Science.gov

Sample records for design basis threat

  1. PRELIMINARY SELECTION OF MGR DESIGN BASIS EVENTS

    SciTech Connect

    J.A. Kappes

    1999-09-16

    The purpose of this analysis is to identify the preliminary design basis events (DBEs) for consideration in the design of the Monitored Geologic Repository (MGR). For external events and natural phenomena (e.g., earthquake), the objective is to identify those initiating events that the MGR will be designed to withstand. Design criteria will ensure that radiological release scenarios resulting from these initiating events are beyond design basis (i.e., have a scenario frequency less than once per million years). For internal (i.e., human-induced and random equipment failures) events, the objective is to identify credible event sequences that result in bounding radiological releases. These sequences will be used to establish the design basis criteria for MGR structures, systems, and components (SSCs) design basis criteria in order to prevent or mitigate radiological releases. The safety strategy presented in this analysis for preventing or mitigating DBEs is based on the preclosure safety strategy outlined in ''Strategy to Mitigate Preclosure Offsite Exposure'' (CRWMS M&O 1998f). DBE analysis is necessary to provide feedback and requirements to the design process, and also to demonstrate compliance with proposed 10 CFR 63 (Dyer 1999b) requirements. DBE analysis is also required to identify and classify the SSCs that are important to safety (ITS).

  2. System Design and the Safety Basis

    SciTech Connect

    Ellingson, Darrel

    2008-05-06

    The objective of this paper is to present the Bechtel Jacobs Company, LLC (BJC) Lessons Learned for system design as it relates to safety basis documentation. BJC has had to reconcile incomplete or outdated system description information with current facility safety basis for a number of situations in recent months. This paper has relevance in multiple topical areas including documented safety analysis, decontamination & decommissioning (D&D), safety basis (SB) implementation, safety and design integration, potential inadequacy of the safety analysis (PISA), technical safety requirements (TSR), and unreviewed safety questions. BJC learned that nuclear safety compliance relies on adequate and well documented system design information. A number of PIS As and TSR violations occurred due to inadequate or erroneous system design information. As a corrective action, BJC assessed the occurrences caused by systems design-safety basis interface problems. Safety systems reviewed included the Molten Salt Reactor Experiment (MSRE) Fluorination System, K-1065 fire alarm system, and the K-25 Radiation Criticality Accident Alarm System. The conclusion was that an inadequate knowledge of system design could result in continuous non-compliance issues relating to nuclear safety. This was especially true with older facilities that lacked current as-built drawings coupled with the loss of 'historical knowledge' as personnel retired or moved on in their careers. Walkdown of systems and the updating of drawings are imperative for nuclear safety compliance. System design integration with safety basis has relevance in the Department of Energy (DOE) complex. This paper presents the BJC Lessons Learned in this area. It will be of benefit to DOE contractors that manage and operate an aging population of nuclear facilities.

  3. 10 CFR 72.92 - Design basis external natural events.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Design basis external natural events. 72.92 Section 72.92... Evaluation Factors § 72.92 Design basis external natural events. (a) Natural phenomena that may exist or that... must be adopted for evaluating the design basis external natural events based on the characteristics...

  4. 10 CFR 72.92 - Design basis external natural events.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Design basis external natural events. 72.92 Section 72.92... Evaluation Factors § 72.92 Design basis external natural events. (a) Natural phenomena that may exist or that... must be adopted for evaluating the design basis external natural events based on the characteristics...

  5. 10 CFR 72.92 - Design basis external natural events.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Design basis external natural events. 72.92 Section 72.92... Evaluation Factors § 72.92 Design basis external natural events. (a) Natural phenomena that may exist or that... must be adopted for evaluating the design basis external natural events based on the characteristics...

  6. 10 CFR 72.92 - Design basis external natural events.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Design basis external natural events. 72.92 Section 72.92... Evaluation Factors § 72.92 Design basis external natural events. (a) Natural phenomena that may exist or that... must be adopted for evaluating the design basis external natural events based on the characteristics...

  7. Optimal cost basis for seismic design

    SciTech Connect

    Hadjian, A.H.

    1993-09-01

    The paper summarizes a methodology for establishing seismic design levels based on a cost-benefit assessment. The methodology requires the development of costs and benefits for varying design levels of vibratory ground motion and surface fault displacements. The optimum design level for a given structure is that which gives the minimum total direct and earthquake consequence costs. The example used is the surface facilities of the proposed high-level waste repository at Yucca Mountain, Nevada.

  8. Design basis for the NRC Operations Center

    SciTech Connect

    Lindell, M.K.; Wise, J.A.; Griffin, B.N.; Desrosiers, A.E.; Meitzler, W.D.

    1983-05-01

    This report documents the development of a design for a new NRC Operations Center (NRCOC). The project was conducted in two phases: organizational analysis and facility design. In order to control the amount of traffic, congestion and noise within the facility, it is recommended that information flow in the new NRCOC be accomplished by means of an electronic Status Information Management System. Functional requirements and a conceptual design for this system are described. An idealized architectural design and a detailed design program are presented that provide the appropriate amount of space for operations, equipment and circulation within team areas. The overall layout provides controlled access to the facility and, through the use of a zoning concept, provides each team within the NRCOC the appropriate balance of ready access and privacy determined from the organizational analyses conducted during the initial phase of the project.

  9. `Intelligent Design' Poses ContinuedThreat to Science

    NASA Astrophysics Data System (ADS)

    Geissman, John W.

    2006-01-01

    Science education in the United States has been the subject of more than usual attention, especially since 1 August 2005 when President George W. Bush stoked the fire by responding to a reporter's question about the teaching of `intelligent design' (ID) in science classrooms by saying that ``both sides ought to be properly taught. . . so people can understand what the debate is about.'' Prior to the 20 December 2005 ruling against the teaching of ID in public schools, by U.S. District Judge John E. Jones III in the Pennsylvania case Kitzmiller v. Dover Area School District, anti-evolutionists and ID proponents seemed to be enjoying a new momentum in the aftermath of President Bush's statements. William Dembski, senior fellow with the Discovery Institute's Center for the Renewal of Science and Culture in Seattle, Wash., a group that supports intelligent design, wrote on 4 August 2005 at http://www.designinference.com that President Bush ``is to be commended for his courage, wisdom, and foresight'' for supporting the teaching of ID alongside evolution.

  10. F-106 data summary and model results relative to threat criteria and protection design analysis

    NASA Technical Reports Server (NTRS)

    Pitts, F. L.; Finelli, G. B.; Perala, R. A.; Rudolph, T. H.

    1986-01-01

    The NASA F-106 has acquired considerable data on the rates-of-change of electromagnetic parameters on the aircraft surface during 690 direct lightning strikes while penetrating thunderstorms at altitudes ranging from 15,000 to 40,000 feet. These in-situ measurements have provided the basis for the first statistical quantification of the lightning electromagnetic threat to aircrat appropriate for determining lightning indirect effects on aircraft. The data are presently being used in updating previous lightning criteria and standards developed over the years from ground-based measurements. The new lightning standards will, therefore, be the first which reflect actual aircraft responses measured at flight altitudes. The modeling technique developed to interpret and understand the direct strike electromagnetic data acquired on the F-106 provides a means to model the interaction of the lightning channel with the F-106. The reasonable results obtained with the model, compared to measured responses, yield confidence that the model may be credibly applied to other aircraft types and uses in the prediction of internal coupling effects in the design of lightning protection for new aircraft.

  11. A generalized algorithm to design finite field normal basis multipliers

    NASA Technical Reports Server (NTRS)

    Wang, C. C.

    1986-01-01

    Finite field arithmetic logic is central in the implementation of some error-correcting coders and some cryptographic devices. There is a need for good multiplication algorithms which can be easily realized. Massey and Omura recently developed a new multiplication algorithm for finite fields based on a normal basis representation. Using the normal basis representation, the design of the finite field multiplier is simple and regular. The fundamental design of the Massey-Omura multiplier is based on a design of a product function. In this article, a generalized algorithm to locate a normal basis in a field is first presented. Using this normal basis, an algorithm to construct the product function is then developed. This design does not depend on particular characteristics of the generator polynomial of the field.

  12. The Functional Requirements and Design Basis for Information Barriers

    SciTech Connect

    Fuller, James L.

    2012-05-01

    This report summarizes the results of the Information Barrier Working Group workshop held at Sandia National Laboratory in Albuquerque, NM, February 2-4, 1999. This workshop was convened to establish the functional requirements associated with warhead radiation signature information barriers, to identify the major design elements of any such system or approach, and to identify a design basis for each of these major elements. Such information forms the general design basis to be used in designing, fabricating, and evaluating the complete integrated systems developed for specific purposes.

  13. A Simulation Study of Threats to Validity in Quasi-Experimental Designs: Interrelationship between Design, Measurement, and Analysis

    PubMed Central

    Holgado-Tello, Fco. P.; Chacón-Moscoso, Salvador; Sanduvete-Chaves, Susana; Pérez-Gil, José A.

    2016-01-01

    The Campbellian tradition provides a conceptual framework to assess threats to validity. On the other hand, different models of causal analysis have been developed to control estimation biases in different research designs. However, the link between design features, measurement issues, and concrete impact estimation analyses is weak. In order to provide an empirical solution to this problem, we use Structural Equation Modeling (SEM) as a first approximation to operationalize the analytical implications of threats to validity in quasi-experimental designs. Based on the analogies established between the Classical Test Theory (CTT) and causal analysis, we describe an empirical study based on SEM in which range restriction and statistical power have been simulated in two different models: (1) A multistate model in the control condition (pre-test); and (2) A single-trait-multistate model in the control condition (post-test), adding a new mediator latent exogenous (independent) variable that represents a threat to validity. Results show, empirically, how the differences between both the models could be partially or totally attributed to these threats. Therefore, SEM provides a useful tool to analyze the influence of potential threats to validity. PMID:27378991

  14. A Simulation Study of Threats to Validity in Quasi-Experimental Designs: Interrelationship between Design, Measurement, and Analysis.

    PubMed

    Holgado-Tello, Fco P; Chacón-Moscoso, Salvador; Sanduvete-Chaves, Susana; Pérez-Gil, José A

    2016-01-01

    The Campbellian tradition provides a conceptual framework to assess threats to validity. On the other hand, different models of causal analysis have been developed to control estimation biases in different research designs. However, the link between design features, measurement issues, and concrete impact estimation analyses is weak. In order to provide an empirical solution to this problem, we use Structural Equation Modeling (SEM) as a first approximation to operationalize the analytical implications of threats to validity in quasi-experimental designs. Based on the analogies established between the Classical Test Theory (CTT) and causal analysis, we describe an empirical study based on SEM in which range restriction and statistical power have been simulated in two different models: (1) A multistate model in the control condition (pre-test); and (2) A single-trait-multistate model in the control condition (post-test), adding a new mediator latent exogenous (independent) variable that represents a threat to validity. Results show, empirically, how the differences between both the models could be partially or totally attributed to these threats. Therefore, SEM provides a useful tool to analyze the influence of potential threats to validity. PMID:27378991

  15. 10 CFR 72.92 - Design basis external natural events.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Design basis external natural events. 72.92 Section 72.92 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) LICENSING REQUIREMENTS FOR THE INDEPENDENT STORAGE OF SPENT NUCLEAR FUEL, HIGH-LEVEL RADIOACTIVE WASTE, AND REACTOR-RELATED GREATER THAN CLASS C WASTE Siting Evaluation Factors § 72.92 Design...

  16. 14 CFR 121.162 - ETOPS Type Design Approval Basis.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false ETOPS Type Design Approval Basis. 121.162... REQUIREMENTS: DOMESTIC, FLAG, AND SUPPLEMENTAL OPERATIONS Aircraft Requirements § 121.162 ETOPS Type Design... February 17, 2015 and except for a two-engine airplane that, when used in ETOPS, is only used for ETOPS...

  17. A Design Basis for Spacecraft Cabin Trace Contaminant Control

    NASA Technical Reports Server (NTRS)

    Perry, Jay L.

    2009-01-01

    Successful trace chemical contamination control is one of the components necessary for achieving good cabin atmospheric quality. While employing seemingly simple process technologies, sizing the active contamination control equipment must employ a reliable design basis for the trace chemical load in the cabin atmosphere. A simplified design basis that draws on experience gained from the International Space Station program is presented. The trace chemical contamination control design load refines generation source magnitudes and includes key chemical functional groups representing both engineering and toxicology challenges.

  18. Solar Power Tower Design Basis Document, Revision 0

    SciTech Connect

    ZAVOICO,ALEXIS B.

    2001-07-01

    This report contains the design basis for a generic molten-salt solar power tower. A solar power tower uses a field of tracking mirrors (heliostats) that redirect sunlight on to a centrally located receiver mounted on top a tower, which absorbs the concentrated sunlight. Molten nitrate salt, pumped from a tank at ground level, absorbs the sunlight, heating it up to 565 C. The heated salt flows back to ground level into another tank where it is stored, then pumped through a steam generator to produce steam and make electricity. This report establishes a set of criteria upon which the next generation of solar power towers will be designed. The report contains detailed criteria for each of the major systems: Collector System, Receiver System, Thermal Storage System, Steam Generator System, Master Control System, and Electric Heat Tracing System. The Electric Power Generation System and Balance of Plant discussions are limited to interface requirements. This design basis builds on the extensive experience gained from the Solar Two project and includes potential design innovations that will improve reliability and lower technical risk. This design basis document is a living document and contains several areas that require trade-studies and design analysis to fully complete the design basis. Project- and site-specific conditions and requirements will also resolve open To Be Determined issues.

  19. Canister Storage Building (CSB) Design Basis Accident Analysis Documentation

    SciTech Connect

    CROWE, R.D.; PIEPHO, M.G.

    2000-03-23

    This document provided the detailed accident analysis to support HNF-3553, Spent Nuclear Fuel Project Final Safety Analysis Report, Annex A, ''Canister Storage Building Final Safety Analysis Report''. All assumptions, parameters, and models used to provide the analysis of the design basis accidents are documented to support the conclusions in the Canister Storage Building Final Safety Analysis Report.

  20. Canister Storage Building (CSB) Design Basis Accident Analysis Documentation

    SciTech Connect

    CROWE, R.D.

    1999-09-09

    This document provides the detailed accident analysis to support ''HNF-3553, Spent Nuclear Fuel Project Final Safety, Analysis Report, Annex A,'' ''Canister Storage Building Final Safety Analysis Report.'' All assumptions, parameters, and models used to provide the analysis of the design basis accidents are documented to support the conclusions in the Canister Storage Building Final Safety Analysis Report.

  1. Canister storage building design basis accident analysis documentation

    SciTech Connect

    KOPELIC, S.D.

    1999-02-25

    This document provides the detailed accident analysis to support HNF-3553, Spent Nuclear Fuel Project Final Safety Analysis Report, Annex A, ''Canister Storage Building Final Safety Analysis Report.'' All assumptions, parameters, and models used to provide the analysis of the design basis accidents are documented to support the conclusions in the Canister Storage Building Final Safety Analysis Report.

  2. Cold Vacuum Drying (CVD) Facility Design Basis Accident Analysis Documentation

    SciTech Connect

    PIEPHO, M.G.

    1999-10-20

    This document provides the detailed accident analysis to support HNF-3553, Annex B, Spent Nuclear Fuel Project Final Safety Analysis Report, ''Cold Vacuum Drying Facility Final Safety Analysis Report (FSAR).'' All assumptions, parameters and models used to provide the analysis of the design basis accidents are documented to support the conclusions in the FSAR.

  3. Nuclear, biological, and chemical terrorism: understanding the threat and designing responses.

    PubMed

    Simon, J D

    1999-01-01

    Today nuclear, biological, and chemical (NBC) terrorism is a serious issue. The threat of terrorist or rogue states acquiring and using NBC weapons has ushered in a new age of terrorism; an age that is far more dangerous than any previous period. It is an age of terrorism with which no one yet knows how to deal. This article reviews recent trends in terrorism, and identifies groups that have both the potential and the motive to use weapons of mass destruction. In addition, it discusses the design and implemention of effective measures to meet this threat, as well as the role of CISM teams in preparation for, and in the aftermath of, an incident involving NBC weapons. PMID:11227745

  4. Basis for NGNP Reactor Design Down-Selection

    SciTech Connect

    L.E. Demick

    2011-11-01

    The purpose of this paper is to identify the extent of technology development, design and licensing maturity anticipated to be required to credibly identify differences that could make a technical choice practical between the prismatic and pebble bed reactor designs. This paper does not address a business decision based on the economics, business model and resulting business case since these will vary based on the reactor application. The selection of the type of reactor, the module ratings, the number of modules, the configuration of the balance of plant and other design selections will be made on the basis of optimizing the Business Case for the application. These are not decisions that can be made on a generic basis.

  5. Design-Load Basis for LANL Structures, Systems, and Components

    SciTech Connect

    I. Cuesta

    2004-09-01

    This document supports the recommendations in the Los Alamos National Laboratory (LANL) Engineering Standard Manual (ESM), Chapter 5--Structural providing the basis for the loads, analysis procedures, and codes to be used in the ESM. It also provides the justification for eliminating the loads to be considered in design, and evidence that the design basis loads are appropriate and consistent with the graded approach required by the Department of Energy (DOE) Code of Federal Regulation Nuclear Safety Management, 10, Part 830. This document focuses on (1) the primary and secondary natural phenomena hazards listed in DOE-G-420.1-2, Appendix C, (2) additional loads not related to natural phenomena hazards, and (3) the design loads on structures during construction.

  6. Basis for NGNP Reactor Design Down-Selection

    SciTech Connect

    L.E. Demick

    2010-08-01

    The purpose of this paper is to identify the extent of technology development, design and licensing maturity anticipated to be required to credibly identify differences that could make a technical choice practical between the prismatic and pebble bed reactor designs. This paper does not address a business decision based on the economics, business model and resulting business case since these will vary based on the reactor application. The selection of the type of reactor, the module ratings, the number of modules, the configuration of the balance of plant and other design selections will be made on the basis of optimizing the Business Case for the application. These are not decisions that can be made on a generic basis.

  7. AN APPROACH TO SAFETY DESIGN BASIS DOCUMENTATION CHANGE CONTROL

    SciTech Connect

    RYAN GW

    2008-05-15

    This paper describes a safety design basis documentation change control process. The process identifies elements that can be used to manage the project/facility configuration during design evolution through the Initiation, Definition, and Execution project phases. The project phases addressed by the process are defined in US Department of Energy (DOE) Order (O) 413.3A, Program and Project Management for the Acquisition of Capital Assets, in support of DOE project Critical Decisions (CD). This approach has been developed for application to two Hanford Site projects in their early CD phases and is considered to be a key element of safety and design integration. As described in the work that has been performed, the purpose of change control is to maintain consistency among design requirements, the physical configuration, related facility documentation, and the nuclear safety basis during the evolution of the design. The process developed (1) ensures an appropriate level of rigor is applied at each project phase and (2) is considered to implement the requirements and guidance provided in DOE-STD-1189-2008, Integration of Safety into the Design Process. Presentation of this work is expected to benefit others in the DOE Complex that may be implementing DOE-STD-1189-2008 or managing nuclear safety documentation in support of projects in-process.

  8. Advances in the physics basis for the European DEMO design

    NASA Astrophysics Data System (ADS)

    Wenninger, R.; Arbeiter, F.; Aubert, J.; Aho-Mantila, L.; Albanese, R.; Ambrosino, R.; Angioni, C.; Artaud, J.-F.; Bernert, M.; Fable, E.; Fasoli, A.; Federici, G.; Garcia, J.; Giruzzi, G.; Jenko, F.; Maget, P.; Mattei, M.; Maviglia, F.; Poli, E.; Ramogida, G.; Reux, C.; Schneider, M.; Sieglin, B.; Villone, F.; Wischmeier, M.; Zohm, H.

    2015-06-01

    In the European fusion roadmap, ITER is followed by a demonstration fusion power reactor (DEMO), for which a conceptual design is under development. This paper reports the first results of a coherent effort to develop the relevant physics knowledge for that (DEMO Physics Basis), carried out by European experts. The program currently includes investigations in the areas of scenario modeling, transport, MHD, heating & current drive, fast particles, plasma wall interaction and disruptions.

  9. A parametric design of ceramic faced composite armor subject to air weapon threats

    NASA Astrophysics Data System (ADS)

    Guo, Y. N.; Sun, Q.

    2015-12-01

    By taking into consideration the two categories of military projectile threats to aircraft structures, an optimal layer configuration of ceramic faced composite armor was designed in this paper. Using numerical simulations and the same layer arrangement of ceramic, UHMWPE, and carbon fiber laminates, a parametric finite element model using LS-DYNA code was built. Several thickness combinations were analyzed in order to determine the final lightest configuration that is capable of supporting a high-speed impact load and HEI blast wave load, which implements a high anti-penetration design for aircraft armor. This configuration can be used to improve the anti-impact ability of aircraft structures as well as achieve a structure/function integration design that considers a lighter weight.

  10. Archaeological data as a basis for repository marker design

    SciTech Connect

    Kaplan, M.F.

    1982-10-01

    This report concerns the development of a marking system for a nuclear waste repository which is very likely to survive for 10,000 years. In order to provide a background on the subject, and for the preliminary design presented in this report, a discussion is presented about the issues involved in human interference with the repository system and the communication of information. A separate chapter summarizes six ancient man-made monuments including: materials, effects of associated textual information on our understanding of the monument, and other features of the ancient monument relevant to marking a repository site. The information presented in the two chapters is used to provide the basis and rationale for a preliminary marker system design presented in a final chapter. 86 refs., 22 figs., 1 tab.

  11. Cold Vacuum Drying facility design basis accident analysis documentation

    SciTech Connect

    CROWE, R.D.

    2000-08-08

    This document provides the detailed accident analysis to support HNF-3553, Annex B, Spent Nuclear Fuel Project Final Safety Analysis Report (FSAR), ''Cold Vacuum Drying Facility Final Safety Analysis Report.'' All assumptions, parameters, and models used to provide the analysis of the design basis accidents are documented to support the conclusions in the FSAR. The calculations in this document address the design basis accidents (DBAs) selected for analysis in HNF-3553, ''Spent Nuclear Fuel Project Final Safety Analysis Report'', Annex B, ''Cold Vacuum Drying Facility Final Safety Analysis Report.'' The objective is to determine the quantity of radioactive particulate available for release at any point during processing at the Cold Vacuum Drying Facility (CVDF) and to use that quantity to determine the amount of radioactive material released during the DBAs. The radioactive material released is used to determine dose consequences to receptors at four locations, and the dose consequences are compared with the appropriate evaluation guidelines and release limits to ascertain the need for preventive and mitigative controls.

  12. Reducing Threats to Validity by Design in a Nonrandomized Experiment of a School-Wide Prevention Model

    ERIC Educational Resources Information Center

    Sørlie, Mari-Anne; Ogden, Terje

    2014-01-01

    This paper reviews literature on the rationale, challenges, and recommendations for choosing a nonequivalent comparison (NEC) group design when evaluating intervention effects. After reviewing frequently addressed threats to validity, the paper describes recommendations for strengthening the research design and how the recommendations were…

  13. Quicklist: The basis for a computer aided logic design system

    NASA Technical Reports Server (NTRS)

    Lushbaugh, W. A.

    1980-01-01

    Quicklist, a preprocessor for an existing wire list program that cuts the description of the wire list by about 67 percent over previous methods, is described. Quicklist uses two different methods to shorten the input data. The first of these is the use of parentheses to allow a compact way of describing signal names which increment (or decrement) by one, i.e., typical signal names in a bus. The other method used is the equal sign. Using this symbol in a signal list says that the rest of the signals on that chip are the same as those on the previous chip described. Quicklist is intended to be the basis of a computer aided logic design system.

  14. MOV motor and gearbox performance under design basis loads

    SciTech Connect

    DeWall, K.G.; Watkins, J.C.; Weidenhamer, G.H.

    1998-06-01

    This paper describes the results of valve testing sponsored by the US Nuclear Regulatory Commission, Office of Nuclear Regulatory Research and conducted at the Idaho National Engineering and Environmental Laboratory. The research objective was to evaluate the capabilities of specific actuator motor and gearbox assemblies under various design basis loading conditions. The testing was performed using the motor-operated valve load simulator, a test fixture that simulates the stem load profiles a valve actuator would experience when closing a valve against flow and pressure loadings. The authors tested five typical motors (four ac motors and one dc motor) with three gearbox assemblies at conditions a motor might experience in a power plant, including such off-normal conditions as operation at high temperature and reduced voltage. The authors also determined the efficiency of the actuator gearbox. The testing produced the following significant results: all five motors operated at or above their rated torque during tests at full voltage and ambient temperature; for all five motors (dc as well as ac), the actual torque loss due to voltage degradation was greater than the torque loss predicted using common methods; startup torques in locked rotor tests compared well with stall torques in dynamometer-type tests; the methods commonly used to predict torque losses due to elevated operating temperatures sometimes bounded the actual losses, but not in all cases; the greatest discrepancy involved the prediction for the dc motor; running efficiencies published by the manufacturer for actuator gearboxes were higher than the actual efficiencies determined from testing, in some instances, the published pullout efficiencies were also higher than the actual values; operation of the gearbox at elevated temperature did not affect the operating efficiency.

  15. Algorithm To Design Finite-Field Normal-Basis Multipliers

    NASA Technical Reports Server (NTRS)

    Wang, Charles C.

    1988-01-01

    Way found to exploit Massey-Omura multiplication algorithm. Generalized algorithm locates normal basis in Galois filed GF(2m) and enables development of another algorithm to construct product function.

  16. Systems thinking as the basis for an ecological design education

    SciTech Connect

    DeKay, M.

    1996-10-01

    Design education is built on a combination of historical models that have little to do with ecological design or contemporary understandings of whole systems. In order to educate designers for ecologically and socially responsible practice, design schools will need to be radically redesigned in their structure, content, and methods. This paper uses a model from the natural sciences, Systems Theory, as a potential model for a foundational framework of design education. Basic tenets of systems thinking are outlined, along with principles of ecosystem function and organization. A series of fifteen suggested shifts in design education, eight as implications of ecosystem principles and seven derived from principles of ecosystem organization, are proposed.

  17. 76 FR 63541 - Design-Basis Hurricane and Hurricane Missiles for Nuclear Power Plants

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-13

    ... COMMISSION 10 CFR Parts 50 and 52 Design-Basis Hurricane and Hurricane Missiles for Nuclear Power Plants... Hurricane and Hurricane Missiles for Nuclear Power Plants.'' This regulatory guide provides licensees and...- basis hurricane and design-basis hurricane-generated missiles that a nuclear power plant should...

  18. Towards a Basis for Designing Backwater and Side Channel Restorations

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Design criteria for river channel restoration is becoming highly developed with several handbooks and guidance documents available, despite notable differences among various schools of thought. Basic principles of stable channel design and riverine habitat simulation undergird channel reconstructio...

  19. Semiotics as a Basis for Educational Software Design.

    ERIC Educational Resources Information Center

    Oliveira, Osvaldo Luiz de; Baranauskas, Maria Cecilia Calani

    2000-01-01

    Presents a group of semiotic principles for software design and uses them to show how they explain different educational possibilities. Discusses interface design and describes Theater in the Computer, a software environment for children, to illustrate semiotic-based principle of interface design. (Author/LRW)

  20. A concise colorimetric and fluorimetric probe for sarin related threats designed via the "covalent-assembly" approach.

    PubMed

    Lei, Zuhai; Yang, Youjun

    2014-05-01

    A turn-on signal from zero background allows sensitive detection of a weak signal and is highly desired. The "covalent-assembly" probe design principle is powerful in this regard. Herein, we report an embodiment of this principle (NA570) for detection of Sarin related threats, based on a phenylogous Vilsmeier-Haack reaction. NA570 bears a concise molecular construct, exhibits a colorimetric and a fluorimetric signal, and has potential for real applications. PMID:24766398

  1. Implications of the high-power microwave weapon threat in electronic system design

    NASA Astrophysics Data System (ADS)

    van Keuren, E.; Knighten, J.

    The current status of high-power microwave (HPM) weapon is discussed with particular attention given to threats, sources, and possible protective techniques. Due to the GHz band frequencies involved, HPM is capable of penetrating not only radio front ends, but also the most minute shielding penetrations throughout the equipment.

  2. CIF---Design basis for an integrated incineration facility

    SciTech Connect

    Bennett, G.F.

    1991-12-31

    This paper discusses the evolution of chosen technologies that occurred during the design process of the US Department of Energy (DOE) incineration system designated the Consolidated Incineration Facility (CIF) as the Savannah River Plant, Aiken, South Carolina. The Plant is operated for DOE by the Westinghouse Savannah River Company. The purpose of the incineration system is to treat low level radioactive and/or hazardous liquid and solid wastes by combustion. The objective for the facility is to thermally destroy toxic constituents and volume reduce waste material. Design criteria requires operation be controlled within the limits of RCRA`s permit envelope.

  3. CIF---Design basis for an integrated incineration facility

    SciTech Connect

    Bennett, G.F.

    1991-01-01

    This paper discusses the evolution of chosen technologies that occurred during the design process of the US Department of Energy (DOE) incineration system designated the Consolidated Incineration Facility (CIF) as the Savannah River Plant, Aiken, South Carolina. The Plant is operated for DOE by the Westinghouse Savannah River Company. The purpose of the incineration system is to treat low level radioactive and/or hazardous liquid and solid wastes by combustion. The objective for the facility is to thermally destroy toxic constituents and volume reduce waste material. Design criteria requires operation be controlled within the limits of RCRA's permit envelope.

  4. Designing community surveys to provide a basis for noise policy

    NASA Technical Reports Server (NTRS)

    Fields, J. M.

    1980-01-01

    After examining reports from a large number of social surveys, two areas were identified where methodological improvements in the surveys would be especially useful for public policy. The two study areas are: the definition of noise indexes and the assessment of noise impact. Improvements in the designs of surveys are recommended which would increase the validity and reliability of the noise indexes. Changes in interview questions and sample designs are proposed which would enable surveys to provide measures of noise impact which are directly relevant for public policy.

  5. Dialogue as a Basis for the Design of Environmental Pedagogies

    ERIC Educational Resources Information Center

    De Andrade, Daniel Fonseca; Sorrentino, Marcos

    2014-01-01

    Colonizing processes take many forms. Although they are generally related to the use of force, they may also happen through subtler means such as education, and subconsciously, whenever educational proposals are designed to suit a wide variety of contexts. This essay suggests that environmental pedagogies should be based on a dialogical mindset…

  6. A BASIS FOR MODIFYING THE TANK 12 COMPOSITE SAMPLING DESIGN

    SciTech Connect

    Shine, G.

    2014-11-25

    The SRR sampling campaign to obtain residual solids material from the Savannah River Site (SRS) Tank Farm Tank 12 primary vessel resulted in obtaining appreciable material in all 6 planned source samples from the mound strata but only in 5 of the 6 planned source samples from the floor stratum. Consequently, the design of the compositing scheme presented in the Tank 12 Sampling and Analysis Plan, Pavletich (2014a), must be revised. Analytical Development of SRNL statistically evaluated the sampling uncertainty associated with using various compositing arrays and splitting one or more samples for compositing. The variance of the simple mean of composite sample concentrations is a reasonable standard to investigate the impact of the following sampling options. Composite Sample Design Option (a). Assign only 1 source sample from the floor stratum and 1 source sample from each of the mound strata to each of the composite samples. Each source sample contributes material to only 1 composite sample. Two source samples from the floor stratum would not be used. Composite Sample Design Option (b). Assign 2 source samples from the floor stratum and 1 source sample from each of the mound strata to each composite sample. This infers that one source sample from the floor must be used twice, with 2 composite samples sharing material from this particular source sample. All five source samples from the floor would be used. Composite Sample Design Option (c). Assign 3 source samples from the floor stratum and 1 source sample from each of the mound strata to each composite sample. This infers that several of the source samples from the floor stratum must be assigned to more than one composite sample. All 5 source samples from the floor would be used. Using fewer than 12 source samples will increase the sampling variability over that of the Basic Composite Sample Design, Pavletich (2013). Considering the impact to the variance of the simple mean of the composite sample concentrations

  7. Biological Threats

    MedlinePlus

    ... Thunderstorms & Lightning Tornadoes Tsunamis Volcanoes Wildfires Main Content Biological Threats Biological agents are organisms or toxins that ... Centers for Disease Control and Prevention . Before a Biological Threat Unlike an explosion, a biological attack may ...

  8. 40 CFR 228.15 - Dumping sites designated on a final basis.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 25 2014-07-01 2014-07-01 false Dumping sites designated on a final basis. 228.15 Section 228.15 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) OCEAN DUMPING CRITERIA FOR THE MANAGEMENT OF DISPOSAL SITES FOR OCEAN DUMPING § 228.15 Dumping sites designated on a final basis. (a)(1) The...

  9. 40 CFR 228.15 - Dumping sites designated on a final basis.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 26 2013-07-01 2013-07-01 false Dumping sites designated on a final basis. 228.15 Section 228.15 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) OCEAN DUMPING CRITERIA FOR THE MANAGEMENT OF DISPOSAL SITES FOR OCEAN DUMPING § 228.15 Dumping sites designated on a final basis. (a)(1) The...

  10. 40 CFR 228.15 - Dumping sites designated on a final basis.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false Dumping sites designated on a final basis. 228.15 Section 228.15 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) OCEAN DUMPING CRITERIA FOR THE MANAGEMENT OF DISPOSAL SITES FOR OCEAN DUMPING § 228.15 Dumping sites designated on a final basis. (a)(1) The...

  11. Laser design basis for the National Ignition Facility

    SciTech Connect

    Hunt, J.T.; Manes, K.R.; Murray, J.R.; Renard, P.A.; Sawicki, R.; Trenholme, J.B.; Williams, W.

    1994-06-01

    Controlled nuclear fusion initiated by highly intense laser beams has been the subject of experiment for many years. The National Ignition Facility (NIF) represents the culmination of design efforts to provide a laser facility that will successfully demonstrate fusion ignition in the laboratory. In this so-called inertial confinement approach, energetic driver beams (laser, X-ray, or charged particle) heat the outer surface of a spherical capsule containing deuterium and tritium (DT) fuel. As the capsule surface explosively evaporates, reaction pressure compresses the DT fuel causing the central core of the fuel to reach extreme density and temperature. When the central temperature is high enough, DT fusion reactions occur. The energy released from these reactions further heats the compressed fuel, and fusion burn propagates outward through the colder regions of the capsule much more rapidly than the inertially confined capsule can expand. The resulting fusion reactions yield many times more energy than was absorbed from the driver beams.

  12. Breckinridge Project, initial effort. Report II. Breckinridge Project design basis

    SciTech Connect

    1982-01-01

    The Breckinridge Project is a pioneer endeavor involving the engineering, construction, and operation of a commercial facility that will convert 23,000 tons per day of run-of-mine, high-sulfur coal into 50,000 barrels per day of liquid hydrocarbons equivalent to those produced from crude oil. The Initial Effort, now complete, was executed under Cooperative Agreement No. DE-FC05-80OR20717 between the Department of Energy and the Participants, Ashland Synthetic Fuels, Inc., and Airco Energy Company, Inc. The Initial Effort produced a preliminary design, capital estimate, and economic analysis of the commercial plant, as well as a plan for the design, construction, and operation of that plant. The extensive and rigorous attention given to environmental, socioeconomic, safety, and health considerations is indicative of the high priority these issues will continue to receive throughout the life of the project. The Breckinridge Energy Company, a partnership of several major corporations, is being formed to finance, own, and manage the Breckinridge Project. Report II is intended for the reader who is primarily interested in less detailed discussion of the coal liquefaction process and Breckinridge facility than presented in the eleven volumes of Reports IV and V. The overview section describes the project goals and briefly introduces the coal liquefaction process. The report continues with a discussion of the history of the project and the H-COAL process from its concept to the proposed commercialization technology. The report describes the site, the Breckinridge Facility, and concludes with a summary of the eleven reports that contain the deliverable documentation of the Initial Effort or Development Phase of the project.

  13. Structural design and analysis of a mixer pump for beyond-design- basis load

    SciTech Connect

    Rezvani, M.A.; Strehlow, J.P.; Baliga, R.; Kok, S.B.

    1994-03-01

    This paper presents the results of the structural evaluation of a mixer pump for a postulated drop accident. The mixer pump will be installed in a double-shell tank at the Hanford Site, near Richland, Washington. This tank has a 1,000,000-gallon (3,785,000 liter) capacity and is used to store radioactive waste before final disposal. The beyond-design-basis load case presented here is a postmulated drop of the pump during installation or removal. It is assumed that the pump assembly might be dropped approximateely 140 ft (15 m) from a height at which the bottom of the pump assembly is slightly above the top of the access riser to the bottom of the tank. The acceptance criterion for this load case is that the pump assembly shall not penetrate the primary tank liner. To ensure the integrity of the liner, the kinetic energy (developed in the pump drop) must be absorbed by some means to limit the impact force on the tank dome and thereby keep the pump from contacting the bottom of the tank. The limited clearance near the mounting assembly warranted an innovative two-step design of the energy absorbing system to limit the impact force on the tank dome to an acceptable value. This innovative design incorporates two energy absorbers in a unique series arrangement, one with the pump assembly and tile other in the pump pit.

  14. An algorithm to design finite field multipliers using a self-dual normal basis

    NASA Technical Reports Server (NTRS)

    Wang, Charles C.

    1989-01-01

    The concept of using a self-dual normal basis to design the Massey-Omura finite-field multiplier is presented. An algorithm is given to locate a self-dual normal basis for GF(2m) for odd m. A method to construct the product function for designing the Massey-Omura multiplier is developed. It is shown that the construction of the product function based on a self-dual basis is simpler than that based on an arbitrary normal basis.

  15. Drain Tank Information for Developing Design Basis of the Preliminary Design

    SciTech Connect

    Ferrada, Juan J

    2012-02-01

    Tokamak Cooling Water System (TCWS) drain tanks (DTs) serve two functions: normal operation and safety operation. Normal DTs are used for regular maintenance operations when draining is necessary. Safety DTs are used to receive the water leaked into the Vacuum Vessel (VV) after an in-vessel loss of coolant accident (LOCA) event. The preliminary design of the DTs shall be based on the information provided by this document. The capacity of the normal DTs is estimated based on the internal volume of in-vessel components [e.g., First Wall/Blanket (FW/BLK) and Divertor (DIV)]; Neutral Beam Injector (NBI) components; and TCWS piping, heat exchangers, electric heaters, pump casing, pressurizers, and valves. Water volumes have been updated based on 2004-design information, changes adopted because of approved Project Change Requests (PCRs), and data verification by US ITER and AREVA Federal Services, the US ITER A and E Company. Two tanks will store water from normal draining operations of the FW/BLK and DIV Primary Heat Transfer Systems (PHTSs). One tank will store water from normal draining operations of the NBI PHTS. The capacity of the safety DTs is based on analysis of a design basis accident: a large leak from in-vessel components. There are two safety DTs that will receive water from a VV LOCA event and drainage from the VV, as needed. In addition, there is one sump tank for the DIV that will be used for collecting drain water from the draining and drying processes and specifically for draining the DIV system as the DIV cassette lines are at a lower elevation than the DT connection point. Information documented in this report must be refined and verified during the preliminary design of the DTs, and there are several aspects to be considered to complete the preliminary design. Input to these design considerations is discussed in this report and includes, but is not limited to, water inventory; operating procedures/maintenance; Failure Modes and Effects Analysis (FMEA

  16. Drain Tank Information for Developing Design Basis of the Preliminary Design - R00

    SciTech Connect

    Ferrada, Juan J

    2011-01-01

    Tokamak Cooling Water System (TCWS) drain tanks (DTs) serve two functions: normal operation and safety operation. Normal DTs are used for regular maintenance operations when draining is necessary. Safety DTs are used to receive the water leaked into the Vacuum Vessel (VV) after an in-vessel loss of cooling accident (LOCA) event. The preliminary design of the DTs shall be based on the information provided by this document. The capacity of the normal DTs is estimated based on the internal volume of in-vessel components [e.g., First Wall/Blanket (FW/BLK) and Divertor (DIV)], Neutral Beam Injector (NBI) components, and TCWS piping, heat exchangers, electric heaters, pump casing, pressurizers, and valves. Water volumes have been updated based on 2004 design information, changes adopted because of approved Project Change Requests (PCRs), and data verification by U.S. ITER. Two tanks will store water from normal draining operations of the FW/BLK and DIV Primary Heat Transfer Systems (PHTSs). One tank will store water from normal draining operations of the NBI PHTS. The capacity of the safety DTs is based on analysis of a design-basis accident:1 a large leak from in-vessel components. There are two safety DTs that will receive water from a VV LOCA event and drainage from the VV, as needed. In addition, there is one sump tank for the DIV that will be used for collecting drain water from the draining and drying processes and specifically for draining the DIV system as the DIV cassettes lines are at a lower elevation than the DT connection point. Information documented in this report must be refined and verified during the preliminary design of the DTs, and there are several aspects to be considered to complete the preliminary design. Input to these design considerations is discussed in this report and includes, but is not limited to, water inventory; operating procedures/maintenance; Failure Modes and Effects Analysis (FMEA); tank layout anddimensions, including design

  17. A mathematical basis for the design and design optimization of adaptive trusses in precision control

    NASA Technical Reports Server (NTRS)

    Das, S. K.; Utku, S.; Chen, G.-S.; Wada, B. K.

    1991-01-01

    A mathematical basis for the optimal design of adaptive trusses to be used in supporting precision equipment is provided. The general theory of adaptive structures is introduced, and the global optimization problem of placing a limited number, q, of actuators, so as to maximally achieve precision control and provide prestress, is stated. Two serialized optimization problems, namely, optimal actuator placement for prestress and optimal actuator placement for precision control, are addressed. In the case of prestressing, the computation of a 'desired' prestress is discussed, the interaction between actuators and redundants in conveying the prestress is shown in its mathematical form, and a methodology for arriving at the optimal placement of actuators and additional redundants is discussed. With regard to precision control, an optimal placement scheme (for q actuators) for maximum 'authority' over the precision points is suggested. The results of the two serialized optimization problems are combined to give a suboptimal solution to the global optimization problem. A method for improving this suboptimal actuator placement scheme by iteration is presented.

  18. The Mixed Waste Management Facility. Design basis integrated operations plan (Title I design)

    SciTech Connect

    1994-12-01

    The Mixed Waste Management Facility (MWMF) will be a fully integrated, pilotscale facility for the demonstration of low-level, organic-matrix mixed waste treatment technologies. It will provide the bridge from bench-scale demonstrated technologies to the deployment and operation of full-scale treatment facilities. The MWMF is a key element in reducing the risk in deployment of effective and environmentally acceptable treatment processes for organic mixed-waste streams. The MWMF will provide the engineering test data, formal evaluation, and operating experience that will be required for these demonstration systems to become accepted by EPA and deployable in waste treatment facilities. The deployment will also demonstrate how to approach the permitting process with the regulatory agencies and how to operate and maintain the processes in a safe manner. This document describes, at a high level, how the facility will be designed and operated to achieve this mission. It frequently refers the reader to additional documentation that provides more detail in specific areas. Effective evaluation of a technology consists of a variety of informal and formal demonstrations involving individual technology systems or subsystems, integrated technology system combinations, or complete integrated treatment trains. Informal demonstrations will typically be used to gather general operating information and to establish a basis for development of formal demonstration plans. Formal demonstrations consist of a specific series of tests that are used to rigorously demonstrate the operation or performance of a specific system configuration.

  19. Stereotype Threat.

    PubMed

    Spencer, Steven J; Logel, Christine; Davies, Paul G

    2016-01-01

    When members of a stigmatized group find themselves in a situation where negative stereotypes provide a possible framework for interpreting their behavior, the risk of being judged in light of those stereotypes can elicit a disruptive state that undermines performance and aspirations in that domain. This situational predicament, termed stereotype threat, continues to be an intensely debated and researched topic in educational, social, and organizational psychology. In this review, we explore the various sources of stereotype threat, the mechanisms underlying stereotype-threat effects (both mediators and moderators), and the consequences of this situational predicament, as well as the means through which society and stigmatized individuals can overcome the insidious effects of stereotype threat. Ultimately, we hope this review alleviates some of the confusion surrounding stereotype threat while also sparking further research and debate. PMID:26361054

  20. Experience with the development of design basis documents at the South Texas Project

    SciTech Connect

    Rosen, S.L.; Ashton, D.H.

    1989-01-01

    To meet the demands of safety system functional inspections (SSFIs) and effectively maintain the design basis of operating nuclear units, the utility industry is seeing the benefits of consolidating design basis information by developing plant-specific design basis documents (DBDs). As part of the overall Configuration Management Program at the South Texas Project (STP), the authors have a particular interest in developing DBDs since Houston Lighting Power Company (HL P) assumed design control of STP, which consists of two four-loop Westinghouse 1250-MW(electric) units with unique design features such as three trains of engineered safety features. The HL P DBD program is the culmination of detailed reviews of other utility programs and careful evaluation of the needs and intended uses of DBDs. The purpose of this paper is to describe the major attributes of our DBD program and discuss the factors considered and decisions made in developing and implementing a program of this magnitude and importance.

  1. Safeguards and security by design (SSBD) for the domestic threat - theft and sabotage

    SciTech Connect

    Demuth, Scott F; Mullen, Mark

    2011-10-05

    Safeguards by Design (SBD) is receiving significant interest with respect to international safeguards objectives. However, less attention has been focused on the equally important topic of domestic Safeguards and Security by Design (SSBD), which addresses requirements such as those of the Nuclear Regulatory Commission (NRC) in the United States. While international safeguards are concerned with detecting State diversion of nuclear material from peaceful to nuclear explosives purposes, domestic Material Protection, Control and Accounting measures (MPC&A) are focused on non-State theft and sabotage. The International Atomic Energy Agency (IAEA) has described the Safeguards by Design (SBD) concept as an approach in which 'international safeguards are fully integrated into the design process of a new nuclear facility from the initial planning through design, construction, operation, and decommissioning.' This same concept is equally applicable to SSBD for domestic requirements. The United States Department of Energy (DOE) has initiated a project through its Office of Nuclear Energy (NE) and more specifically its Fuel Cycle Research and Development (FCRD) program, to develop a domestic SSBD discipline and methodology in parallel with similar efforts sponsored by the DOE Next Generation Safeguards Initiative (NGSI) and the IAEA for international safeguards. This activity includes the participation of industry (through DOE-sponsored contracts) and DOE National Laboratories. This paper will identify the key domestic safeguards and security requirements (i.e. MC&A and physical protection) and explain how and why Safeguards and Security by Design (SSBD) is important and beneficial for the design of future US nuclear energy systems.

  2. 10 CFR 72.94 - Design basis external man-induced events.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Design basis external man-induced events. 72.94 Section 72.94 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) LICENSING REQUIREMENTS FOR THE INDEPENDENT STORAGE OF SPENT NUCLEAR FUEL, HIGH-LEVEL RADIOACTIVE WASTE, AND REACTOR-RELATED GREATER THAN CLASS C WASTE Siting Evaluation Factors § 72.94 Design...

  3. 10 CFR 72.94 - Design basis external man-induced events.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Design basis external man-induced events. 72.94 Section 72.94 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) LICENSING REQUIREMENTS FOR THE INDEPENDENT STORAGE OF SPENT NUCLEAR FUEL, HIGH-LEVEL RADIOACTIVE WASTE, AND REACTOR-RELATED GREATER THAN CLASS C WASTE Siting Evaluation Factors § 72.94 Design...

  4. 10 CFR 72.94 - Design basis external man-induced events.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Design basis external man-induced events. 72.94 Section 72.94 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) LICENSING REQUIREMENTS FOR THE INDEPENDENT STORAGE OF SPENT NUCLEAR FUEL, HIGH-LEVEL RADIOACTIVE WASTE, AND REACTOR-RELATED GREATER THAN CLASS C WASTE Siting Evaluation Factors § 72.94 Design...

  5. 10 CFR 72.94 - Design basis external man-induced events.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Design basis external man-induced events. 72.94 Section 72.94 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) LICENSING REQUIREMENTS FOR THE INDEPENDENT STORAGE OF SPENT NUCLEAR FUEL, HIGH-LEVEL RADIOACTIVE WASTE, AND REACTOR-RELATED GREATER THAN CLASS C WASTE Siting Evaluation Factors § 72.94 Design...

  6. 10 CFR 72.94 - Design basis external man-induced events.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Design basis external man-induced events. 72.94 Section 72.94 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) LICENSING REQUIREMENTS FOR THE INDEPENDENT STORAGE OF SPENT NUCLEAR FUEL, HIGH-LEVEL RADIOACTIVE WASTE, AND REACTOR-RELATED GREATER THAN CLASS C WASTE Siting Evaluation Factors § 72.94 Design...

  7. An algorithm to design finite field multipliers using a self-dual normal basis

    NASA Technical Reports Server (NTRS)

    Wang, C. C.

    1987-01-01

    Finite field multiplication is central in the implementation of some error-correcting coders. Massey and Omura have presented a revolutionary design for multiplication in a finite field. In their design, a normal base is utilized to represent the elements of the field. The concept of using a self-dual normal basis to design the Massey-Omura finite field multiplier is presented. Presented first is an algorithm to locate a self-dual normal basis for GF(2 sup m) for odd m. Then a method to construct the product function for designing the Massey-Omura multiplier is developed. It is shown that the construction of the product function base on a self-dual basis is simpler than that based on an arbitrary normal base.

  8. Design, Development, and Innovation of an Interactive Multimedia Training Simulator for Responding to Air Transportation Bomb Threats

    NASA Technical Reports Server (NTRS)

    Chung, Christopher A.; Marwaha, Shweta

    2005-01-01

    This paper describes an interactive multimedia simulator for air transportation bomb threat training. The objective of this project is to improve the air transportation sector s capability to respond to bomb threats received by commercial airports and aircraft. The simulator provides realistic training on receiving and responding to a variety of bomb threats that might not otherwise be possible due to time, cost, or operational constraints. Validation analysis indicates that the use of the simulator resulted in statistically significant increases in individual ability to respond to these types of bomb threats.

  9. 77 FR 64564 - Implementation of Regulatory Guide 1.221 on Design-Basis Hurricane and Hurricane Missiles

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-22

    ... COMMISSION Implementation of Regulatory Guide 1.221 on Design-Basis Hurricane and Hurricane Missiles AGENCY....221 on Design-Basis Hurricane and Hurricane Missiles.'' The purpose of this ISG is to supplement the guidance regarding the application of Regulatory Guide 1.221, ``Design-Basis Hurricane and...

  10. [Physiological basis of human mechanics and its application in the design of pressure suit].

    PubMed

    Jia, S G; Chen, J S

    1999-12-01

    Objective. To discuss the necessity that human mechanics and its physiological basis as applied to the research of human motion in many areas. Method. The motion performance of two aerospace [correction of areospace] pressure suit were studied. Human mechanics and its physiological basis was applied in the design of one suit only. Result. The result showed that good performance was obtained with the suit designed according to this principle which the stipulated actions couldn't be well performanced when wearing the suit not so designed. Conclusion. The research of the application of human mechanics and its physiological basis is necessary and it has better reality and is more scientific than applying biomechanics and robotics. PMID:12434811

  11. Design-Basis Flood Estimation for Site Characterization at Nuclear Power Plants in the United States of America

    SciTech Connect

    Prasad, Rajiv; Hibler, Lyle F.; Coleman, Andre M.; Ward, Duane L.

    2011-11-01

    The purpose of this document is to describe approaches and methods for estimation of the design-basis flood at nuclear power plant sites. Chapter 1 defines the design-basis flood and lists the U.S. Nuclear Regulatory Commission's (NRC) regulations that require estimation of the design-basis flood. For comparison, the design-basis flood estimation methods used by other Federal agencies are also described. A brief discussion of the recommendations of the International Atomic Energy Agency for estimation of the design-basis floods in its member States is also included.

  12. Design considerations and performance characteristics of AirSentinel: a new UV-LIF bio-aerosol threat detection trigger

    NASA Astrophysics Data System (ADS)

    DeFreez, Richard; Merrill, Ezra; Albanna, Sam; Davis, Bert; Call, Charles

    2005-10-01

    AirSentinel® is a new low cost, compact ultraviolet-based light induced fluorescence (UV-LIF) bio-aerosol threat detection trigger. Earlier UV-LIF triggers, for example, FLAPS, BARTS, BAWS, Bioni, and BioLert, have used UV laser sources to induce fluorescence of biological aerosols. Two recent developments from the DARPA MTO SUVOS program, BAST and TAC-BIO, use UV LEDs for the same purpose, thereby broadening the term UV-LIF to mean laser or LED induced autofluorescence. All of these earlier triggers interrogate aerosols on a particle-by-particle basis on- the-fly. The major trade-off for these instruments is cost, size, and complexity versus counting efficiency (probability of detection) with the lower size end of the respirable range being most difficult to detect. AirSentinel® employs a different approach to UV-LIF detection: aerosol concentration by collection on a surface, surface interrogation, and surface rejuvenation prior to repeated concentration and interrogation cycles. Aerosol particle concentration via impaction on a surface addresses the issue of small particle counting efficiency since the fluorescence from the sum of the particles is the sum of the fluorescence signals from the collected particles, typically hundreds or thousands in number. Surface interrogation for a LIF signal is accomplished by illumination with a 280 nm and/or a 365 nm LED. As expected, test results show better relative detection performance using 280 nm excitation LEDs for bio-toxin simulants and somewhat better performance at 365 nm for standard Bacillus globigii spore targets. AirSentinel® beta technology is currently in long term testing in a number of public and other government buildings.

