Science.gov

Sample records for weaknesses threats strengths

  1. Big Data and Health Economics: Strengths, Weaknesses, Opportunities and Threats.

    PubMed

    Collins, Brendan

    2016-02-01

    'Big data' is the collective name for the increasing capacity of information systems to collect and store large volumes of data, which are often unstructured and time stamped, and to analyse these data by using regression and other statistical techniques. This is a review of the potential applications of big data and health economics, using a SWOT (strengths, weaknesses, opportunities, threats) approach. In health economics, large pseudonymized databases, such as the planned care.data programme in the UK, have the potential to increase understanding of how drugs work in the real world, taking into account adherence, co-morbidities, interactions and side effects. This 'real-world evidence' has applications in individualized medicine. More routine and larger-scale cost and outcomes data collection will make health economic analyses more disease specific and population specific but may require new skill sets. There is potential for biomonitoring and lifestyle data to inform health economic analyses and public health policy. PMID:26093888

  2. Strengths Weaknesses Opportunities and Threats of Blended Learning: Students’ Perceptions

    PubMed Central

    Hande, S

    2014-01-01

    Background: Blended learning (BL) in a cell biology course of the premedical program at the Kasturba Medical College International Centre, Manipal, India, commenced in 2006. The program provides training in basic sciences to students, especially from the United States and Canada. The approach to the study was phenomenographic, with a qualitative study design using an open-ended questionnaire, focused interviews and empirical observations. Aim: The aim of this study was to identify the strengths, weaknesses, opportunities and threats (SWOT) of BL in a premedical class. Subjects and Methods: It was a cross-sectional study. Ninety six students in a premedical cell biology class participated in the study. SWOT analysis of students’ perceptions was conducted manually. Statistical analysis included content analysis of qualitative data to classify data and aligning them into the SWOT analysis matrix. Results: The outcomes of the study revealed student perceptions in terms of SWOT of BL and the potential uses of this strategy. Conclusions: The study provides background for educators and curriculum experts to plan their modules while incorporating a BL approach. PMID:24971204

  3. Health Education in India: A Strengths, Weaknesses, Opportunities, and Threats (SWOT) Analysis

    ERIC Educational Resources Information Center

    Sharma, Manoj

    2005-01-01

    The purpose of this study was to conduct a strengths, weaknesses, opportunities, and threats (SWOT) analysis of the health education profession and discipline in India. Materials from CINAHL, ERIC, MEDLINE, and Internet were collected to conduct the open coding of the SWOT analysis. Strengths of health education in India include an elaborate…

  4. Role of editors and journals in detecting and preventing scientific misconduct: strengths, weaknesses, opportunities, and threats.

    PubMed

    Marusic, Ana; Katavic, Vedran; Marusic, Matko

    2007-09-01

    Scientific journals have a central place in protecting research integrity because published articles are the most visible documentation of research. We used SWOT analysis to audit (S)trengths and (W)eaknesses as internal and (O)pportunities and (T)hreats as external factors affecting journals' responsibility in addressing research integrity issues. Strengths include editorial independence, authority and expertise, power to formulate editorial policies, and responsibility for the integrity of published records. Weaknesses stem from having no mandate for legal action, reluctance to get involved, and lack of training. Opportunities for editors are new technologies for detecting misconduct, policies by editorial organization or national institutions, and greater transparency of published research. Editors face threats from the lack of legal regulation and culture of research integrity in academic communities, lack of support from stakeholders in scientific publishing, and different pressures. Journal editors cannot be the policing force of the scientific community but they should actively ensure the integrity of the scientific record. PMID:17970252

  5. Partitioning in aqueous two-phase systems: Analysis of strengths, weaknesses, opportunities and threats.

    PubMed

    Soares, Ruben R G; Azevedo, Ana M; Van Alstine, James M; Aires-Barros, M Raquel

    2015-08-01

    For half a century aqueous two-phase systems (ATPSs) have been applied for the extraction and purification of biomolecules. In spite of their simplicity, selectivity, and relatively low cost they have not been significantly employed for industrial scale bioprocessing. Recently their ability to be readily scaled and interface easily in single-use, flexible biomanufacturing has led to industrial re-evaluation of ATPSs. The purpose of this review is to perform a SWOT analysis that includes a discussion of: (i) strengths of ATPS partitioning as an effective and simple platform for biomolecule purification; (ii) weaknesses of ATPS partitioning in regard to intrinsic problems and possible solutions; (iii) opportunities related to biotechnological challenges that ATPS partitioning may solve; and (iv) threats related to alternative techniques that may compete with ATPS in performance, economic benefits, scale up and reliability. This approach provides insight into the current status of ATPS as a bioprocessing technique and it can be concluded that most of the perceived weakness towards industrial implementation have now been largely overcome, thus paving the way for opportunities in fermentation feed clarification, integration in multi-stage operations and in single-step purification processes. PMID:26213222

  6. The voluntary community health movement in India: a strengths, weaknesses, opportunities, and threats (SWOT) analysis.

    PubMed

    Sharma, M; Bhatia, G

    1996-12-01

    There has been a prolific growth of voluntary organizations in India since independence in 1947. One of the major areas of this growth has been in the field of community health. The purpose of this article is to historically trace the voluntary movement in community health in India, analyze the current status, and predict future trends of voluntary efforts. A review of the literature in the form of a Strengths, Weaknesses, Opportunities, and Threats (SWOT) analysis was the method of this study. Some of the key trends which emerged as the priority areas for progress and for strengthening voluntary organizations in the future were enhancing linkages between health and development; building upon collective force; greater utilization of participatory training; establishing egalitarian and effectual linkages for decision making at the international level; developing self-reliant community-based models; and the need for attaining holistic empowerment at individual, organizational, and community levels through "duty consciousness" as opposed to merely asking for rights. PMID:8912121

  7. Analysis of Strengths, Weaknesses, Opportunities, and Threats as a Tool for Translating Evidence into Individualized Medical Strategies (I-SWOT)

    PubMed Central

    von Kodolitsch, Yskert; Bernhardt, Alexander M.; Robinson, Peter N.; Kölbel, Tilo; Reichenspurner, Hermann; Debus, Sebastian; Detter, Christian

    2015-01-01

    Background It is the physicians’ task to translate evidence and guidelines into medical strategies for individual patients. Until today, however, there is no formal tool that is instrumental to perform this translation. Methods We introduce the analysis of strengths (S) and weaknesses (W) related to therapy with opportunities (O) and threats (T) related to individual patients as a tool to establish an individualized (I) medical strategy (I-SWOT). The I-SWOT matrix identifies four fundamental types of strategy. These comprise “SO” maximizing strengths and opportunities, “WT” minimizing weaknesses and threats, “WO” minimizing weaknesses and maximizing opportunities, and “ST” maximizing strengths and minimizing threats. Each distinct type of strategy may be considered for individualized medical strategies. Results We describe four steps of I-SWOT to establish an individualized medical strategy to treat aortic disease. In the first step, we define the goal of therapy and identify all evidence-based therapeutic options. In a second step, we assess strengths and weaknesses of each therapeutic option in a SW matrix form. In a third step, we assess opportunities and threats related to the individual patient, and in a final step, we use the I-SWOT matrix to establish an individualized medical strategy through matching “SW” with “OT”. As an example we present two 30-year-old patients with Marfan syndrome with identical medical history and aortic pathology. As a result of I-SWOT analysis of their individual opportunities and threats, we identified two distinct medical strategies in these patients. Conclusion I-SWOT is a formal but easy to use tool to translate medical evidence into individualized medical strategies. PMID:27069939

  8. Strengths, weaknesses, opportunities and threats of the pig health monitoring systems used in England.

    PubMed

    Stärk, K D C; Nevel, A

    2009-10-17

    Several systems are being used in England to record information about the health of pigs. The British Pig Health Scheme (BPHS), the National Animal Disease Information System (NADIS), the Zoonoses Action Plan (ZAP) for Salmonella and the Veterinary Investigation Diagnosis Analysis (VIDA) system have been assessed to make recommendations for their future separate or joint development. The structure, organisation, processes, data quality, dissemination, utilisation and acceptance of each system have been assessed. Information was extracted from documents and websites, and informal interviews were conducted with technical experts and stakeholders. The systems covered a broad range of objectives, used variable approaches and operated at very different scales and budgets. There was a high level of awareness and involvement by the industry. Common weaknesses of the systems were the lack of in-depth quantitative analysis of the data, the lack of assessment of each system's impact, and the unknown level of bias as a result of the voluntary or selective participation in them. PMID:19850852

  9. Special Education and Rehabilitation in Georgia: Strengths, Weakness, Opportunities, and Threats in a Newly-Independent State of the Former Soviet Union.

    ERIC Educational Resources Information Center

    Hobbs, Tim; Szydlowski, Steven; West, Daniel, Jr.; Germava, Otar

    2002-01-01

    Forty-nine Georgian professionals from the fields of health, education, and rehabilitation were brought together for a week-long workshop to discuss issues related to disability, rehabilitation, and special education. Workshop activities included a SWOT (strengths, weaknesses, opportunities, and threats) analysis of special education in Georgia.…

  10. An Examination of the Strengths, Weaknesses, Opportunities, and Threats Associated with the Adoption of Moodle[TM] by eXtension

    ERIC Educational Resources Information Center

    Hightower, Tayla Elise; Murphrey, Theresa Pesl; Coppernoll, Susanna Mumm; Jahedkar, Jennifer; Dooley, Kim E.

    2011-01-01

    The use of technology to deliver programming across Extension has been addressed widely; however, little research has been conducted concerning the use of Moodle[TM] as a course management system for Extension. The purpose of the study reported here was to identify the strengths, weaknesses, opportunities, and threats associated with the use of…

  11. Perceived Strengths, Weaknesses, Opportunities, and Threats Impacting the Diffusion of Distance Education Technologies in a College of Agriculture and Life Sciences.

    ERIC Educational Resources Information Center

    Murphrey, Theresa Pesl; Dooley, Kim E.

    2000-01-01

    Interviews with administrators, faculty, and support staff (n=42) in a university agriculture department revealed that they recognized distance technology as a means of reaching new audiences; policies and procedures must expand to address technology issues; competition, external dependence, and Internet misinformation were threats.…

  12. Crossing Institutional Boundaries: Writing Strengths and Weaknesses.

    ERIC Educational Resources Information Center

    Lumpkins, Julie

    At any level, good writing requires an acknowledgment of writing strengths and weaknesses by both student and instructor. The four project collaborators/writing teachers outlined six specific areas on a teacher feedback sheet to note students' writing strengths and weaknesses; the areas of purpose, audience, thesis, development, organization, and…

  13. Weakness

    MedlinePlus

    Lack of strength; Muscle weakness ... feel weak but have no real loss of strength. This is called subjective weakness. It may be ... flu. Or, you may have a loss of strength that can be noted on a physical exam. ...

  14. Cultural Capital: Strengths, Weaknesses and Two Advancements

    ERIC Educational Resources Information Center

    van de Werfhorst, Herman G.

    2010-01-01

    In this paper I discuss two weaknesses in Bourdieu's work on cultural capital, both of which are related to his integration of the multidimensional nature of social space in different domains of life: social mobility, lifestyle differentiation, and political orientation. First, there is an anomaly between the work on social mobility and on…

  15. The Hidden Strengths of Weak Theories

    PubMed Central

    Keil, Frank

    2012-01-01

    There has been a strong tradition of assuming that concepts, and their patterns of formation might be best understood in terms of how they are embedded in theory-like sets of beliefs. Although such views of concepts as embedded in theories have been criticized on five distinct grounds, there are reasonable responses to each of these usual objections. There is, however, a newly emerging concern that is much more challenging to address – people’s intuitive theories seem to be remarkably impoverished. In fact, they are so impoverished it is difficult to see how they could provide the necessary structure to explain differences between concepts and how they might form in development. One response to this recent challenge is to abandon all views of concept structure as being related to people’s intuitive theories and see concepts as essentially structure-free atoms. The alternative proposed here argues that our very weak theories might in fact do a great deal of work in explaining how we form concepts and are able to use them to successfully refer. PMID:25309684

  16. School-Based Sexuality Education in Portugal: Strengths and Weaknesses

    ERIC Educational Resources Information Center

    Rocha, Ana Cristina; Leal, Cláudia; Duarte, Cidália

    2016-01-01

    Portugal, like many other countries, faces obstacles regarding school-based sexuality education. This paper explores Portuguese schools' approaches to implementing sexuality education at a local level, and provides a critical analysis of potential strengths and weaknesses. Documents related to sexuality education in a convenience sample of 89…

  17. Radiochemistry in the twenty-first century: Strenghts, weaknesses, opportunities and threats

    NASA Astrophysics Data System (ADS)

    de Goeij, J. J. M.

    2003-01-01

    Strengths, weaknesses, opportunities and threats of radiochemistry and associated nuclear chemistry are discussed. For that purpose radiochemistry is subdivided into three categories. The first category covers fundamental aspects, e.g. nuclear reaction cross-sections, production routes with associated yields and radionuclidic impurities, decay schemes, radiochemical separations, recoil and hot-atom chemistry, isotope effects and fractionation, and interaction of radiation with matter and detection. The second category covers topics where radioactivity is inextricably involved, e.g. the nuclear fuel cycle, very heavy elements and other actinides, primordial and cosmogenic radioactivity, and radionuclide techniques for dating. The third category involves radioactivity as essential part of a technique. On one hand radioactivity is used here as source of ionising radiation for food conservation, polymerisation of plastics, sterilisation, radiotherapy and pain palliation. On the other hand it is used to get information on systems and materials, via radiotracer methods and nuclear activation techniques. In particular the latter field is experiencing strong competition with other, non-nuclear methods. In this frame it is indicated what is required to achieve a situation where nuclear analytical techniques may successfully be exploited to the full extent of their potentials, particularly in providing valuable and sometimes unique information.

  18. Strength trapped within weakness/ weakness trapped within strength: the influence of family of origin experiences on the lives of abused women.

    PubMed

    Buchbinder, Eli; Birnbaum, Liora

    2010-06-01

    By conceptualizing abused women as victims or survivors, the literature offers two contradictory narratives of abused women. The aim of this article is to show that these two narratives are not mutually exclusive but rather can be used simultaneously to represent battered women's existential experiences. The study sample was comprised of 20 Israeli battered women. Three in-depth interviews were conducted with each participant-twice for data collection purposes and once for validating the themes that emerged from the content analysis. "Strength trapped in weakness/weakness trapped in strength" was found to be a dominant theme in the life narratives of the interviewees. Most interviewees grew up in families of origin in distress; most were abused physically and emotionally. Although this anguish colored their lives with pain and turmoil, their experiences were the key to their ability to overcome difficulties. From the onset, interviewees' lives were marked by a sense of threat and deprivation, but these very difficulties were also the source of a sense of power that emerged from the women's struggle with their past. In their attempts to cope with and transcend the legacies of their past, interviewees' feelings oscillated continuously between past and present, creating a unique powerful sense of simultaneously being victims and survivors. Implications for intervention are suggested. PMID:20445077

  19. [Management models in clinical nutrition: weaknesses and strengths].

    PubMed

    García de Lorenzo, A; Alvarez, J; Burgos, R; Cabrerizo, L; Farrer, K; García Almeida, J M; García Luna, P P; García Peris, P; Llano, J Del; Planas, M; Piñeiro, G

    2009-01-01

    At the 6th Abbott-SENPE Debate Forum a multidisciplinary and multiprofessional discussion was established in order to seek for the model or the models of clinical management most appropriate for Clinical Nutrition and Dietetics Units (CNAD) in Spain. The weaknesses and strengths as well as opportunities for the current systems were assessed concluding that a certain degree of disparity was observed not only due to regional differences but also to different hospital types. It was proposed, from SENPE, the creation of a working group helping to standardize the models and promote the culture of Integral Control and Change Management. PMID:19593481

  20. Committee Effectiveness in Higher Education: The Strengths and Weaknesses of Group Decision Making

    ERIC Educational Resources Information Center

    Bates, Stephen B.

    2014-01-01

    Focusing on five models of committee effectiveness for purposes of this assessment will lend insight into the strengths and weaknesses of utilizing a structured action plan as a guide to achieving and maintaining optimum committee effectiveness in higher education. In the compilation of the strengths and weaknesses of committee decision making,…

  1. Strengths and Weaknesses of NESTs and NNESTs: Perceptions of NNESTs in Hong Kong

    ERIC Educational Resources Information Center

    Ma, Lai Ping Florence

    2012-01-01

    Since non-native English speaking teachers (NNESTs) are always compared with native English speaking teachers (NESTs) on linguistic grounds, their strengths and weaknesses as English teachers are worthy of investigation. This paper reports on a mixed methods study which examines the strengths and weaknesses of NNESTs and NESTs through the…

  2. Judges Cite Current Trends, Comment on Strengths and Weaknesses.

    ERIC Educational Resources Information Center

    Smith, Helen F.

    1995-01-01

    Features opinions of newspaper and yearbook judges as to the state of student publications. Cites as strengths: graphic devices, more pull-out quotes, more double-page spreads with dominant elements, and overall improvement in the quality of magazines. Cites as trends: overdoing opinion at the expense of research, and too many stories that are…

  3. Objective Evaluation of Muscle Strength in Infants with Hypotonia and Muscle Weakness

    ERIC Educational Resources Information Center

    Reus, Linda; van Vlimmeren, Leo A.; Staal, J. Bart; Janssen, Anjo J. W. M.; Otten, Barto J.; Pelzer, Ben J.; Nijhuis-van der Sanden, Maria W. G.

    2013-01-01

    The clinical evaluation of an infant with motor delay, muscle weakness, and/or hypotonia would improve considerably if muscle strength could be measured objectively and normal reference values were available. The authors developed a method to measure muscle strength in infants and tested 81 typically developing infants, 6-36 months of age, and 17…

  4. Models of Viscosity: Strengths, Weaknesses and the Challenges

    NASA Astrophysics Data System (ADS)

    Russell, K.; Giordano, D.; Dingwell, D. B.

    2007-12-01

    properties, and to work over a wider range of melt conditions (composition and temperature). Other models fail because they use a non-Arrhenian formulation, or they are calibrated for an extremely small range of melt conditions, or they predict unphysical values of viscosity in the limits, or they are over-parameterized and cannot be extrapolated beyond the original calibration dataset. Our model predicts, within inter-laboratory experimental error, viscosity and other melt properties (i.e., Tg amd m) for most of the T-X space found in natural silicate melts. Despite its strengths, there is room for improvement. Firstly, our model incorporates the effects of H2O and F, but does not account for other important volatiles, including CO2, S, Cl. Secondly, Fe is treated as a single species whereas melts contain variable proportions of ferric and ferrous iron. Thirdly, we do not model pressure effects on melt viscosity which is needed for modeling melt transport within the lithosphere. Lastly, our model is strictly empirical, in that, the components we have chosen have no explicit or independent relationship to the structure or speciation of the silicate melt. Future models may benefit from the use of a component basis that reflects melt speciation. Giordano, D. Russell, J.K. & Dingwell, D.B. (In Review, July 07) Viscosity of magmatic liquids: A model. EPSL

  5. In the students' own words: what are the strengths and weaknesses of the dental school curriculum?

    PubMed

    Henzi, David; Davis, Elaine; Jasinevicius, Roma; Hendricson, William

    2007-05-01

    Dental students have little input into the selection of course topics and subject matter included in their dental curricula. Curriculum requirements are framed by the Commission on Dental Accreditation, which has stipulated competencies and associated biomedical and clinical knowledge that must be addressed during dental school. Although these competency requirements restrict the variance of educational experiences, students are eager to share their views on the curriculum within the realm of their educational experience. The objective of this research project was to elicit the perspectives of dental students from a broad cross-section of U.S. and Canadian dental schools about their education. A total of 605 students (285 sophomores, 220 seniors, 100 residents) from twenty North American dental schools completed a SWOT (Strengths, Weaknesses, Opportunities, and Threats) analysis to communicate their perceptions of the curriculum. Students were also asked to provide their impressions of the overall quality of the educational program in an open-ended written format. The students' qualitative comments were then reviewed and categorized into key issues or themes. Resulting themes for each category of the Curriculum SWOT (C-SWOT) analysis were the following. Strengths: 1) clinical learning experience, and 2) opportunity to work with knowledgeable faculty. Weaknesses: 1) disorganized and inefficient clinical learning environment, 2) teaching and testing that focus on memorization, 3) poor quality instruction characterized by curricular disorganization, and 4) inconsistency among instructors during student evaluations. Opportunities: 1) develop strategies to provide students with more exposure to patients, especially early in the curriculum, and 2) opportunities to learn new technology/techniques. Threats: 1) cost of dental education, 2) students' concerns about faculty "brain drain," i.e., lack of sufficient numbers of dental faculty capable of providing high

  6. Strength and fatigue of zirconia-induced weak spots in optical fiber

    NASA Astrophysics Data System (ADS)

    Breuls, Anton H. E.; Svenson, T.

    1994-03-01

    The reliability of long lengths of fibers in optical cables is determined by the presence of weak spots which are infrequently produced by normal fiber production methods. It is important to investigate the influence on strength of fiber from different kinds of weak spots. The present study is confined to weak spots resulting from melted-in zirconia particles. Tensile testing of optical fiber, in which strength degrading particles of a roughly dual-size distribution have been introduced on purpose, was done At a wide range of stress rates. The Weibull plots of tensile strength of the fiber were compared with a theoretical distribution, based on a simple relation between particle size and fiber strength. In this way, failure modes could be identified and related to the size of particles. From the comparison it was concluded that the size of zirconia particles has no significant influence on the fatigue of fiber, within the applied stress rates. A significant retardment of the fatigue of weak spots was also observed at low stress rates.

  7. The Strengths and Weaknesses of Total Quality Management in Higher Education.

    ERIC Educational Resources Information Center

    Hazzard, Terry

    This paper defines Total Quality Management (TQM), discusses its origins, and identifies its strengths and weaknesses as they apply to higher education. The paper defines TQM as a philosophy of organizations that defines quality and improves organizational performance and administrative systems. The system originated from statistical quality…

  8. Profiles of Strengths and Weaknesses in Dyslexia and Other Learning Difficulties

    ERIC Educational Resources Information Center

    Everatt, John; Weeks, Sally; Brooks, Peter

    2008-01-01

    A total of 83 children with different special educational needs (SEN) assessments were contrasted with a control group (N = 40) without special needs on measures that aimed to identify potential areas of strengths as well as weaknesses in these SEN groups. Carefully selected groups of dyslexics, dyspraxics, children with specific language…

  9. Internationally Adopted Children in the Early School Years: Relative Strengths and Weaknesses in Language Abilities

    ERIC Educational Resources Information Center

    Glennen, Sharon

    2015-01-01

    Purpose: This study aimed to determine the relative strengths and weaknesses in language and verbal short-term memory abilities of school-age children who were adopted from Eastern Europe. Method: Children adopted between 1;0 and 4;11 (years;months) of age were assessed with the Clinical Evaluation of Language Fundamentals-Preschool, Second…

  10. Identifying Profiles of Reading Strengths and Weaknesses at the Secondary Level

    ERIC Educational Resources Information Center

    Trentman, Allison M. McCarthy

    2012-01-01

    The purpose of this study was to evaluate the feasibility and potential utility of reading profiles to identify common patterns of reading strengths and weaknesses among students in high school with deficit reading skills. A total of 55 students from three Midwestern high schools were administered a battery of assessments that targeted specific…

  11. Patterns of Cognitive Strengths and Weaknesses: Identification Rates, Agreement, and Validity for Learning Disabilities Identification

    ERIC Educational Resources Information Center

    Miciak, Jeremy; Fletcher, Jack M.; Stuebing, Karla K.; Vaughn, Sharon; Tolar, Tammy D.

    2014-01-01

    Few empirical investigations have evaluated learning disabilities (LD) identification methods based on a pattern of cognitive strengths and weaknesses (PSW). This study investigated the reliability and validity of two proposed PSW methods: the concordance/discordance method (C/DM) and cross battery assessment (XBA) method. Cognitive assessment…

  12. Building a Performance-Based Assessment System To Diagnose Strengths and Weaknesses in Reading Achievement.

    ERIC Educational Resources Information Center

    Hennings, Sara S.; Hughes, Kay E.

