Science.gov

Sample records for weaknesses threats strengths

  1. Big Data and Health Economics: Strengths, Weaknesses, Opportunities and Threats.

    PubMed

    Collins, Brendan

    2016-02-01

    'Big data' is the collective name for the increasing capacity of information systems to collect and store large volumes of data, which are often unstructured and time stamped, and to analyse these data by using regression and other statistical techniques. This is a review of the potential applications of big data and health economics, using a SWOT (strengths, weaknesses, opportunities, threats) approach. In health economics, large pseudonymized databases, such as the planned care.data programme in the UK, have the potential to increase understanding of how drugs work in the real world, taking into account adherence, co-morbidities, interactions and side effects. This 'real-world evidence' has applications in individualized medicine. More routine and larger-scale cost and outcomes data collection will make health economic analyses more disease specific and population specific but may require new skill sets. There is potential for biomonitoring and lifestyle data to inform health economic analyses and public health policy. PMID:26093888

  2. Health Education in India: A Strengths, Weaknesses, Opportunities, and Threats (SWOT) Analysis

    ERIC Educational Resources Information Center

    Sharma, Manoj

    2005-01-01

    The purpose of this study was to conduct a strengths, weaknesses, opportunities, and threats (SWOT) analysis of the health education profession and discipline in India. Materials from CINAHL, ERIC, MEDLINE, and Internet were collected to conduct the open coding of the SWOT analysis. Strengths of health education in India include an elaborate…

  3. Traits-based approaches in bioassessment and ecological risk assessment: strengths, weaknesses, opportunities and threats.

    PubMed

    Van den Brink, Paul J; Alexander, Alexa C; Desrosiers, Mélanie; Goedkoop, Willem; Goethals, Peter L M; Liess, Matthias; Dyer, Scott D

    2011-04-01

    We discuss the application of traits-based bioassessment approaches in retrospective bioassessment as well as in prospective ecological risk assessments in regulatory frameworks. Both approaches address the interaction between species and stressors and their consequences at different levels of biological organization, but the fact that a specific species may be less abundant in a potentially impacted site compared with a reference site is, regrettably, insufficient to provide diagnostic information. Species traits may, however, overcome the problems associated with taxonomy-based bioassessment. Trait-based approaches could provide signals regarding what environmental factors may be responsible for the impairment and, thereby, provide causal insight into the interaction between species and stressors. For development of traits-based (TBA), traits should correspond to specific types of stressors or suites of stressors. In this paper, a strengths, weaknesses, opportunities, and threats (SWOT) analysis of TBA in both applications was used to identify challenges and potentials. This paper is part of a series describing the output of the TERA (Traits-based ecological risk assessment: Realising the potential of ecoinformatics approaches in ecotoxicology) Workshop held between 7 and 11 September, 2009, in Burlington, Ontario, Canada. The recognized strengths were that traits are transferrable across geographies, add mechanistic and diagnostic knowledge, require no new sampling methodology, have an old tradition, and can supplement taxonomic analysis. Weaknesses include autocorrelation, redundancy, and inability to protect biodiversity directly. Automated image analysis, combined with genetic and biotechnology tools and improved data analysis to solve autocorrelation problems were identified as opportunities, whereas low availability of trait data, their transferability, their quantitative interpretation, the risk of developing nonrelevant traits, low quality of historic databases, and their standardization were listed as threats. PMID:20981837

  4. Partitioning in aqueous two-phase systems: Analysis of strengths, weaknesses, opportunities and threats.

    PubMed

    Soares, Ruben R G; Azevedo, Ana M; Van Alstine, James M; Aires-Barros, M Raquel

    2015-08-01

    For half a century aqueous two-phase systems (ATPSs) have been applied for the extraction and purification of biomolecules. In spite of their simplicity, selectivity, and relatively low cost they have not been significantly employed for industrial scale bioprocessing. Recently their ability to be readily scaled and interface easily in single-use, flexible biomanufacturing has led to industrial re-evaluation of ATPSs. The purpose of this review is to perform a SWOT analysis that includes a discussion of: (i) strengths of ATPS partitioning as an effective and simple platform for biomolecule purification; (ii) weaknesses of ATPS partitioning in regard to intrinsic problems and possible solutions; (iii) opportunities related to biotechnological challenges that ATPS partitioning may solve; and (iv) threats related to alternative techniques that may compete with ATPS in performance, economic benefits, scale up and reliability. This approach provides insight into the current status of ATPS as a bioprocessing technique and it can be concluded that most of the perceived weakness towards industrial implementation have now been largely overcome, thus paving the way for opportunities in fermentation feed clarification, integration in multi-stage operations and in single-step purification processes. PMID:26213222

  5. Analysis of Strengths, Weaknesses, Opportunities, and Threats as a Tool for Translating Evidence into Individualized Medical Strategies (I-SWOT)

    PubMed Central

    von Kodolitsch, Yskert; Bernhardt, Alexander M.; Robinson, Peter N.; Kölbel, Tilo; Reichenspurner, Hermann; Debus, Sebastian; Detter, Christian

    2015-01-01

    Background It is the physicians’ task to translate evidence and guidelines into medical strategies for individual patients. Until today, however, there is no formal tool that is instrumental to perform this translation. Methods We introduce the analysis of strengths (S) and weaknesses (W) related to therapy with opportunities (O) and threats (T) related to individual patients as a tool to establish an individualized (I) medical strategy (I-SWOT). The I-SWOT matrix identifies four fundamental types of strategy. These comprise “SO” maximizing strengths and opportunities, “WT” minimizing weaknesses and threats, “WO” minimizing weaknesses and maximizing opportunities, and “ST” maximizing strengths and minimizing threats. Each distinct type of strategy may be considered for individualized medical strategies. Results We describe four steps of I-SWOT to establish an individualized medical strategy to treat aortic disease. In the first step, we define the goal of therapy and identify all evidence-based therapeutic options. In a second step, we assess strengths and weaknesses of each therapeutic option in a SW matrix form. In a third step, we assess opportunities and threats related to the individual patient, and in a final step, we use the I-SWOT matrix to establish an individualized medical strategy through matching “SW” with “OT”. As an example we present two 30-year-old patients with Marfan syndrome with identical medical history and aortic pathology. As a result of I-SWOT analysis of their individual opportunities and threats, we identified two distinct medical strategies in these patients. Conclusion I-SWOT is a formal but easy to use tool to translate medical evidence into individualized medical strategies. PMID:27069939

  6. Model-based drug development: strengths, weaknesses, opportunities, and threats for broad application of pharmacometrics in drug development.

    PubMed

    Wetherington, Jeffrey D; Pfister, Marc; Banfield, Christopher; Stone, Julie A; Krishna, Rajesh; Allerheiligen, Sandy; Grasela, Dennis M

    2010-09-01

    Systematic implementation of model-based drug development (MBDD) to drug discovery and development has the potential to significantly increase the rate of medical breakthroughs and make available new and better treatments to patients. An analysis of the strengths, weaknesses, opportunities, and threats (ie, SWOT) was conducted through focus group discussions that included 24 members representing 8 pharmaceutical companies to systematically assess the challenges to implementing MBDD into the drug development decision-making process. The application of the SWOT analysis to the successful implementation of MBDD yielded 19 strengths, 27 weaknesses, 34 opportunities, and 22 threats, which support the following conclusions. The shift from empirical drug development to MBDD requires a question-based mentality; early, proactive planning; dynamic access to multisource data; quantitative knowledge integration; multidisciplinary collaboration; effective communication and leadership skills; and innovative, impactful application of pharmacometrics focused on enhancing quantitative decision making. The ultimate goal of MBDD is to streamline discovery and development of innovative medicines to benefit patients. PMID:20881215

  7. An Examination of the Strengths, Weaknesses, Opportunities, and Threats Associated with the Adoption of Moodle[TM] by eXtension

    ERIC Educational Resources Information Center

    Hightower, Tayla Elise; Murphrey, Theresa Pesl; Coppernoll, Susanna Mumm; Jahedkar, Jennifer; Dooley, Kim E.

    2011-01-01

    The use of technology to deliver programming across Extension has been addressed widely; however, little research has been conducted concerning the use of Moodle[TM] as a course management system for Extension. The purpose of the study reported here was to identify the strengths, weaknesses, opportunities, and threats associated with the use of…

  8. Special Education and Rehabilitation in Georgia: Strengths, Weakness, Opportunities, and Threats in a Newly-Independent State of the Former Soviet Union.

    ERIC Educational Resources Information Center

    Hobbs, Tim; Szydlowski, Steven; West, Daniel, Jr.; Germava, Otar

    2002-01-01

    Forty-nine Georgian professionals from the fields of health, education, and rehabilitation were brought together for a week-long workshop to discuss issues related to disability, rehabilitation, and special education. Workshop activities included a SWOT (strengths, weaknesses, opportunities, and threats) analysis of special education in Georgia.…

  9. Strategic analyses in nursing schools: attracting, educating, and graduating more nursing students: part I--strengths, weaknesses, opportunities, and threats analysis.

    PubMed

    Crow, Stephen M; Hartman, Sandra J; Mahesh, Sathiadev; McLendon, Christy L; Henson, Steve W; Jacques, Paul

    2008-01-01

    The shortage of nurses in the United States remains a persistent problem. Faced with this reality, nursing programs in colleges and universities continue to struggle to expand enrollment levels to meet the spiraling demand. This research uses familiar tools in strategic management: the strengths, weaknesses, opportunities, and threats (SWOT) analysis and stakeholder analysis as initial steps to draw more students to the profession of nursing. In a 2-round modified Delphi survey, chief administrators of schools of nursing identify the main SWOT of schools of nursing and the important internal and external stakeholders that influence nursing school success. The authors of the research suggest ways to use that knowledge to increase the enrollment level of nursing students. Part I of this research focuses on the SWOT analyses. PMID:18695403

  10. Perceived Strengths, Weaknesses, Opportunities, and Threats Impacting the Diffusion of Distance Education Technologies in a College of Agriculture and Life Sciences.

    ERIC Educational Resources Information Center

    Murphrey, Theresa Pesl; Dooley, Kim E.

    2000-01-01

    Interviews with administrators, faculty, and support staff (n=42) in a university agriculture department revealed that they recognized distance technology as a means of reaching new audiences; policies and procedures must expand to address technology issues; competition, external dependence, and Internet misinformation were threats.…

  11. The interRAI Acute Care instrument incorporated in an eHealth system for standardized and web-based geriatric assessment: strengths, weaknesses, opportunities and threats in the acute hospital setting

    PubMed Central

    2013-01-01

    Background The interRAI Acute Care instrument is a multidimensional geriatric assessment system intended to determine a hospitalized older persons medical, psychosocial and functional capacity and needs. Its objective is to develop an overall plan for treatment and long-term follow-up based on a common set of standardized items that can be used in various care settings. A Belgian web-based software system (BelRAI-software) was developed to enable clinicians to interpret the output and to communicate the patients data across wards and care organizations. The purpose of the study is to evaluate the (dis)advantages of the implementation of the interRAI Acute Care instrument as a comprehensive geriatric assessment instrument in an acute hospital context. Methods In a cross-sectional multicenter study on four geriatric wards in three acute hospitals, trained clinical staff (nurses, occupational therapists, social workers, and geriatricians) assessed 410 inpatients in routine clinical practice. The BelRAI-system was evaluated by focus groups, observations, and questionnaires. The Strengths, Weaknesses, Opportunities and Threats were mapped (SWOT-analysis) and validated by the participants. Results The primary strengths of the BelRAI-system were a structured overview of the patients condition early after admission and the promotion of multidisciplinary assessment. Our study was a first attempt to transfer standardized data between home care organizations, nursing homes and hospitals and a way to centralize medical, allied health professionals and nursing data. With the BelRAI-software, privacy of data is guaranteed. Weaknesses are the time-consuming character of the process and the overlap with other assessment instruments or (electronic) registration forms. There is room for improving the user-friendliness and the efficiency of the software, which needs hospital-specific adaptations. Opportunities are a timely and systematic problem detection and continuity of care. An actual shortage of funding of personnel to coordinate the assessment process is the most important threat. Conclusion The BelRAI-software allows standardized transmural information transfer and the centralization of medical, allied health professionals and nursing data. It is strictly secured and follows strict privacy regulations, allowing hospitals to optimize (transmural) communication and interaction. However, weaknesses and threats exist and must be tackled in order to promote large scale implementation. PMID:24007312

  12. Weakness

    MedlinePlus

    Lack of strength; Muscle weakness ... feel weak but have no real loss of strength. This is called subjective weakness. It may be ... flu. Or, you may have a loss of strength that can be noted on a physical exam. ...

  13. The Hidden Strengths of Weak Theories

    PubMed Central

    Keil, Frank

    2012-01-01

    There has been a strong tradition of assuming that concepts, and their patterns of formation might be best understood in terms of how they are embedded in theory-like sets of beliefs. Although such views of concepts as embedded in theories have been criticized on five distinct grounds, there are reasonable responses to each of these usual objections. There is, however, a newly emerging concern that is much more challenging to address – people’s intuitive theories seem to be remarkably impoverished. In fact, they are so impoverished it is difficult to see how they could provide the necessary structure to explain differences between concepts and how they might form in development. One response to this recent challenge is to abandon all views of concept structure as being related to people’s intuitive theories and see concepts as essentially structure-free atoms. The alternative proposed here argues that our very weak theories might in fact do a great deal of work in explaining how we form concepts and are able to use them to successfully refer. PMID:25309684

  14. The Mathematical Strengths and Weaknesses of Children with Dyslexia

    ERIC Educational Resources Information Center

    Simmons, Fiona R.; Singleton, Chris

    2009-01-01

    This paper reports the findings of two related studies that examined the mathematical strengths and weaknesses of children with dyslexia. In study one, dyslexic children were compared to children without special educational needs on tests that assessed arithmetic fact recall, place value understanding and counting speed. Study two used the same…

  15. School-Based Sexuality Education in Portugal: Strengths and Weaknesses

    ERIC Educational Resources Information Center

    Rocha, Ana Cristina; Leal, Cludia; Duarte, Cidlia

    2016-01-01

    Portugal, like many other countries, faces obstacles regarding school-based sexuality education. This paper explores Portuguese schools' approaches to implementing sexuality education at a local level, and provides a critical analysis of potential strengths and weaknesses. Documents related to sexuality education in a convenience sample of 89

  16. Patterns of Strengths and Weaknesses in Children's Knowledge about Fractions

    ERIC Educational Resources Information Center

    Hecht, Steven A.; Vagi, Kevin J.

    2012-01-01

    The purpose of this study was to explore individual patterns of strengths and weaknesses in children's mathematical knowledge about common fractions. Tasks that primarily measure either conceptual or procedural aspects of mathematical knowledge were assessed with the same children in their fourth- and fifth-grade years (N = 181, 56% female and 44%

  17. School-Based Sexuality Education in Portugal: Strengths and Weaknesses

    ERIC Educational Resources Information Center

    Rocha, Ana Cristina; Leal, Cláudia; Duarte, Cidália

    2016-01-01

    Portugal, like many other countries, faces obstacles regarding school-based sexuality education. This paper explores Portuguese schools' approaches to implementing sexuality education at a local level, and provides a critical analysis of potential strengths and weaknesses. Documents related to sexuality education in a convenience sample of 89…

  18. Relative Mechanical Strengths of Weak Bonds in Sonochemical Polymer Mechanochemistry.

    PubMed

    Lee, Bobin; Niu, Zhenbin; Wang, Junpeng; Slebodnick, Carla; Craig, Stephen L

    2015-08-26

    The mechanical strength of scissile chemical bonds plays a role in material failure and in the mechanical activation of latent reactivity, but quantitative measures of mechanical strength are rare. Here, we report the relative mechanical strength of polymers bearing three putatively "weak" scissile bonds: the carbon-nitrogen bond of an azobisdialkylnitrile (<30 kcal mol(-1)), the carbon-sulfur bond of a thioether (71-74 kcal mol(-1)), and the carbon-oxygen bond of a benzylphenyl ether (52-54 kcal mol(-1)). The mechanical strengths are assessed in the context of chain scission triggered by pulsed sonication of polymer solutions, by using two complementary techniques: (i) the competition within a single polymer chain between the bond scission of interest and the nonscissile mechanochemical ring opening of gem-dichlorocyclopropane mechanophores and (ii) the molecular weights at long (4 h) sonication times of multimechanophore polymers. The two methods produce a consistent story: in contrast to their thermodynamic strengths, the relative mechanical strengths of the three weak bonds are azobisdialkylnitrile (weakest) < thioether < benzylphenyl ether. The greater mechanical strength of the benzylphenyl ether relative to the thermodynamically stronger carbon-sulfur bond is ascribed to poor mechanochemical coupling, at least in part as a result of the rehybridization that accompanies carbon-oxygen bond scission. PMID:26247609

  19. Radiochemistry in the twenty-first century: Strenghts, weaknesses, opportunities and threats

    NASA Astrophysics Data System (ADS)

    de Goeij, J. J. M.

    2003-01-01

    Strengths, weaknesses, opportunities and threats of radiochemistry and associated nuclear chemistry are discussed. For that purpose radiochemistry is subdivided into three categories. The first category covers fundamental aspects, e.g. nuclear reaction cross-sections, production routes with associated yields and radionuclidic impurities, decay schemes, radiochemical separations, recoil and hot-atom chemistry, isotope effects and fractionation, and interaction of radiation with matter and detection. The second category covers topics where radioactivity is inextricably involved, e.g. the nuclear fuel cycle, very heavy elements and other actinides, primordial and cosmogenic radioactivity, and radionuclide techniques for dating. The third category involves radioactivity as essential part of a technique. On one hand radioactivity is used here as source of ionising radiation for food conservation, polymerisation of plastics, sterilisation, radiotherapy and pain palliation. On the other hand it is used to get information on systems and materials, via radiotracer methods and nuclear activation techniques. In particular the latter field is experiencing strong competition with other, non-nuclear methods. In this frame it is indicated what is required to achieve a situation where nuclear analytical techniques may successfully be exploited to the full extent of their potentials, particularly in providing valuable and sometimes unique information.

  20. Strengths and Weaknesses of NESTs and NNESTs: Perceptions of NNESTs in Hong Kong

    ERIC Educational Resources Information Center

    Ma, Lai Ping Florence

    2012-01-01

    Since non-native English speaking teachers (NNESTs) are always compared with native English speaking teachers (NESTs) on linguistic grounds, their strengths and weaknesses as English teachers are worthy of investigation. This paper reports on a mixed methods study which examines the strengths and weaknesses of NNESTs and NESTs through the

  1. Committee Effectiveness in Higher Education: The Strengths and Weaknesses of Group Decision Making

    ERIC Educational Resources Information Center

    Bates, Stephen B.

    2014-01-01

    Focusing on five models of committee effectiveness for purposes of this assessment will lend insight into the strengths and weaknesses of utilizing a structured action plan as a guide to achieving and maintaining optimum committee effectiveness in higher education. In the compilation of the strengths and weaknesses of committee decision making,…

  2. Strengths and Weaknesses of NESTs and NNESTs: Perceptions of NNESTs in Hong Kong

    ERIC Educational Resources Information Center

    Ma, Lai Ping Florence

    2012-01-01

    Since non-native English speaking teachers (NNESTs) are always compared with native English speaking teachers (NESTs) on linguistic grounds, their strengths and weaknesses as English teachers are worthy of investigation. This paper reports on a mixed methods study which examines the strengths and weaknesses of NNESTs and NESTs through the…

  3. Separate and interactive contributions of weak inhibitory control and threat sensitivity to prediction of suicide risk.

    PubMed

    Venables, Noah C; Sellbom, Martin; Sourander, Andre; Kendler, Kenneth S; Joiner, Thomas E; Drislane, Laura E; Sillanmki, Lauri; Elonheimo, Henrik; Parkkola, Kai; Multimaki, Petteri; Patrick, Christopher J

    2015-04-30

    Biobehavioral dispositions can serve as valuable referents for biologically oriented research on core processes with relevance to many psychiatric conditions. The present study examined two such dispositional variables-weak response inhibition (or disinhibition; INH-) and threat sensitivity (or fearfulness; THT+)-as predictors of the serious transdiagnostic problem of suicide risk in two samples: male and female outpatients from a U.S. clinic (N=1078), and a population-based male military cohort from Finland (N=3855). INH- and THT+ were operationalized through scores on scale measures of disinhibition and fear/fearlessness, known to be related to DSM-defined clinical conditions and brain biomarkers. Suicide risk was assessed by clinician ratings (clinic sample) and questionnaires (both samples). Across samples and alternative suicide indices, INH- and THT+ each contributed uniquely to prediction of suicide risk-beyond internalizing and externalizing problems in the case of the clinic sample where diagnostic data were available. Further, in both samples, INH- and THT+ interactively predicted suicide risk, with individuals scoring concurrently high on both dispositions exhibiting markedly augmented risk. Findings demonstrate that dispositional constructs of INH- and THT+ are predictive of suicide risk, and hold potential as referents for biological research on suicidal behavior. PMID:25712631

  4. [Archaeology and criminology--Strengths and weaknesses of interdisciplinary cooperation].

    PubMed

    Bachhiesl, Christian

    2015-01-01

    Interdisciplinary cooperation of archaeology and criminology is often focussed on the scientific methods applied in both fields of knowledge. In combination with the humanistic methods traditionally used in archaeology, the finding of facts can be enormously increased and the subsequent hermeneutic deduction of human behaviour in the past can take place on a more solid basis. Thus, interdisciplinary cooperation offers direct and indirect advantages. But it can also cause epistemological problems, if the weaknesses and limits of one method are to be corrected by applying methods used in other disciplines. This may result in the application of methods unsuitable for the problem to be investigated so that, in a way, the methodological and epistemological weaknesses of two disciplines potentiate each other. An example of this effect is the quantification of qualia. These epistemological reflections are compared with the interdisciplinary approach using the concrete case of the "Eulau Crime Scene". PMID:26419086

  5. Nuclear energy: Its strengths, weaknesses and role in Finland

    NASA Astrophysics Data System (ADS)

    Ruuskanen, A.

    Nuclear energy has, in principle, various strengths as an energy form. In spite of the drawbacks of nuclear power, the benefits exceed its cost. That is why power companies in Finland have decided to apply for the construction, of the fifth nuclear power plant during Spring 1991. Electricity consumption is increasing, and new power producing capacity will be needed. Nuclear power is seen as the best alternative for producing baseload power in Finnish conditions.

  6. Orbital Resonances in the Solar Nebula: Strengths and Weaknesses

    NASA Technical Reports Server (NTRS)

    Malhotra, Renu

    1993-01-01

    A planetesimal moving in the Solar Nebula experiences an aero- dynamic drag which causes its orbit to circularize and shrink. However, resonant perturbations from a protoplanet interior to the planetesimal's orbit ran counteract both the orbital decay and the damping of the eccentricity: the planetesimal can be captured into an orbital resonance and its eccentricity pumped up to a modestly high equilibrium value. Thus, orbital resonances constitute (partial) barriers to the delivery of planetesimals into the feeding zone of the protoplanet. We have established the characteristics of the phenomenon of resonance capture by gas drag in the circular restricted three-body approximation. We have determined the strengths of the equilibrium resonant orbits with respect to impulsive velocity perturbations. We conclude that planetesimals captured in orbital resonances are quite vulnerable to being dislocated from these orbits by mutual planetesimal interactions, but that the resonances are effective in slowing down the rate of orbital decay of planetesimals. Only very small bodies, less or approx. equal to 100 m, are able to reach a approx. 1 mass of the earth protoplanet without being slowed down by resonances.

  7. Orbital Resonances in the Solar Nebula: Strengths and Weaknesses

    NASA Technical Reports Server (NTRS)

    Malhotra, Renu

    1993-01-01

    A planetesimal moving in the Solar Nebula experiences an aerodynamic drag which causes its orbit to circularize and shrink. However, resonant perturbations from a protoplanet interior to the planetesimal's orbit can counteract both the orbital decay and the damping of the eccentricity: the planetesimal can be captured into an orbital resonance and its eccentricity pumped up to a modestly high equilibrium value. Thus, orbital resonances constitute (partial) barriers to the delivery of planetesimals into the feeding zone of the protoplanet. We have established the characteristics of the phenomenon of resonance capture by gas drag in the circular restricted three-body approximation. We have determined the strengths of the equilibrium resonant orbits with respect to impulsive velocity perturbations. We conclude that planetesimals captured in orbital resonances are quite vulnerable to being dislocated from these orbits by mutual planetesimal interactions, but that the resonances are effective in slowing down the rate of orbital decay of planetesimals. Only very small bodies, less than or equal to 100 m, are able to reach a approx. 1 Earth mass protoplanet without being slowed down by resonances.

  8. Objective Evaluation of Muscle Strength in Infants with Hypotonia and Muscle Weakness

    ERIC Educational Resources Information Center

    Reus, Linda; van Vlimmeren, Leo A.; Staal, J. Bart; Janssen, Anjo J. W. M.; Otten, Barto J.; Pelzer, Ben J.; Nijhuis-van der Sanden, Maria W. G.

    2013-01-01

    The clinical evaluation of an infant with motor delay, muscle weakness, and/or hypotonia would improve considerably if muscle strength could be measured objectively and normal reference values were available. The authors developed a method to measure muscle strength in infants and tested 81 typically developing infants, 6-36 months of age, and 17

  9. Objective Evaluation of Muscle Strength in Infants with Hypotonia and Muscle Weakness

    ERIC Educational Resources Information Center

    Reus, Linda; van Vlimmeren, Leo A.; Staal, J. Bart; Janssen, Anjo J. W. M.; Otten, Barto J.; Pelzer, Ben J.; Nijhuis-van der Sanden, Maria W. G.

    2013-01-01

    The clinical evaluation of an infant with motor delay, muscle weakness, and/or hypotonia would improve considerably if muscle strength could be measured objectively and normal reference values were available. The authors developed a method to measure muscle strength in infants and tested 81 typically developing infants, 6-36 months of age, and 17…

  10. In the students' own words: what are the strengths and weaknesses of the dental school curriculum?

    PubMed

    Henzi, David; Davis, Elaine; Jasinevicius, Roma; Hendricson, William

    2007-05-01

    Dental students have little input into the selection of course topics and subject matter included in their dental curricula. Curriculum requirements are framed by the Commission on Dental Accreditation, which has stipulated competencies and associated biomedical and clinical knowledge that must be addressed during dental school. Although these competency requirements restrict the variance of educational experiences, students are eager to share their views on the curriculum within the realm of their educational experience. The objective of this research project was to elicit the perspectives of dental students from a broad cross-section of U.S. and Canadian dental schools about their education. A total of 605 students (285 sophomores, 220 seniors, 100 residents) from twenty North American dental schools completed a SWOT (Strengths, Weaknesses, Opportunities, and Threats) analysis to communicate their perceptions of the curriculum. Students were also asked to provide their impressions of the overall quality of the educational program in an open-ended written format. The students' qualitative comments were then reviewed and categorized into key issues or themes. Resulting themes for each category of the Curriculum SWOT (C-SWOT) analysis were the following. Strengths: 1) clinical learning experience, and 2) opportunity to work with knowledgeable faculty. Weaknesses: 1) disorganized and inefficient clinical learning environment, 2) teaching and testing that focus on memorization, 3) poor quality instruction characterized by curricular disorganization, and 4) inconsistency among instructors during student evaluations. Opportunities: 1) develop strategies to provide students with more exposure to patients, especially early in the curriculum, and 2) opportunities to learn new technology/techniques. Threats: 1) cost of dental education, 2) students' concerns about faculty "brain drain," i.e., lack of sufficient numbers of dental faculty capable of providing high-quality instruction, and 3) questionable treatment of patients in the dental clinic as a consequence of pursuing procedural requirements. This report presents commentaries selected from 2,421 total responses that communicate students' perspectives related to C-SWOT themes. Students at seven schools in this study reported that they completed all or portions of the first two years of the curriculum in combined classes with medical students. Sophomore and senior students at these schools provided their thoughts on this curricular approach; these perceptions are also reported. Findings from this study are compared to results from a similar investigation of dental student perceptions conducted fifty years ago. We conclude that students participating in this study were positive overall about their learning experiences in dental schools, but identified several areas that appear to be problematic for many students at a variety of different schools including fundamental concerns about instructional quality in some areas of the curriculum. Academic program administrators in dental schools can use these findings to guide modifications that will enhance the overall dental education experience. PMID:17493972

  11. Internationally Adopted Children in the Early School Years: Relative Strengths and Weaknesses in Language Abilities

    ERIC Educational Resources Information Center

    Glennen, Sharon

    2015-01-01

    Purpose: This study aimed to determine the relative strengths and weaknesses in language and verbal short-term memory abilities of school-age children who were adopted from Eastern Europe. Method: Children adopted between 1;0 and 4;11 (years;months) of age were assessed with the Clinical Evaluation of Language Fundamentals-Preschool, Second

  12. Building a Performance-Based Assessment System To Diagnose Strengths and Weaknesses in Reading Achievement.

    ERIC Educational Resources Information Center

    Hennings, Sara S.; Hughes, Kay E.

    This paper provides a brief description of the development of the Diagnostic Assessments of Reading with Trial Teaching Strategies (DARTTS) program by F. G. Roswell and J. S. Chall. It also describes the editorial and statistical procedures that were used to validate the program for determining students' strengths and weaknesses in important areas…

  13. Patterns of Cognitive Strengths and Weaknesses: Identification Rates, Agreement, and Validity for Learning Disabilities Identification

    ERIC Educational Resources Information Center

    Miciak, Jeremy; Fletcher, Jack M.; Stuebing, Karla K.; Vaughn, Sharon; Tolar, Tammy D.

    2014-01-01

    Few empirical investigations have evaluated learning disabilities (LD) identification methods based on a pattern of cognitive strengths and weaknesses (PSW). This study investigated the reliability and validity of two proposed PSW methods: the concordance/discordance method (C/DM) and cross battery assessment (XBA) method. Cognitive assessment…

  14. Profiles of Strengths and Weaknesses in Dyslexia and Other Learning Difficulties

    ERIC Educational Resources Information Center

    Everatt, John; Weeks, Sally; Brooks, Peter

    2008-01-01

    A total of 83 children with different special educational needs (SEN) assessments were contrasted with a control group (N = 40) without special needs on measures that aimed to identify potential areas of strengths as well as weaknesses in these SEN groups. Carefully selected groups of dyslexics, dyspraxics, children with specific language…

  15. Internationally Adopted Children in the Early School Years: Relative Strengths and Weaknesses in Language Abilities

    ERIC Educational Resources Information Center

    Glennen, Sharon

    2015-01-01

    Purpose: This study aimed to determine the relative strengths and weaknesses in language and verbal short-term memory abilities of school-age children who were adopted from Eastern Europe. Method: Children adopted between 1;0 and 4;11 (years;months) of age were assessed with the Clinical Evaluation of Language Fundamentals-Preschool, Second…

  16. The Strength of Weak Ties in Electronic Development of the Scholarly Communication System.

    ERIC Educational Resources Information Center

    Schwartz, Charles A.

    1994-01-01

    Three overlapping models of new technology diffusion are described in relation to the Internet: (1) individual threshold; (2) critical mass; and (3) strength of weak ties. The prospective role of academic libraries in the electronic development of the scholarly communication system is discussed, and further research is suggested. (55 references)…

  17. Strategic marketing management for health management: cross impact matrix and TOWS (threats, opportunities, weaknesses, strengths).

    PubMed

    Proctor, T

    2000-01-01

    Organisations operate within a three-tiered environment--internal, micro and macro. The environment is a powerful force acting upon the effectiveness of strategic decision making. Failure to take cognisance of the influence of the three-tiered environment can have disastrous consequences. The cross-impact matrix and the TOWS matrix are two strategic decision-making aids that improve effective decision making. When used in conjunction with creative problem solving methods they can provide the basis of a powerful management tool. PMID:11183998

  18. The power of the mind: the cortex as a critical determinant of muscle strength/weakness.

    PubMed

    Clark, Brian C; Mahato, Niladri K; Nakazawa, Masato; Law, Timothy D; Thomas, James S

    2014-12-15

    We tested the hypothesis that the nervous system, and the cortex in particular, is a critical determinant of muscle strength/weakness and that a high level of corticospinal inhibition is an important neurophysiological factor regulating force generation. A group of healthy individuals underwent 4 wk of wrist-hand immobilization to induce weakness. Another group also underwent 4 wk of immobilization, but they also performed mental imagery of strong muscle contractions 5 days/wk. Mental imagery has been shown to activate several cortical areas that are involved with actual motor behaviors, including premotor and M1 regions. A control group, who underwent no interventions, also participated in this study. Before, immediately after, and 1 wk following immobilization, we measured wrist flexor strength, voluntary activation (VA), and the cortical silent period (SP; a measure that reflect corticospinal inhibition quantified via transcranial magnetic stimulation). Immobilization decreased strength 45.1 ± 5.0%, impaired VA 23.2 ± 5.8%, and prolonged the SP 13.5 ± 2.6%. Mental imagery training, however, attenuated the loss of strength and VA by ∼50% (23.8 ± 5.6% and 12.9 ± 3.2% reductions, respectively) and eliminated prolongation of the SP (4.8 ± 2.8% reduction). Significant associations were observed between the changes in muscle strength and VA (r = 0.56) and SP (r = -0.39). These findings suggest neurological mechanisms, most likely at the cortical level, contribute significantly to disuse-induced weakness, and that regular activation of the cortical regions via imagery attenuates weakness and VA by maintaining normal levels of inhibition. PMID:25274345

  19. The power of the mind: the cortex as a critical determinant of muscle strength/weakness

    PubMed Central

    Mahato, Niladri K.; Nakazawa, Masato; Law, Timothy D.; Thomas, James S.

    2014-01-01

    We tested the hypothesis that the nervous system, and the cortex in particular, is a critical determinant of muscle strength/weakness and that a high level of corticospinal inhibition is an important neurophysiological factor regulating force generation. A group of healthy individuals underwent 4 wk of wrist-hand immobilization to induce weakness. Another group also underwent 4 wk of immobilization, but they also performed mental imagery of strong muscle contractions 5 days/wk. Mental imagery has been shown to activate several cortical areas that are involved with actual motor behaviors, including premotor and M1 regions. A control group, who underwent no interventions, also participated in this study. Before, immediately after, and 1 wk following immobilization, we measured wrist flexor strength, voluntary activation (VA), and the cortical silent period (SP; a measure that reflect corticospinal inhibition quantified via transcranial magnetic stimulation). Immobilization decreased strength 45.1 ± 5.0%, impaired VA 23.2 ± 5.8%, and prolonged the SP 13.5 ± 2.6%. Mental imagery training, however, attenuated the loss of strength and VA by ∼50% (23.8 ± 5.6% and 12.9 ± 3.2% reductions, respectively) and eliminated prolongation of the SP (4.8 ± 2.8% reduction). Significant associations were observed between the changes in muscle strength and VA (r = 0.56) and SP (r = −0.39). These findings suggest neurological mechanisms, most likely at the cortical level, contribute significantly to disuse-induced weakness, and that regular activation of the cortical regions via imagery attenuates weakness and VA by maintaining normal levels of inhibition. PMID:25274345

  20. Profiles of strengths and weaknesses in dyslexia and other learning difficulties.

    PubMed

    Everatt, John; Weeks, Sally; Brooks, Peter

    2008-02-01

    A total of 83 children with different special educational needs (SEN) assessments were contrasted with a control group (N = 40) without special needs on measures that aimed to identify potential areas of strengths as well as weaknesses in these SEN groups. Carefully selected groups of dyslexics, dyspraxics, children with specific language difficulties, moderate learning disabilities, attention deficits and emotional/behavioural disorders were assessed on measures of literacy, phonological and verbal skills, non-verbal ability, problem behaviour scales and cognitive interference. Scores indicated that individual measures were relatively poor at specifically differentiating one SEN group from the controls and that all SEN groups presented evidence of literacy deficits despite potentially different causes for such acquisition difficulties. For most of the six SEN groups targeted, assessments that considered strengths as well as weaknesses provided a profile that specifically differentiated the group from the controls in contrast to the other SEN groups tested. PMID:17659648

  1. Targeting cancer’s weaknesses (not its strengths): Therapeutic strategies suggested by the atavistic model

    PubMed Central

    Lineweaver, Charles H.; Davies, Paul C.W.; Vincent, Mark D.

    2014-01-01

    In the atavistic model of cancer progression, tumor cell dedifferentiation is interpreted as a reversion to phylogenetically earlier capabilities. The more recently evolved capabilities are compromised first during cancer progression. This suggests a therapeutic strategy for targeting cancer: design challenges to cancer that can only be met by the recently evolved capabilities no longer functional in cancer cells. We describe several examples of this target-the-weakness strategy. Our most detailed example involves the immune system. The absence of adaptive immunity in immunosuppressed tumor environments is an irreversible weakness of cancer that can be exploited by creating a challenge that only the presence of adaptive immunity can meet. This leaves tumor cells more vulnerable than healthy tissue to pathogenic attack. Such a target-the-weakness therapeutic strategy has broad applications, and contrasts with current therapies that target the main strength of cancer: cell proliferation. PMID:25043755

  2. Structure and function of emergency care research networks: strengths, weaknesses, and challenges.

    PubMed

    Papa, Linda; Kuppermann, Nathan; Lamond, Katherine; Barsan, William G; Camargo, Carlos A; Ornato, Joseph P; Stiell, Ian G; Talan, David A

    2009-10-01

    The ability of emergency care research (ECR) to produce meaningful improvements in the outcomes of acutely ill or injured patients depends on the optimal configuration, infrastructure, organization, and support of emergency care research networks (ECRNs). Through the experiences of existing ECRNs, we can learn how to best accomplish this. A meeting was organized in Washington, DC, on May 28, 2008, to discuss the present state and future directions of clinical research networks as they relate to emergency care. Prior to the conference, at the time of online registration, participants responded to a series of preconference questions addressing the relevant issues that would form the basis of the breakout session discussions. During the conference, representatives from a number of existing ECRNs participated in discussions with the attendees and provided a description of their respective networks, infrastructure, and challenges. Breakout sessions provided the opportunity to further discuss the strengths and weaknesses of these networks and patterns of success with respect to their formation, management, funding, best practices, and pitfalls. Discussions centered on identifying characteristics that promote or inhibit successful networks and their interactivity, productivity, and expansion. Here the authors describe the current state of ECRNs and identify the strengths, weaknesses, and potential pitfalls of research networks. The most commonly cited strengths of population- or disease-based research networks identified in the preconference survey were access to larger numbers of patients; involvement of physician experts in the field, contributing to high-level study content; and the collaboration among investigators. The most commonly cited weaknesses were studies with too narrow a focus and restrictive inclusion criteria, a vast organizational structure with a risk of either too much or too little central organization or control, and heterogeneity of institutional policies and procedures among sites. Through the survey and structured discussion process involving multiple stakeholders, the authors have identified strengths and weaknesses that are consistent across a number of existing ECRNs. By leveraging the strengths and addressing the weaknesses, strategies can be adopted to enhance the scientific value and productivity of these networks and give direction to future ECRNs. PMID:19799579

  3. Strength of iron at core pressures and evidence for a weak Earth’s inner core

    SciTech Connect

    Gleason, A. E.; Mao, W. L.

    2013-05-12

    The strength of iron at extreme conditions is crucial information for interpreting geophysical observations of the Earth’s core and understanding how the solid inner core deforms. However, the strength of iron, on which deformation depends, is challenging to measure and accurately predict at high pressure. Here we present shear strength measurements of iron up to pressures experienced in the Earth’s core. Hydrostatic X-ray spectroscopy and non-hydrostatic radial X-ray diffraction measurements of the deviatoric strain in hexagonally close-packed iron uniquely determine its shear strength to pressures above 200 GPa at room temperature. Applying numerical modelling of the rheologic behaviour of iron under pressure, we extrapolate our experimental results to inner-core pressures and temperatures, and find that the bulk shear strength of hexagonally close-packed iron is only ~ 1 GPa at the conditions of the Earth’s centre, 364 GPa and 5,500 K. This suggests that the inner core is rheologically weak, which supports dislocation creep as the dominant creep mechanism influencing deformation.

  4. The strengths and weaknesses of NMR spectroscopy and mass spectrometry with particular focus on metabolomics research.

    PubMed

    Emwas, Abdul-Hamid M

    2015-01-01

    Mass spectrometry (MS) and nuclear magnetic resonance (NMR) have evolved as the most common techniques in metabolomics studies, and each brings its own advantages and limitations. Unlike MS spectrometry, NMR spectroscopy is quantitative and does not require extra steps for sample preparation, such as separation or derivatization. Although the sensitivity of NMR spectroscopy has increased enormously and improvements continue to emerge steadily, this remains a weak point for NMR compared with MS. MS-based metabolomics provides an excellent approach that can offer a combined sensitivity and selectivity platform for metabolomics research. Moreover, different MS approaches such as different ionization techniques and mass analyzer technology can be used in order to increase the number of metabolites that can be detected. In this chapter, the advantages, limitations, strengths, and weaknesses of NMR and MS as tools applicable to metabolomics research are highlighted. PMID:25677154

  5. Early experience affects the strength of vigilance for threat in rhesus monkey infants

    PubMed Central

    Mandalaywala, Tara M.; Parker, Karen J.; Maestripieri, Dario

    2014-01-01

    Both human and nonhuman primates exhibit a cognitive bias to social threat, but little is known about how this bias develops. We investigated the development of threat bias in free-ranging infant rhesus macaques (Macaca mulatta) at 3 (N = 45) and 9 (N = 46) months of age. Three-month-old infant monkeys did not display bias, but 9-month-olds exhibited increased maintenance of attention to threatening social stimuli (vigilance for threat). To examine whether the social environment affected vigilance for threat, behavioral data on maternal rank and protectiveness were collected across the first 12 weeks of life for infants tested at 9 months. Nine-month-old infants of high-ranking mothers and more protective mothers displayed greater vigilance for threat than infants of lower-ranking and less protective mothers. These results demonstrate that infant social cognition is malleable and shaped by mothers both directly (protectiveness) and indirectly (rank), as maternal characteristics affect infants’ social experiences. PMID:25125426

  6. Strengths and weaknesses of pharmacogenetic studies of antipsychotic drugs: the potential value of the PEPs study.

    PubMed

    Mas, Sergi; Llerena, Adrián; Saíz, Jerónimo; Bernardo, Miquel; Lafuente, Amalia

    2012-11-01

    The successful application of pharmacogenetics in routine clinical practice is still a long way from becoming a reality. In order to favor the transfer of pharmacogenetic results to clinical practice, especially in psychiatry, these studies must be optimized. This article reviews the strengths and weaknesses that characterize pharmacogenetic studies in psychiatry and condition their implementation in clinical practice. We also include recommendations for improving the design of pharmacogenetic studies, which may convert their limitations into strengths and facilitate the implementation of their results into clinical practice. Finally, we discuss the potential value of naturalistic, prospective, multicenter and coordinated projects such as the 'Phenotype-genotype and environmental interaction. Application of a predictive model in first psychotic episodes' (known as the PEPs study, from the Spanish abbreviation) in pharmacogenetic studies. PMID:23171340

  7. Motivated Implicit Theories of Personality: My Weaknesses Will Go Away, but My Strengths Are Here to Stay.

    PubMed

    Steimer, Andreas; Mata, André

    2016-04-01

    Across six studies, this research found consistent evidence for motivated implicit theories about personality malleability: People perceive their weaknesses as more malleable than their strengths. Moreover, motivation also influences how people see themselves in the future, such that they expect their present strengths to remain constant, but they expect their present weaknesses to improve in the future. Several additional findings suggest the motivational nature of these effects: The difference in perceived malleability for strengths versus weaknesses was only observed for the self, not for other people. When the desirability of possessing a certain trait was manipulated, that trait was perceived to be more malleable when it was depicted as undesirable. And these different beliefs that people have about how malleable their traits are, and how they will develop in the future, were associated with their desire for change, which is higher for weaknesses versus strengths. PMID:26984009

  8. Communicable Diseases Surveillance System in East Azerbaijan Earthquake: Strengths and Weaknesses

    PubMed Central

    Babaie, Javad; Fatemi, Farin; Ardalan, Ali; Mohammadi, Hamed; Soroush, Mahmood

    2014-01-01

    Background: A Surveillance System was established for 19 diseases/syndromes in order to prevent and control communicable diseases after 2012 East Azerbaijan earthquakes. This study was conducted to investigate the strengths and weaknesses of the established SS. Methods: This study was carried out on an interview-based qualitative study using content analysis in 2012. Data was collected by semi-structured deep interviews and surveillance data. Fifteen interviews were conducted with experts and health system managers who were engaged in implementing the communicable disease surveillance system in the affected areas. The selection of participants was purposeful. Data saturation supported the sample size. The collected data was analyzed using the principles suggested by Strauss and Corbin. Results: Establishment of the disease surveillance system was rapid and inexpensive. It collected the required data fast. It also increased confidence in health authorities that the diseases would be under control in earthquake-stricken regions. Non estimated denominator for calculating the rates (incidence & prevalence), non-participation of the private sector and hospitals, rapid turnover of health staff and unfamiliarity with the definitions of the diseases were the weak points of the established disease SS. Conclusion: During the time when surveillance system was active, no significant outbreak of communicable diseases was reported. However, the surveillance system had some weaknesses. Thus, considering Iran’s susceptibility to various natural hazards, repeated exercises should be conducted in the preparedness phase to decrease the weaknesses. In addition, other types of surveillance system such as web-based or mobile-based systems should be piloted in disaster situations for future. PMID:25685619

  9. Continental Rifts: Lithospheric Weakness and Strength Contrasts as Triggers for Necking Instabilities

    NASA Astrophysics Data System (ADS)

    Wenker, S.; Beaumont, C.

    2014-12-01

    Rifted margin geometry is too complex and diverse to be explained by simple kinematic models. Instead, we consider the effects of strain localization and the growth of necking instabilities as they apply to rifted margins. The intrinsic layering of the lithosphere will affect the growth rate of necking instabilities, leading to depth-dependent extension. In addition, continents are far from homogeneous after multiple cycles of collision, strike-slip motion and rifting. The resulting inherited heterogeneities may serve to localize strain and initiate necking instabilities. We use 2D finite element models containing embedded finite weak zones in the crust and/or mantle as well as a vertical lithospheric boundary across which lithospheric layering changes resulting in an overall strength contrast. We show that there are two controls on the style of rifting: Control 1, the stiff/pliable nature of the lithospheric layers and; Control 2, the distribution of the background strain rate in the lithosphere. Control 1 depends on the lithospheric rheology, such that necking instabilities grow faster in a stiff, dominantly plastic, layer than in equivalent layers with a pliable, mostly viscous, rheology. Control 2 is important where a strength contrast at a lithospheric boundary influences the distribution of the background strain rate. Necking is a mechanism that amplifies the background strain rate, which implies faster necking in parts of the lithosphere where background strain rates are highest. In a laterally homogeneous lithosphere, the background strain rate will be uniform in each layer and Control 1 will dominate giving necking in stiff layers. However, juxtaposed lithospheres with different strengths will distribute strain giving the weaker lithosphere the higher strain rate, implying the fastest necking may occur under Control 2 in pliable layers with the higher strain rate. An end-member case is where strong lithosphere acts as a rigid block. Here, no necking instability will develop, although inherited weaknesses may be present (Control 2). This has implications for the preservation of cratons, which are cold and strong, and probably stiff. Even though they contain inherited weak heterogeneities, they are protected by Control 2, provided they are surrounded by weakling lithospheres such as younger orogens.

  10. Strengths and weaknesses of Problem Based Learning from the professional perspective of registered nurses 1

    PubMed Central

    Cónsul-Giribet, María; Medina-Moya, José Luis

    2014-01-01

    OBJECTIVE: to identify competency strengths and weaknesses as perceived by nursing professionals who graduated with a integrated curriculum and competency-based through Problem Based Learning in small groups. METHOD: an intrinsic case study method was used, which analyzes this innovation through former students (from the first class) with three years of professional experience. The data were collected through a questionnaire and discussion groups. RESULTS: the results show that their competency level is valued in a very satisfactory manner. This level paradoxically contrasts with the lack of theoretical knowledge they perceived at the end of their education, when they started working in clinical practice. CONCLUSIONS: the teaching strategy was key to motivate an in-depth study and arouse the desire to know. In addition, Problem Based Learning favors and reinforces the decision to learn, which is that necessary in the course of professional life. PMID:25493666

  11. Pulse wave analysis and pulse wave velocity: a critical review of their strengths and weaknesses.

    PubMed

    Davies, Justine Ina; Struthers, Allan D

    2003-03-01

    The study of the pulse using the technique of applanation tonometry is undergoing a resurgence with the development of new computerized equipment. We aim here to present a critical review of the uses, potential uses, strengths and weaknesses of the technique of applanation tonometry for the assessment of augmentation index and pulse wave velocity. We will review the technique of applanation tonometry, the physiological factors affecting pulse wave velocity and pulse wave analysis, the changes in pulse wave velocity and pulse wave analysis with pharmacological interventions, and the use of the technique of applanation tonometry as a prognostic tool. We conclude that, although the technique of applanation tonometry initially seems promising, several pertinent issues need to be addressed before it can be used reliably as a clinical or research tool. Importantly, use of the technique of applanation tonometry to derive the central waveform from non-invasively acquired peripheral data needs to be validated prospectively. PMID:12640232

  12. The International Terrestrial Reference Frame: Strengths and Weaknesses of a Multi-technique Combination

    NASA Astrophysics Data System (ADS)

    Altamimi, Zuheir

    With the advent of space geodesy since the early eighties, a significant progress was achieved on the theoretical aspects of reference systems and frames, measurements, modeling and data analysis, as well as reference frame combination methodology. The International Terrestrial Reference Frame (ITRF), being a combined frame, inherits the strengths of the four space geodesy techniques (VLBI, SLR, GPS, DORIS) upon which it is formed, and mitigates and underlines their weaknesses in the combination process. Recent developments on reference frame representation, and in particular under the form of time series of station positions, underline the necessity to unambiguously clarify the meaningful of the metrological quantities observed or estimated by space geodesy. Admitting the basic terminology, distinguishing between the system (the theory) and the frame (the numerical implementation) seems to facilitate the educational part of understanding the meaningful of the geodetically estimated quantities. Based on this perspective, two classes of reference frames are of an extreme importance: a secular and an instantaneous reference frames. Relating both frames to each other requires rigorous geodetic and statistical models that have the ability to optimally preserve the frame definition and its physical properties. Within the framework of the ITRF combination activities, the paper focus is devoted to the discussion on how to optimally use the instantaneous frames, through time series analysis, for the secular frame determination, while faithfully preserving the physical quantities, e.g. frame origin and scale, linear and non linear parts of station motions. Past ITRF2005 and recent analysis are presented in this paper in order to illustrate the strengths and weaknesses, as well as future expected improvements of multi-technique combinations.

  13. The strengths and weaknesses of quantitative and qualitative research: what method for nursing?

    PubMed

    Carr, L T

    1994-10-01

    The overall purpose of research for any profession is to discover the truth of the discipline. This paper examines the controversy over the methods by which truth is obtained, by examining the differences and similarities between quantitative and qualitative research. The historically negative bias against qualitative research is discussed, as well as the strengths and weaknesses of both approaches, with issues highlighted by reference to nursing research. Consideration is given to issues of sampling; the relationship between the researcher and subject; methodologies and collated data; validity; reliability, and ethical dilemmas. The author identifies that neither approach is superior to the other; qualitative research appears invaluable for the exploration of subjective experiences of patients and nurses, and quantitative methods facilitate the discovery of quantifiable information. Combining the strengths of both approaches in triangulation, if time and money permit, is also proposed as a valuable means of discovering the truth about nursing. It is argued that if nursing scholars limit themselves to one method of enquiry, restrictions will be placed on the development of nursing knowledge. PMID:7822608

  14. The relationship between early ego strength and adolescent responses to the threat of nuclear war

    SciTech Connect

    Andrekus, N.J.

    1989-01-01

    Ego resiliency and ego control, measured when subjects were 3 or 4 years old, were related to expectation of war, concern for the future, and activism in response to the threat of nuclear war, measured when subjects were 18 years old. Data from 92 participants in a longitudinal study of ego and cognitive development conducted by Jeanne and Jack Block at the University of California, Berkeley were used to test hypotheses. Assessments with the California Child Q-set, composited across multiple independent observers, provide measures of ego resiliency and ego control. Adolescent interviews regarding the perception of likelihood of nuclear war, how this affects their future, and their antinuclear and general political activism were scaled and rated. Early ego resiliency and ego under control were hypothesized to account for the variance in adolescent nuclear responses and activism. The only significant longitudinal relationships were in the female sample, where ego under control was found to be a significant predictor of both general political activism (p<.01) and ideas of the future being affected by the nuclear threat (p<.05). Among males, the relationship between early ego resiliency and adolescent antinuclear activism approached significance (p<.10). Adolescent personality was significantly related to several measures of nuclear response. In girls, adolescent ego under control related to perception of likelihood of nuclear war (p<.05) and antinuclear activism (p<.05), and the interaction of ego resiliency and ego under control predicted general political activism (p<.0005). In boys, adolescent ego resiliency correlated with antinuclear activism (p<.05). These findings were discussed in terms of antecedent parenting styles, and conceptual links were drawn between children's ego resiliency and security of attachment, perspective taking, and moral development.