  13. Reconfigurable Flight Control Design using a Robust Servo LQR and Radial Basis Function Neural Networks

    NASA Technical Reports Server (NTRS)

    Burken, John J.

    2005-01-01

    This viewgraph presentation reviews the use of a Robust Servo Linear Quadratic Regulator (LQR) and a Radial Basis Function (RBF) Neural Network in reconfigurable flight control designs in adaptation to a aircraft part failure. The method uses a robust LQR servomechanism design with model Reference adaptive control, and RBF neural networks. During the failure the LQR servomechanism behaved well, and using the neural networks improved the tracking.

  14. The power of simplification: Operator interface with the AP1000{sup R} during design-basis and beyond design-basis events

    SciTech Connect

    Williams, M. G.; Mouser, M. R.; Simon, J. B.

    2012-07-01

    The AP1000{sup R} plant is an 1100-MWe pressurized water reactor with passive safety features and extensive plant simplifications that enhance construction, operation, maintenance, safety and cost. The passive safety features are designed to function without safety-grade support systems such as component cooling water, service water, compressed air or HVAC. The AP1000 passive safety features achieve and maintain safe shutdown in case of a design-basis accident for 72 hours without need for operator action, meeting the expectations provided in the European Utility Requirements and the Utility Requirement Document for passive plants. Limited operator actions may be required to maintain safe conditions in the spent fuel pool (SFP) via passive means. This safety approach therefore minimizes the reliance on operator action for accident mitigation, and this paper examines the operator interaction with the Human-System Interface (HSI) as the severity of an accident increases from an anticipated transient to a design basis accident and finally, to a beyond-design-basis event. The AP1000 Control Room design provides an extremely effective environment for addressing the first 72 hours of design-basis events and transients, providing ease of information dissemination and minimal reliance upon operator actions. Symptom-based procedures including Emergency Operating Procedures (EOPs), Abnormal Operating Procedures (AOPs) and Alarm Response Procedures (ARPs) are used to mitigate design basis transients and accidents. Use of the Computerized Procedure System (CPS) aids the operators during mitigation of the event. The CPS provides cues and direction to the operators as the event progresses. If the event becomes progressively worse or lasts longer than 72 hours, and depending upon the nature of failures that may have occurred, minimal operator actions may be required outside of the control room in areas that have been designed to be accessible using components that have been

  15. An Inventory Designed To Measure the Impact of the Threat of Nuclear War on Adolescents: Dimensions of Fear, Futurelessness, and Powerlessness.

    ERIC Educational Resources Information Center

    Hanley, C. Patricia; Christie, Daniel J.

    This document reports on the history of social and behavioral research studies concerning nuclear war since 1945, highlighting those studies that focused on adolescents and their feelings of fear, hopelessness, powerlessness, and denial. A study, designed to assess the reactions of adolescents in grades six to eight to the threat of nuclear war is…

  16. 76 FR 50275 - Guidance for the Assessment of Beyond-Design-Basis Aircraft Impacts

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-12

    ... on July 10, 2009 (74 FR 33282), for a 60-day public comment period. The public comment period closed... Commission) is issuing a new guide regulatory guide, (RG) 1.217, ``Guidance for the Assessment of Beyond-Design-Basis Aircraft Impacts.'' This guide describes a method that the staff of NRC considers...

  17. 46 CFR 177.310 - Satisfactory service as a design basis.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false Satisfactory service as a design basis. 177.310 Section 177.310 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SMALL PASSENGER VESSELS (UNDER 100 GROSS TONS) CONSTRUCTION AND ARRANGEMENT Hull Structure § 177.310 Satisfactory service as...

  18. NDARC-NASA Design and Analysis of Rotorcraft Theoretical Basis and Architecture

    NASA Technical Reports Server (NTRS)

    Johnson, Wayne

    2010-01-01

    The theoretical basis and architecture of the conceptual design tool NDARC (NASA Design and Analysis of Rotorcraft) are described. The principal tasks of NDARC are to design (or size) a rotorcraft to satisfy specified design conditions and missions, and then analyze the performance of the aircraft for a set of off-design missions and point operating conditions. The aircraft consists of a set of components, including fuselage, rotors, wings, tails, and propulsion. For each component, attributes such as performance, drag, and weight can be calculated. The aircraft attributes are obtained from the sum of the component attributes. NDARC provides a capability to model general rotorcraft configurations, and estimate the performance and attributes of advanced rotor concepts. The software has been implemented with low-fidelity models, typical of the conceptual design environment. Incorporation of higher-fidelity models will be possible, as the architecture of the code accommodates configuration flexibility, a hierarchy of models, and ultimately multidisciplinary design, analysis and optimization.

  19. Game Theoretic Evaluation of Threat Detection Problems-The Central Role of the Adversary

    SciTech Connect

    Heasler, Patrick G.; Wood, Thomas W.; Reichmuth, Barbara A.

    2007-01-01

    A wide variety of security problems hinge on the detection of threats and discrimination of threats from innocuous objects. The theory that frames these problems is common among medical diagnostics, radar and sonar imaging, and detection of radiological, chemical, and biological agents. In many of these problems, the nature of the threat is subject to control by a malicious adversary, and the choice of a reference (or "design basis") threat is a very diffcult, and often intractable, aspect of the problem. It is this class of problems that this report considers.

  20. Ground motion following selection of SRS design basis earthquake and associated deterministic approach

    SciTech Connect

    Not Available

    1991-03-01

    This report summarizes the results of a deterministic assessment of earthquake ground motions at the Savannah River Site (SRS). The purpose of this study is to assist the Environmental Sciences Section of the Savannah River Laboratory in reevaluating the design basis earthquake (DBE) ground motion at SRS during approaches defined in Appendix A to 10 CFR Part 100. This work is in support of the Seismic Engineering Section's Seismic Qualification Program for reactor restart.

  1. Laser Threat Analysis System (LTAS)

    NASA Astrophysics Data System (ADS)

    Pfaltz, John M.; Richardson, Christina E.; Ruiz, Abel; Barsalou, Norman; Thomas, Robert J.

    2002-11-01

    LTAS is a totally integrated modeling and simulation environment designed for the purpose of ascertaining the susceptibility of Air Force pilots and air crews to optical radiation threats. Using LTAS, mission planners can assess the operational impact of optically directed energy weapons and countermeasures. Through various scenarios, threat analysts are able to determine the capability of laser threats and their impact on operational missions including the air crew's ability to complete their mission effectively. Additionally, LTAS allows the risk of laser use on training ranges and the requirement for laser protection to be evaluated. LTAS gives mission planners and threat analysts complete control of the threat environment including threat parameter control and placement, terrain mapping (line-of-site), atmospheric conditions, and laser eye protection (LEP) selection. This report summarizes the design of the final version of LTAS, and the modeling methodologies implemented to accomplish analysis.

  2. AP1000 Design Basis Event Simulation at the APEX-1000 Test Facility

    SciTech Connect

    Wright, Richard F.; Groome, John

    2004-07-01

    The AP1000 is a 1000 MWe advanced nuclear power plant that uses passive safety features to enhance plant safety and to provide significant and measurable improvements in plant simplification, reliability, investment protection and plant costs. The AP1000 relies heavily on the 600 MWe AP600 which received design certification in 1999. A critical part of the AP600 design certification process involved the testing of the passive safety systems. A one-fourth height, one-fourth pressure test facility, APEX-600, was constructed at the Oregon State University to study design basis events, and to provide a body of data to be used to validate the computer models used to analyze the AP600. This facility was extensively modified to reflect the design changes for AP1000 including higher power in the electrically heated rods representing the reactor core, and changes in the size of the pressurizer, core makeup tanks and automatic depressurization system. Several design basis events are being simulated at APEX-1000 including a double-ended direct vessel injection (DEDVI) line break and a 2-inch cold leg break. These tests show that the core remains covered with ample margin until gravity injection is established regardless of the initiating event. The tests also show that liquid entrainment from the upper plenum which is proportional to the reactor power does not impact the ability of the passive core cooling system to keep the core covered. (authors)

  3. Characterisation of Liquefaction Effects for Beyond-Design Basis Safety Assessment of Nuclear Power Plants

    NASA Astrophysics Data System (ADS)

    Bán, Zoltán; Győri, Erzsébet; János Katona, Tamás; Tóth, László

    2015-04-01

    Preparedness of nuclear power plants to beyond design base external effects became high importance after 11th of March 2011 Great Tohoku Earthquakes. In case of some nuclear power plants constructed at the soft soil sites, liquefaction should be considered as a beyond design basis hazard. The consequences of liquefaction have to be analysed with the aim of definition of post-event plant condition, identification of plant vulnerabilities and planning the necessary measures for accident management. In the paper, the methodology of the analysis of liquefaction effects for nuclear power plants is outlined. The case of Nuclear Power Plant at Paks, Hungary is used as an example for demonstration of practical importance of the presented results and considerations. Contrary to the design, conservatism of the methodology for the evaluation of beyond design basis liquefaction effects for an operating plant has to be limited to a reasonable level. Consequently, applicability of all existing methods has to be considered for the best estimation. The adequacy and conclusiveness of the results is mainly limited by the epistemic uncertainty of the methods used for liquefaction hazard definition and definition of engineering parameters characterizing the consequences of liquefaction. The methods have to comply with controversial requirements. They have to be consistent and widely accepted and used in the practice. They have to be based on the comprehensive database. They have to provide basis for the evaluation of dominating engineering parameters that control the post-liquefaction response of the plant structures. Experience of Kashiwazaki-Kariwa plant hit by Niigata-ken Chuetsu-oki earthquake of 16 July 2007 and analysis of site conditions and plant layout at Paks plant have shown that the differential settlement is found to be the dominating effect in case considered. They have to be based on the probabilistic seismic hazard assessment and allow the integration into logic

  4. Reducing Uncertainty in the Seismic Design Basis for the Waste Treatment Plant, Hanford, Washington

    SciTech Connect

    Brouns, T.M.; Rohay, A.C.; Reidel, S.P.; Gardner, M.G.

    2007-07-01

    The seismic design basis for the Waste Treatment Plant (WTP) at the Department of Energy's (DOE) Hanford Site near Richland was re-evaluated in 2005, resulting in an increase by up to 40% in the seismic design basis. The original seismic design basis for the WTP was established in 1999 based on a probabilistic seismic hazard analysis completed in 1996. The 2005 analysis was performed to address questions raised by the Defense Nuclear Facilities Safety Board (DNFSB) about the assumptions used in developing the original seismic criteria and adequacy of the site geotechnical surveys. The updated seismic response analysis used existing and newly acquired seismic velocity data, statistical analysis, expert elicitation, and ground motion simulation to develop interim design ground motion response spectra which enveloped the remaining uncertainties. The uncertainties in these response spectra were enveloped at approximately the 84. percentile to produce conservative design spectra, which contributed significantly to the increase in the seismic design basis. A key uncertainty identified in the 2005 analysis was the velocity contrasts between the basalt flows and sedimentary interbeds below the WTP. The velocity structure of the upper four basalt flows (Saddle Mountains Basalt) and the inter-layered sedimentary interbeds (Ellensburg Formation) produces strong reductions in modeled earthquake ground motions propagating through them. Uncertainty in the strength of velocity contrasts between these basalts and interbeds primarily resulted from an absence of measured shear wave velocities (Vs) in the interbeds. For this study, Vs in the interbeds was estimated from older, limited compressional wave velocity (Vp) data using estimated ranges for the ratio of the two velocities (Vp/Vs) based on analogues in similar materials. A range of possible Vs for the interbeds and basalts was used and produced additional uncertainty in the resulting response spectra. Because of the

  5. Biological basis for space-variant sensor design II: implications for VLSI sensor design

    NASA Astrophysics Data System (ADS)

    Rojer, Alan S.; Schwartz, Eric L.

    1991-03-01

    We analyze the characteristics of a synthetic sensor comparable with respect to field width and resolution to the primate visual system. We estimate that 150 pixels are sufficient using a logarithmic sensor geometry and demonstrate that this calculation is consistent with known characteristics of biological vision e. g. the number of fibers in the optic nerve. To obtain the field width and resolution of the primate eye with a uniform sensor requires between iOiO'' times the number of pixels estimated for the comparable log sensor. Another interesting observation is that the field width and resolution of a conventional 512x512 sensor can be obtained with around 5000 pixels using the log geometry. We conclude with consideration of the prospects for achieving human-like performance with contemporary VLSI technology and briefly discuss progress on space-variant VLSI sensor design.

  6. Current plans to characterize the design basis ground motion at the Yucca Mountain, Nevada, site

    SciTech Connect

    Simecka, W.B.; Grant, T.A.; Voegele, M.D.; Cline, K.M.

    1993-09-01

    A site at Yucca Mountain Nevada is currently being studied to assess its suitability as a potential host site for the nation`s first commercial high level waste repository. The DOE has proposed a new methodology for determining design-basis ground motions that uses both deterministic and probabilistic methods. The role of the deterministic approach is primary. It provides the level of detail needed by design engineers in the characterization of ground motions. The probabilistic approach provides a logical structured procedure for integrating the range of possible earthquakes that contribute to the ground motion hazard at the site. In addition, probabilistic methods will be used as needed to provide input for the assessment of long-term repository performance. This paper discusses the local tectonic environment, potential seismic sources and their associated displacements and ground motions. It also discusses the approach to assessing the design basis earthquake for the surface and underground facilities, as well as selected examples of the use of this type of information in design activities.

  7. Demonstrating Structural Adequacy of Nuclear Power Plant Containment Structures for Beyond Design-Basis Pressure Loadings

    SciTech Connect

    Braverman, J.I.; Morante, R.

    2010-07-18

    ABSTRACT Demonstrating the structural integrity of U.S. nuclear power plant (NPP) containment structures, for beyond design-basis internal pressure loadings, is necessary to satisfy Nuclear Regulatory Commission (NRC) requirements and performance goals. This paper discusses methods for demonstrating the structural adequacy of the containment for beyond design-basis pressure loadings. Three distinct evaluations are addressed: (1) estimating the ultimate pressure capacity of the containment structure (10 CFR 50 and US NRC Standard Review Plan, Section 3.8) ; (2) demonstrating the structural adequacy of the containment subjected to pressure loadings associated with combustible gas generation (10 CFR 52 and 10 CFR 50); and (3) demonstrating the containment structural integrity for severe accidents (10 CFR 52 as well as SECY 90-016, SECY 93-087, and related NRC staff requirements memoranda (SRMs)). The paper describes the technical basis for specific aspects of the methods presented. It also presents examples of past issues identified in licensing activities related to these evaluations.

  8. Threat radar system simulations

    NASA Astrophysics Data System (ADS)

    Miller, L.

    The capabilities, requirements, and goals of radar emitter simulators are discussed. Simulators are used to evaluate competing receiver designs, to quantify the performance envelope of a radar system, and to model the characteristics of a transmitted signal waveform. A database of candidate threat systems is developed and, in concert with intelligence data on a given weapons system, permits upgrading simulators to new projected threat capabilities. Four currently available simulation techniques are summarized, noting the usefulness of developing modular software for fast controlled-cost upgrades of simulation capabilities.

  9. Breckinridge Project, initial effort. Report XI, Volume V. Critical review of the design basis. [Critical review

    SciTech Connect

    1982-01-01

    Report XI, Technical Audit, is a compendium of research material used during the Initial Effort in making engineering comparisons and decisions. Volumes 4 and 5 of Report XI present those studies which provide a Critical Review of the Design Basis. The Critical Review Report, prepared by Intercontinental Econergy Associates, Inc., summarizes findings from an extensive review of the data base for the H-Coal process design. Volume 4 presents this review and assessment, and includes supporting material; specifically, Design Data Tabulation (Appendix A), Process Flow Sheets (Appendix B), and References (Appendix C). Volume 5 is a continuation of the references of Appendix C. Studies of a proprietary nature are noted and referenced, but are not included in these volumes. They are included in the Limited Access versions of these reports and may be reviewed by properly cleared personnel in the offices of Ashland Synthetic Fuels, Inc.

  10. Breckinridge Project, initial effort. Report XI, Volume IV. Critical review of the design basis. [Critical review

    SciTech Connect

    1981-05-01

    Report XI, Technical Audit, is a compendium of research material used during the Initial Effort in making engineering comparisons and decisions. Volumes 4 and 5 of Report XI present those studies which provide a Critical Review of the Design Basis. The Critical Review Report, prepared by Intercontinental Econergy Associates, Inc., summarizes findings from an extensive review of the data base for the H-Coal process design. Volume 4 presents this review and assessment, and includes supporting material; specifically, Design Data Tabulation (Appendix A), Process Flow Sheets (Appendix B), and References (Appendix C). Volume 5 is a continuation of the references of Appendix C. Studies of a proprietary nature are noted and referenced, but are not included in these volumes. They are included in the Limited Access versions of these reports and may be reviewed by properly cleared personnel in the offices of Ashland Synthetic Fuels, Inc.

  11. Threat expert system technology advisor

    NASA Technical Reports Server (NTRS)

    Kurrasch, E. R.; Tripp, L. R.

    1987-01-01

    A prototype expert system was developed to determine the feasibility of using expert system technology to enhance the performance and survivability of helicopter pilots in a combat threat environment while flying NOE (Nap of the Earth) missions. The basis for the concept is the potential of using an Expert System Advisor to reduce the extreme overloading of the pilot who flies NOE mission below treetop level at approximately 40 knots while performing several other functions. The ultimate goal is to develop a Threat Expert System Advisor which provides threat information and advice that are better than even a highly experienced copilot. The results clearly show that the NOE pilot needs all the help in decision aiding and threat situation awareness that he can get. It clearly shows that heuristics are important and that an expert system for combat NOE helicopter missions can be of great help to the pilot in complex threat situations and in making decisions.

  12. Improving variable-fidelity modelling by exploring global design space and radial basis function networks for aerofoil design

    NASA Astrophysics Data System (ADS)

    Tyan, Maxim; Van Nguyen, Nhu; Lee, Jae-Woo

    2015-07-01

    The global variable-fidelity modelling (GVFM) method presented in this article extends the original variable-complexity modelling (VCM) algorithm that uses a low-fidelity and scaling function to approximate a high-fidelity function for efficiently solving design-optimization problems. GVFM uses the design of experiments to sample values of high- and low-fidelity functions to explore global design space and to initialize a scaling function using the radial basis function (RBF) network. This approach makes it possible to remove high-fidelity-gradient evaluation from the process, which makes GVFM more efficient than VCM for high-dimensional design problems. The proposed algorithm converges with 65% fewer high-fidelity function calls for a one-dimensional problem than VCM and approximately 80% fewer for a two-dimensional numerical problem. The GVFM method is applied for the design optimization of transonic and subsonic aerofoils. Both aerofoil design problems show design improvement with a reasonable number of high- and low-fidelity function evaluations.

  13. 75 FR 54918 - Draft Regulatory Guide, DG-1247, “Design-Basis Hurricane and Hurricane Missiles for Nuclear Power...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-09

    ... August 31, 2010 (75 FR 53352), the U.S. Nuclear Regulatory Commission (NRC) published a notice of issuance and availability of Draft Regulatory Guide (DG)--1247, ``Design-Basis Hurricane and Hurricane... COMMISSION Draft Regulatory Guide, DG-1247, ``Design-Basis Hurricane and Hurricane Missiles for Nuclear...

  14. 78 FR 31614 - Implementation of Regulatory Guide 1.221 on Design-Basis Hurricane and Hurricane Missiles

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-24

    ... 2007 (ML070630003). On October 22, 2012 (77 FR 64564), the staff issued the proposed DC/COL-ISG-024... COMMISSION Implementation of Regulatory Guide 1.221 on Design-Basis Hurricane and Hurricane Missiles AGENCY....221, ``Design-Basis Hurricane and Hurricane Missiles for Nuclear Power Plants,'' in support of...

  15. Technical Basis for Certification of Seismic Design Criteria for the Waste Treatment Plant, Hanford, Washington

    SciTech Connect

    Brouns, T.M.; Rohay, A.C.; Youngs, R.R.; Costantino, C.J.; Miller, L.F.

    2008-07-01

    In August 2007, Secretary of Energy Samuel W. Bodman approved the final seismic and ground motion criteria for the Waste Treatment and Immobilization Plant (WTP) at the Department of Energy's (DOE) Hanford Site. Construction of the WTP began in 2002 based on seismic design criteria established in 1999 and a probabilistic seismic hazard analysis completed in 1996. The design criteria were reevaluated in 2005 to address questions from the Defense Nuclear Facilities Safety Board (DNFSB), resulting in an increase by up to 40% in the seismic design basis. DOE announced in 2006 the suspension of construction on the pretreatment and high-level waste vitrification facilities within the WTP to validate the design with more stringent seismic criteria. In 2007, the U.S. Congress mandated that the Secretary of Energy certify the final seismic and ground motion criteria prior to expenditure of funds on construction of these two facilities. With the Secretary's approval of the final seismic criteria in the summer of 2007, DOE authorized restart of construction of the pretreatment and high-level waste vitrification facilities. The technical basis for the certification of seismic design criteria resulted from a two-year Seismic Boreholes Project that planned, collected, and analyzed geological data from four new boreholes drilled to depths of approximately 1400 feet below ground surface on the WTP site. A key uncertainty identified in the 2005 analyses was the velocity contrasts between the basalt flows and sedimentary interbeds below the WTP. The absence of directly-measured seismic shear wave velocities in the sedimentary interbeds resulted in the use of a wider and more conservative range of velocities in the 2005 analyses. The Seismic Boreholes Project was designed to directly measure the velocities and velocity contrasts in the basalts and sediments below the WTP, reanalyze the ground motion response, and assess the level of conservatism in the 2005 seismic design criteria

  16. Development of Probabilistic Design Basis Earthquake (DBE) Parameters for Moderate and High Hazard Facilities at INEEL

    SciTech Connect

    S. M. Payne; V. W. Gorman; S. A. Jensen; M. E. Nitzel; M. J. Russell; R. P. Smith

    2000-03-01

    Design Basis Earthquake (DBE) horizontal and vertical response spectra are developed for moderate and high hazard facilities or Performance Categories (PC) 3 and 4, respectively, at the Idaho National Engineering and Environmental Laboratory (INEEL). The probabilistic DBE response spectra will replace the deterministic DBE response spectra currently in the U.S. Department of Energy Idaho Operations Office (DOE-ID) Architectural Engineering Standards that govern seismic design criteria for several facility areas at the INEEL. Probabilistic DBE response spectra are recommended to DOE Naval Reactors for use at the Naval Reactor Facility at INEEL. The site-specific Uniform Hazard Spectra (UHS) developed by URS Greiner Woodward Clyde Federal Services are used as the basis for developing the DBE response spectra. In 1999, the UHS for all INEEL facility areas were recomputed using more appropriate attenuation relationships for the Basin and Range province. The revised UHS have lower ground motions than those produced in the 1996 INEEL site-wide probabilistic ground motion study. The DBE response spectra were developed by incorporating smoothed broadened regions of the peak accelerations, velocities, and displacements defined by the site-specific UHS. Portions of the DBE response spectra were adjusted to ensure conservatism for the structural design process.

  17. Structural basis for specific single-stranded RNA recognition by designer pentatricopeptide repeat proteins

    PubMed Central

    Shen, Cuicui; Zhang, Delin; Guan, Zeyuan; Liu, Yexing; Yang, Zhao; Yang, Yan; Wang, Xiang; Wang, Qiang; Zhang, QunXia; Fan, Shilong; Zou, Tingting; Yin, Ping

    2016-01-01

    As a large family of RNA-binding proteins, pentatricopeptide repeat (PPR) proteins mediate multiple aspects of RNA metabolism in eukaryotes. Binding to their target single-stranded RNAs (ssRNAs) in a modular and base-specific fashion, PPR proteins can serve as designable modules for gene manipulation. However, the structural basis for nucleotide-specific recognition by designer PPR (dPPR) proteins remains to be elucidated. Here, we report four crystal structures of dPPR proteins in complex with their respective ssRNA targets. The dPPR repeats are assembled into a right-handed superhelical spiral shell that embraces the ssRNA. Interactions between different PPR codes and RNA bases are observed at the atomic level, revealing the molecular basis for the modular and specific recognition patterns of the RNA bases U, C, A and G. These structures not only provide insights into the functional study of PPR proteins but also open a path towards the potential design of synthetic sequence-specific RNA-binding proteins. PMID:27088764

  18. Structural basis for specific single-stranded RNA recognition by designer pentatricopeptide repeat proteins.

    PubMed

    Shen, Cuicui; Zhang, Delin; Guan, Zeyuan; Liu, Yexing; Yang, Zhao; Yang, Yan; Wang, Xiang; Wang, Qiang; Zhang, QunXia; Fan, Shilong; Zou, Tingting; Yin, Ping

    2016-01-01

    As a large family of RNA-binding proteins, pentatricopeptide repeat (PPR) proteins mediate multiple aspects of RNA metabolism in eukaryotes. Binding to their target single-stranded RNAs (ssRNAs) in a modular and base-specific fashion, PPR proteins can serve as designable modules for gene manipulation. However, the structural basis for nucleotide-specific recognition by designer PPR (dPPR) proteins remains to be elucidated. Here, we report four crystal structures of dPPR proteins in complex with their respective ssRNA targets. The dPPR repeats are assembled into a right-handed superhelical spiral shell that embraces the ssRNA. Interactions between different PPR codes and RNA bases are observed at the atomic level, revealing the molecular basis for the modular and specific recognition patterns of the RNA bases U, C, A and G. These structures not only provide insights into the functional study of PPR proteins but also open a path towards the potential design of synthetic sequence-specific RNA-binding proteins. PMID:27088764

  19. Categorizing threat : building and using a generic threat matrix.

    SciTech Connect

    Woodard, Laura; Veitch, Cynthia K.; Thomas, Sherry Reede; Duggan, David Patrick

    2007-09-01

    The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and is not available for general use, such as the design of defenses and the development of mitigation strategies. To reduce the complexity of analyzing threat, the threat space must first be reduced. This is achieved by taking the continuous nature of the threat space and creating an abstraction that allows the entire space to be grouped, based on measurable attributes, into a small number of distinctly different levels. The work documented in this report is an effort to create such an abstraction.

  20. Design of chemical space networks on the basis of Tversky similarity.

    PubMed

    Wu, Mengjun; Vogt, Martin; Maggiora, Gerald M; Bajorath, Jürgen

    2016-01-01

    Chemical space networks (CSNs) have been introduced as a coordinate-free representation of chemical space. In CSNs, nodes represent compounds and edges pairwise similarity relationships. These network representations are mostly used to navigate sections of biologically relevant chemical space. Different types of CSNs have been designed on the basis of alternative similarity measures including continuous numerical similarity values or substructure-based similarity criteria. CSNs can be characterized and compared on the basis of statistical concepts from network science. Herein, a new CSN design is introduced that is based upon asymmetric similarity assessment using the Tversky coefficient and termed TV-CSN. Compared to other CSNs, TV-CSNs have unique features. While CSNs typically contain separate compound communities and exhibit small world character, many TV-CSNs are also scale-free in nature and contain hubs, i.e., extensively connected central compounds. Compared to other CSNs, these hubs are a characteristic of TV-CSN topology. Hub-containing compound communities are of particular interest for the exploration of structure-activity relationships. PMID:26695392

  1. Technical Basis for Certification of Seismic Design Criteria for the Waste Treatment Plant, Hanford, Washington

    SciTech Connect

    Brouns, Thomas M.; Rohay, Alan C.; Youngs, Robert R.; Costantino, Carl J.; Miller, Lewis F.

    2008-02-28

    In August 2007, Secretary of Energy Samuel W. Bodman approved the final seismic and ground motion criteria for the Waste Treatment and Immobilization Plant (WTP) at the Department of Energy’s (DOE) Hanford Site. Construction of the WTP began in 2002 based on seismic design criteria established in 1999 and a probabilistic seismic hazard analysis completed in 1996. The design criteria were re-evaluated in 2005 to address questions from the Defense Nuclear Facilities Safety Board (DNFSB), resulting in an increase by up to 40% in the seismic design basis. DOE announced in 2006 the suspension of construction on the pretreatment and high-level waste vitrification facilities within the WTP to validate the design with more stringent seismic criteria. In 2007, the U.S. Congress mandated that the Secretary of Energy certify the final seismic and ground motion criteria prior to expenditure of funds on construction of these two facilities. With the Secretary’s approval of the final seismic criteria this past summer, DOE authorized restart of construction of the pretreatment and high-level waste vitrification facilities.

  2. Design Methodology of a New Wavelet Basis Function for Fetal Phonocardiographic Signals

    PubMed Central

    Chourasia, Vijay S.; Tiwari, Anil Kumar

    2013-01-01

    Fetal phonocardiography (fPCG) based antenatal care system is economical and has a potential to use for long-term monitoring due to noninvasive nature of the system. The main limitation of this technique is that noise gets superimposed on the useful signal during its acquisition and transmission. Conventional filtering may result into loss of valuable diagnostic information from these signals. This calls for a robust, versatile, and adaptable denoising method applicable in different operative circumstances. In this work, a novel algorithm based on wavelet transform has been developed for denoising of fPCG signals. Successful implementation of wavelet theory in denoising is heavily dependent on selection of suitable wavelet basis function. This work introduces a new mother wavelet basis function for denoising of fPCG signals. The performance of newly developed wavelet is found to be better when compared with the existing wavelets. For this purpose, a two-channel filter bank, based on characteristics of fPCG signal, is designed. The resultant denoised fPCG signals retain the important diagnostic information contained in the original fPCG signal. PMID:23766693

  3. Post Test Analysis of a PCCV Model Dynamically Tested Under Simulated Design-Basis Earthquakes

    SciTech Connect

    Cherry, J.; Chokshi, N.; James, R.J.; Rashid, Y.R.; Tsurumaki, S.; Zhang, L.

    1998-11-09

    In a collaborative program between the United States Nuclear Regulatory Commission (USNRC) and the Nuclear Power Engineering Corporation (NUPEC) of Japan under sponsorship of the Ministry of International Trade and Ihdustry, the seismic behavior of Prestressed Concrete Containment Vessels (PCCV) is being investigated. A 1:10 scale PCCV model has been constructed by NUPEC and subjected to seismic simulation tests using the high performance shaking table at the Tadotsu Engineering Laboratory. A primary objective of the testing program is to demonstrate the capability of the PCCV to withstand design basis earthquakes with a significant safety margin against major damage or failure. As part of the collaborative program, Sandia National Laboratories (SNL) is conducting research in state-of-the-art analytical methods for predicting the seismic behavior of PCCV structures, with the eventual goal of understanding, validating, and improving calculations dated to containment structure performance under design and severe seismic events. With the increased emphasis on risk-informed- regulatory focus, more accurate ch&@erization (less uncertainty) of containment structural and functional integri~ is desirable. This paper presents results of post-test calculations conducted at ANATECH to simulate the design level scale model tests.

  4. Criteria for calculating the efficiency of HEPA filters during and after design basis accidents

    SciTech Connect

    Bergman, W.; First, M.W.; Anderson, W.L.; Gilbert, H.; Jacox, J.W.

    1994-12-01

    We have reviewed the literature on the performance of high efficiency particulate air (HEPA) filters under normal and abnormal conditions to establish criteria for calculating the efficiency of HEPA filters in a DOE nonreactor nuclear facility during and after a Design Basis Accident (DBA). The literature review included the performance of new filters and parameters that may cause deterioration in the filter performance such as filter age, radiation, corrosive chemicals, seismic and rough handling, high temperature, moisture, particle clogging, high air flow and pressure pulses. The deterioration of the filter efficiency depends on the exposure parameters; in severe exposure conditions the filter will be structurally damaged and have a residual efficiency of 0%. Despite the many studies on HEPA filter performance under adverse conditions, there are large gaps and limitations in the data that introduce significant error in the estimates of HEPA filter efficiencies under DBA conditions. Because of this limitation, conservative values of filter efficiency were chosen when there was insufficient data.

  5. Maximal design basis accident of fusion neutron source DEMO-TIN

    SciTech Connect

    Kolbasov, B. N.

    2015-12-15

    When analyzing the safety of nuclear (including fusion) facilities, the maximal design basis accident at which the largest release of activity is expected must certainly be considered. Such an accident is usually the failure of cooling systems of the most thermally stressed components of a reactor (for a fusion facility, it is the divertor or the first wall). The analysis of safety of the ITER reactor and fusion power facilities (including hybrid fission–fusion facilities) shows that the initial event of such a design basis accident is a large-scale break of a pipe in the cooling system of divertor or the first wall outside the vacuum vessel of the facility. The greatest concern is caused by the possibility of hydrogen formation and the inrush of air into the vacuum chamber (VC) with the formation of a detonating mixture and a subsequent detonation explosion. To prevent such an explosion, the emergency forced termination of the fusion reaction, the mounting of shutoff valves in the cooling systems of the divertor and the first wall or blanket for reducing to a minimum the amount of water and air rushing into the VC, the injection of nitrogen or inert gas into the VC for decreasing the hydrogen and oxygen concentration, and other measures are recommended. Owing to a continuous feed-out of the molten-salt fuel mixture from the DEMO-TIN blanket with the removal period of 10 days, the radioactivity release at the accident will mainly be determined by tritium (up to 360 PBq). The activity of fission products in the facility will be up to 50 PBq.

  6. Maximal design basis accident of fusion neutron source DEMO-TIN

    NASA Astrophysics Data System (ADS)

    Kolbasov, B. N.

    2015-12-01

    When analyzing the safety of nuclear (including fusion) facilities, the maximal design basis accident at which the largest release of activity is expected must certainly be considered. Such an accident is usually the failure of cooling systems of the most thermally stressed components of a reactor (for a fusion facility, it is the divertor or the first wall). The analysis of safety of the ITER reactor and fusion power facilities (including hybrid fission-fusion facilities) shows that the initial event of such a design basis accident is a large-scale break of a pipe in the cooling system of divertor or the first wall outside the vacuum vessel of the facility. The greatest concern is caused by the possibility of hydrogen formation and the inrush of air into the vacuum chamber (VC) with the formation of a detonating mixture and a subsequent detonation explosion. To prevent such an explosion, the emergency forced termination of the fusion reaction, the mounting of shutoff valves in the cooling systems of the divertor and the first wall or blanket for reducing to a minimum the amount of water and air rushing into the VC, the injection of nitrogen or inert gas into the VC for decreasing the hydrogen and oxygen concentration, and other measures are recommended. Owing to a continuous feed-out of the molten-salt fuel mixture from the DEMO-TIN blanket with the removal period of 10 days, the radioactivity release at the accident will mainly be determined by tritium (up to 360 PBq). The activity of fission products in the facility will be up to 50 PBq.

  7. Application of the MELCOR code to design basis PWR large dry containment analysis.

    SciTech Connect

    Phillips, Jesse; Notafrancesco, Allen; Tills, Jack Lee

    2009-05-01

    The MELCOR computer code has been developed by Sandia National Laboratories under USNRC sponsorship to provide capability for independently auditing analyses submitted by reactor manufactures and utilities. MELCOR is a fully integrated code (encompassing the reactor coolant system and the containment building) that models the progression of postulated accidents in light water reactor power plants. To assess the adequacy of containment thermal-hydraulic modeling incorporated in the MELCOR code for application to PWR large dry containments, several selected demonstration designs were analyzed. This report documents MELCOR code demonstration calculations performed for postulated design basis accident (DBA) analysis (LOCA and MSLB) inside containment, which are compared to other code results. The key processes when analyzing the containment loads inside PWR large dry containments are (1) expansion and transport of high mass/energy releases, (2) heat and mass transfer to structural passive heat sinks, and (3) containment pressure reduction due to engineered safety features. A code-to-code benchmarking for DBA events showed that MELCOR predictions of maximum containment loads were equivalent to similar predictions using a qualified containment code known as CONTAIN. This equivalency was found to apply for both single- and multi-cell containment models.

  8. Approach to developing a ground-motion design basis for facilities important to safety at Yucca Mountain

    SciTech Connect

    King, J.L.

    1990-04-01

    The Department of Energy has proposed a methodology for developing a ground-motion design basis for prospective facilities at Yucca Mountain that are important to safety. The methodology utilizes a quasi-deterministic construct that is designed to provide a conservative, robust, and reproducible estimate of ground motion that has a one-in-ten chance of occurring during the preclosure period. This estimate is intended to define a ground-motion level for which the seismic design would ensure minimal disruption to operations; engineering analyses to ensure safe performance in the unlikely event that the design basis is exceeded are a part of the proposed methodology. 8 refs.

  9. Target Area design basis and system performance for the National Ignition Facility

    SciTech Connect

    Tobin, M.; Karpenko, V.; Hagans, K.; Anderson, A.; Latkowski, J.; Warren, R.; Wavrik, R.; Garcia, R.; Boyes, J.

    1994-06-01

    A description of Target Area systems performance shows that the target area conceptual design can meet its performance criteria. Before the shot, the target area provides a vacuum of < 5 {times} 10{sup {minus}5} Torr within 2 hours. A target, cryogenic or non-cryogenic, is placed to within 1 cm of chamber center with a positioner that minimizes vibration of the target. The target is then aligned to {le} 7 {mu}m by using the Target Alignment Sensor (TAS) system. The viewers in this system will also determine if the target is ready for illumination. Diagnostics are aligned to the necessary specifications by the alignment viewers. The target is shot and data is collected. Nearly all tritium (if present) is passed through the vacuum system and into the collection system. The analysis that supports the target area design basis is a combination of careful assumptions, data, and calculations. Some uncertainty exists concerning certain aspects of the source terms for x-rays and debris, material responses to this energy flux, and the full consequences of the material responses that do occur. For this reason, we have selected what we believe are conservative values in these areas. Advanced conceptual design activities will improve our understanding of these phenomena and allow a more quantitative assessment of the degree of conservatism inherent to the system. However, the results of this preliminary survey of target area operations indicate an annual shot rate of > 600 (for the mix of shots shown in Table 1) is feasible for this set of target area systems.

  10. SRS BEDROCK PROBABILISTIC SEISMIC HAZARD ANALYSIS (PSHA) DESIGN BASIS JUSTIFICATION (U)

    SciTech Connect

    , R

    2005-12-14

    This represents an assessment of the available Savannah River Site (SRS) hard-rock probabilistic seismic hazard assessments (PSHAs), including PSHAs recently completed, for incorporation in the SRS seismic hazard update. The prior assessment of the SRS seismic design basis (WSRC, 1997) incorporated the results from two PSHAs that were published in 1988 and 1993. Because of the vintage of these studies, an assessment is necessary to establish the value of these PSHAs considering more recently collected data affecting seismic hazards and the availability of more recent PSHAs. This task is consistent with the Department of Energy (DOE) order, DOE O 420.1B and DOE guidance document DOE G 420.1-2. Following DOE guidance, the National Map Hazard was reviewed and incorporated in this assessment. In addition to the National Map hazard, alternative ground motion attenuation models (GMAMs) are used with the National Map source model to produce alternate hazard assessments for the SRS. These hazard assessments are the basis for the updated hard-rock hazard recommendation made in this report. The development and comparison of hazard based on the National Map models and PSHAs completed using alternate GMAMs provides increased confidence in this hazard recommendation. The alternate GMAMs are the EPRI (2004), USGS (2002) and a regional specific model (Silva et al., 2004). Weights of 0.6, 0.3 and 0.1 are recommended for EPRI (2004), USGS (2002) and Silva et al. (2004) respectively. This weighting gives cluster weights of .39, .29, .15, .17 for the 1-corner, 2-corner, hybrid, and Greens-function models, respectively. This assessment is judged to be conservative as compared to WSRC (1997) and incorporates the range of prevailing expert opinion pertinent to the development of seismic hazard at the SRS. The corresponding SRS hard-rock uniform hazard spectra are greater than the design spectra developed in WSRC (1997) that were based on the LLNL (1993) and EPRI (1988) PSHAs. The

  11. Threat driven modeling framework using petri nets for e-learning system.

    PubMed

    Khamparia, Aditya; Pandey, Babita

    2016-01-01

    Vulnerabilities at various levels are main cause of security risks in e-learning system. This paper presents a modified threat driven modeling framework, to identify the threats after risk assessment which requires mitigation and how to mitigate those threats. To model those threat mitigations aspects oriented stochastic petri nets are used. This paper included security metrics based on vulnerabilities present in e-learning system. The Common Vulnerability Scoring System designed to provide a normalized method for rating vulnerabilities which will be used as basis in metric definitions and calculations. A case study has been also proposed which shows the need and feasibility of using aspect oriented stochastic petri net models for threat modeling which improves reliability, consistency and robustness of the e-learning system. PMID:27119050

  12. Structural response of large penetrations and closures for containment vessels subjected to loadings beyond design basis

    SciTech Connect

    Kulak, R.F.; Hsieh, B.J.; Ash, J.E.; Kennedy, J.M.; McLennan, G.A.; Pan, Y.C.

    1985-02-01

    The Reactor Analysis and Safety Division (RAS) and the Components Technology Division (CT) of Argonne National Laboratory (ANL) are performing analytical/numerical simulations of the response of selected large penetrations and closures, which use some type of seal or gasketed joint, for containment vessels subject to pressure and thermal loads that are beyond the design basis (BDB). The objectives of this task were to identify the methodology required to simulate the structural response of selected penetrations/closures to BDB loadings and to apply this methodology to representative penetrations/closures. Section II discusses a detailed study conducted to determine the structural response of an equipment hatch for a PWR with a steel containment vessel. The macro-deformations of the gasketed joint were computed and then used in a leakage analysis. In Section III, the methodology used to assess the structural integrity of a BWR Mark II containment head is presented. Section IV describes the approach used to obtain upper and lower bounds for the maximum allowable internal pressure and deflection for a representative bellows connection.

  13. Simulation of a beyond design-basis-accident with RELAP5/MOD3.1

    SciTech Connect

    Banati, J.

    1995-09-01

    This paper summarizes the results of analyses, parametric and sensitivity studies, performed using the RELAP5/MOD3.1 computer code for the 4th IAEA Standard Problem Exercise (SPE-4). The test, conducted on the PMK-2 facility in Budapest, involved simulation of a Small Break Loss Of Coolant Accident (SBLOCA) with a 7.4% break in the cold leg of a VVER-440 type pressurized water reactor. According to the scenario, the unavailability of the high pressure injection system led to a beyond design basis accident. For prevention of core damage, secondary side bleed-and-feed accident management measures were applied. A brief description of the PMK-2 integral type test facility is presented, together with the profile and some key phenomenological aspects of this particular experiment. Emphasis is placed on the ability of the code to predict the main trends observed in the test and thus, an assessment is given for the code capabilities to represent the system transient.

  14. Airborne Particulate Threat Assessment

    SciTech Connect

    Patrick Treado; Oksana Klueva; Jeffrey Beckstead

    2008-12-31

    findings and APICD Gen II subsystems for automated collection, deposition and detection of ambient particulate matter. Key findings from the APTA Program include: Ambient biological PM taxonomy; Demonstration of key subsystems needed for autonomous bioaerosol detection; System design; Efficient electrostatic collection; Automated bioagent recognition; Raman analysis performance validating Td<9 sec; Efficient collection surface regeneration; and Development of a quantitative bioaerosol defection model. The objective of the APTA program was to advance the state of our knowledge of ambient background PM composition. Operation of an automated aerosol detection system was enhanced by a more accurate assessment of background variability, especially for sensitive and specific sensing strategies like Raman detection that are background-limited in performance. Based on this improved knowledge of background, the overall threat detection performance of Raman sensors was improved.

  15. Design of radial basis function neural network classifier realized with the aid of data preprocessing techniques: design and analysis

    NASA Astrophysics Data System (ADS)

    Oh, Sung-Kwun; Kim, Wook-Dong; Pedrycz, Witold

    2016-05-01

    In this paper, we introduce a new architecture of optimized Radial Basis Function neural network classifier developed with the aid of fuzzy clustering and data preprocessing techniques and discuss its comprehensive design methodology. In the preprocessing part, the Linear Discriminant Analysis (LDA) or Principal Component Analysis (PCA) algorithm forms a front end of the network. The transformed data produced here are used as the inputs of the network. In the premise part, the Fuzzy C-Means (FCM) algorithm determines the receptive field associated with the condition part of the rules. The connection weights of the classifier are of functional nature and come as polynomial functions forming the consequent part. The Particle Swarm Optimization algorithm optimizes a number of essential parameters needed to improve the accuracy of the classifier. Those optimized parameters include the type of data preprocessing, the dimensionality of the feature vectors produced by the LDA (or PCA), the number of clusters (rules), the fuzzification coefficient used in the FCM algorithm and the orders of the polynomials of networks. The performance of the proposed classifier is reported for several benchmarking data-sets and is compared with the performance of other classifiers reported in the previous studies.

  16. When Students Make Threats

    ERIC Educational Resources Information Center

    Kanan, Linda M.

    2010-01-01

    Much has been written about the use of threat assessment. Schools are encouraged to have threat assessment teams and a threat assessment process as part of a comprehensive safe schools effort. Encouraging and enabling all members of the school community to report possible threats in a timely manner is an essential component of an effective threat…

  17. Cyber threat metrics.

    SciTech Connect

    Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

    2012-03-01

    Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

  18. Multiple-site replacement analogs of glucagon. A molecular basis for antagonist design.

    PubMed

    Unson, C G; Wu, C R; Fitzpatrick, K J; Merrifield, R B

    1994-04-29

    Extensive structure activity analysis has allowed us to identify specific residues in the glucagon sequence that are responsible for either receptor recognition or signal transduction. For instance, we have demonstrated that aspartic acid 9 and histidine 1 are essential for activation, and that an ionic interaction between the negative carboxylate and the protonated imidazole may contribute to the activation reaction at the molecular level. In the absence of the carboxylic group at position 9, aspartic 21 or aspartic 15 might furnish distal electrostatic effects to maintain partial agonism. Further investigation established that each of the 4 serine residues in the hormone play distinct roles. Serine 8 provides an important determinant of binding. Whereas neither serines 2, 11, nor 16 are required for receptor recognition. We have shown that serine 16 is essential for signal transduction and thus have identified it to be the third residue in glucagon to participate in a putative catalytic triad together with aspartic 9 and histidine 1, in the transduction of the glucagon response. In this work, we utilized insights into the functional significance of particular residues in the peptide appropriated from our structure-function assignments, as the basis of a molecular approach for the design of active-site directed antagonists of glucagon. The importance as well as the accuracy of our findings are confirmed by the synthesis of a series of improved glucagon antagonists based on replacements at positions 1, 9, 11, 16, and 21. The inhibition index, (I/A)50, of our best antagonist des-His1-[Nle9-Ala11-Ala16]glucagon amide, has been improved 10-fold over the previous best glucagon inhibitor. PMID:8175663

  19. Implementation of an Industrial-Based Case Study as the Basis for a Design Project in an Introduction to Mechanical Design Course

    ERIC Educational Resources Information Center

    Lackey, Ellen

    2011-01-01

    The purpose of this paper is to discuss the implementation of an industrial-based case study as the basis for a design project for the Spring 2009 Introduction to Mechanical Design Course at the University of Mississippi. Course surveys documented the lack of student exposure in classes to the types of projects typically experienced by engineers…

  20. Transportation Package Seal Performance in Beyond Design Basis Thermal Exposures - 12472

    SciTech Connect

    Gonzalez, Felix; Bajwa, Christopher; Easton, Earl; Einziger, Robert; Yang, Jiann; Hnetkovsky, Edward

    2012-07-01

    The Nuclear Regulatory Commission (NRC) technical report, NUREG/CR-6886, 'Spent Fuel Transportation Package Response to the Baltimore Tunnel Fire Scenario', describes, in detail, an evaluation of the potential for a theoretical release of radioactive material from three different spent nuclear fuel (SNF) transportation packages, had they been exposed to the Baltimore tunnel fire that occurred in July of 2001. This evaluation determined the temperatures of various components of the packages, including the seals, using temperatures resulting from models of the Baltimore tunnel fire (as boundary conditions) and finite element models of the SNF packages. For two of the packages evaluated, the analyses indicated that the seals used would have exceeded their continuous-use rated service temperatures, meaning the release of radioactive material could not be ruled out with available information; However, for both of the packages evaluated, the analysis determined, by a bounding calculation, that the maximum potential release was well below the regulatory requirements for releases from a SNF package during the hypothetical accident condition (HAC) sequence of events in 10CFR Part 71. The NRC is investigating the performance of seals in SNF transportation packages exposed to fires that could exceed the HAC fire described in 10CFR Part 71, such as the Baltimore Tunnel Fire that occurred in 2001. The performance of package seals is important for determining the potential release of radioactive material from a package during a beyond-design-basis accident. The seals have lower temperature limits than other package components and are the containment barrier between the environment and the cask contents. The NRC Office of Nuclear Regulatory Research contracted the National Institute of Standards and Technology (NIST) to conduct small-scale thermal testing to obtain experimental data of the performance of seals during extreme temperature exposures. The experimental testing

  1. Basis of Design and Seismic Action for Long Suspension Bridges: the case of the Messina Strait Bridge

    SciTech Connect

    Bontempi, Franco

    2008-07-08

    The basis of design for complex structures like suspension bridges is reviewed. Specific attention is devoted to seismic action and to the performance required and to the connected structural analysis. Uncertainty is specially addressed by probabilistic and soft-computing techniques. The paper makes punctual reference to the work end the experience developed during the last years for the re-design of the Messina Strait Bridge.

  2. Optical design and tolerancing of freeform surfaces using anisotropic radial basis functions

    NASA Astrophysics Data System (ADS)

    Maksimovic, Milan

    2016-07-01

    We investigate use of the anisotropic radial basis functions expansion as a means to represent surface errors on aspheric and freeform surfaces. We show how the optimal choice of the shape parameter and the placement of radial basis function (RBF) nodes can increase accuracy of the surface approximation. We show an example of the adaptive grid refinement. In our approach, complex surfaces are modeled with general arbitrary representation while the anisotropic RBFs expansion models perturbation of the base surface. We show how both the global and the localized surface errors can be modeled across a wide spatial frequency range. With our method, the impact of the structured surface errors on the arbitrary surfaces when applied on the standardized image quality metrics can be assessed for the purpose of optical tolerancing.

  3. 105-K Basin material design basis feed description for spent nuclear fuel project facilities

    SciTech Connect

    Praga, A.N.

    1998-01-08

    Revisions 0 and 0A of this document provided estimated chemical and radionuclide inventories of spent nuclear fuel and sludge currently stored within the Hanford Site`s 105-K Basins. This Revision (Rev. 1) incorporates the following changes into Revision 0A: (1) updates the tables to reflect: improved cross section data, a decision to use accountability data as the basis for total Pu, a corrected methodology for selection of the heat generation basis fee, and a revised decay date; (2) adds section 3.3.3.1 to expand the description of the approach used to calculate the inventory values and explain why that approach yields conservative results; (3) changes the pre-irradiation braze beryllium value.

  4. Basis of Accreditation for Educational Programs in Designated Health Science Professions.

    ERIC Educational Resources Information Center

    Canadian Medical Association, Ottawa (Ontario).

    Designed as a guide to accreditation for educational programs in designated health science professions in Canada, this report provides educators with guidelines, general requirements, and requirements for specific programs. Following information on the organization, structure, goals, mission, values, philosophy, and terminology of accreditation of…

  5. Somatic mutations in PI3K[alpha]: Structural basis for enzyme activation and drug design

    SciTech Connect

    Gabelli, Sandra B.; Mandelker, Diana; Schmidt-Kittler, Oleg; Vogelstein, Bert; Amzel, L. Mario

    2011-09-06

    The PI3K pathway is a communication hub coordinating critical cell functions including cell survival, cell growth, proliferation, motility and metabolism. Because PI3K{alpha} harbors recurrent somatic mutations resulting in gains of function in human cancers, it has emerged as an important drug target for many types of solid tumors. Various PI3K isoforms are also being evaluated as potential therapeutic targets for inflammation, heart disease, and hematological malignancies. Structural biology is providing insights into the flexibility of the PI3Ks, and providing basis for understanding the effects of mutations, drug resistance and specificity.

  6. Somatic Mutations in PI3Kalpha: Structural Basis for Enzyme Activation and Drug Design

    SciTech Connect

    S Gabelli; D Mandelker; O Schmidt-Kittler; B Vogelstein; L Amzel

    2011-12-31

    The PI3K pathway is a communication hub coordinating critical cell functions including cell survival, cell growth, proliferation, motility and metabolism. Because PI3K{alpha} harbors recurrent somatic mutations resulting in gains of function in human cancers, it has emerged as an important drug target for many types of solid tumors. Various PI3K isoforms are also being evaluated as potential therapeutic targets for inflammation, heart disease, and hematological malignancies. Structural biology is providing insights into the flexibility of the PI3Ks, and providing basis for understanding the effects of mutations, drug resistance and specificity.

  7. Probabilistic risk assessment for the Los Alamos Meson Physics Facility worst-case design-basis accident

    SciTech Connect

    Sharirli, M.; Butner, J.M.; Rand, J.L.; Macek, R.J.; McKinney, S.J.; Roush, M.L.

