Science.gov

Sample records for weaknesses threats strengths

  1. Big Data and Health Economics: Strengths, Weaknesses, Opportunities and Threats.

    PubMed

    Collins, Brendan

    2016-02-01

    'Big data' is the collective name for the increasing capacity of information systems to collect and store large volumes of data, which are often unstructured and time stamped, and to analyse these data by using regression and other statistical techniques. This is a review of the potential applications of big data and health economics, using a SWOT (strengths, weaknesses, opportunities, threats) approach. In health economics, large pseudonymized databases, such as the planned care.data programme in the UK, have the potential to increase understanding of how drugs work in the real world, taking into account adherence, co-morbidities, interactions and side effects. This 'real-world evidence' has applications in individualized medicine. More routine and larger-scale cost and outcomes data collection will make health economic analyses more disease specific and population specific but may require new skill sets. There is potential for biomonitoring and lifestyle data to inform health economic analyses and public health policy. PMID:26093888

  2. Strengths Weaknesses Opportunities and Threats of Blended Learning: Students’ Perceptions

    PubMed Central

    Hande, S

    2014-01-01

    Background: Blended learning (BL) in a cell biology course of the premedical program at the Kasturba Medical College International Centre, Manipal, India, commenced in 2006. The program provides training in basic sciences to students, especially from the United States and Canada. The approach to the study was phenomenographic, with a qualitative study design using an open-ended questionnaire, focused interviews and empirical observations. Aim: The aim of this study was to identify the strengths, weaknesses, opportunities and threats (SWOT) of BL in a premedical class. Subjects and Methods: It was a cross-sectional study. Ninety six students in a premedical cell biology class participated in the study. SWOT analysis of students’ perceptions was conducted manually. Statistical analysis included content analysis of qualitative data to classify data and aligning them into the SWOT analysis matrix. Results: The outcomes of the study revealed student perceptions in terms of SWOT of BL and the potential uses of this strategy. Conclusions: The study provides background for educators and curriculum experts to plan their modules while incorporating a BL approach. PMID:24971204

  3. Health Education in India: A Strengths, Weaknesses, Opportunities, and Threats (SWOT) Analysis

    ERIC Educational Resources Information Center

    Sharma, Manoj

    2005-01-01

    The purpose of this study was to conduct a strengths, weaknesses, opportunities, and threats (SWOT) analysis of the health education profession and discipline in India. Materials from CINAHL, ERIC, MEDLINE, and Internet were collected to conduct the open coding of the SWOT analysis. Strengths of health education in India include an elaborate…

  4. Role of editors and journals in detecting and preventing scientific misconduct: strengths, weaknesses, opportunities, and threats.

    PubMed

    Marusic, Ana; Katavic, Vedran; Marusic, Matko

    2007-09-01

    Scientific journals have a central place in protecting research integrity because published articles are the most visible documentation of research. We used SWOT analysis to audit (S)trengths and (W)eaknesses as internal and (O)pportunities and (T)hreats as external factors affecting journals' responsibility in addressing research integrity issues. Strengths include editorial independence, authority and expertise, power to formulate editorial policies, and responsibility for the integrity of published records. Weaknesses stem from having no mandate for legal action, reluctance to get involved, and lack of training. Opportunities for editors are new technologies for detecting misconduct, policies by editorial organization or national institutions, and greater transparency of published research. Editors face threats from the lack of legal regulation and culture of research integrity in academic communities, lack of support from stakeholders in scientific publishing, and different pressures. Journal editors cannot be the policing force of the scientific community but they should actively ensure the integrity of the scientific record. PMID:17970252

  5. Partitioning in aqueous two-phase systems: Analysis of strengths, weaknesses, opportunities and threats.

    PubMed

    Soares, Ruben R G; Azevedo, Ana M; Van Alstine, James M; Aires-Barros, M Raquel

    2015-08-01

    For half a century aqueous two-phase systems (ATPSs) have been applied for the extraction and purification of biomolecules. In spite of their simplicity, selectivity, and relatively low cost they have not been significantly employed for industrial scale bioprocessing. Recently their ability to be readily scaled and interface easily in single-use, flexible biomanufacturing has led to industrial re-evaluation of ATPSs. The purpose of this review is to perform a SWOT analysis that includes a discussion of: (i) strengths of ATPS partitioning as an effective and simple platform for biomolecule purification; (ii) weaknesses of ATPS partitioning in regard to intrinsic problems and possible solutions; (iii) opportunities related to biotechnological challenges that ATPS partitioning may solve; and (iv) threats related to alternative techniques that may compete with ATPS in performance, economic benefits, scale up and reliability. This approach provides insight into the current status of ATPS as a bioprocessing technique and it can be concluded that most of the perceived weakness towards industrial implementation have now been largely overcome, thus paving the way for opportunities in fermentation feed clarification, integration in multi-stage operations and in single-step purification processes. PMID:26213222

  6. The voluntary community health movement in India: a strengths, weaknesses, opportunities, and threats (SWOT) analysis.

    PubMed

    Sharma, M; Bhatia, G

    1996-12-01

    There has been a prolific growth of voluntary organizations in India since independence in 1947. One of the major areas of this growth has been in the field of community health. The purpose of this article is to historically trace the voluntary movement in community health in India, analyze the current status, and predict future trends of voluntary efforts. A review of the literature in the form of a Strengths, Weaknesses, Opportunities, and Threats (SWOT) analysis was the method of this study. Some of the key trends which emerged as the priority areas for progress and for strengthening voluntary organizations in the future were enhancing linkages between health and development; building upon collective force; greater utilization of participatory training; establishing egalitarian and effectual linkages for decision making at the international level; developing self-reliant community-based models; and the need for attaining holistic empowerment at individual, organizational, and community levels through "duty consciousness" as opposed to merely asking for rights. PMID:8912121

  7. Analysis of Strengths, Weaknesses, Opportunities, and Threats as a Tool for Translating Evidence into Individualized Medical Strategies (I-SWOT)

    PubMed Central

    von Kodolitsch, Yskert; Bernhardt, Alexander M.; Robinson, Peter N.; Kölbel, Tilo; Reichenspurner, Hermann; Debus, Sebastian; Detter, Christian

    2015-01-01

    Background It is the physicians’ task to translate evidence and guidelines into medical strategies for individual patients. Until today, however, there is no formal tool that is instrumental to perform this translation. Methods We introduce the analysis of strengths (S) and weaknesses (W) related to therapy with opportunities (O) and threats (T) related to individual patients as a tool to establish an individualized (I) medical strategy (I-SWOT). The I-SWOT matrix identifies four fundamental types of strategy. These comprise “SO” maximizing strengths and opportunities, “WT” minimizing weaknesses and threats, “WO” minimizing weaknesses and maximizing opportunities, and “ST” maximizing strengths and minimizing threats. Each distinct type of strategy may be considered for individualized medical strategies. Results We describe four steps of I-SWOT to establish an individualized medical strategy to treat aortic disease. In the first step, we define the goal of therapy and identify all evidence-based therapeutic options. In a second step, we assess strengths and weaknesses of each therapeutic option in a SW matrix form. In a third step, we assess opportunities and threats related to the individual patient, and in a final step, we use the I-SWOT matrix to establish an individualized medical strategy through matching “SW” with “OT”. As an example we present two 30-year-old patients with Marfan syndrome with identical medical history and aortic pathology. As a result of I-SWOT analysis of their individual opportunities and threats, we identified two distinct medical strategies in these patients. Conclusion I-SWOT is a formal but easy to use tool to translate medical evidence into individualized medical strategies. PMID:27069939

  8. Strengths, weaknesses, opportunities and threats of the pig health monitoring systems used in England.

    PubMed

    Stärk, K D C; Nevel, A

    2009-10-17

    Several systems are being used in England to record information about the health of pigs. The British Pig Health Scheme (BPHS), the National Animal Disease Information System (NADIS), the Zoonoses Action Plan (ZAP) for Salmonella and the Veterinary Investigation Diagnosis Analysis (VIDA) system have been assessed to make recommendations for their future separate or joint development. The structure, organisation, processes, data quality, dissemination, utilisation and acceptance of each system have been assessed. Information was extracted from documents and websites, and informal interviews were conducted with technical experts and stakeholders. The systems covered a broad range of objectives, used variable approaches and operated at very different scales and budgets. There was a high level of awareness and involvement by the industry. Common weaknesses of the systems were the lack of in-depth quantitative analysis of the data, the lack of assessment of each system's impact, and the unknown level of bias as a result of the voluntary or selective participation in them. PMID:19850852

  9. An Examination of the Strengths, Weaknesses, Opportunities, and Threats Associated with the Adoption of Moodle[TM] by eXtension

    ERIC Educational Resources Information Center

    Hightower, Tayla Elise; Murphrey, Theresa Pesl; Coppernoll, Susanna Mumm; Jahedkar, Jennifer; Dooley, Kim E.

    2011-01-01

    The use of technology to deliver programming across Extension has been addressed widely; however, little research has been conducted concerning the use of Moodle[TM] as a course management system for Extension. The purpose of the study reported here was to identify the strengths, weaknesses, opportunities, and threats associated with the use of…

  10. Special Education and Rehabilitation in Georgia: Strengths, Weakness, Opportunities, and Threats in a Newly-Independent State of the Former Soviet Union.

    ERIC Educational Resources Information Center

    Hobbs, Tim; Szydlowski, Steven; West, Daniel, Jr.; Germava, Otar

    2002-01-01

    Forty-nine Georgian professionals from the fields of health, education, and rehabilitation were brought together for a week-long workshop to discuss issues related to disability, rehabilitation, and special education. Workshop activities included a SWOT (strengths, weaknesses, opportunities, and threats) analysis of special education in Georgia.…

  11. Perceived Strengths, Weaknesses, Opportunities, and Threats Impacting the Diffusion of Distance Education Technologies in a College of Agriculture and Life Sciences.

    ERIC Educational Resources Information Center

    Murphrey, Theresa Pesl; Dooley, Kim E.

    2000-01-01

    Interviews with administrators, faculty, and support staff (n=42) in a university agriculture department revealed that they recognized distance technology as a means of reaching new audiences; policies and procedures must expand to address technology issues; competition, external dependence, and Internet misinformation were threats.…

  12. Crossing Institutional Boundaries: Writing Strengths and Weaknesses.

    ERIC Educational Resources Information Center

    Lumpkins, Julie

    At any level, good writing requires an acknowledgment of writing strengths and weaknesses by both student and instructor. The four project collaborators/writing teachers outlined six specific areas on a teacher feedback sheet to note students' writing strengths and weaknesses; the areas of purpose, audience, thesis, development, organization, and…

  13. Weakness

    MedlinePlus

    Lack of strength; Muscle weakness ... feel weak but have no real loss of strength. This is called subjective weakness. It may be ... flu. Or, you may have a loss of strength that can be noted on a physical exam. ...

  14. Cultural Capital: Strengths, Weaknesses and Two Advancements

    ERIC Educational Resources Information Center

    van de Werfhorst, Herman G.

    2010-01-01

    In this paper I discuss two weaknesses in Bourdieu's work on cultural capital, both of which are related to his integration of the multidimensional nature of social space in different domains of life: social mobility, lifestyle differentiation, and political orientation. First, there is an anomaly between the work on social mobility and on…

  15. The Hidden Strengths of Weak Theories

    PubMed Central

    Keil, Frank

    2012-01-01

    There has been a strong tradition of assuming that concepts, and their patterns of formation might be best understood in terms of how they are embedded in theory-like sets of beliefs. Although such views of concepts as embedded in theories have been criticized on five distinct grounds, there are reasonable responses to each of these usual objections. There is, however, a newly emerging concern that is much more challenging to address – people’s intuitive theories seem to be remarkably impoverished. In fact, they are so impoverished it is difficult to see how they could provide the necessary structure to explain differences between concepts and how they might form in development. One response to this recent challenge is to abandon all views of concept structure as being related to people’s intuitive theories and see concepts as essentially structure-free atoms. The alternative proposed here argues that our very weak theories might in fact do a great deal of work in explaining how we form concepts and are able to use them to successfully refer. PMID:25309684

  16. School-Based Sexuality Education in Portugal: Strengths and Weaknesses

    ERIC Educational Resources Information Center

    Rocha, Ana Cristina; Leal, Cláudia; Duarte, Cidália

    2016-01-01

    Portugal, like many other countries, faces obstacles regarding school-based sexuality education. This paper explores Portuguese schools' approaches to implementing sexuality education at a local level, and provides a critical analysis of potential strengths and weaknesses. Documents related to sexuality education in a convenience sample of 89…

  17. Radiochemistry in the twenty-first century: Strenghts, weaknesses, opportunities and threats

    NASA Astrophysics Data System (ADS)

    de Goeij, J. J. M.

    2003-01-01

    Strengths, weaknesses, opportunities and threats of radiochemistry and associated nuclear chemistry are discussed. For that purpose radiochemistry is subdivided into three categories. The first category covers fundamental aspects, e.g. nuclear reaction cross-sections, production routes with associated yields and radionuclidic impurities, decay schemes, radiochemical separations, recoil and hot-atom chemistry, isotope effects and fractionation, and interaction of radiation with matter and detection. The second category covers topics where radioactivity is inextricably involved, e.g. the nuclear fuel cycle, very heavy elements and other actinides, primordial and cosmogenic radioactivity, and radionuclide techniques for dating. The third category involves radioactivity as essential part of a technique. On one hand radioactivity is used here as source of ionising radiation for food conservation, polymerisation of plastics, sterilisation, radiotherapy and pain palliation. On the other hand it is used to get information on systems and materials, via radiotracer methods and nuclear activation techniques. In particular the latter field is experiencing strong competition with other, non-nuclear methods. In this frame it is indicated what is required to achieve a situation where nuclear analytical techniques may successfully be exploited to the full extent of their potentials, particularly in providing valuable and sometimes unique information.

  18. Strength trapped within weakness/ weakness trapped within strength: the influence of family of origin experiences on the lives of abused women.

    PubMed

    Buchbinder, Eli; Birnbaum, Liora

    2010-06-01

    By conceptualizing abused women as victims or survivors, the literature offers two contradictory narratives of abused women. The aim of this article is to show that these two narratives are not mutually exclusive but rather can be used simultaneously to represent battered women's existential experiences. The study sample was comprised of 20 Israeli battered women. Three in-depth interviews were conducted with each participant-twice for data collection purposes and once for validating the themes that emerged from the content analysis. "Strength trapped in weakness/weakness trapped in strength" was found to be a dominant theme in the life narratives of the interviewees. Most interviewees grew up in families of origin in distress; most were abused physically and emotionally. Although this anguish colored their lives with pain and turmoil, their experiences were the key to their ability to overcome difficulties. From the onset, interviewees' lives were marked by a sense of threat and deprivation, but these very difficulties were also the source of a sense of power that emerged from the women's struggle with their past. In their attempts to cope with and transcend the legacies of their past, interviewees' feelings oscillated continuously between past and present, creating a unique powerful sense of simultaneously being victims and survivors. Implications for intervention are suggested. PMID:20445077

  19. [Management models in clinical nutrition: weaknesses and strengths].

    PubMed

    García de Lorenzo, A; Alvarez, J; Burgos, R; Cabrerizo, L; Farrer, K; García Almeida, J M; García Luna, P P; García Peris, P; Llano, J Del; Planas, M; Piñeiro, G

    2009-01-01

    At the 6th Abbott-SENPE Debate Forum a multidisciplinary and multiprofessional discussion was established in order to seek for the model or the models of clinical management most appropriate for Clinical Nutrition and Dietetics Units (CNAD) in Spain. The weaknesses and strengths as well as opportunities for the current systems were assessed concluding that a certain degree of disparity was observed not only due to regional differences but also to different hospital types. It was proposed, from SENPE, the creation of a working group helping to standardize the models and promote the culture of Integral Control and Change Management. PMID:19593481

  20. Strengths and Weaknesses of NESTs and NNESTs: Perceptions of NNESTs in Hong Kong

    ERIC Educational Resources Information Center

    Ma, Lai Ping Florence

    2012-01-01

    Since non-native English speaking teachers (NNESTs) are always compared with native English speaking teachers (NESTs) on linguistic grounds, their strengths and weaknesses as English teachers are worthy of investigation. This paper reports on a mixed methods study which examines the strengths and weaknesses of NNESTs and NESTs through the…

  1. Committee Effectiveness in Higher Education: The Strengths and Weaknesses of Group Decision Making

    ERIC Educational Resources Information Center

    Bates, Stephen B.

    2014-01-01

    Focusing on five models of committee effectiveness for purposes of this assessment will lend insight into the strengths and weaknesses of utilizing a structured action plan as a guide to achieving and maintaining optimum committee effectiveness in higher education. In the compilation of the strengths and weaknesses of committee decision making,…

  2. Judges Cite Current Trends, Comment on Strengths and Weaknesses.

    ERIC Educational Resources Information Center

    Smith, Helen F.

    1995-01-01

    Features opinions of newspaper and yearbook judges as to the state of student publications. Cites as strengths: graphic devices, more pull-out quotes, more double-page spreads with dominant elements, and overall improvement in the quality of magazines. Cites as trends: overdoing opinion at the expense of research, and too many stories that are…

  3. Objective Evaluation of Muscle Strength in Infants with Hypotonia and Muscle Weakness

    ERIC Educational Resources Information Center

    Reus, Linda; van Vlimmeren, Leo A.; Staal, J. Bart; Janssen, Anjo J. W. M.; Otten, Barto J.; Pelzer, Ben J.; Nijhuis-van der Sanden, Maria W. G.

    2013-01-01

    The clinical evaluation of an infant with motor delay, muscle weakness, and/or hypotonia would improve considerably if muscle strength could be measured objectively and normal reference values were available. The authors developed a method to measure muscle strength in infants and tested 81 typically developing infants, 6-36 months of age, and 17…

  4. Models of Viscosity: Strengths, Weaknesses and the Challenges

    NASA Astrophysics Data System (ADS)

    Russell, K.; Giordano, D.; Dingwell, D. B.

    2007-12-01

    properties, and to work over a wider range of melt conditions (composition and temperature). Other models fail because they use a non-Arrhenian formulation, or they are calibrated for an extremely small range of melt conditions, or they predict unphysical values of viscosity in the limits, or they are over-parameterized and cannot be extrapolated beyond the original calibration dataset. Our model predicts, within inter-laboratory experimental error, viscosity and other melt properties (i.e., Tg amd m) for most of the T-X space found in natural silicate melts. Despite its strengths, there is room for improvement. Firstly, our model incorporates the effects of H2O and F, but does not account for other important volatiles, including CO2, S, Cl. Secondly, Fe is treated as a single species whereas melts contain variable proportions of ferric and ferrous iron. Thirdly, we do not model pressure effects on melt viscosity which is needed for modeling melt transport within the lithosphere. Lastly, our model is strictly empirical, in that, the components we have chosen have no explicit or independent relationship to the structure or speciation of the silicate melt. Future models may benefit from the use of a component basis that reflects melt speciation. Giordano, D. Russell, J.K. & Dingwell, D.B. (In Review, July 07) Viscosity of magmatic liquids: A model. EPSL

  5. In the students' own words: what are the strengths and weaknesses of the dental school curriculum?

    PubMed

    Henzi, David; Davis, Elaine; Jasinevicius, Roma; Hendricson, William

    2007-05-01

    Dental students have little input into the selection of course topics and subject matter included in their dental curricula. Curriculum requirements are framed by the Commission on Dental Accreditation, which has stipulated competencies and associated biomedical and clinical knowledge that must be addressed during dental school. Although these competency requirements restrict the variance of educational experiences, students are eager to share their views on the curriculum within the realm of their educational experience. The objective of this research project was to elicit the perspectives of dental students from a broad cross-section of U.S. and Canadian dental schools about their education. A total of 605 students (285 sophomores, 220 seniors, 100 residents) from twenty North American dental schools completed a SWOT (Strengths, Weaknesses, Opportunities, and Threats) analysis to communicate their perceptions of the curriculum. Students were also asked to provide their impressions of the overall quality of the educational program in an open-ended written format. The students' qualitative comments were then reviewed and categorized into key issues or themes. Resulting themes for each category of the Curriculum SWOT (C-SWOT) analysis were the following. Strengths: 1) clinical learning experience, and 2) opportunity to work with knowledgeable faculty. Weaknesses: 1) disorganized and inefficient clinical learning environment, 2) teaching and testing that focus on memorization, 3) poor quality instruction characterized by curricular disorganization, and 4) inconsistency among instructors during student evaluations. Opportunities: 1) develop strategies to provide students with more exposure to patients, especially early in the curriculum, and 2) opportunities to learn new technology/techniques. Threats: 1) cost of dental education, 2) students' concerns about faculty "brain drain," i.e., lack of sufficient numbers of dental faculty capable of providing high

  6. Internationally Adopted Children in the Early School Years: Relative Strengths and Weaknesses in Language Abilities

    ERIC Educational Resources Information Center

    Glennen, Sharon

    2015-01-01

    Purpose: This study aimed to determine the relative strengths and weaknesses in language and verbal short-term memory abilities of school-age children who were adopted from Eastern Europe. Method: Children adopted between 1;0 and 4;11 (years;months) of age were assessed with the Clinical Evaluation of Language Fundamentals-Preschool, Second…

  7. Identifying Profiles of Reading Strengths and Weaknesses at the Secondary Level

    ERIC Educational Resources Information Center

    Trentman, Allison M. McCarthy

    2012-01-01

    The purpose of this study was to evaluate the feasibility and potential utility of reading profiles to identify common patterns of reading strengths and weaknesses among students in high school with deficit reading skills. A total of 55 students from three Midwestern high schools were administered a battery of assessments that targeted specific…

  8. The Strengths and Weaknesses of Total Quality Management in Higher Education.

    ERIC Educational Resources Information Center

    Hazzard, Terry

    This paper defines Total Quality Management (TQM), discusses its origins, and identifies its strengths and weaknesses as they apply to higher education. The paper defines TQM as a philosophy of organizations that defines quality and improves organizational performance and administrative systems. The system originated from statistical quality…

  9. Profiles of Strengths and Weaknesses in Dyslexia and Other Learning Difficulties

    ERIC Educational Resources Information Center

    Everatt, John; Weeks, Sally; Brooks, Peter

    2008-01-01

    A total of 83 children with different special educational needs (SEN) assessments were contrasted with a control group (N = 40) without special needs on measures that aimed to identify potential areas of strengths as well as weaknesses in these SEN groups. Carefully selected groups of dyslexics, dyspraxics, children with specific language…

  10. Patterns of Cognitive Strengths and Weaknesses: Identification Rates, Agreement, and Validity for Learning Disabilities Identification

    ERIC Educational Resources Information Center

    Miciak, Jeremy; Fletcher, Jack M.; Stuebing, Karla K.; Vaughn, Sharon; Tolar, Tammy D.

    2014-01-01

    Few empirical investigations have evaluated learning disabilities (LD) identification methods based on a pattern of cognitive strengths and weaknesses (PSW). This study investigated the reliability and validity of two proposed PSW methods: the concordance/discordance method (C/DM) and cross battery assessment (XBA) method. Cognitive assessment…

  11. Building a Performance-Based Assessment System To Diagnose Strengths and Weaknesses in Reading Achievement.

    ERIC Educational Resources Information Center

    Hennings, Sara S.; Hughes, Kay E.

    This paper provides a brief description of the development of the Diagnostic Assessments of Reading with Trial Teaching Strategies (DARTTS) program by F. G. Roswell and J. S. Chall. It also describes the editorial and statistical procedures that were used to validate the program for determining students' strengths and weaknesses in important areas…

  12. Strength and fatigue of zirconia-induced weak spots in optical fiber

    NASA Astrophysics Data System (ADS)

    Breuls, Anton H. E.; Svenson, T.

    1994-03-01

    The reliability of long lengths of fibers in optical cables is determined by the presence of weak spots which are infrequently produced by normal fiber production methods. It is important to investigate the influence on strength of fiber from different kinds of weak spots. The present study is confined to weak spots resulting from melted-in zirconia particles. Tensile testing of optical fiber, in which strength degrading particles of a roughly dual-size distribution have been introduced on purpose, was done At a wide range of stress rates. The Weibull plots of tensile strength of the fiber were compared with a theoretical distribution, based on a simple relation between particle size and fiber strength. In this way, failure modes could be identified and related to the size of particles. From the comparison it was concluded that the size of zirconia particles has no significant influence on the fatigue of fiber, within the applied stress rates. A significant retardment of the fatigue of weak spots was also observed at low stress rates.

  13. The power of the mind: the cortex as a critical determinant of muscle strength/weakness.

    PubMed

    Clark, Brian C; Mahato, Niladri K; Nakazawa, Masato; Law, Timothy D; Thomas, James S

    2014-12-15

    We tested the hypothesis that the nervous system, and the cortex in particular, is a critical determinant of muscle strength/weakness and that a high level of corticospinal inhibition is an important neurophysiological factor regulating force generation. A group of healthy individuals underwent 4 wk of wrist-hand immobilization to induce weakness. Another group also underwent 4 wk of immobilization, but they also performed mental imagery of strong muscle contractions 5 days/wk. Mental imagery has been shown to activate several cortical areas that are involved with actual motor behaviors, including premotor and M1 regions. A control group, who underwent no interventions, also participated in this study. Before, immediately after, and 1 wk following immobilization, we measured wrist flexor strength, voluntary activation (VA), and the cortical silent period (SP; a measure that reflect corticospinal inhibition quantified via transcranial magnetic stimulation). Immobilization decreased strength 45.1 ± 5.0%, impaired VA 23.2 ± 5.8%, and prolonged the SP 13.5 ± 2.6%. Mental imagery training, however, attenuated the loss of strength and VA by ∼50% (23.8 ± 5.6% and 12.9 ± 3.2% reductions, respectively) and eliminated prolongation of the SP (4.8 ± 2.8% reduction). Significant associations were observed between the changes in muscle strength and VA (r = 0.56) and SP (r = -0.39). These findings suggest neurological mechanisms, most likely at the cortical level, contribute significantly to disuse-induced weakness, and that regular activation of the cortical regions via imagery attenuates weakness and VA by maintaining normal levels of inhibition. PMID:25274345

  14. Does Weak Turbulence Impact PMSEs' Strengths Closer To The Northern Pole?

    NASA Astrophysics Data System (ADS)

    Swarnalingam, N.; Hocking, W. K.; Janches, D.; Nicolls, M. J.

    2015-12-01

    Existing 51.0 MHz VHF radar at Eureka (80N, 86W) in northern Canada is located closer to both the northern magnetic and geomagnetic poles. A recent calibrated study of Polar Mesosphere Summer Echoes (PMSE) using this radar supports the previous results by other radars that the absolute signal strength of PMSE in this region is relatively weak compared with the radar observations located at high latitudes. Although very cold temperature and existence of charged ice particles are the most important ingredient required for PMSE to appear, several other factors could potentially influence the absolute signal strengths of these echoes. One of them is neutral air turbulence. Previous studies indicate that upper mesospheric turbulence's strength decreases with latitudes, especially in the very high latitudes [Becker, 2004; Lubken et. al., 2009]. In this study, we investigate long-term mesospheric turbulence strengths at Eureka and study how they could be associated with the weak PMSE signal strengths compared with other high latitude conditions, where PMSE are strong.

  15. Profiles of strengths and weaknesses in dyslexia and other learning difficulties.

    PubMed

    Everatt, John; Weeks, Sally; Brooks, Peter

    2008-02-01

    A total of 83 children with different special educational needs (SEN) assessments were contrasted with a control group (N = 40) without special needs on measures that aimed to identify potential areas of strengths as well as weaknesses in these SEN groups. Carefully selected groups of dyslexics, dyspraxics, children with specific language difficulties, moderate learning disabilities, attention deficits and emotional/behavioural disorders were assessed on measures of literacy, phonological and verbal skills, non-verbal ability, problem behaviour scales and cognitive interference. Scores indicated that individual measures were relatively poor at specifically differentiating one SEN group from the controls and that all SEN groups presented evidence of literacy deficits despite potentially different causes for such acquisition difficulties. For most of the six SEN groups targeted, assessments that considered strengths as well as weaknesses provided a profile that specifically differentiated the group from the controls in contrast to the other SEN groups tested. PMID:17659648

  16. Targeting cancer’s weaknesses (not its strengths): Therapeutic strategies suggested by the atavistic model

    PubMed Central

    Lineweaver, Charles H.; Davies, Paul C.W.; Vincent, Mark D.

    2014-01-01

    In the atavistic model of cancer progression, tumor cell dedifferentiation is interpreted as a reversion to phylogenetically earlier capabilities. The more recently evolved capabilities are compromised first during cancer progression. This suggests a therapeutic strategy for targeting cancer: design challenges to cancer that can only be met by the recently evolved capabilities no longer functional in cancer cells. We describe several examples of this target-the-weakness strategy. Our most detailed example involves the immune system. The absence of adaptive immunity in immunosuppressed tumor environments is an irreversible weakness of cancer that can be exploited by creating a challenge that only the presence of adaptive immunity can meet. This leaves tumor cells more vulnerable than healthy tissue to pathogenic attack. Such a target-the-weakness therapeutic strategy has broad applications, and contrasts with current therapies that target the main strength of cancer: cell proliferation. PMID:25043755

  17. Can stereotype threat affect motor performance in the absence of explicit monitoring processes? Evidence using a strength task.

    PubMed

    Chalabaev, Aïna; Brisswalter, Jeanick; Radel, Rémi; Coombes, Stephen A; Easthope, Christopher; Clément-Guillotin, Corentin

    2013-04-01

    Previous evidence shows that stereotype threat impairs complex motor skills through increased conscious monitoring of task performance. Given that one-step motor skills may not be susceptible to these processes, we examined whether performance on a simple strength task may be reduced under stereotype threat. Forty females and males performed maximum voluntary contractions under stereotypical or nullified-stereotype conditions. Results showed that the velocity of force production within the first milliseconds of the contraction decreased in females when the negative stereotype was induced, whereas maximal force did not change. In males, the stereotype induction only increased maximal force. These findings suggest that stereotype threat may impair motor skills in the absence of explicit monitoring processes, by influencing the planning stage of force production. PMID:23535978

  18. Strength of iron at core pressures and evidence for a weak Earth’s inner core

    SciTech Connect

    Gleason, A. E.; Mao, W. L.

    2013-05-12

    The strength of iron at extreme conditions is crucial information for interpreting geophysical observations of the Earth’s core and understanding how the solid inner core deforms. However, the strength of iron, on which deformation depends, is challenging to measure and accurately predict at high pressure. Here we present shear strength measurements of iron up to pressures experienced in the Earth’s core. Hydrostatic X-ray spectroscopy and non-hydrostatic radial X-ray diffraction measurements of the deviatoric strain in hexagonally close-packed iron uniquely determine its shear strength to pressures above 200 GPa at room temperature. Applying numerical modelling of the rheologic behaviour of iron under pressure, we extrapolate our experimental results to inner-core pressures and temperatures, and find that the bulk shear strength of hexagonally close-packed iron is only ~ 1 GPa at the conditions of the Earth’s centre, 364 GPa and 5,500 K. This suggests that the inner core is rheologically weak, which supports dislocation creep as the dominant creep mechanism influencing deformation.

  19. Motivated Implicit Theories of Personality: My Weaknesses Will Go Away, but My Strengths Are Here to Stay.

    PubMed

    Steimer, Andreas; Mata, André

    2016-04-01

    Across six studies, this research found consistent evidence for motivated implicit theories about personality malleability: People perceive their weaknesses as more malleable than their strengths. Moreover, motivation also influences how people see themselves in the future, such that they expect their present strengths to remain constant, but they expect their present weaknesses to improve in the future. Several additional findings suggest the motivational nature of these effects: The difference in perceived malleability for strengths versus weaknesses was only observed for the self, not for other people. When the desirability of possessing a certain trait was manipulated, that trait was perceived to be more malleable when it was depicted as undesirable. And these different beliefs that people have about how malleable their traits are, and how they will develop in the future, were associated with their desire for change, which is higher for weaknesses versus strengths. PMID:26984009

  20. Early experience affects the strength of vigilance for threat in rhesus monkey infants

    PubMed Central

    Mandalaywala, Tara M.; Parker, Karen J.; Maestripieri, Dario

    2014-01-01

    Both human and nonhuman primates exhibit a cognitive bias to social threat, but little is known about how this bias develops. We investigated the development of threat bias in free-ranging infant rhesus macaques (Macaca mulatta) at 3 (N = 45) and 9 (N = 46) months of age. Three-month-old infant monkeys did not display bias, but 9-month-olds exhibited increased maintenance of attention to threatening social stimuli (vigilance for threat). To examine whether the social environment affected vigilance for threat, behavioral data on maternal rank and protectiveness were collected across the first 12 weeks of life for infants tested at 9 months. Nine-month-old infants of high-ranking mothers and more protective mothers displayed greater vigilance for threat than infants of lower-ranking and less protective mothers. These results demonstrate that infant social cognition is malleable and shaped by mothers both directly (protectiveness) and indirectly (rank), as maternal characteristics affect infants’ social experiences. PMID:25125426

  1. Pulse wave analysis and pulse wave velocity: a critical review of their strengths and weaknesses.

    PubMed

    Davies, Justine Ina; Struthers, Allan D

    2003-03-01

    The study of the pulse using the technique of applanation tonometry is undergoing a resurgence with the development of new computerized equipment. We aim here to present a critical review of the uses, potential uses, strengths and weaknesses of the technique of applanation tonometry for the assessment of augmentation index and pulse wave velocity. We will review the technique of applanation tonometry, the physiological factors affecting pulse wave velocity and pulse wave analysis, the changes in pulse wave velocity and pulse wave analysis with pharmacological interventions, and the use of the technique of applanation tonometry as a prognostic tool. We conclude that, although the technique of applanation tonometry initially seems promising, several pertinent issues need to be addressed before it can be used reliably as a clinical or research tool. Importantly, use of the technique of applanation tonometry to derive the central waveform from non-invasively acquired peripheral data needs to be validated prospectively. PMID:12640232

  2. Appreciating the Strengths and Weaknesses of Transthoracic Echocardiography in Hemodynamic Assessments

    PubMed Central

    Huang, Stephen J.; McLean, Anthony S.

    2012-01-01

    Transthoracic echocardiography (TTE) is becoming the choice of hemodynamic assessment tool in many intensive care units. With an ever increasing number of training programs available worldwide, learning the skills to perform TTE is no longer a limiting factor. Instead, the future emphasis will be shifted to teach the users how to recognize measurement errors and artefacts (internal validity), to realize the limitations of TTE in various applications, and finally how to apply the information to the patient in question (external validity). This paper aims to achieve these objectives in a common area of TTE application—hemodynamic assessments. We explore the strengths and weaknesses of TTE in such assessments in this paper. Various methods of hemodynamic assessments, such as cardiac output measurements, estimation of preload, and assessment of fluid responsiveness, will be discussed. PMID:22454777

  3. Strengths and weaknesses of Problem Based Learning from the professional perspective of registered nurses 1

    PubMed Central

    Cónsul-Giribet, María; Medina-Moya, José Luis

    2014-01-01

    OBJECTIVE: to identify competency strengths and weaknesses as perceived by nursing professionals who graduated with a integrated curriculum and competency-based through Problem Based Learning in small groups. METHOD: an intrinsic case study method was used, which analyzes this innovation through former students (from the first class) with three years of professional experience. The data were collected through a questionnaire and discussion groups. RESULTS: the results show that their competency level is valued in a very satisfactory manner. This level paradoxically contrasts with the lack of theoretical knowledge they perceived at the end of their education, when they started working in clinical practice. CONCLUSIONS: the teaching strategy was key to motivate an in-depth study and arouse the desire to know. In addition, Problem Based Learning favors and reinforces the decision to learn, which is that necessary in the course of professional life. PMID:25493666

  4. The availability of attentional resources modulates the inhibitory strength related to weakly activated priming.

    PubMed

    Wang, Yongchun; Wang, Yonghui; Liu, Peng; Dai, Dongyang; Di, Meilin; Chen, Qiang

    2016-08-01

    The current study investigated the role of attention in inhibitory processes (the inhibitory processes described in the current study refer only to those associated with masked or flanked priming) using a mixed paradigm involving the negative compatibility effect (NCE) and object-based attention. Accumulating evidence suggests that attention can be spread more easily within the same object, which increases the availability of attentional resources, than across different objects. Accordingly, we manipulated distractor location (with primes presented in the same object versus presented in different objects) together with prime/target compatibility (compatible versus incompatible) and prime-distractor stimulus onset asynchrony (SOA, 23 ms vs 70 ms). The aim was to investigate whether inhibitory processes related to weakly activated priming, which have been previously assumed to be automatic, depend on the availability of attentional resources. The results of Experiment 1 showed a significant NCE for the 70-ms SOA when the prime and distractor were presented in the same object (greater attentional resource availability); however, reversed NCEs were obtained for all other conditions. Experiment 2 was designed to disentangle whether the results of Experiment 1 were affected by the prime position, and the results indicated that the prime position did not modulate the NCE in Experiment 1. Together, these results are consistent with the claim that the availability of attentional resources modulates the inhibitory strength related to weakly activated priming. Specifically, if attentional resources are assigned to the distractor when it is presented in the same object as the prime, the strength of the inhibition elicited by the distractor may increase and reverse the activation elicited by the prime, which could lead to a significant NCE. PMID:27198916

  5. Strengths and weaknesses of in-tube solid-phase microextraction: A scoping review.

    PubMed

    Fernández-Amado, M; Prieto-Blanco, M C; López-Mahía, P; Muniategui-Lorenzo, S; Prada-Rodríguez, D

    2016-02-01

    In-tube solid-phase microextraction (in-tube SPME or IT-SPME) is a sample preparation technique which has demonstrated over time its ability to couple with liquid chromatography (LC), as well as its advantages as a miniaturized technique. However, the in-tube SPME perspectives in the forthcoming years depend on solutions that can be brought to the environmental, industrial, food and biomedical analysis. The purpose of this scoping review is to examine the strengths and weaknesses of this technique during the period 2009 to 2015 in order to identify research gaps that should be addressed in the future, as well as the tendencies that are meant to strengthen the technique. In terms of methodological aspects, this scoping review shows the in-tube SPME strengths in the coupling with LC (LC-mass spectrometry, capillary LC, ultra-high-pressure LC), in the new performances (magnetic IT-SPME and electrochemically controlled in-tube SPME) and in the wide range of development of coatings and capillaries. Concerning the applicability, most in-tube SPME studies (around 80%) carry out environmental and biomedical analyses, a lower number food analyses and few industrial analyses. Some promising studies in proteomics have been performed. The review makes a critical description of parameters used in the optimization of in-tube SPME methods, highlighting the importance of some of them (i.e. type of capillary coatings). Commercial capillaries in environmental analysis and laboratory-prepared capillaries in biomedical analysis have been employed with good results. The most consolidated configuration is in-valve mode, however the cycle mode configuration is frequently chosen for biomedical analysis. This scoping review revealed that some aspects such as the combination of in-tube SPME with other sample treatment techniques for the analysis of solid samples should be developed in depth in the near future. PMID:26772124

  6. The relationship between early ego strength and adolescent responses to the threat of nuclear war

    SciTech Connect

    Andrekus, N.J.

    1989-01-01

    Ego resiliency and ego control, measured when subjects were 3 or 4 years old, were related to expectation of war, concern for the future, and activism in response to the threat of nuclear war, measured when subjects were 18 years old. Data from 92 participants in a longitudinal study of ego and cognitive development conducted by Jeanne and Jack Block at the University of California, Berkeley were used to test hypotheses. Assessments with the California Child Q-set, composited across multiple independent observers, provide measures of ego resiliency and ego control. Adolescent interviews regarding the perception of likelihood of nuclear war, how this affects their future, and their antinuclear and general political activism were scaled and rated. Early ego resiliency and ego under control were hypothesized to account for the variance in adolescent nuclear responses and activism. The only significant longitudinal relationships were in the female sample, where ego under control was found to be a significant predictor of both general political activism (p<.01) and ideas of the future being affected by the nuclear threat (p<.05). Among males, the relationship between early ego resiliency and adolescent antinuclear activism approached significance (p<.10). Adolescent personality was significantly related to several measures of nuclear response. In girls, adolescent ego under control related to perception of likelihood of nuclear war (p<.05) and antinuclear activism (p<.05), and the interaction of ego resiliency and ego under control predicted general political activism (p<.0005). In boys, adolescent ego resiliency correlated with antinuclear activism (p<.05). These findings were discussed in terms of antecedent parenting styles, and conceptual links were drawn between children's ego resiliency and security of attachment, perspective taking, and moral development.

  7. Analysis of the strengths and weaknesses of acid rain electronic data reports

    SciTech Connect

    Schott, J.

    1997-12-31

    Entergy Corporation is a Phase II utility with a fossil generation base composed primarily of natural gas and low sulfur coal. This paper presents an analysis of a large Phase II utility`s continuous emissions monitoring data reported to EPA under Title IV Acid Rain. Electric utilities currently report hourly emissions of NO{sub x}, SO{sub 2}, CO{sub 2}, fuel use, and generation through electronic data reports to EPA. This paper describes strengths and weaknesses of the data reported to EPA as determined through an analysis of 1995 data. Emissions reported by this company under acid rain for SO{sub 2} and NO{sub x} are very different from emissions reported to state agencies for annual emission inventory purposes in past years and will represent a significant break with historic trends. A comparison of emissions has been made of 1995 emissions reported under Electronic Data Reports to the emissions that would have been reported using emission factors and fuel data in past years. In addition, the paper examines the impacts of 40 CFR Part 75 Acid Rain requirements such as missing data substitution and monitor bias adjustments. Measurement system errors including stack flow measurement and false NO{sub x}Lb/MMBtu readings at very low loads are discussed. This paper describes the implications for public policy, compliance, emissions inventories, and business decisions of Part 75 acid rain monitoring and reporting requirements.

  8. The global health concept of the German government: strengths, weaknesses, and opportunities.

    PubMed

    Bozorgmehr, Kayvan; Bruchhausen, Walter; Hein, Wolfgang; Knipper, Michael; Korte, Rolf; Razum, Oliver; Tinnemann, Peter

    2014-01-01

    Recognising global health as a rapidly emerging policy field, the German federal government recently released a national concept note for global health politics (July 10, 2013). As the German government could have a significant impact on health globally by making a coherent, evidence-informed, and long-term commitment in this field, we offer an initial appraisal of the strengths, weaknesses, and opportunities for development recognised in this document. We conclude that the national concept is an important first step towards the implementation of a coherent global health policy. However, important gaps were identified in the areas of intellectual property rights and access to medicines. In addition, global health determinants such as trade, economic crises, and liberalisation as well as European Union issues such as the health of migrants, refugees, and asylum seekers are not adequately addressed. Furthermore, little information is provided about the establishment of instruments to ensure an effective inter-ministerial cooperation. Finally, because implementation aspects for the national concept are critical for the success of this initiative, we call upon the newly elected 2013 German government to formulate a global health strategy, which includes a concrete plan of action, a time scale, and measurable goals. PMID:24560258

  9. The global health concept of the German government: strengths, weaknesses, and opportunities

    PubMed Central

    Bozorgmehr, Kayvan; Bruchhausen, Walter; Hein, Wolfgang; Knipper, Michael; Korte, Rolf; Razum, Oliver; Tinnemann, Peter

    2014-01-01

    Recognising global health as a rapidly emerging policy field, the German federal government recently released a national concept note for global health politics (July 10, 2013). As the German government could have a significant impact on health globally by making a coherent, evidence-informed, and long-term commitment in this field, we offer an initial appraisal of the strengths, weaknesses, and opportunities for development recognised in this document. We conclude that the national concept is an important first step towards the implementation of a coherent global health policy. However, important gaps were identified in the areas of intellectual property rights and access to medicines. In addition, global health determinants such as trade, economic crises, and liberalisation as well as European Union issues such as the health of migrants, refugees, and asylum seekers are not adequately addressed. Furthermore, little information is provided about the establishment of instruments to ensure an effective inter-ministerial cooperation. Finally, because implementation aspects for the national concept are critical for the success of this initiative, we call upon the newly elected 2013 German government to formulate a global health strategy, which includes a concrete plan of action, a time scale, and measurable goals. PMID:24560258

  10. Patterns of Cognitive Strengths and Weaknesses: Identification Rates, Agreement, and Validity for Learning Disabilities Identification

    PubMed Central

    Miciak, Jeremy; Fletcher, Jack M.; Stuebing, Karla; Vaughn, Sharon; Tolar, Tammy D.

    2014-01-01

    Purpose Few empirical investigations have evaluated LD identification methods based on a pattern of cognitive strengths and weaknesses (PSW). This study investigated the reliability and validity of two proposed PSW methods: the concordance/discordance method (C/DM) and cross battery assessment (XBA) method. Methods Cognitive assessment data for 139 adolescents demonstrating inadequate response to intervention was utilized to empirically classify participants as meeting or not meeting PSW LD identification criteria using the two approaches, permitting an analysis of: (1) LD identification rates; (2) agreement between methods; and (3) external validity. Results LD identification rates varied between the two methods depending upon the cut point for low achievement, with low agreement for LD identification decisions. Comparisons of groups that met and did not meet LD identification criteria on external academic variables were largely null, raising questions of external validity. Conclusions This study found low agreement and little evidence of validity for LD identification decisions based on PSW methods. An alternative may be to use multiple measures of academic achievement to guide intervention. PMID:24274155

  11. A Study to Identify Areas of Relative Strength and Weakness in Support for the Saint Leo College Library Acquisitions Project.

    ERIC Educational Resources Information Center

    McLeod, Stephen G.

    The practicum sought to identify areas of relative strength and weakness in support for the Saint Leo College (Florida) Library Acquisitions Project, a project to improve library support to the Military Education Program administered by Saint Leo College on military installations throughout the Southeast. Using the Interactive Forces Theory of…

  12. Cavities of Weak Magnetic Field Strength in the Wake of FTEs: Results from Global Magnetospheric MHD Simulations

    NASA Technical Reports Server (NTRS)

    Kuznetsova, M. M.; Sibeck, D. G.; Hesse, M.; Wang, Y.; Rastaetter, L.; Toth, G.; Ridley, A.

    2009-01-01

    We use the global magnetohydrodynamic (MHD) code BATS-R-US to model multipoint observations of Flux Transfer Event (FTE) signatures. Simulations with high spatial and temporal resolution predict that cavities of weak magnetic field strength protruding into the magnetosphere trail FTEs. These predictions are consistent with recently reported multi-point Cluster observations of traveling magnetopause erosion regions (TMERs).

  13. Validation of the Chinese Strengths and Weaknesses of ADHD-Symptoms and Normal-Behaviors Questionnaire in Hong Kong

    ERIC Educational Resources Information Center

    Lai, Kelly Y. C.; Leung, Patrick W. L.; Luk, Ernest S. L.; Wong, Ann S. Y.; Law, Lawrence S. C.; Ho, Karen K. Y.

    2013-01-01

    Objective: Unlike rating scales that focus on the severity of ADHD symptoms, the Strengths and Weaknesses of ADHD-Symptoms and Normal-Behaviors (SWAN) rating scale is phrased in neutral or positive terms for carers to compare the index child's behaviors with that of their peers. This study explores its psychometric properties when applied to…

  14. Macroeconomics of Natural Disasters: Strengths and Weaknesses of Meta-Analysis Versus Review of Literature.

    PubMed

    A G van Bergeijk, Peter; Lazzaroni, Sara

    2015-06-01

    We use the case of the macroeconomic impact of natural disasters to analyze strengths and weaknesses of meta-analysis in an emerging research field. Macroeconomists have published on this issue since 2002 (we identified 60 studies to date). The results of the studies are contradictory and therefore the need to synthesize the available research is evident. Meta-analysis is a useful method in this field. An important aim of our article is to show how one can use the identified methodological characteristics to better understand the robustness and importance of new findings. To provide a comparative perspective, we contrast our meta-analysis and its findings with the major influential research synthesis in the field: the IPCC's 2012 special report Managing the Risks of Extreme Events and Disasters to Advance Climate Change Adaptation. We show that the IPCC could have been more confident about the negative economic impact of disasters and more transparent on inclusion and qualification of studies, if it had been complemented by a meta-analysis. Our meta-analysis shows that, controlling for modeling strategies and data set, the impact of disasters is significantly negative. The evidence is strongest for direct costs studies where we see no difference between our larger sample and the studies included in the IPCC report. Direct cost studies and indirect cost studies differ significantly, both in terms of the confidence that can be attached to a negative impact of natural disasters and in terms of the sources of heterogeneity of the findings reported in the primary studies. PMID:25847486

  15. Strength of chrysotile-serpentinite gouge under hydrothermal conditions: Can it explain a weak San Andreas fault?

    USGS Publications Warehouse

    Moore, Diane E.; Lockner, D.A.; Summers, R.; Shengli, M.; Byerlee, J.D.

    1996-01-01

    Chrysotile-bearing serpentinite is a constituent of the San Andreas fault zone in central and northern California. At room temperature, chrysotile gouge has a very low coefficient of friction (?? ??? 0.2), raising the possibility that under hydrothermal conditions ?? might be reduced sufficiently (to ???0.1) to explain the apparent weakness of the fault. To test this hypothesis, we measured the frictional strength of a pure chrysotile gouge at temperatures to 290??C and axial-shortening velocities as low as 0.001 ??m/s. As temperature increases to ???100??C, the strength of the chrysotile gouge decreases slightly at low velocities, but at temperatures ???200??C, it is substantially stronger and essentially independent of velocity at the lowest velocities tested. We estimate that pure chrysotile gouge at hydrostatic fluid pressure and appropriate temperatures would have shear strength averaged over a depth of 14 km of 50 MPa. Thus, on the sole basis of its strength, chrysotile cannot be the cause of a weak San Andreas fault. However, chrysotile may also contribute to low fault strength by forming mineral seals that promote the development of high fluid pressures.

  16. Description of Peripheral Muscle Strength Measurement and Correlates of Muscle Weakness in Patients Receiving Prolonged Mechanical Ventilatory Support

    PubMed Central

    Chlan, Linda L.; Tracy, Mary Fran; Guttormson, Jill; Savik, Kay

    2015-01-01

    Background Intensive Care Unit Acquired Weakness (ICUAW) is a frequent complication of critical illness due to immobility and prolonged mechanical ventilatory support. Objectives To describe daily peripheral muscle strength measurement in ventilated patients and explore relationships among factors that influence ICUAW. Methods Peripheral muscle strength of 120 ventilated ICU patients (mean age 59.8 ± 15.1; 51% female; APACHE III 61.3 ± 20.7; ICU stay 10.6 ± 8.6 days) was measured daily using a standardized hand grip dynamometry protocol. Three grip measurements for each hand were recorded in pounds-force; the mean of these three assessments was used in the analysis. Correlates of ICUAW were analyzed with mixed models to explore their relationship to grip strength (age, gender, illness severity, length of ventilatory support, medications). Results Median baseline grip strength was variable yet diminished (7.7; 0-102) with either a pattern of diminishing grip strength or maintenance of the baseline low grip strength over time. Controlling for days on protocol, female gender [β = −10.4(2.5); p = <.001], age [= −.24(.08); p = .004], and days receiving ventilatory support [= −.34(.12); p = .005] explained a significant amount of variance in grip strength over time. Conclusions Patients receiving prolonged periods of mechanical ventilatory support in this sample show marked decrements in grip strength measured by hand dynamometry, a marker for peripheral muscle strength. Hand dynamometry is a reliable method to measure muscle strength in cooperative ICU patients and can be used in future research to ultimately develop interventions to prevent ICUAW. PMID:26523017

  17. While Heisenberg Is Not Looking: The Strength of "Weak Measurements" in Educational Research

    ERIC Educational Resources Information Center

    Geelan, David R.