  15. Strengths and weaknesses of in-tube solid-phase microextraction: A scoping review.

    PubMed

    Fernández-Amado, M; Prieto-Blanco, M C; López-Mahía, P; Muniategui-Lorenzo, S; Prada-Rodríguez, D

    2016-02-01

    In-tube solid-phase microextraction (in-tube SPME or IT-SPME) is a sample preparation technique which has demonstrated over time its ability to couple with liquid chromatography (LC), as well as its advantages as a miniaturized technique. However, the in-tube SPME perspectives in the forthcoming years depend on solutions that can be brought to the environmental, industrial, food and biomedical analysis. The purpose of this scoping review is to examine the strengths and weaknesses of this technique during the period 2009 to 2015 in order to identify research gaps that should be addressed in the future, as well as the tendencies that are meant to strengthen the technique. In terms of methodological aspects, this scoping review shows the in-tube SPME strengths in the coupling with LC (LC-mass spectrometry, capillary LC, ultra-high-pressure LC), in the new performances (magnetic IT-SPME and electrochemically controlled in-tube SPME) and in the wide range of development of coatings and capillaries. Concerning the applicability, most in-tube SPME studies (around 80%) carry out environmental and biomedical analyses, a lower number food analyses and few industrial analyses. Some promising studies in proteomics have been performed. The review makes a critical description of parameters used in the optimization of in-tube SPME methods, highlighting the importance of some of them (i.e. type of capillary coatings). Commercial capillaries in environmental analysis and laboratory-prepared capillaries in biomedical analysis have been employed with good results. The most consolidated configuration is in-valve mode, however the cycle mode configuration is frequently chosen for biomedical analysis. This scoping review revealed that some aspects such as the combination of in-tube SPME with other sample treatment techniques for the analysis of solid samples should be developed in depth in the near future. PMID:26772124

  16. Analysis of the strengths and weaknesses of acid rain electronic data reports

    SciTech Connect

    Schott, J.

    1997-12-31

    Entergy Corporation is a Phase II utility with a fossil generation base composed primarily of natural gas and low sulfur coal. This paper presents an analysis of a large Phase II utility`s continuous emissions monitoring data reported to EPA under Title IV Acid Rain. Electric utilities currently report hourly emissions of NO{sub x}, SO{sub 2}, CO{sub 2}, fuel use, and generation through electronic data reports to EPA. This paper describes strengths and weaknesses of the data reported to EPA as determined through an analysis of 1995 data. Emissions reported by this company under acid rain for SO{sub 2} and NO{sub x} are very different from emissions reported to state agencies for annual emission inventory purposes in past years and will represent a significant break with historic trends. A comparison of emissions has been made of 1995 emissions reported under Electronic Data Reports to the emissions that would have been reported using emission factors and fuel data in past years. In addition, the paper examines the impacts of 40 CFR Part 75 Acid Rain requirements such as missing data substitution and monitor bias adjustments. Measurement system errors including stack flow measurement and false NO{sub x}Lb/MMBtu readings at very low loads are discussed. This paper describes the implications for public policy, compliance, emissions inventories, and business decisions of Part 75 acid rain monitoring and reporting requirements.

  17. The global health concept of the German government: strengths, weaknesses, and opportunities

    PubMed Central

    Bozorgmehr, Kayvan; Bruchhausen, Walter; Hein, Wolfgang; Knipper, Michael; Korte, Rolf; Razum, Oliver; Tinnemann, Peter

    2014-01-01

    Recognising global health as a rapidly emerging policy field, the German federal government recently released a national concept note for global health politics (July 10, 2013). As the German government could have a significant impact on health globally by making a coherent, evidence-informed, and long-term commitment in this field, we offer an initial appraisal of the strengths, weaknesses, and opportunities for development recognised in this document. We conclude that the national concept is an important first step towards the implementation of a coherent global health policy. However, important gaps were identified in the areas of intellectual property rights and access to medicines. In addition, global health determinants such as trade, economic crises, and liberalisation as well as European Union issues such as the health of migrants, refugees, and asylum seekers are not adequately addressed. Furthermore, little information is provided about the establishment of instruments to ensure an effective inter-ministerial cooperation. Finally, because implementation aspects for the national concept are critical for the success of this initiative, we call upon the newly elected 2013 German government to formulate a global health strategy, which includes a concrete plan of action, a time scale, and measurable goals. PMID:24560258

  18. The global health concept of the German government: strengths, weaknesses, and opportunities.

    PubMed

    Bozorgmehr, Kayvan; Bruchhausen, Walter; Hein, Wolfgang; Knipper, Michael; Korte, Rolf; Razum, Oliver; Tinnemann, Peter

    2014-01-01

    Recognising global health as a rapidly emerging policy field, the German federal government recently released a national concept note for global health politics (July 10, 2013). As the German government could have a significant impact on health globally by making a coherent, evidence-informed, and long-term commitment in this field, we offer an initial appraisal of the strengths, weaknesses, and opportunities for development recognised in this document. We conclude that the national concept is an important first step towards the implementation of a coherent global health policy. However, important gaps were identified in the areas of intellectual property rights and access to medicines. In addition, global health determinants such as trade, economic crises, and liberalisation as well as European Union issues such as the health of migrants, refugees, and asylum seekers are not adequately addressed. Furthermore, little information is provided about the establishment of instruments to ensure an effective inter-ministerial cooperation. Finally, because implementation aspects for the national concept are critical for the success of this initiative, we call upon the newly elected 2013 German government to formulate a global health strategy, which includes a concrete plan of action, a time scale, and measurable goals. PMID:24560258

  19. Patterns of Cognitive Strengths and Weaknesses: Identification Rates, Agreement, and Validity for Learning Disabilities Identification

    PubMed Central

    Miciak, Jeremy; Fletcher, Jack M.; Stuebing, Karla; Vaughn, Sharon; Tolar, Tammy D.

    2014-01-01

    Purpose Few empirical investigations have evaluated LD identification methods based on a pattern of cognitive strengths and weaknesses (PSW). This study investigated the reliability and validity of two proposed PSW methods: the concordance/discordance method (C/DM) and cross battery assessment (XBA) method. Methods Cognitive assessment data for 139 adolescents demonstrating inadequate response to intervention was utilized to empirically classify participants as meeting or not meeting PSW LD identification criteria using the two approaches, permitting an analysis of: (1) LD identification rates; (2) agreement between methods; and (3) external validity. Results LD identification rates varied between the two methods depending upon the cut point for low achievement, with low agreement for LD identification decisions. Comparisons of groups that met and did not meet LD identification criteria on external academic variables were largely null, raising questions of external validity. Conclusions This study found low agreement and little evidence of validity for LD identification decisions based on PSW methods. An alternative may be to use multiple measures of academic achievement to guide intervention. PMID:24274155

  20. Strengths and weaknesses of multimodal processing in a group of adults with gliomas.

    PubMed

    Plaza, Monique; Capelle, Laurent; Maigret, Graldine; Chaby, Laurence

    2013-01-01

    The present study aimed to analyze the multimodal skills that would be spared, altered, or impaired by gliomas that slowly infiltrate various and diversely localized areas in the cerebral hemispheres. Ten patients and 60 healthy controls were evaluated using four multimodal processing paradigms across 11 tasks. Our objectives were as follows: (a) to describe the strengths and weaknesses of the glioma patients' multimodal processing performance after accounting for task specificity and their individual performances compared to those of the control group; (b) to determine the correlation between lesion localization and impairments; and (c) to identify the tasks that were most sensitive to tumor infiltration and plasticity limits. Our results show that patients as a whole were efficient at most tasks; however, the patients exhibited difficulties in the productive picture-naming task, the receptive verbal judgment task, and the visual/graphic portion of the dual-attention task. The individual case reports show that the difficulties were distributed across the patients and did not correlate with lesion localization and tumor type. PMID:22554225

  1. Research reveals co-ordination and collaboration strengths and weaknesses in population education.

    PubMed

    1991-01-01

    The strengths and weaknesses of population education programs in Sri Lanka, Nepal, and the Maldives, based on descriptive research studies, are identified. The research topics were devised at a Subregional Meeting on Joint Research studies in Population Education for South Asia Subregion in 1990, as well as motivational strategies for promoting the small family norm in Bangladesh and Pakistan. Results were presented at a 1991 meeting held in UNESCO PROAP. The results were that 3 very different collaborative modalities operate in these countries. Sri Lanka had a formal national population committee for coordinating functions. The Maldives had no national formal structures, but there were linkages between population programs. Nepal had a formal structure but had failures in coordination. The Sri Lanka Population Committee, which began in 1972, established population education when the entire educational system was being reformed. The curriculum development committee consisted of representatives from a variety of disciplines and worked as a cohesive unit. As a consequence, junior secondary schools taught population education in such courses as social studies and science. Regional departments of education provided inservice training to the junior secondary school teachers. At the policy level, the education plan of 1972/73-77 was implemented within the National 5 Year Plan and the Population Committee functioned under a senior government Minister, which provided greater credibility and implementation. It also ensured linkage with other departments, agencies, and development programs. In the Maldives, the linkage was between the Population Education Program of the Educational Development Center (EDC) and the Allied Health Service Training Center's (AHSTC) child-spacing program. The small scale size may be a factor in the coordination and resource sharing and effective linkages without a formal national committee umbrella. The weakness was in multiplicity of effort, particularly i orientation. The recommendation was to do joint planning. Nepal's program needs coordination and linkages at the implementation level. There was breakdown in coordination and collaboration. Recommendations were to eliminate training and implementation from the Coordinator's Office and institute coordinating roles only, and to coordinate field programs by using CTSDC trained teachers in AES training. Content changes were also needed in linking community development and resource issues with nonformal population education, and consistency in materials used at the Certificate and Bachelor's level. Book revision needs to include population education content. Guidelines and manuals based on these research studies are planned for the future. PMID:12285079

  2. Validation of the Chinese Strengths and Weaknesses of ADHD-Symptoms and Normal-Behaviors Questionnaire in Hong Kong

    ERIC Educational Resources Information Center

    Lai, Kelly Y. C.; Leung, Patrick W. L.; Luk, Ernest S. L.; Wong, Ann S. Y.; Law, Lawrence S. C.; Ho, Karen K. Y.

    2013-01-01

    Objective: Unlike rating scales that focus on the severity of ADHD symptoms, the Strengths and Weaknesses of ADHD-Symptoms and Normal-Behaviors (SWAN) rating scale is phrased in neutral or positive terms for carers to compare the index child's behaviors with that of their peers. This study explores its psychometric properties when applied to…

  3. Cavities of Weak Magnetic Field Strength in the Wake of FTEs: Results from Global Magnetospheric MHD Simulations

    NASA Technical Reports Server (NTRS)

    Kuznetsova, M. M.; Sibeck, D. G.; Hesse, M.; Wang, Y.; Rastaetter, L.; Toth, G.; Ridley, A.

    2009-01-01

    We use the global magnetohydrodynamic (MHD) code BATS-R-US to model multipoint observations of Flux Transfer Event (FTE) signatures. Simulations with high spatial and temporal resolution predict that cavities of weak magnetic field strength protruding into the magnetosphere trail FTEs. These predictions are consistent with recently reported multi-point Cluster observations of traveling magnetopause erosion regions (TMERs).

  4. Macroeconomics of Natural Disasters: Strengths and Weaknesses of Meta-Analysis Versus Review of Literature.

    PubMed

    A G van Bergeijk, Peter; Lazzaroni, Sara

    2015-06-01

    We use the case of the macroeconomic impact of natural disasters to analyze strengths and weaknesses of meta-analysis in an emerging research field. Macroeconomists have published on this issue since 2002 (we identified 60 studies to date). The results of the studies are contradictory and therefore the need to synthesize the available research is evident. Meta-analysis is a useful method in this field. An important aim of our article is to show how one can use the identified methodological characteristics to better understand the robustness and importance of new findings. To provide a comparative perspective, we contrast our meta-analysis and its findings with the major influential research synthesis in the field: the IPCC's 2012 special report Managing the Risks of Extreme Events and Disasters to Advance Climate Change Adaptation. We show that the IPCC could have been more confident about the negative economic impact of disasters and more transparent on inclusion and qualification of studies, if it had been complemented by a meta-analysis. Our meta-analysis shows that, controlling for modeling strategies and data set, the impact of disasters is significantly negative. The evidence is strongest for direct costs studies where we see no difference between our larger sample and the studies included in the IPCC report. Direct cost studies and indirect cost studies differ significantly, both in terms of the confidence that can be attached to a negative impact of natural disasters and in terms of the sources of heterogeneity of the findings reported in the primary studies. PMID:25847486

  5. Extraction of Weak Transition Strengths via the ({sup 3}He, t) Reaction at 420 MeV

    SciTech Connect

    Zegers, R. G. T.; Brown, B. A.; Guess, C. J.; Hitt, G. W.; Adachi, T.; Hashimoto, H.; Hatanaka, K.; Matsubara, M.; Nakanishi, K.; Okumura, S.; Ohta, T.; Sakemi, Y.; Shimizu, Y.; Tameshige, Y.; Tamii, A.; Yosoi, M.; Akimune, H.; Kinoshita, M.; Yamagata, T.; Austin, Sam M.

    2007-11-16

    Differential cross sections for transitions of known weak strength were measured with the ({sup 3}He, t) reaction at 420 MeV on targets of {sup 12}C, {sup 13}C, {sup 18}O, {sup 26}Mg, {sup 58}Ni, {sup 60}Ni, {sup 90}Zr, {sup 118}Sn, {sup 120}Sn, and {sup 208}Pb. Using these data, it is shown that the proportionalities between strengths and cross sections for this probe follow simple trends as a function of mass number. These trends can be used to confidently determine Gamow-Teller strength distributions in nuclei for which the proportionality cannot be calibrated via {beta}-decay strengths. Although theoretical calculations in the distorted-wave Born approximation overestimate the data, they allow one to understand the main experimental features and to predict deviations from the simple trends observed in some of the transitions.

  6. The Strength of Weak Identities: Social Structural Sources of Self, Situation and Emotional Experience

    ERIC Educational Resources Information Center

    Smith-Lovin, Lynn

    2007-01-01

    Modern societies are highly differentiated, with relatively uncorrelated socially salient dimensions and a preponderance of weak, unidimensional (as opposed to strong, multiplex) ties. What are the implications of a society with fewer strong ties and more weak ties for the self? What do these changes mean for our emotional experience in everyday…

  7. Strength of chrysotile-serpentinite gouge under hydrothermal conditions: Can it explain a weak San Andreas fault?

    USGS Publications Warehouse

    Moore, Diane E.; Lockner, D.A.; Summers, R.; Shengli, M.; Byerlee, J.D.

    1996-01-01

    Chrysotile-bearing serpentinite is a constituent of the San Andreas fault zone in central and northern California. At room temperature, chrysotile gouge has a very low coefficient of friction (?? ??? 0.2), raising the possibility that under hydrothermal conditions ?? might be reduced sufficiently (to ???0.1) to explain the apparent weakness of the fault. To test this hypothesis, we measured the frictional strength of a pure chrysotile gouge at temperatures to 290??C and axial-shortening velocities as low as 0.001 ??m/s. As temperature increases to ???100??C, the strength of the chrysotile gouge decreases slightly at low velocities, but at temperatures ???200??C, it is substantially stronger and essentially independent of velocity at the lowest velocities tested. We estimate that pure chrysotile gouge at hydrostatic fluid pressure and appropriate temperatures would have shear strength averaged over a depth of 14 km of 50 MPa. Thus, on the sole basis of its strength, chrysotile cannot be the cause of a weak San Andreas fault. However, chrysotile may also contribute to low fault strength by forming mineral seals that promote the development of high fluid pressures.

  8. Weak grip strength does not predict upper extremity musculoskeletal symptoms or injuries among new workers

    PubMed Central

    Dale, Ann Marie; Addison, Lesley; Lester, Josh; Kaskutas, Vicki; Evanoff, Bradley

    2016-01-01

    Purpose Grip strength is often tested during post-offer pre-placement screening for workers in hand-intensive jobs. The purpose of this study was to evaluate the association between grip strength and upper extremity symptoms, work disability, and upper extremity musculoskeletal disorders (UE MSD) in a group of workers newly employed in both high and low hand intensive work. Methods 1107 recently-hired workers completed physical examinations including grip strength measurements. Repeated surveys obtained over 3 years described the presence of upper extremity symptoms, report of physician-diagnosed musculoskeletal disorders (MSD), and job titles. Baseline measured grip values were used in analytic models as continuous and categorized values to predict upper extremity symptoms, work disability, or UE MSD diagnosis. Results Twenty-six percent of males and 20% of females had low baseline hand strength compared to normative data. Multivariate logistic regression analyses showed no consistent associations between grip strength and three health outcomes (UE symptoms, work disability, and musculoskeletal disorders) in this young cohort (mean age: 30 years). Past MSD and work type were significant predictors of these outcomes. Conclusions Physical hand strength testing was not useful for identifying workers at risk for developing UE MSDs, and may be an inappropriate measure for post-offer job screens. PMID:23857165

  9. The Strengths, Weaknesses, Opportunities and Threats of Using Social Software in Higher and Further Education Teaching and Learning

    ERIC Educational Resources Information Center

    Schroeder, A.; Minocha, S.; Schneider, C.

    2010-01-01

    Social software is increasingly being used in higher and further education to support teaching and learning processes. These applications provide students with social and cognitive stimulation and also add to the interaction between students and educators. However, in addition to the benefits the introduction of social software into a course

  10. The Strengths, Weaknesses, Opportunities and Threats of Using Social Software in Higher and Further Education Teaching and Learning

    ERIC Educational Resources Information Center

    Schroeder, A.; Minocha, S.; Schneider, C.

    2010-01-01

    Social software is increasingly being used in higher and further education to support teaching and learning processes. These applications provide students with social and cognitive stimulation and also add to the interaction between students and educators. However, in addition to the benefits the introduction of social software into a course…

  11. While Heisenberg Is Not Looking: The Strength of "Weak Measurements" in Educational Research

    ERIC Educational Resources Information Center

    Geelan, David R.

    2015-01-01

    The concept of "weak measurements" in quantum physics is a way of "cheating" the Uncertainty Principle. Heisenberg stated (and 85years of experiments have demonstrated) that it is impossible to know both the position and momentum of a particle with arbitrary precision. More precise measurements of one decrease the precision

  12. While Heisenberg Is Not Looking: The Strength of "Weak Measurements" in Educational Research

    ERIC Educational Resources Information Center

    Geelan, David R.

    2015-01-01

    The concept of "weak measurements" in quantum physics is a way of "cheating" the Uncertainty Principle. Heisenberg stated (and 85 years of experiments have demonstrated) that it is impossible to know both the position and momentum of a particle with arbitrary precision. More precise measurements of one decrease the precision…

  13. Scoring the Strengths and Weaknesses of Underage Drinking Laws in the United States

    PubMed Central

    Fell, James C.; Thomas, Sue; Scherer, Michael; Fisher, Deborah A.; Romano, Eduardo

    2015-01-01

    Several studies have examined the impact of a number of minimum legal drinking age 21 (MLDA-21) laws on underage alcohol consumption and alcohol-related crashes in the United States. These studies have contributed to our understanding of how alcohol control laws affect drinking and driving among those who are under age 21. However, much of the extant literature examining underage drinking laws use a “Law/No law” coding which may obscure the variability inherent in each law. Previous literature has demonstrated that inclusion of law strengths may affect outcomes and overall data fit when compared to “Law/No law” coding. In an effort to assess the relative strength of states’ underage drinking legislation, a coding system was developed in 2006 and applied to 16 MLDA-21 laws. The current article updates the previous endeavor and outlines a detailed strength coding mechanism for the current 20 MLDA-21 laws. PMID:26097775

  14. The expression and interpretation of uncertain forensic science evidence: verbal equivalence, evidence strength, and the weak evidence effect.

    PubMed

    Martire, Kristy A; Kemp, Richard I; Watkins, Ian; Sayle, Malindi A; Newell, Ben R

    2013-06-01

    Standards published by the Association of Forensic Science Providers (2009, Standards for the formulation of evaluative forensic science expert opinion, Science & Justice, Vol. 49, pp. 161-164) encourage forensic scientists to express their conclusions in the form of a likelihood ratio (LR), in which the value of the evidence is conveyed verbally or numerically. In this article, we report two experiments (using undergraduates and Mechanical Turk recruits) designed to investigate how much decision makers change their beliefs when presented with evidence in the form of verbal or numeric LRs. In Experiment 1 (N = 494), participants read a summary of a larceny trial containing inculpatory expert testimony in which evidence strength (low, moderate, high) and presentation method (verbal, numerical) varied. In Experiment 2 (N = 411), participants read the same larceny trial, this time including either exculpatory or inculpatory expert evidence that varied in strength (low, high) and presentation method (verbal, numerical). Both studies found a reasonable degree of correspondence in observed belief change resulting from verbal and numeric formats. However, belief change was considerably smaller than Bayesian calculations would predict. In addition, participants presented with evidence weakly supporting guilt tended to "invert" the evidence, thereby counterintuitively reducing their belief in the guilt of the accused. This "weak evidence effect" was most apparent in the verbal presentation conditions of both experiments, but only when the evidence was inculpatory. These findings raise questions about the interpretability of LRs by jurors and appear to support an expectancy-based account of the weak evidence effect. PMID:23750600

  15. A Review of Meta-Analyses in Education: Methodological Strengths and Weaknesses

    ERIC Educational Resources Information Center

    Ahn, Soyeon; Ames, Allison J.; Myers, Nicholas D.

    2012-01-01

    The current review addresses the validity of published meta-analyses in education that determines the credibility and generalizability of study findings using a total of 56 meta-analyses published in education in the 2000s. Our objectives were to evaluate the current meta-analytic practices in education, identify methodological strengths and…

  16. Lessons from dwarf8 on the strengths and weaknesses of structured association mapping

    Technology Transfer Automated Retrieval System (TEKTRAN)

    The strengths of association mapping lie in its resolution and allelic richness, but spurious associations arising from historical relationships and selection patterns need to be accounted for in statistical analyses. Here we reanalyze one of the first generation structured association mapping studi...

  17. Strength of weak layers in cascading failures on multiplex networks: case of the international trade network.

    PubMed

    Lee, Kyu-Min; Goh, K-I

    2016-01-01

    Many real-world complex systems across natural, social, and economical domains consist of manifold layers to form multiplex networks. The multiple network layers give rise to nonlinear effect for the emergent dynamics of systems. Especially, weak layers that can potentially play significant role in amplifying the vulnerability of multiplex networks might be shadowed in the aggregated single-layer network framework which indiscriminately accumulates all layers. Here we present a simple model of cascading failure on multiplex networks of weight-heterogeneous layers. By simulating the model on the multiplex network of international trades, we found that the multiplex model produces more catastrophic cascading failures which are the result of emergent collective effect of coupling layers, rather than the simple sum thereof. Therefore risks can be systematically underestimated in single-layer network analyses because the impact of weak layers can be overlooked. We anticipate that our simple theoretical study can contribute to further investigation and design of optimal risk-averse real-world complex systems. PMID:27211291

  18. Systematic Reviews and Meta-Analyses - Literature-based Recommendations for Evaluating Strengths, Weaknesses, and Clinical Value.

    PubMed

    Beitz, Janice M; Bolton, Laura L

    2015-11-01

    Good quality systematic reviews (SRs) summarizing best available evidence can help inform clinical decisions, improv- ing patient and wound outcomes. Weak SRs can misinform readers, undermining care decisions and evidence-based practice. To examine the strengths and weaknesses of SRs and meta-analyses and the role of SRs in contemporary evidence-based wound care practice, and using the search terms systematic review, meta-analysis, and evidence-based practice, the authors searched Medline and the Cumulative Index to Nursing and Allied Health Literature (CINAHL) for important terminology and recommendations to help clinicians evaluate SRs with meta-analysis. Reputable websites, recent textbooks, and synthesized available literature also were reviewed to describe and summarize SR strengths and weaknesses. After developing a checklist for critically evaluating SR objectives, inclusion/exclusion criteria, study quality, data extraction and synthesis methods, meta-analysis homogeneity, accuracy of results, interpretation, and consistency between significant findings and abstract or conclusions, the checklist was applied to topical wound care SRs identified in Cochrane and MEDLINE searches. Best available evidence included in the SRs from 169 randomized controlled trials on 11,571 patients supporting topical intervention healing effects on burns, surgical sites, and diabetic, venous, or pressure ulcers was summarized and showed SRs and clinical trials can demonstrate different outcomes because the information/data are compiled differently. The results illustrate how evidence insufficient to support firm conclusions may still meet immediate needs to guide carefully considered clinical wound and patient care decisions while encouraging better future science. PMID:26544016

  19. Systematic Reviews and Meta-Analyses - Literature-based Recommendations for Evaluating Strengths, Weaknesses, and Clinical Value.

    PubMed

    Beitz, Janice M; Bolton, Laura L

    2015-11-01

    Good quality systematic reviews (SRs) summarizing best available evidence can help inform clinical decisions, improv- ing patient and wound outcomes. Weak SRs can misinform readers, undermining care decisions and evidence-based practice. To examine the strengths and weaknesses of SRs and meta-analyses and the role of SRs in contemporary evidence-based wound care practice, and using the search terms systematic review, meta-analysis, and evidence-based practice, the authors searched Medline and the Cumulative Index to Nursing and Allied Health Literature (CINAHL) for important terminology and recommendations to help clinicians evaluate SRs with meta-analysis. Reputable websites, recent textbooks, and synthesized available literature also were reviewed to describe and summarize SR strengths and weaknesses. After developing a checklist for critically evaluating SR objectives, inclusion/exclusion criteria, study quality, data extraction and synthesis methods, meta-analysis homogeneity, accuracy of results, interpretation, and consistency between significant findings and abstract or conclusions, the checklist was applied to topical wound care SRs identi- fied in Cochrane and MEDLINE searches. Best available evidence included in the SRs from 169 randomized controlled trials on 11,571 patients supporting topical intervention healing effects on burns, surgical sites, and diabetic, venous, or pressure ulcers was summarized and showed SRs and clinical trials can demonstrate different outcomes because the information/data are compiled differently. The results illustrate how evidence insufficient to support firm conclusions may still meet immediate needs to guide carefully considered clinical wound and patient care decisions while encouraging better future science. PMID:26689601

  20. The Strengths and Weaknesses of Logic Formalisms to Support Mishap Analysis

    NASA Technical Reports Server (NTRS)

    Johnson, C. W.; Holloway, C. M.

    2002-01-01

    The increasing complexity of many safety critical systems poses new problems for mishap analysis. Techniques developed in the sixties and seventies cannot easily scale-up to analyze incidents involving tightly integrated software and hardware components. Similarly, the realization that many failures have systemic causes has widened the scope of many mishap investigations. Organizations, including NASA and the NTSB, have responded by starting research and training initiatives to ensure that their personnel are well equipped to meet these challenges. One strand of research has identified a range of mathematically based techniques that can be used to reason about the causes of complex, adverse events. The proponents of these techniques have argued that they can be used to formally prove that certain events created the necessary and sufficient causes for a mishap to occur. Mathematical proofs can reduce the bias that is often perceived to effect the interpretation of adverse events. Others have opposed the introduction of these techniques by identifying social and political aspects to incident investigation that cannot easily be reconciled with a logic-based approach. Traditional theorem proving mechanisms cannot accurately capture the wealth of inductive, deductive and statistical forms of inference that investigators routinely use in their analysis of adverse events. This paper summarizes some of the benefits that logics provide, describes their weaknesses, and proposes a number of directions for future research.

  1. I. The neurocognitive profile of Williams Syndrome: a complex pattern of strengths and weaknesses.

    PubMed

    Bellugi, U; Lichtenberger, L; Jones, W; Lai, Z; St George, M

    2000-01-01

    The rare, genetically based disorder, Williams syndrome (WMS), produces a constellation of distinctive cognitive, neuroanatomical, and electrophysiological features which we explore through the series of studies reported here. In this paper, we focus primarily on the cognitive characteristics of WMS and begin to forge links among these characteristics, the brain, and the genetic basis of the disorder. The distinctive cognitive profile of individuals with WMS includes relative strengths in language and facial processing and profound impairment in spatial cognition. The cognitive profile of abilities, including what is 'typical' for individuals with WMS is discussed, but we also highlight areas of variability across the group of individuals with WMS that we have studied. Although the overall cognitive abilities (IQs) of individuals with WMS are typically in the mild-to-moderate range of mental retardation, the peaks and valleys within different cognitive domains make this syndrome especially intriguing to study across levels. Understanding the brain basis (and ultimately the genetic basis) for higher cognitive functioning is the goal we have begun to undertake with this line of interdisciplinary research. PMID:10953231

  2. OECI accreditation of the European Institute of Oncology of Milan: strengths and weaknesses.

    PubMed

    Deriu, Pietro L; Basso, Silvia; Mastrilli, Fabrizio; Orecchia, Roberto

    2016-01-29

    The European Institute of Oncology began the process to reach the accreditation promoted by the Organisation of European Cancer Institutes (OECI) in 2012. This accreditation integrates the quality and safety path started in 2001 with accreditation by the Joint Commission International. Despite the presence of diversified accreditations and certifications and the clear need of time, effort, and commitment, the models are complementary. Each model is not to be considered as an end but as a tool for improvement: e.g., mixing accreditation standards led to an improvement in the quality and safety of processes. The present article details the OECI accreditation experience of the European Institute of Oncology, in particular the following strengths of OECI standards: collaboration among several involved parties (patient, volunteer, patient's general practitioner) in the clinical and quality/safety processes; a larger involvement of support personnel (psycho-oncologists, dieticians, physical therapists); and the development of clinical/translational research and innovation in prevention, diagnosis, and treatment to guarantee the best available practice in diagnosis and treatment. The OECI accreditation is specific to oncology and therefore its standards are tailored to a cancer center, both in terms of language used in the standards manual and in terms of patient needs. The OECI accreditation system puts an auditor team with a standards manual in charge of verifying quality and confirms the definition of IEO as a Comprehensive Cancer Center. PMID:26833375

  3. OECI accreditation of the European Institute of Oncology of Milan: strengths and weaknesses.

    PubMed

    Deriu, Pietro L; Basso, Silvia; Mastrilli, Fabrizio; Orecchia, Roberto

    2015-12-31

    The European Institute of Oncology began the process to reach the accreditation promoted by the Organisation of European Cancer Institutes (OECI) in 2012. This accreditation integrates the quality and safety path started in 2001 with accreditation by the Joint Commission International. Despite the presence of diversified accreditations and certifications and the clear need of time, effort, and commitment, the models are complementary. Each model is not to be considered as an end but as a tool for improvement: e.g., mixing accreditation standards led to an improvement in the quality and safety of processes. The present article details the OECI accreditation experience of the European Institute of Oncology, in particular the following strengths of OECI standards: collaboration among several involved parties (patient, volunteer, patient's general practitioner) in the clinical and quality/safety processes; a larger involvement of support personnel (psycho-oncologists, dieticians, physical therapists); and the development of clinical/translational research and innovation in prevention, diagnosis, and treatment to guarantee the best available practice in diagnosis and treatment. The OECI accreditation is specific to oncology and therefore its standards are tailored to a cancer center, both in terms of language used in the standards manual and in terms of patient needs. The OECI accreditation system puts an auditor team with a standards manual in charge of verifying quality and confirms the definition of IEO as a Comprehensive Cancer Center. PMID:27096268

  4. Strengths and weaknesses of sea ice as a potential early indicator of climate change

    SciTech Connect

    Parkinson, C.L.

    1992-03-01

    Sea ice is examined for its potential as an early indicator of climate change by considering how well it satisfies four criteria listed as desired characteristics for potential early indicators. Results of numerical modeling studies in the 1970s and 1980s suggested that sea ice satisfies the first characteristic, that the variable be expected to exhibit a large climate signal, very well; but these results have recently been updated in a way that decreases the success of sea ice in satisfying this particular property. Sea ice satisfies the second characteristic, that it be routinely measurable on a global basis, exceptionally well through satellite passive-microwave observations, and at the moment this is the core of its strength as a potential early indicator. However, the absence of a solid pre-satellite database considerably hinders how well sea ice satisfies the third characteristic, that it have low enough and known natural variability to allow a climate signal to be distinguished from the background noise, and how well it can be known to satisfy the final characteristic, that changes in it should not significantly lag changes in other climate variables. The conclusion reached is that although changes in the sea ice cover, when analyzed in conjunction with changes in other variables, will provide important information on climate change, sea ice is unlikely any time in the near future to be a definitive early indicator of climate change when considered by itself.

  5. A Study of Strengths and Weaknesses of Descriptive Assessment from Principals, Teachers and Experts Points of View in Chaharmahal and Bakhteyari Primary Schools

    ERIC Educational Resources Information Center

    Sharief, Mostafa; Naderi, Mahin; Hiedari, Maryam Shoja; Roodbari, Omolbanin; Jalilvand, Mohammad Reza

    2012-01-01

    The aim of current study is to determine the strengths and weaknesses of descriptive evaluation from the viewpoint of principals, teachers and experts of Chaharmahal and Bakhtiari province. A descriptive survey was performed. Statistical population includes 208 principals, 303 teachers, and 100 executive experts of descriptive evaluation scheme in…

  6. Wildfire Prevention and Suppression plans enhancing: a first overview on strength and weakness in Italian stakeholders experiences and perception.

    NASA Astrophysics Data System (ADS)

    Bonora, Laura; Conese, Claudio; Barbati, Anna

    2014-05-01

    Fires and wildfires represent an element of vulnerability for forests, considering that have now reached a level beyond which further burning would seriously endanger the ecosystem services and their sustainable management. It is fundamental to support fire-fighting Centres by giving them tools, useful to faces future trends; in this sense the first step is to examine technical and operative procedures to evaluate their strong and weak aspects, in collaboration with personnel responsible of risk management, suppression coordination and patrol responsible of direct attack. The aims this work is to identify present elements of strength ad problematic aspects to tuning the wildfire suppression actions to future changes; this is a crucial challenge both for policy and territory planners and managers. Historical investigation lines on forest fire covered the basilar and fundamental dynamics which understanding was necessary to confine and fight the wildfire phenomenon. At the present all the competences, knowledge and connections acquired are translating and including in the Plans, sharing innovative strategies -with the "direct involved actors"- trying to decrease the fire trend. Stakeholders underlined that collaboration between research and territorial Institutions are producing positive results, showing the conceptual rightness and the well-run of the in-progress implementations. The Italian framework of wildfire prevention plans is very peculiar because the Plans related to prevention and active intervention procedure are coincident. Normative, procedural, economic and logistic aspects are considered and handled in the same general document; each year the local structures, designed by the Regions, have in charge the draft of the operative plan, defining and managing the means and patrols distribution and turnover. In the present work 3 Italian Regions (Tuscany, Puglia and Sardinia, with different territorial and vegetation characteristics and affected by different fire regimes and incidence) have been selected to investigate, by questionnaire and meetings, stakeholders perception on present strength and weakness in the adopted plans. The results of the answers analysis show some main deficit aspects covering prevalently carthographic and procedural implementations: • Plans shall include a risk and vulnerability map; dangerous seasons are to be determined and have to be updated with current weather conditions. • Standardization of terminology and classifications in the plans. • Plans shall include a specific section for firefighting in RUI, socially being the most important areas to protect and where most complications during firefighting are found. • Protocols shall be adapted to the real on site situation. A single control center in the event of fire should be identified. This is particularly important if third-party resources are involved in the operations. • Use of new technologies, i.e. fire simulators, LIDAR, for fuel amount and availability determination, wind simulation, CO2 emissions, vegetation structure. In the same time some active proposals are supplyed by the operators, directly derived and linked with the wekness above mentioned: • Use of new technological tools for analysis (simulators, etc.) and for driving the operative aspects during the suppression. • Standardization of communication protocols in the plans and during the field operations. • Increase use of fire for landscape management in certain areas. • Investments shall be made in land resources rather than in air means, generally already sufficient. This analysis represents a first effort to collect and schematize the effective applicability level of the indications included in the Plans. It is the base for possible tuning of the research and policy lines and also to tuning the present documents; the indications supplied prove that the efforts done in research are been acquired by the operative sectors and that the active involvement of stakeholder is the future challenge to enhance the plans efficacy.

  7. AERONET-OC: Strengths and Weaknesses of a Network for the Validation of Satellite Coastal Radiometric Products

    NASA Technical Reports Server (NTRS)

    Zibordi, Giuseppe; Holben, Brent; Slutsker, Ilya; Giles, David; D'Alimonte, Davide; Melin, Frederic; Berthon, Jean-Francois; Vandemark, Doug; Feng, Hui; Schuster, Gregory; Fabbri, Bryan E.; Kaitala, Seppo; Seppala, Jukka

    2008-01-01

    The Ocean Color component of the Aerosol Robotic Network (AERONET-OC) has been implemented to support long-term satellite ocean color investigations through cross-site consistent and accurate measurements collected by autonomous radiometer systems deployed on offshore fixed platforms. The ultimate purpose of AERONET-OC is the production of standardized measurements performed at different sites with identical measuring systems and protocols, calibrated using a single reference source and method, and processed with the same code. The AERONET-OC primary data product is the normalized water leaving radiance determined at center-wavelengths of interest for satellite ocean color applications, with an uncertainty lower than 5% in the blue-green spectral regions and higher than 8% in the red. Measurements collected at 6 sites counting the northern Adriatic Sea, the Baltic Proper, the Gulf of Finland, the Persian Gulf, and, the northern and southern margins of the Middle Atlantic Bay, have shown the capability of producing quality assured data over a wide range of bio-optical conditions including Case-2 yellow substance- and sedimentdominated waters. This work briefly introduces network elements like: deployment sites, measurement method, instrument calibration, processing scheme, quality-assurance, uncertainties, data archive and products accessibility. Emphases is given to those elements which underline the network strengths (i.e., mostly standardization of any network element) and its weaknesses (i.e., the use of consolidated, but old-fashioned technology). The work also addresses the application of AERONET-OC data to the validation of primary satellite radiometric products over a variety of complex coastal waters and finally provides elements for the identification of new deployment sites most suitable to support satellite ocean color missions.

  8. Reduction of spectroscopic strength: Weakly-bound and strongly-bound single-particle states studied using one-nucleon knockout reactions

    SciTech Connect

    Gade, A.; Bowen, M. D.; Brown, B. A.; Cook, J. M.; Glasmacher, T.; Hansen, P. G.; McDaniel, S.; Siwek, K.; Adrich, P.; Bazin, D.; Campbell, C. M.; Obertelli, A.; Weisshaar, D.; Hosier, K.; McGlinchery, D.; Riley, L. A.; Tostevin, J. A.

    2008-04-15

    Both one-proton and one-neutron knockout reactions were performed with fast beams of two asymmetric, neutron-deficient rare isotopes produced by projectile fragmentation. The reactions are used to probe the nucleon spectroscopic strengths at both the weakly and strongly bound nucleon Fermi surfaces. The one-proton knockout reactions {sup 9}Be({sup 28}S,{sup 27}P)X and {sup 9}Be({sup 24}Si,{sup 23}Al)X probe the weakly bound valence proton states and the one-neutron knockout reactions and {sup 9}Be({sup 28}S, {sup 27}S)X and {sup 9}Be({sup 24}Si, {sup 23}Si)X the strongly bound neutron states in the two systems. The spectroscopic strengths are extracted from the measured cross sections by comparisons with an eikonal reaction theory. The reduction of the experimentally deduced spectroscopic strengths, relative to the predictions of shell-model calculations, is of order 0.8-0.9 in the removal of weakly bound protons and 0.3-0.4 in the knockout of the strongly bound neutrons. These results support previous studies at the extremes of nuclear binding and provide further evidence that in asymmetric nuclear systems the nucleons of the deficient species, at the more-bound Fermi surface are more strongly correlated than those of the more weakly bound excess species.

  9. Threat displays are not handicaps.

    PubMed

    Számadó, Szabolcs

    2003-04-01

    Within a general framework of handicap signalling it was proposed that threat displays are handicaps, they can work only if they put the signaller at a disadvantage, which is only acceptable to honest signallers. The aim of the present article is to investigate this proposal with the help of a simple game-theoretical model. It was found: (1) that the use of cost-free signals is an ESS against the invasion of handicapped signals even if cheating is played as part of a mixed strategy in the population; (2) that the use of handicaps may be an ESS against cost-free signals but only if we assume that the invading cost-free signal is not accepted by weak individuals as a signal of strength; (3) that the establishment of a handicapped signal in the first place is an unresolved problem, because both cost free signals and negative-handicaps are evolutionarily stable against the invasion of handicaps; (4) that in contrast to handicaps the use of negative-handicaps can invade a population using cost-free signals (a negative-handicap is a signal which may serve other functions as well); (5) that negative-handicaps are ESS against cost-free signals as well as against handicaps; and (6) thus, the most likely evolutionary end point is that the biggest negative-handicap would be used as a threat display. This is a posture, which prepares the animal most efficiently to fight; hence, most probably it is the initial position of the fighting technique of the given species. (7) Finally, the investigation of the threat displays of well-studied taxa (great tit, cats, dogs, and hoofed mammals) confirms that threat displays are indeed negative-handicaps. They do not put the user into a disadvantaged position, instead the initial position of the species specific fighting technique is used as a threat display as predicted by the present model. PMID:12642112

  10. Parity Mixing in the Nucleus FLUORINE-18: AN Upper Limit on the Weak Pion-Nucleon Coupling Strength F(1)(PI)

    NASA Astrophysics Data System (ADS)

    Page, Shelley Anne

    Gamma rays from the decay of the (VBAR)J('(pi)) = 0('-), T = 0, E(,x) = 1081 keV> state in ('18)F are expected to exhibit a small degree of circular polarization due to parity mixing with the nearby (VBAR)0('+),1,1042 keV> state, a process which is allowed by the isovector component of the weak nucleon-nucleon interaction. The parity-violating matrix element in this case is dominated by an effective weak pion exchange potential of characteristic strength f(,(pi))('1). An experiment to measure the circular polarization of the 1081 keV (gamma)-rays from ('18)F has been performed at the Queen's University Van de Graaff Accelerator Laboratory. The measured value, P(,(gamma))(1081) = (1.7 (+OR-) 5.8) x 10('-4), represents an improvement of a factor of two in the uncertainty (delta)P(,(gamma))(1081) achieved in previous experiments. This result places a severe constraint on the weak pion-nucleon coupling strength: 0 <= f(,(pi))('1) <= 1.8 x 10('-7). This new upper limit on f(,(pi))('1) is 3.5 standard deviations smaller than recent theoretical predictions based on the Weinberg-Salam model of weak interactions and quark models of hadrons.

  11. Weak-interaction strength from charge-exchange reactions versus {beta} decay in the A=40 isoquintet

    SciTech Connect

    Bhattacharya, M.; Goodman, C. D.; Garcia, A.

    2009-11-15

    We report a measurement of the Gamow-Teller (GT) strength distribution for {sup 40}Ar{yields}{sup 40}K using the 0 deg. (p,n) reaction. The measurement extends observed GT strength distribution in the A=40 system up to an excitation energy of {approx}8 MeV. In comparing our results with those from the {beta} decay of the isospin mirror nucleus {sup 40}Ti, we find that, within the excitation energy region probed by the {beta}-decay experiment, we observe a total GT strength that is in fair agreement with the {beta}-decay measurement. However, we find that the relative strength of the two strongest transitions differs by a factor of {approx}1.8 in comparing our results from (p,n) reactions with the {beta} decay of {sup 40}Ti. Using our results we present the neutrino-capture cross section for {sup 40}Ar.

  12. Threats and vulnerabilities

    NASA Astrophysics Data System (ADS)

    Ahonen, Pasi; Alahuhta, Petteri; Daskala, Barbara; Delaitre, Sabine; Hert, Paul De; Lindner, Ralf; Maghiros, Ioannis; Moscibroda, Anna; Schreurs, Wim; Verlinden, Michiel

    In this chapter, we present a review of threats and vulnerabilities that could afflict society and individuals in the AmI world in the context of the key policy issues of privacy, identity, trust, security and digital divide. We define a threat as the potential for one or more unwanted consequences caused by a circumstance, capability, action or event that could be harmful to a system or person. Threats can be caused naturally, accidentally or intentionally. In essence, a threat is a ubiquitous phenomenon. A vulnerability is a flaw or weakness in a system's design, its implementation, operation or management that could be exploited to violate the system and, consequently, cause a threat. Vulnerabilities may have different dimensions: technical, functional or behavioural.1

  13. Biological Threats

    MedlinePlus

    ... RDD) Workplace Plans School Emergency Plans Main Content Biological Threats Biological agents are organisms or toxins that ... Centers for Disease Control and Prevention . Before a Biological Threat Unlike an explosion, a biological attack may ...

  14. The Application of Strengths, Weaknesses, Opportunities and Threats (SWOT) Analysis for Managing Vocational and Technical Education (VTE) Programmes for Improved Efficiency in Nigeria

    ERIC Educational Resources Information Center

    Adepoju, T. L.; Famade, Olu Adesola

    2010-01-01

    This paper reviews the current status of vocational and technical education programmes (VTE) in Nigeria and the major innovations of the Nigerian Government in the recent times in the sector vis-a-vis the demands of the modern world for vocational and technological development. It therefore, proposes a paradigm shift in the operation of VTE…

  15. Floods and health in Gambella region, Ethiopia: a qualitative assessment of the strengths and weaknesses of coping mechanisms

    PubMed Central

    Wakuma Abaya, Samson; Mandere, Nicodemus; Ewald, Göran

    2009-01-01

    Background Floods are the most frequent and devastating type of natural disaster worldwide, causing unprecedented deaths, diseases, and destruction of property and crops. Flooding has a greater impact in developing countries due to lack of sufficient disaster management structures and a lack of economic resources. Objective This study was conducted with the aim of contributing to the knowledge base of development strategies that reduce flood-related health risks in developing countries. The study focused particularly on assessing the flood risks and health-related issues in the Gambella region of Ethiopia; with the intent of producing relevant information to assist with the improvements in the efficacy of the current flood coping strategies in the region. Methods Data were gathered through interviews with 14 officers from different government and non-governmental organizations and a questionnaire survey given to 35 flood victims in Itang woreda. A qualitative approach was applied and the data were analyzed using content analysis. Results It was found that flooding is a common problem in Gambella region. The findings also indicate that the flood frequency and magnitude has increased rapidly during the last decade. The increase in floods was driven mainly by climate change and changes in land use, specifically deforestation. The reported main impacts of flooding on human health in Gambella region were deaths, injuries, and diseases such as malaria and diarrhea. Another notable consequence of flooding was crop destruction and subsequent malnutrition. Conclusions Three weaknesses that were identified in the current coping strategies for flood-related health impacts in Gambella region were a lack of flood-specific policy, absence of risk assessment, and weak institutional capacity. This study recommends new policy approaches that will increase the effectiveness of the current flood coping strategies to sustainably address the impact of flooding on human health. PMID:20027252

  16. Stereotype Threat.

    PubMed

    Spencer, Steven J; Logel, Christine; Davies, Paul G

    2016-01-01

    When members of a stigmatized group find themselves in a situation where negative stereotypes provide a possible framework for interpreting their behavior, the risk of being judged in light of those stereotypes can elicit a disruptive state that undermines performance and aspirations in that domain. This situational predicament, termed stereotype threat, continues to be an intensely debated and researched topic in educational, social, and organizational psychology. In this review, we explore the various sources of stereotype threat, the mechanisms underlying stereotype-threat effects (both mediators and moderators), and the consequences of this situational predicament, as well as the means through which society and stigmatized individuals can overcome the insidious effects of stereotype threat. Ultimately, we hope this review alleviates some of the confusion surrounding stereotype threat while also sparking further research and debate. PMID:26361054

  17. The Reliability and Validity of the English and Spanish Strengths and Weaknesses of ADHD and Normal Behavior Rating Scales in a Preschool Sample: Continuum Measures of Hyperactivity and Inattention

    ERIC Educational Resources Information Center

    Lakes, Kimberley D.; Swanson, James M.; Riggs, Matt

    2012-01-01

    Objective: To evaluate the reliability and validity of the English and Spanish versions of the Strengths and Weaknesses of ADHD-symptom and Normal-behavior (SWAN) rating scale. Method: Parents of preschoolers completed both a SWAN and the well-established Strengths and Difficulties Questionnaire (SDQ) on two separate occasions over a span of 3…

  18. Facing ambiguous threats.

    PubMed

    Roberto, Michael A; Bohmer, Richard M J; Edmondson, Amy C

    2006-11-01

    On February 1, 2003, the world watched in horror as the Columbia space shuttle broke apart while reentering the earth's atmosphere, killing all seven astronauts. Some have argued that NASA's failure to respond with appropriate intensity to the so-called foam strike that led to the accident was evidence of irresponsible or incompetent management. The authors' research, however, suggests that NASA was exhibiting a natural, albeit unfortunate, pattern of behavior common in many organizations. The foam strike is a prime example of what the authors call an ambiguous threat-a signal that may or may not portend future harm. Ambiguous threats differ from threats with obvious causes-say, a fire in the building-for which the response is clear. They also differ from unmistakable threats that may lack straightforward response paths (such as the frightening oxygen-tank explosion aboard Apollo 13). However, when the warning sign is ambiguous and the threat's potential effect is unclear, managers may choose to ignore or discount the risk. Such an approach can be catastrophic. Firms that do a good job of dealing with ambiguous threats do not improvise during a crisis; rather, they apply a rigorous set of detection and response capabilities that they have developed and practiced beforehand. In this article, the authors outline how to put such capabilities in place long before a crisis strikes. First, companies need to hone their teamwork and rapid problem-solving skills through practice. Second, they must learn to recognize weak signals, amplify the threat, and encourage employees to ask disconcerting "what if" questions in a safe environment. Finally, they should explore possible responses to threats through quick, low-cost experimentation. PMID:17131567

  19. Spatial Noise in Coupling Strength and Natural Frequency within a Pacemaker Network; Consequences for Development of Intestinal Motor Patterns According to a Weakly Coupled Phase Oscillator Model

    PubMed Central

    Parsons, Sean P.; Huizinga, Jan D.

    2016-01-01

    Pacemaker activities generated by networks of interstitial cells of Cajal (ICC), in conjunction with the enteric nervous system, orchestrate most motor patterns in the gastrointestinal tract. It was our objective to understand the role of network features of ICC associated with the myenteric plexus (ICC-MP) in the shaping of motor patterns of the small intestine. To that end, a model of weakly coupled oscillators (oscillators influence each other's phase but not amplitude) was created with most parameters derived from experimental data. The ICC network is a uniform two dimensional network coupled by gap junctions. All ICC generate pacemaker (slow wave) activity with a frequency gradient in mice from 50/min at the proximal end of the intestine to 40/min at the distal end. Key features of motor patterns, directly related to the underlying pacemaker activity, are frequency steps and dislocations. These were accurately mimicked by reduction of coupling strength at a point in the chain of oscillators. When coupling strength was expressed as a product of gap junction density and conductance, and gap junction density was varied randomly along the chain (i.e., spatial noise) with a long-tailed distribution, plateau steps occurred at pointsof low density. As gap junction conductance was decreased, the number of plateaus increased, mimicking the effect of the gap junction inhibitor carbenoxolone. When spatial noise was added to the natural interval gradient, as gap junction conductance decreased, the number of plateaus increased as before but in addition the phase waves frequently changed direction of apparent propagation, again mimicking the effect of carbenoxolone. In summary, key features of the motor patterns that are governed by pacemaker activity may be a direct consequence of biological noise, specifically spatial noise in gap junction coupling and pacemaker frequency. PMID:26869875

  20. Spatial Noise in Coupling Strength and Natural Frequency within a Pacemaker Network; Consequences for Development of Intestinal Motor Patterns According to a Weakly Coupled Phase Oscillator Model.

    PubMed

    Parsons, Sean P; Huizinga, Jan D

    2016-01-01

    Pacemaker activities generated by networks of interstitial cells of Cajal (ICC), in conjunction with the enteric nervous system, orchestrate most motor patterns in the gastrointestinal tract. It was our objective to understand the role of network features of ICC associated with the myenteric plexus (ICC-MP) in the shaping of motor patterns of the small intestine. To that end, a model of weakly coupled oscillators (oscillators influence each other's phase but not amplitude) was created with most parameters derived from experimental data. The ICC network is a uniform two dimensional network coupled by gap junctions. All ICC generate pacemaker (slow wave) activity with a frequency gradient in mice from 50/min at the proximal end of the intestine to 40/min at the distal end. Key features of motor patterns, directly related to the underlying pacemaker activity, are frequency steps and dislocations. These were accurately mimicked by reduction of coupling strength at a point in the chain of oscillators. When coupling strength was expressed as a product of gap junction density and conductance, and gap junction density was varied randomly along the chain (i.e., spatial noise) with a long-tailed distribution, plateau steps occurred at pointsof low density. As gap junction conductance was decreased, the number of plateaus increased, mimicking the effect of the gap junction inhibitor carbenoxolone. When spatial noise was added to the natural interval gradient, as gap junction conductance decreased, the number of plateaus increased as before but in addition the phase waves frequently changed direction of apparent propagation, again mimicking the effect of carbenoxolone. In summary, key features of the motor patterns that are governed by pacemaker activity may be a direct consequence of biological noise, specifically spatial noise in gap junction coupling and pacemaker frequency. PMID:26869875

  1. Tips from the toolkit: 2--assessing organisational strengths.

    PubMed

    Steer, Neville

    2010-03-01

    'SWOT' is a familiar term used in the development of business strategy. It is based on the identification of strengths, weaknesses, opportunities and threats as part of a strategic analysis approach. While there are a range of more sophisticated models for analysing and developing business strategy, it is a useful model for general practice as it is less time consuming than other approaches. The following article discusses some ways to apply this framework to assess organisational strengths (and weaknesses). It is based on The Royal Australian College of General Practitioners' "General practice management toolkit". PMID:20369123

  2. Strengths and Weaknesses of Global Positioning System (GPS) Data-Loggers and Semi-structured Interviews for Capturing Fine-scale Human Mobility: Findings from Iquitos, Peru

    PubMed Central

    Paz-Soldan, Valerie A.; Reiner, Robert C.; Morrison, Amy C.; Stoddard, Steven T.; Kitron, Uriel; Scott, Thomas W.; Elder, John P.; Halsey, Eric S.; Kochel, Tadeusz J.; Astete, Helvio; Vazquez-Prokopec, Gonzalo M.

