Science.gov

Sample records for weaknesses threats strengths

  1. Big Data and Health Economics: Strengths, Weaknesses, Opportunities and Threats.

    PubMed

    Collins, Brendan

    2016-02-01

    'Big data' is the collective name for the increasing capacity of information systems to collect and store large volumes of data, which are often unstructured and time stamped, and to analyse these data by using regression and other statistical techniques. This is a review of the potential applications of big data and health economics, using a SWOT (strengths, weaknesses, opportunities, threats) approach. In health economics, large pseudonymized databases, such as the planned care.data programme in the UK, have the potential to increase understanding of how drugs work in the real world, taking into account adherence, co-morbidities, interactions and side effects. This 'real-world evidence' has applications in individualized medicine. More routine and larger-scale cost and outcomes data collection will make health economic analyses more disease specific and population specific but may require new skill sets. There is potential for biomonitoring and lifestyle data to inform health economic analyses and public health policy. PMID:26093888

  2. Health Education in India: A Strengths, Weaknesses, Opportunities, and Threats (SWOT) Analysis

    ERIC Educational Resources Information Center

    Sharma, Manoj

    2005-01-01

    The purpose of this study was to conduct a strengths, weaknesses, opportunities, and threats (SWOT) analysis of the health education profession and discipline in India. Materials from CINAHL, ERIC, MEDLINE, and Internet were collected to conduct the open coding of the SWOT analysis. Strengths of health education in India include an elaborate…

  3. Partitioning in aqueous two-phase systems: Analysis of strengths, weaknesses, opportunities and threats.

    PubMed

    Soares, Ruben R G; Azevedo, Ana M; Van Alstine, James M; Aires-Barros, M Raquel

    2015-08-01

    For half a century aqueous two-phase systems (ATPSs) have been applied for the extraction and purification of biomolecules. In spite of their simplicity, selectivity, and relatively low cost they have not been significantly employed for industrial scale bioprocessing. Recently their ability to be readily scaled and interface easily in single-use, flexible biomanufacturing has led to industrial re-evaluation of ATPSs. The purpose of this review is to perform a SWOT analysis that includes a discussion of: (i) strengths of ATPS partitioning as an effective and simple platform for biomolecule purification; (ii) weaknesses of ATPS partitioning in regard to intrinsic problems and possible solutions; (iii) opportunities related to biotechnological challenges that ATPS partitioning may solve; and (iv) threats related to alternative techniques that may compete with ATPS in performance, economic benefits, scale up and reliability. This approach provides insight into the current status of ATPS as a bioprocessing technique and it can be concluded that most of the perceived weakness towards industrial implementation have now been largely overcome, thus paving the way for opportunities in fermentation feed clarification, integration in multi-stage operations and in single-step purification processes. PMID:26213222

  4. Model-based drug development: strengths, weaknesses, opportunities, and threats for broad application of pharmacometrics in drug development.

    PubMed

    Wetherington, Jeffrey D; Pfister, Marc; Banfield, Christopher; Stone, Julie A; Krishna, Rajesh; Allerheiligen, Sandy; Grasela, Dennis M

    2010-09-01

    Systematic implementation of model-based drug development (MBDD) to drug discovery and development has the potential to significantly increase the rate of medical breakthroughs and make available new and better treatments to patients. An analysis of the strengths, weaknesses, opportunities, and threats (ie, SWOT) was conducted through focus group discussions that included 24 members representing 8 pharmaceutical companies to systematically assess the challenges to implementing MBDD into the drug development decision-making process. The application of the SWOT analysis to the successful implementation of MBDD yielded 19 strengths, 27 weaknesses, 34 opportunities, and 22 threats, which support the following conclusions. The shift from empirical drug development to MBDD requires a question-based mentality; early, proactive planning; dynamic access to multisource data; quantitative knowledge integration; multidisciplinary collaboration; effective communication and leadership skills; and innovative, impactful application of pharmacometrics focused on enhancing quantitative decision making. The ultimate goal of MBDD is to streamline discovery and development of innovative medicines to benefit patients. PMID:20881215

  5. An Examination of the Strengths, Weaknesses, Opportunities, and Threats Associated with the Adoption of Moodle[TM] by eXtension

    ERIC Educational Resources Information Center

    Hightower, Tayla Elise; Murphrey, Theresa Pesl; Coppernoll, Susanna Mumm; Jahedkar, Jennifer; Dooley, Kim E.

    2011-01-01

    The use of technology to deliver programming across Extension has been addressed widely; however, little research has been conducted concerning the use of Moodle[TM] as a course management system for Extension. The purpose of the study reported here was to identify the strengths, weaknesses, opportunities, and threats associated with the use of…

  6. Special Education and Rehabilitation in Georgia: Strengths, Weakness, Opportunities, and Threats in a Newly-Independent State of the Former Soviet Union.

    ERIC Educational Resources Information Center

    Hobbs, Tim; Szydlowski, Steven; West, Daniel, Jr.; Germava, Otar

    2002-01-01

    Forty-nine Georgian professionals from the fields of health, education, and rehabilitation were brought together for a week-long workshop to discuss issues related to disability, rehabilitation, and special education. Workshop activities included a SWOT (strengths, weaknesses, opportunities, and threats) analysis of special education in Georgia.…

  7. Special Education and Rehabilitation in Georgia: Strengths, Weakness, Opportunities, and Threats in a Newly-Independent State of the Former Soviet Union.

    ERIC Educational Resources Information Center

    Hobbs, Tim; Szydlowski, Steven; West, Daniel, Jr.; Germava, Otar

    2002-01-01

    Forty-nine Georgian professionals from the fields of health, education, and rehabilitation were brought together for a week-long workshop to discuss issues related to disability, rehabilitation, and special education. Workshop activities included a SWOT (strengths, weaknesses, opportunities, and threats) analysis of special education in Georgia.…

  8. The interRAI Acute Care instrument incorporated in an eHealth system for standardized and web-based geriatric assessment: strengths, weaknesses, opportunities and threats in the acute hospital setting

    PubMed Central

    2013-01-01

    Background The interRAI Acute Care instrument is a multidimensional geriatric assessment system intended to determine a hospitalized older persons’ medical, psychosocial and functional capacity and needs. Its objective is to develop an overall plan for treatment and long-term follow-up based on a common set of standardized items that can be used in various care settings. A Belgian web-based software system (BelRAI-software) was developed to enable clinicians to interpret the output and to communicate the patients’ data across wards and care organizations. The purpose of the study is to evaluate the (dis)advantages of the implementation of the interRAI Acute Care instrument as a comprehensive geriatric assessment instrument in an acute hospital context. Methods In a cross-sectional multicenter study on four geriatric wards in three acute hospitals, trained clinical staff (nurses, occupational therapists, social workers, and geriatricians) assessed 410 inpatients in routine clinical practice. The BelRAI-system was evaluated by focus groups, observations, and questionnaires. The Strengths, Weaknesses, Opportunities and Threats were mapped (SWOT-analysis) and validated by the participants. Results The primary strengths of the BelRAI-system were a structured overview of the patients’ condition early after admission and the promotion of multidisciplinary assessment. Our study was a first attempt to transfer standardized data between home care organizations, nursing homes and hospitals and a way to centralize medical, allied health professionals and nursing data. With the BelRAI-software, privacy of data is guaranteed. Weaknesses are the time-consuming character of the process and the overlap with other assessment instruments or (electronic) registration forms. There is room for improving the user-friendliness and the efficiency of the software, which needs hospital-specific adaptations. Opportunities are a timely and systematic problem detection and continuity of care. An actual shortage of funding of personnel to coordinate the assessment process is the most important threat. Conclusion The BelRAI-software allows standardized transmural information transfer and the centralization of medical, allied health professionals and nursing data. It is strictly secured and follows strict privacy regulations, allowing hospitals to optimize (transmural) communication and interaction. However, weaknesses and threats exist and must be tackled in order to promote large scale implementation. PMID:24007312

  9. Cultural Capital: Strengths, Weaknesses and Two Advancements

    ERIC Educational Resources Information Center

    van de Werfhorst, Herman G.

    2010-01-01

    In this paper I discuss two weaknesses in Bourdieu's work on cultural capital, both of which are related to his integration of the multidimensional nature of social space in different domains of life: social mobility, lifestyle differentiation, and political orientation. First, there is an anomaly between the work on social mobility and on…

  10. The Strength of the Weak Interactions

    NASA Astrophysics Data System (ADS)

    Wolfenstein, Lincoln

    2004-12-01

    A career devoted to the study of weak interactions and fundamental symmetries is summarized. Subjects include the induced pseudoscalar coupling in muon capture, the hypothesis of a superweak interaction, the oscillation of neutrinos in matter, and a parameterization of the CKM matrix of particular importance for B physics. Also discussed are the origin of the Aspen Center for Physics and activities related to the dangers of nuclear weapons.

  11. The Hidden Strengths of Weak Theories

    PubMed Central

    Keil, Frank

    2012-01-01

    There has been a strong tradition of assuming that concepts, and their patterns of formation might be best understood in terms of how they are embedded in theory-like sets of beliefs. Although such views of concepts as embedded in theories have been criticized on five distinct grounds, there are reasonable responses to each of these usual objections. There is, however, a newly emerging concern that is much more challenging to address – people’s intuitive theories seem to be remarkably impoverished. In fact, they are so impoverished it is difficult to see how they could provide the necessary structure to explain differences between concepts and how they might form in development. One response to this recent challenge is to abandon all views of concept structure as being related to people’s intuitive theories and see concepts as essentially structure-free atoms. The alternative proposed here argues that our very weak theories might in fact do a great deal of work in explaining how we form concepts and are able to use them to successfully refer. PMID:25309684

  12. Patterns of Strengths and Weaknesses in Children's Knowledge about Fractions

    ERIC Educational Resources Information Center

    Hecht, Steven A.; Vagi, Kevin J.

    2012-01-01

    The purpose of this study was to explore individual patterns of strengths and weaknesses in children's mathematical knowledge about common fractions. Tasks that primarily measure either conceptual or procedural aspects of mathematical knowledge were assessed with the same children in their fourth- and fifth-grade years (N = 181, 56% female and 44%…

  13. School-Based Sexuality Education in Portugal: Strengths and Weaknesses

    ERIC Educational Resources Information Center

    Rocha, Ana Cristina; Leal, Cláudia; Duarte, Cidália

    2016-01-01

    Portugal, like many other countries, faces obstacles regarding school-based sexuality education. This paper explores Portuguese schools' approaches to implementing sexuality education at a local level, and provides a critical analysis of potential strengths and weaknesses. Documents related to sexuality education in a convenience sample of 89…

  14. The Mathematical Strengths and Weaknesses of Children with Dyslexia

    ERIC Educational Resources Information Center

    Simmons, Fiona R.; Singleton, Chris

    2009-01-01

    This paper reports the findings of two related studies that examined the mathematical strengths and weaknesses of children with dyslexia. In study one, dyslexic children were compared to children without special educational needs on tests that assessed arithmetic fact recall, place value understanding and counting speed. Study two used the same…

  15. Relative Mechanical Strengths of Weak Bonds in Sonochemical Polymer Mechanochemistry.

    PubMed

    Lee, Bobin; Niu, Zhenbin; Wang, Junpeng; Slebodnick, Carla; Craig, Stephen L

    2015-08-26

    The mechanical strength of scissile chemical bonds plays a role in material failure and in the mechanical activation of latent reactivity, but quantitative measures of mechanical strength are rare. Here, we report the relative mechanical strength of polymers bearing three putatively "weak" scissile bonds: the carbon-nitrogen bond of an azobisdialkylnitrile (<30 kcal mol(-1)), the carbon-sulfur bond of a thioether (71-74 kcal mol(-1)), and the carbon-oxygen bond of a benzylphenyl ether (52-54 kcal mol(-1)). The mechanical strengths are assessed in the context of chain scission triggered by pulsed sonication of polymer solutions, by using two complementary techniques: (i) the competition within a single polymer chain between the bond scission of interest and the nonscissile mechanochemical ring opening of gem-dichlorocyclopropane mechanophores and (ii) the molecular weights at long (4 h) sonication times of multimechanophore polymers. The two methods produce a consistent story: in contrast to their thermodynamic strengths, the relative mechanical strengths of the three weak bonds are azobisdialkylnitrile (weakest) < thioether < benzylphenyl ether. The greater mechanical strength of the benzylphenyl ether relative to the thermodynamically stronger carbon-sulfur bond is ascribed to poor mechanochemical coupling, at least in part as a result of the rehybridization that accompanies carbon-oxygen bond scission. PMID:26247609

  16. "Union is strength": how weak hydrogen bonds become stronger.

    PubMed

    Melandri, Sonia

    2011-08-21

    Recently reported rotational spectroscopic studies on small dimers and oligomers bound by weak hydrogen bonds show that the driving forces, the spatial arrangement and the dynamical features displayed are very different from those involved in stronger and conventional hydrogen bonds. The very small binding energies (similar to those of van der Waals interactions) imply that the stabilization of the dimer is often obtained by networks of weak hydrogen bonds. Even in the presence of multiple bonds the partner molecules show a high degree of internal freedom within the complex. This paper analyses several examples of molecular adducts bound by weak hydrogen bonds formed in free jet expansions and recently characterized by rotational spectroscopy. They include weakly bound complexes of weak donors with strong acceptors (C-H···O,N, S-H···O,N), strong donors (O-H, N-H) with weak acceptors such as the halogen atoms and ? systems but also the elusive interactions between weak donors and weak acceptors (C-H···? and C-H···halogen). Examples are also given where rotational spectroscopy highlights that weak hydrogen bonds are extremely important in chiral recognition phenomena and as driving forces of the conformational landscape of important biomolecules. PMID:21701708

  17. Strengths and Weaknesses of NESTs and NNESTs: Perceptions of NNESTs in Hong Kong

    ERIC Educational Resources Information Center

    Ma, Lai Ping Florence

    2012-01-01

    Since non-native English speaking teachers (NNESTs) are always compared with native English speaking teachers (NESTs) on linguistic grounds, their strengths and weaknesses as English teachers are worthy of investigation. This paper reports on a mixed methods study which examines the strengths and weaknesses of NNESTs and NESTs through the…

  18. Temporal Stability of WISC-III Subtest Composite: Strengths and Weaknesses

    ERIC Educational Resources Information Center

    Watkins, Marley W.; Canivez, Gary L.

    2004-01-01

    The Wechsler Intelligence Scale for Children--Third Edition (D. Wechsler, 1991; WISC-III) is often used to identify subtest-based cognitive strengths and weaknesses that are subsequently used to generate interventions. Given that intelligence is presumed to be an enduring trait, cognitive strengths and weaknesses identified via subtest analysis…

  19. Committee Effectiveness in Higher Education: The Strengths and Weaknesses of Group Decision Making

    ERIC Educational Resources Information Center

    Bates, Stephen B.

    2014-01-01

    Focusing on five models of committee effectiveness for purposes of this assessment will lend insight into the strengths and weaknesses of utilizing a structured action plan as a guide to achieving and maintaining optimum committee effectiveness in higher education. In the compilation of the strengths and weaknesses of committee decision making,…

  20. Separate and interactive contributions of weak inhibitory control and threat sensitivity to prediction of suicide risk.

    PubMed

    Venables, Noah C; Sellbom, Martin; Sourander, Andre; Kendler, Kenneth S; Joiner, Thomas E; Drislane, Laura E; Sillanmäki, Lauri; Elonheimo, Henrik; Parkkola, Kai; Multimaki, Petteri; Patrick, Christopher J

    2015-04-30

    Biobehavioral dispositions can serve as valuable referents for biologically oriented research on core processes with relevance to many psychiatric conditions. The present study examined two such dispositional variables-weak response inhibition (or disinhibition; INH-) and threat sensitivity (or fearfulness; THT+)-as predictors of the serious transdiagnostic problem of suicide risk in two samples: male and female outpatients from a U.S. clinic (N=1078), and a population-based male military cohort from Finland (N=3855). INH- and THT+ were operationalized through scores on scale measures of disinhibition and fear/fearlessness, known to be related to DSM-defined clinical conditions and brain biomarkers. Suicide risk was assessed by clinician ratings (clinic sample) and questionnaires (both samples). Across samples and alternative suicide indices, INH- and THT+ each contributed uniquely to prediction of suicide risk-beyond internalizing and externalizing problems in the case of the clinic sample where diagnostic data were available. Further, in both samples, INH- and THT+ interactively predicted suicide risk, with individuals scoring concurrently high on both dispositions exhibiting markedly augmented risk. Findings demonstrate that dispositional constructs of INH- and THT+ are predictive of suicide risk, and hold potential as referents for biological research on suicidal behavior. PMID:25712631

  1. Judges Cite Current Trends, Comment on Strengths and Weaknesses.

    ERIC Educational Resources Information Center

    Smith, Helen F.

    1995-01-01

    Features opinions of newspaper and yearbook judges as to the state of student publications. Cites as strengths: graphic devices, more pull-out quotes, more double-page spreads with dominant elements, and overall improvement in the quality of magazines. Cites as trends: overdoing opinion at the expense of research, and too many stories that are…

  2. Renewable Energy Development Incentives: Strengths, Weaknesses and the Interplay

    SciTech Connect

    Birgisson, Gunnar; Petersen, Erik

    2006-04-15

    Most existing mechanisms cannot be relied on to achieve long-term growth of renewable energy, either because of their own weaknesses or because of unpredictable variables. If there is widespread support for pursuing the benefits of renewable energy, then its growth should be ensured through ambitious, long-term, and widespread mandatory objectives, rather than by relying on voluntary choices or competitive forces. (author)

  3. Nuclear energy: Its strengths, weaknesses and role in Finland

    NASA Astrophysics Data System (ADS)

    Ruuskanen, A.

    Nuclear energy has, in principle, various strengths as an energy form. In spite of the drawbacks of nuclear power, the benefits exceed its cost. That is why power companies in Finland have decided to apply for the construction, of the fifth nuclear power plant during Spring 1991. Electricity consumption is increasing, and new power producing capacity will be needed. Nuclear power is seen as the best alternative for producing baseload power in Finnish conditions.

  4. Orbital Resonances in the Solar Nebula: Strengths and Weaknesses

    NASA Technical Reports Server (NTRS)

    Malhotra, Renu

    1993-01-01

    A planetesimal moving in the Solar Nebula experiences an aero- dynamic drag which causes its orbit to circularize and shrink. However, resonant perturbations from a protoplanet interior to the planetesimal's orbit ran counteract both the orbital decay and the damping of the eccentricity: the planetesimal can be captured into an orbital resonance and its eccentricity pumped up to a modestly high equilibrium value. Thus, orbital resonances constitute (partial) barriers to the delivery of planetesimals into the feeding zone of the protoplanet. We have established the characteristics of the phenomenon of resonance capture by gas drag in the circular restricted three-body approximation. We have determined the strengths of the equilibrium resonant orbits with respect to impulsive velocity perturbations. We conclude that planetesimals captured in orbital resonances are quite vulnerable to being dislocated from these orbits by mutual planetesimal interactions, but that the resonances are effective in slowing down the rate of orbital decay of planetesimals. Only very small bodies, less or approx. equal to 100 m, are able to reach a approx. 1 mass of the earth protoplanet without being slowed down by resonances.

  5. Orbital Resonances in the Solar Nebula: Strengths and Weaknesses

    NASA Technical Reports Server (NTRS)

    Malhotra, Renu

    1993-01-01

    A planetesimal moving in the Solar Nebula experiences an aerodynamic drag which causes its orbit to circularize and shrink. However, resonant perturbations from a protoplanet interior to the planetesimal's orbit can counteract both the orbital decay and the damping of the eccentricity: the planetesimal can be captured into an orbital resonance and its eccentricity pumped up to a modestly high equilibrium value. Thus, orbital resonances constitute (partial) barriers to the delivery of planetesimals into the feeding zone of the protoplanet. We have established the characteristics of the phenomenon of resonance capture by gas drag in the circular restricted three-body approximation. We have determined the strengths of the equilibrium resonant orbits with respect to impulsive velocity perturbations. We conclude that planetesimals captured in orbital resonances are quite vulnerable to being dislocated from these orbits by mutual planetesimal interactions, but that the resonances are effective in slowing down the rate of orbital decay of planetesimals. Only very small bodies, less than or equal to 100 m, are able to reach a approx. 1 Earth mass protoplanet without being slowed down by resonances.

  6. Objective Evaluation of Muscle Strength in Infants with Hypotonia and Muscle Weakness

    ERIC Educational Resources Information Center

    Reus, Linda; van Vlimmeren, Leo A.; Staal, J. Bart; Janssen, Anjo J. W. M.; Otten, Barto J.; Pelzer, Ben J.; Nijhuis-van der Sanden, Maria W. G.

    2013-01-01

    The clinical evaluation of an infant with motor delay, muscle weakness, and/or hypotonia would improve considerably if muscle strength could be measured objectively and normal reference values were available. The authors developed a method to measure muscle strength in infants and tested 81 typically developing infants, 6-36 months of age, and 17…

  7. Objective Evaluation of Muscle Strength in Infants with Hypotonia and Muscle Weakness

    ERIC Educational Resources Information Center

    Reus, Linda; van Vlimmeren, Leo A.; Staal, J. Bart; Janssen, Anjo J. W. M.; Otten, Barto J.; Pelzer, Ben J.; Nijhuis-van der Sanden, Maria W. G.

    2013-01-01

    The clinical evaluation of an infant with motor delay, muscle weakness, and/or hypotonia would improve considerably if muscle strength could be measured objectively and normal reference values were available. The authors developed a method to measure muscle strength in infants and tested 81 typically developing infants, 6-36 months of age, and 17…

  8. Models of Viscosity: Strengths, Weaknesses and the Challenges

    NASA Astrophysics Data System (ADS)

    Russell, K.; Giordano, D.; Dingwell, D. B.

    2007-12-01

    Here we present a model for predicting the non-Arrhenian Newtonian viscosity of silicate melts as a function of temperature (T) and melt composition (X), including the rheologically important volatile constituents H2O and F. The model is based on >1750 measurements of viscosity on multicomponent anhydrous and volatile- rich silicate melts. The non-Arrhenian T-dependence is accounted for by the VFT equation [log ? = A + B/(T(K) - C)]. The optimization assumes a common, high-T limit (A) for silicate melt viscosity and returns a value for this limit of -4.55 (e.g., log ? = 10-4.6 Pa s). All compositional dependence is ascribed to the parameters B and C and is accounted for by an additional 17 model coefficients. The model has the following attributes: i) the model covers over fifteen log units of viscosity (10-1-1014 Pa s), ii) it spans most of the compositional range found in naturally-occurring volcanic rocks using 10 major and minor oxide and two volatile components (H2O, F2O-1), iii) it is computationally continuous across the entire compositional and temperature spectrum of the database, and iv) it is capable of accommodating both strong and fragile behaviour of silicate melts. Model quality is demonstrated, in part, by how well it reproduces the original observations. However, higher-level models have logical consequences that can serve as testable predictions. For example, this model is tested by how well it predicts other transport properties including glass transition temperatures (Tg) and melt fragility (m). Values of Tg (791 - 1077 K) and m (21 - 58) calculated for 58 anhydrous melts using our viscosity model are in strong agreement with the values obtained by fitting the datasets independently (789 - 1154 K and 24 - 65, respectively). We use this approach to compare our model for silicate melt viscosity against previously published models. We find our model to be more consistent with theory, to do a better job of reproducing other melt transport properties, and to work over a wider range of melt conditions (composition and temperature). Other models fail because they use a non-Arrhenian formulation, or they are calibrated for an extremely small range of melt conditions, or they predict unphysical values of viscosity in the limits, or they are over-parameterized and cannot be extrapolated beyond the original calibration dataset. Our model predicts, within inter-laboratory experimental error, viscosity and other melt properties (i.e., Tg amd m) for most of the T-X space found in natural silicate melts. Despite its strengths, there is room for improvement. Firstly, our model incorporates the effects of H2O and F, but does not account for other important volatiles, including CO2, S, Cl. Secondly, Fe is treated as a single species whereas melts contain variable proportions of ferric and ferrous iron. Thirdly, we do not model pressure effects on melt viscosity which is needed for modeling melt transport within the lithosphere. Lastly, our model is strictly empirical, in that, the components we have chosen have no explicit or independent relationship to the structure or speciation of the silicate melt. Future models may benefit from the use of a component basis that reflects melt speciation. Giordano, D. Russell, J.K. & Dingwell, D.B. (In Review, July 07) Viscosity of magmatic liquids: A model. EPSL

  9. In the students' own words: what are the strengths and weaknesses of the dental school curriculum?

    PubMed

    Henzi, David; Davis, Elaine; Jasinevicius, Roma; Hendricson, William

    2007-05-01

    Dental students have little input into the selection of course topics and subject matter included in their dental curricula. Curriculum requirements are framed by the Commission on Dental Accreditation, which has stipulated competencies and associated biomedical and clinical knowledge that must be addressed during dental school. Although these competency requirements restrict the variance of educational experiences, students are eager to share their views on the curriculum within the realm of their educational experience. The objective of this research project was to elicit the perspectives of dental students from a broad cross-section of U.S. and Canadian dental schools about their education. A total of 605 students (285 sophomores, 220 seniors, 100 residents) from twenty North American dental schools completed a SWOT (Strengths, Weaknesses, Opportunities, and Threats) analysis to communicate their perceptions of the curriculum. Students were also asked to provide their impressions of the overall quality of the educational program in an open-ended written format. The students' qualitative comments were then reviewed and categorized into key issues or themes. Resulting themes for each category of the Curriculum SWOT (C-SWOT) analysis were the following. Strengths: 1) clinical learning experience, and 2) opportunity to work with knowledgeable faculty. Weaknesses: 1) disorganized and inefficient clinical learning environment, 2) teaching and testing that focus on memorization, 3) poor quality instruction characterized by curricular disorganization, and 4) inconsistency among instructors during student evaluations. Opportunities: 1) develop strategies to provide students with more exposure to patients, especially early in the curriculum, and 2) opportunities to learn new technology/techniques. Threats: 1) cost of dental education, 2) students' concerns about faculty "brain drain," i.e., lack of sufficient numbers of dental faculty capable of providing high-quality instruction, and 3) questionable treatment of patients in the dental clinic as a consequence of pursuing procedural requirements. This report presents commentaries selected from 2,421 total responses that communicate students' perspectives related to C-SWOT themes. Students at seven schools in this study reported that they completed all or portions of the first two years of the curriculum in combined classes with medical students. Sophomore and senior students at these schools provided their thoughts on this curricular approach; these perceptions are also reported. Findings from this study are compared to results from a similar investigation of dental student perceptions conducted fifty years ago. We conclude that students participating in this study were positive overall about their learning experiences in dental schools, but identified several areas that appear to be problematic for many students at a variety of different schools including fundamental concerns about instructional quality in some areas of the curriculum. Academic program administrators in dental schools can use these findings to guide modifications that will enhance the overall dental education experience. PMID:17493972

  10. Stability strengths and weaknesses in protein structures detected by statistical potentials: Application to bovine seminal ribonuclease.

    PubMed

    De Laet, Marie; Gilis, Dimitri; Rooman, Marianne

    2016-01-01

    We present an in silico method to estimate the contribution of each residue in a protein to its overall stability using three database-derived statistical potentials that are based on inter-residue distances, backbone torsion angles and solvent accessibility, respectively. Residues that contribute very unfavorably to the folding free energy are defined as stability weaknesses, whereas residues that show a highly stabilizing contribution are called stability strengths. Strengths and/or weaknesses on residues that are in spatial contact are clustered into 3-dimensional (3D) stability patches. The identification and analysis of strength- and weakness-containing regions in a protein may reveal structural or functional characteristics, and/or interesting spots to introduce mutations. To illustrate the power of our method, we apply it to bovine seminal ribonuclease. This enzyme catalyzes the degradation of RNA strands, and has the peculiarity of undergoing 3D domain swapping in physiological conditions. The weaknesses and strengths were compared among the monomeric, dimeric and swapped dimeric forms. We identified weaknesses among the catalytic residues and a mixture of weaknesses and strengths among the substrate-binding residues in the three forms. In the regions involved in 3D swapping, we observed an accumulation of weaknesses in the monomer, which disappear in the dimer and especially in the swapped dimer. Moreover, monomeric homologous proteins were found to exhibit less weaknesses in these regions, whereas mutants known to favor unswapped dimerization appear stabilized in this form. Our method has several perspectives for functional annotation, rational prediction of targeted mutations, and mapping of stability changes upon conformational rearrangements. Proteins 2016; 84:143-158. © 2015 Wiley Periodicals, Inc. PMID:26573727

  11. Building a Performance-Based Assessment System To Diagnose Strengths and Weaknesses in Reading Achievement.

    ERIC Educational Resources Information Center

    Hennings, Sara S.; Hughes, Kay E.

    This paper provides a brief description of the development of the Diagnostic Assessments of Reading with Trial Teaching Strategies (DARTTS) program by F. G. Roswell and J. S. Chall. It also describes the editorial and statistical procedures that were used to validate the program for determining students' strengths and weaknesses in important areas…

  12. Internationally Adopted Children in the Early School Years: Relative Strengths and Weaknesses in Language Abilities

    ERIC Educational Resources Information Center

    Glennen, Sharon

    2015-01-01

    Purpose: This study aimed to determine the relative strengths and weaknesses in language and verbal short-term memory abilities of school-age children who were adopted from Eastern Europe. Method: Children adopted between 1;0 and 4;11 (years;months) of age were assessed with the Clinical Evaluation of Language Fundamentals-Preschool, Second…

  13. Statistics for Determining Relative Strengths and Weaknesses on the Test of Language Development-Primary.

    ERIC Educational Resources Information Center

    Grossman, Fred M.

    1986-01-01

    The article provides a statistically derived method of developing an accurate profile analysis of the five major subtest standard scores comprising the "Test of Language Development-Primary" thus helping clinicians determine relative strengths and weaknesses within the child's overall language profile. (Author/DB)

  14. Memory Profiles in Children with Mild Intellectual Disabilities: Strengths and Weaknesses

    ERIC Educational Resources Information Center

    Van der Molen, Mariet J.; Van Luit, Johannes E. H.; Jongmans, Marian J.; Van der Molen, Maurits W.

    2009-01-01

    Strengths and weaknesses in short-term memory (STM) and working memory (WM) were identified in children with mild intellectual disabilities (MID) by comparing their performance to typically developing children matched on chronological age (CA children) and to younger typically developing children with similar mental capacities (MA children).…

  15. Using Standards-Based Grading to Address Students' Strengths and Weaknesses

    ERIC Educational Resources Information Center

    Knaack, Susan; Kreuz, Allie; Zawlocki, Erin

    2012-01-01

    This action research project report uses standard-based grading to address the problem of traditional grades not adequately assessing student content mastery and students' lack of awareness regarding their strengths and weaknesses. Research was conducted by one elementary and two middle school teachers with 158 students between the dates of…

  16. Patterns of Cognitive Strengths and Weaknesses: Identification Rates, Agreement, and Validity for Learning Disabilities Identification

    ERIC Educational Resources Information Center

    Miciak, Jeremy; Fletcher, Jack M.; Stuebing, Karla K.; Vaughn, Sharon; Tolar, Tammy D.

    2014-01-01

    Few empirical investigations have evaluated learning disabilities (LD) identification methods based on a pattern of cognitive strengths and weaknesses (PSW). This study investigated the reliability and validity of two proposed PSW methods: the concordance/discordance method (C/DM) and cross battery assessment (XBA) method. Cognitive assessment…

  17. Identifying Profiles of Reading Strengths and Weaknesses at the Secondary Level

    ERIC Educational Resources Information Center

    Trentman, Allison M. McCarthy

    2012-01-01

    The purpose of this study was to evaluate the feasibility and potential utility of reading profiles to identify common patterns of reading strengths and weaknesses among students in high school with deficit reading skills. A total of 55 students from three Midwestern high schools were administered a battery of assessments that targeted specific…

  18. Internationally Adopted Children in the Early School Years: Relative Strengths and Weaknesses in Language Abilities

    ERIC Educational Resources Information Center

    Glennen, Sharon

    2015-01-01

    Purpose: This study aimed to determine the relative strengths and weaknesses in language and verbal short-term memory abilities of school-age children who were adopted from Eastern Europe. Method: Children adopted between 1;0 and 4;11 (years;months) of age were assessed with the Clinical Evaluation of Language Fundamentals-Preschool, Second…

  19. The Strength of Weak Ties in Electronic Development of the Scholarly Communication System.

    ERIC Educational Resources Information Center

    Schwartz, Charles A.

    1994-01-01

    Three overlapping models of new technology diffusion are described in relation to the Internet: (1) individual threshold; (2) critical mass; and (3) strength of weak ties. The prospective role of academic libraries in the electronic development of the scholarly communication system is discussed, and further research is suggested. (55 references)…

  20. Strategic marketing management for health management: cross impact matrix and TOWS (threats, opportunities, weaknesses, strengths).

    PubMed

    Proctor, T

    2000-01-01

    Organisations operate within a three-tiered environment--internal, micro and macro. The environment is a powerful force acting upon the effectiveness of strategic decision making. Failure to take cognisance of the influence of the three-tiered environment can have disastrous consequences. The cross-impact matrix and the TOWS matrix are two strategic decision-making aids that improve effective decision making. When used in conjunction with creative problem solving methods they can provide the basis of a powerful management tool. PMID:11183998

  1. Targeting cancer’s weaknesses (not its strengths): Therapeutic strategies suggested by the atavistic model

    PubMed Central

    Lineweaver, Charles H.; Davies, Paul C.W.; Vincent, Mark D.

    2014-01-01

    In the atavistic model of cancer progression, tumor cell dedifferentiation is interpreted as a reversion to phylogenetically earlier capabilities. The more recently evolved capabilities are compromised first during cancer progression. This suggests a therapeutic strategy for targeting cancer: design challenges to cancer that can only be met by the recently evolved capabilities no longer functional in cancer cells. We describe several examples of this target-the-weakness strategy. Our most detailed example involves the immune system. The absence of adaptive immunity in immunosuppressed tumor environments is an irreversible weakness of cancer that can be exploited by creating a challenge that only the presence of adaptive immunity can meet. This leaves tumor cells more vulnerable than healthy tissue to pathogenic attack. Such a target-the-weakness therapeutic strategy has broad applications, and contrasts with current therapies that target the main strength of cancer: cell proliferation. PMID:25043755

  2. Weak reversible cross links may decrease the strength of aligned fiber bundles.

    PubMed

    Nabavi, S Soran; Hartmann, Markus A

    2016-02-21

    Reversible cross-linking is an effective strategy to specifically tailor the mechanical properties of polymeric materials that can be found in a variety of biological as well as man-made materials. Using a simple model in this paper the influence of weak, reversible cross-links on the mechanical properties of aligned fiber bundles is investigated. Special emphasis in this analysis is put on the strength of the investigated structures. Using Monte Carlo methods two topologies of cross-links exceeding the strength of the covalent backbone are studied. Most surprisingly only two cross-links are sufficient to break the backbone of a multi chain system, resulting in a reduced strength of the material. The found effect crucially depends on the ratio of inter- to intra-chain cross-links and, thus, on the grafting density that determines this ratio. PMID:26750612

  3. Retail pharmacy staff perceptions of design strengths and weaknesses of electronic prescribing

    PubMed Central

    Chui, Michelle A

    2012-01-01

    Objective This paper explored pharmacy staff perceptions of the strengths and weaknesses of electronic prescribing (e-prescribing) design in retail pharmacies using the sociotechnical systems framework. This study examined how adoption of e-prescribing technology is affecting clinical practice and patient care. Materials and methods Direct observations and think aloud protocols were used to collect data from seven retail pharmacies. Results Pharmacists and pharmacy technicians reported strengths of e-prescribing design that facilitated pharmacy work which included: legibility, ease of archiving, quick access to prescriptions and consistency in the format of electronic prescriptions (e-prescriptions). Design weaknesses and potential hazards to patient care associated with e-prescribing systems were due to differences between pharmacy and prescriber computer systems which resulted in the selection of wrong patient or drug (name, directions, dose, strength, formulation, package sizes). There were unique strengths and weaknesses in the design of e-prescriptions peculiar to the three pharmacy computer systems examined in this study. Discussion Findings from this study can help inform policy on creating e-prescribing design standards for pharmacy. e-Prescribing system developers can use the results of this study to identify and apply the most usable features of the three main pharmacy computer systems to design systems that support dispensing efficiency and safety. Conclusions This is the first study to highlight design flaws with e-prescribing in retail pharmacies. The sociotechnical systems framework was useful in providing an indepth understanding of the pharmacist and pharmacy technician's interface with e-prescribing technology. This information can be used by policy makers to create e-prescribing standards for pharmacies. PMID:22753809

  4. Early experience affects the strength of vigilance for threat in rhesus monkey infants

    PubMed Central

    Mandalaywala, Tara M.; Parker, Karen J.; Maestripieri, Dario

    2014-01-01

    Both human and nonhuman primates exhibit a cognitive bias to social threat, but little is known about how this bias develops. We investigated the development of threat bias in free-ranging infant rhesus macaques (Macaca mulatta) at 3 (N = 45) and 9 (N = 46) months of age. Three-month-old infant monkeys did not display bias, but 9-month-olds exhibited increased maintenance of attention to threatening social stimuli (vigilance for threat). To examine whether the social environment affected vigilance for threat, behavioral data on maternal rank and protectiveness were collected across the first 12 weeks of life for infants tested at 9 months. Nine-month-old infants of high-ranking mothers and more protective mothers displayed greater vigilance for threat than infants of lower-ranking and less protective mothers. These results demonstrate that infant social cognition is malleable and shaped by mothers both directly (protectiveness) and indirectly (rank), as maternal characteristics affect infants’ social experiences. PMID:25125426

  5. Strengths and weaknesses of McNamara's evolutionary psychological model of dreaming.

    PubMed

    Olliges, Sandra

    2010-01-01

    This article includes a brief overview of McNamara's (2004) evolutionary model of dreaming. The strengths and weaknesses of this model are then evaluated in terms of its consonance with measurable neurological and biological properties of dreaming, its fit within the tenets of evolutionary theories of dreams, and its alignment with evolutionary concepts of cooperation and spirituality. McNamara's model focuses primarily on dreaming that occurs during rapid eye movement (REM) sleep; therefore this article also focuses on REM dreaming. PMID:22947819

  6. Motivated Implicit Theories of Personality: My Weaknesses Will Go Away, but My Strengths Are Here to Stay.

    PubMed

    Steimer, Andreas; Mata, André

    2016-04-01

    Across six studies, this research found consistent evidence for motivated implicit theories about personality malleability: People perceive their weaknesses as more malleable than their strengths. Moreover, motivation also influences how people see themselves in the future, such that they expect their present strengths to remain constant, but they expect their present weaknesses to improve in the future. Several additional findings suggest the motivational nature of these effects: The difference in perceived malleability for strengths versus weaknesses was only observed for the self, not for other people. When the desirability of possessing a certain trait was manipulated, that trait was perceived to be more malleable when it was depicted as undesirable. And these different beliefs that people have about how malleable their traits are, and how they will develop in the future, were associated with their desire for change, which is higher for weaknesses versus strengths. PMID:26984009

  7. Communicable Diseases Surveillance System in East Azerbaijan Earthquake: Strengths and Weaknesses

    PubMed Central

    Babaie, Javad; Fatemi, Farin; Ardalan, Ali; Mohammadi, Hamed; Soroush, Mahmood

    2014-01-01

    Background: A Surveillance System was established for 19 diseases/syndromes in order to prevent and control communicable diseases after 2012 East Azerbaijan earthquakes. This study was conducted to investigate the strengths and weaknesses of the established SS. Methods: This study was carried out on an interview-based qualitative study using content analysis in 2012. Data was collected by semi-structured deep interviews and surveillance data. Fifteen interviews were conducted with experts and health system managers who were engaged in implementing the communicable disease surveillance system in the affected areas. The selection of participants was purposeful. Data saturation supported the sample size. The collected data was analyzed using the principles suggested by Strauss and Corbin. Results: Establishment of the disease surveillance system was rapid and inexpensive. It collected the required data fast. It also increased confidence in health authorities that the diseases would be under control in earthquake-stricken regions. Non estimated denominator for calculating the rates (incidence & prevalence), non-participation of the private sector and hospitals, rapid turnover of health staff and unfamiliarity with the definitions of the diseases were the weak points of the established disease SS. Conclusion: During the time when surveillance system was active, no significant outbreak of communicable diseases was reported. However, the surveillance system had some weaknesses. Thus, considering Iran’s susceptibility to various natural hazards, repeated exercises should be conducted in the preparedness phase to decrease the weaknesses. In addition, other types of surveillance system such as web-based or mobile-based systems should be piloted in disaster situations for future. PMID:25685619

  8. Global Rating of Change Scales: A Review of Strengths and Weaknesses and Considerations for Design

    PubMed Central

    Kamper, Steven J; Maher, Christopher G; Mackay, Grant

    2009-01-01

    Most clinicians ask their patients to rate whether their health condition has improved or deteriorated over time and then use this information to guide management decisions. Many studies also use patient-rated change as an outcome measure to determine the efficacy of a particular treatment. Global rating of change (GRC) scales provide a method of obtaining this information in a manner that is quick, flexible, and efficient. As with any outcome measure, however, meaningful interpretation of results can only be undertaken with due consideration of the clinimetric properties, strengths, and weaknesses of the instrument. The purpose of this article is to summarize this information to assist appropriate interpretation of the GRC results and to provide evidence-informed advice to guide design and administration of GRC scales. These considerations are relevant and applicable to the use of GRC scales both in the clinic and in research. PMID:20046623

  9. Methods, strengths, weaknesses, and limitations of bioequivalence tests with special regard to immunosuppressive drugs.

    PubMed

    van Gelder, Teun; Gabardi, Steven

    2013-08-01

    Within the field of solid organ transplantation, the patents for a number of immunosuppressive drugs have expired in the last few years. Tacrolimus, cyclosporine, and mycophenolate mofetil are now available as generic drugs. In some countries, the market penetration of these generic formulations is as high as 70%, whereas in some other countries, this figure is below 10%. Several professional societies have published position papers on the risks and benefits of generic substitution of immunosuppressive drugs. It often appears that transplant professionals are not fully aware of the requirements for registration of generic drugs. This article describes the registration requirements with a focus on bioequivalence testing, the strengths and weaknesses in this process, and the differences between Europe and the US. PMID:23441971

  10. [STRENGTHS AND WEAKNESSES OF RANDOMISED CLINICAL TRIALS: EVOLVING CHANGES ACCORDING TO PERSONALIZED MEDICINE].

    PubMed

    Ernest, Ph; Jandrain, B; Scheen, A J

    2015-01-01

    Randomised Controlled Trials (RCTs) represent the cornerstone of Evidence-Based Medicine (EBM). Based upon the rules of Good Clinical Practice (GCP), they offer many strengths but also present some weaknesses. The rigorous methodology used allows avoid bias related to confounding factors (through a control group), selection bias (through randomisation) and interpretation bias (through double blinding). However, patients recruited in clinical trials and study experimental conditions markedly differ from the situation in real life. Furthermore, clinical trials recruit a mix of good and poor responders, so that the average therapeutic response is most often mitigated. Clinical trials must evolve according to the new concepts of personalized medicine to become even more performing. In a near future, they must progress from a statistical analysis on large cohorts of patients to a more individualized analysis guided by patient phenotype and genotype characteristics. PMID:26285444

  11. Strengths and weaknesses of Problem Based Learning from the professional perspective of registered nurses 1

    PubMed Central

    Cónsul-Giribet, María; Medina-Moya, José Luis

    2014-01-01

    OBJECTIVE: to identify competency strengths and weaknesses as perceived by nursing professionals who graduated with a integrated curriculum and competency-based through Problem Based Learning in small groups. METHOD: an intrinsic case study method was used, which analyzes this innovation through former students (from the first class) with three years of professional experience. The data were collected through a questionnaire and discussion groups. RESULTS: the results show that their competency level is valued in a very satisfactory manner. This level paradoxically contrasts with the lack of theoretical knowledge they perceived at the end of their education, when they started working in clinical practice. CONCLUSIONS: the teaching strategy was key to motivate an in-depth study and arouse the desire to know. In addition, Problem Based Learning favors and reinforces the decision to learn, which is that necessary in the course of professional life. PMID:25493666

  12. The strengths and weaknesses of quantitative and qualitative research: what method for nursing?

    PubMed

    Carr, L T

    1994-10-01

    The overall purpose of research for any profession is to discover the truth of the discipline. This paper examines the controversy over the methods by which truth is obtained, by examining the differences and similarities between quantitative and qualitative research. The historically negative bias against qualitative research is discussed, as well as the strengths and weaknesses of both approaches, with issues highlighted by reference to nursing research. Consideration is given to issues of sampling; the relationship between the researcher and subject; methodologies and collated data; validity; reliability, and ethical dilemmas. The author identifies that neither approach is superior to the other; qualitative research appears invaluable for the exploration of subjective experiences of patients and nurses, and quantitative methods facilitate the discovery of quantifiable information. Combining the strengths of both approaches in triangulation, if time and money permit, is also proposed as a valuable means of discovering the truth about nursing. It is argued that if nursing scholars limit themselves to one method of enquiry, restrictions will be placed on the development of nursing knowledge. PMID:7822608

  13. The relationship between early ego strength and adolescent responses to the threat of nuclear war

    SciTech Connect

    Andrekus, N.J.

    1989-01-01

    Ego resiliency and ego control, measured when subjects were 3 or 4 years old, were related to expectation of war, concern for the future, and activism in response to the threat of nuclear war, measured when subjects were 18 years old. Data from 92 participants in a longitudinal study of ego and cognitive development conducted by Jeanne and Jack Block at the University of California, Berkeley were used to test hypotheses. Assessments with the California Child Q-set, composited across multiple independent observers, provide measures of ego resiliency and ego control. Adolescent interviews regarding the perception of likelihood of nuclear war, how this affects their future, and their antinuclear and general political activism were scaled and rated. Early ego resiliency and ego under control were hypothesized to account for the variance in adolescent nuclear responses and activism. The only significant longitudinal relationships were in the female sample, where ego under control was found to be a significant predictor of both general political activism (p<.01) and ideas of the future being affected by the nuclear threat (p<.05). Among males, the relationship between early ego resiliency and adolescent antinuclear activism approached significance (p<.10). Adolescent personality was significantly related to several measures of nuclear response. In girls, adolescent ego under control related to perception of likelihood of nuclear war (p<.05) and antinuclear activism (p<.05), and the interaction of ego resiliency and ego under control predicted general political activism (p<.0005). In boys, adolescent ego resiliency correlated with antinuclear activism (p<.05). These findings were discussed in terms of antecedent parenting styles, and conceptual links were drawn between children's ego resiliency and security of attachment, perspective taking, and moral development.

  14. Strengths and weaknesses of in-tube solid-phase microextraction: A scoping review.

    PubMed

    Fernández-Amado, M; Prieto-Blanco, M C; López-Mahía, P; Muniategui-Lorenzo, S; Prada-Rodríguez, D

    2016-02-01

    In-tube solid-phase microextraction (in-tube SPME or IT-SPME) is a sample preparation technique which has demonstrated over time its ability to couple with liquid chromatography (LC), as well as its advantages as a miniaturized technique. However, the in-tube SPME perspectives in the forthcoming years depend on solutions that can be brought to the environmental, industrial, food and biomedical analysis. The purpose of this scoping review is to examine the strengths and weaknesses of this technique during the period 2009 to 2015 in order to identify research gaps that should be addressed in the future, as well as the tendencies that are meant to strengthen the technique. In terms of methodological aspects, this scoping review shows the in-tube SPME strengths in the coupling with LC (LC-mass spectrometry, capillary LC, ultra-high-pressure LC), in the new performances (magnetic IT-SPME and electrochemically controlled in-tube SPME) and in the wide range of development of coatings and capillaries. Concerning the applicability, most in-tube SPME studies (around 80%) carry out environmental and biomedical analyses, a lower number food analyses and few industrial analyses. Some promising studies in proteomics have been performed. The review makes a critical description of parameters used in the optimization of in-tube SPME methods, highlighting the importance of some of them (i.e. type of capillary coatings). Commercial capillaries in environmental analysis and laboratory-prepared capillaries in biomedical analysis have been employed with good results. The most consolidated configuration is in-valve mode, however the cycle mode configuration is frequently chosen for biomedical analysis. This scoping review revealed that some aspects such as the combination of in-tube SPME with other sample treatment techniques for the analysis of solid samples should be developed in depth in the near future. PMID:26772124

  15. Strengths and weaknesses of multimodal processing in a group of adults with gliomas.

    PubMed

    Plaza, Monique; Capelle, Laurent; Maigret, Géraldine; Chaby, Laurence

    2013-01-01

    The present study aimed to analyze the multimodal skills that would be spared, altered, or impaired by gliomas that slowly infiltrate various and diversely localized areas in the cerebral hemispheres. Ten patients and 60 healthy controls were evaluated using four multimodal processing paradigms across 11 tasks. Our objectives were as follows: (a) to describe the strengths and weaknesses of the glioma patients' multimodal processing performance after accounting for task specificity and their individual performances compared to those of the control group; (b) to determine the correlation between lesion localization and impairments; and (c) to identify the tasks that were most sensitive to tumor infiltration and plasticity limits. Our results show that patients as a whole were efficient at most tasks; however, the patients exhibited difficulties in the productive picture-naming task, the receptive verbal judgment task, and the visual/graphic portion of the dual-attention task. The individual case reports show that the difficulties were distributed across the patients and did not correlate with lesion localization and tumor type. PMID:22554225

  16. Analysis of the strengths and weaknesses of acid rain electronic data reports

    SciTech Connect

    Schott, J.

    1997-12-31

    Entergy Corporation is a Phase II utility with a fossil generation base composed primarily of natural gas and low sulfur coal. This paper presents an analysis of a large Phase II utility`s continuous emissions monitoring data reported to EPA under Title IV Acid Rain. Electric utilities currently report hourly emissions of NO{sub x}, SO{sub 2}, CO{sub 2}, fuel use, and generation through electronic data reports to EPA. This paper describes strengths and weaknesses of the data reported to EPA as determined through an analysis of 1995 data. Emissions reported by this company under acid rain for SO{sub 2} and NO{sub x} are very different from emissions reported to state agencies for annual emission inventory purposes in past years and will represent a significant break with historic trends. A comparison of emissions has been made of 1995 emissions reported under Electronic Data Reports to the emissions that would have been reported using emission factors and fuel data in past years. In addition, the paper examines the impacts of 40 CFR Part 75 Acid Rain requirements such as missing data substitution and monitor bias adjustments. Measurement system errors including stack flow measurement and false NO{sub x}Lb/MMBtu readings at very low loads are discussed. This paper describes the implications for public policy, compliance, emissions inventories, and business decisions of Part 75 acid rain monitoring and reporting requirements.

  17. Patterns of Cognitive Strengths and Weaknesses: Identification Rates, Agreement, and Validity for Learning Disabilities Identification

    PubMed Central

    Miciak, Jeremy; Fletcher, Jack M.; Stuebing, Karla; Vaughn, Sharon; Tolar, Tammy D.

    2014-01-01

    Purpose Few empirical investigations have evaluated LD identification methods based on a pattern of cognitive strengths and weaknesses (PSW). This study investigated the reliability and validity of two proposed PSW methods: the concordance/discordance method (C/DM) and cross battery assessment (XBA) method. Methods Cognitive assessment data for 139 adolescents demonstrating inadequate response to intervention was utilized to empirically classify participants as meeting or not meeting PSW LD identification criteria using the two approaches, permitting an analysis of: (1) LD identification rates; (2) agreement between methods; and (3) external validity. Results LD identification rates varied between the two methods depending upon the cut point for low achievement, with low agreement for LD identification decisions. Comparisons of groups that met and did not meet LD identification criteria on external academic variables were largely null, raising questions of external validity. Conclusions This study found low agreement and little evidence of validity for LD identification decisions based on PSW methods. An alternative may be to use multiple measures of academic achievement to guide intervention. PMID:24274155

  18. Patterns of cognitive strengths and weaknesses: Identification rates, agreement, and validity for learning disabilities identification.

