ... for Heart.org CPR & ECC for Heart.org Shop for Heart.org Causes for Heart.org Advocate ... SIGNS may include breaking out in a cold sweat, nausea or lightheadedness. Learn more about heart attack ...

  17. A Functional Approach to Televised Political Spots: Acclaiming, Attacking, Defending.

    Science.gov (United States)

    Benoit, William L.; Pier, P. M.; Blaney, Joseph R.

    1997-01-01

    Articulates a theoretical framework for understanding the fundamental functions of political advertising (acclaiming, attacking, defending) which occur on the twin grounds of policy considerations and character. Applies this theory of political discourse to presidential general election television spots from 1980-1996, finding that Democrats and…

  18. Fuzzy Expert System for Heart Attack Diagnosis

    Science.gov (United States)

    Hassan, Norlida; Arbaiy, Nureize; Shah, Noor Aziyan Ahmad; Afizah Afif@Afip, Zehan

    2017-08-01

    Heart attack is one of the serious illnesses and reported as the main killer disease. Early prevention is significant to reduce the risk of having the disease. The prevention efforts can be strengthen through awareness and education about risk factor and healthy lifestyle. Therefore the knowledge dissemination is needed to play role in order to distribute and educate public in health care management and disease prevention. Since the knowledge dissemination in medical is important, there is a need to develop a knowledge based system that can emulate human intelligence to assist decision making process. Thereby, this study utilized hybrid artificial intelligence (AI) techniques to develop a Fuzzy Expert System for Diagnosing Heart Attack Disease (HAD). This system integrates fuzzy logic with expert system, which helps the medical practitioner and people to predict the risk and as well as diagnosing heart attack based on given symptom. The development of HAD is expected not only providing expert knowledge but potentially become one of learning resources to help citizens to develop awareness about heart-healthy lifestyle.

  19. Understand Your Risk of Heart Attack

    Science.gov (United States)

    ... not as great as men's. Heredity (Including Race) Children of parents with heart disease are more likely to develop it themselves. African Americans have more severe high blood pressure than Caucasians and a higher risk of heart ...

  20. Can You Recognize a Heart Attack or Stroke? What To Do When Every Moment Counts

    Science.gov (United States)

    ... Special Issues Subscribe August 2014 Print this issue Can You Recognize a Heart Attack or Stroke? What ... could prevent many of these deaths. Fast action can also limit permanent damage to the body. Heart ...

  1. Coronary Artery Dissection: Not Just a Heart Attack

    Science.gov (United States)

    ... for Heart.org CPR & ECC for Heart.org Shop for Heart.org Causes for Heart.org Advocate ... chest pain or pressure, shortness of breath, profuse sweating and dizziness. “Around 80 percent of the time, ...

  2. Before Using Aspirin to Lower Your Risk of Heart Attack or Stroke, Here Is What You Should Know

    Science.gov (United States)

    ... Medicines Safe Daily Use of Aspirin Before Using Aspirin to Lower Your Risk of Heart Attack or ... care provider can determine whether regular use of aspirin will help to prevent a heart attack or ...

  3. Higher coronary heart disease and heart attack morbidity in Appalachian coal mining regions.

    Science.gov (United States)

    Hendryx, Michael; Zullig, Keith J

    2009-11-01

    This study analyzes the U.S. 2006 Behavioral Risk Factor Surveillance System survey data (N=235,783) to test whether self-reported cardiovascular disease rates are higher in Appalachian coal mining counties compared to other counties after control for other risks. Dependent variables include self-reported measures of ever (1) being diagnosed with cardiovascular disease (CVD) or with a specific form of CVD including (2) stroke, (3) heart attack, or (4) angina or coronary heart disease (CHD). Independent variables included coal mining, smoking, BMI, drinking, physician supply, diabetes co-morbidity, age, race/ethnicity, education, income, and others. SUDAAN Multilog models were estimated, and odds ratios tested for coal mining effects. After control for covariates, people in Appalachian coal mining areas reported significantly higher risk of CVD (OR=1.22, 95% CI=1.14-1.30), angina or CHD (OR=1.29, 95% CI=1.19-1.39) and heart attack (OR=1.19, 95% CI=1.10-1.30). Effects were present for both men and women. Cardiovascular diseases have been linked to both air and water contamination in ways consistent with toxicants found in coal and coal processing. Future research is indicated to assess air and water quality in coal mining communities in Appalachia, with corresponding environmental programs and standards established as indicated.

  4. Higher coronary heart disease and heart attack morbidity in Appalachian coal mining regions

    Energy Technology Data Exchange (ETDEWEB)

    Hendryx, M.; Zullig, K.J. [West Virginia University, Morgantown, WV (United States). Dept. of Community Medicine

    2009-11-15

    This study analyzes the U.S. 2006 Behavioral Risk Factor Surveillance System survey data (N = 235,783) to test whether self-reported cardiovascular disease rates are higher in Appalachian coal mining counties compared to other counties after control for other risks. Dependent variables include self-reported measures of ever (1) being diagnosed with cardiovascular disease (CVD) or with a specific form of CVD including (2) stroke, (3) heart attack, or (4) angina or coronary heart disease (CHD). Independent variables included coal mining, smoking, BMI, drinking, physician supply, diabetes co-morbidity, age, race/ethnicity, education, income, and others. SUDAAN Multilog models were estimated, and odds ratios tested for coal mining effects. After control for covariates, people in Appalachian coal mining areas reported significantly higher risk of CVD (OR = 1.22, 95% CI = 1.14-1.30), angina or CHO (OR = 1.29, 95% C1 = 1.19-1.39) and heart attack (OR = 1.19, 95% C1 = 1.10-1.30). Effects were present for both men and women. Cardiovascular diseases have been linked to both air and water contamination in ways consistent with toxicants found in coal and coal processing. Future research is indicated to assess air and water quality in coal mining communities in Appalachia, with corresponding environmental programs and standards established as indicated.

  5. Mortality from heart attack in Belgrade population during the period 1990-2004

    Directory of Open Access Journals (Sweden)

    Ratkov Isidora

    2008-01-01

    Full Text Available INTRODUCTION In most countries, cardiovascular diseases are the leading disorders, with ischemic heart diseases being the leading cause of death. According to WHO data, every year about 17 million people die of cardiovascular diseases, which is 30% of all deaths. Ischemic heart diseases contribute from one-third to one-half of all deaths due to cardiovascular diseases. Three point eight million men and 3.4 million women in the world die every year from ischemic heart diseases, and in Europe about 2 million. The highest mortality rate from ischemic heart diseases occurs in India, China and Russia. OBJECTIVE The aim of this descriptive epidemiological study was to determine heart attack mortality in Belgrade population during the period 1990-2004. METHOD In the study, we conducted investigation of Belgrade population during the period 1990-2004. Mortality data were obtained from the city institution for statistics. The mortality rates were calculated based on the total Belgrade population obtained from the mean values for the last two register years (1991 and 2002. The mortality rates were standardized using the direct method of standardization according to the world (Segi standard population. RESULTS In the Belgrade population during the period 1990-2004, the participation of mortality rate due to heart attack among deaths from cardiovascular diseases was 17% in males and 10% in females. In Belgrade male population, mean standardized mortality rates (per 100,000 habitants were 50.5 for heart attack, 8.3 for chronic ischemic heart diseases and 4.6 for angina pectoris, while in females the rates were 30.8, 6.7 and 4.2, respectively. Mortality from ischemic heart diseases and from heart attack was higher in males than in females. During the studied 15-year period, on average 755 males and 483 females died due to heart attack every year. Mean standardized mortality rates per 100,000 habitants were 50.0 in male and 31.1 in female population. Males

  6. Aspirin for Reducing Your Risk of Heart Attack and Stroke: Know the Facts

    Science.gov (United States)

    ... the-Counter Medicines Safe Daily Use of Aspirin Aspirin for Reducing Your Risk of Heart Attack and ... any pharmacy, grocery or convenience store and buy aspirin without a prescription. The Drug Facts label on ...

  7. Knowledge of Signs and Symptoms of Heart Attack and Stroke among Singapore Residents

    Directory of Open Access Journals (Sweden)

    Joy Li Juan Quah

    2014-01-01

    Full Text Available Aim. To determine the level of knowledge of signs and symptoms of heart attack and stroke in Singapore resident population, in comparison to the global community. Methods. A population based, random sample of 7,840 household addresses was selected from a validated national sampling frame. Each participant was asked eight questions on signs and symptoms of heart attack and 10 questions on stroke. Results. The response rate was 65.2% with 4,192 respondents. The level of knowledge for preselected, common signs and symptoms of heart attack and stroke was 57.8% and 57.1%, respectively. The respondents scored a mean of 5.0 (SD 2.4 out of 8 for heart attack, while they scored a mean of 6.8 (SD 2.9 out of 10 for stroke. Respondents who were ≥50 years, with lower educational level, and unemployed/retired had the least knowledge about both conditions. The level of knowledge of signs and symptoms of heart attack and stroke in Singapore is comparable to USA and Canada. Conclusion. We found a comparable knowledge of stroke and heart attack signs and symptoms in the community to countries within the same economic, educational, and healthcare strata. However older persons, those with lower educational level and those who are unemployed/retired, require more public health education efforts.

  8. Gender differences in the link between childhood socioeconomic conditions and heart attack risk in adulthood.

    Science.gov (United States)

    Hamil-Luker, Jenifer; O'Rand, Angela M

    2007-02-01

    A growing body of evidence shows that childhood socioeconomic status (SES) is predictive of disease risk in later life, with those from the most disadvantaged backgrounds more likely to experience poor adult-health outcomes. Most of these studies, however are based on middle-aged male populations and pay insufficient attention to the pathways between childhood risks and specific adult disorders. This article examines gender differences in the link between childhood SES and heart attack risk trajectories and the mechanisms by which early environments affect future disease risk. By using methods that model both latent and path-specific influences, we identify heterogeneity in early life conditions and human, social, and health capital in adulthood that contribute to diverse heart attack risk trajectories between and among men and women as they age into their 60s and 70s. We find that key risk factors for heart attack operate differently for men and women. For men, childhood SES does not differentiate those at low, increasing, and high risk for heart attack. In contrast, women who grew up without a father and/or under adverse economic conditions are the most likely to experience elevated risk for heart attack, even after we adjust for the unequal distribution of working and living conditions, social relationships, access to health care, and adult lifestyle behaviors that influence health outcomes.

  9. Dysfunction of Right Heart in Attack Period of Bronchial Asthma in Children

    Directory of Open Access Journals (Sweden)

    V.А. Kondratiev

    2015-11-01

    Full Text Available There were performed Doppler echocardiography investigations of functional state of the right heart in 42 children aged 5–17 years old in attack period of bronchial asthma of moderate to severe degree. Changes of intra-cardiac hemodynamics of the right heart in children in attack period of bronchial asthma were characterized by disturbance of systolic and diastolic function of the right ventricle and right atrium. Combined systolic-diastolic variant of the right ventricle dysfunction was typical for attack period of bronchial asthma in children and developed in 95.5 % of cases. Elevation of pressure in pulmonary artery was typical and significantly more often occurred in severe asthma attack, herewith pulmonary hypertension of the second degree predominated.

  10. Valsartan in the treatment of heart attack survivors

    Directory of Open Access Journals (Sweden)

    Bodh I Jugdutt

    2006-06-01

    Full Text Available Bodh I JugduttDivision of Cardiology, Department of Medicine, University of Alberta, Edmonton, Alberta, CanadaAbstract: Survivors of myocardial infarction (MI are at high risk of disability and death. This is due to infarct-related complications such as heart failure, cardiac remodeling with progressive ventricular dilation, dysfunction, and hypertrophy, and arrhythmias including ventricular and atrial fibrillation. Angiotensin (Ang II, the major effector molecule of the renin–angiotensin–aldosterone system (RAAS is a major contributor to these complications. RAAS inhibition, with angiotensin-converting enzyme (ACE inhibitors were first shown to reduce mortality and morbidity after MI. Subsequently, angiotensin receptor blockers (ARBs, that produce more complete blockade of the effects of Ang II at the Ang II type 1 (AT1 receptor, were introduced and the ARB valsartan was shown to be as effective as an ACE inhibitor in reducing mortality and morbidity in high-risk post-MI suvivors with left ventricular (LV systolic dysfunction and and/or heart failure and in heart failure patients, respectively, in two major trials (VALIANT and Val-HeFT. Both these trials used an ACE inhibitor as comparator on top of background therapy. Evidence favoring the use of valsartan for secondary prevention in post-MI survivors is reviewed.Keywords: valsartan, myocardial infarction, infarct survivors, remodeling, heart failure

  11. Does Uninsurance Affect the Health Outcomes of the Insured? Evidence from Heart Attack Patients in California

    NARCIS (Netherlands)

    Meltem Daysal, N.

    2012-01-01

    Abstract: In this paper, I examine the impact of uninsured patients on the health of the insured, focusing on one health outcome - the in-hospital mortality rate of insured heart attack patients. I employ panel data models using patient discharge and hospital financial data from California

  12. Does uninsurance affect the health outcomes of the insured? Evidence from heart attack patients in California

    NARCIS (Netherlands)

    Meltem Daysal, N.

    2012-01-01

    In this paper, I examine the impact of uninsured patients on the in-hospital mortality rate of insured heart attack patients. I employ panel data models using patient discharge and hospital financial data from California (1999–2006). My results indicate that uninsured patients have an economically

  13. Ventilatory control of heart rate during inhalation of 5% CO2 and types of panic attacks.

    Science.gov (United States)

    Ley, R

    1991-09-01

    Differences in the magnitude of increases in heart rate during prolonged inhalation of 5% CO2 range from a mean of 25 b/min for a group of eight panic-disorder patients who panicked (Woods, Charney, Goodman, & Heninger, 1988. Archives of General Psychiatry, 45, 43-52) to zero b/min for 16 patients, eight of whom panicked (Craske & Barlow, 1990. Journal of Abnormal Psychology, 99, 302-307). What accounts for this disparity? The present paper describes how heart rate can be increased by means of voluntary overbreathing during prolonged inhalation of 5% CO2 in air. This suggests that differences in the degree of overbreathing may explain differences in the magnitude of increases in heart rate during inhalation of 5% CO2. An explanation is also offered for the curious finding that some patients experience "panic attacks" with zero increase in heart rate. Evidence suggests that this is likely to happen in cognitively based panic attacks, in contrast to hyperventilatory attacks or anticipatory attacks.

  14. Depression and coronary artery disease -real heart attack

    International Nuclear Information System (INIS)

    Farooqi, S.; Ahmed, B.

    2001-01-01

    Both depression and ischaemic heart disease are said to become the leading causes of morbidity and mortality in developing countries during the next two decades. The relationship between these two disorders has long been speculated but only recently addressed scientifically. A Medline search was conducted to obtain the articles that address the association between depressive disorders and coronary artery disease (CAD). Most studies following large cohorts over a period ranging from 4.5 to 27 years have shown that depression is associated with a significantly high risk of developing CAD. These studies also show that patients who have depression following myocardial infarction hat poorer prognosis on major cardiac end points like reoccurrence of myocardial infarction and death as compared to the non-depressed group. The psychosocial variables associated with depression like social isolation, acute and chronic stressful life events are also associated with increased risk of developing CAD. The mechanisms underlying this association between depression and CAD are unknown at present. The effectiveness of psychosocial interventions in reducing this increased risks have been demonstrated while the trials assessing the efficacy and safety of anti depressed drugs are underway. The implications of these finding are discussed in the context of developing countries. (author)

  15. Applying Magneto-rheology to Reduce Blood Viscosity and Suppress Turbulence to Prevent Heart Attacks

    Science.gov (United States)

    Tao, R.

    Heart attacks are the leading causes of death in USA. Research indicates one common thread, high blood viscosity, linking all cardiovascular diseases. Turbulence in blood circulation makes different regions of the vasculature vulnerable to development of atherosclerotic plaque. Turbulence is also responsible for systolic ejection murmurs and places heavier workload on heart, a possible trigger of heart attacks. Presently, neither medicine nor method is available to suppress turbulence. The only method to reduce the blood viscosity is to take medicine, such as aspirin. However, using medicine to reduce the blood viscosity does not help suppressing turbulence. In fact, the turbulence gets worse as the Reynolds number goes up with the viscosity reduction by the medicine. Here we report our new discovery: application of a strong magnetic field to blood along its flow direction, red blood cells are polarized in the magnetic field and aggregated into short chains along the flow direction. The blood viscosity becomes anisotropic: Along the flow direction the viscosity is significantly reduced, but in the directions perpendicular to the flow the viscosity is considerably increased. In this way, the blood flow becomes laminar, turbulence is suppressed, the blood circulation is greatly improved, and the risk for heart attacks is reduced. While these effects are not permanent, they last for about 24 hours after one magnetic therapy treatment.

  16. Spot urine sodium excretion as prognostic marker in acutely decompensated heart failure: the spironolactone effect.

    Science.gov (United States)

    Ferreira, João Pedro; Girerd, Nicolas; Medeiros, Pedro Bettencourt; Santos, Mário; Carvalho, Henrique Cyrne; Bettencourt, Paulo; Kénizou, David; Butler, Javed; Zannad, Faiez; Rossignol, Patrick

    2016-06-01

    Loop diuretic resistance characterized by inefficient sodium excretion complicates many patients with acutely decompensated heart failure (ADHF). Mineralocorticoid receptor antagonists (MRAs) in natriuretic doses may improve spot urine sodium excretion and outcomes. Our primary aim was to assess the association of high-dose spironolactone with short-term spot urine sodium excretion, and our secondary aim was to determine if this higher short-term spot urine sodium excretion is associated with reduction in the composite clinical outcome (of cardiovascular mortality and/or ADHF hospitalization) event rate at 180 days. Single-centre, non-randomized, open-label study enrolling 100 patients with ADHF. Patients were treated with standard ADHF therapy alone (n = 50) or oral spironolactone 100 mg/day plus standard ADHF therapy (n = 50). Spot urine samples were collected at day 1 and day 3 of hospitalization. Spironolactone group had significantly higher spot urine sodium levels compared to standard care group at day 3 (84.13 ± 28.71 mmol/L vs 70.74 ± 34.43 mmol/L, p = 0.04). The proportion of patients with spot urinary sodium spot urinary sodium and urinary sodium/potassium ratio of >2 at day 3 (both, p spot urine sodium levels were associated with a lower event rate [HR for urinary sodium >100 mmol/L = 0.16 (0.06-0.42), p Spot urinary sodium levels >60 mmol/L and urinary sodium/potassium ratio >2 measured at day 3 of hospitalization for ADHF are associated with improved mid-term outcomes. Spironolactone is associated with increased spot urinary sodium and sodium/potassium ratio >2.

  17. US State-level income inequality and risks of heart attack and coronary risk behaviors: longitudinal findings.

    Science.gov (United States)

    Pabayo, Roman; Kawachi, Ichiro; Gilman, Stephen E

    2015-07-01

    To examine prospectively the association between US state income inequality and incidence of heart attack. We used data from the National Epidemiologic Survey on Alcohol and Related Conditions (n = 34,445). Respondents completed interviews at baseline (2001-2002) and follow-up (2004-2005). Weighted multilevel modeling was used to determine if US state-level income inequality (measured by the Gini coefficient) at baseline was a predictor of heart attack during follow-up, controlling for individual-level and state-level covariates. In comparison to residents of US states in the lowest quartile of income inequality, those living in the second [Adjusted Odds Ratio (AOR) = 1.71, 95 % CI 1.16-2.53)], third (AOR = 1.81, 95 % CI 1.28-2.57), and fourth (AOR = 2.04, 95 % CI 1.26-3.29) quartiles were more likely to have a heart attack. Similar findings were obtained when we excluded those who had a heart attack prior to baseline. This study is one of the first to empirically show the longitudinal relationship between income inequality and coronary heart disease. Living in a state with higher income inequality increases the risk for heart attack among US adults.

  18. Heart Lesion After the First Attack of the Rheumatic Fever 22 Years Experience in Single Centre

    Science.gov (United States)

    Bejiqi, Ramush A.; Retkoceri, Ragip; Zeka, Naim; Bejiqi, Hana; Retkoceri, Arber

    2015-01-01

    Background: Acute rheumatic fever and its sequels, rheumatic heart diseases, remain major unsolved preventable health problems in Kosovo population, particularly among the disadvantages indigenous Albanian and Egyptians people. In Kosovo, despite of performing secondary prophylaxis with benzathine penicillin, acute rheumatic fever hospitalization rates have remained essentially unchanged for the last 20 years. The role of echocardiography in the diagnosis of acute rheumatic carditis was established over the last 20 years. Aims: In this study we aimed to determine the prevalence of rheumatic heart disease in children from Kosovo population with first attack of acute rheumatic fever. Also, we presented that echocardiography examination detects a greater prevalence of rheumatic heart disease than other diagnostic procedures. We aimed to compare the sensitivity and specificity of cardiac auscultation, ECG record, lab analysis to echocardiography and to determine the feasibility of specific age in this setting. Methods: To optimize accurate diagnosis of rheumatic fever and rheumatic heart disease, we utilized two group models. In the first group of 388 children, hospitalized and treated before 1999, diagnosis of rheumatic fever was decided basing on the clinical and laboratory findings whereas in second group (221 children treated from1999 to 2010) clinical and lab diagnosis were amplified also on the detection by echocardiography. Conclusion: In second group, using echocardiography as a method of diagnosis and assessment children with rheumatic fever, we found high rates of undetected rheumatic heart disease in this high-risk group population. Echocardiographic examination of children with rheumatic fever for rheumatic heart disease may over diagnose rheumatic heart disease unless congenital mitral valve anomalies and physiological regurgitation are excluded. PMID:25870479

  19. Knowledge of heart attack and stroke symptomology: a cross-sectional comparison of rural and non-rural US adults

    Directory of Open Access Journals (Sweden)

    Swanoski Michael T

    2012-06-01

    Full Text Available Abstract Background Understanding the signs and symptoms of heart attacks and strokes are important not only in saving lives, but also in preserving quality of life. Findings from recent research have yielded that the prevalence of cardiovascular disease risk factors are higher in rural populations, suggesting that adults living in rural locales may be at higher risk for heart attack and/or stroke. Knowledge of heart attack and stroke symptomology as well as calling 911 for a suspected heart attack or stroke are essential first steps in seeking care. This study sought to examine the knowledge of heart attack and stroke symptoms among rural adults in comparison to non-rural adults living in the U.S. Methods Using multivariate techniques, a cross-sectional analysis of an amalgamated multi-year Behavioral Risk Factor Surveillance Survey (BRFSS database was performed. The dependent variable for this analysis was low heart attack and stroke knowledge score. The covariates for the analysis were: age, sex, race/ethnicity, annual household income, attained education, health insurance status, having a health care provider (HCP, timing of last routine medical check-up, medical care deferment because of cost, self-defined health status and geographic locale. Results The weighted n for this study overall was 103,262,115 U.S. adults > =18 years of age. Approximately 22.0% of these respondents were U.S. adults living in rural locales. Logistic regression analysis revealed that those U.S. adults who had low composite heart attack and stroke knowledge scores were more likely to be rural (OR = 1.218 95%CI 1.216-1.219 rather than non-rural residents. Furthermore, those with low scores were more likely to be: male (OR = 1.353 95%CI 1.352-1.354, >65 years of age (OR = 1.369 95%CI 1.368-1.371, African American (OR = 1.892 95%CI 1.889-1.894, not educated beyond high school (OR = 1.400 955CI 1.399-1.402, uninsured (OR = 1.308 95%CI 1

  20. Heart spotting.

    NARCIS (Netherlands)

    el Azzouzi, H.; de Windt, L.J.

    2008-01-01

    Cardiac function depends upon several factors, including adequate cellular mass, intact contractile machinery, and adequate production of ATP. An appropriate homeostasis on all these levels is crucial for the daunting life-long task the myocardium faces. Not surprisingly, many alterations in the

  1. Comparing Asian American Women's Knowledge, Self-Efficacy, and Perceived Risk of Heart Attack to Other Racial and Ethnic Groups: The mPED Trial.

    Science.gov (United States)

    Fukuoka, Yoshimi; Lisha, Nadra E; Vittinghoff, Eric

    2017-09-01

    The aim of the study was to compare knowledge and awareness of heart attacks/heart disease and perceived risk for future heart attack in Asian/Pacific Islander women, compared to other racial and ethnic groups. In this cross-sectional study, 318 women enrolled in a mobile phone-based physical activity education trial were analyzed. Heart attack knowledge, self-efficacy for recognizing and responding to heart attack symptoms, and perceived risk for a future heart attack were measured. Analyses were conducted using logistic, proportional odds, and linear regression models, depending on the outcome and adjusting for age. Pairwise differences between Asian/Pacific Islanders and the other four groups were assessed using a Bonferroni correction (p Asian/Pacific Islander women had significantly lower total scores for knowledge of heart attack and self-efficacy for heart attack recognition and care seeking behavior compared to the Caucasian women (p = 0.001 and p = 0.002, respectively). However, perceived risk did not differ among the groups. Forty-six percent of the Asian American women, compared to 25% of Caucasian women, falsely believed "breast cancer is the number one cause of death for women (p = 0.002)." In addition, Asian/Pacific Islander women were less likely to report "arm pain, numbness, tingling, or radiating" as one of the heart attack symptoms compared to the Caucasian and the multiracial group (34%, 63% [p Asian/Pacific Islander women and Caucasian women.

  2. Tracks FAQs: How Do Heart Attack Hospitalization Rates In My Community Compare With Other Counties Or States?

    Centers for Disease Control (CDC) Podcasts

    In this podcast, CDC Tracking experts discuss how to compare heart attack hospitalization rates in your community with other counties or states. Do you have a question for our Tracking experts? Please e-mail questions to trackingsupport@cdc.gov.

  3. Cancer and heart attack survivors’ expectations of employment status: results from the English Longitudinal Study of Ageing

    Directory of Open Access Journals (Sweden)

    Saskia F. A. Duijts

    2017-08-01

    Full Text Available Abstract Background Sociodemographic, health- and work-related factors have been found to influence return to work in cancer survivors. It is feasible though that behavioural factors, such as expectation of being at work, could also affect work-related outcomes. Therefore, the effect of earlier identified factors and expectation of being at work on future employment status in cancer survivors was explored. To assess the degree to which these factors specifically concern cancer survivors, a comparison with heart attack survivors was made. Methods Data from the English Longitudinal Study of Ageing were used. Cancer and heart attack survivors of working age in the UK were included and followed up for 2 years. Baseline characteristics of both cancer and heart attack survivors were compared regarding employment status. Univariate and multivariate regression analyses were performed in survivors at work, and the interaction between independent variables and diagnose group was assessed. Results In cancer survivors at work (N = 159, alcohol consumption, participating in moderate or vigorous sport activities, general health and participation were univariate associated with employment status at two-year follow-up. Only fair general health (compared to very good general health remained statistically significant in the multivariate model (OR 0.31; 95% CI 0.13–0.76; p = 0.010. In heart attack survivors at work (N = 78, gender, general health and expectation of being at work were univariate associated with employment status at follow-up. Female gender (OR 0.03; 95% CI 0.00–0.57; p = 0.018 and high expectation of being at work (OR 10.68; 95% CI 1.23–93.92; p = 0.033 remained significant in the multivariate model. The influence of gender (p = 0.066 and general health (p = 0.020 regarding employment status was found to differ significantly between cancer and heart attack survivors. Conclusions When predicting future employment status in cancer

  4. Cancer and heart attack survivors' expectations of employment status: results from the English Longitudinal Study of Ageing.

    Science.gov (United States)

    Duijts, Saskia F A; van der Beek, Allard J; Bleiker, Eveline M A; Smith, Lee; Wardle, Jane

    2017-08-07

    Sociodemographic, health- and work-related factors have been found to influence return to work in cancer survivors. It is feasible though that behavioural factors, such as expectation of being at work, could also affect work-related outcomes. Therefore, the effect of earlier identified factors and expectation of being at work on future employment status in cancer survivors was explored. To assess the degree to which these factors specifically concern cancer survivors, a comparison with heart attack survivors was made. Data from the English Longitudinal Study of Ageing were used. Cancer and heart attack survivors of working age in the UK were included and followed up for 2 years. Baseline characteristics of both cancer and heart attack survivors were compared regarding employment status. Univariate and multivariate regression analyses were performed in survivors at work, and the interaction between independent variables and diagnose group was assessed. In cancer survivors at work (N = 159), alcohol consumption, participating in moderate or vigorous sport activities, general health and participation were univariate associated with employment status at two-year follow-up. Only fair general health (compared to very good general health) remained statistically significant in the multivariate model (OR 0.31; 95% CI 0.13-0.76; p = 0.010). In heart attack survivors at work (N = 78), gender, general health and expectation of being at work were univariate associated with employment status at follow-up. Female gender (OR 0.03; 95% CI 0.00-0.57; p = 0.018) and high expectation of being at work (OR 10.68; 95% CI 1.23-93.92; p = 0.033) remained significant in the multivariate model. The influence of gender (p = 0.066) and general health (p = 0.020) regarding employment status was found to differ significantly between cancer and heart attack survivors. When predicting future employment status in cancer survivors in the UK, general health is the most relevant factor

  5. Clinical and prognostic value of spot urinary creatinine in chronic heart failure-An analysis from GISSI-HF.

    Science.gov (United States)

    Ter Maaten, Jozine M; Maggioni, Aldo Pietro; Latini, Roberto; Masson, Serge; Tognoni, Gianni; Tavazzi, Luigi; Signorini, Stefano; Voors, Adriaan A; Damman, Kevin

    2017-06-01

    This study aimed to identify patient characteristics associated with low urinary creatinine in morning spot urine and investigate its association with clinical outcome. Twenty-four-hour creatinine excretion is an established marker of muscle mass in heart failure and other populations. Spot urine creatinine might be an easy obtainable, cheap marker of muscle wasting and prognosis in heart failure (HF) patients. Spot urine creatinine concentration was measured in 2130 patients included in the GISSI-HF trial. We evaluated the prognostic value of urinary creatinine and its relation with clinical variables. Median spot urinary creatinine was 0.80 (IQR 0.50-1.10) g/L. Lower spot urinary creatinine was associated with older age, smaller height and weight, higher NYHA class, worse renal function and more frequent spironolactone and diuretic use (all Pcreatinine was independently associated with an increased risk of all-cause mortality or HF hospitalization (HR, 1.59 [1.21-2.08] per log decrease, P=.001), and all-cause mortality (HR, 1.75 [1.25-2.45] per log decrease, P=.001). Lower urinary creatinine, measured in morning spot urine in patients with chronic HF, is associated with worse renal function, smaller body size, more severe HF and is independently associated with an increased risk of all-cause death and HF hospitalization. Copyright © 2017 Elsevier Inc. All rights reserved.

  6. Clinical and prognostic value of spot urinary creatinine in chronic heart failure-An analysis from GISSI-HF

    NARCIS (Netherlands)

    ter Maaten, Jozine M.; Maggioni, Aldo Pietro; Latini, Roberto; Masson, Serge; Tognoni, Gianni; Tavazzi, Luigi; Signorini, Stefano; Voors, Adriaan A.; Damman, Kevin

    Objectives This study aimed to identify patient characteristics associated with low urinary creatinine in morning spot urine and investigate its association with clinical outcome. Background Twenty-four-hour creatinine excretion is an established marker of muscle mass in heart failure and other

  7. Tracks FAQs: How Do Heart Attack Hospitalization Rates In My Community Compare With Other Counties Or States?

    Centers for Disease Control (CDC) Podcasts

    2011-09-01

    In this podcast, CDC Tracking experts discuss how to compare heart attack hospitalization rates in your community with other counties or states. Do you have a question for our Tracking experts? Please e-mail questions to trackingsupport@cdc.gov.  Created: 9/1/2011 by National Center for Environmental Health, Division of Environmental Hazards and Health Effects, Environmental Health Tracking Branch.   Date Released: 9/1/2011.

  8. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. ...

  9. An avatar based education application to improve patients' knowledge of and response to heart attack symptoms: a pragmatic randomized controlled trial protocol.

    Science.gov (United States)

    Tongpeth, Jintana; Du, Huiyun; Clark, Robyn

    2018-06-19

    To evaluate the effectiveness of an interactive, avatar based education application to improve knowledge of and response to heart attack symptoms in people who are at risk of a heart attack. Poor knowledge of heart attack symptoms is recognised as a significant barrier to timely medical treatment. Numerous studies have demonstrated that technology can assist in patient education to improve knowledge and self-care. A single-center, non-blinded, two parallel groups, pragmatic randomized controlled trial. Seventy patients will be recruited from the coronary care unit of a public hospital. Eligible participants will be randomised to either the usual care or the intervention group (usual care plus avatar-based heart attack education app). The primary outcome of this study is knowledge. Secondary outcomes include response to heart attack symptoms, health service use and satisfaction. Study participants will be followed-up for six months. This study will evaluate the avatar based education app as a method to deliver vital information to patients. Participants' knowledge of and response to heart attack symptoms, as well as their health service use, will be assessed to evaluate the intervention effectiveness. This article is protected by copyright. All rights reserved. This article is protected by copyright. All rights reserved.

  10. A qualitative study of younger men's experience of heart attack (myocardial infarction).

    Science.gov (United States)

    Merritt, Christopher J; de Zoysa, Nicole; Hutton, Jane M

    2017-09-01

    The effects of heart attack, or myocardial infarction (MI), across psychosocial domains may be particularly acute in younger adults, for whom serious health events are non-normative. MI morbidity is declining in Western countries, but in England MI numbers have plateaued for the under-45 cohort, where approximately 90% of patients are male. Qualitative research on younger adults' experience of MI is limited, and no study has sampled exclusively under-45s. This study aimed to understand how a sample of men under 45 adjusted to and made sense of MI. Qualitative research design based on semi-structured in-depth interviews. Ten men aged under 45 who had experienced MI in the past 3-6 months were purposively recruited and interviewed. Interviews were transcribed verbatim and analysed using interpretative phenomenological analysis. Seven superordinate themes were identified. This article focuses in depth on the three most original themes: (1) 'I'm less of a man', which described experiences of losing 'maleness' (strength, independence, ability to provide) post-MI; (2) 'Shortened horizons', which covered participants' sense of foreshortened future and consequent reprioritization; and (3) 'Life loses its colour', describing the loss of pleasure from lifestyle-related changes. Themes broadly overlapped with the qualitative literature on younger adult MI. However, some themes (e.g., loss of 'maleness' post-MI, and ambivalence towards MI risk factors) appeared unique to this study. Themes were also discussed in relation to risk factors for anxiety and depression and how this might inform clinical care for a younger, male population. Statement of contribution What is already known on this subject? Myocardial infarction (MI) morbidity is not declining in England for under-45s. Adjustment to MI is particularly challenging for younger adults, perhaps because it is non-normative. However, little is known about the experience of MI in younger adults. What does this study add? This

  11. Determination of Relations between Systolic Blood Pressure and Heart Attack in Patients with Type 2 Diabetes with Association Rules

    Directory of Open Access Journals (Sweden)

    Seyyed Payam Shariatpanahi

    2018-03-01

    Full Text Available Abstract Background: Today, the high prevalence of diabetes and its complications are one of the most important public health issues worldwide. For this reason, finding relations between diabetes risk factors is very effective in preventing and reducing complications. For discovering these relations, the data mining methods can be used. By extracting association rules, which is one of the data mining techniques, we can discover the relations between a large numbers of variables in a disease. Materials and Methods: The population of this study was 1046 patients with type 2 diabetes, whose data had recorded between 2011 and 2014 at the Special Clinic for Diabetes in Tehran's Imam Khomeini Hospital. After pre-processing step with SPSS19 software, 573 people entered the analysis phase. The FP-Growth algorithm was applied to the data set to discover the relations between heart attack and other risk factors using Rapid miner5 software. Relations, after extraction, were given to the doctor to confirm clinical validation. Results: The obtained results of studying these 573 people (Including 292 (51% women and 281 (49% men, with age range 27 to 82 years showed that the lack of blood pressure, creatinine and diastolic blood pressure at its normal level, despite higher systolic blood pressure level than normal, doesn't increase the probability of heart attack. Conclusion: Using association rules is a good way of identifying relations between the risk factors of a disease. Also, it can provide new hypotheses to do epidemiological studies for researchers.

  12. Family history and body mass index predict perceived risks of diabetes and heart attack among community-dwelling Caucasian, Filipino, Korean, and Latino Americans--DiLH Survey.

    Science.gov (United States)

    Fukuoka, Yoshimi; Choi, JiWon; S Bender, Melinda; Gonzalez, Prisila; Arai, Shoshana

    2015-07-01

    The purpose of the study was to explore the perceived risk for diabetes and heart attack and associated health status of Caucasian, Filipino, Korean, and Latino Americans without diabetes. A cross-sectional survey was conducted with 904 urban adults (mean age 44.3±16.1 years; 64.3% female) in English, Spanish or Korean between August and December 2013. Perceived risk for developing diabetes was indicated by 46.5% (n=421), and 14.3% (n=129) perceived themselves to be at risk for having a heart attack in their lifetime. Significant predictors of pessimistic diabetes risk perceptions: Filipino (adjusted odds ratio [AOR]=1.7; 95% CI: 1.04-2.86) and Korean (AOR=2.4; 1.33-4.48) ethnicity, family history of diabetes (AOR=1.4; 1.00-1.84), female gender (AOR=1.4; 1.04-1.96), high cholesterol (AOR= 1.6; 1.09-2.37) and higher body mass index (BMI) (AOR=1.1; 1.08-1.15). Predictors of pessimistic heart attack risk perceptions were family history of an early heart attack (AOR=2.9; 1.69-5.02), high blood pressure (AOR=2.4; 1.45-3.84), and higher BMI (AOR=1.1; 1.04-1.12) after controlling for socio-demographic factors. Older age, physical inactivity, smoking, and low HDL levels were not associated with risk perceptions. Multiple risk factors were predictive of greater perceived diabetes risk, whereas, only family history of heart attack, high blood pressure and increases in BMI significantly contributed to perceived risk of heart attack among ethnically diverse at risk middle-aged adults. It is important that healthcare providers address the discordance between an individual's risk perceptions and the presence of actual risk factors. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  13. CPR in the Schools: Training Students to Save Heart Attack Victims.

    Science.gov (United States)

    Britton, Royce J.