    This paper provides a brief description of the development of the Diagnostic Assessments of Reading with Trial Teaching Strategies (DARTTS) program by F. G. Roswell and J. S. Chall. It also describes the editorial and statistical procedures that were used to validate the program for determining students' strengths and weaknesses in important areas…

  13. The power of the mind: the cortex as a critical determinant of muscle strength/weakness.

    PubMed

    Clark, Brian C; Mahato, Niladri K; Nakazawa, Masato; Law, Timothy D; Thomas, James S

    2014-12-15

    We tested the hypothesis that the nervous system, and the cortex in particular, is a critical determinant of muscle strength/weakness and that a high level of corticospinal inhibition is an important neurophysiological factor regulating force generation. A group of healthy individuals underwent 4 wk of wrist-hand immobilization to induce weakness. Another group also underwent 4 wk of immobilization, but they also performed mental imagery of strong muscle contractions 5 days/wk. Mental imagery has been shown to activate several cortical areas that are involved with actual motor behaviors, including premotor and M1 regions. A control group, who underwent no interventions, also participated in this study. Before, immediately after, and 1 wk following immobilization, we measured wrist flexor strength, voluntary activation (VA), and the cortical silent period (SP; a measure that reflect corticospinal inhibition quantified via transcranial magnetic stimulation). Immobilization decreased strength 45.1 ± 5.0%, impaired VA 23.2 ± 5.8%, and prolonged the SP 13.5 ± 2.6%. Mental imagery training, however, attenuated the loss of strength and VA by ∼50% (23.8 ± 5.6% and 12.9 ± 3.2% reductions, respectively) and eliminated prolongation of the SP (4.8 ± 2.8% reduction). Significant associations were observed between the changes in muscle strength and VA (r = 0.56) and SP (r = -0.39). These findings suggest neurological mechanisms, most likely at the cortical level, contribute significantly to disuse-induced weakness, and that regular activation of the cortical regions via imagery attenuates weakness and VA by maintaining normal levels of inhibition. PMID:25274345

  14. Does Weak Turbulence Impact PMSEs' Strengths Closer To The Northern Pole?

    NASA Astrophysics Data System (ADS)

    Swarnalingam, N.; Hocking, W. K.; Janches, D.; Nicolls, M. J.

    2015-12-01

    Existing 51.0 MHz VHF radar at Eureka (80N, 86W) in northern Canada is located closer to both the northern magnetic and geomagnetic poles. A recent calibrated study of Polar Mesosphere Summer Echoes (PMSE) using this radar supports the previous results by other radars that the absolute signal strength of PMSE in this region is relatively weak compared with the radar observations located at high latitudes. Although very cold temperature and existence of charged ice particles are the most important ingredient required for PMSE to appear, several other factors could potentially influence the absolute signal strengths of these echoes. One of them is neutral air turbulence. Previous studies indicate that upper mesospheric turbulence's strength decreases with latitudes, especially in the very high latitudes [Becker, 2004; Lubken et. al., 2009]. In this study, we investigate long-term mesospheric turbulence strengths at Eureka and study how they could be associated with the weak PMSE signal strengths compared with other high latitude conditions, where PMSE are strong.

  15. Profiles of strengths and weaknesses in dyslexia and other learning difficulties.

    PubMed

    Everatt, John; Weeks, Sally; Brooks, Peter

    2008-02-01

    A total of 83 children with different special educational needs (SEN) assessments were contrasted with a control group (N = 40) without special needs on measures that aimed to identify potential areas of strengths as well as weaknesses in these SEN groups. Carefully selected groups of dyslexics, dyspraxics, children with specific language difficulties, moderate learning disabilities, attention deficits and emotional/behavioural disorders were assessed on measures of literacy, phonological and verbal skills, non-verbal ability, problem behaviour scales and cognitive interference. Scores indicated that individual measures were relatively poor at specifically differentiating one SEN group from the controls and that all SEN groups presented evidence of literacy deficits despite potentially different causes for such acquisition difficulties. For most of the six SEN groups targeted, assessments that considered strengths as well as weaknesses provided a profile that specifically differentiated the group from the controls in contrast to the other SEN groups tested. PMID:17659648

  16. Targeting cancer’s weaknesses (not its strengths): Therapeutic strategies suggested by the atavistic model

    PubMed Central

    Lineweaver, Charles H.; Davies, Paul C.W.; Vincent, Mark D.

    2014-01-01

    In the atavistic model of cancer progression, tumor cell dedifferentiation is interpreted as a reversion to phylogenetically earlier capabilities. The more recently evolved capabilities are compromised first during cancer progression. This suggests a therapeutic strategy for targeting cancer: design challenges to cancer that can only be met by the recently evolved capabilities no longer functional in cancer cells. We describe several examples of this target-the-weakness strategy. Our most detailed example involves the immune system. The absence of adaptive immunity in immunosuppressed tumor environments is an irreversible weakness of cancer that can be exploited by creating a challenge that only the presence of adaptive immunity can meet. This leaves tumor cells more vulnerable than healthy tissue to pathogenic attack. Such a target-the-weakness therapeutic strategy has broad applications, and contrasts with current therapies that target the main strength of cancer: cell proliferation. PMID:25043755

  17. Strength of iron at core pressures and evidence for a weak Earth’s inner core

    SciTech Connect

    Gleason, A. E.; Mao, W. L.

    2013-05-12

    The strength of iron at extreme conditions is crucial information for interpreting geophysical observations of the Earth’s core and understanding how the solid inner core deforms. However, the strength of iron, on which deformation depends, is challenging to measure and accurately predict at high pressure. Here we present shear strength measurements of iron up to pressures experienced in the Earth’s core. Hydrostatic X-ray spectroscopy and non-hydrostatic radial X-ray diffraction measurements of the deviatoric strain in hexagonally close-packed iron uniquely determine its shear strength to pressures above 200 GPa at room temperature. Applying numerical modelling of the rheologic behaviour of iron under pressure, we extrapolate our experimental results to inner-core pressures and temperatures, and find that the bulk shear strength of hexagonally close-packed iron is only ~ 1 GPa at the conditions of the Earth’s centre, 364 GPa and 5,500 K. This suggests that the inner core is rheologically weak, which supports dislocation creep as the dominant creep mechanism influencing deformation.

  18. Can stereotype threat affect motor performance in the absence of explicit monitoring processes? Evidence using a strength task.

    PubMed

    Chalabaev, Aïna; Brisswalter, Jeanick; Radel, Rémi; Coombes, Stephen A; Easthope, Christopher; Clément-Guillotin, Corentin

    2013-04-01

    Previous evidence shows that stereotype threat impairs complex motor skills through increased conscious monitoring of task performance. Given that one-step motor skills may not be susceptible to these processes, we examined whether performance on a simple strength task may be reduced under stereotype threat. Forty females and males performed maximum voluntary contractions under stereotypical or nullified-stereotype conditions. Results showed that the velocity of force production within the first milliseconds of the contraction decreased in females when the negative stereotype was induced, whereas maximal force did not change. In males, the stereotype induction only increased maximal force. These findings suggest that stereotype threat may impair motor skills in the absence of explicit monitoring processes, by influencing the planning stage of force production. PMID:23535978

  19. Motivated Implicit Theories of Personality: My Weaknesses Will Go Away, but My Strengths Are Here to Stay.

    PubMed

    Steimer, Andreas; Mata, André

    2016-04-01

    Across six studies, this research found consistent evidence for motivated implicit theories about personality malleability: People perceive their weaknesses as more malleable than their strengths. Moreover, motivation also influences how people see themselves in the future, such that they expect their present strengths to remain constant, but they expect their present weaknesses to improve in the future. Several additional findings suggest the motivational nature of these effects: The difference in perceived malleability for strengths versus weaknesses was only observed for the self, not for other people. When the desirability of possessing a certain trait was manipulated, that trait was perceived to be more malleable when it was depicted as undesirable. And these different beliefs that people have about how malleable their traits are, and how they will develop in the future, were associated with their desire for change, which is higher for weaknesses versus strengths. PMID:26984009

  20. Early experience affects the strength of vigilance for threat in rhesus monkey infants

    PubMed Central

    Mandalaywala, Tara M.; Parker, Karen J.; Maestripieri, Dario

    2014-01-01

    Both human and nonhuman primates exhibit a cognitive bias to social threat, but little is known about how this bias develops. We investigated the development of threat bias in free-ranging infant rhesus macaques (Macaca mulatta) at 3 (N = 45) and 9 (N = 46) months of age. Three-month-old infant monkeys did not display bias, but 9-month-olds exhibited increased maintenance of attention to threatening social stimuli (vigilance for threat). To examine whether the social environment affected vigilance for threat, behavioral data on maternal rank and protectiveness were collected across the first 12 weeks of life for infants tested at 9 months. Nine-month-old infants of high-ranking mothers and more protective mothers displayed greater vigilance for threat than infants of lower-ranking and less protective mothers. These results demonstrate that infant social cognition is malleable and shaped by mothers both directly (protectiveness) and indirectly (rank), as maternal characteristics affect infants’ social experiences. PMID:25125426

  1. Pulse wave analysis and pulse wave velocity: a critical review of their strengths and weaknesses.

    PubMed

    Davies, Justine Ina; Struthers, Allan D

    2003-03-01

    The study of the pulse using the technique of applanation tonometry is undergoing a resurgence with the development of new computerized equipment. We aim here to present a critical review of the uses, potential uses, strengths and weaknesses of the technique of applanation tonometry for the assessment of augmentation index and pulse wave velocity. We will review the technique of applanation tonometry, the physiological factors affecting pulse wave velocity and pulse wave analysis, the changes in pulse wave velocity and pulse wave analysis with pharmacological interventions, and the use of the technique of applanation tonometry as a prognostic tool. We conclude that, although the technique of applanation tonometry initially seems promising, several pertinent issues need to be addressed before it can be used reliably as a clinical or research tool. Importantly, use of the technique of applanation tonometry to derive the central waveform from non-invasively acquired peripheral data needs to be validated prospectively. PMID:12640232

  2. Appreciating the Strengths and Weaknesses of Transthoracic Echocardiography in Hemodynamic Assessments

    PubMed Central

    Huang, Stephen J.; McLean, Anthony S.

    2012-01-01

    Transthoracic echocardiography (TTE) is becoming the choice of hemodynamic assessment tool in many intensive care units. With an ever increasing number of training programs available worldwide, learning the skills to perform TTE is no longer a limiting factor. Instead, the future emphasis will be shifted to teach the users how to recognize measurement errors and artefacts (internal validity), to realize the limitations of TTE in various applications, and finally how to apply the information to the patient in question (external validity). This paper aims to achieve these objectives in a common area of TTE application—hemodynamic assessments. We explore the strengths and weaknesses of TTE in such assessments in this paper. Various methods of hemodynamic assessments, such as cardiac output measurements, estimation of preload, and assessment of fluid responsiveness, will be discussed. PMID:22454777

  3. Strengths and weaknesses of Problem Based Learning from the professional perspective of registered nurses 1

    PubMed Central

    Cónsul-Giribet, María; Medina-Moya, José Luis

    2014-01-01

    OBJECTIVE: to identify competency strengths and weaknesses as perceived by nursing professionals who graduated with a integrated curriculum and competency-based through Problem Based Learning in small groups. METHOD: an intrinsic case study method was used, which analyzes this innovation through former students (from the first class) with three years of professional experience. The data were collected through a questionnaire and discussion groups. RESULTS: the results show that their competency level is valued in a very satisfactory manner. This level paradoxically contrasts with the lack of theoretical knowledge they perceived at the end of their education, when they started working in clinical practice. CONCLUSIONS: the teaching strategy was key to motivate an in-depth study and arouse the desire to know. In addition, Problem Based Learning favors and reinforces the decision to learn, which is that necessary in the course of professional life. PMID:25493666

  4. The availability of attentional resources modulates the inhibitory strength related to weakly activated priming.

    PubMed

    Wang, Yongchun; Wang, Yonghui; Liu, Peng; Dai, Dongyang; Di, Meilin; Chen, Qiang

    2016-08-01

    The current study investigated the role of attention in inhibitory processes (the inhibitory processes described in the current study refer only to those associated with masked or flanked priming) using a mixed paradigm involving the negative compatibility effect (NCE) and object-based attention. Accumulating evidence suggests that attention can be spread more easily within the same object, which increases the availability of attentional resources, than across different objects. Accordingly, we manipulated distractor location (with primes presented in the same object versus presented in different objects) together with prime/target compatibility (compatible versus incompatible) and prime-distractor stimulus onset asynchrony (SOA, 23 ms vs 70 ms). The aim was to investigate whether inhibitory processes related to weakly activated priming, which have been previously assumed to be automatic, depend on the availability of attentional resources. The results of Experiment 1 showed a significant NCE for the 70-ms SOA when the prime and distractor were presented in the same object (greater attentional resource availability); however, reversed NCEs were obtained for all other conditions. Experiment 2 was designed to disentangle whether the results of Experiment 1 were affected by the prime position, and the results indicated that the prime position did not modulate the NCE in Experiment 1. Together, these results are consistent with the claim that the availability of attentional resources modulates the inhibitory strength related to weakly activated priming. Specifically, if attentional resources are assigned to the distractor when it is presented in the same object as the prime, the strength of the inhibition elicited by the distractor may increase and reverse the activation elicited by the prime, which could lead to a significant NCE. PMID:27198916

  5. Strengths and weaknesses of in-tube solid-phase microextraction: A scoping review.

    PubMed

    Fernández-Amado, M; Prieto-Blanco, M C; López-Mahía, P; Muniategui-Lorenzo, S; Prada-Rodríguez, D

    2016-02-01

    In-tube solid-phase microextraction (in-tube SPME or IT-SPME) is a sample preparation technique which has demonstrated over time its ability to couple with liquid chromatography (LC), as well as its advantages as a miniaturized technique. However, the in-tube SPME perspectives in the forthcoming years depend on solutions that can be brought to the environmental, industrial, food and biomedical analysis. The purpose of this scoping review is to examine the strengths and weaknesses of this technique during the period 2009 to 2015 in order to identify research gaps that should be addressed in the future, as well as the tendencies that are meant to strengthen the technique. In terms of methodological aspects, this scoping review shows the in-tube SPME strengths in the coupling with LC (LC-mass spectrometry, capillary LC, ultra-high-pressure LC), in the new performances (magnetic IT-SPME and electrochemically controlled in-tube SPME) and in the wide range of development of coatings and capillaries. Concerning the applicability, most in-tube SPME studies (around 80%) carry out environmental and biomedical analyses, a lower number food analyses and few industrial analyses. Some promising studies in proteomics have been performed. The review makes a critical description of parameters used in the optimization of in-tube SPME methods, highlighting the importance of some of them (i.e. type of capillary coatings). Commercial capillaries in environmental analysis and laboratory-prepared capillaries in biomedical analysis have been employed with good results. The most consolidated configuration is in-valve mode, however the cycle mode configuration is frequently chosen for biomedical analysis. This scoping review revealed that some aspects such as the combination of in-tube SPME with other sample treatment techniques for the analysis of solid samples should be developed in depth in the near future. PMID:26772124

  6. The relationship between early ego strength and adolescent responses to the threat of nuclear war

    SciTech Connect

    Andrekus, N.J.

    1989-01-01

    Ego resiliency and ego control, measured when subjects were 3 or 4 years old, were related to expectation of war, concern for the future, and activism in response to the threat of nuclear war, measured when subjects were 18 years old. Data from 92 participants in a longitudinal study of ego and cognitive development conducted by Jeanne and Jack Block at the University of California, Berkeley were used to test hypotheses. Assessments with the California Child Q-set, composited across multiple independent observers, provide measures of ego resiliency and ego control. Adolescent interviews regarding the perception of likelihood of nuclear war, how this affects their future, and their antinuclear and general political activism were scaled and rated. Early ego resiliency and ego under control were hypothesized to account for the variance in adolescent nuclear responses and activism. The only significant longitudinal relationships were in the female sample, where ego under control was found to be a significant predictor of both general political activism (p<.01) and ideas of the future being affected by the nuclear threat (p<.05). Among males, the relationship between early ego resiliency and adolescent antinuclear activism approached significance (p<.10). Adolescent personality was significantly related to several measures of nuclear response. In girls, adolescent ego under control related to perception of likelihood of nuclear war (p<.05) and antinuclear activism (p<.05), and the interaction of ego resiliency and ego under control predicted general political activism (p<.0005). In boys, adolescent ego resiliency correlated with antinuclear activism (p<.05). These findings were discussed in terms of antecedent parenting styles, and conceptual links were drawn between children's ego resiliency and security of attachment, perspective taking, and moral development.

  7. The global health concept of the German government: strengths, weaknesses, and opportunities.

    PubMed

    Bozorgmehr, Kayvan; Bruchhausen, Walter; Hein, Wolfgang; Knipper, Michael; Korte, Rolf; Razum, Oliver; Tinnemann, Peter

    2014-01-01

    Recognising global health as a rapidly emerging policy field, the German federal government recently released a national concept note for global health politics (July 10, 2013). As the German government could have a significant impact on health globally by making a coherent, evidence-informed, and long-term commitment in this field, we offer an initial appraisal of the strengths, weaknesses, and opportunities for development recognised in this document. We conclude that the national concept is an important first step towards the implementation of a coherent global health policy. However, important gaps were identified in the areas of intellectual property rights and access to medicines. In addition, global health determinants such as trade, economic crises, and liberalisation as well as European Union issues such as the health of migrants, refugees, and asylum seekers are not adequately addressed. Furthermore, little information is provided about the establishment of instruments to ensure an effective inter-ministerial cooperation. Finally, because implementation aspects for the national concept are critical for the success of this initiative, we call upon the newly elected 2013 German government to formulate a global health strategy, which includes a concrete plan of action, a time scale, and measurable goals. PMID:24560258

  8. Analysis of the strengths and weaknesses of acid rain electronic data reports

    SciTech Connect

    Schott, J.

    1997-12-31

    Entergy Corporation is a Phase II utility with a fossil generation base composed primarily of natural gas and low sulfur coal. This paper presents an analysis of a large Phase II utility`s continuous emissions monitoring data reported to EPA under Title IV Acid Rain. Electric utilities currently report hourly emissions of NO{sub x}, SO{sub 2}, CO{sub 2}, fuel use, and generation through electronic data reports to EPA. This paper describes strengths and weaknesses of the data reported to EPA as determined through an analysis of 1995 data. Emissions reported by this company under acid rain for SO{sub 2} and NO{sub x} are very different from emissions reported to state agencies for annual emission inventory purposes in past years and will represent a significant break with historic trends. A comparison of emissions has been made of 1995 emissions reported under Electronic Data Reports to the emissions that would have been reported using emission factors and fuel data in past years. In addition, the paper examines the impacts of 40 CFR Part 75 Acid Rain requirements such as missing data substitution and monitor bias adjustments. Measurement system errors including stack flow measurement and false NO{sub x}Lb/MMBtu readings at very low loads are discussed. This paper describes the implications for public policy, compliance, emissions inventories, and business decisions of Part 75 acid rain monitoring and reporting requirements.

  9. The global health concept of the German government: strengths, weaknesses, and opportunities

    PubMed Central

    Bozorgmehr, Kayvan; Bruchhausen, Walter; Hein, Wolfgang; Knipper, Michael; Korte, Rolf; Razum, Oliver; Tinnemann, Peter

    2014-01-01

    Recognising global health as a rapidly emerging policy field, the German federal government recently released a national concept note for global health politics (July 10, 2013). As the German government could have a significant impact on health globally by making a coherent, evidence-informed, and long-term commitment in this field, we offer an initial appraisal of the strengths, weaknesses, and opportunities for development recognised in this document. We conclude that the national concept is an important first step towards the implementation of a coherent global health policy. However, important gaps were identified in the areas of intellectual property rights and access to medicines. In addition, global health determinants such as trade, economic crises, and liberalisation as well as European Union issues such as the health of migrants, refugees, and asylum seekers are not adequately addressed. Furthermore, little information is provided about the establishment of instruments to ensure an effective inter-ministerial cooperation. Finally, because implementation aspects for the national concept are critical for the success of this initiative, we call upon the newly elected 2013 German government to formulate a global health strategy, which includes a concrete plan of action, a time scale, and measurable goals. PMID:24560258

  10. Patterns of Cognitive Strengths and Weaknesses: Identification Rates, Agreement, and Validity for Learning Disabilities Identification

    PubMed Central

    Miciak, Jeremy; Fletcher, Jack M.; Stuebing, Karla; Vaughn, Sharon; Tolar, Tammy D.

    2014-01-01

    Purpose Few empirical investigations have evaluated LD identification methods based on a pattern of cognitive strengths and weaknesses (PSW). This study investigated the reliability and validity of two proposed PSW methods: the concordance/discordance method (C/DM) and cross battery assessment (XBA) method. Methods Cognitive assessment data for 139 adolescents demonstrating inadequate response to intervention was utilized to empirically classify participants as meeting or not meeting PSW LD identification criteria using the two approaches, permitting an analysis of: (1) LD identification rates; (2) agreement between methods; and (3) external validity. Results LD identification rates varied between the two methods depending upon the cut point for low achievement, with low agreement for LD identification decisions. Comparisons of groups that met and did not meet LD identification criteria on external academic variables were largely null, raising questions of external validity. Conclusions This study found low agreement and little evidence of validity for LD identification decisions based on PSW methods. An alternative may be to use multiple measures of academic achievement to guide intervention. PMID:24274155

  11. Cavities of Weak Magnetic Field Strength in the Wake of FTEs: Results from Global Magnetospheric MHD Simulations

    NASA Technical Reports Server (NTRS)

    Kuznetsova, M. M.; Sibeck, D. G.; Hesse, M.; Wang, Y.; Rastaetter, L.; Toth, G.; Ridley, A.

    2009-01-01

    We use the global magnetohydrodynamic (MHD) code BATS-R-US to model multipoint observations of Flux Transfer Event (FTE) signatures. Simulations with high spatial and temporal resolution predict that cavities of weak magnetic field strength protruding into the magnetosphere trail FTEs. These predictions are consistent with recently reported multi-point Cluster observations of traveling magnetopause erosion regions (TMERs).

  12. A Study to Identify Areas of Relative Strength and Weakness in Support for the Saint Leo College Library Acquisitions Project.

    ERIC Educational Resources Information Center

    McLeod, Stephen G.

    The practicum sought to identify areas of relative strength and weakness in support for the Saint Leo College (Florida) Library Acquisitions Project, a project to improve library support to the Military Education Program administered by Saint Leo College on military installations throughout the Southeast. Using the Interactive Forces Theory of…

  13. Validation of the Chinese Strengths and Weaknesses of ADHD-Symptoms and Normal-Behaviors Questionnaire in Hong Kong

    ERIC Educational Resources Information Center

    Lai, Kelly Y. C.; Leung, Patrick W. L.; Luk, Ernest S. L.; Wong, Ann S. Y.; Law, Lawrence S. C.; Ho, Karen K. Y.

    2013-01-01

    Objective: Unlike rating scales that focus on the severity of ADHD symptoms, the Strengths and Weaknesses of ADHD-Symptoms and Normal-Behaviors (SWAN) rating scale is phrased in neutral or positive terms for carers to compare the index child's behaviors with that of their peers. This study explores its psychometric properties when applied to…

  14. Macroeconomics of Natural Disasters: Strengths and Weaknesses of Meta-Analysis Versus Review of Literature.

    PubMed

    A G van Bergeijk, Peter; Lazzaroni, Sara

    2015-06-01

    We use the case of the macroeconomic impact of natural disasters to analyze strengths and weaknesses of meta-analysis in an emerging research field. Macroeconomists have published on this issue since 2002 (we identified 60 studies to date). The results of the studies are contradictory and therefore the need to synthesize the available research is evident. Meta-analysis is a useful method in this field. An important aim of our article is to show how one can use the identified methodological characteristics to better understand the robustness and importance of new findings. To provide a comparative perspective, we contrast our meta-analysis and its findings with the major influential research synthesis in the field: the IPCC's 2012 special report Managing the Risks of Extreme Events and Disasters to Advance Climate Change Adaptation. We show that the IPCC could have been more confident about the negative economic impact of disasters and more transparent on inclusion and qualification of studies, if it had been complemented by a meta-analysis. Our meta-analysis shows that, controlling for modeling strategies and data set, the impact of disasters is significantly negative. The evidence is strongest for direct costs studies where we see no difference between our larger sample and the studies included in the IPCC report. Direct cost studies and indirect cost studies differ significantly, both in terms of the confidence that can be attached to a negative impact of natural disasters and in terms of the sources of heterogeneity of the findings reported in the primary studies. PMID:25847486

  15. Strength of chrysotile-serpentinite gouge under hydrothermal conditions: Can it explain a weak San Andreas fault?

    USGS Publications Warehouse

    Moore, Diane E.; Lockner, D.A.; Summers, R.; Shengli, M.; Byerlee, J.D.

    1996-01-01

    Chrysotile-bearing serpentinite is a constituent of the San Andreas fault zone in central and northern California. At room temperature, chrysotile gouge has a very low coefficient of friction (?? ??? 0.2), raising the possibility that under hydrothermal conditions ?? might be reduced sufficiently (to ???0.1) to explain the apparent weakness of the fault. To test this hypothesis, we measured the frictional strength of a pure chrysotile gouge at temperatures to 290??C and axial-shortening velocities as low as 0.001 ??m/s. As temperature increases to ???100??C, the strength of the chrysotile gouge decreases slightly at low velocities, but at temperatures ???200??C, it is substantially stronger and essentially independent of velocity at the lowest velocities tested. We estimate that pure chrysotile gouge at hydrostatic fluid pressure and appropriate temperatures would have shear strength averaged over a depth of 14 km of 50 MPa. Thus, on the sole basis of its strength, chrysotile cannot be the cause of a weak San Andreas fault. However, chrysotile may also contribute to low fault strength by forming mineral seals that promote the development of high fluid pressures.