    1992-12-01

    This paper presents results from a Los Alamos National Laboratory Engineering and Safety Analysis Group assessment of the worse-case design-basis accident associated with the Clinton P. Anderson Meson Physics Facility (LAMPF)/Weapons Neutron Research (WNR) Facility. The primary goal of the analysis was to quantify the accident sequences that result in personnel radiation exposure in the WNR Experimental Hall following the worst-case design-basis accident, a complete spill of the LAMPF accelerator 1L beam. This study also provides information regarding the roles of hardware systems and operators in these sequences, and insights regarding the areas where improvements can increase facility-operation safety. Results also include confidence ranges to incorporate combined effects of uncertainties in probability estimates and importance measures to determine how variations in individual events affect the frequencies in accident sequences.

  8. Probabilistic risk assessment for the Los Alamos Meson Physics Facility worst-case design-basis accident

    SciTech Connect

    Sharirli, M.; Butner, J.M.; Rand, J.L.; Macek, R.J. ); McKinney, S.J. ); Roush, M.L. . Center for Reliability Engineering)

    1992-01-01

    This paper presents results from a Los Alamos National Laboratory Engineering and Safety Analysis Group assessment of the worse-case design-basis accident associated with the Clinton P. Anderson Meson Physics Facility (LAMPF)/Weapons Neutron Research (WNR) Facility. The primary goal of the analysis was to quantify the accident sequences that result in personnel radiation exposure in the WNR Experimental Hall following the worst-case design-basis accident, a complete spill of the LAMPF accelerator 1L beam. This study also provides information regarding the roles of hardware systems and operators in these sequences, and insights regarding the areas where improvements can increase facility-operation safety. Results also include confidence ranges to incorporate combined effects of uncertainties in probability estimates and importance measures to determine how variations in individual events affect the frequencies in accident sequences.

  9. The Concept of Fashion Design on the Basis of Color Coordination Using White LED Lighting

    NASA Astrophysics Data System (ADS)

    Mizutani, Yumiko; Taguchi, Tsunemasa

    This thesis focuses on the development of fashion design, especially a dress coordinated with White LED Lighting (=LED). As for the design concept a fusion of the advanced science and local culture was aimed for. For such a reason this development is a very experimental one. Here in particular I handled an Imperial Court dinner dress for the last Japanese First Lady, Mrs. Akie Abe who wore it at the Imperial Court dinner for the Indonesian First Couple held on November 2006 to. This dress made by Prof. T. Taguchi and I open up a new field in the dress design.

  10. Designing Smart Artifacts for Adaptive Mediation of Social Viscosity: Triadic Actor-Network Enactments as a Basis for Interaction Design

    ERIC Educational Resources Information Center

    Salamanca, Juan

    2012-01-01

    With the advent of ubiquitous computing, interaction design has broadened its object of inquiry into how smart computational artifacts inconspicuously act in people's everyday lives. Although user-centered design approaches remains useful for exploring how people cope with interactive systems, they cannot explain how this new breed of…

  11. Ground motion following selection of SRS design basis earthquake and associated deterministic approach. Final report: Revision 1

    SciTech Connect

    Not Available

    1991-03-01

    This report summarizes the results of a deterministic assessment of earthquake ground motions at the Savannah River Site (SRS). The purpose of this study is to assist the Environmental Sciences Section of the Savannah River Laboratory in reevaluating the design basis earthquake (DBE) ground motion at SRS during approaches defined in Appendix A to 10 CFR Part 100. This work is in support of the Seismic Engineering Section`s Seismic Qualification Program for reactor restart.

  12. Mechatronic design of strongly nonlinear systems on a basis of three wheeled mobile platform

    NASA Astrophysics Data System (ADS)

    Kaliński, Krzysztof J.; Buchholz, Cezary

    2015-02-01

    Remarkable grow in demand both of mobile platform operability performance and reduction of project leading time development encourage to apply modern algorithms and reliable engineering tools for the design process. The paper discusses the mechatronic design applied for the surveillance system based on the energy performance index algorithm. The exploited mechatronic techniques i.e. virtual prototyping, Hardware-In-the-Loop Simulation (HILS) and rapid prototyping on target object, supported by the LabVIEW, allowed for integration of the developed control system and strongly nonlinear mobile platform, built simultaneously for the research purposes. Mathematical complexity of on-line algorithm and sophisticated model description affected all the process design. In order to boost mobile platform performance and handle its real time motion surveillance the authors implemented the Real Time controller. The presented design approach allowed authors to achieve the highest level of a mobile platform performance and increased probability of the final concept success.

  13. Design, Synthesis, and Biological Evaluation of Novel Nonsteroidal Farnesoid X Receptor (FXR) Antagonists: Molecular Basis of FXR Antagonism.

    PubMed

    Huang, Huang; Si, Pei; Wang, Lei; Xu, Yong; Xu, Xin; Zhu, Jin; Jiang, Hualiang; Li, Weihua; Chen, Lili; Li, Jian

    2015-07-01

    Farnesoid X receptor (FXR) plays an important role in the regulation of cholesterol, lipid, and glucose metabolism. Recently, several studies on the molecular basis of FXR antagonism have been reported. However, none of these studies employs an FXR antagonist with nonsteroidal scaffold. On the basis of our previously reported FXR antagonist with a trisubstituted isoxazole scaffold, a novel nonsteroidal FXR ligand was designed and used as a lead for structural modification. In total, 39 new trisubstituted isoxazole derivatives were designed and synthesized, which led to pharmacological profiles ranging from agonist to antagonist toward FXR. Notably, compound 5s (4'-[(3-{[3-(2-chlorophenyl)-5-(2-thienyl)isoxazol-4-yl]methoxy}-1H-pyrazol-1-yl)methyl]biphenyl-2-carboxylic acid), containing a thienyl-substituted isoxazole ring, displayed the best antagonistic activity against FXR with good cellular potency (IC50 =12.2 ± 0.2 μM). Eventually, this compound was used as a probe in a molecular dynamics simulation assay. Our results allowed us to propose an essential molecular basis for FXR antagonism, which is consistent with a previously reported antagonistic mechanism; furthermore, E467 on H12 was found to be a hot-spot residue and may be important for the future design of nonsteroidal antagonists of FXR. PMID:25982493

  14. Theoretical Basis of the Test-Negative Study Design for Assessment of Influenza Vaccine Effectiveness.

    PubMed

    Sullivan, Sheena G; Tchetgen Tchetgen, Eric J; Cowling, Benjamin J

    2016-09-01

    Influenza viruses undergo frequent antigenic changes. As a result, the viruses circulating change within and between seasons, and the composition of the influenza vaccine is updated annually. Thus, estimation of the vaccine's effectiveness is not constant across seasons. In order to provide annual estimates of the influenza vaccine's effectiveness, health departments have increasingly adopted the "test-negative design," using enhanced data from routine surveillance systems. In this design, patients presenting to participating general practitioners with influenza-like illness are swabbed for laboratory testing; those testing positive for influenza virus are defined as cases, and those testing negative form the comparison group. Data on patients' vaccination histories and confounder profiles are also collected. Vaccine effectiveness is estimated from the odds ratio comparing the odds of testing positive for influenza among vaccinated patients and unvaccinated patients, adjusting for confounders. The test-negative design is purported to reduce bias associated with confounding by health-care-seeking behavior and misclassification of cases. In this paper, we use directed acyclic graphs to characterize potential biases in studies of influenza vaccine effectiveness using the test-negative design. We show how studies using this design can avoid or minimize bias and where bias may be introduced with particular study design variations. PMID:27587721

  15. Target Area design basis and system performance for the National Ignition Facility. Revision 1

    SciTech Connect

    Tobin, M.; Karpenko, V.; Hagans, K.; Anderson, A.; Latkowski, J.; Warren, R.; Wavrik, R.; Garcia, R.; Boyes, J.

    1994-10-01

    The NIF Target Area is designed to confine the ICF target experiments leading up to and including fusion ignition and gain. The Target Area will provide appropriate in-chamber conditions before, during, and after each shot. The repeated introduction of large amounts of laser energy into the chamber and emission of fusion energy from targets represents a new challenge in ICF facility design. Prior to a shot, the facility provides proper illumination geometry, target chamber vacuum, and a stable platform for the target and its diagnostics. During a shot, the impact of the energy introduced into the chamber is minimized, and workers and the public are protected from excessive prompt radiation doses. After the shot, the residual radioactivation is managed to allow required accessibility. Tritium and other radioactive wastes are confined and disposed of. Diagnostic data is also retrieved, and the facility is readied for the next shot. The Target Area will accommodate yields up to 20 MJ, and its design lifetime is 30 years. The Target Area provides the personnel access needed to support the use precision diagnostics. The annual shot mix for design purposes is shown. Designing to this experimental envelope ensures the ability and flexibility to move through the experimental campaign to ignition efficiently.

  16. Contribution to the United States position paper on sodium fires: Design basis and testing

    SciTech Connect

    McCormack, J.D.

    1988-06-01

    There were four large-scale sodium fire tests completed to provide a data base for computer code validation; three for the ABCOVE program and one for the SOFICOV program. The purpose of the ABCOVE program is to provide a basis for judging the adequacy of existing aerosol behavior computer codes to describe inherent aerosol attenuation in containment buildings during postulated accidents. The program involves both analytical calculations by code developers and users, and large-scale confirmatory tests in the 850-m/sup 3/ containment vessel of the Containment Systems Test Facility (CSTF) operated by the Westinghouse Hanford Company. A key element of both programs is that all code calculations are made without knowledge of the experimental results, and thus, provide a true measure of the code capabilities without benefit of post-test fitting.

  17. Physics basis for an axicell design for the end plugs of MFTF-B

    SciTech Connect

    Baldwin, D.E.; Logan, B.G.

    1982-04-21

    The primary motivation for conversion of MFTF-B to an axicell configuration lies in its engineering promise as a reactor geometry based on circular high-magnetic-field coils. In comparing this configuration to the previous A-cell geometry, we find a number of differences that might significantly affect the physics performance. The purpose of the present document is to examine those features and to assess their impact on the performance of the axicell, as compared to the A-cell configuration, for MFTF-B. In so doing, we address only those issues thought to be affected by the change in geometry and refer to the original report Physics Basis for MFTF-B, for discussion of those issues thought not to be affected. In Sec. 1, we summarize these physics issues. In Sec. 2, we describe operating scenarios in the new configuration. In the Appendices, we discuss those physics issues that require more detailed treatment.

  18. Path-Goal Models as a Basis for the Design of Organization Reward Systems.

    ERIC Educational Resources Information Center

    Galbraith, Jay R.

    The purpose of this paper has been to argue the usefulness of path-goal models in theoretical research and practical design of organization reward systems. The reasoning is that the policy choices can be easily related to path-goal attitudes which, in turn, are related to behavior. The major policy choices were identified and related to path-goal…

  19. Reducing Production Basis Risk through Rainfall Intensity Frequency (RIF) Indexes: Global Sensitivity Analysis' Implication on Policy Design

    NASA Astrophysics Data System (ADS)

    Muneepeerakul, Chitsomanus; Huffaker, Ray; Munoz-Carpena, Rafael

    2016-04-01

    The weather index insurance promises financial resilience to farmers struck by harsh weather conditions with swift compensation at affordable premium thanks to its minimal adverse selection and moral hazard. Despite these advantages, the very nature of indexing causes the presence of "production basis risk" that the selected weather indexes and their thresholds do not correspond to actual damages. To reduce basis risk without additional data collection cost, we propose the use of rain intensity and frequency as indexes as it could offer better protection at the lower premium by avoiding basis risk-strike trade-off inherent in the total rainfall index. We present empirical evidences and modeling results that even under the similar cumulative rainfall and temperature environment, yield can significantly differ especially for drought sensitive crops. We further show that deriving the trigger level and payoff function from regression between historical yield and total rainfall data may pose significant basis risk owing to their non-unique relationship in the insured range of rainfall. Lastly, we discuss the design of index insurance in terms of contract specifications based on the results from global sensitivity analysis.

  20. A basis for solid modeling of gear teeth with application in design and manufacture

    NASA Technical Reports Server (NTRS)

    Huston, Ronald L.; Mavriplis, Dimitrios; Oswald, Fred B.; Liu, Yung Sheng

    1992-01-01

    A new approach to modeling gear tooth surfaces is discussed. A computer graphics solid modeling procedure is used to simulate the tooth fabrication process. This procedure is based on the principles of differential geometry that pertain to envelopes of curves and surfaces. The procedure is illustrated with the modeling of spur, helical, bevel, spiral bevel, and hypoid gear teeth. Applications in design and manufacturing are discussed. Extensions to nonstandard tooth forms, to cams, and to rolling element bearings are proposed.

  1. A Basis for Solid Modeling of Gear Teeth with Application in Design and Manufacture

    NASA Technical Reports Server (NTRS)

    Huston, Ronald L.; Mavriplis, Dimitrios; Oswald, Fred B.; Liu, Yung Sheng

    1994-01-01

    This paper discusses a new approach to modeling gear tooth surfaces. A computer graphics solid modeling procedure is used to simulate the tooth fabrication processes. This procedure is based on the principles of differential geometry that pertain to envelopes of curves and surfaces. The procedure is illustrated with the modeling of spur, helical, bevel, spiral bevel and hypoid gear teeth. Applications in design and manufacturing arc discussed. Extensions to nonstandard tooth forms, to cams, and to rolling element hearings are proposed.

  2. Exploratory Shaft Seismic Design Basis Working Group report; Yucca Mountain Project

    SciTech Connect

    Subramanian, C.V.; King, J.L.; Perkins, D.M.; Mudd, R.W.; Richardson, A.M.; Calovini, J.C.; Van Eeckhout, E.; Emerson, D.O.

    1990-08-01

    This report was prepared for the Yucca Mountain Project (YMP), which is managed by the US Department of Energy. The participants in the YMP are investigating the suitability of a site at Yucca Mountain, Nevada, for construction of a repository for high-level radioactive waste. An exploratory shaft facility (ESF) will be constructed to permit site characterization. The major components of the ESF are two shafts that will be used to provide access to the underground test areas for men, utilities, and ventilation. If a repository is constructed at the site, the exploratory shafts will be converted for use as intake ventilation shafts. In the context of both underground nuclear explosions (conducted at the nearby Nevada Test Site) and earthquakes, the report contains discussions of faulting potential at the site, control motions at depth, material properties of the different rock layers relevant to seismic design, the strain tensor for each of the waveforms along the shaft liners, and the method for combining the different strain components along the shaft liners. The report also describes analytic methods, assumptions used to ensure conservatism, and uncertainties in the data. The analyses show that none of the shafts` structures, systems, or components are important to public radiological safety; therefore, the shafts need only be designed to ensure worker safety, and the report recommends seismic design parameters appropriate for this purpose. 31 refs., 5 figs., 6 tabs.

  3. Investigation of web server access as a basis for designing video-on-demand systems

    NASA Astrophysics Data System (ADS)

    Venkatesh, Dinesh; Little, Thomas D.

    1996-01-01

    The performance of a video-on-demand server is affected by the dynamics of user accesses behavior. Most existing efforts consider static user request distributions in their design which can lead to poor performance if the accesses are different from that predicted. Even the use of a video store model to characterize user requests fails to account for the interactive nature of access. This suggests that better models for characterizing user behavior are necessary. In the recent past, the World Wide Web has become the most popular means for interactive information delivery. The World Wide Web represents a truly interactive medium with the user having complete control over presentation. Moreover, the performance bottleneck in the World Wide Web is more often the network than the server making it an ideal candidate to understand issues in serving interactive video. In this paper we study access behavior in a World Wide Web server and techniques to apply these observations in the design of a video- on-demand server.

  4. Structural basis for the design of selective phosphodiesterase 4B inhibitors.

    PubMed

    Fox, David; Burgin, Alex B; Gurney, Mark E

    2014-03-01

    Phosphodiesterase-4B (PDE4B) regulates the pro-inflammatory Toll Receptor -Tumor Necrosis Factor α (TNFα) pathway in monocytes, macrophages and microglial cells. As such, it is an important, although under-exploited molecular target for anti-inflammatory drugs. This is due in part to the difficulty of developing selective PDE4B inhibitors as the amino acid sequence of the PDE4 active site is identical in all PDE4 subtypes (PDE4A-D). We show that highly selective PDE4B inhibitors can be designed by exploiting sequence differences outside the active site. Specifically, PDE4B selectivity can be achieved by capture of a C-terminal regulatory helix, now termed CR3 (Control Region 3), across the active site in a conformation that closes access by cAMP. PDE4B selectivity is driven by a single amino acid polymorphism in CR3 (Leu674 in PDE4B1 versus Gln594 in PDE4D). The reciprocal mutations in PDE4B and PDE4D cause a 70-80 fold shift in selectivity. Our structural studies show that CR3 is flexible and can adopt multiple orientations and multiple registries in the closed conformation. The new co-crystal structure with bound ligand provides a guide map for the design of PDE4B selective anti-inflammatory drugs. PMID:24361374

  5. Investigation of techniques for the development of seismic design basis using the probabilistic seismic hazard analysis

    SciTech Connect

    Bernreuter, D.L.; Boissonnade, A.C.; Short, C.M.

    1998-04-01

    The Nuclear Regulatory Commission asked Lawrence Livermore National Laboratory to form a group of experts to assist them in revising the seismic and geologic siting criteria for nuclear power plants, Appendix A to 10 CFR Part 100. This document describes a deterministic approach for determining a Safe Shutdown Earthquake (SSE) Ground Motion for a nuclear power plant site. One disadvantage of this approach is the difficulty of integrating differences of opinions and differing interpretations into seismic hazard characterization. In answer to this, probabilistic seismic hazard assessment methodologies incorporate differences of opinion and interpretations among earth science experts. For this reason, probabilistic hazard methods were selected for determining SSEs for the revised regulation, 10 CFR Part 100.23. However, because these methodologies provide a composite analysis of all possible earthquakes that may occur, they do not provide the familiar link between seismic design loading requirements and engineering design practice. Therefore, approaches used to characterize seismic events (magnitude and distance) which best represent the ground motion level determined with the probabilistic hazard analysis were investigated. This report summarizes investigations conducted at 69 nuclear reactor sites in the central and eastern U.S. for determining SSEs using probabilistic analyses. Alternative techniques are presented along with justification for key choices. 16 refs., 32 figs., 60 tabs.

  6. Early Site Permit Demonstration Program: Guidelines for determining design basis ground motions. Volume 1

    SciTech Connect

    Not Available

    1993-03-18

    This report develops and applies a methodology for estimating strong earthquake ground motion. The motivation was to develop a much needed tool for use in developing the seismic requirements for structural designs. An earthquake`s ground motion is a function of the earthquake`s magnitude, and the physical properties of the earth through which the seismic waves travel from the earthquake fault to the site of interest. The emphasis of this study is on ground motion estimation in Eastern North America (east of the Rocky Mountains), with particular emphasis on the Eastern United States and southeastern Canada. Eastern North America is a stable continental region, having sparse earthquake activity with rare occurrences of large earthquakes. While large earthquakes are of interest for assessing seismic hazard, little data exists from the region to empirically quantify their effects. Therefore, empirically based approaches that are used for other regions, such as Western North America, are not appropriate for Eastern North America. Moreover, recent advances in science and technology have now made it possible to combine theoretical and empirical methods to develop new procedures and models for estimating ground motion. The focus of the report is on the attributes of ground motion in Eastern North America that are of interest for the design of facilities such as nuclear power plants. Specifically considered are magnitudes M from 5 to 8, distances from 0 to 500 km, and frequencies from 1 to 35 Hz.

  7. Modeling of the Reactor Core Isolation Cooling Response to Beyond Design Basis Operations - Interim Report

    SciTech Connect

    Ross, Kyle; Cardoni, Jeffrey N.; Wilson, Chisom Shawn; Morrow, Charles; Osborn, Douglas; Gauntt, Randall O.

    2015-12-01

    Efforts are being pursued to develop and qualify a system-level model of a reactor core isolation (RCIC) steam-turbine-driven pump. The model is being developed with the intent of employing it to inform the design of experimental configurations for full-scale RCIC testing. The model is expected to be especially valuable in sizing equipment needed in the testing. An additional intent is to use the model in understanding more fully how RCIC apparently managed to operate far removed from its design envelope in the Fukushima Daiichi Unit 2 accident. RCIC modeling is proceeding along two avenues that are expected to complement each other well. The first avenue is the continued development of the system-level RCIC model that will serve in simulating a full reactor system or full experimental configuration of which a RCIC system is part. The model reasonably represents a RCIC system today, especially given design operating conditions, but lacks specifics that are likely important in representing the off-design conditions a RCIC system might experience in an emergency situation such as a loss of all electrical power. A known specific lacking in the system model, for example, is the efficiency at which a flashing slug of water (as opposed to a concentrated jet of steam) could propel the rotating drive wheel of a RCIC turbine. To address this specific, the second avenue is being pursued wherein computational fluid dynamics (CFD) analyses of such a jet are being carried out. The results of the CFD analyses will thus complement and inform the system modeling. The system modeling will, in turn, complement the CFD analysis by providing the system information needed to impose appropriate boundary conditions on the CFD simulations. The system model will be used to inform the selection of configurations and equipment best suitable of supporting planned RCIC experimental testing. Preliminary investigations with the RCIC model indicate that liquid water ingestion by the turbine

  8. Basis of human factors methodology applied in the Westinghouse AP600 design

    SciTech Connect

    Carrera, J.P.; Easter, J.R. )

    1992-01-01

    The incident at Three Mile Island Unit 2 brought about an awareness that there is a need for a new perspective on nuclear power plant operator performance. It was discerned that besides executing control actions, the operator needs an additional role, that of systems supervisor-someone who considers plant health at the functional level of how all the plant processes are related and how they perform with regard to the high-level operational goals of the plant. Westinghouse has taken the initiative to apply these ideas in dealing with the operator by studying the work of Rasmussen of Denmark's Riso Laboratory, regarding knowledge-based behavior and the requirements for supporting the cognitive processes required of an operator. This has led to the Westinghouse Man-Machine-Interface System (MMIS) design process.

  9. TRAC analysis of design basis events for the accelerator production of tritium target/blanket

    SciTech Connect

    Lin, J.C.; Elson, J.

    1997-08-01

    A two-loop primary cooling system with a residual heat removal system was designed to mitigate the heat generated in the tungsten neutron source rods inside the rungs of the ladders and the shell of the rungs. The Transient Reactor Analysis Code (TRAC) was used to analyze the thermal-hydraulic behavior of the primary cooling system during a pump coastdown transient; a cold-leg, large-break loss-of-coolant accident (LBLOCA); a hot-leg LBLOCA; and a target downcomer LBLOCA. The TRAC analysis results showed that the heat generated in the tungsten neutron source rods can be mitigated by the primary cooling system for the pump coastdown transient and all the LBLOCAs except the target downcomer LBLOCA. For the target downcomer LBLOCA, a cavity flood system is required to fill the cavity with water at a level above the large fixed headers.

  10. Early Site Permit Demonstration Program: Guidelines for determining design basis ground motions. Volume 2, Appendices

    SciTech Connect

    Not Available

    1993-03-18

    This report develops and applies a methodology for estimating strong earthquake ground motion. The motivation was to develop a much needed tool for use in developing the seismic requirements for structural designs. An earthquake`s ground motion is a function of the earthquake`s magnitude, and the physical properties of the earth through which the seismic waves travel from the earthquake fault to the site of interest. The emphasis of this study is on ground motion estimation in Eastern North America (east of the Rocky Mountains), with particular emphasis on the Eastern United States and southeastern Canada. Eastern North America is a stable continental region, having sparse earthquake activity with rare occurrences of large earthquakes. While large earthquakes are of interest for assessing seismic hazard, little data exists from the region to empirically quantify their effects. The focus of the report is on the attributes of ground motion in Eastern North America that are of interest for the design of facilities such as nuclear power plants. This document, Volume II, contains Appendices 2, 3, 5, 6, and 7 covering the following topics: Eastern North American Empirical Ground Motion Data; Examination of Variance of Seismographic Network Data; Soil Amplification and Vertical-to-Horizontal Ratios from Analysis of Strong Motion Data From Active Tectonic Regions; Revision and Calibration of Ou and Herrmann Method; Generalized Ray Procedure for Modeling Ground Motion Attenuation; Crustal Models for Velocity Regionalization; Depth Distribution Models; Development of Generic Site Effects Model; Validation and Comparison of One-Dimensional Site Response Methodologies; Plots of Amplification Factors; Assessment of Coupling Between Vertical & Horizontal Motions in Nonlinear Site Response Analysis; and Modeling of Dynamic Soil Properties.

  11. Open literature review of threats including sabotage and theft of fissile material transport in Japan.

    SciTech Connect

    Cochran, John Russell; Furaus, James Phillip; Marincel, Michelle K.

    2005-06-01

    This report is a review of open literature concerning threats including sabotage and theft related to fissile material transport in Japan. It is intended to aid Japanese officials in the development of a design basis threat. This threat includes the external threats of the terrorist, criminal, and extremist, and the insider threats of the disgruntled employee, the employee forced into cooperation via coercion, the psychotic employee, and the criminal employee. Examination of the external terrorist threat considers Japanese demographics, known terrorist groups in Japan, and the international relations of Japan. Demographically, Japan has a relatively homogenous population, both ethnically and religiously. Japan is a relatively peaceful nation, but its history illustrates that it is not immune to terrorism. It has a history of domestic terrorism and the open literature points to the Red Army, Aum Shinrikyo, Chukaku-Ha, and Seikijuku. Japan supports the United States in its war on terrorism and in Iraq, which may make Japan a target for both international and domestic terrorists. Crime appears to remain low in Japan; however sources note that the foreign crime rate is increasing as the number of foreign nationals in the country increases. Antinuclear groups' recent foci have been nuclear reprocessing technology, transportation of MOX fuel, and possible related nuclear proliferation issues. The insider threat is first defined by the threat of the disgruntled employee. This threat can be determined by studying the history of Japan's employment system, where Keiretsu have provided company stability and lifetime employment. Recent economic difficulties and an increase of corporate crime, due to sole reliability on the honor code, have begun to erode employee loyalty.

  12. Healthcare Stereotype Threat in Older Adults in the Health and Retirement Study

    PubMed Central

    Abdou, Cleopatra M.; Fingerhut, Adam W.; Jackson, James S.; Wheaton, Felicia

    2016-01-01

    Introduction Healthcare stereotype threat is the threat of being personally reduced to group stereotypes that commonly operate within the healthcare domain, including stereotypes regarding unhealthy lifestyles and inferior intelligence. The objective of this study was to assess the extent to which people fear being judged in healthcare contexts on several characteristics, including race/ethnicity and age, and to test predictions that experience of such threats would be connected with poorer health and negative perceptions of health care. Methods Data were collected as part of the 2012 Health and Retirement Study (HRS). A module on healthcare stereotype threat, designed by the research team, was administered to a random subset (n=2,048 of the total 20,555) of HRS participants. The final sample for the present healthcare stereotype threat experiment consists of 1,479 individuals. Logistic regression was used to test whether healthcare stereotype threat was associated with self-rated health, reported hypertension, and depressive symptoms, as well as with healthcare-related outcomes, including physician distrust, dissatisfaction with health care, and preventative care use. Results Seventeen percent of respondents reported healthcare stereotype threat with respect to one or more aspects of their identities. As predicted, healthcare stereotype threat was associated with higher physician distrust and dissatisfaction with health care, poorer mental and physical health (i.e., self-rated health, hypertension, and depressive symptoms), and lower odds of receiving the influenza vaccine. Conclusions The first of its kind, this study demonstrates that people can experience healthcare stereotype threat on the basis of various stigmatized aspects of social identity, and that these experiences can be linked with larger health and healthcare-related outcomes, thereby contributing to disparities among minority groups. PMID:26497263

  13. Fundamental basis and implementation of shell and tube heat exchanger project design: condenser and evaporator study

    NASA Astrophysics Data System (ADS)

    Dalkilic, A. S.; Acikgoz, O.; Tapan, S.; Wongwises, S.

    2016-03-01

    A shell and tube heat exchanger is used as a condenser and an evaporator in this theoretical study. Parametric performance analyses for various actual refrigerants were performed using well-known correlations in open sources. Condensation and evaporation were occurred in the shell side while the water was flowing in the tube side of heat exchanger. Heat transfer rate from tube side was kept constant for condenser and evaporator design. Condensing temperatures were varied from 35 to 60 °C whereas evaporating temperatures were ranging from -15 to 10 °C for the refrigerants of R12, R22, R134a, R32, R507A, R404A, R502, R407C, R152A, R410A and R1234ZE. Variation of convective heat transfer coefficients of refrigerants, total heat transfer coefficients with Reynolds numbers and saturation temperatures were given as validation process considering not only fouling resistance and omission of it but also staggered (triangular) and line (square) arrangements. The minimum tube lengths and necessary pumping powers were calculated and given as case studies for the investigated refrigerants considering validation criteria. It was understood that refrigerant type, fouling resistance and arrangement type are one of the crucial issues regarding the determination of heat exchanger's size and energy consumption. Consequently, R32 and R152a were found to require the shortest tube length and lowest pumping power in the condenser, whereas R507 and R407C have the same advantages in the evaporator. Their heat transfer coefficients were also determined larger than others as expectedly.

  14. Structural basis of glycogen branching enzyme deficiency and pharmacologic rescue by rational peptide design

    PubMed Central

    Froese, D. Sean; Michaeli, Amit; McCorvie, Thomas J.; Krojer, Tobias; Sasi, Meitav; Melaev, Esther; Goldblum, Amiram; Zatsepin, Maria; Lossos, Alexander; Álvarez, Rafael; Escribá, Pablo V.; Minassian, Berge A.; von Delft, Frank; Kakhlon, Or; Yue, Wyatt W.

    2015-01-01

    Glycogen branching enzyme 1 (GBE1) plays an essential role in glycogen biosynthesis by generating α-1,6-glucosidic branches from α-1,4-linked glucose chains, to increase solubility of the glycogen polymer. Mutations in the GBE1 gene lead to the heterogeneous early-onset glycogen storage disorder type IV (GSDIV) or the late-onset adult polyglucosan body disease (APBD). To better understand this essential enzyme, we crystallized human GBE1 in the apo form, and in complex with a tetra- or hepta-saccharide. The GBE1 structure reveals a conserved amylase core that houses the active centre for the branching reaction and harbours almost all GSDIV and APBD mutations. A non-catalytic binding cleft, proximal to the site of the common APBD mutation p.Y329S, was found to bind the tetra- and hepta-saccharides and may represent a higher-affinity site employed to anchor the complex glycogen substrate for the branching reaction. Expression of recombinant GBE1-p.Y329S resulted in drastically reduced protein yield and solubility compared with wild type, suggesting this disease allele causes protein misfolding and may be amenable to small molecule stabilization. To explore this, we generated a structural model of GBE1-p.Y329S and designed peptides ab initio to stabilize the mutation. As proof-of-principle, we evaluated treatment of one tetra-peptide, Leu-Thr-Lys-Glu, in APBD patient cells. We demonstrate intracellular transport of this peptide, its binding and stabilization of GBE1-p.Y329S, and 2-fold increased mutant enzymatic activity compared with untreated patient cells. Together, our data provide the rationale and starting point for the screening of small molecule chaperones, which could become novel therapies for this disease. PMID:26199317

  15. Preliminary scoping safety analyses of the limiting design basis protected accidents for the Fast Flux Test Facility tritium production core

    SciTech Connect

    Heard, F.J.

    1997-11-19

    The SAS4A/SASSYS-l computer code is used to perform a series of analyses for the limiting protected design basis transient events given a representative tritium and medical isotope production core design proposed for the Fast Flux Test Facility. The FFTF tritium and isotope production mission will require a different core loading which features higher enrichment fuel, tritium targets, and medical isotope production assemblies. Changes in several key core parameters, such as the Doppler coefficient and delayed neutron fraction will affect the transient response of the reactor. Both reactivity insertion and reduction of heat removal events were analyzed. The analysis methods and modeling assumptions are described. Results of the analyses and comparison against fuel pin performance criteria are presented to provide quantification that the plant protection system is adequate to maintain the necessary safety margins and assure cladding integrity.

  16. Geological and seismological survey for new design-basis earthquake ground motion of Kashiwazaki-Kariwa NPS

    NASA Astrophysics Data System (ADS)

    Takao, M.; Mizutani, H.

    2009-05-01

    At about 10:13 on July 16, 2007, a strong earthquake named 'Niigata-ken Chuetsu-oki Earthquake' of Mj6.8 on Japan Meteorological Agencyfs scale occurred offshore Niigata prefecture in Japan. However, all of the nuclear reactors at Kashiwazaki-Kariwa Nuclear Power Station (KKNPS) in Niigata prefecture operated by Tokyo Electric Power Company shut down safely. In other words, automatic safety function composed of shutdown, cooling and containment worked as designed immediately after the earthquake. During the earthquake, the peak acceleration of the ground motion exceeded the design-basis ground motion (DBGM), but the force due to the earthquake applied to safety-significant facilities was about the same as or less than the design basis taken into account as static seismic force. In order to assess anew the safety of nuclear power plants, we have evaluated a new DBGM after conducting geomorphological, geological, geophysical, seismological survey and analyses. [Geomorphological, Geological and Geophysical survey] In the land area, aerial photograph interpretation was performed at least within the 30km radius to extract geographies that could possibly be tectonic reliefs as a geomorphological survey. After that, geological reconnaissance was conducted to confirm whether the extracted landforms are tectonic reliefs or not. Especially we carefully investigated Nagaoka Plain Western Boundary Fault Zone (NPWBFZ), which consists of Kakuda-Yahiko fault, Kihinomiya fault and Katakai fault, because NPWBFZ is the one of the active faults which have potential of Mj8 class in Japan. In addition to the geological survey, seismic reflection prospecting of approximate 120km in total length was completed to evaluate the geological structure of the faults and to assess the consecutiveness of the component faults of NPWBFZ. As a result of geomorphological, geological and geophysical surveys, we evaluated that the three component faults of NPWBFZ are independent to each other from the

  17. Threat in Context: School Moderation of the Impact of Social Identity Threat on Racial/Ethnic Achievement Gaps

    ERIC Educational Resources Information Center

    Hanselman, Paul; Bruch, Sarah K.; Gamoran, Adam; Borman, Geoffrey D.

    2014-01-01

    Schools with very few and relatively low-performing marginalized students may be most likely to trigger social identity threats (including stereotype threats) that contribute to racial disparities. We test this hypothesis by assessing variation in the benefits of a self-affirmation intervention designed to counteract social identity threat in a…

  18. The DANGERTOME Personal Risk Threat Assessment Scale: An Instrument to Help Aid Immediate Threat Assessment for Counselors, Faculty, and Teachers

    ERIC Educational Resources Information Center

    Juhnke, Gerald A.

    2010-01-01

    Threats of violence are not uncommon to counselors, faculty, or teachers. Each must be taken seriously, quickly analyzed, and safety procedures implemented. Yet, there exists a paucity of brief, face-to-face, assessments designed to aid threat assessment. To address this paucity, the author created The DANGERTOME Personal Risk Threat Assessment…

  19. Facing ambiguous threats.

    PubMed

    Roberto, Michael A; Bohmer, Richard M J; Edmondson, Amy C

    2006-11-01

    On February 1, 2003, the world watched in horror as the Columbia space shuttle broke apart while reentering the earth's atmosphere, killing all seven astronauts. Some have argued that NASA's failure to respond with appropriate intensity to the so-called foam strike that led to the accident was evidence of irresponsible or incompetent management. The authors' research, however, suggests that NASA was exhibiting a natural, albeit unfortunate, pattern of behavior common in many organizations. The foam strike is a prime example of what the authors call an ambiguous threat-a signal that may or may not portend future harm. Ambiguous threats differ from threats with obvious causes-say, a fire in the building-for which the response is clear. They also differ from unmistakable threats that may lack straightforward response paths (such as the frightening oxygen-tank explosion aboard Apollo 13). However, when the warning sign is ambiguous and the threat's potential effect is unclear, managers may choose to ignore or discount the risk. Such an approach can be catastrophic. Firms that do a good job of dealing with ambiguous threats do not improvise during a crisis; rather, they apply a rigorous set of detection and response capabilities that they have developed and practiced beforehand. In this article, the authors outline how to put such capabilities in place long before a crisis strikes. First, companies need to hone their teamwork and rapid problem-solving skills through practice. Second, they must learn to recognize weak signals, amplify the threat, and encourage employees to ask disconcerting "what if" questions in a safe environment. Finally, they should explore possible responses to threats through quick, low-cost experimentation. PMID:17131567

  20. 24 CFR 9.131 - Direct threat.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 24 Housing and Urban Development 1 2012-04-01 2012-04-01 false Direct threat. 9.131 Section 9.131 Housing and Urban Development Office of the Secretary, Department of Housing and Urban Development ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF DISABILITY IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT...

  1. The structural basis for T-antigen hydrolysis by Streptococcus pneumoniae: a target for structure-based vaccine design.

    PubMed

    Caines, Matthew E C; Zhu, Haizhong; Vuckovic, Marija; Willis, Lisa M; Withers, Stephen G; Wakarchuk, Warren W; Strynadka, Natalie C J

    2008-11-14

    Streptococcus pneumoniae endo-alpha-N-acetylgalactosaminidase is a cell surface-anchored glycoside hydrolase from family GH101 involved in the breakdown of mucin type O-linked glycans. The 189-kDa mature enzyme specifically hydrolyzes the T-antigen disaccharide from extracellular host glycoproteins and is representative of a broadly important class of virulence factors that have remained structurally uncharacterized due to their large size and highly modular nature. Here we report a 2.9 angstroms resolution crystal structure that remarkably captures the multidomain architecture and characterizes a catalytic center unexpectedly resembling that of alpha-amylases. Our analysis presents a complete model of glycoprotein recognition and provides a basis for the structure-based design of novel Streptococcus vaccines and therapeutics. PMID:18784084

  2. Development of Site-Specific Soil Design Basis Earthquake (DBE) Parameters for the Integrated Waste Treatment Unit (IWTU)

    SciTech Connect

    Payne, Suzette

    2008-08-01

    Horizontal and vertical PC 3 (2,500 yr) Soil Design Basis Earthquake (DBE) 5% damped spectra, corresponding time histories, and strain-compatible soil properties were developed for the Integrated Waste Treatment Unit (IWTU). The IWTU is located at the Idaho Nuclear Technology and Engineering Center (INTEC) at the Idaho National Laboratory (INL). Mean and 84th percentile horizontal DBE spectra derived from site-specific site response analyses were evaluated for the IWTU. The horizontal and vertical PC 3 (2,500 yr) Soil DBE 5% damped spectra at the 84th percentile were selected for Soil Structure Interaction (SSI) analyses at IWTU. The site response analyses were performed consistent with applicable Department of Energy (DOE) Standards, recommended guidance of the Nuclear Regulatory Commission (NRC), American Society of Civil Engineers (ASCE) Standards, and recommendations of the Blue Ribbon Panel (BRP) and Defense Nuclear Facilities Safety Board (DNFSB).

  3. After Action Report:Idaho National Laboratory (INL) 2014 Multiple Facility Beyond Design Basis (BDBE) Evaluated Drill October 21, 2014

    SciTech Connect

    V. Scott Barnes

    2014-12-01

    On October 21, 2014, Idaho National Laboratory (INL), in coordination with local jurisdictions, and Department of Energy (DOE) Idaho Operations Office (DOE ID) conducted an evaluated drill to demonstrate the ability to implement the requirements of DOE O 151.1C, “Comprehensive Emergency Management System” when responding to a beyond design basis event (BDBE) scenario as outlined in the Office of Health, Safety, and Security Operating Experience Level 1 letter (OE-1: 2013-01). The INL contractor, Battelle Energy Alliance, LLC (BEA), in coordination with CH2M-WG Idaho, LLC (CWI), and Idaho Treatment Group LLC (ITG), successfully demonstrated appropriate response measures to mitigate a BDBE event that would impact multiple facilities across the INL while protecting the health and safety of personnel, the environment, and property. Offsite response organizations participated to demonstrate appropriate response measures.

  4. 105-K Basin Material Design Basis Feed Description for Spent Nuclear Fuel (SNF) Project Facilities VOL 1 Fuel

    SciTech Connect

    PACKER, M.J.

    1999-11-04

    Metallic uranium Spent Nuclear Fuel (SNF) is currently stored within two water filled pools, 105-KE Basin (KE Basin) and 105-KW Basin (KW Basin), at the United States Department of Energy (U.S. DOE) Hanford Site, in southeastern Washington State. The Spent Nuclear Fuel Project (SNF Project) is responsible to DOE for operation of these fuel storage pools and for the 2100 metric tons of SNF materials that they contain. The SNF Project mission includes safe removal and transportation of all SNF from these storage basins to a new storage facility in the 200 East Area. To accomplish this mission, the SNF Project modifies the existing KE Basin and KW Basin facilities and constructs two new facilities: the 100 K Area Cold Vacuum Drying Facility (CVDF), which drains and dries the SNF; and the 200 East Area Canister Storage Building (CSB), which stores the SNF. The purpose of this document is to describe the design basis feed compositions for materials stored or processed by SNF Project facilities and activities. This document is not intended to replace the Hanford Spent Fuel Inventory Baseline (WHC 1994b), but only to supplement it by providing more detail on the chemical and radiological inventories in the fuel (this volume) and sludge. A variety of feed definitions is required to support evaluation of specific facility and process considerations during the development of these new facilities. Six separate feed types have been identified for development of new storage or processing facilities. The approach for using each feed during design evaluations is to calculate the proposed facility flowsheet assuming each feed. The process flowsheet would then provide a basis for material compositions and quantities which are used in follow-on calculations.

  5. Design of cognitive engine for cognitive radio based on the rough sets and radial basis function neural network

    NASA Astrophysics Data System (ADS)

    Yang, Yanchao; Jiang, Hong; Liu, Congbin; Lan, Zhongli

    2013-03-01

    Cognitive radio (CR) is an intelligent wireless communication system which can dynamically adjust the parameters to improve system performance depending on the environmental change and quality of service. The core technology for CR is the design of cognitive engine, which introduces reasoning and learning methods in the field of artificial intelligence, to achieve the perception, adaptation and learning capability. Considering the dynamical wireless environment and demands, this paper proposes a design of cognitive engine based on the rough sets (RS) and radial basis function neural network (RBF_NN). The method uses experienced knowledge and environment information processed by RS module to train the RBF_NN, and then the learning model is used to reconfigure communication parameters to allocate resources rationally and improve system performance. After training learning model, the performance is evaluated according to two benchmark functions. The simulation results demonstrate the effectiveness of the model and the proposed cognitive engine can effectively achieve the goal of learning and reconfiguration in cognitive radio.

  6. Credible threats and promises.

    PubMed Central

    McNamara, John M; Houston, Alasdair I

    2002-01-01

    We consider various implications of information about the other player in two-player evolutionary games. A simple model of desertion shows that information about the partner's behaviour can be disadvantageous, and highlights the idea of credible threats. We then discuss the general issue of whether the partner can convince the focal player that it will behave in a specific way, i.e. whether the focal player can make credible threats or promises. We show that when desertion decisions depend on reserves, a player can manipulate its reserves so as to create a credible threat of desertion. We then extend previous work on the evolution of trust and commitment, discussing conditions under which it is advantageous to assume that a partner will behave in a certain way even though it is not in its best interest. PMID:12495517

  7. Ancient woodlands: modern threats.

    PubMed

    Rackham, Oliver

    2008-01-01

    This review discusses the following adverse influences on long-established forests, wood-pastures, and savannas in Europe and other continents: destruction and fragmentation; depletion; pollution and eutrophication; fire and lack of fire; excessive shade; excessive numbers of deer; invasive species and cultivars; infilling of savanna; climate change; and globalization of plant diseases. Human influences on the world's mainland forests and savannas have been pervasive throughout the Holocene, to the extent that recovering 'virgin forest' becomes a somewhat nebulous conservation objective. Present and future threats arise both from increasing human activities and from withdrawal of the human activities that have shaped forests in the past. The severity of different threats depends on so many factors, especially the properties of different plants and animals, that generalization is impossible; however, in the long term, spread of pathogens is probably the most serious threat. PMID:18771472

  8. Possible Methods to Estimate Core Location in a Beyond-Design-Basis Accident at a GE BWR with a Mark I Containment Stucture

    SciTech Connect

    Walston, S; Rowland, M; Campbell, K

    2011-07-27

    It is difficult to track to the location of a melted core in a GE BWR with Mark I containment during a beyond-design-basis accident. The Cooper Nuclear Station provided a baseline of normal material distributions and shielding configurations for the GE BWR with Mark I containment. Starting with source terms for a design-basis accident, methods and remote observation points were investigated to allow tracking of a melted core during a beyond-design-basis accident. The design of the GE BWR with Mark-I containment highlights an amazing poverty of expectations regarding a common mode failure of all reactor core cooling systems resulting in a beyond-design-basis accident from the simple loss of electric power. This design is shown in Figure 1. The station blackout accident scenario has been consistently identified as the leading contributor to calculated probabilities for core damage. While NRC-approved models and calculations provide guidance for indirect methods to assess core damage during a beyond-design-basis loss-of-coolant accident (LOCA), there appears to be no established method to track the location of the core directly should the LOCA include a degree of fuel melt. We came to the conclusion that - starting with detailed calculations which estimate the release and movement of gaseous and soluble fission products from the fuel - selected dose readings in specific rooms of the reactor building should allow the location of the core to be verified.

  9. Counter-terrorism threat prediction architecture

    NASA Astrophysics Data System (ADS)

    Lehman, Lynn A.; Krause, Lee S.

    2004-09-01

    This paper will evaluate the feasibility of constructing a system to support intelligence analysts engaged in counter-terrorism. It will discuss the use of emerging techniques to evaluate a large-scale threat data repository (or Infosphere) and comparing analyst developed models to identify and discover potential threat-related activity with a uncertainty metric used to evaluate the threat. This system will also employ the use of psychological (or intent) modeling to incorporate combatant (i.e. terrorist) beliefs and intent. The paper will explore the feasibility of constructing a hetero-hierarchical (a hierarchy of more than one kind or type characterized by loose connection/feedback among elements of the hierarchy) agent based framework or "family of agents" to support "evidence retrieval" defined as combing, or searching the threat data repository and returning information with an uncertainty metric. The counter-terrorism threat prediction architecture will be guided by a series of models, constructed to represent threat operational objectives, potential targets, or terrorist objectives. The approach would compare model representations against information retrieved by the agent family to isolate or identify patterns that match within reasonable measures of proximity. The central areas of discussion will be the construction of an agent framework to search the available threat related information repository, evaluation of results against models that will represent the cultural foundations, mindset, sociology and emotional drive of typical threat combatants (i.e. the mind and objectives of a terrorist), and the development of evaluation techniques to compare result sets with the models representing threat behavior and threat targets. The applicability of concepts surrounding Modeling Field Theory (MFT) will be discussed as the basis of this research into development of proximity measures between the models and result sets and to provide feedback in support of model

  10. Impact of an interactive anti-speeding threat appeal: how much threat is too much?

    PubMed

    Panić, Katarina; Cauberghe, Verolien; De Pelsmacker, Patrick

    2011-05-01

    This study investigates the impact of an interactive television public-service announcement (PSA) containing an anti-speeding threat appeal on feelings of telepresence and behavioral intention. In a 2 × 2 × 2 between-subjects factorial design with 213 participants, the level of threat evoked by a traditional PSA, by the interactive part of the PSA (dedicated advertising location or DAL) and by the preceding program context are manipulated to be either low or high. The results support the assumptions of the Extended Parallel Processing Model with regard to the effect of the level of perceived threat and perceived efficacy in an interactive media environment, and the important role of telepresence as a processing variable. The results of the three-way interaction effect of threat evoked by the program, the PSA and the DAL on telepresence show that when the threat levels of the program and the PSA are both either low or high, exposure to the threatening information in the DAL does not generate a significantly higher feeling of telepresence. However, when a low-threat program is followed by a high-threat PSA, the threat level of the DAL has a positive effect on telepresence. The same trend is found with a high-threat program and a low-threat PSA, although the effect of the threat evoked by the DAL on telepresence is not significant at conventional levels. Finally, there is a positive effect of telepresence on the behavioral intention to reduce speeding, which is partly mediated by the viewer's perceived efficacy to follow the recommended behavior. PMID:21204691

  11. Criteria for calculating the efficiency of deep-pleated HEPA filters with aluminum separators during and after design basis accidents

    SciTech Connect

    Bergman, W.; First, M.W.; Anderson, W.L.

    1995-02-01

    We have reviewed the literature on the performance of HEPA filters under normal and abnormal conditions to establish criteria for calculating the efficiency of HEPA filters in a DOE nonreactor nuclear facility during and after a Design Basis Accident (DBA). This study is only applicable to the standard deep-pleated HEPA filter with aluminum separators as specified in ASME N509[1]. Other HEPA filter designs such as the mini-pleat and separatorless filters are not included in this study. The literature review included the performance of new filters and parameters that may cause deterioration in the filter performance such as filter age, radiation, corrosive chemicals, seismic and rough handling, high temperature, moisture, particle clogging, high air flow and pressure pulses. The deterioration of the filter efficiency depends on the exposure parameters; in severe exposure conditions the filter will be damaged and have a residual efficiency of 0%. There are large gaps and limitations in the data that introduce significant error in the estimates of HEPA filter efficiencies under DBA conditions. Because of this limitation, conservative values of filter efficiency were chosen. The estimation of the efficiency of the HEPA filters under DBA conditions involves three steps: (1) The filter pressure drop and environmental parameters are determined during and after the DBA, (2) Comparing the filter pressure drop to a set of threshold values above which the filter is damaged. There is a different threshold value for each combination of environmental parameters, and (3) Determining the filter efficiency. If the filter pressure drop is greater than the threshold value, the filter is damaged and is assigned 0% efficiency. If the pressure drop is less, then the filter is not damaged and the efficiency is determined from literature values of the efficiency at the environmental conditions.

  12. Threat Assessment Plans

    ERIC Educational Resources Information Center

    Pascopella, Angela

    2008-01-01

    With every new case of school violence, district leaders are urged to be proactive in hopes of averting potential violence. Experts say part of that proactive work comes from a threat assessment plan that every district should have. While every district that receives funds from the U.S. Department of Education for school safety is required to have…

  13. ThreatView

    SciTech Connect

    Shead, Timothy M.; Wylie, Brian

    2007-09-25

    The ThreatView project is based on our prior work with the existing ParaView open-source scientific visualization application. Where ParaView provides a grapical client optimized scientific visualization over the VTK parallel client server architecture, ThreatView provides a client optimized for more generic visual analytics over the same architecture. Because ThreatView is based on the VTK parallel client-server architecture, data sources can reside on remote hosts, and processing and rendering can be performed in parallel. As seen in Fig. 1, ThreatView provides four main methods for visualizing data: Landscape View, which displays a graph using a landscape metaphor where clusters of graph nodes produce "hills" in the landscape; Graph View, which displays a graph using a traditional "ball-and-stick" style; Table View, which displays tabular data in a standard spreadsheet; and Attribute View, which displays a tabular "histogram" of input data - for a selected table column, the Attribute View displays each unique value within the column, and the number of times that value appears in the data. There are two supplemental view types: Text View, which displays tabular data one-record-at-a-time; and the Statistics View, which displays input metadata, such as the number of vertices and edges in a graph, the number of rows in a table, etc.

  14. Proliferation: Threat and response

    SciTech Connect

    1996-04-01

    ;Table of Contents: Section I: The Regional Proliferation Challenge; Northeast Asia; The Middle East and North Africa; The Former Soviet Union: Russia, Ukrane, Kazakstan, And Belarus; South Asia; The International Threat: Dangers from Terrorism, Insurgencies, Civil Wars, And Organized Crime; Section II: Department of Defense Response; Technical Annex: Accessible Technologies; Glossary.

  15. Environmental Threats at School

    ERIC Educational Resources Information Center

    Green, Twhanna

    2005-01-01

    Children can be exposed to dangerous chemicals and toxins in the most unlikely of places: Their schools. This brief article describes the types of threats that school environments pose to students' health, including such pollution and chemical exposures as lead, mercury, arsenic, molds, and poor indoor air quality. The article provides tips for…

  16. The Population Threat

    ERIC Educational Resources Information Center

    McNamara, Robert S.

    1969-01-01

    In an address delivered at the University of Notre Dame, May 1969, Secretary McNamara discussed the threat of unmanageable population pressure which is undervalued and misunderstood by the general public. Unrestricted population growth will have catastrophic consequences unless it is dealt with rapidly and rationally. Copies from: Office of…

  17. Ethical Proactive Threat Research

    NASA Astrophysics Data System (ADS)

    Aycock, John; Sullins, John

    Through a provocative examination of the positive effects of computer security research on regular users, we argue that traditional security research is insufficient. Instead, we turn to a largely untapped alternative, proactive threat research, a fruitful research area but an ethical minefield. We discuss practices for ethical research and dissemination of proactive research.