    1978-01-01

    A community cardiac emergency medical plan should include training of family and co-workers of high risk patients, including teenage students. The American Heart Association lists ways to introduce cardiopulmonary resuscitation (CPR) into school curricula and describes the plan implemented in Pennsylvania. (MF)

  14. Total Dietary Fiber, and Selected Vegetable, Fruit, Legume and Cereal Fiber Intake and Risk of Heart Attack in Periodontitis Subjects

    Directory of Open Access Journals (Sweden)

    Nelson Wood

    2011-10-01

    Full Text Available Background: Epidemiological studies have found an association between periodontal disease and coronary artery disease(Arbes, Slade et al. 1999; Beck, Elter et al. 2001; Genco, Offenbacher et al. 2002, and have even implicated periodontal disease as a risk factor(Arbes, Slade et al. 1999; Beck, Elter et al. 2001, however have not proven causality(Hujoel, Drangholt et al. 2000. Although dietary amounts, sources, and types (soluble versus insoluble of fiber have been shown to reduce the risk of heart attack (Liu, Buring et al. 2002; Negri, Vecchia et al. 2003, this author is unaware of studies that have examined the association between food sources of dietary fiber and heart attack risk in subjects with periodontitis.This study was designed to determine whether total dietary fiber and fiber from different plant sources (vegetables, fruits, legumes, or cereals modified self-reported HA risk, as well as acute-phase inflammatory responses in subjects with periodontitis using NHANES III data.Objectives: The objective of this study was to investigate the association between total dietary fiber intake levels, and selected vegetables, fruits, legumes, and cereal fiber intake and the risk of self-reported history of heart attack (HA in periodontitis subjects using data available in the Third National Health and Nutrition Examination Survey (NHANES III.Materials and Methods: Adult participants in NHANES III were used in this study. Zero to thirty three (0-33 percent of sites with periodontal attachment loss > 3 mm was considered a healthy periodontium, while greater than thirty three percent (>33 of sites with periodontal attachment loss of > 3 mm as periodontitis. The outcome variable was the self-reported history of HA. Total dietary fiber, and monthly selected vegetable, fruit, legume and cereal consumption were divided into low and adequate levels. Data was analyzed by Kruskal-Wallis, ANOVA and multivariate analyses using SPSS ®. P<0.05 was used to

  15. Heart Lesion After the First Attack of the Rheumatic Fever 22 Years Experience in Single Centre

    OpenAIRE

    Bejiqi, Ramush A.; Retkoceri, Ragip; Zeka, Naim; Bejiqi, Hana; Retkoceri, Arber

    2015-01-01

    Background: Acute rheumatic fever and its sequels, rheumatic heart diseases, remain major unsolved preventable health problems in Kosovo population, particularly among the disadvantages indigenous Albanian and Egyptians people. In Kosovo, despite of performing secondary prophylaxis with benzathine penicillin, acute rheumatic fever hospitalization rates have remained essentially unchanged for the last 20 years. The role of echocardiography in the diagnosis of acute rheumatic carditis was estab...

  16. Heart Health - Brave Heart

    Science.gov (United States)

    ... Bar Home Current Issue Past Issues Cover Story Heart Health Brave Heart Past Issues / Winter 2009 Table of Contents For ... you can have a good life after a heart attack." Lifestyle Changes Surviving—and thriving—after such ...

  17. Relationship between blood lead, blood pressure, stroke, and heart attacks in middle-aged British men

    International Nuclear Information System (INIS)

    Pocock, S.J.; Shaper, A.G.; Ashby, D.; Delves, H.T.; Clayton, B.E.

    1988-01-01

    The relationship between blood lead concentration and blood pressure is examined in a survey of 7371 men aged 40 to 59 from 24 British towns. After allowance for relevant confounding variables, including town of residence and alcohol consumption, there exists a very weak but statistically significant positive association between blood lead and both systolic and diastolic blood pressure. After 6 years of follow-up, 316 of these men had major ischemic heart disease, and 66 had a stroke. After allowance for the confounding effects of cigarette smoking and town of residence there is no evidence that blood lead is a risk factor for these cardiovascular events. However, as the blood lead-blood pressure association is so weak, it is unlikely that any consequent association between lead and cardiovascular disease could be demonstrated from prospective epidemiological studies. An overview of data from this and other large epidemiological surveys provides reasonable consistent evidence on lead and blood pressure. While NHANES II data on 2254 US men indicate a slightly stronger association between blood lead and systolic blood pressure, data from two Welsh studies on over 2000 men did not show a statistically significant association. Nevertheless, such statistical association cannot be taken as establishing a causal effect of low-level lead exposure on blood pressure

  18. Coronary heart disease risk in patients with stroke or transient ischemic attack and no known coronary heart disease: findings from the Stroke Prevention by Aggressive Reduction in Cholesterol Levels (SPARCL) trial

    DEFF Research Database (Denmark)

    Amarenco, Pierre; Goldstein, Larry B; Sillesen, Henrik

    2010-01-01

    Noncoronary forms of atherosclerosis (including transient ischemic attacks or stroke of carotid origin or >50% stenosis of the carotid artery) are associated with a 10-year vascular risk of >20% and are considered as a coronary heart disease (CHD) -risk equivalent from the standpoint of lipid...... management. The Stroke Prevention by Aggressive Reduction in Cholesterol Levels (SPARCL) trial included patients with stroke or transient ischemic attack and no known CHD regardless of the presence of carotid atherosclerosis. We evaluated the risk of developing clinically recognized CHD in SPARCL patients....

  19. Depression After Heart Attack

    Science.gov (United States)

    ... Can Be Done to Reduce the Impact of Depression on My Mental and Physical Health? There is some good news here. Depression is ... Can Be Done to Reduce the Impact of Depression on My Mental and Physical Health? What Can I Do About the Depression I’ ...

  20. DAILY CHANGES OF CENTRAL HEMODYNAMICS IN PATIENTS WITH CHRONIC HEART FAILURE WITH NIGHT-TIME DYSPNOEA ATTACK

    Directory of Open Access Journals (Sweden)

    S. A. Dovgolis

    2006-01-01

    Full Text Available Aim. To study daily changes of central hemodynamics (CHD in patients with chronic heart failure (CHF and the effects of therapy. Materials and methods. 22 patients with ischemic heart disease and CHF of III-IV functional class (FC by NYHA, age 60,5±10,5 were observed. Patients were suffering from night-time dyspnoea attacks and had pulmonary artery occlusion pressure (PAOP 15-20 mm Hg. CHD was monitored invasively before the treatment and after 4 weeks of CHF treatment. Results. According to the cardiac index (CI at admission patients were split into two groups. 9 patients of group-I had CI ≤2,15 l\\min\\m2, and 13 patients of group-II had CI >2,15 l\\min\\m2. In patients of group-I CI increased in 4 weeks of treatment. The treatment caused considerable clinical improvement in all patients. The CHD indexes also improved. Initially evening-night-time peaks of PAOP (р≤0,002, systolic (SBP (р≤0,003, diastolic (DBP (р=0,002 and average (BPa (р=0,0007 blood pressure (BP as well as double multiplication (DM (р≤0,008 were registered in patients of group-I. At the end of treatment only evening-night increase in DBP (р=0,002 and BPa (р≤0,006 were noted. In patients of group-II after 4 weeks of treatment CI decreased or didn’t change. Towards 28-th day of treatment 10 patients had clinical improvements. Only one patient’s FC NYHA increased. At the end of treatment the normalization of CHD was registered totally in group. Initially evening-night-time peaks of PAOP (р≤0,002, SBP (р≤0, 0001, CI (р=0,057 and DM (р=0,084 were registered in patients of group-II. At the end of treatment evening-night-time peaks of PAOP (р≤0,015, SBP (р≤0,044, CI (р≤0,005 and DM (р≤0,044 still remained. Besides, evening-night-time peaks of cardiac output (р≤0,01 and systolic index (р≤0, 06 have added. Conclusion. In patients with CHF with initial CI ≤2,15 l\\min\\m2 treatment results in the normalization of CHD and its daily

  1. Heart Disease Risk Factors

    Science.gov (United States)

    ... About CDC.gov . Home About Heart Disease Coronary Artery Disease Heart Attack Heart Attack Signs and Symptoms ... Privacy FOIA No Fear Act OIG 1600 Clifton Road Atlanta , GA 30329-4027 USA 800-CDC-INFO ( ...

  2. Empowered to gain a new foothold in life—A study of the meaning of participating in cardiac rehabilitation to patients afflicted by a minor heart attack

    Directory of Open Access Journals (Sweden)

    Charlotte P. Simonÿ

    2015-12-01

    Full Text Available This study aimed to investigate what it means to patients afflicted by a minor heart attack to participate in cardiac rehabilitation (CR. CR is well-established internationally to support patients towards moving forward in satisfying, healthy, and well-functioning lives. Studies indicate that patients achieve improvement in quality of life when participating in CR. However, knowledge of how patients are supported during CR is sparse. Moreover, knowledge of what participating in CR means to patients afflicted by a minor heart attack is lacking. In-depth knowledge in this area is crucial in order to understand these patients’ particular gains and needs. In a phenomenological-hermeneutic frame field observations, focus group interviews, and individual interviews were conducted among 11 patients during and after their participation in CR. Field notes and transcribed interviews underwent three-phased interpretation. It was found that patients were supported to gain renewed balance in their lives during CR. Three themes were identified: (1 receiving a helpful but limited caring hand, (2 being supported to find new values in life, and (3 developing responsibility for the remaining time. The patients were carefully guided through a difficult time and supported to continue in healthy everyday lives. They were given hope which enabled them to find themselves a new foothold in life with respect to their own sense of well-being. This guidance and a sense of hopefulness were provided by heart specialists and more seasoned heart patients. In conclusion, patients were empowered to achieve a healthier lifestyle and improve their personal well-being during CR. However, structural barriers in the programme prevented adequate support regarding the patients’ total needs. Knowledge of the benefits of CR emphasizes the significance of the programme and highlights the importance of high inclusion. Efforts should be made to develop more flexible and longer lasting

  3. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... major stroke. It's important to call 9-1-1 immediately for any stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. The content in this ...

  4. The association of a heart attack or stroke with depressive symptoms stratified by the presence of a close social contact: findings from the National Health and Aging Trends Study Cohort.

    Science.gov (United States)

    Simning, Adam; Seplaki, Christopher L; Conwell, Yeates

    2018-01-01

    The objective of the study is to examine whether the risk of having clinically significant depressive symptoms following a heart attack or stroke varies by the presence of a close social contact. The National Health and Aging Trends Study is a nationally representative longitudinal survey of US Medicare beneficiaries aged 65 and older initiated in 2011. A total of 5643 older adults had information on social contacts at baseline and depressive symptoms at the 1-year follow-up interview. The two-item Patient Health Questionnaire identified clinically significant depressive symptoms. Interview questions examined social contacts and the presence of self-reported heart attack or stroke during the year of follow-up. A total of 297 older adults reported experiencing a heart attack and/or stroke between their baseline and follow-up interviews. In regression analyses accounting for sociodemographics, baseline depressive symptoms, medical comorbidity, and activities of daily living impairment, older adults with no close social contacts had increased odds of depressive symptoms at follow-up after experiencing a heart attack or stroke, while those with close social contacts had increased odds of depressive symptoms at follow-up after experiencing a stroke, but not a heart attack. Older adults have increased odds of having depressive symptoms following a self-reported stroke, but only those with no close social contacts had increased odds of depressive symptoms following a heart attack. Social networks may play a role in the mechanisms underlying depression among older adults experiencing certain acute health events. Future work exploring the potential causal relationships suggested here, if confirmed, could inform interventions to alleviate or prevent depression among at risk older adults. Copyright © 2017 John Wiley & Sons, Ltd. Copyright © 2017 John Wiley & Sons, Ltd.

  5. Multi-constituent cardiovascular pills (MCCP)--challenges and promises of population-based prophylactic drug therapy for prevention of heart attack.

    Science.gov (United States)

    Jamieson, Michael J; Naghavi, Morteza

    2007-01-01

    Risk factors for atherosclerotic cardiovascular disease (CVD) are highly co-prevalent but poorly identified and treated. The Screening for Heart Attack Prevention and Education (SHAPE) Task Force from the Association for Eradication of Heart Attack (AEHA) has recently proposed a new strategy that recommends screening for subclinical atherosclerosis and implementing aggressive treatment of "vulnerable patients". The Task Force has also envisioned future developments that may shift mass screening strategies to mass prophylactic therapy. The "Polypill" concept, introduced by Wald and Law suggests a combination of statin, low-dose antihypertensives, aspirin and folic acid, in a single pill, taken prophylactically by high risk population can cut CVD event rates by as much as 80%. In this communication, we review the challenges and promises of such a strategy. "Polypill" is but one of an astronomical number of possible multiconstituent pills (MCCP). Attractive as the MCCP concept is, it lacks evidence from randomized controlled trials, and begs numerous questions about the credibility of the concept, the design and synthesis of such complex pills, pharmacokinetics, pharmacodynamics, bioequivalence, "class" vs. unique properties, interactions, evidence of clinical efficacy and safety, regulatory approval, post-marketing surveillance, prescription vs. over-the-counter use, responsibility for initiating and monitoring therapy, patient education, counterfeiting and importation, reimbursement, advertisement, patent protection, commercial viability, etc. If these issues are favorably addressed, MCCP stand to dramatically change the manner in which CVD is prevented particularly in developing societies. Notwithstanding, assuming low commercial interests, realizing the promises of MCCP will demand serious attention from national public health policymakers. The clinical and regulatory implications of population-based secondary prevention (which rely on a different evidence base

  6. Heart disease and diet

    Science.gov (United States)

    Diet - heart disease; CAD - diet; Coronary artery disease - diet; Coronary heart disease - diet ... diet and lifestyle can reduce your risk of: Heart disease, heart attacks, and stroke Conditions that lead ...

  7. Liver spots

    Science.gov (United States)

    ... skin changes - liver spots; Senile or solar lentigines; Skin spots - aging; Age spots ... Liver spots are changes in skin color that occur in older skin. The coloring may be due to aging, exposure to the sun ...

  8. Heart Health - Heart Disease: Symptoms, Diagnosis, Treatment

    Science.gov (United States)

    ... Bar Home Current Issue Past Issues Cover Story Heart Health Heart Disease: Symptoms, Diagnosis, Treatment Past Issues / Winter 2009 ... of this page please turn Javascript on. Most heart attacks happen when a clot in the coronary ...

  9. Can we monitor heart attack in the troponin era: evidence from a population-based cohort study

    Directory of Open Access Journals (Sweden)

    Rankin Jamie M

    2011-06-01

    Full Text Available Abstract Background Troponins (highly sensitive biomarkers of myocardial damage increase counts of myocardial infarction (MI in clinical practice, but their impact on trends in admission rates for MI in National statistics is uncertain. Methods Cases coded as MI or other cardiac diagnoses in the Hospital Morbidity Data Collection (MI-HMDC in Western Australia in 1998 and 2003 were classified using revised criteria for MI developed by an International panel convened by the American Heart Association (AHA criteria using information on symptoms, ECGs and cardiac biomarkers abstracted from samples of medical notes. Age-sex standardized rates of MI-HMDC were compared with rates of MI based on AHA criteria including troponins (MI-AHA or traditional biomarkers only (MI-AHAck. Results Between 1998 and 2003, rates of MI-HMDC decreased by 3.5% whereas rates of MI-AHA increased by 17%, a difference largely due to increased false-negative cases in the HMDC associated with marked increased use of troponin tests in cardiac admissions generally, and progressively lower test thresholds. In contrast, rates of MI-AHAck declined by 18%. Conclusions Increasing misclassification of MI-AHA by the HMDC may be due to reluctance by clinicians to diagnose MI based on relatively small increases in troponin levels. These influences are likely to continue. Monitoring MI using AHA criteria will require calibration of commercially available troponin tests and agreement on lower diagnostic thresholds for epidemiological studies. Declining rates of MI-AHAck are consistent with long-standing trends in MI in Western Australia, suggesting that neither MI-HMDC nor MI-AHA reflect the true underlying population trends in MI.

  10. Level of consciousness on admission to a Heart Attack Centre is a predictor of survival from out-of-hospital cardiac arrest.

    Science.gov (United States)

    Deakin, Charles D; Fothergill, Rachael; Moore, Fionna; Watson, Lynne; Whitbread, Mark

    2014-07-01

    The relationship between the neurological status at the time of handover from the ambulance crew to a Heart Attack Centre (HAC) in patients who have achieved return of spontaneous circulation (ROSC) and subsequent outcome, in the context of current treatment standards, is unknown. A retrospective review of all patients treated by London Ambulance Service (LAS) from 1(st) April 2011 to 31(st) March 2013 admitted to a HAC in Greater London was undertaken. Neurological status (A - alert; V - responding to voice; P - responding to pain; U - unresponsive) recorded by the ambulance crew on handover was compared with length of hospital stay and survival to hospital discharge. A total of 475 sequential adult cardiac arrests of presumed cardiac origin, achieving ROSC on admission to a HAC were identified. Outcome data was available for 452 patients, of whom 253 (56.0%) survived to discharge. Level of consciousness on admission to the HAC was a predictor of duration of hospital stay (Pa shockable rhythm, 32.3% (120/371) were 'A' or 'V', compared with 9.1% (9/99) of those with non-shockable rhythms (PA or V) compared with those with non-shockable rhythms. Most patients who are conscious on admission to the HAC will survive, compared with approximately half of those who are unconscious (P or U), suggesting that critical care is generally appropriate at all levels of consciousness if ROSC has been achieved. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  11. The political attack ad

    Directory of Open Access Journals (Sweden)

    Palma Peña-Jiménez, Ph.D.

    2011-01-01

    Full Text Available During election campaigns the political spot has a clear objective: to win votes. This message is communicated to the electorate through television and Internet, and usually presents a negative approach, which includes a direct critical message against the opponent, rather than an exposition of proposals. This article is focused on the analysis of the campaign attack video ad purposely created to encourage the disapproval of the political opponent among voters. These ads focus on discrediting the opponent, many times, through the transmission of ad hominem messages, instead of disseminating the potential of the political party and the virtues and manifesto of its candidate. The article reviews the development of the attack ad since its first appearance, which in Spain dates back to 1996, when the famous Doberman ad was broadcast, and examines the most memorable campaign attack ads.

  12. Efficacy of a Community-Based Physical Activity Program KM2H2 for Stroke and Heart Attack Prevention among Senior Hypertensive Patients: A Cluster Randomized Controlled Phase-II Trial.

    Directory of Open Access Journals (Sweden)

    Jie Gong

    Full Text Available To evaluate the efficacy of the program Keep Moving toward Healthy Heart and Healthy Brain (KM2H2 in encouraging physical activities for the prevention of heart attack and stroke among hypertensive patients enrolled in the Community-Based Hypertension Control Program (CBHCP.Cluster randomized controlled trial with three waves of longitudinal assessments at baseline, 3 and 6 months post intervention.Community-based and patient-centered self-care for behavioral intervention in urban settings of China.A total of 450 participants diagnosed with hypertension from 12 community health centers in Wuhan, China were recruited, and were randomly assigned by center to receive either KM2H2 plus standard CBHCP care (6 centers and 232 patients or the standard care only (6 centers and 218 patients.KM2H2 is a behavioral intervention guided by the Transtheoretical Model, the Model of Personalized Medicine and Social Capital Theory. It consists of six intervention sessions and two booster sessions engineered in a progressive manner. The purpose is to motivate and maintain physical activities for the prevention of heart attack and stroke.Heart attack and stroke (clinically diagnosed, primary outcome, blood pressure (measured, secondary outcome, and physical activity (self-report, tertiary outcome were assessed at the individual level during the baseline, 3- and 6-month post-intervention.Relative to the standard care, receiving KM2H2 was associated with significant reductions in the incidence of heart attack (3.60% vs. 7.03%, p < .05 and stroke (5.11% vs. 9.90%, p<0.05, and moderate reduction in blood pressure (-3.72 mmHg in DBP and -2.92 mmHg in DBP at 6-month post-intervention; and significant increases in physical activity at 3- (d = 0.53, 95% CI: 0.21, 0.85 and 6-month (d = 0.45, 95% CI: 0.04, 0.85 post-intervention, respectively.The program KM2H2 is efficacious to reduce the risk of heart attack and stroke among senior patients who are on anti

  13. Heart-Health Screenings

    Science.gov (United States)

    ... Tools For Your Heart Health • Watch, Learn & Live Animations Library Subscribe to Heart Insight magazine and monthly ... in Spanish . Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  14. Heart disease and depression

    Science.gov (United States)

    ... gov/ency/patientinstructions/000790.htm Heart disease and depression To use the sharing features on this page, ... a heart attack or heart surgery Signs of Depression It is pretty common to feel down or ...

  15. Baseline Quality of Life and Risk of Stroke in the ALLHAT Study (Antihypertensive and Lipid-Lowering Treatment to Prevent Heart Attack Trial).

    Science.gov (United States)

    Shams, Tanzila; Auchus, Alexander P; Oparil, Suzanne; Wright, Clinton B; Wright, Jackson; Furlan, Anthony J; Sila, Cathy A; Davis, Barry R; Pressel, Sara; Yamal, Jose-Miguel; Einhorn, Paula T; Lerner, Alan J

    2017-11-01

    The visual analogue scale is a self-reported, validated tool to measure quality of life (QoL). Our purpose was to determine whether baseline QoL predicted strokes in the ALLHAT study (Antihypertensive and Lipid Lowering Treatment to Prevent Heart Attack Trial) and evaluate determinants of poststroke change in QoL. In the ALLHAT study, among the 33 357 patients randomized to treatment arms, 1525 experienced strokes; 1202 (79%) strokes were nonfatal. This study cohort includes 32 318 (97%) subjects who completed the baseline visual analogue scale QoL estimate. QoL was measured on a visual analogue scale and adjusted using a Torrance transformation (transformed QoL [TQoL]). Kaplan-Meier curves and adjusted proportional hazards analyses were used to estimate the effect of TQoL on the risk of stroke, on a continuous scale (0-1) and by quartiles (≤0.81, >0.81≤0.89, >0.89≤0.95, >0.95). We analyzed the change from baseline to first poststroke TQoL using adjusted linear regression. After adjusting for multiple stroke risk factors, the hazard ratio for stroke events for baseline TQoL was 0.93 (95% confidence interval, 0.89-0.98) per 0.1 U increase. The lowest baseline TQoL quartile had a 20% increased stroke risk (hazard ratio=1.20 [95% confidence interval, 1.00-1.44]) compared with the reference highest quartile TQoL. Poststroke TQoL change was significant within all treatment groups ( P ≤0.001). Multivariate regression analysis revealed that baseline TQoL was the strongest predictor of poststroke TQoL with similar results for the untransformed QoL. The lowest baseline TQoL quartile had a 20% higher stroke risk than the highest quartile. Baseline TQoL was the only factor that predicted poststroke change in TQoL. URL: http://www.clinicaltrials.gov. Unique identifier: NCT00000542. © 2017 American Heart Association, Inc.

  16. Risks for Heart Disease & Stroke

    Science.gov (United States)

    ... Prevent Risks for Heart Disease & Stroke Risks for Heart Disease & Stroke About 1.5 million heart attacks and ... can’t change some of your risks for heart disease and stroke, but you can manage many of ...

  17. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants....

  18. Adults with Congenital Heart Defects

    Science.gov (United States)

    ... Ebstein's Anomaly l-Transposition of the Great Arteries Patent Ductus Arteriosus (PDA) Pulmonary Valve Stenosis and Regurgitation ... Sodium and Salt 3 Heart Attack Symptoms in Women 4 Warning Signs of a Heart Attack 5 ...

  19. Options for Heart Valve Replacement

    Science.gov (United States)

    ... Guide: Understanding Your Heart Valve Problem | Spanish Symptom Tracker | Spanish Pre-surgery Checklist | Spanish What Is Heart ... Cardiac Arrest: How Are They Different? 7 Warning Signs of a Heart Attack 8 Low Blood Pressure - ...

  20. Bier spots

    OpenAIRE

    Ahu Yorulmaz,; Seray Kulcu Cakmak; Esra Ar?; Ferda Artuz

    2015-01-01

    Also called as physiologic anemic macules, Bier spots are small, hypopigmented irregularly shaped macules against a background of diffuse erythema, which creates an appearance of speckled vascular mottling of the skin. Bier spots most commonly appear on distal portions of the limbs though there are case reports describing diffuse involvement, which also affect trunk and mucous membranes of the patient. Although the exact pathophysiological mechanisms underlying Bier spots still need to be elu...

  1. Heart Disease Affects Women of All Ages

    Science.gov (United States)

    Skip Navigation Bar Home Current Issue Past Issues Heart Disease Affects Women of All Ages Past Issues / Winter ... weeks of a heart attack. For Women with Heart Disease: About 6 million American women have coronary heart ...

  2. Bier spots

    Directory of Open Access Journals (Sweden)

    Ahu Yorulmaz,

    2015-10-01

    Full Text Available Also called as physiologic anemic macules, Bier spots are small, hypopigmented irregularly shaped macules against a background of diffuse erythema, which creates an appearance of speckled vascular mottling of the skin. Bier spots most commonly appear on distal portions of the limbs though there are case reports describing diffuse involvement, which also affect trunk and mucous membranes of the patient. Although the exact pathophysiological mechanisms underlying Bier spots still need to be elucidated, Bier spots have been suggested to be a vascular anomaly caused by vasoconstriction of small vessels. In addition, several diseases have been proposed to be associated with Bier spots, including scleroderma renal crisis, cryoglobulinemia, Peutz-Jeghers syndrome, alopecia areata and hypoplasia of the aorta, although it has not been shown whether these associations are casual or coincidental. The clinical presentation of Bier spots is quite typical. These tiny whitish macules easily become prominent when the affected limb is placed in a dependent position and fade away when the limb is raised. Here we report a case of Bier spots in a 32-year-old male patient with characteristical clinical manifestations.

  3. Treatment-resistant hypertension and the incidence of cardiovascular disease and end-stage renal disease: results from the Antihypertensive and Lipid-Lowering Treatment to Prevent Heart Attack Trial (ALLHAT).

    Science.gov (United States)

    Muntner, Paul; Davis, Barry R; Cushman, William C; Bangalore, Sripal; Calhoun, David A; Pressel, Sara L; Black, Henry R; Kostis, John B; Probstfield, Jeffrey L; Whelton, Paul K; Rahman, Mahboob

    2014-11-01

    Apparent treatment-resistant hypertension (aTRH) is defined as uncontrolled hypertension despite the use of ≥3 antihypertensive medication classes or controlled hypertension while treated with ≥4 antihypertensive medication classes. Although a high prevalence of aTRH has been reported, few data are available on its association with cardiovascular and renal outcomes. We analyzed data on 14 684 Antihypertensive and Lipid-Lowering Treatment to Prevent Heart Attack Trial (ALLHAT) participants to determine the association between aTRH (n=1870) with coronary heart disease, stroke, all-cause mortality, heart failure, peripheral artery disease, and end-stage renal disease. We defined aTRH as blood pressure not at goal (systolic/diastolic blood pressure ≥140/90 mm Hg) while taking ≥3 classes of antihypertensive medication or taking ≥4 classes of antihypertensive medication with blood pressure at goal during the year 2 ALLHAT study visit (1996-2000). Use of a diuretic was not required to meet the definition of aTRH. Follow-up occurred through 2002. The multivariable adjusted hazard ratios (95% confidence intervals) comparing participants with versus without aTRH were as follows: coronary heart disease (1.44 [1.18-1.76]), stroke (1.57 [1.18-2.08]), all-cause mortality (1.30 [1.11-1.52]), heart failure (1.88 [1.52-2.34]), peripheral artery disease (1.23 [0.85-1.79]), and end-stage renal disease (1.95 [1.11-3.41]). aTRH was also associated with the pooled outcomes of combined coronary heart disease (hazard ratio, 1.47; 95% confidence interval, 1.26-1.71) and combined cardiovascular disease (hazard ratio, 1.46; 95% confidence interval, 1.29-1.64). These results demonstrate that aTRH increases the risk for cardiovascular disease and end-stage renal disease. Studies are needed to identify approaches to prevent aTRH and reduce risk for adverse outcomes among individuals with aTRH. © 2014 American Heart Association, Inc.

  4. It is not just a Minor Thing - A Phenomenological-Hermeneutic Study of Patients' Experiences when afflicted by a Minor Heart Attack and Participating in Cardiac Rehabilitation

    DEFF Research Database (Denmark)

    Simonÿ, Charlotte P; Dreyer, Pia; Pedersen, Birthe D

    2017-01-01

    , leading to vulnerability and helplessness; Understanding that life has become frail: patients feel shaken as they realise that the disease is chronic and life-threatening; and An altered life: patients must adjust to new limitations in their everyday lives. Conclusions: Patients experience an overall...... demanding transition when they are afflicted by a minor heat attack, whereby their lives are sweepingly changed. Supporting patients’ integrity, which becomes vulnerable during the various stages of transitions, is essential to ensure a healthy outcome. Being together with fellow patients during cardiac...

  5. Age Spots

    Science.gov (United States)

    ... for Every Season How to Choose the Best Skin Care Products In This Section Dermatologic Surgery What is dermatologic ... for Every Season How to Choose the Best Skin Care Products Age Spots Treatment Options Learn more about treatment ...

  6. Spotted inflation

    International Nuclear Information System (INIS)

    Matsuda, Tomohiro

    2010-01-01

    We describe new scenarios for generating curvature perturbations when inflaton (curvaton) has significant interactions. We consider a ''spot'', which arises from interactions associated with an enhanced symmetric point (ESP) on the trajectory. Our first example uses the spot to induce a gap in the field equation. We observe that the gap in the field equation may cause generation of curvature perturbation if it does not appear simultaneous in space. The mechanism is similar to the scenario of inhomogeneous phase transition. Then we observe that the spot interactions may initiate warm inflation in the cold Universe. Creation of cosmological perturbation is discussed in relation to the inflaton dynamics and the modulation associated with the spot interactions

  7. TV spots' impact.

    Science.gov (United States)

    El-bakly, S

    1994-09-01

    The Information, Education and Communication (IEC) Center of the State Information Service was established in 1979 for the purpose of providing information to the people on the population issue. The Ministry of Information has accorded the State Information Service free TV and radio air time for family planning dramas and spots. In the early years information campaigns were organized to make people aware of the population problem by slogans, songs, and cartoons. Around 1984 misconceptions about family planning and contraceptives were attacked through a number of TV and radio spots. A few years later 21 spots on specific contraceptive methods were broadcast which were aired for three years over 3000 times. They were extremely successful. The impact of these TV spots was one of the major reasons why the contraceptive prevalence rate increased from 30% in 1984 to 38% in 1988 and 47% in 1992. Spots were also broadcast about the social implications of large families. The TV soap opera "And The Nile Flows On", with the family planning message interwoven into it, was very well received by the target audience. A program entitled "Wedding of the Month" features couples who know family planning well. The most successful radio program is a 15-20 minute long quiz show for residents of the villages where the Select Villages Project is being implemented. The State Information Service has 60 local information centers in the 26 governorates of Egypt that make plans for the family planning campaign. In 1992 the Minya Initiative, a family planning project was implemented in the Minya Governorate. As a result, the contraceptive prevalence rate rose from 22% to 30% over 18 months. A new project, the Select Village Project, was developed in 1993 that replicates the Minya Initiative on the village level in other governorates. This new project that was implemented in sixteen governorates.

  8. Infarto agudo del miocardio sin elevación del segmento T: Consideraciones fisiopatológicas y clínicas Heart attack without an elevation of the T segment: Clinical and pathophysiological

    Directory of Open Access Journals (Sweden)

    Maikel Rodulfo García

    2010-09-01

    Full Text Available Se revisaron numerosos documentos (impresos y electrónicos sobre afecciones cardiovasculares, particularmente acerca del infarto agudo del miocardio sin elevación del segmento T, teniendo en cuenta que la mortalidad hospitalaria es menor cuando se produce un síndrome coronario con esa característica. Para actualizar el tema se valoraron diversos aspectos relacionados con concepto, clasificación, fisiopatología, diagnóstico, cuadro clínico, exámenes complementarios y factores de riesgo, puesto que las enfermedades del corazón son actualmente la principal causa de muerte en naciones industrializadas y se espera que también lo sean en los países en vías de desarrollo para el 2020, entre ellos Cuba.Several documents (printed and electronic about cardiovascular diseases were reviewed, particularly heart attack without an elevation of the T-segment, taking into account that the hospital mortality is lower when a coronary syndrome with that characteristic occurs. To update the topic several aspects related to concept, classification, pathophysiology, diagnosis, clinical pattern, laboratory tests and risk factors were valued since heart diseases are actually the main cause of death in industrialized nations and it is expected that they will also be the same cause of death in developing countries for 2020, among them, Cuba.

  9. SPOT Program

    Science.gov (United States)

    Smith, Jason T.; Welsh, Sam J.; Farinetti, Antonio L.; Wegner, Tim; Blakeslee, James; Deboeck, Toni F.; Dyer, Daniel; Corley, Bryan M.; Ollivierre, Jarmaine; Kramer, Leonard; hide

    2010-01-01

    A Spacecraft Position Optimal Tracking (SPOT) program was developed to process Global Positioning System (GPS) data, sent via telemetry from a spacecraft, to generate accurate navigation estimates of the vehicle position and velocity (state vector) using a Kalman filter. This program uses the GPS onboard receiver measurements to sequentially calculate the vehicle state vectors and provide this information to ground flight controllers. It is the first real-time ground-based shuttle navigation application using onboard sensors. The program is compact, portable, self-contained, and can run on a variety of UNIX or Linux computers. The program has a modular objec-toriented design that supports application-specific plugins such as data corruption remediation pre-processing and remote graphics display. The Kalman filter is extensible to additional sensor types or force models. The Kalman filter design is also strong against data dropouts because it uses physical models from state and covariance propagation in the absence of data. The design of this program separates the functionalities of SPOT into six different executable processes. This allows for the individual processes to be connected in an a la carte manner, making the feature set and executable complexity of SPOT adaptable to the needs of the user. Also, these processes need not be executed on the same workstation. This allows for communications between SPOT processes executing on the same Local Area Network (LAN). Thus, SPOT can be executed in a distributed sense with the capability for a team of flight controllers to efficiently share the same trajectory information currently being computed by the program. SPOT is used in the Mission Control Center (MCC) for Space Shuttle Program (SSP) and International Space Station Program (ISSP) operations, and can also be used as a post -flight analysis tool. It is primarily used for situational awareness, and for contingency situations.

  10. Heart Age PSA (:60)

    Centers for Disease Control (CDC) Podcasts

    This 60 second public service announcement is based on the September 2015 CDC Vital Signs report. Your heart age is the age of your heart and blood vessels as a result of your risk factors for heart attack and stroke. If you smoke or have high blood pressure, your heart age will be much higher than your actual age. Learn what you can do to lower your heart age and keep it low.

  11. Warning Signs of Heart Failure

    Science.gov (United States)

    ... the two terms are used interchangeably. View an animation of heart failure . If you have been diagnosed ... resources here Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  12. Problem: Heart Valve Regurgitation

    Science.gov (United States)

    ... should be completely closed For example: Watch an animation of mitral valve regurgitation A leaking mitral valve ... Not Alone Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  13. Terrorists and Suicide Attacks

    National Research Council Canada - National Science Library

    Cronin, Audrey K

    2003-01-01

    Suicide attacks by terrorist organizations have become more prevalent globally, and assessing the threat of suicide attacks against the United States and its interests at home and abroad has therefore...

  14. Solidarity under Attack

    DEFF Research Database (Denmark)

    Meret, Susi; Goffredo, Sergio

    2017-01-01

    https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack......https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack...

  15. Rocky Mountain spotted fever

    Science.gov (United States)

    ... spotted fever on the foot Rocky Mountain spotted fever, petechial rash Antibodies Deer and dog tick References McElligott SC, Kihiczak GG, Schwartz RA. Rocky Mountain spotted fever and other rickettsial infections. In: Lebwohl MG, Heymann ...

  16. Lifestyle Changes for Heart Attack Prevention

    Science.gov (United States)

    ... alcohol consumption contributes to obesity, alcoholism, suicide and accidents. However, there is a cardioprotective effect of moderate ... to the Terms and Conditions and Privacy Policy Work with your doctor to lower your HBP and ...

  17. Can Vitamins Help Prevent a Heart Attack?

    Science.gov (United States)

    ... uptodate.com/home. Accessed Nov. 26, 2016. Loffredo L, et al. Supplementation with vitamin E alone is associated with reduced myocardial infarction: ... Cardiovascular Diseases. 2015;25:354. Pilz S, et al. Vitamin D and cardiovascular ... L, et al. Prospective association between the dietary inflammatory ...

  18. Being active after your heart attack

    Science.gov (United States)

    ... the Canadian Cardiovascular Society endorsed by the American Academy of Family Physicians: 2007 Writing Group to Review New Evidence and Update the ACC/AHA 2004 Guidelines for the Management of Patients With ST-Elevation Myocardial Infarction, Writing ...

  19. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  20. Where can an Insider attack?

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming

    2006-01-01

    By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage...... to the targeted organisation. While the problem is well recognised in the security community as well as in law-enforcement and intelligence communities, the main resort still is to audit log files \\$\\backslash\\$emph{after the fact}. There has been little research into developing models, automated tools......, and techniques for analysing and solving (parts of) the problem. In this paper we first develop a formal model of systems, that can describe real-world scenarios. These high-level models are then mapped to acKlaim, a process algebra with support for access control, that is used to study and analyse properties...

  1. Heart Age PSA (:60)

    Centers for Disease Control (CDC) Podcasts

    2015-09-01

    This 60 second public service announcement is based on the September 2015 CDC Vital Signs report. Your heart age is the age of your heart and blood vessels as a result of your risk factors for heart attack and stroke. If you smoke or have high blood pressure, your heart age will be much higher than your actual age. Learn what you can do to lower your heart age and keep it low.  Created: 9/1/2015 by National Center for Chronic Disease Prevention and Health Promotion (NCCDPHP).   Date Released: 9/1/2015.

  2. Heart Failure in Children and Adolescents

    Science.gov (United States)

    ... the lungs where oxygen is added. Watch an animation of blood flow in the heart All the ... resources here Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  3. Web server attack analyzer

    OpenAIRE

    Mižišin, Michal

    2013-01-01

    Web server attack analyzer - Abstract The goal of this work was to create prototype of analyzer of injection flaws attacks on web server. Proposed solution combines capabilities of web application firewall and web server log analyzer. Analysis is based on configurable signatures defined by regular expressions. This paper begins with summary of web attacks, followed by detection techniques analysis on web servers, description and justification of selected implementation. In the end are charact...

  4. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  5. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  6. Plants under dual attack

    NARCIS (Netherlands)

    Ponzio, C.A.M.

    2016-01-01

    Though immobile, plants are members of complex environments, and are under constant threat from a wide range of attackers, which includes organisms such as insect herbivores or plant pathogens. Plants have developed sophisticated defenses against these attackers, and include chemical responses

  7. SpotADAPT

    DEFF Research Database (Denmark)

    Kaulakiene, Dalia; Thomsen, Christian; Pedersen, Torben Bach

    2015-01-01

    by Amazon Web Services (AWS). The users aiming for the spot market are presented with many instance types placed in multiple datacenters in the world, and thus it is difficult to choose the optimal deployment. In this paper, we propose the framework SpotADAPT (Spot-Aware (re-)Deployment of Analytical...... of typical analytical workloads and real spot price traces. SpotADAPT's suggested deployments are comparable to the theoretically optimal ones, and in particular, it shows good cost benefits for the budget optimization -- on average SpotADAPT is at most 0.3% more expensive than the theoretically optimal...

