WorldWideScience

Sample records for treat heart attacks

  1. Heart Attack

    Science.gov (United States)

    ... family history of heart attack race – African Americans, Mexican Americans, Native Americans, and native Hawaiians are at ... Your doctor will prescribe the medicines that are right for you. If you have had a heart ...

  2. Heart Attack

    Science.gov (United States)

    ... properly causes your body's blood sugar levels to rise, increasing your risk of heart attack. Metabolic syndrome. This occurs when you have obesity, high blood pressure and high blood sugar. Having metabolic ...

  3. Heart Attack Recovery FAQs

    Science.gov (United States)

    ... recommendations to make a full recovery. View an animation of a heart attack . Heart Attack Recovery Questions ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  4. Pericarditis - after heart attack

    Science.gov (United States)

    ... include: A previous heart attack Open heart surgery Chest trauma A heart attack that has affected the thickness of your heart muscle Symptoms Symptoms include: Anxiety Chest pain from the swollen pericardium rubbing on the ...

  5. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  6. Heart attack - discharge

    Science.gov (United States)

    ... and lifestyle Cholesterol - drug treatment Controlling your high blood pressure Deep vein thrombosis - discharge Dietary fats explained Fast food tips Heart attack - discharge Heart attack - what to ask your doctor Heart bypass ... pacemaker - discharge High blood pressure - what to ask your doctor How to read ...

  7. Heart Attack Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for heart...

  8. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  9. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  10. Women's Heart Disease: Heart Attack Symptoms

    Science.gov (United States)

    ... of this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter ... most common heart attack symptom in men and women is chest pain or discomfort. However, women also ...

  11. Panic Attack or Heart Attack?

    Science.gov (United States)

    ... When in doubt about symptoms, seek care without delay to rule out heart disease. Heart disease affects your heart's ... which cause you concern, see your doctor without delay and ask for testing to rule out heart disease. 1 Gadolinium side effects could ...

  12. Heart Attack Symptoms in Women

    Science.gov (United States)

    ... fat, cholesterol and other substances (plaque). Watch an animation of a heart attack . Many women think the ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  13. What Is a Heart Attack?

    Science.gov (United States)

    ... medical center. Support from family and friends also can help relieve stress and anxiety. Let your loved ones know how you feel and what they can do to help you. Risk of a Repeat Heart Attack Once ...

  14. Diabetes - preventing heart attack and stroke

    Science.gov (United States)

    Diabetes complications - heart; Coronary artery disease - diabetes; CAD - diabetes; Cerebrovascular disease - diabetes ... People with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure and high ...

  15. Calcium Supplements: A Risk Factor for Heart Attack?

    Science.gov (United States)

    ... factor for heart attack? I've read that calcium supplements may increase the risk of heart attack. ... D. Some doctors think it's possible that taking calcium supplements may increase your risk of a heart ...

  16. Warning Signs of Heart Attack, Stroke and Cardiac Arrest

    Science.gov (United States)

    ... for Heart.org CPR & ECC for Heart.org Shop for Heart.org Causes for Heart.org Advocate ... SIGNS may include breaking out in a cold sweat, nausea or lightheadedness. Learn more about heart attack ...

  17. Fuzzy Expert System for Heart Attack Diagnosis

    Science.gov (United States)

    Hassan, Norlida; Arbaiy, Nureize; Shah, Noor Aziyan Ahmad; Afizah Afif@Afip, Zehan

    2017-08-01

    Heart attack is one of the serious illnesses and reported as the main killer disease. Early prevention is significant to reduce the risk of having the disease. The prevention efforts can be strengthen through awareness and education about risk factor and healthy lifestyle. Therefore the knowledge dissemination is needed to play role in order to distribute and educate public in health care management and disease prevention. Since the knowledge dissemination in medical is important, there is a need to develop a knowledge based system that can emulate human intelligence to assist decision making process. Thereby, this study utilized hybrid artificial intelligence (AI) techniques to develop a Fuzzy Expert System for Diagnosing Heart Attack Disease (HAD). This system integrates fuzzy logic with expert system, which helps the medical practitioner and people to predict the risk and as well as diagnosing heart attack based on given symptom. The development of HAD is expected not only providing expert knowledge but potentially become one of learning resources to help citizens to develop awareness about heart-healthy lifestyle.

  18. Understand Your Risk of Heart Attack

    Science.gov (United States)

    ... not as great as men's. Heredity (Including Race) Children of parents with heart disease are more likely to develop it themselves. African Americans have more severe high blood pressure than Caucasians and a higher risk of heart ...

  19. Heart failure in patients treated with bisphosphonates

    DEFF Research Database (Denmark)

    Grove, E L; Abrahamsen, B; Vestergaard, P

    2013-01-01

    The aim of this study was to investigate the occurrence of heart failure in patients treated with bisphosphonates.......The aim of this study was to investigate the occurrence of heart failure in patients treated with bisphosphonates....

  20. Medications Used to Treat Heart Failure

    Science.gov (United States)

    ... and Live Our Interactive Cardiovascular Library has detailed animations and illustrations to help you learn about conditions, treatments and procedures related to heart disease and stroke. Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  1. Can You Recognize a Heart Attack or Stroke? What To Do When Every Moment Counts

    Science.gov (United States)

    ... Special Issues Subscribe August 2014 Print this issue Can You Recognize a Heart Attack or Stroke? What ... could prevent many of these deaths. Fast action can also limit permanent damage to the body. Heart ...

  2. Coronary Artery Dissection: Not Just a Heart Attack

    Science.gov (United States)

    ... for Heart.org CPR & ECC for Heart.org Shop for Heart.org Causes for Heart.org Advocate ... chest pain or pressure, shortness of breath, profuse sweating and dizziness. “Around 80 percent of the time, ...

  3. Heart Lesion After the First Attack of the Rheumatic Fever 22 Years Experience in Single Centre

    Science.gov (United States)

    Bejiqi, Ramush A.; Retkoceri, Ragip; Zeka, Naim; Bejiqi, Hana; Retkoceri, Arber

    2015-01-01

    Background: Acute rheumatic fever and its sequels, rheumatic heart diseases, remain major unsolved preventable health problems in Kosovo population, particularly among the disadvantages indigenous Albanian and Egyptians people. In Kosovo, despite of performing secondary prophylaxis with benzathine penicillin, acute rheumatic fever hospitalization rates have remained essentially unchanged for the last 20 years. The role of echocardiography in the diagnosis of acute rheumatic carditis was established over the last 20 years. Aims: In this study we aimed to determine the prevalence of rheumatic heart disease in children from Kosovo population with first attack of acute rheumatic fever. Also, we presented that echocardiography examination detects a greater prevalence of rheumatic heart disease than other diagnostic procedures. We aimed to compare the sensitivity and specificity of cardiac auscultation, ECG record, lab analysis to echocardiography and to determine the feasibility of specific age in this setting. Methods: To optimize accurate diagnosis of rheumatic fever and rheumatic heart disease, we utilized two group models. In the first group of 388 children, hospitalized and treated before 1999, diagnosis of rheumatic fever was decided basing on the clinical and laboratory findings whereas in second group (221 children treated from1999 to 2010) clinical and lab diagnosis were amplified also on the detection by echocardiography. Conclusion: In second group, using echocardiography as a method of diagnosis and assessment children with rheumatic fever, we found high rates of undetected rheumatic heart disease in this high-risk group population. Echocardiographic examination of children with rheumatic fever for rheumatic heart disease may over diagnose rheumatic heart disease unless congenital mitral valve anomalies and physiological regurgitation are excluded. PMID:25870479

  4. Before Using Aspirin to Lower Your Risk of Heart Attack or Stroke, Here Is What You Should Know

    Science.gov (United States)

    ... Medicines Safe Daily Use of Aspirin Before Using Aspirin to Lower Your Risk of Heart Attack or ... care provider can determine whether regular use of aspirin will help to prevent a heart attack or ...

  5. Higher coronary heart disease and heart attack morbidity in Appalachian coal mining regions.

    Science.gov (United States)

    Hendryx, Michael; Zullig, Keith J

    2009-11-01

    This study analyzes the U.S. 2006 Behavioral Risk Factor Surveillance System survey data (N=235,783) to test whether self-reported cardiovascular disease rates are higher in Appalachian coal mining counties compared to other counties after control for other risks. Dependent variables include self-reported measures of ever (1) being diagnosed with cardiovascular disease (CVD) or with a specific form of CVD including (2) stroke, (3) heart attack, or (4) angina or coronary heart disease (CHD). Independent variables included coal mining, smoking, BMI, drinking, physician supply, diabetes co-morbidity, age, race/ethnicity, education, income, and others. SUDAAN Multilog models were estimated, and odds ratios tested for coal mining effects. After control for covariates, people in Appalachian coal mining areas reported significantly higher risk of CVD (OR=1.22, 95% CI=1.14-1.30), angina or CHD (OR=1.29, 95% CI=1.19-1.39) and heart attack (OR=1.19, 95% CI=1.10-1.30). Effects were present for both men and women. Cardiovascular diseases have been linked to both air and water contamination in ways consistent with toxicants found in coal and coal processing. Future research is indicated to assess air and water quality in coal mining communities in Appalachia, with corresponding environmental programs and standards established as indicated.

  6. Higher coronary heart disease and heart attack morbidity in Appalachian coal mining regions

    Energy Technology Data Exchange (ETDEWEB)

    Hendryx, M.; Zullig, K.J. [West Virginia University, Morgantown, WV (United States). Dept. of Community Medicine

    2009-11-15

    This study analyzes the U.S. 2006 Behavioral Risk Factor Surveillance System survey data (N = 235,783) to test whether self-reported cardiovascular disease rates are higher in Appalachian coal mining counties compared to other counties after control for other risks. Dependent variables include self-reported measures of ever (1) being diagnosed with cardiovascular disease (CVD) or with a specific form of CVD including (2) stroke, (3) heart attack, or (4) angina or coronary heart disease (CHD). Independent variables included coal mining, smoking, BMI, drinking, physician supply, diabetes co-morbidity, age, race/ethnicity, education, income, and others. SUDAAN Multilog models were estimated, and odds ratios tested for coal mining effects. After control for covariates, people in Appalachian coal mining areas reported significantly higher risk of CVD (OR = 1.22, 95% CI = 1.14-1.30), angina or CHO (OR = 1.29, 95% C1 = 1.19-1.39) and heart attack (OR = 1.19, 95% C1 = 1.10-1.30). Effects were present for both men and women. Cardiovascular diseases have been linked to both air and water contamination in ways consistent with toxicants found in coal and coal processing. Future research is indicated to assess air and water quality in coal mining communities in Appalachia, with corresponding environmental programs and standards established as indicated.

  7. Mortality from heart attack in Belgrade population during the period 1990-2004

    Directory of Open Access Journals (Sweden)

    Ratkov Isidora

    2008-01-01

    Full Text Available INTRODUCTION In most countries, cardiovascular diseases are the leading disorders, with ischemic heart diseases being the leading cause of death. According to WHO data, every year about 17 million people die of cardiovascular diseases, which is 30% of all deaths. Ischemic heart diseases contribute from one-third to one-half of all deaths due to cardiovascular diseases. Three point eight million men and 3.4 million women in the world die every year from ischemic heart diseases, and in Europe about 2 million. The highest mortality rate from ischemic heart diseases occurs in India, China and Russia. OBJECTIVE The aim of this descriptive epidemiological study was to determine heart attack mortality in Belgrade population during the period 1990-2004. METHOD In the study, we conducted investigation of Belgrade population during the period 1990-2004. Mortality data were obtained from the city institution for statistics. The mortality rates were calculated based on the total Belgrade population obtained from the mean values for the last two register years (1991 and 2002. The mortality rates were standardized using the direct method of standardization according to the world (Segi standard population. RESULTS In the Belgrade population during the period 1990-2004, the participation of mortality rate due to heart attack among deaths from cardiovascular diseases was 17% in males and 10% in females. In Belgrade male population, mean standardized mortality rates (per 100,000 habitants were 50.5 for heart attack, 8.3 for chronic ischemic heart diseases and 4.6 for angina pectoris, while in females the rates were 30.8, 6.7 and 4.2, respectively. Mortality from ischemic heart diseases and from heart attack was higher in males than in females. During the studied 15-year period, on average 755 males and 483 females died due to heart attack every year. Mean standardized mortality rates per 100,000 habitants were 50.0 in male and 31.1 in female population. Males

  8. Aspirin for Reducing Your Risk of Heart Attack and Stroke: Know the Facts

    Science.gov (United States)

    ... the-Counter Medicines Safe Daily Use of Aspirin Aspirin for Reducing Your Risk of Heart Attack and ... any pharmacy, grocery or convenience store and buy aspirin without a prescription. The Drug Facts label on ...

  9. Knowledge of Signs and Symptoms of Heart Attack and Stroke among Singapore Residents

    Directory of Open Access Journals (Sweden)

    Joy Li Juan Quah

    2014-01-01

    Full Text Available Aim. To determine the level of knowledge of signs and symptoms of heart attack and stroke in Singapore resident population, in comparison to the global community. Methods. A population based, random sample of 7,840 household addresses was selected from a validated national sampling frame. Each participant was asked eight questions on signs and symptoms of heart attack and 10 questions on stroke. Results. The response rate was 65.2% with 4,192 respondents. The level of knowledge for preselected, common signs and symptoms of heart attack and stroke was 57.8% and 57.1%, respectively. The respondents scored a mean of 5.0 (SD 2.4 out of 8 for heart attack, while they scored a mean of 6.8 (SD 2.9 out of 10 for stroke. Respondents who were ≥50 years, with lower educational level, and unemployed/retired had the least knowledge about both conditions. The level of knowledge of signs and symptoms of heart attack and stroke in Singapore is comparable to USA and Canada. Conclusion. We found a comparable knowledge of stroke and heart attack signs and symptoms in the community to countries within the same economic, educational, and healthcare strata. However older persons, those with lower educational level and those who are unemployed/retired, require more public health education efforts.

  10. Gender differences in the link between childhood socioeconomic conditions and heart attack risk in adulthood.

    Science.gov (United States)

    Hamil-Luker, Jenifer; O'Rand, Angela M

    2007-02-01

    A growing body of evidence shows that childhood socioeconomic status (SES) is predictive of disease risk in later life, with those from the most disadvantaged backgrounds more likely to experience poor adult-health outcomes. Most of these studies, however are based on middle-aged male populations and pay insufficient attention to the pathways between childhood risks and specific adult disorders. This article examines gender differences in the link between childhood SES and heart attack risk trajectories and the mechanisms by which early environments affect future disease risk. By using methods that model both latent and path-specific influences, we identify heterogeneity in early life conditions and human, social, and health capital in adulthood that contribute to diverse heart attack risk trajectories between and among men and women as they age into their 60s and 70s. We find that key risk factors for heart attack operate differently for men and women. For men, childhood SES does not differentiate those at low, increasing, and high risk for heart attack. In contrast, women who grew up without a father and/or under adverse economic conditions are the most likely to experience elevated risk for heart attack, even after we adjust for the unequal distribution of working and living conditions, social relationships, access to health care, and adult lifestyle behaviors that influence health outcomes.

  11. Dysfunction of Right Heart in Attack Period of Bronchial Asthma in Children

    Directory of Open Access Journals (Sweden)

    V.А. Kondratiev

    2015-11-01

    Full Text Available There were performed Doppler echocardiography investigations of functional state of the right heart in 42 children aged 5–17 years old in attack period of bronchial asthma of moderate to severe degree. Changes of intra-cardiac hemodynamics of the right heart in children in attack period of bronchial asthma were characterized by disturbance of systolic and diastolic function of the right ventricle and right atrium. Combined systolic-diastolic variant of the right ventricle dysfunction was typical for attack period of bronchial asthma in children and developed in 95.5 % of cases. Elevation of pressure in pulmonary artery was typical and significantly more often occurred in severe asthma attack, herewith pulmonary hypertension of the second degree predominated.

  12. Resistance of borax–copper treated wood in aboveground exposure to attack by Formosan subterranean termites

    Science.gov (United States)

    Stan Lebow; Bessie Woodward; Douglas Crawford; William Abbott

    2005-01-01

    The spread of Formosan subterranean termites (FSTs) in the southern United States has increased public interest in finding a preservative treatment to protect framing lumber from termite attack. This study evaluated the use of a borax-based preservative to protect wood from FST attack. Southern Pine and Douglas-fir specimens were pressure-treated with three...

  13. Valsartan in the treatment of heart attack survivors

    Directory of Open Access Journals (Sweden)

    Bodh I Jugdutt

    2006-06-01

    Full Text Available Bodh I JugduttDivision of Cardiology, Department of Medicine, University of Alberta, Edmonton, Alberta, CanadaAbstract: Survivors of myocardial infarction (MI are at high risk of disability and death. This is due to infarct-related complications such as heart failure, cardiac remodeling with progressive ventricular dilation, dysfunction, and hypertrophy, and arrhythmias including ventricular and atrial fibrillation. Angiotensin (Ang II, the major effector molecule of the renin–angiotensin–aldosterone system (RAAS is a major contributor to these complications. RAAS inhibition, with angiotensin-converting enzyme (ACE inhibitors were first shown to reduce mortality and morbidity after MI. Subsequently, angiotensin receptor blockers (ARBs, that produce more complete blockade of the effects of Ang II at the Ang II type 1 (AT1 receptor, were introduced and the ARB valsartan was shown to be as effective as an ACE inhibitor in reducing mortality and morbidity in high-risk post-MI suvivors with left ventricular (LV systolic dysfunction and and/or heart failure and in heart failure patients, respectively, in two major trials (VALIANT and Val-HeFT. Both these trials used an ACE inhibitor as comparator on top of background therapy. Evidence favoring the use of valsartan for secondary prevention in post-MI survivors is reviewed.Keywords: valsartan, myocardial infarction, infarct survivors, remodeling, heart failure

  14. Does Uninsurance Affect the Health Outcomes of the Insured? Evidence from Heart Attack Patients in California

    NARCIS (Netherlands)

    Meltem Daysal, N.

    2012-01-01

    Abstract: In this paper, I examine the impact of uninsured patients on the health of the insured, focusing on one health outcome - the in-hospital mortality rate of insured heart attack patients. I employ panel data models using patient discharge and hospital financial data from California

  15. Does uninsurance affect the health outcomes of the insured? Evidence from heart attack patients in California

    NARCIS (Netherlands)

    Meltem Daysal, N.

    2012-01-01

    In this paper, I examine the impact of uninsured patients on the in-hospital mortality rate of insured heart attack patients. I employ panel data models using patient discharge and hospital financial data from California (1999–2006). My results indicate that uninsured patients have an economically

  16. Ventilatory control of heart rate during inhalation of 5% CO2 and types of panic attacks.

    Science.gov (United States)

    Ley, R

    1991-09-01

    Differences in the magnitude of increases in heart rate during prolonged inhalation of 5% CO2 range from a mean of 25 b/min for a group of eight panic-disorder patients who panicked (Woods, Charney, Goodman, & Heninger, 1988. Archives of General Psychiatry, 45, 43-52) to zero b/min for 16 patients, eight of whom panicked (Craske & Barlow, 1990. Journal of Abnormal Psychology, 99, 302-307). What accounts for this disparity? The present paper describes how heart rate can be increased by means of voluntary overbreathing during prolonged inhalation of 5% CO2 in air. This suggests that differences in the degree of overbreathing may explain differences in the magnitude of increases in heart rate during inhalation of 5% CO2. An explanation is also offered for the curious finding that some patients experience "panic attacks" with zero increase in heart rate. Evidence suggests that this is likely to happen in cognitively based panic attacks, in contrast to hyperventilatory attacks or anticipatory attacks.

  17. When You Visit Your Doctor After a Heart Attack

    Science.gov (United States)

    ... or how a bite of bread tastes with dinner. Leverage your strengths for a more positive life Strengths are built-in capacities for certain thoughts, feelings, and behaviors. 5 ways to keep your memory sharp The way you live, what you eat and drink, and how you treat your body ...

  18. Acidic Attack Resistance of Cement Mortar Treated with Alkaline

    Directory of Open Access Journals (Sweden)

    Nadia Nazhat Sabeeh

    2017-12-01

    Full Text Available The negative effect of acidic attack on the properties of concrete and cement mortar is a topic of increasing significance in the recent years. Many attempts has occurred to mitigate this negative impact by improving the properties of concrete and increase resistance to acids by using additives. The present study includes treatment of sand by alkaline material and examine the effect of treatment on cement mortar resistance towards hydrochloric and sulfuric acid. Results show that sand treatment by alkaline material significantly enhance mortar ability to resist acids. In terms of loss weight, the maximum weight rate gain was 25.54% for specimens immersed in Hydrochloric acid with water cement ratio 40%. For specimens immersed in HCl, the average gain in compressive strength is (20.15-19.433% for w/c (40-45% respectively. The average gain in modulus of rupture toward the influence of H2SO4 is (18.37–17.99% for w/c (40-45%, respectively.

  19. Depression and coronary artery disease -real heart attack

    International Nuclear Information System (INIS)

    Farooqi, S.; Ahmed, B.

    2001-01-01

    Both depression and ischaemic heart disease are said to become the leading causes of morbidity and mortality in developing countries during the next two decades. The relationship between these two disorders has long been speculated but only recently addressed scientifically. A Medline search was conducted to obtain the articles that address the association between depressive disorders and coronary artery disease (CAD). Most studies following large cohorts over a period ranging from 4.5 to 27 years have shown that depression is associated with a significantly high risk of developing CAD. These studies also show that patients who have depression following myocardial infarction hat poorer prognosis on major cardiac end points like reoccurrence of myocardial infarction and death as compared to the non-depressed group. The psychosocial variables associated with depression like social isolation, acute and chronic stressful life events are also associated with increased risk of developing CAD. The mechanisms underlying this association between depression and CAD are unknown at present. The effectiveness of psychosocial interventions in reducing this increased risks have been demonstrated while the trials assessing the efficacy and safety of anti depressed drugs are underway. The implications of these finding are discussed in the context of developing countries. (author)

  20. Applying Magneto-rheology to Reduce Blood Viscosity and Suppress Turbulence to Prevent Heart Attacks

    Science.gov (United States)

    Tao, R.

    Heart attacks are the leading causes of death in USA. Research indicates one common thread, high blood viscosity, linking all cardiovascular diseases. Turbulence in blood circulation makes different regions of the vasculature vulnerable to development of atherosclerotic plaque. Turbulence is also responsible for systolic ejection murmurs and places heavier workload on heart, a possible trigger of heart attacks. Presently, neither medicine nor method is available to suppress turbulence. The only method to reduce the blood viscosity is to take medicine, such as aspirin. However, using medicine to reduce the blood viscosity does not help suppressing turbulence. In fact, the turbulence gets worse as the Reynolds number goes up with the viscosity reduction by the medicine. Here we report our new discovery: application of a strong magnetic field to blood along its flow direction, red blood cells are polarized in the magnetic field and aggregated into short chains along the flow direction. The blood viscosity becomes anisotropic: Along the flow direction the viscosity is significantly reduced, but in the directions perpendicular to the flow the viscosity is considerably increased. In this way, the blood flow becomes laminar, turbulence is suppressed, the blood circulation is greatly improved, and the risk for heart attacks is reduced. While these effects are not permanent, they last for about 24 hours after one magnetic therapy treatment.

  1. High mortality among heart failure patients treated with antidepressants

    DEFF Research Database (Denmark)

    Veien, Karsten Tang; Videbæk, Lars; Schou, Morten

    2011-01-01

    This study was designed to assess whether pharmacologically treated depression was associated with increased mortality risk in systolic heart failure (SHF) patients.......This study was designed to assess whether pharmacologically treated depression was associated with increased mortality risk in systolic heart failure (SHF) patients....

  2. CD26 + CD4 + T cell counts and attack risk in interferon-treated multiple sclerosis

    DEFF Research Database (Denmark)

    Sellebjerg, F; Ross, C; Koch-Henriksen, Nils

    2005-01-01

    in patients with CD26 + CD4 + T cell counts above median, and this risk was independent of the risk conferred by neutralizing anti-IFN-beta antibodies. CD26 + CD4 + T cell counts may identify patients with MS at increased risk of attack during treatment with IFN-beta....... and CCR5 on T cells is altered in patients with active MS. We studied the expression of these molecules by flow cytometry in patients followed for six months during immunomodulatory treatment. In interferon (IFN)-beta-treated patients, we found that the hazard ratio for developing an attack was 28...

  3. Stem cell therapy to treat heart ischaemia

    DEFF Research Database (Denmark)

    Ali Qayyum, Abbas; Mathiasen, Anders Bruun; Kastrup, Jens

    2014-01-01

    (CABG), morbidity and mortality is still high in patients with CAD. Along with PCI and CABG or in patients without options for revascularization, stem cell regenerative therapy in controlled trials is a possibility. Stem cells are believed to exert their actions by angiogenesis and regeneration...... of cardiomyocytes. Recently published clinical trials and meta-analysis of stem cell studies have shown encouraging results with increased left ventricle ejection fraction and reduced symptoms in patients with CAD and heart failure. There is some evidence of mesenchymal stem cell being more effective compared...... to other cell types and cell therapy may be more effective in patients with known diabetes mellitus. However, further investigations are warranted....

  4. US State-level income inequality and risks of heart attack and coronary risk behaviors: longitudinal findings.

    Science.gov (United States)

    Pabayo, Roman; Kawachi, Ichiro; Gilman, Stephen E

    2015-07-01

    To examine prospectively the association between US state income inequality and incidence of heart attack. We used data from the National Epidemiologic Survey on Alcohol and Related Conditions (n = 34,445). Respondents completed interviews at baseline (2001-2002) and follow-up (2004-2005). Weighted multilevel modeling was used to determine if US state-level income inequality (measured by the Gini coefficient) at baseline was a predictor of heart attack during follow-up, controlling for individual-level and state-level covariates. In comparison to residents of US states in the lowest quartile of income inequality, those living in the second [Adjusted Odds Ratio (AOR) = 1.71, 95 % CI 1.16-2.53)], third (AOR = 1.81, 95 % CI 1.28-2.57), and fourth (AOR = 2.04, 95 % CI 1.26-3.29) quartiles were more likely to have a heart attack. Similar findings were obtained when we excluded those who had a heart attack prior to baseline. This study is one of the first to empirically show the longitudinal relationship between income inequality and coronary heart disease. Living in a state with higher income inequality increases the risk for heart attack among US adults.

  5. Knowledge of heart attack and stroke symptomology: a cross-sectional comparison of rural and non-rural US adults

    Directory of Open Access Journals (Sweden)

    Swanoski Michael T

    2012-06-01

    Full Text Available Abstract Background Understanding the signs and symptoms of heart attacks and strokes are important not only in saving lives, but also in preserving quality of life. Findings from recent research have yielded that the prevalence of cardiovascular disease risk factors are higher in rural populations, suggesting that adults living in rural locales may be at higher risk for heart attack and/or stroke. Knowledge of heart attack and stroke symptomology as well as calling 911 for a suspected heart attack or stroke are essential first steps in seeking care. This study sought to examine the knowledge of heart attack and stroke symptoms among rural adults in comparison to non-rural adults living in the U.S. Methods Using multivariate techniques, a cross-sectional analysis of an amalgamated multi-year Behavioral Risk Factor Surveillance Survey (BRFSS database was performed. The dependent variable for this analysis was low heart attack and stroke knowledge score. The covariates for the analysis were: age, sex, race/ethnicity, annual household income, attained education, health insurance status, having a health care provider (HCP, timing of last routine medical check-up, medical care deferment because of cost, self-defined health status and geographic locale. Results The weighted n for this study overall was 103,262,115 U.S. adults > =18 years of age. Approximately 22.0% of these respondents were U.S. adults living in rural locales. Logistic regression analysis revealed that those U.S. adults who had low composite heart attack and stroke knowledge scores were more likely to be rural (OR = 1.218 95%CI 1.216-1.219 rather than non-rural residents. Furthermore, those with low scores were more likely to be: male (OR = 1.353 95%CI 1.352-1.354, >65 years of age (OR = 1.369 95%CI 1.368-1.371, African American (OR = 1.892 95%CI 1.889-1.894, not educated beyond high school (OR = 1.400 955CI 1.399-1.402, uninsured (OR = 1.308 95%CI 1

  6. Heart dysfunction and fibrosis in rat treated with myocardial ...

    African Journals Online (AJOL)

    Because cardiovascular disease remains a serious problem in modern human society, the aim of this study was to establish the rat model animal and to compare the heart dysfunction and fibrosis with SD and LE rats when treated with myocardial ischemia and reperfusion operation. A 20-minute thoracotomy was performed ...

  7. Comparing Asian American Women's Knowledge, Self-Efficacy, and Perceived Risk of Heart Attack to Other Racial and Ethnic Groups: The mPED Trial.

    Science.gov (United States)

    Fukuoka, Yoshimi; Lisha, Nadra E; Vittinghoff, Eric

    2017-09-01

    The aim of the study was to compare knowledge and awareness of heart attacks/heart disease and perceived risk for future heart attack in Asian/Pacific Islander women, compared to other racial and ethnic groups. In this cross-sectional study, 318 women enrolled in a mobile phone-based physical activity education trial were analyzed. Heart attack knowledge, self-efficacy for recognizing and responding to heart attack symptoms, and perceived risk for a future heart attack were measured. Analyses were conducted using logistic, proportional odds, and linear regression models, depending on the outcome and adjusting for age. Pairwise differences between Asian/Pacific Islanders and the other four groups were assessed using a Bonferroni correction (p Asian/Pacific Islander women had significantly lower total scores for knowledge of heart attack and self-efficacy for heart attack recognition and care seeking behavior compared to the Caucasian women (p = 0.001 and p = 0.002, respectively). However, perceived risk did not differ among the groups. Forty-six percent of the Asian American women, compared to 25% of Caucasian women, falsely believed "breast cancer is the number one cause of death for women (p = 0.002)." In addition, Asian/Pacific Islander women were less likely to report "arm pain, numbness, tingling, or radiating" as one of the heart attack symptoms compared to the Caucasian and the multiracial group (34%, 63% [p Asian/Pacific Islander women and Caucasian women.

  8. Tracks FAQs: How Do Heart Attack Hospitalization Rates In My Community Compare With Other Counties Or States?

    Centers for Disease Control (CDC) Podcasts

    In this podcast, CDC Tracking experts discuss how to compare heart attack hospitalization rates in your community with other counties or states. Do you have a question for our Tracking experts? Please e-mail questions to trackingsupport@cdc.gov.

  9. Cardiac autonomic testing and treating heart disease. 'A clinical perspective'

    Directory of Open Access Journals (Sweden)

    Nicholas L. DePace

    2014-12-01

    Full Text Available Background Coronary heart disease (CHD is a major health concern, affecting nearly half the middle-age population and responsible for nearly one-third of all deaths. Clinicians have several major responsibilities beyond diagnosing CHD, such as risk stratification of patients for major adverse cardiac events (MACE and treating risks, as well as the patient. This second of a two-part review series discusses treating risk factors, including autonomic dysfunction, and expected outcomes. Methods Therapies for treating cardiac mortality risks including cardiovascular autonomic neuropathy (CAN, are discussed. Results While risk factors effectively target high-risk patients, a large number of individuals who will develop complications from heart disease are not identified by current scoring systems. Many patients with heart conditions, who appear to be well-managed by traditional therapies, experience MACE. Parasympathetic and Sympathetic (P&S function testing provides more information and has the potential to further aid doctors in individualizing and titrating therapy to minimize risk. Advanced autonomic dysfunction (AAD and its more severe form cardiovascular autonomic neuropathy have been strongly associated with an elevated risk of cardiac mortality and are diagnosable through autonomic testing. This additional information includes patient-specific physiologic measures, such as sympathovagal balance (SB. Studies have shown that establishing and maintaining proper SB minimizes morbidity and mortality risk. Conclusions P&S testing promotes primary prevention, treating subclinical disease states, as well as secondary prevention, thereby improving patient outcomes through (1 maintaining wellness, (2 preventing symptoms and disorder and (3 treating subclinical manifestations (autonomic dysfunction, as well as (4 disease and symptoms (autonomic neuropathy.

  10. Cancer and heart attack survivors’ expectations of employment status: results from the English Longitudinal Study of Ageing

    Directory of Open Access Journals (Sweden)

    Saskia F. A. Duijts

    2017-08-01

    Full Text Available Abstract Background Sociodemographic, health- and work-related factors have been found to influence return to work in cancer survivors. It is feasible though that behavioural factors, such as expectation of being at work, could also affect work-related outcomes. Therefore, the effect of earlier identified factors and expectation of being at work on future employment status in cancer survivors was explored. To assess the degree to which these factors specifically concern cancer survivors, a comparison with heart attack survivors was made. Methods Data from the English Longitudinal Study of Ageing were used. Cancer and heart attack survivors of working age in the UK were included and followed up for 2 years. Baseline characteristics of both cancer and heart attack survivors were compared regarding employment status. Univariate and multivariate regression analyses were performed in survivors at work, and the interaction between independent variables and diagnose group was assessed. Results In cancer survivors at work (N = 159, alcohol consumption, participating in moderate or vigorous sport activities, general health and participation were univariate associated with employment status at two-year follow-up. Only fair general health (compared to very good general health remained statistically significant in the multivariate model (OR 0.31; 95% CI 0.13–0.76; p = 0.010. In heart attack survivors at work (N = 78, gender, general health and expectation of being at work were univariate associated with employment status at follow-up. Female gender (OR 0.03; 95% CI 0.00–0.57; p = 0.018 and high expectation of being at work (OR 10.68; 95% CI 1.23–93.92; p = 0.033 remained significant in the multivariate model. The influence of gender (p = 0.066 and general health (p = 0.020 regarding employment status was found to differ significantly between cancer and heart attack survivors. Conclusions When predicting future employment status in cancer

  11. Cancer and heart attack survivors' expectations of employment status: results from the English Longitudinal Study of Ageing.

    Science.gov (United States)

    Duijts, Saskia F A; van der Beek, Allard J; Bleiker, Eveline M A; Smith, Lee; Wardle, Jane

    2017-08-07

    Sociodemographic, health- and work-related factors have been found to influence return to work in cancer survivors. It is feasible though that behavioural factors, such as expectation of being at work, could also affect work-related outcomes. Therefore, the effect of earlier identified factors and expectation of being at work on future employment status in cancer survivors was explored. To assess the degree to which these factors specifically concern cancer survivors, a comparison with heart attack survivors was made. Data from the English Longitudinal Study of Ageing were used. Cancer and heart attack survivors of working age in the UK were included and followed up for 2 years. Baseline characteristics of both cancer and heart attack survivors were compared regarding employment status. Univariate and multivariate regression analyses were performed in survivors at work, and the interaction between independent variables and diagnose group was assessed. In cancer survivors at work (N = 159), alcohol consumption, participating in moderate or vigorous sport activities, general health and participation were univariate associated with employment status at two-year follow-up. Only fair general health (compared to very good general health) remained statistically significant in the multivariate model (OR 0.31; 95% CI 0.13-0.76; p = 0.010). In heart attack survivors at work (N = 78), gender, general health and expectation of being at work were univariate associated with employment status at follow-up. Female gender (OR 0.03; 95% CI 0.00-0.57; p = 0.018) and high expectation of being at work (OR 10.68; 95% CI 1.23-93.92; p = 0.033) remained significant in the multivariate model. The influence of gender (p = 0.066) and general health (p = 0.020) regarding employment status was found to differ significantly between cancer and heart attack survivors. When predicting future employment status in cancer survivors in the UK, general health is the most relevant factor

  12. Tracks FAQs: How Do Heart Attack Hospitalization Rates In My Community Compare With Other Counties Or States?

    Centers for Disease Control (CDC) Podcasts

    2011-09-01

    In this podcast, CDC Tracking experts discuss how to compare heart attack hospitalization rates in your community with other counties or states. Do you have a question for our Tracking experts? Please e-mail questions to trackingsupport@cdc.gov.  Created: 9/1/2011 by National Center for Environmental Health, Division of Environmental Hazards and Health Effects, Environmental Health Tracking Branch.   Date Released: 9/1/2011.

  13. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. ...

  14. Systemic Hypertension and Transient Ischemic Attack in a 6-Year-Old Girl with Fibromuscular Dysplasia Treated with Percutaneous Angioplasty

    International Nuclear Information System (INIS)

    Foa-Torres, Gustavo; Ganame, Javier; Juaneda, Ernesto; Peirone, Alejandro; Barcudi, Maria Silvina; Achaval, Alberto

    2010-01-01

    We describe a 6-year-old girl with arterial hypertension secondary to fibromuscular dysplasia with stenoses of both renal arteries and transient ischemic attack due to extracranial right internal carotid artery subtotal occlusion as well as left internal carotid artery stenosis. She was treated with percutaneous angioplasty of both renal and both carotid arteries.

  15. An avatar based education application to improve patients' knowledge of and response to heart attack symptoms: a pragmatic randomized controlled trial protocol.

    Science.gov (United States)

    Tongpeth, Jintana; Du, Huiyun; Clark, Robyn

    2018-06-19

    To evaluate the effectiveness of an interactive, avatar based education application to improve knowledge of and response to heart attack symptoms in people who are at risk of a heart attack. Poor knowledge of heart attack symptoms is recognised as a significant barrier to timely medical treatment. Numerous studies have demonstrated that technology can assist in patient education to improve knowledge and self-care. A single-center, non-blinded, two parallel groups, pragmatic randomized controlled trial. Seventy patients will be recruited from the coronary care unit of a public hospital. Eligible participants will be randomised to either the usual care or the intervention group (usual care plus avatar-based heart attack education app). The primary outcome of this study is knowledge. Secondary outcomes include response to heart attack symptoms, health service use and satisfaction. Study participants will be followed-up for six months. This study will evaluate the avatar based education app as a method to deliver vital information to patients. Participants' knowledge of and response to heart attack symptoms, as well as their health service use, will be assessed to evaluate the intervention effectiveness. This article is protected by copyright. All rights reserved. This article is protected by copyright. All rights reserved.

  16. Treating a patient with lower limb injury from shark attack – a case report

    Directory of Open Access Journals (Sweden)

    Uroš Ahčan

    2014-02-01

    Full Text Available Background: Every year a number of people are attacked by sharks worldwide; however, death as a consequence is quite unusual. In recent years, the number of reported shark attacks worldwide has been around 67 per year with fatalities averaging 5 persons annually. Shark attacks in the Adriatic Sea are very rare.Case report: In 2008, a great white shark attack happened in the Adriatic Sea, in which a man suffered a severe injury to his lower extremity and profuse bleeding that led to haemorrhagic shock.Conclusion: The expeditious intervention at the site of attack and the exemplary cooperation of medical teams in two centres in the neighbouring countries of Croatia and Slovenia has saved the life of the unusually injured patient and resulted in a satisfactory functional outcome.

  17. A qualitative study of younger men's experience of heart attack (myocardial infarction).

    Science.gov (United States)

    Merritt, Christopher J; de Zoysa, Nicole; Hutton, Jane M

    2017-09-01

    The effects of heart attack, or myocardial infarction (MI), across psychosocial domains may be particularly acute in younger adults, for whom serious health events are non-normative. MI morbidity is declining in Western countries, but in England MI numbers have plateaued for the under-45 cohort, where approximately 90% of patients are male. Qualitative research on younger adults' experience of MI is limited, and no study has sampled exclusively under-45s. This study aimed to understand how a sample of men under 45 adjusted to and made sense of MI. Qualitative research design based on semi-structured in-depth interviews. Ten men aged under 45 who had experienced MI in the past 3-6 months were purposively recruited and interviewed. Interviews were transcribed verbatim and analysed using interpretative phenomenological analysis. Seven superordinate themes were identified. This article focuses in depth on the three most original themes: (1) 'I'm less of a man', which described experiences of losing 'maleness' (strength, independence, ability to provide) post-MI; (2) 'Shortened horizons', which covered participants' sense of foreshortened future and consequent reprioritization; and (3) 'Life loses its colour', describing the loss of pleasure from lifestyle-related changes. Themes broadly overlapped with the qualitative literature on younger adult MI. However, some themes (e.g., loss of 'maleness' post-MI, and ambivalence towards MI risk factors) appeared unique to this study. Themes were also discussed in relation to risk factors for anxiety and depression and how this might inform clinical care for a younger, male population. Statement of contribution What is already known on this subject? Myocardial infarction (MI) morbidity is not declining in England for under-45s. Adjustment to MI is particularly challenging for younger adults, perhaps because it is non-normative. However, little is known about the experience of MI in younger adults. What does this study add? This

  18. Risk for Major Bleeding in Patients Receiving Ticagrelor Compared With Aspirin After Transient Ischemic Attack or Acute Ischemic Stroke in the SOCRATES Study (Acute Stroke or Transient Ischemic Attack Treated With Aspirin or Ticagrelor and Patient Outcomes).

    Science.gov (United States)

    Easton, J Donald; Aunes, Maria; Albers, Gregory W; Amarenco, Pierre; Bokelund-Singh, Sara; Denison, Hans; Evans, Scott R; Held, Peter; Jahreskog, Marianne; Jonasson, Jenny; Minematsu, Kazuo; Molina, Carlos A; Wang, Yongjun; Wong, K S Lawrence; Johnston, S Claiborne

    2017-09-05

    Patients with minor acute ischemic stroke or transient ischemic attack are at high risk for subsequent stroke, and more potent antiplatelet therapy in the acute setting is needed. However, the potential benefit of more intense antiplatelet therapy must be assessed in relation to the risk for major bleeding. The SOCRATES trial (Acute Stroke or Transient Ischemic Attack Treated With Aspirin or Ticagrelor and Patient Outcomes) was the first trial with ticagrelor in patients with acute ischemic stroke or transient ischemic attack in which the efficacy and safety of ticagrelor were compared with those of aspirin. The main safety objective was assessment of PLATO (Platelet Inhibition and Patient Outcomes)-defined major bleeds on treatment, with special focus on intracranial hemorrhage (ICrH). An independent adjudication committee blinded to study treatment classified bleeds according to the PLATO, TIMI (Thrombolysis in Myocardial Infarction), and GUSTO (Global Use of Strategies to Open Occluded Coronary Arteries) definitions. The definitions of ICrH and major bleeding excluded cerebral microbleeds and asymptomatic hemorrhagic transformations of cerebral infarctions so that the definitions better discriminated important events in the acute stroke population. A total of 13 130 of 13 199 randomized patients received at least 1 dose of study drug and were included in the safety analysis set. PLATO major bleeds occurred in 31 patients (0.5%) on ticagrelor and 38 patients (0.6%) on aspirin (hazard ratio, 0.83; 95% confidence interval, 0.52-1.34). The most common locations of major bleeds were intracranial and gastrointestinal. ICrH was reported in 12 patients (0.2%) on ticagrelor and 18 patients (0.3%) on aspirin. Thirteen of all 30 ICrHs (4 on ticagrelor and 9 on aspirin) were hemorrhagic strokes, and 4 (2 in each group) were symptomatic hemorrhagic transformations of brain infarctions. The ICrHs were spontaneous in 6 and 13, traumatic in 3 and 3, and procedural in 3 and 2

  19. Determination of Relations between Systolic Blood Pressure and Heart Attack in Patients with Type 2 Diabetes with Association Rules

    Directory of Open Access Journals (Sweden)

    Seyyed Payam Shariatpanahi

    2018-03-01

    Full Text Available Abstract Background: Today, the high prevalence of diabetes and its complications are one of the most important public health issues worldwide. For this reason, finding relations between diabetes risk factors is very effective in preventing and reducing complications. For discovering these relations, the data mining methods can be used. By extracting association rules, which is one of the data mining techniques, we can discover the relations between a large numbers of variables in a disease. Materials and Methods: The population of this study was 1046 patients with type 2 diabetes, whose data had recorded between 2011 and 2014 at the Special Clinic for Diabetes in Tehran's Imam Khomeini Hospital. After pre-processing step with SPSS19 software, 573 people entered the analysis phase. The FP-Growth algorithm was applied to the data set to discover the relations between heart attack and other risk factors using Rapid miner5 software. Relations, after extraction, were given to the doctor to confirm clinical validation. Results: The obtained results of studying these 573 people (Including 292 (51% women and 281 (49% men, with age range 27 to 82 years showed that the lack of blood pressure, creatinine and diastolic blood pressure at its normal level, despite higher systolic blood pressure level than normal, doesn't increase the probability of heart attack. Conclusion: Using association rules is a good way of identifying relations between the risk factors of a disease. Also, it can provide new hypotheses to do epidemiological studies for researchers.

  20. [Overweight and obesity in children treated for congentital heart disease].

    Science.gov (United States)

    Perin, Francesca; Carreras Blesa, Carmen; Rodríguez Vázquez Del Rey, Maria Del Mar; Cobo, Inmaculada; Maldonado, José

    2018-04-21

    The negative impact of overweight and obesity is potentially greater in children affected by a congenital heart disease (CHD). The aim of this study is to calculate the proportion of overweight and obesity in children who underwent an intervention for CHD, and to investigate systolic arterial hypertension as a possible early cardiovascular complication. A retrospective study was conducted on patients aged 6 to 17 years treated for CHD, and healthy control subjects, followed-up in a Paediatric Cardiology Clinic. Body mass index percentiles were calculated according to the criteria of WHO. A review was performed on the anthropometric and clinical data, as well as the systolic blood pressure (SBP). A total of 440 patients were included, of which 220 had CHD. The proportion of combined obesity and overweight (body mass index percentile≥85) was 36.4% (37.3% in healthy subjects and 35.4% in patients with CHD, P=.738). A higher prevalence of obesity (body mass index percentile≥97) was found in CHD patients (22.7%) compared to 15.5% in healthy subjects (P=.015). SBP percentiles were higher in overweight compared to normal-weight patients (P<.001). The prevalence of SBP readings≥the 95th percentile was greater in overweight than in normal weight CHD patients (29.5% versus 7.7%, P<.001) and also in the overweight healthy controls compared to those of normal weight (12.2% versus 0.7%, P<.001). The proportion of obesity is high in treated CHD children and is associated with high SBP levels. The risk of long-term complications needs to be reduced by means of prevention and treatment of obesity in this very vulnerable population. Copyright © 2018. Publicado por Elsevier España, S.L.U.

  1. Multi-constituent cardiovascular pills (MCCP)--challenges and promises of population-based prophylactic drug therapy for prevention of heart attack.

    Science.gov (United States)

    Jamieson, Michael J; Naghavi, Morteza

    2007-01-01

    Risk factors for atherosclerotic cardiovascular disease (CVD) are highly co-prevalent but poorly identified and treated. The Screening for Heart Attack Prevention and Education (SHAPE) Task Force from the Association for Eradication of Heart Attack (AEHA) has recently proposed a new strategy that recommends screening for subclinical atherosclerosis and implementing aggressive treatment of "vulnerable patients". The Task Force has also envisioned future developments that may shift mass screening strategies to mass prophylactic therapy. The "Polypill" concept, introduced by Wald and Law suggests a combination of statin, low-dose antihypertensives, aspirin and folic acid, in a single pill, taken prophylactically by high risk population can cut CVD event rates by as much as 80%. In this communication, we review the challenges and promises of such a strategy. "Polypill" is but one of an astronomical number of possible multiconstituent pills (MCCP). Attractive as the MCCP concept is, it lacks evidence from randomized controlled trials, and begs numerous questions about the credibility of the concept, the design and synthesis of such complex pills, pharmacokinetics, pharmacodynamics, bioequivalence, "class" vs. unique properties, interactions, evidence of clinical efficacy and safety, regulatory approval, post-marketing surveillance, prescription vs. over-the-counter use, responsibility for initiating and monitoring therapy, patient education, counterfeiting and importation, reimbursement, advertisement, patent protection, commercial viability, etc. If these issues are favorably addressed, MCCP stand to dramatically change the manner in which CVD is prevented particularly in developing societies. Notwithstanding, assuming low commercial interests, realizing the promises of MCCP will demand serious attention from national public health policymakers. The clinical and regulatory implications of population-based secondary prevention (which rely on a different evidence base

  2. Sleep bruxism possibly triggered by multiple sclerosis attacks and treated successfully with botulinum toxin: Report of three cases.