  18. ThreatView

    Energy Science and Technology Software Center (ESTSC)

    2007-09-25

    The ThreatView project is based on our prior work with the existing ParaView open-source scientific visualization application. Where ParaView provides a grapical client optimized scientific visualization over the VTK parallel client server architecture, ThreatView provides a client optimized for more generic visual analytics over the same architecture. Because ThreatView is based on the VTK parallel client-server architecture, data sources can reside on remote hosts, and processing and rendering can be performed in parallel. As seenmore » in Fig. 1, ThreatView provides four main methods for visualizing data: Landscape View, which displays a graph using a landscape metaphor where clusters of graph nodes produce "hills" in the landscape; Graph View, which displays a graph using a traditional "ball-and-stick" style; Table View, which displays tabular data in a standard spreadsheet; and Attribute View, which displays a tabular "histogram" of input data - for a selected table column, the Attribute View displays each unique value within the column, and the number of times that value appears in the data. There are two supplemental view types: Text View, which displays tabular data one-record-at-a-time; and the Statistics View, which displays input metadata, such as the number of vertices and edges in a graph, the number of rows in a table, etc.« less

  19. Criteria for calculating the efficiency of deep-pleated HEPA filters with aluminum separators during and after design basis accidents

    SciTech Connect

    Bergman, W.; First, M.W.; Anderson, W.L.; Gilbert, H.; Jacox, J.W.

    1995-02-01

    The authors have reviewed the literature on the performance of high efficiency particulate air (HEPA) filters under normal and abnormal conditions to establish criteria for calculating the efficiency of HEPA filters in a DOE nonreactor nuclear facility during and after a Design Basis Accident (DBA). This study is only applicable to the standard deep-pleated HEPA filter with aluminum separators as specified in ASME N509. The literature review included the performance of new filters and parameters that may cause deterioration in the filter performance such as filter age, radiation, corrosive chemicals, seismic and rough handling, high temperature, moisture, particle clogging, high air flow and pressure pulses. The deterioration of the filter efficiency depends on the exposure parameters; in severe exposure conditions the filter will be structurally damaged and have a residual efficiency of 0%. Despite the many studies on HEPA filter performance under adverse conditions, there are large gaps and limitations in the data that introduce significant error in the estimates of HEPA filter efficiencies under DBA conditions. Because of this limitation, conservative values of filter efficiency were chosen when there was insufficient data.

  20. An Information Fusion Framework for Threat Assessment

    SciTech Connect

    Beaver, Justin M; Kerekes, Ryan A; Treadwell, Jim N

    2009-01-01

    Modern enterprises are becoming increasingly sensitive to the potential destructive power of small groups or individuals with malicious intent. In response, significant investments are being made in developing a means to assess the likelihood of certain threats to their enterprises. Threat assessment needs are typically focused in very specific application areas where current processes rely heavily on human analysis to both combine any available data and draw conclusions about the probability of a threat. A generic approach to threat assessment is proposed, including a threat taxonomy and decision-level information fusion framework, that provides a computational means for merging multi-modal data for the purpose of assessing the presence of a threat. The framework is designed for flexibility, and intentionally accounts for the accuracy of each data source, given the environmental conditions, in order to manage the uncertainty associated with any acquired data. The taxonomy and information fusion framework is described, and discussed in the context of real-world applications such as shipping container security and cyber security.

  1. Analysis of main steam isolation valve leakage in design basis accidents using MELCOR 1.8.6 and RADTRAD.

    SciTech Connect

    Salay, Michael; Kalinich, Donald A.; Gauntt, Randall O.; Radel, Tracy E.

    2008-10-01

    Analyses were performed using MELCOR and RADTRAD to investigate main steam isolation valve (MSIV) leakage behavior under design basis accident (DBA) loss-of-coolant (LOCA) conditions that are presumed to have led to a significant core melt accident. Dose to the control room, site boundary and LPZ are examined using both approaches described in current regulatory guidelines as well as analyses based on best estimate source term and system response. At issue is the current practice of using containment airborne aerosol concentrations as a surrogate for the in-vessel aerosol concentration that exists in the near vicinity of the MSIVs. This study finds current practice using the AST-based containment aerosol concentrations for assessing MSIV leakage is non-conservative and conceptually in error. A methodology is proposed that scales the containment aerosol concentration to the expected vessel concentration in order to preserve the simplified use of the AST in assessing containment performance under assumed DBA conditions. This correction is required during the first two hours of the accident while the gap and early in-vessel source terms are present. It is general practice to assume that at {approx}2hrs, recovery actions to reflood the core will have been successful and that further core damage can be avoided. The analyses performed in this study determine that, after two hours, assuming vessel reflooding has taken place, the containment aerosol concentration can then conservatively be used as the effective source to the leaking MSIV's. Recommendations are provided concerning typical aerosol removal coefficients that can be used in the RADTRAD code to predict source attenuation in the steam lines, and on robust methods of predicting MSIV leakage flows based on measured MSIV leakage performance.

  2. Pollution: a global threat.

    PubMed

    McCrink-Goode, Melissa

    2014-07-01

    Over the past several decades, several large-scale seemingly unrelated events have unfolded in all corners of the world. Within the oceans, coral reef systems have been facing unprecedented mass bleaching episodes, sea turtles worldwide are currently experiencing an epidemic in the form of fibropapilloma, and global phytoplankton populations have declined by 40%. Within the Earth's terrestrial systems, similar phenomena have appeared in the form of colony collapse disorder (CCD) currently devastating honey bee colonies, White Nose Syndrome decimating bat populations, and the chytrid fungus plaguing amphibian populations. On the surface these events appear to be unrelated yet at the root of each phenomenon there appears an underlying threat - pollution. This paper will investigate the commonality of these occurrences as well as investigate the current and potential solutions to the threat. PMID:24727071

  3. Proliferation: Threat and response

    SciTech Connect

    1996-04-01

    During the height of the Cold War, the Russian physicist Andre Sakharov said, `Reducing the risk of annihilating humanity in a nuclear war carries an absolute priority over all other considerations.` The end of the Cold War has reduced the threat of global nuclear war, but today a new threat is rising from the global spread of nuclear, biological, and chemical weapons. Hostile groups and nations have tried - or have been able - to obtain these weapons, the technology, and homegrown ability to make them or ballistic missiles that can deliver the massive annihilation, poison, and death of these weapons hundreds of miles away. For rogue nations, these weapons are a ticket to power, stature, and confidence in regional war.

  4. Not All Threats Are Equal

    ERIC Educational Resources Information Center

    Surface, Jeanne L.

    2011-01-01

    School leaders must be fully prepared to respond to all types of threats that occur. In order to respond to threats most appropriately, the school needs to have a systematic approach that combines education, prevention, intervention, discipline, security, and crisis preparedness measures. All threats must be assessed carefully and swiftly,…

  5. Legal considerations in challenging external threats to Glacier National Park, Montana, USA

    NASA Astrophysics Data System (ADS)

    Keiter, Robert B.; Hubert, Wayne A.

    1987-01-01

    External threats to the environmental integrity of Glacier National Park, Montana, USA, fit into three categories: adverse land use practices adjacent to the Park, air pollution, and water pollution. This article identifies and evaluates the laws that Glacier National Park officials might rely upon to protect the Park against these external threats. The article also assesses the available scientific information relating to external threats, and it identifies additional information needed to establish a legal basis for challenging the threats.

  6. The School Shooter: A Threat Assessment Perspective.

    ERIC Educational Resources Information Center

    O'Toole, Mary Ellen

    This paper presents a systematic procedure for threat assessment and intervention of school shooters. The model is designed to be used by educators, mental-health professionals, and law-enforcement agencies and is intended to help refine and strengthen the efforts of the National Center for the Analysis of Violent Crime. Its fundamental building…

  7. Combating emerging viral threats

    PubMed Central

    Bekerman, Elena; Einav, Shirit

    2015-01-01

    Synopsis Most approved antiviral therapeutics selectively inhibit proteins encoded by a single virus, thereby providing a “one drug-one bug” solution. As a result of this narrow spectrum of coverage and the high cost of drug development, therapies are currently approved for fewer than ten viruses out of the hundreds known to cause human disease. This perspective summarizes progress and challenges in the development of broad-spectrum antiviral therapies. These strategies include targeting enzymatic functions shared by multiple viruses and host cell machinery by newly discovered compounds or by repurposing approved drugs. These approaches offer new practical means for developing therapeutics against existing and emerging viral threats. PMID:25883340

  8. Ocean-sized threats

    NASA Astrophysics Data System (ADS)

    Showstack, Randy

    Jane Lubchenco, professor of marine biology and zoology at Oregon State University, and president-elect of the International Council for Science, said that scientists can do more than they currently are doing to clearly communicate to the public and to policy-makers those issues associated with the many ecological threats faced by the world's oceans. In doing so, scientists can overcome popularly-held misperceptions about the health of the world's oceans and thus, help protect the seas.“Science,” Lubchenco said, “has a huge role to play in informing [the public] what is happening and to guide the choice of solutions.

  9. New global viral threats.

    PubMed

    Erdem, Hakan; Ünal, Serhat

    2015-04-01

    Infectious diseases have caused great catastrophes in human history, as in the example of the plague, which wiped out half of the population in Europe in the 14th century. Ebola virus and H7N9 avian influenza virus are 2 lethal pathogens that we have encountered in the second decade of the 21st century. Ebola infection is currently being seen in West Africa, and H7N9 avian flu appears to have settled in Southeast Asia. This article focuses on the current situation and the future prospects of these potential infectious threats to mankind. PMID:25828274

  10. Threats to international science

    NASA Astrophysics Data System (ADS)

    Kisslinger, Carl

    The role of nongovernmental organizations (NGOs) as effective agents for promoting world science is seriously threatened. It is ironic that the threat comes from Norway and Denmark, two countries that have demonstrated a deep commitment to individual freedom and human rights. Motivated by a sincere desire to express their strongest disapproval of the “apartheid” policies of the government of the Republic of South Africa, these countries have passed laws that have the effect of rejecting the International Council of Scientific Unions (ICSU) principles of nondiscrimination and free circulation of scientists.

  11. Satellite Threat Warning and Attack Reporting

    SciTech Connect

    Hilland, D.; Phipps, G.; Jingle, C.; Newton, G.

    1997-12-31

    The Air Force Research Laboratory`s Satellite Threat Warning and Attack Reporting (STW/AR) program will provide technologies for advanced threat warning and reporting of radio frequency (RF) and laser threats. The STW/AR program objectives are: (a) develop cost- effective technologies to detect, identify, locate, characterize, and report attacks or interference against U.S. and Allied satellites. (b) demonstrate innovative, light-weight, low-power, laser and RF sensors. The program focuses on the demonstration of RF and laser sensors. The RF sensor effort includes the investigation of interferometric antenna arrays, multi-arm spiral and butler matrix antennas, wideband receivers, adaptive processors, and improved processing algorithms. The laser sensor effort includes the investigation of alternative detectors, broadband grating and optical designs, active pixel sensing, and improved processing algorithms.

  12. A knowledge-based approach to estimating the magnitude and spatial patterns of potential threats to soil biodiversity.

    PubMed

    Orgiazzi, Alberto; Panagos, Panos; Yigini, Yusuf; Dunbar, Martha B; Gardi, Ciro; Montanarella, Luca; Ballabio, Cristiano

    2016-03-01

    Because of the increasing pressures exerted on soil, below-ground life is under threat. Knowledge-based rankings of potential threats to different components of soil biodiversity were developed in order to assess the spatial distribution of threats on a European scale. A list of 13 potential threats to soil biodiversity was proposed to experts with different backgrounds in order to assess the potential for three major components of soil biodiversity: soil microorganisms, fauna, and biological functions. This approach allowed us to obtain knowledge-based rankings of threats. These classifications formed the basis for the development of indices through an additive aggregation model that, along with ad-hoc proxies for each pressure, allowed us to preliminarily assess the spatial patterns of potential threats. Intensive exploitation was identified as the highest pressure. In contrast, the use of genetically modified organisms in agriculture was considered as the threat with least potential. The potential impact of climate change showed the highest uncertainty. Fourteen out of the 27 considered countries have more than 40% of their soils with moderate-high to high potential risk for all three components of soil biodiversity. Arable soils are the most exposed to pressures. Soils within the boreal biogeographic region showed the lowest risk potential. The majority of soils at risk are outside the boundaries of protected areas. First maps of risks to three components of soil biodiversity based on the current scientific knowledge were developed. Despite the intrinsic limits of knowledge-based assessments, a remarkable potential risk to soil biodiversity was observed. Guidelines to preliminarily identify and circumscribe soils potentially at risk are provided. This approach may be used in future research to assess threat at both local and global scale and identify areas of possible risk and, subsequently, design appropriate strategies for monitoring and protection of soil

  13. Investigation, comparison and design of chambers used in centrifugal partition chromatography on the basis of flow pattern and separation experiments.

    PubMed

    Schwienheer, C; Merz, J; Schembecker, G

    2015-04-17

    In centrifugal partition chromatography (CPC) the separation efficiency is mainly influenced by the hydrodynamic of mobile and stationary phase in the chambers. Thus, the hydrodynamic has to be investigated and understood in order to enhance a CPC separation run. Different chamber geometries have been developed in the past and the influence of several phase systems and CPC operating conditions were investigated for these chambers. However, a direct comparison between the different chamber types has not been performed yet. In order to investigate the direct influence of the chamber design on the hydrodynamic, several chamber designs - partially similar in geometry to commercial available designs - are investigated under standardized conditions in the present study. The results show the influence of geometrical aspects of the chamber design on the hydrodynamic and therewith, on the separation efficiency. As a conclusion of the present study, some ideas for an optimal chamber design for laboratory and industrial purpose are proposed. PMID:25766495

  14. Recurrent dreams: Recurring threat simulations?

    PubMed

    Valli, K; Revonsuo, A

    2006-06-01

    Zadra, Desjardins, and Marcotte (2006) have made a valuable contribution to the empirical testing of the Threat Simulation Theory (TST) (Revonsuo, 2000a) in recurrent dreams. For the most part, their results are in accordance with the theory, while some findings seem to conflict with the predictions of TST. In our commentary, we consider some alternative ways to interpret the results, and we conclude that many prominent features of most recurrent dreams seem to be manifestations of a threat simulation function, leading to repeated rehearsal of threat perception and avoidance, but a minority of recurrent dreams seem to have origins unrelated to threat simulation. PMID:16019227

  15. 105-K Basin material design basis feed description for spent nuclear fuel project facilities. Volume 2: Sludge

    SciTech Connect

    Pearce, K.L.

    1998-08-30

    Volume 2 provides the design feed compositions for the baseline K East and K West Basin sludge process streams expected to be generated during Spent Nuclear Fuel (SNF) Project activities. Four types of feeds are required to support evaluation of specific facility and process considerations during the development of new facilities and processes. These four design feeds provide nominal and bounding conditions for design evaluations. Volume 2 includes definition of inventories for: (1) KE and KW Basins sludge locations (pit sludges, floor sludge, canister.sludge, and wash sludge components), (2) nominal feed for each of five process feed streams, (3) shielding design feed, (4) safety/regulatory assessment feed, and (5) criticality assessment feed.

  16. Null testing of nonrotational symmetry transmission optical freeform: design, modeling, and inspection on the basis of Fermat principles

    NASA Astrophysics Data System (ADS)

    Qiu, Gufeng; Cui, Xudong

    2015-11-01

    We present a general design method for a type of transmission freeforms without rotational symmetry and achieve the null testing by putting a well-designed Fermat reflector on the transmitting optical path. The design principle of the reflector is given, and an eccentric spherical surface with 1-mm deviation is used as an example of testing freeform. We fabricated the reflector and the freeform with the single-point diamond turning machine. Both conventional interference inspection and our approach give consistent results. The design error is less than 106 mm, and the measurement accuracy is nearly completely determined by the fabrication precision. This approach can also be applied to the inspections of reflecting freeforms with low costs.

  17. Using a Non-Equivalent Groups Quasi Experimental Design to Reduce Internal Validity Threats to Claims Made by Math and Science K-12 Teacher Recruitment Programs

    NASA Astrophysics Data System (ADS)

    Moin, Laura

    2009-10-01

    The American Recovery and Reinvestment Act national policy established in 2009 calls for ``meaningful data'' that demonstrate educational improvements, including the recruitment of high-quality teachers. The scant data available and the low credibility of many K-12 math/science teacher recruitment program evaluations remain the major barriers for the identification of effective recruitment strategies. Our study presents a methodology to better evaluate the impact of recruitment programs on increasing participants' interest in teaching careers. The research capitalizes on the use of several control groups and presents a non-equivalent groups quasi-experimental evaluation design that produces program effect claims with higher internal validity than claims generated by current program evaluations. With this method that compares responses to a teaching career interest question from undergraduates all along a continuum from just attending an information session to participating (or not) in the recruitment program, we were able to compare the effect of the program in increasing participants' interest in teaching careers versus the evolution of the same interest but in the absence of the program. We were also able to make suggestions for program improvement and further research. While our findings may not apply to other K-12 math/science teacher recruitment programs, we believe that our evaluation methodology does and will contribute to conduct stronger program evaluations. In so doing, our evaluation procedure may inform recruitment program designers and policy makers.

  18. Surface-confined heterometallic triads on the basis of terpyridyl complexes and design of molecular logic gates.

    PubMed

    Mondal, Prakash Chandra; Singh, Vikram; Jeyachandran, Yekkoni Lakshmanan; Zharnikov, Michael

    2015-04-29

    Surface-confined heterometallic molecular triads (SURHMTs) were fabricated on SiOx-based solid substrates using optically rich and redox-active Fe-, Os-, and Ru-based terpyridyl complexes as metalloligands and Cu(2+) ions as linkers. Optical and electrochemical studies reveal efficient electronic intramolecular communication in these assemblies. The UV-vis spectra of the triads exhibit a superposition of the metal-to-ligand charge-transfer bands of individual complexes, providing a significant enlargement of the optical window, useful for application. Similarly, cyclic voltammograms of SURHMT layers show a variety of redox peaks corresponding to individual complexes as well as multi-redox states at a low potential. Interaction of a representative SURHMT assembly with redox-active NOBF4 was investigated and used as a basis for configuring molecular logic gates. PMID:25853640

  19. Linking Stereotype Threat and Anxiety

    ERIC Educational Resources Information Center

    Osborne, Jason W.

    2007-01-01

    Claude Steele's stereotype threat hypothesis has attracted significant attention in recent years. This study tested one of the main tenets of his theory--that stereotype threat serves to increase individual anxiety levels, thus hurting performance--using real-time measures of physiological arousal. Subjects were randomly assigned to either high or…

  20. Bio-threat microparticle simulants

    DOEpatents

    Farquar, George Roy; Leif, Roald N

    2012-10-23

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  1. Threat Assessment in College Settings

    ERIC Educational Resources Information Center

    Cornell, Dewey

    2010-01-01

    In 2007, the landscape of campus safety changed abruptly with the Virginia Tech shooting and the subsequent wave of anonymous threats in colleges across the country. In response to the tragedy, the Virginia state legislature mandated that every public institution of higher education establish a "threat assessment team." Both the FBI and the U.S.…

  2. Bomb Threat Assessments. Fact Sheet

    ERIC Educational Resources Information Center

    Tunkel, Ronald F.

    2010-01-01

    This information provides a brief, summary outline of how investigators should assess anonymous bomb threats at schools. Applying these principles may help administrators and law enforcement personnel accurately assess the viability and credibility of a threat and appropriately gauge their response. Any credible evidence provided by teachers or…

  3. Bio-threat microparticle simulants

    SciTech Connect

    Farquar, George Roy; Leif, Roald

    2014-09-16

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  4. Insider Threat - Material Control and Accountability Mitigation

    SciTech Connect

    Powell, Danny H; Elwood Jr, Robert H; Roche, Charles T

    2011-01-01

    The technical objectives of nuclear safeguards are (1) the timely detection of diversion of significant quantities of nuclear material from peaceful uses to the manufacture of nuclear weapons or other nuclear explosive devices or for purposes unknown and (2) the deterrence of such diversion by the risk of early detection. The safeguards and security program must address both outsider threats and insider threats. Outsider threats are primarily addressed by the physical protection system. Insider threats can be any level of personnel at the site including passive or active insiders that could attempt protracted or abrupt diversion. This could occur by an individual acting alone or by collusion between an individual with material control and accountability (MC&A) responsibilities and another individual who has responsibility or control within both the physical protection and the MC&A systems. The insider threat is one that must be understood and incorporated into the safeguards posture. There have been more than 18 documented cases of theft or loss of plutonium or highly enriched uranium. The insider has access, authority, and knowledge, as well as a set of attributes, that make him/her difficult to detect. An integrated safeguards program is designed as a defense-in-depth system that seeks to prevent the unauthorized removal of nuclear material, to provide early detection of any unauthorized attempt to remove nuclear material, and to rapidly respond to any attempted removal of nuclear material. The program is also designed to support protection against sabotage, espionage, unauthorized access, compromise, and other hostile acts that may cause unacceptable adverse impacts on national security, program continuity, the health and safety of employees, the public, or the environment. Nuclear MC&A play an essential role in the capabilities of an integrated safeguards system to deter and detect theft or diversion of nuclear material. An integrated safeguards system with

  5. Psychoanalysis and the nuclear threat

    SciTech Connect

    Levine, H.B.; Jacobs, D.; Rubin, L.J.

    1988-01-01

    {ital Psychoanalysis and the Nuclear Threat} provides coverage of the dynamic and clinical considerations that follow from life in the nuclear age. Of special clinical interest are chapters dealing with the developmental consequences of the nuclear threat in childhood, adolescence, and adulthood, and those exploring the technical issues raised by the occurrence in analytic and psychotherapeutic hours of material related to the nuclear threat. Additional chapters bring a psychoanalytic perspective to bear on such issues as the need to have enemies, silence as the real crime, love, work, and survival in the nuclear age, the relationship of the nuclear threat to issues of mourning and melancholia, apocalyptic fantasies, the paranoid process, considerations of the possible impact of gender on the nuclear threat, and the application of psychoanalytic thinking to nuclear arms strategy. Finally, the volume includes the first case report in the English language---albeit a brief psychotherapy---involving the treatment of a Hiroshima survivor.

  6. Shape threat detection via adaptive computed tomography

    NASA Astrophysics Data System (ADS)

    Masoudi, Ahmad; Thamvichai, Ratchaneekorn; Neifeld, Mark A.

    2016-05-01

    X-ray Computed Tomography (CT) is used widely for screening purposes. Conventional x-ray threat detection systems employ image reconstruction and segmentation algorithms prior to making threat/no-threat decisions. We find that in many cases these pre-processing steps can degrade detection performance. Therefore in this work we will investigate methods that operate directly on the CT measurements. We analyze a fixed-gantry system containing 25 x-ray sources and 2200 photon counting detectors. We present a new method for improving threat detection performance. This new method is a so-called greedy adaptive algorithm which at each time step uses information from previous measurements to design the next measurement. We utilize sequential hypothesis testing (SHT) in order to derive both the optimal "next measurement" and the stopping criterion to insure a target probability of error Pe. We find that selecting the next x-ray source according to such a greedy adaptive algorithm, we can reduce Pe by a factor of 42.4× relative to the conventional measurement sequence employing all 25 sources in sequence.

  7. Notes on the Psychological Basis of Environmental Design: The Right-Left Dimension in Apartment Floor Plans

    ERIC Educational Resources Information Center

    Cunningham, Michael R.

    1977-01-01

    The previously recognized right-left asymmetry in aesthetic balance was applied to preferences in architectural design. Preferences for right-and left-oriented apartments in apartment floor plan layouts were noted in sophomore psychology students. Data examined from preferences of 67 right-handed and 5 left-handed students revealed that…

  8. The Cognitive and Behavioral Basis of an Instructional Design: Using CBT to Teach Technical Information and Learning Strategies.

    ERIC Educational Resources Information Center

    Cook, E. K.; Kazlauskas, E. J.

    1993-01-01

    Describes a project that was developed to create production guidelines for instructional design of computer-based training (CBT) for industrial purposes. Topics addressed include Bloom's Taxonomy; Gagne's Events of Instruction; behavioral foundations; cognitive foundations; simulation as an example of cognitive instruction; learner control;…

  9. Assessing the global threat from Zika virus.

    PubMed

    Lessler, Justin; Chaisson, Lelia H; Kucirka, Lauren M; Bi, Qifang; Grantz, Kyra; Salje, Henrik; Carcelen, Andrea C; Ott, Cassandra T; Sheffield, Jeanne S; Ferguson, Neil M; Cummings, Derek A T; Metcalf, C Jessica E; Rodriguez-Barraquer, Isabel

    2016-08-12

    First discovered in 1947, Zika virus (ZIKV) infection remained a little-known tropical disease until 2015, when its apparent association with a considerable increase in the incidence of microcephaly in Brazil raised alarms worldwide. There is limited information on the key factors that determine the extent of the global threat from ZIKV infection and resulting complications. Here, we review what is known about the epidemiology, natural history, and public health effects of ZIKV infection, the empirical basis for this knowledge, and the critical knowledge gaps that need to be filled. PMID:27417495

  10. Solution NMR characterization of apical membrane antigen 1 and small molecule interactions as a basis for designing new antimalarials.

    PubMed

    Krishnarjuna, Bankala; Lim, San Sui; Devine, Shane M; Debono, Cael O; Lam, Raymond; Chandrashekaran, Indu R; Jaipuria, Garima; Yagi, Hiromasa; Atreya, Hanudatta S; Scanlon, Martin J; MacRaild, Christopher A; Scammells, Peter J; Norton, Raymond S

    2016-06-01

    Plasmodium falciparum apical membrane antigen 1 (PfAMA1) plays an important role in the invasion by merozoites of human red blood cells during a malaria infection. A key region of PfAMA1 is a conserved hydrophobic cleft formed by 12 hydrophobic residues. As anti-apical membrane antigen 1 antibodies and other inhibitory molecules that target this hydrophobic cleft are able to block the invasion process, PfAMA1 is an attractive target for the development of strain-transcending antimalarial agents. As solution nuclear magnetic resonance spectroscopy is a valuable technique for the rapid characterization of protein-ligand interactions, we have determined the sequence-specific backbone assignments for PfAMA1 from two P. falciparum strains, FVO and 3D7. Both selective labelling and unlabelling strategies were used to complement triple-resonance experiments in order to facilitate the assignment process. We have then used these assignments for mapping the binding sites for small molecules, including benzimidazoles, pyrazoles and 2-aminothiazoles, which were selected on the basis of their affinities measured from surface plasmon resonance binding experiments. Among the compounds tested, benzimidazoles showed binding to a similar region on both FVO and 3D7 PfAMA1, suggesting that these compounds are promising scaffolds for the development of novel PfAMA1 inhibitors. Copyright © 2016 John Wiley & Sons, Ltd. PMID:26804042

  11. Stereotype Threat as Validity Threat: The Anxiety-Sex-Threat Interaction

    ERIC Educational Resources Information Center

    Delgado, Ana R.; Prieto, Gerardo

    2008-01-01

    Stereotype threat has been invoked to explain underperformance on a variety of groups for whom the stereotypes allege inferior cognitive abilities. In math testing, stereotype threat has been used to explain sex differences in test performance. This paper describes an experimental study on a large sample (n = 313), in which the role of anxiety and…

  12. Performance of NACA Eight-stage Axial-flow Compressor Designed on the Basis of Airfoil Theory

    NASA Technical Reports Server (NTRS)

    Sinnette, John T; Schey, Oscar W; King, J Austin

    1943-01-01

    The NACA has conducted an investigation to determine the performance that can be obtained from a multistage axial-flow compressor based on airfoil research. A theory was developed; an eight-stage axial-flow compressor was designed, constructed, and tested. The performance of the compressor was determined for speeds from 5000 to 14,000 r.p.m with varying air flow at each speed. Most of the tests were made with air at room temperature. The performance was determined in accordance with the Committee's recommended procedure for testing superchargers. The expected performance was obtained, showing that a multistage compressor of high efficiency can be designed by the application of airfoil theory.

  13. Managing biosecurity threats in China.

    PubMed

    Huang, Yanzhong

    2011-03-01

    Compared to the extensive literature on bioterrorism and biosecurity in the United States, less analysis has been conducted on similar challenges in China. This article seeks to fill this void by providing an integrated and updated assessment of 3 major biosecurity threats China faces: biowarfare, bioterrorism, and biocrimes. An analysis of China's biosecurity threats and biodefense building suggest varying levels of risk associated with each threat type. First, a direct bioweapons attack on China is highly unlikely, although the threat of biowarfare cannot be simply written off. Second, potential perpetrators of bioterrorism have capabilities at their disposal for carrying out such attacks. While terrorist organizations in China do not have a strong interest in bioterrorism, the limited state capability to counter such a threat may increase the risk in the future. Third, unlike the threats of biowarfare and bioterrorism, potential perpetrators of biocrimes have both incentives and capabilities, and biocrimes can produce reactions far out of proportion to the actual number of casualties. Despite the distinct biosecurity challenges it faces, China has yet to articulate a differentiated and coherent strategy to effectively tackle the challenges. Assessing different types of biosecurity threats in terms of degrees of risk not only provides greater analytical clarity but also has important implications for the strategies required to manage the risks. PMID:21361794

  14. Examining the Effects of Stereotype Threat on Test-Taking Behaviors

    ERIC Educational Resources Information Center

    Scherbaum, Charles A.; Blanshetyn, Victoria; Marshall-Wolp, Elizabeth; McCue, Elizabeth; Strauss, Ross

    2011-01-01

    This study examines the relationship between stereotype threat and individual test-taking behaviors. Previous research has examined the impact of stereotype threat on test scores, but little research has examined the impact of stereotype threat on the test-taking behaviors impacting those scores. Using a pre-post experimental design, stereotype…

  15. Cooperative Threat Reduction: Cooperation Threat Reduction Program Liquid Propellant Disposition Project

    NASA Astrophysics Data System (ADS)

    2002-09-01

    This audit is one in a series of audits the Deputy Secretary of Defense requested. As part of the Cooperative Threat Reduction (CTR) Program, DoD agreed to assist the Russian Federation in disposing of its liquid rocket propellant. Public Law 102-228 (section 2551 NOTE, title 22, United States Code), the Soviet Nuclear Threat Reduction Act of 1991 designates DoD as the executive agent for the CTR Program. Specific objectives of the act are to destroy chemical, nuclear, and other weapons; transport, store, disable, and safeguard weapons in connection with their destruction; and establish verifiable safeguards against proliferation of weapons of mass destruction. The Office of the Assistant Secretary of Defense (International Security Policy), under the Office of the Under Secretary of Defense for Policy, develops, coordinates, and oversees implementation of policy for the CTR Program. The CTR Directorate, Defense Threat Reduction Agency operates the program.

  16. Assessing the threat of firearms: new threat formula, resources, and ontological linking algorithms

    NASA Astrophysics Data System (ADS)

    Hempelmann, Christian F.; Arslan, Abdullah N.; Attardo, Salvatore; Blount, Grady P.; Sirakov, Nikolay Metodiev

    2014-06-01

    The present work is part of an ongoing larger project.2, 3, 11, 12 The goal of this project is to develop a system capable of automatic threat assessment for instances of firearms use in public places. The main components of the system are: an ontology of firearms;1, 14 algorithms to create the visual footprint of the firearms,1, 14 to compare visual information,2, 3, 11, 12 to facilitate search in the ontology, and to generate the links between the conceptual and visual ontologies; as well as a formula to calculate the threat of individual firearms, firearms classes, and ammunition types in different environments. One part of the dual-level ontology for the properties of the firearms captures key visual features used to identify their type or class in images, while the other part captures their threat-relevant conceptual properties. The visual ontology is the result of image segmentation and matching methods, while the conceptual ontology is designed using knowledge-engineering principles and populated semi-automatically from Web resources. The focus of the present paper is two-fold. On the one hand, we will report on an update of the initial threat formula, based on the substantially increased population of the firearm ontology, including ammunition types and comparisons to actual incidents, and allowing for an overall more accurate assessment. On the other hand, the linking algorithms between the visual and conceptual ontologies are elaborated for faster transfer of information leading to an improvement in accuracy of the threat assessment.

  17. Global Threats to Child Safety.

    PubMed

    Mace, Sharon E

    2016-02-01

    Children have rights, as enumerated in the Declaration of the Rights of the Child, and need protection from violence, exploitation, and abuse. Global threats to child safety exist. These threats include lack of basic needs (food, clean water, sanitation), maltreatment, abandonment, child labor, child marriage, female genital mutilation, child trafficking, disasters, and armed conflicts/wars. Recent disasters and armed conflicts have led to a record number of displaced people especially children and their families. Strategies and specific programs can be developed and implemented for eliminating threats to the safety of children. PMID:26613687

  18. In Brief: Forecasting meningitis threats

    NASA Astrophysics Data System (ADS)

    Showstack, Randy

    2008-12-01

    The University Corporation for Atmospheric Research (UCAR), in conjunction with a team of health and weather organizations, has launched a project to provide weather forecasts to medical officials in Africa to help reduce outbreaks of meningitis. The forecasts will enable local health care providers to target vaccination programs more effectively. In 2009, meteorologists with the National Center for Atmospheric Research, which is managed by UCAR, will begin issuing 14-day forecasts of atmospheric conditions in Ghana. Later, UCAR plans to work closely with health experts from several African countries to design and test a decision support system to provide health officials with useful meteorological information. ``By targeting forecasts in regions where meningitis is a threat, we may be able to help vulnerable populations. Ultimately, we hope to build on this project and provide information to public health programs battling weather-related diseases in other parts of the world,'' said Rajul Pandya, director of UCAR's Community Building Program. Funding for the project comes from a $900,000 grant from Google.org, the philanthropic arm of the Internet search company.

  19. Design, Experiments and Simulation of Voltage Transformers on the Basis of a Differential Input D-dot Sensor

    PubMed Central

    Wang, Jingang; Gao, Can; Yang, Jie

    2014-01-01

    Currently available traditional electromagnetic voltage sensors fail to meet the measurement requirements of the smart grid, because of low accuracy in the static and dynamic ranges and the occurrence of ferromagnetic resonance attributed to overvoltage and output short circuit. This work develops a new non-contact high-bandwidth voltage measurement system for power equipment. This system aims at the miniaturization and non-contact measurement of the smart grid. After traditional D-dot voltage probe analysis, an improved method is proposed. For the sensor to work in a self-integrating pattern, the differential input pattern is adopted for circuit design, and grounding is removed. To prove the structure design, circuit component parameters, and insulation characteristics, Ansoft Maxwell software is used for the simulation. Moreover, the new probe was tested on a 10 kV high-voltage test platform for steady-state error and transient behavior. Experimental results ascertain that the root mean square values of measured voltage are precise and that the phase error is small. The D-dot voltage sensor not only meets the requirement of high accuracy but also exhibits satisfactory transient response. This sensor can meet the intelligence, miniaturization, and convenience requirements of the smart grid. PMID:25036333

  20. Applying Human-performance Models to Designing and Evaluating Nuclear Power Plants: Review Guidance and Technical Basis

    SciTech Connect

    O'Hara, J.M.

    2009-11-30

    Human performance models (HPMs) are simulations of human behavior with which we can predict human performance. Designers use them to support their human factors engineering (HFE) programs for a wide range of complex systems, including commercial nuclear power plants. Applicants to U.S. Nuclear Regulatory Commission (NRC) can use HPMs for design certifications, operating licenses, and license amendments. In the context of nuclear-plant safety, it is important to assure that HPMs are verified and validated, and their usage is consistent with their intended purpose. Using HPMs improperly may generate misleading or incorrect information, entailing safety concerns. The objective of this research was to develop guidance to support the NRC staff's reviews of an applicant's use of HPMs in an HFE program. The guidance is divided into three topical areas: (1) HPM Verification, (2) HPM Validation, and (3) User Interface Verification. Following this guidance will help ensure the benefits of HPMs are achieved in a technically sound, defensible manner. During the course of developing this guidance, I identified several issues that could not be addressed; they also are discussed.

  1. Design, experiments and simulation of voltage transformers on the basis of a differential input D-dot sensor.

    PubMed

    Wang, Jingang; Gao, Can; Yang, Jie

    2014-01-01

    Currently available traditional electromagnetic voltage sensors fail to meet the measurement requirements of the smart grid, because of low accuracy in the static and dynamic ranges and the occurrence of ferromagnetic resonance attributed to overvoltage and output short circuit. This work develops a new non-contact high-bandwidth voltage measurement system for power equipment. This system aims at the miniaturization and non-contact measurement of the smart grid. After traditional D-dot voltage probe analysis, an improved method is proposed. For the sensor to work in a self-integrating pattern, the differential input pattern is adopted for circuit design, and grounding is removed. To prove the structure design, circuit component parameters, and insulation characteristics, Ansoft Maxwell software is used for the simulation. Moreover, the new probe was tested on a 10 kV high-voltage test platform for steady-state error and transient behavior. Experimental results ascertain that the root mean square values of measured voltage are precise and that the phase error is small. The D-dot voltage sensor not only meets the requirement of high accuracy but also exhibits satisfactory transient response. This sensor can meet the intelligence, miniaturization, and convenience requirements of the smart grid. PMID:25036333

  2. Providing the Basis for Innovative Improvements in Advanced LWR Reactor Passive Safety Systems Design: An Educational R&D Project

    SciTech Connect

    Brian G. Williams; Jim C. P. Liou; Hiral Kadakia; Bill Phoenix; Richard R. Schultz

    2007-02-27

    This project characterizes typical two-phase stratified flow conditions in advanced water reactor horizontal pipe sections, following activation of passive cooling systems. It provides (1) a means to educate nuclear engineering students regarding the importance of two-phase stratified flow in passive cooling systems to the safety of advanced reactor systems and (2) describes the experimental apparatus and process to measure key parameters essential to consider when designing passive emergency core cooling flow paths that may encounter this flow regime. Based on data collected, the state of analysis capabilities can be determined regarding stratified flow in advanced reactor systems and the best paths forward can be identified to ensure that the nuclear industry can properly characterize two-phase stratified flow in passive emergency core cooling systems.

  3. Design and manufacture of perpendicular bi-stable cantilever for vibrational energy harvesting on the basis of stochastic resonance

    NASA Astrophysics Data System (ADS)

    Kawano, M.; Zhang, Y.; Zheng, R.; Nakano, K.; Kim, B.

    2015-12-01

    This paper describes extremely simple configuration of novel vibrational energy harvester, which can harness low frequency (less than 5 Hz, such as various environmental vibrations) over a broad frequency band for the first time. A design that utilizes a phenomenon called stochastic resonance can give significantly enhanced vibration mode for increasing efficiency, and simple bi-stable cantilever with tip mass installed a basement vertically fulfils the requirements for stochastic resonance. We fabricated bi-stable cantilever with tip mass and validated whether the cantilever could be used as an effective low frequency vibration energy harvester. In the experiment, when a 1 Hz periodic force and environmental noise vibration were applied, stochastic resonance occurred. The amplitude of the energy harvester increased over tenfold (over 30 mm).

  4. Heat Waves Are Health Threats

    MedlinePlus

    ... medlineplus/news/fullstory_159694.html Heat Waves Are Health Threats Drink plenty of water and use air ... on: Heat Illness Recent Health News Related MedlinePlus Health Topics Heat Illness About MedlinePlus Site Map FAQs ...

  5. Bomb Threat Becomes Real News.

    ERIC Educational Resources Information Center

    Gastaldo, Evann

    1999-01-01

    Discusses how the staff of the newspaper at Camarillo High School (California) covered a bomb threat at their school. Describes how they, overnight, conducted interviews, took and developed photographs, produced the layout, and published the newspaper. (RS)

  6. Heat Waves Are Health Threats

    MedlinePlus

    ... https://medlineplus.gov/news/fullstory_159694.html Heat Waves Are Health Threats Drink plenty of water and ... 2016 SATURDAY, July 2, 2016 (HealthDay News) -- Heat waves are more than uncomfortable, they can be deadly. ...

  7. Combating the Insider Cyber Threat

    SciTech Connect

    Greitzer, Frank L.; Moore, Andrew P.; Cappelli, Dawn M.; Andrews, Dee H.; Carroll, Lynn; Hull, Thomas D.

    2008-01-02

    This article represents a collaboration between PNNL, CERT/CMU, and AFRL that describes needs and related efforts by these institutions to develop technologies and approaches to counter cyber threats by insiders to informatin systems. The main focus of this article is on the need for effective training on insider threat to raise staff awareness and encourage organizations to adopt a more effective approach to identifying potential risks and take proactive steps to mitigate them.

  8. Understanding the structural basis of substrate recognition by Plasmodium falciparum plasmepsin V to aid in the design of potent inhibitors

    PubMed Central

    Bedi, Rajiv K.; Patel, Chandan; Mishra, Vandana; Xiao, Huogen; Yada, Rickey Y.; Bhaumik, Prasenjit

    2016-01-01

    Plasmodium falciparum plasmepsin V (PfPMV) is an essential aspartic protease required for parasite survival, thus, considered as a potential drug target. This study reports the first detailed structural analysis and molecular dynamics simulation of PfPMV as an apoenzyme and its complexes with the substrate PEXEL as well as with the inhibitor saquinavir. The presence of pro-peptide in PfPMV may not structurally hinder the formation of a functionally competent catalytic active site. The structure of PfPMV-PEXEL complex shows that the unique positions of Glu179 and Gln222 are responsible for providing the specificity of PEXEL substrate with arginine at P3 position. The structural analysis also reveals that the S4 binding pocket in PfPMV is occupied by Ile94, Ala98, Phe370 and Tyr472, and therefore, does not allow binding of pepstatin, a potent inhibitor of most pepsin-like aspartic proteases. Among the screened inhibitors, the HIV-1 protease inhibitors and KNI compounds have higher binding affinities for PfPMV with saquinavir having the highest value. The presence of a flexible group at P2 and a bulky hydrophobic group at P3 position of the inhibitor is preferred in the PfPMV substrate binding pocket. Results from the present study will aid in the design of potent inhibitors of PMV. PMID:27531685

  9. Understanding the structural basis of substrate recognition by Plasmodium falciparum plasmepsin V to aid in the design of potent inhibitors.

    PubMed

    Bedi, Rajiv K; Patel, Chandan; Mishra, Vandana; Xiao, Huogen; Yada, Rickey Y; Bhaumik, Prasenjit

    2016-01-01

    Plasmodium falciparum plasmepsin V (PfPMV) is an essential aspartic protease required for parasite survival, thus, considered as a potential drug target. This study reports the first detailed structural analysis and molecular dynamics simulation of PfPMV as an apoenzyme and its complexes with the substrate PEXEL as well as with the inhibitor saquinavir. The presence of pro-peptide in PfPMV may not structurally hinder the formation of a functionally competent catalytic active site. The structure of PfPMV-PEXEL complex shows that the unique positions of Glu179 and Gln222 are responsible for providing the specificity of PEXEL substrate with arginine at P3 position. The structural analysis also reveals that the S4 binding pocket in PfPMV is occupied by Ile94, Ala98, Phe370 and Tyr472, and therefore, does not allow binding of pepstatin, a potent inhibitor of most pepsin-like aspartic proteases. Among the screened inhibitors, the HIV-1 protease inhibitors and KNI compounds have higher binding affinities for PfPMV with saquinavir having the highest value. The presence of a flexible group at P2 and a bulky hydrophobic group at P3 position of the inhibitor is preferred in the PfPMV substrate binding pocket. Results from the present study will aid in the design of potent inhibitors of PMV. PMID:27531685

  10. Insider Threat and Information Security Management

    NASA Astrophysics Data System (ADS)

    Coles-Kemp, Lizzie; Theoharidou, Marianthi

    The notion of insider has multiple facets. An organization needs to identify which ones to respond to. The selection, implementetion and maintenance of information security countermeasures requires a complex combination of organisational policies, functions and processes, which form Information Security Management. This chapter examines the role of current information security management practices in addressing the insider threat. Most approaches focus on frameworks for regulating insider behaviour and do not allow for the various cultural responses to the regulatory and compliance framework. Such responses are not only determined by enforcement of policies and awareness programs, but also by various psychological and organisational factors at an individual or group level. Crime theories offer techniques that focus on such cultural responses and can be used to enhance the information security management design. The chapter examines the applicability of several crime theories and concludes that they can contribute in providing additional controls and redesign of information security management processes better suited to responding to the insider threat.

  11. Material Performance of Fully-Ceramic Micro-Encapsulated Fuel under Selected LWR Design Basis Scenarios: Final Report

    SciTech Connect

    B. Boer; R. S. Sen; M. A. Pope; A. M. Ougouag

    2011-09-01

    The extension to LWRs of the use of Deep-Burn coated particle fuel envisaged for HTRs has been investigated. TRISO coated fuel particles are used in Fully-Ceramic Microencapsulated (FCM) fuel within a SiC matrix rather than the graphite of HTRs. TRISO particles are well characterized for uranium-fueled HTRs. However, operating conditions of LWRs are different from those of HTRs (temperature, neutron energy spectrum, fast fluence levels, power density). Furthermore, the time scales of transient core behavior during accidents are usually much shorter and thus more severe in LWRs. The PASTA code was updated for analysis of stresses in coated particle FCM fuel. The code extensions enable the automatic use of neutronic data (burnup, fast fluence as a function of irradiation time) obtained using the DRAGON neutronics code. An input option for automatic evaluation of temperature rise during anticipated transients was also added. A new thermal model for FCM was incorporated into the code; so-were updated correlations (for pyrocarbon coating layers) suitable to estimating dimensional changes at the high fluence levels attained in LWR DB fuel. Analyses of the FCM fuel using the updated PASTA code under nominal and accident conditions show: (1) Stress levels in SiC-coatings are low for low fission gas release (FGR) fractions of several percent, as based on data of fission gas diffusion in UO{sub 2} kernels. However, the high burnup level of LWR-DB fuel implies that the FGR fraction is more likely to be in the range of 50-100%, similar to Inert Matrix Fuels (IMFs). For this range the predicted stresses and failure fractions of the SiC coating are high for the reference particle design (500 {micro}mm kernel diameter, 100 {micro}mm buffer, 35 {micro}mm IPyC, 35 {micro}mm SiC, 40 {micro}mm OPyC). A conservative case, assuming 100% FGR, 900K fuel temperature and 705 MWd/kg (77% FIMA) fuel burnup, results in a 8.0 x 10{sup -2} failure probability. For a 'best-estimate' FGR fraction

  12. An implementation-independent threat model for group communications

    NASA Astrophysics Data System (ADS)

    Hester, Jason; Yurcik, William; Campbell, Roy

    2006-04-01

    The importance of group communications and the need to efficiently and reliably support it across a network is an issue of growing importance for the next decade. New group communication services are emerging such as multimedia conferencing/groupware, distributed interactive simulations, sensor fusion systems, command and control centers, and network-centric military applications. While a succession of point-to-point unicast routes could provide group communications, this approach is inherently inefficient and unlikely to support the increased resource requirements of these new services. There is the lack of a comprehensive process to designing security into group communications schemes. Designing such protection for group communications is best done by utilizing proactive system engineering rather than reacting with ad hoc countermeasures to the latest attack du jour. Threat modeling is the foundation for secure system engineering processes because it organizes system threats and vulnerabilities into general classes so they can be addressed with known protection techniques. Although there has been prior work on threat modeling primarily for software applications, however, to our knowledge this is the first attempt at implementation-independent threat modeling for group communications. We discuss protection challenges unique to group communications and propose a process to create a threat model for group communication systems independent of underlying implementation based on classical security principles (Confidentiality, Integrity, Availability, Authentication, or CIAA). It is our hope that this work will lead to better designs for protection solutions against threats to group communication systems.

  13. Safety Basis Report

    SciTech Connect

    R.J. Garrett

    2002-01-14

    As part of the internal Integrated Safety Management Assessment verification process, it was determined that there was a lack of documentation that summarizes the safety basis of the current Yucca Mountain Project (YMP) site characterization activities. It was noted that a safety basis would make it possible to establish a technically justifiable graded approach to the implementation of the requirements identified in the Standards/Requirements Identification Document. The Standards/Requirements Identification Documents commit a facility to compliance with specific requirements and, together with the hazard baseline documentation, provide a technical basis for ensuring that the public and workers are protected. This Safety Basis Report has been developed to establish and document the safety basis of the current site characterization activities, establish and document the hazard baseline, and provide the technical basis for identifying structures, systems, and components (SSCs) that perform functions necessary to protect the public, the worker, and the environment from hazards unique to the YMP site characterization activities. This technical basis for identifying SSCs serves as a grading process for the implementation of programs such as Conduct of Operations (DOE Order 5480.19) and the Suspect/Counterfeit Items Program. In addition, this report provides a consolidated summary of the hazards analyses processes developed to support the design, construction, and operation of the YMP site characterization facilities and, therefore, provides a tool for evaluating the safety impacts of changes to the design and operation of the YMP site characterization activities.

  14. Threat image projection in CCTV

    NASA Astrophysics Data System (ADS)

    Neil, David; Thomas, Nicola; Baker, Bob

    2007-10-01

    Operators are key components in a Closed Circuit Television (CCTV) system, being the link between the system technology and its effective use. Operators' performance will largely determine the level of service provided by the system. There have been few studies testing operator performance, while much work has been done to test the performance of the technology. Previous work on CCTV operator performance carried out by the Home Office Scientific Development Branch (HOSDB) has used filmed video and subjects who knew they were undergoing testing, meaning subjects are likely to be concentrating harder on performing well. HOSDB believes that there is a need for a test that would be able to be routinely used in a CCTV control room throughout the course of a normal shift to provide management with operational performance data. Threat Image Projection (TIP) is routinely used in X-Ray baggage scanners to keep operators alert to possible threats. At random intervals, a threat target image is superimposed over the image of the baggage being screened. The operator then responds to this threat. A similar system could be used for CCTV operators. A threat image would be randomly superimposed over the live CCTV feed and the operator would be expected to respond to this.

  15. Cyber threat model for tactical radio networks

    NASA Astrophysics Data System (ADS)

    Kurdziel, Michael T.

    2014-05-01

    The shift to a full information-centric paradigm in the battlefield has allowed ConOps to be developed that are only possible using modern network communications systems. Securing these Tactical Networks without impacting their capabilities has been a challenge. Tactical networks with fixed infrastructure have similar vulnerabilities to their commercial counterparts (although they need to be secure against adversaries with greater capabilities, resources and motivation). However, networks with mobile infrastructure components and Mobile Ad hoc Networks (MANets) have additional unique vulnerabilities that must be considered. It is useful to examine Tactical Network based ConOps and use them to construct a threat model and baseline cyber security requirements for Tactical Networks with fixed infrastructure, mobile infrastructure and/or ad hoc modes of operation. This paper will present an introduction to threat model assessment. A definition and detailed discussion of a Tactical Network threat model is also presented. Finally, the model is used to derive baseline requirements that can be used to design or evaluate a cyber security solution that can be scaled and adapted to the needs of specific deployments.

  16. SARS: An Emerging Global Microbial Threat.

    PubMed Central

    Hughes, James M.

    2004-01-01

    In March 2003, the Institute of Medicine published an update to its 1992 landmark report on emerging infections. The new report, Microbial Threats to Health: Emergence, Detection, and Response, describes the current spectrum of global microbial threats, factors affecting their emergence or resurgence, and measures that should be undertaken to effectively address them. Coincident with this publication came increasing reports of severe atypical pneumonia of unknown etiology among persons in southeast Asia. This new disease, designated severe acute respiratory syndrome (SARS), spread globally in a matter of weeks, infecting primarily close contacts of index patients (e.g., household members and healthcare workers caring for index patients) but also resulting in community transmission in some areas. An unprecedented worldwide collaborative effort was undertaken to determine the cause of the illness and implement prevention measures. A previously unrecognized coronavirus was identified as the causative agent, and health officials throughout the world struggled to implement measures to contain its spread, including isolation of suspect SARS cases and quarantine of exposed persons. The emergence of SARS is a timely reminder of the need to expect the unexpected and to ensure strong national and global public health partnerships when preparing for and responding to infectious diseases. Effectively addressing the threat of SARS will require enhanced global infectious disease surveillance, the development of rapid diagnostics, new therapies, and vaccines, implementation of aggressive evidence-based infection control strategies, and effective communication. Images Fig. 2 Fig. 3 PMID:17060979

  17. 28 CFR 36.208 - Direct threat.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Direct threat. 36.208 Section 36.208... ACCOMMODATIONS AND IN COMMERCIAL FACILITIES General Requirements § 36.208 Direct threat. (a) This part does not... individual poses a direct threat to the health or safety of others. (b) Direct threat means a...

  18. The Social Construction of the Soviet Threat.

    ERIC Educational Resources Information Center

    Nathanson, Charles E.; Skelly, James M.

    For almost 40 years the perception of a Soviet threat has influenced much foreign and domestic political behavior in the United States. How to respond to the threat has been a subject of intense debate, but the reality of the threat has been taken for granted. Conviction about the reality of this threat dates back to George Kennan's long telegram…

  19. Comparative Environmental Threat Analysis: Three Case Studies.

    ERIC Educational Resources Information Center

    Latour, J. B.; Reiling, R.

    1994-01-01

    Reviews how carrying capacity for different environmental problems is operationalized. Discusses whether it is possible to compare threats, using the exceeding of carrying capacity as a yardstick. Points out problems in comparative threat analysis using three case studies: threats to European groundwater resources, threats to ecosystems in Europe,…

  20. Cyber threats within civil aviation

    NASA Astrophysics Data System (ADS)

    Heitner, Kerri A.