    2015-01-01

    The concept of "weak measurements" in quantum physics is a way of "cheating" the Uncertainty Principle. Heisenberg stated (and 85 years of experiments have demonstrated) that it is impossible to know both the position and momentum of a particle with arbitrary precision. More precise measurements of one decrease the precision…

  18. The Strengths, Weaknesses, Opportunities and Threats of Using Social Software in Higher and Further Education Teaching and Learning

    ERIC Educational Resources Information Center

    Schroeder, A.; Minocha, S.; Schneider, C.

    2010-01-01

    Social software is increasingly being used in higher and further education to support teaching and learning processes. These applications provide students with social and cognitive stimulation and also add to the interaction between students and educators. However, in addition to the benefits the introduction of social software into a course…

  19. Scoring the Strengths and Weaknesses of Underage Drinking Laws in the United States

    PubMed Central

    Fell, James C.; Thomas, Sue; Scherer, Michael; Fisher, Deborah A.; Romano, Eduardo

    2015-01-01

    Several studies have examined the impact of a number of minimum legal drinking age 21 (MLDA-21) laws on underage alcohol consumption and alcohol-related crashes in the United States. These studies have contributed to our understanding of how alcohol control laws affect drinking and driving among those who are under age 21. However, much of the extant literature examining underage drinking laws use a “Law/No law” coding which may obscure the variability inherent in each law. Previous literature has demonstrated that inclusion of law strengths may affect outcomes and overall data fit when compared to “Law/No law” coding. In an effort to assess the relative strength of states’ underage drinking legislation, a coding system was developed in 2006 and applied to 16 MLDA-21 laws. The current article updates the previous endeavor and outlines a detailed strength coding mechanism for the current 20 MLDA-21 laws. PMID:26097775

  20. Registration of weak ULF/ELF oscillations of the surface electric field strength

    NASA Astrophysics Data System (ADS)

    Boldyrev, A. I.; Vyazilov, A. E.; Ivanov, V. N.; Kemaev, R. V.; Korovin, V. Ya.; Melyashinskii, A. V.; Pamukhin, K. V.; Panov, V. N.; Shvyrev, Yu. N.

    2016-07-01

    Measurements of the atmospheric electric field strength made by an electrostatic fluxmeter with a unique threshold sensitivity for such devices (6 × 10-2-10-3 V m-1 Hz-1/2 in the 10-3-25 Hz frequency range) and wide dynamic (120 dB) and spectral (0-25 Hz) ranges, are presented. The device parameters make it possible to observe the electric component of global electromagnetic Schumann resonances and long-period fluctuations in the atmospheric electric field strength.

  1. A Review of Meta-Analyses in Education: Methodological Strengths and Weaknesses

    ERIC Educational Resources Information Center

    Ahn, Soyeon; Ames, Allison J.; Myers, Nicholas D.

    2012-01-01

    The current review addresses the validity of published meta-analyses in education that determines the credibility and generalizability of study findings using a total of 56 meta-analyses published in education in the 2000s. Our objectives were to evaluate the current meta-analytic practices in education, identify methodological strengths and…

  2. Strength of weak layers in cascading failures on multiplex networks: case of the international trade network.

    PubMed

    Lee, Kyu-Min; Goh, K-I

    2016-01-01

    Many real-world complex systems across natural, social, and economical domains consist of manifold layers to form multiplex networks. The multiple network layers give rise to nonlinear effect for the emergent dynamics of systems. Especially, weak layers that can potentially play significant role in amplifying the vulnerability of multiplex networks might be shadowed in the aggregated single-layer network framework which indiscriminately accumulates all layers. Here we present a simple model of cascading failure on multiplex networks of weight-heterogeneous layers. By simulating the model on the multiplex network of international trades, we found that the multiplex model produces more catastrophic cascading failures which are the result of emergent collective effect of coupling layers, rather than the simple sum thereof. Therefore risks can be systematically underestimated in single-layer network analyses because the impact of weak layers can be overlooked. We anticipate that our simple theoretical study can contribute to further investigation and design of optimal risk-averse real-world complex systems. PMID:27211291

  3. Strength of weak layers in cascading failures on multiplex networks: case of the international trade network

    NASA Astrophysics Data System (ADS)

    Lee, Kyu-Min; Goh, K.-I.

    2016-05-01

    Many real-world complex systems across natural, social, and economical domains consist of manifold layers to form multiplex networks. The multiple network layers give rise to nonlinear effect for the emergent dynamics of systems. Especially, weak layers that can potentially play significant role in amplifying the vulnerability of multiplex networks might be shadowed in the aggregated single-layer network framework which indiscriminately accumulates all layers. Here we present a simple model of cascading failure on multiplex networks of weight-heterogeneous layers. By simulating the model on the multiplex network of international trades, we found that the multiplex model produces more catastrophic cascading failures which are the result of emergent collective effect of coupling layers, rather than the simple sum thereof. Therefore risks can be systematically underestimated in single-layer network analyses because the impact of weak layers can be overlooked. We anticipate that our simple theoretical study can contribute to further investigation and design of optimal risk-averse real-world complex systems.

  4. Strength of weak layers in cascading failures on multiplex networks: case of the international trade network

    PubMed Central

    Lee, Kyu-Min; Goh, K.-I.

    2016-01-01

    Many real-world complex systems across natural, social, and economical domains consist of manifold layers to form multiplex networks. The multiple network layers give rise to nonlinear effect for the emergent dynamics of systems. Especially, weak layers that can potentially play significant role in amplifying the vulnerability of multiplex networks might be shadowed in the aggregated single-layer network framework which indiscriminately accumulates all layers. Here we present a simple model of cascading failure on multiplex networks of weight-heterogeneous layers. By simulating the model on the multiplex network of international trades, we found that the multiplex model produces more catastrophic cascading failures which are the result of emergent collective effect of coupling layers, rather than the simple sum thereof. Therefore risks can be systematically underestimated in single-layer network analyses because the impact of weak layers can be overlooked. We anticipate that our simple theoretical study can contribute to further investigation and design of optimal risk-averse real-world complex systems. PMID:27211291

  5. Systematic Reviews and Meta-Analyses - Literature-based Recommendations for Evaluating Strengths, Weaknesses, and Clinical Value.

    PubMed

    Beitz, Janice M; Bolton, Laura L

    2015-11-01

    Good quality systematic reviews (SRs) summarizing best available evidence can help inform clinical decisions, improv- ing patient and wound outcomes. Weak SRs can misinform readers, undermining care decisions and evidence-based practice. To examine the strengths and weaknesses of SRs and meta-analyses and the role of SRs in contemporary evidence-based wound care practice, and using the search terms systematic review, meta-analysis, and evidence-based practice, the authors searched Medline and the Cumulative Index to Nursing and Allied Health Literature (CINAHL) for important terminology and recommendations to help clinicians evaluate SRs with meta-analysis. Reputable websites, recent textbooks, and synthesized available literature also were reviewed to describe and summarize SR strengths and weaknesses. After developing a checklist for critically evaluating SR objectives, inclusion/exclusion criteria, study quality, data extraction and synthesis methods, meta-analysis homogeneity, accuracy of results, interpretation, and consistency between significant findings and abstract or conclusions, the checklist was applied to topical wound care SRs identified in Cochrane and MEDLINE searches. Best available evidence included in the SRs from 169 randomized controlled trials on 11,571 patients supporting topical intervention healing effects on burns, surgical sites, and diabetic, venous, or pressure ulcers was summarized and showed SRs and clinical trials can demonstrate different outcomes because the information/data are compiled differently. The results illustrate how evidence insufficient to support firm conclusions may still meet immediate needs to guide carefully considered clinical wound and patient care decisions while encouraging better future science. PMID:26544016

  6. The Strengths and Weaknesses of Logic Formalisms to Support Mishap Analysis

    NASA Technical Reports Server (NTRS)

    Johnson, C. W.; Holloway, C. M.

    2002-01-01

    The increasing complexity of many safety critical systems poses new problems for mishap analysis. Techniques developed in the sixties and seventies cannot easily scale-up to analyze incidents involving tightly integrated software and hardware components. Similarly, the realization that many failures have systemic causes has widened the scope of many mishap investigations. Organizations, including NASA and the NTSB, have responded by starting research and training initiatives to ensure that their personnel are well equipped to meet these challenges. One strand of research has identified a range of mathematically based techniques that can be used to reason about the causes of complex, adverse events. The proponents of these techniques have argued that they can be used to formally prove that certain events created the necessary and sufficient causes for a mishap to occur. Mathematical proofs can reduce the bias that is often perceived to effect the interpretation of adverse events. Others have opposed the introduction of these techniques by identifying social and political aspects to incident investigation that cannot easily be reconciled with a logic-based approach. Traditional theorem proving mechanisms cannot accurately capture the wealth of inductive, deductive and statistical forms of inference that investigators routinely use in their analysis of adverse events. This paper summarizes some of the benefits that logics provide, describes their weaknesses, and proposes a number of directions for future research.

  7. OECI accreditation of the European Institute of Oncology of Milan: strengths and weaknesses.

    PubMed

    Deriu, Pietro L; Basso, Silvia; Mastrilli, Fabrizio; Orecchia, Roberto

    2015-12-31

    The European Institute of Oncology began the process to reach the accreditation promoted by the Organisation of European Cancer Institutes (OECI) in 2012. This accreditation integrates the quality and safety path started in 2001 with accreditation by the Joint Commission International. Despite the presence of diversified accreditations and certifications and the clear need of time, effort, and commitment, the models are complementary. Each model is not to be considered as an end but as a tool for improvement: e.g., mixing accreditation standards led to an improvement in the quality and safety of processes. The present article details the OECI accreditation experience of the European Institute of Oncology, in particular the following strengths of OECI standards: collaboration among several involved parties (patient, volunteer, patient's general practitioner) in the clinical and quality/safety processes; a larger involvement of support personnel (psycho-oncologists, dieticians, physical therapists); and the development of clinical/translational research and innovation in prevention, diagnosis, and treatment to guarantee the best available practice in diagnosis and treatment. The OECI accreditation is specific to oncology and therefore its standards are tailored to a cancer center, both in terms of language used in the standards manual and in terms of patient needs. The OECI accreditation system puts an auditor team with a standards manual in charge of verifying quality and confirms the definition of IEO as a Comprehensive Cancer Center. PMID:27096268

  8. Identifying strengths and weaknesses in the utilization of Objective Structured Clinical Examination (OSCE) in a nursing program.

    PubMed

    McWilliam, Paula L; Botwinski, Carol A

    2012-01-01

    Objective Structured Clinical Examination (OSCE) is used in nursing to assess students' transfer of classroom and laboratory learning experiences into simulated clinical practice. OSCE is a performance-based exam in which students are observed demonstrating a multitude of clinical behaviors. The purpose of this study was to identify strengths and weaknesses in the utilization of OSCE in this nursing program with 60 full-time students ages 21 to 23. An evaluation methodology was used for this study. Interviews were conducted with two groups: faculty facilitators of OSCE and standardized patients (SPs). Areas of focus were: data collection of students' performance, SP selection and training, and modification of the Nursing Interview Interaction Scale (NIIS). It was found that with appropriate SP selection and training, utilization of appropriate tools, and good data collection, OSCE can offer a valid and reliable means of testing nursing students' clinical competencies. PMID:22416539

  9. A Study of Strengths and Weaknesses of Descriptive Assessment from Principals, Teachers and Experts Points of View in Chaharmahal and Bakhteyari Primary Schools

    ERIC Educational Resources Information Center

    Sharief, Mostafa; Naderi, Mahin; Hiedari, Maryam Shoja; Roodbari, Omolbanin; Jalilvand, Mohammad Reza

    2012-01-01

    The aim of current study is to determine the strengths and weaknesses of descriptive evaluation from the viewpoint of principals, teachers and experts of Chaharmahal and Bakhtiari province. A descriptive survey was performed. Statistical population includes 208 principals, 303 teachers, and 100 executive experts of descriptive evaluation scheme in…

  10. Wildfire Prevention and Suppression plans enhancing: a first overview on strength and weakness in Italian stakeholders experiences and perception.

    NASA Astrophysics Data System (ADS)

    Bonora, Laura; Conese, Claudio; Barbati, Anna

    2014-05-01

    Fires and wildfires represent an element of vulnerability for forests, considering that have now reached a level beyond which further burning would seriously endanger the ecosystem services and their sustainable management. It is fundamental to support fire-fighting Centres by giving them tools, useful to faces future trends; in this sense the first step is to examine technical and operative procedures to evaluate their strong and weak aspects, in collaboration with personnel responsible of risk management, suppression coordination and patrol responsible of direct attack. The aims this work is to identify present elements of strength ad problematic aspects to tuning the wildfire suppression actions to future changes; this is a crucial challenge both for policy and territory planners and managers. Historical investigation lines on forest fire covered the basilar and fundamental dynamics which understanding was necessary to confine and fight the wildfire phenomenon. At the present all the competences, knowledge and connections acquired are translating and including in the Plans, sharing innovative strategies -with the "direct involved actors"- trying to decrease the fire trend. Stakeholders underlined that collaboration between research and territorial Institutions are producing positive results, showing the conceptual rightness and the well-run of the in-progress implementations. The Italian framework of wildfire prevention plans is very peculiar because the Plans related to prevention and active intervention procedure are coincident. Normative, procedural, economic and logistic aspects are considered and handled in the same general document; each year the local structures, designed by the Regions, have in charge the draft of the operative plan, defining and managing the means and patrols distribution and turnover. In the present work 3 Italian Regions (Tuscany, Puglia and Sardinia, with different territorial and vegetation characteristics and affected by different

  11. AERONET-OC: Strengths and Weaknesses of a Network for the Validation of Satellite Coastal Radiometric Products

    NASA Technical Reports Server (NTRS)

    Zibordi, Giuseppe; Holben, Brent; Slutsker, Ilya; Giles, David; D'Alimonte, Davide; Melin, Frederic; Berthon, Jean-Francois; Vandemark, Doug; Feng, Hui; Schuster, Gregory; Fabbri, Bryan E.; Kaitala, Seppo; Seppala, Jukka

    2008-01-01

    The Ocean Color component of the Aerosol Robotic Network (AERONET-OC) has been implemented to support long-term satellite ocean color investigations through cross-site consistent and accurate measurements collected by autonomous radiometer systems deployed on offshore fixed platforms. The ultimate purpose of AERONET-OC is the production of standardized measurements performed at different sites with identical measuring systems and protocols, calibrated using a single reference source and method, and processed with the same code. The AERONET-OC primary data product is the normalized water leaving radiance determined at center-wavelengths of interest for satellite ocean color applications, with an uncertainty lower than 5% in the blue-green spectral regions and higher than 8% in the red. Measurements collected at 6 sites counting the northern Adriatic Sea, the Baltic Proper, the Gulf of Finland, the Persian Gulf, and, the northern and southern margins of the Middle Atlantic Bay, have shown the capability of producing quality assured data over a wide range of bio-optical conditions including Case-2 yellow substance- and sedimentdominated waters. This work briefly introduces network elements like: deployment sites, measurement method, instrument calibration, processing scheme, quality-assurance, uncertainties, data archive and products accessibility. Emphases is given to those elements which underline the network strengths (i.e., mostly standardization of any network element) and its weaknesses (i.e., the use of consolidated, but old-fashioned technology). The work also addresses the application of AERONET-OC data to the validation of primary satellite radiometric products over a variety of complex coastal waters and finally provides elements for the identification of new deployment sites most suitable to support satellite ocean color missions.

  12. Weak-interaction strength from charge-exchange reactions versus {beta} decay in the A=40 isoquintet

    SciTech Connect

    Bhattacharya, M.; Goodman, C. D.; Garcia, A.

    2009-11-15

    We report a measurement of the Gamow-Teller (GT) strength distribution for {sup 40}Ar{yields}{sup 40}K using the 0 deg. (p,n) reaction. The measurement extends observed GT strength distribution in the A=40 system up to an excitation energy of {approx}8 MeV. In comparing our results with those from the {beta} decay of the isospin mirror nucleus {sup 40}Ti, we find that, within the excitation energy region probed by the {beta}-decay experiment, we observe a total GT strength that is in fair agreement with the {beta}-decay measurement. However, we find that the relative strength of the two strongest transitions differs by a factor of {approx}1.8 in comparing our results from (p,n) reactions with the {beta} decay of {sup 40}Ti. Using our results we present the neutrino-capture cross section for {sup 40}Ar.

  13. Gamow-Teller strength distributions and stellar weak-interaction rates for ^{76}Ge and ^{82}Se using the deformed pn-QRPA model

    NASA Astrophysics Data System (ADS)

    Nabi, Jameel-Un; Ishfaq, Mavra

    2016-07-01

    We calculate Gamow-Teller strength distributions for β β-decay nuclei ^{76}Ge and ^{82}Se using the deformed pn-QRPA model. We use a deformed Nilsson basis and consider pairing correlations within the deformed BCS theory. Ground state correlations and two-particle and two-hole mixing states were included in our pn-QRPA model. Our calculated strength distributions were compared with experimental data and previous calculation. The total Gamow-Teller strength and centroid placement calculated in our model compares well with the measured value. We calculate β-decay and positron capture rates on ^{76}Ge and ^{82}Se in supernovae environments and compare them to those obtained from experimental data and previous calculation. Our study shows that positron capture rates command the total weak rates at high stellar temperatures. We also calculate energy rates of β-delayed neutrons and their emission probabilities.

  14. Biological Threats

    MedlinePlus

    ... Thunderstorms & Lightning Tornadoes Tsunamis Volcanoes Wildfires Main Content Biological Threats Biological agents are organisms or toxins that ... Centers for Disease Control and Prevention . Before a Biological Threat Unlike an explosion, a biological attack may ...

  15. French Version of the Strengths and Weaknesses of ADHD Symptoms and Normal Behaviors (SWAN-F) Questionnaire

    PubMed Central

    Robaey, Philippe; Amre, Devendra; Schachar, Russell; Simard, Louise

    2007-01-01

    Objective To evaluate internal and external consistency of a French adaptation of the SWAN (a 7-point rating strength-based scale, from far below to far above average) and its accuracy as a diagnostic test among children with Attention Deficit/Hyperactivity Disorder (ADHD). Method Parents of 88 children referred for ADHD were interviewed using the SWAN-F, a structured interview (DISC-4.0) and the Conners’ Rating Scale. Internal consistency and divergent and convergent validity of the SWAN-F were examined using the DISC-4.0 and Conners’ Rating Scales as reference standards for four dimensions: Inattention, Hyperactivity/Impulsivity, ADHD, Oppositional Defiant Disorder. Results The internal consistency of SWAN-F was within acceptable ranges for all dimensions (Cronbach’s alpha greater than 0.80). Scores of the SWAN-F subscales were strongly associated with the DISC-4.0 diagnostic assignments and Conners’ Rating Scales, following logical patterns of correspondence between diagnoses. Its accuracy as a diagnostic test was comparable to Conners’ Rating Scale, with a lower rate of false positives. Conclusions The information gathered with the SWAN-F is compatible with that obtained using the DISC-4.0 and Conners’ Rating Scale. Strength-based rating scales have the potential to evaluate the normal distribution of behaviors and to provide reliable cut-off defining abnormal behavior. PMID:18392156

  16. Strength and weaknesses of modeling the dynamics of mode-locked lasers by means of collective coordinates

    NASA Astrophysics Data System (ADS)

    Alsaleh, M.; Mback, C. B. L.; Tchomgo Felenou, E.; Tchofo Dinda, P.; Grelu, Ph; Porsezian, K.

    2016-07-01

    We address the efficiency of theoretical tools used in the development and optimization of mode-locked fiber lasers. Our discussion is based on the practical case of modeling the dynamics of a dispersion-managed fiber laser. One conventional approach uses discrete propagation equations, followed by the analysis of the numerical results through a collective coordinate projection. We compare the latter with our dynamical collective coordinate approach (DCCA), which combines both modeling and analysis in a compact form. We show that for single pulse dynamics, the DCCA allows a much quicker solution mapping in the space of cavity parameters than the conventional approach, along with a good accuracy. We also discuss the weaknesses of the DCCA, in particular when multiple pulsing bifurcations occur.

  17. Floods and health in Gambella region, Ethiopia: a qualitative assessment of the strengths and weaknesses of coping mechanisms

    PubMed Central

    Wakuma Abaya, Samson; Mandere, Nicodemus; Ewald, Göran

    2009-01-01

    Background Floods are the most frequent and devastating type of natural disaster worldwide, causing unprecedented deaths, diseases, and destruction of property and crops. Flooding has a greater impact in developing countries due to lack of sufficient disaster management structures and a lack of economic resources. Objective This study was conducted with the aim of contributing to the knowledge base of development strategies that reduce flood-related health risks in developing countries. The study focused particularly on assessing the flood risks and health-related issues in the Gambella region of Ethiopia; with the intent of producing relevant information to assist with the improvements in the efficacy of the current flood coping strategies in the region. Methods Data were gathered through interviews with 14 officers from different government and non-governmental organizations and a questionnaire survey given to 35 flood victims in Itang woreda. A qualitative approach was applied and the data were analyzed using content analysis. Results It was found that flooding is a common problem in Gambella region. The findings also indicate that the flood frequency and magnitude has increased rapidly during the last decade. The increase in floods was driven mainly by climate change and changes in land use, specifically deforestation. The reported main impacts of flooding on human health in Gambella region were deaths, injuries, and diseases such as malaria and diarrhea. Another notable consequence of flooding was crop destruction and subsequent malnutrition. Conclusions Three weaknesses that were identified in the current coping strategies for flood-related health impacts in Gambella region were a lack of flood-specific policy, absence of risk assessment, and weak institutional capacity. This study recommends new policy approaches that will increase the effectiveness of the current flood coping strategies to sustainably address the impact of flooding on human health. PMID

  18. Studies of a weak polyampholyte at the air-buffer interface: The effect of varying pH and ionic strength

    NASA Astrophysics Data System (ADS)

    Cicuta, Pietro; Hopkinson, Ian

    2001-05-01

    We have carried out experiments to probe the static and dynamic interfacial properties of β-casein monolayers spread at the air-buffer interface, and analyzed these results in the context of models of weak polyampholytes. Measurements have been made systematically over a wide range of ionic strength and pH. In the semidilute regime of surface concentration a scaling exponent, which can be linked to the degree of chain swelling, is found. This shows that at pH close to the isoelectric point, the protein is compact. At pH away from the isoelectric pH the protein is extended. The transition between compact and extended states is continuous. As a function of increasing ionic strength, we observe swelling of the protein at the isoelectric pH but contraction of the protein at pH values away from it. These behaviors are typical of a those predicted theoretically for a weak polyampholyte. Dilational moduli measurements, made as a function of surface concentration exhibit maxima that are linked to the collapse of hydrophilic regions of the protein into the subphase. Based on this data we present a configuration map of the protein configuration in the monolayer. These findings are supported by strain (surface pressure) relaxation measurements and surface quasielastic light scattering measurements which suggest the existence of loops and tails in the subphase at higher surface concentrations.

  19. The Application of Strengths, Weaknesses, Opportunities and Threats (SWOT) Analysis for Managing Vocational and Technical Education (VTE) Programmes for Improved Efficiency in Nigeria

    ERIC Educational Resources Information Center

    Adepoju, T. L.; Famade, Olu Adesola

    2010-01-01

    This paper reviews the current status of vocational and technical education programmes (VTE) in Nigeria and the major innovations of the Nigerian Government in the recent times in the sector vis-a-vis the demands of the modern world for vocational and technological development. It therefore, proposes a paradigm shift in the operation of VTE…

  20. Examining hand dominance using dynamometric grip strength testing as evidence for overwork weakness in Charcot-Marie-Tooth disease: a systematic review and meta-analysis.

    PubMed

    Roberts-Clarke, Daniel; Fornusek, Che; Fiatarone Singh, Maria A; Burns, Joshua; Hackett, Daniel A

    2016-09-01

    This systematic review with a meta-analysis of studies was carried out to evaluate the potential of overwork weakness on the basis of grip strength of dominant and nondominant hands in individuals with Charcot-Marie-Tooth disease (CMT). Numerous electronic databases were searched from the earliest records to February 2016. Studies of any design including participants older than 18 years of age with a confirmed diagnosis of CMT that measured grip strength of both hands using dynamometric testing were eligible for inclusion. Of 12 593 articles identified following removal of duplicates, five articles fulfilled the criteria. A total of 166 participants, mostly with CMT1 or CMT2, were described from the studies included. Hand and finger pinch grip strength for the dominant compared with the nondominant hand was not statistically different. There is no definitive evidence that preferential use of the dominant hand in CMT impairs function relative to the nondominant hand. Thus, robust exercise trials of progressive resistance training are needed to understand the extent of adaptations possible and provide evidence of the safety of such regimens. PMID:27177353

  1. Strength and Function Response to Clinical Interventions of Older Women Categorized by Weakness and Low Lean Mass Using Classifications From the Foundation for the National Institute of Health Sarcopenia Project

    PubMed Central

    Fragala, Maren S.; Dam, Thuy-Tien L.; Barber, Vanessa; Judge, James O.; Studenski, Stephanie A.; Cawthon, Peggy M.; McLean, Robert R.; Harris, Tamara B.; Ferrucci, Luigi; Guralnik, Jack M.; Kiel, Douglas P.; Kritchevsky, Stephen B.; Shardell, Michelle D.; Vassileva, Maria T.

    2015-01-01

    Background. The Foundation for the National Institutes of Health Sarcopenia Project developed data-driven cut-points for clinically meaningful weakness and low lean body mass. This analysis describes strength and function response to interventions based on these classifications. Methods. In data from four intervention studies, 378 postmenopausal women with baseline and 6-month data were evaluated for change in grip strength, appendicular lean mass corrected for body mass index, leg strength and power, and short physical performance battery (SPPB). Clinical interventions included hormones, exercise, and nutritional supplementation. Differences in outcomes were evaluated between (i) those with and without weakness and (ii) those with weakness and low lean mass or with one but not the other. We stratified analyses by slowness (walking speed ≤ 0.8 m/s) and by treatment assignment. Results. The women (72±7 years; body mass index of 26±5kg/m2) were weak (33%), had low lean mass (14%), or both (6%). Those with weakness increased grip strength, lost less leg power, and gained SPPB score (p < .05) compared with nonweak participants. Stratified analyses were similar for grip strength and SPPB. With lean mass in the analysis, individuals with weakness had larger gains in grip strength and SPPB scores regardless of low lean mass (p < .01). Conclusions. Older women with clinically meaningful muscle weakness increased grip strength and SPPB, regardless of the presence of low lean mass following treatment with interventions for frailty. Thus, results suggest that muscle weakness, as defined by the Foundation for the National Institutes of Health Sarcopenia Project, appears to be a treatable symptom. PMID:25135999

  2. The Reliability and Validity of the English and Spanish Strengths and Weaknesses of ADHD and Normal Behavior Rating Scales in a Preschool Sample: Continuum Measures of Hyperactivity and Inattention

    ERIC Educational Resources Information Center

    Lakes, Kimberley D.; Swanson, James M.; Riggs, Matt

    2012-01-01

    Objective: To evaluate the reliability and validity of the English and Spanish versions of the Strengths and Weaknesses of ADHD-symptom and Normal-behavior (SWAN) rating scale. Method: Parents of preschoolers completed both a SWAN and the well-established Strengths and Difficulties Questionnaire (SDQ) on two separate occasions over a span of 3…

  3. Stereotype Threat.

    PubMed

    Spencer, Steven J; Logel, Christine; Davies, Paul G

    2016-01-01

    When members of a stigmatized group find themselves in a situation where negative stereotypes provide a possible framework for interpreting their behavior, the risk of being judged in light of those stereotypes can elicit a disruptive state that undermines performance and aspirations in that domain. This situational predicament, termed stereotype threat, continues to be an intensely debated and researched topic in educational, social, and organizational psychology. In this review, we explore the various sources of stereotype threat, the mechanisms underlying stereotype-threat effects (both mediators and moderators), and the consequences of this situational predicament, as well as the means through which society and stigmatized individuals can overcome the insidious effects of stereotype threat. Ultimately, we hope this review alleviates some of the confusion surrounding stereotype threat while also sparking further research and debate. PMID:26361054

  4. Facing ambiguous threats.

    PubMed

    Roberto, Michael A; Bohmer, Richard M J; Edmondson, Amy C

    2006-11-01

    On February 1, 2003, the world watched in horror as the Columbia space shuttle broke apart while reentering the earth's atmosphere, killing all seven astronauts. Some have argued that NASA's failure to respond with appropriate intensity to the so-called foam strike that led to the accident was evidence of irresponsible or incompetent management. The authors' research, however, suggests that NASA was exhibiting a natural, albeit unfortunate, pattern of behavior common in many organizations. The foam strike is a prime example of what the authors call an ambiguous threat-a signal that may or may not portend future harm. Ambiguous threats differ from threats with obvious causes-say, a fire in the building-for which the response is clear. They also differ from unmistakable threats that may lack straightforward response paths (such as the frightening oxygen-tank explosion aboard Apollo 13). However, when the warning sign is ambiguous and the threat's potential effect is unclear, managers may choose to ignore or discount the risk. Such an approach can be catastrophic. Firms that do a good job of dealing with ambiguous threats do not improvise during a crisis; rather, they apply a rigorous set of detection and response capabilities that they have developed and practiced beforehand. In this article, the authors outline how to put such capabilities in place long before a crisis strikes. First, companies need to hone their teamwork and rapid problem-solving skills through practice. Second, they must learn to recognize weak signals, amplify the threat, and encourage employees to ask disconcerting "what if" questions in a safe environment. Finally, they should explore possible responses to threats through quick, low-cost experimentation. PMID:17131567

  5. Spatial Noise in Coupling Strength and Natural Frequency within a Pacemaker Network; Consequences for Development of Intestinal Motor Patterns According to a Weakly Coupled Phase Oscillator Model

    PubMed Central

    Parsons, Sean P.; Huizinga, Jan D.

    2016-01-01

    Pacemaker activities generated by networks of interstitial cells of Cajal (ICC), in conjunction with the enteric nervous system, orchestrate most motor patterns in the gastrointestinal tract. It was our objective to understand the role of network features of ICC associated with the myenteric plexus (ICC-MP) in the shaping of motor patterns of the small intestine. To that end, a model of weakly coupled oscillators (oscillators influence each other's phase but not amplitude) was created with most parameters derived from experimental data. The ICC network is a uniform two dimensional network coupled by gap junctions. All ICC generate pacemaker (slow wave) activity with a frequency gradient in mice from 50/min at the proximal end of the intestine to 40/min at the distal end. Key features of motor patterns, directly related to the underlying pacemaker activity, are frequency steps and dislocations. These were accurately mimicked by reduction of coupling strength at a point in the chain of oscillators. When coupling strength was expressed as a product of gap junction density and conductance, and gap junction density was varied randomly along the chain (i.e., spatial noise) with a long-tailed distribution, plateau steps occurred at pointsof low density. As gap junction conductance was decreased, the number of plateaus increased, mimicking the effect of the gap junction inhibitor carbenoxolone. When spatial noise was added to the natural interval gradient, as gap junction conductance decreased, the number of plateaus increased as before but in addition the phase waves frequently changed direction of apparent propagation, again mimicking the effect of carbenoxolone. In summary, key features of the motor patterns that are governed by pacemaker activity may be a direct consequence of biological noise, specifically spatial noise in gap junction coupling and pacemaker frequency. PMID:26869875

  6. Predicted and measured concentrations of pharmaceuticals in hospital effluents. Examination of the strengths and weaknesses of the two approaches through the analysis of a case study.

    PubMed

    Verlicchi, Paola; Zambello, Elena

    2016-09-15

    This study deals with the chemical characterization of hospital effluents in terms of the predicted and measured concentrations of 38 pharmaceuticals belonging to 11 different therapeutic classes. The paper outlines the strengths and weaknesses of the two approaches through an analysis of a case study referring to a large hospital. It highlights the observed (and expected) ranges of variability for the parameters of the adopted model, presents the results of an uncertainty analysis of direct measurements (due to sampling mode and frequency and chemical analysis) and a sensitivity analysis of predicted concentrations (based on the annual consumption of pharmaceuticals, their excretion rate and annual wastewater volume generated by the hospital). Measured concentrations refer to two sampling campaigns carried out in summer and winter in order to investigate seasonal variability of the selected compounds. Predicted concentrations are compared to measured ones in the three scenarios: summer, winter and the whole year. It was found that predicted and measured concentrations are in agreement for a limited number of compounds (namely atenolol, atorvastatin and hydrochlorothiazide), and for most compounds the adoption of the model leads to a large overestimation in all three periods. Uncertainties in predictions are mainly due to the wastewater volume and excretion factor, whereas for measured concentrations, uncertainties are mainly due to sampling mode. PMID:27161130

  7. When Students Make Threats

    ERIC Educational Resources Information Center

    Kanan, Linda M.

    2010-01-01

    Much has been written about the use of threat assessment. Schools are encouraged to have threat assessment teams and a threat assessment process as part of a comprehensive safe schools effort. Encouraging and enabling all members of the school community to report possible threats in a timely manner is an essential component of an effective threat…

  8. Cyber threat metrics.

    SciTech Connect

    Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

    2012-03-01

    Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

  9. Muscle strength and BMI as predictors of major mobility disability in the lifestyle interventions and independence for elders pilot (LIFE-P)

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Muscle weakness and obesity are two significant threats to mobility facing the increasing number of older adults. To date, there are no studies that have examined the association of strength and body mass index (BMI) on event rates on a widely used performance measure of major mobility disability. T...

  10. Weak bond screening system

    NASA Astrophysics Data System (ADS)

    Chuang, S. Y.; Chang, F. H.; Bell, J. R.

    Consideration is given to the development of a weak bond screening system which is based on the utilization of a high power ultrasonic (HPU) technique. The instrumentation of the prototype bond strength screening system is described, and the adhesively bonded specimens used in the system developmental effort are detailed. Test results obtained from these specimens are presented in terms of bond strength and level of high power ultrasound irradiation. The following observations were made: (1) for Al/Al specimens, 2.6 sec of HPU irradiation will screen weak bond conditions due to improper preparation of bonding surfaces; (2) for composite/composite specimens, 2.0 sec of HPU irradiation will disrupt weak bonds due to under-cured conditions; (3) for Al honeycomb core with composite skin structure, 3.5 sec of HPU irradiation will disrupt weak bonds due to bad adhesive or oils contamination of bonding surfaces; and (4) for Nomex honeycomb with Al skin structure, 1.3 sec of HPU irradiation will disrupt weak bonds due to bad adhesive.

  11. Infrared weak quasars

    NASA Technical Reports Server (NTRS)

    Mcdowell, J. C.; Elvis, M.; Wilkes, B. J.

    1992-01-01

    Examples of quasars with anomalously weak IR emission are presented, and the effects of starlight subtraction on estimates of the UV and IR component strengths are discussed. Inferred model parameters are very sensitive to the position of the peak of the UV energy distribution. In many low redshift objects the peak is not seen; even in those objects where the turnover is clear, the turnover may not be intrinsic but instead due to reddening within the quasar host galaxy. The small number of unusual quasars with weak IR emission will be of utility as a probe of the quasar phenomenon in the absence of dominant dust reprocessing.

  12. The Zirconia Ceramic: Strengths and Weaknesses

    PubMed Central

    Daou, Elie E.

    2014-01-01

    Metal ceramic restorations were considered the gold standard as reliable materials. Increasing demand for esthetics supported the commercialization of new metal free restorations. A growing demand is rising for zirconia prostheses. Peer-reviewed articles published till July 2013 were identified through a Medline (Pubmed and Elsevier). Emphasizing was made on zirconia properties and applications. Zirconia materials are able to withstand posterior physiologic loads. Although zirconia cores are considered as reliable materials, these restorations are not problem free. PMID:24851138

  13. Weak bump quasars

    NASA Technical Reports Server (NTRS)

    Wilkes, B. J.; Mcdowell, J.

    1994-01-01

    Research into the optical, ultraviolet and infrared continuum emission from quasars and their host galaxies was carried out. The main results were the discovery of quasars with unusually weak infrared emission and the construction of a quantitative estimate of the dispersion in quasar continuum properties. One of the major uncertainties in the measurement of quasar continuum strength is the contribution to the continuum of the quasar host galaxy as a function of wavelength. Continuum templates were constructed for different types of host galaxy and individual estimates made of the decomposed quasar and host continua based on existing observations of the target quasars. The results are that host galaxy contamination is worse than previously suspected, and some apparent weak bump quasars are really normal quasars with strong host galaxies. However, the existence of true weak bump quasars such as PHL 909 was confirmed. The study of the link between the bump strength and other wavebands was continued by comparing with IRAS data. There is evidence that excess far infrared radiation is correlated with weaker ultraviolet bumps. This argues against an orientation effect and implies a probable link with the host galaxy environment, for instance the presence of a luminous starburst. However, the evidence still favors the idea that reddening is not important in those objects with ultraviolet weak bumps. The same work has led to the discovery of a class of infrared weak quasars. Pushing another part of the envelope of quasar continuum parameter space, the IR-weak quasars have implications for understanding the effects of reddening internal to the quasars, the reality of ultraviolet turnovers, and may allow further tests of the Phinney dust model for the IR continuum. They will also be important objects for studying the claimed IR to x-ray continuum correlation.

  14. Fixing Employee Weaknesses: Addressing the Myth.

    ERIC Educational Resources Information Center

    Gilley, Jerry W.

    2001-01-01

    Suggests that human resources development professionals need to change their performance improvement focus and philosophy to embrace the importance of building on strengths and managing weaknesses. Identifies five characteristics indicative of employees' strengths. Describes seven strategies to help employees minimize their weaknesses while…

  15. Weak Interactions

    DOE R&D Accomplishments Database

    Lee, T. D.

    1957-06-01

    Experimental results on the non-conservation of parity and charge conservation in weak interactions are reviewed. The two-component theory of the neutrino is discussed. Lepton reactions are examined under the assumption of the law of conservation of leptons and that the neutrino is described by a two- component theory. From the results of this examination, the universal Fermi interactions are analyzed. Although reactions involving the neutrino can be described, the same is not true of reactions which do not involve the lepton, as the discussion of the decay of K mesons and hyperons shows. The question of the invariance of time reversal is next examined. (J.S.R.)

  16. Credible threats and promises.

    PubMed Central

    McNamara, John M; Houston, Alasdair I

    2002-01-01

    We consider various implications of information about the other player in two-player evolutionary games. A simple model of desertion shows that information about the partner's behaviour can be disadvantageous, and highlights the idea of credible threats. We then discuss the general issue of whether the partner can convince the focal player that it will behave in a specific way, i.e. whether the focal player can make credible threats or promises. We show that when desertion decisions depend on reserves, a player can manipulate its reserves so as to create a credible threat of desertion. We then extend previous work on the evolution of trust and commitment, discussing conditions under which it is advantageous to assume that a partner will behave in a certain way even though it is not in its best interest. PMID:12495517

  17. Ancient woodlands: modern threats.

    PubMed

    Rackham, Oliver

    2008-01-01

    This review discusses the following adverse influences on long-established forests, wood-pastures, and savannas in Europe and other continents: destruction and fragmentation; depletion; pollution and eutrophication; fire and lack of fire; excessive shade; excessive numbers of deer; invasive species and cultivars; infilling of savanna; climate change; and globalization of plant diseases. Human influences on the world's mainland forests and savannas have been pervasive throughout the Holocene, to the extent that recovering 'virgin forest' becomes a somewhat nebulous conservation objective. Present and future threats arise both from increasing human activities and from withdrawal of the human activities that have shaped forests in the past. The severity of different threats depends on so many factors, especially the properties of different plants and animals, that generalization is impossible; however, in the long term, spread of pathogens is probably the most serious threat. PMID:18771472

  18. Threat radar system simulations

    NASA Astrophysics Data System (ADS)

    Miller, L.

    The capabilities, requirements, and goals of radar emitter simulators are discussed. Simulators are used to evaluate competing receiver designs, to quantify the performance envelope of a radar system, and to model the characteristics of a transmitted signal waveform. A database of candidate threat systems is developed and, in concert with intelligence data on a given weapons system, permits upgrading simulators to new projected threat capabilities. Four currently available simulation techniques are summarized, noting the usefulness of developing modular software for fast controlled-cost upgrades of simulation capabilities.

  19. Threat Assessment Plans

    ERIC Educational Resources Information Center

    Pascopella, Angela

    2008-01-01

    With every new case of school violence, district leaders are urged to be proactive in hopes of averting potential violence. Experts say part of that proactive work comes from a threat assessment plan that every district should have. While every district that receives funds from the U.S. Department of Education for school safety is required to have…

  20. ThreatView

    SciTech Connect

    Shead, Timothy M.; Wylie, Brian

    2007-09-25

    The ThreatView project is based on our prior work with the existing ParaView open-source scientific visualization application. Where ParaView provides a grapical client optimized scientific visualization over the VTK parallel client server architecture, ThreatView provides a client optimized for more generic visual analytics over the same architecture. Because ThreatView is based on the VTK parallel client-server architecture, data sources can reside on remote hosts, and processing and rendering can be performed in parallel. As seen in Fig. 1, ThreatView provides four main methods for visualizing data: Landscape View, which displays a graph using a landscape metaphor where clusters of graph nodes produce "hills" in the landscape; Graph View, which displays a graph using a traditional "ball-and-stick" style; Table View, which displays tabular data in a standard spreadsheet; and Attribute View, which displays a tabular "histogram" of input data - for a selected table column, the Attribute View displays each unique value within the column, and the number of times that value appears in the data. There are two supplemental view types: Text View, which displays tabular data one-record-at-a-time; and the Statistics View, which displays input metadata, such as the number of vertices and edges in a graph, the number of rows in a table, etc.

  1. Proliferation: Threat and response

    SciTech Connect

    1996-04-01

    ;Table of Contents: Section I: The Regional Proliferation Challenge; Northeast Asia; The Middle East and North Africa; The Former Soviet Union: Russia, Ukrane, Kazakstan, And Belarus; South Asia; The International Threat: Dangers from Terrorism, Insurgencies, Civil Wars, And Organized Crime; Section II: Department of Defense Response; Technical Annex: Accessible Technologies; Glossary.

  2. Environmental Threats at School

    ERIC Educational Resources Information Center

    Green, Twhanna

    2005-01-01

    Children can be exposed to dangerous chemicals and toxins in the most unlikely of places: Their schools. This brief article describes the types of threats that school environments pose to students' health, including such pollution and chemical exposures as lead, mercury, arsenic, molds, and poor indoor air quality. The article provides tips for…

  3. The Population Threat

    ERIC Educational Resources Information Center

    McNamara, Robert S.

    1969-01-01

    In an address delivered at the University of Notre Dame, May 1969, Secretary McNamara discussed the threat of unmanageable population pressure which is undervalued and misunderstood by the general public. Unrestricted population growth will have catastrophic consequences unless it is dealt with rapidly and rationally. Copies from: Office of…

  4. Ethical Proactive Threat Research

    NASA Astrophysics Data System (ADS)

    Aycock, John; Sullins, John

    Through a provocative examination of the positive effects of computer security research on regular users, we argue that traditional security research is insufficient. Instead, we turn to a largely untapped alternative, proactive threat research, a fruitful research area but an ethical minefield. We discuss practices for ethical research and dissemination of proactive research.

  5. ThreatView

    Energy Science and Technology Software Center (ESTSC)

    2007-09-25

    The ThreatView project is based on our prior work with the existing ParaView open-source scientific visualization application. Where ParaView provides a grapical client optimized scientific visualization over the VTK parallel client server architecture, ThreatView provides a client optimized for more generic visual analytics over the same architecture. Because ThreatView is based on the VTK parallel client-server architecture, data sources can reside on remote hosts, and processing and rendering can be performed in parallel. As seenmore » in Fig. 1, ThreatView provides four main methods for visualizing data: Landscape View, which displays a graph using a landscape metaphor where clusters of graph nodes produce "hills" in the landscape; Graph View, which displays a graph using a traditional "ball-and-stick" style; Table View, which displays tabular data in a standard spreadsheet; and Attribute View, which displays a tabular "histogram" of input data - for a selected table column, the Attribute View displays each unique value within the column, and the number of times that value appears in the data. There are two supplemental view types: Text View, which displays tabular data one-record-at-a-time; and the Statistics View, which displays input metadata, such as the number of vertices and edges in a graph, the number of rows in a table, etc.« less

  6. Quantum discord with weak measurements

    SciTech Connect

    Singh, Uttam Pati, Arun Kumar

    2014-04-15

    Weak measurements cause small change to quantum states, thereby opening up the possibility of new ways of manipulating and controlling quantum systems. We ask, can weak measurements reveal more quantum correlation in a composite quantum state? We prove that the weak measurement induced quantum discord, called as the “super quantum discord”, is always larger than the quantum discord captured by the strong measurement. Moreover, we prove the monotonicity of the super quantum discord as a function of the measurement strength and in the limit of strong projective measurement the super quantum discord becomes the normal quantum discord. We find that unlike the normal discord, for pure entangled states, the super quantum discord can exceed the quantum entanglement. Our results provide new insights on the nature of quantum correlation and suggest that the notion of quantum correlation is not only observer dependent but also depends on how weakly one perturbs the composite system. We illustrate the key results for pure as well as mixed entangled states. -- Highlights: •Introduced the role of weak measurements in quantifying quantum correlation. •We have introduced the notion of the super quantum discord (SQD). •For pure entangled state, we show that the SQD exceeds the entanglement entropy. •This shows that quantum correlation depends not only on observer but also on measurement strength.

  7. Airborne Particulate Threat Assessment

    SciTech Connect

    Patrick Treado; Oksana Klueva; Jeffrey Beckstead

    2008-12-31

    Aerosol threat detection requires the ability to discern between threat agents and ambient background particulate matter (PM) encountered in the environment. To date, Raman imaging technology has been demonstrated as an effective strategy for the assessment of threat agents in the presence of specific, complex backgrounds. Expanding our understanding of the composition of ambient particulate matter background will improve the overall performance of Raman Chemical Imaging (RCI) detection strategies for the autonomous detection of airborne chemical and biological hazards. Improving RCI detection performance is strategic due to its potential to become a widely exploited detection approach by several U.S. government agencies. To improve the understanding of the ambient PM background with subsequent improvement in Raman threat detection capability, ChemImage undertook the Airborne Particulate Threat Assessment (APTA) Project in 2005-2008 through a collaborative effort with the National Energy Technology Laboratory (NETL), under cooperative agreement number DE-FC26-05NT42594. During Phase 1 of the program, a novel PM classification based on molecular composition was developed based on a comprehensive review of the scientific literature. In addition, testing protocols were developed for ambient PM characterization. A signature database was developed based on a variety of microanalytical techniques, including scanning electron microscopy, FT-IR microspectroscopy, optical microscopy, fluorescence and Raman chemical imaging techniques. An automated particle integrated collector and detector (APICD) prototype was developed for automated collection, deposition and detection of biothreat agents in background PM. During Phase 2 of the program, ChemImage continued to refine the understanding of ambient background composition. Additionally, ChemImage enhanced the APICD to provide improved autonomy, sensitivity and specificity. Deliverables included a Final Report detailing our

  8. Rheology of weakly vibrated granular materials

    NASA Astrophysics Data System (ADS)

    Dijksman, J. A.; Wortel, G.; van Hecke, M.

    2009-06-01

    We show how weak vibrations substantially modify the rheology of granular materials. We experimentally probe dry granular flows in a weakly vibrated split bottom shear cell—the weak vibrations modulate gravity and act as an agitation source. By tuning the applied stress and vibration strength, and monitoring the resulting strain as a function of time, we uncover a rich phase diagram in which non-trivial transitions separate a jammed phase, a creep flow case, and a steady flow case.

  9. Spin effects in the weak interaction

    SciTech Connect

    Freedman, S.J. Chicago Univ., IL . Dept. of Physics Chicago Univ., IL . Enrico Fermi Inst.)

    1990-01-01

    Modern experiments investigating the beta decay of the neutron and light nuclei are still providing important constraints on the theory of the weak interaction. Beta decay experiments are yielding more precise values for allowed and induced weak coupling constants and putting constraints on possible extensions to the standard electroweak model. Here we emphasize the implications of recent experiments to pin down the strengths of the weak vector and axial vector couplings of the nucleon.

  10. Pollution: a global threat.

    PubMed

    McCrink-Goode, Melissa

    2014-07-01

    Over the past several decades, several large-scale seemingly unrelated events have unfolded in all corners of the world. Within the oceans, coral reef systems have been facing unprecedented mass bleaching episodes, sea turtles worldwide are currently experiencing an epidemic in the form of fibropapilloma, and global phytoplankton populations have declined by 40%. Within the Earth's terrestrial systems, similar phenomena have appeared in the form of colony collapse disorder (CCD) currently devastating honey bee colonies, White Nose Syndrome decimating bat populations, and the chytrid fungus plaguing amphibian populations. On the surface these events appear to be unrelated yet at the root of each phenomenon there appears an underlying threat - pollution. This paper will investigate the commonality of these occurrences as well as investigate the current and potential solutions to the threat. PMID:24727071

  11. Proliferation: Threat and response

    SciTech Connect

    1996-04-01

    During the height of the Cold War, the Russian physicist Andre Sakharov said, `Reducing the risk of annihilating humanity in a nuclear war carries an absolute priority over all other considerations.` The end of the Cold War has reduced the threat of global nuclear war, but today a new threat is rising from the global spread of nuclear, biological, and chemical weapons. Hostile groups and nations have tried - or have been able - to obtain these weapons, the technology, and homegrown ability to make them or ballistic missiles that can deliver the massive annihilation, poison, and death of these weapons hundreds of miles away. For rogue nations, these weapons are a ticket to power, stature, and confidence in regional war.

  12. Not All Threats Are Equal

    ERIC Educational Resources Information Center

    Surface, Jeanne L.