    Science.gov (United States)

    Sevim, Serhan; Kaleağası, Hakan; Fidancı, Halit

    2015-09-01

    Sleep bruxism refers to a nocturnal parafunctional activity including the clenching, grinding or gnashing of teeth. While most of the nocturnal bruxism cases seen in the general population are apparently idiopathic, it has been reported to be associated with a range of neurological diseases such as Huntington's disease, cranio-cervical dystonia and post-anoxic brain damage, but not multiple sclerosis (MS). We describe three cases of MS patients who have had moderate to severe complaints of bruxism in the two weeks following their relevant MS attacks. None of the three patients had a diagnosis of bruxism prior to her attack. The diagnosis was confirmed in one out of three by a polysomnography. One patient did not have any complaints related to bruxism previous to her attack, whereas two had mild and infrequent complaints. The symptoms of the relevant attacks were left hemihypesthesia in all and hemiparesis in two. None of the patients had spasticity that could result in severe teeth clenching. All three patients presented with morning headaches and jaw pain or tightness and were treated successfully with botulinum toxin (Btx) injections applied to their masseter and temporalis muscles. The cause of bruxism is controversial but lesions of the cortico-basalganglia-thalamo-cotrical loops are thought to be most likely. However, acute or chronic lesions in those pathways were not demonstrated in the 3 patients. It is feasible that they had normal appearing white matter interruptions in their cortico-basalganglia-thalamocortical loops along with their relevant attack. Copyright © 2015 Elsevier B.V. All rights reserved.

  3. Family history and body mass index predict perceived risks of diabetes and heart attack among community-dwelling Caucasian, Filipino, Korean, and Latino Americans--DiLH Survey.

    Science.gov (United States)

    Fukuoka, Yoshimi; Choi, JiWon; S Bender, Melinda; Gonzalez, Prisila; Arai, Shoshana

    2015-07-01

    The purpose of the study was to explore the perceived risk for diabetes and heart attack and associated health status of Caucasian, Filipino, Korean, and Latino Americans without diabetes. A cross-sectional survey was conducted with 904 urban adults (mean age 44.3±16.1 years; 64.3% female) in English, Spanish or Korean between August and December 2013. Perceived risk for developing diabetes was indicated by 46.5% (n=421), and 14.3% (n=129) perceived themselves to be at risk for having a heart attack in their lifetime. Significant predictors of pessimistic diabetes risk perceptions: Filipino (adjusted odds ratio [AOR]=1.7; 95% CI: 1.04-2.86) and Korean (AOR=2.4; 1.33-4.48) ethnicity, family history of diabetes (AOR=1.4; 1.00-1.84), female gender (AOR=1.4; 1.04-1.96), high cholesterol (AOR= 1.6; 1.09-2.37) and higher body mass index (BMI) (AOR=1.1; 1.08-1.15). Predictors of pessimistic heart attack risk perceptions were family history of an early heart attack (AOR=2.9; 1.69-5.02), high blood pressure (AOR=2.4; 1.45-3.84), and higher BMI (AOR=1.1; 1.04-1.12) after controlling for socio-demographic factors. Older age, physical inactivity, smoking, and low HDL levels were not associated with risk perceptions. Multiple risk factors were predictive of greater perceived diabetes risk, whereas, only family history of heart attack, high blood pressure and increases in BMI significantly contributed to perceived risk of heart attack among ethnically diverse at risk middle-aged adults. It is important that healthcare providers address the discordance between an individual's risk perceptions and the presence of actual risk factors. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  4. CPR in the Schools: Training Students to Save Heart Attack Victims.

    Science.gov (United States)

    Britton, Royce J.

    1978-01-01

    A community cardiac emergency medical plan should include training of family and co-workers of high risk patients, including teenage students. The American Heart Association lists ways to introduce cardiopulmonary resuscitation (CPR) into school curricula and describes the plan implemented in Pennsylvania. (MF)

  5. Total Dietary Fiber, and Selected Vegetable, Fruit, Legume and Cereal Fiber Intake and Risk of Heart Attack in Periodontitis Subjects

    Directory of Open Access Journals (Sweden)

    Nelson Wood

    2011-10-01

    Full Text Available Background: Epidemiological studies have found an association between periodontal disease and coronary artery disease(Arbes, Slade et al. 1999; Beck, Elter et al. 2001; Genco, Offenbacher et al. 2002, and have even implicated periodontal disease as a risk factor(Arbes, Slade et al. 1999; Beck, Elter et al. 2001, however have not proven causality(Hujoel, Drangholt et al. 2000. Although dietary amounts, sources, and types (soluble versus insoluble of fiber have been shown to reduce the risk of heart attack (Liu, Buring et al. 2002; Negri, Vecchia et al. 2003, this author is unaware of studies that have examined the association between food sources of dietary fiber and heart attack risk in subjects with periodontitis.This study was designed to determine whether total dietary fiber and fiber from different plant sources (vegetables, fruits, legumes, or cereals modified self-reported HA risk, as well as acute-phase inflammatory responses in subjects with periodontitis using NHANES III data.Objectives: The objective of this study was to investigate the association between total dietary fiber intake levels, and selected vegetables, fruits, legumes, and cereal fiber intake and the risk of self-reported history of heart attack (HA in periodontitis subjects using data available in the Third National Health and Nutrition Examination Survey (NHANES III.Materials and Methods: Adult participants in NHANES III were used in this study. Zero to thirty three (0-33 percent of sites with periodontal attachment loss > 3 mm was considered a healthy periodontium, while greater than thirty three percent (>33 of sites with periodontal attachment loss of > 3 mm as periodontitis. The outcome variable was the self-reported history of HA. Total dietary fiber, and monthly selected vegetable, fruit, legume and cereal consumption were divided into low and adequate levels. Data was analyzed by Kruskal-Wallis, ANOVA and multivariate analyses using SPSS ®. P<0.05 was used to

  6. Heart Lesion After the First Attack of the Rheumatic Fever 22 Years Experience in Single Centre

    OpenAIRE

    Bejiqi, Ramush A.; Retkoceri, Ragip; Zeka, Naim; Bejiqi, Hana; Retkoceri, Arber

    2015-01-01

    Background: Acute rheumatic fever and its sequels, rheumatic heart diseases, remain major unsolved preventable health problems in Kosovo population, particularly among the disadvantages indigenous Albanian and Egyptians people. In Kosovo, despite of performing secondary prophylaxis with benzathine penicillin, acute rheumatic fever hospitalization rates have remained essentially unchanged for the last 20 years. The role of echocardiography in the diagnosis of acute rheumatic carditis was estab...

  7. Heart Health - Brave Heart

    Science.gov (United States)

    ... Bar Home Current Issue Past Issues Cover Story Heart Health Brave Heart Past Issues / Winter 2009 Table of Contents For ... you can have a good life after a heart attack." Lifestyle Changes Surviving—and thriving—after such ...

  8. Heart Rate Changes in Electroacupuncture Treated Polycystic Ovary in Rats.

    Science.gov (United States)

    Ramadoss, Mukilan; Ramanathan, Gunasekaran; Subbiah, Angelie Jessica; Natrajan, Chidambaranathan

    2016-03-01

    Polycystic Ovary Syndrome (PCOS) is a common metabolic disorder, it affects both humans and animals. It may induce coronary heart disease, obesity and hyperandrogenism. Previous studies show that Low frequency Electroacupuncture (EA) have an effect on PCOS, however the exact pathway is unclear. To find the effect of EA on autonomic activity of the heart in Estradiol Valerate (EV) induced PCOS rats. Heart rate variability (HRV) was assessed in 3 groups: 1) Control; 2) PCOS rats; and 3) PCOS rats after EA treatment (n=8 in each group). From the time domain analysis and frequency domain analysis (linear measures) HRV analysis was done. EA stimulation was given at low frequency of 2Hz for 15 min on alternate days for 4-5 weeks. Collected data were statistically analysed using One-Way Analysis of Variance with the application of multiple comparisons of Tukey test. EA treatment group shows significant reduction in Heart Rate (HR) and low frequency, high frequency ratio (LF/HF); and increase in RR interval, Total Power (TP) when compared to PCOS group. The study concludes that EA treatment has a significant effect on reducing sympathetic tone and decreasing HR in PCOS.

  9. Level of consciousness on admission to a Heart Attack Centre is a predictor of survival from out-of-hospital cardiac arrest.

    Science.gov (United States)

    Deakin, Charles D; Fothergill, Rachael; Moore, Fionna; Watson, Lynne; Whitbread, Mark

    2014-07-01

    The relationship between the neurological status at the time of handover from the ambulance crew to a Heart Attack Centre (HAC) in patients who have achieved return of spontaneous circulation (ROSC) and subsequent outcome, in the context of current treatment standards, is unknown. A retrospective review of all patients treated by London Ambulance Service (LAS) from 1(st) April 2011 to 31(st) March 2013 admitted to a HAC in Greater London was undertaken. Neurological status (A - alert; V - responding to voice; P - responding to pain; U - unresponsive) recorded by the ambulance crew on handover was compared with length of hospital stay and survival to hospital discharge. A total of 475 sequential adult cardiac arrests of presumed cardiac origin, achieving ROSC on admission to a HAC were identified. Outcome data was available for 452 patients, of whom 253 (56.0%) survived to discharge. Level of consciousness on admission to the HAC was a predictor of duration of hospital stay (Pa shockable rhythm, 32.3% (120/371) were 'A' or 'V', compared with 9.1% (9/99) of those with non-shockable rhythms (PA or V) compared with those with non-shockable rhythms. Most patients who are conscious on admission to the HAC will survive, compared with approximately half of those who are unconscious (P or U), suggesting that critical care is generally appropriate at all levels of consciousness if ROSC has been achieved. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  10. [Asthma at acute attack stage treated with "Shao's five needling therapy": a multi-central randomized controlled study].

    Science.gov (United States)

    Shao, Su-Ju; Quan, Chun-Fen; Shao, Su-Xia; Zhou, Miao; Jing, Xin-Jian; Zhao, Yu-Xiao; Ren, Zhi-Xin; Wang, Pei-Yu; Gao, Xi-Yan; Yang, Jie; Ren, Zhong; Kong, Li

    2013-09-01

    To evaluate the clinical efficacy of asthma at acute attack stage treated with "Shao's five needling therapy". The randomized controlled method was applied to divide 210 cases into an observation group and a control group, 105 cases in each one. In the observation group, "Shao's five needling therapy" [Feishu (BL 13), Dazhui (GV 14), Fengmen (BL 12)] and the combined therapy were adopted, including oxygen uptake, aerosol inhalation and oral administration of prednisone. In the control group, the oral administration of theophylline sustained release tablet and the combined therapy were applied. The treatment was continued for 7 days. The clinical symptoms and physical signs such as wheezing, cough, expectoration, chest stuffiness, wheezing rale and shortness of breath, as well as lung function indices such as forced expiratory volume one second (FEV1) and peak expiratory flow (PEF) were observed before and after treatment in the two groups. In the observation group, 69 cases were cured clinically, 20 cases effective remarkably, 7 cases effective and 0 case failed. In the control group, 49 cases were cured clinically, 31 cases effective remarkably, 15 cases effective and 0 case failed. The difference in the efficacy was significant in comparison of the two groups (P asthma at acute attack stage. It significantly relieves the symptoms and physical signs of the patients and improves lung functions. The effect is better than that of theophylline sustained release tablet.

  11. Relationship between blood lead, blood pressure, stroke, and heart attacks in middle-aged British men

    International Nuclear Information System (INIS)

    Pocock, S.J.; Shaper, A.G.; Ashby, D.; Delves, H.T.; Clayton, B.E.

    1988-01-01

    The relationship between blood lead concentration and blood pressure is examined in a survey of 7371 men aged 40 to 59 from 24 British towns. After allowance for relevant confounding variables, including town of residence and alcohol consumption, there exists a very weak but statistically significant positive association between blood lead and both systolic and diastolic blood pressure. After 6 years of follow-up, 316 of these men had major ischemic heart disease, and 66 had a stroke. After allowance for the confounding effects of cigarette smoking and town of residence there is no evidence that blood lead is a risk factor for these cardiovascular events. However, as the blood lead-blood pressure association is so weak, it is unlikely that any consequent association between lead and cardiovascular disease could be demonstrated from prospective epidemiological studies. An overview of data from this and other large epidemiological surveys provides reasonable consistent evidence on lead and blood pressure. While NHANES II data on 2254 US men indicate a slightly stronger association between blood lead and systolic blood pressure, data from two Welsh studies on over 2000 men did not show a statistically significant association. Nevertheless, such statistical association cannot be taken as establishing a causal effect of low-level lead exposure on blood pressure

  12. Hyperkinetic transient ischemic attacks preceding deep ganglionic infarction in a patient with a treated parasellar chondrosarcoma.

    Science.gov (United States)

    Ruff, Michael W; Bhargav, Adip G; English, Stephen W; Klaas, James P

    2018-02-01

    A 44-year-old right-handed female with a past medical history of parasellar chondrosarcoma status post-surgical debulking and proton beam therapy (70 Gy) three years prior to presentation experienced several hours of brief, repetitive episodes of transient hemiballism and dystonia; this was followed by abrupt onset of fixed hemiparesis and dysarthria weeks later, ipsilateral to her prior hyperkinetic movements. She was found to have total occlusion of the right middle cerebral artery with focal stenosis of the proximal right A-1 segment of the anterior cerebral artery adjacent to the remnants of the chondrosarcoma. These focal areas of narrowing were attributed to accelerated atherosclerotic disease, an adverse effect of the radiotherapy used to treat her chondrosarcoma. As treatments improve and mean survival increases for intracranial malignancy, radiation-induced atherosclerotic disease with protean manifestations such as those presented in this case may be encountered more frequently. Copyright © 2017 Elsevier Ltd. All rights reserved.

  13. Coronary heart disease risk in patients with stroke or transient ischemic attack and no known coronary heart disease: findings from the Stroke Prevention by Aggressive Reduction in Cholesterol Levels (SPARCL) trial

    DEFF Research Database (Denmark)

    Amarenco, Pierre; Goldstein, Larry B; Sillesen, Henrik

    2010-01-01

    Noncoronary forms of atherosclerosis (including transient ischemic attacks or stroke of carotid origin or >50% stenosis of the carotid artery) are associated with a 10-year vascular risk of >20% and are considered as a coronary heart disease (CHD) -risk equivalent from the standpoint of lipid...... management. The Stroke Prevention by Aggressive Reduction in Cholesterol Levels (SPARCL) trial included patients with stroke or transient ischemic attack and no known CHD regardless of the presence of carotid atherosclerosis. We evaluated the risk of developing clinically recognized CHD in SPARCL patients....

  14. Depression After Heart Attack

    Science.gov (United States)

    ... Can Be Done to Reduce the Impact of Depression on My Mental and Physical Health? There is some good news here. Depression is ... Can Be Done to Reduce the Impact of Depression on My Mental and Physical Health? What Can I Do About the Depression I’ ...

  15. The prognostic importance of heart failure and age in patients treated with primary angioplasty

    NARCIS (Netherlands)

    Henriques, Jose P. S.; Zijlstra, Felix; de Boer, Menko-Jan; van 't Hof, Arnoud W. J.; Gosselink, A. T. Marcel; Dambrink, Jan-Henk E.; Suryapranata, Harry; Hoorntje, Jan C. A.

    2003-01-01

    Effective risk stratification is essential in the management of patients with acute myocardial infarction. Available models have not yet been studied and validated in patients treated with primary angioplasty for acute myocardial infarction. The prognostic value of heart failure defined by Killip

  16. DAILY CHANGES OF CENTRAL HEMODYNAMICS IN PATIENTS WITH CHRONIC HEART FAILURE WITH NIGHT-TIME DYSPNOEA ATTACK

    Directory of Open Access Journals (Sweden)

    S. A. Dovgolis

    2006-01-01

    Full Text Available Aim. To study daily changes of central hemodynamics (CHD in patients with chronic heart failure (CHF and the effects of therapy. Materials and methods. 22 patients with ischemic heart disease and CHF of III-IV functional class (FC by NYHA, age 60,5±10,5 were observed. Patients were suffering from night-time dyspnoea attacks and had pulmonary artery occlusion pressure (PAOP 15-20 mm Hg. CHD was monitored invasively before the treatment and after 4 weeks of CHF treatment. Results. According to the cardiac index (CI at admission patients were split into two groups. 9 patients of group-I had CI ≤2,15 l\\min\\m2, and 13 patients of group-II had CI >2,15 l\\min\\m2. In patients of group-I CI increased in 4 weeks of treatment. The treatment caused considerable clinical improvement in all patients. The CHD indexes also improved. Initially evening-night-time peaks of PAOP (р≤0,002, systolic (SBP (р≤0,003, diastolic (DBP (р=0,002 and average (BPa (р=0,0007 blood pressure (BP as well as double multiplication (DM (р≤0,008 were registered in patients of group-I. At the end of treatment only evening-night increase in DBP (р=0,002 and BPa (р≤0,006 were noted. In patients of group-II after 4 weeks of treatment CI decreased or didn’t change. Towards 28-th day of treatment 10 patients had clinical improvements. Only one patient’s FC NYHA increased. At the end of treatment the normalization of CHD was registered totally in group. Initially evening-night-time peaks of PAOP (р≤0,002, SBP (р≤0, 0001, CI (р=0,057 and DM (р=0,084 were registered in patients of group-II. At the end of treatment evening-night-time peaks of PAOP (р≤0,015, SBP (р≤0,044, CI (р≤0,005 and DM (р≤0,044 still remained. Besides, evening-night-time peaks of cardiac output (р≤0,01 and systolic index (р≤0, 06 have added. Conclusion. In patients with CHF with initial CI ≤2,15 l\\min\\m2 treatment results in the normalization of CHD and its daily

  17. Heart Disease Risk Factors

    Science.gov (United States)

    ... About CDC.gov . Home About Heart Disease Coronary Artery Disease Heart Attack Heart Attack Signs and Symptoms ... Privacy FOIA No Fear Act OIG 1600 Clifton Road Atlanta , GA 30329-4027 USA 800-CDC-INFO ( ...

  18. Empowered to gain a new foothold in life—A study of the meaning of participating in cardiac rehabilitation to patients afflicted by a minor heart attack

    Directory of Open Access Journals (Sweden)

    Charlotte P. Simonÿ

    2015-12-01

    Full Text Available This study aimed to investigate what it means to patients afflicted by a minor heart attack to participate in cardiac rehabilitation (CR. CR is well-established internationally to support patients towards moving forward in satisfying, healthy, and well-functioning lives. Studies indicate that patients achieve improvement in quality of life when participating in CR. However, knowledge of how patients are supported during CR is sparse. Moreover, knowledge of what participating in CR means to patients afflicted by a minor heart attack is lacking. In-depth knowledge in this area is crucial in order to understand these patients’ particular gains and needs. In a phenomenological-hermeneutic frame field observations, focus group interviews, and individual interviews were conducted among 11 patients during and after their participation in CR. Field notes and transcribed interviews underwent three-phased interpretation. It was found that patients were supported to gain renewed balance in their lives during CR. Three themes were identified: (1 receiving a helpful but limited caring hand, (2 being supported to find new values in life, and (3 developing responsibility for the remaining time. The patients were carefully guided through a difficult time and supported to continue in healthy everyday lives. They were given hope which enabled them to find themselves a new foothold in life with respect to their own sense of well-being. This guidance and a sense of hopefulness were provided by heart specialists and more seasoned heart patients. In conclusion, patients were empowered to achieve a healthier lifestyle and improve their personal well-being during CR. However, structural barriers in the programme prevented adequate support regarding the patients’ total needs. Knowledge of the benefits of CR emphasizes the significance of the programme and highlights the importance of high inclusion. Efforts should be made to develop more flexible and longer lasting

  19. [Mechanism of "treating heart and brain with same methods" based on data science].

    Science.gov (United States)

    Chen, Di; Tang, Shi-huan; Lu, Peng; Yang, Hong-jun

    2015-11-01

    The traditional Chinese medicine (TCM) theory of "treating heart and brain diseases with same methods (Nao Xin Tong Zhi: NXTZ)" has great significance to the treatment of cardiovascular and cerebrovascular diseases. It has been proven effective by a great deal of clinical researches. However, the underlying mechanism for this theory is still unclear. To provide insights into the potential mechanism of "NXTZ", this study attempts to deeply investigate the mechanism from two representative cardiovascular and cerebrovascular diseases, coronary heart disease (CHD) and cerebral apoplexy. First, various data resources were integrated to obtain different types of biomedical entities including drugs, targets, pathways and diseases. Then, three different approaches including text mining, biological network and enrichment analysis were utilized to recognize the potential common features between CHD and cerebral apoplexy, and the corresponding functions of drugs which could treat both diseases, thus unveiling the mechanism of NXTZ.

  20. Pharmacogenetic Risk Stratification in Angiotensin-Converting Enzyme Inhibitor-Treated Patients with Congestive Heart Failure

    DEFF Research Database (Denmark)

    Nelveg-Kristensen, Karl Emil; Busk Madsen, Majbritt; Torp-Pedersen, Christian

    2015-01-01

    BACKGROUND: Evidence for pharmacogenetic risk stratification of angiotensin-converting enzyme inhibitor (ACEI) treatment is limited. Therefore, in a cohort of ACEI-treated patients with congestive heart failure (CHF), we investigated the predictive value of two pharmacogenetic scores...... SNPs of the angiotensin-converting enzyme gene (rs4343) and ABO blood group genes (rs495828 and rs8176746). METHODS: Danish patients with CHF enrolled in the previously reported Echocardiography and Heart Outcome Study were included. Subjects were genotyped and categorized according to pharmacogenetic.......05 [95% CI 0.79-1.40]), respectively. CONCLUSIONS: We found no association between either of the analyzed pharmacogenetic scores and fatal outcomes in ACEI-treated patients with CHF....

  1. Analyse in the patients with refractory heart purification treated by continuous blood purification

    International Nuclear Information System (INIS)

    Cai Xun; Huang Chengwen; Huang Zhongliang

    2006-01-01

    Objective: To investigate the application of continuous blood purification (CBP) and the effect of the angiotensin II (Ang II), aldosterone (ALD), atrial natriuretic peptide (ANP) in plasma with refractory heart failure (RHF) treated by CBP. Methods: 35 cases with RHF were treated by CBP. Blood pressure, heart rate, respiration, blood oxygen saturation, blood markers of biochemistry, blood gas analysis, left ventricle ejection fraction (LVEF), cardiac function and Ang II, ALD, ANF in plasma were checked before and after treatment. Results: the systolic pressure, diastolic pressure, heart rate, respiration, serum creatinine, blood urea nitroge, Ang II, ALD, ANF in plasma after treatment were significantly lower than those before treatment of CBP (P 3 - , PaO 2 , LVEF after treatment were significantly higher than those before treatment of CBP (P + , Na + , Cl - of blood serum were recovered normal after treatment, and cardiac function was recovered (P<0.05, P<0.01). Conclusion: In the patients with RHF, CBP can efficiently treat the water-electrolyte disturbance, keep the acid-base balance, decrease the levels of AngII, ALD, ANF in plasma, clear the inflammatory mediator and improve cardiac function. (authors)

  2. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... major stroke. It's important to call 9-1-1 immediately for any stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. The content in this ...

  3. Treatment-resistant hypertension and the incidence of cardiovascular disease and end-stage renal disease: results from the Antihypertensive and Lipid-Lowering Treatment to Prevent Heart Attack Trial (ALLHAT).

    Science.gov (United States)

    Muntner, Paul; Davis, Barry R; Cushman, William C; Bangalore, Sripal; Calhoun, David A; Pressel, Sara L; Black, Henry R; Kostis, John B; Probstfield, Jeffrey L; Whelton, Paul K; Rahman, Mahboob

    2014-11-01

    Apparent treatment-resistant hypertension (aTRH) is defined as uncontrolled hypertension despite the use of ≥3 antihypertensive medication classes or controlled hypertension while treated with ≥4 antihypertensive medication classes. Although a high prevalence of aTRH has been reported, few data are available on its association with cardiovascular and renal outcomes. We analyzed data on 14 684 Antihypertensive and Lipid-Lowering Treatment to Prevent Heart Attack Trial (ALLHAT) participants to determine the association between aTRH (n=1870) with coronary heart disease, stroke, all-cause mortality, heart failure, peripheral artery disease, and end-stage renal disease. We defined aTRH as blood pressure not at goal (systolic/diastolic blood pressure ≥140/90 mm Hg) while taking ≥3 classes of antihypertensive medication or taking ≥4 classes of antihypertensive medication with blood pressure at goal during the year 2 ALLHAT study visit (1996-2000). Use of a diuretic was not required to meet the definition of aTRH. Follow-up occurred through 2002. The multivariable adjusted hazard ratios (95% confidence intervals) comparing participants with versus without aTRH were as follows: coronary heart disease (1.44 [1.18-1.76]), stroke (1.57 [1.18-2.08]), all-cause mortality (1.30 [1.11-1.52]), heart failure (1.88 [1.52-2.34]), peripheral artery disease (1.23 [0.85-1.79]), and end-stage renal disease (1.95 [1.11-3.41]). aTRH was also associated with the pooled outcomes of combined coronary heart disease (hazard ratio, 1.47; 95% confidence interval, 1.26-1.71) and combined cardiovascular disease (hazard ratio, 1.46; 95% confidence interval, 1.29-1.64). These results demonstrate that aTRH increases the risk for cardiovascular disease and end-stage renal disease. Studies are needed to identify approaches to prevent aTRH and reduce risk for adverse outcomes among individuals with aTRH. © 2014 American Heart Association, Inc.

  4. Heart Failure Treated with Low-dose Milrinone in a Full-term Newborn

    Directory of Open Access Journals (Sweden)

    S. Šebková

    2012-01-01

    Full Text Available A term newborn with a hypocontractile myocardium complicating persistent pulmonary hypertension of the newborn was successfully treated with a low-dose phosphodiesterase III inhibitor milrinone. Echocardiography diagnosed heart failure with a left ventricular ejection fraction of 35% and a left ventricular shortening fraction of 18% and severe persistent pulmonary hypertension of the newborn with oxygenation index of 28. Milrinone was started at an initial dose of 50 mcg/kg, followed by continuous infusion of 0.20 mcg/kg/min. With lowdose milrinone oxygenation index decreased to 3 within 6 hours, left ventricular ejection fraction and left ventricular shortening fraction increased to 57%, and 30%, respectively. Low doses of milrinone might be promising in the treatment of heart failure and persistent pulmonary hypertension of the newborn in term newborns.

  5. Heart failure treated with low-dose milrinone in a full-term newborn.

    Science.gov (United States)

    Sebková, S; Tomek, V; Zemanová, P; Janota, J

    2012-01-01

    A term newborn with a hypocontractile myocardium complicating persistent pulmonary hypertension of the newborn was successfully treated with a low-dose phosphodiesterase III inhibitor milrinone. Echocardiography diagnosed heart failure with a left ventricular ejection fraction of 35% and a left ventricular shortening fraction of 18% and severe persistent pulmonary hypertension of the newborn with oxygenation index of 28. Milrinone was started at an initial dose of 50 mcg/kg, followed by continuous infusion of 0.20 mcg/kg/min. With lowdose milrinone oxygenation index decreased to 3 within 6 hours, left ventricular ejection fraction and left ventricular shortening fraction increased to 57%, and 30%, respectively. Low doses of milrinone might be promising in the treatment of heart failure and persistent pulmonary hypertension of the newborn in term newborns.

  6. The association of a heart attack or stroke with depressive symptoms stratified by the presence of a close social contact: findings from the National Health and Aging Trends Study Cohort.

    Science.gov (United States)

    Simning, Adam; Seplaki, Christopher L; Conwell, Yeates

    2018-01-01

    The objective of the study is to examine whether the risk of having clinically significant depressive symptoms following a heart attack or stroke varies by the presence of a close social contact. The National Health and Aging Trends Study is a nationally representative longitudinal survey of US Medicare beneficiaries aged 65 and older initiated in 2011. A total of 5643 older adults had information on social contacts at baseline and depressive symptoms at the 1-year follow-up interview. The two-item Patient Health Questionnaire identified clinically significant depressive symptoms. Interview questions examined social contacts and the presence of self-reported heart attack or stroke during the year of follow-up. A total of 297 older adults reported experiencing a heart attack and/or stroke between their baseline and follow-up interviews. In regression analyses accounting for sociodemographics, baseline depressive symptoms, medical comorbidity, and activities of daily living impairment, older adults with no close social contacts had increased odds of depressive symptoms at follow-up after experiencing a heart attack or stroke, while those with close social contacts had increased odds of depressive symptoms at follow-up after experiencing a stroke, but not a heart attack. Older adults have increased odds of having depressive symptoms following a self-reported stroke, but only those with no close social contacts had increased odds of depressive symptoms following a heart attack. Social networks may play a role in the mechanisms underlying depression among older adults experiencing certain acute health events. Future work exploring the potential causal relationships suggested here, if confirmed, could inform interventions to alleviate or prevent depression among at risk older adults. Copyright © 2017 John Wiley & Sons, Ltd. Copyright © 2017 John Wiley & Sons, Ltd.

  7. Long-Term Outcome in Levothyroxine Treated Patients With Subclinical Hypothyroidism and Concomitant Heart Disease.

    Science.gov (United States)

    Andersen, Mette Nygaard; Olsen, Anne-Marie Schjerning; Madsen, Jesper Clausager; Kristensen, Søren Lund; Faber, Jens; Torp-Pedersen, Christian; Gislason, Gunnar H; Selmer, Christian

    2016-11-01

    Subclinical hypothyroidism is a common condition that may lead to impaired cardiac function. This study sought to examine the effects of levothyroxine treatment in patients with subclinical hypothyroidism and heart disease. This was a register-based historical cohort study. The study was composed of Danish primary care patients and hospital outpatients age 18 years and older with established heart disease who were diagnosed with subclinical hypothyroidism in 1997-2011. Patients were stratified according to whether they claimed a subsequent prescription of levothyroxine. Event rates and incidence rate ratios (IRR) were calculated by use of time-dependent multivariable Poisson regression models. Measures included all-cause mortality and major adverse cardiac events (MACEs), defined as cardiovascular death, fatal or nonfatal myocardial infaction and stroke, and all-cause hospital admissions. Of 61 611 patients with a diagnosis of cardiac disease having their first time thyroid function testing, 1192 patients with subclinical hypothyroidism (mean age 73.6 [SD ± 13.3] y, 63.8% female) were included, of whom 136 (11.4%) were treated with levothyroxine. During a median follow-up time of 5.6 y (interquartile range, 6.5 y), 694 (58.2%) patients died. Patients treated with levothyroxine displayed no significantly increased risk of all-cause mortality (adjusted IRR, 1.17; 95% confidence interval [CI], 0.90-1.52), MACE (adjusted IRR, 1.08; 95% CI, 0.80-1.45), or hospital admission (adjusted IRR, 0.94; 95% CI, 0.71-1.24), when compared with patients not treated with levothyroxine. Levothyroxine treatment in patients with subclinical hypothyroidism and heart disease was not associated with a significant benefit nor risk of all-cause mortality, MACE, or hospital admission in this large real-world cohort study.

  8. Heart Rate Variability in Patients with Chronic Obstructive Pulmonary Disease Treated by Noninvasive Mechanic Ventilation

    Directory of Open Access Journals (Sweden)

    Zekeriya Küçükdurmaz

    2011-08-01

    Full Text Available Aims: This study aimed to investigate heart rate variability (HRV of patients with severe COPD who are treated by noninvasive mechanic ventilation (NIMV.Patients and Method: Twenty-seven patient (58±8 years, 9 F with severe COPD treated by nocturnal NIMV at home and 23 sex and age matched volunteers (56±8 years, 11 F who has not dyspnea as a control group recruited in the study. Subjects underwent spirometry, blood gas analysis, transthoracic echocardiography, 24 hours ambulatory ECG analysis. Time domain HRV analysis performed from ambulatory ECG records. Results: 52% of patients at NYHA functional class II, 36% at class III, and 12% at class IV when they have been treated by NIMV. Groups were similar for age and sex (p>0.05 for both. Heart rates of patients were higher significantly than controls’ (p0.05. But, systolic pulmonary pressures were higher of COPD group (p<0.01. 24 hours heart rate was higher, and standard deviation of normal R-R intervals (SDNN 24 hours, SDNN night, SDNN day, SDNN index (SDNNI and standard deviation of mean R-R intervals (SDANNI values were lower in COPD group significantly. SDNN was inversely correlated with duration of daily NIMV usage, intensive care unit administration and entubation rate and PaCO2. SDNNI was inversely correlated with functional class, duration of daily NIMV usage, intensive care unit administration rate and PaCO2. Else, SDNNI was correlated with predicted forced vital capacity % (FVC% and predicted forced expiratory volume at 1 second % (FEV1%.Conclusion: Time domain HRV decreases in patients with severe COPD. Decrease is correlated with severity of disease, and it presents in despite of the chronic nocturnal NIMV application. These patients have high risk for cardiovascular morbidity and mortality and should be monitored and manegement for cardiovascular events.

  9. Heart disease and diet

    Science.gov (United States)

    Diet - heart disease; CAD - diet; Coronary artery disease - diet; Coronary heart disease - diet ... diet and lifestyle can reduce your risk of: Heart disease, heart attacks, and stroke Conditions that lead ...

  10. Long-Term Effects and Prognosis in Acute Heart Failure Treated with Tolvaptan: The AVCMA Trial

    Directory of Open Access Journals (Sweden)

    Satoshi Suzuki

    2014-01-01

    Full Text Available Background. Diuresis is a major therapy for the reduction of congestive symptoms in acute decompensated heart failure (ADHF patients. We previously reported the efficacy and safety of tolvaptan compared to carperitide in hospitalized patients with ADHF. There were some reports of cardio- and renal-protective effects in carperitide; therefore, the purpose of this study was to compare the long-term effects of tolvaptan and carperitide on cardiorenal function and prognosis. Methods and Results. One hundred and five ADHF patients treated with either tolvaptan or carperitide were followed after hospital discharge. Levels of plasma B-type natriuretic peptide, serum sodium, potassium, creatinine, and estimated glomerular filtration rate were measured before administration of tolvaptan or carperitide at baseline, the time of discharge, and one year after discharge. These data between tolvaptan and carperitide groups were not different one year after discharge. Kaplan-Meier survival curves demonstrated that the event-free rate regarding all events, cardiac events, all cause deaths, and rehospitalization due to worsening heart failure was not significantly different between tolvaptan and carperitide groups. Conclusions. We demonstrated that tolvaptan had similar effects on cardiac and renal function and led to a similar prognosis in the long term, compared to carperitide.

  11. How are patients with heart failure treated in primary care?
.

    Science.gov (United States)

    Vaillant-Roussel, Hélène; Pereira, Bruno; Gibot-Boeuf, Sylvaine; Eschalier, Romain; Dubray, Claude; Boussageon, Rémy; Vorilhon, Philippe

    2018-05-24

    The aim of this study was to assess the adherence of general practitioners (GPs) to guidelines in patients with heart failure with reduced ejection fraction (HFrEF) and to describe GPs' prescribing behavior regarding patients with heart failure with preserved ejection fraction (HFpEF). Cross-sectional study as part of the ETIC trial. Five classes of drugs were described: angiotensin-converting enzyme inhibitors (ACEIs) or angiotensin receptor blockers (ARBs); β-blockers (BBs); mineralocorticoid receptor antagonists (MRAs); diuretics (thiazide or loop diuretics); and digoxin. 178 patients were studied: their mean age was 73.5 years (± 10.6). Of the 128 patients with HFpEF, 81.3% received ACEIs or ARBs, 63.3% received BBs, 13.3% received MRAs, 75.8% received diuretics, and 12.5% received digoxin. Of the 50 patients with HFrEF, 84% received ACEIs or ARBs, 74% received BBs, 20% received MRAs, 76% received diuretics, and 2% received digoxin. 25% of the patients were given a drug in accordance with the recommendations for drug class but not a drug authorized for the HFrEF indication. Among the patients with HFrEF who were treated in accordance with the recommendations, target doses were achieved in 1/3 given ACEIs/ARBs, 1/4 given BBs, and 1/2 given MRAs. Only 6% of the patients had a perfect Global Adherence Indicator-3 (GAI-3) with all target doses achieved. Several drugs were prescribed even though they were not recommended, and few patients were treated optimally. It seems to be necessary to develop a pragmatic tool to help GPs and cardiologists in optimizing treatment.
.

  12. Heart Health - Heart Disease: Symptoms, Diagnosis, Treatment

    Science.gov (United States)

    ... Bar Home Current Issue Past Issues Cover Story Heart Health Heart Disease: Symptoms, Diagnosis, Treatment Past Issues / Winter 2009 ... of this page please turn Javascript on. Most heart attacks happen when a clot in the coronary ...

  13. A clinical trial protocol to treat massive Africanized honeybee (Apis mellifera) attack with a new apilic antivenom.

    Science.gov (United States)

    Barbosa, Alexandre Naime; Boyer, Leslie; Chippaux, Jean-Philippe; Medolago, Natalia Bronzatto; Caramori, Carlos Antonio; Paixão, Ariane Gomes; Poli, João Paulo Vasconcelos; Mendes, Mônica Bannwart; Dos Santos, Lucilene Delazari; Ferreira, Rui Seabra; Barraviera, Benedito

    2017-01-01

    Envenomation caused by multiple stings from Africanized honeybees Apis mellifera constitutes a public health problem in the Americas. In 2015, the Brazilian Ministry of Health reported 13,597 accidents (incidence of seven cases per 100,000 inhabitants) with 39 deaths (lethality of 0.25%). The toxins present in the venom, which include melittin and phospholipase A 2 , cause lesions in diverse organs and systems that may be fatal. As there has been no specific treatment to date, management has been symptomatic and supportive only. In order to evaluate the safety and neutralizing capacity of a new apilic antivenom, as well as to confirm its lowest effective dose, a clinical protocol was developed to be applied in a multicenter, non-randomized and open phase I/II clinical trial. Twenty participants with more than five stings, aged more than 18 years, of both sexes, who have not previously received the heterologous serum against bee stings, will be included for 24 months. The proposed dose was based on the antivenom neutralizing capacity and the number of stings. Treatment will be administered only in a hospital environment and the participants will be evaluated for a period up to 30 days after discharge for clinical and laboratory follow-up. This protocol, approved by the Brazilian regulatory agencies for ethics (National Commission for Ethics on Research - CONEP) and sanitation (National Health Surveillance Agency - ANVISA), is a guideline constituted by specific, adjuvant, symptomatic and complementary treatments, in addition to basic orientations for conducting a clinical trial involving heterologous sera. This is the first clinical trial protocol designed specifically to evaluate the preliminary efficacy and safety of a new antivenom against stings from the Africanized honeybee Apis mellifera . The results will support future studies to confirm a new treatment for massive bee attack that has a large impact on public health in the Americas.

  14. Insomnia Due to Deficiency of Both the Heart and Spleen Treated by Acupuncture-Moxibustion and Chinese Tuina

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    Objective: To observe therapeutic effects of the comprehensive therapy of acupuncture-moxibustion and Chinese Tuina for treatment of insomnia due to deficiency of both the heart and spleen. Methods: 92 cases were divided randomly into the treatment group (treated by acupuncture-moxibustion and Chinese Tuina) and the control group (treated by acupuncture-moxibustion). Results: The therapeutic effect of the treatment group was obviously superior to that of the control group (the χ2 test showed P<0.01). Conclusions: The comprehensive therapy of acupuncture-moxibustion and Chinese Tuina can give marked therapeutic effects for treatment of insomnia due to deficiency of both the heart and spleen.

  15. Can we monitor heart attack in the troponin era: evidence from a population-based cohort study

    Directory of Open Access Journals (Sweden)

    Rankin Jamie M

    2011-06-01

    Full Text Available Abstract Background Troponins (highly sensitive biomarkers of myocardial damage increase counts of myocardial infarction (MI in clinical practice, but their impact on trends in admission rates for MI in National statistics is uncertain. Methods Cases coded as MI or other cardiac diagnoses in the Hospital Morbidity Data Collection (MI-HMDC in Western Australia in 1998 and 2003 were classified using revised criteria for MI developed by an International panel convened by the American Heart Association (AHA criteria using information on symptoms, ECGs and cardiac biomarkers abstracted from samples of medical notes. Age-sex standardized rates of MI-HMDC were compared with rates of MI based on AHA criteria including troponins (MI-AHA or traditional biomarkers only (MI-AHAck. Results Between 1998 and 2003, rates of MI-HMDC decreased by 3.5% whereas rates of MI-AHA increased by 17%, a difference largely due to increased false-negative cases in the HMDC associated with marked increased use of troponin tests in cardiac admissions generally, and progressively lower test thresholds. In contrast, rates of MI-AHAck declined by 18%. Conclusions Increasing misclassification of MI-AHA by the HMDC may be due to reluctance by clinicians to diagnose MI based on relatively small increases in troponin levels. These influences are likely to continue. Monitoring MI using AHA criteria will require calibration of commercially available troponin tests and agreement on lower diagnostic thresholds for epidemiological studies. Declining rates of MI-AHAck are consistent with long-standing trends in MI in Western Australia, suggesting that neither MI-HMDC nor MI-AHA reflect the true underlying population trends in MI.

  16. Intellectual functioning in children with congenital heart defects treated with surgery or by catheter interventions

    Directory of Open Access Journals (Sweden)

    Carmen Ryberg

    2016-11-01

    Full Text Available Background: Studies suggest that children with congenital heart defects (CHD are at risk for adverse intellectual functioning. However, factors related to lower intellectual functioning in this group are largely unknown. This study describes intellectual functioning in children with CHD in relation to severity of the heart defect, the child´s age and the socioeconomic status of the family (SES.Methods: 228 children treated with surgery or by catheter technique were tested using the Wechsler intelligence scales to determine Full Scale IQ (FSIQ. FSIQ was then analyzed in relation to age (3- 5- , 9-, and 15-year-olds, severity of the diagnosis (mild, moderate, and severe, and SES (low, medium, and high. The median age was 70 months (5.8 years with a range of 162 months (30 months (2.5 years to 192 months (16.0 years. Results: The total mean score on FSIQ was 100.8 (SD = 14.5. Children with severe CHD had significantly lower FSIQ than children with mild and moderate CHD, and 9- and 15-year-olds had significantly lower FSIQ compared to the 3-year-olds. Children from families with low SES had significantly lower FSIQ than children from medium SES and high SES families. No interaction between severity of diagnosis, age, and SES was found for FSIQ.Conclusions: 83% of the children with CHD performed at or above average with respect to FSIQ. SES and severity of diagnosis had significant main effects on FSIQ. These factors should be considered when planning interventions and follow-up programs for children with CHD.

  17. Nocturnal heart rate variability in patients treated with cognitive-behavioral therapy for insomnia.

    Science.gov (United States)

    Jarrin, Denise C; Chen, Ivy Y; Ivers, Hans; Lamy, Manon; Vallières, Annie; Morin, Charles M

    2016-06-01

    Insomnia and reduced heart rate variability (HRV) increase the risk of cardiovascular disease and its precursors; thus, it is important to evaluate whether treatment for insomnia provides cardiovascular safeguards. The present study aimed to evaluate potential cardiovascular benefits of cognitive behavioral therapy for insomnia (CBT-I). The present study included 65 patients treated for chronic insomnia (M = 51.8 years, SD = 10.0; 66.2% female) at a university hospital. Patients received CBT-I over a 6-week period, and change scores from pre- to posttreatment derived from the Insomnia Severity Index, sleep diary, and polysomnography (PSG) were used as indices of sleep improvement. HRV variables (i.e., low frequency [LF], high frequency [HF], and the ratio of low to high frequency [LF:HF ratio]) were derived for Stage 2 (S2) and rapid-eye movement (REM) sleep at pre- and posttreatment. High HF (i.e., parasympathetic activity) and/or low LF:HF ratio (i.e., sympathovagal balance) were used as indices of HRV improvement. Following therapy, sleep improvements, particularly for sleep onset latency, were related with reduced HF in S2 (r = .30, p insomnia symptoms and increased HF in REM (r = -.21, p insomnia treatment might play a role in physiological changes associated with cardiovascular anomalies. Future research is needed to examine the long-term impact of treatment as a preventative tool against insomnia-related morbidity. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  18. Efficacy of a Community-Based Physical Activity Program KM2H2 for Stroke and Heart Attack Prevention among Senior Hypertensive Patients: A Cluster Randomized Controlled Phase-II Trial.

    Directory of Open Access Journals (Sweden)

    Jie Gong

    Full Text Available To evaluate the efficacy of the program Keep Moving toward Healthy Heart and Healthy Brain (KM2H2 in encouraging physical activities for the prevention of heart attack and stroke among hypertensive patients enrolled in the Community-Based Hypertension Control Program (CBHCP.Cluster randomized controlled trial with three waves of longitudinal assessments at baseline, 3 and 6 months post intervention.Community-based and patient-centered self-care for behavioral intervention in urban settings of China.A total of 450 participants diagnosed with hypertension from 12 community health centers in Wuhan, China were recruited, and were randomly assigned by center to receive either KM2H2 plus standard CBHCP care (6 centers and 232 patients or the standard care only (6 centers and 218 patients.KM2H2 is a behavioral intervention guided by the Transtheoretical Model, the Model of Personalized Medicine and Social Capital Theory. It consists of six intervention sessions and two booster sessions engineered in a progressive manner. The purpose is to motivate and maintain physical activities for the prevention of heart attack and stroke.Heart attack and stroke (clinically diagnosed, primary outcome, blood pressure (measured, secondary outcome, and physical activity (self-report, tertiary outcome were assessed at the individual level during the baseline, 3- and 6-month post-intervention.Relative to the standard care, receiving KM2H2 was associated with significant reductions in the incidence of heart attack (3.60% vs. 7.03%, p < .05 and stroke (5.11% vs. 9.90%, p<0.05, and moderate reduction in blood pressure (-3.72 mmHg in DBP and -2.92 mmHg in DBP at 6-month post-intervention; and significant increases in physical activity at 3- (d = 0.53, 95% CI: 0.21, 0.85 and 6-month (d = 0.45, 95% CI: 0.04, 0.85 post-intervention, respectively.The program KM2H2 is efficacious to reduce the risk of heart attack and stroke among senior patients who are on anti

  19. Heart-Health Screenings

    Science.gov (United States)

    ... Tools For Your Heart Health • Watch, Learn & Live Animations Library Subscribe to Heart Insight magazine and monthly ... in Spanish . Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  20. Heart disease and depression

    Science.gov (United States)

    ... gov/ency/patientinstructions/000790.htm Heart disease and depression To use the sharing features on this page, ... a heart attack or heart surgery Signs of Depression It is pretty common to feel down or ...

  1. The correlation between psychological intervention and heart rate,systolic pressure in patients of cervical cancer treated with interventional chemoembolization

    International Nuclear Information System (INIS)

    Qiao Cuiyun; Lan Guiyun; Liu Shuang; Chen Bao'e; Liu Yali; Wang Zhujun

    2010-01-01

    Objective: To discuss the effect of psychological intervention on the heart rate, systolic pressure of the patients with cervical cancer who are treated with interventional chemoembolization. Methods: Eighty patients with cervical cancer were randomly and equally divided into two groups. Transcatheter arterial chemoembolization (TACE) was performed in all cases. Patients in study group (n=10) received systemic psychological intervention 30 minutes before TACE. The heart rate and systolic pressure of the patients were measured when TACE started. The results were compared with that obtained at the time of admission. Patients in control group (n=10) did not receive systemic psychological intervention before TACE and their heart rate and systolic pressure were measured in the same way as in study group. Results: At the time TACE started the heart rate and systolic pressure of the patients in study group were significantly lower than that in control group (P < 0.05). Conclusion: Preoperative psychological intervention is very helpful for reducing psychological stress and mental tension,in stabilizing heart rate and systolic pressure of the patients with cervical cancer who are treated with TACE. (authors)

  2. Baseline Quality of Life and Risk of Stroke in the ALLHAT Study (Antihypertensive and Lipid-Lowering Treatment to Prevent Heart Attack Trial).