    Existing security policies in civil aviation do not adequately protect against evolving cyber threats. Cybersecurity has been recognized as a top priority among some aviation industry leaders. Heightened concerns regarding cyber threats and vulnerabilities surround components utilized in compliance with the Federal Aviation Administration's (FAA) Next Generation Air Transportation (NextGen) implementation. Automated Dependent Surveillance-B (ADS-B) and Electronic Flight Bags (EFB) have both been exploited through the research of experienced computer security professionals. Civil aviation is essential to international infrastructure and if its critical assets were compromised, it could pose a great risk to public safety and financial infrastructure. The purpose of this research was to raise awareness of aircraft system vulnerabilities in order to provoke change among current national and international cybersecurity policies, procedures and standards. Although the education of cyber threats is increasing in the aviation industry, there is not enough urgency when creating cybersecurity policies. This project intended to answer the following questions: What are the cyber threats to ADS-B of an aircraft in-flight? What are the cyber threats to EFB? What is the aviation industry's response to the issue of cybersecurity and in-flight safety? ADS-B remains unencrypted while the FAA's mandate to implement this system is rapidly approaching. The cyber threat of both portable and non-portable EFB's have received increased publicity, however, airlines are not responding quick enough (if at all) to create policies for the use of these devices. Collectively, the aviation industry is not being proactive enough to protect its aircraft or airport network systems. That is not to say there are not leaders in cybersecurity advancement. These proactive organizations must set the standard for the future to better protect society and it's most reliable form of transportation.

  1. Design of the pH profile for asymmetric bioreduction of ethyl 4-chloro-3-oxobutyrate on the basis of a data-driven method.

    PubMed

    Chen, Junghui; Wang, Kuan-Po; Houng, Jer-Yiing; Lee, Shiou-Ling

    2002-01-01

    The goal of this paper was to design the optimal time-varying operating pH profile in the asymmetric reduction of ethyl 4-chloro-3-oxobutyrate by baker's yeast. Ethyl (S)-4-chloro-3-hydroxybutyrate was produced to reach two important quality indices: reaction yield and product optical purity. The method integrated an orthogonal function approximation and an orthogonal array. The technique used a set of orthonormal functions as the basis for representing the possible profile. The optimal profile could be obtained if the orthogonal coefficients were properly adjusted. The orthogonal array was used to design and analyze the effect of each orthogonal coefficient in order to reach the optimal objective (quality) function. The performance based on the proposed strategy was significantly improved by over 10% compared with the traditional fixed pH or uncontrolled pH values during the reaction. The proposed method can be applied to the required dynamic profile in the bioreactor process to effectively improve the product quality, given good design directions and the advantage of the traditional statistical approach. PMID:12467479

  2. Recent advances in the development of a novel aerosol sorting and deposition system for bio-threat sensing applications

    NASA Astrophysics Data System (ADS)

    Pletcher, Timothy; McGinn, Joseph; Keller, David; Huston, Alan; Eversole, Jay; Sivaprakasum, Vasanthi

    2007-10-01

    Sarnoff Corporation and the Naval Research Laboratory, through support of the U.S. Department of Homeland Security, are developing an automated, high throughput bio-aerosol physical enrichment system designed for use as part of a biological-threat protection system. The Biological Aerosol-Capture-Enrichment (BioACE) system is a bio-aerosol collection system that combines three unique technologies to create physically enriched aerosol samples that can be subsequently interrogated by any number of bio-threat detection systems for the presence of threat agents. An air-to-air concentrator uses an inertial separation technique to highly concentrate an aerosol sample presented to a dual wavelength ultra-violet laser induced fluorescence (UVLIF) optical trigger used to discriminate potential threat particles from non-threat particles conveyed in a collimated particle stream. This particle classification information is used to trigger an electrostatic deposition mechanism to deposit only those particles determined to be potential bio-threats onto a stainless steel substrate. Non-threat particles are discarded with the exiting airflow. The goal for the most recent development effort has been the integration and optimization of these technologies into a unit capable of producing highly enriched particulate samples from ambient air containing variable background aerosol loading and type. Several key technical and engineering challenges were overcome during the course of this development including a unique solution for compensating particle velocity dispersion within the airflow, development of a real-time signal acquisition and detection algorithm for determining material type on a particle by particle basis at rates greater than 2000 particles per second, and the introduction of a robust method for transferring deposited particulate into a 50ul wet sample suitable for most advanced bio-detection techniques. This paper will briefly describe the overall system architecture and

  3. A balance procedure for calculating the model fuel assemblies reflooding during design basis accident and its verification on PARAMETER test facility

    NASA Astrophysics Data System (ADS)

    Bazyuk, S. S.; Ignat'ev, D. N.; Parshin, N. Ya.; Popov, E. B.; Soldatkin, D. M.; Kuzma-Kichta, Yu. A.

    2013-05-01

    A balance procedure is proposed for estimating the main parameters characterizing the process of model fuel assemblies reflooding of a VVER reactor made on different scales under the conditions of a design basis accident by subjecting them to bottom reflooding1. The proposed procedure satisfactorily describes the experimental data obtained on PARAMETER test facility in the temperature range up to 1200°C. The times of fuel assemblies quenching by bottom reflooding calculated using the proposed procedure are in satisfactory agreement with the experimental data obtained on model fuel assemblies of VVER- and PWR-type reactors and can be used in developing measures aimed at enhancing the safety of nuclear power stations.

  4. Contamination threats to critical surfaces from handling and storage practices.

    NASA Technical Reports Server (NTRS)

    Poehlmann, H. C.; Manning, R. R.; Jackman, R. W.

    1972-01-01

    Review of the procedures and results of a program designed to remove the threat of sources of molecular and particulate contamination of critical optical, electrical, and mechanical elements in spacecraft. The results of recent contamination-probing thermal-vacuum tests indicate that some of the materials and practices commonly used to protect critical surfaces from molecular or particulate contamination can themselves represent significant threats. These contamination sources include clean-room and clean-tent materials, gloves, tissues, and covering or packaging materials. Mass and infrared spectral analyses of these materials and the environments and instruments exposed to them show that the contaminants are mostly plasticizers, slip or antistatic agents, and binders used in the manufacture of these products. Products of particular threat include vinyl gloves, boots, clean-tent walls, and some polyethylene sheets and bags. Techniques for reducing these threats are discussed.

  5. Identifying chemicals that are planetary boundary threats.

    PubMed

    MacLeod, Matthew; Breitholtz, Magnus; Cousins, Ian T; de Wit, Cynthia A; Persson, Linn M; Rudén, Christina; McLachlan, Michael S

    2014-10-01

    Rockström et al. proposed a set of planetary boundaries that delimit a "safe operating space for humanity". Many of the planetary boundaries that have so far been identified are determined by chemical agents. Other chemical pollution-related planetary boundaries likely exist, but are currently unknown. A chemical poses an unknown planetary boundary threat if it simultaneously fulfills three conditions: (1) it has an unknown disruptive effect on a vital Earth system process; (2) the disruptive effect is not discovered until it is a problem at the global scale, and (3) the effect is not readily reversible. In this paper, we outline scenarios in which chemicals could fulfill each of the three conditions, then use the scenarios as the basis to define chemical profiles that fit each scenario. The chemical profiles are defined in terms of the nature of the effect of the chemical and the nature of exposure of the environment to the chemical. Prioritization of chemicals in commerce against some of the profiles appears feasible, but there are considerable uncertainties and scientific challenges that must be addressed. Most challenging is prioritizing chemicals for their potential to have a currently unknown effect on a vital Earth system process. We conclude that the most effective strategy currently available to identify chemicals that are planetary boundary threats is prioritization against profiles defined in terms of environmental exposure combined with monitoring and study of the biogeochemical processes that underlie vital Earth system processes to identify currently unknown disruptive effects. PMID:25181298

  6. Measuring Vulnerability to Stereotype Threat

    ERIC Educational Resources Information Center

    Barnard, Lucy; Burley, Hansel; Olivarez, Arturo; Crooks, Steven

    2008-01-01

    Introduction: In this study, we examined the psychometric properties of an instrument intended to measure vulnerability to stereotype threat. Method: We revised the instrument through assessing score reliability and then examined a domain specific model using confirmatory factor analyses. After examining the responses of the total sample…

  7. Hostile intelligence threat: US technology

    SciTech Connect

    Whitman, D.

    1988-11-01

    This publication outlines the hostile intelligence threat to U.S. industry and Western technology, including the operational capabilities of hostile intelligence services and their scientific and technological (S T) targets. Current intelligence strategies used against the United States are described and sources of information providing countermeasures guidance are listed. Points of contact for security and counterintelligence assistance are also included.

  8. Bomb Threats Taking Financial Toll

    ERIC Educational Resources Information Center

    Bowman, Darcia Harris

    2004-01-01

    Despite all its efforts to crack down on the bomb scares that disrupted classes again and again in 2003, North Carolina's Orange County district fell victim to yet another false alarm this school year, 2004. For some schools, bomb threats have become more routine than fire drills, with each incident ringing up multi-thousand-dollar tabs for…

  9. Cyber Threats to Nuclear Infrastructures

    SciTech Connect

    Robert S. Anderson; Paul Moskowitz; Mark Schanfein; Trond Bjornard; Curtis St. Michel

    2010-07-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  10. 340 waste handling facility interim safety basis

    SciTech Connect

    VAIL, T.S.

    1999-04-01

    This document presents an interim safety basis for the 340 Waste Handling Facility classifying the 340 Facility as a Hazard Category 3 facility. The hazard analysis quantifies the operating safety envelop for this facility and demonstrates that the facility can be operated without a significant threat to onsite or offsite people.

  11. 340 Waste handling facility interim safety basis

    SciTech Connect

    Stordeur, R.T.

    1996-10-04

    This document presents an interim safety basis for the 340 Waste Handling Facility classifying the 340 Facility as a Hazard Category 3 facility. The hazard analysis quantifies the operating safety envelop for this facility and demonstrates that the facility can be operated without a significant threat to onsite or offsite people.

  12. Meteoroids and Meteor Storms: A Threat to Spacecraft

    NASA Technical Reports Server (NTRS)

    Anderson, B. Jeffrey

    1999-01-01

    Robust system design is the best protection against meteoroid damage. Impacts by small meteoroids are common on satellite surfaces, but impacts by meteoroids large enough to damage well designed systems are very rare. Estimating the threat from the normal meteoroid environment is difficult. Estimates for the occasional "storm" are even more uncertain. Common sense precautions are in order for the 1999 Leonids, but wide-spread catastrophic damage is highly unlikely. Strong Leonid showers are also expected in 2000 and 2001, but these pose much less threat than 1999.

  13. Monitoring Technologies for Mitigating Insider Threats

    NASA Astrophysics Data System (ADS)

    Bowen, Brian M.; Salem, Malek Ben; Keromytis, Angelos D.; Stolfo, Salvatore J.

    In this chapter, we propose a design for an insider threat detection system that combines an array of complementary techniques that aims to detect evasive adversaries. We are motivated by real world incidents and our experience with building isolated detectors: such standalone mechanisms are often easily identified and avoided by malefactors. Our work-in-progress combines host-based user-event monitoring sensors with trap-based decoys and remote network detectors to track and correlate insider activity. We introduce and formalize a number of properties of decoys as a guide to design trap-based defenses to increase the likelihood of detecting an insider attack. We identify several challenges in scaling up, deploying, and validating our architecture in real environments.

  14. Design of hybrid radial basis function neural networks (HRBFNNs) realized with the aid of hybridization of fuzzy clustering method (FCM) and polynomial neural networks (PNNs).

    PubMed

    Huang, Wei; Oh, Sung-Kwun; Pedrycz, Witold

    2014-12-01

    In this study, we propose Hybrid Radial Basis Function Neural Networks (HRBFNNs) realized with the aid of fuzzy clustering method (Fuzzy C-Means, FCM) and polynomial neural networks. Fuzzy clustering used to form information granulation is employed to overcome a possible curse of dimensionality, while the polynomial neural network is utilized to build local models. Furthermore, genetic algorithm (GA) is exploited here to optimize the essential design parameters of the model (including fuzzification coefficient, the number of input polynomial fuzzy neurons (PFNs), and a collection of the specific subset of input PFNs) of the network. To reduce dimensionality of the input space, principal component analysis (PCA) is considered as a sound preprocessing vehicle. The performance of the HRBFNNs is quantified through a series of experiments, in which we use several modeling benchmarks of different levels of complexity (different number of input variables and the number of available data). A comparative analysis reveals that the proposed HRBFNNs exhibit higher accuracy in comparison to the accuracy produced by some models reported previously in the literature. PMID:25233483

  15. An approach to estimating radiological risk of offsite release from a design basis earthquake for the Process Experimental Pilot Plant (PREPP)

    SciTech Connect

    Lucero, V.; Meale, B.M.; Reny, D.A.; Brown, A.N.

    1990-09-01

    In compliance with Department of Energy (DOE) Order 6430.1A, a seismic analysis was performed on DOE's Process Experimental Pilot Plant (PREPP), a facility for processing low-level and transuranic (TRU) waste. Because no hazard curves were available for the Idaho National Engineering Laboratory (INEL), DOE guidelines were used to estimate the frequency for the specified design-basis earthquake (DBE). A dynamic structural analysis of the building was performed, using the DBE parameters, followed by a probabilistic risk assessment (PRA). For the PRA, a functional organization of the facility equipment was effected so that top events for a representative event tree model could be determined. Building response spectra (calculated from the structural analysis), in conjunction with generic fragility data, were used to generate fragility curves for the PREPP equipment. Using these curves, failure probabilities for each top event were calculated. These probabilities were integrated into the event tree model, and accident sequences and respective probabilities were calculated through quantification. By combining the sequences failure probabilities with a transport analysis of the estimated airborne source term from a DBE, onsite and offsite consequences were calculated. The results of the comprehensive analysis substantiated the ability of the PREPP facility to withstand a DBE with negligible consequence (i.e., estimated release was within personnel and environmental dose guidelines). 57 refs., 19 figs., 20 tabs.

  16. Effects of non-latching blast valves on the source term and consequences of the design-basis accidents in the Device Assembly Facility (DAF)

    SciTech Connect

    Nguyen, D.H.

    1993-08-01

    The analysis of the Design-Basis Accidents (DBA) involving high explosives (HE) and Plutonium (Pu) in the assembly cell of the Device Assembly Facility (DAF), which was completed earlier, assumed latching blast valves in the ventilation system of the assembly cell. Latching valves effectively sealed a release path through the ventilation duct system. However, the blast valves in the assembly cell, as constructed are actually non-latching valves, and would reopen when the gas pressure drops to 0.5 psi above one atmosphere. Because the reopening of the blast valves provides an additional release path to the environment, and affects the material transport from the assembly cell to other DAF buildings, the DOE/NV DAF management has decided to support an additional analysis of the DAF`s DBA to account for the effects of non-latching valves. Three cases were considered in the DAF`s DBA, depending on the amount of HE and Pu involved, as follows: Case 1 -- 423 {number_sign}HE, 16 kg Pu; Case 2 -- 150 {number_sign}HE 10 kg Pu; Case 3 -- 55 {number_sign}HE 5 kg Pu. The results of the analysis with non-latching valves are summarized.

  17. 24 CFR 9.131 - Direct threat.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 24 Housing and Urban Development 1 2011-04-01 2011-04-01 false Direct threat. 9.131 Section 9.131... DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT § 9.131 Direct threat. (a) This part does not require the agency..., privileges, advantages and accommodations of that agency when that individual poses a direct threat to...

  18. 28 CFR 35.139 - Direct threat.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 28 Judicial Administration 1 2013-07-01 2013-07-01 false Direct threat. 35.139 Section 35.139... LOCAL GOVERNMENT SERVICES General Requirements § 35.139 Direct threat. (a) This part does not require a... activities of that public entity when that individual poses a direct threat to the health or safety of...

  19. 28 CFR 36.208 - Direct threat.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 28 Judicial Administration 1 2013-07-01 2013-07-01 false Direct threat. 36.208 Section 36.208... ACCOMMODATIONS AND IN COMMERCIAL FACILITIES General Requirements § 36.208 Direct threat. (a) This part does not... individual poses a direct threat to the health or safety of others. (b) In determining whether an...

  20. 28 CFR 36.208 - Direct threat.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 28 Judicial Administration 1 2012-07-01 2012-07-01 false Direct threat. 36.208 Section 36.208... ACCOMMODATIONS AND IN COMMERCIAL FACILITIES General Requirements § 36.208 Direct threat. (a) This part does not... individual poses a direct threat to the health or safety of others. (b) In determining whether an...

  1. 24 CFR 9.131 - Direct threat.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 24 Housing and Urban Development 1 2013-04-01 2013-04-01 false Direct threat. 9.131 Section 9.131... DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT § 9.131 Direct threat. (a) This part does not require the agency..., privileges, advantages and accommodations of that agency when that individual poses a direct threat to...

  2. 28 CFR 35.139 - Direct threat.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 28 Judicial Administration 1 2014-07-01 2014-07-01 false Direct threat. 35.139 Section 35.139... LOCAL GOVERNMENT SERVICES General Requirements § 35.139 Direct threat. (a) This part does not require a... activities of that public entity when that individual poses a direct threat to the health or safety of...

  3. 28 CFR 36.208 - Direct threat.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 28 Judicial Administration 1 2014-07-01 2014-07-01 false Direct threat. 36.208 Section 36.208... ACCOMMODATIONS AND IN COMMERCIAL FACILITIES General Requirements § 36.208 Direct threat. (a) This part does not... individual poses a direct threat to the health or safety of others. (b) In determining whether an...

  4. 28 CFR 36.208 - Direct threat.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 28 Judicial Administration 1 2011-07-01 2011-07-01 false Direct threat. 36.208 Section 36.208... ACCOMMODATIONS AND IN COMMERCIAL FACILITIES General Requirements § 36.208 Direct threat. (a) This part does not... individual poses a direct threat to the health or safety of others. (b) In determining whether an...

  5. 24 CFR 9.131 - Direct threat.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 24 Housing and Urban Development 1 2014-04-01 2014-04-01 false Direct threat. 9.131 Section 9.131... DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT § 9.131 Direct threat. (a) This part does not require the agency..., privileges, advantages and accommodations of that agency when that individual poses a direct threat to...

  6. 24 CFR 9.131 - Direct threat.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false Direct threat. 9.131 Section 9.131... DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT § 9.131 Direct threat. (a) This part does not require the agency..., privileges, advantages and accommodations of that agency when that individual poses a direct threat to...

  7. 28 CFR 35.139 - Direct threat.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 28 Judicial Administration 1 2012-07-01 2012-07-01 false Direct threat. 35.139 Section 35.139... LOCAL GOVERNMENT SERVICES General Requirements § 35.139 Direct threat. (a) This part does not require a... activities of that public entity when that individual poses a direct threat to the health or safety of...

  8. 28 CFR 35.139 - Direct threat.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 28 Judicial Administration 1 2011-07-01 2011-07-01 false Direct threat. 35.139 Section 35.139... LOCAL GOVERNMENT SERVICES General Requirements § 35.139 Direct threat. (a) This part does not require a... activities of that public entity when that individual poses a direct threat to the health or safety of...

  9. Threat Assessment Teams Target School Crisis

    ERIC Educational Resources Information Center

    Stover, Del

    2005-01-01

    In this article, the author discusses the creation of a threat-assessment team to be utilized in order to analyze each threat and the usage of threat-assessment protocols for the purpose of guiding school administrators through a crisis. These are actually developed with the advice from the US Department of Education and the Secret Service. When a…

  10. Stereotype Threat, Test Anxiety, and Mathematics Performance

    ERIC Educational Resources Information Center

    Tempel, Tobias; Neumann, Roland

    2014-01-01

    We investigated the combined effects of stereotype threat and trait test anxiety on mathematics test performance. Stereotype threat and test anxiety interacted with each other in affecting performance. Trait test anxiety predicted performance only in a diagnostic condition that prevented stereotype threat by stereotype denial. A state measure of…

  11. Identifying Separation Threats in Family Therapy.

    ERIC Educational Resources Information Center

    Argles, Paul

    1983-01-01

    Outlines the types of separation threats common in troubled families. Signs that threats are being used may include inappropriate clinging behavior, phobias, psychosomatic symptoms, and anxious attachment. Therapists may find other behaviors, often seen as problems in themselves, that are really reactions to perceived separation threats. (JAC)

  12. Perfectionism Moderates Stereotype Threat Effects on STEM Majors' Academic Performance

    ERIC Educational Resources Information Center

    Rice, Kenneth G.; Lopez, Frederick G.; Richardson, Clarissa M. E.; Stinson, Jennifer M.

    2013-01-01

    Using a randomized, between-subjects experimental design, we tested hypotheses that self-critical perfectionism would moderate the effects of subtle stereotype threat (ST) for women and students in underrepresented racial/ethnic groups who are pursuing traditional degrees in science, technology, engineering, or math (STEM). A diverse sample of…

  13. The role of threats in animal cooperation

    PubMed Central

    Cant, Michael A.

    2011-01-01

    In human societies, social behaviour is strongly influenced by threats of punishment, even though the threats themselves rarely need to be exercised. Recent experimental evidence suggests that similar hidden threats can promote cooperation and limit within-group selfishness in some animal systems. In other animals, however, threats appear to be ineffective. Here I review theoretical and empirical studies that help to understand the evolutionary causes of these contrasting patterns, and identify three factors—impact, accuracy and perception—that together determine the effectiveness of threats to induce cooperation. PMID:20798110

  14. Stereotype threat and female communication styles.

    PubMed

    von Hippel, Courtney; Wiryakusuma, Cindy; Bowden, Jessica; Shochet, Megan

    2011-10-01

    A large body of research has documented the performance-debilitating effects of stereotype threat for individuals, but there is a paucity of research exploring interpersonal consequences of stereotype threat. Two experiments tested the hypothesis that stereotype threat would change the style in which women communicate. Results indicate that women who experience stereotype threat regarding leadership abilities react against the stereotype by adopting a more masculine communication style. Study 2 provides evidence that self-affirmation eliminates this effect of stereotype threat on women's communication styles. A third study demonstrates an ironic consequence of this effect of stereotype threat on women's communication--when women under stereotype threat adopt a more masculine communication style, they are rated as less warm and likeable, and evaluators indicate less willingness to comply with their requests. Theoretical and practical implications of these findings are discussed. PMID:21646549

  15. Novel Threat-risk Index Using Probabilistic Risk Assessment and Human Reliability Analysis - Final Report

    SciTech Connect

    George A. Beitel

    2004-02-01

    In support of a national need to improve the current state-of-the-art in alerting decision makers to the risk of terrorist attack, a quantitative approach employing scientific and engineering concepts to develop a threat-risk index was undertaken at the Idaho National Engineering and Environmental Laboratory (INEEL). As a result of this effort, a set of models has been successfully integrated into a single comprehensive model known as Quantitative Threat-Risk Index Model (QTRIM), with the capability of computing a quantitative threat-risk index on a system level, as well as for the major components of the system. Such a threat-risk index could provide a quantitative variant or basis for either prioritizing security upgrades or updating the current qualitative national color-coded terrorist threat alert.

  16. MCNPX improvements for threat reduction applications

    SciTech Connect

    Waters, Laurie S; Durkee, Joe W; Elson, Jay S; Esch, Ernst I; Fensin, Michael L; Hendricks, John S; Holloway, Shannon T; James, Michael R; Jason, Andrew; Johns, Russell C; Johnson, M William; Kawano, Toshihiko; Mckinney, Gregg W; Moller, Peter; Pelowitz, Denise B

    2008-01-01

    The DHS Domestic Nuclear Detection Office (DNDO) is funding a multiyear program of improvements for the MCNPX{sup TM} Monte Carlo radiation-transport code. Additional work is underway for the DTRA Active Interrogation programs. Enhancements contained in the current MCNPX 2.6.0 RSICC release will be presented, including stopped-muon physics, delayed neutron and photon generation and automatic generation of source photons. Preliminary benchmarking comparisons with data taken with a PSI muon beam will be discussed. We will also describe current improvements now underway, including Nuclear Resonance Fluorescence, pulsed sources, and others. We will also describe very new work begun on a Threat-Reduction user inferface, designed to simplify the setup of TR-related calculations, and introduce standards into geometry, sources and backgrounds.

  17. Threat detection system for intersection collision avoidance

    NASA Astrophysics Data System (ADS)

    Jocoy, Edward H.; Pierowicz, John A.

    1998-01-01

    Calspan SRL Corporation is currently developing an on- vehicle threat detection system for intersection collision avoidance (ICA) as part of its ICA program with the National Highway Transportation Safety Administration. Crash scenarios were previously defined and an on-board radar sensor was designed. This paper describes recent efforts that include the development of a simulation of a multitarget tracker and collision avoidance algorithm used to predict system performance in a variety of target configurations in the various ICA crash scenarios. In addition, a current headway radar was mounted on the Calspan Instrumented Vehicle and in-traffic data were recorded for two limited crash scenarios. Warning functions were developed through the simulation and applied to the recorded data.

  18. Threat sensitivity in bipolar disorder.

    PubMed

    Muhtadie, Luma; Johnson, Sheri L

    2015-02-01

    Life stress is a major predictor of the course of bipolar disorder. Few studies have used laboratory paradigms to examine stress reactivity in bipolar disorder, and none have assessed autonomic reactivity to laboratory stressors. In the present investigation we sought to address this gap in the literature. Participants, 27 diagnosed with bipolar I disorder and 24 controls with no history of mood disorder, were asked to complete a complex working memory task presented as "a test of general intelligence." Self-reported emotions were assessed at baseline and after participants were given task instructions; autonomic physiology was assessed at baseline and continuously during the stressor task. Compared to controls, individuals with bipolar disorder reported greater increases in pretask anxiety from baseline and showed greater cardiovascular threat reactivity during the task. Group differences in cardiovascular threat reactivity were significantly correlated with comorbid anxiety in the bipolar group. Our results suggest that a multimethod approach to assessing stress reactivity-including the use of physiological parameters that differentiate between maladaptive and adaptive profiles of stress responding-can yield valuable information regarding stress sensitivity and its associations with negative affectivity in bipolar disorder. (PsycINFO Database Record (c) 2015 APA, all rights reserved). PMID:25688436

  19. Human collective reactions to threat.

    PubMed

    Dezecache, Guillaume

    2015-01-01

    A common assumption regarding mass emergency situations is that individuals in such contexts behave in a way that maximizes their likelihood to escape, at the expense, or with little concern for, the welfare and survival of their neighbors. Doing so, they might even compromise the effectiveness of group evacuation. This conception follows the views of early works on crowd psychology, a tradition born with Gustave Le Bon's The Crowd: a study of the Popular Mind, first published in 1895, and which has had a tremendous impact on scientific representations of people's behavior in mass emergency contexts. Indeed, this work has greatly contributed to the idea that, in such situations, people revert to a primitive, impulsive, irrational, and antisocial nature, causing the breakdown of social order. However, more empirically oriented studies have consistently reported little collective panic, as well as a great deal of solidarity and pro-social behavior during mass emergency situations. Because of institutional barriers, such views have remained largely unknown to cognitive psychologists. Yet these are important results in that they show that human individual and collective reactions to threat are primarily affiliative. Indeed, far from leading to the breakdown of the social fabrics, the presence of a common threat can strengthen social bonds. PMID:26263225

  20. Threat assessment using visual hierarchy and conceptual firearms ontology

    NASA Astrophysics Data System (ADS)

    Arslan, Abdullah N.; Hempelmann, Christian F.; Attardo, Salvatore; Blount, Grady Price; Sirakov, Nikolay Metodiev

    2015-05-01

    The work that established and explored the links between visual hierarchy and conceptual ontology of firearms for the purpose of threat assessment is continued. The previous study used geometrical information to find a target in the visual hierarchy and through the links with the conceptual ontology to derive high-level information that was used to assess a potential threat. Multiple improvements and new contributions are reported. The theoretical basis of the geometric feature extraction method was improved in terms of accuracy. The sample space used for validations is expanded from 31 to 153 firearms. Thus, a new larger and more accurate sequence of visual hierarchies was generated using a modified Gonzalez' clustering algorithm. The conceptual ontology is elaborated as well and more links were created between the two kinds of hierarchies (visual and conceptual). The threat assessment equation is refined around ammunition-related properties and uses high-level information from the conceptual hierarchy. The experiments performed on weapons identification and threat assessment showed that our system recognized 100% of the cases if a weapon already belongs to the ontology and in 90.8% of the cases, determined the correct third ancestor (level concept) if the weapon is unknown to the ontology. To validate the accuracy of identification for a very large data set, we calculated the intervals of confidence for our system.

  1. Teens Impulsively React Rather than Retreat from Threat

    PubMed Central

    Dreyfuss, Michael; Caudle, Kristina; Drysdale, Andrew T.; Johnston, Natalie E.; Cohen, Alexandra O.; Somerville, Leah H.; Galván, Adriana; Tottenham, Nim; Hare, Todd A.; Casey, BJ

    2014-01-01

    There is a significant inflection in risk taking and criminal behavior during adolescence, but the basis for this increase remains largely unknown. An increased sensitivity to rewards has been suggested to explain these behaviors. Yet juvenile offenses often occur in emotionally charged situations of negative valence. How behavior is altered by changes in negative emotional processes during adolescence has received less attention than changes in positive emotional processes. The current study uses a measure of impulsivity in combination with cues that signal threat or safety to assess developmental changes in emotional responses to threat cues. We show that adolescents, especially males, impulsively react to threat cues relative to neutral ones, more than adults or children, even when instructed not to respond. This adolescent specific behavioral pattern is paralleled by enhanced activity in limbic cortical regions implicated in detection and assignment of emotional value to inputs and in the subsequent regulation of responses to them when successfully suppressing impulsive responses to threat cues. In contrast, prefrontal control regions implicated in detecting and resolving competing responses show an adolescent emergent pattern (i.e., greater activity in adolescents and adults relative to children) during successful suppression of a response regardless of emotion. Our findings suggest that adolescence is a period of heightened sensitivity to social and emotional cues that results in diminished regulation of behavior in their presence. PMID:24821576

  2. Countering the Nuclear Terrorist Threat

    SciTech Connect

    Vantine, H C

    2002-10-04

    The nuclear/radioactive threat to homeland security posed by terrorists can be broken into four categories. Of highest concern is the use of an improvised nuclear device (IND). An IND, as its name implies, is a nuclear explosive device. It produces nuclear yield, and this nuclear yield has catastrophic effects. An IND is the ultimate terrorist weapon, and terrorist groups are actively attempting to acquire nuclear weapons. Detonation of an IND could dwarf the devastation of the September 11 attack on the World Trade Center. Dealing with the aftermath of an IND would be horrific. Rescue efforts and cleanup would be hazardous and difficult. Workers would have to wear full protection suits and self-contained breathing apparatus. Because of the residual radioactivity, in certain locations they could only work short times before acquiring their ''lifetime'' dose. As with the Chernobyl event, some rescue workers might well expose themselves to lethal doses of radiation, adding to the casualty toll. Enormous volumes of contaminated debris would have to be removed and disposed. If a terrorist group decides not to pursue an actual nuclear device, it might well turn to Radiological Dispersal Devices (RDDs) or ''dirty bombs'' as they are often called. RDDs spread radioactivity but they do not generate nuclear yield. The fabrication of an RDD requires radioactive material and a dispersal mechanism. Radioactive materials are used all over the world for medical, industrial, and research applications. Standards for safe handling and accountability of radioactive material vary around the world. Stories in the press suggest inadequate controls on radiological materials in parts of the world. The effects of an RDD vary widely, and are measured in terms of contamination area, health effects to the exposed population, and economic consequences. Even a negligible, but measurable, exposure would exploit the general public's fear of things radioactive and would have significant

  3. Stereotype threat and executive functions: which functions mediate different threat-related outcomes?

    PubMed

    Rydell, Robert J; Van Loo, Katie J; Boucher, Kathryn L

    2014-03-01

    Stereotype threat research shows that women's math performance can be reduced by activating gender-based math stereotypes. Models of stereotype threat assert that threat reduces cognitive functioning, thereby accounting for its negative effects. This work provides a more detailed understanding of the cognitive processes through which stereotype threat leads women to underperform at math and to take risks, by examining which basic executive functions (inhibition, shifting, and updating) account for these outcomes. In Experiments 1 and 2, women under threat showed reduced inhibition, reduced updating, and reduced math performance compared with women in a control condition (or men); however, only updating accounted for women's poor math performance under threat. In Experiment 3, only updating accounted for stereotype threat's effect on women's math performance, whereas only inhibition accounted for the effect of threat on risk-taking, suggesting that distinct executive functions can account for different stereotype threat-related outcomes. PMID:24345711

  4. Enhanced Memory for both Threat and Neutral Information Under Conditions of Intergroup Threat

    PubMed Central

    Zhu, Yong; Zhao, Yufang; Ybarra, Oscar; Stephan, Walter G.; Yang, Qing

    2015-01-01

    Few studies have examined the effect of intergroup threat on cognitive outcomes such as memory. Different theoretical perspectives can inform how intergroup threat should affect memory for threat-relevant and neutral information, such as the mood-congruency approach, Yerkes–Dodson law, Easterbrook’s theory, and also evolutionary perspectives. To test among these, we conducted two experiments to examine how exposure to intergroup threats affected memory compared to control conditions. In study 1, we manipulated symbolic threat and examined participants’ memory for threat and neutral words. In study 2, memory performance was assessed following the induction of realistic threat. Across the studies, in the control condition participants showed better memory for threat-related than neutral information. However, participants under threat remembered neutral information as well as threat-related information. In addition, participants in the threat condition remembered threat-related information as well as participants in the control condition. The findings are discussed in terms of automatic vigilance processes but also the effects of threat on arousal and its effect on information processing. This latter perspective, suggests paradoxically, that under some circumstances involving an outgroup threat, non-threatening information about outgroups can be extensively processed. PMID:26635669

  5. RESPONSE PROTOCOL TOOLBOX: PLANNING FOR AND RESPONDING TO DRINKING WATER CONTAMINATION THREATS AND INCIDENTS. OVERVIEW AND APPLICATION. INTERIM FINAL - DECEMBER 2003

    EPA Science Inventory

    The interim final Response Protocol Toolbox: Planning for and Responding to Contamination Threats to Drinking Water Systems is designed to help the water sector effectively and appropriately respond to intentional contamination threats and incidents. It was produced by EPA, buil...

  6. RESPONSE PROTOCOL TOOLBOX: PLANNING FOR AND RESPONDING TO DRINKING WATER CONTAMINATION THREATS AND INCIDENTS. MODULE 4: ANALYTICAL GUIDE. INTERIM FINAL - DECEMBER 2003

    EPA Science Inventory

    The interim final Response Protocol Toolbox: Planning for and Responding to Contamination Threats to Drinking Water Systems is designed to help the water sector effectively and appropriately respond to intentional contamination threats and incidents. It was produced by EPA, buil...

  7. RESPONSE PROTOCOL TOOLBOX: PLANNING FOR AND RESPONDING TO DRINKING WATER CONTAMINATION THREATS AND INCIDENTS, MODULE 3: SITE CHARACTERIZATION AND SAMPLING GUIDE. INTERIM FINAL - DECEMBER 2003

    EPA Science Inventory

    The interim final Response Protocol Toolbox: Planning for and Responding to Contamination Threats to Drinking Water Systems is designed to help the water sector effectively and appropriately respond to intentional contamination threats and incidents. It was produced by EPA, buil...

  8. RESPONSE PROTOCOL TOOLBOX: PLANNING FOR AND RESPONDING TO DRINKING WATER CONTAMINATION THREATS AND INCIDENTS. MODULE 1: WATER UTILITIES PLANNING GUIDE - INTERIM FINAL - DECEMBER 2003

    EPA Science Inventory

    The interim final Response Protocol Toolbox: Planning for and Responding to Contamination Threats to Drinking Water Systems is designed to help the water sector effectively and appropriately respond to intentional contamination threats and incidents. It was produced by EPA, buil...

  9. Potential threats to offshore platforms

    SciTech Connect

    Jenkins, B.M.

    1988-01-01

    Increasingly spectacular acts of terrorism have led to growing concern that terrorists will move beyond the symbols of society and directly attack its technological and industrial vulnerabilities. Offshore platforms have been frequently mentioned among the potential targets terrorists might attack. This concern, however, has not resulted in extensive research like that devoted to possible threats to nuclear facilities, which have also been frequently mentioned as possible future targets of terrorists. For one thing, offshore drilling does not invoke the fear inherent in the word nuclear, a fear that translates directly into heavy security for the nuclear industry. Neither does the construction of offshore platforms provoke anything like the kind of protest generated by the construction of nuclear facilities.

  10. World's soils are under threat

    NASA Astrophysics Data System (ADS)

    Montanarella, L.; Pennock, D. J.; McKenzie, N. J.; Badraoui, M.; Chude, V.; Baptista, I.; Mamo, T.; Yemefack, M.; Singh Aulakh, M.; Yagi, K.; Hong, S. Young; Vijarnsorn, P.; Zhang, G.-L.; Arrouays, D.; Black, H.; Krasilnikov, P.; Sobocká, J.; Alegre, J.; Henriquez, C. R.; Mendonça-Santos, M. L.; Taboada, M.; Espinosa-Victoria, D.; AlShankiti, A.; AlaviPanah, S. K.; Elsheikh, E. A. E.; Hempel, J.; Camps Arbestain, M.; Nachtergaele, F.; Vargas, R.

    2015-12-01

    The Intergovernmental Technical Panel on Soils has completed the first State of the World's Soil Resources report. Globally soil erosion was identified as the gravest threat, leading to deteriorating water quality in developed regions and to lowering of crop yields in many developing regions. We need to increase nitrogen and phosphorus fertilizer use in infertile tropical and semi-tropical soils - the regions where the most food insecure among us are found - while reducing global use of these products overall. Stores of soil organic carbon are critical in the global carbon balance, and national governments must set specific targets to stabilize or ideally increase soil organic carbon stores. Finally the quality of soil information available for policy formulation must be improved - the regional assessments in the SWSR report frequently base their evaluations on studies from the 1990s based on observations made in the 1980s or earlier.

  11. World's soils are under threat

    NASA Astrophysics Data System (ADS)

    Montanarella, Luca; Pennock, Daniel Jon; McKenzie, Neil; Badraoui, Mohamed; Chude, Victor; Baptista, Isaurinda; Mamo, Tekalign; Yemefack, Martin; Singh Aulakh, Mikha; Yagi, Kazuyuki; Hong, Suk Young; Vijarnsorn, Pisoot; Zhang, Gan-Lin; Arrouays, Dominique; Black, Helaina; Krasilnikov, Pavel; Sobocká, Jaroslava; Alegre, Julio; Henriquez, Carlos Roberto; de Lourdes Mendonça-Santos, Maria; Taboada, Miguel; Espinosa-Victoria, David; AlShankiti, Abdullah; Kazem AlaviPanah, Sayed; El Mustafa Elsheikh, Elsiddig Ahmed; Hempel, Jon; Camps Arbestain, Marta; Nachtergaele, Freddy; Vargas, Ronald

    2016-02-01

    The Intergovernmental Technical Panel on Soils has completed the first State of the World's Soil Resources Report. Globally soil erosion was identified as the gravest threat, leading to deteriorating water quality in developed regions and to lowering of crop yields in many developing regions. We need to increase nitrogen and phosphorus fertilizer use in infertile tropical and semi-tropical soils - the regions where the most food insecurity among us are found - while reducing global use of these products overall. Stores of soil organic carbon are critical in the global carbon balance, and national governments must set specific targets to stabilize or ideally increase soil organic carbon stores. Finally the quality of soil information available for policy formulation must be improved - the regional assessments in the State of the World's Soil Resources Report frequently base their evaluations on studies from the 1990s based on observations made in the 1980s or earlier.

  12. Effect of evaluation threat on procrastination behavior.

    PubMed

    Bui, Ngoc H

    2007-06-01

    The author evaluated the effects of evaluation apprehension and trait procrastination on behaviors. The author examined private university students from southern California (N = 72) on two independent variables: evaluation threat (manipulated) and trait procrastination (nonmanipulated). The author found a significant interaction effect between type of evaluation threat and level of trait procrastination on the number of days to complete an assigned essay. Post hoc analyses showed high trait procrastinators in the high evaluation threat group significantly delayed returning essays compared with those in the low evaluation threat group. Also, in the low evaluation threat group, low trait procrastinators delayed more than did high trait procrastinators. These results suggest that educators can reduce behavioral delays by increasing evaluation threat, depending on a student's level of trait procrastination. PMID:17703786

  13. Sensor-guided threat countermeasure system

    DOEpatents

    Stuart, Brent C.; Hackel, Lloyd A.; Hermann, Mark R.; Armstrong, James P.

    2012-12-25

    A countermeasure system for use by a target to protect against an incoming sensor-guided threat. The system includes a laser system for producing a broadband beam and means for directing the broadband beam from the target to the threat. The countermeasure system comprises the steps of producing a broadband beam and directing the broad band beam from the target to blind or confuse the incoming sensor-guided threat.

  14. DOE site-specific threat assessment

    SciTech Connect

    West, D.J.; Al-Ayat, R.A.; Judd, B.R.

    1985-07-12

    A facility manager faced with the challenges of protecting a nuclear facility against potential threats must consider the likelihood and consequences of such threats, know the capabilities of the facility safeguards and security systems, and make informed decisions about the cost-effectivness of safeguards and security upgrades. To help meet these challenges, the San Francisco Operations Office of the Department of Energy, in conjunction with the Lawrence Livermore Laboratory, has developed a site-specific threat assessment approach and a quantitative model to improve the quality and consistency of site-specific threat assessment and resultant security upgrade decisions at sensitive Department of Energy facilities. 5 figs.

  15. Autonomous Realtime Threat-Hunting Robot (ARTHR

    ScienceCinema

    INL

    2009-09-01

    Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats.

  16. Hidden Markov models for threat prediction fusion

    NASA Astrophysics Data System (ADS)

    Ross, Kenneth N.; Chaney, Ronald D.

    2000-04-01

    This work addresses the often neglected, but important problem of Level 3 fusion or threat refinement. This paper describes algorithms for threat prediction and test results from a prototype threat prediction fusion engine. The threat prediction fusion engine selectively models important aspects of the battlespace state using probability-based methods and information obtained from lower level fusion engines. Our approach uses hidden Markov models of a hierarchical threat state to find the most likely Course of Action (CoA) for the opposing forces. Decision tress use features derived from the CoA probabilities and other information to estimate the level of threat presented by the opposing forces. This approach provides the user with several measures associated with the level of threat, including: probability that the enemy is following a particular CoA, potential threat presented by the opposing forces, and likely time of the threat. The hierarchical approach used for modeling helps us efficiently represent the battlespace with a structure that permits scaling the models to larger scenarios without adding prohibitive computational costs or sacrificing model fidelity.

  17. Autonomous Realtime Threat-Hunting Robot (ARTHR

    SciTech Connect

    INL

    2008-05-29

    Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats.

  18. Prepare for scare-Impact of threat predictability on affective visual processing in spider phobia.

    PubMed

    Klahn, Anna Luisa; Klinkenberg, Isabelle A G; Notzon, Swantje; Arolt, Volker; Pantev, Christo; Zwanzger, Peter; Junghöfer, Markus

    2016-07-01

    The visual processing of emotional faces is influenced by individual's level of stress and anxiety. Valence unspecific affective processing is expected to be influenced by predictability of threat. Using a design of phasic fear (predictable threat), sustained anxiety (unpredictable threat) and safety (no threat), we investigated the magnetoencephalographic correlates and temporal dynamics of emotional face processing in a sample of phobic patients. Compared to non-anxious controls, phobic individuals revealed decreased parietal emotional attention processes during affective processing at mid-latency and late processing stages. While control subjects showed increasing parietal processing of the facial stimuli in line with decreasing threat predictability, phobic subjects revealed the opposite pattern. Decreasing threat predictability also led to increasing neural activity in the orbitofrontal and dorsolateral prefrontal cortex at mid-latency stages. Additionally, unpredictability of threat lead to higher subjective discomfort compared to predictability of threat and no threat safety condition. Our findings indicate that visual processing of emotional information is influenced by both stress induction and pathologic anxiety. PMID:27036648

  19. Inferring the nature of anthropogenic threats from long-term abundance records.

    PubMed

    Shoemaker, Kevin T; Akçakaya, H Resit

    2015-02-01

    Diagnosing the processes that threaten species persistence is critical for recovery planning and risk forecasting. Dominant threats are typically inferred by experts on the basis of a patchwork of informal methods. Transparent, quantitative diagnostic tools would contribute much-needed consistency, objectivity, and rigor to the process of diagnosing anthropogenic threats. Long-term census records, available for an increasingly large and diverse set of taxa, may exhibit characteristic signatures of specific threatening processes and thereby provide information for threat diagnosis. We developed a flexible Bayesian framework for diagnosing threats on the basis of long-term census records and diverse ancillary sources of information. We tested this framework with simulated data from artificial populations subjected to varying degrees of exploitation and habitat loss and several real-world abundance time series for which threatening processes are relatively well understood: bluefin tuna (Thunnus maccoyii) and Atlantic cod (Gadus morhua) (exploitation) and Red Grouse (Lagopus lagopus scotica) and Eurasian Skylark (Alauda arvensis) (habitat loss). Our method correctly identified the process driving population decline for over 90% of time series simulated under moderate to severe threat scenarios. Successful identification of threats approached 100% for severe exploitation and habitat loss scenarios. Our method identified threats less successfully when threatening processes were weak and when populations were simultaneously affected by multiple threats. Our method selected the presumed true threat model for all real-world case studies, although results were somewhat ambiguous in the case of the Eurasian Skylark. In the latter case, incorporation of an ancillary source of information (records of land-use change) increased the weight assigned to the presumed true model from 70% to 92%, illustrating the value of the proposed framework in bringing diverse sources of

  20. Integrated optic chip for laser threat identification

    NASA Astrophysics Data System (ADS)

    McAulay, Alastair D.

    2010-04-01

    In this conference last year, we proposed free-space gratings, Fizeau interferometers and wavefront estimation for detecting the different lasers deployed in the battlefield for range finding, target designation, communications, dazzle, location of targets, munitions guidance, and destruction. Since last year, advanced laser weapons of the electron cyclotron type, are in development, such as the free-electron laser, that are tunable and can, unlike conventional bound-electron state lasers, be used at any wavelength from microwaves to soft X-rays. We list the characteristics of the nine dominant laser weapons because we assume that the free-electron lasers will initially use one of the current threat wavelengths because of availability of components and instrumentation. In this paper we replace the free-space grating with a higher performing array waveguide grating integrated optic chip, similar to that used in telecommunications, because integrated circuits are more robust and less expensive. It consists of a star coupler that fans out amongst waveguides of different length followed by a star coupler that focuses different wavelengths to different outputs in order to separate them. Design equations are derived to cover a range of frequencies at specific frequency spacing relevant to this application.

  1. Shades of Threat: Racial Identity as a Moderator of Stereotype Threat

    ERIC Educational Resources Information Center

    Davis, Claytie, III; Aronson, Joshua; Salinas, Moises

    2006-01-01

    This study investigated Black racial identity attitudes as a moderator of intellectual performance in potentially stereotype threatening situations. Ninety-eight African American students were randomly assigned to one of three stereotype threatening conditions: low threat, medium threat, or high threat. Analyses confirmed a stereotype threat…

  2. The Nature of the Bioterrorism Threat

    SciTech Connect

    Regens, J. L.

    2003-02-25

    This analysis provides an overview of the nature of the bioterrorism threat. It identifies potential CDC Class A biological agents that are likely candidates for use in a terrorist incident and describes the known sources of vulnerability. The paper also summarizes S&T resources/needs and assesses response options for achieving effective biodefense against terrorist threats.

  3. Stereotype Threat, Identity Salience, and Spatial Reasoning

    ERIC Educational Resources Information Center

    McGlone, Matthew S.; Aronson, Joshua

    2006-01-01

    Stereotype threat research provides insight into how the low standardized test scores of students from stigmatized social groups may derive in part from the negative performance expectations about these groups. Because these students belong to many social groups, one means of mitigating the threat is to remind them of their membership in groups…

  4. Development of the Academic Stereotype Threat Inventory

    ERIC Educational Resources Information Center

    Pseekos, A. Chantelle; Dahlen, Eric R.; Levy, Jacob J.

    2008-01-01

    The authors describe the development and preliminary validation of the Academic Stereotype Threat Inventory, a self-report measurement of math-related stereotype threat among women. A preliminary version of the instrument was administered to 308 undergraduate women. Principal component analysis yielded a 3-factor solution. Convergent and…

  5. Bombs and Bomb Threats in the School

    ERIC Educational Resources Information Center

    Starkey, David J.; Starkey, John D.

    1977-01-01

    Bombs and the threat of bombing can leave school personnel faced by an explosive hazard without knowledge of what to do. Therefore, a preplanned response is necessary. Discusses four major stages of dealing with bombs and bomb threats. (Author/RK)

  6. Bomb Threats and Bomb Search Techniques.

    ERIC Educational Resources Information Center

    Department of the Treasury, Washington, DC.

    This pamphlet explains how to be prepared and plan for bomb threats and describes procedures to follow once a call has been received. The content covers (1) preparation for bomb threats, (2) evacuation procedures, (3) room search methods, (4) procedures to follow once a bomb has been located, and (5) typical problems that search teams will…

  7. The Smallpox Threat: The School Nurse's Role

    ERIC Educational Resources Information Center

    Martin, Mary E.; Didion, Judy

    2003-01-01

    Today, with the threat of bioterrorism and war, there is a new dimension to the traditional role of the school nurse. The smallpox threat to public health will invoke the school nurse's role as an educator, liaison, and consultant in the community. This article discusses smallpox, the vaccination process, adverse effects, and postvaccination care.…

  8. [Counterfeit medicines: a growing threat].

    PubMed

    Barbereau, S

    2006-12-01

    The medical drug market has undergone considerable transformation in recent years. Like other products, medicines have been affected by globalization. Free trade policies have had a number of negative effects including a reduction in quality control not only for some products but also for raw materials and finished products. The global environment has also created conditions conducive to counterfeit medicines. The term counterfeit medicine is defined differently from one country to another in terms of quality, legality and fraudulent intent. This situation prompted the WHO to propose the following definition: "A counterfeit medicine is one which is deliberately and fraudulently mislabeled with respect to identity and/or source. Counterfeiting can apply to both branded and generic products and counterfeit products may include products with the correct ingredients or with the wrong ingredients, without active ingredients, with insufficient active ingredients or with fake packaging." Weak pharmaceutical regulation often compounded by widespread corruption in developing countries has greatly facilitated the development of this illicit market with harmful and costly effects on public health. Due to the lack of pharmocovigilance accidents involving use of counterfeit drugs go unreported. For this reason it is not possible to measure the economic impact. While counterfeiting has become a major threat in developing countries, it also affects industrialized countries. Fraudulent behavior occurs all over the world. PMID:17286014

  9. Nuclear threats from small states

    SciTech Connect

    Kahan, J.H.

    1994-06-13

    What are the policy implications regarding proliferation and counter proliferation of nuclear weapons among Third World states. How does deterrence operate outside the parameters of superpower confrontation as defined by the cold war elaborate system of constraints enforced by concepts like mutual assured destruction, and counter-value and counter-force targeting. How can US policymakers devise contingencies for dealing with nuclear threats posed by countries like North Korea, Libya, Iraq, Iran, and Syria. These are some of the unsettling but nevertheless important questions addressed by the author in this monograph. In his analysis, Mr. Jerome Kahan examines the likelihood that one or more of these countries will use nuclear weapons before the year 2000. He also offers a framework that policymakers and planners might use in assessing US interests in preempting the use of nuclear weapons or in retaliating for their use. Ironically, with the end of the cold war, it is imperative that defense strategists, policymakers, and military professionals think about the `unthinkable`. In the interest of fostering debate on this important subject, the Strategic Studies Institute commends this insightful monograph.