    PubMed

    Miciak, Jeremy; Fletcher, Jack M; Stuebing, Karla K; Vaughn, Sharon; Tolar, Tammy D

    2014-03-01

    Few empirical investigations have evaluated learning disabilities (LD) identification methods based on a pattern of cognitive strengths and weaknesses (PSW). This study investigated the reliability and validity of two proposed PSW methods: the concordance/discordance method (C/DM) and cross battery assessment (XBA) method. Cognitive assessment data for 139 adolescents demonstrating inadequate response to intervention was utilized to empirically classify participants as meeting or not meeting PSW LD identification criteria using the two approaches, permitting an analysis of: (a) LD identification rates, (b) agreement between methods, and (c) external validity. LD identification rates varied between the 2 methods depending upon the cut point for low achievement, with low agreement for LD identification decisions. Comparisons of groups that met and did not meet LD identification criteria on external academic variables were largely null, raising questions of external validity. This study found low agreement and little evidence of validity for LD identification decisions based on PSW methods. An alternative may be to use multiple measures of academic achievement to guide intervention. PMID:24274155

  19. The global health concept of the German government: strengths, weaknesses, and opportunities.

    PubMed

    Bozorgmehr, Kayvan; Bruchhausen, Walter; Hein, Wolfgang; Knipper, Michael; Korte, Rolf; Razum, Oliver; Tinnemann, Peter

    2014-01-01

    Recognising global health as a rapidly emerging policy field, the German federal government recently released a national concept note for global health politics (July 10, 2013). As the German government could have a significant impact on health globally by making a coherent, evidence-informed, and long-term commitment in this field, we offer an initial appraisal of the strengths, weaknesses, and opportunities for development recognised in this document. We conclude that the national concept is an important first step towards the implementation of a coherent global health policy. However, important gaps were identified in the areas of intellectual property rights and access to medicines. In addition, global health determinants such as trade, economic crises, and liberalisation as well as European Union issues such as the health of migrants, refugees, and asylum seekers are not adequately addressed. Furthermore, little information is provided about the establishment of instruments to ensure an effective inter-ministerial cooperation. Finally, because implementation aspects for the national concept are critical for the success of this initiative, we call upon the newly elected 2013 German government to formulate a global health strategy, which includes a concrete plan of action, a time scale, and measurable goals. PMID:24560258

  20. The global health concept of the German government: strengths, weaknesses, and opportunities

    PubMed Central

    Bozorgmehr, Kayvan; Bruchhausen, Walter; Hein, Wolfgang; Knipper, Michael; Korte, Rolf; Razum, Oliver; Tinnemann, Peter

    2014-01-01

    Recognising global health as a rapidly emerging policy field, the German federal government recently released a national concept note for global health politics (July 10, 2013). As the German government could have a significant impact on health globally by making a coherent, evidence-informed, and long-term commitment in this field, we offer an initial appraisal of the strengths, weaknesses, and opportunities for development recognised in this document. We conclude that the national concept is an important first step towards the implementation of a coherent global health policy. However, important gaps were identified in the areas of intellectual property rights and access to medicines. In addition, global health determinants such as trade, economic crises, and liberalisation as well as European Union issues such as the health of migrants, refugees, and asylum seekers are not adequately addressed. Furthermore, little information is provided about the establishment of instruments to ensure an effective inter-ministerial cooperation. Finally, because implementation aspects for the national concept are critical for the success of this initiative, we call upon the newly elected 2013 German government to formulate a global health strategy, which includes a concrete plan of action, a time scale, and measurable goals. PMID:24560258

  1. Validation of the Chinese Strengths and Weaknesses of ADHD-Symptoms and Normal-Behaviors Questionnaire in Hong Kong

    ERIC Educational Resources Information Center

    Lai, Kelly Y. C.; Leung, Patrick W. L.; Luk, Ernest S. L.; Wong, Ann S. Y.; Law, Lawrence S. C.; Ho, Karen K. Y.

    2013-01-01

    Objective: Unlike rating scales that focus on the severity of ADHD symptoms, the Strengths and Weaknesses of ADHD-Symptoms and Normal-Behaviors (SWAN) rating scale is phrased in neutral or positive terms for carers to compare the index child's behaviors with that of their peers. This study explores its psychometric properties when applied to…

  2. Cavities of Weak Magnetic Field Strength in the Wake of FTEs: Results from Global Magnetospheric MHD Simulations

    NASA Technical Reports Server (NTRS)

    Kuznetsova, M. M.; Sibeck, D. G.; Hesse, M.; Wang, Y.; Rastaetter, L.; Toth, G.; Ridley, A.

    2009-01-01

    We use the global magnetohydrodynamic (MHD) code BATS-R-US to model multipoint observations of Flux Transfer Event (FTE) signatures. Simulations with high spatial and temporal resolution predict that cavities of weak magnetic field strength protruding into the magnetosphere trail FTEs. These predictions are consistent with recently reported multi-point Cluster observations of traveling magnetopause erosion regions (TMERs).

  3. Macroeconomics of Natural Disasters: Strengths and Weaknesses of Meta-Analysis Versus Review of Literature.

    PubMed

    A G van Bergeijk, Peter; Lazzaroni, Sara

    2015-06-01

    We use the case of the macroeconomic impact of natural disasters to analyze strengths and weaknesses of meta-analysis in an emerging research field. Macroeconomists have published on this issue since 2002 (we identified 60 studies to date). The results of the studies are contradictory and therefore the need to synthesize the available research is evident. Meta-analysis is a useful method in this field. An important aim of our article is to show how one can use the identified methodological characteristics to better understand the robustness and importance of new findings. To provide a comparative perspective, we contrast our meta-analysis and its findings with the major influential research synthesis in the field: the IPCC's 2012 special report Managing the Risks of Extreme Events and Disasters to Advance Climate Change Adaptation. We show that the IPCC could have been more confident about the negative economic impact of disasters and more transparent on inclusion and qualification of studies, if it had been complemented by a meta-analysis. Our meta-analysis shows that, controlling for modeling strategies and data set, the impact of disasters is significantly negative. The evidence is strongest for direct costs studies where we see no difference between our larger sample and the studies included in the IPCC report. Direct cost studies and indirect cost studies differ significantly, both in terms of the confidence that can be attached to a negative impact of natural disasters and in terms of the sources of heterogeneity of the findings reported in the primary studies. PMID:25847486

  4. The Strength of Weak Identities: Social Structural Sources of Self, Situation and Emotional Experience

    ERIC Educational Resources Information Center

    Smith-Lovin, Lynn

    2007-01-01

    Modern societies are highly differentiated, with relatively uncorrelated socially salient dimensions and a preponderance of weak, unidimensional (as opposed to strong, multiplex) ties. What are the implications of a society with fewer strong ties and more weak ties for the self? What do these changes mean for our emotional experience in everyday…

  5. Strength of chrysotile-serpentinite gouge under hydrothermal conditions: Can it explain a weak San Andreas fault?

    USGS Publications Warehouse

    Moore, Diane E.; Lockner, D.A.; Summers, R.; Shengli, M.; Byerlee, J.D.

    1996-01-01

    Chrysotile-bearing serpentinite is a constituent of the San Andreas fault zone in central and northern California. At room temperature, chrysotile gouge has a very low coefficient of friction (?? ??? 0.2), raising the possibility that under hydrothermal conditions ?? might be reduced sufficiently (to ???0.1) to explain the apparent weakness of the fault. To test this hypothesis, we measured the frictional strength of a pure chrysotile gouge at temperatures to 290??C and axial-shortening velocities as low as 0.001 ??m/s. As temperature increases to ???100??C, the strength of the chrysotile gouge decreases slightly at low velocities, but at temperatures ???200??C, it is substantially stronger and essentially independent of velocity at the lowest velocities tested. We estimate that pure chrysotile gouge at hydrostatic fluid pressure and appropriate temperatures would have shear strength averaged over a depth of 14 km of 50 MPa. Thus, on the sole basis of its strength, chrysotile cannot be the cause of a weak San Andreas fault. However, chrysotile may also contribute to low fault strength by forming mineral seals that promote the development of high fluid pressures.

  6. Pay as you throw: strengths and weaknesses of weight-based billing in household waste collection systems in Sweden.

    PubMed

    Dahlén, Lisa; Lagerkvist, Anders

    2010-01-01

    Householders' response to weight-based billing for the collection of household waste was investigated with the aim of providing decision support for waste management policies. Three questions were addressed: How much and what kind of information on weight-based billing is discernible in generic Swedish waste collection statistics? Why do local authorities implement weight-based billing, and how do they perceive the results? and, Which strengths and weaknesses of weight-based billing have been observed on the local level? The study showed that municipalities with pay-by-weight schemes collected 20% less household waste per capita than other municipalities. Surprisingly, no part of this difference could be explained by higher recycling rates. Nevertheless, the majority of waste management professionals were convinced that recycling had increased as a result of the billing system. A number of contradicting strengths and weaknesses of weight-based billing were revealed. PMID:19833498

  7. The Strengths, Weaknesses, Opportunities and Threats of Using Social Software in Higher and Further Education Teaching and Learning

    ERIC Educational Resources Information Center

    Schroeder, A.; Minocha, S.; Schneider, C.

    2010-01-01

    Social software is increasingly being used in higher and further education to support teaching and learning processes. These applications provide students with social and cognitive stimulation and also add to the interaction between students and educators. However, in addition to the benefits the introduction of social software into a course…

  8. Weak grip strength does not predict upper extremity musculoskeletal symptoms or injuries among new workers

    PubMed Central

    Dale, Ann Marie; Addison, Lesley; Lester, Josh; Kaskutas, Vicki; Evanoff, Bradley

    2016-01-01

    Purpose Grip strength is often tested during post-offer pre-placement screening for workers in hand-intensive jobs. The purpose of this study was to evaluate the association between grip strength and upper extremity symptoms, work disability, and upper extremity musculoskeletal disorders (UE MSD) in a group of workers newly employed in both high and low hand intensive work. Methods 1107 recently-hired workers completed physical examinations including grip strength measurements. Repeated surveys obtained over 3 years described the presence of upper extremity symptoms, report of physician-diagnosed musculoskeletal disorders (MSD), and job titles. Baseline measured grip values were used in analytic models as continuous and categorized values to predict upper extremity symptoms, work disability, or UE MSD diagnosis. Results Twenty-six percent of males and 20% of females had low baseline hand strength compared to normative data. Multivariate logistic regression analyses showed no consistent associations between grip strength and three health outcomes (UE symptoms, work disability, and musculoskeletal disorders) in this young cohort (mean age: 30 years). Past MSD and work type were significant predictors of these outcomes. Conclusions Physical hand strength testing was not useful for identifying workers at risk for developing UE MSDs, and may be an inappropriate measure for post-offer job screens. PMID:23857165

  9. While Heisenberg Is Not Looking: The Strength of "Weak Measurements" in Educational Research

    ERIC Educational Resources Information Center

    Geelan, David R.

    2015-01-01

    The concept of "weak measurements" in quantum physics is a way of "cheating" the Uncertainty Principle. Heisenberg stated (and 85 years of experiments have demonstrated) that it is impossible to know both the position and momentum of a particle with arbitrary precision. More precise measurements of one decrease the precision…

  10. While Heisenberg Is Not Looking: The Strength of "Weak Measurements" in Educational Research

    ERIC Educational Resources Information Center

    Geelan, David R.

    2015-01-01

    The concept of "weak measurements" in quantum physics is a way of "cheating" the Uncertainty Principle. Heisenberg stated (and 85 years of experiments have demonstrated) that it is impossible to know both the position and momentum of a particle with arbitrary precision. More precise measurements of one decrease the precision…

  11. Scoring the Strengths and Weaknesses of Underage Drinking Laws in the United States

    PubMed Central

    Fell, James C.; Thomas, Sue; Scherer, Michael; Fisher, Deborah A.; Romano, Eduardo

    2015-01-01

    Several studies have examined the impact of a number of minimum legal drinking age 21 (MLDA-21) laws on underage alcohol consumption and alcohol-related crashes in the United States. These studies have contributed to our understanding of how alcohol control laws affect drinking and driving among those who are under age 21. However, much of the extant literature examining underage drinking laws use a “Law/No law” coding which may obscure the variability inherent in each law. Previous literature has demonstrated that inclusion of law strengths may affect outcomes and overall data fit when compared to “Law/No law” coding. In an effort to assess the relative strength of states’ underage drinking legislation, a coding system was developed in 2006 and applied to 16 MLDA-21 laws. The current article updates the previous endeavor and outlines a detailed strength coding mechanism for the current 20 MLDA-21 laws. PMID:26097775

  12. The expression and interpretation of uncertain forensic science evidence: verbal equivalence, evidence strength, and the weak evidence effect.

    PubMed

    Martire, Kristy A; Kemp, Richard I; Watkins, Ian; Sayle, Malindi A; Newell, Ben R

    2013-06-01

    Standards published by the Association of Forensic Science Providers (2009, Standards for the formulation of evaluative forensic science expert opinion, Science & Justice, Vol. 49, pp. 161-164) encourage forensic scientists to express their conclusions in the form of a likelihood ratio (LR), in which the value of the evidence is conveyed verbally or numerically. In this article, we report two experiments (using undergraduates and Mechanical Turk recruits) designed to investigate how much decision makers change their beliefs when presented with evidence in the form of verbal or numeric LRs. In Experiment 1 (N = 494), participants read a summary of a larceny trial containing inculpatory expert testimony in which evidence strength (low, moderate, high) and presentation method (verbal, numerical) varied. In Experiment 2 (N = 411), participants read the same larceny trial, this time including either exculpatory or inculpatory expert evidence that varied in strength (low, high) and presentation method (verbal, numerical). Both studies found a reasonable degree of correspondence in observed belief change resulting from verbal and numeric formats. However, belief change was considerably smaller than Bayesian calculations would predict. In addition, participants presented with evidence weakly supporting guilt tended to "invert" the evidence, thereby counterintuitively reducing their belief in the guilt of the accused. This "weak evidence effect" was most apparent in the verbal presentation conditions of both experiments, but only when the evidence was inculpatory. These findings raise questions about the interpretability of LRs by jurors and appear to support an expectancy-based account of the weak evidence effect. PMID:23750600

  13. Lessons from dwarf8 on the strengths and weaknesses of structured association mapping

    Technology Transfer Automated Retrieval System (TEKTRAN)

    The strengths of association mapping lie in its resolution and allelic richness, but spurious associations arising from historical relationships and selection patterns need to be accounted for in statistical analyses. Here we reanalyze one of the first generation structured association mapping studi...

  14. A Review of Meta-Analyses in Education: Methodological Strengths and Weaknesses

    ERIC Educational Resources Information Center

    Ahn, Soyeon; Ames, Allison J.; Myers, Nicholas D.

    2012-01-01

    The current review addresses the validity of published meta-analyses in education that determines the credibility and generalizability of study findings using a total of 56 meta-analyses published in education in the 2000s. Our objectives were to evaluate the current meta-analytic practices in education, identify methodological strengths and…

  15. A Review of Meta-Analyses in Education: Methodological Strengths and Weaknesses

    ERIC Educational Resources Information Center

    Ahn, Soyeon; Ames, Allison J.; Myers, Nicholas D.

    2012-01-01

    The current review addresses the validity of published meta-analyses in education that determines the credibility and generalizability of study findings using a total of 56 meta-analyses published in education in the 2000s. Our objectives were to evaluate the current meta-analytic practices in education, identify methodological strengths and…

  16. The Strengths and Weaknesses of Logic Formalisms to Support Mishap Analysis

    NASA Technical Reports Server (NTRS)

    Johnson, C. W.; Holloway, C. M.

    2002-01-01

    The increasing complexity of many safety critical systems poses new problems for mishap analysis. Techniques developed in the sixties and seventies cannot easily scale-up to analyze incidents involving tightly integrated software and hardware components. Similarly, the realization that many failures have systemic causes has widened the scope of many mishap investigations. Organizations, including NASA and the NTSB, have responded by starting research and training initiatives to ensure that their personnel are well equipped to meet these challenges. One strand of research has identified a range of mathematically based techniques that can be used to reason about the causes of complex, adverse events. The proponents of these techniques have argued that they can be used to formally prove that certain events created the necessary and sufficient causes for a mishap to occur. Mathematical proofs can reduce the bias that is often perceived to effect the interpretation of adverse events. Others have opposed the introduction of these techniques by identifying social and political aspects to incident investigation that cannot easily be reconciled with a logic-based approach. Traditional theorem proving mechanisms cannot accurately capture the wealth of inductive, deductive and statistical forms of inference that investigators routinely use in their analysis of adverse events. This paper summarizes some of the benefits that logics provide, describes their weaknesses, and proposes a number of directions for future research.

  17. OECI accreditation of the European Institute of Oncology of Milan: strengths and weaknesses.

    PubMed

    Deriu, Pietro L; Basso, Silvia; Mastrilli, Fabrizio; Orecchia, Roberto

    2016-01-29

    The European Institute of Oncology began the process to reach the accreditation promoted by the Organisation of European Cancer Institutes (OECI) in 2012. This accreditation integrates the quality and safety path started in 2001 with accreditation by the Joint Commission International. Despite the presence of diversified accreditations and certifications and the clear need of time, effort, and commitment, the models are complementary. Each model is not to be considered as an end but as a tool for improvement: e.g., mixing accreditation standards led to an improvement in the quality and safety of processes. The present article details the OECI accreditation experience of the European Institute of Oncology, in particular the following strengths of OECI standards: collaboration among several involved parties (patient, volunteer, patient's general practitioner) in the clinical and quality/safety processes; a larger involvement of support personnel (psycho-oncologists, dieticians, physical therapists); and the development of clinical/translational research and innovation in prevention, diagnosis, and treatment to guarantee the best available practice in diagnosis and treatment. The OECI accreditation is specific to oncology and therefore its standards are tailored to a cancer center, both in terms of language used in the standards manual and in terms of patient needs. The OECI accreditation system puts an auditor team with a standards manual in charge of verifying quality and confirms the definition of IEO as a Comprehensive Cancer Center. PMID:26833375

  18. I. The neurocognitive profile of Williams Syndrome: a complex pattern of strengths and weaknesses.

    PubMed

    Bellugi, U; Lichtenberger, L; Jones, W; Lai, Z; St George, M

    2000-01-01

    The rare, genetically based disorder, Williams syndrome (WMS), produces a constellation of distinctive cognitive, neuroanatomical, and electrophysiological features which we explore through the series of studies reported here. In this paper, we focus primarily on the cognitive characteristics of WMS and begin to forge links among these characteristics, the brain, and the genetic basis of the disorder. The distinctive cognitive profile of individuals with WMS includes relative strengths in language and facial processing and profound impairment in spatial cognition. The cognitive profile of abilities, including what is 'typical' for individuals with WMS is discussed, but we also highlight areas of variability across the group of individuals with WMS that we have studied. Although the overall cognitive abilities (IQs) of individuals with WMS are typically in the mild-to-moderate range of mental retardation, the peaks and valleys within different cognitive domains make this syndrome especially intriguing to study across levels. Understanding the brain basis (and ultimately the genetic basis) for higher cognitive functioning is the goal we have begun to undertake with this line of interdisciplinary research. PMID:10953231

  19. Strengths and weaknesses of sea ice as a potential early indicator of climate change

    SciTech Connect

    Parkinson, C.L.

    1992-03-01

    Sea ice is examined for its potential as an early indicator of climate change by considering how well it satisfies four criteria listed as desired characteristics for potential early indicators. Results of numerical modeling studies in the 1970s and 1980s suggested that sea ice satisfies the first characteristic, that the variable be expected to exhibit a large climate signal, very well; but these results have recently been updated in a way that decreases the success of sea ice in satisfying this particular property. Sea ice satisfies the second characteristic, that it be routinely measurable on a global basis, exceptionally well through satellite passive-microwave observations, and at the moment this is the core of its strength as a potential early indicator. However, the absence of a solid pre-satellite database considerably hinders how well sea ice satisfies the third characteristic, that it have low enough and known natural variability to allow a climate signal to be distinguished from the background noise, and how well it can be known to satisfy the final characteristic, that changes in it should not significantly lag changes in other climate variables. The conclusion reached is that although changes in the sea ice cover, when analyzed in conjunction with changes in other variables, will provide important information on climate change, sea ice is unlikely any time in the near future to be a definitive early indicator of climate change when considered by itself.

  20. Strengths and weaknesses of microarray approaches to detect Pseudo-nitzschia species in the field.

    PubMed

    Barra, Lucia; Ruggiero, Maria Valeria; Sarno, Diana; Montresor, Marina; Kooistra, Wiebe H C F

    2013-10-01

    The planktonic diatom genus Pseudo-nitzschia contains several genetically closely related species. Some of these can produce domoic acid, a potent neurotoxin. Thus, monitoring programs are needed to screen for the presence of these toxic species. Unfortunately, many are impossible to distinguish using light microscopy. Therefore, we assessed the applicability of microarray technology for detection of toxic and non-toxic Pseudo-nitzschia species in the Gulf of Naples (Mediterranean Sea). Here, 11 species have been detected, of which at least 5 are potentially toxic. A total of 49 genus- and species-specific DNA probes were designed in silico against the nuclear LSU and SSU rRNA of 19 species, and spotted on the microarray. The microarray was tested against total RNA of monoclonal cultures of eight species. Only three of the probes designed to be species-specific were indeed so within the limits of our experimental design. To assess the effectiveness of the microarray in detecting Pseudo-nitzschia species in environmental samples, we hybridized total RNA extracted from 11 seasonal plankton samples against microarray slides and compared the observed pattern with plankton counts in light microscopy and with expected hybridization patterns obtained with monoclonal cultures of the observed species. Presence of species in field samples generally resulted in signal patterns on the microarray as observed with RNA extracted from cultures of these species, but many a-specific signals appeared as well. Possible reasons for the numerous cross reactions are discussed. Calibration curves for Pseudo-nitzschia multistriata showed linear relationship between signal strength and cell number. PMID:24065245

  1. The effect of achievement test selection on identification of learning disabilities within a patterns of strengths and weaknesses framework.

    PubMed

    Miciak, Jeremy; Taylor, W Pat; Denton, Carolyn A; Fletcher, Jack M

    2015-09-01

    Few empirical investigations have evaluated learning disabilities (LD) identification methods based on a pattern of cognitive strengths and weaknesses (PSW). This study investigated the reliability of LD classification decisions of the concordance/discordance method (C/DM) across different psychoeducational assessment batteries. C/DM criteria were applied to assessment data from 177 second-grade students based on 2 psychoeducational assessment batteries. The achievement tests were different, but were highly correlated and measured the same latent construct. Resulting LD identifications were then evaluated for agreement across batteries on LD status and the academic domain of eligibility. The 2 batteries identified a similar number of participants as having LD (80 and 74). However, indices of agreement for classification decisions were low (? = .29), especially for percent positive agreement (62%). The 2 batteries demonstrated agreement on the academic domain of eligibility for only 25 participants. Cognitive discrepancy frameworks for LD identification are inherently unstable because of imperfect reliability and validity at the observed level. Methods premised on identifying a PSW profile may never achieve high reliability because of these underlying psychometric factors. An alternative is to directly assess academic skills to identify students in need of intervention. PMID:25243467

  2. A Study of Strengths and Weaknesses of Descriptive Assessment from Principals, Teachers and Experts Points of View in Chaharmahal and Bakhteyari Primary Schools

    ERIC Educational Resources Information Center

    Sharief, Mostafa; Naderi, Mahin; Hiedari, Maryam Shoja; Roodbari, Omolbanin; Jalilvand, Mohammad Reza

    2012-01-01

    The aim of current study is to determine the strengths and weaknesses of descriptive evaluation from the viewpoint of principals, teachers and experts of Chaharmahal and Bakhtiari province. A descriptive survey was performed. Statistical population includes 208 principals, 303 teachers, and 100 executive experts of descriptive evaluation scheme in…

  3. Wildfire Prevention and Suppression plans enhancing: a first overview on strength and weakness in Italian stakeholders experiences and perception.

    NASA Astrophysics Data System (ADS)

    Bonora, Laura; Conese, Claudio; Barbati, Anna

    2014-05-01

    Fires and wildfires represent an element of vulnerability for forests, considering that have now reached a level beyond which further burning would seriously endanger the ecosystem services and their sustainable management. It is fundamental to support fire-fighting Centres by giving them tools, useful to faces future trends; in this sense the first step is to examine technical and operative procedures to evaluate their strong and weak aspects, in collaboration with personnel responsible of risk management, suppression coordination and patrol responsible of direct attack. The aims this work is to identify present elements of strength ad problematic aspects to tuning the wildfire suppression actions to future changes; this is a crucial challenge both for policy and territory planners and managers. Historical investigation lines on forest fire covered the basilar and fundamental dynamics which understanding was necessary to confine and fight the wildfire phenomenon. At the present all the competences, knowledge and connections acquired are translating and including in the Plans, sharing innovative strategies -with the "direct involved actors"- trying to decrease the fire trend. Stakeholders underlined that collaboration between research and territorial Institutions are producing positive results, showing the conceptual rightness and the well-run of the in-progress implementations. The Italian framework of wildfire prevention plans is very peculiar because the Plans related to prevention and active intervention procedure are coincident. Normative, procedural, economic and logistic aspects are considered and handled in the same general document; each year the local structures, designed by the Regions, have in charge the draft of the operative plan, defining and managing the means and patrols distribution and turnover. In the present work 3 Italian Regions (Tuscany, Puglia and Sardinia, with different territorial and vegetation characteristics and affected by different fire regimes and incidence) have been selected to investigate, by questionnaire and meetings, stakeholders perception on present strength and weakness in the adopted plans. The results of the answers analysis show some main deficit aspects covering prevalently carthographic and procedural implementations: • Plans shall include a risk and vulnerability map; dangerous seasons are to be determined and have to be updated with current weather conditions. • Standardization of terminology and classifications in the plans. • Plans shall include a specific section for firefighting in RUI, socially being the most important areas to protect and where most complications during firefighting are found. • Protocols shall be adapted to the real on site situation. A single control center in the event of fire should be identified. This is particularly important if third-party resources are involved in the operations. • Use of new technologies, i.e. fire simulators, LIDAR, for fuel amount and availability determination, wind simulation, CO2 emissions, vegetation structure. In the same time some active proposals are supplyed by the operators, directly derived and linked with the wekness above mentioned: • Use of new technological tools for analysis (simulators, etc.) and for driving the operative aspects during the suppression. • Standardization of communication protocols in the plans and during the field operations. • Increase use of fire for landscape management in certain areas. • Investments shall be made in land resources rather than in air means, generally already sufficient. This analysis represents a first effort to collect and schematize the effective applicability level of the indications included in the Plans. It is the base for possible tuning of the research and policy lines and also to tuning the present documents; the indications supplied prove that the efforts done in research are been acquired by the operative sectors and that the active involvement of stakeholder is the future challenge to enhance the plans efficacy.

  4. AERONET-OC: Strengths and Weaknesses of a Network for the Validation of Satellite Coastal Radiometric Products

    NASA Technical Reports Server (NTRS)

    Zibordi, Giuseppe; Holben, Brent; Slutsker, Ilya; Giles, David; D'Alimonte, Davide; Melin, Frederic; Berthon, Jean-Francois; Vandemark, Doug; Feng, Hui; Schuster, Gregory; Fabbri, Bryan E.; Kaitala, Seppo; Seppala, Jukka

    2008-01-01

    The Ocean Color component of the Aerosol Robotic Network (AERONET-OC) has been implemented to support long-term satellite ocean color investigations through cross-site consistent and accurate measurements collected by autonomous radiometer systems deployed on offshore fixed platforms. The ultimate purpose of AERONET-OC is the production of standardized measurements performed at different sites with identical measuring systems and protocols, calibrated using a single reference source and method, and processed with the same code. The AERONET-OC primary data product is the normalized water leaving radiance determined at center-wavelengths of interest for satellite ocean color applications, with an uncertainty lower than 5% in the blue-green spectral regions and higher than 8% in the red. Measurements collected at 6 sites counting the northern Adriatic Sea, the Baltic Proper, the Gulf of Finland, the Persian Gulf, and, the northern and southern margins of the Middle Atlantic Bay, have shown the capability of producing quality assured data over a wide range of bio-optical conditions including Case-2 yellow substance- and sedimentdominated waters. This work briefly introduces network elements like: deployment sites, measurement method, instrument calibration, processing scheme, quality-assurance, uncertainties, data archive and products accessibility. Emphases is given to those elements which underline the network strengths (i.e., mostly standardization of any network element) and its weaknesses (i.e., the use of consolidated, but old-fashioned technology). The work also addresses the application of AERONET-OC data to the validation of primary satellite radiometric products over a variety of complex coastal waters and finally provides elements for the identification of new deployment sites most suitable to support satellite ocean color missions.

  5. Strengths and weaknesses of guideline approaches to safeguard voluntary informed consent of patients within a dependent relationship

    PubMed Central

    2014-01-01

    Background It is thought that a dependent relationship between patients and physicians who enroll their own patients in research compromises voluntary informed consent. Therefore, several ethical guidelines for human subject research provide approaches to mitigate these compromises. Currently, these approaches have not been critically evaluated. In this article, we analyze the approaches of ethical guidelines to manage the influence of a dependent relationship between patients and physicians on voluntary informed consent and discuss the strengths and weaknesses of these approaches. Methods We performed a review of international ethical guidance documents on human subject research, listed in the Oxford Textbook of Clinical Research Ethics and found through cross referencing. We also searched Global Ethics Observatory (GEObs) and the World Health Organization (WHO) website. Guidelines from all years were eligible for inclusion. The date last searched was December 2013. Discussion We identified two basic guideline approaches: 1. a process approach, which focuses on the person who obtains informed consent, that is, an independent individual, such as a research nurse or counselor; and 2. a content approach, emphasizing the voluntary nature of participation. Both approaches are valuable, either because the influence of the physician may diminish or because it empowers patients to make voluntary decisions. However, the approaches also face challenges. First, research nurses are not always independent. Second, physician-investigators will be informed about decisions of their patients. Third, involvement of a counselor is sometimes unfeasible. Fourth, the right to withdraw may be difficult to act upon in a dependent relationship. Conclusions Current guideline approaches to protect voluntary informed consent within a dependent relationship are suboptimal. To prevent compromises to voluntary informed consent, consent should not only be obtained by an independent individual, but this person should also emphasize the voluntary nature of participation. At the same time, dependency as such does not imply undue influence. Sometimes the physician may be best qualified to provide information, for example, for a very specialized study. Still, the research nurse should obtain informed consent. In addition, patients should be able to consult a counselor, who attends the informed consent discussions and is concerned with their interests. Finally, both physicians and research nurses should disclose research interests. PMID:24655604

  6. Weak-interaction strength from charge-exchange reactions versus {beta} decay in the A=40 isoquintet

    SciTech Connect

    Bhattacharya, M.; Goodman, C. D.; Garcia, A.

    2009-11-15

    We report a measurement of the Gamow-Teller (GT) strength distribution for {sup 40}Ar{yields}{sup 40}K using the 0 deg. (p,n) reaction. The measurement extends observed GT strength distribution in the A=40 system up to an excitation energy of {approx}8 MeV. In comparing our results with those from the {beta} decay of the isospin mirror nucleus {sup 40}Ti, we find that, within the excitation energy region probed by the {beta}-decay experiment, we observe a total GT strength that is in fair agreement with the {beta}-decay measurement. However, we find that the relative strength of the two strongest transitions differs by a factor of {approx}1.8 in comparing our results from (p,n) reactions with the {beta} decay of {sup 40}Ti. Using our results we present the neutrino-capture cross section for {sup 40}Ar.

  7. Threats and vulnerabilities

    NASA Astrophysics Data System (ADS)

    Ahonen, Pasi; Alahuhta, Petteri; Daskala, Barbara; Delaitre, Sabine; Hert, Paul De; Lindner, Ralf; Maghiros, Ioannis; Moscibroda, Anna; Schreurs, Wim; Verlinden, Michiel

    In this chapter, we present a review of threats and vulnerabilities that could afflict society and individuals in the AmI world in the context of the key policy issues of privacy, identity, trust, security and digital divide. We define a threat as the potential for one or more unwanted consequences caused by a circumstance, capability, action or event that could be harmful to a system or person. Threats can be caused naturally, accidentally or intentionally. In essence, a threat is a ubiquitous phenomenon. A vulnerability is a flaw or weakness in a system's design, its implementation, operation or management that could be exploited to violate the system and, consequently, cause a threat. Vulnerabilities may have different dimensions: technical, functional or behavioural.1

  8. Biological Threats

    MedlinePLUS

    ... RDD) Workplace Plans School Emergency Plans Main Content Biological Threats Biological agents are organisms or toxins that ... Centers for Disease Control and Prevention . Before a Biological Threat Unlike an explosion, a biological attack may ...

  9. The Application of Strengths, Weaknesses, Opportunities and Threats (SWOT) Analysis for Managing Vocational and Technical Education (VTE) Programmes for Improved Efficiency in Nigeria

    ERIC Educational Resources Information Center

    Adepoju, T. L.; Famade, Olu Adesola

    2010-01-01

    This paper reviews the current status of vocational and technical education programmes (VTE) in Nigeria and the major innovations of the Nigerian Government in the recent times in the sector vis-a-vis the demands of the modern world for vocational and technological development. It therefore, proposes a paradigm shift in the operation of VTE…

  10. Floods and health in Gambella region, Ethiopia: a qualitative assessment of the strengths and weaknesses of coping mechanisms

    PubMed Central

    Wakuma Abaya, Samson; Mandere, Nicodemus; Ewald, Göran

    2009-01-01

    Background Floods are the most frequent and devastating type of natural disaster worldwide, causing unprecedented deaths, diseases, and destruction of property and crops. Flooding has a greater impact in developing countries due to lack of sufficient disaster management structures and a lack of economic resources. Objective This study was conducted with the aim of contributing to the knowledge base of development strategies that reduce flood-related health risks in developing countries. The study focused particularly on assessing the flood risks and health-related issues in the Gambella region of Ethiopia; with the intent of producing relevant information to assist with the improvements in the efficacy of the current flood coping strategies in the region. Methods Data were gathered through interviews with 14 officers from different government and non-governmental organizations and a questionnaire survey given to 35 flood victims in Itang woreda. A qualitative approach was applied and the data were analyzed using content analysis. Results It was found that flooding is a common problem in Gambella region. The findings also indicate that the flood frequency and magnitude has increased rapidly during the last decade. The increase in floods was driven mainly by climate change and changes in land use, specifically deforestation. The reported main impacts of flooding on human health in Gambella region were deaths, injuries, and diseases such as malaria and diarrhea. Another notable consequence of flooding was crop destruction and subsequent malnutrition. Conclusions Three weaknesses that were identified in the current coping strategies for flood-related health impacts in Gambella region were a lack of flood-specific policy, absence of risk assessment, and weak institutional capacity. This study recommends new policy approaches that will increase the effectiveness of the current flood coping strategies to sustainably address the impact of flooding on human health. PMID:20027252

  11. Stereotype Threat.

    PubMed

    Spencer, Steven J; Logel, Christine; Davies, Paul G

    2016-01-01

    When members of a stigmatized group find themselves in a situation where negative stereotypes provide a possible framework for interpreting their behavior, the risk of being judged in light of those stereotypes can elicit a disruptive state that undermines performance and aspirations in that domain. This situational predicament, termed stereotype threat, continues to be an intensely debated and researched topic in educational, social, and organizational psychology. In this review, we explore the various sources of stereotype threat, the mechanisms underlying stereotype-threat effects (both mediators and moderators), and the consequences of this situational predicament, as well as the means through which society and stigmatized individuals can overcome the insidious effects of stereotype threat. Ultimately, we hope this review alleviates some of the confusion surrounding stereotype threat while also sparking further research and debate. PMID:26361054

  12. The Reliability and Validity of the English and Spanish Strengths and Weaknesses of ADHD and Normal Behavior Rating Scales in a Preschool Sample: Continuum Measures of Hyperactivity and Inattention

    ERIC Educational Resources Information Center

    Lakes, Kimberley D.; Swanson, James M.; Riggs, Matt

    2012-01-01

    Objective: To evaluate the reliability and validity of the English and Spanish versions of the Strengths and Weaknesses of ADHD-symptom and Normal-behavior (SWAN) rating scale. Method: Parents of preschoolers completed both a SWAN and the well-established Strengths and Difficulties Questionnaire (SDQ) on two separate occasions over a span of 3…

  13. The Reliability and Validity of the English and Spanish Strengths and Weaknesses of ADHD and Normal Behavior Rating Scales in a Preschool Sample: Continuum Measures of Hyperactivity and Inattention

    ERIC Educational Resources Information Center

    Lakes, Kimberley D.; Swanson, James M.; Riggs, Matt

    2012-01-01

    Objective: To evaluate the reliability and validity of the English and Spanish versions of the Strengths and Weaknesses of ADHD-symptom and Normal-behavior (SWAN) rating scale. Method: Parents of preschoolers completed both a SWAN and the well-established Strengths and Difficulties Questionnaire (SDQ) on two separate occasions over a span of 3…

  14. Measuring the Brønsted acid strength of zeolites--does it correlate with the O-H frequency shift probed by a weak base?

    PubMed

    Arean, Carlos O; Delgado, Montserrat R; Nachtigall, Petr; Thang, Ho Viet; Rubeš, Miroslav; Bulánek, Roman; Chlubná-Eliášová, Pavla

    2014-06-01

    Brønsted-acid zeolites are currently being used as catalysts in a wide range of technological processes, spanning from the petrochemical industry to biomass upgrade, methanol to olefin conversion and the production of fine chemicals. For most of the involved chemical processes, acid strength is a key factor determining catalytic performance, and hence there is a need to evaluate it correctly. Based on simplicity, the magnitude of the red shift of the O-H stretching frequency, ??(OH), when the Brønsted-acid hydroxyl group of protonic zeolites interacts with an adsorbed weak base (such as carbon monoxide or dinitrogen) is frequently used for ranking acid strength. Nevertheless, the enthalpy change, ?H(0), involved in that hydrogen-bonding interaction should be a better indicator; and in fact ??(OH) and ?H(0) are often found to correlate among themselves, but, as shown herein, that is not always the case. We report on experimental determination of the interaction (at a low temperature) of carbon monoxide and dinitrogen with the protonic zeolites H-MCM-22 and H-MCM-56 (which have the MWW structure type) showing that the standard enthalpy of formation of OH···CO and OH···NN hydrogen-bonded complexes is distinctively smaller than the corresponding values reported in the literature for H-ZSM-5 and H-FER, and yet the corresponding ??(OH) values are significantly larger for the zeolites having the MWW structure type (DFT calculations are also shown for H-MCM-22). These rather unexpected results should alert the reader to the risk of using the O-H frequency shift probed by an adsorbed weak base as a general indicator for ranking zeolite Brønsted acidity. PMID:24549190

  15. Facing ambiguous threats.

    PubMed

    Roberto, Michael A; Bohmer, Richard M J; Edmondson, Amy C

    2006-11-01

    On February 1, 2003, the world watched in horror as the Columbia space shuttle broke apart while reentering the earth's atmosphere, killing all seven astronauts. Some have argued that NASA's failure to respond with appropriate intensity to the so-called foam strike that led to the accident was evidence of irresponsible or incompetent management. The authors' research, however, suggests that NASA was exhibiting a natural, albeit unfortunate, pattern of behavior common in many organizations. The foam strike is a prime example of what the authors call an ambiguous threat-a signal that may or may not portend future harm. Ambiguous threats differ from threats with obvious causes-say, a fire in the building-for which the response is clear. They also differ from unmistakable threats that may lack straightforward response paths (such as the frightening oxygen-tank explosion aboard Apollo 13). However, when the warning sign is ambiguous and the threat's potential effect is unclear, managers may choose to ignore or discount the risk. Such an approach can be catastrophic. Firms that do a good job of dealing with ambiguous threats do not improvise during a crisis; rather, they apply a rigorous set of detection and response capabilities that they have developed and practiced beforehand. In this article, the authors outline how to put such capabilities in place long before a crisis strikes. First, companies need to hone their teamwork and rapid problem-solving skills through practice. Second, they must learn to recognize weak signals, amplify the threat, and encourage employees to ask disconcerting "what if" questions in a safe environment. Finally, they should explore possible responses to threats through quick, low-cost experimentation. PMID:17131567

  16. Spatial Noise in Coupling Strength and Natural Frequency within a Pacemaker Network; Consequences for Development of Intestinal Motor Patterns According to a Weakly Coupled Phase Oscillator Model

    PubMed Central

    Parsons, Sean P.; Huizinga, Jan D.

    2016-01-01

    Pacemaker activities generated by networks of interstitial cells of Cajal (ICC), in conjunction with the enteric nervous system, orchestrate most motor patterns in the gastrointestinal tract. It was our objective to understand the role of network features of ICC associated with the myenteric plexus (ICC-MP) in the shaping of motor patterns of the small intestine. To that end, a model of weakly coupled oscillators (oscillators influence each other's phase but not amplitude) was created with most parameters derived from experimental data. The ICC network is a uniform two dimensional network coupled by gap junctions. All ICC generate pacemaker (slow wave) activity with a frequency gradient in mice from 50/min at the proximal end of the intestine to 40/min at the distal end. Key features of motor patterns, directly related to the underlying pacemaker activity, are frequency steps and dislocations. These were accurately mimicked by reduction of coupling strength at a point in the chain of oscillators. When coupling strength was expressed as a product of gap junction density and conductance, and gap junction density was varied randomly along the chain (i.e., spatial noise) with a long-tailed distribution, plateau steps occurred at pointsof low density. As gap junction conductance was decreased, the number of plateaus increased, mimicking the effect of the gap junction inhibitor carbenoxolone. When spatial noise was added to the natural interval gradient, as gap junction conductance decreased, the number of plateaus increased as before but in addition the phase waves frequently changed direction of apparent propagation, again mimicking the effect of carbenoxolone. In summary, key features of the motor patterns that are governed by pacemaker activity may be a direct consequence of biological noise, specifically spatial noise in gap junction coupling and pacemaker frequency. PMID:26869875

  17. Clinical utility of the Chinese Strengths and Weaknesses of ADHD-Symptoms and Normal-Behaviors questionnaire (SWAN) when compared with DISC-IV

    PubMed Central

    Chan, Grace Fong-Chun; Lai, Kelly Yee-Ching; Luk, Ernest Siu-Luen; Hung, Se-Fong; Leung, Patrick Wing-Leung

    2014-01-01

    Background Attention-deficit/hyperactivity disorder (ADHD) is a common and impairing child and adolescent psychiatric disorder. Early identification and prompt treatment are essential. Rating scales are commonly used by clinicians and researchers to assess ADHD children. Objective In the current study, we aimed to examine the clinical utility of the Chinese version of the Strengths and Weaknesses of ADHD Symptoms and Normal Behaviors (SWAN) questionnaire. We validated its subscale scores against the Diagnostic Interview Schedule for Children Version IV (DISC-IV) and looked into its ability to identify ADHD in a psychiatric clinic setting. We also tested age and gender effects on SWAN scores. Specific subscale cutoff scores of SWAN were subsequently determined. Method A total of 290 children aged 6–12 years old studying in local mainstream primary schools were recruited from a clinic setting and interviewed with the parent version of DISC-IV. Their parents and teachers completed the corresponding version of SWAN. Results Both parent and teacher versions of SWAN were found to have good concurrent validity with DISC-IV. It could identify ADHD well in a clinic sample. Gender-specific cutoff scores were determined. Sensitivities and specificities were found to be satisfactory. SWAN was also found to perform equally well in identifying ADHD in those with and without comorbid Autistic Spectrum Disorder. Conclusion SWAN was proven to be a useful tool to aid the assessment of ADHD in a clinic sample. PMID:25187717

  18. Strengths and Weaknesses of Global Positioning System (GPS) Data-Loggers and Semi-structured Interviews for Capturing Fine-scale Human Mobility: Findings from Iquitos, Peru

    PubMed Central

    Paz-Soldan, Valerie A.; Reiner, Robert C.; Morrison, Amy C.; Stoddard, Steven T.; Kitron, Uriel; Scott, Thomas W.; Elder, John P.; Halsey, Eric S.; Kochel, Tadeusz J.; Astete, Helvio; Vazquez-Prokopec, Gonzalo M.

    2014-01-01

    Quantifying human mobility has significant consequences for studying physical activity, exposure to pathogens, and generating more realistic infectious disease models. Location-aware technologies such as Global Positioning System (GPS)-enabled devices are used increasingly as a gold standard for mobility research. The main goal of this observational study was to compare and contrast the information obtained through GPS and semi-structured interviews (SSI) to assess issues affecting data quality and, ultimately, our ability to measure fine-scale human mobility. A total of 160 individuals, ages 7 to 74, from Iquitos, Peru, were tracked using GPS data-loggers for 14 days and later interviewed using the SSI about places they visited while tracked. A total of 2,047 and 886 places were reported in the SSI and identified by GPS, respectively. Differences in the concordance between methods occurred by location type, distance threshold (within a given radius to be considered a match) selected, GPS data collection frequency (i.e., 30, 90 or 150 seconds) and number of GPS points near the SSI place considered to define a match. Both methods had perfect concordance identifying each participant's house, followed by 80–100% concordance for identifying schools and lodgings, and 50–80% concordance for residences and commercial and religious locations. As the distance threshold selected increased, the concordance between SSI and raw GPS data increased (beyond 20 meters most locations reached their maximum concordance). Processing raw GPS data using a signal-clustering algorithm decreased overall concordance to 14.3%. The most common causes of discordance as described by a sub-sample (n = 101) with whom we followed-up were GPS units being accidentally off (30%), forgetting or purposely not taking the units when leaving home (24.8%), possible barriers to the signal (4.7%) and leaving units home to recharge (4.6%). We provide a quantitative assessment of the strengths and weaknesses of both methods for capturing fine-scale human mobility. PMID:24922530

  19. Cyber threat metrics.

    SciTech Connect

    Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

    2012-03-01

    Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

  20. Muscle strength and BMI as predictors of major mobility disability in the lifestyle interventions and independence for elders pilot (LIFE-P)

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Muscle weakness and obesity are two significant threats to mobility facing the increasing number of older adults. To date, there are no studies that have examined the association of strength and body mass index (BMI) on event rates on a widely used performance measure of major mobility disability. T...

  1. The Zirconia Ceramic: Strengths and Weaknesses

    PubMed Central

    Daou, Elie E.

    2014-01-01

    Metal ceramic restorations were considered the gold standard as reliable materials. Increasing demand for esthetics supported the commercialization of new metal free restorations. A growing demand is rising for zirconia prostheses. Peer-reviewed articles published till July 2013 were identified through a Medline (Pubmed and Elsevier). Emphasizing was made on zirconia properties and applications. Zirconia materials are able to withstand posterior physiologic loads. Although zirconia cores are considered as reliable materials, these restorations are not problem free. PMID:24851138

  2. Weak bump quasars

    NASA Technical Reports Server (NTRS)

    Wilkes, B. J.; Mcdowell, J.

    1994-01-01

    Research into the optical, ultraviolet and infrared continuum emission from quasars and their host galaxies was carried out. The main results were the discovery of quasars with unusually weak infrared emission and the construction of a quantitative estimate of the dispersion in quasar continuum properties. One of the major uncertainties in the measurement of quasar continuum strength is the contribution to the continuum of the quasar host galaxy as a function of wavelength. Continuum templates were constructed for different types of host galaxy and individual estimates made of the decomposed quasar and host continua based on existing observations of the target quasars. The results are that host galaxy contamination is worse than previously suspected, and some apparent weak bump quasars are really normal quasars with strong host galaxies. However, the existence of true weak bump quasars such as PHL 909 was confirmed. The study of the link between the bump strength and other wavebands was continued by comparing with IRAS data. There is evidence that excess far infrared radiation is correlated with weaker ultraviolet bumps. This argues against an orientation effect and implies a probable link with the host galaxy environment, for instance the presence of a luminous starburst. However, the evidence still favors the idea that reddening is not important in those objects with ultraviolet weak bumps. The same work has led to the discovery of a class of infrared weak quasars. Pushing another part of the envelope of quasar continuum parameter space, the IR-weak quasars have implications for understanding the effects of reddening internal to the quasars, the reality of ultraviolet turnovers, and may allow further tests of the Phinney dust model for the IR continuum. They will also be important objects for studying the claimed IR to x-ray continuum correlation.

  3. Weak superconductivity

    SciTech Connect

    Benacka, S.; Kedro, M.

    1990-01-01

    This Proceedings consist of invited papers and contributions presented at the Fifth Czechoslovak Symposium on Weak Superconductivity (5CSSWS) held at Smolenice Castle from May 29 to June 2, 1989. This five-days meeting was organized by the Institute of Electrical Engineering, Electro-Physical Research Center, Slovak Academy of Sciences, Bratislava, in cooperation with the Institute of Measurement and Measuring Techniques, EPRC, SAS, Bratislava and the Institute of Physics, CSAS, in Prague. From the beginning the Czechoslovak activities in weak superconductivity were concerned with preparation and study of properties of weak links based on superconducting thin films of Pb, Nb, and Nb{sub 3}Sn, as well as bulk point contacts and rf SQUIDs for magnetometry. The possibility of application of superconducting weak links with tunnel and bridge junctions in measuring techniques, magnetometry, medicine, metrology, radiometry, etc., were studied. Some of these activities are still in progress. These Proceedings include contributions on the properties of tunnel junctions, electrodynamics of SQUIDs, computer simulation of interferometers, multi-channel magnetometry for biomagnetic applications, etc. The discovery of high T{sub c} superconductivity influenced strongly the topics of 5CSSWS. Most contributions of this volume are devoted to the preparation of high T{sub c} superconductor thin films by vacuum deposition techniques because of their dominant role in technology of cryoelectronic microcircuits. Further, results in the study of physical properties of high T{sub c} superconducting thin films by means of both dc and rf methods, tunnel and microcontact spectroscopy, are documented. Other contributions deal with preparation of rf SQUIDs, radiation detectors, etc.

  4. Individual threat, group threat, and racial policy: exploring the relationship between threat and racial attitudes.

    PubMed

    Rosenstein, Judith E

    2008-12-01

    Racial threat scholars have long argued that racial prejudice is motivated by threat. This literature identifies two types of threat: individual threat and group threat; however, actual arguments tend to focus on only one of the two types of threat. Consequently, there has been no assessment of whether both threats are simultaneously associated with prejudice. This paper uses data from the 1994 General Social Survey (GSS) to examine the relationship between perceptions of individual threat, perceptions of group threat, and opposition to policies aiding blacks. Results from multinomial logits demonstrate that both threats are associated with opposition to race-equalizing policies, suggesting that single-threat theories should be reevaluated and that studies incorporating racial threat should include both types of threat. PMID:19227695

  5. Weak Interactions

    DOE R&D Accomplishments Database

    Lee, T. D.

    1957-06-01

    Experimental results on the non-conservation of parity and charge conservation in weak interactions are reviewed. The two-component theory of the neutrino is discussed. Lepton reactions are examined under the assumption of the law of conservation of leptons and that the neutrino is described by a two- component theory. From the results of this examination, the universal Fermi interactions are analyzed. Although reactions involving the neutrino can be described, the same is not true of reactions which do not involve the lepton, as the discussion of the decay of K mesons and hyperons shows. The question of the invariance of time reversal is next examined. (J.S.R.)

  6. Combatting Insider Threats

    NASA Astrophysics Data System (ADS)

    Neumann, Peter G.

    Risks from insider threats are strongly context dependent, and arise in many ways at different layers of system abstraction for different types of systems. We discuss various basic characteristics of insider threats, and consider approaches to the development and use of computer-related environments that require systems and networking to be trustworthy in spite of insider misuse. We also consider future research that could improve both detectability, prevention, and response. This chapter seeks to cope with insider misuse in a broad range of application domains - for example, critical infrastructures, privacy-preserving database systems, financial systems, and interoperable health-care infrastructures. To illustrate this, we apply the principles considered here to the task of detecting and preventing insider misuse in systems that might be used to facilitate trustworthy elections. This discussion includes an examination of the relevance of the Saltzer-Schroeder-Kaashoek security principles and the Clark-Wilson integrity properties for end-to-end election integrity. Trustworthy system developments must consider insider misuse as merely one set of threats that must be addressed consistently together with many other threats such as penetrations, denials of service, system faults and failures, and other threats to survivability. In addition, insider misuse cannot be realistically addressed unless significant improvements are made in the trustworthiness of component systems and their networking as well as their predictably trustworthy compositions into enterprise solutions - architecturally, developmentally, and operationally.