    2014-01-01

    Quantifying human mobility has significant consequences for studying physical activity, exposure to pathogens, and generating more realistic infectious disease models. Location-aware technologies such as Global Positioning System (GPS)-enabled devices are used increasingly as a gold standard for mobility research. The main goal of this observational study was to compare and contrast the information obtained through GPS and semi-structured interviews (SSI) to assess issues affecting data quality and, ultimately, our ability to measure fine-scale human mobility. A total of 160 individuals, ages 7 to 74, from Iquitos, Peru, were tracked using GPS data-loggers for 14 days and later interviewed using the SSI about places they visited while tracked. A total of 2,047 and 886 places were reported in the SSI and identified by GPS, respectively. Differences in the concordance between methods occurred by location type, distance threshold (within a given radius to be considered a match) selected, GPS data collection frequency (i.e., 30, 90 or 150 seconds) and number of GPS points near the SSI place considered to define a match. Both methods had perfect concordance identifying each participant's house, followed by 80–100% concordance for identifying schools and lodgings, and 50–80% concordance for residences and commercial and religious locations. As the distance threshold selected increased, the concordance between SSI and raw GPS data increased (beyond 20 meters most locations reached their maximum concordance). Processing raw GPS data using a signal-clustering algorithm decreased overall concordance to 14.3%. The most common causes of discordance as described by a sub-sample (n = 101) with whom we followed-up were GPS units being accidentally off (30%), forgetting or purposely not taking the units when leaving home (24.8%), possible barriers to the signal (4.7%) and leaving units home to recharge (4.6%). We provide a quantitative assessment of the strengths and weaknesses of both methods for capturing fine-scale human mobility. PMID:24922530

  3. Strengths and weaknesses of Global Positioning System (GPS) data-loggers and semi-structured interviews for capturing fine-scale human mobility: findings from Iquitos, Peru.

    PubMed

    Paz-Soldan, Valerie A; Reiner, Robert C; Morrison, Amy C; Stoddard, Steven T; Kitron, Uriel; Scott, Thomas W; Elder, John P; Halsey, Eric S; Kochel, Tadeusz J; Astete, Helvio; Vazquez-Prokopec, Gonzalo M

    2014-06-01

    Quantifying human mobility has significant consequences for studying physical activity, exposure to pathogens, and generating more realistic infectious disease models. Location-aware technologies such as Global Positioning System (GPS)-enabled devices are used increasingly as a gold standard for mobility research. The main goal of this observational study was to compare and contrast the information obtained through GPS and semi-structured interviews (SSI) to assess issues affecting data quality and, ultimately, our ability to measure fine-scale human mobility. A total of 160 individuals, ages 7 to 74, from Iquitos, Peru, were tracked using GPS data-loggers for 14 days and later interviewed using the SSI about places they visited while tracked. A total of 2,047 and 886 places were reported in the SSI and identified by GPS, respectively. Differences in the concordance between methods occurred by location type, distance threshold (within a given radius to be considered a match) selected, GPS data collection frequency (i.e., 30, 90 or 150 seconds) and number of GPS points near the SSI place considered to define a match. Both methods had perfect concordance identifying each participant's house, followed by 80-100% concordance for identifying schools and lodgings, and 50-80% concordance for residences and commercial and religious locations. As the distance threshold selected increased, the concordance between SSI and raw GPS data increased (beyond 20 meters most locations reached their maximum concordance). Processing raw GPS data using a signal-clustering algorithm decreased overall concordance to 14.3%. The most common causes of discordance as described by a sub-sample (n=101) with whom we followed-up were GPS units being accidentally off (30%), forgetting or purposely not taking the units when leaving home (24.8%), possible barriers to the signal (4.7%) and leaving units home to recharge (4.6%). We provide a quantitative assessment of the strengths and weaknesses of both methods for capturing fine-scale human mobility. PMID:24922530

  4. When Students Make Threats

    ERIC Educational Resources Information Center

    Kanan, Linda M.

    2010-01-01

    Much has been written about the use of threat assessment. Schools are encouraged to have threat assessment teams and a threat assessment process as part of a comprehensive safe schools effort. Encouraging and enabling members of the school community to report possible threats in a timely manner is an essential component of an effective threat…

  5. Cyber threat metrics.

    SciTech Connect

    Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

    2012-03-01

    Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

  6. Strengths and weaknesses in the supply of school food resulting from the procurement of family farm produce in a municipality in Brazil.

    PubMed

    Soares, Panmela; Martinelli, Suellen Secchi; Melgarejo, Leonardo; Davó-Blanes, Mari Carmen; Cavalli, Suzi Barletto

    2015-06-01

    The objective of this study was to assess compliance with school food programme recommendations for the procurement of family farm produce. This study consists of an exploratory descriptive study utilising a qualitative approach based on semistructured interviews with key informants in a municipality in the State of Santa Catarina in Brazil. Study participants were managers and staff of the school food programme and department of agriculture, and representatives of a farmers' organisation. The produce delivery and demand fulfilment stages of the procurement process were carried out in accordance with the recommendations. However, nonconformities occurred in the elaboration of the public call for proposals, elaboration of the sales proposal, and fulfilment of produce quality standards. It was observed that having a diverse range of suppliers and the exchange of produce by the cooperative with neighbouring municipalities helped to maintain a regular supply of produce. The elaboration of menus contributed to planning agricultural production. However, agricultural production was not mapped before elaborating the menus in this case study and an agricultural reform settlement was left out of the programme. A number of weaknesses in the programme were identified which need to be overcome in order to promote local family farming and improve the quality of school food in the municipality. PMID:26060967

  7. Assessing Student Threats

    ERIC Educational Resources Information Center

    Brunner, Judy; Emmendorfer, Beth; Lewis, Dennis

    2009-01-01

    For administrators at the secondary level, not many school days go according to plan or script, but few things are more disruptive than a student threat of violence. When threats are made--or if there is a rumor of a serious student threat--it can take both time and resources to investigate, interview, and analyze multiple pieces of information in…

  8. Muscle strength and BMI as predictors of major mobility disability in the lifestyle interventions and independence for elders pilot (LIFE-P)

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Muscle weakness and obesity are two significant threats to mobility facing the increasing number of older adults. To date, there are no studies that have examined the association of strength and body mass index (BMI) on event rates on a widely used performance measure of major mobility disability. T...

  9. Weak bond screening system

    NASA Astrophysics Data System (ADS)

    Chuang, S. Y.; Chang, F. H.; Bell, J. R.

    Consideration is given to the development of a weak bond screening system which is based on the utilization of a high power ultrasonic (HPU) technique. The instrumentation of the prototype bond strength screening system is described, and the adhesively bonded specimens used in the system developmental effort are detailed. Test results obtained from these specimens are presented in terms of bond strength and level of high power ultrasound irradiation. The following observations were made: (1) for Al/Al specimens, 2.6 sec of HPU irradiation will screen weak bond conditions due to improper preparation of bonding surfaces; (2) for composite/composite specimens, 2.0 sec of HPU irradiation will disrupt weak bonds due to under-cured conditions; (3) for Al honeycomb core with composite skin structure, 3.5 sec of HPU irradiation will disrupt weak bonds due to bad adhesive or oils contamination of bonding surfaces; and (4) for Nomex honeycomb with Al skin structure, 1.3 sec of HPU irradiation will disrupt weak bonds due to bad adhesive.

  10. The Zirconia Ceramic: Strengths and Weaknesses

    PubMed Central

    Daou, Elie E.

    2014-01-01

    Metal ceramic restorations were considered the gold standard as reliable materials. Increasing demand for esthetics supported the commercialization of new metal free restorations. A growing demand is rising for zirconia prostheses. Peer-reviewed articles published till July 2013 were identified through a Medline (Pubmed and Elsevier). Emphasizing was made on zirconia properties and applications. Zirconia materials are able to withstand posterior physiologic loads. Although zirconia cores are considered as reliable materials, these restorations are not problem free. PMID:24851138

  11. Weak bump quasars

    NASA Astrophysics Data System (ADS)

    Wilkes, B. J.; McDowell, J.

    1994-01-01

    Research into the optical, ultraviolet and infrared continuum emission from quasars and their host galaxies was carried out. The main results were the discovery of quasars with unusually weak infrared emission and the construction of a quantitative estimate of the dispersion in quasar continuum properties. One of the major uncertainties in the measurement of quasar continuum strength is the contribution to the continuum of the quasar host galaxy as a function of wavelength. Continuum templates were constructed for different types of host galaxy and individual estimates made of the decomposed quasar and host continua based on existing observations of the target quasars. The results are that host galaxy contamination is worse than previously suspected, and some apparent weak bump quasars are really normal quasars with strong host galaxies. However, the existence of true weak bump quasars such as PHL 909 was confirmed. The study of the link between the bump strength and other wavebands was continued by comparing with IRAS data. There is evidence that excess far infrared radiation is correlated with weaker ultraviolet bumps. This argues against an orientation effect and implies a probable link with the host galaxy environment, for instance the presence of a luminous starburst. However, the evidence still favors the idea that reddening is not important in those objects with ultraviolet weak bumps. The same work has led to the discovery of a class of infrared weak quasars. Pushing another part of the envelope of quasar continuum parameter space, the IR-weak quasars have implications for understanding the effects of reddening internal to the quasars, the reality of ultraviolet turnovers, and may allow further tests of the Phinney dust model for the IR continuum. They will also be important objects for studying the claimed IR to x-ray continuum correlation.

  12. Individual threat, group threat, and racial policy: exploring the relationship between threat and racial attitudes.

    PubMed

    Rosenstein, Judith E

    2008-12-01

    Racial threat scholars have long argued that racial prejudice is motivated by threat. This literature identifies two types of threat: individual threat and group threat; however, actual arguments tend to focus on only one of the two types of threat. Consequently, there has been no assessment of whether both threats are simultaneously associated with prejudice. This paper uses data from the 1994 General Social Survey (GSS) to examine the relationship between perceptions of individual threat, perceptions of group threat, and opposition to policies aiding blacks. Results from multinomial logits demonstrate that both threats are associated with opposition to race-equalizing policies, suggesting that single-threat theories should be reevaluated and that studies incorporating racial threat should include both types of threat. PMID:19227695

  13. Weak Interactions

    DOE R&D Accomplishments Database

    Lee, T. D.

    1957-06-01

    Experimental results on the non-conservation of parity and charge conservation in weak interactions are reviewed. The two-component theory of the neutrino is discussed. Lepton reactions are examined under the assumption of the law of conservation of leptons and that the neutrino is described by a two- component theory. From the results of this examination, the universal Fermi interactions are analyzed. Although reactions involving the neutrino can be described, the same is not true of reactions which do not involve the lepton, as the discussion of the decay of K mesons and hyperons shows. The question of the invariance of time reversal is next examined. (J.S.R.)

  14. Combatting Insider Threats

    NASA Astrophysics Data System (ADS)

    Neumann, Peter G.

    Risks from insider threats are strongly context dependent, and arise in many ways at different layers of system abstraction for different types of systems. We discuss various basic characteristics of insider threats, and consider approaches to the development and use of computer-related environments that require systems and networking to be trustworthy in spite of insider misuse. We also consider future research that could improve both detectability, prevention, and response. This chapter seeks to cope with insider misuse in a broad range of application domains - for example, critical infrastructures, privacy-preserving database systems, financial systems, and interoperable health-care infrastructures. To illustrate this, we apply the principles considered here to the task of detecting and preventing insider misuse in systems that might be used to facilitate trustworthy elections. This discussion includes an examination of the relevance of the Saltzer-Schroeder-Kaashoek security principles and the Clark-Wilson integrity properties for end-to-end election integrity. Trustworthy system developments must consider insider misuse as merely one set of threats that must be addressed consistently together with many other threats such as penetrations, denials of service, system faults and failures, and other threats to survivability. In addition, insider misuse cannot be realistically addressed unless significant improvements are made in the trustworthiness of component systems and their networking as well as their predictably trustworthy compositions into enterprise solutions - architecturally, developmentally, and operationally.

  15. Proliferation: Threat and response

    SciTech Connect

    1996-04-01

    ;Table of Contents: Section I: The Regional Proliferation Challenge; Northeast Asia; The Middle East and North Africa; The Former Soviet Union: Russia, Ukrane, Kazakstan, And Belarus; South Asia; The International Threat: Dangers from Terrorism, Insurgencies, Civil Wars, And Organized Crime; Section II: Department of Defense Response; Technical Annex: Accessible Technologies; Glossary.

  16. Threat Assessment Plans

    ERIC Educational Resources Information Center

    Pascopella, Angela

    2008-01-01

    With every new case of school violence, district leaders are urged to be proactive in hopes of averting potential violence. Experts say part of that proactive work comes from a threat assessment plan that every district should have. While every district that receives funds from the U.S. Department of Education for school safety is required to have…

  17. The Threat of Harm.

    ERIC Educational Resources Information Center

    Rasicot, Julie

    1999-01-01

    Student threats of violence should be taken seriously. Although zero-tolerance policies are gaining popularity, mental-health experts urge a more deliberative approach that explores student motives and metes out punishment on a more individualized basis. Fostering strong staff-student relationships and communication can effectively deter violence.…

  18. ThreatView

    Energy Science and Technology Software Center (ESTSC)

    2007-09-25

    The ThreatView project is based on our prior work with the existing ParaView open-source scientific visualization application. Where ParaView provides a grapical client optimized scientific visualization over the VTK parallel client server architecture, ThreatView provides a client optimized for more generic visual analytics over the same architecture. Because ThreatView is based on the VTK parallel client-server architecture, data sources can reside on remote hosts, and processing and rendering can be performed in parallel. As seenmore » in Fig. 1, ThreatView provides four main methods for visualizing data: Landscape View, which displays a graph using a landscape metaphor where clusters of graph nodes produce "hills" in the landscape; Graph View, which displays a graph using a traditional "ball-and-stick" style; Table View, which displays tabular data in a standard spreadsheet; and Attribute View, which displays a tabular "histogram" of input data - for a selected table column, the Attribute View displays each unique value within the column, and the number of times that value appears in the data. There are two supplemental view types: Text View, which displays tabular data one-record-at-a-time; and the Statistics View, which displays input metadata, such as the number of vertices and edges in a graph, the number of rows in a table, etc.« less

  19. Environmental Threats at School

    ERIC Educational Resources Information Center

    Green, Twhanna

    2005-01-01

    Children can be exposed to dangerous chemicals and toxins in the most unlikely of places: Their schools. This brief article describes the types of threats that school environments pose to students' health, including such pollution and chemical exposures as lead, mercury, arsenic, molds, and poor indoor air quality. The article provides tips for

  20. Environmental Threats at School

    ERIC Educational Resources Information Center

    Green, Twhanna

    2005-01-01

    Children can be exposed to dangerous chemicals and toxins in the most unlikely of places: Their schools. This brief article describes the types of threats that school environments pose to students' health, including such pollution and chemical exposures as lead, mercury, arsenic, molds, and poor indoor air quality. The article provides tips for…

  1. Airborne Particulate Threat Assessment

    SciTech Connect

    Patrick Treado; Oksana Klueva; Jeffrey Beckstead

    2008-12-31

    Aerosol threat detection requires the ability to discern between threat agents and ambient background particulate matter (PM) encountered in the environment. To date, Raman imaging technology has been demonstrated as an effective strategy for the assessment of threat agents in the presence of specific, complex backgrounds. Expanding our understanding of the composition of ambient particulate matter background will improve the overall performance of Raman Chemical Imaging (RCI) detection strategies for the autonomous detection of airborne chemical and biological hazards. Improving RCI detection performance is strategic due to its potential to become a widely exploited detection approach by several U.S. government agencies. To improve the understanding of the ambient PM background with subsequent improvement in Raman threat detection capability, ChemImage undertook the Airborne Particulate Threat Assessment (APTA) Project in 2005-2008 through a collaborative effort with the National Energy Technology Laboratory (NETL), under cooperative agreement number DE-FC26-05NT42594. During Phase 1 of the program, a novel PM classification based on molecular composition was developed based on a comprehensive review of the scientific literature. In addition, testing protocols were developed for ambient PM characterization. A signature database was developed based on a variety of microanalytical techniques, including scanning electron microscopy, FT-IR microspectroscopy, optical microscopy, fluorescence and Raman chemical imaging techniques. An automated particle integrated collector and detector (APICD) prototype was developed for automated collection, deposition and detection of biothreat agents in background PM. During Phase 2 of the program, ChemImage continued to refine the understanding of ambient background composition. Additionally, ChemImage enhanced the APICD to provide improved autonomy, sensitivity and specificity. Deliverables included a Final Report detailing our findings and APICD Gen II subsystems for automated collection, deposition and detection of ambient particulate matter. Key findings from the APTA Program include: Ambient biological PM taxonomy; Demonstration of key subsystems needed for autonomous bioaerosol detection; System design; Efficient electrostatic collection; Automated bioagent recognition; Raman analysis performance validating Td<9 sec; Efficient collection surface regeneration; and Development of a quantitative bioaerosol defection model. The objective of the APTA program was to advance the state of our knowledge of ambient background PM composition. Operation of an automated aerosol detection system was enhanced by a more accurate assessment of background variability, especially for sensitive and specific sensing strategies like Raman detection that are background-limited in performance. Based on this improved knowledge of background, the overall threat detection performance of Raman sensors was improved.

  2. Proliferation: Threat and response

    SciTech Connect

    1996-04-01

    During the height of the Cold War, the Russian physicist Andre Sakharov said, `Reducing the risk of annihilating humanity in a nuclear war carries an absolute priority over all other considerations.` The end of the Cold War has reduced the threat of global nuclear war, but today a new threat is rising from the global spread of nuclear, biological, and chemical weapons. Hostile groups and nations have tried - or have been able - to obtain these weapons, the technology, and homegrown ability to make them or ballistic missiles that can deliver the massive annihilation, poison, and death of these weapons hundreds of miles away. For rogue nations, these weapons are a ticket to power, stature, and confidence in regional war.

  3. Pollution: a global threat.

    PubMed

    McCrink-Goode, Melissa

    2014-07-01

    Over the past several decades, several large-scale seemingly unrelated events have unfolded in all corners of the world. Within the oceans, coral reef systems have been facing unprecedented mass bleaching episodes, sea turtles worldwide are currently experiencing an epidemic in the form of fibropapilloma, and global phytoplankton populations have declined by 40%. Within the Earth's terrestrial systems, similar phenomena have appeared in the form of colony collapse disorder (CCD) currently devastating honey bee colonies, White Nose Syndrome decimating bat populations, and the chytrid fungus plaguing amphibian populations. On the surface these events appear to be unrelated yet at the root of each phenomenon there appears an underlying threat - pollution. This paper will investigate the commonality of these occurrences as well as investigate the current and potential solutions to the threat. PMID:24727071

  4. Flexible training under threat.

    PubMed

    Houghton, Anita; Eaton, Jennifer

    2002-10-01

    As the number of women in medicine and the general demand for a better work-life balance rises, flexible training is an increasingly important mechanism for maintaining the medical workforce. The new pay deal, together with entrenched cultural attitudes, are potential threats. Ways forward include more substantive part-time posts, more part-time opportunities at consultant level, and using positive experiences as a way of tackling attitudes in the less accepting specialties. PMID:12422498

  5. Space collision threat mitigation

    NASA Astrophysics Data System (ADS)

    Zatezalo, Aleksandar; Stipanovi?, Duan; Mehra, Raman K.; Pham, Khanh

    2014-06-01

    Mitigation of possible collision threats to current and future operations in space environments is an important an challenging task considering high nonlinearity of orbital dynamics and discrete measurement updates. Such discrete observations are relatively scarce with respect to space dynamics including possible unintentional or intentional rocket propulsion based maneuvers even in scenarios when measurement collections are focused to a one single target of interest. In our paper, this problem is addressed in terms of multihypothesis and multimodel estimation in conjunction with multi-agent multigoal game theoretic guaranteed evasion strategies. Collision threat estimation is formulated using conditional probabilities of time dependent hypotheses and spacecraft controls which are computed using Liapunov-like approach. Based on this formulation, time dependent functional forms of multi-objective utility functions are derived given threat collision risk levels. For demonstrating developed concepts, numerical methods are developed using nonlinear filtering methodology for updating hypothesis sets and corresponding conditional probabilities. Space platform associated sensor resources are managed using previously developed and demonstrated information-theoretic objective functions and optimization methods. Consequently, estimation and numerical methods are evaluated and demonstrated on a realistic Low Earth Orbit collision encounter.

  6. Not All Threats Are Equal

    ERIC Educational Resources Information Center

    Surface, Jeanne L.

    2011-01-01

    School leaders must be fully prepared to respond to all types of threats that occur. In order to respond to threats most appropriately, the school needs to have a systematic approach that combines education, prevention, intervention, discipline, security, and crisis preparedness measures. All threats must be assessed carefully and swiftly,…

  7. Not All Threats Are Equal

    ERIC Educational Resources Information Center

    Surface, Jeanne L.

    2011-01-01

    School leaders must be fully prepared to respond to all types of threats that occur. In order to respond to threats most appropriately, the school needs to have a systematic approach that combines education, prevention, intervention, discipline, security, and crisis preparedness measures. All threats must be assessed carefully and swiftly,

  8. [Counterfeit medicines: a growing threat].

    PubMed

    Barbereau, S

    2006-12-01

    The medical drug market has undergone considerable transformation in recent years. Like other products, medicines have been affected by globalization. Free trade policies have had a number of negative effects including a reduction in quality control not only for some products but also for raw materials and finished products. The global environment has also created conditions conducive to counterfeit medicines. The term counterfeit medicine is defined differently from one country to another in terms of quality, legality and fraudulent intent. This situation prompted the WHO to propose the following definition: "A counterfeit medicine is one which is deliberately and fraudulently mislabeled with respect to identity and/or source. Counterfeiting can apply to both branded and generic products and counterfeit products may include products with the correct ingredients or with the wrong ingredients, without active ingredients, with insufficient active ingredients or with fake packaging." Weak pharmaceutical regulation often compounded by widespread corruption in developing countries has greatly facilitated the development of this illicit market with harmful and costly effects on public health. Due to the lack of pharmocovigilance accidents involving use of counterfeit drugs go unreported. For this reason it is not possible to measure the economic impact. While counterfeiting has become a major threat in developing countries, it also affects industrialized countries. Fraudulent behavior occurs all over the world. PMID:17286014

  9. Quantum discord with weak measurements

    SciTech Connect

    Singh, Uttam Pati, Arun Kumar

    2014-04-15

    Weak measurements cause small change to quantum states, thereby opening up the possibility of new ways of manipulating and controlling quantum systems. We ask, can weak measurements reveal more quantum correlation in a composite quantum state? We prove that the weak measurement induced quantum discord, called as the “super quantum discord”, is always larger than the quantum discord captured by the strong measurement. Moreover, we prove the monotonicity of the super quantum discord as a function of the measurement strength and in the limit of strong projective measurement the super quantum discord becomes the normal quantum discord. We find that unlike the normal discord, for pure entangled states, the super quantum discord can exceed the quantum entanglement. Our results provide new insights on the nature of quantum correlation and suggest that the notion of quantum correlation is not only observer dependent but also depends on how weakly one perturbs the composite system. We illustrate the key results for pure as well as mixed entangled states. -- Highlights: •Introduced the role of weak measurements in quantifying quantum correlation. •We have introduced the notion of the super quantum discord (SQD). •For pure entangled state, we show that the SQD exceeds the entanglement entropy. •This shows that quantum correlation depends not only on observer but also on measurement strength.

  10. Spin effects in the weak interaction

    SciTech Connect

    Freedman, S.J. Chicago Univ., IL . Dept. of Physics Chicago Univ., IL . Enrico Fermi Inst.)

    1990-01-01

    Modern experiments investigating the beta decay of the neutron and light nuclei are still providing important constraints on the theory of the weak interaction. Beta decay experiments are yielding more precise values for allowed and induced weak coupling constants and putting constraints on possible extensions to the standard electroweak model. Here we emphasize the implications of recent experiments to pin down the strengths of the weak vector and axial vector couplings of the nucleon.

  11. Rheology of weakly vibrated granular materials

    NASA Astrophysics Data System (ADS)

    Dijksman, J. A.; Wortel, G.; van Hecke, M.

    2009-06-01

    We show how weak vibrations substantially modify the rheology of granular materials. We experimentally probe dry granular flows in a weakly vibrated split bottom shear cell—the weak vibrations modulate gravity and act as an agitation source. By tuning the applied stress and vibration strength, and monitoring the resulting strain as a function of time, we uncover a rich phase diagram in which non-trivial transitions separate a jammed phase, a creep flow case, and a steady flow case.

  12. New global viral threats.

    PubMed

    Erdem, Hakan; Ünal, Serhat

    2015-04-01

    Infectious diseases have caused great catastrophes in human history, as in the example of the plague, which wiped out half of the population in Europe in the 14th century. Ebola virus and H7N9 avian influenza virus are 2 lethal pathogens that we have encountered in the second decade of the 21st century. Ebola infection is currently being seen in West Africa, and H7N9 avian flu appears to have settled in Southeast Asia. This article focuses on the current situation and the future prospects of these potential infectious threats to mankind. PMID:25828274

  13. New global viral threats

    PubMed Central

    Erdem, Hakan; Ünal, Serhat

    2015-01-01

    Infectious diseases have caused great catastrophes in human history, as in the example of the plague, which wiped out half of the population in Europe in the 14th century. Ebola virus and H7N9 avian influenza virus are 2 lethal pathogens that we have encountered in the second decade of the 21st century. Ebola infection is currently being seen in West Africa, and H7N9 avian flu appears to have settled in Southeast Asia. This article focuses on the current situation and the future prospects of these potential infectious threats to mankind. PMID:25828274

  14. Threats to international science

    NASA Astrophysics Data System (ADS)

    Kisslinger, Carl

    The role of nongovernmental organizations (NGOs) as effective agents for promoting world science is seriously threatened. It is ironic that the threat comes from Norway and Denmark, two countries that have demonstrated a deep commitment to individual freedom and human rights. Motivated by a sincere desire to express their strongest disapproval of the “apartheid” policies of the government of the Republic of South Africa, these countries have passed laws that have the effect of rejecting the International Council of Scientific Unions (ICSU) principles of nondiscrimination and free circulation of scientists.

  15. Mediators of Stereotype Threat among Black College Students.

    PubMed

    Massey, Douglas S; Owens, Jayanti

    2014-04-01

    We hypothesize that the manner in which stereotype threat affects college grade achievement is mediated by institutional context as well as individual characteristics. Drawing on a sample of black students from the National Longitudinal Survey of Freshmen we find weak and inconsistent evidence that institutional characteristics influence the operation of stereotype threat. We find more consistent evidence to indicate that the effect of stereotype threat is conditioned by individual factors such as skin color, multiracial origins, and an integrated upbringing. Most of the effect on grade achievement occurs through the internalization pathway, in which the internalization of negative stereotypes leads to disinvestment manifested by a reduction in academic effort. The reduction in work effort, in turn, lowers grades. We also find evidence that immigrant origin confers protection from the negative effects of stereotype threat through both internalization and externalization mechanisms, though the ultimate effect of grade achievement is rather small. PMID:24860201

  16. Application of modified threat reduction assessments in Lebanon.

    PubMed

    Matar, Diane A; Anthony, Brandon P

    2010-10-01

    Worldwide efforts have concentrated on developing monitoring methods that would enhance the assessment of progress toward achieving the 2010 conservation objectives of the Convention on Biological Diversity. Threat reduction assessment is one such method. It provides an indirect measure of the effects of a conservation project by evaluating changes in human-induced direct threats to protected areas. We applied modified threat reduction assessments and the 2008 International Union for Conservation of Nature standardized lexicon for classification of threats to Horsh Ehden and Al-Shouf Cedar nature reserves in Lebanon. Our goal was in part to test the suitability of this tool for improving monitoring and management effectiveness of protected forests in Lebanon. In Horsh Ehden, composite threats decreased by 24% from 1997 to 2002, and then increased from 2002 to 2009 by 78% in the core area of the reserve and by 118% in the reserve's buffer zone (surrounds core area, conservation and recreational activities allowed). In Al-Shouf Cedar reserve threats decreased by 51% from 2006 to 2009. Management teams from both reserves have integrated the use of this method to prioritize actions for new management plans. We believe that in Lebanon and other countries with limited resources and weak monitoring programs or that are experiencing political instability threat reduction assessments could be used to improve the effectiveness of protected areas management. PMID:21182667

  17. Laser Threat Analysis System (LTAS)

    NASA Astrophysics Data System (ADS)

    Pfaltz, John M.; Richardson, Christina E.; Ruiz, Abel; Barsalou, Norman; Thomas, Robert J.

    2002-11-01

    LTAS is a totally integrated modeling and simulation environment designed for the purpose of ascertaining the susceptibility of Air Force pilots and air crews to optical radiation threats. Using LTAS, mission planners can assess the operational impact of optically directed energy weapons and countermeasures. Through various scenarios, threat analysts are able to determine the capability of laser threats and their impact on operational missions including the air crew's ability to complete their mission effectively. Additionally, LTAS allows the risk of laser use on training ranges and the requirement for laser protection to be evaluated. LTAS gives mission planners and threat analysts complete control of the threat environment including threat parameter control and placement, terrain mapping (line-of-site), atmospheric conditions, and laser eye protection (LEP) selection. This report summarizes the design of the final version of LTAS, and the modeling methodologies implemented to accomplish analysis.

  18. Lizard threat display handicaps endurance.

    PubMed

    Brandt, Y

    2003-05-22

    Honest-signalling theory asserts that threat displays reliably advertise attributes that influence fighting success. Endurance, as measured by treadmill performance, predicts the outcome of agonistic interactions among lizards. If threat displays in lizards function to advertise endurance capacity then variation in threat displays should correlate with endurance. I tested this prediction for the duration of threat posturing in male side-blotched lizards (Uta stansburiana) and examined whether threat displays act as quality handicaps, reliable signals that expend the attribute that is advertised. Individual variation in the duration of threat posturing correlated with endurance, while an experimental reduction of endurance diminished the duration of threat posturing. As expected of a quality handicap, endurance fell below baseline after display production. A restriction of aerobic metabolism can account for this effect. In threat posturing, lateral compression of the thorax may interfere with respiration or with circulation, limiting aerobic metabolism and causing a compensatory increase in anaerobic metabolism, thereby generating lactate and diminishing locomotor capacity. Concentrations of lactate measured after display production were higher than baseline, consistent with the proposed mechanism. By restricting aerobic metabolism, the threat posture can act as a quality handicap, simultaneously advertising and expending the endurance capacity of displaying lizards. PMID:12803896

  19. Fault zone fabric and fault weakness.

    PubMed

    Collettini, Cristiano; Niemeijer, Andr; Viti, Cecilia; Marone, Chris

    2009-12-17

    Geological and geophysical evidence suggests that some crustal faults are weak compared to laboratory measurements of frictional strength. Explanations for fault weakness include the presence of weak minerals, high fluid pressures within the fault core and dynamic processes such as normal stress reduction, acoustic fluidization or extreme weakening at high slip velocity. Dynamic weakening mechanisms can explain some observations; however, creep and aseismic slip are thought to occur on weak faults, and quasi-static weakening mechanisms are required to initiate frictional slip on mis-oriented faults, at high angles to the tectonic stress field. Moreover, the maintenance of high fluid pressures requires specialized conditions and weak mineral phases are not present in sufficient abundance to satisfy weak fault models, so weak faults remain largely unexplained. Here we provide laboratory evidence for a brittle, frictional weakening mechanism based on common fault zone fabrics. We report on the frictional strength of intact fault rocks sheared in their in situ geometry. Samples with well-developed foliation are extremely weak compared to their powdered equivalents. Micro- and nano-structural studies show that frictional sliding occurs along very fine-grained foliations composed of phyllosilicates (talc and smectite). When the same rocks are powdered, frictional strength is high, consistent with cataclastic processes. Our data show that fault weakness can occur in cases where weak mineral phases constitute only a small percentage of the total fault rock and that low friction results from slip on a network of weak phyllosilicate-rich surfaces that define the rock fabric. The widespread documentation of foliated fault rocks along mature faults in different tectonic settings and from many different protoliths suggests that this mechanism could be a viable explanation for fault weakening in the brittle crust. PMID:20016599

  20. Bio-threat microparticle simulants

    SciTech Connect

    Farquar, George Roy; Leif, Roald

    2014-09-16

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  1. Bio-threat microparticle simulants

    DOEpatents

    Farquar, George Roy; Leif, Roald N

    2012-10-23

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  2. Bomb Threat Assessments. Fact Sheet

    ERIC Educational Resources Information Center

    Tunkel, Ronald F.

    2010-01-01

    This information provides a brief, summary outline of how investigators should assess anonymous bomb threats at schools. Applying these principles may help administrators and law enforcement personnel accurately assess the viability and credibility of a threat and appropriately gauge their response. Any credible evidence provided by teachers or…

  3. Threat Assessment in College Settings

    ERIC Educational Resources Information Center

    Cornell, Dewey

    2010-01-01

    In 2007, the landscape of campus safety changed abruptly with the Virginia Tech shooting and the subsequent wave of anonymous threats in colleges across the country. In response to the tragedy, the Virginia state legislature mandated that every public institution of higher education establish a "threat assessment team." Both the FBI and the U.S.…

  4. Linking Stereotype Threat and Anxiety

    ERIC Educational Resources Information Center

    Osborne, Jason W.

    2007-01-01

    Claude Steele's stereotype threat hypothesis has attracted significant attention in recent years. This study tested one of the main tenets of his theory--that stereotype threat serves to increase individual anxiety levels, thus hurting performance--using real-time measures of physiological arousal. Subjects were randomly assigned to either high or…

  5. The threat simulation theory in light of recent empirical evidence: a review.

    PubMed

    Valli, Katja; Revonsuo, Antti

    2009-01-01

    The recently proposed threat simulation theory (TST) states that dreaming about threatening events has a biological function. In the past few years, the TST has led to several dream content analysis studies that empirically test the theory. The predictions of the TST have been investigated mainly with a new content analysis system, the Dream Threat Scale (DTS), a method developed for identifying and classifying threatening events in dreams. In this article we review the studies that have tested the TST with the DTS. We summarize and reevaluate the results based on the dreams of Finnish and Swedish university students, traumatized and nontraumatized Kurdish, Palestinian, and Finnish children, and special dream samples, namely recurrent dreams and nightmares collected from Canadian participants. We sum up other recent research that has relevance for the TST and discuss the extent to which empirical evidence supports or conflicts with the TST. New evidence and new direct tests of the predictions of the TST yield strong support for the theory, and the TST's strengths seem to outweigh its weaknesses. PMID:19353929

  6. Threat expert system technology advisor

    NASA Technical Reports Server (NTRS)

    Kurrasch, E. R.; Tripp, L. R.

    1987-01-01

    A prototype expert system was developed to determine the feasibility of using expert system technology to enhance the performance and survivability of helicopter pilots in a combat threat environment while flying NOE (Nap of the Earth) missions. The basis for the concept is the potential of using an Expert System Advisor to reduce the extreme overloading of the pilot who flies NOE mission below treetop level at approximately 40 knots while performing several other functions. The ultimate goal is to develop a Threat Expert System Advisor which provides threat information and advice that are better than even a highly experienced copilot. The results clearly show that the NOE pilot needs all the help in decision aiding and threat situation awareness that he can get. It clearly shows that heuristics are important and that an expert system for combat NOE helicopter missions can be of great help to the pilot in complex threat situations and in making decisions.

  7. Psychoanalysis and the nuclear threat

    SciTech Connect

    Levine, H.B.; Jacobs, D.; Rubin, L.J.

    1988-01-01

    {ital Psychoanalysis and the Nuclear Threat} provides coverage of the dynamic and clinical considerations that follow from life in the nuclear age. Of special clinical interest are chapters dealing with the developmental consequences of the nuclear threat in childhood, adolescence, and adulthood, and those exploring the technical issues raised by the occurrence in analytic and psychotherapeutic hours of material related to the nuclear threat. Additional chapters bring a psychoanalytic perspective to bear on such issues as the need to have enemies, silence as the real crime, love, work, and survival in the nuclear age, the relationship of the nuclear threat to issues of mourning and melancholia, apocalyptic fantasies, the paranoid process, considerations of the possible impact of gender on the nuclear threat, and the application of psychoanalytic thinking to nuclear arms strategy. Finally, the volume includes the first case report in the English language---albeit a brief psychotherapy---involving the treatment of a Hiroshima survivor.

  8. Managing biosecurity threats in China.

    PubMed

    Huang, Yanzhong

    2011-03-01

    Compared to the extensive literature on bioterrorism and biosecurity in the United States, less analysis has been conducted on similar challenges in China. This article seeks to fill this void by providing an integrated and updated assessment of 3 major biosecurity threats China faces: biowarfare, bioterrorism, and biocrimes. An analysis of China's biosecurity threats and biodefense building suggest varying levels of risk associated with each threat type. First, a direct bioweapons attack on China is highly unlikely, although the threat of biowarfare cannot be simply written off. Second, potential perpetrators of bioterrorism have capabilities at their disposal for carrying out such attacks. While terrorist organizations in China do not have a strong interest in bioterrorism, the limited state capability to counter such a threat may increase the risk in the future. Third, unlike the threats of biowarfare and bioterrorism, potential perpetrators of biocrimes have both incentives and capabilities, and biocrimes can produce reactions far out of proportion to the actual number of casualties. Despite the distinct biosecurity challenges it faces, China has yet to articulate a differentiated and coherent strategy to effectively tackle the challenges. Assessing different types of biosecurity threats in terms of degrees of risk not only provides greater analytical clarity but also has important implications for the strategies required to manage the risks. PMID:21361794

  9. Global Threats to Child Safety.

    PubMed

    Mace, Sharon E

    2016-02-01

    Children have rights, as enumerated in the Declaration of the Rights of the Child, and need protection from violence, exploitation, and abuse. Global threats to child safety exist. These threats include lack of basic needs (food, clean water, sanitation), maltreatment, abandonment, child labor, child marriage, female genital mutilation, child trafficking, disasters, and armed conflicts/wars. Recent disasters and armed conflicts have led to a record number of displaced people especially children and their families. Strategies and specific programs can be developed and implemented for eliminating threats to the safety of children. PMID:26613687

  10. Patient Safety Threat - Syringe Reuse

    MedlinePlus

    ... About CDC.gov . Injection Safety Share Compartir A Patient Safety Threat – Syringe Reuse Important Information! Please read ... due to syringe reuse by your healthcare provider. Patients need to be aware of a very serious ...

  11. Bomb Threat Becomes Real News.

    ERIC Educational Resources Information Center

    Gastaldo, Evann

    1999-01-01

    Discusses how the staff of the newspaper at Camarillo High School (California) covered a bomb threat at their school. Describes how they, overnight, conducted interviews, took and developed photographs, produced the layout, and published the newspaper. (RS)

  12. Combating the Insider Cyber Threat

    SciTech Connect

    Greitzer, Frank L.; Moore, Andrew P.; Cappelli, Dawn M.; Andrews, Dee H.; Carroll, Lynn; Hull, Thomas D.

    2008-01-02

    This article represents a collaboration between PNNL, CERT/CMU, and AFRL that describes needs and related efforts by these institutions to develop technologies and approaches to counter cyber threats by insiders to informatin systems. The main focus of this article is on the need for effective training on insider threat to raise staff awareness and encourage organizations to adopt a more effective approach to identifying potential risks and take proactive steps to mitigate them.

  13. Quantum correlation cost of the weak measurement

    SciTech Connect

    Zhang, Jun; Wu, Shao-xiong; Yu, Chang-shui

    2014-12-15

    Quantum correlation cost (QCC) characterizing how much quantum correlation is used in a weak-measurement process is presented based on the trace norm. It is shown that the QCC is related to the trace-norm-based quantum discord (TQD) by only a factor that is determined by the strength of the weak measurement, so it only catches partial quantumness of a quantum system compared with the TQD. We also find that the residual quantumness can be ‘extracted’ not only by the further von Neumann measurement, but also by a sequence of infinitesimal weak measurements. As an example, we demonstrate our outcomes by the Bell-diagonal state.

  14. Apple Strength Issues

    SciTech Connect

    Syn, C

    2009-12-22

    Strength of the apple parts has been noticed to decrease, especially those installed by the new induction heating system since the LEP campaign started. Fig. 1 shows the ultimate tensile strength (UTS), yield strength (YS), and elongation of the installed or installation-simulated apples on various systems. One can clearly see the mean values of UTS and YS of the post-LEP parts decreased by about 8 ksi and 6 ksi respectively from those of the pre-LEP parts. The slight increase in elongation seen in Fig.1 can be understood from the weak inverse relationship between the strength and elongation in metals. Fig.2 shows the weak correlation between the YS and elongation of the parts listed in Fig. 1. Strength data listed in Figure 1 were re-plotted as histograms in Figs. 3 and 4. Figs. 3a and 4a show histograms of all UTS and YS data. Figs. 3b and 4b shows histograms of pre-LEP data and Figs. 3c and 4c of post-LEP data. Data on statistical scatter of tensile strengths have been rarely published by material suppliers. Instead, only the minimum 'guaranteed' strength data are typically presented. An example of strength distribution of aluminum 7075-T6 sheet material, listed in Fig. 5, show that its scatter width of both UTS and YS for a single sheet can be about 6 ksi and for multi-lot scatter can be as large as 11 ksi even though the sheets have been produced through well-controlled manufacturing process. By approximating the histograms shown in Figs. 3 and 4 by a Gaussian or similar type of distribution curves, one can plausibly see the strength reductions in the later or more recent apples. The pre-LEP data in Figs. 3b and 4b show wider scatter than the post-LEP data in Figs. 3c and 4c and seem to follow the binomial distribution of strength indicating that the apples might have been made from two different lots of material, either from two different vendors or from two different melts of perhaps slightly different chemical composition by a single vendor. The post-LEP apples seem to have been from a single batch of material. The pre-LEP apples of the weak strength and the post-LEP apples with even weaker strength could have been made of the same batch of material, and the small strength differential might be due to the difference in the induction heating system. If the pre-LEP apples with the lower strength and the post LEP apples are made from the same batch of material, their combined scatter of strength data would be wider and can be understood as a result of the additional processing steps of stress relief and induction heating as discussed.

  15. Media use and children's perceptions of societal threat and personal vulnerability.

    PubMed

    Comer, Jonathan S; Furr, Jami M; Beidas, Rinad S; Babyar, Heather M; Kendall, Philip C

    2008-07-01

    This study examined children's media use (i.e., amount of television and Internet usage) and relationships to children's perceptions of societal threat and personal vulnerability. The sample consisted of 90 community youth aged 7 to 13 years (M = 10.8; 52.2% male) from diverse economic backgrounds. Analyses found children's television use to be associated with elevated perceptions of personal vulnerability to world threats (i.e., crime, terrorism, earthquakes, hurricanes, and floods). An interactive model of television use and child anxiety in accounting for children's personal threat perceptions was supported, in which the strength of television consumption in predicting children's personal threat perceptions was greater for children with greater anxiety. Relationships were found neither between children's Internet use and threat perceptions nor between media use and perceptions of societal threat. PMID:18645752

  16. Threat image projection in CCTV

    NASA Astrophysics Data System (ADS)

    Neil, David; Thomas, Nicola; Baker, Bob

    2007-10-01

    Operators are key components in a Closed Circuit Television (CCTV) system, being the link between the system technology and its effective use. Operators' performance will largely determine the level of service provided by the system. There have been few studies testing operator performance, while much work has been done to test the performance of the technology. Previous work on CCTV operator performance carried out by the Home Office Scientific Development Branch (HOSDB) has used filmed video and subjects who knew they were undergoing testing, meaning subjects are likely to be concentrating harder on performing well. HOSDB believes that there is a need for a test that would be able to be routinely used in a CCTV control room throughout the course of a normal shift to provide management with operational performance data. Threat Image Projection (TIP) is routinely used in X-Ray baggage scanners to keep operators alert to possible threats. At random intervals, a threat target image is superimposed over the image of the baggage being screened. The operator then responds to this threat. A similar system could be used for CCTV operators. A threat image would be randomly superimposed over the live CCTV feed and the operator would be expected to respond to this.

  17. Strength Testing.

    ERIC Educational Resources Information Center

    Londeree, Ben R.

    1981-01-01

    Postural deviations resulting from strength and flexibility imbalances include swayback, scoliosis, and rounded shoulders. Screening tests are one method for identifying strength problems. Tests for the evaluation of postural problems are described, and exercises are presented for the strengthening of muscles. (JN)

  18. The Social Construction of the Soviet Threat.

    ERIC Educational Resources Information Center

    Nathanson, Charles E.; Skelly, James M.

    For almost 40 years the perception of a Soviet threat has influenced much foreign and domestic political behavior in the United States. How to respond to the threat has been a subject of intense debate, but the reality of the threat has been taken for granted. Conviction about the reality of this threat dates back to George Kennan's long telegram

  19. Comparative Environmental Threat Analysis: Three Case Studies.

    ERIC Educational Resources Information Center

    Latour, J. B.; Reiling, R.

    1994-01-01

    Reviews how carrying capacity for different environmental problems is operationalized. Discusses whether it is possible to compare threats, using the exceeding of carrying capacity as a yardstick. Points out problems in comparative threat analysis using three case studies: threats to European groundwater resources, threats to ecosystems in Europe,…

  20. Comparative Environmental Threat Analysis: Three Case Studies.

    ERIC Educational Resources Information Center

    Latour, J. B.; Reiling, R.

    1994-01-01

    Reviews how carrying capacity for different environmental problems is operationalized. Discusses whether it is possible to compare threats, using the exceeding of carrying capacity as a yardstick. Points out problems in comparative threat analysis using three case studies: threats to European groundwater resources, threats to ecosystems in Europe,

  1. The Social Construction of the Soviet Threat.

    ERIC Educational Resources Information Center

    Nathanson, Charles E.; Skelly, James M.

    For almost 40 years the perception of a Soviet threat has influenced much foreign and domestic political behavior in the United States. How to respond to the threat has been a subject of intense debate, but the reality of the threat has been taken for granted. Conviction about the reality of this threat dates back to George Kennan's long telegram…

  2. Cyber threats within civil aviation

    NASA Astrophysics Data System (ADS)

    Heitner, Kerri A.

    Existing security policies in civil aviation do not adequately protect against evolving cyber threats. Cybersecurity has been recognized as a top priority among some aviation industry leaders. Heightened concerns regarding cyber threats and vulnerabilities surround components utilized in compliance with the Federal Aviation Administration's (FAA) Next Generation Air Transportation (NextGen) implementation. Automated Dependent Surveillance-B (ADS-B) and Electronic Flight Bags (EFB) have both been exploited through the research of experienced computer security professionals. Civil aviation is essential to international infrastructure and if its critical assets were compromised, it could pose a great risk to public safety and financial infrastructure. The purpose of this research was to raise awareness of aircraft system vulnerabilities in order to provoke change among current national and international cybersecurity policies, procedures and standards. Although the education of cyber threats is increasing in the aviation industry, there is not enough urgency when creating cybersecurity policies. This project intended to answer the following questions: What are the cyber threats to ADS-B of an aircraft in-flight? What are the cyber threats to EFB? What is the aviation industry's response to the issue of cybersecurity and in-flight safety? ADS-B remains unencrypted while the FAA's mandate to implement this system is rapidly approaching. The cyber threat of both portable and non-portable EFB's have received increased publicity, however, airlines are not responding quick enough (if at all) to create policies for the use of these devices. Collectively, the aviation industry is not being proactive enough to protect its aircraft or airport network systems. That is not to say there are not leaders in cybersecurity advancement. These proactive organizations must set the standard for the future to better protect society and it's most reliable form of transportation.

  3. Computer-assisted threat evaluation

    NASA Astrophysics Data System (ADS)

    Bains, Jatin S.; Davies, Livingston

    2006-05-01

    The use of a CATE (Computer Assisted Threat Evaluation) System in the Maritime Domain lends itself technically and operationally to data exploitation thru the use of domain forensics and link analysis of fragmented information utilizing data prioritization and suspicion indicators for an aggressor's method of operation. The timely availability of threat mitigating actionable information is one of the key tools for success in the Global War On Terror (GWOT). The global supply chain is vulnerable to exploitation by nefarious individuals, governments, and terrorist organizations. For example, Figure 1 illustrates one of many potential methods that could be used to circumvent regulations limiting proliferation of WMDs.

  4. Strength Training

    MedlinePlus

    ... great way to improve strength, endurance, and muscle tone. But remember to start slowly, use proper form, ... week will really pay off — besides better muscle tone and definition, you may find that you have ...

  5. Cyber Threats to Nuclear Infrastructures

    SciTech Connect

    Robert S. Anderson; Paul Moskowitz; Mark Schanfein; Trond Bjornard; Curtis St. Michel

    2010-07-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  6. Bomb Threats Taking Financial Toll

    ERIC Educational Resources Information Center

    Bowman, Darcia Harris

    2004-01-01

    Despite all its efforts to crack down on the bomb scares that disrupted classes again and again in 2003, North Carolina's Orange County district fell victim to yet another false alarm this school year, 2004. For some schools, bomb threats have become more routine than fire drills, with each incident ringing up multi-thousand-dollar tabs for…

  7. Hostile intelligence threat: US technology

    SciTech Connect

    Whitman, D.

    1988-11-01

    This publication outlines the hostile intelligence threat to U.S. industry and Western technology, including the operational capabilities of hostile intelligence services and their scientific and technological (S T) targets. Current intelligence strategies used against the United States are described and sources of information providing countermeasures guidance are listed. Points of contact for security and counterintelligence assistance are also included.

  8. Measuring Vulnerability to Stereotype Threat

    ERIC Educational Resources Information Center

    Barnard, Lucy; Burley, Hansel; Olivarez, Arturo; Crooks, Steven

    2008-01-01

    Introduction: In this study, we examined the psychometric properties of an instrument intended to measure vulnerability to stereotype threat. Method: We revised the instrument through assessing score reliability and then examined a domain specific model using confirmatory factor analyses. After examining the responses of the total sample…

  9. Bomb Threats Taking Financial Toll

    ERIC Educational Resources Information Center

    Bowman, Darcia Harris

    2004-01-01

    Despite all its efforts to crack down on the bomb scares that disrupted classes again and again in 2003, North Carolina's Orange County district fell victim to yet another false alarm this school year, 2004. For some schools, bomb threats have become more routine than fire drills, with each incident ringing up multi-thousand-dollar tabs for

  10. Coupling-deformed pointer observables and weak values

    NASA Astrophysics Data System (ADS)

    Zhang, Yu-Xiang; Wu, Shengjun; Chen, Zeng-Bing

    2016-03-01

    While the novel applications of weak values have recently attracted wide attention, weak measurement, the usual way to extract weak values, suffers from risky approximations and severe quantum noises. In this paper, we show that the weak-value information can be obtained exactly in strong measurement with postselections, via measuring the coupling-deformed pointer observables, i.e., the observables selected according to the coupling strength. With this approach, we keep all the advantages claimed by weak-measurement schemes and at the same time solve some widely criticized problems thereof, such as the questionable universality, systematical bias, and drastic inefficiency.

  11. Strengths and Weaknesses of Two New Potato Herbicides

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Outlook (dimethenamid-p) and Chateau (flumioxazin) are two new preemergence herbicides labeled for use in potatoes. Both herbicides are restricted to preemergence applications only and improve nightshade control when tank mixed with other potato herbicides. Dimethenamid-p is particularly strong on ...

  12. The Strengths and Weaknesses of ISO 9000 in Vocational Education

    ERIC Educational Resources Information Center

    Bevans-Gonzales, Theresa L.; Nair, Ajay T.

    2004-01-01

    ISO 9000 is a set of quality standards that assists an organization to identify, correct and prevent errors, and to promote continual improvement. Educational institutions worldwide are implementing ISO 9000 as they face increasing external pressure to maintain accountability for funding. Similar to other countries, in the United States vocational…

  13. Overview of inhalation exposure techniques: strengths and weaknesses.

    PubMed

    Pauluhn, Jürgen

    2005-07-01

    The vast majority of toxicity studies and risk evaluations deal with single chemicals. Due to the growing interest in potential human health risks originating from exposure to environmental pollutants or lifestyle-related complex chemical mixtures, well thought-out tailor-made mechanistic inhalation toxicity studies have been performed. In contrast to the complex mixtures potentially encountered from hazardous waste sites, drinking water disinfection by-products, natural flavoring complexes or the cumulative intake of food additives and pesticide residues, the scientific evaluation of complex airborne mixtures, such as acid aerosols, atmospheres produced by combustion or thermolysis, e.g. residual oil fly ash (ROFA), diesel and gasoline exhaust, and tobacco smoke, or volatile organic chemicals (VOCs) in residential areas, to mention but a few, is a daunting challenge for experimental toxicologists. These challenges include the controlled in situ generation of exposure atmospheres, the compositions of which are often process-determined and metastable. This means that volatile agents may partition with liquid aerosols or be adsorbed onto surfaces of solid aerosols. Similarly, the nature and composition of test atmospheres might change continuously through oxidation and aging of constituents or coagulation of particles. This, in turn, poses additional challenges to the analytical characterization of such complex test atmospheres, including the identification of potential experimental artifacts. Accordingly, highly standardized and controlled inhalation studies are required for hazard identification of complex mixtures and the results of inhalation studies have to be analyzed judiciously due to the great number of experimental variables. These variables may be related to technical issues or to the specific features of the animal model. Although inhalation exposure of animals mimics human exposure best, not all results obtained under such rigorous test conditions might necessarily also occur under real-life exposure conditions. In addition, to simulate experimentally specific use or exposure patterns may impose a particular challenge to traditional approaches in terms of relevant exposure metrics and the analytes chosen to characterize exposure atmospheres. This paper addresses major developments in the discipline of inhalation toxicology with particular emphasis on the state-of-the-art testing of complex mixtures. PMID:16092719

  14. Finnish Vocational Education and Training in Comparison: Strengths and Weaknesses

    ERIC Educational Resources Information Center

    Virolainen, Maarit; Stenström, Marja-Leena

    2014-01-01

    The study investigates how the Finnish model of providing initial vocational education and training (IVET) has succeeded in terms of enhancing educational progress and employability. A relatively high level of participation in IVET makes the Finnish model distinctive from those of three other Nordic countries: Denmark, Norway and Sweden. All four…

  15. Medical education in the Sudan: its strengths and weaknesses.

    PubMed

    Fahal, Ahmed Hassan

    2007-11-01

    The history of medical education in the Sudan is both long and interesting. It began in 1924 and has passed through several different phases and stages. Despite numerous difficulties and constraints along the way, vast experience has been gained and many achievements made, all of which have had positive impacts on the health system in the Sudan and the Region. This paper aims to share the experiences and lessons that have emerged from the journey of medical education in the Sudan, and explores the future need for continuing support and dialogue from international colleagues to maintain momentum. PMID:18158664

  16. Investigating the Implementation of Whole Language: Strengths and Weaknesses

    ERIC Educational Resources Information Center

    LeDoux, Amanda

    2007-01-01

    The Whole Language/Phonics debate has been raging in California since the 1980s. However, there has been no real determination about which method is best for teaching reading to our students. Yet the Whole Language method has lost the recognition and respect of the educational community because the program was not implemented by all teachers the…

  17. History of Weak Interactions

    DOE R&D Accomplishments Database

    Lee, T. D.