  10. Inferences from counterfactual threats and promises.

    PubMed

    Egan, Suzanne M; Byrne, Ruth M J

    2012-01-01

    We examine how people understand and reason from counterfactual threats, for example, "if you had hit your sister, I would have grounded you" and counterfactual promises, for example, "if you had tidied your room, I would have given you ice-cream." The first experiment shows that people consider counterfactual threats, but not counterfactual promises, to have the illocutionary force of an inducement. They also make the immediate inference that the action mentioned in the "if" part of the counterfactual threat and promise did not occur. The second experiment shows that people make more negative inferences (modus tollens and denial of the antecedent) than affirmative inferences (modus ponens and affirmation of the consequent) from counterfactual threats and promises, unlike indicative threats and promises. We discuss the implications of the results for theories of the mental representations and cognitive processes that underlie conditional inducements. PMID:22580411

  11. Perceived threat predicts the neural sequelae of combat stress

    PubMed Central

    van Wingen, G A; Geuze, E; Vermetten, E; Fernández, G

    2011-01-01

    Exposure to severe stressors increases the risk for psychiatric disorders in vulnerable individuals, but can lead to positive outcomes for others. However, it remains unknown how severe stress affects neural functioning in humans and what factors mediate individual differences in the neural sequelae of stress. The amygdala is a key brain region involved in threat detection and fear regulation, and previous animal studies have suggested that stress sensitizes amygdala responsivity and reduces its regulation by the prefrontal cortex. In this study, we used a prospective design to investigate the consequences of severe stress in soldiers before and after deployment to a combat zone. We found that combat stress increased amygdala and insula reactivity to biologically salient stimuli across the group of combat-exposed individuals. In contrast, its influence on amygdala coupling with the insula and dorsal anterior cingulate cortex was dependent on perceived threat, rather than actual exposure, suggesting that threat appraisal affects interoceptive awareness and amygdala regulation. Our results demonstrate that combat stress has sustained consequences on neural responsivity, and suggest a key role for the appraisal of threat on an amygdala-centered neural network in the aftermath of severe stress. PMID:21242990

  12. An Integrated Process Model of Stereotype Threat Effects on Performance

    PubMed Central

    Johns, Michael; Forbes, Chad

    2008-01-01

    Research showing that activation of negative stereotypes can impair the performance of stigmatized individuals on a wide variety of tasks has proliferated. However, a complete understanding of the processes underlying these stereotype threat effects on behavior is still lacking. The authors examine stereotype threat in the context of research on stress arousal, vigilance, working memory, and self-regulation to develop a process model of how negative stereotypes impair performance on cognitive and social tasks that require controlled processing, as well as sensorimotor tasks that require automatic processing. The authors argue that stereotype threat disrupts performance via 3 distinct, yet interrelated, mechanisms: (a) a physiological stress response that directly impairs prefrontal processing, (b) a tendency to actively monitor performance, and (c) efforts to suppress negative thoughts and emotions in the service of self-regulation. These mechanisms combine to consume executive resources needed to perform well on cognitive and social tasks. The active monitoring mechanism disrupts performance on sensorimotor tasks directly. Empirical evidence for these assertions is reviewed, and implications for interventions designed to alleviate stereotype threat are discussed. PMID:18426293

  13. Human Threat Management Systems: Self-Protection and Disease Avoidance

    PubMed Central

    Neuberg, Steven L.; Kenrick, Douglas T.; Schaller, Mark

    2010-01-01

    Humans likely evolved precautionary systems designed to minimize the threats to reproductive fitness posed by highly interdependent ultrasociality. A review of research on the self-protection and disease avoidance systems reveals that each system is functionally distinct and domain-specific: Each is attuned to different cues; engages different emotions, inferences, and behavioral inclinations; and is rooted in somewhat different neurobiological substrates. These systems share important features, however. Each system is functionally coherent, in that perceptual, affective, cognitive, and behavioral processes work in concert to reduce fitness costs of potential threats. Each system is biased in a risk-averse manner, erring toward precautionary responses even when available cues only heuristically imply threat. And each system is functionally flexible, being highly sensitive to specific ecological and dispositional cues that signal greater vulnerability to the relevant threat. These features characterize a general template useful for understanding not only the self-protection and disease avoidance systems, but also a broader set of evolved, domain-specific precautionary systems. PMID:20833199

  14. Threats to sandy beach ecosystems: A review

    NASA Astrophysics Data System (ADS)

    Defeo, Omar; McLachlan, Anton; Schoeman, David S.; Schlacher, Thomas A.; Dugan, Jenifer; Jones, Alan; Lastra, Mariano; Scapini, Felicita

    2009-01-01

    We provide a brief synopsis of the unique physical and ecological attributes of sandy beach ecosystems and review the main anthropogenic pressures acting on the world's single largest type of open shoreline. Threats to beaches arise from a range of stressors which span a spectrum of impact scales from localised effects (e.g. trampling) to a truly global reach (e.g. sea-level rise). These pressures act at multiple temporal and spatial scales, translating into ecological impacts that are manifested across several dimensions in time and space so that today almost every beach on every coastline is threatened by human activities. Press disturbances (whatever the impact source involved) are becoming increasingly common, operating on time scales of years to decades. However, long-term data sets that describe either the natural dynamics of beach systems or the human impacts on beaches are scarce and fragmentary. A top priority is to implement long-term field experiments and monitoring programmes that quantify the dynamics of key ecological attributes on sandy beaches. Because of the inertia associated with global climate change and human population growth, no realistic management scenario will alleviate these threats in the short term. The immediate priority is to avoid further development of coastal areas likely to be directly impacted by retreating shorelines. There is also scope for improvement in experimental design to better distinguish natural variability from anthropogenic impacts. Sea-level rise and other effects of global warming are expected to intensify other anthropogenic pressures, and could cause unprecedented ecological impacts. The definition of the relevant scales of analysis, which will vary according to the magnitude of the impact and the organisational level under analysis, and the recognition of a physical-biological coupling at different scales, should be included in approaches to quantify impacts. Zoning strategies and marine reserves, which have not

  15. A Quantitative Threats Analysis for the Florida Manatee (Trichechus manatus latirostris)

    USGS Publications Warehouse

    Runge, Michael C.; Sanders-Reed, Carol A.; Langtimm, Catherine A.; Fonnesbeck, Christopher J.

    2007-01-01

    The Florida manatee (Trichechus manatus latirostris) is an endangered marine mammal endemic to the southeastern United States. The primary threats to manatee populations are collisions with watercraft and the potential loss of warm-water refuges. For the purposes of listing, recovery, and regulation under the Endangered Species Act (ESA), an understanding of the relative effects of the principal threats is needed. This work is a quantitative approach to threats analysis, grounded in the assumption that an appropriate measure of status under the ESA is based on the risk of extinction, as quantified by the probability of quasi-extinction. This is related to the qualitative threats analyses that are more common under the ESA, but provides an additional level of rigor, objectivity, and integration. In this approach, our philosophy is that analysis of the five threat factors described in Section 4(a)(1) of the ESA can be undertaken within an integrated quantitative framework. The basis of this threats analysis is a comparative population viability analysis. This involves forecasting the Florida manatee population under different scenarios regarding the presence of threats, while accounting for process variation (environmental, demographic, and catastrophic stochasticity) as well as parametric and structural uncertainty. We used the manatee core biological model (CBM) for this viability analysis, and considered the role of five threats: watercraft-related mortality, loss of warm-water habitat in winter, mortality in water-control structures, entanglement, and red tide. All scenarios were run with an underlying parallel structure that allowed a more powerful estimation of the effects of the various threats. The results reflect our understanding of manatee ecology (as captured in the structure of the CBM), our estimates of manatee demography (as described by the parameters in the model), and our characterization of the mechanisms by which the threats act on manatees. As an

  16. Building relationships with foreign governments in support of threat reduction

    SciTech Connect

    Cajigal, George L.

    2007-07-01

    The effectiveness of any multinational effort in support of threat reduction depends on the relationship developed between the nation receiving the assistance and the donor nations. The effectiveness of this relationship must be based on a solid legal and cooperative framework that establishes the ground rules for the interaction between all parties involved. The author proposes in this paper to outline major considerations by the donor nation and the nation receiving the assistance as they establish an effective approach to threat-reduction efforts. The legal framework needs to be founded on a well-developed, country-to-country agreement that establishes general ground rules and officially recognizes the collaborative effort in an internationally binding document between signatories. This document normally addresses such issues as liability, tax exemptions, import duties, contracts, applicable environmental regulations, etc. Also, of utmost importance is the establishment of a collaborative framework. The basis for such a collaborative framework must be the buy-in into a common objective, the willingness to share concerns and work toward resolutions, and continuous communications. Only when a proper legal framework and a collaborative approach are established can effective relationships be built to enhance threat-reduction efforts. (author)

  17. Forecasting Lightning Threat Using WRF Proxy Fields

    NASA Technical Reports Server (NTRS)

    McCaul, E. W., Jr.

    2010-01-01

    Objectives: Given that high-resolution WRF forecasts can capture the character of convective outbreaks, we seek to: 1. Create WRF forecasts of LTG threat (1-24 h), based on 2 proxy fields from explicitly simulated convection: - graupel flux near -15 C (captures LTG time variability) - vertically integrated ice (captures LTG threat area). 2. Calibrate each threat to yield accurate quantitative peak flash rate densities. 3. Also evaluate threats for areal coverage, time variability. 4. Blend threats to optimize results. 5. Examine sensitivity to model mesh, microphysics. Methods: 1. Use high-resolution 2-km WRF simulations to prognose convection for a diverse series of selected case studies. 2. Evaluate graupel fluxes; vertically integrated ice (VII). 3. Calibrate WRF LTG proxies using peak total LTG flash rate densities from NALMA; relationships look linear, with regression line passing through origin. 4. Truncate low threat values to make threat areal coverage match NALMA flash extent density obs. 5. Blend proxies to achieve optimal performance 6. Study CAPS 4-km ensembles to evaluate sensitivities.

  18. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility,...

  19. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility,...

  20. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility,...

  1. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility,...

  2. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility,...

  3. Insider threat to secure facilities: data analysis

    SciTech Connect

    Not Available

    1980-05-09

    Three data sets drawn from industries that have experienced internal security breaches are analyzed. The industries and the insider security breaches are considered analogous in one or more respects to insider threats potentially confronting managers in the nuclear industry. The three data sets are: bank fraud and embezzlement (BF and E), computer-related crime, and drug theft from drug manufacturers and distributors. A careful analysis by both descriptive and formal statistical techniques permits certain general conclusions on the internal threat to secure industries to be drawn. These conclusions are discussed and related to the potential insider threat in the nuclear industry. 49 tabs.

  4. THE BIOTERRORISM THREAT: TECHNOLOGICAL AND POLITICAL CONSIDERATIONS

    SciTech Connect

    J. F. PILAT

    2000-03-01

    Bioterrorism--along with biowarfare, from which it may not always be distinguishable in practice--will be a feature of the strategic landscape in the 21st century and is high on the US national security agenda. Bioterrorism poses a potential threat to the US population, agriculture, interests, friends and allies, and military forces (asymmetric threats). Yet these possibilities have not been widely pursued or realized by terrorists. The perceived threat is far worse than anything experienced to date, and is largely technologically driven.

  5. Electrophysiological responses to threat in youth with and without Posttraumatic Stress Disorder.

    PubMed

    Grasso, Damion J; Simons, Robert F

    2012-04-01

    The current study was designed to examine event-related brain potentials and autonomic responses to pictures indicating threat, relative to non-threat, and acoustic startle reflexes in traumatized youth diagnosed with PTSD, relative to non-exposed children, before and after receiving psychotherapy. Children in the control group were individually yoked and demographically matched to the PTSD group. Both groups displayed enhanced late positive potentials and more prolonged heart rate deceleration to pictures indicating threat, relative to non-threat, and larger skin conductance responses to pictures indicating threat, relative to non-threat, at time one. At time two, controls appeared to habituate, as reflected by an overall attenuated skin conductance response, whereas the PTSD group showed little change. Across time points the PTSD group exhibited greater acoustic startle reflexes than the control group. Psychotherapy and symptom reduction was not associated with electrophysiology. Drawing from the adult literature, this study was an attempt to address the scarcity of research examining electrophysiological irregularities in childhood PTSD. The overall results suggest that children and adolescents allocate more attention to threat-related stimuli regardless of PTSD status, and exaggerated startle and a possible failure to habituate skin conductance responses to threat-related stimuli in youth with versus without PTSD. PMID:22406756

  6. Electrophysiological Responses to Threat in Youth with and without Posttraumatic Stress Disorder

    PubMed Central

    Simons, Robert F.

    2012-01-01

    The current study was designed to examine event-related brain potentials and autonomic responses to pictures indicating threat, relative to non-threat, and acoustic startle reflexes in traumatized youth diagnosed with PTSD, relative to non-exposed children, before and after receiving psychotherapy. Children in the control group were individually yoked and demographically matched to the PTSD group. Both groups displayed enhanced late positive potentials and more prolonged heart rate deceleration to pictures indicating threat, relative to non-threat, and larger skin conductance responses to pictures indicating threat, relative to non-threat, at time one. At time two, controls appeared to habituate, as reflected by an overall attenuated skin conductance response, whereas the PTSD group showed little change. Across time points the PTSD group exhibited greater acoustic startle reflexes than the control group. Psychotherapy and symptom reduction was not associated with electrophysiology. Drawing from the adult literature, this study was an attempt to address the scarcity of research examining electrophysiological irregularities in childhood PTSD. The overall results suggest that children and adolescents allocate more attention to threat-related stimuli regardless of PTSD status, and exaggerated startle and a possible failure to habituate skin conductance responses to threat-related stimuli in youth with versus without PTSD. PMID:22406756

  7. Assessment of ionospheric threat modeling techniques over Marmara Region

    NASA Astrophysics Data System (ADS)

    Onur Karslioglu, Mahmut; Yeganehsahab, Amir; Durmaz, Murat

    2016-04-01

    It is generally known that extreme ionospheric density associated with severe magnetic storm degrades the Global Navigation satellite Systems (GNSS) measurements also at mid - to high latitudes. Strong solar activity can cause large local spatial and temporal gradients in the delays induced on the GNSS signals by the ionosphere. The local nature of gradients can result in significant decorrelation between Ground Based Augmentation System (GBAS) Ground Stations and the GNSS receiver on board the aircraft. For the mitigation of this effect either a special functional architecture is established to monitor the ionosphere on the basis of so called Extended GBAS or ionospheric threat models can be constructed for a certain region. In this work two different techniques have been evaluated for the estimation of ionospheric threat model parameters consisting of width, slope and velocity of the ionospheric wave front by using real ground-based observations from both GPS and GLONASS in the Marmara Region. The data collected between 2012 and 2015 also containing high ionospheric activities are pre-processed to extract ionospheric gradients. Ionospheric delays at each ionospheric piercing point are determined by applying a local ionospheric Total Electron Content (TEC) modeling and filtering techniques on the basis of raw carrier-phase observations. The ionospheric fronts are searched by looking at high ionospheric gradients which result from ionospheric delay differences between ionospheric piercing points. The first technique of the threat model evaluation is based on the propagation of an ideal plane wave as a wave front, velocity of which is estimated on the basis of a Gauss Markov Model using an ordinary least square estimation procedure. The remaining parameters namely slope and width are calculated afterwards using rate of change gradients and the duration of the wave front in context with the estimated front velocity. In the second technique both the magnitude of the

  8. Examining Perceived Stereotype Threat among Overweight/Obese Adults Using a Multi-Threat Framework

    PubMed Central

    Carels, Robert A.; Domoff, Sarah E.; Burmeister, Jacob M.; Koball, Afton M.; Hinman, Nova G.; Davis, Alan K.; Oehlhof, Marissa Wagner; Leroy, Michelle; Bannon, Erin; Hoffmann, Debra A.

    2013-01-01

    Objective The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group) and source (i.e., the self or others). This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. Method 216 adults completed an online survey. Participants’ mean age was 23.6 (SD 10.1; range 18–64) years and mean BMI was 31.6 (SD 7.5) kg/m2. Results Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI) and individual factors (i.e., group identity, stigma consciousness, fear of fat). Conclusion Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals’ susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes’ impact on cognitive and behavioral outcomes. PMID:23736227

  9. Heat Waves Pose Big Health Threats

    MedlinePlus

    ... news/fullstory_159744.html Heat Waves Pose Big Health Threats Kids, elderly among those at greatest risk, ... Illness Seniors' Health Recent Health News Related MedlinePlus Health Topics Child Safety Heat Illness Seniors' Health About ...

  10. Autonomous Realtime Threat-Hunting Robot (ARTHR)

    ScienceCinema

    Idaho National Laboratory - David Bruemmer, Curtis Nielsen

    2010-01-08

    Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats. To learn more, visit

  11. Acid Rain: The Silent Environmental Threat.

    ERIC Educational Resources Information Center

    Zmud, Mia

    1992-01-01

    Describes the silent environmental threat posed by acid rain. Caused mainly by manmade pollutants, acid rain damages water and trees, decreases visibility, corrodes monuments, and threatens public health. The article includes guidelines for action. (SM)

  12. Children's Threats: When Are They Serious?

    MedlinePlus

    ... TV shows, movies, music, magazines, comics, books, video games, and Internet sites mental illness, such as depression, ... others are concerned? When a child makes a serious threat it should not be dismissed as just ...

  13. Intergroup threat gates social attention in humans.

    PubMed

    Chen, Yujie; Zhao, Yufang

    2015-02-01

    Humans shift their attention to follow another person's gaze direction, a phenomenon called gaze cueing. This study examined whether a particular social factor, intergroup threat, modulates gaze cueing. As expected, stronger responses of a particular in-group to a threatening out-group were observed when the in-group, conditioned to perceive threat from one of two out-groups, was presented with facial stimuli from the threatening and non-threatening out-groups. These results suggest that intergroup threat plays an important role in shaping social attention. Furthermore, larger gaze-cueing effects were found for threatening out-group faces than for in-group faces only at the 200 ms but not the 800 ms stimulus onset asynchrony (SOA); the specificity of the gaze-cueing effects at the short SOA suggests that threat cues modulate the involuntary component of gaze cueing. PMID:25716090

  14. Autonomous Realtime Threat-Hunting Robot (ARTHR)

    SciTech Connect

    Idaho National Laboratory - David Bruemmer, Curtis Nielsen

    2008-05-29

    Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats. To learn more, visit

  15. Nuclear weapons are illegal threats

    SciTech Connect

    Meyrowitz, E.L.

    1985-05-01

    Challenging Harry Almond's position that nuclear deterrence is workable, the author contends that there is no historical basis for believing that anticipation of the horrors of war will be an effective deterrent. He questions the belief that the nuclear balance of terror has maintained the peace for the past 40 years because an arms race is inherently unstable. The argument that the pursuit of national interests takes precedence over any limitation imposed by international law reflects a perception of international law that is comparable to the Third Reich. The bases for a legal evaluation of the status of nuclear weapons under international law come from express and implicit treaty provisions, international custom, general principles of international law, judicial decisions, resolutions at the United Nations, and the opinions of qualified jurists as well as military necessity.

  16. Terahertz imaging system for stand-off detection of threats

    NASA Astrophysics Data System (ADS)

    Hübers, H.-W.; Semenov, A. D.; Richter, H.; Böttger, U.

    2007-04-01

    Suicide bombers and hidden bombs or explosives have become serious threats especially for mass transportation. Until now there exists no established system which can be used against these threats. Therefore new technologies especially for stand-off detection of threats are required. Terahertz (THz) rays offer an alternative inspection method, which can cope with these new challenges. Major advantages of THz radiation as compared to other spectral regions are the possibility to penetrate through clothes and that THz radiation is not harmful for human health. In this report the design and results of a THz stand-off detection system will be presented. The sensor is based on active illumination of the object and sensitive heterodyne detection of reflected and backscattered radiation. The system operates at about 0.8 THz. A THz laser is used for illumination and a superconducting hot-electron bolometric mixer for detection. The local oscillator required for heterodyne detection is a multiplied microwave source. The optical system is designed to allow for stand-off detection at 20 m with a spatial resolution less than 2 cm.

  17. Space Station Program threat and vulnerability analysis

    NASA Technical Reports Server (NTRS)

    Van Meter, Steven D.; Veatch, John D.

    1987-01-01

    An examination has been made of the physical security of the Space Station Program at the Kennedy Space Center in a peacetime environment, in order to furnish facility personnel with threat/vulnerability information. A risk-management approach is used to prioritize threat-target combinations that are characterized in terms of 'insiders' and 'outsiders'. Potential targets were identified and analyzed with a view to their attractiveness to an adversary, as well as to the consequentiality of the resulting damage.

  18. Bio-Terrorism Threat and Casualty Prevention

    SciTech Connect

    NOEL,WILLIAM P.

    2000-01-01

    The bio-terrorism threat has become the ''poor man's'' nuclear weapon. The ease of manufacture and dissemination has allowed an organization with only rudimentary skills and equipment to pose a significant threat with high consequences. This report will analyze some of the most likely agents that would be used, the ease of manufacture, the ease of dissemination and what characteristics of the public health response that are particularly important to the successful characterization of a high consequence event to prevent excessive causalities.

  19. Contending with Stereotype Threat at Work: A Model of Long-Term Responses

    ERIC Educational Resources Information Center

    Block, Caryn J.; Koch, Sandy M.; Liberman, Benjamin E.; Merriweather, Tarani J.; Roberson, Loriann

    2011-01-01

    Women and people of color are still underrepresented in many occupational roles. Being in a situation where one is underrepresented, and thus in the demographic minority, has been shown to be a factor leading to the experience of stereotype threat--the expectation that one will be judged or perceived on the basis of social identity group…

  20. The threat from creationism to the rational teaching of biology.

    PubMed

    Cornish-Bowden, Athel; Cárdenas, María Luz

    2007-01-01

    Most biologists outside the USA and a few other countries, like Australia and Canada, are under the impression that the threat to the teaching of biology represented by creationism does not concern them directly. This is unfortunately no longer true: the recent growth of creationism, especially in its pseudo-scientific manifestation known as "intelligent design", has been obvious in several countries of Western Europe, especially the UK, Germany and Poland, and it is beginning to be noticeable in Brazil, and maybe elsewhere in Latin America. The problem is complicated by the fact that there are not just two possibilities, evolution and creationism, because creationism comes in various incompatible varieties. Turkey is now a major source of creationist propaganda outside the USA, and is especially significant in relation to its influence on Muslim populations in Europe. The time for biologists to address the creationist threat is now. PMID:18064348

  1. LIF bio-aerosol threat triggers: then and now

    NASA Astrophysics Data System (ADS)

    DeFreez, Richard

    2009-09-01

    Bio-aerosol terrorist attacks have been carried out against civilians in the United States and elsewhere. Unfortunately, recurrence appears inevitable. A fast, reliable, and inexpensive bioaerosol threat detection trigger can be an important tool for detect-to-protect and detect-to-treat countermeasure scenarios. Bio-aerosol threat detection triggers employing light, historically laser light but recently LED light, for induced native- or auto-fluorescence (LIF) have been developed for well over a decade without a generally accepted solution being found. This paper presents a brief history of LIF triggers and reviews many vendor efforts, past and current. Various technical approaches and design considerations are discussed. Triggers from ICx technology, currently available or in development, are also discussed.

  2. Nuclear Threat Intelligence, Surveillance, and Reconnaissance

    NASA Astrophysics Data System (ADS)

    Kuliasha, Michael

    2012-03-01

    The National Security Strategy states that the greatest threat to the American people is ``the pursuit of nuclear weapons by violent extremists and their proliferation to additional states.'' The Global Nuclear Detection Architecture (GNDA) addresses a key portion of that threat by focusing on detecting nuclear and radiological materials that are out of regulatory control within permissive operating environments. However, the force protection requirements of the Department of Defense (DoD) range across a wider mission space from permissive environments, where nuclear and radiological materials can be monitored while under regulatory control, to hostile environments where nuclear and radiological materials exist in defiance of international regulations and agreements. This wider range of operating environments and the inherent physics limitations on the range of radiation detection pose great challenges to radiation detection-focused approaches to nuclear threat detection. Consequently, DoD is in the process of defining an intelligence, surveillance, and reconnaissance approach to countering nuclear threats that considers the observable signatures of all elements that comprise a potential threat; information, funds, people, material, equipment, and infrastructure. This strategy represents a shift from radiation detection as the primary sensing modality to radiation detection as one of many sensing modalities, including the human dimension, with a heavy emphasis on data fusion. This presentation will describe the attributes of a layered sensing approach to nuclear threat detection, illustrate the approach with examples, define potential building blocks, and discuss technical challenges.

  3. Fear, threat and efficacy in threat appeals: message involvement as a key mediator to message acceptance.

    PubMed

    Cauberghe, Verolien; De Pelsmacker, Patrick; Janssens, Wim; Dens, Nathalie

    2009-03-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts, on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement. Message involvement is a full mediator between evoked fear, perceived threat and efficacy perception on the one hand, and attitudes towards the message and behavioral intention to accept the message on the other. Speeding experience has a significantly negative impact on anti-speeding attitudes. Message and medium context threat levels and context thematic congruency have a significant effect on evoked fear and to a lesser extent on perceived threat. PMID:19245886

  4. Stereotype threat in the classroom: dejection mediates the disrupting threat effect on women's math performance.

    PubMed

    Keller, Johannes; Dauenheimer, Dirk

    2003-03-01

    Research on stereotype threat, which is defined as the risk of confirming a negative stereotypic expectation about one's group, has demonstrated that the applicability of negative stereotypes disrupts the performance of stigmatized social groups. While it has been shown that a reduction of stereotype threat leads to improved performance by members of stigmatized groups, there is a lack of clear-cut findings about the mediating processes. The aim of the present study is to provide a better understanding of the mechanisms that stereotype threat causes in women working on mathematical problems. In addition, the study set out to test stereotype threat theory in a natural environment: high school classrooms. The experiment involved the manipulation of the gender fairness of a math test. The results indicate that the stereotype threat effect exists in this everyday setting. Moreover, it appears that dejection emotions mediate the effect of threat manipulation. PMID:15273014

  5. 49 CFR 1540.203 - Security threat assessment.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... check conducted by TSA. (2) A security threat assessment conducted under 49 CFR part 1572 for the... Assistant Program Manager, Attn: Federal Agency Comparability Check, Hazmat Threat Assessment...

  6. 49 CFR 1540.203 - Security threat assessment.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... check conducted by TSA. (2) A security threat assessment conducted under 49 CFR part 1572 for the... Assistant Program Manager, Attn: Federal Agency Comparability Check, Hazmat Threat Assessment...

  7. 49 CFR 1540.203 - Security threat assessment.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... check conducted by TSA. (2) A security threat assessment conducted under 49 CFR part 1572 for the... Assistant Program Manager, Attn: Federal Agency Comparability Check, Hazmat Threat Assessment...

  8. Are All Interventions Created Equal? A Multi-Threat Approach to Tailoring Stereotype Threat Interventions

    PubMed Central

    Shapiro, Jenessa R.; Williams, Amy M.; Hambarchyan, Mariam

    2013-01-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats—concerns that a stereotype-relevant performance will reflect poorly on the abilities of one’s group—and self-as-target stereotype threats—concerns that a stereotype-relevant performance will reflect poorly on one’s own abilities. The present experiments explored Black college students’ performance on diagnostic intelligence tests (Experiments 1 and 3) and women’s interest (Experiment 2) and performance (Experiment 4) in science, technology, engineering, and math (STEM). Across the 4 experiments, participants were randomly assigned to experience either a group-as-target or self-as-target stereotype threat. Experiments 1 and 2 revealed that role model interventions were successful at protecting only against group-as-target stereotype threats, and Experiments 3 and 4 revealed that self-affirmation interventions were successful at protecting only against self-as-target stereotype threats. The present research provides an experimental test of the Multi-Threat Framework across different negatively stereotyped groups (Black students, female students), different negatively stereotyped domains (general intelligence, STEM), and different outcomes (test performance, career interest). This research suggests that interventions should address the range of possible stereotype threats to effectively protect individuals against these threats. Through an appreciation of the distinct forms of stereotype threats and the ways in which interventions work to reduce them, this research aims to facilitate a more complete understanding of stereotype threat. PMID:23088232

  9. R2U2: Monitoring and Diagnosis of Security Threats for Unmanned Aerial Systems

    NASA Technical Reports Server (NTRS)

    Schumann, Johann; Moosbruger, Patrick; Rozier, Kristin Y.

    2015-01-01

    We present R2U2, a novel framework for runtime monitoring of security properties and diagnosing of security threats on-board Unmanned Aerial Systems (UAS). R2U2, implemented in FPGA hardware, is a real-time, REALIZABLE, RESPONSIVE, UNOBTRUSIVE Unit for security threat detection. R2U2 is designed to continuously monitor inputs from the GPS and the ground control station, sensor readings, actuator outputs, and flight software status. By simultaneously monitoring and performing statistical reasoning, attack patterns and post-attack discrepancies in the UAS behavior can be detected. R2U2 uses runtime observer pairs for linear and metric temporal logics for property monitoring and Bayesian networks for diagnosis of security threats. We discuss the design and implementation that now enables R2U2 to handle security threats and present simulation results of several attack scenarios on the NASA DragonEye UAS.

  10. Technical Basis for the Determination that Current Characterization Data and Processes are Sufficient to Ensure Safe Storage and to Design Waste Disposal

    SciTech Connect

    SIMPSON, B.C.

    1999-08-12

    This document presents the technical basis for closure of Defense Nuclear Facilities Safety Board (DNFSB) Recommendation 93-5 Implementation Plan milestone 5.6.3.13, ''Core sample all tanks by 2002'' (DOE-RL 1996). The milestone was based on the need for characterization data to ensure safe storage of the waste, to operate the tanks safely, and to plan and implement retrieval and processing of the waste. Sufficient tank characterization data have been obtained to ensure that existing controls are adequate for safe storage of the waste in the 177 waste tanks at the Hanford Site. In addition, a process has been developed, executed, and institutionalized to systemically identify information needs, to integrate and prioritize the needs, and to reliably obtain and analyze the associated samples. This document provides a technical case that the remaining 45 incompletely sampled tanks no longer require sampling to support the intent of the Implementation Plan milestone. Sufficient data have been obtained to close the Unreviewed Safety Questions (USQs), and to ensure that existing hazard controls are adequate and appropriately applied. However, in the future, additional characterization of tanks at the site will be required to support identified information needs. Closure of this milestone allows sampling and analytical data to be obtained in a manner that is consistent with the integrated priority process.

  11. Stereotype threat and lift effects in motor task performance: the mediating role of somatic and cognitive anxiety.

    PubMed

    Laurin, Raphael

    2013-01-01

    The aim of this investigation was to replicate the stereotype threat and lift effects in a motor task in a neutral sex-typed activity, using somatic and cognitive anxiety as key mediators of these phenomena. It was hypothesized that an ingroup/outgroup social categorization based on gender would have distinctive effects for female and male participants. A total of 161 French physical education students were randomly assigned to three threat conditions--no threat, female threat, and male threat--thus leading to a 3 x 2 (threat by gender) design. The analyses revealed a stereotype lift effect on the performances for both male and female participants, as well as a stereotype threat effect only for female participants. They also indicated that somatic anxiety had a mediating effect on the performance of female participants targeted by a negative stereotype, but that it had a facilitating effect on their performance. The stereotype threat and lift effects on motor tasks were replicated in a neutral sex-typed activity and somatic anxiety seems to have a facilitating mediating effect of the relationships between the gender-conditions (control or female threat) interaction and free-throw performance. The model used to distinguish somatic and cognitive anxiety appeared to be a relevant means of explaining the stereotype threat and lift mechanisms. PMID:24236380

  12. Molecular Mechanisms of Posttraumatic Stress Disorder (PTSD) as a Basis for Individualized and Personalized Therapy: Rationale, Design and Methods of the South Eastern Europe (SEE)-PTSD study.

    PubMed

    Kulenovic, Alma Dzubur; Agani, Ferid; Avdibegovic, Esmina; Jakovljevic, Miro; Babic, Dragan; Kucukalic, Abdulah; Kucukalic, Sabina; Dzananovic, Emina Sabic; Mehmedbasic, Alma Bravo; Uka, Aferdita Goci; Haxhibeqiri, Shpend; Haxhibeqiri, Valdete; Hoxha, Blerina; Sinanovic, Osman; Kravic, Nermina; Muminovic, Mirnesa; Aukst-Margetic, Branka; Jaksic, Nenad; Franc, Ana Cima; Rudan, Dusko; Pavlovic, Marko; Babic, Romana; Bojic, Elma Feric; Marjanovic, Damir; Bozina, Nada; Ziegler, Christiane; Wolf, Christiane; Warrings, Bodo; Domschke, Katharina; Deckert, Jürgen

    2016-06-01

    Posttraumatic Stress Disorder (PTSD) is a major health problem in South Eastern Europe (SEE). Available treatment options are not efficient enough and the course is often chronic. Little is known about molecular mediators and moderators of pathogenesis and therapy. Genetic and epigenetic variation may be one central molecular mechanism. We therefore established a consortium combining clinical expertise on PTSD from SEE countries Bosnia-Herzegovina (Sarajevo, Tuzla and Mostar), Kosovo (Prishtina) and Croatia (Zagreb) with genetic and epigenetic competence from Germany (Würzburg) in 2011 within the framework of the DAAD (Deutscher Akademischer Austauschdienst)-funded Stability Pact for South Eastern Europe. After obtaining ethical votes and performing rater trainings as well as training in DNA extraction from EDTA blood between 2011 and 2013, we recruited 747 individuals who had experienced war-related trauma in the SEE conflicts between 1991 and 1999. 236 participants had current PTSD, 161 lifetime PTSD and 350 did not have and never had PTSD. Demographic and clinical data are currently merged together with genetic and epigenetic data in a single database to allow for a comprehensive analysis of the role of genetic and epigenetic variation in the pathogenesis and therapy of PTSD. Analyses will be done to a great degree by PhD students from participating SEE centers who in addition to participation in the project had an opportunity to take part in spring and summer schools of the DFG (Deutsche Forschungsgemeinschaft) funded Research Training Group (RTG) 1253 and thus meet PhD students from Germany and other countries We are confident that our project will not only contribute to a better understanding of genetic and epigenetic mechanisms of PTSD as a basis for future individualized and personalized therapies, but also to the academic development of South Eastern Europe. PMID:27287790

  13. Basis selection in LOBPCG

    NASA Astrophysics Data System (ADS)

    Hetmaniuk, U.; Lehoucq, R.

    2006-10-01

    The purpose of our paper is to discuss basis selection for Knyazev's locally optimal block preconditioned conjugate gradient (LOBPCG) method. An inappropriate choice of basis can lead to ill-conditioned Gram matrices in the Rayleigh-Ritz analysis that can delay convergence or produce inaccurate eigenpairs. We demonstrate that the choice of basis is not merely related to computing in finite precision arithmetic. We propose a representation that maintains orthogonality of the basis vectors and so has excellent numerical properties.

  14. Forecasting Lightning Threat using Cloud-Resolving Model Simulations

    NASA Technical Reports Server (NTRS)

    McCaul, Eugene W., Jr.; Goodman, Steven J.; LaCasse, Katherine M.; Cecil, Daniel J.

    2008-01-01

    Two new approaches are proposed and developed for making time and space dependent, quantitative short-term forecasts of lightning threat, and a blend of these approaches is devised that capitalizes on the strengths of each. The new methods are distinctive in that they are based entirely on the ice-phase hydrometeor fields generated by regional cloud-resolving numerical simulations, such as those produced by the WRF model. These methods are justified by established observational evidence linking aspects of the precipitating ice hydrometeor fields to total flash rates. The methods are straightforward and easy to implement, and offer an effective near-term alternative to the incorporation of complex and costly cloud electrification schemes into numerical models. One method is based on upward fluxes of precipitating ice hydrometeors in the mixed phase region at the-15 C level, while the second method is based on the vertically integrated amounts of ice hydrometeors in each model grid column. Each method can be calibrated by comparing domain-wide statistics of the peak values of simulated flash rate proxy fields against domain-wide peak total lightning flash rate density data from observations. Tests show that the first method is able to capture much of the temporal variability of the lightning threat, while the second method does a better job of depicting the areal coverage of the threat. Our blended solution is designed to retain most of the temporal sensitivity of the first method, while adding the improved spatial coverage of the second. Exploratory tests for selected North Alabama cases show that, because WRF can distinguish the general character of most convective events, our methods show promise as a means of generating quantitatively realistic fields of lightning threat. However, because the models tend to have more difficulty in predicting the instantaneous placement of storms, forecasts of the detailed location of the lightning threat based on single

  15. Systematic description of direct push sensor systems: A conceptual framework for system decomposition as a basis for the optimal sensor system design

    NASA Astrophysics Data System (ADS)

    Bumberger, Jan; Paasche, Hendrik; Dietrich, Peter

    2015-11-01

    Systematic decomposition and evaluation of existing sensor systems as well as the optimal design of future generations of direct push probes are of high importance for optimized geophysical experiments since the employed equipment is a constrain on the data space. Direct push technologies became established methods in the field of geophysical, geotechnical, hydrogeological, and environmental sciences for the investigation of the near subsurface. By using direct push sensor systems it is possible to measure in-situ parameters with high vertical resolution. Such information is frequently used for quantitative geophysical model calibration of interpretation of geotechnical and hydrological subsurface conditions. Most of the available direct push sensor systems are largely based on empirical testing and consecutively evaluated under field conditions. Approaches suitable to identify specific characteristics and problems of direct push sensor systems have not been established, yet. We develop a general systematic approach for the classification, analysis, and optimization of direct push sensor systems. First, a classification is presented for different existing sensor systems. The following systematic description, which is based on the conceptual decomposition of an existing sensor system into subsystems, is a suitable way to analyze and explore the transfer behavior of the system components and therefore of the complete system. Also, this approach may serve as guideline for the synthesis and the design of new and optimized direct push sensor systems.

  16. Recognizing the real threat of biological terror.

    PubMed Central

    Wenzel, Richard P.

    2002-01-01

    Weapons of mass destruction can be used to harm and terrorize populations. Such weapons include those with chemical, nuclear or biological properties. Obviously computer viruses can add additional barriers to a quick response. The most effective, least costly and greatest threats are biologicals. Biological terror is not new, and biological weapons have been used for centuries. However, as a result of modern technology, the risks are greater now and the outcomes more terrible. Today they include live pathogens, various toxins, and theoretically "bioregulators"--biochemicals affecting cell signaling. Altered cell signaling could be used to induce apoptosis-cell death, or a heightened outpouring of cytokines mimicking overwhelming sepsis, or even an intracellular, biochemical "strike" causing cellular paralysis. Biological weaponeers now have the frightening ability to alter the genetic makeup of pathogens, rendering them resistant not only to available antibiotic therapy but also to currently effective vaccines. In dark corners of some fringe groups, bioweaponeers are searching for the capability of designing pathogens that target specific races, by virtue of discriminating ligands (1). The resulting morbidity and mortality from use of any biological weapons will be accompanied by chaos, governmental and social instability, panic, an extraordinary utilization of available resources, and an ongoing epidemic of sleepless nights (2,3). Herein I will review some of the issues and some of the currently available biological weapons. The major goal is to highlight the clinical presentations of patients with infections that could be used as biological weapons. Images Fig. 1 Fig. 2 Fig. 3 Fig. 4 PMID:12053717

  17. Technological Innovations to Counter CBRNE Threat Vectors and Ecotage

    NASA Astrophysics Data System (ADS)

    Vaseashta, Ashok

    The ubiquitous presence of sensors for enhanced situational awareness necessitates an innovative, articulate, and focused review of their design, architecture, functionality, and interoperability. A comprehensive overview of the latest and state-of-the art technological innovations in point and stand-off sensing/detection platforms with the objective of countering threats arising from chemical-biological-nuclear-high yield explosives (CBRNE) is the focus of this investigation. Ongoing research efforts and future research directions based on advanced approaches, including nanomaterials to develop materials, devices, and systems for potential use in sensing and detection of such threat vectors are articulated. The concept of advanced sciences convergences is introduced to examine the feasibility of potentially new and innovative research directions for persistent surveillance of CBRNE agents and infectious diseases. The intentional release of such agents in the environment constitutes ecological sabotage. Advanced sensing/detection platforms for CBRNE are used to detect threats to the environment. Issues associated with the use of nanomaterials regarding societal implications and dual-use concerns are addressed by studying fate and transport and the development of guidelines for a risk-assessment model. A roadmap of the future of nanomaterials, in terms of complexity, a nexus of disciplines, and its emerging potential to provide advanced, futuristic, and a paradigm-shifting platform is presented.

  18. Driving experience moderates the effect of implicit versus explicit threat priming on hazard perception test.

    PubMed

    Hoffman, Yaakov; Rosenbloom, Tova

    2016-07-01

    Due to the controversial evidence regarding the efficacy of threat campaigns on driving behavior, we addressed the effects of explicit vs. implicit threats. As in other areas of advertisements, we hypothesized that an implicit threat would be more effective, i.e., generate more anxiety than an explicit threat. Furthermore, we hypothesized that such effects would be moderated by driving experience: more experienced drivers when threatened will rely on driving skills and perform in a less cautious manner vs. less experienced drivers who have not yet acquired these skills, and therefore will tend to calm their fear by exercising more caution. Driving behavior in this experimental design was addressed by the Hazard Perception (HP) task. Results were as expected. Anxiety was higher under implicit vs. explicit threat. HP scores however were overall the same for both groups. Implicit priming generated less-cautious behavior in high-experienced drivers while generating more caution for less-experienced drivers. Demonstrating in a single experiment all three driving patterns following threat, namely, no change in driving behavior (whole sample), more cautious driving behavior (less-experience) and less cautious behavior (more-experience), potentially comprises an important step in resolving the aforementioned disparity concerning effects of threat campaigns on driving behavior. PMID:27042988

  19. Crystal Structures of mPGES-1 Inhibitor Complexes Form a Basis for the Rational Design of Potent Analgesic and Anti-Inflammatory Therapeutics.

    PubMed

    Luz, John Gately; Antonysamy, Stephen; Kuklish, Steven L; Condon, Bradley; Lee, Matthew R; Allison, Dagart; Yu, Xiao-Peng; Chandrasekhar, Srinivasan; Backer, Ryan; Zhang, Aiping; Russell, Marijane; Chang, Shawn S; Harvey, Anita; Sloan, Ashley V; Fisher, Matthew J

    2015-06-11

    Microsomal prostaglandin E synthase 1 (mPGES-1) is an α-helical homotrimeric integral membrane inducible enzyme that catalyzes the formation of prostaglandin E2 (PGE2) from prostaglandin H2 (PGH2). Inhibition of mPGES-1 has been proposed as a therapeutic strategy for the treatment of pain, inflammation, and some cancers. Interest in mPGES-1 inhibition can, in part, be attributed to the potential circumvention of cardiovascular risks associated with anti-inflammatory cyclooxygenase 2 inhibitors (coxibs) by targeting the prostaglandin pathway downstream of PGH2 synthesis and avoiding suppression of antithrombotic prostacyclin production. We determined the crystal structure of mPGES-1 bound to four potent inhibitors in order to understand their structure-activity relationships and provide a framework for the rational design of improved molecules. In addition, we developed a light-scattering-based thermal stability assay to identify molecules for crystallographic studies. PMID:25961169

  20. Use of the TRUEX process for the pretreatment of neutralized cladding removal waste (NCRW) sludge: Results of a design basis experiment

    SciTech Connect

    Swanson, J L

    1991-07-01

    This report presents the results of an experiment designed to demonstrate the feasibility of a sludge dissolution/solvent extraction process to separate transuranic elements from the bulk components of Hanford neutralized cladding removal waste (NCRW) sludge. Such a separation would allow the bulk of the waste to be disposed of as low-level waste, which is much less costly than geologic disposal as would be required for the waste in its current form. The results indicate that the proposed process is well suited to meet the desired objectives. A composite sample of NCRW sludge taken from Tank 103-AW in 1986 was dissolved in nitric acid at room temperature. Dissolution of bulk components and all radionuclides was {ge}95% complete; thus, {le}5% of the bulk components will require geologic disposal. The TRUEX (TRansUranium EXtraction) solvent extraction process gave very good separation of the transuranic from the bulk components of the waste.

  1. Structural Basis for Parathyroid Hormone-related Protein Binding to the Parathyroid Hormone Receptor and Design of Conformation-selective Peptides

    SciTech Connect

    Pioszak, Augen A.; Parker, Naomi R.; Gardella, Thomas J.; Xu, H. Eric

    2009-12-01

    Parathyroid hormone (PTH) and PTH-related protein (PTHrP) are two related peptides that control calcium/phosphate homeostasis and bone development, respectively, through activation of the PTH/PTHrP receptor (PTH1R), a class B G protein-coupled receptor. Both peptides hold clinical interest for their capacities to stimulate bone formation. PTH and PTHrP display different selectivity for two distinct PTH1R conformations, but how their binding to the receptor differs is unclear. The high resolution crystal structure of PTHrP bound to the extracellular domain (ECD) of PTH1R reveals that PTHrP binds as an amphipathic {alpha}-helix to the same hydrophobic groove in the ECD as occupied by PTH, but in contrast to a straight, continuous PTH helix, the PTHrP helix is gently curved and C-terminally 'unwound.' The receptor accommodates the altered binding modes by shifting the side chain conformations of two residues within the binding groove: Leu-41 and Ile-115, the former acting as a rotamer toggle switch to accommodate PTH/PTHrP sequence divergence, and the latter adapting to the PTHrP curvature. Binding studies performed with PTH/PTHrP hybrid ligands having reciprocal exchanges of residues involved in different contacts confirmed functional consequences for the altered interactions and enabled the design of altered PTH and PTHrP peptides that adopt the ECD-binding mode of the opposite peptide. Hybrid peptides that bound the ECD poorly were selective for the G protein-coupled PTH1R conformation. These results establish a molecular model for better understanding of how two biologically distinct ligands can act through a single receptor and provide a template for designing better PTH/PTHrP therapeutics.

  2. Metallurgical design basis, qualification testing, and production history of 50 ksi and 60 ksi steel plate for the MARS TLP deck fabrication

    SciTech Connect

    Suzuki, Shuichi; Sueda, Kyosuke; Iki, Hiroshi; Smith, J.D.

    1995-12-31

    The MARS TLP fast-track deck construction project required rapid qualification and production of 50 ksi and 60 ksi steel plate. This paper describes the development of high-performance 4 in. (101.6mm) 50 ksi and 3 in. (76.2mm) 60 ksi steels of a modified API 2W composition and presents the production history for the MARS deck steel order. The same base composition was used for both grades via innovative proprietary TMCP practice. Utilization of the mono-chemistry steel allowed for production of a wide range of thicknesses and grades in a very short time frame via a simplified melting schedule and made it possible to minimize the number of new welding procedures to be developed by the deck fabricator. Extremely low carbon equivalent allowed the implementation of low fabrication preheats, with resultant cost and fabrication schedule savings. The chemical composition of the steel was specifically designed for this project and qualification testing in accordance with API RP 2Z verified high heat-affected zone CTOD toughness free of local brittle zones over a wide range of heat input and interpass temperature. Strict production process control resulted in very tight production property histograms with all steel being verified to have Charpy V-notch transition temperatures below {minus}80 C ({minus}112 F) at the plate mid-width, mid-thickness position. The success of the MARS deck steel rapid qualification, production and delivery was enabled by close teamwork between deck design engineers, construction fabrication contractor, and steelmaker for this steel.

  3. Rapid Threat Organism Recognition Pipeline

    SciTech Connect

    Williams, Kelly P.; Solberg, Owen D.; Schoeniger, Joseph S.

    2013-05-07

    The RAPTOR computational pipeline identifies microbial nucleic acid sequences present in sequence data from clinical samples. It takes as input raw short-read genomic sequence data (in particular, the type generated by the Illumina sequencing platforms) and outputs taxonomic evaluation of detected microbes in various human-readable formats. This software was designed to assist in the diagnosis or characterization of infectious disease, by detecting pathogen sequences in nucleic acid sequence data from clinical samples. It has also been applied in the detection of algal pathogens, when algal biofuel ponds became unproductive. RAPTOR first trims and filters genomic sequence reads based on quality and related considerations, then performs a quick alignment to the human (or other host) genome to filter out host sequences, then performs a deeper search against microbial genomes. Alignment to a protein sequence database is optional. Alignment results are summarized and placed in a taxonomic framework using the Lowest Common Ancestor algorithm.

  4. Rapid Threat Organism Recognition Pipeline

    Energy Science and Technology Software Center (ESTSC)

    2013-05-07

    The RAPTOR computational pipeline identifies microbial nucleic acid sequences present in sequence data from clinical samples. It takes as input raw short-read genomic sequence data (in particular, the type generated by the Illumina sequencing platforms) and outputs taxonomic evaluation of detected microbes in various human-readable formats. This software was designed to assist in the diagnosis or characterization of infectious disease, by detecting pathogen sequences in nucleic acid sequence data from clinical samples. It has alsomore » been applied in the detection of algal pathogens, when algal biofuel ponds became unproductive. RAPTOR first trims and filters genomic sequence reads based on quality and related considerations, then performs a quick alignment to the human (or other host) genome to filter out host sequences, then performs a deeper search against microbial genomes. Alignment to a protein sequence database is optional. Alignment results are summarized and placed in a taxonomic framework using the Lowest Common Ancestor algorithm.« less

  5. 49 CFR 1540.209 - Fees for security threat assessment.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Fees for security threat assessment. 1540.209...: GENERAL RULES Security Threat Assessments § 1540.209 Fees for security threat assessment. This section describes the payment process for completion of the security threat assessments required under this...

  6. 49 CFR 1540.209 - Fees for security threat assessment.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Fees for security threat assessment. 1540.209...: GENERAL RULES Security Threat Assessments § 1540.209 Fees for security threat assessment. This section describes the payment process for completion of the security threat assessments required under subpart....

  7. 49 CFR 1540.209 - Fees for security threat assessment.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Fees for security threat assessment. 1540.209...: GENERAL RULES Security Threat Assessments § 1540.209 Fees for security threat assessment. This section describes the payment process for completion of the security threat assessments required under this...

  8. 49 CFR 1546.301 - Bomb or air piracy threats.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless...

  9. 49 CFR 1546.301 - Bomb or air piracy threats.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless...

  10. 49 CFR 1546.301 - Bomb or air piracy threats.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless...

  11. 49 CFR 1546.301 - Bomb or air piracy threats.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless...

  12. B Plant interim safety basis

    SciTech Connect

    Chalk, S.E.

    1996-09-01

    This interim safety basis (ISB-008) replaces the B Plant Safety Analysis Report, WHC-SD-WM-SAR-013, Rev. 2 (WHC 1993a). ISB-008 uses existing accident analyses, modified existing accident analyses, and new accident analyses to prove that B Plant remains within the safety envelope for transition, deactivation, standby, and shutdown activities. The analyses in ISB-008 are in accordance with the most current requirements for analytical approach, risk determination, and configuration management. This document and supporting accident analyses replace previous design-basis documents.

  13. Protecting SWIR cameras from laser threats

    NASA Astrophysics Data System (ADS)

    Donval, Ariela; Fisher, Tali; Lipman, Ofir; Oron, Moshe

    2013-06-01

    SWIR cameras offer the advantage of higher resolution and smaller optical systems than conventional mid and far infrared optical systems. With the ability of seeing at low illumination conditions at the near infrared region, it can provide the detection of covert lasers. The ability of laser detection introduces the risk of sensor damage when the laser power is above a certain threat level. Smart protection is therefore needed, that is transparent for low laser intensities and limit or block the high laser intensities, and is effective over a wide band of wavelengths. We developed an Optical Power Control (OPC) device that reduces laser power threat to a safe level for a variety of optical systems. The talk presents a novel technology for protection of SWIR cameras against laser threats.

  14. Left-Wing Extremism: The Current Threat

    SciTech Connect

    Karl A. Seger

    2001-04-30

    Left-wing extremism is ''alive and well'' both in the US and internationally. Although the current domestic terrorist threat within the U. S. is focused on right-wing extremists, left-wing extremists are also active and have several objectives. Leftist extremists also pose an espionage threat to U.S. interests. While the threat to the U.S. government from leftist extremists has decreased in the past decade, it has not disappeared. There are individuals and organizations within the U.S. who maintain the same ideology that resulted in the growth of left-wing terrorism in this country in the 1970s and 1980s. Some of the leaders from that era are still communicating from Cuba with their followers in the U.S., and new leaders and groups are emerging.

  15. Epidemiology today: Mitigating threats to an ecosystem.

    PubMed

    Kreiger, Nancy

    2016-01-01

    Ecosystems comprise all the living and non-living things in a particular area (e.g., rain forest, desert), which interact and maintain equilibrium. Loss of equilibrium (e.g., clear-cutting trees in a rain forest) can mean the decline of the ecosystem, unless it is able to adapt to the new circumstances. The term "knowledge ecosystem" describes an approach to managing knowledge in a particular field; the components of this system include the people, the technological skills and resources, and information or data. Epidemiology can be thought of as a knowledge ecosystem and, like ecological systems, its existence can be threatened, from both internal and external forces that may alter its equilibrium. This paper describes some threats to the epidemiology knowledge ecosystem, how these threats came about, and what responses we can make that may serve to mitigate those threats. PMID:27348106

  16. Insider Threat Assessment: Model, Analysis and Tool

    NASA Astrophysics Data System (ADS)

    Chinchani, Ramkumar; Ha, Duc; Iyer, Anusha; Ngo, Hung Q.; Upadhyaya, Shambhu

    Insider threat is typically attributed to legitimate users who maliciously leverage their system privileges, and familiarity and proximity to their computational environment to compromise valuable information or inflict damage. According to the annual CSI/FBI surveys conducted since 1996, internal attacks and insider abuse form a significant portion of reported incidents. The strongest indication yet that insider threat is very real is given by the recent study [2] jointly conducted by CERT and the US Secret Service; the first of its kind, which provides an in-depth insight into the problem in a real-world setting. However, there is no known body of work which addresses this problem effectively. There are several challenges, beginning with understanding the threat.

  17. Environmental Health: Threats and their Interactions

    PubMed Central

    Holdstock, Douglas

    2008-01-01

    Improvements in the provision of an acceptable standard of health care, particularly in the developing world, will be undermined by three ongoing processes: ongoing armed conflicts; the threat of global warming due to rising levels of greenhouse gases, particularly carbon dioxide emitted by developed countries; and by rapidly rising populations. The key features of these three threats are summarised, and it is shown that interactions between them increase both the likelihood of their occurrence and the probable harm that they will cause. Some of the interactions are described, with ways of providing health care taking into account the threats and their interactions, and the paradox is emphasised that better health care in the developing world will further increase population growth followed by increased greenhouse gas emissions. Improved education for women and free and unlimited access to modern methods of contraception are vital. PMID:21572838

  18. [The threat of snake and scorpion venoms].