    2011-01-01

    School leaders must be fully prepared to respond to all types of threats that occur. In order to respond to threats most appropriately, the school needs to have a systematic approach that combines education, prevention, intervention, discipline, security, and crisis preparedness measures. All threats must be assessed carefully and swiftly,…

  13. [Counterfeit medicines: a growing threat].

    PubMed

    Barbereau, S

    2006-12-01

    The medical drug market has undergone considerable transformation in recent years. Like other products, medicines have been affected by globalization. Free trade policies have had a number of negative effects including a reduction in quality control not only for some products but also for raw materials and finished products. The global environment has also created conditions conducive to counterfeit medicines. The term counterfeit medicine is defined differently from one country to another in terms of quality, legality and fraudulent intent. This situation prompted the WHO to propose the following definition: "A counterfeit medicine is one which is deliberately and fraudulently mislabeled with respect to identity and/or source. Counterfeiting can apply to both branded and generic products and counterfeit products may include products with the correct ingredients or with the wrong ingredients, without active ingredients, with insufficient active ingredients or with fake packaging." Weak pharmaceutical regulation often compounded by widespread corruption in developing countries has greatly facilitated the development of this illicit market with harmful and costly effects on public health. Due to the lack of pharmocovigilance accidents involving use of counterfeit drugs go unreported. For this reason it is not possible to measure the economic impact. While counterfeiting has become a major threat in developing countries, it also affects industrialized countries. Fraudulent behavior occurs all over the world. PMID:17286014

  14. Combating emerging viral threats

    PubMed Central

    Bekerman, Elena; Einav, Shirit

    2015-01-01

    Synopsis Most approved antiviral therapeutics selectively inhibit proteins encoded by a single virus, thereby providing a “one drug-one bug” solution. As a result of this narrow spectrum of coverage and the high cost of drug development, therapies are currently approved for fewer than ten viruses out of the hundreds known to cause human disease. This perspective summarizes progress and challenges in the development of broad-spectrum antiviral therapies. These strategies include targeting enzymatic functions shared by multiple viruses and host cell machinery by newly discovered compounds or by repurposing approved drugs. These approaches offer new practical means for developing therapeutics against existing and emerging viral threats. PMID:25883340

  15. Ocean-sized threats

    NASA Astrophysics Data System (ADS)

    Showstack, Randy

    Jane Lubchenco, professor of marine biology and zoology at Oregon State University, and president-elect of the International Council for Science, said that scientists can do more than they currently are doing to clearly communicate to the public and to policy-makers those issues associated with the many ecological threats faced by the world's oceans. In doing so, scientists can overcome popularly-held misperceptions about the health of the world's oceans and thus, help protect the seas.“Science,” Lubchenco said, “has a huge role to play in informing [the public] what is happening and to guide the choice of solutions.

  16. New global viral threats.

    PubMed

    Erdem, Hakan; Ünal, Serhat

    2015-04-01

    Infectious diseases have caused great catastrophes in human history, as in the example of the plague, which wiped out half of the population in Europe in the 14th century. Ebola virus and H7N9 avian influenza virus are 2 lethal pathogens that we have encountered in the second decade of the 21st century. Ebola infection is currently being seen in West Africa, and H7N9 avian flu appears to have settled in Southeast Asia. This article focuses on the current situation and the future prospects of these potential infectious threats to mankind. PMID:25828274

  17. Threats to international science

    NASA Astrophysics Data System (ADS)

    Kisslinger, Carl

    The role of nongovernmental organizations (NGOs) as effective agents for promoting world science is seriously threatened. It is ironic that the threat comes from Norway and Denmark, two countries that have demonstrated a deep commitment to individual freedom and human rights. Motivated by a sincere desire to express their strongest disapproval of the “apartheid” policies of the government of the Republic of South Africa, these countries have passed laws that have the effect of rejecting the International Council of Scientific Unions (ICSU) principles of nondiscrimination and free circulation of scientists.

  18. Mediators of Stereotype Threat among Black College Students.

    PubMed

    Massey, Douglas S; Owens, Jayanti

    2014-04-01

    We hypothesize that the manner in which stereotype threat affects college grade achievement is mediated by institutional context as well as individual characteristics. Drawing on a sample of black students from the National Longitudinal Survey of Freshmen we find weak and inconsistent evidence that institutional characteristics influence the operation of stereotype threat. We find more consistent evidence to indicate that the effect of stereotype threat is conditioned by individual factors such as skin color, multiracial origins, and an integrated upbringing. Most of the effect on grade achievement occurs through the internalization pathway, in which the internalization of negative stereotypes leads to disinvestment manifested by a reduction in academic effort. The reduction in work effort, in turn, lowers grades. We also find evidence that immigrant origin confers protection from the negative effects of stereotype threat through both internalization and externalization mechanisms, though the ultimate effect of grade achievement is rather small. PMID:24860201

  19. Categorizing threat : building and using a generic threat matrix.

    SciTech Connect

    Woodard, Laura; Veitch, Cynthia K.; Thomas, Sherry Reede; Duggan, David Patrick

    2007-09-01

    The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and is not available for general use, such as the design of defenses and the development of mitigation strategies. To reduce the complexity of analyzing threat, the threat space must first be reduced. This is achieved by taking the continuous nature of the threat space and creating an abstraction that allows the entire space to be grouped, based on measurable attributes, into a small number of distinctly different levels. The work documented in this report is an effort to create such an abstraction.

  20. Laser Threat Analysis System (LTAS)

    NASA Astrophysics Data System (ADS)

    Pfaltz, John M.; Richardson, Christina E.; Ruiz, Abel; Barsalou, Norman; Thomas, Robert J.

    2002-11-01

    LTAS is a totally integrated modeling and simulation environment designed for the purpose of ascertaining the susceptibility of Air Force pilots and air crews to optical radiation threats. Using LTAS, mission planners can assess the operational impact of optically directed energy weapons and countermeasures. Through various scenarios, threat analysts are able to determine the capability of laser threats and their impact on operational missions including the air crew's ability to complete their mission effectively. Additionally, LTAS allows the risk of laser use on training ranges and the requirement for laser protection to be evaluated. LTAS gives mission planners and threat analysts complete control of the threat environment including threat parameter control and placement, terrain mapping (line-of-site), atmospheric conditions, and laser eye protection (LEP) selection. This report summarizes the design of the final version of LTAS, and the modeling methodologies implemented to accomplish analysis.

  1. Recurrent dreams: Recurring threat simulations?

    PubMed

    Valli, K; Revonsuo, A

    2006-06-01

    Zadra, Desjardins, and Marcotte (2006) have made a valuable contribution to the empirical testing of the Threat Simulation Theory (TST) (Revonsuo, 2000a) in recurrent dreams. For the most part, their results are in accordance with the theory, while some findings seem to conflict with the predictions of TST. In our commentary, we consider some alternative ways to interpret the results, and we conclude that many prominent features of most recurrent dreams seem to be manifestations of a threat simulation function, leading to repeated rehearsal of threat perception and avoidance, but a minority of recurrent dreams seem to have origins unrelated to threat simulation. PMID:16019227

  2. The threat simulation theory in light of recent empirical evidence: a review.

    PubMed

    Valli, Katja; Revonsuo, Antti

    2009-01-01

    The recently proposed threat simulation theory (TST) states that dreaming about threatening events has a biological function. In the past few years, the TST has led to several dream content analysis studies that empirically test the theory. The predictions of the TST have been investigated mainly with a new content analysis system, the Dream Threat Scale (DTS), a method developed for identifying and classifying threatening events in dreams. In this article we review the studies that have tested the TST with the DTS. We summarize and reevaluate the results based on the dreams of Finnish and Swedish university students, traumatized and nontraumatized Kurdish, Palestinian, and Finnish children, and special dream samples, namely recurrent dreams and nightmares collected from Canadian participants. We sum up other recent research that has relevance for the TST and discuss the extent to which empirical evidence supports or conflicts with the TST. New evidence and new direct tests of the predictions of the TST yield strong support for the theory, and the TST's strengths seem to outweigh its weaknesses. PMID:19353929

  3. Linking Stereotype Threat and Anxiety

    ERIC Educational Resources Information Center

    Osborne, Jason W.

    2007-01-01

    Claude Steele's stereotype threat hypothesis has attracted significant attention in recent years. This study tested one of the main tenets of his theory--that stereotype threat serves to increase individual anxiety levels, thus hurting performance--using real-time measures of physiological arousal. Subjects were randomly assigned to either high or…

  4. Bio-threat microparticle simulants

    DOEpatents

    Farquar, George Roy; Leif, Roald N

    2012-10-23

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  5. Threat Assessment in College Settings

    ERIC Educational Resources Information Center

    Cornell, Dewey

    2010-01-01

    In 2007, the landscape of campus safety changed abruptly with the Virginia Tech shooting and the subsequent wave of anonymous threats in colleges across the country. In response to the tragedy, the Virginia state legislature mandated that every public institution of higher education establish a "threat assessment team." Both the FBI and the U.S.…

  6. Bomb Threat Assessments. Fact Sheet

    ERIC Educational Resources Information Center

    Tunkel, Ronald F.

    2010-01-01

    This information provides a brief, summary outline of how investigators should assess anonymous bomb threats at schools. Applying these principles may help administrators and law enforcement personnel accurately assess the viability and credibility of a threat and appropriately gauge their response. Any credible evidence provided by teachers or…

  7. Bio-threat microparticle simulants

    SciTech Connect

    Farquar, George Roy; Leif, Roald

    2014-09-16

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  8. Psychoanalysis and the nuclear threat

    SciTech Connect

    Levine, H.B.; Jacobs, D.; Rubin, L.J.

    1988-01-01

    {ital Psychoanalysis and the Nuclear Threat} provides coverage of the dynamic and clinical considerations that follow from life in the nuclear age. Of special clinical interest are chapters dealing with the developmental consequences of the nuclear threat in childhood, adolescence, and adulthood, and those exploring the technical issues raised by the occurrence in analytic and psychotherapeutic hours of material related to the nuclear threat. Additional chapters bring a psychoanalytic perspective to bear on such issues as the need to have enemies, silence as the real crime, love, work, and survival in the nuclear age, the relationship of the nuclear threat to issues of mourning and melancholia, apocalyptic fantasies, the paranoid process, considerations of the possible impact of gender on the nuclear threat, and the application of psychoanalytic thinking to nuclear arms strategy. Finally, the volume includes the first case report in the English language---albeit a brief psychotherapy---involving the treatment of a Hiroshima survivor.

  9. Threat expert system technology advisor

    NASA Technical Reports Server (NTRS)

    Kurrasch, E. R.; Tripp, L. R.

    1987-01-01

    A prototype expert system was developed to determine the feasibility of using expert system technology to enhance the performance and survivability of helicopter pilots in a combat threat environment while flying NOE (Nap of the Earth) missions. The basis for the concept is the potential of using an Expert System Advisor to reduce the extreme overloading of the pilot who flies NOE mission below treetop level at approximately 40 knots while performing several other functions. The ultimate goal is to develop a Threat Expert System Advisor which provides threat information and advice that are better than even a highly experienced copilot. The results clearly show that the NOE pilot needs all the help in decision aiding and threat situation awareness that he can get. It clearly shows that heuristics are important and that an expert system for combat NOE helicopter missions can be of great help to the pilot in complex threat situations and in making decisions.

  10. Weak Value Theory

    SciTech Connect

    Shikano, Yutaka

    2011-03-28

    I show that the weak value theory is useful from the viewpoints of the experimentally verifiability, consistency, capacity for explanation as to many quantum paradoxes, and practical advantages. As an example, the initial state in the Hardy paradox can be experimentally verified using the weak value via the weak measurement.

  11. Stereotype Threat as Validity Threat: The Anxiety-Sex-Threat Interaction

    ERIC Educational Resources Information Center

    Delgado, Ana R.; Prieto, Gerardo

    2008-01-01

    Stereotype threat has been invoked to explain underperformance on a variety of groups for whom the stereotypes allege inferior cognitive abilities. In math testing, stereotype threat has been used to explain sex differences in test performance. This paper describes an experimental study on a large sample (n = 313), in which the role of anxiety and…

  12. Weak Measurements Destroy Too Much Quantum Correlation

    NASA Astrophysics Data System (ADS)

    Wu, Shao-xiong; Zhang, Jun; Yu, Chang-shui; Song, He-shan

    2016-01-01

    The quantum correlation under weak measurements is studied via skew information. For 2 × d-dimensional states, it can be given by a closed form which linearly depends on the quantum correlation [EPL. 107 (2014) 10007] determined by the strength of the weak measurement. It is found that the quantum correlation under weak measurements only captures partial quantumness of the state. In particular, the extraction of the residual quantumness by the latter measurements will inevitably destroy too much quantumness. To demonstration, the Werner state is given as an example.

  13. Managing biosecurity threats in China.

    PubMed

    Huang, Yanzhong

    2011-03-01

    Compared to the extensive literature on bioterrorism and biosecurity in the United States, less analysis has been conducted on similar challenges in China. This article seeks to fill this void by providing an integrated and updated assessment of 3 major biosecurity threats China faces: biowarfare, bioterrorism, and biocrimes. An analysis of China's biosecurity threats and biodefense building suggest varying levels of risk associated with each threat type. First, a direct bioweapons attack on China is highly unlikely, although the threat of biowarfare cannot be simply written off. Second, potential perpetrators of bioterrorism have capabilities at their disposal for carrying out such attacks. While terrorist organizations in China do not have a strong interest in bioterrorism, the limited state capability to counter such a threat may increase the risk in the future. Third, unlike the threats of biowarfare and bioterrorism, potential perpetrators of biocrimes have both incentives and capabilities, and biocrimes can produce reactions far out of proportion to the actual number of casualties. Despite the distinct biosecurity challenges it faces, China has yet to articulate a differentiated and coherent strategy to effectively tackle the challenges. Assessing different types of biosecurity threats in terms of degrees of risk not only provides greater analytical clarity but also has important implications for the strategies required to manage the risks. PMID:21361794

  14. Apple Strength Issues

    SciTech Connect

    Syn, C

    2009-12-22

    Strength of the apple parts has been noticed to decrease, especially those installed by the new induction heating system since the LEP campaign started. Fig. 1 shows the ultimate tensile strength (UTS), yield strength (YS), and elongation of the installed or installation-simulated apples on various systems. One can clearly see the mean values of UTS and YS of the post-LEP parts decreased by about 8 ksi and 6 ksi respectively from those of the pre-LEP parts. The slight increase in elongation seen in Fig.1 can be understood from the weak inverse relationship between the strength and elongation in metals. Fig.2 shows the weak correlation between the YS and elongation of the parts listed in Fig. 1. Strength data listed in Figure 1 were re-plotted as histograms in Figs. 3 and 4. Figs. 3a and 4a show histograms of all UTS and YS data. Figs. 3b and 4b shows histograms of pre-LEP data and Figs. 3c and 4c of post-LEP data. Data on statistical scatter of tensile strengths have been rarely published by material suppliers. Instead, only the minimum 'guaranteed' strength data are typically presented. An example of strength distribution of aluminum 7075-T6 sheet material, listed in Fig. 5, show that its scatter width of both UTS and YS for a single sheet can be about 6 ksi and for multi-lot scatter can be as large as 11 ksi even though the sheets have been produced through well-controlled manufacturing process. By approximating the histograms shown in Figs. 3 and 4 by a Gaussian or similar type of distribution curves, one can plausibly see the strength reductions in the later or more recent apples. The pre-LEP data in Figs. 3b and 4b show wider scatter than the post-LEP data in Figs. 3c and 4c and seem to follow the binomial distribution of strength indicating that the apples might have been made from two different lots of material, either from two different vendors or from two different melts of perhaps slightly different chemical composition by a single vendor. The post

  15. Global Threats to Child Safety.

    PubMed

    Mace, Sharon E

    2016-02-01

    Children have rights, as enumerated in the Declaration of the Rights of the Child, and need protection from violence, exploitation, and abuse. Global threats to child safety exist. These threats include lack of basic needs (food, clean water, sanitation), maltreatment, abandonment, child labor, child marriage, female genital mutilation, child trafficking, disasters, and armed conflicts/wars. Recent disasters and armed conflicts have led to a record number of displaced people especially children and their families. Strategies and specific programs can be developed and implemented for eliminating threats to the safety of children. PMID:26613687

  16. Heat Waves Are Health Threats

    MedlinePlus

    ... medlineplus/news/fullstory_159694.html Heat Waves Are Health Threats Drink plenty of water and use air ... on: Heat Illness Recent Health News Related MedlinePlus Health Topics Heat Illness About MedlinePlus Site Map FAQs ...

  17. Bomb Threat Becomes Real News.

    ERIC Educational Resources Information Center

    Gastaldo, Evann

    1999-01-01

    Discusses how the staff of the newspaper at Camarillo High School (California) covered a bomb threat at their school. Describes how they, overnight, conducted interviews, took and developed photographs, produced the layout, and published the newspaper. (RS)

  18. Heat Waves Are Health Threats

    MedlinePlus

    ... https://medlineplus.gov/news/fullstory_159694.html Heat Waves Are Health Threats Drink plenty of water and ... 2016 SATURDAY, July 2, 2016 (HealthDay News) -- Heat waves are more than uncomfortable, they can be deadly. ...

  19. Aperiodic Weak Topological Superconductors.

    PubMed

    Fulga, I C; Pikulin, D I; Loring, T A

    2016-06-24

    Weak topological phases are usually described in terms of protection by the lattice translation symmetry. Their characterization explicitly relies on periodicity since weak invariants are expressed in terms of the momentum-space torus. We prove the compatibility of weak topological superconductors with aperiodic systems, such as quasicrystals. We go beyond usual descriptions of weak topological phases and introduce a novel, real-space formulation of the weak invariant, based on the Clifford pseudospectrum. A nontrivial value of this index implies a nontrivial bulk phase, which is robust against disorder and hosts localized zero-energy modes at the edge. Our recipe for determining the weak invariant is directly applicable to any finite-sized system, including disordered lattice models. This direct method enables a quantitative analysis of the level of disorder the topological protection can withstand. PMID:27391744

  20. Aperiodic Weak Topological Superconductors

    NASA Astrophysics Data System (ADS)

    Fulga, I. C.; Pikulin, D. I.; Loring, T. A.

    2016-06-01

    Weak topological phases are usually described in terms of protection by the lattice translation symmetry. Their characterization explicitly relies on periodicity since weak invariants are expressed in terms of the momentum-space torus. We prove the compatibility of weak topological superconductors with aperiodic systems, such as quasicrystals. We go beyond usual descriptions of weak topological phases and introduce a novel, real-space formulation of the weak invariant, based on the Clifford pseudospectrum. A nontrivial value of this index implies a nontrivial bulk phase, which is robust against disorder and hosts localized zero-energy modes at the edge. Our recipe for determining the weak invariant is directly applicable to any finite-sized system, including disordered lattice models. This direct method enables a quantitative analysis of the level of disorder the topological protection can withstand.

  1. Combating the Insider Cyber Threat

    SciTech Connect

    Greitzer, Frank L.; Moore, Andrew P.; Cappelli, Dawn M.; Andrews, Dee H.; Carroll, Lynn; Hull, Thomas D.

    2008-01-02

    This article represents a collaboration between PNNL, CERT/CMU, and AFRL that describes needs and related efforts by these institutions to develop technologies and approaches to counter cyber threats by insiders to informatin systems. The main focus of this article is on the need for effective training on insider threat to raise staff awareness and encourage organizations to adopt a more effective approach to identifying potential risks and take proactive steps to mitigate them.

  2. Strength Testing.

    ERIC Educational Resources Information Center

    Londeree, Ben R.

    1981-01-01

    Postural deviations resulting from strength and flexibility imbalances include swayback, scoliosis, and rounded shoulders. Screening tests are one method for identifying strength problems. Tests for the evaluation of postural problems are described, and exercises are presented for the strengthening of muscles. (JN)

  3. Media use and children's perceptions of societal threat and personal vulnerability.

    PubMed

    Comer, Jonathan S; Furr, Jami M; Beidas, Rinad S; Babyar, Heather M; Kendall, Philip C

    2008-07-01

    This study examined children's media use (i.e., amount of television and Internet usage) and relationships to children's perceptions of societal threat and personal vulnerability. The sample consisted of 90 community youth aged 7 to 13 years (M = 10.8; 52.2% male) from diverse economic backgrounds. Analyses found children's television use to be associated with elevated perceptions of personal vulnerability to world threats (i.e., crime, terrorism, earthquakes, hurricanes, and floods). An interactive model of television use and child anxiety in accounting for children's personal threat perceptions was supported, in which the strength of television consumption in predicting children's personal threat perceptions was greater for children with greater anxiety. Relationships were found neither between children's Internet use and threat perceptions nor between media use and perceptions of societal threat. PMID:18645752

  4. Threat image projection in CCTV

    NASA Astrophysics Data System (ADS)

    Neil, David; Thomas, Nicola; Baker, Bob

    2007-10-01

    Operators are key components in a Closed Circuit Television (CCTV) system, being the link between the system technology and its effective use. Operators' performance will largely determine the level of service provided by the system. There have been few studies testing operator performance, while much work has been done to test the performance of the technology. Previous work on CCTV operator performance carried out by the Home Office Scientific Development Branch (HOSDB) has used filmed video and subjects who knew they were undergoing testing, meaning subjects are likely to be concentrating harder on performing well. HOSDB believes that there is a need for a test that would be able to be routinely used in a CCTV control room throughout the course of a normal shift to provide management with operational performance data. Threat Image Projection (TIP) is routinely used in X-Ray baggage scanners to keep operators alert to possible threats. At random intervals, a threat target image is superimposed over the image of the baggage being screened. The operator then responds to this threat. A similar system could be used for CCTV operators. A threat image would be randomly superimposed over the live CCTV feed and the operator would be expected to respond to this.

  5. 28 CFR 36.208 - Direct threat.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Direct threat. 36.208 Section 36.208... ACCOMMODATIONS AND IN COMMERCIAL FACILITIES General Requirements § 36.208 Direct threat. (a) This part does not... individual poses a direct threat to the health or safety of others. (b) Direct threat means a...

  6. The Social Construction of the Soviet Threat.

    ERIC Educational Resources Information Center

    Nathanson, Charles E.; Skelly, James M.

    For almost 40 years the perception of a Soviet threat has influenced much foreign and domestic political behavior in the United States. How to respond to the threat has been a subject of intense debate, but the reality of the threat has been taken for granted. Conviction about the reality of this threat dates back to George Kennan's long telegram…

  7. Comparative Environmental Threat Analysis: Three Case Studies.

    ERIC Educational Resources Information Center

    Latour, J. B.; Reiling, R.

    1994-01-01

    Reviews how carrying capacity for different environmental problems is operationalized. Discusses whether it is possible to compare threats, using the exceeding of carrying capacity as a yardstick. Points out problems in comparative threat analysis using three case studies: threats to European groundwater resources, threats to ecosystems in Europe,…

  8. Cyber threats within civil aviation

    NASA Astrophysics Data System (ADS)

    Heitner, Kerri A.

    Existing security policies in civil aviation do not adequately protect against evolving cyber threats. Cybersecurity has been recognized as a top priority among some aviation industry leaders. Heightened concerns regarding cyber threats and vulnerabilities surround components utilized in compliance with the Federal Aviation Administration's (FAA) Next Generation Air Transportation (NextGen) implementation. Automated Dependent Surveillance-B (ADS-B) and Electronic Flight Bags (EFB) have both been exploited through the research of experienced computer security professionals. Civil aviation is essential to international infrastructure and if its critical assets were compromised, it could pose a great risk to public safety and financial infrastructure. The purpose of this research was to raise awareness of aircraft system vulnerabilities in order to provoke change among current national and international cybersecurity policies, procedures and standards. Although the education of cyber threats is increasing in the aviation industry, there is not enough urgency when creating cybersecurity policies. This project intended to answer the following questions: What are the cyber threats to ADS-B of an aircraft in-flight? What are the cyber threats to EFB? What is the aviation industry's response to the issue of cybersecurity and in-flight safety? ADS-B remains unencrypted while the FAA's mandate to implement this system is rapidly approaching. The cyber threat of both portable and non-portable EFB's have received increased publicity, however, airlines are not responding quick enough (if at all) to create policies for the use of these devices. Collectively, the aviation industry is not being proactive enough to protect its aircraft or airport network systems. That is not to say there are not leaders in cybersecurity advancement. These proactive organizations must set the standard for the future to better protect society and it's most reliable form of transportation.

  9. Coupling-deformed pointer observables and weak values

    NASA Astrophysics Data System (ADS)

    Zhang, Yu-Xiang; Wu, Shengjun; Chen, Zeng-Bing

    2016-03-01

    While the novel applications of weak values have recently attracted wide attention, weak measurement, the usual way to extract weak values, suffers from risky approximations and severe quantum noises. In this paper, we show that the weak-value information can be obtained exactly in strong measurement with postselections, via measuring the coupling-deformed pointer observables, i.e., the observables selected according to the coupling strength. With this approach, we keep all the advantages claimed by weak-measurement schemes and at the same time solve some widely criticized problems thereof, such as the questionable universality, systematical bias, and drastic inefficiency.

  10. The Strengths and Weaknesses of ISO 9000 in Vocational Education

    ERIC Educational Resources Information Center

    Bevans-Gonzales, Theresa L.; Nair, Ajay T.

    2004-01-01

    ISO 9000 is a set of quality standards that assists an organization to identify, correct and prevent errors, and to promote continual improvement. Educational institutions worldwide are implementing ISO 9000 as they face increasing external pressure to maintain accountability for funding. Similar to other countries, in the United States vocational…

  11. Overview of inhalation exposure techniques: strengths and weaknesses.

    PubMed

    Pauluhn, Jürgen

    2005-07-01

    The vast majority of toxicity studies and risk evaluations deal with single chemicals. Due to the growing interest in potential human health risks originating from exposure to environmental pollutants or lifestyle-related complex chemical mixtures, well thought-out tailor-made mechanistic inhalation toxicity studies have been performed. In contrast to the complex mixtures potentially encountered from hazardous waste sites, drinking water disinfection by-products, natural flavoring complexes or the cumulative intake of food additives and pesticide residues, the scientific evaluation of complex airborne mixtures, such as acid aerosols, atmospheres produced by combustion or thermolysis, e.g. residual oil fly ash (ROFA), diesel and gasoline exhaust, and tobacco smoke, or volatile organic chemicals (VOCs) in residential areas, to mention but a few, is a daunting challenge for experimental toxicologists. These challenges include the controlled in situ generation of exposure atmospheres, the compositions of which are often process-determined and metastable. This means that volatile agents may partition with liquid aerosols or be adsorbed onto surfaces of solid aerosols. Similarly, the nature and composition of test atmospheres might change continuously through oxidation and aging of constituents or coagulation of particles. This, in turn, poses additional challenges to the analytical characterization of such complex test atmospheres, including the identification of potential experimental artifacts. Accordingly, highly standardized and controlled inhalation studies are required for hazard identification of complex mixtures and the results of inhalation studies have to be analyzed judiciously due to the great number of experimental variables. These variables may be related to technical issues or to the specific features of the animal model. Although inhalation exposure of animals mimics human exposure best, not all results obtained under such rigorous test conditions might necessarily also occur under real-life exposure conditions. In addition, to simulate experimentally specific use or exposure patterns may impose a particular challenge to traditional approaches in terms of relevant exposure metrics and the analytes chosen to characterize exposure atmospheres. This paper addresses major developments in the discipline of inhalation toxicology with particular emphasis on the state-of-the-art testing of complex mixtures. PMID:16092719

  12. Cognitive Strengths and Weaknesses Associated with Prader-Willi Syndrome.

    ERIC Educational Resources Information Center

    Conners, Frances A.; Rosenquist, Celia J.; Atwell, Julie A.; Klinger, Laura Grofer

    2000-01-01

    Nine adults with Prader-Willi syndrome (PWS) and nine age- and IQ-matched adults with PWS completed standardized tests of long-term and short-term memory, visual and auditory processing, and reading and mathematics achievement. Contrary to previous findings, long-term memory in PWS subjects was strong relative to IQ and there was no evidence that…

  13. Finnish Vocational Education and Training in Comparison: Strengths and Weaknesses

    ERIC Educational Resources Information Center

    Virolainen, Maarit; Stenström, Marja-Leena

    2014-01-01

    The study investigates how the Finnish model of providing initial vocational education and training (IVET) has succeeded in terms of enhancing educational progress and employability. A relatively high level of participation in IVET makes the Finnish model distinctive from those of three other Nordic countries: Denmark, Norway and Sweden. All four…

  14. Strengths and Weaknesses of Two New Potato Herbicides

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Outlook (dimethenamid-p) and Chateau (flumioxazin) are two new preemergence herbicides labeled for use in potatoes. Both herbicides are restricted to preemergence applications only and improve nightshade control when tank mixed with other potato herbicides. Dimethenamid-p is particularly strong on ...

  15. History of Weak Interactions

    DOE R&D Accomplishments Database

    Lee, T. D.

    1970-07-01

    While the phenomenon of beta-decay was discovered near the end of the last century, the notion that the weak interaction forms a separate field of physical forces evolved rather gradually. This became clear only after the experimental discoveries of other weak reactions such as muon-decay, muon-capture, etc., and the theoretical observation that all these reactions can be described by approximately the same coupling constant, thus giving rise to the notion of a universal weak interaction. Only then did one slowly recognize that the weak interaction force forms an independent field, perhaps on the same footing as the gravitational force, the electromagnetic force, and the strong nuclear and sub-nuclear forces.

  16. Heterogeneous, weakly coupled map lattices

    NASA Astrophysics Data System (ADS)

    Sotelo Herrera, M.a. Dolores; San Martín, Jesús; Porter, Mason A.

    2016-07-01

    Coupled map lattices (CMLs) are often used to study emergent phenomena in nature. It is typically assumed (unrealistically) that each component is described by the same map, and it is important to relax this assumption. In this paper, we characterize periodic orbits and the laminar regime of type-I intermittency in heterogeneous weakly coupled map lattices (HWCMLs). We show that the period of a cycle in an HWCML is preserved for arbitrarily small coupling strengths even when an associated uncoupled oscillator would experience a period-doubling cascade. Our results characterize periodic orbits both near and far from saddle-node bifurcations, and we thereby provide a key step for examining the bifurcation structure of heterogeneous CMLs.

  17. Measuring Vulnerability to Stereotype Threat

    ERIC Educational Resources Information Center

    Barnard, Lucy; Burley, Hansel; Olivarez, Arturo; Crooks, Steven

    2008-01-01

    Introduction: In this study, we examined the psychometric properties of an instrument intended to measure vulnerability to stereotype threat. Method: We revised the instrument through assessing score reliability and then examined a domain specific model using confirmatory factor analyses. After examining the responses of the total sample…

  18. Hostile intelligence threat: US technology

    SciTech Connect

    Whitman, D.

    1988-11-01

    This publication outlines the hostile intelligence threat to U.S. industry and Western technology, including the operational capabilities of hostile intelligence services and their scientific and technological (S T) targets. Current intelligence strategies used against the United States are described and sources of information providing countermeasures guidance are listed. Points of contact for security and counterintelligence assistance are also included.

  19. Bomb Threats Taking Financial Toll

    ERIC Educational Resources Information Center

    Bowman, Darcia Harris

    2004-01-01

    Despite all its efforts to crack down on the bomb scares that disrupted classes again and again in 2003, North Carolina's Orange County district fell victim to yet another false alarm this school year, 2004. For some schools, bomb threats have become more routine than fire drills, with each incident ringing up multi-thousand-dollar tabs for…

  20. Cyber Threats to Nuclear Infrastructures

    SciTech Connect

    Robert S. Anderson; Paul Moskowitz; Mark Schanfein; Trond Bjornard; Curtis St. Michel

    2010-07-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  1. Airway clearance in neuromuscular weakness.

    PubMed

    Gauld, Leanne Maree

    2009-05-01

    Impaired airway clearance leads to recurrent chest infections and respiratory deterioration in neuromuscular weakness. It is frequently the cause of death. Cough is the major mechanism of airway clearance. Cough has several components, and assessment tools are available to measure the different components of cough. These include measuring peak cough flow, respiratory muscle strength, and inspiratory capacity. Each is useful in assessing the ability to generate an effective cough, and can be used to guide when techniques of assisting airway clearance may be effective for the individual and which are most effective. Techniques to assist airway clearance include augmenting inspiration by air stacking, augmenting expiration by assisting the cough, and augmenting both inspiration and expiration with the mechanical insufflator-exsufflator or by direct suctioning via a tracheostomy. Physiotherapists are invaluable in assisting airway clearance, and in teaching patients and their families how to use these techniques. Use of the mechanical insufflator-exsufflator has gained popularity in recent times, but several simpler, more economical methods are available to assist airway clearance that can be used effectively alone or in combination. This review examines the literature available on the assessment and management of impaired airway clearance in neuromuscular weakness. PMID:19379290

  2. Weak bump quasars

    NASA Technical Reports Server (NTRS)

    Mcdowell, Jonathan C.; Elvis, Martin; Wilkes, Belinda J.; Willner, Steven P.; Oey, M. S.

    1989-01-01

    The recent emphasis on big bumps dominating the UV continuum of quasars has obscured the facts that bump properties vary widely and that there are objects in which no such component is evident. As part of a survey of quasar continuum spectra, a class of quasars is identified in which the optical-UV continuum big bump feature appears to be weak or absent, relative to both IR and X-ray. These weak bump quasars are otherwise normal objects and constitute a few percent of the quasar population.

  3. Weak shock reflection

    NASA Astrophysics Data System (ADS)

    Hunter, John K.; Brio, Moysey

    2000-05-01

    We present numerical solutions of a two-dimensional inviscid Burgers equation which provides an asymptotic description of the Mach reflection of weak shocks. In our numerical solutions, the incident, reflected, and Mach shocks meet at a triple point, and there is a supersonic patch behind the triple point, as proposed by Guderley for steady weak-shock reflection. A theoretical analysis indicates that there is an expansion fan at the triple point, in addition to the three shocks. The supersonic patch is extremely small, and this work is the first time it has been resolved.

  4. Anisotropy of weakly vibrated granular flows.

    PubMed

    Wortel, Geert H; van Hecke, Martin

    2015-10-01

    We experimentally probe the anisotropy of weakly vibrated flowing granular media. Depending on the driving parameters-flow rate and vibration strength-this anisotropy varies significantly. We show how the anisotropy collapses when plotted as a function of the driving stresses, uncovering a direct link between stresses and anisotropy. Moreover, our data suggest that for small anisotropies, the shear stresses vanish. Anisotropy of the fabric of granular media thus plays a crucial role in determining the rheology of granular flows. PMID:26565148

  5. Rheology of weakly vibrated granular media

    NASA Astrophysics Data System (ADS)

    Wortel, Geert H.; Dijksman, Joshua A.; van Hecke, Martin

    2014-01-01

    We probe the rheology of weakly vibrated granular flows as function of flow rate, vibration strength, and pressure by performing experiments in a vertically vibrated split-bottom shear cell. For slow flows, we establish the existence of a vibration-dominated granular flow regime, where the driving stresses smoothly vanish as the driving rate is diminished. We distinguish three qualitatively different vibration-dominated rheologies, most strikingly a regime where the shear stresses no longer are proportional to the pressure.

  6. Weak interactions, omnivory and emergent food-web properties.

    PubMed Central

    Emmerson, Mark; Yearsley, Jon M.

    2004-01-01

    Empirical studies have shown that, in real ecosystems, species-interaction strengths are generally skewed in their distribution towards weak interactions. Some theoretical work also suggests that weak interactions, especially in omnivorous links, are important for the local stability of a community at equilibrium. However, the majority of theoretical studies use uniform distributions of interaction strengths to generate artificial communities for study. We investigate the effects of the underlying interaction-strength distribution upon the return time, permanence and feasibility of simple Lotka-Volterra equilibrium communities. We show that a skew towards weak interactions promotes local and global stability only when omnivory is present. It is found that skewed interaction strengths are an emergent property of stable omnivorous communities, and that this skew towards weak interactions creates a dynamic constraint maintaining omnivory. Omnivory is more likely to occur when omnivorous interactions are skewed towards weak interactions. However, a skew towards weak interactions increases the return time to equilibrium, delays the recovery of ecosystems and hence decreases the stability of a community. When no skew is imposed, the set of stable omnivorous communities shows an emergent distribution of skewed interaction strengths. Our results apply to both local and global concepts of stability and are robust to the definition of a feasible community. These results are discussed in the light of empirical data and other theoretical studies, in conjunction with their broader implications for community assembly. PMID:15101699

  7. How robust is human gait to muscle weakness?

    PubMed Central

    van der Krogt, Marjolein M.; Delp, Scott L.; Schwartz, Michael H.

    2015-01-01

    Humans have a remarkable capacity to perform complex movements requiring agility, timing, and strength. Disuse, aging, and disease can lead to a loss of muscle strength, which frequently limits the performance of motor tasks. It is unknown, however, how much weakness can be tolerated before normal daily activities become impaired. This study examines the extent to which lower limb muscles can be weakened before normal walking is affected. We developed muscle-driven simulations of normal walking and then progressively weakened all major muscle groups, one at the time and simultaneously, to evaluate how much weakness could be tolerated before execution of normal gait became impossible. We further examined the compensations that arose as a result of weakening muscles. Our simulations revealed that normal walking is remarkably robust to weakness of some muscles but sensitive to weakness of others. Gait appears most robust to weakness of hip and knee extensors, which can tolerate weakness well and without a substantial increase in muscle stress. In contrast, gait is most sensitive to weakness of plantarflexors, hip abductors, and hip flexors. Weakness of individual muscles results in increased activation of the weak muscle, and in compensatory activation of other muscles. These compensations are generally inefficient, and generate unbalanced joint moments that require compensatory activation in yet other muscles. As a result, total muscle activation increases with weakness as does the cost of walking. By clarifying which muscles are critical to maintaining normal gait, our results provide important insights for developing therapies to prevent or improve gait pathology. PMID:22386624

  8. In praise of weakness

    NASA Astrophysics Data System (ADS)

    Steinberg, Aephraim; Feizpour, Amir; Rozema; Mahler; Hayat

    2013-03-01

    Quantum physics is being transformed by a radical new conceptual and experimental approach known as weak measurement that can do everything from tackling basic quantum mysteries to mapping the trajectories of photons in a Young's double-slit experiment. Aephraim Steinberg, Amir Feizpour, Lee Rozema, Dylan Mahler and Alex Hayat unveil the power of this new technique.

  9. Weaknesses in Underperforming Schools

    ERIC Educational Resources Information Center

    van de Grift, Wim; Houtveen, Thoni

    2007-01-01

    In some Dutch elementary schools, the average performance of students over several years is significantly below the level that could be expected of them. This phenomenon is known as "underperformance." The most important identifiable weaknesses that go along with this phenomenon are that (a) learning material offered at school is insufficient to…

  10. Weak Radial Artery Pulse

    PubMed Central

    Venugopalan, Poothirikovil; Sivakumar, Puthuval; Ardley, Robert G.; Oates, Crispian

    2012-01-01

    We present an 11year-old boy with a weak right radial pulse, and describe the successful application of vascular ultrasound to identify the ulnar artery dominance and a thin right radial artery with below normal Doppler flow velocity that could explain the discrepancy. The implications of identifying this anomaly are discussed. PMID:22375269

  11. Weak Lensing with LSST

    NASA Astrophysics Data System (ADS)

    Wittman, David M.; Jain, B.; Jarvis, M.; Knox, L.; Margoniner, V.; Takada, M.; Tyson, J.; Zhan, H.; LSST Weak Lensing Science Collaboration

    2006-12-01

    Constraining dark energy parameters with weak lensing is one of the primary science goals of the LSST. The LSST Weak Lensing Science Collaboration has been formed with the goal of optimizing the weak lensing science by optimizing the survey cadence; working with Data Management to insure high-quality pipeline processing which will meet our needs; developing the necessary analysis tools well before the onset of data-taking; participating in high-fidelity simulations to test the system end-to-end; and analyzing the real dataset as it becomes available. We review the major weak lensing probes, the twoand three-point shear correlations, and how they constrain dark energy parameters. We also review the possibility of going beyond dark energy models and testing gravity with the LSST data. To realize the promise of the awesome LSST statistical precision, we must ensure that systematic errors are kept under control. We review the major sources of systematics and our plans for mitigation. We present data that demonstrate that these sources of systematics can be kept to a level smaller than the statistical error.

  12. Group Threat and Policy Change: The Spatial Dynamics of Prohibition Politics, 1890-1919.

    PubMed

    Andrews, Kenneth T; Seguin, Charles

    2015-09-01

    The authors argue that group threat is a key driver of the adoption of new and controversial policies. Conceptualizing threat in spatial terms, they argue that group threat is activated through the joint occurrence of (1) proximity to threatening groups and (2) the population density of threatened groups. By analyzing the adoption of county and state "dry laws" banning alcohol from 1890 to 1919, they first show that prohibition victories were driven by the relative strength of supportive constituencies such as native whites and rural residents, vis-à-vis opponents such as Irish, Italian, or German immigrants or Catholics. Second, they show that threat contributed to prohibition victories: counties bordering large immigrant or urban populations, which did not themselves contain similar populations, were more likely to adopt dry laws. Threat arises primarily from interactions between spatially proximate units at the local level, and therefore higher-level policy change is not reducible to the variables driving local policy. PMID:26594715

  13. Hypernuclear Weak Decays

    NASA Astrophysics Data System (ADS)

    Itonaga, K.; Motoba, T.

    The recent theoretical studies of Lambda-hypernuclear weak decaysof the nonmesonic and pi-mesonic ones are developed with the aim to disclose the link between the experimental decay observables and the underlying basic weak decay interactions and the weak decay mechanisms. The expressions of the nonmesonic decay rates Gamma_{nm} and the decay asymmetry parameter alpha_1 of protons from the polarized hypernuclei are presented in the shell model framework. We then introduce the meson theoretical Lambda N -> NN interactions which include the one-meson exchanges, the correlated-2pi exchanges, and the chiral-pair-meson exchanges. The features of meson exchange potentials and their roles on the nonmesonic decays are discussed. With the adoption of the pi + 2pi/rho + 2pi/sigma + omega + K + rhopi/a_1 + sigmapi/a_1 exchange potentials, we have carried out the systematic calculations of the nonmesonic decay observables for light-to-heavy hypernuclei. The present model can account for the available experimental data of the decay rates, Gamma_n/Gamma_p ratios, and the intrinsic asymmetry parameters alpha_Lambda (alpha_Lambda is related to alpha_1) of emitted protons well and consistently within the error bars. The hypernuclear lifetimes are evaluated by converting the total weak decay rates Gamma_{tot} = Gamma_pi + Gamma_{nm} to tau, which exhibit saturation property for the hypernuclear mass A ≥ 30 and agree grossly well with experimental data for the mass range from light to heavy hypernuclei except for the very light ones. Future extensions of the model and the remaining problems are also mentioned. The pi-mesonic weak processes are briefly surveyed, and the calculations and predictions are compared and confirmed by the recent high precision FINUDA pi-mesonic decay data. This shows that the theoretical basis seems to be firmly grounded.

  14. 24 CFR 9.131 - Direct threat.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 24 Housing and Urban Development 1 2011-04-01 2011-04-01 false Direct threat. 9.131 Section 9.131... DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT § 9.131 Direct threat. (a) This part does not require the agency..., privileges, advantages and accommodations of that agency when that individual poses a direct threat to...

  15. 28 CFR 35.139 - Direct threat.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 28 Judicial Administration 1 2013-07-01 2013-07-01 false Direct threat. 35.139 Section 35.139... LOCAL GOVERNMENT SERVICES General Requirements § 35.139 Direct threat. (a) This part does not require a... activities of that public entity when that individual poses a direct threat to the health or safety of...

  16. 28 CFR 36.208 - Direct threat.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 28 Judicial Administration 1 2013-07-01 2013-07-01 false Direct threat. 36.208 Section 36.208... ACCOMMODATIONS AND IN COMMERCIAL FACILITIES General Requirements § 36.208 Direct threat. (a) This part does not... individual poses a direct threat to the health or safety of others. (b) In determining whether an...

  17. 28 CFR 36.208 - Direct threat.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 28 Judicial Administration 1 2012-07-01 2012-07-01 false Direct threat. 36.208 Section 36.208... ACCOMMODATIONS AND IN COMMERCIAL FACILITIES General Requirements § 36.208 Direct threat. (a) This part does not... individual poses a direct threat to the health or safety of others. (b) In determining whether an...

  18. 24 CFR 9.131 - Direct threat.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 24 Housing and Urban Development 1 2013-04-01 2013-04-01 false Direct threat. 9.131 Section 9.131... DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT § 9.131 Direct threat. (a) This part does not require the agency..., privileges, advantages and accommodations of that agency when that individual poses a direct threat to...

  19. 28 CFR 35.139 - Direct threat.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 28 Judicial Administration 1 2014-07-01 2014-07-01 false Direct threat. 35.139 Section 35.139... LOCAL GOVERNMENT SERVICES General Requirements § 35.139 Direct threat. (a) This part does not require a... activities of that public entity when that individual poses a direct threat to the health or safety of...

  20. 28 CFR 36.208 - Direct threat.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 28 Judicial Administration 1 2014-07-01 2014-07-01 false Direct threat. 36.208 Section 36.208... ACCOMMODATIONS AND IN COMMERCIAL FACILITIES General Requirements § 36.208 Direct threat. (a) This part does not... individual poses a direct threat to the health or safety of others. (b) In determining whether an...

  1. 28 CFR 36.208 - Direct threat.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 28 Judicial Administration 1 2011-07-01 2011-07-01 false Direct threat. 36.208 Section 36.208... ACCOMMODATIONS AND IN COMMERCIAL FACILITIES General Requirements § 36.208 Direct threat. (a) This part does not... individual poses a direct threat to the health or safety of others. (b) In determining whether an...

  2. 24 CFR 9.131 - Direct threat.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 24 Housing and Urban Development 1 2014-04-01 2014-04-01 false Direct threat. 9.131 Section 9.131... DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT § 9.131 Direct threat. (a) This part does not require the agency..., privileges, advantages and accommodations of that agency when that individual poses a direct threat to...

  3. 24 CFR 9.131 - Direct threat.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false Direct threat. 9.131 Section 9.131... DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT § 9.131 Direct threat. (a) This part does not require the agency..., privileges, advantages and accommodations of that agency when that individual poses a direct threat to...

  4. 28 CFR 35.139 - Direct threat.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 28 Judicial Administration 1 2012-07-01 2012-07-01 false Direct threat. 35.139 Section 35.139... LOCAL GOVERNMENT SERVICES General Requirements § 35.139 Direct threat. (a) This part does not require a... activities of that public entity when that individual poses a direct threat to the health or safety of...

  5. 28 CFR 35.139 - Direct threat.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 28 Judicial Administration 1 2011-07-01 2011-07-01 false Direct threat. 35.139 Section 35.139... LOCAL GOVERNMENT SERVICES General Requirements § 35.139 Direct threat. (a) This part does not require a... activities of that public entity when that individual poses a direct threat to the health or safety of...

  6. Threat Assessment Teams Target School Crisis

    ERIC Educational Resources Information Center

    Stover, Del

    2005-01-01

    In this article, the author discusses the creation of a threat-assessment team to be utilized in order to analyze each threat and the usage of threat-assessment protocols for the purpose of guiding school administrators through a crisis. These are actually developed with the advice from the US Department of Education and the Secret Service. When a…

  7. Stereotype Threat, Test Anxiety, and Mathematics Performance

    ERIC Educational Resources Information Center

    Tempel, Tobias; Neumann, Roland

    2014-01-01

    We investigated the combined effects of stereotype threat and trait test anxiety on mathematics test performance. Stereotype threat and test anxiety interacted with each other in affecting performance. Trait test anxiety predicted performance only in a diagnostic condition that prevented stereotype threat by stereotype denial. A state measure of…

  8. Identifying Separation Threats in Family Therapy.

    ERIC Educational Resources Information Center

    Argles, Paul

    1983-01-01

    Outlines the types of separation threats common in troubled families. Signs that threats are being used may include inappropriate clinging behavior, phobias, psychosomatic symptoms, and anxious attachment. Therapists may find other behaviors, often seen as problems in themselves, that are really reactions to perceived separation threats. (JAC)

  9. Weak Interactions and Instability Cascades.

    PubMed

    Kadoya, Taku; McCann, Kevin S

    2015-01-01

    Food web theory states that a weak interactor which is positioned in the food web such that it tends to deflect, or mute, energy away from a potentially oscillating consumer-resource interaction often enhances community persistence and stability. Here we examine how adding other weak interactions (predation/harvesting) on the stabilizing weak interactor alters the stability of food web using a set of well-established food web models/modules. We show that such "weak on weak" interaction chains drive an indirect dynamic cascade that can rapidly ignite a distant consumer-resource oscillator. Nonetheless, we also show that the "weak on weak" interactions are still more stable than the food web without them, and so weak interactions still generally act to stabilize food webs. Rather, these results are best interpreted to say that the degree of the stabilizing effect of a given important weak interaction can be severely compromised by other weak interactions (including weak harvesting). PMID:26219561

  10. Gonococcal endocarditis: an ever-present threat

    PubMed Central

    Kawabata, Vitor Sérgio; Bittencourt, Márcio Sommer; Lovisolo, Silvana Maria; Felipe-Silva, Aloísio; de Lemos, Ana Paula Silva

    2016-01-01

    The incidence of severe complications of the Neisseria gonorrhoeae infection has presented variations over recent decades since the advent of penicillin. Gonococcal endocarditis (GE) still remains an ever-present threat afflicting the society’s poor and sexually active young population. This entity frequently requires surgical intervention and usually exhibits a poor outcome. The interval between the onset of symptoms and the diagnosis does not usually exceed 4 weeks. One of the characteristics of GE is a proclivity for aortic valve involvement with large vegetation and valve ring abscess formation. The authors report the case of a young man with a 2-week history of fever, malaise, weakness, and progressive heart failure symptoms, who had no previous history of genital complaints or cardiopathy. The physical examination was consistent with acute aortic insufficiency, which was most probably of an infectious origin. The echocardiogram showed thickened aortic cusps and valve insufficiency. After hospital admission, the patient’s clinical status worsened rapidly and he died on the second day. The autopsy findings disclosed aortic valve destruction with vegetation and a ring abscess besides signs of septic shock, such as diffuse alveolar damage, acute tubular necrosis, and zone 3 hepatocellular necrosis. The blood culture isolated N. gonorrhoeae resistant to penicillin and ciprofloxacin. The authors call attention to the pathogen of this particular infectious endocarditis, and the need for early diagnosis and evaluation by a cardiac surgery team. PMID:27547739

  11. Gonococcal endocarditis: an ever-present threat.

    PubMed

    de Campos, Fernando Peixoto Ferraz; Kawabata, Vitor Sérgio; Bittencourt, Márcio Sommer; Lovisolo, Silvana Maria; Felipe-Silva, Aloísio; de Lemos, Ana Paula Silva

    2016-01-01

    The incidence of severe complications of the Neisseria gonorrhoeae infection has presented variations over recent decades since the advent of penicillin. Gonococcal endocarditis (GE) still remains an ever-present threat afflicting the society's poor and sexually active young population. This entity frequently requires surgical intervention and usually exhibits a poor outcome. The interval between the onset of symptoms and the diagnosis does not usually exceed 4 weeks. One of the characteristics of GE is a proclivity for aortic valve involvement with large vegetation and valve ring abscess formation. The authors report the case of a young man with a 2-week history of fever, malaise, weakness, and progressive heart failure symptoms, who had no previous history of genital complaints or cardiopathy. The physical examination was consistent with acute aortic insufficiency, which was most probably of an infectious origin. The echocardiogram showed thickened aortic cusps and valve insufficiency. After hospital admission, the patient's clinical status worsened rapidly and he died on the second day. The autopsy findings disclosed aortic valve destruction with vegetation and a ring abscess besides signs of septic shock, such as diffuse alveolar damage, acute tubular necrosis, and zone 3 hepatocellular necrosis. The blood culture isolated N. gonorrhoeae resistant to penicillin and ciprofloxacin. The authors call attention to the pathogen of this particular infectious endocarditis, and the need for early diagnosis and evaluation by a cardiac surgery team. PMID:27547739

  12. Weak Gravitational Lensing

    NASA Astrophysics Data System (ADS)

    Pires, Sandrine; Starck, Jean-Luc; Leonard, Adrienne; Réfrégier, Alexandre

    2012-03-01

    This chapter reviews the data mining methods recently developed to solve standard data problems in weak gravitational lensing. We detail the different steps of the weak lensing data analysis along with the different techniques dedicated to these applications. An overview of the different techniques currently used will be given along with future prospects. Until about 30 years ago, astronomers thought that the Universe was composed almost entirely of ordinary matter: protons, neutrons, electrons, and atoms. The field of weak lensing has been motivated by the observations made in the last decades showing that visible matter represents only about 4-5% of the Universe (see Figure 14.1). Currently, the majority of the Universe is thought to be dark, that is, does not emit electromagnetic radiation. The Universe is thought to be mostly composed of an invisible, pressure less matter - potentially relic from higher energy theories - called "dark matter" (20-21%) and by an even more mysterious term, described in Einstein equations as a vacuum energy density, called "dark energy" (70%). This "dark" Universe is not well described or even understood; its presence is inferred indirectly from its gravitational effects, both on the motions of astronomical objects and on light propagation. So this point could be the next breakthrough in cosmology. Today's cosmology is based on a cosmological model that contains various parameters that need to be determined precisely, such as the matter density parameter Omega_m or the dark energy density parameter Omega_lambda. Weak gravitational lensing is believed to be the most promising tool to understand the nature of dark matter and to constrain the cosmological parameters used to describe the Universe because it provides a method to directly map the distribution of dark matter (see [1,6,60,63,70]). From this dark matter distribution, the nature of dark matter can be better understood and better constraints can be placed on dark energy

  13. Weakly supervised glasses removal

    NASA Astrophysics Data System (ADS)

    Wang, Zhicheng; Zhou, Yisu; Wen, Lijie

    2015-03-01

    Glasses removal is an important task on face recognition, in this paper, we provide a weakly supervised method to remove eyeglasses from an input face image automatically. We choose sparse coding as face reconstruction method, and optical flow to find exact shape of glasses. We combine the two processes iteratively to remove glasses more accurately. The experimental results reveal that our method works much better than these algorithms alone, and it can remove various glasses to obtain natural looking glassless facial images.