  16. Description of Peripheral Muscle Strength Measurement and Correlates of Muscle Weakness in Patients Receiving Prolonged Mechanical Ventilatory Support

    PubMed Central

    Chlan, Linda L.; Tracy, Mary Fran; Guttormson, Jill; Savik, Kay

    2015-01-01

    Background Intensive Care Unit Acquired Weakness (ICUAW) is a frequent complication of critical illness due to immobility and prolonged mechanical ventilatory support. Objectives To describe daily peripheral muscle strength measurement in ventilated patients and explore relationships among factors that influence ICUAW. Methods Peripheral muscle strength of 120 ventilated ICU patients (mean age 59.8 ± 15.1; 51% female; APACHE III 61.3 ± 20.7; ICU stay 10.6 ± 8.6 days) was measured daily using a standardized hand grip dynamometry protocol. Three grip measurements for each hand were recorded in pounds-force; the mean of these three assessments was used in the analysis. Correlates of ICUAW were analyzed with mixed models to explore their relationship to grip strength (age, gender, illness severity, length of ventilatory support, medications). Results Median baseline grip strength was variable yet diminished (7.7; 0-102) with either a pattern of diminishing grip strength or maintenance of the baseline low grip strength over time. Controlling for days on protocol, female gender [β = −10.4(2.5); p = <.001], age [= −.24(.08); p = .004], and days receiving ventilatory support [= −.34(.12); p = .005] explained a significant amount of variance in grip strength over time. Conclusions Patients receiving prolonged periods of mechanical ventilatory support in this sample show marked decrements in grip strength measured by hand dynamometry, a marker for peripheral muscle strength. Hand dynamometry is a reliable method to measure muscle strength in cooperative ICU patients and can be used in future research to ultimately develop interventions to prevent ICUAW. PMID:26523017

  17. While Heisenberg Is Not Looking: The Strength of "Weak Measurements" in Educational Research

    ERIC Educational Resources Information Center

    Geelan, David R.

    2015-01-01

    The concept of "weak measurements" in quantum physics is a way of "cheating" the Uncertainty Principle. Heisenberg stated (and 85 years of experiments have demonstrated) that it is impossible to know both the position and momentum of a particle with arbitrary precision. More precise measurements of one decrease the precision…

  18. The Strengths, Weaknesses, Opportunities and Threats of Using Social Software in Higher and Further Education Teaching and Learning

    ERIC Educational Resources Information Center

    Schroeder, A.; Minocha, S.; Schneider, C.

    2010-01-01

    Social software is increasingly being used in higher and further education to support teaching and learning processes. These applications provide students with social and cognitive stimulation and also add to the interaction between students and educators. However, in addition to the benefits the introduction of social software into a course…

  19. Scoring the Strengths and Weaknesses of Underage Drinking Laws in the United States

    PubMed Central

    Fell, James C.; Thomas, Sue; Scherer, Michael; Fisher, Deborah A.; Romano, Eduardo

    2015-01-01

    Several studies have examined the impact of a number of minimum legal drinking age 21 (MLDA-21) laws on underage alcohol consumption and alcohol-related crashes in the United States. These studies have contributed to our understanding of how alcohol control laws affect drinking and driving among those who are under age 21. However, much of the extant literature examining underage drinking laws use a “Law/No law” coding which may obscure the variability inherent in each law. Previous literature has demonstrated that inclusion of law strengths may affect outcomes and overall data fit when compared to “Law/No law” coding. In an effort to assess the relative strength of states’ underage drinking legislation, a coding system was developed in 2006 and applied to 16 MLDA-21 laws. The current article updates the previous endeavor and outlines a detailed strength coding mechanism for the current 20 MLDA-21 laws. PMID:26097775

  20. Registration of weak ULF/ELF oscillations of the surface electric field strength

    NASA Astrophysics Data System (ADS)

    Boldyrev, A. I.; Vyazilov, A. E.; Ivanov, V. N.; Kemaev, R. V.; Korovin, V. Ya.; Melyashinskii, A. V.; Pamukhin, K. V.; Panov, V. N.; Shvyrev, Yu. N.

    2016-07-01

    Measurements of the atmospheric electric field strength made by an electrostatic fluxmeter with a unique threshold sensitivity for such devices (6 × 10-2-10-3 V m-1 Hz-1/2 in the 10-3-25 Hz frequency range) and wide dynamic (120 dB) and spectral (0-25 Hz) ranges, are presented. The device parameters make it possible to observe the electric component of global electromagnetic Schumann resonances and long-period fluctuations in the atmospheric electric field strength.

  1. A Review of Meta-Analyses in Education: Methodological Strengths and Weaknesses

    ERIC Educational Resources Information Center

    Ahn, Soyeon; Ames, Allison J.; Myers, Nicholas D.

    2012-01-01

    The current review addresses the validity of published meta-analyses in education that determines the credibility and generalizability of study findings using a total of 56 meta-analyses published in education in the 2000s. Our objectives were to evaluate the current meta-analytic practices in education, identify methodological strengths and…

  2. Strength of weak layers in cascading failures on multiplex networks: case of the international trade network.

    PubMed

    Lee, Kyu-Min; Goh, K-I

    2016-01-01

    Many real-world complex systems across natural, social, and economical domains consist of manifold layers to form multiplex networks. The multiple network layers give rise to nonlinear effect for the emergent dynamics of systems. Especially, weak layers that can potentially play significant role in amplifying the vulnerability of multiplex networks might be shadowed in the aggregated single-layer network framework which indiscriminately accumulates all layers. Here we present a simple model of cascading failure on multiplex networks of weight-heterogeneous layers. By simulating the model on the multiplex network of international trades, we found that the multiplex model produces more catastrophic cascading failures which are the result of emergent collective effect of coupling layers, rather than the simple sum thereof. Therefore risks can be systematically underestimated in single-layer network analyses because the impact of weak layers can be overlooked. We anticipate that our simple theoretical study can contribute to further investigation and design of optimal risk-averse real-world complex systems. PMID:27211291

  3. Strength of weak layers in cascading failures on multiplex networks: case of the international trade network

    NASA Astrophysics Data System (ADS)

    Lee, Kyu-Min; Goh, K.-I.

    2016-05-01

    Many real-world complex systems across natural, social, and economical domains consist of manifold layers to form multiplex networks. The multiple network layers give rise to nonlinear effect for the emergent dynamics of systems. Especially, weak layers that can potentially play significant role in amplifying the vulnerability of multiplex networks might be shadowed in the aggregated single-layer network framework which indiscriminately accumulates all layers. Here we present a simple model of cascading failure on multiplex networks of weight-heterogeneous layers. By simulating the model on the multiplex network of international trades, we found that the multiplex model produces more catastrophic cascading failures which are the result of emergent collective effect of coupling layers, rather than the simple sum thereof. Therefore risks can be systematically underestimated in single-layer network analyses because the impact of weak layers can be overlooked. We anticipate that our simple theoretical study can contribute to further investigation and design of optimal risk-averse real-world complex systems.

  4. Strength of weak layers in cascading failures on multiplex networks: case of the international trade network

    PubMed Central

    Lee, Kyu-Min; Goh, K.-I.

    2016-01-01

    Many real-world complex systems across natural, social, and economical domains consist of manifold layers to form multiplex networks. The multiple network layers give rise to nonlinear effect for the emergent dynamics of systems. Especially, weak layers that can potentially play significant role in amplifying the vulnerability of multiplex networks might be shadowed in the aggregated single-layer network framework which indiscriminately accumulates all layers. Here we present a simple model of cascading failure on multiplex networks of weight-heterogeneous layers. By simulating the model on the multiplex network of international trades, we found that the multiplex model produces more catastrophic cascading failures which are the result of emergent collective effect of coupling layers, rather than the simple sum thereof. Therefore risks can be systematically underestimated in single-layer network analyses because the impact of weak layers can be overlooked. We anticipate that our simple theoretical study can contribute to further investigation and design of optimal risk-averse real-world complex systems. PMID:27211291

  5. Systematic Reviews and Meta-Analyses - Literature-based Recommendations for Evaluating Strengths, Weaknesses, and Clinical Value.

    PubMed

    Beitz, Janice M; Bolton, Laura L

    2015-11-01

    Good quality systematic reviews (SRs) summarizing best available evidence can help inform clinical decisions, improv- ing patient and wound outcomes. Weak SRs can misinform readers, undermining care decisions and evidence-based practice. To examine the strengths and weaknesses of SRs and meta-analyses and the role of SRs in contemporary evidence-based wound care practice, and using the search terms systematic review, meta-analysis, and evidence-based practice, the authors searched Medline and the Cumulative Index to Nursing and Allied Health Literature (CINAHL) for important terminology and recommendations to help clinicians evaluate SRs with meta-analysis. Reputable websites, recent textbooks, and synthesized available literature also were reviewed to describe and summarize SR strengths and weaknesses. After developing a checklist for critically evaluating SR objectives, inclusion/exclusion criteria, study quality, data extraction and synthesis methods, meta-analysis homogeneity, accuracy of results, interpretation, and consistency between significant findings and abstract or conclusions, the checklist was applied to topical wound care SRs identified in Cochrane and MEDLINE searches. Best available evidence included in the SRs from 169 randomized controlled trials on 11,571 patients supporting topical intervention healing effects on burns, surgical sites, and diabetic, venous, or pressure ulcers was summarized and showed SRs and clinical trials can demonstrate different outcomes because the information/data are compiled differently. The results illustrate how evidence insufficient to support firm conclusions may still meet immediate needs to guide carefully considered clinical wound and patient care decisions while encouraging better future science. PMID:26544016

  6. The Strengths and Weaknesses of Logic Formalisms to Support Mishap Analysis

    NASA Technical Reports Server (NTRS)

    Johnson, C. W.; Holloway, C. M.

    2002-01-01

    The increasing complexity of many safety critical systems poses new problems for mishap analysis. Techniques developed in the sixties and seventies cannot easily scale-up to analyze incidents involving tightly integrated software and hardware components. Similarly, the realization that many failures have systemic causes has widened the scope of many mishap investigations. Organizations, including NASA and the NTSB, have responded by starting research and training initiatives to ensure that their personnel are well equipped to meet these challenges. One strand of research has identified a range of mathematically based techniques that can be used to reason about the causes of complex, adverse events. The proponents of these techniques have argued that they can be used to formally prove that certain events created the necessary and sufficient causes for a mishap to occur. Mathematical proofs can reduce the bias that is often perceived to effect the interpretation of adverse events. Others have opposed the introduction of these techniques by identifying social and political aspects to incident investigation that cannot easily be reconciled with a logic-based approach. Traditional theorem proving mechanisms cannot accurately capture the wealth of inductive, deductive and statistical forms of inference that investigators routinely use in their analysis of adverse events. This paper summarizes some of the benefits that logics provide, describes their weaknesses, and proposes a number of directions for future research.

  7. OECI accreditation of the European Institute of Oncology of Milan: strengths and weaknesses.

    PubMed

    Deriu, Pietro L; Basso, Silvia; Mastrilli, Fabrizio; Orecchia, Roberto

    2015-12-31

    The European Institute of Oncology began the process to reach the accreditation promoted by the Organisation of European Cancer Institutes (OECI) in 2012. This accreditation integrates the quality and safety path started in 2001 with accreditation by the Joint Commission International. Despite the presence of diversified accreditations and certifications and the clear need of time, effort, and commitment, the models are complementary. Each model is not to be considered as an end but as a tool for improvement: e.g., mixing accreditation standards led to an improvement in the quality and safety of processes. The present article details the OECI accreditation experience of the European Institute of Oncology, in particular the following strengths of OECI standards: collaboration among several involved parties (patient, volunteer, patient's general practitioner) in the clinical and quality/safety processes; a larger involvement of support personnel (psycho-oncologists, dieticians, physical therapists); and the development of clinical/translational research and innovation in prevention, diagnosis, and treatment to guarantee the best available practice in diagnosis and treatment. The OECI accreditation is specific to oncology and therefore its standards are tailored to a cancer center, both in terms of language used in the standards manual and in terms of patient needs. The OECI accreditation system puts an auditor team with a standards manual in charge of verifying quality and confirms the definition of IEO as a Comprehensive Cancer Center. PMID:27096268

  8. Identifying strengths and weaknesses in the utilization of Objective Structured Clinical Examination (OSCE) in a nursing program.

    PubMed

    McWilliam, Paula L; Botwinski, Carol A

    2012-01-01

    Objective Structured Clinical Examination (OSCE) is used in nursing to assess students' transfer of classroom and laboratory learning experiences into simulated clinical practice. OSCE is a performance-based exam in which students are observed demonstrating a multitude of clinical behaviors. The purpose of this study was to identify strengths and weaknesses in the utilization of OSCE in this nursing program with 60 full-time students ages 21 to 23. An evaluation methodology was used for this study. Interviews were conducted with two groups: faculty facilitators of OSCE and standardized patients (SPs). Areas of focus were: data collection of students' performance, SP selection and training, and modification of the Nursing Interview Interaction Scale (NIIS). It was found that with appropriate SP selection and training, utilization of appropriate tools, and good data collection, OSCE can offer a valid and reliable means of testing nursing students' clinical competencies. PMID:22416539

  9. A Study of Strengths and Weaknesses of Descriptive Assessment from Principals, Teachers and Experts Points of View in Chaharmahal and Bakhteyari Primary Schools

    ERIC Educational Resources Information Center

    Sharief, Mostafa; Naderi, Mahin; Hiedari, Maryam Shoja; Roodbari, Omolbanin; Jalilvand, Mohammad Reza

    2012-01-01

    The aim of current study is to determine the strengths and weaknesses of descriptive evaluation from the viewpoint of principals, teachers and experts of Chaharmahal and Bakhtiari province. A descriptive survey was performed. Statistical population includes 208 principals, 303 teachers, and 100 executive experts of descriptive evaluation scheme in…

  10. Wildfire Prevention and Suppression plans enhancing: a first overview on strength and weakness in Italian stakeholders experiences and perception.

    NASA Astrophysics Data System (ADS)

    Bonora, Laura; Conese, Claudio; Barbati, Anna

    2014-05-01

    Fires and wildfires represent an element of vulnerability for forests, considering that have now reached a level beyond which further burning would seriously endanger the ecosystem services and their sustainable management. It is fundamental to support fire-fighting Centres by giving them tools, useful to faces future trends; in this sense the first step is to examine technical and operative procedures to evaluate their strong and weak aspects, in collaboration with personnel responsible of risk management, suppression coordination and patrol responsible of direct attack. The aims this work is to identify present elements of strength ad problematic aspects to tuning the wildfire suppression actions to future changes; this is a crucial challenge both for policy and territory planners and managers. Historical investigation lines on forest fire covered the basilar and fundamental dynamics which understanding was necessary to confine and fight the wildfire phenomenon. At the present all the competences, knowledge and connections acquired are translating and including in the Plans, sharing innovative strategies -with the "direct involved actors"- trying to decrease the fire trend. Stakeholders underlined that collaboration between research and territorial Institutions are producing positive results, showing the conceptual rightness and the well-run of the in-progress implementations. The Italian framework of wildfire prevention plans is very peculiar because the Plans related to prevention and active intervention procedure are coincident. Normative, procedural, economic and logistic aspects are considered and handled in the same general document; each year the local structures, designed by the Regions, have in charge the draft of the operative plan, defining and managing the means and patrols distribution and turnover. In the present work 3 Italian Regions (Tuscany, Puglia and Sardinia, with different territorial and vegetation characteristics and affected by different

  11. AERONET-OC: Strengths and Weaknesses of a Network for the Validation of Satellite Coastal Radiometric Products

    NASA Technical Reports Server (NTRS)

    Zibordi, Giuseppe; Holben, Brent; Slutsker, Ilya; Giles, David; D'Alimonte, Davide; Melin, Frederic; Berthon, Jean-Francois; Vandemark, Doug; Feng, Hui; Schuster, Gregory; Fabbri, Bryan E.; Kaitala, Seppo; Seppala, Jukka

    2008-01-01

    The Ocean Color component of the Aerosol Robotic Network (AERONET-OC) has been implemented to support long-term satellite ocean color investigations through cross-site consistent and accurate measurements collected by autonomous radiometer systems deployed on offshore fixed platforms. The ultimate purpose of AERONET-OC is the production of standardized measurements performed at different sites with identical measuring systems and protocols, calibrated using a single reference source and method, and processed with the same code. The AERONET-OC primary data product is the normalized water leaving radiance determined at center-wavelengths of interest for satellite ocean color applications, with an uncertainty lower than 5% in the blue-green spectral regions and higher than 8% in the red. Measurements collected at 6 sites counting the northern Adriatic Sea, the Baltic Proper, the Gulf of Finland, the Persian Gulf, and, the northern and southern margins of the Middle Atlantic Bay, have shown the capability of producing quality assured data over a wide range of bio-optical conditions including Case-2 yellow substance- and sedimentdominated waters. This work briefly introduces network elements like: deployment sites, measurement method, instrument calibration, processing scheme, quality-assurance, uncertainties, data archive and products accessibility. Emphases is given to those elements which underline the network strengths (i.e., mostly standardization of any network element) and its weaknesses (i.e., the use of consolidated, but old-fashioned technology). The work also addresses the application of AERONET-OC data to the validation of primary satellite radiometric products over a variety of complex coastal waters and finally provides elements for the identification of new deployment sites most suitable to support satellite ocean color missions.

  12. Weak-interaction strength from charge-exchange reactions versus {beta} decay in the A=40 isoquintet

    SciTech Connect

    Bhattacharya, M.; Goodman, C. D.; Garcia, A.

    2009-11-15

    We report a measurement of the Gamow-Teller (GT) strength distribution for {sup 40}Ar{yields}{sup 40}K using the 0 deg. (p,n) reaction. The measurement extends observed GT strength distribution in the A=40 system up to an excitation energy of {approx}8 MeV. In comparing our results with those from the {beta} decay of the isospin mirror nucleus {sup 40}Ti, we find that, within the excitation energy region probed by the {beta}-decay experiment, we observe a total GT strength that is in fair agreement with the {beta}-decay measurement. However, we find that the relative strength of the two strongest transitions differs by a factor of {approx}1.8 in comparing our results from (p,n) reactions with the {beta} decay of {sup 40}Ti. Using our results we present the neutrino-capture cross section for {sup 40}Ar.

  13. Gamow-Teller strength distributions and stellar weak-interaction rates for ^{76}Ge and ^{82}Se using the deformed pn-QRPA model

    NASA Astrophysics Data System (ADS)

    Nabi, Jameel-Un; Ishfaq, Mavra

    2016-07-01

    We calculate Gamow-Teller strength distributions for β β-decay nuclei ^{76}Ge and ^{82}Se using the deformed pn-QRPA model. We use a deformed Nilsson basis and consider pairing correlations within the deformed BCS theory. Ground state correlations and two-particle and two-hole mixing states were included in our pn-QRPA model. Our calculated strength distributions were compared with experimental data and previous calculation. The total Gamow-Teller strength and centroid placement calculated in our model compares well with the measured value. We calculate β-decay and positron capture rates on ^{76}Ge and ^{82}Se in supernovae environments and compare them to those obtained from experimental data and previous calculation. Our study shows that positron capture rates command the total weak rates at high stellar temperatures. We also calculate energy rates of β-delayed neutrons and their emission probabilities.

  14. Biological Threats

    MedlinePlus

    ... Thunderstorms & Lightning Tornadoes Tsunamis Volcanoes Wildfires Main Content Biological Threats Biological agents are organisms or toxins that ... Centers for Disease Control and Prevention . Before a Biological Threat Unlike an explosion, a biological attack may ...

  15. French Version of the Strengths and Weaknesses of ADHD Symptoms and Normal Behaviors (SWAN-F) Questionnaire

    PubMed Central

    Robaey, Philippe; Amre, Devendra; Schachar, Russell; Simard, Louise

    2007-01-01

    Objective To evaluate internal and external consistency of a French adaptation of the SWAN (a 7-point rating strength-based scale, from far below to far above average) and its accuracy as a diagnostic test among children with Attention Deficit/Hyperactivity Disorder (ADHD). Method Parents of 88 children referred for ADHD were interviewed using the SWAN-F, a structured interview (DISC-4.0) and the Conners’ Rating Scale. Internal consistency and divergent and convergent validity of the SWAN-F were examined using the DISC-4.0 and Conners’ Rating Scales as reference standards for four dimensions: Inattention, Hyperactivity/Impulsivity, ADHD, Oppositional Defiant Disorder. Results The internal consistency of SWAN-F was within acceptable ranges for all dimensions (Cronbach’s alpha greater than 0.80). Scores of the SWAN-F subscales were strongly associated with the DISC-4.0 diagnostic assignments and Conners’ Rating Scales, following logical patterns of correspondence between diagnoses. Its accuracy as a diagnostic test was comparable to Conners’ Rating Scale, with a lower rate of false positives. Conclusions The information gathered with the SWAN-F is compatible with that obtained using the DISC-4.0 and Conners’ Rating Scale. Strength-based rating scales have the potential to evaluate the normal distribution of behaviors and to provide reliable cut-off defining abnormal behavior. PMID:18392156

  16. Strength and weaknesses of modeling the dynamics of mode-locked lasers by means of collective coordinates

    NASA Astrophysics Data System (ADS)

    Alsaleh, M.; Mback, C. B. L.; Tchomgo Felenou, E.; Tchofo Dinda, P.; Grelu, Ph; Porsezian, K.

    2016-07-01

    We address the efficiency of theoretical tools used in the development and optimization of mode-locked fiber lasers. Our discussion is based on the practical case of modeling the dynamics of a dispersion-managed fiber laser. One conventional approach uses discrete propagation equations, followed by the analysis of the numerical results through a collective coordinate projection. We compare the latter with our dynamical collective coordinate approach (DCCA), which combines both modeling and analysis in a compact form. We show that for single pulse dynamics, the DCCA allows a much quicker solution mapping in the space of cavity parameters than the conventional approach, along with a good accuracy. We also discuss the weaknesses of the DCCA, in particular when multiple pulsing bifurcations occur.

  17. Floods and health in Gambella region, Ethiopia: a qualitative assessment of the strengths and weaknesses of coping mechanisms

    PubMed Central

    Wakuma Abaya, Samson; Mandere, Nicodemus; Ewald, Göran

    2009-01-01

    Background Floods are the most frequent and devastating type of natural disaster worldwide, causing unprecedented deaths, diseases, and destruction of property and crops. Flooding has a greater impact in developing countries due to lack of sufficient disaster management structures and a lack of economic resources. Objective This study was conducted with the aim of contributing to the knowledge base of development strategies that reduce flood-related health risks in developing countries. The study focused particularly on assessing the flood risks and health-related issues in the Gambella region of Ethiopia; with the intent of producing relevant information to assist with the improvements in the efficacy of the current flood coping strategies in the region. Methods Data were gathered through interviews with 14 officers from different government and non-governmental organizations and a questionnaire survey given to 35 flood victims in Itang woreda. A qualitative approach was applied and the data were analyzed using content analysis. Results It was found that flooding is a common problem in Gambella region. The findings also indicate that the flood frequency and magnitude has increased rapidly during the last decade. The increase in floods was driven mainly by climate change and changes in land use, specifically deforestation. The reported main impacts of flooding on human health in Gambella region were deaths, injuries, and diseases such as malaria and diarrhea. Another notable consequence of flooding was crop destruction and subsequent malnutrition. Conclusions Three weaknesses that were identified in the current coping strategies for flood-related health impacts in Gambella region were a lack of flood-specific policy, absence of risk assessment, and weak institutional capacity. This study recommends new policy approaches that will increase the effectiveness of the current flood coping strategies to sustainably address the impact of flooding on human health. PMID

  18. Studies of a weak polyampholyte at the air-buffer interface: The effect of varying pH and ionic strength

    NASA Astrophysics Data System (ADS)

    Cicuta, Pietro; Hopkinson, Ian

    2001-05-01

    We have carried out experiments to probe the static and dynamic interfacial properties of β-casein monolayers spread at the air-buffer interface, and analyzed these results in the context of models of weak polyampholytes. Measurements have been made systematically over a wide range of ionic strength and pH. In the semidilute regime of surface concentration a scaling exponent, which can be linked to the degree of chain swelling, is found. This shows that at pH close to the isoelectric point, the protein is compact. At pH away from the isoelectric pH the protein is extended. The transition between compact and extended states is continuous. As a function of increasing ionic strength, we observe swelling of the protein at the isoelectric pH but contraction of the protein at pH values away from it. These behaviors are typical of a those predicted theoretically for a weak polyampholyte. Dilational moduli measurements, made as a function of surface concentration exhibit maxima that are linked to the collapse of hydrophilic regions of the protein into the subphase. Based on this data we present a configuration map of the protein configuration in the monolayer. These findings are supported by strain (surface pressure) relaxation measurements and surface quasielastic light scattering measurements which suggest the existence of loops and tails in the subphase at higher surface concentrations.

  19. The Application of Strengths, Weaknesses, Opportunities and Threats (SWOT) Analysis for Managing Vocational and Technical Education (VTE) Programmes for Improved Efficiency in Nigeria

    ERIC Educational Resources Information Center

    Adepoju, T. L.; Famade, Olu Adesola

    2010-01-01

    This paper reviews the current status of vocational and technical education programmes (VTE) in Nigeria and the major innovations of the Nigerian Government in the recent times in the sector vis-a-vis the demands of the modern world for vocational and technological development. It therefore, proposes a paradigm shift in the operation of VTE…

  20. Examining hand dominance using dynamometric grip strength testing as evidence for overwork weakness in Charcot-Marie-Tooth disease: a systematic review and meta-analysis.