    1970-07-01

    While the phenomenon of beta-decay was discovered near the end of the last century, the notion that the weak interaction forms a separate field of physical forces evolved rather gradually. This became clear only after the experimental discoveries of other weak reactions such as muon-decay, muon-capture, etc., and the theoretical observation that all these reactions can be described by approximately the same coupling constant, thus giving rise to the notion of a universal weak interaction. Only then did one slowly recognize that the weak interaction force forms an independent field, perhaps on the same footing as the gravitational force, the electromagnetic force, and the strong nuclear and sub-nuclear forces.

  18. Networked Learning a Relational Approach: Weak and Strong Ties

    ERIC Educational Resources Information Center

    Jones, C. R.; Ferreday, D.; Hodgson, V.

    2008-01-01

    In this paper, we explore the idea of weak ties in networked learning. We go back to the original conception of the strength of weak ties and relate this to Bakhtin and a dialogic understanding of networked learning. These theoretical ideas are applied to the examination of two networked settings in which educational leaders exchange ideas and…

  19. Threats to the president revisited.

    PubMed

    Bort, R F

    1977-01-01

    Ten prisoners charged with "threatening the President of the United States" were evaluated in an effort to seek out psychiatric and sociological factors involved in this offence. Comparisons were made with known presidential assassins. A history of abandonment as a child, single or divorced state, and a diagnosis of paranoid schizophrenia were prominent in both the study group and the group of know assassins. Additionally, the apparent psychological need behind both the threats and the actual assassinations appeared remarkably similar in both groups. The primary differentiating variable related to lethality was "opportunity and happenstance". It is proposed that those threatening the President by letter are at high risk for carrying out their threat if intervention does not take place. PMID:863349

  20. New threats to academic freedom.

    PubMed

    Minerva, Francesca

    2014-05-01

    Using a specific case as an example, the article argues that the Internet allows dissemination of academic ideas to the general public in ways that can sometimes pose a threat to academic freedom. Since academic freedom is a fundamental element of academia and since it benefits society at large, it is important to safeguard it. Among measures that can be taken in order to achieve this goal, the publication of anonymous research seems to be a good option. PMID:24602125

  1. Bacterial Growth in Weak Magnetic Field

    NASA Astrophysics Data System (ADS)

    Masood, Samina

    2015-03-01

    We study the growth of bacteria in a weak magnetic field. Computational analysis of experimental data shows that the growth rate of bacteria is affected by the magnetic field. The effect of magnetic field depends on the strength and type of magnetic field. It also depends on the type of bacteria. We mainly study gram positive and gram negative bacteria of rod type as well as spherical bacteria. Preliminary results show that the weak magnetic field enhances the growth of rod shape gram negative bacteria. Gram positive bacteria can be even killed in the inhomogeneous magnetic field.

  2. Antibiotic and Antimicrobial Resistance: Threat Report 2013

    MedlinePlus

    ... Address What's this? Submit What's this? Submit Button Antibiotic Resistance Threats in the United States, 2013 Recommend on Facebook Tweet Share Compartir This report, Antibiotic resistance threats in the United States, 2013 gives ...

  3. Group Threat and Policy Change: The Spatial Dynamics of Prohibition Politics, 1890-1919.

    PubMed

    Andrews, Kenneth T; Seguin, Charles

    2015-09-01

    The authors argue that group threat is a key driver of the adoption of new and controversial policies. Conceptualizing threat in spatial terms, they argue that group threat is activated through the joint occurrence of (1) proximity to threatening groups and (2) the population density of threatened groups. By analyzing the adoption of county and state "dry laws" banning alcohol from 1890 to 1919, they first show that prohibition victories were driven by the relative strength of supportive constituencies such as native whites and rural residents, vis-à-vis opponents such as Irish, Italian, or German immigrants or Catholics. Second, they show that threat contributed to prohibition victories: counties bordering large immigrant or urban populations, which did not themselves contain similar populations, were more likely to adopt dry laws. Threat arises primarily from interactions between spatially proximate units at the local level, and therefore higher-level policy change is not reducible to the variables driving local policy. PMID:26594715

  4. A Review of the Theory and Research Underlying the StrengthsQuest Program for Students. The Quest for Strengths

    ERIC Educational Resources Information Center

    Hodges, Timothy D.; Harter, James K.

    2005-01-01

    StrengthsQuest is a student program that focuses on strengths rather than weaknesses. It is intended to lead students to discover their natural talents and gain unique and valuable insights into how to develop such talents into strengths--strengths that equip them to succeed and to make important decisions that enable them to balance the demands

  5. Stereotype Threat, Test Anxiety, and Mathematics Performance

    ERIC Educational Resources Information Center

    Tempel, Tobias; Neumann, Roland

    2014-01-01

    We investigated the combined effects of stereotype threat and trait test anxiety on mathematics test performance. Stereotype threat and test anxiety interacted with each other in affecting performance. Trait test anxiety predicted performance only in a diagnostic condition that prevented stereotype threat by stereotype denial. A state measure of

  6. Threat Assessment Teams Target School Crisis

    ERIC Educational Resources Information Center

    Stover, Del

    2005-01-01

    In this article, the author discusses the creation of a threat-assessment team to be utilized in order to analyze each threat and the usage of threat-assessment protocols for the purpose of guiding school administrators through a crisis. These are actually developed with the advice from the US Department of Education and the Secret Service. When a…

  7. Stereotype Threat, Test Anxiety, and Mathematics Performance

    ERIC Educational Resources Information Center

    Tempel, Tobias; Neumann, Roland

    2014-01-01

    We investigated the combined effects of stereotype threat and trait test anxiety on mathematics test performance. Stereotype threat and test anxiety interacted with each other in affecting performance. Trait test anxiety predicted performance only in a diagnostic condition that prevented stereotype threat by stereotype denial. A state measure of…

  8. Shades of Threat: Racial Identity as a Moderator of Stereotype Threat

    ERIC Educational Resources Information Center

    Davis, Claytie, III; Aronson, Joshua; Salinas, Moises

    2006-01-01

    This study investigated Black racial identity attitudes as a moderator of intellectual performance in potentially stereotype threatening situations. Ninety-eight African American students were randomly assigned to one of three stereotype threatening conditions: low threat, medium threat, or high threat. Analyses confirmed a stereotype threat

  9. Rheology of weakly vibrated granular media

    NASA Astrophysics Data System (ADS)

    Wortel, Geert H.; Dijksman, Joshua A.; van Hecke, Martin

    2014-01-01

    We probe the rheology of weakly vibrated granular flows as function of flow rate, vibration strength, and pressure by performing experiments in a vertically vibrated split-bottom shear cell. For slow flows, we establish the existence of a vibration-dominated granular flow regime, where the driving stresses smoothly vanish as the driving rate is diminished. We distinguish three qualitatively different vibration-dominated rheologies, most strikingly a regime where the shear stresses no longer are proportional to the pressure.

  10. The role of threats in animal cooperation.

    PubMed

    Cant, Michael A

    2011-01-22

    In human societies, social behaviour is strongly influenced by threats of punishment, even though the threats themselves rarely need to be exercised. Recent experimental evidence suggests that similar hidden threats can promote cooperation and limit within-group selfishness in some animal systems. In other animals, however, threats appear to be ineffective. Here I review theoretical and empirical studies that help to understand the evolutionary causes of these contrasting patterns, and identify three factors-impact, accuracy and perception-that together determine the effectiveness of threats to induce cooperation. PMID:20798110

  11. Threats to Networked RFID Systems

    NASA Astrophysics Data System (ADS)

    Mitrokotsa, Aikaterini; Beye, Michael; Peris-Lopez, Pedro

    RFID technology is an area currently undergoing active development. An issue, which has received a lot of attention, is the security risks that arise due to the inherent vulnerabilities of RFID technology. Most of this attention, however, has focused on related privacy issues. The goal of this chapter is to present a more global overview of RFID threats. This can not only help experts perform risk analyses of RFID systems but also increase awareness and understanding of RFID security issues for non-experts. We use clearly defined and widely accepted concepts from both the RFID area and classical risk analysis to structure this overview.

  12. Stereotype threat and female communication styles.

    PubMed

    von Hippel, Courtney; Wiryakusuma, Cindy; Bowden, Jessica; Shochet, Megan

    2011-10-01

    A large body of research has documented the performance-debilitating effects of stereotype threat for individuals, but there is a paucity of research exploring interpersonal consequences of stereotype threat. Two experiments tested the hypothesis that stereotype threat would change the style in which women communicate. Results indicate that women who experience stereotype threat regarding leadership abilities react against the stereotype by adopting a more masculine communication style. Study 2 provides evidence that self-affirmation eliminates this effect of stereotype threat on women's communication styles. A third study demonstrates an ironic consequence of this effect of stereotype threat on women's communication--when women under stereotype threat adopt a more masculine communication style, they are rated as less warm and likeable, and evaluators indicate less willingness to comply with their requests. Theoretical and practical implications of these findings are discussed. PMID:21646549

  13. Weak decays at PEP

    SciTech Connect

    Yelton, J.M.

    1984-04-01

    Results are presented on four aspects of weak decays. The MARK II measurement of the tau lifetime, the MARK II measurement of the D/sup 0/ lifetime, the measurement from several experiments of the semi-leptonic branching fractions of hadrons constraining b and c quarks, and lastly the MAC measurement of the B lifetime. 30 references.

  14. In praise of weakness

    NASA Astrophysics Data System (ADS)

    Steinberg, Aephraim; Feizpour, Amir; Rozema; Mahler; Hayat

    2013-03-01

    Quantum physics is being transformed by a radical new conceptual and experimental approach known as weak measurement that can do everything from tackling basic quantum mysteries to mapping the trajectories of photons in a Young's double-slit experiment. Aephraim Steinberg, Amir Feizpour, Lee Rozema, Dylan Mahler and Alex Hayat unveil the power of this new technique.

  15. Human collective reactions to threat.

    PubMed

    Dezecache, Guillaume

    2015-01-01

    A common assumption regarding mass emergency situations is that individuals in such contexts behave in a way that maximizes their likelihood to escape, at the expense, or with little concern for, the welfare and survival of their neighbors. Doing so, they might even compromise the effectiveness of group evacuation. This conception follows the views of early works on crowd psychology, a tradition born with Gustave Le Bon's The Crowd: a study of the Popular Mind, first published in 1895, and which has had a tremendous impact on scientific representations of people's behavior in mass emergency contexts. Indeed, this work has greatly contributed to the idea that, in such situations, people revert to a primitive, impulsive, irrational, and antisocial nature, causing the breakdown of social order. However, more empirically oriented studies have consistently reported little collective panic, as well as a great deal of solidarity and pro-social behavior during mass emergency situations. Because of institutional barriers, such views have remained largely unknown to cognitive psychologists. Yet these are important results in that they show that human individual and collective reactions to threat are primarily affiliative. Indeed, far from leading to the breakdown of the social fabrics, the presence of a common threat can strengthen social bonds. PMID:26263225

  16. Threat sensitivity in bipolar disorder.

    PubMed

    Muhtadie, Luma; Johnson, Sheri L

    2015-02-01

    Life stress is a major predictor of the course of bipolar disorder. Few studies have used laboratory paradigms to examine stress reactivity in bipolar disorder, and none have assessed autonomic reactivity to laboratory stressors. In the present investigation we sought to address this gap in the literature. Participants, 27 diagnosed with bipolar I disorder and 24 controls with no history of mood disorder, were asked to complete a complex working memory task presented as "a test of general intelligence." Self-reported emotions were assessed at baseline and after participants were given task instructions; autonomic physiology was assessed at baseline and continuously during the stressor task. Compared to controls, individuals with bipolar disorder reported greater increases in pretask anxiety from baseline and showed greater cardiovascular threat reactivity during the task. Group differences in cardiovascular threat reactivity were significantly correlated with comorbid anxiety in the bipolar group. Our results suggest that a multimethod approach to assessing stress reactivity-including the use of physiological parameters that differentiate between maladaptive and adaptive profiles of stress responding-can yield valuable information regarding stress sensitivity and its associations with negative affectivity in bipolar disorder. (PsycINFO Database Record (c) 2015 APA, all rights reserved). PMID:25688436

  17. Weak Finsler structures and the Funk weak metric

    NASA Astrophysics Data System (ADS)

    Papadopoulos, Athanase; Troyanov, Marc

    2009-04-01

    We discuss general notions of metrics and of Finsler structures which we call weak metrics and weak Finsler structures. Any convex domain carries a canonical weak Finsler structure, which we call its tautological weak Finsler structure. We compute distances in the tautological weak Finsler structure of a domain and we show that these are given by the so-called Funk weak metric. We conclude the paper with a discussion of geodesics, of metric balls and of convexity properties of the Funk weak metric.

  18. On the costs and benefits of directing attention towards or away from threat-related stimuli: a classical conditioning experiment.

    PubMed

    Van Bockstaele, Bram; Verschuere, Bruno; De Houwer, Jan; Crombez, Geert

    2010-07-01

    In attentional bias modification programs, individuals are trained to attend away from threat in order to reduce emotional reactivity to stressful situations. However, attending towards threat is considered to be a prerequisite for fear reduction in other models of anxiety. We compared both views by manipulating attention towards or away from an acquired signal of threat. The strength of extinction and reacquisition was assessed with threat and US-expectancy ratings. We found more extinction in the attend towards threat group, compared to both the attend away from threat group and a control group in which attention was not manipulated. The results are in line with the Emotional Processing Theory and cognitive accounts of classical conditioning. PMID:20451175

  19. Countering the Nuclear Terrorist Threat

    SciTech Connect

    Vantine, H C

    2002-10-04

    The nuclear/radioactive threat to homeland security posed by terrorists can be broken into four categories. Of highest concern is the use of an improvised nuclear device (IND). An IND, as its name implies, is a nuclear explosive device. It produces nuclear yield, and this nuclear yield has catastrophic effects. An IND is the ultimate terrorist weapon, and terrorist groups are actively attempting to acquire nuclear weapons. Detonation of an IND could dwarf the devastation of the September 11 attack on the World Trade Center. Dealing with the aftermath of an IND would be horrific. Rescue efforts and cleanup would be hazardous and difficult. Workers would have to wear full protection suits and self-contained breathing apparatus. Because of the residual radioactivity, in certain locations they could only work short times before acquiring their ''lifetime'' dose. As with the Chernobyl event, some rescue workers might well expose themselves to lethal doses of radiation, adding to the casualty toll. Enormous volumes of contaminated debris would have to be removed and disposed. If a terrorist group decides not to pursue an actual nuclear device, it might well turn to Radiological Dispersal Devices (RDDs) or ''dirty bombs'' as they are often called. RDDs spread radioactivity but they do not generate nuclear yield. The fabrication of an RDD requires radioactive material and a dispersal mechanism. Radioactive materials are used all over the world for medical, industrial, and research applications. Standards for safe handling and accountability of radioactive material vary around the world. Stories in the press suggest inadequate controls on radiological materials in parts of the world. The effects of an RDD vary widely, and are measured in terms of contamination area, health effects to the exposed population, and economic consequences. Even a negligible, but measurable, exposure would exploit the general public's fear of things radioactive and would have significant psychological consequences. The greatest impact of a small release would probably be economic, associated with cleanup and restoration of the contaminated area. Another category of threat is the attack on a facility, either a power reactor or sabotage of a large radiation source. In general these facilities are hard targets (structurally), and damage and contamination are localized. The final category of threat is the use of radioactive materials to deliver a radiation dose to individuals. This type of attack is again localized and does not readily fall into the category of a weapon of mass destruction.

  20. Enhanced Memory for both Threat and Neutral Information Under Conditions of Intergroup Threat

    PubMed Central

    Zhu, Yong; Zhao, Yufang; Ybarra, Oscar; Stephan, Walter G.; Yang, Qing

    2015-01-01

    Few studies have examined the effect of intergroup threat on cognitive outcomes such as memory. Different theoretical perspectives can inform how intergroup threat should affect memory for threat-relevant and neutral information, such as the mood-congruency approach, Yerkes–Dodson law, Easterbrook’s theory, and also evolutionary perspectives. To test among these, we conducted two experiments to examine how exposure to intergroup threats affected memory compared to control conditions. In study 1, we manipulated symbolic threat and examined participants’ memory for threat and neutral words. In study 2, memory performance was assessed following the induction of realistic threat. Across the studies, in the control condition participants showed better memory for threat-related than neutral information. However, participants under threat remembered neutral information as well as threat-related information. In addition, participants in the threat condition remembered threat-related information as well as participants in the control condition. The findings are discussed in terms of automatic vigilance processes but also the effects of threat on arousal and its effect on information processing. This latter perspective, suggests paradoxically, that under some circumstances involving an outgroup threat, non-threatening information about outgroups can be extensively processed. PMID:26635669

  1. Enhanced Memory for both Threat and Neutral Information Under Conditions of Intergroup Threat.

    PubMed

    Zhu, Yong; Zhao, Yufang; Ybarra, Oscar; Stephan, Walter G; Yang, Qing

    2015-01-01

    Few studies have examined the effect of intergroup threat on cognitive outcomes such as memory. Different theoretical perspectives can inform how intergroup threat should affect memory for threat-relevant and neutral information, such as the mood-congruency approach, Yerkes-Dodson law, Easterbrook's theory, and also evolutionary perspectives. To test among these, we conducted two experiments to examine how exposure to intergroup threats affected memory compared to control conditions. In study 1, we manipulated symbolic threat and examined participants' memory for threat and neutral words. In study 2, memory performance was assessed following the induction of realistic threat. Across the studies, in the control condition participants showed better memory for threat-related than neutral information. However, participants under threat remembered neutral information as well as threat-related information. In addition, participants in the threat condition remembered threat-related information as well as participants in the control condition. The findings are discussed in terms of automatic vigilance processes but also the effects of threat on arousal and its effect on information processing. This latter perspective, suggests paradoxically, that under some circumstances involving an outgroup threat, non-threatening information about outgroups can be extensively processed. PMID:26635669

  2. Hysteresis in weak ferromagnets

    NASA Astrophysics Data System (ADS)

    Bazaliy, Ya. B.; Tsymbal, L. T.; Kakazei, G. N.; Vasiliev, S. V.

    2011-03-01

    Magnetic hysteresis is studied in the orthoferrites ErFeO3 and TmFeO3 using the single crystal samples of millimeter dimensions. It is shown that in both materials one observes a temperature transition manifesting itself through the temperature hysteresis of the magnetic moment and a peculiar temperature evolution of the field hysteresis loop shapes near this transition. Experiments rule out the hypothesis that the ordering of the orthoferrite's rare earth magnetic moments plays an important role in these phenomena. The hysteresis curves can be explained by a few-domain magnetic state of the samples that results from the weak ferromagnetism of the orthoferrites. The phenomenon is generic for weak ferromagnets with temperature dependent magnetization. A large characteristic magnetic length makes the behavior of the relatively big samples analogous to that observed in the nano-size samples of strong ferromagnets. Supported by NSF DMR-0847159, Ukrainian DFFD F28/456-2009, Portuguese FCT ``Ciencia 2007''.

  3. Weakly supervised glasses removal

    NASA Astrophysics Data System (ADS)

    Wang, Zhicheng; Zhou, Yisu; Wen, Lijie

    2015-03-01

    Glasses removal is an important task on face recognition, in this paper, we provide a weakly supervised method to remove eyeglasses from an input face image automatically. We choose sparse coding as face reconstruction method, and optical flow to find exact shape of glasses. We combine the two processes iteratively to remove glasses more accurately. The experimental results reveal that our method works much better than these algorithms alone, and it can remove various glasses to obtain natural looking glassless facial images.

  4. Composite weak bosons

    SciTech Connect

    Suzuki, M.

    1988-04-01

    Dynamical mechanism of composite W and Z is studied in a 1/N field theory model with four-fermion interactions in which global weak SU(2) symmetry is broken explicitly by electromagnetic interaction. Issues involved in such a model are discussed in detail. Deviation from gauge coupling due to compositeness and higher order loop corrections are examined to show that this class of models are consistent not only theoretically but also experimentally.

  5. Macrocyclic weakly coordinating anions.

    PubMed

    Landskron, Kai

    2015-10-01

    Herein, the concept of macrocyclic weakly coordinating anions (M-WCAs) is introduced. Synthetic methodologies are described how to access M-WCAs by thermodynamically controlled self-assembly in high yields, in particular through condensation and alkyne metathesis reactions. The anticipated properties and applications of M-WCAs in solid state and in solution are discussed, specifically for gas storage and separation, homogeneous and heterogeneous catalysis, and as liquid and solid electrolytes. PMID:26272789

  6. "Filoviruses": a real pandemic threat?

    PubMed

    Martina, Byron E E; Osterhaus, Albert D M E

    2009-04-01

    Filoviruses are zoonotic and among the deadliest viruses known to mankind, with mortality rates in outbreaks reaching up to 90%. Despite numerous efforts to identify the host reservoir(s), the transmission cycle of filoviruses between the animal host(s) and humans remains unclear. The last decade has witnessed an increase in filovirus outbreaks with a changing epidemiology. The high mortality rates and lack of effective antiviral drugs or preventive vaccines has propagated the fear that filoviruses may become a real pandemic threat. This article discusses the factors that could influence the possible pandemic potential of filoviruses and elaborates on the prerequisites for the containment of future outbreaks, which would help prevent the evolution of filovirus into more virulent and more transmissible viruses. PMID:20049699

  7. World's soils are under threat

    NASA Astrophysics Data System (ADS)

    Montanarella, Luca; Pennock, Daniel Jon; McKenzie, Neil; Badraoui, Mohamed; Chude, Victor; Baptista, Isaurinda; Mamo, Tekalign; Yemefack, Martin; Singh Aulakh, Mikha; Yagi, Kazuyuki; Hong, Suk Young; Vijarnsorn, Pisoot; Zhang, Gan-Lin; Arrouays, Dominique; Black, Helaina; Krasilnikov, Pavel; Sobocká, Jaroslava; Alegre, Julio; Henriquez, Carlos Roberto; de Lourdes Mendonça-Santos, Maria; Taboada, Miguel; Espinosa-Victoria, David; AlShankiti, Abdullah; Kazem AlaviPanah, Sayed; El Mustafa Elsheikh, Elsiddig Ahmed; Hempel, Jon; Camps Arbestain, Marta; Nachtergaele, Freddy; Vargas, Ronald

    2016-02-01

    The Intergovernmental Technical Panel on Soils has completed the first State of the World's Soil Resources Report. Globally soil erosion was identified as the gravest threat, leading to deteriorating water quality in developed regions and to lowering of crop yields in many developing regions. We need to increase nitrogen and phosphorus fertilizer use in infertile tropical and semi-tropical soils - the regions where the most food insecurity among us are found - while reducing global use of these products overall. Stores of soil organic carbon are critical in the global carbon balance, and national governments must set specific targets to stabilize or ideally increase soil organic carbon stores. Finally the quality of soil information available for policy formulation must be improved - the regional assessments in the State of the World's Soil Resources Report frequently base their evaluations on studies from the 1990s based on observations made in the 1980s or earlier.

  8. World's soils are under threat

    NASA Astrophysics Data System (ADS)

    Montanarella, L.; Pennock, D. J.; McKenzie, N. J.; Badraoui, M.; Chude, V.; Baptista, I.; Mamo, T.; Yemefack, M.; Singh Aulakh, M.; Yagi, K.; Hong, S. Young; Vijarnsorn, P.; Zhang, G.-L.; Arrouays, D.; Black, H.; Krasilnikov, P.; Sobocká, J.; Alegre, J.; Henriquez, C. R.; Mendonça-Santos, M. L.; Taboada, M.; Espinosa-Victoria, D.; AlShankiti, A.; AlaviPanah, S. K.; Elsheikh, E. A. E.; Hempel, J.; Camps Arbestain, M.; Nachtergaele, F.; Vargas, R.

    2015-12-01

    The Intergovernmental Technical Panel on Soils has completed the first State of the World's Soil Resources report. Globally soil erosion was identified as the gravest threat, leading to deteriorating water quality in developed regions and to lowering of crop yields in many developing regions. We need to increase nitrogen and phosphorus fertilizer use in infertile tropical and semi-tropical soils - the regions where the most food insecure among us are found - while reducing global use of these products overall. Stores of soil organic carbon are critical in the global carbon balance, and national governments must set specific targets to stabilize or ideally increase soil organic carbon stores. Finally the quality of soil information available for policy formulation must be improved - the regional assessments in the SWSR report frequently base their evaluations on studies from the 1990s based on observations made in the 1980s or earlier.

  9. Real threat of nuclear smuggling

    SciTech Connect

    Williams, P.; Woessner, P.N.

    1996-01-01

    Trade in uranium and plutonium during the past five years has given smuggling unprecedented relevance to international security. Yet there is considerable controversy over the threat nuclear smuggling poses. Even though serious efforts are being made to attack the problem at the source, the international community has been slow to respond to the dangers that nuclear smuggling presents. We suggest that systematic multinational measures be taken as soon as possible to inhibit theft at the source, to disrupt trafficking and to deter buyers. The U.S., Germany, Russia and other nations with an interest in the nuclear problem should set up a `flying squad` with an investigative arm, facilities for counter terrorist and counter extortion actions and a disaster management team. This paper discusses these issues. 3 refs.

  10. Potential threats to offshore platforms

    SciTech Connect

    Jenkins, B.M.

    1988-01-01

    Increasingly spectacular acts of terrorism have led to growing concern that terrorists will move beyond the symbols of society and directly attack its technological and industrial vulnerabilities. Offshore platforms have been frequently mentioned among the potential targets terrorists might attack. This concern, however, has not resulted in extensive research like that devoted to possible threats to nuclear facilities, which have also been frequently mentioned as possible future targets of terrorists. For one thing, offshore drilling does not invoke the fear inherent in the word nuclear, a fear that translates directly into heavy security for the nuclear industry. Neither does the construction of offshore platforms provoke anything like the kind of protest generated by the construction of nuclear facilities.

  11. Effect of evaluation threat on procrastination behavior.

    PubMed

    Bui, Ngoc H

    2007-06-01

    The author evaluated the effects of evaluation apprehension and trait procrastination on behaviors. The author examined private university students from southern California (N = 72) on two independent variables: evaluation threat (manipulated) and trait procrastination (nonmanipulated). The author found a significant interaction effect between type of evaluation threat and level of trait procrastination on the number of days to complete an assigned essay. Post hoc analyses showed high trait procrastinators in the high evaluation threat group significantly delayed returning essays compared with those in the low evaluation threat group. Also, in the low evaluation threat group, low trait procrastinators delayed more than did high trait procrastinators. These results suggest that educators can reduce behavioral delays by increasing evaluation threat, depending on a student's level of trait procrastination. PMID:17703786

  12. Sensor-guided threat countermeasure system

    DOEpatents

    Stuart, Brent C.; Hackel, Lloyd A.; Hermann, Mark R.; Armstrong, James P.

    2012-12-25

    A countermeasure system for use by a target to protect against an incoming sensor-guided threat. The system includes a laser system for producing a broadband beam and means for directing the broadband beam from the target to the threat. The countermeasure system comprises the steps of producing a broadband beam and directing the broad band beam from the target to blind or confuse the incoming sensor-guided threat.

  13. Autonomous Realtime Threat-Hunting Robot (ARTHR

    SciTech Connect

    INL

    2008-05-29

    Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats.

  14. DOE site-specific threat assessment

    SciTech Connect

    West, D.J.; Al-Ayat, R.A.; Judd, B.R.

    1985-07-12

    A facility manager faced with the challenges of protecting a nuclear facility against potential threats must consider the likelihood and consequences of such threats, know the capabilities of the facility safeguards and security systems, and make informed decisions about the cost-effectivness of safeguards and security upgrades. To help meet these challenges, the San Francisco Operations Office of the Department of Energy, in conjunction with the Lawrence Livermore Laboratory, has developed a site-specific threat assessment approach and a quantitative model to improve the quality and consistency of site-specific threat assessment and resultant security upgrade decisions at sensitive Department of Energy facilities. 5 figs.

  15. Autonomous Realtime Threat-Hunting Robot (ARTHR

    ScienceCinema

    INL

    2009-09-01

    Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats.

  16. QM02 Strength Measurement

    SciTech Connect

    Welch, J; Wu, J.; ,

    2010-11-24

    In late April, Paul Emma reported that his orbit fitting program could find a reasonably good fit only if the strength of QM02 was changed from design value of -5.83 kG to -6.25 kG - a strength change of 7.3%. In late May, we made a focal length measurement of QM02 by turning off all focusing optics between YC07 and BPMS1 (in the spectrometer line) except for QM02 and adjusted the strength of QM02 so that vertical kicks by YC07 did not produce any displacements at BPMS1 (see Figure 1). The result was quoted in the LCLS elog was that QM02 appeared to 6% too weak, and approximately agreed with Paul's observation. The analysis used for the entry in the log book was based on the thin lens approximation and used the following numbers: Distance YC07 to QM02 - 5.128 m; Distance QM02 to BPMS1 - 1.778 m; and Energy - 135 MeV. These distances were computed from the X,Z coordinates given the on the large plot of the Injector on the wall of the control room. On review of the MAD output file coordinates, it seems that the distance used for QM02 to BPMS1 is not 1.778 m. The correct value is Distance, center of QM02 to BPMS1 - 1.845 m. There may be a typo on the wall chart values for the coordinates of BPMS1, or perhaps there was a misinterpretation of edge versus center of QM02. In any case, the effect of this change is that the thin lens estimate changes from 6% too weak to 9% too weak. At John Galayda's suggestion, we looked into the thin lens versus thick lens approximation. A Mathematica program was written to solve for the K value of the QM02, in the thick lens approximation, that provides point to point focusing from YC07 to BPMS1, and to compare this number with the value obtained using the thin lens approximation. The length of QM02 used in the thick lens calculation is the effective length determined by magnetic measurements of 0.108 m. The result of the Mathematica calculation is that the thin lens approximation predicts less magnet strength is required to produce the same focusing by about 1.3%. When both the distance correction and the thick lens approximation are taken into account, the result is: K{sub thick} - K{sub mm}/K{sub thick} = -7.6% where K{sub mm} is the value obtained from magnetic measurements and K{sub thick} is the value of K obtained from the focal length measurement in the thick lens approximation. That is, QM02 acts weaker than it was measured by magnetic measurements by 7.6%. This is remarkably close to Paul's original estimate. The unexpected weakness could in principle be due to several things: shorted turns, a current calibration error, magnetic measurement error; it could even be due to the presence of an gradient from QM01, which is of opposite sign and right next to QM02, despite it being set to zero current (although it was not DAC-zeroed). Plans have been implemented to remove and replace QM02 at the earliest ROD.

  17. Weakly Interacting Disordered Electron Systems

    NASA Astrophysics Data System (ADS)

    Ekuma, C. E.; Terletska, H.; Yang, S.; Tam, K.-M.; Vidhyadhiraja, N. S.; Moreno, J.; Jarrell, M.

    2015-03-01

    We report on the interplay of interactions and disorder within the typical medium dynamical cluster approximation using the Anderson-Hubbard model. By the systematical incorporation of non-local spatial correlations and the diagonal disorder on an equal footing, we study the initial effects of electron interactions (U) in one (1D), two (2D), and three (3D) dimensions. Treating the interacting non-local cluster self-energy (?c(SOPT) [ cal G ~ ] (i , j ? i)) up to ?U2 order in the perturbation expansion, we obtain the ground-state phase diagram in 3D for the disorder induced paramagnetic metal to insulator transition in the presence of weak interactions. We find that the critical disorder strength (Wc), required to localize all states, increases with increasing U; implying that the metallic phase is stabilized by interactions. In 2D, our results agree with previous findings on the destruction of the insulating phase by U, while in 1D, we find strong competition between both phases. This work is supported by the NSF EPSCoR EPS-1003897. Supercomputer support is provided by LONI and HPC@LSU.

  18. Weak decay of hypernuclei

    SciTech Connect

    Grace, R.

    1983-01-01

    The Moby Dick spectrometer (at BNL) in coincidence with a range spectrometer and a TOF neutron detector will be used to study the weak decay modes of /sup 12/C. The Moby Dick spectrometer will be used to reconstruct and tag events in which specific hypernuclear states are formed in the reaction K/sup -/ + /sup 12/C ..-->.. ..pi../sup -/ + /sup 12/C. Subsequent emission of decay products (pions, protons and neutrons) in coincidence with the fast forward pion will be detected in a time and range spectrometer, and a neutron detector.

  19. Weakly broken galileon symmetry

    SciTech Connect

    Pirtskhalava, David; Santoni, Luca; Trincherini, Enrico; Vernizzi, Filippo

    2015-09-01

    Effective theories of a scalar ϕ invariant under the internal galileon symmetryϕ→ϕ+b{sub μ}x{sup μ} have been extensively studied due to their special theoretical and phenomenological properties. In this paper, we introduce the notion of weakly broken galileon invariance, which characterizes the unique class of couplings of such theories to gravity that maximally retain their defining symmetry. The curved-space remnant of the galileon’s quantum properties allows to construct (quasi) de Sitter backgrounds largely insensitive to loop corrections. We exploit this fact to build novel cosmological models with interesting phenomenology, relevant for both inflation and late-time acceleration of the universe.

  20. Ideology, Social Threat, and the Death Sentence: Capital Sentences across Time and Space

    ERIC Educational Resources Information Center

    Jacobs, David; Carmichael, Jason T.

    2004-01-01

    Capital punishment is the most severe criminal penalty, yet we know little about the factors that produce jurisdictional differences in the use of the death sentence. Political explanations emphasize conservative values and the strength of more conservative political parties. Threat accounts suggest that this sentence will be more likely in…

  1. Inferring the nature of anthropogenic threats from long-term abundance records.

    PubMed

    Shoemaker, Kevin T; Akçakaya, H Resit

    2015-02-01

    Diagnosing the processes that threaten species persistence is critical for recovery planning and risk forecasting. Dominant threats are typically inferred by experts on the basis of a patchwork of informal methods. Transparent, quantitative diagnostic tools would contribute much-needed consistency, objectivity, and rigor to the process of diagnosing anthropogenic threats. Long-term census records, available for an increasingly large and diverse set of taxa, may exhibit characteristic signatures of specific threatening processes and thereby provide information for threat diagnosis. We developed a flexible Bayesian framework for diagnosing threats on the basis of long-term census records and diverse ancillary sources of information. We tested this framework with simulated data from artificial populations subjected to varying degrees of exploitation and habitat loss and several real-world abundance time series for which threatening processes are relatively well understood: bluefin tuna (Thunnus maccoyii) and Atlantic cod (Gadus morhua) (exploitation) and Red Grouse (Lagopus lagopus scotica) and Eurasian Skylark (Alauda arvensis) (habitat loss). Our method correctly identified the process driving population decline for over 90% of time series simulated under moderate to severe threat scenarios. Successful identification of threats approached 100% for severe exploitation and habitat loss scenarios. Our method identified threats less successfully when threatening processes were weak and when populations were simultaneously affected by multiple threats. Our method selected the presumed true threat model for all real-world case studies, although results were somewhat ambiguous in the case of the Eurasian Skylark. In the latter case, incorporation of an ancillary source of information (records of land-use change) increased the weight assigned to the presumed true model from 70% to 92%, illustrating the value of the proposed framework in bringing diverse sources of information into a common rigorous framework. Ultimately, our framework may greatly assist conservation organizations in documenting threatening processes and planning species recovery. PMID:25065712

  2. Why are most subduction thrusts weak?

    NASA Astrophysics Data System (ADS)

    Kopf, A.; Brown, K. M.; Underwood, M. B.

    2003-04-01

    Many subduction thrusts are dominated by clay phases, with illite being particularly important in the deeper part towards the updip limit of the seismogenic zone. During ongoing work on the impact of fault mineralogy and regional excess fluid pressure on the development of low resolved shear stresses on the plate boundary thrust, we find that illite as well as other clays have low friction coefficients of <0.25 at effective stress levels up to 40 MPa. The latter encompasses much of the expected range of the seismogenic subduction thrust, and clearly these low intrinsic mineral strengths contribute to the extreme weakness of the fault. Here we examine the physico-chemical origins of this weakness as well as the impact of increasing pore pressure transients. We performed a variety of direct shear tests on purified clay mineral standards at different humidity in the shear box (dry [effectively 0%] to 98% humidity) as well as water saturation at a range of salinities (de-ionized to brine [1.5x SW salinity]). For initially dry illite we observe a strong decrease in frictional coefficient from dry to 98% humidity by a factor of ~2. Full saturation results in a further ~2x reduction in frictional strength. Other clays respond similarly although the levels of reduction in strength vary. The origins of the strength reduction most probably lie in the properties of the hydration layer on the variously charged surfaces of the different minerals (double layer effects). Salinity changes causing 2nd order changes in frictional strength support this view. Thus, physico-chemical effects appear important in controlling the frictional properties of the clay silicate phases entering the upper and intermediate regions of the seismogenic zone at subduction zones such as Nankai (at least at shear stresses up to 40 MPa). Expected down dip reductions in excess fluid pressure and progressive clay diagenesis will increase the effective normal stress and frictional resistance as the critical depth of the up-dip limit of the seismogenic zone is approached. However, the general weakness of the clay mineral phases limits the maximum shear strength of the subduction thrust to low levels. Our data do not support the contention that the smectite-to-illite reaction is directly responsible for the onset of seismogenic behavior in any of the studied subduction systems (Nankai, Costa Rica) because both smectite and illite have low friction coefficients and tend to velocity strengthen.

  3. Personality Correlates of Nuclear War Threat Perception.

    ERIC Educational Resources Information Center

    Mayton, Daniel M., II

    This study investigated the relationship between individual personality characteristics and the threat of nuclear war among 192 introductory psychology students at a small college in the Pacific Northwest. One measure of nuclear threat perception was spontaneous concern, which was assessed using five presentations each of the incomplete sentences,

  4. How you perceive threat determines your behavior

    PubMed Central

    Fernandes, Orlando; Portugal, Liana C. L.; Alves, Rita C. S.; Campagnoli, Rafaela R.; Mocaiber, Izabela; David, Isabel P. A.; Erthal, Fátima C. S.; Volchan, Eliane; de Oliveira, Leticia; Pereira, Mirtes G.

    2013-01-01

    The prioritization of processing emotional stimuli usually produces deleterious effects on task performance when it distracts from a task. One common explanation is that brain resources are consumed by emotional stimuli, diverting resources away from executing the task. Viewing unpleasant stimuli also generates defensive reactions, and these responses may be at least partially responsible for the effect of the emotional modulation observed in various reaction time (RT) paradigms. We investigated whether modulatory effects on RT vary if we presented threat stimuli to prompt different defensive responses. To trigger different responses, we manipulated threat perception by moving the direction of threatening stimuli. Threatening or neutral stimuli were presented as distractors during a bar orientation discrimination task. The results demonstrated that threat stimuli directed toward the observer produced a decrease in RT; in contrast, threat stimuli directed away from the observer produced an increase in RT, when compared to neutral stimuli. Accelerated RT during directed toward threat stimuli was attributed to increased motor preparation resulting from strong activation of the defense response cascade. In contrast, directed away threat stimuli likely activated the defense cascade, but less intensively, prompting immobility. Different threat stimuli produced varying effects, which was interpreted as evidence that the modulation of RT by emotional stimuli represents the summation of attentional and motivational effects. Additionally, participants who had been previously exposed to diverse types of violent crime were more strongly influenced by threat stimuli directed toward the observer. In sum, our data support the concept that emotions are indeed action tendencies. PMID:24115925

  5. The Nature of the Bioterrorism Threat

    SciTech Connect

    Regens, J. L.

    2003-02-25

    This analysis provides an overview of the nature of the bioterrorism threat. It identifies potential CDC Class A biological agents that are likely candidates for use in a terrorist incident and describes the known sources of vulnerability. The paper also summarizes S&T resources/needs and assesses response options for achieving effective biodefense against terrorist threats.

  6. Stereotype Threat, Identity Salience, and Spatial Reasoning

    ERIC Educational Resources Information Center

    McGlone, Matthew S.; Aronson, Joshua

    2006-01-01

    Stereotype threat research provides insight into how the low standardized test scores of students from stigmatized social groups may derive in part from the negative performance expectations about these groups. Because these students belong to many social groups, one means of mitigating the threat is to remind them of their membership in groups

  7. Bombs and Bomb Threats in the School

    ERIC Educational Resources Information Center

    Starkey, David J.; Starkey, John D.

    1977-01-01

    Bombs and the threat of bombing can leave school personnel faced by an explosive hazard without knowledge of what to do. Therefore, a preplanned response is necessary. Discusses four major stages of dealing with bombs and bomb threats. (Author/RK)

  8. Bomb Threats and Bomb Search Techniques.

    ERIC Educational Resources Information Center

    Department of the Treasury, Washington, DC.

    This pamphlet explains how to be prepared and plan for bomb threats and describes procedures to follow once a call has been received. The content covers (1) preparation for bomb threats, (2) evacuation procedures, (3) room search methods, (4) procedures to follow once a bomb has been located, and (5) typical problems that search teams will…

  9. Cosmic Impacts: The DoomsDay Threat

    NASA Astrophysics Data System (ADS)

    McGaha, J.

    1998-07-01

    Recent science fiction movies (Deep Impact and Armageddon) have brought public attention to the threat of possible impacts from space. Just how real is this threat and what would be the consequences of such an impact? Can we do anything to prevent it? The survival of civilization may depend on it.

  10. Personality Correlates of Nuclear War Threat Perception.

    ERIC Educational Resources Information Center

    Mayton, Daniel M., II

    This study investigated the relationship between individual personality characteristics and the threat of nuclear war among 192 introductory psychology students at a small college in the Pacific Northwest. One measure of nuclear threat perception was spontaneous concern, which was assessed using five presentations each of the incomplete sentences,…

  11. The Smallpox Threat: The School Nurse's Role

    ERIC Educational Resources Information Center

    Martin, Mary E.; Didion, Judy

    2003-01-01

    Today, with the threat of bioterrorism and war, there is a new dimension to the traditional role of the school nurse. The smallpox threat to public health will invoke the school nurse's role as an educator, liaison, and consultant in the community. This article discusses smallpox, the vaccination process, adverse effects, and postvaccination care.…

  12. Stereotype Threat, Identity Salience, and Spatial Reasoning

    ERIC Educational Resources Information Center

    McGlone, Matthew S.; Aronson, Joshua

    2006-01-01

    Stereotype threat research provides insight into how the low standardized test scores of students from stigmatized social groups may derive in part from the negative performance expectations about these groups. Because these students belong to many social groups, one means of mitigating the threat is to remind them of their membership in groups…

  13. Advisor Credibility and Reactions to Threats.

    ERIC Educational Resources Information Center

    Norman, Nancy; And Others

    Research shows that people comply more frequently to threats when the credibility of the source is high rather than low and that compliance is directly related to punishment magnitude. To examine the impact of an advisor on a target of threats, male college students (N=74) participated in an experiment that included high or low threatner

  14. Nuclear threats from small states

    SciTech Connect

    Kahan, J.H.

    1994-06-13

    What are the policy implications regarding proliferation and counter proliferation of nuclear weapons among Third World states. How does deterrence operate outside the parameters of superpower confrontation as defined by the cold war elaborate system of constraints enforced by concepts like mutual assured destruction, and counter-value and counter-force targeting. How can US policymakers devise contingencies for dealing with nuclear threats posed by countries like North Korea, Libya, Iraq, Iran, and Syria. These are some of the unsettling but nevertheless important questions addressed by the author in this monograph. In his analysis, Mr. Jerome Kahan examines the likelihood that one or more of these countries will use nuclear weapons before the year 2000. He also offers a framework that policymakers and planners might use in assessing US interests in preempting the use of nuclear weapons or in retaliating for their use. Ironically, with the end of the cold war, it is imperative that defense strategists, policymakers, and military professionals think about the `unthinkable`. In the interest of fostering debate on this important subject, the Strategic Studies Institute commends this insightful monograph.

  15. Forecasting Lightning Threat using Cloud-Resolving Model Simulations

    NASA Technical Reports Server (NTRS)

    McCaul, Eugene W., Jr.; Goodman, Steven J.; LaCasse, Katherine M.; Cecil, Daniel J.

    2008-01-01

    Two new approaches are proposed and developed for making time and space dependent, quantitative short-term forecasts of lightning threat, and a blend of these approaches is devised that capitalizes on the strengths of each. The new methods are distinctive in that they are based entirely on the ice-phase hydrometeor fields generated by regional cloud-resolving numerical simulations, such as those produced by the WRF model. These methods are justified by established observational evidence linking aspects of the precipitating ice hydrometeor fields to total flash rates. The methods are straightforward and easy to implement, and offer an effective near-term alternative to the incorporation of complex and costly cloud electrification schemes into numerical models. One method is based on upward fluxes of precipitating ice hydrometeors in the mixed phase region at the-15 C level, while the second method is based on the vertically integrated amounts of ice hydrometeors in each model grid column. Each method can be calibrated by comparing domain-wide statistics of the peak values of simulated flash rate proxy fields against domain-wide peak total lightning flash rate density data from observations. Tests show that the first method is able to capture much of the temporal variability of the lightning threat, while the second method does a better job of depicting the areal coverage of the threat. Our blended solution is designed to retain most of the temporal sensitivity of the first method, while adding the improved spatial coverage of the second. Exploratory tests for selected North Alabama cases show that, because WRF can distinguish the general character of most convective events, our methods show promise as a means of generating quantitatively realistic fields of lightning threat. However, because the models tend to have more difficulty in predicting the instantaneous placement of storms, forecasts of the detailed location of the lightning threat based on single simulations can be in error. Although these model shortcomings presently limit the precision of lightning threat forecasts from individual runs of current generation models,the techniques proposed herein should continue to be applicable as newer and more accurate physically-based model versions, physical parameterizations, initialization techniques and ensembles of forecasts become available.

  16. Security threats categories in healthcare information systems.

    PubMed

    Samy, Ganthan Narayana; Ahmad, Rabiah; Ismail, Zuraini

    2010-09-01

    This article attempts to investigate the various types of threats that exist in healthcare information systems (HIS). A study has been carried out in one of the government-supported hospitals in Malaysia.The hospital has been equipped with a Total Hospital Information System (THIS). The data collected were from three different departments, namely the Information Technology Department (ITD), the Medical Record Department (MRD), and the X-Ray Department, using in-depth structured interviews. The study identified 22 types of threats according to major threat categories based on ISO/IEC 27002 (ISO 27799:2008). The results show that the most critical threat for the THIS is power failure followed by acts of human error or failure and other technological factors. This research holds significant value in terms of providing a complete taxonomy of threat categories in HIS and also an important component in the risk analysis stage. PMID:20889850

  17. Inferences from counterfactual threats and promises.

    PubMed

    Egan, Suzanne M; Byrne, Ruth M J

    2012-01-01

    We examine how people understand and reason from counterfactual threats, for example, "if you had hit your sister, I would have grounded you" and counterfactual promises, for example, "if you had tidied your room, I would have given you ice-cream." The first experiment shows that people consider counterfactual threats, but not counterfactual promises, to have the illocutionary force of an inducement. They also make the immediate inference that the action mentioned in the "if" part of the counterfactual threat and promise did not occur. The second experiment shows that people make more negative inferences (modus tollens and denial of the antecedent) than affirmative inferences (modus ponens and affirmation of the consequent) from counterfactual threats and promises, unlike indicative threats and promises. We discuss the implications of the results for theories of the mental representations and cognitive processes that underlie conditional inducements. PMID:22580411

  18. Weakly relativistic plasma expansion

    SciTech Connect

    Fermous, Rachid Djebli, Mourad

    2015-04-15

    Plasma expansion is an important physical process that takes place in laser interactions with solid targets. Within a self-similar model for the hydrodynamical multi-fluid equations, we investigated the expansion of both dense and under-dense plasmas. The weakly relativistic electrons are produced by ultra-intense laser pulses, while ions are supposed to be in a non-relativistic regime. Numerical investigations have shown that relativistic effects are important for under-dense plasma and are characterized by a finite ion front velocity. Dense plasma expansion is found to be governed mainly by quantum contributions in the fluid equations that originate from the degenerate pressure in addition to the nonlinear contributions from exchange and correlation potentials. The quantum degeneracy parameter profile provides clues to set the limit between under-dense and dense relativistic plasma expansions at a given density and temperature.

  19. Clinical review: intensive care unit acquired weakness.

    PubMed

    Hermans, Greet; Van den Berghe, Greet

    2015-01-01

    A substantial number of patients admitted to the ICU because of an acute illness, complicated surgery, severe trauma, or burn injury will develop a de novo form of muscle weakness during the ICU stay that is referred to as "intensive care unit acquired weakness" (ICUAW). This ICUAW evoked by critical illness can be due to axonal neuropathy, primary myopathy, or both. Underlying pathophysiological mechanisms comprise microvascular, electrical, metabolic, and bioenergetic alterations, interacting in a complex way and culminating in loss of muscle strength and/or muscle atrophy. ICUAW is typically symmetrical and affects predominantly proximal limb muscles and respiratory muscles, whereas facial and ocular muscles are often spared. The main risk factors for ICUAW include high severity of illness upon admission, sepsis, multiple organ failure, prolonged immobilization, and hyperglycemia, and also older patients have a higher risk. The role of corticosteroids and neuromuscular blocking agents remains unclear. ICUAW is diagnosed in awake and cooperative patients by bedside manual testing of muscle strength and the severity is scored by the Medical Research Council sum score. In cases of atypical clinical presentation or evolution, additional electrophysiological testing may be required for differential diagnosis. The cornerstones of prevention are aggressive treatment of sepsis, early mobilization, preventing hyperglycemia with insulin, and avoiding the use parenteral nutrition during the first week of critical illness. Weak patients clearly have worse acute outcomes and consume more healthcare resources. Recovery usually occurs within weeks or months, although it may be incomplete with weakness persisting up to 2 years after ICU discharge. Prognosis appears compromised when the cause of ICUAW involves critical illness polyneuropathy, whereas isolated critical illness myopathy may have a better prognosis. In addition, ICUAW has shown to contribute to the risk of 1-year mortality. Future research should focus on new preventive and/or therapeutic strategies for this detrimental complication of critical illness and on clarifying how ICUAW contributes to poor longer-term prognosis. PMID:26242743

  20. Strong mobility in weakly disordered systems

    SciTech Connect

    Ben-naim, Eli; Krapivsky, Pavel

    2009-01-01

    We study transport of interacting particles in weakly disordered media. Our one-dimensional system includes (i) disorder, the hopping rate governing the movement of a particle between two neighboring lattice sites is inhomogeneous, and (ii) hard core interaction, the maximum occupancy at each site is one particle. We find that over a substantial regime, the root-mean-square displacement of a particle s grows superdiffusively with time t, {sigma}{approx}({epsilon}t){sup 2/3}, where {epsilon} is the disorder strength. Without disorder the particle displacement is subdiffusive, {sigma} {approx}t{sup 1/4}, and therefore disorder strongly enhances particle mobility. We explain this effect using scaling arguments, and verify the theoretical predictions through numerical simulations. Also, the simulations show that regardless of disorder strength, disorder leads to stronger mobility over an intermediate time regime.

  1. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility,...

  2. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility,...

  3. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility,...

  4. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility,...

  5. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility,...

  6. Enhancing entanglement trapping by weak measurement and quantum measurement reversal

    SciTech Connect

    Zhang, Ying-Jie; Han, Wei; Fan, Heng; Xia, Yun-Jie

    2015-03-15

    In this paper, we propose a scheme to enhance trapping of entanglement of two qubits in the environment of a photonic band gap material. Our entanglement trapping promotion scheme makes use of combined weak measurements and quantum measurement reversals. The optimal promotion of entanglement trapping can be acquired with a reasonable finite success probability by adjusting measurement strengths. - Highlights: • Propose a scheme to enhance entanglement trapping in photonic band gap material. • Weak measurement and its reversal are performed locally on individual qubits. • Obtain an optimal condition for maximizing the concurrence of entanglement trapping. • Entanglement sudden death can be prevented by weak measurement in photonic band gap.

  7. Weak measurements beyond the Aharonov-Albert-Vaidman formalism

    SciTech Connect

    Wu Shengjun; Li Yang

    2011-05-15

    We extend the idea of weak measurements to the general case, provide a complete treatment, and obtain results for both the regime when the preselected and postselected states (PPS) are almost orthogonal and the regime when they are exactly orthogonal. We surprisingly find that for a fixed interaction strength, there may exist a maximum signal amplification and a corresponding optimum overlap of PPS to achieve it. For weak measurements in the orthogonal regime, we find interesting quantities that play the same role that weak values play in the nonorthogonal regime.

  8. Forecasting Lightning Threat Using WRF Proxy Fields

    NASA Technical Reports Server (NTRS)

    McCaul, E. W., Jr.