  8. Rocky Mountain Spotted Fever

    Science.gov (United States)

    ... with facebook share with twitter share with linkedin Rocky Mountain Spotted Fever Credit: CDC A male cayenne tick, Amblyomma cajennense, ... and New Mexico. Why Is the Study of Rocky Mountain Spotted Fever a Priority for NIAID? Tickborne diseases are becoming ...

  9. Blind Data Attack on BGP Routers

    Science.gov (United States)

    2017-03-01

    Second Reader Dr. Cynthia Irvine Chair, Cyber Academic Group iii THIS PAGE INTENTIONALLY LEFT BLANK iv ABSTRACT Transport Communication Protocol (TCP...Postgraduate School. The experience of higher learning at this institution was incredible, and I would whole-heartedly recommend it to any of my peers and...data attack packets to the victim device. Scapy is a Python library that is used to craft and send packets [28]. BGP is supported in Python through

  10. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  11. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  12. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  13. A fatal elephant attack.

    Science.gov (United States)

    Hejna, Petr; Zátopková, Lenka; Safr, Miroslav

    2012-01-01

    A rare case of an elephant attack is presented. A 44-year-old man working as an elephant keeper was attacked by a cow elephant when he tripped over a foot chain while the animal was being medically treated. The man fell down and was consequently repeatedly attacked with elephant tusks. The man sustained multiple stab injuries to both groin regions, a penetrating injury to the abdominal wall with traumatic prolapse of the loops of the small bowel, multiple defects of the mesentery, and incomplete laceration of the abdominal aorta with massive bleeding into the abdominal cavity. In addition to the penetrating injuries, the man sustained multiple rib fractures with contusion of both lungs and laceration of the right lobe of the liver, and comminuted fractures of the pelvic arch and left femoral body. The man died shortly after he had been received at the hospital. The cause of death was attributed to traumatic shock. © 2011 American Academy of Forensic Sciences.

  14. Risks for Heart Valve Problems

    Science.gov (United States)

    ... and Live Our Interactive Cardiovascular Library has detailed animations and illustrations to help you learn about conditions, treatments and procedures related to heart disease and stroke. Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  15. CDC Vital Signs-Heart Age

    Centers for Disease Control (CDC) Podcasts

    This podcast is based on the September 2015 CDC Vital Signs report. Your heart age is the age of your heart and blood vessels as a result of your risk factors for heart attack and stroke. If you smoke or have high blood pressure, your heart age will be much higher than your actual age. Learn what you can do to lower your heart age and keep it low.

  16. Preliminary data from γ-cardiography during the abatement of an asthmatic attack (1961)

    International Nuclear Information System (INIS)

    Georges, R.; Vernejoul, P. de; Raynaud, C.; Blanchon, P.; Kellershohn, C.; Turiaf, J.

    1961-01-01

    The authors used gamma cardiology during the abatement of 16 cases of asthma with a view to detecting heart attacks not otherwise visible with routine methods of examination: clinical, radiological and electro-cardio-graphical. In gamma cardiology, a radioactive indicator is used and its path followed in the cavities of the heart. The method makes it possible to study the circulation in the right heart, the pulmonary crossing, and the left heart, as well as evaluation of the heart-flow. As a result of their investigations the authors, after having discussed the significance of the data obtained with the method, suggest that it is possible by the use of gamma cardiography during the abatement of an asthma attack: 1- To confirm attacks of the right heart which have already been detected by ordinary methods. 2- To confirm the presence of modifications in the recorded curves which suggest, in the case of the left heart, possible attack; such on attack is also indicated, in a small number of cases, by electrocardiography curves. Some considerations are put forward by the authors concerning the physiopathology of attacks on the left heart. (authors) [fr

  17. Attacker Model Lab

    OpenAIRE

    2006-01-01

    tut quiz present Tutorial Quiz Presentation Interactive Media Element This interactive tutorial the two sub-classes of computer attackers: amateurs and professionals. It provides valuable insight into the nature of necessary protection measure for information assets. CS3600 Information Assurance: Introduction to Computer Security Course

  18. Temporal Cyber Attack Detection.

    Energy Technology Data Exchange (ETDEWEB)

    Ingram, Joey Burton [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Draelos, Timothy J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Galiardi, Meghan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Doak, Justin E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Rigorous characterization of the performance and generalization ability of cyber defense systems is extremely difficult, making it hard to gauge uncertainty, and thus, confidence. This difficulty largely stems from a lack of labeled attack data that fully explores the potential adversarial space. Currently, performance of cyber defense systems is typically evaluated in a qualitative manner by manually inspecting the results of the system on live data and adjusting as needed. Additionally, machine learning has shown promise in deriving models that automatically learn indicators of compromise that are more robust than analyst-derived detectors. However, to generate these models, most algorithms require large amounts of labeled data (i.e., examples of attacks). Algorithms that do not require annotated data to derive models are similarly at a disadvantage, because labeled data is still necessary when evaluating performance. In this work, we explore the use of temporal generative models to learn cyber attack graph representations and automatically generate data for experimentation and evaluation. Training and evaluating cyber systems and machine learning models requires significant, annotated data, which is typically collected and labeled by hand for one-off experiments. Automatically generating such data helps derive/evaluate detection models and ensures reproducibility of results. Experimentally, we demonstrate the efficacy of generative sequence analysis techniques on learning the structure of attack graphs, based on a realistic example. These derived models can then be used to generate more data. Additionally, we provide a roadmap for future research efforts in this area.

  19. Healthy Heart Collaboration and Developed Toolkit

    Science.gov (United States)

    Impact: EPA is raising awareness of heart disease and its link to air pollution and other environmental factors as a partner in Million Hearts, a national initiative to prevent heart attacks and strokes. The talk will provide an up to date review of the evidence linking air poll...

  20. Blocking of Brute Force Attack

    OpenAIRE

    M.Venkata Krishna Reddy

    2012-01-01

    A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your Web site requires user authentication, you are a good target for a brute-force attack. An attacker can always discover a password through a brute-force attack, but the downside is that it co...

  1. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  2. Heart Rate and Initial Presentation of Cardiovascular Diseases (Caliber)

    Science.gov (United States)

    2013-09-17

    Abdominal Aortic Aneurysm; Coronary Heart Disease NOS; Unheralded Coronary Death; Intracerebral Haemorrhage; Heart Failure; Ischemic Stroke; Myocardial Infarction; Stroke; Peripheral Arterial Disease; Stable Angina Pectoris; Subarachnoid Haemorrhage; Transient Ischemic Attack; Unstable Angina; Cardiac Arrest, Sudden Cardiac Death

  3. Spot market for uranium

    International Nuclear Information System (INIS)

    Colhoun, C.

    1982-01-01

    The spot market is always quoted for the price of uranium because little information is available about long-term contracts. A review of the development of spot market prices shows the same price curve swings that occur with all raw materials. Future long-term contracts will probably be lower to reflect spot market prices, which are currently in the real-value range of $30-$35. An upswing in the price of uranium could come in the next few months as utilities begin making purchases and trading from stockpiles. The US, unlike Europe and Japan, has already reached a supply and demand point where the spot market share is increasing. Forecasters cannot project the market price, they can only predict the presence of an oscillating spot or a secondary market. 5 figures

  4. Heart MRI

    Science.gov (United States)

    Magnetic resonance imaging - cardiac; Magnetic resonance imaging - heart; Nuclear magnetic resonance - cardiac; NMR - cardiac; MRI of the heart; Cardiomyopathy - MRI; Heart failure - MRI; Congenital heart disease - MRI

  5. Automated Discovery of Mimicry Attacks

    National Research Council Canada - National Science Library

    Giffin, Jonathon T; Jha, Somesh; Miller, Barton P

    2006-01-01

    .... These systems are useful only if they detect actual attacks. Previous research developed manually-constructed mimicry and evasion attacks that avoided detection by hiding a malicious series of system calls within a valid sequence allowed by the model...

  6. Attack Trees with Sequential Conjunction

    NARCIS (Netherlands)

    Jhawar, Ravi; Kordy, Barbara; Mauw, Sjouke; Radomirović, Sasa; Trujillo-Rasua, Rolando

    2015-01-01

    We provide the first formal foundation of SAND attack trees which are a popular extension of the well-known attack trees. The SAND at- tack tree formalism increases the expressivity of attack trees by intro- ducing the sequential conjunctive operator SAND. This operator enables the modeling of

  7. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  8. Pulse pressure as a haemodynamic variable in systolic heart failure

    NARCIS (Netherlands)

    Petrie, Colin James

    2016-01-01

    In patients with heart failure, the heart is unable to pump enough blood to satisfy the requirements of the body. Explanations for this include heart muscle damage after a heart attack. This could be very recently, or in the past, sometimes dating back many years. In other cases the explanation for

  9. The Effectiveness of Cognitive-Behavioral Therapy (CBT in Reducing Worry, Anxiety and Panic Attacks Mitral Valve Prolapse Patients

    Directory of Open Access Journals (Sweden)

    AR Jamshidzehi ShahBakhsh

    2016-07-01

    Full Text Available Introduction: The mitral valve prolapse is a heart syndrome that is characterized by considerable physical and psychological consequences for affected patients. This study aimed to assess the efficacy of cognitive-behavioral therapy in reducing worrying, generalized anxiety and panic attacks in patients with mitral valve prolapse. Methods: This study is quasi-experimental research with pretest-posttest and control group. 16 patients with mitral valve prolapse divided into to two groups: experimental (n = 8 and control (n = 8 groups. CBT was used during 10 sessions twice a week with a focus on cognitive restructuring, modification of cognitive distortions and training of behavioral techniques for the experimental group. For participants health  concerns spot and doush (HCQ, Generalized anxiety disorder (GAD- 7 and Albania panic scales as pre-test, post-test. Results: Data were analyzed by covariance analysis. The results showed that worrying, anxiety, and panic attacks significantly reduced in the experimental group. Discussion: Cognitive behavioral therapy is remarkably effective for reducing fear, anxiety and panic patients with mitral valve prolapse. Therefore, it is recommended for the patients with mitral valve prolapse that cognitive behavioral therapy can be used as a complementary therapy.

  10. Mononucleosis spot test

    Science.gov (United States)

    Monospot test; Heterophile antibody test; Heterophile agglutination test; Paul-Bunnell test; Forssman antibody test ... The mononucleosis spot test is done when symptoms of mononucleosis are ... Fatigue Fever Large spleen (possibly) Sore throat Tender ...

  11. Heart murmurs

    Science.gov (United States)

    Chest sounds - murmurs; Heart sounds - abnormal; Murmur - innocent; Innocent murmur; Systolic heart murmur; Diastolic heart murmur ... The heart has 4 chambers: Two upper chambers (atria) Two lower chambers (ventricles) The heart has valves that close ...

  12. Heart Health Tests for Diabetes Patients

    Science.gov (United States)

    ... or fluids in the body. They include: Electrocardiogram ("EKG" or "ECG") This test measures the electrical activity ... Tools & Resources Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  13. Arc cathode spots

    International Nuclear Information System (INIS)

    Schrade, H.O.

    1989-01-01

    Arc spots are usually highly unstable and jump statistically over the cathode surface. In a magnetic field parallel to the surface, preferably they move in the retrograde direction; i.e., opposite to the Lorentzian rule. If the field is inclined with respect to the surface, the spots drift away at a certain angle with respect to the proper retrograde direction (Robson drift motion). These well-known phenomena are explained by one stability theory

  14. Rehab for the Heart (A Minute of Health with CDC)

    Centers for Disease Control (CDC) Podcasts

    2017-08-24

    Each year, nearly 790,000 adults in the U.S. suffer a heart attack. This podcast discusses the importance of getting cardiac rehab after a heart attack.  Created: 8/24/2017 by MMWR.   Date Released: 8/24/2017.

  15. Rehab for the Heart (A Cup of Health with CDC)

    Centers for Disease Control (CDC) Podcasts

    Each year, nearly 790,000 adults in the U.S. suffer a heart attack. For a third of these, it's not their first. Cardiac rehabilitation could have prevented many of these. In this podcast, Dr. Fleetwood Loustalot discusses the importance of getting cardiac rehab after a heart attack.

  16. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    The need to assess security and take protection decisions is at least as old as our civilisation. However, the complexity and development speed of our interconnected technical systems have surpassed our capacity to imagine and evaluate risk scenarios. This holds in particular for risks...... that are caused by the strategic behaviour of adversaries. Therefore, technology-supported methods are needed to help us identify and manage these risks. In this paper, we describe the attack navigator: a graph-based approach to security risk assessment inspired by navigation systems. Based on maps of a socio...

  17. Attacks on computer systems

    Directory of Open Access Journals (Sweden)

    Dejan V. Vuletić

    2012-01-01

    Full Text Available Computer systems are a critical component of the human society in the 21st century. Economic sector, defense, security, energy, telecommunications, industrial production, finance and other vital infrastructure depend on computer systems that operate at local, national or global scales. A particular problem is that, due to the rapid development of ICT and the unstoppable growth of its application in all spheres of the human society, their vulnerability and exposure to very serious potential dangers increase. This paper analyzes some typical attacks on computer systems.

  18. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... is over, there's no permanent injury to the brain. There's no way to tell if symptoms of a stroke will lead to a TIA or a ... American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. The content in this ...

  19. Recent "phishing" attacks

    CERN Multimedia

    IT Department

    2009-01-01

    Over the last few weeks there has been a marked increase in the number of attacks on CERN made by cybercriminals. Typical attacks arrive in the form of e-mail messages purporting to come from the CERN Help Desk, Mail Service, or some similarly official-sounding entity and suggest that there is a problem with your account, such as it being over-quota. They then ask you to click on a link or to reply and give your password. Please don’t! Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. NEVER provide your password or other details if these are requested. These messages try to trick you into clicking on Web links which will help them to install malicious software on your computer, and anti-virus software cannot be relied on to detect all cases. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN Comput...

  20. Cyber Attacks and Combat Behavior

    Directory of Open Access Journals (Sweden)

    Carataș Maria Alina

    2017-01-01

    Full Text Available Cyber terrorism is an intangible danger, a real over the corner threat in the life of individuals,organizations, and governments and is getting harder to deal with its damages. The motivations forthe cyber-attacks are different, depending on the terrorist group, from cybercrime to hacktivism,attacks over the authorities’ servers. Organizations constantly need to find new ways ofstrengthening protection against cyber-attacks, assess their cyber readiness, expand the resiliencecapacity and adopts international security regulations.

  1. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  2. Enlarged Heart

    Science.gov (United States)

    ... rheumatic fever, a heart defect, infections (infectious endocarditis), connective tissue disorders, certain medications or radiation treatments for cancer, your heart may enlarge. Disease of the heart ...

  3. Investigation of impingement attack mechanism of copper alloy condenser tubes

    Energy Technology Data Exchange (ETDEWEB)

    Fukumura, Takuya; Nakajima, Nobuo; Arioka, Koji; Totsuka, Nobuo; Nakagawa, Tomokazu [Institute of Nuclear Safety System Inc., Mihama, Fukui (Japan)

    2001-09-01

    In order to investigate generation and growth mechanisms of impingement attacks of sea water against copper alloy condenser tubes used in condensers of nuclear power plants, we took out condenser tubes from actual condensers, cut them into several pieces and carried out several material tests mainly for impinged spots. In addition water flow inside of a pit was analyzed. From the results of the investigation, it was found that all of impingement attacks were found in the marks left by sessile organisms and none were found in downstream of the marks as frequently proposed so far. At the pits generated inside the marks, iron coating was striped and zinc content was deficient in some cases. Combining these data and the result of flow analysis, we considered the following mechanism of the impingement attacks: sessile organisms clinging to the surface of the condenser tube and growth, occlusion of the tube, extinction and decomposition of sessile organisms, pollution corrosion under the organisms and cavity formation, occlusion removal by the cleaning, generation of impingement attacks by flow collision inside the cavity, growth of the impingement attacks. (author)

  4. Crony Attack: Strategic Attack’s Silver Bullet

    Science.gov (United States)

    2006-11-01

    physical assets or financial assets. The form of crony attack that most closely resembles classic strategic attack is to deny, degrade, or destroy a money...February 1951. Reprinted in Airpower Studies Coursebook , Air Command and Staff College, Maxwell AFB, AL, 2002, 152–58. Hirsch, Michael. “NATO’s Game of

  5. Invisible Trojan-horse attack

    DEFF Research Database (Denmark)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin

    2017-01-01

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance...

  6. When Sinuses Attack! (For Kids)

    Science.gov (United States)

    ... First Aid & Safety Doctors & Hospitals Videos Recipes for Kids Kids site Sitio para niños How the Body Works ... Search English Español When Sinuses Attack! KidsHealth / For Kids / When Sinuses Attack! What's in this article? What ...

  7. Invisible Trojan-horse attack.

    Science.gov (United States)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin; Makarov, Vadim

    2017-08-21

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Ac´ın-Ribordy-Gisin (SARG04) QKD protocol at 1924 nm versus that at 1536 nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N. Jain et al., New J. Phys. 16, 123030 (2014). However at 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.

  8. Medications Used to Treat Heart Failure

    Science.gov (United States)

    ... and Live Our Interactive Cardiovascular Library has detailed animations and illustrations to help you learn about conditions, treatments and procedures related to heart disease and stroke. Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  9. Roth spots in pernicious anaemia

    OpenAIRE

    Macauley, Mavin; Nag, Satyajit

    2011-01-01

    Roth spots are white-centred retinal haemorrhages, previously thought to be pathognomonic for subacute bacterial endocarditis. A number of other conditions can be associated with Roth spots. In this case, the authors describe the association of Roth spots and pernicious anaemia. This association has been rarely described in the medical literature. Correct diagnosis and treatment with intramuscular vitamin B12 injections resulted in complete resolution of the anaemia and Roth spots. The author...

  10. Poisson Spot with Magnetic Levitation

    Science.gov (United States)

    Hoover, Matthew; Everhart, Michael; D'Arruda, Jose

    2010-01-01

    In this paper we describe a unique method for obtaining the famous Poisson spot without adding obstacles to the light path, which could interfere with the effect. A Poisson spot is the interference effect from parallel rays of light diffracting around a solid spherical object, creating a bright spot in the center of the shadow.

  11. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  12. Shark Attack Project - Marine Attack at Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Adrianus J

    2005-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  13. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  14. Neuroradiological study of transient ischemic attack

    Energy Technology Data Exchange (ETDEWEB)

    Takusagawa, Yoshihiko; Fujiwara, Yasuhiro; Ichiki, Ken; Suga, Takeshi; Nishigaki, Shinichi

    1986-08-01

    Fifty-two patients with carotid TIAs and thirteen patients with vertebrobasilar TIAs were investigated by angiography and computed tomography. TIA was diagnosed by clinical symptoms in accordance with the criteria for TIA of the Joint Committee for Stroke Facilities in the U.S.A. (1974). The 65 patients with TIAs included 49 males and 16 females with average age of 63.5 years old at the initial episode of TIA. As for the diseases associated with TIA, hypertension (51 %), diabetes mellitus (15 %) and ischemic heart diseases (11 %) were the major disorders. Atrial fibrillation was observed in 2 cases. Intervals from last TIA attack to angiography were less than 7 days in 22 cases, 8 -- 30 days in 19 cases, 1 -- 4 monthes in 14 cases and more than 4 monthes in 10 cases, respectively. The cases in which angiography was done earlier after attacks displayed more abnormal findings. In 52 patients with caroted TIAs the artherosclerotic change of extracranial portion of the internal carotid artery was found in 14 cases (27 %), that of intracranial portion of the artery in 11 cases (21 %) and both lesions in 2 cases (4 %). On the other hand, in 13 patients with vertebrobasilar TIAs, this change was observed in 4 cases at the extracranival potion and in 1 case at the intracranial potion (siphon) of the internal carotid artery. Abnormal CT findings were found in 29 of 65 patients, namely 9 had ventricular dilatation and brain atrophy, 6 had cerebral infarction which was not associated with associated with symptoms of TIA. In carotid TIAs, Cerebral infarction was associated with symptoms of TIAs in 15 cases, namely 10 had a small low density area in the basal ganglia near the internal capsule and 5 had a low density area in the cortical or subcortical region. All of these 5 cases had cerebral embolism, which recanalized after attacks. (J.P.N.).

  15. Neuroradiological study of transient ischemic attack

    International Nuclear Information System (INIS)

    Takusagawa, Yoshihiko; Fujiwara, Yasuhiro; Ichiki, Ken; Suga, Takeshi; Nishigaki, Shinichi

    1986-01-01

    Fifty-two patients with carotid TIAs and thirteen patients with vertebrobasilar TIAs were investigated by angiography and computed tomography. TIA was diagnosed by clinical symptoms in accordance with the criteria for TIA of the Joint Committee for Stroke Facilities in the U.S.A. (1974). The 65 patients with TIAs included 49 males and 16 females with average age of 63.5 years old at the initial episode of TIA. As for the diseases associated with TIA, hypertension (51 %), diabetes mellitus (15 %) and ischemic heart diseases (11 %) were the major disorders. Atrial fibrillation was observed in 2 cases. Intervals from last TIA attack to angiography were less than 7 days in 22 cases, 8 ∼ 30 days in 19 cases, 1 ∼ 4 monthes in 14 cases and more than 4 monthes in 10 cases, respectively. The cases in which angiography was done earlier after attacks displayed more abnormal findings. In 52 patients with caroted TIAs the artherosclerotic change of extracranial portion of the internal carotid artery was found in 14 cases (27 %), that of intracranial portion of the artery in 11 cases (21 %) and both lesions in 2 cases (4 %). On the other hand, in 13 patients with vertebrobasilar TIAs, this change was observed in 4 cases at the extracranival potion and in 1 case at the intracranial potion (siphon) of the internal carotid artery. Abnormal CT findings were found in 29 of 65 patients, namely 9 had ventricular dilatation and brain atrophy, 6 had cerebral infarction which was not associated with associated with symptoms of TIA. In carotid TIAs, Cerebral infarction was associated with symptoms of TIAs in 15 cases, namely 10 had a small low density area in the basal ganglia near the internal capsule and 5 had a low density area in the cortical or subcortical region. All of these 5 cases had cerebral embolism, which recanalized after attacks. (J.P.N.)

  16. On the Spot: Oceans

    OpenAIRE

    Male, Alan; Butterfield, Moira

    2000-01-01

    This a children's non-fiction, knowledge bearing picture book that is part of a Reader's Digest series called 'On the Spot'. The series deals with a range of topics related to the natural world and this one introduces its young audience to the ecosystems of the oceans. \\ud The publication was illustrated and designed by the author (Alan Male) and is technically described as a board book with interactive 'pop up' features, specifically conceived to engage children's discovery and learning thro...

  17. Forensics Investigation of Web Application Security Attacks

    OpenAIRE

    Amor Lazzez; Thabet Slimani

    2015-01-01

    Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the sec...

  18. El spot electoral negativo

    Directory of Open Access Journals (Sweden)

    Palma Peña-Jiménez

    2011-01-01

    Full Text Available l spot político tiene durante la campaña un objetivo final inequívoco: la consecución del voto favorable. Se dirige al cuerpo electoral a través de la televisión y de Internet, y presenta, en muchos casos, un planteamiento negativo, albergando mensajes destinados a la crítica frontal contra el adversario, más que a la exposición de propuestas propias. Este artículo se centra en el análisis del spot electoral negativo, en aquellas producciones audiovisuales construidas sin más causa que la reprobación del contrincante. Se trata de vídeos que, lejos de emplearse en difundir las potencialidades de la organización y las virtudes de su candidato –además de su programa electoral–, consumen su tiempo en descalificar al oponente mediante la transmisión de mensajes, muchas veces, ad hominem. Repasamos el planteamiento negativo del spot electoral desde su primera manifestación, que en España data de 1996, año de emisión del conocido como vídeo del dóberman, sin olvidar otros ejemplos que completan el objeto de estudio.

  19. CDC Vital Signs-Heart Age

    Centers for Disease Control (CDC) Podcasts

    2015-09-01

    This podcast is based on the September 2015 CDC Vital Signs report. Your heart age is the age of your heart and blood vessels as a result of your risk factors for heart attack and stroke. If you smoke or have high blood pressure, your heart age will be much higher than your actual age. Learn what you can do to lower your heart age and keep it low.  Created: 9/1/2015 by National Center for Chronic Disease Prevention and Health Promotion (NCCDPHP).   Date Released: 9/1/2015.

  20. Roth spots in pernicious anaemia.

    Science.gov (United States)

    Macauley, Mavin; Nag, Satyajit

    2011-04-19

    Roth spots are white-centred retinal haemorrhages, previously thought to be pathognomonic for subacute bacterial endocarditis. A number of other conditions can be associated with Roth spots. In this case, the authors describe the association of Roth spots and pernicious anaemia. This association has been rarely described in the medical literature. Correct diagnosis and treatment with intramuscular vitamin B(12) injections resulted in complete resolution of the anaemia and Roth spots. The authors hope to alert clinicians to think of various differentials of Roth spots, and initiate prompt investigation and management.

  1. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  2. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  3. Panic Attacks and Panic Disorder

    Science.gov (United States)

    ... Major changes in your life, such as a divorce or the addition of a baby Smoking or ... quality of life. Complications that panic attacks may cause or be linked to include: Development of specific ...

  4. Genetic attack on neural cryptography

    International Nuclear Information System (INIS)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-01-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size

  5. Genetic attack on neural cryptography

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  6. Software-based Microarchitectural Attacks

    OpenAIRE

    Gruss, Daniel

    2017-01-01

    Modern processors are highly optimized systems where every single cycle of computation time matters. Many optimizations depend on the data that is being processed. Software-based microarchitectural attacks exploit effects of these optimizations. Microarchitectural side-channel attacks leak secrets from cryptographic computations, from general purpose computations, or from the kernel. This leakage even persists across all common isolation boundaries, such as processes, containers, and virtual ...

  7. OPERATION COBRA. Deliberate Attack, Exploitation

    Science.gov (United States)

    1984-05-25

    to attack Sens, then continue to Troyes , on the Seine River. CCA was in the north, crossing the Loing River at Souppes against light resistance and...advanced from Troyes and prepared positions close to Sens. Under strong artillery support, a task force from CCA (TF Oden) attacked the enemy frontally...movement towards the Seine River on 24 August with an advance toward Troyes . Facing the combat command were what remained of the 51st SS Brigade, light

  8. Heart Failure

    Science.gov (United States)

    Heart failure is a condition in which the heart can't pump enough blood to meet the body's needs. Heart failure does not mean that your heart has stopped ... and shortness of breath Common causes of heart failure are coronary artery disease, high blood pressure and ...

  9. Development and Validation of a Model to Predict Absolute Vascular Risk Reduction by Moderate-Intensity Statin Therapy in Individual Patients With Type 2 Diabetes Mellitus: The Anglo Scandinavian Cardiac Outcomes Trial, Antihypertensive and Lipid-Lowering Treatment to Prevent Heart Attack Trial, and Collaborative Atorvastatin Diabetes Study.

    Science.gov (United States)

    Kaasenbrood, Lotte; Poulter, Neil R; Sever, Peter S; Colhoun, Helen M; Livingstone, Shona J; Boekholdt, S Matthijs; Pressel, Sara L; Davis, Barry R; van der Graaf, Yolanda; Visseren, Frank L J

    2016-05-01

    In this study, we aimed to translate the average relative effect of statin therapy from trial data to the individual patient with type 2 diabetes mellitus by developing and validating a model to predict individualized absolute risk reductions (ARR) of cardiovascular events. Data of 2725 patients with type 2 diabetes mellitus from the Lipid Lowering Arm of the Anglo Scandinavian Cardiac Outcomes Trial (ASCOT-LLA) study (atorvastatin 10 mg versus placebo) were used for model derivation. The model was based on 8 clinical predictors including treatment allocation (statin/placebo). Ten-year individualized ARR on major cardiovascular events by statin therapy were calculated for each patient by subtracting the estimated on-treatment risk from the estimated off-treatment risk. Predicted 10-year ARR by statin therapy was 4% (median ARR, 3.2%; interquartile range, 2.5%-4.3%; 95% confidence interval for 3.2% ARR, -1.4% to 6.8%). Addition of treatment interactions did not improve model performance. Therefore, the wide distribution in ARR was a consequence of the underlying distribution in cardiovascular risk enrolled in these trials. External validation of the model was performed in data from the Antihypertensive and Lipid-Lowering Treatment to Prevent Heart Attack Trial (ALLHAT-LLT; pravastatin 40 mg versus usual care) and Collaborative Atorvastatin Diabetes Study (CARDS; atorvastatin 10 mg versus placebo) of 3878 and 2838 patients with type 2 diabetes mellitus, respectively. Model calibration was adequate in both external data sets, discrimination was moderate (ALLHAT-LLT: c-statistics, 0.64 [95% confidence interval, 0.61-0.67] and CARDS: 0.68 [95% confidence interval, 0.64-0.72]). ARRs of major cardiovascular events by statin therapy can be accurately estimated for individual patients with type 2 diabetes mellitus using a model based on routinely available patient characteristics. There is a wide distribution in ARR that may complement informed decision making. URL: http

  10. The Spotting Distribution of Wildfires

    Directory of Open Access Journals (Sweden)

    Jonathan Martin

    2016-06-01

    Full Text Available In wildfire science, spotting refers to non-local creation of new fires, due to downwind ignition of brands launched from a primary fire. Spotting is often mentioned as being one of the most difficult problems for wildfire management, because of its unpredictable nature. Since spotting is a stochastic process, it makes sense to talk about a probability distribution for spotting, which we call the spotting distribution. Given a location ahead of the fire front, we would like to know how likely is it to observe a spot fire at that location in the next few minutes. The aim of this paper is to introduce a detailed procedure to find the spotting distribution. Most prior modelling has focused on the maximum spotting distance, or on physical subprocesses. We will use mathematical modelling, which is based on detailed physical processes, to derive a spotting distribution. We discuss the use and measurement of this spotting distribution in fire spread, fire management and fire breaching. The appendix of this paper contains a comprehensive review of the relevant underlying physical sub-processes of fire plumes, launching fire brands, wind transport, falling and terminal velocity, combustion during transport, and ignition upon landing.

  11. Emerging hot spot analysis

    DEFF Research Database (Denmark)

    Reinau, Kristian Hegner

    Traditionally, focus in the transport field, both politically and scientifically, has been on private cars and public transport. Freight transport has been a neglected topic. Recent years has seen an increased focus upon congestion as a core issue across Europe, resulting in a great need for know...... speed data for freight. Secondly, the analytical methods used, space-time cubes and emerging hot spot analysis, are also new in the freight transport field. The analysis thus estimates precisely how fast freight moves on the roads in Northern Jutland and how this has evolved over time....

  12. Spotted wing drosophila prefer low hanging fruit: insights into foraging behavior and management strategies

    Science.gov (United States)

    Spotted wing drosophila (SWD), Drosophila suzukii, is an invasive insect that attacks ripe, small fruit such as raspberries, blackberries, and blueberries. Little is known about SWD foraging ecology, and current trapping and monitoring systems are ineffective at commercial scales. In caged foragin...

  13. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  14. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica......Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error......-prone and impracticable for large systems. Nonetheless, the automated generation of attack trees has only been explored in connection to computer networks and levering rich models, whose analysis typically leads to an exponential blow-up of the state space. We propose a static analysis approach where attack trees...... are automatically inferred from a process algebraic specification in a syntax-directed fashion, encompassing a great many application domains and avoiding incurring systematically an exponential explosion. Moreover, we show how the standard propositional denotation of an attack tree can be used to phrase...

  15. Heartburn or Chest Pain: When Is It Heart Attack?

    Science.gov (United States)

    ... of cardiovascular imaging in emergency department patients with chest pain: A joint document of the American College of Radiology Appropriateness Criteria Committee and the American College of ...

  16. [A heart attack: was the patient lucky or unlucky?

    NARCIS (Netherlands)

    Olde Hartman, T.C.; van Ravesteijn, H.; Lucassen, P.L.B.J.

    2012-01-01

    CIRCUMSTANCES WERE FAVOURABLE BUT OUTCOME ILL-FATED: The assessment of signs and symptoms in primary care is an important but difficult task for general practitioners (GPs) who have to decide whether symptoms require immediate action or rather a watchful waiting approach. However, the GP may

  17. When You Visit Your Doctor After a Heart Attack

    Science.gov (United States)

    ... or how a bite of bread tastes with dinner. Leverage your strengths for a more positive life Strengths are built-in capacities for certain thoughts, feelings, and behaviors. 5 ways to keep your memory sharp The way you live, what you eat and drink, and how you treat your body ...

  18. An Analysis of Attacks on Blockchain Consensus

    OpenAIRE

    Bissias, George; Levine, Brian Neil; Ozisik, A. Pinar; Andresen, Gavin

    2016-01-01

    We present and validate a novel mathematical model of the blockchain mining process and use it to conduct an economic evaluation of the double-spend attack, which is fundamental to all blockchain systems. Our analysis focuses on the value of transactions that can be secured under a conventional double-spend attack, both with and without a concurrent eclipse attack. Our model quantifies the importance of several factors that determine the attack's success, including confirmation depth, attacke...

  19. Recurrent spontaneous attacks of dizziness.

    Science.gov (United States)

    Lempert, Thomas

    2012-10-01

    This article describes the common causes of recurrent vertigo and dizziness that can be diagnosed largely on the basis of history. Ninety percent of spontaneous recurrent vertigo and dizziness can be explained by six disorders: (1) Ménière disease is characterized by vertigo attacks, lasting 20 minutes to several hours, with concomitant hearing loss, tinnitus, and aural fullness. Aural symptoms become permanent during the course of the disease. (2) Attacks of vestibular migraine may last anywhere from minutes to days. Most patients have a previous history of migraine headaches, and many experience migraine symptoms during the attack. (3) Vertebrobasilar TIAs affect older adults with vascular risk factors. Most attacks last less than 1 hour and are accompanied by other symptoms from the posterior circulation territory. (4) Vestibular paroxysmia is caused by vascular compression of the eighth cranial nerve. It manifests itself with brief attacks of vertigo that recur many times per day, sometimes with concomitant cochlear symptoms. (5) Orthostatic hypotension causes brief episodes of dizziness lasting seconds to a few minutes after standing up and is relieved by sitting or lying down. In older adults, it may be accompanied by supine hypertension. (6) Panic attacks usually last minutes, occur in specific situations, and are accompanied by choking, palpitations, tremor, heat, and anxiety. Less common causes of spontaneous recurrent vertigo and dizziness include perilymph fistula, superior canal dehiscence, autoimmune inner ear disease, otosclerosis, cardiac arrhythmia, and medication side effects. Neurologists need to venture into otolaryngology, internal medicine, and psychiatry to master the differential diagnosis of recurrent dizziness.

  20. Heart Diseases

    Science.gov (United States)

    ... you're like most people, you think that heart disease is a problem for others. But heart disease is the number one killer in the ... of disability. There are many different forms of heart disease. The most common cause of heart disease ...

  1. Heart Transplantation

    Science.gov (United States)

    A heart transplant removes a damaged or diseased heart and replaces it with a healthy one. The healthy heart comes from a donor who has died. It is the last resort for people with heart failure when all other treatments have failed. The ...

  2. Rehab for the Heart (A Cup of Health with CDC)

    Centers for Disease Control (CDC) Podcasts

    2017-08-24

    Each year, nearly 790,000 adults in the U.S. suffer a heart attack. For a third of these, it’s not their first. Cardiac rehabilitation could have prevented many of these. In this podcast, Dr. Fleetwood Loustalot discusses the importance of getting cardiac rehab after a heart attack.  Created: 8/24/2017 by MMWR.   Date Released: 8/24/2017.

  3. Mitigating Higher Ed Cyber Attacks

    Science.gov (United States)

    Rogers, Gary; Ashford, Tina

    2015-01-01

    In this presentation we will discuss the many and varied cyber attacks that have recently occurred in the higher ed community. We will discuss the perpetrators, the victims, the impact and how these institutions have evolved to meet this threat. Mitigation techniques and defense strategies will be covered as will a discussion of effective security…

  4. Detection of complex cyber attacks

    Science.gov (United States)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  5. Models of spots and flares

    International Nuclear Information System (INIS)

    Mullan, D.J.

    1983-01-01

    Laboratory experiments in recent years have shown that there are many more ways to drive a plasma out of equilibrium than to preserve equilibrium. In that sense, it is perhaps easier to understand why flares should occur in a stellar atmosphere than why a long-lived feature such as a dark spot should persist. The author summarizes work on the equilibrium structure of cool spots in the sun and stars. Since spots involve complex interactions between convective flows and magnetic fields, he needs to refer to observations for help in identifying the dominant processes which should enter into the modelling. His summary therefore begins by discussing certain relevant properties of spots in the solar atmosphere. The next sections deal with the magnetic fields in spots, the stability of spots, spot cooling and missing flux. The author concludes that spots should be viewed not simply as cool areas, but rather as engines which do the work of converting the energy of convective flows into flare-compatible form. (Auth.)

  6. Black-spot poison ivy.

    Science.gov (United States)

    Schram, Sarah E; Willey, Andrea; Lee, Peter K; Bohjanen, Kimberly A; Warshaw, Erin M

    2008-01-01

    In black-spot poison ivy dermatitis, a black lacquerlike substance forms on the skin when poison ivy resin is exposed to air. Although the Toxicodendron group of plants is estimated to be the most common cause of allergic contact dermatitis in the United States, black-spot poison ivy dermatitis is relatively rare.

  7. Rocky Mountain spotted fever, Colombia.

    Science.gov (United States)

    Hidalgo, Marylin; Orejuela, Leonora; Fuya, Patricia; Carrillo, Pilar; Hernandez, Jorge; Parra, Edgar; Keng, Colette; Small, Melissa; Olano, Juan P; Bouyer, Donald; Castaneda, Elizabeth; Walker, David; Valbuena, Gustavo

    2007-07-01

    We investigated 2 fatal cases of Rocky Mountain spotted fever that occurred in 2003 and 2004 near the same locality in Colombia where the disease was first reported in the 1930s. A retrospective serosurvey of febrile patients showed that > 21% of the serum samples had antibodies aaainst spotted fever group rickettsiae.

  8. Advances in spot curing technology

    International Nuclear Information System (INIS)

    Burga, R.

    1999-01-01

    A brief review of spot curing technology was presented. The process which a spot of energy of a specific wavelength bandwidth and irradiance is used to cause a coating, encapsulant or adhesive to change from a liquid to a solid state

  9. Transient complete atrioventricular block with Morgagni—Adams—Stokes attacks in a child after aortic valve replacement

    Directory of Open Access Journals (Sweden)

    D. R. Sabirova

    2014-01-01

    Full Text Available The diagnosis and treatment of life-threatening arrhythmias after surgical correction of congenital heart diseases is one the urgent problems in pediatrlc cardiology. The paper describes the clinical picture, diagnosis, and therapy in a patent with transient complete atrioventricular block after open heart surgery. A protracted Morgagni—Adams—Stokes attack is one of the causes of sudden cardiac death. The occurrence of even single syncopes in patients after surgery for congenital heart disease requires that the arrhythmogenic nature of the attack should be ruled out for the timely and adequate therapy including the implantation of antiarrhythmic devices.