    PubMed

    Roberts-Clarke, Daniel; Fornusek, Che; Fiatarone Singh, Maria A; Burns, Joshua; Hackett, Daniel A

    2016-09-01

    This systematic review with a meta-analysis of studies was carried out to evaluate the potential of overwork weakness on the basis of grip strength of dominant and nondominant hands in individuals with Charcot-Marie-Tooth disease (CMT). Numerous electronic databases were searched from the earliest records to February 2016. Studies of any design including participants older than 18 years of age with a confirmed diagnosis of CMT that measured grip strength of both hands using dynamometric testing were eligible for inclusion. Of 12 593 articles identified following removal of duplicates, five articles fulfilled the criteria. A total of 166 participants, mostly with CMT1 or CMT2, were described from the studies included. Hand and finger pinch grip strength for the dominant compared with the nondominant hand was not statistically different. There is no definitive evidence that preferential use of the dominant hand in CMT impairs function relative to the nondominant hand. Thus, robust exercise trials of progressive resistance training are needed to understand the extent of adaptations possible and provide evidence of the safety of such regimens. PMID:27177353

  1. Strength and Function Response to Clinical Interventions of Older Women Categorized by Weakness and Low Lean Mass Using Classifications From the Foundation for the National Institute of Health Sarcopenia Project

    PubMed Central

    Fragala, Maren S.; Dam, Thuy-Tien L.; Barber, Vanessa; Judge, James O.; Studenski, Stephanie A.; Cawthon, Peggy M.; McLean, Robert R.; Harris, Tamara B.; Ferrucci, Luigi; Guralnik, Jack M.; Kiel, Douglas P.; Kritchevsky, Stephen B.; Shardell, Michelle D.; Vassileva, Maria T.

    2015-01-01

    Background. The Foundation for the National Institutes of Health Sarcopenia Project developed data-driven cut-points for clinically meaningful weakness and low lean body mass. This analysis describes strength and function response to interventions based on these classifications. Methods. In data from four intervention studies, 378 postmenopausal women with baseline and 6-month data were evaluated for change in grip strength, appendicular lean mass corrected for body mass index, leg strength and power, and short physical performance battery (SPPB). Clinical interventions included hormones, exercise, and nutritional supplementation. Differences in outcomes were evaluated between (i) those with and without weakness and (ii) those with weakness and low lean mass or with one but not the other. We stratified analyses by slowness (walking speed ≤ 0.8 m/s) and by treatment assignment. Results. The women (72±7 years; body mass index of 26±5kg/m2) were weak (33%), had low lean mass (14%), or both (6%). Those with weakness increased grip strength, lost less leg power, and gained SPPB score (p < .05) compared with nonweak participants. Stratified analyses were similar for grip strength and SPPB. With lean mass in the analysis, individuals with weakness had larger gains in grip strength and SPPB scores regardless of low lean mass (p < .01). Conclusions. Older women with clinically meaningful muscle weakness increased grip strength and SPPB, regardless of the presence of low lean mass following treatment with interventions for frailty. Thus, results suggest that muscle weakness, as defined by the Foundation for the National Institutes of Health Sarcopenia Project, appears to be a treatable symptom. PMID:25135999

  2. The Reliability and Validity of the English and Spanish Strengths and Weaknesses of ADHD and Normal Behavior Rating Scales in a Preschool Sample: Continuum Measures of Hyperactivity and Inattention

    ERIC Educational Resources Information Center

    Lakes, Kimberley D.; Swanson, James M.; Riggs, Matt

    2012-01-01

    Objective: To evaluate the reliability and validity of the English and Spanish versions of the Strengths and Weaknesses of ADHD-symptom and Normal-behavior (SWAN) rating scale. Method: Parents of preschoolers completed both a SWAN and the well-established Strengths and Difficulties Questionnaire (SDQ) on two separate occasions over a span of 3…

  3. Stereotype Threat.

    PubMed

    Spencer, Steven J; Logel, Christine; Davies, Paul G

    2016-01-01

    When members of a stigmatized group find themselves in a situation where negative stereotypes provide a possible framework for interpreting their behavior, the risk of being judged in light of those stereotypes can elicit a disruptive state that undermines performance and aspirations in that domain. This situational predicament, termed stereotype threat, continues to be an intensely debated and researched topic in educational, social, and organizational psychology. In this review, we explore the various sources of stereotype threat, the mechanisms underlying stereotype-threat effects (both mediators and moderators), and the consequences of this situational predicament, as well as the means through which society and stigmatized individuals can overcome the insidious effects of stereotype threat. Ultimately, we hope this review alleviates some of the confusion surrounding stereotype threat while also sparking further research and debate. PMID:26361054

  4. Facing ambiguous threats.

    PubMed

    Roberto, Michael A; Bohmer, Richard M J; Edmondson, Amy C

    2006-11-01

    On February 1, 2003, the world watched in horror as the Columbia space shuttle broke apart while reentering the earth's atmosphere, killing all seven astronauts. Some have argued that NASA's failure to respond with appropriate intensity to the so-called foam strike that led to the accident was evidence of irresponsible or incompetent management. The authors' research, however, suggests that NASA was exhibiting a natural, albeit unfortunate, pattern of behavior common in many organizations. The foam strike is a prime example of what the authors call an ambiguous threat-a signal that may or may not portend future harm. Ambiguous threats differ from threats with obvious causes-say, a fire in the building-for which the response is clear. They also differ from unmistakable threats that may lack straightforward response paths (such as the frightening oxygen-tank explosion aboard Apollo 13). However, when the warning sign is ambiguous and the threat's potential effect is unclear, managers may choose to ignore or discount the risk. Such an approach can be catastrophic. Firms that do a good job of dealing with ambiguous threats do not improvise during a crisis; rather, they apply a rigorous set of detection and response capabilities that they have developed and practiced beforehand. In this article, the authors outline how to put such capabilities in place long before a crisis strikes. First, companies need to hone their teamwork and rapid problem-solving skills through practice. Second, they must learn to recognize weak signals, amplify the threat, and encourage employees to ask disconcerting "what if" questions in a safe environment. Finally, they should explore possible responses to threats through quick, low-cost experimentation. PMID:17131567

  5. Spatial Noise in Coupling Strength and Natural Frequency within a Pacemaker Network; Consequences for Development of Intestinal Motor Patterns According to a Weakly Coupled Phase Oscillator Model

    PubMed Central

    Parsons, Sean P.; Huizinga, Jan D.

    2016-01-01

    Pacemaker activities generated by networks of interstitial cells of Cajal (ICC), in conjunction with the enteric nervous system, orchestrate most motor patterns in the gastrointestinal tract. It was our objective to understand the role of network features of ICC associated with the myenteric plexus (ICC-MP) in the shaping of motor patterns of the small intestine. To that end, a model of weakly coupled oscillators (oscillators influence each other's phase but not amplitude) was created with most parameters derived from experimental data. The ICC network is a uniform two dimensional network coupled by gap junctions. All ICC generate pacemaker (slow wave) activity with a frequency gradient in mice from 50/min at the proximal end of the intestine to 40/min at the distal end. Key features of motor patterns, directly related to the underlying pacemaker activity, are frequency steps and dislocations. These were accurately mimicked by reduction of coupling strength at a point in the chain of oscillators. When coupling strength was expressed as a product of gap junction density and conductance, and gap junction density was varied randomly along the chain (i.e., spatial noise) with a long-tailed distribution, plateau steps occurred at pointsof low density. As gap junction conductance was decreased, the number of plateaus increased, mimicking the effect of the gap junction inhibitor carbenoxolone. When spatial noise was added to the natural interval gradient, as gap junction conductance decreased, the number of plateaus increased as before but in addition the phase waves frequently changed direction of apparent propagation, again mimicking the effect of carbenoxolone. In summary, key features of the motor patterns that are governed by pacemaker activity may be a direct consequence of biological noise, specifically spatial noise in gap junction coupling and pacemaker frequency. PMID:26869875

  6. Predicted and measured concentrations of pharmaceuticals in hospital effluents. Examination of the strengths and weaknesses of the two approaches through the analysis of a case study.

    PubMed

    Verlicchi, Paola; Zambello, Elena

    2016-09-15

    This study deals with the chemical characterization of hospital effluents in terms of the predicted and measured concentrations of 38 pharmaceuticals belonging to 11 different therapeutic classes. The paper outlines the strengths and weaknesses of the two approaches through an analysis of a case study referring to a large hospital. It highlights the observed (and expected) ranges of variability for the parameters of the adopted model, presents the results of an uncertainty analysis of direct measurements (due to sampling mode and frequency and chemical analysis) and a sensitivity analysis of predicted concentrations (based on the annual consumption of pharmaceuticals, their excretion rate and annual wastewater volume generated by the hospital). Measured concentrations refer to two sampling campaigns carried out in summer and winter in order to investigate seasonal variability of the selected compounds. Predicted concentrations are compared to measured ones in the three scenarios: summer, winter and the whole year. It was found that predicted and measured concentrations are in agreement for a limited number of compounds (namely atenolol, atorvastatin and hydrochlorothiazide), and for most compounds the adoption of the model leads to a large overestimation in all three periods. Uncertainties in predictions are mainly due to the wastewater volume and excretion factor, whereas for measured concentrations, uncertainties are mainly due to sampling mode. PMID:27161130

  7. When Students Make Threats

    ERIC Educational Resources Information Center

    Kanan, Linda M.

    2010-01-01

    Much has been written about the use of threat assessment. Schools are encouraged to have threat assessment teams and a threat assessment process as part of a comprehensive safe schools effort. Encouraging and enabling all members of the school community to report possible threats in a timely manner is an essential component of an effective threat…

  8. Cyber threat metrics.

    SciTech Connect

    Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

    2012-03-01

    Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

  9. Muscle strength and BMI as predictors of major mobility disability in the lifestyle interventions and independence for elders pilot (LIFE-P)

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Muscle weakness and obesity are two significant threats to mobility facing the increasing number of older adults. To date, there are no studies that have examined the association of strength and body mass index (BMI) on event rates on a widely used performance measure of major mobility disability. T...

  10. Weak bond screening system

    NASA Astrophysics Data System (ADS)

    Chuang, S. Y.; Chang, F. H.; Bell, J. R.

    Consideration is given to the development of a weak bond screening system which is based on the utilization of a high power ultrasonic (HPU) technique. The instrumentation of the prototype bond strength screening system is described, and the adhesively bonded specimens used in the system developmental effort are detailed. Test results obtained from these specimens are presented in terms of bond strength and level of high power ultrasound irradiation. The following observations were made: (1) for Al/Al specimens, 2.6 sec of HPU irradiation will screen weak bond conditions due to improper preparation of bonding surfaces; (2) for composite/composite specimens, 2.0 sec of HPU irradiation will disrupt weak bonds due to under-cured conditions; (3) for Al honeycomb core with composite skin structure, 3.5 sec of HPU irradiation will disrupt weak bonds due to bad adhesive or oils contamination of bonding surfaces; and (4) for Nomex honeycomb with Al skin structure, 1.3 sec of HPU irradiation will disrupt weak bonds due to bad adhesive.

  11. Infrared weak quasars

    NASA Technical Reports Server (NTRS)

    Mcdowell, J. C.; Elvis, M.; Wilkes, B. J.

    1992-01-01

    Examples of quasars with anomalously weak IR emission are presented, and the effects of starlight subtraction on estimates of the UV and IR component strengths are discussed. Inferred model parameters are very sensitive to the position of the peak of the UV energy distribution. In many low redshift objects the peak is not seen; even in those objects where the turnover is clear, the turnover may not be intrinsic but instead due to reddening within the quasar host galaxy. The small number of unusual quasars with weak IR emission will be of utility as a probe of the quasar phenomenon in the absence of dominant dust reprocessing.

  12. The Zirconia Ceramic: Strengths and Weaknesses

    PubMed Central

    Daou, Elie E.

    2014-01-01

    Metal ceramic restorations were considered the gold standard as reliable materials. Increasing demand for esthetics supported the commercialization of new metal free restorations. A growing demand is rising for zirconia prostheses. Peer-reviewed articles published till July 2013 were identified through a Medline (Pubmed and Elsevier). Emphasizing was made on zirconia properties and applications. Zirconia materials are able to withstand posterior physiologic loads. Although zirconia cores are considered as reliable materials, these restorations are not problem free. PMID:24851138

  13. Weak bump quasars

    NASA Technical Reports Server (NTRS)

    Wilkes, B. J.; Mcdowell, J.

    1994-01-01

    Research into the optical, ultraviolet and infrared continuum emission from quasars and their host galaxies was carried out. The main results were the discovery of quasars with unusually weak infrared emission and the construction of a quantitative estimate of the dispersion in quasar continuum properties. One of the major uncertainties in the measurement of quasar continuum strength is the contribution to the continuum of the quasar host galaxy as a function of wavelength. Continuum templates were constructed for different types of host galaxy and individual estimates made of the decomposed quasar and host continua based on existing observations of the target quasars. The results are that host galaxy contamination is worse than previously suspected, and some apparent weak bump quasars are really normal quasars with strong host galaxies. However, the existence of true weak bump quasars such as PHL 909 was confirmed. The study of the link between the bump strength and other wavebands was continued by comparing with IRAS data. There is evidence that excess far infrared radiation is correlated with weaker ultraviolet bumps. This argues against an orientation effect and implies a probable link with the host galaxy environment, for instance the presence of a luminous starburst. However, the evidence still favors the idea that reddening is not important in those objects with ultraviolet weak bumps. The same work has led to the discovery of a class of infrared weak quasars. Pushing another part of the envelope of quasar continuum parameter space, the IR-weak quasars have implications for understanding the effects of reddening internal to the quasars, the reality of ultraviolet turnovers, and may allow further tests of the Phinney dust model for the IR continuum. They will also be important objects for studying the claimed IR to x-ray continuum correlation.

  14. Fixing Employee Weaknesses: Addressing the Myth.

    ERIC Educational Resources Information Center

    Gilley, Jerry W.

    2001-01-01

    Suggests that human resources development professionals need to change their performance improvement focus and philosophy to embrace the importance of building on strengths and managing weaknesses. Identifies five characteristics indicative of employees' strengths. Describes seven strategies to help employees minimize their weaknesses while…

  15. Weak Interactions

    DOE R&D Accomplishments Database

    Lee, T. D.

    1957-06-01

    Experimental results on the non-conservation of parity and charge conservation in weak interactions are reviewed. The two-component theory of the neutrino is discussed. Lepton reactions are examined under the assumption of the law of conservation of leptons and that the neutrino is described by a two- component theory. From the results of this examination, the universal Fermi interactions are analyzed. Although reactions involving the neutrino can be described, the same is not true of reactions which do not involve the lepton, as the discussion of the decay of K mesons and hyperons shows. The question of the invariance of time reversal is next examined. (J.S.R.)

  16. Credible threats and promises.

    PubMed Central

    McNamara, John M; Houston, Alasdair I

    2002-01-01

    We consider various implications of information about the other player in two-player evolutionary games. A simple model of desertion shows that information about the partner's behaviour can be disadvantageous, and highlights the idea of credible threats. We then discuss the general issue of whether the partner can convince the focal player that it will behave in a specific way, i.e. whether the focal player can make credible threats or promises. We show that when desertion decisions depend on reserves, a player can manipulate its reserves so as to create a credible threat of desertion. We then extend previous work on the evolution of trust and commitment, discussing conditions under which it is advantageous to assume that a partner will behave in a certain way even though it is not in its best interest. PMID:12495517

  17. Ancient woodlands: modern threats.

    PubMed

    Rackham, Oliver

    2008-01-01

    This review discusses the following adverse influences on long-established forests, wood-pastures, and savannas in Europe and other continents: destruction and fragmentation; depletion; pollution and eutrophication; fire and lack of fire; excessive shade; excessive numbers of deer; invasive species and cultivars; infilling of savanna; climate change; and globalization of plant diseases. Human influences on the world's mainland forests and savannas have been pervasive throughout the Holocene, to the extent that recovering 'virgin forest' becomes a somewhat nebulous conservation objective. Present and future threats arise both from increasing human activities and from withdrawal of the human activities that have shaped forests in the past. The severity of different threats depends on so many factors, especially the properties of different plants and animals, that generalization is impossible; however, in the long term, spread of pathogens is probably the most serious threat. PMID:18771472

  18. Threat radar system simulations

    NASA Astrophysics Data System (ADS)

    Miller, L.

    The capabilities, requirements, and goals of radar emitter simulators are discussed. Simulators are used to evaluate competing receiver designs, to quantify the performance envelope of a radar system, and to model the characteristics of a transmitted signal waveform. A database of candidate threat systems is developed and, in concert with intelligence data on a given weapons system, permits upgrading simulators to new projected threat capabilities. Four currently available simulation techniques are summarized, noting the usefulness of developing modular software for fast controlled-cost upgrades of simulation capabilities.

  19. Environmental Threats at School

    ERIC Educational Resources Information Center

    Green, Twhanna

    2005-01-01

    Children can be exposed to dangerous chemicals and toxins in the most unlikely of places: Their schools. This brief article describes the types of threats that school environments pose to students' health, including such pollution and chemical exposures as lead, mercury, arsenic, molds, and poor indoor air quality. The article provides tips for…

  20. The Population Threat

    ERIC Educational Resources Information Center

    McNamara, Robert S.

    1969-01-01

    In an address delivered at the University of Notre Dame, May 1969, Secretary McNamara discussed the threat of unmanageable population pressure which is undervalued and misunderstood by the general public. Unrestricted population growth will have catastrophic consequences unless it is dealt with rapidly and rationally. Copies from: Office of…

  1. Ethical Proactive Threat Research

    NASA Astrophysics Data System (ADS)

    Aycock, John; Sullins, John

    Through a provocative examination of the positive effects of computer security research on regular users, we argue that traditional security research is insufficient. Instead, we turn to a largely untapped alternative, proactive threat research, a fruitful research area but an ethical minefield. We discuss practices for ethical research and dissemination of proactive research.

  2. ThreatView

    Energy Science and Technology Software Center (ESTSC)

    2007-09-25

    The ThreatView project is based on our prior work with the existing ParaView open-source scientific visualization application. Where ParaView provides a grapical client optimized scientific visualization over the VTK parallel client server architecture, ThreatView provides a client optimized for more generic visual analytics over the same architecture. Because ThreatView is based on the VTK parallel client-server architecture, data sources can reside on remote hosts, and processing and rendering can be performed in parallel. As seenmore » in Fig. 1, ThreatView provides four main methods for visualizing data: Landscape View, which displays a graph using a landscape metaphor where clusters of graph nodes produce "hills" in the landscape; Graph View, which displays a graph using a traditional "ball-and-stick" style; Table View, which displays tabular data in a standard spreadsheet; and Attribute View, which displays a tabular "histogram" of input data - for a selected table column, the Attribute View displays each unique value within the column, and the number of times that value appears in the data. There are two supplemental view types: Text View, which displays tabular data one-record-at-a-time; and the Statistics View, which displays input metadata, such as the number of vertices and edges in a graph, the number of rows in a table, etc.« less

  3. Threat Assessment Plans

    ERIC Educational Resources Information Center

    Pascopella, Angela

    2008-01-01

    With every new case of school violence, district leaders are urged to be proactive in hopes of averting potential violence. Experts say part of that proactive work comes from a threat assessment plan that every district should have. While every district that receives funds from the U.S. Department of Education for school safety is required to have…

  4. ThreatView

    SciTech Connect

    Shead, Timothy M.; Wylie, Brian

    2007-09-25

    The ThreatView project is based on our prior work with the existing ParaView open-source scientific visualization application. Where ParaView provides a grapical client optimized scientific visualization over the VTK parallel client server architecture, ThreatView provides a client optimized for more generic visual analytics over the same architecture. Because ThreatView is based on the VTK parallel client-server architecture, data sources can reside on remote hosts, and processing and rendering can be performed in parallel. As seen in Fig. 1, ThreatView provides four main methods for visualizing data: Landscape View, which displays a graph using a landscape metaphor where clusters of graph nodes produce "hills" in the landscape; Graph View, which displays a graph using a traditional "ball-and-stick" style; Table View, which displays tabular data in a standard spreadsheet; and Attribute View, which displays a tabular "histogram" of input data - for a selected table column, the Attribute View displays each unique value within the column, and the number of times that value appears in the data. There are two supplemental view types: Text View, which displays tabular data one-record-at-a-time; and the Statistics View, which displays input metadata, such as the number of vertices and edges in a graph, the number of rows in a table, etc.

  5. Proliferation: Threat and response

    SciTech Connect

    1996-04-01

    ;Table of Contents: Section I: The Regional Proliferation Challenge; Northeast Asia; The Middle East and North Africa; The Former Soviet Union: Russia, Ukrane, Kazakstan, And Belarus; South Asia; The International Threat: Dangers from Terrorism, Insurgencies, Civil Wars, And Organized Crime; Section II: Department of Defense Response; Technical Annex: Accessible Technologies; Glossary.

  6. Quantum discord with weak measurements

    SciTech Connect

    Singh, Uttam Pati, Arun Kumar

    2014-04-15

    Weak measurements cause small change to quantum states, thereby opening up the possibility of new ways of manipulating and controlling quantum systems. We ask, can weak measurements reveal more quantum correlation in a composite quantum state? We prove that the weak measurement induced quantum discord, called as the “super quantum discord”, is always larger than the quantum discord captured by the strong measurement. Moreover, we prove the monotonicity of the super quantum discord as a function of the measurement strength and in the limit of strong projective measurement the super quantum discord becomes the normal quantum discord. We find that unlike the normal discord, for pure entangled states, the super quantum discord can exceed the quantum entanglement. Our results provide new insights on the nature of quantum correlation and suggest that the notion of quantum correlation is not only observer dependent but also depends on how weakly one perturbs the composite system. We illustrate the key results for pure as well as mixed entangled states. -- Highlights: •Introduced the role of weak measurements in quantifying quantum correlation. •We have introduced the notion of the super quantum discord (SQD). •For pure entangled state, we show that the SQD exceeds the entanglement entropy. •This shows that quantum correlation depends not only on observer but also on measurement strength.

  7. Airborne Particulate Threat Assessment

    SciTech Connect

    Patrick Treado; Oksana Klueva; Jeffrey Beckstead

    2008-12-31

    Aerosol threat detection requires the ability to discern between threat agents and ambient background particulate matter (PM) encountered in the environment. To date, Raman imaging technology has been demonstrated as an effective strategy for the assessment of threat agents in the presence of specific, complex backgrounds. Expanding our understanding of the composition of ambient particulate matter background will improve the overall performance of Raman Chemical Imaging (RCI) detection strategies for the autonomous detection of airborne chemical and biological hazards. Improving RCI detection performance is strategic due to its potential to become a widely exploited detection approach by several U.S. government agencies. To improve the understanding of the ambient PM background with subsequent improvement in Raman threat detection capability, ChemImage undertook the Airborne Particulate Threat Assessment (APTA) Project in 2005-2008 through a collaborative effort with the National Energy Technology Laboratory (NETL), under cooperative agreement number DE-FC26-05NT42594. During Phase 1 of the program, a novel PM classification based on molecular composition was developed based on a comprehensive review of the scientific literature. In addition, testing protocols were developed for ambient PM characterization. A signature database was developed based on a variety of microanalytical techniques, including scanning electron microscopy, FT-IR microspectroscopy, optical microscopy, fluorescence and Raman chemical imaging techniques. An automated particle integrated collector and detector (APICD) prototype was developed for automated collection, deposition and detection of biothreat agents in background PM. During Phase 2 of the program, ChemImage continued to refine the understanding of ambient background composition. Additionally, ChemImage enhanced the APICD to provide improved autonomy, sensitivity and specificity. Deliverables included a Final Report detailing our

  8. Spin effects in the weak interaction

    SciTech Connect

    Freedman, S.J. Chicago Univ., IL . Dept. of Physics Chicago Univ., IL . Enrico Fermi Inst.)

    1990-01-01

    Modern experiments investigating the beta decay of the neutron and light nuclei are still providing important constraints on the theory of the weak interaction. Beta decay experiments are yielding more precise values for allowed and induced weak coupling constants and putting constraints on possible extensions to the standard electroweak model. Here we emphasize the implications of recent experiments to pin down the strengths of the weak vector and axial vector couplings of the nucleon.

  9. Rheology of weakly vibrated granular materials

    NASA Astrophysics Data System (ADS)

    Dijksman, J. A.; Wortel, G.; van Hecke, M.

    2009-06-01

    We show how weak vibrations substantially modify the rheology of granular materials. We experimentally probe dry granular flows in a weakly vibrated split bottom shear cell—the weak vibrations modulate gravity and act as an agitation source. By tuning the applied stress and vibration strength, and monitoring the resulting strain as a function of time, we uncover a rich phase diagram in which non-trivial transitions separate a jammed phase, a creep flow case, and a steady flow case.