  7. Credible threats and promises.

    PubMed Central

    McNamara, John M; Houston, Alasdair I

    2002-01-01

    We consider various implications of information about the other player in two-player evolutionary games. A simple model of desertion shows that information about the partner's behaviour can be disadvantageous, and highlights the idea of credible threats. We then discuss the general issue of whether the partner can convince the focal player that it will behave in a specific way, i.e. whether the focal player can make credible threats or promises. We show that when desertion decisions depend on reserves, a player can manipulate its reserves so as to create a credible threat of desertion. We then extend previous work on the evolution of trust and commitment, discussing conditions under which it is advantageous to assume that a partner will behave in a certain way even though it is not in its best interest. PMID:12495517

  8. Neural mechanisms underlying selective attention to threat.

    PubMed

    Bishop, Sonia J

    2008-01-01

    Biased competition models of selective attention suggest that attentional competition is influenced both by bottom-up sensory mechanisms sensitive to stimulus salience and top-down control mechanisms that support the processing of task-relevant stimuli. This provides a framework for investigating the neural mechanisms underlying selective attention to threat. Both subcortical regions implicated in threat detection--specifically the amygdala--and prefrontal cortical regions implicated in top-down attentional control are activated in response to task-irrelevant threat stimuli. A number of questions including the automaticity of the amygdala response to threat distractors, the modulation by anxiety of the amygdala and prefrontal response to these stimuli, and the impact of genetic and environmental factors upon this circuitry are addressed. The empirical literature is considered in the context of theoretical accounts of the neural substrate of selective attention and conscious awareness. It is suggested that the neural activity provoked by a given visual stimulus is influenced by factors impacting upon the strength of the bottom-up trace (e.g., presentation time, backward masking), stimulus salience (including threat relatedness), competition with other visual stimuli for perceptual processing resources, and the augmentation of the stimulus trace by allocation of top-down attentional resources. Individual differences in trait and state anxiety, and in genetic makeup, are thought to modulate the influence of stimulus valence and top-down attention through their impact upon amygdala and prefrontal function. PMID:18591476

  9. Threat Assessment Plans

    ERIC Educational Resources Information Center

    Pascopella, Angela

    2008-01-01

    With every new case of school violence, district leaders are urged to be proactive in hopes of averting potential violence. Experts say part of that proactive work comes from a threat assessment plan that every district should have. While every district that receives funds from the U.S. Department of Education for school safety is required to have…

  10. ThreatView

    SciTech Connect

    2007-09-25

    The ThreatView project is based on our prior work with the existing ParaView open-source scientific visualization application. Where ParaView provides a grapical client optimized scientific visualization over the VTK parallel client server architecture, ThreatView provides a client optimized for more generic visual analytics over the same architecture. Because ThreatView is based on the VTK parallel client-server architecture, data sources can reside on remote hosts, and processing and rendering can be performed in parallel. As seen in Fig. 1, ThreatView provides four main methods for visualizing data: Landscape View, which displays a graph using a landscape metaphor where clusters of graph nodes produce "hills" in the landscape; Graph View, which displays a graph using a traditional "ball-and-stick" style; Table View, which displays tabular data in a standard spreadsheet; and Attribute View, which displays a tabular "histogram" of input data - for a selected table column, the Attribute View displays each unique value within the column, and the number of times that value appears in the data. There are two supplemental view types: Text View, which displays tabular data one-record-at-a-time; and the Statistics View, which displays input metadata, such as the number of vertices and edges in a graph, the number of rows in a table, etc.

  11. ThreatView

    Energy Science and Technology Software Center (ESTSC)

    2007-09-25

    The ThreatView project is based on our prior work with the existing ParaView open-source scientific visualization application. Where ParaView provides a grapical client optimized scientific visualization over the VTK parallel client server architecture, ThreatView provides a client optimized for more generic visual analytics over the same architecture. Because ThreatView is based on the VTK parallel client-server architecture, data sources can reside on remote hosts, and processing and rendering can be performed in parallel. As seenmore » in Fig. 1, ThreatView provides four main methods for visualizing data: Landscape View, which displays a graph using a landscape metaphor where clusters of graph nodes produce "hills" in the landscape; Graph View, which displays a graph using a traditional "ball-and-stick" style; Table View, which displays tabular data in a standard spreadsheet; and Attribute View, which displays a tabular "histogram" of input data - for a selected table column, the Attribute View displays each unique value within the column, and the number of times that value appears in the data. There are two supplemental view types: Text View, which displays tabular data one-record-at-a-time; and the Statistics View, which displays input metadata, such as the number of vertices and edges in a graph, the number of rows in a table, etc.« less

  12. Environmental Threats at School

    ERIC Educational Resources Information Center

    Green, Twhanna

    2005-01-01

    Children can be exposed to dangerous chemicals and toxins in the most unlikely of places: Their schools. This brief article describes the types of threats that school environments pose to students' health, including such pollution and chemical exposures as lead, mercury, arsenic, molds, and poor indoor air quality. The article provides tips for…

  13. Proliferation: Threat and response

    SciTech Connect

    1996-04-01

    ;Table of Contents: Section I: The Regional Proliferation Challenge; Northeast Asia; The Middle East and North Africa; The Former Soviet Union: Russia, Ukrane, Kazakstan, And Belarus; South Asia; The International Threat: Dangers from Terrorism, Insurgencies, Civil Wars, And Organized Crime; Section II: Department of Defense Response; Technical Annex: Accessible Technologies; Glossary.

  14. Threat Assessment Plans

    ERIC Educational Resources Information Center

    Pascopella, Angela

    2008-01-01

    With every new case of school violence, district leaders are urged to be proactive in hopes of averting potential violence. Experts say part of that proactive work comes from a threat assessment plan that every district should have. While every district that receives funds from the U.S. Department of Education for school safety is required to have…

  15. Environmental Threats at School

    ERIC Educational Resources Information Center

    Green, Twhanna

    2005-01-01

    Children can be exposed to dangerous chemicals and toxins in the most unlikely of places: Their schools. This brief article describes the types of threats that school environments pose to students' health, including such pollution and chemical exposures as lead, mercury, arsenic, molds, and poor indoor air quality. The article provides tips for…

  16. Airborne Particulate Threat Assessment

    SciTech Connect

    Patrick Treado; Oksana Klueva; Jeffrey Beckstead

    2008-12-31

    Aerosol threat detection requires the ability to discern between threat agents and ambient background particulate matter (PM) encountered in the environment. To date, Raman imaging technology has been demonstrated as an effective strategy for the assessment of threat agents in the presence of specific, complex backgrounds. Expanding our understanding of the composition of ambient particulate matter background will improve the overall performance of Raman Chemical Imaging (RCI) detection strategies for the autonomous detection of airborne chemical and biological hazards. Improving RCI detection performance is strategic due to its potential to become a widely exploited detection approach by several U.S. government agencies. To improve the understanding of the ambient PM background with subsequent improvement in Raman threat detection capability, ChemImage undertook the Airborne Particulate Threat Assessment (APTA) Project in 2005-2008 through a collaborative effort with the National Energy Technology Laboratory (NETL), under cooperative agreement number DE-FC26-05NT42594. During Phase 1 of the program, a novel PM classification based on molecular composition was developed based on a comprehensive review of the scientific literature. In addition, testing protocols were developed for ambient PM characterization. A signature database was developed based on a variety of microanalytical techniques, including scanning electron microscopy, FT-IR microspectroscopy, optical microscopy, fluorescence and Raman chemical imaging techniques. An automated particle integrated collector and detector (APICD) prototype was developed for automated collection, deposition and detection of biothreat agents in background PM. During Phase 2 of the program, ChemImage continued to refine the understanding of ambient background composition. Additionally, ChemImage enhanced the APICD to provide improved autonomy, sensitivity and specificity. Deliverables included a Final Report detailing our findings and APICD Gen II subsystems for automated collection, deposition and detection of ambient particulate matter. Key findings from the APTA Program include: Ambient biological PM taxonomy; Demonstration of key subsystems needed for autonomous bioaerosol detection; System design; Efficient electrostatic collection; Automated bioagent recognition; Raman analysis performance validating Td<9 sec; Efficient collection surface regeneration; and Development of a quantitative bioaerosol defection model. The objective of the APTA program was to advance the state of our knowledge of ambient background PM composition. Operation of an automated aerosol detection system was enhanced by a more accurate assessment of background variability, especially for sensitive and specific sensing strategies like Raman detection that are background-limited in performance. Based on this improved knowledge of background, the overall threat detection performance of Raman sensors was improved.

  17. Proliferation: Threat and response

    SciTech Connect

    1996-04-01

    During the height of the Cold War, the Russian physicist Andre Sakharov said, `Reducing the risk of annihilating humanity in a nuclear war carries an absolute priority over all other considerations.` The end of the Cold War has reduced the threat of global nuclear war, but today a new threat is rising from the global spread of nuclear, biological, and chemical weapons. Hostile groups and nations have tried - or have been able - to obtain these weapons, the technology, and homegrown ability to make them or ballistic missiles that can deliver the massive annihilation, poison, and death of these weapons hundreds of miles away. For rogue nations, these weapons are a ticket to power, stature, and confidence in regional war.

  18. Pollution: a global threat.

    PubMed

    McCrink-Goode, Melissa

    2014-07-01

    Over the past several decades, several large-scale seemingly unrelated events have unfolded in all corners of the world. Within the oceans, coral reef systems have been facing unprecedented mass bleaching episodes, sea turtles worldwide are currently experiencing an epidemic in the form of fibropapilloma, and global phytoplankton populations have declined by 40%. Within the Earth's terrestrial systems, similar phenomena have appeared in the form of colony collapse disorder (CCD) currently devastating honey bee colonies, White Nose Syndrome decimating bat populations, and the chytrid fungus plaguing amphibian populations. On the surface these events appear to be unrelated yet at the root of each phenomenon there appears an underlying threat - pollution. This paper will investigate the commonality of these occurrences as well as investigate the current and potential solutions to the threat. PMID:24727071

  19. Space collision threat mitigation

    NASA Astrophysics Data System (ADS)

    Zatezalo, Aleksandar; Stipanovi?, Dušan; Mehra, Raman K.; Pham, Khanh

    2014-06-01

    Mitigation of possible collision threats to current and future operations in space environments is an important an challenging task considering high nonlinearity of orbital dynamics and discrete measurement updates. Such discrete observations are relatively scarce with respect to space dynamics including possible unintentional or intentional rocket propulsion based maneuvers even in scenarios when measurement collections are focused to a one single target of interest. In our paper, this problem is addressed in terms of multihypothesis and multimodel estimation in conjunction with multi-agent multigoal game theoretic guaranteed evasion strategies. Collision threat estimation is formulated using conditional probabilities of time dependent hypotheses and spacecraft controls which are computed using Liapunov-like approach. Based on this formulation, time dependent functional forms of multi-objective utility functions are derived given threat collision risk levels. For demonstrating developed concepts, numerical methods are developed using nonlinear filtering methodology for updating hypothesis sets and corresponding conditional probabilities. Space platform associated sensor resources are managed using previously developed and demonstrated information-theoretic objective functions and optimization methods. Consequently, estimation and numerical methods are evaluated and demonstrated on a realistic Low Earth Orbit collision encounter.

  20. Non-representative Quantum Mechanical Weak Values

    NASA Astrophysics Data System (ADS)

    Svensson, B. E. Y.

    2015-12-01

    The operational definition of a weak value for a quantum mechanical system involves the limit of the weak measurement strength tending to zero. I study how this limit compares to the situation for the undisturbed (no weak measurement) system. Under certain conditions, which I investigate, this limit is discontinuous in the sense that it does not merge smoothly to the Hilbert space description of the undisturbed system. Hence, in these discontinuous cases, the weak value does not represent the undisturbed system. As a result, conclusions drawn from such weak values regarding the properties of the studied system cannot be upheld. Examples are given.

  1. Not All Threats Are Equal

    ERIC Educational Resources Information Center

    Surface, Jeanne L.

    2011-01-01

    School leaders must be fully prepared to respond to all types of threats that occur. In order to respond to threats most appropriately, the school needs to have a systematic approach that combines education, prevention, intervention, discipline, security, and crisis preparedness measures. All threats must be assessed carefully and swiftly,…

  2. Not All Threats Are Equal

    ERIC Educational Resources Information Center

    Surface, Jeanne L.

    2011-01-01

    School leaders must be fully prepared to respond to all types of threats that occur. In order to respond to threats most appropriately, the school needs to have a systematic approach that combines education, prevention, intervention, discipline, security, and crisis preparedness measures. All threats must be assessed carefully and swiftly,…

  3. [Counterfeit medicines: a growing threat].

    PubMed

    Barbereau, S

    2006-12-01

    The medical drug market has undergone considerable transformation in recent years. Like other products, medicines have been affected by globalization. Free trade policies have had a number of negative effects including a reduction in quality control not only for some products but also for raw materials and finished products. The global environment has also created conditions conducive to counterfeit medicines. The term counterfeit medicine is defined differently from one country to another in terms of quality, legality and fraudulent intent. This situation prompted the WHO to propose the following definition: "A counterfeit medicine is one which is deliberately and fraudulently mislabeled with respect to identity and/or source. Counterfeiting can apply to both branded and generic products and counterfeit products may include products with the correct ingredients or with the wrong ingredients, without active ingredients, with insufficient active ingredients or with fake packaging." Weak pharmaceutical regulation often compounded by widespread corruption in developing countries has greatly facilitated the development of this illicit market with harmful and costly effects on public health. Due to the lack of pharmocovigilance accidents involving use of counterfeit drugs go unreported. For this reason it is not possible to measure the economic impact. While counterfeiting has become a major threat in developing countries, it also affects industrialized countries. Fraudulent behavior occurs all over the world. PMID:17286014

  4. Quantum discord with weak measurements

    SciTech Connect

    Singh, Uttam Pati, Arun Kumar

    2014-04-15

    Weak measurements cause small change to quantum states, thereby opening up the possibility of new ways of manipulating and controlling quantum systems. We ask, can weak measurements reveal more quantum correlation in a composite quantum state? We prove that the weak measurement induced quantum discord, called as the “super quantum discord”, is always larger than the quantum discord captured by the strong measurement. Moreover, we prove the monotonicity of the super quantum discord as a function of the measurement strength and in the limit of strong projective measurement the super quantum discord becomes the normal quantum discord. We find that unlike the normal discord, for pure entangled states, the super quantum discord can exceed the quantum entanglement. Our results provide new insights on the nature of quantum correlation and suggest that the notion of quantum correlation is not only observer dependent but also depends on how weakly one perturbs the composite system. We illustrate the key results for pure as well as mixed entangled states. -- Highlights: •Introduced the role of weak measurements in quantifying quantum correlation. •We have introduced the notion of the super quantum discord (SQD). •For pure entangled state, we show that the SQD exceeds the entanglement entropy. •This shows that quantum correlation depends not only on observer but also on measurement strength.

  5. New global viral threats

    PubMed Central

    Erdem, Hakan; Ünal, Serhat

    2015-01-01

    Infectious diseases have caused great catastrophes in human history, as in the example of the plague, which wiped out half of the population in Europe in the 14th century. Ebola virus and H7N9 avian influenza virus are 2 lethal pathogens that we have encountered in the second decade of the 21st century. Ebola infection is currently being seen in West Africa, and H7N9 avian flu appears to have settled in Southeast Asia. This article focuses on the current situation and the future prospects of these potential infectious threats to mankind. PMID:25828274

  6. New global viral threats.

    PubMed

    Erdem, Hakan; Ünal, Serhat

    2015-04-01

    Infectious diseases have caused great catastrophes in human history, as in the example of the plague, which wiped out half of the population in Europe in the 14th century. Ebola virus and H7N9 avian influenza virus are 2 lethal pathogens that we have encountered in the second decade of the 21st century. Ebola infection is currently being seen in West Africa, and H7N9 avian flu appears to have settled in Southeast Asia. This article focuses on the current situation and the future prospects of these potential infectious threats to mankind. PMID:25828274

  7. Spin effects in the weak interaction

    SciTech Connect

    Freedman, S.J. Chicago Univ., IL . Dept. of Physics Chicago Univ., IL . Enrico Fermi Inst.)

    1990-01-01

    Modern experiments investigating the beta decay of the neutron and light nuclei are still providing important constraints on the theory of the weak interaction. Beta decay experiments are yielding more precise values for allowed and induced weak coupling constants and putting constraints on possible extensions to the standard electroweak model. Here we emphasize the implications of recent experiments to pin down the strengths of the weak vector and axial vector couplings of the nucleon.

  8. Addressing the insider threat

    SciTech Connect

    Hochberg, J.G.; Jackson, K.A.; McClary, J.F.; Simmonds, D.D.

    1993-01-01

    Computers have come to play a major role in the processing of information vital to our national security. As we grow more dependent on computers, we also become more vulnerable to their misuse. Misuse may be accidental, or may occur deliberately for purposes of personal gain, espionage, terrorism, or revenge. While it is difficult to obtain exact statistics on computer misuse, clearly it is growing. It is also clear that insiders -- authorized system users -- are responsible for most of this increase. Unfortunately, their insider status gives them a greater potential for harm This paper takes an asset-based approach to the insider threat. We begin by characterizing the insider and the threat posed by variously motivated insiders. Next, we characterize the asset of concern: computerized information of strategic or economic value. We discuss four general ways in which computerized information is vulnerable to adversary action by the insider: disclosure, violation of integrity, denial of service, and unauthorized use of resources. We then look at three general remedies for these vulnerabilities. The first is formality of operations, such as training, personnel screening, and configuration management. The second is the institution of automated safeguards, such as single-use passwords, encryption, and biometric devices. The third is the development of automated systems that collect and analyze system and user data to look for signs of misuse.

  9. Addressing the insider threat

    SciTech Connect

    Hochberg, J.G.; Jackson, K.A.; McClary, J.F.; Simmonds, D.D.

    1993-05-01

    Computers have come to play a major role in the processing of information vital to our national security. As we grow more dependent on computers, we also become more vulnerable to their misuse. Misuse may be accidental, or may occur deliberately for purposes of personal gain, espionage, terrorism, or revenge. While it is difficult to obtain exact statistics on computer misuse, clearly it is growing. It is also clear that insiders -- authorized system users -- are responsible for most of this increase. Unfortunately, their insider status gives them a greater potential for harm This paper takes an asset-based approach to the insider threat. We begin by characterizing the insider and the threat posed by variously motivated insiders. Next, we characterize the asset of concern: computerized information of strategic or economic value. We discuss four general ways in which computerized information is vulnerable to adversary action by the insider: disclosure, violation of integrity, denial of service, and unauthorized use of resources. We then look at three general remedies for these vulnerabilities. The first is formality of operations, such as training, personnel screening, and configuration management. The second is the institution of automated safeguards, such as single-use passwords, encryption, and biometric devices. The third is the development of automated systems that collect and analyze system and user data to look for signs of misuse.

  10. Weak values in continuous weak measurements of qubits

    NASA Astrophysics Data System (ADS)

    Qin, Lupei; Liang, Pengfei; Li, Xin-Qi

    2015-07-01

    For continuous weak measurements of qubits, we obtain exact expressions for weak values (WVs) from the postselection restricted average of measurement outputs, by using both the quantum-trajectory equation (QTE) and the quantum Bayesian approach. The former is applicable to short-time weak measurement, while the latter can relax the measurement strength to finite. We find that even in the "very" weak limit the result can be essentially different from the one originally proposed by Aharonov, Albert, and Vaidman (AAV), in the sense that our result incorporates nonperturbative correction which could be important when the AAV WV is large. Within the Bayesian framework, we obtain also elegant expressions for finite measurement strength and find that the amplifier's noise in quantum measurement has no effect on the WVs. In particular, we obtain very useful results for homodyne measurement in a circuit-QED system, which allows for measuring the real and imaginary parts of the AAV WV by simply tuning the phase of the local oscillator. This advantage can be exploited as an efficient state-tomography technique.

  11. Categorizing threat : building and using a generic threat matrix.

    SciTech Connect

    Woodard, Laura; Veitch, Cynthia K.; Thomas, Sherry Reede; Duggan, David Patrick

    2007-09-01

    The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and is not available for general use, such as the design of defenses and the development of mitigation strategies. To reduce the complexity of analyzing threat, the threat space must first be reduced. This is achieved by taking the continuous nature of the threat space and creating an abstraction that allows the entire space to be grouped, based on measurable attributes, into a small number of distinctly different levels. The work documented in this report is an effort to create such an abstraction.

  12. Mediators of Stereotype Threat among Black College Students.

    PubMed

    Massey, Douglas S; Owens, Jayanti

    2014-04-01

    We hypothesize that the manner in which stereotype threat affects college grade achievement is mediated by institutional context as well as individual characteristics. Drawing on a sample of black students from the National Longitudinal Survey of Freshmen we find weak and inconsistent evidence that institutional characteristics influence the operation of stereotype threat. We find more consistent evidence to indicate that the effect of stereotype threat is conditioned by individual factors such as skin color, multiracial origins, and an integrated upbringing. Most of the effect on grade achievement occurs through the internalization pathway, in which the internalization of negative stereotypes leads to disinvestment manifested by a reduction in academic effort. The reduction in work effort, in turn, lowers grades. We also find evidence that immigrant origin confers protection from the negative effects of stereotype threat through both internalization and externalization mechanisms, though the ultimate effect of grade achievement is rather small. PMID:24860201

  13. [The threat of smallpox].

    PubMed

    Berche, Patrick

    2002-08-01

    Smallpox is a highly contagious disease mainly transmitted by aerosols with a high case-fatality. The smallpox virus has evolved from a long adaptation to humans during Evolution, explaining that the virus is highly specific for humans and nonpathogenic for animals. Smallpox was eradicated in 1977 and vaccination was abandoned in the 1980's. This virus is a dreadful potential biological weapon since the reemergence of smallpox on the planet might be expected to be devastating, due to its high 'contagiosity', which would rapidly spread in naive populations, especially those living in urban areas, and worldwide through air travels. There is no anti-viral treatment and vaccine is active in the first four days post-exposure. Today, the stocks of smallpox virus constitute one of the most dangerous threats for humanity. There is a need for improving the safety of the vaccine and to reconsider the preventive strategy to face a possible attack by smallpox virus. PMID:12391895

  14. Application of modified threat reduction assessments in Lebanon.

    PubMed

    Matar, Diane A; Anthony, Brandon P

    2010-10-01

    Worldwide efforts have concentrated on developing monitoring methods that would enhance the assessment of progress toward achieving the 2010 conservation objectives of the Convention on Biological Diversity. Threat reduction assessment is one such method. It provides an indirect measure of the effects of a conservation project by evaluating changes in human-induced direct threats to protected areas. We applied modified threat reduction assessments and the 2008 International Union for Conservation of Nature standardized lexicon for classification of threats to Horsh Ehden and Al-Shouf Cedar nature reserves in Lebanon. Our goal was in part to test the suitability of this tool for improving monitoring and management effectiveness of protected forests in Lebanon. In Horsh Ehden, composite threats decreased by 24% from 1997 to 2002, and then increased from 2002 to 2009 by 78% in the core area of the reserve and by 118% in the reserve's buffer zone (surrounds core area, conservation and recreational activities allowed). In Al-Shouf Cedar reserve threats decreased by 51% from 2006 to 2009. Management teams from both reserves have integrated the use of this method to prioritize actions for new management plans. We believe that in Lebanon and other countries with limited resources and weak monitoring programs or that are experiencing political instability threat reduction assessments could be used to improve the effectiveness of protected areas management. PMID:21182667

  15. Lizard threat display handicaps endurance.

    PubMed

    Brandt, Y

    2003-05-22

    Honest-signalling theory asserts that threat displays reliably advertise attributes that influence fighting success. Endurance, as measured by treadmill performance, predicts the outcome of agonistic interactions among lizards. If threat displays in lizards function to advertise endurance capacity then variation in threat displays should correlate with endurance. I tested this prediction for the duration of threat posturing in male side-blotched lizards (Uta stansburiana) and examined whether threat displays act as quality handicaps, reliable signals that expend the attribute that is advertised. Individual variation in the duration of threat posturing correlated with endurance, while an experimental reduction of endurance diminished the duration of threat posturing. As expected of a quality handicap, endurance fell below baseline after display production. A restriction of aerobic metabolism can account for this effect. In threat posturing, lateral compression of the thorax may interfere with respiration or with circulation, limiting aerobic metabolism and causing a compensatory increase in anaerobic metabolism, thereby generating lactate and diminishing locomotor capacity. Concentrations of lactate measured after display production were higher than baseline, consistent with the proposed mechanism. By restricting aerobic metabolism, the threat posture can act as a quality handicap, simultaneously advertising and expending the endurance capacity of displaying lizards. PMID:12803896

  16. Threat processing: models and mechanisms.

    PubMed

    Bentz, Dorothée; Schiller, Daniela

    2015-01-01

    The experience of fear is closely linked to the survival of species. Fear can be conceptualized as a brain state that orchestrates defense reactions to threats. To avoid harm, an organism must be equipped with neural circuits that allow learning, detecting, and rapidly responding to threats. Past experience with threat can transform neutral stimuli present at the time of experience into learned threat-related stimuli via associative learning. Pavlovian threat conditioning is the central experimental paradigm to study associative learning. Once learned, these stimulus-response associations are not always expressed depending on context or new experiences with the conditioned stimuli. Neural circuits mediating threat learning have the inherent plasticity to adapt to changing environmental threats. Encounters devoid of danger pave the way for extinction or reconsolidation to occur. Extinction and reconsolidation can both lead to changes in the expression of threat-induced defense responses, but differ in stability and have a different neural basis. This review presents the behavioral models and the system-level neural mechanisms in animals and humans of threat learning and modulation. PMID:26267313

  17. Recurrent dreams: Recurring threat simulations?

    PubMed

    Valli, K; Revonsuo, A

    2006-06-01

    Zadra, Desjardins, and Marcotte (2006) have made a valuable contribution to the empirical testing of the Threat Simulation Theory (TST) (Revonsuo, 2000a) in recurrent dreams. For the most part, their results are in accordance with the theory, while some findings seem to conflict with the predictions of TST. In our commentary, we consider some alternative ways to interpret the results, and we conclude that many prominent features of most recurrent dreams seem to be manifestations of a threat simulation function, leading to repeated rehearsal of threat perception and avoidance, but a minority of recurrent dreams seem to have origins unrelated to threat simulation. PMID:16019227

  18. Fault zone fabric and fault weakness.

    PubMed

    Collettini, Cristiano; Niemeijer, André; Viti, Cecilia; Marone, Chris

    2009-12-17

    Geological and geophysical evidence suggests that some crustal faults are weak compared to laboratory measurements of frictional strength. Explanations for fault weakness include the presence of weak minerals, high fluid pressures within the fault core and dynamic processes such as normal stress reduction, acoustic fluidization or extreme weakening at high slip velocity. Dynamic weakening mechanisms can explain some observations; however, creep and aseismic slip are thought to occur on weak faults, and quasi-static weakening mechanisms are required to initiate frictional slip on mis-oriented faults, at high angles to the tectonic stress field. Moreover, the maintenance of high fluid pressures requires specialized conditions and weak mineral phases are not present in sufficient abundance to satisfy weak fault models, so weak faults remain largely unexplained. Here we provide laboratory evidence for a brittle, frictional weakening mechanism based on common fault zone fabrics. We report on the frictional strength of intact fault rocks sheared in their in situ geometry. Samples with well-developed foliation are extremely weak compared to their powdered equivalents. Micro- and nano-structural studies show that frictional sliding occurs along very fine-grained foliations composed of phyllosilicates (talc and smectite). When the same rocks are powdered, frictional strength is high, consistent with cataclastic processes. Our data show that fault weakness can occur in cases where weak mineral phases constitute only a small percentage of the total fault rock and that low friction results from slip on a network of weak phyllosilicate-rich surfaces that define the rock fabric. The widespread documentation of foliated fault rocks along mature faults in different tectonic settings and from many different protoliths suggests that this mechanism could be a viable explanation for fault weakening in the brittle crust. PMID:20016599

  19. Bomb Threat Assessments. Fact Sheet

    ERIC Educational Resources Information Center

    Tunkel, Ronald F.

    2010-01-01

    This information provides a brief, summary outline of how investigators should assess anonymous bomb threats at schools. Applying these principles may help administrators and law enforcement personnel accurately assess the viability and credibility of a threat and appropriately gauge their response. Any credible evidence provided by teachers or…

  20. Threat Assessment in College Settings

    ERIC Educational Resources Information Center

    Cornell, Dewey

    2010-01-01

    In 2007, the landscape of campus safety changed abruptly with the Virginia Tech shooting and the subsequent wave of anonymous threats in colleges across the country. In response to the tragedy, the Virginia state legislature mandated that every public institution of higher education establish a "threat assessment team." Both the FBI and the U.S.…

  1. Linking Stereotype Threat and Anxiety

    ERIC Educational Resources Information Center

    Osborne, Jason W.

    2007-01-01

    Claude Steele's stereotype threat hypothesis has attracted significant attention in recent years. This study tested one of the main tenets of his theory--that stereotype threat serves to increase individual anxiety levels, thus hurting performance--using real-time measures of physiological arousal. Subjects were randomly assigned to either high or…

  2. Threat Assessment in College Settings

    ERIC Educational Resources Information Center

    Cornell, Dewey

    2010-01-01

    In 2007, the landscape of campus safety changed abruptly with the Virginia Tech shooting and the subsequent wave of anonymous threats in colleges across the country. In response to the tragedy, the Virginia state legislature mandated that every public institution of higher education establish a "threat assessment team." Both the FBI and the U.S.…

  3. Bio-threat microparticle simulants

    DOEpatents

    Farquar, George Roy; Leif, Roald N

    2012-10-23

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  4. Bio-threat microparticle simulants

    SciTech Connect

    Farquar, George Roy; Leif, Roald

    2014-09-16

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  5. Threat expert system technology advisor

    NASA Technical Reports Server (NTRS)

    Kurrasch, E. R.; Tripp, L. R.

    1987-01-01

    A prototype expert system was developed to determine the feasibility of using expert system technology to enhance the performance and survivability of helicopter pilots in a combat threat environment while flying NOE (Nap of the Earth) missions. The basis for the concept is the potential of using an Expert System Advisor to reduce the extreme overloading of the pilot who flies NOE mission below treetop level at approximately 40 knots while performing several other functions. The ultimate goal is to develop a Threat Expert System Advisor which provides threat information and advice that are better than even a highly experienced copilot. The results clearly show that the NOE pilot needs all the help in decision aiding and threat situation awareness that he can get. It clearly shows that heuristics are important and that an expert system for combat NOE helicopter missions can be of great help to the pilot in complex threat situations and in making decisions.

  6. Psychoanalysis and the nuclear threat

    SciTech Connect

    Levine, H.B.; Jacobs, D.; Rubin, L.J.

    1988-01-01

    {ital Psychoanalysis and the Nuclear Threat} provides coverage of the dynamic and clinical considerations that follow from life in the nuclear age. Of special clinical interest are chapters dealing with the developmental consequences of the nuclear threat in childhood, adolescence, and adulthood, and those exploring the technical issues raised by the occurrence in analytic and psychotherapeutic hours of material related to the nuclear threat. Additional chapters bring a psychoanalytic perspective to bear on such issues as the need to have enemies, silence as the real crime, love, work, and survival in the nuclear age, the relationship of the nuclear threat to issues of mourning and melancholia, apocalyptic fantasies, the paranoid process, considerations of the possible impact of gender on the nuclear threat, and the application of psychoanalytic thinking to nuclear arms strategy. Finally, the volume includes the first case report in the English language---albeit a brief psychotherapy---involving the treatment of a Hiroshima survivor.

  7. Stereotype Threat as Validity Threat: The Anxiety-Sex-Threat Interaction

    ERIC Educational Resources Information Center

    Delgado, Ana R.; Prieto, Gerardo

    2008-01-01

    Stereotype threat has been invoked to explain underperformance on a variety of groups for whom the stereotypes allege inferior cognitive abilities. In math testing, stereotype threat has been used to explain sex differences in test performance. This paper describes an experimental study on a large sample (n = 313), in which the role of anxiety and…

  8. Managing biosecurity threats in China.

    PubMed

    Huang, Yanzhong

    2011-03-01

    Compared to the extensive literature on bioterrorism and biosecurity in the United States, less analysis has been conducted on similar challenges in China. This article seeks to fill this void by providing an integrated and updated assessment of 3 major biosecurity threats China faces: biowarfare, bioterrorism, and biocrimes. An analysis of China's biosecurity threats and biodefense building suggest varying levels of risk associated with each threat type. First, a direct bioweapons attack on China is highly unlikely, although the threat of biowarfare cannot be simply written off. Second, potential perpetrators of bioterrorism have capabilities at their disposal for carrying out such attacks. While terrorist organizations in China do not have a strong interest in bioterrorism, the limited state capability to counter such a threat may increase the risk in the future. Third, unlike the threats of biowarfare and bioterrorism, potential perpetrators of biocrimes have both incentives and capabilities, and biocrimes can produce reactions far out of proportion to the actual number of casualties. Despite the distinct biosecurity challenges it faces, China has yet to articulate a differentiated and coherent strategy to effectively tackle the challenges. Assessing different types of biosecurity threats in terms of degrees of risk not only provides greater analytical clarity but also has important implications for the strategies required to manage the risks. PMID:21361794

  9. Threat interferes with response inhibition.

    PubMed

    Hartikainen, Kaisa M; Siiskonen, Anna R; Ogawa, Keith H

    2012-05-01

    A potential threat, such as a spider, captures attention and engages executive functions to adjust ongoing behavior and avoid danger. We and many others have reported slowed responses to neutral targets in the context of emotional distractors. This behavioral slowing has been explained in the framework of attentional competition for limited resources with emotional stimuli prioritized. Alternatively, slowed performance could reflect the activation of avoidance/freezing-type motor behaviors associated with threat. Although the interaction of attention and emotion has been widely studied, little is known on the interaction between emotion and executive functions. We studied how threat-related stimuli (spiders) interact with executive performance and whether the interaction profile fits with a resource competition model or avoidance/freezing-type motor behaviors. Twenty-one young healthy individuals performed a Go-NoGo visual discrimination reaction time (RT) task engaging several executive functions with threat-related and emotionally neutral distractors. The threat-related distractors had no effect on the RT or the error rate in the Go trials. The NoGo error rate, reflecting failure in response inhibition, increased significantly because of threat-related distractors in contrast to neutral distractors, P less than 0.05. Thus, threat-related distractors temporarily impaired response inhibition. Threat-related distractors associated with increased commission errors and no effect on RT does not suggest engagement of avoidance/freezing-type motor behaviors. The results fit in the framework of the resource competition model. A potential threat calls for evaluation of affective significance as well as inhibition of undue emotional reactivity. We suggest that these functions tax executive resources and may render other executive functions, such as response inhibition, temporarily compromised when the demands for resources exceed availability. PMID:22494999

  10. Global Threats to Child Safety.

    PubMed

    Mace, Sharon E

    2016-02-01

    Children have rights, as enumerated in the Declaration of the Rights of the Child, and need protection from violence, exploitation, and abuse. Global threats to child safety exist. These threats include lack of basic needs (food, clean water, sanitation), maltreatment, abandonment, child labor, child marriage, female genital mutilation, child trafficking, disasters, and armed conflicts/wars. Recent disasters and armed conflicts have led to a record number of displaced people especially children and their families. Strategies and specific programs can be developed and implemented for eliminating threats to the safety of children. PMID:26613687

  11. Weak scale supersymmetry

    SciTech Connect

    Hall, L.J. California Univ., Berkeley, CA . Dept. of Physics)

    1990-11-12

    An introduction to the ideas and current state of weak scale supersymmetry is given. It is shown that LEP data on Z decays has already excluded two of the most elegant models of weak scale supersymmetry. 14 refs.

  12. Patient Safety Threat - Syringe Reuse

    MedlinePLUS

    ... Injection Safety Share Compartir A Patient Safety Threat – Syringe Reuse Important Information! Please read this fact sheet ... that you may be at risk due to syringe reuse by your healthcare provider. Patients need to ...

  13. Bomb Threat Becomes Real News.

    ERIC Educational Resources Information Center

    Gastaldo, Evann

    1999-01-01

    Discusses how the staff of the newspaper at Camarillo High School (California) covered a bomb threat at their school. Describes how they, overnight, conducted interviews, took and developed photographs, produced the layout, and published the newspaper. (RS)

  14. Combating the Insider Cyber Threat

    SciTech Connect

    Greitzer, Frank L.; Moore, Andrew P.; Cappelli, Dawn M.; Andrews, Dee H.; Carroll, Lynn; Hull, Thomas D.

    2008-01-02

    This article represents a collaboration between PNNL, CERT/CMU, and AFRL that describes needs and related efforts by these institutions to develop technologies and approaches to counter cyber threats by insiders to informatin systems. The main focus of this article is on the need for effective training on insider threat to raise staff awareness and encourage organizations to adopt a more effective approach to identifying potential risks and take proactive steps to mitigate them.

  15. Quantum correlation cost of the weak measurement

    SciTech Connect

    Zhang, Jun; Wu, Shao-xiong; Yu, Chang-shui

    2014-12-15

    Quantum correlation cost (QCC) characterizing how much quantum correlation is used in a weak-measurement process is presented based on the trace norm. It is shown that the QCC is related to the trace-norm-based quantum discord (TQD) by only a factor that is determined by the strength of the weak measurement, so it only catches partial quantumness of a quantum system compared with the TQD. We also find that the residual quantumness can be ‘extracted’ not only by the further von Neumann measurement, but also by a sequence of infinitesimal weak measurements. As an example, we demonstrate our outcomes by the Bell-diagonal state.

  16. Apple Strength Issues

    SciTech Connect

    Syn, C

    2009-12-22

    Strength of the apple parts has been noticed to decrease, especially those installed by the new induction heating system since the LEP campaign started. Fig. 1 shows the ultimate tensile strength (UTS), yield strength (YS), and elongation of the installed or installation-simulated apples on various systems. One can clearly see the mean values of UTS and YS of the post-LEP parts decreased by about 8 ksi and 6 ksi respectively from those of the pre-LEP parts. The slight increase in elongation seen in Fig.1 can be understood from the weak inverse relationship between the strength and elongation in metals. Fig.2 shows the weak correlation between the YS and elongation of the parts listed in Fig. 1. Strength data listed in Figure 1 were re-plotted as histograms in Figs. 3 and 4. Figs. 3a and 4a show histograms of all UTS and YS data. Figs. 3b and 4b shows histograms of pre-LEP data and Figs. 3c and 4c of post-LEP data. Data on statistical scatter of tensile strengths have been rarely published by material suppliers. Instead, only the minimum 'guaranteed' strength data are typically presented. An example of strength distribution of aluminum 7075-T6 sheet material, listed in Fig. 5, show that its scatter width of both UTS and YS for a single sheet can be about 6 ksi and for multi-lot scatter can be as large as 11 ksi even though the sheets have been produced through well-controlled manufacturing process. By approximating the histograms shown in Figs. 3 and 4 by a Gaussian or similar type of distribution curves, one can plausibly see the strength reductions in the later or more recent apples. The pre-LEP data in Figs. 3b and 4b show wider scatter than the post-LEP data in Figs. 3c and 4c and seem to follow the binomial distribution of strength indicating that the apples might have been made from two different lots of material, either from two different vendors or from two different melts of perhaps slightly different chemical composition by a single vendor. The post-LEP apples seem to have been from a single batch of material. The pre-LEP apples of the weak strength and the post-LEP apples with even weaker strength could have been made of the same batch of material, and the small strength differential might be due to the difference in the induction heating system. If the pre-LEP apples with the lower strength and the post LEP apples are made from the same batch of material, their combined scatter of strength data would be wider and can be understood as a result of the additional processing steps of stress relief and induction heating as discussed.

  17. Threat image projection in CCTV

    NASA Astrophysics Data System (ADS)

    Neil, David; Thomas, Nicola; Baker, Bob

    2007-10-01

    Operators are key components in a Closed Circuit Television (CCTV) system, being the link between the system technology and its effective use. Operators' performance will largely determine the level of service provided by the system. There have been few studies testing operator performance, while much work has been done to test the performance of the technology. Previous work on CCTV operator performance carried out by the Home Office Scientific Development Branch (HOSDB) has used filmed video and subjects who knew they were undergoing testing, meaning subjects are likely to be concentrating harder on performing well. HOSDB believes that there is a need for a test that would be able to be routinely used in a CCTV control room throughout the course of a normal shift to provide management with operational performance data. Threat Image Projection (TIP) is routinely used in X-Ray baggage scanners to keep operators alert to possible threats. At random intervals, a threat target image is superimposed over the image of the baggage being screened. The operator then responds to this threat. A similar system could be used for CCTV operators. A threat image would be randomly superimposed over the live CCTV feed and the operator would be expected to respond to this.

  18. Media use and children's perceptions of societal threat and personal vulnerability.

    PubMed

    Comer, Jonathan S; Furr, Jami M; Beidas, Rinad S; Babyar, Heather M; Kendall, Philip C

    2008-07-01

    This study examined children's media use (i.e., amount of television and Internet usage) and relationships to children's perceptions of societal threat and personal vulnerability. The sample consisted of 90 community youth aged 7 to 13 years (M = 10.8; 52.2% male) from diverse economic backgrounds. Analyses found children's television use to be associated with elevated perceptions of personal vulnerability to world threats (i.e., crime, terrorism, earthquakes, hurricanes, and floods). An interactive model of television use and child anxiety in accounting for children's personal threat perceptions was supported, in which the strength of television consumption in predicting children's personal threat perceptions was greater for children with greater anxiety. Relationships were found neither between children's Internet use and threat perceptions nor between media use and perceptions of societal threat. PMID:18645752

  19. The Social Construction of the Soviet Threat.

    ERIC Educational Resources Information Center

    Nathanson, Charles E.; Skelly, James M.

    For almost 40 years the perception of a Soviet threat has influenced much foreign and domestic political behavior in the United States. How to respond to the threat has been a subject of intense debate, but the reality of the threat has been taken for granted. Conviction about the reality of this threat dates back to George Kennan's long telegram…

  20. Comparative Environmental Threat Analysis: Three Case Studies.

    ERIC Educational Resources Information Center

    Latour, J. B.; Reiling, R.

    1994-01-01

    Reviews how carrying capacity for different environmental problems is operationalized. Discusses whether it is possible to compare threats, using the exceeding of carrying capacity as a yardstick. Points out problems in comparative threat analysis using three case studies: threats to European groundwater resources, threats to ecosystems in Europe,…

  1. The Social Construction of the Soviet Threat.

    ERIC Educational Resources Information Center

    Nathanson, Charles E.; Skelly, James M.

    For almost 40 years the perception of a Soviet threat has influenced much foreign and domestic political behavior in the United States. How to respond to the threat has been a subject of intense debate, but the reality of the threat has been taken for granted. Conviction about the reality of this threat dates back to George Kennan's long telegram…

  2. 28 CFR 36.208 - Direct threat.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Direct threat. 36.208 Section 36.208... ACCOMMODATIONS AND IN COMMERCIAL FACILITIES General Requirements § 36.208 Direct threat. (a) This part does not... individual poses a direct threat to the health or safety of others. (b) Direct threat means a...

  3. Comparative Environmental Threat Analysis: Three Case Studies.

    ERIC Educational Resources Information Center

    Latour, J. B.; Reiling, R.

    1994-01-01

    Reviews how carrying capacity for different environmental problems is operationalized. Discusses whether it is possible to compare threats, using the exceeding of carrying capacity as a yardstick. Points out problems in comparative threat analysis using three case studies: threats to European groundwater resources, threats to ecosystems in Europe,…

  4. Strength Testing.

    ERIC Educational Resources Information Center

    Londeree, Ben R.

    1981-01-01

    Postural deviations resulting from strength and flexibility imbalances include swayback, scoliosis, and rounded shoulders. Screening tests are one method for identifying strength problems. Tests for the evaluation of postural problems are described, and exercises are presented for the strengthening of muscles. (JN)

  5. Cyber threats within civil aviation

    NASA Astrophysics Data System (ADS)

    Heitner, Kerri A.

    Existing security policies in civil aviation do not adequately protect against evolving cyber threats. Cybersecurity has been recognized as a top priority among some aviation industry leaders. Heightened concerns regarding cyber threats and vulnerabilities surround components utilized in compliance with the Federal Aviation Administration's (FAA) Next Generation Air Transportation (NextGen) implementation. Automated Dependent Surveillance-B (ADS-B) and Electronic Flight Bags (EFB) have both been exploited through the research of experienced computer security professionals. Civil aviation is essential to international infrastructure and if its critical assets were compromised, it could pose a great risk to public safety and financial infrastructure. The purpose of this research was to raise awareness of aircraft system vulnerabilities in order to provoke change among current national and international cybersecurity policies, procedures and standards. Although the education of cyber threats is increasing in the aviation industry, there is not enough urgency when creating cybersecurity policies. This project intended to answer the following questions: What are the cyber threats to ADS-B of an aircraft in-flight? What are the cyber threats to EFB? What is the aviation industry's response to the issue of cybersecurity and in-flight safety? ADS-B remains unencrypted while the FAA's mandate to implement this system is rapidly approaching. The cyber threat of both portable and non-portable EFB's have received increased publicity, however, airlines are not responding quick enough (if at all) to create policies for the use of these devices. Collectively, the aviation industry is not being proactive enough to protect its aircraft or airport network systems. That is not to say there are not leaders in cybersecurity advancement. These proactive organizations must set the standard for the future to better protect society and it's most reliable form of transportation.

  6. Computer-assisted threat evaluation

    NASA Astrophysics Data System (ADS)

    Bains, Jatin S.; Davies, Livingston

    2006-05-01

    The use of a CATE (Computer Assisted Threat Evaluation) System in the Maritime Domain lends itself technically and operationally to data exploitation thru the use of domain forensics and link analysis of fragmented information utilizing data prioritization and suspicion indicators for an aggressor's method of operation. The timely availability of threat mitigating actionable information is one of the key tools for success in the Global War On Terror (GWOT). The global supply chain is vulnerable to exploitation by nefarious individuals, governments, and terrorist organizations. For example, Figure 1 illustrates one of many potential methods that could be used to circumvent regulations limiting proliferation of WMDs.

  7. Race and imprisonments: vigilante violence, minority threat, and racial politics.

    PubMed

    Jacobs, David; Malone, Chad; Iles, Gale

    2012-01-01

    The effects of lynchings on criminal justice outcomes have seldom been examined. Recent findings also are inconsistent about the effects of race on imprisonments. This study uses a pooled time-series design to assess lynching and racial threat effects on state imprisonments from 1972 to 2000. After controlling for Republican strength, conservatism, and other factors, lynch rates explain the growth in admission rates. The findings also show that increases in black residents produce subsequent expansions in imprisonments that likely are attributable to white reactions to this purported menace. But after the percentage of blacks reaches a substantial threshold—and the potential black vote becomes large enough to begin to reduce these harsh punishments—reductions in prison admissions occur. These results also confirm a political version of racial threat theory by indicating that increased Republican political strength produces additional imprisonments. PMID:22616115

  8. Bomb Threats Taking Financial Toll

    ERIC Educational Resources Information Center

    Bowman, Darcia Harris

    2004-01-01

    Despite all its efforts to crack down on the bomb scares that disrupted classes again and again in 2003, North Carolina's Orange County district fell victim to yet another false alarm this school year, 2004. For some schools, bomb threats have become more routine than fire drills, with each incident ringing up multi-thousand-dollar tabs for…

  9. Cyber Threats to Nuclear Infrastructures

    SciTech Connect

    Robert S. Anderson; Paul Moskowitz; Mark Schanfein; Trond Bjornard; Curtis St. Michel

    2010-07-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  10. Bomb Threats Taking Financial Toll

    ERIC Educational Resources Information Center

    Bowman, Darcia Harris

    2004-01-01

    Despite all its efforts to crack down on the bomb scares that disrupted classes again and again in 2003, North Carolina's Orange County district fell victim to yet another false alarm this school year, 2004. For some schools, bomb threats have become more routine than fire drills, with each incident ringing up multi-thousand-dollar tabs for…

  11. Weak measure expansive flows

    NASA Astrophysics Data System (ADS)

    Lee, Keonhee; Oh, Jumi

    2016-01-01

    A notion of measure expansivity for flows was introduced by Carrasco-Olivera and Morales in [3] as a generalization of expansivity, and they proved that there were no measure expansive flows on closed surfaces. In this paper we introduce a concept of weak measure expansivity for flows which is really weaker than that of measure expansivity, and show that there is a weak measure expansive flow on a closed surface. Moreover we show that any C1 stably weak measure expansive flow on a C? closed manifold M is ?-stable, and any C1 stably measure expansive flow on M satisfies both Axiom A and the quasi-transversality condition.

  12. Pacific rim coal markets: competitors' strengths and weaknesses

    SciTech Connect

    Griffin, J.M.

    1982-12-01

    An analysis is given of the coal regions bidding for the Asian export market with respect to their advantages and disadvantages prior to port loading. The countries analyzed are: Australia, South Africa, Canada, Colombia, and the United States. The factors felt to be most important to economic attractiveness are a coal reserve's location, quality, and geology. Australia has high quality coal close to deep water ports that is easily mined, but rail tariffs, export duties, and frequent labor disputes partially offset these advantages. South Africa's advantages lie in the simple geology, which results in low production costs, and its rail transportation system. Canada's coal varies in quality and washing is often necessary to decrease ash content. Transportation costs make up more than half the delivered-to-port costs. The geology is more complex, but the large size of the mines help to minimize mining costs. Coal quality is generally good in Colombia and is close to tidewater. Although the geology is complex, it can be surface mined. Colombia's central location and the desire of importing nations to diversify their sources are advantages. In the US the western coal quality is not high, and it is located far from ports. The only real advantages are the stability of supply and the desire to diversify sources. The eastern coals are top quality, but found in more complex geology. The mining costs and storage costs are high. Alaska has medium quality coal located close to tidewater that can be developed. Vast reserves though are located in the permafrost zone. The determination of who actually captures the market is complicated by the diversity of supply objectives of consumers, but competition will be keen. (CKK)

  13. Finnish Vocational Education and Training in Comparison: Strengths and Weaknesses

    ERIC Educational Resources Information Center

    Virolainen, Maarit; Stenström, Marja-Leena

    2014-01-01

    The study investigates how the Finnish model of providing initial vocational education and training (IVET) has succeeded in terms of enhancing educational progress and employability. A relatively high level of participation in IVET makes the Finnish model distinctive from those of three other Nordic countries: Denmark, Norway and Sweden. All four…

  14. Strengths and Weaknesses of Two New Potato Herbicides

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Outlook (dimethenamid-p) and Chateau (flumioxazin) are two new preemergence herbicides labeled for use in potatoes. Both herbicides are restricted to preemergence applications only and improve nightshade control when tank mixed with other potato herbicides. Dimethenamid-p is particularly strong on ...

  15. Medical education in the Sudan: its strengths and weaknesses.

    PubMed

    Fahal, Ahmed Hassan

    2007-11-01

    The history of medical education in the Sudan is both long and interesting. It began in 1924 and has passed through several different phases and stages. Despite numerous difficulties and constraints along the way, vast experience has been gained and many achievements made, all of which have had positive impacts on the health system in the Sudan and the Region. This paper aims to share the experiences and lessons that have emerged from the journey of medical education in the Sudan, and explores the future need for continuing support and dialogue from international colleagues to maintain momentum. PMID:18158664

  16. Investigating the Implementation of Whole Language: Strengths and Weaknesses

    ERIC Educational Resources Information Center

    LeDoux, Amanda

    2007-01-01

    The Whole Language/Phonics debate has been raging in California since the 1980s. However, there has been no real determination about which method is best for teaching reading to our students. Yet the Whole Language method has lost the recognition and respect of the educational community because the program was not implemented by all teachers the…

  17. The Strengths and Weaknesses of ISO 9000 in Vocational Education

    ERIC Educational Resources Information Center

    Bevans-Gonzales, Theresa L.; Nair, Ajay T.

    2004-01-01

    ISO 9000 is a set of quality standards that assists an organization to identify, correct and prevent errors, and to promote continual improvement. Educational institutions worldwide are implementing ISO 9000 as they face increasing external pressure to maintain accountability for funding. Similar to other countries, in the United States vocational…

  18. The Strengths and Weaknesses of ISO 9000 in Vocational Education

    ERIC Educational Resources Information Center

    Bevans-Gonzales, Theresa L.; Nair, Ajay T.

    2004-01-01

    ISO 9000 is a set of quality standards that assists an organization to identify, correct and prevent errors, and to promote continual improvement. Educational institutions worldwide are implementing ISO 9000 as they face increasing external pressure to maintain accountability for funding. Similar to other countries, in the United States vocational…

  19. History of Weak Interactions

    DOE R&D Accomplishments Database

    Lee, T. D.