  10. Palliative Care in Heart Failure

    Directory of Open Access Journals (Sweden)

    Hatice Mert

    2012-04-01

    Full Text Available Heart failure is an important health problem since its incidence and prevalence is increasing year by year. Since symptom burden and mortality are high in heart failure, supportive and palliative care should be provided. However, very few patients are referred to palliative care services. In comparison with cancer patients, it is difficult to identify end of life care for patients with heart failure, because these patients are hospitalized when the signs of acute decompensation appear, and their symptoms decrease and functional status improve before they are discharged. Therefore, palliative care, which is a holistic approach aiming to improve patients’ quality of life, to detect and treat the attacks of the disease before they become severe, and to deal with patients’ physical, psychological, social, and mental health altogether during their care, should be integrated into heart failure patients’ care. [TAF Prev Med Bull 2012; 11(2.000: 217-222

  11. The impact of eggshell colour and spot area in Japanese quails: II. Slaughter and carcass characteristic

    Directory of Open Access Journals (Sweden)

    Sema Alasahan

    Full Text Available ABSTRACT This study was carried out to investigate the effects of eggshell colour and spot properties (colour and size of the spot area on growth performance and carcass traits of Japanese quail (Coturnix coturnix japonica eggs. Study material were allocated to five groups according to their eggshell and spot colours: black spots on greyish white coloured eggshell (I, blue spots on greyish white coloured eggshell (II, diffuse brown spots on greyish brown coloured eggshell (III, brown spots on light green colored eggshell (IV, and small brown spots on greyish brown coloured eggshell (V. The size of the spotted area was determined in each egg group using digital image analysis. The groups did not differ for body weight and length of the shank at the end of the growth period. However, the groups differed significantly for carcass yield after slaughter (not eviscerated and carcass yield. These parameters were highest in Group I (82.08 and 76.09% and lowest in Group III (80.20 and 73.86%. Digital image analysis demonstrated that heart length, cardiac fat area, gizzard width, and intestine length varied between the groups. Cardiac fat area was largest in Group III (0.86 cm2 and smallest in Group V (0.65 cm2. Gizzard width was greatest in Group I (2.63 cm and smallest in Group V (2.47 cm. Intestine length was greatest in Group V (78.45 cm and smallest in Group IV (72.39 cm. Body weight, shank length, and slaughter and carcass weight do not vary in relation to eggshell colour or the size of the spotted area. The lengths of intestine and heart, gizzard width, and cardiac fat area do vary in relation to eggshell colour or the size of the spotted area.

  12. Spotting psychopaths using technology.

    Science.gov (United States)

    Hulbert, Sarah; Adeli, Hojjat

    2015-01-01

    For the past three and a half decades, the Psychopathy Checklist-Revised (PCL-R) and the self-report Psychopathic Personality Inventory-Revised (PPI-R) have been the standard measures for the diagnosis of psychopathy. Technological approaches can enhance these diagnostic methodologies. The purpose of this paper is to present a state-of-the-art review of various technological approaches for spotting psychopathy, such as electroencephalogram (EEG), magnetic resonance imaging (MRI), functional MRI (fMRI), transcranial magnetic stimulation (TMS), and other measures. Results of EEG event-related potential (ERP) experiments support the theory that impaired amygdala function may be responsible for abnormal fear processing in psychopathy, which can ultimately manifest as psychopathic traits, as outlined by the PCL-R or PPI-R. Imaging studies, in general, point to reduced fear processing capabilities in psychopathic individuals. While the human element, introduced through researcher/participant interactions, can be argued as unequivocally necessary for diagnosis, these purely objective technological approaches have proven to be useful in conjunction with the subjective interviewing and questionnaire methods for differentiating psychopaths from non-psychopaths. Furthermore, these technologies are more robust than behavioral measures, which have been shown to fail.

  13. Peacetime Use of Computer Network Attack

    National Research Council Canada - National Science Library

    Busby, Daniel

    2000-01-01

    .... PDD-63 alerts the nation to prepare for impending cyber attacks. This paper examines the nature, scale, and likelihood of cyber attacks posited in PDD-63 and finds that the country does not face an imminent "electronic Pearl Harbor...

  14. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  15. Robust Detection of Stepping-Stone Attacks

    National Research Council Canada - National Science Library

    He, Ting; Tong, Lang

    2006-01-01

    The detection of encrypted stepping-stone attack is considered. Besides encryption and padding, the attacker is capable of inserting chaff packets and perturbing packet timing and transmission order...

  16. Using an ontology for network attack planning

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-09-01

    Full Text Available The modern complexity of network attacks and their counter-measures (cyber operations) requires detailed planning. This paper presents a Network Attack Planning ontology which is aimed at providing support for planning such network operations within...

  17. Heart Truth

    Science.gov (United States)

    ... health! Get a free badge or banner to post to your website or blog. Are you at risk for heart disease? Here's how to find out . Planning to use The Heart Truth logo? Check out our logo guidelines and downloads. ...

  18. Heart Disease

    Science.gov (United States)

    ... it may be caused by diseases, such as connective tissue disorders, excessive iron buildup in your body (hemochromatosis), the buildup of abnormal proteins (amyloidosis) or by some cancer treatments. Causes of heart infection A heart infection, ...

  19. Spot Welding of Honeycomb Structures

    Science.gov (United States)

    Cohal, V.

    2017-08-01

    Honeycomb structures are used to prepare meals water jet cutting machines for textile. These honeycomb structures are made of stainless steel sheet thickness of 0.1-0.2 mm. Corrugated sheet metal strips are between two gears with special tooth profile. Hexagonal cells for obtaining these strips are welded points between them. Spot welding device is three electrodes in the upper part, which carries three welding points across the width of the strip of corrugated sheet metal. Spot welding device filled with press and advance mechanisms. The paper presents the values of the regime for spot welding.

  20. Attack Graph Construction for Security Events Analysis

    Directory of Open Access Journals (Sweden)

    Andrey Alexeevich Chechulin

    2014-09-01

    Full Text Available The paper is devoted to investigation of the attack graphs construction and analysis task for a network security evaluation and real-time security event processing. Main object of this research is the attack modeling process. The paper contains the description of attack graphs building, modifying and analysis technique as well as overview of implemented prototype for network security analysis based on attack graph approach.

  1. Heart pacemaker

    Science.gov (United States)

    Cardiac pacemaker implantation; Artificial pacemaker; Permanent pacemaker; Internal pacemaker; Cardiac resynchronization therapy; CRT; Biventricular pacemaker; Arrhythmia - pacemaker; Abnormal heart ...

  2. Improvement of Hungarian Joint Terminal Attack Program

    Science.gov (United States)

    2013-06-13

    LST Laser Spot Tracker NVG Night Vision Goggle ROMAD Radio Operator Maintainer and Driver ROVER Remotely Operated Video Enhanced Receiver TACP...visual target designation. The other component consists of a laser spot tracker (LST), which identifies targets by tracking laser energy reflecting...capability for every type of night time missions, laser spot tracker for laser spot search missions, remotely operated video enhanced receiver

  3. Participation in Heart-Healthy Behaviors: A Secondary Analysis of the American Heart Association Go Red Heart Match Data.

    Science.gov (United States)

    Arslanian-Engoren, Cynthia; Eastwood, Jo-Ann; De Jong, Marla J; Berra, Kathy

    2015-01-01

    The American Heart Association created Go Red Heart Match, a free and secure online program that enables women to connect with each other to fight heart disease either personally or as a caregiver for someone with heart disease. Through these connections, participants have an opportunity to develop a personal, private, and supportive relationship with other women; share common experiences; and motivate and encourage each other to follow a heart-healthy lifestyle. The aims of this study were to describe the demographic characteristics of the Go Red Heart Match responders and to determine whether participation in the program prompted participants to engage in heart-healthy behaviors. A secondary analysis of data collected as part of a needs assessment survey from the American Heart Association Go Red Heart Match was conducted. A total of 117 (35%) of the 334 invited women completed the survey. Most responders were female, married, and college educated. A total of 105 (90%) responders were diagnosed with a type of heart disease or stroke and 77 (73%) responders had undergone treatment. As a result of participating in the program, 75% of the responders reported the following improvements in heart-healthy behaviors: eating a more heart-healthy diet (54%), exercising more frequently (53%), losing weight (47%), and quitting smoking (10%). Responders who had a diagnosis of heart attack (n = 48) were more likely (P = .003) to quit smoking than were those with other diagnoses (n = 69). Notably, 48% of responders reported encouraging someone else in their life to speak to their doctor about their risk for heart disease. Most women who participated in Heart Match reported engaging in new heart-healthy behaviors. The findings support expanding the existing program in a more diverse population as a potentially important way to reach women and encourage cardiovascular disease risk reduction for those with heart disease and stroke.

  4. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  5. Automated classification of computer network attacks

    CSIR Research Space (South Africa)

    Van Heerden, R

    2013-11-01

    Full Text Available according to the relevant types of attack scenarios depicted in the ontology. The two network attack instances are the Distributed Denial of Service attack on SpamHaus in 2013 and the theft of 42 million Rand ($6.7 million) from South African Postbank...

  6. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  7. Asthma-like attacks terminated by slow pathway ablation

    Directory of Open Access Journals (Sweden)

    Selcuk Ozturk

    2017-01-01

    Full Text Available Asthma is a chronic airway disease in which the pathological mechanisms are reversible airway obstruction, bronchial hyper reactivity, and constriction of the lower airways. Supraventricular tachycardia (SVT is a common arrhythmia which originates above the bundle of His and causing heart rates exceeding 150 beats/min. SVT patients present with palpitation, chest pain, chest discomfort, dyspnea, hyperventilation, and lightheadedness, occasionally. Besides, extraordinary presentations of SVT are available in literature. In this report, we describe a case of a patient presenting with treatment-resistant asthma-like attacks lasting for 20 years whom was suspected SVT as an underlying etiology and treated by slow pathway radiofrequency ablation.

  8. Heart Block

    Science.gov (United States)

    ... as lupus. People who have these diseases make proteins called antibodies that attack and damage the body's tissues or cells. In pregnant women, antibodies can cross the placenta. (The placenta ...

  9. Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers

    NARCIS (Netherlands)

    Pieters, Wolter; Davarynejad, Mohsen

    2015-01-01

    Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of multiple steps and alternative paths. It is possible to derive properties of the overall attacks from properties of individual steps, such as cost for the attacker and probability of success. However, in

  10. Heart Development in the Spotted Dolphin (Stenella attenuata)

    Czech Academy of Sciences Publication Activity Database

    Míšek, Ivan; Sedmera, D.; Klíma, M.; Thompson, R. P.

    2003-01-01

    Roč. 6, č. 5 (2003), s. 687-699 ISSN 0003-276X R&D Projects: GA AV ČR IAA7039901 Institutional research plan: CEZ:AV0Z5045916 Keywords : cardiac morphogenesis * compact myocardium * coronary vasculogenesis Subject RIV: ED - Physiology Impact factor: 1.587, year: 2002

  11. Recognizing Advanced Heart Failure and Knowing Your Options

    Science.gov (United States)

    ... and Live Our Interactive Cardiovascular Library has detailed animations and illustrations to help you learn about conditions, treatments and procedures related to heart disease and stroke. Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  12. Heart scanner - who's between a rock and a hard place?

    African Journals Online (AJOL)

    evidence of coronary heart disease succumbs to a fatal heart attack. Cardiac symptoms, positive stress test results and angiographically visible narrowings are all dependent on significant lumenal stenosis. Considerable atherosclerosis can be present in an asymptomatic patient in whom physical examination, stress testing ...

  13. Is diet an essential risk factor for coronary heart disease?

    OpenAIRE

    Ball, K. P.

    1980-01-01

    Cigarette smoking, hypertension and diet each play a major role in the development of coronary heart attacks in most industrialized nations. In some countries where cigarette smoking and hypertension are prevalent there is a low risk of coronary heart disease (CHD). Hyperlipidaemia resulting from national food habits appears to be the essential factor in the high rates of CHD in developed countries.

  14. Whispering through DDoS attack

    OpenAIRE

    Miralem Mehic; Jiri Slachta; Miroslav Voznak

    2016-01-01

    Denial of service (DoS) attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS) attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes o...

  15. Script-viruses Attacks on UNIX OS

    Directory of Open Access Journals (Sweden)

    D. M. Mikhaylov

    2010-06-01

    Full Text Available In this article attacks on UNIX OS are considered. Currently antivirus developers are concentrated on protecting systems from viruses that are most common and attack popular operating systems. If the system or its components are not often attacked then the antivirus products are not protecting these components as it is not profitable. The same situation is with script-viruses for UNIX OS as most experts consider that it is impossible for such viruses to get enough rights to attack. Nevertheless the main conclusion of this article is the fact that such viruses can be very powerful and can attack systems and get enough rights.

  16. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks. In prac......In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks....... In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...

  17. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based......Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identified...... on invalidating policies in the system model by identifying possible sequences of actions that lead to an attack. The generated attacks are precise enough to illustrate the threat, and they are general enough to hide the details of individual steps....

  18. Whispering through DDoS attack

    Directory of Open Access Journals (Sweden)

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  19. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  20. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  1. Cache timing attacks on recent microarchitectures

    DEFF Research Database (Denmark)

    Andreou, Alexandres; Bogdanov, Andrey; Tischhauser, Elmar Wolfgang

    2017-01-01

    Cache timing attacks have been known for a long time, however since the rise of cloud computing and shared hardware resources, such attacks found new potentially devastating applications. One prominent example is S$A (presented by Irazoqui et al at S&P 2015) which is a cache timing attack against...... AES or similar algorithms in virtualized environments. This paper applies variants of this cache timing attack to Intel's latest generation of microprocessors. It enables a spy-process to recover cryptographic keys, interacting with the victim processes only over TCP. The threat model is a logically...... separated but CPU co-located attacker with root privileges. We report successful and practically verified applications of this attack against a wide range of microarchitectures, from a two-core Nehalem processor (i5-650) to two-core Haswell (i7-4600M) and four-core Skylake processors (i7-6700). The attack...

  2. 77 FR 5373 - American Heart Month, 2012

    Science.gov (United States)

    2012-02-03

    ...; its victims are fathers and daughters, grandparents and siblings, cherished friends and community... Federal agencies and forging new public-private partnerships to prevent one million heart attacks and... research to unlock new treatments for cardiovascular disease. And the Centers for Disease Control and...

  3. Mending broken hearts : Cardiac regeneration in zebrafish

    NARCIS (Netherlands)

    kruse, fabian

    2017-01-01

    Cardiovascular disease is the leading global cause of death, accounting for more than 30% of all deaths. It claims more lives than all forms of cancer combined. Bearing these facts in mind, research in this field is direly needed. A heart attack, also known as myocardial infarction (MI), happens

  4. Numerical optimisation in spot detector design

    NARCIS (Netherlands)

    van der Heijden, Ferdinand; Apperloo, W.; Spreeuwers, Lieuwe Jan

    1997-01-01

    Spots are image details resulting from objects, the projections of which are so small that the inner structure of these objects cannot be resolved from their image. Spot detectors are image operators aiming at the detection and localisation of spots in the image. Most spot detectors can be tuned

  5. Managing emerging threats to spotted owls

    Science.gov (United States)

    Ho Yi Wan; Joseph L. Ganey; Christina D. Vojta; Samuel A. Cushman

    2018-01-01

    The 3 spotted owl (Strix occidentalis) subspecies in North America (i.e., northern spotted owl [S. o. caurina], California spotted owl [S. o. occidentalis], Mexican spotted owl [S. o. lucida]) have all experienced population declines over the past century due to habitat loss and fragmentation from logging. Now, the emerging influences of climate change, high-severity...

  6. 9 CFR 149.4 - Spot audit.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 1 2010-01-01 2010-01-01 false Spot audit. 149.4 Section 149.4... LIVESTOCK IMPROVEMENT VOLUNTARY TRICHINAE CERTIFICATION PROGRAM § 149.4 Spot audit. (a) In addition to regularly scheduled site audits, certified production sites will be subject to spot audits. (1) Random spot...

  7. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  8. Attack-Resistant Trust Metrics

    Science.gov (United States)

    Levien, Raph

    The Internet is an amazingly powerful tool for connecting people together, unmatched in human history. Yet, with that power comes great potential for spam and abuse. Trust metrics are an attempt to compute the set of which people are trustworthy and which are likely attackers. This chapter presents two specific trust metrics developed and deployed on the Advogato Website, which is a community blog for free software developers. This real-world experience demonstrates that the trust metrics fulfilled their goals, but that for good results, it is important to match the assumptions of the abstract trust metric computation to the real-world implementation.

  9. On the origin of delta spots

    International Nuclear Information System (INIS)

    Tang, F.

    1983-01-01

    Mount Wilson sunspot drawings from 1966 through 1980 were used in conjunction with Hα filtergrams from Big Bear Solar Observatory to examine the origin of delta spots, spots with bipolar umbrae within one penumbra. Of the six cases we studied, five were formed by the union of non-paired spots. They are either shoved into one another by two neighboring growing bipoles or by a new spot born piggy-back style on an existing spot of opposite polarity. Proper motions of the growing spots take on curvilinear paths around one another to avoid a collision. This is the shear motion observed in delta spots (Tanaka, 1979). In the remaining case, the delta spot was formed by spots that emerged as a pair. Our findings indicate no intrinsic differences in the formation or the behavior between delta spots of normal magnetic configuration. (orig.)

  10. Heart regeneration.

    Science.gov (United States)

    Breckwoldt, Kaja; Weinberger, Florian; Eschenhagen, Thomas

    2016-07-01

    Regenerating an injured heart holds great promise for millions of patients suffering from heart diseases. Since the human heart has very limited regenerative capacity, this is a challenging task. Numerous strategies aiming to improve heart function have been developed. In this review we focus on approaches intending to replace damaged heart muscle by new cardiomyocytes. Different strategies for the production of cardiomyocytes from human embryonic stem cells or human induced pluripotent stem cells, by direct reprogramming and induction of cardiomyocyte proliferation are discussed regarding their therapeutic potential and respective advantages and disadvantages. Furthermore, different methods for the transplantation of pluripotent stem cell-derived cardiomyocytes are described and their clinical perspectives are discussed. This article is part of a Special Issue entitled: Cardiomyocyte Biology: Integration of Developmental and Environmental Cues in the Heart edited by Marcus Schaub and Hughes Abriel. Copyright © 2015 Elsevier B.V. All rights reserved.

  11. Migraine attacks the Basal Ganglia

    Directory of Open Access Journals (Sweden)

    Bigal Marcelo

    2011-09-01

    Full Text Available Abstract Background With time, episodes of migraine headache afflict patients with increased frequency, longer duration and more intense pain. While episodic migraine may be defined as 1-14 attacks per month, there are no clear-cut phases defined, and those patients with low frequency may progress to high frequency episodic migraine and the latter may progress into chronic daily headache (> 15 attacks per month. The pathophysiology of this progression is completely unknown. Attempting to unravel this phenomenon, we used high field (human brain imaging to compare functional responses, functional connectivity and brain morphology in patients whose migraine episodes did not progress (LF to a matched (gender, age, age of onset and type of medication group of patients whose migraine episodes progressed (HF. Results In comparison to LF patients, responses to pain in HF patients were significantly lower in the caudate, putamen and pallidum. Paradoxically, associated with these lower responses in HF patients, gray matter volume of the right and left caudate nuclei were significantly larger than in the LF patients. Functional connectivity analysis revealed additional differences between the two groups in regard to response to pain. Conclusions Supported by current understanding of basal ganglia role in pain processing, the findings suggest a significant role of the basal ganglia in the pathophysiology of the episodic migraine.

  12. Anger attacks in obsessive compulsive disorder

    Directory of Open Access Journals (Sweden)

    Nitesh Prakash Painuly

    2011-01-01

    Full Text Available Background: Research on anger attacks has been mostly limited to depression, and only a few studies have focused on anger attacks in obsessive compulsive disorder. Materials and Methods: In a cross-sectional study all new obsessive compulsive disorder patients aged 20-60 years attending an outpatient clinic were assessed using the anger attack questionnaire, irritability, depression and anxiety scale (for the direction of the aggressive behavior and quality of life (QOL. Results: The sample consisted of 42 consecutive subjects with obsessive compulsive disorder, out of which 21 (50% had anger attacks. The obsessive compulsive disorder subjects with and without anger attacks did not show significant differences in terms of sociodemographic variables, duration of illness, treatment, and family history. However, subjects with anger attacks had significantly higher prevalence of panic attacks and comorbid depression. Significantly more subjects with anger attacks exhibited aggressive acts toward spouse, parents, children, and other relatives in the form of yelling and threatening to hurt, trying to hurt, and threatening to leave. However, the two groups did not differ significantly in terms of QOL, except for the psychological domain being worse in the subjects with anger attacks. Conclusion: Anger attacks are present in half of the patients with obsessive compulsive disorder, and they correlate with the presence of comorbid depression.

  13. Heart Failure

    OpenAIRE

    McMurray, John; Ponikowski, Piotr

    2011-01-01

    Heart failure occurs in 3% to 4% of adults aged over 65 years, usually as a consequence of coronary artery disease or hypertension, and causes breathlessness, effort intolerance, fluid retention, and increased mortality. The 5-year mortality in people with systolic heart failure ranges from 25% to 75%, often owing to sudden death following ventricular arrhythmia. Risks of cardiovascular events are increased in people with left ventricular systolic dysfunction (LVSD) or heart failure.

  14. Artificial heart

    Energy Technology Data Exchange (ETDEWEB)

    1984-10-18

    Super-pure plutonium-238 could use heat produced during fission to power an implanted artificial heart. Three model hearts have worked for some time. Concern that excess heat would make the procedure unsafe for humans has broadened the search for another energy source, such as electrohydraulic drive or an external power battery. A back pack approach may provide an interim solution until materials are developed which can withstand heart activity and be small enough for implantation.

  15. Types of Heart Failure

    Science.gov (United States)

    ... Introduction Types of Heart Failure Classes of Heart Failure Heart Failure in Children Advanced Heart Failure • Causes and ... and procedures related to heart disease and stroke. Heart Failure Questions to Ask Your Doctor Use these questions ...

  16. CARDIAC EMERGENCY: LIFT UP YOUR HEARTS

    CERN Multimedia

    2000-01-01

    50 000 deaths every year in France following heart problems. You or someone close to you, a friend, a relative, a colleague at work. You all probably know someone who has had a heart attack. Noting that 80% of all deaths occur outside hospital, the Fédération Française de Cardiologie, working in collaboration with first aid groups (rescue associations, etc.), are launching a nationwide campaign to train as many people as possible in what to do for cardiac first aid. According to specialists, more than half of all heart attack victims could have survived if someone nearby had been quick at doing what was needed. The CERN Fire Brigade is helping in this campaign by offering two free training sessions, each lasting three hours and mainly based on recognizing a heart attack, the proper way of calling for help, and practice in mouth-to-mouth resuscitation and heart massage. The courses will be held on 20 November and 6 December from4 to 7 p.m. at Building 65. So don’t wait, stop b...

  17. Timing of Occurrence Is the Most Important Characteristic of Spot Sign.

    Science.gov (United States)

    Wang, Binli; Yan, Shenqiang; Xu, Mengjun; Zhang, Sheng; Liu, Keqin; Hu, Haitao; Selim, Magdy; Lou, Min

    2016-05-01

    Most previous studies have used single-phase computed tomographic angiography to detect the spot sign, a marker for hematoma expansion (HE) in spontaneous intracerebral hemorrhage. We investigated whether defining the spot sign based on timing on perfusion computed tomography (CTP) would improve its specificity for predicting HE. We prospectively enrolled supratentorial spontaneous intracerebral hemorrhage patients who underwent CTP within 6 hours of onset. Logistic regression was performed to assess the risk factors for HE and poor outcome. Predictive performance of individual CTP spot sign characteristics were examined with receiver operating characteristic analysis. Sixty-two men and 21 women with spontaneous intracerebral hemorrhage were included in this analysis. Spot sign was detected in 46% (38/83) of patients. Receiver operating characteristic analysis indicated that the timing of spot sign occurrence on CTP had the greatest area under receiver operating characteristic curve for HE (0.794; 95% confidence interval, 0.630-0.958; P=0.007); the cutoff time was 23.13 seconds. On multivariable analysis, the presence of early-occurring spot sign (ie, spot sign before 23.13 seconds) was an independent predictor not only of HE (odds ratio=28.835; 95% confidence interval, 6.960-119.458; Pspot sign maintained a higher specificity for HE compared with spot sign (91% versus 74%). Redefining the spot sign based on timing of contrast leakage on CTP to determine early-occurring spot sign improves the specificity for predicting HE and 3-month mortality. The use of early-occurring spot sign could improve the selection of ICH patients for potential hemostatic therapy. © 2016 American Heart Association, Inc.

  18. Poisson's spot and Gouy phase

    Science.gov (United States)

    da Paz, I. G.; Soldati, Rodolfo; Cabral, L. A.; de Oliveira, J. G. G.; Sampaio, Marcos

    2016-12-01

    Recently there have been experimental results on Poisson spot matter-wave interferometry followed by theoretical models describing the relative importance of the wave and particle behaviors for the phenomenon. We propose an analytical theoretical model for Poisson's spot with matter waves based on the Babinet principle, in which we use the results for free propagation and single-slit diffraction. We take into account effects of loss of coherence and finite detection area using the propagator for a quantum particle interacting with an environment. We observe that the matter-wave Gouy phase plays a role in the existence of the central peak and thus corroborates the predominantly wavelike character of the Poisson's spot. Our model shows remarkable agreement with the experimental data for deuterium (D2) molecules.

  19. DDOS ATTACK DETECTION SIMULATION AND HANDLING MECHANISM

    Directory of Open Access Journals (Sweden)

    Ahmad Sanmorino

    2013-11-01

    Full Text Available In this study we discuss how to handle DDoS attack that coming from the attacker by using detection method and handling mechanism. Detection perform by comparing number of packets and number of flow. Whereas handling mechanism perform by limiting or drop the packets that detected as a DDoS attack. The study begins with simulation on real network, which aims to get the real traffic data. Then, dump traffic data obtained from the simulation used for detection method on our prototype system called DASHM (DDoS Attack Simulation and Handling Mechanism. From the result of experiment that has been conducted, the proposed method successfully detect DDoS attack and handle the incoming packet sent by attacker.

  20. Model checking exact cost for attack scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2017-01-01

    Attack trees constitute a powerful tool for modelling security threats. Many security analyses of attack trees can be seamlessly expressed as model checking of Markov Decision Processes obtained from the attack trees, thus reaping the benefits of a coherent framework and a mature tool support....... However, current model checking does not encompass the exact cost analysis of an attack, which is standard for attack trees. Our first contribution is the logic erPCTL with cost-related operators. The extended logic allows to analyse the probability of an event satisfying given cost bounds and to compute...... the exact cost of an event. Our second contribution is the model checking algorithm for erPCTL. Finally, we apply our framework to the analysis of attack trees....

  1. Securing internet by eliminating DDOS attacks

    Science.gov (United States)

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  2. Laser based spot weld characterization

    Science.gov (United States)

    Jonietz, Florian; Myrach, Philipp; Rethmeier, Michael; Suwala, Hubert; Ziegler, Mathias

    2016-02-01

    Spot welding is one of the most important joining technologies, especially in the automotive industry. Hitherto, the quality of spot welded joints is tested mainly by random destructive tests. A nondestructive testing technique offers the benefit of cost reduction of the testing procedure and optimization of the fabrication process, because every joint could be examined. This would lead to a reduced number of spot welded joints, as redundancies could be avoided. In the procedure described here, the spot welded joint between two zinc-coated steel sheets (HX340LAD+Z100MB or HC340LA+ZE 50/50) is heated optically on one side. Laser radiation and flash light are used as heat sources. The melted zone, the so called "weld nugget" provides the mechanical stability of the connection, but also constitutes a thermal bridge between the sheets. Due to the better thermal contact, the spot welded joint reveals a thermal behavior different from the surrounding material, where the heat transfer between the two sheets is much lower. The difference in the transient thermal behavior is measured with time resolved thermography. Hence, the size of the thermal contact between the two sheets is determined, which is directly correlated to the size of the weld nugget, indicating the quality of the spot weld. The method performs well in transmission with laser radiation and flash light. With laser radiation, it works even in reflection geometry, thus offering the possibility of testing with just one-sided accessibility. By using heating with collimated laser radiation, not only contact-free, but also remote testing is feasible. A further convenience compared to similar thermographic approaches is the applicability on bare steel sheets without any optical coating for emissivity correction. For this purpose, a proper way of emissivity correction was established.

  3. Is this Red Spot the Blue Spot (locus ceruleum)?

    Energy Technology Data Exchange (ETDEWEB)

    Choe, Won Sick; Lee, Yu Kyung; Lee, Min Kyung; Hwang, Kyung Hoon [Gachon University Gil Hospital, Incheon (Korea, Republic of)

    2010-06-15

    The authors report brain images of 18F-FDG-PET in a case of schizophrenia. The images showed strikingly increased bilateral uptake in the locus ceruleum. The locus ceruleum is called the blue spot and known to be a center of the norepinephrinergic system.

  4. Is this Red Spot the Blue Spot (locus ceruleum)?

    International Nuclear Information System (INIS)

    Choe, Won Sick; Lee, Yu Kyung; Lee, Min Kyung; Hwang, Kyung Hoon

    2010-01-01

    The authors report brain images of 18F-FDG-PET in a case of schizophrenia. The images showed strikingly increased bilateral uptake in the locus ceruleum. The locus ceruleum is called the blue spot and known to be a center of the norepinephrinergic system.

  5. Statistical hot spot analysis of reactor cores

    International Nuclear Information System (INIS)

    Schaefer, H.

    1974-05-01

    This report is an introduction into statistical hot spot analysis. After the definition of the term 'hot spot' a statistical analysis is outlined. The mathematical method is presented, especially the formula concerning the probability of no hot spots in a reactor core is evaluated. A discussion with the boundary conditions of a statistical hot spot analysis is given (technological limits, nominal situation, uncertainties). The application of the hot spot analysis to the linear power of pellets and the temperature rise in cooling channels is demonstrated with respect to the test zone of KNK II. Basic values, such as probability of no hot spots, hot spot potential, expected hot spot diagram and cumulative distribution function of hot spots, are discussed. It is shown, that the risk of hot channels can be dispersed equally over all subassemblies by an adequate choice of the nominal temperature distribution in the core

  6. Transient ischemic attack: diagnostic evaluation.

    Science.gov (United States)

    Messé, Steven R; Jauch, Edward C

    2008-08-01

    A transient ischemic attack portends significant risk of a stroke. Consequently, the diagnostic evaluation in the emergency department is focused on identifying high-risk causes so that preventive strategies can be implemented. The evaluation consists of a facilitated evaluation of the patient's metabolic, cardiac, and neurovascular systems. At a minimum, the following tests are recommended: fingerstick glucose level, electrolyte levels, CBC count, urinalysis, and coagulation studies; noncontrast computed tomography (CT) of the head; electrocardiography; and continuous telemetry monitoring. Vascular imaging studies, such as carotid ultrasonography, CT angiography, or magnetic resonance angiography, should be performed on an urgent basis and prioritized according to the patient's risk stratification for disease. Consideration should be given for echocardiography if no large vessel abnormality is identified.

  7. Integrating cyber attacks within fault trees

    International Nuclear Information System (INIS)

    Nai Fovino, Igor; Masera, Marcelo; De Cian, Alessio

    2009-01-01

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  8. Visualizing Risks: Icons for Information Attack Scenarios

    National Research Council Canada - National Science Library

    Hosmer, Hilary

    2000-01-01

    .... Visual attack scenarios help defenders see system ambiguities, imprecision, vulnerabilities and omissions, thus speeding up risk analysis, requirements gathering, safeguard selection, cryptographic...

  9. Classifying network attack scenarios using an ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-03-01

    Full Text Available ) or to the target?s reputation. The Residue sub-phase refers to damage or artefacts of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example after the launch of a DDOS..., A. (1995). Hacking theft of $10 million from citibank revealed. Retrieved 10/10, 2011, from http://articles.latimes.com/1995-08-19/business/fi-36656_1_citibank-system Hurley, E. (2004). SCO site succumbs to DDoS attack. Retrieved 10/10, 2011, from...

  10. A computer network attack taxonomy and ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-01-01

    Full Text Available of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example, after the launch of a DDOS (Distributed Denial of Service) attack, zombie computers may still connect to the target...-scrap- value-of-a-hacked-pc-revisited/ . Lancor, L., & Workman, R. (2007). Using Google Hacking to Enhance Defense Strategies. ACM SIGCSE Bulletin, 39 (1), 491-495. Lau, F., Rubin, S. H., Smith, M. H., & Trajkovic, L. (2000). Distributed Denial of Service...

  11. Integrating cyber attacks within fault trees

    Energy Technology Data Exchange (ETDEWEB)

    Nai Fovino, Igor [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy)], E-mail: igor.nai@jrc.it; Masera, Marcelo [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy); De Cian, Alessio [Department of Electrical Engineering, University di Genova, Genoa (Italy)

    2009-09-15

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  12. HEART Aerothermodynamic Analysis

    Science.gov (United States)

    Mazaheri, Alireza

    2012-01-01

    This paper presents an assessment of the aerothermodynamic environment around an 8.3 meter High Energy Atmospheric Reentry Test (HEART) vehicle. This study generated twelve nose shape configurations and compared their responses at the peak heating trajectory point against the baseline nose shape. The heat flux sensitivity to the angle of attack variations are also discussed. The possibility of a two-piece Thermal Protection System (TPS) design at the nose is also considered, as are the surface catalytic affects of the aeroheating environment of such configuration. Based on these analyses, an optimum nose shape is proposed to minimize the surface heating. A recommendation is also made for a two-piece TPS design, for which the surface catalytic uncertainty associated with the jump in heating at the nose-IAD juncture is reduced by a minimum of 93%. In this paper, the aeroshell is assumed to be rigid and the inflatable fluid interaction effect is left for future investigations.

  13. Rocky Mountain spotted fever, Panama.

    Science.gov (United States)

    Estripeaut, Dora; Aramburú, María Gabriela; Sáez-Llorens, Xavier; Thompson, Herbert A; Dasch, Gregory A; Paddock, Christopher D; Zaki, Sherif; Eremeeva, Marina E

    2007-11-01

    We describe a fatal pediatric case of Rocky Mountain spotted fever in Panama, the first, to our knowledge, since the 1950s. Diagnosis was established by immunohistochemistry, PCR, and isolation of Rickettsia rickettsii from postmortem tissues. Molecular typing demonstrated strong relatedness of the isolate to strains of R. rickettsii from Central and South America.

  14. Simple, heart-smart substitutions

    Science.gov (United States)

    Coronary artery disease - heart smart substitutions; Atherosclerosis - heart smart substitutions; Cholesterol - heart smart substitutions; Coronary heart disease - heart smart substitutions; Healthy diet - heart ...

  15. Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0

    NARCIS (Netherlands)

    Gadyatskaya, Olga; Jhawar, Ravi; Kordy, P.T.; Lounis, Karim; Mauw, Sjouke; Trujillo-Rasua, Rolando

    2016-01-01

    In this tool demonstration paper we present the ADTool2.0: an open-source software tool for design, manipulation and analysis of attack trees. The tool supports ranking of attack scenarios based on quantitative attributes entered by the user; it is scriptable; and it incorporates attack trees with

  16. The work-averse cyber attacker model : theory and evidence from two million attack signatures

    NARCIS (Netherlands)

    Allodi, L.; Massacci, F.; Williams, J.

    The typical cyber attacker is assumed to be all powerful and to exploit all possible vulnerabilities. In this paper we present, and empirically validate, a novel and more realistic attacker model. The intuition of our model is that an attacker will optimally choose whether to act and weaponize a new

  17. Attack Tree Generation by Policy Invalidation

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Naeem Akram, R.; Jajodia, S.

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identi﬿cation. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identi﬿ed

  18. Evaluation of Crosstalk Attacks in Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    2016-01-01

    WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks...

  19. Drammer : Deterministic Rowhammer attacks on mobile platforms

    NARCIS (Netherlands)

    Van Der Veen, Victor; Fratantonio, Yanick; Lindorfer, Martina; Gruss, Daniel; Maurice, Clémentine; Vigna, Giovanni; Bos, Herbert; Razavi, Kaveh; Giuffrida, Cristiano

    2016-01-01

    Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and completely subvert a system. However, existing efforts either describe probabilistic (and thus unreliable) attacks or rely on special (and often unavailable) memory management features to place victim objects

  20. Collaborative Attack Mitigation and Response: A survey

    NARCIS (Netherlands)

    Steinberger, Jessica; Sperotto, Anna; Baier, Harald; Pras, Aiko

    2015-01-01

    Over recent years, network-based attacks have become to one of the top causes of network infrastructure and service outages. To counteract a network-based attack, an approach is to move mitigation from the target network to the networks of Internet Service Providers (ISP). However, it remains

  1. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...

  2. The spot market and the spot price: applicability and limitations

    International Nuclear Information System (INIS)

    White, G. Jr.

    1987-01-01

    The subject of spot prices and their relationship to long-term contracting is addressed. The author is associated with Nuexco, which originally was called the Nuclear Exchange Corporation. They use the term Exchange Value which originated in the idea that Nuexco operated an exchange 'bank' - those with too much uranium could 'bank it', those with short-term needs could borrow from the 'bank'. If the borrower repaid slightly more or less the difference was settled using the 'exchange value'. This became used for longer-term transactions and now settling the monthly value is an important part of Nuexco's activities. The exact nature of the Exchange Value is defined. Now more and more buyers are insisting on spot market related pricing even where this is not meaningfully related to uranium production costs. (U.K.)

  3. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  4. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  5. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  6. Laser Pyrometer For Spot Temperature Measurements

    Science.gov (United States)

    Elleman, D. D.; Allen, J. L.; Lee, M. C.

    1988-01-01

    Laser pyrometer makes temperature map by scanning measuring spot across target. Scanning laser pyrometer passively measures radiation emitted by scanned spot on target and calibrated by similar passive measurement on blackbody of known temperature. Laser beam turned on for active measurements of reflectances of target spot and reflectance standard. From measurements, temperature of target spot inferred. Pyrometer useful for non-contact measurement of temperature distributions in processing of materials.

  7. Laser Spot Detection Based on Reaction Diffusion

    OpenAIRE

    Alejandro Vázquez-Otero; Danila Khikhlukha; J. M. Solano-Altamirano; Raquel Dormido; Natividad Duro

    2016-01-01

    Center-location of a laser spot is a problem of interest when the laser is used for processing and performing measurements. Measurement quality depends on correctly determining the location of the laser spot. Hence, improving and proposing algorithms for the correct location of the spots are fundamental issues in laser-based measurements. In this paper we introduce a Reaction Diffusion (RD) system as the main computational framework for robustly finding laser spot centers. The method presente...