  14. Asymptotically Safe Weak Interactions

    NASA Astrophysics Data System (ADS)

    Calmet, Xavier

    We emphasize that the electroweak interactions without a Higgs boson are very similar to quantum general relativity. The Higgs field could just be a dressing field and might not exist as a propagating particle. In that interpretation, the electroweak interactions without a Higgs boson could be renormalizable at the nonperturbative level because of a nontrivial fixed point. Tree-level unitarity in electroweak bosons scattering is restored by the running of the weak scale.

  15. Composite weak bosons

    SciTech Connect

    Suzuki, M.

    1988-04-01

    Dynamical mechanism of composite W and Z is studied in a 1/N field theory model with four-fermion interactions in which global weak SU(2) symmetry is broken explicitly by electromagnetic interaction. Issues involved in such a model are discussed in detail. Deviation from gauge coupling due to compositeness and higher order loop corrections are examined to show that this class of models are consistent not only theoretically but also experimentally.

  16. The role of threats in animal cooperation

    PubMed Central

    Cant, Michael A.

    2011-01-01

    In human societies, social behaviour is strongly influenced by threats of punishment, even though the threats themselves rarely need to be exercised. Recent experimental evidence suggests that similar hidden threats can promote cooperation and limit within-group selfishness in some animal systems. In other animals, however, threats appear to be ineffective. Here I review theoretical and empirical studies that help to understand the evolutionary causes of these contrasting patterns, and identify three factors—impact, accuracy and perception—that together determine the effectiveness of threats to induce cooperation. PMID:20798110

  17. Stereotype threat and female communication styles.

    PubMed

    von Hippel, Courtney; Wiryakusuma, Cindy; Bowden, Jessica; Shochet, Megan

    2011-10-01

    A large body of research has documented the performance-debilitating effects of stereotype threat for individuals, but there is a paucity of research exploring interpersonal consequences of stereotype threat. Two experiments tested the hypothesis that stereotype threat would change the style in which women communicate. Results indicate that women who experience stereotype threat regarding leadership abilities react against the stereotype by adopting a more masculine communication style. Study 2 provides evidence that self-affirmation eliminates this effect of stereotype threat on women's communication styles. A third study demonstrates an ironic consequence of this effect of stereotype threat on women's communication--when women under stereotype threat adopt a more masculine communication style, they are rated as less warm and likeable, and evaluators indicate less willingness to comply with their requests. Theoretical and practical implications of these findings are discussed. PMID:21646549

  18. Corium crust strength measurements.

    SciTech Connect

    Lomperski, S.; Nuclear Engineering Division

    2009-11-01

    Corium strength is of interest in the context of a severe reactor accident in which molten core material melts through the reactor vessel and collects on the containment basemat. Some accident management strategies involve pouring water over the melt to solidify it and halt corium/concrete interactions. The effectiveness of this method could be influenced by the strength of the corium crust at the interface between the melt and coolant. A strong, coherent crust anchored to the containment walls could allow the yet-molten corium to fall away from the crust as it erodes the basemat, thereby thermally decoupling the melt from the coolant and sharply reducing the cooling rate. This paper presents a diverse collection of measurements of the mechanical strength of corium. The data is based on load tests of corium samples in three different contexts: (1) small blocks cut from the debris of the large-scale MACE experiments, (2) 30 cm-diameter, 75 kg ingots produced by SSWICS quench tests, and (3) high temperature crusts loaded during large-scale corium/concrete interaction (CCI) tests. In every case the corium consisted of varying proportions of UO{sub 2}, ZrO{sub 2}, and the constituents of concrete to represent a LWR melt at different stages of a molten core/concrete interaction. The collection of data was used to assess the strength and stability of an anchored, plant-scale crust. The results indicate that such a crust is likely to be too weak to support itself above the melt. It is therefore improbable that an anchored crust configuration could persist and the melt become thermally decoupled from the water layer to restrict cooling and prolong an attack of the reactor cavity concrete.

  19. Threat sensitivity in bipolar disorder.

    PubMed

    Muhtadie, Luma; Johnson, Sheri L

    2015-02-01

    Life stress is a major predictor of the course of bipolar disorder. Few studies have used laboratory paradigms to examine stress reactivity in bipolar disorder, and none have assessed autonomic reactivity to laboratory stressors. In the present investigation we sought to address this gap in the literature. Participants, 27 diagnosed with bipolar I disorder and 24 controls with no history of mood disorder, were asked to complete a complex working memory task presented as "a test of general intelligence." Self-reported emotions were assessed at baseline and after participants were given task instructions; autonomic physiology was assessed at baseline and continuously during the stressor task. Compared to controls, individuals with bipolar disorder reported greater increases in pretask anxiety from baseline and showed greater cardiovascular threat reactivity during the task. Group differences in cardiovascular threat reactivity were significantly correlated with comorbid anxiety in the bipolar group. Our results suggest that a multimethod approach to assessing stress reactivity-including the use of physiological parameters that differentiate between maladaptive and adaptive profiles of stress responding-can yield valuable information regarding stress sensitivity and its associations with negative affectivity in bipolar disorder. (PsycINFO Database Record (c) 2015 APA, all rights reserved). PMID:25688436

  20. Human collective reactions to threat.

    PubMed

    Dezecache, Guillaume

    2015-01-01

    A common assumption regarding mass emergency situations is that individuals in such contexts behave in a way that maximizes their likelihood to escape, at the expense, or with little concern for, the welfare and survival of their neighbors. Doing so, they might even compromise the effectiveness of group evacuation. This conception follows the views of early works on crowd psychology, a tradition born with Gustave Le Bon's The Crowd: a study of the Popular Mind, first published in 1895, and which has had a tremendous impact on scientific representations of people's behavior in mass emergency contexts. Indeed, this work has greatly contributed to the idea that, in such situations, people revert to a primitive, impulsive, irrational, and antisocial nature, causing the breakdown of social order. However, more empirically oriented studies have consistently reported little collective panic, as well as a great deal of solidarity and pro-social behavior during mass emergency situations. Because of institutional barriers, such views have remained largely unknown to cognitive psychologists. Yet these are important results in that they show that human individual and collective reactions to threat are primarily affiliative. Indeed, far from leading to the breakdown of the social fabrics, the presence of a common threat can strengthen social bonds. PMID:26263225

  1. QM02 Strength Measurement

    SciTech Connect

    Welch, J; Wu, J.; /SLAC

    2010-11-24

    In late April, Paul Emma reported that his orbit fitting program could find a reasonably good fit only if the strength of QM02 was changed from design value of -5.83 kG to -6.25 kG - a strength change of 7.3%. In late May, we made a focal length measurement of QM02 by turning off all focusing optics between YC07 and BPMS1 (in the spectrometer line) except for QM02 and adjusted the strength of QM02 so that vertical kicks by YC07 did not produce any displacements at BPMS1 (see Figure 1). The result was quoted in the LCLS elog was that QM02 appeared to 6% too weak, and approximately agreed with Paul's observation. The analysis used for the entry in the log book was based on the thin lens approximation and used the following numbers: Distance YC07 to QM02 - 5.128 m; Distance QM02 to BPMS1 - 1.778 m; and Energy - 135 MeV. These distances were computed from the X,Z coordinates given the on the large plot of the Injector on the wall of the control room. On review of the MAD output file coordinates, it seems that the distance used for QM02 to BPMS1 is not 1.778 m. The correct value is Distance, center of QM02 to BPMS1 - 1.845 m. There may be a typo on the wall chart values for the coordinates of BPMS1, or perhaps there was a misinterpretation of edge versus center of QM02. In any case, the effect of this change is that the thin lens estimate changes from 6% too weak to 9% too weak. At John Galayda's suggestion, we looked into the thin lens versus thick lens approximation. A Mathematica program was written to solve for the K value of the QM02, in the thick lens approximation, that provides point to point focusing from YC07 to BPMS1, and to compare this number with the value obtained using the thin lens approximation. The length of QM02 used in the thick lens calculation is the effective length determined by magnetic measurements of 0.108 m. The result of the Mathematica calculation is that the thin lens approximation predicts less magnet strength is required to produce the

  2. Weakly broken galileon symmetry

    SciTech Connect

    Pirtskhalava, David; Santoni, Luca; Trincherini, Enrico; Vernizzi, Filippo

    2015-09-01

    Effective theories of a scalar ϕ invariant under the internal galileon symmetryϕ→ϕ+b{sub μ}x{sup μ} have been extensively studied due to their special theoretical and phenomenological properties. In this paper, we introduce the notion of weakly broken galileon invariance, which characterizes the unique class of couplings of such theories to gravity that maximally retain their defining symmetry. The curved-space remnant of the galileon’s quantum properties allows to construct (quasi) de Sitter backgrounds largely insensitive to loop corrections. We exploit this fact to build novel cosmological models with interesting phenomenology, relevant for both inflation and late-time acceleration of the universe.

  3. Weak decay of hypernuclei

    SciTech Connect

    Grace, R.

    1983-01-01

    The Moby Dick spectrometer (at BNL) in coincidence with a range spectrometer and a TOF neutron detector will be used to study the weak decay modes of /sup 12/C. The Moby Dick spectrometer will be used to reconstruct and tag events in which specific hypernuclear states are formed in the reaction K/sup -/ + /sup 12/C ..-->.. ..pi../sup -/ + /sup 12/C. Subsequent emission of decay products (pions, protons and neutrons) in coincidence with the fast forward pion will be detected in a time and range spectrometer, and a neutron detector.

  4. Countering the Nuclear Terrorist Threat

    SciTech Connect

    Vantine, H C

    2002-10-04

    The nuclear/radioactive threat to homeland security posed by terrorists can be broken into four categories. Of highest concern is the use of an improvised nuclear device (IND). An IND, as its name implies, is a nuclear explosive device. It produces nuclear yield, and this nuclear yield has catastrophic effects. An IND is the ultimate terrorist weapon, and terrorist groups are actively attempting to acquire nuclear weapons. Detonation of an IND could dwarf the devastation of the September 11 attack on the World Trade Center. Dealing with the aftermath of an IND would be horrific. Rescue efforts and cleanup would be hazardous and difficult. Workers would have to wear full protection suits and self-contained breathing apparatus. Because of the residual radioactivity, in certain locations they could only work short times before acquiring their ''lifetime'' dose. As with the Chernobyl event, some rescue workers might well expose themselves to lethal doses of radiation, adding to the casualty toll. Enormous volumes of contaminated debris would have to be removed and disposed. If a terrorist group decides not to pursue an actual nuclear device, it might well turn to Radiological Dispersal Devices (RDDs) or ''dirty bombs'' as they are often called. RDDs spread radioactivity but they do not generate nuclear yield. The fabrication of an RDD requires radioactive material and a dispersal mechanism. Radioactive materials are used all over the world for medical, industrial, and research applications. Standards for safe handling and accountability of radioactive material vary around the world. Stories in the press suggest inadequate controls on radiological materials in parts of the world. The effects of an RDD vary widely, and are measured in terms of contamination area, health effects to the exposed population, and economic consequences. Even a negligible, but measurable, exposure would exploit the general public's fear of things radioactive and would have significant

  5. Stereotype threat and executive functions: which functions mediate different threat-related outcomes?

    PubMed

    Rydell, Robert J; Van Loo, Katie J; Boucher, Kathryn L

    2014-03-01

    Stereotype threat research shows that women's math performance can be reduced by activating gender-based math stereotypes. Models of stereotype threat assert that threat reduces cognitive functioning, thereby accounting for its negative effects. This work provides a more detailed understanding of the cognitive processes through which stereotype threat leads women to underperform at math and to take risks, by examining which basic executive functions (inhibition, shifting, and updating) account for these outcomes. In Experiments 1 and 2, women under threat showed reduced inhibition, reduced updating, and reduced math performance compared with women in a control condition (or men); however, only updating accounted for women's poor math performance under threat. In Experiment 3, only updating accounted for stereotype threat's effect on women's math performance, whereas only inhibition accounted for the effect of threat on risk-taking, suggesting that distinct executive functions can account for different stereotype threat-related outcomes. PMID:24345711

  6. Enhanced Memory for both Threat and Neutral Information Under Conditions of Intergroup Threat

    PubMed Central

    Zhu, Yong; Zhao, Yufang; Ybarra, Oscar; Stephan, Walter G.; Yang, Qing

    2015-01-01

    Few studies have examined the effect of intergroup threat on cognitive outcomes such as memory. Different theoretical perspectives can inform how intergroup threat should affect memory for threat-relevant and neutral information, such as the mood-congruency approach, Yerkes–Dodson law, Easterbrook’s theory, and also evolutionary perspectives. To test among these, we conducted two experiments to examine how exposure to intergroup threats affected memory compared to control conditions. In study 1, we manipulated symbolic threat and examined participants’ memory for threat and neutral words. In study 2, memory performance was assessed following the induction of realistic threat. Across the studies, in the control condition participants showed better memory for threat-related than neutral information. However, participants under threat remembered neutral information as well as threat-related information. In addition, participants in the threat condition remembered threat-related information as well as participants in the control condition. The findings are discussed in terms of automatic vigilance processes but also the effects of threat on arousal and its effect on information processing. This latter perspective, suggests paradoxically, that under some circumstances involving an outgroup threat, non-threatening information about outgroups can be extensively processed. PMID:26635669

  7. Potential threats to offshore platforms

    SciTech Connect

    Jenkins, B.M.

    1988-01-01

    Increasingly spectacular acts of terrorism have led to growing concern that terrorists will move beyond the symbols of society and directly attack its technological and industrial vulnerabilities. Offshore platforms have been frequently mentioned among the potential targets terrorists might attack. This concern, however, has not resulted in extensive research like that devoted to possible threats to nuclear facilities, which have also been frequently mentioned as possible future targets of terrorists. For one thing, offshore drilling does not invoke the fear inherent in the word nuclear, a fear that translates directly into heavy security for the nuclear industry. Neither does the construction of offshore platforms provoke anything like the kind of protest generated by the construction of nuclear facilities.

  8. World's soils are under threat

    NASA Astrophysics Data System (ADS)

    Montanarella, L.; Pennock, D. J.; McKenzie, N. J.; Badraoui, M.; Chude, V.; Baptista, I.; Mamo, T.; Yemefack, M.; Singh Aulakh, M.; Yagi, K.; Hong, S. Young; Vijarnsorn, P.; Zhang, G.-L.; Arrouays, D.; Black, H.; Krasilnikov, P.; Sobocká, J.; Alegre, J.; Henriquez, C. R.; Mendonça-Santos, M. L.; Taboada, M.; Espinosa-Victoria, D.; AlShankiti, A.; AlaviPanah, S. K.; Elsheikh, E. A. E.; Hempel, J.; Camps Arbestain, M.; Nachtergaele, F.; Vargas, R.

    2015-12-01

    The Intergovernmental Technical Panel on Soils has completed the first State of the World's Soil Resources report. Globally soil erosion was identified as the gravest threat, leading to deteriorating water quality in developed regions and to lowering of crop yields in many developing regions. We need to increase nitrogen and phosphorus fertilizer use in infertile tropical and semi-tropical soils - the regions where the most food insecure among us are found - while reducing global use of these products overall. Stores of soil organic carbon are critical in the global carbon balance, and national governments must set specific targets to stabilize or ideally increase soil organic carbon stores. Finally the quality of soil information available for policy formulation must be improved - the regional assessments in the SWSR report frequently base their evaluations on studies from the 1990s based on observations made in the 1980s or earlier.

  9. World's soils are under threat

    NASA Astrophysics Data System (ADS)

    Montanarella, Luca; Pennock, Daniel Jon; McKenzie, Neil; Badraoui, Mohamed; Chude, Victor; Baptista, Isaurinda; Mamo, Tekalign; Yemefack, Martin; Singh Aulakh, Mikha; Yagi, Kazuyuki; Hong, Suk Young; Vijarnsorn, Pisoot; Zhang, Gan-Lin; Arrouays, Dominique; Black, Helaina; Krasilnikov, Pavel; Sobocká, Jaroslava; Alegre, Julio; Henriquez, Carlos Roberto; de Lourdes Mendonça-Santos, Maria; Taboada, Miguel; Espinosa-Victoria, David; AlShankiti, Abdullah; Kazem AlaviPanah, Sayed; El Mustafa Elsheikh, Elsiddig Ahmed; Hempel, Jon; Camps Arbestain, Marta; Nachtergaele, Freddy; Vargas, Ronald

    2016-02-01

    The Intergovernmental Technical Panel on Soils has completed the first State of the World's Soil Resources Report. Globally soil erosion was identified as the gravest threat, leading to deteriorating water quality in developed regions and to lowering of crop yields in many developing regions. We need to increase nitrogen and phosphorus fertilizer use in infertile tropical and semi-tropical soils - the regions where the most food insecurity among us are found - while reducing global use of these products overall. Stores of soil organic carbon are critical in the global carbon balance, and national governments must set specific targets to stabilize or ideally increase soil organic carbon stores. Finally the quality of soil information available for policy formulation must be improved - the regional assessments in the State of the World's Soil Resources Report frequently base their evaluations on studies from the 1990s based on observations made in the 1980s or earlier.

  10. Effect of evaluation threat on procrastination behavior.

    PubMed

    Bui, Ngoc H

    2007-06-01

    The author evaluated the effects of evaluation apprehension and trait procrastination on behaviors. The author examined private university students from southern California (N = 72) on two independent variables: evaluation threat (manipulated) and trait procrastination (nonmanipulated). The author found a significant interaction effect between type of evaluation threat and level of trait procrastination on the number of days to complete an assigned essay. Post hoc analyses showed high trait procrastinators in the high evaluation threat group significantly delayed returning essays compared with those in the low evaluation threat group. Also, in the low evaluation threat group, low trait procrastinators delayed more than did high trait procrastinators. These results suggest that educators can reduce behavioral delays by increasing evaluation threat, depending on a student's level of trait procrastination. PMID:17703786

  11. Sensor-guided threat countermeasure system

    DOEpatents

    Stuart, Brent C.; Hackel, Lloyd A.; Hermann, Mark R.; Armstrong, James P.

    2012-12-25

    A countermeasure system for use by a target to protect against an incoming sensor-guided threat. The system includes a laser system for producing a broadband beam and means for directing the broadband beam from the target to the threat. The countermeasure system comprises the steps of producing a broadband beam and directing the broad band beam from the target to blind or confuse the incoming sensor-guided threat.

  12. DOE site-specific threat assessment

    SciTech Connect

    West, D.J.; Al-Ayat, R.A.; Judd, B.R.

    1985-07-12

    A facility manager faced with the challenges of protecting a nuclear facility against potential threats must consider the likelihood and consequences of such threats, know the capabilities of the facility safeguards and security systems, and make informed decisions about the cost-effectivness of safeguards and security upgrades. To help meet these challenges, the San Francisco Operations Office of the Department of Energy, in conjunction with the Lawrence Livermore Laboratory, has developed a site-specific threat assessment approach and a quantitative model to improve the quality and consistency of site-specific threat assessment and resultant security upgrade decisions at sensitive Department of Energy facilities. 5 figs.

  13. Autonomous Realtime Threat-Hunting Robot (ARTHR

    ScienceCinema

    INL

    2009-09-01

    Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats.

  14. Hidden Markov models for threat prediction fusion

    NASA Astrophysics Data System (ADS)

    Ross, Kenneth N.; Chaney, Ronald D.

    2000-04-01

    This work addresses the often neglected, but important problem of Level 3 fusion or threat refinement. This paper describes algorithms for threat prediction and test results from a prototype threat prediction fusion engine. The threat prediction fusion engine selectively models important aspects of the battlespace state using probability-based methods and information obtained from lower level fusion engines. Our approach uses hidden Markov models of a hierarchical threat state to find the most likely Course of Action (CoA) for the opposing forces. Decision tress use features derived from the CoA probabilities and other information to estimate the level of threat presented by the opposing forces. This approach provides the user with several measures associated with the level of threat, including: probability that the enemy is following a particular CoA, potential threat presented by the opposing forces, and likely time of the threat. The hierarchical approach used for modeling helps us efficiently represent the battlespace with a structure that permits scaling the models to larger scenarios without adding prohibitive computational costs or sacrificing model fidelity.

  15. Autonomous Realtime Threat-Hunting Robot (ARTHR

    SciTech Connect

    INL

    2008-05-29

    Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats.

  16. Weakly relativistic plasma expansion

    SciTech Connect

    Fermous, Rachid Djebli, Mourad

    2015-04-15

    Plasma expansion is an important physical process that takes place in laser interactions with solid targets. Within a self-similar model for the hydrodynamical multi-fluid equations, we investigated the expansion of both dense and under-dense plasmas. The weakly relativistic electrons are produced by ultra-intense laser pulses, while ions are supposed to be in a non-relativistic regime. Numerical investigations have shown that relativistic effects are important for under-dense plasma and are characterized by a finite ion front velocity. Dense plasma expansion is found to be governed mainly by quantum contributions in the fluid equations that originate from the degenerate pressure in addition to the nonlinear contributions from exchange and correlation potentials. The quantum degeneracy parameter profile provides clues to set the limit between under-dense and dense relativistic plasma expansions at a given density and temperature.

  17. Ideology, Social Threat, and the Death Sentence: Capital Sentences across Time and Space

    ERIC Educational Resources Information Center

    Jacobs, David; Carmichael, Jason T.

    2004-01-01

    Capital punishment is the most severe criminal penalty, yet we know little about the factors that produce jurisdictional differences in the use of the death sentence. Political explanations emphasize conservative values and the strength of more conservative political parties. Threat accounts suggest that this sentence will be more likely in…

  18. Strong mobility in weakly disordered systems

    SciTech Connect

    Ben-naim, Eli; Krapivsky, Pavel

    2009-01-01

    We study transport of interacting particles in weakly disordered media. Our one-dimensional system includes (i) disorder, the hopping rate governing the movement of a particle between two neighboring lattice sites is inhomogeneous, and (ii) hard core interaction, the maximum occupancy at each site is one particle. We find that over a substantial regime, the root-mean-square displacement of a particle s grows superdiffusively with time t, {sigma}{approx}({epsilon}t){sup 2/3}, where {epsilon} is the disorder strength. Without disorder the particle displacement is subdiffusive, {sigma} {approx}t{sup 1/4}, and therefore disorder strongly enhances particle mobility. We explain this effect using scaling arguments, and verify the theoretical predictions through numerical simulations. Also, the simulations show that regardless of disorder strength, disorder leads to stronger mobility over an intermediate time regime.

  19. Weak measurements beyond the Aharonov-Albert-Vaidman formalism

    SciTech Connect

    Wu Shengjun; Li Yang

    2011-05-15

    We extend the idea of weak measurements to the general case, provide a complete treatment, and obtain results for both the regime when the preselected and postselected states (PPS) are almost orthogonal and the regime when they are exactly orthogonal. We surprisingly find that for a fixed interaction strength, there may exist a maximum signal amplification and a corresponding optimum overlap of PPS to achieve it. For weak measurements in the orthogonal regime, we find interesting quantities that play the same role that weak values play in the nonorthogonal regime.

  20. Enhancing entanglement trapping by weak measurement and quantum measurement reversal

    SciTech Connect

    Zhang, Ying-Jie; Han, Wei; Fan, Heng; Xia, Yun-Jie

    2015-03-15

    In this paper, we propose a scheme to enhance trapping of entanglement of two qubits in the environment of a photonic band gap material. Our entanglement trapping promotion scheme makes use of combined weak measurements and quantum measurement reversals. The optimal promotion of entanglement trapping can be acquired with a reasonable finite success probability by adjusting measurement strengths. - Highlights: • Propose a scheme to enhance entanglement trapping in photonic band gap material. • Weak measurement and its reversal are performed locally on individual qubits. • Obtain an optimal condition for maximizing the concurrence of entanglement trapping. • Entanglement sudden death can be prevented by weak measurement in photonic band gap.

  1. Inferring the nature of anthropogenic threats from long-term abundance records.

    PubMed

    Shoemaker, Kevin T; Akçakaya, H Resit

    2015-02-01

    Diagnosing the processes that threaten species persistence is critical for recovery planning and risk forecasting. Dominant threats are typically inferred by experts on the basis of a patchwork of informal methods. Transparent, quantitative diagnostic tools would contribute much-needed consistency, objectivity, and rigor to the process of diagnosing anthropogenic threats. Long-term census records, available for an increasingly large and diverse set of taxa, may exhibit characteristic signatures of specific threatening processes and thereby provide information for threat diagnosis. We developed a flexible Bayesian framework for diagnosing threats on the basis of long-term census records and diverse ancillary sources of information. We tested this framework with simulated data from artificial populations subjected to varying degrees of exploitation and habitat loss and several real-world abundance time series for which threatening processes are relatively well understood: bluefin tuna (Thunnus maccoyii) and Atlantic cod (Gadus morhua) (exploitation) and Red Grouse (Lagopus lagopus scotica) and Eurasian Skylark (Alauda arvensis) (habitat loss). Our method correctly identified the process driving population decline for over 90% of time series simulated under moderate to severe threat scenarios. Successful identification of threats approached 100% for severe exploitation and habitat loss scenarios. Our method identified threats less successfully when threatening processes were weak and when populations were simultaneously affected by multiple threats. Our method selected the presumed true threat model for all real-world case studies, although results were somewhat ambiguous in the case of the Eurasian Skylark. In the latter case, incorporation of an ancillary source of information (records of land-use change) increased the weight assigned to the presumed true model from 70% to 92%, illustrating the value of the proposed framework in bringing diverse sources of

  2. Shades of Threat: Racial Identity as a Moderator of Stereotype Threat

    ERIC Educational Resources Information Center

    Davis, Claytie, III; Aronson, Joshua; Salinas, Moises

    2006-01-01

    This study investigated Black racial identity attitudes as a moderator of intellectual performance in potentially stereotype threatening situations. Ninety-eight African American students were randomly assigned to one of three stereotype threatening conditions: low threat, medium threat, or high threat. Analyses confirmed a stereotype threat…

  3. Dynamic Strength Ceramic Nanocomposites Under Pulse Loading

    NASA Astrophysics Data System (ADS)

    Skripnyak, Evgeniya G.; Skripnyak, Vladimir V.; Vaganova, Irina K.; Skripnyak, Vladimir A.

    2015-06-01

    Multi-scale computer simulation approach has been applied to research of strength of nanocomposites under dynamic loading. The influence of mesoscopic substructures on the dynamic strength of ceramic and hybrid nanocomposites, which can be formed using additive manufacturing were numerically investigated. At weak shock wave loadings the shear strength and the spall strength of ceramic and hybrid nanocomposites depends not only phase concentration and porosity, but size parameters of skeleton substructures. The influence of skeleton parameter on the shear strength and the spall strength of ceramic nanocomposites with the same concentration of phases decreases with increasing amplitude of the shock pulse of microsecond duration above the double amplitude of the Hugoniot elastic limit of nanocomposites. This research carried out in 2014 -2015 was supported by grant from The Tomsk State University Academic D.I. Mendeleev Fund Program and also Ministry of Sciences and Education of Russian Federation (State task 2014/223, project 1943, Agreement 14.132.

  4. The Nature of the Bioterrorism Threat

    SciTech Connect

    Regens, J. L.

    2003-02-25

    This analysis provides an overview of the nature of the bioterrorism threat. It identifies potential CDC Class A biological agents that are likely candidates for use in a terrorist incident and describes the known sources of vulnerability. The paper also summarizes S&T resources/needs and assesses response options for achieving effective biodefense against terrorist threats.

  5. Stereotype Threat, Identity Salience, and Spatial Reasoning

    ERIC Educational Resources Information Center

    McGlone, Matthew S.; Aronson, Joshua

    2006-01-01

    Stereotype threat research provides insight into how the low standardized test scores of students from stigmatized social groups may derive in part from the negative performance expectations about these groups. Because these students belong to many social groups, one means of mitigating the threat is to remind them of their membership in groups…

  6. Development of the Academic Stereotype Threat Inventory

    ERIC Educational Resources Information Center

    Pseekos, A. Chantelle; Dahlen, Eric R.; Levy, Jacob J.

    2008-01-01

    The authors describe the development and preliminary validation of the Academic Stereotype Threat Inventory, a self-report measurement of math-related stereotype threat among women. A preliminary version of the instrument was administered to 308 undergraduate women. Principal component analysis yielded a 3-factor solution. Convergent and…

  7. Bombs and Bomb Threats in the School

    ERIC Educational Resources Information Center

    Starkey, David J.; Starkey, John D.

    1977-01-01

    Bombs and the threat of bombing can leave school personnel faced by an explosive hazard without knowledge of what to do. Therefore, a preplanned response is necessary. Discusses four major stages of dealing with bombs and bomb threats. (Author/RK)

  8. Bomb Threats and Bomb Search Techniques.

    ERIC Educational Resources Information Center

    Department of the Treasury, Washington, DC.

    This pamphlet explains how to be prepared and plan for bomb threats and describes procedures to follow once a call has been received. The content covers (1) preparation for bomb threats, (2) evacuation procedures, (3) room search methods, (4) procedures to follow once a bomb has been located, and (5) typical problems that search teams will…

  9. The Smallpox Threat: The School Nurse's Role

    ERIC Educational Resources Information Center

    Martin, Mary E.; Didion, Judy

    2003-01-01

    Today, with the threat of bioterrorism and war, there is a new dimension to the traditional role of the school nurse. The smallpox threat to public health will invoke the school nurse's role as an educator, liaison, and consultant in the community. This article discusses smallpox, the vaccination process, adverse effects, and postvaccination care.…

  10. Nuclear threats from small states

    SciTech Connect

    Kahan, J.H.

    1994-06-13

    What are the policy implications regarding proliferation and counter proliferation of nuclear weapons among Third World states. How does deterrence operate outside the parameters of superpower confrontation as defined by the cold war elaborate system of constraints enforced by concepts like mutual assured destruction, and counter-value and counter-force targeting. How can US policymakers devise contingencies for dealing with nuclear threats posed by countries like North Korea, Libya, Iraq, Iran, and Syria. These are some of the unsettling but nevertheless important questions addressed by the author in this monograph. In his analysis, Mr. Jerome Kahan examines the likelihood that one or more of these countries will use nuclear weapons before the year 2000. He also offers a framework that policymakers and planners might use in assessing US interests in preempting the use of nuclear weapons or in retaliating for their use. Ironically, with the end of the cold war, it is imperative that defense strategists, policymakers, and military professionals think about the `unthinkable`. In the interest of fostering debate on this important subject, the Strategic Studies Institute commends this insightful monograph.

  11. In Brief: Forecasting meningitis threats

    NASA Astrophysics Data System (ADS)

    Showstack, Randy

    2008-12-01

    The University Corporation for Atmospheric Research (UCAR), in conjunction with a team of health and weather organizations, has launched a project to provide weather forecasts to medical officials in Africa to help reduce outbreaks of meningitis. The forecasts will enable local health care providers to target vaccination programs more effectively. In 2009, meteorologists with the National Center for Atmospheric Research, which is managed by UCAR, will begin issuing 14-day forecasts of atmospheric conditions in Ghana. Later, UCAR plans to work closely with health experts from several African countries to design and test a decision support system to provide health officials with useful meteorological information. ``By targeting forecasts in regions where meningitis is a threat, we may be able to help vulnerable populations. Ultimately, we hope to build on this project and provide information to public health programs battling weather-related diseases in other parts of the world,'' said Rajul Pandya, director of UCAR's Community Building Program. Funding for the project comes from a $900,000 grant from Google.org, the philanthropic arm of the Internet search company.

  12. Forecasting Lightning Threat using Cloud-Resolving Model Simulations

    NASA Technical Reports Server (NTRS)

    McCaul, Eugene W., Jr.; Goodman, Steven J.; LaCasse, Katherine M.; Cecil, Daniel J.

    2008-01-01

    Two new approaches are proposed and developed for making time and space dependent, quantitative short-term forecasts of lightning threat, and a blend of these approaches is devised that capitalizes on the strengths of each. The new methods are distinctive in that they are based entirely on the ice-phase hydrometeor fields generated by regional cloud-resolving numerical simulations, such as those produced by the WRF model. These methods are justified by established observational evidence linking aspects of the precipitating ice hydrometeor fields to total flash rates. The methods are straightforward and easy to implement, and offer an effective near-term alternative to the incorporation of complex and costly cloud electrification schemes into numerical models. One method is based on upward fluxes of precipitating ice hydrometeors in the mixed phase region at the-15 C level, while the second method is based on the vertically integrated amounts of ice hydrometeors in each model grid column. Each method can be calibrated by comparing domain-wide statistics of the peak values of simulated flash rate proxy fields against domain-wide peak total lightning flash rate density data from observations. Tests show that the first method is able to capture much of the temporal variability of the lightning threat, while the second method does a better job of depicting the areal coverage of the threat. Our blended solution is designed to retain most of the temporal sensitivity of the first method, while adding the improved spatial coverage of the second. Exploratory tests for selected North Alabama cases show that, because WRF can distinguish the general character of most convective events, our methods show promise as a means of generating quantitatively realistic fields of lightning threat. However, because the models tend to have more difficulty in predicting the instantaneous placement of storms, forecasts of the detailed location of the lightning threat based on single

  13. Inferences from counterfactual threats and promises.

    PubMed

    Egan, Suzanne M; Byrne, Ruth M J

    2012-01-01

    We examine how people understand and reason from counterfactual threats, for example, "if you had hit your sister, I would have grounded you" and counterfactual promises, for example, "if you had tidied your room, I would have given you ice-cream." The first experiment shows that people consider counterfactual threats, but not counterfactual promises, to have the illocutionary force of an inducement. They also make the immediate inference that the action mentioned in the "if" part of the counterfactual threat and promise did not occur. The second experiment shows that people make more negative inferences (modus tollens and denial of the antecedent) than affirmative inferences (modus ponens and affirmation of the consequent) from counterfactual threats and promises, unlike indicative threats and promises. We discuss the implications of the results for theories of the mental representations and cognitive processes that underlie conditional inducements. PMID:22580411

  14. Strength loss in kraft pulping

    NASA Astrophysics Data System (ADS)

    Iribarne, Jose

    Unbleached kraft pulps from two U.S. mills were 21% and 26% weaker than comparable laboratory pulps from the same chip sources, when assessed as the tear index at a tensile index of 70 kN.m/kg. The phenomena involved were clarified by characterizing the differences between the mill and laboratory pulps in terms of fundamental fiber properties. All of the strength loss could be explained by a reduction in intrinsic fiber strength of 9% to 11%, as estimated from wet zero-span tensile tests and fiber length distributions. Most of the effects of different fiber shape and length were isolated by PFI mill refining and decrilling, respectively. The higher fiber coarseness of mill pulps was a factor in their maximum density and bond strength, but changes in these variables were analogous to those of laboratory pups due to similar swelling. Specific bond strength, determined from a wet pressing experiment, was similar in mill and laboratory pulps. Neither carbohydrate composition nor crystalline structure, assessed through x-ray diffraction analysis, were significant factors in the observed fiber strength differences. The mill pulps were not more heterogeneous than the laboratory pulps, within the resolution of a fractionation experiment. The number of weak points in each pulp was assessed through analysis of the amount of fiber cutting during PFI mill refining and treatments with potassium superoxide or cellulase. The results suggested that the chemistry of kraft pulping preferentially weaken short, slender fibers, while mechanical stresses during the hot discharge of batch digesters mainly affect long, thick fibers. The greater number of weak points in the long-fiber fractions of mill pulps is probably associated with their lower wet zero-span tensile indices. Automated optical detection of major singularities with a prototype instrument suggested that only the weak points induced by mechanical stress could be detected by local variations in birefringence. In contrast

  15. Promoting dental hygiene to children: comparing traditional and interactive media following threat appeals.

    PubMed

    Panic, Katarina; Cauberghe, Veroline; De Pelsmacker, Patrick

    2014-01-01

    Until now, social marketing campaigns mainly targeted children using traditional media. However, little is known about the effectiveness of computer games to communicate health-related information to children. This study compares the impact of an interactive game as a medium to provide health information and improve children's dietary habits to the impact of more traditional media. Using a 2 × 3 between-subject factorial design with 190 children (7-9 years old), this study investigates the effect of threat messages (weak vs. strong) concerning dental hygiene on behavioral outcome (snack choice), and how this effect is moderated by the type of medium used to communicate subsequent health information after the threat appeal (computer game, information brochure, narrative story). Results show a positive significant effect of perceived threat on children's adaptive behavior. However, this effect only remains significant when afterwards children are exposed to a narrative health-related story. When children play a game or read a brochure, they need to devote more attention to process this content, distracting them from the original threat message. In sum, when a threat message is followed by additional health information, the medium through which this information is presented influences the effectiveness of the preceding threat message. PMID:24393019

  16. Forecasting Lightning Threat Using WRF Proxy Fields

    NASA Technical Reports Server (NTRS)

    McCaul, E. W., Jr.

    2010-01-01

    Objectives: Given that high-resolution WRF forecasts can capture the character of convective outbreaks, we seek to: 1. Create WRF forecasts of LTG threat (1-24 h), based on 2 proxy fields from explicitly simulated convection: - graupel flux near -15 C (captures LTG time variability) - vertically integrated ice (captures LTG threat area). 2. Calibrate each threat to yield accurate quantitative peak flash rate densities. 3. Also evaluate threats for areal coverage, time variability. 4. Blend threats to optimize results. 5. Examine sensitivity to model mesh, microphysics. Methods: 1. Use high-resolution 2-km WRF simulations to prognose convection for a diverse series of selected case studies. 2. Evaluate graupel fluxes; vertically integrated ice (VII). 3. Calibrate WRF LTG proxies using peak total LTG flash rate densities from NALMA; relationships look linear, with regression line passing through origin. 4. Truncate low threat values to make threat areal coverage match NALMA flash extent density obs. 5. Blend proxies to achieve optimal performance 6. Study CAPS 4-km ensembles to evaluate sensitivities.

  17. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility,...

  18. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility,...

  19. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility,...

  20. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility,...

  1. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility,...

  2. Plasma transport theory spanning weak to strong coupling

    SciTech Connect

    Daligault, Jérôme; Baalrud, Scott D.

    2015-06-29

    We describe some of the most striking characteristics of particle transport in strongly coupled plasmas across a wide range of Coulomb coupling strength. We then discuss the effective potential theory, which is an approximation that was recently developed to extend conventional weakly coupled plasma transport theory into the strongly coupled regime in a manner that is practical to evaluate efficiently.

  3. Weak localization with nonlinear bosonic matter waves

    SciTech Connect

    Hartmann, Timo; Michl, Josef; Petitjean, Cyril; Wellens, Thomas; Urbina, Juan-Diego; Richter, Klaus; Schlagheck, Peter

    2012-08-15

    We investigate the coherent propagation of dilute atomic Bose-Einstein condensates through irregularly shaped billiard geometries that are attached to uniform incoming and outgoing waveguides. Using the mean-field description based on the nonlinear Gross-Pitaevskii equation, we develop a diagrammatic theory for the self-consistent stationary scattering state of the interacting condensate, which is combined with the semiclassical representation of the single-particle Green function in terms of chaotic classical trajectories within the billiard. This analytical approach predicts a universal dephasing of weak localization in the presence of a small interaction strength between the atoms, which is found to be in good agreement with the numerically computed reflection and transmission probabilities of the propagating condensate. The numerical simulation of this quasi-stationary scattering process indicates that this interaction-induced dephasing mechanism may give rise to a signature of weak antilocalization, which we attribute to the influence of non-universal short-path contributions. - Highlights: Black-Right-Pointing-Pointer Numerical simulation of scattering of Bose-Einstein condensate through billiards. Black-Right-Pointing-Pointer Novel analytical semiclassical theory for nonlinear coherent scattering. Black-Right-Pointing-Pointer Inversion of weak localization due to mean-field interaction within the condensate. Black-Right-Pointing-Pointer Relevance of non-universal short-path contributions.

  4. Universal mechanism for Anderson and weak localization.

    PubMed

    Filoche, Marcel; Mayboroda, Svitlana

    2012-09-11

    Localization of stationary waves occurs in a large variety of vibrating systems, whether mechanical, acoustical, optical, or quantum. It is induced by the presence of an inhomogeneous medium, a complex geometry, or a quenched disorder. One of its most striking and famous manifestations is Anderson localization, responsible for instance for the metal-insulator transition in disordered alloys. Yet, despite an enormous body of related literature, a clear and unified picture of localization is still to be found, as well as the exact relationship between its many manifestations. In this paper, we demonstrate that both Anderson and weak localizations originate from the same universal mechanism, acting on any type of vibration, in any dimension, and for any domain shape. This mechanism partitions the system into weakly coupled subregions. The boundaries of these subregions correspond to the valleys of a hidden landscape that emerges from the interplay between the wave operator and the system geometry. The height of the landscape along its valleys determines the strength of the coupling between the subregions. The landscape and its impact on localization can be determined rigorously by solving one special boundary problem. This theory allows one to predict the localization properties, the confining regions, and to estimate the energy of the vibrational eigenmodes through the properties of one geometrical object. In particular, Anderson localization can be understood as a special case of weak localization in a very rough landscape. PMID:22927384

  5. Insider threat to secure facilities: data analysis

    SciTech Connect

    Not Available

    1980-05-09

    Three data sets drawn from industries that have experienced internal security breaches are analyzed. The industries and the insider security breaches are considered analogous in one or more respects to insider threats potentially confronting managers in the nuclear industry. The three data sets are: bank fraud and embezzlement (BF and E), computer-related crime, and drug theft from drug manufacturers and distributors. A careful analysis by both descriptive and formal statistical techniques permits certain general conclusions on the internal threat to secure industries to be drawn. These conclusions are discussed and related to the potential insider threat in the nuclear industry. 49 tabs.

  6. THE BIOTERRORISM THREAT: TECHNOLOGICAL AND POLITICAL CONSIDERATIONS

    SciTech Connect

    J. F. PILAT

    2000-03-01

    Bioterrorism--along with biowarfare, from which it may not always be distinguishable in practice--will be a feature of the strategic landscape in the 21st century and is high on the US national security agenda. Bioterrorism poses a potential threat to the US population, agriculture, interests, friends and allies, and military forces (asymmetric threats). Yet these possibilities have not been widely pursued or realized by terrorists. The perceived threat is far worse than anything experienced to date, and is largely technologically driven.

  7. Phase Diagram of the Bose Hubbard Model with Weak Links

    NASA Astrophysics Data System (ADS)

    Hettiarachchilage, Kalani; Rousseau, Valy; Tam, Ka-Ming; Moreno, Juana; Jarrell, Mark; Sheehy, Daniel

    2012-02-01

    We study the ground state phase diagram of strongly interacting ultracold Bose gas in a one-dimensional optical lattice with a tunable weak link, by means of Quantum Monte Carlo simulation. This model contains an on-site repulsive interaction (U) and two different near-neighbor hopping terms, J and t, for the weak link and the remainder of the chain, respectively. We show that by reducing the strength of J, a novel intermediate phase develops which is compressible and non-superfluid. This novel phase is identified as a Normal Bose Liquid (NBL) which does not appear in the phase diagram of the homogeneous bosonic Hubbard model. Further, we find a linear variation of the phase boundary of Normal Bose Liquid (NBL) to SuperFluid (SF) as a function of the strength of the weak link. These results may provide a new path to design advanced atomtronic devices in the future.

  8. Examining Perceived Stereotype Threat among Overweight/Obese Adults Using a Multi-Threat Framework

    PubMed Central

    Carels, Robert A.; Domoff, Sarah E.; Burmeister, Jacob M.; Koball, Afton M.; Hinman, Nova G.; Davis, Alan K.; Oehlhof, Marissa Wagner; Leroy, Michelle; Bannon, Erin; Hoffmann, Debra A.

    2013-01-01

    Objective The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group) and source (i.e., the self or others). This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. Method 216 adults completed an online survey. Participants’ mean age was 23.6 (SD 10.1; range 18–64) years and mean BMI was 31.6 (SD 7.5) kg/m2. Results Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI) and individual factors (i.e., group identity, stigma consciousness, fear of fat). Conclusion Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals’ susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes’ impact on cognitive and behavioral outcomes. PMID:23736227

  9. Heat Waves Pose Big Health Threats

    MedlinePlus

    ... news/fullstory_159744.html Heat Waves Pose Big Health Threats Kids, elderly among those at greatest risk, ... Illness Seniors' Health Recent Health News Related MedlinePlus Health Topics Child Safety Heat Illness Seniors' Health About ...

  10. Autonomous Realtime Threat-Hunting Robot (ARTHR)

    ScienceCinema

    Idaho National Laboratory - David Bruemmer, Curtis Nielsen

    2010-01-08

    Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats. To learn more, visit

  11. Acid Rain: The Silent Environmental Threat.

    ERIC Educational Resources Information Center

    Zmud, Mia

    1992-01-01

    Describes the silent environmental threat posed by acid rain. Caused mainly by manmade pollutants, acid rain damages water and trees, decreases visibility, corrodes monuments, and threatens public health. The article includes guidelines for action. (SM)

  12. Children's Threats: When Are They Serious?

    MedlinePlus

    ... TV shows, movies, music, magazines, comics, books, video games, and Internet sites mental illness, such as depression, ... others are concerned? When a child makes a serious threat it should not be dismissed as just ...

  13. Intergroup threat gates social attention in humans.

    PubMed

    Chen, Yujie; Zhao, Yufang

    2015-02-01

    Humans shift their attention to follow another person's gaze direction, a phenomenon called gaze cueing. This study examined whether a particular social factor, intergroup threat, modulates gaze cueing. As expected, stronger responses of a particular in-group to a threatening out-group were observed when the in-group, conditioned to perceive threat from one of two out-groups, was presented with facial stimuli from the threatening and non-threatening out-groups. These results suggest that intergroup threat plays an important role in shaping social attention. Furthermore, larger gaze-cueing effects were found for threatening out-group faces than for in-group faces only at the 200 ms but not the 800 ms stimulus onset asynchrony (SOA); the specificity of the gaze-cueing effects at the short SOA suggests that threat cues modulate the involuntary component of gaze cueing. PMID:25716090

  14. Autonomous Realtime Threat-Hunting Robot (ARTHR)

    SciTech Connect

    Idaho National Laboratory - David Bruemmer, Curtis Nielsen

    2008-05-29

    Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats. To learn more, visit

  15. Counter-terrorism threat prediction architecture

    NASA Astrophysics Data System (ADS)

    Lehman, Lynn A.; Krause, Lee S.

    2004-09-01

    This paper will evaluate the feasibility of constructing a system to support intelligence analysts engaged in counter-terrorism. It will discuss the use of emerging techniques to evaluate a large-scale threat data repository (or Infosphere) and comparing analyst developed models to identify and discover potential threat-related activity with a uncertainty metric used to evaluate the threat. This system will also employ the use of psychological (or intent) modeling to incorporate combatant (i.e. terrorist) beliefs and intent. The paper will explore the feasibility of constructing a hetero-hierarchical (a hierarchy of more than one kind or type characterized by loose connection/feedback among elements of the hierarchy) agent based framework or "family of agents" to support "evidence retrieval" defined as combing, or searching the threat data repository and returning information with an uncertainty metric. The counter-terrorism threat prediction architecture will be guided by a series of models, constructed to represent threat operational objectives, potential targets, or terrorist objectives. The approach would compare model representations against information retrieved by the agent family to isolate or identify patterns that match within reasonable measures of proximity. The central areas of discussion will be the construction of an agent framework to search the available threat related information repository, evaluation of results against models that will represent the cultural foundations, mindset, sociology and emotional drive of typical threat combatants (i.e. the mind and objectives of a terrorist), and the development of evaluation techniques to compare result sets with the models representing threat behavior and threat targets. The applicability of concepts surrounding Modeling Field Theory (MFT) will be discussed as the basis of this research into development of proximity measures between the models and result sets and to provide feedback in support of model

  16. Space Station Program threat and vulnerability analysis

    NASA Technical Reports Server (NTRS)

    Van Meter, Steven D.; Veatch, John D.