    Science.gov (United States)

    Shams, Tanzila; Auchus, Alexander P; Oparil, Suzanne; Wright, Clinton B; Wright, Jackson; Furlan, Anthony J; Sila, Cathy A; Davis, Barry R; Pressel, Sara; Yamal, Jose-Miguel; Einhorn, Paula T; Lerner, Alan J

    2017-11-01

    The visual analogue scale is a self-reported, validated tool to measure quality of life (QoL). Our purpose was to determine whether baseline QoL predicted strokes in the ALLHAT study (Antihypertensive and Lipid Lowering Treatment to Prevent Heart Attack Trial) and evaluate determinants of poststroke change in QoL. In the ALLHAT study, among the 33 357 patients randomized to treatment arms, 1525 experienced strokes; 1202 (79%) strokes were nonfatal. This study cohort includes 32 318 (97%) subjects who completed the baseline visual analogue scale QoL estimate. QoL was measured on a visual analogue scale and adjusted using a Torrance transformation (transformed QoL [TQoL]). Kaplan-Meier curves and adjusted proportional hazards analyses were used to estimate the effect of TQoL on the risk of stroke, on a continuous scale (0-1) and by quartiles (≤0.81, >0.81≤0.89, >0.89≤0.95, >0.95). We analyzed the change from baseline to first poststroke TQoL using adjusted linear regression. After adjusting for multiple stroke risk factors, the hazard ratio for stroke events for baseline TQoL was 0.93 (95% confidence interval, 0.89-0.98) per 0.1 U increase. The lowest baseline TQoL quartile had a 20% increased stroke risk (hazard ratio=1.20 [95% confidence interval, 1.00-1.44]) compared with the reference highest quartile TQoL. Poststroke TQoL change was significant within all treatment groups ( P ≤0.001). Multivariate regression analysis revealed that baseline TQoL was the strongest predictor of poststroke TQoL with similar results for the untransformed QoL. The lowest baseline TQoL quartile had a 20% higher stroke risk than the highest quartile. Baseline TQoL was the only factor that predicted poststroke change in TQoL. URL: http://www.clinicaltrials.gov. Unique identifier: NCT00000542. © 2017 American Heart Association, Inc.

  3. Risks for Heart Disease & Stroke

    Science.gov (United States)

    ... Prevent Risks for Heart Disease & Stroke Risks for Heart Disease & Stroke About 1.5 million heart attacks and ... can’t change some of your risks for heart disease and stroke, but you can manage many of ...

  4. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants....

  5. Collagen tissue treated with chitosan solutions in carbonic acid for improved biological prosthetic heart valves

    International Nuclear Information System (INIS)

    Gallyamov, Marat O.; Chaschin, Ivan S.; Khokhlova, Marina A.; Grigorev, Timofey E.; Bakuleva, Natalia P.; Lyutova, Irina G.; Kondratenko, Janna E.; Badun, Gennadii A.; Chernysheva, Maria G.; Khokhlov, Alexei R.

    2014-01-01

    Calcification of bovine pericardium dramatically shortens typical lifetimes of biological prosthetic heart valves and thus precludes their choice for younger patients. The aim of the present work is to demonstrate that the calcification is to be mitigated by means of treatment of bovine pericardium in solutions of chitosan in carbonic acid, i.e. water saturated with carbon dioxide at high pressure. This acidic aqueous fluid unusually combines antimicrobial properties with absolute biocompatibility as far as at normal pressure it decomposes spontaneously and completely into H 2 O and CO 2 . Yet, at high pressures it can protonate and dissolve chitosan materials with different degrees of acetylation (in the range of 16–33%, at least) without any further pretreatment. Even exposure of the bovine pericardium in pure carbonic acid solution without chitosan already favours certain reduction in calcification, somewhat improved mechanical properties, complete biocompatibility and evident antimicrobial activity of the treated collagen tissue. The reason may be due to high extraction ability of this peculiar compressed fluidic mixture. Moreover, exposure of the bovine pericardium in solutions of chitosan in carbonic acid introduces even better mechanical properties and highly pronounced antimicrobial activity of the modified collagen tissue against adherence and biofilm formation of relevant Gram-positive and Gram-negative strains. Yet, the most important achievement is the detected dramatic reduction in calcification for such modified collagen tissues in spite of the fact that the amount of the thus introduced chitosan is rather small (typically ca. 1 wt.%), which has been reliably detected using original tritium labelling method. We believe that these improved properties are achieved due to particularly deep and uniform impregnation of the collagen matrix with chitosan from its pressurised solutions in carbonic acid. - Highlights: • Treatment of GA-stabilised bovine

  6. Adults with Congenital Heart Defects

    Science.gov (United States)

    ... Ebstein's Anomaly l-Transposition of the Great Arteries Patent Ductus Arteriosus (PDA) Pulmonary Valve Stenosis and Regurgitation ... Sodium and Salt 3 Heart Attack Symptoms in Women 4 Warning Signs of a Heart Attack 5 ...

  7. Understanding the C-pulse device and its potential to treat heart failure.

    Science.gov (United States)

    Sales, Virna L; McCarthy, Patrick M

    2010-03-01

    The Sunshine Heart C-Pulse (C-Pulse; Sunshine Heart Inc., Tustin, CA) device is an extra-aortic implantable counterpulsation pump designed as a non-blood contacting ambulatory heart assist device, which may provide relief from symptoms for class II-III congestive heart failure patients. It has a comparable hemodynamic augmentation to intra-aortic balloon counterpulsation devices. The C-Pulse cuff is implanted through a median sternotomy, secured around the ascending aorta, and pneumatically driven by an external system controller. Pre-clinical studies in the acute pig model, and initial temporary clinical studies in patients undergoing off-pump coronary bypass surgery have shown substantial increase in diastolic perfusion of the coronary vessels, which translated to a favorable improvement in ventricular function. A U.S. prospective multi-center trial to evaluate the safety and efficacy of the C-Pulse in class III patients with moderate heart failure is now in progress.

  8. How should we manage heart failure developing in patients already treated with angiotensin-converting enzyme inhibitors and beta-blockers for hypertension, diabetes or coronary disease?

    DEFF Research Database (Denmark)

    Gustafsson, Finn; Segura, Julian; Ruilope, Luis M

    2010-01-01

    An increasing number of patients in the community are being treated with angiotensin-converting enzyme (ACE) inhibitors, angiotensin receptor blockers (ARBs) and beta-blockers for hypertension, coronary disease or diabetic renal and vascular complications. Some of these patients will develop heart...... failure despite such treatment. Based on data from hypertension trials it can be estimated that approximately 5% of treated patients will develop heart failure over 5 years. It is unclear whether patients developing heart failure on and off ACE-inhibitors or beta-blockers, respectively, at the time...... of heart failure diagnosis have similar prognosis.Treatment options for patients developing heart failure while already treated with ACE inhibitors/ARBs and beta-blockers are very limited if current heart failure guidelines are followed. In this review possible strategies are outlined and important areas...

  9. Medical Tests and Procedures for Finding and Treating Heart and Blood Vessel Disease

    Science.gov (United States)

    ... Coronary calcium scan Health care providers use electron-beam computed tomography (to-MOG-rah-fee) (EBCT) or ... how the heart performs during activity, such as walking on a moving treadmill. A medication stress test ...

  10. Pharmaceutical interventions to influence arteriogenesis: new concepts to treat ischemic heart disease

    NARCIS (Netherlands)

    Hoefer, Imo E.; Piek, Jan J.; Pasterkamp, Gerard

    2006-01-01

    Despite the technical progress in interventional techniques to overcome the harmful effects of ischemic heart disease there is still an urgent need for alternative, pharmaceutical treatment modalities. Exogenous stimulation of vessel growth, i.e. vasculogenesis, angiogenesis or arteriogenesis serves

  11. Prolongation of rat heart allografts by donor-specific blood transfusion treated with ultraviolet irradiation

    International Nuclear Information System (INIS)

    Oluwole, S.F.; Iga, C.; Lau, H.; Hardy, M.A.

    1985-01-01

    The effect of donor-specific blood transfusion was compared to that of UVB-irradiated donor-specific blood transfusion on heart allograft survival in inbred rats with major histocompatibility differences. In one series ACI rats received heterotopic heart grafts from Lewis rats and 1 mL transfusion of donor-type blood at 1, 2, and 3 weeks prior to the transplantation. Fifty percent of the grafts were permanently accepted (survival greater than 200 days). Following UVB-irradiated donor-specific blood transfusion, 55% of the grafts survived indefinitely. In a mixed lymphocyte reaction ACI lymphocytes are weak responders to Lewis lymphocytes. In another series, Lewis rats received ACI hearts. Donor-specific transfusions at 1, 2, and 3 weeks prior to transplantation did not significantly alter the survival of heart allografts. Lewis lymphocytes react strongly to ACI stimulator cells in a mixed lymphocyte reaction. However, when the donor blood was UVB-irradiated prior to transfusion, the ACI allograft survival was significantly prolonged in this ACI-to-Lewis strain combination. When Lewis rats received W/F hearts following either donor-specific or UVB-irradiated donor-specific transfusions, the hearts' survival was similarly and significantly prolonged, but did not become permanent. Mixed lymphocyte reaction reveals that the stimulation index of Lewis lymphocytes against W/F lymphocytes is greater than that of ACI versus Lewis, but is less than that between Lewis responder cells against ACI stimulators

  12. Collagen tissue treated with chitosan solutions in carbonic acid for improved biological prosthetic heart valves

    Energy Technology Data Exchange (ETDEWEB)

    Gallyamov, Marat O., E-mail: glm@spm.phys.msu.ru [Faculty of Physics, Lomonosov Moscow State University, Leninskie gory 1–2, Moscow 119991 (Russian Federation); Nesmeyanov Institute of Organoelement Compounds, Russian Academy of Sciences, Vavilova 28, Moscow 119991 (Russian Federation); Chaschin, Ivan S. [Nesmeyanov Institute of Organoelement Compounds, Russian Academy of Sciences, Vavilova 28, Moscow 119991 (Russian Federation); Khokhlova, Marina A. [Faculty of Physics, Lomonosov Moscow State University, Leninskie gory 1–2, Moscow 119991 (Russian Federation); Grigorev, Timofey E. [Nesmeyanov Institute of Organoelement Compounds, Russian Academy of Sciences, Vavilova 28, Moscow 119991 (Russian Federation); Bakuleva, Natalia P.; Lyutova, Irina G.; Kondratenko, Janna E. [Bakulev Scientific Center for Cardiovascular Surgery of the Russian Academy of Medical Sciences, Roublyevskoe Sh. 135, Moscow 121552 (Russian Federation); Badun, Gennadii A.; Chernysheva, Maria G. [Radiochemistry Division, Faculty of Chemistry, Lomonosov Moscow State University, Leninskie gory 1–2, Moscow 119991 (Russian Federation); Khokhlov, Alexei R. [Faculty of Physics, Lomonosov Moscow State University, Leninskie gory 1–2, Moscow 119991 (Russian Federation); Nesmeyanov Institute of Organoelement Compounds, Russian Academy of Sciences, Vavilova 28, Moscow 119991 (Russian Federation)

    2014-04-01

    Calcification of bovine pericardium dramatically shortens typical lifetimes of biological prosthetic heart valves and thus precludes their choice for younger patients. The aim of the present work is to demonstrate that the calcification is to be mitigated by means of treatment of bovine pericardium in solutions of chitosan in carbonic acid, i.e. water saturated with carbon dioxide at high pressure. This acidic aqueous fluid unusually combines antimicrobial properties with absolute biocompatibility as far as at normal pressure it decomposes spontaneously and completely into H{sub 2}O and CO{sub 2}. Yet, at high pressures it can protonate and dissolve chitosan materials with different degrees of acetylation (in the range of 16–33%, at least) without any further pretreatment. Even exposure of the bovine pericardium in pure carbonic acid solution without chitosan already favours certain reduction in calcification, somewhat improved mechanical properties, complete biocompatibility and evident antimicrobial activity of the treated collagen tissue. The reason may be due to high extraction ability of this peculiar compressed fluidic mixture. Moreover, exposure of the bovine pericardium in solutions of chitosan in carbonic acid introduces even better mechanical properties and highly pronounced antimicrobial activity of the modified collagen tissue against adherence and biofilm formation of relevant Gram-positive and Gram-negative strains. Yet, the most important achievement is the detected dramatic reduction in calcification for such modified collagen tissues in spite of the fact that the amount of the thus introduced chitosan is rather small (typically ca. 1 wt.%), which has been reliably detected using original tritium labelling method. We believe that these improved properties are achieved due to particularly deep and uniform impregnation of the collagen matrix with chitosan from its pressurised solutions in carbonic acid. - Highlights: • Treatment of GA

  13. What can we learn about treating heart failure from the heart's response to acute exercise? Focus on the coronary microcirculation.

    Science.gov (United States)

    Heinonen, Ilkka; Sorop, Oana; de Beer, Vincent J; Duncker, Dirk J; Merkus, Daphne

    2015-10-15

    Coronary microvascular function and cardiac function are closely related in that proper cardiac function requires adequate oxygen delivery through the coronary microvasculature. Because of the close proximity of cardiomyocytes and coronary microvascular endothelium, cardiomyocytes not only communicate their metabolic needs to the coronary microvasculature, but endothelium-derived factors also directly modulate cardiac function. This review summarizes evidence that the myocardial oxygen balance is disturbed in the failing heart because of increased extravascular compressive forces and coronary microvascular dysfunction. The perturbations in myocardial oxygen balance are exaggerated during exercise and are due to alterations in neurohumoral influences, endothelial function, and oxidative stress. Although there is some evidence from animal studies that the myocardial oxygen balance can partly be restored by exercise training, it is largely unknown to what extent the beneficial effects of exercise training include improvements in endothelial function and/or oxidative stress in the coronary microvasculature and how these improvements are impacted by risk factors such as diabetes, obesity, and hypercholesterolemia. Copyright © 2015 the American Physiological Society.

  14. Uptake of /sup 67/Ga in the heart of rats treated with isoproterenol

    Energy Technology Data Exchange (ETDEWEB)

    Sasaki, T; Kojima, S; Kubodera, A

    1982-12-01

    Gallium-67 citrate (/sup 67/Ga) accumulation and various enzyme activities during the repair of rat heart with infarct-like lesions induced by isoproterenol (ISP) treatment were measured for 10 days after treatment. Serum creatine phosphokinase (CPK) and glutamic oxalacetic transaminase (GOT) activities were increased immediately after ISP treatment, reaching maximum levels of activity of 545+-64 U/ml and 542+-94 KU/ml, respectively, within 12 h. Uptake of /sup 67/Ga in the rat heart was elevated 12 h after ISP treatment, reaching a maximum on day 1 (0.267+-0.020% dose/g heart). This pattern was essentially similar to the pattern of uronic acid content in the 1.2 M NaCl fraction, which contained mainly heparan sulfate (HS). The activity of glucose-6-phosphate dehydrogenase (G-6-PDH), a marker enzyme for fibrogenesis of damaged tissues, was also elevated 12 h after the ISP treatment, reaching a maximum of approximately 2.47 times that of the control heart on day 1. On the other hand, there were no significant changes in the /sup 67/Ga uptake and uronic acid content in any of the fractions of the liver and kidneys. These findings suggested that HS might be an acceptor for /sup 67/Ga accumulation during the repair of rat heart with infarct-like lesions, in accord with our previous results on CCl/sub 4/-damaged rat liver.

  15. Uptake of 67Ga in the heart of rats treated with isoproterenol

    International Nuclear Information System (INIS)

    Sasaki, T.; Kojima, S.; Kubodera, A.

    1982-01-01

    Gallium-67 citrate ( 67 Ga) accumulation and various enzyme activities during the repair of rat heart with infarct-like lesions induced by isoproterenol (ISP) treatment were measured for 10 days after treatment. Serum creatine phosphokinase (CPK) and glutamic oxalacetic transaminase (GOT) activities were increased immediately after ISP treatment, reaching maximum levels of activity of 545+-64 U/ml and 542+-94 KU/ml, respectively, within 12 h. Uptake of 67 Ga in the rat heart was elevated 12 h after ISP treatment, reaching a maximum on day 1 (0.267+-0.020% dose/g heart). This pattern was essentially similar to the pattern of uronic acid content in the 1.2 M NaCl fraction, which contained mainly heparan sulfate (HS). The activity of glucose-6-phosphate dehydrogenase (G-6-PDH), a marker enzyme for fibrogenesis of damaged tissues, was also elevated 12 h after the ISP treatment, reaching a maximum of approximately 2.47 times that of the control heart on day 1. On the other hand, there were no significant changes in the 67 Ga uptake and uronic acid content in any of the fractions of the liver and kidneys. These findings suggested that HS might be an acceptor for 67 Ga accumulation during the repair of rat heart with infarct-like lesions, in accord with our previous results on CCl 4 -damaged rat liver. (orig.)

  16. [Health literacy in patients with heart failure treated in primary care].

    Science.gov (United States)

    Santesmases-Masana, Rosalia; González-de Paz, Luis; Real, Jordi; Borràs-Santos, Alicia; Sisó-Almirall, Antoni; Navarro-Rubio, Maria Dolors

    2017-01-01

    The level of health literacy is examined, as well as its conditioning factors in patients with heart failure who are seen routinely in a Primary Health Care Area. A multicentre cross-sectional study. 10 Primary care centres from the metropolitan area of Barcelona. Patients diagnosed with heart failure. to have visited the Primary Health Care centre in the last year, being able to arrive at the primary care setting independently, and voluntarily participation. Health Literacy Survey-European Union - Questionnaire (HLS-EU-Q) and Spanish version of the European Heart Failure Self-care Behaviour Scale. An analysis was made of the relationships between health literacy, self-care practices, sociodemographic, and clinical variables using ANOVA test and a multiple linear regression model. The study included 318 patients (51.2% women) with a mean age of 77.9±8.7 years. The index of health literacy of 79.6% (n=253) of the participants indicated problems in understanding healthcare information. Health literacy level was explained by academic level (P<.001), the extent of heart failure (P=.032), self-care, and age (P<.04).The academic level explained 61.6% of the health of literacy (95% bootstrap: 44.58%; 46.75%). In patients with stable heart failure, it is important to consider all factors that help patients to understand the healthcare information. Health literacy explains patient self-care attitude in heart failure. Copyright © 2016 Elsevier España, S.L.U. All rights reserved.

  17. Long-term outcome in levothyroxine treated patients with subclinical hypothyroidism and concomitant heart disease

    DEFF Research Database (Denmark)

    Andersen, Mette Nygaard; Olsen, Anne-Marie Schjerning; Madsen, Jesper Clausager

    2016-01-01

    Context: Subclinical hypothyroidism is a common condition that may lead to impaired cardiac function. Objective: This study sought to examine the effects of levothyroxine treatment in patients with subclinical hypothyroidism and heart disease. Design: This was a register-based historical cohort s...

  18. Wound complications and surgical events in de novo heart transplant patients treated with everolimus

    DEFF Research Database (Denmark)

    Rashidi, Mitra; Esmaily, Sorosh; Fiane, Arnt E

    2016-01-01

    OBJECTIVES: The use of mammalian target of rapamycin (mTOR) inhibitors have been limited by adverse events (AE), including delayed wound healing. We retrospectively reviewed all AE and serious AE (SAE) in The Scandinavian heart transplant (HTx) everolimus (EVE) de novo trial with early calcineurin...

  19. Cardiac toxicity and radiation dose to the heart in definitive treated non-small cell lung cancer

    International Nuclear Information System (INIS)

    Schytte, Tine; Hansen, Olfred; Stolberg-Rohr, Thomine; Brink, Carsten

    2010-01-01

    In this retrospective analysis of a consecutive series of NSCLC patients treated with definitive radiotherapy, we did not find a correlation between high mean-dose to three different volumes of the heart (left ventricle, both ventricles or whole heart) and cardiac toxicity defined as having an cardiac event after radiotherapy start. This is not as shown in studies with other diseases treated with radiotherapy. Darby et al. recently published a review concerning radiation related heart disease. They reported a significantly worse survival beyond ten years for breast cancer patients receiving radiotherapy. Some studies reported mortality from heart disease increased by 27%. In Hodgkin lymphoma patients an increased risk value of three to five for cardiac morbidity in general compared to general population and relative risk of death from myocardial infarction compared with general population in range 2 to 4. There may be several possible reasons why we did not experience a significant toxicity despite the high doses we delivered to the heart compared with patients receiving RT for breast cancer and lymphoma. Only relative few NSCLC patients live long enough to experience cardiac disease either due to lung cancer itself or comorbidity as a competitive risk factor. In our study the five year survival was 15% leaving very few patients at risk for developing cardiac disease. Without long-term survivors cardiac toxicity does not seem to be a problem, and this suggests that we should aim to increase tumour control by administrating larger doses of radiotherapy to the tumour and/or by adding concurrent chemotherapy. However, the latter may increase the risk of cardiac toxicity by itself, and the results given in present study, may not be extrapolated to this situation. Another reason might be that if NSCLC patients develop dyspnoea, chest pain, etc. it is interpreted as being due to a relapse of lung cancer and not cardiac disease. There are several studies indicating that

  20. [Ginseng prescription rules and molecular mechanism in treating coronary heart disease based on data mining and integrative pharmacology].

    Science.gov (United States)

    Li, Sen; Tang, Shi-Huan; Liu, Jin-Ling; Su, Jin; He, Fu-Yuan

    2018-04-01

    The ancient dragon Materia Medica, Compendium of Materia Medica and other works recorded that the main effect of ginseng is tonifying qi. It is reported that the main active ingredient of ginseng is ginsenoside. Modern studies have found that ginseng mono saponins are effective for cardiovascular related diseases. This paper preliminary clarified the efficacy of traditional ginseng-nourishing qi and cardiovascular disease through the traditional Chinese medicine (TCM) inheritance auxiliary platform and integration platform of association of pharmacology. With the help of TCM inheritance auxiliary platform-analysis of "Chinese medicine database", Chinese medicine treatment of modern diseases that ginseng rules, so the traditional effect associated with modern medicine and pharmacology; application integration platform enrichment analysis on the target of drug and gene function, metabolic pathway, to further explore the molecular mechanism of ginseng in the treatment of coronary heart disease, aimed at mining the molecular mechanism of ginseng in the treatment of coronary heart disease. Chinese medicine containing ginseng 307 prescriptions, 87 kinds of disease indications, western medicine disease Chinese medicine therapy for ginseng main coronary heart disease; analysis of molecular mechanism of ginseng pharmacology integration platform for the treatment of coronary heart disease. Ginsenosides(Ra₁, Ra₂, Rb₁, Rb₂, Rg₁, Ro) bind these targets, PRKAA1, PRKAA2, NDUFA4, COX5B, UQCRC1, affect chemokines, non-alcoholic fatty liver, gonadotropin, carbon metabolism, glucose metabolism and other pathways to treat coronary heart disease indirectly. The molecular mechanism of Panax ginseng's multi-component, multi-target and synergistic action is preliminarily elucidated in this paper. Copyright© by the Chinese Pharmaceutical Association.

  1. Respiratory Syncytial Virus Pneumonia Treated with Lower-Dose Palivizumab in a Heart Transplant Recipient

    Directory of Open Access Journals (Sweden)

    J. L. Grodin

    2012-01-01

    Full Text Available Respiratory syncytial virus (RSV is an important community-acquired pathogen that can cause significant morbidity and mortality in patients who have compromised pulmonary function, are elderly, or are immunosuppressed. This paper describes a 70-year-old man with a remote history of heart transplantation who presented with signs and symptoms of pneumonia. Chest computed tomography (CT imaging demonstrated new patchy ground glass infiltrates throughout the upper and lower lobes of the left lung, and the RSV direct fluorescence antibody (DFA was positive. The patient received aerosolized ribavirin, one dose of intravenous immunoglobulin, and one dose of palivizumab. After two months of followup, the patient had improved infiltrates on chest CT, improved pulmonary function testing, and no evidence of graft rejection or dysfunction. There are few data on RSV infections in heart transplant patients, but this case highlights the importance of considering this potentially serious infection and introduces a novel method of treatment.

  2. A fatal elephant attack.

    Science.gov (United States)

    Hejna, Petr; Zátopková, Lenka; Safr, Miroslav

    2012-01-01

    A rare case of an elephant attack is presented. A 44-year-old man working as an elephant keeper was attacked by a cow elephant when he tripped over a foot chain while the animal was being medically treated. The man fell down and was consequently repeatedly attacked with elephant tusks. The man sustained multiple stab injuries to both groin regions, a penetrating injury to the abdominal wall with traumatic prolapse of the loops of the small bowel, multiple defects of the mesentery, and incomplete laceration of the abdominal aorta with massive bleeding into the abdominal cavity. In addition to the penetrating injuries, the man sustained multiple rib fractures with contusion of both lungs and laceration of the right lobe of the liver, and comminuted fractures of the pelvic arch and left femoral body. The man died shortly after he had been received at the hospital. The cause of death was attributed to traumatic shock. © 2011 American Academy of Forensic Sciences.

  3. How should we manage heart failure developing in patients already treated with angiotensin-converting enzyme inhibitors and beta-blockers for hypertension, diabetes or coronary disease?

    DEFF Research Database (Denmark)

    Gustafsson, Finn; Segura, Julian; Ruilope, Luis M

    2010-01-01

    An increasing number of patients in the community are being treated with angiotensin-converting enzyme (ACE) inhibitors, angiotensin receptor blockers (ARBs) and beta-blockers for hypertension, coronary disease or diabetic renal and vascular complications. Some of these patients will develop heart...... failure despite such treatment. Based on data from hypertension trials it can be estimated that approximately 5% of treated patients will develop heart failure over 5 years. It is unclear whether patients developing heart failure on and off ACE-inhibitors or beta-blockers, respectively, at the time...

  4. Induction of specific unresponsiveness to heart allografts in mongrel dogs treated with total lymphoid irradiation and antithymocyte globulin

    International Nuclear Information System (INIS)

    Strober, S.; Modry, D.L.; Hoppe, R.T.

    1984-01-01

    The survival of heterotopic heart allografts was determined in mongrel dogs treated with total lymphoid irradiation (TLI) alone or in combination with other immunosuppressive agents. TLI alone (total dose, 1800 rad) minimally prolonged graft survival as compared with untreated controls. However, marked synergy was observed when TLI was combined with a 10-day post-transplant course of rabbit anti-dog thymocyte globulin (ATG). Approximately 40% of recipients given TLI and ATG showed specific unresponsiveness, as judged by the lack of rejection on serial biopsies for more than 1 year and the prompt rejection of third party hearts. The addition of post-transplant azathioprine (90 to 180 days) to the TLI and ATG regimen increased the mortality of recipients and reduced the fraction of dogs showing specific unresponsiveness. Infusion of donor bone marrow cells at the time of heart transplantation failed to induced specific unresponsiveness in recipients given TLI alone or TLI in combination with post-transplant methotrexate, cyclosporine A, or ATG. The results indicate that the combination of TLI and a brief course of ATG without marrow transplantation was the most effective regimen for the induction of specific unresponsiveness in mongrel dogs

  5. Options for Heart Valve Replacement

    Science.gov (United States)

    ... Guide: Understanding Your Heart Valve Problem | Spanish Symptom Tracker | Spanish Pre-surgery Checklist | Spanish What Is Heart ... Cardiac Arrest: How Are They Different? 7 Warning Signs of a Heart Attack 8 Low Blood Pressure - ...

  6. COMPARATIVE EFFICACY OF THE STATINS IN PREVENTING AND TREATING OF THE CORONARY HEART DISEASE

    Directory of Open Access Journals (Sweden)

    S. V. Shalaev

    2010-01-01

    Full Text Available The possibility to stabilize and reverse the atherosclerotic plaques in coronary arteries due to therapy with atorvastatin and rosuvastatin was demonstrated in recent studies. The advantage of aggressive lipid-lowering therapy compared with standard therapy is proven in patients with both stable and acute forms of ischemic heart disease (IHD. Pleiotropic effects, in particular, effect on endothelial function, ability to reduce the blood level of C-reactive protein are important in the statins mode of action. Risk reduction of cardiovascular complications and slow down of atherosclerosis progression in patients with IHD was significantly associated with decrease in levels of both atherogenic lipids and C-reactive protein.

  7. Soluble form of membrane attack complex independently predicts mortality and cardiovascular events in patients with ST-elevation myocardial infarction treated with primary percutaneous coronary intervention

    DEFF Research Database (Denmark)

    Lindberg, Søren; Pedersen, Sune H; Mogelvang, Rasmus

    2012-01-01

    The complement system is an important mediator of inflammation, which plays a pivotal role in atherosclerosis and acute myocardial infarction (AMI). Animal studies suggest that activation of the complement cascade resulting in the formation of soluble membrane attack complex (sMAC), contributes...

  8. Allogeneic mesenchymal precursor cells (MPCs): an innovative approach to treating advanced heart failure.

    Science.gov (United States)

    Westerdahl, Daniel E; Chang, David H; Hamilton, Michele A; Nakamura, Mamoo; Henry, Timothy D

    2016-09-01

    Over 37 million people worldwide are living with Heart Failure (HF). Advancements in medical therapy have improved mortality primarily by slowing the progression of left ventricular dysfunction and debilitating symptoms. Ultimately, heart transplantation, durable mechanical circulatory support (MCS), or palliative care are the only options for patients with end-stage HF. Regenerative therapies offer an innovative approach, focused on reversing myocardial dysfunction and restoring healthy myocardial tissue. Initial clinical trials using autologous (self-donated) bone marrow mononuclear cells (BMMCs) demonstrated excellent safety, but only modest efficacy. Challenges with autologous stem cells include reduced quality and efficacy with increased patient age. The use of allogeneic mesenchymal precursor cells (MPCs) offers an "off the shelf" therapy, with consistent potency and less variability than autologous cells. Preclinical and initial clinical trials with allogeneic MPCs have been encouraging, providing the support for a large ongoing Phase III trial-DREAM-HF. We provide a comprehensive review of preclinical and clinical data supporting MPCs as a therapeutic option for HF patients. The current data suggest allogeneic MPCs are a promising therapy for HF patients. The results of DREAM-HF will determine whether allogeneic MPCs can decrease major adverse clinical events (MACE) in advanced HF patients.

  9. Heart Disease Affects Women of All Ages

    Science.gov (United States)

    Skip Navigation Bar Home Current Issue Past Issues Heart Disease Affects Women of All Ages Past Issues / Winter ... weeks of a heart attack. For Women with Heart Disease: About 6 million American women have coronary heart ...

  10. Vent-induced prosthetic leaflet thrombosis treated by open-heart valve-in-valve implantation.

    Science.gov (United States)

    Stamm, Christof; Pasic, Miralem; Buz, Semih; Hetzer, Roland

    2015-09-01

    A patient required emergency mitral valve replacement and extracorporeal membrane oxygenation (ECMO) support for acute biventricular failure. The left ventricular (LV) vent inserted via the left upper pulmonary vein induced thrombotic immobilization of a prosthetic valve leaflet, with significant intra-prosthesis regurgitation after ECMO explantation. Therefore, the left atrium was opened on the beating heart during conventional extracorporeal circulation, all prosthesis leaflets were excised and a 29-mm expandable Edwards Sapien prosthesis was inserted within the scaffold of the original prosthesis under direct vision. This case illustrates the benefits and potential problems of LV venting on ECMO support, and a rapid and safe way of replacing the prosthesis leaflets in a critical situation. © The Author 2015. Published by Oxford University Press on behalf of the European Association for Cardio-Thoracic Surgery. All rights reserved.

  11. Left Ventricular Wall Stress-Mass-Heart Rate Product and Cardiovascular Events in Treated Hypertensive Patients

    DEFF Research Database (Denmark)

    Devereux, Richard B; Bang, Casper N; Roman, Mary J

    2015-01-01

    -varying covariate in Cox models assessing predictors of the LIFE primary composite end point (cardiovascular death, MI, or stroke), its individual components, and all-cause mortality. At baseline, the triple product in both treatment groups was, compared with normal adults, elevated in 70% of patients. During...... more, greater heart rate reduction with atenolol resulted in larger reduction of the triple product. Lower triple product during antihypertensive treatment was strongly, independently associated with lower rates of the LIFE primary composite end point, cardiovascular death, and MI, but not stroke.......In the Losartan Intervention for End Point Reduction in Hypertension (LIFE) study, 4.8 years' losartan- versus atenolol-based antihypertensive treatment reduced left ventricular hypertrophy and cardiovascular end points, including cardiovascular death and stroke. However, there was no difference...

  12. The costs of treating acute heart failure: an economic analysis of the SURVIVE trial.

    Science.gov (United States)

    de Lissovoy, Gregory; Fraeman, Kathy; Salon, Jeff; Chay Woodward, Tatia; Sterz, Raimund

    2008-01-01

    To estimate the incremental cost per life year gained with levosimendan relative to dobutamine in treatment of acute heart failure based on the Survival of Patients with Acute Heart Failure in Need of Intravenous Inotropic Support (SURVIVE) trial. SURVIVE enrolled 1,327 patients (levosimendan 664, dobutamine 663) from nine nations with 180-day survival from date of randomisation as the primary endpoint. Hospital resource utilisation was determined via clinical case reports. Unit costs were derived from hospital payment schedules for France, Germany and the UK, and represent a third-party payer perspective. Cost-effectiveness analysis was performed for a subset of the SURVIVE patient population selected in accordance with current levosimendan labeling. Mortality in the levosimendan group was 26 versus 28% for dobutamine (hazard ratio 0.91, 95% confidence interval 0.74-1.13, p=0.40). Initial hospitalisation length of stay was identical (levosimendan 14.4, dobutamine 14.5, p=0.98). Slightly lower rates of readmission were observed for levosimendan relative to dobutamine at 31 (p=0.13) and 180 days (p=0.23). Mean costs excluding study drug were equivalent for the index admission (levosimendan euro5,060, dobutamine euro4,952; p=0.91) and complete episode (levosimendan euro5,396, dobutamine euro5,275; p=0.93). At an acquisition cost of euro600 per vial, there is at least 50% likelihood that levosimendan is cost effective relative to dobutamine if willingness to pay is equal to or greater than euro15,000 per life year gained.

  13. Palliative Care in Heart Failure

    Directory of Open Access Journals (Sweden)

    Hatice Mert

    2012-04-01

    Full Text Available Heart failure is an important health problem since its incidence and prevalence is increasing year by year. Since symptom burden and mortality are high in heart failure, supportive and palliative care should be provided. However, very few patients are referred to palliative care services. In comparison with cancer patients, it is difficult to identify end of life care for patients with heart failure, because these patients are hospitalized when the signs of acute decompensation appear, and their symptoms decrease and functional status improve before they are discharged. Therefore, palliative care, which is a holistic approach aiming to improve patients’ quality of life, to detect and treat the attacks of the disease before they become severe, and to deal with patients’ physical, psychological, social, and mental health altogether during their care, should be integrated into heart failure patients’ care. [TAF Prev Med Bull 2012; 11(2.000: 217-222

  14. Survival, quality of life and impact of right heart failure in patients with acute cardiogenic shock treated with ECMO.

    Science.gov (United States)

    Schoenrath, Felix; Hoch, Dennis; Maisano, Francesco; Starck, Christoph T; Seifert, Burkhardt; Wenger, Urs; Ruschitzka, Frank; Wilhelm, Markus J

    2016-01-01

    Mechanical circulatory support is increasingly used in acute cardiogenic shock. To assess treatment strategies for cardiogenic shock. Data of 57 patients in acute intrinsic cardiogenic shock treated with ECMO were analyzed. Different subsequent strategies (weaning, VAD, transplantation) were followed.​ Overall 1, 2, and 4-year survival was 36.8 ± 6.4%, 32.2 ± 6.4%, 29.8 ± 6.3%. Elevated lactate and hemorrhagic complications (all p in patients with right heart failure prior to ECMO implantation, BVAD therapy showed a trend (p=0.058) towards superior survival compared with LVAD therapy. Seven of the BVAD patients received successful transplantation, with a 1-year survival of 71%. Among survivors Short Form 36 reported significantly lower combined physical scores (p=0.004). Right heart assessment prior to ECMO implantation may be beneficial to provide tailored therapy if ECMO weaning fails. Survival after cardiogenic shock requiring ECMO seems to be associated with impaired long-term quality of life. Copyright © 2016 Elsevier Inc. All rights reserved.

  15. It is not just a Minor Thing - A Phenomenological-Hermeneutic Study of Patients' Experiences when afflicted by a Minor Heart Attack and Participating in Cardiac Rehabilitation

    DEFF Research Database (Denmark)

    Simonÿ, Charlotte P; Dreyer, Pia; Pedersen, Birthe D

    2017-01-01

    , leading to vulnerability and helplessness; Understanding that life has become frail: patients feel shaken as they realise that the disease is chronic and life-threatening; and An altered life: patients must adjust to new limitations in their everyday lives. Conclusions: Patients experience an overall...... demanding transition when they are afflicted by a minor heat attack, whereby their lives are sweepingly changed. Supporting patients’ integrity, which becomes vulnerable during the various stages of transitions, is essential to ensure a healthy outcome. Being together with fellow patients during cardiac...

  16. Pulmonary artery closure in combination with patch technique for treating congenital heart disease combined with large patent ductus arteriosus: A clinical study of 9 cases

    OpenAIRE

    Wen, Bing; Yang, Junya; Liu, Huiruo; Jiao, Zhouyang; Zhao, Wenzeng

    2016-01-01

    Objective: To document clinical experience of treating congenital heart disease combined with large patent ductus arteriosus with pulmonary artery closure in combination with patch technique. Methods: Thirty-six patients (8 males and 28 females) who suffered from congenital heart disease and underwent hybrid surgery in the First Affiliated Hospital of Zhengzhou University from October 2010 to February 2014 were selected for this study. They aged 14 to 39 years and weighed 32.20 to 61.50 kg. D...

  17. The evaluation of clinical therapy effects of oral western medicine combined with magnetic pulse acupoint stimulation in treating elderly patients with coronary heart disease.

    Science.gov (United States)

    Fu, Xin; Guo, Li; Jiang, Zheng-Ming; Xu, Ai-Guo

    2015-01-01

    Treat the patients suffered from coronary heart disease with oral western medicine, combining with magnetic pulse acupoint stimulation, and observe the therapeutic effects of such combination therapy method. 56 old people with coronary heart disease are randomly divided into a treatment group and a control group. Both groups of patients are treated by the routine drugs, in addition, the patients of the treatment group are treated by magnetic pulse therapy additionally. Compare clinical symptoms, blood lipid and blood rheological indexes of the patients in the two groups when they are selected and after 30 days' treatment. after 30 days' treatment, it is found that clinical symptoms, blood lipid and blood rheological indexes of the patients in the treatment group are significantly improved compared with those when they are selected and those of the control group (Pmagnetic therapy and the conventional drug intervention, had relieved synptom, improve blood lipid and heart blood supply function.

  18. Asthma-like attacks terminated by slow pathway ablation

    Directory of Open Access Journals (Sweden)

    Selcuk Ozturk

    2017-01-01

    Full Text Available Asthma is a chronic airway disease in which the pathological mechanisms are reversible airway obstruction, bronchial hyper reactivity, and constriction of the lower airways. Supraventricular tachycardia (SVT is a common arrhythmia which originates above the bundle of His and causing heart rates exceeding 150 beats/min. SVT patients present with palpitation, chest pain, chest discomfort, dyspnea, hyperventilation, and lightheadedness, occasionally. Besides, extraordinary presentations of SVT are available in literature. In this report, we describe a case of a patient presenting with treatment-resistant asthma-like attacks lasting for 20 years whom was suspected SVT as an underlying etiology and treated by slow pathway radiofrequency ablation.

  19. Serial measurements of high sensitive cardiac troponin I in patients with acutely decompensated heart failure treated with carperitide or nitrates.

    Science.gov (United States)

    Sato, Yukihito; Nishi, Kiyoto; Saijo, Sayaka; Tanada, Yohei; Goto, Taisuke; Takahashi, Naoki; Yamamoto, Erika; Fukuhara, Rei; Miyamoto, Tadashi; Taniguchi, Ryoji; Fujiwara, Hisayoshi; Takatsu, Yoshiki

    2010-07-01

    In patients with acutely decompensated heart failure (ADHF), elevated serum concentration of cardiac troponin is an independent predictor of adverse cardiac events. In ADHF with a preserved systolic blood pressure, treatment with intravenous vasodilator is recommended. However, the effect of vasodilators on troponin concentrations has not been elucidated well. Serial high sensitive cardiac troponin I (hs-TnI) was measured in 36 patients presenting with ADHF and preserved systolic blood pressure, of whom 20 were treated with atrial natriuretic peptide (ANP) and 16 with nitrates. The concentrations of hs-TnI ranged from 0.069+/-0.114ng/ml at baseline to 0.076+/-0.121ng/ml at 5h, 0.062+/-0.106ng/ml at 1 day, and 0.056+/-0.089ng/ml at day 7 (n=36,ns). The relative change in hs-TnI between baseline and at 5h, day 1 and day 7 were 1.13+/-0.43, 0.95+/-0.44 and 0.93+/-0.64 in patients treated with ANP, and 1.02+/-0.19, 0.95+/-0.31 and 1.19+/-1.38 in patients treated with nitrates (ns; ANP versus nitrates). On day 7, a hs-TnI change, >20% decrease from baseline, was observed in 55% patients with ANP versus 56% patients with nitrates (ns). The cardiac event rates were similar in both groups. In ADHF patients with preserved systolic blood pressure, the administration of intravenous vasodilators did not decrease hs-TnI over the first 7 days. Treatments with ANP and nitrates were associated with similar short-term decreases in hs-TnI and long-term adverse cardiac events. Copyright 2010 Japanese College of Cardiology. Published by Elsevier Ltd. All rights reserved.

  20. Infarto agudo del miocardio sin elevación del segmento T: Consideraciones fisiopatológicas y clínicas Heart attack without an elevation of the T segment: Clinical and pathophysiological

    Directory of Open Access Journals (Sweden)

    Maikel Rodulfo García

    2010-09-01

    Full Text Available Se revisaron numerosos documentos (impresos y electrónicos sobre afecciones cardiovasculares, particularmente acerca del infarto agudo del miocardio sin elevación del segmento T, teniendo en cuenta que la mortalidad hospitalaria es menor cuando se produce un síndrome coronario con esa característica. Para actualizar el tema se valoraron diversos aspectos relacionados con concepto, clasificación, fisiopatología, diagnóstico, cuadro clínico, exámenes complementarios y factores de riesgo, puesto que las enfermedades del corazón son actualmente la principal causa de muerte en naciones industrializadas y se espera que también lo sean en los países en vías de desarrollo para el 2020, entre ellos Cuba.Several documents (printed and electronic about cardiovascular diseases were reviewed, particularly heart attack without an elevation of the T-segment, taking into account that the hospital mortality is lower when a coronary syndrome with that characteristic occurs. To update the topic several aspects related to concept, classification, pathophysiology, diagnosis, clinical pattern, laboratory tests and risk factors were valued since heart diseases are actually the main cause of death in industrialized nations and it is expected that they will also be the same cause of death in developing countries for 2020, among them, Cuba.

  1. Heart Age PSA (:60)

    Centers for Disease Control (CDC) Podcasts

    This 60 second public service announcement is based on the September 2015 CDC Vital Signs report. Your heart age is the age of your heart and blood vessels as a result of your risk factors for heart attack and stroke. If you smoke or have high blood pressure, your heart age will be much higher than your actual age. Learn what you can do to lower your heart age and keep it low.

  2. Warning Signs of Heart Failure

    Science.gov (United States)

    ... the two terms are used interchangeably. View an animation of heart failure . If you have been diagnosed ... resources here Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  3. Patient perspectives of participating in the cardiac CopenHeartRFA rehabilitation program for patients treated with ablation for atrial fibrillation

    DEFF Research Database (Denmark)

    Risom, Signe Stelling; Lind, Johanne; J McCabe, Pamela

    2018-01-01

    . As part of the evaluation of the CopenHeartRFA trial, both quantitative and qualitative data were collected. The intervention was delivered by a multidisciplinary team. Aim: This study aimed to understand the experience of patients treated for AF with ablation who participated in the CopenHeartRFA cardiac....... The interviews were analyzed individually by two researchers and themes were constructed and discussed. Results: The sample included 10 participants, mean age 54.6 years. Four categories were identified and labeled: 1) strengthening belief in one’s own physical capacity and survival; 2) still struggling...

  4. Information Warfare: Defining the Legal Response to An Attack

    National Research Council Canada - National Science Library

    Pottorff, James

    1999-01-01

    This paper discusses the difficulty in determining whether an information warfare attack, such as a computer virus, can be treated as an "armed attack" for purposes of national defense under the United Nations charter. As the U.S...

  5. Are the effects of drugs to prevent and to treat heart failure always concordant? The statin paradox and its implications for understanding the actions of antidiabetic medications.

    Science.gov (United States)

    Packer, Milton

    2018-03-22

    Most treatments for chronic heart failure are effective both in preventing its onset and reducing its progression. However, statins prevent the development of heart failure, but they do not decrease morbidity and mortality in those with established heart failure. This apparent discordance cannot be explained by an effect to prevent interval myocardial infarctions. Instead, it seems that the disease that statins were preventing in trials of patients with a metabolic disorder was different from the disease that they were treating in trials of chronic heart failure. The most common phenotype of heart failure in patients with obesity and diabetes is heart failure with a preserved ejection fraction (HFpEF). In this disorder, the anti-inflammatory effects of statins might ameliorate myocardial fibrosis and cardiac filling abnormalities, but these actions may have little relevance to patients with heart failure and a reduced ejection fraction (HFrEF), whose primary derangement is cardiomyocyte loss and stretch. These distinctions may explain why statins were ineffective in trials that focused on HFrEF, but have been reported to produce with favourable effects in observational studies of HFpEF. Similarly, selective cytokine antagonists were ineffective in HFrEF, but have been associated with benefits in HFpEF. These observations may have important implications for our understanding of the effects of antihyperglycaemic medications. Glucagon-like peptide-1 receptor agonists have had neutral effects on heart failure events in people at risk for HFpEF, but have exerted deleterious actions in HFrEF. Similarly, sodium-glucose co-transporter 2 inhibitors, which exert anti-inflammatory effects and reduce heart failure events in patients who are prone to HFpEF, may not be effective in HFrEF. The distinctions between HFrEF and HFpEF may explain why the effects of drugs on heart failure events in diabetes trials may not be relevant to their use in patients with systolic dysfunction

  6. Long-term follow-up in optimally treated and stable heart failure patients : primary care vs. heart failure clinic. Results of the COACH-2 study

    NARCIS (Netherlands)

    Luttik, Marie Louise A.; Jaarsma, Tiny; van Geel, Peter Paul; Brons, Maaike; Hillege, Hans L.; Hoes, Arno W.; de Jong, Richard; Linssen, Gerard; Lok, Dirk J. A.; Berger, Marjolein; van Veldhuisen, Dirk J.