    2010-01-01

    Objectives: Given that high-resolution WRF forecasts can capture the character of convective outbreaks, we seek to: 1. Create WRF forecasts of LTG threat (1-24 h), based on 2 proxy fields from explicitly simulated convection: - graupel flux near -15 C (captures LTG time variability) - vertically integrated ice (captures LTG threat area). 2. Calibrate each threat to yield accurate quantitative peak flash rate densities. 3. Also evaluate threats for areal coverage, time variability. 4. Blend threats to optimize results. 5. Examine sensitivity to model mesh, microphysics. Methods: 1. Use high-resolution 2-km WRF simulations to prognose convection for a diverse series of selected case studies. 2. Evaluate graupel fluxes; vertically integrated ice (VII). 3. Calibrate WRF LTG proxies using peak total LTG flash rate densities from NALMA; relationships look linear, with regression line passing through origin. 4. Truncate low threat values to make threat areal coverage match NALMA flash extent density obs. 5. Blend proxies to achieve optimal performance 6. Study CAPS 4-km ensembles to evaluate sensitivities.

  9. Dynamic Strength Ceramic Nanocomposites Under Pulse Loading

    NASA Astrophysics Data System (ADS)

    Skripnyak, Evgeniya G.; Skripnyak, Vladimir V.; Vaganova, Irina K.; Skripnyak, Vladimir A.

    2015-06-01

    Multi-scale computer simulation approach has been applied to research of strength of nanocomposites under dynamic loading. The influence of mesoscopic substructures on the dynamic strength of ceramic and hybrid nanocomposites, which can be formed using additive manufacturing were numerically investigated. At weak shock wave loadings the shear strength and the spall strength of ceramic and hybrid nanocomposites depends not only phase concentration and porosity, but size parameters of skeleton substructures. The influence of skeleton parameter on the shear strength and the spall strength of ceramic nanocomposites with the same concentration of phases decreases with increasing amplitude of the shock pulse of microsecond duration above the double amplitude of the Hugoniot elastic limit of nanocomposites. This research carried out in 2014 -2015 was supported by grant from The Tomsk State University Academic D.I. Mendeleev Fund Program and also Ministry of Sciences and Education of Russian Federation (State task 2014/223, project 1943, Agreement 14.132.

  10. Vibrational spectroscopy standoff detection of threat chemicals

    NASA Astrophysics Data System (ADS)

    Ortiz-Rivera, William; Pacheco-Londoo, Leonardo C.; Castro-Suarez, John R.; Felix-Rivera, Hilsamar; Hernandez-Rivera, Samuel P.

    2011-06-01

    Spectroscopy based standoff detection systems: Raman and FTIR have been tested for detection of threat chemicals, including highly energetic materials, homemade explosives, explosives formulations and high explosives mixtures. Other threat chemicals studied included toxic industrial compounds (TIC) and chemical agent simulants. Microorganisms and biological threat agent simulants have also been detected at standoff distances. Open Path FTIR has been used to detect vapors and chemicals deposited on metal surfaces at ?g/cm2 levels at distances as far as 30 m in active mode and 60 m in passive mode. In the case of Raman telescope, standoff distances for acetonitrile and ammonium nitrate were 140 m.

  11. Insider threat to secure facilities: data analysis

    SciTech Connect

    Not Available

    1980-05-09

    Three data sets drawn from industries that have experienced internal security breaches are analyzed. The industries and the insider security breaches are considered analogous in one or more respects to insider threats potentially confronting managers in the nuclear industry. The three data sets are: bank fraud and embezzlement (BF and E), computer-related crime, and drug theft from drug manufacturers and distributors. A careful analysis by both descriptive and formal statistical techniques permits certain general conclusions on the internal threat to secure industries to be drawn. These conclusions are discussed and related to the potential insider threat in the nuclear industry. 49 tabs.

  12. THE BIOTERRORISM THREAT: TECHNOLOGICAL AND POLITICAL CONSIDERATIONS

    SciTech Connect

    J. F. PILAT

    2000-03-01

    Bioterrorism--along with biowarfare, from which it may not always be distinguishable in practice--will be a feature of the strategic landscape in the 21st century and is high on the US national security agenda. Bioterrorism poses a potential threat to the US population, agriculture, interests, friends and allies, and military forces (asymmetric threats). Yet these possibilities have not been widely pursued or realized by terrorists. The perceived threat is far worse than anything experienced to date, and is largely technologically driven.

  13. Strength loss in kraft pulping

    NASA Astrophysics Data System (ADS)

    Iribarne, Jose

    Unbleached kraft pulps from two U.S. mills were 21% and 26% weaker than comparable laboratory pulps from the same chip sources, when assessed as the tear index at a tensile index of 70 kN.m/kg. The phenomena involved were clarified by characterizing the differences between the mill and laboratory pulps in terms of fundamental fiber properties. All of the strength loss could be explained by a reduction in intrinsic fiber strength of 9% to 11%, as estimated from wet zero-span tensile tests and fiber length distributions. Most of the effects of different fiber shape and length were isolated by PFI mill refining and decrilling, respectively. The higher fiber coarseness of mill pulps was a factor in their maximum density and bond strength, but changes in these variables were analogous to those of laboratory pups due to similar swelling. Specific bond strength, determined from a wet pressing experiment, was similar in mill and laboratory pulps. Neither carbohydrate composition nor crystalline structure, assessed through x-ray diffraction analysis, were significant factors in the observed fiber strength differences. The mill pulps were not more heterogeneous than the laboratory pulps, within the resolution of a fractionation experiment. The number of weak points in each pulp was assessed through analysis of the amount of fiber cutting during PFI mill refining and treatments with potassium superoxide or cellulase. The results suggested that the chemistry of kraft pulping preferentially weaken short, slender fibers, while mechanical stresses during the hot discharge of batch digesters mainly affect long, thick fibers. The greater number of weak points in the long-fiber fractions of mill pulps is probably associated with their lower wet zero-span tensile indices. Automated optical detection of major singularities with a prototype instrument suggested that only the weak points induced by mechanical stress could be detected by local variations in birefringence. In contrast, chemically damaged short, slender fibers were not optically active. Strong chemical attack during superoxide treatment appeared to affect all fibers, but the effect of fiber cutting was partially offset by a preferential dissolution of short fibers and fines. A simple model of weak point formation by combinations of mechanical stress and localized chemical attack was sufficient to explain all the experimental results.

  14. Intergroup threat gates social attention in humans

    PubMed Central

    Chen, Yujie; Zhao, Yufang

    2015-01-01

    Humans shift their attention to follow another person's gaze direction, a phenomenon called gaze cueing. This study examined whether a particular social factor, intergroup threat, modulates gaze cueing. As expected, stronger responses of a particular in-group to a threatening out-group were observed when the in-group, conditioned to perceive threat from one of two out-groups, was presented with facial stimuli from the threatening and non-threatening out-groups. These results suggest that intergroup threat plays an important role in shaping social attention. Furthermore, larger gaze-cueing effects were found for threatening out-group faces than for in-group faces only at the 200 ms but not the 800 ms stimulus onset asynchrony (SOA); the specificity of the gaze-cueing effects at the short SOA suggests that threat cues modulate the involuntary component of gaze cueing. PMID:25716090

  15. Childhood maltreatment and threats with weapons.

    PubMed

    Casiano, Hygiea; Mota, Natalie; Afifi, Tracie O; Enns, Murray W; Sareen, Jitender

    2009-11-01

    The relationship between childhood maltreatment and future threats with weapons is unknown. We examined data from the nationally representative National Comorbidity Survey Replication (n = 5692) and conducted multiple logistic regression analyses to determine the association between childhood maltreatment and lifetime behavior of threatening others with a gun or other weapon. After adjusting for sociodemographic variables, physical abuse, sexual abuse, and witnessing domestic violence were significantly associated with threats made with a gun (adjusted odds ratios [AOR] ranging between 3.38 and 4.07) and other weapons (AOR ranging between 2.16 and 2.83). The greater the number of types of maltreatment experienced, the stronger the association with lifetime threats made to others with guns and any weapons. Over 94% of respondents who experienced maltreatment and made threats reported that the maltreatment occurred prior to threatening others with weapons. Prevention efforts that reduce exposure to maltreatment may reduce violent behavior in later life. PMID:19996725

  16. Acid Rain: The Silent Environmental Threat.

    ERIC Educational Resources Information Center

    Zmud, Mia

    1992-01-01

    Describes the silent environmental threat posed by acid rain. Caused mainly by manmade pollutants, acid rain damages water and trees, decreases visibility, corrodes monuments, and threatens public health. The article includes guidelines for action. (SM)

  17. Autonomous Realtime Threat-Hunting Robot (ARTHR)

    ScienceCinema

    Idaho National Laboratory - David Bruemmer, Curtis Nielsen

    2010-01-08

    Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats. To learn more, visit

  18. WHO: Zika Virus an International Health Threat

    MedlinePlus

    ... Monday declared the mosquito-borne Zika virus a global health threat, based on the suspicion that the virus ... Services, or federal policy. More Health News on: International Health Zika Virus Recent Health News Related MedlinePlus Health ...

  19. Autonomous Realtime Threat-Hunting Robot (ARTHR)

    SciTech Connect

    Idaho National Laboratory - David Bruemmer, Curtis Nielsen

    2008-05-29

    Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats. To learn more, visit

  20. Antibiotic-Resistant Gonorrhea: a Growing Threat

    MedlinePlus

    ... nlm.nih.gov/medlineplus/news/fullstory_156748.html Antibiotic-Resistant Gonorrhea: A Growing Threat U.S. officials echo ... are expressing growing anxiety over the prospect of antibiotic-resistant gonorrhea. Just last month, health officials in ...

  1. Counter-terrorism threat prediction architecture

    NASA Astrophysics Data System (ADS)

    Lehman, Lynn A.; Krause, Lee S.

    2004-09-01

    This paper will evaluate the feasibility of constructing a system to support intelligence analysts engaged in counter-terrorism. It will discuss the use of emerging techniques to evaluate a large-scale threat data repository (or Infosphere) and comparing analyst developed models to identify and discover potential threat-related activity with a uncertainty metric used to evaluate the threat. This system will also employ the use of psychological (or intent) modeling to incorporate combatant (i.e. terrorist) beliefs and intent. The paper will explore the feasibility of constructing a hetero-hierarchical (a hierarchy of more than one kind or type characterized by loose connection/feedback among elements of the hierarchy) agent based framework or "family of agents" to support "evidence retrieval" defined as combing, or searching the threat data repository and returning information with an uncertainty metric. The counter-terrorism threat prediction architecture will be guided by a series of models, constructed to represent threat operational objectives, potential targets, or terrorist objectives. The approach would compare model representations against information retrieved by the agent family to isolate or identify patterns that match within reasonable measures of proximity. The central areas of discussion will be the construction of an agent framework to search the available threat related information repository, evaluation of results against models that will represent the cultural foundations, mindset, sociology and emotional drive of typical threat combatants (i.e. the mind and objectives of a terrorist), and the development of evaluation techniques to compare result sets with the models representing threat behavior and threat targets. The applicability of concepts surrounding Modeling Field Theory (MFT) will be discussed as the basis of this research into development of proximity measures between the models and result sets and to provide feedback in support of model adaptation (learning). The increasingly complex demands facing analysts evaluating activity threatening to the security of the United States make the family of agent-based data collection (fusion) a promising area. This paper will discuss a system to support the collection and evaluation of potential threat activity as well as an approach fro presentation of the information.

  2. Bio-Terrorism Threat and Casualty Prevention

    SciTech Connect

    NOEL,WILLIAM P.

    2000-01-01

    The bio-terrorism threat has become the ''poor man's'' nuclear weapon. The ease of manufacture and dissemination has allowed an organization with only rudimentary skills and equipment to pose a significant threat with high consequences. This report will analyze some of the most likely agents that would be used, the ease of manufacture, the ease of dissemination and what characteristics of the public health response that are particularly important to the successful characterization of a high consequence event to prevent excessive causalities.

  3. Space Station Program threat and vulnerability analysis

    NASA Technical Reports Server (NTRS)

    Van Meter, Steven D.; Veatch, John D.

    1987-01-01

    An examination has been made of the physical security of the Space Station Program at the Kennedy Space Center in a peacetime environment, in order to furnish facility personnel with threat/vulnerability information. A risk-management approach is used to prioritize threat-target combinations that are characterized in terms of 'insiders' and 'outsiders'. Potential targets were identified and analyzed with a view to their attractiveness to an adversary, as well as to the consequentiality of the resulting damage.

  4. Nuclear Threat Intelligence, Surveillance, and Reconnaissance

    NASA Astrophysics Data System (ADS)

    Kuliasha, Michael

    2012-03-01

    The National Security Strategy states that the greatest threat to the American people is ``the pursuit of nuclear weapons by violent extremists and their proliferation to additional states.'' The Global Nuclear Detection Architecture (GNDA) addresses a key portion of that threat by focusing on detecting nuclear and radiological materials that are out of regulatory control within permissive operating environments. However, the force protection requirements of the Department of Defense (DoD) range across a wider mission space from permissive environments, where nuclear and radiological materials can be monitored while under regulatory control, to hostile environments where nuclear and radiological materials exist in defiance of international regulations and agreements. This wider range of operating environments and the inherent physics limitations on the range of radiation detection pose great challenges to radiation detection-focused approaches to nuclear threat detection. Consequently, DoD is in the process of defining an intelligence, surveillance, and reconnaissance approach to countering nuclear threats that considers the observable signatures of all elements that comprise a potential threat; information, funds, people, material, equipment, and infrastructure. This strategy represents a shift from radiation detection as the primary sensing modality to radiation detection as one of many sensing modalities, including the human dimension, with a heavy emphasis on data fusion. This presentation will describe the attributes of a layered sensing approach to nuclear threat detection, illustrate the approach with examples, define potential building blocks, and discuss technical challenges.

  5. An Information Fusion Framework for Threat Assessment

    SciTech Connect

    Beaver, Justin M; Kerekes, Ryan A; Treadwell, Jim N

    2009-01-01

    Modern enterprises are becoming increasingly sensitive to the potential destructive power of small groups or individuals with malicious intent. In response, significant investments are being made in developing a means to assess the likelihood of certain threats to their enterprises. Threat assessment needs are typically focused in very specific application areas where current processes rely heavily on human analysis to both combine any available data and draw conclusions about the probability of a threat. A generic approach to threat assessment is proposed, including a threat taxonomy and decision-level information fusion framework, that provides a computational means for merging multi-modal data for the purpose of assessing the presence of a threat. The framework is designed for flexibility, and intentionally accounts for the accuracy of each data source, given the environmental conditions, in order to manage the uncertainty associated with any acquired data. The taxonomy and information fusion framework is described, and discussed in the context of real-world applications such as shipping container security and cyber security.

  6. Application of Strength Diagnosis.

    ERIC Educational Resources Information Center

    Newton, Robert U.; Dugan, Eric

    2002-01-01

    Discusses the various strength qualities (maximum strength, high- and low-load speed strength, reactive strength, rate of force development, and skill performance), noting why a training program design based on strength diagnosis can lead to greater efficacy and better performance gains for the athlete. Examples of tests used to assess strength…

  7. Are All Interventions Created Equal? A Multi-Threat Approach to Tailoring Stereotype Threat Interventions

    PubMed Central

    Shapiro, Jenessa R.; Williams, Amy M.; Hambarchyan, Mariam

    2013-01-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats—concerns that a stereotype-relevant performance will reflect poorly on the abilities of one’s group—and self-as-target stereotype threats—concerns that a stereotype-relevant performance will reflect poorly on one’s own abilities. The present experiments explored Black college students’ performance on diagnostic intelligence tests (Experiments 1 and 3) and women’s interest (Experiment 2) and performance (Experiment 4) in science, technology, engineering, and math (STEM). Across the 4 experiments, participants were randomly assigned to experience either a group-as-target or self-as-target stereotype threat. Experiments 1 and 2 revealed that role model interventions were successful at protecting only against group-as-target stereotype threats, and Experiments 3 and 4 revealed that self-affirmation interventions were successful at protecting only against self-as-target stereotype threats. The present research provides an experimental test of the Multi-Threat Framework across different negatively stereotyped groups (Black students, female students), different negatively stereotyped domains (general intelligence, STEM), and different outcomes (test performance, career interest). This research suggests that interventions should address the range of possible stereotype threats to effectively protect individuals against these threats. Through an appreciation of the distinct forms of stereotype threats and the ways in which interventions work to reduce them, this research aims to facilitate a more complete understanding of stereotype threat. PMID:23088232

  8. Weak interactions and Eotvos experiments

    NASA Technical Reports Server (NTRS)

    Haugan, M. P.; Will, C. M.

    1976-01-01

    A current-current model for weak interactions is used to show that the weak-interaction contribution to the ground-state energies of typical nuclei is about one part in 100 million of their rest masses. By comparing this contribution with the results of recent versions of the Eotvos experiments, it is concluded that weak-interaction energies obey the principle of equivalence to better than one part in 100, thus refuting claims that those experiments did not test weak-interaction effects.

  9. Universal mechanism for Anderson and weak localization.

    PubMed

    Filoche, Marcel; Mayboroda, Svitlana

    2012-09-11

    Localization of stationary waves occurs in a large variety of vibrating systems, whether mechanical, acoustical, optical, or quantum. It is induced by the presence of an inhomogeneous medium, a complex geometry, or a quenched disorder. One of its most striking and famous manifestations is Anderson localization, responsible for instance for the metal-insulator transition in disordered alloys. Yet, despite an enormous body of related literature, a clear and unified picture of localization is still to be found, as well as the exact relationship between its many manifestations. In this paper, we demonstrate that both Anderson and weak localizations originate from the same universal mechanism, acting on any type of vibration, in any dimension, and for any domain shape. This mechanism partitions the system into weakly coupled subregions. The boundaries of these subregions correspond to the valleys of a hidden landscape that emerges from the interplay between the wave operator and the system geometry. The height of the landscape along its valleys determines the strength of the coupling between the subregions. The landscape and its impact on localization can be determined rigorously by solving one special boundary problem. This theory allows one to predict the localization properties, the confining regions, and to estimate the energy of the vibrational eigenmodes through the properties of one geometrical object. In particular, Anderson localization can be understood as a special case of weak localization in a very rough landscape. PMID:22927384

  10. Weak localization with nonlinear bosonic matter waves

    SciTech Connect

    Hartmann, Timo; Michl, Josef; Petitjean, Cyril; Wellens, Thomas; Urbina, Juan-Diego; Richter, Klaus; Schlagheck, Peter

    2012-08-15

    We investigate the coherent propagation of dilute atomic Bose-Einstein condensates through irregularly shaped billiard geometries that are attached to uniform incoming and outgoing waveguides. Using the mean-field description based on the nonlinear Gross-Pitaevskii equation, we develop a diagrammatic theory for the self-consistent stationary scattering state of the interacting condensate, which is combined with the semiclassical representation of the single-particle Green function in terms of chaotic classical trajectories within the billiard. This analytical approach predicts a universal dephasing of weak localization in the presence of a small interaction strength between the atoms, which is found to be in good agreement with the numerically computed reflection and transmission probabilities of the propagating condensate. The numerical simulation of this quasi-stationary scattering process indicates that this interaction-induced dephasing mechanism may give rise to a signature of weak antilocalization, which we attribute to the influence of non-universal short-path contributions. - Highlights: Black-Right-Pointing-Pointer Numerical simulation of scattering of Bose-Einstein condensate through billiards. Black-Right-Pointing-Pointer Novel analytical semiclassical theory for nonlinear coherent scattering. Black-Right-Pointing-Pointer Inversion of weak localization due to mean-field interaction within the condensate. Black-Right-Pointing-Pointer Relevance of non-universal short-path contributions.

  11. Impact of an interactive anti-speeding threat appeal: how much threat is too much?

    PubMed

    Panić, Katarina; Cauberghe, Verolien; De Pelsmacker, Patrick

    2011-05-01

    This study investigates the impact of an interactive television public-service announcement (PSA) containing an anti-speeding threat appeal on feelings of telepresence and behavioral intention. In a 2 × 2 × 2 between-subjects factorial design with 213 participants, the level of threat evoked by a traditional PSA, by the interactive part of the PSA (dedicated advertising location or DAL) and by the preceding program context are manipulated to be either low or high. The results support the assumptions of the Extended Parallel Processing Model with regard to the effect of the level of perceived threat and perceived efficacy in an interactive media environment, and the important role of telepresence as a processing variable. The results of the three-way interaction effect of threat evoked by the program, the PSA and the DAL on telepresence show that when the threat levels of the program and the PSA are both either low or high, exposure to the threatening information in the DAL does not generate a significantly higher feeling of telepresence. However, when a low-threat program is followed by a high-threat PSA, the threat level of the DAL has a positive effect on telepresence. The same trend is found with a high-threat program and a low-threat PSA, although the effect of the threat evoked by the DAL on telepresence is not significant at conventional levels. Finally, there is a positive effect of telepresence on the behavioral intention to reduce speeding, which is partly mediated by the viewer's perceived efficacy to follow the recommended behavior. PMID:21204691

  12. The influence of stereotype threat on immigrants: review and meta-analysis

    PubMed Central

    Appel, Markus; Weber, Silvana; Kronberger, Nicole

    2015-01-01

    In many regions around the world students with certain immigrant backgrounds underachieve in educational settings. This paper provides a review and meta-analysis on one potential source of the immigrant achievement gap: stereotype threat, a situational predicament that may prevent students to perform up to their full abilities. A meta-analysis of 19 experiments suggests an overall mean effect size of 0.63 (random effects model) in support of stereotype threat theory. The results are complemented by moderator analyses with regard to circulation (published or unpublished research), cultural context (US versus Europe), age of immigrants, type of stereotype threat manipulation, dependent measures, and means for identification of immigrant status; evidence on the role of ethnic identity strength is reviewed. Theoretical and practical implications of the findings are discussed. PMID:26217256

  13. On the front lines: Stakeholder threat cues determine how identified employees cope with scandal.

    PubMed

    Grandey, Alicia A; Krannitz, Morgan A; Slezak, Tyler

    2015-07-01

    When organizational identity is threatened as a result of scandal, highly identified members who represent the threatened organization to stakeholders have a particularly challenging and overlooked experience. Addressing a theoretical paradox, we propose that organizational identification interacts with the threat cues from stakeholders to determine employee responses. We conducted a multimethod, in vivo test of these ideas with university fundraising employees after events threatened the university's moral identity. Interview and archival data demonstrated that stakeholders expressed identity threat to fundraisers, who experienced their own identity-related distress and engaged in both group-dissociative and group-affirming responses. Surveys of professional and student university fundraisers demonstrated that more identified employees were more distressed (e,g., felt anxious, grief, betrayed) regardless of stakeholder threat cues. Yet, when employees perceived weak threat cues from stakeholders, more identified members were less likely to dissociate from the group and more likely to affirm the group's positive identity with stakeholders. These benefits of identification were not present when the stakeholder threat cues were strong. We discuss future research and practical implications of front-line employee identification and stakeholder cues during scandal. PMID:25602276

  14. Inhibitory control as a moderator of threat-related interference biases in social anxiety.

    PubMed

    Gorlin, Eugenia I; Teachman, Bethany A

    2015-01-01

    Prior findings are mixed regarding the presence and direction of threat-related interference biases in social anxiety. The current study examined general inhibitory control (IC), measured by the classic colour-word Stroop, as a moderator of the relationship between both threat interference biases [indexed by the emotional Stroop (e-Stroop)] and several social anxiety indicators. High socially anxious undergraduate students (N = 159) completed the emotional and colour-word Stroop tasks, followed by an anxiety-inducing speech task. Participants completed measures of trait social anxiety, state anxiety before and during the speech, negative task-interfering cognitions during the speech and overall self-evaluation of speech performance. Speech duration was used to measure behavioural avoidance. In line with hypotheses, IC moderated the relationship between e-Stroop bias and every anxiety indicator (with the exception of behavioural avoidance), such that greater social-threat interference was associated with higher anxiety among those with weak IC, whereas lesser social-threat interference was associated with higher anxiety among those with strong IC. Implications for the theory and treatment of threat interference biases in socially anxious individuals are discussed. PMID:24967719

  15. 49 CFR 1546.301 - Bomb or air piracy threats.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless...

  16. 49 CFR 1546.301 - Bomb or air piracy threats.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless...

  17. 49 CFR 1546.301 - Bomb or air piracy threats.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless...

  18. 49 CFR 1546.301 - Bomb or air piracy threats.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless...

  19. 49 CFR 1546.301 - Bomb or air piracy threats.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless...

  20. Left-Wing Extremism: The Current Threat

    SciTech Connect

    Karl A. Seger

    2001-04-30

    Left-wing extremism is ''alive and well'' both in the US and internationally. Although the current domestic terrorist threat within the U. S. is focused on right-wing extremists, left-wing extremists are also active and have several objectives. Leftist extremists also pose an espionage threat to U.S. interests. While the threat to the U.S. government from leftist extremists has decreased in the past decade, it has not disappeared. There are individuals and organizations within the U.S. who maintain the same ideology that resulted in the growth of left-wing terrorism in this country in the 1970s and 1980s. Some of the leaders from that era are still communicating from Cuba with their followers in the U.S., and new leaders and groups are emerging.

  1. Environmental Health: Threats and their Interactions

    PubMed Central

    Holdstock, Douglas

    2008-01-01

    Improvements in the provision of an acceptable standard of health care, particularly in the developing world, will be undermined by three ongoing processes: ongoing armed conflicts; the threat of global warming due to rising levels of greenhouse gases, particularly carbon dioxide emitted by developed countries; and by rapidly rising populations. The key features of these three threats are summarised, and it is shown that interactions between them increase both the likelihood of their occurrence and the probable harm that they will cause. Some of the interactions are described, with ways of providing health care taking into account the threats and their interactions, and the paradox is emphasised that better health care in the developing world will further increase population growth followed by increased greenhouse gas emissions. Improved education for women and free and unlimited access to modern methods of contraception are vital. PMID:21572838

  2. Insider Threat Assessment: Model, Analysis and Tool

    NASA Astrophysics Data System (ADS)

    Chinchani, Ramkumar; Ha, Duc; Iyer, Anusha; Ngo, Hung Q.; Upadhyaya, Shambhu

    Insider threat is typically attributed to legitimate users who maliciously leverage their system privileges, and familiarity and proximity to their computational environment to compromise valuable information or inflict damage. According to the annual CSI/FBI surveys conducted since 1996, internal attacks and insider abuse form a significant portion of reported incidents. The strongest indication yet that insider threat is very real is given by the recent study [2] jointly conducted by CERT and the US Secret Service; the first of its kind, which provides an in-depth insight into the problem in a real-world setting. However, there is no known body of work which addresses this problem effectively. There are several challenges, beginning with understanding the threat.

  3. Satellite Threat Warning and Attack Reporting

    SciTech Connect

    Hilland, D.; Phipps, G.; Jingle, C.; Newton, G.

    1997-12-31

    The Air Force Research Laboratory`s Satellite Threat Warning and Attack Reporting (STW/AR) program will provide technologies for advanced threat warning and reporting of radio frequency (RF) and laser threats. The STW/AR program objectives are: (a) develop cost- effective technologies to detect, identify, locate, characterize, and report attacks or interference against U.S. and Allied satellites. (b) demonstrate innovative, light-weight, low-power, laser and RF sensors. The program focuses on the demonstration of RF and laser sensors. The RF sensor effort includes the investigation of interferometric antenna arrays, multi-arm spiral and butler matrix antennas, wideband receivers, adaptive processors, and improved processing algorithms. The laser sensor effort includes the investigation of alternative detectors, broadband grating and optical designs, active pixel sensing, and improved processing algorithms.

  4. [The threat of snake and scorpion venoms].

    PubMed

    Płusa, Tadeusz; Smędzik, Katarzyna

    2015-09-01

    Venoms of snakes and scorpions pose a significant threat to the health and life of humans. The speed and range of their actions causes damage of the organ responsible for the maintenance of vital signs. Venomous snake venoms cause blood clotting disorders, tissue necrosis and hemolysis, and the release of a number of proinflammatory cytokines and impair antibody synthesis. Availability of antitoxins is limited and in the most cases supportive treatment is recommended. In turn, the venom of scorpions beside intestinal symptoms cause significant impairment of neuromuscular conduction, causing severe respiratory disorders. Action venom poses a particular threat to sensitive patients. The degree of threat to life caused by the venom of snakes and scorpions authorizes the treatment of these substances as a potential biological weapon. PMID:26449581

  5. Intergroup threat and outgroup attitudes: a meta-analytic review.

    PubMed

    Riek, Blake M; Mania, Eric W; Gaertner, Samuel L

    2006-01-01

    This article examines the relationship between intergroup threat and negative outgroup attitudes. We first qualitatively review the intergroup threat literature, describing the shift from competing theories toward more integrated approaches, such as the integrated threat theory (ITT; W. G. Stephan and Stephan, 2000). The types of threats discussed include: realistic threat, symbolic threat, intergroup anxiety, negative stereotypes, group esteem threat, and distinctiveness threat. We then conducted a quantitative meta-analysis examining the relationships between various intergroup threats and outgroup attitudes. The meta-analysis, involving 95 samples, revealed that 5 different threat types had a positive relationship with negative outgroup attitudes. Additionally, outgroup status moderated some of these relationships. Implications and future directions are considered. PMID:17201592

  6. Experimental investigations of weak definite and weak indefinite noun phrases

    PubMed Central

    Klein, Natalie M.; Gegg-Harrison, Whitney M.; Carlson, Greg N.; Tanenhaus, Michael K.

    2013-01-01

    Definite noun phrases typically refer to entities that are uniquely identifiable in the speaker and addressee’s common ground. Some definite noun phrases (e.g. the hospital in Mary had to go the hospital and John did too) seem to violate this uniqueness constraint. We report six experiments that were motivated by the hypothesis that these “weak definite” interpretations arise in “incorporated” constructions. Experiments 1-3 compared nouns that seem to allow for a weak definite interpretation (e.g. hospital, bank, bus, radio) with those that do not (e.g. farm, concert, car, book). Experiments 1 and 2 used an instruction-following task and picture-judgment task, respectively, to demonstrate that a weak definite need not uniquely refer. In Experiment 3 participants imagined scenarios described by sentences such as The Federal Express driver had to go to the hospital/farm. The imagined scenarios following weak definite noun phrases were more likely to include conventional activities associated with the object, whereas following regular nouns, participants were more likely to imagine scenarios that included typical activities associated with the subject; similar effects were observed with weak indefinites. Experiment 4 found that object-related activities were reduced when the same subject and object were used with a verb that does not license weak definite interpretations. In Experiment 5, a science fiction story introduced an artificial lexicon for novel concepts. Novel nouns that shared conceptual properties with English weak definite nouns were more likely to allow weak reference in a judgment task. Experiment 6 demonstrated that familiarity for definite articles and anti- familiarity for indefinite articles applies to the activity associated with the noun, consistent with predictions made by the incorporation analysis. PMID:23685208

  7. Experimental investigations of weak definite and weak indefinite noun phrases.

    PubMed

    Klein, Natalie M; Gegg-Harrison, Whitney M; Carlson, Greg N; Tanenhaus, Michael K

    2013-08-01

    Definite noun phrases typically refer to entities that are uniquely identifiable in the speaker and addressee's common ground. Some definite noun phrases (e.g., the hospital in Mary had to go the hospital and John did too) seem to violate this uniqueness constraint. We report six experiments that were motivated by the hypothesis that these "weak definite" interpretations arise in "incorporated" constructions. Experiments 1-3 compared nouns that seem to allow for a weak definite interpretation (e.g., hospital, bank, bus, radio) with those that do not (e.g., farm, concert, car, book). Experiments 1 and 2 used an instruction-following task and picture-judgment task, respectively, to demonstrate that a weak definite need not uniquely refer. In Experiment 3 participants imagined scenarios described by sentences such as The Federal Express driver had to go to the hospital/farm. Scenarios following weak definite noun phrases were more likely to include conventional activities associated with the object, whereas following regular nouns, participants were more likely to imagine scenarios that included typical activities associated with the subject; similar effects were observed with weak indefinites. Experiment 4 found that object-related activities were reduced when the same subject and object were used with a verb that does not license weak definite interpretations. In Experiment 5, a science fiction story introduced an artificial lexicon for novel concepts. Novel nouns that shared conceptual properties with English weak definite nouns were more likely to allow weak reference in a judgment task. Experiment 6 demonstrated that familiarity for definite articles and anti-familiarity for indefinite articles applies to the activity associated with the noun, consistent with predictions made by the incorporation analysis. PMID:23685208

  8. [Assessing adolescents with school massacre threats].

    PubMed

    Lindberg, Nina; Sailas, Eila; Kaltiala-Heino, Riittakerttu

    2013-01-01

    School massacres have increased pressure on health-care authorities for assessing risk for severe violence. In acute situations, threat analysis focuses at thought processes and actions of adolescents presenting threat of violence, in order to assess to which extent the adolescent has progressed from thoughts to actions. Because of great variability in aggressive behavior, separate interventions for individual, family and other developmental surroundings are often needed. Structured risk-assessment in special health care is aimed for conducting decision making towards risk reduction and adequate help for adolescents at risk. PMID:24069639

  9. “Hidden” threats to science education

    NASA Astrophysics Data System (ADS)

    Huntoon, J. E.; Buchanan, R.; Buhr, S. M.; Kirst, S.; Newton, S.; Van Norden, W.

    2012-04-01

    Many readers of Eos are involved with education. Most would agree that what happens at precollege levels will ultimately affect the geoscience profession; after all, future scientists are today's precollege students. While a growing number of scientists are working to improve the quality of precollege programs, only a few are addressing what we term the "hidden" threats to science education. Hidden threats have nothing to do with scientific content; rather, they result from social, political, and bureaucratic forces operating within and outside of schools and universities.

  10. Climate change: how grave the threat?

    PubMed

    Montgomery, Hugh

    2009-08-01

    There is now no dispute about climate change: it is happening, and human activity is driving it. Each day, the threat this poses becomes clearer--threatening our civilisation and also the survival of our species. The immediacy of this threat is also now recognised: it is not something 'for the next millenium' but for our lifetimes and those of our children. Without urgent action, the future is grim. But we can all respond to make the difference. And the time to do so is now. PMID:19728499

  11. Bioterrorism threats: learning from inappropriate responses.

    PubMed

    Cole, L A

    2000-07-01

    Between April 1997 and June 1999, some 200 mailed or telephoned bioterrorism threats were received at a variety of locations. Usually claiming that anthrax had been released, the threats all proved to be hoaxes. In many instances, local emergency responders treated the more than 13,000 potential victims inappropriately, in particular requiring victims to strip and undergo decontamination with bleach solutions. Narratives of several incidents indicated that many victims were distressed and embarrassed by their treatment. Their experiences underscore the need for improved local response actions and the formulation of a uniform response protocol for public health agencies. PMID:10977619

  12. Celebrate Strengths, Nurture Affinities: A Conversation with Mel Levine

    ERIC Educational Resources Information Center

    Scherer, Marge

    2006-01-01

    In this interview with "Educational Leadership," pediatrician Dr. Mel Levine, cofounder of "All Kinds of Minds," explains why students and educators should learn about eight neurodevelopmental functions that undergird our strengths and weaknesses. For the most part, he notes, adults who lead successful lives mobilize their strengths and compensate…

  13. Weak interactions and presupernova evolution

    SciTech Connect

    Aufderheide, M.B. State Univ. of New York . Dept. of Physics)

    1991-02-19

    The role of weak interactions, particularly electron capture and {beta}{sup {minus}} decay, in presupernova evolution is discussed. The present uncertainty in these rates is examined and the possibility of improving the situation is addressed. 12 refs., 4 figs.

  14. Quasi-Suslin weak duals

    NASA Astrophysics Data System (ADS)

    Ferrando, J. C.; Kakol, J.; López Pellicer, M.; Saxon, S. A.

    2008-03-01

    Cascales, Kakol, and Saxon (CKS) ushered Kaplansky and Valdivia into the grand setting of Cascales/Orihuela spaces E by proving: (K) If E is countably tight, then so is the weak space (E,[sigma](E,E')), and (V) (E,[sigma](E,E')) is countably tight iff weak dual (E',[sigma](E',E)) is K-analytic. The ensuing flow of quasi-Suslin weak duals that are not K-analytic, a la Valdivia's example, continues here, where we argue that locally convex spaces E with quasi-Suslin weak duals are (K, V)'s best setting: largest by far, optimal vis-a-vis Valdivia. The vaunted CKS setting proves not larger, in fact, than Kaplansky's. We refine and exploit the quasi-LB strong dual interplay.

  15. Defensive activation to (un)predictable interoceptive threat: The NPU respiratory threat test (NPUr).

    PubMed

    Schroijen, Mathias; Fantoni, Simona; Rivera, Carmen; Vervliet, Bram; Schruers, Koen; van den Bergh, Omer; van Diest, Ilse

    2016-06-01

    Potentially life-threatening interoceptive sensations easily engage the behavioral defensive system. Resulting fear and anxiety toward interoceptive threat are functionally distinct states that are hypothesized to play a prominent role in the etiology of panic disorder. The present study aimed to investigate whether fear- and anxiety-potentiated startle responses occur to predictable and unpredictable interoceptive threat, respectively. Therefore, we modified the NPU threat test (Schmitz & Grillon, ) and replaced the aversive electrocutaneous stimulus with an aversive interoceptive stimulus (a breathing occlusion, making it briefly impossible to breathe). Healthy participants (N = 48) underwent three instructed conditions. A visual cue signaled the occlusion in the predictable condition (P), whereas another cue was unrelated to the occurrence of the occlusion in the unpredictable condition (U). The safe condition (N) also had a visual cue, but no occlusion. Both fear- and anxiety-potentiated startle blink responses were observed in response to predictable and unpredictable respiratory threat, respectively. The current study presents and validates the NPU respiratory threat test (NPUr) as an ecologically valid paradigm to study both anxiety and fear in response to a panic-relevant interoceptive threat. The paradigm allows future testing of contextual generalization, investigation of different clinical groups, and more explicit comparisons of defensive responding to interoceptive versus exteroceptive threats. PMID:26879710

  16. Weak Deeply Virtual Compton Scattering

    SciTech Connect

    Ales Psaker; Wolodymyr Melnitchouk; Anatoly Radyushkin

    2007-03-01

    We extend the analysis of the deeply virtual Compton scattering process to the weak interaction sector in the generalized Bjorken limit. The virtual Compton scattering amplitudes for the weak neutral and charged currents are calculated at the leading twist within the framework of the nonlocal light-cone expansion via coordinate space QCD string operators. Using a simple model, we estimate cross sections for neutrino scattering off the nucleon, relevant for future high intensity neutrino beam facilities.

  17. Controlling of Entropic Uncertainty in Qubits System Under the Generalized Amplitude Damping Channel via Weak Measurements

    NASA Astrophysics Data System (ADS)

    Zhang, Shi-Yang; Fang, Mao-Fa; Yu, Min

    2016-03-01

    We study the effect of weak measurements on the entropic uncertainty in two-qubit system under the generalized amplitude damping channel. Our results show that, the entropic uncertainty in qubits system can be reduced under weak measurements by choosing appropriate measuring strength, which provides a new method to break through the restriction of uncertainty relation in quantum mechanics.

  18. Experimental Evidence of Threat-Sensitive Collective Avoidance Responses in a Large Wild-Caught Herring School

    PubMed Central

    Rieucau, Guillaume; Boswell, Kevin M.; De Robertis, Alex; Macaulay, Gavin J.; Handegard, Nils Olav

    2014-01-01

    Aggregation is commonly thought to improve animals' security. Within aquatic ecosystems, group-living prey can learn about immediate threats using cues perceived directly from predators, or from collective behaviours, for example, by reacting to the escape behaviours of companions. Combining cues from different modalities may improve the accuracy of prey antipredatory decisions. In this study, we explored the sensory modalities that mediate collective antipredatory responses of herring (Clupea harengus) when in a large school (approximately 60 000 individuals). By conducting a simulated predator encounter experiment in a semi-controlled environment (a sea cage), we tested the hypothesis that the collective responses of herring are threat-sensitive. We investigated whether cues from potential threats obtained visually or from the perception of water displacement, used independently or in an additive way, affected the strength of the collective avoidance reactions. We modified the sensory nature of the simulated threat by exposing the herring to 4 predator models differing in shape and transparency. The collective vertical avoidance response was observed and quantified using active acoustics. The combination of sensory cues elicited the strongest avoidance reactions, suggesting that collective antipredator responses in herring are mediated by the sensory modalities involved during threat detection in an additive fashion. Thus, this study provides evidence for magnitude-graded threat responses in a large school of wild-caught herring which is consistent with the “threat-sensitive hypothesis”. PMID:24489778

  19. Experimental evidence of threat-sensitive collective avoidance responses in a large wild-caught herring school.

    PubMed

    Rieucau, Guillaume; Boswell, Kevin M; De Robertis, Alex; Macaulay, Gavin J; Handegard, Nils Olav

    2014-01-01

    Aggregation is commonly thought to improve animals' security. Within aquatic ecosystems, group-living prey can learn about immediate threats using cues perceived directly from predators, or from collective behaviours, for example, by reacting to the escape behaviours of companions. Combining cues from different modalities may improve the accuracy of prey antipredatory decisions. In this study, we explored the sensory modalities that mediate collective antipredatory responses of herring (Clupea harengus) when in a large school (approximately 60,000 individuals). By conducting a simulated predator encounter experiment in a semi-controlled environment (a sea cage), we tested the hypothesis that the collective responses of herring are threat-sensitive. We investigated whether cues from potential threats obtained visually or from the perception of water displacement, used independently or in an additive way, affected the strength of the collective avoidance reactions. We modified the sensory nature of the simulated threat by exposing the herring to 4 predator models differing in shape and transparency. The collective vertical avoidance response was observed and quantified using active acoustics. The combination of sensory cues elicited the strongest avoidance reactions, suggesting that collective antipredator responses in herring are mediated by the sensory modalities involved during threat detection in an additive fashion. Thus, this study provides evidence for magnitude-graded threat responses in a large school of wild-caught herring which is consistent with the "threat-sensitive hypothesis". PMID:24489778

  20. Computer Security-Risks, Threats, and Safeguards.

    ERIC Educational Resources Information Center

    Ekhaml, Leticia

    2001-01-01

    Describes a variety of Internet threats to computers and networks used in schools. Discusses electronic trashing; clearing hard drives; cyber spying on Web sites visited; protection against cyber spying, including disposable email accounts; password sniffers; privacy policies; email snooping; email attachments that carry viruses; and hoaxes. (LRW)

  1. The Threat Index: A Research Report.

    ERIC Educational Resources Information Center

    Rigdon, Michael A.; And Others

    1979-01-01

    The Threat Index (TI), theoretically based on George Kelly's personal construct theory, was developed as a measure of death orientation. Outlines the emerging reliability and validity picture. The aim is to give direction to future TI research by summarizing and critically evaluating the currently available data. (Author)

  2. The Nature of the Terrorism Threat

    ERIC Educational Resources Information Center

    Goldstein, Evan R., Comp.

    2008-01-01

    This article describes how Bruce Hoffman and Marc Sageman, two prominent scholars of terrorism, square off over whether Al Qaeda remains the primary global terrorist threat. The dispute began in the pages of "Foreign Affairs," where Hoffman, a professor in the security-studies program at Georgetown University, wrote a withering review of Sageman's

  3. Threats and countermeasures for network security

    NASA Technical Reports Server (NTRS)

    Denning, Peter J.

    1991-01-01

    In the late 1980's, the traditional threat of anonymous break-ins to networked computers was joined by viruses and worms, multiplicative surrogates that carry out the bidding of their authors. Technologies for authentication and secrecy, supplemented by good management practices, are the principal countermeasures. Four articles on these subjects are presented.

  4. The silent threat of low genetic diversity

    USGS Publications Warehouse

    Hunter, Margaret E.

    2013-01-01

    Across the Caribbean, protected coastal waters have served as primary feeding and breeding grounds for the endangered Antillean manatee. Unfortunately, these same coastal waters are also a popular “habitat” for humans. In the past, the overlap between human and manatee habitat allowed for manatee hunting and threatened the survival of these gentle marine mammals. Today, however, threats are much more inadvertent and are often related to coastal development, degraded habitats and boat strikes. In the state of Florida, decades of research on the species’ biological needs have helped conservationists address threats to its survival. For example, low wake zones and boater education have protected manatees from boat strikes, and many of their critical winter refuges are now protected. The Florida population has grown steadily, thus increasing from approximately 1,200 in 1991 to more than 5,000 in 2010. It is conceivable that in Florida manatees may one day be reclassified as “threatened” rather than “endangered.” Yet, in other parts of the Caribbean, threats still loom. This includes small, isolated manatee populations found on islands that can be more susceptible to extinction and lack of genetic diversity. To ensure the species’ long-term viability, scientists have turned their sights to the overall population dynamics of manatees throughout the Caribbean. Molecular genetics has provided new insights into long-term threats the species faces. Fortunately, the emerging field of conservation genetics provides managers with tools and strategies for protecting the species’ long-term viability.

  5. Diversity, Racial Threat and Metropolitan Housing Segregation

    ERIC Educational Resources Information Center

    DeFina, Robert; Hannon, Lance

    2009-01-01

    Previous studies have shown that as the percent black or percent Hispanic grows, that group's residential segregation from whites tends to increase as well. Typically, these findings are explained in terms of white discriminatory reaction to the perceived threat associated with minority population growth. The present analysis examines whether…

  6. Reactions to the Threat of Embarrassment.

    ERIC Educational Resources Information Center

    Miller, Rowland S.; Miller, Gale A.

    Embarrassment is an aversive state which occurs when the public image a person is trying to maintain during an interaction is abruptly discredited. When people are embarrassed, they try to salvage the situation by offering positive information about themselves to restore their endangered identities. To examine responses to the threat of impending…

  7. The Asteroid Impact Threat: Decisions Upcoming

    NASA Astrophysics Data System (ADS)

    Schweickart, Russell L.

    The asteroid impact threat has likely been constant for the past three billion years. What has accelerated is our knowledge of the impact hazard, and in particular the population of near- Earth objects (NEOs), those asteroids and near-Earth comets whose orbits approach or cross that of the Earth. In the next 10-15 years we will know the orbits of over 300,000 NEOs of a size capable of destroying a major city on impact. Based on current data 97 Given that a NEO deflection campaign can be initiated using existing space technology the international community will shortly be confronted with the decision of whether action should be taken, when it should be taken and who should take such action. The Association of Space Explorers (ASE)* and its Panel on Asteroid Threat Mitigation is currently concluding a two year process leading to a recommended decision program on asteroid threat mitigation that will be submitted to the United Nations in 2009. UN member states will soon be looking to the scientific community for their inputs on this matter. This presentation is intended to provide basic information on the NEO threat and our ability to take preventive action, anticipating an increasing demand for scientific opinion on this issue from international political institutions. (*) The Association of Space Explorers is the profession international organization of astronauts and cosmonauts. See www.space-explorers.org.

  8. After Heart Attack, New Threat: Heart Failure

    MedlinePlus

    ... nih.gov/medlineplus/news/fullstory_159007.html After Heart Attack, New Threat: Heart Failure 1 in 4 survivors develops this serious ... TUESDAY, May 24, 2016 (HealthDay News) -- Risk of heart failure appears high within a few years of ...

  9. The School Shooter: A Threat Assessment Perspective.

    ERIC Educational Resources Information Center

    O'Toole, Mary Ellen

    This paper presents a systematic procedure for threat assessment and intervention of school shooters. The model is designed to be used by educators, mental-health professionals, and law-enforcement agencies and is intended to help refine and strengthen the efforts of the National Center for the Analysis of Violent Crime. Its fundamental building…

  10. The Nature of the Terrorism Threat

    ERIC Educational Resources Information Center

    Goldstein, Evan R., Comp.

    2008-01-01

    This article describes how Bruce Hoffman and Marc Sageman, two prominent scholars of terrorism, square off over whether Al Qaeda remains the primary global terrorist threat. The dispute began in the pages of "Foreign Affairs," where Hoffman, a professor in the security-studies program at Georgetown University, wrote a withering review of Sageman's…

  11. Proliferation: Threat and response (November 1997)

    SciTech Connect

    1997-11-01

    Table of Contents: The Regional Proliferation Challenge; Northeast Asia; South Asia; The Middle East and North Africa; Russia, Ukraine, Kazakhstan, and Belarus; The Transnational Threat; Department of Defense Response; Prevention; Protection; Acquisition; DOD Capabilities to Respond to NBC Terrorism; Conclusion; Technical Annex; Further Reading; and Glossary.

  12. Using the threat probability task to assess anxiety and fear during uncertain and certain threat.

    PubMed

    Bradford, Daniel E; Magruder, Katherine P; Korhumel, Rachel A; Curtin, John J

    2014-01-01

    Fear of certain threat and anxiety about uncertain threat are distinct emotions with unique behavioral, cognitive-attentional, and neuroanatomical components. Both anxiety and fear can be studied in the laboratory by measuring the potentiation of the startle reflex. The startle reflex is a defensive reflex that is potentiated when an organism is threatened and the need for defense is high. The startle reflex is assessed via electromyography (EMG) in the orbicularis oculi muscle elicited by brief, intense, bursts of acoustic white noise (i.e., "startle probes"). Startle potentiation is calculated as the increase in startle response magnitude during presentation of sets of visual threat cues that signal delivery of mild electric shock relative to sets of matched cues that signal the absence of shock (no-threat cues). In the Threat Probability Task, fear is measured via startle potentiation to high probability (100% cue-contingent shock; certain) threat cues whereas anxiety is measured via startle potentiation to low probability (20% cue-contingent shock; uncertain) threat cues. Measurement of startle potentiation during the Threat Probability Task provides an objective and easily implemented alternative to assessment of negative affect via self-report or other methods (e.g., neuroimaging) that may be inappropriate or impractical for some researchers. Startle potentiation has been studied rigorously in both animals (e.g., rodents, non-human primates) and humans which facilitates animal-to-human translational research. Startle potentiation during certain and uncertain threat provides an objective measure of negative affective and distinct emotional states (fear, anxiety) to use in research on psychopathology, substance use/abuse and broadly in affective science. As such, it has been used extensively by clinical scientists interested in psychopathology etiology and by affective scientists interested in individual differences in emotion. PMID:25285398

  13. Entanglement-assisted weak measurement

    NASA Astrophysics Data System (ADS)

    Pang, Shengshi; Dressel, Justin; Brun, Todd A.

    2015-03-01

    Postselected weak measurement with a large measurement can amplify small coupling parameters. However, a major shortcoming is that the postselection probability is usually very low when the amplification is large, which means an enormous amount of resources is necessary. So, how to increase the postselection probability is an important problem in practical application of weak measurement. In this work, we study the optimization of weak measurement and propose an entanglement-assisted protocol for it. We start from maximizing the postselection probability with a given weak value. The result shows the maximum postselection probability is proportional to the variance of the observable under the initial state of the system. As is know that the variance has different scaling under entangled or uncorrelated states, it inspired us to show using entanglement in the initial state of the system can increase the postselection efficiency beyond that with sequential use of systems. With this result, we further find the Fisher information of weak measurement can approximately reach the Heisenberg limit with the assistance of entanglement. Finally, we give simple quantum circuits for the implementation of this protocol with qubits, including initialization, weak interaction and postselection. This research was partially supported by the ARO MURI Grant No. W911NF-11-1- 0268. S. P. and T. A. B. also acknowledge the support from NSF Grant No. CCF-0829870, while J. D. acknowledges support from IARPA/ARO Grant No. W91NF-10-1-0334.

  14. Conformational transitions of a weak polyampholyte

    NASA Astrophysics Data System (ADS)

    Narayanan Nair, Arun Kumar; Uyaver, Sahin; Sun, Shuyu

    2014-10-01

    Using grand canonical Monte Carlo simulations of a flexible polyelectrolyte where the charges are in contact with a reservoir of constant chemical potential given by the solution pH, we study the behavior of weak polyelectrolytes in poor and good solvent conditions for polymer backbone. We address the titration behavior and conformational properties of a flexible diblock polyampholyte chain formed of two oppositely charged weak polyelectrolyte blocks, each containing equal number of identical monomers. The change of solution pH induces charge asymmetry in a diblock polyampholyte. For diblock polyampholyte chains in poor solvents, we demonstrate that a discontinuous transition between extended (tadpole) and collapsed (globular) conformational states is attainable by varying the solution pH. The double-minima structure in the probability distribution of the free energy provides direct evidence for the first-order like nature of this transition. At the isoelectric point electrostatically driven coil-globule transition of diblock polyampholytes in good solvents is found to consist of different regimes identified with increasing electrostatic interaction strength. At pH values above or below the isoelectric point diblock chains are found to have polyelectrolyte-like behavior due to repulsion between uncompensated charges along the chain.

  15. Effective Teaching Strategies for Gifted/Learning-Disabled Students with Spatial Strengths

    ERIC Educational Resources Information Center

    Mann, Rebecca L.

    2006-01-01

    This study sought to determine effective teaching strategies for use with high-ability students who have spatial strengths and sequential weaknesses. Gifted students with spatial strengths and weak verbal skills often struggle in the traditional classroom. Their learning style enables them to grasp complex systems and excel at higher levels of…

  16. Sexual harassment under social identity threat: the computer harassment paradigm.

    PubMed

    Maass, Anne; Cadinu, Mara; Guarnieri, Gaia; Grasselli, Annalisa

    2003-11-01

    Two laboratory experiments investigated the hypothesis that threat to male identity would increase the likelihood of gender harassment. In both experiments, using the computer harassment paradigm, male university students (N=80 in Experiment 1, N=90 in Experiment 2) were exposed to different types of identity threat (legitimacy threat and threat to group value in Experiment 1 and distinctiveness threat and prototypicality threat in Experiment 2) or to no threat and were then given the opportunity to send pornographic material to a virtual female interaction partner. Results show that (a) participants harassed the female interaction partner more when they were exposed to a legitimacy, distinctiveness, or prototypicality threat than to no threat; (b) this was mainly true for highly identified males; and (c) harassment enhanced postexperimental gender identification. Results are interpreted as supporting a social identity account of gender harassment. PMID:14599249

  17. Observationally determined Fe II oscillator strengths

    NASA Astrophysics Data System (ADS)

    Shull, J. M.; van Steenberg, M.; Seab, C. G.