    1987-01-01

    An examination has been made of the physical security of the Space Station Program at the Kennedy Space Center in a peacetime environment, in order to furnish facility personnel with threat/vulnerability information. A risk-management approach is used to prioritize threat-target combinations that are characterized in terms of 'insiders' and 'outsiders'. Potential targets were identified and analyzed with a view to their attractiveness to an adversary, as well as to the consequentiality of the resulting damage.

  17. Bio-Terrorism Threat and Casualty Prevention

    SciTech Connect

    NOEL,WILLIAM P.

    2000-01-01

    The bio-terrorism threat has become the ''poor man's'' nuclear weapon. The ease of manufacture and dissemination has allowed an organization with only rudimentary skills and equipment to pose a significant threat with high consequences. This report will analyze some of the most likely agents that would be used, the ease of manufacture, the ease of dissemination and what characteristics of the public health response that are particularly important to the successful characterization of a high consequence event to prevent excessive causalities.

  18. An Information Fusion Framework for Threat Assessment

    SciTech Connect

    Beaver, Justin M; Kerekes, Ryan A; Treadwell, Jim N

    2009-01-01

    Modern enterprises are becoming increasingly sensitive to the potential destructive power of small groups or individuals with malicious intent. In response, significant investments are being made in developing a means to assess the likelihood of certain threats to their enterprises. Threat assessment needs are typically focused in very specific application areas where current processes rely heavily on human analysis to both combine any available data and draw conclusions about the probability of a threat. A generic approach to threat assessment is proposed, including a threat taxonomy and decision-level information fusion framework, that provides a computational means for merging multi-modal data for the purpose of assessing the presence of a threat. The framework is designed for flexibility, and intentionally accounts for the accuracy of each data source, given the environmental conditions, in order to manage the uncertainty associated with any acquired data. The taxonomy and information fusion framework is described, and discussed in the context of real-world applications such as shipping container security and cyber security.

  19. Nuclear Threat Intelligence, Surveillance, and Reconnaissance

    NASA Astrophysics Data System (ADS)

    Kuliasha, Michael

    2012-03-01

    The National Security Strategy states that the greatest threat to the American people is ``the pursuit of nuclear weapons by violent extremists and their proliferation to additional states.'' The Global Nuclear Detection Architecture (GNDA) addresses a key portion of that threat by focusing on detecting nuclear and radiological materials that are out of regulatory control within permissive operating environments. However, the force protection requirements of the Department of Defense (DoD) range across a wider mission space from permissive environments, where nuclear and radiological materials can be monitored while under regulatory control, to hostile environments where nuclear and radiological materials exist in defiance of international regulations and agreements. This wider range of operating environments and the inherent physics limitations on the range of radiation detection pose great challenges to radiation detection-focused approaches to nuclear threat detection. Consequently, DoD is in the process of defining an intelligence, surveillance, and reconnaissance approach to countering nuclear threats that considers the observable signatures of all elements that comprise a potential threat; information, funds, people, material, equipment, and infrastructure. This strategy represents a shift from radiation detection as the primary sensing modality to radiation detection as one of many sensing modalities, including the human dimension, with a heavy emphasis on data fusion. This presentation will describe the attributes of a layered sensing approach to nuclear threat detection, illustrate the approach with examples, define potential building blocks, and discuss technical challenges.

  20. Fear, threat and efficacy in threat appeals: message involvement as a key mediator to message acceptance.

    PubMed

    Cauberghe, Verolien; De Pelsmacker, Patrick; Janssens, Wim; Dens, Nathalie

    2009-03-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts, on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement. Message involvement is a full mediator between evoked fear, perceived threat and efficacy perception on the one hand, and attitudes towards the message and behavioral intention to accept the message on the other. Speeding experience has a significantly negative impact on anti-speeding attitudes. Message and medium context threat levels and context thematic congruency have a significant effect on evoked fear and to a lesser extent on perceived threat. PMID:19245886

  1. Stereotype threat in the classroom: dejection mediates the disrupting threat effect on women's math performance.

    PubMed

    Keller, Johannes; Dauenheimer, Dirk

    2003-03-01

    Research on stereotype threat, which is defined as the risk of confirming a negative stereotypic expectation about one's group, has demonstrated that the applicability of negative stereotypes disrupts the performance of stigmatized social groups. While it has been shown that a reduction of stereotype threat leads to improved performance by members of stigmatized groups, there is a lack of clear-cut findings about the mediating processes. The aim of the present study is to provide a better understanding of the mechanisms that stereotype threat causes in women working on mathematical problems. In addition, the study set out to test stereotype threat theory in a natural environment: high school classrooms. The experiment involved the manipulation of the gender fairness of a math test. The results indicate that the stereotype threat effect exists in this everyday setting. Moreover, it appears that dejection emotions mediate the effect of threat manipulation. PMID:15273014

  2. 49 CFR 1540.203 - Security threat assessment.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... check conducted by TSA. (2) A security threat assessment conducted under 49 CFR part 1572 for the... Assistant Program Manager, Attn: Federal Agency Comparability Check, Hazmat Threat Assessment...

  3. 49 CFR 1540.203 - Security threat assessment.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... check conducted by TSA. (2) A security threat assessment conducted under 49 CFR part 1572 for the... Assistant Program Manager, Attn: Federal Agency Comparability Check, Hazmat Threat Assessment...

  4. 49 CFR 1540.203 - Security threat assessment.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... check conducted by TSA. (2) A security threat assessment conducted under 49 CFR part 1572 for the... Assistant Program Manager, Attn: Federal Agency Comparability Check, Hazmat Threat Assessment...

  5. Are All Interventions Created Equal? A Multi-Threat Approach to Tailoring Stereotype Threat Interventions

    PubMed Central

    Shapiro, Jenessa R.; Williams, Amy M.; Hambarchyan, Mariam

    2013-01-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats—concerns that a stereotype-relevant performance will reflect poorly on the abilities of one’s group—and self-as-target stereotype threats—concerns that a stereotype-relevant performance will reflect poorly on one’s own abilities. The present experiments explored Black college students’ performance on diagnostic intelligence tests (Experiments 1 and 3) and women’s interest (Experiment 2) and performance (Experiment 4) in science, technology, engineering, and math (STEM). Across the 4 experiments, participants were randomly assigned to experience either a group-as-target or self-as-target stereotype threat. Experiments 1 and 2 revealed that role model interventions were successful at protecting only against group-as-target stereotype threats, and Experiments 3 and 4 revealed that self-affirmation interventions were successful at protecting only against self-as-target stereotype threats. The present research provides an experimental test of the Multi-Threat Framework across different negatively stereotyped groups (Black students, female students), different negatively stereotyped domains (general intelligence, STEM), and different outcomes (test performance, career interest). This research suggests that interventions should address the range of possible stereotype threats to effectively protect individuals against these threats. Through an appreciation of the distinct forms of stereotype threats and the ways in which interventions work to reduce them, this research aims to facilitate a more complete understanding of stereotype threat. PMID:23088232

  6. Experimental investigations of weak definite and weak indefinite noun phrases

    PubMed Central

    Klein, Natalie M.; Gegg-Harrison, Whitney M.; Carlson, Greg N.; Tanenhaus, Michael K.

    2013-01-01

    Definite noun phrases typically refer to entities that are uniquely identifiable in the speaker and addressee’s common ground. Some definite noun phrases (e.g. the hospital in Mary had to go the hospital and John did too) seem to violate this uniqueness constraint. We report six experiments that were motivated by the hypothesis that these “weak definite” interpretations arise in “incorporated” constructions. Experiments 1-3 compared nouns that seem to allow for a weak definite interpretation (e.g. hospital, bank, bus, radio) with those that do not (e.g. farm, concert, car, book). Experiments 1 and 2 used an instruction-following task and picture-judgment task, respectively, to demonstrate that a weak definite need not uniquely refer. In Experiment 3 participants imagined scenarios described by sentences such as The Federal Express driver had to go to the hospital/farm. The imagined scenarios following weak definite noun phrases were more likely to include conventional activities associated with the object, whereas following regular nouns, participants were more likely to imagine scenarios that included typical activities associated with the subject; similar effects were observed with weak indefinites. Experiment 4 found that object-related activities were reduced when the same subject and object were used with a verb that does not license weak definite interpretations. In Experiment 5, a science fiction story introduced an artificial lexicon for novel concepts. Novel nouns that shared conceptual properties with English weak definite nouns were more likely to allow weak reference in a judgment task. Experiment 6 demonstrated that familiarity for definite articles and anti- familiarity for indefinite articles applies to the activity associated with the noun, consistent with predictions made by the incorporation analysis. PMID:23685208

  7. Resisting Weakness of the Will

    PubMed Central

    Levy, Neil

    2012-01-01

    I develop an account of weakness of the will that is driven by experimental evidence from cognitive and social psychology. I will argue that this account demonstrates that there is no such thing as weakness of the will: no psychological kind corresponds to it. Instead, weakness of the will ought to be understood as depletion of System II resources. Neither the explanatory purposes of psychology nor our practical purposes as agents are well-served by retaining the concept. I therefore suggest that we ought to jettison it, in favour of the vocabulary and concepts of cognitive psychology. PMID:22984298

  8. Weak-shock reflection factors

    SciTech Connect

    Reichenbach, H.; Kuhl, A.L.

    1993-09-07

    The purpose of this paper is to compare reflection factors for weak shocks from various surfaces, and to focus attention on some unsolved questions. Three different cases are considered: square-wave planar shock reflection from wedges; square-wave planar shock reflection from cylinders; and spherical blast wave reflection from a planar surface. We restrict ourselves to weak shocks. Shocks with a Mach number of M{sub O} < 1.56 in air or with an overpressure of {Delta}{sub PI} < 25 psi (1.66 bar) under normal ambient conditions are called weak.

  9. Propagation of a curved weak shock

    NASA Astrophysics Data System (ADS)

    Monica, A.; Prasad, Phoolan

    2001-05-01

    Propagation of a curved shock is governed by a system of shock ray equations which is coupled to an infinite system of transport equations along these rays. For a two-dimensional weak shock, it has been suggested that this system can be approximated by a hyperbolic system of four partial differential equations in a ray coordinate system, which consists of two independent variables ([zeta], t) where the curves t = constant give successive positions of the shock and [zeta] = constant give rays. The equations show that shock rays not only stretch longitudinally due to finite amplitude on a shock front but also turn due to a non-uniform distribution of the shock strength on it. These changes finally lead to a modification of the amplitude of the shock strength. Since discontinuities in the form of kinks appear on the shock, it is necessary to study the problem by using the correct conservation form of these equations. We use such a system of equations in conservation form to construct a total-variation-bounded finite difference scheme. The numerical solution captures converging shock fronts with a pair of kinks on them the shock front emerges without the usual folds in the caustic region. The shock strength, even when the shock passes through the caustic region, remains so small that the small-amplitude theory remains valid. The shock strength ultimately decays with a well-defined geometrical shape of the shock front a pair of kinks which separate a central disc from a pair of wings on the two sides. We also study the ultimate shape and decay of shocks of initially periodic shapes and plane shocks with a dent and a bulge.

  10. The influence of stereotype threat on immigrants: review and meta-analysis.

    PubMed

    Appel, Markus; Weber, Silvana; Kronberger, Nicole

    2015-01-01

    In many regions around the world students with certain immigrant backgrounds underachieve in educational settings. This paper provides a review and meta-analysis on one potential source of the immigrant achievement gap: stereotype threat, a situational predicament that may prevent students to perform up to their full abilities. A meta-analysis of 19 experiments suggests an overall mean effect size of 0.63 (random effects model) in support of stereotype threat theory. The results are complemented by moderator analyses with regard to circulation (published or unpublished research), cultural context (US versus Europe), age of immigrants, type of stereotype threat manipulation, dependent measures, and means for identification of immigrant status; evidence on the role of ethnic identity strength is reviewed. Theoretical and practical implications of the findings are discussed. PMID:26217256

  11. The influence of stereotype threat on immigrants: review and meta-analysis

    PubMed Central

    Appel, Markus; Weber, Silvana; Kronberger, Nicole

    2015-01-01

    In many regions around the world students with certain immigrant backgrounds underachieve in educational settings. This paper provides a review and meta-analysis on one potential source of the immigrant achievement gap: stereotype threat, a situational predicament that may prevent students to perform up to their full abilities. A meta-analysis of 19 experiments suggests an overall mean effect size of 0.63 (random effects model) in support of stereotype threat theory. The results are complemented by moderator analyses with regard to circulation (published or unpublished research), cultural context (US versus Europe), age of immigrants, type of stereotype threat manipulation, dependent measures, and means for identification of immigrant status; evidence on the role of ethnic identity strength is reviewed. Theoretical and practical implications of the findings are discussed. PMID:26217256

  12. Impact of an interactive anti-speeding threat appeal: how much threat is too much?

    PubMed

    Panić, Katarina; Cauberghe, Verolien; De Pelsmacker, Patrick

    2011-05-01

    This study investigates the impact of an interactive television public-service announcement (PSA) containing an anti-speeding threat appeal on feelings of telepresence and behavioral intention. In a 2 × 2 × 2 between-subjects factorial design with 213 participants, the level of threat evoked by a traditional PSA, by the interactive part of the PSA (dedicated advertising location or DAL) and by the preceding program context are manipulated to be either low or high. The results support the assumptions of the Extended Parallel Processing Model with regard to the effect of the level of perceived threat and perceived efficacy in an interactive media environment, and the important role of telepresence as a processing variable. The results of the three-way interaction effect of threat evoked by the program, the PSA and the DAL on telepresence show that when the threat levels of the program and the PSA are both either low or high, exposure to the threatening information in the DAL does not generate a significantly higher feeling of telepresence. However, when a low-threat program is followed by a high-threat PSA, the threat level of the DAL has a positive effect on telepresence. The same trend is found with a high-threat program and a low-threat PSA, although the effect of the threat evoked by the DAL on telepresence is not significant at conventional levels. Finally, there is a positive effect of telepresence on the behavioral intention to reduce speeding, which is partly mediated by the viewer's perceived efficacy to follow the recommended behavior. PMID:21204691

  13. Weak interactions and presupernova evolution

    SciTech Connect

    Aufderheide, M.B. State Univ. of New York . Dept. of Physics)

    1991-02-19

    The role of weak interactions, particularly electron capture and {beta}{sup {minus}} decay, in presupernova evolution is discussed. The present uncertainty in these rates is examined and the possibility of improving the situation is addressed. 12 refs., 4 figs.

  14. Celebrate Strengths, Nurture Affinities: A Conversation with Mel Levine

    ERIC Educational Resources Information Center

    Scherer, Marge

    2006-01-01

    In this interview with "Educational Leadership," pediatrician Dr. Mel Levine, cofounder of "All Kinds of Minds," explains why students and educators should learn about eight neurodevelopmental functions that undergird our strengths and weaknesses. For the most part, he notes, adults who lead successful lives mobilize their strengths and compensate…

  15. On the front lines: Stakeholder threat cues determine how identified employees cope with scandal.

    PubMed

    Grandey, Alicia A; Krannitz, Morgan A; Slezak, Tyler

    2015-07-01

    When organizational identity is threatened as a result of scandal, highly identified members who represent the threatened organization to stakeholders have a particularly challenging and overlooked experience. Addressing a theoretical paradox, we propose that organizational identification interacts with the threat cues from stakeholders to determine employee responses. We conducted a multimethod, in vivo test of these ideas with university fundraising employees after events threatened the university's moral identity. Interview and archival data demonstrated that stakeholders expressed identity threat to fundraisers, who experienced their own identity-related distress and engaged in both group-dissociative and group-affirming responses. Surveys of professional and student university fundraisers demonstrated that more identified employees were more distressed (e,g., felt anxious, grief, betrayed) regardless of stakeholder threat cues. Yet, when employees perceived weak threat cues from stakeholders, more identified members were less likely to dissociate from the group and more likely to affirm the group's positive identity with stakeholders. These benefits of identification were not present when the stakeholder threat cues were strong. We discuss future research and practical implications of front-line employee identification and stakeholder cues during scandal. PMID:25602276

  16. Weak Deeply Virtual Compton Scattering

    SciTech Connect

    Ales Psaker; Wolodymyr Melnitchouk; Anatoly Radyushkin

    2007-03-01

    We extend the analysis of the deeply virtual Compton scattering process to the weak interaction sector in the generalized Bjorken limit. The virtual Compton scattering amplitudes for the weak neutral and charged currents are calculated at the leading twist within the framework of the nonlocal light-cone expansion via coordinate space QCD string operators. Using a simple model, we estimate cross sections for neutrino scattering off the nucleon, relevant for future high intensity neutrino beam facilities.

  17. Weak ferromagnetism in the cuprates

    NASA Astrophysics Data System (ADS)

    Chovan, J.; Papanicolaou, N.

    2001-02-01

    An effective field theory that describes the low-frequency spin dynamics in the low-temperature orthorhombic phase of La 2CuO 4 is derived. The main features of the inherent covert weak ferromagnetism are thus accounted for in a straightforward manner but some of the finer theoretical predictions would require further experimental investigation. In particular, theory predicts the occurrence of magnetic stripes in undoped La 2CuO 4 which mediate the observed weak-ferromagnetic transition.

  18. Influence of environmental noise on the weak value amplification

    NASA Astrophysics Data System (ADS)

    Zhu, Xuannmin; Zhang, Yu-Xiang

    2016-05-01

    Quantum systems are always disturbed by environmental noise. We have investigated the influence of the environmental noise on the amplification in weak measurements. Three typical quantum noise processes are discussed in this article. The maximum expectation values of the observables of the measuring device decrease sharply with the strength of the depolarizing and phase damping channels, while the amplification effect of weak measurement is immune to the amplitude damping noise. To obtain significantly amplified signals, we must ensure that the preselection quantum systems are kept away from the depolarizing and phase damping processes.

  19. Influence of environmental noise on the weak value amplification

    NASA Astrophysics Data System (ADS)

    Zhu, Xuannmin; Zhang, Yu-Xiang

    2016-08-01

    Quantum systems are always disturbed by environmental noise. We have investigated the influence of the environmental noise on the amplification in weak measurements. Three typical quantum noise processes are discussed in this article. The maximum expectation values of the observables of the measuring device decrease sharply with the strength of the depolarizing and phase damping channels, while the amplification effect of weak measurement is immune to the amplitude damping noise. To obtain significantly amplified signals, we must ensure that the preselection quantum systems are kept away from the depolarizing and phase damping processes.

  20. 49 CFR 1540.209 - Fees for security threat assessment.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Fees for security threat assessment. 1540.209...: GENERAL RULES Security Threat Assessments § 1540.209 Fees for security threat assessment. This section describes the payment process for completion of the security threat assessments required under this...

  1. 49 CFR 1540.209 - Fees for security threat assessment.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Fees for security threat assessment. 1540.209...: GENERAL RULES Security Threat Assessments § 1540.209 Fees for security threat assessment. This section describes the payment process for completion of the security threat assessments required under subpart....

  2. 49 CFR 1540.209 - Fees for security threat assessment.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Fees for security threat assessment. 1540.209...: GENERAL RULES Security Threat Assessments § 1540.209 Fees for security threat assessment. This section describes the payment process for completion of the security threat assessments required under this...

  3. 49 CFR 1546.301 - Bomb or air piracy threats.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless...

  4. 49 CFR 1546.301 - Bomb or air piracy threats.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless...

  5. 49 CFR 1546.301 - Bomb or air piracy threats.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless...

  6. 49 CFR 1546.301 - Bomb or air piracy threats.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless...

  7. Protecting SWIR cameras from laser threats

    NASA Astrophysics Data System (ADS)

    Donval, Ariela; Fisher, Tali; Lipman, Ofir; Oron, Moshe

    2013-06-01

    SWIR cameras offer the advantage of higher resolution and smaller optical systems than conventional mid and far infrared optical systems. With the ability of seeing at low illumination conditions at the near infrared region, it can provide the detection of covert lasers. The ability of laser detection introduces the risk of sensor damage when the laser power is above a certain threat level. Smart protection is therefore needed, that is transparent for low laser intensities and limit or block the high laser intensities, and is effective over a wide band of wavelengths. We developed an Optical Power Control (OPC) device that reduces laser power threat to a safe level for a variety of optical systems. The talk presents a novel technology for protection of SWIR cameras against laser threats.

  8. Left-Wing Extremism: The Current Threat

    SciTech Connect

    Karl A. Seger

    2001-04-30

    Left-wing extremism is ''alive and well'' both in the US and internationally. Although the current domestic terrorist threat within the U. S. is focused on right-wing extremists, left-wing extremists are also active and have several objectives. Leftist extremists also pose an espionage threat to U.S. interests. While the threat to the U.S. government from leftist extremists has decreased in the past decade, it has not disappeared. There are individuals and organizations within the U.S. who maintain the same ideology that resulted in the growth of left-wing terrorism in this country in the 1970s and 1980s. Some of the leaders from that era are still communicating from Cuba with their followers in the U.S., and new leaders and groups are emerging.

  9. Epidemiology today: Mitigating threats to an ecosystem.

    PubMed

    Kreiger, Nancy

    2016-01-01

    Ecosystems comprise all the living and non-living things in a particular area (e.g., rain forest, desert), which interact and maintain equilibrium. Loss of equilibrium (e.g., clear-cutting trees in a rain forest) can mean the decline of the ecosystem, unless it is able to adapt to the new circumstances. The term "knowledge ecosystem" describes an approach to managing knowledge in a particular field; the components of this system include the people, the technological skills and resources, and information or data. Epidemiology can be thought of as a knowledge ecosystem and, like ecological systems, its existence can be threatened, from both internal and external forces that may alter its equilibrium. This paper describes some threats to the epidemiology knowledge ecosystem, how these threats came about, and what responses we can make that may serve to mitigate those threats. PMID:27348106

  10. Insider Threat Assessment: Model, Analysis and Tool

    NASA Astrophysics Data System (ADS)

    Chinchani, Ramkumar; Ha, Duc; Iyer, Anusha; Ngo, Hung Q.; Upadhyaya, Shambhu

    Insider threat is typically attributed to legitimate users who maliciously leverage their system privileges, and familiarity and proximity to their computational environment to compromise valuable information or inflict damage. According to the annual CSI/FBI surveys conducted since 1996, internal attacks and insider abuse form a significant portion of reported incidents. The strongest indication yet that insider threat is very real is given by the recent study [2] jointly conducted by CERT and the US Secret Service; the first of its kind, which provides an in-depth insight into the problem in a real-world setting. However, there is no known body of work which addresses this problem effectively. There are several challenges, beginning with understanding the threat.

  11. Satellite Threat Warning and Attack Reporting

    SciTech Connect

    Hilland, D.; Phipps, G.; Jingle, C.; Newton, G.

    1997-12-31

    The Air Force Research Laboratory`s Satellite Threat Warning and Attack Reporting (STW/AR) program will provide technologies for advanced threat warning and reporting of radio frequency (RF) and laser threats. The STW/AR program objectives are: (a) develop cost- effective technologies to detect, identify, locate, characterize, and report attacks or interference against U.S. and Allied satellites. (b) demonstrate innovative, light-weight, low-power, laser and RF sensors. The program focuses on the demonstration of RF and laser sensors. The RF sensor effort includes the investigation of interferometric antenna arrays, multi-arm spiral and butler matrix antennas, wideband receivers, adaptive processors, and improved processing algorithms. The laser sensor effort includes the investigation of alternative detectors, broadband grating and optical designs, active pixel sensing, and improved processing algorithms.

  12. Environmental Health: Threats and their Interactions

    PubMed Central

    Holdstock, Douglas

    2008-01-01

    Improvements in the provision of an acceptable standard of health care, particularly in the developing world, will be undermined by three ongoing processes: ongoing armed conflicts; the threat of global warming due to rising levels of greenhouse gases, particularly carbon dioxide emitted by developed countries; and by rapidly rising populations. The key features of these three threats are summarised, and it is shown that interactions between them increase both the likelihood of their occurrence and the probable harm that they will cause. Some of the interactions are described, with ways of providing health care taking into account the threats and their interactions, and the paradox is emphasised that better health care in the developing world will further increase population growth followed by increased greenhouse gas emissions. Improved education for women and free and unlimited access to modern methods of contraception are vital. PMID:21572838

  13. [The threat of snake and scorpion venoms].

    PubMed

    Płusa, Tadeusz; Smędzik, Katarzyna

    2015-09-01

    Venoms of snakes and scorpions pose a significant threat to the health and life of humans. The speed and range of their actions causes damage of the organ responsible for the maintenance of vital signs. Venomous snake venoms cause blood clotting disorders, tissue necrosis and hemolysis, and the release of a number of proinflammatory cytokines and impair antibody synthesis. Availability of antitoxins is limited and in the most cases supportive treatment is recommended. In turn, the venom of scorpions beside intestinal symptoms cause significant impairment of neuromuscular conduction, causing severe respiratory disorders. Action venom poses a particular threat to sensitive patients. The degree of threat to life caused by the venom of snakes and scorpions authorizes the treatment of these substances as a potential biological weapon. PMID:26449581

  14. On the special status of "ego threats".

    PubMed

    Schotte, D E

    1992-05-01

    This article comments on a recent article by Heatherton, Herman, and Polivy (1991) in which they suggest that ego threats are a prerequisite to affectively induced disinhibition of food intake in restrained eaters and current dieters. In contrast, the present review suggests that mood induction procedures that involve no apparent threat (e.g., viewing a frightening film) can also prompt disinhibition in restrained eaters. Thus, any mood induction procedure that does not directly physically threaten the S may disinhibit restrained eaters. It is concluded that recommendations to focus future research on ego threats are premature and may serve to obscure the mechanisms by which changes in affective state influence food intake in dieters. PMID:1507070

  15. Conformational transitions of a weak polyampholyte

    NASA Astrophysics Data System (ADS)

    Narayanan Nair, Arun Kumar; Uyaver, Sahin; Sun, Shuyu

    2014-10-01

    Using grand canonical Monte Carlo simulations of a flexible polyelectrolyte where the charges are in contact with a reservoir of constant chemical potential given by the solution pH, we study the behavior of weak polyelectrolytes in poor and good solvent conditions for polymer backbone. We address the titration behavior and conformational properties of a flexible diblock polyampholyte chain formed of two oppositely charged weak polyelectrolyte blocks, each containing equal number of identical monomers. The change of solution pH induces charge asymmetry in a diblock polyampholyte. For diblock polyampholyte chains in poor solvents, we demonstrate that a discontinuous transition between extended (tadpole) and collapsed (globular) conformational states is attainable by varying the solution pH. The double-minima structure in the probability distribution of the free energy provides direct evidence for the first-order like nature of this transition. At the isoelectric point electrostatically driven coil-globule transition of diblock polyampholytes in good solvents is found to consist of different regimes identified with increasing electrostatic interaction strength. At pH values above or below the isoelectric point diblock chains are found to have polyelectrolyte-like behavior due to repulsion between uncompensated charges along the chain.

  16. [Assessing adolescents with school massacre threats].

    PubMed

    Lindberg, Nina; Sailas, Eila; Kaltiala-Heino, Riittakerttu

    2013-01-01

    School massacres have increased pressure on health-care authorities for assessing risk for severe violence. In acute situations, threat analysis focuses at thought processes and actions of adolescents presenting threat of violence, in order to assess to which extent the adolescent has progressed from thoughts to actions. Because of great variability in aggressive behavior, separate interventions for individual, family and other developmental surroundings are often needed. Structured risk-assessment in special health care is aimed for conducting decision making towards risk reduction and adequate help for adolescents at risk. PMID:24069639

  17. Effective Teaching Strategies for Gifted/Learning-Disabled Students with Spatial Strengths

    ERIC Educational Resources Information Center

    Mann, Rebecca L.

    2006-01-01

    This study sought to determine effective teaching strategies for use with high-ability students who have spatial strengths and sequential weaknesses. Gifted students with spatial strengths and weak verbal skills often struggle in the traditional classroom. Their learning style enables them to grasp complex systems and excel at higher levels of…

  18. Observationally determined Fe II oscillator strengths

    NASA Astrophysics Data System (ADS)

    Shull, J. M.; van Steenberg, M.; Seab, C. G.

    1983-08-01

    Absorption oscillator strengths for 21 Fe II resonance lines, have been determined using a curve-of-growth analysis of interstellar data from the Copernicus and International Ultraviolet Explorer (IUE) satellites. In addition to slight changes in strengths of the far-UV lines, new f-values are reported for wavelength 1608.45, a prominent line in interstellar and quasar absorption spectra, and for wavelength 2260.08, a weak, newly identified linen in IUE interstellar spectra. An upper limit on the strength of the undetected line at 2366.867 A (UV multiplet 2) is set. Using revised oscillator strengths, Fe II column densities toward 13 OB stars are derived. The interstellar depletions, (Fe/H), relative to solar values range between factors of 10 and 120.

  19. Weakness

    MedlinePlus

    ... spine) Stroke MUSCLE DISEASES Becker muscular dystrophy Dermatomyositis Muscular dystrophy (Duchenne) Myotonic dystrophy POISONING Botulism Poisoning ( insecticides , nerve gas) Shellfish poisoning OTHER Anemia Myasthenia gravis Polio

  20. 49 CFR 192.917 - How does an operator identify potential threats to pipeline integrity and use the threat...

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... pipeline integrity and use the threat identification in its integrity program? 192.917 Section 192.917....917 How does an operator identify potential threats to pipeline integrity and use the threat identification in its integrity program? (a) Threat identification. An operator must identify and evaluate...

  1. 49 CFR 192.917 - How does an operator identify potential threats to pipeline integrity and use the threat...

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... pipeline integrity and use the threat identification in its integrity program? 192.917 Section 192.917....917 How does an operator identify potential threats to pipeline integrity and use the threat identification in its integrity program? (a) Threat identification. An operator must identify and evaluate...

  2. 49 CFR 192.917 - How does an operator identify potential threats to pipeline integrity and use the threat...

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... pipeline integrity and use the threat identification in its integrity program? 192.917 Section 192.917....917 How does an operator identify potential threats to pipeline integrity and use the threat identification in its integrity program? (a) Threat identification. An operator must identify and evaluate...

  3. 49 CFR 192.917 - How does an operator identify potential threats to pipeline integrity and use the threat...

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... pipeline integrity and use the threat identification in its integrity program? 192.917 Section 192.917....917 How does an operator identify potential threats to pipeline integrity and use the threat identification in its integrity program? (a) Threat identification. An operator must identify and evaluate...

  4. 49 CFR 192.917 - How does an operator identify potential threats to pipeline integrity and use the threat...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... pipeline integrity and use the threat identification in its integrity program? 192.917 Section 192.917....917 How does an operator identify potential threats to pipeline integrity and use the threat identification in its integrity program? (a) Threat identification. An operator must identify and evaluate...

  5. Flexibility and Muscular Strength.

    ERIC Educational Resources Information Center

    Liemohn, Wendell

    1988-01-01

    This definition of flexibility and muscular strength also explores their roles in overall physical fitness and focuses on how increased flexibility and muscular strength can help decrease or eliminate lower back pain. (CB)

  6. Warping the Weak Gravity Conjecture

    NASA Astrophysics Data System (ADS)

    Kooner, Karta; Parameswaran, Susha; Zavala, Ivonne

    2016-08-01

    The Weak Gravity Conjecture, if valid, rules out simple models of Natural Inflation by restricting their axion decay constant to be sub-Planckian. We revisit stringy attempts to realise Natural Inflation, with a single open string axionic inflaton from a probe D-brane in a warped throat. We show that warped geometries can allow the requisite super-Planckian axion decay constant to be achieved, within the supergravity approximation and consistently with the Weak Gravity Conjecture. Preliminary estimates of the brane backreaction suggest that the probe approximation may be under control. However, there is a tension between large axion decay constant and high string scale, where the requisite high string scale is difficult to achieve in all attempts to realise large field inflation using perturbative string theory. We comment on the Generalized Weak Gravity Conjecture in the light of our results.

  7. Defensive activation to (un)predictable interoceptive threat: The NPU respiratory threat test (NPUr).

    PubMed

    Schroijen, Mathias; Fantoni, Simona; Rivera, Carmen; Vervliet, Bram; Schruers, Koen; van den Bergh, Omer; van Diest, Ilse

    2016-06-01

    Potentially life-threatening interoceptive sensations easily engage the behavioral defensive system. Resulting fear and anxiety toward interoceptive threat are functionally distinct states that are hypothesized to play a prominent role in the etiology of panic disorder. The present study aimed to investigate whether fear- and anxiety-potentiated startle responses occur to predictable and unpredictable interoceptive threat, respectively. Therefore, we modified the NPU threat test (Schmitz & Grillon, ) and replaced the aversive electrocutaneous stimulus with an aversive interoceptive stimulus (a breathing occlusion, making it briefly impossible to breathe). Healthy participants (N = 48) underwent three instructed conditions. A visual cue signaled the occlusion in the predictable condition (P), whereas another cue was unrelated to the occurrence of the occlusion in the unpredictable condition (U). The safe condition (N) also had a visual cue, but no occlusion. Both fear- and anxiety-potentiated startle blink responses were observed in response to predictable and unpredictable respiratory threat, respectively. The current study presents and validates the NPU respiratory threat test (NPUr) as an ecologically valid paradigm to study both anxiety and fear in response to a panic-relevant interoceptive threat. The paradigm allows future testing of contextual generalization, investigation of different clinical groups, and more explicit comparisons of defensive responding to interoceptive versus exteroceptive threats. PMID:26879710

  8. Strength Training for Girls.

    ERIC Educational Resources Information Center

    Connaughton, Daniel; Connaughton, Angela; Poor, Linda

    2001-01-01

    Strength training can be fun, safe, and appropriate for young girls and women and is an important component of any fitness program when combined with appropriate cardiovascular and flexibility activities. Concerns and misconceptions regarding girls' strength training are discussed, presenting general principles of strength training for children…

  9. Growth and decay of weak shock waves in magnetogasdynamics

    NASA Astrophysics Data System (ADS)

    Singh, L. P.; Singh, D. B.; Ram, S. D.

    2015-12-01

    The purpose of the present study is to investigate the problem of the propagation of weak shock waves in an inviscid, electrically conducting fluid under the influence of a magnetic field. The analysis assumes the following two cases: (1) a planar flow with a uniform transverse magnetic field and (2) cylindrically symmetric flow with a uniform axial or varying azimuthal magnetic field. A system of two coupled nonlinear transport equations, governing the strength of a shock wave and the first-order discontinuity induced behind it, are derived that admit a solution that agrees with the classical decay laws for a weak shock. An analytic expression for the determination of the shock formation distance is obtained. How the magnetic field strength, whether axial or azimuthal, influences the shock formation is also assessed.

  10. Experimental Evidence of Threat-Sensitive Collective Avoidance Responses in a Large Wild-Caught Herring School

    PubMed Central

    Rieucau, Guillaume; Boswell, Kevin M.; De Robertis, Alex; Macaulay, Gavin J.; Handegard, Nils Olav

    2014-01-01

    Aggregation is commonly thought to improve animals' security. Within aquatic ecosystems, group-living prey can learn about immediate threats using cues perceived directly from predators, or from collective behaviours, for example, by reacting to the escape behaviours of companions. Combining cues from different modalities may improve the accuracy of prey antipredatory decisions. In this study, we explored the sensory modalities that mediate collective antipredatory responses of herring (Clupea harengus) when in a large school (approximately 60 000 individuals). By conducting a simulated predator encounter experiment in a semi-controlled environment (a sea cage), we tested the hypothesis that the collective responses of herring are threat-sensitive. We investigated whether cues from potential threats obtained visually or from the perception of water displacement, used independently or in an additive way, affected the strength of the collective avoidance reactions. We modified the sensory nature of the simulated threat by exposing the herring to 4 predator models differing in shape and transparency. The collective vertical avoidance response was observed and quantified using active acoustics. The combination of sensory cues elicited the strongest avoidance reactions, suggesting that collective antipredator responses in herring are mediated by the sensory modalities involved during threat detection in an additive fashion. Thus, this study provides evidence for magnitude-graded threat responses in a large school of wild-caught herring which is consistent with the “threat-sensitive hypothesis”. PMID:24489778

  11. Global threat to agriculture from invasive species.

    PubMed

    Paini, Dean R; Sheppard, Andy W; Cook, David C; De Barro, Paul J; Worner, Susan P; Thomas, Matthew B

    2016-07-01

    Invasive species present significant threats to global agriculture, although how the magnitude and distribution of the threats vary between countries and regions remains unclear. Here, we present an analysis of almost 1,300 known invasive insect pests and pathogens, calculating the total potential cost of these species invading each of 124 countries of the world, as well as determining which countries present the greatest threat to the rest of the world given their trading partners and incumbent pool of invasive species. We find that countries vary in terms of potential threat from invasive species and also their role as potential sources, with apparently similar countries sometimes varying markedly depending on specifics of agricultural commodities and trade patterns. Overall, the biggest agricultural producers (China and the United States) could experience the greatest absolute cost from further species invasions. However, developing countries, in particular, Sub-Saharan African countries, appear most vulnerable in relative terms. Furthermore, China and the United States represent the greatest potential sources of invasive species for the rest of the world. The analysis reveals considerable scope for ongoing redistribution of known invasive pests and highlights the need for international cooperation to slow their spread. PMID:27325781

  12. The silent threat of low genetic diversity

    USGS Publications Warehouse

    Hunter, Margaret E.

    2013-01-01

    Across the Caribbean, protected coastal waters have served as primary feeding and breeding grounds for the endangered Antillean manatee. Unfortunately, these same coastal waters are also a popular “habitat” for humans. In the past, the overlap between human and manatee habitat allowed for manatee hunting and threatened the survival of these gentle marine mammals. Today, however, threats are much more inadvertent and are often related to coastal development, degraded habitats and boat strikes. In the state of Florida, decades of research on the species’ biological needs have helped conservationists address threats to its survival. For example, low wake zones and boater education have protected manatees from boat strikes, and many of their critical winter refuges are now protected. The Florida population has grown steadily, thus increasing from approximately 1,200 in 1991 to more than 5,000 in 2010. It is conceivable that in Florida manatees may one day be reclassified as “threatened” rather than “endangered.” Yet, in other parts of the Caribbean, threats still loom. This includes small, isolated manatee populations found on islands that can be more susceptible to extinction and lack of genetic diversity. To ensure the species’ long-term viability, scientists have turned their sights to the overall population dynamics of manatees throughout the Caribbean. Molecular genetics has provided new insights into long-term threats the species faces. Fortunately, the emerging field of conservation genetics provides managers with tools and strategies for protecting the species’ long-term viability.

  13. Diversity, Racial Threat and Metropolitan Housing Segregation

    ERIC Educational Resources Information Center

    DeFina, Robert; Hannon, Lance

    2009-01-01

    Previous studies have shown that as the percent black or percent Hispanic grows, that group's residential segregation from whites tends to increase as well. Typically, these findings are explained in terms of white discriminatory reaction to the perceived threat associated with minority population growth. The present analysis examines whether…

  14. The Asteroid Impact Threat: Decisions Upcoming

    NASA Astrophysics Data System (ADS)

    Schweickart, Russell L.

    The asteroid impact threat has likely been constant for the past three billion years. What has accelerated is our knowledge of the impact hazard, and in particular the population of near- Earth objects (NEOs), those asteroids and near-Earth comets whose orbits approach or cross that of the Earth. In the next 10-15 years we will know the orbits of over 300,000 NEOs of a size capable of destroying a major city on impact. Based on current data 97 Given that a NEO deflection campaign can be initiated using existing space technology the international community will shortly be confronted with the decision of whether action should be taken, when it should be taken and who should take such action. The Association of Space Explorers (ASE)* and its Panel on Asteroid Threat Mitigation is currently concluding a two year process leading to a recommended decision program on asteroid threat mitigation that will be submitted to the United Nations in 2009. UN member states will soon be looking to the scientific community for their inputs on this matter. This presentation is intended to provide basic information on the NEO threat and our ability to take preventive action, anticipating an increasing demand for scientific opinion on this issue from international political institutions. (*) The Association of Space Explorers is the profession international organization of astronauts and cosmonauts. See www.space-explorers.org.

  15. The Nature of the Terrorism Threat

    ERIC Educational Resources Information Center

    Goldstein, Evan R., Comp.

    2008-01-01

    This article describes how Bruce Hoffman and Marc Sageman, two prominent scholars of terrorism, square off over whether Al Qaeda remains the primary global terrorist threat. The dispute began in the pages of "Foreign Affairs," where Hoffman, a professor in the security-studies program at Georgetown University, wrote a withering review of Sageman's…

  16. Disgust, politics, and responses to threat.

    PubMed

    Inbar, Yoel; Pizarro, David

    2014-06-01

    We address two questions regarding the relationship between political ideology and responses to threatening or aversive stimuli. The first concerns the reason for the connection between disgust and specific political and moral attitudes; the second concerns the observation that some responses to threat (i.e., neuroticism/anxiety) are associated with a more left-wing political orientation. PMID:24970437

  17. 24 CFR 9.131 - Direct threat.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 24 Housing and Urban Development 1 2012-04-01 2012-04-01 false Direct threat. 9.131 Section 9.131 Housing and Urban Development Office of the Secretary, Department of Housing and Urban Development ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF DISABILITY IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT...

  18. 25 CFR 11.402 - Terroristic threats.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 25 Indians 1 2014-04-01 2014-04-01 false Terroristic threats. 11.402 Section 11.402 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR LAW AND ORDER COURTS OF INDIAN OFFENSES AND LAW AND... public inconvenience or in reckless disregard of the risk of causing such terror or inconvenience....

  19. The School Shooter: A Threat Assessment Perspective.

    ERIC Educational Resources Information Center

    O'Toole, Mary Ellen

    This paper presents a systematic procedure for threat assessment and intervention of school shooters. The model is designed to be used by educators, mental-health professionals, and law-enforcement agencies and is intended to help refine and strengthen the efforts of the National Center for the Analysis of Violent Crime. Its fundamental building…

  20. Shape threat detection via adaptive computed tomography

    NASA Astrophysics Data System (ADS)

    Masoudi, Ahmad; Thamvichai, Ratchaneekorn; Neifeld, Mark A.

    2016-05-01

    X-ray Computed Tomography (CT) is used widely for screening purposes. Conventional x-ray threat detection systems employ image reconstruction and segmentation algorithms prior to making threat/no-threat decisions. We find that in many cases these pre-processing steps can degrade detection performance. Therefore in this work we will investigate methods that operate directly on the CT measurements. We analyze a fixed-gantry system containing 25 x-ray sources and 2200 photon counting detectors. We present a new method for improving threat detection performance. This new method is a so-called greedy adaptive algorithm which at each time step uses information from previous measurements to design the next measurement. We utilize sequential hypothesis testing (SHT) in order to derive both the optimal "next measurement" and the stopping criterion to insure a target probability of error Pe. We find that selecting the next x-ray source according to such a greedy adaptive algorithm, we can reduce Pe by a factor of 42.4× relative to the conventional measurement sequence employing all 25 sources in sequence.

  1. Computer Security-Risks, Threats, and Safeguards.

    ERIC Educational Resources Information Center

    Ekhaml, Leticia

    2001-01-01

    Describes a variety of Internet threats to computers and networks used in schools. Discusses electronic trashing; clearing hard drives; cyber spying on Web sites visited; protection against cyber spying, including disposable email accounts; password sniffers; privacy policies; email snooping; email attachments that carry viruses; and hoaxes. (LRW)

  2. Proliferation: Threat and response (November 1997)

    SciTech Connect

    1997-11-01

    Table of Contents: The Regional Proliferation Challenge; Northeast Asia; South Asia; The Middle East and North Africa; Russia, Ukraine, Kazakhstan, and Belarus; The Transnational Threat; Department of Defense Response; Prevention; Protection; Acquisition; DOD Capabilities to Respond to NBC Terrorism; Conclusion; Technical Annex; Further Reading; and Glossary.

  3. Reactions to the Threat of Embarrassment.

    ERIC Educational Resources Information Center

    Miller, Rowland S.; Miller, Gale A.

    Embarrassment is an aversive state which occurs when the public image a person is trying to maintain during an interaction is abruptly discredited. When people are embarrassed, they try to salvage the situation by offering positive information about themselves to restore their endangered identities. To examine responses to the threat of impending…

  4. Threats and countermeasures for network security

    NASA Technical Reports Server (NTRS)

    Denning, Peter J.

    1991-01-01

    In the late 1980's, the traditional threat of anonymous break-ins to networked computers was joined by viruses and worms, multiplicative surrogates that carry out the bidding of their authors. Technologies for authentication and secrecy, supplemented by good management practices, are the principal countermeasures. Four articles on these subjects are presented.

  5. Global threat to agriculture from invasive species

    PubMed Central

    Paini, Dean R.; Sheppard, Andy W.; Cook, David C.; De Barro, Paul J.; Worner, Susan P.; Thomas, Matthew B.

    2016-01-01

    Invasive species present significant threats to global agriculture, although how the magnitude and distribution of the threats vary between countries and regions remains unclear. Here, we present an analysis of almost 1,300 known invasive insect pests and pathogens, calculating the total potential cost of these species invading each of 124 countries of the world, as well as determining which countries present the greatest threat to the rest of the world given their trading partners and incumbent pool of invasive species. We find that countries vary in terms of potential threat from invasive species and also their role as potential sources, with apparently similar countries sometimes varying markedly depending on specifics of agricultural commodities and trade patterns. Overall, the biggest agricultural producers (China and the United States) could experience the greatest absolute cost from further species invasions. However, developing countries, in particular, Sub-Saharan African countries, appear most vulnerable in relative terms. Furthermore, China and the United States represent the greatest potential sources of invasive species for the rest of the world. The analysis reveals considerable scope for ongoing redistribution of known invasive pests and highlights the need for international cooperation to slow their spread. PMID:27325781

  6. After Heart Attack, New Threat: Heart Failure

    MedlinePlus

    ... https://medlineplus.gov/news/fullstory_159007.html After Heart Attack, New Threat: Heart Failure 1 in 4 survivors develops this serious ... TUESDAY, May 24, 2016 (HealthDay News) -- Risk of heart failure appears high within a few years of ...

  7. Using the threat probability task to assess anxiety and fear during uncertain and certain threat.

    PubMed

    Bradford, Daniel E; Magruder, Katherine P; Korhumel, Rachel A; Curtin, John J

    2014-01-01

    Fear of certain threat and anxiety about uncertain threat are distinct emotions with unique behavioral, cognitive-attentional, and neuroanatomical components. Both anxiety and fear can be studied in the laboratory by measuring the potentiation of the startle reflex. The startle reflex is a defensive reflex that is potentiated when an organism is threatened and the need for defense is high. The startle reflex is assessed via electromyography (EMG) in the orbicularis oculi muscle elicited by brief, intense, bursts of acoustic white noise (i.e., "startle probes"). Startle potentiation is calculated as the increase in startle response magnitude during presentation of sets of visual threat cues that signal delivery of mild electric shock relative to sets of matched cues that signal the absence of shock (no-threat cues). In the Threat Probability Task, fear is measured via startle potentiation to high probability (100% cue-contingent shock; certain) threat cues whereas anxiety is measured via startle potentiation to low probability (20% cue-contingent shock; uncertain) threat cues. Measurement of startle potentiation during the Threat Probability Task provides an objective and easily implemented alternative to assessment of negative affect via self-report or other methods (e.g., neuroimaging) that may be inappropriate or impractical for some researchers. Startle potentiation has been studied rigorously in both animals (e.g., rodents, non-human primates) and humans which facilitates animal-to-human translational research. Startle potentiation during certain and uncertain threat provides an objective measure of negative affective and distinct emotional states (fear, anxiety) to use in research on psychopathology, substance use/abuse and broadly in affective science. As such, it has been used extensively by clinical scientists interested in psychopathology etiology and by affective scientists interested in individual differences in emotion. PMID:25285398

  8. Cosmology and the weak interaction

    SciTech Connect

    Schramm, D.N. ):)

    1989-12-01

    The weak interaction plays a critical role in modern Big Bang cosmology. This review will emphasize two of its most publicized cosmological connections: Big Bang nucleosynthesis and Dark Matter. The first of these is connected to the cosmological prediction of Neutrino Flavours, N{sub {nu}} {approximately} 3 which is now being confirmed at SLC and LEP. The second is interrelated to the whole problem of galaxy and structure formation in the universe. This review will demonstrate the role of the weak interaction both for dark matter candidates and for the problem of generating seeds to form structure. 87 refs., 3 figs., 5 tabs.

  9. Cosmology and the weak interaction

    NASA Technical Reports Server (NTRS)

    Schramm, David N.

    1989-01-01

    The weak interaction plays a critical role in modern Big Bang cosmology. Two of its most publicized comological connections are emphasized: big bang nucleosynthesis and dark matter. The first of these is connected to the cosmological prediction of neutrine flavors, N(sub nu) is approximately 3 which in now being confirmed. The second is interrelated to the whole problem of galacty and structure formation in the universe. The role of the weak interaction both for dark matter candidates and for the problem of generating seeds to form structure is demonstrated.