    1970-07-01

    While the phenomenon of beta-decay was discovered near the end of the last century, the notion that the weak interaction forms a separate field of physical forces evolved rather gradually. This became clear only after the experimental discoveries of other weak reactions such as muon-decay, muon-capture, etc., and the theoretical observation that all these reactions can be described by approximately the same coupling constant, thus giving rise to the notion of a universal weak interaction. Only then did one slowly recognize that the weak interaction force forms an independent field, perhaps on the same footing as the gravitational force, the electromagnetic force, and the strong nuclear and sub-nuclear forces.

  20. Threats to the president revisited.

    PubMed

    Bort, R F

    1977-01-01

    Ten prisoners charged with "threatening the President of the United States" were evaluated in an effort to seek out psychiatric and sociological factors involved in this offence. Comparisons were made with known presidential assassins. A history of abandonment as a child, single or divorced state, and a diagnosis of paranoid schizophrenia were prominent in both the study group and the group of know assassins. Additionally, the apparent psychological need behind both the threats and the actual assassinations appeared remarkably similar in both groups. The primary differentiating variable related to lethality was "opportunity and happenstance". It is proposed that those threatening the President by letter are at high risk for carrying out their threat if intervention does not take place. PMID:863349

  1. WHO: Zika Virus an International Health Threat

    MedlinePLUS

    ... nih.gov/medlineplus/news/fullstory_157003.html WHO: Zika Virus an International Health Threat Virus suspected of causing ... Health Organization on Monday declared the mosquito-borne Zika virus a global health threat, based on the suspicion ...

  2. Group Threat and Policy Change: The Spatial Dynamics of Prohibition Politics, 1890-1919.

    PubMed

    Andrews, Kenneth T; Seguin, Charles

    2015-09-01

    The authors argue that group threat is a key driver of the adoption of new and controversial policies. Conceptualizing threat in spatial terms, they argue that group threat is activated through the joint occurrence of (1) proximity to threatening groups and (2) the population density of threatened groups. By analyzing the adoption of county and state "dry laws" banning alcohol from 1890 to 1919, they first show that prohibition victories were driven by the relative strength of supportive constituencies such as native whites and rural residents, vis-à-vis opponents such as Irish, Italian, or German immigrants or Catholics. Second, they show that threat contributed to prohibition victories: counties bordering large immigrant or urban populations, which did not themselves contain similar populations, were more likely to adopt dry laws. Threat arises primarily from interactions between spatially proximate units at the local level, and therefore higher-level policy change is not reducible to the variables driving local policy. PMID:26594715

  3. Cardiovascular indices of challenge and threat states predict competitive performance.

    PubMed

    Turner, Martin J; Jones, Marc V; Sheffield, David; Cross, Sophie L

    2012-10-01

    Cardiovascular (CV) reactivity is proposed by both the Biopsychosocial Model and the Theory of Challenge and Threat States in Athletes to predict competitive performance. The association between CV reactivity and competitive performance was examined in cognitive (Study 1) and motor (Study 2) tasks. In Study 1, 25 participants (9 female) completed a modified Stroop Test, and in Study 2, 21 female netballers completed a netball shooting task, under competition. Measures of CV reactivity, self-report measures of self-efficacy, control, achievement-goals and emotions along with baseline and competitive task performance were taken. CV reactivity indicative of a challenge state predicted superior performance in both tasks compared to CV reactivity indicative of a threat state. In both studies the purported relationships between CV reactivity and the psychological and emotional responses were weak or absent. The mechanisms for the observed association between CV reactivity and task performance are discussed alongside implications of the findings for future research and practice. PMID:22918086

  4. Threat Assessment Teams Target School Crisis

    ERIC Educational Resources Information Center

    Stover, Del

    2005-01-01

    In this article, the author discusses the creation of a threat-assessment team to be utilized in order to analyze each threat and the usage of threat-assessment protocols for the purpose of guiding school administrators through a crisis. These are actually developed with the advice from the US Department of Education and the Secret Service. When a…

  5. Stereotype Threat, Test Anxiety, and Mathematics Performance

    ERIC Educational Resources Information Center

    Tempel, Tobias; Neumann, Roland

    2014-01-01

    We investigated the combined effects of stereotype threat and trait test anxiety on mathematics test performance. Stereotype threat and test anxiety interacted with each other in affecting performance. Trait test anxiety predicted performance only in a diagnostic condition that prevented stereotype threat by stereotype denial. A state measure of…

  6. Threat Assessment Teams Target School Crisis

    ERIC Educational Resources Information Center

    Stover, Del

    2005-01-01

    In this article, the author discusses the creation of a threat-assessment team to be utilized in order to analyze each threat and the usage of threat-assessment protocols for the purpose of guiding school administrators through a crisis. These are actually developed with the advice from the US Department of Education and the Secret Service. When a…

  7. Stereotype Threat, Test Anxiety, and Mathematics Performance

    ERIC Educational Resources Information Center

    Tempel, Tobias; Neumann, Roland

    2014-01-01

    We investigated the combined effects of stereotype threat and trait test anxiety on mathematics test performance. Stereotype threat and test anxiety interacted with each other in affecting performance. Trait test anxiety predicted performance only in a diagnostic condition that prevented stereotype threat by stereotype denial. A state measure of…

  8. A Review of the Theory and Research Underlying the StrengthsQuest Program for Students. The Quest for Strengths

    ERIC Educational Resources Information Center

    Hodges, Timothy D.; Harter, James K.

    2005-01-01

    StrengthsQuest is a student program that focuses on strengths rather than weaknesses. It is intended to lead students to discover their natural talents and gain unique and valuable insights into how to develop such talents into strengths--strengths that equip them to succeed and to make important decisions that enable them to balance the demands…

  9. Shades of Threat: Racial Identity as a Moderator of Stereotype Threat

    ERIC Educational Resources Information Center

    Davis, Claytie, III; Aronson, Joshua; Salinas, Moises

    2006-01-01

    This study investigated Black racial identity attitudes as a moderator of intellectual performance in potentially stereotype threatening situations. Ninety-eight African American students were randomly assigned to one of three stereotype threatening conditions: low threat, medium threat, or high threat. Analyses confirmed a stereotype threat…

  10. The role of threats in animal cooperation.

    PubMed

    Cant, Michael A

    2011-01-22

    In human societies, social behaviour is strongly influenced by threats of punishment, even though the threats themselves rarely need to be exercised. Recent experimental evidence suggests that similar hidden threats can promote cooperation and limit within-group selfishness in some animal systems. In other animals, however, threats appear to be ineffective. Here I review theoretical and empirical studies that help to understand the evolutionary causes of these contrasting patterns, and identify three factors-impact, accuracy and perception-that together determine the effectiveness of threats to induce cooperation. PMID:20798110

  11. Tensile Strength Measurements on Biopolymer Films

    NASA Astrophysics Data System (ADS)

    Stevens, Eugene S.; Poliks, Mark D.

    2003-07-01

    An experiment is described in which students prepare biopolymer (agar, gelatin, and starch) films from aqueous solution and measure the tensile strengths of the films using easily constructed equipment. Agar and gelatin form moderately strong films. Starch forms weak films but the strength is increased by combining with agar and gelatin.

  12. Threats to Networked RFID Systems

    NASA Astrophysics Data System (ADS)

    Mitrokotsa, Aikaterini; Beye, Michael; Peris-Lopez, Pedro

    RFID technology is an area currently undergoing active development. An issue, which has received a lot of attention, is the security risks that arise due to the inherent vulnerabilities of RFID technology. Most of this attention, however, has focused on related privacy issues. The goal of this chapter is to present a more global overview of RFID threats. This can not only help experts perform risk analyses of RFID systems but also increase awareness and understanding of RFID security issues for non-experts. We use clearly defined and widely accepted concepts from both the RFID area and classical risk analysis to structure this overview.

  13. Stereotype threat and female communication styles.

    PubMed

    von Hippel, Courtney; Wiryakusuma, Cindy; Bowden, Jessica; Shochet, Megan

    2011-10-01

    A large body of research has documented the performance-debilitating effects of stereotype threat for individuals, but there is a paucity of research exploring interpersonal consequences of stereotype threat. Two experiments tested the hypothesis that stereotype threat would change the style in which women communicate. Results indicate that women who experience stereotype threat regarding leadership abilities react against the stereotype by adopting a more masculine communication style. Study 2 provides evidence that self-affirmation eliminates this effect of stereotype threat on women's communication styles. A third study demonstrates an ironic consequence of this effect of stereotype threat on women's communication--when women under stereotype threat adopt a more masculine communication style, they are rated as less warm and likeable, and evaluators indicate less willingness to comply with their requests. Theoretical and practical implications of these findings are discussed. PMID:21646549

  14. Weak decays at PEP

    SciTech Connect

    Yelton, J.M.

    1984-04-01

    Results are presented on four aspects of weak decays. The MARK II measurement of the tau lifetime, the MARK II measurement of the D/sup 0/ lifetime, the measurement from several experiments of the semi-leptonic branching fractions of hadrons constraining b and c quarks, and lastly the MAC measurement of the B lifetime. 30 references.

  15. Weak Lensing with LSST

    NASA Astrophysics Data System (ADS)

    Wittman, David M.; Jain, B.; Jarvis, M.; Knox, L.; Margoniner, V.; Takada, M.; Tyson, J.; Zhan, H.; LSST Weak Lensing Science Collaboration

    2006-12-01

    Constraining dark energy parameters with weak lensing is one of the primary science goals of the LSST. The LSST Weak Lensing Science Collaboration has been formed with the goal of optimizing the weak lensing science by optimizing the survey cadence; working with Data Management to insure high-quality pipeline processing which will meet our needs; developing the necessary analysis tools well before the onset of data-taking; participating in high-fidelity simulations to test the system end-to-end; and analyzing the real dataset as it becomes available. We review the major weak lensing probes, the twoand three-point shear correlations, and how they constrain dark energy parameters. We also review the possibility of going beyond dark energy models and testing gravity with the LSST data. To realize the promise of the awesome LSST statistical precision, we must ensure that systematic errors are kept under control. We review the major sources of systematics and our plans for mitigation. We present data that demonstrate that these sources of systematics can be kept to a level smaller than the statistical error.

  16. Threat Sensitivity in Bipolar Disorder

    PubMed Central

    Muhtadie, Luma; Johnson, Sheri L.

    2015-01-01

    Life stress is a major predictor of the course of bipolar disorder. Few studies have used laboratory paradigms to examine stress reactivity in bipolar disorder, and none have assessed autonomic reactivity to laboratory stressors. In the present investigation we sought to address this gap in the literature. Participants, 27 diagnosed with bipolar I disorder and 24 controls with no history of mood disorder, were asked to complete a complex working memory task presented as “a test of general intelligence.” Self-reported emotions were assessed at baseline and after participants were given task instructions; autonomic physiology was assessed at baseline and continuously during the stressor task. Compared to controls, individuals with bipolar disorder reported greater increases in pretask anxiety from baseline and showed greater cardiovascular threat reactivity during the task. Group differences in cardiovascular threat reactivity were significantly correlated with comorbid anxiety in the bipolar group. Our results suggest that a multimethod approach to assessing stress reactivity—including the use of physiological parameters that differentiate between maladaptive and adaptive profiles of stress responding— can yield valuable information regarding stress sensitivity and its associations with negative affectivity in bipolar disorder. PMID:25688436

  17. Threat sensitivity in bipolar disorder.

    PubMed

    Muhtadie, Luma; Johnson, Sheri L

    2015-02-01

    Life stress is a major predictor of the course of bipolar disorder. Few studies have used laboratory paradigms to examine stress reactivity in bipolar disorder, and none have assessed autonomic reactivity to laboratory stressors. In the present investigation we sought to address this gap in the literature. Participants, 27 diagnosed with bipolar I disorder and 24 controls with no history of mood disorder, were asked to complete a complex working memory task presented as "a test of general intelligence." Self-reported emotions were assessed at baseline and after participants were given task instructions; autonomic physiology was assessed at baseline and continuously during the stressor task. Compared to controls, individuals with bipolar disorder reported greater increases in pretask anxiety from baseline and showed greater cardiovascular threat reactivity during the task. Group differences in cardiovascular threat reactivity were significantly correlated with comorbid anxiety in the bipolar group. Our results suggest that a multimethod approach to assessing stress reactivity-including the use of physiological parameters that differentiate between maladaptive and adaptive profiles of stress responding-can yield valuable information regarding stress sensitivity and its associations with negative affectivity in bipolar disorder. (PsycINFO Database Record (c) 2015 APA, all rights reserved). PMID:25688436

  18. Weak Finsler structures and the Funk weak metric

    NASA Astrophysics Data System (ADS)

    Papadopoulos, Athanase; Troyanov, Marc

    2009-04-01

    We discuss general notions of metrics and of Finsler structures which we call weak metrics and weak Finsler structures. Any convex domain carries a canonical weak Finsler structure, which we call its tautological weak Finsler structure. We compute distances in the tautological weak Finsler structure of a domain and we show that these are given by the so-called Funk weak metric. We conclude the paper with a discussion of geodesics, of metric balls and of convexity properties of the Funk weak metric.

  19. On the costs and benefits of directing attention towards or away from threat-related stimuli: a classical conditioning experiment.

    PubMed

    Van Bockstaele, Bram; Verschuere, Bruno; De Houwer, Jan; Crombez, Geert

    2010-07-01

    In attentional bias modification programs, individuals are trained to attend away from threat in order to reduce emotional reactivity to stressful situations. However, attending towards threat is considered to be a prerequisite for fear reduction in other models of anxiety. We compared both views by manipulating attention towards or away from an acquired signal of threat. The strength of extinction and reacquisition was assessed with threat and US-expectancy ratings. We found more extinction in the attend towards threat group, compared to both the attend away from threat group and a control group in which attention was not manipulated. The results are in line with the Emotional Processing Theory and cognitive accounts of classical conditioning. PMID:20451175

  20. Countering the Nuclear Terrorist Threat

    SciTech Connect

    Vantine, H C

    2002-10-04

    The nuclear/radioactive threat to homeland security posed by terrorists can be broken into four categories. Of highest concern is the use of an improvised nuclear device (IND). An IND, as its name implies, is a nuclear explosive device. It produces nuclear yield, and this nuclear yield has catastrophic effects. An IND is the ultimate terrorist weapon, and terrorist groups are actively attempting to acquire nuclear weapons. Detonation of an IND could dwarf the devastation of the September 11 attack on the World Trade Center. Dealing with the aftermath of an IND would be horrific. Rescue efforts and cleanup would be hazardous and difficult. Workers would have to wear full protection suits and self-contained breathing apparatus. Because of the residual radioactivity, in certain locations they could only work short times before acquiring their ''lifetime'' dose. As with the Chernobyl event, some rescue workers might well expose themselves to lethal doses of radiation, adding to the casualty toll. Enormous volumes of contaminated debris would have to be removed and disposed. If a terrorist group decides not to pursue an actual nuclear device, it might well turn to Radiological Dispersal Devices (RDDs) or ''dirty bombs'' as they are often called. RDDs spread radioactivity but they do not generate nuclear yield. The fabrication of an RDD requires radioactive material and a dispersal mechanism. Radioactive materials are used all over the world for medical, industrial, and research applications. Standards for safe handling and accountability of radioactive material vary around the world. Stories in the press suggest inadequate controls on radiological materials in parts of the world. The effects of an RDD vary widely, and are measured in terms of contamination area, health effects to the exposed population, and economic consequences. Even a negligible, but measurable, exposure would exploit the general public's fear of things radioactive and would have significant psychological consequences. The greatest impact of a small release would probably be economic, associated with cleanup and restoration of the contaminated area. Another category of threat is the attack on a facility, either a power reactor or sabotage of a large radiation source. In general these facilities are hard targets (structurally), and damage and contamination are localized. The final category of threat is the use of radioactive materials to deliver a radiation dose to individuals. This type of attack is again localized and does not readily fall into the category of a weapon of mass destruction.

  1. Enhanced Memory for both Threat and Neutral Information Under Conditions of Intergroup Threat

    PubMed Central

    Zhu, Yong; Zhao, Yufang; Ybarra, Oscar; Stephan, Walter G.; Yang, Qing

    2015-01-01

    Few studies have examined the effect of intergroup threat on cognitive outcomes such as memory. Different theoretical perspectives can inform how intergroup threat should affect memory for threat-relevant and neutral information, such as the mood-congruency approach, Yerkes–Dodson law, Easterbrook’s theory, and also evolutionary perspectives. To test among these, we conducted two experiments to examine how exposure to intergroup threats affected memory compared to control conditions. In study 1, we manipulated symbolic threat and examined participants’ memory for threat and neutral words. In study 2, memory performance was assessed following the induction of realistic threat. Across the studies, in the control condition participants showed better memory for threat-related than neutral information. However, participants under threat remembered neutral information as well as threat-related information. In addition, participants in the threat condition remembered threat-related information as well as participants in the control condition. The findings are discussed in terms of automatic vigilance processes but also the effects of threat on arousal and its effect on information processing. This latter perspective, suggests paradoxically, that under some circumstances involving an outgroup threat, non-threatening information about outgroups can be extensively processed. PMID:26635669

  2. Hysteresis in weak ferromagnets

    NASA Astrophysics Data System (ADS)

    Bazaliy, Ya. B.; Tsymbal, L. T.; Kakazei, G. N.; Vasiliev, S. V.

    2011-03-01

    Magnetic hysteresis is studied in the orthoferrites ErFeO3 and TmFeO3 using the single crystal samples of millimeter dimensions. It is shown that in both materials one observes a temperature transition manifesting itself through the temperature hysteresis of the magnetic moment and a peculiar temperature evolution of the field hysteresis loop shapes near this transition. Experiments rule out the hypothesis that the ordering of the orthoferrite's rare earth magnetic moments plays an important role in these phenomena. The hysteresis curves can be explained by a few-domain magnetic state of the samples that results from the weak ferromagnetism of the orthoferrites. The phenomenon is generic for weak ferromagnets with temperature dependent magnetization. A large characteristic magnetic length makes the behavior of the relatively big samples analogous to that observed in the nano-size samples of strong ferromagnets. Supported by NSF DMR-0847159, Ukrainian DFFD F28/456-2009, Portuguese FCT ``Ciencia 2007''.

  3. Macrocyclic weakly coordinating anions.

    PubMed

    Landskron, Kai

    2015-10-01

    Herein, the concept of macrocyclic weakly coordinating anions (M-WCAs) is introduced. Synthetic methodologies are described how to access M-WCAs by thermodynamically controlled self-assembly in high yields, in particular through condensation and alkyne metathesis reactions. The anticipated properties and applications of M-WCAs in solid state and in solution are discussed, specifically for gas storage and separation, homogeneous and heterogeneous catalysis, and as liquid and solid electrolytes. PMID:26272789

  4. Composite weak bosons

    SciTech Connect

    Suzuki, M.

    1988-04-01

    Dynamical mechanism of composite W and Z is studied in a 1/N field theory model with four-fermion interactions in which global weak SU(2) symmetry is broken explicitly by electromagnetic interaction. Issues involved in such a model are discussed in detail. Deviation from gauge coupling due to compositeness and higher order loop corrections are examined to show that this class of models are consistent not only theoretically but also experimentally.

  5. Parasite threat to panda conservation.

    PubMed

    Zhang, Jin-Shuo; Daszak, Peter; Huang, Hua-Li; Yang, Guang-You; Kilpatrick, A Marm; Zhang, Shuyi

    2008-03-01

    The giant panda is a global symbol of wildlife conservation that is threatened by historic and current habitat loss. Despite a great deal of research on the physiology, reproductive biology, and diet of pandas in the wild and in captivity, there is little information on wild panda mortality. Here we integrate previously unavailable data on the mortality of wild pandas. We report on three recent phases of panda mortality: deaths due to bamboo flowering in the 1970s and 1980s, surprisingly extensive poaching in the 1980s and 1990s, and a parasitic infection over the past few years. Our analyses suggest that the current most significant threat to wild panda survival is disease due to extraintestinal migration (visceral larval migrans) by an ascarid nematode. We demonstrate that the probability of death of wild pandas being caused by this disease increased significantly between 1971 and 2005 and discuss the possible factors leading to the emergence of this disease. PMID:18648791

  6. Potential threats to offshore platforms

    SciTech Connect

    Jenkins, B.M.

    1988-01-01

    Increasingly spectacular acts of terrorism have led to growing concern that terrorists will move beyond the symbols of society and directly attack its technological and industrial vulnerabilities. Offshore platforms have been frequently mentioned among the potential targets terrorists might attack. This concern, however, has not resulted in extensive research like that devoted to possible threats to nuclear facilities, which have also been frequently mentioned as possible future targets of terrorists. For one thing, offshore drilling does not invoke the fear inherent in the word nuclear, a fear that translates directly into heavy security for the nuclear industry. Neither does the construction of offshore platforms provoke anything like the kind of protest generated by the construction of nuclear facilities.

  7. "Filoviruses": a real pandemic threat?

    PubMed

    Martina, Byron E E; Osterhaus, Albert D M E

    2009-04-01

    Filoviruses are zoonotic and among the deadliest viruses known to mankind, with mortality rates in outbreaks reaching up to 90%. Despite numerous efforts to identify the host reservoir(s), the transmission cycle of filoviruses between the animal host(s) and humans remains unclear. The last decade has witnessed an increase in filovirus outbreaks with a changing epidemiology. The high mortality rates and lack of effective antiviral drugs or preventive vaccines has propagated the fear that filoviruses may become a real pandemic threat. This article discusses the factors that could influence the possible pandemic potential of filoviruses and elaborates on the prerequisites for the containment of future outbreaks, which would help prevent the evolution of filovirus into more virulent and more transmissible viruses. PMID:20049699

  8. World's soils are under threat

    NASA Astrophysics Data System (ADS)

    Montanarella, Luca; Pennock, Daniel Jon; McKenzie, Neil; Badraoui, Mohamed; Chude, Victor; Baptista, Isaurinda; Mamo, Tekalign; Yemefack, Martin; Singh Aulakh, Mikha; Yagi, Kazuyuki; Hong, Suk Young; Vijarnsorn, Pisoot; Zhang, Gan-Lin; Arrouays, Dominique; Black, Helaina; Krasilnikov, Pavel; Sobocká, Jaroslava; Alegre, Julio; Henriquez, Carlos Roberto; de Lourdes Mendonça-Santos, Maria; Taboada, Miguel; Espinosa-Victoria, David; AlShankiti, Abdullah; Kazem AlaviPanah, Sayed; El Mustafa Elsheikh, Elsiddig Ahmed; Hempel, Jon; Camps Arbestain, Marta; Nachtergaele, Freddy; Vargas, Ronald

    2016-02-01

    The Intergovernmental Technical Panel on Soils has completed the first State of the World's Soil Resources Report. Globally soil erosion was identified as the gravest threat, leading to deteriorating water quality in developed regions and to lowering of crop yields in many developing regions. We need to increase nitrogen and phosphorus fertilizer use in infertile tropical and semi-tropical soils - the regions where the most food insecurity among us are found - while reducing global use of these products overall. Stores of soil organic carbon are critical in the global carbon balance, and national governments must set specific targets to stabilize or ideally increase soil organic carbon stores. Finally the quality of soil information available for policy formulation must be improved - the regional assessments in the State of the World's Soil Resources Report frequently base their evaluations on studies from the 1990s based on observations made in the 1980s or earlier.

  9. World's soils are under threat

    NASA Astrophysics Data System (ADS)

    Montanarella, L.; Pennock, D. J.; McKenzie, N. J.; Badraoui, M.; Chude, V.; Baptista, I.; Mamo, T.; Yemefack, M.; Singh Aulakh, M.; Yagi, K.; Hong, S. Young; Vijarnsorn, P.; Zhang, G.-L.; Arrouays, D.; Black, H.; Krasilnikov, P.; Sobocká, J.; Alegre, J.; Henriquez, C. R.; Mendonça-Santos, M. L.; Taboada, M.; Espinosa-Victoria, D.; AlShankiti, A.; AlaviPanah, S. K.; Elsheikh, E. A. E.; Hempel, J.; Camps Arbestain, M.; Nachtergaele, F.; Vargas, R.

    2015-12-01

    The Intergovernmental Technical Panel on Soils has completed the first State of the World's Soil Resources report. Globally soil erosion was identified as the gravest threat, leading to deteriorating water quality in developed regions and to lowering of crop yields in many developing regions. We need to increase nitrogen and phosphorus fertilizer use in infertile tropical and semi-tropical soils - the regions where the most food insecure among us are found - while reducing global use of these products overall. Stores of soil organic carbon are critical in the global carbon balance, and national governments must set specific targets to stabilize or ideally increase soil organic carbon stores. Finally the quality of soil information available for policy formulation must be improved - the regional assessments in the SWSR report frequently base their evaluations on studies from the 1990s based on observations made in the 1980s or earlier.

  10. Sensor-guided threat countermeasure system

    DOEpatents

    Stuart, Brent C.; Hackel, Lloyd A.; Hermann, Mark R.; Armstrong, James P.

    2012-12-25

    A countermeasure system for use by a target to protect against an incoming sensor-guided threat. The system includes a laser system for producing a broadband beam and means for directing the broadband beam from the target to the threat. The countermeasure system comprises the steps of producing a broadband beam and directing the broad band beam from the target to blind or confuse the incoming sensor-guided threat.

  11. Autonomous Realtime Threat-Hunting Robot (ARTHR

    ScienceCinema

    INL

    2009-09-01

    Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats.

  12. Autonomous Realtime Threat-Hunting Robot (ARTHR

    SciTech Connect

    INL

    2008-05-29

    Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats.

  13. DOE site-specific threat assessment

    SciTech Connect

    West, D.J.; Al-Ayat, R.A.; Judd, B.R.

    1985-07-12

    A facility manager faced with the challenges of protecting a nuclear facility against potential threats must consider the likelihood and consequences of such threats, know the capabilities of the facility safeguards and security systems, and make informed decisions about the cost-effectivness of safeguards and security upgrades. To help meet these challenges, the San Francisco Operations Office of the Department of Energy, in conjunction with the Lawrence Livermore Laboratory, has developed a site-specific threat assessment approach and a quantitative model to improve the quality and consistency of site-specific threat assessment and resultant security upgrade decisions at sensitive Department of Energy facilities. 5 figs.

  14. Weakly Interacting Disordered Electron Systems

    NASA Astrophysics Data System (ADS)

    Ekuma, C. E.; Terletska, H.; Yang, S.; Tam, K.-M.; Vidhyadhiraja, N. S.; Moreno, J.; Jarrell, M.

    2015-03-01

    We report on the interplay of interactions and disorder within the typical medium dynamical cluster approximation using the Anderson-Hubbard model. By the systematical incorporation of non-local spatial correlations and the diagonal disorder on an equal footing, we study the initial effects of electron interactions (U) in one (1D), two (2D), and three (3D) dimensions. Treating the interacting non-local cluster self-energy (?c(SOPT) [ cal G ~ ] (i , j ? i)) up to ?U2 order in the perturbation expansion, we obtain the ground-state phase diagram in 3D for the disorder induced paramagnetic metal to insulator transition in the presence of weak interactions. We find that the critical disorder strength (Wc), required to localize all states, increases with increasing U; implying that the metallic phase is stabilized by interactions. In 2D, our results agree with previous findings on the destruction of the insulating phase by U, while in 1D, we find strong competition between both phases. This work is supported by the NSF EPSCoR EPS-1003897. Supercomputer support is provided by LONI and HPC@LSU.

  15. Weakly broken galileon symmetry

    NASA Astrophysics Data System (ADS)

    Pirtskhalava, David; Santoni, Luca; Trincherini, Enrico; Vernizzi, Filippo

    2015-09-01

    Effective theories of a scalar phi invariant under the internal galileon symmetry phi?phi+b? x? have been extensively studied due to their special theoretical and phenomenological properties. In this paper, we introduce the notion of weakly broken galileon invariance, which characterizes the unique class of couplings of such theories to gravity that maximally retain their defining symmetry. The curved-space remnant of the galileon's quantum properties allows to construct (quasi) de Sitter backgrounds largely insensitive to loop corrections. We exploit this fact to build novel cosmological models with interesting phenomenology, relevant for both inflation and late-time acceleration of the universe.

  16. Weak decay of hypernuclei

    SciTech Connect

    Grace, R.

    1983-01-01

    The Moby Dick spectrometer (at BNL) in coincidence with a range spectrometer and a TOF neutron detector will be used to study the weak decay modes of /sup 12/C. The Moby Dick spectrometer will be used to reconstruct and tag events in which specific hypernuclear states are formed in the reaction K/sup -/ + /sup 12/C ..-->.. ..pi../sup -/ + /sup 12/C. Subsequent emission of decay products (pions, protons and neutrons) in coincidence with the fast forward pion will be detected in a time and range spectrometer, and a neutron detector.

  17. Weakly broken galileon symmetry

    SciTech Connect

    Pirtskhalava, David; Santoni, Luca; Trincherini, Enrico; Vernizzi, Filippo

    2015-09-01

    Effective theories of a scalar ϕ invariant under the internal galileon symmetryϕ→ϕ+b{sub μ}x{sup μ} have been extensively studied due to their special theoretical and phenomenological properties. In this paper, we introduce the notion of weakly broken galileon invariance, which characterizes the unique class of couplings of such theories to gravity that maximally retain their defining symmetry. The curved-space remnant of the galileon’s quantum properties allows to construct (quasi) de Sitter backgrounds largely insensitive to loop corrections. We exploit this fact to build novel cosmological models with interesting phenomenology, relevant for both inflation and late-time acceleration of the universe.

  18. Threat by association: do distant intergroup threats carry-over into local intolerance?

    PubMed

    Bouman, Thijs; van Zomeren, Martijn; Otten, Sabine

    2014-09-01

    Individuals are often confronted with intergroup threats, yet many of these threats emanate from distant groups that most individuals are unlikely to encounter in their local environment. An important yet unanswered question is whether reactions to those threats, such as intolerance towards the threatening group, carry over to other groups that individuals actually do encounter in their local environment (e.g., immigrants). The main goal of our studies was to experimentally identify this carry-over effect of intergroup threat. Specifically, we hypothesized that (by definition relatively abstract) symbolic threats (e.g., threats to the ingroup's worldview) have an especially strong carry-over potential because those threats can be easily attributed to other outgroups. We tested these predictions in one correlational and two experimental studies. The results of all three studies confirmed our hypothesis that particularly distant symbolic threats were predictive of intolerance towards local outgroups. PMID:23909701

  19. Ideology, Social Threat, and the Death Sentence: Capital Sentences across Time and Space

    ERIC Educational Resources Information Center

    Jacobs, David; Carmichael, Jason T.

    2004-01-01

    Capital punishment is the most severe criminal penalty, yet we know little about the factors that produce jurisdictional differences in the use of the death sentence. Political explanations emphasize conservative values and the strength of more conservative political parties. Threat accounts suggest that this sentence will be more likely in…

  20. Ideology, Social Threat, and the Death Sentence: Capital Sentences across Time and Space

    ERIC Educational Resources Information Center

    Jacobs, David; Carmichael, Jason T.

    2004-01-01

    Capital punishment is the most severe criminal penalty, yet we know little about the factors that produce jurisdictional differences in the use of the death sentence. Political explanations emphasize conservative values and the strength of more conservative political parties. Threat accounts suggest that this sentence will be more likely in…

  1. Inferring the nature of anthropogenic threats from long-term abundance records.

    PubMed

    Shoemaker, Kevin T; Akçakaya, H Resit

    2015-02-01

    Diagnosing the processes that threaten species persistence is critical for recovery planning and risk forecasting. Dominant threats are typically inferred by experts on the basis of a patchwork of informal methods. Transparent, quantitative diagnostic tools would contribute much-needed consistency, objectivity, and rigor to the process of diagnosing anthropogenic threats. Long-term census records, available for an increasingly large and diverse set of taxa, may exhibit characteristic signatures of specific threatening processes and thereby provide information for threat diagnosis. We developed a flexible Bayesian framework for diagnosing threats on the basis of long-term census records and diverse ancillary sources of information. We tested this framework with simulated data from artificial populations subjected to varying degrees of exploitation and habitat loss and several real-world abundance time series for which threatening processes are relatively well understood: bluefin tuna (Thunnus maccoyii) and Atlantic cod (Gadus morhua) (exploitation) and Red Grouse (Lagopus lagopus scotica) and Eurasian Skylark (Alauda arvensis) (habitat loss). Our method correctly identified the process driving population decline for over 90% of time series simulated under moderate to severe threat scenarios. Successful identification of threats approached 100% for severe exploitation and habitat loss scenarios. Our method identified threats less successfully when threatening processes were weak and when populations were simultaneously affected by multiple threats. Our method selected the presumed true threat model for all real-world case studies, although results were somewhat ambiguous in the case of the Eurasian Skylark. In the latter case, incorporation of an ancillary source of information (records of land-use change) increased the weight assigned to the presumed true model from 70% to 92%, illustrating the value of the proposed framework in bringing diverse sources of information into a common rigorous framework. Ultimately, our framework may greatly assist conservation organizations in documenting threatening processes and planning species recovery. PMID:25065712

  2. The Smallpox Threat: The School Nurse's Role

    ERIC Educational Resources Information Center

    Martin, Mary E.; Didion, Judy

    2003-01-01

    Today, with the threat of bioterrorism and war, there is a new dimension to the traditional role of the school nurse. The smallpox threat to public health will invoke the school nurse's role as an educator, liaison, and consultant in the community. This article discusses smallpox, the vaccination process, adverse effects, and postvaccination care.…

  3. Advisor Credibility and Reactions to Threats.

    ERIC Educational Resources Information Center

    Norman, Nancy; And Others

    Research shows that people comply more frequently to threats when the credibility of the source is high rather than low and that compliance is directly related to punishment magnitude. To examine the impact of an advisor on a target of threats, male college students (N=74) participated in an experiment that included high or low threatner…

  4. 24 CFR 9.131 - Direct threat.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false Direct threat. 9.131 Section 9.131 Housing and Urban Development Office of the Secretary, Department of Housing and Urban Development... DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT § 9.131 Direct threat. (a) This part does not require the...

  5. The Smallpox Threat: The School Nurse's Role

    ERIC Educational Resources Information Center

    Martin, Mary E.; Didion, Judy

    2003-01-01

    Today, with the threat of bioterrorism and war, there is a new dimension to the traditional role of the school nurse. The smallpox threat to public health will invoke the school nurse's role as an educator, liaison, and consultant in the community. This article discusses smallpox, the vaccination process, adverse effects, and postvaccination care.…

  6. Bombs and Bomb Threats in the School

    ERIC Educational Resources Information Center

    Starkey, David J.; Starkey, John D.

    1977-01-01

    Bombs and the threat of bombing can leave school personnel faced by an explosive hazard without knowledge of what to do. Therefore, a preplanned response is necessary. Discusses four major stages of dealing with bombs and bomb threats. (Author/RK)

  7. Bomb Threats and Bomb Search Techniques.

    ERIC Educational Resources Information Center

    Department of the Treasury, Washington, DC.

    This pamphlet explains how to be prepared and plan for bomb threats and describes procedures to follow once a call has been received. The content covers (1) preparation for bomb threats, (2) evacuation procedures, (3) room search methods, (4) procedures to follow once a bomb has been located, and (5) typical problems that search teams will…

  8. Stereotype Threat, Identity Salience, and Spatial Reasoning

    ERIC Educational Resources Information Center

    McGlone, Matthew S.; Aronson, Joshua

    2006-01-01

    Stereotype threat research provides insight into how the low standardized test scores of students from stigmatized social groups may derive in part from the negative performance expectations about these groups. Because these students belong to many social groups, one means of mitigating the threat is to remind them of their membership in groups…

  9. How you perceive threat determines your behavior

    PubMed Central

    Fernandes, Orlando; Portugal, Liana C. L.; Alves, Rita C. S.; Campagnoli, Rafaela R.; Mocaiber, Izabela; David, Isabel P. A.; Erthal, Fátima C. S.; Volchan, Eliane; de Oliveira, Leticia; Pereira, Mirtes G.

    2013-01-01

    The prioritization of processing emotional stimuli usually produces deleterious effects on task performance when it distracts from a task. One common explanation is that brain resources are consumed by emotional stimuli, diverting resources away from executing the task. Viewing unpleasant stimuli also generates defensive reactions, and these responses may be at least partially responsible for the effect of the emotional modulation observed in various reaction time (RT) paradigms. We investigated whether modulatory effects on RT vary if we presented threat stimuli to prompt different defensive responses. To trigger different responses, we manipulated threat perception by moving the direction of threatening stimuli. Threatening or neutral stimuli were presented as distractors during a bar orientation discrimination task. The results demonstrated that threat stimuli directed toward the observer produced a decrease in RT; in contrast, threat stimuli directed away from the observer produced an increase in RT, when compared to neutral stimuli. Accelerated RT during directed toward threat stimuli was attributed to increased motor preparation resulting from strong activation of the defense response cascade. In contrast, directed away threat stimuli likely activated the defense cascade, but less intensively, prompting immobility. Different threat stimuli produced varying effects, which was interpreted as evidence that the modulation of RT by emotional stimuli represents the summation of attentional and motivational effects. Additionally, participants who had been previously exposed to diverse types of violent crime were more strongly influenced by threat stimuli directed toward the observer. In sum, our data support the concept that emotions are indeed action tendencies. PMID:24115925

  10. The Nature of the Bioterrorism Threat

    SciTech Connect

    Regens, J. L.

    2003-02-25

    This analysis provides an overview of the nature of the bioterrorism threat. It identifies potential CDC Class A biological agents that are likely candidates for use in a terrorist incident and describes the known sources of vulnerability. The paper also summarizes S&T resources/needs and assesses response options for achieving effective biodefense against terrorist threats.

  11. Cosmic Impacts: The DoomsDay Threat

    NASA Astrophysics Data System (ADS)

    McGaha, J.

    1998-07-01

    Recent science fiction movies (Deep Impact and Armageddon) have brought public attention to the threat of possible impacts from space. Just how real is this threat and what would be the consequences of such an impact? Can we do anything to prevent it? The survival of civilization may depend on it.

  12. Personality Correlates of Nuclear War Threat Perception.

    ERIC Educational Resources Information Center

    Mayton, Daniel M., II

    This study investigated the relationship between individual personality characteristics and the threat of nuclear war among 192 introductory psychology students at a small college in the Pacific Northwest. One measure of nuclear threat perception was spontaneous concern, which was assessed using five presentations each of the incomplete sentences,…

  13. Nuclear threats from small states

    SciTech Connect

    Kahan, J.H.

    1994-06-13

    What are the policy implications regarding proliferation and counter proliferation of nuclear weapons among Third World states. How does deterrence operate outside the parameters of superpower confrontation as defined by the cold war elaborate system of constraints enforced by concepts like mutual assured destruction, and counter-value and counter-force targeting. How can US policymakers devise contingencies for dealing with nuclear threats posed by countries like North Korea, Libya, Iraq, Iran, and Syria. These are some of the unsettling but nevertheless important questions addressed by the author in this monograph. In his analysis, Mr. Jerome Kahan examines the likelihood that one or more of these countries will use nuclear weapons before the year 2000. He also offers a framework that policymakers and planners might use in assessing US interests in preempting the use of nuclear weapons or in retaliating for their use. Ironically, with the end of the cold war, it is imperative that defense strategists, policymakers, and military professionals think about the `unthinkable`. In the interest of fostering debate on this important subject, the Strategic Studies Institute commends this insightful monograph.

  14. Why are most subduction thrusts weak?

    NASA Astrophysics Data System (ADS)

    Kopf, A.; Brown, K. M.; Underwood, M. B.

    2003-04-01

    Many subduction thrusts are dominated by clay phases, with illite being particularly important in the deeper part towards the updip limit of the seismogenic zone. During ongoing work on the impact of fault mineralogy and regional excess fluid pressure on the development of low resolved shear stresses on the plate boundary thrust, we find that illite as well as other clays have low friction coefficients of <0.25 at effective stress levels up to 40 MPa. The latter encompasses much of the expected range of the seismogenic subduction thrust, and clearly these low intrinsic mineral strengths contribute to the extreme weakness of the fault. Here we examine the physico-chemical origins of this weakness as well as the impact of increasing pore pressure transients. We performed a variety of direct shear tests on purified clay mineral standards at different humidity in the shear box (dry [effectively 0%] to 98% humidity) as well as water saturation at a range of salinities (de-ionized to brine [1.5x SW salinity]). For initially dry illite we observe a strong decrease in frictional coefficient from dry to 98% humidity by a factor of ~2. Full saturation results in a further ~2x reduction in frictional strength. Other clays respond similarly although the levels of reduction in strength vary. The origins of the strength reduction most probably lie in the properties of the hydration layer on the variously charged surfaces of the different minerals (double layer effects). Salinity changes causing 2nd order changes in frictional strength support this view. Thus, physico-chemical effects appear important in controlling the frictional properties of the clay silicate phases entering the upper and intermediate regions of the seismogenic zone at subduction zones such as Nankai (at least at shear stresses up to 40 MPa). Expected down dip reductions in excess fluid pressure and progressive clay diagenesis will increase the effective normal stress and frictional resistance as the critical depth of the up-dip limit of the seismogenic zone is approached. However, the general weakness of the clay mineral phases limits the maximum shear strength of the subduction thrust to low levels. Our data do not support the contention that the smectite-to-illite reaction is directly responsible for the onset of seismogenic behavior in any of the studied subduction systems (Nankai, Costa Rica) because both smectite and illite have low friction coefficients and tend to velocity strengthen.

  15. Apparatus Impregnates Weak Fibers

    NASA Technical Reports Server (NTRS)

    Stanfield, Clarence E.; Wilson, Maywood L.

    1989-01-01

    Low-cost apparatus developed for use in conventional drum winding machine to impregnate fibrous materials having very low tensile strengths. Fiber fitted onto freely-spinning unwinding creel. Unwinds from creel between two tension bars onto guide spools, aligns fiber so properly enters sealed reservoir of resin. Stainless-steel metering die at entrance to reservoir aligns fiber and seals reservoir. Beneficial results obtained by use of reservoir made of polyethylene. Composite material made from resin matrices reinforced by fibers have great potential for solving challenging and often critical problems in design of spacecraft, space structures, and terrestrial structures.

  16. Security threats categories in healthcare information systems.

    PubMed

    Samy, Ganthan Narayana; Ahmad, Rabiah; Ismail, Zuraini

    2010-09-01

    This article attempts to investigate the various types of threats that exist in healthcare information systems (HIS). A study has been carried out in one of the government-supported hospitals in Malaysia.The hospital has been equipped with a Total Hospital Information System (THIS). The data collected were from three different departments, namely the Information Technology Department (ITD), the Medical Record Department (MRD), and the X-Ray Department, using in-depth structured interviews. The study identified 22 types of threats according to major threat categories based on ISO/IEC 27002 (ISO 27799:2008). The results show that the most critical threat for the THIS is power failure followed by acts of human error or failure and other technological factors. This research holds significant value in terms of providing a complete taxonomy of threat categories in HIS and also an important component in the risk analysis stage. PMID:20889850

  17. Forecasting Lightning Threat using Cloud-Resolving Model Simulations

    NASA Technical Reports Server (NTRS)

    McCaul, Eugene W., Jr.; Goodman, Steven J.; LaCasse, Katherine M.; Cecil, Daniel J.

    2008-01-01

    Two new approaches are proposed and developed for making time and space dependent, quantitative short-term forecasts of lightning threat, and a blend of these approaches is devised that capitalizes on the strengths of each. The new methods are distinctive in that they are based entirely on the ice-phase hydrometeor fields generated by regional cloud-resolving numerical simulations, such as those produced by the WRF model. These methods are justified by established observational evidence linking aspects of the precipitating ice hydrometeor fields to total flash rates. The methods are straightforward and easy to implement, and offer an effective near-term alternative to the incorporation of complex and costly cloud electrification schemes into numerical models. One method is based on upward fluxes of precipitating ice hydrometeors in the mixed phase region at the-15 C level, while the second method is based on the vertically integrated amounts of ice hydrometeors in each model grid column. Each method can be calibrated by comparing domain-wide statistics of the peak values of simulated flash rate proxy fields against domain-wide peak total lightning flash rate density data from observations. Tests show that the first method is able to capture much of the temporal variability of the lightning threat, while the second method does a better job of depicting the areal coverage of the threat. Our blended solution is designed to retain most of the temporal sensitivity of the first method, while adding the improved spatial coverage of the second. Exploratory tests for selected North Alabama cases show that, because WRF can distinguish the general character of most convective events, our methods show promise as a means of generating quantitatively realistic fields of lightning threat. However, because the models tend to have more difficulty in predicting the instantaneous placement of storms, forecasts of the detailed location of the lightning threat based on single simulations can be in error. Although these model shortcomings presently limit the precision of lightning threat forecasts from individual runs of current generation models,the techniques proposed herein should continue to be applicable as newer and more accurate physically-based model versions, physical parameterizations, initialization techniques and ensembles of forecasts become available.

  18. Weakly relativistic plasma expansion

    NASA Astrophysics Data System (ADS)

    Fermous, Rachid; Djebli, Mourad

    2015-04-01

    Plasma expansion is an important physical process that takes place in laser interactions with solid targets. Within a self-similar model for the hydrodynamical multi-fluid equations, we investigated the expansion of both dense and under-dense plasmas. The weakly relativistic electrons are produced by ultra-intense laser pulses, while ions are supposed to be in a non-relativistic regime. Numerical investigations have shown that relativistic effects are important for under-dense plasma and are characterized by a finite ion front velocity. Dense plasma expansion is found to be governed mainly by quantum contributions in the fluid equations that originate from the degenerate pressure in addition to the nonlinear contributions from exchange and correlation potentials. The quantum degeneracy parameter profile provides clues to set the limit between under-dense and dense relativistic plasma expansions at a given density and temperature.

  19. Weakly relativistic plasma expansion

    SciTech Connect

    Fermous, Rachid Djebli, Mourad

    2015-04-15

    Plasma expansion is an important physical process that takes place in laser interactions with solid targets. Within a self-similar model for the hydrodynamical multi-fluid equations, we investigated the expansion of both dense and under-dense plasmas. The weakly relativistic electrons are produced by ultra-intense laser pulses, while ions are supposed to be in a non-relativistic regime. Numerical investigations have shown that relativistic effects are important for under-dense plasma and are characterized by a finite ion front velocity. Dense plasma expansion is found to be governed mainly by quantum contributions in the fluid equations that originate from the degenerate pressure in addition to the nonlinear contributions from exchange and correlation potentials. The quantum degeneracy parameter profile provides clues to set the limit between under-dense and dense relativistic plasma expansions at a given density and temperature.

  20. Reptation in a Weak Driving Field

    NASA Astrophysics Data System (ADS)

    Aalberts, Daniel; van Leeuwen, J. M. J.

    1997-03-01

    A simplified model of reptation is presented. The Master Equation of the model is systematically solved by expansion in powers of the strength of the driving field. From the explicit form of the probability distribution, exact conclusions can be drawn about the average shape of the polymer, its drift velocity, and the zero field diffusion constant. Correlations between segments of the chain are calculated and turn out to be large, even in the weak driving field limit. The results are compared with simulations of the model.

  1. Strong mobility in weakly disordered systems

    SciTech Connect

    Ben-naim, Eli; Krapivsky, Pavel

    2009-01-01

    We study transport of interacting particles in weakly disordered media. Our one-dimensional system includes (i) disorder, the hopping rate governing the movement of a particle between two neighboring lattice sites is inhomogeneous, and (ii) hard core interaction, the maximum occupancy at each site is one particle. We find that over a substantial regime, the root-mean-square displacement of a particle s grows superdiffusively with time t, {sigma}{approx}({epsilon}t){sup 2/3}, where {epsilon} is the disorder strength. Without disorder the particle displacement is subdiffusive, {sigma} {approx}t{sup 1/4}, and therefore disorder strongly enhances particle mobility. We explain this effect using scaling arguments, and verify the theoretical predictions through numerical simulations. Also, the simulations show that regardless of disorder strength, disorder leads to stronger mobility over an intermediate time regime.

  2. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility,...

  3. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility,...

  4. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility,...

  5. Forecasting Lightning Threat Using WRF Proxy Fields

    NASA Technical Reports Server (NTRS)

    McCaul, E. W., Jr.

    2010-01-01

    Objectives: Given that high-resolution WRF forecasts can capture the character of convective outbreaks, we seek to: 1. Create WRF forecasts of LTG threat (1-24 h), based on 2 proxy fields from explicitly simulated convection: - graupel flux near -15 C (captures LTG time variability) - vertically integrated ice (captures LTG threat area). 2. Calibrate each threat to yield accurate quantitative peak flash rate densities. 3. Also evaluate threats for areal coverage, time variability. 4. Blend threats to optimize results. 5. Examine sensitivity to model mesh, microphysics. Methods: 1. Use high-resolution 2-km WRF simulations to prognose convection for a diverse series of selected case studies. 2. Evaluate graupel fluxes; vertically integrated ice (VII). 3. Calibrate WRF LTG proxies using peak total LTG flash rate densities from NALMA; relationships look linear, with regression line passing through origin. 4. Truncate low threat values to make threat areal coverage match NALMA flash extent density obs. 5. Blend proxies to achieve optimal performance 6. Study CAPS 4-km ensembles to evaluate sensitivities.

  6. Enhancing entanglement trapping by weak measurement and quantum measurement reversal

    SciTech Connect

    Zhang, Ying-Jie; Han, Wei; Fan, Heng; Xia, Yun-Jie

    2015-03-15

    In this paper, we propose a scheme to enhance trapping of entanglement of two qubits in the environment of a photonic band gap material. Our entanglement trapping promotion scheme makes use of combined weak measurements and quantum measurement reversals. The optimal promotion of entanglement trapping can be acquired with a reasonable finite success probability by adjusting measurement strengths. - Highlights: • Propose a scheme to enhance entanglement trapping in photonic band gap material. • Weak measurement and its reversal are performed locally on individual qubits. • Obtain an optimal condition for maximizing the concurrence of entanglement trapping. • Entanglement sudden death can be prevented by weak measurement in photonic band gap.

  7. Insider threat to secure facilities: data analysis

    SciTech Connect

    Not Available

    1980-05-09

    Three data sets drawn from industries that have experienced internal security breaches are analyzed. The industries and the insider security breaches are considered analogous in one or more respects to insider threats potentially confronting managers in the nuclear industry. The three data sets are: bank fraud and embezzlement (BF and E), computer-related crime, and drug theft from drug manufacturers and distributors. A careful analysis by both descriptive and formal statistical techniques permits certain general conclusions on the internal threat to secure industries to be drawn. These conclusions are discussed and related to the potential insider threat in the nuclear industry. 49 tabs.

  8. Vibrational spectroscopy standoff detection of threat chemicals

    NASA Astrophysics Data System (ADS)

    Ortiz-Rivera, William; Pacheco-Londoño, Leonardo C.; Castro-Suarez, John R.; Felix-Rivera, Hilsamar; Hernandez-Rivera, Samuel P.

    2011-06-01

    Spectroscopy based standoff detection systems: Raman and FTIR have been tested for detection of threat chemicals, including highly energetic materials, homemade explosives, explosives formulations and high explosives mixtures. Other threat chemicals studied included toxic industrial compounds (TIC) and chemical agent simulants. Microorganisms and biological threat agent simulants have also been detected at standoff distances. Open Path FTIR has been used to detect vapors and chemicals deposited on metal surfaces at ?g/cm2 levels at distances as far as 30 m in active mode and 60 m in passive mode. In the case of Raman telescope, standoff distances for acetonitrile and ammonium nitrate were 140 m.

  9. THE BIOTERRORISM THREAT: TECHNOLOGICAL AND POLITICAL CONSIDERATIONS

    SciTech Connect

    J. F. PILAT

    2000-03-01

    Bioterrorism--along with biowarfare, from which it may not always be distinguishable in practice--will be a feature of the strategic landscape in the 21st century and is high on the US national security agenda. Bioterrorism poses a potential threat to the US population, agriculture, interests, friends and allies, and military forces (asymmetric threats). Yet these possibilities have not been widely pursued or realized by terrorists. The perceived threat is far worse than anything experienced to date, and is largely technologically driven.

  10. Dynamic Strength Ceramic Nanocomposites Under Pulse Loading

    NASA Astrophysics Data System (ADS)

    Skripnyak, Evgeniya G.; Skripnyak, Vladimir V.; Vaganova, Irina K.; Skripnyak, Vladimir A.