  10. Pollution: a global threat.

    PubMed

    McCrink-Goode, Melissa

    2014-07-01

    Over the past several decades, several large-scale seemingly unrelated events have unfolded in all corners of the world. Within the oceans, coral reef systems have been facing unprecedented mass bleaching episodes, sea turtles worldwide are currently experiencing an epidemic in the form of fibropapilloma, and global phytoplankton populations have declined by 40%. Within the Earth's terrestrial systems, similar phenomena have appeared in the form of colony collapse disorder (CCD) currently devastating honey bee colonies, White Nose Syndrome decimating bat populations, and the chytrid fungus plaguing amphibian populations. On the surface these events appear to be unrelated yet at the root of each phenomenon there appears an underlying threat - pollution. This paper will investigate the commonality of these occurrences as well as investigate the current and potential solutions to the threat. PMID:24727071

  11. Proliferation: Threat and response

    SciTech Connect

    1996-04-01

    During the height of the Cold War, the Russian physicist Andre Sakharov said, `Reducing the risk of annihilating humanity in a nuclear war carries an absolute priority over all other considerations.` The end of the Cold War has reduced the threat of global nuclear war, but today a new threat is rising from the global spread of nuclear, biological, and chemical weapons. Hostile groups and nations have tried - or have been able - to obtain these weapons, the technology, and homegrown ability to make them or ballistic missiles that can deliver the massive annihilation, poison, and death of these weapons hundreds of miles away. For rogue nations, these weapons are a ticket to power, stature, and confidence in regional war.

  12. Not All Threats Are Equal

    ERIC Educational Resources Information Center

    Surface, Jeanne L.

    2011-01-01

    School leaders must be fully prepared to respond to all types of threats that occur. In order to respond to threats most appropriately, the school needs to have a systematic approach that combines education, prevention, intervention, discipline, security, and crisis preparedness measures. All threats must be assessed carefully and swiftly,…

  13. [Counterfeit medicines: a growing threat].

    PubMed

    Barbereau, S

    2006-12-01

    The medical drug market has undergone considerable transformation in recent years. Like other products, medicines have been affected by globalization. Free trade policies have had a number of negative effects including a reduction in quality control not only for some products but also for raw materials and finished products. The global environment has also created conditions conducive to counterfeit medicines. The term counterfeit medicine is defined differently from one country to another in terms of quality, legality and fraudulent intent. This situation prompted the WHO to propose the following definition: "A counterfeit medicine is one which is deliberately and fraudulently mislabeled with respect to identity and/or source. Counterfeiting can apply to both branded and generic products and counterfeit products may include products with the correct ingredients or with the wrong ingredients, without active ingredients, with insufficient active ingredients or with fake packaging." Weak pharmaceutical regulation often compounded by widespread corruption in developing countries has greatly facilitated the development of this illicit market with harmful and costly effects on public health. Due to the lack of pharmocovigilance accidents involving use of counterfeit drugs go unreported. For this reason it is not possible to measure the economic impact. While counterfeiting has become a major threat in developing countries, it also affects industrialized countries. Fraudulent behavior occurs all over the world. PMID:17286014

  14. Ocean-sized threats

    NASA Astrophysics Data System (ADS)

    Showstack, Randy

    Jane Lubchenco, professor of marine biology and zoology at Oregon State University, and president-elect of the International Council for Science, said that scientists can do more than they currently are doing to clearly communicate to the public and to policy-makers those issues associated with the many ecological threats faced by the world's oceans. In doing so, scientists can overcome popularly-held misperceptions about the health of the world's oceans and thus, help protect the seas.“Science,” Lubchenco said, “has a huge role to play in informing [the public] what is happening and to guide the choice of solutions.

  15. Combating emerging viral threats

    PubMed Central

    Bekerman, Elena; Einav, Shirit

    2015-01-01

    Synopsis Most approved antiviral therapeutics selectively inhibit proteins encoded by a single virus, thereby providing a “one drug-one bug” solution. As a result of this narrow spectrum of coverage and the high cost of drug development, therapies are currently approved for fewer than ten viruses out of the hundreds known to cause human disease. This perspective summarizes progress and challenges in the development of broad-spectrum antiviral therapies. These strategies include targeting enzymatic functions shared by multiple viruses and host cell machinery by newly discovered compounds or by repurposing approved drugs. These approaches offer new practical means for developing therapeutics against existing and emerging viral threats. PMID:25883340

  16. Threats to international science

    NASA Astrophysics Data System (ADS)

    Kisslinger, Carl

    The role of nongovernmental organizations (NGOs) as effective agents for promoting world science is seriously threatened. It is ironic that the threat comes from Norway and Denmark, two countries that have demonstrated a deep commitment to individual freedom and human rights. Motivated by a sincere desire to express their strongest disapproval of the “apartheid” policies of the government of the Republic of South Africa, these countries have passed laws that have the effect of rejecting the International Council of Scientific Unions (ICSU) principles of nondiscrimination and free circulation of scientists.

  17. New global viral threats.

    PubMed

    Erdem, Hakan; Ünal, Serhat

    2015-04-01

    Infectious diseases have caused great catastrophes in human history, as in the example of the plague, which wiped out half of the population in Europe in the 14th century. Ebola virus and H7N9 avian influenza virus are 2 lethal pathogens that we have encountered in the second decade of the 21st century. Ebola infection is currently being seen in West Africa, and H7N9 avian flu appears to have settled in Southeast Asia. This article focuses on the current situation and the future prospects of these potential infectious threats to mankind. PMID:25828274

  18. Mediators of Stereotype Threat among Black College Students.

    PubMed

    Massey, Douglas S; Owens, Jayanti

    2014-04-01

    We hypothesize that the manner in which stereotype threat affects college grade achievement is mediated by institutional context as well as individual characteristics. Drawing on a sample of black students from the National Longitudinal Survey of Freshmen we find weak and inconsistent evidence that institutional characteristics influence the operation of stereotype threat. We find more consistent evidence to indicate that the effect of stereotype threat is conditioned by individual factors such as skin color, multiracial origins, and an integrated upbringing. Most of the effect on grade achievement occurs through the internalization pathway, in which the internalization of negative stereotypes leads to disinvestment manifested by a reduction in academic effort. The reduction in work effort, in turn, lowers grades. We also find evidence that immigrant origin confers protection from the negative effects of stereotype threat through both internalization and externalization mechanisms, though the ultimate effect of grade achievement is rather small. PMID:24860201

  19. Categorizing threat : building and using a generic threat matrix.

    SciTech Connect

    Woodard, Laura; Veitch, Cynthia K.; Thomas, Sherry Reede; Duggan, David Patrick

    2007-09-01

    The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and is not available for general use, such as the design of defenses and the development of mitigation strategies. To reduce the complexity of analyzing threat, the threat space must first be reduced. This is achieved by taking the continuous nature of the threat space and creating an abstraction that allows the entire space to be grouped, based on measurable attributes, into a small number of distinctly different levels. The work documented in this report is an effort to create such an abstraction.

  20. Laser Threat Analysis System (LTAS)

    NASA Astrophysics Data System (ADS)

    Pfaltz, John M.; Richardson, Christina E.; Ruiz, Abel; Barsalou, Norman; Thomas, Robert J.

    2002-11-01

    LTAS is a totally integrated modeling and simulation environment designed for the purpose of ascertaining the susceptibility of Air Force pilots and air crews to optical radiation threats. Using LTAS, mission planners can assess the operational impact of optically directed energy weapons and countermeasures. Through various scenarios, threat analysts are able to determine the capability of laser threats and their impact on operational missions including the air crew's ability to complete their mission effectively. Additionally, LTAS allows the risk of laser use on training ranges and the requirement for laser protection to be evaluated. LTAS gives mission planners and threat analysts complete control of the threat environment including threat parameter control and placement, terrain mapping (line-of-site), atmospheric conditions, and laser eye protection (LEP) selection. This report summarizes the design of the final version of LTAS, and the modeling methodologies implemented to accomplish analysis.

  1. Recurrent dreams: Recurring threat simulations?

    PubMed

    Valli, K; Revonsuo, A

    2006-06-01

    Zadra, Desjardins, and Marcotte (2006) have made a valuable contribution to the empirical testing of the Threat Simulation Theory (TST) (Revonsuo, 2000a) in recurrent dreams. For the most part, their results are in accordance with the theory, while some findings seem to conflict with the predictions of TST. In our commentary, we consider some alternative ways to interpret the results, and we conclude that many prominent features of most recurrent dreams seem to be manifestations of a threat simulation function, leading to repeated rehearsal of threat perception and avoidance, but a minority of recurrent dreams seem to have origins unrelated to threat simulation. PMID:16019227

  2. The threat simulation theory in light of recent empirical evidence: a review.

    PubMed

    Valli, Katja; Revonsuo, Antti

    2009-01-01

    The recently proposed threat simulation theory (TST) states that dreaming about threatening events has a biological function. In the past few years, the TST has led to several dream content analysis studies that empirically test the theory. The predictions of the TST have been investigated mainly with a new content analysis system, the Dream Threat Scale (DTS), a method developed for identifying and classifying threatening events in dreams. In this article we review the studies that have tested the TST with the DTS. We summarize and reevaluate the results based on the dreams of Finnish and Swedish university students, traumatized and nontraumatized Kurdish, Palestinian, and Finnish children, and special dream samples, namely recurrent dreams and nightmares collected from Canadian participants. We sum up other recent research that has relevance for the TST and discuss the extent to which empirical evidence supports or conflicts with the TST. New evidence and new direct tests of the predictions of the TST yield strong support for the theory, and the TST's strengths seem to outweigh its weaknesses. PMID:19353929

  3. Linking Stereotype Threat and Anxiety

    ERIC Educational Resources Information Center

    Osborne, Jason W.

    2007-01-01

    Claude Steele's stereotype threat hypothesis has attracted significant attention in recent years. This study tested one of the main tenets of his theory--that stereotype threat serves to increase individual anxiety levels, thus hurting performance--using real-time measures of physiological arousal. Subjects were randomly assigned to either high or…

  4. Threat Assessment in College Settings

    ERIC Educational Resources Information Center

    Cornell, Dewey

    2010-01-01

    In 2007, the landscape of campus safety changed abruptly with the Virginia Tech shooting and the subsequent wave of anonymous threats in colleges across the country. In response to the tragedy, the Virginia state legislature mandated that every public institution of higher education establish a "threat assessment team." Both the FBI and the U.S.…

  5. Bio-threat microparticle simulants

    DOEpatents

    Farquar, George Roy; Leif, Roald N

    2012-10-23

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  6. Bomb Threat Assessments. Fact Sheet

    ERIC Educational Resources Information Center

    Tunkel, Ronald F.

    2010-01-01

    This information provides a brief, summary outline of how investigators should assess anonymous bomb threats at schools. Applying these principles may help administrators and law enforcement personnel accurately assess the viability and credibility of a threat and appropriately gauge their response. Any credible evidence provided by teachers or…

  7. Bio-threat microparticle simulants

    SciTech Connect

    Farquar, George Roy; Leif, Roald

    2014-09-16

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  8. Psychoanalysis and the nuclear threat

    SciTech Connect

    Levine, H.B.; Jacobs, D.; Rubin, L.J.

    1988-01-01

    {ital Psychoanalysis and the Nuclear Threat} provides coverage of the dynamic and clinical considerations that follow from life in the nuclear age. Of special clinical interest are chapters dealing with the developmental consequences of the nuclear threat in childhood, adolescence, and adulthood, and those exploring the technical issues raised by the occurrence in analytic and psychotherapeutic hours of material related to the nuclear threat. Additional chapters bring a psychoanalytic perspective to bear on such issues as the need to have enemies, silence as the real crime, love, work, and survival in the nuclear age, the relationship of the nuclear threat to issues of mourning and melancholia, apocalyptic fantasies, the paranoid process, considerations of the possible impact of gender on the nuclear threat, and the application of psychoanalytic thinking to nuclear arms strategy. Finally, the volume includes the first case report in the English language---albeit a brief psychotherapy---involving the treatment of a Hiroshima survivor.

  9. Threat expert system technology advisor

    NASA Technical Reports Server (NTRS)

    Kurrasch, E. R.; Tripp, L. R.

    1987-01-01

    A prototype expert system was developed to determine the feasibility of using expert system technology to enhance the performance and survivability of helicopter pilots in a combat threat environment while flying NOE (Nap of the Earth) missions. The basis for the concept is the potential of using an Expert System Advisor to reduce the extreme overloading of the pilot who flies NOE mission below treetop level at approximately 40 knots while performing several other functions. The ultimate goal is to develop a Threat Expert System Advisor which provides threat information and advice that are better than even a highly experienced copilot. The results clearly show that the NOE pilot needs all the help in decision aiding and threat situation awareness that he can get. It clearly shows that heuristics are important and that an expert system for combat NOE helicopter missions can be of great help to the pilot in complex threat situations and in making decisions.

  10. Weak Value Theory

    SciTech Connect

    Shikano, Yutaka

    2011-03-28

    I show that the weak value theory is useful from the viewpoints of the experimentally verifiability, consistency, capacity for explanation as to many quantum paradoxes, and practical advantages. As an example, the initial state in the Hardy paradox can be experimentally verified using the weak value via the weak measurement.

  11. Stereotype Threat as Validity Threat: The Anxiety-Sex-Threat Interaction

    ERIC Educational Resources Information Center

    Delgado, Ana R.; Prieto, Gerardo

    2008-01-01

    Stereotype threat has been invoked to explain underperformance on a variety of groups for whom the stereotypes allege inferior cognitive abilities. In math testing, stereotype threat has been used to explain sex differences in test performance. This paper describes an experimental study on a large sample (n = 313), in which the role of anxiety and…

  12. Weak Measurements Destroy Too Much Quantum Correlation

    NASA Astrophysics Data System (ADS)

    Wu, Shao-xiong; Zhang, Jun; Yu, Chang-shui; Song, He-shan

    2016-01-01

    The quantum correlation under weak measurements is studied via skew information. For 2 × d-dimensional states, it can be given by a closed form which linearly depends on the quantum correlation [EPL. 107 (2014) 10007] determined by the strength of the weak measurement. It is found that the quantum correlation under weak measurements only captures partial quantumness of the state. In particular, the extraction of the residual quantumness by the latter measurements will inevitably destroy too much quantumness. To demonstration, the Werner state is given as an example.

  13. Managing biosecurity threats in China.

    PubMed

    Huang, Yanzhong

    2011-03-01

    Compared to the extensive literature on bioterrorism and biosecurity in the United States, less analysis has been conducted on similar challenges in China. This article seeks to fill this void by providing an integrated and updated assessment of 3 major biosecurity threats China faces: biowarfare, bioterrorism, and biocrimes. An analysis of China's biosecurity threats and biodefense building suggest varying levels of risk associated with each threat type. First, a direct bioweapons attack on China is highly unlikely, although the threat of biowarfare cannot be simply written off. Second, potential perpetrators of bioterrorism have capabilities at their disposal for carrying out such attacks. While terrorist organizations in China do not have a strong interest in bioterrorism, the limited state capability to counter such a threat may increase the risk in the future. Third, unlike the threats of biowarfare and bioterrorism, potential perpetrators of biocrimes have both incentives and capabilities, and biocrimes can produce reactions far out of proportion to the actual number of casualties. Despite the distinct biosecurity challenges it faces, China has yet to articulate a differentiated and coherent strategy to effectively tackle the challenges. Assessing different types of biosecurity threats in terms of degrees of risk not only provides greater analytical clarity but also has important implications for the strategies required to manage the risks. PMID:21361794

  14. Apple Strength Issues

    SciTech Connect

    Syn, C

    2009-12-22

    Strength of the apple parts has been noticed to decrease, especially those installed by the new induction heating system since the LEP campaign started. Fig. 1 shows the ultimate tensile strength (UTS), yield strength (YS), and elongation of the installed or installation-simulated apples on various systems. One can clearly see the mean values of UTS and YS of the post-LEP parts decreased by about 8 ksi and 6 ksi respectively from those of the pre-LEP parts. The slight increase in elongation seen in Fig.1 can be understood from the weak inverse relationship between the strength and elongation in metals. Fig.2 shows the weak correlation between the YS and elongation of the parts listed in Fig. 1. Strength data listed in Figure 1 were re-plotted as histograms in Figs. 3 and 4. Figs. 3a and 4a show histograms of all UTS and YS data. Figs. 3b and 4b shows histograms of pre-LEP data and Figs. 3c and 4c of post-LEP data. Data on statistical scatter of tensile strengths have been rarely published by material suppliers. Instead, only the minimum 'guaranteed' strength data are typically presented. An example of strength distribution of aluminum 7075-T6 sheet material, listed in Fig. 5, show that its scatter width of both UTS and YS for a single sheet can be about 6 ksi and for multi-lot scatter can be as large as 11 ksi even though the sheets have been produced through well-controlled manufacturing process. By approximating the histograms shown in Figs. 3 and 4 by a Gaussian or similar type of distribution curves, one can plausibly see the strength reductions in the later or more recent apples. The pre-LEP data in Figs. 3b and 4b show wider scatter than the post-LEP data in Figs. 3c and 4c and seem to follow the binomial distribution of strength indicating that the apples might have been made from two different lots of material, either from two different vendors or from two different melts of perhaps slightly different chemical composition by a single vendor. The post

  15. Global Threats to Child Safety.

    PubMed

    Mace, Sharon E

    2016-02-01

    Children have rights, as enumerated in the Declaration of the Rights of the Child, and need protection from violence, exploitation, and abuse. Global threats to child safety exist. These threats include lack of basic needs (food, clean water, sanitation), maltreatment, abandonment, child labor, child marriage, female genital mutilation, child trafficking, disasters, and armed conflicts/wars. Recent disasters and armed conflicts have led to a record number of displaced people especially children and their families. Strategies and specific programs can be developed and implemented for eliminating threats to the safety of children. PMID:26613687

  16. Heat Waves Are Health Threats

    MedlinePlus

    ... medlineplus/news/fullstory_159694.html Heat Waves Are Health Threats Drink plenty of water and use air ... on: Heat Illness Recent Health News Related MedlinePlus Health Topics Heat Illness About MedlinePlus Site Map FAQs ...

  17. Bomb Threat Becomes Real News.

    ERIC Educational Resources Information Center

    Gastaldo, Evann

    1999-01-01

    Discusses how the staff of the newspaper at Camarillo High School (California) covered a bomb threat at their school. Describes how they, overnight, conducted interviews, took and developed photographs, produced the layout, and published the newspaper. (RS)

  18. Heat Waves Are Health Threats

    MedlinePlus

    ... https://medlineplus.gov/news/fullstory_159694.html Heat Waves Are Health Threats Drink plenty of water and ... 2016 SATURDAY, July 2, 2016 (HealthDay News) -- Heat waves are more than uncomfortable, they can be deadly. ...

  19. Aperiodic Weak Topological Superconductors.

    PubMed

    Fulga, I C; Pikulin, D I; Loring, T A

    2016-06-24

    Weak topological phases are usually described in terms of protection by the lattice translation symmetry. Their characterization explicitly relies on periodicity since weak invariants are expressed in terms of the momentum-space torus. We prove the compatibility of weak topological superconductors with aperiodic systems, such as quasicrystals. We go beyond usual descriptions of weak topological phases and introduce a novel, real-space formulation of the weak invariant, based on the Clifford pseudospectrum. A nontrivial value of this index implies a nontrivial bulk phase, which is robust against disorder and hosts localized zero-energy modes at the edge. Our recipe for determining the weak invariant is directly applicable to any finite-sized system, including disordered lattice models. This direct method enables a quantitative analysis of the level of disorder the topological protection can withstand. PMID:27391744

  20. Aperiodic Weak Topological Superconductors

    NASA Astrophysics Data System (ADS)

    Fulga, I. C.; Pikulin, D. I.; Loring, T. A.

    2016-06-01

    Weak topological phases are usually described in terms of protection by the lattice translation symmetry. Their characterization explicitly relies on periodicity since weak invariants are expressed in terms of the momentum-space torus. We prove the compatibility of weak topological superconductors with aperiodic systems, such as quasicrystals. We go beyond usual descriptions of weak topological phases and introduce a novel, real-space formulation of the weak invariant, based on the Clifford pseudospectrum. A nontrivial value of this index implies a nontrivial bulk phase, which is robust against disorder and hosts localized zero-energy modes at the edge. Our recipe for determining the weak invariant is directly applicable to any finite-sized system, including disordered lattice models. This direct method enables a quantitative analysis of the level of disorder the topological protection can withstand.

  1. Strength Testing.

    ERIC Educational Resources Information Center

    Londeree, Ben R.

    1981-01-01

    Postural deviations resulting from strength and flexibility imbalances include swayback, scoliosis, and rounded shoulders. Screening tests are one method for identifying strength problems. Tests for the evaluation of postural problems are described, and exercises are presented for the strengthening of muscles. (JN)

  2. Combating the Insider Cyber Threat

    SciTech Connect

    Greitzer, Frank L.; Moore, Andrew P.; Cappelli, Dawn M.; Andrews, Dee H.; Carroll, Lynn; Hull, Thomas D.

    2008-01-02

    This article represents a collaboration between PNNL, CERT/CMU, and AFRL that describes needs and related efforts by these institutions to develop technologies and approaches to counter cyber threats by insiders to informatin systems. The main focus of this article is on the need for effective training on insider threat to raise staff awareness and encourage organizations to adopt a more effective approach to identifying potential risks and take proactive steps to mitigate them.

  3. Media use and children's perceptions of societal threat and personal vulnerability.

    PubMed

    Comer, Jonathan S; Furr, Jami M; Beidas, Rinad S; Babyar, Heather M; Kendall, Philip C

    2008-07-01

    This study examined children's media use (i.e., amount of television and Internet usage) and relationships to children's perceptions of societal threat and personal vulnerability. The sample consisted of 90 community youth aged 7 to 13 years (M = 10.8; 52.2% male) from diverse economic backgrounds. Analyses found children's television use to be associated with elevated perceptions of personal vulnerability to world threats (i.e., crime, terrorism, earthquakes, hurricanes, and floods). An interactive model of television use and child anxiety in accounting for children's personal threat perceptions was supported, in which the strength of television consumption in predicting children's personal threat perceptions was greater for children with greater anxiety. Relationships were found neither between children's Internet use and threat perceptions nor between media use and perceptions of societal threat. PMID:18645752

  4. Threat image projection in CCTV

    NASA Astrophysics Data System (ADS)

    Neil, David; Thomas, Nicola; Baker, Bob

    2007-10-01

    Operators are key components in a Closed Circuit Television (CCTV) system, being the link between the system technology and its effective use. Operators' performance will largely determine the level of service provided by the system. There have been few studies testing operator performance, while much work has been done to test the performance of the technology. Previous work on CCTV operator performance carried out by the Home Office Scientific Development Branch (HOSDB) has used filmed video and subjects who knew they were undergoing testing, meaning subjects are likely to be concentrating harder on performing well. HOSDB believes that there is a need for a test that would be able to be routinely used in a CCTV control room throughout the course of a normal shift to provide management with operational performance data. Threat Image Projection (TIP) is routinely used in X-Ray baggage scanners to keep operators alert to possible threats. At random intervals, a threat target image is superimposed over the image of the baggage being screened. The operator then responds to this threat. A similar system could be used for CCTV operators. A threat image would be randomly superimposed over the live CCTV feed and the operator would be expected to respond to this.

  5. 28 CFR 36.208 - Direct threat.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Direct threat. 36.208 Section 36.208... ACCOMMODATIONS AND IN COMMERCIAL FACILITIES General Requirements § 36.208 Direct threat. (a) This part does not... individual poses a direct threat to the health or safety of others. (b) Direct threat means a...

  6. The Social Construction of the Soviet Threat.

    ERIC Educational Resources Information Center

    Nathanson, Charles E.; Skelly, James M.

    For almost 40 years the perception of a Soviet threat has influenced much foreign and domestic political behavior in the United States. How to respond to the threat has been a subject of intense debate, but the reality of the threat has been taken for granted. Conviction about the reality of this threat dates back to George Kennan's long telegram…

  7. Comparative Environmental Threat Analysis: Three Case Studies.

    ERIC Educational Resources Information Center

    Latour, J. B.; Reiling, R.

    1994-01-01

    Reviews how carrying capacity for different environmental problems is operationalized. Discusses whether it is possible to compare threats, using the exceeding of carrying capacity as a yardstick. Points out problems in comparative threat analysis using three case studies: threats to European groundwater resources, threats to ecosystems in Europe,…

  8. Cyber threats within civil aviation

    NASA Astrophysics Data System (ADS)

    Heitner, Kerri A.

    Existing security policies in civil aviation do not adequately protect against evolving cyber threats. Cybersecurity has been recognized as a top priority among some aviation industry leaders. Heightened concerns regarding cyber threats and vulnerabilities surround components utilized in compliance with the Federal Aviation Administration's (FAA) Next Generation Air Transportation (NextGen) implementation. Automated Dependent Surveillance-B (ADS-B) and Electronic Flight Bags (EFB) have both been exploited through the research of experienced computer security professionals. Civil aviation is essential to international infrastructure and if its critical assets were compromised, it could pose a great risk to public safety and financial infrastructure. The purpose of this research was to raise awareness of aircraft system vulnerabilities in order to provoke change among current national and international cybersecurity policies, procedures and standards. Although the education of cyber threats is increasing in the aviation industry, there is not enough urgency when creating cybersecurity policies. This project intended to answer the following questions: What are the cyber threats to ADS-B of an aircraft in-flight? What are the cyber threats to EFB? What is the aviation industry's response to the issue of cybersecurity and in-flight safety? ADS-B remains unencrypted while the FAA's mandate to implement this system is rapidly approaching. The cyber threat of both portable and non-portable EFB's have received increased publicity, however, airlines are not responding quick enough (if at all) to create policies for the use of these devices. Collectively, the aviation industry is not being proactive enough to protect its aircraft or airport network systems. That is not to say there are not leaders in cybersecurity advancement. These proactive organizations must set the standard for the future to better protect society and it's most reliable form of transportation.