  10. Insider Threat - Material Control and Accountability Mitigation

    SciTech Connect

    Powell, Danny H; Elwood Jr, Robert H; Roche, Charles T

    2011-01-01

    The technical objectives of nuclear safeguards are (1) the timely detection of diversion of significant quantities of nuclear material from peaceful uses to the manufacture of nuclear weapons or other nuclear explosive devices or for purposes unknown and (2) the deterrence of such diversion by the risk of early detection. The safeguards and security program must address both outsider threats and insider threats. Outsider threats are primarily addressed by the physical protection system. Insider threats can be any level of personnel at the site including passive or active insiders that could attempt protracted or abrupt diversion. This could occur by an individual acting alone or by collusion between an individual with material control and accountability (MC&A) responsibilities and another individual who has responsibility or control within both the physical protection and the MC&A systems. The insider threat is one that must be understood and incorporated into the safeguards posture. There have been more than 18 documented cases of theft or loss of plutonium or highly enriched uranium. The insider has access, authority, and knowledge, as well as a set of attributes, that make him/her difficult to detect. An integrated safeguards program is designed as a defense-in-depth system that seeks to prevent the unauthorized removal of nuclear material, to provide early detection of any unauthorized attempt to remove nuclear material, and to rapidly respond to any attempted removal of nuclear material. The program is also designed to support protection against sabotage, espionage, unauthorized access, compromise, and other hostile acts that may cause unacceptable adverse impacts on national security, program continuity, the health and safety of employees, the public, or the environment. Nuclear MC&A play an essential role in the capabilities of an integrated safeguards system to deter and detect theft or diversion of nuclear material. An integrated safeguards system with

  11. Muscle Weakness Thresholds for Prediction of Diabetes in Adults

    PubMed Central

    Peterson, Mark D.; Zhang, Peng; Choksi, Palak; Markides, Kyriakos S.; Al Snih, Soham

    2016-01-01

    Background Despite the known links between weakness and early mortality, what remains to be fully understood is the extent to which strength preservation is associated with protection from cardiometabolic diseases such as diabetes. Purpose The purposes of this study were to determine the association between muscle strength and diabetes among adults, and to identify age- and sex-specific thresholds of low strength for detection of risk. Methods A population-representative sample of 4,066 individuals, aged 20–85 years, was included from the combined 2011–2012 National Health and Nutrition Examination Survey datasets. Strength was assessed using a hand-held dynamometer, and the single largest reading from either hand was normalized to body mass. A logistic regression model was used to assess the association between normalized grip strength and risk of diabetes, as determined by hemoglobin A1c (HbA1c) levels (≥6.5% [≥48 mmol/mol]), while controlling for sociodemographic characteristics, anthropometric measures, and television viewing time. Results For every 0.05 decrement in normalized strength, there was a 1.26 times increased adjusted odds for diabetes in men and women. Women were at lower odds of having diabetes (OR: 0.49; 95% CI: 0.29–0.82), whereas age, waist circumference and lower income were inversely associated. Optimal sex- and age-specific weakness thresholds to detect diabetes were 0.56, 0.50, and 0.45 for men, and 0.42, 0.38, and 0.33 for women, for ages 20–39 years, 40–59 years, and 60–80 years. Conclusions and Clinical Relevance We present thresholds of strength that can be incorporated into a clinical setting for identifying adults that are at risk for developing diabetes, and that might benefit from lifestyle interventions to reduce risk. PMID:26744337

  12. Evolutionary behavior of weak shocks in a non-ideal gas

    NASA Astrophysics Data System (ADS)

    Arora, Rajan; Siddiqui, Mohd Junaid

    2013-03-01

    Except some empirical methods, which have been developed in the past, no analytical method exists to describe the evolutionary behavior of a shock wave without limiting its strength. In this paper, we have derived a system of transport equations for the shock strength and the induced continuity. We generate a completely intrinsic description of plane, cylindrical, and spherical shock waves of weak strength, propagating into a non-ideal gas. It is shown that for a weak shock, the disturbance evolves like an acceleration wave at the leading order. For a weak shock, we may assume that [InlineEquation not available: see fulltext.]. We have considered a case when the effect of the first order-induced discontinuity or the disturbances that overtook the shock from behind are strong, i.e., [ p x ] = O(1). The evolutionary behavior of the weak shocks in a non-ideal gas is described using the truncation approximation.

  13. Strength Modeling Report

    NASA Technical Reports Server (NTRS)

    Badler, N. I.; Lee, P.; Wong, S.

    1985-01-01

    Strength modeling is a complex and multi-dimensional issue. There are numerous parameters to the problem of characterizing human strength, most notably: (1) position and orientation of body joints; (2) isometric versus dynamic strength; (3) effector force versus joint torque; (4) instantaneous versus steady force; (5) active force versus reactive force; (6) presence or absence of gravity; (7) body somatotype and composition; (8) body (segment) masses; (9) muscle group envolvement; (10) muscle size; (11) fatigue; and (12) practice (training) or familiarity. In surveying the available literature on strength measurement and modeling an attempt was made to examine as many of these parameters as possible. The conclusions reached at this point toward the feasibility of implementing computationally reasonable human strength models. The assessment of accuracy of any model against a specific individual, however, will probably not be possible on any realistic scale. Taken statistically, strength modeling may be an effective tool for general questions of task feasibility and strength requirements.

  14. N-{Delta} weak transition

    SciTech Connect

    Graczyk, Krzysztof M.

    2011-11-23

    A short review of the Rein-Sehgal and isobar models is presented. The attention is focused on the nucleon-{Delta}(1232) weak transition form-factors. The results of the recent re-analyses of the ANL and BNL bubble chamber neutrino-deuteron scattering data are discussed.

  15. Focal weakness following herpes zoster.

    PubMed Central

    Cockerell, O C; Ormerod, I E

    1993-01-01

    Three patients presented with focal weakness of an arm which followed segmental herpes zoster affecting the same limb. Neurophysiological investigations suggest that the site of the lesion lay at the root, plexus, or peripheral nerve level. This reflects the various ways in which the virus may affect the peripheral nervous system. PMID:8410022

  16. Cosmology with weak lensing surveys.

    PubMed

    Munshi, Dipak; Valageas, Patrick

    2005-12-15

    Weak gravitational lensing is responsible for the shearing and magnification of the images of high-redshift sources due to the presence of intervening mass. Since the lensing effects arise from deflections of the light rays due to fluctuations of the gravitational potential, they can be directly related to the underlying density field of the large-scale structures. Weak gravitational surveys are complementary to both galaxy surveys and cosmic microwave background observations as they probe unbiased nonlinear matter power spectra at medium redshift. Ongoing CMBR experiments such as WMAP and a future Planck satellite mission will measure the standard cosmological parameters with unprecedented accuracy. The focus of attention will then shift to understanding the nature of dark matter and vacuum energy: several recent studies suggest that lensing is the best method for constraining the dark energy equation of state. During the next 5 year period, ongoing and future weak lensing surveys such as the Joint Dark Energy Mission (JDEM; e.g. SNAP) or the Large-aperture Synoptic Survey Telescope will play a major role in advancing our understanding of the universe in this direction. In this review article, we describe various aspects of probing the matter power spectrum and the bi-spectrum and other related statistics with weak lensing surveys. This can be used to probe the background dynamics of the universe as well as the nature of dark matter and dark energy. PMID:16286284

  17. A threat in the computer: the race implicit association test as a stereotype threat experience.

    PubMed

    Frantz, Cynthia M; Cuddy, Amy J C; Burnett, Molly; Ray, Heidi; Hart, Allen

    2004-12-01

    Three experiments test whether the threat of appearing racist leads White participants to perform worse on the race Implicit Association Test (IAT) and whether self-affirmation can protect from this threat. Experiments 1 and 2 suggest that White participants show a stereotype threat effect when completing the race IAT, leading to stronger pro-White scores when the test is believed to be diagnostic of racism. This effect increases for domain-identified (highly motivated to control prejudice) participants (Experiment 2). In Experiment 3, self-affirmation inoculates participants against stereotype threat while taking the race IAT. These findings have methodological implications for use of the race IAT and theoretical implications concerning the malleability of automatic prejudice and the potential interpersonal effects of the fear of appearing racist. PMID:15536243

  18. Importance and challenges of measuring intrinsic foot muscle strength

    PubMed Central

    2012-01-01

    Background Intrinsic foot muscle weakness has been implicated in a range of foot deformities and disorders. However, to establish a relationship between intrinsic muscle weakness and foot pathology, an objective measure of intrinsic muscle strength is needed. The aim of this review was to provide an overview of the anatomy and role of intrinsic foot muscles, implications of intrinsic weakness and evaluate the different methods used to measure intrinsic foot muscle strength. Method Literature was sourced from database searches of MEDLINE, PubMed, SCOPUS, Cochrane Library, PEDro and CINAHL up to June 2012. Results There is no widely accepted method of measuring intrinsic foot muscle strength. Methods to estimate toe flexor muscle strength include the paper grip test, plantar pressure, toe dynamometry, and the intrinsic positive test. Hand-held dynamometry has excellent interrater and intrarater reliability and limits toe curling, which is an action hypothesised to activate extrinsic toe flexor muscles. However, it is unclear whether any method can actually isolate intrinsic muscle strength. Also most methods measure only toe flexor strength and other actions such as toe extension and abduction have not been adequately assessed. Indirect methods to investigate intrinsic muscle structure and performance include CT, ultrasonography, MRI, EMG, and muscle biopsy. Indirect methods often discriminate between intrinsic and extrinsic muscles, but lack the ability to measure muscle force. Conclusions There are many challenges to accurately measure intrinsic muscle strength in isolation. Most studies have measured toe flexor strength as a surrogate measure of intrinsic muscle strength. Hand-held dynamometry appears to be a promising method of estimating intrinsic muscle strength. However, the contribution of extrinsic muscles cannot be excluded from toe flexor strength measurement. Future research should clarify the relative contribution of intrinsic and extrinsic muscles

  19. PROTOSTELLAR DISK FORMATION ENABLED BY WEAK, MISALIGNED MAGNETIC FIELDS

    SciTech Connect

    Krumholz, Mark R.; Crutcher, Richard M.; Hull, Charles L. H.

    2013-04-10

    The gas from which stars form is magnetized, and strong magnetic fields can efficiently transport angular momentum. Most theoretical models of this phenomenon find that it should prevent formation of large (>100 AU), rotationally supported disks around most protostars, even when non-ideal magnetohydrodynamic (MHD) effects that allow the field and gas to decouple are taken into account. Using recent observations of magnetic field strengths and orientations in protostellar cores, we show that this conclusion is incorrect. The distribution of magnetic field strengths is very broad, and alignments between fields and angular momentum vectors within protostellar cores are essentially random. By combining the field strength and misalignment data with MHD simulations showing that disk formation is expected for both weak and misaligned fields, we show that these observations imply that we should expect disk fractions of {approx}10%-50% even when protostars are still deeply embedded in their parent cores, and even if the gas is governed by ideal MHD.

  20. Peroneal muscle weakness in female basketballers following chronic ankle sprain.

    PubMed

    Rottigni, S A; Hopper, D

    1991-01-01

    Female A-grade basketballers were examined for invertor and evertor muscle strength. Two test groups participated. The injured group were players who had persisting disability following ankle sprains. The control group were players who had never sustained an ankle sprain. Test apparatus was the Orthotron isokinetic dynamometer at contraction speed of 180° per second. Trends towards higher invertor and evertor strength in uninjured group when compared with the injured group found in the present study have been supported by one other report. Invertors were found to be significantly stronger than evertors in both injured and uninjured groups, with the exception of the dominant leg of the uninjured group. A significant weakness in non-dominant evertors of the uninjured group was detected. Dominance did not significantly alter strength differences in the invertor or evertor muscle groups within the uninjured population. The clinical importance of strengthening the peroneal muscles in ankle sprain rehabilitation is discussed, and further research considerations provided. PMID:25025187

  1. Prevalence of reduced muscle strength in older U.S. adults: United States, 2011-2012.

    PubMed

    Looker, Anne C; Wang, Chia-Yih

    2015-01-01

    Five percent of adults aged 60 and over had weak muscle strength and 13% had intermediate muscle strength, as defined by the new FNIH criteria. Weak muscle strength is clinically relevant because it is associated with slow gait speed, an important mobility impairment. It is also linked to an increased risk of death. The prevalence of reduced muscle strength increased with age and was higher in non-Hispanic Asian and Hispanic persons than in non-Hispanic white or non-Hispanic black persons. Decreasing muscle strength was linked with increased difficulty in rising from an armless chair, which is another important type of mobility impairment. PMID:25633238

  2. Future Infectious Disease Threats to Europe

    PubMed Central

    Suk, Jonathan E.

    2011-01-01

    We examined how different drivers of infectious disease could interact to threaten control efforts in Europe. We considered projected trends through 2020 for 3 broad groups of drivers: globalization and environmental change, social and demographic change, and health system capacity. Eight plausible infectious disease threats with the potential to be significantly more problematic than they are today were identified through an expert consultation: extensively drug-resistant bacteria, vector-borne diseases, sexually transmitted infections, food-borne infections, a resurgence of vaccine-preventable diseases, health care–associated infections, multidrug-resistant tuberculosis, and pandemic influenza. Preemptive measures to be taken by the public health community to counteract these threats were identified. PMID:21940915

  3. Securing Infrastructure from High Explosive Threats

    SciTech Connect

    Glascoe, L; Noble, C; Reynolds, J; Kuhl, A; Morris, J

    2009-03-20

    Lawrence Livermore National Laboratory (LLNL) is working with the Department of Homeland Security's Science and Technology Directorate, the Transportation Security Administration, and several infrastructure partners to characterize and help mitigate principal structural vulnerabilities to explosive threats. Given the importance of infrastructure to the nation's security and economy, there is a clear need for applied research and analyses (1) to improve understanding of the vulnerabilities of these systems to explosive threats and (2) to provide decision makers with time-critical technical assistance concerning countermeasure and mitigation options. Fully-coupled high performance calculations of structural response to ideal and non-ideal explosives help bound and quantify specific critical vulnerabilities, and help identify possible corrective schemes. Experimental validation of modeling approaches and methodologies builds confidence in the prediction, while advanced stochastic techniques allow for optimal use of scarce computational resources to efficiently provide infrastructure owners and decision makers with timely analyses.

  4. Current nuclear threats and possible responses

    NASA Astrophysics Data System (ADS)

    Lamb, Frederick K.

    2005-04-01

    Over the last 50 years, the United States has spent more than 100 billion developing and building a variety of systems intended to defend its territory against intercontinental-range ballistic missiles. Most of these systems never became operational and ultimately all were judged ineffective. The United States is currently spending about 10 billion per year developing technologies and systems intended to defend against missiles that might be acquired in the future by North Korea or Iran. This presentation will discuss these efforts ad whether they are likely to be more effective than those of the past. It will also discuss the proper role of anti-ballistic programs at a time when the threat of a nuclear attack on the U.S. by terrorists armed with nuclear weapons is thought to be much higher than the threat of an attack by nuclear-armed ballistic missles.

  5. Detecting underwater improvised explosive threats (DUIET)

    NASA Astrophysics Data System (ADS)

    Feeley, Terry

    2010-04-01

    Improvised Explosive Devices (IEDs) have presented a major threat in the wars in Afghanistan and Iraq. These devices are powerful homemade land mines that can be small and easily hidden near roadsides. They are then remotely detonated when Coalition Forces pass by either singly or in convoys. Their rapid detection, classification and destruction is key to the safety of troops in the area. These land based bombs will have an analogue in the underwater theater especially in ports, lakes, rivers and streams. These devices may be used against Americans on American soil as an element of the global war on terrorism (GWOT) Rapid detection and classification of underwater improvised explosive devices (UIED) is critical to protecting innocent lives and maintaining the day to day flow of commerce. This paper will discuss a strategy and tool set to deal with this potential threat.

  6. Insider Threat and Information Security Management

    NASA Astrophysics Data System (ADS)

    Coles-Kemp, Lizzie; Theoharidou, Marianthi

    The notion of insider has multiple facets. An organization needs to identify which ones to respond to. The selection, implementetion and maintenance of information security countermeasures requires a complex combination of organisational policies, functions and processes, which form Information Security Management. This chapter examines the role of current information security management practices in addressing the insider threat. Most approaches focus on frameworks for regulating insider behaviour and do not allow for the various cultural responses to the regulatory and compliance framework. Such responses are not only determined by enforcement of policies and awareness programs, but also by various psychological and organisational factors at an individual or group level. Crime theories offer techniques that focus on such cultural responses and can be used to enhance the information security management design. The chapter examines the applicability of several crime theories and concludes that they can contribute in providing additional controls and redesign of information security management processes better suited to responding to the insider threat.

  7. The Concept of Identification in Threat Assessment.

    PubMed

    Meloy, J Reid; Mohandie, Kris; Knoll, James L; Hoffmann, Jens

    2015-06-01

    Identification is one of eight warning behaviors--superordinate patterns of accelerating risk--that are theorized to correlate with targeted violence, and have some empirical validation. It is characterized by one or more of five characteristics: pseudo-commando behavior, evidence of a warrior mentality, a close association with weapons or other military or law enforcement paraphernalia, wanting to imitate and often surmount previous attackers or assassins, or believing oneself to be an agent to advance a particular cause or belief system. The authors briefly explore the history of the psychology of identification, its current usage, and its application to threat assessment. Four cases are used to illustrate identification as both a process and a product, and a likely motive for targeted violence in some subjects. Its operational relevance for threat assessment is suggested. PMID:25728417

  8. Studies of fiber-matrix adhesion on compression strength

    NASA Technical Reports Server (NTRS)

    Bascom, Willard D.; Nairn, John A.; Boll, D. J.

    1991-01-01

    A study was initiated on the effect of the matrix polymer and the fiber matrix bond strength of carbon fiber polymer matrix composites. The work includes tests with micro-composites, single ply composites, laminates, and multi-axial loaded cylinders. The results obtained thus far indicate that weak fiber-matrix adhesion dramatically reduces 0 degree compression strength. Evidence is also presented that the flaws in the carbon fiber that govern compression strength differ from those that determine fiber tensile strength. Examination of post-failure damage in the single ply tests indicates kink banding at the crack tip.

  9. The Strength of the Metal. Aluminum Oxide Interface

    NASA Technical Reports Server (NTRS)

    Pepper, S. V.

    1984-01-01

    The strength of the interface between metals and aluminum oxide is an important factor in the successful operation of devices found throughout modern technology. One finds the interface in machine tools, jet engines, and microelectronic integrated circuits. The strength of the interface, however, should be strong or weak depending on the application. The diverse technological demands have led to some general ideas concerning the origin of the interfacial strength, and have stimulated fundamental research on the problem. Present status of our understanding of the source of the strength of the metal - aluminum oxide interface in terms of interatomic bonds are reviewed. Some future directions for research are suggested.

  10. Weak values and weak coupling maximizing the output of weak measurements

    SciTech Connect

    Di Lorenzo, Antonio

    2014-06-15

    In a weak measurement, the average output 〈o〉 of a probe that measures an observable A{sup -hat} of a quantum system undergoing both a preparation in a state ρ{sub i} and a postselection in a state E{sub f} is, to a good approximation, a function of the weak value A{sub w}=Tr[E{sub f}A{sup -hat} ρ{sub i}]/Tr[E{sub f}ρ{sub i}], a complex number. For a fixed coupling λ, when the overlap Tr[E{sub f}ρ{sub i}] is very small, A{sub w} diverges, but 〈o〉 stays finite, often tending to zero for symmetry reasons. This paper answers the questions: what is the weak value that maximizes the output for a fixed coupling? What is the coupling that maximizes the output for a fixed weak value? We derive equations for the optimal values of A{sub w} and λ, and provide the solutions. The results are independent of the dimensionality of the system, and they apply to a probe having a Hilbert space of arbitrary dimension. Using the Schrödinger–Robertson uncertainty relation, we demonstrate that, in an important case, the amplification 〈o〉 cannot exceed the initial uncertainty σ{sub o} in the observable o{sup -hat}, we provide an upper limit for the more general case, and a strategy to obtain 〈o〉≫σ{sub o}. - Highlights: •We have provided a general framework to find the extremal values of a weak measurement. •We have derived the location of the extremal values in terms of preparation and postselection. •We have devised a maximization strategy going beyond the limit of the Schrödinger–Robertson relation.

  11. Recent Results on Singularity Strengths

    NASA Astrophysics Data System (ADS)

    Nolan, Brien

    2002-12-01

    In this contribution, we review some recent results on strengths of singularities. In a space-time (M,g), let γ[τ0, 0) → M be an incomplete, inextendible causal geodesic, affinely parametrised by τ, tangent ěc k. Let Jτ1 :=set of Jacobi fields along γ, orthogonal to γ and vanishing at time τ1 ≥ τ0 i.e. ěc ξ ∈ J{τ 1 } iff D2ξa = -Rbcdakbkdξc, gabξakb = 0, and ěc ξ (τ 1 ) = 0. Vτ1(τ) := volume element defined by full set of independent elements of Jτ1 (2-dim for null geodesies, 3-dim for time-like); Vτ1 := ∥Vτ1∥. Definition (Tipler 1977): γ terminates in a gravitationally strong singularity if for all 0 > τ1 ≥ τ0, lim infτ→0- Vτ1(τ) = 0. γ... gravitationally weak ... lim infτ→0- Vτ1(τ) > 0. The interpretation is that at a strong singularity, an extended body, e.g. a gravitational wave detector, is crushed to zero volume by the singularity. Tipler's definition does not take account of the possibility that (i) V → ∞ or (ii) V → finite, non-zero value, but with infinite stretching/crushing in orthogonal directions ('spaghettifying singularity'). Extended definition (Nolan 1999): strong if either V → 0,∞ or if for every τ1, there is an element ěc ξ of Jτ1 satisfying ||ěc ξ || -> 0. Otherwise weak. (Ori 2000): singularity is 'deformationally strong' if either (i) it is Tipler-strong or (ii) for every τ1, there is an element ěc ξ of Jτ1 satisfying ||ěc ξ || -> ∞ . Otherwise, deformationally weak...

  12. Avian influenza: an emerging pandemic threat.

    PubMed

    Jin, Xian Wen; Mossad, Sherif B

    2005-12-01

    While we are facing the threat of an emerging pandemic from the current avian flu outbreak in Asia, we have learned important traits of the virus responsible for the 1918 Spanish influenza pandemic that made it so deadly. By using stockpiled antiviral drugs effectively and developing an effective vaccine, we can be in a better position than ever to mitigate the global impact of an avian influenza pandemic. PMID:16392727

  13. Bullying: a hidden threat to patient safety.

    PubMed

    Longo, Joy; Hain, Debra

    2014-01-01

    Patient safety is a crucial element for quality care in hemodialysis facilities. When evaluating possible threats to safety, an important factor to consider is the behavior of the healthcare staff. Inappropriate behaviors, such as bullying, have been associated with poor clinical outcomes. In addressing inappropriate behaviors, it is necessary to consider the role of the work environment. Healthy work environment initiatives provide a possible strategy to prevent and/or address the behaviors. PMID:24818452

  14. CAXSS: an intelligent threat-detection system

    NASA Astrophysics Data System (ADS)

    Feather, Thomas; Guan, Ling; Lee-Kwen, Adrian; Paranjape, Raman B.

    1993-04-01

    Array Systems Computing Inc. (ASC) is developing a prototype Computer Assisted X-ray Screening System (CAXSS) which uses state-of-the-art image processing and computer vision technology to detect threats seen in x-ray images of passenger carry-on luggage at national and international airports. This system is successful in detecting weapons including guns, knives, grenades, aerosol cans, etc. Currently, bomb detection is also being implemented; preliminary results using this bomb detector are promising.

  15. Matrix Characterization in Threat Material Detection Processes

    NASA Astrophysics Data System (ADS)

    Obhodas, J.; Sudac, D.; Valkovic, V.

    2009-03-01

    Matrix characterization in the threat material detection is of utmost importance, it generates the background against which the threat material signal has to be identified. Threat materials (explosive, chemical warfare, …) are usually contained within small volume inside large volumes of variable matrices. We have studied the influence of matrix materials on the capability of neutron systems to identify hidden threat material. Three specific scenarios are considered in some details: case 1—contraband material in the sea containers, case 2—-explosives in soil (landmines), case 3—explosives and chemical warfare on the sea bottom. Effects of container cargo material on tagged neutron system are seen in the increase of gamma background and the decrease of neutron beam intensity. Detection of landmines is more complex because of variable soil properties. We have studied in detail space and time variations of soil elemental compositions and in particular hydrogen content (humidity). Of special interest are ammunitions and chemical warfare on the sea bottom, damping sites and leftovers from previous conflicts (WW-I, WW-II and local). In this case sea sediment is background source and its role is similar to the role of the soil in the landmine detection. In addition to geochemical cycling of chemical elements in semi-enclosed sea, like the Adriatic Sea, one has to consider also anthropogenic influence, especially when studying small scale variations in concentration levels. Some preliminary experimental results obtained with tagged neutron sensor inside an underwater vehicle are presented as well as data on sediment characterization by X-Ray Fluorescence.

  16. Matrix Characterization in Threat Material Detection Processes

    SciTech Connect

    Obhodas, J.; Sudac, D.; Valkovic, V.

    2009-03-10

    Matrix characterization in the threat material detection is of utmost importance, it generates the background against which the threat material signal has to be identified. Threat materials (explosive, chemical warfare, ...) are usually contained within small volume inside large volumes of variable matrices. We have studied the influence of matrix materials on the capability of neutron systems to identify hidden threat material. Three specific scenarios are considered in some details: case 1--contraband material in the sea containers, case 2 - explosives in soil (landmines), case 3 - explosives and chemical warfare on the sea bottom. Effects of container cargo material on tagged neutron system are seen in the increase of gamma background and the decrease of neutron beam intensity. Detection of landmines is more complex because of variable soil properties. We have studied in detail space and time variations of soil elemental compositions and in particular hydrogen content (humidity). Of special interest are ammunitions and chemical warfare on the sea bottom, damping sites and leftovers from previous conflicts (WW-I, WW-II and local). In this case sea sediment is background source and its role is similar to the role of the soil in the landmine detection. In addition to geochemical cycling of chemical elements in semi-enclosed sea, like the Adriatic Sea, one has to consider also anthropogenic influence, especially when studying small scale variations in concentration levels. Some preliminary experimental results obtained with tagged neutron sensor inside an underwater vehicle are presented as well as data on sediment characterization by X-Ray Fluorescence.

  17. Nonproliferation, Nuclear Security, and the Insider Threat

    SciTech Connect

    Balatsky, Galya I.; Duggan, Ruth

    2012-07-12

    Insider threat concept is evolving and getting more attention: (1) Domestically, internationally and in foreign countries, (2) At the government, academia, and industry levels, and (3) Public awareness and concerns are also growing. Negligence can be an insider's action. Technology advancements provide more opportunities, new tools for the insider. Our understanding of the insider is shaped by our cultural, social and ethnic perceptions and traditions. They also can limit our recognition of the issues and response actions.

  18. Tomography and weak lensing statistics

    SciTech Connect

    Munshi, Dipak; Coles, Peter; Kilbinger, Martin E-mail: peter.coles@astro.cf.ac.uk

    2014-04-01

    We provide generic predictions for the lower order cumulants of weak lensing maps, and their correlators for tomographic bins as well as in three dimensions (3D). Using small-angle approximation, we derive the corresponding one- and two-point probability distribution function for the tomographic maps from different bins and for 3D convergence maps. The modelling of weak lensing statistics is obtained by adopting a detailed prescription for the underlying density contrast that involves hierarchal ansatz and lognormal distribution. We study the dependence of our results on cosmological parameters and source distributions corresponding to the realistic surveys such as LSST and DES. We briefly outline how photometric redshift information can be incorporated in our results. We also show how topological properties of convergence maps can be quantified using our results.

  19. Overdamping by weakly coupled environments

    NASA Astrophysics Data System (ADS)

    Esposito, Massimiliano; Haake, Fritz

    2005-12-01

    A quantum system weakly interacting with a fast environment usually undergoes a relaxation with complex frequencies whose imaginary parts are damping rates quadratic in the coupling to the environment in accord with Fermi’s “golden rule.” We show for various models (spin damped by harmonic-oscillator or random-matrix baths, quantum diffusion, and quantum Brownian motion) that upon increasing the coupling up to a critical value still small enough to allow for weak-coupling Markovian master equations, a different relaxation regime can occur. In that regime, complex frequencies lose their real parts such that the process becomes overdamped. Our results call into question the standard belief that overdamping is exclusively a strong coupling feature.

  20. Overdamping by weakly coupled environments

    SciTech Connect

    Esposito, Massimiliano; Haake, Fritz

    2005-12-15

    A quantum system weakly interacting with a fast environment usually undergoes a relaxation with complex frequencies whose imaginary parts are damping rates quadratic in the coupling to the environment in accord with Fermi's 'golden rule'. We show for various models (spin damped by harmonic-oscillator or random-matrix baths, quantum diffusion, and quantum Brownian motion) that upon increasing the coupling up to a critical value still small enough to allow for weak-coupling Markovian master equations, a different relaxation regime can occur. In that regime, complex frequencies lose their real parts such that the process becomes overdamped. Our results call into question the standard belief that overdamping is exclusively a strong coupling feature.

  1. Optimizing SNAP for Weak Lensing

    NASA Astrophysics Data System (ADS)

    High, F. W.; Ellis, R. S.; Massey, R. J.; Rhodes, J. D.; Lamoureux, J. I.; SNAP Collaboration

    2004-12-01

    The Supernova/Acceleration Probe (SNAP) satellite proposes to measure weak gravitational lensing in addition to type Ia supernovae. Its pixel scale has been set to 0.10 arcsec per pixel as established by the needs of supernova observations. To find the optimal pixel scale for accurate weak lensing measurements we conduct a tradeoff study in which, via simulations, we fix the suvey size in total pixels and vary the pixel scale. Our preliminary results show that with a smaller scale of about 0.08 arcsec per pixel we can minimize the contribution of intrinsic shear variance to the error on the power spectrum of mass density distortion. Currently we are testing the robustness of this figure as well as determining whether dithering yields analogous results.

  2. Alumina fiber strength improvement

    NASA Technical Reports Server (NTRS)

    Pepper, R. T.; Nelson, D. C.

    1982-01-01

    The effective fiber strength of alumina fibers in an aluminum composite was increased to 173,000 psi. A high temperature heat treatment, combined with a glassy carbon surface coating, was used to prevent degradation and improve fiber tensile strength. Attempts to achieve chemical strengthening of the alumina fiber by chromium oxide and boron oxide coatings proved unsuccessful. A major problem encountered on the program was the low and inconsistent strength of the Dupont Fiber FP used for the investigation.

  3. Cyber threat model for tactical radio networks

    NASA Astrophysics Data System (ADS)

    Kurdziel, Michael T.

    2014-05-01

    The shift to a full information-centric paradigm in the battlefield has allowed ConOps to be developed that are only possible using modern network communications systems. Securing these Tactical Networks without impacting their capabilities has been a challenge. Tactical networks with fixed infrastructure have similar vulnerabilities to their commercial counterparts (although they need to be secure against adversaries with greater capabilities, resources and motivation). However, networks with mobile infrastructure components and Mobile Ad hoc Networks (MANets) have additional unique vulnerabilities that must be considered. It is useful to examine Tactical Network based ConOps and use them to construct a threat model and baseline cyber security requirements for Tactical Networks with fixed infrastructure, mobile infrastructure and/or ad hoc modes of operation. This paper will present an introduction to threat model assessment. A definition and detailed discussion of a Tactical Network threat model is also presented. Finally, the model is used to derive baseline requirements that can be used to design or evaluate a cyber security solution that can be scaled and adapted to the needs of specific deployments.

  4. SARS: An Emerging Global Microbial Threat.

    PubMed Central

    Hughes, James M.

    2004-01-01

    In March 2003, the Institute of Medicine published an update to its 1992 landmark report on emerging infections. The new report, Microbial Threats to Health: Emergence, Detection, and Response, describes the current spectrum of global microbial threats, factors affecting their emergence or resurgence, and measures that should be undertaken to effectively address them. Coincident with this publication came increasing reports of severe atypical pneumonia of unknown etiology among persons in southeast Asia. This new disease, designated severe acute respiratory syndrome (SARS), spread globally in a matter of weeks, infecting primarily close contacts of index patients (e.g., household members and healthcare workers caring for index patients) but also resulting in community transmission in some areas. An unprecedented worldwide collaborative effort was undertaken to determine the cause of the illness and implement prevention measures. A previously unrecognized coronavirus was identified as the causative agent, and health officials throughout the world struggled to implement measures to contain its spread, including isolation of suspect SARS cases and quarantine of exposed persons. The emergence of SARS is a timely reminder of the need to expect the unexpected and to ensure strong national and global public health partnerships when preparing for and responding to infectious diseases. Effectively addressing the threat of SARS will require enhanced global infectious disease surveillance, the development of rapid diagnostics, new therapies, and vaccines, implementation of aggressive evidence-based infection control strategies, and effective communication. Images Fig. 2 Fig. 3 PMID:17060979

  5. Stereotype Threat Reinterpreted as a Regulatory Mismatch

    PubMed Central

    Grimm, Lisa R.; Markman, Arthur B.; Maddox, W. Todd; Baldwin, Grant C.

    2008-01-01

    Research documents performance decrements resulting from the activation of a negative task-relevant stereotype. We combine a number of strands of work to identify causes of stereotype threat in a way that allows us to reverse the effects and improve the performance of individuals with negative task-relevant stereotypes. We draw on prior work suggesting that negative stereotypes induce a prevention focus, and other research suggesting that people exhibit greater flexibility when their regulatory focus matches the reward structure of the task. This work suggests that stereotype threat effects emerge from a prevention focus combined with tasks that have an explicit or implicit gains reward structure. We find flexible performance can be induced in individuals who have a negative task-relevant stereotype by using a losses reward structure. We demonstrate the interaction of stereotypes and the reward structure of the task using chronic stereotypes and GRE math problems (Experiment 1), and primed stereotypes and a category learning task (Experiments 2a and 2b). We discuss implications of this research for other work on stereotype threat. PMID:19159133

  6. Impact! - The Threat of Comets and Asteroids

    NASA Astrophysics Data System (ADS)

    Verschuur, Gerrit L.

    1997-12-01

    In Impact , Gerrit L. Verschuur offers an eye-opening look at the catastrophic collisions of comets and asteroids with our planet. Perhaps more important, he paints an unsettling portrait of the possibility of new collisions with earth, exploring potential threats to our planet and describing what scientists are doing right now to prepare for this frightening possibility. Every day something from space hits our planet, Verschuur reveals. In fact, about 10,000 tons of space debris fall to earth every year, mostly in meteoric form. But meteors are not the greatest threat to life on earth, the author points out. The major threats are asteroids and comets. The reader discovers that astronomers have located some 350 NEAs ("Near Earth Asteroids"), objects whose orbits cross the orbit of the earth. Comets, of course, are even more deadly. He discusses Comet Swift-Tuttle--"the most dangerous object in the solar system"--a comet far larger than the one that many scientists believe killed off the dinosaurs, due to pass through earth's orbit in the year 2126. In addition, the author describes the efforts of Spacewatch and other groups to locate NEAs, and evaluates the idea that comet and asteroid impacts have been an underrated factor in the evolution of life on earth. Whether discussing monumental tsunamis or the innumerable comets in the solar system, Impact will enthrall anyone curious about outer space, remarkable natural phenomenon, or the future of the planet earth.

  7. Bot armies as threats to network security

    NASA Astrophysics Data System (ADS)

    Banks, Sheila B.; Stytz, Martin R.

    2007-04-01

    "Botnets", or "bot armies", are large groups of remotely controlled malicious software. Bot armies pose one of the most serious security threats to all networks. Botnets, remotely controlled and operated by botmasters or botherders, can launch massive denial of service attacks, multiple penetration attacks, or any other malicious network activity on a massive scale. While bot army activity has, in the past, been limited to fraud, blackmail, and other forms of criminal activity, their potential for causing large-scale damage to the entire internet; for launching large-scale, coordinated attacks on government computers and networks; and for large-scale, coordinated data gathering from thousands of users and computers on any network has been underestimated. This paper will not discuss how to build bots but the threats they pose. In a "botnet" or "bot army", computers can be used to spread spam, launch denial-of-service attacks against Web sites, conduct fraudulent activities, and prevent authorized network traffic from traversing the network. In this paper we discuss botnets and the technologies that underlie this threat to network and computer security. The first section motivates the need for improved protection against botnets, their technologies, and for further research about botnets. The second contains background information about bot armies and their key underlying technologies. The third section presents a discussion of the types of attacks that botnets can conduct and potential defenses against them. The fourth section contains a summary and suggestions for future research and development.

  8. Mere effort and stereotype threat performance effects.

    PubMed

    Jamieson, Jeremy P; Harkins, Stephen G

    2007-10-01

    Although the fact that stereotype threat impacts performance is well established, the underlying process(es) is(are) not clear. Recently, T. Schmader and M. Johns (2003) argued for a working memory interference account, which proposes that performance suffers because cognitive resources are expended on processing information associated with negative stereotypes. The antisaccade task provides a vehicle to test this account because optimal performance requires working memory resources to inhibit the tendency to look at an irrelevant, peripheral cue (the prepotent response) and to generate volitional saccades to the target. If stereotype threat occupies working memory resources, then the ability to inhibit the prepotent response and to launch volitional saccades will be impaired, and performance will suffer. In contrast, S. Harkins's (2006) mere effort account argues that stereotype threat participants are motivated to perform well, which potentiates the prepotent response, but also leads to efforts to counter this tendency if participants recognize that the response is incorrect, know the correct response, and have the opportunity to make it. Results from 4 experiments support the mere effort but not the working memory interference account. PMID:17892331

  9. Linguistic threat activates the human amygdala

    PubMed Central

    Isenberg, N.; Silbersweig, D.; Engelien, A.; Emmerich, S.; Malavade, K.; Beattie, B.; Leon, A. C.; Stern, E.

    1999-01-01

    Studies in animals demonstrate a crucial role for the amygdala in emotional and social behavior, especially as related to fear and aggression. Whereas lesion and functional-imaging studies in humans indicate the amygdala’s participation in assessing the significance of nonverbal as well as paralinguistic cues, direct evidence for its role in the emotional processing of linguistic cues is lacking. In this study, we use a modified Stroop task along with a high-sensitivity neuroimaging technique to target the neural substrate engaged specifically when processing linguistic threat. Healthy volunteer subjects were instructed to name the color of words of either threat or neutral valence, presented in different color fonts, while neural activity was measured by using H215O positron-emission tomography. Bilateral amygdalar activation was significantly greater during color naming of threat words than during color naming of neutral words. Associated activations were also noted in sensory-evaluative and motor-planning areas of the brain. Thus, our results demonstrate the amygdala’s role in the processing of danger elicited by language. In addition, the results reinforce the amygdala’s role in the modulation of the perception of, and response to, emotionally salient stimuli. The current study further suggests conservation of phylogenetically older mechanisms of emotional evaluation in the context of more recently evolved linguistic function. PMID:10468630

  10. Toddlers’ Duration of Attention towards Putative Threat

    PubMed Central

    Kiel, Elizabeth J.; Buss, Kristin A.

    2010-01-01

    Although individual differences in reactions to novelty in the toddler years have been consistently linked to risk for developing anxious behavior, toddlers’ attention towards a novel, putatively threatening stimulus while in the presence of other enjoyable activities has rarely been examined as a precursor to such risk. The current study examined how attention towards an angry-looking gorilla mask in a room with alternative opportunities for play in 24-month-old toddlers predicted social inhibition when children entered kindergarten. Analyses examined attention to threat above and beyond and in interaction with both proximity to the mask and fear of novelty observed in other situations. Attention to threat interacted with proximity to the mask to predict social inhibition, such that attention to threat most strongly predicted social inhibition when toddlers stayed furthest from the mask. This relation occurred above and beyond the predictive relation between fear of novelty and social inhibition. Results are discussed within the broader literature of anxiety development and attentional processes in young children. PMID:21373365

  11. Asymmetric threat data mining and knowledge discovery

    NASA Astrophysics Data System (ADS)

    Gilmore, John F.; Pagels, Michael A.; Palk, Justin

    2001-03-01

    Asymmetric threats differ from the conventional force-on- force military encounters that the Defense Department has historically been trained to engage. Terrorism by its nature is now an operational activity that is neither easily detected or countered as its very existence depends on small covert attacks exploiting the element of surprise. But terrorism does have defined forms, motivations, tactics and organizational structure. Exploiting a terrorism taxonomy provides the opportunity to discover and assess knowledge of terrorist operations. This paper describes the Asymmetric Threat Terrorist Assessment, Countering, and Knowledge (ATTACK) system. ATTACK has been developed to (a) data mine open source intelligence (OSINT) information from web-based newspaper sources, video news web casts, and actual terrorist web sites, (b) evaluate this information against a terrorism taxonomy, (c) exploit country/region specific social, economic, political, and religious knowledge, and (d) discover and predict potential terrorist activities and association links. Details of the asymmetric threat structure and the ATTACK system architecture are presented with results of an actual terrorist data mining and knowledge discovery test case shown.

  12. Stereotype Threat and Feedback Seeking in the Workplace.

    ERIC Educational Resources Information Center

    Roberson, Loriann; Deitch, Elizabeth A.; Brief, Arthur P.; Block, Caryn J.

    2003-01-01

    Among 166 African American managers, those who were the only minority-group member in their workgroup perceived more stereotype threat. Stereotype threat was related to indirect feedback seeking and discounting of supervisors' performance feedback. (Contains 41 references.) (SK)

  13. Introduction to Administrative Programs that Mitigate the Insider Threat

    SciTech Connect

    Gerke, Gretchen K.; Rogers, Erin; Landers, John; DeCastro, Kara

    2012-09-01

    This presentation begins with the reality of the insider threat, then elaborates on these tools to mitigate the insider threat: Human Reliability Program (HRP); Nuclear Security Culture (NSC) Program; Employee Assistance Program (EAP).

  14. 41 CFR 60-741.22 - Direct threat defense.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... INDIVIDUALS WITH DISABILITIES Discrimination Prohibited § 60-741.22 Direct threat defense. The contractor may... individual or others in the workplace. (See § 60-741.2(y) defining direct threat.)...

  15. Zika Threat Calls for Extra Mosquito Protection This Summer

    MedlinePlus

    ... page: https://medlineplus.gov/news/fullstory_159168.html Zika Threat Calls for Extra Mosquito Protection This Summer ... THURSDAY, June 2, 2016 (HealthDay News) -- With the Zika threat growing in the United States, people need ...

  16. 75 FR 60430 - Federal Advisory Committee; Threat Reduction Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-30

    ... technology security, combating weapons of mass destruction (WMD), chemical and biological defense, the future... level briefings on WMD threats, the Defense Threat Reduction Agency, and the status of the...

  17. Assessment of respiratory muscle function and strength.

    PubMed Central

    Syabbalo, N.

    1998-01-01

    Measurement of respiratory muscle strength is useful in order to detect respiratory muscle weakness and to quantify its severity. In patients with severe respiratory muscle weakness, vital capacity is reduced but is a non-specific and relatively insensitive measure. Conventionally, inspiratory and expiratory muscle strength has been assessed by maximal inspiratory and expiratory mouth pressures sustained for 1 s (PImax and PEmax) during maximal static manoeuvre against a closed shutter. However, PImax and PEmax are volitional tests, and are poorly reproducible with an average coefficient of variation of 25%. The sniff manoeuvre is natural and probably easier to perform. Sniff pressure, and sniff transdiaphragmatic pressure are more reproducible and useful measure of diaphragmatic strength. Nevertheless, the sniff manoeuvre is also volition-dependent, and submaximal efforts are most likely to occur in patients who are ill or breathless. Non-volitional tests include measurements of twitch oesophageal, gastric and transdiaphragmatic pressure during bilateral electrical and magnetic phrenic nerve stimulation. Electrical phrenic nerve stimulation is technically difficult and is also uncomfortable and painful. Magnetic phrenic nerve stimulation is less painful and transdiaphragmatic pressure is reproducible in normal subjects. It is a relatively easy test that has the potential to become a widely adopted method for the assessment of diaphragm strength. The development of a technique to measure diaphragmatic sound (phonomyogram) during magnetic phrenic nerve stimulation opens the way for noninvasive assessment of diaphragmatic function. PMID:9683973

  18. Culture, Threat, and Mental Illness Stigma: Identifying Culture-Specific Threat among Chinese-American Groups

    PubMed Central

    Purdie-Vaughns, Valerie; Kotabe, Hiroki; Link, Bruce G.; Saw, Anne; Wong, Gloria; Phelan, Jo C.

    2014-01-01

    We incorporate anthropological insights into a stigma framework to elucidate the role of culture in threat perception and stigma among Chinese groups. Prior work suggests that genetic contamination that jeopardizes the extension of one’s family lineage may comprise a culture-specific threat among Chinese groups. In Study 1, a national survey conducted from 2002–2003 assessed cultural differences in mental illness stigma and perceptions of threat in 56 Chinese-Americans and 589 European-Americans. Study 2 sought to empirically test this culture-specific threat of genetic contamination to lineage via a memory paradigm. Conducted from June to August 2010, 48 Chinese-American and 37 European-American university students in New York City read vignettes containing content referring to lineage or non-lineage concerns. Half the participants in each ethnic group were assigned to a condition in which the illness was likely to be inherited (genetic condition) and the rest read that the illness was unlikely to be inherited (non-genetic condition). Findings from Study 1 and 2 were convergent. In Study 1, culture-specific threat to lineage predicted cultural variation in stigma independently and after accounting for other forms of threat. In Study 2, Chinese-Americans in the genetic condition were more likely to accurately recall and recognize lineage content than the Chinese-Americans in the non-genetic condition, but that memorial pattern was not found for non-lineage content. The identification of this culture-specific threat among Chinese groups has direct implications for culturally-tailored anti-stigma interventions. Further, this framework might be implemented across other conditions and cultural groups to reduce stigma across cultures. PMID:23702210

  19. Flexural strength and porosity of cements

    NASA Astrophysics Data System (ADS)

    Birchall, J. D.; Howard, A. J.; Kendall, K.

    1981-01-01

    A curious feature of hydraulic cements, such as those based on calcium silicate, calcium aluminate and calcium sulphate, is that they exhibit similarly low flexural strengths, typically between 3 and 10 MPa, despite their differing chemical composition, varying degrees of hydration and contrasting setting mechanisms1-3. Because of these low strength values, unreinforced cements are never used in flexure or tension, and studies of cement strength are usually confined to compression. Those few studies which have considered flexural or tensile failure have concluded that hydraulic cements have an intrinsic maximum tensile strength of about 20 MPa4,5. Here we demonstrate that the commonly observed flexural weakness of cement is due to the presence of large voids which are largely undetected by conventional methods of pore analysis such as gas adsorption and mercury porosimetry. The removal of such macro-defects results in flex strengths up to 70 MPa, despite the large volume of gel pores remaining in the material. These strength figures, comparable with those of sintered ceramics, have been achieved without the use of elevated pressures or temperatures, and without fibrous reinforcement.

  20. Making Mountains of Morality From Molehills of Virtue: Threat Causes People to Overestimate Their Moral Credentials.

    PubMed

    Effron, Daniel A

    2014-05-01

    Seven studies demonstrate that threats to moral identity can increase how definitively people think they have previously proven their morality. When White participants were made to worry that their future behavior could seem racist, they overestimated how much a prior decision of theirs would convince an observer of their non-prejudiced character (Studies 1a-3). Ironically, such overestimation made participants appear more prejudiced to observers (Study 4). Studies 5 to 6 demonstrated a similar effect of threat in the domain of charitable giving-an effect driven by individuals for whom maintaining a moral identity is particularly important. Threatened participants only enhanced their beliefs that they had proven their morality when there was at least some supporting evidence, but these beliefs were insensitive to whether the evidence was weak or strong (Study 2). Discussion considers the role of motivated reasoning, and implications for ethical decision making and moral licensing. PMID:24793359

  1. Motivation for aggressive religious radicalization: goal regulation theory and a personality × threat × affordance hypothesis.

    PubMed

    McGregor, Ian; Hayes, Joseph; Prentice, Mike

    2015-01-01

    A new set of hypotheses is presented regarding the cause of aggressive religious radicalization (ARR). It is grounded in classic and contemporary theory of human motivation and goal regulation, together with recent empirical advances in personality, social, and neurophysiological psychology. We specify personality traits, threats, and group affordances that combine to divert normal motivational processes toward ARR. Conducive personality traits are oppositional, anxiety-prone, and identity-weak (i.e., morally bewildered). Conducive threats are those that arise from seemingly insurmountable external forces and frustrate effective goal regulation. Conducive affordances include opportunity for immediate and concrete engagement in active groups that are powered by conspiracy narratives, infused with cosmic significance, encouraging of moral violence, and sealed with religious unfalsifiability. We propose that ARR is rewarding because it can spur approach motivated states that mask vulnerability for people whose dispositions and circumstances would otherwise leave them mired in anxious distress. PMID:26441709

  2. Motivation for aggressive religious radicalization: goal regulation theory and a personality × threat × affordance hypothesis

    PubMed Central

    McGregor, Ian; Hayes, Joseph; Prentice, Mike

    2015-01-01

    A new set of hypotheses is presented regarding the cause of aggressive religious radicalization (ARR). It is grounded in classic and contemporary theory of human motivation and goal regulation, together with recent empirical advances in personality, social, and neurophysiological psychology. We specify personality traits, threats, and group affordances that combine to divert normal motivational processes toward ARR. Conducive personality traits are oppositional, anxiety-prone, and identity-weak (i.e., morally bewildered). Conducive threats are those that arise from seemingly insurmountable external forces and frustrate effective goal regulation. Conducive affordances include opportunity for immediate and concrete engagement in active groups that are powered by conspiracy narratives, infused with cosmic significance, encouraging of moral violence, and sealed with religious unfalsifiability. We propose that ARR is rewarding because it can spur approach motivated states that mask vulnerability for people whose dispositions and circumstances would otherwise leave them mired in anxious distress. PMID:26441709

  3. Space Station crew safety alternatives study. Volume 2: Threat development

    NASA Technical Reports Server (NTRS)

    Raasch, R. F.; Peercy, R. L., Jr.; Rockoff, L. A.

    1985-01-01

    The first 15 years of accumulated space station concepts for initial operational capability (IOC) during the early 1990's were considered. Twenty-five threats to the space station are identified and selected threats addressed as impacting safety criteria, escape and rescue, and human factors safety concerns. Of the 25 threats identified, eight are discussed including strategy options for threat control: fire, biological or toxic contamination, injury/illness, explosion, loss of pressurization, radiation, meteoroid penetration, and debris.