    2014-01-01

    AimsIt has been suggested that home-based heart failure (HF) management in primary care may be an alternative to clinic-based management in HF patients. However, little is known about adherence to HF guidelines and adherence to the medication regimen in these home-based programmes. The aim of the

  7. Synthetic Consolidants Attacked by Melanin-Producing Fungi: Case Study of the Biodeterioration of Milan (Italy) Cathedral Marble Treated with Acrylics▿

    Science.gov (United States)

    Cappitelli, Francesca; Nosanchuk, Joshua D.; Casadevall, Arturo; Toniolo, Lucia; Brusetti, Lorenzo; Florio, Sofia; Principi, Pamela; Borin, Sara; Sorlini, Claudia

    2007-01-01

    Monuments and artistic stone surfaces are often consolidated and protected with synthetic polymers, in particular, acrylics. Although it is generally thought that acrylic polymers are resistant to biodeterioration, we report for the first time the systematic occurrence of dematiaceous meristematic fungi on many marble samples of the cathedral in Milan (Italy) previously treated with this material. Fourier transform infrared spectroscopy applied to the Milan cathedral stone samples revealed characteristic features of biodeteriorated synthetic resins that differentiated them from the aged but nonbiodeteriorated samples. Samples showing biological colonization were analyzed for the presence of fungi. Cultivation and morphological characterization and methods independent from cultivation, such as denaturing gradient gel electrophoresis coupled with partial 18S rRNA gene sequencing and immunofluorescence staining with melanin-binding antibodies, showed that melanin-producing species are heavily present on stone surfaces protected with acrylic resins. This observation raises the question of the effectiveness of acrylics in protecting stone artworks. PMID:17071788

  8. Synthetic consolidants attacked by melanin-producing fungi: case study of the biodeterioration of Milan (Italy) cathedral marble treated with acrylics.

    Science.gov (United States)

    Cappitelli, Francesca; Nosanchuk, Joshua D; Casadevall, Arturo; Toniolo, Lucia; Brusetti, Lorenzo; Florio, Sofia; Principi, Pamela; Borin, Sara; Sorlini, Claudia

    2007-01-01

    Monuments and artistic stone surfaces are often consolidated and protected with synthetic polymers, in particular, acrylics. Although it is generally thought that acrylic polymers are resistant to biodeterioration, we report for the first time the systematic occurrence of dematiaceous meristematic fungi on many marble samples of the cathedral in Milan (Italy) previously treated with this material. Fourier transform infrared spectroscopy applied to the Milan cathedral stone samples revealed characteristic features of biodeteriorated synthetic resins that differentiated them from the aged but nonbiodeteriorated samples. Samples showing biological colonization were analyzed for the presence of fungi. Cultivation and morphological characterization and methods independent from cultivation, such as denaturing gradient gel electrophoresis coupled with partial 18S rRNA gene sequencing and immunofluorescence staining with melanin-binding antibodies, showed that melanin-producing species are heavily present on stone surfaces protected with acrylic resins. This observation raises the question of the effectiveness of acrylics in protecting stone artworks.

  9. The Evolution of the Use of β-Blockers to Treat Heart Failure: A Conversation With Finn Waagstein, MD.

    Science.gov (United States)

    Waagstein, Finn; Rutherford, John D

    2017-09-05

    Finn Waagstein was born in Copenhagen in 1938. He graduated from Aarhus University Medical School in 1964. He received his cardiology training in the Sahlgrenska University Hospital at the University of Gothenburg, Sweden. He was appointed Associate Professor in 1980, and he assisted in establishing and directing the first Swedish heart transplant program. From 1990 he directed the heart failure and cardiomyopathy research programs. He is currently Professor of Cardiology and senior physician at Wallenberg Laboratory. In 2002, he was awarded the King Faisal International Prize for Medicine. © 2017 American Heart Association, Inc.

  10. Problem: Heart Valve Regurgitation

    Science.gov (United States)

    ... should be completely closed For example: Watch an animation of mitral valve regurgitation A leaking mitral valve ... Not Alone Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  11. Thyroid Storm with Heart Failure Treated with a Short-acting Beta-adrenoreceptor Blocker, Landiolol Hydrochloride.

    Science.gov (United States)

    Yamashita, Yugo; Iguchi, Moritake; Nakatani, Rieko; Usui, Takeshi; Takagi, Daisuke; Hamatani, Yasuhiro; Unoki, Takashi; Ishii, Mitsuru; Ogawa, Hisashi; Masunaga, Nobutoyo; Abe, Mitsuru; Akao, Masaharu

    2015-01-01

    Beta-adrenoreceptor blockers are essential in controlling the peripheral actions of thyroid hormones and a rapid heart rate in patients with thyroid storm, although they should be used with great caution when there is the potential for heart failure. A 67-year-old woman was diagnosed as having thyroid storm in addition to marked tachycardia with atrial fibrillation and heart failure associated with a reduced left ventricular function. The administration of an oral beta blocker, bisoprolol fumarate, induced hypotension and was not tolerable for the patient, whereas landiolol hydrochloride, a short-acting intravenous beta-adrenoreceptor blocker with high cardioselectivity and a short elimination half-life, was useful for controlling the patient's tachycardia and heart failure without causing hemodynamic deterioration.

  12. Incidence of heart disease in 35,000 women treated with radiotherapy for breast cancer in Denmark and Sweden

    International Nuclear Information System (INIS)

    McGale, Paul; Darby, Sarah C.; Hall, Per; Adolfsson, Jan; Bengtsson, Nils-Olof; Bennet, Anna M.; Fornander, Tommy; Gigante, Bruna; Jensen, Maj-Britt; Peto, Richard; Rahimi, Kazem; Taylor, Carolyn W.; Ewertz, Marianne

    2011-01-01

    Purpose: To study incidence of radiation-related heart disease in a large population of breast cancer patients followed for up to 30 years. Material and methods: 72,134 women diagnosed with breast cancer in Denmark or Sweden during 1976-2006 and followed prospectively. Radiation-related risk was studied by comparing women with left-sided and right-sided tumours. Results: 34,825 women (48%) received radiotherapy. Among unirradiated women tumour laterality had little relevance to heart disease. Among irradiated women mean dose to the whole heart was 6.3 Gy for left-sided tumours and 2.7 Gy for right-sided tumours. Mortality was similar in irradiated women with left-sided and right-sided tumours, but incidence ratios, left-sided versus right-sided, were raised: acute myocardial infarction 1.22 (95% CI 1.06-1.42), angina 1.25 (1.05-1.49), pericarditis 1.61 (1.06-2.43), valvular heart disease 1.54 (1.11-2.13). Incidence ratios for all heart disease were as high for women irradiated since 1990 (1.09 [1.00-1.19]) as for women irradiated during 1976-1989 (1.08 [0.99-1.17]), and were higher for women diagnosed with ischaemic heart disease prior to breast cancer than for other women (1.58 [1.19-2.10] versus 1.08 [1.01-1.15], p for difference = 0.01). Conclusions: Breast cancer radiotherapy has, at least until recently, increased the risk of developing ischaemic heart disease, pericarditis and valvular disease. Women with ischaemic heart disease before breast cancer diagnosis may have incurred higher risks than others.

  13. COMPARATIVE ANALYSIS OF SOLUBLE OF CD40 LIGAND LEVELS IN HEART RECIPIENTS TREATED WITH CYCLOSPORINE A AND TACROLIMUS

    Directory of Open Access Journals (Sweden)

    O. P. Shevchenko

    2012-01-01

    Full Text Available Soluble form of CD40L is platelet activating factor, which is a marker of inflammation and thrombosis. Elevated levels of sCD40L before the heart transplantation are associated with the risk of early development of cardiova- scular complications. The study included 54 patients who had received heart transplants. All recipients received a triple heart immu- nosuppressive therapy, including methylprednisolone, mycophenolate mofetil and cyclosporine A (20 recipients or methylprednisolone, mycophenolate mofetil and tacrolimus (34 recipients. Patients were not differed by age, gender, etiology of heart failure before heart transplantation (p > 0,05. In the first group of transplant recipients, the relative risk of cardiovascular events with high sCD40L levels before transplantation was 3 2 (95% CI 1,4; 12,0. In the second group of recipients, respectively, 2.69 (95% CI 1,1; 8,5. SCD40L level after heart transplan- tation was significantly higher for patients receiving cyclosporine (P < 0.05. Increasing concentrations of sCD40L are associated with a higher incidence of cardiovascular complications. 

  14. Dosimetric comparison to the heart and cardiac substructure in a large cohort of esophageal cancer patients treated with proton beam therapy or Intensity-modulated radiation therapy.

    Science.gov (United States)

    Shiraishi, Yutaka; Xu, Cai; Yang, Jinzhong; Komaki, Ritsuko; Lin, Steven H

    2017-10-01

    To compare heart and cardiac substructure radiation exposure using intensity-modulated radiotherapy (IMRT) vs. proton beam therapy (PBT) for patients with mid- to distal esophageal cancer who received chemoradiation therapy. We identified 727 esophageal cancer patients who received IMRT (n=477) or PBT (n=250) from March 2004 to December 2015. All patients were treated to 50.4Gy with IMRT or to 50.4 cobalt Gray equivalents with PBT. IMRT and PBT dose-volume histograms (DVHs) of the whole heart, atria, ventricles, and four coronary arteries were compared. For PBT patients, passive scattering proton therapy (PSPT; n=237) and intensity-modulated proton therapy (IMPT; n=13) DVHs were compared. Compared with IMRT, PBT resulted in significantly lower mean heart dose (MHD) and heart V5, V10, V20, V30, and V40as well as lower radiation exposure to the four chambers and four coronary arteries. Compared with PSPT, IMPT resulted in significantly lower heart V20, V30, and V40 but not MHD or heart V5 or V10. IMPT also resulted in significantly lower radiation doses to the left atrium, right atrium, left main coronary artery, and left circumflex artery, but not the left ventricle, right ventricle, left anterior descending artery, or right coronary artery. Factors associated with lower MHD included PBT (Pheart and cardiac substructures than IMRT. Long-term studies are necessary to determine how this cardiac sparing effect impacts the development of coronary artery disease and other cardiac complications. Copyright © 2017 Elsevier B.V. All rights reserved.

  15. Terrorists and Suicide Attacks

    National Research Council Canada - National Science Library

    Cronin, Audrey K

    2003-01-01

    Suicide attacks by terrorist organizations have become more prevalent globally, and assessing the threat of suicide attacks against the United States and its interests at home and abroad has therefore...

  16. Solidarity under Attack

    DEFF Research Database (Denmark)

    Meret, Susi; Goffredo, Sergio

    2017-01-01

    https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack......https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack...

  17. Long-term follow-up in optimally treated and stable heart failure patients: primary care vs. heart failure clinic. Results of the COACH-2 study.

    Science.gov (United States)

    Luttik, Marie Louise A; Jaarsma, Tiny; van Geel, Peter Paul; Brons, Maaike; Hillege, Hans L; Hoes, Arno W; de Jong, Richard; Linssen, Gerard; Lok, Dirk J A; Berge, Marjolein; van Veldhuisen, Dirk J

    2014-11-01

    It has been suggested that home-based heart failure (HF) management in primary care may be an alternative to clinic-based management in HF patients. However, little is known about adherence to HF guidelines and adherence to the medication regimen in these home-based programmes. The aim of the current study was to determine whether long-term follow-up and treatment in primary care is equally effective as follow-up at a specialized HF clinic in terms of guideline adherence and patient adherence, in HF patients initially managed and up-titrated to optimal treatment at a specialized HF clinic. We conducted a multicentre, randomized, controlled study in 189 HF patients (62% male, age 72 ± 11 years), who were assigned to follow-up either in primary care (n = 97) or in a HF clinic (n = 92). After 12 months, no differences between guideline adherence, as estimated by the Guideline Adherence Indicator (GAI-3), and patient adherence, in terms of the medication possession ratio (MPR), were found between treatment groups. There was no difference in the number of deaths (n = 12 in primary care and n = 8 in the HF clinic; P = 0.48), and hospital readmissions for cardiovascular (CV) reasons were also similar. The total number of unplanned non-CV hospital readmissions, however, tended to be higher in the primary care group (n = 22) than in the HF clinic group (n = 10; P = 0.05). Patients discharged after initial management in a specialized HF clinic can be discharged to primary care for long-term follow-up with regard to maintaining guideline adherence and patient adherence. However, the complexity of the HF syndrome and its associated co-morbidities requires continuous monitoring. Close collaboration between healthcare providers will be crucial in order to provide HF patients with optimal, integrated care. © 2014 The Authors. European Journal of Heart Failure © 2014 European Society of Cardiology.

  18. Pharmacodynamic Impact of Carboxylesterase 1 Gene Variants in Patients with Congestive Heart Failure Treated with Angiotensin-Converting Enzyme Inhibitors

    DEFF Research Database (Denmark)

    Nelveg-Kristensen, Karl Emil; Bie, Peter; Ferrero, Laura

    2016-01-01

    BACKGROUND: Variation in the carboxylesterase 1 gene (CES1) may contribute to the efficacy of ACEIs. Accordingly, we examined the impact of CES1 variants on plasma angiotensin II (ATII)/angiotensin I (ATI) ratio in patients with congestive heart failure (CHF) that underwent ACEI dose titrations. ...

  19. Lifestyle Changes for Heart Attack Prevention

    Science.gov (United States)

    ... alcohol consumption contributes to obesity, alcoholism, suicide and accidents. However, there is a cardioprotective effect of moderate ... to the Terms and Conditions and Privacy Policy Work with your doctor to lower your HBP and ...

  20. Can Vitamins Help Prevent a Heart Attack?

    Science.gov (United States)

    ... uptodate.com/home. Accessed Nov. 26, 2016. Loffredo L, et al. Supplementation with vitamin E alone is associated with reduced myocardial infarction: ... Cardiovascular Diseases. 2015;25:354. Pilz S, et al. Vitamin D and cardiovascular ... L, et al. Prospective association between the dietary inflammatory ...

  1. Being active after your heart attack

    Science.gov (United States)

    ... the Canadian Cardiovascular Society endorsed by the American Academy of Family Physicians: 2007 Writing Group to Review New Evidence and Update the ACC/AHA 2004 Guidelines for the Management of Patients With ST-Elevation Myocardial Infarction, Writing ...

  2. Impact of etiology on the outcomes in heart failure patients treated with cardiac resynchronization therapy: a meta-analysis.

    Directory of Open Access Journals (Sweden)

    Yanmei Chen

    Full Text Available BACKGROUND: Cardiac resynchronization therapy (CRT has been extensively demonstrated to benefit heart failure patients, but the role of underlying heart failure etiology in the outcomes was not consistently proven. This meta-analysis aimed to determine whether efficacy and effectiveness of CRT is affected by underlying heart failure etiology. METHODS AND RESULTS: Searches of MEDLINE, EMBASE and Cochrane databases were conducted to identify RCTs and observational studies that reported clinical and functional outcomes of CRT in ischemic cardiomyopathy (ICM and non-ischemic cardiomyopathy (NICM patients. Efficacy of CRT was assessed in 7 randomized controlled trials (RCTs with 7072 patients and effectiveness of CRT was evaluated in 14 observational studies with 3463 patients In the pooled analysis of RCTs, we found that CRT decreased mortality or heart failure hospitalization by 29% in ICM patients (95% confidence interval [CI], 21% to 35%, and by 28% (95% CI, 18% to 37% in NICM patients. No significant difference was observed between the 2 etiology groups (P = 0.55. In the pooled analysis of observational studies, however, we found that ICM patients had a 54% greater risk for mortality or HF hospitalization than NICM patients (relative risk: 1.54; 95% CI: 1.30-1.83; P<0.001. Both RCTs and observational studies demonstrated that NICM patients had greater echocardiographic improvements in the left ventricular ejection fraction and end-systolic volume, as compared with ICM patients (both P<0.001. CONCLUSION: CRT might reduce mortality or heart failure hospitalization in both ICM and NICM patients similarly. The improvement of the left ventricular function and remodeling is greater in NICM patients.

  3. AMP-regulated protein kinase activity in the hearts of mice treated with low- or high-fat diet measured using novel LC-MS method.

    Science.gov (United States)

    Rybakowska, I M; Slominska, E M; Romaszko, P; Olkowicz, M; Kaletha, K; Smolenski, R T

    2015-06-01

    AMP-regulated protein kinase (AMPK) is involved in regulation of energy-generating pathways in response to the metabolic needs in different organs including the heart. The activity of AMPK is mainly controlled by AMP concentration that in turn could be affected by nucleotide metabolic pathways. This study aimed to develop a procedure for measurement of AMPK activity together with nucleotide metabolic enzymes and its application for studies of mice treated with high-fat diet. The method developed was based on analysis of conversion of AMARA peptide to pAMARA by partially purified heart homogenate by liquid chromatography/mass spectrometry (LC/MS). Activities of the enzymes of nucleotide metabolism were evaluated by analysis of conversion of substrates into products by HPLC. The method was applied for analysis of hearts of mice fed 12 weeks with low- (LFD) or high-fat diet (HFD). The optimized method for AMPK activity analysis (measured in presence of AMP) revealed change of activity from 0.089 ± 0.035 pmol/min/mg protein in LFD to 0.024 ± 0.002 in HFD. This coincided with increase of adenosine deaminase (ADA) activity from 0.11 ± 0.02 to 0.19 ± 0.06 nmol/mg tissue/min and decrease of AMP-deaminase (AMPD) activity from 1.26 ± 0.35 to 0.56 ± 0.15 nmol/mg tissue/min for LFD and HFD, respectively. We have proven quality of our LC/MS method for analysis of AMPK activity. We observed decrease in AMPK activity in the heart of mice treated with high-fat diet. However, physiological consequences of this change could be modulated by decrease in AMPD activity.

  4. Ischemic Heart Disease and Work Disability in Patients Treated at the Internal Medicine Consultation and Assessed by the Expert Medical Labor Commission

    Directory of Open Access Journals (Sweden)

    Belkis Vicente Sánchez

    2016-02-01

    Full Text Available Background: ischemic heart disease represents a major challenge given the large number of people affected by this condition, its increasing contribution to overall mortality, the frequent disability resulting from it, and the complexity and high cost of its treatment. Objective: to describe the work disability caused by ischemic heart disease in patients treated at the internal medicine consultation and assessed by the Expert Medical Labor Commission of Cienfuegos municipality. Methods: a cross-sectional study was conducted including all patients with ischemic heart disease treated at the internal medicine consultation and assessed by the Expert Medical Labor Commission of Cienfuegos municipality from October 2012 to July 2013. The variables analyzed were: age, sex, occupation, years of work and accrued salary, clinical diagnosis, length of time the condition had been present and associated chronic diseases; existence of prior assessment by an Expert Medical Labor Commission and decision reached, previous days of sick leave and current decision of the commission. The data were analyzed using SPSS (version 18.0 and the results are shown in tables and graphs as numbers and percentages. Results: a predominance of men was observed. Forty two point nine percent were service workers and the average number of years of work was 24.60. Forty two point nine percent were previously assessed by the commission. Two hundred one point thirteen days of sick leave were granted and social security expenditure in a month was high. Diabetes mellitus was the most common chronic disease followed by hypertension, obesity and dyslipidemia. Of the workers previously assessed, half received permanent and temporary disability benefits. Conclusions: ischemic heart disease causes different degrees of disability. Its costs in terms of social security are increasing.

  5. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  6. Evaluation of the Implementation of an educational intervention nurse in patients treated at the Heart Failure Unit at the University Hospital Puerta de Hierro

    Directory of Open Access Journals (Sweden)

    Aurora Hernández Rivas

    2012-11-01

    Full Text Available Objective: To evaluate the effectiveness of the implementation of a nurse educational intervention in patients with heart failure in relation to the level of knowledge about their disease, level of self-care, treatment adherence, perceived satisfaction, fewer hospital readmissions and improved quality of life. Methods: Quasi-experimental study with two groups: control group (consisting of patients treated according to standard practice and experimental group (consisting of patients who will apply the nursing educational intervention proposal. It included all patients (= 18 years, good cognitive, literacy, sign informed consent with a diagnosis of heart failure (HF of recent (3-6 months or new onset, coming first in the Heart Failure Unit of Hospital Universitario Puerta de Hierro from May 2008. Sample: 68 patients per group. Nurse educational intervention will consist of four teaching sessions of 20 minutes before discharge, will be given a boost educational DVD, complete with brochures and explanatory guide, it will reinforce the information a month by telephone. Monitoring: baseline visit (inclusion and follow-up after 15 days, at 3 and 6 months. Outcomes/Instruments: demographic and clinical/exploration and medical history; quality of life, knowledge, self-care and medication adherence/validated questionnaires. Analysis: measures of central tendency and dispersion. Analysis by treatment assignment.

  7. Determinants of quality of life of patients with heart failure and iron deficiency treated with ferric carboxymaltose: FAIR-HF sub-analysis.

    Science.gov (United States)

    Gutzwiller, Florian S; Pfeil, Alena M; Comin-Colet, Josep; Ponikowski, Piotr; Filippatos, Gerasimos; Mori, Claudio; Braunhofer, Peter G; Szucs, Thomas D; Schwenkglenks, Matthias; Anker, Stefan D

    2013-10-09

    Heart failure (HF) is a burden to patients and health care systems. The objectives of HF treatment are to improve health related quality of life (HRQoL) and reduce mortality and morbidity. We aimed to evaluate determinants of health-related quality of life (HRQoL) in patients with iron deficiency and HF treated with intravenous (i.v.) iron substitution or placebo. A randomised, double-blind, placebo-controlled trial (n = 459) in iron-deficient chronic heart failure (CHF) patients with or without anaemia studied clinical and HRQoL benefits of i.v. iron substitution using ferric carboxymaltose (FCM) over a 24-week trial period. Multivariate analysis was carried out with various clinical variables as independent variables and HRQoL measures as dependent variables. Mean change from baseline of European Quality of Life - 5 Dimensions (EQ-5D) (value set-based) utilities (on a 0 to 100 scale) at week 24 was 8.91 (i.v. iron) and 0.68 (placebo; p model remained stable. In this study, i.v. iron substitution, exercise tolerance, stroke, country of residence and renal function influenced measures of HRQoL in patients with heart failure and iron deficiency. © 2013.

  8. Heart Age PSA (:60)

    Centers for Disease Control (CDC) Podcasts

    2015-09-01

    This 60 second public service announcement is based on the September 2015 CDC Vital Signs report. Your heart age is the age of your heart and blood vessels as a result of your risk factors for heart attack and stroke. If you smoke or have high blood pressure, your heart age will be much higher than your actual age. Learn what you can do to lower your heart age and keep it low.  Created: 9/1/2015 by National Center for Chronic Disease Prevention and Health Promotion (NCCDPHP).   Date Released: 9/1/2015.

  9. Heart Failure in Children and Adolescents

    Science.gov (United States)

    ... the lungs where oxygen is added. Watch an animation of blood flow in the heart All the ... resources here Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  10. Could ginseng-based medicines be better than nitrates in treating ischemic heart disease? A systematic review and meta-analysis of randomized controlled trials.

    Science.gov (United States)

    Jia, Yongliang; Zhang, Shikai; Huang, Fangyi; Leung, Siu-wai

    2012-06-01

    Ginseng-based medicines and nitrates are commonly used in treating ischemic heart disease (IHD) angina pectoris in China. Hundreds of randomized controlled trials (RCTs) reported in Chinese language claimed that ginseng-based medicines can relieve the symptoms of IHD. This study provides the first PRISMA-compliant systematic review with sensitivity and subgroup analyses to evaluate the RCTs comparing the efficacies of ginseng-based medicines and nitrates in treating ischemic heart disease, particularly angina pectoris. Past RCTs published up to 2010 on ginseng versus nitrates in treating IHD for 14 or more days were retrieved from major English and Chinese databases, including PubMed, Science Direct, Cochrane Library, WangFang Data, and Chinese National Knowledge Infrastructure. The qualities of included RCTs were assessed with Jadad scale, a refined Jadad scale called M scale, CONSORT 2010 checklist, and Cochrane risk of bias tool. Meta-analysis was performed on the primary outcomes including the improvement of symptoms and electrocardiography (ECG). Subgroup analysis, sensitivity analysis, and meta-regression were performed to evaluate the effects of study characteristics of RCTs, including quality, follow-up periods, and efficacy definitions on the overall effect size of ginseng. Eighteen RCTs with 1549 participants were included. Overall odds ratios for comparing ginseng-based medicines with nitrates were 3.00 (95% CI: 2.27-3.96) in symptom improvement (n=18) and 1.61 (95% CI: 1.20-2.15) in ECG improvement (n=10). Subgroup analysis, sensitivity analysis, and meta-regression found no significant difference in overall effects among all study characteristics, indicating that the overall effects were stable. The meta-analysis of 18 eligible RCTs demonstrates moderate evidence that ginseng is more effective than nitrates for treating angina pectoris. However, further RCTs for higher quality, longer follow-up periods, lager sample size, multi-center/country, and are

  11. Web server attack analyzer

    OpenAIRE

    Mižišin, Michal

    2013-01-01

    Web server attack analyzer - Abstract The goal of this work was to create prototype of analyzer of injection flaws attacks on web server. Proposed solution combines capabilities of web application firewall and web server log analyzer. Analysis is based on configurable signatures defined by regular expressions. This paper begins with summary of web attacks, followed by detection techniques analysis on web servers, description and justification of selected implementation. In the end are charact...

  12. Is "treat your child normally" helpful advice for parents of survivors of treatment of hypoplastic left heart syndrome?

    Science.gov (United States)

    Rempel, Gwen R; Harrison, Margaret J; Williamson, Deanna L

    2009-04-01

    Developing technology affords children with complex congenitally malformed hearts a chance for survival. Parents gratefully pursue life-saving options on behalf of their children, despite the risks to the life of their child, and uncertainty about outcomes. Little is known about how mothers and fathers experience parenting a child whose new state as a survivor may include less than optimal developmental sequels. Our study involved multiple interactive interviews with 9 mothers and 7 fathers of infants and preschool children with hypoplastic left heart syndrome who had survived the Norwood surgical approach. Qualitative methodology included grounded theory methods of simultaneous collection and analysis of data, and we used open and selective coding of transcribed interviews. Parents used normalization in the context of uncertainty regarding the ongoing survival of their child. Parents described their underweight children as being on their own growth curve, and viewed their developmental progress, however delayed, as reason for celebration, as they had been prepared for their child to die. There is growing evidence that children with congenitally malformed hearts who require surgical intervention during the first year of life may experience developmental delay. The use of normalization by their parents may be effective in decreasing their worry regarding the uncertain future faced by their child, but may negatively affect the developmental progress of the child if they do not seek resources to assist development. Advice from paediatric specialists for parents to view their children as normal needs to be balanced with assistance for parents to access services to support optimal growth and development of their child.

  13. Attenuation of ischemia-reperfusion-induced alterations in intracellular Ca2+ in cardiomyocytes from hearts treated with N-acetylcysteine and N-mercaptopropionylglycine.

    Science.gov (United States)

    Saini-Chohan, Harjot K; Dhalla, Naranjan S

    2009-12-01

    This study was undertaken to test whether Ca(2+)-handling abnormalities in cardiomyocytes after ischemia-reperfusion (I/R) are prevented by antioxidants such as N-acetyl L-cysteine (NAC), which is known to reduce oxidative stress by increasing the glutathione redox status, and N-(2-mercaptopropionyl)-glycine (MPG), which scavenges both peroxynitrite and hydroxyl radicals. For this purpose, isolated rat hearts were subjected to 30 min of global ischemia followed by 30 min of reperfusion, and cardiomyocytes were prepared to monitor changes in the intracellular concentration of free Ca(2+) ([Ca(2+)](i)). Marked depression in the left ventricular developed pressure and elevation in the left ventricular end-diastolic pressure in I/R hearts were attenuated by treatment with NAC or MPG. Cardiomyocytes obtained from I/R hearts showed an increase in the basal level of [Ca(2+)](i) as well as augmentation of the low Na(+)-induced increase in [Ca(2+)](i), with no change in the KCl-induced increase in [Ca(2+)](i). These I/R-induced alterations in Ca(2+) handling by cardiomyocytes were attenuated by treatment of hearts with NAC or MPG. Furthermore, reduction in the isoproterenol-, ATP-, ouabain-, and caffeine-induced increases in [Ca(2+)](i) in cardiomyocytes from I/R hearts were limited by treatment with NAC or MPG. The increases in the basal [Ca(2+)](i), unlike the KCl-induced increase in [Ca(2+)](i), were fully or partially prevented by both NAC and MPG upon exposing cardiomyocytes to hypoxia-reoxygenation, H(2)O(2), or a mixture of xanthine and xanthine oxidase. These results suggest that improvement in cardiac function of I/R hearts treated with NAC or MPG was associated with attenuation of changes in Ca(2+) handling by cardiomyocytes, and the results support the view that oxidative stress due to oxyradical generation and peroxynitrite formation plays an important role in the development of intracellular Ca(2+) overload in cardiomyocytes as a consequence of I/R injury.

  14. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  15. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  16. Pulmonary artery closure in combination with patch technique for treating congenital heart disease combined with large patent ductus arteriosus: A clinical study of 9 cases.

    Science.gov (United States)

    Wen, Bing; Yang, Junya; Liu, Huiruo; Jiao, Zhouyang; Zhao, Wenzeng

    2016-01-01

    To document clinical experience of treating congenital heart disease combined with large patent ductus arteriosus with pulmonary artery closure in combination with patch technique. Thirty-six patients (8 males and 28 females) who suffered from congenital heart disease and underwent hybrid surgery in the First Affiliated Hospital of Zhengzhou University from October 2010 to February 2014 were selected for this study. They aged 14 to 39 years and weighed 32.20 to 61.50 kg. Diameter of arterial duct was between 10 mm and 13 mm; 28 cases were tube type, 4 cases were funnel type and four cases were window type. All patients had moderate or severe pulmonary arterial hypertension; besides, there were 28 cases of ventricular septal defect, 16 cases of atrial septal defect, eight cases of aortic insufficiency, four cases of mitral stenosis and insufficiency and four cases of infectious endocarditis. Cardz Pulmonary Bypass (CPB) was established after chest was opened along the middle line. With the help of Transesophageal echocardiography, large patent ductus arteriosus was blocked off through pulmonary artery. Pulmonary artery was cut apart after blocking of heart. Large patent ductus arteriosus on the side of pulmonary artery was strengthened with autologous pericardial patch. Of 36 patients, 32 patients had patent ductus arteriosus closure device and four patients had atrial septal defect closure device. Pulmonary arteries of 36 cases were all successfully closed. Systolic pressure declined after closure ((54.86±19.23) mmHg vs (96.05±23.07) mmHg, pclosure ((39.15±14.83) mmHg vs (72.88±15.76) mmHg, ppatent ductus arteriosus and congenital heart disease, which decreases surgical problems, shortens surgical time and lowers the incidence of complications.

  17. Clinical predictors and hemodynamic consequences of elevated peripheral chemosensitivity in optimally treated men with chronic systolic heart failure.

    Science.gov (United States)

    Niewinski, Piotr; Engelman, Zoar J; Fudim, Marat; Tubek, Stanislaw; Paleczny, Bartlomiej; Jankowska, Ewa A; Banasiak, Waldemar; Sobotka, Paul A; Ponikowski, Piotr

    2013-06-01

    Augmented peripheral chemoreflex response is an important mechanism in the pathophysiology of chronic heart failure (CHF). This study characterizes prevalence and clinical predictors of this phenomenon in optimally managed male CHF patients, and seeks to describe the hemodynamic consequences of chemoreceptor hypersensitivity. Thirty-four optimally managed CHF patients and 16 control subjects were prospectively studied. Hypoxic ventilatory response (HVR)-a measure of peripheral chemosensitivity-was calculated with the use of short nitrogen gas administrations. Systolic blood pressure (SBP) and heart rate (HR) following transient hypoxic challenges were recorded with a Nexfin monitor. Hemodynamic responses to hypoxia were expressed by the linear slopes between oxygen saturation (%) and SBP (mm Hg) or HR (beats/min). Elevated HVR was present in 15 (44%) of the CHF patients. Patients with elevated HVR exhibited higher levels of N-terminal pro-B-type natriuretic peptide, lower left ventricular ejection fraction, and higher prevalence of atrial fibrillation. CHF patients with elevated HVR had significantly greater SBP and HR responses to hypoxia than CHF patients with normal HVR. Despite comprehensive pharmacotherapy, elevated HVR is prevalent in CHF patients, related to severity of the disease and associated with augmented hemodynamic responses to hypoxia. CHF patients with elevated HVR may be prone to unfavorable hemodynamic changes. Copyright © 2013 Elsevier Inc. All rights reserved.

  18. Association of beta-adrenergic receptor polymorphisms and mortality in carvedilol-treated chronic heart-failure patients

    DEFF Research Database (Denmark)

    Petersen, Morten; Andersen, Jon T; Hjelvang, Brian R

    2011-01-01

    WHAT IS ALREADY KNOWN ABOUT THIS SUBJECT • Chronic heart failure (HF) is a syndrome with increasing prevalence. Though mortality is still high, the introduction of ß-adrenoceptor blockers for its treatment has improved survival considerably. • As is the case for all medical treatment, not all...... patients benefit from ß-adrenoceptor blocker treatment, and stratifying patients to different ß-adrenoceptor blockers by the use of pharmacogenomics might be of great value in improving HF therapy. • Previous studies have shown that the two single nucleotide polymorphisms (SNPs) ADRB1 Arg389Gly and ADRB2...... Gln27Glu interact with the ß-adrenoceptor blockers metoprolol and carvedilol, respectively. These interactions have led to stratified responses with regard to surrogate parameters, e.g. left ventricular ejection fraction (LVEF), pulse and blood pressure. • Several studies have failed to show...

  19. Heart failure in patients with sick sinus syndrome treated with single lead atrial or dual-chamber pacing

    DEFF Research Database (Denmark)

    Riahi, Sam; Nielsen, Jens Cosedis; Hjortshøj, Søren

    2012-01-01

    AIMS: Previous studies indicate that ventricular pacing may precipitate heart failure (HF). We investigated occurrence of HF during long-term follow-up among patients with sick sinus syndrome (SSS) randomized to AAIR or DDDR pacing. Furthermore, we investigated effects of percentage of ventricular...... patients (17%) with the leads in a non-apical position, HR 0.67, CI 0.45-1.00, P = 0.05. After adjustments this difference was non-significant. The incidence of HF was not associated with %VP (P = 0.57).CONCLUSION: In patients with SSS, HF was not associated with pacing mode, %VP, or ventricular lead...... localization. This suggests that DDDR pacing is safe in patients with SSS without precipitating HF....

  20. Plants under dual attack

    NARCIS (Netherlands)

    Ponzio, C.A.M.

    2016-01-01

    Though immobile, plants are members of complex environments, and are under constant threat from a wide range of attackers, which includes organisms such as insect herbivores or plant pathogens. Plants have developed sophisticated defenses against these attackers, and include chemical responses

  1. Prognostic impact of carboxylesterase 1 gene variants in patients with congestive heart failure treated with angiotensin-converting enzyme inhibitors

    DEFF Research Database (Denmark)

    Nelveg-Kristensen, Karl E.; Madsen, Majbritt B.; Torp-Pedersen, Christian

    2016-01-01

    OBJECTIVE: Most angiotensin-converting enzyme inhibitors (ACEIs) are prodrugs activated by carboxylesterase 1 (CES1). We investigated the prognostic importance of CES1 gene (CES1) copy number variation and the rs3815583 single-nucleotide polymorphism in CES1 among ACEI-treated patients with conge...

  2. New Trends in Heart Regeneration: A Review

    Directory of Open Access Journals (Sweden)

    Kochegarov A

    2016-11-01

    Full Text Available In this review, we focus on new approaches that could lead to the regeneration of heart muscle and the restoration of cardiac muscle function derived from newly-formed cardiomyocytes. Various strategies for the production of cardiomyocytes from embryonic stem cells, induced pluripotent stem cells, adult bone marrow stem cells and cardiac spheres from human heart biopsies are described. Pathological conditions which lead to atherosclerosis and coronary artery disease often are followed by myocardial infarction causing myocardial cell death. After cell death, there is very little self-regeneration of the cardiac muscle tissue, which is replaced by non-contractile connective tissue, thus weakening the ability of the heart muscle to contract fully and leading to heart failure. A number of experimental research approaches to stimulate heart muscle regeneration with the hope of regaining normal or near normal heart function in the damaged heart muscle have been attempted. Some of these very interesting studies have used a variety of stem cell types in combination with potential cardiogenic differentiation factors in an attempt to promote differentiation of new cardiac muscle for possible future use in the clinical treatment of patients who have suffered heart muscle damage from acute myocardial infarctions or related cardiovascular diseases. Although progress has been made in recent years relative to promoting the differentiation of cardiac muscle tissue from non-muscle cells, much work remains to be done for this technology to be used routinely in translational clinical medicine to treat patients with damaged heart muscle tissue and return such individuals to pre-heart-attack activity levels.

  3. Congestive heart failure is associated with lipoprotein components in statin-treated patients with coronary heart disease Insights from the Incremental Decrease in End points Through Aggressive Lipid Lowering Trial (IDEAL)

    DEFF Research Database (Denmark)

    Holme, Ingar; Strandberg, Timo E; Faergeman, Ole

    2009-01-01

    BACKGROUND: Very few, if any, studies have assessed the ability of apolipoproteins to predict new-onset of congestive heart failure (HF) in statin-treated patients with coronary heart disease (CHD). AIMS: To employ the Incremental Decrease in End points Through Aggressive Lipid Lowering Trial...... with the occurrence of new-onset HF. Variables related to low-density lipoprotein cholesterol (LDL-C) carried less predictive information than those related to high-density lipoprotein cholesterol (HDL-C), and apoA-1 was the single variable most strongly associated with HF. LDL-C was less predictive than both non......-HDL-C (total cholesterol minus HDL-C) and apoB. The ratio of apoB to apoA-1 was most strongly related to HF after adjustment for potential confounders, among which diabetes had a stronger correlation with HF than did hypertension. ApoB/apoA-1 carried approximately 2.2 times more of the statistical information...

  4. Blind Data Attack on BGP Routers

    Science.gov (United States)

    2017-03-01

    Second Reader Dr. Cynthia Irvine Chair, Cyber Academic Group iii THIS PAGE INTENTIONALLY LEFT BLANK iv ABSTRACT Transport Communication Protocol (TCP...Postgraduate School. The experience of higher learning at this institution was incredible, and I would whole-heartedly recommend it to any of my peers and...data attack packets to the victim device. Scapy is a Python library that is used to craft and send packets [28]. BGP is supported in Python through

  5. Systematic review on randomized controlled trials of coronary heart disease complicated with depression treated with Chinese herbal medicines.

    Science.gov (United States)

    Wang, An-Lu; Chen, Zhuo; Luo, Jing; Shang, Qing-Hua; Xu, Hao

    2016-01-01

    This systemic review evaluated the efficacy and safety of Chinese herbal medicines (CHMs) in patients with coronary heart disease (CHD) complicated with depression. All databases were retrieved till September 30, 2014. Randomized controlled trials (RCTs) comparing CHMs with placebo or conventional Western medicine were retrieved. Data extraction, analyses and quality assessment were performed according to the Cochrane standards. RevMan 5.3 was used to synthesize the results. Thirteen RCTs enrolling 1,095 patients were included. Subgroup analysis was used to assess data. In reducing the degree of depression, CHMs showed no statistic difference in the 4th week [mean difference (MD)=-1.06; 95% confidence interval (CI)-2.38 to 0.26; n=501; I(2)=73%], but it was associated with a statistically significant difference in the 8th week (MD=-1.00; 95% CI-1.64 to-0.36; n=436; I(2)=48%). Meanwhile, the combination therapy (CHMs together with antidepressants) showed significant statistic differences both in the 4th week (MD=-1.99; 95% CI-3.80 to-0.18; n=90) and in the 8th week (MD=-5.61; 95% CI-6.26 to-4.97; n=242; I(2)=87%). In CHD-related clinical evaluation, 3 trials reported the intervention group was superior to the control group. Four trials showed adverse events in the intervention group was less than that in the control group. CHMs showed potentially benefits on patients with CHD complicated with depression. Moreover, the effect of CHMs may be similar to or better than antidepressant in certain fields but with less side effects. However, because of small sample size and potential bias of most trials, this result should be interpreted with caution. More rigorous trials with larger sample size and higher quality are warranted to give high quality of evidence to support the use of CHMs for CHD complicated with depression.

  6. Angioedema in heart failure patients treated with sacubitril/valsartan (LCZ696) or enalapril in the PARADIGM-HF study.

    Science.gov (United States)

    Shi, Victor; Senni, Michele; Streefkerk, Hendrik; Modgill, Vikas; Zhou, Wenchun; Kaplan, Allen

    2018-08-01

    PARADIGM-HF demonstrated significant clinical benefits for sacubitril/valsartan (LCZ696, an angiotensin receptor neprilysin inhibitor) versus the angiotensin-converting enzyme inhibitor (ACEI) enalapril in patients with heart failure with reduced ejection fraction. As inhibition of ACE, and co-inhibition of ACE and neprilysin, may increase the risk of angioedema, this was an adverse event of special interest. Following sequential enalapril and sacubitril/valsartan run-ins, patients were randomized to twice-daily sacubitril/valsartan 200 mg or enalapril 10 mg. The study design incorporated two wash-out periods (~36 h each) to minimize any potential risk of angioedema due to overlapping ACE and neprilysin inhibition. Suspected cases of angioedema were reported to, and blindly adjudicated by, an independent angioedema adjudication committee (AAC). Of the 10,513 patients entering the enalapril run-in, 9419 entered the sacubitril/valsartan run-in and 8432 received double-blind treatment. Overall, 148 suspected angioedema events occurring in 144 patients were reported to AAC, with one event reported during screening period. Of the remaining 147 events, 54 were confirmed as angioedema by AAC. A confirmed event was experienced by 15 (0.14%) and 10 (0.11%) patients, during the enalapril and sacubitril/valsartan run-ins, respectively, and by 10 (0.24%) and 19 (0.45%) patients in the corresponding randomized arms during the double-blind phase. The frequency of confirmed angioedema was higher in black patients. Most events were mild. Only five patients required hospitalization and none required mechanical airway support. The number of confirmed angioedema events in PARADIGM-HF was low and there was no-marked excess risk of angioedema with sacubitril/valsartan versus enalapril. Copyright © 2018 The Authors. Published by Elsevier B.V. All rights reserved.

  7. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  8. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  9. Chronic hepatitis E infection with an emerging virus strain in a heart transplant recipient successfully treated with ribavirin: a case report.

    Science.gov (United States)

    Waldenström, Jesper; Castedal, Maria; Konar, Jan; Karason, Kristjan; Lagging, Martin; Norder, Helene

    2015-08-26

    During the last decade hepatitis E infections have been recognized as a health problem in high-income countries, where hepatitis E virus genotype 3 is endemic. The infection is often self-limiting, but may develop into chronic infection in immunocompromised patients, especially in solid organ recipients. If these patients or patients with underlying liver disease get hepatitis E infection, they may develop liver failure and cirrhosis. Hepatitis E virus is occasionally found in blood products and transfusion transmission has been reported. We present the first case of chronic hepatitis E infection in a heart transplant recipient in Sweden. A 63-year-old Swedish white man presented with highly elevated liver enzymes 6 months after heart transplantation. Polymerase chain reaction revealed chronic hepatitis E infection, caused by a virus strain found infecting symptomatic cases in Sweden and other European countries. During transplantation, he received blood products from 17 donors, and transfusion transmission is highly likely. The only detectable marker for hepatitis E infection was hepatitis E virus ribonucleic acid for more than 2 months before anti-hepatitis E virus developed. He was treated successfully with ribavirin and decreased immunosuppression. Our patient was probably infected through contaminated blood products and subsequently developed chronic infection, which was cured upon treatment. This highlights the need for evaluating the problem with chronic hepatitis E infection in immunocompromised patients, and for discussion concerning screening of blood products. Polymerase chain reaction-based methods are recommended for diagnosing hepatitis E infection in patients with compromised immunity. In addition, knowledge needs to be gained on the infecting virus strain, which may be more virulent than other strains.

  10. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  11. The political attack ad

    Directory of Open Access Journals (Sweden)

    Palma Peña-Jiménez, Ph.D.

    2011-01-01

    Full Text Available During election campaigns the political spot has a clear objective: to win votes. This message is communicated to the electorate through television and Internet, and usually presents a negative approach, which includes a direct critical message against the opponent, rather than an exposition of proposals. This article is focused on the analysis of the campaign attack video ad purposely created to encourage the disapproval of the political opponent among voters. These ads focus on discrediting the opponent, many times, through the transmission of ad hominem messages, instead of disseminating the potential of the political party and the virtues and manifesto of its candidate. The article reviews the development of the attack ad since its first appearance, which in Spain dates back to 1996, when the famous Doberman ad was broadcast, and examines the most memorable campaign attack ads.

  12. Risks for Heart Valve Problems

    Science.gov (United States)

    ... and Live Our Interactive Cardiovascular Library has detailed animations and illustrations to help you learn about conditions, treatments and procedures related to heart disease and stroke. Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  13. CDC Vital Signs-Heart Age

    Centers for Disease Control (CDC) Podcasts

    This podcast is based on the September 2015 CDC Vital Signs report. Your heart age is the age of your heart and blood vessels as a result of your risk factors for heart attack and stroke. If you smoke or have high blood pressure, your heart age will be much higher than your actual age. Learn what you can do to lower your heart age and keep it low.

  14. Valvular Heart Disease in Heart Failure

    Directory of Open Access Journals (Sweden)

    Giuseppe MC Rosano

    2017-01-01

    Full Text Available Structural valvular heart disease may be the cause of heart failure or may worsen the clinical status of patients with heart failure. Heart failure may also develop in patients treated with valve surgery. Patients with heart failure with valvular heart disease are at increased risk of events including sudden cardiac death. Before considering intervention (surgical or percutaneous all patients should receive appropriate medical and device therapy taking into account that vasodilators must be used with caution in patients with severe aortic stenosis. Numerous percutaneous and/or hybrid procedures have been introduced in the past few years and they are changing the management of valvular heart disease. In patients with heart failure and valvular heart disease, either primary or functional, the whole process of decision-making should be staged through a comprehensive evaluation of the risk– benefit ratio of different treatment strategies and should be made by a multidisciplinary ‘heart team’ with a particular expertise in valvular heart disease. The heart team should include heart failure cardiologists, cardiac surgeons/structural valve interventionists, imaging specialists, anaesthetists, geriatricians and intensive care specialists. This article will review recent developments and distill practical guidance in the management of this important heart failure co-morbidity.

  15. Preliminary data from γ-cardiography during the abatement of an asthmatic attack (1961)

    International Nuclear Information System (INIS)

    Georges, R.; Vernejoul, P. de; Raynaud, C.; Blanchon, P.; Kellershohn, C.; Turiaf, J.

    1961-01-01

    The authors used gamma cardiology during the abatement of 16 cases of asthma with a view to detecting heart attacks not otherwise visible with routine methods of examination: clinical, radiological and electro-cardio-graphical. In gamma cardiology, a radioactive indicator is used and its path followed in the cavities of the heart. The method makes it possible to study the circulation in the right heart, the pulmonary crossing, and the left heart, as well as evaluation of the heart-flow. As a result of their investigations the authors, after having discussed the significance of the data obtained with the method, suggest that it is possible by the use of gamma cardiography during the abatement of an asthma attack: 1- To confirm attacks of the right heart which have already been detected by ordinary methods. 2- To confirm the presence of modifications in the recorded curves which suggest, in the case of the left heart, possible attack; such on attack is also indicated, in a small number of cases, by electrocardiography curves. Some considerations are put forward by the authors concerning the physiopathology of attacks on the left heart. (authors) [fr

  16. Attacker Model Lab

    OpenAIRE

    2006-01-01

    tut quiz present Tutorial Quiz Presentation Interactive Media Element This interactive tutorial the two sub-classes of computer attackers: amateurs and professionals. It provides valuable insight into the nature of necessary protection measure for information assets. CS3600 Information Assurance: Introduction to Computer Security Course

  17. Temporal Cyber Attack Detection.

    Energy Technology Data Exchange (ETDEWEB)

    Ingram, Joey Burton [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Draelos, Timothy J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Galiardi, Meghan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Doak, Justin E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Rigorous characterization of the performance and generalization ability of cyber defense systems is extremely difficult, making it hard to gauge uncertainty, and thus, confidence. This difficulty largely stems from a lack of labeled attack data that fully explores the potential adversarial space. Currently, performance of cyber defense systems is typically evaluated in a qualitative manner by manually inspecting the results of the system on live data and adjusting as needed. Additionally, machine learning has shown promise in deriving models that automatically learn indicators of compromise that are more robust than analyst-derived detectors. However, to generate these models, most algorithms require large amounts of labeled data (i.e., examples of attacks). Algorithms that do not require annotated data to derive models are similarly at a disadvantage, because labeled data is still necessary when evaluating performance. In this work, we explore the use of temporal generative models to learn cyber attack graph representations and automatically generate data for experimentation and evaluation. Training and evaluating cyber systems and machine learning models requires significant, annotated data, which is typically collected and labeled by hand for one-off experiments. Automatically generating such data helps derive/evaluate detection models and ensures reproducibility of results. Experimentally, we demonstrate the efficacy of generative sequence analysis techniques on learning the structure of attack graphs, based on a realistic example. These derived models can then be used to generate more data. Additionally, we provide a roadmap for future research efforts in this area.