  8. Spot Sign in Acute Intracerebral Hemorrhage in Dynamic T1-Weighted Magnetic Resonance Imaging.

    Science.gov (United States)

    Schindlbeck, Katharina A; Santaella, Anna; Galinovic, Ivana; Krause, Thomas; Rocco, Andrea; Nolte, Christian H; Villringer, Kersten; Fiebach, Jochen B

    2016-02-01

    In computed tomographic imaging of acute intracerebral hemorrhage spot sign on computed tomographic angiography has been established as a marker for hematoma expansion and poor clinical outcome. Although, magnetic resonance imaging (MRI) can accurately visualize acute intracerebral hemorrhage, a corresponding MRI marker is lacking to date. We prospectively examined 50 consecutive patients with acute intracerebral hemorrhage within 24 hours of symptom onset. The MRI protocol consisted of a standard stroke protocol and dynamic contrast-enhanced T1-weighted imaging with a time resolution of 7.07 s/batch. Stroke scores were assessed at admission and at time of discharge. Volume measurements of hematoma size and spot sign were performed with MRIcron. Contrast extravasation within sites of the hemorrhage (MRI spot sign) was seen in 46% of the patients. Patients with an MRI spot sign had a significantly shorter time to imaging than those without (Pspot sign compared with those without (P≤0.001). Hematoma expansion was observed in the spot sign group compared with the nonspot sign group, although the differences were not significant. Spot sign can be detected using MRI on postcontrast T1-weighted and dynamic T1-weighted images. It is associated with worse clinical outcome. The time course of contrast extravasation in dynamic T1 images indicates that these spots represent ongoing bleeding. © 2015 American Heart Association, Inc.

  9. Heart Failure

    Science.gov (United States)

    ... Other diseases. Chronic diseases — such as diabetes, HIV, hyperthyroidism, hypothyroidism, or a buildup of iron (hemochromatosis) or ... transplantation or support with a ventricular assist device. Prevention The key to preventing heart failure is to ...

  10. 7 CFR 1421.11 - Spot checks.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Spot checks. 1421.11 Section 1421.11 Agriculture... ASSISTANCE LOANS AND LOAN DEFICIENCY PAYMENTS FOR 2008 THROUGH 2012 General § 1421.11 Spot checks. (a) CCC... CCC access to the farm and storage facility as necessary to conduct collateral inspections, or “spot...

  11. 21 CFR 886.1435 - Maxwell spot.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Maxwell spot. 886.1435 Section 886.1435 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) MEDICAL DEVICES OPHTHALMIC DEVICES Diagnostic Devices § 886.1435 Maxwell spot. (a) Identification. A Maxwell spot is an AC...

  12. Classes of Heart Failure

    Science.gov (United States)

    ... Introduction Types of Heart Failure Classes of Heart Failure Heart Failure in Children Advanced Heart Failure • Causes and ... and Advanced HF • Tools and Resources • Personal Stories Heart Failure Questions to Ask Your Doctor Use these questions ...

  13. Men and Heart Disease

    Science.gov (United States)

    ... Pressure Salt Cholesterol Million Hearts® WISEWOMAN Men and Heart Disease Fact Sheet Recommend on Facebook Tweet Share Compartir Source: Interactive Atlas of Heart Disease and Stroke Heart Disease Facts in Men Heart disease is the leading ...

  14. Wine and heart health

    Science.gov (United States)

    Health and wine; Wine and heart disease; Preventing heart disease - wine; Preventing heart disease - alcohol ... more often just to lower your risk of heart disease. Heavier drinking can harm the heart and ...

  15. Impact of Spot Size and Spacing on the Quality of Robustly Optimized Intensity Modulated Proton Therapy Plans for Lung Cancer.

    Science.gov (United States)

    Liu, Chenbin; Schild, Steven E; Chang, Joe Y; Liao, Zhongxing; Korte, Shawn; Shen, Jiajian; Ding, Xiaoning; Hu, Yanle; Kang, Yixiu; Keole, Sameer R; Sio, Terence T; Wong, William W; Sahoo, Narayan; Bues, Martin; Liu, Wei

    2018-06-01

    To investigate how spot size and spacing affect plan quality, robustness, and interplay effects of robustly optimized intensity modulated proton therapy (IMPT) for lung cancer. Two robustly optimized IMPT plans were created for 10 lung cancer patients: first by a large-spot machine with in-air energy-dependent large spot size at isocenter (σ: 6-15 mm) and spacing (1.3 σ), and second by a small-spot machine with in-air energy-dependent small spot size (σ: 2-6 mm) and spacing (5 mm). Both plans were generated by optimizing radiation dose to internal target volume on averaged 4-dimensional computed tomography scans using an in-house-developed IMPT planning system. The dose-volume histograms band method was used to evaluate plan robustness. Dose evaluation software was developed to model time-dependent spot delivery to incorporate interplay effects with randomized starting phases for each field per fraction. Patient anatomy voxels were mapped phase-to-phase via deformable image registration, and doses were scored using in-house-developed software. Dose-volume histogram indices, including internal target volume dose coverage, homogeneity, and organs at risk (OARs) sparing, were compared using the Wilcoxon signed-rank test. Compared with the large-spot machine, the small-spot machine resulted in significantly lower heart and esophagus mean doses, with comparable target dose coverage, homogeneity, and protection of other OARs. Plan robustness was comparable for targets and most OARs. With interplay effects considered, significantly lower heart and esophagus mean doses with comparable target dose coverage and homogeneity were observed using smaller spots. Robust optimization with a small spot-machine significantly improves heart and esophagus sparing, with comparable plan robustness and interplay effects compared with robust optimization with a large-spot machine. A small-spot machine uses a larger number of spots to cover the same tumors compared with a large-spot

  16. A taxonomy and discussion of software attack technologies

    Science.gov (United States)

    Banks, Sheila B.; Stytz, Martin R.

    2005-03-01

    Software is a complex thing. It is not an engineering artifact that springs forth from a design by simply following software coding rules; creativity and the human element are at the heart of the process. Software development is part science, part art, and part craft. Design, architecture, and coding are equally important activities and in each of these activities, errors may be introduced that lead to security vulnerabilities. Therefore, inevitably, errors enter into the code. Some of these errors are discovered during testing; however, some are not. The best way to find security errors, whether they are introduced as part of the architecture development effort or coding effort, is to automate the security testing process to the maximum extent possible and add this class of tools to the tools available, which aids in the compilation process, testing, test analysis, and software distribution. Recent technological advances, improvements in computer-generated forces (CGFs), and results in research in information assurance and software protection indicate that we can build a semi-intelligent software security testing tool. However, before we can undertake the security testing automation effort, we must understand the scope of the required testing, the security failures that need to be uncovered during testing, and the characteristics of the failures. Therefore, we undertook the research reported in the paper, which is the development of a taxonomy and a discussion of software attacks generated from the point of view of the security tester with the goal of using the taxonomy to guide the development of the knowledge base for the automated security testing tool. The representation for attacks and threat cases yielded by this research captures the strategies, tactics, and other considerations that come into play during the planning and execution of attacks upon application software. The paper is organized as follows. Section one contains an introduction to our research

  17. Spot på samtalen:

    DEFF Research Database (Denmark)

    Danneris, Sophie; Jensen, Tanja Dall; Caswell, Dorte

    Spot på samtalen sætter fokus på det, der konkret foregår i samtaler mellem borgere og de beskæftigelsesfaglige medarbejdere i jobcentrene. Da de udsatte grupper i mange tilfælde er langt fra arbejdsmarkedet, er interessen rettet mod, hvilke forhold i kontakten med beskæftigelsessystemet, der...... har betydning hvilke indsatser ledige modtager, men også hvordan de modtager dem. Her rettes blikket mod den centrale del af den beskæftigelsespolitiske indsats som samtalerne udgør. I Spot på samtalen er blikket rettet mod de dynamikker, mønstre og mekanismer, der kommer i spil i samtalerne i...

  18. A Drosophila wing spot test

    International Nuclear Information System (INIS)

    Ayaki, Toshikazu; Yoshikawa, Isao; Niikawa, Norio; Hoshi, Masaharu.

    1986-01-01

    A Drosophila wing spot test system was used to investigate the effects of low doses of X-rays, gamma rays, and both 2.3 and 14.1 MeV neutrons on somatic chromosome mutation (SCM) induction. The incidence of SCM was significantly increased with any type of radiation, with evident linear dose-response relationship within the range of 3 to 20 cGy. It was estimated that relative biological effectiveness value for SCM induction of 2.3 MeV neutrons to X-rays and gamma rays is much higher than that of 14.1 MeV neutrons to those photons (2.4 vs 8.0). The Drosophila wing spot test system seems to become a promising in vivo experimental method for higher animals in terms of the lack of necessity for a marvelously large number of materials required in conventional test system. (Namekawa, K.)

  19. Managing Rocky Mountain spotted fever.

    Science.gov (United States)

    Minniear, Timothy D; Buckingham, Steven C

    2009-11-01

    Rocky Mountain spotted fever is caused by the tick-borne bacterium Rickettsia rickettsii. Symptoms range from moderate illness to severe illness, including cardiovascular compromise, coma and death. The disease is prevalent in most of the USA, especially during warmer months. The trademark presentation is fever and rash with a history of tick bite, although tick exposure is unappreciated in over a third of cases. Other signature symptoms include headache and abdominal pain. The antibiotic therapy of choice for R. rickettsii infection is doxycycline. Preventive measures for Rocky Mountain spotted fever and other tick-borne diseases include: wearing long-sleeved, light colored clothing; checking for tick attachment and removing attached ticks promptly; applying topical insect repellent; and treating clothing with permethrin.

  20. Measurement of laser spot quality

    Science.gov (United States)

    Milster, T. D.; Treptau, J. P.

    1991-01-01

    Several ways of measuring spot quality are compared. We examine in detail various figures of merit such as full width at half maximum (FWHM), full width at 1/(e exp 2) maximum, Strehl ratio, and encircled energy. Our application is optical data storage, but results can be applied to other areas like space communications and high energy lasers. We found that the optimum figure of merit in many cases is Strehl ratio.

  1. Sweet Spots and Door Stops

    Science.gov (United States)

    Thompson, Michael; Tsui, Stella; Leung, Chi Fan

    2011-01-01

    A sweet spot is referred to in sport as the perfect place to strike a ball with a racquet or bat. It is the point of contact between bat and ball where maximum results can be produced with minimal effort from the hand of the player. Similar physics can be applied to the less inspiring examples of door stops; the perfect position of a door stop is…

  2. Glare Spot Phase Doppler Anemometry

    OpenAIRE

    Hespel, Camille; Ren, Kuan Fang; Gréhan, Gérard; Onofri, Fabrice

    2006-01-01

    International audience; The Phase Doppler anemometry has been developed to measure simultaneously the velocity and the size of droplets. The measurement of the refractive index is also necessary since it depends on the temperature and the composition of the particle and its measurement permits both to increase the quality of the diameter measurement and to obtain information on the temperature and/or the composition of the droplets. In this paper, we introduce a Glare Spot Phase Doppler Anemo...

  3. Justifications shape ethical blind spots.

    Science.gov (United States)

    Pittarello, Andrea; Leib, Margarita; Gordon-Hecker, Tom; Shalvi, Shaul

    2015-06-01

    To some extent, unethical behavior results from people's limited attention to ethical considerations, which results in an ethical blind spot. Here, we focus on the role of ambiguity in shaping people's ethical blind spots, which in turn lead to their ethical failures. We suggest that in ambiguous settings, individuals' attention shifts toward tempting information, which determines the magnitude of their lies. Employing a novel ambiguous-dice paradigm, we asked participants to report the outcome of the die roll appearing closest to the location of a previously presented fixation cross on a computer screen; this outcome would determine their pay. We varied the value of the die second closest to the fixation cross to be either higher (i.e., tempting) or lower (i.e., not tempting) than the die closest to the fixation cross. Results of two experiments revealed that in ambiguous settings, people's incorrect responses were self-serving. Tracking participants' eye movements demonstrated that people's ethical blind spots are shaped by increased attention toward tempting information. © The Author(s) 2015.

  4. Adaptive cyber-attack modeling system

    Science.gov (United States)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  5. Situational awareness of a coordinated cyber attack

    Science.gov (United States)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  6. Radiological attacks and accidents. Medical consequences

    International Nuclear Information System (INIS)

    Sakuta, Hidenari

    2007-01-01

    Probability of the occurrence of radiological attacks appears to be elevated after the terrorist attacks against the United States on September 11 in 2001. There are a lot of scenarios of radiological attack: simple radiological device, radiological disperse device (RDD or dirty bomb), attacks against nuclear reactor, improvised nuclear device, and nuclear weapons. Of these, RDD attack is the most probable scenario, because it can be easily made and can generate enormous psychological and economic damages. Radiological incidents are occurring to and fro in the world, including several cases of theft to nuclear facilities and unsuccessful terrorist attacks against them. Recently, a former Russian spy has allegedly been killed using polonium-210. In addition, serious radiological accidents have occurred in Chernobyl, Goiania, and Tokai-mura. Planning, preparation, education, and training exercise appear to be essential factors to cope with radiological attacks and accidents effectively without feeling much anxiety. Triage and psychological first aid are prerequisite to manage and provide effective medial care for mass casualties without inducing panic. (author)

  7. Disorders of cardiac hemodynamic in attack period of bronchial asthma in children

    Directory of Open Access Journals (Sweden)

    Kondratiev V.А.

    2016-05-01

    Full Text Available By dopplerechocardiography method there was studied functional state of cardiac ventricles and character of hemodynamic disorders in 48 patients aged 5-17 years in attack period of moderately-severe and severe bronchial asthma. Group of comparison included 40 healthy peers. Disorders of central and peripheral hemodynamic in attack period of bronchial asthma in children were accompanied both by systolic and diastolic dysfunction of the left and right heart ventricles, herewith right ventricle was functioning in the mode of hyperdynamic, and left one – in the mode of hypodynamic. Combined systolic-diastolic variant of dysfunction both of right and left ventricles was developing in 58,3% of patients with moderately-severe and in 91,6% of patients with severe bronchial asthma. In the attack period of bronchial asthma in children equal directionality of systolic and diastolic dysfunction of heart ventricles was developing; this was characterized by synchronization of their function. Assessment of functional interaction of the ventricles under conditions of severe asthma attack showed direct and high (r=0,67 correlative interaction between finding of Tei index of the left and right ventricles, which characterize their systolic function; this, under conditions of increased hemodynamic pre-loading testified to compensatory increase of systolic interaction of ventricles. Direct and high (r=0,69 correlative interaction between time indices of isovolumic relaxation of the left and right ventricles, characterizing their diastolic function, testified to compensatory increase of diastolic interaction of ventricles under conditions of increase of hemodynamic post-loading. Imbalance of central and peripheral link of hemodynamic in attack period of bronchial asthma in children testified to development of cardiac insufficiency, which was compensated predominantly at the expense of increase of heart contractions rate.

  8. Resistance Spot Welding of dissimilar Steels

    Directory of Open Access Journals (Sweden)

    Ladislav Kolařík

    2012-01-01

    Full Text Available This paper presents an analysis of the properties of resistance spot welds between low carbon steel and austenitic CrNi stainless steel. The thickness of the welded dissimilar materials was 2 mm. A DeltaSpot welding gun with a process tape was used for welding the dissimilar steels. Resistance spot welds were produced with various welding parameters (welding currents ranging from 7 to 8 kA. Light microscopy, microhardness measurements across the welded joints, and EDX analysis were used to evaluate the quality of the resistance spot welds. The results confirm the applicability of DeltaSpot welding for this combination of materials.

  9. Spot formation of radiation particles by electrochemical etching

    International Nuclear Information System (INIS)

    Nozaki, Tetsuya

    1999-01-01

    An electrochemical etching (ECE) spot formation from the top of chemical etching (CE) spot was confirmed by a series of experiments. One of polycarbonate (Iupilon) could not make the spot, because ECE spot had grown up before the microscope confirming the CE spot. Clear CEC spots by α-ray and neutron were found on Harzlas and Baryotrak, both improvements of CR-39. Under the same etching conditions, the growth of ECE spot on Harzlas was more rapid than Baryotrak, but both spots were almost the same. All CE spot by α-ray produced the CEC spots, but a part of CE circle spot by neutron formed them. (S.Y.)

  10. Classification of cyber attacks in South Africa

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-05-01

    Full Text Available various ATM's throughout South Africa. Two criminals, Motsoane and Masoleng, were arrested in February 2012 and both sentenced to 15 years in jail [36, 37]. 3.10 2013: IOL DDoS Anonymous Africa claimed responsibility for launching a Distributed Denial... of Service (DDoS) attack on the Independent Newspaper web site iol.co.za. The attack was in response to claims that the IOL group supports Zimbabwean president Robert Mugabe. The following taunt was sent to boast about the attack: “IOL bad boys bad boys...

  11. Attacker Modelling in Ubiquitous Computing Systems

    DEFF Research Database (Denmark)

    Papini, Davide

    in with our everyday life. This future is visible to everyone nowadays: terms like smartphone, cloud, sensor, network etc. are widely known and used in our everyday life. But what about the security of such systems. Ubiquitous computing devices can be limited in terms of energy, computing power and memory...... attacker remain somehow undened and still under extensive investigation. This Thesis explores the nature of the ubiquitous attacker with a focus on how she interacts with the physical world and it denes a model that captures the abilities of the attacker. Furthermore a quantitative implementation...

  12. Computational prediction of protein hot spot residues.

    Science.gov (United States)

    Morrow, John Kenneth; Zhang, Shuxing

    2012-01-01

    Most biological processes involve multiple proteins interacting with each other. It has been recently discovered that certain residues in these protein-protein interactions, which are called hot spots, contribute more significantly to binding affinity than others. Hot spot residues have unique and diverse energetic properties that make them challenging yet important targets in the modulation of protein-protein complexes. Design of therapeutic agents that interact with hot spot residues has proven to be a valid methodology in disrupting unwanted protein-protein interactions. Using biological methods to determine which residues are hot spots can be costly and time consuming. Recent advances in computational approaches to predict hot spots have incorporated a myriad of features, and have shown increasing predictive successes. Here we review the state of knowledge around protein-protein interactions, hot spots, and give an overview of multiple in silico prediction techniques of hot spot residues.

  13. Computational Prediction of Hot Spot Residues

    Science.gov (United States)

    Morrow, John Kenneth; Zhang, Shuxing

    2013-01-01

    Most biological processes involve multiple proteins interacting with each other. It has been recently discovered that certain residues in these protein-protein interactions, which are called hot spots, contribute more significantly to binding affinity than others. Hot spot residues have unique and diverse energetic properties that make them challenging yet important targets in the modulation of protein-protein complexes. Design of therapeutic agents that interact with hot spot residues has proven to be a valid methodology in disrupting unwanted protein-protein interactions. Using biological methods to determine which residues are hot spots can be costly and time consuming. Recent advances in computational approaches to predict hot spots have incorporated a myriad of features, and have shown increasing predictive successes. Here we review the state of knowledge around protein-protein interactions, hot spots, and give an overview of multiple in silico prediction techniques of hot spot residues. PMID:22316154

  14. ESA uncovers Geminga's `hot spot'

    Science.gov (United States)

    2004-07-01

    16 July 2004 Astronomers using ESA’s X-ray observatory XMM-Newton have detected a small, bright ‘hot spot’ on the surface of the neutron star called Geminga, 500 light-years away. The hot spot is the size of a football field and is caused by the same mechanism producing Geminga’s X-ray tails. This discovery identifies the missing link between the X-ray and gamma-ray emission from Geminga. hi-res Size hi-res: 1284 kb Credits: ESA, P. Caraveo (IASF, Milan) Geminga's hot spot This figure shows the effects of charged particles accelerated in the magnetosphere of Geminga. Panel (a) shows an image taken with the EPIC instrument on board the XMM-Newton observatory. The bright tails, made of particles kicked out by Geminga’s strong magnetic field, trail the neutron star as it moves about in space. Panel (b) shows how electrically charged particles interact with Geminga’s magnetic field. For example, if electrons (blue) are kicked out by the star, positrons (in red) hit the star’s magnetic poles like in an ‘own goal’. Panel (c) illustrates the size of Geminga’s magnetic field (blue) compared to that of the star itself at the centre (purple). The magnetic field is tilted with respect to Geminga’s rotation axis (red). Panel (d) shows the magnetic poles of Geminga, where charged particles hit the surface of the star, creating a two-million degrees hot spot, a region much hotter than the surroundings. As the star spins on its rotation axis, the hot spot comes into view and then disappears, causing the periodic colour change seen by XMM-Newton. An animated version of the entire sequence can be found at: Click here for animated GIF [low resolution, animated GIF, 5536 KB] Click here for AVI [high resolution, AVI with DIVX compression, 19128 KB] hi-res Size hi-res: 371 kb Credits: ESA, P. Caraveo (IASF, Milan) Geminga's hot spot, panel (a) Panel (a) shows an image taken with the EPIC instrument on board the XMM-Newton observatory. The bright tails, made of

  15. YET ANOTHER ATTACK ON WAGES AND CONDITIONS.

    Science.gov (United States)

    McCarthy, Andrew

    2016-10-01

    An unobjectionable-sounding title obscures the real intent of the latest in a series of Bills which the federal Coalition government is attempting to legislate in its ongoing attempts to undermine employee wages and conditions and attack unions.

  16. A Unique Fatal Moose Attack Mimicking Homicide.

    Science.gov (United States)

    Gudmannsson, Petur; Berge, Johan; Druid, Henrik; Ericsson, Göran; Eriksson, Anders

    2018-03-01

    Fatalities caused by animal attacks are rare, but have the potential to mimic homicide. We present a case in which a moose attacked and killed a woman who was walking her dog in a forest. Autopsy showed widespread blunt trauma with a large laceration on one leg in which blades of grass were embedded. Flail chest was the cause of death. The case was initially conceived as homicide by means of a riding lawn mower. A review of the case by moose experts and analyses of biological trace material that proved to originate from moose, established the true source of injury. The dog probably provoked a moose, which, in response, stomped and gored the victim to death. The injuries resembled those previously reported from attacks by cattle and water buffalo. Fatal moose attacks constitute an extremely rare threat in boreal areas, but can be considered in traumatic deaths of unknown cause. © 2017 American Academy of Forensic Sciences.

  17. Marine Attack on Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Ad

    2002-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  18. Heuristic attacks against graphical password generators

    CSIR Research Space (South Africa)

    Peach, S

    2010-05-01

    Full Text Available In this paper the authors explore heuristic attacks against graphical password generators. A new trend is emerging to use user clickable pictures to generate passwords. This technique of authentication can be successfully used for - for example...

  19. On localization attacks against cloud infrastructure

    Science.gov (United States)

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  20. Using agility to combat cyber attacks.

    Science.gov (United States)

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  1. Social engineering attack examples, templates and scenarios

    CSIR Research Space (South Africa)

    Mouton, Francois

    2016-06-01

    Full Text Available that are representative of real-world examples, whilst still being general enough to encompass several different real-world examples. The proposed social engineering attack templates cover all three types of communication, namely bidirectional communication...

  2. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  3. The role of sleep in migraine attacks

    Directory of Open Access Journals (Sweden)

    Elaine Inamorato

    1993-11-01

    Full Text Available Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. In view of this variable relationship we studied the records of 159 consecutive outpatients of our Headache Unit. In 121 records there was reference to sleep involvement, in 55% by a single form and in 45% by more than one form. When only one form was related, relief was most common (70%. 30% of that group of patients had the migraine attack precipitated by sleep, 24% by deprivation and 6% by sleep excess. When the effects of sleep were multiple, these effects were as expected logically in 65%: «in accordance» group (e.g attack precipitated by sleep deprivation and relieved by sleep onset. In a second group, («conflicting» where the involvement was not logical, there were three different combinations of sleep involvement, possibly due to more than one pathophysiological mechanism.

  4. ATTACK WARNING: Costs to Modernize NORAD's Computer System Significantly Understated

    National Research Council Canada - National Science Library

    Cross, F

    1991-01-01

    ...) Integrated Tactical Warning and Attack Assessment (ITW/AA) system. These subsystems provide critical strategic surveillance and attack warning and assessment information to United States and Canadian leaders...

  5. RAPTOR: Ransomware Attack PredicTOR

    OpenAIRE

    Quinkert, Florian; Holz, Thorsten; Hossain, KSM Tozammel; Ferrara, Emilio; Lerman, Kristina

    2018-01-01

    Ransomware, a type of malicious software that encrypts a victim's files and only releases the cryptographic key once a ransom is paid, has emerged as a potentially devastating class of cybercrimes in the past few years. In this paper, we present RAPTOR, a promising line of defense against ransomware attacks. RAPTOR fingerprints attackers' operations to forecast ransomware activity. More specifically, our method learns features of malicious domains by looking at examples of domains involved in...

  6. Attack Helicopter Operations: Art or Science

    Science.gov (United States)

    1991-05-13

    ATTACK HELICOPTER OPERATIONS: ART OR SCIENCE ? BY LIEUTENANT COLONEL JAN CALLEN United States Army DISTRIBUTION STATEMENT A: Approved for public release...TASK IWORK UNIT ELEMENT NO. NO. NO. ACCESSION NC 11. TITLE (Include Socurity Classification) Attack Helicopter Operations: Art or Science ? 12. PERSONAL...OPERATIONS: ART OR SCIENCE ? AN INDIVIDUAL STUDY PROJECT by Lieutenant Colonel Jan Callen United States Army Colonel Greg Snelgrove Project Adviser U.S

  7. Protecting mobile agents from external replay attacks

    OpenAIRE

    Garrigues Olivella, Carles; Migas, Nikos; Buchanan, William; Robles, Sergi; Borrell Viader, Joan

    2014-01-01

    Peer-reviewed This paper presents a protocol for the protection of mobile agents against external replay attacks. This kind of attacks are performed by malicious platforms when dispatching an agent multiple times to a remote host, thus making it reexecute part of its itinerary. Current proposals aiming to address this problem are based on storing agent identifiers, or trip markers, inside agent platforms, so that future reexecutions can be detected and prevented. The problem of these solut...

  8. Semantic Identification Attacks on Web Browsing

    OpenAIRE

    Guha, Neel

    2016-01-01

    We introduce a Semantic Identification Attack, in which an adversary uses semantic signals about the pages visited in one browsing session to identify other browsing sessions launched by the same user. This attack allows an adver- sary to determine if two browsing sessions originate from the same user regardless of any measures taken by the user to disguise their browser or network. We use the MSNBC Anonymous Browsing data set, which contains a large set of user visits (labeled by category) t...

  9. Consciousness in Non-Epileptic Attack Disorder

    OpenAIRE

    Reuber, M.; Kurthen, M.

    2011-01-01

    Non-epileptic attack disorder (NEAD) is one of the most important differential diagnoses of epilepsy. Impairment of\\ud consciousness is the key feature of non-epileptic attacks (NEAs). The first half of this review summarises the clinical research\\ud literature featuring observations relating to consciousness in NEAD. The second half places this evidence in the wider context\\ud of the recent discourse on consciousness in neuroscience and the philosophy of mind. We argue that studies of consci...

  10. Cyber Security Audit and Attack Detection Toolkit

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  11. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    Science.gov (United States)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  12. Heart valve surgery

    Science.gov (United States)

    ... replacement; Valve repair; Heart valve prosthesis; Mechanical valves; Prosthetic valves ... surgery. Your heart valve has been damaged by infection ( endocarditis ). You have received a new heart valve ...

  13. Heart failure - tests

    Science.gov (United States)

    CHF - tests; Congestive heart failure - tests; Cardiomyopathy - tests; HF - tests ... the best test to: Identify which type of heart failure (systolic, diastolic, valvular) Monitor your heart failure and ...

  14. Combined Heuristic Attack Strategy on Complex Networks

    Directory of Open Access Journals (Sweden)

    Marek Šimon

    2017-01-01

    Full Text Available Usually, the existence of a complex network is considered an advantage feature and efforts are made to increase its robustness against an attack. However, there exist also harmful and/or malicious networks, from social ones like spreading hoax, corruption, phishing, extremist ideology, and terrorist support up to computer networks spreading computer viruses or DDoS attack software or even biological networks of carriers or transport centers spreading disease among the population. New attack strategy can be therefore used against malicious networks, as well as in a worst-case scenario test for robustness of a useful network. A common measure of robustness of networks is their disintegration level after removal of a fraction of nodes. This robustness can be calculated as a ratio of the number of nodes of the greatest remaining network component against the number of nodes in the original network. Our paper presents a combination of heuristics optimized for an attack on a complex network to achieve its greatest disintegration. Nodes are deleted sequentially based on a heuristic criterion. Efficiency of classical attack approaches is compared to the proposed approach on Barabási-Albert, scale-free with tunable power-law exponent, and Erdős-Rényi models of complex networks and on real-world networks. Our attack strategy results in a faster disintegration, which is counterbalanced by its slightly increased computational demands.

  15. SCADA system vulnerabilities to cyber attack

    Energy Technology Data Exchange (ETDEWEB)

    Shaw, W. T. [Cyber Security Consulting (Canada)

    2004-10-01

    The susceptibility to terrorist attacks of computer-based supervisory control (SCADA) systems that are used to monitor and control water distribution systems, oil and gas pipelines and the electrical grid, is discussed. The discussion includes ways in which SCADA systems may be attacked and remedial actions that may be taken to reduce or eliminate the possibility of such attacks. Attacks may take the form of causing the system to generate false data to divert attention from impending system disasters, or commandeer the system to seriously disable it, or cause damage to the process or equipment being controlled by sending improper control commands. SCADA systems are also vulnerable to internal threats, either from an accidental action that results in damage, or an intentional action, as for example by a disgruntled employee, or ex-employee, usually by way of reprogramming an RTU or PLC by accessing the polling/communications circuit. Recent SCADA systems are much more susceptible to concerted cyber attacks because of the adoption of IT technologies and standards into the design of such systems. (Older systems are more likely to be unique designs, hence less susceptible to attack). As far as protection of SCADA systems is concerned, there are no technologies that would prevent a technologically sophisticated terrorist or disgruntled employee from doing major damage to the system, however, the IT world has developed a range of technologies for the protection of IT assets, and many of these same technologies can also be used to safeguard modern SCADA systems.

  16. Watermarking spot colors in packaging

    Science.gov (United States)

    Reed, Alastair; Filler, TomáÅ.¡; Falkenstern, Kristyn; Bai, Yang

    2015-03-01

    In January 2014, Digimarc announced Digimarc® Barcode for the packaging industry to improve the check-out efficiency and customer experience for retailers. Digimarc Barcode is a machine readable code that carries the same information as a traditional Universal Product Code (UPC) and is introduced by adding a robust digital watermark to the package design. It is imperceptible to the human eye but can be read by a modern barcode scanner at the Point of Sale (POS) station. Compared to a traditional linear barcode, Digimarc Barcode covers the whole package with minimal impact on the graphic design. This significantly improves the Items per Minute (IPM) metric, which retailers use to track the checkout efficiency since it closely relates to their profitability. Increasing IPM by a few percent could lead to potential savings of millions of dollars for retailers, giving them a strong incentive to add the Digimarc Barcode to their packages. Testing performed by Digimarc showed increases in IPM of at least 33% using the Digimarc Barcode, compared to using a traditional barcode. A method of watermarking print ready image data used in the commercial packaging industry is described. A significant proportion of packages are printed using spot colors, therefore spot colors needs to be supported by an embedder for Digimarc Barcode. Digimarc Barcode supports the PANTONE spot color system, which is commonly used in the packaging industry. The Digimarc Barcode embedder allows a user to insert the UPC code in an image while minimizing perceptibility to the Human Visual System (HVS). The Digimarc Barcode is inserted in the printing ink domain, using an Adobe Photoshop plug-in as the last step before printing. Since Photoshop is an industry standard widely used by pre-press shops in the packaging industry, a Digimarc Barcode can be easily inserted and proofed.

  17. Collaboration spotting for dental science.

    Science.gov (United States)

    Leonardi, E; Agocs, A; Fragkiskos, S; Kasfikis, N; Le Goff, J M; Cristalli, M P; Luzzi, V; Polimeni, A

    2014-10-06

    The goal of the Collaboration Spotting project is to create an automatic system to collect information about publications and patents related to a given technology, to identify the key players involved, and to highlight collaborations and related technologies. The collected information can be visualized in a web browser as interactive graphical maps showing in an intuitive way the players and their collaborations (Sociogram) and the relations among the technologies (Technogram). We propose to use the system to study technologies related to Dental Science. In order to create a Sociogram, we create a logical filter based on a set of keywords related to the technology under study. This filter is used to extract a list of publications from the Web of Science™ database. The list is validated by an expert in the technology and sent to CERN where it is inserted in the Collaboration Spotting database. Here, an automatic software system uses the data to generate the final maps. We studied a set of recent technologies related to bone regeneration procedures of oro--maxillo--facial critical size defects, namely the use of Porous HydroxyApatite (HA) as a bone substitute alone (bone graft) or as a tridimensional support (scaffold) for insemination and differentiation ex--vivo of Mesenchymal Stem Cells. We produced the Sociograms for these technologies and the resulting maps are now accessible on--line. The Collaboration Spotting system allows the automatic creation of interactive maps to show the current and historical state of research on a specific technology. These maps are an ideal tool both for researchers who want to assess the state--of--the--art in a given technology, and for research organizations who want to evaluate their contribution to the technological development in a given field. We demonstrated that the system can be used for Dental Science and produced the maps for an initial set of technologies in this field. We now plan to enlarge the set of mapped

  18. Collaboration Spotting for oral medicine.

    Science.gov (United States)

    Leonardi, E; Agocs, A; Fragkiskos, S; Kasfikis, N; Le Goff, J M; Cristalli, M P; Luzzi, V; Polimeni, A

    2014-09-01

    The goal of the Collaboration Spotting project is to create an automatic system to collect information about publications and patents related to a given technology, to identify the key players involved, and to highlight collaborations and related technologies. The collected information can be visualized in a web browser as interactive graphical maps showing in an intuitive way the players and their collaborations (Sociogram) and the relations among the technologies (Technogram). We propose to use the system to study technologies related to oral medicine. In order to create a sociogram, we create a logical filter based on a set of keywords related to the technology under study. This filter is used to extract a list of publications from the Web of Science™ database. The list is validated by an expert in the technology and sent to CERN where it is inserted in the Collaboration Spotting database. Here, an automatic software system uses the data to generate the final maps. We studied a set of recent technologies related to bone regeneration procedures of oro-maxillo-facial critical size defects, namely the use of porous hydroxyapatite (HA) as a bone substitute alone (bone graft) or as a tridimensional support (scaffold) for insemination and differentiation ex vivo of mesenchymal stem cells. We produced the sociograms for these technologies and the resulting maps are now accessible on-line. The Collaboration Spotting system allows the automatic creation of interactive maps to show the current and historical state of research on a specific technology. These maps are an ideal tool both for researchers who want to assess the state-of-the-art in a given technology, and for research organizations who want to evaluate their contribution to the technological development in a given field. We demonstrated that the system can be used in oral medicine as is produced the maps for an initial set of technologies in this field. We now plan to enlarge the set of mapped technologies in

  19. Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks

    Directory of Open Access Journals (Sweden)

    Apostolos P. Fournaris

    2017-07-01

    Full Text Available Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT and Operational Technology (OT systems that are meant to operate harmonically under a security critical framework. As security IT countermeasures are gradually been installed in many embedded system nodes, thus securing them from many well-know cyber attacks there is a lurking danger that is still overlooked. Apart from the software vulnerabilities that typical malicious programs use, there are some very interesting hardware vulnerabilities that can be exploited in order to mount devastating software or hardware attacks (typically undetected by software countermeasures capable of fully compromising any embedded system device. Real-time microarchitecture attacks such as the cache side-channel attacks are such case but also the newly discovered Rowhammer fault injection attack that can be mounted even remotely to gain full access to a device DRAM (Dynamic Random Access Memory. Under the light of the above dangers that are focused on the device hardware structure, in this paper, an overview of this attack field is provided including attacks, threat directives and countermeasures. The goal of this paper is not to exhaustively overview attacks and countermeasures but rather to survey the various, possible, existing attack directions and highlight the security risks that they can pose to security critical embedded systems as well as indicate their strength on compromising the Quality of Service (QoS such systems are designed to provide.

  20. Energy is not Coffee. An assessment of blind spots on energy spot-markets

    International Nuclear Information System (INIS)

    Jepma, C.J.; Spijker, E.; Van der Gaast, W.; De Jong, F.; Overmars, P.

    2006-01-01

    This study was to be the first in a series of studies on the title subject. It specifically focuses on the differences and similarities with a number of other spot-markets and aims to frame the energy spot markets and their potential development into a broader perspective. Main conclusion is that energy spot-markets differ from several other physical and non-physical spot-markets in many ways. This implies that 'perfect' energy spot-markets may inherently be (much) less perfect than other spot-markets that have approximated the stage of theoretical perfection

  1. Predicting Factors of Zone 4 Attack in Volleyball.

    Science.gov (United States)

    Costa, Gustavo C; Castro, Henrique O; Evangelista, Breno F; Malheiros, Laura M; Greco, Pablo J; Ugrinowitsch, Herbert

    2017-06-01

    This study examined 142 volleyball games of the Men's Super League 2014/2015 seasons in Brazil from which we analyzed 24-26 games of each participating team, identifying 5,267 Zone 4 attacks for further analysis. Within these Zone 4 attacks, we analyzed the association between the effect of the attack carried out and the separate effects of serve reception, tempo and type of attack. We found that the reception, tempo of attack, second tempo of attack, and power of diagonal attack were predictors of the attack effect in Zone 4. Moreover, placed attacks showed a tendency to not yield a score. In conclusion, winning points in high-level men's volleyball requires excellent receptions, a fast attack tempo and powerfully executed of attacks.

  2. Heart Health: The Heart Truth Campaign 2009

    Science.gov (United States)

    ... Bar Home Current Issue Past Issues Cover Story Heart Health The Heart Truth Campaign 2009 Past Issues / Winter 2009 Table ... one of the celebrities supporting this year's The Heart Truth campaign. Both R&B singer Ashanti (center) ...

  3. Women's Heart Disease: Heart Disease Risk Factors

    Science.gov (United States)

    ... this page please turn JavaScript on. Feature: Women's Heart Disease Heart Disease Risk Factors Past Issues / Winter 2014 Table ... or habits may raise your risk for coronary heart disease (CHD). These conditions are known as risk ...

  4. Restoration of heart functions using human embryonic stem cells derived heart muscle cells.

    Science.gov (United States)

    Gepstein, Lior; Kehat, Izhak

    2005-02-01

    Extract: Recent advances in molecular and cellular biology and specifically in the areas of stem cell biology and tissue engineering have paved the way for the development of a new field in biomedicine, regenerative medicine. This exciting approach seeks to develop new biological solutions, using the mobilization of endogenous stem cells or delivery of exogenous cells to replace or modify the function of diseased, absent, or malfunctioning tissue. The adult heart represents an attractive candidate for these emerging technologies, since adult cardiomyocytes have limited regenerative capacity. Thus, any significant heart cell loss or dysfunction, such as occurs during heart attack, is mostly irreversible and may lead to the development of progressive heart failure, one of the leading causes of world-wide morbidity and mortality. Similarly, dysfunction of the specialized electrical conduction system within the heart may result in inefficient rhythm initiation or impulse conduction, leading to significant slowing of the heart rate, usually requiring the implantation of a permanent electronic pacemaker. Replacement of the dysfunctional myocardium (heart muscle) by implantation of external heart muscle cells is emerging as a novel paradigm for restoration of the myocardial electromechanical properties, but has been significantly hampered by the paucity of cell sources for human heart cells and by the relatively limited evidence for functional integration between grafted and host cells. The recently described human embryonic stem cell (hESC) lines may provide a possible solution for the aforementioned cell sourcing problem.