    1983-08-01

    Absorption oscillator strengths for 21 Fe II resonance lines, have been determined using a curve-of-growth analysis of interstellar data from the Copernicus and International Ultraviolet Explorer (IUE) satellites. In addition to slight changes in strengths of the far-UV lines, new f-values are reported for wavelength 1608.45, a prominent line in interstellar and quasar absorption spectra, and for wavelength 2260.08, a weak, newly identified linen in IUE interstellar spectra. An upper limit on the strength of the undetected line at 2366.867 A (UV multiplet 2) is set. Using revised oscillator strengths, Fe II column densities toward 13 OB stars are derived. The interstellar depletions, (Fe/H), relative to solar values range between factors of 10 and 120.

  18. Monopole Strength Function of Deformed Superfluid Nuclei

    SciTech Connect

    Stoitsov, M. V.; Kortelainen, E. M.; Nakatsukasa, T.; Losa, C.; Nazarewicz, Witold

    2011-01-01

    We present an efficient method for calculating strength functions using the finite amplitude method (FAM) for deformed superfluid heavy nuclei within the framework of the nuclear density functional theory. We demonstrate that FAM reproduces strength functions obtained with the fully self-consistent quasi-particle random-phase approximation (QRPA) at a fraction of computational cost. As a demonstration, we compute the isoscalar and isovector monopole strength for strongly deformed configurations in ^{240}Pu by considering huge quasi-particle QRPA spaces. Our approach to FAM, based on Broyden's iterative procedure, opens the possibility for large-scale calculations of strength distributions in well-bound and weakly bound nuclei across the nuclear landscape.

  19. Time course of threat responding in panic disorder and depression.

    PubMed

    Gorka, Stephanie M; Liu, Huiting; Sarapas, Casey; Shankman, Stewart A

    2015-10-01

    Heightened sensitivity to threat is a characteristic feature of panic disorder (PD). It is also a factor that is considered to be central to PD but not major depressive disorder (MDD) – a related disorder that commonly co-occurs with PD. However, sensitivity to threat is a broad construct and it is unclear whether individuals with PD exhibit heightened initial threat reactivity, impairments in modulating their threat responding over time, or both. It is also unclear how these different facets of threat responding apply to predictable and/or unpredictable threat. The aim of the current study was to examine whether there are differences in initial threat reactivity and the time course of threat responding during predictable and unpredictable threat-of-shock in 186 adults with: 1) current PD and no history of depression (i.e., PD-only), 2) current MDD and no history of an anxiety disorder (i.e., MDD-only), 3) current comorbid PD and MDD, or 4) no lifetime history of psychopathology (i.e., controls). Threat responding was assessed using an electromyography startle paradigm. Relative to controls, individuals in the three psychopathology groups exhibited heightened initial threat reactivity to predictable and unpredictable threat and did not differ from each other. Multilevel mixed model analyses indicated that those with PD evidenced less of a decline over time in startle responding during unpredictable threat relative to those without PD. Those with MDD displayed a greater slope of decline in startle responding during predictable threat compared with those without MDD. The pattern of results suggests that there may be conceptual differences between measures of initial threat reactivity and time course of threat responding. Moreover, time course of threat responding, not initial threat reactivity, may differentiate PD from MDD. PMID:26168883

  20. Flexibility and Muscular Strength.

    ERIC Educational Resources Information Center

    Liemohn, Wendell

    1988-01-01

    This definition of flexibility and muscular strength also explores their roles in overall physical fitness and focuses on how increased flexibility and muscular strength can help decrease or eliminate lower back pain. (CB)

  1. Growth and decay of weak shock waves in magnetogasdynamics

    NASA Astrophysics Data System (ADS)

    Singh, L. P.; Singh, D. B.; Ram, S. D.

    2015-12-01

    The purpose of the present study is to investigate the problem of the propagation of weak shock waves in an inviscid, electrically conducting fluid under the influence of a magnetic field. The analysis assumes the following two cases: (1) a planar flow with a uniform transverse magnetic field and (2) cylindrically symmetric flow with a uniform axial or varying azimuthal magnetic field. A system of two coupled nonlinear transport equations, governing the strength of a shock wave and the first-order discontinuity induced behind it, are derived that admit a solution that agrees with the classical decay laws for a weak shock. An analytic expression for the determination of the shock formation distance is obtained. How the magnetic field strength, whether axial or azimuthal, influences the shock formation is also assessed.

  2. Strength Training for Girls.

    ERIC Educational Resources Information Center

    Connaughton, Daniel; Connaughton, Angela; Poor, Linda

    2001-01-01

    Strength training can be fun, safe, and appropriate for young girls and women and is an important component of any fitness program when combined with appropriate cardiovascular and flexibility activities. Concerns and misconceptions regarding girls' strength training are discussed, presenting general principles of strength training for children…

  3. Risk assessment and LAVA's (Los Alamos Vulnerability and Risk Assessment) dynamic threat analysis

    SciTech Connect

    Smith, S.T. )

    1989-01-01

    LAVA (the Los Alamos Vulnerability/Risk Assessment system) is a three-part systematic approach to risk assessment that can be used to model risk assessment for a variety of application systems such as computer security systems, communications security systems, and information security systems. The first part of LAVA is the mathematical methodology based on such disciplines as hierarchical system theory, event-tree analysis, possibility theory, and cognitive science. The second part is the general software engine,written for a large class of personal computers, that implements the mathematical risk model. The third part is the application data sets written for a specific application system. The methodology provides a framework for creating applications for the software engine to operate upon; all application-specific information is data. Using LAVA, we build knowledge-based expert systems to assess risks in application systems comprising a subject system and a safeguards system. The subject system model comprises sets of threats, assets, and undesirable outcomes; because the threat to security systems is ever-changing, LAVA provides for an analysis of the dynamic aspects of the threat spectrum. The safeguards system model comprises sets of safeguards functions for protecting the assess from the threats by preventing or ameliorating the undesirable outcomes; sets of safeguards subfunctions whose performance determine whether the function is adequate and complete; and sets of issues that appear as interactive questionnaires, whose measures define both the weaknesses in the safeguards system and the potential costs of an undesirable outcome occurring. 29 refs.

  4. Countering laser pointer threats to road safety

    NASA Astrophysics Data System (ADS)

    Svensson, Sören; Björkert, Stefan; Kariis, Hans; Lopes, Cesar

    2006-09-01

    The market demand for bright laser pointers has led to the development of readily available devices that can pose a threat to road safety. Laser pointers can be involved in accidents caused by laser users who do not realise the dangers involved, but laser pointers can also enable deliberate criminal activity. There are technologies available that can counter the threat in different ways. A number of protective principles are outlined below. Some technologies built upon Liquid Crystal Devices are described in greater detail. Without any knowledge of what laser pointers a potential aggressor has access to, a frequency agile filter seems to be the most promising way to avoid the most severe consequences of dazzle from laser pointers. Protective systems incorporating suitable glasses or visors holding frequency agile filters of this kind however, are not commercially available today.

  5. Detecting underwater improvised explosive threats (DUIET)

    NASA Astrophysics Data System (ADS)

    Feeley, Terry

    2010-04-01

    Improvised Explosive Devices (IEDs) have presented a major threat in the wars in Afghanistan and Iraq. These devices are powerful homemade land mines that can be small and easily hidden near roadsides. They are then remotely detonated when Coalition Forces pass by either singly or in convoys. Their rapid detection, classification and destruction is key to the safety of troops in the area. These land based bombs will have an analogue in the underwater theater especially in ports, lakes, rivers and streams. These devices may be used against Americans on American soil as an element of the global war on terrorism (GWOT) Rapid detection and classification of underwater improvised explosive devices (UIED) is critical to protecting innocent lives and maintaining the day to day flow of commerce. This paper will discuss a strategy and tool set to deal with this potential threat.

  6. The Concept of Identification in Threat Assessment.

    PubMed

    Meloy, J Reid; Mohandie, Kris; Knoll, James L; Hoffmann, Jens

    2015-06-01

    Identification is one of eight warning behaviors--superordinate patterns of accelerating risk--that are theorized to correlate with targeted violence, and have some empirical validation. It is characterized by one or more of five characteristics: pseudo-commando behavior, evidence of a warrior mentality, a close association with weapons or other military or law enforcement paraphernalia, wanting to imitate and often surmount previous attackers or assassins, or believing oneself to be an agent to advance a particular cause or belief system. The authors briefly explore the history of the psychology of identification, its current usage, and its application to threat assessment. Four cases are used to illustrate identification as both a process and a product, and a likely motive for targeted violence in some subjects. Its operational relevance for threat assessment is suggested. PMID:25728417

  7. Future Infectious Disease Threats to Europe

    PubMed Central

    Suk, Jonathan E.

    2011-01-01

    We examined how different drivers of infectious disease could interact to threaten control efforts in Europe. We considered projected trends through 2020 for 3 broad groups of drivers: globalization and environmental change, social and demographic change, and health system capacity. Eight plausible infectious disease threats with the potential to be significantly more problematic than they are today were identified through an expert consultation: extensively drug-resistant bacteria, vector-borne diseases, sexually transmitted infections, food-borne infections, a resurgence of vaccine-preventable diseases, health care–associated infections, multidrug-resistant tuberculosis, and pandemic influenza. Preemptive measures to be taken by the public health community to counteract these threats were identified. PMID:21940915

  8. Securing Infrastructure from High Explosive Threats

    SciTech Connect

    Glascoe, L; Noble, C; Reynolds, J; Kuhl, A; Morris, J

    2009-03-20

    Lawrence Livermore National Laboratory (LLNL) is working with the Department of Homeland Security's Science and Technology Directorate, the Transportation Security Administration, and several infrastructure partners to characterize and help mitigate principal structural vulnerabilities to explosive threats. Given the importance of infrastructure to the nation's security and economy, there is a clear need for applied research and analyses (1) to improve understanding of the vulnerabilities of these systems to explosive threats and (2) to provide decision makers with time-critical technical assistance concerning countermeasure and mitigation options. Fully-coupled high performance calculations of structural response to ideal and non-ideal explosives help bound and quantify specific critical vulnerabilities, and help identify possible corrective schemes. Experimental validation of modeling approaches and methodologies builds confidence in the prediction, while advanced stochastic techniques allow for optimal use of scarce computational resources to efficiently provide infrastructure owners and decision makers with timely analyses.

  9. Insider Threat and Information Security Management

    NASA Astrophysics Data System (ADS)

    Coles-Kemp, Lizzie; Theoharidou, Marianthi

    The notion of insider has multiple facets. An organization needs to identify which ones to respond to. The selection, implementetion and maintenance of information security countermeasures requires a complex combination of organisational policies, functions and processes, which form Information Security Management. This chapter examines the role of current information security management practices in addressing the insider threat. Most approaches focus on frameworks for regulating insider behaviour and do not allow for the various cultural responses to the regulatory and compliance framework. Such responses are not only determined by enforcement of policies and awareness programs, but also by various psychological and organisational factors at an individual or group level. Crime theories offer techniques that focus on such cultural responses and can be used to enhance the information security management design. The chapter examines the applicability of several crime theories and concludes that they can contribute in providing additional controls and redesign of information security management processes better suited to responding to the insider threat.

  10. Cosmology and the weak interaction

    SciTech Connect

    Schramm, D.N. ):)

    1989-12-01

    The weak interaction plays a critical role in modern Big Bang cosmology. This review will emphasize two of its most publicized cosmological connections: Big Bang nucleosynthesis and Dark Matter. The first of these is connected to the cosmological prediction of Neutrino Flavours, N{sub {nu}} {approximately} 3 which is now being confirmed at SLC and LEP. The second is interrelated to the whole problem of galaxy and structure formation in the universe. This review will demonstrate the role of the weak interaction both for dark matter candidates and for the problem of generating seeds to form structure. 87 refs., 3 figs., 5 tabs.

  11. Cosmology and the weak interaction

    NASA Technical Reports Server (NTRS)

    Schramm, David N.

    1989-01-01

    The weak interaction plays a critical role in modern Big Bang cosmology. Two of its most publicized comological connections are emphasized: big bang nucleosynthesis and dark matter. The first of these is connected to the cosmological prediction of neutrine flavors, N(sub nu) is approximately 3 which in now being confirmed. The second is interrelated to the whole problem of galacty and structure formation in the universe. The role of the weak interaction both for dark matter candidates and for the problem of generating seeds to form structure is demonstrated.

  12. Muscle Weakness Thresholds for Prediction of Diabetes in Adults

    PubMed Central

    Peterson, Mark D.; Zhang, Peng; Choksi, Palak; Markides, Kyriakos S.; Al Snih, Soham

    2016-01-01

    Background Despite the known links between weakness and early mortality, what remains to be fully understood is the extent to which strength preservation is associated with protection from cardiometabolic diseases such as diabetes. Purpose The purposes of this study were to determine the association between muscle strength and diabetes among adults, and to identify age- and sex-specific thresholds of low strength for detection of risk. Methods A population-representative sample of 4,066 individuals, aged 20–85 years, was included from the combined 2011–2012 National Health and Nutrition Examination Survey datasets. Strength was assessed using a hand-held dynamometer, and the single largest reading from either hand was normalized to body mass. A logistic regression model was used to assess the association between normalized grip strength and risk of diabetes, as determined by hemoglobin A1c (HbA1c) levels (≥6.5% [≥48 mmol/mol]), while controlling for sociodemographic characteristics, anthropometric measures, and television viewing time. Results For every 0.05 decrement in normalized strength, there was a 1.26 times increased adjusted odds for diabetes in men and women. Women were at lower odds of having diabetes (OR: 0.49; 95% CI: 0.29–0.82), whereas age, waist circumference and lower income were inversely associated. Optimal sex- and age-specific weakness thresholds to detect diabetes were 0.56, 0.50, and 0.45 for men, and 0.42, 0.38, and 0.33 for women, for ages 20–39 years, 40–59 years, and 60–80 years. Conclusions and Clinical Relevance We present thresholds of strength that can be incorporated into a clinical setting for identifying adults that are at risk for developing diabetes, and that might benefit from lifestyle interventions to reduce risk. PMID:26744337

  13. Nonproliferation, Nuclear Security, and the Insider Threat

    SciTech Connect

    Balatsky, Galya I.; Duggan, Ruth

    2012-07-12

    Insider threat concept is evolving and getting more attention: (1) Domestically, internationally and in foreign countries, (2) At the government, academia, and industry levels, and (3) Public awareness and concerns are also growing. Negligence can be an insider's action. Technology advancements provide more opportunities, new tools for the insider. Our understanding of the insider is shaped by our cultural, social and ethnic perceptions and traditions. They also can limit our recognition of the issues and response actions.

  14. Viral haemorrhagic fevers: current status, future threats.

    PubMed

    Speed, B R; Gerrard, M P; Kennett, M L; Catton, M G; Harvey, B M

    1996-01-15

    In developing countries, the major outbreaks of viral haemorrhagic fevers such as Marburg, Ebola and Lassa fever viruses have been nosocomially spread. The high mortality and absence of specific treatment have had a devastating effect. Epidemics of this highly contagious disease remain a constant threat to Australia and, as a result, carefully planned laboratory and public health strategies and clinical infection control measures have been instituted for the management of suspected cases. PMID:8569577

  15. Matrix Characterization in Threat Material Detection Processes

    SciTech Connect

    Obhodas, J.; Sudac, D.; Valkovic, V.

    2009-03-10

    Matrix characterization in the threat material detection is of utmost importance, it generates the background against which the threat material signal has to be identified. Threat materials (explosive, chemical warfare, ...) are usually contained within small volume inside large volumes of variable matrices. We have studied the influence of matrix materials on the capability of neutron systems to identify hidden threat material. Three specific scenarios are considered in some details: case 1--contraband material in the sea containers, case 2 - explosives in soil (landmines), case 3 - explosives and chemical warfare on the sea bottom. Effects of container cargo material on tagged neutron system are seen in the increase of gamma background and the decrease of neutron beam intensity. Detection of landmines is more complex because of variable soil properties. We have studied in detail space and time variations of soil elemental compositions and in particular hydrogen content (humidity). Of special interest are ammunitions and chemical warfare on the sea bottom, damping sites and leftovers from previous conflicts (WW-I, WW-II and local). In this case sea sediment is background source and its role is similar to the role of the soil in the landmine detection. In addition to geochemical cycling of chemical elements in semi-enclosed sea, like the Adriatic Sea, one has to consider also anthropogenic influence, especially when studying small scale variations in concentration levels. Some preliminary experimental results obtained with tagged neutron sensor inside an underwater vehicle are presented as well as data on sediment characterization by X-Ray Fluorescence.

  16. Matrix Characterization in Threat Material Detection Processes

    NASA Astrophysics Data System (ADS)

    Obhodas, J.; Sudac, D.; Valkovic, V.

    2009-03-01

    Matrix characterization in the threat material detection is of utmost importance, it generates the background against which the threat material signal has to be identified. Threat materials (explosive, chemical warfare, …) are usually contained within small volume inside large volumes of variable matrices. We have studied the influence of matrix materials on the capability of neutron systems to identify hidden threat material. Three specific scenarios are considered in some details: case 1—contraband material in the sea containers, case 2—-explosives in soil (landmines), case 3—explosives and chemical warfare on the sea bottom. Effects of container cargo material on tagged neutron system are seen in the increase of gamma background and the decrease of neutron beam intensity. Detection of landmines is more complex because of variable soil properties. We have studied in detail space and time variations of soil elemental compositions and in particular hydrogen content (humidity). Of special interest are ammunitions and chemical warfare on the sea bottom, damping sites and leftovers from previous conflicts (WW-I, WW-II and local). In this case sea sediment is background source and its role is similar to the role of the soil in the landmine detection. In addition to geochemical cycling of chemical elements in semi-enclosed sea, like the Adriatic Sea, one has to consider also anthropogenic influence, especially when studying small scale variations in concentration levels. Some preliminary experimental results obtained with tagged neutron sensor inside an underwater vehicle are presented as well as data on sediment characterization by X-Ray Fluorescence.

  17. Bot armies as threats to network security

    NASA Astrophysics Data System (ADS)

    Banks, Sheila B.; Stytz, Martin R.

    2007-04-01

    "Botnets", or "bot armies", are large groups of remotely controlled malicious software. Bot armies pose one of the most serious security threats to all networks. Botnets, remotely controlled and operated by botmasters or botherders, can launch massive denial of service attacks, multiple penetration attacks, or any other malicious network activity on a massive scale. While bot army activity has, in the past, been limited to fraud, blackmail, and other forms of criminal activity, their potential for causing large-scale damage to the entire internet; for launching large-scale, coordinated attacks on government computers and networks; and for large-scale, coordinated data gathering from thousands of users and computers on any network has been underestimated. This paper will not discuss how to build bots but the threats they pose. In a "botnet" or "bot army", computers can be used to spread spam, launch denial-of-service attacks against Web sites, conduct fraudulent activities, and prevent authorized network traffic from traversing the network. In this paper we discuss botnets and the technologies that underlie this threat to network and computer security. The first section motivates the need for improved protection against botnets, their technologies, and for further research about botnets. The second contains background information about bot armies and their key underlying technologies. The third section presents a discussion of the types of attacks that botnets can conduct and potential defenses against them. The fourth section contains a summary and suggestions for future research and development.

  18. Cyber threat model for tactical radio networks

    NASA Astrophysics Data System (ADS)

    Kurdziel, Michael T.

    2014-05-01

    The shift to a full information-centric paradigm in the battlefield has allowed ConOps to be developed that are only possible using modern network communications systems. Securing these Tactical Networks without impacting their capabilities has been a challenge. Tactical networks with fixed infrastructure have similar vulnerabilities to their commercial counterparts (although they need to be secure against adversaries with greater capabilities, resources and motivation). However, networks with mobile infrastructure components and Mobile Ad hoc Networks (MANets) have additional unique vulnerabilities that must be considered. It is useful to examine Tactical Network based ConOps and use them to construct a threat model and baseline cyber security requirements for Tactical Networks with fixed infrastructure, mobile infrastructure and/or ad hoc modes of operation. This paper will present an introduction to threat model assessment. A definition and detailed discussion of a Tactical Network threat model is also presented. Finally, the model is used to derive baseline requirements that can be used to design or evaluate a cyber security solution that can be scaled and adapted to the needs of specific deployments.

  19. SARS: An Emerging Global Microbial Threat.

    PubMed Central

    Hughes, James M.

    2004-01-01

    In March 2003, the Institute of Medicine published an update to its 1992 landmark report on emerging infections. The new report, Microbial Threats to Health: Emergence, Detection, and Response, describes the current spectrum of global microbial threats, factors affecting their emergence or resurgence, and measures that should be undertaken to effectively address them. Coincident with this publication came increasing reports of severe atypical pneumonia of unknown etiology among persons in southeast Asia. This new disease, designated severe acute respiratory syndrome (SARS), spread globally in a matter of weeks, infecting primarily close contacts of index patients (e.g., household members and healthcare workers caring for index patients) but also resulting in community transmission in some areas. An unprecedented worldwide collaborative effort was undertaken to determine the cause of the illness and implement prevention measures. A previously unrecognized coronavirus was identified as the causative agent, and health officials throughout the world struggled to implement measures to contain its spread, including isolation of suspect SARS cases and quarantine of exposed persons. The emergence of SARS is a timely reminder of the need to expect the unexpected and to ensure strong national and global public health partnerships when preparing for and responding to infectious diseases. Effectively addressing the threat of SARS will require enhanced global infectious disease surveillance, the development of rapid diagnostics, new therapies, and vaccines, implementation of aggressive evidence-based infection control strategies, and effective communication. Images Fig. 2 Fig. 3 PMID:17060979

  20. Asymmetric threat data mining and knowledge discovery

    NASA Astrophysics Data System (ADS)

    Gilmore, John F.; Pagels, Michael A.; Palk, Justin

    2001-03-01

    Asymmetric threats differ from the conventional force-on- force military encounters that the Defense Department has historically been trained to engage. Terrorism by its nature is now an operational activity that is neither easily detected or countered as its very existence depends on small covert attacks exploiting the element of surprise. But terrorism does have defined forms, motivations, tactics and organizational structure. Exploiting a terrorism taxonomy provides the opportunity to discover and assess knowledge of terrorist operations. This paper describes the Asymmetric Threat Terrorist Assessment, Countering, and Knowledge (ATTACK) system. ATTACK has been developed to (a) data mine open source intelligence (OSINT) information from web-based newspaper sources, video news web casts, and actual terrorist web sites, (b) evaluate this information against a terrorism taxonomy, (c) exploit country/region specific social, economic, political, and religious knowledge, and (d) discover and predict potential terrorist activities and association links. Details of the asymmetric threat structure and the ATTACK system architecture are presented with results of an actual terrorist data mining and knowledge discovery test case shown.

  1. Stereotype Threat Reinterpreted as a Regulatory Mismatch

    PubMed Central

    Grimm, Lisa R.; Markman, Arthur B.; Maddox, W. Todd; Baldwin, Grant C.

    2008-01-01

    Research documents performance decrements resulting from the activation of a negative task-relevant stereotype. We combine a number of strands of work to identify causes of stereotype threat in a way that allows us to reverse the effects and improve the performance of individuals with negative task-relevant stereotypes. We draw on prior work suggesting that negative stereotypes induce a prevention focus, and other research suggesting that people exhibit greater flexibility when their regulatory focus matches the reward structure of the task. This work suggests that stereotype threat effects emerge from a prevention focus combined with tasks that have an explicit or implicit gains reward structure. We find flexible performance can be induced in individuals who have a negative task-relevant stereotype by using a losses reward structure. We demonstrate the interaction of stereotypes and the reward structure of the task using chronic stereotypes and GRE math problems (Experiment 1), and primed stereotypes and a category learning task (Experiments 2a and 2b). We discuss implications of this research for other work on stereotype threat. PMID:19159133

  2. Impact! - The Threat of Comets and Asteroids

    NASA Astrophysics Data System (ADS)

    Verschuur, Gerrit L.

    1997-12-01

    In Impact , Gerrit L. Verschuur offers an eye-opening look at the catastrophic collisions of comets and asteroids with our planet. Perhaps more important, he paints an unsettling portrait of the possibility of new collisions with earth, exploring potential threats to our planet and describing what scientists are doing right now to prepare for this frightening possibility. Every day something from space hits our planet, Verschuur reveals. In fact, about 10,000 tons of space debris fall to earth every year, mostly in meteoric form. But meteors are not the greatest threat to life on earth, the author points out. The major threats are asteroids and comets. The reader discovers that astronomers have located some 350 NEAs ("Near Earth Asteroids"), objects whose orbits cross the orbit of the earth. Comets, of course, are even more deadly. He discusses Comet Swift-Tuttle--"the most dangerous object in the solar system"--a comet far larger than the one that many scientists believe killed off the dinosaurs, due to pass through earth's orbit in the year 2126. In addition, the author describes the efforts of Spacewatch and other groups to locate NEAs, and evaluates the idea that comet and asteroid impacts have been an underrated factor in the evolution of life on earth. Whether discussing monumental tsunamis or the innumerable comets in the solar system, Impact will enthrall anyone curious about outer space, remarkable natural phenomenon, or the future of the planet earth.

  3. Introduction to Administrative Programs that Mitigate the Insider Threat

    SciTech Connect

    Gerke, Gretchen K.; Rogers, Erin; Landers, John; DeCastro, Kara

    2012-09-01

    This presentation begins with the reality of the insider threat, then elaborates on these tools to mitigate the insider threat: Human Reliability Program (HRP); Nuclear Security Culture (NSC) Program; Employee Assistance Program (EAP).

  4. Stereotype Threat and Feedback Seeking in the Workplace.

    ERIC Educational Resources Information Center

    Roberson, Loriann; Deitch, Elizabeth A.; Brief, Arthur P.; Block, Caryn J.

    2003-01-01

    Among 166 African American managers, those who were the only minority-group member in their workgroup perceived more stereotype threat. Stereotype threat was related to indirect feedback seeking and discounting of supervisors' performance feedback. (Contains 41 references.) (SK)

  5. Strength Modeling Report

    NASA Technical Reports Server (NTRS)

    Badler, N. I.; Lee, P.; Wong, S.

    1985-01-01

    Strength modeling is a complex and multi-dimensional issue. There are numerous parameters to the problem of characterizing human strength, most notably: (1) position and orientation of body joints; (2) isometric versus dynamic strength; (3) effector force versus joint torque; (4) instantaneous versus steady force; (5) active force versus reactive force; (6) presence or absence of gravity; (7) body somatotype and composition; (8) body (segment) masses; (9) muscle group envolvement; (10) muscle size; (11) fatigue; and (12) practice (training) or familiarity. In surveying the available literature on strength measurement and modeling an attempt was made to examine as many of these parameters as possible. The conclusions reached at this point toward the feasibility of implementing computationally reasonable human strength models. The assessment of accuracy of any model against a specific individual, however, will probably not be possible on any realistic scale. Taken statistically, strength modeling may be an effective tool for general questions of task feasibility and strength requirements.

  6. Culture, Threat, and Mental Illness Stigma: Identifying Culture-Specific Threat among Chinese-American Groups

    PubMed Central

    Purdie-Vaughns, Valerie; Kotabe, Hiroki; Link, Bruce G.; Saw, Anne; Wong, Gloria; Phelan, Jo C.

    2014-01-01

    We incorporate anthropological insights into a stigma framework to elucidate the role of culture in threat perception and stigma among Chinese groups. Prior work suggests that genetic contamination that jeopardizes the extension of one’s family lineage may comprise a culture-specific threat among Chinese groups. In Study 1, a national survey conducted from 2002–2003 assessed cultural differences in mental illness stigma and perceptions of threat in 56 Chinese-Americans and 589 European-Americans. Study 2 sought to empirically test this culture-specific threat of genetic contamination to lineage via a memory paradigm. Conducted from June to August 2010, 48 Chinese-American and 37 European-American university students in New York City read vignettes containing content referring to lineage or non-lineage concerns. Half the participants in each ethnic group were assigned to a condition in which the illness was likely to be inherited (genetic condition) and the rest read that the illness was unlikely to be inherited (non-genetic condition). Findings from Study 1 and 2 were convergent. In Study 1, culture-specific threat to lineage predicted cultural variation in stigma independently and after accounting for other forms of threat. In Study 2, Chinese-Americans in the genetic condition were more likely to accurately recall and recognize lineage content than the Chinese-Americans in the non-genetic condition, but that memorial pattern was not found for non-lineage content. The identification of this culture-specific threat among Chinese groups has direct implications for culturally-tailored anti-stigma interventions. Further, this framework might be implemented across other conditions and cultural groups to reduce stigma across cultures. PMID:23702210

  7. Weak-signal iterative holography.

    PubMed

    Watnik, Abbie T; Lebow, Paul S

    2015-04-01

    An iterative holographic table-top experiment is presented, where a recorded hologram is used to re-illuminate the initial target. With this beam shaping setup, more light is directed to the target for each iteration until a convergence limit is met. We experimentally examine convergence properties of this iterative hologram reconstruction approach for weak object signals and compare with theory. PMID:25967166

  8. Space Station crew safety alternatives study. Volume 2: Threat development

    NASA Technical Reports Server (NTRS)

    Raasch, R. F.; Peercy, R. L., Jr.; Rockoff, L. A.

    1985-01-01

    The first 15 years of accumulated space station concepts for initial operational capability (IOC) during the early 1990's were considered. Twenty-five threats to the space station are identified and selected threats addressed as impacting safety criteria, escape and rescue, and human factors safety concerns. Of the 25 threats identified, eight are discussed including strategy options for threat control: fire, biological or toxic contamination, injury/illness, explosion, loss of pressurization, radiation, meteoroid penetration, and debris.

  9. Soil threats in Europe for the RECARE project

    NASA Astrophysics Data System (ADS)

    Stolte, Jannes; Tesfai, Mehretaeb; Oygarden, Lillian

    2015-04-01

    Soil is one of our most important natural resources that provides us with vital goods and services to sustain life. Nevertheless, soils functions are threatened by a wide range of processes and a number of soil threats have been identified in Europe. Although there is a large body of knowledge available on soil threats in Europe, the complexity and functioning of soil systems and their interaction with human activities, climate change, and ecosystem services (ESS), is still not fully understood. An extensive literature review was carried out by a group of experts on soil threats at the European level. In total, around 60 experts from the 17 case study sites of the RECARE project, were involved in the process of reviewing and drafting the report and 11 soil threats were identified. The objective of WP2 of the RECARE project was to provide an improved overview of existing information on soil threats and degradation at the European scale. These soil threats are soil erosion by water, soil erosion by wind, decline of organic matter (OM) in peat, decline of OM in minerals soils, soil compaction, soil sealing, soil contamination, soil salinization, desertification, flooding and landslides and decline in soil biodiversity. The final report of WP2 provides a comprehensive thematic information on the major soil threats of Europe with due attention given to the Driving force-Pressure-State-Impact-Response to soil threats. Interrelationships between soil threats, between soil threats and soil functions and between soil threats and Ecosystems Services are made, and will be presented. A synergy between the soil threats is made based on the given information in each of the chapters, where we tried to identify the interactions between the threats. We tried to identify in what way one threat acts as a threat for another threat. Also, the link between soil degradation and Ecosystem Services are identified. Again, based on the information given in each chapter, the major climate, human and policy drivers are described.

  10. Testosterone biases the amygdala toward social threat approach.

    PubMed

    Radke, Sina; Volman, Inge; Mehta, Pranjal; van Son, Veerle; Enter, Dorien; Sanfey, Alan; Toni, Ivan; de Bruijn, Ellen R A; Roelofs, Karin

    2015-06-01

    Testosterone enhances amygdala reactions to social threat, but it remains unclear whether this neuroendocrine mechanism is relevant for understanding its dominance-enhancing properties; namely, whether testosterone biases the human amygdala toward threat approach. This pharmacological functional magnetic-resonance imaging study shows that testosterone administration increases amygdala responses in healthy women during threat approach and decreases it during threat avoidance. These findings support and extend motivational salience models by offering a neuroendocrine mechanism of motivation-specific amygdala tuning. PMID:26601187

  11. Linking terrestrial and marine conservation planning and threats analysis.

    PubMed

    Tallis, Heather; Ferdaña, Zach; Gray, Elizabeth

    2008-02-01

    The existence of the Gulf of Mexico dead zone makes it clear that marine ecosystems can be damaged by terrestrial inputs. Marine and terrestrial conservation planning need to be aligned in an explicit fashion to fully represent threats to marine systems. To integrate conservation planning for terrestrial and marine systems, we used a novel threats assessment that included 5 cross-system threats in a site-prioritization exercise for the Pacific Northwest coast ecoregion (U.S.A.). Cross-system threats are actions or features in one ecological realm that have effects on species in another realm. We considered bulkheads and other forms of shoreline hardening threats to terrestrial systems and roads, logging, agriculture, and urban areas threats to marine systems. We used 2 proxies of freshwater influence on marine environments, validated against a mechanistic model and field observations, to propagate land-based threats into marine sites. We evaluated the influence of cross-system threats on conservation priorities by comparing MARXAN outputs for 3 scenarios that identified terrestrial and marine priorities simultaneously: (1) no threats, (2) single-system threats, and (3) single- and cross-system threats. Including cross-system threats changed the threat landscape dramatically. As a result the best plan that included only single-system threats identified 323 sites (161,500 ha) at risk from cross-system threats. Including these threats changed the location of best sites. By comparing the best and sum solutions of the single- and cross-system scenarios, we identified areas ideal for preservation or restoration through integrated management. Our findings lend quantitative support to the call for explicitly integrated decision making and management action in terrestrial and marine ecosystems. PMID:18254857

  12. Motivation for aggressive religious radicalization: goal regulation theory and a personality × threat × affordance hypothesis

    PubMed Central

    McGregor, Ian; Hayes, Joseph; Prentice, Mike

    2015-01-01

    A new set of hypotheses is presented regarding the cause of aggressive religious radicalization (ARR). It is grounded in classic and contemporary theory of human motivation and goal regulation, together with recent empirical advances in personality, social, and neurophysiological psychology. We specify personality traits, threats, and group affordances that combine to divert normal motivational processes toward ARR. Conducive personality traits are oppositional, anxiety-prone, and identity-weak (i.e., morally bewildered). Conducive threats are those that arise from seemingly insurmountable external forces and frustrate effective goal regulation. Conducive affordances include opportunity for immediate and concrete engagement in active groups that are powered by conspiracy narratives, infused with cosmic significance, encouraging of moral violence, and sealed with religious unfalsifiability. We propose that ARR is rewarding because it can spur approach motivated states that mask vulnerability for people whose dispositions and circumstances would otherwise leave them mired in anxious distress. PMID:26441709

  13. Motivation for aggressive religious radicalization: goal regulation theory and a personality × threat × affordance hypothesis.

    PubMed

    McGregor, Ian; Hayes, Joseph; Prentice, Mike

    2015-01-01

    A new set of hypotheses is presented regarding the cause of aggressive religious radicalization (ARR). It is grounded in classic and contemporary theory of human motivation and goal regulation, together with recent empirical advances in personality, social, and neurophysiological psychology. We specify personality traits, threats, and group affordances that combine to divert normal motivational processes toward ARR. Conducive personality traits are oppositional, anxiety-prone, and identity-weak (i.e., morally bewildered). Conducive threats are those that arise from seemingly insurmountable external forces and frustrate effective goal regulation. Conducive affordances include opportunity for immediate and concrete engagement in active groups that are powered by conspiracy narratives, infused with cosmic significance, encouraging of moral violence, and sealed with religious unfalsifiability. We propose that ARR is rewarding because it can spur approach motivated states that mask vulnerability for people whose dispositions and circumstances would otherwise leave them mired in anxious distress. PMID:26441709

  14. Making Mountains of Morality From Molehills of Virtue: Threat Causes People to Overestimate Their Moral Credentials.

    PubMed

    Effron, Daniel A

    2014-05-01

    Seven studies demonstrate that threats to moral identity can increase how definitively people think they have previously proven their morality. When White participants were made to worry that their future behavior could seem racist, they overestimated how much a prior decision of theirs would convince an observer of their non-prejudiced character (Studies 1a-3). Ironically, such overestimation made participants appear more prejudiced to observers (Study 4). Studies 5 to 6 demonstrated a similar effect of threat in the domain of charitable giving-an effect driven by individuals for whom maintaining a moral identity is particularly important. Threatened participants only enhanced their beliefs that they had proven their morality when there was at least some supporting evidence, but these beliefs were insensitive to whether the evidence was weak or strong (Study 2). Discussion considers the role of motivated reasoning, and implications for ethical decision making and moral licensing. PMID:24793359

  15. Importance and challenges of measuring intrinsic foot muscle strength

    PubMed Central

    2012-01-01

    Background Intrinsic foot muscle weakness has been implicated in a range of foot deformities and disorders. However, to establish a relationship between intrinsic muscle weakness and foot pathology, an objective measure of intrinsic muscle strength is needed. The aim of this review was to provide an overview of the anatomy and role of intrinsic foot muscles, implications of intrinsic weakness and evaluate the different methods used to measure intrinsic foot muscle strength. Method Literature was sourced from database searches of MEDLINE, PubMed, SCOPUS, Cochrane Library, PEDro and CINAHL up to June 2012. Results There is no widely accepted method of measuring intrinsic foot muscle strength. Methods to estimate toe flexor muscle strength include the paper grip test, plantar pressure, toe dynamometry, and the intrinsic positive test. Hand-held dynamometry has excellent interrater and intrarater reliability and limits toe curling, which is an action hypothesised to activate extrinsic toe flexor muscles. However, it is unclear whether any method can actually isolate intrinsic muscle strength. Also most methods measure only toe flexor strength and other actions such as toe extension and abduction have not been adequately assessed. Indirect methods to investigate intrinsic muscle structure and performance include CT, ultrasonography, MRI, EMG, and muscle biopsy. Indirect methods often discriminate between intrinsic and extrinsic muscles, but lack the ability to measure muscle force. Conclusions There are many challenges to accurately measure intrinsic muscle strength in isolation. Most studies have measured toe flexor strength as a surrogate measure of intrinsic muscle strength. Hand-held dynamometry appears to be a promising method of estimating intrinsic muscle strength. However, the contribution of extrinsic muscles cannot be excluded from toe flexor strength measurement. Future research should clarify the relative contribution of intrinsic and extrinsic muscles during intrinsic foot muscle strength testing. PMID:23181771

  16. Student Reports of Peer Threats of Violence: Prevalence and Outcomes

    ERIC Educational Resources Information Center

    Nekvasil, Erin K.; Cornell, Dewey G.

    2012-01-01

    Authorities in education and law enforcement have recommended that schools use a threat-assessment approach to prevent violence, but there is relatively little research on characteristics and outcomes of threats among students. The current study examined student reports of threat experiences in a sample of 3,756 high school students. Approximately

  17. Isolating Neural Components of Threat Bias in Pediatric Anxiety

    ERIC Educational Resources Information Center

    Britton, Jennifer C.; Bar-Haim, Yair; Carver, Frederick W.; Holroyd, Tom; Norcross, Maxine A.; Detloff, Allison; Leibenluft, Ellen; Ernst, Monique; Pine, Daniel S.

    2012-01-01

    Background: Attention biases toward threat are often detected in individuals with anxiety disorders. Threat biases can be measured experimentally through dot-probe paradigms, in which individuals detect a probe following a stimulus pair including a threat. On these tasks, individuals with anxiety tend to detect probes that occur in a location…

  18. Student Reports of Peer Threats of Violence: Prevalence and Outcomes

    ERIC Educational Resources Information Center

    Nekvasil, Erin K.; Cornell, Dewey G.

    2012-01-01

    Authorities in education and law enforcement have recommended that schools use a threat-assessment approach to prevent violence, but there is relatively little research on characteristics and outcomes of threats among students. The current study examined student reports of threat experiences in a sample of 3,756 high school students. Approximately…

  19. Threats of Violence by Students in Special Education

    ERIC Educational Resources Information Center

    Kaplan, Sebastian G.; Cornell, Dewey G.

    2005-01-01

    We compared threats of violence made by K-12 students in special education (120 cases) or general education (136 cases) in schools that were implementing threat assessment guidelines for managing student threats of violence (Cornell, Sheras, Kaplan, McConville, Posey, Levy-Elkon, et al., 2004; Cornell & Sheras, in press). Students in special…

  20. Attention Training and the Threat Bias: An ERP Study

    ERIC Educational Resources Information Center

    O'Toole, Laura; Dennis, Tracy A.

    2012-01-01

    Anxiety is characterized by exaggerated attention to threat. Several studies suggest that this threat bias plays a causal role in the development and maintenance of anxiety disorders. Furthermore, although the threat bias can be reduced in anxious individuals and induced in non-anxious individual, the attentional mechanisms underlying these…

  1. Isolating Neural Components of Threat Bias in Pediatric Anxiety

    ERIC Educational Resources Information Center

    Britton, Jennifer C.; Bar-Haim, Yair; Carver, Frederick W.; Holroyd, Tom; Norcross, Maxine A.; Detloff, Allison; Leibenluft, Ellen; Ernst, Monique; Pine, Daniel S.

    2012-01-01

    Background: Attention biases toward threat are often detected in individuals with anxiety disorders. Threat biases can be measured experimentally through dot-probe paradigms, in which individuals detect a probe following a stimulus pair including a threat. On these tasks, individuals with anxiety tend to detect probes that occur in a location

  2. Unleashing Latent Ability: Implications of Stereotype Threat for College Admissions

    ERIC Educational Resources Information Center

    Logel, Christine R.; Walton, Gregory M.; Spencer, Steven J.; Peach, Jennifer; Mark, Zanna P.

    2012-01-01

    Social-psychological research conducted over the past 15 years provides compelling evidence that pervasive psychological threats are present in common academic environments--especially threats that originate in negative intellectual stereotypes--and that these threats undermine the real-world academic performance of non-Asian ethnic minority…

  3. Death Threat and Death Concerns in the College Student.

    ERIC Educational Resources Information Center

    Tobacyk, Jerome; Eckstein, Daniel

    1980-01-01

    Thanatology students reported significantly lesser death threat and significantly greater death concerns. Trait anxiety was found to be a significant predictor of change in death threat in the Thanatology Group, with lesser anxiety associated with greater decline in death threat. (Author)

  4. Gender, Stereotype Threat, and Anxiety: Psychophysiological and Cognitive Evidence

    ERIC Educational Resources Information Center

    Osborne, Jason W.

    2006-01-01

    Introduction: Claude Steele's stereotype threat hypothesis proposed that negative group stereotypes increase individual anxiety levels, hurting performance. However, the role of anxiety in stereotype threat has not been fully explored. This study examined the hypothesis that experimental manipulation of stereotype threat would influence real-time…

  5. Competing weak localization and weak antilocalization in ultrathin topological insulators.

    PubMed

    Lang, Murong; He, Liang; Kou, Xufeng; Upadhyaya, Pramey; Fan, Yabin; Chu, Hao; Jiang, Ying; Bardarson, Jens H; Jiang, Wanjun; Choi, Eun Sang; Wang, Yong; Yeh, Nai-Chang; Moore, Joel; Wang, Kang L

    2013-01-01

    We demonstrate evidence of a surface gap opening in topological insulator (TI) thin films of (Bi(0.57)Sb(0.43))(2)Te(3) below six quintuple layers through transport and scanning tunneling spectroscopy measurements. By effective tuning the Fermi level via gate-voltage control, we unveil a striking competition between weak localization and weak antilocalization at low magnetic fields in nonmagnetic ultrathin films, possibly owing to the change of the net Berry phase. Furthermore, when the Fermi level is swept into the surface gap of ultrathin samples, the overall unitary behaviors are revealed at higher magnetic fields, which are in contrast to the pure WAL signals obtained in thicker films. Our findings show an exotic phenomenon characterizing the gapped TI surface states and point to the future realization of quantum spin Hall effect and dissipationless TI-based applications. PMID:23198980

  6. The strong, weak and anomalous sides of weak topological insulators

    NASA Astrophysics Data System (ADS)

    Ringel, Zohar

    2013-03-01

    Disorder and topology can be thought of as two counter-driving forces. While the former pushes electron wave functions to localize in space, the latter requires them to remain coherent over the entire system. We study the interplay between these two on the surface of a ``weakly'' topological phase- the Weak Topological Insulator. Using arguments based on flux-insertions and locality, we show that such surfaces cannot undergo a localization transition even when the surface is strongly disordered. We also present a numerical study which further quantifies this result. We then reformulate the same notions, in field theory language, using a novel Z2-charge-anomaly. This anomaly generalizes the Z-charge-anomaly associated with edges of the Integer Quantum Hall Effect. Besides unifying various aspects of Topological Insulators, the anomaly allows us to calculate new topological properties of TIs in the presence of electric fields.

  7. Role of orbital dynamics in spin relaxation and weak antilocalization in quantum dots.

    PubMed

    Zaitsev, Oleg; Frustaglia, Diego; Richter, Klaus

    2005-01-21

    We develop a semiclassical theory for spin-dependent quantum transport to describe weak (anti)localization in quantum dots with spin-orbit coupling. This allows us to distinguish different types of spin relaxation in systems with chaotic, regular, and diffusive orbital classical dynamics. We find, in particular, that for typical Rashba spin-orbit coupling strengths, integrable ballistic systems can exhibit weak localization, while corresponding chaotic systems show weak antilocalization. We further calculate the magnetoconductance and analyze how the weak antilocalization is suppressed with decreasing quantum dot size and increasing additional in-plane magnetic field. PMID:15698215

  8. Assessing the threat of firearms: new threat formula, resources, and ontological linking algorithms

    NASA Astrophysics Data System (ADS)

    Hempelmann, Christian F.; Arslan, Abdullah N.; Attardo, Salvatore; Blount, Grady P.; Sirakov, Nikolay Metodiev

    2014-06-01

    The present work is part of an ongoing larger project.2, 3, 11, 12 The goal of this project is to develop a system capable of automatic threat assessment for instances of firearms use in public places. The main components of the system are: an ontology of firearms;1, 14 algorithms to create the visual footprint of the firearms,1, 14 to compare visual information,2, 3, 11, 12 to facilitate search in the ontology, and to generate the links between the conceptual and visual ontologies; as well as a formula to calculate the threat of individual firearms, firearms classes, and ammunition types in different environments. One part of the dual-level ontology for the properties of the firearms captures key visual features used to identify their type or class in images, while the other part captures their threat-relevant conceptual properties. The visual ontology is the result of image segmentation and matching methods, while the conceptual ontology is designed using knowledge-engineering principles and populated semi-automatically from Web resources. The focus of the present paper is two-fold. On the one hand, we will report on an update of the initial threat formula, based on the substantially increased population of the firearm ontology, including ammunition types and comparisons to actual incidents, and allowing for an overall more accurate assessment. On the other hand, the linking algorithms between the visual and conceptual ontologies are elaborated for faster transfer of information leading to an improvement in accuracy of the threat assessment.

  9. Social Identity Threat Motivates Science-Discrediting Online Comments

    PubMed Central

    Nauroth, Peter; Gollwitzer, Mario; Bender, Jens; Rothmund, Tobias

    2015-01-01

    Experiencing social identity threat from scientific findings can lead people to cognitively devalue the respective findings. Three studies examined whether potentially threatening scientific findings motivate group members to take action against the respective findings by publicly discrediting them on the Web. Results show that strongly (vs. weakly) identified group members (i.e., people who identified as “gamers”) were particularly likely to discredit social identity threatening findings publicly (i.e., studies that found an effect of playing violent video games on aggression). A content analytical evaluation of online comments revealed that social identification specifically predicted critiques of the methodology employed in potentially threatening, but not in non-threatening research (Study 2). Furthermore, when participants were collectively (vs. self-) affirmed, identification did no longer predict discrediting posting behavior (Study 3). These findings contribute to the understanding of the formation of online collective action and add to the burgeoning literature on the question why certain scientific findings sometimes face a broad public opposition. PMID:25646725

  10. Social identity threat motivates science-discrediting online comments.

    PubMed

    Nauroth, Peter; Gollwitzer, Mario; Bender, Jens; Rothmund, Tobias

    2015-01-01

    Experiencing social identity threat from scientific findings can lead people to cognitively devalue the respective findings. Three studies examined whether potentially threatening scientific findings motivate group members to take action against the respective findings by publicly discrediting them on the Web. Results show that strongly (vs. weakly) identified group members (i.e., people who identified as "gamers") were particularly likely to discredit social identity threatening findings publicly (i.e., studies that found an effect of playing violent video games on aggression). A content analytical evaluation of online comments revealed that social identification specifically predicted critiques of the methodology employed in potentially threatening, but not in non-threatening research (Study 2). Furthermore, when participants were collectively (vs. self-) affirmed, identification did no longer predict discrediting posting behavior (Study 3). These findings contribute to the understanding of the formation of online collective action and add to the burgeoning literature on the question why certain scientific findings sometimes face a broad public opposition. PMID:25646725

  11. SUSTAINED PREFERENTIAL PROCESSING OF SOCIAL THREAT CUES BIAS WITHOUT COMPETITION ?

    PubMed Central

    Wieser, Matthias J.; McTeague, Lisa M.; Keil, Andreas

    2013-01-01

    Stimuli of high emotional significance such as social threat cues are preferentially processed in the human brain. However, there is an ongoing debate, whether or not these stimuli capture attention automatically and weaken the processing of concurrent stimuli in the visual field. This study examined continuous fluctuations of electrocortical facilitation during competition of two spatially separated facial expressions in high and low socially anxious individuals. Two facial expressions were flickered for 3000 ms at different frequencies (14 Hz and 17.5 Hz) to separate the electrocortical signals evoked by the competing stimuli (frequency-tagging). Angry faces compared to happy and neutral expressions were associated with greater electrocortical facilitation over visual areas only in the high socially anxious individuals. This finding was independent of the respective competing stimulus. Heightened electrocortical engagement in socially anxious participants was present in the first second of stimulus viewing, and was sustained for the entire presentation period. These results, based on a continuous measure of attentional resource allocation, support the view that stimuli of high personal significance are associated with early and sustained prioritized sensory processing. These cues, however, do not interfere with the electrocortical processing of a spatially separated concurrent face, suggesting that they are effective at capturing attention, but are weak competitors for resources. PMID:20807057

  12. Studies of fiber-matrix adhesion on compression strength

    NASA Technical Reports Server (NTRS)

    Bascom, Willard D.; Nairn, John A.; Boll, D. J.

    1991-01-01

    A study was initiated on the effect of the matrix polymer and the fiber matrix bond strength of carbon fiber polymer matrix composites. The work includes tests with micro-composites, single ply composites, laminates, and multi-axial loaded cylinders. The results obtained thus far indicate that weak fiber-matrix adhesion dramatically reduces 0 degree compression strength. Evidence is also presented that the flaws in the carbon fiber that govern compression strength differ from those that determine fiber tensile strength. Examination of post-failure damage in the single ply tests indicates kink banding at the crack tip.

  13. PROTOSTELLAR DISK FORMATION ENABLED BY WEAK, MISALIGNED MAGNETIC FIELDS

    SciTech Connect

    Krumholz, Mark R.; Crutcher, Richard M.; Hull, Charles L. H.

    2013-04-10

    The gas from which stars form is magnetized, and strong magnetic fields can efficiently transport angular momentum. Most theoretical models of this phenomenon find that it should prevent formation of large (>100 AU), rotationally supported disks around most protostars, even when non-ideal magnetohydrodynamic (MHD) effects that allow the field and gas to decouple are taken into account. Using recent observations of magnetic field strengths and orientations in protostellar cores, we show that this conclusion is incorrect. The distribution of magnetic field strengths is very broad, and alignments between fields and angular momentum vectors within protostellar cores are essentially random. By combining the field strength and misalignment data with MHD simulations showing that disk formation is expected for both weak and misaligned fields, we show that these observations imply that we should expect disk fractions of {approx}10%-50% even when protostars are still deeply embedded in their parent cores, and even if the gas is governed by ideal MHD.

  14. Threat in Context: School Moderation of the Impact of Social Identity Threat on Racial/Ethnic Achievement Gaps

    ERIC Educational Resources Information Center

    Hanselman, Paul; Bruch, Sarah K.; Gamoran, Adam; Borman, Geoffrey D.

    2014-01-01

    Schools with very few and relatively low-performing marginalized students may be most likely to trigger social identity threats (including stereotype threats) that contribute to racial disparities. We test this hypothesis by assessing variation in the benefits of a self-affirmation intervention designed to counteract social identity threat in a…

  15. Threat in Context: School Moderation of the Impact of Social Identity Threat on Racial/Ethnic Achievement Gaps

    ERIC Educational Resources Information Center

    Hanselman, Paul; Bruch, Sarah K.; Gamoran, Adam; Borman, Geoffrey D.

    2014-01-01

    Schools with very few and relatively low-performing marginalized students may be most likely to trigger social identity threats (including stereotype threats) that contribute to racial disparities. We test this hypothesis by assessing variation in the benefits of a self-affirmation intervention designed to counteract social identity threat in a

  16. Cooperative Threat Reduction: Cooperation Threat Reduction Program Liquid Propellant Disposition Project

    NASA Astrophysics Data System (ADS)

    2002-09-01

    This audit is one in a series of audits the Deputy Secretary of Defense requested. As part of the Cooperative Threat Reduction (CTR) Program, DoD agreed to assist the Russian Federation in disposing of its liquid rocket propellant. Public Law 102-228 (section 2551 NOTE, title 22, United States Code), the Soviet Nuclear Threat Reduction Act of 1991 designates DoD as the executive agent for the CTR Program. Specific objectives of the act are to destroy chemical, nuclear, and other weapons; transport, store, disable, and safeguard weapons in connection with their destruction; and establish verifiable safeguards against proliferation of weapons of mass destruction. The Office of the Assistant Secretary of Defense (International Security Policy), under the Office of the Under Secretary of Defense for Policy, develops, coordinates, and oversees implementation of policy for the CTR Program. The CTR Directorate, Defense Threat Reduction Agency operates the program.