  18. Healthy Heart Collaboration and Developed Toolkit

    Science.gov (United States)

    Impact: EPA is raising awareness of heart disease and its link to air pollution and other environmental factors as a partner in Million Hearts, a national initiative to prevent heart attacks and strokes. The talk will provide an up to date review of the evidence linking air poll...

  19. Blocking of Brute Force Attack

    OpenAIRE

    M.Venkata Krishna Reddy

    2012-01-01

    A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your Web site requires user authentication, you are a good target for a brute-force attack. An attacker can always discover a password through a brute-force attack, but the downside is that it co...

  20. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  1. Heart Rate and Initial Presentation of Cardiovascular Diseases (Caliber)

    Science.gov (United States)

    2013-09-17

    Abdominal Aortic Aneurysm; Coronary Heart Disease NOS; Unheralded Coronary Death; Intracerebral Haemorrhage; Heart Failure; Ischemic Stroke; Myocardial Infarction; Stroke; Peripheral Arterial Disease; Stable Angina Pectoris; Subarachnoid Haemorrhage; Transient Ischemic Attack; Unstable Angina; Cardiac Arrest, Sudden Cardiac Death

  2. Heart MRI

    Science.gov (United States)

    Magnetic resonance imaging - cardiac; Magnetic resonance imaging - heart; Nuclear magnetic resonance - cardiac; NMR - cardiac; MRI of the heart; Cardiomyopathy - MRI; Heart failure - MRI; Congenital heart disease - MRI

  3. Automated Discovery of Mimicry Attacks

    National Research Council Canada - National Science Library

    Giffin, Jonathon T; Jha, Somesh; Miller, Barton P

    2006-01-01

    .... These systems are useful only if they detect actual attacks. Previous research developed manually-constructed mimicry and evasion attacks that avoided detection by hiding a malicious series of system calls within a valid sequence allowed by the model...

  4. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia.

    Science.gov (United States)

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (2003). Problems faced, lessons learnt, and costs incurred are discussed. A burns disaster plan drawing on lessons learnt from these attacks is presented. Thirty-one patients were treated at the SGH Burns Centre in three attacks (2002 Bali attack [n = 15], 2003 Jakarta attack [n = 14], and 2005 Bali attack [n = 2]). For the 2002 Bali attack, median age was 29 years (range 20 to 50 years), median percentage of total burn surface area (TBSA) was 29% (range 5% to 55%), and median abbreviated burn severity index (ABSI) was 6 (range 3 to 10). Eight of 15 patients were admitted to the intensive care unit. For the 2003 Jakarta attack, median age was 35 years (range 24 to 56 years), median percentage of TBSA was 10% (range 2% to 46%), and median ABSI was 4 (range 3 to 9). A large number of patients had other injuries. Problems faced included manpower issues, lack of bed space, shortage of blood products, and lack of cadaver skin. The changing nature of terror attacks mandates continued vigilance and disaster preparedness. The multidimensional burns patient, complicated by other injuries, is likely to become increasingly common. A burns disaster plan with emphasis on effective command, control, and communication as well as organisation of health care personnel following a 'team concept' will do much to ensure that the sudden onset of a crisis situation at an unexpected time does not overwhelm hospital manpower and resources.

  5. Attack Trees with Sequential Conjunction

    NARCIS (Netherlands)

    Jhawar, Ravi; Kordy, Barbara; Mauw, Sjouke; Radomirović, Sasa; Trujillo-Rasua, Rolando

    2015-01-01

    We provide the first formal foundation of SAND attack trees which are a popular extension of the well-known attack trees. The SAND at- tack tree formalism increases the expressivity of attack trees by intro- ducing the sequential conjunctive operator SAND. This operator enables the modeling of

  6. The long-term risk of smoking in diabetic patients with stable ischemic heart disease treated with intensive medical therapy and lifestyle modification.

    Science.gov (United States)

    Khan, Asrar A; Chung, Matthew J; Novak, Eric; Mori Brooks, Maria; Brown, David L

    2017-09-01

    Introduction The long-term risk of smoking in diabetic patients with stable ischemic heart disease (SIHD) is unknown. We sought to analyze the impact of smoking on outcomes of diabetic patients with SIHD when other cardiovascular risk factors are being aggressively treated. Methods The Bypass Angioplasty Revascularization Investigation 2 Diabetes (BARI 2D) trial randomized 2368 diabetics with SIHD to intensive medical therapy (IMT) with prompt revascularization or IMT alone. Smoking status was obtained at baseline, 6 months, and 1, 2, 3, 4 and 5 years. The primary endpoint of interest was all-cause mortality. Results Of 2360 patients, 33.1% of patients never smoked, 54.4% were former smokers, and 12.5% were current smokers. The rate of all-cause mortality was greater for current (2.5 deaths/100 patient-years) and former smokers (3.1 deaths/100 patient-years) than never smokers (2.1 deaths/100 patient-years) (P = 0.007). Cardiac death, cardiovascular death, fatal or nonfatal myocardial infarction, and fatal or nonfatal stroke were not increased in current or former smokers compared with never smokers. Compared with never smokers, current smokers experienced a 49% increased hazard of death (Hazard Ratio (HR) 1.49, 95% Confidence Interval (CI): 0.97-2.29, P = 0.07) whereas former smokers had a 37% increased hazard of death (HR 1.37, 95% CI: 1.04-2.79, P = 0.02) when considering smoking status as a time-dependent variable and adjusting for factors that differed by smoking status. Conclusions Current and former smoking are associated with increased all-cause mortality in diabetics with SIHD but not with increased cardiovascular morbidity or mortality.

  7. Adaptive servo-ventilation to treat central sleep apnea in heart failure with reduced ejection fraction: the Bad Oeynhausen prospective ASV registry.

    Science.gov (United States)

    Oldenburg, Olaf; Wellmann, Birgit; Bitter, Thomas; Fox, Henrik; Buchholz, Anika; Freiwald, Eric; Horstkotte, Dieter; Wegscheider, Karl

    2018-04-13

    Central sleep apnea (CSA) is highly prevalent in heart failure patients with reduced left ventricular ejection fraction (HF-REF). The Bad Oeynhausen Adaptive Servo-ventilation (ASV) registry (NCT01657188) was designed to investigate whether treatment of CSA with ASV improved survival in HF-REF patients; the effects of ASV on symptoms and cardiopulmonary performance were also investigated. From January 2004 to October 2013, the registry prospectively enrolled HF-REF patients [NYHA class ≥ II, left ventricular ejection fraction (LVEF) ≤ 45%] with moderate to severe predominant CSA [apnea-hypopnea index (AHI) ≥ 15/h]. ASV-treated patients were followed up at 3, 6, 12 and 24 months, including natriuretic peptide concentrations, blood gas analyses, echocardiography, 6-min walk distance (6MWD), and cardiopulmonary exercise (CPX) testing. 550 patients were included [age 67.7 ± 10 years, 90% male, 52% in NYHA class ≥ III, LVEF 29.9 ± 8%, AHI 35.4 ± 13.6/h, and time with nocturnal oxygen saturation concentration, and nocturnal hypoxemia were significant predictors of mortality. Patient reported NYHA functional class improved in the ASV group, but LVEF, CPX, 6MWD, natriuretic peptides and blood gases remained unchanged. Long-term ASV treatment of predominant CSA in HF-REF patients included in our registry had no statistically significant effect on survival. ASV improved HF symptoms, but had no significant effects on exercise capacity, LVEF, natriuretic peptide concentrations or blood gases during follow-up as compared to control patients.

  8. Quantifying the Reproducibility of Heart Position During Treatment and Corresponding Delivered Heart Dose in Voluntary Deep Inhalation Breath Hold for Left Breast Cancer Patients Treated With External Beam Radiotherapy

    International Nuclear Information System (INIS)

    McIntosh, Alyson; Shoushtari, Asal N.; Benedict, Stanley H.; Read, Paul W.; Wijesooriya, Krishni

    2011-01-01

    Purpose: Voluntary deep inhalation breath hold (VDIBH) reduces heart dose during left breast irradiation. We present results of the first study performed to quantify reproducibility of breath hold using bony anatomy, heart position, and heart dose for VDIBH patients at treatment table. Methods and Materials: Data from 10 left breast cancer patients undergoing VDIBH whole-breast irradiation were analyzed. Two computed tomography (CT) scans, free breathing (FB) and VDIBH, were acquired to compare dose to critical structures. Pretreatment weekly kV orthogonal images and tangential ports were acquired. The displacement difference from spinal cord to sternum across the isocenter between coregistered planning Digitally Reconstructed Radiographs (DRRs) and kV imaging of bony thorax is a measure of breath hold reproducibility. The difference between bony coregistration and heart coregistration was the measured heart shift if the patient is aligned to bony anatomy. Results: Percentage of dose reductions from FB to VDIBH: mean heart dose (48%, SD 19%, p = 0.002), mean LAD dose (43%, SD 19%, p = 0.008), and maximum left anterior descending (LAD) dose (60%, SD 22%, p = 0.008). Average breath hold reproducibility using bony anatomy across the isocenter along the anteroposterior (AP) plane from planning to treatment is 1 (range, 0–3; SD, 1) mm. Average heart shifts with respect to bony anatomy between different breath holds are 2 ± 3 mm inferior, 1 ± 2 mm right, and 1 ± 3 mm posterior. Percentage dose changes from planning to delivery: mean heart dose (7%, SD 6%); mean LAD dose, ((9%, SD 7%)S, and maximum LAD dose, (11%, SD 11%) SD 11%, p = 0.008). Conclusion: We observed excellent three-dimensional bony registration between planning and pretreatment imaging. Reduced delivered dose to heart and LAD is maintained throughout VDIBH treatment.

  9. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  10. Pulse pressure as a haemodynamic variable in systolic heart failure

    NARCIS (Netherlands)

    Petrie, Colin James

    2016-01-01

    In patients with heart failure, the heart is unable to pump enough blood to satisfy the requirements of the body. Explanations for this include heart muscle damage after a heart attack. This could be very recently, or in the past, sometimes dating back many years. In other cases the explanation for

  11. INTEGRATION OF BIOMARKERS INTO THE PRACTICE OF TREATING PATIENTS WITH HEART FAILURE: THE ROLE OF DETERMINING THE BLOOD LEVEL OF NATRIURETIC PEPTIDES

    Directory of Open Access Journals (Sweden)

    S. R. Gilyarevskiy

    2017-01-01

    Full Text Available A clinical role of biomarkers (especially, natriuretic peptides is discussed in the article. The most important evidences of clinical effectiveness of using biomarkers in patients with suspected heart failure and in patients with confirmed diagnose of heart failure are reviewed. The need to use natriuretic peptides in patients with takotsubo syndrome is discussed. Limited diagnostic value of using natriuretic peptides in renal dysfunction, as well as in other diseases in which the concentration of natriuretic peptides may increase in the absence of heart failure, is also discussed.

  12. Heart murmurs

    Science.gov (United States)

    Chest sounds - murmurs; Heart sounds - abnormal; Murmur - innocent; Innocent murmur; Systolic heart murmur; Diastolic heart murmur ... The heart has 4 chambers: Two upper chambers (atria) Two lower chambers (ventricles) The heart has valves that close ...

  13. Heart Health Tests for Diabetes Patients

    Science.gov (United States)

    ... or fluids in the body. They include: Electrocardiogram ("EKG" or "ECG") This test measures the electrical activity ... Tools & Resources Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  14. Rehab for the Heart (A Minute of Health with CDC)

    Centers for Disease Control (CDC) Podcasts

    2017-08-24

    Each year, nearly 790,000 adults in the U.S. suffer a heart attack. This podcast discusses the importance of getting cardiac rehab after a heart attack.  Created: 8/24/2017 by MMWR.   Date Released: 8/24/2017.

  15. Rehab for the Heart (A Cup of Health with CDC)

    Centers for Disease Control (CDC) Podcasts

    Each year, nearly 790,000 adults in the U.S. suffer a heart attack. For a third of these, it's not their first. Cardiac rehabilitation could have prevented many of these. In this podcast, Dr. Fleetwood Loustalot discusses the importance of getting cardiac rehab after a heart attack.

  16. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    The need to assess security and take protection decisions is at least as old as our civilisation. However, the complexity and development speed of our interconnected technical systems have surpassed our capacity to imagine and evaluate risk scenarios. This holds in particular for risks...... that are caused by the strategic behaviour of adversaries. Therefore, technology-supported methods are needed to help us identify and manage these risks. In this paper, we describe the attack navigator: a graph-based approach to security risk assessment inspired by navigation systems. Based on maps of a socio...

  17. Attacks on computer systems

    Directory of Open Access Journals (Sweden)

    Dejan V. Vuletić

    2012-01-01

    Full Text Available Computer systems are a critical component of the human society in the 21st century. Economic sector, defense, security, energy, telecommunications, industrial production, finance and other vital infrastructure depend on computer systems that operate at local, national or global scales. A particular problem is that, due to the rapid development of ICT and the unstoppable growth of its application in all spheres of the human society, their vulnerability and exposure to very serious potential dangers increase. This paper analyzes some typical attacks on computer systems.

  18. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... is over, there's no permanent injury to the brain. There's no way to tell if symptoms of a stroke will lead to a TIA or a ... American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. The content in this ...

  19. Recent "phishing" attacks

    CERN Multimedia

    IT Department

    2009-01-01

    Over the last few weeks there has been a marked increase in the number of attacks on CERN made by cybercriminals. Typical attacks arrive in the form of e-mail messages purporting to come from the CERN Help Desk, Mail Service, or some similarly official-sounding entity and suggest that there is a problem with your account, such as it being over-quota. They then ask you to click on a link or to reply and give your password. Please don’t! Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. NEVER provide your password or other details if these are requested. These messages try to trick you into clicking on Web links which will help them to install malicious software on your computer, and anti-virus software cannot be relied on to detect all cases. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN Comput...

  20. Hereditary angioedema attacks resolve faster and are shorter after early icatibant treatment.

    Directory of Open Access Journals (Sweden)

    Marcus Maurer

    Full Text Available BACKGROUND: Attacks of hereditary angioedema (HAE are unpredictable and, if affecting the upper airway, can be lethal. Icatibant is used for physician- or patient self-administered symptomatic treatment of HAE attacks in adults. Its mode of action includes disruption of the bradykinin pathway via blockade of the bradykinin B(2 receptor. Early treatment is believed to shorten attack duration and prevent severe outcomes; however, evidence to support these benefits is lacking. OBJECTIVE: To examine the impact of timing of icatibant administration on the duration and resolution of HAE type I and II attacks. METHODS: The Icatibant Outcome Survey is an international, prospective, observational study for patients treated with icatibant. Data on timings and outcomes of icatibant treatment for HAE attacks were collected between July 2009-February 2012. A mixed-model of repeated measures was performed for 426 attacks in 136 HAE type I and II patients. RESULTS: Attack duration was significantly shorter in patients treated <1 hour of attack onset compared with those treated ≥ 1 hour (6.1 hours versus 16.8 hours [p<0.001]. Similar significant effects were observed for <2 hours versus ≥ 2 hours (7.2 hours versus 20.2 hours [p<0.001] and <5 hours versus ≥ 5 hours (8.0 hours versus 23.5 hours [p<0.001]. Treatment within 1 hour of attack onset also significantly reduced time to attack resolution (5.8 hours versus 8.8 hours [p<0.05]. Self-administrators were more likely to treat early and experience shorter attacks than those treated by a healthcare professional. CONCLUSION: Early blockade of the bradykinin B(2 receptor with icatibant, particularly within the first hour of attack onset, significantly reduced attack duration and time to attack resolution.

  1. Cyber Attacks and Combat Behavior

    Directory of Open Access Journals (Sweden)

    Carataș Maria Alina

    2017-01-01

    Full Text Available Cyber terrorism is an intangible danger, a real over the corner threat in the life of individuals,organizations, and governments and is getting harder to deal with its damages. The motivations forthe cyber-attacks are different, depending on the terrorist group, from cybercrime to hacktivism,attacks over the authorities’ servers. Organizations constantly need to find new ways ofstrengthening protection against cyber-attacks, assess their cyber readiness, expand the resiliencecapacity and adopts international security regulations.

  2. Prevalência dos atendimentos por crises de asma nos serviços públicos do Município de Juiz de Fora (MG Prevalence of asthma attacks treated in public health facilities in the city of Juiz de Fora, Brazil

    Directory of Open Access Journals (Sweden)

    Oscarina da Silva Ezequiel

    2007-02-01

    Full Text Available OBJETIVO: Avaliar a prevalência dos atendimentos por crises de asma nos serviços públicos de Juiz de Fora (MG, no período de 01/02/2002 a 31/01/2003. MÉTODOS: Realizou-se estudo seccional, mensalmente, avaliando-se os atendimentos por crises de asma. As variáveis analisadas foram sexo, idade, local de residência dos pacientes, diferenças no perfil dos atendimentos segundo a faixa etária e o local de atendimento, além da correlação das crises asmáticas com temperatura e umidade relativa do ar. RESULTADOS:Foram atendidos 25.243 pacientes com crises asmáticas, representando 11,1% do total de consultas da clínica pediátrica e 2,7% do total de consultas da clínica médica. A média de idade dos pacientes foi de 11,6 anos e a mediana de quatro anos. Eram do sexo masculino 52,9% dos pacientes. A análise da distribuição anual evidenciou um aumento do número de atendimentos por crises asmáticas nos meses de maio (11,5%, junho (10,8% e julho (10,9%, com correlação inversa e forte para temperatura (-0,86 e inversa e fraca para umidade relativa (-0,27. Houve diferença estatisticamente significativa entre as médias de idade e sexo, quando se compararam os serviços de urgência e as unidades básicas de saúde. A avaliação segundo a faixa etária demonstrou predomínio do sexo masculino nos pacientes menores de doze anos e do feminino nos maiores ou com doze anos. CONCLUSÃO: Observou-se a importância da asma como problema de saúde pública no município, o qual necessita de estratégias locais urgentes que permitam aumentar os investimentos em tratamentos profiláticos.OBJECTIVE: To evaluate the prevalence of asthma attacks treated in public health facilities in the city of Juiz de Fora, Brazil from February 1, 2002 to January 31, 2003. METHODS:This was a cross-sectional study involving monthly analyses performed in order to evaluate the asthma attacks treated. The variables analyzed were patient gender, age, and place of

  3. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  4. Enlarged Heart

    Science.gov (United States)

    ... rheumatic fever, a heart defect, infections (infectious endocarditis), connective tissue disorders, certain medications or radiation treatments for cancer, your heart may enlarge. Disease of the heart ...

  5. Crony Attack: Strategic Attack’s Silver Bullet

    Science.gov (United States)

    2006-11-01

    physical assets or financial assets. The form of crony attack that most closely resembles classic strategic attack is to deny, degrade, or destroy a money...February 1951. Reprinted in Airpower Studies Coursebook , Air Command and Staff College, Maxwell AFB, AL, 2002, 152–58. Hirsch, Michael. “NATO’s Game of

  6. Incidence of Transient Ischemic Attack in Auckland, New Zealand, in 2011 to 2012.

    Science.gov (United States)

    Barber, P Alan; Krishnamurthi, Rita; Parag, Varsha; Anderson, Neil E; Ranta, Annemarei; Kilfoyle, Dean; Wong, Edward; Green, Geoff; Arroll, Bruce; Bennett, Derrick A; Witt, Emma; Rush, Elaine; Minsun Suh, Flora; Theadom, Alice; Rathnasabapathy, Yogini; Te Ao, Braden; Parmar, Priyakumari; Feigin, Valery L

    2016-09-01

    There have been few recent population-based studies reporting the incidence (first ever) and attack rates (incident and recurrent) of transient ischemic attack (TIA). The fourth Auckland Regional Community Stroke study (ARCOS IV) used multiple overlapping case ascertainment methods to identify all hospitalized and nonhospitalized cases of TIA that occurred in people ≥16 years of age usually resident in Auckland (population ≥16 years of age is 1.12 million), during the 12 months from March 1, 2011. All first-ever and recurrent new TIAs (any new TIA 28 days after the index event) during the study period were recorded. There were 785 people with TIA (402 [51.2%] women, mean [SD] age 71.5 [13.8] years); 614 (78%) of European origin, 84 (11%) Māori/Pacific, and 75 (10%) Asian/Other. The annual incidence of TIA was 40 (95% confidence interval, 36-43), and attack rate was 63 (95% confidence interval, 59-68), per 100 000 people, age standardized to the World Health Organization world population. Approximately two thirds of people were known to be hypertensive or were being treated with blood pressure-lowering agents, half were taking antiplatelet agents and just under half were taking lipid-lowering therapy before the index TIA. Two hundred ten (27%) people were known to have atrial fibrillation at the time of the TIA, of whom only 61 (29%) were taking anticoagulant therapy, suggesting a failure to identify or treat atrial fibrillation. This study describes the burden of TIA in an era of aggressive primary and secondary vascular risk factor management. Education programs for medical practitioners and patients around the identification and management of atrial fibrillation are required. © 2016 American Heart Association, Inc.

  7. Repeated exposure to methamphetamine induces sex-dependent hypersensitivity to ischemic injury in the adult rat heart.

    Directory of Open Access Journals (Sweden)

    Boyd R Rorabaugh

    Full Text Available We previously reported that adult female, but not male rats that were prenatally exposed to methamphetamine exhibit myocardial hypersensitivity to ischemic injury. However, it is unknown whether hypersensitivity to ischemic injury develops when rats are exposed to methamphetamine during adulthood. The goal of this study was to determine whether methamphetamine exposure during adulthood sensitizes the heart to ischemic injury.Adult male and female rats received daily injections of methamphetamine (5 mg/kg or saline for 10 days. Their hearts were isolated on day 11 and subjected to a 20 min ischemic insult on a Langendorff isolated heart apparatus. Cardiac contractile function was measured by an intraventricular balloon, and infarct size was measured by triphenyltetrazolium chloride staining.Hearts from methamphetamine-treated females exhibited significantly larger infarcts and suppressed postischemic recovery of contractile function compared to hearts from saline-treated females. In contrast, methamphetamine had no effect on infarct size or contractile recovery in male hearts. Subsequent experiments demonstrated that hypersensitivity to ischemic injury persisted in female hearts following a 1 month period of abstinence from methamphetamine. Myocardial protein kinase C-ε expression, Akt phosphorylation, and ERK phosphorylation were unaffected by adult exposure to methamphetamine.Exposure of adult rats to methamphetamine sex-dependently increases the extent of myocardial injury following an ischemic insult. These data suggest that women who have a heart attack might be at risk of more extensive myocardial injury if they have a recent history of methamphetamine abuse.

  8. Repeated exposure to methamphetamine induces sex-dependent hypersensitivity to ischemic injury in the adult rat heart

    Science.gov (United States)

    Seeley, Sarah L.; Stoops, Thorne S.; D’Souza, Manoranjan S.

    2017-01-01

    Background We previously reported that adult female, but not male rats that were prenatally exposed to methamphetamine exhibit myocardial hypersensitivity to ischemic injury. However, it is unknown whether hypersensitivity to ischemic injury develops when rats are exposed to methamphetamine during adulthood. The goal of this study was to determine whether methamphetamine exposure during adulthood sensitizes the heart to ischemic injury. Methods Adult male and female rats received daily injections of methamphetamine (5 mg/kg) or saline for 10 days. Their hearts were isolated on day 11 and subjected to a 20 min ischemic insult on a Langendorff isolated heart apparatus. Cardiac contractile function was measured by an intraventricular balloon, and infarct size was measured by triphenyltetrazolium chloride staining. Results Hearts from methamphetamine-treated females exhibited significantly larger infarcts and suppressed postischemic recovery of contractile function compared to hearts from saline-treated females. In contrast, methamphetamine had no effect on infarct size or contractile recovery in male hearts. Subsequent experiments demonstrated that hypersensitivity to ischemic injury persisted in female hearts following a 1 month period of abstinence from methamphetamine. Myocardial protein kinase C-ε expression, Akt phosphorylation, and ERK phosphorylation were unaffected by adult exposure to methamphetamine. Conclusions Exposure of adult rats to methamphetamine sex-dependently increases the extent of myocardial injury following an ischemic insult. These data suggest that women who have a heart attack might be at risk of more extensive myocardial injury if they have a recent history of methamphetamine abuse. PMID:28575091

  9. Invisible Trojan-horse attack

    DEFF Research Database (Denmark)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin

    2017-01-01

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance...

  10. When Sinuses Attack! (For Kids)

    Science.gov (United States)

    ... First Aid & Safety Doctors & Hospitals Videos Recipes for Kids Kids site Sitio para niños How the Body Works ... Search English Español When Sinuses Attack! KidsHealth / For Kids / When Sinuses Attack! What's in this article? What ...

  11. An open-label dose escalation study to evaluate the safety of administration of nonviral stromal cell-derived factor-1 plasmid to treat symptomatic ischemic heart failure.

    Science.gov (United States)

    Penn, Marc S; Mendelsohn, Farrell O; Schaer, Gary L; Sherman, Warren; Farr, Maryjane; Pastore, Joseph; Rouy, Didier; Clemens, Ruth; Aras, Rahul; Losordo, Douglas W

    2013-03-01

    Preclinical studies indicate that adult stem cells induce tissue repair by activating endogenous stem cells through the stromal cell-derived factor-1:chemokine receptor type 4 axis. JVS-100 is a DNA plasmid encoding human stromal cell-derived factor-1. We tested in a phase 1, open-label, dose-escalation study with 12 months of follow-up in subjects with ischemic cardiomyopathy to see if JVS-100 improves clinical parameters. Seventeen subjects with ischemic cardiomyopathy, New York Heart Association class III heart failure, with an ejection fraction ≤40% on stable medical therapy, were enrolled to receive 5, 15, or 30 mg of JVS-100 via endomyocardial injection. The primary end points for safety and efficacy were at 1 and 4 months, respectively. The primary safety end point was a major adverse cardiac event. Efficacy end points were change in quality of life, New York Heart Association class, 6-minute walk distance, single photon emission computed tomography, N-terminal pro-brain natruretic peptide, and echocardiography at 4 and 12 months. The primary safety end point was met. At 4 months, all of the cohorts demonstrated improvements in 6-minute walk distance, quality of life, and New York Heart Association class. Subjects in the 15- and 30-mg dose groups exhibited improvements in 6-minute walk distance (15 mg: median [range]: 41 minutes [3-61 minutes]; 30 mg: 31 minutes [22-74 minutes]) and quality of life (15 mg: -16 points [+1 to -32 points]; 30 mg: -24 points [+17 to -38 points]) over baseline. At 12 months, improvements in symptoms were maintained. These data highlight the importance of defining the molecular mechanisms of stem cell-based tissue repair and suggest that overexpression of stromal cell-derived factor-1 via gene therapy is a strategy for improving heart failure symptoms in patients with ischemic cardiomyopathy.

  12. Invisible Trojan-horse attack.

    Science.gov (United States)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin; Makarov, Vadim

    2017-08-21

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Ac´ın-Ribordy-Gisin (SARG04) QKD protocol at 1924 nm versus that at 1536 nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N. Jain et al., New J. Phys. 16, 123030 (2014). However at 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.

  13. Inflammation and neuropathic attacks in hereditary brachial plexus neuropathy

    Science.gov (United States)

    Klein, C; Dyck, P; Friedenberg, S; Burns, T; Windebank, A; Dyck, P

    2002-01-01

    Objective: To study the role of mechanical, infectious, and inflammatory factors inducing neuropathic attacks in hereditary brachial plexus neuropathy (HBPN), an autosomal dominant disorder characterised by attacks of pain and weakness, atrophy, and sensory alterations of the shoulder girdle and upper limb muscles. Methods: Four patients from separate kindreds with HBPN were evaluated. Upper extremity nerve biopsies were obtained during attacks from a person of each kindred. In situ hybridisation for common viruses in nerve tissue and genetic testing for a hereditary tendency to pressure palsies (HNPP; tomaculous neuropathy) were undertaken. Two patients treated with intravenous methyl prednisolone had serial clinical and electrophysiological examinations. One patient was followed prospectively through pregnancy and during the development of a stereotypic attack after elective caesarean delivery. Results: Upper extremity nerve biopsies in two patients showed prominent perivascular inflammatory infiltrates with vessel wall disruption. Nerve in situ hybridisation for viruses was negative. There were no tomaculous nerve changes. In two patients intravenous methyl prednisolone ameliorated symptoms (largely pain), but with tapering of steroid dose, signs and symptoms worsened. Elective caesarean delivery did not prevent a typical postpartum attack. Conclusions: Inflammation, probably immune, appears pathogenic for some if not all attacks of HBPN. Immune modulation may be useful in preventing or reducing the neuropathic attacks, although controlled trials are needed to establish efficacy, as correction of the mutant gene is still not possible. The genes involved in immune regulation may be candidates for causing HBPN disorders. PMID:12082044

  14. HEART FAILURE – KEEPING STEP WITH THE PROGRESS

    Directory of Open Access Journals (Sweden)

    Camelia Diaconu

    2018-06-01

    Full Text Available Chronic heart failure continues to represent a major problem for the healthcare systems worldwide, because of high prevalence and impact on patients’ quality of life. Between May 25-28, 2018, in Vienna, Austria, took place the European Congress of Heart Failure and the World Congress on Acute Heart Failure, organized by the European Society of Cardiology. The congress was a forum of exchanging expertise in diagnosis and treatment of heart failure, and also an opportunity to present the latest progresses regarding the management of this pathology. It seems that an integrated, multidisciplinary team approach is the future for heart failure management. This team should include internists, cardiologists, general practitioners, and nurses. The new President of the Heart Failure Association of the European Society of Cardiology is from a Balkan country, Prof. Petar M. Seferovic, from the Belgrade University Medical Center, Serbia. In one of his presentations, Prof. Seferovic highlighted that the treatment of chronic heart failure should explore new frontiers. Recently, there is much interest in established antidiabetic drugs to treat cardiovascular complications of diabetes. Introduction of sodium-glucose transport protein 2 (SGLT2 inhibitors in the late 1990s was a major breakthrough in the treatment of diabetes complications. These drugs are the only antidiabetic drugs with good results in the treatment of cardiovascular diseases, demonstrated by several large randomized controlled trials, such as EMPA-REG (the first study to demonstrate a significant reduction in both cardiovascular mortality and heart failure-related hospitalization in patients treated with empaglifozin, a SGLT2 inhibitor. SGLT2 inhibitors are now recommended by some guidelines for the prevention of heart failure and associated mortality in patients with type 2 diabetes. The international registry REPORT HF, presented in Vienna, enrolled more than 18,000 patients from 44

  15. Chess therapy: A new approach to curing panic attack.

    Science.gov (United States)

    Barzegar, Kazem; Barzegar, Somayeh

    2017-12-01

    To study the effect of playing cell phone chess game on treating panic attack. The chess game on an android cell phone was played by the researcher who was affected by panic attack as a post-traumatic disorder immediately after or before feeling of the start of symptoms. The right level of difficulty, i.e., levels 2-4, was selected for optimal results. Playing chess game on the android cell phone prevented the manifestation of panic attack and led to the cure of this traumatic condition. Chess therapy with the right level of difficulty can be recommended as a very effective non-pharmaceutical method for the successful treatment of panic attacks. Copyright © 2017 Elsevier B.V. All rights reserved.

  16. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  17. Shark Attack Project - Marine Attack at Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Adrianus J

    2005-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  18. [Total artificial heart].

    Science.gov (United States)

    Antretter, H; Dumfarth, J; Höfer, D

    2015-09-01

    To date the CardioWest™ total artificial heart is the only clinically available implantable biventricular mechanical replacement for irreversible cardiac failure. This article presents the indications, contraindications, implantation procedere and postoperative treatment. In addition to a overview of the applications of the total artificial heart this article gives a brief presentation of the two patients treated in our department with the CardioWest™. The clinical course, postoperative rehabilitation, device-related complications and control mechanisms are presented. The total artificial heart is a reliable implant for treating critically ill patients with irreversible cardiogenic shock. A bridge to transplantation is feasible with excellent results.

  19. Comparison of clinical profile and management of outpatients with heart failure with reduced left ventricular ejection fraction treated by general practitioners and cardiologists in contemporary Poland: the results from the DATA-HELP registry.

    Science.gov (United States)

    Jankowska, Ewa A; Kalicinska, Elzbieta; Drozd, Marcin; Kurian, Beata; Banasiak, Waldemar; Ponikowski, Piotr

    2014-10-20

    We sought to determine and compare clinical profile and management of outpatients with heart failure with reduced ejection fraction (HFREF) treated by cardiologists and general practitioners (GPs) in Poland. All the 790 randomly selected cardiologists and GPs in the DATA-HELP registry, which included 5563 patients, filled out questionnaires about 10 consecutive outpatients with HFREF. Outpatients managed by GPs were older (69±10 vs 66±12 years), and the prevalence of men was less marked (58% vs 67%). They also had higher left ventricular ejection fraction (38±6% vs 35±8%) and had more pulmonary congestion (63% vs 49%) and peripheral oedema (66% vs 51%), compared with those treated by cardiologists (all p0.2) and digoxin (20% vs 21%, p>0.2) by GPs and cardiologists was similar. In contemporary Poland, most outpatients with HFREF receive drugs that improve survival and undergo revascularisation procedures, although devices are rare, but the clinical profiles and management of those treated by GPs and cardiologists differ. Outpatients treated by GPs are older and have more co-morbidities. Outpatients treated by cardiologists more commonly receive β-blocker, MRA, ICD, and CRT, and undergo coronary revascularisations. Copyright © 2014. Published by Elsevier Ireland Ltd.

  20. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  1. Neuroradiological study of transient ischemic attack

    Energy Technology Data Exchange (ETDEWEB)

    Takusagawa, Yoshihiko; Fujiwara, Yasuhiro; Ichiki, Ken; Suga, Takeshi; Nishigaki, Shinichi

    1986-08-01

    Fifty-two patients with carotid TIAs and thirteen patients with vertebrobasilar TIAs were investigated by angiography and computed tomography. TIA was diagnosed by clinical symptoms in accordance with the criteria for TIA of the Joint Committee for Stroke Facilities in the U.S.A. (1974). The 65 patients with TIAs included 49 males and 16 females with average age of 63.5 years old at the initial episode of TIA. As for the diseases associated with TIA, hypertension (51 %), diabetes mellitus (15 %) and ischemic heart diseases (11 %) were the major disorders. Atrial fibrillation was observed in 2 cases. Intervals from last TIA attack to angiography were less than 7 days in 22 cases, 8 -- 30 days in 19 cases, 1 -- 4 monthes in 14 cases and more than 4 monthes in 10 cases, respectively. The cases in which angiography was done earlier after attacks displayed more abnormal findings. In 52 patients with caroted TIAs the artherosclerotic change of extracranial portion of the internal carotid artery was found in 14 cases (27 %), that of intracranial portion of the artery in 11 cases (21 %) and both lesions in 2 cases (4 %). On the other hand, in 13 patients with vertebrobasilar TIAs, this change was observed in 4 cases at the extracranival potion and in 1 case at the intracranial potion (siphon) of the internal carotid artery. Abnormal CT findings were found in 29 of 65 patients, namely 9 had ventricular dilatation and brain atrophy, 6 had cerebral infarction which was not associated with associated with symptoms of TIA. In carotid TIAs, Cerebral infarction was associated with symptoms of TIAs in 15 cases, namely 10 had a small low density area in the basal ganglia near the internal capsule and 5 had a low density area in the cortical or subcortical region. All of these 5 cases had cerebral embolism, which recanalized after attacks. (J.P.N.).

  2. Neuroradiological study of transient ischemic attack

    International Nuclear Information System (INIS)

    Takusagawa, Yoshihiko; Fujiwara, Yasuhiro; Ichiki, Ken; Suga, Takeshi; Nishigaki, Shinichi

    1986-01-01

    Fifty-two patients with carotid TIAs and thirteen patients with vertebrobasilar TIAs were investigated by angiography and computed tomography. TIA was diagnosed by clinical symptoms in accordance with the criteria for TIA of the Joint Committee for Stroke Facilities in the U.S.A. (1974). The 65 patients with TIAs included 49 males and 16 females with average age of 63.5 years old at the initial episode of TIA. As for the diseases associated with TIA, hypertension (51 %), diabetes mellitus (15 %) and ischemic heart diseases (11 %) were the major disorders. Atrial fibrillation was observed in 2 cases. Intervals from last TIA attack to angiography were less than 7 days in 22 cases, 8 ∼ 30 days in 19 cases, 1 ∼ 4 monthes in 14 cases and more than 4 monthes in 10 cases, respectively. The cases in which angiography was done earlier after attacks displayed more abnormal findings. In 52 patients with caroted TIAs the artherosclerotic change of extracranial portion of the internal carotid artery was found in 14 cases (27 %), that of intracranial portion of the artery in 11 cases (21 %) and both lesions in 2 cases (4 %). On the other hand, in 13 patients with vertebrobasilar TIAs, this change was observed in 4 cases at the extracranival potion and in 1 case at the intracranial potion (siphon) of the internal carotid artery. Abnormal CT findings were found in 29 of 65 patients, namely 9 had ventricular dilatation and brain atrophy, 6 had cerebral infarction which was not associated with associated with symptoms of TIA. In carotid TIAs, Cerebral infarction was associated with symptoms of TIAs in 15 cases, namely 10 had a small low density area in the basal ganglia near the internal capsule and 5 had a low density area in the cortical or subcortical region. All of these 5 cases had cerebral embolism, which recanalized after attacks. (J.P.N.)

  3. Massive attack of honeybee on macaws (Ara ararauna and Ara chloropterus) in Brazil - A case report.

    Science.gov (United States)

    Milbradt, Elisane Lenita; Silva, Tarcísio Macedo; Hataka, Alessandre; Teixeira, Carlos Roberto; Okamoto, Adriano Sakai; Andreatti Filho, Raphael Lucio

    2017-09-15

    Three adult birds of the species Ara chloropterus and five of the species Ara ararauna from a conservation breeding facility suffered a massive attack by honeybees. The A. chloropterus birds presented swollen puncture lesions with stingers (mainly in the facial regions without feathers), swelling of the eyelids and subcutaneous tissue, and respiratory distress, and they were treated with intramuscular injections of 1.67 mg/kg of promethazine and 10 mg/kg of hydrocortisone followed by removal of the stingers. Complete remission of the clinical signs occurred 48 hours after start of treatment. The five A. ararauna birds died before they arrived at the veterinary hospital, and the necropsies found stingers in the areas of the face without feathers and the subcutaneous tissue, which were associated with erythema, bruising, and swelling. Food content from the crop was found in the oral cavity and the tracheal lumen, and marked congestion was observed in the heart, liver, spleen, lungs, kidneys, brain, and cerebellum. Among the histopathological findings, significant swelling of the myocytes in the endocardium and vascular dilation with erythroid repletion were observed, and there were multifocal areas of centrilobular necrosis associated with severe congestion and hemorrhaging in the hepatic tissue. Severe acute tubular necrosis and hydropic-vacuolar degeneration were observed in the kidneys. The clinical signs and pathological findings suggest envenomation due to a massive bee attack, the first such report for Psittacidae. Copyright © 2017 Elsevier Ltd. All rights reserved.

  4. Forensics Investigation of Web Application Security Attacks

    OpenAIRE

    Amor Lazzez; Thabet Slimani

    2015-01-01

    Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the sec...

  5. CDC Vital Signs-Heart Age

    Centers for Disease Control (CDC) Podcasts

    2015-09-01

    This podcast is based on the September 2015 CDC Vital Signs report. Your heart age is the age of your heart and blood vessels as a result of your risk factors for heart attack and stroke. If you smoke or have high blood pressure, your heart age will be much higher than your actual age. Learn what you can do to lower your heart age and keep it low.  Created: 9/1/2015 by National Center for Chronic Disease Prevention and Health Promotion (NCCDPHP).   Date Released: 9/1/2015.

  6. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  7. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  8. Panic Attacks and Panic Disorder

    Science.gov (United States)

    ... Major changes in your life, such as a divorce or the addition of a baby Smoking or ... quality of life. Complications that panic attacks may cause or be linked to include: Development of specific ...

  9. Genetic attack on neural cryptography

    International Nuclear Information System (INIS)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-01-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size

  10. Genetic attack on neural cryptography

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  11. Implications of recent hypertension trials for the generalist physician: whom do we treat, and how?

    Directory of Open Access Journals (Sweden)

    Green Lee

    2000-07-01

    Full Text Available Abstract The publication of the results of the Swedish Trial in Old Patients with Hypertension-2 (STOP-2 and the termination of the doxazocin arm of the Antihypertensive and Lipid Lowering Treatment to Prevent Heart Attack (ALLHAT study again raise the question of whether all antihypertensives deliver equal cardiovascular outcome benefits. Data from research on congestive heart failure and from the Heart Outcomes Prevention Evaluation (HOPE trial illuminate the roles and possible mechanisms of humoral mediators of vascular damage, suggesting, first, that some antihypertensives (thiazides, beta-blockers, and angiotensin-converting enzyme inhibitors can deliver more improvement in outcomes than other agents and, second, that decisions on whom to treat are best made based on risk appraisal, not merely pressures.

  12. Software-based Microarchitectural Attacks

    OpenAIRE

    Gruss, Daniel

    2017-01-01

    Modern processors are highly optimized systems where every single cycle of computation time matters. Many optimizations depend on the data that is being processed. Software-based microarchitectural attacks exploit effects of these optimizations. Microarchitectural side-channel attacks leak secrets from cryptographic computations, from general purpose computations, or from the kernel. This leakage even persists across all common isolation boundaries, such as processes, containers, and virtual ...

  13. OPERATION COBRA. Deliberate Attack, Exploitation

    Science.gov (United States)

    1984-05-25

    to attack Sens, then continue to Troyes , on the Seine River. CCA was in the north, crossing the Loing River at Souppes against light resistance and...advanced from Troyes and prepared positions close to Sens. Under strong artillery support, a task force from CCA (TF Oden) attacked the enemy frontally...movement towards the Seine River on 24 August with an advance toward Troyes . Facing the combat command were what remained of the 51st SS Brigade, light

  14. Heart Failure

    Science.gov (United States)

    Heart failure is a condition in which the heart can't pump enough blood to meet the body's needs. Heart failure does not mean that your heart has stopped ... and shortness of breath Common causes of heart failure are coronary artery disease, high blood pressure and ...

  15. Diabetic Heart Disease

    Science.gov (United States)

    ... medicine to treat high blood pressure). A high fasting blood sugar level (or you're on medicine to treat high blood sugar). It's unclear whether these risk factors have a common cause or are mainly related by their combined effects on the heart. Obesity seems to set the stage for metabolic syndrome. ...

  16. Development and Validation of a Model to Predict Absolute Vascular Risk Reduction by Moderate-Intensity Statin Therapy in Individual Patients With Type 2 Diabetes Mellitus: The Anglo Scandinavian Cardiac Outcomes Trial, Antihypertensive and Lipid-Lowering Treatment to Prevent Heart Attack Trial, and Collaborative Atorvastatin Diabetes Study.

    Science.gov (United States)

    Kaasenbrood, Lotte; Poulter, Neil R; Sever, Peter S; Colhoun, Helen M; Livingstone, Shona J; Boekholdt, S Matthijs; Pressel, Sara L; Davis, Barry R; van der Graaf, Yolanda; Visseren, Frank L J

    2016-05-01

    In this study, we aimed to translate the average relative effect of statin therapy from trial data to the individual patient with type 2 diabetes mellitus by developing and validating a model to predict individualized absolute risk reductions (ARR) of cardiovascular events. Data of 2725 patients with type 2 diabetes mellitus from the Lipid Lowering Arm of the Anglo Scandinavian Cardiac Outcomes Trial (ASCOT-LLA) study (atorvastatin 10 mg versus placebo) were used for model derivation. The model was based on 8 clinical predictors including treatment allocation (statin/placebo). Ten-year individualized ARR on major cardiovascular events by statin therapy were calculated for each patient by subtracting the estimated on-treatment risk from the estimated off-treatment risk. Predicted 10-year ARR by statin therapy was 4% (median ARR, 3.2%; interquartile range, 2.5%-4.3%; 95% confidence interval for 3.2% ARR, -1.4% to 6.8%). Addition of treatment interactions did not improve model performance. Therefore, the wide distribution in ARR was a consequence of the underlying distribution in cardiovascular risk enrolled in these trials. External validation of the model was performed in data from the Antihypertensive and Lipid-Lowering Treatment to Prevent Heart Attack Trial (ALLHAT-LLT; pravastatin 40 mg versus usual care) and Collaborative Atorvastatin Diabetes Study (CARDS; atorvastatin 10 mg versus placebo) of 3878 and 2838 patients with type 2 diabetes mellitus, respectively. Model calibration was adequate in both external data sets, discrimination was moderate (ALLHAT-LLT: c-statistics, 0.64 [95% confidence interval, 0.61-0.67] and CARDS: 0.68 [95% confidence interval, 0.64-0.72]). ARRs of major cardiovascular events by statin therapy can be accurately estimated for individual patients with type 2 diabetes mellitus using a model based on routinely available patient characteristics. There is a wide distribution in ARR that may complement informed decision making. URL: http

  17. Choosing What to Protect When Attacker Resources and Asset Valuations are Uncertain

    Directory of Open Access Journals (Sweden)

    Kjell Hausken

    2014-01-01

    Full Text Available The situation has been modelled where the attacker's resources are unknown to the defender. Protecting assets presupposes that the defender has some information on the attacker's resource capabilities. An attacker targets one of two assets. The attacker's resources and valuations of these assets are drawn probabilistically. We specify when the isoutility curves are upward sloping (the defender prefers to invest less in defense, thus leading to higher probabilities of success for attacks on both assets or downward sloping (e.g. when one asset has a low value or high unit defense cost. This stands in contrast to earlier research and results from the uncertainty regarding the level of the attacker's resources. We determine which asset the attacker targets depending on his type, unit attack costs, the contest intensity, and investment in defense. A two stage game is considered, where the defender moves first and the attacker moves second. When both assets are equivalent and are treated equivalently by both players, an interior equilibrium exists when the contest intensity is low, and a corner equilibrium with no defense exists when the contest intensity is large and the attacker holds large resources. Defense efforts are inverse U shaped in the attacker's resources. (original abstract

  18. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  19. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica......Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error......-prone and impracticable for large systems. Nonetheless, the automated generation of attack trees has only been explored in connection to computer networks and levering rich models, whose analysis typically leads to an exponential blow-up of the state space. We propose a static analysis approach where attack trees...... are automatically inferred from a process algebraic specification in a syntax-directed fashion, encompassing a great many application domains and avoiding incurring systematically an exponential explosion. Moreover, we show how the standard propositional denotation of an attack tree can be used to phrase...

  20. Heartburn or Chest Pain: When Is It Heart Attack?

    Science.gov (United States)

    ... of cardiovascular imaging in emergency department patients with chest pain: A joint document of the American College of Radiology Appropriateness Criteria Committee and the American College of ...