    PubMed

    Płusa, Tadeusz; Smędzik, Katarzyna

    2015-09-01

    Venoms of snakes and scorpions pose a significant threat to the health and life of humans. The speed and range of their actions causes damage of the organ responsible for the maintenance of vital signs. Venomous snake venoms cause blood clotting disorders, tissue necrosis and hemolysis, and the release of a number of proinflammatory cytokines and impair antibody synthesis. Availability of antitoxins is limited and in the most cases supportive treatment is recommended. In turn, the venom of scorpions beside intestinal symptoms cause significant impairment of neuromuscular conduction, causing severe respiratory disorders. Action venom poses a particular threat to sensitive patients. The degree of threat to life caused by the venom of snakes and scorpions authorizes the treatment of these substances as a potential biological weapon. PMID:26449581

  19. On the special status of "ego threats".

    PubMed

    Schotte, D E

    1992-05-01

    This article comments on a recent article by Heatherton, Herman, and Polivy (1991) in which they suggest that ego threats are a prerequisite to affectively induced disinhibition of food intake in restrained eaters and current dieters. In contrast, the present review suggests that mood induction procedures that involve no apparent threat (e.g., viewing a frightening film) can also prompt disinhibition in restrained eaters. Thus, any mood induction procedure that does not directly physically threaten the S may disinhibit restrained eaters. It is concluded that recommendations to focus future research on ego threats are premature and may serve to obscure the mechanisms by which changes in affective state influence food intake in dieters. PMID:1507070

  20. NEOShield - A global approach to NEO Impact Threat Mitigation

    NASA Astrophysics Data System (ADS)

    Michel, Patrick

    2015-03-01

    NEOShield is a European-Union funded project coordinated by the German Aero-space Center, DLR, to address near-Earth object (NEO) impact hazard mitigation issues. The NEOShield consortium consists of 13 research institutes, universities, and industrial partners from 6 countries and includes leading US and Russian space organizations. The project is funded for a period of 3.5 years from January 2012 with a total of 5.8 million euros. The primary aim of the project is to investigate in detail promising mitigation techniques, such as the kinetic impactor, blast deflection, and the gravity tractor, and devise feasible demonstration missions. Options for an international strategy for implementation when an actual impact threat arises will also be investigated. The NEOShield work plan consists of scientific investigations into the nature of the impact hazard and the physical properties of NEOs, and technical and engineering studies of practical means of deflecting NEOs. There exist many ideas for asteroid deflection techniques, many of which would require considerable scientific and technological development. The emphasis of NEOShield is on techniques that are feasible with current technology, requiring a minimum of research and development work. NEOShield aims to provide detailed designs of feasible mitigation demonstration missions, targeting NEOs of the kind most likely to trigger the first space-based mitigation action. Most of the asteroid deflection techniques proposed to date require physical contact with the threatening object, an example being the kinetic impactor. NEOShield includes research into the mitigation-relevant physical properties of NEOs on the basis of remotely-sensed astronomical data and the results of rendezvous missions, the observational techniques required to efficiently gather mitigation-relevant data on the dynamical state and physical properties of a threatening NEO, and laboratory investigations using gas guns to fire projectiles into

  1. Structural Basis of the Cross-Reactivity of Genetically Related Human Anti-HIV-1 mAbs: Implications for Design of V3-Based Immunogens

    SciTech Connect

    Burke, V.; Williams, C; Sukumaran, M; Kim, S; Li, H; Wang, X; Gorny, M; Zolla-Pazner, S; Kong, X

    2009-01-01

    Human monoclonal antibodies 447-52D and 537-10D, both coded by the VH3 gene and specific for the third variable region (V3) of the HIV-1 gp120, were found to share antigen-binding structural elements including an elongated CDR H3 forming main-chain interactions with the N terminus of the V3 crown. However, water-mediated hydrogen bonds and a unique cation- sandwich stacking allow 447-52D to be broadly reactive with V3 containing both the GPGR and GPGQ crown motifs, while the deeper binding pocket and a buried Glu in the binding site of 537-10D limit its reactivity to only V3 containing the GPGR motif. Our results suggest that the design of immunogens for anti-V3 antibodies should avoid the Arg at the V3 crown, as GPGR-containing epitopes appear to select for B cells making antibodies of narrower specificity than V3 that carry Gln at this position.

  2. Cyber Threat Assessment of Uplink and Commanding System for Mission Operation

    NASA Technical Reports Server (NTRS)

    Ko, Adans Y.; Tan, Kymie M. C.; Cilloniz-Bicchi, Ferner; Faris, Grant

    2014-01-01

    Most of today's Mission Operations Systems (MOS) rely on Ground Data System (GDS) segment to mitigate cyber security risks. Unfortunately, IT security design is done separately from the design of GDS' mission operational capabilities. This incoherent practice leaves many security vulnerabilities in the system without any notice. This paper describes a new way to system engineering MOS, to include cyber threat risk assessments throughout the MOS development cycle, without this, it is impossible to design a dependable and reliable MOS to meet today's rapid changing cyber threat environment.

  3. [Assessing adolescents with school massacre threats].

    PubMed

    Lindberg, Nina; Sailas, Eila; Kaltiala-Heino, Riittakerttu

    2013-01-01

    School massacres have increased pressure on health-care authorities for assessing risk for severe violence. In acute situations, threat analysis focuses at thought processes and actions of adolescents presenting threat of violence, in order to assess to which extent the adolescent has progressed from thoughts to actions. Because of great variability in aggressive behavior, separate interventions for individual, family and other developmental surroundings are often needed. Structured risk-assessment in special health care is aimed for conducting decision making towards risk reduction and adequate help for adolescents at risk. PMID:24069639

  4. Understanding MHC Class I Presentation of Viral Antigens by Human Dendritic Cells as a Basis for Rational Design of Therapeutic Vaccines

    PubMed Central

    van Montfoort, Nadine; van der Aa, Evelyn; Woltman, Andrea M.

    2014-01-01

    Effective viral clearance requires the induction of virus-specific CD8+ cytotoxic T lymphocytes (CTL). Since dendritic cells (DC) have a central role in initiating and shaping virus-specific CTL responses, it is important to understand how DC initiate virus-specific CTL responses. Some viruses can directly infect DC, which theoretically allow direct presentation of viral antigens to CTL, but many viruses target other cells than DC and thus the host depends on the cross-presentation of viral antigens by DC to activate virus-specific CTL. Research in mouse models has highly enhanced our understanding of the mechanisms underlying cross-presentation and the dendritic cells (DC) subsets involved, however, these results cannot be readily translated toward the role of human DC in MHC class I-antigen presentation of human viruses. Here, we summarize the insights gained in the past 20 years on MHC class I presentation of viral antigen by human DC and add to the current debate on the capacities of different human DC subsets herein. Furthermore, possible sources of viral antigens and essential DC characteristics for effective induction of virus-specific CTL are evaluated. We conclude that cross-presentation is not only an efficient mechanism exploited by DC to initiate immunity to viruses that do not infect DC but also to viruses that do infect DC, because cross-presentation has many conceptual advantages and bypasses direct immune modulatory effects of the virus on its infected target cells. Since knowledge on the mechanism of viral antigen presentation and the preferred DC subsets is crucial for rational vaccine design, the obtained insights are very instrumental for the development of effective anti-viral immunotherapy. PMID:24795724

  5. Evaluation of lead/acid batteries under simulated electric-vehicle duty: development of design parameters on the basis of SFUDS performance

    NASA Astrophysics Data System (ADS)

    Hollenkamp, A. F.; Lam, L. T.; Phyland, C. G.; Wilson, N. C.

    As manufacturers move to meet the expanding demand in batteries for electric-vehicle (EV) applications, there is a need to develop and apply test schemes that provide a true measure of battery performance. The Simplified Federal Urban Driving Schedule (SFUDS) is one of several such duty profiles that have been derived from extensive studies of urban vehicle duty. Accurate implementation of the SFUDS is, however, difficult because the load is specified in terms of power and is varied every few seconds. This necessitates a sophisticated control strategy, combined with high-speed monitoring. In our laboratories, these requirements have been met by a digital measuring and control system in which all functions are handled by a microprocessor. SFUDS testing reveals battery performance to be critically dependent on the specific power capability. In particular, maximum vehicle driving range depends primarily on the proportion of current-generating materials that are present. For optimum performance, lead/acid batteries for EV service should be designed for minimum unit weight and maximum power output. In this way, the average rate of discharge is minimized and the battery voltage remains longer above the cutoff value. From these observations, it is suggested that the next generation of EV batteries will probably resemble present-day automotive (thin plate) batteries rather than the heavier (thick plate) units that are currently used in motive-power applications. They will also need to incorporate improved negative plates which are better able to withstand repetitive high-rate cycling. The latter is the defining feature of EV duty because it places severe demands on both the positive and negative plates.

  6. Stress-induced cortisol facilitates threat-related decision making among police officers.

    PubMed

    Akinola, Modupe; Mendes, Wendy Berry

    2012-02-01

    Previous research suggests that cortisol can affect cognitive functions such as memory, decision making, and attentiveness to threat-related cues. Here, we examine whether increases in cortisol, brought on by an acute social stressor, influence threat-related decision making. Eighty-one police officers completed a standardized laboratory stressor and then immediately completed a computer simulated decision-making task designed to examine decisions to accurately shoot or not shoot armed and unarmed Black and White targets. Results indicated that police officers who had larger cortisol increases to the social-stress task subsequently made fewer errors when deciding to shoot armed Black targets relative to armed White targets, suggesting that hypothalamic pituitary adrenal (HPA) activation may exacerbate vigilance for threat cues. We conclude with a discussion of the implications of threat-initiated decision making. PMID:22141468

  7. 49 CFR 192.917 - How does an operator identify potential threats to pipeline integrity and use the threat...

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... pipeline integrity and use the threat identification in its integrity program? 192.917 Section 192.917....917 How does an operator identify potential threats to pipeline integrity and use the threat identification in its integrity program? (a) Threat identification. An operator must identify and evaluate...

  8. 49 CFR 192.917 - How does an operator identify potential threats to pipeline integrity and use the threat...

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... pipeline integrity and use the threat identification in its integrity program? 192.917 Section 192.917....917 How does an operator identify potential threats to pipeline integrity and use the threat identification in its integrity program? (a) Threat identification. An operator must identify and evaluate...

  9. 49 CFR 192.917 - How does an operator identify potential threats to pipeline integrity and use the threat...

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... pipeline integrity and use the threat identification in its integrity program? 192.917 Section 192.917....917 How does an operator identify potential threats to pipeline integrity and use the threat identification in its integrity program? (a) Threat identification. An operator must identify and evaluate...

  10. 49 CFR 192.917 - How does an operator identify potential threats to pipeline integrity and use the threat...

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... pipeline integrity and use the threat identification in its integrity program? 192.917 Section 192.917....917 How does an operator identify potential threats to pipeline integrity and use the threat identification in its integrity program? (a) Threat identification. An operator must identify and evaluate...

  11. 49 CFR 192.917 - How does an operator identify potential threats to pipeline integrity and use the threat...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... pipeline integrity and use the threat identification in its integrity program? 192.917 Section 192.917....917 How does an operator identify potential threats to pipeline integrity and use the threat identification in its integrity program? (a) Threat identification. An operator must identify and evaluate...

  12. Threat displays for final approach

    NASA Astrophysics Data System (ADS)

    Jennings, Chad Warren

    During periods of good visibility, airports can conduct Closely Spaced Parallel Approaches (CSPA) and simultaneously operate parallel runways separated by more than 750 feet. When visibility degrades to Instrument Meteorological Conditions (IMC) and pilots must fly exclusively by the instruments, the runway separation required to operate parallel runways increases to 3400 feet or more. For many airports around the country and the world this means the second runway must be closed and the airport operates at half capacity. To alleviate the delays caused by this capacity reduction many airports worldwide are planning to expand and build new runways. The projected cost of the ten largest airport projects in the United States is $8-16 Billion. Perhaps a less expensive solution can be found with innovative technology rather than real estate? This research presents the first ever design, implementation, and characterization of a synthetic vision display and the supporting flight system to attempt to achieve this solution. The display uses 3D graphics and an air to air datalink called Automatic Dependent Surveillance--Broadcast to present the pilot with the information necessary to aviate, navigate and monitor traffic. This thesis also documents the first series of flight experiments to test the applicability of synthetic vision displays to both runway incursion avoidance and CSPA. Finally, utilizing the results from the flight testing in a Monte Carlo analysis, the effect of deploying this display on minimum safe runway separation is calculated. It has been found that the minimum safe runway separation for IMC operation can safely be reduced to 1900 feet. If, in addition, significant changes are made in Air Traffic Control procedures for longitudinal aircraft spacing, the analysis shows that the display system presented herein will allow for runway separation of 1400 feet with no new restrictions on aircraft size or crosswind. Furthermore, with certain restrictions on

  13. Defensive activation to (un)predictable interoceptive threat: The NPU respiratory threat test (NPUr).

    PubMed

    Schroijen, Mathias; Fantoni, Simona; Rivera, Carmen; Vervliet, Bram; Schruers, Koen; van den Bergh, Omer; van Diest, Ilse

    2016-06-01

    Potentially life-threatening interoceptive sensations easily engage the behavioral defensive system. Resulting fear and anxiety toward interoceptive threat are functionally distinct states that are hypothesized to play a prominent role in the etiology of panic disorder. The present study aimed to investigate whether fear- and anxiety-potentiated startle responses occur to predictable and unpredictable interoceptive threat, respectively. Therefore, we modified the NPU threat test (Schmitz & Grillon, ) and replaced the aversive electrocutaneous stimulus with an aversive interoceptive stimulus (a breathing occlusion, making it briefly impossible to breathe). Healthy participants (N = 48) underwent three instructed conditions. A visual cue signaled the occlusion in the predictable condition (P), whereas another cue was unrelated to the occurrence of the occlusion in the unpredictable condition (U). The safe condition (N) also had a visual cue, but no occlusion. Both fear- and anxiety-potentiated startle blink responses were observed in response to predictable and unpredictable respiratory threat, respectively. The current study presents and validates the NPU respiratory threat test (NPUr) as an ecologically valid paradigm to study both anxiety and fear in response to a panic-relevant interoceptive threat. The paradigm allows future testing of contextual generalization, investigation of different clinical groups, and more explicit comparisons of defensive responding to interoceptive versus exteroceptive threats. PMID:26879710

  14. Stimulus-Driven Attention, Threat Bias, and Sad Bias in Youth with a History of an Anxiety Disorder or Depression.

    PubMed

    Sylvester, Chad M; Hudziak, James J; Gaffrey, Michael S; Barch, Deanna M; Luby, Joan L

    2016-02-01

    Attention biases towards threatening and sad stimuli are associated with pediatric anxiety and depression, respectively. The basic cognitive mechanisms associated with attention biases in youth, however, remain unclear. Here, we tested the hypothesis that threat bias (selective attention for threatening versus neutral stimuli) but not sad bias relies on stimulus-driven attention. We collected measures of stimulus-driven attention, threat bias, sad bias, and current clinical symptoms in youth with a history of an anxiety disorder and/or depression (ANX/DEP; n = 40) as well as healthy controls (HC; n = 33). Stimulus-driven attention was measured with a non-emotional spatial orienting task, while threat bias and sad bias were measured at a short time interval (150 ms) with a spatial orienting task using emotional faces and at a longer time interval (500 ms) using a dot-probe task. In ANX/DEP but not HC, early attention bias towards threat was negatively correlated with later attention bias to threat, suggesting that early threat vigilance was associated with later threat avoidance. Across all subjects, stimulus-driven orienting was not correlated with early threat bias but was negatively correlated with later threat bias, indicating that rapid stimulus-driven orienting is linked to later threat avoidance. No parallel relationships were detected for sad bias. Current symptoms of depression but not anxiety were related to decreased stimulus-driven attention. Together, these results are consistent with the hypothesis that threat bias but not sad bias relies on stimulus-driven attention. These results inform the design of attention bias modification programs that aim to reverse threat biases and reduce symptoms associated with pediatric anxiety and depression. PMID:25702927

  15. A threat-based definition of IA and IA-enabled products.

    SciTech Connect

    Shakamuri, Mayuri; Schaefer, Mark A.; Campbell, Philip LaRoche

    2010-09-01

    This paper proposes a definition of 'IA and IA-enabled products' based on threat, as opposed to 'security services' (i.e., 'confidentiality, authentication, integrity, access control or non-repudiation of data'), as provided by Department of Defense (DoD) Instruction 8500.2, 'Information Assurance (IA) Implementation.' The DoDI 8500.2 definition is too broad, making it difficult to distinguish products that need higher protection from those that do not. As a consequence the products that need higher protection do not receive it, increasing risk. The threat-based definition proposed in this paper solves those problems by focusing attention on threats, thereby moving beyond compliance to risk management. (DoDI 8500.2 provides the definitions and controls that form the basis for IA across the DoD.) Familiarity with 8500.2 is assumed.

  16. A threat-based definition of IA- and IA-enabled products.

    SciTech Connect

    Shakamuri, Mayuri; Schaefer, Mark A.; Campbell, Philip LaRoche

    2010-07-01

    This paper proposes a definition of 'IA and IA-enabled products' based on threat, as opposed to 'security services' (i.e., 'confidentiality, authentication, integrity, access control or non-repudiation of data'), as provided by Department of Defense (DoD) Instruction 8500.2, 'Information Assurance (IA) Implementation.' The DoDI 8500.2 definition is too broad, making it difficult to distinguish products that need higher protection from those that do not. As a consequence the products that need higher protection do not receive it, increasing risk. The threat-based definition proposed in this paper solves those problems by focusing attention on threats, thereby moving beyond compliance to risk management. (DoDI 8500.2 provides the definitions and controls that form the basis for IA across the DoD.) Familiarity with 8500.2 is assumed.

  17. Global threat to agriculture from invasive species.

    PubMed

    Paini, Dean R; Sheppard, Andy W; Cook, David C; De Barro, Paul J; Worner, Susan P; Thomas, Matthew B

    2016-07-01

    Invasive species present significant threats to global agriculture, although how the magnitude and distribution of the threats vary between countries and regions remains unclear. Here, we present an analysis of almost 1,300 known invasive insect pests and pathogens, calculating the total potential cost of these species invading each of 124 countries of the world, as well as determining which countries present the greatest threat to the rest of the world given their trading partners and incumbent pool of invasive species. We find that countries vary in terms of potential threat from invasive species and also their role as potential sources, with apparently similar countries sometimes varying markedly depending on specifics of agricultural commodities and trade patterns. Overall, the biggest agricultural producers (China and the United States) could experience the greatest absolute cost from further species invasions. However, developing countries, in particular, Sub-Saharan African countries, appear most vulnerable in relative terms. Furthermore, China and the United States represent the greatest potential sources of invasive species for the rest of the world. The analysis reveals considerable scope for ongoing redistribution of known invasive pests and highlights the need for international cooperation to slow their spread. PMID:27325781

  18. The silent threat of low genetic diversity

    USGS Publications Warehouse

    Hunter, Margaret E.

    2013-01-01

    Across the Caribbean, protected coastal waters have served as primary feeding and breeding grounds for the endangered Antillean manatee. Unfortunately, these same coastal waters are also a popular “habitat” for humans. In the past, the overlap between human and manatee habitat allowed for manatee hunting and threatened the survival of these gentle marine mammals. Today, however, threats are much more inadvertent and are often related to coastal development, degraded habitats and boat strikes. In the state of Florida, decades of research on the species’ biological needs have helped conservationists address threats to its survival. For example, low wake zones and boater education have protected manatees from boat strikes, and many of their critical winter refuges are now protected. The Florida population has grown steadily, thus increasing from approximately 1,200 in 1991 to more than 5,000 in 2010. It is conceivable that in Florida manatees may one day be reclassified as “threatened” rather than “endangered.” Yet, in other parts of the Caribbean, threats still loom. This includes small, isolated manatee populations found on islands that can be more susceptible to extinction and lack of genetic diversity. To ensure the species’ long-term viability, scientists have turned their sights to the overall population dynamics of manatees throughout the Caribbean. Molecular genetics has provided new insights into long-term threats the species faces. Fortunately, the emerging field of conservation genetics provides managers with tools and strategies for protecting the species’ long-term viability.

  19. Diversity, Racial Threat and Metropolitan Housing Segregation

    ERIC Educational Resources Information Center

    DeFina, Robert; Hannon, Lance

    2009-01-01

    Previous studies have shown that as the percent black or percent Hispanic grows, that group's residential segregation from whites tends to increase as well. Typically, these findings are explained in terms of white discriminatory reaction to the perceived threat associated with minority population growth. The present analysis examines whether…

  20. The Asteroid Impact Threat: Decisions Upcoming

    NASA Astrophysics Data System (ADS)

    Schweickart, Russell L.

    The asteroid impact threat has likely been constant for the past three billion years. What has accelerated is our knowledge of the impact hazard, and in particular the population of near- Earth objects (NEOs), those asteroids and near-Earth comets whose orbits approach or cross that of the Earth. In the next 10-15 years we will know the orbits of over 300,000 NEOs of a size capable of destroying a major city on impact. Based on current data 97 Given that a NEO deflection campaign can be initiated using existing space technology the international community will shortly be confronted with the decision of whether action should be taken, when it should be taken and who should take such action. The Association of Space Explorers (ASE)* and its Panel on Asteroid Threat Mitigation is currently concluding a two year process leading to a recommended decision program on asteroid threat mitigation that will be submitted to the United Nations in 2009. UN member states will soon be looking to the scientific community for their inputs on this matter. This presentation is intended to provide basic information on the NEO threat and our ability to take preventive action, anticipating an increasing demand for scientific opinion on this issue from international political institutions. (*) The Association of Space Explorers is the profession international organization of astronauts and cosmonauts. See www.space-explorers.org.

  1. The Nature of the Terrorism Threat

    ERIC Educational Resources Information Center

    Goldstein, Evan R., Comp.

    2008-01-01

    This article describes how Bruce Hoffman and Marc Sageman, two prominent scholars of terrorism, square off over whether Al Qaeda remains the primary global terrorist threat. The dispute began in the pages of "Foreign Affairs," where Hoffman, a professor in the security-studies program at Georgetown University, wrote a withering review of Sageman's…

  2. Disgust, politics, and responses to threat.

    PubMed

    Inbar, Yoel; Pizarro, David

    2014-06-01

    We address two questions regarding the relationship between political ideology and responses to threatening or aversive stimuli. The first concerns the reason for the connection between disgust and specific political and moral attitudes; the second concerns the observation that some responses to threat (i.e., neuroticism/anxiety) are associated with a more left-wing political orientation. PMID:24970437

  3. 25 CFR 11.402 - Terroristic threats.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 25 Indians 1 2014-04-01 2014-04-01 false Terroristic threats. 11.402 Section 11.402 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR LAW AND ORDER COURTS OF INDIAN OFFENSES AND LAW AND... public inconvenience or in reckless disregard of the risk of causing such terror or inconvenience....

  4. Computer Security-Risks, Threats, and Safeguards.

    ERIC Educational Resources Information Center

    Ekhaml, Leticia

    2001-01-01

    Describes a variety of Internet threats to computers and networks used in schools. Discusses electronic trashing; clearing hard drives; cyber spying on Web sites visited; protection against cyber spying, including disposable email accounts; password sniffers; privacy policies; email snooping; email attachments that carry viruses; and hoaxes. (LRW)

  5. Proliferation: Threat and response (November 1997)

    SciTech Connect

    1997-11-01

    Table of Contents: The Regional Proliferation Challenge; Northeast Asia; South Asia; The Middle East and North Africa; Russia, Ukraine, Kazakhstan, and Belarus; The Transnational Threat; Department of Defense Response; Prevention; Protection; Acquisition; DOD Capabilities to Respond to NBC Terrorism; Conclusion; Technical Annex; Further Reading; and Glossary.

  6. Reactions to the Threat of Embarrassment.

    ERIC Educational Resources Information Center

    Miller, Rowland S.; Miller, Gale A.

    Embarrassment is an aversive state which occurs when the public image a person is trying to maintain during an interaction is abruptly discredited. When people are embarrassed, they try to salvage the situation by offering positive information about themselves to restore their endangered identities. To examine responses to the threat of impending…

  7. Threats and countermeasures for network security

    NASA Technical Reports Server (NTRS)

    Denning, Peter J.

    1991-01-01

    In the late 1980's, the traditional threat of anonymous break-ins to networked computers was joined by viruses and worms, multiplicative surrogates that carry out the bidding of their authors. Technologies for authentication and secrecy, supplemented by good management practices, are the principal countermeasures. Four articles on these subjects are presented.

  8. Global threat to agriculture from invasive species

    PubMed Central

    Paini, Dean R.; Sheppard, Andy W.; Cook, David C.; De Barro, Paul J.; Worner, Susan P.; Thomas, Matthew B.

    2016-01-01

    Invasive species present significant threats to global agriculture, although how the magnitude and distribution of the threats vary between countries and regions remains unclear. Here, we present an analysis of almost 1,300 known invasive insect pests and pathogens, calculating the total potential cost of these species invading each of 124 countries of the world, as well as determining which countries present the greatest threat to the rest of the world given their trading partners and incumbent pool of invasive species. We find that countries vary in terms of potential threat from invasive species and also their role as potential sources, with apparently similar countries sometimes varying markedly depending on specifics of agricultural commodities and trade patterns. Overall, the biggest agricultural producers (China and the United States) could experience the greatest absolute cost from further species invasions. However, developing countries, in particular, Sub-Saharan African countries, appear most vulnerable in relative terms. Furthermore, China and the United States represent the greatest potential sources of invasive species for the rest of the world. The analysis reveals considerable scope for ongoing redistribution of known invasive pests and highlights the need for international cooperation to slow their spread. PMID:27325781

  9. After Heart Attack, New Threat: Heart Failure

    MedlinePlus

    ... https://medlineplus.gov/news/fullstory_159007.html After Heart Attack, New Threat: Heart Failure 1 in 4 survivors develops this serious ... TUESDAY, May 24, 2016 (HealthDay News) -- Risk of heart failure appears high within a few years of ...

  10. Using the threat probability task to assess anxiety and fear during uncertain and certain threat.

    PubMed

    Bradford, Daniel E; Magruder, Katherine P; Korhumel, Rachel A; Curtin, John J

    2014-01-01

    Fear of certain threat and anxiety about uncertain threat are distinct emotions with unique behavioral, cognitive-attentional, and neuroanatomical components. Both anxiety and fear can be studied in the laboratory by measuring the potentiation of the startle reflex. The startle reflex is a defensive reflex that is potentiated when an organism is threatened and the need for defense is high. The startle reflex is assessed via electromyography (EMG) in the orbicularis oculi muscle elicited by brief, intense, bursts of acoustic white noise (i.e., "startle probes"). Startle potentiation is calculated as the increase in startle response magnitude during presentation of sets of visual threat cues that signal delivery of mild electric shock relative to sets of matched cues that signal the absence of shock (no-threat cues). In the Threat Probability Task, fear is measured via startle potentiation to high probability (100% cue-contingent shock; certain) threat cues whereas anxiety is measured via startle potentiation to low probability (20% cue-contingent shock; uncertain) threat cues. Measurement of startle potentiation during the Threat Probability Task provides an objective and easily implemented alternative to assessment of negative affect via self-report or other methods (e.g., neuroimaging) that may be inappropriate or impractical for some researchers. Startle potentiation has been studied rigorously in both animals (e.g., rodents, non-human primates) and humans which facilitates animal-to-human translational research. Startle potentiation during certain and uncertain threat provides an objective measure of negative affective and distinct emotional states (fear, anxiety) to use in research on psychopathology, substance use/abuse and broadly in affective science. As such, it has been used extensively by clinical scientists interested in psychopathology etiology and by affective scientists interested in individual differences in emotion. PMID:25285398

  11. Forecasting Lightning Threat using Cloud-resolving Model Simulations

    NASA Technical Reports Server (NTRS)

    McCaul, E. W., Jr.; Goodman, S. J.; LaCasse, K. M.; Cecil, D. J.

    2009-01-01

    As numerical forecasts capable of resolving individual convective clouds become more common, it is of interest to see if quantitative forecasts of lightning flash rate density are possible, based on fields computed by the numerical model. Previous observational research has shown robust relationships between observed lightning flash rates and inferred updraft and large precipitation ice fields in the mixed phase regions of storms, and that these relationships might allow simulated fields to serve as proxies for lightning flash rate density. It is shown in this paper that two simple proxy fields do indeed provide reasonable and cost-effective bases for creating time-evolving maps of predicted lightning flash rate density, judging from a series of diverse simulation case study events in North Alabama for which Lightning Mapping Array data provide ground truth. One method is based on the product of upward velocity and the mixing ratio of precipitating ice hydrometeors, modeled as graupel only, in the mixed phase region of storms at the -15\\dgc\\ level, while the second method is based on the vertically integrated amounts of ice hydrometeors in each model grid column. Each method can be calibrated by comparing domainwide statistics of the peak values of simulated flash rate proxy fields against domainwide peak total lightning flash rate density data from observations. Tests show that the first method is able to capture much of the temporal variability of the lightning threat, while the second method does a better job of depicting the areal coverage of the threat. A blended solution is designed to retain most of the temporal sensitivity of the first method, while adding the improved spatial coverage of the second. Weather Research and Forecast Model simulations of selected North Alabama cases show that this model can distinguish the general character and intensity of most convective events, and that the proposed methods show promise as a means of generating

  12. A Physicist Looks at the Terrorist Threat

    NASA Astrophysics Data System (ADS)

    Muller, Richard

    2009-05-01

    Many people fear a terrorist nuclear device, smuggled into the United States, as the one weapon that could surpass the destruction and impact of 9-11. I'll review the design of nuclear weapons, with emphasis on the kinds that can be developed by rogue nations, terrorist groups, and high-school students. Saddam, prior to the first gulf war, was developing a uranium bomb, similar to the one that destroyed Hiroshima. His calutrons (named after my university) were destroyed by the United Nations. The North Korean nuclear weapon was, like the U.S. bomb used on Nagasaki, based on plutonium. Its test released the energy equivalent of about 400 tons of TNT. Although some people have speculated that they were attempting to build a small bomb, it is far more likely that this weapon was a fizzle, with less than 1 percent of the plutonium exploded. In contrast, the energy released from burning jet fuel at the 9-11 World Trade Center attack was the equivalent of 900 tons of TNT for each plane -- over twice that of the North Korean Nuke. The damage came from the fact that gasoline delivers 10 kilocalories per gram, about 15 times the energy of an equal weight of TNT. It is this huge energy per gram that also accounts for our addiction to gasoline; per gram, high performance lithium-ion computer batteries carry only 1 percent as much energy. A dirty bomb (radiological weapon) is also unattractive to terrorists because of the threhold effect: doses less than 100 rem produce no radiation illness and will leave no dead bodies at the scene. That may be why al Qaeda instructed Jose Padilla to abandon his plans for a dirty bomb attack in Chicago, and to try a fossil fuel attack (natural gas) instead. I will argue that the biggest terrorist threat is the conventional low-tech one, such as an airplane attack on a crowded stadium using the explosive fuel that they can legally buy at the corner station.

  13. A threat in the computer: the race implicit association test as a stereotype threat experience.

    PubMed

    Frantz, Cynthia M; Cuddy, Amy J C; Burnett, Molly; Ray, Heidi; Hart, Allen

    2004-12-01

    Three experiments test whether the threat of appearing racist leads White participants to perform worse on the race Implicit Association Test (IAT) and whether self-affirmation can protect from this threat. Experiments 1 and 2 suggest that White participants show a stereotype threat effect when completing the race IAT, leading to stronger pro-White scores when the test is believed to be diagnostic of racism. This effect increases for domain-identified (highly motivated to control prejudice) participants (Experiment 2). In Experiment 3, self-affirmation inoculates participants against stereotype threat while taking the race IAT. These findings have methodological implications for use of the race IAT and theoretical implications concerning the malleability of automatic prejudice and the potential interpersonal effects of the fear of appearing racist. PMID:15536243

  14. Multi-GNSS assessment of ionospheric threat model parameters for Ground Based Augmentation Systems (GBAS)

    NASA Astrophysics Data System (ADS)

    Onur Karslioglu, Mahmut; Durmaz, Murat; YeganehSahab, Amir

    2015-04-01

    Ground-Based Augmentation Systems (GBAS) makes aircraft precision approach and landing possible by providing differential corrections and integrity information for pseude range measurements obtained from Global Navigation Satellite System (GNSS).These information are transmited to the aviation users by means of very high frequency (VHF) or ultra high frequency (UHF) bands on the basis of GBAS local networks which support avionic receivers approximately within 20 kilometers of the airport. GBAS is strongly affected by anomalous ionospheric gradients during high ionospheric activities which can treaten the safety of the users. Therefore anomalous ionospheric gradients must be determined to understand and mitigate ionosphere threats occurring in different geographical regions. In this work, we assess an ionospheric anomaly threat model by analysing ionospheric gradients around Istanbul Ataturk Airport. For this, real ground-based observations from both GPS and GLONASS during high ionospheric activities since 2009 are pre-processed to extract ionospheric gradients. Afterwards ionospheric delays at each ionospheric piercing point are determined by applying different local ionospheric Total Electron Content (TEC) modeling and filtering techniques on the basis of raw carrier-phase observations. The ionospheric fronts are searched by looking at high ionospheric gradients which result from ionospheric delay differences between ionospheric piercing points. Then, the ionospheric threat parameters in terms of width, slope and velocity of the ionospheric wavefront are estimated from the extracted front occurences and gradients including velocity information of ionospheric piercing points. Finally, the estimated threat model parameters are examined and assessed by comparing the results from different techniques.

  15. Habitat preferences and conservation threats to Black-necked Cranes wintering in Bhutan.

    PubMed

    Namgay, Rinchen; Wangchuk, Sangay

    2016-01-01

    Black-necked Crane (Grus nigricollis) is a vulnerable Red list species whose populations are declining. However, little is known about Black-necked Cranes' habitat requirements or the causes of their population decline. We identified Black-necked Cranes' winter roost and foraging preferences of Black-necked Cranes in Bhutan during the winter of 2013-2014. Black-necked Cranes' roosts were recorded using Garmin GPSmap 60CSx, while foraging preferences and threats to the birds were identified based on a survey of household heads (n = 107) residing within a 3 km radius of roost sites. We grouped the threats identified by the communities into four major categories, viz. biological, social, political and natural threats based on the relevance. Of the four major threats, communities residing within the roosting and foraging habitat of the Black-necked Crane reported biological threat as major. Biological threats as reported by communities include loss of habitat, food shortage and competition from other animals. We recommend the present roosting areas be designated as part of the conservation areas for Black-necked Crane wintering in Bumthang district. In addition to preserving these areas, government should also encourage farming in foraging habitats of Black-necked Crane, because they mainly feed on barley, wheat, paddy, potatoes and buckwheat, besides roots, tubers and insects in the wetlands. PMID:27026922

  16. Promoting dental hygiene to children: comparing traditional and interactive media following threat appeals.

    PubMed

    Panic, Katarina; Cauberghe, Veroline; De Pelsmacker, Patrick

    2014-01-01

    Until now, social marketing campaigns mainly targeted children using traditional media. However, little is known about the effectiveness of computer games to communicate health-related information to children. This study compares the impact of an interactive game as a medium to provide health information and improve children's dietary habits to the impact of more traditional media. Using a 2 × 3 between-subject factorial design with 190 children (7-9 years old), this study investigates the effect of threat messages (weak vs. strong) concerning dental hygiene on behavioral outcome (snack choice), and how this effect is moderated by the type of medium used to communicate subsequent health information after the threat appeal (computer game, information brochure, narrative story). Results show a positive significant effect of perceived threat on children's adaptive behavior. However, this effect only remains significant when afterwards children are exposed to a narrative health-related story. When children play a game or read a brochure, they need to devote more attention to process this content, distracting them from the original threat message. In sum, when a threat message is followed by additional health information, the medium through which this information is presented influences the effectiveness of the preceding threat message. PMID:24393019

  17. On keeping your enemies close: powerful leaders seek proximity to ingroup power threats.

    PubMed

    Mead, Nicole L; Maner, Jon K

    2012-03-01

    Throughout history, humans have had to detect and deflect myriad threats from their social and physical environment in order to survive and flourish. When people detect a threat, the most common response is avoidance. In the present research, the authors provide evidence that ingroup power threats elicit a very different response. Three experiments supported the hypothesis that dominant leaders seek proximity to ingroup members who pose a threat to their power, as a way to control and downregulate the threat that those members pose. In each experiment, leaders high (but not low) in dominance motivation sought proximity to an ingroup member who threatened their power. Consistent with the hypothesis that increased proximity was designed to help leaders protect their own power, the proximity effect was apparent only under conditions of unstable power (not stable power), only in the absence of intergroup competition (not when a rival outgroup was present), and only toward a threatening group member (not a neutral group member). Moreover, the effect was mediated by perceptions of threat (Experiment 1) and the desire to monitor the threatening group member (Experiment 3). These results shed new light on one key strategy through which dominant leaders try to maintain control over valuable yet potentially threatening group members. Findings have implications for theories of power, leadership, and group behavior. PMID:21988276

  18. Political conservatism, authoritarianism, and societal threat: voting for Republican representatives in U.S. Congressional elections from 1946 to 1992.

    PubMed

    McCann, Stewart J H

    2009-07-01

    The author found that the degree of national societal threat preceding congressional elections from 1946 to 1992 was positively associated with the mean state percentage of people voting for Republican representatives, supporting a conventional threat-authoritarianism hypothesis. However, threat was positively associated with the mean state percentage of people voting for Republican representatives in conservative states but not in liberal states, and the conventional threat-authoritarianism link was entirely driven by the relation in conservative states. The author classified states with a composite measure (alpha = .92) on the basis of state ideological identification, religious fundamentalism, composite policy liberalism, Republican Party elite ideology, and Democratic Party elite ideology. These results offer support to an interactive threat-authoritarianism hypothesis derived from the authoritarian dynamic theory of K. Stenner (2005), which postulates that only authoritarian persons are activated to manifest authoritarian behavior in times of normative threat. Also, the author discusses potential alternative explanations on the basis of system justification, need for closure, and terror-management theories. PMID:19606642

  19. Performance of single-stage compressor designed on basis of constant total enthalpy with symmetrical velocity diagram at all radii and velocity ratio of 0.7 at rotor hub / Jack R. Burtt and Robert J. Jackson

    NASA Technical Reports Server (NTRS)

    Burtt, Jack R; Jackson, Robert J

    1951-01-01

    A typical inlet axial-flow compressor inlet stage, which was designed on the basis of constant total enthalpy with symmetrical velocity diagram at all radii, was investigated. At a tip speed of 1126 feet per second, a peak pressure ratio of 1.28 was obtained at an efficiency of 0.76. At a tip speed, the highest practical flow was 28 pounds per second per square foot frontal area with an efficiency of 0.78. Data for a rotor relative inlet Mach number range of from 0.5 to 0.875 indicates that the critical value for any stage radial element is approximately 0.80 for the stage investigated.

  20. Future Infectious Disease Threats to Europe

    PubMed Central

    Suk, Jonathan E.

    2011-01-01

    We examined how different drivers of infectious disease could interact to threaten control efforts in Europe. We considered projected trends through 2020 for 3 broad groups of drivers: globalization and environmental change, social and demographic change, and health system capacity. Eight plausible infectious disease threats with the potential to be significantly more problematic than they are today were identified through an expert consultation: extensively drug-resistant bacteria, vector-borne diseases, sexually transmitted infections, food-borne infections, a resurgence of vaccine-preventable diseases, health care–associated infections, multidrug-resistant tuberculosis, and pandemic influenza. Preemptive measures to be taken by the public health community to counteract these threats were identified. PMID:21940915

  1. Securing Infrastructure from High Explosive Threats

    SciTech Connect

    Glascoe, L; Noble, C; Reynolds, J; Kuhl, A; Morris, J

    2009-03-20

    Lawrence Livermore National Laboratory (LLNL) is working with the Department of Homeland Security's Science and Technology Directorate, the Transportation Security Administration, and several infrastructure partners to characterize and help mitigate principal structural vulnerabilities to explosive threats. Given the importance of infrastructure to the nation's security and economy, there is a clear need for applied research and analyses (1) to improve understanding of the vulnerabilities of these systems to explosive threats and (2) to provide decision makers with time-critical technical assistance concerning countermeasure and mitigation options. Fully-coupled high performance calculations of structural response to ideal and non-ideal explosives help bound and quantify specific critical vulnerabilities, and help identify possible corrective schemes. Experimental validation of modeling approaches and methodologies builds confidence in the prediction, while advanced stochastic techniques allow for optimal use of scarce computational resources to efficiently provide infrastructure owners and decision makers with timely analyses.

  2. Current nuclear threats and possible responses

    NASA Astrophysics Data System (ADS)

    Lamb, Frederick K.

    2005-04-01

    Over the last 50 years, the United States has spent more than 100 billion developing and building a variety of systems intended to defend its territory against intercontinental-range ballistic missiles. Most of these systems never became operational and ultimately all were judged ineffective. The United States is currently spending about 10 billion per year developing technologies and systems intended to defend against missiles that might be acquired in the future by North Korea or Iran. This presentation will discuss these efforts ad whether they are likely to be more effective than those of the past. It will also discuss the proper role of anti-ballistic programs at a time when the threat of a nuclear attack on the U.S. by terrorists armed with nuclear weapons is thought to be much higher than the threat of an attack by nuclear-armed ballistic missles.

  3. Detecting underwater improvised explosive threats (DUIET)

    NASA Astrophysics Data System (ADS)

    Feeley, Terry

    2010-04-01

    Improvised Explosive Devices (IEDs) have presented a major threat in the wars in Afghanistan and Iraq. These devices are powerful homemade land mines that can be small and easily hidden near roadsides. They are then remotely detonated when Coalition Forces pass by either singly or in convoys. Their rapid detection, classification and destruction is key to the safety of troops in the area. These land based bombs will have an analogue in the underwater theater especially in ports, lakes, rivers and streams. These devices may be used against Americans on American soil as an element of the global war on terrorism (GWOT) Rapid detection and classification of underwater improvised explosive devices (UIED) is critical to protecting innocent lives and maintaining the day to day flow of commerce. This paper will discuss a strategy and tool set to deal with this potential threat.

  4. The Concept of Identification in Threat Assessment.

    PubMed

    Meloy, J Reid; Mohandie, Kris; Knoll, James L; Hoffmann, Jens

    2015-06-01

    Identification is one of eight warning behaviors--superordinate patterns of accelerating risk--that are theorized to correlate with targeted violence, and have some empirical validation. It is characterized by one or more of five characteristics: pseudo-commando behavior, evidence of a warrior mentality, a close association with weapons or other military or law enforcement paraphernalia, wanting to imitate and often surmount previous attackers or assassins, or believing oneself to be an agent to advance a particular cause or belief system. The authors briefly explore the history of the psychology of identification, its current usage, and its application to threat assessment. Four cases are used to illustrate identification as both a process and a product, and a likely motive for targeted violence in some subjects. Its operational relevance for threat assessment is suggested. PMID:25728417

  5. Avian influenza: an emerging pandemic threat.

    PubMed

    Jin, Xian Wen; Mossad, Sherif B

    2005-12-01

    While we are facing the threat of an emerging pandemic from the current avian flu outbreak in Asia, we have learned important traits of the virus responsible for the 1918 Spanish influenza pandemic that made it so deadly. By using stockpiled antiviral drugs effectively and developing an effective vaccine, we can be in a better position than ever to mitigate the global impact of an avian influenza pandemic. PMID:16392727

  6. Bullying: a hidden threat to patient safety.

    PubMed

    Longo, Joy; Hain, Debra

    2014-01-01

    Patient safety is a crucial element for quality care in hemodialysis facilities. When evaluating possible threats to safety, an important factor to consider is the behavior of the healthcare staff. Inappropriate behaviors, such as bullying, have been associated with poor clinical outcomes. In addressing inappropriate behaviors, it is necessary to consider the role of the work environment. Healthy work environment initiatives provide a possible strategy to prevent and/or address the behaviors. PMID:24818452

  7. CAXSS: an intelligent threat-detection system

    NASA Astrophysics Data System (ADS)

    Feather, Thomas; Guan, Ling; Lee-Kwen, Adrian; Paranjape, Raman B.

    1993-04-01

    Array Systems Computing Inc. (ASC) is developing a prototype Computer Assisted X-ray Screening System (CAXSS) which uses state-of-the-art image processing and computer vision technology to detect threats seen in x-ray images of passenger carry-on luggage at national and international airports. This system is successful in detecting weapons including guns, knives, grenades, aerosol cans, etc. Currently, bomb detection is also being implemented; preliminary results using this bomb detector are promising.

  8. Matrix Characterization in Threat Material Detection Processes

    NASA Astrophysics Data System (ADS)

    Obhodas, J.; Sudac, D.; Valkovic, V.

    2009-03-01

    Matrix characterization in the threat material detection is of utmost importance, it generates the background against which the threat material signal has to be identified. Threat materials (explosive, chemical warfare, …) are usually contained within small volume inside large volumes of variable matrices. We have studied the influence of matrix materials on the capability of neutron systems to identify hidden threat material. Three specific scenarios are considered in some details: case 1—contraband material in the sea containers, case 2—-explosives in soil (landmines), case 3—explosives and chemical warfare on the sea bottom. Effects of container cargo material on tagged neutron system are seen in the increase of gamma background and the decrease of neutron beam intensity. Detection of landmines is more complex because of variable soil properties. We have studied in detail space and time variations of soil elemental compositions and in particular hydrogen content (humidity). Of special interest are ammunitions and chemical warfare on the sea bottom, damping sites and leftovers from previous conflicts (WW-I, WW-II and local). In this case sea sediment is background source and its role is similar to the role of the soil in the landmine detection. In addition to geochemical cycling of chemical elements in semi-enclosed sea, like the Adriatic Sea, one has to consider also anthropogenic influence, especially when studying small scale variations in concentration levels. Some preliminary experimental results obtained with tagged neutron sensor inside an underwater vehicle are presented as well as data on sediment characterization by X-Ray Fluorescence.

  9. Matrix Characterization in Threat Material Detection Processes

    SciTech Connect

    Obhodas, J.; Sudac, D.; Valkovic, V.

    2009-03-10

    Matrix characterization in the threat material detection is of utmost importance, it generates the background against which the threat material signal has to be identified. Threat materials (explosive, chemical warfare, ...) are usually contained within small volume inside large volumes of variable matrices. We have studied the influence of matrix materials on the capability of neutron systems to identify hidden threat material. Three specific scenarios are considered in some details: case 1--contraband material in the sea containers, case 2 - explosives in soil (landmines), case 3 - explosives and chemical warfare on the sea bottom. Effects of container cargo material on tagged neutron system are seen in the increase of gamma background and the decrease of neutron beam intensity. Detection of landmines is more complex because of variable soil properties. We have studied in detail space and time variations of soil elemental compositions and in particular hydrogen content (humidity). Of special interest are ammunitions and chemical warfare on the sea bottom, damping sites and leftovers from previous conflicts (WW-I, WW-II and local). In this case sea sediment is background source and its role is similar to the role of the soil in the landmine detection. In addition to geochemical cycling of chemical elements in semi-enclosed sea, like the Adriatic Sea, one has to consider also anthropogenic influence, especially when studying small scale variations in concentration levels. Some preliminary experimental results obtained with tagged neutron sensor inside an underwater vehicle are presented as well as data on sediment characterization by X-Ray Fluorescence.

  10. Nonproliferation, Nuclear Security, and the Insider Threat

    SciTech Connect

    Balatsky, Galya I.; Duggan, Ruth

    2012-07-12

    Insider threat concept is evolving and getting more attention: (1) Domestically, internationally and in foreign countries, (2) At the government, academia, and industry levels, and (3) Public awareness and concerns are also growing. Negligence can be an insider's action. Technology advancements provide more opportunities, new tools for the insider. Our understanding of the insider is shaped by our cultural, social and ethnic perceptions and traditions. They also can limit our recognition of the issues and response actions.

  11. Stereotype Threat Reinterpreted as a Regulatory Mismatch

    PubMed Central

    Grimm, Lisa R.; Markman, Arthur B.; Maddox, W. Todd; Baldwin, Grant C.

    2008-01-01

    Research documents performance decrements resulting from the activation of a negative task-relevant stereotype. We combine a number of strands of work to identify causes of stereotype threat in a way that allows us to reverse the effects and improve the performance of individuals with negative task-relevant stereotypes. We draw on prior work suggesting that negative stereotypes induce a prevention focus, and other research suggesting that people exhibit greater flexibility when their regulatory focus matches the reward structure of the task. This work suggests that stereotype threat effects emerge from a prevention focus combined with tasks that have an explicit or implicit gains reward structure. We find flexible performance can be induced in individuals who have a negative task-relevant stereotype by using a losses reward structure. We demonstrate the interaction of stereotypes and the reward structure of the task using chronic stereotypes and GRE math problems (Experiment 1), and primed stereotypes and a category learning task (Experiments 2a and 2b). We discuss implications of this research for other work on stereotype threat. PMID:19159133

  12. Impact! - The Threat of Comets and Asteroids

    NASA Astrophysics Data System (ADS)

    Verschuur, Gerrit L.

    1997-12-01

    In Impact , Gerrit L. Verschuur offers an eye-opening look at the catastrophic collisions of comets and asteroids with our planet. Perhaps more important, he paints an unsettling portrait of the possibility of new collisions with earth, exploring potential threats to our planet and describing what scientists are doing right now to prepare for this frightening possibility. Every day something from space hits our planet, Verschuur reveals. In fact, about 10,000 tons of space debris fall to earth every year, mostly in meteoric form. But meteors are not the greatest threat to life on earth, the author points out. The major threats are asteroids and comets. The reader discovers that astronomers have located some 350 NEAs ("Near Earth Asteroids"), objects whose orbits cross the orbit of the earth. Comets, of course, are even more deadly. He discusses Comet Swift-Tuttle--"the most dangerous object in the solar system"--a comet far larger than the one that many scientists believe killed off the dinosaurs, due to pass through earth's orbit in the year 2126. In addition, the author describes the efforts of Spacewatch and other groups to locate NEAs, and evaluates the idea that comet and asteroid impacts have been an underrated factor in the evolution of life on earth. Whether discussing monumental tsunamis or the innumerable comets in the solar system, Impact will enthrall anyone curious about outer space, remarkable natural phenomenon, or the future of the planet earth.

  13. Bot armies as threats to network security

    NASA Astrophysics Data System (ADS)

    Banks, Sheila B.; Stytz, Martin R.

    2007-04-01

    "Botnets", or "bot armies", are large groups of remotely controlled malicious software. Bot armies pose one of the most serious security threats to all networks. Botnets, remotely controlled and operated by botmasters or botherders, can launch massive denial of service attacks, multiple penetration attacks, or any other malicious network activity on a massive scale. While bot army activity has, in the past, been limited to fraud, blackmail, and other forms of criminal activity, their potential for causing large-scale damage to the entire internet; for launching large-scale, coordinated attacks on government computers and networks; and for large-scale, coordinated data gathering from thousands of users and computers on any network has been underestimated. This paper will not discuss how to build bots but the threats they pose. In a "botnet" or "bot army", computers can be used to spread spam, launch denial-of-service attacks against Web sites, conduct fraudulent activities, and prevent authorized network traffic from traversing the network. In this paper we discuss botnets and the technologies that underlie this threat to network and computer security. The first section motivates the need for improved protection against botnets, their technologies, and for further research about botnets. The second contains background information about bot armies and their key underlying technologies. The third section presents a discussion of the types of attacks that botnets can conduct and potential defenses against them. The fourth section contains a summary and suggestions for future research and development.

  14. Mere effort and stereotype threat performance effects.

    PubMed

    Jamieson, Jeremy P; Harkins, Stephen G

    2007-10-01

    Although the fact that stereotype threat impacts performance is well established, the underlying process(es) is(are) not clear. Recently, T. Schmader and M. Johns (2003) argued for a working memory interference account, which proposes that performance suffers because cognitive resources are expended on processing information associated with negative stereotypes. The antisaccade task provides a vehicle to test this account because optimal performance requires working memory resources to inhibit the tendency to look at an irrelevant, peripheral cue (the prepotent response) and to generate volitional saccades to the target. If stereotype threat occupies working memory resources, then the ability to inhibit the prepotent response and to launch volitional saccades will be impaired, and performance will suffer. In contrast, S. Harkins's (2006) mere effort account argues that stereotype threat participants are motivated to perform well, which potentiates the prepotent response, but also leads to efforts to counter this tendency if participants recognize that the response is incorrect, know the correct response, and have the opportunity to make it. Results from 4 experiments support the mere effort but not the working memory interference account. PMID:17892331

  15. Linguistic threat activates the human amygdala

    PubMed Central

    Isenberg, N.; Silbersweig, D.; Engelien, A.; Emmerich, S.; Malavade, K.; Beattie, B.; Leon, A. C.; Stern, E.

    1999-01-01

    Studies in animals demonstrate a crucial role for the amygdala in emotional and social behavior, especially as related to fear and aggression. Whereas lesion and functional-imaging studies in humans indicate the amygdala’s participation in assessing the significance of nonverbal as well as paralinguistic cues, direct evidence for its role in the emotional processing of linguistic cues is lacking. In this study, we use a modified Stroop task along with a high-sensitivity neuroimaging technique to target the neural substrate engaged specifically when processing linguistic threat. Healthy volunteer subjects were instructed to name the color of words of either threat or neutral valence, presented in different color fonts, while neural activity was measured by using H215O positron-emission tomography. Bilateral amygdalar activation was significantly greater during color naming of threat words than during color naming of neutral words. Associated activations were also noted in sensory-evaluative and motor-planning areas of the brain. Thus, our results demonstrate the amygdala’s role in the processing of danger elicited by language. In addition, the results reinforce the amygdala’s role in the modulation of the perception of, and response to, emotionally salient stimuli. The current study further suggests conservation of phylogenetically older mechanisms of emotional evaluation in the context of more recently evolved linguistic function. PMID:10468630

  16. Toddlers’ Duration of Attention towards Putative Threat

    PubMed Central

    Kiel, Elizabeth J.; Buss, Kristin A.