  17. Weak values and weak coupling maximizing the output of weak measurements

    SciTech Connect

    Di Lorenzo, Antonio

    2014-06-15

    In a weak measurement, the average output 〈o〉 of a probe that measures an observable A{sup -hat} of a quantum system undergoing both a preparation in a state ρ{sub i} and a postselection in a state E{sub f} is, to a good approximation, a function of the weak value A{sub w}=Tr[E{sub f}A{sup -hat} ρ{sub i}]/Tr[E{sub f}ρ{sub i}], a complex number. For a fixed coupling λ, when the overlap Tr[E{sub f}ρ{sub i}] is very small, A{sub w} diverges, but 〈o〉 stays finite, often tending to zero for symmetry reasons. This paper answers the questions: what is the weak value that maximizes the output for a fixed coupling? What is the coupling that maximizes the output for a fixed weak value? We derive equations for the optimal values of A{sub w} and λ, and provide the solutions. The results are independent of the dimensionality of the system, and they apply to a probe having a Hilbert space of arbitrary dimension. Using the Schrödinger–Robertson uncertainty relation, we demonstrate that, in an important case, the amplification 〈o〉 cannot exceed the initial uncertainty σ{sub o} in the observable o{sup -hat}, we provide an upper limit for the more general case, and a strategy to obtain 〈o〉≫σ{sub o}. - Highlights: •We have provided a general framework to find the extremal values of a weak measurement. •We have derived the location of the extremal values in terms of preparation and postselection. •We have devised a maximization strategy going beyond the limit of the Schrödinger–Robertson relation.

  18. Alumina fiber strength improvement

    NASA Technical Reports Server (NTRS)

    Pepper, R. T.; Nelson, D. C.

    1982-01-01

    The effective fiber strength of alumina fibers in an aluminum composite was increased to 173,000 psi. A high temperature heat treatment, combined with a glassy carbon surface coating, was used to prevent degradation and improve fiber tensile strength. Attempts to achieve chemical strengthening of the alumina fiber by chromium oxide and boron oxide coatings proved unsuccessful. A major problem encountered on the program was the low and inconsistent strength of the Dupont Fiber FP used for the investigation.

  19. Tomography and weak lensing statistics

    SciTech Connect

    Munshi, Dipak; Coles, Peter; Kilbinger, Martin E-mail: peter.coles@astro.cf.ac.uk

    2014-04-01

    We provide generic predictions for the lower order cumulants of weak lensing maps, and their correlators for tomographic bins as well as in three dimensions (3D). Using small-angle approximation, we derive the corresponding one- and two-point probability distribution function for the tomographic maps from different bins and for 3D convergence maps. The modelling of weak lensing statistics is obtained by adopting a detailed prescription for the underlying density contrast that involves hierarchal ansatz and lognormal distribution. We study the dependence of our results on cosmological parameters and source distributions corresponding to the realistic surveys such as LSST and DES. We briefly outline how photometric redshift information can be incorporated in our results. We also show how topological properties of convergence maps can be quantified using our results.

  20. The threat of nuclear war: Some responses

    PubMed Central

    Marcattilio, A. J. M.; Nevin, John A.

    1986-01-01

    The possibility of nuclear holocaust threatens the very existence of the world community. Biologists, earth scientists, educators, lawyers, philosophers, physicists, physicians, and social scientists have addressed the problem from their special perspectives, and have had substantial impact on the public. Behavior analysts, however, have not as a whole contributed a great deal to the goal of preventing nuclear catastrophe. We argue that the threat of nuclear war is primarily a behavioral problem, and present an analysis of that problem. In addition, we address the difficulty of implementing behavioral interventions that would contribute to the survival of the World. PMID:22478648

  1. MCNPX Improvements for Threat Reduction Applications

    SciTech Connect

    Waters, Laurie S.; Durkee, Joe W.; Elson, Jay S.; Esch, Ernst I.; Fensin, Michael L.; Hendricks, John S.; Holloway, Shannon T.; James, Michael R.; Jason, Andrew; Johns, Russell C.; Johnson, M. William; Kawano, Toshihiko; McKinney, Gregg W.; Moller, Peter; Pelowitz, Denise B.

    2009-03-10

    Enhancements contained in the current MCNPX 2.6.0 Radiation Safety Information Computational Center (RSICC) release will be presented, including stopped-muon physics, delayed neutron and photon generation, and automatic generation of source photons. Preliminary benchmarking comparisons with data taken with a muon beam at the Paul Scherrer Institute Spallation Neutron Source accelerator will be discussed. We will also describe current improvements now underway, including Nuclear Resonance Fluorescence (NRF), pulsed sources, and others. We will also describe very new work begun on a threat-reduction (TR) user interface, designed to simplify the setup of TR-related calculations, and introduce standards into geometry, sources and backgrounds.

  2. Threats and opportunities of plant pathogenic bacteria.

    PubMed

    Tarkowski, Petr; Vereecke, Danny

    2014-01-01

    Plant pathogenic bacteria can have devastating effects on plant productivity and yield. Nevertheless, because these often soil-dwelling bacteria have evolved to interact with eukaryotes, they generally exhibit a strong adaptivity, a versatile metabolism, and ingenious mechanisms tailored to modify the development of their hosts. Consequently, besides being a threat for agricultural practices, phytopathogens may also represent opportunities for plant production or be useful for specific biotechnological applications. Here, we illustrate this idea by reviewing the pathogenic strategies and the (potential) uses of five very different (hemi)biotrophic plant pathogenic bacteria: Agrobacterium tumefaciens, A. rhizogenes, Rhodococcus fascians, scab-inducing Streptomyces spp., and Pseudomonas syringae. PMID:24216222

  3. Cutaneous leishmaniasis: an increasing threat for travellers.

    PubMed

    Antinori, S; Gianelli, E; Calattini, S; Longhi, E; Gramiccia, M; Corbellino, M

    2005-05-01

    Analysis of the literature on cutaneous leishmaniasis in low-prevalence countries suggests an increase in imported cases that is attributable to the growing phenomenon of international tourism, migration and military operations in highly endemic regions. Cases of imported cutaneous leishmaniasis are often missed initially, but diagnosis can be made non-invasively by PCR using skin scrapings of lesions as starting material. Cutaneous leishmaniasis is an emerging threat for travellers and should be considered in all patients presenting with slow-to-heal ulcers. PMID:15819858

  4. Lyssaviruses and Bats: Emergence and Zoonotic Threat

    PubMed Central

    Banyard, Ashley C.; Evans, Jennifer S.; Luo, Ting Rong; Fooks, Anthony R.

    2014-01-01

    The continued detection of zoonotic viral infections in bats has led to the microbial fauna of these mammals being studied at a greater level than ever before. Whilst numerous pathogens have been discovered in bat species, infection with lyssaviruses is of particular significance from a zoonotic perspective as, where human infection has been reported, it is invariably fatal. Here we review the detection of lyssaviruses within different bat species and overview what is understood regarding their maintenance and transmission following both experimental and natural infection. We discuss the relevance of these pathogens as zoonotic agents and the threat of newly discovered viruses to human populations. PMID:25093425

  5. Using SWOT Analysis for Promoting the Accounting Program.

    ERIC Educational Resources Information Center

    Sawyer, Joe E.

    2001-01-01

    Describes how SWOT (strengths, weaknesses, opportunities, threats) analysis can be used by business educators to find the best match between environmental trends (opportunities and threats) and internal departmental capabilities (strengths and weaknesses). An example from accounting education is provided. (JOW)

  6. Stereotype threat can reduce older adults' memory errors

    PubMed Central

    Barber, Sarah J.; Mather, Mara

    2014-01-01

    Stereotype threat often incurs the cost of reducing the amount of information that older adults accurately recall. In the current research we tested whether stereotype threat can also benefit memory. According to the regulatory focus account of stereotype threat, threat induces a prevention focus in which people become concerned with avoiding errors of commission and are sensitive to the presence or absence of losses within their environment (Seibt & Förster, 2004). Because of this, we predicted that stereotype threat might reduce older adults' memory errors. Results were consistent with this prediction. Older adults under stereotype threat had lower intrusion rates during free-recall tests (Experiments 1 & 2). They also reduced their false alarms and adopted more conservative response criteria during a recognition test (Experiment 2). Thus, stereotype threat can decrease older adults' false memories, albeit at the cost of fewer veridical memories, as well. PMID:24131297

  7. Post-quantum attacks on key distribution schemes in the presence of weakly stochastic sources

    NASA Astrophysics Data System (ADS)

    Al–Safi, S. W.; Wilmott, C. M.

    2015-09-01

    It has been established that the security of quantum key distribution protocols can be severely compromised were one to permit an eavesdropper to possess a very limited knowledge of the random sources used between the communicating parties. While such knowledge should always be expected in realistic experimental conditions, the result itself opened a new line of research to fully account for real-world weak randomness threats to quantum cryptography. Here we expand of this novel idea by describing a key distribution scheme that is provably secure against general attacks by a post-quantum adversary. We then discuss possible security consequences for such schemes under the assumption of weak randomness.

  8. A concise colorimetric and fluorimetric probe for sarin related threats designed via the "covalent-assembly" approach.

    PubMed

    Lei, Zuhai; Yang, Youjun

    2014-05-01

    A turn-on signal from zero background allows sensitive detection of a weak signal and is highly desired. The "covalent-assembly" probe design principle is powerful in this regard. Herein, we report an embodiment of this principle (NA570) for detection of Sarin related threats, based on a phenylogous Vilsmeier-Haack reaction. NA570 bears a concise molecular construct, exhibits a colorimetric and a fluorimetric signal, and has potential for real applications. PMID:24766398

  9. Passive acoustic threat detection in estuarine environments

    NASA Astrophysics Data System (ADS)

    Borowski, Brian; Sutin, Alexander; Roh, Heui-Seol; Bunin, Barry

    2008-04-01

    The Maritime Security Laboratory (MSL) at Stevens Institute of Technology supports research in a range of areas relevant to harbor security, including passive acoustic detection of underwater threats. The difficulties in using passive detection in an urban estuarine environment include intensive and highly irregular ambient noise and the complexity of sound propagation in shallow water. MSL conducted a set of tests in the Hudson River near Manhattan in order to measure the main parameters defining the detection distance of a threat: source level of a scuba diver, transmission loss of acoustic signals, and ambient noise. The source level of the diver was measured by comparing the diver's sound with a reference signal from a calibrated emitter placed on his path. Transmission loss was measured by comparing noise levels of passing ships at various points along their routes, where their distance from the hydrophone was calculated with the help of cameras and custom software. The ambient noise in the Hudson River was recorded under varying environmental conditions and amounts of water traffic. The passive sonar equation was then applied to estimate the range of detection. Estimations were done for a subset of the recorded noise levels, and we demonstrated how variations in the noise level, attenuation, and the diver's source level influence the effective range of detection. Finally, we provided analytic estimates of how an array improves upon the detection distance calculated by a single hydrophone.

  10. Initial perspectives on process threat management.

    PubMed

    Whiteley, James R Rob; Mannan, M Sam

    2004-11-11

    Terrorist and criminal acts are now considered credible risks in the process industries. Deliberate attacks on the nation's petroleum refineries and chemical plants would pose a significant threat to public welfare, national security, and the US economy. To-date, the primary response of government and industry has been on improved security to prevent attacks and the associated consequences. While prevention is clearly preferred, the potential for successful attacks must be addressed. If plant security is breached, the extent of the inflicted damage is determined by the available plant safety systems and procedures. We refer to this "inside the gate" response as process threat management. The authors have initiated a joint industry/academia study to address: the level of safety provided by existing plant equipment and safety systems in response to a terrorist act, and identification of process (rather than security) needs or opportunities to address this new safety concern. This paper describes the initial perspectives and issues identified by the team at the beginning of the study. PMID:15518979

  11. Prefrontal control of attention to threat.

    PubMed

    Peers, Polly V; Simons, Jon S; Lawrence, Andrew D

    2013-01-01

    Attentional control refers to the regulatory processes that ensure that our actions are in accordance with our goals. Dual-system accounts view temperament as consisting of both individual variation in emotionality (e.g., trait anxiety) and variation in regulatory attentional mechanisms that act to modulate emotionality. Increasing evidence links trait variation in attentional control to clinical mood and anxiety disorder symptoms, independent of trait emotionality. Attentional biases to threat have been robustly linked to mood and anxiety disorders. However, the role of variation in attentional control in influencing such biases, and the neural underpinnings of trait variation in attentional control, are unknown. Here, we show that individual differences in trait attentional control, even when accounting for trait and state anxiety, are related to the magnitude of an attentional blink (AB) following threat-related targets. Moreover, we demonstrate that activity in dorso-lateral prefrontal cortex (DLPFC), is observed specifically in relation to control of attention over threatening stimuli, in line with neural theories of attentional control, such as guided activation theory. These results have key implications for neurocognitive theories of attentional bias and emotional resilience. PMID:23386824

  12. Deterring regional threats from nuclear proliferation

    SciTech Connect

    Spector, L.S.

    1992-03-12

    The most prominent shift in the National Military Strategy is from the global Soviet threat to a new focus on regional contingencies. No threat looms larger in these contingencies than the proliferation of nuclear weapons and ballistic missiles. This study examines proliferation trends and proposes a predominately diplomatic strategy for containing the problem. Dr. Spector identifies three waves of proliferation: the first is the five states with declared weapons and doctrine-the United States, Russia, Great Britain, France, and China; the second includes a less visible group that developed a covert capability, without testing weapons or declaring a doctrine of deterrence-for example, Israel, India, and probably Pakistan; and, a third wave of would-be proliferators includes radical states like Iraq, Iran, Libya, and North Korea. Spector's political approach is based on the common interest of wave one and two states to prevent further proliferation. Political-economic incentives have already worked in the cases of Brazil, Argentina, Taiwan, and South Africa-states which appear to have abandoned their nuclear weapons programs. Spector does not rule out the option of military force. Force, especially under international sanctions, can be a powerful tool to back diplomatic efforts. Use of force, however, remains a last resort.

  13. Pandemic Influenza Threat and Preparedness 1

    PubMed Central

    2006-01-01

    The threat of a human influenza pandemic has greatly increased over the past several years with the emergence of highly virulent avian influenza viruses, notably H5N1 viruses, which have infected humans in several Asian and European countries. Previous influenza pandemics have arrived with little or no warning, but the current widespread circulation of H5N1 viruses among avian populations and their potential for increased transmission to humans and other mammalian species may afford us an unprecedented opportunity to prepare for the next pandemic threat. The US Department of Health and Human Services is coordinating a national strategy to respond to an influenza pandemic that involves multiple agencies, including the Centers for Disease Control and Prevention, the Food and Drug Administration, and the National Institutes of Health (NIH). Within NIH, the National Institute of Allergy and Infectious Diseases (NIAID) conducts basic and clinical research to develop new vaccine technologies and antiviral drugs against influenza viruses. We describe recent research progress in preparing for pandemic influenza. PMID:16494721

  14. Unattended sensors for nuclear threat detection

    SciTech Connect

    Runkle, Robert C.; Myjak, Mitchell J.; Batdorf, Michael T.; Bowler, Ryan S.; Kiff, Scott D.; Morris, Scott J.; Mullen, Crystal A.; Rohrer, John S.; Todd, Lindsay C.

    2008-06-30

    This paper discusses the ongoing development of a compact, unattended, and low-power radiation detection system designed for deployment to the front lines of nuclear proliferation. Current countermeasure deployments aim to detect nuclear threats by screening cargo containers abroad or at ports of entry, but the defensive nature of these systems means that they face the immense challenge of detecting intentionally-concealed materials. A complementary strategy places countermeasures closer to the source of nuclear proliferation, but deployments to these regions often must operate autonomously and in the absence of infrastructure. This application motivates our development of a low-power system capable of detecting gamma-ray and neutron emissions while operating autonomously for extended periods of time. Many challenges are present when developing radiation-detection systems for this application, and this paper describes work focused on two of them: the development of compact, low-power electronics for gamma-ray-spectrometer and 3He- tube signal processing, and analysis algorithms capable of distinguishing threats from benign sources in mid-resolution gamma-ray spectrometers. We discuss our development efforts on these fronts and present results based on implementation in a proof-of-principle system comprised of two 5 cm x 10 cm x 41 cm NaI(Tl) crystals and eight 40-cm 3He tubes.

  15. In Brief: Threats to species continue

    NASA Astrophysics Data System (ADS)

    Showstack, Randy

    2009-11-01

    Of 47,677 assessed species, 17,291 are threatened with extinction, according to the latest update of the Red List of Threatened Species issued by the International Union for Conservation of Nature (IUCN) on 3 November. The list indicates that amphibians are the most threatened group of species known to date, with 1895 (nearly 30%) of 6285 amphibians in danger of extinction. Thirty-nine are already extinct or extinct in the wild, 484 are critically endangered, 754 are endangered, and 657 are vulnerable, according to IUCN. Under threat are 21% of mammals, 30% of amphibians, 12% of birds, 28% of reptiles, 37% of freshwater fishes, 70% of plants, and 35% of invertebrates assessed to date. “We have only managed to assess 47,663 species so far; there are many more millions out there which could be under serious threat,” according to IUCN Red List Unit Manager Craig Hilton-Taylor. For more information, visit http://www.iucnredlist.org.

  16. Identifying chemicals that are planetary boundary threats.

    PubMed

    MacLeod, Matthew; Breitholtz, Magnus; Cousins, Ian T; de Wit, Cynthia A; Persson, Linn M; Rudén, Christina; McLachlan, Michael S

    2014-10-01

    Rockström et al. proposed a set of planetary boundaries that delimit a "safe operating space for humanity". Many of the planetary boundaries that have so far been identified are determined by chemical agents. Other chemical pollution-related planetary boundaries likely exist, but are currently unknown. A chemical poses an unknown planetary boundary threat if it simultaneously fulfills three conditions: (1) it has an unknown disruptive effect on a vital Earth system process; (2) the disruptive effect is not discovered until it is a problem at the global scale, and (3) the effect is not readily reversible. In this paper, we outline scenarios in which chemicals could fulfill each of the three conditions, then use the scenarios as the basis to define chemical profiles that fit each scenario. The chemical profiles are defined in terms of the nature of the effect of the chemical and the nature of exposure of the environment to the chemical. Prioritization of chemicals in commerce against some of the profiles appears feasible, but there are considerable uncertainties and scientific challenges that must be addressed. Most challenging is prioritizing chemicals for their potential to have a currently unknown effect on a vital Earth system process. We conclude that the most effective strategy currently available to identify chemicals that are planetary boundary threats is prioritization against profiles defined in terms of environmental exposure combined with monitoring and study of the biogeochemical processes that underlie vital Earth system processes to identify currently unknown disruptive effects. PMID:25181298

  17. High strength, superplastic superalloy

    NASA Technical Reports Server (NTRS)

    Ashbrook, R. L.; Freche, J. C.; Waters, W. J.

    1969-01-01

    High strength superplastic superalloys are produced by extruding a pre-alloyed powder. The cast nickel base superalloy was remelted and converted to pre-alloyed powder by inert gas atomization. The superalloy shows high tensile strength and superplasticity and finds use in hot working and casting.

  18. Recognizing Neglected Strengths

    ERIC Educational Resources Information Center

    Sternberg, Robert J.

    2006-01-01

    To identify diverse student strengths and to learn how teachers can build instruction on those strengths, the author and his colleagues have conducted multiple studies among students in Alaska, the mainland United States, Kenya, and other countries. In a series of studies in Alaska and Kenya, the researchers measured the adaptive cultural…

  19. A Lesson Not to Be Learned? Understanding Stereotype Threat Does Not Protect Women from Stereotype Threat

    ERIC Educational Resources Information Center

    Tomasetto, Carlo; Appoloni, Sara

    2013-01-01

    This research examines whether reading a text presenting scientific evidence concerning the phenomenon of stereotype threat improves or disrupts women's performance in a subsequent math task. In two experimental conditions participants (N=118 ) read a text summarizing an experiment in which stereotypes, and not biological differences, were shown…

  20. Weak Faults, Yet Strong Middle Crust

    NASA Astrophysics Data System (ADS)

    Platt, J. P.; Behr, W. M.

    2013-12-01

    A global compilation of stress magnitude from mylonites developed along major fault zones suggests that maximum differential stresses between 140 and 200 MPa are reached at temperatures between 300 and 350°C on normal, thrust, and strike-slip faults. These differential stresses are consistent with brittle rock strengths estimated based on Coulomb fracture (e.g., Byerlee's law), and with in-situ measurements of crustal stress measured in boreholes. This confirms previous suggestions that many parts of the continental crust are stressed close to failure down to the brittle-ductile transition. Many major active faults in all tectonic regimes are considered to be relatively weak, however, based on various lines of evidence, including their unfavorable orientation with respect to regional stresses, the absence of heat flow anomalies, the mechanical properties of fault gouge, and evidence for high fluid pressures along subduction zone megathrusts. Peak differential stresses estimated by a variety of techniques lie mostly in the range 1 - 20 MPa. The sharp contrast between differential stresses estimated on the seismogenic parts of major faults and those estimated from ductile rocks immediately below the brittle-ductile transition has the following implications: 1. The lower limit of seismicity in major fault zones is not controlled by the intersection of brittle fracture laws such as Byerlee's law with ductile creep laws. Rather, it represents an abrupt downward termination, probably controlled by temperature, of the weakening processes that govern fault behavior in the upper crust. 2. The seismogenic parts of major fault zones contribute little to lithospheric strength, and are unlikely to have much influence on either the slip rate or the location of the faults. Conversely, the high strength segments of ductile shear zones immediately below the brittle-ductile transition constitute a major load-bearing element within the lithosphere. Displacement rates are governed by the width and rheology of these high-stress ductile shear zones, and the processes by which they form are likely to influence fault initiation and hence location.

  1. When threat to society becomes a threat to oneself: implications for right-wing attitudes and ethnic prejudice.

    PubMed

    Onraet, Emma; Van Hiel, Alain

    2013-01-01

    The relationships between threat on one hand and right-wing attitudes and ethnic prejudice on the other were investigated in a heterogeneous sample (N = 588). Specifically, we considered the perception of economic and terroristic threats in terms of their consequences at the societal and personal levels. Previous studies revealed that societal consequences of threat, rather than personal consequences, are related to right-wing attitudes. However, the present results challenge these findings. More specifically, three important results emerged. First, items probing the distinct threat levels loaded on separate dimensions for economic and terroristic threat, validating the distinction between societal and personal threat consequences. Second, consistent with previous research, this study revealed that perceived societal consequences of threat yield strong and robust relationships with all target variables. However, personal consequences of threat were also associated with higher levels of right-wing authoritarianism (RWA), social dominance orientation (SDO), and ethnic prejudice in particular. Third, societal and personal consequences of threat interacted in explaining the target variables. More specifically, feeling personally threatened by terrorism was only related to higher levels of RWA in the presence of low levels of threat to society, whereas experiencing personal economic threat was only related to higher levels of SDO and ethnic prejudice when high societal economic threat was experienced. In sum, although the perception of societal consequences of threat plays a prominent role in explaining right-wing attitudes and ethnic prejudice, the perception of being personally affected by threat is also associated with higher levels of RWA and SDO, and especially ethnic prejudice. PMID:23390970

  2. Strengths of serpentinite gouges at elevated temperatures

    USGS Publications Warehouse

    Moore, Diane E.; Lockner, D.A.; Ma, S.; Summers, R.; Byerlee, J.D.

    1997-01-01

    Serpentinite has been proposed as a cause of both low strength and aseismic creep of fault zones. To test these hypotheses, we have measured the strength of chrysotile-, lizardite-, and antigorite-rich serpentinite gouges under hydrothermal conditions, with emphasis on chrysotile, which has thus far received little attention. At 25??C, the coefficient of friction, ??, of chrysotile gouge is roughly 0.2, whereas the lizardite- and antigorite-rich gouges are at least twice as strong. The very low room temperature strength of chrysotile is a consequence of its unusually high adsorbed water content. When the adsorbed water is removed, chrysotile is as strong as pure antigorite gouge at room temperature. Heating to ???200??C causes the frictional strengths of all three gouges to increase. Limited data suggest that different polytypes of a given serpentine mineral have similar strengths; thus deformation-induced changes in polytype should not affect fault strength. At 25??C, the chrysotile gouge has a transition from velocity strengthening at low velocities to velocity weakening at high velocities, consistent with previous studies. At temperatures up to ???200??C, however, chrysotile strength is essentially independent of velocity at low velocities. Overall, chrysotile has a restricted range of velocity-strengthening behavior that migrates to higher velocities with increasing temperature. Less information on velocity dependence is available for the lizardite and antigorite gouges, but their behavior is consistent with that outlined for chrysotile. The marked changes in velocity dependence and strength of chrysotile with heating underscore the hazards of using room temperature data to predict fault behavior at depth. The velocity behavior at elevated temperatures does not rule out serpentinite as a cause of aseismic slip, but in the presence of a hydrostatic fluid pressure gradient, all varieties of serpentine are too strong to explain the apparent weakness of faults such as the San Andreas.

  3. Relaxion monodromy and the Weak Gravity Conjecture

    NASA Astrophysics Data System (ADS)

    Ibáñez, L. E.; Montero, M.; Uranga, A. M.; Valenzuela, I.

    2016-04-01

    The recently proposed relaxion models require extremely large trans-Planckian axion excursions as well as a potential explicitly violating the axion shift symmetry. The latter property is however inconsistent with the axion periodicity, which corresponds to a gauged discrete shift symmetry. A way to make things consistent is to use monodromy, i.e. both the axion and the potential parameters transform under the discrete shift symmetry. The structure is better described in terms of a 3-form field C μνρ coupling to the SM Higgs through its field strength F 4. The 4-form also couples linearly to the relaxion, in the Kaloper-Sorbo fashion. The extremely small relaxion-Higgs coupling arises in a see-saw fashion as g ≃ F 4 /f , with f being the axion decay constant. We discuss constraints on this type of constructions from membrane nucleation and the Weak Gravity Conjecture. The latter requires the existence of membranes, whose too fast nucleation could in principle drive the theory out of control, unless the cut-off scale is lowered. This allows to rule out the simplest models with the QCD axion as relaxion candidate on purely theoretical grounds. We also discuss possible avenues to embed this structure into string theory.

  4. Dynamic strength of molecular adhesion bonds.

    PubMed Central

    Evans, E; Ritchie, K

    1997-01-01

    In biology, molecular linkages at, within, and beneath cell interfaces arise mainly from weak noncovalent interactions. These bonds will fail under any level of pulling force if held for sufficient time. Thus, when tested with ultrasensitive force probes, we expect cohesive material strength and strength of adhesion at interfaces to be time- and loading rate-dependent properties. To examine what can be learned from measurements of bond strength, we have extended Kramers' theory for reaction kinetics in liquids to bond dissociation under force and tested the predictions by smart Monte Carlo (Brownian dynamics) simulations of bond rupture. By definition, bond strength is the force that produces the most frequent failure in repeated tests of breakage, i.e., the peak in the distribution of rupture forces. As verified by the simulations, theory shows that bond strength progresses through three dynamic regimes of loading rate. First, bond strength emerges at a critical rate of loading (> or = 0) at which spontaneous dissociation is just frequent enough to keep the distribution peak at zero force. In the slow-loading regime immediately above the critical rate, strength grows as a weak power of loading rate and reflects initial coupling of force to the bonding potential. At higher rates, there is crossover to a fast regime in which strength continues to increase as the logarithm of the loading rate over many decades independent of the type of attraction. Finally, at ultrafast loading rates approaching the domain of molecular dynamics simulations, the bonding potential is quickly overwhelmed by the rapidly increasing force, so that only naked frictional drag on the structure remains to retard separation. Hence, to expose the energy landscape that governs bond strength, molecular adhesion forces must be examined over an enormous span of time scales. However, a significant gap exists between the time domain of force measurements in the laboratory and the extremely fast scale of molecular motions. Using results from a simulation of biotin-avidin bonds (Izrailev, S., S. Stepaniants, M. Balsera, Y. Oono, and K. Schulten. 1997. Molecular dynamics study of unbinding of the avidin-biotin complex. Biophys. J., this issue), we describe how Brownian dynamics can help bridge the gap between molecular dynamics and probe tests. Images FIGURE 2 PMID:9083660

  5. Tagged-weak {pi} method

    SciTech Connect

    Margaryan, A.; Hashimoto, O.; Kakoyan, V.; Knyazyan, S.; Tang, L.

    2011-02-15

    A new 'tagged-weak {pi} method' is proposed for determination of electromagnetic transition probabilities B(E2) and B(M1) of the hypernuclear states with lifetimes of {approx}10{sup -10} s. With this method, we are planning to measure B(E2) and B(M1) for light hypernuclei at JLab. The results of Monte Carlo simulations for the case of E2(5/2{sup +}, 3/2{sup +} {yields} 1/2{sup +}) transitions in {sub {Lambda}}{sup 7}He hypernuclei are presented.

  6. Electromagnetic weak turbulence theory revisited

    SciTech Connect

    Yoon, P. H.; Ziebell, L. F.; Gaelzer, R.; Pavan, J.

    2012-10-15

    The statistical mechanical reformulation of weak turbulence theory for unmagnetized plasmas including fully electromagnetic effects was carried out by Yoon [Phys. Plasmas 13, 022302 (2006)]. However, the wave kinetic equation for the transverse wave ignores the nonlinear three-wave interaction that involves two transverse waves and a Langmuir wave, the incoherent analogue of the so-called Raman scattering process, which may account for the third and higher-harmonic plasma emissions. The present paper extends the previous formalism by including such a term.

  7. Weak lensing by galaxy troughs

    NASA Astrophysics Data System (ADS)

    Gruen, Daniel

    2016-06-01

    Galaxy troughs, i.e. underdensities in the projected galaxy field, are a weak lensing probe of the low density Universe with high signal-to-noise ratio. I present measurements of the radial distortion of background galaxy images and the de-magnification of the CMB by troughs constructed from Dark Energy Survey and Sloan Digital Sky Survey galaxy catalogs. With high statistical significance and a relatively robust modeling, these probe gravity in regimes of density and scale difficult to access for conventional statistics.

  8. Weak lensing by nearby structures

    NASA Astrophysics Data System (ADS)

    Gould, Andrew; Villumsen, Jens

    1994-06-01

    Weak gravitational lensing due to nearby structures, such as the Coma Cluster and the Local Supercluster, can be expected to polarize images of distant galaxies by Omicron(2 x 10-3Omega) with coherence over scales of tens of square degrees. The Sloan survey, which will image approximately greater than 104 galaxies deg-2 over pi steradians, should be sensitive to polarizations of approximately 0.1%A-1/2, where A is the area in square degrees. By measuring the polarization, one could determine Omega in local structures and compare this value to that derived from a variety of other techniques.

  9. Weak antilocalisation in topological insulators

    NASA Astrophysics Data System (ADS)

    Bi, Xintao; Hankiewicz, Ewelina; Culcer, Dimitrie

    2014-03-01

    Topological insulators (TI) have changed our understanding of insulating behaviour. They are insulators in the bulk but conducting along their surfaces due to spin-orbit interaction. Much of the recent research focuses on overcoming the transport bottleneck, the fact that surface state transport is overwhelmed by bulk transport stemming from unintentional doping. The key to overcoming this bottleneck is identifying unambiguous signatures of surface state transport. This talk will discuss one such signature, which is manifest in the coherent backscattering of electrons. Due to strong spin-orbit coupling in TI one expects to observe weak antilocalisation rather than weak localisation, meaning that coherent backscattering increases the electrical conductivity. The features of this effect, however, are rather subtle, because in TI the impurities have strong spin-orbit coupling as well. I will show that spin-orbit coupled impurities introduce an additional time scale, which is expected to be shorter than the dephasing time, and the resulting conductivity has a logarithmic dependence on the carrier density, a behaviour hitherto unknown in 2D electron systems. The result we predict is observable experimentally and would provide a smoking gun test of surface transport.

  10. The weak scale from BBN

    NASA Astrophysics Data System (ADS)

    Hall, Lawrence J.; Pinner, David; Ruderman, Joshua T.

    2014-12-01

    The measured values of the weak scale, v, and the first generation masses, m u, d, e , are simultaneously explained in the multiverse, with all these parameters scanning independently. At the same time, several remarkable coincidences are understood. Small variations in these parameters away from their measured values lead to the instability of hydrogen, the instability of heavy nuclei, and either a hydrogen or a helium dominated universe from Big Bang Nucleosynthesis. In the 4d parameter space of ( m u , m d , m e , v), catastrophic boundaries are reached by separately increasing each parameter above its measured value by a factor of (1.4, 1.3, 2.5, ˜ 5), respectively. The fine-tuning problem of the weak scale in the Standard Model is solved: as v is increased beyond the observed value, it is impossible to maintain a significant cosmological hydrogen abundance for any values of m u, d, e that yield both hydrogen and heavy nuclei stability.

  11. Weak measurement and quantum steering of spin qubits in silicon

    NASA Astrophysics Data System (ADS)

    Morello, Andrea; Muhonen, Juha; Simmons, Stephanie; Freer, Solomon; Dehollain, Juan; McCallum, Jeffrey; Jamieson, David; Itoh, Kohei; Dzurak, Andrew

    Single-shot, projective measurements have been demonstrated with very high fidelities on both the electron and the nuclear spin of single implanted phosphorus (31P) donors in silicon. Here we present a series of experiments where the measurement strength is continousuly reduced, giving access to the regime of weak measurement of single spins.For the electron qubit, the measurement strength is set by the measurement time compared to the spin-dependent tunneling time between the 31P donor and a charge reservoir. For the nuclear qubit, the measurement strength is set by the rotation angle of an ESR pulse.We have demonstrated quantum steering of the spin states, with curious and useful applications. We can improve the fidelity of electron qubit initialization by steering it towards the ground state, thus bypassing thermal effects on the initialization process. We can also accurately measure the electron-reservoir tunnel coupling, without the electron ever tunneling away from the 31P atom. Finally, these techniques allow the study of weak values and Leggett-Garg inequalities. Present address: AMOLF, Amsterdam, The Netherlands.

  12. Superfluid helium-4 weak links

    NASA Astrophysics Data System (ADS)

    Hoskinson, Emile Michael

    Josephson effects in superconductors, since their discovery in 1962, have not only provided a fascinating example of the counter-intuitive behavior of macroscopic quantum systems, but have also given rise to important technologies. The search for Josephson effects in superfluid 4He began not long after their discovery in superconductors, in 1962. We report, more that four decades later, the first observation of Josephson frequency quantum oscillation in superfluid 4He. We observe these oscillations in a 65 x 65 array of sub-micron sized apertures drilled in a 50 nm thick silicon nitrite membrane. We find that these oscillations can be driven not only by a pressure difference applied across the array, but also by a temperature difference. The frequency of the oscillations obeys the Josephson frequency relation, fj = Deltamu/h, where h is Plank's constant and Deltamu = m4(Delta P/rho - sDeltaT) is the chemical potential difference across the array. Furthermore, we find that for temperatures a few mK below the superfluid transition temperature T lambda, the amplitude of the oscillations indicates that they are occurring synchronously in all apertures of the array. We have developed a method of extracting the current-phase relation of the super-fluid 4He array from the response of the cell to a step in the chemical potential difference across the array. When the current-phase relation is plotted as a function of temperature near T lambda, we observe a cross-over from a low-temperature strong coupling regime in which the Josephson frequency oscillation is a result of periodically generated phase slips associated with singly quantized vortices, to a weak coupling regime exhibiting the sinusoidal current-phase signature of the Josephson effect. We have investigated the synchronicity of the oscillations in the array in the strong coupling regime as a function of temperature. We find that as the temperature drops, the apertures become less and less synchronous. We suggest several possible explanations for this behavior, including the idea that as the temperature rises toward the cross-over to the weak coupling regime, the vortex phase slip mechanism gives way to a wave function collapse mechanism. Finally, we present a "Chemical potential battery" for superfluid 4He weak link cells, whereby a constant heater power is used to generate a constant chemical potential difference, giving rise to steady Josephson frequency oscillations. This may be an ideal method of operating a superfluid 4He dc-SQUID, a device constructed from two weak link arrays in a torus, which will be highly sensitive to rotation. The experiments reported in this dissertation represent a breakthrough in superfluid 4He weak link research, and provide a big step in the direction of a practical superfluid dc-SQUID operating at 2 K, a regime accessible to mechanical cryo-coolers. Such a device may find application in geodesy, detection of rotational seismic waves, and basic physics.

  13. 'Threats' to and hopes for estimating benefits.

    PubMed

    Ryan, Mandy; Amaya-Amaya, Mabelle

    2005-06-01

    In a recent paper in this journal, Andrew Lloyd reviewed some potential threats to the estimation of health care benefits in monetary terms. Particular emphasis was placed on the extent to which the use of non-compensatory heuristics may distort the results. Although it is useful to be reminded of these problems, Lloyd's paper does not do justice to the attention such issues have already received, and continue to receive, within Health Economics. The aim of this paper is twofold. Firstly, it seeks to provide a more balanced and comprehensive view of the evidence by considering some of the methodological work that health economists have conducted in many of the areas pointed out by Lloyd. Secondly, and more importantly, it suggests ways to combine the economic and psychological views of human decision-making, providing a much more positive perspective to all those researchers out there who recognize the necessity of using stated preference methods to inform health policy. PMID:15619265

  14. Water bathing alters threat perception in starlings

    PubMed Central

    Brilot, Ben O.; Bateson, Melissa

    2012-01-01

    The majority of bird taxa perform water bathing, but little is known about the adaptive value of this behaviour. If bathing is important for feather maintenance then birds that have not bathed should have poorer feather condition, compromised escape ability and therefore increased responsiveness to cues of predation. We conducted two experiments examining the behaviour of captive starlings responding to conspecific alarm calls. Birds that had no access to bathing water showed a decreased willingness to feed and increased their vigilance behaviour following an alarm call. We argue that birds denied access to bathing water interpreted an ambiguous cue of threat as requiring more caution than birds that had access, consistent with higher levels of anxiety. Our results support the provision of bathing water for captive birds as an important welfare measure. PMID:22250131

  15. “Filoviruses”: a real pandemic threat?

    PubMed Central

    Martina, Byron EE; Osterhaus, Albert DME

    2009-01-01

    Filoviruses are zoonotic and among the deadliest viruses known to mankind, with mortality rates in outbreaks reaching up to 90%. Despite numerous efforts to identify the host reservoir(s), the transmission cycle of filoviruses between the animal host(s) and humans remains unclear. The last decade has witnessed an increase in filovirus outbreaks with a changing epidemiology. The high mortality rates and lack of effective antiviral drugs or preventive vaccines has propagated the fear that filoviruses may become a real pandemic threat. This article discusses the factors that could influence the possible pandemic potential of filoviruses and elaborates on the prerequisites for the containment of future outbreaks, which would help prevent the evolution of filovirus into more virulent and more transmissible viruses. PMID:20049699

  16. Biological terrorism. Preparing to meet the threat.

    PubMed

    Simon, J D

    1997-08-01

    The threat of terrorists using biological warfare agents has received increased attention in recent years. Despite the hope that, with the right mix of policies, security measures, and intelligence gathering, a major biological warfare terrorist attack can be prevented, the history of conventional terrorism indicates otherwise. The greatest payoff in combating biological terrorism lies in focusing on how best to respond to a terrorist attack. The medical and emergency service communities will play the most important role in that process. Ensuring that they are trained to recognize the symptoms of diseases caused by biological warfare agents and have Critical Incident Stress Debriefing teams available to help them cope with the emotional aspects of treating exposed survivors should be part of contingency planning. By improving our readiness to respond to biological terrorism, many lives can be saved and terrorists denied their goal of creating panic and crisis throughout the country. PMID:9244336

  17. Community epidemiology framework for classifying disease threats.

    PubMed

    Fenton, Andy; Pedersen, Amy B

    2005-12-01

    Recent evidence suggests that most parasites can infect multiple host species and that these are primarily responsible for emerging infectious disease outbreaks in humans and wildlife. However, the ecologic and evolutionary factors that constrain or facilitate such emergences are poorly understood. We propose a conceptual framework based on the pathogen's between- and within-species transmission rates to describe possible configurations of a multihost-pathogen community that may lead to disease emergence. We establish 3 dynamic thresholds separating 4 classes of disease outcomes, spillover, apparent multi-host, true multihost, and potential emerging infectious disease; describe possible disease emergence scenarios; outline the population dynamics of each case; and clarify existing terminology. We highlight the utility of this framework with examples of disease threats in human and wildlife populations, showing how it allows us to understand which ecologic factors affect disease emergence and predict the impact of host shifts in a range of disease systems. PMID:16485464

  18. Bioterrorism as a public health threat.

    PubMed Central

    Henderson, D. A.

    1998-01-01

    The threat of bioterrorism, long ignored and denied, has heightened over the past few years. Recent events in Iraq, Japan, and Russia cast an ominous shadow. Two candidate agents are of special concern--smallpox and anthrax. The magnitude of the problems and the gravity of the scenarios associated with release of these organisms have been vividly portrayed by two epidemics of smallpox in Europe during the 1970s and by an accidental release of aerosolized anthrax from a Russian bioweapons facility in 1979. Efforts in the United States to deal with possible incidents involving bioweapons in the civilian sector have only recently begun and have made only limited progress. Only with substantial additional resources at the federal, state, and local levels can a credible and meaningful response be mounted. For longer-term solutions, the medical community must educate both the public and policy makers about bioterrorism and build a global consensus condemning its use. PMID:9716981

  19. Females that experience threat are better teachers

    PubMed Central

    Kleindorfer, Sonia; Evans, Christine; Colombelli-Négrel, Diane

    2014-01-01

    Superb fairy-wren (Malurus cyaneus) females use an incubation call to teach their embryos a vocal password to solicit parental feeding care after hatching. We previously showed that high call rate by the female was correlated with high call similarity in fairy-wren chicks, but not in cuckoo chicks, and that parent birds more often fed chicks with high call similarity. Hosts should be selected to increase their defence behaviour when the risk of brood parasitism is highest, such as when cuckoos are present in the area. Therefore, we experimentally test whether hosts increase call rate to embryos in the presence of a singing Horsfield's bronze-cuckoo (Chalcites basalis). Female fairy-wrens increased incubation call rate when we experimentally broadcast cuckoo song near the nest. Embryos had higher call similarity when females had higher incubation call rate. We interpret the findings of increased call rate as increased teaching effort in response to a signal of threat. PMID:24806422

  20. MCNPX improvements for threat reduction applications

    SciTech Connect

    Waters, Laurie S; Durkee, Joe W; Elson, Jay S; Esch, Ernst I; Fensin, Michael L; Hendricks, John S; Holloway, Shannon T; James, Michael R; Jason, Andrew; Johns, Russell C; Johnson, M William; Kawano, Toshihiko; Mckinney, Gregg W; Moller, Peter; Pelowitz, Denise B

    2008-01-01

    The DHS Domestic Nuclear Detection Office (DNDO) is funding a multiyear program of improvements for the MCNPX{sup TM} Monte Carlo radiation-transport code. Additional work is underway for the DTRA Active Interrogation programs. Enhancements contained in the current MCNPX 2.6.0 RSICC release will be presented, including stopped-muon physics, delayed neutron and photon generation and automatic generation of source photons. Preliminary benchmarking comparisons with data taken with a PSI muon beam will be discussed. We will also describe current improvements now underway, including Nuclear Resonance Fluorescence, pulsed sources, and others. We will also describe very new work begun on a Threat-Reduction user inferface, designed to simplify the setup of TR-related calculations, and introduce standards into geometry, sources and backgrounds.

  1. Revealing geometric phases in modular and weak values with a quantum eraser

    NASA Astrophysics Data System (ADS)

    Cormann, Mirko; Remy, Mathilde; Kolaric, Branko; Caudano, Yves

    2016-04-01

    We present a procedure to completely determine the complex modular values of arbitrary observables of pre- and postselected ensembles, which works experimentally for all measurement strengths and all postselected states. This procedure allows us to discuss the physics of modular and weak values in interferometric experiments involving a qubit meter. We determine both the modulus and the argument of the modular value for any measurement strength in a single step, by simultaneously controlling the visibility and the phase in a quantum eraser interference experiment. Modular and weak values are closely related. Using entangled qubits for the probed and meter systems, we show that the phase of the modular and weak values has a topological origin. This phase is completely defined by the intrinsic physical properties of the probed system and its time evolution. The physical significance of this phase can thus be used to evaluate the quantumness of weak values.

  2. An Overview of Non-Traditional Nuclear Threats

    SciTech Connect

    Geelhood, Bruce D.; Wogman, Ned A.

    2005-01-01

    In view of the terrorist threats to the United States, the country needs to consider new vectors and weapons related to nuclear and radiological threats against our homeland. The traditional threat vectors, missiles and bombers, have expanded to include threats arriving through the flow of commerce. The new commerce-related vectors include: sea cargo, truck cargo, rail cargo, air cargo, and passenger transport. The types of weapons have also expanded beyond nuclear war-heads to include radiation dispersal devices (RDD) or “dirty” bombs. The consequences of these nuclear and radiological threats are considered. The defense against undesirable materials enter-ing our borders is considered. The radiation and other signatures of potential nuclear and radio-logical threats are examined along with potential sensors to discover undesirable items in the flow of commerce. Techniques to improve detection are considered. A strategy of primary and secondary screening is proposed to rapidly clear most cargo and carefully examine suspect cargo.

  3. An Overview of Non-traditional Nuclear Threats

    SciTech Connect

    Geelhood, Bruce D.; Wogman, Ned A.

    2005-01-01

    In view of the terrorist threats to the United States, the country needs to consider new vectors and weapons related to nuclear and radiological threats against our homeland. The traditional threat vectors, missiles and bombers, have expanded to include threats arriving through the flow of commerce. The new commerce-related vectors include: sea cargo, truck cargo, rail cargo, and passenger transport. The types of weapons have also expanded beyond nuclear warheads to include radiation dispersal devices (RDD) or ''dirty'' bombs. The consequences of these nuclear and radiological threats are considered. The defense against undesirable materials entering our borders is considered. The radiation and other signatures or potential nuclear and radiological threats are examined along with potential sensors to discover undesirable items in the flow of commerce. Techniques to improve detection are considered. A strategy of primary and secondary screening is proposed to rapidly clear most cargo and carefully examine suspect cargo.

  4. Prejudice towards Muslims in The Netherlands: testing integrated threat theory.

    PubMed

    Velasco González, Karina; Verkuyten, Maykel; Weesie, Jeroen; Poppe, Edwin

    2008-12-01

    This study uses integrated threat theory to examine Dutch adolescents' (N=1,187) prejudice towards Muslim minorities. One out of two participants was found to have negative feelings towards Muslims. Perceived symbolic and realistic threat and negative stereotypes were examined as mediators between antecedent factors (in-group identification, intergroup contact, and the endorsement of multiculturalism) and prejudice. Based on structural equation modelling, it was found that stereotypes and symbolic threats, but not realistic threats, predicted prejudice towards Muslims. Further, it was found that the effect of in-group identification on prejudice was fully mediated by symbolic threat, the effect of contact was partially mediated by stereotypes, and the effect of the endorsement of multiculturalism was mediated by both symbolic threat and stereotypes. In addition, contact and multiculturalism were directly associated with prejudice towards Muslims. The theoretical and practical implications of these findings are discussed. PMID:18284782

  5. When anticipation beats accuracy: Threat alters memory for dynamic scenes.

    PubMed

    Greenstein, Michael; Franklin, Nancy; Martins, Mariana; Sewack, Christine; Meier, Markus A

    2016-05-01

    Threat frequently leads to the prioritization of survival-relevant processes. Much of the work examining threat-related processing advantages has focused on the detection of static threats or long-term memory for details. In the present study, we examined immediate memory for dynamic threatening situations. We presented participants with visually neutral, dynamic stimuli using a representational momentum (RM) paradigm, and manipulated threat conceptually. Although the participants in both the threatening and nonthreatening conditions produced classic RM effects, RM was stronger for scenarios involving threat (Exps. 1 and 2). Experiments 2 and 3 showed that this effect does not generalize to the nonthreatening objects within a threatening scene, and that it does not extend to arousing happy situations. Although the increased RM effect for threatening objects by definition reflects reduced accuracy, we argue that this reduced accuracy may be offset by a superior ability to predict, and thereby evade, a moving threat. PMID:26698159

  6. Quantifying human response capabilities towards tsunami threats at community level

    NASA Astrophysics Data System (ADS)

    Post, J.; Mück, M.; Zosseder, K.; Wegscheider, S.; Taubenböck, H.; Strunz, G.; Muhari, A.; Anwar, H. Z.; Birkmann, J.; Gebert, N.

    2009-04-01

    Decision makers at the community level need detailed information on tsunami risks in their area. Knowledge on potential hazard impact, exposed elements such as people, critical facilities and lifelines, people's coping capacity and recovery potential are crucial to plan precautionary measures for adaptation and to mitigate potential impacts of tsunamis on society and the environment. A crucial point within a people-centred tsunami risk assessment is to quantify the human response capabilities towards tsunami threats. Based on this quantification and spatial representation in maps tsunami affected and safe areas, difficult-to-evacuate areas, evacuation target points and evacuation routes can be assigned and used as an important contribution to e.g. community level evacuation planning. Major component in the quantification of human response capabilities towards tsunami impacts is the factor time. The human response capabilities depend on the estimated time of arrival (ETA) of a tsunami, the time until technical or natural warning signs (ToNW) can be received, the reaction time (RT) of the population (human understanding of a tsunami warning and the decision to take appropriate action), the evacuation time (ET, time people need to reach a safe area) and the actual available response time (RsT = ETA - ToNW - RT). If RsT is larger than ET, people in the respective areas are able to reach a safe area and rescue themselves. Critical areas possess RsT values equal or even smaller ET and hence people whin these areas will be directly affected by a tsunami. Quantifying the factor time is challenging and an attempt to this is presented here. The ETA can be derived by analyzing pre-computed tsunami scenarios for a respective area. For ToNW we assume that the early warning center is able to fulfil the Indonesian presidential decree to issue a warning within 5 minutes. RT is difficult as here human intrinsic factors as educational level, believe, tsunami knowledge and experience besides others play a role. An attempt to quantify this variable under high uncertainty is also presented. Quantifying ET is based on a GIS modelling using a Cost Weighted Distance approach. Basic principle is to define the best evacuation path from a given point to the next safe area (shelter location). Here the fastest path from that point to the shelter location has to be found. Thereby the impact of land cover, slope, population density, population age and gender distribution are taken into account as literature studies prove these factors as highly important. Knowing the fastest path and the distance to the next safe area together with a spatially distributed pattern of evacuation speed delivers the time needed from each location to a safe area. By considering now the obtained time value for RsT the coverage area of an evacuation target point (safe area) can be assigned. Incorporating knowledge on people capacity of an evacuation target point the respective coverage area is refined. Hence areas with weak, moderate and good human response capabilities can be detected. This allows calculation of potential amount of people affected (dead or injured) and amount of people dislocated. First results for Kuta (Bali) for a worst case tsunami event deliver people affected of approx. 25 000 when RT = 0 minutes (direct evacuation when receiving a tsunami warning to 120 000 when RT > ETA (no evacuation action until tsunami hits the land). Additionally fastest evacuation routes to the evacuation target points can be assigned. Areas with weak response capabilities can be assigned as priority areas to install e.g. additional evacuation target points or to increase tsunami knowledge and awareness to promote a faster reaction time. Especially in analyzing underlying socio-economic properties causing deficiencies in responding to a tsunami threat can lead to valuable information and direct planning of adaptation measures. Keywords: Community level, Risk and vulnerability assessment, Early warning, Disaster management, Tsunami, Indonesia

  7. Strength and Balance Exercises

    MedlinePlus

    ... Blood Pressure Tools & Resources Stroke More Strength and Balance Exercises Updated:Jun 23,2015 If you have ... second set. Walking Heel-to-Toe Purpose: Improve balance. Starting Position: Stand close to a wall for ...

  8. Reduction of bone strength

    NASA Technical Reports Server (NTRS)

    Bingham, Cindy

    1990-01-01

    Viewgraphs on reduction of bone strength are presented. WEHI 231 B growth rates, experimental chambers used to apply the electric field to the cell cultures, and a mouse suspended by rotating cuff in electromagnetic field are shown.

  9. Spin-orbit scattering in thin films and on surfaces measured by weak localization

    NASA Astrophysics Data System (ADS)

    Bergmann, Gerd; Horriar-Esser, Christel

    1985-01-01

    Magnetoresistance measurements on thin disordered films yield the spin-orbit scattering time τso of the conduction electrons by means of weak localization. The spin-orbit scattering is used to check the time scale of weak localization. The dependence of τso on the residual resistivity of Ag films is measured, and the strength of the spin-orbit scattering of an Au atom at the surface and in the bulk of Mg is compared.

  10. Hand-Strength Meter

    NASA Technical Reports Server (NTRS)

    Tcheng, Ping; Elliot, Joe

    1987-01-01

    Special grip-strength meter designed for accurate, reproducible measurement of hand rehabilitation. Four strain gauges connected in Wheatstone bridge to measure deflection caused by gripping hand. Compressive force exerted by hand transmitted to measuring beams. Beams therefore deflected or strained, and mechanical strain sensed by strain gauges and converted into electrical signal. After amplification and conditioning, signal displayed on LED as measure of gripping strength of hand.