  5. Solar 'hot spots' are still hot

    Science.gov (United States)

    Bai, Taeil

    1990-01-01

    Longitude distributions of solar flares are not random but show evidence for active zones (or hot spots) where flares are concentrated. According to a previous study, two hot spots in the northern hemisphere, which rotate with a synodic period of about 26.72 days, produced the majority of major flares, during solar cycles 20 and 21. The more prominent of these two hot spots is found to be still active during the rising part of cycle 22, producing the majority of northern hemisphere major flares. The synodic rotation period of this hot spot is 26.727 + or - 0.007 days. There is also evidence for hot spots in the southern hemisphere. Two hot spots separated by 180 deg are found to rotate with a period of 29.407 days, with one of them having persisted in the same locations during cycles 19-22 and the other, during cycles 20-22.

  6. Variable-spot ion beam figuring

    International Nuclear Information System (INIS)

    Wu, Lixiang; Qiu, Keqiang; Fu, Shaojun

    2016-01-01

    This paper introduces a new scheme of ion beam figuring (IBF), or rather variable-spot IBF, which is conducted at a constant scanning velocity with variable-spot ion beam collimated by a variable diaphragm. It aims at improving the reachability and adaptation of the figuring process within the limits of machine dynamics by varying the ion beam spot size instead of the scanning velocity. In contrast to the dwell time algorithm in the conventional IBF, the variable-spot IBF adopts a new algorithm, which consists of the scan path programming and the trajectory optimization using pattern search. In this algorithm, instead of the dwell time, a new concept, integral etching time, is proposed to interpret the process of variable-spot IBF. We conducted simulations to verify its feasibility and practicality. The simulation results indicate the variable-spot IBF is a promising alternative to the conventional approach.

  7. Solar hot spots are still hot

    International Nuclear Information System (INIS)

    Bai, T.

    1990-01-01

    Longitude distributions of solar flares are not random but show evidence for active zones (or hot spots) where flares are concentrated. According to a previous study, two hot spots in the northern hemisphere, which rotate with a synodic period of about 26.72 days, produced the majority of major flares, during solar cycles 20 and 21. The more prominent of these two hot spots is found to be still active during the rising part of cycle 22, producing the majority of northern hemisphere major flares. The synodic rotation period of this hot spot is 26.727 + or - 0.007 days. There is also evidence for hot spots in the southern hemisphere. Two hot spots separated by 180 deg are found to rotate with a period of 29.407 days, with one of them having persisted in the same locations during cycles 19-22 and the other, during cycles 20-22. 14 refs

  8. Spot and Runway Departure Advisor

    Science.gov (United States)

    Jung, Yoon Chul

    2013-01-01

    The Spot and Runway Departure Advisor (SARDA) is a research prototype of a decision support tool for ATC tower controllers to assist in manging and controlling traffic on the surface of an airport. SARDA employs a scheduler to generate an optimal runway schedule and gate push-back - spot release sequence and schedule that improves efficiency of surface operations. The advisories for ATC tower controllers are displayed on an Electronic Flight Strip (EFS) system. The human-in-the-loop simulation of the SARDA tool was conducted for east operations of Dallas-Ft. Worth International Airport (DFW) to evaluate performance of the SARDA tool and human factors, such as situational awareness and workload. The results indicates noticeable taxi delay reduction and fuel savings by using the SARDA tool. Reduction in controller workload were also observed throughout the scenario runs. The future plan includes modeling and simulation of the ramp operations of the Charlotte International Airport, and develop a decision support tool for the ramp controllers.

  9. X-ray spot filmer

    International Nuclear Information System (INIS)

    1975-01-01

    An X-ray apparatus is described which includes a spot filmer for feeding sheets of unexposed film one at a time into a vacuum evacuable cassette for exposure, and for returning exposed film sheets to an exposed film magazine. The spot filmer has a housing defining a light-tight enclosure. The film magazines are insertable through a door into the housing and into a film feed mechanism. The film feed mechanism unlatches, opens and positions the magazines; it then feeds a sheet of unexposed film into the vacuum evacuable cassette, releases the film sheet so the cassette can position the film sheet for exposure, and closes the film magazines. An orthogonal drive system positions the vacuum evacuable cassette to expose selected film sheet portions and returns the cassette to a retracted position. The film feed mechanism opens the magazines, feeds the exposed film sheet into the exposed film magazine, and closes the magazines. A film identification system is provided for forming an identifying image on a marginal portion of each film sheet

  10. Glare Spot Phase Doppler Anemometry

    Science.gov (United States)

    Hespel, Camille; Ren, Kuanfang; Gréhan, Gérard; Onofri, Fabrice

    2007-06-01

    The Phase Doppler anemometry has been developed to measure simultaneously the velocity and the size of droplets. The measurement of the refractive index would be also interesting since it depends on the temperature and the composition of the particle and its measurement permits both to increase the quality of the diameter measurement and to obtain information on the temperature and/or the composition of the droplets. In this paper, we introduce a Glare Spot Phase Doppler Anemometry which uses two large beams. In this case, the images of the particle formed by the reflected and refracted light, known as glare spots, are separated in space. When a particle passes in the probe volume, the two parts in a signal obtained by a detector in forward direction are then separated in time. If two detectors are used the phase differences between two signals, the distance and the intensity ratio of reflected and refracted parts can be obtained and they provide rich information about the particle diameter and its refractive index, as well as its velocity. This paper is devoted to the numerical study of such a configuration with two theoretical models: geometrical optics and rigorous electromagnetism solution.

  11. Oil futures and spot markets

    International Nuclear Information System (INIS)

    Samii, M.V.

    1992-01-01

    In the last decade, the oil futures market has risen to prominence and has become a major factor in influencing oil market psychology and the crude oil market. On a normal day, over 92 thousand contracts, the equivalent of 92 million barrels per day, change hands on the New York Mercantile Exchange, NYMEX. This market has provided a vehicle for hedging against risk. At the same time, it has also created opportunities for speculation. Those who previously were unable to participate in oil market transactions can now become involved through the futures market. The large number of participants in the future market and the availability of information has made this market more efficient and transparent, relative to the crude oil market. While there has been considerable in-depth analysis of other future markets, relatively little theoretical attention has focused on that of oil. This paper looks at the following issues. First, what is the relationship between futures and spot oil prices? And secondly, are futures prices a good predictor of spot crude prices in the future? (author)

  12. Integrating sustainable hunting in biodiversity protection in Central Africa: hot spots, weak spots, and strong spots.

    Directory of Open Access Journals (Sweden)

    John E Fa

    Full Text Available Wild animals are a primary source of protein (bushmeat for people living in or near tropical forests. Ideally, the effect of bushmeat harvests should be monitored closely by making regular estimates of offtake rate and size of stock available for exploitation. However, in practice, this is possible in very few situations because it requires both of these aspects to be readily measurable, and even in the best case, entails very considerable time and effort. As alternative, in this study, we use high-resolution, environmental favorability models for terrestrial mammals (N = 165 in Central Africa to map areas of high species richness (hot spots and hunting susceptibility. Favorability models distinguish localities with environmental conditions that favor the species' existence from those with detrimental characteristics for its presence. We develop an index for assessing Potential Hunting Sustainability (PHS of each species based on their ecological characteristics (population density, habitat breadth, rarity and vulnerability, weighted according to restrictive and permissive assumptions of how species' characteristics are combined. Species are classified into five main hunting sustainability classes using fuzzy logic. Using the accumulated favorability values of all species, and their PHS values, we finally identify weak spots, defined as high diversity regions of especial hunting vulnerability for wildlife, as well as strong spots, defined as high diversity areas of high hunting sustainability potential. Our study uses relatively simple models that employ easily obtainable data of a species' ecological characteristics to assess the impacts of hunting in tropical regions. It provides information for management by charting the geography of where species are more or less likely to be at risk of extinction from hunting.

  13. Nonepileptic attack disorder among married women.

    Science.gov (United States)

    Dhanaraj, M; Rangaraj, R; Arulmozhi, T; Vengatesan, A

    2005-06-01

    To study the clinical features, precipitating stressful life events and prognosis of nonepileptic attack disorder (NEAD) among married women. Prospective cohort study with 1-year follow-up. A tertiary care teaching hospital. Of the 1020 patients with epilepsy referred to the epilepsy clinic during 2002-2003, 30 were married women with NEAD. The diagnostic criteria for NEAD included normal EEG during ictal and post-ictal phase of the generalized 'attack.' The data collected included clinical characteristics, semiology of the attacks, precipitating stressful events, and co-morbid psychiatric disorders. The control group included 30 age-matched married women with generalized tonic-clonic seizures. The long-term outcome and factors influencing the outcomes were analyzed. The mean duration of illness was 18 months, and the pattern of the attack was 'fall and lying still' in 53% and 'fall with generalized motor movements' in 47%. The frequency was one or more per week in 57% and occasionally in 43%. The important stressful events were matrimonial discord following illegal relationship of the husband with another woman (chi2 = 9.02, P = 0.003) and constant quarrel with other family members (chi2 = 5.19, P = 0.02). The prevalence of sexual abuse was low (7%). Co-morbid psychiatric disorder was observed in 70%. At the end of 1 year, 39% were free from the attack. Resolution of the stressful life events (chi2 = 4.52, P = 0.03) and lower frequency of attack at the time of reporting (chi2 = 3.88, P = 0.05) correlated with good outcomes. Among patients with NEAD in India, the major precipitating factors were matrimonial discord following illegal relationship of the husband with another woman and constant quarrel with other family members and not sexual abuse. Women with low frequency of attack at the time of reporting and the remission of the stressful events had better outcomes.

  14. Heart failure - home monitoring

    Science.gov (United States)

    ... this page: //medlineplus.gov/ency/patientinstructions/000113.htm Heart failure - home monitoring To use the sharing features on ... your high blood pressure Fast food tips Heart failure - discharge Heart failure - fluids and diuretics Heart failure - what to ...

  15. Heart Diseases and Disorders

    Science.gov (United States)

    ... Resources Heart Diseases & Disorders Back to Patient Resources Heart Diseases & Disorders Millions of people experience irregular or abnormal ... harmless and happen in healthy people free of heart disease. However, some abnormal heart rhythms can be serious ...

  16. Coronary heart disease

    Science.gov (United States)

    Heart disease, Coronary heart disease, Coronary artery disease; Arteriosclerotic heart disease; CHD; CAD ... buildup of plaque in the arteries to your heart. This may also be called hardening of the ...

  17. Ionospheric hot spot at high latitudes

    International Nuclear Information System (INIS)

    Schunk, R.W.; Sojka, J.J.

    1982-01-01

    A hot spot (or spots) can occur in the high-latitude ionosphere depending on the plasma convection pattern. The hot spot corresponds to a small magnetic local time-magnetic latitude region of elevated ion temperatures located near the dusk and/or dawn meridians. For asymmetric convection electric field patterns, with enhanced flow in either the dusk or dawn sector of the polar cap, a single hot spot should occur in association with the strong convection cell. However, on geomagnetically disturbed days, two strong convection cells can occur, and hence, two hot spots should exist. The hot spot should be detectable when the electric field in the strong convection cell exceeds about 40 mV m -1 . For electric fields of the order of 100 mV m -1 in the convection cell, the ion temperature in the hot spot is greatest at low altitudes, reaching 4000 0 K at 160 km, and decreases with altitude in the F-region. An ionospheric hot spot (or spots) can be expected at all seasons and for a wide range of solar cycle conditions

  18. 12 CFR 263.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  19. 12 CFR 509.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding....17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  20. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  1. Combining Spot Sign and Intracerebral Hemorrhage Score to Estimate Functional Outcome: Analysis From the PREDICT Cohort.

    Science.gov (United States)

    Schneider, Hauke; Huynh, Thien J; Demchuk, Andrew M; Dowlatshahi, Dar; Rodriguez-Luna, David; Silva, Yolanda; Aviv, Richard; Dzialowski, Imanuel

    2018-06-01

    The intracerebral hemorrhage (ICH) score is the most commonly used grading scale for stratifying functional outcome in patients with acute ICH. We sought to determine whether a combination of the ICH score and the computed tomographic angiography spot sign may improve outcome prediction in the cohort of a prospective multicenter hemorrhage trial. Prospectively collected data from 241 patients from the observational PREDICT study (Prediction of Hematoma Growth and Outcome in Patients With Intracerebral Hemorrhage Using the CT-Angiography Spot Sign) were analyzed. Functional outcome at 3 months was dichotomized using the modified Rankin Scale (0-3 versus 4-6). Performance of (1) the ICH score and (2) the spot sign ICH score-a scoring scale combining ICH score and spot sign number-was tested. Multivariable analysis demonstrated that ICH score (odds ratio, 3.2; 95% confidence interval, 2.2-4.8) and spot sign number (n=1: odds ratio, 2.7; 95% confidence interval, 1.1-7.4; n>1: odds ratio, 3.8; 95% confidence interval, 1.2-17.1) were independently predictive of functional outcome at 3 months with similar odds ratios. Prediction of functional outcome was not significantly different using the spot sign ICH score compared with the ICH score alone (spot sign ICH score area under curve versus ICH score area under curve: P =0.14). In the PREDICT cohort, a prognostic score adding the computed tomographic angiography-based spot sign to the established ICH score did not improve functional outcome prediction compared with the ICH score. © 2018 American Heart Association, Inc.

  2. Pediatric heart surgery

    Science.gov (United States)

    Heart surgery - pediatric; Heart surgery for children; Acquired heart disease; Heart valve surgery - children ... There are many kinds of heart defects. Some are minor, and others are more serious. Defects can occur inside the heart or in the large blood vessels ...

  3. Trace Attack against Biometric Mobile Applications

    Directory of Open Access Journals (Sweden)

    Sanaa Ghouzali

    2016-01-01

    Full Text Available With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen. Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy.

  4. Subclinical endophthalmitis following a rooster attack.

    Science.gov (United States)

    Lekse Kovach, Jaclyn; Maguluri, Srilakshmi; Recchia, Franco M

    2006-12-01

    Ocular injury resulting from rooster attacks is rarely reported in the literature. Sadly, the target of these attacks is most often children younger than 3 years old, whose naiveté of the aggressive, territorial behavior of birds can place them at risk. Acute sequelae of these attacks can result in a lifetime of visual impairment. The possibility of a subacute or occult infection is an unusual occurrence that must always be considered. In an effort to prevent future attacks and ocular casualties, we present a case of a 12-month-old boy who suffered an open globe following a rooster attack. The open globe was emergently repaired. One week later, a white cataract was noticed on examination in the absence of systemic or ocular signs of inflammation. Traumatic endophthalmitis and lenticular abscess were suspected during examination under anesthesia. Vitrectomy, lensectomy, and injection of intravitreal antibiotics were performed. Culture of lenticular and vitreous aspirates grew alpha-streptococcus. Alpha-streptococcal endophthalmitis can result from ocular injuries caused by rooster pecking. The infection may present insidiously and without typical ocular or systemic symptoms or signs. Management is challenging and may require surgery.

  5. Modeling attacking of high skills volleyball players

    Directory of Open Access Journals (Sweden)

    Vladimir Gamaliy

    2014-12-01

    Full Text Available Purpose: to determine the model indicators of technical and tactical actions in the attack highly skilled volleyball players. Material and Methods: the study used statistical data of major international competitions: Olympic Games – 2012 World Championships – 2010, World League – 2010–2014 European Championship – 2010–2014. A total of 130 analyzed games. Methods were used: analysis and generalization of scientific and methodological literature, analysis of competitive activity highly skilled volleyball players, teacher observation, modeling technical and tactical actions in attacking highly skilled volleyball players. Results: it was found that the largest volume application of technical and tactical actions in the attack belongs to the group tactics «supple movement», whose indicator is 21,3%. The smallest amount of application belongs to the group tactics «flight level» model whose indicators is 5,4%, the efficiency of 3,4%, respectively. It is found that the power service in the jump from model parameters used in 51,6% of cases, the planning targets – 21,7% and 4,4% planning to reduce. Attacks performed with the back line, on model parameters used in the amount of 20,8% efficiency –13,7%. Conclusions: we prove that the performance of technical and tactical actions in the attack can be used as model in the control system of training and competitive process highly skilled volleyball players

  6. On the anatomy of social engineering attacks : A literature-based dissection of successful attacks

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    The aim of this studywas to explore the extent towhich persuasion principles are used in successful social engineering attacks. Seventy-four scenarioswere extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenariowas split into attack steps, containing

  7. 75 FR 70273 - National Heart, Lung, and Blood Institute; Notice of Closed Meetings

    Science.gov (United States)

    2010-11-17

    ... Institute Special Emphasis Panel, The Antihypertensive and Lipid-Lowering to Prevent Heart Attack Trial... Research Demonstration and Dissemination Projects. Date: December 14, 2010. Time: 8 a.m. to 2 p.m. Agenda... Assistance Program Nos. 93.233, National Center for Sleep Disorders Research; 93.837, Heart and Vascular...

  8. Attacks on public telephone networks: technologies and challenges

    Science.gov (United States)

    Kosloff, T.; Moore, Tyler; Keller, J.; Manes, Gavin W.; Shenoi, Sujeet

    2003-09-01

    Signaling System 7 (SS7) is vital to signaling and control in America's public telephone networks. This paper describes a class of attacks on SS7 networks involving the insertion of malicious signaling messages via compromised SS7 network components. Three attacks are discussed in detail: IAM flood attacks, redirection attacks and point code spoofing attacks. Depending on their scale of execution, these attacks can produce effects ranging from network congestion to service disruption. Methods for detecting these denial-of-service attacks and mitigating their effects are also presented.

  9. Cross-site scripting attacks procedure and Prevention Strategies

    Directory of Open Access Journals (Sweden)

    Wang Xijun

    2016-01-01

    Full Text Available Cross-site scripting attacks and defense has been the site of attack and defense is an important issue, this paper, the definition of cross-site scripting attacks, according to the current understanding of the chaos on the cross-site scripting, analyzes the causes and harm cross-site scripting attacks formation of attacks XXS complete process XSS attacks made a comprehensive analysis, and then for the web program includes Mobility there are cross-site scripting filter laxity given from ordinary users browse the web and web application developers two the defense cross-site scripting attacks effective strategy.

  10. Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks

    Directory of Open Access Journals (Sweden)

    Željko Gavrić

    2018-01-01

    Full Text Available Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the security issue is very important. DOS (denial of service attacks are a fundamental threat to the functioning of wireless sensor networks. This paper describes some of the most common DOS attacks and potential methods of protection against them. The case study shows one of the most frequent attacks on wireless sensor networks – the interference attack. In the introduction of this paper authors assume that the attack interference can cause significant obstruction of wireless sensor networks. This assumption has been proved in the case study through simulation scenario and simulation results.

  11. SU-E-T-510: Interplay Between Spots Sizes, Spot / Line Spacing and Motion in Spot Scanning Proton Therapy

    International Nuclear Information System (INIS)

    Lee, TK

    2015-01-01

    Purpose In proton beam configuration for spot scanning proton therapy (SSPT), one can define the spacing between spots and lines of scanning as a ratio of given spot size. If the spacing increases, the number of spots decreases which can potentially decrease scan time, and so can whole treatment time, and vice versa. However, if the spacing is too large, the uniformity of scanned field decreases. Also, the field uniformity can be affected by motion during SSPT beam delivery. In the present study, the interplay between spot/ line spacing and motion is investigated. Methods We used four Gaussian-shape spot sizes with 0.5cm, 1.0cm, 1.5cm, and 2.0cm FWHM, three spot/line spacing that creates uniform field profile which are 1/3*FWHM, σ/3*FWHM and 2/3*FWHM, and three random motion amplitudes within, +/−0.3mm, +/−0.5mm, and +/−1.0mm. We planned with 2Gy uniform single layer of 10×10cm2 and 20×20cm2 fields. Then, mean dose within 80% area of given field size, contrubuting MU per each spot assuming 1cGy/MU calibration for all spot sizes, number of spots and uniformity were calculated. Results The plans with spot/line spacing equal to or smaller than 2/3*FWHM without motion create ∼100% uniformity. However, it was found that the uniformity decreases with increased spacing, and it is more pronounced with smaller spot sizes, but is not affected by scanned field sizes. Conclusion It was found that the motion during proton beam delivery can alter the dose uniformity and the amount of alteration changes with spot size which changes with energy and spot/line spacing. Currently, robust evaluation in TPS (e.g. Eclipse system) performs range uncertainty evaluation using isocenter shift and CT calibration error. Based on presented study, it is recommended to add interplay effect evaluation to robust evaluation process. For future study, the additional interplay between the energy layers and motion is expected to present volumetric effect

  12. Cosmicflows-3: Cold Spot Repeller?

    Energy Technology Data Exchange (ETDEWEB)

    Courtois, Hélène M.; Graziani, Romain; Dupuy, Alexandra [University of Lyon, UCB Lyon 1, CNRS/IN2P3, IPN, Lyon (France); Tully, R. Brent [Institute for Astronomy, University of Hawaii, 2680 Woodlawn Drive, Honolulu, HI 96822 (United States); Hoffman, Yehuda [Racah Institute of Physics, Hebrew University, Jerusalem, 91904 (Israel); Pomarède, Daniel [Institut de Recherche sur les Lois Fondamentales de l’Univers, CEA, Université Paris-Saclay, F-91191 Gif-sur-Yvette (France)

    2017-09-20

    The three-dimensional gravitational velocity field within z ∼ 0.1 has been modeled with the Wiener filter methodology applied to the Cosmicflows-3 compilation of galaxy distances. The dominant features are a basin of attraction and two basins of repulsion. The major basin of attraction is an extension of the Shapley concentration of galaxies. One basin of repulsion, the Dipole Repeller, is located near the anti-apex of the cosmic microwave background dipole. The other basin of repulsion is in the proximate direction toward the “Cold Spot” irregularity in the cosmic microwave background. It has been speculated that a vast void might contribute to the amplitude of the Cold Spot from the integrated Sachs–Wolfe effect.

  13. New Trends in Heart Regeneration: A Review

    Directory of Open Access Journals (Sweden)

    Kochegarov A

    2016-11-01

    Full Text Available In this review, we focus on new approaches that could lead to the regeneration of heart muscle and the restoration of cardiac muscle function derived from newly-formed cardiomyocytes. Various strategies for the production of cardiomyocytes from embryonic stem cells, induced pluripotent stem cells, adult bone marrow stem cells and cardiac spheres from human heart biopsies are described. Pathological conditions which lead to atherosclerosis and coronary artery disease often are followed by myocardial infarction causing myocardial cell death. After cell death, there is very little self-regeneration of the cardiac muscle tissue, which is replaced by non-contractile connective tissue, thus weakening the ability of the heart muscle to contract fully and leading to heart failure. A number of experimental research approaches to stimulate heart muscle regeneration with the hope of regaining normal or near normal heart function in the damaged heart muscle have been attempted. Some of these very interesting studies have used a variety of stem cell types in combination with potential cardiogenic differentiation factors in an attempt to promote differentiation of new cardiac muscle for possible future use in the clinical treatment of patients who have suffered heart muscle damage from acute myocardial infarctions or related cardiovascular diseases. Although progress has been made in recent years relative to promoting the differentiation of cardiac muscle tissue from non-muscle cells, much work remains to be done for this technology to be used routinely in translational clinical medicine to treat patients with damaged heart muscle tissue and return such individuals to pre-heart-attack activity levels.

  14. Counteracting Power Analysis Attacks by Masking

    Science.gov (United States)

    Oswald, Elisabeth; Mangard, Stefan

    The publication of power analysis attacks [12] has triggered a lot of research activities. On the one hand these activities have been dedicated toward the development of secure and efficient countermeasures. On the other hand also new and improved attacks have been developed. In fact, there has been a continuous arms race between designers of countermeasures and attackers. This chapter provides a brief overview of the state-of-the art in the arms race in the context of a countermeasure called masking. Masking is a popular countermeasure that has been extensively discussed in the scientific community. Numerous articles have been published that explain different types of masking and that analyze weaknesses of this countermeasure.

  15. The WOMBAT Attack Attribution Method: Some Results

    Science.gov (United States)

    Dacier, Marc; Pham, Van-Hau; Thonnard, Olivier

    In this paper, we present a new attack attribution method that has been developed within the WOMBAT project. We illustrate the method with some real-world results obtained when applying it to almost two years of attack traces collected by low interaction honeypots. This analytical method aims at identifying large scale attack phenomena composed of IP sources that are linked to the same root cause. All malicious sources involved in a same phenomenon constitute what we call a Misbehaving Cloud (MC). The paper offers an overview of the various steps the method goes through to identify these clouds, providing pointers to external references for more detailed information. Four instances of misbehaving clouds are then described in some more depth to demonstrate the meaningfulness of the concept.

  16. X-ray picture of the heart turn in echocardiographic diagnosis of rheumatic heart disease

    International Nuclear Information System (INIS)

    Grishkevich, A.M.; Goryanina, N.K.

    1986-01-01

    The paper is concerned with X-ray and echocardiographic investigation of the heart in 461 patients with mitral-tricuspidal disease. In 377 (82%) cases a turn of the heart along the longitudinal axis (counter clockwise) to the left and back was revealed. X-ray recognition of the heart turn made it possible to set an echocardiographic sensor to spot some of the cardiac cavities, interventricular septum and valvular apparatus. The correct setting of the echocardiographic sensor resulted in the determination of true sizes of each cardiac cavity, diagnosis of the nature of each valvular lesion and the recognition of such complications of rheumatic heart diseases as valvular calcinosis, left atrial thrombosis and disorder of myocardial contractility

  17. A novel proposed network security management approach for cyber attacks

    International Nuclear Information System (INIS)

    Ahmed, Z.; Nazir, B.; Zafar, M.F.; Anwar, M.M.; Azam, K.; Asar, A.U.

    2007-01-01

    Network security is a discipline that focuses on securing networks from unauthorized access. Given the Escalating threats of malicious cyber attacks, modern enterprises employ multiple lines of defense. A comprehensive defense strategy against such attacks should include (I) an attack detection component that deter- mines the fact that a program is compromised, (2) an attack identification and prevention component that identifies attack packets so that one can block such packets in the future and prevents the attack from further propagation. Over the last decade, a significant amount of research has been vested in the systems that can detect cyber attacks either statically at compile time or dynamically at run time, However, not much effort is spent on automated attack packet identification or attack prevention. In this paper we present a unified solution to the problems mentioned above. We implemented this solution after the forward engineering of Open Source Security Information Management (OSSIM) system called Preventive Information Security management (PrISM) system that correlates input from different sensors so that the resulting product can automatically detect any cyber attack against it and prevents by identifying the actual attack packet(s). The PrISM was always able to detect the attacks, identify the attack packets and most often prevent by blocking the attacker's IP address to continue normal execution. There is no additional run-time performance overhead for attack prevention. (author)

  18. Playing Attack and Defense with Trusted Storage

    DEFF Research Database (Denmark)

    Gonzalez, Javier; Bonnet, Philippe; Bouganim, Luc

    2014-01-01

    It is often convenient to assume in a data management platform that one or several computing devices are trusted, specially when the goal is to provide privacy guarantees over personal data. But what does it take for a computing device to be trusted? More specifically, how can a personal device...... provide trusted storage? This is the question we tackle in this demonstration. We describe how secure devices, equipped with a trusted execution environment, differ from general purpose devices. We illustrate with our demonstration scenario, that it is much more difficult to attack a storage service...... running on a secure device, than to attack the same service running on a general purpose device....

  19. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolić, Ivica; Rechberger, Christian

    2014-01-01

    ciphers, including the new standard SHA-3 (Keccak). The rebound attack is a start-from-the-middle approach for finding differential paths and conforming pairs in byte-oriented designs like Substitution-Permutation networks and AES. We apply our new compositional attack to the reduced version of the hash...... number of rounds. We also use neutral bits and message modification methods from the practice of collision search in MD5 and SHA-1 hash functions. These methods push the rotational property through more rounds than previous analysis suggested, and eventually establish a distinguishing property...

  20. A Distinguish Attack on COSvd Cipher

    OpenAIRE

    Mohammad Ali Orumiehchi ha; R. Mirghadri

    2007-01-01

    The COSvd Ciphers has been proposed by Filiol and others (2004). It is a strengthened version of COS stream cipher family denoted COSvd that has been adopted for at least one commercial standard. We propose a distinguish attack on this version, and prove that, it is distinguishable from a random stream. In the COSvd Cipher used one S-Box (10×8) on the final part of cipher. We focus on S-Box and use weakness this S-Box for distinguish attack. In addition, found a leak on HNLL that the sub s-bo...

  1. Attacks and infections in percolation processes

    International Nuclear Information System (INIS)

    Janssen, Hans-Karl; Stenull, Olaf

    2017-01-01

    We discuss attacks and infections at propagating fronts of percolation processes based on the extended general epidemic process. The scaling behavior of the number of the attacked and infected sites in the long time limit at the ordinary and tricritical percolation transitions is governed by specific composite operators of the field-theoretic representation of this process. We calculate corresponding critical exponents for tricritical percolation in mean-field theory and for ordinary percolation to 1-loop order. Our results agree well with the available numerical data. (paper)

  2. Attack strategies on quantum cryptographic protocols

    International Nuclear Information System (INIS)

    Schauer, S.; Suda, M.

    2006-01-01

    Full text: Quantum key distribution (QKD) and quantum authentication (QA) have been a topic of extensive research in the last 20 years. In course of that many attacks on QKD and QA protocols have been studied. Among these, Zhang, Lee and Guo presented an attack on a QKD protocol using entanglement swapping. Based on that strategy we take a look at other protocols to inspect how much information an adversary may get if he shares entanglement with either one or both parties. We will present some protocols where an adversary can even get full information about the key using entanglement. (author)

  3. 7 CFR 28.412 - Strict Middling Light Spotted Color.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Strict Middling Light Spotted Color. 28.412 Section 28... Light Spotted Color. Strict Middling Light Spotted Color is color which in spot or color, or both, is between Strict Middling Color and Strict Middling Spotted Color. ...

  4. 7 CFR 28.415 - Low Middling Light Spotted Color.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Low Middling Light Spotted Color. 28.415 Section 28... Spotted Color. Low Middling Light Spotted Color is color which in spot or color, or both, is between Low Middling Color and Low Middling Spotted Color. ...

  5. 7 CFR 28.411 - Good Middling Light Spotted Color.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Good Middling Light Spotted Color. 28.411 Section 28... Light Spotted Color. Good Middling Light Spotted Color is color which in spot or color, or both, is between Good Middling Color and Good Middling Spotted Color. ...

  6. 7 CFR 28.413 - Middling Light Spotted Color.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Middling Light Spotted Color. 28.413 Section 28.413... Spotted Color. Middling Light Spotted Color is color which in spot or color, or both, is between Middling Color and Middling Spotted Color. ...

  7. Hot Spot Removal System: System description

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-09-01

    Hazardous wastes contaminated with radionuclides, chemicals, and explosives exist across the Department of Energy complex and need to be remediated due to environmental concerns. Currently, an opportunity is being developed to dramatically reduce remediation costs and to assist in the acceleration of schedules associated with these wastes by deploying a Hot Spot Removal System. Removing the hot spot from the waste site will remove risk driver(s) and enable another, more cost effective process/option/remedial alternative (i.e., capping) to be applied to the remainder of the site. The Hot Spot Removal System consists of a suite of technologies that will be utilized to locate and remove source terms. Components of the system can also be used in a variety of other cleanup activities. This Hot Spot Removal System Description document presents technologies that were considered for possible inclusion in the Hot Spot Removal System, technologies made available to the Hot Spot Removal System, industrial interest in the Hot Spot Removal System`s subsystems, the schedule required for the Hot Spot Removal System, the evaluation of the relevant technologies, and the recommendations for equipment and technologies as stated in the Plan section.

  8. Rocky Mountain spotted fever in children.

    Science.gov (United States)

    Woods, Charles R

    2013-04-01

    Rocky Mountain spotted fever is typically undifferentiated from many other infections in the first few days of illness. Treatment should not be delayed pending confirmation of infection when Rocky Mountain spotted fever is suspected. Doxycycline is the drug of choice even for infants and children less than 8 years old. Copyright © 2013 Elsevier Inc. All rights reserved.

  9. Rocky Mountain Spotted Fever: Statistics and Epidemiology

    Science.gov (United States)

    ... Search Form Controls Cancel Submit Search the CDC Rocky Mountain Spotted Fever (RMSF) Note: Javascript is disabled or is not ... message, please visit this page: About CDC.gov . Rocky Mountain Spotted Fever (RMSF) Transmission Signs and Symptoms Diagnosis and Testing ...

  10. Hot Spot Removal System: System description

    International Nuclear Information System (INIS)

    1997-09-01

    Hazardous wastes contaminated with radionuclides, chemicals, and explosives exist across the Department of Energy complex and need to be remediated due to environmental concerns. Currently, an opportunity is being developed to dramatically reduce remediation costs and to assist in the acceleration of schedules associated with these wastes by deploying a Hot Spot Removal System. Removing the hot spot from the waste site will remove risk driver(s) and enable another, more cost effective process/option/remedial alternative (i.e., capping) to be applied to the remainder of the site. The Hot Spot Removal System consists of a suite of technologies that will be utilized to locate and remove source terms. Components of the system can also be used in a variety of other cleanup activities. This Hot Spot Removal System Description document presents technologies that were considered for possible inclusion in the Hot Spot Removal System, technologies made available to the Hot Spot Removal System, industrial interest in the Hot Spot Removal System''s subsystems, the schedule required for the Hot Spot Removal System, the evaluation of the relevant technologies, and the recommendations for equipment and technologies as stated in the Plan section

  11. Blood pressure, risk of ischemic cerebrovascular and ischemic heart disease, and longevity in alpha(1)-antitrypsin deficiency

    DEFF Research Database (Denmark)

    Dahl, Morten; Tybjaerg-Hansen, Anne; Sillesen, Henrik

    2003-01-01

    Because elastase in alpha(1)-antitrypsin deficiency may attack elastin in the arterial wall, we tested whether alpha(1)-antitrypsin deficiency is associated with reduced blood pressure, risk of ischemic cerebrovascular (ICVD) and ischemic heart disease (IHD), and longevity.......Because elastase in alpha(1)-antitrypsin deficiency may attack elastin in the arterial wall, we tested whether alpha(1)-antitrypsin deficiency is associated with reduced blood pressure, risk of ischemic cerebrovascular (ICVD) and ischemic heart disease (IHD), and longevity....

  12. Crack imaging by pulsed laser spot thermography

    International Nuclear Information System (INIS)

    Li, T; Almond, D P; Rees, D A S; Weekes, B

    2010-01-01

    A surface crack close to a spot heated by a laser beam impedes lateral heat flow and produces alterations to the shape of the thermal image of the spot that can be monitored by thermography. A full 3D simulation has been developed to simulate heat flow from a laser heated spot in the proximity of a crack. The modelling provided an understanding of the ways that different parameters affect the thermal images of laser heated spots. It also assisted in the development of an efficient image processing strategy for extracting the scanned cracks. Experimental results show that scanning pulsed laser spot thermography has considerable potential as a remote, non-contact crack imaging technique.

  13. Laser Spot Detection Based on Reaction Diffusion.

    Science.gov (United States)

    Vázquez-Otero, Alejandro; Khikhlukha, Danila; Solano-Altamirano, J M; Dormido, Raquel; Duro, Natividad

    2016-03-01

    Center-location of a laser spot is a problem of interest when the laser is used for processing and performing measurements. Measurement quality depends on correctly determining the location of the laser spot. Hence, improving and proposing algorithms for the correct location of the spots are fundamental issues in laser-based measurements. In this paper we introduce a Reaction Diffusion (RD) system as the main computational framework for robustly finding laser spot centers. The method presented is compared with a conventional approach for locating laser spots, and the experimental results indicate that RD-based computation generates reliable and precise solutions. These results confirm the flexibility of the new computational paradigm based on RD systems for addressing problems that can be reduced to a set of geometric operations.

  14. Laser Spot Detection Based on Reaction Diffusion

    Directory of Open Access Journals (Sweden)

    Alejandro Vázquez-Otero

    2016-03-01

    Full Text Available Center-location of a laser spot is a problem of interest when the laser is used for processing and performing measurements. Measurement quality depends on correctly determining the location of the laser spot. Hence, improving and proposing algorithms for the correct location of the spots are fundamental issues in laser-based measurements. In this paper we introduce a Reaction Diffusion (RD system as the main computational framework for robustly finding laser spot centers. The method presented is compared with a conventional approach for locating laser spots, and the experimental results indicate that RD-based computation generates reliable and precise solutions. These results confirm the flexibility of the new computational paradigm based on RD systems for addressing problems that can be reduced to a set of geometric operations.

  15. Rocky Mountain spotted fever in Argentina.

    Science.gov (United States)

    Paddock, Christopher D; Fernandez, Susana; Echenique, Gustavo A; Sumner, John W; Reeves, Will K; Zaki, Sherif R; Remondegui, Carlos E

    2008-04-01

    We describe the first molecular confirmation of Rickettsia rickettsii, the cause of Rocky Mountain spotted fever (RMSF), from a tick vector, Amblyomma cajennense, and from a cluster of fatal spotted fever cases in Argentina. Questing A. cajennense ticks were collected at or near sites of presumed or confirmed cases of spotted fever rickettsiosis in Jujuy Province and evaluated by polymerase chain reaction assays for spotted fever group rickettsiae. DNA of R. rickettsii was amplified from a pool of A. cajennense ticks and from tissues of one of four patients who died during 2003-2004 after illnesses characterized by high fever, severe headache, myalgias, and petechial rash. The diagnosis of spotted fever rickettsiosis was confirmed in the other patients by indirect immunofluorescence antibody and immunohistochemical staining techniques. These findings show the existence of RMSF in Argentina and emphasize the need for clinicians throughout the Americas to consider RMSF in patients with febrile rash illnesses.

  16. Complement activation, endothelial dysfunction, insulin resistance and chronic heart failure

    DEFF Research Database (Denmark)

    Bjerre, M.; Kistorp, C.; Hansen, T.K.

    2010-01-01

    Objectives. Patients with chronic heart failure (CHF) have an exaggerated immune response, endothelial damage/dysfunction, and increased risk of diabetes mellitus (DM). The inter-relationship(s) between indices of complement activation (soluble membrane attack complex, sMAC), inflammation (hs...... to ischemic heart disease (IHD) as compared with CHF patients with non-ischemic ethiology (p = 0.02), but were not predictive of survival or progression of CHF. A moderate strong relation between sMAC and sEsel levels was found beta = 0.33 (p ... damaging of the heart tissue...