    2010-01-01

    Although individual differences in reactions to novelty in the toddler years have been consistently linked to risk for developing anxious behavior, toddlers’ attention towards a novel, putatively threatening stimulus while in the presence of other enjoyable activities has rarely been examined as a precursor to such risk. The current study examined how attention towards an angry-looking gorilla mask in a room with alternative opportunities for play in 24-month-old toddlers predicted social inhibition when children entered kindergarten. Analyses examined attention to threat above and beyond and in interaction with both proximity to the mask and fear of novelty observed in other situations. Attention to threat interacted with proximity to the mask to predict social inhibition, such that attention to threat most strongly predicted social inhibition when toddlers stayed furthest from the mask. This relation occurred above and beyond the predictive relation between fear of novelty and social inhibition. Results are discussed within the broader literature of anxiety development and attentional processes in young children. PMID:21373365

  17. Asymmetric threat data mining and knowledge discovery

    NASA Astrophysics Data System (ADS)

    Gilmore, John F.; Pagels, Michael A.; Palk, Justin

    2001-03-01

    Asymmetric threats differ from the conventional force-on- force military encounters that the Defense Department has historically been trained to engage. Terrorism by its nature is now an operational activity that is neither easily detected or countered as its very existence depends on small covert attacks exploiting the element of surprise. But terrorism does have defined forms, motivations, tactics and organizational structure. Exploiting a terrorism taxonomy provides the opportunity to discover and assess knowledge of terrorist operations. This paper describes the Asymmetric Threat Terrorist Assessment, Countering, and Knowledge (ATTACK) system. ATTACK has been developed to (a) data mine open source intelligence (OSINT) information from web-based newspaper sources, video news web casts, and actual terrorist web sites, (b) evaluate this information against a terrorism taxonomy, (c) exploit country/region specific social, economic, political, and religious knowledge, and (d) discover and predict potential terrorist activities and association links. Details of the asymmetric threat structure and the ATTACK system architecture are presented with results of an actual terrorist data mining and knowledge discovery test case shown.

  18. Comprehensive test ban treaty international monitoring system security threats and proposed security attributes

    SciTech Connect

    Draelos, T.J.; Craft, R.L.

    1996-03-01

    To monitor compliance with a Comprehensive Test Ban Treaty (CTBT), a sensing network, referred to as the International Monitoring System (IMS), is being deployed. Success of the IMS depends on both its ability to preform its function and the international community`s confidence in the system. To ensure these goals, steps must be taken to secure the system against attacks that would undermine it; however, it is not clear that consensus exists with respect to the security requirements that should be levied on the IMS design. In addition, CTBT has not clearly articulated what threats it wishes to address. This paper proposes four system-level threats that should drive IMS design considerations, identifies potential threat agents, and collects into one place the security requirements that have been suggested by various elements of the IMS community. For each such requirement, issues associated with the requirement are identified and rationale for the requirement is discussed.

  19. Validity Threats in Retrospective Pretest-Posttest Designs.

    ERIC Educational Resources Information Center

    Sprangers, Mirjam

    Social desirability responding and effort justification were each studied for their effect on response shift as seen in retrospective pretest-posttest responses. The first study used a bogus pipeline induction (half the subjects were told their self-reporting could later be validated) before the self-report pretest. After experimental or control…

  20. Vision-based threat detection in dynamic environments.

    SciTech Connect

    Carlson, Jeffrey J.

    2007-08-01

    This report addresses the development of automated video-screening technology to assist security forces in protecting our homeland against terrorist threats. A prevailing threat is the covert placement of bombs inside crowded public facilities. Although video-surveillance systems are increasingly common, current systems cannot detect the placement of bombs. It is also unlikely that security personnel could detect a bomb or its placement by observing video from surveillance cameras. The problems lie in the large number of cameras required to monitor large areas, the limited number of security personnel employed to protect these areas, and the intense diligence required to effectively screen live video from even a single camera. Different from existing video-detection systems designed to operate in nearly static environments, we are developing technology to detect changes in the background of dynamic environments: environments where motion and human activities are persistent over long periods. Our goal is to quickly detect background changes, even if the background is visible to the camera less than 5 percent of the time and possibly never free from foreground activity. Our approach employs statistical scene models based on mixture densities. We hypothesized that the background component of the mixture has a small variance compared to foreground components. Experiments demonstrate this hypothesis is true under a wide variety of operating conditions. A major focus involved the development of robust background estimation techniques that exploit this property. We desire estimation algorithms that can rapidly produce accurate background estimates and detection algorithms that can reliably detect background changes with minimal nuisance alarms. Another goal is to recognize unusual activities or foreground conditions that could signal an attack (e.g., large numbers of running people, people falling to the floor, etc.). Detection of background changes and/or unusual

  1. Stereotype Threat and Feedback Seeking in the Workplace.

    ERIC Educational Resources Information Center

    Roberson, Loriann; Deitch, Elizabeth A.; Brief, Arthur P.; Block, Caryn J.

    2003-01-01

    Among 166 African American managers, those who were the only minority-group member in their workgroup perceived more stereotype threat. Stereotype threat was related to indirect feedback seeking and discounting of supervisors' performance feedback. (Contains 41 references.) (SK)

  2. Introduction to Administrative Programs that Mitigate the Insider Threat

    SciTech Connect

    Gerke, Gretchen K.; Rogers, Erin; Landers, John; DeCastro, Kara

    2012-09-01

    This presentation begins with the reality of the insider threat, then elaborates on these tools to mitigate the insider threat: Human Reliability Program (HRP); Nuclear Security Culture (NSC) Program; Employee Assistance Program (EAP).

  3. 41 CFR 60-741.22 - Direct threat defense.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... INDIVIDUALS WITH DISABILITIES Discrimination Prohibited § 60-741.22 Direct threat defense. The contractor may... individual or others in the workplace. (See § 60-741.2(y) defining direct threat.)...

  4. Zika Threat Calls for Extra Mosquito Protection This Summer

    MedlinePlus

    ... page: https://medlineplus.gov/news/fullstory_159168.html Zika Threat Calls for Extra Mosquito Protection This Summer ... THURSDAY, June 2, 2016 (HealthDay News) -- With the Zika threat growing in the United States, people need ...

  5. 75 FR 60430 - Federal Advisory Committee; Threat Reduction Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-30

    ... technology security, combating weapons of mass destruction (WMD), chemical and biological defense, the future... level briefings on WMD threats, the Defense Threat Reduction Agency, and the status of the...

  6. Culture, Threat, and Mental Illness Stigma: Identifying Culture-Specific Threat among Chinese-American Groups

    PubMed Central

    Purdie-Vaughns, Valerie; Kotabe, Hiroki; Link, Bruce G.; Saw, Anne; Wong, Gloria; Phelan, Jo C.

    2014-01-01

    We incorporate anthropological insights into a stigma framework to elucidate the role of culture in threat perception and stigma among Chinese groups. Prior work suggests that genetic contamination that jeopardizes the extension of one’s family lineage may comprise a culture-specific threat among Chinese groups. In Study 1, a national survey conducted from 2002–2003 assessed cultural differences in mental illness stigma and perceptions of threat in 56 Chinese-Americans and 589 European-Americans. Study 2 sought to empirically test this culture-specific threat of genetic contamination to lineage via a memory paradigm. Conducted from June to August 2010, 48 Chinese-American and 37 European-American university students in New York City read vignettes containing content referring to lineage or non-lineage concerns. Half the participants in each ethnic group were assigned to a condition in which the illness was likely to be inherited (genetic condition) and the rest read that the illness was unlikely to be inherited (non-genetic condition). Findings from Study 1 and 2 were convergent. In Study 1, culture-specific threat to lineage predicted cultural variation in stigma independently and after accounting for other forms of threat. In Study 2, Chinese-Americans in the genetic condition were more likely to accurately recall and recognize lineage content than the Chinese-Americans in the non-genetic condition, but that memorial pattern was not found for non-lineage content. The identification of this culture-specific threat among Chinese groups has direct implications for culturally-tailored anti-stigma interventions. Further, this framework might be implemented across other conditions and cultural groups to reduce stigma across cultures. PMID:23702210

  7. Use of multisensor fusion technology to meet the challenges of emerging EO and RF threats to a combat aircraft

    NASA Astrophysics Data System (ADS)

    Shukla, Arvind K.; Parthasarathy, T.; Rao, P. N. A. P.

    2003-04-01

    The pilot on-board a combat aircraft encounters during any mission a dynamically varying threat environment of diverse EO and RF threats. Different sensors are carried on-board the aircraft to combat these threats. However, these sensors have their own limitations and no single sensor is able to perform in all kinds of situations. In addition, the technological advances in the threat scenario - in terms of higher speeds, small signatures and multimode guidance - and increased complex threats in the battlefield leading to generation of large amount of data input to the pilot make his decision making task very difficult due to increased workload. These challenges can be efficiently handled by deployment of a system on-board the aircraft with a comprehensive goal of autonomous target detection and tracking, situation and threat assessment and decision making based on multi-sensor data fusion techniques. In this paper, major emerging EO and RF threats for a combat aircraft and some important EO and RF sensors on-board the aircraft have been discussed. A design approach for the development of a multi-sensor data fusion system for a combat aircraft to provide better threat assessment than that provided by any single stand alone sensor has also been presented.

  8. Space Station crew safety alternatives study. Volume 2: Threat development

    NASA Technical Reports Server (NTRS)

    Raasch, R. F.; Peercy, R. L., Jr.; Rockoff, L. A.

    1985-01-01

    The first 15 years of accumulated space station concepts for initial operational capability (IOC) during the early 1990's were considered. Twenty-five threats to the space station are identified and selected threats addressed as impacting safety criteria, escape and rescue, and human factors safety concerns. Of the 25 threats identified, eight are discussed including strategy options for threat control: fire, biological or toxic contamination, injury/illness, explosion, loss of pressurization, radiation, meteoroid penetration, and debris.

  9. Soil threats in Europe for the RECARE project

    NASA Astrophysics Data System (ADS)

    Stolte, Jannes; Tesfai, Mehretaeb; Oygarden, Lillian

    2015-04-01

    Soil is one of our most important natural resources that provides us with vital goods and services to sustain life. Nevertheless, soils functions are threatened by a wide range of processes and a number of soil threats have been identified in Europe. Although there is a large body of knowledge available on soil threats in Europe, the complexity and functioning of soil systems and their interaction with human activities, climate change, and ecosystem services (ESS), is still not fully understood. An extensive literature review was carried out by a group of experts on soil threats at the European level. In total, around 60 experts from the 17 case study sites of the RECARE project, were involved in the process of reviewing and drafting the report and 11 soil threats were identified. The objective of WP2 of the RECARE project was to provide an improved overview of existing information on soil threats and degradation at the European scale. These soil threats are soil erosion by water, soil erosion by wind, decline of organic matter (OM) in peat, decline of OM in minerals soils, soil compaction, soil sealing, soil contamination, soil salinization, desertification, flooding and landslides and decline in soil biodiversity. The final report of WP2 provides a comprehensive thematic information on the major soil threats of Europe with due attention given to the Driving force-Pressure-State-Impact-Response to soil threats. Interrelationships between soil threats, between soil threats and soil functions and between soil threats and Ecosystems Services are made, and will be presented. A synergy between the soil threats is made based on the given information in each of the chapters, where we tried to identify the interactions between the threats. We tried to identify in what way one threat acts as a threat for another threat. Also, the link between soil degradation and Ecosystem Services are identified. Again, based on the information given in each chapter, the major climate

  10. 49 CFR 1546.301 - Bomb or air piracy threats.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless the... carrier ensures that the pilot in command is advised immediately to take the emergency action...

  11. Gender, Stereotype Threat, and Anxiety: Psychophysiological and Cognitive Evidence

    ERIC Educational Resources Information Center

    Osborne, Jason W.

    2006-01-01

    Introduction: Claude Steele's stereotype threat hypothesis proposed that negative group stereotypes increase individual anxiety levels, hurting performance. However, the role of anxiety in stereotype threat has not been fully explored. This study examined the hypothesis that experimental manipulation of stereotype threat would influence real-time…

  12. 41 CFR 60-250.22 - Direct threat defense.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Direct threat defense. 60... VETERANS Discrimination Prohibited § 60-250.22 Direct threat defense. The contractor may use as a... position held or desired without posing a direct threat to the health or safety of the individual or...

  13. 75 FR 30002 - Federal Advisory Committee; Threat Reduction Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-28

    ... Office of the Secretary Federal Advisory Committee; Threat Reduction Advisory Committee AGENCY... the charter for the Threat Reduction Advisory Committee (hereafter referred to as the Committee). FOR... Acquisition, Technology and Logistics and the Director of the Defense Threat Reduction Agency on the...

  14. 41 CFR 60-300.22 - Direct threat defense.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Direct threat defense. 60... VETERANS Discrimination Prohibited § 60-300.22 Direct threat defense. The contractor may use as a... position held or desired without posing a direct threat to the health or safety of the individual or...

  15. Attention Training and the Threat Bias: An ERP Study

    ERIC Educational Resources Information Center

    O'Toole, Laura; Dennis, Tracy A.

    2012-01-01

    Anxiety is characterized by exaggerated attention to threat. Several studies suggest that this threat bias plays a causal role in the development and maintenance of anxiety disorders. Furthermore, although the threat bias can be reduced in anxious individuals and induced in non-anxious individual, the attentional mechanisms underlying these…

  16. Unleashing Latent Ability: Implications of Stereotype Threat for College Admissions

    ERIC Educational Resources Information Center

    Logel, Christine R.; Walton, Gregory M.; Spencer, Steven J.; Peach, Jennifer; Mark, Zanna P.

    2012-01-01

    Social-psychological research conducted over the past 15 years provides compelling evidence that pervasive psychological threats are present in common academic environments--especially threats that originate in negative intellectual stereotypes--and that these threats undermine the real-world academic performance of non-Asian ethnic minority…

  17. 49 CFR 1540.205 - Procedures for security threat assessment.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... TSA determines that the applicant meets the security threat assessment standards in 49 CFR 1540.201(c... the applicant does not meet the security threat assessment standards in 49 CFR 1540.201(c). The... standards in 49 CFR 1540.201(c) and may pose an imminent threat to transportation or national security,...

  18. 49 CFR 1540.205 - Procedures for security threat assessment.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... TSA determines that the applicant meets the security threat assessment standards in 49 CFR 1540.201(c... the applicant does not meet the security threat assessment standards in 49 CFR 1540.201(c). The... standards in 49 CFR 1540.201(c) and may pose an imminent threat to transportation or national security,...

  19. 49 CFR 1540.205 - Procedures for security threat assessment.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... TSA determines that the applicant meets the security threat assessment standards in 49 CFR 1540.201(c... the applicant does not meet the security threat assessment standards in 49 CFR 1540.201(c). The... standards in 49 CFR 1540.201(c) and may pose an imminent threat to transportation or national security,...

  20. 49 CFR 1540.205 - Procedures for security threat assessment.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... TSA determines that the applicant meets the security threat assessment standards in 49 CFR 1540.201(c... the applicant does not meet the security threat assessment standards in 49 CFR 1540.201(c). The... standards in 49 CFR 1540.201(c) and may pose an imminent threat to transportation or national security,...

  1. 49 CFR 1540.205 - Procedures for security threat assessment.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... TSA determines that the applicant meets the security threat assessment standards in 49 CFR 1540.201(c... the applicant does not meet the security threat assessment standards in 49 CFR 1540.201(c). The... standards in 49 CFR 1540.201(c) and may pose an imminent threat to transportation or national security,...

  2. Student Reports of Peer Threats of Violence: Prevalence and Outcomes

    ERIC Educational Resources Information Center

    Nekvasil, Erin K.; Cornell, Dewey G.

    2012-01-01

    Authorities in education and law enforcement have recommended that schools use a threat-assessment approach to prevent violence, but there is relatively little research on characteristics and outcomes of threats among students. The current study examined student reports of threat experiences in a sample of 3,756 high school students. Approximately…

  3. Death Threat and Death Concerns in the College Student.

    ERIC Educational Resources Information Center

    Tobacyk, Jerome; Eckstein, Daniel

    1980-01-01

    Thanatology students reported significantly lesser death threat and significantly greater death concerns. Trait anxiety was found to be a significant predictor of change in death threat in the Thanatology Group, with lesser anxiety associated with greater decline in death threat. (Author)

  4. Isolating Neural Components of Threat Bias in Pediatric Anxiety

    ERIC Educational Resources Information Center

    Britton, Jennifer C.; Bar-Haim, Yair; Carver, Frederick W.; Holroyd, Tom; Norcross, Maxine A.; Detloff, Allison; Leibenluft, Ellen; Ernst, Monique; Pine, Daniel S.

    2012-01-01

    Background: Attention biases toward threat are often detected in individuals with anxiety disorders. Threat biases can be measured experimentally through dot-probe paradigms, in which individuals detect a probe following a stimulus pair including a threat. On these tasks, individuals with anxiety tend to detect probes that occur in a location…

  5. Representative threats for research in public health surveillance.

    PubMed

    Wagner, Michael M; Dato, Virginia; Dowling, John N; Allswede, Michael

    2003-06-01

    A large number of biological agents can cause natural or bioterroristic disease outbreaks and each can present in a bewildering number of ways (e.g., a few cases versus many cases, confined to a building versus widely disseminated). This 'problem space' is a challenge for designers of early warning systems for disease outbreaks and the sheer size of this space is a barrier to progress. This paper addresses this problem by deriving nine categories of threats that represent a parsimonious characterization of the problem space. A literature search also identified one or more example outbreaks for each of the nine categories. These outbreaks have occurred in recent times and could be used by researchers in need of actual outbreak data for investigations of the role of different types of surveillance data and algorithms in outbreak detection. The methodological contribution of this research is a Criterion Set of threats for analysis and evaluation of detection systems. This set characterizes the problem space in a tractable manner with less loss of generality than analyses based on one or two selected diseases, which is representative of current analyses. PMID:14615227

  6. Tabletop scenarios for realism in bioterrorism and threat preparedness.

    PubMed

    Abraham, Rachel T; Walls, Richard T; Fischer, Mark; Markovic-Reed, Sandra; Solovieva, Tatiana I; Russell, Floyd K; Ducatman, Alan M

    2012-01-01

    Five realistic tabletop scenarios were designed to facilitate threat preparedness training of Medical, Public Health, Nursing, Emergency Services, Mental Health, Allied Health, and Pharmacy personnel. Training scenarios were (1) student contaminates lettuce (Act) in a state university with Shigella sonnei (Agent), (2) dismissed athlete contaminates ice (Act) at the basketball tournament with Escherichia coli (Agent), (3) workers fail to report abandoned backpacks (Act) at a state fair that contain smallpox virus (Agent), (4) terrorists expose county residents (Act) to Pneumonic plague bacterium (Agent), and (5) infected birds expose field-trip participants (Act) to Avian influenza virus (Agent). Evaluation of the tabletops yielded positive ratings of educational outcomes in these domains: well-structured, organized, plausible, realistic, engaging, on-target, useful, and multidisciplinary. Attendees with previous blended-learning courses on bioterrorism and threat preparedness enhanced performance in the tabletop exercises. Evaluative data indicated a new level of competence and self-confidence about being part of a coordinated, local-level, interdisciplinary response. PMID:23472535

  7. Cocaine-induced sniffing stereotypy changes in response to threat.

    PubMed

    Blanchard, R J; Hebert, M; Dulloog, L; Markham, C; Figueira, R; Nishimura, O; Newsham, K; Kaawaloa, J N; Blanchard, D C

    2000-06-01

    "Cocaine-induced stereotypies" have been extensively investigated on the basis that they may be capable of providing insights into behavioral and neurochemical mechanisms relevant to drug abuse and addiction. Recent work has indicated that cocaine enhances a number of defensive behaviors, and, that cocaine-enhanced sniffing may be a functional behavior pattern, potentially related to defense, prompting an investigation of the effects of threat stimuli on cocaine-enhanced sniffing. When behaviors of saline control rats were evaluated in their home cages (HC), or on exposure to a toy cat (TC) or real cat (RC), they showed minimal crouching in the HC; initial crouching declining over 5 days of repetitions to the TC; and continued, high-level crouching to the RC. Cocaine (30 mg/kg, IP) enhanced defensiveness in situations in which it had declined in the TC and RC groups. It also produced high-level sniffing, declining over 5 test days, in the HC; initial low-level sniffing to the TC, increasing over 5 test days; and very low levels of sniffing to the RC. These and previous data contribute to a view that cocaine enhances, but does not directly induce, defensive behaviors. They also indicate that external threat stimuli such as the RC, or initial presentation of the TC suppress sniffing, with sniffing returning as habituation to novel but not intrinsically dangerous stimuli reduces defensiveness. This view suggests that some component of "sensitization of cocaine-induced sniffing stereotypy" may reflect a release from defensiveness-mediated suppression of sniffing over repeated injection/testing as the subject becomes habituated to the injection procedure and to novel test situations. PMID:10880676

  8. Opportunities and Threats to Learning: Lessons from a Pedagogical Workshop for Faculty at a Higher Education Institution

    ERIC Educational Resources Information Center

    Ssentamu, Proscovia Namubiru

    2014-01-01

    Faculty quality is a key variable in the quality of teaching and learning. However, although learning is the basis for teaching, the circumstances under which faculty learn largely remain unexplained. This paper focuses on the opportunities and threats to learning by faculty at Uganda Management Institute (UMI). The paper is based on a study of…

  9. Sticks, Stones, Words, and Broken Bones: New Field and Lab Evidence on Stereotype Threat

    ERIC Educational Resources Information Center

    Wei, Thomas E.

    2012-01-01

    Stereotype threat is frequently purported to be an important determinant of gender gaps in math. Unlike prior studies, which mostly occur in lab settings, I use data from the National Assessment of Educational Progress (NAEP)--a large, representative assessment of U.S. children--where through a design quirk, students are randomly assigned test…

  10. Protection without detection: a threat mitigation technique

    NASA Astrophysics Data System (ADS)

    White, Joshua; McCoy, Joseph R.; Ratazzi, Paul

    2012-05-01

    Networking systems and individual applications have traditionally been defended using signature-based tools that protect the perimeter, many times to the detriment of service, performance, and information flow. These tools require knowledge of both the system on which they run and the attack they are preventing. As such, by their very definition, they only account for what is known to be malicious and ignore the unknown. The unknown, or zero day threat, can occur when defenses have yet to be immunized via a signature or other identifier of the threat. In environments where execution of the mission is paramount, the networks and applications must perform their function of information delivery without endangering the enterprise or losing the salient information, even when facing zero day threats. In this paper we, describe a new defensive strategy that provides a means to more deliberately balance the oft mutually exclusive aspects of protection and availability. We call this new strategy Protection without Detection, since it focuses on network protection without sacrificing information availability. The current instantiation analyzes the data stream in real time as it passes through an in-line device. Critical files are recognized, and mission-specific trusted templates are applied as they are forwarded to their destination. The end result is a system which eliminates the opportunity for propagation of malicious or unnecessary payloads via the various containers that are inherent in the definition of standard file types. In some cases, this method sacrifices features or functionality that is typically inherent in these files. However, with the flexibility of the template approach, inclusion or exclusion of these features becomes a deliberate choice of the mission owners, based on their needs and amount of acceptable risk. The paper concludes with a discussion of future extensions and applications.

  11. Basis of Articulation.

    ERIC Educational Resources Information Center

    Kelz, Heinrich

    This article intends to shed light on the somewhat nebulous term "basis of articulation," which is used frequently in Eastern European phonetic and linguistic literature but highly neglected in contemporary American literature. In a historical approach, it is shown how the term originated and developed, how it is defined by various authors, and…

  12. Sustaining earth: Response to the environmental threats

    SciTech Connect

    Angell, D.J.R.; Comer, J.D.; Wilkinson, M.L.N.

    1993-01-01

    This collection of 17 essays has a common theme of examining how politicians, industrialists, scientists, and the public are responding to the recommendations of the 1987 report by World Commission on Environment and Development and to the environmental degradation it highlighted. The book has six sections: background; threats to the environment; individuals, society, and sustainable development; national governments and sustainable development; the international community and sustainable development; conclusions. Insights into the ways in which members of the international political and scientific establishments define and seek to address global environments are best represented.

  13. Lyssaviruses and Bats: Emergence and Zoonotic Threat

    PubMed Central

    Banyard, Ashley C.; Evans, Jennifer S.; Luo, Ting Rong; Fooks, Anthony R.

    2014-01-01

    The continued detection of zoonotic viral infections in bats has led to the microbial fauna of these mammals being studied at a greater level than ever before. Whilst numerous pathogens have been discovered in bat species, infection with lyssaviruses is of particular significance from a zoonotic perspective as, where human infection has been reported, it is invariably fatal. Here we review the detection of lyssaviruses within different bat species and overview what is understood regarding their maintenance and transmission following both experimental and natural infection. We discuss the relevance of these pathogens as zoonotic agents and the threat of newly discovered viruses to human populations. PMID:25093425

  14. The threat of nuclear war: Some responses

    PubMed Central

    Marcattilio, A. J. M.; Nevin, John A.

    1986-01-01

    The possibility of nuclear holocaust threatens the very existence of the world community. Biologists, earth scientists, educators, lawyers, philosophers, physicists, physicians, and social scientists have addressed the problem from their special perspectives, and have had substantial impact on the public. Behavior analysts, however, have not as a whole contributed a great deal to the goal of preventing nuclear catastrophe. We argue that the threat of nuclear war is primarily a behavioral problem, and present an analysis of that problem. In addition, we address the difficulty of implementing behavioral interventions that would contribute to the survival of the World. PMID:22478648

  15. Acoustic and optical multi-sensor threat detection system for border patrol against aerial threats

    NASA Astrophysics Data System (ADS)

    Alsawadi, Motasem S.; Ismail, Ahmad; Al-Azem, Badeea F.; El-Desouki, Munir M.; Alghamdi, Sultan; Alghamdi, Mansour

    2012-10-01

    Saudi Arabia has borders covering over 4,300 km that are shared with seven countries. Such large borders pose many challenges for security and patrol. Thermal imagers are considered the most reliable means of threat detection, however, they are quite costly, which can prevent using them over large areas. This work discusses a multi-sensor acoustic and optical implementation for threat detection as an effort to reduce system cost. The acoustic sensor provides position and direction recognition by using a four microphone setup. The data analysis of field tests will be discussed in this work.

  16. Overview of Threats and Failure Models for Safety-Relevant Computer-Based Systems

    NASA Technical Reports Server (NTRS)

    Torres-Pomales, Wilfredo

    2015-01-01

    This document presents a high-level overview of the threats to safety-relevant computer-based systems, including (1) a description of the introduction and activation of physical and logical faults; (2) the propagation of their effects; and (3) function-level and component-level error and failure mode models. These models can be used in the definition of fault hypotheses (i.e., assumptions) for threat-risk mitigation strategies. This document is a contribution to a guide currently under development that is intended to provide a general technical foundation for designers and evaluators of safety-relevant systems.

  17. Nonpoint sources as external threats to coastal water quality: lessons from Park Service experience

    USGS Publications Warehouse

    Burroughs, R.H.

    1993-01-01

    Program design for nonpoint source control was considered through an analogous problem, external threats to national parks. Nonpoint sources are diffuse land activities that degrade water quality, and recent federal legislation seeks to limit them in coastal areas. External threats occur outside a park boundary but affect the purposes for, or resources within, a park. They have been subject to federal management for many decades. Nonpoint sources are a class of external threat. Therefore, programs to limit them should consider techniques used in part protection. These park techniques include 'hard approaches', which rely on power, usually through legal devices, and 'soft approaches', which utilize shared values and objectives. A linked approach, as exemplified at the Cape Cod National Seashore, appears most promising. In a linked approach, if a soft approach fails, the manager of the protected unit is empowered to take an alternative hard action to protect the resource.

  18. 'Be prepared': an implemental mindset for alleviating social-identity threat.

    PubMed

    Dennehy, Tara C; Ben-Zeev, Avi; Tanigawa, Noriko

    2014-09-01

    Stereotype threat occurs when people who belong to socially devalued groups experience a fear of negative evaluation, which interferes with the goal of staying task focused. The current study was designed to examine whether priming socially devalued individuals with an implemental (vs. a deliberative) mindset, characterized by forming a priori goal-directed plans, would help these individuals to overcome threat-induced distracting states. Participants from low and high socioeconomic status backgrounds (measured by maternal education; SESm ) completed a speeded mental arithmetic test, an intellectually threatening task. Low-SESm individuals performed comparably and exhibited similar confidence levels to high-SESm counterparts only when induced with an implemental mindset, suggesting that implemental mindset priming may help to create equity in the face of stereotype threat. PMID:24725278

  19. Perceived intergroup threat and attitudes of host community members toward immigrant acculturation.

    PubMed

    Florack, Arnd; Piontkowski, Ursula; Rohmann, Anette; Balzer, Tanja; Perzig, Steffi

    2003-10-01

    The authors expected the extent to which host community members (a) perceive immigrants as threatening, (b) believe that the immigrants are able to assimilate to the host community (permeability), and (c) consider their presence in the host community as legitimate to predict attitudes towards immigrant acculturation. The authors designed Study 1 to examine attitudes of Germans toward Turkish immigrants. Participants were 227 German white-collar and blue-collar workers. As expected, ethnocentric acculturation attitudes positively correlated with perceived threat and negatively correlated with perceived legitimacy and perceived permeability. However, only perceived threat contributed uniquely to the prediction of the attitudes. In Study 2, the authors applied an experimental manipulation of perceived threat. Before answering attitude questions, participants read magazine articles with a threatening, enriching, or irrelevant content. The manipulation had the predicted impact on the self-reported attitudes toward immigrants. However, the salience of threatening or enriching aspects of the Turkish culture did not affect implicitly measured attitudes. PMID:14609057

  20. A global response roadmap to the asteroid impact threat: The NEOShield perspective

    NASA Astrophysics Data System (ADS)

    Perna, D.; Barucci, M. A.; Drube, L.; Falke, A.; Fulchignoni, M.; Harris, A. W.; Harris, A. W.; Kanuchova, Z.

    2015-12-01

    Besides being of great scientific interest, near-Earth objects represent a well-founded threat to life on our planet. Nonetheless, up to now there has been no concerted international plan on how to deal with the impact threat, and how to prepare and implement mitigation measures. The NEOShield project is funded by the European Commission to address such issues, to investigate the feasibility of techniques to prevent a potentially catastrophic impact on Earth by an asteroid or a comet, and to develop detailed designs of appropriate space missions to test deflection techniques. In this work we present and discuss the scientific and strategic aspects of the asteroid impact threat, highlighting the necessary steps so as to be ready to react to future hazardous objects.

  1. Taking the sting out of the nuclear threat

    SciTech Connect

    Ravenal, E.C.

    1983-10-01

    A policy of incentives to discourage the first use of nuclear weapons can help to reduce the threat of nuclear war, but the author takes issue with the logic of those who propose requiring a conventional buildup in Europe as a condition for a no-first-use policy because it would be costly and could still lead to an escalation to nuclear war. Inherent questions about deterrence and alliance reflect the cost of pursuing invulnerability and maintaining crisis stability. Since unnecessary and tempting targets encourage first use, the author feels that the US should design a foreign policy of war avoidance and self-reliance that accommodates both short-run utilitarian action and long-term ethical principles, both of which are necessary to relieve tensions. (DCK)

  2. In Brief: Threats to species continue

    NASA Astrophysics Data System (ADS)

    Showstack, Randy

    2009-11-01

    Of 47,677 assessed species, 17,291 are threatened with extinction, according to the latest update of the Red List of Threatened Species issued by the International Union for Conservation of Nature (IUCN) on 3 November. The list indicates that amphibians are the most threatened group of species known to date, with 1895 (nearly 30%) of 6285 amphibians in danger of extinction. Thirty-nine are already extinct or extinct in the wild, 484 are critically endangered, 754 are endangered, and 657 are vulnerable, according to IUCN. Under threat are 21% of mammals, 30% of amphibians, 12% of birds, 28% of reptiles, 37% of freshwater fishes, 70% of plants, and 35% of invertebrates assessed to date. “We have only managed to assess 47,663 species so far; there are many more millions out there which could be under serious threat,” according to IUCN Red List Unit Manager Craig Hilton-Taylor. For more information, visit http://www.iucnredlist.org.

  3. Deterring regional threats from nuclear proliferation

    SciTech Connect

    Spector, L.S.

    1992-03-12

    The most prominent shift in the National Military Strategy is from the global Soviet threat to a new focus on regional contingencies. No threat looms larger in these contingencies than the proliferation of nuclear weapons and ballistic missiles. This study examines proliferation trends and proposes a predominately diplomatic strategy for containing the problem. Dr. Spector identifies three waves of proliferation: the first is the five states with declared weapons and doctrine-the United States, Russia, Great Britain, France, and China; the second includes a less visible group that developed a covert capability, without testing weapons or declaring a doctrine of deterrence-for example, Israel, India, and probably Pakistan; and, a third wave of would-be proliferators includes radical states like Iraq, Iran, Libya, and North Korea. Spector's political approach is based on the common interest of wave one and two states to prevent further proliferation. Political-economic incentives have already worked in the cases of Brazil, Argentina, Taiwan, and South Africa-states which appear to have abandoned their nuclear weapons programs. Spector does not rule out the option of military force. Force, especially under international sanctions, can be a powerful tool to back diplomatic efforts. Use of force, however, remains a last resort.

  4. Passive acoustic threat detection in estuarine environments

    NASA Astrophysics Data System (ADS)

    Borowski, Brian; Sutin, Alexander; Roh, Heui-Seol; Bunin, Barry

    2008-04-01

    The Maritime Security Laboratory (MSL) at Stevens Institute of Technology supports research in a range of areas relevant to harbor security, including passive acoustic detection of underwater threats. The difficulties in using passive detection in an urban estuarine environment include intensive and highly irregular ambient noise and the complexity of sound propagation in shallow water. MSL conducted a set of tests in the Hudson River near Manhattan in order to measure the main parameters defining the detection distance of a threat: source level of a scuba diver, transmission loss of acoustic signals, and ambient noise. The source level of the diver was measured by comparing the diver's sound with a reference signal from a calibrated emitter placed on his path. Transmission loss was measured by comparing noise levels of passing ships at various points along their routes, where their distance from the hydrophone was calculated with the help of cameras and custom software. The ambient noise in the Hudson River was recorded under varying environmental conditions and amounts of water traffic. The passive sonar equation was then applied to estimate the range of detection. Estimations were done for a subset of the recorded noise levels, and we demonstrated how variations in the noise level, attenuation, and the diver's source level influence the effective range of detection. Finally, we provided analytic estimates of how an array improves upon the detection distance calculated by a single hydrophone.

  5. Prefrontal control of attention to threat.

    PubMed

    Peers, Polly V; Simons, Jon S; Lawrence, Andrew D

    2013-01-01

    Attentional control refers to the regulatory processes that ensure that our actions are in accordance with our goals. Dual-system accounts view temperament as consisting of both individual variation in emotionality (e.g., trait anxiety) and variation in regulatory attentional mechanisms that act to modulate emotionality. Increasing evidence links trait variation in attentional control to clinical mood and anxiety disorder symptoms, independent of trait emotionality. Attentional biases to threat have been robustly linked to mood and anxiety disorders. However, the role of variation in attentional control in influencing such biases, and the neural underpinnings of trait variation in attentional control, are unknown. Here, we show that individual differences in trait attentional control, even when accounting for trait and state anxiety, are related to the magnitude of an attentional blink (AB) following threat-related targets. Moreover, we demonstrate that activity in dorso-lateral prefrontal cortex (DLPFC), is observed specifically in relation to control of attention over threatening stimuli, in line with neural theories of attentional control, such as guided activation theory. These results have key implications for neurocognitive theories of attentional bias and emotional resilience. PMID:23386824

  6. Storm in a coffee cup: caffeine modifies brain activation to social signals of threat.

    PubMed

    Smith, Jessica E; Lawrence, Andrew D; Diukova, Ana; Wise, Richard G; Rogers, Peter J

    2012-10-01

    Caffeine, an adenosine A₁ and A(2A) receptor antagonist, is the most popular psychostimulant drug in the world, but it is also anxiogenic. The neural correlates of caffeine-induced anxiety are currently unknown. This study investigated the effects of caffeine on brain regions implicated in social threat processing and anxiety. Participants were 14 healthy male non/infrequent caffeine consumers. In a double-blind placebo-controlled crossover design, they underwent blood oxygenation level-dependent functional magnetic resonance imaging (fMRI) while performing an emotional face processing task 1 h after receiving caffeine (250 mg) or placebo in two fMRI sessions (counterbalanced, 1-week washout). They rated anxiety and mental alertness, and their blood pressure was measured, before and 2 h after treatment. Results showed that caffeine induced threat-related (angry/fearful faces > happy faces) midbrain-periaqueductal gray activation and abolished threat-related medial prefrontal cortex wall activation. Effects of caffeine on extent of threat-related amygdala activation correlated negatively with level of dietary caffeine intake. In concurrence with these changes in threat-related brain activation, caffeine increased self-rated anxiety and diastolic blood pressure. Caffeine did not affect primary visual cortex activation. These results are the first to demonstrate potential neural correlates of the anxiogenic effect of caffeine, and they implicate the amygdala as a key site for caffeine tolerance. PMID:21972425

  7. Storm in a coffee cup: caffeine modifies brain activation to social signals of threat

    PubMed Central

    Lawrence, Andrew D.; Diukova, Ana; Wise, Richard G.; Rogers, Peter J.

    2012-01-01

    Caffeine, an adenosine A1 and A2A receptor antagonist, is the most popular psychostimulant drug in the world, but it is also anxiogenic. The neural correlates of caffeine-induced anxiety are currently unknown. This study investigated the effects of caffeine on brain regions implicated in social threat processing and anxiety. Participants were 14 healthy male non/infrequent caffeine consumers. In a double-blind placebo-controlled crossover design, they underwent blood oxygenation level-dependent functional magnetic resonance imaging (fMRI) while performing an emotional face processing task 1 h after receiving caffeine (250 mg) or placebo in two fMRI sessions (counterbalanced, 1-week washout). They rated anxiety and mental alertness, and their blood pressure was measured, before and 2 h after treatment. Results showed that caffeine induced threat-related (angry/fearful faces > happy faces) midbrain-periaqueductal gray activation and abolished threat-related medial prefrontal cortex wall activation. Effects of caffeine on extent of threat-related amygdala activation correlated negatively with level of dietary caffeine intake. In concurrence with these changes in threat-related brain activation, caffeine increased self-rated anxiety and diastolic blood pressure. Caffeine did not affect primary visual cortex activation. These results are the first to demonstrate potential neural correlates of the anxiogenic effect of caffeine, and they implicate the amygdala as a key site for caffeine tolerance. PMID:21972425

  8. Status and threats analysis for the Florida manatee (Trichechus manatus latirostris), 2012

    USGS Publications Warehouse

    Runge, Michael C.; Langtimm, Catherine A.; Martin, Julien; Fonnesbeck, Christopher J.

    2015-01-01

    The endangered West Indian manatee (Trichechus manatus), especially the Florida subspecies (T. m. latirostris), has been the focus of conservation efforts and extensive research since its listing under the Endangered Species Act. On the basis of the best information available as of December 2012, the threats facing the Florida manatee were determined to be less severe than previously thought, either because the conservation efforts have been successful, or because our knowledge of the demographic effects of those threats is increased, or both. Using the manatee Core Biological Model, we estimated the probability of the Florida manatee population on either the Atlantic or Gulf coast falling below 500 adults in the next 150 years to be 0.92 percent. The primary threats remain watercraft-related mortality and long-term loss of warm-water habitat. Since 2009, however, there have been a number of unusual events that have not yet been incorporated into this analysis, including several severely cold winters, a severe red-tide die off, and substantial loss of seagrass habitat in Brevard County, Fla. Further, the version of the Core Biological Model used in 2012 makes a number of assumptions that are under investigation. A revision of the Core Biological Model and an update of this quantitative threats analysis are underway as of 2015.

  9. A Lesson Not to Be Learned? Understanding Stereotype Threat Does Not Protect Women from Stereotype Threat

    ERIC Educational Resources Information Center

    Tomasetto, Carlo; Appoloni, Sara

    2013-01-01

    This research examines whether reading a text presenting scientific evidence concerning the phenomenon of stereotype threat improves or disrupts women's performance in a subsequent math task. In two experimental conditions participants (N=118 ) read a text summarizing an experiment in which stereotypes, and not biological differences, were shown…

  10. Bioterrorism as a public health threat.

    PubMed Central

    Henderson, D. A.

    1998-01-01

    The threat of bioterrorism, long ignored and denied, has heightened over the past few years. Recent events in Iraq, Japan, and Russia cast an ominous shadow. Two candidate agents are of special concern--smallpox and anthrax. The magnitude of the problems and the gravity of the scenarios associated with release of these organisms have been vividly portrayed by two epidemics of smallpox in Europe during the 1970s and by an accidental release of aerosolized anthrax from a Russian bioweapons facility in 1979. Efforts in the United States to deal with possible incidents involving bioweapons in the civilian sector have only recently begun and have made only limited progress. Only with substantial additional resources at the federal, state, and local levels can a credible and meaningful response be mounted. For longer-term solutions, the medical community must educate both the public and policy makers about bioterrorism and build a global consensus condemning its use. PMID:9716981

  11. Females that experience threat are better teachers

    PubMed Central

    Kleindorfer, Sonia; Evans, Christine; Colombelli-Négrel, Diane

    2014-01-01

    Superb fairy-wren (Malurus cyaneus) females use an incubation call to teach their embryos a vocal password to solicit parental feeding care after hatching. We previously showed that high call rate by the female was correlated with high call similarity in fairy-wren chicks, but not in cuckoo chicks, and that parent birds more often fed chicks with high call similarity. Hosts should be selected to increase their defence behaviour when the risk of brood parasitism is highest, such as when cuckoos are present in the area. Therefore, we experimentally test whether hosts increase call rate to embryos in the presence of a singing Horsfield's bronze-cuckoo (Chalcites basalis). Female fairy-wrens increased incubation call rate when we experimentally broadcast cuckoo song near the nest. Embryos had higher call similarity when females had higher incubation call rate. We interpret the findings of increased call rate as increased teaching effort in response to a signal of threat. PMID:24806422

  12. Females that experience threat are better teachers.

    PubMed

    Kleindorfer, Sonia; Evans, Christine; Colombelli-Négrel, Diane

    2014-05-01

    Superb fairy-wren (Malurus cyaneus) females use an incubation call to teach their embryos a vocal password to solicit parental feeding care after hatching. We previously showed that high call rate by the female was correlated with high call similarity in fairy-wren chicks, but not in cuckoo chicks, and that parent birds more often fed chicks with high call similarity. Hosts should be selected to increase their defence behaviour when the risk of brood parasitism is highest, such as when cuckoos are present in the area. Therefore, we experimentally test whether hosts increase call rate to embryos in the presence of a singing Horsfield's bronze-cuckoo (Chalcites basalis). Female fairy-wrens increased incubation call rate when we experimentally broadcast cuckoo song near the nest. Embryos had higher call similarity when females had higher incubation call rate. We interpret the findings of increased call rate as increased teaching effort in response to a signal of threat. PMID:24806422

  13. Radioactive Waste Management Basis

    SciTech Connect

    Perkins, B K

    2009-06-03

    The purpose of this Radioactive Waste Management Basis is to describe the systematic approach for planning, executing, and evaluating the management of radioactive waste at LLNL. The implementation of this document will ensure that waste management activities at LLNL are conducted in compliance with the requirements of DOE Order 435.1, Radioactive Waste Management, and the Implementation Guide for DOE Manual 435.1-1, Radioactive Waste Management Manual. Technical justification is provided where methods for meeting the requirements of DOE Order 435.1 deviate from the DOE Manual 435.1-1 and Implementation Guide.

  14. When threats foreign turn domestic: Two ways for distant realistic intergroup threats to carry over into local intolerance.

    PubMed

    Bouman, Thijs; van Zomeren, Martijn; Otten, Sabine

    2015-09-01

    In times of economic downturn, perceived realistic intergroup threats (e.g., labour competition) often dominate political and media discourse. Although local outgroups (e.g., local immigrants) can be experienced as sources of realistic threats, we propose that such threats can also be perceived to be caused by distant outgroups (e.g., European Union members perceiving Greece to threaten their economies) and that such distant threats can carry over into local intolerance (e.g., increasing intolerance towards local immigrant groups). We predicted and found in two studies that perceived distant realistic threats carried over into local intolerance via two different pathways. First, direct reactions towards the distant outgroup can generalize to culturally similar local outgroups (the group-based association pathway). Secondly, Study 2 indicated that when the distant threat was attributed to stereotypical outgroup traits (e.g., being lazy), distant realistic threats activated local realistic threats, which subsequently influenced local intolerance (the threat-based association pathway). Taken together, our studies indicate that perceived realistic threats foreign can turn domestic, but in two different ways. PMID:25491910

  15. Terror threat perception and its consequences in contemporary Britain.

    PubMed

    Goodwin, Robin; Willson, Michelle; Gaines, Stanley

    2005-11-01

    The terrorist attacks of 9/11, and subsequent terrorist acts around the world, have alerted social psychologists to the need to examine the antecedents and consequences of terrorist threat perception. In these two studies, we examined the predictive power of demographic factors (age, gender, location), individual values and normative influences on threat perception and the consequences of this perception for behavioural change and close relationships. In Study 1 (N = 100), gender, benevolence values and normative influences were all correlates of threat perception, whilst sense of personal threat was correlated with increased contact with friends and family. In Study 2 (N = 240) age, gender, location, and the values of openness to change and hedonism, all predicted threat perception, which, in turn, predicted behavioural change and relationship contact. Such findings point to the important role social psychologists should play in understanding responses to these new terrorist threats. PMID:16248932

  16. An Overview of Non-traditional Nuclear Threats

    SciTech Connect

    Geelhood, Bruce D.; Wogman, Ned A.

    2005-01-01

    In view of the terrorist threats to the United States, the country needs to consider new vectors and weapons related to nuclear and radiological threats against our homeland. The traditional threat vectors, missiles and bombers, have expanded to include threats arriving through the flow of commerce. The new commerce-related vectors include: sea cargo, truck cargo, rail cargo, and passenger transport. The types of weapons have also expanded beyond nuclear warheads to include radiation dispersal devices (RDD) or ''dirty'' bombs. The consequences of these nuclear and radiological threats are considered. The defense against undesirable materials entering our borders is considered. The radiation and other signatures or potential nuclear and radiological threats are examined along with potential sensors to discover undesirable items in the flow of commerce. Techniques to improve detection are considered. A strategy of primary and secondary screening is proposed to rapidly clear most cargo and carefully examine suspect cargo.

  17. Ignoring real faces: effects of valence, threat, and salience.

    PubMed

    Blagrove, Elisabeth; Watson, Derrick G

    2014-04-01

    Facial stimuli have been shown to accrue a special status within visual processing, particularly when attention is prioritized to one face over another on the basis of affective content. This has been examined in relation to the ability of faces to guide or hold attention, or to resist attentional suppression. Previous work has shown that schematic faces can only be partially ignored and that the emotional valence of to-be-ignored faces has little effect. Given recent debates concerning the use of schematic faces, here we examined the ease with which photorealistic faces could be ignored. Although we found evidence of a partial preview benefit for these stimuli, the findings were complex, with stimulus salience, valence, and threat content interacting to affect both the strength of the benefit and target detection efficiency (Exps. 1-3). Experiment 4 then clarified the effects of physical salience and perceived stimulus similarity in the previous experiments, demonstrating that a combination of these factors is likely to account for the search patterns observed. PMID:24435898

  18. A Triclade DNA Vaccine Designed on the Basis of a Comprehensive Serologic Study Elicits Neutralizing Antibody Responses against All Clades and Subclades of Highly Pathogenic Avian Influenza H5N1 Viruses

    PubMed Central

    Zhou, Fan; Wang, Guiqin; Buchy, Philippe; Cai, Zhipeng; Chen, Honglin; Chen, Zhiwei; Cheng, Genhong; Wan, Xiu-Feng; Deubel, Vincent

    2012-01-01

    Because of their rapid evolution, genetic diversity, broad host range, ongoing circulation in birds, and potential human-to-human transmission, H5N1 influenza viruses remain a major global health concern. Their high degree of genetic diversity also poses enormous burdens and uncertainties in developing effective vaccines. To overcome this, we took a new approach, i.e., the development of immunogens based on a comprehensive serologic study. We constructed DNA plasmids encoding codon-optimized hemagglutinin (HA) from 17 representative strains covering all reported clades and subclades of highly pathogenic avian influenza H5N1 viruses. Using DNA plasmids, we generated the corresponding H5N1 pseudotypes and immune sera. We performed an across-the-board pseudotype-based neutralization assay and determined antigenic clusters by cartography. We then designed a triclade DNA vaccine and evaluated its immunogenicity and protection in mice. We report here that (sub)clades 0, 1, 3, 4, 5, 6, 7.1, and 9 were grouped into antigenic cluster 1, (sub)clades 2.1.3.2, 2.3.4, 2.4, 2.5, and 8 were grouped into another antigenic cluster, with subclade 2.2.1 loosely connected to it, and each of subclades 2.3.2.1 and 7.2 was by itself. Importantly, the triclade DNA vaccine encoding HAs of (sub)clades 0, 2.3.2.1, and 7.2 elicited broadly neutralizing antibody responses against all H5 clades and subclades and protected mice against high-lethal-dose heterologous H5N1 challenge. Thus, we conclude that broadly neutralizing antibodies against all H5 clades and subclades can indeed be elicited with immunogens on the basis of a comprehensive serologic study. Further evaluation and optimization of such an approach in ferrets and in humans is warranted. PMID:22496212

  19. A triclade DNA vaccine designed on the basis of a comprehensive serologic study elicits neutralizing antibody responses against all clades and subclades of highly pathogenic avian influenza H5N1 viruses.

    PubMed

    Zhou, Fan; Wang, Guiqin; Buchy, Philippe; Cai, Zhipeng; Chen, Honglin; Chen, Zhiwei; Cheng, Genhong; Wan, Xiu-Feng; Deubel, Vincent; Zhou, Paul

    2012-06-01

    Because of their rapid evolution, genetic diversity, broad host range, ongoing circulation in birds, and potential human-to-human transmission, H5N1 influenza viruses remain a major global health concern. Their high degree of genetic diversity also poses enormous burdens and uncertainties in developing effective vaccines. To overcome this, we took a new approach, i.e., the development of immunogens based on a comprehensive serologic study. We constructed DNA plasmids encoding codon-optimized hemagglutinin (HA) from 17 representative strains covering all reported clades and subclades of highly pathogenic avian influenza H5N1 viruses. Using DNA plasmids, we generated the corresponding H5N1 pseudotypes and immune sera. We performed an across-the-board pseudotype-based neutralization assay and determined antigenic clusters by cartography. We then designed a triclade DNA vaccine and evaluated its immunogenicity and protection in mice. We report here that (sub)clades 0, 1, 3, 4, 5, 6, 7.1, and 9 were grouped into antigenic cluster 1, (sub)clades 2.1.3.2, 2.3.4, 2.4, 2.5, and 8 were grouped into another antigenic cluster, with subclade 2.2.1 loosely connected to it, and each of subclades 2.3.2.1 and 7.2 was by itself. Importantly, the triclade DNA vaccine encoding HAs of (sub)clades 0, 2.3.2.1, and 7.2 elicited broadly neutralizing antibody responses against all H5 clades and subclades and protected mice against high-lethal-dose heterologous H5N1 challenge. Thus, we conclude that broadly neutralizing antibodies against all H5 clades and subclades can indeed be elicited with immunogens on the basis of a comprehensive serologic study. Further evaluation and optimization of such an approach in ferrets and in humans is warranted. PMID:22496212

  20. A meta-analysis of threats to valid clinical inference in preclinical research of sunitinib

    PubMed Central

    Henderson, Valerie C; Demko, Nadine; Hakala, Amanda; MacKinnon, Nathalie; Federico, Carole A; Fergusson, Dean; Kimmelman, Jonathan

    2015-01-01

    Poor study methodology leads to biased measurement of treatment effects in preclinical research. We used available sunitinib preclinical studies to evaluate relationships between study design and experimental tumor volume effect sizes. We identified published animal efficacy experiments where sunitinib monotherapy was tested for effects on tumor volume. Effect sizes were extracted alongside experimental design elements addressing threats to valid clinical inference. Reported use of practices to address internal validity threats was limited, with no experiments using blinded outcome assessment. Most malignancies were tested in one model only, raising concerns about external validity. We calculate a 45% overestimate of effect size across all malignancies due to potential publication bias. Pooled effect sizes for specific malignancies did not show apparent relationships with effect sizes in clinical trials, and we were unable to detect dose–response relationships. Design and reporting standards represent an opportunity for improving clinical inference. DOI: http://dx.doi.org/10.7554/eLife.08351.001 PMID:26460544