  1. [A heart attack: was the patient lucky or unlucky?

    NARCIS (Netherlands)

    Olde Hartman, T.C.; van Ravesteijn, H.; Lucassen, P.L.B.J.

    2012-01-01

    CIRCUMSTANCES WERE FAVOURABLE BUT OUTCOME ILL-FATED: The assessment of signs and symptoms in primary care is an important but difficult task for general practitioners (GPs) who have to decide whether symptoms require immediate action or rather a watchful waiting approach. However, the GP may

  2. An Analysis of Attacks on Blockchain Consensus

    OpenAIRE

    Bissias, George; Levine, Brian Neil; Ozisik, A. Pinar; Andresen, Gavin

    2016-01-01

    We present and validate a novel mathematical model of the blockchain mining process and use it to conduct an economic evaluation of the double-spend attack, which is fundamental to all blockchain systems. Our analysis focuses on the value of transactions that can be secured under a conventional double-spend attack, both with and without a concurrent eclipse attack. Our model quantifies the importance of several factors that determine the attack's success, including confirmation depth, attacke...

  3. Recurrent spontaneous attacks of dizziness.

    Science.gov (United States)

    Lempert, Thomas

    2012-10-01

    This article describes the common causes of recurrent vertigo and dizziness that can be diagnosed largely on the basis of history. Ninety percent of spontaneous recurrent vertigo and dizziness can be explained by six disorders: (1) Ménière disease is characterized by vertigo attacks, lasting 20 minutes to several hours, with concomitant hearing loss, tinnitus, and aural fullness. Aural symptoms become permanent during the course of the disease. (2) Attacks of vestibular migraine may last anywhere from minutes to days. Most patients have a previous history of migraine headaches, and many experience migraine symptoms during the attack. (3) Vertebrobasilar TIAs affect older adults with vascular risk factors. Most attacks last less than 1 hour and are accompanied by other symptoms from the posterior circulation territory. (4) Vestibular paroxysmia is caused by vascular compression of the eighth cranial nerve. It manifests itself with brief attacks of vertigo that recur many times per day, sometimes with concomitant cochlear symptoms. (5) Orthostatic hypotension causes brief episodes of dizziness lasting seconds to a few minutes after standing up and is relieved by sitting or lying down. In older adults, it may be accompanied by supine hypertension. (6) Panic attacks usually last minutes, occur in specific situations, and are accompanied by choking, palpitations, tremor, heat, and anxiety. Less common causes of spontaneous recurrent vertigo and dizziness include perilymph fistula, superior canal dehiscence, autoimmune inner ear disease, otosclerosis, cardiac arrhythmia, and medication side effects. Neurologists need to venture into otolaryngology, internal medicine, and psychiatry to master the differential diagnosis of recurrent dizziness.

  4. Bi-level positive airway pressure ventilation for treating heart failure with central sleep apnea that is unresponsive to continuous positive airway pressure.

    Science.gov (United States)

    Dohi, Tomotaka; Kasai, Takatoshi; Narui, Koji; Ishiwata, Sugao; Ohno, Minoru; Yamaguchi, Tetsu; Momomura, Shin-Ichi

    2008-07-01

    Cheyne-Stokes respiration with central sleep apnea (CSR-CSA) is associated with a poor prognosis in patients with heart failure (HF). However, some patients do not respond to continuous positive airway pressure (CPAP), so other therapeutic modalities should be considered, such as bi-level positive airway pressure (PAP), which also assists respiration and might be effective for such patients. The 20 patients with HF because of left ventricular systolic dysfunction were assessed: 8 had ischemic etiology, and all had severe CSA according to the apnea - hypopnea index (AHI) determined by polysomnography. All diagnosed patients underwent repeat polysomnography using CPAP. The AHI improved significantly in 11 (AHI or=15). Bi-level PAP titration significantly improved the AHI in the latter group. Those who were unresponsive to CPAP had significantly lower PaCO(2), higher plasma brain natriuretic peptide (BNP), longer mean duration of CSR and fewer obstructive episodes than CPAP responders. After 6 months of positive airway support with either CPAP (n=9) or bi-level PAP (n=7), BNP levels significantly decreased and left ventricular ejection fraction significantly increased. Bi-level PAP could be an effective alternative for patients with HF and pure CSR-CSA who are unresponsive to CPAP.

  5. Heart Diseases

    Science.gov (United States)

    ... you're like most people, you think that heart disease is a problem for others. But heart disease is the number one killer in the ... of disability. There are many different forms of heart disease. The most common cause of heart disease ...

  6. Heart Transplantation

    Science.gov (United States)

    A heart transplant removes a damaged or diseased heart and replaces it with a healthy one. The healthy heart comes from a donor who has died. It is the last resort for people with heart failure when all other treatments have failed. The ...

  7. Cluster headache attack remission with sphenopalatine ganglion stimulation

    DEFF Research Database (Denmark)

    Barloese, Mads C J; Jürgens, Tim P; May, Arne

    2016-01-01

    collected at regular clinic visits. The time point “after remission” was defined as the first visit after the end of the remission period. Results: Thirty percent (10/33) of enrolled patients experienced at least one period of complete attack remission. All remission periods followed the start of SPG...... stimulation, with the first period beginning 134 ± 86 (range 21-272) days after initiation of stimulation. On average, each patient’s longest remission period lasted 149 ± 97 (range 62-322) days. The ability to treat acute attacks before and after remission was similar (37 % ± 25 % before, 49 % ± 32 % after...

  8. Insuficiencia cardíaca congestiva por estenosis aórtica calcificada tratada con éxito en el hogar Congenital heart failure due to calcified aortic stenosis successfully treated at home

    Directory of Open Access Journals (Sweden)

    Roidel Pérez Pérez

    2003-12-01

    Full Text Available Se describe la historia de un paciente con una insuficiencia cardíaca congestiva debido a una estenosis aórtica calcificada, con un cuadro de arritmia cardíaca relativamente complejo, que fue ingresado en el hogar y tratado por el grupo básico de trabajo de su área de salud. Se le realizaron las investigaciones imprescindibles para un adecuado manejo médico, restableciéndosele la salud al paciente, e incorporándolo a su vida laboral, sin necesidad de ingreso hospitalario. Se demostró una vez más la ventaja de este estilo de trabajo en la atención médica de salud y el gran nivel de satisfacción de la población.The history of a patient suffering from congenital heart failure due to a calcified aortic stenosis, with a relatively complex picture of heart arrhytmia, that was admitted at home and treated by the basic working group in his health area, is described. All the investigations necessary for an adequate medical management were made. The patient's health was reestablished and he was able to work again without being hospitalized. It was proved once again the advantage of this working style in health care and the high level of the patient's satisfaction.

  9. Rehab for the Heart (A Cup of Health with CDC)

    Centers for Disease Control (CDC) Podcasts

    2017-08-24

    Each year, nearly 790,000 adults in the U.S. suffer a heart attack. For a third of these, it’s not their first. Cardiac rehabilitation could have prevented many of these. In this podcast, Dr. Fleetwood Loustalot discusses the importance of getting cardiac rehab after a heart attack.  Created: 8/24/2017 by MMWR.   Date Released: 8/24/2017.

  10. Association of time to reperfusion with left ventricular function and heart failure in patients with acute myocardial infarction treated with primary percutaneous coronary intervention: a systematic review.

    Science.gov (United States)

    Goel, Kashish; Pinto, Duane S; Gibson, C Michael

    2013-04-01

    Shorter time to reperfusion is associated with a significant reduction in mortality; however, its association with heart failure (HF) is not clearly documented. We conducted a systematic review to examine the association between time to reperfusion and incident HF and/or left ventricular dysfunction. MEDLINE/OVID, EMBASE, Cochrane Library, and Web of Science databases were searched from January 1974 to May 2012 for studies that reported the association between time to reperfusion and incident HF or left ventricular ejection fraction (LVEF) in patients undergoing primary percutaneous coronary intervention. Of 362 nonduplicate abstracts, 71 studies were selected for full-text review. Thirty-three studies were included in the final review, of which 16 were single-center studies, 7 were population-based studies, 7 were subanalyses from randomized controlled trials, and 3 were based on national samples. The pooled data demonstrate that every 1-hour delay in time to reperfusion is associated with a 4% to 12% increased risk of new-onset HF and a 4% relative increase in the risk of incident HF during follow-up. Early reperfusion was associated with a 2% to 8% greater LVEF before discharge and a 3% to 12% larger improvement in absolute LVEF at follow-up compared with the index admission. This systematic review presents evidence that longer time to reperfusion is not only associated with worsened left ventricular systolic function and new-onset HF at the time of index admission, but also with increased risk of HF and reduced improvement in left ventricular systolic function during follow-up. Copyright © 2013 Mosby, Inc. All rights reserved.

  11. Mitigating Higher Ed Cyber Attacks

    Science.gov (United States)

    Rogers, Gary; Ashford, Tina

    2015-01-01

    In this presentation we will discuss the many and varied cyber attacks that have recently occurred in the higher ed community. We will discuss the perpetrators, the victims, the impact and how these institutions have evolved to meet this threat. Mitigation techniques and defense strategies will be covered as will a discussion of effective security…

  12. Detection of complex cyber attacks

    Science.gov (United States)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  13. Assessment of some biochemical changes in blood and histological changes in heart of rats irradiated and/or treated with some cardiovascular drugs

    International Nuclear Information System (INIS)

    El-Sayed, H.I.; El-Batrawy, F.A.; ABDEL-GAWAD, E.I.; Sourour, D.A.

    2006-01-01

    The present study was designed to compare the effects of carvedilol, metaprolol and diltiazem on some serum enzyme levels and cardiac tissue in rats in irradiated with gamma rays and to detect any possible radioprotective effect offered by these drugs. Ninety six male rats were divided into 8 groups, 12 rats each. The first group served as control. The second, third and fourth groups were received carvedilol (5 mg/kg), metaprolol (20 mg/kg) and diltiazem hydrochloride (20 mg/kg), respectively, for two weeks. The fifth group was irradiated with a single dose (6 Gy) of gamma rays. The sixth, seventh and eighth groups were received the previous mentioned doses of drugs for two weeks before exposing the rats to gamma irradiation. The blood samples were collected at fixed time intervals of 24 hr, 72 hr and 1 week after stopping drug administration (treated groups) or after irradiation (irradiated and treated-irradiated groups).The results of the present study showed that a single dose (6 Gy) of whole body gamma radiation in rats induced cardiac damage which was manifested histopathologically and biochemically. Significant elevations in serum creatine kinase (CK) enzyme, creatine kinase MB (CK MB) isoenzyme and aspartate aminotransferase (AST) enzyme levels were observed in the irradiated group after 24 hour, 72 hour and one week post-irradiation as compared to the control group. Regarding the level of lactate dehydrogenase (LDH) enzyme, it showed significant increase on the first day (24 hour), while there was significant decrease on the third (72 hour) and seventh day (1 week) post-irradiation relative to the control value. Histopathological examination of gamma irradiated group revealed marked congestion and dilatation of the vessels between myocardial muscle fibres and lymphatic vessels. Regarding the myofibres, their changes varied from minimal changes in the form of separation of myofibrils to massive changes in the form of loss of striations. The nuclear changes

  14. The total artificial heart.

    Science.gov (United States)

    Cook, Jason A; Shah, Keyur B; Quader, Mohammed A; Cooke, Richard H; Kasirajan, Vigneshwar; Rao, Kris K; Smallfield, Melissa C; Tchoukina, Inna; Tang, Daniel G

    2015-12-01

    The total artificial heart (TAH) is a form of mechanical circulatory support in which the patient's native ventricles and valves are explanted and replaced by a pneumatically powered artificial heart. Currently, the TAH is approved for use in end-stage biventricular heart failure as a bridge to heart transplantation. However, with an increasing global burden of cardiovascular disease and congestive heart failure, the number of patients with end-stage heart failure awaiting heart transplantation now far exceeds the number of available hearts. As a result, the use of mechanical circulatory support, including the TAH and left ventricular assist device (LVAD), is growing exponentially. The LVAD is already widely used as destination therapy, and destination therapy for the TAH is under investigation. While most patients requiring mechanical circulatory support are effectively treated with LVADs, there is a subset of patients with concurrent right ventricular failure or major structural barriers to LVAD placement in whom TAH may be more appropriate. The history, indications, surgical implantation, post device management, outcomes, complications, and future direction of the TAH are discussed in this review.

  15. Transient complete atrioventricular block with Morgagni—Adams—Stokes attacks in a child after aortic valve replacement

    Directory of Open Access Journals (Sweden)

    D. R. Sabirova

    2014-01-01

    Full Text Available The diagnosis and treatment of life-threatening arrhythmias after surgical correction of congenital heart diseases is one the urgent problems in pediatrlc cardiology. The paper describes the clinical picture, diagnosis, and therapy in a patent with transient complete atrioventricular block after open heart surgery. A protracted Morgagni—Adams—Stokes attack is one of the causes of sudden cardiac death. The occurrence of even single syncopes in patients after surgery for congenital heart disease requires that the arrhythmogenic nature of the attack should be ruled out for the timely and adequate therapy including the implantation of antiarrhythmic devices.

  16. Transient Ischemic Attack Caused by Iron Deficiency Anemia

    Directory of Open Access Journals (Sweden)

    Ufuk Emre

    2006-02-01

    Full Text Available Transient Ischemic Attack Caused by Iron Deficiency Anemia Transient ischemic attacks are episodes of transient focal ischemia involving the brain or brainstem. They are commonly two to thirty minutes in duration and lasting less than 24 hours. Anemia of iron deficiency isn’t frequently cause for transient ischemic attack. It has been reported as a risk factor for childhood ischemic strokes. In the iron deficiency anemia, T‹A may develop as result of hypercoagulable state and increased viscosity that is caused by anemic hypoxia that is result of reduce hemoglobine level, seconder thrombosis and microcytose As iron deficiency anemia has been reported so rarely in adult patients with transient ischemic attacks as a cause, we aimed to discuss the clinical and outcome features of two cases with iron deficiency anemia and transient ischemic attacks in this study. Materials and methods: Routine neurologic examination, biochemical screen, serological tests, vasculitic markers, thyroid function tests, vitamin B 12 level, cranial imaging, vertebral carotid doppler USG examination was conducted in the two patients. Anemia of iron deficiency was found as the only risk factor for TIA and the two patients were treated with replacement of iron and antiagregan therapy. Neurological examination revealed no abnormality through the two years of follow-up. The iron deficiency anemia may be cause of many neurologic problems such a irritability, lethargy, headache, development retardation except from T‹A. In the iron deficiency anemia, early diagnosis and treatment is important

  17. Peacetime Use of Computer Network Attack

    National Research Council Canada - National Science Library

    Busby, Daniel

    2000-01-01

    .... PDD-63 alerts the nation to prepare for impending cyber attacks. This paper examines the nature, scale, and likelihood of cyber attacks posited in PDD-63 and finds that the country does not face an imminent "electronic Pearl Harbor...

  18. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  19. Robust Detection of Stepping-Stone Attacks

    National Research Council Canada - National Science Library

    He, Ting; Tong, Lang

    2006-01-01

    The detection of encrypted stepping-stone attack is considered. Besides encryption and padding, the attacker is capable of inserting chaff packets and perturbing packet timing and transmission order...

  20. Using an ontology for network attack planning

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-09-01

    Full Text Available The modern complexity of network attacks and their counter-measures (cyber operations) requires detailed planning. This paper presents a Network Attack Planning ontology which is aimed at providing support for planning such network operations within...

  1. Heart Truth

    Science.gov (United States)

    ... health! Get a free badge or banner to post to your website or blog. Are you at risk for heart disease? Here's how to find out . Planning to use The Heart Truth logo? Check out our logo guidelines and downloads. ...

  2. Heart Disease

    Science.gov (United States)

    ... it may be caused by diseases, such as connective tissue disorders, excessive iron buildup in your body (hemochromatosis), the buildup of abnormal proteins (amyloidosis) or by some cancer treatments. Causes of heart infection A heart infection, ...

  3. Attack Graph Construction for Security Events Analysis

    Directory of Open Access Journals (Sweden)

    Andrey Alexeevich Chechulin

    2014-09-01

    Full Text Available The paper is devoted to investigation of the attack graphs construction and analysis task for a network security evaluation and real-time security event processing. Main object of this research is the attack modeling process. The paper contains the description of attack graphs building, modifying and analysis technique as well as overview of implemented prototype for network security analysis based on attack graph approach.

  4. Heart pacemaker

    Science.gov (United States)

    Cardiac pacemaker implantation; Artificial pacemaker; Permanent pacemaker; Internal pacemaker; Cardiac resynchronization therapy; CRT; Biventricular pacemaker; Arrhythmia - pacemaker; Abnormal heart ...

  5. Participation in Heart-Healthy Behaviors: A Secondary Analysis of the American Heart Association Go Red Heart Match Data.

    Science.gov (United States)

    Arslanian-Engoren, Cynthia; Eastwood, Jo-Ann; De Jong, Marla J; Berra, Kathy

    2015-01-01

    The American Heart Association created Go Red Heart Match, a free and secure online program that enables women to connect with each other to fight heart disease either personally or as a caregiver for someone with heart disease. Through these connections, participants have an opportunity to develop a personal, private, and supportive relationship with other women; share common experiences; and motivate and encourage each other to follow a heart-healthy lifestyle. The aims of this study were to describe the demographic characteristics of the Go Red Heart Match responders and to determine whether participation in the program prompted participants to engage in heart-healthy behaviors. A secondary analysis of data collected as part of a needs assessment survey from the American Heart Association Go Red Heart Match was conducted. A total of 117 (35%) of the 334 invited women completed the survey. Most responders were female, married, and college educated. A total of 105 (90%) responders were diagnosed with a type of heart disease or stroke and 77 (73%) responders had undergone treatment. As a result of participating in the program, 75% of the responders reported the following improvements in heart-healthy behaviors: eating a more heart-healthy diet (54%), exercising more frequently (53%), losing weight (47%), and quitting smoking (10%). Responders who had a diagnosis of heart attack (n = 48) were more likely (P = .003) to quit smoking than were those with other diagnoses (n = 69). Notably, 48% of responders reported encouraging someone else in their life to speak to their doctor about their risk for heart disease. Most women who participated in Heart Match reported engaging in new heart-healthy behaviors. The findings support expanding the existing program in a more diverse population as a potentially important way to reach women and encourage cardiovascular disease risk reduction for those with heart disease and stroke.

  6. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  7. Automated classification of computer network attacks

    CSIR Research Space (South Africa)

    Van Heerden, R

    2013-11-01

    Full Text Available according to the relevant types of attack scenarios depicted in the ontology. The two network attack instances are the Distributed Denial of Service attack on SpamHaus in 2013 and the theft of 42 million Rand ($6.7 million) from South African Postbank...

  8. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  9. Heart Block

    Science.gov (United States)

    ... as lupus. People who have these diseases make proteins called antibodies that attack and damage the body's tissues or cells. In pregnant women, antibodies can cross the placenta. (The placenta ...

  10. Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers

    NARCIS (Netherlands)

    Pieters, Wolter; Davarynejad, Mohsen

    2015-01-01

    Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of multiple steps and alternative paths. It is possible to derive properties of the overall attacks from properties of individual steps, such as cost for the attacker and probability of success. However, in

  11. Recognizing Advanced Heart Failure and Knowing Your Options

    Science.gov (United States)

    ... and Live Our Interactive Cardiovascular Library has detailed animations and illustrations to help you learn about conditions, treatments and procedures related to heart disease and stroke. Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  12. Heart scanner - who's between a rock and a hard place?

    African Journals Online (AJOL)

    evidence of coronary heart disease succumbs to a fatal heart attack. Cardiac symptoms, positive stress test results and angiographically visible narrowings are all dependent on significant lumenal stenosis. Considerable atherosclerosis can be present in an asymptomatic patient in whom physical examination, stress testing ...

  13. Is diet an essential risk factor for coronary heart disease?

    OpenAIRE

    Ball, K. P.

    1980-01-01

    Cigarette smoking, hypertension and diet each play a major role in the development of coronary heart attacks in most industrialized nations. In some countries where cigarette smoking and hypertension are prevalent there is a low risk of coronary heart disease (CHD). Hyperlipidaemia resulting from national food habits appears to be the essential factor in the high rates of CHD in developed countries.

  14. Whispering through DDoS attack

    OpenAIRE

    Miralem Mehic; Jiri Slachta; Miroslav Voznak

    2016-01-01

    Denial of service (DoS) attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS) attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes o...

  15. Script-viruses Attacks on UNIX OS

    Directory of Open Access Journals (Sweden)

    D. M. Mikhaylov

    2010-06-01

    Full Text Available In this article attacks on UNIX OS are considered. Currently antivirus developers are concentrated on protecting systems from viruses that are most common and attack popular operating systems. If the system or its components are not often attacked then the antivirus products are not protecting these components as it is not profitable. The same situation is with script-viruses for UNIX OS as most experts consider that it is impossible for such viruses to get enough rights to attack. Nevertheless the main conclusion of this article is the fact that such viruses can be very powerful and can attack systems and get enough rights.

  16. Effect of Helicobacter Pylori Treatment on the Number and Intensity of Migraine Attacks

    Directory of Open Access Journals (Sweden)

    Alireza Bakhshipour

    2012-06-01

    Full Text Available Background: Migraine is a common headache with an unknown cause. Migraine is about three times more common in women (18.2% than in men (6.2%. The recent studies have posed the possible relationship between the Helicobacter pylori infection and migraine headache. This study tries to analyze the effect of treating H. pylori infection on number and severity of migraine attacks.Materials and Methods: In this clinical pilot study, a number of 60 patients with migraine were examined in terms of infecting with H. pylori. Patients with the infections were treated by H. pylori eradication treatment standard triple regimen and the frequency and severity of their migraine attacks were measured for three months and finally the average of frequency and severity of attacks before and after treatment were compared. Results: The average frequency of the migraine attacks in patients with the H.pylori infection who have been treated was 7.1 before treatment and 2.7 after treatment (p=0.001. Likewise, the severity rate of such attacks in such patients was 9 which decreased to 4.5 after treatment (p=0.002. Conclusion: According to our study, patients with migraine attacks are preferred to be examined tested in terms of infecting with H. pylori. Thus, and eradication of this infection can be effective in decreasing of the migraine attacks.

  17. Animal attack: an unusual case of multiple trauma in childhood.

    LENUS (Irish Health Repository)

    O'Grady, E

    2014-11-01

    A 2½ year old girl attended our facility following attack by a tapir at a city zoo. She sustained multiple injuries including a forearm laceration and multiple perforating wounds to her abdominal wall. She had several procedures, including bowel resection, performed under the care of the General Paediatric Surgery and Plastic Surgery teams and was treated with a course of IV antibiotics. She recovered well and to date has suffered no long-term adverse outcome.

  18. Lead exposure potentiates predatory attack behavior in the cat

    International Nuclear Information System (INIS)

    Li Wenjie; Han Shenggao; Gregg, T.R.; Kemp, F.W.Francis W.; Davidow, A.L.; Louria, D.B.; Siegel, Allan; Bogden, J.D.

    2003-01-01

    Epidemiologic studies have demonstrated that environmental lead exposure is associated with aggressive behavior in children; however, numerous confounding variables limit the ability of these studies to establish a causal relationship. The study of aggressive behavior using a validated animal model was used to test the hypothesis that there is a causal relationship between lead exposure and aggression in the absence of confounding variables. We studied the effects of lead exposure on a feline model of aggression: predatory (quiet biting) attack of an anesthetized rat. Five cats were stimulated with a precisely controlled electrical current via electrodes inserted into the lateral hypothalamus. The response measure was the predatory attack threshold current (i.e., the current required to elicit an attack response on 50% of the trials). Blocks of trials were administered in which predatory attack threshold currents were measured three times a week for a total of 6-10 weeks, including before, during, and after lead exposure. Lead was incorporated into cat food 'treats' at doses of 50-150 mg/kg/day. Two of the five cats received a second period of lead exposure. Blood lead concentrations were measured twice a week and were <1, 21-77, and <20 μg/dL prior to, during, and after lead exposure, respectively. The predatory attack threshold decreased significantly during initial lead exposure in three of five cats and increased after the cessation of lead exposure in four of the five cats (P<0.01). The predatory attack thresholds and blood lead concentrations for each cat were inversely correlated (r=-0.35 to -0.74). A random-effects mixed model demonstrated a significant (P=0.0019) negative association between threshold current and blood lead concentration. The data of this study demonstrate that lead exposure enhances predatory aggression in the cat and provide experimental support for a causal relationship between lead exposure and aggressive behavior in humans

  19. Efficacy of nebulized fluticasone propionate in adult patients admitted to the emergency department due to bronchial asthma attack.

    Science.gov (United States)

    Starobin, Daniel; Bolotinsky, Ludmila; Or, Jack; Fink, Gershon; Shtoeger, Zev

    2008-01-01

    Locally delivered steroids by inhalers or nebulizers have been shown in small trials to be effective in acute asthma attack, but evidence-based data are insufficient to establish their place as routine management of adult asthma attacks. To determine the efficacy of nebulized compared to systemic steroids in adult asthmatics admitted to the emergency department following an acute attack. Adult asthmatics admitted to the ED were assigned in random consecutive case fashion to one of three protocol groups: group 1--nebulized steroid fluticasone (Flixotide Nebules), group 2--intravenous methylprednisolone, group 3--combined treatment by both routes. Objective and subjective parameters, such as peak expiratory flow, oxygen saturation, heart rate and dyspnea score, were registered before and 2 hours after ED treatment was initiated. Steroids were continued for 1 week following the ED visit according to the protocol arm. Data on hospital admission/discharge rate, ED readmissions in the week after enrollment and other major events related to asthma were registered. Altogether, 73 adult asthmatics were assigned to receive treatment: 24 patients in group 1, 23 in group 2 and 26 in group 3. Mean age was 44.4 +/- 16.8 years (range 17-75 years). Peak expiratory flow and dyspnea score significantly improved in group 1 patients compared with patients in the other groups after 2 hours of ED treatment (P = 0.021 and 0.009, respectively). The discharge rate after ED treatment was significantly higher in groups 1 and 3 than in group 2 (P = 0.05). All 73 patients were alive a week after enrollment. Five patients (20.8%) in the Flixotide treatment arm were hospitalized and required additional systemic steroids. Multivariate analysis of factors affecting hospitalization rate demonstrated that severity of asthma (odds ratio 8.11) and group 2 (OD 4.17) had a negative effect, whereas adherence to chronic anti-asthma therapy (OD 0.49) reduced the hospitalization rate. Our study cohort

  20. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks. In prac......In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks....... In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...

  1. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based......Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identified...... on invalidating policies in the system model by identifying possible sequences of actions that lead to an attack. The generated attacks are precise enough to illustrate the threat, and they are general enough to hide the details of individual steps....

  2. Whispering through DDoS attack

    Directory of Open Access Journals (Sweden)

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  3. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  4. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  5. Cache timing attacks on recent microarchitectures

    DEFF Research Database (Denmark)

    Andreou, Alexandres; Bogdanov, Andrey; Tischhauser, Elmar Wolfgang

    2017-01-01

    Cache timing attacks have been known for a long time, however since the rise of cloud computing and shared hardware resources, such attacks found new potentially devastating applications. One prominent example is S$A (presented by Irazoqui et al at S&P 2015) which is a cache timing attack against...... AES or similar algorithms in virtualized environments. This paper applies variants of this cache timing attack to Intel's latest generation of microprocessors. It enables a spy-process to recover cryptographic keys, interacting with the victim processes only over TCP. The threat model is a logically...... separated but CPU co-located attacker with root privileges. We report successful and practically verified applications of this attack against a wide range of microarchitectures, from a two-core Nehalem processor (i5-650) to two-core Haswell (i7-4600M) and four-core Skylake processors (i7-6700). The attack...

  6. 77 FR 5373 - American Heart Month, 2012

    Science.gov (United States)

    2012-02-03

    ...; its victims are fathers and daughters, grandparents and siblings, cherished friends and community... Federal agencies and forging new public-private partnerships to prevent one million heart attacks and... research to unlock new treatments for cardiovascular disease. And the Centers for Disease Control and...

  7. Mending broken hearts : Cardiac regeneration in zebrafish

    NARCIS (Netherlands)

    kruse, fabian

    2017-01-01

    Cardiovascular disease is the leading global cause of death, accounting for more than 30% of all deaths. It claims more lives than all forms of cancer combined. Bearing these facts in mind, research in this field is direly needed. A heart attack, also known as myocardial infarction (MI), happens

  8. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  9. Attack-Resistant Trust Metrics

    Science.gov (United States)

    Levien, Raph

    The Internet is an amazingly powerful tool for connecting people together, unmatched in human history. Yet, with that power comes great potential for spam and abuse. Trust metrics are an attempt to compute the set of which people are trustworthy and which are likely attackers. This chapter presents two specific trust metrics developed and deployed on the Advogato Website, which is a community blog for free software developers. This real-world experience demonstrates that the trust metrics fulfilled their goals, but that for good results, it is important to match the assumptions of the abstract trust metric computation to the real-world implementation.

  10. Heart regeneration.

    Science.gov (United States)

    Breckwoldt, Kaja; Weinberger, Florian; Eschenhagen, Thomas

    2016-07-01

    Regenerating an injured heart holds great promise for millions of patients suffering from heart diseases. Since the human heart has very limited regenerative capacity, this is a challenging task. Numerous strategies aiming to improve heart function have been developed. In this review we focus on approaches intending to replace damaged heart muscle by new cardiomyocytes. Different strategies for the production of cardiomyocytes from human embryonic stem cells or human induced pluripotent stem cells, by direct reprogramming and induction of cardiomyocyte proliferation are discussed regarding their therapeutic potential and respective advantages and disadvantages. Furthermore, different methods for the transplantation of pluripotent stem cell-derived cardiomyocytes are described and their clinical perspectives are discussed. This article is part of a Special Issue entitled: Cardiomyocyte Biology: Integration of Developmental and Environmental Cues in the Heart edited by Marcus Schaub and Hughes Abriel. Copyright © 2015 Elsevier B.V. All rights reserved.

  11. Migraine attacks the Basal Ganglia

    Directory of Open Access Journals (Sweden)

    Bigal Marcelo

    2011-09-01

    Full Text Available Abstract Background With time, episodes of migraine headache afflict patients with increased frequency, longer duration and more intense pain. While episodic migraine may be defined as 1-14 attacks per month, there are no clear-cut phases defined, and those patients with low frequency may progress to high frequency episodic migraine and the latter may progress into chronic daily headache (> 15 attacks per month. The pathophysiology of this progression is completely unknown. Attempting to unravel this phenomenon, we used high field (human brain imaging to compare functional responses, functional connectivity and brain morphology in patients whose migraine episodes did not progress (LF to a matched (gender, age, age of onset and type of medication group of patients whose migraine episodes progressed (HF. Results In comparison to LF patients, responses to pain in HF patients were significantly lower in the caudate, putamen and pallidum. Paradoxically, associated with these lower responses in HF patients, gray matter volume of the right and left caudate nuclei were significantly larger than in the LF patients. Functional connectivity analysis revealed additional differences between the two groups in regard to response to pain. Conclusions Supported by current understanding of basal ganglia role in pain processing, the findings suggest a significant role of the basal ganglia in the pathophysiology of the episodic migraine.

  12. Anger attacks in obsessive compulsive disorder

    Directory of Open Access Journals (Sweden)

    Nitesh Prakash Painuly

    2011-01-01

    Full Text Available Background: Research on anger attacks has been mostly limited to depression, and only a few studies have focused on anger attacks in obsessive compulsive disorder. Materials and Methods: In a cross-sectional study all new obsessive compulsive disorder patients aged 20-60 years attending an outpatient clinic were assessed using the anger attack questionnaire, irritability, depression and anxiety scale (for the direction of the aggressive behavior and quality of life (QOL. Results: The sample consisted of 42 consecutive subjects with obsessive compulsive disorder, out of which 21 (50% had anger attacks. The obsessive compulsive disorder subjects with and without anger attacks did not show significant differences in terms of sociodemographic variables, duration of illness, treatment, and family history. However, subjects with anger attacks had significantly higher prevalence of panic attacks and comorbid depression. Significantly more subjects with anger attacks exhibited aggressive acts toward spouse, parents, children, and other relatives in the form of yelling and threatening to hurt, trying to hurt, and threatening to leave. However, the two groups did not differ significantly in terms of QOL, except for the psychological domain being worse in the subjects with anger attacks. Conclusion: Anger attacks are present in half of the patients with obsessive compulsive disorder, and they correlate with the presence of comorbid depression.

  13. Heart Failure

    OpenAIRE

    McMurray, John; Ponikowski, Piotr

    2011-01-01

    Heart failure occurs in 3% to 4% of adults aged over 65 years, usually as a consequence of coronary artery disease or hypertension, and causes breathlessness, effort intolerance, fluid retention, and increased mortality. The 5-year mortality in people with systolic heart failure ranges from 25% to 75%, often owing to sudden death following ventricular arrhythmia. Risks of cardiovascular events are increased in people with left ventricular systolic dysfunction (LVSD) or heart failure.

  14. Artificial heart

    Energy Technology Data Exchange (ETDEWEB)

    1984-10-18

    Super-pure plutonium-238 could use heat produced during fission to power an implanted artificial heart. Three model hearts have worked for some time. Concern that excess heat would make the procedure unsafe for humans has broadened the search for another energy source, such as electrohydraulic drive or an external power battery. A back pack approach may provide an interim solution until materials are developed which can withstand heart activity and be small enough for implantation.

  15. Head and heart in treated HIV infection

    NARCIS (Netherlands)

    Schouten, J.

    2017-01-01

    The introduction of combination antiretroviral therapy (cART) in 1996 changed HIV infection from an inevitably fatal condition into a chronic manageable disease. During the last decade however, concerns have been raised about the increasingly important role of non-AIDS comorbidities as causes of

  16. Types of Heart Failure

    Science.gov (United States)

    ... Introduction Types of Heart Failure Classes of Heart Failure Heart Failure in Children Advanced Heart Failure • Causes and ... and procedures related to heart disease and stroke. Heart Failure Questions to Ask Your Doctor Use these questions ...

  17. [Clinical pathway for management of patients with acute asthma attack].

    Science.gov (United States)

    Azuma, Naoto; Katada, Yoshinori; Kobayashi, Masaaki; Kojima, Makiko; Nakajima, Yumi; Shibano, Miyo; Tomita, Hitomi; Yamanaka, Takao; Harada, Yoshinori; Ishii, Taeko; Saeki, Yukihiko

    2008-11-01

    There have been few reports of clinical pathway (CP) for treatment of asthma attack, because patients with asthma always admit emergently and the severity varies. We introduced CP so that standard asthma treatment can be widely used, and investigated its clinical usefulness. We designed a new CP for treating asthma attack according to the guideline (Japanese guideline (JGL) and Global Initiative for Asthma (GINA)). 136 patients who admitted to our hospital due to asthma attack from January 1999 to November 2006, were enrolled our study. Excluding cases complicated with pneumonia, COPD or cardiac failure, we evaluated 46 cases treated with the CP comparing with 19 cases treated without the CP. The clinical evaluations include systemic and inhaled steroid use, FEV1.0%, history of asthma, and the duration of asthma attack. Furthermore, we investigated difference between cases with and without prolonged admission. While the rates of systemic and inhaled steroid use in cases without the CP were 57.9% and 52.6% respectively, those in cases with the CP were approximately 100%. Employing the CP, FEV 1.0% at discharge time was elevated from 71.7% to 76.3% and the duration of hospitalization was shortened from 14.2 days to 11.5 days. Mean age of the cases with prolonged admission was higher than the rest. The asthma CP is an effective way for the standard treatment according to the guideline to be used widely even by doctors who are not familiar with asthma treatment. It improves the efficacy of in-hospital treatment.

  18. CARDIAC EMERGENCY: LIFT UP YOUR HEARTS

    CERN Multimedia

    2000-01-01

    50 000 deaths every year in France following heart problems. You or someone close to you, a friend, a relative, a colleague at work. You all probably know someone who has had a heart attack. Noting that 80% of all deaths occur outside hospital, the Fédération Française de Cardiologie, working in collaboration with first aid groups (rescue associations, etc.), are launching a nationwide campaign to train as many people as possible in what to do for cardiac first aid. According to specialists, more than half of all heart attack victims could have survived if someone nearby had been quick at doing what was needed. The CERN Fire Brigade is helping in this campaign by offering two free training sessions, each lasting three hours and mainly based on recognizing a heart attack, the proper way of calling for help, and practice in mouth-to-mouth resuscitation and heart massage. The courses will be held on 20 November and 6 December from4 to 7 p.m. at Building 65. So don’t wait, stop b...

  19. DDOS ATTACK DETECTION SIMULATION AND HANDLING MECHANISM

    Directory of Open Access Journals (Sweden)

    Ahmad Sanmorino

    2013-11-01

    Full Text Available In this study we discuss how to handle DDoS attack that coming from the attacker by using detection method and handling mechanism. Detection perform by comparing number of packets and number of flow. Whereas handling mechanism perform by limiting or drop the packets that detected as a DDoS attack. The study begins with simulation on real network, which aims to get the real traffic data. Then, dump traffic data obtained from the simulation used for detection method on our prototype system called DASHM (DDoS Attack Simulation and Handling Mechanism. From the result of experiment that has been conducted, the proposed method successfully detect DDoS attack and handle the incoming packet sent by attacker.

  20. Model checking exact cost for attack scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2017-01-01

    Attack trees constitute a powerful tool for modelling security threats. Many security analyses of attack trees can be seamlessly expressed as model checking of Markov Decision Processes obtained from the attack trees, thus reaping the benefits of a coherent framework and a mature tool support....... However, current model checking does not encompass the exact cost analysis of an attack, which is standard for attack trees. Our first contribution is the logic erPCTL with cost-related operators. The extended logic allows to analyse the probability of an event satisfying given cost bounds and to compute...... the exact cost of an event. Our second contribution is the model checking algorithm for erPCTL. Finally, we apply our framework to the analysis of attack trees....

  1. Securing internet by eliminating DDOS attacks

    Science.gov (United States)

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  2. Where can an Insider attack?

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming

    2006-01-01

    By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage...... to the targeted organisation. While the problem is well recognised in the security community as well as in law-enforcement and intelligence communities, the main resort still is to audit log files \\$\\backslash\\$emph{after the fact}. There has been little research into developing models, automated tools......, and techniques for analysing and solving (parts of) the problem. In this paper we first develop a formal model of systems, that can describe real-world scenarios. These high-level models are then mapped to acKlaim, a process algebra with support for access control, that is used to study and analyse properties...

  3. Transient ischemic attack: diagnostic evaluation.

    Science.gov (United States)

    Messé, Steven R; Jauch, Edward C

    2008-08-01

    A transient ischemic attack portends significant risk of a stroke. Consequently, the diagnostic evaluation in the emergency department is focused on identifying high-risk causes so that preventive strategies can be implemented. The evaluation consists of a facilitated evaluation of the patient's metabolic, cardiac, and neurovascular systems. At a minimum, the following tests are recommended: fingerstick glucose level, electrolyte levels, CBC count, urinalysis, and coagulation studies; noncontrast computed tomography (CT) of the head; electrocardiography; and continuous telemetry monitoring. Vascular imaging studies, such as carotid ultrasonography, CT angiography, or magnetic resonance angiography, should be performed on an urgent basis and prioritized according to the patient's risk stratification for disease. Consideration should be given for echocardiography if no large vessel abnormality is identified.

  4. Integrating cyber attacks within fault trees

    International Nuclear Information System (INIS)

    Nai Fovino, Igor; Masera, Marcelo; De Cian, Alessio

    2009-01-01

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  5. Visualizing Risks: Icons for Information Attack Scenarios

    National Research Council Canada - National Science Library

    Hosmer, Hilary

    2000-01-01

    .... Visual attack scenarios help defenders see system ambiguities, imprecision, vulnerabilities and omissions, thus speeding up risk analysis, requirements gathering, safeguard selection, cryptographic...

  6. Classifying network attack scenarios using an ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-03-01

    Full Text Available ) or to the target?s reputation. The Residue sub-phase refers to damage or artefacts of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example after the launch of a DDOS..., A. (1995). Hacking theft of $10 million from citibank revealed. Retrieved 10/10, 2011, from http://articles.latimes.com/1995-08-19/business/fi-36656_1_citibank-system Hurley, E. (2004). SCO site succumbs to DDoS attack. Retrieved 10/10, 2011, from...

  7. A computer network attack taxonomy and ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-01-01

    Full Text Available of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example, after the launch of a DDOS (Distributed Denial of Service) attack, zombie computers may still connect to the target...-scrap- value-of-a-hacked-pc-revisited/ . Lancor, L., & Workman, R. (2007). Using Google Hacking to Enhance Defense Strategies. ACM SIGCSE Bulletin, 39 (1), 491-495. Lau, F., Rubin, S. H., Smith, M. H., & Trajkovic, L. (2000). Distributed Denial of Service...

  8. Integrating cyber attacks within fault trees

    Energy Technology Data Exchange (ETDEWEB)

    Nai Fovino, Igor [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy)], E-mail: igor.nai@jrc.it; Masera, Marcelo [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy); De Cian, Alessio [Department of Electrical Engineering, University di Genova, Genoa (Italy)

    2009-09-15

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  9. HEART Aerothermodynamic Analysis

    Science.gov (United States)

    Mazaheri, Alireza

    2012-01-01

    This paper presents an assessment of the aerothermodynamic environment around an 8.3 meter High Energy Atmospheric Reentry Test (HEART) vehicle. This study generated twelve nose shape configurations and compared their responses at the peak heating trajectory point against the baseline nose shape. The heat flux sensitivity to the angle of attack variations are also discussed. The possibility of a two-piece Thermal Protection System (TPS) design at the nose is also considered, as are the surface catalytic affects of the aeroheating environment of such configuration. Based on these analyses, an optimum nose shape is proposed to minimize the surface heating. A recommendation is also made for a two-piece TPS design, for which the surface catalytic uncertainty associated with the jump in heating at the nose-IAD juncture is reduced by a minimum of 93%. In this paper, the aeroshell is assumed to be rigid and the inflatable fluid interaction effect is left for future investigations.

  10. Current therapy for chronic cerebrovascular attack

    Directory of Open Access Journals (Sweden)

    A. A. Shmonin

    2015-01-01

    Full Text Available Chronic cerebrovascular attack (CCVA is a brain lesion caused by vascular factors. CCVA appears as cognitive impairments (CIs, affective (emotional disorders and focal syndromes. Treatment for CCVA requires a comprehensive approach. Effective combination therapy for CCVA involves secondary prevention of stroke and CIs; treatment of CIs; treatment of depression and other affective disorders; and neuroprotective therapy. Basic therapy for CCVA includes modification of risk factors, antihypertensive, hypolipidemic, and antithrombotic therapies. Central acetylcholinesterase inhibitors (galantamine, rivastigmine, donepezil and a reversible NMDA receptor blocker (memantine are symptomatically used at a stage of vascular and mixed dementia. There are no unique guidelines for the therapy of mild and moderate vascular nondementia-related CIs. Drug use, based on the neurochemical mechanisms underlying the development of vascular CIs, is substantiated. When choosing psychotropic agents, it is necessary to take into account the causes and clinical manifestations of neuromediator deficiency. Antidepressants are used as essential drugs. Neuroleptics and tranquilizers are additionally administered in complex-pattern syndromes, such as depression with marked anxiety. Prescription of neuroprotectors may be effective in treating both stroke and CCVA. These medicaments are most effective when a damaging factor acts, i.e. neuroprotectors should be given in a risk situation and to reduce damage. Citicoline is one of the most test drugs in a group of neuroprotectors. 

  11. Simple, heart-smart substitutions

    Science.gov (United States)

    Coronary artery disease - heart smart substitutions; Atherosclerosis - heart smart substitutions; Cholesterol - heart smart substitutions; Coronary heart disease - heart smart substitutions; Healthy diet - heart ...

  12. Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0

    NARCIS (Netherlands)

    Gadyatskaya, Olga; Jhawar, Ravi; Kordy, P.T.; Lounis, Karim; Mauw, Sjouke; Trujillo-Rasua, Rolando

    2016-01-01

    In this tool demonstration paper we present the ADTool2.0: an open-source software tool for design, manipulation and analysis of attack trees. The tool supports ranking of attack scenarios based on quantitative attributes entered by the user; it is scriptable; and it incorporates attack trees with

  13. The work-averse cyber attacker model : theory and evidence from two million attack signatures

    NARCIS (Netherlands)

    Allodi, L.; Massacci, F.; Williams, J.

    The typical cyber attacker is assumed to be all powerful and to exploit all possible vulnerabilities. In this paper we present, and empirically validate, a novel and more realistic attacker model. The intuition of our model is that an attacker will optimally choose whether to act and weaponize a new

  14. Attack Tree Generation by Policy Invalidation

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Naeem Akram, R.; Jajodia, S.

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identi﬿cation. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identi﬿ed

  15. Evaluation of Crosstalk Attacks in Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    2016-01-01

    WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks...

  16. Drammer : Deterministic Rowhammer attacks on mobile platforms

    NARCIS (Netherlands)

    Van Der Veen, Victor; Fratantonio, Yanick; Lindorfer, Martina; Gruss, Daniel; Maurice, Clémentine; Vigna, Giovanni; Bos, Herbert; Razavi, Kaveh; Giuffrida, Cristiano

    2016-01-01

    Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and completely subvert a system. However, existing efforts either describe probabilistic (and thus unreliable) attacks or rely on special (and often unavailable) memory management features to place victim objects

  17. Collaborative Attack Mitigation and Response: A survey

    NARCIS (Netherlands)

    Steinberger, Jessica; Sperotto, Anna; Baier, Harald; Pras, Aiko

    2015-01-01

    Over recent years, network-based attacks have become to one of the top causes of network infrastructure and service outages. To counteract a network-based attack, an approach is to move mitigation from the target network to the networks of Internet Service Providers (ISP). However, it remains

  18. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...

  19. Lysine clonixinate versus dipyrone (metamizole) for the acute treatment of severe migraine attacks: a single-blind, randomized study

    OpenAIRE

    Krymchantowski,Abouch Valenty; Carneiro,Henrique; Barbosa,Jackeline; Jevoux,Carla

    2008-01-01

    BACKGROUND AND OBJECTIVE: Nonsteroidal anti-inflammatory drugs (NSAID) are effective to treat migraine attacks. Lysine clonixinate (LC) and dipyrone (metamizol) have been proven effective to treat acute migraine. The aim of this study was to evaluate the efficacy and tolerability of the intravenous formulations of LC and dipyrone in the treatment of severe migraine attacks. METHOD: Thirty patients (28 women, 2 men), aged 18 to 48 years with migraine according the International Headache Societ...

  20. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  1. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  2. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  3. Heart Failure

    Science.gov (United States)

    ... Other diseases. Chronic diseases — such as diabetes, HIV, hyperthyroidism, hypothyroidism, or a buildup of iron (hemochromatosis) or ... transplantation or support with a ventricular assist device. Prevention The key to preventing heart failure is to ...

  4. Classes of Heart Failure

    Science.gov (United States)

    ... Introduction Types of Heart Failure Classes of Heart Failure Heart Failure in Children Advanced Heart Failure • Causes and ... and Advanced HF • Tools and Resources • Personal Stories Heart Failure Questions to Ask Your Doctor Use these questions ...

  5. Men and Heart Disease

    Science.gov (United States)

    ... Pressure Salt Cholesterol Million Hearts® WISEWOMAN Men and Heart Disease Fact Sheet Recommend on Facebook Tweet Share Compartir Source: Interactive Atlas of Heart Disease and Stroke Heart Disease Facts in Men Heart disease is the leading ...

  6. Wine and heart health

    Science.gov (United States)

    Health and wine; Wine and heart disease; Preventing heart disease - wine; Preventing heart disease - alcohol ... more often just to lower your risk of heart disease. Heavier drinking can harm the heart and ...