  17. Investigating the Possibility to Individualize Asthma Attack Therapy Based on Attack Severity and Patient Characteristics

    Directory of Open Access Journals (Sweden)

    Sárkány Zoltán

    2016-03-01

    Full Text Available Introduction: The objective of this study was to investigate with the help of a computerized simulation model whether the treatment of an acute asthma attack can be individualized based on the severity of the attack and the characteristics of the patient. Material and Method: A stochastic lung model was used to simulate the deposition of 1 nm - 10 μm particles during a mild and a moderate asthma attack. Breathing parameters were varied to maximize deposition, and simulation results were compared with those obtained in the case of a severe asthma attack. In order to investigate the effect of height on the deposition of inhaled particles, another series of simulations was carried out with identical breathing parameters, comparing patient heights of 155 cm, 175 cm and 195 cm. Results: The optimization process yielded an increase in the maximum deposition values of around 6-7% for each type of investigated asthma attack, and the difference between attacks of different degree of severity was around 5% for both the initial and the optimized values, a higher degree of obstruction increasing the amount of deposited particles. Conclusions: Our results suggest that the individualization of asthma attack treatment cannot be based on particles of different size, as the highest deposited fraction in all three types of attacks can be obtained using 0.01 μm particles. The use of a specific set of breathing parameters yields a difference between a mild and a moderate, as well as a moderate and a severe asthma attack of around 5%.

  18. Tick testing as a method of controlling Rocky Mountain spotted fever.

    Science.gov (United States)

    Sacks, J J; Pinner, T A; Parker, R L

    1983-01-01

    In South Carolina, 1974-1980, only two matches were found between 536 Rocky Mountain spotted fever (RMSF) cases and 965 individuals who submitted ticks that tested rickettsial antigen positive. In neither case did the positive test prevent RMSF. Tick rickettsial positivity rates varied inversely with human RMSF attack rates in different geographic areas. A physician survey established it as unlikely that RMSF occurred in positive tick submitters (PTS), and that although not recommended, 34 per cent of asymptomatic PTS received prophylactic treatment. Only 18 per cent of positive ticks were engorged. Tick testing appears ineffective in preventing RMSF. PMID:6869643

  19. Sequential and Parallel Attack Tree Modelling

    NARCIS (Netherlands)

    Arnold, Florian; Guck, Dennis; Kumar, Rajesh; Stoelinga, Mariëlle Ida Antoinette; Koornneef, Floor; van Gulijk, Coen

    The intricacy of socio-technical systems requires a careful planning and utilisation of security resources to ensure uninterrupted, secure and reliable services. Even though many studies have been conducted to understand and model the behaviour of a potential attacker, the detection of crucial

  20. Cooperative Electronic Attack using Unmanned Air Vehicles

    National Research Council Canada - National Science Library

    Mears, Mark J

    2006-01-01

    ... that are salient in the context of cooperative control. The utility of electronic attack is described in the context of integrated air defense systems that rely on RADAR sites that act as a network to gather information about potential airborne threats...

  1. Network overload due to massive attacks

    Science.gov (United States)

    Kornbluth, Yosef; Barach, Gilad; Tuchman, Yaakov; Kadish, Benjamin; Cwilich, Gabriel; Buldyrev, Sergey V.

    2018-05-01

    We study the cascading failure of networks due to overload, using the betweenness centrality of a node as the measure of its load following the Motter and Lai model. We study the fraction of survived nodes at the end of the cascade pf as a function of the strength of the initial attack, measured by the fraction of nodes p that survive the initial attack for different values of tolerance α in random regular and Erdös-Renyi graphs. We find the existence of a first-order phase-transition line pt(α ) on a p -α plane, such that if p pt , pf is large and the giant component of the network is still present. Exactly at pt, the function pf(p ) undergoes a first-order discontinuity. We find that the line pt(α ) ends at a critical point (pc,αc) , in which the cascading failures are replaced by a second-order percolation transition. We find analytically the average betweenness of nodes with different degrees before and after the initial attack, we investigate their roles in the cascading failures, and we find a lower bound for pt(α ) . We also study the difference between localized and random attacks.

  2. Attack Classification Schema for Smart City WSNs

    Directory of Open Access Journals (Sweden)

    Victor Garcia-Font

    2017-04-01

    Full Text Available Urban areas around the world are populating their streets with wireless sensor networks (WSNs in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  3. Adversarial Feature Selection Against Evasion Attacks.

    Science.gov (United States)

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection.

  4. Intrusion-Tolerant Replication under Attack

    Science.gov (United States)

    Kirsch, Jonathan

    2010-01-01

    Much of our critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As our dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including those…

  5. Strengthening Crypto-1 Cipher Against Algebraic Attacks

    Directory of Open Access Journals (Sweden)

    Farah Afianti

    2015-08-01

    Full Text Available In the last few years, several studies addressed the problem of data security in Mifare Classic. One of its weaknesses is the low random number quality. This causes SAT solver attacks to have lower complexity. In order to strengthen Crypto-1 against SAT solver attacks, a modification of the feedback function with better cryptographic properties is proposed. It applies a primitive polynomial companion matrix. SAT solvers cannot directly attack the feedback shift register that uses the modified Boolean feedback function, the register has to be split into smaller groups. Experimental testing showed that the amount of memory and CPU time needed were highest when attacking the modified Crypto-1 using the modified feedback function and the original filter function. In addition, another modified Crypto-1, using the modified feedback function and a modified filter function, had the lowest percentage of revealed variables. It can be concluded that the security strength and performance of the modified Crypto-1 using the modified feedback function and the modified filter function are better than those of the original Crypto-1.

  6. Wrap-Attack Pack: Product Packaging Exercise

    Science.gov (United States)

    Lee, Seung Hwan; Hoffman, K. Douglas

    2016-01-01

    Although many marketing courses discuss traditional concepts pertaining to product strategy, concepts specifically relating to packaging are often glossed over. This exercise, "Wrap-Attack Pack," teaches students about the utilitarian and hedonic design elements of packaging. More specifically, the primary objective is to creatively…

  7. Social Engineering Attack Detection Model: SEADMv2

    CSIR Research Space (South Africa)

    Mouton, F

    2015-10-01

    Full Text Available link in the security chain. A social engineering attack targets this weakness by using various manipulation techniques to elicit individuals to perform sensitive requests. The field of social engineering is still in its infancy as far as formal...

  8. Attack Classification Schema for Smart City WSNs.

    Science.gov (United States)

    Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena

    2017-04-05

    Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  9. Algebraic Side-Channel Attack on Twofish

    Directory of Open Access Journals (Sweden)

    Chujiao Ma

    2017-05-01

    Full Text Available While algebraic side-channel attack (ASCA has been successful in breaking simple cryptographic algorithms, it has never been done on larger or more complex algorithms such as Twofish. Compared to other algorithms that ASCA has been used on, Twofish is more difficult to attack due to the key-dependent S-boxes as well as the complex key scheduling. In this paper, we propose the first algebraic side-channel attack on Twofish, and examine the importance of side-channel information in getting past the key-dependent S-boxes and the complex key scheduling. The cryptographic algorithm and side-channel information are both expressed as boolean equations and a SAT solver is used to recover the key. While algebraic attack by itself is not sufficient to break the algorithm, with the help of side-channel information such as Hamming weights, we are able to correctly solve for 96 bits of the 128 bits key in under 2 hours with known plaintext/ciphertext.

  10. Armed Deterrence: Countering Soft Target Attacks

    Science.gov (United States)

    2016-02-06

    offer no security. With over 17,430 such geographically separated military sites across the United States, these fatal shootings by a Kuwaiti- born ...increasing trend and the carnage 4 that IS sympathizers can unleash. This coordinated attack on a concert hall, a soccer stadium, and restaurant

  11. 47 CFR 76.1612 - Personal attack.

    Science.gov (United States)

    2010-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND... issues of public importance, an attack is made upon the honesty, character, integrity, or like personal qualities of an identified person or group, the cable television system operator shall, within a reasonable...

  12. Rising Trend: Complex and sophisticated attack methods

    Indian Academy of Sciences (India)

    Stux, DuQu, Nitro, Luckycat, Exploit Kits, FLAME. ADSL/SoHo Router Compromise. Botnets of compromised ADSL/SoHo Routers; User Redirection via malicious DNS entry. Web Application attacks. SQL Injection, RFI etc. More and more Webshells. More utility to hackers; Increasing complexity and evading mechanisms.

  13. Strategic defense and attack for reliability systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2008-01-01

    This article illustrates a method by which arbitrarily complex series/parallel reliability systems can be analyzed. The method is illustrated with the series-parallel and parallel-series systems. Analytical expressions are determined for the investments and utilities of the defender and the attacker, depend on their unit costs of investment for each component, the contest intensity for each component, and their evaluations of the value of system functionality. For a series-parallel system, infinitely many components in parallel benefit the defender maximally regardless of the finite number of parallel subsystems in series. Conversely, infinitely many components in series benefit the attacker maximally regardless of the finite number of components in parallel in each subsystem. For a parallel-series system, the results are opposite. With equivalent components, equal unit costs for defender and attacker, equal intensity for all components, and equally many components in series and parallel, the defender always prefers the series-parallel system rather than the parallel-series system, and converse holds for the attacker. Hence from the defender's perspective, ceteris paribus, the series-parallel system is more reliable, and has fewer 'cut sets' or failure modes

  14. Validation Method of a Telecommunications Blackout Attack

    National Research Council Canada - National Science Library

    Amado, Joao; Nunes, Paulo

    2005-01-01

    ..., and to obtain the maximum disruptive effect over the services. The proposed method uses a top-down approach, starting on the service level and ending on the different network elements that can be identified in the end as the targets for the attack.

  15. Association between Terror Attacks and Suicide Attempts

    Science.gov (United States)

    Weizman, Tal; Yagil, Yaron; Schreiber, Shaul

    2009-01-01

    Based on Durkheim's "Control theory," we explored the association between frequency of terror attacks in Israel and the frequency of suicide attempts admitted to the Emergency Room of a major general hospital in Tel-Aviv (1999-2004). Analysis of the six-year study period as a whole revealed no significant correlation between the…

  16. Rising Trend: Complex and sophisticated attack methods

    Indian Academy of Sciences (India)

    Increased frequency and intensity of DoS/DDoS. Few Gbps is now normal; Anonymous VPNs being used; Botnets being used as a vehicle for launching DDoS attacks. Large scale booking of domain names. Hundred thousands of domains registered in short duration via few registrars; Single registrant; Most of the domains ...

  17. Understanding How Components of Organisations Contribute to Attacks

    DEFF Research Database (Denmark)

    Gu, Min; Aslanyan, Zaruhi; Probst, Christian W.

    2016-01-01

    Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors is diffi......Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors...... is difficult. Recently, system models have been used for automatically identifying possible attacks on the modelled organisation. The generated attacks consider all three layers, making the contribution of building infrastructure, computer infrastructure, and humans (insiders and outsiders) explicit. However......, this contribution is only visible in the attack trees as part of the performed steps; it cannot be mapped back to the model directly since the actions usually involve several elements (attacker and targeted actor or asset). Especially for large attack trees, understanding the relations between several model...

  18. An Adaptive Approach for Defending against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Muhai Li

    2010-01-01

    Full Text Available In various network attacks, the Distributed Denial-of-Service (DDoS attack is a severe threat. In order to deal with this kind of attack in time, it is necessary to establish a special type of defense system to change strategy dynamically against attacks. In this paper, we introduce an adaptive approach, which is used for defending against DDoS attacks, based on normal traffic analysis. The approach can check DDoS attacks and adaptively adjust its configurations according to the network condition and attack severity. In order to insure the common users to visit the victim server that is being attacked, we provide a nonlinear traffic control formula for the system. Our simulation test indicates that the nonlinear control approach can prevent the malicious attack packets effectively while making legitimate traffic flows arrive at the victim.

  19. Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, MAC layer attacks are considered...... the most harmful as they directly affect the available resources and thus the nodes’ energy consumption. The first endeavour of this paper is to model the activities of MAC layer security attacks to understand the flow of activities taking place when mounting the attack and when actually executing it....... The second aim of the paper is to simulate these attacks on hybrid MAC mechanisms, which shows the performance degradation of aWSN under the considered attacks. The modelling and implementation of the security attacks give an actual view of the network which can be useful in further investigating secure...

  20. Heart failure - surgeries and devices

    Science.gov (United States)

    ... surgery; HF - surgery; Intra-aortic balloon pumps - heart failure; IABP - heart failure; Catheter based assist devices - heart failure ... problem may cause heart failure or make heart failure worse. Heart valve surgery may be needed to repair or ...

  1. Recovery of human remains after shark attack.

    Science.gov (United States)

    Byard, Roger W; James, Ross A; Heath, Karen J

    2006-09-01

    Two cases of fatal shark attack are reported where the only tissues recovered were fragments of lung. Case 1: An 18-year-old male who was in the sea behind a boat was observed by friends to be taken by a great white shark (Carcharodon carcharias). The shark dragged him under the water and then, with a second shark, dismembered the body. Witnesses noted a large amount of blood and unrecognizable body parts coming to the surface. The only tissues recovered despite an intensive beach and sea search were 2 fragments of lung. Case 2: A 19-year-old male was attacked by a great white shark while diving. A witness saw the shark swim away with the victim's body in its mouth. Again, despite intensive beach and sea searches, the only tissue recovered was a single piece of lung, along with pieces of wetsuit and diving equipment. These cases indicate that the only tissue to escape being consumed or lost in fatal shark attacks, where there is a significant attack with dismemberment and disruption of the integrity of the body, may be lung. The buoyancy of aerated pulmonary tissue ensures that it rises quickly to the surface, where it may be recovered by searchers soon after the attack. Aeration of the lung would be in keeping with death from trauma rather than from drowning and may be a useful marker in unwitnessed deaths to separate ante- from postmortem injury, using only relatively small amounts of tissues. Early organ recovery enhances the identification of human tissues as the extent of morphologic alterations by putrefactive processes and sea scavengers will have been minimized. DNA testing is also possible on such recovered fragments, enabling confirmation of the identity of the victim.

  2. Valvular Heart Disease in Heart Failure

    Directory of Open Access Journals (Sweden)

    Giuseppe MC Rosano

    2017-01-01

    Full Text Available Structural valvular heart disease may be the cause of heart failure or may worsen the clinical status of patients with heart failure. Heart failure may also develop in patients treated with valve surgery. Patients with heart failure with valvular heart disease are at increased risk of events including sudden cardiac death. Before considering intervention (surgical or percutaneous all patients should receive appropriate medical and device therapy taking into account that vasodilators must be used with caution in patients with severe aortic stenosis. Numerous percutaneous and/or hybrid procedures have been introduced in the past few years and they are changing the management of valvular heart disease. In patients with heart failure and valvular heart disease, either primary or functional, the whole process of decision-making should be staged through a comprehensive evaluation of the risk– benefit ratio of different treatment strategies and should be made by a multidisciplinary ‘heart team’ with a particular expertise in valvular heart disease. The heart team should include heart failure cardiologists, cardiac surgeons/structural valve interventionists, imaging specialists, anaesthetists, geriatricians and intensive care specialists. This article will review recent developments and distill practical guidance in the management of this important heart failure co-morbidity.

  3. Transforming Graphical System Models to Graphical Attack Models

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2016-01-01

    Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations...... approach to transforming graphical system models to graphical attack models in the form of attack trees. Based on an asset in the model, our transformations result in an attack tree that represents attacks by all possible actors in the model, after which the actor in question has obtained the asset....

  4. New attacks on Wi-Fi Protected Setup

    OpenAIRE

    Hamed Mohtadi; Alireza Rahimi

    2015-01-01

    Wi-Fi Protected Setup (WPS) is a network security standard that is used to secure networks in home and office, introduced in 2006 by the Wi-Fi Alliance. It provides easier configuration setup and is used in almost all recent Wi-Fi devices. In this paper we propose two attacks on this standard. The first attack is an offline brute force attack that uses imbalance on registration protocol. This attack needs user action, but it is more efficient than previous attacks. The second attack uses weak...

  5. 1994 Attack Team Workshop: Phase II - Full-Scale Offensive Fog Attack Tests

    National Research Council Canada - National Science Library

    Scheffey, Joseph

    1997-01-01

    .... This report demonstrates the benefits of using a medium angle fog stream to control the overhead fire threat when conducting a direct attack on a growing/steady state fire where the sea of the fire is obstructed...

  6. Volume higher; spot price ranges widen

    International Nuclear Information System (INIS)

    Anon.

    1994-01-01

    This article is the October 1994 uranium market summary. During this reporting period, volume on the spot concentrates market doubled. Twelve deals took place: three in the spot concentrates market, one in the medium and long-term market, four in the conversion market, and four in the enrichment market. The restricted price range widened due to higher prices at the top end of the range, while the unrestricted price range widened because of lower prices at the bottom end. Spot conversion prices were higher, and enrichment prices were unchanged

  7. A Framework for Attack-Resilient Industrial Control Systems : Attack Detection and Controller Reconfiguration

    OpenAIRE

    Paridari, Kaveh; O'Mahony, Niamh; Mady, Alie El-Din; Chabukswar, Rohan; Boubekeur, Menouer; Sandberg, Henrik

    2017-01-01

    Most existing industrial control systems (ICSs), such as building energy management systems (EMSs), were installed when potential security threats were only physical. With advances in connectivity, ICSs are now, typically, connected to communications networks and, as a result, can be accessed remotely. This extends the attack surface to include the potential for sophisticated cyber attacks, which can adversely impact ICS operation, resulting in service interruption, equipment damage, safety c...

  8. Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?

    Directory of Open Access Journals (Sweden)

    Ines Goicoechea-Telleria

    2018-01-01

    Full Text Available The use of biometrics keeps growing. Every day, we use biometric recognition to unlock our phones or to have access to places such as the gym or the office, so we rely on the security manufacturers offer when protecting our privileges and private life. It is well known that it is possible to hack into a fingerprint sensor using fake fingers made of Play-Doh and other easy-to-obtain materials but to what extent? Is this true for all users or only for specialists with a deep knowledge on biometrics? Are smartphone fingerprint sensors as reliable as desktop sensors? To answer these questions, we performed 3 separate evaluations. First, we evaluated 4 desktop fingerprint sensors of different technologies by attacking them with 7 different fake finger materials. All of them were successfully attacked by an experienced attacker. Secondly, we carried out a similar test on 5 smartphones with embedded sensors using the most successful materials, which also hacked the 5 sensors. Lastly, we gathered 15 simulated attackers with no background in biometrics to create fake fingers of several materials, and they had one week to attack the fingerprint sensors of the same 5 smartphones, with the starting point of a short video with the techniques to create them. All 5 smartphones were successfully attacked by an inexperienced attacker. This paper will provide the results achieved, as well as an analysis on the attack potential of every case. All results are given following the metrics of the standard ISO/IEC 30107-3.

  9. Defense and attack of complex and dependent systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2010-01-01

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  10. Defense and attack of complex and dependent systems

    Energy Technology Data Exchange (ETDEWEB)

    Hausken, Kjell, E-mail: kjell.hausken@uis.n [Faculty of Social Sciences, University of Stavanger, N-4036 Stavanger (Norway)

    2010-01-15

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  11. Revealing Hearts

    DEFF Research Database (Denmark)

    Saghaug, Kristin Falck; Pattison, George; Lindgren, Peter

    2014-01-01

    with reference to Tillich’s account of the meaning of revelation through culture and art, summed up in the statement that “(...) revelation is the manifestation of the ground of being for human knowledge” (Tillich, 1951, p.94), which, we argue, can be extended to everyday experiences, for example, in business......Some small business owners want to balance personal values as well as economic values. “I have to follow my heart” or “it must be meaningful” some of them say. But how might they be able to know what gives meaning to the heart? The philosophical theologian Paul Tillich finds that the problem...... life. In Tillich’s own terms, even preliminary concerns may point at an ultimate concern (Tillich, 1964), which can also be understood as ‘knowledge of the heart’. Our account is also connected to wider discussions concerning the nature of intuition....

  12. Getting a New Heart

    Science.gov (United States)

    ... may be able to replace it with an artificial (man-made) valve. Cardiac size reduction . During this procedure, your doctor removes a piece of the heart muscle from an enlarged heart. This makes your heart ...

  13. Open heart surgery

    Science.gov (United States)

    ... this page: //medlineplus.gov/ency/article/002950.htm Open heart surgery To use the sharing features on this ... large arteries connected to the heart. The term "open heart surgery" means that you are connected to a ...

  14. Pediatric heart surgery - discharge

    Science.gov (United States)

    ... discharge; Heart valve surgery - children - discharge; Heart surgery - pediatric - discharge; Heart transplant - pediatric - discharge ... Geme JW, Schor NF, eds. Nelson Textbook of Pediatrics . 20th ed. Philadelphia, PA: Elsevier; 2016:chap 434. ...

  15. Congenital Heart Information Network

    Science.gov (United States)

    ... heart defects. Important Notice The Congenital Heart Information Network website is temporarily out of service. Please join ... and Uwe Baemayr for The Congenital Heart Information Network Exempt organization under Section 501(c)3. Copyright © ...

  16. Hypertensive heart disease

    Science.gov (United States)

    ... page: //medlineplus.gov/ency/article/000163.htm Hypertensive heart disease To use the sharing features on this page, please enable JavaScript. Hypertensive heart disease refers to heart problems that occur because of ...

  17. Left heart catheterization

    Science.gov (United States)

    Catheterization - left heart ... to help guide the catheters up into your heart and arteries. Dye (sometimes called "contrast") will be ... in the blood vessels that lead to your heart. The catheter is then moved through the aortic ...

  18. Right heart ventriculography

    Science.gov (United States)

    Angiography - right heart ... moved forward into the right side of the heart. As the catheter is advanced, the doctor can ... is injected into the right side of the heart. It helps the cardiologist determine the size and ...

  19. Congenital heart disease

    Science.gov (United States)

    Congenital heart disease (CHD) is a problem with the heart's structure and function that is present at birth. ... Fraser CD, Kane LC. Congenital heart disease. In: Townsend CM Jr, ... Sabiston Textbook of Surgery: The Biological Basis of Modern ...

  20. Finding your innovation sweet spot.

    Science.gov (United States)

    Goldenberg, Jacob; Horowitz, Roni; Levav, Amnon; Mazursky, David

    2003-03-01

    Most new product ideas are either uninspired or impractical. So how can developers hit the innovation sweet spot--far enough from existing products to attract real interest but close enough that they are feasible to make and market? They can apply five innovation patterns that manipulate existing components of a product and its immediate environment to come up with something both ingenious and viable, say the authors. The subtraction pattern works by removing product components, particularly those that seem desirable or indispensable. Think of the legless high chair that attaches to the kitchen table. The multiplication pattern makes one or more copies of an existing component, then alters those copies in some important way. For example, the Gillette double-bladed razor features a second blade that cuts whiskers at a slightly different angle. By dividing an existing product into its component parts--the division pattern--you can see something that was an integrated whole in an entirely different light. Think of the modern home stereo--it has modular speakers, tuners, and CD and tape players, which allow users to customize their sound systems. The task unification pattern involves assigning a new task to an existing product element or environmental attribute, thereby unifying two tasks in a single component. An example is the defrosting filament in an automobile windshield that also serves as a radio antenna. Finally, the attribute dependency pattern alters or creates the dependent relationships between a product and its environment. For example, by creating a dependent relationship between lens color and external lighting conditions, eyeglass developers came up with a lens that changes color when exposed to sunlight.

  1. Information Warfare: Defining the Legal Response to An Attack

    National Research Council Canada - National Science Library

    Pottorff, James

    1999-01-01

    This paper discusses the difficulty in determining whether an information warfare attack, such as a computer virus, can be treated as an "armed attack" for purposes of national defense under the United Nations charter. As the U.S...

  2. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    Directory of Open Access Journals (Sweden)

    Khaled Elleithy

    2005-02-01

    Full Text Available A denial of service attack (DOS is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack will be simulated against a Microsoft Windows 95 computer. The TCP SYN Flood attack will be simulated against a Microsoft Windows 2000 IIS FTP Server. Distributed DOS will be demonstrated by simulating a distribution zombie program that will carry the Ping of Death attack. This paper will demonstrate the potential damage from DOS attacks and analyze the ramifications of the damage.

  3. Cyber Attacks During the War on Terrorism: A Predictive Analysis

    National Research Council Canada - National Science Library

    Vatis, Michael

    2001-01-01

    .... Just as the terrorist attacks of September 11, 2001 defied what many thought possible, cyber attacks could escalate in response to United States and allied retaliatory measures against the terrorists...

  4. Plasma spot welding of ferritic stainless steels

    International Nuclear Information System (INIS)

    Lesnjak, A.; Tusek, J.

    2002-01-01

    Plasma spot wedding of ferritic stainless steels studied. The study was focused on welding parameters, plasma and shieldings and the optimum welding equipment. Plasma-spot welded overlap joints on a 0.8 mm thick ferritic stainless steel sheet were subjected to a visual examination and mechanical testing in terms of tension-shear strength. Several macro specimens were prepared Plasma spot welding is suitable to use the same gas as shielding gas and as plasma gas , i. e. a 98% Ar/2% H 2 gas mixture. Tension-shear strength of plasma-spot welded joint was compared to that of resistance sport welded joints. It was found that the resistance welded joints withstand a somewhat stronger load than the plasma welded joints due to a large weld sport diameter of the former. Strength of both types of welded joints is approximately the same. (Author) 32 refs

  5. A telemetry experiment on spotted grunter Pomadasys ...

    African Journals Online (AJOL)

    associated fish in South Africa was investigated by conducting a tracking experiment on spotted grunter Pomadasys commersonnii in the East Kleinemonde Estuary. The telemetry equipment comprised two VEMCO V8 transmitters and a ...

  6. Asparagus Beetle and Spotted Asparagus Beetle

    OpenAIRE

    Hodgson, Erin W.; Drost, Dan

    2007-01-01

    Asparagus beetle, Crioceris asparagi, and spotted asparagus beetle, C. duodecimpunctata are leaf beetles in the family Chrysomelidae. These beetles feed exclusively on asparagus and are native to Europe. Asparagus beetle is the more economically injurious of the two species.

  7. Detecting Blind Spot By Using Ultrasonic Sensor

    Directory of Open Access Journals (Sweden)

    T. S. Ajay

    2015-08-01

    Full Text Available Safety remains a top concern for automobile industries and new-car shoppers. Detection of Blind Spots is a major concern for safety issues. So automobiles have been constantly updating their products with new technologies to detect blind spots so that they can add more safety to the vehicle and also reduce the road accidents. Almost 1.5 million people die in road accidents each year. Blind spot of an automobile is the region of the vehicle which cannot be observed properly while looking either through side or rear mirror view. To meet the above requirements this paper describes detecting blind spot by using ultrasonic sensor and controlling the direction of car by automatic steering. The technology embedded in the system is capable of automatically steer the vehicle away from an obstacle if the system determines that a collision is impending or if the vehicle is in the vicinity of our car.

  8. How Many Spots Does a Cheetah Have?

    Science.gov (United States)

    Reed, Kristine M.

    2000-01-01

    Describes first grade students' mathematical investigation of the number of spots on a cheetah. The exploration of counting and estimation strategies that grew from the investigation gives evidence that mathematicians come in all ages. (ASK)

  9. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited...

  10. Two fatal tiger attacks in zoos.

    Science.gov (United States)

    Tantius, Britta; Wittschieber, Daniel; Schmidt, Sven; Rothschild, Markus A; Banaschak, Sibylle

    2016-01-01

    Two captive tiger attacks are presented that took place in Cologne and Münster zoos. Both attacks occurred when the handlers, intent on cleaning the enclosures, entered whilst the tigers accidently retained access to the location, and thus defended their territory against the perceived intruders. Both victims suffered fatal neck injuries from the bites. At Münster, colleagues managed to lure the tiger away from its victim to enable treatment, whilst the Cologne zoo tiger had to be shot in order to allow access to be gained. Whilst it was judged that human error led to the deaths of the experienced zookeepers, the investigation in Münster was closed as no third party was found to be at fault, whereas the Cologne zoo director was initially charged with being negligent. These charges were subsequently dismissed as safety regulations were found to be up to date.

  11. RISK DISCLOSURE AGAINST ATTACK ON CRITICAL INFRASTRUCTURES

    Science.gov (United States)

    Yoshida, Mamoru; Kobayashi, Kiyoshi

    This paper analyzes the government's defensive and disclosure strategies to reduce the damage caused by terrorists that attack critical infrastructures using subjective game theory. The government recognizes a terrorist as a hidden opponent and the government's decision making about the policies against terror attacks depends on the belief about the existence of terrorist. In addition, it is not necessarily true that the government and the terrorist play the common game and make their decisions. Considering these points, the paper formulates the model in which the government and the terrorist formulate the subjective games respectively, and they induce the strategies using the equilibriums of their subjective games. The paper concluded that the government's disclosure about the implementation of the countermeasure, rather than the disclosure of warning level related with the belief about the existence of terrorist, brings about the higher increment of the subjective payoffs of the government.

  12. Marine microalgae attack and feed on metazoans

    DEFF Research Database (Denmark)

    Berge, Terje; Poulsen, Louise K.; Moldrup, Morten

    2012-01-01

    Free-living microalgae from the dinoflagellate genus Karlodinium are known to formmassive blooms in eutrophic coastal waters worldwide and are often associated with fish kills. Natural bloom populations, recently shown to consist of the two mixotrophic and toxic species Karlodinium armiger...... and Karlodinium veneficum have caused fast paralysis and mortality of finfish and copepods in the laboratory, and have been associated with reduced metazooplankton biomass in-situ. Here we show that a strain of K. armiger (K-0688) immobilises the common marine copepod Acartia tonsa in a densitydependent manner...... and collectively ingests the grazer to promote its own growth rate. In contrast, four strains of K. veneficum did not attack or affect the motility and survival of the copepods. Copepod immobilisation by the K. armiger strain was fast (within 15min) and caused by attacks of swarming cells, likely through...

  13. Cascade-based attacks on complex networks

    Science.gov (United States)

    Motter, Adilson E.; Lai, Ying-Cheng

    2002-12-01

    We live in a modern world supported by large, complex networks. Examples range from financial markets to communication and transportation systems. In many realistic situations the flow of physical quantities in the network, as characterized by the loads on nodes, is important. We show that for such networks where loads can redistribute among the nodes, intentional attacks can lead to a cascade of overload failures, which can in turn cause the entire or a substantial part of the network to collapse. This is relevant for real-world networks that possess a highly heterogeneous distribution of loads, such as the Internet and power grids. We demonstrate that the heterogeneity of these networks makes them particularly vulnerable to attacks in that a large-scale cascade may be triggered by disabling a single key node. This brings obvious concerns on the security of such systems.

  14. Research About Attacks Over Cloud Environment

    Directory of Open Access Journals (Sweden)

    Li Jie

    2017-01-01

    Full Text Available Cloud computing is expected to continue expanding in the next few years and people will start to see some of the following benefits in their real lives. Security of cloud computing environments is the set of control-based technologies and policies absolute to adhere regulatory compliance rules and protect information data applications and infrastructure related with cloud use. In this paper we suggest a model to estimating the cloud computing security and test the services provided to users. The simulator NG-Cloud Next Generation Secure Cloud Storage is used and modified to administer the proposed model. This implementation achieved security functions potential attacks as defined in the proposed model. Finally we also solve some attacks over cloud computing to provide the security and safety of the cloud.

  15. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...

  16. White-centred retinal haemorrhages (Roth spots).

    OpenAIRE

    Ling, R.; James, B.

    1998-01-01

    Roth spots (white-centred retinal haemorrhages) were classically described as septic emboli lodged in the retina of patients with subacute bacterial endocarditis. Indeed many have considered Roth spots pathognomonic for this condition. More recent histological evidence suggests, however, that they are not foci of bacterial abscess. Instead, they are nonspecific and may be found in many other diseases. A review of the histology and the pathogenesis of these white-centred haemorrhages will be p...

  17. X-ray spot film device

    International Nuclear Information System (INIS)

    1981-01-01

    Improvements are described in an X-ray spot film device which is used in conjunction with an X-ray table to make a selected number of radiographic exposures on a single film and to perform fluoroscopic examinations. To date, the spot film devices consist of two X-ray field defining masks, one of which is moved manually. The present device is more convenient to use and speeds up the procedure. (U.K.)

  18. Target Heart Rates

    Science.gov (United States)

    ... Check Recipe Certification Program Nutrition Requirements Heart-Check Professional Resources Contact the Heart-Check Certification Program Simple Cooking and Recipes Dining Out Choosing a Restaurant Deciphering ...

  19. Alcohol and Heart Health

    Science.gov (United States)

    ... Check Recipe Certification Program Nutrition Requirements Heart-Check Professional Resources Contact the Heart-Check Certification Program Simple Cooking and Recipes Dining Out Choosing a Restaurant Deciphering ...

  20. Caffeine and Heart Disease

    Science.gov (United States)

    ... Check Recipe Certification Program Nutrition Requirements Heart-Check Professional Resources Contact the Heart-Check Certification Program Simple Cooking and Recipes Dining Out Choosing a Restaurant Deciphering ...

  1. Protein and Heart Health

    Science.gov (United States)

    ... Check Recipe Certification Program Nutrition Requirements Heart-Check Professional Resources Contact the Heart-Check Certification Program Simple Cooking and Recipes Dining Out Choosing a Restaurant Deciphering ...

  2. Heart failure - medicines

    Science.gov (United States)

    CHF - medicines; Congestive heart failure - medicines; Cardiomyopathy - medicines; HF - medicines ... You will need to take most of your heart failure medicines every day. Some medicines are taken ...

  3. Fighting Through a Logistics Cyber Attack

    Science.gov (United States)

    2015-06-19

    cumulative cost of cyber-attacks was more than the combined global black market cost of cocaine, heroin and marijuana. These alarming figures raised...the country to its knees. The Luftwaffe was uncontested in the Battle of Britain until radar’s ability to detect inbound aircraft provided the...manifest information in IGC and provides inbound passenger manifest data to the aerial port of debarkation (APOD) and other receiving activities for

  4. Are blockchains immune to all malicious attacks?

    OpenAIRE

    Xu, Jennifer J.

    2016-01-01

    Background: In recent years, blockchain technology has attracted considerable attention. It records cryptographic transactions in a public ledger that is difficult to alter and compromise because of the distributed consensus. As a result, blockchain is believed to resist fraud and hacking. Results: This work explores the types of fraud and malicious activities that can be prevented by blockchain technology and identifies attacks to which blockchain remains vulnerable. Conclusions: This study ...

  5. An Explanation of Nakamoto's Analysis of Double-spend Attacks

    OpenAIRE

    Ozisik, A. Pinar; Levine, Brian Neil

    2017-01-01

    The fundamental attack against blockchain systems is the double-spend attack. In this tutorial, we provide a very detailed explanation of just one section of Satoshi Nakamoto's original paper where the attack's probability of success is stated. We show the derivation of the mathematics relied upon by Nakamoto to create a model of the attack. We also validate the model with a Monte Carlo simulation, and we determine which model component is not perfect.

  6. Modeling deflagration waves out of hot spots

    Science.gov (United States)

    Partom, Yehuda

    2017-01-01

    It is widely accepted that shock initiation and detonation of heterogeneous explosives comes about by a two-step process known as ignition and growth. In the first step a shock sweeping through an explosive cell (control volume) creates hot spots that become ignition sites. In the second step, deflagration waves (or burn waves) propagate out of those hot spots and transform the reactant in the cell into reaction products. The macroscopic (or average) reaction rate of the reactant in the cell depends on the speed of those deflagration waves and on the average distance between neighboring hot spots. Here we simulate the propagation of deflagration waves out of hot spots on the mesoscale in axial symmetry using a 2D hydrocode, to which we add heat conduction and bulk reaction. The propagation speed of the deflagration waves may depend on both pressure and temperature. It depends on pressure for quasistatic loading near ambient temperature, and on temperature at high temperatures resulting from shock loading. From the simulation we obtain deflagration fronts emanating out of the hot spots. For 8 to 13 GPa shocks, the emanating fronts propagate as deflagration waves to consume the explosive between hot spots. For higher shock levels deflagration waves may interact with the sweeping shock to become detonation waves on the mesoscale. From the simulation results we extract average deflagration wave speeds.

  7. Unblinding the dark matter blind spots

    International Nuclear Information System (INIS)

    Han, Tao; Kling, Felix

    2017-01-01

    The dark matter (DM) blind spots in the Minimal Supersymmetric Standard Model (MSSM) refer to the parameter regions where the couplings of the DM particles to the Z-boson or the Higgs boson are almost zero, leading to vanishingly small signals for the DM direct detections. In this paper, we carry out comprehensive analyses for the DM searches under the blind-spot scenarios in MSSM. Guided by the requirement of acceptable DM relic abundance, we explore the complementary coverage for the theory parameters at the LHC, the projection for the future underground DM direct searches, and the indirect searches from the relic DM annihilation into photons and neutrinos. We find that (i) the spin-independent (SI) blind spots may be rescued by the spin-dependent (SD) direct detection in the future underground experiments, and possibly by the indirect DM detections from IceCube and SuperK neutrino experiments; (ii) the detection of gamma rays from Fermi-LAT may not reach the desirable sensitivity for searching for the DM blind-spot regions; (iii) the SUSY searches at the LHC will substantially extend the discovery region for the blind-spot parameters. As a result, the dark matter blind spots thus may be unblinded with the collective efforts in future DM searches.

  8. Iraqi violence, Saudi attack and further bombings

    Energy Technology Data Exchange (ETDEWEB)

    Anon

    2006-03-15

    Iraq moved closer to all-out civil war following an attack on the Imam Ali al-Hadi mosque in Samarra, one of Shi'i Islam's holiest shrines, on 22nd February. In the days that followed, several hundred Iraqis died in inter-communal violence. Attacks on installations close to the Basrah Oil Terminal were reported. Earlier in the month, the main oil storage facility in Kirkuk was bombed, forcing the Northern Oil Company to shut-in the 0.3 mn bpd field. Oil and electricity supplies in southern Iraq were cut by attacks on installations some 40 miles south of Baghdad. Turkey agreed to resume product exports to Iraq after a deal was agreed on repaying Iraqi debts of $1 bn to Turkish suppliers. An official Australian inquiry into illegal payments made under the UN's oil-for-food programme is to investigate allegations involving two Australian-controlled oil firms. (author)

  9. Electrocardiographic exam in female spotted pacas (Cuniculus paca

    Directory of Open Access Journals (Sweden)

    Ricardo A.R. Uscategui

    2016-06-01

    Full Text Available Abstract: Considering the limited physiological information available on neotropical rodents and the importance of this information for pathophysiological and conservation studies of these species, the aim of this study was to evaluate the cardiac electric physiology of healthy captivity spotted pacas (Cuniculus paca under chemical restraint, due to wild nature of these animals. Eleven adult female pacas were evaluated by blood count and biochemical dosage to rule out any associate disease. Each animal was evaluated in three periods every 15 days. After chemical restraint with intramuscular midazolam 0.5mg/kg and ketamine 25mg/kg, animals were subjected to a computerized electrocardiogram, where bipolar (DI, DII and DIII and augmented unipolar leads (aVR, aVL, aVF were obtained. Descriptive statistics were calculated for each parameter and built the confidence interval (CI at significance level of 95%. The electrocardiographic examination was performed without difficult. ECG tracing in DII represents a QRS complex with positive polarity, preceded by a P wave of the same polarity and proceeded by T wave of variable polarity. Heart rate mean was 150±17 bpm, and cardiac electrical axis 33.4±21.9°. All animals showed sinusal rhythm. The ECG recording technique associated with chemical restraint was well tolerated, allowing quick acquisition of reliable ECG tracings with high repeatability, which produced sufficient results to determine the heart rhythm and suggest measures of ECG complexes duration and amplitude.