    2015-06-01

    Multi-scale computer simulation approach has been applied to research of strength of nanocomposites under dynamic loading. The influence of mesoscopic substructures on the dynamic strength of ceramic and hybrid nanocomposites, which can be formed using additive manufacturing were numerically investigated. At weak shock wave loadings the shear strength and the spall strength of ceramic and hybrid nanocomposites depends not only phase concentration and porosity, but size parameters of skeleton substructures. The influence of skeleton parameter on the shear strength and the spall strength of ceramic nanocomposites with the same concentration of phases decreases with increasing amplitude of the shock pulse of microsecond duration above the double amplitude of the Hugoniot elastic limit of nanocomposites. This research carried out in 2014 -2015 was supported by grant from The Tomsk State University Academic D.I. Mendeleev Fund Program and also Ministry of Sciences and Education of Russian Federation (State task 2014/223, project 1943, Agreement 14.132.

  11. Childhood maltreatment and threats with weapons.

    PubMed

    Casiano, Hygiea; Mota, Natalie; Afifi, Tracie O; Enns, Murray W; Sareen, Jitender

    2009-11-01

    The relationship between childhood maltreatment and future threats with weapons is unknown. We examined data from the nationally representative National Comorbidity Survey Replication (n = 5692) and conducted multiple logistic regression analyses to determine the association between childhood maltreatment and lifetime behavior of threatening others with a gun or other weapon. After adjusting for sociodemographic variables, physical abuse, sexual abuse, and witnessing domestic violence were significantly associated with threats made with a gun (adjusted odds ratios [AOR] ranging between 3.38 and 4.07) and other weapons (AOR ranging between 2.16 and 2.83). The greater the number of types of maltreatment experienced, the stronger the association with lifetime threats made to others with guns and any weapons. Over 94% of respondents who experienced maltreatment and made threats reported that the maltreatment occurred prior to threatening others with weapons. Prevention efforts that reduce exposure to maltreatment may reduce violent behavior in later life. PMID:19996725

  12. Acid Rain: The Silent Environmental Threat.

    ERIC Educational Resources Information Center

    Zmud, Mia

    1992-01-01

    Describes the silent environmental threat posed by acid rain. Caused mainly by manmade pollutants, acid rain damages water and trees, decreases visibility, corrodes monuments, and threatens public health. The article includes guidelines for action. (SM)

  13. Autonomous Realtime Threat-Hunting Robot (ARTHR)

    ScienceCinema

    Idaho National Laboratory - David Bruemmer, Curtis Nielsen

    2010-01-08

    Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats. To learn more, visit

  14. Autonomous Realtime Threat-Hunting Robot (ARTHR)

    SciTech Connect

    Idaho National Laboratory - David Bruemmer, Curtis Nielsen

    2008-05-29

    Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats. To learn more, visit

  15. Intergroup threat gates social attention in humans

    PubMed Central

    Chen, Yujie; Zhao, Yufang

    2015-01-01

    Humans shift their attention to follow another person's gaze direction, a phenomenon called gaze cueing. This study examined whether a particular social factor, intergroup threat, modulates gaze cueing. As expected, stronger responses of a particular in-group to a threatening out-group were observed when the in-group, conditioned to perceive threat from one of two out-groups, was presented with facial stimuli from the threatening and non-threatening out-groups. These results suggest that intergroup threat plays an important role in shaping social attention. Furthermore, larger gaze-cueing effects were found for threatening out-group faces than for in-group faces only at the 200 ms but not the 800 ms stimulus onset asynchrony (SOA); the specificity of the gaze-cueing effects at the short SOA suggests that threat cues modulate the involuntary component of gaze cueing. PMID:25716090

  16. Counter-terrorism threat prediction architecture

    NASA Astrophysics Data System (ADS)

    Lehman, Lynn A.; Krause, Lee S.

    2004-09-01

    This paper will evaluate the feasibility of constructing a system to support intelligence analysts engaged in counter-terrorism. It will discuss the use of emerging techniques to evaluate a large-scale threat data repository (or Infosphere) and comparing analyst developed models to identify and discover potential threat-related activity with a uncertainty metric used to evaluate the threat. This system will also employ the use of psychological (or intent) modeling to incorporate combatant (i.e. terrorist) beliefs and intent. The paper will explore the feasibility of constructing a hetero-hierarchical (a hierarchy of more than one kind or type characterized by loose connection/feedback among elements of the hierarchy) agent based framework or "family of agents" to support "evidence retrieval" defined as combing, or searching the threat data repository and returning information with an uncertainty metric. The counter-terrorism threat prediction architecture will be guided by a series of models, constructed to represent threat operational objectives, potential targets, or terrorist objectives. The approach would compare model representations against information retrieved by the agent family to isolate or identify patterns that match within reasonable measures of proximity. The central areas of discussion will be the construction of an agent framework to search the available threat related information repository, evaluation of results against models that will represent the cultural foundations, mindset, sociology and emotional drive of typical threat combatants (i.e. the mind and objectives of a terrorist), and the development of evaluation techniques to compare result sets with the models representing threat behavior and threat targets. The applicability of concepts surrounding Modeling Field Theory (MFT) will be discussed as the basis of this research into development of proximity measures between the models and result sets and to provide feedback in support of model adaptation (learning). The increasingly complex demands facing analysts evaluating activity threatening to the security of the United States make the family of agent-based data collection (fusion) a promising area. This paper will discuss a system to support the collection and evaluation of potential threat activity as well as an approach fro presentation of the information.

  17. Bio-Terrorism Threat and Casualty Prevention

    SciTech Connect

    NOEL,WILLIAM P.

    2000-01-01

    The bio-terrorism threat has become the ''poor man's'' nuclear weapon. The ease of manufacture and dissemination has allowed an organization with only rudimentary skills and equipment to pose a significant threat with high consequences. This report will analyze some of the most likely agents that would be used, the ease of manufacture, the ease of dissemination and what characteristics of the public health response that are particularly important to the successful characterization of a high consequence event to prevent excessive causalities.

  18. Nuclear Threat Intelligence, Surveillance, and Reconnaissance

    NASA Astrophysics Data System (ADS)

    Kuliasha, Michael

    2012-03-01

    The National Security Strategy states that the greatest threat to the American people is ``the pursuit of nuclear weapons by violent extremists and their proliferation to additional states.'' The Global Nuclear Detection Architecture (GNDA) addresses a key portion of that threat by focusing on detecting nuclear and radiological materials that are out of regulatory control within permissive operating environments. However, the force protection requirements of the Department of Defense (DoD) range across a wider mission space from permissive environments, where nuclear and radiological materials can be monitored while under regulatory control, to hostile environments where nuclear and radiological materials exist in defiance of international regulations and agreements. This wider range of operating environments and the inherent physics limitations on the range of radiation detection pose great challenges to radiation detection-focused approaches to nuclear threat detection. Consequently, DoD is in the process of defining an intelligence, surveillance, and reconnaissance approach to countering nuclear threats that considers the observable signatures of all elements that comprise a potential threat; information, funds, people, material, equipment, and infrastructure. This strategy represents a shift from radiation detection as the primary sensing modality to radiation detection as one of many sensing modalities, including the human dimension, with a heavy emphasis on data fusion. This presentation will describe the attributes of a layered sensing approach to nuclear threat detection, illustrate the approach with examples, define potential building blocks, and discuss technical challenges.

  19. An Information Fusion Framework for Threat Assessment

    SciTech Connect

    Beaver, Justin M; Kerekes, Ryan A; Treadwell, Jim N

    2009-01-01

    Modern enterprises are becoming increasingly sensitive to the potential destructive power of small groups or individuals with malicious intent. In response, significant investments are being made in developing a means to assess the likelihood of certain threats to their enterprises. Threat assessment needs are typically focused in very specific application areas where current processes rely heavily on human analysis to both combine any available data and draw conclusions about the probability of a threat. A generic approach to threat assessment is proposed, including a threat taxonomy and decision-level information fusion framework, that provides a computational means for merging multi-modal data for the purpose of assessing the presence of a threat. The framework is designed for flexibility, and intentionally accounts for the accuracy of each data source, given the environmental conditions, in order to manage the uncertainty associated with any acquired data. The taxonomy and information fusion framework is described, and discussed in the context of real-world applications such as shipping container security and cyber security.

  20. Stereotype threat in the classroom: dejection mediates the disrupting threat effect on women's math performance.

    PubMed

    Keller, Johannes; Dauenheimer, Dirk

    2003-03-01

    Research on stereotype threat, which is defined as the risk of confirming a negative stereotypic expectation about one's group, has demonstrated that the applicability of negative stereotypes disrupts the performance of stigmatized social groups. While it has been shown that a reduction of stereotype threat leads to improved performance by members of stigmatized groups, there is a lack of clear-cut findings about the mediating processes. The aim of the present study is to provide a better understanding of the mechanisms that stereotype threat causes in women working on mathematical problems. In addition, the study set out to test stereotype threat theory in a natural environment: high school classrooms. The experiment involved the manipulation of the gender fairness of a math test. The results indicate that the stereotype threat effect exists in this everyday setting. Moreover, it appears that dejection emotions mediate the effect of threat manipulation. PMID:15273014

  1. Are All Interventions Created Equal? A Multi-Threat Approach to Tailoring Stereotype Threat Interventions

    PubMed Central

    Shapiro, Jenessa R.; Williams, Amy M.; Hambarchyan, Mariam

    2013-01-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats—concerns that a stereotype-relevant performance will reflect poorly on the abilities of one’s group—and self-as-target stereotype threats—concerns that a stereotype-relevant performance will reflect poorly on one’s own abilities. The present experiments explored Black college students’ performance on diagnostic intelligence tests (Experiments 1 and 3) and women’s interest (Experiment 2) and performance (Experiment 4) in science, technology, engineering, and math (STEM). Across the 4 experiments, participants were randomly assigned to experience either a group-as-target or self-as-target stereotype threat. Experiments 1 and 2 revealed that role model interventions were successful at protecting only against group-as-target stereotype threats, and Experiments 3 and 4 revealed that self-affirmation interventions were successful at protecting only against self-as-target stereotype threats. The present research provides an experimental test of the Multi-Threat Framework across different negatively stereotyped groups (Black students, female students), different negatively stereotyped domains (general intelligence, STEM), and different outcomes (test performance, career interest). This research suggests that interventions should address the range of possible stereotype threats to effectively protect individuals against these threats. Through an appreciation of the distinct forms of stereotype threats and the ways in which interventions work to reduce them, this research aims to facilitate a more complete understanding of stereotype threat. PMID:23088232

  2. Universal mechanism for Anderson and weak localization

    PubMed Central

    Filoche, Marcel; Mayboroda, Svitlana

    2012-01-01

    Localization of stationary waves occurs in a large variety of vibrating systems, whether mechanical, acoustical, optical, or quantum. It is induced by the presence of an inhomogeneous medium, a complex geometry, or a quenched disorder. One of its most striking and famous manifestations is Anderson localization, responsible for instance for the metal-insulator transition in disordered alloys. Yet, despite an enormous body of related literature, a clear and unified picture of localization is still to be found, as well as the exact relationship between its many manifestations. In this paper, we demonstrate that both Anderson and weak localizations originate from the same universal mechanism, acting on any type of vibration, in any dimension, and for any domain shape. This mechanism partitions the system into weakly coupled subregions. The boundaries of these subregions correspond to the valleys of a hidden landscape that emerges from the interplay between the wave operator and the system geometry. The height of the landscape along its valleys determines the strength of the coupling between the subregions. The landscape and its impact on localization can be determined rigorously by solving one special boundary problem. This theory allows one to predict the localization properties, the confining regions, and to estimate the energy of the vibrational eigenmodes through the properties of one geometrical object. In particular, Anderson localization can be understood as a special case of weak localization in a very rough landscape. PMID:22927384

  3. Weak localization with nonlinear bosonic matter waves

    SciTech Connect

    Hartmann, Timo; Michl, Josef; Petitjean, Cyril; Wellens, Thomas; Urbina, Juan-Diego; Richter, Klaus; Schlagheck, Peter

    2012-08-15

    We investigate the coherent propagation of dilute atomic Bose-Einstein condensates through irregularly shaped billiard geometries that are attached to uniform incoming and outgoing waveguides. Using the mean-field description based on the nonlinear Gross-Pitaevskii equation, we develop a diagrammatic theory for the self-consistent stationary scattering state of the interacting condensate, which is combined with the semiclassical representation of the single-particle Green function in terms of chaotic classical trajectories within the billiard. This analytical approach predicts a universal dephasing of weak localization in the presence of a small interaction strength between the atoms, which is found to be in good agreement with the numerically computed reflection and transmission probabilities of the propagating condensate. The numerical simulation of this quasi-stationary scattering process indicates that this interaction-induced dephasing mechanism may give rise to a signature of weak antilocalization, which we attribute to the influence of non-universal short-path contributions. - Highlights: Black-Right-Pointing-Pointer Numerical simulation of scattering of Bose-Einstein condensate through billiards. Black-Right-Pointing-Pointer Novel analytical semiclassical theory for nonlinear coherent scattering. Black-Right-Pointing-Pointer Inversion of weak localization due to mean-field interaction within the condensate. Black-Right-Pointing-Pointer Relevance of non-universal short-path contributions.

  4. Inspiratory muscle strength in asthma.

    PubMed

    Lavietes, M H; Grocela, J A; Maniatis, T; Potulski, F; Ritter, A B; Sunderam, G

    1988-05-01

    Augmentation of inspiratory muscle strength (Pimax) represents an adaptive response to airway obstruction. We explore the possibility that respiratory muscle weakness may herald hospital admission during acute bronchospasm. The Pimax measured 81 +/- 25 percent of a predicted value in 20 patients with acute bronchospasm (forced expiratory volume in one second, 36 +/- 17 percent predicted). Pimax was related to both hyperinflation (functional residual capacity, as percent predicted) and body weight (subjects were 122 +/- 29 percent ideal body weight), but not to the degree of airway obstruction per se. Furthermore, measurements of axial (craniocaudal) motion of the rib cage and asynchrony of rib cage and abdominal motions during tidal breathing did not correlate with either the degree of air flow obstruction or Pimax. We conclude that little if any respiratory muscle weakness occurs with bronchospasm. Furthermore, Pimax does not correlate with the degree of airway obstruction and does not explain abnormalities of rib cage and abdominal motion associated with asthma. PMID:2966039

  5. Impact of an interactive anti-speeding threat appeal: how much threat is too much?

    PubMed

    Pani?, Katarina; Cauberghe, Verolien; De Pelsmacker, Patrick

    2011-05-01

    This study investigates the impact of an interactive television public-service announcement (PSA) containing an anti-speeding threat appeal on feelings of telepresence and behavioral intention. In a 2?×?2?×?2 between-subjects factorial design with 213 participants, the level of threat evoked by a traditional PSA, by the interactive part of the PSA (dedicated advertising location or DAL) and by the preceding program context are manipulated to be either low or high. The results support the assumptions of the Extended Parallel Processing Model with regard to the effect of the level of perceived threat and perceived efficacy in an interactive media environment, and the important role of telepresence as a processing variable. The results of the three-way interaction effect of threat evoked by the program, the PSA and the DAL on telepresence show that when the threat levels of the program and the PSA are both either low or high, exposure to the threatening information in the DAL does not generate a significantly higher feeling of telepresence. However, when a low-threat program is followed by a high-threat PSA, the threat level of the DAL has a positive effect on telepresence. The same trend is found with a high-threat program and a low-threat PSA, although the effect of the threat evoked by the DAL on telepresence is not significant at conventional levels. Finally, there is a positive effect of telepresence on the behavioral intention to reduce speeding, which is partly mediated by the viewer's perceived efficacy to follow the recommended behavior. PMID:21204691

  6. The influence of stereotype threat on immigrants: review and meta-analysis

    PubMed Central

    Appel, Markus; Weber, Silvana; Kronberger, Nicole

    2015-01-01

    In many regions around the world students with certain immigrant backgrounds underachieve in educational settings. This paper provides a review and meta-analysis on one potential source of the immigrant achievement gap: stereotype threat, a situational predicament that may prevent students to perform up to their full abilities. A meta-analysis of 19 experiments suggests an overall mean effect size of 0.63 (random effects model) in support of stereotype threat theory. The results are complemented by moderator analyses with regard to circulation (published or unpublished research), cultural context (US versus Europe), age of immigrants, type of stereotype threat manipulation, dependent measures, and means for identification of immigrant status; evidence on the role of ethnic identity strength is reviewed. Theoretical and practical implications of the findings are discussed. PMID:26217256

  7. Inhibitory control as a moderator of threat-related interference biases in social anxiety.

    PubMed

    Gorlin, Eugenia I; Teachman, Bethany A

    2015-01-01

    Prior findings are mixed regarding the presence and direction of threat-related interference biases in social anxiety. The current study examined general inhibitory control (IC), measured by the classic colour-word Stroop, as a moderator of the relationship between both threat interference biases [indexed by the emotional Stroop (e-Stroop)] and several social anxiety indicators. High socially anxious undergraduate students (N = 159) completed the emotional and colour-word Stroop tasks, followed by an anxiety-inducing speech task. Participants completed measures of trait social anxiety, state anxiety before and during the speech, negative task-interfering cognitions during the speech and overall self-evaluation of speech performance. Speech duration was used to measure behavioural avoidance. In line with hypotheses, IC moderated the relationship between e-Stroop bias and every anxiety indicator (with the exception of behavioural avoidance), such that greater social-threat interference was associated with higher anxiety among those with weak IC, whereas lesser social-threat interference was associated with higher anxiety among those with strong IC. Implications for the theory and treatment of threat interference biases in socially anxious individuals are discussed. PMID:24967719

  8. Weak values as interference phenomena

    NASA Astrophysics Data System (ADS)

    Dressel, Justin

    2015-03-01

    Weak values arise experimentally as conditioned averages of weak (noisy) observable measurements that minimally disturb an initial quantum state, and also as dynamical variables for reduced quantum state evolution even in the absence of measurement. These averages can exceed the eigenvalue range of the observable ostensibly being estimated, which has prompted considerable debate regarding their interpretation. Classical conditioned averages of noisy signals only show such anomalies if the quantity being measured is also disturbed prior to conditioning. This fact has recently been rediscovered, along with the question whether anomalous weak values are merely classical disturbance effects. Here we carefully review the role of the weak value as both a conditioned observable estimation and a dynamical variable, and clarify why classical disturbance models will be insufficient to explain the weak value unless they can also simulate other quantum interference phenomena.

  9. 49 CFR 1546.301 - Bomb or air piracy threats.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless...

  10. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight... upon receiving information that an act or suspected act of air piracy has been committed, the...

  11. 49 CFR 1546.301 - Bomb or air piracy threats.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless...

  12. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight... upon receiving information that an act or suspected act of air piracy has been committed, the...

  13. 49 CFR 1546.301 - Bomb or air piracy threats.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless...

  14. 49 CFR 1546.301 - Bomb or air piracy threats.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless...

  15. 49 CFR 1546.301 - Bomb or air piracy threats.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless...

  16. Left-Wing Extremism: The Current Threat

    SciTech Connect

    Karl A. Seger

    2001-04-30

    Left-wing extremism is ''alive and well'' both in the US and internationally. Although the current domestic terrorist threat within the U. S. is focused on right-wing extremists, left-wing extremists are also active and have several objectives. Leftist extremists also pose an espionage threat to U.S. interests. While the threat to the U.S. government from leftist extremists has decreased in the past decade, it has not disappeared. There are individuals and organizations within the U.S. who maintain the same ideology that resulted in the growth of left-wing terrorism in this country in the 1970s and 1980s. Some of the leaders from that era are still communicating from Cuba with their followers in the U.S., and new leaders and groups are emerging.

  17. [The threat of snake and scorpion venoms].

    PubMed

    P?usa, Tadeusz; Sm?dzik, Katarzyna

    2015-09-01

    Venoms of snakes and scorpions pose a significant threat to the health and life of humans. The speed and range of their actions causes damage of the organ responsible for the maintenance of vital signs. Venomous snake venoms cause blood clotting disorders, tissue necrosis and hemolysis, and the release of a number of proinflammatory cytokines and impair antibody synthesis. Availability of antitoxins is limited and in the most cases supportive treatment is recommended. In turn, the venom of scorpions beside intestinal symptoms cause significant impairment of neuromuscular conduction, causing severe respiratory disorders. Action venom poses a particular threat to sensitive patients. The degree of threat to life caused by the venom of snakes and scorpions authorizes the treatment of these substances as a potential biological weapon. PMID:26449581

  18. Multisensor data fusion for IED threat detection

    NASA Astrophysics Data System (ADS)

    Mees, Wim; Heremans, Roel

    2012-10-01

    In this paper we present the multi-sensor registration and fusion algorithms that were developed for a force protection research project in order to detect threats against military patrol vehicles. The fusion is performed at object level, using a hierarchical evidence aggregation approach. It first uses expert domain knowledge about the features used to characterize the detected threats, that is implemented in the form of a fuzzy expert system. The next level consists in fusing intra-sensor and inter-sensor information. Here an ordered weighted averaging operator is used. The object level fusion between candidate threats that are detected asynchronously on a moving vehicle by sensors with different imaging geometries, requires an accurate sensor to world coordinate transformation. This image registration will also be discussed in this paper.

  19. Insider Threat Assessment: Model, Analysis and Tool

    NASA Astrophysics Data System (ADS)

    Chinchani, Ramkumar; Ha, Duc; Iyer, Anusha; Ngo, Hung Q.; Upadhyaya, Shambhu

    Insider threat is typically attributed to legitimate users who maliciously leverage their system privileges, and familiarity and proximity to their computational environment to compromise valuable information or inflict damage. According to the annual CSI/FBI surveys conducted since 1996, internal attacks and insider abuse form a significant portion of reported incidents. The strongest indication yet that insider threat is very real is given by the recent study [2] jointly conducted by CERT and the US Secret Service; the first of its kind, which provides an in-depth insight into the problem in a real-world setting. However, there is no known body of work which addresses this problem effectively. There are several challenges, beginning with understanding the threat.

  20. Environmental Health: Threats and their Interactions

    PubMed Central

    Holdstock, Douglas

    2008-01-01

    Improvements in the provision of an acceptable standard of health care, particularly in the developing world, will be undermined by three ongoing processes: ongoing armed conflicts; the threat of global warming due to rising levels of greenhouse gases, particularly carbon dioxide emitted by developed countries; and by rapidly rising populations. The key features of these three threats are summarised, and it is shown that interactions between them increase both the likelihood of their occurrence and the probable harm that they will cause. Some of the interactions are described, with ways of providing health care taking into account the threats and their interactions, and the paradox is emphasised that better health care in the developing world will further increase population growth followed by increased greenhouse gas emissions. Improved education for women and free and unlimited access to modern methods of contraception are vital. PMID:21572838

  1. Satellite Threat Warning and Attack Reporting

    SciTech Connect

    Hilland, D.; Phipps, G.; Jingle, C.; Newton, G.

    1997-12-31

    The Air Force Research Laboratory`s Satellite Threat Warning and Attack Reporting (STW/AR) program will provide technologies for advanced threat warning and reporting of radio frequency (RF) and laser threats. The STW/AR program objectives are: (a) develop cost- effective technologies to detect, identify, locate, characterize, and report attacks or interference against U.S. and Allied satellites. (b) demonstrate innovative, light-weight, low-power, laser and RF sensors. The program focuses on the demonstration of RF and laser sensors. The RF sensor effort includes the investigation of interferometric antenna arrays, multi-arm spiral and butler matrix antennas, wideband receivers, adaptive processors, and improved processing algorithms. The laser sensor effort includes the investigation of alternative detectors, broadband grating and optical designs, active pixel sensing, and improved processing algorithms.

  2. Weakly chiral networks and two-dimensional delocalized states in a weak magnetic field

    NASA Astrophysics Data System (ADS)

    Mkhitaryan, V. V.; Kagalovsky, V.; Raikh, M. E.

    2010-04-01

    We study numerically the localization properties of two-dimensional electrons in a weak perpendicular magnetic field. For this purpose we construct weakly chiral network models on the square and triangular lattices. The prime idea is to separate in space the regions with phase action of magnetic field, where it affects interference in course of multiple disorder scattering, and the regions with orbital action of magnetic field, where it bends electron trajectories. In our models, the disorder mixes counterpropagating channels on the links, while scattering matrices at the nodes describe exclusively the bending of electron trajectories. By artificially introducing a strong spread in the scattering strengths on the links (but keeping the average strength constant), we eliminate the interference and reduce the electron propagation over a network to a classical percolation problem. In this limit we establish the form of the disorder-magnetic field phase diagram. This diagram contains the regions with and without edge states, i.e., the regions with zero and quantized Hall conductivities. Taking into account that, for a given disorder, the scattering strength scales as inverse electron energy, we find agreement of our phase diagram with levitation scenario: energy separating the Anderson and quantum-Hall insulating phases floats up to infinity upon decreasing magnetic field. From numerical study, based on the analysis of quantum transmission of the network with random phases on the links, we conclude that the positions of the weak-field quantum-Hall transitions on the phase diagram are very close to our classical-percolation results. We checked that, in accord with the Pruisken theory, presence or absence of time-reversal symmetry on the links has no effect on the line of delocalization transitions. We also find that floating up of delocalized states in energy is accompanied by doubling of the critical exponent of the localization radius. We establish the origin of this doubling within classical-percolation analysis.

  3. From Extended Gravity with Torsion-Spin Coupling to Running Constant for Weak-Leptonic Forces

    NASA Astrophysics Data System (ADS)

    Fabbri, Luca

    2015-01-01

    In this paper we show how in the most natural extension of gravity with torsion, fermion fields are endowed with running coupling in spinorial interaction that are eventually shown to reproduce the strength and structure of the leptonic weak forces.

  4. Quadriceps muscle strength in scoliosis

    PubMed Central

    Swallow, E.B.; Barreiro, E.; Gosker, H.; Sathyapala, S.A.; Sanchez, F.; Hopkinson, N.S.; Moxham, J.; Schols, A.; Gea, J.; Polkey, M.I.

    2011-01-01

    Quadriceps muscle weakness is an important component of chronic obstructive pulmonary disease (COPD). We hypothesised that quadriceps weakness would also be a feature of restrictive lung disease due to scoliosis. We studied 10 patients with severe scoliosis (median (interquartile range (IQR)) forced expiratory volume in 1 s (FEV1) 35.3 (11)% predicted), 10 patients with severe COPD (FEV1 26.5 (9.0)% pred) and 10 healthy age-matched adults. We measured quadriceps strength, exercise capacity and analysed quadriceps muscle biopsies for myosin heavy-chain (MyHC) isoform expression and the presence of oxidative stress. Both groups exhibited quadriceps weakness with median (IQR) maximal voluntary contraction force being 46.0 (17.0) kg, 21.5 (21.0) kg and 31.5 (11.0) kg, respectively (p=0.02 and 0.04, respectively, for each patient group against controls). Oxidative stress was significantly greater in the quadriceps of both restrictive and COPD patients. The scoliosis patients exhibited a decrease in the proportion of MyHC type I compared with controls; median (IQR) 35.3 (18.5)% compared with 47.7 (9.3)%, p=0.028. The scoliosis patients also showed an increase in MyHC IIx (26.3 (15.5)% compared with 11.3 (13.0)%, p=0.01. Quadriceps weakness is a feature of severe scoliosis; the similarities between patients with scoliosis and patients with COPD suggest a common aetiology to quadriceps weakness in both conditions. PMID:19443534

  5. Bioterrorism threats: learning from inappropriate responses.

    PubMed

    Cole, L A

    2000-07-01

    Between April 1997 and June 1999, some 200 mailed or telephoned bioterrorism threats were received at a variety of locations. Usually claiming that anthrax had been released, the threats all proved to be hoaxes. In many instances, local emergency responders treated the more than 13,000 potential victims inappropriately, in particular requiring victims to strip and undergo decontamination with bleach solutions. Narratives of several incidents indicated that many victims were distressed and embarrassed by their treatment. Their experiences underscore the need for improved local response actions and the formulation of a uniform response protocol for public health agencies. PMID:10977619

  6. Climate change: how grave the threat?

    PubMed

    Montgomery, Hugh

    2009-08-01

    There is now no dispute about climate change: it is happening, and human activity is driving it. Each day, the threat this poses becomes clearer--threatening our civilisation and also the survival of our species. The immediacy of this threat is also now recognised: it is not something 'for the next millenium' but for our lifetimes and those of our children. Without urgent action, the future is grim. But we can all respond to make the difference. And the time to do so is now. PMID:19728499

  7. [Assessing adolescents with school massacre threats].

    PubMed

    Lindberg, Nina; Sailas, Eila; Kaltiala-Heino, Riittakerttu

    2013-01-01

    School massacres have increased pressure on health-care authorities for assessing risk for severe violence. In acute situations, threat analysis focuses at thought processes and actions of adolescents presenting threat of violence, in order to assess to which extent the adolescent has progressed from thoughts to actions. Because of great variability in aggressive behavior, separate interventions for individual, family and other developmental surroundings are often needed. Structured risk-assessment in special health care is aimed for conducting decision making towards risk reduction and adequate help for adolescents at risk. PMID:24069639

  8. Experimental investigations of weak definite and weak indefinite noun phrases

    PubMed Central

    Klein, Natalie M.; Gegg-Harrison, Whitney M.; Carlson, Greg N.; Tanenhaus, Michael K.

    2013-01-01

    Definite noun phrases typically refer to entities that are uniquely identifiable in the speaker and addressee’s common ground. Some definite noun phrases (e.g. the hospital in Mary had to go the hospital and John did too) seem to violate this uniqueness constraint. We report six experiments that were motivated by the hypothesis that these “weak definite” interpretations arise in “incorporated” constructions. Experiments 1-3 compared nouns that seem to allow for a weak definite interpretation (e.g. hospital, bank, bus, radio) with those that do not (e.g. farm, concert, car, book). Experiments 1 and 2 used an instruction-following task and picture-judgment task, respectively, to demonstrate that a weak definite need not uniquely refer. In Experiment 3 participants imagined scenarios described by sentences such as The Federal Express driver had to go to the hospital/farm. The imagined scenarios following weak definite noun phrases were more likely to include conventional activities associated with the object, whereas following regular nouns, participants were more likely to imagine scenarios that included typical activities associated with the subject; similar effects were observed with weak indefinites. Experiment 4 found that object-related activities were reduced when the same subject and object were used with a verb that does not license weak definite interpretations. In Experiment 5, a science fiction story introduced an artificial lexicon for novel concepts. Novel nouns that shared conceptual properties with English weak definite nouns were more likely to allow weak reference in a judgment task. Experiment 6 demonstrated that familiarity for definite articles and anti- familiarity for indefinite articles applies to the activity associated with the noun, consistent with predictions made by the incorporation analysis. PMID:23685208

  9. Experimental investigations of weak definite and weak indefinite noun phrases.

    PubMed

    Klein, Natalie M; Gegg-Harrison, Whitney M; Carlson, Greg N; Tanenhaus, Michael K

    2013-08-01

    Definite noun phrases typically refer to entities that are uniquely identifiable in the speaker and addressee's common ground. Some definite noun phrases (e.g., the hospital in Mary had to go the hospital and John did too) seem to violate this uniqueness constraint. We report six experiments that were motivated by the hypothesis that these "weak definite" interpretations arise in "incorporated" constructions. Experiments 1-3 compared nouns that seem to allow for a weak definite interpretation (e.g., hospital, bank, bus, radio) with those that do not (e.g., farm, concert, car, book). Experiments 1 and 2 used an instruction-following task and picture-judgment task, respectively, to demonstrate that a weak definite need not uniquely refer. In Experiment 3 participants imagined scenarios described by sentences such as The Federal Express driver had to go to the hospital/farm. Scenarios following weak definite noun phrases were more likely to include conventional activities associated with the object, whereas following regular nouns, participants were more likely to imagine scenarios that included typical activities associated with the subject; similar effects were observed with weak indefinites. Experiment 4 found that object-related activities were reduced when the same subject and object were used with a verb that does not license weak definite interpretations. In Experiment 5, a science fiction story introduced an artificial lexicon for novel concepts. Novel nouns that shared conceptual properties with English weak definite nouns were more likely to allow weak reference in a judgment task. Experiment 6 demonstrated that familiarity for definite articles and anti-familiarity for indefinite articles applies to the activity associated with the noun, consistent with predictions made by the incorporation analysis. PMID:23685208

  10. Weak-shock reflection factors

    SciTech Connect

    Reichenbach, H.; Kuhl, A.L.

    1993-09-07

    The purpose of this paper is to compare reflection factors for weak shocks from various surfaces, and to focus attention on some unsolved questions. Three different cases are considered: square-wave planar shock reflection from wedges; square-wave planar shock reflection from cylinders; and spherical blast wave reflection from a planar surface. We restrict ourselves to weak shocks. Shocks with a Mach number of M{sub O} < 1.56 in air or with an overpressure of {Delta}{sub PI} < 25 psi (1.66 bar) under normal ambient conditions are called weak.

  11. Weak interactions and presupernova evolution

    SciTech Connect

    Aufderheide, M.B. State Univ. of New York . Dept. of Physics)

    1991-02-19

    The role of weak interactions, particularly electron capture and {beta}{sup {minus}} decay, in presupernova evolution is discussed. The present uncertainty in these rates is examined and the possibility of improving the situation is addressed. 12 refs., 4 figs.

  12. Celebrate Strengths, Nurture Affinities: A Conversation with Mel Levine

    ERIC Educational Resources Information Center

    Scherer, Marge

    2006-01-01

    In this interview with "Educational Leadership," pediatrician Dr. Mel Levine, cofounder of "All Kinds of Minds," explains why students and educators should learn about eight neurodevelopmental functions that undergird our strengths and weaknesses. For the most part, he notes, adults who lead successful lives mobilize their strengths and compensate…

  13. Celebrate Strengths, Nurture Affinities: A Conversation with Mel Levine

    ERIC Educational Resources Information Center

    Scherer, Marge

    2006-01-01

    In this interview with "Educational Leadership," pediatrician Dr. Mel Levine, cofounder of "All Kinds of Minds," explains why students and educators should learn about eight neurodevelopmental functions that undergird our strengths and weaknesses. For the most part, he notes, adults who lead successful lives mobilize their strengths and compensate…

  14. Small Weakly Universal Turing Machines

    NASA Astrophysics Data System (ADS)

    Neary, Turlough; Woods, Damien

    We give small universal Turing machines with state-symbol pairs of (6,2), (3,3) and (2,4). These machines are weakly universal, which means that they have an infinitely repeated word to the left of their input and another to the right. They simulate Rule 110 and are currently the smallest known weakly universal Turing machines. Despite their small size these machines are efficient polynomial time simulators of Turing machines.

  15. Weak Deeply Virtual Compton Scattering

    SciTech Connect

    Ales Psaker; Wolodymyr Melnitchouk; Anatoly Radyushkin

    2007-03-01

    We extend the analysis of the deeply virtual Compton scattering process to the weak interaction sector in the generalized Bjorken limit. The virtual Compton scattering amplitudes for the weak neutral and charged currents are calculated at the leading twist within the framework of the nonlocal light-cone expansion via coordinate space QCD string operators. Using a simple model, we estimate cross sections for neutrino scattering off the nucleon, relevant for future high intensity neutrino beam facilities.

  16. Developing vaccines to counter bioterrorist threats.

    PubMed

    Altmann, Daniel M

    2005-06-01

    Large and innovative research programs are underway to define the immune parameters for vaccines against a wide array of pathogens considered to represent a potential bioterrorist threat. However, the development and utilization of such vaccines presents a number of predicaments that have not previously been addressed by the field of vaccinology. PMID:16026243

  17. Proliferation: Threat and response (November 1997)

    SciTech Connect

    1997-11-01

    Table of Contents: The Regional Proliferation Challenge; Northeast Asia; South Asia; The Middle East and North Africa; Russia, Ukraine, Kazakhstan, and Belarus; The Transnational Threat; Department of Defense Response; Prevention; Protection; Acquisition; DOD Capabilities to Respond to NBC Terrorism; Conclusion; Technical Annex; Further Reading; and Glossary.

  18. The Nature of the Terrorism Threat

    ERIC Educational Resources Information Center

    Goldstein, Evan R., Comp.

    2008-01-01

    This article describes how Bruce Hoffman and Marc Sageman, two prominent scholars of terrorism, square off over whether Al Qaeda remains the primary global terrorist threat. The dispute began in the pages of "Foreign Affairs," where Hoffman, a professor in the security-studies program at Georgetown University, wrote a withering review of Sageman's…

  19. Threats and countermeasures for network security

    NASA Technical Reports Server (NTRS)

    Denning, Peter J.

    1991-01-01

    In the late 1980's, the traditional threat of anonymous break-ins to networked computers was joined by viruses and worms, multiplicative surrogates that carry out the bidding of their authors. Technologies for authentication and secrecy, supplemented by good management practices, are the principal countermeasures. Four articles on these subjects are presented.

  20. Computer Security-Risks, Threats, and Safeguards.

    ERIC Educational Resources Information Center

    Ekhaml, Leticia

    2001-01-01

    Describes a variety of Internet threats to computers and networks used in schools. Discusses electronic trashing; clearing hard drives; cyber spying on Web sites visited; protection against cyber spying, including disposable email accounts; password sniffers; privacy policies; email snooping; email attachments that carry viruses; and hoaxes. (LRW)

  1. The Asteroid Impact Threat: Decisions Upcoming

    NASA Astrophysics Data System (ADS)

    Schweickart, Russell L.

    The asteroid impact threat has likely been constant for the past three billion years. What has accelerated is our knowledge of the impact hazard, and in particular the population of near- Earth objects (NEOs), those asteroids and near-Earth comets whose orbits approach or cross that of the Earth. In the next 10-15 years we will know the orbits of over 300,000 NEOs of a size capable of destroying a major city on impact. Based on current data 97 Given that a NEO deflection campaign can be initiated using existing space technology the international community will shortly be confronted with the decision of whether action should be taken, when it should be taken and who should take such action. The Association of Space Explorers (ASE)* and its Panel on Asteroid Threat Mitigation is currently concluding a two year process leading to a recommended decision program on asteroid threat mitigation that will be submitted to the United Nations in 2009. UN member states will soon be looking to the scientific community for their inputs on this matter. This presentation is intended to provide basic information on the NEO threat and our ability to take preventive action, anticipating an increasing demand for scientific opinion on this issue from international political institutions. (*) The Association of Space Explorers is the profession international organization of astronauts and cosmonauts. See www.space-explorers.org.

  2. Reactions to the Threat of Embarrassment.

    ERIC Educational Resources Information Center

    Miller, Rowland S.; Miller, Gale A.

    Embarrassment is an aversive state which occurs when the public image a person is trying to maintain during an interaction is abruptly discredited. When people are embarrassed, they try to salvage the situation by offering positive information about themselves to restore their endangered identities. To examine responses to the threat of impending…

  3. Diversity, Racial Threat and Metropolitan Housing Segregation

    ERIC Educational Resources Information Center

    DeFina, Robert; Hannon, Lance

    2009-01-01

    Previous studies have shown that as the percent black or percent Hispanic grows, that group's residential segregation from whites tends to increase as well. Typically, these findings are explained in terms of white discriminatory reaction to the perceived threat associated with minority population growth. The present analysis examines whether…

  4. The silent threat of low genetic diversity

    USGS Publications Warehouse

    Hunter, Margaret E.

    2013-01-01

    Across the Caribbean, protected coastal waters have served as primary feeding and breeding grounds for the endangered Antillean manatee. Unfortunately, these same coastal waters are also a popular “habitat” for humans. In the past, the overlap between human and manatee habitat allowed for manatee hunting and threatened the survival of these gentle marine mammals. Today, however, threats are much more inadvertent and are often related to coastal development, degraded habitats and boat strikes. In the state of Florida, decades of research on the species’ biological needs have helped conservationists address threats to its survival. For example, low wake zones and boater education have protected manatees from boat strikes, and many of their critical winter refuges are now protected. The Florida population has grown steadily, thus increasing from approximately 1,200 in 1991 to more than 5,000 in 2010. It is conceivable that in Florida manatees may one day be reclassified as “threatened” rather than “endangered.” Yet, in other parts of the Caribbean, threats still loom. This includes small, isolated manatee populations found on islands that can be more susceptible to extinction and lack of genetic diversity. To ensure the species’ long-term viability, scientists have turned their sights to the overall population dynamics of manatees throughout the Caribbean. Molecular genetics has provided new insights into long-term threats the species faces. Fortunately, the emerging field of conservation genetics provides managers with tools and strategies for protecting the species’ long-term viability.

  5. The Nature of the Terrorism Threat

    ERIC Educational Resources Information Center

    Goldstein, Evan R., Comp.

    2008-01-01

    This article describes how Bruce Hoffman and Marc Sageman, two prominent scholars of terrorism, square off over whether Al Qaeda remains the primary global terrorist threat. The dispute began in the pages of "Foreign Affairs," where Hoffman, a professor in the security-studies program at Georgetown University, wrote a withering review of Sageman's…

  6. Using the Threat Probability Task to Assess Anxiety and Fear During Uncertain and Certain Threat

    PubMed Central

    Korhumel, Rachel A.; Curtin, John J.

    2014-01-01

    Fear of certain threat and anxiety about uncertain threat are distinct emotions with unique behavioral, cognitive-attentional, and neuroanatomical components. Both anxiety and fear can be studied in the laboratory by measuring the potentiation of the startle reflex. The startle reflex is a defensive reflex that is potentiated when an organism is threatened and the need for defense is high. The startle reflex is assessed via electromyography (EMG) in the orbicularis oculi muscle elicited by brief, intense, bursts of acoustic white noise (i.e., “startle probes”). Startle potentiation is calculated as the increase in startle response magnitude during presentation of sets of visual threat cues that signal delivery of mild electric shock relative to sets of matched cues that signal the absence of shock (no-threat cues). In the Threat Probability Task, fear is measured via startle potentiation to high probability (100% cue-contingent shock; certain) threat cues whereas anxiety is measured via startle potentiation to low probability (20% cue-contingent shock; uncertain) threat cues. Measurement of startle potentiation during the Threat Probability Task provides an objective and easily implemented alternative to assessment of negative affect via self-report or other methods (e.g., neuroimaging) that may be inappropriate or impractical for some researchers. Startle potentiation has been studied rigorously in both animals (e.g., rodents, non-human primates) and humans which facilitates animal-to-human translational research. Startle potentiation during certain and uncertain threat provides an objective measure of negative affective and distinct emotional states (fear, anxiety) to use in research on psychopathology, substance use/abuse and broadly in affective science. As such, it has been used extensively by clinical scientists interested in psychopathology etiology and by affective scientists interested in individual differences in emotion. PMID:25285398

  7. Using the threat probability task to assess anxiety and fear during uncertain and certain threat.

    PubMed

    Bradford, Daniel E; Magruder, Katherine P; Korhumel, Rachel A; Curtin, John J

    2014-01-01

    Fear of certain threat and anxiety about uncertain threat are distinct emotions with unique behavioral, cognitive-attentional, and neuroanatomical components. Both anxiety and fear can be studied in the laboratory by measuring the potentiation of the startle reflex. The startle reflex is a defensive reflex that is potentiated when an organism is threatened and the need for defense is high. The startle reflex is assessed via electromyography (EMG) in the orbicularis oculi muscle elicited by brief, intense, bursts of acoustic white noise (i.e., "startle probes"). Startle potentiation is calculated as the increase in startle response magnitude during presentation of sets of visual threat cues that signal delivery of mild electric shock relative to sets of matched cues that signal the absence of shock (no-threat cues). In the Threat Probability Task, fear is measured via startle potentiation to high probability (100% cue-contingent shock; certain) threat cues whereas anxiety is measured via startle potentiation to low probability (20% cue-contingent shock; uncertain) threat cues. Measurement of startle potentiation during the Threat Probability Task provides an objective and easily implemented alternative to assessment of negative affect via self-report or other methods (e.g., neuroimaging) that may be inappropriate or impractical for some researchers. Startle potentiation has been studied rigorously in both animals (e.g., rodents, non-human primates) and humans which facilitates animal-to-human translational research. Startle potentiation during certain and uncertain threat provides an objective measure of negative affective and distinct emotional states (fear, anxiety) to use in research on psychopathology, substance use/abuse and broadly in affective science. As such, it has been used extensively by clinical scientists interested in psychopathology etiology and by affective scientists interested in individual differences in emotion. PMID:25285398

  8. Experimental evidence of threat-sensitive collective avoidance responses in a large wild-caught herring school.

    PubMed

    Rieucau, Guillaume; Boswell, Kevin M; De Robertis, Alex; Macaulay, Gavin J; Handegard, Nils Olav

    2014-01-01

    Aggregation is commonly thought to improve animals' security. Within aquatic ecosystems, group-living prey can learn about immediate threats using cues perceived directly from predators, or from collective behaviours, for example, by reacting to the escape behaviours of companions. Combining cues from different modalities may improve the accuracy of prey antipredatory decisions. In this study, we explored the sensory modalities that mediate collective antipredatory responses of herring (Clupea harengus) when in a large school (approximately 60,000 individuals). By conducting a simulated predator encounter experiment in a semi-controlled environment (a sea cage), we tested the hypothesis that the collective responses of herring are threat-sensitive. We investigated whether cues from potential threats obtained visually or from the perception of water displacement, used independently or in an additive way, affected the strength of the collective avoidance reactions. We modified the sensory nature of the simulated threat by exposing the herring to 4 predator models differing in shape and transparency. The collective vertical avoidance response was observed and quantified using active acoustics. The combination of sensory cues elicited the strongest avoidance reactions, suggesting that collective antipredator responses in herring are mediated by the sensory modalities involved during threat detection in an additive fashion. Thus, this study provides evidence for magnitude-graded threat responses in a large school of wild-caught herring which is consistent with the "threat-sensitive hypothesis". PMID:24489778

  9. Experimental Evidence of Threat-Sensitive Collective Avoidance Responses in a Large Wild-Caught Herring School

    PubMed Central

    Rieucau, Guillaume; Boswell, Kevin M.; De Robertis, Alex; Macaulay, Gavin J.; Handegard, Nils Olav

    2014-01-01

    Aggregation is commonly thought to improve animals' security. Within aquatic ecosystems, group-living prey can learn about immediate threats using cues perceived directly from predators, or from collective behaviours, for example, by reacting to the escape behaviours of companions. Combining cues from different modalities may improve the accuracy of prey antipredatory decisions. In this study, we explored the sensory modalities that mediate collective antipredatory responses of herring (Clupea harengus) when in a large school (approximately 60 000 individuals). By conducting a simulated predator encounter experiment in a semi-controlled environment (a sea cage), we tested the hypothesis that the collective responses of herring are threat-sensitive. We investigated whether cues from potential threats obtained visually or from the perception of water displacement, used independently or in an additive way, affected the strength of the collective avoidance reactions. We modified the sensory nature of the simulated threat by exposing the herring to 4 predator models differing in shape and transparency. The collective vertical avoidance response was observed and quantified using active acoustics. The combination of sensory cues elicited the strongest avoidance reactions, suggesting that collective antipredator responses in herring are mediated by the sensory modalities involved during threat detection in an additive fashion. Thus, this study provides evidence for magnitude-graded threat responses in a large school of wild-caught herring which is consistent with the “threat-sensitive hypothesis”. PMID:24489778

  10. Precision metrology using weak measurements.

    PubMed

    Zhang, Lijian; Datta, Animesh; Walmsley, Ian A

    2015-05-29

    Weak values and measurements have been proposed as a means to achieve dramatic enhancements in metrology based on the greatly increased range of possible measurement outcomes. Unfortunately, the very large values of measurement outcomes occur with highly suppressed probabilities. This raises three vital questions in weak-measurement-based metrology. Namely, (Q1) Does postselection enhance the measurement precision? (Q2) Does weak measurement offer better precision than strong measurement? (Q3) Is it possible to beat the standard quantum limit or to achieve the Heisenberg limit with weak measurement using only classical resources? We analyze these questions for two prototypical, and generic, measurement protocols and show that while the answers to the first two questions are negative for both protocols, the answer to the last is affirmative for measurements with phase-space interactions, and negative for configuration space interactions. Our results, particularly the ability of weak measurements to perform at par with strong measurements in some cases, are instructive for the design of weak-measurement-based protocols for quantum metrology. PMID:26066422

  11. Precision Metrology Using Weak Measurements

    NASA Astrophysics Data System (ADS)

    Zhang, Lijian; Datta, Animesh; Walmsley, Ian A.

    2015-05-01

    Weak values and measurements have been proposed as a means to achieve dramatic enhancements in metrology based on the greatly increased range of possible measurement outcomes. Unfortunately, the very large values of measurement outcomes occur with highly suppressed probabilities. This raises three vital questions in weak-measurement-based metrology. Namely, (Q1) Does postselection enhance the measurement precision? (Q2) Does weak measurement offer better precision than strong measurement? (Q3) Is it possible to beat the standard quantum limit or to achieve the Heisenberg limit with weak measurement using only classical resources? We analyze these questions for two prototypical, and generic, measurement protocols and show that while the answers to the first two questions are negative for both protocols, the answer to the last is affirmative for measurements with phase-space interactions, and negative for configuration space interactions. Our results, particularly the ability of weak measurements to perform at par with strong measurements in some cases, are instructive for the design of weak-measurement-based protocols for quantum metrology.

  12. Controlling of Entropic Uncertainty in Qubits System Under the Generalized Amplitude Damping Channel via Weak Measurements

    NASA Astrophysics Data System (ADS)

    Zhang, Shi-Yang; Fang, Mao-Fa; Yu, Min

    2016-03-01

    We study the effect of weak measurements on the entropic uncertainty in two-qubit system under the generalized amplitude damping channel. Our results show that, the entropic uncertainty in qubits system can be reduced under weak measurements by choosing appropriate measuring strength, which provides a new method to break through the restriction of uncertainty relation in quantum mechanics.

  13. Controlling of Entropic Uncertainty in Qubits System Under the Generalized Amplitude Damping Channel via Weak Measurements

    NASA Astrophysics Data System (ADS)

    Zhang, Shi-Yang; Fang, Mao-Fa; Yu, Min

    2015-10-01

    We study the effect of weak measurements on the entropic uncertainty in two-qubit system under the generalized amplitude damping channel. Our results show that, the entropic uncertainty in qubits system can be reduced under weak measurements by choosing appropriate measuring strength, which provides a new method to break through the restriction of uncertainty relation in quantum mechanics.

  14. Insider Threat - Material Control and Accountability Mitigation

    SciTech Connect

    Powell, Danny H; Elwood Jr, Robert H; Roche, Charles T

    2011-01-01

    The technical objectives of nuclear safeguards are (1) the timely detection of diversion of significant quantities of nuclear material from peaceful uses to the manufacture of nuclear weapons or other nuclear explosive devices or for purposes unknown and (2) the deterrence of such diversion by the risk of early detection. The safeguards and security program must address both outsider threats and insider threats. Outsider threats are primarily addressed by the physical protection system. Insider threats can be any level of personnel at the site including passive or active insiders that could attempt protracted or abrupt diversion. This could occur by an individual acting alone or by collusion between an individual with material control and accountability (MC&A) responsibilities and another individual who has responsibility or control within both the physical protection and the MC&A systems. The insider threat is one that must be understood and incorporated into the safeguards posture. There have been more than 18 documented cases of theft or loss of plutonium or highly enriched uranium. The insider has access, authority, and knowledge, as well as a set of attributes, that make him/her difficult to detect. An integrated safeguards program is designed as a defense-in-depth system that seeks to prevent the unauthorized removal of nuclear material, to provide early detection of any unauthorized attempt to remove nuclear material, and to rapidly respond to any attempted removal of nuclear material. The program is also designed to support protection against sabotage, espionage, unauthorized access, compromise, and other hostile acts that may cause unacceptable adverse impacts on national security, program continuity, the health and safety of employees, the public, or the environment. Nuclear MC&A play an essential role in the capabilities of an integrated safeguards system to deter and detect theft or diversion of nuclear material. An integrated safeguards system with compensating mitigation can decrease the risk of an insider performing a malicious act without detection.