  7. Diabetes Mellitus and Heart Failure.

    Science.gov (United States)

    Lehrke, Michael; Marx, Nikolaus

    2017-06-01

    Epidemiologic and clinical data from the last 2 decades have shown that the prevalence of heart failure in diabetes is very high, and the prognosis for patients with heart failure is worse in those with diabetes than in those without diabetes. Experimental data suggest that various mechanisms contribute to the impairment in systolic and diastolic function in patients with diabetes, and there is an increased recognition that these patients develop heart failure independent of the presence of coronary artery disease or its associated risk factors. In addition, current clinical data demonstrated that treatment with the sodium glucose cotransporter 2 inhibitor empagliflozin reduced hospitalization for heart failure in patients with type 2 diabetes mellitus and high cardiovascular risk. This review article summarizes recent data on the prevalence, prognosis, pathophysiology, and therapeutic strategies to treat patients with diabetes and heart failure. Copyright © 2017 The Authors. Published by Elsevier Inc. All rights reserved.

  8. A taxonomy and discussion of software attack technologies

    Science.gov (United States)

    Banks, Sheila B.; Stytz, Martin R.

    2005-03-01

    Software is a complex thing. It is not an engineering artifact that springs forth from a design by simply following software coding rules; creativity and the human element are at the heart of the process. Software development is part science, part art, and part craft. Design, architecture, and coding are equally important activities and in each of these activities, errors may be introduced that lead to security vulnerabilities. Therefore, inevitably, errors enter into the code. Some of these errors are discovered during testing; however, some are not. The best way to find security errors, whether they are introduced as part of the architecture development effort or coding effort, is to automate the security testing process to the maximum extent possible and add this class of tools to the tools available, which aids in the compilation process, testing, test analysis, and software distribution. Recent technological advances, improvements in computer-generated forces (CGFs), and results in research in information assurance and software protection indicate that we can build a semi-intelligent software security testing tool. However, before we can undertake the security testing automation effort, we must understand the scope of the required testing, the security failures that need to be uncovered during testing, and the characteristics of the failures. Therefore, we undertook the research reported in the paper, which is the development of a taxonomy and a discussion of software attacks generated from the point of view of the security tester with the goal of using the taxonomy to guide the development of the knowledge base for the automated security testing tool. The representation for attacks and threat cases yielded by this research captures the strategies, tactics, and other considerations that come into play during the planning and execution of attacks upon application software. The paper is organized as follows. Section one contains an introduction to our research

  9. Detecting unknown attacks in wireless sensor networks that contain mobile nodes.

    Science.gov (United States)

    Banković, Zorana; Fraga, David; Moya, José M; Vallejo, Juan Carlos

    2012-01-01

    As wireless sensor networks are usually deployed in unattended areas, security policies cannot be updated in a timely fashion upon identification of new attacks. This gives enough time for attackers to cause significant damage. Thus, it is of great importance to provide protection from unknown attacks. However, existing solutions are mostly concentrated on known attacks. On the other hand, mobility can make the sensor network more resilient to failures, reactive to events, and able to support disparate missions with a common set of sensors, yet the problem of security becomes more complicated. In order to address the issue of security in networks with mobile nodes, we propose a machine learning solution for anomaly detection along with the feature extraction process that tries to detect temporal and spatial inconsistencies in the sequences of sensed values and the routing paths used to forward these values to the base station. We also propose a special way to treat mobile nodes, which is the main novelty of this work. The data produced in the presence of an attacker are treated as outliers, and detected using clustering techniques. These techniques are further coupled with a reputation system, in this way isolating compromised nodes in timely fashion. The proposal exhibits good performances at detecting and confining previously unseen attacks, including the cases when mobile nodes are compromised.

  10. Adaptive cyber-attack modeling system

    Science.gov (United States)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  11. Situational awareness of a coordinated cyber attack

    Science.gov (United States)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  12. Radiological attacks and accidents. Medical consequences

    International Nuclear Information System (INIS)

    Sakuta, Hidenari

    2007-01-01

    Probability of the occurrence of radiological attacks appears to be elevated after the terrorist attacks against the United States on September 11 in 2001. There are a lot of scenarios of radiological attack: simple radiological device, radiological disperse device (RDD or dirty bomb), attacks against nuclear reactor, improvised nuclear device, and nuclear weapons. Of these, RDD attack is the most probable scenario, because it can be easily made and can generate enormous psychological and economic damages. Radiological incidents are occurring to and fro in the world, including several cases of theft to nuclear facilities and unsuccessful terrorist attacks against them. Recently, a former Russian spy has allegedly been killed using polonium-210. In addition, serious radiological accidents have occurred in Chernobyl, Goiania, and Tokai-mura. Planning, preparation, education, and training exercise appear to be essential factors to cope with radiological attacks and accidents effectively without feeling much anxiety. Triage and psychological first aid are prerequisite to manage and provide effective medial care for mass casualties without inducing panic. (author)

  13. Disorders of cardiac hemodynamic in attack period of bronchial asthma in children

    Directory of Open Access Journals (Sweden)

    Kondratiev V.А.

    2016-05-01

    Full Text Available By dopplerechocardiography method there was studied functional state of cardiac ventricles and character of hemodynamic disorders in 48 patients aged 5-17 years in attack period of moderately-severe and severe bronchial asthma. Group of comparison included 40 healthy peers. Disorders of central and peripheral hemodynamic in attack period of bronchial asthma in children were accompanied both by systolic and diastolic dysfunction of the left and right heart ventricles, herewith right ventricle was functioning in the mode of hyperdynamic, and left one – in the mode of hypodynamic. Combined systolic-diastolic variant of dysfunction both of right and left ventricles was developing in 58,3% of patients with moderately-severe and in 91,6% of patients with severe bronchial asthma. In the attack period of bronchial asthma in children equal directionality of systolic and diastolic dysfunction of heart ventricles was developing; this was characterized by synchronization of their function. Assessment of functional interaction of the ventricles under conditions of severe asthma attack showed direct and high (r=0,67 correlative interaction between finding of Tei index of the left and right ventricles, which characterize their systolic function; this, under conditions of increased hemodynamic pre-loading testified to compensatory increase of systolic interaction of ventricles. Direct and high (r=0,69 correlative interaction between time indices of isovolumic relaxation of the left and right ventricles, characterizing their diastolic function, testified to compensatory increase of diastolic interaction of ventricles under conditions of increase of hemodynamic post-loading. Imbalance of central and peripheral link of hemodynamic in attack period of bronchial asthma in children testified to development of cardiac insufficiency, which was compensated predominantly at the expense of increase of heart contractions rate.

  14. A Study on the VHCF Fatigue Behaviors of Hydrogen Attacked Inconel 718 Alloy

    Energy Technology Data Exchange (ETDEWEB)

    Suh, Chang-Min [Kyungpook National Univ., DMI Senior Fellow, Daegu (Korea, Republic of); Nahm, Seung-Hoon [Korea Research Institute of Standards and Science, Daejeon (Korea, Republic of); Kim, Jun-Hyong; Pyun, Young-Sik [Sun Moon Univ., Chunan (Korea, Republic of)

    2016-07-15

    This study is to investigate the influence of hydrogen attack and UNSM on fatigue behaviors of the Inconel 718 alloy. The decrease of the fatigue life between the untreated and the hydrogen attacked material is 10-20%. The fatigue lives of hydrogen attacked specimen decreased without a fatigue limit, similar to those of nonferrous materials. Due to hydrogen embrittlement, about 80% of the surface cracks were smaller than the average grain size of 13 μm. Many small surface cracks caused by the embrittling effect of hydrogen attack were initiated at the grain boundaries and surface scratches. Cracks were irregularly distributed, grew, and then coalesced through tearing, leading to a reduction of fatigue life. Results revealed that the fatigue lives of UNSM-treated specimens were longer than those of the untreated specimens.

  15. [Chronic pancreatitis diagnosed after the first attack of acute pancreatitis].

    Science.gov (United States)

    Bojková, Martina; Dítě, Petr; Uvírová, Magdalena; Dvořáčková, Nina; Kianička, Bohuslav; Kupka, Tomáš; Svoboda, Pavel; Klvaňa, Pavel; Martínek, Arnošt

    2016-02-01

    One of the diseases involving a potential risk of developing chronic pancreatitis is acute pancreatitis. Of the overall number of 231 individuals followed with a diagnosis of chronic pancreatitis, 56 patients were initially treated for acute pancreatitis (24.2 %). Within an interval of 12- 24 months from the first attack of acute pancreatitis, their condition gradually progressed to reached the picture of chronic pancreatitis. The individuals included in the study abstained (from alcohol) following the first attack of acute pancreatitis and no relapse of acute pancreatitis was proven during the period of their monitoring. The etiology of acute pancreatitis identified alcohol as the predominant cause (55.3 %), biliary etiology was proven in 35.7 %. According to the revised Atlanta classification, severe pancreatitis was established in 69.6 % of the patients, the others met the criterion for intermediate form, those with the light form were not included. Significant risk factors present among the patients were smoking, obesity and 18 %, resp. 25.8 % had pancreatogenous diabetes mellitus identified. 88.1 % of the patients with acute pancreatitis were smokers. The majority of individuals with chronic pancreatitis following an attack of acute pancreatitis were of a productive age from 25 to 50 years. It is not only acute alcoholic pancreatitis which evolves into chronic pancreatitis, we have also identified this transition for pancreatitis of biliary etiology.

  16. Classification of cyber attacks in South Africa

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-05-01

    Full Text Available various ATM's throughout South Africa. Two criminals, Motsoane and Masoleng, were arrested in February 2012 and both sentenced to 15 years in jail [36, 37]. 3.10 2013: IOL DDoS Anonymous Africa claimed responsibility for launching a Distributed Denial... of Service (DDoS) attack on the Independent Newspaper web site iol.co.za. The attack was in response to claims that the IOL group supports Zimbabwean president Robert Mugabe. The following taunt was sent to boast about the attack: “IOL bad boys bad boys...

  17. Attacker Modelling in Ubiquitous Computing Systems

    DEFF Research Database (Denmark)

    Papini, Davide

    in with our everyday life. This future is visible to everyone nowadays: terms like smartphone, cloud, sensor, network etc. are widely known and used in our everyday life. But what about the security of such systems. Ubiquitous computing devices can be limited in terms of energy, computing power and memory...... attacker remain somehow undened and still under extensive investigation. This Thesis explores the nature of the ubiquitous attacker with a focus on how she interacts with the physical world and it denes a model that captures the abilities of the attacker. Furthermore a quantitative implementation...

  18. Lead exposure potentiates predatory attack behavior in the cat.

    Science.gov (United States)

    Li, Wenjie; Han, Shenggao; Gregg, Thomas R; Kemp, Francis W; Davidow, Amy L; Louria, Donald B; Siegel, Allan; Bogden, John D

    2003-07-01

    Epidemiologic studies have demonstrated that environmental lead exposure is associated with aggressive behavior in children; however, numerous confounding variables limit the ability of these studies to establish a causal relationship. The study of aggressive behavior using a validated animal model was used to test the hypothesis that there is a causal relationship between lead exposure and aggression in the absence of confounding variables. We studied the effects of lead exposure on a feline model of aggression: predatory (quiet biting) attack of an anesthetized rat. Five cats were stimulated with a precisely controlled electrical current via electrodes inserted into the lateral hypothalamus. The response measure was the predatory attack threshold current (i.e., the current required to elicit an attack response on 50% of the trials). Blocks of trials were administered in which predatory attack threshold currents were measured three times a week for a total of 6-10 weeks, including before, during, and after lead exposure. Lead was incorporated into cat food "treats" at doses of 50-150 mg/kg/day. Two of the five cats received a second period of lead exposure. Blood lead concentrations were measured twice a week and were cats and increased after the cessation of lead exposure in four of the five cats (Pcat were inversely correlated (r=-0.35 to -0.74). A random-effects mixed model demonstrated a significant (P=0.0019) negative association between threshold current and blood lead concentration. The data of this study demonstrate that lead exposure enhances predatory aggression in the cat and provide experimental support for a causal relationship between lead exposure and aggressive behavior in humans.

  19. Diuretics for heart failure.

    Science.gov (United States)

    Faris, Rajaa F; Flather, Marcus; Purcell, Henry; Poole-Wilson, Philip A; Coats, Andrew J S

    2012-02-15

    Chronic heart failure is a major cause of morbidity and mortality worldwide. Diuretics are regarded as the first-line treatment for patients with congestive heart failure since they provide symptomatic relief. The effects of diuretics on disease progression and survival remain unclear. To assess the harms and benefits of diuretics for chronic heart failure Updated searches were run in the Cochrane Central Register of Controlled Trials in The Cochrane Library (CENTRAL Issue 1 of 4, 2011), MEDLINE (1966 to 22 February 2011), EMBASE (1980 to 2011 Week 07) and HERDIN database (1990 to February 2011). We hand searched pertinent journals and reference lists of papers were inspected. We also contacted manufacturers and researchers in the field. No language restrictions were applied. Double-blinded randomised controlled trials of diuretic therapy comparing one diuretic with placebo, or one diuretic with another active agent (e.g. ACE inhibitors, digoxin) in patients with chronic heart failure. Two authors independently abstracted the data and assessed the eligibility and methodological quality of each trial. Extracted data were analysed by determining the odds ratio for dichotomous data, and difference in means for continuous data, of the treated group compared with controls. The likelihood of heterogeneity of the study population was assessed by the Chi-square test. If there was no evidence of statistical heterogeneity and pooling of results was clinically appropriate, a combined estimate was obtained using the fixed-effects model. This update has not identified any new studies for inclusion. The review includes 14 trials (525 participants), 7 were placebo-controlled, and 7 compared diuretics against other agents such as ACE inhibitors or digoxin. We analysed the data for mortality and for worsening heart failure. Mortality data were available in 3 of the placebo-controlled trials (202 participants). Mortality was lower for participants treated with diuretics than for

  20. YET ANOTHER ATTACK ON WAGES AND CONDITIONS.

    Science.gov (United States)

    McCarthy, Andrew

    2016-10-01

    An unobjectionable-sounding title obscures the real intent of the latest in a series of Bills which the federal Coalition government is attempting to legislate in its ongoing attempts to undermine employee wages and conditions and attack unions.

  1. A Unique Fatal Moose Attack Mimicking Homicide.

    Science.gov (United States)

    Gudmannsson, Petur; Berge, Johan; Druid, Henrik; Ericsson, Göran; Eriksson, Anders

    2018-03-01

    Fatalities caused by animal attacks are rare, but have the potential to mimic homicide. We present a case in which a moose attacked and killed a woman who was walking her dog in a forest. Autopsy showed widespread blunt trauma with a large laceration on one leg in which blades of grass were embedded. Flail chest was the cause of death. The case was initially conceived as homicide by means of a riding lawn mower. A review of the case by moose experts and analyses of biological trace material that proved to originate from moose, established the true source of injury. The dog probably provoked a moose, which, in response, stomped and gored the victim to death. The injuries resembled those previously reported from attacks by cattle and water buffalo. Fatal moose attacks constitute an extremely rare threat in boreal areas, but can be considered in traumatic deaths of unknown cause. © 2017 American Academy of Forensic Sciences.

  2. Marine Attack on Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Ad

    2002-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  3. Heuristic attacks against graphical password generators

    CSIR Research Space (South Africa)

    Peach, S

    2010-05-01

    Full Text Available In this paper the authors explore heuristic attacks against graphical password generators. A new trend is emerging to use user clickable pictures to generate passwords. This technique of authentication can be successfully used for - for example...

  4. On localization attacks against cloud infrastructure

    Science.gov (United States)

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  5. Using agility to combat cyber attacks.

    Science.gov (United States)

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  6. Social engineering attack examples, templates and scenarios

    CSIR Research Space (South Africa)

    Mouton, Francois

    2016-06-01

    Full Text Available that are representative of real-world examples, whilst still being general enough to encompass several different real-world examples. The proposed social engineering attack templates cover all three types of communication, namely bidirectional communication...

  7. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  8. The role of sleep in migraine attacks

    Directory of Open Access Journals (Sweden)

    Elaine Inamorato

    1993-11-01

    Full Text Available Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. In view of this variable relationship we studied the records of 159 consecutive outpatients of our Headache Unit. In 121 records there was reference to sleep involvement, in 55% by a single form and in 45% by more than one form. When only one form was related, relief was most common (70%. 30% of that group of patients had the migraine attack precipitated by sleep, 24% by deprivation and 6% by sleep excess. When the effects of sleep were multiple, these effects were as expected logically in 65%: «in accordance» group (e.g attack precipitated by sleep deprivation and relieved by sleep onset. In a second group, («conflicting» where the involvement was not logical, there were three different combinations of sleep involvement, possibly due to more than one pathophysiological mechanism.

  9. ATTACK WARNING: Costs to Modernize NORAD's Computer System Significantly Understated

    National Research Council Canada - National Science Library

    Cross, F

    1991-01-01

    ...) Integrated Tactical Warning and Attack Assessment (ITW/AA) system. These subsystems provide critical strategic surveillance and attack warning and assessment information to United States and Canadian leaders...

  10. RAPTOR: Ransomware Attack PredicTOR

    OpenAIRE

    Quinkert, Florian; Holz, Thorsten; Hossain, KSM Tozammel; Ferrara, Emilio; Lerman, Kristina

    2018-01-01

    Ransomware, a type of malicious software that encrypts a victim's files and only releases the cryptographic key once a ransom is paid, has emerged as a potentially devastating class of cybercrimes in the past few years. In this paper, we present RAPTOR, a promising line of defense against ransomware attacks. RAPTOR fingerprints attackers' operations to forecast ransomware activity. More specifically, our method learns features of malicious domains by looking at examples of domains involved in...

  11. Attack Helicopter Operations: Art or Science

    Science.gov (United States)

    1991-05-13

    ATTACK HELICOPTER OPERATIONS: ART OR SCIENCE ? BY LIEUTENANT COLONEL JAN CALLEN United States Army DISTRIBUTION STATEMENT A: Approved for public release...TASK IWORK UNIT ELEMENT NO. NO. NO. ACCESSION NC 11. TITLE (Include Socurity Classification) Attack Helicopter Operations: Art or Science ? 12. PERSONAL...OPERATIONS: ART OR SCIENCE ? AN INDIVIDUAL STUDY PROJECT by Lieutenant Colonel Jan Callen United States Army Colonel Greg Snelgrove Project Adviser U.S

  12. Protecting mobile agents from external replay attacks

    OpenAIRE

    Garrigues Olivella, Carles; Migas, Nikos; Buchanan, William; Robles, Sergi; Borrell Viader, Joan

    2014-01-01

    Peer-reviewed This paper presents a protocol for the protection of mobile agents against external replay attacks. This kind of attacks are performed by malicious platforms when dispatching an agent multiple times to a remote host, thus making it reexecute part of its itinerary. Current proposals aiming to address this problem are based on storing agent identifiers, or trip markers, inside agent platforms, so that future reexecutions can be detected and prevented. The problem of these solut...

  13. Semantic Identification Attacks on Web Browsing

    OpenAIRE

    Guha, Neel

    2016-01-01

    We introduce a Semantic Identification Attack, in which an adversary uses semantic signals about the pages visited in one browsing session to identify other browsing sessions launched by the same user. This attack allows an adver- sary to determine if two browsing sessions originate from the same user regardless of any measures taken by the user to disguise their browser or network. We use the MSNBC Anonymous Browsing data set, which contains a large set of user visits (labeled by category) t...

  14. Consciousness in Non-Epileptic Attack Disorder

    OpenAIRE

    Reuber, M.; Kurthen, M.

    2011-01-01

    Non-epileptic attack disorder (NEAD) is one of the most important differential diagnoses of epilepsy. Impairment of\\ud consciousness is the key feature of non-epileptic attacks (NEAs). The first half of this review summarises the clinical research\\ud literature featuring observations relating to consciousness in NEAD. The second half places this evidence in the wider context\\ud of the recent discourse on consciousness in neuroscience and the philosophy of mind. We argue that studies of consci...

  15. Cyber Security Audit and Attack Detection Toolkit

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  16. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    Science.gov (United States)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  17. Heart valve surgery

    Science.gov (United States)

    ... replacement; Valve repair; Heart valve prosthesis; Mechanical valves; Prosthetic valves ... surgery. Your heart valve has been damaged by infection ( endocarditis ). You have received a new heart valve ...

  18. Heart failure - tests

    Science.gov (United States)

    CHF - tests; Congestive heart failure - tests; Cardiomyopathy - tests; HF - tests ... the best test to: Identify which type of heart failure (systolic, diastolic, valvular) Monitor your heart failure and ...

  19. Combined Heuristic Attack Strategy on Complex Networks

    Directory of Open Access Journals (Sweden)

    Marek Šimon

    2017-01-01

    Full Text Available Usually, the existence of a complex network is considered an advantage feature and efforts are made to increase its robustness against an attack. However, there exist also harmful and/or malicious networks, from social ones like spreading hoax, corruption, phishing, extremist ideology, and terrorist support up to computer networks spreading computer viruses or DDoS attack software or even biological networks of carriers or transport centers spreading disease among the population. New attack strategy can be therefore used against malicious networks, as well as in a worst-case scenario test for robustness of a useful network. A common measure of robustness of networks is their disintegration level after removal of a fraction of nodes. This robustness can be calculated as a ratio of the number of nodes of the greatest remaining network component against the number of nodes in the original network. Our paper presents a combination of heuristics optimized for an attack on a complex network to achieve its greatest disintegration. Nodes are deleted sequentially based on a heuristic criterion. Efficiency of classical attack approaches is compared to the proposed approach on Barabási-Albert, scale-free with tunable power-law exponent, and Erdős-Rényi models of complex networks and on real-world networks. Our attack strategy results in a faster disintegration, which is counterbalanced by its slightly increased computational demands.

  20. SCADA system vulnerabilities to cyber attack

    Energy Technology Data Exchange (ETDEWEB)

    Shaw, W. T. [Cyber Security Consulting (Canada)

    2004-10-01

    The susceptibility to terrorist attacks of computer-based supervisory control (SCADA) systems that are used to monitor and control water distribution systems, oil and gas pipelines and the electrical grid, is discussed. The discussion includes ways in which SCADA systems may be attacked and remedial actions that may be taken to reduce or eliminate the possibility of such attacks. Attacks may take the form of causing the system to generate false data to divert attention from impending system disasters, or commandeer the system to seriously disable it, or cause damage to the process or equipment being controlled by sending improper control commands. SCADA systems are also vulnerable to internal threats, either from an accidental action that results in damage, or an intentional action, as for example by a disgruntled employee, or ex-employee, usually by way of reprogramming an RTU or PLC by accessing the polling/communications circuit. Recent SCADA systems are much more susceptible to concerted cyber attacks because of the adoption of IT technologies and standards into the design of such systems. (Older systems are more likely to be unique designs, hence less susceptible to attack). As far as protection of SCADA systems is concerned, there are no technologies that would prevent a technologically sophisticated terrorist or disgruntled employee from doing major damage to the system, however, the IT world has developed a range of technologies for the protection of IT assets, and many of these same technologies can also be used to safeguard modern SCADA systems.

  1. Hydrogen attack of steel. Progress report, April 1, 1978--March 31, 1979

    International Nuclear Information System (INIS)

    Shewmon, P.G.

    1978-01-01

    Four normalized carbon steels made in different ways (Si-killed, Al-killed, REM-treated, and electroslag refined) were studied to determine the role of differing fine inclusions on the early stages of hydrogen attack (HA). Hydrogen exposures were made at 450 0 C (6.5 MPa) and 375 0 C (7.6 MPa). The first stage of HA is shown to be the development of a closely spaced (1-2 μm) array of small bubbles over the ferrite/pearlite, or occasionally the ferrite/ferrite boundaries. These grew together to form tears, primarily in the rolling plane, leading to more rapid expansion normal to this plane. The planes of separation followed high solute layers in banded steel but only rarely did the fracture surfaces follow inclusions. At 450 0 C REM-treated steel was attacked the fastest and the Al-killed steel took two to four times as long for attack

  2. Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks

    Directory of Open Access Journals (Sweden)

    Apostolos P. Fournaris

    2017-07-01

    Full Text Available Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT and Operational Technology (OT systems that are meant to operate harmonically under a security critical framework. As security IT countermeasures are gradually been installed in many embedded system nodes, thus securing them from many well-know cyber attacks there is a lurking danger that is still overlooked. Apart from the software vulnerabilities that typical malicious programs use, there are some very interesting hardware vulnerabilities that can be exploited in order to mount devastating software or hardware attacks (typically undetected by software countermeasures capable of fully compromising any embedded system device. Real-time microarchitecture attacks such as the cache side-channel attacks are such case but also the newly discovered Rowhammer fault injection attack that can be mounted even remotely to gain full access to a device DRAM (Dynamic Random Access Memory. Under the light of the above dangers that are focused on the device hardware structure, in this paper, an overview of this attack field is provided including attacks, threat directives and countermeasures. The goal of this paper is not to exhaustively overview attacks and countermeasures but rather to survey the various, possible, existing attack directions and highlight the security risks that they can pose to security critical embedded systems as well as indicate their strength on compromising the Quality of Service (QoS such systems are designed to provide.

  3. Predicting Factors of Zone 4 Attack in Volleyball.

    Science.gov (United States)

    Costa, Gustavo C; Castro, Henrique O; Evangelista, Breno F; Malheiros, Laura M; Greco, Pablo J; Ugrinowitsch, Herbert

    2017-06-01

    This study examined 142 volleyball games of the Men's Super League 2014/2015 seasons in Brazil from which we analyzed 24-26 games of each participating team, identifying 5,267 Zone 4 attacks for further analysis. Within these Zone 4 attacks, we analyzed the association between the effect of the attack carried out and the separate effects of serve reception, tempo and type of attack. We found that the reception, tempo of attack, second tempo of attack, and power of diagonal attack were predictors of the attack effect in Zone 4. Moreover, placed attacks showed a tendency to not yield a score. In conclusion, winning points in high-level men's volleyball requires excellent receptions, a fast attack tempo and powerfully executed of attacks.

  4. Effectiveness of icatibant for treatment of hereditary angioedema attacks is not affected by body weight: findings from the Icatibant Outcome Survey, a cohort observational study.

    Science.gov (United States)

    Caballero, Teresa; Zanichelli, Andrea; Aberer, Werner; Maurer, Marcus; Longhurst, Hilary J; Bouillet, Laurence; Andresen, Irmgard

    2018-01-01

    Icatibant is a bradykinin B2-receptor antagonist used for the treatment of hereditary angioedema attacks resulting from C1-inhibitor deficiency. Treatment is not adjusted by body weight however the impact of body mass index (BMI) on the effectiveness of icatibant is not documented in the literature. We examined disease characteristics and icatibant treatment effectiveness in patients stratified by BMI in the Icatibant Outcome Survey, an ongoing, international, observational study monitoring the real-world safety and effectiveness of icatibant. Attack and treatment characteristics as well as outcomes following treatment with icatibant were compared among patients with underweight, normal, overweight, and obese BMI. Data from 2697 icatibant-treated attacks in 342 patients (3.5, 44.7, 34.8, and 17.0% patients of underweight, normal, overweight, and obese BMI, respectively) were analyzed. There was no significant difference in the frequency and severity of attacks across BMI groups, although obese patients tended to have more attacks of high severity. There was no impact of BMI on the frequency of laryngeal attacks, but patients with normal BMI had fewer cutaneous attacks and more abdominal attacks. Most attacks (71.9-83.8%) were treated with a single icatibant injection without the need for rescue with plasma-derived C1-inhibitor (pdC1-INH), regardless of BMI. Patients with obese BMI used pdC1-INH as rescue treatment more often (P < 0.0001; P = 0.0232 excluding 2 outliers) and treated attacks earlier than patients with normal BMI (P = 0.007). Furthermore, time to resolution and duration of attack were shorter for patients with high BMI (P < 0.001 for overweight and P < 0.05 for obese versus normal). Overall, icatibant was comparatively effective in treating attacks in patients across all BMI groups. Trial registration NCT01034969.

  5. Herniation of the heart following intrapericardial pneumonectomy

    International Nuclear Information System (INIS)

    Hoffland, G.A.; Taconis, W.K.; Wagenaar, J.P.M.; Zienkowicz, B.S.

    1987-01-01

    Right- and left-sided herniation of the heart are rare but serious complications after intrapericardial pneumonectomy. A case of a symptomless right-sided herniation is described. After a large pleural effusion was aspirated, a caval vein obstruction syndrome occurred. This was successfully treated by reposition of the heart. Digital subtraction angiography of the herniated heart was performed and demonstrated the torsion of the caval vein. 38 refs.; 5 figs

  6. Heart Health: The Heart Truth Campaign 2009

    Science.gov (United States)

    ... Bar Home Current Issue Past Issues Cover Story Heart Health The Heart Truth Campaign 2009 Past Issues / Winter 2009 Table ... one of the celebrities supporting this year's The Heart Truth campaign. Both R&B singer Ashanti (center) ...

  7. Women's Heart Disease: Heart Disease Risk Factors

    Science.gov (United States)

    ... this page please turn JavaScript on. Feature: Women's Heart Disease Heart Disease Risk Factors Past Issues / Winter 2014 Table ... or habits may raise your risk for coronary heart disease (CHD). These conditions are known as risk ...

  8. Novel Psychological Formulation and Treatment of "Tic Attacks" in Tourette Syndrome.

    Science.gov (United States)

    Robinson, Sally; Hedderly, Tammy

    2016-01-01

    One important, but underreported, phenomenon in Tourette syndrome (TS) is the occurrence of "tic attacks." These episodes have been described at conferences as sudden bouts of tics and/or functional tic-like movements, lasting from 15 min to several hours. They have also been described by patients in online TS communities. To date, there are no reports of tic attacks in the literature. The aim of this article is to stimulate discussion and inform clinical practices by describing the clinical presentation of 12 children (mean age 11 years and 3 months; SD = 2 years and 4 months) with TS and tic attacks, with a detailed case report for one case (13-year-old male). These children commonly present acutely to casualty departments and undergo unnecessary medical investigations. Interestingly, all children reported comorbid anxiety, with worries about the tics themselves and an increased internal focus of attention on tics once the attacks had started. In keeping with other children, the index case reported a strong internal focus of attention, with a relationship between physiological sensations/tic urges, worries about having tic attacks, and behavioral responses (e.g., body scanning, situational avoidance, and other responses). In our experience, the attacks reduce with psychological therapy, for example, the index case attended 13 sessions of therapy that included metacognitive and attention training techniques, as well as cognitive-behavioral strategies. Following treatment, an improvement was seen across a range of measures assessing tics, mood, anxiety, and quality of life. Thus, psychological techniques used to treat anxiety disorders are effective at supporting a reduction in tic attacks through modifying attention, worry processes, and negative beliefs. It is hypothesized that an attentional style of threat monitoring, difficulties tolerating internal sensory urges, cognitive misattributions, and maladaptive coping strategies contribute to the

  9. Restoration of heart functions using human embryonic stem cells derived heart muscle cells.

    Science.gov (United States)

    Gepstein, Lior; Kehat, Izhak

    2005-02-01

    Extract: Recent advances in molecular and cellular biology and specifically in the areas of stem cell biology and tissue engineering have paved the way for the development of a new field in biomedicine, regenerative medicine. This exciting approach seeks to develop new biological solutions, using the mobilization of endogenous stem cells or delivery of exogenous cells to replace or modify the function of diseased, absent, or malfunctioning tissue. The adult heart represents an attractive candidate for these emerging technologies, since adult cardiomyocytes have limited regenerative capacity. Thus, any significant heart cell loss or dysfunction, such as occurs during heart attack, is mostly irreversible and may lead to the development of progressive heart failure, one of the leading causes of world-wide morbidity and mortality. Similarly, dysfunction of the specialized electrical conduction system within the heart may result in inefficient rhythm initiation or impulse conduction, leading to significant slowing of the heart rate, usually requiring the implantation of a permanent electronic pacemaker. Replacement of the dysfunctional myocardium (heart muscle) by implantation of external heart muscle cells is emerging as a novel paradigm for restoration of the myocardial electromechanical properties, but has been significantly hampered by the paucity of cell sources for human heart cells and by the relatively limited evidence for functional integration between grafted and host cells. The recently described human embryonic stem cell (hESC) lines may provide a possible solution for the aforementioned cell sourcing problem.

  10. Health care system delay and heart failure in patients with ST-segment elevation myocardial infarction treated with primary percutaneous coronary intervention: follow-up of population-based medical registry data

    DEFF Research Database (Denmark)

    Terkelsen, Christian Juhl; Jensen, Lisette Okkels; Hansen, Hans-Henrik Tilsted

    2011-01-01

    In patients with ST-segment elevation myocardial infarction (STEMI), delay between contact with the health care system and initiation of reperfusion therapy (system delay) is associated with mortality, but data on the associated risk for congestive heart failure (CHF) among survivors are limited....

  11. Nonepileptic attack disorder among married women.

    Science.gov (United States)

    Dhanaraj, M; Rangaraj, R; Arulmozhi, T; Vengatesan, A

    2005-06-01

    To study the clinical features, precipitating stressful life events and prognosis of nonepileptic attack disorder (NEAD) among married women. Prospective cohort study with 1-year follow-up. A tertiary care teaching hospital. Of the 1020 patients with epilepsy referred to the epilepsy clinic during 2002-2003, 30 were married women with NEAD. The diagnostic criteria for NEAD included normal EEG during ictal and post-ictal phase of the generalized 'attack.' The data collected included clinical characteristics, semiology of the attacks, precipitating stressful events, and co-morbid psychiatric disorders. The control group included 30 age-matched married women with generalized tonic-clonic seizures. The long-term outcome and factors influencing the outcomes were analyzed. The mean duration of illness was 18 months, and the pattern of the attack was 'fall and lying still' in 53% and 'fall with generalized motor movements' in 47%. The frequency was one or more per week in 57% and occasionally in 43%. The important stressful events were matrimonial discord following illegal relationship of the husband with another woman (chi2 = 9.02, P = 0.003) and constant quarrel with other family members (chi2 = 5.19, P = 0.02). The prevalence of sexual abuse was low (7%). Co-morbid psychiatric disorder was observed in 70%. At the end of 1 year, 39% were free from the attack. Resolution of the stressful life events (chi2 = 4.52, P = 0.03) and lower frequency of attack at the time of reporting (chi2 = 3.88, P = 0.05) correlated with good outcomes. Among patients with NEAD in India, the major precipitating factors were matrimonial discord following illegal relationship of the husband with another woman and constant quarrel with other family members and not sexual abuse. Women with low frequency of attack at the time of reporting and the remission of the stressful events had better outcomes.

  12. Heart valve disease among patients with hyperprolactinemia

    DEFF Research Database (Denmark)

    Steffensen, Maria Charlotte; Maegbaek, Merete Lund; Laurberg, Peter

    2012-01-01

    Increased risk of heart valve disease during treatment with certain dopamine agonists, such as cabergoline, has been observed in patients with Parkinson's disease. The same compound is used to treat hyperprolactinemia, but it is unknown whether this also associates with heart valve disease....

  13. Heart failure - home monitoring

    Science.gov (United States)

    ... this page: //medlineplus.gov/ency/patientinstructions/000113.htm Heart failure - home monitoring To use the sharing features on ... your high blood pressure Fast food tips Heart failure - discharge Heart failure - fluids and diuretics Heart failure - what to ...

  14. Heart Diseases and Disorders

    Science.gov (United States)

    ... Resources Heart Diseases & Disorders Back to Patient Resources Heart Diseases & Disorders Millions of people experience irregular or abnormal ... harmless and happen in healthy people free of heart disease. However, some abnormal heart rhythms can be serious ...

  15. Coronary heart disease

    Science.gov (United States)

    Heart disease, Coronary heart disease, Coronary artery disease; Arteriosclerotic heart disease; CHD; CAD ... buildup of plaque in the arteries to your heart. This may also be called hardening of the ...

  16. Hormone Replacement Therapy and Your Heart

    Science.gov (United States)

    Hormone replacement therapy and your heart Are you taking — or considering — hormone therapy to treat bothersome menopausal symptoms? Understand ... you. By Mayo Clinic Staff Long-term hormone replacement therapy used to be routinely prescribed for postmenopausal ...

  17. 12 CFR 263.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  18. 12 CFR 509.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding....17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  19. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  20. Identifying Risk of Future Asthma Attacks Using UK Medical Record Data: A Respiratory Effectiveness Group Initiative.

    Science.gov (United States)

    Blakey, John D; Price, David B; Pizzichini, Emilio; Popov, Todor A; Dimitrov, Borislav D; Postma, Dirkje S; Josephs, Lynn K; Kaplan, Alan; Papi, Alberto; Kerkhof, Marjan; Hillyer, Elizabeth V; Chisholm, Alison; Thomas, Mike

    Asthma attacks are common, serious, and costly. Individual factors associated with attacks, such as poor symptom control, are not robust predictors. We investigated whether the rich data available in UK electronic medical records could identify patients at risk of recurrent attacks. We analyzed anonymized, longitudinal medical records of 118,981 patients with actively treated asthma (ages 12-80 years) and 3 or more years of data. Potential risk factors during 1 baseline year were evaluated using univariable (simple) logistic regression for outcomes of 2 or more and 4 or more attacks during the following 2-year period. Predictors with significant univariable association (P attacks included baseline-year markers of attacks (acute oral corticosteroid courses, emergency visits), more frequent reliever use and health care utilization, worse lung function, current smoking, blood eosinophilia, rhinitis, nasal polyps, eczema, gastroesophageal reflux disease, obesity, older age, and being female. The number of oral corticosteroid courses had the strongest association. The final cross-validated models incorporated 19 and 16 risk factors for 2 or more and 4 or more attacks over 2 years, respectively, with areas under the curve of 0.785 (95% CI, 0.780-0.789) and 0.867 (95% CI, 0.860-0.873), respectively. Routinely collected data could be used proactively via automated searches to identify individuals at risk of recurrent asthma attacks. Further research is needed to assess the impact of such knowledge on clinical prognosis. Copyright © 2016 American Academy of Allergy, Asthma & Immunology. Published by Elsevier Inc. All rights reserved.

  1. Pediatric heart surgery

    Science.gov (United States)

    Heart surgery - pediatric; Heart surgery for children; Acquired heart disease; Heart valve surgery - children ... There are many kinds of heart defects. Some are minor, and others are more serious. Defects can occur inside the heart or in the large blood vessels ...

  2. Trace Attack against Biometric Mobile Applications

    Directory of Open Access Journals (Sweden)

    Sanaa Ghouzali

    2016-01-01

    Full Text Available With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen. Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy.

  3. Subclinical endophthalmitis following a rooster attack.

    Science.gov (United States)

    Lekse Kovach, Jaclyn; Maguluri, Srilakshmi; Recchia, Franco M

    2006-12-01

    Ocular injury resulting from rooster attacks is rarely reported in the literature. Sadly, the target of these attacks is most often children younger than 3 years old, whose naiveté of the aggressive, territorial behavior of birds can place them at risk. Acute sequelae of these attacks can result in a lifetime of visual impairment. The possibility of a subacute or occult infection is an unusual occurrence that must always be considered. In an effort to prevent future attacks and ocular casualties, we present a case of a 12-month-old boy who suffered an open globe following a rooster attack. The open globe was emergently repaired. One week later, a white cataract was noticed on examination in the absence of systemic or ocular signs of inflammation. Traumatic endophthalmitis and lenticular abscess were suspected during examination under anesthesia. Vitrectomy, lensectomy, and injection of intravitreal antibiotics were performed. Culture of lenticular and vitreous aspirates grew alpha-streptococcus. Alpha-streptococcal endophthalmitis can result from ocular injuries caused by rooster pecking. The infection may present insidiously and without typical ocular or systemic symptoms or signs. Management is challenging and may require surgery.

  4. Modeling attacking of high skills volleyball players

    Directory of Open Access Journals (Sweden)

    Vladimir Gamaliy

    2014-12-01

    Full Text Available Purpose: to determine the model indicators of technical and tactical actions in the attack highly skilled volleyball players. Material and Methods: the study used statistical data of major international competitions: Olympic Games – 2012 World Championships – 2010, World League – 2010–2014 European Championship – 2010–2014. A total of 130 analyzed games. Methods were used: analysis and generalization of scientific and methodological literature, analysis of competitive activity highly skilled volleyball players, teacher observation, modeling technical and tactical actions in attacking highly skilled volleyball players. Results: it was found that the largest volume application of technical and tactical actions in the attack belongs to the group tactics «supple movement», whose indicator is 21,3%. The smallest amount of application belongs to the group tactics «flight level» model whose indicators is 5,4%, the efficiency of 3,4%, respectively. It is found that the power service in the jump from model parameters used in 51,6% of cases, the planning targets – 21,7% and 4,4% planning to reduce. Attacks performed with the back line, on model parameters used in the amount of 20,8% efficiency –13,7%. Conclusions: we prove that the performance of technical and tactical actions in the attack can be used as model in the control system of training and competitive process highly skilled volleyball players

  5. On the anatomy of social engineering attacks : A literature-based dissection of successful attacks

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    The aim of this studywas to explore the extent towhich persuasion principles are used in successful social engineering attacks. Seventy-four scenarioswere extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenariowas split into attack steps, containing

  6. 75 FR 70273 - National Heart, Lung, and Blood Institute; Notice of Closed Meetings

    Science.gov (United States)

    2010-11-17

    ... Institute Special Emphasis Panel, The Antihypertensive and Lipid-Lowering to Prevent Heart Attack Trial... Research Demonstration and Dissemination Projects. Date: December 14, 2010. Time: 8 a.m. to 2 p.m. Agenda... Assistance Program Nos. 93.233, National Center for Sleep Disorders Research; 93.837, Heart and Vascular...

  7. Attacks on public telephone networks: technologies and challenges

    Science.gov (United States)

    Kosloff, T.; Moore, Tyler; Keller, J.; Manes, Gavin W.; Shenoi, Sujeet

    2003-09-01

    Signaling System 7 (SS7) is vital to signaling and control in America's public telephone networks. This paper describes a class of attacks on SS7 networks involving the insertion of malicious signaling messages via compromised SS7 network components. Three attacks are discussed in detail: IAM flood attacks, redirection attacks and point code spoofing attacks. Depending on their scale of execution, these attacks can produce effects ranging from network congestion to service disruption. Methods for detecting these denial-of-service attacks and mitigating their effects are also presented.

  8. Cross-site scripting attacks procedure and Prevention Strategies

    Directory of Open Access Journals (Sweden)

    Wang Xijun

    2016-01-01

    Full Text Available Cross-site scripting attacks and defense has been the site of attack and defense is an important issue, this paper, the definition of cross-site scripting attacks, according to the current understanding of the chaos on the cross-site scripting, analyzes the causes and harm cross-site scripting attacks formation of attacks XXS complete process XSS attacks made a comprehensive analysis, and then for the web program includes Mobility there are cross-site scripting filter laxity given from ordinary users browse the web and web application developers two the defense cross-site scripting attacks effective strategy.

  9. Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks

    Directory of Open Access Journals (Sweden)

    Željko Gavrić

    2018-01-01

    Full Text Available Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the security issue is very important. DOS (denial of service attacks are a fundamental threat to the functioning of wireless sensor networks. This paper describes some of the most common DOS attacks and potential methods of protection against them. The case study shows one of the most frequent attacks on wireless sensor networks – the interference attack. In the introduction of this paper authors assume that the attack interference can cause significant obstruction of wireless sensor networks. This assumption has been proved in the case study through simulation scenario and simulation results.

  10. Counteracting Power Analysis Attacks by Masking

    Science.gov (United States)

    Oswald, Elisabeth; Mangard, Stefan

    The publication of power analysis attacks [12] has triggered a lot of research activities. On the one hand these activities have been dedicated toward the development of secure and efficient countermeasures. On the other hand also new and improved attacks have been developed. In fact, there has been a continuous arms race between designers of countermeasures and attackers. This chapter provides a brief overview of the state-of-the art in the arms race in the context of a countermeasure called masking. Masking is a popular countermeasure that has been extensively discussed in the scientific community. Numerous articles have been published that explain different types of masking and that analyze weaknesses of this countermeasure.

  11. The WOMBAT Attack Attribution Method: Some Results

    Science.gov (United States)

    Dacier, Marc; Pham, Van-Hau; Thonnard, Olivier

    In this paper, we present a new attack attribution method that has been developed within the WOMBAT project. We illustrate the method with some real-world results obtained when applying it to almost two years of attack traces collected by low interaction honeypots. This analytical method aims at identifying large scale attack phenomena composed of IP sources that are linked to the same root cause. All malicious sources involved in a same phenomenon constitute what we call a Misbehaving Cloud (MC). The paper offers an overview of the various steps the method goes through to identify these clouds, providing pointers to external references for more detailed information. Four instances of misbehaving clouds are then described in some more depth to demonstrate the meaningfulness of the concept.

  12. Influence of heart rhythm, breathing and arm position during computed tomography scanning on the registration accuracy of electro anatomical map (EAM) images, left atrium three-dimensional computed tomography angiography images, and fluoroscopy time during ablation to treat atrial fibrillation

    International Nuclear Information System (INIS)

    Chono, Taiki; Shimoshige, Shinya; Yoshikawa, Kenta; Mizonobe, Kazuhusa; Ogura, Keishi

    2013-01-01

    In CARTOMERGE for treatment of atrial fibrillation (AF) by ablation, by integrating electro anatomical map (EAM) and left atrium three-dimensional computed tomography angiography (3D-CTA) images, identification of the ablation points is simplified and the procedure can be made carried out more rapidly. However, the influence that heart rhythm, breathing and arm position during CT scanning have on registration accuracy and fluoroscopy time is not clear. To clarify the influence on registration accuracy and fluoroscopy time of heart rhythm, breathing and arm position during CT scanning. The patients were CT-scanned during both sinus rhythm (SR) and AF in each study subject. We evaluated the registration accuracy of images reconstructed between the cardiac cycle and assessed the registration accuracy and fluoroscopy time of images obtained during inspiratory breath-hold, expiratory breath-hold and up and down position of the arm. Although the registration accuracy of the EAM image and left atrium 3D-CTA image showed a significant difference during SR, no significant difference was seen during AF. Expiratory breath-hold and down position of the arm resulted in the highest registration accuracy and the shortest fluoroscopy time. However, arm position had no significant effect on registration accuracy. Heart rhythm and breathing during CT scanning have a significant effect on the registration accuracy of EAM images, left atrium 3D-CTA images, and fluoroscopy time. (author)

  13. A novel proposed network security management approach for cyber attacks

    International Nuclear Information System (INIS)

    Ahmed, Z.; Nazir, B.; Zafar, M.F.; Anwar, M.M.; Azam, K.; Asar, A.U.

    2007-01-01

    Network security is a discipline that focuses on securing networks from unauthorized access. Given the Escalating threats of malicious cyber attacks, modern enterprises employ multiple lines of defense. A comprehensive defense strategy against such attacks should include (I) an attack detection component that deter- mines the fact that a program is compromised, (2) an attack identification and prevention component that identifies attack packets so that one can block such packets in the future and prevents the attack from further propagation. Over the last decade, a significant amount of research has been vested in the systems that can detect cyber attacks either statically at compile time or dynamically at run time, However, not much effort is spent on automated attack packet identification or attack prevention. In this paper we present a unified solution to the problems mentioned above. We implemented this solution after the forward engineering of Open Source Security Information Management (OSSIM) system called Preventive Information Security management (PrISM) system that correlates input from different sensors so that the resulting product can automatically detect any cyber attack against it and prevents by identifying the actual attack packet(s). The PrISM was always able to detect the attacks, identify the attack packets and most often prevent by blocking the attacker's IP address to continue normal execution. There is no additional run-time performance overhead for attack prevention. (author)

  14. Playing Attack and Defense with Trusted Storage

    DEFF Research Database (Denmark)

    Gonzalez, Javier; Bonnet, Philippe; Bouganim, Luc

    2014-01-01

    It is often convenient to assume in a data management platform that one or several computing devices are trusted, specially when the goal is to provide privacy guarantees over personal data. But what does it take for a computing device to be trusted? More specifically, how can a personal device...... provide trusted storage? This is the question we tackle in this demonstration. We describe how secure devices, equipped with a trusted execution environment, differ from general purpose devices. We illustrate with our demonstration scenario, that it is much more difficult to attack a storage service...... running on a secure device, than to attack the same service running on a general purpose device....