  9. Coupling-deformed pointer observables and weak values

    NASA Astrophysics Data System (ADS)

    Zhang, Yu-Xiang; Wu, Shengjun; Chen, Zeng-Bing

    2016-03-01

    While the novel applications of weak values have recently attracted wide attention, weak measurement, the usual way to extract weak values, suffers from risky approximations and severe quantum noises. In this paper, we show that the weak-value information can be obtained exactly in strong measurement with postselections, via measuring the coupling-deformed pointer observables, i.e., the observables selected according to the coupling strength. With this approach, we keep all the advantages claimed by weak-measurement schemes and at the same time solve some widely criticized problems thereof, such as the questionable universality, systematical bias, and drastic inefficiency.

  10. The Strengths and Weaknesses of ISO 9000 in Vocational Education

    ERIC Educational Resources Information Center

    Bevans-Gonzales, Theresa L.; Nair, Ajay T.

    2004-01-01

    ISO 9000 is a set of quality standards that assists an organization to identify, correct and prevent errors, and to promote continual improvement. Educational institutions worldwide are implementing ISO 9000 as they face increasing external pressure to maintain accountability for funding. Similar to other countries, in the United States vocational…

  11. Overview of inhalation exposure techniques: strengths and weaknesses.

    PubMed

    Pauluhn, Jürgen

    2005-07-01

    The vast majority of toxicity studies and risk evaluations deal with single chemicals. Due to the growing interest in potential human health risks originating from exposure to environmental pollutants or lifestyle-related complex chemical mixtures, well thought-out tailor-made mechanistic inhalation toxicity studies have been performed. In contrast to the complex mixtures potentially encountered from hazardous waste sites, drinking water disinfection by-products, natural flavoring complexes or the cumulative intake of food additives and pesticide residues, the scientific evaluation of complex airborne mixtures, such as acid aerosols, atmospheres produced by combustion or thermolysis, e.g. residual oil fly ash (ROFA), diesel and gasoline exhaust, and tobacco smoke, or volatile organic chemicals (VOCs) in residential areas, to mention but a few, is a daunting challenge for experimental toxicologists. These challenges include the controlled in situ generation of exposure atmospheres, the compositions of which are often process-determined and metastable. This means that volatile agents may partition with liquid aerosols or be adsorbed onto surfaces of solid aerosols. Similarly, the nature and composition of test atmospheres might change continuously through oxidation and aging of constituents or coagulation of particles. This, in turn, poses additional challenges to the analytical characterization of such complex test atmospheres, including the identification of potential experimental artifacts. Accordingly, highly standardized and controlled inhalation studies are required for hazard identification of complex mixtures and the results of inhalation studies have to be analyzed judiciously due to the great number of experimental variables. These variables may be related to technical issues or to the specific features of the animal model. Although inhalation exposure of animals mimics human exposure best, not all results obtained under such rigorous test conditions might necessarily also occur under real-life exposure conditions. In addition, to simulate experimentally specific use or exposure patterns may impose a particular challenge to traditional approaches in terms of relevant exposure metrics and the analytes chosen to characterize exposure atmospheres. This paper addresses major developments in the discipline of inhalation toxicology with particular emphasis on the state-of-the-art testing of complex mixtures. PMID:16092719

  12. Cognitive Strengths and Weaknesses Associated with Prader-Willi Syndrome.

    ERIC Educational Resources Information Center

    Conners, Frances A.; Rosenquist, Celia J.; Atwell, Julie A.; Klinger, Laura Grofer

    2000-01-01

    Nine adults with Prader-Willi syndrome (PWS) and nine age- and IQ-matched adults with PWS completed standardized tests of long-term and short-term memory, visual and auditory processing, and reading and mathematics achievement. Contrary to previous findings, long-term memory in PWS subjects was strong relative to IQ and there was no evidence that…

  13. Finnish Vocational Education and Training in Comparison: Strengths and Weaknesses

    ERIC Educational Resources Information Center

    Virolainen, Maarit; Stenström, Marja-Leena

    2014-01-01

    The study investigates how the Finnish model of providing initial vocational education and training (IVET) has succeeded in terms of enhancing educational progress and employability. A relatively high level of participation in IVET makes the Finnish model distinctive from those of three other Nordic countries: Denmark, Norway and Sweden. All four…

  14. Strengths and Weaknesses of Two New Potato Herbicides

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Outlook (dimethenamid-p) and Chateau (flumioxazin) are two new preemergence herbicides labeled for use in potatoes. Both herbicides are restricted to preemergence applications only and improve nightshade control when tank mixed with other potato herbicides. Dimethenamid-p is particularly strong on ...

  15. History of Weak Interactions

    DOE R&D Accomplishments Database

    Lee, T. D.

    1970-07-01

    While the phenomenon of beta-decay was discovered near the end of the last century, the notion that the weak interaction forms a separate field of physical forces evolved rather gradually. This became clear only after the experimental discoveries of other weak reactions such as muon-decay, muon-capture, etc., and the theoretical observation that all these reactions can be described by approximately the same coupling constant, thus giving rise to the notion of a universal weak interaction. Only then did one slowly recognize that the weak interaction force forms an independent field, perhaps on the same footing as the gravitational force, the electromagnetic force, and the strong nuclear and sub-nuclear forces.

  16. Heterogeneous, weakly coupled map lattices

    NASA Astrophysics Data System (ADS)

    Sotelo Herrera, M.a. Dolores; San Martín, Jesús; Porter, Mason A.

    2016-07-01

    Coupled map lattices (CMLs) are often used to study emergent phenomena in nature. It is typically assumed (unrealistically) that each component is described by the same map, and it is important to relax this assumption. In this paper, we characterize periodic orbits and the laminar regime of type-I intermittency in heterogeneous weakly coupled map lattices (HWCMLs). We show that the period of a cycle in an HWCML is preserved for arbitrarily small coupling strengths even when an associated uncoupled oscillator would experience a period-doubling cascade. Our results characterize periodic orbits both near and far from saddle-node bifurcations, and we thereby provide a key step for examining the bifurcation structure of heterogeneous CMLs.

  17. Bomb Threats Taking Financial Toll

    ERIC Educational Resources Information Center

    Bowman, Darcia Harris

    2004-01-01

    Despite all its efforts to crack down on the bomb scares that disrupted classes again and again in 2003, North Carolina's Orange County district fell victim to yet another false alarm this school year, 2004. For some schools, bomb threats have become more routine than fire drills, with each incident ringing up multi-thousand-dollar tabs for…

  18. Measuring Vulnerability to Stereotype Threat

    ERIC Educational Resources Information Center

    Barnard, Lucy; Burley, Hansel; Olivarez, Arturo; Crooks, Steven

    2008-01-01

    Introduction: In this study, we examined the psychometric properties of an instrument intended to measure vulnerability to stereotype threat. Method: We revised the instrument through assessing score reliability and then examined a domain specific model using confirmatory factor analyses. After examining the responses of the total sample…

  19. Hostile intelligence threat: US technology

    SciTech Connect

    Whitman, D.

    1988-11-01

    This publication outlines the hostile intelligence threat to U.S. industry and Western technology, including the operational capabilities of hostile intelligence services and their scientific and technological (S T) targets. Current intelligence strategies used against the United States are described and sources of information providing countermeasures guidance are listed. Points of contact for security and counterintelligence assistance are also included.

  20. Cyber Threats to Nuclear Infrastructures

    SciTech Connect

    Robert S. Anderson; Paul Moskowitz; Mark Schanfein; Trond Bjornard; Curtis St. Michel

    2010-07-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  1. Airway clearance in neuromuscular weakness.

    PubMed

    Gauld, Leanne Maree

    2009-05-01

    Impaired airway clearance leads to recurrent chest infections and respiratory deterioration in neuromuscular weakness. It is frequently the cause of death. Cough is the major mechanism of airway clearance. Cough has several components, and assessment tools are available to measure the different components of cough. These include measuring peak cough flow, respiratory muscle strength, and inspiratory capacity. Each is useful in assessing the ability to generate an effective cough, and can be used to guide when techniques of assisting airway clearance may be effective for the individual and which are most effective. Techniques to assist airway clearance include augmenting inspiration by air stacking, augmenting expiration by assisting the cough, and augmenting both inspiration and expiration with the mechanical insufflator-exsufflator or by direct suctioning via a tracheostomy. Physiotherapists are invaluable in assisting airway clearance, and in teaching patients and their families how to use these techniques. Use of the mechanical insufflator-exsufflator has gained popularity in recent times, but several simpler, more economical methods are available to assist airway clearance that can be used effectively alone or in combination. This review examines the literature available on the assessment and management of impaired airway clearance in neuromuscular weakness. PMID:19379290

  2. Weak bump quasars

    NASA Technical Reports Server (NTRS)

    Mcdowell, Jonathan C.; Elvis, Martin; Wilkes, Belinda J.; Willner, Steven P.; Oey, M. S.

    1989-01-01

    The recent emphasis on big bumps dominating the UV continuum of quasars has obscured the facts that bump properties vary widely and that there are objects in which no such component is evident. As part of a survey of quasar continuum spectra, a class of quasars is identified in which the optical-UV continuum big bump feature appears to be weak or absent, relative to both IR and X-ray. These weak bump quasars are otherwise normal objects and constitute a few percent of the quasar population.

  3. Weak shock reflection

    NASA Astrophysics Data System (ADS)

    Hunter, John K.; Brio, Moysey

    2000-05-01

    We present numerical solutions of a two-dimensional inviscid Burgers equation which provides an asymptotic description of the Mach reflection of weak shocks. In our numerical solutions, the incident, reflected, and Mach shocks meet at a triple point, and there is a supersonic patch behind the triple point, as proposed by Guderley for steady weak-shock reflection. A theoretical analysis indicates that there is an expansion fan at the triple point, in addition to the three shocks. The supersonic patch is extremely small, and this work is the first time it has been resolved.

  4. Rheology of weakly vibrated granular media

    NASA Astrophysics Data System (ADS)

    Wortel, Geert H.; Dijksman, Joshua A.; van Hecke, Martin

    2014-01-01

    We probe the rheology of weakly vibrated granular flows as function of flow rate, vibration strength, and pressure by performing experiments in a vertically vibrated split-bottom shear cell. For slow flows, we establish the existence of a vibration-dominated granular flow regime, where the driving stresses smoothly vanish as the driving rate is diminished. We distinguish three qualitatively different vibration-dominated rheologies, most strikingly a regime where the shear stresses no longer are proportional to the pressure.

  5. Anisotropy of weakly vibrated granular flows.

    PubMed

    Wortel, Geert H; van Hecke, Martin

    2015-10-01

    We experimentally probe the anisotropy of weakly vibrated flowing granular media. Depending on the driving parameters-flow rate and vibration strength-this anisotropy varies significantly. We show how the anisotropy collapses when plotted as a function of the driving stresses, uncovering a direct link between stresses and anisotropy. Moreover, our data suggest that for small anisotropies, the shear stresses vanish. Anisotropy of the fabric of granular media thus plays a crucial role in determining the rheology of granular flows. PMID:26565148

  6. Weak interactions, omnivory and emergent food-web properties.

    PubMed Central

    Emmerson, Mark; Yearsley, Jon M.

    2004-01-01

    Empirical studies have shown that, in real ecosystems, species-interaction strengths are generally skewed in their distribution towards weak interactions. Some theoretical work also suggests that weak interactions, especially in omnivorous links, are important for the local stability of a community at equilibrium. However, the majority of theoretical studies use uniform distributions of interaction strengths to generate artificial communities for study. We investigate the effects of the underlying interaction-strength distribution upon the return time, permanence and feasibility of simple Lotka-Volterra equilibrium communities. We show that a skew towards weak interactions promotes local and global stability only when omnivory is present. It is found that skewed interaction strengths are an emergent property of stable omnivorous communities, and that this skew towards weak interactions creates a dynamic constraint maintaining omnivory. Omnivory is more likely to occur when omnivorous interactions are skewed towards weak interactions. However, a skew towards weak interactions increases the return time to equilibrium, delays the recovery of ecosystems and hence decreases the stability of a community. When no skew is imposed, the set of stable omnivorous communities shows an emergent distribution of skewed interaction strengths. Our results apply to both local and global concepts of stability and are robust to the definition of a feasible community. These results are discussed in the light of empirical data and other theoretical studies, in conjunction with their broader implications for community assembly. PMID:15101699

  7. How robust is human gait to muscle weakness?

    PubMed Central

    van der Krogt, Marjolein M.; Delp, Scott L.; Schwartz, Michael H.

    2015-01-01

    Humans have a remarkable capacity to perform complex movements requiring agility, timing, and strength. Disuse, aging, and disease can lead to a loss of muscle strength, which frequently limits the performance of motor tasks. It is unknown, however, how much weakness can be tolerated before normal daily activities become impaired. This study examines the extent to which lower limb muscles can be weakened before normal walking is affected. We developed muscle-driven simulations of normal walking and then progressively weakened all major muscle groups, one at the time and simultaneously, to evaluate how much weakness could be tolerated before execution of normal gait became impossible. We further examined the compensations that arose as a result of weakening muscles. Our simulations revealed that normal walking is remarkably robust to weakness of some muscles but sensitive to weakness of others. Gait appears most robust to weakness of hip and knee extensors, which can tolerate weakness well and without a substantial increase in muscle stress. In contrast, gait is most sensitive to weakness of plantarflexors, hip abductors, and hip flexors. Weakness of individual muscles results in increased activation of the weak muscle, and in compensatory activation of other muscles. These compensations are generally inefficient, and generate unbalanced joint moments that require compensatory activation in yet other muscles. As a result, total muscle activation increases with weakness as does the cost of walking. By clarifying which muscles are critical to maintaining normal gait, our results provide important insights for developing therapies to prevent or improve gait pathology. PMID:22386624

  8. Weaknesses in Underperforming Schools

    ERIC Educational Resources Information Center

    van de Grift, Wim; Houtveen, Thoni

    2007-01-01

    In some Dutch elementary schools, the average performance of students over several years is significantly below the level that could be expected of them. This phenomenon is known as "underperformance." The most important identifiable weaknesses that go along with this phenomenon are that (a) learning material offered at school is insufficient to…

  9. Weak Radial Artery Pulse

    PubMed Central

    Venugopalan, Poothirikovil; Sivakumar, Puthuval; Ardley, Robert G.; Oates, Crispian

    2012-01-01

    We present an 11year-old boy with a weak right radial pulse, and describe the successful application of vascular ultrasound to identify the ulnar artery dominance and a thin right radial artery with below normal Doppler flow velocity that could explain the discrepancy. The implications of identifying this anomaly are discussed. PMID:22375269

  10. In praise of weakness

    NASA Astrophysics Data System (ADS)

    Steinberg, Aephraim; Feizpour, Amir; Rozema; Mahler; Hayat

    2013-03-01

    Quantum physics is being transformed by a radical new conceptual and experimental approach known as weak measurement that can do everything from tackling basic quantum mysteries to mapping the trajectories of photons in a Young's double-slit experiment. Aephraim Steinberg, Amir Feizpour, Lee Rozema, Dylan Mahler and Alex Hayat unveil the power of this new technique.

  11. Weak Lensing with LSST

    NASA Astrophysics Data System (ADS)

    Wittman, David M.; Jain, B.; Jarvis, M.; Knox, L.; Margoniner, V.; Takada, M.; Tyson, J.; Zhan, H.; LSST Weak Lensing Science Collaboration

    2006-12-01

    Constraining dark energy parameters with weak lensing is one of the primary science goals of the LSST. The LSST Weak Lensing Science Collaboration has been formed with the goal of optimizing the weak lensing science by optimizing the survey cadence; working with Data Management to insure high-quality pipeline processing which will meet our needs; developing the necessary analysis tools well before the onset of data-taking; participating in high-fidelity simulations to test the system end-to-end; and analyzing the real dataset as it becomes available. We review the major weak lensing probes, the twoand three-point shear correlations, and how they constrain dark energy parameters. We also review the possibility of going beyond dark energy models and testing gravity with the LSST data. To realize the promise of the awesome LSST statistical precision, we must ensure that systematic errors are kept under control. We review the major sources of systematics and our plans for mitigation. We present data that demonstrate that these sources of systematics can be kept to a level smaller than the statistical error.

  12. Group Threat and Policy Change: The Spatial Dynamics of Prohibition Politics, 1890-1919.

    PubMed

    Andrews, Kenneth T; Seguin, Charles

    2015-09-01

    The authors argue that group threat is a key driver of the adoption of new and controversial policies. Conceptualizing threat in spatial terms, they argue that group threat is activated through the joint occurrence of (1) proximity to threatening groups and (2) the population density of threatened groups. By analyzing the adoption of county and state "dry laws" banning alcohol from 1890 to 1919, they first show that prohibition victories were driven by the relative strength of supportive constituencies such as native whites and rural residents, vis-à-vis opponents such as Irish, Italian, or German immigrants or Catholics. Second, they show that threat contributed to prohibition victories: counties bordering large immigrant or urban populations, which did not themselves contain similar populations, were more likely to adopt dry laws. Threat arises primarily from interactions between spatially proximate units at the local level, and therefore higher-level policy change is not reducible to the variables driving local policy. PMID:26594715

  13. Hypernuclear Weak Decays

    NASA Astrophysics Data System (ADS)

    Itonaga, K.; Motoba, T.

    The recent theoretical studies of Lambda-hypernuclear weak decaysof the nonmesonic and pi-mesonic ones are developed with the aim to disclose the link between the experimental decay observables and the underlying basic weak decay interactions and the weak decay mechanisms. The expressions of the nonmesonic decay rates Gamma_{nm} and the decay asymmetry parameter alpha_1 of protons from the polarized hypernuclei are presented in the shell model framework. We then introduce the meson theoretical Lambda N -> NN interactions which include the one-meson exchanges, the correlated-2pi exchanges, and the chiral-pair-meson exchanges. The features of meson exchange potentials and their roles on the nonmesonic decays are discussed. With the adoption of the pi + 2pi/rho + 2pi/sigma + omega + K + rhopi/a_1 + sigmapi/a_1 exchange potentials, we have carried out the systematic calculations of the nonmesonic decay observables for light-to-heavy hypernuclei. The present model can account for the available experimental data of the decay rates, Gamma_n/Gamma_p ratios, and the intrinsic asymmetry parameters alpha_Lambda (alpha_Lambda is related to alpha_1) of emitted protons well and consistently within the error bars. The hypernuclear lifetimes are evaluated by converting the total weak decay rates Gamma_{tot} = Gamma_pi + Gamma_{nm} to tau, which exhibit saturation property for the hypernuclear mass A ≥ 30 and agree grossly well with experimental data for the mass range from light to heavy hypernuclei except for the very light ones. Future extensions of the model and the remaining problems are also mentioned. The pi-mesonic weak processes are briefly surveyed, and the calculations and predictions are compared and confirmed by the recent high precision FINUDA pi-mesonic decay data. This shows that the theoretical basis seems to be firmly grounded.

  14. Threat Assessment Teams Target School Crisis

    ERIC Educational Resources Information Center

    Stover, Del

    2005-01-01

    In this article, the author discusses the creation of a threat-assessment team to be utilized in order to analyze each threat and the usage of threat-assessment protocols for the purpose of guiding school administrators through a crisis. These are actually developed with the advice from the US Department of Education and the Secret Service. When a…

  15. Stereotype Threat, Test Anxiety, and Mathematics Performance

    ERIC Educational Resources Information Center

    Tempel, Tobias; Neumann, Roland

    2014-01-01

    We investigated the combined effects of stereotype threat and trait test anxiety on mathematics test performance. Stereotype threat and test anxiety interacted with each other in affecting performance. Trait test anxiety predicted performance only in a diagnostic condition that prevented stereotype threat by stereotype denial. A state measure of…

  16. 24 CFR 9.131 - Direct threat.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 24 Housing and Urban Development 1 2011-04-01 2011-04-01 false Direct threat. 9.131 Section 9.131... DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT § 9.131 Direct threat. (a) This part does not require the agency..., privileges, advantages and accommodations of that agency when that individual poses a direct threat to...

  17. 28 CFR 35.139 - Direct threat.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 28 Judicial Administration 1 2013-07-01 2013-07-01 false Direct threat. 35.139 Section 35.139... LOCAL GOVERNMENT SERVICES General Requirements § 35.139 Direct threat. (a) This part does not require a... activities of that public entity when that individual poses a direct threat to the health or safety of...

  18. 28 CFR 36.208 - Direct threat.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 28 Judicial Administration 1 2013-07-01 2013-07-01 false Direct threat. 36.208 Section 36.208... ACCOMMODATIONS AND IN COMMERCIAL FACILITIES General Requirements § 36.208 Direct threat. (a) This part does not... individual poses a direct threat to the health or safety of others. (b) In determining whether an...

  19. 28 CFR 36.208 - Direct threat.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 28 Judicial Administration 1 2012-07-01 2012-07-01 false Direct threat. 36.208 Section 36.208... ACCOMMODATIONS AND IN COMMERCIAL FACILITIES General Requirements § 36.208 Direct threat. (a) This part does not... individual poses a direct threat to the health or safety of others. (b) In determining whether an...

  20. 24 CFR 9.131 - Direct threat.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 24 Housing and Urban Development 1 2013-04-01 2013-04-01 false Direct threat. 9.131 Section 9.131... DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT § 9.131 Direct threat. (a) This part does not require the agency..., privileges, advantages and accommodations of that agency when that individual poses a direct threat to...

  1. 28 CFR 35.139 - Direct threat.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 28 Judicial Administration 1 2014-07-01 2014-07-01 false Direct threat. 35.139 Section 35.139... LOCAL GOVERNMENT SERVICES General Requirements § 35.139 Direct threat. (a) This part does not require a... activities of that public entity when that individual poses a direct threat to the health or safety of...

  2. 28 CFR 36.208 - Direct threat.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 28 Judicial Administration 1 2014-07-01 2014-07-01 false Direct threat. 36.208 Section 36.208... ACCOMMODATIONS AND IN COMMERCIAL FACILITIES General Requirements § 36.208 Direct threat. (a) This part does not... individual poses a direct threat to the health or safety of others. (b) In determining whether an...

  3. 28 CFR 36.208 - Direct threat.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 28 Judicial Administration 1 2011-07-01 2011-07-01 false Direct threat. 36.208 Section 36.208... ACCOMMODATIONS AND IN COMMERCIAL FACILITIES General Requirements § 36.208 Direct threat. (a) This part does not... individual poses a direct threat to the health or safety of others. (b) In determining whether an...

  4. 24 CFR 9.131 - Direct threat.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 24 Housing and Urban Development 1 2014-04-01 2014-04-01 false Direct threat. 9.131 Section 9.131... DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT § 9.131 Direct threat. (a) This part does not require the agency..., privileges, advantages and accommodations of that agency when that individual poses a direct threat to...

  5. 24 CFR 9.131 - Direct threat.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false Direct threat. 9.131 Section 9.131... DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT § 9.131 Direct threat. (a) This part does not require the agency..., privileges, advantages and accommodations of that agency when that individual poses a direct threat to...

  6. 28 CFR 35.139 - Direct threat.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 28 Judicial Administration 1 2012-07-01 2012-07-01 false Direct threat. 35.139 Section 35.139... LOCAL GOVERNMENT SERVICES General Requirements § 35.139 Direct threat. (a) This part does not require a... activities of that public entity when that individual poses a direct threat to the health or safety of...

  7. 28 CFR 35.139 - Direct threat.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 28 Judicial Administration 1 2011-07-01 2011-07-01 false Direct threat. 35.139 Section 35.139... LOCAL GOVERNMENT SERVICES General Requirements § 35.139 Direct threat. (a) This part does not require a... activities of that public entity when that individual poses a direct threat to the health or safety of...