  15. Dipolar Bose gas in a weak isotropic speckle disorder

    NASA Astrophysics Data System (ADS)

    Boudjemâa, Abdelâali

    2015-05-01

    We investigate the properties of a homogeneous dipolar Bose gas in a weak three-dimensional isotropic speckle disorder at finite temperatures. By using the Bogoliubov theory (beyond the mean field), we calculate the condensate and the superfluid fractions as a function of density and strengths of disorder and interaction. The disorder impact on the anomalous density, the chemical potential, and the ground-state energy is also analyzed. We show that the peculiar interplay of the dipole-dipole interaction and weak disorder makes the superfluid fraction and sound velocity anisotropic.

  16. Conformational transitions of a weak polyampholyte

    NASA Astrophysics Data System (ADS)

    Narayanan Nair, Arun Kumar; Uyaver, Sahin; Sun, Shuyu

    2014-10-01

    Using grand canonical Monte Carlo simulations of a flexible polyelectrolyte where the charges are in contact with a reservoir of constant chemical potential given by the solution pH, we study the behavior of weak polyelectrolytes in poor and good solvent conditions for polymer backbone. We address the titration behavior and conformational properties of a flexible diblock polyampholyte chain formed of two oppositely charged weak polyelectrolyte blocks, each containing equal number of identical monomers. The change of solution pH induces charge asymmetry in a diblock polyampholyte. For diblock polyampholyte chains in poor solvents, we demonstrate that a discontinuous transition between extended (tadpole) and collapsed (globular) conformational states is attainable by varying the solution pH. The double-minima structure in the probability distribution of the free energy provides direct evidence for the first-order like nature of this transition. At the isoelectric point electrostatically driven coil-globule transition of diblock polyampholytes in good solvents is found to consist of different regimes identified with increasing electrostatic interaction strength. At pH values above or below the isoelectric point diblock chains are found to have polyelectrolyte-like behavior due to repulsion between uncompensated charges along the chain.

  17. Weak Energy: Form and Function

    NASA Astrophysics Data System (ADS)

    Parks, Allen D.

    The equation of motion for a time-dependent weak value of a quantum mechanical observable contains a complex valued energy factor—the weak energy of evolution. This quantity is defined by the dynamics of the pre-selected and post-selected states which specify the observable's weak value. It is shown that this energy: (i) is manifested as dynamical and geometric phases that govern the evolution of the weak value during the measurement process; (ii) satisfies the Euler-Lagrange equations when expressed in terms of Pancharatnam (P) phase and Fubini-Study (FS) metric distance; (iii) provides for a PFS stationary action principle for quantum state evolution; (iv) time translates correlation amplitudes; (v) generalizes the temporal persistence of state normalization; and (vi) obeys a time-energy uncertainty relation. A similar complex valued quantity—the pointed weak energy of an evolving quantum state—is also defined and several of its properties in PFS coordinates are discussed. It is shown that the imaginary part of the pointed weak energy governs the state's survival probability and its real part is—to within a sign—the Mukunda-Simon geometric phase for arbitrary evolutions or the Aharonov-Anandan (AA) geometric phase for cyclic evolutions. Pointed weak energy gauge transformations and the PFS 1-form are defined and discussed and the relationship between the PFS 1-form and the AA connection 1-form is established. [Editors note: for a video of the talk given by Prof. Parks at the Aharonov-80 conference in 2012 at Chapman University, see http://quantum.chapman.edu/talk-25.

  18. Time course of threat responding in panic disorder and depression.

    PubMed

    Gorka, Stephanie M; Liu, Huiting; Sarapas, Casey; Shankman, Stewart A

    2015-10-01

    Heightened sensitivity to threat is a characteristic feature of panic disorder (PD). It is also a factor that is considered to be central to PD but not major depressive disorder (MDD) – a related disorder that commonly co-occurs with PD. However, sensitivity to threat is a broad construct and it is unclear whether individuals with PD exhibit heightened initial threat reactivity, impairments in modulating their threat responding over time, or both. It is also unclear how these different facets of threat responding apply to predictable and/or unpredictable threat. The aim of the current study was to examine whether there are differences in initial threat reactivity and the time course of threat responding during predictable and unpredictable threat-of-shock in 186 adults with: 1) current PD and no history of depression (i.e., PD-only), 2) current MDD and no history of an anxiety disorder (i.e., MDD-only), 3) current comorbid PD and MDD, or 4) no lifetime history of psychopathology (i.e., controls). Threat responding was assessed using an electromyography startle paradigm. Relative to controls, individuals in the three psychopathology groups exhibited heightened initial threat reactivity to predictable and unpredictable threat and did not differ from each other. Multilevel mixed model analyses indicated that those with PD evidenced less of a decline over time in startle responding during unpredictable threat relative to those without PD. Those with MDD displayed a greater slope of decline in startle responding during predictable threat compared with those without MDD. The pattern of results suggests that there may be conceptual differences between measures of initial threat reactivity and time course of threat responding. Moreover, time course of threat responding, not initial threat reactivity, may differentiate PD from MDD. PMID:26168883

  19. Effective Teaching Strategies for Gifted/Learning-Disabled Students with Spatial Strengths

    ERIC Educational Resources Information Center

    Mann, Rebecca L.

    2006-01-01

    This study sought to determine effective teaching strategies for use with high-ability students who have spatial strengths and sequential weaknesses. Gifted students with spatial strengths and weak verbal skills often struggle in the traditional classroom. Their learning style enables them to grasp complex systems and excel at higher levels of…

  20. Corticospinal Tract Abnormalities Are Associated with Weakness in Multiple Sclerosis

    PubMed Central

    Reich, Daniel S.; Zackowski, Kathleen M.; Gordon-Lipkin, Eliza M.; Smith, Seth A.; Chodkowski, BettyAnn A.; Cutter, Gary R.; Calabresi, Peter A.

    2009-01-01

    Background and Purpose To assess the relationship between muscle strength in multiple sclerosis (MS) and corticospinal tract (CST) abnormalities detected with multimodality magnetic resonance imaging (MRI) of the brain. Methods In 47 individuals with MS, diffusion tensor imaging (DTI) at 3T was used to reconstruct the intracranial CSTs. Tract profiles depicted the variation in T2 relaxation time, magnetization transfer ratio, and DTI-derived indices (fractional anisotropy and diffusivity) as a function of normalized position along the tract. Brain parenchymal fraction was calculated as a normalized measure of brain volume. Stepwise linear regression modeling was used to determine the MRI indices most closely related to ankle dorsiflexion and hip flexion strength assessed with quantitative dynamometry. Results Individuals with MS were significantly weak: average ankle strength fell 1.7 standard deviations below the age-, handedness-, and sex-corrected healthy mean. Brain parenchymal fraction was not associated with weakness. A parsimonious model that includes magnetization transfer ratio in the brainstem and MS clinical subtype explained 30% to 45% of the variance in ankle and hip strength. The model was successfully applied to scans and strength data from the same individuals at an earlier time point. Conclusion MRI abnormalities specific to the motor tract are associated with clinical dysfunction related to that tract. The relevant abnormalities are found in the brainstem, distant from the periventricular inflammatory lesions that are common in MS. This suggests that neurodegeneration, rather than primary inflammation, at least partially explains the findings. PMID:17974617

  1. Monopole Strength Function of Deformed Superfluid Nuclei

    SciTech Connect

    Stoitsov, M. V.; Kortelainen, E. M.; Nakatsukasa, T.; Losa, C.; Nazarewicz, Witold

    2011-01-01

    We present an efficient method for calculating strength functions using the finite amplitude method (FAM) for deformed superfluid heavy nuclei within the framework of the nuclear density functional theory. We demonstrate that FAM reproduces strength functions obtained with the fully self-consistent quasi-particle random-phase approximation (QRPA) at a fraction of computational cost. As a demonstration, we compute the isoscalar and isovector monopole strength for strongly deformed configurations in ^{240}Pu by considering huge quasi-particle QRPA spaces. Our approach to FAM, based on Broyden's iterative procedure, opens the possibility for large-scale calculations of strength distributions in well-bound and weakly bound nuclei across the nuclear landscape.

  2. Weakness

    MedlinePLUS

    ... many different body systems, such as the following: METABOLIC Addison disease Hyperparathyroidism Low sodium or potassium Thyrotoxicosis BRAIN/NERVOUS SYSTEM (NEUROLOGIC) Amyotrophic lateral sclerosis (ALS) Bell palsy Cerebral ...

  3. Weak Selection and Protein Evolution

    PubMed Central

    Akashi, Hiroshi; Osada, Naoki; Ohta, Tomoko

    2012-01-01

    The “nearly neutral” theory of molecular evolution proposes that many features of genomes arise from the interaction of three weak evolutionary forces: mutation, genetic drift, and natural selection acting at its limit of efficacy. Such forces generally have little impact on allele frequencies within populations from generation to generation but can have substantial effects on long-term evolution. The evolutionary dynamics of weakly selected mutations are highly sensitive to population size, and near neutrality was initially proposed as an adjustment to the neutral theory to account for general patterns in available protein and DNA variation data. Here, we review the motivation for the nearly neutral theory, discuss the structure of the model and its predictions, and evaluate current empirical support for interactions among weak evolutionary forces in protein evolution. Near neutrality may be a prevalent mode of evolution across a range of functional categories of mutations and taxa. However, multiple evolutionary mechanisms (including adaptive evolution, linked selection, changes in fitness-effect distributions, and weak selection) can often explain the same patterns of genome variation. Strong parameter sensitivity remains a limitation of the nearly neutral model, and we discuss concave fitness functions as a plausible underlying basis for weak selection. PMID:22964835

  4. On weak lensing shape noise

    NASA Astrophysics Data System (ADS)

    Niemi, Sami-Matias; Kitching, Thomas D.; Cropper, Mark

    2015-12-01

    One of the most powerful techniques to study the dark sector of the Universe is weak gravitational lensing. In practice, to infer the reduced shear, weak lensing measures galaxy shapes, which are the consequence of both the intrinsic ellipticity of the sources and of the integrated gravitational lensing effect along the line of sight. Hence, a very large number of galaxies is required in order to average over their individual properties and to isolate the weak lensing cosmic shear signal. If this `shape noise' can be reduced, significant advances in the power of a weak lensing surveys can be expected. This paper describes a general method for extracting the probability distributions of parameters from catalogues of data using Voronoi cells, which has several applications, and has synergies with Bayesian hierarchical modelling approaches. This allows us to construct a probability distribution for the variance of the intrinsic ellipticity as a function of galaxy property using only photometric data, allowing a reduction of shape noise. As a proof of concept the method is applied to the CFHTLenS survey data. We use this approach to investigate trends of galaxy properties in the data and apply this to the case of weak lensing power spectra.

  5. Eldercare at Home: Bone Weakness

    MedlinePLUS

    ... osteoporosis. Warning signs of osteoporosis include loss of height or a stooped posture. However, most people are ... break another bone. Response There is evidence that balance and strength training has helped reduce injurious. Ask ...

  6. Flexibility and Muscular Strength.

    ERIC Educational Resources Information Center

    Liemohn, Wendell

    1988-01-01

    This definition of flexibility and muscular strength also explores their roles in overall physical fitness and focuses on how increased flexibility and muscular strength can help decrease or eliminate lower back pain. (CB)

  7. Growth and decay of weak shock waves in magnetogasdynamics

    NASA Astrophysics Data System (ADS)

    Singh, L. P.; Singh, D. B.; Ram, S. D.

    2015-12-01

    The purpose of the present study is to investigate the problem of the propagation of weak shock waves in an inviscid, electrically conducting fluid under the influence of a magnetic field. The analysis assumes the following two cases: (1) a planar flow with a uniform transverse magnetic field and (2) cylindrically symmetric flow with a uniform axial or varying azimuthal magnetic field. A system of two coupled nonlinear transport equations, governing the strength of a shock wave and the first-order discontinuity induced behind it, are derived that admit a solution that agrees with the classical decay laws for a weak shock. An analytic expression for the determination of the shock formation distance is obtained. How the magnetic field strength, whether axial or azimuthal, influences the shock formation is also assessed.

  8. Countering laser pointer threats to road safety

    NASA Astrophysics Data System (ADS)

    Svensson, Sören; Björkert, Stefan; Kariis, Hans; Lopes, Cesar

    2006-09-01

    The market demand for bright laser pointers has led to the development of readily available devices that can pose a threat to road safety. Laser pointers can be involved in accidents caused by laser users who do not realise the dangers involved, but laser pointers can also enable deliberate criminal activity. There are technologies available that can counter the threat in different ways. A number of protective principles are outlined below. Some technologies built upon Liquid Crystal Devices are described in greater detail. Without any knowledge of what laser pointers a potential aggressor has access to, a frequency agile filter seems to be the most promising way to avoid the most severe consequences of dazzle from laser pointers. Protective systems incorporating suitable glasses or visors holding frequency agile filters of this kind however, are not commercially available today.

  9. The Concept of Identification in Threat Assessment.

    PubMed

    Meloy, J Reid; Mohandie, Kris; Knoll, James L; Hoffmann, Jens

    2015-06-01

    Identification is one of eight warning behaviors--superordinate patterns of accelerating risk--that are theorized to correlate with targeted violence, and have some empirical validation. It is characterized by one or more of five characteristics: pseudo-commando behavior, evidence of a warrior mentality, a close association with weapons or other military or law enforcement paraphernalia, wanting to imitate and often surmount previous attackers or assassins, or believing oneself to be an agent to advance a particular cause or belief system. The authors briefly explore the history of the psychology of identification, its current usage, and its application to threat assessment. Four cases are used to illustrate identification as both a process and a product, and a likely motive for targeted violence in some subjects. Its operational relevance for threat assessment is suggested. PMID:25728417

  10. Detecting underwater improvised explosive threats (DUIET)

    NASA Astrophysics Data System (ADS)

    Feeley, Terry

    2010-04-01

    Improvised Explosive Devices (IEDs) have presented a major threat in the wars in Afghanistan and Iraq. These devices are powerful homemade land mines that can be small and easily hidden near roadsides. They are then remotely detonated when Coalition Forces pass by either singly or in convoys. Their rapid detection, classification and destruction is key to the safety of troops in the area. These land based bombs will have an analogue in the underwater theater especially in ports, lakes, rivers and streams. These devices may be used against Americans on American soil as an element of the global war on terrorism (GWOT) Rapid detection and classification of underwater improvised explosive devices (UIED) is critical to protecting innocent lives and maintaining the day to day flow of commerce. This paper will discuss a strategy and tool set to deal with this potential threat.

  11. Securing Infrastructure from High Explosive Threats

    SciTech Connect

    Glascoe, L; Noble, C; Reynolds, J; Kuhl, A; Morris, J

    2009-03-20

    Lawrence Livermore National Laboratory (LLNL) is working with the Department of Homeland Security's Science and Technology Directorate, the Transportation Security Administration, and several infrastructure partners to characterize and help mitigate principal structural vulnerabilities to explosive threats. Given the importance of infrastructure to the nation's security and economy, there is a clear need for applied research and analyses (1) to improve understanding of the vulnerabilities of these systems to explosive threats and (2) to provide decision makers with time-critical technical assistance concerning countermeasure and mitigation options. Fully-coupled high performance calculations of structural response to ideal and non-ideal explosives help bound and quantify specific critical vulnerabilities, and help identify possible corrective schemes. Experimental validation of modeling approaches and methodologies builds confidence in the prediction, while advanced stochastic techniques allow for optimal use of scarce computational resources to efficiently provide infrastructure owners and decision makers with timely analyses.

  12. Insider Threat and Information Security Management

    NASA Astrophysics Data System (ADS)

    Coles-Kemp, Lizzie; Theoharidou, Marianthi

    The notion of insider has multiple facets. An organization needs to identify which ones to respond to. The selection, implementetion and maintenance of information security countermeasures requires a complex combination of organisational policies, functions and processes, which form Information Security Management. This chapter examines the role of current information security management practices in addressing the insider threat. Most approaches focus on frameworks for regulating insider behaviour and do not allow for the various cultural responses to the regulatory and compliance framework. Such responses are not only determined by enforcement of policies and awareness programs, but also by various psychological and organisational factors at an individual or group level. Crime theories offer techniques that focus on such cultural responses and can be used to enhance the information security management design. The chapter examines the applicability of several crime theories and concludes that they can contribute in providing additional controls and redesign of information security management processes better suited to responding to the insider threat.

  13. Current nuclear threats and possible responses

    NASA Astrophysics Data System (ADS)

    Lamb, Frederick K.

    2005-04-01

    Over the last 50 years, the United States has spent more than 100 billion developing and building a variety of systems intended to defend its territory against intercontinental-range ballistic missiles. Most of these systems never became operational and ultimately all were judged ineffective. The United States is currently spending about 10 billion per year developing technologies and systems intended to defend against missiles that might be acquired in the future by North Korea or Iran. This presentation will discuss these efforts ad whether they are likely to be more effective than those of the past. It will also discuss the proper role of anti-ballistic programs at a time when the threat of a nuclear attack on the U.S. by terrorists armed with nuclear weapons is thought to be much higher than the threat of an attack by nuclear-armed ballistic missles.

  14. Cosmology and the weak interaction

    NASA Technical Reports Server (NTRS)

    Schramm, David N.

    1989-01-01

    The weak interaction plays a critical role in modern Big Bang cosmology. Two of its most publicized comological connections are emphasized: big bang nucleosynthesis and dark matter. The first of these is connected to the cosmological prediction of neutrine flavors, N(sub nu) is approximately 3 which in now being confirmed. The second is interrelated to the whole problem of galacty and structure formation in the universe. The role of the weak interaction both for dark matter candidates and for the problem of generating seeds to form structure is demonstrated.

  15. Cosmology and the weak interaction

    SciTech Connect

    Schramm, D.N. ):)

    1989-12-01

    The weak interaction plays a critical role in modern Big Bang cosmology. This review will emphasize two of its most publicized cosmological connections: Big Bang nucleosynthesis and Dark Matter. The first of these is connected to the cosmological prediction of Neutrino Flavours, N{sub {nu}} {approximately} 3 which is now being confirmed at SLC and LEP. The second is interrelated to the whole problem of galaxy and structure formation in the universe. This review will demonstrate the role of the weak interaction both for dark matter candidates and for the problem of generating seeds to form structure. 87 refs., 3 figs., 5 tabs.

  16. Nonproliferation, Nuclear Security, and the Insider Threat

    SciTech Connect

    Balatsky, Galya I.; Duggan, Ruth

    2012-07-12

    Insider threat concept is evolving and getting more attention: (1) Domestically, internationally and in foreign countries, (2) At the government, academia, and industry levels, and (3) Public awareness and concerns are also growing. Negligence can be an insider's action. Technology advancements provide more opportunities, new tools for the insider. Our understanding of the insider is shaped by our cultural, social and ethnic perceptions and traditions. They also can limit our recognition of the issues and response actions.

  17. Viral haemorrhagic fevers: current status, future threats.

    PubMed

    Speed, B R; Gerrard, M P; Kennett, M L; Catton, M G; Harvey, B M

    1996-01-15

    In developing countries, the major outbreaks of viral haemorrhagic fevers such as Marburg, Ebola and Lassa fever viruses have been nosocomially spread. The high mortality and absence of specific treatment have had a devastating effect. Epidemics of this highly contagious disease remain a constant threat to Australia and, as a result, carefully planned laboratory and public health strategies and clinical infection control measures have been instituted for the management of suspected cases. PMID:8569577

  18. Matrix Characterization in Threat Material Detection Processes

    NASA Astrophysics Data System (ADS)

    Obhodas, J.; Sudac, D.; Valkovic, V.

    2009-03-01

    Matrix characterization in the threat material detection is of utmost importance, it generates the background against which the threat material signal has to be identified. Threat materials (explosive, chemical warfare, …) are usually contained within small volume inside large volumes of variable matrices. We have studied the influence of matrix materials on the capability of neutron systems to identify hidden threat material. Three specific scenarios are considered in some details: case 1—contraband material in the sea containers, case 2—-explosives in soil (landmines), case 3—explosives and chemical warfare on the sea bottom. Effects of container cargo material on tagged neutron system are seen in the increase of gamma background and the decrease of neutron beam intensity. Detection of landmines is more complex because of variable soil properties. We have studied in detail space and time variations of soil elemental compositions and in particular hydrogen content (humidity). Of special interest are ammunitions and chemical warfare on the sea bottom, damping sites and leftovers from previous conflicts (WW-I, WW-II and local). In this case sea sediment is background source and its role is similar to the role of the soil in the landmine detection. In addition to geochemical cycling of chemical elements in semi-enclosed sea, like the Adriatic Sea, one has to consider also anthropogenic influence, especially when studying small scale variations in concentration levels. Some preliminary experimental results obtained with tagged neutron sensor inside an underwater vehicle are presented as well as data on sediment characterization by X-Ray Fluorescence.

  19. Matrix Characterization in Threat Material Detection Processes

    SciTech Connect

    Obhodas, J.; Sudac, D.; Valkovic, V.

    2009-03-10

    Matrix characterization in the threat material detection is of utmost importance, it generates the background against which the threat material signal has to be identified. Threat materials (explosive, chemical warfare, ...) are usually contained within small volume inside large volumes of variable matrices. We have studied the influence of matrix materials on the capability of neutron systems to identify hidden threat material. Three specific scenarios are considered in some details: case 1--contraband material in the sea containers, case 2 - explosives in soil (landmines), case 3 - explosives and chemical warfare on the sea bottom. Effects of container cargo material on tagged neutron system are seen in the increase of gamma background and the decrease of neutron beam intensity. Detection of landmines is more complex because of variable soil properties. We have studied in detail space and time variations of soil elemental compositions and in particular hydrogen content (humidity). Of special interest are ammunitions and chemical warfare on the sea bottom, damping sites and leftovers from previous conflicts (WW-I, WW-II and local). In this case sea sediment is background source and its role is similar to the role of the soil in the landmine detection. In addition to geochemical cycling of chemical elements in semi-enclosed sea, like the Adriatic Sea, one has to consider also anthropogenic influence, especially when studying small scale variations in concentration levels. Some preliminary experimental results obtained with tagged neutron sensor inside an underwater vehicle are presented as well as data on sediment characterization by X-Ray Fluorescence.

  20. Strength Training for Girls.

    ERIC Educational Resources Information Center

    Connaughton, Daniel; Connaughton, Angela; Poor, Linda

    2001-01-01

    Strength training can be fun, safe, and appropriate for young girls and women and is an important component of any fitness program when combined with appropriate cardiovascular and flexibility activities. Concerns and misconceptions regarding girls' strength training are discussed, presenting general principles of strength training for children…

  1. Cyber threat model for tactical radio networks

    NASA Astrophysics Data System (ADS)

    Kurdziel, Michael T.

    2014-05-01

    The shift to a full information-centric paradigm in the battlefield has allowed ConOps to be developed that are only possible using modern network communications systems. Securing these Tactical Networks without impacting their capabilities has been a challenge. Tactical networks with fixed infrastructure have similar vulnerabilities to their commercial counterparts (although they need to be secure against adversaries with greater capabilities, resources and motivation). However, networks with mobile infrastructure components and Mobile Ad hoc Networks (MANets) have additional unique vulnerabilities that must be considered. It is useful to examine Tactical Network based ConOps and use them to construct a threat model and baseline cyber security requirements for Tactical Networks with fixed infrastructure, mobile infrastructure and/or ad hoc modes of operation. This paper will present an introduction to threat model assessment. A definition and detailed discussion of a Tactical Network threat model is also presented. Finally, the model is used to derive baseline requirements that can be used to design or evaluate a cyber security solution that can be scaled and adapted to the needs of specific deployments.

  2. Bot armies as threats to network security

    NASA Astrophysics Data System (ADS)

    Banks, Sheila B.; Stytz, Martin R.

    2007-04-01

    "Botnets", or "bot armies", are large groups of remotely controlled malicious software. Bot armies pose one of the most serious security threats to all networks. Botnets, remotely controlled and operated by botmasters or botherders, can launch massive denial of service attacks, multiple penetration attacks, or any other malicious network activity on a massive scale. While bot army activity has, in the past, been limited to fraud, blackmail, and other forms of criminal activity, their potential for causing large-scale damage to the entire internet; for launching large-scale, coordinated attacks on government computers and networks; and for large-scale, coordinated data gathering from thousands of users and computers on any network has been underestimated. This paper will not discuss how to build bots but the threats they pose. In a "botnet" or "bot army", computers can be used to spread spam, launch denial-of-service attacks against Web sites, conduct fraudulent activities, and prevent authorized network traffic from traversing the network. In this paper we discuss botnets and the technologies that underlie this threat to network and computer security. The first section motivates the need for improved protection against botnets, their technologies, and for further research about botnets. The second contains background information about bot armies and their key underlying technologies. The third section presents a discussion of the types of attacks that botnets can conduct and potential defenses against them. The fourth section contains a summary and suggestions for future research and development.

  3. Stereotype Threat Reinterpreted as a Regulatory Mismatch

    PubMed Central

    Grimm, Lisa R.; Markman, Arthur B.; Maddox, W. Todd; Baldwin, Grant C.

    2008-01-01

    Research documents performance decrements resulting from the activation of a negative task-relevant stereotype. We combine a number of strands of work to identify causes of stereotype threat in a way that allows us to reverse the effects and improve the performance of individuals with negative task-relevant stereotypes. We draw on prior work suggesting that negative stereotypes induce a prevention focus, and other research suggesting that people exhibit greater flexibility when their regulatory focus matches the reward structure of the task. This work suggests that stereotype threat effects emerge from a prevention focus combined with tasks that have an explicit or implicit gains reward structure. We find flexible performance can be induced in individuals who have a negative task-relevant stereotype by using a losses reward structure. We demonstrate the interaction of stereotypes and the reward structure of the task using chronic stereotypes and GRE math problems (Experiment 1), and primed stereotypes and a category learning task (Experiments 2a and 2b). We discuss implications of this research for other work on stereotype threat. PMID:19159133

  4. Impact! - The Threat of Comets and Asteroids

    NASA Astrophysics Data System (ADS)

    Verschuur, Gerrit L.

    1997-12-01

    In Impact , Gerrit L. Verschuur offers an eye-opening look at the catastrophic collisions of comets and asteroids with our planet. Perhaps more important, he paints an unsettling portrait of the possibility of new collisions with earth, exploring potential threats to our planet and describing what scientists are doing right now to prepare for this frightening possibility. Every day something from space hits our planet, Verschuur reveals. In fact, about 10,000 tons of space debris fall to earth every year, mostly in meteoric form. But meteors are not the greatest threat to life on earth, the author points out. The major threats are asteroids and comets. The reader discovers that astronomers have located some 350 NEAs ("Near Earth Asteroids"), objects whose orbits cross the orbit of the earth. Comets, of course, are even more deadly. He discusses Comet Swift-Tuttle--"the most dangerous object in the solar system"--a comet far larger than the one that many scientists believe killed off the dinosaurs, due to pass through earth's orbit in the year 2126. In addition, the author describes the efforts of Spacewatch and other groups to locate NEAs, and evaluates the idea that comet and asteroid impacts have been an underrated factor in the evolution of life on earth. Whether discussing monumental tsunamis or the innumerable comets in the solar system, Impact will enthrall anyone curious about outer space, remarkable natural phenomenon, or the future of the planet earth.

  5. Asymmetric threat data mining and knowledge discovery

    NASA Astrophysics Data System (ADS)

    Gilmore, John F.; Pagels, Michael A.; Palk, Justin

    2001-03-01

    Asymmetric threats differ from the conventional force-on- force military encounters that the Defense Department has historically been trained to engage. Terrorism by its nature is now an operational activity that is neither easily detected or countered as its very existence depends on small covert attacks exploiting the element of surprise. But terrorism does have defined forms, motivations, tactics and organizational structure. Exploiting a terrorism taxonomy provides the opportunity to discover and assess knowledge of terrorist operations. This paper describes the Asymmetric Threat Terrorist Assessment, Countering, and Knowledge (ATTACK) system. ATTACK has been developed to (a) data mine open source intelligence (OSINT) information from web-based newspaper sources, video news web casts, and actual terrorist web sites, (b) evaluate this information against a terrorism taxonomy, (c) exploit country/region specific social, economic, political, and religious knowledge, and (d) discover and predict potential terrorist activities and association links. Details of the asymmetric threat structure and the ATTACK system architecture are presented with results of an actual terrorist data mining and knowledge discovery test case shown.

  6. Antibiotic Resistance Threats in the U.S.

    MedlinePLUS

    ... Health Threats Report: Antibiotic Resistance Threats in the United States, 2013 CDC Antibiotic/Antimicrobial Resistance Website CDC Get Smart: Know When Antibiotics Work CDC Get Smart for Healthcare Features Media Sign up for Features Get Email ...

  7. Introduction to Administrative Programs that Mitigate the Insider Threat

    SciTech Connect

    Gerke, Gretchen K.; Rogers, Erin; Landers, John; DeCastro, Kara

    2012-09-01

    This presentation begins with the reality of the insider threat, then elaborates on these tools to mitigate the insider threat: Human Reliability Program (HRP); Nuclear Security Culture (NSC) Program; Employee Assistance Program (EAP).

  8. Critical transport in weakly disordered semiconductors and semimetals.

    PubMed

    Syzranov, S V; Radzihovsky, L; Gurarie, V

    2015-04-24

    Motivated by Weyl semimetals and weakly doped semiconductors, we study transport in a weakly disordered semiconductor with a power-law quasiparticle dispersion ?_{k}?k^{?}. We show, that in 2? dimensions short-correlated disorder experiences logarithmic renormalization from all energies in the band. We study the case of a general dimension d using a renormalization group, controlled by an ?=2?-d expansion. Above the critical dimensions, conduction exhibits a localization-delocalization phase transition or a sharp crossover (depending on the symmetries of the Hamiltonian) as a function of disorder strength. We utilize this analysis to compute the low-temperature conductivity in Weyl semimetals and weakly doped semiconductors near and below the critical disorder point. PMID:25955065

  9. Advantages of nonclassical pointer states in postselected weak measurements

    NASA Astrophysics Data System (ADS)

    Turek, Yusuf; Maimaiti, W.; Shikano, Yutaka; Sun, Chang-Pu; Al-Amri, M.

    2015-08-01

    We investigate, within the weak measurement theory, the advantages of nonclassical pointer states over semiclassical ones for coherent, squeezed vacuum, and Schrödinger cat states. These states are utilized as pointer states for the system operator A ? with property A?2=I ? , where I ? represents the identity operator. We calculate the ratio between the signal-to-noise ratio of nonpostselected and postselected weak measurements. The latter is used to find the quantum Fisher information for the above pointer states. The average shifts for those pointer states with arbitrary interaction strength are investigated in detail. One key result is that we find the postselected weak measurement scheme for nonclassical pointer states to be superior to semiclassical ones. This can improve the precision of the measurement process.

  10. Culture, Threat, and Mental Illness Stigma: Identifying Culture-Specific Threat among Chinese-American Groups

    PubMed Central

    Purdie-Vaughns, Valerie; Kotabe, Hiroki; Link, Bruce G.; Saw, Anne; Wong, Gloria; Phelan, Jo C.

    2014-01-01

    We incorporate anthropological insights into a stigma framework to elucidate the role of culture in threat perception and stigma among Chinese groups. Prior work suggests that genetic contamination that jeopardizes the extension of one’s family lineage may comprise a culture-specific threat among Chinese groups. In Study 1, a national survey conducted from 2002–2003 assessed cultural differences in mental illness stigma and perceptions of threat in 56 Chinese-Americans and 589 European-Americans. Study 2 sought to empirically test this culture-specific threat of genetic contamination to lineage via a memory paradigm. Conducted from June to August 2010, 48 Chinese-American and 37 European-American university students in New York City read vignettes containing content referring to lineage or non-lineage concerns. Half the participants in each ethnic group were assigned to a condition in which the illness was likely to be inherited (genetic condition) and the rest read that the illness was unlikely to be inherited (non-genetic condition). Findings from Study 1 and 2 were convergent. In Study 1, culture-specific threat to lineage predicted cultural variation in stigma independently and after accounting for other forms of threat. In Study 2, Chinese-Americans in the genetic condition were more likely to accurately recall and recognize lineage content than the Chinese-Americans in the non-genetic condition, but that memorial pattern was not found for non-lineage content. The identification of this culture-specific threat among Chinese groups has direct implications for culturally-tailored anti-stigma interventions. Further, this framework might be implemented across other conditions and cultural groups to reduce stigma across cultures. PMID:23702210

  11. Culture, threat, and mental illness stigma: identifying culture-specific threat among Chinese-American groups.

    PubMed

    Yang, Lawrence H; Purdie-Vaughns, Valerie; Kotabe, Hiroki; Link, Bruce G; Saw, Anne; Wong, Gloria; Phelan, Jo C

    2013-07-01

    We incorporate anthropological insights into a stigma framework to elucidate the role of culture in threat perception and stigma among Chinese groups. Prior work suggests that genetic contamination that jeopardizes the extension of one's family lineage may comprise a culture-specific threat among Chinese groups. In Study 1, a national survey conducted from 2002 to 2003 assessed cultural differences in mental illness stigma and perceptions of threat in 56 Chinese-Americans and 589 European-Americans. Study 2 sought to empirically test this culture-specific threat of genetic contamination to lineage via a memory paradigm. Conducted from June to August 2010, 48 Chinese-American and 37 European-American university students in New York City read vignettes containing content referring to lineage or non-lineage concerns. Half the participants in each ethnic group were assigned to a condition in which the illness was likely to be inherited (genetic condition) and the rest read that the illness was unlikely to be inherited (non-genetic condition). Findings from Study 1 and 2 were convergent. In Study 1, culture-specific threat to lineage predicted cultural variation in stigma independently and after accounting for other forms of threat. In Study 2, Chinese-Americans in the genetic condition were more likely to accurately recall and recognize lineage content than the Chinese-Americans in the non-genetic condition, but that memorial pattern was not found for non-lineage content. The identification of this culture-specific threat among Chinese groups has direct implications for culturally-tailored anti-stigma interventions. Further, this framework might be implemented across other conditions and cultural groups to reduce stigma across cultures. PMID:23702210

  12. Soil threats in Europe for the RECARE project

    NASA Astrophysics Data System (ADS)

    Stolte, Jannes; Tesfai, Mehretaeb; Oygarden, Lillian

    2015-04-01

    Soil is one of our most important natural resources that provides us with vital goods and services to sustain life. Nevertheless, soils functions are threatened by a wide range of processes and a number of soil threats have been identified in Europe. Although there is a large body of knowledge available on soil threats in Europe, the complexity and functioning of soil systems and their interaction with human activities, climate change, and ecosystem services (ESS), is still not fully understood. An extensive literature review was carried out by a group of experts on soil threats at the European level. In total, around 60 experts from the 17 case study sites of the RECARE project, were involved in the process of reviewing and drafting the report and 11 soil threats were identified. The objective of WP2 of the RECARE project was to provide an improved overview of existing information on soil threats and degradation at the European scale. These soil threats are soil erosion by water, soil erosion by wind, decline of organic matter (OM) in peat, decline of OM in minerals soils, soil compaction, soil sealing, soil contamination, soil salinization, desertification, flooding and landslides and decline in soil biodiversity. The final report of WP2 provides a comprehensive thematic information on the major soil threats of Europe with due attention given to the Driving force-Pressure-State-Impact-Response to soil threats. Interrelationships between soil threats, between soil threats and soil functions and between soil threats and Ecosystems Services are made, and will be presented. A synergy between the soil threats is made based on the given information in each of the chapters, where we tried to identify the interactions between the threats. We tried to identify in what way one threat acts as a threat for another threat. Also, the link between soil degradation and Ecosystem Services are identified. Again, based on the information given in each chapter, the major climate, human and policy drivers are described.

  13. Linking terrestrial and marine conservation planning and threats analysis.

    PubMed

    Tallis, Heather; Ferdaña, Zach; Gray, Elizabeth

    2008-02-01

    The existence of the Gulf of Mexico dead zone makes it clear that marine ecosystems can be damaged by terrestrial inputs. Marine and terrestrial conservation planning need to be aligned in an explicit fashion to fully represent threats to marine systems. To integrate conservation planning for terrestrial and marine systems, we used a novel threats assessment that included 5 cross-system threats in a site-prioritization exercise for the Pacific Northwest coast ecoregion (U.S.A.). Cross-system threats are actions or features in one ecological realm that have effects on species in another realm. We considered bulkheads and other forms of shoreline hardening threats to terrestrial systems and roads, logging, agriculture, and urban areas threats to marine systems. We used 2 proxies of freshwater influence on marine environments, validated against a mechanistic model and field observations, to propagate land-based threats into marine sites. We evaluated the influence of cross-system threats on conservation priorities by comparing MARXAN outputs for 3 scenarios that identified terrestrial and marine priorities simultaneously: (1) no threats, (2) single-system threats, and (3) single- and cross-system threats. Including cross-system threats changed the threat landscape dramatically. As a result the best plan that included only single-system threats identified 323 sites (161,500 ha) at risk from cross-system threats. Including these threats changed the location of best sites. By comparing the best and sum solutions of the single- and cross-system scenarios, we identified areas ideal for preservation or restoration through integrated management. Our findings lend quantitative support to the call for explicitly integrated decision making and management action in terrestrial and marine ecosystems. PMID:18254857

  14. Space Station crew safety alternatives study. Volume 2: Threat development

    NASA Technical Reports Server (NTRS)

    Raasch, R. F.; Peercy, R. L., Jr.; Rockoff, L. A.

    1985-01-01

    The first 15 years of accumulated space station concepts for initial operational capability (IOC) during the early 1990's were considered. Twenty-five threats to the space station are identified and selected threats addressed as impacting safety criteria, escape and rescue, and human factors safety concerns. Of the 25 threats identified, eight are discussed including strategy options for threat control: fire, biological or toxic contamination, injury/illness, explosion, loss of pressurization, radiation, meteoroid penetration, and debris.

  15. Testosterone biases the amygdala toward social threat approach

    PubMed Central

    Radke, Sina; Volman, Inge; Mehta, Pranjal; van Son, Veerle; Enter, Dorien; Sanfey, Alan; Toni, Ivan; de Bruijn, Ellen R. A.; Roelofs, Karin

    2015-01-01

    Testosterone enhances amygdala reactions to social threat, but it remains unclear whether this neuroendocrine mechanism is relevant for understanding its dominance-enhancing properties; namely, whether testosterone biases the human amygdala toward threat approach. This pharmacological functional magnetic-resonance imaging study shows that testosterone administration increases amygdala responses in healthy women during threat approach and decreases it during threat avoidance. These findings support and extend motivational salience models by offering a neuroendocrine mechanism of motivation-specific amygdala tuning. PMID:26601187

  16. On Weak-BCC-Algebras

    PubMed Central

    Thomys, Janus; Zhang, Xiaohong

    2013-01-01

    We describe weak-BCC-algebras (also called BZ-algebras) in which the condition (x?y)?z = (x?z)?y is satisfied only in the case when elements x, y belong to the same branch. We also characterize ideals, nilradicals, and nilpotent elements of such algebras. PMID:24311983

  17. Cosmology with weak lensing surveys.

    PubMed

    Munshi, Dipak; Valageas, Patrick

    2005-12-15

    Weak gravitational lensing is responsible for the shearing and magnification of the images of high-redshift sources due to the presence of intervening mass. Since the lensing effects arise from deflections of the light rays due to fluctuations of the gravitational potential, they can be directly related to the underlying density field of the large-scale structures. Weak gravitational surveys are complementary to both galaxy surveys and cosmic microwave background observations as they probe unbiased nonlinear matter power spectra at medium redshift. Ongoing CMBR experiments such as WMAP and a future Planck satellite mission will measure the standard cosmological parameters with unprecedented accuracy. The focus of attention will then shift to understanding the nature of dark matter and vacuum energy: several recent studies suggest that lensing is the best method for constraining the dark energy equation of state. During the next 5 year period, ongoing and future weak lensing surveys such as the Joint Dark Energy Mission (JDEM; e.g. SNAP) or the Large-aperture Synoptic Survey Telescope will play a major role in advancing our understanding of the universe in this direction. In this review article, we describe various aspects of probing the matter power spectrum and the bi-spectrum and other related statistics with weak lensing surveys. This can be used to probe the background dynamics of the universe as well as the nature of dark matter and dark energy. PMID:16286284

  18. Weak-signal iterative holography.

    PubMed

    Watnik, Abbie T; Lebow, Paul S

    2015-04-01

    An iterative holographic table-top experiment is presented, where a recorded hologram is used to re-illuminate the initial target. With this beam shaping setup, more light is directed to the target for each iteration until a convergence limit is met. We experimentally examine convergence properties of this iterative hologram reconstruction approach for weak object signals and compare with theory. PMID:25967166

  19. N-{Delta} weak transition

    SciTech Connect

    Graczyk, Krzysztof M.

    2011-11-23

    A short review of the Rein-Sehgal and isobar models is presented. The attention is focused on the nucleon-{Delta}(1232) weak transition form-factors. The results of the recent re-analyses of the ANL and BNL bubble chamber neutrino-deuteron scattering data are discussed.

  20. Motivation for aggressive religious radicalization: goal regulation theory and a personality × threat × affordance hypothesis.

    PubMed

    McGregor, Ian; Hayes, Joseph; Prentice, Mike

    2015-01-01

    A new set of hypotheses is presented regarding the cause of aggressive religious radicalization (ARR). It is grounded in classic and contemporary theory of human motivation and goal regulation, together with recent empirical advances in personality, social, and neurophysiological psychology. We specify personality traits, threats, and group affordances that combine to divert normal motivational processes toward ARR. Conducive personality traits are oppositional, anxiety-prone, and identity-weak (i.e., morally bewildered). Conducive threats are those that arise from seemingly insurmountable external forces and frustrate effective goal regulation. Conducive affordances include opportunity for immediate and concrete engagement in active groups that are powered by conspiracy narratives, infused with cosmic significance, encouraging of moral violence, and sealed with religious unfalsifiability. We propose that ARR is rewarding because it can spur approach motivated states that mask vulnerability for people whose dispositions and circumstances would otherwise leave them mired in anxious distress. PMID:26441709

  1. Making Mountains of Morality From Molehills of Virtue: Threat Causes People to Overestimate Their Moral Credentials.

    PubMed

    Effron, Daniel A

    2014-05-01

    Seven studies demonstrate that threats to moral identity can increase how definitively people think they have previously proven their morality. When White participants were made to worry that their future behavior could seem racist, they overestimated how much a prior decision of theirs would convince an observer of their non-prejudiced character (Studies 1a-3). Ironically, such overestimation made participants appear more prejudiced to observers (Study 4). Studies 5 to 6 demonstrated a similar effect of threat in the domain of charitable giving-an effect driven by individuals for whom maintaining a moral identity is particularly important. Threatened participants only enhanced their beliefs that they had proven their morality when there was at least some supporting evidence, but these beliefs were insensitive to whether the evidence was weak or strong (Study 2). Discussion considers the role of motivated reasoning, and implications for ethical decision making and moral licensing. PMID:24793359

  2. Motivation for aggressive religious radicalization: goal regulation theory and a personality × threat × affordance hypothesis

    PubMed Central

    McGregor, Ian; Hayes, Joseph; Prentice, Mike

    2015-01-01

    A new set of hypotheses is presented regarding the cause of aggressive religious radicalization (ARR). It is grounded in classic and contemporary theory of human motivation and goal regulation, together with recent empirical advances in personality, social, and neurophysiological psychology. We specify personality traits, threats, and group affordances that combine to divert normal motivational processes toward ARR. Conducive personality traits are oppositional, anxiety-prone, and identity-weak (i.e., morally bewildered). Conducive threats are those that arise from seemingly insurmountable external forces and frustrate effective goal regulation. Conducive affordances include opportunity for immediate and concrete engagement in active groups that are powered by conspiracy narratives, infused with cosmic significance, encouraging of moral violence, and sealed with religious unfalsifiability. We propose that ARR is rewarding because it can spur approach motivated states that mask vulnerability for people whose dispositions and circumstances would otherwise leave them mired in anxious distress. PMID:26441709

  3. Strength Modeling Report

    NASA Technical Reports Server (NTRS)

    Badler, N. I.; Lee, P.; Wong, S.

    1985-01-01

    Strength modeling is a complex and multi-dimensional issue. There are numerous parameters to the problem of characterizing human strength, most notably: (1) position and orientation of body joints; (2) isometric versus dynamic strength; (3) effector force versus joint torque; (4) instantaneous versus steady force; (5) active force versus reactive force; (6) presence or absence of gravity; (7) body somatotype and composition; (8) body (segment) masses; (9) muscle group envolvement; (10) muscle size; (11) fatigue; and (12) practice (training) or familiarity. In surveying the available literature on strength measurement and modeling an attempt was made to examine as many of these parameters as possible. The conclusions reached at this point toward the feasibility of implementing computationally reasonable human strength models. The assessment of accuracy of any model against a specific individual, however, will probably not be possible on any realistic scale. Taken statistically, strength modeling may be an effective tool for general questions of task feasibility and strength requirements.

  4. Death Threat and Death Concerns in the College Student.

    ERIC Educational Resources Information Center

    Tobacyk, Jerome; Eckstein, Daniel

    1980-01-01

    Thanatology students reported significantly lesser death threat and significantly greater death concerns. Trait anxiety was found to be a significant predictor of change in death threat in the Thanatology Group, with lesser anxiety associated with greater decline in death threat. (Author)

  5. Isolating Neural Components of Threat Bias in Pediatric Anxiety

    ERIC Educational Resources Information Center

    Britton, Jennifer C.; Bar-Haim, Yair; Carver, Frederick W.; Holroyd, Tom; Norcross, Maxine A.; Detloff, Allison; Leibenluft, Ellen; Ernst, Monique; Pine, Daniel S.

    2012-01-01

    Background: Attention biases toward threat are often detected in individuals with anxiety disorders. Threat biases can be measured experimentally through dot-probe paradigms, in which individuals detect a probe following a stimulus pair including a threat. On these tasks, individuals with anxiety tend to detect probes that occur in a location…

  6. 49 CFR 1540.209 - Fees for security threat assessment.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CIVIL AVIATION SECURITY: GENERAL RULES Security Threat Assessments § 1540.209 Fees for security threat assessment. This section... 49 Transportation 9 2010-10-01 2010-10-01 false Fees for security threat assessment....

  7. 49 CFR 1540.205 - Procedures for security threat assessment.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... TSA determines that the applicant meets the security threat assessment standards in 49 CFR 1540.201(c... the applicant does not meet the security threat assessment standards in 49 CFR 1540.201(c). The... standards in 49 CFR 1540.201(c) and may pose an imminent threat to transportation or national security,...

  8. Unleashing Latent Ability: Implications of Stereotype Threat for College Admissions

    ERIC Educational Resources Information Center

    Logel, Christine R.; Walton, Gregory M.; Spencer, Steven J.; Peach, Jennifer; Mark, Zanna P.

    2012-01-01

    Social-psychological research conducted over the past 15 years provides compelling evidence that pervasive psychological threats are present in common academic environments--especially threats that originate in negative intellectual stereotypes--and that these threats undermine the real-world academic performance of non-Asian ethnic minority…

  9. Student Reports of Peer Threats of Violence: Prevalence and Outcomes

    ERIC Educational Resources Information Center

    Nekvasil, Erin K.; Cornell, Dewey G.

    2012-01-01

    Authorities in education and law enforcement have recommended that schools use a threat-assessment approach to prevent violence, but there is relatively little research on characteristics and outcomes of threats among students. The current study examined student reports of threat experiences in a sample of 3,756 high school students. Approximately…

  10. Student Reports of Peer Threats of Violence: Prevalence and Outcomes

    ERIC Educational Resources Information Center

    Nekvasil, Erin K.; Cornell, Dewey G.

    2012-01-01

    Authorities in education and law enforcement have recommended that schools use a threat-assessment approach to prevent violence, but there is relatively little research on characteristics and outcomes of threats among students. The current study examined student reports of threat experiences in a sample of 3,756 high school students. Approximately…

  11. Unleashing Latent Ability: Implications of Stereotype Threat for College Admissions

    ERIC Educational Resources Information Center

    Logel, Christine R.; Walton, Gregory M.; Spencer, Steven J.; Peach, Jennifer; Mark, Zanna P.

    2012-01-01

    Social-psychological research conducted over the past 15 years provides compelling evidence that pervasive psychological threats are present in common academic environments--especially threats that originate in negative intellectual stereotypes--and that these threats undermine the real-world academic performance of non-Asian ethnic minority…

  12. Gender, Stereotype Threat, and Anxiety: Psychophysiological and Cognitive Evidence

    ERIC Educational Resources Information Center

    Osborne, Jason W.

    2006-01-01

    Introduction: Claude Steele's stereotype threat hypothesis proposed that negative group stereotypes increase individual anxiety levels, hurting performance. However, the role of anxiety in stereotype threat has not been fully explored. This study examined the hypothesis that experimental manipulation of stereotype threat would influence real-time…

  13. Isolating Neural Components of Threat Bias in Pediatric Anxiety

    ERIC Educational Resources Information Center

    Britton, Jennifer C.; Bar-Haim, Yair; Carver, Frederick W.; Holroyd, Tom; Norcross, Maxine A.; Detloff, Allison; Leibenluft, Ellen; Ernst, Monique; Pine, Daniel S.

    2012-01-01

    Background: Attention biases toward threat are often detected in individuals with anxiety disorders. Threat biases can be measured experimentally through dot-probe paradigms, in which individuals detect a probe following a stimulus pair including a threat. On these tasks, individuals with anxiety tend to detect probes that occur in a location…

  14. 49 CFR 1540.205 - Procedures for security threat assessment.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... TSA determines that the applicant meets the security threat assessment standards in 49 CFR 1540.201(c... the applicant does not meet the security threat assessment standards in 49 CFR 1540.201(c). The... standards in 49 CFR 1540.201(c) and may pose an imminent threat to transportation or national security,...

  15. 49 CFR 1540.205 - Procedures for security threat assessment.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... TSA determines that the applicant meets the security threat assessment standards in 49 CFR 1540.201(c... the applicant does not meet the security threat assessment standards in 49 CFR 1540.201(c). The... standards in 49 CFR 1540.201(c) and may pose an imminent threat to transportation or national security,...

  16. 49 CFR 1540.205 - Procedures for security threat assessment.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... TSA determines that the applicant meets the security threat assessment standards in 49 CFR 1540.201(c... the applicant does not meet the security threat assessment standards in 49 CFR 1540.201(c). The... standards in 49 CFR 1540.201(c) and may pose an imminent threat to transportation or national security,...

  17. Assessing the threat of firearms: new threat formula, resources, and ontological linking algorithms

    NASA Astrophysics Data System (ADS)

    Hempelmann, Christian F.; Arslan, Abdullah N.; Attardo, Salvatore; Blount, Grady P.; Sirakov, Nikolay Metodiev

    2014-06-01

    The present work is part of an ongoing larger project.2, 3, 11, 12 The goal of this project is to develop a system capable of automatic threat assessment for instances of firearms use in public places. The main components of the system are: an ontology of firearms;1, 14 algorithms to create the visual footprint of the firearms,1, 14 to compare visual information,2, 3, 11, 12 to facilitate search in the ontology, and to generate the links between the conceptual and visual ontologies; as well as a formula to calculate the threat of individual firearms, firearms classes, and ammunition types in different environments. One part of the dual-level ontology for the properties of the firearms captures key visual features used to identify their type or class in images, while the other part captures their threat-relevant conceptual properties. The visual ontology is the result of image segmentation and matching methods, while the conceptual ontology is designed using knowledge-engineering principles and populated semi-automatically from Web resources. The focus of the present paper is two-fold. On the one hand, we will report on an update of the initial threat formula, based on the substantially increased population of the firearm ontology, including ammunition types and comparisons to actual incidents, and allowing for an overall more accurate assessment. On the other hand, the linking algorithms between the visual and conceptual ontologies are elaborated for faster transfer of information leading to an improvement in accuracy of the threat assessment.