  15. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolić, Ivica; Rechberger, Christian

    2014-01-01

    ciphers, including the new standard SHA-3 (Keccak). The rebound attack is a start-from-the-middle approach for finding differential paths and conforming pairs in byte-oriented designs like Substitution-Permutation networks and AES. We apply our new compositional attack to the reduced version of the hash...... number of rounds. We also use neutral bits and message modification methods from the practice of collision search in MD5 and SHA-1 hash functions. These methods push the rotational property through more rounds than previous analysis suggested, and eventually establish a distinguishing property...

  16. A Distinguish Attack on COSvd Cipher

    OpenAIRE

    Mohammad Ali Orumiehchi ha; R. Mirghadri

    2007-01-01

    The COSvd Ciphers has been proposed by Filiol and others (2004). It is a strengthened version of COS stream cipher family denoted COSvd that has been adopted for at least one commercial standard. We propose a distinguish attack on this version, and prove that, it is distinguishable from a random stream. In the COSvd Cipher used one S-Box (10×8) on the final part of cipher. We focus on S-Box and use weakness this S-Box for distinguish attack. In addition, found a leak on HNLL that the sub s-bo...

  17. Attacks and infections in percolation processes

    International Nuclear Information System (INIS)

    Janssen, Hans-Karl; Stenull, Olaf

    2017-01-01

    We discuss attacks and infections at propagating fronts of percolation processes based on the extended general epidemic process. The scaling behavior of the number of the attacked and infected sites in the long time limit at the ordinary and tricritical percolation transitions is governed by specific composite operators of the field-theoretic representation of this process. We calculate corresponding critical exponents for tricritical percolation in mean-field theory and for ordinary percolation to 1-loop order. Our results agree well with the available numerical data. (paper)

  18. Attack strategies on quantum cryptographic protocols

    International Nuclear Information System (INIS)

    Schauer, S.; Suda, M.

    2006-01-01

    Full text: Quantum key distribution (QKD) and quantum authentication (QA) have been a topic of extensive research in the last 20 years. In course of that many attacks on QKD and QA protocols have been studied. Among these, Zhang, Lee and Guo presented an attack on a QKD protocol using entanglement swapping. Based on that strategy we take a look at other protocols to inspect how much information an adversary may get if he shares entanglement with either one or both parties. We will present some protocols where an adversary can even get full information about the key using entanglement. (author)

  19. Tricky Treats

    Centers for Disease Control (CDC) Podcasts

    The Eagle Books are a series of four books that are brought to life by wise animal characters - Mr. Eagle, Miss Rabbit, and Coyote - who engage Rain That Dances and his young friends in the joy of physical activity, eating healthy foods, and learning from their elders about health and diabetes prevention. Tricky Treats shows children the difference between healthy snacks and sweet treats.

  20. Blood pressure, risk of ischemic cerebrovascular and ischemic heart disease, and longevity in alpha(1)-antitrypsin deficiency

    DEFF Research Database (Denmark)

    Dahl, Morten; Tybjaerg-Hansen, Anne; Sillesen, Henrik

    2003-01-01

    Because elastase in alpha(1)-antitrypsin deficiency may attack elastin in the arterial wall, we tested whether alpha(1)-antitrypsin deficiency is associated with reduced blood pressure, risk of ischemic cerebrovascular (ICVD) and ischemic heart disease (IHD), and longevity.......Because elastase in alpha(1)-antitrypsin deficiency may attack elastin in the arterial wall, we tested whether alpha(1)-antitrypsin deficiency is associated with reduced blood pressure, risk of ischemic cerebrovascular (ICVD) and ischemic heart disease (IHD), and longevity....

  1. Complement activation, endothelial dysfunction, insulin resistance and chronic heart failure

    DEFF Research Database (Denmark)

    Bjerre, M.; Kistorp, C.; Hansen, T.K.

    2010-01-01

    Objectives. Patients with chronic heart failure (CHF) have an exaggerated immune response, endothelial damage/dysfunction, and increased risk of diabetes mellitus (DM). The inter-relationship(s) between indices of complement activation (soluble membrane attack complex, sMAC), inflammation (hs...... to ischemic heart disease (IHD) as compared with CHF patients with non-ischemic ethiology (p = 0.02), but were not predictive of survival or progression of CHF. A moderate strong relation between sMAC and sEsel levels was found beta = 0.33 (p ... damaging of the heart tissue...

  2. Investigating the Possibility to Individualize Asthma Attack Therapy Based on Attack Severity and Patient Characteristics

    Directory of Open Access Journals (Sweden)

    Sárkány Zoltán

    2016-03-01

    Full Text Available Introduction: The objective of this study was to investigate with the help of a computerized simulation model whether the treatment of an acute asthma attack can be individualized based on the severity of the attack and the characteristics of the patient. Material and Method: A stochastic lung model was used to simulate the deposition of 1 nm - 10 μm particles during a mild and a moderate asthma attack. Breathing parameters were varied to maximize deposition, and simulation results were compared with those obtained in the case of a severe asthma attack. In order to investigate the effect of height on the deposition of inhaled particles, another series of simulations was carried out with identical breathing parameters, comparing patient heights of 155 cm, 175 cm and 195 cm. Results: The optimization process yielded an increase in the maximum deposition values of around 6-7% for each type of investigated asthma attack, and the difference between attacks of different degree of severity was around 5% for both the initial and the optimized values, a higher degree of obstruction increasing the amount of deposited particles. Conclusions: Our results suggest that the individualization of asthma attack treatment cannot be based on particles of different size, as the highest deposited fraction in all three types of attacks can be obtained using 0.01 μm particles. The use of a specific set of breathing parameters yields a difference between a mild and a moderate, as well as a moderate and a severe asthma attack of around 5%.

  3. Sequential and Parallel Attack Tree Modelling

    NARCIS (Netherlands)

    Arnold, Florian; Guck, Dennis; Kumar, Rajesh; Stoelinga, Mariëlle Ida Antoinette; Koornneef, Floor; van Gulijk, Coen

    The intricacy of socio-technical systems requires a careful planning and utilisation of security resources to ensure uninterrupted, secure and reliable services. Even though many studies have been conducted to understand and model the behaviour of a potential attacker, the detection of crucial

  4. Cooperative Electronic Attack using Unmanned Air Vehicles

    National Research Council Canada - National Science Library

    Mears, Mark J

    2006-01-01

    ... that are salient in the context of cooperative control. The utility of electronic attack is described in the context of integrated air defense systems that rely on RADAR sites that act as a network to gather information about potential airborne threats...

  5. Network overload due to massive attacks

    Science.gov (United States)

    Kornbluth, Yosef; Barach, Gilad; Tuchman, Yaakov; Kadish, Benjamin; Cwilich, Gabriel; Buldyrev, Sergey V.

    2018-05-01

    We study the cascading failure of networks due to overload, using the betweenness centrality of a node as the measure of its load following the Motter and Lai model. We study the fraction of survived nodes at the end of the cascade pf as a function of the strength of the initial attack, measured by the fraction of nodes p that survive the initial attack for different values of tolerance α in random regular and Erdös-Renyi graphs. We find the existence of a first-order phase-transition line pt(α ) on a p -α plane, such that if p pt , pf is large and the giant component of the network is still present. Exactly at pt, the function pf(p ) undergoes a first-order discontinuity. We find that the line pt(α ) ends at a critical point (pc,αc) , in which the cascading failures are replaced by a second-order percolation transition. We find analytically the average betweenness of nodes with different degrees before and after the initial attack, we investigate their roles in the cascading failures, and we find a lower bound for pt(α ) . We also study the difference between localized and random attacks.

  6. Attack Classification Schema for Smart City WSNs

    Directory of Open Access Journals (Sweden)

    Victor Garcia-Font

    2017-04-01

    Full Text Available Urban areas around the world are populating their streets with wireless sensor networks (WSNs in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  7. Adversarial Feature Selection Against Evasion Attacks.

    Science.gov (United States)

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection.

  8. Intrusion-Tolerant Replication under Attack

    Science.gov (United States)

    Kirsch, Jonathan

    2010-01-01

    Much of our critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As our dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including those…

  9. Strengthening Crypto-1 Cipher Against Algebraic Attacks

    Directory of Open Access Journals (Sweden)

    Farah Afianti

    2015-08-01

    Full Text Available In the last few years, several studies addressed the problem of data security in Mifare Classic. One of its weaknesses is the low random number quality. This causes SAT solver attacks to have lower complexity. In order to strengthen Crypto-1 against SAT solver attacks, a modification of the feedback function with better cryptographic properties is proposed. It applies a primitive polynomial companion matrix. SAT solvers cannot directly attack the feedback shift register that uses the modified Boolean feedback function, the register has to be split into smaller groups. Experimental testing showed that the amount of memory and CPU time needed were highest when attacking the modified Crypto-1 using the modified feedback function and the original filter function. In addition, another modified Crypto-1, using the modified feedback function and a modified filter function, had the lowest percentage of revealed variables. It can be concluded that the security strength and performance of the modified Crypto-1 using the modified feedback function and the modified filter function are better than those of the original Crypto-1.

  10. Wrap-Attack Pack: Product Packaging Exercise

    Science.gov (United States)

    Lee, Seung Hwan; Hoffman, K. Douglas

    2016-01-01

    Although many marketing courses discuss traditional concepts pertaining to product strategy, concepts specifically relating to packaging are often glossed over. This exercise, "Wrap-Attack Pack," teaches students about the utilitarian and hedonic design elements of packaging. More specifically, the primary objective is to creatively…

  11. Social Engineering Attack Detection Model: SEADMv2

    CSIR Research Space (South Africa)

    Mouton, F

    2015-10-01

    Full Text Available link in the security chain. A social engineering attack targets this weakness by using various manipulation techniques to elicit individuals to perform sensitive requests. The field of social engineering is still in its infancy as far as formal...

  12. Attack Classification Schema for Smart City WSNs.

    Science.gov (United States)

    Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena

    2017-04-05

    Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  13. Algebraic Side-Channel Attack on Twofish

    Directory of Open Access Journals (Sweden)

    Chujiao Ma

    2017-05-01

    Full Text Available While algebraic side-channel attack (ASCA has been successful in breaking simple cryptographic algorithms, it has never been done on larger or more complex algorithms such as Twofish. Compared to other algorithms that ASCA has been used on, Twofish is more difficult to attack due to the key-dependent S-boxes as well as the complex key scheduling. In this paper, we propose the first algebraic side-channel attack on Twofish, and examine the importance of side-channel information in getting past the key-dependent S-boxes and the complex key scheduling. The cryptographic algorithm and side-channel information are both expressed as boolean equations and a SAT solver is used to recover the key. While algebraic attack by itself is not sufficient to break the algorithm, with the help of side-channel information such as Hamming weights, we are able to correctly solve for 96 bits of the 128 bits key in under 2 hours with known plaintext/ciphertext.

  14. Armed Deterrence: Countering Soft Target Attacks

    Science.gov (United States)

    2016-02-06

    offer no security. With over 17,430 such geographically separated military sites across the United States, these fatal shootings by a Kuwaiti- born ...increasing trend and the carnage 4 that IS sympathizers can unleash. This coordinated attack on a concert hall, a soccer stadium, and restaurant

  15. 47 CFR 76.1612 - Personal attack.

    Science.gov (United States)

    2010-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND... issues of public importance, an attack is made upon the honesty, character, integrity, or like personal qualities of an identified person or group, the cable television system operator shall, within a reasonable...

  16. Rising Trend: Complex and sophisticated attack methods

    Indian Academy of Sciences (India)

    Stux, DuQu, Nitro, Luckycat, Exploit Kits, FLAME. ADSL/SoHo Router Compromise. Botnets of compromised ADSL/SoHo Routers; User Redirection via malicious DNS entry. Web Application attacks. SQL Injection, RFI etc. More and more Webshells. More utility to hackers; Increasing complexity and evading mechanisms.

  17. Strategic defense and attack for reliability systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2008-01-01

    This article illustrates a method by which arbitrarily complex series/parallel reliability systems can be analyzed. The method is illustrated with the series-parallel and parallel-series systems. Analytical expressions are determined for the investments and utilities of the defender and the attacker, depend on their unit costs of investment for each component, the contest intensity for each component, and their evaluations of the value of system functionality. For a series-parallel system, infinitely many components in parallel benefit the defender maximally regardless of the finite number of parallel subsystems in series. Conversely, infinitely many components in series benefit the attacker maximally regardless of the finite number of components in parallel in each subsystem. For a parallel-series system, the results are opposite. With equivalent components, equal unit costs for defender and attacker, equal intensity for all components, and equally many components in series and parallel, the defender always prefers the series-parallel system rather than the parallel-series system, and converse holds for the attacker. Hence from the defender's perspective, ceteris paribus, the series-parallel system is more reliable, and has fewer 'cut sets' or failure modes

  18. Validation Method of a Telecommunications Blackout Attack

    National Research Council Canada - National Science Library

    Amado, Joao; Nunes, Paulo

    2005-01-01

    ..., and to obtain the maximum disruptive effect over the services. The proposed method uses a top-down approach, starting on the service level and ending on the different network elements that can be identified in the end as the targets for the attack.

  19. Association between Terror Attacks and Suicide Attempts

    Science.gov (United States)

    Weizman, Tal; Yagil, Yaron; Schreiber, Shaul

    2009-01-01

    Based on Durkheim's "Control theory," we explored the association between frequency of terror attacks in Israel and the frequency of suicide attempts admitted to the Emergency Room of a major general hospital in Tel-Aviv (1999-2004). Analysis of the six-year study period as a whole revealed no significant correlation between the…

  20. Rising Trend: Complex and sophisticated attack methods

    Indian Academy of Sciences (India)

    Increased frequency and intensity of DoS/DDoS. Few Gbps is now normal; Anonymous VPNs being used; Botnets being used as a vehicle for launching DDoS attacks. Large scale booking of domain names. Hundred thousands of domains registered in short duration via few registrars; Single registrant; Most of the domains ...

  1. Understanding How Components of Organisations Contribute to Attacks

    DEFF Research Database (Denmark)

    Gu, Min; Aslanyan, Zaruhi; Probst, Christian W.

    2016-01-01

    Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors is diffi......Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors...... is difficult. Recently, system models have been used for automatically identifying possible attacks on the modelled organisation. The generated attacks consider all three layers, making the contribution of building infrastructure, computer infrastructure, and humans (insiders and outsiders) explicit. However......, this contribution is only visible in the attack trees as part of the performed steps; it cannot be mapped back to the model directly since the actions usually involve several elements (attacker and targeted actor or asset). Especially for large attack trees, understanding the relations between several model...

  2. An Adaptive Approach for Defending against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Muhai Li

    2010-01-01

    Full Text Available In various network attacks, the Distributed Denial-of-Service (DDoS attack is a severe threat. In order to deal with this kind of attack in time, it is necessary to establish a special type of defense system to change strategy dynamically against attacks. In this paper, we introduce an adaptive approach, which is used for defending against DDoS attacks, based on normal traffic analysis. The approach can check DDoS attacks and adaptively adjust its configurations according to the network condition and attack severity. In order to insure the common users to visit the victim server that is being attacked, we provide a nonlinear traffic control formula for the system. Our simulation test indicates that the nonlinear control approach can prevent the malicious attack packets effectively while making legitimate traffic flows arrive at the victim.

  3. Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, MAC layer attacks are considered...... the most harmful as they directly affect the available resources and thus the nodes’ energy consumption. The first endeavour of this paper is to model the activities of MAC layer security attacks to understand the flow of activities taking place when mounting the attack and when actually executing it....... The second aim of the paper is to simulate these attacks on hybrid MAC mechanisms, which shows the performance degradation of aWSN under the considered attacks. The modelling and implementation of the security attacks give an actual view of the network which can be useful in further investigating secure...

  4. Insulin Signaling and Heart Failure

    Science.gov (United States)

    Riehle, Christian; Abel, E. Dale

    2016-01-01

    Heart failure is associated with generalized insulin resistance. Moreover, insulin resistant states such as type 2 diabetes and obesity increases the risk of heart failure even after adjusting for traditional risk factors. Insulin resistance or type 2 diabetes alters the systemic and neurohumoral milieu leading to changes in metabolism and signaling pathways in the heart that may contribute to myocardial dysfunction. In addition, changes in insulin signaling within cardiomyocytes develop in the failing heart. The changes range from activation of proximal insulin signaling pathways that may contribute to adverse left ventricular remodeling and mitochondrial dysfunction to repression of distal elements of insulin signaling pathways such as forkhead (FOXO) transcriptional signaling or glucose transport which may also impair cardiac metabolism, structure and function. This article will review the complexities of insulin signaling within the myocardium and ways in which these pathways are altered in heart failure or in conditions associated with generalized insulin resistance. The implications of these changes for therapeutic approaches to treating or preventing heart failure will be discussed. PMID:27034277

  5. Heart failure - surgeries and devices

    Science.gov (United States)

    ... surgery; HF - surgery; Intra-aortic balloon pumps - heart failure; IABP - heart failure; Catheter based assist devices - heart failure ... problem may cause heart failure or make heart failure worse. Heart valve surgery may be needed to repair or ...

  6. Recovery of human remains after shark attack.

    Science.gov (United States)

    Byard, Roger W; James, Ross A; Heath, Karen J

    2006-09-01

    Two cases of fatal shark attack are reported where the only tissues recovered were fragments of lung. Case 1: An 18-year-old male who was in the sea behind a boat was observed by friends to be taken by a great white shark (Carcharodon carcharias). The shark dragged him under the water and then, with a second shark, dismembered the body. Witnesses noted a large amount of blood and unrecognizable body parts coming to the surface. The only tissues recovered despite an intensive beach and sea search were 2 fragments of lung. Case 2: A 19-year-old male was attacked by a great white shark while diving. A witness saw the shark swim away with the victim's body in its mouth. Again, despite intensive beach and sea searches, the only tissue recovered was a single piece of lung, along with pieces of wetsuit and diving equipment. These cases indicate that the only tissue to escape being consumed or lost in fatal shark attacks, where there is a significant attack with dismemberment and disruption of the integrity of the body, may be lung. The buoyancy of aerated pulmonary tissue ensures that it rises quickly to the surface, where it may be recovered by searchers soon after the attack. Aeration of the lung would be in keeping with death from trauma rather than from drowning and may be a useful marker in unwitnessed deaths to separate ante- from postmortem injury, using only relatively small amounts of tissues. Early organ recovery enhances the identification of human tissues as the extent of morphologic alterations by putrefactive processes and sea scavengers will have been minimized. DNA testing is also possible on such recovered fragments, enabling confirmation of the identity of the victim.

  7. Transforming Graphical System Models to Graphical Attack Models

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2016-01-01

    Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations...... approach to transforming graphical system models to graphical attack models in the form of attack trees. Based on an asset in the model, our transformations result in an attack tree that represents attacks by all possible actors in the model, after which the actor in question has obtained the asset....

  8. New attacks on Wi-Fi Protected Setup

    OpenAIRE

    Hamed Mohtadi; Alireza Rahimi

    2015-01-01

    Wi-Fi Protected Setup (WPS) is a network security standard that is used to secure networks in home and office, introduced in 2006 by the Wi-Fi Alliance. It provides easier configuration setup and is used in almost all recent Wi-Fi devices. In this paper we propose two attacks on this standard. The first attack is an offline brute force attack that uses imbalance on registration protocol. This attack needs user action, but it is more efficient than previous attacks. The second attack uses weak...

  9. 1994 Attack Team Workshop: Phase II - Full-Scale Offensive Fog Attack Tests

    National Research Council Canada - National Science Library

    Scheffey, Joseph

    1997-01-01

    .... This report demonstrates the benefits of using a medium angle fog stream to control the overhead fire threat when conducting a direct attack on a growing/steady state fire where the sea of the fire is obstructed...

  10. Vascular injuries after bear attacks: Incidence, surgical challenges and outcome.

    Science.gov (United States)

    Wani, Mohd Lateef; Ahangar, Abdul Gani; Lone, Gh Nabi; Lone, Reyaz Ahmad; Ashraf, Hakeem Zubair; Dar, Abdul Majeed; Bhat, M A; Singh, Shyam; Bijli, Akram Hussain; Irshad, Ifat

    2011-01-01

    Bear mauling is rarely reported in medical literature due to its rare occurrence. Present study was undertaken to describe the pattern and management of bear maul vascular injuries in Kashmir. Study of patients with bear maul vascular injury from 1(st) Jan 2004 to 31(st) Dec. 2008. Fifteen patients with bear maul vascular injury were studied. All patients of bear maul without vascular injury were excluded from the study. Most of the patients were treated by reverse saphenous vein graft or end to end anastomosis. Most common complication was wound infection (20%) followed by graft occlusion (13.33%). There was no operative death. Bear attacks are very common in Kashmir. Vascular injury due to bear maul needs prompt resuscitation and revascularization. Results are very good provided timely intervention for revascularization is done.

  11. A Framework for Attack-Resilient Industrial Control Systems : Attack Detection and Controller Reconfiguration

    OpenAIRE

    Paridari, Kaveh; O'Mahony, Niamh; Mady, Alie El-Din; Chabukswar, Rohan; Boubekeur, Menouer; Sandberg, Henrik

    2017-01-01

    Most existing industrial control systems (ICSs), such as building energy management systems (EMSs), were installed when potential security threats were only physical. With advances in connectivity, ICSs are now, typically, connected to communications networks and, as a result, can be accessed remotely. This extends the attack surface to include the potential for sophisticated cyber attacks, which can adversely impact ICS operation, resulting in service interruption, equipment damage, safety c...

  12. Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?

    Directory of Open Access Journals (Sweden)

    Ines Goicoechea-Telleria

    2018-01-01

    Full Text Available The use of biometrics keeps growing. Every day, we use biometric recognition to unlock our phones or to have access to places such as the gym or the office, so we rely on the security manufacturers offer when protecting our privileges and private life. It is well known that it is possible to hack into a fingerprint sensor using fake fingers made of Play-Doh and other easy-to-obtain materials but to what extent? Is this true for all users or only for specialists with a deep knowledge on biometrics? Are smartphone fingerprint sensors as reliable as desktop sensors? To answer these questions, we performed 3 separate evaluations. First, we evaluated 4 desktop fingerprint sensors of different technologies by attacking them with 7 different fake finger materials. All of them were successfully attacked by an experienced attacker. Secondly, we carried out a similar test on 5 smartphones with embedded sensors using the most successful materials, which also hacked the 5 sensors. Lastly, we gathered 15 simulated attackers with no background in biometrics to create fake fingers of several materials, and they had one week to attack the fingerprint sensors of the same 5 smartphones, with the starting point of a short video with the techniques to create them. All 5 smartphones were successfully attacked by an inexperienced attacker. This paper will provide the results achieved, as well as an analysis on the attack potential of every case. All results are given following the metrics of the standard ISO/IEC 30107-3.

  13. The epidemiology of physical attack and rape among crack-using women.

    Science.gov (United States)

    Falck, R S; Wang, J; Carlson, R G; Siegal, H A

    2001-02-01

    This prospective study examines the epidemiology of physical attack and rape among a sample of 171 not-in-treatment, crack-cocaine using women. Since initiating crack use, 62% of the women reported suffering a physical attack. The annual rate of victimization by physical attack was 45%. Overall, more than half of the victims sought medical care subsequent to an attack. The prevalence of rape since crack use was initiated was 32%, and the annual rate was 11%. Among those women having been raped since they initiated crack use, 83% reported they were high on crack when the crime occurred as were an estimated 57% of the perpetrators. Logistic regression analyses showed that duration of crack use, arrest for prostitution, and some college education were predictors of having experienced a physical attack. Duration of crack use and a history of prostitution were predictors of suffering a rape. Drug abuse treatment programs must be sensitive to high levels of violence victimization experienced by crack-cocaine using women. Screening women for victimization, and treating the problems that emanate from it, may help make drug abuse treatment more effective.

  14. Defense and attack of complex and dependent systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2010-01-01

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  15. Defense and attack of complex and dependent systems

    Energy Technology Data Exchange (ETDEWEB)

    Hausken, Kjell, E-mail: kjell.hausken@uis.n [Faculty of Social Sciences, University of Stavanger, N-4036 Stavanger (Norway)

    2010-01-15

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  16. Revealing Hearts

    DEFF Research Database (Denmark)

    Saghaug, Kristin Falck; Pattison, George; Lindgren, Peter

    2014-01-01

    with reference to Tillich’s account of the meaning of revelation through culture and art, summed up in the statement that “(...) revelation is the manifestation of the ground of being for human knowledge” (Tillich, 1951, p.94), which, we argue, can be extended to everyday experiences, for example, in business......Some small business owners want to balance personal values as well as economic values. “I have to follow my heart” or “it must be meaningful” some of them say. But how might they be able to know what gives meaning to the heart? The philosophical theologian Paul Tillich finds that the problem...... life. In Tillich’s own terms, even preliminary concerns may point at an ultimate concern (Tillich, 1964), which can also be understood as ‘knowledge of the heart’. Our account is also connected to wider discussions concerning the nature of intuition....

  17. Getting a New Heart

    Science.gov (United States)

    ... may be able to replace it with an artificial (man-made) valve. Cardiac size reduction . During this procedure, your doctor removes a piece of the heart muscle from an enlarged heart. This makes your heart ...

  18. Open heart surgery

    Science.gov (United States)

    ... this page: //medlineplus.gov/ency/article/002950.htm Open heart surgery To use the sharing features on this ... large arteries connected to the heart. The term "open heart surgery" means that you are connected to a ...

  19. Pediatric heart surgery - discharge

    Science.gov (United States)

    ... discharge; Heart valve surgery - children - discharge; Heart surgery - pediatric - discharge; Heart transplant - pediatric - discharge ... Geme JW, Schor NF, eds. Nelson Textbook of Pediatrics . 20th ed. Philadelphia, PA: Elsevier; 2016:chap 434. ...

  20. Congenital Heart Information Network

    Science.gov (United States)

    ... heart defects. Important Notice The Congenital Heart Information Network website is temporarily out of service. Please join ... and Uwe Baemayr for The Congenital Heart Information Network Exempt organization under Section 501(c)3. Copyright © ...

  1. Hypertensive heart disease

    Science.gov (United States)

    ... page: //medlineplus.gov/ency/article/000163.htm Hypertensive heart disease To use the sharing features on this page, please enable JavaScript. Hypertensive heart disease refers to heart problems that occur because of ...

  2. Left heart catheterization

    Science.gov (United States)

    Catheterization - left heart ... to help guide the catheters up into your heart and arteries. Dye (sometimes called "contrast") will be ... in the blood vessels that lead to your heart. The catheter is then moved through the aortic ...

  3. Right heart ventriculography

    Science.gov (United States)

    Angiography - right heart ... moved forward into the right side of the heart. As the catheter is advanced, the doctor can ... is injected into the right side of the heart. It helps the cardiologist determine the size and ...

  4. Congenital heart disease

    Science.gov (United States)

    Congenital heart disease (CHD) is a problem with the heart's structure and function that is present at birth. ... Fraser CD, Kane LC. Congenital heart disease. In: Townsend CM Jr, ... Sabiston Textbook of Surgery: The Biological Basis of Modern ...

  5. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    Directory of Open Access Journals (Sweden)

    Khaled Elleithy

    2005-02-01

    Full Text Available A denial of service attack (DOS is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack will be simulated against a Microsoft Windows 95 computer. The TCP SYN Flood attack will be simulated against a Microsoft Windows 2000 IIS FTP Server. Distributed DOS will be demonstrated by simulating a distribution zombie program that will carry the Ping of Death attack. This paper will demonstrate the potential damage from DOS attacks and analyze the ramifications of the damage.

  6. Cyber Attacks During the War on Terrorism: A Predictive Analysis

    National Research Council Canada - National Science Library

    Vatis, Michael

    2001-01-01

    .... Just as the terrorist attacks of September 11, 2001 defied what many thought possible, cyber attacks could escalate in response to United States and allied retaliatory measures against the terrorists...

  7. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited...

  8. Two fatal tiger attacks in zoos.

    Science.gov (United States)

    Tantius, Britta; Wittschieber, Daniel; Schmidt, Sven; Rothschild, Markus A; Banaschak, Sibylle

    2016-01-01

    Two captive tiger attacks are presented that took place in Cologne and Münster zoos. Both attacks occurred when the handlers, intent on cleaning the enclosures, entered whilst the tigers accidently retained access to the location, and thus defended their territory against the perceived intruders. Both victims suffered fatal neck injuries from the bites. At Münster, colleagues managed to lure the tiger away from its victim to enable treatment, whilst the Cologne zoo tiger had to be shot in order to allow access to be gained. Whilst it was judged that human error led to the deaths of the experienced zookeepers, the investigation in Münster was closed as no third party was found to be at fault, whereas the Cologne zoo director was initially charged with being negligent. These charges were subsequently dismissed as safety regulations were found to be up to date.

  9. RISK DISCLOSURE AGAINST ATTACK ON CRITICAL INFRASTRUCTURES

    Science.gov (United States)

    Yoshida, Mamoru; Kobayashi, Kiyoshi

    This paper analyzes the government's defensive and disclosure strategies to reduce the damage caused by terrorists that attack critical infrastructures using subjective game theory. The government recognizes a terrorist as a hidden opponent and the government's decision making about the policies against terror attacks depends on the belief about the existence of terrorist. In addition, it is not necessarily true that the government and the terrorist play the common game and make their decisions. Considering these points, the paper formulates the model in which the government and the terrorist formulate the subjective games respectively, and they induce the strategies using the equilibriums of their subjective games. The paper concluded that the government's disclosure about the implementation of the countermeasure, rather than the disclosure of warning level related with the belief about the existence of terrorist, brings about the higher increment of the subjective payoffs of the government.

  10. Marine microalgae attack and feed on metazoans

    DEFF Research Database (Denmark)

    Berge, Terje; Poulsen, Louise K.; Moldrup, Morten

    2012-01-01

    Free-living microalgae from the dinoflagellate genus Karlodinium are known to formmassive blooms in eutrophic coastal waters worldwide and are often associated with fish kills. Natural bloom populations, recently shown to consist of the two mixotrophic and toxic species Karlodinium armiger...... and Karlodinium veneficum have caused fast paralysis and mortality of finfish and copepods in the laboratory, and have been associated with reduced metazooplankton biomass in-situ. Here we show that a strain of K. armiger (K-0688) immobilises the common marine copepod Acartia tonsa in a densitydependent manner...... and collectively ingests the grazer to promote its own growth rate. In contrast, four strains of K. veneficum did not attack or affect the motility and survival of the copepods. Copepod immobilisation by the K. armiger strain was fast (within 15min) and caused by attacks of swarming cells, likely through...

  11. Cascade-based attacks on complex networks

    Science.gov (United States)

    Motter, Adilson E.; Lai, Ying-Cheng

    2002-12-01

    We live in a modern world supported by large, complex networks. Examples range from financial markets to communication and transportation systems. In many realistic situations the flow of physical quantities in the network, as characterized by the loads on nodes, is important. We show that for such networks where loads can redistribute among the nodes, intentional attacks can lead to a cascade of overload failures, which can in turn cause the entire or a substantial part of the network to collapse. This is relevant for real-world networks that possess a highly heterogeneous distribution of loads, such as the Internet and power grids. We demonstrate that the heterogeneity of these networks makes them particularly vulnerable to attacks in that a large-scale cascade may be triggered by disabling a single key node. This brings obvious concerns on the security of such systems.

  12. Research About Attacks Over Cloud Environment

    Directory of Open Access Journals (Sweden)

    Li Jie

    2017-01-01

    Full Text Available Cloud computing is expected to continue expanding in the next few years and people will start to see some of the following benefits in their real lives. Security of cloud computing environments is the set of control-based technologies and policies absolute to adhere regulatory compliance rules and protect information data applications and infrastructure related with cloud use. In this paper we suggest a model to estimating the cloud computing security and test the services provided to users. The simulator NG-Cloud Next Generation Secure Cloud Storage is used and modified to administer the proposed model. This implementation achieved security functions potential attacks as defined in the proposed model. Finally we also solve some attacks over cloud computing to provide the security and safety of the cloud.

  13. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...

  14. Tricky Treats

    Centers for Disease Control (CDC) Podcasts

    2008-08-04

    The Eagle Books are a series of four books that are brought to life by wise animal characters - Mr. Eagle, Miss Rabbit, and Coyote - who engage Rain That Dances and his young friends in the joy of physical activity, eating healthy foods, and learning from their elders about health and diabetes prevention. Tricky Treats shows children the difference between healthy snacks and sweet treats.  Created: 8/4/2008 by National Center for Chronic Disease Prevention and Health Promotion (NCCDPHP).   Date Released: 8/5/2008.

  15. Target Heart Rates

    Science.gov (United States)

    ... Check Recipe Certification Program Nutrition Requirements Heart-Check Professional Resources Contact the Heart-Check Certification Program Simple Cooking and Recipes Dining Out Choosing a Restaurant Deciphering ...

  16. Alcohol and Heart Health

    Science.gov (United States)

    ... Check Recipe Certification Program Nutrition Requirements Heart-Check Professional Resources Contact the Heart-Check Certification Program Simple Cooking and Recipes Dining Out Choosing a Restaurant Deciphering ...

  17. Caffeine and Heart Disease

    Science.gov (United States)

    ... Check Recipe Certification Program Nutrition Requirements Heart-Check Professional Resources Contact the Heart-Check Certification Program Simple Cooking and Recipes Dining Out Choosing a Restaurant Deciphering ...

  18. Protein and Heart Health

    Science.gov (United States)

    ... Check Recipe Certification Program Nutrition Requirements Heart-Check Professional Resources Contact the Heart-Check Certification Program Simple Cooking and Recipes Dining Out Choosing a Restaurant Deciphering ...

  19. Heart failure - medicines

    Science.gov (United States)

    CHF - medicines; Congestive heart failure - medicines; Cardiomyopathy - medicines; HF - medicines ... You will need to take most of your heart failure medicines every day. Some medicines are taken ...

  20. Fighting Through a Logistics Cyber Attack

    Science.gov (United States)

    2015-06-19

    cumulative cost of cyber-attacks was more than the combined global black market cost of cocaine, heroin and marijuana. These alarming figures raised...the country to its knees. The Luftwaffe was uncontested in the Battle of Britain until radar’s ability to detect inbound aircraft provided the...manifest information in IGC and provides inbound passenger manifest data to the aerial port of debarkation (APOD) and other receiving activities for

  1. Are blockchains immune to all malicious attacks?

    OpenAIRE

    Xu, Jennifer J.

    2016-01-01

    Background: In recent years, blockchain technology has attracted considerable attention. It records cryptographic transactions in a public ledger that is difficult to alter and compromise because of the distributed consensus. As a result, blockchain is believed to resist fraud and hacking. Results: This work explores the types of fraud and malicious activities that can be prevented by blockchain technology and identifies attacks to which blockchain remains vulnerable. Conclusions: This study ...

  2. An Explanation of Nakamoto's Analysis of Double-spend Attacks

    OpenAIRE

    Ozisik, A. Pinar; Levine, Brian Neil

    2017-01-01

    The fundamental attack against blockchain systems is the double-spend attack. In this tutorial, we provide a very detailed explanation of just one section of Satoshi Nakamoto's original paper where the attack's probability of success is stated. We show the derivation of the mathematics relied upon by Nakamoto to create a model of the attack. We also validate the model with a Monte Carlo simulation, and we determine which model component is not perfect.

  3. Iraqi violence, Saudi attack and further bombings

    Energy Technology Data Exchange (ETDEWEB)

    Anon

    2006-03-15

    Iraq moved closer to all-out civil war following an attack on the Imam Ali al-Hadi mosque in Samarra, one of Shi'i Islam's holiest shrines, on 22nd February. In the days that followed, several hundred Iraqis died in inter-communal violence. Attacks on installations close to the Basrah Oil Terminal were reported. Earlier in the month, the main oil storage facility in Kirkuk was bombed, forcing the Northern Oil Company to shut-in the 0.3 mn bpd field. Oil and electricity supplies in southern Iraq were cut by attacks on installations some 40 miles south of Baghdad. Turkey agreed to resume product exports to Iraq after a deal was agreed on repaying Iraqi debts of $1 bn to Turkish suppliers. An official Australian inquiry into illegal payments made under the UN's oil-for-food programme is to investigate allegations involving two Australian-controlled oil firms. (author)

  4. Post-Colonial Analysis of Joseph Conrad’s Heart of Darkness

    Directory of Open Access Journals (Sweden)

    Samet Güven

    2013-07-01

    Full Text Available Joseph Conrad’s Heart of Darkness tells the journey of Marlow through the African jungle and his search for the European Kurtz who exploits the natives by imposing violence. It is mainly based upon Conrad’s own experience in Congo. Conrad learned how Europeans exploited and traded the natives for their own benefits during his own journey. The book is regarded as an attack on imperialism and criticizes immoral treatments of the European colonizers in Africa in the 19th century. Keith Booker states that “the book deals with issues such as imperialism, capitalism, race, and gender that were very much at the forefront of the turn-of-the century European mind. Conrad’s ambivalent treatment of these issues is extremely representative of the way they were treated in any number of European discourses of the time” (217. Besides, Chinua Achebe in his An “Image of Africa: Racism in Conrad’s Heart of Darkness” comments that “Heart of Darkness projects the image of Africa as ‘the other world’, the antithesis of Europe and therefore of civilization, a place where man’s vaunted intelligence and refinement are finally mocked by triumphant bestiality” (338. Although Achebe puts forward that the novel is in favor of colonialism, I consider that Conrad does not intend to write it to appreciate colonialism and therefore the purpose of this study is to approach Conrad’s Heart of Darkness from post-colonial perspective by taking European imperialism and colonialism over Africa into consideration in order to clarify how Conrad has deconstructed binary oppositions of colonialism by subverting the general idea of the Europeans towards Africa in the 19th century.

  5. Post-Colonial Analysis of Joseph Conrad’s Heart of Darkness

    Directory of Open Access Journals (Sweden)

    Samet Güven

    2013-06-01

    Full Text Available Joseph Conrad’s Heart of Darkness tells the journey of Marlow through the African jungle and his search for the European Kurtz who exploits the natives by imposing violence. It is mainly based upon Conrad’s own experience in Congo. Conrad learned how Europeans exploited and traded the natives for their own benefits during his own journey. The book is regarded as an attack on imperialism and criticizes immoral treatments of the European colonizers in Africa in the 19th century. Keith Booker states that “the book deals with issues such as imperialism, capitalism, race, and gender that were very much at the forefront of the turn-of-the century European mind. Conrad’s ambivalent treatment of these issues is extremely representative of the way they were treated in any number of European discourses of the time” (217. Besides, Chinua Achebe in his An “Image of Africa: Racism in Conrad’s Heart of Darkness” comments that “Heart of Darkness projects the image of Africa as ‘the other world’, the antithesis of Europe and therefore of civilization, a place where man’s vaunted intelligence and refinement are finally mocked by triumphant bestiality” (338. Although Achebe puts forward that the novel is in favor of colonialism, I consider that Conrad does not intend to write it to appreciate colonialism and therefore the purpose of this study is to approach Conrad’s Heart of Darkness from post-colonial perspective by taking European imperialism and colonialism over Africa into consideration in order to clarify how Conrad has deconstructed binary oppositions of colonialism by subverting the general idea of the Europeans towards Africa in the 19th century.

  6. Inalador dosimetrado com espaçador artesanal versus nebulizador no tratamento da crise de sibilância na criança Metered-dose inhaler with home-made spacer versus nebulizers to treat moderate wheezing attacks in children

    Directory of Open Access Journals (Sweden)

    Liana Consuelo Santana Vilarinho

    2003-10-01

    oximetria. A comparação dos parâmetros clínicos e de saturação de oxigênio, entre os grupos, não mostrou diferença significativa após as doses de salbutamol, havendo equivalência clínica entre doses diferentes (três vezes menor no grupo IDE, em relação ao grupo NEB; os tempos de preparo e administração da medicação e o custo do tratamento foram significativamente menores no grupo IDE. O grau de satisfação das famílias foi semelhante nos dois grupos. CONCLUSÃO: O inalador dosimetrado com espaçador artesanal pode ser utilizado na admini stração de salbutamol a crianças em crise de sibilância, com algumas vantagens em relação ao nebulizador.OBJECTIVE: To compare the effectiveness of salbutamol administration by metered-dose inhaler with a home-made spacer versus jet nebulizer in children with moderate wheezing attacks. MATERIAL AND METHODS: A randomized, single-blinded trial was performed with a convenience sample of children presenting wheezing. The children were enrolled in an emergency room and randomly assigned to one of two treatment groups: home-made spacer group or nebulizer group. Clinical scores and oxygen saturation were recorded at baseline and 15 minutes after salbutamol administration. Treatment with salbutamol (100 µg/3 kg in the spacer group, and 250 µg/3 kg in the nebulizer group was repeated at 20-minute intervals, until the child was considered to have improved significantly, with no need of any further dose, or until three doses were delivered. Treatment cost, time spent to prepare and deliver the drug, and level of parental satisfaction with the treatment were recorded. RESULTS: Fifty-four children with age between 22 days and 11.7 years were enrolled - 27 in each group. Baseline and demographic characteristics were similar for both groups. The spacer was as effective as the nebulizer in terms of clinical score and oxygen saturation. The different doses (100 µg/3 kg with the spacer, and 250 µg/3 kg with the nebulizer were

  7. Predictors of Stroke After Transient Ischemic Attack in Children.

    Science.gov (United States)

    Lehman, Laura L; Watson, Christopher G; Kapur, Kush; Danehy, Amy R; Rivkin, Michael J

    2016-01-01

    Transient ischemic attack (TIA) in children has received far less attention compared with TIA in adults. The risk factors of stroke after TIA in children are relatively unknown. We aimed to determine the percentage of children who have stroke after TIA and the risk factors associated with stroke after TIA. We searched the medical records at Boston Children's Hospital for the year 2010 to find children who were evaluated for TIA to determine associated risk factors of stroke after TIA. We included children who were evaluated in 2009 through 2010 for TIA and had magnetic resonance imaging. We examined follow-up imaging through August 2014 for subsequent stroke. Logistic regression was used to calculate odds ratios for factors in our cohort who are associated with stroke after presentation with TIA. We identified 63 children who experienced a TIA. The mean time of imaging follow-up was 4.5 years after TIA presentation. Of the 63 children, 10 (16%) developed radiological evidence of ischemic cerebral injury within the follow-up period. Four of the 10 (6%) demonstrated diffusion abnormalities on magnetic resonance imaging at TIA presentation, whereas 8 (13%) had a stroke after their TIA. Arteriopathy, female sex, and autoimmune disorders were significantly associated with stroke after TIA. In our cohort of children, stroke occurred after TIA at a rate similar to that seen in adults, but the risk factors for stroke after TIA in children are different. © 2015 American Heart Association, Inc.

  8. Exploratory study into awareness of heart disease and health care seeking behavior among Emirati women (UAE) - Cross sectional descriptive study.

    Science.gov (United States)

    Khan, Sarah; Ali, Syed Adnan

    2017-09-26

    Cardiovascular disease was the leading cause of death among women in the United Arab Emirates (UAE) in 2010. Heart attacks usually happen in older women thus symptoms of heart disease may be masked by symptoms of chronic diseases, which could explain the delay in seeking health care and higher mortality following an ischaemic episode among women. This study seeks to a) highlight the awareness of heart diseases among Emirati women and b) to understand Emirati women's health care seeking behaviour in UAE. A cross sectional, descriptive study was conducted using a survey instrument adapted from the American Heart Association National survey. A convenience sample of 676 Emirati women between the ages of 18-55 years completed the questionnaire. The study showed low levels of awareness of heart disease and associated risk factors in Emirati women; only 19.4% participants were found to be aware of heart diseases. Awareness levels were highest in Dubai (OR 2.18, p < 0.05) among all the other emirates and in the 18-45 years age group (OR 2.74, p < 0.05). Despite low awareness levels, women paradoxically perceived themselves to be self-efficacious in seeking health care. Interestingly, just 49.1% Emirati women believed that good quality and affordable health care was available in the UAE. Only 28.8% of the participants believed there were sufficient female doctors to respond to health needs of women in UAE. Furthermore, only 36.7% Emirati women chose to be treated in the UAE over treatment in other countries. Emirati women clearly lack the knowledge on severity and vulnerability to heart disease in the region that is essential to improve cardiovascular related health outcomes. This study has identified the need for wider outreach that focuses on gender and age specific awareness on heart disease risks and symptoms. The study has also highlighted potential modifiable barriers in seeking health care that should be overcome to reduce morbidity and mortality due to heart

  9. Quantitative Attack Tree Analysis via Priced Timed Automata

    NARCIS (Netherlands)

    Kumar, Rajesh; Ruijters, Enno Jozef Johannes; Stoelinga, Mariëlle Ida Antoinette; Sankaranarayanan, Sriram; Vicario, Enrico

    The success of a security attack crucially depends on the resources available to an attacker: time, budget, skill level, and risk appetite. Insight in these dependencies and the most vulnerable system parts is key to providing effective counter measures. This paper considers attack trees, one of the

  10. Pareto Efficient Solution of Attack-Defence Trees

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as

  11. Vulnerability Assessment by Learning Attack Specifications in Graphs

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; Lopes, Raul H.C.

    This paper presents an evolutionary approach for learning attack specifications that describe attack scenarios. The objective is to find vulnerabilities in computer networks which minimise the cost of an attack with maximum impact. Although we focus on Insider Threat, the proposed approach applies

  12. Attacks on the AJPS Mersenne-based cryptosystem

    NARCIS (Netherlands)

    K. de Boer (Koen); L. Ducas (Léo); S. Jeffery (Stacey); R. M. de Wolf (Ronald)

    2018-01-01

    textabstractAggarwal, Joux, Prakash and Santha recently introduced a new potentially quantum-safe public-key cryptosystem, and suggested that a brute-force attack is essentially optimal against it. They consider but then dismiss both Meet-in-the-Middle attacks and LLL-based attacks. Very soon after

  13. 12 CFR 747.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... INVESTIGATIONS Uniform Rules of Practice and Procedure § 747.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any court concerning all or any part of an...

  14. 12 CFR 308.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... PRACTICE RULES OF PRACTICE AND PROCEDURE Uniform Rules of Practice and Procedure § 308.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any...

  15. 12 CFR 19.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... OF PRACTICE AND PROCEDURE Uniform Rules of Practice and Procedure § 19.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any court concerning all...

  16. Limit Asthma Attacks Caused by Colds or Flu

    Science.gov (United States)

    Asthma: Limit asthma attacks caused by colds or flu A cold or the flu can trigger an asthma attack. Here's why — and how to keep your sneeze ... plan. If you notice warning signs of an asthma attack — such as coughing, wheezing, chest tightness or shortness ...

  17. Link-layer Jamming Attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    2004-01-01

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  18. Link-layer jamming attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  19. Regression Nodes: Extending attack trees with data from social sciences

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    In the field of security, attack trees are often used to assess security vulnerabilities probabilistically in relation to multi-step attacks. The nodes are usually connected via AND-gates, where all children must be executed, or via OR-gates, where only one action is necessary for the attack step to

  20. What Can We Learn?--The Algonquin Bear Attack.

    Science.gov (United States)

    Strickland, Dan

    1992-01-01

    Describes a bear attack in Algonquin Park in Lake Opeongo (Canada) in which a man and woman were killed. Hypothesizes that the bear deliberately preyed on its victims and concludes that the bear was physically normal. Despite this isolated attack, the chance of being attacked by a black bear when camping is virtually nonexistent. (KS)