  8. Identifying Separation Threats in Family Therapy.

    ERIC Educational Resources Information Center

    Argles, Paul

    1983-01-01

    Outlines the types of separation threats common in troubled families. Signs that threats are being used may include inappropriate clinging behavior, phobias, psychosomatic symptoms, and anxious attachment. Therapists may find other behaviors, often seen as problems in themselves, that are really reactions to perceived separation threats. (JAC)

  9. Weak Interactions and Instability Cascades.

    PubMed

    Kadoya, Taku; McCann, Kevin S

    2015-01-01

    Food web theory states that a weak interactor which is positioned in the food web such that it tends to deflect, or mute, energy away from a potentially oscillating consumer-resource interaction often enhances community persistence and stability. Here we examine how adding other weak interactions (predation/harvesting) on the stabilizing weak interactor alters the stability of food web using a set of well-established food web models/modules. We show that such "weak on weak" interaction chains drive an indirect dynamic cascade that can rapidly ignite a distant consumer-resource oscillator. Nonetheless, we also show that the "weak on weak" interactions are still more stable than the food web without them, and so weak interactions still generally act to stabilize food webs. Rather, these results are best interpreted to say that the degree of the stabilizing effect of a given important weak interaction can be severely compromised by other weak interactions (including weak harvesting). PMID:26219561

  10. Gonococcal endocarditis: an ever-present threat

    PubMed Central

    Kawabata, Vitor Sérgio; Bittencourt, Márcio Sommer; Lovisolo, Silvana Maria; Felipe-Silva, Aloísio; de Lemos, Ana Paula Silva

    2016-01-01

    The incidence of severe complications of the Neisseria gonorrhoeae infection has presented variations over recent decades since the advent of penicillin. Gonococcal endocarditis (GE) still remains an ever-present threat afflicting the society’s poor and sexually active young population. This entity frequently requires surgical intervention and usually exhibits a poor outcome. The interval between the onset of symptoms and the diagnosis does not usually exceed 4 weeks. One of the characteristics of GE is a proclivity for aortic valve involvement with large vegetation and valve ring abscess formation. The authors report the case of a young man with a 2-week history of fever, malaise, weakness, and progressive heart failure symptoms, who had no previous history of genital complaints or cardiopathy. The physical examination was consistent with acute aortic insufficiency, which was most probably of an infectious origin. The echocardiogram showed thickened aortic cusps and valve insufficiency. After hospital admission, the patient’s clinical status worsened rapidly and he died on the second day. The autopsy findings disclosed aortic valve destruction with vegetation and a ring abscess besides signs of septic shock, such as diffuse alveolar damage, acute tubular necrosis, and zone 3 hepatocellular necrosis. The blood culture isolated N. gonorrhoeae resistant to penicillin and ciprofloxacin. The authors call attention to the pathogen of this particular infectious endocarditis, and the need for early diagnosis and evaluation by a cardiac surgery team. PMID:27547739

  11. Gonococcal endocarditis: an ever-present threat.

    PubMed

    de Campos, Fernando Peixoto Ferraz; Kawabata, Vitor Sérgio; Bittencourt, Márcio Sommer; Lovisolo, Silvana Maria; Felipe-Silva, Aloísio; de Lemos, Ana Paula Silva

    2016-01-01

    The incidence of severe complications of the Neisseria gonorrhoeae infection has presented variations over recent decades since the advent of penicillin. Gonococcal endocarditis (GE) still remains an ever-present threat afflicting the society's poor and sexually active young population. This entity frequently requires surgical intervention and usually exhibits a poor outcome. The interval between the onset of symptoms and the diagnosis does not usually exceed 4 weeks. One of the characteristics of GE is a proclivity for aortic valve involvement with large vegetation and valve ring abscess formation. The authors report the case of a young man with a 2-week history of fever, malaise, weakness, and progressive heart failure symptoms, who had no previous history of genital complaints or cardiopathy. The physical examination was consistent with acute aortic insufficiency, which was most probably of an infectious origin. The echocardiogram showed thickened aortic cusps and valve insufficiency. After hospital admission, the patient's clinical status worsened rapidly and he died on the second day. The autopsy findings disclosed aortic valve destruction with vegetation and a ring abscess besides signs of septic shock, such as diffuse alveolar damage, acute tubular necrosis, and zone 3 hepatocellular necrosis. The blood culture isolated N. gonorrhoeae resistant to penicillin and ciprofloxacin. The authors call attention to the pathogen of this particular infectious endocarditis, and the need for early diagnosis and evaluation by a cardiac surgery team. PMID:27547739

  12. Weak Gravitational Lensing

    NASA Astrophysics Data System (ADS)

    Pires, Sandrine; Starck, Jean-Luc; Leonard, Adrienne; Réfrégier, Alexandre

    2012-03-01

    This chapter reviews the data mining methods recently developed to solve standard data problems in weak gravitational lensing. We detail the different steps of the weak lensing data analysis along with the different techniques dedicated to these applications. An overview of the different techniques currently used will be given along with future prospects. Until about 30 years ago, astronomers thought that the Universe was composed almost entirely of ordinary matter: protons, neutrons, electrons, and atoms. The field of weak lensing has been motivated by the observations made in the last decades showing that visible matter represents only about 4-5% of the Universe (see Figure 14.1). Currently, the majority of the Universe is thought to be dark, that is, does not emit electromagnetic radiation. The Universe is thought to be mostly composed of an invisible, pressure less matter - potentially relic from higher energy theories - called "dark matter" (20-21%) and by an even more mysterious term, described in Einstein equations as a vacuum energy density, called "dark energy" (70%). This "dark" Universe is not well described or even understood; its presence is inferred indirectly from its gravitational effects, both on the motions of astronomical objects and on light propagation. So this point could be the next breakthrough in cosmology. Today's cosmology is based on a cosmological model that contains various parameters that need to be determined precisely, such as the matter density parameter Omega_m or the dark energy density parameter Omega_lambda. Weak gravitational lensing is believed to be the most promising tool to understand the nature of dark matter and to constrain the cosmological parameters used to describe the Universe because it provides a method to directly map the distribution of dark matter (see [1,6,60,63,70]). From this dark matter distribution, the nature of dark matter can be better understood and better constraints can be placed on dark energy

  13. Weakly supervised glasses removal

    NASA Astrophysics Data System (ADS)

    Wang, Zhicheng; Zhou, Yisu; Wen, Lijie

    2015-03-01

    Glasses removal is an important task on face recognition, in this paper, we provide a weakly supervised method to remove eyeglasses from an input face image automatically. We choose sparse coding as face reconstruction method, and optical flow to find exact shape of glasses. We combine the two processes iteratively to remove glasses more accurately. The experimental results reveal that our method works much better than these algorithms alone, and it can remove various glasses to obtain natural looking glassless facial images.

  14. Asymptotically Safe Weak Interactions

    NASA Astrophysics Data System (ADS)

    Calmet, Xavier

    We emphasize that the electroweak interactions without a Higgs boson are very similar to quantum general relativity. The Higgs field could just be a dressing field and might not exist as a propagating particle. In that interpretation, the electroweak interactions without a Higgs boson could be renormalizable at the nonperturbative level because of a nontrivial fixed point. Tree-level unitarity in electroweak bosons scattering is restored by the running of the weak scale.

  15. Composite weak bosons

    SciTech Connect

    Suzuki, M.

    1988-04-01

    Dynamical mechanism of composite W and Z is studied in a 1/N field theory model with four-fermion interactions in which global weak SU(2) symmetry is broken explicitly by electromagnetic interaction. Issues involved in such a model are discussed in detail. Deviation from gauge coupling due to compositeness and higher order loop corrections are examined to show that this class of models are consistent not only theoretically but also experimentally.

  16. The role of threats in animal cooperation

    PubMed Central

    Cant, Michael A.

    2011-01-01

    In human societies, social behaviour is strongly influenced by threats of punishment, even though the threats themselves rarely need to be exercised. Recent experimental evidence suggests that similar hidden threats can promote cooperation and limit within-group selfishness in some animal systems. In other animals, however, threats appear to be ineffective. Here I review theoretical and empirical studies that help to understand the evolutionary causes of these contrasting patterns, and identify three factors—impact, accuracy and perception—that together determine the effectiveness of threats to induce cooperation. PMID:20798110

  17. Corium crust strength measurements.

    SciTech Connect

    Lomperski, S.; Nuclear Engineering Division

    2009-11-01

    Corium strength is of interest in the context of a severe reactor accident in which molten core material melts through the reactor vessel and collects on the containment basemat. Some accident management strategies involve pouring water over the melt to solidify it and halt corium/concrete interactions. The effectiveness of this method could be influenced by the strength of the corium crust at the interface between the melt and coolant. A strong, coherent crust anchored to the containment walls could allow the yet-molten corium to fall away from the crust as it erodes the basemat, thereby thermally decoupling the melt from the coolant and sharply reducing the cooling rate. This paper presents a diverse collection of measurements of the mechanical strength of corium. The data is based on load tests of corium samples in three different contexts: (1) small blocks cut from the debris of the large-scale MACE experiments, (2) 30 cm-diameter, 75 kg ingots produced by SSWICS quench tests, and (3) high temperature crusts loaded during large-scale corium/concrete interaction (CCI) tests. In every case the corium consisted of varying proportions of UO{sub 2}, ZrO{sub 2}, and the constituents of concrete to represent a LWR melt at different stages of a molten core/concrete interaction. The collection of data was used to assess the strength and stability of an anchored, plant-scale crust. The results indicate that such a crust is likely to be too weak to support itself above the melt. It is therefore improbable that an anchored crust configuration could persist and the melt become thermally decoupled from the water layer to restrict cooling and prolong an attack of the reactor cavity concrete.

  18. Stereotype threat and female communication styles.

    PubMed

    von Hippel, Courtney; Wiryakusuma, Cindy; Bowden, Jessica; Shochet, Megan

    2011-10-01

    A large body of research has documented the performance-debilitating effects of stereotype threat for individuals, but there is a paucity of research exploring interpersonal consequences of stereotype threat. Two experiments tested the hypothesis that stereotype threat would change the style in which women communicate. Results indicate that women who experience stereotype threat regarding leadership abilities react against the stereotype by adopting a more masculine communication style. Study 2 provides evidence that self-affirmation eliminates this effect of stereotype threat on women's communication styles. A third study demonstrates an ironic consequence of this effect of stereotype threat on women's communication--when women under stereotype threat adopt a more masculine communication style, they are rated as less warm and likeable, and evaluators indicate less willingness to comply with their requests. Theoretical and practical implications of these findings are discussed. PMID:21646549

  19. Human collective reactions to threat.

    PubMed

    Dezecache, Guillaume

    2015-01-01

    A common assumption regarding mass emergency situations is that individuals in such contexts behave in a way that maximizes their likelihood to escape, at the expense, or with little concern for, the welfare and survival of their neighbors. Doing so, they might even compromise the effectiveness of group evacuation. This conception follows the views of early works on crowd psychology, a tradition born with Gustave Le Bon's The Crowd: a study of the Popular Mind, first published in 1895, and which has had a tremendous impact on scientific representations of people's behavior in mass emergency contexts. Indeed, this work has greatly contributed to the idea that, in such situations, people revert to a primitive, impulsive, irrational, and antisocial nature, causing the breakdown of social order. However, more empirically oriented studies have consistently reported little collective panic, as well as a great deal of solidarity and pro-social behavior during mass emergency situations. Because of institutional barriers, such views have remained largely unknown to cognitive psychologists. Yet these are important results in that they show that human individual and collective reactions to threat are primarily affiliative. Indeed, far from leading to the breakdown of the social fabrics, the presence of a common threat can strengthen social bonds. PMID:26263225

  20. Threat sensitivity in bipolar disorder.

    PubMed

    Muhtadie, Luma; Johnson, Sheri L

    2015-02-01

    Life stress is a major predictor of the course of bipolar disorder. Few studies have used laboratory paradigms to examine stress reactivity in bipolar disorder, and none have assessed autonomic reactivity to laboratory stressors. In the present investigation we sought to address this gap in the literature. Participants, 27 diagnosed with bipolar I disorder and 24 controls with no history of mood disorder, were asked to complete a complex working memory task presented as "a test of general intelligence." Self-reported emotions were assessed at baseline and after participants were given task instructions; autonomic physiology was assessed at baseline and continuously during the stressor task. Compared to controls, individuals with bipolar disorder reported greater increases in pretask anxiety from baseline and showed greater cardiovascular threat reactivity during the task. Group differences in cardiovascular threat reactivity were significantly correlated with comorbid anxiety in the bipolar group. Our results suggest that a multimethod approach to assessing stress reactivity-including the use of physiological parameters that differentiate between maladaptive and adaptive profiles of stress responding-can yield valuable information regarding stress sensitivity and its associations with negative affectivity in bipolar disorder. (PsycINFO Database Record (c) 2015 APA, all rights reserved). PMID:25688436

  1. QM02 Strength Measurement

    SciTech Connect

    Welch, J; Wu, J.; /SLAC

    2010-11-24

    In late April, Paul Emma reported that his orbit fitting program could find a reasonably good fit only if the strength of QM02 was changed from design value of -5.83 kG to -6.25 kG - a strength change of 7.3%. In late May, we made a focal length measurement of QM02 by turning off all focusing optics between YC07 and BPMS1 (in the spectrometer line) except for QM02 and adjusted the strength of QM02 so that vertical kicks by YC07 did not produce any displacements at BPMS1 (see Figure 1). The result was quoted in the LCLS elog was that QM02 appeared to 6% too weak, and approximately agreed with Paul's observation. The analysis used for the entry in the log book was based on the thin lens approximation and used the following numbers: Distance YC07 to QM02 - 5.128 m; Distance QM02 to BPMS1 - 1.778 m; and Energy - 135 MeV. These distances were computed from the X,Z coordinates given the on the large plot of the Injector on the wall of the control room. On review of the MAD output file coordinates, it seems that the distance used for QM02 to BPMS1 is not 1.778 m. The correct value is Distance, center of QM02 to BPMS1 - 1.845 m. There may be a typo on the wall chart values for the coordinates of BPMS1, or perhaps there was a misinterpretation of edge versus center of QM02. In any case, the effect of this change is that the thin lens estimate changes from 6% too weak to 9% too weak. At John Galayda's suggestion, we looked into the thin lens versus thick lens approximation. A Mathematica program was written to solve for the K value of the QM02, in the thick lens approximation, that provides point to point focusing from YC07 to BPMS1, and to compare this number with the value obtained using the thin lens approximation. The length of QM02 used in the thick lens calculation is the effective length determined by magnetic measurements of 0.108 m. The result of the Mathematica calculation is that the thin lens approximation predicts less magnet strength is required to produce the

  2. Weakly broken galileon symmetry

    SciTech Connect

    Pirtskhalava, David; Santoni, Luca; Trincherini, Enrico; Vernizzi, Filippo

    2015-09-01

    Effective theories of a scalar ϕ invariant under the internal galileon symmetryϕ→ϕ+b{sub μ}x{sup μ} have been extensively studied due to their special theoretical and phenomenological properties. In this paper, we introduce the notion of weakly broken galileon invariance, which characterizes the unique class of couplings of such theories to gravity that maximally retain their defining symmetry. The curved-space remnant of the galileon’s quantum properties allows to construct (quasi) de Sitter backgrounds largely insensitive to loop corrections. We exploit this fact to build novel cosmological models with interesting phenomenology, relevant for both inflation and late-time acceleration of the universe.

  3. Weak decay of hypernuclei

    SciTech Connect

    Grace, R.

    1983-01-01

    The Moby Dick spectrometer (at BNL) in coincidence with a range spectrometer and a TOF neutron detector will be used to study the weak decay modes of /sup 12/C. The Moby Dick spectrometer will be used to reconstruct and tag events in which specific hypernuclear states are formed in the reaction K/sup -/ + /sup 12/C ..-->.. ..pi../sup -/ + /sup 12/C. Subsequent emission of decay products (pions, protons and neutrons) in coincidence with the fast forward pion will be detected in a time and range spectrometer, and a neutron detector.

  4. Countering the Nuclear Terrorist Threat

    SciTech Connect

    Vantine, H C

    2002-10-04

    The nuclear/radioactive threat to homeland security posed by terrorists can be broken into four categories. Of highest concern is the use of an improvised nuclear device (IND). An IND, as its name implies, is a nuclear explosive device. It produces nuclear yield, and this nuclear yield has catastrophic effects. An IND is the ultimate terrorist weapon, and terrorist groups are actively attempting to acquire nuclear weapons. Detonation of an IND could dwarf the devastation of the September 11 attack on the World Trade Center. Dealing with the aftermath of an IND would be horrific. Rescue efforts and cleanup would be hazardous and difficult. Workers would have to wear full protection suits and self-contained breathing apparatus. Because of the residual radioactivity, in certain locations they could only work short times before acquiring their ''lifetime'' dose. As with the Chernobyl event, some rescue workers might well expose themselves to lethal doses of radiation, adding to the casualty toll. Enormous volumes of contaminated debris would have to be removed and disposed. If a terrorist group decides not to pursue an actual nuclear device, it might well turn to Radiological Dispersal Devices (RDDs) or ''dirty bombs'' as they are often called. RDDs spread radioactivity but they do not generate nuclear yield. The fabrication of an RDD requires radioactive material and a dispersal mechanism. Radioactive materials are used all over the world for medical, industrial, and research applications. Standards for safe handling and accountability of radioactive material vary around the world. Stories in the press suggest inadequate controls on radiological materials in parts of the world. The effects of an RDD vary widely, and are measured in terms of contamination area, health effects to the exposed population, and economic consequences. Even a negligible, but measurable, exposure would exploit the general public's fear of things radioactive and would have significant

  5. Stereotype threat and executive functions: which functions mediate different threat-related outcomes?

    PubMed

    Rydell, Robert J; Van Loo, Katie J; Boucher, Kathryn L

    2014-03-01

    Stereotype threat research shows that women's math performance can be reduced by activating gender-based math stereotypes. Models of stereotype threat assert that threat reduces cognitive functioning, thereby accounting for its negative effects. This work provides a more detailed understanding of the cognitive processes through which stereotype threat leads women to underperform at math and to take risks, by examining which basic executive functions (inhibition, shifting, and updating) account for these outcomes. In Experiments 1 and 2, women under threat showed reduced inhibition, reduced updating, and reduced math performance compared with women in a control condition (or men); however, only updating accounted for women's poor math performance under threat. In Experiment 3, only updating accounted for stereotype threat's effect on women's math performance, whereas only inhibition accounted for the effect of threat on risk-taking, suggesting that distinct executive functions can account for different stereotype threat-related outcomes. PMID:24345711

  6. Enhanced Memory for both Threat and Neutral Information Under Conditions of Intergroup Threat

    PubMed Central

    Zhu, Yong; Zhao, Yufang; Ybarra, Oscar; Stephan, Walter G.; Yang, Qing

    2015-01-01

    Few studies have examined the effect of intergroup threat on cognitive outcomes such as memory. Different theoretical perspectives can inform how intergroup threat should affect memory for threat-relevant and neutral information, such as the mood-congruency approach, Yerkes–Dodson law, Easterbrook’s theory, and also evolutionary perspectives. To test among these, we conducted two experiments to examine how exposure to intergroup threats affected memory compared to control conditions. In study 1, we manipulated symbolic threat and examined participants’ memory for threat and neutral words. In study 2, memory performance was assessed following the induction of realistic threat. Across the studies, in the control condition participants showed better memory for threat-related than neutral information. However, participants under threat remembered neutral information as well as threat-related information. In addition, participants in the threat condition remembered threat-related information as well as participants in the control condition. The findings are discussed in terms of automatic vigilance processes but also the effects of threat on arousal and its effect on information processing. This latter perspective, suggests paradoxically, that under some circumstances involving an outgroup threat, non-threatening information about outgroups can be extensively processed. PMID:26635669

  7. Potential threats to offshore platforms

    SciTech Connect

    Jenkins, B.M.

    1988-01-01

    Increasingly spectacular acts of terrorism have led to growing concern that terrorists will move beyond the symbols of society and directly attack its technological and industrial vulnerabilities. Offshore platforms have been frequently mentioned among the potential targets terrorists might attack. This concern, however, has not resulted in extensive research like that devoted to possible threats to nuclear facilities, which have also been frequently mentioned as possible future targets of terrorists. For one thing, offshore drilling does not invoke the fear inherent in the word nuclear, a fear that translates directly into heavy security for the nuclear industry. Neither does the construction of offshore platforms provoke anything like the kind of protest generated by the construction of nuclear facilities.

  8. World's soils are under threat

    NASA Astrophysics Data System (ADS)

    Montanarella, L.; Pennock, D. J.; McKenzie, N. J.; Badraoui, M.; Chude, V.; Baptista, I.; Mamo, T.; Yemefack, M.; Singh Aulakh, M.; Yagi, K.; Hong, S. Young; Vijarnsorn, P.; Zhang, G.-L.; Arrouays, D.; Black, H.; Krasilnikov, P.; Sobocká, J.; Alegre, J.; Henriquez, C. R.; Mendonça-Santos, M. L.; Taboada, M.; Espinosa-Victoria, D.; AlShankiti, A.; AlaviPanah, S. K.; Elsheikh, E. A. E.; Hempel, J.; Camps Arbestain, M.; Nachtergaele, F.; Vargas, R.

    2015-12-01

    The Intergovernmental Technical Panel on Soils has completed the first State of the World's Soil Resources report. Globally soil erosion was identified as the gravest threat, leading to deteriorating water quality in developed regions and to lowering of crop yields in many developing regions. We need to increase nitrogen and phosphorus fertilizer use in infertile tropical and semi-tropical soils - the regions where the most food insecure among us are found - while reducing global use of these products overall. Stores of soil organic carbon are critical in the global carbon balance, and national governments must set specific targets to stabilize or ideally increase soil organic carbon stores. Finally the quality of soil information available for policy formulation must be improved - the regional assessments in the SWSR report frequently base their evaluations on studies from the 1990s based on observations made in the 1980s or earlier.

  9. World's soils are under threat

    NASA Astrophysics Data System (ADS)

    Montanarella, Luca; Pennock, Daniel Jon; McKenzie, Neil; Badraoui, Mohamed; Chude, Victor; Baptista, Isaurinda; Mamo, Tekalign; Yemefack, Martin; Singh Aulakh, Mikha; Yagi, Kazuyuki; Hong, Suk Young; Vijarnsorn, Pisoot; Zhang, Gan-Lin; Arrouays, Dominique; Black, Helaina; Krasilnikov, Pavel; Sobocká, Jaroslava; Alegre, Julio; Henriquez, Carlos Roberto; de Lourdes Mendonça-Santos, Maria; Taboada, Miguel; Espinosa-Victoria, David; AlShankiti, Abdullah; Kazem AlaviPanah, Sayed; El Mustafa Elsheikh, Elsiddig Ahmed; Hempel, Jon; Camps Arbestain, Marta; Nachtergaele, Freddy; Vargas, Ronald

    2016-02-01

    The Intergovernmental Technical Panel on Soils has completed the first State of the World's Soil Resources Report. Globally soil erosion was identified as the gravest threat, leading to deteriorating water quality in developed regions and to lowering of crop yields in many developing regions. We need to increase nitrogen and phosphorus fertilizer use in infertile tropical and semi-tropical soils - the regions where the most food insecurity among us are found - while reducing global use of these products overall. Stores of soil organic carbon are critical in the global carbon balance, and national governments must set specific targets to stabilize or ideally increase soil organic carbon stores. Finally the quality of soil information available for policy formulation must be improved - the regional assessments in the State of the World's Soil Resources Report frequently base their evaluations on studies from the 1990s based on observations made in the 1980s or earlier.

  10. Effect of evaluation threat on procrastination behavior.

    PubMed

    Bui, Ngoc H

    2007-06-01

    The author evaluated the effects of evaluation apprehension and trait procrastination on behaviors. The author examined private university students from southern California (N = 72) on two independent variables: evaluation threat (manipulated) and trait procrastination (nonmanipulated). The author found a significant interaction effect between type of evaluation threat and level of trait procrastination on the number of days to complete an assigned essay. Post hoc analyses showed high trait procrastinators in the high evaluation threat group significantly delayed returning essays compared with those in the low evaluation threat group. Also, in the low evaluation threat group, low trait procrastinators delayed more than did high trait procrastinators. These results suggest that educators can reduce behavioral delays by increasing evaluation threat, depending on a student's level of trait procrastination. PMID:17703786

  11. Sensor-guided threat countermeasure system

    DOEpatents

    Stuart, Brent C.; Hackel, Lloyd A.; Hermann, Mark R.; Armstrong, James P.

    2012-12-25

    A countermeasure system for use by a target to protect against an incoming sensor-guided threat. The system includes a laser system for producing a broadband beam and means for directing the broadband beam from the target to the threat. The countermeasure system comprises the steps of producing a broadband beam and directing the broad band beam from the target to blind or confuse the incoming sensor-guided threat.

  12. Weakly relativistic plasma expansion

    SciTech Connect

    Fermous, Rachid Djebli, Mourad

    2015-04-15

    Plasma expansion is an important physical process that takes place in laser interactions with solid targets. Within a self-similar model for the hydrodynamical multi-fluid equations, we investigated the expansion of both dense and under-dense plasmas. The weakly relativistic electrons are produced by ultra-intense laser pulses, while ions are supposed to be in a non-relativistic regime. Numerical investigations have shown that relativistic effects are important for under-dense plasma and are characterized by a finite ion front velocity. Dense plasma expansion is found to be governed mainly by quantum contributions in the fluid equations that originate from the degenerate pressure in addition to the nonlinear contributions from exchange and correlation potentials. The quantum degeneracy parameter profile provides clues to set the limit between under-dense and dense relativistic plasma expansions at a given density and temperature.

  13. Autonomous Realtime Threat-Hunting Robot (ARTHR

    ScienceCinema

    INL

    2009-09-01

    Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats.

  14. Hidden Markov models for threat prediction fusion

    NASA Astrophysics Data System (ADS)

    Ross, Kenneth N.; Chaney, Ronald D.