  18. SUSTAINED PREFERENTIAL PROCESSING OF SOCIAL THREAT CUES – BIAS WITHOUT COMPETITION ?

    PubMed Central

    Wieser, Matthias J.; McTeague, Lisa M.; Keil, Andreas

    2013-01-01

    Stimuli of high emotional significance such as social threat cues are preferentially processed in the human brain. However, there is an ongoing debate, whether or not these stimuli capture attention automatically and weaken the processing of concurrent stimuli in the visual field. This study examined continuous fluctuations of electrocortical facilitation during competition of two spatially separated facial expressions in high and low socially anxious individuals. Two facial expressions were flickered for 3000 ms at different frequencies (14 Hz and 17.5 Hz) to separate the electrocortical signals evoked by the competing stimuli (“frequency-tagging”). Angry faces compared to happy and neutral expressions were associated with greater electrocortical facilitation over visual areas only in the high socially anxious individuals. This finding was independent of the respective competing stimulus. Heightened electrocortical engagement in socially anxious participants was present in the first second of stimulus viewing, and was sustained for the entire presentation period. These results, based on a continuous measure of attentional resource allocation, support the view that stimuli of high personal significance are associated with early and sustained prioritized sensory processing. These cues, however, do not interfere with the electrocortical processing of a spatially separated concurrent face, suggesting that they are effective at capturing attention, but are weak competitors for resources. PMID:20807057

  19. Social identity threat motivates science-discrediting online comments.

    PubMed

    Nauroth, Peter; Gollwitzer, Mario; Bender, Jens; Rothmund, Tobias

    2015-01-01

    Experiencing social identity threat from scientific findings can lead people to cognitively devalue the respective findings. Three studies examined whether potentially threatening scientific findings motivate group members to take action against the respective findings by publicly discrediting them on the Web. Results show that strongly (vs. weakly) identified group members (i.e., people who identified as "gamers") were particularly likely to discredit social identity threatening findings publicly (i.e., studies that found an effect of playing violent video games on aggression). A content analytical evaluation of online comments revealed that social identification specifically predicted critiques of the methodology employed in potentially threatening, but not in non-threatening research (Study 2). Furthermore, when participants were collectively (vs. self-) affirmed, identification did no longer predict discrediting posting behavior (Study 3). These findings contribute to the understanding of the formation of online collective action and add to the burgeoning literature on the question why certain scientific findings sometimes face a broad public opposition. PMID:25646725

  20. Social Identity Threat Motivates Science-Discrediting Online Comments

    PubMed Central

    Nauroth, Peter; Gollwitzer, Mario; Bender, Jens; Rothmund, Tobias

    2015-01-01

    Experiencing social identity threat from scientific findings can lead people to cognitively devalue the respective findings. Three studies examined whether potentially threatening scientific findings motivate group members to take action against the respective findings by publicly discrediting them on the Web. Results show that strongly (vs. weakly) identified group members (i.e., people who identified as “gamers”) were particularly likely to discredit social identity threatening findings publicly (i.e., studies that found an effect of playing violent video games on aggression). A content analytical evaluation of online comments revealed that social identification specifically predicted critiques of the methodology employed in potentially threatening, but not in non-threatening research (Study 2). Furthermore, when participants were collectively (vs. self-) affirmed, identification did no longer predict discrediting posting behavior (Study 3). These findings contribute to the understanding of the formation of online collective action and add to the burgeoning literature on the question why certain scientific findings sometimes face a broad public opposition. PMID:25646725

  1. Technical approaches to reducing the threat of nuclear terrorism

    NASA Astrophysics Data System (ADS)

    Priedhorsky, William C.

    2005-04-01

    The threat of a nuclear attack on the United States by terrorists using a smuggled weapon is now considered more likely than an attack by a nuclear-armed ballistic missle. Consequently it is important to understand what can be done to detect and intercept a nuclear weapon being smuggled into the United States. A significant quantity of smuggled nuclear material has been intercepted already, but science and technology have so far contributed little to its interception. The critical special nuclear materials, plutonium and highly enriched uranium, are only weakly radioactive and detection of their radioactivity is limited both by atmospheric attenuation and by competition with natural backgrounds. Although many schemes for long-range detection of radioactivity have been proposed, none so far appears feasible. Detection of nuclear radiation can be improved using new technologies and sensing systems, but it will still be possible only at relatively small distances. Consequently the best approach to containing dangerous nuclear materials is at their sources; containment within lengthy borders and large areas is extremely difficult.

  2. Threat in Context: School Moderation of the Impact of Social Identity Threat on Racial/Ethnic Achievement Gaps

    ERIC Educational Resources Information Center

    Hanselman, Paul; Bruch, Sarah K.; Gamoran, Adam; Borman, Geoffrey D.

    2014-01-01

    Schools with very few and relatively low-performing marginalized students may be most likely to trigger social identity threats (including stereotype threats) that contribute to racial disparities. We test this hypothesis by assessing variation in the benefits of a self-affirmation intervention designed to counteract social identity threat in a…

  3. Cooperative Threat Reduction: Cooperation Threat Reduction Program Liquid Propellant Disposition Project

    NASA Astrophysics Data System (ADS)

    2002-09-01

    This audit is one in a series of audits the Deputy Secretary of Defense requested. As part of the Cooperative Threat Reduction (CTR) Program, DoD agreed to assist the Russian Federation in disposing of its liquid rocket propellant. Public Law 102-228 (section 2551 NOTE, title 22, United States Code), the Soviet Nuclear Threat Reduction Act of 1991 designates DoD as the executive agent for the CTR Program. Specific objectives of the act are to destroy chemical, nuclear, and other weapons; transport, store, disable, and safeguard weapons in connection with their destruction; and establish verifiable safeguards against proliferation of weapons of mass destruction. The Office of the Assistant Secretary of Defense (International Security Policy), under the Office of the Under Secretary of Defense for Policy, develops, coordinates, and oversees implementation of policy for the CTR Program. The CTR Directorate, Defense Threat Reduction Agency operates the program.

  4. The Strength of the Metal. Aluminum Oxide Interface

    NASA Technical Reports Server (NTRS)

    Pepper, S. V.

    1984-01-01

    The strength of the interface between metals and aluminum oxide is an important factor in the successful operation of devices found throughout modern technology. One finds the interface in machine tools, jet engines, and microelectronic integrated circuits. The strength of the interface, however, should be strong or weak depending on the application. The diverse technological demands have led to some general ideas concerning the origin of the interfacial strength, and have stimulated fundamental research on the problem. Present status of our understanding of the source of the strength of the metal - aluminum oxide interface in terms of interatomic bonds are reviewed. Some future directions for research are suggested.

  5. Studies of fiber-matrix adhesion on compression strength

    NASA Technical Reports Server (NTRS)

    Bascom, Willard D.; Nairn, John A.; Boll, D. J.

    1991-01-01

    A study was initiated on the effect of the matrix polymer and the fiber matrix bond strength of carbon fiber polymer matrix composites. The work includes tests with micro-composites, single ply composites, laminates, and multi-axial loaded cylinders. The results obtained thus far indicate that weak fiber-matrix adhesion dramatically reduces 0 degree compression strength. Evidence is also presented that the flaws in the carbon fiber that govern compression strength differ from those that determine fiber tensile strength. Examination of post-failure damage in the single ply tests indicates kink banding at the crack tip.

  6. Weak values and weak coupling maximizing the output of weak measurements

    SciTech Connect

    Di Lorenzo, Antonio

    2014-06-15

    In a weak measurement, the average output ?o? of a probe that measures an observable A{sup -hat} of a quantum system undergoing both a preparation in a state ?{sub i} and a postselection in a state E{sub f} is, to a good approximation, a function of the weak value A{sub w}=Tr[E{sub f}A{sup -hat} ?{sub i}]/Tr[E{sub f}?{sub i}], a complex number. For a fixed coupling ?, when the overlap Tr[E{sub f}?{sub i}] is very small, A{sub w} diverges, but ?o? stays finite, often tending to zero for symmetry reasons. This paper answers the questions: what is the weak value that maximizes the output for a fixed coupling? What is the coupling that maximizes the output for a fixed weak value? We derive equations for the optimal values of A{sub w} and ?, and provide the solutions. The results are independent of the dimensionality of the system, and they apply to a probe having a Hilbert space of arbitrary dimension. Using the Schrödinger–Robertson uncertainty relation, we demonstrate that, in an important case, the amplification ?o? cannot exceed the initial uncertainty ?{sub o} in the observable o{sup -hat}, we provide an upper limit for the more general case, and a strategy to obtain ?o???{sub o}. - Highlights: •We have provided a general framework to find the extremal values of a weak measurement. •We have derived the location of the extremal values in terms of preparation and postselection. •We have devised a maximization strategy going beyond the limit of the Schrödinger–Robertson relation.

  7. The weak scale from BBN

    NASA Astrophysics Data System (ADS)

    Hall, Lawrence J.; Pinner, David; Ruderman, Joshua T.

    2014-12-01

    The measured values of the weak scale, v, and the first generation masses, m u, d, e , are simultaneously explained in the multiverse, with all these parameters scanning independently. At the same time, several remarkable coincidences are understood. Small variations in these parameters away from their measured values lead to the instability of hydrogen, the instability of heavy nuclei, and either a hydrogen or a helium dominated universe from Big Bang Nucleosynthesis. In the 4d parameter space of ( m u , m d , m e , v), catastrophic boundaries are reached by separately increasing each parameter above its measured value by a factor of (1.4, 1.3, 2.5, ˜ 5), respectively. The fine-tuning problem of the weak scale in the Standard Model is solved: as v is increased beyond the observed value, it is impossible to maintain a significant cosmological hydrogen abundance for any values of m u, d, e that yield both hydrogen and heavy nuclei stability.

  8. Tomography and weak lensing statistics

    SciTech Connect

    Munshi, Dipak; Coles, Peter; Kilbinger, Martin E-mail: peter.coles@astro.cf.ac.uk

    2014-04-01

    We provide generic predictions for the lower order cumulants of weak lensing maps, and their correlators for tomographic bins as well as in three dimensions (3D). Using small-angle approximation, we derive the corresponding one- and two-point probability distribution function for the tomographic maps from different bins and for 3D convergence maps. The modelling of weak lensing statistics is obtained by adopting a detailed prescription for the underlying density contrast that involves hierarchal ansatz and lognormal distribution. We study the dependence of our results on cosmological parameters and source distributions corresponding to the realistic surveys such as LSST and DES. We briefly outline how photometric redshift information can be incorporated in our results. We also show how topological properties of convergence maps can be quantified using our results.

  9. Elendilmir: Satellites - Threats or the Threatened?

    NASA Astrophysics Data System (ADS)

    Goh, M. G.

    2002-01-01

    space law. A blitz of anti-satellite weapons has sprung up in response to the myriad military applications of satellites. The various space law documents did not envision the volatile détente between the military applications of, and threats to, artificial satellites. satellites. It deals with the blurring of the distinction between civilian and military satellite technology. It also discusses the impact of commercialisation. Suggestions are made on how to update and build upon the existing legal regime relating to satellites in the military context.

  10. Lyssaviruses and Bats: Emergence and Zoonotic Threat

    PubMed Central

    Banyard, Ashley C.; Evans, Jennifer S.; Luo, Ting Rong; Fooks, Anthony R.

    2014-01-01

    The continued detection of zoonotic viral infections in bats has led to the microbial fauna of these mammals being studied at a greater level than ever before. Whilst numerous pathogens have been discovered in bat species, infection with lyssaviruses is of particular significance from a zoonotic perspective as, where human infection has been reported, it is invariably fatal. Here we review the detection of lyssaviruses within different bat species and overview what is understood regarding their maintenance and transmission following both experimental and natural infection. We discuss the relevance of these pathogens as zoonotic agents and the threat of newly discovered viruses to human populations. PMID:25093425

  11. The threat of smallpox and bioterrorism.

    PubMed

    Berche, P

    2001-01-01

    Smallpox (variola) was a devastating disease with a high case-fatality rate. Although the disease was eradicated in 1977, the remaining stocks of smallpox virus constitute one of the most dangerous threats to humanity. The smallpox virus is highly specific for humans and non-pathogenic in animals. There is no antiviral treatment and a vaccine is active only if administered in the first four days post-exposure. Smallpox virus represents a potential biological weapon that could be used by terrorists, and the destruction of stocks raises political, social, scientific and ethical issues. PMID:11166237

  12. Threat modeling for electronic health record systems.

    PubMed

    Almulhem, Ahmad

    2012-10-01

    The security of electronic health record (EHR) systems is crucial for their growing acceptance. There is a need for assurance that these records are securely protected from attacks. For a system as complex as an EHR system, the number of possible attacks is potentially very large. In this paper, a threat modeling methodology, known as attack tree, is employed to analyze attacks affecting EHR systems. The analysis is based on a proposed generic client-server model of EHR systems. The developed attack tree is discussed along with some system properties that enable quantitative and qualitative analysis. A list of suggested countermeasures are also highlighted. PMID:21870030

  13. Alumina fiber strength improvement

    NASA Technical Reports Server (NTRS)

    Pepper, R. T.; Nelson, D. C.

    1982-01-01

    The effective fiber strength of alumina fibers in an aluminum composite was increased to 173,000 psi. A high temperature heat treatment, combined with a glassy carbon surface coating, was used to prevent degradation and improve fiber tensile strength. Attempts to achieve chemical strengthening of the alumina fiber by chromium oxide and boron oxide coatings proved unsuccessful. A major problem encountered on the program was the low and inconsistent strength of the Dupont Fiber FP used for the investigation.

  14. Post-quantum attacks on key distribution schemes in the presence of weakly stochastic sources

    NASA Astrophysics Data System (ADS)

    Al–Safi, S. W.; Wilmott, C. M.

    2015-09-01

    It has been established that the security of quantum key distribution protocols can be severely compromised were one to permit an eavesdropper to possess a very limited knowledge of the random sources used between the communicating parties. While such knowledge should always be expected in realistic experimental conditions, the result itself opened a new line of research to fully account for real-world weak randomness threats to quantum cryptography. Here we expand of this novel idea by describing a key distribution scheme that is provably secure against general attacks by a post-quantum adversary. We then discuss possible security consequences for such schemes under the assumption of weak randomness.

  15. Using SWOT Analysis for Promoting the Accounting Program.

    ERIC Educational Resources Information Center

    Sawyer, Joe E.

    2001-01-01

    Describes how SWOT (strengths, weaknesses, opportunities, threats) analysis can be used by business educators to find the best match between environmental trends (opportunities and threats) and internal departmental capabilities (strengths and weaknesses). An example from accounting education is provided. (JOW)

  16. A concise colorimetric and fluorimetric probe for sarin related threats designed via the "covalent-assembly" approach.

    PubMed

    Lei, Zuhai; Yang, Youjun

    2014-05-01

    A turn-on signal from zero background allows sensitive detection of a weak signal and is highly desired. The "covalent-assembly" probe design principle is powerful in this regard. Herein, we report an embodiment of this principle (NA570) for detection of Sarin related threats, based on a phenylogous Vilsmeier-Haack reaction. NA570 bears a concise molecular construct, exhibits a colorimetric and a fluorimetric signal, and has potential for real applications. PMID:24766398

  17. In Brief: Threats to species continue

    NASA Astrophysics Data System (ADS)

    Showstack, Randy

    2009-11-01

    Of 47,677 assessed species, 17,291 are threatened with extinction, according to the latest update of the Red List of Threatened Species issued by the International Union for Conservation of Nature (IUCN) on 3 November. The list indicates that amphibians are the most threatened group of species known to date, with 1895 (nearly 30%) of 6285 amphibians in danger of extinction. Thirty-nine are already extinct or extinct in the wild, 484 are critically endangered, 754 are endangered, and 657 are vulnerable, according to IUCN. Under threat are 21% of mammals, 30% of amphibians, 12% of birds, 28% of reptiles, 37% of freshwater fishes, 70% of plants, and 35% of invertebrates assessed to date. “We have only managed to assess 47,663 species so far; there are many more millions out there which could be under serious threat,” according to IUCN Red List Unit Manager Craig Hilton-Taylor. For more information, visit http://www.iucnredlist.org.

  18. Identifying chemicals that are planetary boundary threats.

    PubMed

    MacLeod, Matthew; Breitholtz, Magnus; Cousins, Ian T; de Wit, Cynthia A; Persson, Linn M; Rudén, Christina; McLachlan, Michael S

    2014-10-01

    Rockström et al. proposed a set of planetary boundaries that delimit a "safe operating space for humanity". Many of the planetary boundaries that have so far been identified are determined by chemical agents. Other chemical pollution-related planetary boundaries likely exist, but are currently unknown. A chemical poses an unknown planetary boundary threat if it simultaneously fulfills three conditions: (1) it has an unknown disruptive effect on a vital Earth system process; (2) the disruptive effect is not discovered until it is a problem at the global scale, and (3) the effect is not readily reversible. In this paper, we outline scenarios in which chemicals could fulfill each of the three conditions, then use the scenarios as the basis to define chemical profiles that fit each scenario. The chemical profiles are defined in terms of the nature of the effect of the chemical and the nature of exposure of the environment to the chemical. Prioritization of chemicals in commerce against some of the profiles appears feasible, but there are considerable uncertainties and scientific challenges that must be addressed. Most challenging is prioritizing chemicals for their potential to have a currently unknown effect on a vital Earth system process. We conclude that the most effective strategy currently available to identify chemicals that are planetary boundary threats is prioritization against profiles defined in terms of environmental exposure combined with monitoring and study of the biogeochemical processes that underlie vital Earth system processes to identify currently unknown disruptive effects. PMID:25181298

  19. Initial perspectives on process threat management.

    PubMed

    Whiteley, James R Rob; Mannan, M Sam

    2004-11-11

    Terrorist and criminal acts are now considered credible risks in the process industries. Deliberate attacks on the nation's petroleum refineries and chemical plants would pose a significant threat to public welfare, national security, and the US economy. To-date, the primary response of government and industry has been on improved security to prevent attacks and the associated consequences. While prevention is clearly preferred, the potential for successful attacks must be addressed. If plant security is breached, the extent of the inflicted damage is determined by the available plant safety systems and procedures. We refer to this "inside the gate" response as process threat management. The authors have initiated a joint industry/academia study to address: the level of safety provided by existing plant equipment and safety systems in response to a terrorist act, and identification of process (rather than security) needs or opportunities to address this new safety concern. This paper describes the initial perspectives and issues identified by the team at the beginning of the study. PMID:15518979

  20. Passive acoustic threat detection in estuarine environments

    NASA Astrophysics Data System (ADS)

    Borowski, Brian; Sutin, Alexander; Roh, Heui-Seol; Bunin, Barry

    2008-04-01

    The Maritime Security Laboratory (MSL) at Stevens Institute of Technology supports research in a range of areas relevant to harbor security, including passive acoustic detection of underwater threats. The difficulties in using passive detection in an urban estuarine environment include intensive and highly irregular ambient noise and the complexity of sound propagation in shallow water. MSL conducted a set of tests in the Hudson River near Manhattan in order to measure the main parameters defining the detection distance of a threat: source level of a scuba diver, transmission loss of acoustic signals, and ambient noise. The source level of the diver was measured by comparing the diver's sound with a reference signal from a calibrated emitter placed on his path. Transmission loss was measured by comparing noise levels of passing ships at various points along their routes, where their distance from the hydrophone was calculated with the help of cameras and custom software. The ambient noise in the Hudson River was recorded under varying environmental conditions and amounts of water traffic. The passive sonar equation was then applied to estimate the range of detection. Estimations were done for a subset of the recorded noise levels, and we demonstrated how variations in the noise level, attenuation, and the diver's source level influence the effective range of detection. Finally, we provided analytic estimates of how an array improves upon the detection distance calculated by a single hydrophone.

  1. Traits, States, and Attentional Gates: Temperament and Threat Relevance as Predictors of Attentional Bias to Social Threat

    PubMed Central

    Helzer, Erik G.; Connor-Smith, Jennifer K.; Reed, Marjorie A.

    2009-01-01

    This study investigated the influence of situational and dispositional factors on attentional biases toward social threat, and the impact of these attentional biases on distress in a sample of adolescents. Results suggest greater biases for personally-relevant threat cues, as individuals reporting high social stress were vigilant to subliminal social threat cues, but not physical threat cues, and those reporting low social stress showed no attentional biases. Individual differences in fearful temperament and attentional control interacted to influence attentional biases, with fearful temperament predicting biases to supraliminal social threat only for individuals with poor attentional control. Multivariate analyses exploring relations between attentional biases for social threat and symptoms of anxiety and depression revealed that attentional biases alone were rarely related to symptoms. However, biases did interact with social stress, fearful temperament, and attentional control to predict distress. Results are discussed in terms of automatic and effortful cognitive mechanisms underlying threat cue processing. PMID:18791905

  2. A Lesson Not to Be Learned? Understanding Stereotype Threat Does Not Protect Women from Stereotype Threat

    ERIC Educational Resources Information Center

    Tomasetto, Carlo; Appoloni, Sara

    2013-01-01

    This research examines whether reading a text presenting scientific evidence concerning the phenomenon of stereotype threat improves or disrupts women's performance in a subsequent math task. In two experimental conditions participants (N=118 ) read a text summarizing an experiment in which stereotypes, and not biological differences, were shown…

  3. When threat to society becomes a threat to oneself: implications for right-wing attitudes and ethnic prejudice.

    PubMed

    Onraet, Emma; Van Hiel, Alain

    2013-01-01

    The relationships between threat on one hand and right-wing attitudes and ethnic prejudice on the other were investigated in a heterogeneous sample (N = 588). Specifically, we considered the perception of economic and terroristic threats in terms of their consequences at the societal and personal levels. Previous studies revealed that societal consequences of threat, rather than personal consequences, are related to right-wing attitudes. However, the present results challenge these findings. More specifically, three important results emerged. First, items probing the distinct threat levels loaded on separate dimensions for economic and terroristic threat, validating the distinction between societal and personal threat consequences. Second, consistent with previous research, this study revealed that perceived societal consequences of threat yield strong and robust relationships with all target variables. However, personal consequences of threat were also associated with higher levels of right-wing authoritarianism (RWA), social dominance orientation (SDO), and ethnic prejudice in particular. Third, societal and personal consequences of threat interacted in explaining the target variables. More specifically, feeling personally threatened by terrorism was only related to higher levels of RWA in the presence of low levels of threat to society, whereas experiencing personal economic threat was only related to higher levels of SDO and ethnic prejudice when high societal economic threat was experienced. In sum, although the perception of societal consequences of threat plays a prominent role in explaining right-wing attitudes and ethnic prejudice, the perception of being personally affected by threat is also associated with higher levels of RWA and SDO, and especially ethnic prejudice. PMID:23390970

  4. High strength, superplastic superalloy

    NASA Technical Reports Server (NTRS)

    Ashbrook, R. L.; Freche, J. C.; Waters, W. J.

    1969-01-01

    High strength superplastic superalloys are produced by extruding a pre-alloyed powder. The cast nickel base superalloy was remelted and converted to pre-alloyed powder by inert gas atomization. The superalloy shows high tensile strength and superplasticity and finds use in hot working and casting.

  5. Tagged-weak {pi} method

    SciTech Connect

    Margaryan, A.; Hashimoto, O.; Kakoyan, V.; Knyazyan, S.; Tang, L.

    2011-02-15

    A new 'tagged-weak {pi} method' is proposed for determination of electromagnetic transition probabilities B(E2) and B(M1) of the hypernuclear states with lifetimes of {approx}10{sup -10} s. With this method, we are planning to measure B(E2) and B(M1) for light hypernuclei at JLab. The results of Monte Carlo simulations for the case of E2(5/2{sup +}, 3/2{sup +} {yields} 1/2{sup +}) transitions in {sub {Lambda}}{sup 7}He hypernuclei are presented.

  6. Electromagnetic weak turbulence theory revisited

    SciTech Connect

    Yoon, P. H.; Ziebell, L. F.; Gaelzer, R.; Pavan, J.

    2012-10-15

    The statistical mechanical reformulation of weak turbulence theory for unmagnetized plasmas including fully electromagnetic effects was carried out by Yoon [Phys. Plasmas 13, 022302 (2006)]. However, the wave kinetic equation for the transverse wave ignores the nonlinear three-wave interaction that involves two transverse waves and a Langmuir wave, the incoherent analogue of the so-called Raman scattering process, which may account for the third and higher-harmonic plasma emissions. The present paper extends the previous formalism by including such a term.

  7. Strengths of serpentinite gouges at elevated temperatures

    USGS Publications Warehouse

    Moore, Diane E.; Lockner, D.A.; Ma, S.; Summers, R.; Byerlee, J.D.

    1997-01-01

    Serpentinite has been proposed as a cause of both low strength and aseismic creep of fault zones. To test these hypotheses, we have measured the strength of chrysotile-, lizardite-, and antigorite-rich serpentinite gouges under hydrothermal conditions, with emphasis on chrysotile, which has thus far received little attention. At 25??C, the coefficient of friction, ??, of chrysotile gouge is roughly 0.2, whereas the lizardite- and antigorite-rich gouges are at least twice as strong. The very low room temperature strength of chrysotile is a consequence of its unusually high adsorbed water content. When the adsorbed water is removed, chrysotile is as strong as pure antigorite gouge at room temperature. Heating to ???200??C causes the frictional strengths of all three gouges to increase. Limited data suggest that different polytypes of a given serpentine mineral have similar strengths; thus deformation-induced changes in polytype should not affect fault strength. At 25??C, the chrysotile gouge has a transition from velocity strengthening at low velocities to velocity weakening at high velocities, consistent with previous studies. At temperatures up to ???200??C, however, chrysotile strength is essentially independent of velocity at low velocities. Overall, chrysotile has a restricted range of velocity-strengthening behavior that migrates to higher velocities with increasing temperature. Less information on velocity dependence is available for the lizardite and antigorite gouges, but their behavior is consistent with that outlined for chrysotile. The marked changes in velocity dependence and strength of chrysotile with heating underscore the hazards of using room temperature data to predict fault behavior at depth. The velocity behavior at elevated temperatures does not rule out serpentinite as a cause of aseismic slip, but in the presence of a hydrostatic fluid pressure gradient, all varieties of serpentine are too strong to explain the apparent weakness of faults such as the San Andreas.

  8. Biological terrorism. Preparing to meet the threat.

    PubMed

    Simon, J D

    1997-08-01

    The threat of terrorists using biological warfare agents has received increased attention in recent years. Despite the hope that, with the right mix of policies, security measures, and intelligence gathering, a major biological warfare terrorist attack can be prevented, the history of conventional terrorism indicates otherwise. The greatest payoff in combating biological terrorism lies in focusing on how best to respond to a terrorist attack. The medical and emergency service communities will play the most important role in that process. Ensuring that they are trained to recognize the symptoms of diseases caused by biological warfare agents and have Critical Incident Stress Debriefing teams available to help them cope with the emotional aspects of treating exposed survivors should be part of contingency planning. By improving our readiness to respond to biological terrorism, many lives can be saved and terrorists denied their goal of creating panic and crisis throughout the country. PMID:9244336

  9. Community epidemiology framework for classifying disease threats.

    PubMed

    Fenton, Andy; Pedersen, Amy B

    2005-12-01

    Recent evidence suggests that most parasites can infect multiple host species and that these are primarily responsible for emerging infectious disease outbreaks in humans and wildlife. However, the ecologic and evolutionary factors that constrain or facilitate such emergences are poorly understood. We propose a conceptual framework based on the pathogen's between- and within-species transmission rates to describe possible configurations of a multihost-pathogen community that may lead to disease emergence. We establish 3 dynamic thresholds separating 4 classes of disease outcomes, spillover, apparent multi-host, true multihost, and potential emerging infectious disease; describe possible disease emergence scenarios; outline the population dynamics of each case; and clarify existing terminology. We highlight the utility of this framework with examples of disease threats in human and wildlife populations, showing how it allows us to understand which ecologic factors affect disease emergence and predict the impact of host shifts in a range of disease systems. PMID:16485464

  10. Smart filters: protect from laser threats

    NASA Astrophysics Data System (ADS)

    Donval, Ariela; Fisher, Tali; Lipman, Ofir; Oron, Moshe

    2014-06-01

    Optical systems as well as the human eye are susceptible to saturation or damage caused by high power lasers. We present a non-linear, solid-state passive wideband optical protection filter. As opposed to fixed spectral filters, which permanently block only specific wavelengths, the wideband filter is clear at all wavelengths until it is hit by damaging light. At input powers below threshold, the filter has high transmission over the whole spectral band. However, when the input power exceeds the threshold power, transmission is decreased dramatically. We propose a novel technology for protection of any imaging system, sensors and the human eye against laser threats from the visible and up to the IR.

  11. “Filoviruses”: a real pandemic threat?

    PubMed Central

    Martina, Byron EE; Osterhaus, Albert DME

    2009-01-01

    Filoviruses are zoonotic and among the deadliest viruses known to mankind, with mortality rates in outbreaks reaching up to 90%. Despite numerous efforts to identify the host reservoir(s), the transmission cycle of filoviruses between the animal host(s) and humans remains unclear. The last decade has witnessed an increase in filovirus outbreaks with a changing epidemiology. The high mortality rates and lack of effective antiviral drugs or preventive vaccines has propagated the fear that filoviruses may become a real pandemic threat. This article discusses the factors that could influence the possible pandemic potential of filoviruses and elaborates on the prerequisites for the containment of future outbreaks, which would help prevent the evolution of filovirus into more virulent and more transmissible viruses. PMID:20049699

  12. When threats foreign turn domestic: Two ways for distant realistic intergroup threats to carry over into local intolerance.

    PubMed

    Bouman, Thijs; van Zomeren, Martijn; Otten, Sabine

    2015-09-01

    In times of economic downturn, perceived realistic intergroup threats (e.g., labour competition) often dominate political and media discourse. Although local outgroups (e.g., local immigrants) can be experienced as sources of realistic threats, we propose that such threats can also be perceived to be caused by distant outgroups (e.g., European Union members perceiving Greece to threaten their economies) and that such distant threats can carry over into local intolerance (e.g., increasing intolerance towards local immigrant groups). We predicted and found in two studies that perceived distant realistic threats carried over into local intolerance via two different pathways. First, direct reactions towards the distant outgroup can generalize to culturally similar local outgroups (the group-based association pathway). Secondly, Study 2 indicated that when the distant threat was attributed to stereotypical outgroup traits (e.g., being lazy), distant realistic threats activated local realistic threats, which subsequently influenced local intolerance (the threat-based association pathway). Taken together, our studies indicate that perceived realistic threats foreign can turn domestic, but in two different ways. PMID:25491910

  13. An Overview of Non-traditional Nuclear Threats

    SciTech Connect

    Geelhood, Bruce D.; Wogman, Ned A.

    2005-01-01

    In view of the terrorist threats to the United States, the country needs to consider new vectors and weapons related to nuclear and radiological threats against our homeland. The traditional threat vectors, missiles and bombers, have expanded to include threats arriving through the flow of commerce. The new commerce-related vectors include: sea cargo, truck cargo, rail cargo, and passenger transport. The types of weapons have also expanded beyond nuclear warheads to include radiation dispersal devices (RDD) or ''dirty'' bombs. The consequences of these nuclear and radiological threats are considered. The defense against undesirable materials entering our borders is considered. The radiation and other signatures or potential nuclear and radiological threats are examined along with potential sensors to discover undesirable items in the flow of commerce. Techniques to improve detection are considered. A strategy of primary and secondary screening is proposed to rapidly clear most cargo and carefully examine suspect cargo.

  14. An Overview of Non-Traditional Nuclear Threats

    SciTech Connect

    Geelhood, Bruce D.; Wogman, Ned A.

    2005-01-01

    In view of the terrorist threats to the United States, the country needs to consider new vectors and weapons related to nuclear and radiological threats against our homeland. The traditional threat vectors, missiles and bombers, have expanded to include threats arriving through the flow of commerce. The new commerce-related vectors include: sea cargo, truck cargo, rail cargo, air cargo, and passenger transport. The types of weapons have also expanded beyond nuclear war-heads to include radiation dispersal devices (RDD) or “dirty” bombs. The consequences of these nuclear and radiological threats are considered. The defense against undesirable materials enter-ing our borders is considered. The radiation and other signatures of potential nuclear and radio-logical threats are examined along with potential sensors to discover undesirable items in the flow of commerce. Techniques to improve detection are considered. A strategy of primary and secondary screening is proposed to rapidly clear most cargo and carefully examine suspect cargo.

  15. Counteracting effect of threat on reward enhancements during working memory.

    PubMed

    Choi, Jong Moon; Padmala, Srikanth; Pessoa, Luiz

    2015-12-01

    Cognitive performance has been shown to be enhanced when performance-based rewards are at stake. On the other hand, task-irrelevant threat processing has been shown to have detrimental effects during several cognitive tasks. Crucially, the impact of reward and threat on cognition has been studied largely independently of one another. Hence, our understanding of how reward and threat simultaneously contribute to performance is incomplete. To fill in this gap, the present study investigated how reward and threat interact with one another during a cognitive task. We found that threat of shock counteracted the beneficial effect of reward during a working memory task. Furthermore, individual differences in self-reported reward-sensitivity and anxiety were linked to the extent to which reward and threat interacted during behaviour. Together, the current findings contribute to a limited but growing literature unravelling how positive and negative information processing jointly influence cognition. PMID:25559397

  16. The insider threat--a new aspect of biosecurity.

    PubMed

    Engells, Thomas E

    2013-01-01

    The need for those responsible for security at hospital research centers to take steps to counter insider threats to use biomedical and microbiological research and for perverted purposes is real, says the author. He spells out what the threats consist of suspicious behaviors to be aware of and reporting procedures for effective resolution that will enable life science researchers and law enforcement to successfully work together to thwart such threats. PMID:24020316

  17. Quantifying human response capabilities towards tsunami threats at community level

    NASA Astrophysics Data System (ADS)

    Post, J.; Mück, M.; Zosseder, K.; Wegscheider, S.; Taubenböck, H.; Strunz, G.; Muhari, A.; Anwar, H. Z.; Birkmann, J.; Gebert, N.

    2009-04-01

    Decision makers at the community level need detailed information on tsunami risks in their area. Knowledge on potential hazard impact, exposed elements such as people, critical facilities and lifelines, people's coping capacity and recovery potential are crucial to plan precautionary measures for adaptation and to mitigate potential impacts of tsunamis on society and the environment. A crucial point within a people-centred tsunami risk assessment is to quantify the human response capabilities towards tsunami threats. Based on this quantification and spatial representation in maps tsunami affected and safe areas, difficult-to-evacuate areas, evacuation target points and evacuation routes can be assigned and used as an important contribution to e.g. community level evacuation planning. Major component in the quantification of human response capabilities towards tsunami impacts is the factor time. The human response capabilities depend on the estimated time of arrival (ETA) of a tsunami, the time until technical or natural warning signs (ToNW) can be received, the reaction time (RT) of the population (human understanding of a tsunami warning and the decision to take appropriate action), the evacuation time (ET, time people need to reach a safe area) and the actual available response time (RsT = ETA - ToNW - RT). If RsT is larger than ET, people in the respective areas are able to reach a safe area and rescue themselves. Critical areas possess RsT values equal or even smaller ET and hence people whin these areas will be directly affected by a tsunami. Quantifying the factor time is challenging and an attempt to this is presented here. The ETA can be derived by analyzing pre-computed tsunami scenarios for a respective area. For ToNW we assume that the early warning center is able to fulfil the Indonesian presidential decree to issue a warning within 5 minutes. RT is difficult as here human intrinsic factors as educational level, believe, tsunami knowledge and experience besides others play a role. An attempt to quantify this variable under high uncertainty is also presented. Quantifying ET is based on a GIS modelling using a Cost Weighted Distance approach. Basic principle is to define the best evacuation path from a given point to the next safe area (shelter location). Here the fastest path from that point to the shelter location has to be found. Thereby the impact of land cover, slope, population density, population age and gender distribution are taken into account as literature studies prove these factors as highly important. Knowing the fastest path and the distance to the next safe area together with a spatially distributed pattern of evacuation speed delivers the time needed from each location to a safe area. By considering now the obtained time value for RsT the coverage area of an evacuation target point (safe area) can be assigned. Incorporating knowledge on people capacity of an evacuation target point the respective coverage area is refined. Hence areas with weak, moderate and good human response capabilities can be detected. This allows calculation of potential amount of people affected (dead or injured) and amount of people dislocated. First results for Kuta (Bali) for a worst case tsunami event deliver people affected of approx. 25 000 when RT = 0 minutes (direct evacuation when receiving a tsunami warning to 120 000 when RT > ETA (no evacuation action until tsunami hits the land). Additionally fastest evacuation routes to the evacuation target points can be assigned. Areas with weak response capabilities can be assigned as priority areas to install e.g. additional evacuation target points or to increase tsunami knowledge and awareness to promote a faster reaction time. Especially in analyzing underlying socio-economic properties causing deficiencies in responding to a tsunami threat can lead to valuable information and direct planning of adaptation measures. Keywords: Community level, Risk and vulnerability assessment, Early warning, Disaster management, Tsunami, Indonesia

  18. Enhanced neural reactivity and selective attention to threat in anxiety.

    PubMed

    Eldar, Sharon; Yankelevitch, Roni; Lamy, Dominique; Bar-Haim, Yair

    2010-10-01

    Attentional bias towards threat is implicated in the etiology and maintenance of anxiety disorders. We examined the neural correlates of threat bias in anxious and nonanxious participants to shed light on the neural chronometry of this cognitive bias. In this study, event-related potentials (ERPs) were recorded while anxious (n=23) and nonanxious (n=23) young adults performed a probe-discrimination task measuring attentional bias towards threat (angry) and positive (happy) face stimuli. Results showed an attention bias towards threat among anxious participants, but not among nonanxious participants. No bias to positive faces was found. ERP data revealed enhanced C1 amplitude (∼80 ms following threat onset) in anxious relative to nonanxious participants when cue displays contained threat faces. Additionally, P2 amplitude to the faces display was higher in the anxious relative to the nonanxious group regardless of emotion condition (angry/happy/neutral). None of the ERP analyses associated with target processing were significant. In conclusion, our data suggest that a core feature of threat processing in anxiety lies in functional perturbations of a brain circuitry that reacts rapidly and vigorously to threat. It is this over-activation that may set the stage for the attention bias towards threat observed in anxious individuals. PMID:20655976

  19. Mechanisms of visual threat detection in specific phobia.

    PubMed

    Weierich, Mariann R; Treat, Teresa A

    2015-01-01

    People with anxiety or stress-related disorders attend differently to threat-relevant compared with non-threat stimuli, yet the temporal mechanisms of differential allocation of attention are not well understood. We investigated two independent mechanisms of temporal processing of visual threat by comparing spider-phobic and non-fearful participants using a rapid serial visual presentation task. Consistent with prior literature, spider phobics, but not non-fearful controls, displayed threat-specific facilitated detection of spider stimuli relative to negative stimuli and neutral stimuli. Further, signal detection analyses revealed that facilitated threat detection in spider-phobic participants was driven by greater sensitivity to threat stimulus features and a trend towards a lower threshold for detecting spider stimuli. However, phobic participants did not display reliably slowed temporal disengagement from threat-relevant stimuli. These findings advance our understanding of threat feature processing that might contribute to the onset and maintenance of symptoms in specific phobia and disorders that involve visual threat information more generally. PMID:25251896

  20. American science and engineering remain productive despite international weaknesses, Science Board finds

    SciTech Connect

    Not Available

    1990-04-12

    This article discusses the status of American science and engineering relative to past performance and international competition as seen by the National Science Board (NSB). Topics include the strengths and weakness of the US effort and recommendation of the NSB for correcting the weaknesses including adaptation of educational institutions to modern research programs, dramatic improvement in precollege and undergraduate education, persuade best students to study science and engineering, strengthen university basic research, develop better cooperation among those involved in research including international organizations.

  1. Detecting weak phase locking in chaotic system with dual attractors and ill-defined phase structure

    NASA Astrophysics Data System (ADS)

    Jan, Hengtai; Ho, Ming-Chung; Kuo, Chie-Tong; Jiang, I.-Min

    2009-06-01

    A quantitative approach was constructed for detecting phase locking in a chaotic system with complex attractor structure via stroboscopic method. We study the route to weak phase locking by analyzing the stroboscopic points. The onset of weak phase locking detected by using this statistical approach and the critical coupling strength calculated by Lyapunov exponent are matched well. Detailed structure of phase locking intensity is described by the Arnold tongue diagram.

  2. Out-Group Mating Threat and Disease Threat Increase Implicit Negative Attitudes Toward the Out-Group Among Men

    PubMed Central

    Klavina, Liga; Buunk, Abraham P.; Pollet, Thomas V.

    2011-01-01

    We investigated if perceiving an out-group as a threat to one's mating opportunities enhanced the implicit negative attitudes toward that out-group. In addition, we examined the moderating effect of disease threat on the relationship between an out-group mating threat and implicit negative attitudes toward that out-group. In Experiment 1, an out-group mating threat led to stronger implicit negative out-group attitudes as measured by the Implicit Association Test, but only for men with high chronic perceived vulnerability to disease. No such effects were found among women. In Experiment 2, men in the out-group mating threat condition who were primed with disease prevalence showed significantly stronger implicit negative attitudes toward the out-group than controls. Findings are discussed with reference to the functional approach to prejudice and sex-specific motivational reactions to different out-group threats. PMID:21687447

  3. Reduction of bone strength

    NASA Technical Reports Server (NTRS)

    Bingham, Cindy

    1990-01-01

    Viewgraphs on reduction of bone strength are presented. WEHI 231 B growth rates, experimental chambers used to apply the electric field to the cell cultures, and a mouse suspended by rotating cuff in electromagnetic field are shown.

  4. Strength and Balance Exercises

    MedlinePLUS

    ... Blood Pressure Tools & Resources Stroke More Strength and Balance Exercises Updated:Jun 23,2015 If you have ... second set. Walking Heel-to-Toe Purpose: Improve balance. Starting Position: Stand close to a wall for ...

  5. Prethermalization and Thermalization in Models with Weak Integrability Breaking.

    PubMed

    Bertini, Bruno; Essler, Fabian H L; Groha, Stefan; Robinson, Neil J

    2015-10-30

    We study the effects of integrability-breaking perturbations on the nonequilibrium evolution of many-particle quantum systems. We focus on a class of spinless fermion models with weak interactions. We employ equation of motion techniques that can be viewed as generalizations of quantum Boltzmann equations. We benchmark our method against time-dependent density matrix renormalization group computations and find it to be very accurate as long as interactions are weak. For small integrability breaking, we observe robust prethermalization plateaux for local observables on all accessible time scales. Increasing the strength of the integrability-breaking term induces a "drift" away from the prethermalization plateaux towards thermal behavior. We identify a time scale characterizing this crossover. PMID:26565450

  6. Weak, Quiet Magnetic Fields Seen in the Venus Atmosphere

    PubMed Central

    Zhang, T. L.; Baumjohann, W.; Russell, C. T.; Luhmann, J. G.; Xiao, S. D.

    2016-01-01

    The existence of a strong internal magnetic field allows probing of the interior through both long term changes of and short period fluctuations in that magnetic field. Venus, while Earth’s twin in many ways, lacks such a strong intrinsic magnetic field, but perhaps short period fluctuations can still be used to probe the electrical conductivity of the interior. Toward the end of the Venus Express mission, an aerobraking campaign took the spacecraft below the ionosphere into the very weakly electrically conducting atmosphere. As the spacecraft descended from 150 to 140 km altitude, the magnetic field became weaker on average and less noisy. Below 140 km, the median field strength became steady but the short period fluctuations continued to weaken. The weakness of the fluctuations indicates they might not be useful for electromagnetic sounding of the atmosphere from a high altitude platform such as a plane or balloon, but possibly could be attempted on a lander. PMID:27009234

  7. Weak, Quiet Magnetic Fields Seen in the Venus Atmosphere.

    PubMed

    Zhang, T L; Baumjohann, W; Russell, C T; Luhmann, J G; Xiao, S D

    2016-01-01

    The existence of a strong internal magnetic field allows probing of the interior through both long term changes of and short period fluctuations in that magnetic field. Venus, while Earth's twin in many ways, lacks such a strong intrinsic magnetic field, but perhaps short period fluctuations can still be used to probe the electrical conductivity of the interior. Toward the end of the Venus Express mission, an aerobraking campaign took the spacecraft below the ionosphere into the very weakly electrically conducting atmosphere. As the spacecraft descended from 150 to 140 km altitude, the magnetic field became weaker on average and less noisy. Below 140 km, the median field strength became steady but the short period fluctuations continued to weaken. The weakness of the fluctuations indicates they might not be useful for electromagnetic sounding of the atmosphere from a high altitude platform such as a plane or balloon, but possibly could be attempted on a lander. PMID:27009234

  8. Prethermalization and Thermalization in Models with Weak Integrability Breaking

    NASA Astrophysics Data System (ADS)

    Bertini, Bruno; Essler, Fabian H. L.; Groha, Stefan; Robinson, Neil J.

    2015-10-01

    We study the effects of integrability-breaking perturbations on the nonequilibrium evolution of many-particle quantum systems. We focus on a class of spinless fermion models with weak interactions. We employ equation of motion techniques that can be viewed as generalizations of quantum Boltzmann equations. We benchmark our method against time-dependent density matrix renormalization group computations and find it to be very accurate as long as interactions are weak. For small integrability breaking, we observe robust prethermalization plateaux for local observables on all accessible time scales. Increasing the strength of the integrability-breaking term induces a "drift" away from the prethermalization plateaux towards thermal behavior. We identify a time scale characterizing this crossover.

  9. Prethermal Floquet Steady States and Instabilities in the Periodically Driven, Weakly Interacting Bose-Hubbard Model

    NASA Astrophysics Data System (ADS)

    Bukov, Marin; Gopalakrishnan, Sarang; Knap, Michael; Demler, Eugene

    2015-11-01

    We explore prethermal Floquet steady states and instabilities of the weakly interacting two-dimensional Bose-Hubbard model subject to periodic driving. We develop a description of the nonequilibrium dynamics, at arbitrary drive strength and frequency, using a weak-coupling conserving approximation. We establish the regimes in which conventional (zero-momentum) and unconventional [(? ,? )-momentum] condensates are stable on intermediate time scales. We find that condensate stability is enhanced by increasing the drive strength, because this decreases the bandwidth of quasiparticle excitations and thus impedes resonant absorption and heating. Our results are directly relevant to a number of current experiments with ultracold bosons.

  10. Prethermal Floquet Steady States and Instabilities in the Periodically Driven, Weakly Interacting Bose-Hubbard Model.

    PubMed

    Bukov, Marin; Gopalakrishnan, Sarang; Knap, Michael; Demler, Eugene

    2015-11-13

    We explore prethermal Floquet steady states and instabilities of the weakly interacting two-dimensional Bose-Hubbard model subject to periodic driving. We develop a description of the nonequilibrium dynamics, at arbitrary drive strength and frequency, using a weak-coupling conserving approximation. We establish the regimes in which conventional (zero-momentum) and unconventional [(?,?)-momentum] condensates are stable on intermediate time scales. We find that condensate stability is enhanced by increasing the drive strength, because this decreases the bandwidth of quasiparticle excitations and thus impedes resonant absorption and heating. Our results are directly relevant to a number of current experiments with ultracold bosons. PMID:26613449

  11. Enhancing Atomic Entanglement in a Common Reservoir by Weak Measurement and its Reversal

    NASA Astrophysics Data System (ADS)

    Zhang, Yun-hai; Xia, Yun-jie

    2016-01-01

    The three two-level atoms, initially prepared in like-W state, interact with a common bosonic reservoir. To suppress environment decoherence and obtain much better entanglement, we firstly perform weak measurement on these atoms before they pass the reservoir, and then, when they have experienced the decoherence environment, the receiver carry out a quantum reversal on all atoms. The results show both the tripartite and bipartite entanglement can be enhanced and the post-reversal measurement is more obvious to promote atomic entanglements than the weak measurement. Increasing the strength of reversal measurement can always improve entanglement. As a price, the success probability decreases with the much greater measure strength.

  12. Weak D in the Tunisian population

    PubMed Central

    Ouchari, Mouna; Romdhane, Houda; Chakroun, Taher; Abdelkefi, Saida; Houissa, Batoul; Hmida, Slama; Yacoub, Saloua Jemni

    2015-01-01

    Background More than 90 weak D types have been discovered to date. As there are no published data on the frequencies of weak D types in the Tunisian population, the aim of this study was to determine the composition of weak D alleles in our population. Material and methods Blood samples from 1777 D+ and 223 D? blood donors were tested for markers 809G, 1154C, 8G, 602G, 667G, 446A, and 885T relative to translation start codon by polymerase chain reaction with sequence-specific primers to estimate the frequencies of weak D type 1, weak D type 2, weak D type 3, weak D type 4, weak D type 5 and weak D type 11 in our population. Twenty-three samples with positive reactions were re-evaluated by DNA sequencing of RHD exons 1–10 and adjacent intronic sequences. Results Among the D+ donor cohort, weak D type 4 was the most prevalent allele (n=33, 1.2%) followed by weak D type 2 (n=6, 0.17%), weak D type 1 (n=4, 0.11%), and weak D type 5 (n=1, 0.28%) and weak D type 11 (n=1, 0.28%). RHD sequencing identified a weak D type 4.0 allele in all 19 samples tested. Among the D? pool, comprising 223 samples, we detected one sample with weak D type 4.0 associated with a C+c+E?e+ phenotype which had been missed by routine serological methods. Discussion Weak D type 4.0 appears to be the most prevalent weak D in our population. However, all samples must be sequenced in order to determine the exact subtype of weak D type 4, since weak D type 4.2 has considerable clinical importance, being associated with anti-D alloimmunisation. One case of weak D type 4 associated with dCe in trans had been missed by serology, so quality control of serological tests should be developed in our country. PMID:25369614

  13. Induced tolerance expressed as relaxed behavioural threat response in millimetre-sized aquatic organisms.

    PubMed

    Hylander, Samuel; Ekvall, Mikael T; Bianco, Giuseppe; Yang, Xi; Hansson, Lars-Anders

    2014-08-01

    Natural selection shapes behaviour in all organisms, but this is difficult to study in small, millimetre-sized, organisms. With novel labelling and tracking techniques, based on nanotechnology, we here show how behaviour in zooplankton (Daphnia magna) is affected by size, morphology and previous exposure to detrimental ultraviolet radiation (UVR). All individuals responded with immediate downward swimming to UVR exposure, but when released from the threat they rapidly returned to the surface. Large individuals swam faster and generally travelled longer distances than small individuals. Interestingly, individuals previously exposed to UVR (during several generations) showed a more relaxed response to UVR and travelled shorter total distances than those that were naive to UVR, suggesting induced tolerance to the threat. In addition, animals previously exposed to UVR also had smaller eyes than the naive ones, whereas UVR-protective melanin pigmentation of the animals was similar between populations. Finally, we show that smaller individuals have lower capacity to avoid UVR which could explain patterns in natural systems of lower migration amplitudes in small individuals. The ability to change behavioural patterns in response to a threat, in this case UVR, adds to our understanding of how organisms navigate in the 'landscape of fear', and this has important implications for individual fitness and for interaction strengths in biotic interactions. PMID:24966309

  14. Computer-aided visualization of muscle weakness distribution.

    PubMed

    Pieterse, Allan J; Voermans, Nicol C; Tuinenga, Hans S; van Engelen, Baziel G M

    2008-11-01

    We present a computer program for visualizing muscle weakness distribution in patients with neuromuscular disorders. Ordinal muscle strength data can be computed in the program. Data are visualized as the prime movers of the testmovements in an image of the human body and a separate image of the face. Severity is indicated in shades of grey and black indicates complete loss of muscle power. This visualization facilitates the diagnosis and follow-up of patients and is an excellent tool for patient education. Moreover, the program can also be used to investigate and further refine the phenotypic description of these disorders. PMID:18769861

  15. Threats to sandy beach ecosystems: A review

    NASA Astrophysics Data System (ADS)

    Defeo, Omar; McLachlan, Anton; Schoeman, David S.; Schlacher, Thomas A.; Dugan, Jenifer; Jones, Alan; Lastra, Mariano; Scapini, Felicita

    2009-01-01

    We provide a brief synopsis of the unique physical and ecological attributes of sandy beach ecosystems and review the main anthropogenic pressures acting on the world's single largest type of open shoreline. Threats to beaches arise from a range of stressors which span a spectrum of impact scales from localised effects (e.g. trampling) to a truly global reach (e.g. sea-level rise). These pressures act at multiple temporal and spatial scales, translating into ecological impacts that are manifested across several dimensions in time and space so that today almost every beach on every coastline is threatened by human activities. Press disturbances (whatever the impact source involved) are becoming increasingly common, operating on time scales of years to decades. However, long-term data sets that describe either the natural dynamics of beach systems or the human impacts on beaches are scarce and fragmentary. A top priority is to implement long-term field experiments and monitoring programmes that quantify the dynamics of key ecological attributes on sandy beaches. Because of the inertia associated with global climate change and human population growth, no realistic management scenario will alleviate these threats in the short term. The immediate priority is to avoid further development of coastal areas likely to be directly impacted by retreating shorelines. There is also scope for improvement in experimental design to better distinguish natural variability from anthropogenic impacts. Sea-level rise and other effects of global warming are expected to intensify other anthropogenic pressures, and could cause unprecedented ecological impacts. The definition of the relevant scales of analysis, which will vary according to the magnitude of the impact and the organisational level under analysis, and the recognition of a physical-biological coupling at different scales, should be included in approaches to quantify impacts. Zoning strategies and marine reserves, which have not been widely implemented in sandy beaches, could be a key tool for biodiversity conservation and should also facilitate spillover effects into adjacent beach habitats. Setback and zoning strategies need to be enforced through legislation, and all relevant stakeholders should be included in the design, implementation and institutionalisation of these initiatives. New perspectives for rational management of sandy beaches require paradigm shifts, by including not only basic ecosystem principles, but also incentives for effective governance and sharing of management roles between government and local stakeholders.