  4. Soil threats in Europe for the RECARE project

    NASA Astrophysics Data System (ADS)

    Stolte, Jannes; Tesfai, Mehretaeb; Oygarden, Lillian

    2015-04-01

    Soil is one of our most important natural resources that provides us with vital goods and services to sustain life. Nevertheless, soils functions are threatened by a wide range of processes and a number of soil threats have been identified in Europe. Although there is a large body of knowledge available on soil threats in Europe, the complexity and functioning of soil systems and their interaction with human activities, climate change, and ecosystem services (ESS), is still not fully understood. An extensive literature review was carried out by a group of experts on soil threats at the European level. In total, around 60 experts from the 17 case study sites of the RECARE project, were involved in the process of reviewing and drafting the report and 11 soil threats were identified. The objective of WP2 of the RECARE project was to provide an improved overview of existing information on soil threats and degradation at the European scale. These soil threats are soil erosion by water, soil erosion by wind, decline of organic matter (OM) in peat, decline of OM in minerals soils, soil compaction, soil sealing, soil contamination, soil salinization, desertification, flooding and landslides and decline in soil biodiversity. The final report of WP2 provides a comprehensive thematic information on the major soil threats of Europe with due attention given to the Driving force-Pressure-State-Impact-Response to soil threats. Interrelationships between soil threats, between soil threats and soil functions and between soil threats and Ecosystems Services are made, and will be presented. A synergy between the soil threats is made based on the given information in each of the chapters, where we tried to identify the interactions between the threats. We tried to identify in what way one threat acts as a threat for another threat. Also, the link between soil degradation and Ecosystem Services are identified. Again, based on the information given in each chapter, the major climate

  5. Preoperative indicators of motion loss and weakness following anterior cruciate ligament reconstruction.

    PubMed

    McHugh, M P; Tyler, T F; Gleim, G W; Nicholas, S J

    1998-06-01

    Loss of motion and knee extension weakness are recognized as significant complications following anterior cruciate ligament (ACL) reconstruction. The purpose of this study was to determine 1) what degree of preoperative motion loss represents a risk for postoperative motion problems and 2) if preoperative weakness (deficit > or = 20%) affects return of strength following surgery. Measurements of range of motion and strength were made on 102 patients (56 men, 46 women; age = 31 +/- 1 years) within 2 weeks prior to ACL reconstruction (preop) and repeated 6 months following surgery (postop). Thirteen of 40 patients (33%) lacking > or = 5 degrees preop, eight of 20 patients (40%) lacking 1-4 degrees preop, and three of 42 (7%) patients with full extension preop had > or = 5 degrees loss 6 months postop (p < 0.001). Thirty-two of 39 (82%) patients with normal strength preop had weakness 6 months postop. Forty of 51 (78%) patients with preop knee extension weakness still had weakness 6 months postop. Preop strength was not a good predictor of residual weakness following ACL reconstruction. The magnitude of the preop extension loss appears not to be a risk factor. It is the presence or absence of full extension equal to the contralateral leg that identifies risk for postop problems regaining extension. PMID:9617726

  6. Strength Training and Your Child

    MedlinePlus

    ... Story" 5 Things to Know About Zika & Pregnancy Strength Training and Your Child KidsHealth > For Parents > Strength Training ... help prevent injuries and speed up recovery. About Strength Training Strength training is the practice of using free ...

  7. 49 CFR 1546.301 - Bomb or air piracy threats.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless the... carrier ensures that the pilot in command is advised immediately to take the emergency action...

  8. Gender, Stereotype Threat, and Anxiety: Psychophysiological and Cognitive Evidence

    ERIC Educational Resources Information Center

    Osborne, Jason W.

    2006-01-01

    Introduction: Claude Steele's stereotype threat hypothesis proposed that negative group stereotypes increase individual anxiety levels, hurting performance. However, the role of anxiety in stereotype threat has not been fully explored. This study examined the hypothesis that experimental manipulation of stereotype threat would influence real-time…

  9. 41 CFR 60-250.22 - Direct threat defense.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Direct threat defense. 60... VETERANS Discrimination Prohibited § 60-250.22 Direct threat defense. The contractor may use as a... position held or desired without posing a direct threat to the health or safety of the individual or...

  10. 75 FR 30002 - Federal Advisory Committee; Threat Reduction Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-28

    ... Office of the Secretary Federal Advisory Committee; Threat Reduction Advisory Committee AGENCY... the charter for the Threat Reduction Advisory Committee (hereafter referred to as the Committee). FOR... Acquisition, Technology and Logistics and the Director of the Defense Threat Reduction Agency on the...

  11. 41 CFR 60-300.22 - Direct threat defense.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Direct threat defense. 60... VETERANS Discrimination Prohibited § 60-300.22 Direct threat defense. The contractor may use as a... position held or desired without posing a direct threat to the health or safety of the individual or...

  12. Attention Training and the Threat Bias: An ERP Study

    ERIC Educational Resources Information Center

    O'Toole, Laura; Dennis, Tracy A.

    2012-01-01

    Anxiety is characterized by exaggerated attention to threat. Several studies suggest that this threat bias plays a causal role in the development and maintenance of anxiety disorders. Furthermore, although the threat bias can be reduced in anxious individuals and induced in non-anxious individual, the attentional mechanisms underlying these…

  13. Unleashing Latent Ability: Implications of Stereotype Threat for College Admissions

    ERIC Educational Resources Information Center

    Logel, Christine R.; Walton, Gregory M.; Spencer, Steven J.; Peach, Jennifer; Mark, Zanna P.

    2012-01-01

    Social-psychological research conducted over the past 15 years provides compelling evidence that pervasive psychological threats are present in common academic environments--especially threats that originate in negative intellectual stereotypes--and that these threats undermine the real-world academic performance of non-Asian ethnic minority…

  14. 49 CFR 1540.205 - Procedures for security threat assessment.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... TSA determines that the applicant meets the security threat assessment standards in 49 CFR 1540.201(c... the applicant does not meet the security threat assessment standards in 49 CFR 1540.201(c). The... standards in 49 CFR 1540.201(c) and may pose an imminent threat to transportation or national security,...

  15. 49 CFR 1540.205 - Procedures for security threat assessment.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... TSA determines that the applicant meets the security threat assessment standards in 49 CFR 1540.201(c... the applicant does not meet the security threat assessment standards in 49 CFR 1540.201(c). The... standards in 49 CFR 1540.201(c) and may pose an imminent threat to transportation or national security,...

  16. 49 CFR 1540.205 - Procedures for security threat assessment.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... TSA determines that the applicant meets the security threat assessment standards in 49 CFR 1540.201(c... the applicant does not meet the security threat assessment standards in 49 CFR 1540.201(c). The... standards in 49 CFR 1540.201(c) and may pose an imminent threat to transportation or national security,...

  17. 49 CFR 1540.205 - Procedures for security threat assessment.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... TSA determines that the applicant meets the security threat assessment standards in 49 CFR 1540.201(c... the applicant does not meet the security threat assessment standards in 49 CFR 1540.201(c). The... standards in 49 CFR 1540.201(c) and may pose an imminent threat to transportation or national security,...

  18. 49 CFR 1540.205 - Procedures for security threat assessment.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... TSA determines that the applicant meets the security threat assessment standards in 49 CFR 1540.201(c... the applicant does not meet the security threat assessment standards in 49 CFR 1540.201(c). The... standards in 49 CFR 1540.201(c) and may pose an imminent threat to transportation or national security,...

  19. Student Reports of Peer Threats of Violence: Prevalence and Outcomes

    ERIC Educational Resources Information Center

    Nekvasil, Erin K.; Cornell, Dewey G.

    2012-01-01

    Authorities in education and law enforcement have recommended that schools use a threat-assessment approach to prevent violence, but there is relatively little research on characteristics and outcomes of threats among students. The current study examined student reports of threat experiences in a sample of 3,756 high school students. Approximately…

  20. Death Threat and Death Concerns in the College Student.

    ERIC Educational Resources Information Center

    Tobacyk, Jerome; Eckstein, Daniel

    1980-01-01

    Thanatology students reported significantly lesser death threat and significantly greater death concerns. Trait anxiety was found to be a significant predictor of change in death threat in the Thanatology Group, with lesser anxiety associated with greater decline in death threat. (Author)

  1. Isolating Neural Components of Threat Bias in Pediatric Anxiety

    ERIC Educational Resources Information Center

    Britton, Jennifer C.; Bar-Haim, Yair; Carver, Frederick W.; Holroyd, Tom; Norcross, Maxine A.; Detloff, Allison; Leibenluft, Ellen; Ernst, Monique; Pine, Daniel S.

    2012-01-01

    Background: Attention biases toward threat are often detected in individuals with anxiety disorders. Threat biases can be measured experimentally through dot-probe paradigms, in which individuals detect a probe following a stimulus pair including a threat. On these tasks, individuals with anxiety tend to detect probes that occur in a location…

  2. Post-quantum attacks on key distribution schemes in the presence of weakly stochastic sources

    NASA Astrophysics Data System (ADS)

    Al–Safi, S. W.; Wilmott, C. M.

    2015-09-01

    It has been established that the security of quantum key distribution protocols can be severely compromised were one to permit an eavesdropper to possess a very limited knowledge of the random sources used between the communicating parties. While such knowledge should always be expected in realistic experimental conditions, the result itself opened a new line of research to fully account for real-world weak randomness threats to quantum cryptography. Here we expand of this novel idea by describing a key distribution scheme that is provably secure against general attacks by a post-quantum adversary. We then discuss possible security consequences for such schemes under the assumption of weak randomness.

  3. Technical approaches to reducing the threat of nuclear terrorism

    NASA Astrophysics Data System (ADS)

    Priedhorsky, William C.

    2005-04-01

    The threat of a nuclear attack on the United States by terrorists using a smuggled weapon is now considered more likely than an attack by a nuclear-armed ballistic missle. Consequently it is important to understand what can be done to detect and intercept a nuclear weapon being smuggled into the United States. A significant quantity of smuggled nuclear material has been intercepted already, but science and technology have so far contributed little to its interception. The critical special nuclear materials, plutonium and highly enriched uranium, are only weakly radioactive and detection of their radioactivity is limited both by atmospheric attenuation and by competition with natural backgrounds. Although many schemes for long-range detection of radioactivity have been proposed, none so far appears feasible. Detection of nuclear radiation can be improved using new technologies and sensing systems, but it will still be possible only at relatively small distances. Consequently the best approach to containing dangerous nuclear materials is at their sources; containment within lengthy borders and large areas is extremely difficult.

  4. Social identity threat motivates science-discrediting online comments.

    PubMed

    Nauroth, Peter; Gollwitzer, Mario; Bender, Jens; Rothmund, Tobias

    2015-01-01

    Experiencing social identity threat from scientific findings can lead people to cognitively devalue the respective findings. Three studies examined whether potentially threatening scientific findings motivate group members to take action against the respective findings by publicly discrediting them on the Web. Results show that strongly (vs. weakly) identified group members (i.e., people who identified as "gamers") were particularly likely to discredit social identity threatening findings publicly (i.e., studies that found an effect of playing violent video games on aggression). A content analytical evaluation of online comments revealed that social identification specifically predicted critiques of the methodology employed in potentially threatening, but not in non-threatening research (Study 2). Furthermore, when participants were collectively (vs. self-) affirmed, identification did no longer predict discrediting posting behavior (Study 3). These findings contribute to the understanding of the formation of online collective action and add to the burgeoning literature on the question why certain scientific findings sometimes face a broad public opposition. PMID:25646725

  5. Social Identity Threat Motivates Science-Discrediting Online Comments

    PubMed Central

    Nauroth, Peter; Gollwitzer, Mario; Bender, Jens; Rothmund, Tobias

    2015-01-01

    Experiencing social identity threat from scientific findings can lead people to cognitively devalue the respective findings. Three studies examined whether potentially threatening scientific findings motivate group members to take action against the respective findings by publicly discrediting them on the Web. Results show that strongly (vs. weakly) identified group members (i.e., people who identified as “gamers”) were particularly likely to discredit social identity threatening findings publicly (i.e., studies that found an effect of playing violent video games on aggression). A content analytical evaluation of online comments revealed that social identification specifically predicted critiques of the methodology employed in potentially threatening, but not in non-threatening research (Study 2). Furthermore, when participants were collectively (vs. self-) affirmed, identification did no longer predict discrediting posting behavior (Study 3). These findings contribute to the understanding of the formation of online collective action and add to the burgeoning literature on the question why certain scientific findings sometimes face a broad public opposition. PMID:25646725

  6. Assessing the threat of firearms: new threat formula, resources, and ontological linking algorithms

    NASA Astrophysics Data System (ADS)

    Hempelmann, Christian F.; Arslan, Abdullah N.; Attardo, Salvatore; Blount, Grady P.; Sirakov, Nikolay Metodiev

    2014-06-01

    The present work is part of an ongoing larger project.2, 3, 11, 12 The goal of this project is to develop a system capable of automatic threat assessment for instances of firearms use in public places. The main components of the system are: an ontology of firearms;1, 14 algorithms to create the visual footprint of the firearms,1, 14 to compare visual information,2, 3, 11, 12 to facilitate search in the ontology, and to generate the links between the conceptual and visual ontologies; as well as a formula to calculate the threat of individual firearms, firearms classes, and ammunition types in different environments. One part of the dual-level ontology for the properties of the firearms captures key visual features used to identify their type or class in images, while the other part captures their threat-relevant conceptual properties. The visual ontology is the result of image segmentation and matching methods, while the conceptual ontology is designed using knowledge-engineering principles and populated semi-automatically from Web resources. The focus of the present paper is two-fold. On the one hand, we will report on an update of the initial threat formula, based on the substantially increased population of the firearm ontology, including ammunition types and comparisons to actual incidents, and allowing for an overall more accurate assessment. On the other hand, the linking algorithms between the visual and conceptual ontologies are elaborated for faster transfer of information leading to an improvement in accuracy of the threat assessment.

  7. Recognizing Neglected Strengths

    ERIC Educational Resources Information Center

    Sternberg, Robert J.

    2006-01-01

    To identify diverse student strengths and to learn how teachers can build instruction on those strengths, the author and his colleagues have conducted multiple studies among students in Alaska, the mainland United States, Kenya, and other countries. In a series of studies in Alaska and Kenya, the researchers measured the adaptive cultural…

  8. Competing weak localization and weak antilocalization in ultrathin topological insulators

    NASA Astrophysics Data System (ADS)

    Lang, Murong; He, Liang; Kou, Xufeng; Upadhyaya, Pramey; Fan, Yabin; Chu, Hao; Yeh, Nai-Chang; Wang, Kang

    2013-03-01

    We demonstrate the evidences of a surface gap opening in (Bi0.57Sb0.43)2 Te3 samples for film thickness below 6 quintuple layers, through magnetotransport and scanning tunneling spectroscopy measurements. By tuning Fermi level position relative to the gap, the striking crossover between weak antilocalization and weak localization is observed in nonmagnetic 4 and 5 QL films at low field region, a characteristic feature of quantum interferences competition, possibly owing to the change of net Berry phase. Furthermore, when the Fermi level is swept into the surface gap, the overall unitary behaviors are revealed at higher magnetic field, which are in contrast to the pure WAL signals obtained in thicker films. Besides, the surface bandgap of ultrathin film is also determined by low temperature STS measurements. Our findings show an exotic phenomenon characterizing the gapped TI surface states and point to the future realization of quantum spin Hall effect and dissipationless TI-based applications. This work was in part supported by Defense Advanced Research Projects Agency (DARPA), Focus Center Research Program-Center on Functional Engineered Nano Architectonics (FENA).

  9. Relaxion monodromy and the Weak Gravity Conjecture

    NASA Astrophysics Data System (ADS)

    Ibáñez, L. E.; Montero, M.; Uranga, A. M.; Valenzuela, I.

    2016-04-01

    The recently proposed relaxion models require extremely large trans-Planckian axion excursions as well as a potential explicitly violating the axion shift symmetry. The latter property is however inconsistent with the axion periodicity, which corresponds to a gauged discrete shift symmetry. A way to make things consistent is to use monodromy, i.e. both the axion and the potential parameters transform under the discrete shift symmetry. The structure is better described in terms of a 3-form field C μνρ coupling to the SM Higgs through its field strength F 4. The 4-form also couples linearly to the relaxion, in the Kaloper-Sorbo fashion. The extremely small relaxion-Higgs coupling arises in a see-saw fashion as g ≃ F 4 /f , with f being the axion decay constant. We discuss constraints on this type of constructions from membrane nucleation and the Weak Gravity Conjecture. The latter requires the existence of membranes, whose too fast nucleation could in principle drive the theory out of control, unless the cut-off scale is lowered. This allows to rule out the simplest models with the QCD axion as relaxion candidate on purely theoretical grounds. We also discuss possible avenues to embed this structure into string theory.

  10. Constraints on neutrino masses from weak lensing

    SciTech Connect

    Ichiki, Kiyotomo; Takada, Masahiro; Takahashi, Tomo

    2009-01-15

    Weak lensing (WL) distortions of distant galaxy images are sensitive to neutrino masses by probing the suppression effect on clustering strengths of total matter in large-scale structure. We use the latest measurements of WL correlations, the Canada-France-Hawaii Telescope Legacy Survey data, to explore constraints on neutrino masses. We find that, while the WL data alone cannot place a stringent limit on neutrino masses due to parameter degeneracies, the constraint can be significantly improved when combined with other cosmological probes, such as the WMAP 5-year data (WMAP5) and the distance measurements of type-Ia supernovae (SNe) and baryon acoustic oscillations (BAO). The upper bounds on the sum of neutrino masses are , 0.76, and 0.54 eV (95% CL) for WL+WMAP5, WMAP5+SNe+BAO, and WL+WMAP5+SNe+BAO, respectively, assuming a flat {lambda}CDM model with finite-mass neutrinos. In deriving these constraints, our analysis includes the non-Gaussian covariances of the WL correlation functions to properly take into account significant correlations between different angles.

  11. Using SWOT Analysis for Promoting the Accounting Program.

    ERIC Educational Resources Information Center

    Sawyer, Joe E.

    2001-01-01

    Describes how SWOT (strengths, weaknesses, opportunities, threats) analysis can be used by business educators to find the best match between environmental trends (opportunities and threats) and internal departmental capabilities (strengths and weaknesses). An example from accounting education is provided. (JOW)

  12. Weak lensing by galaxy troughs

    NASA Astrophysics Data System (ADS)

    Gruen, Daniel

    2016-06-01

    Galaxy troughs, i.e. underdensities in the projected galaxy field, are a weak lensing probe of the low density Universe with high signal-to-noise ratio. I present measurements of the radial distortion of background galaxy images and the de-magnification of the CMB by troughs constructed from Dark Energy Survey and Sloan Digital Sky Survey galaxy catalogs. With high statistical significance and a relatively robust modeling, these probe gravity in regimes of density and scale difficult to access for conventional statistics.

  13. Detecting weakly interacting massive particles.

    NASA Astrophysics Data System (ADS)

    Drukier, A. K.; Gelmini, G. B.

    The growing synergy between astrophysics, particle physics, and low background experiments strengthens the possibility of detecting astrophysical non-baryonic matter. The idea of direct detection is that an incident, massive weakly interacting particle could collide with a nucleus and transfer an energy that could be measured. The present low levels of background achieved by the PNL/USC Ge detector represent a new technology which yields interesting bounds on Galactic cold dark matter and on light bosons emitted from the Sun. Further improvements require the development of cryogenic detectors. The authors analyse the practicality of such detectors, their optimalization and background suppression using the "annual modulation effect".

  14. Tagged-weak {pi} method

    SciTech Connect

    Margaryan, A.; Hashimoto, O.; Kakoyan, V.; Knyazyan, S.; Tang, L.

    2011-02-15

    A new 'tagged-weak {pi} method' is proposed for determination of electromagnetic transition probabilities B(E2) and B(M1) of the hypernuclear states with lifetimes of {approx}10{sup -10} s. With this method, we are planning to measure B(E2) and B(M1) for light hypernuclei at JLab. The results of Monte Carlo simulations for the case of E2(5/2{sup +}, 3/2{sup +} {yields} 1/2{sup +}) transitions in {sub {Lambda}}{sup 7}He hypernuclei are presented.

  15. Weak quasielastic production of hyperons

    SciTech Connect

    Singh, S. K.; Vacas, M. J. Vicente

    2006-09-01

    The quasielastic weak production of {lambda} and {sigma} hyperons from nucleons and nuclei induced by antineutrinos is studied in the energy region of some ongoing neutrino oscillation experiments in the intermediate energy region. The hyperon-nucleon transition form factors determined from neutrino-nucleon scattering and an analysis of high precision data on semileptonic decays of neutron and hyperons using SU(3) symmetry have been used. The nuclear effects due to Fermi motion and final state interaction effects due to hyperon-nucleon scattering have also been studied. The numerical results for differential and total cross sections have been presented.

  16. Electromagnetic weak turbulence theory revisited

    SciTech Connect

    Yoon, P. H.; Ziebell, L. F.; Gaelzer, R.; Pavan, J.

    2012-10-15

    The statistical mechanical reformulation of weak turbulence theory for unmagnetized plasmas including fully electromagnetic effects was carried out by Yoon [Phys. Plasmas 13, 022302 (2006)]. However, the wave kinetic equation for the transverse wave ignores the nonlinear three-wave interaction that involves two transverse waves and a Langmuir wave, the incoherent analogue of the so-called Raman scattering process, which may account for the third and higher-harmonic plasma emissions. The present paper extends the previous formalism by including such a term.

  17. Threat in Context: School Moderation of the Impact of Social Identity Threat on Racial/Ethnic Achievement Gaps

    ERIC Educational Resources Information Center

    Hanselman, Paul; Bruch, Sarah K.; Gamoran, Adam; Borman, Geoffrey D.

    2014-01-01

    Schools with very few and relatively low-performing marginalized students may be most likely to trigger social identity threats (including stereotype threats) that contribute to racial disparities. We test this hypothesis by assessing variation in the benefits of a self-affirmation intervention designed to counteract social identity threat in a…

  18. The DANGERTOME Personal Risk Threat Assessment Scale: An Instrument to Help Aid Immediate Threat Assessment for Counselors, Faculty, and Teachers

    ERIC Educational Resources Information Center

    Juhnke, Gerald A.

    2010-01-01

    Threats of violence are not uncommon to counselors, faculty, or teachers. Each must be taken seriously, quickly analyzed, and safety procedures implemented. Yet, there exists a paucity of brief, face-to-face, assessments designed to aid threat assessment. To address this paucity, the author created The DANGERTOME Personal Risk Threat Assessment…

  19. Cooperative Threat Reduction: Cooperation Threat Reduction Program Liquid Propellant Disposition Project

    NASA Astrophysics Data System (ADS)

    2002-09-01

    This audit is one in a series of audits the Deputy Secretary of Defense requested. As part of the Cooperative Threat Reduction (CTR) Program, DoD agreed to assist the Russian Federation in disposing of its liquid rocket propellant. Public Law 102-228 (section 2551 NOTE, title 22, United States Code), the Soviet Nuclear Threat Reduction Act of 1991 designates DoD as the executive agent for the CTR Program. Specific objectives of the act are to destroy chemical, nuclear, and other weapons; transport, store, disable, and safeguard weapons in connection with their destruction; and establish verifiable safeguards against proliferation of weapons of mass destruction. The Office of the Assistant Secretary of Defense (International Security Policy), under the Office of the Under Secretary of Defense for Policy, develops, coordinates, and oversees implementation of policy for the CTR Program. The CTR Directorate, Defense Threat Reduction Agency operates the program.

  20. Strengths of serpentinite gouges at elevated temperatures

    USGS Publications Warehouse

    Moore, Diane E.; Lockner, D.A.; Ma, S.; Summers, R.; Byerlee, J.D.

    1997-01-01

    Serpentinite has been proposed as a cause of both low strength and aseismic creep of fault zones. To test these hypotheses, we have measured the strength of chrysotile-, lizardite-, and antigorite-rich serpentinite gouges under hydrothermal conditions, with emphasis on chrysotile, which has thus far received little attention. At 25??C, the coefficient of friction, ??, of chrysotile gouge is roughly 0.2, whereas the lizardite- and antigorite-rich gouges are at least twice as strong. The very low room temperature strength of chrysotile is a consequence of its unusually high adsorbed water content. When the adsorbed water is removed, chrysotile is as strong as pure antigorite gouge at room temperature. Heating to ???200??C causes the frictional strengths of all three gouges to increase. Limited data suggest that different polytypes of a given serpentine mineral have similar strengths; thus deformation-induced changes in polytype should not affect fault strength. At 25??C, the chrysotile gouge has a transition from velocity strengthening at low velocities to velocity weakening at high velocities, consistent with previous studies. At temperatures up to ???200??C, however, chrysotile strength is essentially independent of velocity at low velocities. Overall, chrysotile has a restricted range of velocity-strengthening behavior that migrates to higher velocities with increasing temperature. Less information on velocity dependence is available for the lizardite and antigorite gouges, but their behavior is consistent with that outlined for chrysotile. The marked changes in velocity dependence and strength of chrysotile with heating underscore the hazards of using room temperature data to predict fault behavior at depth. The velocity behavior at elevated temperatures does not rule out serpentinite as a cause of aseismic slip, but in the presence of a hydrostatic fluid pressure gradient, all varieties of serpentine are too strong to explain the apparent weakness of faults such

  1. Protection without detection: a threat mitigation technique

    NASA Astrophysics Data System (ADS)

    White, Joshua; McCoy, Joseph R.; Ratazzi, Paul

    2012-05-01

    Networking systems and individual applications have traditionally been defended using signature-based tools that protect the perimeter, many times to the detriment of service, performance, and information flow. These tools require knowledge of both the system on which they run and the attack they are preventing. As such, by their very definition, they only account for what is known to be malicious and ignore the unknown. The unknown, or zero day threat, can occur when defenses have yet to be immunized via a signature or other identifier of the threat. In environments where execution of the mission is paramount, the networks and applications must perform their function of information delivery without endangering the enterprise or losing the salient information, even when facing zero day threats. In this paper we, describe a new defensive strategy that provides a means to more deliberately balance the oft mutually exclusive aspects of protection and availability. We call this new strategy Protection without Detection, since it focuses on network protection without sacrificing information availability. The current instantiation analyzes the data stream in real time as it passes through an in-line device. Critical files are recognized, and mission-specific trusted templates are applied as they are forwarded to their destination. The end result is a system which eliminates the opportunity for propagation of malicious or unnecessary payloads via the various containers that are inherent in the definition of standard file types. In some cases, this method sacrifices features or functionality that is typically inherent in these files. However, with the flexibility of the template approach, inclusion or exclusion of these features becomes a deliberate choice of the mission owners, based on their needs and amount of acceptable risk. The paper concludes with a discussion of future extensions and applications.

  2. Sustaining earth: Response to the environmental threats

    SciTech Connect

    Angell, D.J.R.; Comer, J.D.; Wilkinson, M.L.N.

    1993-01-01

    This collection of 17 essays has a common theme of examining how politicians, industrialists, scientists, and the public are responding to the recommendations of the 1987 report by World Commission on Environment and Development and to the environmental degradation it highlighted. The book has six sections: background; threats to the environment; individuals, society, and sustainable development; national governments and sustainable development; the international community and sustainable development; conclusions. Insights into the ways in which members of the international political and scientific establishments define and seek to address global environments are best represented.

  3. Lyssaviruses and Bats: Emergence and Zoonotic Threat

    PubMed Central

    Banyard, Ashley C.; Evans, Jennifer S.; Luo, Ting Rong; Fooks, Anthony R.

    2014-01-01

    The continued detection of zoonotic viral infections in bats has led to the microbial fauna of these mammals being studied at a greater level than ever before. Whilst numerous pathogens have been discovered in bat species, infection with lyssaviruses is of particular significance from a zoonotic perspective as, where human infection has been reported, it is invariably fatal. Here we review the detection of lyssaviruses within different bat species and overview what is understood regarding their maintenance and transmission following both experimental and natural infection. We discuss the relevance of these pathogens as zoonotic agents and the threat of newly discovered viruses to human populations. PMID:25093425

  4. The threat of nuclear war: Some responses

    PubMed Central

    Marcattilio, A. J. M.; Nevin, John A.

    1986-01-01

    The possibility of nuclear holocaust threatens the very existence of the world community. Biologists, earth scientists, educators, lawyers, philosophers, physicists, physicians, and social scientists have addressed the problem from their special perspectives, and have had substantial impact on the public. Behavior analysts, however, have not as a whole contributed a great deal to the goal of preventing nuclear catastrophe. We argue that the threat of nuclear war is primarily a behavioral problem, and present an analysis of that problem. In addition, we address the difficulty of implementing behavioral interventions that would contribute to the survival of the World. PMID:22478648

  5. Assessing the global threat from Zika virus.

    PubMed

    Lessler, Justin; Chaisson, Lelia H; Kucirka, Lauren M; Bi, Qifang; Grantz, Kyra; Salje, Henrik; Carcelen, Andrea C; Ott, Cassandra T; Sheffield, Jeanne S; Ferguson, Neil M; Cummings, Derek A T; Metcalf, C Jessica E; Rodriguez-Barraquer, Isabel

    2016-08-12

    First discovered in 1947, Zika virus (ZIKV) infection remained a little-known tropical disease until 2015, when its apparent association with a considerable increase in the incidence of microcephaly in Brazil raised alarms worldwide. There is limited information on the key factors that determine the extent of the global threat from ZIKV infection and resulting complications. Here, we review what is known about the epidemiology, natural history, and public health effects of ZIKV infection, the empirical basis for this knowledge, and the critical knowledge gaps that need to be filled. PMID:27417495

  6. Acoustic and optical multi-sensor threat detection system for border patrol against aerial threats

    NASA Astrophysics Data System (ADS)

    Alsawadi, Motasem S.; Ismail, Ahmad; Al-Azem, Badeea F.; El-Desouki, Munir M.; Alghamdi, Sultan; Alghamdi, Mansour

    2012-10-01

    Saudi Arabia has borders covering over 4,300 km that are shared with seven countries. Such large borders pose many challenges for security and patrol. Thermal imagers are considered the most reliable means of threat detection, however, they are quite costly, which can prevent using them over large areas. This work discusses a multi-sensor acoustic and optical implementation for threat detection as an effort to reduce system cost. The acoustic sensor provides position and direction recognition by using a four microphone setup. The data analysis of field tests will be discussed in this work.

  7. Charge on a weak polyelectrolyte

    NASA Astrophysics Data System (ADS)

    Wang, Shengqin; Granick, Steve; Zhao, Jiang

    2008-12-01

    Fluorescence measurements with single-molecule sensitivity are used to measure the hydrodynamic size and local pH of a weak polyelectrolyte, poly-2-vinyl pyridine end labeled with pH-sensitive dye, the polyelectrolyte having concentration so low (nanomolars) that molecular properties are resolvable only from fluorescence experiments and cannot be accessed by light scattering. We find that the local pH near the dye, inferred from its brightness, is consistently three orders of magnitude higher than the bulk pH. Upon varying the bulk pH, we measure the collapse point at which hydrophobic attraction overwhelms electrostatic repulsion between charged elements along the chain, and conclude that adding monovalent salt shifts this coil-to-globule collapse to higher pH than in the absence of salt. The influence of salt appears to shift the ionization equilibrium of this weak polyelectrolyte in the direction of the chain possessing enhanced electric charge at a given pH. Phenomenologically, this is opposite to the case for strong polyelectrolytes, although the mechanism differs.

  8. Weak lensing and cosmological investigation

    NASA Astrophysics Data System (ADS)

    Acquaviva, Viviana

    2005-03-01

    In the last few years the scientific community has been dealing with the challenging issue of identifying the dark energy component. We regard weak gravitational lensing as a brand new, and extremely important, tool for cosmological investigation in this field. In fact, the features imprinted on the Cosmic Microwave Background radiation by the lensing from the intervening distribution of matter represent a pretty unbiased estimator, and can thus be used for putting constraints on different dark energy models. This is true in particular for the magnetic-type B-modes of CMB polarization, whose unlensed spectrum at large multipoles (l ~= 1000) is very small even in presence of an amount of gravitational waves as large as currently allowed by the experiments: therefore, on these scales the lensing phenomenon is the only responsible for the observed power, and this signal turns out to be a faithful tracer of the dark energy dynamics. We first recall the formal apparatus of the weak lensing in extended theories of gravity, introducing the physical observables suitable to cast the bridge between lensing and cosmology, and then evaluate the amplitude of the expected effect in the particular case of a Non-Minimally-Coupled model, featuring a quadratic coupling between quintessence and Ricci scalar.

  9. The weak scale from BBN

    NASA Astrophysics Data System (ADS)

    Hall, Lawrence J.; Pinner, David; Ruderman, Joshua T.

    2014-12-01

    The measured values of the weak scale, v, and the first generation masses, m u, d, e , are simultaneously explained in the multiverse, with all these parameters scanning independently. At the same time, several remarkable coincidences are understood. Small variations in these parameters away from their measured values lead to the instability of hydrogen, the instability of heavy nuclei, and either a hydrogen or a helium dominated universe from Big Bang Nucleosynthesis. In the 4d parameter space of ( m u , m d , m e , v), catastrophic boundaries are reached by separately increasing each parameter above its measured value by a factor of (1.4, 1.3, 2.5, ˜ 5), respectively. The fine-tuning problem of the weak scale in the Standard Model is solved: as v is increased beyond the observed value, it is impossible to maintain a significant cosmological hydrogen abundance for any values of m u, d, e that yield both hydrogen and heavy nuclei stability.

  10. Weak antilocalisation in topological insulators

    NASA Astrophysics Data System (ADS)

    Bi, Xintao; Hankiewicz, Ewelina; Culcer, Dimitrie

    2014-03-01

    Topological insulators (TI) have changed our understanding of insulating behaviour. They are insulators in the bulk but conducting along their surfaces due to spin-orbit interaction. Much of the recent research focuses on overcoming the transport bottleneck, the fact that surface state transport is overwhelmed by bulk transport stemming from unintentional doping. The key to overcoming this bottleneck is identifying unambiguous signatures of surface state transport. This talk will discuss one such signature, which is manifest in the coherent backscattering of electrons. Due to strong spin-orbit coupling in TI one expects to observe weak antilocalisation rather than weak localisation, meaning that coherent backscattering increases the electrical conductivity. The features of this effect, however, are rather subtle, because in TI the impurities have strong spin-orbit coupling as well. I will show that spin-orbit coupled impurities introduce an additional time scale, which is expected to be shorter than the dephasing time, and the resulting conductivity has a logarithmic dependence on the carrier density, a behaviour hitherto unknown in 2D electron systems. The result we predict is observable experimentally and would provide a smoking gun test of surface transport.

  11. Weak measurement and quantum steering of spin qubits in silicon

    NASA Astrophysics Data System (ADS)

    Morello, Andrea; Muhonen, Juha; Simmons, Stephanie; Freer, Solomon; Dehollain, Juan; McCallum, Jeffrey; Jamieson, David; Itoh, Kohei; Dzurak, Andrew

    Single-shot, projective measurements have been demonstrated with very high fidelities on both the electron and the nuclear spin of single implanted phosphorus (31P) donors in silicon. Here we present a series of experiments where the measurement strength is continousuly reduced, giving access to the regime of weak measurement of single spins.For the electron qubit, the measurement strength is set by the measurement time compared to the spin-dependent tunneling time between the 31P donor and a charge reservoir. For the nuclear qubit, the measurement strength is set by the rotation angle of an ESR pulse.We have demonstrated quantum steering of the spin states, with curious and useful applications. We can improve the fidelity of electron qubit initialization by steering it towards the ground state, thus bypassing thermal effects on the initialization process. We can also accurately measure the electron-reservoir tunnel coupling, without the electron ever tunneling away from the 31P atom. Finally, these techniques allow the study of weak values and Leggett-Garg inequalities. Present address: AMOLF, Amsterdam, The Netherlands.

  12. Ignoring real faces: effects of valence, threat, and salience.

    PubMed

    Blagrove, Elisabeth; Watson, Derrick G

    2014-04-01

    Facial stimuli have been shown to accrue a special status within visual processing, particularly when attention is prioritized to one face over another on the basis of affective content. This has been examined in relation to the ability of faces to guide or hold attention, or to resist attentional suppression. Previous work has shown that schematic faces can only be partially ignored and that the emotional valence of to-be-ignored faces has little effect. Given recent debates concerning the use of schematic faces, here we examined the ease with which photorealistic faces could be ignored. Although we found evidence of a partial preview benefit for these stimuli, the findings were complex, with stimulus salience, valence, and threat content interacting to affect both the strength of the benefit and target detection efficiency (Exps. 1-3). Experiment 4 then clarified the effects of physical salience and perceived stimulus similarity in the previous experiments, demonstrating that a combination of these factors is likely to account for the search patterns observed. PMID:24435898

  13. A concise colorimetric and fluorimetric probe for sarin related threats designed via the "covalent-assembly" approach.

    PubMed

    Lei, Zuhai; Yang, Youjun

    2014-05-01

    A turn-on signal from zero background allows sensitive detection of a weak signal and is highly desired. The "covalent-assembly" probe design principle is powerful in this regard. Herein, we report an embodiment of this principle (NA570) for detection of Sarin related threats, based on a phenylogous Vilsmeier-Haack reaction. NA570 bears a concise molecular construct, exhibits a colorimetric and a fluorimetric signal, and has potential for real applications. PMID:24766398

  14. Revealing geometric phases in modular and weak values with a quantum eraser

    NASA Astrophysics Data System (ADS)

    Cormann, Mirko; Remy, Mathilde; Kolaric, Branko; Caudano, Yves

    2016-04-01

    We present a procedure to completely determine the complex modular values of arbitrary observables of pre- and postselected ensembles, which works experimentally for all measurement strengths and all postselected states. This procedure allows us to discuss the physics of modular and weak values in interferometric experiments involving a qubit meter. We determine both the modulus and the argument of the modular value for any measurement strength in a single step, by simultaneously controlling the visibility and the phase in a quantum eraser interference experiment. Modular and weak values are closely related. Using entangled qubits for the probed and meter systems, we show that the phase of the modular and weak values has a topological origin. This phase is completely defined by the intrinsic physical properties of the probed system and its time evolution. The physical significance of this phase can thus be used to evaluate the quantumness of weak values.

  15. In Brief: Threats to species continue

    NASA Astrophysics Data System (ADS)

    Showstack, Randy

    2009-11-01

    Of 47,677 assessed species, 17,291 are threatened with extinction, according to the latest update of the Red List of Threatened Species issued by the International Union for Conservation of Nature (IUCN) on 3 November. The list indicates that amphibians are the most threatened group of species known to date, with 1895 (nearly 30%) of 6285 amphibians in danger of extinction. Thirty-nine are already extinct or extinct in the wild, 484 are critically endangered, 754 are endangered, and 657 are vulnerable, according to IUCN. Under threat are 21% of mammals, 30% of amphibians, 12% of birds, 28% of reptiles, 37% of freshwater fishes, 70% of plants, and 35% of invertebrates assessed to date. “We have only managed to assess 47,663 species so far; there are many more millions out there which could be under serious threat,” according to IUCN Red List Unit Manager Craig Hilton-Taylor. For more information, visit http://www.iucnredlist.org.

  16. Identifying chemicals that are planetary boundary threats.

    PubMed

    MacLeod, Matthew; Breitholtz, Magnus; Cousins, Ian T; de Wit, Cynthia A; Persson, Linn M; Rudén, Christina; McLachlan, Michael S

    2014-10-01

    Rockström et al. proposed a set of planetary boundaries that delimit a "safe operating space for humanity". Many of the planetary boundaries that have so far been identified are determined by chemical agents. Other chemical pollution-related planetary boundaries likely exist, but are currently unknown. A chemical poses an unknown planetary boundary threat if it simultaneously fulfills three conditions: (1) it has an unknown disruptive effect on a vital Earth system process; (2) the disruptive effect is not discovered until it is a problem at the global scale, and (3) the effect is not readily reversible. In this paper, we outline scenarios in which chemicals could fulfill each of the three conditions, then use the scenarios as the basis to define chemical profiles that fit each scenario. The chemical profiles are defined in terms of the nature of the effect of the chemical and the nature of exposure of the environment to the chemical. Prioritization of chemicals in commerce against some of the profiles appears feasible, but there are considerable uncertainties and scientific challenges that must be addressed. Most challenging is prioritizing chemicals for their potential to have a currently unknown effect on a vital Earth system process. We conclude that the most effective strategy currently available to identify chemicals that are planetary boundary threats is prioritization against profiles defined in terms of environmental exposure combined with monitoring and study of the biogeochemical processes that underlie vital Earth system processes to identify currently unknown disruptive effects. PMID:25181298

  17. Deterring regional threats from nuclear proliferation

    SciTech Connect

    Spector, L.S.

    1992-03-12

    The most prominent shift in the National Military Strategy is from the global Soviet threat to a new focus on regional contingencies. No threat looms larger in these contingencies than the proliferation of nuclear weapons and ballistic missiles. This study examines proliferation trends and proposes a predominately diplomatic strategy for containing the problem. Dr. Spector identifies three waves of proliferation: the first is the five states with declared weapons and doctrine-the United States, Russia, Great Britain, France, and China; the second includes a less visible group that developed a covert capability, without testing weapons or declaring a doctrine of deterrence-for example, Israel, India, and probably Pakistan; and, a third wave of would-be proliferators includes radical states like Iraq, Iran, Libya, and North Korea. Spector's political approach is based on the common interest of wave one and two states to prevent further proliferation. Political-economic incentives have already worked in the cases of Brazil, Argentina, Taiwan, and South Africa-states which appear to have abandoned their nuclear weapons programs. Spector does not rule out the option of military force. Force, especially under international sanctions, can be a powerful tool to back diplomatic efforts. Use of force, however, remains a last resort.

  18. Passive acoustic threat detection in estuarine environments

    NASA Astrophysics Data System (ADS)

    Borowski, Brian; Sutin, Alexander; Roh, Heui-Seol; Bunin, Barry

    2008-04-01

    The Maritime Security Laboratory (MSL) at Stevens Institute of Technology supports research in a range of areas relevant to harbor security, including passive acoustic detection of underwater threats. The difficulties in using passive detection in an urban estuarine environment include intensive and highly irregular ambient noise and the complexity of sound propagation in shallow water. MSL conducted a set of tests in the Hudson River near Manhattan in order to measure the main parameters defining the detection distance of a threat: source level of a scuba diver, transmission loss of acoustic signals, and ambient noise. The source level of the diver was measured by comparing the diver's sound with a reference signal from a calibrated emitter placed on his path. Transmission loss was measured by comparing noise levels of passing ships at various points along their routes, where their distance from the hydrophone was calculated with the help of cameras and custom software. The ambient noise in the Hudson River was recorded under varying environmental conditions and amounts of water traffic. The passive sonar equation was then applied to estimate the range of detection. Estimations were done for a subset of the recorded noise levels, and we demonstrated how variations in the noise level, attenuation, and the diver's source level influence the effective range of detection. Finally, we provided analytic estimates of how an array improves upon the detection distance calculated by a single hydrophone.

  19. Prefrontal control of attention to threat.

    PubMed

    Peers, Polly V; Simons, Jon S; Lawrence, Andrew D

    2013-01-01

    Attentional control refers to the regulatory processes that ensure that our actions are in accordance with our goals. Dual-system accounts view temperament as consisting of both individual variation in emotionality (e.g., trait anxiety) and variation in regulatory attentional mechanisms that act to modulate emotionality. Increasing evidence links trait variation in attentional control to clinical mood and anxiety disorder symptoms, independent of trait emotionality. Attentional biases to threat have been robustly linked to mood and anxiety disorders. However, the role of variation in attentional control in influencing such biases, and the neural underpinnings of trait variation in attentional control, are unknown. Here, we show that individual differences in trait attentional control, even when accounting for trait and state anxiety, are related to the magnitude of an attentional blink (AB) following threat-related targets. Moreover, we demonstrate that activity in dorso-lateral prefrontal cortex (DLPFC), is observed specifically in relation to control of attention over threatening stimuli, in line with neural theories of attentional control, such as guided activation theory. These results have key implications for neurocognitive theories of attentional bias and emotional resilience. PMID:23386824

  20. Crew Strength Training

    NASA Video Gallery

    Train to develop your upper and lower body strength in your muscles and bones by performing body-weight squats and push-ups.The Train Like an Astronaut project uses the excitement of exploration to...

  1. Reduction of bone strength

    NASA Technical Reports Server (NTRS)

    Bingham, Cindy

    1990-01-01

    Viewgraphs on reduction of bone strength are presented. WEHI 231 B growth rates, experimental chambers used to apply the electric field to the cell cultures, and a mouse suspended by rotating cuff in electromagnetic field are shown.

  2. Developing Strengths in Families

    ERIC Educational Resources Information Center

    Bowman, Ted

    1976-01-01

    There are few descriptions of growth experiences for total families. This paper describes one such model. It expresses the conviction that families need opportunities to come together with other families to identify strengths, sharpen communication skills, and establish goals. (Author)

  3. The Computational Complexity of Weak Saddles

    NASA Astrophysics Data System (ADS)

    Brandt, Felix; Brill, Markus; Fischer, Felix; Hoffmann, Jan

    We continue the recently initiated study of the computational aspects of weak saddles, an ordinal set-valued solution concept proposed by Shapley. Brandt et al. gave a polynomial-time algorithm for computing weak saddles in a subclass of matrix games, and showed that certain problems associated with weak saddles of bimatrix games are NP-complete. The important question of whether weak saddles can be found efficiently was left open. We answer this question in the negative by showing that finding weak saddles of bimatrix games is NP-hard, under polynomial-time Turing reductions. We moreover prove that recognizing weak saddles is coNP-complete, and that deciding whether a given action is contained in some weak saddle is hard for parallel access to NP and thus not even in NP unless the polynomial hierarchy collapses. Our hardness results are finally shown to carry over to a natural weakening of weak saddles.

  4. Breaking through barriers: using technology to address executive function weaknesses and improve student achievement.

    PubMed

    Schwartz, David M

    2014-01-01

    Assistive technologies provide significant capabilities for improving student achievement. Improved accessibility, cost, and diversity of applications make integration of technology a powerful tool to compensate for executive function weaknesses and deficits and their impact on student performance, learning, and achievement. These tools can be used to compensate for decreased working memory, poor time management, poor planning and organization, poor initiation, and decreased memory. Assistive technology provides mechanisms to assist students with diverse strengths and weaknesses in mastering core curricular concepts. PMID:25010083

  5. A Lesson Not to Be Learned? Understanding Stereotype Threat Does Not Protect Women from Stereotype Threat

    ERIC Educational Resources Information Center

    Tomasetto, Carlo; Appoloni, Sara

    2013-01-01

    This research examines whether reading a text presenting scientific evidence concerning the phenomenon of stereotype threat improves or disrupts women's performance in a subsequent math task. In two experimental conditions participants (N=118 ) read a text summarizing an experiment in which stereotypes, and not biological differences, were shown…

  6. Migrant networks and international migration: testing weak ties.

    PubMed

    Liu, Mao-Mei

    2013-08-01

    This article examines the role of migrant social networks in international migration and extends prior research by testing the strength of tie theory, decomposing networks by sources and resources, and disentangling network effects from complementary explanations. Nearly all previous empirical research has ignored friendship ties and has largely neglected extended-family ties. Using longitudinal data from the Migration between Africa and Europe project collected in Africa (Senegal) and Europe (France, Italy, and Spain), this article tests the robustness of network theory-and in particular, the role of weak ties-on first-time migration between Senegal and Europe. Discrete-time hazard model results confirm that weak ties are important and that network influences appear to be gendered, but they do not uphold the contention in previous literature that strong ties are more important than weak ties for male and female migration. Indeed, weak ties play an especially important role in male migration. In terms of network resources, having more resources as a result of strong ties appears to dampen overall migration, while having more resources as a result of weaker ties appears to stimulate male migration. Finally, the diversity of resources has varied effects for male and female migration. PMID:23703222

  7. Weakly ionized cerium plasma radiography

    NASA Astrophysics Data System (ADS)

    Sato, Eiichi; Hayasi, Yasuomi; Germer, Rudolf; Koorikawa, Yoshitake; Murakami, Kazunori; Tanaka, Etsuro; Mori, Hidezo; Kawai, Toshiaki; Ichimaru, Toshio; Obata, Fumiko; Takahashi, Kiyomi; Sato, Sigehiro; Takayama, Kazuyoshi; Ido, Hideaki

    2004-02-01

    In the plasma flash x-ray generator, high-voltage main condenser of about 200 nF is charged up to 55 kV by a power supply, and electric charges in the condenser are discharged to an x-ray tube after triggering the cathode electrode. The flash x-rays are then produced. The x-ray tube is of a demountable triode that is connected to a turbo molecular pump with a pressure of approximately 1 mPa. As electron flows from the cathode electrode are roughly converged to a rod cerium target of 3.0 mm in diameter by electric field in the x-ray tube, the weakly ionized linear plasma, which consists of cerium ions and electrons, forms by target evaporating. At a charging voltage of 55 kV, the maximum tube voltage was almost equal to the charging voltage of the main condenser, and the peak current was about 20 kA. When the charging voltage was increased, weakly ionized cerium plasma formed, and the K-series characteristic x-ray intensities increased. The x-ray pulse widths were about 500 ns, and the time-integrated x-ray intensity had a value of about 40 μC/kg at 1.0 m from x-ray source with a charging voltage of 55 kV. In the angiography, we employed a film-less computed radiography (CR) system and iodine-based microspheres. Because K-series characteristic x-rays are absorbed easily by the microspheres, high-contrast angiography has been performed.

  8. Statistical theory of electromagnetic weak turbulence

    SciTech Connect

    Yoon, Peter H.

    2006-02-15

    The weak turbulence theory as commonly found in the literature employs electrostatic approximation and is applicable to unmagnetized plasmas only. To this date, fully electromagnetic generalization of the existing weak turbulence theory based upon statistical mechanical approach remains largely incomplete. Instead, electromagnetic effects are incorporated into the weak turbulence formalism by means of the semiclassical approach. The present paper reformulates the fully electromagnetic weak turbulence theory from classical statistical mechanical (i.e., the Klimontovich) approach.

  9. Weak, Quiet Magnetic Fields Seen in the Venus Atmosphere.

    PubMed

    Zhang, T L; Baumjohann, W; Russell, C T; Luhmann, J G; Xiao, S D

    2016-01-01

    The existence of a strong internal magnetic field allows probing of the interior through both long term changes of and short period fluctuations in that magnetic field. Venus, while Earth's twin in many ways, lacks such a strong intrinsic magnetic field, but perhaps short period fluctuations can still be used to probe the electrical conductivity of the interior. Toward the end of the Venus Express mission, an aerobraking campaign took the spacecraft below the ionosphere into the very weakly electrically conducting atmosphere. As the spacecraft descended from 150 to 140 km altitude, the magnetic field became weaker on average and less noisy. Below 140 km, the median field strength became steady but the short period fluctuations continued to weaken. The weakness of the fluctuations indicates they might not be useful for electromagnetic sounding of the atmosphere from a high altitude platform such as a plane or balloon, but possibly could be attempted on a lander. PMID:27009234

  10. Weak, Quiet Magnetic Fields Seen in the Venus Atmosphere

    NASA Astrophysics Data System (ADS)

    Zhang, Tielong; Baumjohann, Wolfgang; Russell, Christopher; Luhmann, Janet

    2016-04-01

    The existence of a strong internal magnetic field allows probing of the interior through both long term changes of and short period fluctuations in that magnetic field. Venus, while Earth's twin in many ways, lacks such a strong intrinsic magnetic field, but perhaps short period fluctuations can still be used to probe the electrical conductivity of the interior. Toward the end of the Venus Express mission, an aerobraking campaign took the spacecraft below the ionosphere into the very weakly electrically conducting atmosphere. As the spacecraft descended from 150 to 140 km altitude, the magnetic field became weaker on average and less noisy. Below 140 km, the median field strength became steady but the short period fluctuations continued to weaken. The weakness of the fluctuations indicates they might not be useful for electromagnetic sounding of the atmosphere from a high altitude platform such as a plane or balloon, but possibly could be attempted on a lander.