  10. Spot weld arrangement effects on the fatigue behavior of multi-spot welded joints

    International Nuclear Information System (INIS)

    Hassanifard, Soran; Zehsaz, Mohammad; Esmaeili, Firooz

    2011-01-01

    In the present study, the effects of spot weld arrangements in multi-spot welded joints on the fatigue behavior of the joints are studied. Three different four-spot welded joints are considered: one-row four-spot parallel to the loading direction, one-row four-spot perpendicular to the loading direction and two-row four-spot weld specimens. The experimental fatigue test results reveal that the differences between the fatigue lives of three spot welded types in the low cycle regime are more considerable than those in the high cycle regime. However, all kinds of spot weld specimens have similar fatigue strength when approaching a million cycles. A non-linear finite element analysis is performed to obtain the relative stress gradients, effective distances and notch strength reduction factors based on the volumetric approach. The work here shows that the volumetric approach does a very good job in predicting the fatigue life of the multi-spot welded joints

  11. Predictors of Stroke After Transient Ischemic Attack in Children.

    Science.gov (United States)

    Lehman, Laura L; Watson, Christopher G; Kapur, Kush; Danehy, Amy R; Rivkin, Michael J

    2016-01-01

    Transient ischemic attack (TIA) in children has received far less attention compared with TIA in adults. The risk factors of stroke after TIA in children are relatively unknown. We aimed to determine the percentage of children who have stroke after TIA and the risk factors associated with stroke after TIA. We searched the medical records at Boston Children's Hospital for the year 2010 to find children who were evaluated for TIA to determine associated risk factors of stroke after TIA. We included children who were evaluated in 2009 through 2010 for TIA and had magnetic resonance imaging. We examined follow-up imaging through August 2014 for subsequent stroke. Logistic regression was used to calculate odds ratios for factors in our cohort who are associated with stroke after presentation with TIA. We identified 63 children who experienced a TIA. The mean time of imaging follow-up was 4.5 years after TIA presentation. Of the 63 children, 10 (16%) developed radiological evidence of ischemic cerebral injury within the follow-up period. Four of the 10 (6%) demonstrated diffusion abnormalities on magnetic resonance imaging at TIA presentation, whereas 8 (13%) had a stroke after their TIA. Arteriopathy, female sex, and autoimmune disorders were significantly associated with stroke after TIA. In our cohort of children, stroke occurred after TIA at a rate similar to that seen in adults, but the risk factors for stroke after TIA in children are different. © 2015 American Heart Association, Inc.

  12. Quantitative Attack Tree Analysis via Priced Timed Automata

    NARCIS (Netherlands)

    Kumar, Rajesh; Ruijters, Enno Jozef Johannes; Stoelinga, Mariëlle Ida Antoinette; Sankaranarayanan, Sriram; Vicario, Enrico

    The success of a security attack crucially depends on the resources available to an attacker: time, budget, skill level, and risk appetite. Insight in these dependencies and the most vulnerable system parts is key to providing effective counter measures. This paper considers attack trees, one of the

  13. Pareto Efficient Solution of Attack-Defence Trees

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as

  14. Vulnerability Assessment by Learning Attack Specifications in Graphs

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; Lopes, Raul H.C.

    This paper presents an evolutionary approach for learning attack specifications that describe attack scenarios. The objective is to find vulnerabilities in computer networks which minimise the cost of an attack with maximum impact. Although we focus on Insider Threat, the proposed approach applies

  15. Attacks on the AJPS Mersenne-based cryptosystem

    NARCIS (Netherlands)

    K. de Boer (Koen); L. Ducas (Léo); S. Jeffery (Stacey); R. M. de Wolf (Ronald)

    2018-01-01

    textabstractAggarwal, Joux, Prakash and Santha recently introduced a new potentially quantum-safe public-key cryptosystem, and suggested that a brute-force attack is essentially optimal against it. They consider but then dismiss both Meet-in-the-Middle attacks and LLL-based attacks. Very soon after

  16. 12 CFR 747.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... INVESTIGATIONS Uniform Rules of Practice and Procedure § 747.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any court concerning all or any part of an...

  17. 12 CFR 308.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... PRACTICE RULES OF PRACTICE AND PROCEDURE Uniform Rules of Practice and Procedure § 308.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any...

  18. 12 CFR 19.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... OF PRACTICE AND PROCEDURE Uniform Rules of Practice and Procedure § 19.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any court concerning all...

  19. Limit Asthma Attacks Caused by Colds or Flu

    Science.gov (United States)

    Asthma: Limit asthma attacks caused by colds or flu A cold or the flu can trigger an asthma attack. Here's why — and how to keep your sneeze ... plan. If you notice warning signs of an asthma attack — such as coughing, wheezing, chest tightness or shortness ...

  20. Link-layer Jamming Attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    2004-01-01

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  1. Link-layer jamming attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  2. Regression Nodes: Extending attack trees with data from social sciences

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    In the field of security, attack trees are often used to assess security vulnerabilities probabilistically in relation to multi-step attacks. The nodes are usually connected via AND-gates, where all children must be executed, or via OR-gates, where only one action is necessary for the attack step to

  3. What Can We Learn?--The Algonquin Bear Attack.

    Science.gov (United States)

    Strickland, Dan

    1992-01-01

    Describes a bear attack in Algonquin Park in Lake Opeongo (Canada) in which a man and woman were killed. Hypothesizes that the bear deliberately preyed on its victims and concludes that the bear was physically normal. Despite this isolated attack, the chance of being attacked by a black bear when camping is virtually nonexistent. (KS)

  4. Quantitative Verification and Synthesis of Attack-Defence Scenarios Conference

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    Attack-defence trees are a powerful technique for formally evaluating attack-defence scenarios. They represent in an intuitive, graphical way the interaction between an attacker and a defender who compete in order to achieve conflicting objectives. We propose a novel framework for the formal

  5. Modeling and Analysis of Information Attack in Computer Networks

    National Research Council Canada - National Science Library

    Pepyne, David

    2003-01-01

    ... (as opposed to physical and other forms of attack) . Information based attacks are attacks that can be carried out from anywhere in the world, while sipping cappuccino at an Internet cafe' or while enjoying the comfort of a living room armchair...

  6. Take heart!

    CERN Multimedia

    Alizée Dauvergne

    2010-01-01

    Recently, ten new semi-automatic defibrillators were installed at various locations around CERN. This is a preventive measure intended to provide cardiac arrest victims with the best possible response. The first responder could be you!   The Director-General has welcomed the initiative of the Medical Service and Fire Brigade for the installation of ten new semi-automatic defibrillators. You have probably seen them on your way to the restaurant, for example:  brand new semi-automatic defibrillators, ready for an emergency. Housed in a white wall-mounted case, the bright red defibrillators are marked with a white heart symbol crossed by a lightning bolt (see photo). The defibrillator is designed so that anyone can use it. “Anyone can use it, you don’t need to be a health professional,” says Dr Reymond from CERN's Medical Service. Together with the CERN Fire Brigade, he is behind the initiative to have these units put in place. And with good reason, as the unit...

  7. Assessment of damage potential to the TMI-2 lower head due to thermal attack by core debris

    International Nuclear Information System (INIS)

    Cronenberg, A.W.; Behling, S.R.; Broughton, J.M.

    1986-06-01

    Camera inspection of the Three Mile Island Unit 2 (TMI-2) inlet plenum region has shown that approximately 10 to 20 percent of the core material loading may have relocated to the lower plenum. Although vessel integrity was maintained, a question of primary concern is ''how close to vessel failure'' did this accident come. This report summarizes the results of thermal analyses aimed at assessing damage potential to the TMI-2 lower head and attached instrument penetration tubes due to thermal attack by hot core debris. Results indicate that the instrument penetration nozzles could have experienced melt failure at localized hot spot regions, with attendant debris drainage and plugging of the instrument lead tubes. However, only minor direct thermal attack of the vessel liner is predicted

  8. 7 CFR 28.423 - Middling Spotted Color.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Middling Spotted Color. 28.423 Section 28.423... REGULATIONS COTTON CLASSING, TESTING, AND STANDARDS Standards Spotted Cotton § 28.423 Middling Spotted Color. Middling Spotted Color is color which is within the range represented by a set of samples in the custody of...

  9. Relationship between hot spot residues and ligand binding hot spots in protein-protein interfaces.

    Science.gov (United States)

    Zerbe, Brandon S; Hall, David R; Vajda, Sandor; Whitty, Adrian; Kozakov, Dima

    2012-08-27

    In the context of protein-protein interactions, the term "hot spot" refers to a residue or cluster of residues that makes a major contribution to the binding free energy, as determined by alanine scanning mutagenesis. In contrast, in pharmaceutical research, a hot spot is a site on a target protein that has high propensity for ligand binding and hence is potentially important for drug discovery. Here we examine the relationship between these two hot spot concepts by comparing alanine scanning data for a set of 15 proteins with results from mapping the protein surfaces for sites that can bind fragment-sized small molecules. We find the two types of hot spots are largely complementary; the residues protruding into hot spot regions identified by computational mapping or experimental fragment screening are almost always themselves hot spot residues as defined by alanine scanning experiments. Conversely, a residue that is found by alanine scanning to contribute little to binding rarely interacts with hot spot regions on the partner protein identified by fragment mapping. In spite of the strong correlation between the two hot spot concepts, they fundamentally differ, however. In particular, while identification of a hot spot by alanine scanning establishes the potential to generate substantial interaction energy with a binding partner, there are additional topological requirements to be a hot spot for small molecule binding. Hence, only a minority of hot spots identified by alanine scanning represent sites that are potentially useful for small inhibitor binding, and it is this subset that is identified by experimental or computational fragment screening.

  10. Unified communications forensics anatomy of common UC attacks

    CERN Document Server

    Grant, Nicholas Mr

    2013-01-01

    Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: analysis of forensic artifacts in common UC attacks an in-depth look at established UC technologies and attack exploits hands-on understanding of UC attack vectors and associated countermeasures

  11. Quantitative Verification and Synthesis of Attack-Defence Scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    2016-01-01

    analysis of quantitative properties of complex attack-defence scenarios, using an extension of attack-defence trees which models temporal ordering of actions and allows explicit dependencies in the strategies adopted by attackers and defenders. We adopt a game-theoretic approach, translating attack...... which guarantee or optimise some quantitative property, such as the probability of a successful attack, the expected cost incurred, or some multi-objective trade-off between the two. We implement our approach, building upon the PRISM-games model checker, and apply it to a case study of an RFID goods...

  12. SPOTTED STAR LIGHT CURVES WITH ENHANCED PRECISION

    International Nuclear Information System (INIS)

    Wilson, R. E.

    2012-01-01

    The nearly continuous timewise coverage of recent photometric surveys is free of the large gaps that compromise attempts to follow starspot growth and decay as well as motions, thereby giving incentive to improve computational precision for modeled spots. Due to the wide variety of star systems in the surveys, such improvement should apply to light/velocity curve models that accurately include all the main phenomena of close binaries and rotating single stars. The vector fractional area (VFA) algorithm that is introduced here represents surface elements by small sets of position vectors so as to allow accurate computation of circle-triangle overlap by spherical geometry. When computed by VFA, spots introduce essentially no noticeable scatter in light curves at the level of one part in 10,000. VFA has been put into the Wilson-Devinney light/velocity curve program and all logic and mathematics are given so as to facilitate entry into other such programs. Advantages of precise spot computation include improved statistics of spot motions and aging, reduced computation time (intrinsic precision relaxes needs for grid fineness), noise-free illustration of spot effects in figures, and help in guarding against false positives in exoplanet searches, where spots could approximately mimic transiting planets in unusual circumstances. A simple spot growth and decay template quantifies time profiles, and specifics of its utilization in differential corrections solutions are given. Computational strategies are discussed, the overall process is tested in simulations via solutions of synthetic light curve data, and essential simulation results are described. An efficient time smearing facility by Gaussian quadrature can deal with Kepler mission data that are in 30 minute time bins.

  13. Advanced Heart Failure

    Science.gov (United States)

    ... Artery Disease Venous Thromboembolism Aortic Aneurysm More Advanced Heart Failure Updated:May 9,2017 When heart failure (HF) ... Making This content was last reviewed May 2017. Heart Failure • Home • About Heart Failure • Causes and Risks for ...

  14. Hybrid attacks on model-based social recommender systems

    Science.gov (United States)

    Yu, Junliang; Gao, Min; Rong, Wenge; Li, Wentao; Xiong, Qingyu; Wen, Junhao

    2017-10-01

    With the growing popularity of the online social platform, the social network based approaches to recommendation emerged. However, because of the open nature of rating systems and social networks, the social recommender systems are susceptible to malicious attacks. In this paper, we present a certain novel attack, which inherits characteristics of the rating attack and the relation attack, and term it hybrid attack. Furtherly, we explore the impact of the hybrid attack on model-based social recommender systems in multiple aspects. The experimental results show that, the hybrid attack is more destructive than the rating attack in most cases. In addition, users and items with fewer ratings will be influenced more when attacked. Last but not the least, the findings suggest that spammers do not depend on the feedback links from normal users to become more powerful, the unilateral links can make the hybrid attack effective enough. Since unilateral links are much cheaper, the hybrid attack will be a great threat to model-based social recommender systems.

  15. Machine Learning Methods for Attack Detection in the Smart Grid.

    Science.gov (United States)

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.

  16. False Positive and False Negative Effects on Network Attacks

    Science.gov (United States)

    Shang, Yilun

    2018-01-01

    Robustness against attacks serves as evidence for complex network structures and failure mechanisms that lie behind them. Most often, due to detection capability limitation or good disguises, attacks on networks are subject to false positives and false negatives, meaning that functional nodes may be falsely regarded as compromised by the attacker and vice versa. In this work, we initiate a study of false positive/negative effects on network robustness against three fundamental types of attack strategies, namely, random attacks (RA), localized attacks (LA), and targeted attack (TA). By developing a general mathematical framework based upon the percolation model, we investigate analytically and by numerical simulations of attack robustness with false positive/negative rate (FPR/FNR) on three benchmark models including Erdős-Rényi (ER) networks, random regular (RR) networks, and scale-free (SF) networks. We show that ER networks are equivalently robust against RA and LA only when FPR equals zero or the initial network is intact. We find several interesting crossovers in RR and SF networks when FPR is taken into consideration. By defining the cost of attack, we observe diminishing marginal attack efficiency for RA, LA, and TA. Our finding highlights the potential risk of underestimating or ignoring FPR in understanding attack robustness. The results may provide insights into ways of enhancing robustness of network architecture and improve the level of protection of critical infrastructures.

  17. Optimal counterterrorism and the recruitment effect of large terrorist attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2011-01-01

    We analyze a simple dynamic model of the interaction between terrorists and authorities. Our primary aim is to study optimal counterterrorism and its consequences when large terrorist attacks lead to a temporary increase in terrorist recruitment. First, we show that an increase in counterterrorism...... makes it more likely that terrorist cells plan small rather than large attacks and therefore may increase the probability of a successful attack. Analyzing optimal counterterrorism we see that the recruitment effect makes authorities increase the level of counterterrorism after large attacks. Therefore......, in periods following large attacks a new attack is more likely to be small compared to other periods. Finally, we analyze the long-run consequences of the recruitment effect. We show that it leads to more counterterrorism, more small attacks, and a higher sum of terrorism damage and counterterrorism costs...

  18. Adaptive optimisation-offline cyber attack on remote state estimator

    Science.gov (United States)

    Huang, Xin; Dong, Jiuxiang

    2017-10-01

    Security issues of cyber-physical systems have received increasing attentions in recent years. In this paper, deception attacks on the remote state estimator equipped with the chi-squared failure detector are considered, and it is assumed that the attacker can monitor and modify all the sensor data. A novel adaptive optimisation-offline cyber attack strategy is proposed, where using the current and previous sensor data, the attack can yield the largest estimation error covariance while ensuring to be undetected by the chi-squared monitor. From the attacker's perspective, the attack is better than the existing linear deception attacks to degrade the system performance. Finally, some numerical examples are provided to demonstrate theoretical results.

  19. Inflamação sistêmica causada pela periodontite crônica em pacientes vítimas de ataque cardíaco isquêmico agudo Systemic inflammation caused by chronic periodontitis in acute ischemic heart attack patients

    Directory of Open Access Journals (Sweden)

    Fernando José de Oliveira

    2010-03-01

    Full Text Available OBJETIVO: Processos inflamatórios e infecciosos mediados por bactérias em sítios distantes têm sido descritos como fator de risco à doença coronariana isquêmica aguda (DCIA. MÉTODOS: Cento e oitenta e um pacientes com DCIA, com e sem periodontites crônicas, foram incluídos neste estudo. Os pacientes foram admitidos no HC da UNICAMP e estratificados em três grupos: grupo 1 - pacientes com periodontite crônica grave (31 homens e 19 mulheres; média de idade 55,1 ± 11,29 anos; grupo 2 - pacientes com periodontite crônica leve (40 homens e 28 mulheres; média de idade 54,8 ± 10,37 anos; grupo 3 - pacientes desdentados (43 homens e 20 mulheres; média de idade 67,5 ± 8,55 anos. Amostras sanguíneas foram coletadas para mensurar os perfis lipídico, hematológico e glicêmico. Além disso, biópsias de 17 artérias coronárias com aterosclerose e igual número de artérias mamárias internas sem degeneração aterosclerótica no grupo 1 foram investigadas. Para análise estatística utilizou-se a análise de variância (ANOVA e o teste de Scheffé para comparações múltiplas. RESULTADOS: Triglicérides e LDL estavam elevados no grupo 1 em relação ao grupo 2. O HDL apresentou-se reduzido em 20% dos pacientes do grupo 1, e em 8% nos desdentados. A glicemia estava elevada no grupo 1. DNA de bactérias periodontais foram detectados em 58,8% das artérias coronárias. CONCLUSÕES: Pacientes com DCIA e periodontite crônica grave podem apresentar perfil lipídico alterado, como também microorganismos associados com as periodontites crônicas graves podem permear dentro de vasos coronarianos.OBJECTIVE: Infectious and inflammatory processes mediated by bacteria in distant sites have been described as a risk factor for acute ischemic heart disease (AIHD. METHODS: One hundred one patients with AIHD with and without chronic periodontitis (CP were included in this study. Patients were admitted to the HC UNICAMP and stratified into three

  20. Molecular and histological characterization of age spots

    Science.gov (United States)

    Choi, Wonseon; Yin, Lanlan; Smuda, Christoph; Batzer, Jan; Hearing, Vincent J.; Kolbe, Ludger

    2016-01-01

    Age spots, also called solar lentigines and lentigo senilis, are light brown to black pigmented lesions of various sizes that typically develop in chronically sun-exposed skin. It is well known that age spots are strongly related to chronic sun exposure and are associated with photodamage and an increased risk for skin cancer, however, the mechanism(s) underlying their development remain poorly understood. We used immunohistochemical analysis and microarray analysis to investigate the processes involved in their formation, focusing on specific markers associated with the functions and proliferation of melanocytes and keratinocytes. A total of 193 genes were differentially expressed in age spots but melanocyte pigment genes were not among them. The increased expression of keratins 5 and 10, markers of basal and suprabasal keratinocytes, respectively, in age spots suggests that the increased proliferation of basal keratinocytes combined with the decreased turnover of suprabasal keratinocytes leads to the exaggerated formation of rete ridges in lesional epidermis which in turn disrupts the normal processing of melanin upwards from the basal layer. Based on our results, we propose a model for the development of age spots that explains the accumulation of melanin and the development of extensive rete ridges in those hyperpigmented lesions. PMID:27621222

  1. Plutonium spot of mixed oxide fuel, 2

    International Nuclear Information System (INIS)

    Suzuki, Yukio; Maruishi, Yoshihiro; Satoh, Masaichi; Aoki, Toshimasa; Muto, Tadashi

    1974-01-01

    In a fast reactor, the specification for the homogeneity of plutonium in plutonium-uranium mixed-oxide fuel is mainly dependent on the nuclear characteristics, whereas in a thermal reactor, on thermal characteristics. This homogeneity is measured by autoradiography as the plutonium spot size of the specimens which are arbitrarily chosen fuel pellets from a lot. Although this is a kind of random sampling, it is difficult to apply this method to conventional digital standards including JIS standards. So a special sampling inspection method was studied. First, it is assumed that the shape of plutonium spots is spherical, the size distribution is logarithmic normal, and the standard deviation is constant. Then, if standard deviation and mean spot size are given, the logarithmic normal distribution is decided unitarily, and further if the total weight of plutonium spots for a lot of pellets is known, the number of the spots (No) which does not conform to the specification can be obtained. Then, the fraction defective is defined as No devided by the number of pellets per lot. As to the lot with such fraction defective, the acceptance coefficient of the lot was obtained through calculation, in which the number of sampling, acceptable diameter limit observed and acceptable conditions were used as parameters. (Tai, I.)

  2. Cyber Attacks and Energy Infrastructures: Anticipating Risks

    International Nuclear Information System (INIS)

    Desarnaud, Gabrielle

    2017-01-01

    This study analyses the likelihood of cyber-attacks against European energy infrastructures and their potential consequences, particularly on the electricity grid. It also delivers a comparative analysis of measures taken by different European countries to protect their industries and collaborate within the European Union. The energy sector experiences an unprecedented digital transformation upsetting its activities and business models. Our energy infrastructures, sometimes more than a decade old and designed to remain functional for many years to come, now constantly interact with light digital components. The convergence of the global industrial system with the power of advanced computing and analytics reveals untapped opportunities at every step of the energy value chain. However, the introduction of digital elements in old and unprotected industrial equipment also exposes the energy industry to the cyber risk. One of the most compelling example of the type of threat the industry is facing, is the 2015 cyber-attack on the Ukraine power grid, which deprived about 200 000 people of electricity in the middle of the winter. The number and the level of technical expertise of cyber-attacks rose significantly after the discovery of the Stuxnet worm in the network of Natanz uranium enrichment site in 2010. Energy transition policies and the growing integration of renewable sources of energy will intensify this tendency, if cyber security measures are not part of the design of our future energy infrastructures. Regulators try to catch up and adapt, like in France where the authorities collaborate closely with the energy industry to set up a strict and efficient regulatory framework, and protect critical operators. This approach is adopted elsewhere in Europe, but common measures applicable to the whole European Union are essential to protect strongly interconnected energy infrastructures against a multiform threat that defies frontiers

  3. LAN attack detection using Discrete Event Systems.

    Science.gov (United States)

    Hubballi, Neminath; Biswas, Santosh; Roopa, S; Ratti, Ritesh; Nandi, Sukumar

    2011-01-01

    Address Resolution Protocol (ARP) is used for determining the link layer or Medium Access Control (MAC) address of a network host, given its Internet Layer (IP) or Network Layer address. ARP is a stateless protocol and any IP-MAC pairing sent by a host is accepted without verification. This weakness in the ARP may be exploited by malicious hosts in a Local Area Network (LAN) by spoofing IP-MAC pairs. Several schemes have been proposed in the literature to circumvent these attacks; however, these techniques either make IP-MAC pairing static, modify the existing ARP, patch operating systems of all the hosts etc. In this paper we propose a Discrete Event System (DES) approach for Intrusion Detection System (IDS) for LAN specific attacks which do not require any extra constraint like static IP-MAC, changing the ARP etc. A DES model is built for the LAN under both a normal and compromised (i.e., spoofed request/response) situation based on the sequences of ARP related packets. Sequences of ARP events in normal and spoofed scenarios are similar thereby rendering the same DES models for both the cases. To create different ARP events under normal and spoofed conditions the proposed technique uses active ARP probing. However, this probing adds extra ARP traffic in the LAN. Following that a DES detector is built to determine from observed ARP related events, whether the LAN is operating under a normal or compromised situation. The scheme also minimizes extra ARP traffic by probing the source IP-MAC pair of only those ARP packets which are yet to be determined as genuine/spoofed by the detector. Also, spoofed IP-MAC pairs determined by the detector are stored in tables to detect other LAN attacks triggered by spoofing namely, man-in-the-middle (MiTM), denial of service etc. The scheme is successfully validated in a test bed. Copyright © 2010 ISA. Published by Elsevier Ltd. All rights reserved.

  4. Key Recovery Attacks on Recent Authenticated Ciphers

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Dobraunig, Christoph; Eichlseder, Maria

    2014-01-01

    In this paper, we cryptanalyze three authenticated ciphers: AVALANCHE, Calico, and RBS. While the former two are contestants in the ongoing international CAESAR competition for authenticated encryption schemes, the latter has recently been proposed for lightweight applications such as RFID systems...... and wireless networks. All these schemes use well-established and secure components such as the AES, Grain-like NFSRs, ChaCha and SipHash as their building blocks. However, we discover key recovery attacks for all three designs, featuring square-root complexities. Using a key collision technique, we can...

  5. Twisted Polynomials and Forgery Attacks on GCM

    DEFF Research Database (Denmark)

    Abdelraheem, Mohamed Ahmed A. M. A.; Beelen, Peter; Bogdanov, Andrey

    2015-01-01

    Polynomial hashing as an instantiation of universal hashing is a widely employed method for the construction of MACs and authenticated encryption (AE) schemes, the ubiquitous GCM being a prominent example. It is also used in recent AE proposals within the CAESAR competition which aim at providing...... in an improved key recovery algorithm. As cryptanalytic applications of our twisted polynomials, we develop the first universal forgery attacks on GCM in the weak-key model that do not require nonce reuse. Moreover, we present universal weak-key forgeries for the nonce-misuse resistant AE scheme POET, which...

  6. Competitive Reactions to Advertising and Promotion Attacks

    OpenAIRE

    Jan-Benedict E. M. Steenkamp; Vincent R. Nijs; Dominique M. Hanssens; Marnik G. Dekimpe

    2005-01-01

    How do competitors react to each other's price-promotion and advertising attacks? What are the reasons for the observed reaction behavior? We answer these questions by performing a large-scale empirical study on the short-run and long-run reactions to promotion and advertising shocks in over 400 consumer product categories over a four-year time span. Our results clearly show that the most predominant form of competitive response is passive in nature. When a reaction does occur, it is usually ...

  7. Identification of Antipathogenic Bacterial Coral Symbionts Against Porites Ulcerative White Spots Disease

    Science.gov (United States)

    Sa'adah, Nor; Sabdono, Agus; Diah Permata Wijayanti, dan

    2018-02-01

    Coral reef ecosystems are ecosystems that are vulnerable and susceptible to damage due to the exploitation of ocean resources. One of the factors that cause coral damage is the disease that attacks the coral. Porites Ulcerative White Spots (PUWS) is a coral disease found in Indonesia and attacks the coral genera Porites allegedly caused by pathogenic microbial attacks. The purpose of this study was to identify the symbiotic bacteria on healthy coral that have antipatogenic potency against PUWS. The method used in this research was descriptive explorative. Sampling was done in Kemujan Island, Karimunjawa. Bacteria were isolated from healthy coral and coral affected by PUWS disease. Streak method was used to purify coral bacteria, while overlay and agar diffusion were used to test antipathogenic activity. Bacterial identification was carried out based on polyphasic approach. The results of this study showed that coral bacterial symbionts have antipathogenic activity against PUWS disease. The selected bacteria NM 1.2, NM 1.3 and KPSH 5. NM1.2 were closely related to Pseudoalteromonas piscicida, Pseudoalteromonas flavipulchra and Bacillus flexus, respectively.

  8. Spots on AG Virginis - paradigm or panacea?

    International Nuclear Information System (INIS)

    Bell, S.A.; Rainger, P.P.; Hilditch, R.W.

    1990-01-01

    New photometric and spectroscopic observations of the eclipsing binary AG Vir are presented. Medium-resolution spectroscopy has allowed the measurement of velocities for the secondary component for the first time. The V light curve shows many of the features seen in previous studies of this system. A full analysis of the spectroscopic and photometric data has been made which suggests that the system is either in a marginal state of contact or a deep-contact configuration depending on the type of spot model invoked. AG Vir constitutes an excellent example of the expected manifestations of spot activity on a light curve. It also demonstrates the ease with which the spot phenomenon can be invoked to explain the appearance of a light curve and to provide conflicting results. (author)

  9. How much extra spot gas is there?

    International Nuclear Information System (INIS)

    Bros, Th.

    2007-01-01

    With the increase of European gas demand and the sharp decrease of local supply, security of supply is becoming an ever greater issue. However, liberalization tilts the traditional equilibrium based on long term 'take or pay' contracts between big suppliers and national distribution companies. Today, buying gas on the spot market is becoming more and more important to balance supply portfolio with a fast moving market share. But the way gas spot markets are operating is not well documented. It is very difficult to assess its impact on the European security of supply. Therefore, the aim of this article is to evaluate the amount of 'spot' liquefied natural gas (LNG) that could be found in case of a major supply disruption in pipe gas delivered to Europe

  10. Laser Spot Center Detection and Comparison Test

    Science.gov (United States)

    Zhu, Jun; Xu, Zhengjie; Fu, Deli; Hu, Cong

    2018-04-01

    High efficiency and precision of the pot center detection are the foundations of avionics instrument navigation and optics measurement basis for many applications. It has noticeable impact on overall system performance. Among them, laser spot detection is very important in the optical measurement technology. In order to improve the low accuracy of the spot center position, the algorithm is improved on the basis of the circle fitting. The pretreatment is used by circle fitting, and the improved adaptive denoising filter for TV repair technology can effectively improves the accuracy of the spot center position. At the same time, the pretreatment and de-noising can effectively reduce the influence of Gaussian white noise, which enhances the anti-jamming capability.

  11. PREDICTING RELEVANT EMPTY SPOTS IN SOCIAL INTERACTION

    Institute of Scientific and Technical Information of China (English)

    Yoshiharu MAENO; Yukio OHSAWA

    2008-01-01

    An empty spot refers to an empty hard-to-fill space which can be found in the records of the social interaction, and is the clue to the persons in the underlying social network who do not appear in the records. This contribution addresses a problem to predict relevant empty spots in social interaction. Homogeneous and inhomogeneous networks are studied as a model underlying the social interaction. A heuristic predictor function method is presented as a new method to address the problem. Simulation experiment is demonstrated over a homogeneous network. A test data set in the form of market baskets is generated from the simulated communication. Precision to predict the empty spots is calculated to demonstrate the performance of the presented method.

  12. [Rocky Mountain spotted fever in Brazil].

    Science.gov (United States)

    del Sá DelFiol, Fernando; Junqueira, Fábio Miranda; da Rocha, Maria Carolina Pereira; de Toledo, Maria Inês; Filho, Silvio Barberato

    2010-06-01

    Although the number of confirmed cases of spotted fever has been declining in Brazil since 2005, the mortality rate (20% to 30%) is still high in comparison to other countries. This high mortality rate is closely related to the difficulty in making the diagnosis and starting the correct treatment. Only two groups of antibiotics have proven clinical effectiveness against spotted fever: chloramphenicol and tetracyclines. Until recently, the use of tetracyclines was restricted to adults because of the associated bone and tooth changes in children. Recently, however, the American Academy of Pediatrics and various researchers have recommended the use of doxycycline in children. In more severe cases, chloramphenicol injections are often preferred in Brazil because of the lack of experience with injectable tetracycline. Since early diagnosis and the adequate drug treatment are key to a good prognosis, health care professionals must be better prepared to recognize and treat spotted fever.

  13. Dolichoectasia and Small Vessel Disease in Young Patients With Transient Ischemic Attack and Stroke.

    Science.gov (United States)

    Thijs, Vincent; Grittner, Ulrike; Fazekas, Franz; McCabe, Dominick J H; Giese, Anne-Katrin; Kessler, Christof; Martus, Peter; Norrving, Bo; Ringelstein, Erich Bernd; Schmidt, Reinhold; Tanislav, Christian; Putaala, Jukka; Tatlisumak, Turgut; von Sarnowski, Bettina; Rolfs, Arndt; Enzinger, Christian

    2017-09-01

    We evaluated whether basilar dolichoectasia is associated with markers of cerebral small vessel disease in younger transient ischemic attack and ischemic stroke patients. We used data from the SIFAP1 study (Stroke in Young Fabry Patients), a large prospective, hospital-based, screening study for Fabry disease in young (ischemic attack/stroke patients in whom detailed clinical data and brain MRI were obtained, and stroke subtyping with TOAST classification (Trial of ORG 10172 in Acute Stroke Treatment) was performed. Dolichoectasia was found in 508 of 3850 (13.2%) of patients. Dolichoectasia was associated with older age (odds ratio per decade, 1.26; 95% confidence interval, 1.09-1.44), male sex (odds ratio, 1.96; 95% confidence interval, 1.59-2.42), and hypertension (odds ratio, 1.39; 95% confidence interval, 1.13-1.70). Dolichoectasia was more common in patients with small infarctions (33.9% versus 29.8% for acute lesions, P =0.065; 29.1% versus 16.5% for old lesions, P ischemic attack and ischemic stroke. URL: http://www.clinicaltrials.gov. Unique identifier: NCT00414583. © 2017 American Heart Association, Inc.

  14. Retrospective evaluation of coyote attacks in dogs: 154 cases (1997-2012).

    Science.gov (United States)

    Frauenthal, Virginia M; Bergman, Philip; Murtaugh, Robert J

    2017-05-01

    To describe the clinical presentation and outcome of known attacks in client-owned dogs caused by the common coyote, Canis latrans. Retrospective observational study. Private referral hospital. One hundred fifty-four client-owned dogs known to be attacked by coyotes. None. Records from a private referral hospital from May 1997 through December 2012 were reviewed. Time of day and month/season of year, signalment, body temperature, heart rate, respiratory rate, body weight, location and severity of wounds inflicted, common injuries, length of hospitalization, necessity of surgical wound repair under anesthesia, antimicrobial use and mortality were recorded. Eighty-six percent of dogs presenting following coyote attack weighed Dogs with bite wounds to the thorax had the highest mortality at 21.3%. Criteria for systemic inflammatory response syndrome (SIRS) based on admission vital signs were met in 58.8% of dogs and the presence of SIRS was significantly associated with mortality (P hernia (9/154; 5.8%), and abdominal penetrating wounds (8/146; 5.5%). Dogs dogs are a problem in Southern California and are associated with substantial morbidity and mortality, especially in dogs with wounds to the thorax. Aggressive management involving surgical wound repair was associated with survival to discharge. © Veterinary Emergency and Critical Care Society 2017.

  15. On Realistically Attacking Tor with Website Fingerprinting

    Directory of Open Access Journals (Sweden)

    Wang Tao

    2016-10-01

    Full Text Available Website fingerprinting allows a local, passive observer monitoring a web-browsing client’s encrypted channel to determine her web activity. Previous attacks have shown that website fingerprinting could be a threat to anonymity networks such as Tor under laboratory conditions. However, there are significant differences between laboratory conditions and realistic conditions. First, in laboratory tests we collect the training data set together with the testing data set, so the training data set is fresh, but an attacker may not be able to maintain a fresh data set. Second, laboratory packet sequences correspond to a single page each, but for realistic packet sequences the split between pages is not obvious. Third, packet sequences may include background noise from other types of web traffic. These differences adversely affect website fingerprinting under realistic conditions. In this paper, we tackle these three problems to bridge the gap between laboratory and realistic conditions for website fingerprinting. We show that we can maintain a fresh training set with minimal resources. We demonstrate several classification-based techniques that allow us to split full packet sequences effectively into sequences corresponding to a single page each. We describe several new algorithms for tackling background noise. With our techniques, we are able to build the first website fingerprinting system that can operate directly on packet sequences collected in the wild.

  16. Recent computer attacks via Instant Messaging

    CERN Multimedia

    IT Department

    2008-01-01

    Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. Several computers at CERN have recently been broken into by attackers who have tricked users of Instant Messaging applications (e.g. MSN, Yahoo Messenger, etc.) into clicking on web links which appeared to come from known contacts. The links appeared to be photos from ‘friends’ and requested software to be installed. In practice, attacker software was installed and the messages did not come from real contacts. In the past such fake messages were mainly sent by email but now a wider range of applications are being targeted, including Instant Messaging. Cybercriminals are making growing use of fake messages to try to trick you into clicking on Web links which will help them to install malicious software on your computer. Anti-virus software cann...

  17. Consciousness in non-epileptic attack disorder.

    Science.gov (United States)

    Reuber, Markus; Kurthen, M

    2011-01-01

    Non-epileptic attack disorder (NEAD) is one of the most important differential diagnoses of epilepsy. Impairment of consciousness is the key feature of non-epileptic attacks (NEAs). The first half of this review summarises the clinical research literature featuring observations relating to consciousness in NEAD. The second half places this evidence in the wider context of the recent discourse on consciousness in neuroscience and the philosophy of mind. We argue that studies of consciousness should not only distinguish between the 'level' and `content' of consciousness but also between 'phenomenal consciousness' (consciousness of states it somehow "feels to be like") and 'access consciousness' (having certain 'higher' cognitive processes at one's disposal). The existing evidence shows that there is a great intra- and interindividual variability of NEA experience. However, in most NEAs phenomenal experience - and, as a precondition for that experience, vigilance or wakefulness - is reduced to a lesser degree than in those epileptic seizures involving impairment of consciousness. In fact, complete loss of "consciousness" is the exception rather than the rule in NEAs. Patients, as well as external observers, may have a tendency to overestimate impairments of consciousness during the seizures.

  18. Command Disaggregation Attack and Mitigation in Industrial Internet of Things

    Directory of Open Access Journals (Sweden)

    Peng Xun

    2017-10-01

    Full Text Available A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1 the command sequence is disordered and (2 disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  19. Command Disaggregation Attack and Mitigation in Industrial Internet of Things.

    Science.gov (United States)

    Xun, Peng; Zhu, Pei-Dong; Hu, Yi-Fan; Cui, Peng-Shuai; Zhang, Yan

    2017-10-21

    A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  20. Volume dips; spot price ranges narrow

    International Nuclear Information System (INIS)

    Anon.

    1994-01-01

    This article is the September 1994 uranium market summary. Volume in the spot concentrates market fell below 1 million lbs U3O8. In total, twelve deals took place compared to 28 deals in August. Of the twelve deals, three took place in the spot concentrates market, two took place in the medium and long-term market, three in the conversion market, and four in the enrichment market. Restricted prices weakened, but unrestricted prices firmed slightly. The enrichment price range narrowed a bit