  16. Severe Weather and Weak Waterspout Checklist in MIDDS

    NASA Technical Reports Server (NTRS)

    Wheeler, Mark M.

    2009-01-01

    The goal of this task was to migrate the functionality of the AMU web-based Severe Weather Forecast Decision Aid and the 45 WS Weak Waterspout Checklist to MIDDS, the operational data ingest and display system of the 45 WS. Forecasting the occurrence and timing of warm season severe weather and weak waterspouts is challenging for 45 WS operational personnel. These interactive tools assist forecasters in determining the probability of issuing severe weather watches and warnings for the day. MIDDS is able retrieve many of the needed parameter values for the worksheet automatically. The AMU was able to develop user-friendly tools in MIDDS for both of these tools using McBASI coded programs. The tools retrieve needed values from MIDDS automatically, and require the forecaster to answer a few subjective questions. Both tools were tested and previewed to the 45 WS on MIDDS. In their previous forms, the forecasters enter values into both tools manually to output a threat index. Making these tools more automatic will reduce the possibility of human error and increase efficiency.

  17. Stability in Real Food Webs: Weak Links in Long Loops

    NASA Astrophysics Data System (ADS)

    Neutel, Anje-Margriet; Heesterbeek, Johan A. P.; de Ruiter, Peter C.

    2002-05-01

    Increasing evidence that the strengths of interactions among populations in biological communities form patterns that are crucial for system stability requires clarification of the precise form of these patterns, how they come about, and why they influence stability. We show that in real food webs, interaction strengths are organized in trophic loops in such a way that long loops contain relatively many weak links. We show and explain mathematically that this patterning enhances stability, because it reduces maximum ``loop weight'' and thus reduces the amount of intraspecific interaction needed for matrix stability. The patterns are brought about by biomass pyramids, a feature common to most ecosystems. Incorporation of biomass pyramids in 104 food-web descriptions reveals that the low weight of the long loops stabilizes complex food webs. Loop-weight analysis could be a useful tool for exploring the structure and organization of complex communities.

  18. Growing up with the threat of nuclear war: some indirect effects on personality development

    SciTech Connect

    Escalona, S.K.

    1982-10-01

    The effects of the nuclear peril upon youngsters in middle childhood are considered, with particular emphasis on the extent to which ego strengths and weaknesses are influenced by adult behavior. It is suggested that the adult response to a pervasive danger such as the nuclear arms build-up shapes children's views of the trustworthiness of adult society and defines the limits of their growth and development.

  19. On the possibility of detecting weak magnetic fields in variable white dwarfs

    NASA Technical Reports Server (NTRS)

    Jones, Philip W.; Hansen, Carl J.; Pesnell, W. Dean; Kawaler, Steven D.

    1989-01-01

    It is suggested that 'weak' magnetic fields of strengths less than 10 to the 6th G may be detectable in some variable white dwarfs. Weak fields can cause subtle changes in the Fourier power spectra of these stars in the form of 'splitting' in frequency of otherwise degenerate signals. Present-day observational and analysis techniques are capable of detecting these changes. It is suggested suggested, by listing some well-studied candidate stars, that perhaps the magnetic signature of splitting has already been observed in at least one object and that the difficult task of intensive measurements of weak fields should now be undertaken of those candidates.

  20. Violation of the Leggett–Garg inequality with weak measurements of photons

    PubMed Central

    Goggin, M. E.; Almeida, M. P.; Barbieri, M.; Lanyon, B. P.; O’Brien, J. L.; White, A. G.; Pryde, G. J.

    2011-01-01

    By weakly measuring the polarization of a photon between two strong polarization measurements, we experimentally investigate the correlation between the appearance of anomalous values in quantum weak measurements and the violation of realism and nonintrusiveness of measurements. A quantitative formulation of the latter concept is expressed in terms of a Leggett–Garg inequality for the outcomes of subsequent measurements of an individual quantum system. We experimentally violate the Leggett–Garg inequality for several measurement strengths. Furthermore, we experimentally demonstrate that there is a one-to-one correlation between achieving strange weak values and violating the Leggett–Garg inequality. PMID:21220296

  1. Tie strength distribution in scientific collaboration networks

    NASA Astrophysics Data System (ADS)

    Ke, Qing; Ahn, Yong-Yeol

    2014-09-01

    Science is increasingly dominated by teams. Understanding patterns of scientific collaboration and their impacts on the productivity and evolution of disciplines is crucial to understand scientific processes. Electronic bibliography offers a unique opportunity to map and investigate the nature of scientific collaboration. Recent studies have demonstrated a counterintuitive organizational pattern of scientific collaboration networks: densely interconnected local clusters consist of weak ties, whereas strong ties play the role of connecting different clusters. This pattern contrasts itself from many other types of networks where strong ties form communities while weak ties connect different communities. Although there are many models for collaboration networks, no model reproduces this pattern. In this paper, we present an evolution model of collaboration networks, which reproduces many properties of real-world collaboration networks, including the organization of tie strengths, skewed degree and weight distribution, high clustering, and assortative mixing.

  2. Investigating Hypervigilance for Social Threat of Lonely Children

    ERIC Educational Resources Information Center

    Qualter, Pamela; Rotenberg, Ken; Barrett, Louise; Henzi, Peter; Barlow, Alexandra; Stylianou, Maria; Harris, Rebecca A.

    2013-01-01

    The hypothesis that lonely children show hypervigilance for social threat was examined in a series of three studies that employed different methods including advanced eye-tracking technology. Hypervigilance for social threat was operationalized as hostility to ambiguously motivated social exclusion in a variation of the hostile attribution…

  3. Threat Level High (School): Curriculum Reform with Violence in Mind

    ERIC Educational Resources Information Center

    Hawkes, T. Elijah; Twemlow, Stuart W.

    2015-01-01

    When school communities are troubled by violence, or threats of violence, at the hands of young people, educators have an opportunity to learn about aggression and adolescent identity development. A disturbing threat incident provides the point of departure for this principal's reflection on how high school curriculum can better meet the identity…

  4. A Stereotype Threat Account of Boys' Academic Underachievement

    ERIC Educational Resources Information Center

    Hartley, Bonny L.; Sutton, Robbie M.

    2013-01-01

    Three studies examined the role of stereotype threat in boys' academic underachievement. Study 1 (children aged 4-10, n = 238) showed that girls from age 4 years and boys from age 7 years believed, and thought adults believed, that boys are academically inferior to girls. Study 2 manipulated stereotype threat, informing children aged…

  5. Soviet military power: an assessment of the threat

    SciTech Connect

    Not Available

    1988-01-01

    Contents include: the nature of the Soviet threat--Soviet national-security policies; Soviet foreign policy under Gorbachev; military resources allocation; Soviet strategic programs and space forces; Soviet conventional forces; an assessment of the threat--the strategic balance; regional and functional balances; research and development: the technological competition; collective security: our risks and responsibilities.

  6. Lack of Stereotype Threat at a Liberal Arts College

    ERIC Educational Resources Information Center

    Rivardo, Mark G.; Rhodes, Michael E.; Klein, Brandi

    2008-01-01

    Stereotype threat has been demonstrated to reduce the performance of stereotyped individuals in the threatened domain (Steele & Aronson, 1995). This study attempted to replicate the finding that stereotype threat instruction can erase the performance deficit women experience in math performance (Johns, Schmader, & Martens, 2005) and to further…

  7. Research in Review. Children Living with the Nuclear Threat.

    ERIC Educational Resources Information Center

    Reifel, Stuart

    1984-01-01

    Reviews the literature on children and the threat of nuclear war, focusing on four areas: awareness of nuclear weapons, fear of the bomb, influences on personality, and denial of the threat. The research is briefly critiqued, and implications for early childhood are drawn. (RH)

  8. Does Manipulating Stereotype Threat Condition Change Performance Goal State

    ERIC Educational Resources Information Center

    Simmons, Cecil Max

    2010-01-01

    This study tested whether the Stereotype Threat effect is mediated by achievement goals, in particular performance-avoidance goals. Threat level was altered before a difficult math test to observe how the endorsement by females of various achievement goal dimensions was affected. 222 people (96 females) in a pre-calculus class at a Mid-Western…

  9. Protected Areas in Tropical Africa: Assessing Threats and Conservation Activities

    PubMed Central

    Tranquilli, Sandra; Abedi-Lartey, Michael; Abernethy, Katharine; Amsini, Fidèle; Asamoah, Augustus; Balangtaa, Cletus; Blake, Stephen; Bouanga, Estelle; Breuer, Thomas; Brncic, Terry M.; Campbell, Geneviève; Chancellor, Rebecca; Chapman, Colin A.; Davenport, Tim R. B.; Dunn, Andrew; Dupain, Jef; Ekobo, Atanga; Eno-Nku, Manasseh; Etoga, Gilles; Furuichi, Takeshi; Gatti, Sylvain; Ghiurghi, Andrea; Hashimoto, Chie; Hart, John A.; Head, Josephine; Hega, Martin; Herbinger, Ilka; Hicks, Thurston C.; Holbech, Lars H.; Huijbregts, Bas; Kühl, Hjalmar S.; Imong, Inaoyom; Yeno, Stephane Le-Duc; Linder, Joshua; Marshall, Phil; Lero, Peter Minasoma; Morgan, David; Mubalama, Leonard; N'Goran, Paul K.; Nicholas, Aaron; Nixon, Stuart; Normand, Emmanuelle; Nziguyimpa, Leonidas; Nzooh-Dongmo, Zacharie; Ofori-Amanfo, Richard; Ogunjemite, Babafemi G.; Petre, Charles-Albert; Rainey, Hugo J.; Regnaut, Sebastien; Robinson, Orume; Rundus, Aaron; Sanz, Crickette M.; Okon, David Tiku; Todd, Angelique; Warren, Ymke; Sommer, Volker

    2014-01-01

    Numerous protected areas (PAs) have been created in Africa to safeguard wildlife and other natural resources. However, significant threats from anthropogenic activities and decline of wildlife populations persist, while conservation efforts in most PAs are still minimal. We assessed the impact level of the most common threats to wildlife within PAs in tropical Africa and the relationship of conservation activities with threat impact level. We collated data on 98 PAs with tropical forest cover from 15 countries across West, Central and East Africa. For this, we assembled information about local threats as well as conservation activities from published and unpublished literature, and questionnaires sent to long-term field workers. We constructed general linear models to test the significance of specific conservation activities in relation to the threat impact level. Subsistence and commercial hunting were identified as the most common direct threats to wildlife and found to be most prevalent in West and Central Africa. Agriculture and logging represented the most common indirect threats, and were most prevalent in West Africa. We found that the long-term presence of conservation activities (such as law enforcement, research and tourism) was associated with lower threat impact levels. Our results highlight deficiencies in the management effectiveness of several PAs across tropical Africa, and conclude that PA management should invest more into conservation activities with long-term duration. PMID:25469888

  10. Does Manipulating Stereotype Threat Condition Change Performance Goal State

    ERIC Educational Resources Information Center

    Simmons, Cecil Max

    2010-01-01

    This study tested whether the Stereotype Threat effect is mediated by achievement goals, in particular performance-avoidance goals. Threat level was altered before a difficult math test to observe how the endorsement by females of various achievement goal dimensions was affected. 222 people (96 females) in a pre-calculus class at a Mid-Western…

  11. Superior Detection of Threat-Relevant Stimuli in Infancy

    ERIC Educational Resources Information Center

    LoBue, Vanessa; DeLoache, Judy S.

    2010-01-01

    The ability to quickly detect potential threat is an important survival mechanism for humans and other animals. Past research has established that adults have an attentional bias for the detection of threat-relevant stimuli, including snakes and spiders as well as angry human faces. Recent studies have documented that preschool children also…

  12. A Stereotype Threat Account of Boys' Academic Underachievement

    ERIC Educational Resources Information Center

    Hartley, Bonny L.; Sutton, Robbie M.

    2013-01-01

    Three studies examined the role of stereotype threat in boys' academic underachievement. Study 1 (children aged 4-10, n = 238) showed that girls from age 4 years and boys from age 7 years believed, and thought adults believed, that boys are academically inferior to girls. Study 2 manipulated stereotype threat, informing children aged…

  13. Threat Level High (School): Curriculum Reform with Violence in Mind

    ERIC Educational Resources Information Center

    Hawkes, T. Elijah; Twemlow, Stuart W.

    2015-01-01

    When school communities are troubled by violence, or threats of violence, at the hands of young people, educators have an opportunity to learn about aggression and adolescent identity development. A disturbing threat incident provides the point of departure for this principal's reflection on how high school curriculum can better meet the identity…

  14. A Developmental Perspective on the Virginia Student Threat Assessment Guidelines

    ERIC Educational Resources Information Center

    Cornell, Dewey G.

    2011-01-01

    The Virginia Student Threat Assessment Guidelines were developed to help multidisciplinary school-based teams use a decision tree to evaluate student threats and take appropriate preventive action. A main goal of this approach is to allow school-based teams to recognize and respond to the developmental complexities of children and adolescents…

  15. An Integrated Process Model of Stereotype Threat Effects on Performance

    ERIC Educational Resources Information Center

    Schmader, Toni; Johns, Michael; Forbes, Chad

    2008-01-01

    Research showing that activation of negative stereotypes can impair the performance of stigmatized individuals on a wide variety of tasks has proliferated. However, a complete understanding of the processes underlying these stereotype threat effects on behavior is still lacking. The authors examine stereotype threat in the context of research on…

  16. 41 CFR 60-741.22 - Direct threat defense.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Direct threat defense. 60... Contracts OFFICE OF FEDERAL CONTRACT COMPLIANCE PROGRAMS, EQUAL EMPLOYMENT OPPORTUNITY, DEPARTMENT OF LABOR... INDIVIDUALS WITH DISABILITIES Discrimination Prohibited § 60-741.22 Direct threat defense. The contractor...

  17. 41 CFR 60-300.22 - Direct threat defense.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 1 2013-07-01 2013-07-01 false Direct threat defense... Public Contracts OFFICE OF FEDERAL CONTRACT COMPLIANCE PROGRAMS, EQUAL EMPLOYMENT OPPORTUNITY, DEPARTMENT... MEDAL VETERANS Discrimination Prohibited § 60-300.22 Direct threat defense. The contractor may use as...

  18. 41 CFR 60-300.22 - Direct threat defense.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 41 Public Contracts and Property Management 1 2012-07-01 2009-07-01 true Direct threat defense. 60... Contracts OFFICE OF FEDERAL CONTRACT COMPLIANCE PROGRAMS, EQUAL EMPLOYMENT OPPORTUNITY, DEPARTMENT OF LABOR... VETERANS Discrimination Prohibited § 60-300.22 Direct threat defense. The contractor may use as...

  19. 41 CFR 60-250.22 - Direct threat defense.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Direct threat defense. 60... Contracts OFFICE OF FEDERAL CONTRACT COMPLIANCE PROGRAMS, EQUAL EMPLOYMENT OPPORTUNITY, DEPARTMENT OF LABOR... VETERANS Discrimination Prohibited § 60-250.22 Direct threat defense. The contractor may use as...

  20. 41 CFR 60-741.22 - Direct threat defense.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 41 Public Contracts and Property Management 1 2011-07-01 2009-07-01 true Direct threat defense. 60... Contracts OFFICE OF FEDERAL CONTRACT COMPLIANCE PROGRAMS, EQUAL EMPLOYMENT OPPORTUNITY, DEPARTMENT OF LABOR... INDIVIDUALS WITH DISABILITIES Discrimination Prohibited § 60-741.22 Direct threat defense. The contractor...

  1. 41 CFR 60-250.22 - Direct threat defense.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 41 Public Contracts and Property Management 1 2011-07-01 2009-07-01 true Direct threat defense. 60... Contracts OFFICE OF FEDERAL CONTRACT COMPLIANCE PROGRAMS, EQUAL EMPLOYMENT OPPORTUNITY, DEPARTMENT OF LABOR... VETERANS Discrimination Prohibited § 60-250.22 Direct threat defense. The contractor may use as...

  2. 41 CFR 60-250.22 - Direct threat defense.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 41 Public Contracts and Property Management 1 2012-07-01 2009-07-01 true Direct threat defense. 60... Contracts OFFICE OF FEDERAL CONTRACT COMPLIANCE PROGRAMS, EQUAL EMPLOYMENT OPPORTUNITY, DEPARTMENT OF LABOR... VETERANS Discrimination Prohibited § 60-250.22 Direct threat defense. The contractor may use as...

  3. 41 CFR 60-250.22 - Direct threat defense.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 1 2013-07-01 2013-07-01 false Direct threat defense... Public Contracts OFFICE OF FEDERAL CONTRACT COMPLIANCE PROGRAMS, EQUAL EMPLOYMENT OPPORTUNITY, DEPARTMENT... PROTECTED VETERANS Discrimination Prohibited § 60-250.22 Direct threat defense. The contractor may use as...

  4. 41 CFR 60-300.22 - Direct threat defense.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 41 Public Contracts and Property Management 1 2011-07-01 2009-07-01 true Direct threat defense. 60... Contracts OFFICE OF FEDERAL CONTRACT COMPLIANCE PROGRAMS, EQUAL EMPLOYMENT OPPORTUNITY, DEPARTMENT OF LABOR... VETERANS Discrimination Prohibited § 60-300.22 Direct threat defense. The contractor may use as...

  5. 41 CFR 60-300.22 - Direct threat defense.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Direct threat defense. 60... Contracts OFFICE OF FEDERAL CONTRACT COMPLIANCE PROGRAMS, EQUAL EMPLOYMENT OPPORTUNITY, DEPARTMENT OF LABOR... VETERANS Discrimination Prohibited § 60-300.22 Direct threat defense. The contractor may use as...

  6. 41 CFR 60-741.22 - Direct threat defense.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 41 Public Contracts and Property Management 1 2012-07-01 2009-07-01 true Direct threat defense. 60... Contracts OFFICE OF FEDERAL CONTRACT COMPLIANCE PROGRAMS, EQUAL EMPLOYMENT OPPORTUNITY, DEPARTMENT OF LABOR... INDIVIDUALS WITH DISABILITIES Discrimination Prohibited § 60-741.22 Direct threat defense. The contractor...

  7. 41 CFR 60-741.22 - Direct threat defense.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 1 2013-07-01 2013-07-01 false Direct threat defense... Public Contracts OFFICE OF FEDERAL CONTRACT COMPLIANCE PROGRAMS, EQUAL EMPLOYMENT OPPORTUNITY, DEPARTMENT... REGARDING INDIVIDUALS WITH DISABILITIES Discrimination Prohibited § 60-741.22 Direct threat defense....

  8. The Practice of Campus-Based Threat Assessment: An Overview

    ERIC Educational Resources Information Center

    Pollard, Jeffrey W.; Nolan, Jeffrey J.; Deisinger, Eugene R. D.

    2012-01-01

    This article provides an overview of threat assessment and management as implemented on campuses of higher education. Standards of practice and state calls for implementation are cited. An overview of some of the basic principles for threat assessment and management implementation is accompanied by examples of how they are utilized. Pitfalls…

  9. Hindrances are not threats: advancing the multidimensionality of work stress.

    PubMed

    Tuckey, Michelle R; Searle, Ben J; Boyd, Carolyn M; Winefield, Anthony H; Winefield, Helen R

    2015-04-01

    The challenge-hindrance framework has proved useful for explaining inconsistencies in relationships between work stressors and important outcomes. By introducing the distinction between threat and hindrance to this framework, we capture the potential for personal harm or loss (threat) associated with stressors, as distinct from the potential to block goal attainment (hindrance) or promote gain (challenge). In Study 1, survey data were collected from 609 retail workers, 220 of whom responded 6 months later. The results supported a 3-factor threat-hindrance-challenge stressor structure and showed that threat stressors are associated with increased psychological distress and emotional exhaustion, and reduced dedication, whereas hindrance stressors undermine dedication but may not be related to distress or exhaustion with threats included in the model. Study 2 utilized a diary study design, with data collected from 207 workers over 3 workdays. Findings revealed that the threat, hindrance, and challenge appraisals of individual workers are statistically distinct, and associated with stressors and well-being as anticipated: threats with role conflict and anxiety, hindrances with organizational constraints and fatigue, and challenges with skill demands and enthusiasm. Overall, moving to a 3-dimensional challenge-hindrance-threat framework for stressors and stress appraisals will support a more accurate picture regarding the nature, processes, and effects of stressors on individuals and organizations, and ensure prevention efforts are not misguided. PMID:25365630

  10. Bio-threat preparedness: Need for a paradigm shift

    PubMed Central

    Jindal, A.K.; Roy, Kaushik

    2014-01-01

    India of late has been vulnerable to Chemical, Biological, Radiological and Nuclear (CBRN) threat, on account of its unique geographic position. Biological threat is an imminent threat in the hands of a terrorist. The public health system of our country is overburdened due to its present role and bio-attack response is not a priority area. This paper suggests that as the prime focus is on the CR and N threats in the integrated CBRN preparedness strategy and that specialized and technical forces are needed to deal with a bio-threat; hence there is a need for a paradigm shift in policy. The emerging field of bio-threat needs to be delinked from the joint family of ‘CBRN’, with consequent structural and functional changes. A separate specialized cadre needs to be formed for dealing with bio-threat, created from the pool of doctors and non-medical scientists from the AFMS and the DRDO. Structural changes are needed in the organization, to bring in the resources of NCDC, New Delhi for enhanced disease surveillance capacity and creation of a bio-threat mitigation node in the AFMC, Pune. PMID:24843207

  11. Protected areas in tropical Africa: assessing threats and conservation activities.

    PubMed

    Tranquilli, Sandra; Abedi-Lartey, Michael; Abernethy, Katharine; Amsini, Fidèle; Asamoah, Augustus; Balangtaa, Cletus; Blake, Stephen; Bouanga, Estelle; Breuer, Thomas; Brncic, Terry M; Campbell, Geneviève; Chancellor, Rebecca; Chapman, Colin A; Davenport, Tim R B; Dunn, Andrew; Dupain, Jef; Ekobo, Atanga; Eno-Nku, Manasseh; Etoga, Gilles; Furuichi, Takeshi; Gatti, Sylvain; Ghiurghi, Andrea; Hashimoto, Chie; Hart, John A; Head, Josephine; Hega, Martin; Herbinger, Ilka; Hicks, Thurston C; Holbech, Lars H; Huijbregts, Bas; Kühl, Hjalmar S; Imong, Inaoyom; Yeno, Stephane Le-Duc; Linder, Joshua; Marshall, Phil; Lero, Peter Minasoma; Morgan, David; Mubalama, Leonard; N'Goran, Paul K; Nicholas, Aaron; Nixon, Stuart; Normand, Emmanuelle; Nziguyimpa, Leonidas; Nzooh-Dongmo, Zacharie; Ofori-Amanfo, Richard; Ogunjemite, Babafemi G; Petre, Charles-Albert; Rainey, Hugo J; Regnaut, Sebastien; Robinson, Orume; Rundus, Aaron; Sanz, Crickette M; Okon, David Tiku; Todd, Angelique; Warren, Ymke; Sommer, Volker

    2014-01-01

    Numerous protected areas (PAs) have been created in Africa to safeguard wildlife and other natural resources. However, significant threats from anthropogenic activities and decline of wildlife populations persist, while conservation efforts in most PAs are still minimal. We assessed the impact level of the most common threats to wildlife within PAs in tropical Africa and the relationship of conservation activities with threat impact level. We collated data on 98 PAs with tropical forest cover from 15 countries across West, Central and East Africa. For this, we assembled information about local threats as well as conservation activities from published and unpublished literature, and questionnaires sent to long-term field workers. We constructed general linear models to test the significance of specific conservation activities in relation to the threat impact level. Subsistence and commercial hunting were identified as the most common direct threats to wildlife and found to be most prevalent in West and Central Africa. Agriculture and logging represented the most common indirect threats, and were most prevalent in West Africa. We found that the long-term presence of conservation activities (such as law enforcement, research and tourism) was associated with lower threat impact levels. Our results highlight deficiencies in the management effectiveness of several PAs across tropical Africa, and conclude that PA management should invest more into conservation activities with long-term duration. PMID:25469888

  12. 49 CFR 1540.203 - Security threat assessment.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Security threat assessment. 1540.203 Section 1540.203 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CIVIL AVIATION SECURITY: GENERAL RULES Security Threat Assessments §...

  13. Creating Safe Learning Zones: Invisible Threats, Visible Actions.

    ERIC Educational Resources Information Center

    2002

    This report is a follow-up to the first publication of the Child Proofing Our Communities Campaign, titled "Poisoned Schools: Invisible Threats, Visible Actions." The previous report looked at the problems of public schools built on contaminated land years ago, the trend of proposing new schools on contaminated land, and the threat of toxic…

  14. Attention Bias toward Threat in Pediatric Anxiety Disorders

    ERIC Educational Resources Information Center

    Roy, Amy Krain; Vasa, Roma A.; Bruck, Maggie; Mogg, Karin; Bradley, Brendan P.; Sweeney, Michael; Bergman, R. Lindsey; McClure-Tone, Erin B.; Pine, Daniel S.

    2008-01-01

    Attention bias towards threat faces is examined for a large sample of anxiety-disordered youths using visual probe task. The results showed that anxious individuals showed a selective bias towards threat due to perturbation in neural mechanisms that control vigilance.

  15. Integrated optic chip for laser threat identification

    NASA Astrophysics Data System (ADS)

    McAulay, Alastair D.

    2010-04-01

    In this conference last year, we proposed free-space gratings, Fizeau interferometers and wavefront estimation for detecting the different lasers deployed in the battlefield for range finding, target designation, communications, dazzle, location of targets, munitions guidance, and destruction. Since last year, advanced laser weapons of the electron cyclotron type, are in development, such as the free-electron laser, that are tunable and can, unlike conventional bound-electron state lasers, be used at any wavelength from microwaves to soft X-rays. We list the characteristics of the nine dominant laser weapons because we assume that the free-electron lasers will initially use one of the current threat wavelengths because of availability of components and instrumentation. In this paper we replace the free-space grating with a higher performing array waveguide grating integrated optic chip, similar to that used in telecommunications, because integrated circuits are more robust and less expensive. It consists of a star coupler that fans out amongst waveguides of different length followed by a star coupler that focuses different wavelengths to different outputs in order to separate them. Design equations are derived to cover a range of frequencies at specific frequency spacing relevant to this application.

  16. Superluminous supernovae: no threat from eta Carinae.

    PubMed

    Thomas, Brian C; Melott, Adrian L; Fields, Brian D; Anthony-Twarog, Barbara J

    2008-02-01

    Recently, Supernova 2006gy was noted as the most luminous ever recorded, with a total radiated energy of approximately 10(44) Joules. It was proposed that the progenitor may have been a massive evolved star similar to eta Carinae, which resides in our own Galaxy at a distance of about 2.3 kpc. eta Carinae appears ready to detonate. Although it is too distant to pose a serious threat as a normal supernova, and given that its rotation axis is unlikely to produce a gamma-ray burst oriented toward Earth, eta Carinae is about 30,000 times nearer than 2006gy, and we re-evaluate it as a potential superluminous supernova. We have found that, given the large ratio of emission in the optical to the X-ray, atmospheric effects are negligible. Ionization of the atmosphere and concomitant ozone depletion are unlikely to be important. Any cosmic ray effects should be spread out over approximately 10(4) y and similarly unlikely to produce any serious perturbation to the biosphere. We also discuss a new possible effect of supernovae-e-ndocrine disruption induced by blue light near the peak of the optical spectrum. This is a possibility for nearby supernovae at distances too large to be considered "dangerous" for other reasons. However, due to reddening and extinction by the interstellar medium, eta Carinae is unlikely to trigger such effects to any significant degree. PMID:18199005

  17. Environmental degradation and environmental threats in China.

    PubMed

    Wang, Ying

    2004-01-01

    The article presents a review of environmental degradation and its threats in China. Air pollution, water pollution, deforestation, soil degradation, sand depositing in dams, decaying urban infrastructure, and more and more hazards such as floods, landslides and soil erosion are major consequences of environmental degradation and are making tremendous loss both in life and property. Through investigation, the author found that poor air quality in the large cities; water pollution in the downstream of many rivers; the multiple problems of many mining areas; lack of access to fresh water; decaying sewage systems; and the disastrous impact of these environmental degradations on public health and agricultural products in many provinces is rather serious. Relationship of environmental degradation and natural hazards is close; more attention should be put in environmental degradation that may surpass economy progress if the trend continues. It is therefore imperative that Chinese government undertake a series of prudent actions now that will enable to be in the best possible position when the current environmental crisis ultimately passes. PMID:15887370

  18. Countering GPS jamming and EW threat

    NASA Astrophysics Data System (ADS)

    Pereira, Carlos M.; Rastegar, J.; McLain, Clifford E.; Alanson, T.; McMullan, Charles; Nguyen, H.-L.

    2007-09-01

    Efforts at the U.S. Army Research, Development and Engineering Center (ARDEC) at Picatinny, New Jersey are focused on developing methods to counter GPS jamming and electronic warfare (EW) threat by eliminating GPS dependency entirely. In addition, the need for munitions cost reduction requires alternatives to expensive high-grade inertia components. Efforts at ARDEC include investigations of novel methods for onboard measurement of munitions full position and angular orientation independent of GPS signals or high-grade inertia components. Currently, two types of direct angular measurement sensors are being investigated. A first sensor, Radio Frequency Polarized Sensor (RFPS), uses an electromagnetic field as a reference. A second sensor is based on magnetometers, using the Earth magnetic field for orientation measurement. Magnetometers, however, can only provide two independent orientation measurements. The RFPS may also be used to make full object position and angular orientation measurement relative to a reference coordinate system, which may be moving or stationary. The potential applications of novel RFPS sensors is in providing highly effective inexpensive replacement for GPS, which could be used in a "Layered Navigation" scheme employing alternate referencing methods and reduce the current dependency on GPS as a primary reference for guided gun-fired munitions. Other potential applications of RFPSs is in UAVs, UGVs, and robotic platforms.

  19. Biological warfare--an emerging threat.

    PubMed

    Agarwal, Reshma; Shukla, S K; Dharmani, S; Gandhi, A

    2004-09-01

    As we approach the 21st century, there is an increasing worldwide awareness and threat regarding the use of biological warfare agents both for war and terrorist attack. Biological agents include microorganisms or biological toxins that are used to produce death in humans, animals and plants. They are characterized by low visibility, high potency, substantial accessibility and relatively easy delivery. Biological warfare agents are unconventional weapons that can be delivered by unconventional means like aerosol sprays, food and water contamination, conventional explosive munitions or by covert injections. Because of their concealed delivery, easy transportation and difficult identification they are readily adaptable for terrorist operations or to gain political advantages. The detection of such attack requires recognition of the clinical syndromes associated with various biological warfare agents. Diagnosis can be made on clinical grounds and on investigations. Protective measures can be taken against biological warfare agents. These should be implemented early (if warning is received) or later (once suspicion of agent use is made). After the confirmation of diagnosis emergency medical treatment and decontamination are performed in rapid sequence. Patients are then evacuated and specific therapy is given according to the agent involved. Appropriate emergency department and hospital response could significantly limit the morbidity and mortality of biological warfare agents. PMID:15839453

  20. The concept of leakage in threat assessment.

    PubMed

    Meloy, J Reid; O'Toole, Mary Ellen

    2011-01-01

    Leakage in the context of threat assessment is the communication to a third party of an intent to do harm to a target. Third parties are usually other people, but the means of communication vary, and include letters, diaries, journals, blogs, videos on the internet, emails, voice mails, and other social media forms of transmission. Leakage is a type of warning behavior that typically infers a preoccupation with the target, and may signal the research, planning, and implementation of an attack. Nomothetic data suggest that leakage occurs in a majority of cases of attacks on and assassinations of public figures, adult mass murders, adolescent mass murders, and school or campus shootings: very low-frequency, but catastrophic acts of intended and targeted violence. Idiographic or case data illustrate the various permutations of leakage. We discuss the operational importance of the concept, place it in the context of other warning behaviors, emphasize the need for further research, and outline risk management strategies for the mitigation of such acts of violence in both law enforcement and clinical mental health settings. PMID:21710573

  1. [Chikungunya fever - A new global threat].

    PubMed

    Montero, Antonio

    2015-08-01

    The recent onset of epidemics caused by viruses such as Ebola, Marburg, Nipah, Lassa, coronavirus, West-Nile encephalitis, Saint Louis encephalitis, human immunodeficiency virus, dengue, yellow fever and Venezuelan hemorrhagic fever alerts about the risk these agents represent for the global health. Chikungunya virus represents a new threat. Surged from remote African regions, this virus has become endemic in the Indic ocean basin, the Indian subcontinent and the southeast of Asia, causing serious epidemics in Africa, Indic Ocean Islands, Asia and Europe. Due to their epidemiological and biological features and the global presence of their vectors, chikungunya represents a serious menace and could become endemic in the Americas. Although chikungunya infection has a low mortality rate, its high attack ratio may collapse the health system during epidemics affecting a sensitive population. In this paper, we review the clinical and epidemiological features of chikungunya fever as well as the risk of its introduction into the Americas. We remark the importance of the epidemiological control and mosquitoes fighting in order to prevent this disease from being introduced into the Americas. PMID:25087211

  2. Weak magnetic fields in early-type stars: failed fossils

    NASA Astrophysics Data System (ADS)

    Braithwaite, Jonathan; Cantiello, Matteo

    2013-02-01

    Weak magnetic fields have recently been detected in Vega and Sirius. Here, we explore the possibility that these fields are the remnants of some field inherited or created during or shortly after star formation and are still evolving dynamically as we observe them. The time-scale of this evolution is given in terms of the Alfvén time-scale and the rotation frequency by ?evol ˜ ?2A ?, which is then comparable to the age of the star. According to this theory, all intermediate- and high-mass stars should contain fields of at least the strength found so far in Vega and Sirius. Faster rotators are expected to have stronger magnetic fields. Stars may experience an increase in surface field strength during their early main sequence, but for most of their lives field strength will decrease slowly. The length scale of the magnetic structure on the surface may be small in very young stars but should quickly increase to at least very approximately a fifth of the stellar radius. The field strength may be higher at the poles than at the equator.

  3. Women's Speech, Women's Strength?

    ERIC Educational Resources Information Center

    Coates, Jennifer

    A discussion of women's oral discourse patterns focuses on the uses made of minimal responses, hedges, and tag questions. The analysis draws on transcriptions of conversations among a group of women friends over a period of months. It is proposed that the conventional treatment of these forms as "weak" is inappropriate in all-female discourse. In…

  4. A Threats Blocking Plug-in for Open Source Learning Management Systems

    NASA Astrophysics Data System (ADS)

    Braga, Gianluca; Sterbini, Andrea; Temperini, Marco

    Web-based Learning Management Systems, as in the nature of web-applications, are subject to attacks delivered through Internet, mainly aiming at accessing restricted data for illegal use. Protection from these kinds of threats is studied in the area of web applications and has been steadily improving in the last years. Nonetheless, especially in the area of very popular and easy-to-install web applications, such as Content Managements Systems, Blogs, and open source Learning Management Systems, the usual way to protect an installed system is to wait that weaknesses in the system software are discovered, and "patches" or new system releases are made available for installation. And this can be necessary also in cases in which no new threat technique has been discovered, while just another part of the system software has been detected as "weak" to that type of attack. Here we give an account of the most usual "exploit" techniques, known to be available, and describe a prototype methodology to equip certain Learning Management Systems (namely the open source ones, in particular those based on PHP engines) with a more stable protection, making it unnecessary to patch, or reinstall, a system in a hurry, after that minor weaknesses have been unveiled. The plug-in for a system is supposed to filter the input, sent by the user through a browser, and to avoid execution of server activities on suspect data. We test the methodology on Moodle, by producing a suitable plug-in, and verifying its success at system run-time.

  5. Unhealthy Interactions: The Role of Stereotype Threat in Health Disparities

    PubMed Central

    Burgess, Diana; Phelan, Sean M.; Juarez, Lindsay

    2013-01-01

    Stereotype threat is the unpleasant psychological experience of confronting negative stereotypes about race, ethnicity, gender, sexual orientation, or social status. Hundreds of published studies show how the experience of stereotype threat can impair intellectual functioning and interfere with test and school performance. Numerous published interventions derived from this research have improved the performance and motivation of individuals targeted by low-ability stereotypes. Stereotype threat theory and research provide a useful lens for understanding and reducing the negative health consequences of interracial interactions for African Americans and members of similarly stigmatized minority groups. Here we summarize the educational outcomes of stereotype threat and examine the implications of stereotype threat for health and health-related behaviors. PMID:23153125

  6. Perceived control qualifies the effects of threat on prejudice.

    PubMed

    Greenaway, Katharine H; Louis, Winnifred R; Hornsey, Matthew J; Jones, Janelle M

    2014-09-01

    People sometimes show a tendency to lash out in a prejudiced manner when they feel threatened. This research shows that the relationship between threat and prejudice is moderated by people's levels of perceived control: Threat leads to prejudice only when people feel concurrently low in control. In two studies, terrorist threat was associated with heightened prejudice among people who were low in perceived control over the threat (Study 1; N = 87) or over their lives in general (Study 2; N = 2,394), but was not associated with prejudice among people who were high in perceived control. Study 3 (N = 139) replicated this finding experimentally in the context of the Global Financial Crisis. The research identifies control as an important ingredient in threatening contexts that, if bolstered, can reduce general tendencies to lash out under threat. PMID:24006898

  7. Dissociated neural effects of cortisol depending on threat escapability.

    PubMed

    Montoya, Estrella R; van Honk, Jack; Bos, Peter A; Terburg, David

    2015-11-01

    Evolution has provided us with a highly flexible neuroendocrine threat system which, depending on threat imminence, switches between active escape and passive freezing. Cortisol, the "stress-hormone", is thought to play an important role in both fear behaviors, but the exact mechanisms are not understood. Using pharmacological functional magnetic resonance imaging we investigated how cortisol modulates the brain's fear systems when humans are under virtual-predator attack. We show dissociated neural effects of cortisol depending on whether escape from threat is possible. During inescapable threat cortisol reduces fear-related midbrain activity, whereas in anticipation of active escape cortisol boosts activity in the frontal salience network (insula and anterior cingulate cortex), which is involved in autonomic control, visceral perception and motivated action. Our findings suggest that cortisol adjusts the human neural threat system from passive fear to active escape, which illuminates the hormone's crucial role in the adaptive flexibility of fear behaviors. PMID:26248899

  8. Masculine voices signal men's threat potential in forager and industrial societies

    PubMed Central

    Puts, David A.; Apicella, Coren L.; Cárdenas, Rodrigo A.

    2012-01-01

    Humans and many non-human primates exhibit large sexual dimorphisms in vocalizations and vocal anatomy. In humans, same-sex competitors and potential mates attend to acoustic features of male vocalizations, but vocal masculinity especially increases perceptions of physical prowess. Yet, the information content of male vocalizations remains obscure. We therefore examined relationships between sexually dimorphic acoustic properties and men's threat potential. We first introduce a new measure of the structure of vocal formant frequencies, ‘formant position’ (Pf), which we show is more sexually dimorphic and more strongly related to height than is the most widely used measure of formant structure, ‘formant dispersion’, in both a US sample and a sample of Hadza foragers from Tanzania. We also show large sexual dimorphisms in the mean fundamental frequency (F0) and the within-utterance standard deviation in F0 (F0 ? s.d.) in both samples. We then explore relationships between these acoustic parameters and men's body size, strength, testosterone and physical aggressiveness. Each acoustic parameter was related to at least one measure of male threat potential. The most dimorphic parameters, F0 and Pf, were most strongly related to body size in both samples. In the US sample, F0 predicted testosterone levels, Pf predicted upper body strength and F0 ? s.d. predicted physical aggressiveness. PMID:21752821

  9. Weak percolation on multiplex networks

    NASA Astrophysics Data System (ADS)

    Baxter, Gareth J.; Dorogovtsev, Sergey N.; Mendes, José F. F.; Cellai, Davide

    2014-04-01

    Bootstrap percolation is a simple but nontrivial model. It has applications in many areas of science and has been explored on random networks for several decades. In single-layer (simplex) networks, it has been recently observed that bootstrap percolation, which is defined as an incremental process, can be seen as the opposite of pruning percolation, where nodes are removed according to a connectivity rule. Here we propose models of both bootstrap and pruning percolation for multiplex networks. We collectively refer to these two models with the concept of "weak" percolation, to distinguish them from the somewhat classical concept of ordinary ("strong") percolation. While the two models coincide in simplex networks, we show that they decouple when considering multiplexes, giving rise to a wealth of critical phenomena. Our bootstrap model constitutes the simplest example of a contagion process on a multiplex network and has potential applications in critical infrastructure recovery and information security. Moreover, we show that our pruning percolation model may provide a way to diagnose missing layers in a multiplex network. Finally, our analytical approach allows us to calculate critical behavior and characterize critical clusters.

  10. Weakly Supervised Human Fixations Prediction.

    PubMed

    Zhang, Luming; Li, Xuelong; Nie, Liqiang; Yang, Yi; Xia, Yingjie

    2016-01-01

    Automatically predicting human eye fixations is a useful technique that can facilitate many multimedia applications, e.g., image retrieval, action recognition, and photo retargeting. Conventional approaches are frustrated by two drawbacks. First, psychophysical experiments show that an object-level interpretation of scenes influences eye movements significantly. Most of the existing saliency models rely on object detectors, and therefore, only a few prespecified categories can be discovered. Second, the relative displacement of objects influences their saliency remarkably, but current models cannot describe them explicitly. To solve these problems, this paper proposes weakly supervised fixations prediction, which leverages image labels to improve accuracy of human fixations prediction. The proposed model hierarchically discovers objects as well as their spatial configurations. Starting from the raw image pixels, we sample superpixels in an image, thereby seamless object descriptors termed object-level graphlets (oGLs) are generated by random walking on the superpixel mosaic. Then, a manifold embedding algorithm is proposed to encode image labels into oGLs, and the response map of each prespecified object is computed accordingly. On the basis of the object-level response map, we propose spatial-level graphlets (sGLs) to model the relative positions among objects. Afterward, eye tracking data is employed to integrate these sGLs for predicting human eye fixations. Thorough experiment results demonstrate the advantage of the proposed method over the state-of-the-art. PMID:26168451

  11. A Universe without Weak Interactions

    SciTech Connect

    Harnik, Roni; Kribs, Graham D.; Perez, Gilad

    2006-04-07

    A universe without weak interactions is constructed that undergoes big-bang nucleosynthesis, matter domination, structure formation, and star formation. The stars in this universe are able to burn for billions of years, synthesize elements up to iron, and undergo supernova explosions, dispersing heavy elements into the interstellar medium. These definitive claims are supported by a detailed analysis where this hypothetical ''Weakless Universe'' is matched to our Universe by simultaneously adjusting Standard Model and cosmological parameters. For instance, chemistry and nuclear physics are essentially unchanged. The apparent habitability of the Weakless Universe suggests that the anthropic principle does not determine the scale of electroweak breaking, or even require that it be smaller than the Planck scale, so long as technically natural parameters may be suitably adjusted. Whether the multi-parameter adjustment is realized or probable is dependent on the ultraviolet completion, such as the string landscape. Considering a similar analysis for the cosmological constant, however, we argue that no adjustments of other parameters are able to allow the cosmological constant to raise up even remotely close to the Planck scale while obtaining macroscopic structure. The fine-tuning problems associated with the electroweak breaking scale and the cosmological constant therefore appear to be qualitatively different from the perspective of obtaining a habitable universe.

  12. Improvement of Delamination Strength of REBCO Coated Conductors

    NASA Astrophysics Data System (ADS)

    Yoshizumi, Masateru; Sakai, Naomichi; Izumi, Teruo

    Recent progress in development of RE1Ba2Cu3Ox (REBCO, RE: Y and Rare Earth) coated conductors has been remarkable, which makes practical applications realistic. Considering the major applications, long coated conductors are expected to be used as coils. Improvement of delamination strength throughout the long tape is important issue as well to meet the requirements of those applications. Effect of processing on delamination strength was analyzed in this work. The delamination strength can be distinguished into 3 groups depending on the origins of delamination; weak strength (<30 MPa) occurred from MOD-GZO due to pores in it. Densification of the layer by using higher calcination temperature in the heat treatment eliminated this type of delamination. Middle strength (30- 50 MPa) was due to cracks near the bed layer/substrate interface which were caused by the oxygenation of metallic substrate due to exposure to high temperature during GdBCO deposition. It was clarified that shortening the deposition time is effective to minimize the effect. High strength (>50 MPa) was realized by elimination of those defects which can be controlled by optimization of the process. Statistical analysis showed the improved process gives only one weak spot per thousands of kilometers long tape. The improvement of processing was effective to obtain high delamination strength throughout long wires.

  13. Identifying key conservation threats to Alpine birds through expert knowledge

    PubMed Central

    Pedrini, Paolo; Brambilla, Mattia; Rolando, Antonio; Girardello, Marco

    2016-01-01

    Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species over the next 50 years for the whole European Alps in relation to ten categories: land abandonment, climate change, renewable energy, fire, forestry practices, grazing practices, hunting, leisure, mining and urbanization. There was a high degree of concordance in ranking of perceived threats among experts for most threat categories. The major overall perceived threats to Alpine birds identified through expert knowledge were land abandonment, urbanization, leisure and forestry, although other perceived threats were ranked highly for particular species groups (renewable energy and hunting for raptors, hunting for gamebirds). For groups of species defined according to their breeding habitat, open habitat species and treeline species were perceived as the most threatened. A spatial risk assessment tool based on summed scores for the whole community showed threat levels were highest for bird communities of the northern and western Alps. Development of the approaches given in this paper, including addressing biases in the selection of experts and adopting a more detailed ranking procedure, could prove useful in the future in identifying future threats, and in carrying out risk assessments based on levels of threat to the whole bird community. PMID:26966659

  14. Identifying key conservation threats to Alpine birds through expert knowledge.

    PubMed

    Chamberlain, Dan E; Pedrini, Paolo; Brambilla, Mattia; Rolando, Antonio; Girardello, Marco

    2016-01-01

    Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species over the next 50 years for the whole European Alps in relation to ten categories: land abandonment, climate change, renewable energy, fire, forestry practices, grazing practices, hunting, leisure, mining and urbanization. There was a high degree of concordance in ranking of perceived threats among experts for most threat categories. The major overall perceived threats to Alpine birds identified through expert knowledge were land abandonment, urbanization, leisure and forestry, although other perceived threats were ranked highly for particular species groups (renewable energy and hunting for raptors, hunting for gamebirds). For groups of species defined according to their breeding habitat, open habitat species and treeline species were perceived as the most threatened. A spatial risk assessment tool based on summed scores for the whole community showed threat levels were highest for bird communities of the northern and western Alps. Development of the approaches given in this paper, including addressing biases in the selection of experts and adopting a more detailed ranking procedure, could prove useful in the future in identifying future threats, and in carrying out risk assessments based on levels of threat to the whole bird community. PMID:26966659

  15. Elasticity and Strength of Biomacromolecular Crystals: Lysozyme

    NASA Technical Reports Server (NTRS)

    Holmes, A. M.; Witherow, W. K.; Chen, L. Q.; Chernov, A. A.

    2003-01-01

    The static Young modulus, E = 0.1 to 0.5 GPa, the crystal critical strength (sigma(sub c)) and its ratio to E,sigma(sub c)/E is approximately 10(exp 3), were measured for the first time for non cross-linked lysozyme crystals in solution. By using a triple point bending apparatus, we also demonstrated that the crystals were purely elastic. Softness of protein crystals built of hard macromolecules (26 GPa for lysozyme) is explained by the large size of the macromolecules as compared to the range of intermolecular forces and by the weakness of intermolecular bonds as compared to the peptide bond strength. The relatively large reported dynamic elastic moduli (approximately 8 GPa) from resonance light scattering should come from averaging over the moduli of intracrystalline water and intra- and intermolecular bonding.

  16. 49 CFR 192.917 - How does an operator identify potential threats to pipeline integrity and use the threat...

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 3 2013-10-01 2013-10-01 false How does an operator identify potential threats to pipeline integrity and use the threat identification in its integrity program? 192.917 Section 192.917 Transportation Other Regulations Relating to Transportation (Continued) PIPELINE AND HAZARDOUS MATERIALS SAFETY ADMINISTRATION, DEPARTMENT...

  17. Spin resonance strength calculations

    SciTech Connect

    Courant,E.D.

    2008-10-06

    In calculating the strengths of depolarizing resonances it may be convenient to reformulate the equations of spin motion in a coordinate system based on the actual trajectory of the particle, as introduced by Kondratenko, rather than the conventional one based on a reference orbit. It is shown that resonance strengths calculated by the conventional and the revised formalisms are identical. Resonances induced by radiofrequency dipoles or solenoids are also treated; with rf dipoles it is essential to consider not only the direct effect of the dipole but also the contribution from oscillations induced by it.

  18. High strength alloys

    SciTech Connect

    Maziasz, Phillip James; Shingledecker, John Paul; Santella, Michael Leonard; Schneibel, Joachim Hugo; Sikka, Vinod Kumar; Vinegar, Harold J; John, Randy Carl; Kim, Dong Sub

    2010-08-31

    High strength metal alloys are described herein. At least one composition of a metal alloy includes chromium, nickel, copper, manganese, silicon, niobium, tungsten and iron. System, methods, and heaters that include the high strength metal alloys are described herein. At least one heater system may include a canister at least partially made from material containing at least one of the metal alloys. At least one system for heating a subterranean formation may include a tubular that is at least partially made from a material containing at least one of the metal alloys.

  19. High strength alloys

    SciTech Connect

    Maziasz, Phillip James; Shingledecker, John Paul; Santella, Michael Leonard; Schneibel, Joachim Hugo; Sikka, Vinod Kumar; Vinegar, Harold J.; John, Randy Carl; Kim, Dong Sub

    2012-06-05

    High strength metal alloys are described herein. At least one composition of a metal alloy includes chromium, nickel, copper, manganese, silicon, niobium, tungsten and iron. System, methods, and heaters that include the high strength metal alloys are described herein. At least one heater system may include a canister at least partially made from material containing at least one of the metal alloys. At least one system for heating a subterranean formation may include a tublar that is at least partially made from a material containing at least one of the metal alloys.

  20. Costly retaliation is promoted by threats to resources in women and threats to status in men.

    PubMed

    Geniole, Shawn N; Cunningham, Cody E; Keyes, Amanda E; Busseri, Michael A; McCormick, Cheryl M

    2015-01-01

    What motivates people to act against their own self-interest? In men, what seems to be irrational decision-making in the short-term may be explained by other long-term benefits; thus retaliation may not be motivated by tangible costs, but instead intangible psychological variables (e.g., status threats). In contrast, there is evidence that women are more sensitive to tangible costs than are men. In Experiment 1, using the Point Subtraction Aggression Paradigm (PSAP), we tested the prediction that in men, the frequency of provocation, and not the monetary loss (tangible cost), would be associated with retaliation, whereas women would be sensitive to the tangible costs. In keeping with the prediction, women (n = 80) who incurred greater tangible costs (irrespective of frequency) retaliated with more costly punishment, whereas men (n = 90) who were provoked more frequently (irrespective of tangible costs) retaliated with more costly punishment. In Experiment 2, we directly investigated whether women were more sensitive to threats to resources and men were more sensitive to threats to status, as suggested by the results of Experiment 1. Women's (n = 53) retaliation was greater when they reported it to be a means to protect their resources, and men's (n = 35) retaliation was greater when they reported it to be a means to protect their status. Thus, these results identify psychological variables that guide retaliation that is costly to the actor. Consistent with evolutionary perspectives, concerns about status appear to drive costly retaliatory behavior more so in men than in women. PMID:25832315