  11. Mechanisms of visual threat detection in specific phobia.

    PubMed

    Weierich, Mariann R; Treat, Teresa A

    2015-01-01

    People with anxiety or stress-related disorders attend differently to threat-relevant compared with non-threat stimuli, yet the temporal mechanisms of differential allocation of attention are not well understood. We investigated two independent mechanisms of temporal processing of visual threat by comparing spider-phobic and non-fearful participants using a rapid serial visual presentation task. Consistent with prior literature, spider phobics, but not non-fearful controls, displayed threat-specific facilitated detection of spider stimuli relative to negative stimuli and neutral stimuli. Further, signal detection analyses revealed that facilitated threat detection in spider-phobic participants was driven by greater sensitivity to threat stimulus features and a trend towards a lower threshold for detecting spider stimuli. However, phobic participants did not display reliably slowed temporal disengagement from threat-relevant stimuli. These findings advance our understanding of threat feature processing that might contribute to the onset and maintenance of symptoms in specific phobia and disorders that involve visual threat information more generally. PMID:25251896

  12. Enhanced neural reactivity and selective attention to threat in anxiety.

    PubMed

    Eldar, Sharon; Yankelevitch, Roni; Lamy, Dominique; Bar-Haim, Yair

    2010-10-01

    Attentional bias towards threat is implicated in the etiology and maintenance of anxiety disorders. We examined the neural correlates of threat bias in anxious and nonanxious participants to shed light on the neural chronometry of this cognitive bias. In this study, event-related potentials (ERPs) were recorded while anxious (n=23) and nonanxious (n=23) young adults performed a probe-discrimination task measuring attentional bias towards threat (angry) and positive (happy) face stimuli. Results showed an attention bias towards threat among anxious participants, but not among nonanxious participants. No bias to positive faces was found. ERP data revealed enhanced C1 amplitude (∼80 ms following threat onset) in anxious relative to nonanxious participants when cue displays contained threat faces. Additionally, P2 amplitude to the faces display was higher in the anxious relative to the nonanxious group regardless of emotion condition (angry/happy/neutral). None of the ERP analyses associated with target processing were significant. In conclusion, our data suggest that a core feature of threat processing in anxiety lies in functional perturbations of a brain circuitry that reacts rapidly and vigorously to threat. It is this over-activation that may set the stage for the attention bias towards threat observed in anxious individuals. PMID:20655976

  13. Migrant networks and international migration: testing weak ties.

    PubMed

    Liu, Mao-Mei

    2013-08-01

    This article examines the role of migrant social networks in international migration and extends prior research by testing the strength of tie theory, decomposing networks by sources and resources, and disentangling network effects from complementary explanations. Nearly all previous empirical research has ignored friendship ties and has largely neglected extended-family ties. Using longitudinal data from the Migration between Africa and Europe project collected in Africa (Senegal) and Europe (France, Italy, and Spain), this article tests the robustness of network theory-and in particular, the role of weak ties-on first-time migration between Senegal and Europe. Discrete-time hazard model results confirm that weak ties are important and that network influences appear to be gendered, but they do not uphold the contention in previous literature that strong ties are more important than weak ties for male and female migration. Indeed, weak ties play an especially important role in male migration. In terms of network resources, having more resources as a result of strong ties appears to dampen overall migration, while having more resources as a result of weaker ties appears to stimulate male migration. Finally, the diversity of resources has varied effects for male and female migration. PMID:23703222

  14. Enhancing Atomic Entanglement in a Common Reservoir by Weak Measurement and its Reversal

    NASA Astrophysics Data System (ADS)

    Zhang, Yun-hai; Xia, Yun-jie

    2016-01-01

    The three two-level atoms, initially prepared in like-W state, interact with a common bosonic reservoir. To suppress environment decoherence and obtain much better entanglement, we firstly perform weak measurement on these atoms before they pass the reservoir, and then, when they have experienced the decoherence environment, the receiver carry out a quantum reversal on all atoms. The results show both the tripartite and bipartite entanglement can be enhanced and the post-reversal measurement is more obvious to promote atomic entanglements than the weak measurement. Increasing the strength of reversal measurement can always improve entanglement. As a price, the success probability decreases with the much greater measure strength.

  15. Weak, Quiet Magnetic Fields Seen in the Venus Atmosphere

    NASA Astrophysics Data System (ADS)

    Zhang, T. L.; Baumjohann, W.; Russell, C. T.; Luhmann, J. G.; Xiao, S. D.

    2016-03-01

    The existence of a strong internal magnetic field allows probing of the interior through both long term changes of and short period fluctuations in that magnetic field. Venus, while Earth’s twin in many ways, lacks such a strong intrinsic magnetic field, but perhaps short period fluctuations can still be used to probe the electrical conductivity of the interior. Toward the end of the Venus Express mission, an aerobraking campaign took the spacecraft below the ionosphere into the very weakly electrically conducting atmosphere. As the spacecraft descended from 150 to 140 km altitude, the magnetic field became weaker on average and less noisy. Below 140 km, the median field strength became steady but the short period fluctuations continued to weaken. The weakness of the fluctuations indicates they might not be useful for electromagnetic sounding of the atmosphere from a high altitude platform such as a plane or balloon, but possibly could be attempted on a lander.

  16. Weak, Quiet Magnetic Fields Seen in the Venus Atmosphere.

    PubMed

    Zhang, T L; Baumjohann, W; Russell, C T; Luhmann, J G; Xiao, S D

    2016-01-01

    The existence of a strong internal magnetic field allows probing of the interior through both long term changes of and short period fluctuations in that magnetic field. Venus, while Earth's twin in many ways, lacks such a strong intrinsic magnetic field, but perhaps short period fluctuations can still be used to probe the electrical conductivity of the interior. Toward the end of the Venus Express mission, an aerobraking campaign took the spacecraft below the ionosphere into the very weakly electrically conducting atmosphere. As the spacecraft descended from 150 to 140 km altitude, the magnetic field became weaker on average and less noisy. Below 140 km, the median field strength became steady but the short period fluctuations continued to weaken. The weakness of the fluctuations indicates they might not be useful for electromagnetic sounding of the atmosphere from a high altitude platform such as a plane or balloon, but possibly could be attempted on a lander. PMID:27009234

  17. Weak, Quiet Magnetic Fields Seen in the Venus Atmosphere

    PubMed Central

    Zhang, T. L.; Baumjohann, W.; Russell, C. T.; Luhmann, J. G.; Xiao, S. D.

    2016-01-01

    The existence of a strong internal magnetic field allows probing of the interior through both long term changes of and short period fluctuations in that magnetic field. Venus, while Earth’s twin in many ways, lacks such a strong intrinsic magnetic field, but perhaps short period fluctuations can still be used to probe the electrical conductivity of the interior. Toward the end of the Venus Express mission, an aerobraking campaign took the spacecraft below the ionosphere into the very weakly electrically conducting atmosphere. As the spacecraft descended from 150 to 140 km altitude, the magnetic field became weaker on average and less noisy. Below 140 km, the median field strength became steady but the short period fluctuations continued to weaken. The weakness of the fluctuations indicates they might not be useful for electromagnetic sounding of the atmosphere from a high altitude platform such as a plane or balloon, but possibly could be attempted on a lander. PMID:27009234

  18. Prethermalization and Thermalization in Models with Weak Integrability Breaking.

    PubMed

    Bertini, Bruno; Essler, Fabian H L; Groha, Stefan; Robinson, Neil J

    2015-10-30

    We study the effects of integrability-breaking perturbations on the nonequilibrium evolution of many-particle quantum systems. We focus on a class of spinless fermion models with weak interactions. We employ equation of motion techniques that can be viewed as generalizations of quantum Boltzmann equations. We benchmark our method against time-dependent density matrix renormalization group computations and find it to be very accurate as long as interactions are weak. For small integrability breaking, we observe robust prethermalization plateaux for local observables on all accessible time scales. Increasing the strength of the integrability-breaking term induces a "drift" away from the prethermalization plateaux towards thermal behavior. We identify a time scale characterizing this crossover. PMID:26565450

  19. Weak transitions in lattice QCD

    SciTech Connect

    Maturana, G.

    1984-01-01

    Some techniques to calculate the effects of the strong interactions on the matrix elements of weak processes are described. The lattice formulation of Quantum Chromodynamics is used to account for the low energy gluons, and the corresponding numerical methods are explained. The high energy contributions are included in effective lagrangians and the problem of matching the different scales related to the renormalization of the operators and wavefunctions is also discussed. The ..delta..l = 1/2 enhancement rule and the K/sup 0/-anti-K/sup 0/ are used to illustrate these techniques and the results of a numerical calculation is reported. The values obtained are very encouraging and they certainly show good qualitative agreement with the experimental values. The emphasis is on general techniques, and in particular, several improvements to this particular calculation are proposed.

  20. Out-Group Mating Threat and Disease Threat Increase Implicit Negative Attitudes Toward the Out-Group Among Men

    PubMed Central

    Klavina, Liga; Buunk, Abraham P.; Pollet, Thomas V.

    2011-01-01

    We investigated if perceiving an out-group as a threat to one's mating opportunities enhanced the implicit negative attitudes toward that out-group. In addition, we examined the moderating effect of disease threat on the relationship between an out-group mating threat and implicit negative attitudes toward that out-group. In Experiment 1, an out-group mating threat led to stronger implicit negative out-group attitudes as measured by the Implicit Association Test, but only for men with high chronic perceived vulnerability to disease. No such effects were found among women. In Experiment 2, men in the out-group mating threat condition who were primed with disease prevalence showed significantly stronger implicit negative attitudes toward the out-group than controls. Findings are discussed with reference to the functional approach to prejudice and sex-specific motivational reactions to different out-group threats. PMID:21687447

  1. Behaviour of Weak Shales in Underground Environments

    NASA Astrophysics Data System (ADS)

    Martin, C. Derek; Giger, Silvio; Lanyon, G. W.

    2016-02-01

    Predicting the ground response for tunnels in weak shales remains challenging. Predicting the ground response is challenged by difficulties in characterising the material, and our ability to predict deformations that are driven by coupled hydromechanical processes, when this material yields. The techniques that are used for characterising weak shales are reviewed, and three case histories are examined that demonstrate the behaviour of these weak rocks during tunnelling. A general framework is provided for assessing the squeezing potential for weak shales.

  2. Weakly ionized cerium plasma radiography

    NASA Astrophysics Data System (ADS)

    Sato, Eiichi; Hayasi, Yasuomi; Germer, Rudolf; Koorikawa, Yoshitake; Murakami, Kazunori; Tanaka, Etsuro; Mori, Hidezo; Kawai, Toshiaki; Ichimaru, Toshio; Obata, Fumiko; Takahashi, Kiyomi; Sato, Sigehiro; Takayama, Kazuyoshi; Ido, Hideaki

    2004-02-01

    In the plasma flash x-ray generator, high-voltage main condenser of about 200 nF is charged up to 55 kV by a power supply, and electric charges in the condenser are discharged to an x-ray tube after triggering the cathode electrode. The flash x-rays are then produced. The x-ray tube is of a demountable triode that is connected to a turbo molecular pump with a pressure of approximately 1 mPa. As electron flows from the cathode electrode are roughly converged to a rod cerium target of 3.0 mm in diameter by electric field in the x-ray tube, the weakly ionized linear plasma, which consists of cerium ions and electrons, forms by target evaporating. At a charging voltage of 55 kV, the maximum tube voltage was almost equal to the charging voltage of the main condenser, and the peak current was about 20 kA. When the charging voltage was increased, weakly ionized cerium plasma formed, and the K-series characteristic x-ray intensities increased. The x-ray pulse widths were about 500 ns, and the time-integrated x-ray intensity had a value of about 40 μC/kg at 1.0 m from x-ray source with a charging voltage of 55 kV. In the angiography, we employed a film-less computed radiography (CR) system and iodine-based microspheres. Because K-series characteristic x-rays are absorbed easily by the microspheres, high-contrast angiography has been performed.

  3. Computer-aided visualization of muscle weakness distribution.

    PubMed

    Pieterse, Allan J; Voermans, Nicol C; Tuinenga, Hans S; van Engelen, Baziel G M

    2008-11-01

    We present a computer program for visualizing muscle weakness distribution in patients with neuromuscular disorders. Ordinal muscle strength data can be computed in the program. Data are visualized as the prime movers of the testmovements in an image of the human body and a separate image of the face. Severity is indicated in shades of grey and black indicates complete loss of muscle power. This visualization facilitates the diagnosis and follow-up of patients and is an excellent tool for patient education. Moreover, the program can also be used to investigate and further refine the phenotypic description of these disorders. PMID:18769861

  4. Induced tolerance expressed as relaxed behavioural threat response in millimetre-sized aquatic organisms

    PubMed Central

    Hylander, Samuel; Ekvall, Mikael T.; Bianco, Giuseppe; Yang, Xi; Hansson, Lars-Anders

    2014-01-01

    Natural selection shapes behaviour in all organisms, but this is difficult to study in small, millimetre-sized, organisms. With novel labelling and tracking techniques, based on nanotechnology, we here show how behaviour in zooplankton (Daphnia magna) is affected by size, morphology and previous exposure to detrimental ultraviolet radiation (UVR). All individuals responded with immediate downward swimming to UVR exposure, but when released from the threat they rapidly returned to the surface. Large individuals swam faster and generally travelled longer distances than small individuals. Interestingly, individuals previously exposed to UVR (during several generations) showed a more relaxed response to UVR and travelled shorter total distances than those that were naive to UVR, suggesting induced tolerance to the threat. In addition, animals previously exposed to UVR also had smaller eyes than the naive ones, whereas UVR-protective melanin pigmentation of the animals was similar between populations. Finally, we show that smaller individuals have lower capacity to avoid UVR which could explain patterns in natural systems of lower migration amplitudes in small individuals. The ability to change behavioural patterns in response to a threat, in this case UVR, adds to our understanding of how organisms navigate in the ‘landscape of fear’, and this has important implications for individual fitness and for interaction strengths in biotic interactions. PMID:24966309

  5. Induced tolerance expressed as relaxed behavioural threat response in millimetre-sized aquatic organisms.

    PubMed

    Hylander, Samuel; Ekvall, Mikael T; Bianco, Giuseppe; Yang, Xi; Hansson, Lars-Anders

    2014-08-01

    Natural selection shapes behaviour in all organisms, but this is difficult to study in small, millimetre-sized, organisms. With novel labelling and tracking techniques, based on nanotechnology, we here show how behaviour in zooplankton (Daphnia magna) is affected by size, morphology and previous exposure to detrimental ultraviolet radiation (UVR). All individuals responded with immediate downward swimming to UVR exposure, but when released from the threat they rapidly returned to the surface. Large individuals swam faster and generally travelled longer distances than small individuals. Interestingly, individuals previously exposed to UVR (during several generations) showed a more relaxed response to UVR and travelled shorter total distances than those that were naive to UVR, suggesting induced tolerance to the threat. In addition, animals previously exposed to UVR also had smaller eyes than the naive ones, whereas UVR-protective melanin pigmentation of the animals was similar between populations. Finally, we show that smaller individuals have lower capacity to avoid UVR which could explain patterns in natural systems of lower migration amplitudes in small individuals. The ability to change behavioural patterns in response to a threat, in this case UVR, adds to our understanding of how organisms navigate in the 'landscape of fear', and this has important implications for individual fitness and for interaction strengths in biotic interactions. PMID:24966309

  6. Severe Weather and Weak Waterspout Checklist in MIDDS

    NASA Technical Reports Server (NTRS)

    Wheeler, Mark M.

    2009-01-01

    The goal of this task was to migrate the functionality of the AMU web-based Severe Weather Forecast Decision Aid and the 45 WS Weak Waterspout Checklist to MIDDS, the operational data ingest and display system of the 45 WS. Forecasting the occurrence and timing of warm season severe weather and weak waterspouts is challenging for 45 WS operational personnel. These interactive tools assist forecasters in determining the probability of issuing severe weather watches and warnings for the day. MIDDS is able retrieve many of the needed parameter values for the worksheet automatically. The AMU was able to develop user-friendly tools in MIDDS for both of these tools using McBASI coded programs. The tools retrieve needed values from MIDDS automatically, and require the forecaster to answer a few subjective questions. Both tools were tested and previewed to the 45 WS on MIDDS. In their previous forms, the forecasters enter values into both tools manually to output a threat index. Making these tools more automatic will reduce the possibility of human error and increase efficiency.

  7. Tie strength distribution in scientific collaboration networks

    NASA Astrophysics Data System (ADS)

    Ke, Qing; Ahn, Yong-Yeol

    2014-09-01

    Science is increasingly dominated by teams. Understanding patterns of scientific collaboration and their impacts on the productivity and evolution of disciplines is crucial to understand scientific processes. Electronic bibliography offers a unique opportunity to map and investigate the nature of scientific collaboration. Recent studies have demonstrated a counterintuitive organizational pattern of scientific collaboration networks: densely interconnected local clusters consist of weak ties, whereas strong ties play the role of connecting different clusters. This pattern contrasts itself from many other types of networks where strong ties form communities while weak ties connect different communities. Although there are many models for collaboration networks, no model reproduces this pattern. In this paper, we present an evolution model of collaboration networks, which reproduces many properties of real-world collaboration networks, including the organization of tie strengths, skewed degree and weight distribution, high clustering, and assortative mixing.

  8. Growing up with the threat of nuclear war: some indirect effects on personality development

    SciTech Connect

    Escalona, S.K.

    1982-10-01

    The effects of the nuclear peril upon youngsters in middle childhood are considered, with particular emphasis on the extent to which ego strengths and weaknesses are influenced by adult behavior. It is suggested that the adult response to a pervasive danger such as the nuclear arms build-up shapes children's views of the trustworthiness of adult society and defines the limits of their growth and development.

  9. On the possibility of detecting weak magnetic fields in variable white dwarfs

    NASA Technical Reports Server (NTRS)

    Jones, Philip W.; Hansen, Carl J.; Pesnell, W. Dean; Kawaler, Steven D.

    1989-01-01

    It is suggested that 'weak' magnetic fields of strengths less than 10 to the 6th G may be detectable in some variable white dwarfs. Weak fields can cause subtle changes in the Fourier power spectra of these stars in the form of 'splitting' in frequency of otherwise degenerate signals. Present-day observational and analysis techniques are capable of detecting these changes. It is suggested suggested, by listing some well-studied candidate stars, that perhaps the magnetic signature of splitting has already been observed in at least one object and that the difficult task of intensive measurements of weak fields should now be undertaken of those candidates.

  10. Violation of the LeggettGarg inequality with weak measurements of photons

    PubMed Central

    Goggin, M. E.; Almeida, M. P.; Barbieri, M.; Lanyon, B. P.; OBrien, J. L.; White, A. G.; Pryde, G. J.

    2011-01-01

    By weakly measuring the polarization of a photon between two strong polarization measurements, we experimentally investigate the correlation between the appearance of anomalous values in quantum weak measurements and the violation of realism and nonintrusiveness of measurements. A quantitative formulation of the latter concept is expressed in terms of a LeggettGarg inequality for the outcomes of subsequent measurements of an individual quantum system. We experimentally violate the LeggettGarg inequality for several measurement strengths. Furthermore, we experimentally demonstrate that there is a one-to-one correlation between achieving strange weak values and violating the LeggettGarg inequality. PMID:21220296

  11. Analysis of weak interactions and Eotvos experiments

    NASA Technical Reports Server (NTRS)

    Hsu, J. P.

    1978-01-01

    The intermediate-vector-boson model is preferred over the current-current model as a basis for calculating effects due to weak self-energy. Attention is given to a possible violation of the equivalence principle by weak-interaction effects, and it is noted that effects due to weak self-energy are at least an order of magnitude greater than those due to the weak binding energy for typical nuclei. It is assumed that the weak and electromagnetic energies are independent.

  12. Women's Speech, Women's Strength?

    ERIC Educational Resources Information Center

    Coates, Jennifer

    A discussion of women's oral discourse patterns focuses on the uses made of minimal responses, hedges, and tag questions. The analysis draws on transcriptions of conversations among a group of women friends over a period of months. It is proposed that the conventional treatment of these forms as "weak" is inappropriate in all-female discourse. In

  13. Weak magnetic fields in early-type stars: failed fossils

    NASA Astrophysics Data System (ADS)

    Braithwaite, Jonathan; Cantiello, Matteo

    2013-02-01

    Weak magnetic fields have recently been detected in Vega and Sirius. Here, we explore the possibility that these fields are the remnants of some field inherited or created during or shortly after star formation and are still evolving dynamically as we observe them. The time-scale of this evolution is given in terms of the Alfvn time-scale and the rotation frequency by ?evol ?2A ?, which is then comparable to the age of the star. According to this theory, all intermediate- and high-mass stars should contain fields of at least the strength found so far in Vega and Sirius. Faster rotators are expected to have stronger magnetic fields. Stars may experience an increase in surface field strength during their early main sequence, but for most of their lives field strength will decrease slowly. The length scale of the magnetic structure on the surface may be small in very young stars but should quickly increase to at least very approximately a fifth of the stellar radius. The field strength may be higher at the poles than at the equator.

  14. Fast Learning with Weak Synaptic Plasticity.

    PubMed

    Yger, Pierre; Stimberg, Marcel; Brette, Romain

    2015-09-30

    New sensory stimuli can be learned with a single or a few presentations. Similarly, the responses of cortical neurons to a stimulus have been shown to increase reliably after just a few repetitions. Long-term memory is thought to be mediated by synaptic plasticity, but in vitro experiments in cortical cells typically show very small changes in synaptic strength after a pair of presynaptic and postsynaptic spikes. Thus, it is traditionally thought that fast learning requires stronger synaptic changes, possibly because of neuromodulation. Here we show theoretically that weak synaptic plasticity can, in fact, support fast learning, because of the large number of synapses N onto a cortical neuron. In the fluctuation-driven regime characteristic of cortical neurons in vivo, the size of membrane potential fluctuations grows only as √N, whereas a single output spike leads to potentiation of a number of synapses proportional to N. Therefore, the relative effect of a single spike on synaptic potentiation grows as √N. This leverage effect requires precise spike timing. Thus, the large number of synapses onto cortical neurons allows fast learning with very small synaptic changes. Significance statement: Long-term memory is thought to rely on the strengthening of coactive synapses. This physiological mechanism is generally considered to be very gradual, and yet new sensory stimuli can be learned with just a few presentations. Here we show theoretically that this apparent paradox can be solved when there is a tight balance between excitatory and inhibitory input. In this case, small synaptic modifications applied to the many synapses onto a given neuron disrupt that balance and produce a large effect even for modifications induced by a single stimulus. This effect makes fast learning possible with small synaptic changes and reconciles physiological and behavioral observations. PMID:26424883

  15. Protected areas in tropical Africa: assessing threats and conservation activities.

    PubMed

    Tranquilli, Sandra; Abedi-Lartey, Michael; Abernethy, Katharine; Amsini, Fidèle; Asamoah, Augustus; Balangtaa, Cletus; Blake, Stephen; Bouanga, Estelle; Breuer, Thomas; Brncic, Terry M; Campbell, Geneviève; Chancellor, Rebecca; Chapman, Colin A; Davenport, Tim R B; Dunn, Andrew; Dupain, Jef; Ekobo, Atanga; Eno-Nku, Manasseh; Etoga, Gilles; Furuichi, Takeshi; Gatti, Sylvain; Ghiurghi, Andrea; Hashimoto, Chie; Hart, John A; Head, Josephine; Hega, Martin; Herbinger, Ilka; Hicks, Thurston C; Holbech, Lars H; Huijbregts, Bas; Kühl, Hjalmar S; Imong, Inaoyom; Yeno, Stephane Le-Duc; Linder, Joshua; Marshall, Phil; Lero, Peter Minasoma; Morgan, David; Mubalama, Leonard; N'Goran, Paul K; Nicholas, Aaron; Nixon, Stuart; Normand, Emmanuelle; Nziguyimpa, Leonidas; Nzooh-Dongmo, Zacharie; Ofori-Amanfo, Richard; Ogunjemite, Babafemi G; Petre, Charles-Albert; Rainey, Hugo J; Regnaut, Sebastien; Robinson, Orume; Rundus, Aaron; Sanz, Crickette M; Okon, David Tiku; Todd, Angelique; Warren, Ymke; Sommer, Volker

    2014-01-01

    Numerous protected areas (PAs) have been created in Africa to safeguard wildlife and other natural resources. However, significant threats from anthropogenic activities and decline of wildlife populations persist, while conservation efforts in most PAs are still minimal. We assessed the impact level of the most common threats to wildlife within PAs in tropical Africa and the relationship of conservation activities with threat impact level. We collated data on 98 PAs with tropical forest cover from 15 countries across West, Central and East Africa. For this, we assembled information about local threats as well as conservation activities from published and unpublished literature, and questionnaires sent to long-term field workers. We constructed general linear models to test the significance of specific conservation activities in relation to the threat impact level. Subsistence and commercial hunting were identified as the most common direct threats to wildlife and found to be most prevalent in West and Central Africa. Agriculture and logging represented the most common indirect threats, and were most prevalent in West Africa. We found that the long-term presence of conservation activities (such as law enforcement, research and tourism) was associated with lower threat impact levels. Our results highlight deficiencies in the management effectiveness of several PAs across tropical Africa, and conclude that PA management should invest more into conservation activities with long-term duration. PMID:25469888

  16. Does Manipulating Stereotype Threat Condition Change Performance Goal State

    ERIC Educational Resources Information Center

    Simmons, Cecil Max

    2010-01-01

    This study tested whether the Stereotype Threat effect is mediated by achievement goals, in particular performance-avoidance goals. Threat level was altered before a difficult math test to observe how the endorsement by females of various achievement goal dimensions was affected. 222 people (96 females) in a pre-calculus class at a Mid-Western…

  17. Threat-Related Attentional Bias in Anxious Youth: A Review

    ERIC Educational Resources Information Center

    Puliafico, Anthony C.; Kendall, Philip C.

    2006-01-01

    The research literature suggests that children and adolescents suffering from anxiety disorders experience cognitive distortions that magnify their perceived level of threat in the environment. Of these distortions, an attentional bias toward threat-related information has received the most theoretical and empirical consideration. A large volume…

  18. Protected Areas in Tropical Africa: Assessing Threats and Conservation Activities

    PubMed Central

    Tranquilli, Sandra; Abedi-Lartey, Michael; Abernethy, Katharine; Amsini, Fidèle; Asamoah, Augustus; Balangtaa, Cletus; Blake, Stephen; Bouanga, Estelle; Breuer, Thomas; Brncic, Terry M.; Campbell, Geneviève; Chancellor, Rebecca; Chapman, Colin A.; Davenport, Tim R. B.; Dunn, Andrew; Dupain, Jef; Ekobo, Atanga; Eno-Nku, Manasseh; Etoga, Gilles; Furuichi, Takeshi; Gatti, Sylvain; Ghiurghi, Andrea; Hashimoto, Chie; Hart, John A.; Head, Josephine; Hega, Martin; Herbinger, Ilka; Hicks, Thurston C.; Holbech, Lars H.; Huijbregts, Bas; Kühl, Hjalmar S.; Imong, Inaoyom; Yeno, Stephane Le-Duc; Linder, Joshua; Marshall, Phil; Lero, Peter Minasoma; Morgan, David; Mubalama, Leonard; N'Goran, Paul K.; Nicholas, Aaron; Nixon, Stuart; Normand, Emmanuelle; Nziguyimpa, Leonidas; Nzooh-Dongmo, Zacharie; Ofori-Amanfo, Richard; Ogunjemite, Babafemi G.; Petre, Charles-Albert; Rainey, Hugo J.; Regnaut, Sebastien; Robinson, Orume; Rundus, Aaron; Sanz, Crickette M.; Okon, David Tiku; Todd, Angelique; Warren, Ymke; Sommer, Volker

    2014-01-01

    Numerous protected areas (PAs) have been created in Africa to safeguard wildlife and other natural resources. However, significant threats from anthropogenic activities and decline of wildlife populations persist, while conservation efforts in most PAs are still minimal. We assessed the impact level of the most common threats to wildlife within PAs in tropical Africa and the relationship of conservation activities with threat impact level. We collated data on 98 PAs with tropical forest cover from 15 countries across West, Central and East Africa. For this, we assembled information about local threats as well as conservation activities from published and unpublished literature, and questionnaires sent to long-term field workers. We constructed general linear models to test the significance of specific conservation activities in relation to the threat impact level. Subsistence and commercial hunting were identified as the most common direct threats to wildlife and found to be most prevalent in West and Central Africa. Agriculture and logging represented the most common indirect threats, and were most prevalent in West Africa. We found that the long-term presence of conservation activities (such as law enforcement, research and tourism) was associated with lower threat impact levels. Our results highlight deficiencies in the management effectiveness of several PAs across tropical Africa, and conclude that PA management should invest more into conservation activities with long-term duration. PMID:25469888

  19. Superior Detection of Threat-Relevant Stimuli in Infancy

    ERIC Educational Resources Information Center

    LoBue, Vanessa; DeLoache, Judy S.

    2010-01-01

    The ability to quickly detect potential threat is an important survival mechanism for humans and other animals. Past research has established that adults have an attentional bias for the detection of threat-relevant stimuli, including snakes and spiders as well as angry human faces. Recent studies have documented that preschool children also…

  20. A Stereotype Threat Account of Boys' Academic Underachievement

    ERIC Educational Resources Information Center

    Hartley, Bonny L.; Sutton, Robbie M.

    2013-01-01

    Three studies examined the role of stereotype threat in boys' academic underachievement. Study 1 (children aged 4-10, n = 238) showed that girls from age 4 years and boys from age 7 years believed, and thought adults believed, that boys are academically inferior to girls. Study 2 manipulated stereotype threat, informing children aged…

  1. 49 CFR 1540.203 - Security threat assessment.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... check conducted by TSA. (2) A security threat assessment conducted under 49 CFR part 1572 for the..., directors, and owners of an indirect air carrier, as described in § 1548.16. (5) Personnel of certified... provide it may delay or prevent completion of the threat assessment). (5) Gender. (6) Country...

  2. Does Manipulating Stereotype Threat Condition Change Performance Goal State

    ERIC Educational Resources Information Center

    Simmons, Cecil Max

    2010-01-01

    This study tested whether the Stereotype Threat effect is mediated by achievement goals, in particular performance-avoidance goals. Threat level was altered before a difficult math test to observe how the endorsement by females of various achievement goal dimensions was affected. 222 people (96 females) in a pre-calculus class at a Mid-Western

  3. Attention Bias toward Threat in Pediatric Anxiety Disorders

    ERIC Educational Resources Information Center

    Roy, Amy Krain; Vasa, Roma A.; Bruck, Maggie; Mogg, Karin; Bradley, Brendan P.; Sweeney, Michael; Bergman, R. Lindsey; McClure-Tone, Erin B.; Pine, Daniel S.

    2008-01-01

    Attention bias towards threat faces is examined for a large sample of anxiety-disordered youths using visual probe task. The results showed that anxious individuals showed a selective bias towards threat due to perturbation in neural mechanisms that control vigilance.

  4. 49 CFR 1540.203 - Security threat assessment.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Security threat assessment. 1540.203 Section 1540.203 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CIVIL AVIATION SECURITY: GENERAL RULES Security Threat Assessments §...

  5. A Developmental Perspective on the Virginia Student Threat Assessment Guidelines

    ERIC Educational Resources Information Center

    Cornell, Dewey G.

    2011-01-01

    The Virginia Student Threat Assessment Guidelines were developed to help multidisciplinary school-based teams use a decision tree to evaluate student threats and take appropriate preventive action. A main goal of this approach is to allow school-based teams to recognize and respond to the developmental complexities of children and adolescents…

  6. Bio-threat preparedness: Need for a paradigm shift

    PubMed Central

    Jindal, A.K.; Roy, Kaushik

    2014-01-01

    India of late has been vulnerable to Chemical, Biological, Radiological and Nuclear (CBRN) threat, on account of its unique geographic position. Biological threat is an imminent threat in the hands of a terrorist. The public health system of our country is overburdened due to its present role and bio-attack response is not a priority area. This paper suggests that as the prime focus is on the CR and N threats in the integrated CBRN preparedness strategy and that specialized and technical forces are needed to deal with a bio-threat; hence there is a need for a paradigm shift in policy. The emerging field of bio-threat needs to be delinked from the joint family of ‘CBRN’, with consequent structural and functional changes. A separate specialized cadre needs to be formed for dealing with bio-threat, created from the pool of doctors and non-medical scientists from the AFMS and the DRDO. Structural changes are needed in the organization, to bring in the resources of NCDC, New Delhi for enhanced disease surveillance capacity and creation of a bio-threat mitigation node in the AFMC, Pune. PMID:24843207

  7. Research in Review. Children Living with the Nuclear Threat.

    ERIC Educational Resources Information Center

    Reifel, Stuart

    1984-01-01

    Reviews the literature on children and the threat of nuclear war, focusing on four areas: awareness of nuclear weapons, fear of the bomb, influences on personality, and denial of the threat. The research is briefly critiqued, and implications for early childhood are drawn. (RH)

  8. Lack of Stereotype Threat at a Liberal Arts College

    ERIC Educational Resources Information Center

    Rivardo, Mark G.; Rhodes, Michael E.; Klein, Brandi

    2008-01-01

    Stereotype threat has been demonstrated to reduce the performance of stereotyped individuals in the threatened domain (Steele & Aronson, 1995). This study attempted to replicate the finding that stereotype threat instruction can erase the performance deficit women experience in math performance (Johns, Schmader, & Martens, 2005) and to further…

  9. 41 CFR 60-741.22 - Direct threat defense.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Direct threat defense. 60... Contracts OFFICE OF FEDERAL CONTRACT COMPLIANCE PROGRAMS, EQUAL EMPLOYMENT OPPORTUNITY, DEPARTMENT OF LABOR... INDIVIDUALS WITH DISABILITIES Discrimination Prohibited 60-741.22 Direct threat defense. The contractor...

  10. 41 CFR 60-300.22 - Direct threat defense.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 1 2013-07-01 2013-07-01 false Direct threat defense... Public Contracts OFFICE OF FEDERAL CONTRACT COMPLIANCE PROGRAMS, EQUAL EMPLOYMENT OPPORTUNITY, DEPARTMENT... MEDAL VETERANS Discrimination Prohibited 60-300.22 Direct threat defense. The contractor may use as...

  11. 41 CFR 60-300.22 - Direct threat defense.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 41 Public Contracts and Property Management 1 2012-07-01 2009-07-01 true Direct threat defense. 60... Contracts OFFICE OF FEDERAL CONTRACT COMPLIANCE PROGRAMS, EQUAL EMPLOYMENT OPPORTUNITY, DEPARTMENT OF LABOR... VETERANS Discrimination Prohibited 60-300.22 Direct threat defense. The contractor may use as...

  12. 41 CFR 60-250.22 - Direct threat defense.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Direct threat defense. 60... Contracts OFFICE OF FEDERAL CONTRACT COMPLIANCE PROGRAMS, EQUAL EMPLOYMENT OPPORTUNITY, DEPARTMENT OF LABOR... VETERANS Discrimination Prohibited 60-250.22 Direct threat defense. The contractor may use as...

  13. 41 CFR 60-741.22 - Direct threat defense.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 41 Public Contracts and Property Management 1 2011-07-01 2009-07-01 true Direct threat defense. 60... Contracts OFFICE OF FEDERAL CONTRACT COMPLIANCE PROGRAMS, EQUAL EMPLOYMENT OPPORTUNITY, DEPARTMENT OF LABOR... INDIVIDUALS WITH DISABILITIES Discrimination Prohibited 60-741.22 Direct threat defense. The contractor...

  14. 41 CFR 60-250.22 - Direct threat defense.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 41 Public Contracts and Property Management 1 2011-07-01 2009-07-01 true Direct threat defense. 60... Contracts OFFICE OF FEDERAL CONTRACT COMPLIANCE PROGRAMS, EQUAL EMPLOYMENT OPPORTUNITY, DEPARTMENT OF LABOR... VETERANS Discrimination Prohibited 60-250.22 Direct threat defense. The contractor may use as...

  15. 41 CFR 60-250.22 - Direct threat defense.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 41 Public Contracts and Property Management 1 2012-07-01 2009-07-01 true Direct threat defense. 60... Contracts OFFICE OF FEDERAL CONTRACT COMPLIANCE PROGRAMS, EQUAL EMPLOYMENT OPPORTUNITY, DEPARTMENT OF LABOR... VETERANS Discrimination Prohibited 60-250.22 Direct threat defense. The contractor may use as...

  16. 41 CFR 60-250.22 - Direct threat defense.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 1 2013-07-01 2013-07-01 false Direct threat defense... Public Contracts OFFICE OF FEDERAL CONTRACT COMPLIANCE PROGRAMS, EQUAL EMPLOYMENT OPPORTUNITY, DEPARTMENT... PROTECTED VETERANS Discrimination Prohibited 60-250.22 Direct threat defense. The contractor may use as...

  17. 41 CFR 60-300.22 - Direct threat defense.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 41 Public Contracts and Property Management 1 2011-07-01 2009-07-01 true Direct threat defense. 60... Contracts OFFICE OF FEDERAL CONTRACT COMPLIANCE PROGRAMS, EQUAL EMPLOYMENT OPPORTUNITY, DEPARTMENT OF LABOR... VETERANS Discrimination Prohibited 60-300.22 Direct threat defense. The contractor may use as...

  18. 41 CFR 60-300.22 - Direct threat defense.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Direct threat defense. 60... Contracts OFFICE OF FEDERAL CONTRACT COMPLIANCE PROGRAMS, EQUAL EMPLOYMENT OPPORTUNITY, DEPARTMENT OF LABOR... VETERANS Discrimination Prohibited 60-300.22 Direct threat defense. The contractor may use as...

  19. 41 CFR 60-741.22 - Direct threat defense.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 41 Public Contracts and Property Management 1 2012-07-01 2009-07-01 true Direct threat defense. 60... Contracts OFFICE OF FEDERAL CONTRACT COMPLIANCE PROGRAMS, EQUAL EMPLOYMENT OPPORTUNITY, DEPARTMENT OF LABOR... INDIVIDUALS WITH DISABILITIES Discrimination Prohibited 60-741.22 Direct threat defense. The contractor...

  20. 41 CFR 60-741.22 - Direct threat defense.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 1 2013-07-01 2013-07-01 false Direct threat defense... Public Contracts OFFICE OF FEDERAL CONTRACT COMPLIANCE PROGRAMS, EQUAL EMPLOYMENT OPPORTUNITY, DEPARTMENT... REGARDING INDIVIDUALS WITH DISABILITIES Discrimination Prohibited 60-741.22 Direct threat defense....

  1. The Practice of Campus-Based Threat Assessment: An Overview

    ERIC Educational Resources Information Center

    Pollard, Jeffrey W.; Nolan, Jeffrey J.; Deisinger, Eugene R. D.

    2012-01-01

    This article provides an overview of threat assessment and management as implemented on campuses of higher education. Standards of practice and state calls for implementation are cited. An overview of some of the basic principles for threat assessment and management implementation is accompanied by examples of how they are utilized. Pitfalls…

  2. Creating Safe Learning Zones: Invisible Threats, Visible Actions.

    ERIC Educational Resources Information Center

    2002

    This report is a follow-up to the first publication of the Child Proofing Our Communities Campaign, titled "Poisoned Schools: Invisible Threats, Visible Actions." The previous report looked at the problems of public schools built on contaminated land years ago, the trend of proposing new schools on contaminated land, and the threat of toxic…

  3. 49 CFR 1540.203 - Security threat assessment.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... check conducted by TSA. (2) A security threat assessment conducted under 49 CFR part 1572 for the... residential addresses for the previous five years; and e-mail address if the applicant has an e-mail address... threat assessment conducted for the Free and Secure Trade (FAST) program administered by U.S. Customs...

  4. Investigating Hypervigilance for Social Threat of Lonely Children

    ERIC Educational Resources Information Center

    Qualter, Pamela; Rotenberg, Ken; Barrett, Louise; Henzi, Peter; Barlow, Alexandra; Stylianou, Maria; Harris, Rebecca A.

    2013-01-01

    The hypothesis that lonely children show hypervigilance for social threat was examined in a series of three studies that employed different methods including advanced eye-tracking technology. Hypervigilance for social threat was operationalized as hostility to ambiguously motivated social exclusion in a variation of the hostile attribution…

  5. Threat Level High (School): Curriculum Reform with Violence in Mind

    ERIC Educational Resources Information Center

    Hawkes, T. Elijah; Twemlow, Stuart W.

    2015-01-01

    When school communities are troubled by violence, or threats of violence, at the hands of young people, educators have an opportunity to learn about aggression and adolescent identity development. A disturbing threat incident provides the point of departure for this principal's reflection on how high school curriculum can better meet the identity…

  6. Threat Level High (School): Curriculum Reform with Violence in Mind

    ERIC Educational Resources Information Center

    Hawkes, T. Elijah; Twemlow, Stuart W.

    2015-01-01

    When school communities are troubled by violence, or threats of violence, at the hands of young people, educators have an opportunity to learn about aggression and adolescent identity development. A disturbing threat incident provides the point of departure for this principal's reflection on how high school curriculum can better meet the identity

  7. Superior Detection of Threat-Relevant Stimuli in Infancy

    ERIC Educational Resources Information Center

    LoBue, Vanessa; DeLoache, Judy S.

    2010-01-01

    The ability to quickly detect potential threat is an important survival mechanism for humans and other animals. Past research has established that adults have an attentional bias for the detection of threat-relevant stimuli, including snakes and spiders as well as angry human faces. Recent studies have documented that preschool children also

  8. A Stereotype Threat Account of Boys' Academic Underachievement

    ERIC Educational Resources Information Center

    Hartley, Bonny L.; Sutton, Robbie M.

    2013-01-01

    Three studies examined the role of stereotype threat in boys' academic underachievement. Study 1 (children aged 4-10, n=238) showed that girls from age 4years and boys from age 7years believed, and thought adults believed, that boys are academically inferior to girls. Study 2 manipulated stereotype threat, informing children aged

  9. Investigating Hypervigilance for Social Threat of Lonely Children

    ERIC Educational Resources Information Center

    Qualter, Pamela; Rotenberg, Ken; Barrett, Louise; Henzi, Peter; Barlow, Alexandra; Stylianou, Maria; Harris, Rebecca A.

    2013-01-01

    The hypothesis that lonely children show hypervigilance for social threat was examined in a series of three studies that employed different methods including advanced eye-tracking technology. Hypervigilance for social threat was operationalized as hostility to ambiguously motivated social exclusion in a variation of the hostile attribution

  10. An Integrated Process Model of Stereotype Threat Effects on Performance

    ERIC Educational Resources Information Center

    Schmader, Toni; Johns, Michael; Forbes, Chad

    2008-01-01

    Research showing that activation of negative stereotypes can impair the performance of stigmatized individuals on a wide variety of tasks has proliferated. However, a complete understanding of the processes underlying these stereotype threat effects on behavior is still lacking. The authors examine stereotype threat in the context of research on…

  11. Countering GPS jamming and EW threat

    NASA Astrophysics Data System (ADS)

    Pereira, Carlos M.; Rastegar, J.; McLain, Clifford E.; Alanson, T.; McMullan, Charles; Nguyen, H.-L.

    2007-09-01

    Efforts at the U.S. Army Research, Development and Engineering Center (ARDEC) at Picatinny, New Jersey are focused on developing methods to counter GPS jamming and electronic warfare (EW) threat by eliminating GPS dependency entirely. In addition, the need for munitions cost reduction requires alternatives to expensive high-grade inertia components. Efforts at ARDEC include investigations of novel methods for onboard measurement of munitions full position and angular orientation independent of GPS signals or high-grade inertia components. Currently, two types of direct angular measurement sensors are being investigated. A first sensor, Radio Frequency Polarized Sensor (RFPS), uses an electromagnetic field as a reference. A second sensor is based on magnetometers, using the Earth magnetic field for orientation measurement. Magnetometers, however, can only provide two independent orientation measurements. The RFPS may also be used to make full object position and angular orientation measurement relative to a reference coordinate system, which may be moving or stationary. The potential applications of novel RFPS sensors is in providing highly effective inexpensive replacement for GPS, which could be used in a "Layered Navigation" scheme employing alternate referencing methods and reduce the current dependency on GPS as a primary reference for guided gun-fired munitions. Other potential applications of RFPSs is in UAVs, UGVs, and robotic platforms.

  12. Integrated optic chip for laser threat identification

    NASA Astrophysics Data System (ADS)

    McAulay, Alastair D.

    2010-04-01

    In this conference last year, we proposed free-space gratings, Fizeau interferometers and wavefront estimation for detecting the different lasers deployed in the battlefield for range finding, target designation, communications, dazzle, location of targets, munitions guidance, and destruction. Since last year, advanced laser weapons of the electron cyclotron type, are in development, such as the free-electron laser, that are tunable and can, unlike conventional bound-electron state lasers, be used at any wavelength from microwaves to soft X-rays. We list the characteristics of the nine dominant laser weapons because we assume that the free-electron lasers will initially use one of the current threat wavelengths because of availability of components and instrumentation. In this paper we replace the free-space grating with a higher performing array waveguide grating integrated optic chip, similar to that used in telecommunications, because integrated circuits are more robust and less expensive. It consists of a star coupler that fans out amongst waveguides of different length followed by a star coupler that focuses different wavelengths to different outputs in order to separate them. Design equations are derived to cover a range of frequencies at specific frequency spacing relevant to this application.

  13. Biological warfare--an emerging threat.

    PubMed

    Agarwal, Reshma; Shukla, S K; Dharmani, S; Gandhi, A

    2004-09-01

    As we approach the 21st century, there is an increasing worldwide awareness and threat regarding the use of biological warfare agents both for war and terrorist attack. Biological agents include microorganisms or biological toxins that are used to produce death in humans, animals and plants. They are characterized by low visibility, high potency, substantial accessibility and relatively easy delivery. Biological warfare agents are unconventional weapons that can be delivered by unconventional means like aerosol sprays, food and water contamination, conventional explosive munitions or by covert injections. Because of their concealed delivery, easy transportation and difficult identification they are readily adaptable for terrorist operations or to gain political advantages. The detection of such attack requires recognition of the clinical syndromes associated with various biological warfare agents. Diagnosis can be made on clinical grounds and on investigations. Protective measures can be taken against biological warfare agents. These should be implemented early (if warning is received) or later (once suspicion of agent use is made). After the confirmation of diagnosis emergency medical treatment and decontamination are performed in rapid sequence. Patients are then evacuated and specific therapy is given according to the agent involved. Appropriate emergency department and hospital response could significantly limit the morbidity and mortality of biological warfare agents. PMID:15839453

  14. Environmental degradation and environmental threats in China.

    PubMed

    Wang, Ying

    2004-01-01

    The article presents a review of environmental degradation and its threats in China. Air pollution, water pollution, deforestation, soil degradation, sand depositing in dams, decaying urban infrastructure, and more and more hazards such as floods, landslides and soil erosion are major consequences of environmental degradation and are making tremendous loss both in life and property. Through investigation, the author found that poor air quality in the large cities; water pollution in the downstream of many rivers; the multiple problems of many mining areas; lack of access to fresh water; decaying sewage systems; and the disastrous impact of these environmental degradations on public health and agricultural products in many provinces is rather serious. Relationship of environmental degradation and natural hazards is close; more attention should be put in environmental degradation that may surpass economy progress if the trend continues. It is therefore imperative that Chinese government undertake a series of prudent actions now that will enable to be in the best possible position when the current environmental crisis ultimately passes. PMID:15887370

  15. [Chikungunya fever - A new global threat].

    PubMed

    Montero, Antonio

    2015-08-01

    The recent onset of epidemics caused by viruses such as Ebola, Marburg, Nipah, Lassa, coronavirus, West-Nile encephalitis, Saint Louis encephalitis, human immunodeficiency virus, dengue, yellow fever and Venezuelan hemorrhagic fever alerts about the risk these agents represent for the global health. Chikungunya virus represents a new threat. Surged from remote African regions, this virus has become endemic in the Indic ocean basin, the Indian subcontinent and the southeast of Asia, causing serious epidemics in Africa, Indic Ocean Islands, Asia and Europe. Due to their epidemiological and biological features and the global presence of their vectors, chikungunya represents a serious menace and could become endemic in the Americas. Although chikungunya infection has a low mortality rate, its high attack ratio may collapse the health system during epidemics affecting a sensitive population. In this paper, we review the clinical and epidemiological features of chikungunya fever as well as the risk of its introduction into the Americas. We remark the importance of the epidemiological control and mosquitoes fighting in order to prevent this disease from being introduced into the Americas. PMID:25087211

  16. Superluminous Supernovae: No Threat from Eta Carinae

    NASA Astrophysics Data System (ADS)

    Thomas, Brian; Melott, A. L.; Fields, B. D.; Anthony-Twarog, B. J.

    2008-05-01

    Recently Supernova 2006gy was noted as the most luminous ever recorded, with a total radiated energy of 1044 Joules. It was proposed that the progenitor may have been a massive evolved star similar to η Carinae, which resides in our own galaxy at a distance of about 2.3 kpc. η Carinae appears ready to detonate. Although it is too distant to pose a serious threat as a normal supernova, and given its rotation axis is unlikely to produce a Gamma-Ray Burst oriented toward the Earth, η Carinae is about 30,000 times nearer than 2006gy, and we re-evaluate it as a potential superluminous supernova. We find that given the large ratio of emission in the optical to the X-ray, atmospheric effects are negligible. Ionization of the atmosphere and concomitant ozone depletion are unlikely to be important. Any cosmic ray effects should be spread out over 104 y, and similarly unlikely to produce any serious perturbation to the biosphere. We also discuss a new possible effect of supernovae, endocrine disruption induced by blue light near the peak of the optical spectrum. This is a possibility for nearby supernovae at distances too large to be considered "dangerous” for other reasons. However, due to reddening and extinction by the interstellar medium, η Carinae is unlikely to trigger such effects to any significant degree.

  17. Recognizing the real threat of biological terror.

    PubMed

    Wenzel, Richard P

    2002-01-01

    Weapons of mass destruction can be used to harm and terrorize populations. Such weapons include those with chemical, nuclear or biological properties. Obviously computer viruses can add additional barriers to a quick response. The most effective, least costly and greatest threats are biologicals. Biological terror is not new, and biological weapons have been used for centuries. However, as a result of modern technology, the risks are greater now and the outcomes more terrible. Today they include live pathogens, various toxins, and theoretically "bioregulators"--biochemicals affecting cell signaling. Altered cell signaling could be used to induce apoptosis-cell death, or a heightened outpouring of cytokines mimicking overwhelming sepsis, or even an intracellular, biochemical "strike" causing cellular paralysis. Biological weaponeers now have the frightening ability to alter the genetic makeup of pathogens, rendering them resistant not only to available antibiotic therapy but also to currently effective vaccines. In dark corners of some fringe groups, bioweaponeers are searching for the capability of designing pathogens that target specific races, by virtue of discriminating ligands (1). The resulting morbidity and mortality from use of any biological weapons will be accompanied by chaos, governmental and social instability, panic, an extraordinary utilization of available resources, and an ongoing epidemic of sleepless nights (2,3). Herein I will review some of the issues and some of the currently available biological weapons. The major goal is to highlight the clinical presentations of patients with infections that could be used as biological weapons. PMID:12053717

  18. On security threats for robust perceptual hashing

    NASA Astrophysics Data System (ADS)

    Koval, O.; Voloshynovskiy, S.; Bas, P.; Cayre, F.

    2009-02-01

    Perceptual hashing has to deal with the constraints of robustness, accuracy and security. After modeling the process of hash extraction and the properties involved in this process, two different security threats are studied, namely the disclosure of the secret feature space and the tampering of the hash. Two different approaches for performing robust hashing are presented: Random-Based Hash (RBH) where the security is achieved using a random projection matrix and Content-Based Hash (CBH) were the security relies on the difficulty to tamper the hash. As for digital watermarking, different security setups are also devised: the Batch Hash Attack, the Group Hash Attack, the Unique Hash Attack and the Sensitivity Attack. A theoretical analysis of the information leakage in the context of Random-Based Hash is proposed. Finally, practical attacks are presented: (1) Minor Component Analysis is used to estimate the secret projection of Random-Based Hashes and (2) Salient point tampering is used to tamper the hash of Content-Based Hashes systems.

  19. A Threats Blocking Plug-in for Open Source Learning Management Systems

    NASA Astrophysics Data System (ADS)

    Braga, Gianluca; Sterbini, Andrea; Temperini, Marco

    Web-based Learning Management Systems, as in the nature of web-applications, are subject to attacks delivered through Internet, mainly aiming at accessing restricted data for illegal use. Protection from these kinds of threats is studied in the area of web applications and has been steadily improving in the last years. Nonetheless, especially in the area of very popular and easy-to-install web applications, such as Content Managements Systems, Blogs, and open source Learning Management Systems, the usual way to protect an installed system is to wait that weaknesses in the system software are discovered, and "patches" or new system releases are made available for installation. And this can be necessary also in cases in which no new threat technique has been discovered, while just another part of the system software has been detected as "weak" to that type of attack. Here we give an account of the most usual "exploit" techniques, known to be available, and describe a prototype methodology to equip certain Learning Management Systems (namely the open source ones, in particular those based on PHP engines) with a more stable protection, making it unnecessary to patch, or reinstall, a system in a hurry, after that minor weaknesses have been unveiled. The plug-in for a system is supposed to filter the input, sent by the user through a browser, and to avoid execution of server activities on suspect data. We test the methodology on Moodle, by producing a suitable plug-in, and verifying its success at system run-time.

  20. Masculine voices signal men's threat potential in forager and industrial societies

    PubMed Central

    Puts, David A.; Apicella, Coren L.; Cárdenas, Rodrigo A.

    2012-01-01

    Humans and many non-human primates exhibit large sexual dimorphisms in vocalizations and vocal anatomy. In humans, same-sex competitors and potential mates attend to acoustic features of male vocalizations, but vocal masculinity especially increases perceptions of physical prowess. Yet, the information content of male vocalizations remains obscure. We therefore examined relationships between sexually dimorphic acoustic properties and men's threat potential. We first introduce a new measure of the structure of vocal formant frequencies, ‘formant position’ (Pf), which we show is more sexually dimorphic and more strongly related to height than is the most widely used measure of formant structure, ‘formant dispersion’, in both a US sample and a sample of Hadza foragers from Tanzania. We also show large sexual dimorphisms in the mean fundamental frequency (F0) and the within-utterance standard deviation in F0 (F0 − s.d.) in both samples. We then explore relationships between these acoustic parameters and men's body size, strength, testosterone and physical aggressiveness. Each acoustic parameter was related to at least one measure of male threat potential. The most dimorphic parameters, F0 and Pf, were most strongly related to body size in both samples. In the US sample, F0 predicted testosterone levels, Pf predicted upper body strength and F0 − s.d. predicted physical aggressiveness. PMID:21752821