  11. Weak, Quiet Magnetic Fields Seen in the Venus Atmosphere

    NASA Astrophysics Data System (ADS)

    Zhang, T. L.; Baumjohann, W.; Russell, C. T.; Luhmann, J. G.; Xiao, S. D.

    2016-03-01

    The existence of a strong internal magnetic field allows probing of the interior through both long term changes of and short period fluctuations in that magnetic field. Venus, while Earth’s twin in many ways, lacks such a strong intrinsic magnetic field, but perhaps short period fluctuations can still be used to probe the electrical conductivity of the interior. Toward the end of the Venus Express mission, an aerobraking campaign took the spacecraft below the ionosphere into the very weakly electrically conducting atmosphere. As the spacecraft descended from 150 to 140 km altitude, the magnetic field became weaker on average and less noisy. Below 140 km, the median field strength became steady but the short period fluctuations continued to weaken. The weakness of the fluctuations indicates they might not be useful for electromagnetic sounding of the atmosphere from a high altitude platform such as a plane or balloon, but possibly could be attempted on a lander.

  12. Weak, Quiet Magnetic Fields Seen in the Venus Atmosphere

    PubMed Central

    Zhang, T. L.; Baumjohann, W.; Russell, C. T.; Luhmann, J. G.; Xiao, S. D.

    2016-01-01

    The existence of a strong internal magnetic field allows probing of the interior through both long term changes of and short period fluctuations in that magnetic field. Venus, while Earth’s twin in many ways, lacks such a strong intrinsic magnetic field, but perhaps short period fluctuations can still be used to probe the electrical conductivity of the interior. Toward the end of the Venus Express mission, an aerobraking campaign took the spacecraft below the ionosphere into the very weakly electrically conducting atmosphere. As the spacecraft descended from 150 to 140 km altitude, the magnetic field became weaker on average and less noisy. Below 140 km, the median field strength became steady but the short period fluctuations continued to weaken. The weakness of the fluctuations indicates they might not be useful for electromagnetic sounding of the atmosphere from a high altitude platform such as a plane or balloon, but possibly could be attempted on a lander. PMID:27009234

  13. A Simulation Study of Threats to Validity in Quasi-Experimental Designs: Interrelationship between Design, Measurement, and Analysis

    PubMed Central

    Holgado-Tello, Fco. P.; Chacón-Moscoso, Salvador; Sanduvete-Chaves, Susana; Pérez-Gil, José A.

    2016-01-01

    The Campbellian tradition provides a conceptual framework to assess threats to validity. On the other hand, different models of causal analysis have been developed to control estimation biases in different research designs. However, the link between design features, measurement issues, and concrete impact estimation analyses is weak. In order to provide an empirical solution to this problem, we use Structural Equation Modeling (SEM) as a first approximation to operationalize the analytical implications of threats to validity in quasi-experimental designs. Based on the analogies established between the Classical Test Theory (CTT) and causal analysis, we describe an empirical study based on SEM in which range restriction and statistical power have been simulated in two different models: (1) A multistate model in the control condition (pre-test); and (2) A single-trait-multistate model in the control condition (post-test), adding a new mediator latent exogenous (independent) variable that represents a threat to validity. Results show, empirically, how the differences between both the models could be partially or totally attributed to these threats. Therefore, SEM provides a useful tool to analyze the influence of potential threats to validity. PMID:27378991

  14. A Simulation Study of Threats to Validity in Quasi-Experimental Designs: Interrelationship between Design, Measurement, and Analysis.

    PubMed

    Holgado-Tello, Fco P; Chacón-Moscoso, Salvador; Sanduvete-Chaves, Susana; Pérez-Gil, José A

    2016-01-01

    The Campbellian tradition provides a conceptual framework to assess threats to validity. On the other hand, different models of causal analysis have been developed to control estimation biases in different research designs. However, the link between design features, measurement issues, and concrete impact estimation analyses is weak. In order to provide an empirical solution to this problem, we use Structural Equation Modeling (SEM) as a first approximation to operationalize the analytical implications of threats to validity in quasi-experimental designs. Based on the analogies established between the Classical Test Theory (CTT) and causal analysis, we describe an empirical study based on SEM in which range restriction and statistical power have been simulated in two different models: (1) A multistate model in the control condition (pre-test); and (2) A single-trait-multistate model in the control condition (post-test), adding a new mediator latent exogenous (independent) variable that represents a threat to validity. Results show, empirically, how the differences between both the models could be partially or totally attributed to these threats. Therefore, SEM provides a useful tool to analyze the influence of potential threats to validity. PMID:27378991

  15. The dimensional structure of people's fears, threats, and concerns and their relationship with right-wing authoritarianism and social dominance orientation.

    PubMed

    Shaffer, Barbara; Duckitt, John

    2013-01-01

    Most theories addressing the topic have proposed that threat and fear underlie right-wing authoritarianism (RWA), and many empirical findings have been consistent with this proposition. Important questions, however, remain unanswered, such as whether RWA is associated with fear and threat in general or only specific kinds of fear and threat. Theories of RWA generate markedly different predictions on this issue, particularly with respect to social or personal fears, and whether the association would also hold for the closely related construct of social dominance orientation (SDO). We investigated the issue by asking 463 undergraduate students to rate their feelings of fear, concern, and anxiety to a comprehensive 93-item list of potential fears and threats, which were formulated as either personal or social. Exploratory factors analysis identified five distinct fear-threat factors: harm to self, child, or country; personal and relationship failures; environmental and economic fears; political and personal uncertainties; and threats to ingroup. All the fear-threat factors were correlated with RWA, with the strongest correlations being for threats to ingroup, and with stronger effects for social than for personal fears. None of the fear factors correlated with SDO. These relationships were not affected by controlling for social desirability or emotional stability (EMS). When the intercorrelations between fear factors and EMS were controlled using ridge regression, only threats to ingroup predicted RWA. Structural equation modeling indicated good fit for a model in which low levels of EMS had a significant path to threats to ingroup, which in turn had a significant path to RWA, and EMS having a significant though weak indirect (fully mediated) inverse effect on RWA. Implications of these findings for theories of authoritarianism and future research are discussed. PMID:23390968

  16. Adapted Resistance Training Improves Strength in Eight Weeks in Individuals with Multiple Sclerosis.

    PubMed

    Keller, Jennifer L; Fritz, Nora; Chiang, Chen Chun; Jiang, Allen; Thompson, Tziporah; Cornet, Nicole; Newsome, Scott D; Calabresi, Peter A; Zackowski, Kathleen

    2016-01-01

    Hip weakness is a common symptom affecting walking ability in people with multiple sclerosis (MS). It is known that resistance strength training (RST) can improve strength in individuals with MS, however; it remains unclear the duration of RST that is needed to make strength gains and how to adapt hip strengthening exercises for individuals of varying strength using only resistance bands. This paper describes the methodology to set up and implement an adapted resistance strength training program, using resistance bands, for individuals with MS. Directions for pre- and post-strength tests to evaluate efficacy of the strength-training program are included. Safety features and detailed instructions outline the weekly program content and progression. Current evidence is presented showing that significant strength gains can be made within 8 weeks of starting a RST program. Evidence is also presented showing that resistance strength training can be successfully adapted for individuals with MS of varying strength with little equipment. PMID:26863451

  17. Tie strength distribution in scientific collaboration networks

    NASA Astrophysics Data System (ADS)

    Ke, Qing; Ahn, Yong-Yeol

    2014-09-01

    Science is increasingly dominated by teams. Understanding patterns of scientific collaboration and their impacts on the productivity and evolution of disciplines is crucial to understand scientific processes. Electronic bibliography offers a unique opportunity to map and investigate the nature of scientific collaboration. Recent studies have demonstrated a counterintuitive organizational pattern of scientific collaboration networks: densely interconnected local clusters consist of weak ties, whereas strong ties play the role of connecting different clusters. This pattern contrasts itself from many other types of networks where strong ties form communities while weak ties connect different communities. Although there are many models for collaboration networks, no model reproduces this pattern. In this paper, we present an evolution model of collaboration networks, which reproduces many properties of real-world collaboration networks, including the organization of tie strengths, skewed degree and weight distribution, high clustering, and assortative mixing.

  18. MCNPX improvements for threat reduction applications

    SciTech Connect

    Waters, Laurie S; Durkee, Joe W; Elson, Jay S; Esch, Ernst I; Fensin, Michael L; Hendricks, John S; Holloway, Shannon T; James, Michael R; Jason, Andrew; Johns, Russell C; Johnson, M William; Kawano, Toshihiko; Mckinney, Gregg W; Moller, Peter; Pelowitz, Denise B

    2008-01-01

    The DHS Domestic Nuclear Detection Office (DNDO) is funding a multiyear program of improvements for the MCNPX{sup TM} Monte Carlo radiation-transport code. Additional work is underway for the DTRA Active Interrogation programs. Enhancements contained in the current MCNPX 2.6.0 RSICC release will be presented, including stopped-muon physics, delayed neutron and photon generation and automatic generation of source photons. Preliminary benchmarking comparisons with data taken with a PSI muon beam will be discussed. We will also describe current improvements now underway, including Nuclear Resonance Fluorescence, pulsed sources, and others. We will also describe very new work begun on a Threat-Reduction user inferface, designed to simplify the setup of TR-related calculations, and introduce standards into geometry, sources and backgrounds.

  19. Monitoring Technologies for Mitigating Insider Threats

    NASA Astrophysics Data System (ADS)

    Bowen, Brian M.; Salem, Malek Ben; Keromytis, Angelos D.; Stolfo, Salvatore J.

    In this chapter, we propose a design for an insider threat detection system that combines an array of complementary techniques that aims to detect evasive adversaries. We are motivated by real world incidents and our experience with building isolated detectors: such standalone mechanisms are often easily identified and avoided by malefactors. Our work-in-progress combines host-based user-event monitoring sensors with trap-based decoys and remote network detectors to track and correlate insider activity. We introduce and formalize a number of properties of decoys as a guide to design trap-based defenses to increase the likelihood of detecting an insider attack. We identify several challenges in scaling up, deploying, and validating our architecture in real environments.

  20. Threat detection system for intersection collision avoidance

    NASA Astrophysics Data System (ADS)

    Jocoy, Edward H.; Pierowicz, John A.

    1998-01-01

    Calspan SRL Corporation is currently developing an on- vehicle threat detection system for intersection collision avoidance (ICA) as part of its ICA program with the National Highway Transportation Safety Administration. Crash scenarios were previously defined and an on-board radar sensor was designed. This paper describes recent efforts that include the development of a simulation of a multitarget tracker and collision avoidance algorithm used to predict system performance in a variety of target configurations in the various ICA crash scenarios. In addition, a current headway radar was mounted on the Calspan Instrumented Vehicle and in-traffic data were recorded for two limited crash scenarios. Warning functions were developed through the simulation and applied to the recorded data.

  1. Bioterrorism as a public health threat.

    PubMed Central

    Henderson, D. A.

    1998-01-01

    The threat of bioterrorism, long ignored and denied, has heightened over the past few years. Recent events in Iraq, Japan, and Russia cast an ominous shadow. Two candidate agents are of special concern--smallpox and anthrax. The magnitude of the problems and the gravity of the scenarios associated with release of these organisms have been vividly portrayed by two epidemics of smallpox in Europe during the 1970s and by an accidental release of aerosolized anthrax from a Russian bioweapons facility in 1979. Efforts in the United States to deal with possible incidents involving bioweapons in the civilian sector have only recently begun and have made only limited progress. Only with substantial additional resources at the federal, state, and local levels can a credible and meaningful response be mounted. For longer-term solutions, the medical community must educate both the public and policy makers about bioterrorism and build a global consensus condemning its use. PMID:9716981

  2. Females that experience threat are better teachers

    PubMed Central

    Kleindorfer, Sonia; Evans, Christine; Colombelli-Négrel, Diane

    2014-01-01

    Superb fairy-wren (Malurus cyaneus) females use an incubation call to teach their embryos a vocal password to solicit parental feeding care after hatching. We previously showed that high call rate by the female was correlated with high call similarity in fairy-wren chicks, but not in cuckoo chicks, and that parent birds more often fed chicks with high call similarity. Hosts should be selected to increase their defence behaviour when the risk of brood parasitism is highest, such as when cuckoos are present in the area. Therefore, we experimentally test whether hosts increase call rate to embryos in the presence of a singing Horsfield's bronze-cuckoo (Chalcites basalis). Female fairy-wrens increased incubation call rate when we experimentally broadcast cuckoo song near the nest. Embryos had higher call similarity when females had higher incubation call rate. We interpret the findings of increased call rate as increased teaching effort in response to a signal of threat. PMID:24806422

  3. Females that experience threat are better teachers.

    PubMed

    Kleindorfer, Sonia; Evans, Christine; Colombelli-Négrel, Diane

    2014-05-01

    Superb fairy-wren (Malurus cyaneus) females use an incubation call to teach their embryos a vocal password to solicit parental feeding care after hatching. We previously showed that high call rate by the female was correlated with high call similarity in fairy-wren chicks, but not in cuckoo chicks, and that parent birds more often fed chicks with high call similarity. Hosts should be selected to increase their defence behaviour when the risk of brood parasitism is highest, such as when cuckoos are present in the area. Therefore, we experimentally test whether hosts increase call rate to embryos in the presence of a singing Horsfield's bronze-cuckoo (Chalcites basalis). Female fairy-wrens increased incubation call rate when we experimentally broadcast cuckoo song near the nest. Embryos had higher call similarity when females had higher incubation call rate. We interpret the findings of increased call rate as increased teaching effort in response to a signal of threat. PMID:24806422

  4. When threats foreign turn domestic: Two ways for distant realistic intergroup threats to carry over into local intolerance.

    PubMed

    Bouman, Thijs; van Zomeren, Martijn; Otten, Sabine

    2015-09-01

    In times of economic downturn, perceived realistic intergroup threats (e.g., labour competition) often dominate political and media discourse. Although local outgroups (e.g., local immigrants) can be experienced as sources of realistic threats, we propose that such threats can also be perceived to be caused by distant outgroups (e.g., European Union members perceiving Greece to threaten their economies) and that such distant threats can carry over into local intolerance (e.g., increasing intolerance towards local immigrant groups). We predicted and found in two studies that perceived distant realistic threats carried over into local intolerance via two different pathways. First, direct reactions towards the distant outgroup can generalize to culturally similar local outgroups (the group-based association pathway). Secondly, Study 2 indicated that when the distant threat was attributed to stereotypical outgroup traits (e.g., being lazy), distant realistic threats activated local realistic threats, which subsequently influenced local intolerance (the threat-based association pathway). Taken together, our studies indicate that perceived realistic threats foreign can turn domestic, but in two different ways. PMID:25491910

  5. Severe Weather and Weak Waterspout Checklist in MIDDS

    NASA Technical Reports Server (NTRS)

    Wheeler, Mark M.

    2009-01-01

    The goal of this task was to migrate the functionality of the AMU web-based Severe Weather Forecast Decision Aid and the 45 WS Weak Waterspout Checklist to MIDDS, the operational data ingest and display system of the 45 WS. Forecasting the occurrence and timing of warm season severe weather and weak waterspouts is challenging for 45 WS operational personnel. These interactive tools assist forecasters in determining the probability of issuing severe weather watches and warnings for the day. MIDDS is able retrieve many of the needed parameter values for the worksheet automatically. The AMU was able to develop user-friendly tools in MIDDS for both of these tools using McBASI coded programs. The tools retrieve needed values from MIDDS automatically, and require the forecaster to answer a few subjective questions. Both tools were tested and previewed to the 45 WS on MIDDS. In their previous forms, the forecasters enter values into both tools manually to output a threat index. Making these tools more automatic will reduce the possibility of human error and increase efficiency.

  6. Terror threat perception and its consequences in contemporary Britain.

    PubMed

    Goodwin, Robin; Willson, Michelle; Gaines, Stanley

    2005-11-01

    The terrorist attacks of 9/11, and subsequent terrorist acts around the world, have alerted social psychologists to the need to examine the antecedents and consequences of terrorist threat perception. In these two studies, we examined the predictive power of demographic factors (age, gender, location), individual values and normative influences on threat perception and the consequences of this perception for behavioural change and close relationships. In Study 1 (N = 100), gender, benevolence values and normative influences were all correlates of threat perception, whilst sense of personal threat was correlated with increased contact with friends and family. In Study 2 (N = 240) age, gender, location, and the values of openness to change and hedonism, all predicted threat perception, which, in turn, predicted behavioural change and relationship contact. Such findings point to the important role social psychologists should play in understanding responses to these new terrorist threats. PMID:16248932

  7. An Overview of Non-traditional Nuclear Threats

    SciTech Connect

    Geelhood, Bruce D.; Wogman, Ned A.

    2005-01-01

    In view of the terrorist threats to the United States, the country needs to consider new vectors and weapons related to nuclear and radiological threats against our homeland. The traditional threat vectors, missiles and bombers, have expanded to include threats arriving through the flow of commerce. The new commerce-related vectors include: sea cargo, truck cargo, rail cargo, and passenger transport. The types of weapons have also expanded beyond nuclear warheads to include radiation dispersal devices (RDD) or ''dirty'' bombs. The consequences of these nuclear and radiological threats are considered. The defense against undesirable materials entering our borders is considered. The radiation and other signatures or potential nuclear and radiological threats are examined along with potential sensors to discover undesirable items in the flow of commerce. Techniques to improve detection are considered. A strategy of primary and secondary screening is proposed to rapidly clear most cargo and carefully examine suspect cargo.

  8. Violation of the Leggett–Garg inequality with weak measurements of photons

    PubMed Central

    Goggin, M. E.; Almeida, M. P.; Barbieri, M.; Lanyon, B. P.; O’Brien, J. L.; White, A. G.; Pryde, G. J.

    2011-01-01

    By weakly measuring the polarization of a photon between two strong polarization measurements, we experimentally investigate the correlation between the appearance of anomalous values in quantum weak measurements and the violation of realism and nonintrusiveness of measurements. A quantitative formulation of the latter concept is expressed in terms of a Leggett–Garg inequality for the outcomes of subsequent measurements of an individual quantum system. We experimentally violate the Leggett–Garg inequality for several measurement strengths. Furthermore, we experimentally demonstrate that there is a one-to-one correlation between achieving strange weak values and violating the Leggett–Garg inequality. PMID:21220296

  9. Fast Learning with Weak Synaptic Plasticity.

    PubMed

    Yger, Pierre; Stimberg, Marcel; Brette, Romain

    2015-09-30

    New sensory stimuli can be learned with a single or a few presentations. Similarly, the responses of cortical neurons to a stimulus have been shown to increase reliably after just a few repetitions. Long-term memory is thought to be mediated by synaptic plasticity, but in vitro experiments in cortical cells typically show very small changes in synaptic strength after a pair of presynaptic and postsynaptic spikes. Thus, it is traditionally thought that fast learning requires stronger synaptic changes, possibly because of neuromodulation. Here we show theoretically that weak synaptic plasticity can, in fact, support fast learning, because of the large number of synapses N onto a cortical neuron. In the fluctuation-driven regime characteristic of cortical neurons in vivo, the size of membrane potential fluctuations grows only as √N, whereas a single output spike leads to potentiation of a number of synapses proportional to N. Therefore, the relative effect of a single spike on synaptic potentiation grows as √N. This leverage effect requires precise spike timing. Thus, the large number of synapses onto cortical neurons allows fast learning with very small synaptic changes. Significance statement: Long-term memory is thought to rely on the strengthening of coactive synapses. This physiological mechanism is generally considered to be very gradual, and yet new sensory stimuli can be learned with just a few presentations. Here we show theoretically that this apparent paradox can be solved when there is a tight balance between excitatory and inhibitory input. In this case, small synaptic modifications applied to the many synapses onto a given neuron disrupt that balance and produce a large effect even for modifications induced by a single stimulus. This effect makes fast learning possible with small synaptic changes and reconciles physiological and behavioral observations. PMID:26424883

  10. Protecting weak measurements against systematic errors

    NASA Astrophysics Data System (ADS)

    Pang, Shengshi; Alonso, Jose Raul Gonzalez; Brun, Todd A.; Jordan, Andrew N.

    2016-07-01

    In this work, we consider the systematic error of quantum metrology by weak measurements under decoherence. We derive the systematic error of maximum likelihood estimation in general to the first-order approximation of a small deviation in the probability distribution and study the robustness of standard weak measurement and postselected weak measurements against systematic errors. We show that, with a large weak value, the systematic error of a postselected weak measurement when the probe undergoes decoherence can be significantly lower than that of a standard weak measurement. This indicates another advantage of weak-value amplification in improving the performance of parameter estimation. We illustrate the results by an exact numerical simulation of decoherence arising from a bosonic mode and compare it to the first-order analytical result we obtain.

  11. Quantifying human response capabilities towards tsunami threats at community level

    NASA Astrophysics Data System (ADS)

    Post, J.; Mück, M.; Zosseder, K.; Wegscheider, S.; Taubenböck, H.; Strunz, G.; Muhari, A.; Anwar, H. Z.; Birkmann, J.; Gebert, N.

    2009-04-01

    besides others play a role. An attempt to quantify this variable under high uncertainty is also presented. Quantifying ET is based on a GIS modelling using a Cost Weighted Distance approach. Basic principle is to define the best evacuation path from a given point to the next safe area (shelter location). Here the fastest path from that point to the shelter location has to be found. Thereby the impact of land cover, slope, population density, population age and gender distribution are taken into account as literature studies prove these factors as highly important. Knowing the fastest path and the distance to the next safe area together with a spatially distributed pattern of evacuation speed delivers the time needed from each location to a safe area. By considering now the obtained time value for RsT the coverage area of an evacuation target point (safe area) can be assigned. Incorporating knowledge on people capacity of an evacuation target point the respective coverage area is refined. Hence areas with weak, moderate and good human response capabilities can be detected. This allows calculation of potential amount of people affected (dead or injured) and amount of people dislocated. First results for Kuta (Bali) for a worst case tsunami event deliver people affected of approx. 25 000 when RT = 0 minutes (direct evacuation when receiving a tsunami warning to 120 000 when RT > ETA (no evacuation action until tsunami hits the land). Additionally fastest evacuation routes to the evacuation target points can be assigned. Areas with weak response capabilities can be assigned as priority areas to install e.g. additional evacuation target points or to increase tsunami knowledge and awareness to promote a faster reaction time. Especially in analyzing underlying socio-economic properties causing deficiencies in responding to a tsunami threat can lead to valuable information and direct planning of adaptation measures. Keywords: Community level, Risk and vulnerability assessment

  12. Weak percolation on multiplex networks.

    PubMed

    Baxter, Gareth J; Dorogovtsev, Sergey N; Mendes, José F F; Cellai, Davide

    2014-04-01

    Bootstrap percolation is a simple but nontrivial model. It has applications in many areas of science and has been explored on random networks for several decades. In single-layer (simplex) networks, it has been recently observed that bootstrap percolation, which is defined as an incremental process, can be seen as the opposite of pruning percolation, where nodes are removed according to a connectivity rule. Here we propose models of both bootstrap and pruning percolation for multiplex networks. We collectively refer to these two models with the concept of "weak" percolation, to distinguish them from the somewhat classical concept of ordinary ("strong") percolation. While the two models coincide in simplex networks, we show that they decouple when considering multiplexes, giving rise to a wealth of critical phenomena. Our bootstrap model constitutes the simplest example of a contagion process on a multiplex network and has potential applications in critical infrastructure recovery and information security. Moreover, we show that our pruning percolation model may provide a way to diagnose missing layers in a multiplex network. Finally, our analytical approach allows us to calculate critical behavior and characterize critical clusters. PMID:24827287

  13. Weakly Supervised Human Fixations Prediction.

    PubMed

    Zhang, Luming; Li, Xuelong; Nie, Liqiang; Yang, Yi; Xia, Yingjie

    2016-01-01

    Automatically predicting human eye fixations is a useful technique that can facilitate many multimedia applications, e.g., image retrieval, action recognition, and photo retargeting. Conventional approaches are frustrated by two drawbacks. First, psychophysical experiments show that an object-level interpretation of scenes influences eye movements significantly. Most of the existing saliency models rely on object detectors, and therefore, only a few prespecified categories can be discovered. Second, the relative displacement of objects influences their saliency remarkably, but current models cannot describe them explicitly. To solve these problems, this paper proposes weakly supervised fixations prediction, which leverages image labels to improve accuracy of human fixations prediction. The proposed model hierarchically discovers objects as well as their spatial configurations. Starting from the raw image pixels, we sample superpixels in an image, thereby seamless object descriptors termed object-level graphlets (oGLs) are generated by random walking on the superpixel mosaic. Then, a manifold embedding algorithm is proposed to encode image labels into oGLs, and the response map of each prespecified object is computed accordingly. On the basis of the object-level response map, we propose spatial-level graphlets (sGLs) to model the relative positions among objects. Afterward, eye tracking data is employed to integrate these sGLs for predicting human eye fixations. Thorough experiment results demonstrate the advantage of the proposed method over the state-of-the-art. PMID:26168451

  14. A Universe without Weak Interactions

    SciTech Connect

    Harnik, Roni; Kribs, Graham D.; Perez, Gilad

    2006-04-07

    A universe without weak interactions is constructed that undergoes big-bang nucleosynthesis, matter domination, structure formation, and star formation. The stars in this universe are able to burn for billions of years, synthesize elements up to iron, and undergo supernova explosions, dispersing heavy elements into the interstellar medium. These definitive claims are supported by a detailed analysis where this hypothetical ''Weakless Universe'' is matched to our Universe by simultaneously adjusting Standard Model and cosmological parameters. For instance, chemistry and nuclear physics are essentially unchanged. The apparent habitability of the Weakless Universe suggests that the anthropic principle does not determine the scale of electroweak breaking, or even require that it be smaller than the Planck scale, so long as technically natural parameters may be suitably adjusted. Whether the multi-parameter adjustment is realized or probable is dependent on the ultraviolet completion, such as the string landscape. Considering a similar analysis for the cosmological constant, however, we argue that no adjustments of other parameters are able to allow the cosmological constant to raise up even remotely close to the Planck scale while obtaining macroscopic structure. The fine-tuning problems associated with the electroweak breaking scale and the cosmological constant therefore appear to be qualitatively different from the perspective of obtaining a habitable universe.

  15. Weak percolation on multiplex networks

    NASA Astrophysics Data System (ADS)

    Baxter, Gareth J.; Dorogovtsev, Sergey N.; Mendes, José F. F.; Cellai, Davide

    2014-04-01

    Bootstrap percolation is a simple but nontrivial model. It has applications in many areas of science and has been explored on random networks for several decades. In single-layer (simplex) networks, it has been recently observed that bootstrap percolation, which is defined as an incremental process, can be seen as the opposite of pruning percolation, where nodes are removed according to a connectivity rule. Here we propose models of both bootstrap and pruning percolation for multiplex networks. We collectively refer to these two models with the concept of "weak" percolation, to distinguish them from the somewhat classical concept of ordinary ("strong") percolation. While the two models coincide in simplex networks, we show that they decouple when considering multiplexes, giving rise to a wealth of critical phenomena. Our bootstrap model constitutes the simplest example of a contagion process on a multiplex network and has potential applications in critical infrastructure recovery and information security. Moreover, we show that our pruning percolation model may provide a way to diagnose missing layers in a multiplex network. Finally, our analytical approach allows us to calculate critical behavior and characterize critical clusters.

  16. Stereotype threat in salary negotiations is mediated by reservation salary.

    PubMed

    Tellhed, Una; Björklund, Fredrik

    2011-04-01

    Women are stereotypically perceived as worse negotiators than men, which may make them ask for less salary than men when under stereotype threat (Kray et al., 2001). However, the mechanisms of stereotype threat are not yet properly understood. The current study investigated whether stereotype threat effects in salary negotiations can be explained by motivational factors. A total of 116 business students negotiated salary with a confederate and were either told that this was diagnostic of negotiating ability (threat manipulation) or not. Measures of minimum (reservation) and ideal (aspiration) salary goals and regulatory focus were collected. The finding (Kray et al., 2001) that women make lower salary requests than men when under stereotype threat was replicated. Women in the threat condition further reported lower aspiration salary, marginally significantly lower reservation salary and less eagerness/more vigilance than men. Reservation salary mediated the stereotype threat effect, and there was a trend for regulatory focus to mediate the effect. Thus, reservation salary partly explains why women ask for less salary than men under stereotype threat. Female negotiators may benefit from learning that stereotype threat causes sex-differences in motivation. PMID:21077905

  17. Stereotype Threat Alters the Subjective Experience of Memory.

    PubMed

    Mazerolle, Marie; Régner, Isabelle; Rigalleau, François; Huguet, Pascal

    2015-01-01

    There is now evidence that negative age-related stereotypes about memory reduce older adults' memory performance, and inflate age differences in this domain. Here, we examine whether stereotype threat may also influence the basic feeling that one is more or less able to remember. Using the Remember/Know paradigm, we demonstrated that stereotype threat conducted older adults to a greater feeling of familiarity with events, while failing to retrieve any contextual detail. This finding indicates that stereotype threat alters older adults' subjective experience of memory, and strengthens our understanding of the mechanisms underlying stereotype threat effects. PMID:27120561

  18. Elasticity and Strength of Biomacromolecular Crystals: Lysozyme

    NASA Technical Reports Server (NTRS)

    Holmes, A. M.; Witherow, W. K.; Chen, L. Q.; Chernov, A. A.

    2003-01-01

    The static Young modulus, E = 0.1 to 0.5 GPa, the crystal critical strength (sigma(sub c)) and its ratio to E,sigma(sub c)/E is approximately 10(exp 3), were measured for the first time for non cross-linked lysozyme crystals in solution. By using a triple point bending apparatus, we also demonstrated that the crystals were purely elastic. Softness of protein crystals built of hard macromolecules (26 GPa for lysozyme) is explained by the large size of the macromolecules as compared to the range of intermolecular forces and by the weakness of intermolecular bonds as compared to the peptide bond strength. The relatively large reported dynamic elastic moduli (approximately 8 GPa) from resonance light scattering should come from averaging over the moduli of intracrystalline water and intra- and intermolecular bonding.

  19. Spin resonance strength calculations

    SciTech Connect

    Courant,E.D.

    2008-10-06

    In calculating the strengths of depolarizing resonances it may be convenient to reformulate the equations of spin motion in a coordinate system based on the actual trajectory of the particle, as introduced by Kondratenko, rather than the conventional one based on a reference orbit. It is shown that resonance strengths calculated by the conventional and the revised formalisms are identical. Resonances induced by radiofrequency dipoles or solenoids are also treated; with rf dipoles it is essential to consider not only the direct effect of the dipole but also the contribution from oscillations induced by it.

  20. Strength of inorganic glass

    SciTech Connect

    Kurkjian, C.R.

    1985-01-01

    This book presents information on the following topics: a look at the history of glass strength; atomistic theory of fracture; surface chemistry in relation to the strength and fracture of silicate glasses; high-speed photographic investigations of the dynamic localized loading of some oxide glasses; a correction for measurements of contact area using Newton's rings; envionmentally enhanced crack growth; fatigue in glass; behavior of flaws in fused silica fibers; fracture toughness of chalcogenide glasses and glass-ceramics; fracture analysis of glass surfaces; and fracture mechanics parameters for glasses - a compilation and correlation.

  1. High strength alloys

    SciTech Connect

    Maziasz, Phillip James; Shingledecker, John Paul; Santella, Michael Leonard; Schneibel, Joachim Hugo; Sikka, Vinod Kumar; Vinegar, Harold J.; John, Randy Carl; Kim, Dong Sub

    2012-06-05

    High strength metal alloys are described herein. At least one composition of a metal alloy includes chromium, nickel, copper, manganese, silicon, niobium, tungsten and iron. System, methods, and heaters that include the high strength metal alloys are described herein. At least one heater system may include a canister at least partially made from material containing at least one of the metal alloys. At least one system for heating a subterranean formation may include a tublar that is at least partially made from a material containing at least one of the metal alloys.

  2. High strength alloys

    SciTech Connect

    Maziasz, Phillip James; Shingledecker, John Paul; Santella, Michael Leonard; Schneibel, Joachim Hugo; Sikka, Vinod Kumar; Vinegar, Harold J; John, Randy Carl; Kim, Dong Sub

    2010-08-31

    High strength metal alloys are described herein. At least one composition of a metal alloy includes chromium, nickel, copper, manganese, silicon, niobium, tungsten and iron. System, methods, and heaters that include the high strength metal alloys are described herein. At least one heater system may include a canister at least partially made from material containing at least one of the metal alloys. At least one system for heating a subterranean formation may include a tubular that is at least partially made from a material containing at least one of the metal alloys.

  3. Out-Group Mating Threat and Disease Threat Increase Implicit Negative Attitudes Toward the Out-Group Among Men

    PubMed Central

    Klavina, Liga; Buunk, Abraham P.; Pollet, Thomas V.

    2011-01-01

    We investigated if perceiving an out-group as a threat to one's mating opportunities enhanced the implicit negative attitudes toward that out-group. In addition, we examined the moderating effect of disease threat on the relationship between an out-group mating threat and implicit negative attitudes toward that out-group. In Experiment 1, an out-group mating threat led to stronger implicit negative out-group attitudes as measured by the Implicit Association Test, but only for men with high chronic perceived vulnerability to disease. No such effects were found among women. In Experiment 2, men in the out-group mating threat condition who were primed with disease prevalence showed significantly stronger implicit negative attitudes toward the out-group than controls. Findings are discussed with reference to the functional approach to prejudice and sex-specific motivational reactions to different out-group threats. PMID:21687447

  4. Managing yourself. Stop overdoing your strengths.

    PubMed

    Kaplan, Robert E; Kaiser, Robert B

    2009-02-01

    Although most managers can recognize an off-kilter leader (consider the highly supportive boss who cuts people too much slack), it's quite difficult to see overkill in yourself. Unfortunately, that's where leadership development tools such as 360-degree surveys fail to deliver, say Kaplan and Kaiser. Dividing qualities into "strengths" and "weaknesses" and rating them on a five-point scale will not account for strengths overplayed. The authors suggest several strategies, based on their years of consulting experience and research, for figuring out which attributes you've employed to excess and adjusting your behavior accordingly. Strengths taken too far have two consequences: First, they become weaknesses. For instance, quick-wittedness can turn into impatience with others. Second, you're at risk of becoming extremely lopsided--that is, diminishing your capacity on the opposite pole. A leader who is very good at building consensus, for example, may take too long to move into action. To strike a balance between two key leadership dualities--forceful versus enabling, and strategic versus operational--you need to see your actions and motivations clearly. That's no easy task since most leadership development tools don't spell out that you're overdoing your strengths. But there are other ways to bring that information to light. You can start with a review of the highest ratings on your most recent 360 report. Ask yourself: Is this too much of a good thing? Another technique is to make a list of the traits you most want to have as a leader. Are you going to extremes with any of them? To check for lopsidedness, you can prompt feedback from other people with a list of qualities you've composed or one you've gleaned from other sources. Once you know which attributes you're overdoing, you can recalibrate. PMID:19266705

  5. Functional organization of excitatory synaptic strength in primary visual cortex

    PubMed Central

    Muir, Dylan R.; Houlton, Rachael; Sader, Elie N.; Ko, Ho; Hofer, Sonja B.; Mrsic-Flogel, Thomas D.

    2016-01-01

    The strength of synaptic connections fundamentally determines how neurons influence each other’s firing. Excitatory connection amplitudes between pairs of cortical neurons vary over two orders of magnitude, comprising only very few strong connections among many weaker ones1–9. Although this highly skewed distribution of connection strengths is observed in diverse cortical areas1–9, its functional significance remains unknown: it is not clear how connection strength relates to neuronal response properties, nor how strong and weak inputs contribute to information processing in local microcircuits. Here we reveal that the strength of connections between layer 2/3 (L2/3) pyramidal neurons in mouse primary visual cortex (V1) obeys a simple rule—the few strong connections occur between neurons with most correlated responses, while only weak connections link neurons with uncorrelated responses. Moreover, we show that strong and reciprocal connections occur between cells with similar spatial receptive field structure. Although weak connections far outnumber strong connections, each neuron receives the majority of its local excitation from a small number of strong inputs provided by the few neurons with similar responses to visual features. By dominating recurrent excitation, these infrequent yet powerful inputs disproportionately contribute to feature preference and selectivity. Therefore, our results show that the apparently complex organization of excitatory connection strength reflects the similarity of neuronal responses, and suggest that rare, strong connections mediate stimulus-specific response amplification in cortical microcircuits. PMID:25652823

  6. Growing up with the threat of nuclear war: some indirect effects on personality development

    SciTech Connect

    Escalona, S.K.

    1982-10-01

    The effects of the nuclear peril upon youngsters in middle childhood are considered, with particular emphasis on the extent to which ego strengths and weaknesses are influenced by adult behavior. It is suggested that the adult response to a pervasive danger such as the nuclear arms build-up shapes children's views of the trustworthiness of adult society and defines the limits of their growth and development.

  7. Pixelation Effects in Weak Lensing

    NASA Technical Reports Server (NTRS)

    High, F. William; Rhodes, Jason; Massey, Richard; Ellis, Richard

    2007-01-01

    Weak gravitational lensing can be used to investigate both dark matter and dark energy but requires accurate measurements of the shapes of faint, distant galaxies. Such measurements are hindered by the finite resolution and pixel scale of digital cameras. We investigate the optimum choice of pixel scale for a space-based mission, using the engineering model and survey strategy of the proposed Supernova Acceleration Probe as a baseline. We do this by simulating realistic astronomical images containing a known input shear signal and then attempting to recover the signal using the Rhodes, Refregier, and Groth algorithm. We find that the quality of shear measurement is always improved by smaller pixels. However, in practice, telescopes are usually limited to a finite number of pixels and operational life span, so the total area of a survey increases with pixel size. We therefore fix the survey lifetime and the number of pixels in the focal plane while varying the pixel scale, thereby effectively varying the survey size. In a pure trade-off for image resolution versus survey area, we find that measurements of the matter power spectrum would have minimum statistical error with a pixel scale of 0.09' for a 0.14' FWHM point-spread function (PSF). The pixel scale could be increased to 0.16' if images dithered by exactly half-pixel offsets were always available. Some of our results do depend on our adopted shape measurement method and should be regarded as an upper limit: future pipelines may require smaller pixels to overcome systematic floors not yet accessible, and, in certain circumstances, measuring the shape of the PSF might be more difficult than those of galaxies. However, the relative trends in our analysis are robust, especially those of the surface density of resolved galaxies. Our approach thus provides a snapshot of potential in available technology, and a practical counterpart to analytic studies of pixelation, which necessarily assume an idealized shape

  8. Weak {}^* convergence of operator means

    NASA Astrophysics Data System (ADS)

    Romanov, Alexandr V.

    2011-12-01

    For a linear operator U with \\Vert U^n\\Vert \\le \\operatorname{const} on a Banach space X we discuss conditions for the convergence of ergodic operator nets T_\\alpha corresponding to the adjoint operator U^* of U in the {W^*O}-topology of the space \\operatorname{End} X^*. The accumulation points of all possible nets of this kind form a compact convex set L in \\operatorname{End} X^*, which is the kernel of the operator semigroup G=\\overline{\\operatorname{co}}\\,\\Gamma_0, where \\Gamma_0=\\{U_n^*, n \\ge 0\\}. It is proved that all ergodic nets T_\\alpha weakly {}^* converge if and only if the kernel L consists of a single element. In the case of X=C(\\Omega) and the shift operator U generated by a continuous transformation \\varphi of a metrizable compactum \\Omega we trace the relationships among the ergodic properties of U, the structure of the operator semigroups L, G and \\Gamma=\\overline{\\Gamma}_0, and the dynamical characteristics of the semi-cascade (\\varphi,\\Omega). In particular, if \\operatorname{card}L=1, then a) for any \\omega \\in\\Omega the closure of the trajectory \\{\\varphi^n\\omega, n \\ge 0\\} contains precisely one minimal set m, and b) the restriction (\\varphi,m) is strictly ergodic. Condition a) implies the {W^*O}-convergence of any ergodic sequence of operators T_n \\in \\operatorname{End} X^* under the additional assumption that the kernel of the enveloping semigroup E(\\varphi,\\Omega) contains elements obtained from the `basis' family of transformations \\{\\varphi^n, n \\ge 0\\} of the compact set \\Omega by using some transfinite sequence of sequential passages to the limit.

  9. Pixelation Effects in Weak Lensing

    NASA Astrophysics Data System (ADS)

    High, F. William; Rhodes, Jason; Massey, Richard; Ellis, Richard

    2007-11-01

    Weak gravitational lensing can be used to investigate both dark matter and dark energy but requires accurate measurements of the shapes of faint, distant galaxies. Such measurements are hindered by the finite resolution and pixel scale of digital cameras. We investigate the optimum choice of pixel scale for a space-based mission, using the engineering model and survey strategy of the proposed Supernova Acceleration Probe as a baseline. We do this by simulating realistic astronomical images containing a known input shear signal and then attempting to recover the signal using the Rhodes, Refregier, & Groth algorithm. We find that the quality of shear measurement is always improved by smaller pixels. However, in practice, telescopes are usually limited to a finite number of pixels and operational life span, so the total area of a survey increases with pixel size. We therefore fix the survey lifetime and the number of pixels in the focal plane while varying the pixel scale, thereby effectively varying the survey size. In a pure trade-off for image resolution versus survey area, we find that measurements of the matter power spectrum would have minimum statistical error with a pixel scale of 0.09" for a 0.14" FWHM point-spread function (PSF). The pixel scale could be increased to ~0.16" if images dithered by exactly half-pixel offsets were always available. Some of our results do depend on our adopted shape measurement method and should be regarded as an upper limit: future pipelines may require smaller pixels to overcome systematic floors not yet accessible, and, in certain circumstances, measuring the shape of the PSF might be more difficult than those of galaxies. However, the relative trends in our analysis are robust, especially those of the surface density of resolved galaxies. Our approach thus provides a snapshot of potential in available technology, and a practical counterpart to analytic studies of pixelation, which necessarily assume an idealized shape

  10. Induced tolerance expressed as relaxed behavioural threat response in millimetre-sized aquatic organisms

    PubMed Central

    Hylander, Samuel; Ekvall, Mikael T.; Bianco, Giuseppe; Yang, Xi; Hansson, Lars-Anders

    2014-01-01

    Natural selection shapes behaviour in all organisms, but this is difficult to study in small, millimetre-sized, organisms. With novel labelling and tracking techniques, based on nanotechnology, we here show how behaviour in zooplankton (Daphnia magna) is affected by size, morphology and previous exposure to detrimental ultraviolet radiation (UVR). All individuals responded with immediate downward swimming to UVR exposure, but when released from the threat they rapidly returned to the surface. Large individuals swam faster and generally travelled longer distances than small individuals. Interestingly, individuals previously exposed to UVR (during several generations) showed a more relaxed response to UVR and travelled shorter total distances than those that were naive to UVR, suggesting induced tolerance to the threat. In addition, animals previously exposed to UVR also had smaller eyes than the naive ones, whereas UVR-protective melanin pigmentation of the animals was similar between populations. Finally, we show that smaller individuals have lower capacity to avoid UVR which could explain patterns in natural systems of lower migration amplitudes in small individuals. The ability to change behavioural patterns in response to a threat, in this case UVR, adds to our understanding of how organisms navigate in the ‘landscape of fear’, and this has important implications for individual fitness and for interaction strengths in biotic interactions. PMID:24966309

  11. Notch strength of composites

    NASA Technical Reports Server (NTRS)

    Whitney, J. M.

    1983-01-01

    The notch strength of composites is discussed. The point stress and average stress criteria relate the notched strength of a laminate to the average strength of a relatively long tensile coupon. Tests of notched specimens in which microstrain gages have been placed at or near the edges of the holes have measured strains much larger that those measured in an unnotched tensile coupon. Orthotropic stress concentration analyses of failed notched laminates have also indicated that failure occurred at strains much larger than those experienced on tensile coupons with normal gage lengths. This suggests that the high strains at the edge of a hole can be related to the very short length of fiber subjected to these strains. Lockheed has attempted to correlate a series of tests of several laminates with holes ranging from 0.19 to 0.50 in. Although the average stress criterion correlated well with test results for hole sizes equal to or greater than 0.50 in., it over-estimated the laminate strength in the range of hole sizes from 0.19 to 0.38 in. It thus appears that a theory is needed that is based on the mechanics of failure and is more generally applicable to the range of hole sizes and the varieties of laminates found in aircraft construction.

  12. High strength composites evaluation

    SciTech Connect

    Marten, S.M.

    1992-02-01

    A high-strength, thick-section, graphite/epoxy composite was identified. The purpose of this development effort was to evaluate candidate materials and provide LANL with engineering properties. Eight candidate materials (Samples 1000, 1100, 1200, 1300, 1400, 1500, 1600, and 1700) were chosen for evaluation. The Sample 1700 thermoplastic material was the strongest overall.

  13. Threats to sandy beach ecosystems: A review

    NASA Astrophysics Data System (ADS)

    Defeo, Omar; McLachlan, Anton; Schoeman, David S.; Schlacher, Thomas A.; Dugan, Jenifer; Jones, Alan; Lastra, Mariano; Scapini, Felicita

    2009-01-01

    We provide a brief synopsis of the unique physical and ecological attributes of sandy beach ecosystems and review the main anthropogenic pressures acting on the world's single largest type of open shoreline. Threats to beaches arise from a range of stressors which span a spectrum of impact scales from localised effects (e.g. trampling) to a truly global reach (e.g. sea-level rise). These pressures act at multiple temporal and spatial scales, translating into ecological impacts that are manifested across several dimensions in time and space so that today almost every beach on every coastline is threatened by human activities. Press disturbances (whatever the impact source involved) are becoming increasingly common, operating on time scales of years to decades. However, long-term data sets that describe either the natural dynamics of beach systems or the human impacts on beaches are scarce and fragmentary. A top priority is to implement long-term field experiments and monitoring programmes that quantify the dynamics of key ecological attributes on sandy beaches. Because of the inertia associated with global climate change and human population growth, no realistic management scenario will alleviate these threats in the short term. The immediate priority is to avoid further development of coastal areas likely to be directly impacted by retreating shorelines. There is also scope for improvement in experimental design to better distinguish natural variability from anthropogenic impacts. Sea-level rise and other effects of global warming are expected to intensify other anthropogenic pressures, and could cause unprecedented ecological impacts. The definition of the relevant scales of analysis, which will vary according to the magnitude of the impact and the organisational level under analysis, and the recognition of a physical-biological coupling at different scales, should be included in approaches to quantify impacts. Zoning strategies and marine reserves, which have not

  14. A Threats Blocking Plug-in for Open Source Learning Management Systems

    NASA Astrophysics Data System (ADS)

    Braga, Gianluca; Sterbini, Andrea; Temperini, Marco

    Web-based Learning Management Systems, as in the nature of web-applications, are subject to attacks delivered through Internet, mainly aiming at accessing restricted data for illegal use. Protection from these kinds of threats is studied in the area of web applications and has been steadily improving in the last years. Nonetheless, especially in the area of very popular and easy-to-install web applications, such as Content Managements Systems, Blogs, and open source Learning Management Systems, the usual way to protect an installed system is to wait that weaknesses in the system software are discovered, and "patches" or new system releases are made available for installation. And this can be necessary also in cases in which no new threat technique has been discovered, while just another part of the system software has been detected as "weak" to that type of attack. Here we give an account of the most usual "exploit" techniques, known to be available, and describe a prototype methodology to equip certain Learning Management Systems (namely the open source ones, in particular those based on PHP engines) with a more stable protection, making it unnecessary to patch, or reinstall, a system in a hurry, after that minor weaknesses have been unveiled. The plug-in for a system is supposed to filter the input, sent by the user through a browser, and to avoid execution of server activities on suspect data. We test the methodology on Moodle, by producing a suitable plug-in, and verifying its success at system run-time.

  15. The Practice of Campus-Based Threat Assessment: An Overview

    ERIC Educational Resources Information Center

    Pollard, Jeffrey W.; Nolan, Jeffrey J.; Deisinger, Eugene R. D.

    2012-01-01

    This article provides an overview of threat assessment and management as implemented on campuses of higher education. Standards of practice and state calls for implementation are cited. An overview of some of the basic principles for threat assessment and management implementation is accompanied by examples of how they are utilized. Pitfalls…

  16. Student Threat Assessment in Memphis City Schools: A Descriptive Report

    ERIC Educational Resources Information Center

    Strong, Ken; Cornell, Dewey

    2008-01-01

    Threat assessment has been widely recommended as a violence prevention approach for schools, but there are few reports of its implementation. Memphis City Schools adapted the Virginia threat assessment guidelines (Cornell & Sheras, 2006) for use by a centralized team serving 194 schools and a student population of 118,000. This article describes…

  17. 49 CFR 1540.203 - Security threat assessment.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... check conducted by TSA. (2) A security threat assessment conducted under 49 CFR part 1572 for the... the best of my knowledge and belief and is provided in good faith. I understand that a knowing and... threat assessment conducted for the Free and Secure Trade (FAST) program administered by U.S. Customs...

  18. 49 CFR 1540.203 - Security threat assessment.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... check conducted by TSA. (2) A security threat assessment conducted under 49 CFR part 1572 for the... belief and is provided in good faith. I understand that a knowing and willful false statement, or an... threat assessment conducted for the Free and Secure Trade (FAST) program administered by U.S. Customs...

  19. An examination of stereotype threat effects on girls' mathematics performance.

    PubMed

    Ganley, Colleen M; Mingle, Leigh A; Ryan, Allison M; Ryan, Katherine; Vasilyeva, Marina; Perry, Michelle

    2013-10-01

    Stereotype threat has been proposed as 1 potential explanation for the gender difference in standardized mathematics test performance among high-performing students. At present, it is not entirely clear how susceptibility to stereotype threat develops, as empirical evidence for stereotype threat effects across the school years is inconsistent. In a series of 3 studies, with a total sample of 931 students, we investigated stereotype threat effects during childhood and adolescence. Three activation methods were used, ranging from implicit to explicit. Across studies, we found no evidence that the mathematics performance of school-age girls was impacted by stereotype threat. In 2 of the studies, there were gender differences on the mathematics assessment regardless of whether stereotype threat was activated. Potential reasons for these findings are discussed, including the possibility that stereotype threat effects only occur in very specific circumstances or that they are in fact occurring all the time. We also address the possibility that the literature regarding stereotype threat in children is subject to publication bias. PMID:23356523

  20. A Stereotype Threat Account of Boys' Academic Underachievement

    ERIC Educational Resources Information Center

    Hartley, Bonny L.; Sutton, Robbie M.

    2013-01-01

    Three studies examined the role of stereotype threat in boys' academic underachievement. Study 1 (children aged 4-10, n = 238) showed that girls from age 4 years and boys from age 7 years believed, and thought adults believed, that boys are academically inferior to girls. Study 2 manipulated stereotype threat, informing children aged…