    2000-04-01

    This work addresses the often neglected, but important problem of Level 3 fusion or threat refinement. This paper describes algorithms for threat prediction and test results from a prototype threat prediction fusion engine. The threat prediction fusion engine selectively models important aspects of the battlespace state using probability-based methods and information obtained from lower level fusion engines. Our approach uses hidden Markov models of a hierarchical threat state to find the most likely Course of Action (CoA) for the opposing forces. Decision tress use features derived from the CoA probabilities and other information to estimate the level of threat presented by the opposing forces. This approach provides the user with several measures associated with the level of threat, including: probability that the enemy is following a particular CoA, potential threat presented by the opposing forces, and likely time of the threat. The hierarchical approach used for modeling helps us efficiently represent the battlespace with a structure that permits scaling the models to larger scenarios without adding prohibitive computational costs or sacrificing model fidelity.

  15. Autonomous Realtime Threat-Hunting Robot (ARTHR

    SciTech Connect

    INL

    2008-05-29

    Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats.

  16. DOE site-specific threat assessment

    SciTech Connect

    West, D.J.; Al-Ayat, R.A.; Judd, B.R.

    1985-07-12

    A facility manager faced with the challenges of protecting a nuclear facility against potential threats must consider the likelihood and consequences of such threats, know the capabilities of the facility safeguards and security systems, and make informed decisions about the cost-effectivness of safeguards and security upgrades. To help meet these challenges, the San Francisco Operations Office of the Department of Energy, in conjunction with the Lawrence Livermore Laboratory, has developed a site-specific threat assessment approach and a quantitative model to improve the quality and consistency of site-specific threat assessment and resultant security upgrade decisions at sensitive Department of Energy facilities. 5 figs.

  17. Ideology, Social Threat, and the Death Sentence: Capital Sentences across Time and Space

    ERIC Educational Resources Information Center

    Jacobs, David; Carmichael, Jason T.

    2004-01-01

    Capital punishment is the most severe criminal penalty, yet we know little about the factors that produce jurisdictional differences in the use of the death sentence. Political explanations emphasize conservative values and the strength of more conservative political parties. Threat accounts suggest that this sentence will be more likely in…

  18. Strong mobility in weakly disordered systems

    SciTech Connect

    Ben-naim, Eli; Krapivsky, Pavel

    2009-01-01

    We study transport of interacting particles in weakly disordered media. Our one-dimensional system includes (i) disorder, the hopping rate governing the movement of a particle between two neighboring lattice sites is inhomogeneous, and (ii) hard core interaction, the maximum occupancy at each site is one particle. We find that over a substantial regime, the root-mean-square displacement of a particle s grows superdiffusively with time t, {sigma}{approx}({epsilon}t){sup 2/3}, where {epsilon} is the disorder strength. Without disorder the particle displacement is subdiffusive, {sigma} {approx}t{sup 1/4}, and therefore disorder strongly enhances particle mobility. We explain this effect using scaling arguments, and verify the theoretical predictions through numerical simulations. Also, the simulations show that regardless of disorder strength, disorder leads to stronger mobility over an intermediate time regime.

  19. Weak measurements beyond the Aharonov-Albert-Vaidman formalism

    SciTech Connect

    Wu Shengjun; Li Yang

    2011-05-15

    We extend the idea of weak measurements to the general case, provide a complete treatment, and obtain results for both the regime when the preselected and postselected states (PPS) are almost orthogonal and the regime when they are exactly orthogonal. We surprisingly find that for a fixed interaction strength, there may exist a maximum signal amplification and a corresponding optimum overlap of PPS to achieve it. For weak measurements in the orthogonal regime, we find interesting quantities that play the same role that weak values play in the nonorthogonal regime.

  20. Enhancing entanglement trapping by weak measurement and quantum measurement reversal

    SciTech Connect

    Zhang, Ying-Jie; Han, Wei; Fan, Heng; Xia, Yun-Jie

    2015-03-15

    In this paper, we propose a scheme to enhance trapping of entanglement of two qubits in the environment of a photonic band gap material. Our entanglement trapping promotion scheme makes use of combined weak measurements and quantum measurement reversals. The optimal promotion of entanglement trapping can be acquired with a reasonable finite success probability by adjusting measurement strengths. - Highlights: • Propose a scheme to enhance entanglement trapping in photonic band gap material. • Weak measurement and its reversal are performed locally on individual qubits. • Obtain an optimal condition for maximizing the concurrence of entanglement trapping. • Entanglement sudden death can be prevented by weak measurement in photonic band gap.

  1. Inferring the nature of anthropogenic threats from long-term abundance records.

    PubMed

    Shoemaker, Kevin T; Akçakaya, H Resit

    2015-02-01

    Diagnosing the processes that threaten species persistence is critical for recovery planning and risk forecasting. Dominant threats are typically inferred by experts on the basis of a patchwork of informal methods. Transparent, quantitative diagnostic tools would contribute much-needed consistency, objectivity, and rigor to the process of diagnosing anthropogenic threats. Long-term census records, available for an increasingly large and diverse set of taxa, may exhibit characteristic signatures of specific threatening processes and thereby provide information for threat diagnosis. We developed a flexible Bayesian framework for diagnosing threats on the basis of long-term census records and diverse ancillary sources of information. We tested this framework with simulated data from artificial populations subjected to varying degrees of exploitation and habitat loss and several real-world abundance time series for which threatening processes are relatively well understood: bluefin tuna (Thunnus maccoyii) and Atlantic cod (Gadus morhua) (exploitation) and Red Grouse (Lagopus lagopus scotica) and Eurasian Skylark (Alauda arvensis) (habitat loss). Our method correctly identified the process driving population decline for over 90% of time series simulated under moderate to severe threat scenarios. Successful identification of threats approached 100% for severe exploitation and habitat loss scenarios. Our method identified threats less successfully when threatening processes were weak and when populations were simultaneously affected by multiple threats. Our method selected the presumed true threat model for all real-world case studies, although results were somewhat ambiguous in the case of the Eurasian Skylark. In the latter case, incorporation of an ancillary source of information (records of land-use change) increased the weight assigned to the presumed true model from 70% to 92%, illustrating the value of the proposed framework in bringing diverse sources of

  2. Dynamic Strength Ceramic Nanocomposites Under Pulse Loading

    NASA Astrophysics Data System (ADS)

    Skripnyak, Evgeniya G.; Skripnyak, Vladimir V.; Vaganova, Irina K.; Skripnyak, Vladimir A.

    2015-06-01

    Multi-scale computer simulation approach has been applied to research of strength of nanocomposites under dynamic loading. The influence of mesoscopic substructures on the dynamic strength of ceramic and hybrid nanocomposites, which can be formed using additive manufacturing were numerically investigated. At weak shock wave loadings the shear strength and the spall strength of ceramic and hybrid nanocomposites depends not only phase concentration and porosity, but size parameters of skeleton substructures. The influence of skeleton parameter on the shear strength and the spall strength of ceramic nanocomposites with the same concentration of phases decreases with increasing amplitude of the shock pulse of microsecond duration above the double amplitude of the Hugoniot elastic limit of nanocomposites. This research carried out in 2014 -2015 was supported by grant from The Tomsk State University Academic D.I. Mendeleev Fund Program and also Ministry of Sciences and Education of Russian Federation (State task 2014/223, project 1943, Agreement 14.132.

  3. Shades of Threat: Racial Identity as a Moderator of Stereotype Threat

    ERIC Educational Resources Information Center

    Davis, Claytie, III; Aronson, Joshua; Salinas, Moises

    2006-01-01

    This study investigated Black racial identity attitudes as a moderator of intellectual performance in potentially stereotype threatening situations. Ninety-eight African American students were randomly assigned to one of three stereotype threatening conditions: low threat, medium threat, or high threat. Analyses confirmed a stereotype threat…

  4. The Nature of the Bioterrorism Threat

    SciTech Connect

    Regens, J. L.

    2003-02-25

    This analysis provides an overview of the nature of the bioterrorism threat. It identifies potential CDC Class A biological agents that are likely candidates for use in a terrorist incident and describes the known sources of vulnerability. The paper also summarizes S&T resources/needs and assesses response options for achieving effective biodefense against terrorist threats.

  5. Stereotype Threat, Identity Salience, and Spatial Reasoning

    ERIC Educational Resources Information Center

    McGlone, Matthew S.; Aronson, Joshua

    2006-01-01

    Stereotype threat research provides insight into how the low standardized test scores of students from stigmatized social groups may derive in part from the negative performance expectations about these groups. Because these students belong to many social groups, one means of mitigating the threat is to remind them of their membership in groups…

  6. Development of the Academic Stereotype Threat Inventory

    ERIC Educational Resources Information Center

    Pseekos, A. Chantelle; Dahlen, Eric R.; Levy, Jacob J.

    2008-01-01

    The authors describe the development and preliminary validation of the Academic Stereotype Threat Inventory, a self-report measurement of math-related stereotype threat among women. A preliminary version of the instrument was administered to 308 undergraduate women. Principal component analysis yielded a 3-factor solution. Convergent and…

  7. The Smallpox Threat: The School Nurse's Role

    ERIC Educational Resources Information Center

    Martin, Mary E.; Didion, Judy

    2003-01-01

    Today, with the threat of bioterrorism and war, there is a new dimension to the traditional role of the school nurse. The smallpox threat to public health will invoke the school nurse's role as an educator, liaison, and consultant in the community. This article discusses smallpox, the vaccination process, adverse effects, and postvaccination care.…

  8. Bombs and Bomb Threats in the School

    ERIC Educational Resources Information Center

    Starkey, David J.; Starkey, John D.

    1977-01-01

    Bombs and the threat of bombing can leave school personnel faced by an explosive hazard without knowledge of what to do. Therefore, a preplanned response is necessary. Discusses four major stages of dealing with bombs and bomb threats. (Author/RK)

  9. Bomb Threats and Bomb Search Techniques.

    ERIC Educational Resources Information Center

    Department of the Treasury, Washington, DC.

    This pamphlet explains how to be prepared and plan for bomb threats and describes procedures to follow once a call has been received. The content covers (1) preparation for bomb threats, (2) evacuation procedures, (3) room search methods, (4) procedures to follow once a bomb has been located, and (5) typical problems that search teams will…

  10. Nuclear threats from small states

    SciTech Connect

    Kahan, J.H.

    1994-06-13

    What are the policy implications regarding proliferation and counter proliferation of nuclear weapons among Third World states. How does deterrence operate outside the parameters of superpower confrontation as defined by the cold war elaborate system of constraints enforced by concepts like mutual assured destruction, and counter-value and counter-force targeting. How can US policymakers devise contingencies for dealing with nuclear threats posed by countries like North Korea, Libya, Iraq, Iran, and Syria. These are some of the unsettling but nevertheless important questions addressed by the author in this monograph. In his analysis, Mr. Jerome Kahan examines the likelihood that one or more of these countries will use nuclear weapons before the year 2000. He also offers a framework that policymakers and planners might use in assessing US interests in preempting the use of nuclear weapons or in retaliating for their use. Ironically, with the end of the cold war, it is imperative that defense strategists, policymakers, and military professionals think about the `unthinkable`. In the interest of fostering debate on this important subject, the Strategic Studies Institute commends this insightful monograph.

  11. In Brief: Forecasting meningitis threats

    NASA Astrophysics Data System (ADS)

    Showstack, Randy

    2008-12-01

    The University Corporation for Atmospheric Research (UCAR), in conjunction with a team of health and weather organizations, has launched a project to provide weather forecasts to medical officials in Africa to help reduce outbreaks of meningitis. The forecasts will enable local health care providers to target vaccination programs more effectively. In 2009, meteorologists with the National Center for Atmospheric Research, which is managed by UCAR, will begin issuing 14-day forecasts of atmospheric conditions in Ghana. Later, UCAR plans to work closely with health experts from several African countries to design and test a decision support system to provide health officials with useful meteorological information. ``By targeting forecasts in regions where meningitis is a threat, we may be able to help vulnerable populations. Ultimately, we hope to build on this project and provide information to public health programs battling weather-related diseases in other parts of the world,'' said Rajul Pandya, director of UCAR's Community Building Program. Funding for the project comes from a $900,000 grant from Google.org, the philanthropic arm of the Internet search company.

  12. Forecasting Lightning Threat using Cloud-Resolving Model Simulations

    NASA Technical Reports Server (NTRS)

    McCaul, Eugene W., Jr.; Goodman, Steven J.; LaCasse, Katherine M.; Cecil, Daniel J.

    2008-01-01

    Two new approaches are proposed and developed for making time and space dependent, quantitative short-term forecasts of lightning threat, and a blend of these approaches is devised that capitalizes on the strengths of each. The new methods are distinctive in that they are based entirely on the ice-phase hydrometeor fields generated by regional cloud-resolving numerical simulations, such as those produced by the WRF model. These methods are justified by established observational evidence linking aspects of the precipitating ice hydrometeor fields to total flash rates. The methods are straightforward and easy to implement, and offer an effective near-term alternative to the incorporation of complex and costly cloud electrification schemes into numerical models. One method is based on upward fluxes of precipitating ice hydrometeors in the mixed phase region at the-15 C level, while the second method is based on the vertically integrated amounts of ice hydrometeors in each model grid column. Each method can be calibrated by comparing domain-wide statistics of the peak values of simulated flash rate proxy fields against domain-wide peak total lightning flash rate density data from observations. Tests show that the first method is able to capture much of the temporal variability of the lightning threat, while the second method does a better job of depicting the areal coverage of the threat. Our blended solution is designed to retain most of the temporal sensitivity of the first method, while adding the improved spatial coverage of the second. Exploratory tests for selected North Alabama cases show that, because WRF can distinguish the general character of most convective events, our methods show promise as a means of generating quantitatively realistic fields of lightning threat. However, because the models tend to have more difficulty in predicting the instantaneous placement of storms, forecasts of the detailed location of the lightning threat based on single

  13. Inferences from counterfactual threats and promises.

    PubMed

    Egan, Suzanne M; Byrne, Ruth M J

    2012-01-01

    We examine how people understand and reason from counterfactual threats, for example, "if you had hit your sister, I would have grounded you" and counterfactual promises, for example, "if you had tidied your room, I would have given you ice-cream." The first experiment shows that people consider counterfactual threats, but not counterfactual promises, to have the illocutionary force of an inducement. They also make the immediate inference that the action mentioned in the "if" part of the counterfactual threat and promise did not occur. The second experiment shows that people make more negative inferences (modus tollens and denial of the antecedent) than affirmative inferences (modus ponens and affirmation of the consequent) from counterfactual threats and promises, unlike indicative threats and promises. We discuss the implications of the results for theories of the mental representations and cognitive processes that underlie conditional inducements. PMID:22580411

  14. Strength loss in kraft pulping

    NASA Astrophysics Data System (ADS)

    Iribarne, Jose

    Unbleached kraft pulps from two U.S. mills were 21% and 26% weaker than comparable laboratory pulps from the same chip sources, when assessed as the tear index at a tensile index of 70 kN.m/kg. The phenomena involved were clarified by characterizing the differences between the mill and laboratory pulps in terms of fundamental fiber properties. All of the strength loss could be explained by a reduction in intrinsic fiber strength of 9% to 11%, as estimated from wet zero-span tensile tests and fiber length distributions. Most of the effects of different fiber shape and length were isolated by PFI mill refining and decrilling, respectively. The higher fiber coarseness of mill pulps was a factor in their maximum density and bond strength, but changes in these variables were analogous to those of laboratory pups due to similar swelling. Specific bond strength, determined from a wet pressing experiment, was similar in mill and laboratory pulps. Neither carbohydrate composition nor crystalline structure, assessed through x-ray diffraction analysis, were significant factors in the observed fiber strength differences. The mill pulps were not more heterogeneous than the laboratory pulps, within the resolution of a fractionation experiment. The number of weak points in each pulp was assessed through analysis of the amount of fiber cutting during PFI mill refining and treatments with potassium superoxide or cellulase. The results suggested that the chemistry of kraft pulping preferentially weaken short, slender fibers, while mechanical stresses during the hot discharge of batch digesters mainly affect long, thick fibers. The greater number of weak points in the long-fiber fractions of mill pulps is probably associated with their lower wet zero-span tensile indices. Automated optical detection of major singularities with a prototype instrument suggested that only the weak points induced by mechanical stress could be detected by local variations in birefringence. In contrast

  15. Promoting dental hygiene to children: comparing traditional and interactive media following threat appeals.

    PubMed

    Panic, Katarina; Cauberghe, Veroline; De Pelsmacker, Patrick

    2014-01-01

    Until now, social marketing campaigns mainly targeted children using traditional media. However, little is known about the effectiveness of computer games to communicate health-related information to children. This study compares the impact of an interactive game as a medium to provide health information and improve children's dietary habits to the impact of more traditional media. Using a 2 × 3 between-subject factorial design with 190 children (7-9 years old), this study investigates the effect of threat messages (weak vs. strong) concerning dental hygiene on behavioral outcome (snack choice), and how this effect is moderated by the type of medium used to communicate subsequent health information after the threat appeal (computer game, information brochure, narrative story). Results show a positive significant effect of perceived threat on children's adaptive behavior. However, this effect only remains significant when afterwards children are exposed to a narrative health-related story. When children play a game or read a brochure, they need to devote more attention to process this content, distracting them from the original threat message. In sum, when a threat message is followed by additional health information, the medium through which this information is presented influences the effectiveness of the preceding threat message. PMID:24393019

  16. Plasma transport theory spanning weak to strong coupling

    SciTech Connect

    Daligault, Jérôme; Baalrud, Scott D.

    2015-06-29

    We describe some of the most striking characteristics of particle transport in strongly coupled plasmas across a wide range of Coulomb coupling strength. We then discuss the effective potential theory, which is an approximation that was recently developed to extend conventional weakly coupled plasma transport theory into the strongly coupled regime in a manner that is practical to evaluate efficiently.

  17. Forecasting Lightning Threat Using WRF Proxy Fields

    NASA Technical Reports Server (NTRS)

    McCaul, E. W., Jr.

    2010-01-01

    Objectives: Given that high-resolution WRF forecasts can capture the character of convective outbreaks, we seek to: 1. Create WRF forecasts of LTG threat (1-24 h), based on 2 proxy fields from explicitly simulated convection: - graupel flux near -15 C (captures LTG time variability) - vertically integrated ice (captures LTG threat area). 2. Calibrate each threat to yield accurate quantitative peak flash rate densities. 3. Also evaluate threats for areal coverage, time variability. 4. Blend threats to optimize results. 5. Examine sensitivity to model mesh, microphysics. Methods: 1. Use high-resolution 2-km WRF simulations to prognose convection for a diverse series of selected case studies. 2. Evaluate graupel fluxes; vertically integrated ice (VII). 3. Calibrate WRF LTG proxies using peak total LTG flash rate densities from NALMA; relationships look linear, with regression line passing through origin. 4. Truncate low threat values to make threat areal coverage match NALMA flash extent density obs. 5. Blend proxies to achieve optimal performance 6. Study CAPS 4-km ensembles to evaluate sensitivities.

  18. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility,...

  19. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility,...

  20. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility,...

  1. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility,...

  2. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility,...

  3. Universal mechanism for Anderson and weak localization.

    PubMed

    Filoche, Marcel; Mayboroda, Svitlana

    2012-09-11

    Localization of stationary waves occurs in a large variety of vibrating systems, whether mechanical, acoustical, optical, or quantum. It is induced by the presence of an inhomogeneous medium, a complex geometry, or a quenched disorder. One of its most striking and famous manifestations is Anderson localization, responsible for instance for the metal-insulator transition in disordered alloys. Yet, despite an enormous body of related literature, a clear and unified picture of localization is still to be found, as well as the exact relationship between its many manifestations. In this paper, we demonstrate that both Anderson and weak localizations originate from the same universal mechanism, acting on any type of vibration, in any dimension, and for any domain shape. This mechanism partitions the system into weakly coupled subregions. The boundaries of these subregions correspond to the valleys of a hidden landscape that emerges from the interplay between the wave operator and the system geometry. The height of the landscape along its valleys determines the strength of the coupling between the subregions. The landscape and its impact on localization can be determined rigorously by solving one special boundary problem. This theory allows one to predict the localization properties, the confining regions, and to estimate the energy of the vibrational eigenmodes through the properties of one geometrical object. In particular, Anderson localization can be understood as a special case of weak localization in a very rough landscape. PMID:22927384

  4. Weak localization with nonlinear bosonic matter waves

    SciTech Connect

    Hartmann, Timo; Michl, Josef; Petitjean, Cyril; Wellens, Thomas; Urbina, Juan-Diego; Richter, Klaus; Schlagheck, Peter

    2012-08-15

    We investigate the coherent propagation of dilute atomic Bose-Einstein condensates through irregularly shaped billiard geometries that are attached to uniform incoming and outgoing waveguides. Using the mean-field description based on the nonlinear Gross-Pitaevskii equation, we develop a diagrammatic theory for the self-consistent stationary scattering state of the interacting condensate, which is combined with the semiclassical representation of the single-particle Green function in terms of chaotic classical trajectories within the billiard. This analytical approach predicts a universal dephasing of weak localization in the presence of a small interaction strength between the atoms, which is found to be in good agreement with the numerically computed reflection and transmission probabilities of the propagating condensate. The numerical simulation of this quasi-stationary scattering process indicates that this interaction-induced dephasing mechanism may give rise to a signature of weak antilocalization, which we attribute to the influence of non-universal short-path contributions. - Highlights: Black-Right-Pointing-Pointer Numerical simulation of scattering of Bose-Einstein condensate through billiards. Black-Right-Pointing-Pointer Novel analytical semiclassical theory for nonlinear coherent scattering. Black-Right-Pointing-Pointer Inversion of weak localization due to mean-field interaction within the condensate. Black-Right-Pointing-Pointer Relevance of non-universal short-path contributions.

  5. Insider threat to secure facilities: data analysis

    SciTech Connect

    Not Available

    1980-05-09

    Three data sets drawn from industries that have experienced internal security breaches are analyzed. The industries and the insider security breaches are considered analogous in one or more respects to insider threats potentially confronting managers in the nuclear industry. The three data sets are: bank fraud and embezzlement (BF and E), computer-related crime, and drug theft from drug manufacturers and distributors. A careful analysis by both descriptive and formal statistical techniques permits certain general conclusions on the internal threat to secure industries to be drawn. These conclusions are discussed and related to the potential insider threat in the nuclear industry. 49 tabs.

  6. THE BIOTERRORISM THREAT: TECHNOLOGICAL AND POLITICAL CONSIDERATIONS

    SciTech Connect

    J. F. PILAT

    2000-03-01

    Bioterrorism--along with biowarfare, from which it may not always be distinguishable in practice--will be a feature of the strategic landscape in the 21st century and is high on the US national security agenda. Bioterrorism poses a potential threat to the US population, agriculture, interests, friends and allies, and military forces (asymmetric threats). Yet these possibilities have not been widely pursued or realized by terrorists. The perceived threat is far worse than anything experienced to date, and is largely technologically driven.

  7. Phase Diagram of the Bose Hubbard Model with Weak Links

    NASA Astrophysics Data System (ADS)

    Hettiarachchilage, Kalani; Rousseau, Valy; Tam, Ka-Ming; Moreno, Juana; Jarrell, Mark; Sheehy, Daniel

    2012-02-01

    We study the ground state phase diagram of strongly interacting ultracold Bose gas in a one-dimensional optical lattice with a tunable weak link, by means of Quantum Monte Carlo simulation. This model contains an on-site repulsive interaction (U) and two different near-neighbor hopping terms, J and t, for the weak link and the remainder of the chain, respectively. We show that by reducing the strength of J, a novel intermediate phase develops which is compressible and non-superfluid. This novel phase is identified as a Normal Bose Liquid (NBL) which does not appear in the phase diagram of the homogeneous bosonic Hubbard model. Further, we find a linear variation of the phase boundary of Normal Bose Liquid (NBL) to SuperFluid (SF) as a function of the strength of the weak link. These results may provide a new path to design advanced atomtronic devices in the future.

  8. Examining Perceived Stereotype Threat among Overweight/Obese Adults Using a Multi-Threat Framework

    PubMed Central

    Carels, Robert A.; Domoff, Sarah E.; Burmeister, Jacob M.; Koball, Afton M.; Hinman, Nova G.; Davis, Alan K.; Oehlhof, Marissa Wagner; Leroy, Michelle; Bannon, Erin; Hoffmann, Debra A.

    2013-01-01

    Objective The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group) and source (i.e., the self or others). This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. Method 216 adults completed an online survey. Participants’ mean age was 23.6 (SD 10.1; range 18–64) years and mean BMI was 31.6 (SD 7.5) kg/m2. Results Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI) and individual factors (i.e., group identity, stigma consciousness, fear of fat). Conclusion Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals’ susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes’ impact on cognitive and behavioral outcomes. PMID:23736227

  9. Children's Threats: When Are They Serious?

    MedlinePlus

    ... TV shows, movies, music, magazines, comics, books, video games, and Internet sites mental illness, such as depression, ... others are concerned? When a child makes a serious threat it should not be dismissed as just ...

  10. Heat Waves Pose Big Health Threats

    MedlinePlus

    ... news/fullstory_159744.html Heat Waves Pose Big Health Threats Kids, elderly among those at greatest risk, ... Illness Seniors' Health Recent Health News Related MedlinePlus Health Topics Child Safety Heat Illness Seniors' Health About ...